-
-
Notifications
You must be signed in to change notification settings - Fork 4.1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add SCHEME_NULL to list of allowed auth mechanism #28941
Add SCHEME_NULL to list of allowed auth mechanism #28941
Conversation
Hey 👋
I guess we already allow using the system credentials when using object store. Looks okay to me to allow this for external storages as well. Yet it's possible to allow users to mount their own storages (when the admin allows). Then also end user could use the global credentials. |
7afe66a
to
5d08f35
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
👍
/rebase |
Add Auth::Mechanism::SCHEME_NULL to list of allowed auth mechanism for AmazonS3 backend to allow attaching S3 storage to nextcloud instances running on already authorized instances (e.g. EC2 instances with IAM Instance roles) Signed-off-by: Wolfram Gries <wolfram.gries@zapooflex.net>
5d08f35
to
5c821c7
Compare
manually rebased |
ready to merge, imho |
samba failure unrelated |
Thanks for your first pull request and welcome to the community! Feel free to keep them coming! If you are looking for issues to tackle then have a look at this selection: https://github.com/nextcloud/server/issues?q=is%3Aopen+is%3Aissue+label%3A%22good+first+issue%22 |
Add AuthMechanism::SCHEME_NULL to list of allowed auth mechanism for AmazonS3 backend to allow attaching S3 storage to nextcloud instances running on already authorized instances (e.g. EC2 instances with IAM Instance roles)
USE CASE: When running nextcloud on AWS resources (eg. EC2 instances / EKS kubernetes pods), these instances can be associated with IAM roles that permit access to S3 buckets. In this case, no access-key is needed to access the bucket.
The files_external S3 configuration normally insists on the configuration of an Access-Key.
ADVANTAGES: By not using access keys to authorize access to the buckets the credentials do not need to be exposed and the management of IAM permissions is a little bit easier.