@@ -63,7 +63,7 @@ Resources:
63
63
Tags :
64
64
- Key : Name
65
65
Value : ServiceLifecycle-Public-Subnet-2
66
-
66
+
67
67
# Private Subnet 1 for RDS
68
68
PrivateSubnet1 :
69
69
Type : AWS::EC2::Subnet
@@ -118,7 +118,7 @@ Resources:
118
118
Properties :
119
119
RouteTableId : !Ref PublicRouteTable
120
120
SubnetId : !Ref PublicSubnet2
121
-
121
+
122
122
# NAT Gateway for private subnets
123
123
NatGatewayEIP :
124
124
Type : AWS::EC2::EIP
@@ -217,7 +217,7 @@ Resources:
217
217
Name : !Sub "${AWS::StackName}-db-credentials"
218
218
Description : RDS database credentials
219
219
GenerateSecretString :
220
- SecretStringTemplate : ' {"username":"postgres"}'
220
+ SecretStringTemplate : ' {"username":"postgres"}'
221
221
GenerateStringKey : " password"
222
222
PasswordLength : 16
223
223
ExcludeCharacters : ' "@/\\'
@@ -232,7 +232,7 @@ Resources:
232
232
ToPort : 5432
233
233
SourceSecurityGroupId : !Ref LambdaSecurityGroup
234
234
Description : Allow PostgreSQL access from Lambda security group
235
-
235
+
236
236
# Security Group for SSM VPC Endpoints
237
237
SSMEndpointSecurityGroup :
238
238
Type : AWS::EC2::SecurityGroup
@@ -249,7 +249,7 @@ Resources:
249
249
Tags :
250
250
- Key : Name
251
251
Value : ServiceLifecycle-SSM-Endpoint-SecurityGroup
252
-
252
+
253
253
# Add ingress rule to Database Security Group for SSM connections
254
254
DatabaseSecurityGroupIngressSSM :
255
255
Type : AWS::EC2::SecurityGroupIngress
@@ -334,7 +334,7 @@ Resources:
334
334
Type : AWS::Serverless::Function
335
335
Properties :
336
336
CodeUri : ./LambdaWithServiceLifecycle.zip
337
- # CodeUri: .build/plugins/AWSLambdaPackager/outputs/AWSLambdaPackager/LambdaWithServiceLifecycle/LambdaWithServiceLifecycle.zip
337
+ # CodeUri: .build/plugins/AWSLambdaPackager/outputs/AWSLambdaPackager/LambdaWithServiceLifecycle/LambdaWithServiceLifecycle.zip
338
338
Timeout : 60
339
339
Handler : swift.bootstrap # ignored by the Swift runtime
340
340
Runtime : provided.al2
@@ -406,15 +406,15 @@ Outputs:
406
406
Port: ${PostgreSQLDatabase.Endpoint.Port}
407
407
Database: ${DBName}
408
408
Credentials: Use AWS Secrets Manager to retrieve username and password
409
-
409
+
410
410
# SSM VPC Endpoints
411
411
SSMEndpoints :
412
412
Description : SSM VPC Endpoints for CloudShell access
413
413
Value : !Sub |
414
414
SSM Endpoint: ${SSMEndpoint}
415
415
SSM Messages Endpoint: ${SSMMessagesEndpoint}
416
416
EC2 Messages Endpoint: ${EC2MessagesEndpoint}
417
-
417
+
418
418
# CloudShell Connection Instructions
419
419
CloudShellInstructions :
420
420
Description : Instructions for connecting from CloudShell
0 commit comments