-
Notifications
You must be signed in to change notification settings - Fork 10
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Gateway mode added with storage options s3 and azure. #27
Gateway mode added with storage options s3 and azure. #27
Conversation
Thank you for the contribution @Barteus can you tell us a bit more on how you have tested this? What storage options besides azure did you try? Also if you could provide us some documentation to test it ourselves that would be great! @ca-scribner and @knkski please take a look at this PR. |
I have checked for azure and s3 storage options. Scenarios checked (both azure and s3 if applicable):
|
I tested this with S3 and it worked for me as well. Actually it worked easier than I expected and I wasn't sure how/where the access/secret keys were used. @Barteus do you understand how exactly this works? I read through the docs a bit and wasn't certain. Am I right that we must:
We should probably add some documentation in the readme that describes how to deploy and interface with these. We could also add integration tests that connect to a real S3 store somewhere (and could even have a client connect through minio to that store), but that might be overkill |
Co-authored-by: Andrew Scribner <[email protected]>
I fully agree with the first two points. About providing users access to Minio buckets and console (currently on random port each time). You can share your S3 AWS creds, but for security reasons, it is not advisable. There is another alternative - you can create a user in console and give them proper accesses (ie read-only or read-write or admin). Users will use their "Minio User" access key and secret. |
Re creds yeah that seemed odd. So am I right that you're saying instead of using the aws creds both as the login to minio and minio's login to aws, we can:
|
Yes, exactly as you described. Creating users works for both the server and gateway mode. |
I wonder what a clean integration of this user management would like like in charming terms. An action in this charm to create users (assuming there's a CLI method for that in minio, which I'd guess there is) seems straightforward. The actual relating/using of the minio charm would probably be different though (right now minio provides related charms with creds, whereas if using separate user accounts we'd almost want the reverse). To start though we could just separate the user facing and aws facing credentials in the config. So the current access/secret key config options are for users, and if you're using |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
With the README added, this LGTM
I have added a new feature request (issue) for user management actions - #28 |
About the split, I would rather leave the minio user credentials for minio binary to handle and keep the single key/secret configuration for minio to use. In both modes, you can use key/secret passed in the charm to connect and use minio. |
I added two tiny requests but otherwise it looks great and I'm good to merge it either way |
Unit test for scenario added
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM
Gateway mode implemented without caching.