-
Notifications
You must be signed in to change notification settings - Fork 89
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
IAM as Code #848
Comments
This is not an urgent task, but definitely, a bonus point that can make external users happy. |
After a few investigations, seems like AWS organizations and SSO service would be a good fit |
Maybe we don't have to make access-granting process fully-automated, allow only Admins to run some pre-defined command should be fine. https://docs.aws.amazon.com/cli/latest/reference/iam/update-assume-role-policy.html |
/close Close in favor of https://github.com/kubeflow/testing/tree/master/aws/Access |
@PatrickXYS: Closing this issue. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
Basically, I think we need to enhance IAM as Code(IAC) to enable third-party users (kubeflow maintainers) to have ReadOnly Access to S3/ECR.
It can also save efforts in Optional-Test-Infra admin to check account resources back-and-forth.
So the way I want to move forward:
Ref:
/cc @theofpa @andreyvelich
The text was updated successfully, but these errors were encountered: