I am working on a system that allows users to access, process and retrieve S3 data by making HTTP requests to apigateway which invokes a lambda.
(我正在开发一个系统,该系统允许用户通过对调用lambda的apigateway发出HTTP请求来访问,处理和检索S3数据。)
A S3 path can be a parameter to these requests. (S3路径可以是这些请求的参数。)
I'm trying to find an IAM native solution that will evaluate the fine-grained S3 permission (assigned to my users) with the lambda service role to determine object/bucket level access at runtime. (我试图找到一个IAM本机解决方案,该解决方案将使用lambda服务角色评估细粒度的S3权限(分配给我的用户),以确定运行时对象/存储桶级别的访问权限。)
Similar to what is depicted here (AWS QuickSight)
(类似于此处的描述(AWS QuickSight))
ask by Jonny translate from so 与恶龙缠斗过久,自身亦成为恶龙;凝视深渊过久,深渊将回以凝视…