You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
NSFS | NC | IAM Service - Accounts Permission When No Bucket Policy
1. Add more properties to nsfs_bucket_schema (not required) and update the new_bucket_defaults in BucketSpaceFS:
- creator = creator is the account ID that created this bucket (internal information).
Notes: Currently we do not allow IAM accounts to create a bucket (temporary), it will be changed after we have the config structure, therefore in the future, we could see the IAM account ID in the creator property.
2. Change the condition in authorize_request_policy (in s3_rest) and has_bucket_action_permission (in bucketspace_fs) for the same root account (alternative for ownership when there is no bucket policy).
Those next changes are not related to IAM, but were raised as a part of the code review:
3. In authorize_request_policy (in s3_rest) remove the condition req.object_sdk.nsfs_config_root from the owner condition.
4. In has_bucket_action_permission (in bucketspace_fs) change the condition of is_owner from account name to id.
Signed-off-by: shirady <[email protected]>
Copy file name to clipboardExpand all lines: docs/design/iam.md
+8Lines changed: 8 additions & 0 deletions
Original file line number
Diff line number
Diff line change
@@ -89,6 +89,14 @@ Source: AccessKeys
89
89
- root account
90
90
- all IAM users only for themselves (except the first creation that can be done only by the root account).
91
91
92
+
### No Bucket Policy
93
+
If the resource doesn’t have a bucket policy the IAM user accounts can have access to the resources of the same root account.
94
+
For example:
95
+
- root account creates 2 users (both are owned by it): user1, user2 and a bucket (bucket owner: <root-account-id>, bucket creator: <account-id-user1>).
96
+
- user1 upload a file to the bucket
97
+
- user2 can delete this bucket (after it is empty): although user2 is not the creator, without a bucket policy his root account is the owner so he can delete the bucket.
98
+
Note: Currently, we do not allow users to create a bucket.
99
+
92
100
### Root Accounts Manager
93
101
The root accounts managers are a solution for creating root accounts using the IAM API.
0 commit comments