This repository was archived by the owner on Oct 12, 2019. It is now read-only.
-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathserverless.yml
executable file
·70 lines (64 loc) · 1.75 KB
/
serverless.yml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
service: serverless-express-example
provider:
name: aws
runtime: nodejs8.10
stage: dev
package:
exclude:
- node_modules/**/aws-sdk/**
plugins:
- serverless-plugin-include-dependencies
custom:
ENV: ${file(config.js):env}
sessionsTableName: ${self:service}-${opt:stage, self:provider.stage}-sessionsTable
sessionsTablePolicyName: ${self:service}-${opt:stage, self:provider.stage}-sessionsTablePolicy
resources:
Resources:
SessionsTable:
Type: AWS::DynamoDB::Table
Properties:
TableName: ${self:custom.sessionsTableName}
AttributeDefinitions:
- AttributeName: id
AttributeType: S
KeySchema:
- AttributeName: id
KeyType: HASH
ProvisionedThroughput:
ReadCapacityUnits: 1
WriteCapacityUnits: 1
TimeToLiveSpecification:
AttributeName: expires
Enabled: true
SessionsTableIamPolicy:
Type: AWS::IAM::Policy
DependsOn: SessionsTable
Properties:
PolicyName: ${self:custom.sessionsTablePolicyName}
PolicyDocument:
Version: '2012-10-17'
Statement:
- Effect: Allow
Action:
- dynamodb:*
Resource: arn:aws:dynamodb:*:*:table/${self:custom.sessionsTableName}
Roles:
- Ref: IamRoleLambdaExecution
MainLogGroup:
Type: AWS::Logs::LogGroup
Properties:
RetentionInDays: "30"
functions:
main:
handler: src/server.handler
timeout: 30
environment:
SESSION_SECRET: ${self:custom.ENV.SESSION_SECRET}
SESSIONS_TABLE: ${self:custom.sessionsTableName}
events:
- http:
path: /
method: ANY
- http:
path: /{any+}
method: ANY