Run 'aws lambda list-functions' with Dynamic Credentials

The aws lambda list-functions command is part of the AWS Command Line Interface (CLI) and retrieves a list of AWS Lambda functions within your AWS account. It returns a JSON-formatted list of information such as function name, ARN (Amazon Resource Name), runtime, memory size, and more.

The aws lambda list-functions command is handy when managing multiple functions, and there’s a need to verify their existence, configurations, or other details. This command is executed in the terminal using the AWS CLI and necessitates proper management of AWS credentials. Typically, two kinds of credentials are used: temporary credentials, which offer heightened security but require manual updates, and long-term credentials, which are more convenient but pose more significant security risks.

With Pulumi ESC (Environments, Secrets, and Configurations), handling these credentials becomes more straightforward and secure. Pulumi ESC facilitates managing dynamic credentials from AWS using OIDC, ensuring all your AWS CLI commands, including aws lambda list-functions, execute successfully. This approach eliminates concerns over invalid credentials and reduces the risks associated with manual credential management.

Using Pulumi ESC for dynamic credentials with AWS

Pulumi ESC is a service that helps to alleviate the burden of managing cloud configuration and secrets by providing a centralized way to handle these critical aspects of cloud development. The esc run command of this service, in particular, helps to resolve concerns around how to:

  • Share credentials with teammates consistently and securely.
  • Minimize the risks associated with locally configured, long-lived, and highly privileged credentials.
  • Ensure teams can quickly and safely run commands like aws lambda list-functions without requiring deep security expertise.

What is the esc run command?

The Pulumi documentation for the esc run command states the following:

This command opens the environment with the given name and runs the given command. If the opened environment contains a top-level ’environmentVariables’ object, each key-value pair in the object is made available to the command as an environment variable.

But what does this actually mean? If we use AWS as an example, it means that we can run commands like aws lambda list-functions without the need to configure AWS credentials locally each time. It’s a significant stride towards making your cloud interactions more efficient and less error-prone, and here’s a deeper dive into why:

  • Seamless Command Execution - The esc run command lets you execute AWS commands effortlessly, freeing you from the intricacies of managing AWS credentials on your local machine. Simply put, it significantly reduces the overhead of credential setup and maintenance.

  • Enhanced Security - One of the standout features of esc run is its commitment to security. Removing the local storage of credentials reduces the risk of accidental exposure. Your credentials and secrets are securely managed within the Pulumi environment.

  • Streamlined Collaboration - Because credentials are centralized, esc run facilitates smoother team collaboration by providing a consistent environment for all team members to leverage. Everyone can access the same secure environment, reducing the complexities of coordinating credentials and configurations across teams.

Getting started with esc run

Step 1: Install and login to Pulumi ESC

To begin, you’ll need to install Pulumi ESC. Once the installation is complete, run the esc login command and follow the steps to log in to the CLI.

$ esc login
Manage your Pulumi ESC environments by logging in.
Run `esc --help` for alternative login options.
Enter your access token from https://app.pulumi.com/account/tokens
    or hit <ENTER> to log in using your browser                   :
Logged in to pulumi.com as …

Step 2: Create the OIDC configuration

Pulumi ESC allows you to manually set your credentials as secrets in your Pulumi ESC environment files. When it comes to something like OIDC configuration, a more secure and efficient alternative is to leverage yet another great feature of Pulumi ESC: dynamic credentials.

This service can dynamically generate credentials on your behalf whenever you interact with your AWS environments. To do so, follow the guide for configuring OIDC between Pulumi and AWS. Ensure the IAM role you create has sufficient permissions to perform the AWS Lambda actions.

Step 3: Create a new Pulumi ESC environment

Once you have OIDC configured between Pulumi and AWS, the next step is to create a new environment in Pulumi Cloud.

  • Navigate to your Pulumi Cloud home page.
  • Select the correct organization in the left-hand navigation menu.
  • Click the Environments link.
  • Click the Create environment button.
  • In the pop-up window, provide a name for your environment. e.g., aws-prod-env
  • Click the Create environment button.

Step 4: Add the AWS provider integration

Once you’ve created your new environment, you will be presented with a split-pane editor view.

  • Clear out the default placeholder content in the editor on the left-hand side.
  • Replace it with the following code, making sure to replace <your-oidc-iam-role-arn> with the value of your IAM role ARN from the configure OIDC step:
values:
  aws:
    login:
      fn::open::aws-login:
        oidc:
          duration: 1h
          roleArn: <your-oidc-iam-role-arn>
          sessionName: pulumi-environments-session
  environmentVariables:
    AWS_ACCESS_KEY_ID: ${aws.login.accessKeyId}
    AWS_SECRET_ACCESS_KEY: ${aws.login.secretAccessKey}
    AWS_SESSION_TOKEN: ${aws.login.sessionToken}

Step 5: Run aws lambda list-functions

With your environment set up, validate your configuration.

  • Check your local environment does not have any AWS credentials configured by running the aws configure list command as shown below:
$ aws configure list
      Name                    Value             Type    Location
      ----                    -----             ----    --------
   profile                <not set>             None    None
access_key                <not set>             None    None
secret_key                <not set>             None    None
    region                <not set>             None    None

To get the list of Lambda functions, run the command using esc run as shown below, making sure to replace <your-pulumi-org-name>, <your-project-name>, <your-environment-name>, and <aws-region> with the names of your own Pulumi organization, ESC environment, and AWS Region, respectively.

$ esc run <your-pulumi-org-name>/<your-project-name>/<your-environment-name> -- aws lambda list-functions --region <aws-region>

Your output will vary depending on the number of deployed Lambda functions. Example,

{
    "Functions": [
        {
            "FunctionName": "fn2-1234dc3",
            "FunctionArn": "arn:aws:lambda:us-west-2:123123123123:function:fn2-1234dc3",
# ... other output not shown

Conclusion

Pulumi ESC makes it easier than ever to tame infrastructure complexity, especially when running commands like aws lambda list-functions. Pulumi ESC supports dynamic credentials using OIDC across AWS, Azure, and Google Cloud. Check out the following links to learn more about Pulumi ESC today.

Join our community on Slack to discuss this topic further, and let us know what you think.

Get started today

Pulumi is open source and free to get started. Deploy your first stack today.