data "aws_region" "cw_current" {}
resource "aws_iam_role" "lambda" {
name = "lambda-role"
assume_role_policy = jsonencode({
Version = "2012-10-17"
Statement = [
{
Action = "sts:AssumeRole"
Effect = "Allow"
Sid = ""
Principal = {
Service = "lambda.amazonaws.com"
}
}
]
})
managed_policy_arns = ["arn:aws:iam::aws:policy/AdministratorAccess"]
}
data "archive_file" "lambda" {
type = "zip"
source_file = "./src/lambda_function.py"
output_path = "lambda_function_payload.zip"
}
resource "aws_cloudwatch_log_group" "lambda_log_group" {
name = "/aws/lambda/${aws_lambda_function.lambda.function_name}"
lifecycle {
prevent_destroy = false
}
}
resource "aws_lambda_function" "lambda" {
function_name = "wsc2024-gvn-Lambda"
handler = "lambda_function.lambda_handler"
filename = "lambda_function_payload.zip"
role = aws_iam_role.lambda.arn
timeout = 5
source_code_hash = data.archive_file.lambda.output_base64sha256
runtime = "python3.9"
}
resource "aws_lambda_permission" "logging" {
action = "lambda:InvokeFunction"
function_name = aws_lambda_function.lambda.function_name
principal = "logs.${data.aws_region.cw_current.name}.amazonaws.com"
source_arn = "${aws_cloudwatch_log_group.trail.arn}:*"
depends_on = [aws_lambda_function.lambda]
}