Skip to content

Commit 0a49a3c

Browse files
authored
Update README.md
1 parent 086dd53 commit 0a49a3c

File tree

1 file changed

+7
-50
lines changed

1 file changed

+7
-50
lines changed

README.md

Lines changed: 7 additions & 50 deletions
Original file line numberDiff line numberDiff line change
@@ -109,14 +109,14 @@ Visit our [examples directory](https://github.com/codeupify/upify/tree/main/exam
109109

110110
## Provider Authentication
111111

112-
### AWS - Lambda
112+
### AWS
113113

114114
#### Setting up AWS Credentials
115115

116116
1. Log into your AWS Console
117117
2. Go to IAM (Identity and Access Management)
118118
3. Create a new IAM user or select an existing one
119-
4. Attach permissions (Required permissions can be found [here](#aws-required-permissions))
119+
4. Attach permissions
120120
5. Under "Security credentials", create a new access key and save those credentials
121121

122122
#### Configuring Credentials
@@ -159,45 +159,11 @@ export AWS_SECRET_ACCESS_KEY="YOUR_SECRET_KEY"
159159
export AWS_DEFAULT_REGION="us-east-1"
160160
```
161161

162-
163-
### AWS Required Permissions
164-
```json
165-
{
166-
"Version": "2012-10-17",
167-
"Statement": [
168-
{
169-
"Effect": "Allow",
170-
"Action": [
171-
"lambda:CreateFunction",
172-
"lambda:UpdateFunctionCode",
173-
"lambda:GetFunction",
174-
"lambda:CreateFunctionUrlConfig",
175-
"lambda:GetFunctionUrlConfig",
176-
"lambda:AddPermission",
177-
"lambda:UpdateFunctionConfiguration",
178-
"lambda:GetFunctionConfiguration"
179-
],
180-
"Resource": "arn:aws:lambda:*:*:function:*"
181-
},
182-
{
183-
"Effect": "Allow",
184-
"Action": [
185-
"iam:GetRole",
186-
"iam:CreateRole",
187-
"iam:AttachRolePolicy",
188-
"iam:PassRole"
189-
],
190-
"Resource": "arn:aws:iam::*:role/*"
191-
}
192-
]
193-
}
194-
```
195-
196-
### GCP - Cloud Run
162+
### GCP
197163

198164
#### Setting up GCP Project
199165
1. Log into GCP Console
200-
2. Enable required APIs (Required APIs can be found [here](#gcp-required-permissions))
166+
2. Enable required APIs (Required APIs can be found [here](#gcp-required-apis))
201167

202168
#### Configuring Credentials
203169

@@ -213,28 +179,19 @@ gcloud config set project YOUR_PROJECT_ID
213179
1. Create a service account in GCP Console:
214180
1. Go to IAM & Admin > Service Accounts
215181
2. Click "Create Service Account"
216-
3. Add required roles (Required roles can be found [here](#gcp-required-permissions))
182+
3. Add required roles
217183
2. Download service account key (JSON format)
218184
3. Set the credentials:
219185

220186
```bash
221187
export GOOGLE_APPLICATION_CREDENTIALS="/path/to/service-account-key.json"
222188
```
223189

224-
### GCP Required Permissions
225-
Required Roles:
226-
227-
- Cloud Functions Admin (`roles/cloudfunctions.admin`)
228-
- Cloud Functions Developer (`roles/cloudfunctions.developer`)
229-
- Service Account User (`roles/iam.serviceAccountUser`)
230-
- Storage Admin (`roles/storage.admin`)
231-
- Viewer (`roles/viewer`)
232-
233-
Required APIs:
190+
### GCP Required APIs
234191

235192
- Cloud Functions API
236193
- Cloud Run API
237194
- Cloud Build API
238195
- Artifact Registry API
239196
- Cloud Resource Manager API
240-
- Cloud Storage API
197+
- Cloud Storage API

0 commit comments

Comments
 (0)