Jack Danger 4ad1ded244 Allow specifying ApiGateway logs role ARN
Since #6531 improved how we manage API Gateway's CloudWatch log IAM role
it's now simpler to allow hardcoding a role ARN in the YAML config.

This addresses [this
comment](https://github.com/serverless/serverless/pull/6591#discussion_r321010087)
and unblocks anyone who needs to keep the IAM permissions for an app
scoped to just that app.

Example usage:

    provider:
      name: aws
      logs:
        restApi:
          role:
            arn:aws:iam::123456789:role/a-service-with-all-necessary-permissions
2019-09-26 15:32:46 -07:00
..
2019-09-18 19:59:08 +02:00
2019-08-22 11:49:22 +02:00
2019-08-22 11:49:22 +02:00

Read this on the main serverless docs site

Serverless Infrastructure Providers

Under the hood, the Serverless Framework is deploying your code to a cloud provider like AWS, Microsoft Azure, Google Cloud Platform, Apache OpenWhisk, Cloudflare Workers, or a Kubernetes-based solution like Kubeless. Click on your provider for detailed Serverless Framework CLI user guides and references.



Connecting your provider

To deploy functions, specify your provider in your service's serverless.yml file under the provider key and make sure your provider credentials are setup on your machine or CI/CD system.

# serverless.yml
service: my-service-name

provider:
  name: aws