From 53ce3c04abb4e1732cae42a7f69c223f2d76dda6 Mon Sep 17 00:00:00 2001 From: Greg Tyler Date: Mon, 9 Oct 2023 08:42:49 +0100 Subject: [PATCH] Deploy Lambda with Terraform Includes IAM permissions, X-Ray, function URL and records the environment deployment in GitHub. For VEGA-1942 #minor --- .github/workflows/env-deploy.yml | 22 +++---- .github/workflows/workflow-pr.yml | 2 +- terraform/environment/dynamodb.tf | 3 +- terraform/environment/outputs.tf | 4 ++ terraform/environment/region/kms.tf | 72 +++++++++++++++++++++++ terraform/environment/region/main.tf | 27 +++++++++ terraform/environment/region/outputs.tf | 4 ++ terraform/environment/region/terraform.tf | 25 ++++++++ terraform/environment/region/variables.tf | 9 +++ terraform/environment/regions.tf | 23 ++++++++ terraform/environment/variables.tf | 6 ++ terraform/modules/lambda/iam.tf | 55 +++++++++++++++++ terraform/modules/lambda/main.tf | 22 +++++++ terraform/modules/lambda/outputs.tf | 4 ++ terraform/modules/lambda/terraform.tf | 13 ++++ terraform/modules/lambda/variables.tf | 19 ++++++ 16 files changed, 297 insertions(+), 13 deletions(-) create mode 100644 terraform/environment/outputs.tf create mode 100644 terraform/environment/region/kms.tf create mode 100644 terraform/environment/region/main.tf create mode 100644 terraform/environment/region/outputs.tf create mode 100644 terraform/environment/region/terraform.tf create mode 100644 terraform/environment/region/variables.tf create mode 100644 terraform/environment/regions.tf create mode 100644 terraform/modules/lambda/iam.tf create mode 100644 terraform/modules/lambda/main.tf create mode 100644 terraform/modules/lambda/outputs.tf create mode 100644 terraform/modules/lambda/terraform.tf create mode 100644 terraform/modules/lambda/variables.tf diff --git a/.github/workflows/env-deploy.yml b/.github/workflows/env-deploy.yml index 324cf007..26400760 100644 --- a/.github/workflows/env-deploy.yml +++ b/.github/workflows/env-deploy.yml @@ -25,9 +25,9 @@ on: jobs: terraform_environment_workflow: runs-on: ubuntu-latest - # environment: - # name: ${{ inputs.workspace_name }} popup environment - # url: ${{ steps.terraform_outputs.outputs.url }} + environment: + name: ${{ inputs.workspace_name }} popup environment + url: ${{ steps.terraform_outputs.outputs.url }} steps: - uses: actions/checkout@v4 with: @@ -73,11 +73,11 @@ jobs: terraform apply -lock-timeout=300s -input=false -auto-approve -parallelism=30 working-directory: ./terraform/environment - # - name: Terraform Outputs - # id: terraform_outputs - # env: - # TF_WORKSPACE: ${{ inputs.workspace_name }} - # TF_VAR_app_version: ${{ inputs.version_tag }} - # run: | - # echo "url=$(terraform output -raw app_fqdn)" >> $GITHUB_OUTPUT - # working-directory: ./terraform/environment + - name: Terraform Outputs + id: terraform_outputs + env: + TF_WORKSPACE: ${{ inputs.workspace_name }} + TF_VAR_app_version: ${{ inputs.version_tag }} + run: | + echo "url=$(terraform output -raw lambda_url)" >> $GITHUB_OUTPUT + working-directory: ./terraform/environment diff --git a/.github/workflows/workflow-pr.yml b/.github/workflows/workflow-pr.yml index fbf35673..17d8ceff 100644 --- a/.github/workflows/workflow-pr.yml +++ b/.github/workflows/workflow-pr.yml @@ -73,7 +73,7 @@ jobs: deploy-pr-env: name: Deploy PR Environment - needs: [build, generate-environment-workspace-name] + needs: [build, generate-tags, generate-environment-workspace-name] uses: ./.github/workflows/env-deploy.yml with: workspace_name: ${{ needs.generate-environment-workspace-name.outputs.environment_workspace_name }} diff --git a/terraform/environment/dynamodb.tf b/terraform/environment/dynamodb.tf index 339d81a8..07f4be74 100644 --- a/terraform/environment/dynamodb.tf +++ b/terraform/environment/dynamodb.tf @@ -2,7 +2,8 @@ resource "aws_dynamodb_table" "deeds_table" { name = "deeds-${local.environment_name}" billing_mode = "PAY_PER_REQUEST" deletion_protection_enabled = local.environment.is_production - stream_enabled = false + stream_enabled = true + stream_view_type = "NEW_AND_OLD_IMAGES" hash_key = "uid" server_side_encryption { diff --git a/terraform/environment/outputs.tf b/terraform/environment/outputs.tf new file mode 100644 index 00000000..b5315fdd --- /dev/null +++ b/terraform/environment/outputs.tf @@ -0,0 +1,4 @@ +output "lambda_url" { + description = "Public URL of 'create' Lambda function" + value = module.eu_west_1.lambda_url +} diff --git a/terraform/environment/region/kms.tf b/terraform/environment/region/kms.tf new file mode 100644 index 00000000..573e67f7 --- /dev/null +++ b/terraform/environment/region/kms.tf @@ -0,0 +1,72 @@ +resource "aws_kms_key" "cloudwatch" { + description = "CloudWatch ${terraform.workspace} ${data.aws_region.current.name}" + deletion_window_in_days = 10 + policy = data.aws_iam_policy_document.cloudwatch_kms.json + enable_key_rotation = true + + provider = aws.region +} + +resource "aws_kms_alias" "cloudwatch_standard_alias" { + name = "alias/cloudwatch-${var.environment_name}" + target_key_id = aws_kms_key.cloudwatch.key_id + + provider = aws.region +} + +data "aws_iam_policy_document" "cloudwatch_kms" { + statement { + sid = "Enable Root account permissions on Key" + effect = "Allow" + actions = ["kms:*"] + resources = ["*"] + principals { + type = "AWS" + identifiers = [ + "arn:aws:iam::${data.aws_caller_identity.current.account_id}:root", + ] + } + } + statement { + sid = "Allow Key to be used for Encryption" + effect = "Allow" + resources = ["*"] + actions = [ + "kms:Encrypt", + "kms:Decrypt", + "kms:ReEncrypt*", + "kms:GenerateDataKey*", + "kms:DescribeKey", + ] + principals { + type = "Service" + identifiers = ["logs.${data.aws_region.current.name}.amazonaws.com"] + } + } + statement { + sid = "Key Administrator" + effect = "Allow" + resources = ["*"] + actions = [ + "kms:Create*", + "kms:Describe*", + "kms:Enable*", + "kms:List*", + "kms:Put*", + "kms:Update*", + "kms:Revoke*", + "kms:Disable*", + "kms:Get*", + "kms:Delete*", + "kms:TagResource", + "kms:UntagResource", + "kms:ScheduleKeyDeletion", + "kms:CancelKeyDeletion" + ] + + principals { + type = "AWS" + identifiers = ["arn:aws:iam::${data.aws_caller_identity.current.account_id}:role/breakglass"] + } + } +} diff --git a/terraform/environment/region/main.tf b/terraform/environment/region/main.tf new file mode 100644 index 00000000..06f6358e --- /dev/null +++ b/terraform/environment/region/main.tf @@ -0,0 +1,27 @@ +locals { + functions = toset([ + "create", + "get", + "update", + ]) +} + +module "lambda" { + for_each = local.functions + source = "../../modules/lambda" + + environment_name = var.environment_name + lambda_name = each.key + ecr_image_uri = "${data.aws_ecr_repository.lambda[each.key].repository_url}:${var.app_version}" + cloudwatch_kms_key_id = aws_kms_key.cloudwatch.arn + + providers = { + aws = aws.region + } +} + +data "aws_ecr_repository" "lambda" { + for_each = local.functions + name = "lpa-store/lambda/api-${each.key}" + provider = aws.management +} diff --git a/terraform/environment/region/outputs.tf b/terraform/environment/region/outputs.tf new file mode 100644 index 00000000..b001474c --- /dev/null +++ b/terraform/environment/region/outputs.tf @@ -0,0 +1,4 @@ +output "lambda_url" { + description = "Public URL of 'create' Lambda function" + value = module.lambda["create"].function_url +} diff --git a/terraform/environment/region/terraform.tf b/terraform/environment/region/terraform.tf new file mode 100644 index 00000000..5f2854df --- /dev/null +++ b/terraform/environment/region/terraform.tf @@ -0,0 +1,25 @@ +terraform { + required_version = ">= 1.4.0" + + required_providers { + aws = { + source = "hashicorp/aws" + configuration_aliases = [ + aws.region, + aws.management, + ] + } + } +} + +data "aws_region" "current" { + provider = aws.region +} + +data "aws_caller_identity" "current" { + provider = aws.region +} + +data "aws_default_tags" "current" { + provider = aws.region +} diff --git a/terraform/environment/region/variables.tf b/terraform/environment/region/variables.tf new file mode 100644 index 00000000..3b621412 --- /dev/null +++ b/terraform/environment/region/variables.tf @@ -0,0 +1,9 @@ +variable "environment_name" { + description = "The name of the environment the region is deployed to" + type = string +} + +variable "app_version" { + description = "Version of application to deploy" + type = string +} diff --git a/terraform/environment/regions.tf b/terraform/environment/regions.tf new file mode 100644 index 00000000..5899ffe1 --- /dev/null +++ b/terraform/environment/regions.tf @@ -0,0 +1,23 @@ +module "eu_west_1" { + source = "./region" + + environment_name = local.environment_name + app_version = var.app_version + + providers = { + aws.region = aws.eu_west_1 + aws.management = aws.management + } +} + +module "eu_west_2" { + source = "./region" + + environment_name = local.environment_name + app_version = var.app_version + + providers = { + aws.region = aws.eu_west_2 + aws.management = aws.management + } +} diff --git a/terraform/environment/variables.tf b/terraform/environment/variables.tf index b4d7be11..7f816db7 100644 --- a/terraform/environment/variables.tf +++ b/terraform/environment/variables.tf @@ -39,3 +39,9 @@ variable "management_role" { type = string default = "lpa-store-ci" } + +variable "app_version" { + description = "Version of application to deploy" + type = string + default = "latest" +} diff --git a/terraform/modules/lambda/iam.tf b/terraform/modules/lambda/iam.tf new file mode 100644 index 00000000..e66043e4 --- /dev/null +++ b/terraform/modules/lambda/iam.tf @@ -0,0 +1,55 @@ +resource "aws_iam_role" "lambda" { + name = "lambda-${var.lambda_name}-${var.environment_name}-${data.aws_region.current.name}" + assume_role_policy = data.aws_iam_policy_document.lambda_assume.json + + lifecycle { + create_before_destroy = true + } +} + +data "aws_iam_policy_document" "lambda_assume" { + statement { + actions = ["sts:AssumeRole"] + + principals { + type = "Service" + identifiers = ["lambda.amazonaws.com"] + } + } +} + +resource "aws_iam_role_policy_attachment" "aws_xray_write_only_access" { + role = aws_iam_role.lambda.name + policy_arn = "arn:aws:iam::aws:policy/AWSXrayWriteOnlyAccess" +} + +resource "aws_iam_role_policy_attachment" "vpc_access_execution_role" { + role = aws_iam_role.lambda.name + policy_arn = "arn:aws:iam::aws:policy/service-role/AWSLambdaVPCAccessExecutionRole" +} + +resource "aws_iam_role_policy" "lambda" { + name = "lambda" + role = aws_iam_role.lambda.id + policy = data.aws_iam_policy_document.lambda.json +} + +data "aws_iam_policy_document" "lambda" { + statement { + sid = "allowLogging" + effect = "Allow" + resources = [aws_cloudwatch_log_group.lambda.arn] + actions = [ + "logs:CreateLogStream", + "logs:PutLogEvents", + "logs:DescribeLogStreams" + ] + } +} + +resource "aws_lambda_permission" "allow_lambda_execution_operator" { + statement_id = "AllowExecutionOperator" + action = "lambda:InvokeFunction" + function_name = aws_lambda_function.main.function_name + principal = "arn:aws:iam::${data.aws_caller_identity.current.account_id}:role/operator" +} diff --git a/terraform/modules/lambda/main.tf b/terraform/modules/lambda/main.tf new file mode 100644 index 00000000..6f7fdb91 --- /dev/null +++ b/terraform/modules/lambda/main.tf @@ -0,0 +1,22 @@ +resource "aws_cloudwatch_log_group" "lambda" { + name = "/aws/lambda/${var.lambda_name}-${var.environment_name}" + kms_key_id = var.cloudwatch_kms_key_id +} + +resource "aws_lambda_function" "main" { + function_name = "${var.lambda_name}-${var.environment_name}" + image_uri = var.ecr_image_uri + package_type = "Image" + role = aws_iam_role.lambda.arn + timeout = 5 + depends_on = [aws_cloudwatch_log_group.lambda] + + tracing_config { + mode = "Active" + } +} + +resource "aws_lambda_function_url" "main" { + function_name = aws_lambda_function.main.function_name + authorization_type = "NONE" +} diff --git a/terraform/modules/lambda/outputs.tf b/terraform/modules/lambda/outputs.tf new file mode 100644 index 00000000..05c1b88a --- /dev/null +++ b/terraform/modules/lambda/outputs.tf @@ -0,0 +1,4 @@ +output "function_url" { + description = "Public URL of Lambda function" + value = aws_lambda_function_url.main.function_url +} diff --git a/terraform/modules/lambda/terraform.tf b/terraform/modules/lambda/terraform.tf new file mode 100644 index 00000000..8815440e --- /dev/null +++ b/terraform/modules/lambda/terraform.tf @@ -0,0 +1,13 @@ +terraform { + required_version = ">= 1.4.0" + + required_providers { + aws = { + source = "hashicorp/aws" + } + } +} + +data "aws_region" "current" {} + +data "aws_caller_identity" "current" {} diff --git a/terraform/modules/lambda/variables.tf b/terraform/modules/lambda/variables.tf new file mode 100644 index 00000000..132d7b8a --- /dev/null +++ b/terraform/modules/lambda/variables.tf @@ -0,0 +1,19 @@ +variable "environment_name" { + description = "The name of the environment the lambda is deployed to" + type = string +} + +variable "lambda_name" { + description = "The name of the lambda function" + type = string +} + +variable "ecr_image_uri" { + description = "The URI of the image lambda should use" + type = string +} + +variable "cloudwatch_kms_key_id" { + description = "KMS key used to encrypt CloudWatch logs" + type = string +}