-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathtechweek.yaml
79 lines (74 loc) · 2.35 KB
/
techweek.yaml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
AWSTemplateFormatVersion: '2010-09-09'
Parameters:
Env:
Type: String
AllowedValues: ['dev', 'test', 'prod']
Default: 'dev'
Reg:
Type: String
AllowedValues: ['eu-central-1', 'us-east-1', 'us-west-1']
Default: 'us-east-1'
Resources:
"cloudfront":
Type: AWS::CloudFront::Distribution
Properties:
DistributionConfig:
Origins:
- DomainName: !Sub
- 's3-bucket-tech-week-2-awsome-${Environment}.s3.us-east-1.amazonaws.com'
- Environment: !Ref Env
Id: !Sub
- 's3-bucket-tech-week-2-awsome-${Environment}'
- Environment: !Ref Env
S3OriginConfig:
OriginAccessIdentity: !Sub 'origin-access-identity/cloudfront/${CloudFrontOriginIdentity}'
Enabled: 'true'
Comment: Some comment
DefaultRootObject: !Sub
- '${Environment}.html'
- Environment: !Ref Env
DefaultCacheBehavior:
AllowedMethods:
- GET
- HEAD
TargetOriginId: !Sub
- 's3-bucket-tech-week-2-awsome-${Environment}'
- Environment: !Ref Env
ForwardedValues:
QueryString: 'false'
Cookies:
Forward: none
ViewerProtocolPolicy: redirect-to-https
ViewerCertificate:
CloudFrontDefaultCertificate: 'true'
"CloudFrontOriginIdentity":
Type: AWS::CloudFront::CloudFrontOriginAccessIdentity
Properties:
CloudFrontOriginAccessIdentityConfig:
Comment: 'origin identity'
"bucket":
Type: AWS::S3::Bucket
Properties:
BucketName: !Sub
- 's3-bucket-tech-week-2-awsome-${Environment}'
- Environment: !Ref Env
VersioningConfiguration:
Status: Enabled
WebsiteConfiguration:
IndexDocument: !Sub
- '${Environment}.html'
- Environment: !Ref Env
"BucketPolicy":
Type: AWS::S3::BucketPolicy
Properties:
Bucket: !Ref bucket
PolicyDocument:
Id: 1
Version: '2012-10-17'
Statement:
- Action:
- 's3:GetObject'
Effect: Allow
Principal:
AWS: !Sub 'arn:aws:iam::cloudfront:user/CloudFront Origin Access Identity ${CloudFrontOriginIdentity}'
Resource: !Sub 'arn:aws:s3:::${bucket}/*'