gpt4 book ai didi

amazon-s3 - 正确的S3预签名URL策略

转载 作者:行者123 更新时间:2023-12-04 08:47:55 25 4
gpt4 key购买 nike

我需要发布允许用户将GET和PUT文件放入特定S3存储桶的预签名URL。我创建了一个IAM用户,并使用其键来创建预签名的URL,并在该用户中添加了嵌入的自定义策略(请参见下文)。使用生成的URL时,我的策略出现AccessDenied错误。如果将FullS3Access策略添加到IAM用户,则该文件可以是具有相同URL的GET或PUT,因此很明显,缺少我的自定义策略。怎么了

这是我使用的自定义政策无法正常工作:

{
"Statement": [
{
"Action": [
"s3:ListBucket"
],
"Effect": "Allow",
"Resource": [
"arn:aws:s3:::MyBucket"
]
},
{
"Action": [
"s3:AbortMultipartUpload",
"s3:CreateBucket",
"s3:DeleteBucket",
"s3:DeleteBucketPolicy",
"s3:DeleteObject",
"s3:GetBucketPolicy",
"s3:GetLifecycleConfiguration",
"s3:GetObject",
"s3:ListBucket",
"s3:ListBucketMultipartUploads",
"s3:ListMultipartUploadParts",
"s3:PutBucketPolicy",
"s3:PutLifecycleConfiguration",
"s3:PutObject"
],
"Effect": "Allow",
"Resource": [
"arn:aws:s3:::MyBucket/*"
]
}
]
}

最佳答案

值区权限与对象权限

您策略中的以下权限应位于存储桶级别(arn:aws:s3:::MyBucket),而不是存储桶中的子路径(例如arn:aws:s3:::MyBucket/*):


s3:CreateBucket
s3:DeleteBucket
s3:DeleteBucketPolicy
s3:GetBucketPolicy
s3:GetLifecycleConfiguration
s3:ListBucket
s3:ListBucketMultipartUploads
s3:PutBucketPolicy
s3:PutLifecycleConfiguration


参见:Specifying Permissions in a Policy

但是,这不是您无法放置或获取文件的原因。

得到

您已分配GetObject权限的事实意味着您应该能够从S3存储桶中获取对象。我通过将策略分配给某个用户,然后使用该用户的凭据访问对象来对其进行测试,它可以正常工作。



我还使用了您的政策通过网络表单进行上传,并且可以正常运行。

这是我以前上传的表格:

<html><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>S3 POST Form</title>

<style type="text/css"></style></head>

<body>
<form action="https://<BUCKET-NAME>.s3.amazonaws.com/" method="post" enctype="multipart/form-data">
<input type="hidden" name="key" value="uploads/${filename}">
<input type="hidden" name="AWSAccessKeyId" value="<ACCESS-KEY>">
<input type="hidden" name="acl" value="private">
<input type="hidden" name="success_action_redirect" value="http://<BUCKET-NAME>.s3.amazonaws.com/ok.html">
<input type="hidden" name="policy" value="<ENCODED-POLICY>">
<input type="hidden" name="signature" value="<SIGNATURE>">
<input type="hidden" name="Content-Type" value="image/jpeg">
<!-- Include any additional input fields here -->

File to upload to S3:
<input name="file" type="file">
<br>
<input type="submit" value="Upload File to S3">
</form>


这是我生成签名的方式:

#!/usr/bin/python
import base64
import hmac, hashlib

policy_document = '{"expiration": "2018-01-01T00:00:00Z", "conditions": [ {"bucket": "<BUCKET-NAME>"}, ["starts-with", "$key", "uploads/"], {"acl": "private"}, {"success_action_redirect": "http://BUCKET-NAME.s3.amazonaws.com/ok.html"}, ["starts-with", "$Content-Type", ""], ["content-length-range", 0, 1048000] ] }'

AWS_SECRET_ACCESS_KEY = "<SECRET-KEY>"

policy = base64.b64encode(policy_document)

signature = base64.b64encode(hmac.new(AWS_SECRET_ACCESS_KEY, policy, hashlib.sha1).digest())

print policy
print
print signature

关于amazon-s3 - 正确的S3预签名URL策略,我们在Stack Overflow上找到一个类似的问题: https://stackoverflow.com/questions/39688422/

25 4 0
Copyright 2021 - 2024 cfsdn All Rights Reserved 蜀ICP备2022000587号
广告合作:1813099741@qq.com 6ren.com