UNPKG

artillery

Version:

Cloud-scale load testing. https://www.artillery.io

126 lines (116 loc) 4.94 kB
AWSTemplateFormatVersion: "2010-09-09" Description: Template to create an IAM Role with an attached policy that provides all necessary permissions for Artillery.io to run distributed tests on AWS Lambda. By default the IAM role is configured to trust your AWS account, meaning it will allow any AWS principal (e.g. IAM User, IAM Role) to assume it. You can restrict the role to allow only by a specific IAM user or role to assume it by filling out the appropriate parameter value below. Metadata: AWS::CloudFormation::Interface: ParameterGroups: - Label: default: "Restrict to specific IAM User (optional)" Parameters: - User - Label: default: "Restrict to specific IAM Role (optional)" Parameters: - Role ParameterLabels: User: default: "IAM user name or ARN" Role: default: "IAM role name or ARN" Parameters: User: Type: String Default: "" Description: Use when you want to allow the created role to be assumed only by a specific IAM user (by default any user, role or service from your account will be allowed to assume it). Provide the user name or ARN. Role: Type: String Default: "" Description: Use when you want to allow the created role to be assumed only by a specific IAM role (by default any user, role or service from your account will be allowed to assume it). Provide the role name or ARN. Conditions: ShouldTrustAccount: !And - !Equals [!Ref User, ""] - !Equals [!Ref Role, ""] ShouldTrustUser: !Not [!Equals [!Ref User, ""]] IsUserArn: !Equals [!Select [0, !Split [":", !Ref User]], "arn"] ShouldTrustRole: !Not [!Equals [!Ref Role, ""]] IsRoleArn: !Equals [!Select [0, !Split [":", !Ref Role]], "arn"] Resources: ArtilleryDistributedTestingLambdaRole: Type: "AWS::IAM::Role" Properties: RoleName: "ArtilleryDistributedTestingLambdaRole" AssumeRolePolicyDocument: Version: "2012-10-17" Statement: - Effect: "Allow" Principal: AWS: [ !If [ShouldTrustAccount, !Ref "AWS::AccountId", !Ref "AWS::NoValue"], !If [ShouldTrustUser, !If [IsUserArn, !Ref User, !Sub "arn:aws:iam::${AWS::AccountId}:user/${User}"], !Ref "AWS::NoValue"], !If [ShouldTrustRole, !If [IsRoleArn, !Ref Role, !Sub "arn:aws:iam::${AWS::AccountId}:role/${Role}"], !Ref "AWS::NoValue"] ] Action: ["sts:AssumeRole"] Path: "/" Policies: - PolicyName: ArtilleryDistributedTestingLambdaPolicy PolicyDocument: Version: "2012-10-17" Statement: - Sid: CreateOrGetLambdaRole Effect: Allow Action: - iam:CreateRole - iam:GetRole - iam:PassRole - iam:AttachRolePolicy Resource: !Sub "arn:aws:iam::${AWS::AccountId}:role/artilleryio-default-lambda-role-*" - Sid: CreateLambdaPolicy Effect: Allow Action: - iam:CreatePolicy Resource: !Sub "arn:aws:iam::${AWS::AccountId}:policy/artilleryio-lambda-policy-*" - Sid: SQSPermissions Effect: Allow Action: - sqs:* Resource: !Sub "arn:aws:sqs:*:${AWS::AccountId}:artilleryio*" - Sid: SQSListQueues Effect: Allow Action: - sqs:ListQueues Resource: "*" - Sid: LambdaPermissions Effect: Allow Action: - lambda:InvokeFunction - lambda:CreateFunction - lambda:DeleteFunction - lambda:GetFunctionConfiguration Resource: !Sub "arn:aws:lambda:*:${AWS::AccountId}:function:artilleryio-*" - Sid: EcrPullImagePermissions Effect: Allow Action: - ecr:GetDownloadUrlForLayer - ecr:BatchGetImage Resource: "arn:aws:ecr:*:248481025674:repository/artillery-worker" - Sid: S3Permissions Effect: Allow Action: - s3:CreateBucket - s3:DeleteObject - s3:GetObject - s3:PutObject - s3:ListBucket - s3:GetLifecycleConfiguration - s3:PutLifecycleConfiguration Resource: - !Sub "arn:aws:s3:::artilleryio-test-data-*" - !Sub "arn:aws:s3:::artilleryio-test-data-*/*" Outputs: RoleArn: Description: ARN of the IAM Role for Artillery.io Lambda functions Value: !GetAtt ArtilleryDistributedTestingLambdaRole.Arn