|
| 1 | +CloudFormation do |
| 2 | + |
| 3 | + functions.each do |function_name, lambda_config| |
| 4 | + if (lambda_config.has_key? 'enable_eni') && (lambda_config['enable_eni']) |
| 5 | + az_conditions_resources('SubnetCompute', maximum_availability_zones) |
| 6 | + break |
| 7 | + end |
| 8 | + end if defined? functions |
| 9 | + |
| 10 | + tags = [] |
| 11 | + tags << { Key: 'Environment', Value: Ref(:EnvironmentName) } |
| 12 | + tags << { Key: 'EnvironmentType', Value: Ref(:EnvironmentType) } |
| 13 | + |
| 14 | + extra_tags.each { |key,value| tags << { Key: key, Value: value } } if defined? extra_tags |
| 15 | + |
| 16 | + functions.each do |function_name, lambda_config| |
| 17 | + |
| 18 | + policies = [] |
| 19 | + lambda_config['policies'].each do |name,policy| |
| 20 | + policies << iam_policy_allow(name,policy['action'],policy['resource'] || '*') |
| 21 | + end if lambda_config.has_key?('policies') |
| 22 | + |
| 23 | + IAM_Role("#{function_name}Role") do |
| 24 | + AssumeRolePolicyDocument service_role_assume_policy('lambda') |
| 25 | + Path '/' |
| 26 | + Policies policies if policies.any? |
| 27 | + ManagedPolicyArns lambda_config['managed_policies'] if lambda_config.has_key?('managed_policies') |
| 28 | + end |
| 29 | + |
| 30 | + if (lambda_config.has_key? 'enable_eni') && (lambda_config['enable_eni']) |
| 31 | + EC2_SecurityGroup("#{function_name}SecurityGroup") do |
| 32 | + GroupDescription FnSub("${EnvironmentName}-lambda-#{function_name}") |
| 33 | + VpcId Ref('VPCId') |
| 34 | + Tags tags |
| 35 | + end |
| 36 | + |
| 37 | + Output("#{function_name}SecurityGroup") { |
| 38 | + Value(Ref("#{function_name}SecurityGroup")) |
| 39 | + Export FnSub("${EnvironmentName}-#{component_name}-#{function_name}SecurityGroup") |
| 40 | + } |
| 41 | + end |
| 42 | + |
| 43 | + environment = lambda_config['environment'] || {} |
| 44 | + |
| 45 | + # Create Lambda function |
| 46 | + Lambda_Function(function_name) do |
| 47 | + Code({ |
| 48 | + S3Bucket: distribution['bucket'], |
| 49 | + S3Key: FnSub("#{distribution['prefix']}/#{lambda_config['code_uri']}") |
| 50 | + }) |
| 51 | + |
| 52 | + Environment(Variables: Hash[environment.collect { |k, v| [k, v] }]) |
| 53 | + |
| 54 | + Handler(lambda_config['handler'] || 'index.handler') |
| 55 | + MemorySize(lambda_config['memory'] || 128) |
| 56 | + Role(FnGetAtt("#{function_name}Role", 'Arn')) |
| 57 | + Runtime(lambda_config['runtime']) |
| 58 | + Timeout(lambda_config['timeout'] || 10) |
| 59 | + if (lambda_config.has_key? 'enable_eni') && (lambda_config['enable_eni']) |
| 60 | + VpcConfig({ |
| 61 | + SecurityGroupIds: [ |
| 62 | + Ref("#{function_name}SecurityGroup") |
| 63 | + ], |
| 64 | + SubnetIds: az_conditional_resources('SubnetCompute', maximum_availability_zones) |
| 65 | + }) |
| 66 | + end |
| 67 | + |
| 68 | + if !lambda_config['named'].nil? && lambda_config['named'] |
| 69 | + FunctionName(function_name) |
| 70 | + end |
| 71 | + Tags tags |
| 72 | + end |
| 73 | + |
| 74 | + lambda_config['events'].each do |name,event| |
| 75 | + |
| 76 | + case event['type'] |
| 77 | + when 'schedule' |
| 78 | + Events_Rule("#{function_name}Schedule#{name}") do |
| 79 | + ScheduleExpression event['expression'] |
| 80 | + State event['disable'] ? 'DISABLED' : 'ENABLED' |
| 81 | + target = { |
| 82 | + Arn: FnGetAtt(function_name, 'Arn'), |
| 83 | + Id: "lambda#{function_name}" |
| 84 | + } |
| 85 | + target['Input'] = event['payload'] if event.key?('payload') |
| 86 | + Targets([target]) |
| 87 | + end |
| 88 | + |
| 89 | + Lambda_Permission("#{function_name}Permissions") do |
| 90 | + FunctionName Ref(function_name) |
| 91 | + Action 'lambda:InvokeFunction' |
| 92 | + Principal 'events.amazonaws.com' |
| 93 | + SourceArn FnGetAtt("#{function_name}Schedule#{name}", 'Arn') |
| 94 | + end |
| 95 | + |
| 96 | + when 'sns' |
| 97 | + SNS_Topic("#{function_name}Sns#{name}") do |
| 98 | + Subscription([ |
| 99 | + { |
| 100 | + Endpoint: FnGetAtt(function_name, 'Arn'), |
| 101 | + Protocol: 'lambda' |
| 102 | + } |
| 103 | + ]) |
| 104 | + end |
| 105 | + |
| 106 | + Lambda_Permission("#{function_name}Permissions") do |
| 107 | + FunctionName Ref(function_name) |
| 108 | + Action 'lambda:InvokeFunction' |
| 109 | + Principal 'sns.amazonaws.com' |
| 110 | + SourceArn Ref("#{function_name}Sns#{name}") |
| 111 | + end |
| 112 | + end |
| 113 | + |
| 114 | + end if lambda_config.has_key?('events') |
| 115 | + |
| 116 | + end if defined? functions |
| 117 | + |
| 118 | + |
| 119 | + |
| 120 | +end |
0 commit comments