radosgw s3 ACLs

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Hi,

So say a usera has full control (and is the owner) of a bucket in s3 and
gives userb 'FULL_CONTROL' on the bucket.  Userb writes a file and it
seems that by default the ACL for that key is going to be 'FULL_CONTROL'
for userb.  When usera iterates the key even just over the ACL for the
key, they get a 403.

I would think that 'FULL_CONTROL' at the bucket level gives the user at
least the ability to see the ACL.  They can list the key itself and the
size and last modified.

Is this by design?  Is there any chance that the default behavior would
be able to changed to by default (without specifying a canned acl) that
the bucket acl would be applied for a key?

We are looking to provide some secure s3 collaboration space.  Groups in
the ACLs would be like pie in the sky but right now just being able to
get sticky ACLs from the bucket would be huge.

Thanks,
derek


-- 
---
Derek T. Yarnell
University of Maryland
Institute for Advanced Computer Studies
_______________________________________________
ceph-users mailing list
ceph-users@xxxxxxxxxxxxxx
http://lists.ceph.com/listinfo.cgi/ceph-users-ceph.com




[Index of Archives]     [Information on CEPH]     [Linux Filesystem Development]     [Ceph Development]     [Ceph Large]     [Linux USB Development]     [Video for Linux]     [Linux Audio Users]     [Yosemite News]     [Linux Kernel]     [Linux SCSI]     [xfs]


  Powered by Linux