From a4cfc6ccfdc5e19d674b7a97b65dac6248dfc8cb Mon Sep 17 00:00:00 2001 From: Noah Paige <69586985+noah-paige@users.noreply.github.com> Date: Wed, 20 Nov 2024 11:29:32 -0500 Subject: [PATCH] Bump python runtime to bump cdk klayers cryptography version (#1707) ### Feature or Bugfix - Bugfix ### Detail - Bump python runtime and cdk klayers cryptography version for custom authorizer ### Relates - ### Security Please answer the questions below briefly where applicable, or write `N/A`. Based on [OWASP 10](https://owasp.org/Top10/en/). - Does this PR introduce or modify any input fields or queries - this includes fetching data from storage outside the application (e.g. a database, an S3 bucket)? - Is the input sanitized? - What precautions are you taking before deserializing the data you consume? - Is injection prevented by parametrizing queries? - Have you ensured no `eval` or similar functions are used? - Does this PR introduce any functionality or component that requires authorization? - How have you ensured it respects the existing AuthN/AuthZ mechanisms? - Are you logging failed auth attempts? - Are you using or adding any cryptographic features? - Do you use a standard proven implementations? - Are the used keys controlled by the customer? Where are they stored? - Are you introducing any new policies/roles/users? - Have you used the least-privilege principle? How? By submitting this pull request, I confirm that my contribution is made under the terms of the Apache 2.0 license. --- deploy/stacks/lambda_api.py | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/deploy/stacks/lambda_api.py b/deploy/stacks/lambda_api.py index 7f6c174ce..05109a870 100644 --- a/deploy/stacks/lambda_api.py +++ b/deploy/stacks/lambda_api.py @@ -260,7 +260,7 @@ def __init__( ) # Initialize Klayers - runtime = _lambda.Runtime.PYTHON_3_9 + runtime = _lambda.Runtime.PYTHON_3_12 klayers = Klayers(self, python_version=runtime, region=self.region) # get the latest layer version for the cryptography package