New Research: Supply Chain Attack on Axios Pulls Malicious Dependency from npm.Details
Socket
Book a DemoSign in
Socket

@cfn-modules/lambda-function

Package Overview
Dependencies
Maintainers
2
Versions
37
Alerts
File Explorer

Advanced tools

Socket logo

Install Socket

Detect and block malicious and high-risk dependencies

Install

@cfn-modules/lambda-function - npm Package Compare versions

Comparing version
1.1.0
to
1.2.0
+2
-2
.travis.yml

@@ -6,4 +6,4 @@ ---

install:
- 'pip install yamllint==1.8.1'
- 'pip install cfn-lint==0.7.4'
- 'pip install yamllint==1.13.0'
- 'pip install cfn-lint==0.11.1'
script:

@@ -10,0 +10,0 @@ - 'yamllint module.yml'

@@ -111,2 +111,6 @@ ---

Default: ''
ManagedPolicyArns:
Description: 'Comma-delimited list of IAM managed policy ARNs to attach to the task''s IAM role'
Type: String
Default: ''
Conditions:

@@ -121,2 +125,3 @@ HasAlertingModule: !Not [!Equals [!Ref AlertingModule, '']]

HasDependencyModule3: !Not [!Equals [!Ref DependencyModule3, '']]
HasManagedPolicyArns: !Not [!Equals [!Ref ManagedPolicyArns, '']]
Resources:

@@ -133,2 +138,3 @@ Role:

Action: 'sts:AssumeRole'
ManagedPolicyArns: !If [HasManagedPolicyArns, !Split [',', !Ref ManagedPolicyArns], !Ref 'AWS::NoValue']
Policies:

@@ -245,3 +251,3 @@ - PolicyName: 'cfn-modules'

ModuleVersion:
Value: '1.1.0'
Value: '1.2.0'
StackName:

@@ -248,0 +254,0 @@ Value: !Ref 'AWS::StackName'

{
"name": "@cfn-modules/lambda-function",
"version": "1.1.0",
"version": "1.2.0",
"description": "AWS Lambda function with automated IAM policy generation, encryption, log group and alerting",

@@ -5,0 +5,0 @@ "author": "Michael Wittig <michael@widdix.de>",

@@ -49,2 +49,3 @@ [![Build Status](https://travis-ci.org/cfn-modules/lambda-function.svg?branch=master)](https://travis-ci.org/cfn-modules/lambda-function)

EnvironmentVariable3: '' # optional
ManagedPolicyArns: '' # optional
TemplateURL: './node_modules/@cfn-modules/lambda-function/module.yml'

@@ -200,3 +201,10 @@ ```

</tr>
<tr>
<td>ManagedPolicyArns</td>
<td>Comma-delimited list of IAM managed policy ARNs to attach to the task's IAM role</td>
<td></td>
<td>no</td>
<td></td>
</tr>
</tbody>
</table>