Sha256: bbb28a04d743b91d97bff72980b8c7f3b1c41f17895e7ba504050a417f13765d
Contents?: true
Size: 1.42 KB
Versions: 9
Compression:
Stored size: 1.42 KB
Contents
--- Resources: S3Bucket: Type: AWS::S3::Bucket IamRole: Type: AWS::IAM::Role Properties: AssumeRolePolicyDocument: Version: '2012-10-17' Statement: - Effect: Allow Principal: Service: - lambda.amazonaws.com Action: - sts:AssumeRole Policies: - PolicyName: <%= @policy_name %> PolicyDocument: Version: '2012-10-17' Statement: - Effect: Allow Action: - logs:* Resource: '*' # TODO: Make IAM permissions more fine grain for mimimal stack # - Fn::Sub: arn:aws:logs:${AWS::Region}:${AWS::AccountId}:log-group:/aws/lambda/quiz-dev-hello:*:* # - Fn::Sub: arn:aws:logs:${AWS::Region}:${AWS::AccountId}:log-group:/aws/lambda/quiz-dev-quiz:*:* # TODO: Allow hook so user can configure IAM themselves and support managed polices - Effect: Allow Action: - dynamodb:* Resource: "*" # required for PreheatJob which calls the other lambda functions repeatedly - Effect: Allow Action: - lambda:* Resource: "*" Path: "/" RoleName: <%= @role_name %> Outputs: S3Bucket: Value: "!Ref S3Bucket" # not a valid cfn notation, surrounding double quotes is handled by post processing. IamRole: Value: "!Ref IamRole"
Version data entries
9 entries across 9 versions & 1 rubygems