Forked from NicolasRitouet/serverless-cf-policies.yml
Created
September 13, 2017 16:20
-
-
Save kevinold/3c72c2fe31d08b40647c0dc00f097ccc to your computer and use it in GitHub Desktop.
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
--- | |
AWSTemplateFormatVersion: '2010-09-09' | |
Description: 'Cloudformation stack to manage permission to deploy a serverless service' | |
Parameters: | |
ServiceName: | |
Description: Name of the Service you want to deploy | |
Type: String | |
ServiceName2: | |
Description: Name of the 2nd Service you want to deploy | |
Type: String | |
Resources: | |
## Users | |
ServerlessDeployBot: | |
Type: AWS::IAM::User | |
Properties: | |
ManagedPolicyArns: # Max 10 policies | |
- !Ref ServelessDeployCFPolicy | |
- !Ref ServelessDeployS3Policy | |
- !Ref ServelessDeployLogsPolicy | |
- !Ref ServelessDeployIAMPolicy | |
- !Ref ServelessDeployLambdaPolicy | |
ServerlessDeployBotAccessKey: | |
Type: AWS::IAM::AccessKey | |
Properties: | |
UserName: !Ref ServerlessDeployBot | |
## Managed policies | |
ServelessDeployCFPolicy: | |
Type: AWS::IAM::ManagedPolicy | |
Properties: | |
PolicyDocument: | |
Version: '2012-10-17' | |
Statement: | |
- Effect: Allow | |
Action: 'cloudformation:ValidateTemplate' | |
Resource: '*' | |
- Effect: Allow | |
Action: | |
- 'cloudformation:Describe*' | |
- 'cloudformation:List*' | |
- 'cloudformation:Get*' | |
- 'cloudformation:PreviewStackUpdate' | |
- 'cloudformation:CreateStack' | |
- 'cloudformation:UpdateStack' | |
Resource: | |
- !Sub 'arn:aws:cloudformation:${AWS::Region}:${AWS::AccountId}:stack/${ServiceName}-*' | |
- !Sub 'arn:aws:cloudformation:${AWS::Region}:${AWS::AccountId}:stack/${ServiceName2}-*' | |
ServelessDeployS3Policy: | |
Type: AWS::IAM::ManagedPolicy | |
Properties: | |
PolicyDocument: | |
Version: '2012-10-17' | |
Statement: | |
- Effect: Allow | |
Action: | |
- 's3:Get*' | |
- 's3:List*' | |
Resource: | |
- 'arn:aws:s3:::${ServiceName}-*' | |
- 'arn:aws:s3:::${ServiceName2}-*' | |
- Effect: Allow | |
Action: | |
- 's3:*' | |
Resource: | |
- 'arn:aws:s3:::${ServiceName}-*/*' | |
- 'arn:aws:s3:::${ServiceName2}-*/*' | |
ServelessDeployLogsPolicy: | |
Type: AWS::IAM::ManagedPolicy | |
Properties: | |
PolicyDocument: | |
Version: '2012-10-17' | |
Statement: | |
- Effect: Allow | |
Action: | |
- 'logs:DescribeLogGroups' | |
Resource: !Sub 'arn:aws:logs:${AWS::Region}:${AWS::AccountId}:log-group::log-stream:*' | |
- Effect: Allow | |
Action: | |
- 'logs:CreateLogGroup' | |
- 'logs:CreateLogStream' | |
- 'logs:DeleteLogGroup' | |
- 'logs:DeleteLogStream' | |
- 'logs:DescribeLogStreams' | |
- 'logs:FilterLogEvents' | |
Resource: !Sub 'arn:aws:logs:${AWS::Region}:${AWS::AccountId}:log-group:/aws/lambda/*:log-stream:*' | |
ServelessDeployIAMPolicy: | |
Type: AWS::IAM::ManagedPolicy | |
Properties: | |
PolicyDocument: | |
Version: '2012-10-17' | |
Statement: | |
- Effect: Allow | |
Action: | |
- 'iam:GetRole' | |
- 'iam:PassRole' | |
- 'iam:CreateRole' | |
- 'iam:DeleteRole' | |
- 'iam:DetachRolePolicy' | |
- 'iam:PutRolePolicy' | |
- 'iam:AttachRolePolicy' | |
- 'iam:DeleteRolePolicy' | |
Resource: | |
- !Sub 'arn:aws:iam::${AWS::AccountId}:role/${ServiceName}-*-lambdaRole' | |
- !Sub 'arn:aws:iam::${AWS::AccountId}:role/${ServiceName2}-*-lambdaRole' | |
ServelessDeployLambdaPolicy: | |
Type: AWS::IAM::ManagedPolicy | |
Properties: | |
PolicyDocument: | |
Version: '2012-10-17' | |
Statement: | |
- Effect: Allow | |
Action: | |
- 'apigateway:GET' | |
- 'apigateway:POST' | |
- 'apigateway:PUT' | |
- 'apigateway:DELETE' | |
Resource: !Sub 'arn:aws:apigateway:${AWS::Region}::/restapis' | |
- Effect: Allow | |
Action: | |
- 'apigateway:GET' | |
- 'apigateway:POST' | |
- 'apigateway:PUT' | |
- 'apigateway:DELETE' | |
Resource: !Sub 'arn:aws:apigateway:${AWS::Region}::/restapis/*' | |
- Effect: Allow | |
Action: | |
- 'lambda:*' | |
Resource: | |
- !Sub 'arn:aws:lambda:${AWS::Region}:${AWS::AccountId}:function:${ServiceName}-*' | |
- !Sub 'arn:aws:lambda:${AWS::Region}:${AWS::AccountId}:function:${ServiceName2}-*' | |
- Effect: Allow | |
Action: | |
- 'ec2:DescribeSecurityGroups' | |
- 'ec2:DescribeSubnets' | |
- 'ec2:DescribeVpcs' | |
Resource: '*' | |
- Effect: Allow | |
Action: | |
- 'events:Put*' | |
- 'events:Remove*' | |
- 'events:Delete*' | |
- 'events:Describe*' | |
Resource: | |
- !Sub 'arn:aws:events::${AWS::AccountId}:rule/${ServiceName}-*' | |
- !Sub 'arn:aws:events::${AWS::AccountId}:rule/${ServiceName2}-*' | |
Outputs: | |
ServerlessDeployBotAccessKey: | |
Value: !Ref ServerlessDeployBotAccessKey | |
Export: | |
Name: !Sub '${AWS::StackName}-ServerlessDeployBotAccessKey' |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment