-
Notifications
You must be signed in to change notification settings - Fork 2.4k
feat: add AssumeRolePolicyDocument to AWS::Serverless::Function #1311
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
feat: add AssumeRolePolicyDocument to AWS::Serverless::Function #1311
Conversation
d0502af to
6716486
Compare
Codecov Report
@@ Coverage Diff @@
## develop #1311 +/- ##
===========================================
- Coverage 94.44% 94.41% -0.03%
===========================================
Files 78 78
Lines 4353 4388 +35
Branches 860 871 +11
===========================================
+ Hits 4111 4143 +32
- Misses 115 116 +1
- Partials 127 129 +2
Continue to review full report at Codecov.
|
c230d8c to
ddd533e
Compare
ddd533e to
a3743f4
Compare
|
@praneetap @ShreyaGangishetty any updates on this PR? |
|
@timoschilling Thank you for your contribution! This PR looks good to me |
|
With this change, does the Lambda@Edge function still have access to write to CloudWatch logs, which previously was part of |
|
Is |
Issue #, if available:
To use a
AWS::Serverless::Functionas lambda@edge you need to add an explicit policy to allow CloudFront to execute the function.Description of changes:
With this change you can define a
AssumeRolePolicyDocumenton the SAM created role.Before:
After:
Description of how you validated changes:
Checklist:
make prpassesexamples/2016-10-31By submitting this pull request, I confirm that my contribution is made under the terms of the Apache 2.0 license.