aws lambda函数在从s3中获取getObject时拒绝访问

问题描述 投票:33回答:11

我在Lambda函数上从S3 AWS服务收到拒绝访问的错误。

这是代码:

// dependencies
var async = require('async');
var AWS = require('aws-sdk');
var gm = require('gm').subClass({ imageMagick: true }); // Enable ImageMagick integration.

exports.handler = function(event, context) {
    var srcBucket = event.Records[0].s3.bucket.name;
    // Object key may have spaces or unicode non-ASCII characters.
    var key = decodeURIComponent(event.Records[0].s3.object.key.replace(/\+/g, " "));
/*
{
    originalFilename: <string>,
    versions: [
        {
            size: <number>,
            crop: [x,y],
            max: [x, y],
            rotate: <number>
        }
    ]
}*/
    var fileInfo;
    var dstBucket = "xmovo.transformedimages.develop";
    try {
        //TODO: Decompress and decode the returned value
        fileInfo = JSON.parse(key);
        //download s3File

        // get reference to S3 client
        var s3 = new AWS.S3();

        // Download the image from S3 into a buffer.
        s3.getObject({
                Bucket: srcBucket,
                Key: key
            },
            function (err, response) {
                if (err) {
                    console.log("Error getting from s3: >>> " + err + "::: Bucket-Key >>>" + srcBucket + "-" + key + ":::Principal>>>" + event.Records[0].userIdentity.principalId, err.stack);
                    return;
                }

                // Infer the image type.
                var img = gm(response.Body);
                var imageType = null;
                img.identify(function (err, data) {
                    if (err) {
                        console.log("Error image type: >>> " + err);
                        deleteFromS3(srcBucket, key);
                        return;
                    }
                    imageType = data.format;

                    //foreach of the versions requested
                    async.each(fileInfo.versions, function (currentVersion, callback) {
                        //apply transform
                        async.waterfall([async.apply(transform, response, currentVersion), uploadToS3, callback]);

                    }, function (err) {
                        if (err) console.log("Error on excecution of watefall: >>> " + err);
                        else {
                            //when all done then delete the original image from srcBucket
                            deleteFromS3(srcBucket, key);
                        }
                    });
                });
            });
    }
    catch (ex){
        context.fail("exception through: " + ex);
        deleteFromS3(srcBucket, key);
        return;
    }
        function transform(response, version, callback){
            var imageProcess = gm(response.Body);
            if (version.rotate!=0) imageProcess = imageProcess.rotate("black",version.rotate);
            if(version.size!=null) {
                if (version.crop != null) {
                    //crop the image from the coordinates
                    imageProcess=imageProcess.crop(version.size[0], version.size[1], version.crop[0], version.crop[1]);
                }
                else {
                    //find the bigger and resize proportioned the other dimension
                    var widthIsMax = version.size[0]>version.size[1];
                    var maxValue = Math.max(version.size[0],version.size[1]);
                    imageProcess=(widthIsMax)?imageProcess.resize(maxValue):imageProcess.resize(null, maxValue);
                }
            }


            //finally convert the image to jpg 90%
            imageProcess.toBuffer("jpg",{quality:90}, function(err, buffer){
                if (err) callback(err);
                callback(null, version, "image/jpeg", buffer);
            });

        }

        function deleteFromS3(bucket, filename){
            s3.deleteObject({
                Bucket: bucket,
                Key: filename
            });
        }

        function uploadToS3(version, contentType, data, callback) {
            // Stream the transformed image to a different S3 bucket.
            var dstKey = fileInfo.originalFilename + "_" + version.size + ".jpg";
            s3.putObject({
                Bucket: dstBucket,
                Key: dstKey,
                Body: data,
                ContentType: contentType
            }, callback);
        }
};

这是Cloudwatch上的错误:

AccessDenied: Access Denied

这是堆栈错误:

at Request.extractError (/var/runtime/node_modules/aws-sdk/lib/services/s3.js:329:35)

at Request.callListeners (/var/runtime/node_modules/aws-sdk/lib/sequential_executor.js:105:20) 

at Request.emit (/var/runtime/node_modules/aws-sdk/lib/sequential_executor.js:77:10)

at Request.emit (/var/runtime/node_modules/aws-sdk/lib/request.js:596:14)

at Request.transition (/var/runtime/node_modules/aws-sdk/lib/request.js:21:10) 

at AcceptorStateMachine.runTo (/var/runtime/node_modules/aws-sdk/lib/state_machine.js:14:12) 

at /var/runtime/node_modules/aws-sdk/lib/state_machine.js:26:10 

at Request.<anonymous> (/var/runtime/node_modules/aws-sdk/lib/request.js:37:9) 

at Request.<anonymous> (/var/runtime/node_modules/aws-sdk/lib/request.js:598:12) 

at Request.callListeners (/var/runtime/node_modules/aws-sdk/lib/sequential_executor.js:115:18)

没有任何其他描述或信息对S3存储桶的权限允许每个人放入列表并删除。

如何访问S3存储桶?

PS:在Lambda事件属性上,主体是正确的,并且具有管理特权。

amazon-web-services amazon-s3 aws-lambda amazon-iam
11个回答
35
投票

您的Lambda没有特权(S3:GetObject)

转到IAM仪表板,检查与Lambda执行相关的角色。如果您使用AWS向导,它将自动创建一个名为oneClick_lambda_s3_exec_role的角色。点击Show Policy。它应显示类似于附件的图像。确保列出了S3:GetObject

enter image description here


0
投票
我在这个问题上苦苦挣扎了好几个小时。我正在使用AmazonS3EncryptionClient,但没有做任何帮助。然后我注意到该客户端实际上已被弃用,因此我想尝试切换到他们拥有的构建器模型:

0
投票

23
投票

有趣的是,当文件不存在时,AWS返回403(拒绝访问)。确保目标文件在S3存储桶中。


19
投票

我遇到了这个问题,经过数小时的IAM政策疯狂后,解决方案是:

  1. 转到S3控制台
  2. 点击您感兴趣的存储桶。
  3. 点击“属性”
  4. 展开“权限”
  5. 单击“添加更多权限”
  6. 从下拉列表中选择“任何经过身份验证的AWS用户”。选择“上传/删除”和“列表”(或lambda所需的任何内容)。
  7. 点击“保存”

完成。您精心编写的IAM角色策略无关紧要,特定的存储桶策略也无关紧要(我也写过这些策略以使其起作用)。否则,他们就是不使用我的帐户工作。

[编辑]

经过大量修补后,上述方法并不是最佳方法。试试这个:

  1. 保持您的角色策略,如helloV帖子中所述。
  2. 转到S3。选择您的存储桶。单击权限。单击存储桶策略。
  3. 尝试这样的事情:
{
    "Version": "2012-10-17",
    "Id": "Lambda access bucket policy",
    "Statement": [
        {
            "Sid": "All on objects in bucket lambda",
            "Effect": "Allow",
            "Principal": {
                "AWS": "arn:aws:iam::AWSACCOUNTID:root"
            },
            "Action": "s3:*",
            "Resource": "arn:aws:s3:::BUCKET-NAME/*"
        },
        {
            "Sid": "All on bucket by lambda",
            "Effect": "Allow",
            "Principal": {
                "AWS": "arn:aws:iam::AWSACCOUNTID:root"
            },
            "Action": "s3:*",
            "Resource": "arn:aws:s3:::BUCKET-NAME"
        }
    ]
}

[为我工作,不需要您与所有经过身份验证的AWS用户共享(大多数情况下不理想)。


16
投票

如果您指定Resource,请不要忘记也添加子文件夹规范。像这样:

"Resource": [
  "arn:aws:s3:::BUCKET-NAME",
  "arn:aws:s3:::BUCKET-NAME/*"
]

4
投票

我也遇到这个问题,我在ACL试图获取该对象的版本时通过提供s3:GetObject*来解决此问题。


2
投票

如果所有其他策略鸭子都排成一行,如果对象不存在并且请求者对存储桶没有ListObjects权限,S3仍将返回拒绝访问消息。

来自https://docs.aws.amazon.com/AmazonS3/latest/API/RESTObjectGET.html

...如果您请求的对象不存在,则错误Amazon S3返回值取决于您是否还具有s3:ListBucket权限。

如果您对存储桶具有s3:ListBucket权限,Amazon S3将返回HTTP状态代码404(“无此密钥”)错误。如果你不拥有s3:ListBucket权限,Amazon S3将返回一个HTTP状态代码403(“访问被拒绝”)错误。


1
投票

我尝试执行基本的蓝图Python lambda函数[示例代码],并且遇到了相同的问题。我的执行职务是lambda_basic_execution

我去了S3>(这里是我的存储桶名称)>权限。

S3:BucketPolicyView

因为我是初学者,所以我使用了Amazon提供的Policy Generator

,而不是自己编写JSON:http://awspolicygen.s3.amazonaws.com/policygen.html我的JSON看起来像这样:
{
    "Id": "Policy153536723xxxx",
    "Version": "2012-10-17",
    "Statement": [
        {
            "Sid": "Stmt153536722xxxx",
            "Action": [
                "s3:GetObject"
            ],
            "Effect": "Allow",
            "Resource": "arn:aws:s3:::tokabucket/*",
            "Principal": {
                "AWS": [
                    "arn:aws:iam::82557712xxxx:role/lambda_basic_execution"
                ]
            }
        }
    ]

然后代码执行得很好:

foo


1
投票

我正在尝试从s3读取文件并通过更改读取的文件的内容(Lambda + Node)来创建新文件。从S3读取文件没有任何问题。尝试写入S3存储桶后,我立即收到“访问被拒绝”错误。


1
投票

如果您在S3存储桶上设置了加密

© www.soinside.com 2019 - 2024. All rights reserved.