mirror of
https://github.com/serverless/serverless.git
synced 2026-01-25 15:07:39 +00:00
Minor typo fixes
This commit is contained in:
parent
caf3a46819
commit
28e0e331e5
@ -64,11 +64,11 @@ Currently, `invoke local` only supports the NodeJs and Python runtimes.
|
||||
|
||||
## Resource permissions
|
||||
|
||||
Lambda functions assume an *IAM role* during exection: the framework creates this role, and set all the permission provided in the `iamRoleStatements` section of `serverless.yaml`.
|
||||
Lambda functions assume an *IAM role* during execution: the framework creates this role, and set all the permission provided in the `iamRoleStatements` section of `serverless.yml`.
|
||||
|
||||
Unless you explicitly state otherwise, every call to the AWS SDK inside the lambda function is made using this role (a temporary pair of key/secret is generated and set by AWS as environment variables, `AWS_ACCESS_KEY_ID` and `AWS_SECRET_ACCESS_KEY`).
|
||||
|
||||
When you use `lambda invoke local`, the situation is quite different: the role isn't available (the function is executed on your local machine), so unless you set a different user directly in the code (or via a key pair of environment variables), the AWS SDK will use the default profile speficied inside you AWS credential configuration file.
|
||||
Unless you explicitly state otherwise, every call to the AWS SDK inside the lambda function is made using this role (a temporary pair of key / secret is generated and set by AWS as environment variables, `AWS_ACCESS_KEY_ID` and `AWS_SECRET_ACCESS_KEY`).
|
||||
|
||||
When you use `serverless invoke local`, the situation is quite different: the role isn't available (the function is executed on your local machine), so unless you set a different user directly in the code (or via a key pair of environment variables), the AWS SDK will use the default profile specified inside you AWS credential configuration file.
|
||||
|
||||
Take a look to the official AWS documentation (in this particular instance, for the javascript SDK, but should be similar for all SDKs):
|
||||
|
||||
@ -76,5 +76,3 @@ Take a look to the official AWS documentation (in this particular instance, for
|
||||
- [http://docs.aws.amazon.com/sdk-for-javascript/v2/developer-guide/loading-node-credentials-lambda.html](http://docs.aws.amazon.com/sdk-for-javascript/v2/developer-guide/loading-node-credentials-lambda.html)
|
||||
|
||||
Whatever approach you decide to implement, **be aware**: the set of permissions might be (and probably is) different, so you won't have an exact simulation of the *real* IAM policy in place.
|
||||
|
||||
|
||||
|
||||
Loading…
x
Reference in New Issue
Block a user