AWS Parameters and Secrets Lambda Extension with Python: A Practical Example
Using the AWS Parameters and Secrets Lambda Extension can speed up your Lambda code and save you money. In this practical example we will go through a full example, complete with a couple of gotchas I found that could catch you out
testKey
and a value of testValue
lambdaExtensionSecretExample
Store a new secret
) and it should appear.Create Function
. Choose Author From Scratch
and give the function a name - I'm going with secretsLambdaExtensionFunction
. Choose Python 3.10 for your runtime (I've chosen arm64 for my Architecture as it is slightly cheaper to run, if you do the same make sure you are in a region that supports the extension with ARM)Create Function
. Once created, the function page should open and you'll be able to see the default code inside the code window.Layers
and click on Add A layer
AWS layers
option and select AWS-Parameter-and-Secrets-Lambda-Extension-Arm64
(AWS-Parameter-and-Secrets-Lambda-Extension
if not using ARM) from the drop-down menu, then create the latest version (there is currently only one). Click Add
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
import os
import urllib3
import json
def lambda_handler(event, context):
http = urllib3.PoolManager()
headers = {"X-Aws-Parameters-Secrets-Token": os.environ.get('AWS_SESSION_TOKEN')}
secrets_extension_http_port = "2773"
secrets_extension_endpoint = "http://localhost:" + \
secrets_extension_http_port + \
"/secretsmanager/get?secretId=" + \
"lambdaExtensionSecretExample"
resp = http.request(
"GET",
secrets_extension_endpoint,
headers=headers
)
print('data', resp.data)
secret = json.loads(resp.data)
secretValue = json.loads(secret['SecretString'])
return secretValue['testKey']
- We're importing the
os
,json
andurllib3
modules. Lambda's Python 3.10 environment does NOT include therequests
module by default. This is our first gotcha! - We're using the
os
module to get the environment variableAWS_SESSION_TOKEN
, to pass in as a header for the request to the Extension. This variable is there already inside the lambda runtime, so you don't need to do anything else to be able to access it. - The default port for the extension is 2773. We can change this if needed but there's no reason to.
- The request is made via a local endpoint, which returns an object, which we then need to turn into a dict that we can get our test value from.
- We've added a print statement so you can see how the data looks, but obviously this wouldn't be recommended normally. Keep those secrets secret!
Deploy
and wait for notification that your new code is ready to use!. Click Test
, Configure Test Event
and create a name for your test, using the 'Hello world' setup. Save and run the test.AccessDeniedException
from the Extension. We need to look at the permissions for the execution role.Configuration
Tab and then the Permissions
Section. Click on the name of the role - secretsLambdaExtensionFunction-role...
or similar. This will open up the role's iam page.Add Permissions
and then Create inline policy
. Choose the JSON
tab and then paste in the following:1
2
3
4
5
6
7
8
9
10
11
{
"Version": "2012-10-17",
"Statement": [
{
"Sid": "SecretsManagerPermission",
"Effect": "Allow",
"Action": "secretsmanager:GetSecretValue",
"Resource": "YOUR_SECRET_ARN_HERE"
}
]
}
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
AWSTemplateFormatVersion: '2010-09-09'
Transform: AWS::Serverless-2016-10-31
Description: >
testLambdaExtSam
Globals:
Function:
Timeout: 3
MemorySize: 128
Resources:
LambdaRole:
Type: AWS::IAM::Role
Properties:
AssumeRolePolicyDocument:
Version: '2012-10-17'
Statement:
- Effect: Allow
Principal:
Service: lambda.amazonaws.com
Action: sts:AssumeRole
Policies:
- PolicyName: SecretsManagerPolicy
PolicyDocument:
Version: '2012-10-17'
Statement:
- Effect: Allow
Action: 'secretsmanager:GetSecretValue'
Resource: !Sub 'arn:aws:secretsmanager:${AWS::Region}:${AWS::AccountId}:secret:*'
TestExtensionLambdaFunction:
Type: AWS::Serverless::Function
Properties:
FunctionName: secretsLambdaExtensionFunctionSam
Role: !GetAtt LambdaRole.Arn
CodeUri: lambdaExtensionTest/
Handler: app.lambda_handler
Runtime: python3.10
Architectures:
- arm64
Layers:
- arn:aws:lambda:eu-west-2:133256977650:layer:AWS-Parameters-and-Secrets-Lambda-Extension-Arm64:4
We're also being slightly less specific with our permissions resource here - this would be suitable if we don't know what secrets we will be accessing yet.
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
import * as cdk from 'aws-cdk-lib';
import { Construct } from 'constructs';
import * as sm from 'aws-cdk-lib/aws-secretsmanager';
import * as lambda from 'aws-cdk-lib/aws-lambda';
export class CdkExtensionTestStack extends cdk.Stack {
constructor(scope: Construct, id: string, props?: cdk.StackProps) {
super(scope, id, props);
const secretCompleteArn = 'YOUR_SECRET_ARN_HERE';
const secret = sm.Secret.fromSecretAttributes(this, 'SecretFromAttributes', {
secretCompleteArn,
});
const paramsAndSecrets = lambda.ParamsAndSecretsLayerVersion.fromVersion(lambda.ParamsAndSecretsVersions.V1_0_103, {
cacheSize: 500,
logLevel: lambda.ParamsAndSecretsLogLevel.INFO,
})
const lambdaFunction = new lambda.Function(this, 'TestExtensionsFunction', {
runtime: lambda.Runtime.PYTHON_3_10,
handler: 'index.lambda_handler',
architecture: lambda.Architecture.ARM_64,
code: lambda.Code.fromInline(`
import os
import urllib3
import json
def lambda_handler(event, context):
http = urllib3.PoolManager()
headers = {"X-Aws-Parameters-Secrets-Token": os.environ.get('AWS_SESSION_TOKEN')}
secrets_extension_http_port = "2773"
secrets_extension_endpoint = "http://localhost:" + \
secrets_extension_http_port + \
"/secretsmanager/get?secretId=" + \
"lambdaExtensionSecretExample"
resp = http.request(
"GET",
secrets_extension_endpoint,
headers=headers
)
print('data', resp.data)
secret = json.loads(resp.data)
secretValue = json.loads(secret['SecretString'])
return secretValue['testKey']
`),
paramsAndSecrets,
});
secret.grantRead(lambdaFunction);
}
}