Skip to content

Instantly share code, notes, and snippets.

@merictaze
Created July 2, 2018 20:20
Show Gist options
  • Star 0 You must be signed in to star a gist
  • Fork 0 You must be signed in to fork a gist
  • Save merictaze/2c9bdd95e66a9226a34e61ca4f1f6a0c to your computer and use it in GitHub Desktop.
Save merictaze/2c9bdd95e66a9226a34e61ca4f1f6a0c to your computer and use it in GitHub Desktop.
LambdaRole:
Type: 'AWS::IAM::Role'
Properties:
AssumeRolePolicyDocument:
Version: '2012-10-17'
Statement:
- Effect: 'Allow'
Principal:
Service: 'lambda.amazonaws.com'
Action: 'sts:AssumeRole'
Path: '/'
Policies:
- PolicyName: 'LambdaRolePolicy'
PolicyDocument:
Version: '2012-10-17'
Statement:
- Effect: 'Allow'
Action:
- logs:CreateLogGroup
- logs:CreateLogStream
- logs:PutLogEvents
Resource: 'arn:aws:logs:*:*:*'
- Effect: 'Allow'
Action:
- dynamodb:DescribeStream
- dynamodb:GetRecords
- dynamodb:GetShardIterator
- dynamodb:ListStreams
Resource: !GetAtt OrderTable.StreamArn
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment