【问题标题】:InvalidLambdaFunctionAssociation when creating CloudFront distribution via Terraform通过 Terraform 创建 CloudFront 分配时,LambdaFunctionAssociation 无效
【发布时间】:2017-10-22 14:58:38
【问题描述】:

我想创建一个可以调用lambda (@edge) 的 CloudFront 分配。我能够使用 AWS 控制台做到这一点。我现在正在尝试使用 Terraform 来实现相同的目标。我的配置如下。

首先,我为 lambda 创建了一个角色。

resource "aws_iam_role" "my_edge_lambda_iam_role" {
  name = "my_edge_lambda_iam_role"

  assume_role_policy = <<EOF
{
  "Version": "2012-10-17",
  "Statement": [
    {
      "Action": "sts:AssumeRole",
      "Principal": {
        "Service": "lambda.amazonaws.com"
      },
      "Effect": "Allow",
      "Sid": ""
    }
  ]
}
EOF
}

接下来,我创建了一个 lambda。

resource "aws_lambda_function" "redirect_lambda" {
  filename         = "myscript.js.zip"
  function_name    = "my_js_script"
  role             = "arn:aws:iam::123456789:role/my_edge_lambda_iam_role"
  handler          = "index.handler"
  runtime          = "nodejs4.3-edge"
}

最后,我(尝试)使用上述 lambda 函数的 ARN 创建了 CloudFront 分配。定义如下。

resource "aws_cloudfront_distribution" "s3_distribution" {
  origin {
    domain_name = "my-bucket.s3.amazonaws.com"
    origin_id   = "<my S3 path>"
  }

  enabled             = true
  is_ipv6_enabled     = true

  default_cache_behavior {
    allowed_methods  = ["GET", "HEAD"]
    cached_methods   = ["GET", "HEAD"]
    target_origin_id = "<my target origin>"

    forwarded_values {
      query_string = false

      cookies {
        forward = "none"
      }
    }

    lambda_function_association {
      event_type = "viewer-request"
      lambda_arn = "<arn of the lambda function denerated above>"
    }

    viewer_protocol_policy = "allow-all"
    min_ttl                = 0
    default_ttl            = 86400
    max_ttl                = 31536000
  }

  price_class = "PriceClass_All"

  viewer_certificate {
    cloudfront_default_certificate = true
 }

  restrictions {
    geo_restriction {
      restriction_type = "none"
    }
  }
}

尝试创建分发时,出现以下异常。

Error applying plan:

1 error(s) occurred:

* aws_cloudfront_distribution.s3_distribution: 1 error(s) occurred:

* aws_cloudfront_distribution.s3_distribution: InvalidLambdaFunctionAssociation: Failed to retrieve the function from Lambda. ErrorCode: AccessDeniedException Function: arn:aws:lambda:us-east-2:12345678:function:my_js_script
    status code: 400, request id: 65579sd33-3f2d5-181e7-9140-79c1ff79fbdd

我定义角色的方式有问题吗?

【问题讨论】:

  • 目前尚不清楚这将如何与 Terraform 一起使用,但似乎需要告诉“lambda”允许“edgelambda”获取函数......这是函数本身的权限(不是角色)(我认为)(也许)...docs.aws.amazon.com/lambda/latest/dg/…
  • @Michael-sqlbot:是否有关于如何向 lambda 添加权限的示例 Terraform 配置?

标签: aws-lambda amazon-cloudfront terraform


【解决方案1】:

正如comments 中提到的Michael,您需要添加aws_lambda_permission 资源以允许AWS 服务调用Lambda 函数。

resource "aws_lambda_permission" "allow_cloudfront" {
  statement_id   = "AllowExecutionFromCloudFront"
  action         = "lambda:GetFunction"
  function_name  = "${aws_lambda_function.redirect_lambda.function_name}"
  principal      = "edgelambda.amazonaws.com"
}

AWS docs 提供了有关如何在 Terraform 之外允许此操作的更多信息,在这种情况下使用 CLI:

aws lambda add-permission \               
 --function-name arn \
 --statement-id statement-id \
 --action lambda:GetFunction \
 --principal edgelambda.amazonaws.com

【讨论】:

    猜你喜欢
    • 1970-01-01
    • 2019-10-23
    • 2019-09-22
    • 2019-10-03
    • 1970-01-01
    • 2021-09-08
    • 2021-12-02
    • 2020-11-07
    • 2019-08-20
    相关资源
    最近更新 更多