-
Notifications
You must be signed in to change notification settings - Fork 199
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
DescribeExecution as option #222
Conversation
Example configuration as below
"is_describe: true" makes us happy! |
lib/deploy/events/cloudWatchEvent/compileCloudWatchEventEvents.js
Outdated
Show resolved
Hide resolved
lib/deploy/events/apiGateway/apigateway-to-stepfunctions-assume-role.json
Outdated
Show resolved
Hide resolved
@shota thanks for putting this together, I have a couple of feedback:
|
Sounds fantastic, I'll try again later. |
BREAKING CHANGE: action key in config event.http is now used for creating dynamic IAM Role and API Gateway Request Template to passthru request
@theburningmonk Thank you for your review, my pull request has some bugs and I fixed them and clean commit messages as you mentioned. Document was fixed and code was tested with full coverage. |
|
||
if (_.has(http, 'action')) { | ||
// no template if some action was defined. | ||
return {}; |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Does this mean any user-specified request template won't be used? e.g. if someone wants to use a GET to describe the execution and pass in the execution ARN as a query string param, would they be able to write a custom request template to do that?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
No, if user specify http.request.template option, it will be applied. These codes are just avobe return defaultTemplate
. The default action for StartExecution should not be applied all other actions and should pass users action through.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
right, right, I see. Thanks, that looks good to me.
{ | ||
Effect: 'Allow', | ||
Action: iamRoleApiGatewayToStepFunctionsAction, | ||
Resource: '*', |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
A minor thing, we can change this later in another PR, but we should be able to restrict the resource to just the state machine in question.
🎉 This PR is included in version 2.0.0 🎉 The release is available on: Your semantic-release bot 📦🚀 |
@shota I didn't realise you had a breaking change commit message in one of the commit messages before I merged. For future reference, it shouldn't count as a breaking change since it doesn't change any of the existing behaviours. @horike37 so this PR has published a major version where it probably doesn't need to. I can delete the version on NPM and force semantic-release to publish it as |
@theburningmonk
It should cut a release as @shota |
@theburningmonk @horike37 |
@shota no worries, I should have paid more attention when reviewing :-P It's ok, it seems we can't unpublish v2.0.0 so we're just gonna leave it as it is. Thanks again for the contribution! |
DescribeExecution as option
As described in issue #72, DescribeExecution support is very important feature when implementing step functions with API Gateway. However, it seems like I can implement this with very short difference so I wrote this pull request.
Caution: This pull request makes "DescribeExecution" action allowed in the policy.