0
我想通過使用預先簽名的URL將圖像文件上傳到AWS s3存儲桶,但是出現屏幕截圖中顯示的錯誤,我按照帖子從這頁s3 direct file upload,我想知道我正在犯什麼錯誤,並且我想知道這是服務器端問題,還是應該使用一些不同的方法向「預先簽名的」URL發出放入請求,謝謝。Lambda:亞馬遜s3直接上傳錯誤簽名不匹配
我serverless.yml
service: my-service-api
provider:
name: aws
runtime: nodejs4.3
stage: dev
region: us-east-1
iamRoleStatements:
- Effect: "Allow"
Action:
- "dynamodb:*"
Resource: "*"
- Effect: "Allow"
Action:
- "s3:*"
Resource: "arn:aws:s3:::profile-images/*"
custom:
globalResultTtlInSeconds: 1
package:
individually: true
include:
- node_modules/mysql/**
- node_modules/bluebird/**
- node_modules/joi/**
exclude:
- .git/**
- .bin/**
- tmp/**
- api/**
- node_modules/**
- utils/**
- package.json
- npm_link.sh
- templates.yml
functions:
profiles:
handler: api/profiles/handler.profiles
events:
- http:
method: POST
path: api/profiles/uploadURL
cors: true
integration: lambda
request: ${file(./templates.yml):request}
authorizer:
arn: arn:aws:lambda:us-east-1:000000000000:function:customAuthorizer
resultTtlInSeconds: ${self:custom.globalResultTtlInSeconds}
identitySource: method.request.header.Authorization
package:
include:
- api/profiles/**
- node_modules/node-uuid/**
- node_modules/jsonwebtoken/**
- node_modules/rand-token/**
resources:
Resources:
UploadBucket:
Type: AWS::S3::Bucket
Properties:
BucketName: profile-images
AccessControl: PublicRead
CorsConfiguration:
CorsRules:
- AllowedMethods:
- GET
- PUT
- POST
- HEAD
AllowedOrigins:
- "*"
AllowedHeaders:
- "*"
IamPolicyInvokeLambdaFunction:
Type: AWS::IAM::Policy
Properties:
PolicyName: "lambda-invoke-function"
Roles:
- {"Ref" : "IamRoleLambdaExecution"}
PolicyDocument:
Version: '2012-10-17'
Statement:
- Effect: Allow
Action:
- "lambda:InvokeFunction"
Resource: "*"
我處理程序文件
var s3Params = {
Bucket: 'profile-images',
Key: image.name,
ACL: 'public-read'
};
s3.getSignedUrl('putObject', s3Params, function (err, url){
if(err){
console.log('presignedURL err:',err);
context.succeed({error: err});
}
else{
console.log('presignedURL: ',url);
context.succeed({uploadURL: url});
}
});
爲什麼你需要上傳一個標識的URL一些幫助lambda函數中的圖像。或者,您可以使用Lambda函數運行的角色有權訪問S3存儲桶,這應該足夠了 – Rajesh
謝謝@Rajesh,您可以爲我提供一些示例嗎?這將有助於我理解 – Balkrishna
@Rajesh檢查鏈接的博客文章。這裏的目標似乎是使用由「服務器」生成的實際上是同步Lambda函數的預簽名URL,從網頁拖放/上傳到S3。從Lambda上傳文件不適用。 –