Fixes "IamRoleLambdaExecution - Maximum policy size of 10240 bytes exceeded" error
This plugin works by modifying the Cloudformation stack before deployment.
It searches for the IamRoleLambdaExecution
resource and modifies the only policy attached to this role.
$ yarn add --dev @shelf/serverless-simplify-default-exec-role-plugin
In your serverless.yml
file:
plugins:
- '@shelf/serverless-simplify-default-exec-role-plugin'
By default, Serverless framework creates such role:
{
Effect: "Allow",
Action: ["logs:CreateLogStream", "logs:CreateLogGroup"],
Resource: [
{
"Fn::Sub": "arn:${AWS::Partition}:logs:${AWS::Region}:${AWS::AccountId}:log-group:/aws/lambda/production-users-createUser:*",
},
{
"Fn::Sub": "arn:${AWS::Partition}:logs:${AWS::Region}:${AWS::AccountId}:log-group:/aws/lambda/production-users-updateUser:*",
},
{
"Fn::Sub": "arn:${AWS::Partition}:logs:${AWS::Region}:${AWS::AccountId}:log-group:/aws/lambda/production-users-deleteUser:*",
},
// dozens of identical lines
],
}
When you reach a certain project size, deployment will fail since this role will exceed 10 KB limit.
This plugin simplifies the default execution role to smth like this:
{
Effect: "Allow",
Action: ["logs:CreateLogStream", "logs:CreateLogGroup"],
Resource: [
{
"Fn::Sub": "arn:${AWS::Partition}:logs:${AWS::Region}:${AWS::AccountId}:log-group:*",
},
],
}
$ git checkout master
$ yarn version
$ yarn publish
$ git push origin master --tags
MIT © Shelf