The Lambda version of the tool is a lightweight wrapper around the core cfn-guard code that can simply be invoked as a Lambda.
sudo apt-get update; sudo apt install build-essential
if you haven't alreadymusl-libc
package repository to your yum config (see https://copr.fedorainfracloud.org/coprs/ngompa/musl-libc/)rustup target add x86_64-unknown-linux-musl
.~/.cargo/config
:
[target.x86_64-unknown-linux-musl]
linker = "x86_64-linux-musl-gcc"
guard-lambda
directorycargo build --release --target x86_64-unknown-linux-musl
. For a custom runtime, AWS Lambda looks for an executable called bootstrap
in the deployment package zip. Rename the generated cfn-lambda
executable to bootstrap
and add it to a zip archive.cp ./../target/x86_64-unknown-linux-musl/release/cfn-guard-lambda ./bootstrap && zip lambda.zip bootstrap && rm bootstrap
.bash
aws lambda create-function --function-name cfnGuardLambda \
--handler guard.handler \
--zip-file fileb://./lambda.zip \
--runtime provided \
--role arn:aws:iam::XXXXXXXXXXXXX:role/your_lambda_execution_role \
--environment Variables={RUST_BACKTRACE=1} \
--tracing-config Mode=Active
The payload JSON to cfn-guard-lambda
requires the following two fields:
* data
- String version of the YAML or JSON structured data
* rules
- List of string version of rules files that you want to run your YAML or JSON structured data against.
cfn-guard-lambda
To invoke the submitted cfn-guard as a AWS Lambda function run:
bash
aws lambda invoke --function-name cfnGuardLambda \
--payload "{"data": "<input data>", "rules" : ["<input rules 1>", "<input rules 2>", ...]}" \
output.json
The above works for AWS CLI version 1. If you are planning to use the AWS CLI version 2 please refer to the Migrating from AWS CLI version 1 to version 2 document for changes required to the above command.
bash
aws lambda invoke --function-name cfnGuard --payload '{"data": "{\"Resources\":{\"NewVolume\":{\"Type\":\"AWS::EC2::Volume\",\"Properties\":{\"Size\":500,\"Encrypted\":false,\"AvailabilityZone\":\"us-west-2b\"}},\"NewVolume2\":{\"Type\":\"AWS::EC2::Volume\",\"Properties\":{\"Size\":50,\"Encrypted\":false,\"AvailabilityZone\":\"us-west-2c\"}}}}", "rules" : [ "Resources.*[ Type == /EC2::Volume/ ].Properties.Encrypted == false" ]}' output.json
Q: How do I troubleshoot a lambda call returning an opaque error message like:
```bash
{"errorType": "Runtime.ExitError", "errorMessage": "RequestId: 1c0c0620-0f83-40bc-8eca-3cf2cf24820f Error: Runtime exited with error: exit status 101"}
```
Run the same rule set and template locally with
cfn-guard
to get a better message:
```bash
Parsing error handling template file, Error = while parsing a flow mapping, did not find expected ',' or '}' at line 21 column 1
```
cfn-guard-lambda
is just a wrapper for thecfn-guard
code and each can be used to test the other.