Skip to content

fix(apigatewayv2-authorizers): incorrect identitySource default for WebSocketLambdaAuthorizer#18315

Merged
mergify[bot] merged 2 commits intomasterfrom
conroy/apigwv2auth
Jan 7, 2022
Merged

fix(apigatewayv2-authorizers): incorrect identitySource default for WebSocketLambdaAuthorizer#18315
mergify[bot] merged 2 commits intomasterfrom
conroy/apigwv2auth

Conversation

@kaizencc
Copy link
Copy Markdown
Contributor

@kaizencc kaizencc commented Jan 7, 2022

We introduced WebSocketLambdaAuthorizer in #16886 with an incorrect default identitySource, according to these docs. The result is that using the default identitySource results in a deploy-time failure.

This PR fixes the error and adds documentation for the syntax for all identitySource possibilities.

I can confirm that this default successfully passes cdk deploy on my local app.

Fixes #18307.

BREAKING CHANGE: WebSocketLambdaAuthorizerProps.identitySource default changes from ['$request.header.Authorization'] to ['route.request.header.Authorization'].


By submitting this pull request, I confirm that my contribution is made under the terms of the Apache-2.0 license

@gitpod-io
Copy link
Copy Markdown

gitpod-io bot commented Jan 7, 2022

@github-actions github-actions bot added the @aws-cdk/aws-apigatewayv2-authorizers Related to aws-apigatewayv2-authorizers package label Jan 7, 2022
@mergify mergify bot added the contribution/core This is a PR that came from AWS. label Jan 7, 2022
@kaizencc kaizencc changed the title fix(apigatewayv2-authorizers): incorrect identitySource default fix(apigatewayv2-authorizers): incorrect identitySource default for WebSocketLambdaAuthorizer Jan 7, 2022
@mergify
Copy link
Copy Markdown
Contributor

mergify bot commented Jan 7, 2022

Thank you for contributing! Your pull request will be updated from master and then merged automatically (do not update manually, and be sure to allow changes to be pushed to your fork).

@aws-cdk-automation
Copy link
Copy Markdown
Collaborator

AWS CodeBuild CI Report

  • CodeBuild project: AutoBuildProject89A8053A-LhjRyN9kxr8o
  • Commit ID: ffa3516
  • Result: SUCCEEDED
  • Build Logs (available for 30 days)

Powered by github-codebuild-logs, available on the AWS Serverless Application Repository

@mergify mergify bot merged commit 74eee1e into master Jan 7, 2022
@mergify mergify bot deleted the conroy/apigwv2auth branch January 7, 2022 22:55
@mergify
Copy link
Copy Markdown
Contributor

mergify bot commented Jan 7, 2022

Thank you for contributing! Your pull request will be updated from master and then merged automatically (do not update manually, and be sure to allow changes to be pushed to your fork).

TikiTDO pushed a commit to TikiTDO/aws-cdk that referenced this pull request Feb 21, 2022
… `WebSocketLambdaAuthorizer` (aws#18315)

We introduced `WebSocketLambdaAuthorizer` in aws#16886 with an incorrect default `identitySource`, according to these [docs](https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-apigatewayv2-authorizer.html#cfn-apigatewayv2-authorizer-identitysource). The result is that using the default `identitySource` results in a deploy-time failure.

This PR fixes the error and adds documentation for the syntax for all `identitySource` possibilities.

I can confirm that this default successfully passes `cdk deploy` on my local app.

Fixes aws#18307. 

BREAKING CHANGE: `WebSocketLambdaAuthorizerProps.identitySource` default changes from `['$request.header.Authorization']` to `['route.request.header.Authorization']`.

----

*By submitting this pull request, I confirm that my contribution is made under the terms of the Apache-2.0 license*
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

@aws-cdk/aws-apigatewayv2-authorizers Related to aws-apigatewayv2-authorizers package contribution/core This is a PR that came from AWS.

Projects

None yet

Development

Successfully merging this pull request may close these issues.

(apigatewayv2-authorizers): WebSocketLambdaAuthorizer's default is invalid

3 participants