Last active
November 28, 2019 14:56
-
-
Save NicolasRitouet/7b8367b79734e01deb36ef707dae91a4 to your computer and use it in GitHub Desktop.
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
--- | |
AWSTemplateFormatVersion: '2010-09-09' | |
Description: 'Cloudformation stack to manage permission to deploy a serverless service' | |
Parameters: | |
ServiceName: | |
Description: Name of the Service you want to deploy | |
Type: String | |
ServiceName2: | |
Description: Name of the 2nd Service you want to deploy | |
Type: String | |
Resources: | |
## Users | |
ServerlessDeployBot: | |
Type: AWS::IAM::User | |
Properties: | |
ManagedPolicyArns: # Max 10 policies | |
- !Ref ServelessDeployCFPolicy | |
- !Ref ServelessDeployS3Policy | |
- !Ref ServelessDeployLogsPolicy | |
- !Ref ServelessDeployIAMPolicy | |
- !Ref ServelessDeployLambdaPolicy | |
ServerlessDeployBotAccessKey: | |
Type: AWS::IAM::AccessKey | |
Properties: | |
UserName: !Ref ServerlessDeployBot | |
## Managed policies | |
ServelessDeployCFPolicy: | |
Type: AWS::IAM::ManagedPolicy | |
Properties: | |
PolicyDocument: | |
Version: '2012-10-17' | |
Statement: | |
- Effect: Allow | |
Action: 'cloudformation:ValidateTemplate' | |
Resource: '*' | |
- Effect: Allow | |
Action: | |
- 'cloudformation:Describe*' | |
- 'cloudformation:List*' | |
- 'cloudformation:Get*' | |
- 'cloudformation:PreviewStackUpdate' | |
- 'cloudformation:CreateStack' | |
- 'cloudformation:UpdateStack' | |
Resource: | |
- !Sub 'arn:aws:cloudformation:${AWS::Region}:${AWS::AccountId}:stack/${ServiceName}-*' | |
- !Sub 'arn:aws:cloudformation:${AWS::Region}:${AWS::AccountId}:stack/${ServiceName2}-*' | |
ServelessDeployS3Policy: | |
Type: AWS::IAM::ManagedPolicy | |
Properties: | |
PolicyDocument: | |
Version: '2012-10-17' | |
Statement: | |
- Effect: Allow | |
Action: | |
- 's3:Get*' | |
- 's3:List*' | |
Resource: | |
- !Sub 'arn:aws:s3:::${ServiceName}-*' | |
- !Sub 'arn:aws:s3:::${ServiceName2}-*' | |
- Effect: Allow | |
Action: | |
- 's3:*' | |
Resource: | |
- !Sub 'arn:aws:s3:::${ServiceName}-*/*' | |
- !Sub 'arn:aws:s3:::${ServiceName2}-*/*' | |
ServelessDeployLogsPolicy: | |
Type: AWS::IAM::ManagedPolicy | |
Properties: | |
PolicyDocument: | |
Version: '2012-10-17' | |
Statement: | |
- Effect: Allow | |
Action: | |
- 'logs:DescribeLogGroups' | |
Resource: !Sub 'arn:aws:logs:${AWS::Region}:${AWS::AccountId}:log-group::log-stream:*' | |
- Effect: Allow | |
Action: | |
- 'logs:CreateLogGroup' | |
- 'logs:CreateLogStream' | |
- 'logs:DeleteLogGroup' | |
- 'logs:DeleteLogStream' | |
- 'logs:DescribeLogStreams' | |
- 'logs:FilterLogEvents' | |
Resource: !Sub 'arn:aws:logs:${AWS::Region}:${AWS::AccountId}:log-group:/aws/lambda/*:log-stream:*' | |
ServelessDeployIAMPolicy: | |
Type: AWS::IAM::ManagedPolicy | |
Properties: | |
PolicyDocument: | |
Version: '2012-10-17' | |
Statement: | |
- Effect: Allow | |
Action: | |
- 'iam:GetRole' | |
- 'iam:PassRole' | |
- 'iam:CreateRole' | |
- 'iam:DeleteRole' | |
- 'iam:DetachRolePolicy' | |
- 'iam:PutRolePolicy' | |
- 'iam:AttachRolePolicy' | |
- 'iam:DeleteRolePolicy' | |
Resource: | |
- !Sub 'arn:aws:iam::${AWS::AccountId}:role/${ServiceName}-*-lambdaRole' | |
- !Sub 'arn:aws:iam::${AWS::AccountId}:role/${ServiceName2}-*-lambdaRole' | |
ServelessDeployLambdaPolicy: | |
Type: AWS::IAM::ManagedPolicy | |
Properties: | |
PolicyDocument: | |
Version: '2012-10-17' | |
Statement: | |
- Effect: Allow | |
Action: | |
- 'apigateway:GET' | |
- 'apigateway:POST' | |
- 'apigateway:PUT' | |
- 'apigateway:DELETE' | |
Resource: !Sub 'arn:aws:apigateway:${AWS::Region}::/restapis' | |
- Effect: Allow | |
Action: | |
- 'apigateway:GET' | |
- 'apigateway:POST' | |
- 'apigateway:PUT' | |
- 'apigateway:DELETE' | |
Resource: !Sub 'arn:aws:apigateway:${AWS::Region}::/restapis/*' | |
- Effect: Allow | |
Action: | |
- 'lambda:*' | |
Resource: | |
- !Sub 'arn:aws:lambda:${AWS::Region}:${AWS::AccountId}:function:${ServiceName}-*' | |
- !Sub 'arn:aws:lambda:${AWS::Region}:${AWS::AccountId}:function:${ServiceName2}-*' | |
- Effect: Allow | |
Action: | |
- 'ec2:DescribeSecurityGroups' | |
- 'ec2:DescribeSubnets' | |
- 'ec2:DescribeVpcs' | |
Resource: '*' | |
- Effect: Allow | |
Action: | |
- 'events:Put*' | |
- 'events:Remove*' | |
- 'events:Delete*' | |
- 'events:Describe*' | |
Resource: | |
- !Sub 'arn:aws:events::${AWS::AccountId}:rule/${ServiceName}-*' | |
- !Sub 'arn:aws:events::${AWS::AccountId}:rule/${ServiceName2}-*' | |
Outputs: | |
ServerlessDeployBotAccessKey: | |
Value: !Ref ServerlessDeployBotAccessKey | |
Export: | |
Name: !Sub '${AWS::StackName}-ServerlessDeployBotAccessKey' |
Thanks for the template! I ended up changing a few things. One major thing @sjernigan said the S3 ServiceName was not being substituted so it needs !Sub
added so on lines 64, 65, 72, and 72:
- !Sub 'arn:aws:s3:::${ServiceName}-*'
- !Sub 'arn:aws:s3:::${ServiceName2}-*'
Here is my version, but I also had to have it support SNS and DynamoDb: https://gist.github.com/ncloward/de2f73b78e09eb3d6dd6282be28fb4ff
thanks @ncloward, I updated this gist with the fix for the servicename
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
How do you get the value of the access key after this runs? I have been deleting the generated key and creating a new one.