-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathserverless.yml
157 lines (146 loc) · 4.5 KB
/
serverless.yml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
service: frontpages-scraper
provider:
name: aws
region: us-east-1
runtime: nodejs12.x
functions:
scraper:
name: front-pages-scraper
handler: dist/scraper.handler
environment:
BUCKET_NAME: ${env:BUCKET_NAME}
FRONT_PAGES_API_KEY: ${env:FRONT_PAGES_API_KEY}
FRONT_PAGES_BASE_URL: ${env:FRONT_PAGES_BASE_URL}
memorySize: 1536
timeout: 120
role: frontPagesScraperRole
layers:
# This layer provides the `chrome-aws-lambda` library so that we can run
# Puppeteer in Lambda.
- arn:aws:lambda:us-east-1:764866452798:layer:chrome-aws-lambda:8
package:
exclude:
- ./**
include:
- ./dist/scraper.js
# The `chrome-aws-lambda` layer only supports Node 10, not Node 12.
runtime: nodejs10.x
trigger:
name: front-pages-scraper-trigger
handler: dist/trigger.handler
environment:
SCRAPER_FUNCTION_NAME: front-pages-scraper
memorySize: 128
timeout: 30
role: frontPagesScraperTriggerRole
events:
- schedule: rate(1 hour)
package:
exclude:
- ./**
include:
- ./dist/trigger.js
plugins:
- serverless-dotenv-plugin
package:
exclude:
- ./**
include:
- ./dist/**
resources:
Resources:
frontPagesScraperRole:
Type: AWS::IAM::Role
Properties:
RoleName: frontPagesScraperRole
AssumeRolePolicyDocument:
Version: '2012-10-17'
Statement:
- Effect: Allow
Principal:
Service:
- lambda.amazonaws.com
Action: sts:AssumeRole
Policies:
- PolicyName: frontPagesScraperRolePolicy
PolicyDocument:
Version: '2012-10-17'
Statement:
- Effect: Allow
Action:
- logs:CreateLogGroup
- logs:CreateLogStream
- logs:PutLogEvents
Resource:
- 'Fn::Join':
- ':'
- - 'arn:aws:logs'
- Ref: 'AWS::Region'
- Ref: 'AWS::AccountId'
- 'log-group:/aws/lambda/*:*:*'
- Effect: 'Allow'
Action:
- 's3:PutObject'
Resource:
Fn::Join:
- ''
- - 'arn:aws:s3:::'
- 'Ref': 'ServerlessDeploymentBucket'
- Effect: 'Allow'
Action:
- 's3:PutObject'
- 's3:PutObjectAcl'
Resource: 'arn:aws:s3:::${env:BUCKET_NAME}/*'
frontPagesScraperTriggerRole:
Type: AWS::IAM::Role
Properties:
RoleName: frontPagesScraperTriggerRole
AssumeRolePolicyDocument:
Version: '2012-10-17'
Statement:
- Effect: Allow
Principal:
Service:
- lambda.amazonaws.com
Action: sts:AssumeRole
Policies:
- PolicyName: frontPagesScraperTriggerRolePolicy
PolicyDocument:
Version: '2012-10-17'
Statement:
- Effect: 'Allow'
Action:
- 'lambda:InvokeFunction'
Resource:
{
'Fn::Join':
[
':',
[
'arn:aws:lambda',
{ 'Ref': 'AWS::Region' },
{ 'Ref': 'AWS::AccountId' },
'function:front-pages-scraper',
],
],
}
- Effect: Allow
Action:
- logs:CreateLogGroup
- logs:CreateLogStream
- logs:PutLogEvents
Resource:
- 'Fn::Join':
- ':'
- - 'arn:aws:logs'
- Ref: 'AWS::Region'
- Ref: 'AWS::AccountId'
- 'log-group:/aws/lambda/*:*:*'
- Effect: 'Allow'
Action:
- 's3:PutObject'
Resource:
Fn::Join:
- ''
- - 'arn:aws:s3:::'
- 'Ref': 'ServerlessDeploymentBucket'