-
Notifications
You must be signed in to change notification settings - Fork 65
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
aws, terraform: support creation of more than a single IAM Role, and add bucket_readonly_access
config
#3932
Conversation
This comment was marked as resolved.
This comment was marked as resolved.
83faa5e
to
04661e8
Compare
user-sa
, and bucket_readonly_access
added
fab3f08
to
fa7541a
Compare
user-sa
, and bucket_readonly_access
addeduser-sa
, and bucket_readonly_access
added
fb6661a
to
f0ba8b8
Compare
f0ba8b8
to
6c5932a
Compare
6c5932a
to
470ea87
Compare
user-sa
, and bucket_readonly_access
addedbucket_readonly_access
config
470ea87
to
4391e6c
Compare
Planning@yuvipanda I've rebased and finalized this PR on all current k8s clusters (kitware included). This is what I consider remains:
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thanks for scoping and working on this, @consideRatio. The overall structure looks good to me - it causes minimal churn right now while also allowing us to expand this in the future if we wish. Splitting the files is also a good call.
I've left some comments about naming, as well as made two PRs to your PR with respect to some doc strings and comments. With those addressed, I think this is good to go.
I didn't test the actual effects of these, although I did test terraform apply
and observed the changes to be ok. I think you've already tested them in various places. I would say we should make sure the extra_iam_permission
hubs work correctly, and make sure we verify those after apply.
Thanks!
Thank you for reviewing this carefully and making it easy for me to address your input @yuvipanda! All review comments addressed in pushed commits. I've previously checked that these changes work end to end in opensci/sciencecore - and I think they have also successfully been used by the community. I've also checked after the new commits have been made, that If this looks good to you now, I've outlined the next steps I intend to take in #3932 (comment) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thanks @consideRatio. Your action plan sounds good to me. Please proceed.
090ace2
to
0b40168
Compare
Thank you for meeting with me about what led to this and reviewing efforts @yuvipanda!! |
New feature
bucket_readonly_access
underhub_cloud_permissions
Changed
The AWS terraform variable
hub_cloud_permissions
is changed from having a structure of:to:
Where the fields
bucket_admin_access
,bucket_readonly_access
, andextra_iam_policy
have also been made optional.terraform apply changes
This change is meant to not cause issues when
terraform apply
is used for existing clusters. It will however cause a change to a resource - the bucket access policy.`terraform apply` safe-to-apply changes
Limitations and possible issues
hub_cloud_permissions
structure is now changed for AWS but not for GCP, making them have different structure but otherwise very similar structure.bucket_readonly_access
is only implemented for AWS with this PRdask-gateway
is hardcoded to useuser-sa
and can't securely use whatever the user is having I think.So, if we configure
jupyterhub.custom.singleuserAdmin.serviceAccountName: admin-sa
, users requests for dask clusters (dask-scheduler pod + dask-worker pods) they won't have the same service account.Reamining work before merge
terraform apply
across all clusters so this change doesn't cause confusion for other people laterRemaining work after merge
We decided that we'll get this merged first, and then write docs as we wanted to prio other things.
Tracked by Update infra docs to reflect recent terraform aws changes #3987
Related