-
Notifications
You must be signed in to change notification settings - Fork 79
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
feat(filestore): use service account for s3 api calls #320
feat(filestore): use service account for s3 api calls #320
Conversation
Hello @Hunter-Thompson, Thanks for your pull request! A Core Committer will review your pull request soon. For code contributions, you can learn more about the review process here. |
How is ServiceAccount used? Not seeing that ServiceAccount has been mounted in deployment. Can you point out? |
|
This is for the Kubernetes Native ServiceAccount. I'm not sure if it serves our needs. As far I know, this ServiceAccount is used to access Kubernetes API server (provides RBAC permissions) and related stuffs. |
@mirshahriar, AWS provides a way to attach an IAM role to a Kubernetes native ServiceAccount. Allowing a deployment to access AWS services like S3, without a secret. https://docs.aws.amazon.com/eks/latest/userguide/iam-roles-for-service-accounts.html |
The user will have to:
MM operator wont create the SA, since it already exists. |
Thank you very much. I was unaware of that. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM. Thank you for your work.
@Hunter-Thompson, One more thing. Can we add a check to verify whether the ServiceAccount has a certain annotation required for AWS IAM? |
@mirshahriar I added a check. Another thing to note is that - Im skipping creating the ServiceAccount if We can give the user an option to add an Annotation through the spec, but most of the time, the ServiceAccount with IAM role is created using IaaC(Infra as code), and it would cause the operator to fight with IaaC. Thoughts? |
I agree. Added a comment here. |
For the time being, we can leave it up to the user to manually put this in annotation. |
@mirshahriar changed the layout like you requested. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Hey @Hunter-Thompson, this LGTM overall, I only have one nit comment below regarding the use service account flow control. Apart from that 👍
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM!
Summary
Makes using a secret for S3 optional. Instead, gives an option to UseServiceAccount instead.
This feature is quite important to ensure security standards.
Ticket Link
Fixes #315
Release Note