You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+57-58Lines changed: 57 additions & 58 deletions
Original file line number
Diff line number
Diff line change
@@ -166,7 +166,7 @@ the OpenSearch domain into it.
166
166
With the 0.4.x codebase, change the serverless.yml file to add to the AWS::Elasticsearch::Domain definition at the same
167
167
level as the `Type` attribute these two attributes:
168
168
169
-
```
169
+
```yaml
170
170
DeletionPolicy: Retain
171
171
UpdateReplacePolicy: Retain
172
172
```
@@ -282,7 +282,7 @@ validate that `properties.datetime` type is `date`, and `id` and `collection` ma
282
282
283
283
The results should look simliar to this:
284
284
285
-
```
285
+
```json
286
286
{
287
287
"my_collection_name": {
288
288
"mappings": {
@@ -413,7 +413,7 @@ There are some settings that should be reviewed and updated as needeed in the se
413
413
| OPENSEARCH_USERNAME | The username to authenticate to OpenSearch with if fine-grained access control is enabled. | |
414
414
| OPENSEARCH_PASSWORD | The password to authenticate to OpenSearch with if fine-grained access control is enabled. | |
415
415
| OPENSEARCH_CREDENTIALS_SECRET_ID | The AWS Secrets Manager secret to retrieve the username and password from, to authenticate to OpenSearch with if fine-grained access control is enabled. | |
416
-
| COLLECTION_TO_INDEX_MAPPINGS | A JSON object representing collection id to index name mappings if they do not have the same names. | |
416
+
| COLLECTION_TO_INDEX_MAPPINGS | A JSON object representing collection id to index name mappings if they do not have the same names. | |
417
417
418
418
| ITEMS_INDICIES_NUM_OF_SHARDS | Configure the number of shards for the indices that contain Items. | none |
419
419
| ITEMS_INDICIES_NUM_OF_REPLICAS | Configure the number of replicas for the indices that contain Items. | none |
@@ -528,25 +528,25 @@ to the Elasticsearch -> OpenSearch migration process.
528
528
Add this to the `AWS::OpenSearchService::Domain` resource:
If you wanted to deploy STAC Server in a way which ensures certain endpoints have restricted access but others don't, you can deploy it into a VPC and add conditions that allow only certain IP addresses to access certain endpoints. Once you deploy STAC Server into a VPC, you can modify the Resource Policy of the API Gateway endpoint that gets deployed to restrict access to certain endpoints. Here is a hypothetical example. Assume that the account into which STAC Server is deployed is numbered 1234-5678-9123, the API ID is ab1c23def, and the region in which it is deployed is us-west-2. You might want to give the general public access to use any GET or POST endpoints with the API such as the "/search" endpoint, but lock down access to the transaction endpoints (see <https://github.com/radiantearth/stac-api-spec/tree/master/ogcapi-features/extensions/transaction>) to only allow certain IP addresses to access them. These IP addresses can be, for example: 94.61.192.106, 204.176.50.129, and 11.27.65.78. In order to do this, you can impose a condition on the API Gateway that only allows API transactions such as adding, updating, and deleting STAC items from the whitelisted endpoints. For example, here is a Resource Policy containing two statements that allow this to happen:
743
742
744
-
```
743
+
```json
745
744
{
746
745
"Version": "2012-10-17",
747
746
"Statement": [
@@ -782,27 +781,27 @@ If you wanted to deploy STAC Server in a way which ensures certain endpoints hav
782
781
783
782
The first statement in the Resource Policy above grants access to STAC API endpoints for use in general operations like searching, and the second statement restricts access to the Transaction endpoints to a set of source IP addresses. According to this policy, POST, PUT, PATCH, and DELETE operations on items within collections are only allowed if the request originates from the IP addresses 94.61.192.106, 204.176.50.129, or 11.27.65.78. The second statement can also be written in another manner, denying access to the Transaction endpoints for all addresses that don’t match a set of source IP addresses. This is shown below.
0 commit comments