Resources: MyRole: Type: AWS::IAM::Role Properties: AssumeRolePolicyDocument: Statement: - Effect: Allow Action: sts:AssumeRole Principal: Service: lambda.amazonaws.com ManagedPolicyArns: - arn:{AWS::Partition}:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole MyFunction: Type: AWS::Lambda::Function Properties: Role: !GetAtt MyRole.Arn Runtime: nodejs14.x Handler: index.handler Code: ZipFile: | const AWS = require('aws-sdk'); exports.handler = async (event) => { console.log(JSON.stringify(event)); }; Environment: Variables: TABLE_NAME: !Ref MyTable MyServerlessFunction: Type: AWS::Serverless::Function Properties: Runtime: nodejs14.x Handler: index.handler InlineCode: | const AWS = require('aws-sdk'); exports.handler = async (event) => { console.log(JSON.stringify(event)); }; MyQueue: Type: AWS::SQS::Queue MyConnector: Type: AWS::Serverless::Connector Properties: Source: Id: MyFunction Destination: Id: MyQueue Permissions: - Read MyConnectorWithServerlessFunction: Type: AWS::Serverless::Connector Properties: Source: Id: MyServerlessFunction Destination: Id: MyQueue Permissions: - Write MyConnectorWithTwoACs: Type: AWS::Serverless::Connector Properties: Source: Id: MyFunction Destination: Id: MyQueue Permissions: - Read - Write