You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: Readme.md
+7-5Lines changed: 7 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,12 +6,14 @@
6
6
7
7
This plugin will sign a request with AWS SIGV4 and temporary credentials from `sts.amazonaws.com` requested using an OAuth token.
8
8
9
-
It enables the secure use of AWS Lambdas as upstreams in Kong using[Lambda URLs](https://aws.amazon.com/blogs/aws/announcing-aws-lambda-function-urls-built-in-https-endpoints-for-single-function-microservices/).
9
+
The AWS SIGV4 signature enables secure proxying directly towards AWS services such as[Lambda URLs](https://aws.amazon.com/blogs/aws/announcing-aws-lambda-function-urls-built-in-https-endpoints-for-single-function-microservices/).
10
10
11
11
At the same time it drives down cost and complexity by excluding the AWS API Gateway and allowing to use AWS Lambdas directly.
12
12
13
13
The required AWS setup to make the plugin work with your Lambda HTTPS endpoint is described below.
14
14
15
+
Note that this plugin cannot be used in combination with Kong [upstreams](https://docs.konghq.com/gateway/latest/get-started/load-balancing/).
16
+
15
17
## Plugin configuration parameters
16
18
17
19
```lua
@@ -31,7 +33,7 @@ aws_service - AWS Service you are trying to access (lambda and s3 were tested)
In case of requests contanining a body, the plugin is highly reliant on the nginx configuration, because it neets to access the body to sign it.
115
-
The behaviour is controlled by the following Kong configuration parameters:
116
+
In case of requests containing a body, the plugin is highly reliant on the nginx configuration, because it needs to access the body to sign it.
117
+
The behavior is controlled by the following Kong configuration parameters:
116
118
117
119
```text
118
120
nginx_http_client_max_body_size
@@ -135,7 +137,7 @@ The default value for max body size is `0`, which means unlimited, so consider s
135
137
</details>
136
138
137
139
2. Your OpenID Connect provider is added to [AWS IAM](https://us-east-1.console.aws.amazon.com/iamv2/home?region=us-east-1#/identity_providers)
138
-
3. You have a role with `arn:aws:iam::aws:policy/AWSLambda_FullAccess` and/or `arn:aws:iam::aws:policy/AmazonS3FullAccess`permision (or any other permision that grants access to your desired AWS service ) and the trust relationship below:
140
+
3. You have a role with `arn:aws:iam::aws:policy/AWSLambda_FullAccess` and/or `arn:aws:iam::aws:policy/AmazonS3FullAccess`permission (or any other permission that grants access to your desired AWS service ) and the trust relationship below:
0 commit comments