-
Notifications
You must be signed in to change notification settings - Fork 36
TRITON-2510 Add triton accesskeys commands to manage access keys.
#350
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: master
Are you sure you want to change the base?
Conversation
Portions generated by: gpt-5-codex
|
Per an out-of-band discussion: this needs subuser support as well. Update: sub user support was added via the |
eb993a1 to
560750c
Compare
danmcd
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Testing seems good. I've only one small question here.
|
In the tests, I see that we can list temporary access keys ( |
|
@cneira I need to update the examples in the PR description to reflect the latest state but holding off to do that in case we have more changes in cloudapi. The latest changes I've pushed here will show now show the and if requesting long output: You can delete temporary access keys, this will remove them from UFDS and mahi. You can also update the status and description just like permanent keys. Which is seems like something we may not want to allow
The status field of permanent access keys can be updated and even set to |
|
This is great, thank you!. |
Access Keys (utilized by the Manta S3 compat layer) were added to CloudAPI v9.11.0 and support was added to triton-go but not yet to node-triton.
This PR adds a
triton accesskeycommand withget,list,create,delete, andupdatesubcommands:Listing keys (none created yet):
Creating a key:
Listing keys:
Updating a key:
Getting a specific key:
Deleting a key:
This PR also adds the
triton rbac accesskeysandtriton rbac accesskeycommands following the existing patterns of therbac key{s}commands:Listing keys (none created yet):
Creating a key for a subuser:
Listing keys:
Updating keys:
Getting a specific key
Deleting keys
Depends on:
LLM disclosure
Portions generated by: gpt-5-codex
I originally used codex to implement the first pass of some of the
accesskeyssub commands, after refactoring and updating it to align with the cloudapi changes likely little of the original LLM generated code remains. Did not use codex for the rbac subcommands or tests.