Gathering detailed insights and metrics for dequalify
Gathering detailed insights and metrics for dequalify
npm install dequalify
Typescript
Module System
Node Version
NPM Version
JavaScript (100%)
Love this project? Help keep it running — sponsor us today! 🚀
Total Downloads
1,012
Last Day
2
Last Week
5
Last Month
14
Last Year
62
10 Commits
1 Forks
3 Watching
1 Branches
1 Contributors
Minified
Minified + Gzipped
Latest Version
1.0.1
Package Id
dequalify@1.0.1
Size
1.89 kB
NPM Version
4.2.0
Node Version
7.8.0
Cumulative downloads
Total Downloads
Last day
0%
2
Compared to previous day
Last week
150%
5
Compared to previous week
Last month
366.7%
14
Compared to previous month
Last year
-20.5%
62
Compared to previous year
Input a string with many colons
:
and knock off anything after the last one. I use it to de-qualify fully qualified ARNs of lambdas.
npm install -g dequalify
.or npm install -g
from within where you clone this if you roll that way.
This is expected to be installed to your $PATH, and used as a single use parser in larger scripts via |
.
Pass in a fully qualified ARN, Get an unqualified ARN back.
echo "arn:aws:lambda:region:account-id:function:function-name:version" | dequalify
for example would return
arn:aws:lambda:region:account-id:function:function-name
You can add -q
to instead return what qualifies:
echo "arn:aws:lambda:region:account-id:function:function-name:version" | dequalify -q
for example would return version
.
If you'd like to find a use for this script in your day to day CI/CD: Here's how we use it. Local environments use Apex, and each function within a project has it's own git repo. There are thoughts on project level repos #WIP. When a change is ready to go into the CI/CD pipeline, commit to the develop branch. Build server picks up the changes and runs something like:
# clean up after yourself
rm -rf lambda.zip
rm -f ARN
rm -f log
rm -f .gitignore
rm -rf .git
# Generate code to send to AWS
zip -r lambda.zip .
# send it to AWS and save a log
aws lambda update-function-code --function-name YourLambdaFunctionHere --publish --zip-file fileb://./lambda.zip > log
# parse that log to grab the full ARN to an artifact that can be used to deploy arbitrarily later
cat ./log
cat ./log | grep FunctionArn | cut -d '"' -f4 > ARN
cat ARN
That build generates an ARN that you can use to deploy to different environments using aliases. Hence this script that literally everybody* will have use for. Give the
aws lambda update-alias --function-name $(cat ARN | dequalify) --name YourEnvironmentHere --function-version $(cat ARN | dequalify -q)
script an alias that your environment points to. Boom. CD.
PS. Dear Amazon. Lambdas are awesome. Please let me choose the version number when publishing one. I'd like to have that control back. Sincerely, @excenter
No vulnerabilities found.
Reason
no binaries found in the repo
Reason
0 existing vulnerabilities detected
Reason
Found 0/10 approved changesets -- score normalized to 0
Reason
no SAST tool detected
Details
Reason
0 commit(s) and 0 issue activity found in the last 90 days -- score normalized to 0
Reason
no effort to earn an OpenSSF best practices badge detected
Reason
security policy file not detected
Details
Reason
project is not fuzzed
Details
Reason
license file not detected
Details
Reason
branch protection not enabled on development/release branches
Details
Score
Last Scanned on 2025-02-03
The Open Source Security Foundation is a cross-industry collaboration to improve the security of open source software (OSS). The Scorecard provides security health metrics for open source projects.
Learn More