Conversation
Collaborator
|
Can we include an example of how a user would use this using maap-py ? |
Contributor
|
@bsatoriu - check out my message on Slack for some automation that could help with @sujen1412 docs request. |
|
sujen1412
approved these changes
Mar 5, 2026
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.



This PR adds organization-level S3 bucket access management, allowing admins to grant orgs access to custom S3 buckets/prefixes beyond the default user workspace.
When users request STS credentials via /api/members/self/awsAccess/workspaceBucket, the IAM policy now dynamically includes any custom S3 buckets their organizations have been granted, and the response returns an authorized_s3_paths array listing all accessible paths.
Endpoint response format change for
awsAccess/workspaceBucketThe
/api/members/self/awsAccess/workspaceBucketresponse replaces aws_bucket_name and aws_bucket_prefix with authorized_s3_paths (an array of s3:// URIs). Consumers that read aws_bucket_name/aws_bucket_prefix will need to be updated to use authorized_s3_paths[0] or iterate the full list.Related admin console change: MAAP-Project/maap-wp-plugin@8c72f74