-
Notifications
You must be signed in to change notification settings - Fork 102
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Read-Only Access Control to a Bucket #1155
Comments
This is not supported with the OBC model. |
@nimrod-becker isn't it supported on namespace OBCs? #983 |
It might be worth checking, @schwienbier See the PR Romy has referenced. It's only in 5.12 and up and you are using 5.11. We are working on releasing 5.12 and once its out it would be great if you can try it That would set the NS resource to read only mode and won't allow writes. |
Hi @nimrod-becker , thank you. That will be very handy. The aforementioned S3 bucket policy is also in 5.12 and up, right? Thank you. Best regards |
Hi @nimrod-becker / @romayalon Actually we (@schwienbier and me) are looking for same thing, my ticket was #1150 We would like to have a simple / clear and straight forward way to have access level control for different account. Eventually one technical account user can be able to configured to have Or just read access to multiple different buckets. Is this something we are going to have in 5.12? |
1 similar comment
Hi @nimrod-becker / @romayalon Actually we (@schwienbier and me) are looking for same thing, my ticket was #1150 We would like to have a simple / clear and straight forward way to have access level control for different account. Eventually one technical account user can be able to configured to have Or just read access to multiple different buckets. Is this something we are going to have in 5.12? |
Hi @nimrod-becker / @romayalon , I have tried the latest release v5.13.0, i can see the new options called access_mode when creating namespacestore. I want to have two different namespacestore to point same remote bucket name, the other namespacestore will be used for read-only and the other namespacestore used for write.
But this won't work when I applied:
In operator it showed:
|
Dear Noobaa Developer/Supports, btw, actually Alansyf and I belong to one team... Please imagine a senerio, where one Noobaa account has read-only access to a remote swift bucket, and the other Noobaa account has read-write access to the same remote swift bucket. Is it somehow possible in Noobaa v5.13.0? Thank you in advance! Best regards |
@schwienbier @Alansyf, can you achieve what you want by creating two different namespace buckets, each with a different bucket policy for access?
I didn't test it myself, but it should work. |
Hi @dannyzaken ,
If I want wr: [ns1, ns3], read: [ns2], it hits the other issue #1150 , right? |
I copied this comment to #1150. It seems more relevant to that discussion |
Hi @dannyzaken , thank you for your reply. I tested read-only access on my side by applying the following obc.yaml
And then I used the following python code to download some files from target remote swift bucket.
The client error message is as follows,
Noobaa core seems to have the following error message,
Can you reproduce the error on your side? Thank you! Best regards |
btw, may I ask can Noobaa still connect to remote swift/AWS/Azure bucket after COSI replaces OBC? Thank you. |
Hi @dannyzaken , I tried with the following yamls. Now I can not upload files to the target bucket.
But I can still delete file from the bucket using the following python code
We can delete files from the read-only bucket. Is that a bug? Best regards |
Environment info
NooBaa Operator Version: 5.11.0
Platform: Kubernetes v1.25.8
When I create an objectbucketclaim, the give accesskey and secretkey has read-write access to the target bucket. Whether we can somehow create a pair of accesskey and secretkey which can only download and list, while uploading and deleting are not allowed? Thank you.
The text was updated successfully, but these errors were encountered: