|
| 1 | +resource "aws_lambda_function" "scale_runners_lambda" { |
| 2 | + filename = "${path.module}/lambdas/scale-runners/scale-runners.zip" |
| 3 | + source_code_hash = filebase64sha256("${path.module}/lambdas/scale-runners/scale-runners.zip") |
| 4 | + function_name = "${var.environment}-scale-runners" |
| 5 | + role = aws_iam_role.scale_runners_lambda.arn |
| 6 | + handler = "index.handler" |
| 7 | + runtime = "nodejs12.x" |
| 8 | + |
| 9 | + # environment { |
| 10 | + # variables = { |
| 11 | + # } |
| 12 | + # } |
| 13 | +} |
| 14 | + |
| 15 | +resource "aws_lambda_event_source_mapping" "scale_runners_lambda" { |
| 16 | + event_source_arn = var.sqs.arn |
| 17 | + function_name = aws_lambda_function.scale_runners_lambda.arn |
| 18 | +} |
| 19 | + |
| 20 | +resource "aws_lambda_permission" "scale_runners_lambda" { |
| 21 | + statement_id = "AllowExecutionFromSQS" |
| 22 | + action = "lambda:InvokeFunction" |
| 23 | + function_name = aws_lambda_function.scale_runners_lambda.function_name |
| 24 | + principal = "sqs.amazonaws.com" |
| 25 | + source_arn = var.sqs.arn |
| 26 | +} |
| 27 | + |
| 28 | +resource "aws_iam_role" "scale_runners_lambda" { |
| 29 | + name = "${var.environment}-action-scale-runners-lambda-role" |
| 30 | + assume_role_policy = data.aws_iam_policy_document.lambda_assume_role_policy.json |
| 31 | +} |
| 32 | + |
| 33 | +data "aws_iam_policy_document" "lambda_assume_role_policy" { |
| 34 | + statement { |
| 35 | + actions = ["sts:AssumeRole"] |
| 36 | + |
| 37 | + principals { |
| 38 | + type = "Service" |
| 39 | + identifiers = ["lambda.amazonaws.com"] |
| 40 | + } |
| 41 | + } |
| 42 | +} |
| 43 | + |
| 44 | +resource "aws_iam_policy" "lambda_logging" { |
| 45 | + name = "${var.environment}-lamda-runners-logging-policy" |
| 46 | + description = "Lambda logging policy" |
| 47 | + |
| 48 | + policy = templatefile("${path.module}/policies/lambda-cloudwatch.json", {}) |
| 49 | +} |
| 50 | + |
| 51 | +resource "aws_iam_policy_attachment" "scale_runners_lambda_logging" { |
| 52 | + name = "${var.environment}-logging" |
| 53 | + roles = [aws_iam_role.scale_runners_lambda.name] |
| 54 | + policy_arn = aws_iam_policy.lambda_logging.arn |
| 55 | +} |
| 56 | + |
| 57 | +resource "aws_iam_policy" "scale_runners_lambda" { |
| 58 | + name = "${var.environment}-lamda-scale-runners-sqs-receive-policy" |
| 59 | + description = "Lambda webhook policy" |
| 60 | + |
| 61 | + policy = templatefile("${path.module}/policies/lambda-scale-runners.json", { |
| 62 | + sqs_arn = var.sqs.arn |
| 63 | + }) |
| 64 | +} |
| 65 | + |
| 66 | +resource "aws_iam_policy_attachment" "scale_runners_lambda" { |
| 67 | + name = "${var.environment}-scale-runners" |
| 68 | + roles = [aws_iam_role.scale_runners_lambda.name] |
| 69 | + policy_arn = aws_iam_policy.scale_runners_lambda.arn |
| 70 | +} |
0 commit comments