Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Make use of the data access role for the tiler permissions instead of a bucket list #52

Open
emileten opened this issue Jul 10, 2023 · 0 comments

Comments

@emileten
Copy link
Contributor

Right now, the titiler pgstac construct has a buckets parameter, and this list of buckets is added to the lambda execution role at deployment time.

This is inconsistent with how we handle permissions for the ingestor lambda : we require the user to provide the ARN of a pre-existing 'data access role'.

Because the ingestor and the titiler lambdas will be accessing the same assets, it makes sense to configure these lambdas with the same permissions.

Handling these permissions in a separate, reusable role (that a user potentially reuses in other applications than the tiler/the stac ingestor) is preferable to avoid having duplicate definitions of the same permissions.

We should therefore parameterize the tiler construct with the same data_access_role_arn option.

@emileten emileten changed the title Make use of the data access role for the tiler permissions Make use of the data access role for the tiler permissions instead of a bucket list Jul 10, 2023
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant