Account:
- Root user login is tied to us-east-1 (during a us-east-1 outage, root user logins were broken) link
CloudFront:
| import forge from "node-forge"; | |
| import crypto, { randomUUID } from "crypto"; | |
| import { existsSync, mkdirSync, writeFileSync } from "fs"; | |
| const pki = forge.pki; | |
| function generateKeyPair() { | |
| const forgeKeypair = pki.rsa.generateKeyPair(4096); | |
| return { | |
| publicKey: pki.publicKeyToPem(forgeKeypair.publicKey), |
Account:
CloudFront:
| AWSTemplateFormatVersion: '2010-09-09' | |
| Parameters: | |
| CreateBucket: | |
| Type: String | |
| Conditions: | |
| ShouldCreateBucket: !Equals [ !Ref CreateBucket, 'yes' ] | |
| Resources: | |
| Bucket: | |
| Condition: ShouldCreateBucket | |
| Type: AWS::S3::Bucket |
| export $(aws sts assume-role --role-arn arn:aws:iam::$TARGET_ACCOUNT_ID:role/ci-access --role-session-name ci --output text --query "[['AWS_ACCESS_KEY_ID',Credentials.AccessKeyId],['AWS_SECRET_ACCESS_KEY',Credentials.SecretAccessKey],['AWS_SESSION_TOKEN',Credentials.SessionToken]][*].join(\`=\`,@)") |
I hereby claim:
To claim this, I am signing this object:
| AWSTemplateFormatVersion: '2010-09-09' | |
| Description: Static site hosted with Amplify Console | |
| Parameters: | |
| Domain: | |
| Type: String | |
| Description: Domain name to host application | |
| Default: '' | |
| ApplicationName: |