Skip to content

Commit f10c2d4

Browse files
committed
ensuring that roles pick up region and account id
1 parent 0eaaeb0 commit f10c2d4

9 files changed

+24
-21
lines changed

iam/Cognito_LambdAuthAuth_Role.json

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -17,13 +17,13 @@
1717
"lambda:InvokeFunction"
1818
],
1919
"Resource": [
20-
"arn:aws:lambda:eu-west-1:<AWS_ACCOUNT_ID>:function:LambdAuthCreateUser",
21-
"arn:aws:lambda:eu-west-1:<AWS_ACCOUNT_ID>:function:LambdAuthVerifyUser",
22-
"arn:aws:lambda:eu-west-1:<AWS_ACCOUNT_ID>:function:LambdAuthChangePassword",
23-
"arn:aws:lambda:eu-west-1:<AWS_ACCOUNT_ID>:function:LambdAuthLostUser",
24-
"arn:aws:lambda:eu-west-1:<AWS_ACCOUNT_ID>:function:LambdAuthLostPassword",
25-
"arn:aws:lambda:eu-west-1:<AWS_ACCOUNT_ID>:function:LambdAuthResetPassword",
26-
"arn:aws:lambda:eu-west-1:<AWS_ACCOUNT_ID>:function:LambdAuthLogin"
20+
"arn:aws:lambda:<REGION>:<AWS_ACCOUNT_ID>:function:LambdAuthCreateUser",
21+
"arn:aws:lambda:<REGION>:<AWS_ACCOUNT_ID>:function:LambdAuthVerifyUser",
22+
"arn:aws:lambda:<REGION>:<AWS_ACCOUNT_ID>:function:LambdAuthChangePassword",
23+
"arn:aws:lambda:<REGION>:<AWS_ACCOUNT_ID>:function:LambdAuthLostUser",
24+
"arn:aws:lambda:<REGION>:<AWS_ACCOUNT_ID>:function:LambdAuthLostPassword",
25+
"arn:aws:lambda:<REGION>:<AWS_ACCOUNT_ID>:function:LambdAuthResetPassword",
26+
"arn:aws:lambda:<REGION>:<AWS_ACCOUNT_ID>:function:LambdAuthLogin"
2727
]
2828
}
2929
]

iam/Cognito_LambdAuthUnauth_Role.json

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -17,12 +17,12 @@
1717
"lambda:InvokeFunction"
1818
],
1919
"Resource": [
20-
"arn:aws:lambda:eu-west-1:<AWS_ACCOUNT_ID>:function:LambdAuthCreateUser",
21-
"arn:aws:lambda:eu-west-1:<AWS_ACCOUNT_ID>:function:LambdAuthVerifyUser",
22-
"arn:aws:lambda:eu-west-1:<AWS_ACCOUNT_ID>:function:LambdAuthLostUser",
23-
"arn:aws:lambda:eu-west-1:<AWS_ACCOUNT_ID>:function:LambdAuthLostPassword",
24-
"arn:aws:lambda:eu-west-1:<AWS_ACCOUNT_ID>:function:LambdAuthResetPassword",
25-
"arn:aws:lambda:eu-west-1:<AWS_ACCOUNT_ID>:function:LambdAuthLogin"
20+
"arn:aws:lambda:<REGION>:<AWS_ACCOUNT_ID>:function:LambdAuthCreateUser",
21+
"arn:aws:lambda:<REGION>:<AWS_ACCOUNT_ID>:function:LambdAuthVerifyUser",
22+
"arn:aws:lambda:<REGION>:<AWS_ACCOUNT_ID>:function:LambdAuthLostUser",
23+
"arn:aws:lambda:<REGION>:<AWS_ACCOUNT_ID>:function:LambdAuthLostPassword",
24+
"arn:aws:lambda:<REGION>:<AWS_ACCOUNT_ID>:function:LambdAuthResetPassword",
25+
"arn:aws:lambda:<REGION>:<AWS_ACCOUNT_ID>:function:LambdAuthLogin"
2626
]
2727
}
2828
]

iam/LambdAuthChangePassword.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@
77
"dynamodb:UpdateItem"
88
],
99
"Effect": "Allow",
10-
"Resource": "arn:aws:dynamodb:eu-west-1:<AWS_ACCOUNT_ID>:table/<DYNAMODB_TABLE>"
10+
"Resource": "arn:aws:dynamodb:<REGION>:<AWS_ACCOUNT_ID>:table/<DYNAMODB_TABLE>"
1111
},
1212
{
1313
"Sid": "",

iam/LambdAuthCreateUser.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@
66
"dynamodb:PutItem"
77
],
88
"Effect": "Allow",
9-
"Resource": "arn:aws:dynamodb:eu-west-1:<AWS_ACCOUNT_ID>:table/<DYNAMODB_TABLE>"
9+
"Resource": "arn:aws:dynamodb:<REGION>:<AWS_ACCOUNT_ID>:table/<DYNAMODB_TABLE>"
1010
},
1111
{
1212
"Effect": "Allow",

iam/LambdAuthLogin.json

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,14 +6,14 @@
66
"dynamodb:GetItem"
77
],
88
"Effect": "Allow",
9-
"Resource": "arn:aws:dynamodb:eu-west-1:<AWS_ACCOUNT_ID>:table/<DYNAMODB_TABLE>"
9+
"Resource": "arn:aws:dynamodb:<REGION>:<AWS_ACCOUNT_ID>:table/<DYNAMODB_TABLE>"
1010
},
1111
{
1212
"Effect": "Allow",
1313
"Action": [
1414
"cognito-identity:GetOpenIdTokenForDeveloperIdentity"
1515
],
16-
"Resource": "arn:aws:cognito-identity:eu-west-1:<AWS_ACCOUNT_ID>:identitypool/<IDENTITY_POOL_ID>"
16+
"Resource": "arn:aws:cognito-identity:<REGION>:<AWS_ACCOUNT_ID>:identitypool/<IDENTITY_POOL_ID>"
1717
},
1818
{
1919
"Sid": "",

iam/LambdAuthLostPassword.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@
77
"dynamodb:UpdateItem"
88
],
99
"Effect": "Allow",
10-
"Resource": "arn:aws:dynamodb:eu-west-1:<AWS_ACCOUNT_ID>:table/<DYNAMODB_TABLE>"
10+
"Resource": "arn:aws:dynamodb:<REGION>:<AWS_ACCOUNT_ID>:table/<DYNAMODB_TABLE>"
1111
},
1212
{
1313
"Effect": "Allow",

iam/LambdAuthResetPassword.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@
77
"dynamodb:UpdateItem"
88
],
99
"Effect": "Allow",
10-
"Resource": "arn:aws:dynamodb:eu-west-1:<AWS_ACCOUNT_ID>:table/<DYNAMODB_TABLE>"
10+
"Resource": "arn:aws:dynamodb:<REGION>:<AWS_ACCOUNT_ID>:table/<DYNAMODB_TABLE>"
1111
},
1212
{
1313
"Sid": "",

iam/LambdAuthVerifyUser.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@
77
"dynamodb:UpdateItem"
88
],
99
"Effect": "Allow",
10-
"Resource": "arn:aws:dynamodb:eu-west-1:<AWS_ACCOUNT_ID>:table/<DYNAMODB_TABLE>"
10+
"Resource": "arn:aws:dynamodb:<REGION>:<AWS_ACCOUNT_ID>:table/<DYNAMODB_TABLE>"
1111
},
1212
{
1313
"Sid": "",

init.sh

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -68,6 +68,7 @@ for f in $(ls -1 trust*); do
6868
sed -e "s/<AWS_ACCOUNT_ID>/$AWS_ACCOUNT_ID/g" \
6969
-e "s/<DYNAMODB_TABLE>/$DDB_TABLE/g" \
7070
-e "s/<DYNAMODB_EMAIL_INDEX>/$DDB_EMAIL_INDEX/g" \
71+
-e "s/<REGION>/$REGION/g" \
7172
-e "s/<IDENTITY_POOL_ID>/$IDENTITY_POOL_ID/g" \
7273
$f > edit/$f
7374
echo "Editing trust from $f end"
@@ -78,6 +79,7 @@ for f in $(ls -1 Cognito*); do
7879
sed -e "s/<AWS_ACCOUNT_ID>/$AWS_ACCOUNT_ID/g" \
7980
-e "s/<DYNAMODB_TABLE>/$DDB_TABLE/g" \
8081
-e "s/<DYNAMODB_EMAIL_INDEX>/$DDB_EMAIL_INDEX/g" \
82+
-e "s/<REGION>/$REGION/g" \
8183
-e "s/<IDENTITY_POOL_ID>/$IDENTITY_POOL_ID/g" \
8284
$f > edit/$f
8385
if [[ $f == *Unauth_* ]]; then
@@ -93,7 +95,7 @@ for f in $(ls -1 Cognito*); do
9395
echo "Creating role $role end"
9496
done
9597
echo "Setting identity pool roles begin..."
96-
roles='{"unauthenticated":"arn:aws:iam::$AWS_ACCOUNT_ID:role/'"$unauthRole"'","authenticated":"arn:aws:iam::$AWS_ACCOUNT_ID:role/'"$authRole"'"}'
98+
roles='{"unauthenticated":"arn:aws:iam::'"$AWS_ACCOUNT_ID"':role/'"$unauthRole"'","authenticated":"arn:aws:iam::'"$AWS_ACCOUNT_ID"':role/'"$authRole"'"}'
9799
echo "Roles: $roles"
98100
aws cognito-identity set-identity-pool-roles \
99101
--identity-pool-id $IDENTITY_POOL_ID \
@@ -109,6 +111,7 @@ for f in $(ls -1 LambdAuth*); do
109111
-e "s/<DYNAMODB_TABLE>/$DDB_TABLE/g" \
110112
-e "s/<DYNAMODB_EMAIL_INDEX>/$DDB_EMAIL_INDEX/g" \
111113
-e "s/<IDENTITY_POOL_ID>/$IDENTITY_POOL_ID/g" \
114+
-e "s/<REGION>/$REGION/g" \
112115
$f > edit/$f
113116
trust="trust_policy_lambda.json"
114117
aws iam create-role --role-name $role --assume-role-policy-document file://edit/$trust

0 commit comments

Comments
 (0)