Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add SCHEME_NULL to list of allowed auth mechanism #28941

Merged
merged 1 commit into from
Feb 8, 2022

Conversation

howardZa
Copy link
Contributor

Add AuthMechanism::SCHEME_NULL to list of allowed auth mechanism for AmazonS3 backend to allow attaching S3 storage to nextcloud instances running on already authorized instances (e.g. EC2 instances with IAM Instance roles)

USE CASE: When running nextcloud on AWS resources (eg. EC2 instances / EKS kubernetes pods), these instances can be associated with IAM roles that permit access to S3 buckets. In this case, no access-key is needed to access the bucket.

The files_external S3 configuration normally insists on the configuration of an Access-Key.

ADVANTAGES: By not using access keys to authorize access to the buckets the credentials do not need to be exposed and the management of IAM permissions is a little bit easier.

@howardZa howardZa marked this pull request as ready for review September 23, 2021 13:32
@kesselb
Copy link
Contributor

kesselb commented Sep 23, 2021

Hey 👋

image

git commit --amend --no-edit --signoff
git push --force-with-lease origin feature/allow_s3_access_wo_auth

  1. Would you mind to sign off your commits?
  2. Indentation seems a bit off

I guess we already allow using the system credentials when using object store. Looks okay to me to allow this for external storages as well. Yet it's possible to allow users to mount their own storages (when the admin allows). Then also end user could use the global credentials.

@kesselb kesselb added this to the Nextcloud 23 milestone Sep 23, 2021
@howardZa howardZa force-pushed the feature/allow_s3_access_wo_auth branch 2 times, most recently from 7afe66a to 5d08f35 Compare September 24, 2021 09:13
@kesselb kesselb requested review from a team, PVince81, icewind1991 and blizzz and removed request for a team September 24, 2021 09:29
Copy link
Member

@PVince81 PVince81 left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

👍

@skjnldsv skjnldsv mentioned this pull request Oct 13, 2021
@skjnldsv skjnldsv modified the milestones: Nextcloud 23, Nextcloud 24 Oct 21, 2021
@szaimen
Copy link
Contributor

szaimen commented Feb 7, 2022

/rebase

@szaimen szaimen added 4. to release Ready to be released and/or waiting for tests to finish and removed 2. developing Work in progress labels Feb 7, 2022
Add Auth::Mechanism::SCHEME_NULL to list of allowed auth mechanism for AmazonS3 backend to allow attaching S3 storage to nextcloud instances running on already authorized instances (e.g. EC2 instances with IAM Instance roles)

Signed-off-by: Wolfram Gries <wolfram.gries@zapooflex.net>
@szaimen szaimen force-pushed the feature/allow_s3_access_wo_auth branch from 5d08f35 to 5c821c7 Compare February 7, 2022 12:43
@szaimen
Copy link
Contributor

szaimen commented Feb 7, 2022

manually rebased

@szaimen
Copy link
Contributor

szaimen commented Feb 7, 2022

ready to merge, imho

@szaimen
Copy link
Contributor

szaimen commented Feb 8, 2022

samba failure unrelated

@szaimen szaimen merged commit e2b8391 into nextcloud:master Feb 8, 2022
@welcome
Copy link

welcome bot commented Feb 8, 2022

Thanks for your first pull request and welcome to the community! Feel free to keep them coming! If you are looking for issues to tackle then have a look at this selection: https://github.com/nextcloud/server/issues?q=is%3Aopen+is%3Aissue+label%3A%22good+first+issue%22

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
4. to release Ready to be released and/or waiting for tests to finish enhancement feature: external storage
Projects
None yet
Development

Successfully merging this pull request may close these issues.

6 participants