602 Commits

Author SHA1 Message Date
Eslam λ Hefnawy
8af647eba3 Merge pull request #3360 from ryansb/reduce-policy-dep
Reduce dependency tree depth between IAM & Log Groups
2017-03-17 23:56:21 +08:00
Philipp Muens
0784680f78 Merge pull request #3304 from jmannau/master
Corrected Access-Control-Allow-Methods for ANY HTTP events
2017-03-15 08:17:19 +01:00
Philipp Muens
0d7c66fda3 Fix linting issues 2017-03-15 07:55:05 +01:00
Ryan S. Brown
855a1cf3f8 Add explicit dependency from Function -> LogGroups 2017-03-13 20:42:40 -04:00
Ryan S. Brown
4a2a917994 LINT FOR THE LINT GODS 2017-03-13 18:38:59 -04:00
Eslam λ Hefnawy
f264671736 Merge pull request #3187 from tgjorgoski/fix-for-custom-claims
Fix for authorizer claims: multiple claims and custom property claims  (#3088)
2017-03-13 19:44:40 +08:00
Eslam λ Hefnawy
8530463d25 Merge pull request #3147 from y13i/feat-add-support-for-cfn-service-role
Add support for CloudFormation service roles
2017-03-13 19:30:37 +08:00
Ryan S. Brown
5f876cfb98 Add tests for new Fn::Sub template style 2017-03-12 19:02:13 -04:00
Ryan S. Brown
5c06296533 Remove implicit dependency between IAM policy and log groups
Until now, the IAM policy had a dependency on log groups completing
before it could finish because of the use of `Fn::GetAtt` with a log
group, meaning the policy couldn't provision until all log groups were
ready.

This patch changes the log group reference in the CFN template from:

```
{ "Fn::GetAtt": ["MyFuncLogGroup", "Arn"] }
```

to

```
{"Fn::Sub": "arn:aws:logs:${AWS::Region}:${AWS::AccountId}:log-group:/aws/lambda/my-service-dev-myfunction:*"}
```

Meaning the policy can be resolved 100% with pseudoparams for log group ARNs.
This speeds up the CFN initial deploy significantly, and somewhat
improves deployments that add or rename functions.

Having this dependency removed is also the first step in allowing log
groups to be moved to a nested stack.
2017-03-11 14:03:04 -05:00
Tanas Gjorgoski
4654ce33c0 support other properties with colon (e.g. cognito:username) 2017-03-07 09:56:50 +01:00
Ryan S. Brown
8f7584b37e Enforce schema on dynamic stream ARNs
This commit enforces that any dynamic stream *must* have either
Fn::GetAtt or Fn::ImportValue, and can't have any extra keys.
2017-03-02 19:46:25 -05:00
James Manners
13c71707d5 Updated to use _.includes to check if the method includes 'ANY' 2017-03-03 10:03:00 +11:00
Ryan S. Brown
2c01c06d6d LINT FOR THE LINTING GODS 2017-03-01 21:52:30 -05:00
Ryan S. Brown
9ca9baabfa Add tests for dynamic ARNs 2017-03-01 21:33:54 -05:00
Ryan S. Brown
b42585f568 Fix lint errors 2017-03-01 21:00:16 -05:00
Ryan S. Brown
9ab56970e0 Patch DynamoDB and kinesis stream detection to allow use of GetAtt/ImportValue 2017-03-01 21:00:16 -05:00
Nick den Engelsman
6ee7930526 Replace remaning IamPolicyLambdaExecution’s with IamRoleLambdaExecution 2017-02-27 12:49:36 +01:00
Nick den Engelsman
1e7bc75334 Remove logs:CreateLogGroup from the default IAM policy since Log group resources are created through CloudFormation by default 2017-02-27 12:46:21 +01:00
James Manners
2bef69c6ac Corrected Access-Control-Allow-Methods for ANY HTTP events
The Access-Control-Allow-Methods OPTIONS response header for ANY http
verb requests now correctly includes all HTTP verbs.
2017-02-27 15:31:55 +11:00
Nick den Engelsman
5a55233d96 Make sure we always create the log group resources 2017-02-23 13:14:55 +01:00
Nick den Engelsman
574a4a78a7 Rebase on top of master 2017-02-20 21:08:45 +01:00
Nick den Engelsman
e879b2a6bc Improved tests for lib/plugins/aws/deploy/compile/functions/index.test.js
Improved tests for lib/plugins/aws/deploy/compile/functions/index.test.js

wip
2017-02-20 21:08:32 +01:00
Nick den Engelsman
dae2a5d359 Add missing policy name 2017-02-19 21:14:58 +01:00
Nick den Engelsman
c8632dded9 Migrated IamPolicyLambdaExecution resource statements towards inline polices within the IamRoleLambdaExecution resource 2017-02-19 21:12:11 +01:00
Eslam λ Hefnawy
724e225864 Merge pull request #3102 from horike37/add-cloudwatch-to-event-source
Add CloudWatch event source
2017-02-14 19:49:14 +07:00
Eslam A. Hefnawy
f553547733 log group resources are now created even when no roles are created 2017-02-08 21:47:16 +07:00
Philipp Muens
2cd1dfff0b Minor adjustments 2017-02-06 14:09:52 +01:00
horike37
fd7e167807 Dropped name and description statements 2017-02-04 09:46:06 +09:00
horike37
3ada150d53 Merge branch 'add-cloudwatch-to-event-source' of github.com:horike37/serverless into add-cloudwatch-to-event-source 2017-02-04 09:03:01 +09:00
horike37
8bb29727d1 Merge branch 'master' into add-cloudwatch-to-event-source 2017-02-04 09:02:24 +09:00
Tanas Gjorgoski
c330a59a81 fix linting warnings 2017-02-03 19:12:47 +01:00
Tanas Gjorgoski
b1d064fc25 proper test for cognito user pool claims 2017-02-03 18:32:38 +01:00
Philipp Muens
66588856cb Update event naming
So that it won't clash when other CloudWatch events are implemented.
2017-02-03 14:55:38 +01:00
Tanas Gjorgoski
4d3090d575 fix the commas 2017-01-30 16:49:52 +01:00
Tanas Gjorgoski
098173d907 change for the custom claims 2017-01-30 15:11:52 +01:00
Eslam λ Hefnawy
fdd3470f92 Merge pull request #3145 from ryansb/bug/reduceMemoryUsage
Reduce memory consumption on deploy by at least 50%
2017-01-29 19:29:42 +07:00
Eslam A. Hefnawy
d97e49f376 create loggroup resource by default 2017-01-27 17:29:30 +07:00
Eslam A. Hefnawy
ce7f9bbc20 creating log groups 2017-01-27 17:29:30 +07:00
Eslam λ Hefnawy
dde1b48ad5 Merge pull request #3083 from erikerikson/allow-role-reference-in-func-role-attr
Allow Role 'Fn::GetAtt' for Lambda `role`
2017-01-27 16:48:37 +07:00
Ryan S. Brown
12c2ad906c Update test to match the S3 object body readStream points to the artifact zipfile path 2017-01-26 16:46:13 -05:00
Yoriki Yamaguchi
3ebc9772d1 Merge branch 'master' into feat-add-support-for-cfn-service-role 2017-01-27 02:19:01 +09:00
Ryan S. Brown
8b6b3033f9 Reduce memory usage of deploy/upload step
Switch to using a stream to read artifacts at upload, because it was
being read into a `const` that the AWS SDK had to then copy to a
bytearray that was wrapped in a TLSStream object, duplicating the
artifact several times.
2017-01-26 08:11:21 -05:00
Eslam λ Hefnawy
96139e70ab Merge pull request #2736 from asprouse/master
Added Access-Control-Allow-Credentials for CORS settings fixes #2182
2017-01-26 19:31:51 +07:00
Erik Erikson
4a38ac3478 Add Error Case Detection
The error case of a stream event declaration declaring an unsupported event (type was never checked) was not handled in #2952.  Adding it here.
2017-01-25 15:40:41 -08:00
Erik Erikson
65a57b4fb3 Add Error Case Detection
The error case of a stream event declaration declaring an unsupported event (type was never checked) was not handled in https://github.com/serverless/serverless/pull/2952.  Adding it here.
2017-01-25 14:43:08 -08:00
Yoriki Yamaguchi
49ada0530b add RoleARN support to createStack call 2017-01-25 19:25:40 +09:00
Doug Moscrop
acf74c4c96 add Support for SNS Subscription to existing topics 2017-01-23 15:13:45 -05:00
Philipp Muens
2181ba9478 Remove unused CloudFormation template 2017-01-23 13:21:10 +01:00
Philipp Muens
a6c3240d62 Fix broken test after rebasing 2017-01-20 14:48:28 +01:00
Philipp Muens
116c79dbf8 Refactor function arn generation for info plugin 2017-01-20 14:45:11 +01:00