Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

paas-s3-broker: bump to ..., provide with common user policy, expand custom-broker-acceptance-tests #3449

Merged
merged 3 commits into from
Nov 20, 2023

Conversation

risicle
Copy link
Member

@risicle risicle commented Oct 9, 2023

What

https://www.pivotaltracker.com/story/show/186090782

Roll this change out to cf, also making our custom-broker-acceptance-tests check they can successfully call s3:GetObjectTagging. In an ideal world we would have actually set a tag on the object to more completely test this works, but then we'd need to add s3:PutObjectTagging which we currently can avoid. So here we just test for the returned TagSet's emptiness.

How to review

👀 https://deployer.dev03.dev.cloudpipeline.digital/teams/main/pipelines/create-cloudfoundry/jobs/custom-acceptance-tests/builds/21 ?


🚨⚠️ Please do not merge this pull request via the GitHub UI ⚠️🚨

@risicle risicle force-pushed the ris-s3-broker-get-object-tagging branch 2 times, most recently from f65dbe7 to d4e64af Compare October 11, 2023 11:17
@risicle
Copy link
Member Author

risicle commented Oct 12, 2023

I think we need some more alterations before this will work for aws s3 sync. Don't know if it's worth merging before that.

@risicle risicle force-pushed the ris-s3-broker-get-object-tagging branch from f2bc50f to 030646b Compare October 17, 2023 12:37
@risicle risicle changed the title paas-s3-broker: bump to ..., test s3:GetObjectTagging in custom-broker-acceptance-tests paas-s3-broker: bump to ..., provide with common user policy, expand custom-broker-acceptance-tests Oct 17, 2023
@risicle
Copy link
Member Author

risicle commented Oct 17, 2023

Ok, this now includes the "common user policy" feature from alphagov/paas-s3-broker#56 and provides that policy to the job.

It also expands the custom-broker-acceptance-tests to ensure different buckets' credentials can't access each other - something that could potentially happen if the common user policy were misconfigured.

@risicle risicle force-pushed the ris-s3-broker-get-object-tagging branch 2 times, most recently from 09a6a24 to 8f8328f Compare October 20, 2023 12:58
@malcgds malcgds marked this pull request as ready for review November 10, 2023 15:43
@malcgds malcgds force-pushed the ris-s3-broker-get-object-tagging branch from 0647ac5 to f904b55 Compare November 16, 2023 16:55
…g privileges

now we're adding an iam identity-based policy to created users
(to allow them to take any s3 action in other accounts) it's
important to ensure we're not accidentally giving them more
privileges than they should have in *our* account, which could
potentially happen if the wrong "account id" value got used for
the broker's common user policy.
@malcgds malcgds force-pushed the ris-s3-broker-get-object-tagging branch from f904b55 to 23f2fa3 Compare November 17, 2023 12:23
Copy link
Contributor

@dark5un dark5un left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I reviewed the deployment of the broker on a dev environment with @malcgds and went really well. I also tested the sync functionality following the instructions that @malcgds wrote and managed to sync the paas s3 bucket with one I made under an experimental account. The rest of the review (code etc has been carried out by @malcgds ). Seems good to go from my end.

@malcgds malcgds merged commit 14c35a3 into main Nov 20, 2023
8 checks passed
@malcgds malcgds deleted the ris-s3-broker-get-object-tagging branch November 20, 2023 09:51
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants