-
Notifications
You must be signed in to change notification settings - Fork 0
/
template.yaml
138 lines (130 loc) · 3.83 KB
/
template.yaml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
AWSTemplateFormatVersion: 2010-09-09
Transform: AWS::Serverless-2016-10-31
Globals:
Function:
Runtime: java8
MemorySize: 512
Timeout: 10
Tracing: PassThrough
Environment:
Variables:
BUCKET: !Ref Bucket
ROLE_ARN: !GetAtt UserRole.Arn
Api:
TracingEnabled: true
Resources:
SFTPServer:
Type: AWS::Transfer::Server
Properties:
IdentityProviderType: API_GATEWAY
IdentityProviderDetails:
InvocationRole: !GetAtt IdentityProviderInvocationRole.Arn
Url: !Sub "https://${ServerlessRestApi}.execute-api.${AWS::Region}.amazonaws.com/Prod"
LoggingRole: !GetAtt LoggingRole.Arn
Bucket:
Type: AWS::S3::Bucket
Properties:
BucketEncryption:
ServerSideEncryptionConfiguration:
- ServerSideEncryptionByDefault:
SSEAlgorithm: AES256
LoggingRole:
Type: AWS::IAM::Role
Properties:
AssumeRolePolicyDocument:
Version: '2012-10-17'
Statement:
- Effect: Allow
Principal:
Service: transfer.amazonaws.com
Action:
- sts:AssumeRole
Policies:
- PolicyName: AllowLogging
PolicyDocument:
Version: '2012-10-17'
Statement:
- Effect: Allow
Action:
- logs:CreateLogStream
- logs:DescribeLogStreams
- logs:CreateLogGroup
- logs:PutLogEvents
Resource: "*"
IdentityProviderInvocationRole:
Type: AWS::IAM::Role
Properties:
AssumeRolePolicyDocument:
Version: '2012-10-17'
Statement:
- Effect: Allow
Principal:
Service: transfer.amazonaws.com
Action:
- sts:AssumeRole
Policies:
- PolicyName: InvokeApiGateway
PolicyDocument:
Version: '2012-10-17'
Statement:
- Effect: Allow
Action:
- execute-api:Invoke
Resource: !Sub "arn:aws:execute-api:${AWS::Region}:${AWS::AccountId}:${ServerlessRestApi}/Prod/GET/*"
- PolicyName: GetApiGateway
PolicyDocument:
Version: '2012-10-17'
Statement:
- Effect: Allow
Action:
- apigateway:GET
Resource: "*"
IdentityProviderLambda:
Type: AWS::Serverless::Function
Properties:
Handler: io.symphonia.lambda.IdentityProvider::handler
CodeUri: target/lambda.zip
Events:
ApiEvent:
Type: Api
Properties:
Path: /servers/{serverId}/users/{userId}/config
Method: GET
Policies:
- S3CrudPolicy:
BucketName: !Ref Bucket
UserRole:
Type: AWS::IAM::Role
Properties:
AssumeRolePolicyDocument:
Version: '2012-10-17'
Statement:
- Effect: Allow
Principal:
Service: transfer.amazonaws.com
Action:
- sts:AssumeRole
Policies:
- PolicyName: ListUserFolder
PolicyDocument:
Version: '2012-10-17'
Statement:
- Effect: Allow
Action:
- s3:ListBucket
- s3:GetBucketLocation
Resource: !Sub "arn:aws:s3:::${Bucket}"
- PolicyName: HomeDirObjectAccess
PolicyDocument:
Version: '2012-10-17'
Statement:
- Effect: Allow
Action:
- s3:PutObject
- s3:GetObject
- s3:GetObjectACL
- s3:GetObjectVersion
- s3:DeleteObject
- s3:DeleteObjectACL
- s3:DeleteObjectVersion
Resource: !Sub "arn:aws:s3:::${Bucket}/*"