Skip to content

Commit 64aa488

Browse files
committed
Add IAM role S3 bucket policy example to documentation
Quick overview for what permissions are requried by the controller. Signed-off-by: Sam Tavakoli <[email protected]>
1 parent eaec164 commit 64aa488

File tree

1 file changed

+22
-0
lines changed

1 file changed

+22
-0
lines changed

docs/spec/v1beta1/buckets.md

Lines changed: 22 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -204,6 +204,28 @@ spec:
204204
> **Note:** that on EKS you have to create an IAM role for the source-controller
205205
> service account that grants access to the bucket.
206206

207+
### AWS IAM bucket policy example
208+
209+
```json
210+
{
211+
"Version": "2012-10-17",
212+
"Statement": [
213+
{
214+
"Sid": "",
215+
"Effect": "Allow",
216+
"Action": "s3:GetObject",
217+
"Resource": "arn:aws:s3:::podinfo/*"
218+
},
219+
{
220+
"Sid": "",
221+
"Effect": "Allow",
222+
"Action": "s3:ListBucket",
223+
"Resource": "arn:aws:s3:::podinfo"
224+
}
225+
]
226+
}
227+
```
228+
207229
## Status examples
208230

209231
Successful download:

0 commit comments

Comments
 (0)