You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Add project origin and development story to README
- Mention connection to original awslambdaproxy project
- Brief explanation of NAT punching experiment motivation
- Credit Claude Code for weekend implementation
- Fix README formatting and build artifacts section
🤖 Generated with [Claude Code](https://claude.ai/code)
Co-Authored-By: Claude <noreply@anthropic.com>
Copy file name to clipboardExpand all lines: README.md
+10-5Lines changed: 10 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,7 +2,9 @@
2
2
3
3
A QUIC-based NAT traversal proxy that routes traffic through AWS Lambda functions. Uses UDP hole punching and S3 coordination to establish direct QUIC tunnels through NAT devices.
4
4
5
-

5
+
This is a follow-up to [awslambdaproxy](https://github.com/dan-v/awslambdaproxy) - I wanted to experiment with NAT punching to establish direct tunnels instead of using API Gateway. After building a working prototype, I had [Claude Code](https://claude.ai/code) implement the full system over a weekend.
6
+
7
+

6
8
7
9
## How It Works
8
10
@@ -52,6 +54,11 @@ The Lambda function acts as an exit node, forwarding tunneled traffic to destina
52
54
- AWS CLI configured with Lambda, S3, CloudFormation permissions
53
55
- Go 1.21+ (for building from source)
54
56
57
+
**Setup:**
58
+
```bash
59
+
lambda-nat-proxy config init
60
+
```
61
+
55
62
**Deploy infrastructure:**
56
63
```bash
57
64
lambda-nat-proxy deploy
@@ -69,11 +76,11 @@ The system auto-detects deployed resources and handles session management automa
0 commit comments