-
Notifications
You must be signed in to change notification settings - Fork 4
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Is it possible to have limited authorisation on Datasets uploaded to Swift/S3 on CESNET? #17
Comments
Thank you @guillaumeeb
In case of linux system, in HPC center, we create unix group and add some users, who want to share share data, in that unix group. And there we control it with chmod g+r o-r toto.nc |
OK, so I think we'll need @sebastian-luna-valero's help on this one, and probably some of CESNET staff also. I can still try to answer some points. There is no such thing of user:group concept in Cloud and object store, things are different. You've got user accounts (EGI here), projects or tenants (Pangeo VO I guess), and you can usually define roles and policies with all that. These policies are kind of ACL (Access Control List): they define who can perform which operation on a Project or on a Bucket/Container. I'm not sure how this is implemented in CESNET, but there I checked in the doc that it is possible to use something like this on Openstack. By default, with Horizon interface or during bucket/container creation, we can only specify is a container is public (visible on internet) or not. So the situation is as below I think:
Be careful: if you create an S3 Access/Secret keys pair, and give it to another person, it will be by default a admin keys pair. So to know if we can set more precise rules, we'll need help from other people to know which Openstack command we could type, and if this is compatible with S3 or only Swift credentials. |
Hello, Here is the current situation:
Please note that currently:
If we need something intermediate, we will need to explore options in: Please let me know your thoughts. Best regards, |
Hi Sebastian, |
I have related questions to @sebastian-luna-valero. If we use s3 access through MinIO server proposed at IM Dashboard, do we have different type of user groups? Or as it will be anyway backed up with EGI check-in for user control, it is same as using openstack object storage directly from CESNET? |
Hi, To address this issue I have opened: #23 Here is the status after merging that PR:
Now, following instructions to configure awscli users that want All of the above should address the comments from @tinaok
Regarding the question about MinIO. If you deploy it with IM Dashboard you have full control over it (i.e. you can decide to configure EGI Check-In or any other user accounts/groups). However, please bear in mind that it's not only about deploying and configuring MinIO, it will be also another service to be maintained by us. Therefore, I would leave this as last resort, and use the object storage at CESNET that is already managed. |
So what you are saying here, is that once we've setup our AWS S3 credentials, we can use I'll try that later on this week or the next.
👍 about this, handling our own object store would certainly be some work. And we'll also probably run into performance concerns. |
I have only tested the |
Could you just clarify a bit how you see the storage permissions using S3 interface after #23, so with containers/buckets created in another Openstack project?
|
following #39 (comment) What shall we tell students to do to avoid that one student delete another student's data ? All students, I'll add them in member of vo.pangeo.eu in aai.eu , so that they can read/write in private bucket that I'll create for each working group. But if I understood right, unlike HPC centres, that if one user make Zarr file, other user, they can delete this Zarr file by mistake? Until we find solutions, I'll explain them to 'check the path' so do not touch other's file, but if we can find better solution it would be nice. |
Hi, The problem is with the translation of the federated identity from Check-In into the local identity at CESNET. This issue is very specific to the federated AAI infrastructure that we are using for this deployment. If other deployments use other authentication/authorization methods, they won't have the same issue. Indeed, the recommendation until the issue is solved is to be careful with the path. As long as everybody writes on their own bucket/path, everything should be fine. Maybe they can use their own user ID as a prefix? Hopefully that's unique to everyone. Apologies, CESNET has been looking into the issue, but it's not an easy one to solve. |
I believe this has been fixed with MinIO. Do you want to test or should we directly close this? |
Thank you @sebastian-luna-valero, yes I would like to test it to understand the procedure, which documentation I should follow? Thank you for your help. |
Hi @tinaok This is the starting point: Please give it a go and let us know how it goes. Best regards, |
Thank you @sebastian-luna-valero, I couldn't create a bucket, may be because I'm not connected as administrator? |
Could you try following these steps? https://github.com/pangeo-data/pangeo-eosc/blob/main/users/how-to/TestMinIO.ipynb I think we should link the example from the getting started guide: #56 |
Question by @tinaok:
@tinaok could you precise a bit your need?
The text was updated successfully, but these errors were encountered: