serverless
FormidableLabs/serverless/aws
Infrastructure support for Serverless framework apps, done the right way
AWS Serverless Module ===================== [![Terraform][tf_img]][tf_site] [![Travis Status][trav_img]][trav_site] [![Maintenance Status][maintenance-image]](#maintenance-status) Get your [serverless][] framework application to AWS, the right way. Contents - Overview - Concepts - Modules - IAM Notes - Integration - Reference project - Module integration - AWS IAM group integration - Maintenance Status Overview Getting a [serverless][] application all the way to production in AWS correctly and securely can be quite challenging. In particular, things like: - Locking down IAM permissions to the minimum needed for different conceptual "roles" (e.g., admin, developer, ci). - Providing a scheme for different environments/stages (e.g., development, staging, production). ... lack reasonable guida
| Name | Type | Description | Default |
|---|---|---|---|
| service_name | string | Name of service / application | required |
| lambda_role_name | string | Name of a custom Lambda role to override the default Serverless one. The custom | "" |
| iam_partition | string | The IAM partition restriction for permissions (defaults to 'any partition'). | "*" |
| iam_account_id | string | The AWS account ID to limit to in IAM. Defaults to: current inferred account id. | "" |
| iam_stage | string | The IAM stage restriction for permissions. Wildcarding stage is useful for dynam | "" |
| tf_service_name | string | The unique name of service for Terraform resources. Defaults to: `tf-SERVICE_NAM | "" |
| sls_service_name | string | The service name from Serverless configuration. Defaults to: `sls-SERVICE_NAME`. | "" |
| region | string | The deploy target region in AWS. Defaults to: current inferred region | "" |
| iam_region | string | The IAM region restriction for permissions (defaults to 'any region'). | "*" |
| stage | string | The stage/environment to deploy to. Suggest: `sandbox`, `development`, `staging` | "development" |
| role_developer_name | string | Developer role name | "developer" |
| role_ci_name | string | Continuous Integration (CI) role name | "ci" |
| opt_many_lambdas | string | Allow all groups (incl developer, ci) to create and delete Lambdas | false |
| role_admin_name | string | Administrator role name | "admin" |
| opt_disable_groups | string | Do not create groups, only their policies | false |
iam_policy_ci_arniam_group_developer_nameiam_group_ci_nameiam_policy_admin_arniam_policy_developer_arniam_policy_cd_lambdas_arnlambda_role_arnlambda_role_nameiam_group_admin_name