|
@@ -41,6 +41,7 @@ The specifics of using these filesystems are documented in this section.
|
|
|
|
|
|
|
|
|
See also:
|
|
|
+
|
|
|
* [Testing](testing.html)
|
|
|
* [Troubleshooting S3a](troubleshooting_s3a.html)
|
|
|
|
|
@@ -99,6 +100,7 @@ access to the data. Anyone with the credentials can not only read your datasets
|
|
|
—they can delete them.
|
|
|
|
|
|
Do not inadvertently share these credentials through means such as
|
|
|
+
|
|
|
1. Checking in to SCM any configuration files containing the secrets.
|
|
|
1. Logging them to a console, as they invariably end up being seen.
|
|
|
1. Defining filesystem URIs with the credentials in the URL, such as
|