gpt4 book ai didi

aws-lambda - Lambda 链接 - 使用 terraform 从另一个 lambda 调用 lambda

转载 作者:行者123 更新时间:2023-12-05 01:14:57 31 4
gpt4 key购买 nike

我正在尝试从另一个调用一个 AWS lambda 并执行 lambda 链接。这样做的理由是 AWS 不提供来自同一个 S3 存储桶的多个触发器。

我创建了一个带有 s3 触发器的 lambda。第一个 lambda 的 java 代码将监听 S3 事件并包含另一个 lambda 的调用。第二个 lambda 将从第一个 lambda 调用。 lambda 的创建都是由 terraform 完成的。

Lambda A 具有 S3 触发器。这将在特定存储桶上的 S3 事件上调用。 Lambda A 将进行处理并使用调用请求调用 Lambda B。 java中Lambda A代码的Lambda B调用是:

public class EventHandler implements RequestHandler<S3Event, String> {
@Override
public String handleRequest(S3Event event, Context context) throws RuntimeException {
InvokeRequest req = new InvokeRequest()
.withFunctionName("LambdaFunctionB")
.withPayload(json);
return "Lambda B invoked"
}
}

这两个 lambda 都是使用 terraform 创建的。以下脚本:
Lambda A terraform:

module "lambda_function" {
source = "Git Path"
absolute_artifact_path = "../lambda.jar"
lambda_function_name = "LambdaFunctionA"
lambda_function_description = ""
lambda_function_runtime = "java8"
lambda_handler_name = "EventHandler"
lambda_execution_role_name = "lambda-iam-role"
lambda_memory = "512"
dead_letter_target_arn = "error-handling-arn"

}

resource "aws_lambda_permission" "allow_bucket" {
statement_id = "statementId"
action = "lambda:InvokeFunction"
function_name = "${module.lambda_function.lambda_arn}"
principal = "s3.amazonaws.com"
source_arn = "s3.bucket.arn"
}

resource "aws_s3_bucket_notification" "bucket_notification" {
bucket = "bucketName"

lambda_function {
lambda_function_arn = "${module.lambda_function.lambda_arn}"
events = ["s3:ObjectCreated:*"]
filter_prefix = "path/subPath"
}
}

Lambda B 地形:

module "lambda_function" {
source = "git path"
absolute_artifact_path = "../lambda.jar"
lambda_function_name = "LambdaFunctionB"
lambda_function_description = ""
lambda_function_runtime = "java8"
lambda_handler_name = "LambdaBEventHandler"
lambda_execution_role_name = "lambda-iam-role"
lambda_memory = "512"
dead_letter_target_arn = "error-handling-arn"

}

resource "aws_lambda_permission" "allow_lambda" {
statement_id = "AllowExecutionFromLambda"
action = "lambda:InvokeFunction"
function_name = "${module.lambda_function.lambda_arn}"
principal = "s3.amazonaws.com"
source_arn = "arn:aws:lambda:eu-west-1:xxxxxxxxxx:function:LambdaFunctionA"
}

lambda-iam-role 附加了以下策略

AmazonS3FullAccess
AWSLambdaBasicExecutionRole
AWSLambdaVPCAccessExecutionRole
AmazonSNSFullAccess
CloudWatchEventsFullAccess

期望 Lambda A 应该成功调用 Lambda B。但是我在 Lambda A 日志中收到 AccessDeniedException 并且它无法调用 Lambda B。错误是

com.amazonaws.services.lambda.model.AWSLambdaException: User: arn:aws:sts::xxxxxxxxx:assumed-role/lambda-iam-role/LambdaFunctionA is not authorized to perform: lambda:InvokeFunction on resource: arn:aws:lambda:eu-west-1:xxxxxxxxx:function:LambdaFunctionB (Service: AWSLambda; Status Code: 403; Error Code: AccessDeniedException; Request ID: f495ede3-b3cb-47a1-b884-16996545233d)

最佳答案

  • 希望这对你有帮助,不完全相似,但它从另一个 lambda Github 调用一个 lambda
  • 我认为 lambda 也需要这个策略“lambda:InvokeFunction”

关于aws-lambda - Lambda 链接 - 使用 terraform 从另一个 lambda 调用 lambda,我们在Stack Overflow上找到一个类似的问题: https://stackoverflow.com/questions/57407863/

31 4 0
Copyright 2021 - 2024 cfsdn All Rights Reserved 蜀ICP备2022000587号
广告合作:1813099741@qq.com 6ren.com