-
Notifications
You must be signed in to change notification settings - Fork 49
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Block public access to S3 bucket as per standard compliance rules #581
Block public access to S3 bucket as per standard compliance rules #581
Conversation
@shreyas-s-rao You need rebase this pull request with latest master branch. Please check. |
1cf35de
to
353c4d0
Compare
@abdasgupta I have addressed your comment gardener/etcd-backup-restore#615 (comment) in this PR as well. Please confirm that I have not added the bucket policy for localstack S3 buckets since they are exposed on |
It looks fine, can you verify if you can run |
I don't get it, by running
|
As Shreyas was concerned that if the addition of policy would make any problem with localstack or not. That's why I asked him to run the PR once with |
I have already run the e2e tests that use AWS S3 bucket ( |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
ok, thanks @shreyas-s-rao for PR and for testing it.
How to categorize this PR?
/area backup
/area security
/area compliance
/kind task
/kind test
/platform aws
What this PR does / why we need it:
This PR configures the S3 buckets created by e2e tests to be blocked from public access as per standard practices. This is achieved by putting a public-access-block on the created bucket, as per AWS documentation.
Which issue(s) this PR fixes:
Fixes #
Special notes for your reviewer:
cc @vlerenc
Release note: