From ac3b5246c1452fa9fdf8573f7a763c55811ae518 Mon Sep 17 00:00:00 2001 From: Xavier Thomas <38254298+xavier-thomas@users.noreply.github.com> Date: Thu, 6 Aug 2020 09:49:24 +0100 Subject: [PATCH] Fixed Lambda Handler reference (#11) Mutation test failing due to `ESOCKETTIMEDOUT` on npm registry. --- CHANGELOG.MD | 5 +++++ README.md | 14 +++++++------- codepipeline-waiter.yaml | 9 +++++++-- package.json | 2 +- 4 files changed, 20 insertions(+), 10 deletions(-) diff --git a/CHANGELOG.MD b/CHANGELOG.MD index 81a3919..02d0b09 100644 --- a/CHANGELOG.MD +++ b/CHANGELOG.MD @@ -7,6 +7,11 @@ and this project adheres to [Semantic Versioning](https://semver.org/). # <<<----- ADD NEW VERSIONS HERE +## 2.0.3 - (August 06, 2020) +### Changed +- corrected Lambda handler reference +- Added CF Stack Export for LambdaRole + ## 2.0.2 - (August 05, 2020) ### Changed - Added Tags for pipeline waiter SAR app diff --git a/README.md b/README.md index b53cb1c..c09f385 100644 --- a/README.md +++ b/README.md @@ -62,7 +62,7 @@ Resources: Properties: Location: ApplicationId: arn:aws:serverlessrepo:us-east-1:673103718481:applications/CodePipeline-Waiter - SemanticVersion: 2.0.2 + SemanticVersion: 2.0.3 # Optional Parameter to control the export name of the nested stack Parameters: ExportPrefix: !Ref AWS::StackName @@ -177,9 +177,9 @@ If you are not using Cloudformation, provision a CodePipeline stage to invoke th #If they are in another account, they need the correct trust permissions. See above section in readme. UserParameters: | { - "targetname":"target-pipeline-name", #Required - "assumerolearn":"arn:aws:iam::123456789:role/example-role-for-target-pipeline-name", #Required - "trigger": true #Optional. Defaults to false + "targetname":"target-pipeline-name", //Required + "assumerolearn":"arn:aws:iam::123456789:role/example-role-for-target-pipeline-name", //Required + "trigger": true //Optional. Defaults to false } RunOrder: 1 @@ -191,9 +191,9 @@ The Lambda needs to receive the following as an **UserParameters** object on the The lambda expects the following UserParameters to be supplied during invocation: ```JSON { - "targetname": "target-pipeline-name", - "assumerolearn": "arn:aws:iam::${TargetAccountID}:role/example-role-for-target-pipeline-name", - "trigger": true / false + "targetname": "target-pipeline-name", //Required + "assumerolearn": "arn:aws:iam::${TargetAccountID}:role/example-role-for-target-pipeline-name", //#Required + "trigger": true / false //Optional. Defaults to false } ``` diff --git a/codepipeline-waiter.yaml b/codepipeline-waiter.yaml index 80879c5..edf83a9 100644 --- a/codepipeline-waiter.yaml +++ b/codepipeline-waiter.yaml @@ -24,7 +24,7 @@ Metadata: LicenseUrl: LICENSE Name: CodePipeline-Waiter ReadmeUrl: README.md - SemanticVersion: 2.0.2 + SemanticVersion: 2.0.3 SourceCodeUrl: https://github.com/xavier-thomas/aws-codepipeline-waiter SpdxLicenseId: BSD-3-Clause @@ -33,7 +33,7 @@ Resources: PipelineWaiterLambda: Type: AWS::Serverless::Function Properties: - Handler: src/index.handler + Handler: index.handler Runtime: nodejs12.x CodeUri: ./dist MemorySize: 128 @@ -69,3 +69,8 @@ Outputs: Value: !Ref PipelineWaiterLambda Export: Name: !Sub ${ExportPrefix}PipelineWaiterLambdaName + + PipelineWaiterLambdaRoleArn: + Value: !GetAtt PipelineWaiterLambdaRole.Arn + Export: + Name: !Sub ${ExportPrefix}PipelineWaiterLambdaRoleArn diff --git a/package.json b/package.json index e2b1f6b..61579b3 100644 --- a/package.json +++ b/package.json @@ -1,6 +1,6 @@ { "name": "aws-codepipeline-waiter", - "version": "2.0.2", + "version": "2.0.3", "description": "An AWS lambda for a deployment AWS code-pipeline to monitor and wait for another pipeline.", "main": "src/index.js", "keywords": [