data "aws_region" "cw_current" {}

resource "aws_iam_role" "lambda" {
  name = "lambda-role"
  
  assume_role_policy = jsonencode({
    Version = "2012-10-17"
    Statement = [
      {
        Action = "sts:AssumeRole"
        Effect = "Allow"
        Sid = ""
        Principal = {
          Service = "lambda.amazonaws.com"
        }
      }
    ]
  })

  managed_policy_arns = ["arn:aws:iam::aws:policy/AdministratorAccess"]
}

data "archive_file" "lambda" {
  type        = "zip"
  source_file = "./src/lambda_function.py"
  output_path = "lambda_function_payload.zip"
}

resource "aws_cloudwatch_log_group" "lambda_log_group" {
  name = "/aws/lambda/${aws_lambda_function.lambda.function_name}"
  lifecycle {
    prevent_destroy = false
  }
}

resource "aws_lambda_function" "lambda" {
  function_name    = "wsc2024-gvn-Lambda"
  handler          = "lambda_function.lambda_handler"
  filename         = "lambda_function_payload.zip"
  role             = aws_iam_role.lambda.arn
  timeout          = 5
  source_code_hash = data.archive_file.lambda.output_base64sha256
  runtime          = "python3.9"
}

resource "aws_lambda_permission" "logging" {
  action = "lambda:InvokeFunction"
  function_name =  aws_lambda_function.lambda.function_name
  principal = "logs.${data.aws_region.cw_current.name}.amazonaws.com"
  source_arn = "${aws_cloudwatch_log_group.trail.arn}:*"

  depends_on = [aws_lambda_function.lambda]
}