@awsless/awsless 0.0.213 → 0.0.214

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (2) hide show
  1. package/dist/bin.js +6 -2
  2. package/package.json +8 -8
package/dist/bin.js CHANGED
@@ -2183,8 +2183,8 @@ var createLambdaFunction = (group, ctx, ns, id, local2) => {
2183
2183
  lambda.setVpc({
2184
2184
  securityGroupIds: [ctx.shared.get(`vpc-security-group-id`)],
2185
2185
  subnetIds: [
2186
- ctx.shared.get(`vpc-public-subnet-1`),
2187
- ctx.shared.get(`vpc-public-subnet-2`)
2186
+ ctx.shared.get(`vpc-public-subnet-id-1`),
2187
+ ctx.shared.get(`vpc-public-subnet-id-2`)
2188
2188
  ]
2189
2189
  });
2190
2190
  policy.addStatement({
@@ -2212,6 +2212,7 @@ var cronFeature = defineFeature({
2212
2212
  for (const [id, props] of Object.entries(ctx.stackConfig.crons ?? {})) {
2213
2213
  const group = new Node3(ctx.stack, "cron", id);
2214
2214
  const { lambda } = createLambdaFunction(group, ctx, this.name, id, props.consumer);
2215
+ lambda.addEnvironment("LOG_VIEWABLE_ERROR", "1");
2215
2216
  const rule = new aws3.events.Rule(group, "rule", {
2216
2217
  name: formatLocalResourceName(ctx.app.name, ctx.stack.name, this.name, id),
2217
2218
  schedule: props.schedule,
@@ -3105,6 +3106,7 @@ var queueFeature = defineFeature({
3105
3106
  ...props
3106
3107
  });
3107
3108
  const { lambda, policy } = createLambdaFunction(group, ctx, `queue`, id, props.consumer);
3109
+ lambda.addEnvironment("LOG_VIEWABLE_ERROR", "1");
3108
3110
  new aws9.lambda.EventSourceMapping(group, "event", {
3109
3111
  functionArn: lambda.arn,
3110
3112
  sourceArn: queue2.arn,
@@ -3204,6 +3206,7 @@ var tableFeature = defineFeature({
3204
3206
  });
3205
3207
  if (props.stream) {
3206
3208
  const { lambda, policy } = createLambdaFunction(group, ctx, "table", id, props.stream.consumer);
3209
+ lambda.addEnvironment("LOG_VIEWABLE_ERROR", "1");
3207
3210
  const onFailure = getGlobalOnFailure(ctx);
3208
3211
  const source = new aws11.lambda.EventSourceMapping(group, id, {
3209
3212
  functionArn: lambda.arn,
@@ -3307,6 +3310,7 @@ var topicFeature = defineFeature({
3307
3310
  });
3308
3311
  } else if (typeof props === "object") {
3309
3312
  const { lambda } = createLambdaFunction(group, ctx, `topic`, id, props);
3313
+ lambda.addEnvironment("LOG_VIEWABLE_ERROR", "1");
3310
3314
  new aws12.sns.Subscription(group, id, {
3311
3315
  topicArn,
3312
3316
  protocol: "lambda",
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@awsless/awsless",
3
- "version": "0.0.213",
3
+ "version": "0.0.214",
4
4
  "license": "MIT",
5
5
  "type": "module",
6
6
  "sideEffects": false,
@@ -28,15 +28,15 @@
28
28
  }
29
29
  },
30
30
  "peerDependencies": {
31
+ "@awsless/lambda": "^0.0.18",
31
32
  "@awsless/s3": "^0.0.10",
32
33
  "@awsless/redis": "^0.0.12",
33
- "@awsless/open-search": "^0.0.12",
34
- "@awsless/lambda": "^0.0.18",
35
34
  "@awsless/sqs": "^0.0.7",
36
- "@awsless/validate": "^0.0.13",
37
35
  "@awsless/sns": "^0.0.7",
36
+ "@awsless/open-search": "^0.0.12",
37
+ "@awsless/ssm": "^0.0.7",
38
38
  "@awsless/weak-cache": "^0.0.1",
39
- "@awsless/ssm": "^0.0.7"
39
+ "@awsless/validate": "^0.0.13"
40
40
  },
41
41
  "dependencies": {
42
42
  "@aws-appsync/utils": "^1.5.0",
@@ -97,12 +97,12 @@
97
97
  "wrap-ansi": "^8.1.0",
98
98
  "zod": "^3.21.4",
99
99
  "zod-to-json-schema": "^3.22.3",
100
+ "@awsless/code": "^0.0.10",
100
101
  "@awsless/duration": "^0.0.1",
101
- "@awsless/graphql": "^0.0.9",
102
102
  "@awsless/size": "^0.0.1",
103
- "@awsless/validate": "^0.0.13",
104
103
  "@awsless/formation": "^0.0.21",
105
- "@awsless/code": "^0.0.10"
104
+ "@awsless/validate": "^0.0.13",
105
+ "@awsless/graphql": "^0.0.9"
106
106
  },
107
107
  "scripts": {
108
108
  "test": "pnpm code test",