All Downloads are FREE. Search and download functionalities are using the official Maven repository.

com.pulumi.aws.lambda.kotlin.Permission.kt Maven / Gradle / Ivy

Go to download

Build cloud applications and infrastructure by combining the safety and reliability of infrastructure as code with the power of the Kotlin programming language.

There is a newer version: 6.66.3.0
Show newest version
@file:Suppress("NAME_SHADOWING", "DEPRECATION")

package com.pulumi.aws.lambda.kotlin

import com.pulumi.core.Output
import com.pulumi.kotlin.KotlinCustomResource
import com.pulumi.kotlin.PulumiTagMarker
import com.pulumi.kotlin.ResourceMapper
import com.pulumi.kotlin.options.CustomResourceOptions
import com.pulumi.kotlin.options.CustomResourceOptionsBuilder
import com.pulumi.resources.Resource
import kotlin.Boolean
import kotlin.String
import kotlin.Suppress
import kotlin.Unit

/**
 * Builder for [Permission].
 */
@PulumiTagMarker
public class PermissionResourceBuilder internal constructor() {
    public var name: String? = null

    public var args: PermissionArgs = PermissionArgs()

    public var opts: CustomResourceOptions = CustomResourceOptions()

    /**
     * @param name The _unique_ name of the resulting resource.
     */
    public fun name(`value`: String) {
        this.name = value
    }

    /**
     * @param block The arguments to use to populate this resource's properties.
     */
    public suspend fun args(block: suspend PermissionArgsBuilder.() -> Unit) {
        val builder = PermissionArgsBuilder()
        block(builder)
        this.args = builder.build()
    }

    /**
     * @param block A bag of options that control this resource's behavior.
     */
    public suspend fun opts(block: suspend CustomResourceOptionsBuilder.() -> Unit) {
        this.opts = com.pulumi.kotlin.options.CustomResourceOptions.opts(block)
    }

    internal fun build(): Permission {
        val builtJavaResource = com.pulumi.aws.lambda.Permission(
            this.name,
            this.args.toJava(),
            this.opts.toJava(),
        )
        return Permission(builtJavaResource)
    }
}

/**
 * Gives an external source (like an EventBridge Rule, SNS, or S3) permission to access the Lambda function.
 * ## Example Usage
 * ### Basic Usage
 * 
 * ```typescript
 * import * as pulumi from "@pulumi/pulumi";
 * import * as aws from "@pulumi/aws";
 * const iamForLambda = new aws.iam.Role("iam_for_lambda", {
 *     name: "iam_for_lambda",
 *     assumeRolePolicy: JSON.stringify({
 *         Version: "2012-10-17",
 *         Statement: [{
 *             Action: "sts:AssumeRole",
 *             Effect: "Allow",
 *             Sid: "",
 *             Principal: {
 *                 Service: "lambda.amazonaws.com",
 *             },
 *         }],
 *     }),
 * });
 * const testLambda = new aws.lambda.Function("test_lambda", {
 *     code: new pulumi.asset.FileArchive("lambdatest.zip"),
 *     name: "lambda_function_name",
 *     role: iamForLambda.arn,
 *     handler: "exports.handler",
 *     runtime: aws.lambda.Runtime.NodeJS16dX,
 * });
 * const testAlias = new aws.lambda.Alias("test_alias", {
 *     name: "testalias",
 *     description: "a sample description",
 *     functionName: testLambda.name,
 *     functionVersion: "$LATEST",
 * });
 * const allowCloudwatch = new aws.lambda.Permission("allow_cloudwatch", {
 *     statementId: "AllowExecutionFromCloudWatch",
 *     action: "lambda:InvokeFunction",
 *     "function": testLambda.name,
 *     principal: "events.amazonaws.com",
 *     sourceArn: "arn:aws:events:eu-west-1:111122223333:rule/RunDaily",
 *     qualifier: testAlias.name,
 * });
 * ```
 * ```python
 * import pulumi
 * import json
 * import pulumi_aws as aws
 * iam_for_lambda = aws.iam.Role("iam_for_lambda",
 *     name="iam_for_lambda",
 *     assume_role_policy=json.dumps({
 *         "Version": "2012-10-17",
 *         "Statement": [{
 *             "Action": "sts:AssumeRole",
 *             "Effect": "Allow",
 *             "Sid": "",
 *             "Principal": {
 *                 "Service": "lambda.amazonaws.com",
 *             },
 *         }],
 *     }))
 * test_lambda = aws.lambda_.Function("test_lambda",
 *     code=pulumi.FileArchive("lambdatest.zip"),
 *     name="lambda_function_name",
 *     role=iam_for_lambda.arn,
 *     handler="exports.handler",
 *     runtime=aws.lambda_.Runtime.NODE_JS16D_X)
 * test_alias = aws.lambda_.Alias("test_alias",
 *     name="testalias",
 *     description="a sample description",
 *     function_name=test_lambda.name,
 *     function_version="$LATEST")
 * allow_cloudwatch = aws.lambda_.Permission("allow_cloudwatch",
 *     statement_id="AllowExecutionFromCloudWatch",
 *     action="lambda:InvokeFunction",
 *     function=test_lambda.name,
 *     principal="events.amazonaws.com",
 *     source_arn="arn:aws:events:eu-west-1:111122223333:rule/RunDaily",
 *     qualifier=test_alias.name)
 * ```
 * ```csharp
 * using System.Collections.Generic;
 * using System.Linq;
 * using System.Text.Json;
 * using Pulumi;
 * using Aws = Pulumi.Aws;
 * return await Deployment.RunAsync(() =>
 * {
 *     var iamForLambda = new Aws.Iam.Role("iam_for_lambda", new()
 *     {
 *         Name = "iam_for_lambda",
 *         AssumeRolePolicy = JsonSerializer.Serialize(new Dictionary
 *         {
 *             ["Version"] = "2012-10-17",
 *             ["Statement"] = new[]
 *             {
 *                 new Dictionary
 *                 {
 *                     ["Action"] = "sts:AssumeRole",
 *                     ["Effect"] = "Allow",
 *                     ["Sid"] = "",
 *                     ["Principal"] = new Dictionary
 *                     {
 *                         ["Service"] = "lambda.amazonaws.com",
 *                     },
 *                 },
 *             },
 *         }),
 *     });
 *     var testLambda = new Aws.Lambda.Function("test_lambda", new()
 *     {
 *         Code = new FileArchive("lambdatest.zip"),
 *         Name = "lambda_function_name",
 *         Role = iamForLambda.Arn,
 *         Handler = "exports.handler",
 *         Runtime = Aws.Lambda.Runtime.NodeJS16dX,
 *     });
 *     var testAlias = new Aws.Lambda.Alias("test_alias", new()
 *     {
 *         Name = "testalias",
 *         Description = "a sample description",
 *         FunctionName = testLambda.Name,
 *         FunctionVersion = "$LATEST",
 *     });
 *     var allowCloudwatch = new Aws.Lambda.Permission("allow_cloudwatch", new()
 *     {
 *         StatementId = "AllowExecutionFromCloudWatch",
 *         Action = "lambda:InvokeFunction",
 *         Function = testLambda.Name,
 *         Principal = "events.amazonaws.com",
 *         SourceArn = "arn:aws:events:eu-west-1:111122223333:rule/RunDaily",
 *         Qualifier = testAlias.Name,
 *     });
 * });
 * ```
 * ```go
 * package main
 * import (
 * 	"encoding/json"
 * 	"github.com/pulumi/pulumi-aws/sdk/v6/go/aws/iam"
 * 	"github.com/pulumi/pulumi-aws/sdk/v6/go/aws/lambda"
 * 	"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
 * )
 * func main() {
 * 	pulumi.Run(func(ctx *pulumi.Context) error {
 * 		tmpJSON0, err := json.Marshal(map[string]interface{}{
 * 			"Version": "2012-10-17",
 * 			"Statement": []map[string]interface{}{
 * 				map[string]interface{}{
 * 					"Action": "sts:AssumeRole",
 * 					"Effect": "Allow",
 * 					"Sid":    "",
 * 					"Principal": map[string]interface{}{
 * 						"Service": "lambda.amazonaws.com",
 * 					},
 * 				},
 * 			},
 * 		})
 * 		if err != nil {
 * 			return err
 * 		}
 * 		json0 := string(tmpJSON0)
 * 		iamForLambda, err := iam.NewRole(ctx, "iam_for_lambda", &iam.RoleArgs{
 * 			Name:             pulumi.String("iam_for_lambda"),
 * 			AssumeRolePolicy: pulumi.String(json0),
 * 		})
 * 		if err != nil {
 * 			return err
 * 		}
 * 		testLambda, err := lambda.NewFunction(ctx, "test_lambda", &lambda.FunctionArgs{
 * 			Code:    pulumi.NewFileArchive("lambdatest.zip"),
 * 			Name:    pulumi.String("lambda_function_name"),
 * 			Role:    iamForLambda.Arn,
 * 			Handler: pulumi.String("exports.handler"),
 * 			Runtime: pulumi.String(lambda.RuntimeNodeJS16dX),
 * 		})
 * 		if err != nil {
 * 			return err
 * 		}
 * 		testAlias, err := lambda.NewAlias(ctx, "test_alias", &lambda.AliasArgs{
 * 			Name:            pulumi.String("testalias"),
 * 			Description:     pulumi.String("a sample description"),
 * 			FunctionName:    testLambda.Name,
 * 			FunctionVersion: pulumi.String("$LATEST"),
 * 		})
 * 		if err != nil {
 * 			return err
 * 		}
 * 		_, err = lambda.NewPermission(ctx, "allow_cloudwatch", &lambda.PermissionArgs{
 * 			StatementId: pulumi.String("AllowExecutionFromCloudWatch"),
 * 			Action:      pulumi.String("lambda:InvokeFunction"),
 * 			Function:    testLambda.Name,
 * 			Principal:   pulumi.String("events.amazonaws.com"),
 * 			SourceArn:   pulumi.String("arn:aws:events:eu-west-1:111122223333:rule/RunDaily"),
 * 			Qualifier:   testAlias.Name,
 * 		})
 * 		if err != nil {
 * 			return err
 * 		}
 * 		return nil
 * 	})
 * }
 * ```
 * ```java
 * package generated_program;
 * import com.pulumi.Context;
 * import com.pulumi.Pulumi;
 * import com.pulumi.core.Output;
 * import com.pulumi.aws.iam.Role;
 * import com.pulumi.aws.iam.RoleArgs;
 * import com.pulumi.aws.lambda.Function;
 * import com.pulumi.aws.lambda.FunctionArgs;
 * import com.pulumi.aws.lambda.Alias;
 * import com.pulumi.aws.lambda.AliasArgs;
 * import com.pulumi.aws.lambda.Permission;
 * import com.pulumi.aws.lambda.PermissionArgs;
 * import static com.pulumi.codegen.internal.Serialization.*;
 * import com.pulumi.asset.FileArchive;
 * import java.util.List;
 * import java.util.ArrayList;
 * import java.util.Map;
 * import java.io.File;
 * import java.nio.file.Files;
 * import java.nio.file.Paths;
 * public class App {
 *     public static void main(String[] args) {
 *         Pulumi.run(App::stack);
 *     }
 *     public static void stack(Context ctx) {
 *         var iamForLambda = new Role("iamForLambda", RoleArgs.builder()
 *             .name("iam_for_lambda")
 *             .assumeRolePolicy(serializeJson(
 *                 jsonObject(
 *                     jsonProperty("Version", "2012-10-17"),
 *                     jsonProperty("Statement", jsonArray(jsonObject(
 *                         jsonProperty("Action", "sts:AssumeRole"),
 *                         jsonProperty("Effect", "Allow"),
 *                         jsonProperty("Sid", ""),
 *                         jsonProperty("Principal", jsonObject(
 *                             jsonProperty("Service", "lambda.amazonaws.com")
 *                         ))
 *                     )))
 *                 )))
 *             .build());
 *         var testLambda = new Function("testLambda", FunctionArgs.builder()
 *             .code(new FileArchive("lambdatest.zip"))
 *             .name("lambda_function_name")
 *             .role(iamForLambda.arn())
 *             .handler("exports.handler")
 *             .runtime("nodejs16.x")
 *             .build());
 *         var testAlias = new Alias("testAlias", AliasArgs.builder()
 *             .name("testalias")
 *             .description("a sample description")
 *             .functionName(testLambda.name())
 *             .functionVersion("$LATEST")
 *             .build());
 *         var allowCloudwatch = new Permission("allowCloudwatch", PermissionArgs.builder()
 *             .statementId("AllowExecutionFromCloudWatch")
 *             .action("lambda:InvokeFunction")
 *             .function(testLambda.name())
 *             .principal("events.amazonaws.com")
 *             .sourceArn("arn:aws:events:eu-west-1:111122223333:rule/RunDaily")
 *             .qualifier(testAlias.name())
 *             .build());
 *     }
 * }
 * ```
 * ```yaml
 * resources:
 *   allowCloudwatch:
 *     type: aws:lambda:Permission
 *     name: allow_cloudwatch
 *     properties:
 *       statementId: AllowExecutionFromCloudWatch
 *       action: lambda:InvokeFunction
 *       function: ${testLambda.name}
 *       principal: events.amazonaws.com
 *       sourceArn: arn:aws:events:eu-west-1:111122223333:rule/RunDaily
 *       qualifier: ${testAlias.name}
 *   testAlias:
 *     type: aws:lambda:Alias
 *     name: test_alias
 *     properties:
 *       name: testalias
 *       description: a sample description
 *       functionName: ${testLambda.name}
 *       functionVersion: $LATEST
 *   testLambda:
 *     type: aws:lambda:Function
 *     name: test_lambda
 *     properties:
 *       code:
 *         fn::FileArchive: lambdatest.zip
 *       name: lambda_function_name
 *       role: ${iamForLambda.arn}
 *       handler: exports.handler
 *       runtime: nodejs16.x
 *   iamForLambda:
 *     type: aws:iam:Role
 *     name: iam_for_lambda
 *     properties:
 *       name: iam_for_lambda
 *       assumeRolePolicy:
 *         fn::toJSON:
 *           Version: 2012-10-17
 *           Statement:
 *             - Action: sts:AssumeRole
 *               Effect: Allow
 *               Sid:
 *               Principal:
 *                 Service: lambda.amazonaws.com
 * ```
 * 
 * ### With SNS
 * 
 * ```typescript
 * import * as pulumi from "@pulumi/pulumi";
 * import * as aws from "@pulumi/aws";
 * const _default = new aws.sns.Topic("default", {name: "call-lambda-maybe"});
 * const defaultRole = new aws.iam.Role("default", {
 *     name: "iam_for_lambda_with_sns",
 *     assumeRolePolicy: JSON.stringify({
 *         Version: "2012-10-17",
 *         Statement: [{
 *             Action: "sts:AssumeRole",
 *             Effect: "Allow",
 *             Sid: "",
 *             Principal: {
 *                 Service: "lambda.amazonaws.com",
 *             },
 *         }],
 *     }),
 * });
 * const func = new aws.lambda.Function("func", {
 *     code: new pulumi.asset.FileArchive("lambdatest.zip"),
 *     name: "lambda_called_from_sns",
 *     role: defaultRole.arn,
 *     handler: "exports.handler",
 *     runtime: aws.lambda.Runtime.Python3d7,
 * });
 * const withSns = new aws.lambda.Permission("with_sns", {
 *     statementId: "AllowExecutionFromSNS",
 *     action: "lambda:InvokeFunction",
 *     "function": func.name,
 *     principal: "sns.amazonaws.com",
 *     sourceArn: _default.arn,
 * });
 * const lambda = new aws.sns.TopicSubscription("lambda", {
 *     topic: _default.arn,
 *     protocol: "lambda",
 *     endpoint: func.arn,
 * });
 * ```
 * ```python
 * import pulumi
 * import json
 * import pulumi_aws as aws
 * default = aws.sns.Topic("default", name="call-lambda-maybe")
 * default_role = aws.iam.Role("default",
 *     name="iam_for_lambda_with_sns",
 *     assume_role_policy=json.dumps({
 *         "Version": "2012-10-17",
 *         "Statement": [{
 *             "Action": "sts:AssumeRole",
 *             "Effect": "Allow",
 *             "Sid": "",
 *             "Principal": {
 *                 "Service": "lambda.amazonaws.com",
 *             },
 *         }],
 *     }))
 * func = aws.lambda_.Function("func",
 *     code=pulumi.FileArchive("lambdatest.zip"),
 *     name="lambda_called_from_sns",
 *     role=default_role.arn,
 *     handler="exports.handler",
 *     runtime=aws.lambda_.Runtime.PYTHON3D7)
 * with_sns = aws.lambda_.Permission("with_sns",
 *     statement_id="AllowExecutionFromSNS",
 *     action="lambda:InvokeFunction",
 *     function=func.name,
 *     principal="sns.amazonaws.com",
 *     source_arn=default.arn)
 * lambda_ = aws.sns.TopicSubscription("lambda",
 *     topic=default.arn,
 *     protocol="lambda",
 *     endpoint=func.arn)
 * ```
 * ```csharp
 * using System.Collections.Generic;
 * using System.Linq;
 * using System.Text.Json;
 * using Pulumi;
 * using Aws = Pulumi.Aws;
 * return await Deployment.RunAsync(() =>
 * {
 *     var @default = new Aws.Sns.Topic("default", new()
 *     {
 *         Name = "call-lambda-maybe",
 *     });
 *     var defaultRole = new Aws.Iam.Role("default", new()
 *     {
 *         Name = "iam_for_lambda_with_sns",
 *         AssumeRolePolicy = JsonSerializer.Serialize(new Dictionary
 *         {
 *             ["Version"] = "2012-10-17",
 *             ["Statement"] = new[]
 *             {
 *                 new Dictionary
 *                 {
 *                     ["Action"] = "sts:AssumeRole",
 *                     ["Effect"] = "Allow",
 *                     ["Sid"] = "",
 *                     ["Principal"] = new Dictionary
 *                     {
 *                         ["Service"] = "lambda.amazonaws.com",
 *                     },
 *                 },
 *             },
 *         }),
 *     });
 *     var func = new Aws.Lambda.Function("func", new()
 *     {
 *         Code = new FileArchive("lambdatest.zip"),
 *         Name = "lambda_called_from_sns",
 *         Role = defaultRole.Arn,
 *         Handler = "exports.handler",
 *         Runtime = Aws.Lambda.Runtime.Python3d7,
 *     });
 *     var withSns = new Aws.Lambda.Permission("with_sns", new()
 *     {
 *         StatementId = "AllowExecutionFromSNS",
 *         Action = "lambda:InvokeFunction",
 *         Function = func.Name,
 *         Principal = "sns.amazonaws.com",
 *         SourceArn = @default.Arn,
 *     });
 *     var lambda = new Aws.Sns.TopicSubscription("lambda", new()
 *     {
 *         Topic = @default.Arn,
 *         Protocol = "lambda",
 *         Endpoint = func.Arn,
 *     });
 * });
 * ```
 * ```go
 * package main
 * import (
 * 	"encoding/json"
 * 	"github.com/pulumi/pulumi-aws/sdk/v6/go/aws/iam"
 * 	"github.com/pulumi/pulumi-aws/sdk/v6/go/aws/lambda"
 * 	"github.com/pulumi/pulumi-aws/sdk/v6/go/aws/sns"
 * 	"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
 * )
 * func main() {
 * 	pulumi.Run(func(ctx *pulumi.Context) error {
 * 		_, err := sns.NewTopic(ctx, "default", &sns.TopicArgs{
 * 			Name: pulumi.String("call-lambda-maybe"),
 * 		})
 * 		if err != nil {
 * 			return err
 * 		}
 * 		tmpJSON0, err := json.Marshal(map[string]interface{}{
 * 			"Version": "2012-10-17",
 * 			"Statement": []map[string]interface{}{
 * 				map[string]interface{}{
 * 					"Action": "sts:AssumeRole",
 * 					"Effect": "Allow",
 * 					"Sid":    "",
 * 					"Principal": map[string]interface{}{
 * 						"Service": "lambda.amazonaws.com",
 * 					},
 * 				},
 * 			},
 * 		})
 * 		if err != nil {
 * 			return err
 * 		}
 * 		json0 := string(tmpJSON0)
 * 		defaultRole, err := iam.NewRole(ctx, "default", &iam.RoleArgs{
 * 			Name:             pulumi.String("iam_for_lambda_with_sns"),
 * 			AssumeRolePolicy: pulumi.String(json0),
 * 		})
 * 		if err != nil {
 * 			return err
 * 		}
 * 		_, err = lambda.NewFunction(ctx, "func", &lambda.FunctionArgs{
 * 			Code:    pulumi.NewFileArchive("lambdatest.zip"),
 * 			Name:    pulumi.String("lambda_called_from_sns"),
 * 			Role:    defaultRole.Arn,
 * 			Handler: pulumi.String("exports.handler"),
 * 			Runtime: pulumi.String(lambda.RuntimePython3d7),
 * 		})
 * 		if err != nil {
 * 			return err
 * 		}
 * 		_, err = lambda.NewPermission(ctx, "with_sns", &lambda.PermissionArgs{
 * 			StatementId: pulumi.String("AllowExecutionFromSNS"),
 * 			Action:      pulumi.String("lambda:InvokeFunction"),
 * 			Function:    _func.Name,
 * 			Principal:   pulumi.String("sns.amazonaws.com"),
 * 			SourceArn:   _default.Arn,
 * 		})
 * 		if err != nil {
 * 			return err
 * 		}
 * 		_, err = sns.NewTopicSubscription(ctx, "lambda", &sns.TopicSubscriptionArgs{
 * 			Topic:    _default.Arn,
 * 			Protocol: pulumi.String("lambda"),
 * 			Endpoint: _func.Arn,
 * 		})
 * 		if err != nil {
 * 			return err
 * 		}
 * 		return nil
 * 	})
 * }
 * ```
 * ```java
 * package generated_program;
 * import com.pulumi.Context;
 * import com.pulumi.Pulumi;
 * import com.pulumi.core.Output;
 * import com.pulumi.aws.sns.Topic;
 * import com.pulumi.aws.sns.TopicArgs;
 * import com.pulumi.aws.iam.Role;
 * import com.pulumi.aws.iam.RoleArgs;
 * import com.pulumi.aws.lambda.Function;
 * import com.pulumi.aws.lambda.FunctionArgs;
 * import com.pulumi.aws.lambda.Permission;
 * import com.pulumi.aws.lambda.PermissionArgs;
 * import com.pulumi.aws.sns.TopicSubscription;
 * import com.pulumi.aws.sns.TopicSubscriptionArgs;
 * import static com.pulumi.codegen.internal.Serialization.*;
 * import com.pulumi.asset.FileArchive;
 * import java.util.List;
 * import java.util.ArrayList;
 * import java.util.Map;
 * import java.io.File;
 * import java.nio.file.Files;
 * import java.nio.file.Paths;
 * public class App {
 *     public static void main(String[] args) {
 *         Pulumi.run(App::stack);
 *     }
 *     public static void stack(Context ctx) {
 *         var default_ = new Topic("default", TopicArgs.builder()
 *             .name("call-lambda-maybe")
 *             .build());
 *         var defaultRole = new Role("defaultRole", RoleArgs.builder()
 *             .name("iam_for_lambda_with_sns")
 *             .assumeRolePolicy(serializeJson(
 *                 jsonObject(
 *                     jsonProperty("Version", "2012-10-17"),
 *                     jsonProperty("Statement", jsonArray(jsonObject(
 *                         jsonProperty("Action", "sts:AssumeRole"),
 *                         jsonProperty("Effect", "Allow"),
 *                         jsonProperty("Sid", ""),
 *                         jsonProperty("Principal", jsonObject(
 *                             jsonProperty("Service", "lambda.amazonaws.com")
 *                         ))
 *                     )))
 *                 )))
 *             .build());
 *         var func = new Function("func", FunctionArgs.builder()
 *             .code(new FileArchive("lambdatest.zip"))
 *             .name("lambda_called_from_sns")
 *             .role(defaultRole.arn())
 *             .handler("exports.handler")
 *             .runtime("python3.7")
 *             .build());
 *         var withSns = new Permission("withSns", PermissionArgs.builder()
 *             .statementId("AllowExecutionFromSNS")
 *             .action("lambda:InvokeFunction")
 *             .function(func.name())
 *             .principal("sns.amazonaws.com")
 *             .sourceArn(default_.arn())
 *             .build());
 *         var lambda = new TopicSubscription("lambda", TopicSubscriptionArgs.builder()
 *             .topic(default_.arn())
 *             .protocol("lambda")
 *             .endpoint(func.arn())
 *             .build());
 *     }
 * }
 * ```
 * ```yaml
 * resources:
 *   withSns:
 *     type: aws:lambda:Permission
 *     name: with_sns
 *     properties:
 *       statementId: AllowExecutionFromSNS
 *       action: lambda:InvokeFunction
 *       function: ${func.name}
 *       principal: sns.amazonaws.com
 *       sourceArn: ${default.arn}
 *   default:
 *     type: aws:sns:Topic
 *     properties:
 *       name: call-lambda-maybe
 *   lambda:
 *     type: aws:sns:TopicSubscription
 *     properties:
 *       topic: ${default.arn}
 *       protocol: lambda
 *       endpoint: ${func.arn}
 *   func:
 *     type: aws:lambda:Function
 *     properties:
 *       code:
 *         fn::FileArchive: lambdatest.zip
 *       name: lambda_called_from_sns
 *       role: ${defaultRole.arn}
 *       handler: exports.handler
 *       runtime: python3.7
 *   defaultRole:
 *     type: aws:iam:Role
 *     name: default
 *     properties:
 *       name: iam_for_lambda_with_sns
 *       assumeRolePolicy:
 *         fn::toJSON:
 *           Version: 2012-10-17
 *           Statement:
 *             - Action: sts:AssumeRole
 *               Effect: Allow
 *               Sid:
 *               Principal:
 *                 Service: lambda.amazonaws.com
 * ```
 * 
 * ### With API Gateway REST API
 * 
 * ```typescript
 * import * as pulumi from "@pulumi/pulumi";
 * import * as aws from "@pulumi/aws";
 * const myDemoAPI = new aws.apigateway.RestApi("MyDemoAPI", {
 *     name: "MyDemoAPI",
 *     description: "This is my API for demonstration purposes",
 * });
 * const lambdaPermission = new aws.lambda.Permission("lambda_permission", {
 *     statementId: "AllowMyDemoAPIInvoke",
 *     action: "lambda:InvokeFunction",
 *     "function": "MyDemoFunction",
 *     principal: "apigateway.amazonaws.com",
 *     sourceArn: pulumi.interpolate`${myDemoAPI.executionArn}/*`,
 * });
 * ```
 * ```python
 * import pulumi
 * import pulumi_aws as aws
 * my_demo_api = aws.apigateway.RestApi("MyDemoAPI",
 *     name="MyDemoAPI",
 *     description="This is my API for demonstration purposes")
 * lambda_permission = aws.lambda_.Permission("lambda_permission",
 *     statement_id="AllowMyDemoAPIInvoke",
 *     action="lambda:InvokeFunction",
 *     function="MyDemoFunction",
 *     principal="apigateway.amazonaws.com",
 *     source_arn=my_demo_api.execution_arn.apply(lambda execution_arn: f"{execution_arn}/*"))
 * ```
 * ```csharp
 * using System.Collections.Generic;
 * using System.Linq;
 * using Pulumi;
 * using Aws = Pulumi.Aws;
 * return await Deployment.RunAsync(() =>
 * {
 *     var myDemoAPI = new Aws.ApiGateway.RestApi("MyDemoAPI", new()
 *     {
 *         Name = "MyDemoAPI",
 *         Description = "This is my API for demonstration purposes",
 *     });
 *     var lambdaPermission = new Aws.Lambda.Permission("lambda_permission", new()
 *     {
 *         StatementId = "AllowMyDemoAPIInvoke",
 *         Action = "lambda:InvokeFunction",
 *         Function = "MyDemoFunction",
 *         Principal = "apigateway.amazonaws.com",
 *         SourceArn = myDemoAPI.ExecutionArn.Apply(executionArn => $"{executionArn}/*"),
 *     });
 * });
 * ```
 * ```go
 * package main
 * import (
 * 	"fmt"
 * 	"github.com/pulumi/pulumi-aws/sdk/v6/go/aws/apigateway"
 * 	"github.com/pulumi/pulumi-aws/sdk/v6/go/aws/lambda"
 * 	"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
 * )
 * func main() {
 * 	pulumi.Run(func(ctx *pulumi.Context) error {
 * 		myDemoAPI, err := apigateway.NewRestApi(ctx, "MyDemoAPI", &apigateway.RestApiArgs{
 * 			Name:        pulumi.String("MyDemoAPI"),
 * 			Description: pulumi.String("This is my API for demonstration purposes"),
 * 		})
 * 		if err != nil {
 * 			return err
 * 		}
 * 		_, err = lambda.NewPermission(ctx, "lambda_permission", &lambda.PermissionArgs{
 * 			StatementId: pulumi.String("AllowMyDemoAPIInvoke"),
 * 			Action:      pulumi.String("lambda:InvokeFunction"),
 * 			Function:    pulumi.Any("MyDemoFunction"),
 * 			Principal:   pulumi.String("apigateway.amazonaws.com"),
 * 			SourceArn: myDemoAPI.ExecutionArn.ApplyT(func(executionArn string) (string, error) {
 * 				return fmt.Sprintf("%v/*", executionArn), nil
 * 			}).(pulumi.StringOutput),
 * 		})
 * 		if err != nil {
 * 			return err
 * 		}
 * 		return nil
 * 	})
 * }
 * ```
 * ```java
 * package generated_program;
 * import com.pulumi.Context;
 * import com.pulumi.Pulumi;
 * import com.pulumi.core.Output;
 * import com.pulumi.aws.apigateway.RestApi;
 * import com.pulumi.aws.apigateway.RestApiArgs;
 * import com.pulumi.aws.lambda.Permission;
 * import com.pulumi.aws.lambda.PermissionArgs;
 * import java.util.List;
 * import java.util.ArrayList;
 * import java.util.Map;
 * import java.io.File;
 * import java.nio.file.Files;
 * import java.nio.file.Paths;
 * public class App {
 *     public static void main(String[] args) {
 *         Pulumi.run(App::stack);
 *     }
 *     public static void stack(Context ctx) {
 *         var myDemoAPI = new RestApi("myDemoAPI", RestApiArgs.builder()
 *             .name("MyDemoAPI")
 *             .description("This is my API for demonstration purposes")
 *             .build());
 *         var lambdaPermission = new Permission("lambdaPermission", PermissionArgs.builder()
 *             .statementId("AllowMyDemoAPIInvoke")
 *             .action("lambda:InvokeFunction")
 *             .function("MyDemoFunction")
 *             .principal("apigateway.amazonaws.com")
 *             .sourceArn(myDemoAPI.executionArn().applyValue(executionArn -> String.format("%s/*", executionArn)))
 *             .build());
 *     }
 * }
 * ```
 * ```yaml
 * resources:
 *   myDemoAPI:
 *     type: aws:apigateway:RestApi
 *     name: MyDemoAPI
 *     properties:
 *       name: MyDemoAPI
 *       description: This is my API for demonstration purposes
 *   lambdaPermission:
 *     type: aws:lambda:Permission
 *     name: lambda_permission
 *     properties:
 *       statementId: AllowMyDemoAPIInvoke
 *       action: lambda:InvokeFunction
 *       function: MyDemoFunction
 *       principal: apigateway.amazonaws.com
 *       sourceArn: ${myDemoAPI.executionArn}/*
 * ```
 * 
 * ### With CloudWatch Log Group
 * 
 * ```typescript
 * import * as pulumi from "@pulumi/pulumi";
 * import * as aws from "@pulumi/aws";
 * const _default = new aws.cloudwatch.LogGroup("default", {name: "/default"});
 * const assumeRole = aws.iam.getPolicyDocument({
 *     statements: [{
 *         effect: "Allow",
 *         principals: [{
 *             type: "Service",
 *             identifiers: ["lambda.amazonaws.com"],
 *         }],
 *         actions: ["sts:AssumeRole"],
 *     }],
 * });
 * const defaultRole = new aws.iam.Role("default", {
 *     name: "iam_for_lambda_called_from_cloudwatch_logs",
 *     assumeRolePolicy: assumeRole.then(assumeRole => assumeRole.json),
 * });
 * const loggingFunction = new aws.lambda.Function("logging", {
 *     code: new pulumi.asset.FileArchive("lamba_logging.zip"),
 *     name: "lambda_called_from_cloudwatch_logs",
 *     handler: "exports.handler",
 *     role: defaultRole.arn,
 *     runtime: aws.lambda.Runtime.Python3d7,
 * });
 * const logging = new aws.lambda.Permission("logging", {
 *     action: "lambda:InvokeFunction",
 *     "function": loggingFunction.name,
 *     principal: "logs.eu-west-1.amazonaws.com",
 *     sourceArn: pulumi.interpolate`${_default.arn}:*`,
 * });
 * const loggingLogSubscriptionFilter = new aws.cloudwatch.LogSubscriptionFilter("logging", {
 *     destinationArn: loggingFunction.arn,
 *     filterPattern: "",
 *     logGroup: _default.name,
 *     name: "logging_default",
 * }, {
 *     dependsOn: [logging],
 * });
 * ```
 * ```python
 * import pulumi
 * import pulumi_aws as aws
 * default = aws.cloudwatch.LogGroup("default", name="/default")
 * assume_role = aws.iam.get_policy_document(statements=[{
 *     "effect": "Allow",
 *     "principals": [{
 *         "type": "Service",
 *         "identifiers": ["lambda.amazonaws.com"],
 *     }],
 *     "actions": ["sts:AssumeRole"],
 * }])
 * default_role = aws.iam.Role("default",
 *     name="iam_for_lambda_called_from_cloudwatch_logs",
 *     assume_role_policy=assume_role.json)
 * logging_function = aws.lambda_.Function("logging",
 *     code=pulumi.FileArchive("lamba_logging.zip"),
 *     name="lambda_called_from_cloudwatch_logs",
 *     handler="exports.handler",
 *     role=default_role.arn,
 *     runtime=aws.lambda_.Runtime.PYTHON3D7)
 * logging = aws.lambda_.Permission("logging",
 *     action="lambda:InvokeFunction",
 *     function=logging_function.name,
 *     principal="logs.eu-west-1.amazonaws.com",
 *     source_arn=default.arn.apply(lambda arn: f"{arn}:*"))
 * logging_log_subscription_filter = aws.cloudwatch.LogSubscriptionFilter("logging",
 *     destination_arn=logging_function.arn,
 *     filter_pattern="",
 *     log_group=default.name,
 *     name="logging_default",
 *     opts = pulumi.ResourceOptions(depends_on=[logging]))
 * ```
 * ```csharp
 * using System.Collections.Generic;
 * using System.Linq;
 * using Pulumi;
 * using Aws = Pulumi.Aws;
 * return await Deployment.RunAsync(() =>
 * {
 *     var @default = new Aws.CloudWatch.LogGroup("default", new()
 *     {
 *         Name = "/default",
 *     });
 *     var assumeRole = Aws.Iam.GetPolicyDocument.Invoke(new()
 *     {
 *         Statements = new[]
 *         {
 *             new Aws.Iam.Inputs.GetPolicyDocumentStatementInputArgs
 *             {
 *                 Effect = "Allow",
 *                 Principals = new[]
 *                 {
 *                     new Aws.Iam.Inputs.GetPolicyDocumentStatementPrincipalInputArgs
 *                     {
 *                         Type = "Service",
 *                         Identifiers = new[]
 *                         {
 *                             "lambda.amazonaws.com",
 *                         },
 *                     },
 *                 },
 *                 Actions = new[]
 *                 {
 *                     "sts:AssumeRole",
 *                 },
 *             },
 *         },
 *     });
 *     var defaultRole = new Aws.Iam.Role("default", new()
 *     {
 *         Name = "iam_for_lambda_called_from_cloudwatch_logs",
 *         AssumeRolePolicy = assumeRole.Apply(getPolicyDocumentResult => getPolicyDocumentResult.Json),
 *     });
 *     var loggingFunction = new Aws.Lambda.Function("logging", new()
 *     {
 *         Code = new FileArchive("lamba_logging.zip"),
 *         Name = "lambda_called_from_cloudwatch_logs",
 *         Handler = "exports.handler",
 *         Role = defaultRole.Arn,
 *         Runtime = Aws.Lambda.Runtime.Python3d7,
 *     });
 *     var logging = new Aws.Lambda.Permission("logging", new()
 *     {
 *         Action = "lambda:InvokeFunction",
 *         Function = loggingFunction.Name,
 *         Principal = "logs.eu-west-1.amazonaws.com",
 *         SourceArn = @default.Arn.Apply(arn => $"{arn}:*"),
 *     });
 *     var loggingLogSubscriptionFilter = new Aws.CloudWatch.LogSubscriptionFilter("logging", new()
 *     {
 *         DestinationArn = loggingFunction.Arn,
 *         FilterPattern = "",
 *         LogGroup = @default.Name,
 *         Name = "logging_default",
 *     }, new CustomResourceOptions
 *     {
 *         DependsOn =
 *         {
 *             logging,
 *         },
 *     });
 * });
 * ```
 * ```go
 * package main
 * import (
 * 	"fmt"
 * 	"github.com/pulumi/pulumi-aws/sdk/v6/go/aws/cloudwatch"
 * 	"github.com/pulumi/pulumi-aws/sdk/v6/go/aws/iam"
 * 	"github.com/pulumi/pulumi-aws/sdk/v6/go/aws/lambda"
 * 	"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
 * )
 * func main() {
 * 	pulumi.Run(func(ctx *pulumi.Context) error {
 * 		_, err := cloudwatch.NewLogGroup(ctx, "default", &cloudwatch.LogGroupArgs{
 * 			Name: pulumi.String("/default"),
 * 		})
 * 		if err != nil {
 * 			return err
 * 		}
 * 		assumeRole, err := iam.GetPolicyDocument(ctx, &iam.GetPolicyDocumentArgs{
 * 			Statements: []iam.GetPolicyDocumentStatement{
 * 				{
 * 					Effect: pulumi.StringRef("Allow"),
 * 					Principals: []iam.GetPolicyDocumentStatementPrincipal{
 * 						{
 * 							Type: "Service",
 * 							Identifiers: []string{
 * 								"lambda.amazonaws.com",
 * 							},
 * 						},
 * 					},
 * 					Actions: []string{
 * 						"sts:AssumeRole",
 * 					},
 * 				},
 * 			},
 * 		}, nil)
 * 		if err != nil {
 * 			return err
 * 		}
 * 		defaultRole, err := iam.NewRole(ctx, "default", &iam.RoleArgs{
 * 			Name:             pulumi.String("iam_for_lambda_called_from_cloudwatch_logs"),
 * 			AssumeRolePolicy: pulumi.String(assumeRole.Json),
 * 		})
 * 		if err != nil {
 * 			return err
 * 		}
 * 		loggingFunction, err := lambda.NewFunction(ctx, "logging", &lambda.FunctionArgs{
 * 			Code:    pulumi.NewFileArchive("lamba_logging.zip"),
 * 			Name:    pulumi.String("lambda_called_from_cloudwatch_logs"),
 * 			Handler: pulumi.String("exports.handler"),
 * 			Role:    defaultRole.Arn,
 * 			Runtime: pulumi.String(lambda.RuntimePython3d7),
 * 		})
 * 		if err != nil {
 * 			return err
 * 		}
 * 		logging, err := lambda.NewPermission(ctx, "logging", &lambda.PermissionArgs{
 * 			Action:    pulumi.String("lambda:InvokeFunction"),
 * 			Function:  loggingFunction.Name,
 * 			Principal: pulumi.String("logs.eu-west-1.amazonaws.com"),
 * 			SourceArn: _default.Arn.ApplyT(func(arn string) (string, error) {
 * 				return fmt.Sprintf("%v:*", arn), nil
 * 			}).(pulumi.StringOutput),
 * 		})
 * 		if err != nil {
 * 			return err
 * 		}
 * 		_, err = cloudwatch.NewLogSubscriptionFilter(ctx, "logging", &cloudwatch.LogSubscriptionFilterArgs{
 * 			DestinationArn: loggingFunction.Arn,
 * 			FilterPattern:  pulumi.String(""),
 * 			LogGroup:       _default.Name,
 * 			Name:           pulumi.String("logging_default"),
 * 		}, pulumi.DependsOn([]pulumi.Resource{
 * 			logging,
 * 		}))
 * 		if err != nil {
 * 			return err
 * 		}
 * 		return nil
 * 	})
 * }
 * ```
 * ```java
 * package generated_program;
 * import com.pulumi.Context;
 * import com.pulumi.Pulumi;
 * import com.pulumi.core.Output;
 * import com.pulumi.aws.cloudwatch.LogGroup;
 * import com.pulumi.aws.cloudwatch.LogGroupArgs;
 * import com.pulumi.aws.iam.IamFunctions;
 * import com.pulumi.aws.iam.inputs.GetPolicyDocumentArgs;
 * import com.pulumi.aws.iam.Role;
 * import com.pulumi.aws.iam.RoleArgs;
 * import com.pulumi.aws.lambda.Function;
 * import com.pulumi.aws.lambda.FunctionArgs;
 * import com.pulumi.aws.lambda.Permission;
 * import com.pulumi.aws.lambda.PermissionArgs;
 * import com.pulumi.aws.cloudwatch.LogSubscriptionFilter;
 * import com.pulumi.aws.cloudwatch.LogSubscriptionFilterArgs;
 * import com.pulumi.resources.CustomResourceOptions;
 * import com.pulumi.asset.FileArchive;
 * import java.util.List;
 * import java.util.ArrayList;
 * import java.util.Map;
 * import java.io.File;
 * import java.nio.file.Files;
 * import java.nio.file.Paths;
 * public class App {
 *     public static void main(String[] args) {
 *         Pulumi.run(App::stack);
 *     }
 *     public static void stack(Context ctx) {
 *         var default_ = new LogGroup("default", LogGroupArgs.builder()
 *             .name("/default")
 *             .build());
 *         final var assumeRole = IamFunctions.getPolicyDocument(GetPolicyDocumentArgs.builder()
 *             .statements(GetPolicyDocumentStatementArgs.builder()
 *                 .effect("Allow")
 *                 .principals(GetPolicyDocumentStatementPrincipalArgs.builder()
 *                     .type("Service")
 *                     .identifiers("lambda.amazonaws.com")
 *                     .build())
 *                 .actions("sts:AssumeRole")
 *                 .build())
 *             .build());
 *         var defaultRole = new Role("defaultRole", RoleArgs.builder()
 *             .name("iam_for_lambda_called_from_cloudwatch_logs")
 *             .assumeRolePolicy(assumeRole.applyValue(getPolicyDocumentResult -> getPolicyDocumentResult.json()))
 *             .build());
 *         var loggingFunction = new Function("loggingFunction", FunctionArgs.builder()
 *             .code(new FileArchive("lamba_logging.zip"))
 *             .name("lambda_called_from_cloudwatch_logs")
 *             .handler("exports.handler")
 *             .role(defaultRole.arn())
 *             .runtime("python3.7")
 *             .build());
 *         var logging = new Permission("logging", PermissionArgs.builder()
 *             .action("lambda:InvokeFunction")
 *             .function(loggingFunction.name())
 *             .principal("logs.eu-west-1.amazonaws.com")
 *             .sourceArn(default_.arn().applyValue(arn -> String.format("%s:*", arn)))
 *             .build());
 *         var loggingLogSubscriptionFilter = new LogSubscriptionFilter("loggingLogSubscriptionFilter", LogSubscriptionFilterArgs.builder()
 *             .destinationArn(loggingFunction.arn())
 *             .filterPattern("")
 *             .logGroup(default_.name())
 *             .name("logging_default")
 *             .build(), CustomResourceOptions.builder()
 *                 .dependsOn(logging)
 *                 .build());
 *     }
 * }
 * ```
 * ```yaml
 * resources:
 *   logging:
 *     type: aws:lambda:Permission
 *     properties:
 *       action: lambda:InvokeFunction
 *       function: ${loggingFunction.name}
 *       principal: logs.eu-west-1.amazonaws.com
 *       sourceArn: ${default.arn}:*
 *   default:
 *     type: aws:cloudwatch:LogGroup
 *     properties:
 *       name: /default
 *   loggingLogSubscriptionFilter:
 *     type: aws:cloudwatch:LogSubscriptionFilter
 *     name: logging
 *     properties:
 *       destinationArn: ${loggingFunction.arn}
 *       filterPattern:
 *       logGroup: ${default.name}
 *       name: logging_default
 *     options:
 *       dependson:
 *         - ${logging}
 *   loggingFunction:
 *     type: aws:lambda:Function
 *     name: logging
 *     properties:
 *       code:
 *         fn::FileArchive: lamba_logging.zip
 *       name: lambda_called_from_cloudwatch_logs
 *       handler: exports.handler
 *       role: ${defaultRole.arn}
 *       runtime: python3.7
 *   defaultRole:
 *     type: aws:iam:Role
 *     name: default
 *     properties:
 *       name: iam_for_lambda_called_from_cloudwatch_logs
 *       assumeRolePolicy: ${assumeRole.json}
 * variables:
 *   assumeRole:
 *     fn::invoke:
 *       Function: aws:iam:getPolicyDocument
 *       Arguments:
 *         statements:
 *           - effect: Allow
 *             principals:
 *               - type: Service
 *                 identifiers:
 *                   - lambda.amazonaws.com
 *             actions:
 *               - sts:AssumeRole
 * ```
 * 
 * ### With Cross-Account Invocation Policy
 * 
 * ```typescript
 * import * as pulumi from "@pulumi/pulumi";
 * import * as aws from "@pulumi/aws";
 * const url = new aws.lambda.FunctionUrl("url", {
 *     functionName: example.functionName,
 *     authorizationType: "AWS_IAM",
 * });
 * const urlPermission = new aws.lambda.Permission("url", {
 *     action: "lambda:InvokeFunctionUrl",
 *     "function": example.functionName,
 *     principal: "arn:aws:iam::444455556666:role/example",
 *     sourceAccount: "444455556666",
 *     functionUrlAuthType: "AWS_IAM",
 * });
 * ```
 * ```python
 * import pulumi
 * import pulumi_aws as aws
 * url = aws.lambda_.FunctionUrl("url",
 *     function_name=example["functionName"],
 *     authorization_type="AWS_IAM")
 * url_permission = aws.lambda_.Permission("url",
 *     action="lambda:InvokeFunctionUrl",
 *     function=example["functionName"],
 *     principal="arn:aws:iam::444455556666:role/example",
 *     source_account="444455556666",
 *     function_url_auth_type="AWS_IAM")
 * ```
 * ```csharp
 * using System.Collections.Generic;
 * using System.Linq;
 * using Pulumi;
 * using Aws = Pulumi.Aws;
 * return await Deployment.RunAsync(() =>
 * {
 *     var url = new Aws.Lambda.FunctionUrl("url", new()
 *     {
 *         FunctionName = example.FunctionName,
 *         AuthorizationType = "AWS_IAM",
 *     });
 *     var urlPermission = new Aws.Lambda.Permission("url", new()
 *     {
 *         Action = "lambda:InvokeFunctionUrl",
 *         Function = example.FunctionName,
 *         Principal = "arn:aws:iam::444455556666:role/example",
 *         SourceAccount = "444455556666",
 *         FunctionUrlAuthType = "AWS_IAM",
 *     });
 * });
 * ```
 * ```go
 * package main
 * import (
 * 	"github.com/pulumi/pulumi-aws/sdk/v6/go/aws/lambda"
 * 	"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
 * )
 * func main() {
 * 	pulumi.Run(func(ctx *pulumi.Context) error {
 * 		_, err := lambda.NewFunctionUrl(ctx, "url", &lambda.FunctionUrlArgs{
 * 			FunctionName:      pulumi.Any(example.FunctionName),
 * 			AuthorizationType: pulumi.String("AWS_IAM"),
 * 		})
 * 		if err != nil {
 * 			return err
 * 		}
 * 		_, err = lambda.NewPermission(ctx, "url", &lambda.PermissionArgs{
 * 			Action:              pulumi.String("lambda:InvokeFunctionUrl"),
 * 			Function:            pulumi.Any(example.FunctionName),
 * 			Principal:           pulumi.String("arn:aws:iam::444455556666:role/example"),
 * 			SourceAccount:       pulumi.String("444455556666"),
 * 			FunctionUrlAuthType: pulumi.String("AWS_IAM"),
 * 		})
 * 		if err != nil {
 * 			return err
 * 		}
 * 		return nil
 * 	})
 * }
 * ```
 * ```java
 * package generated_program;
 * import com.pulumi.Context;
 * import com.pulumi.Pulumi;
 * import com.pulumi.core.Output;
 * import com.pulumi.aws.lambda.FunctionUrl;
 * import com.pulumi.aws.lambda.FunctionUrlArgs;
 * import com.pulumi.aws.lambda.Permission;
 * import com.pulumi.aws.lambda.PermissionArgs;
 * import java.util.List;
 * import java.util.ArrayList;
 * import java.util.Map;
 * import java.io.File;
 * import java.nio.file.Files;
 * import java.nio.file.Paths;
 * public class App {
 *     public static void main(String[] args) {
 *         Pulumi.run(App::stack);
 *     }
 *     public static void stack(Context ctx) {
 *         var url = new FunctionUrl("url", FunctionUrlArgs.builder()
 *             .functionName(example.functionName())
 *             .authorizationType("AWS_IAM")
 *             .build());
 *         var urlPermission = new Permission("urlPermission", PermissionArgs.builder()
 *             .action("lambda:InvokeFunctionUrl")
 *             .function(example.functionName())
 *             .principal("arn:aws:iam::444455556666:role/example")
 *             .sourceAccount("444455556666")
 *             .functionUrlAuthType("AWS_IAM")
 *             .build());
 *     }
 * }
 * ```
 * ```yaml
 * resources:
 *   url:
 *     type: aws:lambda:FunctionUrl
 *     properties:
 *       functionName: ${example.functionName}
 *       authorizationType: AWS_IAM
 *   urlPermission:
 *     type: aws:lambda:Permission
 *     name: url
 *     properties:
 *       action: lambda:InvokeFunctionUrl
 *       function: ${example.functionName}
 *       principal: arn:aws:iam::444455556666:role/example
 *       sourceAccount: '444455556666'
 *       functionUrlAuthType: AWS_IAM
 * ```
 * 
 * ## Import
 * Using `pulumi import`, import Lambda permission statements using function_name/statement_id with an optional qualifier. For example:
 * ```sh
 * $ pulumi import aws:lambda/permission:Permission test_lambda_permission my_test_lambda_function/AllowExecutionFromCloudWatch
 * ```
 * ```sh
 * $ pulumi import aws:lambda/permission:Permission test_lambda_permission my_test_lambda_function:qualifier_name/AllowExecutionFromCloudWatch
 * ```
 * */*/*/*/*/*/
 */
public class Permission internal constructor(
    override val javaResource: com.pulumi.aws.lambda.Permission,
) : KotlinCustomResource(javaResource, PermissionMapper) {
    /**
     * The AWS Lambda action you want to allow in this statement. (e.g., `lambda:InvokeFunction`)
     */
    public val action: Output
        get() = javaResource.action().applyValue({ args0 -> args0 })

    /**
     * The Event Source Token to validate.  Used with [Alexa Skills](https://developer.amazon.com/docs/custom-skills/host-a-custom-skill-as-an-aws-lambda-function.html#use-aws-cli).
     */
    public val eventSourceToken: Output?
        get() = javaResource.eventSourceToken().applyValue({ args0 ->
            args0.map({ args0 ->
                args0
            }).orElse(null)
        })

    /**
     * Name of the Lambda function whose resource policy you are updating
     */
    public val function: Output
        get() = javaResource.function().applyValue({ args0 -> args0 })

    /**
     * Lambda Function URLs [authentication type](https://docs.aws.amazon.com/lambda/latest/dg/urls-auth.html). Valid values are: `AWS_IAM` or `NONE`. Only supported for `lambda:InvokeFunctionUrl` action.
     */
    public val functionUrlAuthType: Output?
        get() = javaResource.functionUrlAuthType().applyValue({ args0 ->
            args0.map({ args0 ->
                args0
            }).orElse(null)
        })

    /**
     * The principal who is getting this permission e.g., `s3.amazonaws.com`, an AWS account ID, or AWS IAM principal, or AWS service principal such as `events.amazonaws.com` or `sns.amazonaws.com`.
     */
    public val principal: Output
        get() = javaResource.principal().applyValue({ args0 -> args0 })

    /**
     * The identifier for your organization in AWS Organizations. Use this to grant permissions to all the AWS accounts under this organization.
     * [1]: https://developer.amazon.com/docs/custom-skills/host-a-custom-skill-as-an-aws-lambda-function.html#use-aws-cli
     * [2]: https://docs.aws.amazon.com/apigateway/latest/developerguide/api-gateway-control-access-using-iam-policies-to-invoke-api.html
     * [3]: https://docs.aws.amazon.com/lambda/latest/dg/urls-auth.html
     */
    public val principalOrgId: Output?
        get() = javaResource.principalOrgId().applyValue({ args0 ->
            args0.map({ args0 ->
                args0
            }).orElse(null)
        })

    /**
     * Query parameter to specify function version or alias name. The permission will then apply to the specific qualified ARN e.g., `arn:aws:lambda:aws-region:acct-id:function:function-name:2`
     */
    public val qualifier: Output?
        get() = javaResource.qualifier().applyValue({ args0 -> args0.map({ args0 -> args0 }).orElse(null) })

    /**
     * This parameter is used when allowing cross-account access, or for S3 and SES. The AWS account ID (without a hyphen) of the source owner.
     */
    public val sourceAccount: Output?
        get() = javaResource.sourceAccount().applyValue({ args0 ->
            args0.map({ args0 ->
                args0
            }).orElse(null)
        })

    /**
     * When the principal is an AWS service, the ARN of the specific resource within that service to grant permission to.
     * Without this, any resource from `principal` will be granted permission – even if that resource is from another account.
     * For S3, this should be the ARN of the S3 Bucket.
     * For EventBridge events, this should be the ARN of the EventBridge Rule.
     * For API Gateway, this should be the ARN of the API, as described [here](https://docs.aws.amazon.com/apigateway/latest/developerguide/api-gateway-control-access-using-iam-policies-to-invoke-api.html).
     */
    public val sourceArn: Output?
        get() = javaResource.sourceArn().applyValue({ args0 -> args0.map({ args0 -> args0 }).orElse(null) })

    /**
     * A unique statement identifier. By default generated by the provider.
     */
    public val statementId: Output
        get() = javaResource.statementId().applyValue({ args0 -> args0 })

    /**
     * A statement identifier prefix. The provider will generate a unique suffix. Conflicts with `statement_id`.
     */
    public val statementIdPrefix: Output
        get() = javaResource.statementIdPrefix().applyValue({ args0 -> args0 })
}

public object PermissionMapper : ResourceMapper {
    override fun supportsMappingOfType(javaResource: Resource): Boolean =
        com.pulumi.aws.lambda.Permission::class == javaResource::class

    override fun map(javaResource: Resource): Permission = Permission(
        javaResource as
            com.pulumi.aws.lambda.Permission,
    )
}

/**
 * @see [Permission].
 * @param name The _unique_ name of the resulting resource.
 * @param block Builder for [Permission].
 */
public suspend fun permission(name: String, block: suspend PermissionResourceBuilder.() -> Unit): Permission {
    val builder = PermissionResourceBuilder()
    builder.name(name)
    block(builder)
    return builder.build()
}

/**
 * @see [Permission].
 * @param name The _unique_ name of the resulting resource.
 */
public fun permission(name: String): Permission {
    val builder = PermissionResourceBuilder()
    builder.name(name)
    return builder.build()
}




© 2015 - 2025 Weber Informatics LLC | Privacy Policy