Bucket policy doesn't work for private
buckets #306
Labels
No labels
P0
P1
P2
P3
good first issue
Infrastructure
blocked
bug
config
discussion
documentation
duplicate
enhancement
go
help wanted
internal
invalid
kludge
observability
perfomance
question
refactoring
wontfix
No project
No assignees
2 participants
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference: TrueCloudLab/frostfs-s3-gw#306
Loading…
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
We cannot provide access to different user (in the same namespace) using PutBucketPolicy
Expected Behavior
Different user can put object to our bucket
Current Behavior
Got error
AccessDenied
In logs:
Possible Solution
Don't set eacl when create bucket but use APE rules to restrict access.
Steps to Reproduce (for bugs)
PutObject
to any principal:Context
This bug was found using s3-iam test
Regression
No
Your Environment
c334adeb6d
Right now our target is to replace eACL with new access policy engine (APE) rules to control access for buckets. Previously created buckets with s3-gw < v0.29.0 will remain affected by this issue. New buckets are going to be accessible if APE explicitly allows it.
Furthermore, we are looking to cooperate with AWS and restrict access for ACL operations. However, we do not intend to remove canned ACL for bucket settings. These ACLs worked fine in all previous s3-gw releases, so we intend to keep this functionality. Other less robust operations like
put-object-acl
are going to be restricted in favor of bucket policy control./cc @TrueCloudLab/architecture-committee
public-read-write
topublic-read
doesn't work #316public-read-write
topublic-read
doesn't work #316public-read-write
topublic-read
doesn't work #316