Mini Shell
"""
Manage Lambda Functions
=======================
.. versionadded:: 2016.3.0
Create and destroy Lambda Functions. Be aware that this interacts with Amazon's services,
and so may incur charges.
:depends:
- boto
- boto3
The dependencies listed above can be installed via package or pip.
This module accepts explicit vpc credentials but can also utilize
IAM roles assigned to the instance through Instance Profiles. Dynamic
credentials are then automatically obtained from AWS API and no further
configuration is necessary. More information available `here
<http://docs.aws.amazon.com/AWSEC2/latest/UserGuide/iam-roles-for-amazon-ec2.html>`_.
If IAM roles are not used you need to specify them either in a pillar file or
in the minion's config file:
.. code-block:: yaml
vpc.keyid: GKTADJGHEIQSXMKKRBJ08H
vpc.key: askdjghsdfjkghWupUjasdflkdfklgjsdfjajkghs
It's also possible to specify ``key``, ``keyid`` and ``region`` via a profile,
either passed in as a dict, or as a string to pull from pillars or minion
config:
.. code-block:: yaml
myprofile:
keyid: GKTADJGHEIQSXMKKRBJ08H
key: askdjghsdfjkghWupUjasdflkdfklgjsdfjajkghs
region: us-east-1
.. code-block:: yaml
Ensure function exists:
boto_lambda.function_present:
- FunctionName: myfunction
- Runtime: python2.7
- Role: iam_role_name
- Handler: entry_function
- ZipFile: code.zip
- S3Bucket: bucketname
- S3Key: keyname
- S3ObjectVersion: version
- Description: "My Lambda Function"
- Timeout: 3
- MemorySize: 128
- region: us-east-1
- keyid: GKTADJGHEIQSXMKKRBJ08H
- key: askdjghsdfjkghWupUjasdflkdfklgjsdfjajkghs
"""
import hashlib
import logging
import os
import salt.utils.data
import salt.utils.dictupdate as dictupdate
import salt.utils.files
import salt.utils.json
from salt.exceptions import SaltInvocationError
log = logging.getLogger(__name__)
def __virtual__():
"""
Only load if boto is available.
"""
if "boto_lambda.function_exists" in __salt__:
return "boto_lambda"
return (False, "boto_lambda module could not be loaded")
def function_present(
name,
FunctionName,
Runtime,
Role,
Handler,
ZipFile=None,
S3Bucket=None,
S3Key=None,
S3ObjectVersion=None,
Description="",
Timeout=3,
MemorySize=128,
Permissions=None,
RoleRetries=5,
region=None,
key=None,
keyid=None,
profile=None,
VpcConfig=None,
Environment=None,
):
"""
Ensure function exists.
name
The name of the state definition
FunctionName
Name of the Function.
Runtime
The Runtime environment for the function. One of
'nodejs', 'java8', or 'python2.7'
Role
The name or ARN of the IAM role that the function assumes when it executes your
function to access any other AWS resources.
Handler
The function within your code that Lambda calls to begin execution. For Node.js it is the
module-name.*export* value in your function. For Java, it can be package.classname::handler or
package.class-name.
ZipFile
A path to a .zip file containing your deployment package. If this is
specified, S3Bucket and S3Key must not be specified.
S3Bucket
Amazon S3 bucket name where the .zip file containing your package is
stored. If this is specified, S3Key must be specified and ZipFile must
NOT be specified.
S3Key
The Amazon S3 object (the deployment package) key name you want to
upload. If this is specified, S3Key must be specified and ZipFile must
NOT be specified.
S3ObjectVersion
The version of S3 object to use. Optional, should only be specified if
S3Bucket and S3Key are specified.
Description
A short, user-defined function description. Lambda does not use this value. Assign a meaningful
description as you see fit.
Timeout
The function execution time at which Lambda should terminate this function. Because the execution
time has cost implications, we recommend you set this value based on your expected execution time.
The default is 3 seconds.
MemorySize
The amount of memory, in MB, your function is given. Lambda uses this memory size to infer
the amount of CPU and memory allocated to your function. Your function use-case determines your
CPU and memory requirements. For example, a database operation might need less memory compared
to an image processing function. The default value is 128 MB. The value must be a multiple of
64 MB.
VpcConfig
If your Lambda function accesses resources in a VPC, you must provide this parameter
identifying the list of security group IDs/Names and subnet IDs/Name. These must all belong
to the same VPC. This is a dict of the form:
.. code-block:: yaml
VpcConfig:
SecurityGroupNames:
- mysecgroup1
- mysecgroup2
SecurityGroupIds:
- sg-abcdef1234
SubnetNames:
- mysubnet1
SubnetIds:
- subnet-1234abcd
- subnet-abcd1234
If VpcConfig is provided at all, you MUST pass at least one security group and one subnet.
Permissions
A list of permission definitions to be added to the function's policy
RoleRetries
IAM Roles may take some time to propagate to all regions once created.
During that time function creation may fail; this state will
atuomatically retry this number of times. The default is 5.
Environment
The parent object that contains your environment's configuration
settings. This is a dictionary of the form:
.. code-block:: python
{
'Variables': {
'VariableName': 'VariableValue'
}
}
.. versionadded:: 2017.7.0
region
Region to connect to.
key
Secret key to be used.
keyid
Access key to be used.
profile
A dict with region, key and keyid, or a pillar key (string) that
contains a dict with region, key and keyid.
"""
ret = {"name": FunctionName, "result": True, "comment": "", "changes": {}}
if Permissions is not None:
if isinstance(Permissions, str):
Permissions = salt.utils.json.loads(Permissions)
required_keys = {"Action", "Principal"}
optional_keys = {"SourceArn", "SourceAccount", "Qualifier"}
for sid, permission in Permissions.items():
keyset = set(permission.keys())
if not keyset.issuperset(required_keys):
raise SaltInvocationError(
"{} are required for each permission specification".format(
", ".join(required_keys)
)
)
keyset = keyset - required_keys
keyset = keyset - optional_keys
if bool(keyset):
raise SaltInvocationError(
"Invalid permission value {}".format(", ".join(keyset))
)
r = __salt__["boto_lambda.function_exists"](
FunctionName=FunctionName, region=region, key=key, keyid=keyid, profile=profile
)
if "error" in r:
ret["result"] = False
ret["comment"] = "Failed to create function: {}.".format(r["error"]["message"])
return ret
if not r.get("exists"):
if __opts__["test"]:
ret["comment"] = f"Function {FunctionName} is set to be created."
ret["result"] = None
return ret
r = __salt__["boto_lambda.create_function"](
FunctionName=FunctionName,
Runtime=Runtime,
Role=Role,
Handler=Handler,
ZipFile=ZipFile,
S3Bucket=S3Bucket,
S3Key=S3Key,
S3ObjectVersion=S3ObjectVersion,
Description=Description,
Timeout=Timeout,
MemorySize=MemorySize,
VpcConfig=VpcConfig,
Environment=Environment,
WaitForRole=True,
RoleRetries=RoleRetries,
region=region,
key=key,
keyid=keyid,
profile=profile,
)
if not r.get("created"):
ret["result"] = False
ret["comment"] = "Failed to create function: {}.".format(
r["error"]["message"]
)
return ret
if Permissions:
for sid, permission in Permissions.items():
r = __salt__["boto_lambda.add_permission"](
FunctionName=FunctionName,
StatementId=sid,
region=region,
key=key,
keyid=keyid,
profile=profile,
**permission,
)
if not r.get("updated"):
ret["result"] = False
ret["comment"] = "Failed to create function: {}.".format(
r["error"]["message"]
)
_describe = __salt__["boto_lambda.describe_function"](
FunctionName, region=region, key=key, keyid=keyid, profile=profile
)
_describe["function"]["Permissions"] = __salt__["boto_lambda.get_permissions"](
FunctionName, region=region, key=key, keyid=keyid, profile=profile
)["permissions"]
ret["changes"]["old"] = {"function": None}
ret["changes"]["new"] = _describe
ret["comment"] = f"Function {FunctionName} created."
return ret
ret["comment"] = os.linesep.join(
[ret["comment"], f"Function {FunctionName} is present."]
)
ret["changes"] = {}
# function exists, ensure config matches
_ret = _function_config_present(
FunctionName,
Role,
Handler,
Description,
Timeout,
MemorySize,
VpcConfig,
Environment,
region,
key,
keyid,
profile,
RoleRetries,
)
if not _ret.get("result"):
ret["result"] = _ret.get("result", False)
ret["comment"] = _ret["comment"]
ret["changes"] = {}
return ret
ret["changes"] = dictupdate.update(ret["changes"], _ret["changes"])
ret["comment"] = " ".join([ret["comment"], _ret["comment"]])
_ret = _function_code_present(
FunctionName,
ZipFile,
S3Bucket,
S3Key,
S3ObjectVersion,
region,
key,
keyid,
profile,
)
if not _ret.get("result"):
ret["result"] = _ret.get("result", False)
ret["comment"] = _ret["comment"]
ret["changes"] = {}
return ret
ret["changes"] = dictupdate.update(ret["changes"], _ret["changes"])
ret["comment"] = " ".join([ret["comment"], _ret["comment"]])
_ret = _function_permissions_present(
FunctionName, Permissions, region, key, keyid, profile
)
if not _ret.get("result"):
ret["result"] = _ret.get("result", False)
ret["comment"] = _ret["comment"]
ret["changes"] = {}
return ret
ret["changes"] = dictupdate.update(ret["changes"], _ret["changes"])
ret["comment"] = " ".join([ret["comment"], _ret["comment"]])
return ret
def _get_role_arn(name, region=None, key=None, keyid=None, profile=None):
if name.startswith("arn:aws:iam:"):
return name
account_id = __salt__["boto_iam.get_account_id"](
region=region, key=key, keyid=keyid, profile=profile
)
return f"arn:aws:iam::{account_id}:role/{name}"
def _resolve_vpcconfig(conf, region=None, key=None, keyid=None, profile=None):
if isinstance(conf, str):
conf = salt.utils.json.loads(conf)
if not conf:
# if the conf is None, we should explicitly set the VpcConfig to
# {'SubnetIds': [], 'SecurityGroupIds': []} to take the lambda out of
# the VPC it was in
return {"SubnetIds": [], "SecurityGroupIds": []}
if not isinstance(conf, dict):
raise SaltInvocationError("VpcConfig must be a dict.")
sns = [
__salt__["boto_vpc.get_resource_id"](
"subnet", s, region=region, key=key, keyid=keyid, profile=profile
).get("id")
for s in conf.pop("SubnetNames", [])
]
sgs = [
__salt__["boto_secgroup.get_group_id"](
s, region=region, key=key, keyid=keyid, profile=profile
)
for s in conf.pop("SecurityGroupNames", [])
]
conf.setdefault("SubnetIds", []).extend(sns)
conf.setdefault("SecurityGroupIds", []).extend(sgs)
return conf
def _function_config_present(
FunctionName,
Role,
Handler,
Description,
Timeout,
MemorySize,
VpcConfig,
Environment,
region,
key,
keyid,
profile,
RoleRetries,
):
ret = {"result": True, "comment": "", "changes": {}}
func = __salt__["boto_lambda.describe_function"](
FunctionName, region=region, key=key, keyid=keyid, profile=profile
)["function"]
need_update = False
options = {
"Role": _get_role_arn(Role, region, key, keyid, profile),
"Handler": Handler,
"Description": Description,
"Timeout": Timeout,
"MemorySize": MemorySize,
}
for key, val in options.items():
if func[key] != val:
need_update = True
ret["changes"].setdefault("old", {})[key] = func[key]
ret["changes"].setdefault("new", {})[key] = val
# VpcConfig returns the extra value 'VpcId' so do a special compare
oldval = func.get("VpcConfig")
if oldval is not None:
oldval.pop("VpcId", None)
fixed_VpcConfig = _resolve_vpcconfig(VpcConfig, region, key, keyid, profile)
if __utils__["boto3.ordered"](oldval) != __utils__["boto3.ordered"](
fixed_VpcConfig
):
need_update = True
ret["changes"].setdefault("new", {})["VpcConfig"] = fixed_VpcConfig
ret["changes"].setdefault("old", {})["VpcConfig"] = func.get("VpcConfig")
if Environment is not None:
if func.get("Environment") != Environment:
need_update = True
ret["changes"].setdefault("new", {})["Environment"] = Environment
ret["changes"].setdefault("old", {})["Environment"] = func.get(
"Environment"
)
if need_update:
ret["comment"] = os.linesep.join(
[ret["comment"], "Function config to be modified"]
)
if __opts__["test"]:
ret["comment"] = f"Function {FunctionName} set to be modified."
ret["result"] = None
return ret
_r = __salt__["boto_lambda.update_function_config"](
FunctionName=FunctionName,
Role=Role,
Handler=Handler,
Description=Description,
Timeout=Timeout,
MemorySize=MemorySize,
VpcConfig=fixed_VpcConfig,
Environment=Environment,
region=region,
key=key,
keyid=keyid,
profile=profile,
WaitForRole=True,
RoleRetries=RoleRetries,
)
if not _r.get("updated"):
ret["result"] = False
ret["comment"] = "Failed to update function: {}.".format(
_r["error"]["message"]
)
ret["changes"] = {}
return ret
def _function_code_present(
FunctionName, ZipFile, S3Bucket, S3Key, S3ObjectVersion, region, key, keyid, profile
):
ret = {"result": True, "comment": "", "changes": {}}
func = __salt__["boto_lambda.describe_function"](
FunctionName, region=region, key=key, keyid=keyid, profile=profile
)["function"]
update = False
if ZipFile:
if "://" in ZipFile: # Looks like a remote URL to me...
dlZipFile = __salt__["cp.cache_file"](path=ZipFile)
if dlZipFile is False:
ret["result"] = False
ret["comment"] = f"Failed to cache ZipFile `{ZipFile}`."
return ret
ZipFile = dlZipFile
size = os.path.getsize(ZipFile)
if size == func["CodeSize"]:
sha = hashlib.sha256()
with salt.utils.files.fopen(ZipFile, "rb") as f:
sha.update(f.read())
hashed = sha.digest().encode("base64").strip()
if hashed != func["CodeSha256"]:
update = True
else:
update = True
else:
# No way to judge whether the item in the s3 bucket is current without
# downloading it. Cheaper to just request an update every time, and still
# idempotent
update = True
if update:
if __opts__["test"]:
ret["comment"] = f"Function {FunctionName} set to be modified."
ret["result"] = None
return ret
ret["changes"]["old"] = {
"CodeSha256": func["CodeSha256"],
"CodeSize": func["CodeSize"],
}
func = __salt__["boto_lambda.update_function_code"](
FunctionName,
ZipFile,
S3Bucket,
S3Key,
S3ObjectVersion,
region=region,
key=key,
keyid=keyid,
profile=profile,
)
if not func.get("updated"):
ret["result"] = False
ret["comment"] = "Failed to update function: {}.".format(
func["error"]["message"]
)
ret["changes"] = {}
return ret
func = func["function"]
if (
func["CodeSha256"] != ret["changes"]["old"]["CodeSha256"]
or func["CodeSize"] != ret["changes"]["old"]["CodeSize"]
):
ret["comment"] = os.linesep.join(
[ret["comment"], "Function code to be modified"]
)
ret["changes"]["new"] = {
"CodeSha256": func["CodeSha256"],
"CodeSize": func["CodeSize"],
}
else:
del ret["changes"]["old"]
return ret
def _function_permissions_present(
FunctionName, Permissions, region, key, keyid, profile
):
ret = {"result": True, "comment": "", "changes": {}}
curr_permissions = __salt__["boto_lambda.get_permissions"](
FunctionName, region=region, key=key, keyid=keyid, profile=profile
).get("permissions")
if curr_permissions is None:
curr_permissions = {}
need_update = False
diffs = salt.utils.data.compare_dicts(curr_permissions, Permissions or {})
if bool(diffs):
ret["comment"] = os.linesep.join(
[ret["comment"], "Function permissions to be modified"]
)
if __opts__["test"]:
ret["comment"] = f"Function {FunctionName} set to be modified."
ret["result"] = None
return ret
for sid, diff in diffs.items():
if diff.get("old", "") != "":
# There's a permssion that needs to be removed
_r = __salt__["boto_lambda.remove_permission"](
FunctionName=FunctionName,
StatementId=sid,
region=region,
key=key,
keyid=keyid,
profile=profile,
)
ret["changes"].setdefault("new", {}).setdefault("Permissions", {})[
sid
] = {}
ret["changes"].setdefault("old", {}).setdefault("Permissions", {})[
sid
] = diff["old"]
if diff.get("new", "") != "":
# New permission information needs to be added
_r = __salt__["boto_lambda.add_permission"](
FunctionName=FunctionName,
StatementId=sid,
region=region,
key=key,
keyid=keyid,
profile=profile,
**diff["new"],
)
ret["changes"].setdefault("new", {}).setdefault("Permissions", {})[
sid
] = diff["new"]
oldperms = (
ret["changes"].setdefault("old", {}).setdefault("Permissions", {})
)
if sid not in oldperms:
oldperms[sid] = {}
if not _r.get("updated"):
ret["result"] = False
ret["comment"] = "Failed to update function: {}.".format(
_r["error"]["message"]
)
ret["changes"] = {}
return ret
def function_absent(
name, FunctionName, region=None, key=None, keyid=None, profile=None
):
"""
Ensure function with passed properties is absent.
name
The name of the state definition.
FunctionName
Name of the function.
region
Region to connect to.
key
Secret key to be used.
keyid
Access key to be used.
profile
A dict with region, key and keyid, or a pillar key (string) that
contains a dict with region, key and keyid.
"""
ret = {"name": FunctionName, "result": True, "comment": "", "changes": {}}
r = __salt__["boto_lambda.function_exists"](
FunctionName, region=region, key=key, keyid=keyid, profile=profile
)
if "error" in r:
ret["result"] = False
ret["comment"] = "Failed to delete function: {}.".format(r["error"]["message"])
return ret
if r and not r["exists"]:
ret["comment"] = f"Function {FunctionName} does not exist."
return ret
if __opts__["test"]:
ret["comment"] = f"Function {FunctionName} is set to be removed."
ret["result"] = None
return ret
r = __salt__["boto_lambda.delete_function"](
FunctionName, region=region, key=key, keyid=keyid, profile=profile
)
if not r["deleted"]:
ret["result"] = False
ret["comment"] = "Failed to delete function: {}.".format(r["error"]["message"])
return ret
ret["changes"]["old"] = {"function": FunctionName}
ret["changes"]["new"] = {"function": None}
ret["comment"] = f"Function {FunctionName} deleted."
return ret
def alias_present(
name,
FunctionName,
Name,
FunctionVersion,
Description="",
region=None,
key=None,
keyid=None,
profile=None,
):
"""
Ensure alias exists.
name
The name of the state definition.
FunctionName
Name of the function for which you want to create an alias.
Name
The name of the alias to be created.
FunctionVersion
Function version for which you are creating the alias.
Description
A short, user-defined function description. Lambda does not use this value. Assign a meaningful
description as you see fit.
region
Region to connect to.
key
Secret key to be used.
keyid
Access key to be used.
profile
A dict with region, key and keyid, or a pillar key (string) that
contains a dict with region, key and keyid.
"""
ret = {"name": Name, "result": True, "comment": "", "changes": {}}
r = __salt__["boto_lambda.alias_exists"](
FunctionName=FunctionName,
Name=Name,
region=region,
key=key,
keyid=keyid,
profile=profile,
)
if "error" in r:
ret["result"] = False
ret["comment"] = "Failed to create alias: {}.".format(r["error"]["message"])
return ret
if not r.get("exists"):
if __opts__["test"]:
ret["comment"] = f"Alias {Name} is set to be created."
ret["result"] = None
return ret
r = __salt__["boto_lambda.create_alias"](
FunctionName,
Name,
FunctionVersion,
Description,
region,
key,
keyid,
profile,
)
if not r.get("created"):
ret["result"] = False
ret["comment"] = "Failed to create alias: {}.".format(r["error"]["message"])
return ret
_describe = __salt__["boto_lambda.describe_alias"](
FunctionName, Name, region=region, key=key, keyid=keyid, profile=profile
)
ret["changes"]["old"] = {"alias": None}
ret["changes"]["new"] = _describe
ret["comment"] = f"Alias {Name} created."
return ret
ret["comment"] = os.linesep.join([ret["comment"], f"Alias {Name} is present."])
ret["changes"] = {}
_describe = __salt__["boto_lambda.describe_alias"](
FunctionName, Name, region=region, key=key, keyid=keyid, profile=profile
)["alias"]
need_update = False
options = {"FunctionVersion": FunctionVersion, "Description": Description}
for key, val in options.items():
if _describe[key] != val:
need_update = True
ret["changes"].setdefault("old", {})[key] = _describe[key]
ret["changes"].setdefault("new", {})[key] = val
if need_update:
ret["comment"] = os.linesep.join(
[ret["comment"], "Alias config to be modified"]
)
if __opts__["test"]:
ret["comment"] = f"Alias {Name} set to be modified."
ret["result"] = None
return ret
_r = __salt__["boto_lambda.update_alias"](
FunctionName=FunctionName,
Name=Name,
FunctionVersion=FunctionVersion,
Description=Description,
region=region,
key=key,
keyid=keyid,
profile=profile,
)
if not _r.get("updated"):
ret["result"] = False
ret["comment"] = "Failed to update alias: {}.".format(
_r["error"]["message"]
)
ret["changes"] = {}
return ret
def alias_absent(
name, FunctionName, Name, region=None, key=None, keyid=None, profile=None
):
"""
Ensure alias with passed properties is absent.
name
The name of the state definition.
FunctionName
Name of the function.
Name
Name of the alias.
region
Region to connect to.
key
Secret key to be used.
keyid
Access key to be used.
profile
A dict with region, key and keyid, or a pillar key (string) that
contains a dict with region, key and keyid.
"""
ret = {"name": Name, "result": True, "comment": "", "changes": {}}
r = __salt__["boto_lambda.alias_exists"](
FunctionName, Name, region=region, key=key, keyid=keyid, profile=profile
)
if "error" in r:
ret["result"] = False
ret["comment"] = "Failed to delete alias: {}.".format(r["error"]["message"])
return ret
if r and not r["exists"]:
ret["comment"] = f"Alias {Name} does not exist."
return ret
if __opts__["test"]:
ret["comment"] = f"Alias {Name} is set to be removed."
ret["result"] = None
return ret
r = __salt__["boto_lambda.delete_alias"](
FunctionName, Name, region=region, key=key, keyid=keyid, profile=profile
)
if not r["deleted"]:
ret["result"] = False
ret["comment"] = "Failed to delete alias: {}.".format(r["error"]["message"])
return ret
ret["changes"]["old"] = {"alias": Name}
ret["changes"]["new"] = {"alias": None}
ret["comment"] = f"Alias {Name} deleted."
return ret
def _get_function_arn(name, region=None, key=None, keyid=None, profile=None):
if name.startswith("arn:aws:lambda:"):
return name
account_id = __salt__["boto_iam.get_account_id"](
region=region, key=key, keyid=keyid, profile=profile
)
if profile and "region" in profile:
region = profile["region"]
if region is None:
region = "us-east-1"
return f"arn:aws:lambda:{region}:{account_id}:function:{name}"
def event_source_mapping_present(
name,
EventSourceArn,
FunctionName,
StartingPosition,
Enabled=True,
BatchSize=100,
region=None,
key=None,
keyid=None,
profile=None,
):
"""
Ensure event source mapping exists.
name
The name of the state definition.
EventSourceArn
The Amazon Resource Name (ARN) of the Amazon Kinesis or the Amazon
DynamoDB stream that is the event source.
FunctionName
The Lambda function to invoke when AWS Lambda detects an event on the
stream.
You can specify an unqualified function name (for example, "Thumbnail")
or you can specify Amazon Resource Name (ARN) of the function (for
example, "arn:aws:lambda:us-west-2:account-id:function:ThumbNail"). AWS
Lambda also allows you to specify only the account ID qualifier (for
example, "account-id:Thumbnail"). Note that the length constraint
applies only to the ARN. If you specify only the function name, it is
limited to 64 character in length.
StartingPosition
The position in the stream where AWS Lambda should start reading.
(TRIM_HORIZON | LATEST)
Enabled
Indicates whether AWS Lambda should begin polling the event source. By
default, Enabled is true.
BatchSize
The largest number of records that AWS Lambda will retrieve from your
event source at the time of invoking your function. Your function
receives an event with all the retrieved records. The default is 100
records.
region
Region to connect to.
key
Secret key to be used.
keyid
Access key to be used.
profile
A dict with region, key and keyid, or a pillar key (string) that
contains a dict with region, key and keyid.
"""
ret = {"name": None, "result": True, "comment": "", "changes": {}}
r = __salt__["boto_lambda.event_source_mapping_exists"](
EventSourceArn=EventSourceArn,
FunctionName=FunctionName,
region=region,
key=key,
keyid=keyid,
profile=profile,
)
if "error" in r:
ret["result"] = False
ret["comment"] = "Failed to create event source mapping: {}.".format(
r["error"]["message"]
)
return ret
if not r.get("exists"):
if __opts__["test"]:
ret["comment"] = "Event source mapping {} is set to be created.".format(
FunctionName
)
ret["result"] = None
return ret
r = __salt__["boto_lambda.create_event_source_mapping"](
EventSourceArn=EventSourceArn,
FunctionName=FunctionName,
StartingPosition=StartingPosition,
Enabled=Enabled,
BatchSize=BatchSize,
region=region,
key=key,
keyid=keyid,
profile=profile,
)
if not r.get("created"):
ret["result"] = False
ret["comment"] = "Failed to create event source mapping: {}.".format(
r["error"]["message"]
)
return ret
_describe = __salt__["boto_lambda.describe_event_source_mapping"](
EventSourceArn=EventSourceArn,
FunctionName=FunctionName,
region=region,
key=key,
keyid=keyid,
profile=profile,
)
ret["name"] = _describe["event_source_mapping"]["UUID"]
ret["changes"]["old"] = {"event_source_mapping": None}
ret["changes"]["new"] = _describe
ret["comment"] = "Event source mapping {} created.".format(ret["name"])
return ret
ret["comment"] = os.linesep.join(
[ret["comment"], "Event source mapping is present."]
)
ret["changes"] = {}
_describe = __salt__["boto_lambda.describe_event_source_mapping"](
EventSourceArn=EventSourceArn,
FunctionName=FunctionName,
region=region,
key=key,
keyid=keyid,
profile=profile,
)["event_source_mapping"]
need_update = False
options = {"BatchSize": BatchSize}
for key, val in options.items():
if _describe[key] != val:
need_update = True
ret["changes"].setdefault("old", {})[key] = _describe[key]
ret["changes"].setdefault("new", {})[key] = val
# verify FunctionName against FunctionArn
function_arn = _get_function_arn(
FunctionName, region=region, key=key, keyid=keyid, profile=profile
)
if _describe["FunctionArn"] != function_arn:
need_update = True
ret["changes"].setdefault("new", {})["FunctionArn"] = function_arn
ret["changes"].setdefault("old", {})["FunctionArn"] = _describe["FunctionArn"]
# TODO check for 'Enabled', since it doesn't directly map to a specific
# state
if need_update:
ret["comment"] = os.linesep.join(
[ret["comment"], "Event source mapping to be modified"]
)
if __opts__["test"]:
ret["comment"] = "Event source mapping {} set to be modified.".format(
_describe["UUID"]
)
ret["result"] = None
return ret
_r = __salt__["boto_lambda.update_event_source_mapping"](
UUID=_describe["UUID"],
FunctionName=FunctionName,
Enabled=Enabled,
BatchSize=BatchSize,
region=region,
key=key,
keyid=keyid,
profile=profile,
)
if not _r.get("updated"):
ret["result"] = False
ret["comment"] = "Failed to update mapping: {}.".format(
_r["error"]["message"]
)
ret["changes"] = {}
return ret
def event_source_mapping_absent(
name, EventSourceArn, FunctionName, region=None, key=None, keyid=None, profile=None
):
"""
Ensure event source mapping with passed properties is absent.
name
The name of the state definition.
EventSourceArn
ARN of the event source.
FunctionName
Name of the lambda function.
region
Region to connect to.
key
Secret key to be used.
keyid
Access key to be used.
profile
A dict with region, key and keyid, or a pillar key (string) that
contains a dict with region, key and keyid.
"""
ret = {"name": None, "result": True, "comment": "", "changes": {}}
desc = __salt__["boto_lambda.describe_event_source_mapping"](
EventSourceArn=EventSourceArn,
FunctionName=FunctionName,
region=region,
key=key,
keyid=keyid,
profile=profile,
)
if "error" in desc:
ret["result"] = False
ret["comment"] = "Failed to delete event source mapping: {}.".format(
desc["error"]["message"]
)
return ret
if not desc.get("event_source_mapping"):
ret["comment"] = "Event source mapping does not exist."
return ret
ret["name"] = desc["event_source_mapping"]["UUID"]
if __opts__["test"]:
ret["comment"] = "Event source mapping is set to be removed."
ret["result"] = None
return ret
r = __salt__["boto_lambda.delete_event_source_mapping"](
EventSourceArn=EventSourceArn,
FunctionName=FunctionName,
region=region,
key=key,
keyid=keyid,
profile=profile,
)
if not r["deleted"]:
ret["result"] = False
ret["comment"] = "Failed to delete event source mapping: {}.".format(
r["error"]["message"]
)
return ret
ret["changes"]["old"] = desc
ret["changes"]["new"] = {"event_source_mapping": None}
ret["comment"] = "Event source mapping deleted."
return ret
Zerion Mini Shell 1.0