-
Notifications
You must be signed in to change notification settings - Fork 1
/
Copy pathserverless.yml
70 lines (64 loc) · 1.71 KB
/
serverless.yml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
service: event-bridge-demo
package:
exclude:
- node_modules/**
- package.json
provider:
name: aws
runtime: nodejs12.x
region: eu-west-2
eventBridge.useCloudFormation: true
iamRoleStatements:
- Effect: "Allow"
Action:
- "events:*"
Resource:
Fn::GetAtt:
- EventBridge
- Arn
- Effect: "Allow"
Action:
- "s3:*"
Resource:
- !Sub arn:aws:lambda:${AWS::Region}:${AWS::AccountId}:function:event-bridge-demo-dev-createInvoice
- arn:aws:s3:::event-bridge-demo-bucket/*
functions:
placeOrder:
handler: src/placeOrder.handler
createInvoice:
handler: src/createInvoice.handler
role: EventRole
events:
- eventBridge:
eventBus: arn:aws:events:${AWS::Region}:${AWS::AccountId}:event-bus/event-bridge
pattern:
source:
- event-bridge-demo.placeOrder
resources:
Resources:
S3Bucket:
Type: AWS::S3::Bucket
Properties:
BucketName: event-bridge-demo-bucket
EventBridge:
Type: AWS::Events::EventBus
Properties:
Name: event-bridge
EventRole:
Type: "AWS::IAM::Role"
Properties:
RoleName: "EventRole"
AssumeRolePolicyDocument:
Version: "2012-10-17"
Statement:
- Effect: "Allow"
Principal:
Service:
- "lambda.amazonaws.com"
- "s3.amazonaws.com"
- "events.amazonaws.com"
Action:
- "sts:AssumeRole"
ManagedPolicyArns:
- arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole
- arn:aws:iam::aws:policy/AmazonS3FullAccess