Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Document IAM role permissions #6

Closed
alexcasalboni opened this issue Apr 26, 2017 · 1 comment
Closed

Document IAM role permissions #6

alexcasalboni opened this issue Apr 26, 2017 · 1 comment

Comments

@alexcasalboni
Copy link
Owner

As mentioned in #5, the Resource attribute of the default IAM role could be restricted so that the state machine can only interact with the configured Lambda Function(s).

Resource is set to * by default because the original goal was to provide any lambdaARN at runtime.

We should document how to update such configuration manually, or eventually implement an additional parameter at generation-time.

The new parameter could look like this:

$ npm run generate -- -A ACCOUNT_ID -L arn:aws:lambda:*:*:function:MyFunctionName
@alexcasalboni
Copy link
Owner Author

Won't fix for now. I think #5 will solve most concerns.

The specific Lambda ARN(s) can always be forced by editing the yaml file, although it wouls also restrict the state machine to operate on only one (or more) pre-defined functions.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

1 participant