package aws import ( "fmt" "io/ioutil" "log" "time" "github.com/aws/aws-sdk-go/aws" "github.com/aws/aws-sdk-go/aws/awserr" "github.com/aws/aws-sdk-go/service/lambda" "github.com/mitchellh/go-homedir" "errors" "github.com/hashicorp/terraform/helper/resource" "github.com/hashicorp/terraform/helper/schema" ) func resourceAwsLambdaFunction() *schema.Resource { return &schema.Resource{ Create: resourceAwsLambdaFunctionCreate, Read: resourceAwsLambdaFunctionRead, Update: resourceAwsLambdaFunctionUpdate, Delete: resourceAwsLambdaFunctionDelete, Importer: &schema.ResourceImporter{ State: func(d *schema.ResourceData, meta interface{}) ([]*schema.ResourceData, error) { d.Set("function_name", d.Id()) return []*schema.ResourceData{d}, nil }, }, Schema: map[string]*schema.Schema{ "filename": &schema.Schema{ Type: schema.TypeString, Optional: true, ConflictsWith: []string{"s3_bucket", "s3_key", "s3_object_version"}, }, "s3_bucket": &schema.Schema{ Type: schema.TypeString, Optional: true, ConflictsWith: []string{"filename"}, }, "s3_key": &schema.Schema{ Type: schema.TypeString, Optional: true, ConflictsWith: []string{"filename"}, }, "s3_object_version": &schema.Schema{ Type: schema.TypeString, Optional: true, ConflictsWith: []string{"filename"}, }, "description": &schema.Schema{ Type: schema.TypeString, Optional: true, }, "function_name": &schema.Schema{ Type: schema.TypeString, Required: true, ForceNew: true, }, "handler": &schema.Schema{ Type: schema.TypeString, Required: true, }, "memory_size": &schema.Schema{ Type: schema.TypeInt, Optional: true, Default: 128, }, "role": &schema.Schema{ Type: schema.TypeString, Required: true, }, "runtime": &schema.Schema{ Type: schema.TypeString, Optional: true, ForceNew: true, Default: "nodejs", }, "timeout": &schema.Schema{ Type: schema.TypeInt, Optional: true, Default: 3, }, "vpc_config": &schema.Schema{ Type: schema.TypeList, Optional: true, ForceNew: true, Elem: &schema.Resource{ Schema: map[string]*schema.Schema{ "subnet_ids": &schema.Schema{ Type: schema.TypeSet, Required: true, ForceNew: true, Elem: &schema.Schema{Type: schema.TypeString}, Set: schema.HashString, }, "security_group_ids": &schema.Schema{ Type: schema.TypeSet, Required: true, ForceNew: true, Elem: &schema.Schema{Type: schema.TypeString}, Set: schema.HashString, }, "vpc_id": &schema.Schema{ Type: schema.TypeString, Computed: true, }, }, }, }, "arn": &schema.Schema{ Type: schema.TypeString, Computed: true, }, "last_modified": &schema.Schema{ Type: schema.TypeString, Computed: true, }, "source_code_hash": &schema.Schema{ Type: schema.TypeString, Optional: true, Computed: true, }, }, } } // resourceAwsLambdaFunction maps to: // CreateFunction in the API / SDK func resourceAwsLambdaFunctionCreate(d *schema.ResourceData, meta interface{}) error { conn := meta.(*AWSClient).lambdaconn functionName := d.Get("function_name").(string) iamRole := d.Get("role").(string) log.Printf("[DEBUG] Creating Lambda Function %s with role %s", functionName, iamRole) var functionCode *lambda.FunctionCode if v, ok := d.GetOk("filename"); ok { file, err := loadFileContent(v.(string)) if err != nil { return fmt.Errorf("Unable to load %q: %s", v.(string), err) } functionCode = &lambda.FunctionCode{ ZipFile: file, } } else { s3Bucket, bucketOk := d.GetOk("s3_bucket") s3Key, keyOk := d.GetOk("s3_key") s3ObjectVersion, versionOk := d.GetOk("s3_object_version") if !bucketOk || !keyOk { return errors.New("s3_bucket and s3_key must all be set while using S3 code source") } functionCode = &lambda.FunctionCode{ S3Bucket: aws.String(s3Bucket.(string)), S3Key: aws.String(s3Key.(string)), } if versionOk { functionCode.S3ObjectVersion = aws.String(s3ObjectVersion.(string)) } } params := &lambda.CreateFunctionInput{ Code: functionCode, Description: aws.String(d.Get("description").(string)), FunctionName: aws.String(functionName), Handler: aws.String(d.Get("handler").(string)), MemorySize: aws.Int64(int64(d.Get("memory_size").(int))), Role: aws.String(iamRole), Runtime: aws.String(d.Get("runtime").(string)), Timeout: aws.Int64(int64(d.Get("timeout").(int))), } if v, ok := d.GetOk("vpc_config"); ok { config, err := validateVPCConfig(v) if err != nil { return err } if config != nil { var subnetIds []*string for _, id := range config["subnet_ids"].(*schema.Set).List() { subnetIds = append(subnetIds, aws.String(id.(string))) } var securityGroupIds []*string for _, id := range config["security_group_ids"].(*schema.Set).List() { securityGroupIds = append(securityGroupIds, aws.String(id.(string))) } params.VpcConfig = &lambda.VpcConfig{ SubnetIds: subnetIds, SecurityGroupIds: securityGroupIds, } } } // IAM profiles can take ~10 seconds to propagate in AWS: // http://docs.aws.amazon.com/AWSEC2/latest/UserGuide/iam-roles-for-amazon-ec2.html#launch-instance-with-role-console // Error creating Lambda function: InvalidParameterValueException: The role defined for the task cannot be assumed by Lambda. err := resource.Retry(1*time.Minute, func() *resource.RetryError { _, err := conn.CreateFunction(params) if err != nil { log.Printf("[ERROR] Received %q, retrying CreateFunction", err) if awserr, ok := err.(awserr.Error); ok { if awserr.Code() == "InvalidParameterValueException" { log.Printf("[DEBUG] InvalidParameterValueException creating Lambda Function: %s", awserr) return resource.RetryableError(awserr) } } log.Printf("[DEBUG] Error creating Lambda Function: %s", err) return resource.NonRetryableError(err) } return nil }) if err != nil { return fmt.Errorf("Error creating Lambda function: %s", err) } d.SetId(d.Get("function_name").(string)) return resourceAwsLambdaFunctionRead(d, meta) } // resourceAwsLambdaFunctionRead maps to: // GetFunction in the API / SDK func resourceAwsLambdaFunctionRead(d *schema.ResourceData, meta interface{}) error { conn := meta.(*AWSClient).lambdaconn log.Printf("[DEBUG] Fetching Lambda Function: %s", d.Id()) params := &lambda.GetFunctionInput{ FunctionName: aws.String(d.Get("function_name").(string)), } getFunctionOutput, err := conn.GetFunction(params) if err != nil { if awsErr, ok := err.(awserr.Error); ok && awsErr.Code() == "ResourceNotFoundException" && !d.IsNewResource() { d.SetId("") return nil } return err } // getFunctionOutput.Code.Location is a pre-signed URL pointing at the zip // file that we uploaded when we created the resource. You can use it to // download the code from AWS. The other part is // getFunctionOutput.Configuration which holds metadata. function := getFunctionOutput.Configuration // TODO error checking / handling on the Set() calls. d.Set("arn", function.FunctionArn) d.Set("description", function.Description) d.Set("handler", function.Handler) d.Set("memory_size", function.MemorySize) d.Set("last_modified", function.LastModified) d.Set("role", function.Role) d.Set("runtime", function.Runtime) d.Set("timeout", function.Timeout) if config := flattenLambdaVpcConfigResponse(function.VpcConfig); len(config) > 0 { log.Printf("[INFO] Setting Lambda %s VPC config %#v from API", d.Id(), config) err := d.Set("vpc_config", config) if err != nil { return fmt.Errorf("Failed setting vpc_config: %s", err) } } d.Set("source_code_hash", function.CodeSha256) return nil } // resourceAwsLambdaFunction maps to: // DeleteFunction in the API / SDK func resourceAwsLambdaFunctionDelete(d *schema.ResourceData, meta interface{}) error { conn := meta.(*AWSClient).lambdaconn log.Printf("[INFO] Deleting Lambda Function: %s", d.Id()) params := &lambda.DeleteFunctionInput{ FunctionName: aws.String(d.Get("function_name").(string)), } _, err := conn.DeleteFunction(params) if err != nil { return fmt.Errorf("Error deleting Lambda Function: %s", err) } d.SetId("") return nil } // resourceAwsLambdaFunctionUpdate maps to: // UpdateFunctionCode in the API / SDK func resourceAwsLambdaFunctionUpdate(d *schema.ResourceData, meta interface{}) error { conn := meta.(*AWSClient).lambdaconn d.Partial(true) codeReq := &lambda.UpdateFunctionCodeInput{ FunctionName: aws.String(d.Id()), } codeUpdate := false if d.HasChange("filename") || d.HasChange("source_code_hash") { name := d.Get("filename").(string) file, err := loadFileContent(name) if err != nil { return fmt.Errorf("Unable to load %q: %s", name, err) } codeReq.ZipFile = file codeUpdate = true } if d.HasChange("s3_bucket") || d.HasChange("s3_key") || d.HasChange("s3_object_version") { codeReq.S3Bucket = aws.String(d.Get("s3_bucket").(string)) codeReq.S3Key = aws.String(d.Get("s3_key").(string)) codeReq.S3ObjectVersion = aws.String(d.Get("s3_object_version").(string)) codeUpdate = true } if codeUpdate { log.Printf("[DEBUG] Send Update Lambda Function Code request: %#v", codeReq) _, err := conn.UpdateFunctionCode(codeReq) if err != nil { return fmt.Errorf("Error modifying Lambda Function Code %s: %s", d.Id(), err) } d.SetPartial("filename") d.SetPartial("source_code_hash") d.SetPartial("s3_bucket") d.SetPartial("s3_key") d.SetPartial("s3_object_version") } configReq := &lambda.UpdateFunctionConfigurationInput{ FunctionName: aws.String(d.Id()), } configUpdate := false if d.HasChange("description") { configReq.Description = aws.String(d.Get("description").(string)) configUpdate = true } if d.HasChange("handler") { configReq.Handler = aws.String(d.Get("handler").(string)) configUpdate = true } if d.HasChange("memory_size") { configReq.MemorySize = aws.Int64(int64(d.Get("memory_size").(int))) configUpdate = true } if d.HasChange("role") { configReq.Role = aws.String(d.Get("role").(string)) configUpdate = true } if d.HasChange("timeout") { configReq.Timeout = aws.Int64(int64(d.Get("timeout").(int))) configUpdate = true } if configUpdate { log.Printf("[DEBUG] Send Update Lambda Function Configuration request: %#v", configReq) _, err := conn.UpdateFunctionConfiguration(configReq) if err != nil { return fmt.Errorf("Error modifying Lambda Function Configuration %s: %s", d.Id(), err) } d.SetPartial("description") d.SetPartial("handler") d.SetPartial("memory_size") d.SetPartial("role") d.SetPartial("timeout") } d.Partial(false) return resourceAwsLambdaFunctionRead(d, meta) } // loadFileContent returns contents of a file in a given path func loadFileContent(v string) ([]byte, error) { filename, err := homedir.Expand(v) if err != nil { return nil, err } fileContent, err := ioutil.ReadFile(filename) if err != nil { return nil, err } return fileContent, nil } func validateVPCConfig(v interface{}) (map[string]interface{}, error) { configs := v.([]interface{}) if len(configs) > 1 { return nil, errors.New("Only a single vpc_config block is expected") } config, ok := configs[0].(map[string]interface{}) if !ok { return nil, errors.New("vpc_config is ") } // if subnet_ids and security_group_ids are both empty then the VPC is optional if config["subnet_ids"].(*schema.Set).Len() == 0 && config["security_group_ids"].(*schema.Set).Len() == 0 { return nil, nil } if config["subnet_ids"].(*schema.Set).Len() == 0 { return nil, errors.New("vpc_config.subnet_ids cannot be empty") } if config["security_group_ids"].(*schema.Set).Len() == 0 { return nil, errors.New("vpc_config.security_group_ids cannot be empty") } return config, nil }