0.0.2 • Published 3 years ago
@shelf/serverless-simplify-default-exec-role-plugin v0.0.2
serverless-simplify-default-exec-role-plugin
Fixes "IamRoleLambdaExecution - Maximum policy size of 10240 bytes exceeded" error
This plugin works by modifying the Cloudformation stack before deployment.
It searches for the IamRoleLambdaExecution resource and modifies the only policy attached to this role.
Install
$ yarn add --dev @shelf/serverless-simplify-default-exec-role-pluginUsage
In your serverless.yml file:
plugins:
- '@shelf/serverless-simplify-default-exec-role-plugin'Explanation
By default, Serverless framework creates such role:
{
Effect: "Allow",
Action: ["logs:CreateLogStream", "logs:CreateLogGroup"],
Resource: [
{
"Fn::Sub": "arn:${AWS::Partition}:logs:${AWS::Region}:${AWS::AccountId}:log-group:/aws/lambda/production-users-createUser:*",
},
{
"Fn::Sub": "arn:${AWS::Partition}:logs:${AWS::Region}:${AWS::AccountId}:log-group:/aws/lambda/production-users-updateUser:*",
},
{
"Fn::Sub": "arn:${AWS::Partition}:logs:${AWS::Region}:${AWS::AccountId}:log-group:/aws/lambda/production-users-deleteUser:*",
},
// dozens of identical lines
],
}When you reach a certain project size, deployment will fail since this role will exceed 10 KB limit.
This plugin simplifies the default execution role to smth like this:
{
Effect: "Allow",
Action: ["logs:CreateLogStream", "logs:CreateLogGroup"],
Resource: [
{
"Fn::Sub": "arn:${AWS::Partition}:logs:${AWS::Region}:${AWS::AccountId}:log-group:*",
},
],
}Publish
$ git checkout master
$ yarn version
$ yarn publish
$ git push origin master --tagsLicense
MIT © Shelf