Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

S3: Warn about and deprecate insecure defaults #579

Merged
merged 1 commit into from
Sep 2, 2018
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
32 changes: 28 additions & 4 deletions storages/backends/s3boto.py
Original file line number Diff line number Diff line change
@@ -1,9 +1,11 @@
import mimetypes
import os
import warnings
from datetime import datetime
from gzip import GzipFile
from tempfile import SpooledTemporaryFile

from django.conf import settings as django_settings
from django.core.exceptions import ImproperlyConfigured, SuspiciousOperation
from django.core.files.base import File
from django.core.files.storage import Storage
Expand Down Expand Up @@ -78,6 +80,17 @@ def __init__(self, name, mode, storage, buffer_size=None):
self.buffer_size = buffer_size
self._write_counter = 0

# warn about upcoming change in default AWS_DEFAULT_ACL setting
if not hasattr(django_settings, 'AWS_DEFAULT_ACL'):
warnings.warn(
"The default behavior of S3BotoStorage is insecure and will change "
"in django-storages 1.8. By default files and new buckets are saved "
"with an ACL of 'public-read' (globally publicly readable). Version 1.8 will "
"default to using the bucket's ACL. To opt into the new behavior set "
"AWS_DEFAULT_ACL = None, otherwise to silence this warning explicitly "
"set AWS_DEFAULT_ACL."
)

@property
def size(self):
return self.key.size
Expand Down Expand Up @@ -113,9 +126,9 @@ def write(self, content, *args, **kwargs):
self._is_dirty = True
if self._multipart is None:
provider = self.key.bucket.connection.provider
upload_headers = {
provider.acl_header: self._storage.default_acl
}
upload_headers = {}
if self._storage.default_acl:
upload_headers[provider.acl_header] = self._storage.default_acl
upload_headers.update({
'Content-Type': mimetypes.guess_type(self.key.name)[0] or self._storage.key_class.DefaultContentType
})
Expand Down Expand Up @@ -318,7 +331,18 @@ def _get_or_create_bucket(self, name):
except self.connection_response_error:
if self.auto_create_bucket:
bucket = self.connection.create_bucket(name, location=self.origin)
bucket.set_acl(self.bucket_acl)
if not hasattr(django_settings, 'AWS_BUCKET_ACL'):
warnings.warn(
"The default behavior of S3BotoStorage is insecure and will change "
"in django-storages 1.8. By default new buckets are saved with an ACL of "
"'public-read' (globally publicly readable). Version 1.8 will default to "
"Amazon's default of the bucket owner. To opt into this behavior "
"set AWS_BUCKET_ACL = None, otherwise to silence this warning explicitly set "
"AWS_BUCKET_ACL.",
DeprecationWarning,
)
if self.bucket_acl:
bucket.set_acl(self.bucket_acl)
return bucket
raise ImproperlyConfigured('Bucket %s does not exist. Buckets '
'can be automatically created by '
Expand Down
10 changes: 10 additions & 0 deletions storages/backends/s3boto3.py
Original file line number Diff line number Diff line change
Expand Up @@ -379,6 +379,16 @@ def _get_or_create_bucket(self, name):
#
# Also note that Amazon specifically disallows "us-east-1" when passing bucket
# region names; LocationConstraint *must* be blank to create in US Standard.
if not hasattr(django_settings, 'AWS_BUCKET_ACL'):
warnings.warn(
"The default behavior of S3Boto3Storage is insecure and will change "
"in django-storages 2.0. By default new buckets are saved with an ACL of "
"'public-read' (globally publicly readable). Version 2.0 will default to "
"Amazon's default of the bucket owner. To opt into this behavior this warning "
"set AWS_BUCKET_ACL = None, otherwise to silence this warning explicitly set "
"AWS_BUCKET_ACL.",
DeprecationWarning,
)
if self.bucket_acl:
bucket_params = {'ACL': self.bucket_acl}
else:
Expand Down