serverless-localstack
Advanced tools
Comparing version 0.4.3 to 0.4.4
{ | ||
"name": "serverless-localstack", | ||
"version": "0.4.3", | ||
"version": "0.4.4", | ||
"description": "Connect Serverless to LocalStack!", | ||
@@ -34,4 +34,3 @@ "main": "src/index.js", | ||
"dependencies": { | ||
"aws-sdk": "^2.402.0", | ||
"bluebird": "^3.4.6" | ||
"aws-sdk": "^2.402.0" | ||
}, | ||
@@ -45,11 +44,7 @@ "devDependencies": { | ||
"nodemon": "^1.18.10", | ||
"request": "^2.88.0", | ||
"request-promise": "^4.1.1", | ||
"rimraf": "^2.6.2", | ||
"serverless": "^1.37.1", | ||
"sinon": "^6.2.0", | ||
"source-map-support": "^0.5.9", | ||
"tempy": "^0.2.1", | ||
"uuid": "^3.1.0" | ||
"tempy": "^0.2.1" | ||
} | ||
} |
@@ -82,2 +82,10 @@ # LocalStack Serverless Plugin | ||
### Environment Configurations | ||
* `LAMBDA_MOUNT_CWD`: Allow users to define a custom working directory for Lambda mounts. | ||
For example, when deploying a Serverless app in a Linux VM (that runs Docker) on a | ||
Windows host where the `-v <local_dir>:<cont_dir>` flag to `docker run` requires us | ||
to specify a `local_dir` relative to the Windows host file system that is mounted | ||
into the VM (e.g., `"c:/users/guest/..."`). | ||
### Configuring endpoints via JSON | ||
@@ -150,3 +158,4 @@ | ||
* v0.4.4: Add `LAMBDA_MOUNT_CWD` configuration for customizing Lambda mount dir | ||
* v0.4.3: Support local mounting of Lambda code to improve performance | ||
* v0.4.0: add support for local STS | ||
* v0.4.0: Add support for local STS |
@@ -8,3 +8,2 @@ 'use strict'; | ||
const AWS = require('aws-sdk'); | ||
const BbPromise = require('bluebird'); | ||
const Serverless = require('serverless') | ||
@@ -11,0 +10,0 @@ const AwsProvider = require('serverless/lib/plugins/aws/provider/awsProvider') |
'use strict'; | ||
const Promise = require('bluebird'); | ||
const AWS = require('aws-sdk'); | ||
@@ -59,2 +58,10 @@ const fs = require('fs'); | ||
res.Properties.Code.S3Key = process.cwd(); | ||
if (process.env.LAMBDA_MOUNT_CWD) { | ||
// Allow users to define a custom working directory for Lambda mounts. | ||
// For example, when deploying a Serverless app in a Linux VM (that runs Docker) on a | ||
// Windows host where the "-v <local_dir>:<cont_dir>" flag to "docker run" requires us | ||
// to specify a "local_dir" relative to the Windows host file system that is mounted | ||
// into the VM (e.g., "c:/users/guest/..."). | ||
res.Properties.Code.S3Key = process.env.LAMBDA_MOUNT_CWD; | ||
} | ||
} | ||
@@ -61,0 +68,0 @@ }) |
License Policy Violation
LicenseThis package is not allowed per your license policy. Review the package's license to ensure compliance.
Found 1 instance in 1 package
Environment variable access
Supply chain riskPackage accesses environment variables, which may be a sign of credential stuffing or data theft.
Found 1 instance in 1 package
License Policy Violation
LicenseThis package is not allowed per your license policy. Review the package's license to ensure compliance.
Found 1 instance in 1 package
Major refactor
Supply chain riskPackage has recently undergone a major refactor. It may be unstable or indicate significant internal changes. Use caution when updating to versions that include significant changes.
Found 1 instance in 1 package
New author
Supply chain riskA new npm collaborator published a version of the package for the first time. New collaborators are usually benign additions to a project, but do indicate a change to the security surface area of a package.
Found 1 instance in 1 package
35300
1
10
845
160
1
7
- Removedbluebird@^3.4.6
- Removedbluebird@3.7.2(transitive)