Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

s3proxy should use its own IAM config instead of reusing the incoming client credentials #317

Closed
benmcclelland opened this issue Nov 29, 2023 · 0 comments
Assignees
Labels
enhancement New feature or request

Comments

@benmcclelland
Copy link
Member

It would be better to just have the s3proxy use a single account on the backend instead of reusing the incoming credentials. This way the admin can have a single backend s3 account, and provide internal access through local IAM management.

The changes will need to be that S3be should init with its own s3access/s3secret that get configured from cli or environment. And the S3 actions should use this account for backend access instead of the stored credentials in the context.

@benmcclelland benmcclelland added the enhancement New feature or request label Nov 29, 2023
jonaustin09 added a commit that referenced this issue Dec 5, 2023
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request
Projects
None yet
Development

No branches or pull requests

2 participants