generated from zaro0508/lambda-template
-
Notifications
You must be signed in to change notification settings - Fork 3
/
template.yaml
48 lines (44 loc) · 1.8 KB
/
template.yaml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
AWSTemplateFormatVersion: '2010-09-09'
Transform: AWS::Serverless-2016-10-31
Description: >
Cloudformation custom resource to manage service catalog products
# More info about Globals: https://github.com/awslabs/serverless-application-model/blob/master/docs/globals.rst
Globals:
Function:
Timeout: 60
Resources:
UpdateProvisioningArtifactFunction:
Type: AWS::Serverless::Function # More info about Function Resource: https://github.com/awslabs/serverless-application-model/blob/master/versions/2016-10-31.md#awsserverlessfunction
Properties:
CodeUri: .
Handler: product_provider/app.lambda_handler
Runtime: python3.9
Role: !GetAtt UpdateProvisioningArtifactFunctionRole.Arn
UpdateProvisioningArtifactFunctionRole: # execute lambda function with this role
Type: AWS::IAM::Role
Properties:
AssumeRolePolicyDocument:
Version: 2012-10-17
Statement:
- Effect: Allow
Principal:
Service:
- lambda.amazonaws.com
Action:
- sts:AssumeRole
ManagedPolicyArns:
- arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole
- arn:aws:iam::aws:policy/AWSServiceCatalogAdminFullAccess
Outputs:
UpdateProvisioningArtifactFunctionArn:
Description: "Deprecate product versions function ARN"
Value: !GetAtt UpdateProvisioningArtifactFunction.Arn
Export:
Name:
Fn::Sub: ${AWS::Region}-${AWS::StackName}-UpdateProvisioningArtifactFunctionArn
UpdateProvisioningArtifactFunctionRoleArn:
Description: "Implicit IAM Role created for deprecate product version function"
Value: !GetAtt UpdateProvisioningArtifactFunctionRole.Arn
Export:
Name:
Fn::Sub: ${AWS::Region}-${AWS::StackName}-UpdateProvisioningArtifactFunctionRoleArn