Skip to content

Commit 360d095

Browse files
habdelraclaude
andcommitted
Fix stale grafana references in aws-access skill
Two leftover phrases from before the grafana → claude_readonly_user switch: - "the AWS-side complement to the grafana-only DB rule below" — the rule itself was renamed to require claude_readonly_user; the cross-reference now matches. - "authenticated as the read-only grafana DB user" — the Path A lead-in sentence; now says claude_readonly_user, consistent with the section heading and example procedure. Other grafana mentions in the file are correct in context (they describe what the role explicitly cannot read, or reference 1751981407344_setup-grafana-db-user.js as the source of truth for readonly_role). Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
1 parent 805397a commit 360d095

1 file changed

Lines changed: 2 additions & 2 deletions

File tree

.claude/skills/aws-access/SKILL.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -114,11 +114,11 @@ aws --profile claude-staging ecs list-clusters --query 'clusterArns' --output te
114114

115115
Claude operates against staging and prod **only as the `boxel-claude-readonly` IAM role**. The role's policy is the entire AWS-side permission surface Claude has — there is no path for Claude to access anything the role doesn't grant, regardless of what the user's own IAM groups allow. This is symmetric across staging and prod: the role exists in both accounts under the same name and is intended to grant the same permissions in both.
116116

117-
The role is provisioned by infra-side configuration tracked under CS-10962. Anything that would require a permission outside the role's policy is out of scope for Claude — the user should run that operation themselves through whatever channel the team uses for it. This is by design: the role is the AWS-side complement to the grafana-only DB rule below, and together they make accidental writes structurally hard to issue.
117+
The role is provisioned by infra-side configuration tracked under CS-10962. Anything that would require a permission outside the role's policy is out of scope for Claude — the user should run that operation themselves through whatever channel the team uses for it. This is by design: the role is the AWS-side complement to the claude-readonly-only DB rule below, and together they make accidental writes structurally hard to issue.
118118

119119
## Connecting to the boxel RDS database
120120

121-
The staging/prod boxel Postgres instances are **private** (`PubliclyAccessible: false`) and live inside the cardstack VPC. They are not directly reachable from a developer laptop. The only path Claude uses is SSM port-forwarding through the realm-server ECS task, authenticated as the read-only `grafana` DB user.
121+
The staging/prod boxel Postgres instances are **private** (`PubliclyAccessible: false`) and live inside the cardstack VPC. They are not directly reachable from a developer laptop. The only path Claude uses is SSM port-forwarding through the realm-server ECS task, authenticated as the read-only `claude_readonly_user` DB user.
122122

123123
### Path A — SSM port-forward → psql on localhost as the `claude_readonly_user` DB user
124124

0 commit comments

Comments
 (0)