Account:
- Root user login is tied to us-east-1 (during a us-east-1 outage, root user logins were broken) link
CloudFront:
import forge from "node-forge"; | |
import crypto, { randomUUID } from "crypto"; | |
import { existsSync, mkdirSync, writeFileSync } from "fs"; | |
const pki = forge.pki; | |
function generateKeyPair() { | |
const forgeKeypair = pki.rsa.generateKeyPair(4096); | |
return { | |
publicKey: pki.publicKeyToPem(forgeKeypair.publicKey), |
Account:
CloudFront:
AWSTemplateFormatVersion: '2010-09-09' | |
Parameters: | |
CreateBucket: | |
Type: String | |
Conditions: | |
ShouldCreateBucket: !Equals [ !Ref CreateBucket, 'yes' ] | |
Resources: | |
Bucket: | |
Condition: ShouldCreateBucket | |
Type: AWS::S3::Bucket |
export $(aws sts assume-role --role-arn arn:aws:iam::$TARGET_ACCOUNT_ID:role/ci-access --role-session-name ci --output text --query "[['AWS_ACCESS_KEY_ID',Credentials.AccessKeyId],['AWS_SECRET_ACCESS_KEY',Credentials.SecretAccessKey],['AWS_SESSION_TOKEN',Credentials.SessionToken]][*].join(\`=\`,@)") |
I hereby claim:
To claim this, I am signing this object:
AWSTemplateFormatVersion: '2010-09-09' | |
Description: Static site hosted with Amplify Console | |
Parameters: | |
Domain: | |
Type: String | |
Description: Domain name to host application | |
Default: '' | |
ApplicationName: |