serverless
Version:
Serverless Framework - Build web, mobile and IoT applications with serverless architectures using AWS Lambda, Azure Functions, Google CloudFunctions & more
214 lines (194 loc) • 6.72 kB
JavaScript
'use strict';
class AwsCompileKafkaEvents {
constructor(serverless) {
this.serverless = serverless;
this.provider = this.serverless.getProvider('aws');
this.hooks = {
'package:compileEvents': this.compileKafkaEvents.bind(this),
};
const secretsManagerArnRegex =
'arn:[a-z-]+:secretsmanager:[a-z0-9-]+:\\d+:secret:[A-Za-z0-9/_+=.@-]+';
this.serverless.configSchemaHandler.defineFunctionEvent('aws', 'kafka', {
type: 'object',
properties: {
accessConfigurations: {
type: 'object',
minProperties: 1,
properties: {
vpcSubnet: {
type: 'array',
minItems: 1,
items: {
type: 'string',
pattern: 'subnet-[a-z0-9]+',
},
},
vpcSecurityGroup: {
type: 'array',
minItems: 1,
items: {
type: 'string',
pattern: 'sg-[a-z0-9]+',
},
},
saslScram256Auth: {
type: 'array',
minItems: 1,
items: {
type: 'string',
pattern: secretsManagerArnRegex,
},
},
saslScram512Auth: {
type: 'array',
minItems: 1,
items: {
type: 'string',
pattern: secretsManagerArnRegex,
},
},
},
additionalProperties: false,
},
batchSize: {
type: 'number',
minimum: 1,
maximum: 10000,
},
enabled: {
type: 'boolean',
},
bootstrapServers: {
type: 'array',
minItems: 1,
items: {
type: 'string',
},
},
startingPosition: {
type: 'string',
enum: ['LATEST', 'TRIM_HORIZON'],
},
topic: {
type: 'string',
},
},
additionalProperties: false,
required: ['accessConfigurations', 'bootstrapServers', 'topic'],
});
}
compileKafkaEvents() {
this.serverless.service.getAllFunctions().forEach((functionName) => {
const functionObj = this.serverless.service.getFunction(functionName);
const cfTemplate = this.serverless.service.provider.compiledCloudFormationTemplate;
// It is required to add the following statement in order to be able to connect to Kafka cluster
const ec2Statement = {
Effect: 'Allow',
Action: [
'ec2:CreateNetworkInterface',
'ec2:DescribeNetworkInterfaces',
'ec2:DescribeVpcs',
'ec2:DeleteNetworkInterface',
'ec2:DescribeSubnets',
'ec2:DescribeSecurityGroups',
],
Resource: '*',
};
// The omission of kms:Decrypt is intentional, since we won't know
// which resources should be valid to decrypt. It's also probably
// not best practice to allow '*' for this.
const secretsManagerStatement = {
Effect: 'Allow',
Action: ['secretsmanager:GetSecretValue'],
Resource: [],
};
let hasKafkaEvent = false;
let needsEc2Permissions = false;
functionObj.events.forEach((event) => {
if (!event.kafka) return;
hasKafkaEvent = true;
const { topic, batchSize, enabled } = event.kafka;
const startingPosition = event.kafka.startingPosition || 'TRIM_HORIZON';
const kafkaEventLogicalId = this.provider.naming.getKafkaEventLogicalId(
functionName,
topic
);
const lambdaLogicalId = this.provider.naming.getLambdaLogicalId(functionName);
const dependsOn = this.provider.resolveFunctionIamRoleResourceName(functionObj) || [];
const kafkaResource = {
Type: 'AWS::Lambda::EventSourceMapping',
DependsOn: dependsOn,
Properties: {
FunctionName: {
'Fn::GetAtt': [lambdaLogicalId, 'Arn'],
},
StartingPosition: startingPosition,
SelfManagedEventSource: {
Endpoints: { KafkaBootstrapServers: event.kafka.bootstrapServers },
},
Topics: [topic],
},
};
kafkaResource.Properties.SourceAccessConfigurations = [];
Object.entries(event.kafka.accessConfigurations).forEach(
([accessConfigurationType, accessConfigurationValues]) => {
let type;
let prefix = '';
let needsSecretsManagerPermissions = false;
switch (accessConfigurationType) {
case 'vpcSubnet':
type = 'VPC_SUBNET';
prefix = 'subnet:';
needsEc2Permissions = true;
break;
case 'vpcSecurityGroup':
type = 'VPC_SECURITY_GROUP';
prefix = 'security_group:';
needsEc2Permissions = true;
break;
case 'saslScram256Auth':
type = 'SASL_SCRAM_256_AUTH';
needsSecretsManagerPermissions = true;
break;
case 'saslScram512Auth':
type = 'SASL_SCRAM_512_AUTH';
needsSecretsManagerPermissions = true;
break;
default:
type = accessConfigurationType;
}
accessConfigurationValues.forEach((accessConfigurationValue) => {
if (needsSecretsManagerPermissions) {
secretsManagerStatement.Resource.push(accessConfigurationValue);
}
kafkaResource.Properties.SourceAccessConfigurations.push({
Type: type,
URI: `${prefix}${accessConfigurationValue}`,
});
});
}
);
if (batchSize) {
kafkaResource.Properties.BatchSize = batchSize;
}
if (enabled != null) {
kafkaResource.Properties.Enabled = enabled;
}
cfTemplate.Resources[kafkaEventLogicalId] = kafkaResource;
});
// https://docs.aws.amazon.com/lambda/latest/dg/smaa-permissions.html
if (cfTemplate.Resources.IamRoleLambdaExecution && hasKafkaEvent) {
const statement =
cfTemplate.Resources.IamRoleLambdaExecution.Properties.Policies[0].PolicyDocument
.Statement;
if (secretsManagerStatement.Resource.length) {
statement.push(secretsManagerStatement);
}
if (needsEc2Permissions) {
statement.push(ec2Statement);
}
}
});
}
}
module.exports = AwsCompileKafkaEvents;