The Lambda version of the tool is a lightweight wrapper around the core cfn-guard code that can simply be invoked as a Lambda.
sudo apt-get update; sudo apt install build-essential
if you haven't alreadymusl-libc
package repository to your yum config (see https://copr.fedorainfracloud.org/coprs/ngompa/musl-libc/)rustup target add x86_64-unknown-linux-musl
.~/.cargo/config
:
[target.x86_64-unknown-linux-musl]
linker = "x86_64-linux-musl-gcc"
guard-lambda
directory.cargo build --release --target x86_64-unknown-linux-musl
. For a custom runtime, AWS Lambda looks for an executable called bootstrap
in the deployment package zip. Rename the generated cfn-lambda
executable to bootstrap
and add it to a zip archive.cp ./../target/x86_64-unknown-linux-musl/release/cfn-guard-lambda ./bootstrap && zip lambda.zip bootstrap && rm bootstrap
.bash
LAMBDA_FUNCTION_NAME=CloudFormationGuardLambda
AWS_ACCOUNT_ID=111111111111
REGION=us-east-1
ROLE_NAME="${LAMBDA_FUNCTION_NAME}Role"
bash
aws iam create-role \
--role-name $ROLE_NAME \
--assume-role-policy-document '{"Version": "2012-10-17","Statement": [{ "Effect": "Allow", "Principal": {"Service": "lambda.amazonaws.com"}, "Action": "sts:AssumeRole"}]}'
cfn-guard
as an AWS Lambda function to your account:
bash
aws lambda create-function \
--function-name $LAMBDA_FUNCTION_NAME \
--handler guard.handler \
--zip-file fileb://./lambda.zip \
--runtime provided \
--role "arn:aws:iam::${AWS_ACCOUNT_ID}:role/${ROLE_NAME}" \
--environment Variables={RUST_BACKTRACE=1} \
--tracing-config Mode=Active \
--region $REGION
The payload JSON to cfn-guard-lambda
requires the following two fields:
* data
- (Mandatory, string) Infrastructure as code template data in YAML or JSON structure.
* rules
- (Mandatory, list of strings) List of rules that you want to run your YAML or JSON structured data against.
* verbose
- (Optional, boolean) A flag when set to false
makes Lambda emit a shorter version of the output. This is set to true
by default for backward compatibility.
cfn-guard-lambda
To invoke the submitted cfn-guard
as an AWS Lambda function run:
bash
aws lambda invoke \
--function-name $LAMBDA_NAME \
--cli-binary-format raw-in-base64-out \
--payload "{"data": "<input data>", "rules" : ["<input rules 1>", "<input rules 2>", ...], "verbose": <true|false>}" \
output.json
bash
aws lambda invoke \
--function-name $LAMBDA_NAME \
--cli-binary-format raw-in-base64-out \
--payload '{"data":"{\"Resources\":{\"NewVolume\":{\"Type\":\"AWS::EC2::Volume\",\"Properties\":{\"Size\":500,\"Encrypted\":true,\"AvailabilityZone\":\"us-west-2b\"}},\"NewVolume2\":{\"Type\":\"AWS::EC2::Volume\",\"Properties\":{\"Size\":50,\"Encrypted\":true,\"AvailabilityZone\":\"us-west-2c\"}}}}","rules":["let ec2_volumes = Resources.*[ Type == /EC2::Volume/ ]\nrule EC2_ENCRYPTION_BY_DEFAULT when %ec2_volumes !empty {\n %ec2_volumes.Properties.Encrypted == true \n <<\n Violation: All EBS Volumes should be encryped \n Fix: Set Encrypted property to true\n >>\n}"],"verbose":false}' \
output.json
Q: How do I troubleshoot a lambda call returning an opaque error message like:
bash
{"errorType": "Runtime.ExitError", "errorMessage": "RequestId: 1c0c0620-0f83-40bc-8eca-3cf2cf24820f Error: Runtime exited with error: exit status 101"}
A: Run the same rule set and template locally with cfn-guard
to get a better message, such as:
bash
Parsing error handling template file, Error = while parsing a flow mapping, did not find expected ',' or '}' at line 21 column 1
cfn-guard-lambda
is just a wrapper for the cfn-guard
code and each can be used to test the other.