-
Notifications
You must be signed in to change notification settings - Fork 4k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
feat(apigatewayv2-integrations): full API for API Gateway V2 AWS_PROXY integrations #16287
Conversation
Title does not follow the guidelines of Conventional Commits. Please adjust title before merge. |
AWS CodeBuild CI Report
Powered by github-codebuild-logs, available on the AWS Serverless Application Repository |
Thanks so much for submitting this pull request. I am marking this pull request as We use +1s to help prioritize our work, and are happy to revaluate this pull request based on community feedback. |
+1 (Representing 10+ folks from the SST community :) |
+1 |
1 similar comment
+1 |
924c117
to
ebfd5f2
Compare
}); | ||
``` | ||
|
||
Integrations should always specify a role, with appropriate permissions to allow the actions. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Why can't the integration automatically add the correct permissions to the role?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Hi, thanks for the review. I thought about that, but since the queue name, for example, could come from the payload, it wouldn't be possible for the cdk to know what permissions may be required.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Got it. But we could maybe identify when the queue name is known at synth time and in this case give the right permissions.
@nija-at how about extracting from this PR only the changes to the |
|
…ations (#18154) Add support for integration subtype and credentials allowing to extend `HttpRouteIntegration` to create integrations for AWS services. See https://docs.aws.amazon.com/apigateway/latest/developerguide/http-api-develop-integrations-aws-services.html Extracted part of #16287 to make it more reviewer friendly. BREAKING CHANGE: `HttpIntegrationType.LAMBDA_PROXY` has been renamed to `HttpIntegrationType.AWS_PROXY` ---- *By submitting this pull request, I confirm that my contribution is made under the terms of the Apache-2.0 license*
…ations (aws#18154) Add support for integration subtype and credentials allowing to extend `HttpRouteIntegration` to create integrations for AWS services. See https://docs.aws.amazon.com/apigateway/latest/developerguide/http-api-develop-integrations-aws-services.html Extracted part of aws#16287 to make it more reviewer friendly. BREAKING CHANGE: `HttpIntegrationType.LAMBDA_PROXY` has been renamed to `HttpIntegrationType.AWS_PROXY` ---- *By submitting this pull request, I confirm that my contribution is made under the terms of the Apache-2.0 license*
This PR has been in the MERGE CONFLICTS state for 3 weeks, and looks abandoned. To keep this PR from being closed, please continue work on it. If not, it will automatically be closed in a week. |
This PR has been deemed to be abandoned, and will be automatically closed. Please create a new PR for these changes if you think this decision has been made in error. |
I propose this addition for AWS_PROXY integrations with API Gateway V2. The API seems usable from the integration tests, so I would appreciate a review.
This has been mentioned in a few issues, for example #11947 #10497
Your comments will be most welcome.
By submitting this pull request, I confirm that my contribution is made under the terms of the Apache-2.0 license