@@ -109,14 +109,14 @@ Visit our [examples directory](https://github.com/codeupify/upify/tree/main/exam
109109
110110# # Provider Authentication
111111
112- # ## AWS - Lambda
112+ # ## AWS
113113
114114# ### Setting up AWS Credentials
115115
1161161. Log into your AWS Console
1171172. Go to IAM (Identity and Access Management)
1181183. Create a new IAM user or select an existing one
119- 4. Attach permissions (Required permissions can be found [here]( # aws-required-permissions))
119+ 4. Attach permissions
1201205. Under " Security credentials" , create a new access key and save those credentials
121121
122122# ### Configuring Credentials
@@ -159,45 +159,11 @@ export AWS_SECRET_ACCESS_KEY="YOUR_SECRET_KEY"
159159export AWS_DEFAULT_REGION=" us-east-1"
160160` ` `
161161
162-
163- # ## AWS Required Permissions
164- ` ` ` json
165- {
166- " Version" : " 2012-10-17" ,
167- " Statement" : [
168- {
169- " Effect" : " Allow" ,
170- " Action" : [
171- " lambda:CreateFunction" ,
172- " lambda:UpdateFunctionCode" ,
173- " lambda:GetFunction" ,
174- " lambda:CreateFunctionUrlConfig" ,
175- " lambda:GetFunctionUrlConfig" ,
176- " lambda:AddPermission" ,
177- " lambda:UpdateFunctionConfiguration" ,
178- " lambda:GetFunctionConfiguration"
179- ],
180- " Resource" : " arn:aws:lambda:*:*:function:*"
181- },
182- {
183- " Effect" : " Allow" ,
184- " Action" : [
185- " iam:GetRole" ,
186- " iam:CreateRole" ,
187- " iam:AttachRolePolicy" ,
188- " iam:PassRole"
189- ],
190- " Resource" : " arn:aws:iam::*:role/*"
191- }
192- ]
193- }
194- ` ` `
195-
196- # ## GCP - Cloud Run
162+ # ## GCP
197163
198164# ### Setting up GCP Project
1991651. Log into GCP Console
200- 2. Enable required APIs (Required APIs can be found [here](# gcp-required-permissions ))
166+ 2. Enable required APIs (Required APIs can be found [here](# gcp-required-apis ))
201167
202168# ### Configuring Credentials
203169
@@ -213,28 +179,19 @@ gcloud config set project YOUR_PROJECT_ID
2131791. Create a service account in GCP Console:
214180 1. Go to IAM & Admin > Service Accounts
215181 2. Click " Create Service Account"
216- 3. Add required roles (Required roles can be found [here]( # gcp-required-permissions))
182+ 3. Add required roles
2171832. Download service account key (JSON format)
2181843. Set the credentials:
219185
220186` ` ` bash
221187export GOOGLE_APPLICATION_CREDENTIALS=" /path/to/service-account-key.json"
222188` ` `
223189
224- # ## GCP Required Permissions
225- Required Roles:
226-
227- - Cloud Functions Admin (` roles/cloudfunctions.admin` )
228- - Cloud Functions Developer (` roles/cloudfunctions.developer` )
229- - Service Account User (` roles/iam.serviceAccountUser` )
230- - Storage Admin (` roles/storage.admin` )
231- - Viewer (` roles/viewer` )
232-
233- Required APIs:
190+ # ## GCP Required APIs
234191
235192- Cloud Functions API
236193- Cloud Run API
237194- Cloud Build API
238195- Artifact Registry API
239196- Cloud Resource Manager API
240- - Cloud Storage API
197+ - Cloud Storage API
0 commit comments