Source code for awslimitchecker.services.lambdafunc

"""
awslimitchecker/services/lambdafunc.py

The latest version of this package is available at:
<https://github.com/jantman/awslimitchecker>

################################################################################
Copyright 2015-2018 Jason Antman <jason@jasonantman.com>

    This file is part of awslimitchecker, also known as awslimitchecker.

    awslimitchecker is free software: you can redistribute it and/or modify
    it under the terms of the GNU Affero General Public License as published by
    the Free Software Foundation, either version 3 of the License, or
    (at your option) any later version.

    awslimitchecker is distributed in the hope that it will be useful,
    but WITHOUT ANY WARRANTY; without even the implied warranty of
    MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
    GNU Affero General Public License for more details.

    You should have received a copy of the GNU Affero General Public License
    along with awslimitchecker.  If not, see <http://www.gnu.org/licenses/>.

The Copyright and Authors attributions contained herein may not be removed or
otherwise altered, except to add the Author attribution of a contributor to
this work. (Additional Terms pursuant to Section 7b of the AGPL v3)
################################################################################
While not legally required, I sincerely request that anyone who finds
bugs please submit them at <https://github.com/jantman/awslimitchecker> or
to me via email, and that you send any contributions or improvements
either as a pull request on GitHub, or to me via email.
################################################################################

AUTHORS:
Jason Antman <jason@jasonantman.com> <http://www.jasonantman.com>
################################################################################
"""

import abc  # noqa
import logging

from .base import _AwsService
from ..limit import AwsLimit
from botocore.exceptions import EndpointConnectionError

logger = logging.getLogger(__name__)


[docs]class _LambdaService(_AwsService): service_name = 'Lambda' api_name = 'lambda'
[docs] def find_usage(self): """ Determine the current usage for each limit of this service, and update corresponding Limit via :py:meth:`~.AwsLimit._add_current_usage`. """ logger.debug("Getting usage for Lambda metrics") try: self.connect() resp = self.conn.get_account_settings() except EndpointConnectionError as ex: logger.warn('Skipping Lambda: %s', str(ex)) return self.limits['Function Count']._add_current_usage( resp['AccountUsage']['FunctionCount'] ) self.limits['Total Code Size (MiB)']._add_current_usage( int((resp['AccountUsage']['TotalCodeSize']) / 1048576) ) self._have_usage = True
[docs] def get_limits(self): """ Return all known limits for this service, as a dict of their names to :py:class:`~.AwsLimit` objects. :returns: dict of limit names to :py:class:`~.AwsLimit` objects :rtype: dict """ logger.debug("Getting limits for Lambda") if self.limits != {}: return self.limits self._construct_limits() return self.limits
[docs] def _update_limits_from_api(self): """ Query Lambda's DescribeLimits API action, and update limits with the quotas returned. Updates ``self.limits``. """ logger.debug("Updating limits for Lambda from the AWS API") if len(self.limits) == 2: return self.connect() lims = self.conn.get_account_settings()['AccountLimit'] self.limits['Total Code Size (MiB)']._set_api_limit( (lims['TotalCodeSize'] / 1048576) ) self.limits['Code Size Unzipped (MiB) per Function']._set_api_limit( (lims['CodeSizeUnzipped'] / 1048576) ) self.limits['Unreserved Concurrent Executions']._set_api_limit( lims['UnreservedConcurrentExecutions'] ) self.limits['Concurrent Executions']._set_api_limit( lims['ConcurrentExecutions'] ) self.limits['Code Size Zipped (MiB) per Function']._set_api_limit( (lims['CodeSizeZipped'] / 1048576) )
[docs] def _construct_limits(self): self.limits = {} self.limits['Total Code Size (MiB)'] = AwsLimit( 'Total Code Size (MiB)', self, 76800, self.warning_threshold, self.critical_threshold, limit_type='AWS::Lambda::Function' ) self.limits['Code Size Unzipped (MiB) per Function'] = AwsLimit( 'Code Size Unzipped (MiB) per Function', self, 250, self.warning_threshold, self.critical_threshold, limit_type='AWS::Lambda::Function' ) self.limits['Unreserved Concurrent Executions'] = AwsLimit( 'Unreserved Concurrent Executions', self, 1000, self.warning_threshold, self.critical_threshold, limit_type='AWS::Lambda::Function' ) self.limits['Concurrent Executions'] = AwsLimit( 'Concurrent Executions', self, 1000, self.warning_threshold, self.critical_threshold, limit_type='AWS::Lambda::Function' ) self.limits['Code Size Zipped (MiB) per Function'] = AwsLimit( 'Code Size Zipped (MiB) per Function', self, 50, self.warning_threshold, self.critical_threshold, limit_type='AWS::Lambda::Function' ) self.limits['Function Count'] = AwsLimit( 'Function Count', self, None, # unlimited self.warning_threshold, self.critical_threshold, limit_type='AWS::Lambda::Function' )
[docs] def required_iam_permissions(self): """ Return a list of IAM Actions required for this Service to function properly. All Actions will be shown with an Effect of "Allow" and a Resource of "*". :returns: list of IAM Action strings :rtype: list """ return [ "lambda:GetAccountSettings" ]