Add AWS Lambda module (#1270)
This commit is contained in:
parent
48f079f0f2
commit
abc1a98826
1 changed files with 437 additions and 0 deletions
437
cloud/amazon/lambda.py
Normal file
437
cloud/amazon/lambda.py
Normal file
|
@ -0,0 +1,437 @@
|
|||
#!/usr/bin/python
|
||||
# This file is part of Ansible
|
||||
#
|
||||
# Ansible is free software: you can redistribute it and/or modify
|
||||
# it under the terms of the GNU General Public License as published by
|
||||
# the Free Software Foundation, either version 3 of the License, or
|
||||
# (at your option) any later version.
|
||||
#
|
||||
# Ansible is distributed in the hope that it will be useful,
|
||||
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||
# GNU General Public License for more details.
|
||||
#
|
||||
# You should have received a copy of the GNU General Public License
|
||||
# along with Ansible. If not, see <http://www.gnu.org/licenses/>.
|
||||
|
||||
|
||||
DOCUMENTATION = '''
|
||||
---
|
||||
module: lambda
|
||||
short_description: Manage AWS Lambda functions
|
||||
description:
|
||||
- Allows for the management of Lambda functions.
|
||||
version_added: '2.2'
|
||||
requirements: [ boto3 ]
|
||||
options:
|
||||
name:
|
||||
description:
|
||||
- The name you want to assign to the function you are uploading. Cannot be changed.
|
||||
required: true
|
||||
state:
|
||||
description:
|
||||
- Create or delete Lambda function
|
||||
required: false
|
||||
default: present
|
||||
choices: [ 'present', 'absent' ]
|
||||
runtime:
|
||||
description:
|
||||
- The runtime environment for the Lambda function you are uploading. Required when creating a function. Use parameters as described in boto3 docs. Current example runtime environments are nodejs, nodejs4.3, java8 or python2.7
|
||||
required: true
|
||||
role_arn:
|
||||
description:
|
||||
- The Amazon Resource Name (ARN) of the IAM role that Lambda assumes when it executes your function to access any other Amazon Web Services (AWS) resources
|
||||
default: null
|
||||
handler:
|
||||
description:
|
||||
- The function within your code that Lambda calls to begin execution
|
||||
default: null
|
||||
zip_file:
|
||||
description:
|
||||
- A .zip file containing your deployment package
|
||||
required: false
|
||||
default: null
|
||||
aliases: [ 'src' ]
|
||||
s3_bucket:
|
||||
description:
|
||||
- Amazon S3 bucket name where the .zip file containing your deployment package is stored
|
||||
required: false
|
||||
default: null
|
||||
s3_key:
|
||||
description:
|
||||
- The Amazon S3 object (the deployment package) key name you want to upload
|
||||
required: false
|
||||
default: null
|
||||
s3_object_version:
|
||||
description:
|
||||
- The Amazon S3 object (the deployment package) version you want to upload.
|
||||
required: false
|
||||
default: null
|
||||
description:
|
||||
description:
|
||||
- A short, user-defined function description. Lambda does not use this value. Assign a meaningful description as you see fit.
|
||||
required: false
|
||||
default: null
|
||||
timeout:
|
||||
description:
|
||||
- The function execution time at which Lambda should terminate the function.
|
||||
required: false
|
||||
default: 3
|
||||
memory_size:
|
||||
description:
|
||||
- The amount of memory, in MB, your Lambda function is given
|
||||
required: false
|
||||
default: 128
|
||||
vpc_subnet_ids:
|
||||
description:
|
||||
- List of subnet IDs to run Lambda function in. Use this option if you need to access resources in your VPC. Leave empty if you don't want to run the function in a VPC.
|
||||
required: false
|
||||
default: None
|
||||
vpc_security_group_ids:
|
||||
description:
|
||||
- List of VPC security group IDs to associate with the Lambda function. Required when vpc_subnet_ids is used.
|
||||
required: false
|
||||
default: None
|
||||
notes:
|
||||
- 'Currently this module only supports uploaded code via S3'
|
||||
author:
|
||||
- 'Steyn Huizinga (@steynovich)'
|
||||
extends_documentation_fragment:
|
||||
- aws
|
||||
- ec2
|
||||
'''
|
||||
|
||||
EXAMPLES = '''
|
||||
# Create Lambda functions
|
||||
tasks:
|
||||
- name: looped creation
|
||||
lambda:
|
||||
name: '{{ item.name }}'
|
||||
state: present
|
||||
zip_file: '{{ item.zip_file }}'
|
||||
runtime: 'python2.7'
|
||||
role_arn: 'arn:aws:iam::987654321012:role/lambda_basic_execution'
|
||||
handler: 'hello_python.my_handler'
|
||||
vpc_subnet_ids:
|
||||
- subnet-123abcde
|
||||
- subnet-edcba321
|
||||
vpc_security_group_ids:
|
||||
- sg-123abcde
|
||||
- sg-edcba321
|
||||
with_items:
|
||||
- { name: HelloWorld, zip_file: 'hello-code.zip' }
|
||||
- { name: ByeBye, zip_file: 'bye-code.zip' }
|
||||
|
||||
# Basic Lambda function deletion
|
||||
tasks:
|
||||
- name: Delete Lambda functions HelloWorld and ByeBye
|
||||
lambda:
|
||||
name: '{{ item }}'
|
||||
state: absent
|
||||
with_items:
|
||||
- HelloWorld
|
||||
- ByeBye
|
||||
'''
|
||||
|
||||
RETURN = '''
|
||||
output:
|
||||
description: the data returned by create_function in boto3
|
||||
returned: success
|
||||
type: dict
|
||||
sample:
|
||||
{
|
||||
'FunctionName': 'string',
|
||||
'FunctionArn': 'string',
|
||||
'Runtime': 'nodejs',
|
||||
'Role': 'string',
|
||||
'Handler': 'string',
|
||||
'CodeSize': 123,
|
||||
'Description': 'string',
|
||||
'Timeout': 123,
|
||||
'MemorySize': 123,
|
||||
'LastModified': 'string',
|
||||
'CodeSha256': 'string',
|
||||
'Version': 'string',
|
||||
}
|
||||
'''
|
||||
|
||||
# Import from Python standard library
|
||||
import base64
|
||||
import hashlib
|
||||
|
||||
try:
|
||||
import botocore
|
||||
HAS_BOTOCORE = True
|
||||
except ImportError:
|
||||
HAS_BOTOCORE = False
|
||||
|
||||
try:
|
||||
import boto3
|
||||
HAS_BOTO3 = True
|
||||
except ImportError:
|
||||
HAS_BOTO3 = False
|
||||
|
||||
|
||||
def get_current_function(connection, function_name):
|
||||
try:
|
||||
return connection.get_function(FunctionName=function_name)
|
||||
except botocore.exceptions.ClientError as e:
|
||||
return False
|
||||
|
||||
|
||||
def sha256sum(filename):
|
||||
hasher = hashlib.sha256()
|
||||
with open(filename, 'rb') as f:
|
||||
hasher.update(f.read())
|
||||
|
||||
code_hash = hasher.digest()
|
||||
code_b64 = base64.b64encode(code_hash)
|
||||
hex_digest = code_b64.decode('utf-8')
|
||||
|
||||
return hex_digest
|
||||
|
||||
|
||||
def main():
|
||||
argument_spec = ec2_argument_spec()
|
||||
argument_spec.update(dict(
|
||||
name=dict(type='str', required=True),
|
||||
state=dict(type='str', default='present', choices=['present', 'absent']),
|
||||
runtime=dict(type='str', required=True),
|
||||
role_arn=dict(type='str', default=None),
|
||||
handler=dict(type='str', default=None),
|
||||
zip_file=dict(type='str', default=None, aliases=['src']),
|
||||
s3_bucket=dict(type='str'),
|
||||
s3_key=dict(type='str'),
|
||||
s3_object_version=dict(type='str', default=None),
|
||||
description=dict(type='str', default=''),
|
||||
timeout=dict(type='int', default=3),
|
||||
memory_size=dict(type='int', default=128),
|
||||
vpc_subnet_ids=dict(type='list', default=None),
|
||||
vpc_security_group_ids=dict(type='list', default=None),
|
||||
)
|
||||
)
|
||||
|
||||
mutually_exclusive = [['zip_file', 's3_key'],
|
||||
['zip_file', 's3_bucket'],
|
||||
['zip_file', 's3_object_version']]
|
||||
|
||||
required_together = [['s3_key', 's3_bucket', 's3_object_version'],
|
||||
['vpc_subnet_ids', 'vpc_security_group_ids']]
|
||||
|
||||
module = AnsibleModule(argument_spec=argument_spec,
|
||||
supports_check_mode=True,
|
||||
mutually_exclusive=mutually_exclusive,
|
||||
required_together=required_together)
|
||||
|
||||
name = module.params.get('name')
|
||||
state = module.params.get('state').lower()
|
||||
runtime = module.params.get('runtime')
|
||||
role_arn = module.params.get('role_arn')
|
||||
handler = module.params.get('handler')
|
||||
s3_bucket = module.params.get('s3_bucket')
|
||||
s3_key = module.params.get('s3_key')
|
||||
s3_object_version = module.params.get('s3_object_version')
|
||||
zip_file = module.params.get('zip_file')
|
||||
description = module.params.get('description')
|
||||
timeout = module.params.get('timeout')
|
||||
memory_size = module.params.get('memory_size')
|
||||
vpc_subnet_ids = module.params.get('vpc_subnet_ids')
|
||||
vpc_security_group_ids = module.params.get('vpc_security_group_ids')
|
||||
|
||||
check_mode = module.check_mode
|
||||
changed = False
|
||||
|
||||
if not HAS_BOTOCORE:
|
||||
module.fail_json(msg='Python module "botocore" is missing, please install it')
|
||||
|
||||
if not HAS_BOTO3:
|
||||
module.fail_json(msg='Python module "boto3" is missing, please install it')
|
||||
|
||||
region, ec2_url, aws_connect_kwargs = get_aws_connection_info(module, boto3=True)
|
||||
if not region:
|
||||
module.fail_json(msg='region must be specified')
|
||||
|
||||
try:
|
||||
client = boto3_conn(module, conn_type='client', resource='lambda',
|
||||
region=region, endpoint=ec2_url, **aws_connect_kwargs)
|
||||
except (botocore.exceptions.ClientError, botocore.exceptions.ValidationError) as e:
|
||||
module.fail_json(msg=str(e))
|
||||
|
||||
# Get function configuration if present, False otherwise
|
||||
current_function = get_current_function(client, name)
|
||||
|
||||
# Update existing Lambda function
|
||||
if state == 'present' and current_function:
|
||||
|
||||
# Get current state
|
||||
current_config = current_function['Configuration']
|
||||
|
||||
# Update function configuration
|
||||
func_kwargs = {'FunctionName': name}
|
||||
|
||||
# Update configuration if needed
|
||||
if role_arn and current_config['Role'] != role_arn:
|
||||
func_kwargs.update({'Role': role_arn})
|
||||
if handler and current_config['Handler'] != handler:
|
||||
func_kwargs.update({'Handler': handler})
|
||||
if description and current_config['Description'] != description:
|
||||
func_kwargs.update({'Description': description})
|
||||
if timeout and current_config['Timeout'] != timeout:
|
||||
func_kwargs.update({'Timeout': timeout})
|
||||
if memory_size and current_config['MemorySize'] != memory_size:
|
||||
func_kwargs.update({'MemorySize': memory_size})
|
||||
|
||||
# Check for unsupported mutation
|
||||
if current_config['Runtime'] != runtime:
|
||||
module.fail_json(msg='Cannot change runtime. Please recreate the function')
|
||||
|
||||
# If VPC configuration is desired
|
||||
if vpc_subnet_ids or vpc_security_group_ids:
|
||||
if len(vpc_subnet_ids) < 1:
|
||||
module.fail_json(msg='At least 1 subnet is required')
|
||||
|
||||
if len(vpc_security_group_ids) < 1:
|
||||
module.fail_json(msg='At least 1 security group is required')
|
||||
|
||||
if 'VpcConfig' in current_config:
|
||||
# Compare VPC config with current config
|
||||
current_vpc_subnet_ids = current_config['VpcConfig']['SubnetIds']
|
||||
current_vpc_security_group_ids = current_config['VpcConfig']['SecurityGroupIds']
|
||||
|
||||
subnet_net_id_changed = sorted(vpc_subnet_ids) != sorted(current_vpc_subnet_ids)
|
||||
vpc_security_group_ids_changed = sorted(vpc_security_group_ids) != sorted(current_vpc_security_group_ids)
|
||||
|
||||
if any((subnet_net_id_changed, vpc_security_group_ids_changed)):
|
||||
func_kwargs.update({'VpcConfig':
|
||||
{'SubnetIds': vpc_subnet_ids,'SecurityGroupIds': vpc_security_group_ids}})
|
||||
else:
|
||||
# No VPC configuration is desired, assure VPC config is empty when present in current config
|
||||
if ('VpcConfig' in current_config and
|
||||
'VpcId' in current_config['VpcConfig'] and
|
||||
current_config['VpcConfig']['VpcId'] != ''):
|
||||
func_kwargs.update({'VpcConfig':{'SubnetIds': [], 'SecurityGroupIds': []}})
|
||||
|
||||
# Upload new configuration if configuration has changed
|
||||
if len(func_kwargs) > 1:
|
||||
try:
|
||||
if not check_mode:
|
||||
client.update_function_configuration(**func_kwargs)
|
||||
changed = True
|
||||
except (botocore.exceptions.ParamValidationError, botocore.exceptions.ClientError) as e:
|
||||
module.fail_json(msg=str(e))
|
||||
|
||||
# Update code configuration
|
||||
code_kwargs = {'FunctionName': name}
|
||||
|
||||
# Update S3 location
|
||||
if s3_bucket and s3_key:
|
||||
# If function is stored on S3 always update
|
||||
code_kwargs.update({'S3Bucket': s3_bucket, 'S3Key': s3_key})
|
||||
|
||||
# If S3 Object Version is given
|
||||
if s3_object_version:
|
||||
code_kwargs.update({'S3ObjectVersion': s3_object_version})
|
||||
|
||||
# Compare local checksum, update remote code when different
|
||||
elif zip_file:
|
||||
local_checksum = sha256sum(zip_file)
|
||||
remote_checksum = current_config['CodeSha256']
|
||||
|
||||
# Only upload new code when local code is different compared to the remote code
|
||||
if local_checksum != remote_checksum:
|
||||
try:
|
||||
with open(zip_file, 'rb') as f:
|
||||
encoded_zip = f.read()
|
||||
code_kwargs.update({'ZipFile': encoded_zip})
|
||||
except IOError as e:
|
||||
module.fail_json(msg=str(e))
|
||||
|
||||
# Upload new code if needed (e.g. code checksum has changed)
|
||||
if len(code_kwargs) > 1:
|
||||
try:
|
||||
if not check_mode:
|
||||
client.update_function_code(**code_kwargs)
|
||||
changed = True
|
||||
except (botocore.exceptions.ParamValidationError, botocore.exceptions.ClientError) as e:
|
||||
module.fail_json(msg=str(e))
|
||||
|
||||
# Describe function code and configuration
|
||||
response = get_current_function(client, name)
|
||||
if not response:
|
||||
module.fail_json(msg='Unable to get function information after updating')
|
||||
|
||||
# We're done
|
||||
module.exit_json(changed=changed, result=camel_dict_to_snake_dict(response))
|
||||
|
||||
# Function doesn't exists, create new Lambda function
|
||||
elif state == 'present':
|
||||
if s3_bucket and s3_key:
|
||||
# If function is stored on S3
|
||||
code = {'S3Bucket': s3_bucket,
|
||||
'S3Key': s3_key}
|
||||
if s3_object_version:
|
||||
code.update({'S3ObjectVersion': s3_object_version})
|
||||
elif zip_file:
|
||||
# If function is stored in local zipfile
|
||||
try:
|
||||
with open(zip_file, 'rb') as f:
|
||||
zip_content = f.read()
|
||||
|
||||
code = {'ZipFile': zip_content}
|
||||
except IOError as e:
|
||||
module.fail_json(msg=str(e))
|
||||
|
||||
else:
|
||||
module.fail_json(msg='Either S3 object or path to zipfile required')
|
||||
|
||||
func_kwargs = {'FunctionName': name,
|
||||
'Description': description,
|
||||
'Runtime': runtime,
|
||||
'Role': role_arn,
|
||||
'Handler': handler,
|
||||
'Code': code,
|
||||
'Timeout': timeout,
|
||||
'MemorySize': memory_size,
|
||||
}
|
||||
|
||||
# If VPC configuration is given
|
||||
if vpc_subnet_ids or vpc_security_group_ids:
|
||||
if len(vpc_subnet_ids) < 1:
|
||||
module.fail_json(msg='At least 1 subnet is required')
|
||||
|
||||
if len(vpc_security_group_ids) < 1:
|
||||
module.fail_json(msg='At least 1 security group is required')
|
||||
|
||||
func_kwargs.update({'VpcConfig': {'SubnetIds': vpc_subnet_ids,
|
||||
'SecurityGroupIds': vpc_security_group_ids}})
|
||||
|
||||
# Finally try to create function
|
||||
try:
|
||||
if not check_mode:
|
||||
response = client.create_function(**func_kwargs)
|
||||
changed = True
|
||||
except (botocore.exceptions.ParamValidationError, botocore.exceptions.ClientError) as e:
|
||||
module.fail_json(msg=str(e))
|
||||
|
||||
module.exit_json(changed=changed, result=camel_dict_to_snake_dict(response))
|
||||
|
||||
# Delete existing Lambda function
|
||||
if state == 'absent' and current_function:
|
||||
try:
|
||||
if not check_mode:
|
||||
client.delete_function(FunctionName=name)
|
||||
changed = True
|
||||
except (botocore.exceptions.ParamValidationError, botocore.exceptions.ClientError) as e:
|
||||
module.fail_json(msg=str(e))
|
||||
|
||||
module.exit_json(changed=changed)
|
||||
|
||||
# Function already absent, do nothing
|
||||
elif state == 'absent':
|
||||
module.exit_json(changed=changed)
|
||||
|
||||
|
||||
from ansible.module_utils.basic import *
|
||||
from ansible.module_utils.ec2 import *
|
||||
|
||||
main()
|
Loading…
Reference in a new issue