You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
I need to host a web site that is accessible only by my lambda function. That function uses a headless chromium to render specific HTML+JS templates, so I need to have a real web server for those templates, not just a read permission to S3 objects.
It seems that a good general way to do private API (not limited to s3) is to use AuthorizationType "AWS_IAM" in an ApiGateway Method. As far as I understand there is currently no way to specify authorization in awsx.apigateway.API routes. Is that is true? Would it be a good idea to add it?
Is there any way to deny public static s3 website access and left it only for lambda?
Thank you.
The text was updated successfully, but these errors were encountered:
Hello,
I need to host a web site that is accessible only by my lambda function. That function uses a headless chromium to render specific HTML+JS templates, so I need to have a real web server for those templates, not just a read permission to S3 objects.
It seems that a good general way to do private API (not limited to s3) is to use AuthorizationType "AWS_IAM" in an ApiGateway Method. As far as I understand there is currently no way to specify authorization in awsx.apigateway.API routes. Is that is true? Would it be a good idea to add it?
Is there any way to deny public static s3 website access and left it only for lambda?
Thank you.
The text was updated successfully, but these errors were encountered: