All Projects → serverless-components → aws-iam-role

serverless-components / aws-iam-role

Licence: Apache-2.0 license
⚡ The easiest way to deploy and manage AWS IAM Roles, powered by Serverless Components.

Programming Languages

javascript
184084 projects - #8 most used programming language

Projects that are alternatives of or similar to aws-iam-role

terraform-aws-organization-access-group
Terraform module to create an IAM Group and Policy to grant permissions to delegated IAM users in the Organization's master account to access a member account
Stars: ✭ 16 (+23.08%)
Mutual labels:  iam-role
secrets-init
minimalistic init system for containers with AWS/GCP secrets support
Stars: ✭ 114 (+776.92%)
Mutual labels:  iam-role
aws-cloudformation-templates
CloudFormation Templates
Stars: ✭ 15 (+15.38%)
Mutual labels:  iam-role
aws-sso-cli
A powerful tool for using AWS SSO for the CLI and web console.
Stars: ✭ 121 (+830.77%)
Mutual labels:  iam-role
bakery
(Not maintained anymore) Bakery - Centralised AWS identity and access management solution for multiple accounts
Stars: ✭ 50 (+284.62%)
Mutual labels:  iam-role
kube-secrets-init
Kubernetes mutating webhook for `secrets-init` injection
Stars: ✭ 106 (+715.38%)
Mutual labels:  iam-role
awscredswrap
awscredswrap uses temporary credentials for the specified iam role to set a shell environment variable or execute a command.
Stars: ✭ 15 (+15.38%)
Mutual labels:  iam-role
cognises-flask
Flask Cognises: AWS Cognito group based authorization with user management
Stars: ✭ 16 (+23.08%)
Mutual labels:  iam-role
holochrome
Use your IAM role (from instance metadata) to open the AWS console
Stars: ✭ 102 (+684.62%)
Mutual labels:  iam-role
terraform-aws-iam-assumed-roles
Terraform Module for Assumed Roles on AWS with IAM Groups Requiring MFA
Stars: ✭ 33 (+153.85%)
Mutual labels:  iam-role
aws-dynamodb
⚡ Easily provision AWS DynamoDB tables using Serverless Components.
Stars: ✭ 59 (+353.85%)
Mutual labels:  serverless-components
aws-cloudfront
Deploy an AWS CloudFront distribution for the provided origins using Serverless Components
Stars: ✭ 22 (+69.23%)
Mutual labels:  serverless-components
backend
Easily host entire web applications on a single AWS Lambda function using Serverless Components
Stars: ✭ 16 (+23.08%)
Mutual labels:  serverless-components
awesome-serverless-framework
Serverless Framework 开发资源汇总 🚀
Stars: ✭ 120 (+823.08%)
Mutual labels:  serverless-components

Serverless Components


Click Here for Version 1.0


AWS IAM Role Component ⎯⎯⎯ The easiest way to deploy and manage AWS IAM Roles, powered by Serverless Components.


  • Minimal Configuration - Abstracts IAM roles complexity.
  • Fast Deployments - IAM roles are deploys in seconds via our cloud engine.
  • Team Collaboration - Simply share IAM role arn and other outputs with your team's components.
  • Easy Management - Easily manage your IAM roles with the Serverless Dashboard

  1. Install
  2. Initialize
  3. Deploy
  4. Configure
  5. Develop
  6. Monitor
  7. Remove

 

1. Install

To get started with component, install the latest version of the Serverless Framework:

$ npm install -g serverless

After installation, make sure you connect your AWS account by setting a provider in the org setting page on the Serverless Dashboard.

2. Initialize

The easiest way to start using the aws-iam-role component is by initializing the aws-iam-role-starter template. Just run this command:

$ serverless init aws-iam-role-starter
$ cd aws-iam-role-starter

3. Deploy

Once you have the directory set up, you're now ready to deploy. Just run the following command from within the directory containing the serverless.yml file:

$ serverless deploy

Your first deployment might take a little while, but subsequent deployment would just take few seconds. For more information on what's going on during deployment, you could specify the --debug flag, which would view deployment logs in realtime:

$ serverless deploy --debug

4. Configure

The aws-iam-role component requires a minimal set of configuration with sane defaults that makes working with IAM roles easier. Here's a complete reference of the serverless.yml file for the aws-iam-role component:

component: aws-iam-role             # (required) name of the component. In that case, it's aws-iam-role.
name: my-role                       # (required) name of your component instance.
org: serverlessinc                  # (optional) serverless dashboard org. default is the first org you created during signup.
app: myApp                          # (optional) serverless dashboard app. default is the same as the name property.
stage: dev                          # (optional) serverless dashboard stage. default is dev.

inputs:
  name: my-role                     # (optional) role name. default is the component instance name above.
  service: lambda.amazonaws.com     # (optional) service that assumes this role. default is lambda.amazonaws.com.
  policy:                           # (optional) inline policy statement, or managed policy arn. default is the admin arn.
    - Effect: Allow
      Action:
        - sts:AssumeRole
      Resource: '*'
    - Effect: Allow
      Action:
        - logs:CreateLogGroup
        - logs:CreateLogStream
        - logs:PutLogEvents
      Resource: '*'

You can also provide a managed policy ARN string instead of an inline policy statement:

component: aws-iam-role
name: my-role

inputs:
  service: lambda.amazonaws.com
  policy: arn:aws:iam::aws:policy/AdministratorAccess

Once you've chosen your configuration, run serverless deploy again (or simply just serverless) to deploy your changes.

5. Develop

Instead of having to run serverless deploy everytime you make changes you wanna test, you could enable dev mode, which allows the CLI to watch for changes in your config (for example, your policy document) in real time, and deploy instantly on save.

To enable dev mode, just run the following command:

$ serverless dev

6. Monitor

Anytime you need to know more about your running aws-iam-role instance, you can run the following command to view the most critical info.

$ serverless info

This is especially helpful when you want to know the outputs of your instances so that you can reference them in another instance. It also shows you the status of your instance, when it was last deployed, and how many times it was deployed. You will also see a url where you'll be able to view more info about your instance on the Serverless Dashboard.

To digg even deeper, you can pass the --debug flag to view the state of your component instance in case the deployment failed for any reason.

$ serverless info --debug

7. Remove

If you wanna tear down your entire aws-iam-role infrastructure that was created during deployment, just run the following command in the directory containing the serverless.yml file.

$ serverless remove

The aws-iam-role component will then use all the data it needs from the built-in state storage system to delete only the relavent cloud resources that it created. Just like deployment, you could also specify a --debug flag for realtime logs from the website component running in the cloud.

$ serverless remove --debug
Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].