FEA-Bench / testbed /aws-powertools__powertools-lambda-python /examples /idempotency /templates /terraform.tf
| terraform { | |
| required_providers { | |
| aws = { | |
| source = "hashicorp/aws" | |
| version = "~> 4.0" | |
| } | |
| } | |
| } | |
| provider "aws" { | |
| region = "us-east-1" # Replace with your desired AWS region | |
| } | |
| resource "aws_dynamodb_table" "IdempotencyTable" { | |
| name = "IdempotencyTable" | |
| billing_mode = "PAY_PER_REQUEST" | |
| hash_key = "id" | |
| attribute { | |
| name = "id" | |
| type = "S" | |
| } | |
| ttl { | |
| attribute_name = "expiration" | |
| enabled = true | |
| } | |
| } | |
| resource "aws_lambda_function" "IdempotencyFunction" { | |
| function_name = "IdempotencyFunction" | |
| role = aws_iam_role.IdempotencyFunctionRole.arn | |
| runtime = "python3.12" | |
| handler = "app.lambda_handler" | |
| filename = "lambda.zip" | |
| } | |
| resource "aws_iam_role" "IdempotencyFunctionRole" { | |
| name = "IdempotencyFunctionRole" | |
| assume_role_policy = jsonencode({ | |
| Version = "2012-10-17" | |
| Statement = [ | |
| { | |
| Sid = "" | |
| Effect = "Allow" | |
| Principal = { | |
| Service = "lambda.amazonaws.com" | |
| } | |
| Action = "sts:AssumeRole" | |
| }, | |
| ] | |
| }) | |
| } | |
| resource "aws_iam_policy" "LambdaDynamoDBPolicy" { | |
| name = "LambdaDynamoDBPolicy" | |
| description = "IAM policy for Lambda function to access DynamoDB" | |
| policy = jsonencode({ | |
| Version = "2012-10-17" | |
| Statement = [ | |
| { | |
| Sid = "AllowDynamodbReadWrite" | |
| Effect = "Allow" | |
| Action = [ | |
| "dynamodb:PutItem", | |
| "dynamodb:GetItem", | |
| "dynamodb:UpdateItem", | |
| "dynamodb:DeleteItem", | |
| ] | |
| Resource = aws_dynamodb_table.IdempotencyTable.arn | |
| }, | |
| ] | |
| }) | |
| } | |
| resource "aws_iam_role_policy_attachment" "IdempotencyFunctionRoleAttachment" { | |
| role = aws_iam_role.IdempotencyFunctionRole.name | |
| policy_arn = aws_iam_policy.LambdaDynamoDBPolicy.arn | |
| } | |