NPM package `pem` doesn't seem to work in AWS lambda NodeJS 10.x (results in OpenSSL error)
I tried the answer documented by @Kris White, but I was not able to get it to work. Each execution resulted in the error Could not find openssl on your system on this path: /opt/openssl
. I tried several different paths and approaches, but none worked well. It's entirely possible that I simply didn't copy the OpenSSL executable correctly.
Since I needed a working solution, I used the answer provided by @Wilfred Dittmer. I modified it slightly since I wasn't using Docker. I launched an Amazon Linux 2 server, built OpenSSL on it, transferred the package to my local machine, and deployed it via Serverless.
Create a file named create-openssl-zip.sh
with the following contents. The script will create the Lambda Layer OpenSSL package.
#!/bin/bash -x
# This file should be copied to and run inside the /tmp folder
yum update -y
yum install autoconf bison gcc gcc-c++ libcurl-devel libxml2-devel -y
curl -sL http://www.openssl.org/source/openssl-1.1.1d.tar.gz | tar -xvz
cd openssl-1.1.1d
./config --prefix=/tmp/nodejs/openssl --openssldir=/tmp/nodejs/openssl && make && make install
cd /tmp
rm -rf nodejs/openssl/share nodejs/openssl/include
zip -r lambda-layer-openssl.zip nodejs
rm -rf nodejs openssl-1.1.1d
Then, follow these steps:
- Open a terminal session in this project's root folder.
- Run the following command to upload the Linux bash script.
curl -F "[email protected]" https://file.io
- Note: The command above uses the popular tool File.io to copy the script to the cloud temporarily so it can be securely retrieved from the build server.
- Note: If
curl
is not installed on your dev machine, you can also upload the script manually using the File.io website.
- Copy the URL for the uploaded file from either the terminal session or the File.io website.
- Note: The url will look similar to this example:
https://file.io/a1B2c3
- Note: The url will look similar to this example:
- Open the AWS Console to the EC2 Instances list.
- Launch a new instance with these attributes:
- AMI: Amazon Linux 2 AMI (HVM), SSD Volume Type (id: ami-0a887e401f7654935)
- Instance Type: t2.micro
- Instance Details: (use all defaults)
- Storage: (use all defaults)
- Tags: Name - 'build-lambda-layer-openssl'
- Security Group: 'Create new security group' (use all defaults to ensure Instance will be publicly accessible via SSH over the internet)
- When launching the instance and selecting a key pair, be sure to choose a Key Pair from the list to which you have access.
- Launch the instance and wait for it to be accessible.
- Once the instance is running, use an SSH Client to connect to the instance.
- More details on how to open an SSH connection can be found here.
- In the SSH terminal session, navigate to the
tmp
directory by runningcd /tmp
. - Download the bash script uploaded earlier by running
curl {FILE_IO_URL} --output create-openssl-zip.sh
.- Note: In the script above, replace
FILE_IO_URL
with the URL returned from File.io and copied in step 3.
- Note: In the script above, replace
- Execute the bash script by running
sudo bash ./create-openssl-zip.sh
. The script may take a while to complete. You may need to confirm one or more package install prompts. - When the script completes, run the following command to upload the package to File.io:
curl -F "[email protected]" https://file.io
. - Copy the URL for the uploaded file from the terminal session.
- In the terminal session on the local development machine, run the following command to download the file:
curl {FILE_IO_URL} --output lambda-layer-openssl.zip
.- Note: In the script above, replace
FILE_IO_URL
with the URL returned from File.io and copied in step 13. - Note: If
curl
is not installed on your dev machine, you can also download the file manually by pasting the copied URL in the address bar of your favorite browser.
- Note: In the script above, replace
- Close the SSH session.
- In the EC2 Instances list, terminate the
build-lambda-layer-openssl
EC2 instance since it is not needed any longer. - The OpenSSL Lambda Layer is now ready to be deployed.
For completeness, here is a portion of my serverless.yml
file:
functions:
functionName:
# ...
layers:
- { Ref: OpensslLambdaLayer }
layers:
openssl:
name: ${self:provider.stage}-openssl
description: Contains openssl command line utility for lambdas that need it
package:
artifact: 'path\to\lambda-layer-openssl.zip'
compatibleRuntimes:
- nodejs10.x
- nodejs12.x
retain: false
...and here is how I configured PEM in the code file:
import * as pem from 'pem';
process.env.LD_LIBRARY_PATH = '/opt/nodejs/openssl/lib';
pem.config({
pathOpenSSL: '/opt/nodejs/openssl/bin/openssl',
});
// other code...
I contacted AWS Support about this and it turns out that the openssl library is still on the Node10x image, just not the command line utility. However, it's pretty easy to just grab it off a standard AMI and use it as a Lambda layer.
Steps:
- Launch an Amazon Linux 2 AMI as an EC2
- SSH into the box, or use an SFTP utility to connect to the box
- Copy the command line utility for openssl at /usr/bin/openssl somewhere you can work with it locally. In my case I downloaded it to my Mac even though it is a Linux file.
- Verify that it's still marked as executable (chmod a+x openssl if necessary if you've downloaded it elsewhere)
- Zip up the file
- Optional: Upload it to an S3 bucket you can get to
- Go to Lambda Layers in the AWS console
- Create a new lambda layer. I named mine openssl and used the S3 pointer to the file on S3. You can also upload the zip directly if you have it on a local file system.
- Attach the arn provided for the layer to your Lambda function. I use serverless so it was defined in the function setup per their documentation.
- In your code, reference openssl as /opt/openssl or you can avoid pathing it in your code (or may not have an option if it's a package you don't control) by adding /opt to you path, i.e.
process.env['PATH'] = process.env['PATH'] + ':' + process.env['LAMBDA_TASK_ROOT'] + ':/opt';
The layer will have been unzipped for you and because you set it to be executable beforehand, it should just work. The underlying openssl libraries are there, so just copying the cli works just fine.
PEM NPM docs says:
Setting openssl location In some systems the openssl executable might not be available by the default name or it is not included in $PATH. In this case you can define the location of the executable yourself as a one time action after you have loaded the pem module:
So I think it is not able to find OpenSSL path in system you can try configuring it programmatically :
var pem = require('pem')
pem.config({
pathOpenSSL: '/usr/local/bin/openssl'
})
As you are using AWS Lambda so just try printing process.env.path
you will get idea of whether OpenSSL is included in path env variable or not.
You can also check 'OpenSSL' by running below code
const exec = require('child_process').exec;
exec('which openssl',function(err,stdopt,stderr){
console.log(err ? err : stdopt);
})
UPDATE
As @hoangdv mentioned in his answer openssl is seems to be removed for node10.x runtime and I think he is right. Also, we have read-only access to file system so we can't do much.
@Seth McClaine, you can give try for node-forge
npm module. One of the module built on top of this is 'https://github.com/jfromaniello/selfsigned' which will make your task easier