diff --git a/lambda-ssm-parameter-terraform/.gitignore b/lambda-ssm-parameter-terraform/.gitignore new file mode 100644 index 000000000..fb7595fad --- /dev/null +++ b/lambda-ssm-parameter-terraform/.gitignore @@ -0,0 +1 @@ +lambda.zip diff --git a/lambda-ssm-parameter-terraform/main.tf b/lambda-ssm-parameter-terraform/main.tf index 00994f5df..ff915c4ab 100644 --- a/lambda-ssm-parameter-terraform/main.tf +++ b/lambda-ssm-parameter-terraform/main.tf @@ -2,7 +2,7 @@ terraform { required_providers { aws = { source = "hashicorp/aws" - version = "~> 4.22" + version = "~> 5.0" } } @@ -31,7 +31,7 @@ resource "aws_lambda_function" "lambda_function" { source_code_hash = data.archive_file.lambda_zip_file.output_base64sha256 handler = "app.handler" role = aws_iam_role.lambda_iam_role.arn - runtime = "nodejs16.x" + runtime = "nodejs22.x" environment { variables = { SSMParameterName = var.ssm_parameter_name @@ -50,11 +50,7 @@ data "aws_iam_policy" "lambda_basic_execution_role_policy" { } resource "aws_iam_role" "lambda_iam_role" { - name_prefix = "LambdaSSMParameterRole-" - managed_policy_arns = [ - data.aws_iam_policy.lambda_basic_execution_role_policy.arn, - aws_iam_policy.lambda_policy.arn - ] + name_prefix = "LambdaSSMParameterRole-" assume_role_policy = < { try { @@ -34,12 +37,12 @@ exports.handler = async (event, context) => { Overwrite: true, Type: "String", }; - result = await ssm.putParameter(ssmPutParams).promise() + result = await ssmClient.send(new PutParameterCommand(ssmPutParams)) } else if (method == "GET") { const ssmGetParams = { Name: parameterName, }; - result = await ssm.getParameter(ssmGetParams).promise() + result = await ssmClient.send(new GetParameterCommand(ssmGetParams)) } else { result = "Method not supported" } @@ -57,4 +60,4 @@ exports.handler = async (event, context) => { console.error(error); throw new Error(error); } -} \ No newline at end of file +}