Используя AWS Усилив CLI, я создал функцию Lambda для своего проекта. Он создал шаблон Cloudformation как часть этого процесса. Я редактирую шаблон, добавляю правило IoT для запуска лямбда-функции. Само имя функции меняется в зависимости от среды, наряду с лямбда-функцией ARN, которую я пытаюсь настроить в разделе правил IoT.
Вот раздел, над которым я сейчас работаю:
"IoTRuleS3RequestSignedUrl": {
"Type": "AWS::IoT::TopicRule",
"Properties": {
"RuleName": "twinTigerSecurityS3SignedUrlRequests",
"TopicRulePayload": {
"Actions": [
{
"Lambda": {
"FunctionArn": "HOW DO I REFERENCE THIS DYNAMIC ARN?"
}
}
],
"Description": "Get S3 bucket signed URL to upload image directly to S3.",
"RuleDisabled": false,
"Sql": "SELECT operation, bucket, key, replyTo FROM 'iot/topic'"
}
}
}
Вот полный шаблон в процессе разработки:
{
"AWSTemplateFormatVersion": "2010-09-09",
"Description": "Lambda resource stack creation using Amplify CLI",
"Parameters": {
"CloudWatchRule": {
"Type": "String",
"Default" : "NONE",
"Description" : " Schedule Expression"
},
"env": {
"Type": "String"
}
},
"Conditions": {
"ShouldNotCreateEnvResources": {
"Fn::Equals": [
{
"Ref": "env"
},
"NONE"
]
}
},
"Resources": {
"LambdaFunction": {
"Type": "AWS::Lambda::Function",
"Metadata": {
"aws:asset:path": "./src",
"aws:asset:property": "Code"
},
"Properties": {
"Handler": "index.handler",
"FunctionName": {
"Fn::If": [
"ShouldNotCreateEnvResources",
"twinTigerSecurityRequestS3SignedUrl",
{
"Fn::Join": [
"",
[
"twinTigerSecurityRequestS3SignedUrl",
"-",
{
"Ref": "env"
}
]
]
}
]
},
"Environment": {
"Variables" : {
"ENV": {
"Ref": "env"
},
"REGION": {
"Ref": "AWS::Region"
}
}
},
"Role": { "Fn::GetAtt" : ["LambdaExecutionRole", "Arn"] },
"Runtime": "nodejs12.x",
"Timeout": "25"
}
},
"LambdaExecutionRole": {
"Type": "AWS::IAM::Role",
"Properties": {
"RoleName": {
"Fn::If": [
"ShouldNotCreateEnvResources",
"twintigersecurityLambdaRolebf1a383b",
{
"Fn::Join": [
"",
[
"twintigersecurityLambdaRolebf1a383b",
"-",
{
"Ref": "env"
}
]
]
}
]
},
"AssumeRolePolicyDocument": {
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Principal": {
"Service": [
"lambda.amazonaws.com"
]
},
"Action": [
"sts:AssumeRole"
]
}
]
}
}
}
,"lambdaexecutionpolicy": {
"DependsOn": ["LambdaExecutionRole"],
"Type": "AWS::IAM::Policy",
"Properties": {
"PolicyName": "lambda-execution-policy",
"Roles": [{ "Ref": "LambdaExecutionRole" }],
"PolicyDocument": {
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Action":["logs:CreateLogGroup",
"logs:CreateLogStream",
"logs:PutLogEvents"],
"Resource": { "Fn::Sub" : [ "arn:aws:logs:${region}:${account}:log-group:/aws/lambda/${lambda}:log-stream:*", { "region": {"Ref": "AWS::Region"}, "account": {"Ref": "AWS::AccountId"}, "lambda": {"Ref": "LambdaFunction"}} ]}
}
]
}
}
},
"IoTRuleS3RequestSignedUrl": {
"Type": "AWS::IoT::TopicRule",
"Properties": {
"RuleName": "twinTigerSecurityS3SignedUrlRequests",
"TopicRulePayload": {
"Actions": [
{
"Lambda": {
"FunctionArn": "HOW DO I REFERENCE THIS DYNAMIC ARN?"
}
}
],
"Description": "Get S3 bucket signed URL to upload image directly to S3.",
"RuleDisabled": false,
"Sql": "SELECT operation, bucket, key, replyTo FROM 'iot/topic'"
}
}
}
},
"Outputs": {
"Name": {
"Value": {
"Ref": "LambdaFunction"
}
},
"Arn": {
"Value": {"Fn::GetAtt": ["LambdaFunction", "Arn"]}
},
"Region": {
"Value": {
"Ref": "AWS::Region"
}
},
"LambdaExecutionRole": {
"Value": {
"Ref": "LambdaExecutionRole"
}
}
}
}
Я мог бы сделать это в пользовательском интерфейсе, однако это не идеальная долгосрочная задача и не конфигурация с помощью кода, предоставляемого Amplify / Cloudformation. Как лучше всего ссылаться на функцию Lambda из правила IoT?