@@ -11,13 +11,13 @@ Parameters:
11
11
12
12
13
13
14
- functionblogamplifiedc9ee2ce6PostConfirmationArn :
14
+ functionjamstackcmsc9ee2ce6PostConfirmationArn :
15
15
Type : String
16
- Default : functionblogamplifiedc9ee2ce6PostConfirmationArn
16
+ Default : functionjamstackcmsc9ee2ce6PostConfirmationArn
17
17
18
- functionblogamplifiedc9ee2ce6PostConfirmationName :
18
+ functionjamstackcmsc9ee2ce6PostConfirmationName :
19
19
Type : String
20
- Default : functionblogamplifiedc9ee2ce6PostConfirmationName
20
+ Default : functionjamstackcmsc9ee2ce6PostConfirmationName
21
21
22
22
23
23
@@ -124,7 +124,7 @@ Resources:
124
124
# Created to allow the UserPool SMS Config to publish via the Simple Notification Service during MFA Process
125
125
Type : AWS::IAM::Role
126
126
Properties :
127
- RoleName : !If [ShouldNotCreateEnvResources, 'blogamc9ee2ce6_sns -role', !Join ['',['blogamc9ee2ce6_sns -role', '-', !Ref env]]]
127
+ RoleName : !If [ShouldNotCreateEnvResources, 'jamcmsc9ee2ce6_sns -role', !Join ['',['jamcmsc9ee2ce6_sns -role', '-', !Ref env]]]
128
128
AssumeRolePolicyDocument :
129
129
Version : " 2012-10-17"
130
130
Statement :
@@ -136,10 +136,10 @@ Resources:
136
136
- " sts:AssumeRole"
137
137
Condition :
138
138
StringEquals :
139
- sts:ExternalId : blogamc9ee2ce6_role_external_id
139
+ sts:ExternalId : jamcmsc9ee2ce6_role_external_id
140
140
Policies :
141
141
-
142
- PolicyName : blogamc9ee2ce6 -sns-policy
142
+ PolicyName : jamcmsc9ee2ce6 -sns-policy
143
143
PolicyDocument :
144
144
Version : " 2012-10-17"
145
145
Statement :
@@ -172,7 +172,7 @@ Resources:
172
172
173
173
174
174
175
- PostConfirmation : !Ref functionblogamplifiedc9ee2ce6PostConfirmationArn
175
+ PostConfirmation : !Ref functionjamstackcmsc9ee2ce6PostConfirmationArn
176
176
177
177
178
178
@@ -198,7 +198,7 @@ Resources:
198
198
SmsVerificationMessage : !Ref smsVerificationMessage
199
199
SmsConfiguration :
200
200
SnsCallerArn : !GetAtt SNSRole.Arn
201
- ExternalId : blogamc9ee2ce6_role_external_id
201
+ ExternalId : jamcmsc9ee2ce6_role_external_id
202
202
203
203
204
204
@@ -212,7 +212,7 @@ Resources:
212
212
Properties :
213
213
Action : " lambda:invokeFunction"
214
214
Principal : " cognito-idp.amazonaws.com"
215
- FunctionName : !Ref functionblogamplifiedc9ee2ce6PostConfirmationName
215
+ FunctionName : !Ref functionjamstackcmsc9ee2ce6PostConfirmationName
216
216
SourceArn : !GetAtt UserPool.Arn
217
217
218
218
@@ -222,10 +222,10 @@ Resources:
222
222
# Updating lambda role with permissions to Cognito
223
223
224
224
225
- blogamplifiedc9ee2ce6PostConfirmationAddToGroupCognito :
225
+ jamstackcmsc9ee2ce6PostConfirmationAddToGroupCognito :
226
226
Type : AWS::IAM::Policy
227
227
Properties :
228
- PolicyName : blogamplifiedc9ee2ce6PostConfirmationAddToGroupCognito
228
+ PolicyName : jamstackcmsc9ee2ce6PostConfirmationAddToGroupCognito
229
229
PolicyDocument :
230
230
Version : ' 2012-10-17'
231
231
Statement :
@@ -250,7 +250,7 @@ Resources:
250
250
251
251
252
252
Roles :
253
- - !Join ['',["blogamplifiedc9ee2ce6PostConfirmation ", '-', !Ref env]]
253
+ - !Join ['',["jamstackcmsc9ee2ce6PostConfirmation ", '-', !Ref env]]
254
254
255
255
256
256
@@ -259,7 +259,7 @@ Resources:
259
259
# Depends on UserPool for ID reference
260
260
Type : " AWS::Cognito::UserPoolClient"
261
261
Properties :
262
- ClientName : blogamc9ee2ce6_app_clientWeb
262
+ ClientName : jamcmsc9ee2ce6_app_clientWeb
263
263
264
264
RefreshTokenValidity : !Ref userpoolClientRefreshTokenValidity
265
265
UserPoolId : !Ref UserPool
@@ -269,7 +269,7 @@ Resources:
269
269
# Depends on UserPool for ID reference
270
270
Type : " AWS::Cognito::UserPoolClient"
271
271
Properties :
272
- ClientName : blogamc9ee2ce6_app_client
272
+ ClientName : jamcmsc9ee2ce6_app_client
273
273
274
274
GenerateSecret : !Ref userpoolClientGenerateSecret
275
275
RefreshTokenValidity : !Ref userpoolClientRefreshTokenValidity
@@ -334,7 +334,7 @@ Resources:
334
334
# Marked as depending on UserPoolClientRole for easier to understand CFN sequencing
335
335
Type : ' AWS::IAM::Policy'
336
336
Properties :
337
- PolicyName : blogamc9ee2ce6_userpoolclient_lambda_iam_policy
337
+ PolicyName : jamcmsc9ee2ce6_userpoolclient_lambda_iam_policy
338
338
Roles :
339
339
- !If [ShouldNotCreateEnvResources, !Ref userpoolClientLambdaRole, !Join ['',[!Ref userpoolClientLambdaRole, '-', !Ref env]]]
340
340
PolicyDocument :
@@ -351,7 +351,7 @@ Resources:
351
351
# Marked as depending on UserPoolClientLambdaPolicy for easier to understand CFN sequencing
352
352
Type : ' AWS::IAM::Policy'
353
353
Properties :
354
- PolicyName : blogamc9ee2ce6_userpoolclient_lambda_log_policy
354
+ PolicyName : jamcmsc9ee2ce6_userpoolclient_lambda_log_policy
355
355
Roles :
356
356
- !If [ShouldNotCreateEnvResources, !Ref userpoolClientLambdaRole, !Join ['',[!Ref userpoolClientLambdaRole, '-', !Ref env]]]
357
357
PolicyDocument :
@@ -391,7 +391,7 @@ Resources:
391
391
# Always created
392
392
Type : AWS::Cognito::IdentityPool
393
393
Properties :
394
- IdentityPoolName : !If [ShouldNotCreateEnvResources, 'blogamplifiedc9ee2ce6_identitypool_c9ee2ce6 ', !Join ['',['blogamplifiedc9ee2ce6_identitypool_c9ee2ce6 ', '__', !Ref env]]]
394
+ IdentityPoolName : !If [ShouldNotCreateEnvResources, 'jamstackcmsc9ee2ce6_identitypool_c9ee2ce6 ', !Join ['',['jamstackcmsc9ee2ce6_identitypool_c9ee2ce6 ', '__', !Ref env]]]
395
395
396
396
CognitoIdentityProviders :
397
397
- ClientId : !Ref UserPoolClient
0 commit comments