Eslam λ Hefnawy
8af647eba3
Merge pull request #3360 from ryansb/reduce-policy-dep
...
Reduce dependency tree depth between IAM & Log Groups
2017-03-17 23:56:21 +08:00
Philipp Muens
0784680f78
Merge pull request #3304 from jmannau/master
...
Corrected Access-Control-Allow-Methods for ANY HTTP events
2017-03-15 08:17:19 +01:00
Philipp Muens
0d7c66fda3
Fix linting issues
2017-03-15 07:55:05 +01:00
Ryan S. Brown
855a1cf3f8
Add explicit dependency from Function -> LogGroups
2017-03-13 20:42:40 -04:00
Ryan S. Brown
4a2a917994
LINT FOR THE LINT GODS
2017-03-13 18:38:59 -04:00
Eslam λ Hefnawy
f264671736
Merge pull request #3187 from tgjorgoski/fix-for-custom-claims
...
Fix for authorizer claims: multiple claims and custom property claims (#3088 )
2017-03-13 19:44:40 +08:00
Eslam λ Hefnawy
8530463d25
Merge pull request #3147 from y13i/feat-add-support-for-cfn-service-role
...
Add support for CloudFormation service roles
2017-03-13 19:30:37 +08:00
Ryan S. Brown
5f876cfb98
Add tests for new Fn::Sub template style
2017-03-12 19:02:13 -04:00
Ryan S. Brown
5c06296533
Remove implicit dependency between IAM policy and log groups
...
Until now, the IAM policy had a dependency on log groups completing
before it could finish because of the use of `Fn::GetAtt` with a log
group, meaning the policy couldn't provision until all log groups were
ready.
This patch changes the log group reference in the CFN template from:
```
{ "Fn::GetAtt": ["MyFuncLogGroup", "Arn"] }
```
to
```
{"Fn::Sub": "arn:aws:logs:${AWS::Region}:${AWS::AccountId}:log-group:/aws/lambda/my-service-dev-myfunction:*"}
```
Meaning the policy can be resolved 100% with pseudoparams for log group ARNs.
This speeds up the CFN initial deploy significantly, and somewhat
improves deployments that add or rename functions.
Having this dependency removed is also the first step in allowing log
groups to be moved to a nested stack.
2017-03-11 14:03:04 -05:00
Tanas Gjorgoski
4654ce33c0
support other properties with colon (e.g. cognito:username)
2017-03-07 09:56:50 +01:00
Ryan S. Brown
8f7584b37e
Enforce schema on dynamic stream ARNs
...
This commit enforces that any dynamic stream *must* have either
Fn::GetAtt or Fn::ImportValue, and can't have any extra keys.
2017-03-02 19:46:25 -05:00
James Manners
13c71707d5
Updated to use _.includes to check if the method includes 'ANY'
2017-03-03 10:03:00 +11:00
Ryan S. Brown
2c01c06d6d
LINT FOR THE LINTING GODS
2017-03-01 21:52:30 -05:00
Ryan S. Brown
9ca9baabfa
Add tests for dynamic ARNs
2017-03-01 21:33:54 -05:00
Ryan S. Brown
b42585f568
Fix lint errors
2017-03-01 21:00:16 -05:00
Ryan S. Brown
9ab56970e0
Patch DynamoDB and kinesis stream detection to allow use of GetAtt/ImportValue
2017-03-01 21:00:16 -05:00
Nick den Engelsman
6ee7930526
Replace remaning IamPolicyLambdaExecution’s with IamRoleLambdaExecution
2017-02-27 12:49:36 +01:00
Nick den Engelsman
1e7bc75334
Remove logs:CreateLogGroup from the default IAM policy since Log group resources are created through CloudFormation by default
2017-02-27 12:46:21 +01:00
James Manners
2bef69c6ac
Corrected Access-Control-Allow-Methods for ANY HTTP events
...
The Access-Control-Allow-Methods OPTIONS response header for ANY http
verb requests now correctly includes all HTTP verbs.
2017-02-27 15:31:55 +11:00
Nick den Engelsman
5a55233d96
Make sure we always create the log group resources
2017-02-23 13:14:55 +01:00
Nick den Engelsman
574a4a78a7
Rebase on top of master
2017-02-20 21:08:45 +01:00
Nick den Engelsman
e879b2a6bc
Improved tests for lib/plugins/aws/deploy/compile/functions/index.test.js
...
Improved tests for lib/plugins/aws/deploy/compile/functions/index.test.js
wip
2017-02-20 21:08:32 +01:00
Nick den Engelsman
dae2a5d359
Add missing policy name
2017-02-19 21:14:58 +01:00
Nick den Engelsman
c8632dded9
Migrated IamPolicyLambdaExecution resource statements towards inline polices within the IamRoleLambdaExecution resource
2017-02-19 21:12:11 +01:00
Eslam λ Hefnawy
724e225864
Merge pull request #3102 from horike37/add-cloudwatch-to-event-source
...
Add CloudWatch event source
2017-02-14 19:49:14 +07:00
Eslam A. Hefnawy
f553547733
log group resources are now created even when no roles are created
2017-02-08 21:47:16 +07:00
Philipp Muens
2cd1dfff0b
Minor adjustments
2017-02-06 14:09:52 +01:00
horike37
fd7e167807
Dropped name and description statements
2017-02-04 09:46:06 +09:00
horike37
3ada150d53
Merge branch 'add-cloudwatch-to-event-source' of github.com:horike37/serverless into add-cloudwatch-to-event-source
2017-02-04 09:03:01 +09:00
horike37
8bb29727d1
Merge branch 'master' into add-cloudwatch-to-event-source
2017-02-04 09:02:24 +09:00
Tanas Gjorgoski
c330a59a81
fix linting warnings
2017-02-03 19:12:47 +01:00
Tanas Gjorgoski
b1d064fc25
proper test for cognito user pool claims
2017-02-03 18:32:38 +01:00
Philipp Muens
66588856cb
Update event naming
...
So that it won't clash when other CloudWatch events are implemented.
2017-02-03 14:55:38 +01:00
Tanas Gjorgoski
4d3090d575
fix the commas
2017-01-30 16:49:52 +01:00
Tanas Gjorgoski
098173d907
change for the custom claims
2017-01-30 15:11:52 +01:00
Eslam λ Hefnawy
fdd3470f92
Merge pull request #3145 from ryansb/bug/reduceMemoryUsage
...
Reduce memory consumption on deploy by at least 50%
2017-01-29 19:29:42 +07:00
Eslam A. Hefnawy
d97e49f376
create loggroup resource by default
2017-01-27 17:29:30 +07:00
Eslam A. Hefnawy
ce7f9bbc20
creating log groups
2017-01-27 17:29:30 +07:00
Eslam λ Hefnawy
dde1b48ad5
Merge pull request #3083 from erikerikson/allow-role-reference-in-func-role-attr
...
Allow Role 'Fn::GetAtt' for Lambda `role`
2017-01-27 16:48:37 +07:00
Ryan S. Brown
12c2ad906c
Update test to match the S3 object body readStream points to the artifact zipfile path
2017-01-26 16:46:13 -05:00
Yoriki Yamaguchi
3ebc9772d1
Merge branch 'master' into feat-add-support-for-cfn-service-role
2017-01-27 02:19:01 +09:00
Ryan S. Brown
8b6b3033f9
Reduce memory usage of deploy/upload step
...
Switch to using a stream to read artifacts at upload, because it was
being read into a `const` that the AWS SDK had to then copy to a
bytearray that was wrapped in a TLSStream object, duplicating the
artifact several times.
2017-01-26 08:11:21 -05:00
Eslam λ Hefnawy
96139e70ab
Merge pull request #2736 from asprouse/master
...
Added Access-Control-Allow-Credentials for CORS settings fixes #2182
2017-01-26 19:31:51 +07:00
Erik Erikson
4a38ac3478
Add Error Case Detection
...
The error case of a stream event declaration declaring an unsupported event (type was never checked) was not handled in #2952 . Adding it here.
2017-01-25 15:40:41 -08:00
Erik Erikson
65a57b4fb3
Add Error Case Detection
...
The error case of a stream event declaration declaring an unsupported event (type was never checked) was not handled in https://github.com/serverless/serverless/pull/2952 . Adding it here.
2017-01-25 14:43:08 -08:00
Yoriki Yamaguchi
49ada0530b
add RoleARN support to createStack call
2017-01-25 19:25:40 +09:00
Doug Moscrop
acf74c4c96
add Support for SNS Subscription to existing topics
2017-01-23 15:13:45 -05:00
Philipp Muens
2181ba9478
Remove unused CloudFormation template
2017-01-23 13:21:10 +01:00
Philipp Muens
a6c3240d62
Fix broken test after rebasing
2017-01-20 14:48:28 +01:00
Philipp Muens
116c79dbf8
Refactor function arn generation for info plugin
2017-01-20 14:45:11 +01:00