-
Notifications
You must be signed in to change notification settings - Fork 378
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Expanding IAM support #151
Comments
My suspicion is that we might be able to deprioritise IAM once #141 is merged. We started with IAM mostly because it was (in theory) a simple service, rather than because it was super high priority. My suspicion is that now we have IAM roles, policles, and attachments modelled we've probably got most of the IAM use cases covered. IAMUser may be the one additional thing we need; I believe S3 buckets frequently make use of them. |
Following up on my most recent comment, I believe in rough order of priority we'll need:
I believe this will enable our current use cases, the ability to grant a user access to an S3 bucket, and the ability to grant a pod (role) access to an RDS instance per #126 (comment). Once those three resources are added I think we can safely pause work on IAM until the community comes forward with additional use cases for IAM. |
@negz Should this have a managed policy (arn) or an inline policy (JSON document) or both? |
What problem are you facing?
The current AWS IAM support includes two resources: IAMRole and IAMRolePolicyAttachment. A high fidelity implementation of the AWS APIs would involved adding additional resources.
TODO: User story for statically provisioning a user. IAMUser is used to add any user of S3 buckets. IAMPolicy for bringing existing policy references.
How could Crossplane help solve your problem?
An implementation mapping the APIs to their declarative resource counterparts. Evaluate the APIs to be exposed.
Add the following general resources now:
We support AttachRolePolicy as an IAMRolePolicyAttachment, so the equivalent for IAMUser
IAMUserPolicyAttachment.
We’ll also want, probably as a top priority, to support modeling IAM roles. Today we can attach an IAM role, but we can’t actually create one in Crossplane. What we have today may be sufficient because there are quite a few baked in roles. As a next step, we would support managing roles, then support managing users, then support attaching roles to users.
We have decided to defer work on all other resources until we have a community use cases.
Related Issues
For a full inventory of APIs to resources see this doc (both mapped and unmapped)
The text was updated successfully, but these errors were encountered: