Alex lx
lx pushed to master at Deuxfleurs/garage 2020-11-06 16:25:31 +00:00
lx commented on issue Deuxfleurs/garage#6 2020-10-22 16:01:23 +00:00
Allow anonymous read access to buckets to enable website hosting

In my opinion, a minimal proposition would not even contain the implementation of the {Put,Get,Delete}BucketWebsite endpoints, and only allow configuration using the command line interface. This is currently what we are doing to create buckets and configure access keys (we don't have PutBucket or such). This requires manual intervention for the configuration of every new website, however given the small numbers of website hosted on Deuxfleurs, this is probably an acceptable cost to begin with.

Exposing API endpoints that allowe the user to create or configure buckets should be a separate issue. We probably need more thought as to what permission model we want to implement before we do that.

So my plan for a minimal implementation would only be:

  • add a bit in the bucket table that says whether that bucket is exposed as a website
  • add a CLI command to set that bit
  • create an endpoint for public website access for buckets that have that bit enabled, using the Host: header to read from the correct bucket, if we decide that our convention is that the bucket name must match the domain name of the website

Alternatively, a 1-indirection-layer option exists: use a separate table to store website configuration, so that website host names do not need to match bucket names, and several website host names can be served by the same bucket.

lx commented on issue Deuxfleurs/garage#6 2020-10-21 13:59:53 +00:00
Allow anonymous read access to buckets to enable website hosting

Suggested architecture: open a third end point (HTTP server) only for anonymous/public access to buckets configured to serve as static websites. This would allow to clearly distinguish the semantics of the S3 API (read/write/list files/etc, authentified) and of the public website access (read only, no auth).

lx commented on issue Deuxfleurs/garage#4 2020-10-21 13:55:36 +00:00
Check uploaded data's MD5 sum against Content-MD5 header

Closing for now.

lx closed issue Deuxfleurs/garage#4 2020-10-21 13:55:36 +00:00
Check uploaded data's MD5 sum against Content-MD5 header
lx pushed to master at Deuxfleurs/infrastructure 2020-10-09 22:04:03 +00:00
lx pushed to master at lx/easybridge 2020-10-09 22:02:02 +00:00
lx pushed to master at Deuxfleurs/infrastructure 2020-10-04 19:32:20 +00:00
lx pushed to master at lx/easybridge 2020-10-04 19:20:47 +00:00
lx pushed to master at lx/easybridge 2020-10-04 17:20:49 +00:00
lx pushed to alexvm at Deuxfleurs/infrastructure 2020-07-15 14:06:40 +00:00
lx pushed to alexvm at Deuxfleurs/infrastructure 2020-07-15 14:03:55 +00:00
lx pushed to alexvm at Deuxfleurs/infrastructure 2020-07-15 14:01:14 +00:00
lx pushed to alexvm at Deuxfleurs/infrastructure 2020-07-15 13:57:11 +00:00
lx pushed to master at Deuxfleurs/infrastructure 2020-07-15 13:49:34 +00:00
lx pushed to master at Deuxfleurs/garage 2020-07-15 13:41:57 +00:00
lx pushed to master at Deuxfleurs/garage 2020-07-15 13:37:43 +00:00
lx pushed to master at Deuxfleurs/garage 2020-07-15 13:31:35 +00:00
lx opened issue Deuxfleurs/garage#5 2020-07-13 15:01:08 +00:00
AWS Signatures V4: check payload against hashed payload in signed headers
lx opened issue Deuxfleurs/garage#4 2020-07-13 14:57:05 +00:00
Check uploaded data's MD5 sum against Content-MD5 header