0

我想通過使用預先簽名的URL將圖像文件上傳到AWS s3存儲桶,但是出現屏幕截圖中顯示的錯誤,我按照帖子從這頁s3 direct file upload,我想知道我正在犯什麼錯誤,並且我想知道這是服務器端問題,還是應該使用一些不同的方法向「預先簽名的」URL發出放入請求,謝謝。Lambda:亞馬遜s3直接上傳錯誤簽名不匹配

Error I'm Getting on Postman

我serverless.yml

service: my-service-api 

provider: 
    name: aws 
    runtime: nodejs4.3 
    stage: dev 
    region: us-east-1 
    iamRoleStatements: 
    - Effect: "Allow" 
     Action: 
     - "dynamodb:*"   
     Resource: "*" 
    - Effect: "Allow" 
     Action: 
     - "s3:*"   
     Resource: "arn:aws:s3:::profile-images/*" 

custom: 
    globalResultTtlInSeconds: 1 

package: 
    individually: true 
    include: 
    - node_modules/mysql/** 
    - node_modules/bluebird/** 
    - node_modules/joi/** 
    exclude: 
    - .git/** 
    - .bin/** 
    - tmp/** 
    - api/** 
    - node_modules/** 
    - utils/** 
    - package.json 
    - npm_link.sh 
    - templates.yml 

functions: 
    profiles: 
    handler: api/profiles/handler.profiles 
    events: 
     - http: 
      method: POST 
      path: api/profiles/uploadURL 
      cors: true 
      integration: lambda 
      request: ${file(./templates.yml):request} 
      authorizer: 
      arn: arn:aws:lambda:us-east-1:000000000000:function:customAuthorizer 
      resultTtlInSeconds: ${self:custom.globalResultTtlInSeconds} 
      identitySource: method.request.header.Authorization 
    package: 
     include: 
     - api/profiles/** 
     - node_modules/node-uuid/** 
     - node_modules/jsonwebtoken/** 
     - node_modules/rand-token/**   

resources: 
    Resources: 
    UploadBucket: 
     Type: AWS::S3::Bucket 
     Properties: 
     BucketName: profile-images 
     AccessControl: PublicRead 
     CorsConfiguration: 
      CorsRules: 
      - AllowedMethods: 
      - GET 
      - PUT 
      - POST 
      - HEAD 
      AllowedOrigins: 
      - "*" 
      AllowedHeaders: 
      - "*" 
    IamPolicyInvokeLambdaFunction: 
     Type: AWS::IAM::Policy  
     Properties: 
     PolicyName: "lambda-invoke-function" 
     Roles: 
      - {"Ref" : "IamRoleLambdaExecution"} 
     PolicyDocument: 
      Version: '2012-10-17' 
      Statement:    
       - Effect: Allow 
       Action: 
        - "lambda:InvokeFunction" 
       Resource: "*" 

我處理程序文件

var s3Params = { 
       Bucket: 'profile-images', 
       Key: image.name, 
       ACL: 'public-read' 
      }; 

s3.getSignedUrl('putObject', s3Params, function (err, url){ 
     if(err){ 
      console.log('presignedURL err:',err); 
      context.succeed({error: err}); 
     } 
     else{ 
      console.log('presignedURL: ',url); 
      context.succeed({uploadURL: url});           
     }      
    }); 
+1

爲什麼你需要上傳一個標識的URL一些幫助lambda函數中的圖像。或者,您可以使用Lambda函數運行的角色有權訪問S3存儲桶,這應該足夠了 – Rajesh

+0

謝謝@Rajesh,您可以爲我提供一些示例嗎?這將有助於我理解 – Balkrishna

+0

@Rajesh檢查鏈接的博客文章。這裏的目標似乎是使用由「服務器」生成的實際上是同步Lambda函數的預簽名URL,從網頁拖放/上傳到S3。從Lambda上傳文件不適用。 –

回答

1

花更多的時間在這個問題後,我意識到,這是不是在服務器端,但問題問題在提出要求。我需要爲我的PUT請求設置標題,因爲當AWS s3收到任何請求時,它會檢查該請求的簽名與標題,因此如果在創建preSignedURL時設置「ContentType」或「ACL」,則必須提供「Content-在你的請求中鍵入'和'x-amz-acl'。

這是我更新「s3Params」

var s3Params = { 
       Bucket: 'profile-images', 
       Key: image.name, 
       ACL: 'public-read', 
       ContentType: image.type 
      }; 

這是我的要求 Updated request headers screenshot

最後我得到了這個職位set headers for presigned PUT s3 requests