-
Notifications
You must be signed in to change notification settings - Fork 9
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add hability to create user #43
Conversation
692216a
to
71dc785
Compare
fa272fd
to
8cb16f7
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@Donatien26 Thanks for your PR. I've left some comments. Back to you 🏓 !
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thank you very much for this big contribution. :)
Added my own batch of comments on top of Mathieu's (which by the way also apply to the other resources managed by s3-operator, I will need to fix that in the future).
Some are pretty important stuff that need to be discussed and/or implemented before approval (eg: README, group/policy considerations, status update method), some are minor nitpicks.
Will now clone the branch to do some local testing, might have other feedback afterwards.
63cf6ed
to
b255261
Compare
302580b
to
706ace3
Compare
706ace3
to
1c752dd
Compare
groups: | ||
- group-example1 |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Please remove the groups part.
@Donatien26 We resumed tests today - still ongoing, but I'm wondering what we should do with the With its default value of Does that mean the Secret is considered a temporary commodity only, to first fetch the secret key and then store it somewhre else (eg: Vault) ? Or is it intended for a different reason (or unintended - in which case we might want to either change the default value or drop the flag) ? |
Another thing of note : we need to test this further, but it looks like modifying just the - - accessKey: user-a
+ - accessKey: user-b Then :
|
One last tidbit for today : I'm not if this is normal or not, but checking the YAML for the Secret tied to a S3User, the Now there is an obvious link between the two, but I thought this was carried by the |
{ | ||
"Effect": "Allow", | ||
"Action": [ | ||
"admin:CreatePolicy", |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Can you add the right to remove a policy as well please ?
"admin:CreatePolicy", | |
"admin:CreatePolicy", | |
"admin:DeletePolicy", |
No description provided.