-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathconfiguration.yaml
75 lines (71 loc) · 2.02 KB
/
configuration.yaml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
AWSTemplateFormatVersion: '2010-09-09'
Description: 'LicenseValidation create stack'
Resources:
LicenceTableForValidation:
Type: AWS::DynamoDB::Table
Properties:
AttributeDefinitions:
-
AttributeName: 'MachineKey'
AttributeType: 'S'
-
AttributeName: 'ApplicationId'
AttributeType: 'S'
BillingMode: 'PAY_PER_REQUEST'
KeySchema:
-
AttributeName: 'MachineKey'
KeyType: 'HASH'
GlobalSecondaryIndexes:
-
IndexName: 'ApplicationId-index'
KeySchema:
-
AttributeName: 'ApplicationId'
KeyType: 'HASH'
Projection:
ProjectionType: 'ALL'
TableName: 'LicenceTableForValidation'
S3Bucket:
Type: AWS::S3::Bucket
Properties:
BucketName: licensevalidationbucket
LicenseVerifyRole:
Type: AWS::IAM::Role
Properties:
RoleName: LicenseVerifyRole
AssumeRolePolicyDocument:
Version: '2012-10-17'
Statement:
-
Effect: 'Allow'
Principal:
Service:
- 'lambda.amazonaws.com'
Action:
- 'sts:AssumeRole'
ManagedPolicyArns:
- 'arn:aws:iam::aws:policy/AmazonDynamoDBFullAccess'
- 'arn:aws:iam::aws:policy/AmazonS3ReadOnlyAccess'
LicenseVerifyPolicy:
Type: AWS::IAM::Policy
Properties:
PolicyName: LicenseVerifyPolicy
PolicyDocument:
Statement:
- Effect: Allow
Action: ['logs:CreateLogGroup', 'logs:CreateLogStream', 'logs:PutLogEvents']
Resource: arn:aws:logs:*:*:*
Roles:
- Ref: 'LicenseVerifyRole'
XRayPolicy:
Type: AWS::IAM::Policy
Properties:
PolicyName: XRayPolicy
PolicyDocument:
Statement:
- Effect: Allow
Action: ['xray:PutTraceSegments', 'xray:PutTelemetryRecords']
Resource: '*'
Roles:
- Ref: 'LicenseVerifyRole'