Skip to content

Commit f3d496f

Browse files
committed
chore(CFN): check in CFN
1 parent 4265768 commit f3d496f

File tree

1 file changed

+77
-0
lines changed

1 file changed

+77
-0
lines changed

cfn/JavaScriptESDK.yml

+77
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,77 @@
1+
Outputs:
2+
StackArn:
3+
Description: >-
4+
Do not remove this output! Pipelines needs this to do its association. (And
5+
LPT. Removing it will break things)
6+
Value: !Ref 'AWS::StackId'
7+
Parameters:
8+
DeploymentBucketImportName:
9+
Default: 'BONESBootstrap-PDX-beta-DeploymentBucket'
10+
Description: >-
11+
This parameter is meant to be passed by LPT (and piplines). It holds the
12+
name of import that points to the bucket that holds your artifacts. You
13+
should use this as the import (Fn::ImportValue: {Ref: DeploymentBucket})
14+
for getting any BATS related artifacts.
15+
Type: String
16+
Stage:
17+
Default: 'beta'
18+
Type: String
19+
PipelinesControlledRegionBucket:
20+
Type: String
21+
Description: The regionalized bucket to read the artifact from.
22+
Default: 'placeholder'
23+
24+
Resources:
25+
CodeBuildRole:
26+
Properties:
27+
AssumeRolePolicyDocument: >-
28+
{"Version":"2012-10-17","Statement":[{"Effect":"Allow","Principal":{"Service":"codebuild.amazonaws.com"},"Action":"sts:AssumeRole"},{"Effect":"Allow","Principal":{"Federated":"arn:aws:iam::587316601012:oidc-provider/token.actions.githubusercontent.com"},"Action":"sts:AssumeRoleWithWebIdentity","Condition":{"StringEquals":{"token.actions.githubusercontent.com:aud":"sts.amazonaws.com"},"StringLike":{"token.actions.githubusercontent.com:sub":"repo:aws/aws-encryption-sdk-javascript:*"}}}]}
29+
Policies:
30+
- PolicyDocument:
31+
Statement:
32+
- Action:
33+
- 'logs:CreateLogGroup'
34+
- 'logs:CreateLogStream'
35+
- 'logs:PutLogEvents'
36+
Effect: Allow
37+
Resource:
38+
- '*'
39+
- Action:
40+
- 'kms:Encrypt'
41+
- 'kms:Decrypt'
42+
- 'kms:GenerateDataKey'
43+
Effect: Allow
44+
Resource:
45+
- '*'
46+
- Action:
47+
- 's3:PutObject'
48+
Effect: Allow
49+
Resource:
50+
- '*'
51+
PolicyName: !Sub '${AWS::StackName}CloudWatchLogsPolicy'
52+
Type: 'AWS::IAM::Role'
53+
ExampleWaitHandle:
54+
Properties: {}
55+
Type: 'AWS::CloudFormation::WaitConditionHandle'
56+
JavaScriptESDK:
57+
Properties:
58+
Artifacts:
59+
Type: NO_ARTIFACTS
60+
Environment:
61+
ComputeType: BUILD_GENERAL1_SMALL
62+
Image: 'aws/codebuild/standard:2.0'
63+
Type: LINUX_CONTAINER
64+
LogsConfig:
65+
S3Logs:
66+
Location: !Sub '${LogBucket}/JavaScriptESDK'
67+
Status: ENABLED
68+
Name: JavaScriptESDK
69+
ServiceRole: !Ref CodeBuildRole
70+
Source:
71+
Location: 'https://github.com/awslabs/aws-encryption-sdk-javascript'
72+
ReportBuildStatus: 'true'
73+
Type: GITHUB
74+
Type: 'AWS::CodeBuild::Project'
75+
LogBucket:
76+
Type: 'AWS::S3::Bucket'
77+

0 commit comments

Comments
 (0)