Security News
Research
Data Theft Repackaged: A Case Study in Malicious Wrapper Packages on npm
The Socket Research Team breaks down a malicious wrapper package that uses obfuscation to harvest credentials and exfiltrate sensitive data.
@cumulus/cumulus-ecs-task
Advanced tools
Use this Docker image to run a Node.js Lambda function in AWS ECS.
cumulus-ecs-task is a Docker image that can run Lambda functions as ECS services.
When included in a Cumulus workflow and deployed to AWS, it will download a specified Lambda function, and act as an activity in a Step Functions workflow.
TODO: update when new cumulus release goes out with cumulus-message-adapter-js version bump
This only works with Node.js Lmabda functions.
Like other Cumulus libraries, cumulus-ecs-task is designed to be deployed to AWS using kes to manage Cloudformation config. This documentation assumes you're working with a Cumulus deployment and that you have files and directory stucture similar to what's found in the cumulus template repository.
Most importantly, we'll need to edit these files:
This library has two options:
activityArn
required
lambdaArn
required
There's no config in lambdas.yml that is special to ecs-cumulus-task, just make sure to add the lambda that will be run in ECS. We won't use that lambda directly in workflows.yml, but we will reference the arn of the lambda in workflows.yml.
An example state of a workflow in workflows.yml:
EcsTaskHelloWorld:
CumulusConfig:
buckets: '{$.meta.buckets}'
provider: '{$.meta.provider}'
collection: '{$.meta.collection}'
Type: Task
Resource: ${EcsTaskHelloWorldActivity}
Next: < ... next state in the workflow ... >
The important line is Resource: ${EcsTaskHelloWorldActivity}
.
We'll define that activity in the app/config.yml file.
This library requires additional configuration to be added to the app/config.yml file under the ecs
block, as well as a list of activity names under activities
.
Here's an example:
yourdeployment:
ecs:
instanceType: t2.small
desiredInstances: 1
availabilityZone: us-east-1a
imageId: ami-a7a242da
publicIp: true
docker:
username: cumulususer
services:
EcsTaskHelloWorld:
image: cumuluss/cumulus-ecs-task:0.0.1
cpu: 800
memory: 1500
count: 0
envs:
AWS_DEFAULT_REGION:
function: Fn::Sub
value: '${AWS::Region}'
commands:
- cumulus-ecs-task
- '--activityArn'
- function: Ref
value: EcsTaskHelloWorldActivity
- '--lambdaArn'
- function: Ref
value: EcsTaskHelloWorldLambdaFunction
activities:
- name: EcsTaskHelloWorld
Under activities
we define the activity name EcsTaskHelloWorld
, which can then be referenced to in the ecs
section and in workflows.yml as EcsTaskHelloWorldActivity
.
We can give our service the same name as the activity. Be sure to double-check the options like cpu
, memory
, and others to be sure they'll work with your use case.
Note that under the the commands
section we're referencing the EcsTaskHelloWorldActivity
as the activityArn
and the EcsTaskHelloWorldLambdaFunction
as the lambdaArn
.
The EcsRole
will need to include permissions to send requests to the step functions API.
The following should be included in the Statement
of the EcsRole
policy:
# Allow state machine interactions
- Effect: Allow
Action:
- states:SendTaskFailure
- states:SendTaskSuccess
- states:SendTaskHeartbeat
- states:GetActivityTask
Resource: arn:aws:states:*:*:*
AWS_DEFAULT_REGION
– defaults to us-east-1
To run locally:
npm start -- --activityArn <your-activity-arn> --lambdaArn <your-lambda-arn>
To build the docker image:
npm run build
To run in Docker locally:
docker run -e AWS_ACCESS_KEY_ID='<aws-access-key>' \
-e AWS_SECRET_ACCESS_KEY='<aws-secret-key>' \
cumuluss/cumulus-ecs-task \
--activityArn <your-activity-arn> \
--lambdaArn <your-lambda-arn>
You can execute workflows on AWS that test the version of cumulus-ecs-task that you're developing on locally.
First, make sure that the ECS cluster for your deployment has zero tasks running that might respond to a workflow's requests.
That way only your local version will respond to your workflow.
Next, start ecs-cumulus-task locally.
Either with node:
npm start -- --activityArn <your-activity-arn> --lambdaArn <your-lambda-arn>
Or with docker:
# build the image
npm run build
# run the image
docker run -e AWS_ACCESS_KEY_ID='<aws-access-key>' \
-e AWS_SECRET_ACCESS_KEY='<aws-secret-key>' \
cumuluss/cumulus-ecs-task \
--activityArn <your-activity-arn> \
--lambdaArn <your-lambda-arn>
Finally, trigger a workflow. You can do this from the Cumulus dashboard, the Cumulus API, or with the AWS Console by supplying a
Bump the version
npm version <major|minor|patch|specific version>
Create the build
npm run build
Release to Docker Hub
npm run release
See the CONTRIBUTING.md file.
FAQs
Run lambda functions in ECS
The npm package @cumulus/cumulus-ecs-task receives a total of 0 weekly downloads. As such, @cumulus/cumulus-ecs-task popularity was classified as not popular.
We found that @cumulus/cumulus-ecs-task demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 8 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
Research
The Socket Research Team breaks down a malicious wrapper package that uses obfuscation to harvest credentials and exfiltrate sensitive data.
Research
Security News
Attackers used a malicious npm package typosquatting a popular ESLint plugin to steal sensitive data, execute commands, and exploit developer systems.
Security News
The Ultralytics' PyPI Package was compromised four times in one weekend through GitHub Actions cache poisoning and failure to rotate previously compromised API tokens.