Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

fix(apigatewayv2-authorizers): incorrect identitySource default for WebSocketLambdaAuthorizer #18315

Merged
merged 2 commits into from
Jan 7, 2022

Conversation

kaizencc
Copy link
Contributor

@kaizencc kaizencc commented Jan 7, 2022

We introduced WebSocketLambdaAuthorizer in #16886 with an incorrect default identitySource, according to these docs. The result is that using the default identitySource results in a deploy-time failure.

This PR fixes the error and adds documentation for the syntax for all identitySource possibilities.

I can confirm that this default successfully passes cdk deploy on my local app.

Fixes #18307.

BREAKING CHANGE: WebSocketLambdaAuthorizerProps.identitySource default changes from ['$request.header.Authorization'] to ['route.request.header.Authorization'].


By submitting this pull request, I confirm that my contribution is made under the terms of the Apache-2.0 license

@gitpod-io
Copy link

gitpod-io bot commented Jan 7, 2022

@github-actions github-actions bot added the @aws-cdk/aws-apigatewayv2-authorizers Related to aws-apigatewayv2-authorizers package label Jan 7, 2022
@mergify mergify bot added the contribution/core This is a PR that came from AWS. label Jan 7, 2022
@kaizencc kaizencc changed the title fix(apigatewayv2-authorizers): incorrect identitySource default fix(apigatewayv2-authorizers): incorrect identitySource default for WebSocketLambdaAuthorizer Jan 7, 2022
@mergify
Copy link
Contributor

mergify bot commented Jan 7, 2022

Thank you for contributing! Your pull request will be updated from master and then merged automatically (do not update manually, and be sure to allow changes to be pushed to your fork).

@aws-cdk-automation
Copy link
Collaborator

AWS CodeBuild CI Report

  • CodeBuild project: AutoBuildProject89A8053A-LhjRyN9kxr8o
  • Commit ID: ffa3516
  • Result: SUCCEEDED
  • Build Logs (available for 30 days)

Powered by github-codebuild-logs, available on the AWS Serverless Application Repository

@mergify mergify bot merged commit 74eee1e into master Jan 7, 2022
@mergify mergify bot deleted the conroy/apigwv2auth branch January 7, 2022 22:55
@mergify
Copy link
Contributor

mergify bot commented Jan 7, 2022

Thank you for contributing! Your pull request will be updated from master and then merged automatically (do not update manually, and be sure to allow changes to be pushed to your fork).

TikiTDO pushed a commit to TikiTDO/aws-cdk that referenced this pull request Feb 21, 2022
… `WebSocketLambdaAuthorizer` (aws#18315)

We introduced `WebSocketLambdaAuthorizer` in aws#16886 with an incorrect default `identitySource`, according to these [docs](https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-apigatewayv2-authorizer.html#cfn-apigatewayv2-authorizer-identitysource). The result is that using the default `identitySource` results in a deploy-time failure.

This PR fixes the error and adds documentation for the syntax for all `identitySource` possibilities.

I can confirm that this default successfully passes `cdk deploy` on my local app.

Fixes aws#18307. 

BREAKING CHANGE: `WebSocketLambdaAuthorizerProps.identitySource` default changes from `['$request.header.Authorization']` to `['route.request.header.Authorization']`.

----

*By submitting this pull request, I confirm that my contribution is made under the terms of the Apache-2.0 license*
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
@aws-cdk/aws-apigatewayv2-authorizers Related to aws-apigatewayv2-authorizers package contribution/core This is a PR that came from AWS.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

(apigatewayv2-authorizers): WebSocketLambdaAuthorizer's default is invalid
3 participants