-
Notifications
You must be signed in to change notification settings - Fork 238
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
remove the 'public-read' acl as the default. #54
base: master
Are you sure you want to change the base?
Conversation
…ic permissions over acls
I'd suggest this is a major version bump. |
@clarkie Looks like you could get what you want by specifying Are you suggesting that we get rid of the Thanks for the PR regardless! |
I'm happy to take that approach but it does feel a bit wrong to be explicitly setting acls by default. I'm not sure what the AWS best practise says for this but I'd rather handle security globally than granularly by default. Also, to someone coming across the code I don't think |
I agree the ability to change the default isn't well documented, and someone would need to look at the source code. But to remain backward-compatible, I'd love it if this PR could provide the default existing behavior, and just allow it to be overridden easily to do what you want. So maybe another option labeled |
Just thinking of other solutions that wouldn't break existing usage. If you have other ideas, please let me know. |
That could be an option I guess but I think it's worth updating the library to match 'modern' aws standards:
As long as it goes with a major version bump and some docs explaining the change I don't see that being a problem. |
Bring up to date with v3.3.0
This is not quite right because If you want to avoid setting the |
I'm trying to avoid having to add |
In 2021 this issue is still unpatched and results in the component producing a default insecure configuration. How many people are using this component without checking the defaults and have inadvertantly exposed files in their bucket to the public? @seanadkinson I realise this is an outdated PR, would you accept a new PR (or an update to this one), and a major version bump to patch this today? |
@tjdavey I think your concern is quite valid, and I hope this library hasn't caused too much headache for folks not paying attention to the defaults (it was originally created as an Avatar upload for user profiles, so public ACL made sense for us). Unfortunately, I no longer work for this company, and my Write permissions have been revoked, so sadly, I can't actually merge any changes, and I'm not sure how to reach anyone who can (the company was acquired, and I don't know anyone still working there). If any Admins are reading this, and want a maintainer, I'm happy to pick back up the reins, but if not, this repo may be dead unfortunately @tjdavey. |
Whoops. I opened #246 before I looked to see what other PRs were around. |
Prefer to use bucket policy permissions over acls.
I have some permissions set at at a bucket level and don't want my uploading application to be concerned about the permissions for a given file. That should be managed elsewhere.
This still leaves in place the ability to override permissions with a file level acl.