-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathserverless.yml
89 lines (81 loc) · 2.22 KB
/
serverless.yml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
# Welcome to Serverless!
#
# This file is the main config file for your service.
# It's very minimal at this point and uses default values.
# You can always add more config options for more control.
# We've included some commented out config examples here.
# Just uncomment any of them to get that config option.
#
# For full config options, check the docs:
# docs.serverless.com
#
# Happy Coding!
service: aws-nodejs # NOTE: update this with your service name
provider:
name: aws
runtime: nodejs4.3
# you can overwrite defaults here
stage: stage
region: <aws region>
# you can add statements to the Lambda function's IAM Role here
# iamRoleStatements:
# - Effect: "Allow"
# Action:
# - "s3:ListBucket"
# Resource: { "Fn::Join" : ["", ["arn:aws:s3:::", { "Ref" : "ServerlessDeploymentBucket" } ] ] }
# - Effect: "Allow"
# Action:
# - "s3:PutObject"
# Resource:
# Fn::Join:
# - ""
# - - "arn:aws:s3:::"
# - "Ref" : "ServerlessDeploymentBucket"
# you can add packaging information here
#package:
# include:
# - include-me.js
# exclude:
# - exclude-me.js
# artifact: my-service-code.zip
plugins:
- serverless-webpack
functions:
graphql:
handler: handler.graphql
events:
- http:
path: graphql
method: post
cors: true
Content-Type: application/json
# you can add CloudFormation resource templates here
resources:
Resources:
# DynamoDB
UsersDynamo:
Type: AWS::DynamoDB::Table
Properties:
TableName: users-${self:provider.stage}
AttributeDefinitions:
- AttributeName: phoneNumber
AttributeType: S
KeySchema:
- AttributeName: phoneNumber
KeyType: HASH
ProvisionedThroughput:
ReadCapacityUnits: 1
WriteCapacityUnits: 1
DynamoDBIamPolicy:
Type: AWS::IAM::Policy
Properties:
PolicyName: lambda-dynamodb
PolicyDocument:
Version: '2012-10-17'
Statement:
- Effect: Allow
Action:
- "*"
Resource: arn:aws:dynamodb:*:*:table/users-${self:provider.stage}
Roles:
- Ref: IamRoleLambdaExecution