Condensation particles that create a CloudFormation project for CloudSploit scans.
The use of condensation allows the template and the code to be deployed to any S3 bucket. The template will always reference the code that it was deployed with. The stack can be updated to add permissions or to deploy new releases of CloudSploit scans.
Use the Launch Stack links in the Packaged Project section of this
README.
Must have node.js 0.12 or later.
- Clone the repository
- Create a
local.jsfile inconfigwith buckets that you own - Add AWS credentials to your environment. Either by IAM Profile, Envionment Variables or AWS Properties file.
- Build:
> git clone https://github.com/SungardAS/particles-cloudsploit-scans > cd particles-cloudsploit-scans > npm install > ./node_modules/.bin/gulp condensation:build - Deploy:
> ./node_modules/.bin/gulp condensation:deploy
This file is automatically generated as part of the condensation init process. The zip file is created by checking out the submodule, running npm installl and then packaging.
The master template for all cloudsploit resources
Parameters
lambdaLogicalId {String} required Logical ID of the Lambda
resource
Parameters
lambdaLogicalId {String} required Logical ID of the Lambda
resource
Parameters
roleLogicalId {String} required Logical ID of the Lambda
Execution Role resource
Parameters
roleLogicalId {String} required Logical ID of the Lambda
Execution Role resource
A parameter for an existing IAM Role to use with the lambda function.
Properties for the IAM Role to be associated with the Lambda function.
Properties for the Lambda function.
A Fn::If statement to choose between using the a Parameter or Resource for the execution role
The resource that defines the lambda function
The resource that defines the role the lambda function will use
Using condensation the CloudFormation Template and CloudSploit assets have been deployed to every S3 region lambda is available.


