-
-
Notifications
You must be signed in to change notification settings - Fork 2.6k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Introduce [AWS/GS/AZURE]_NO_CREDENTIALS as a more user-friendly name … #11472
Conversation
…instead of [AWS/GS/AZURE]_NO_SIGN_REQUEST
This idea came from me. Error reports with |
nitpick: removing the double negative with the same stone would be nice. suggestions: AWS_AUTHENTICATED=NO , AWS_USE_CREDENTIALS=NO, AWS_ANONYMOUS=YES. My favorite would be AWS_UNAUTHENTICATED=YES but I'm too weary of handing out a stick to be beaten with given my initial take against double negatives |
I agree, but then it is effectively a new option, not a synonym. |
Instead of creating a new synonym that also has all the bad qualities of a double negative, can we not make unsigned requests be implicit if no credentials are given? Am I missing something? I've forgotten why we needed "no sign request" in the first place. |
presumably because that's the behavior of aws CLI
The risk of defaulting to unauthenticated requests is that users might have a harder time figuring out why their requests that require authentication don't work. |
It is feasible to default to unauthenticated requests, and then append a hint like "Do you need to set authentication?" to error messages? Or would this involve touching the code in too many places? |
I agree it is customary for s3/gs requests to be signed by default, and unauthenticated buckets are usually advertised through their plain https endpoints. I would prefer an explicit gdal error before emitting the request when no credentials are found, with a helpful message indicating that AWS_NO_SIGN_REQUEST should be explicitly set if accessing a public bucket. yes I know this is a double negative, but it's the pendant to aws cli's flag. gsutil will emit an anonymous request when no credentials are found, but when using the official APIs anonymous request must be explicitly enabled. |
that's not so terrible: attempt at https://github.com/rouault/gdal/pull/new/aws_default_to_unauthenticated
However we do not seem to reach a consensus on what to do here. Probably do nothing and keep existing behavior, with tiny improvements in the error message, is the most reasonable outcome for now. |
==> cf #11474 |
…instead of [AWS/GS/AZURE]_NO_SIGN_REQUEST