-
Notifications
You must be signed in to change notification settings - Fork 435
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Feature/550 lambda eventsourcemapping #1040
Feature/550 lambda eventsourcemapping #1040
Conversation
Provider: "AWS", | ||
Account: client.Name, | ||
Service: "EventSourceMapping", | ||
ResourceId: *mapping.UUID, |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I think we can keep the anr field here instead of UUID, we do that most of the places
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Afaik, eventsourcemapping doesn't really have an arn, it has a UUID. That's because it's essentially an intermediary between the source (eg. SQS or Kinesis) and the lambda function. I can access the source ARN and lambda ARN though.
I've checked the above in the go sdk docs as well, if you find something different let me know and I'll make those changes.
list event source mappings has been needed since tailwarden#1040
* feat: add missing dynamodb action to policy.json describe table has been needed since #1111 * feat: add missing lambda action to policy.json list event source mappings has been needed since #1040 * feat: add missing iam action to policy.json list users has been needed since #991 * fix: correct s3 permission for list buckets api call listbucket iam action is for the contents of a bucket * feat: add missing code suite actions to policy.json needed since #1216, #1229, and #1228
* feat: add missing dynamodb action to policy.json describe table has been needed since #1111 * feat: add missing lambda action to policy.json list event source mappings has been needed since #1040 * feat: add missing iam action to policy.json list users has been needed since #991 * fix: correct s3 permission for list buckets api call listbucket iam action is for the contents of a bucket * feat: add missing code suite actions to policy.json needed since #1216, #1229, and #1228
Problem
Collector for Lambda collector not present
Solution
Add collector for AWS Lambda EventSourceMapping
Changes Made
EventSourceMappings
inproviders/aws/lambda
listOfSupportedServices
inproviders/aws/
How to Test
In your AWS account, create a lambda function that has an SQS queue set as a trigger. With Komiser properly
configured to your account, you should see a
EventSourceMapping
resource appear.Screenshots
Notes
Checklist
Reviewers