You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: modules/github_reverse_proxy/README.md
+2-26Lines changed: 2 additions & 26 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,34 +2,10 @@
2
2
3
3
To facilitate an internal load balancer, GitHub webhooks still need to have a way to reach the application. This is achieved by creating a reverse proxy for GitHub webhooks. This Terraform module deploys an AWS Lambda function inside a VPC, integrates it with API Gateway, and ensures least privilege access. The Lambda function receives webhooks from GitHub, processes them, and forwards them to a private system inside a VPC.
4
4
5
-
The module includes:
6
-
- A Lambda function attached to a VPC.
7
-
- Integration with API Gateway to expose the Lambda function as an HTTP endpoint.
8
-
- A deny policy to follow the principle of least privilege, preventing the Lambda function code from making certain Amazon EC2 API calls.
9
-
- Required IAM roles and permissions for VPC access and logging.
10
-
- A Security Group to allow access to the private endpoint in the VPC.
11
-
12
5
## Features
13
6
- Deploys an AWS Lambda function inside a VPC.
14
7
- Integrates the Lambda function with API Gateway for receiving webhooks.
8
+
- Limits access to the API Gateway only to request from GitHub CIDR ranges.
15
9
- Configures the necessary IAM roles, including the `AWSLambdaVPCAccessExecutionRole`.
16
10
- Implements a custom deny policy to prevent the Lambda function from making EC2 network-related API calls.
17
-
- CloudWatch logging for monitoring and troubleshooting.
18
-
19
-
## Usage
20
-
21
-
```hcl
22
-
module "lambda_vpc_webhook" {
23
-
source = "./path_to_your_module" # Replace with your module path
0 commit comments