Skip to content

Instantly share code, notes, and snippets.

Avatar
🍋

Charlie Briggs Limess

🍋
View GitHub Profile
@Limess
Limess / role.yaml
Last active Dec 2, 2018
IAM example for Lambda
View role.yaml
---
AWSTemplateFormatVersion: '2010-09-09'
Description: 'IAM role for a my-lambda at runtime'
Resources:
LambdaRole:
Type: AWS::IAM::Role
Properties:
RoleName: ApplicationRoleFor_my-lambda
ManagedPolicyArns:
- arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole
@Limess
Limess / some-policy.yaml
Created Dec 2, 2018
Example serverless deploy user IAM policy section
View some-policy.yaml
- Effect: Allow
Action:
- apigateway:GET
- apigateway:POST
- apigateway:GetResources
Resource: 'arn:aws:apigateway:*::/restapis'
- Effect: Allow
Action:
@Limess
Limess / Circle CI 1.0 circle.yaml
Last active May 8, 2018
Circle CI 2.0 neo4j hang
View Circle CI 1.0 circle.yaml
machine:
node:
version: 8.11.1
java:
version: oraclejdk8
environment:
NEO4J_VERSION: "3.2.9"
deployment:
production:
branch: master
@Limess
Limess / serverless-encryption.md
Last active Apr 7, 2018
Serverless encryption thoughts
View serverless-encryption.md

Vault

Encrypt secret configuration at rest in Vault. Access keys either:

1. At runtime using the API (either via REST or a client library, e.g. node-vault

Pros
  • Encrypted variables never exposed to AWS/in console.
  • Could be written in to a library and re-used based on approles.
@Limess
Limess / improvements.md
Last active Sep 27, 2017
Improvements to Dewey
View improvements.md
You can’t perform that action at this time.