-
Notifications
You must be signed in to change notification settings - Fork 5
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Revisit the idea of using S3 ACLs #137
Comments
@danlamanna - it would be good to add where this would be applied. |
Given how much AWS steers people away from it, I'd like to have a skeptical eye towards using a legacy access control mechanism in any of our buckets. I'm not sure that any of our use cases of object storage demands very different permissions on a per object basis that we couldn't otherwise satisfy by using wildcard policies e.g. |
there are two different types of buckets and operations.
we are controlling everything through the dandi api layer rather than through ACLs for individuals as far as i know. hence my curiosity as to where ACLs actually come into play in dandi. |
Oh I misunderstood your original comment. ACLs are enabled on our buckets but I don't think they're used in any meaningful way. There's a handful of places where we have to deal with this (see https://github.com/search?q=org%3Adandi+bucket-owner-full-control&type=code) that just complicates our policies for no benefit that I'm aware of. |
trimming away complications that don't benefit us sounds good to me :) |
From https://docs.aws.amazon.com/AmazonS3/latest/userguide/about-object-ownership.html
Moving away from S3 ACLs would allow us to follow S3 best practices and keep feature parity while removing the code/configuration around object ownership.
The text was updated successfully, but these errors were encountered: