Skip to content

Commit e6deec4

Browse files
committed
Solution tags added
1 parent 8e3d113 commit e6deec4

File tree

3 files changed

+42
-15
lines changed

3 files changed

+42
-15
lines changed

templates/cloudfront-site.yaml

Lines changed: 27 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -26,6 +26,9 @@ Resources:
2626
ServerSideEncryptionConfiguration:
2727
- ServerSideEncryptionByDefault:
2828
SSEAlgorithm: AES256
29+
Tags:
30+
- Key: Solution
31+
Value: ACFS3
2932

3033
S3BucketRoot:
3134
Type: AWS::S3::Bucket
@@ -68,6 +71,9 @@ Resources:
6871
CodeUri: ../s-headers.zip
6972
Runtime: 'nodejs12.x'
7073
Timeout: 25
74+
Tags:
75+
- Key: Solution
76+
Value: ACFS3
7177

7278
Lambdaversion:
7379
Type: AWS::Lambda::Version
@@ -78,21 +84,24 @@ Resources:
7884
LambdaEdgeFunctionRole:
7985
Type: AWS::IAM::Role
8086
Properties:
81-
Path: '/'
82-
ManagedPolicyArns:
83-
- 'arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole'
84-
AssumeRolePolicyDocument:
85-
Version: '2012-10-17'
86-
Statement:
87-
-
88-
Sid: 'AllowLambdaServiceToAssumeRole'
89-
Effect: 'Allow'
90-
Action:
91-
- 'sts:AssumeRole'
92-
Principal:
93-
Service:
94-
- 'lambda.amazonaws.com'
95-
- 'edgelambda.amazonaws.com'
87+
Path: '/'
88+
ManagedPolicyArns:
89+
- 'arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole'
90+
AssumeRolePolicyDocument:
91+
Version: '2012-10-17'
92+
Statement:
93+
-
94+
Sid: 'AllowLambdaServiceToAssumeRole'
95+
Effect: 'Allow'
96+
Action:
97+
- 'sts:AssumeRole'
98+
Principal:
99+
Service:
100+
- 'lambda.amazonaws.com'
101+
- 'edgelambda.amazonaws.com'
102+
Tags:
103+
- Key: Solution
104+
Value: ACFS3
96105

97106
CloudFrontDistribution:
98107
Type: AWS::CloudFront::Distribution
@@ -136,6 +145,9 @@ Resources:
136145
AcmCertificateArn: !Ref 'CertificateArn'
137146
MinimumProtocolVersion: 'TLSv1.1_2016'
138147
SslSupportMethod: 'sni-only'
148+
Tags:
149+
- Key: Solution
150+
Value: ACFS3
139151

140152
CloudFrontOriginAccessIdentity:
141153
Type: AWS::CloudFront::CloudFrontOriginAccessIdentity

templates/custom-resource.yaml

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -46,6 +46,9 @@ Resources:
4646
Principal:
4747
Service:
4848
- lambda.amazonaws.com
49+
Tags:
50+
- Key: Solution
51+
Value: ACFS3
4952

5053
CFNCustomProviderLogGroup:
5154
Type: AWS::Logs::LogGroup
@@ -65,6 +68,9 @@ Resources:
6568
Timeout: 300
6669
Role: !GetAtt LambdaRole.Arn
6770
Runtime: python3.6
71+
Tags:
72+
- Key: Solution
73+
Value: ACFS3
6874

6975
Outputs:
7076
CFNCustomProvider:

templates/main.yaml

Lines changed: 9 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -30,6 +30,9 @@ Resources:
3030
Type: AWS::CloudFormation::Stack
3131
Properties:
3232
TemplateURL: ./custom-resource.yaml
33+
Tags:
34+
- Key: Solution
35+
Value: ACFS3
3336

3437
AcmCertificateStack:
3538
Type: AWS::CloudFormation::Stack
@@ -38,6 +41,9 @@ Resources:
3841
Parameters:
3942
DomainName: !Ref DomainName
4043
CFNCustomProvider: !GetAtt CustomResourceStack.Outputs.CFNCustomProvider
44+
Tags:
45+
- Key: Solution
46+
Value: ACFS3
4147

4248
CloudFrontStack:
4349
Type: AWS::CloudFormation::Stack
@@ -48,6 +54,9 @@ Resources:
4854
DomainName: !Ref DomainName
4955
SubDomain: !Ref SubDomain
5056
Release: !FindInMap [Solution, Constants, Version]
57+
Tags:
58+
- Key: Solution
59+
Value: ACFS3
5160

5261
Outputs:
5362
CFNCustomProvider:

0 commit comments

Comments
 (0)