Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Fix Principal in AWS verification bucket policy #2266

Merged
merged 1 commit into from
Jul 24, 2024

Conversation

bemoody
Copy link
Collaborator

@bemoody bemoody commented Jul 24, 2024

In testing the new AWS user verification feature (see #2121), we found that the bucket policy written in the code didn't match the policy I had actually set for the bm-uverify-test1 demo bucket. (Sorry, I guess I never tested the final version of that code.)

We need to allow any principal, not only principals matching a pattern.

This new version of the policy has been tested on my personal AWS account, so hopefully it should work when we do the same on the PhysioNet account.

The Principal listed in a bucket policy needs to follow the correct
syntax or it will be rejected as a bad bucket policy.

configure_aws_verification_bucket is used to set the policy for the
user verification bucket.  I have no idea how I committed this with a
broken policy but it seems like this never worked to begin with :)

There shouldn't be any security implications to allowing any principal
to access the bucket.  We're verifying on the server side that the
appropriate parameters are included in the URL, which implies that the
requester is actually logged in to an AWS user account.
@Chrystinne Chrystinne self-assigned this Jul 24, 2024
@tompollard tompollard merged commit 72fd0a9 into dev Jul 24, 2024
7 checks passed
@tompollard tompollard deleted the bm/aws-userverification-policy branch July 24, 2024 20:23
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants