lambda.tf 3.2 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111
  1. resource "aws_lambda_event_source_mapping" "sqs_fair_queue" {
  2. event_source_arn = var.source_sqs_arn
  3. function_name = aws_lambda_function.sqs_fair_queue.arn
  4. batch_size = 100
  5. maximum_batching_window_in_seconds = 30 # How long to wait to gather a batch, max: 300
  6. }
  7. # To install prereqs:
  8. # pip install --target ./scripts jsonpath-ng
  9. data "archive_file" "sqs_fair_queue" {
  10. type = "zip"
  11. source_dir = "${path.module}/scripts/"
  12. output_path = "${path.module}/tmp/sqs_fair_queue.zip"
  13. }
  14. resource "aws_lambda_function" "sqs_fair_queue" {
  15. filename = data.archive_file.sqs_fair_queue.output_path
  16. function_name = "sqs_fair_queue_${var.sqs_prefix}"
  17. role = aws_iam_role.sqs_fair_queue.arn
  18. handler = "sqs_fair_queue.lambda_handler"
  19. source_code_hash = data.archive_file.sqs_fair_queue.output_base64sha256
  20. runtime = "python3.9"
  21. environment {
  22. variables = {
  23. "SOURCE_SQS_ARN" = var.source_sqs_arn
  24. "SQS_PREFIX" = var.sqs_prefix
  25. "NUM_QUEUES" = var.num_queues
  26. "HASH_JSONPATH" = var.hash_jsonpath
  27. }
  28. }
  29. # tfsec recommends tracing as a best practice
  30. tracing_config {
  31. mode = "Active"
  32. }
  33. tags = var.tags
  34. }
  35. resource "aws_lambda_permission" "sqs_fair_queue" {
  36. statement_id = "AllowExecutionFromSQS"
  37. action = "lambda:InvokeFunction"
  38. function_name = aws_lambda_function.sqs_fair_queue.function_name
  39. principal = "sqs.amazonaws.com"
  40. source_arn = var.source_sqs_arn
  41. }
  42. data "aws_iam_policy_document" "sqs_fair_queue" {
  43. statement {
  44. sid = "SQSIngest"
  45. effect = "Allow"
  46. resources = [var.source_sqs_arn]
  47. # tfsec:ignore:aws-iam-no-policy-wildcards Wildcards are fine and useful
  48. actions = ["sqs:*"] # TODO: Nail down
  49. # Probably:
  50. # "sqs:ReceiveMessage",
  51. # "sqs:SendMessage",
  52. # "sqs:GetQueueAttributes"
  53. # "sqs:GetQueueUrl"
  54. }
  55. statement {
  56. sid = "SQSPut"
  57. effect = "Allow"
  58. resources = tolist(aws_sqs_queue.queue[*].arn)
  59. # tfsec:ignore:aws-iam-no-policy-wildcards Wildcards are fine and useful
  60. actions = ["sqs:*"] # TODO: Nail down
  61. }
  62. }
  63. resource "aws_iam_policy" "sqs_fair_queue" {
  64. name = "sqs_fair_queue_${var.sqs_prefix}"
  65. path = "/sqs_fair_queue/"
  66. description = "SQS Fair Queueing Lambda Policy"
  67. policy = data.aws_iam_policy_document.sqs_fair_queue.json
  68. tags = var.tags
  69. }
  70. data "aws_iam_policy_document" "lambda_trust" {
  71. statement {
  72. sid = ""
  73. effect = "Allow"
  74. actions = ["sts:AssumeRole"]
  75. principals {
  76. type = "Service"
  77. identifiers = ["lambda.amazonaws.com"]
  78. }
  79. }
  80. }
  81. resource "aws_iam_role" "sqs_fair_queue" {
  82. name = "sqs_fair_queue_${var.sqs_prefix}"
  83. path = "/sqs_fair_queue/"
  84. assume_role_policy = data.aws_iam_policy_document.lambda_trust.json
  85. tags = var.tags
  86. }
  87. resource "aws_iam_role_policy_attachment" "sqs_fair_queue" {
  88. role = aws_iam_role.sqs_fair_queue.name
  89. policy_arn = aws_iam_policy.sqs_fair_queue.arn
  90. }
  91. resource "aws_iam_role_policy_attachment" "aws_managed_lambda" {
  92. role = aws_iam_role.sqs_fair_queue.name
  93. policy_arn = "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole"
  94. }