-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathserverless-support-resources.yml
37 lines (35 loc) · 1.1 KB
/
serverless-support-resources.yml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
Resources:
NoReplyEmailIdentity:
Type: AWS::SES::EmailIdentity
Properties:
EmailIdentity: ${self:custom.cognito.replyEmail}
SnsRole:
Type: "AWS::IAM::Role"
Properties:
RoleName: '${self:service}-${self:custom.region}-cognito-sns-role'
AssumeRolePolicyDocument:
Version: "2012-10-17"
Statement:
- Effect: "Allow"
Principal:
Service:
- cognito-idp.amazonaws.com
Action:
- "sts:AssumeRole"
Condition:
StringEquals:
"sts:ExternalId": ${self:custom.cognito.stsExternalId}
Policies:
- PolicyName: "CognitoSnsPolicy"
PolicyDocument:
Version: "2012-10-17"
Statement:
- Effect: "Allow"
Action:
- "sns:publish"
Resource: "*"
IamRoleLambdaExecution:
Type: AWS::IAM::Role
Properties:
RoleName: "${self:service}-${self:custom.region}-lambda-role"
Description: "Execution Role for Serverless (${self:service}) Lambda functions"