Geoff Baskwill 7abb23edc8
feat: Support managedExternally option for authorizers (#7327)
There are use cases where an API creator does not have permissions to
add permissions to the custom authorizer lambda; one example is when
the custom authorizer lambda exists in a separate AWS account. In these
cases, we need to be able to omit the `AWS::Lambda::Permission` resource
from the stack.

This change adds the `managedExternally` attribute to the `authorizer`.
When `managedExternally` is `true`, the stack will not create the
`AWS::Lambda::Permission` resource.

**Important note:** The permission does still need to be created before
the stack is deployed, or creating the authorizer will fail.
2020-02-13 12:20:16 +13:00
..
2019-06-26 12:43:01 +02:00
2019-06-26 12:43:01 +02:00
2019-06-26 12:43:01 +02:00
2019-06-26 12:43:01 +02:00
2019-06-26 12:43:01 +02:00
2019-06-26 12:43:01 +02:00