I'm trying to invoke a lambda function from node.
var aws = require('aws-sdk');
var lambda = new aws.Lambda({
accessKeyId: 'id',
secretAccessKey: 'key',
region: 'us-west-2'
});
lambda.invoke({
FunctionName: 'test1',
Payload: JSON.stringify({
key1: 'Arjun',
key2: 'kom',
key3: 'ath'
})
}, function(err, data) {
if (err) console.log(err, err.stack);
else console.log(data);
});
The keys are for an IAM user.
The user has AWSLambdaExecute and AWSLambdaBasicExecutionRole policies attached.
I get a permission error:
AccessDeniedException: User: arn:aws:iam::1221321312:user/cli is not authorized to perform: lambda:InvokeFunction on resource: arn:aws:lambda:us-west-2:1221321312:function:test1
The AWSLambdaExecute and AWSLambdaBasicExecutionRole do not provide the permissions that are being expressed in the error. Both of these managed policies are designed to be attached to your Lambda function itself, so it runs with these policies.
The error is saying the user under which the nodejs program is running does not have rights to start the Lambda function.
You need to give your IAM user the lambda:InvokeFunction permission:
- Find your User in the IAM Management Console and click it.
- On the "Permissions" tab, expand the "Inline Policies" section and click the "click here" link to add a policy".
- Select a "Custom Policy".
- Give your policy a name. It can be anything.
- Put this policy in the Policy Document field.
Sample policy:
{
"Version": "2012-10-17",
"Statement": [
{
"Sid": "Stmt1464440182000",
"Effect": "Allow",
"Action": [
"lambda:InvokeAsync",
"lambda:InvokeFunction"
],
"Resource": [
"*"
]
}
]
}
In this policy, I have included both methods to invoke lambda methods.
'기타' 카테고리의 다른 글
git pull --prune / git error-"Did not send all necessary objects" (0) | 2024.06.24 |
---|---|
똑똑해지고 싶으세요? “운동하세요” (1) | 2023.12.29 |
밥만 먹는 밥벌레 장군 (1) | 2023.07.12 |
CSS3 - HTML img 태그에 넣은 svg 파일의 색상 바꾸기 (0) | 2023.06.08 |
[LeetCode] Group Anagrams (0) | 2023.02.04 |