Set Get permission on a sub directory without making it public

I'm having trouble giving access a user to a subdirectory of my bucket using his iam:ID. Here's the info output of bucket:

s3://orisha/ (bucket):
Location: default
Payer: BucketOwner
Expiration Rule: none
Policy: {
"Version": "2012-10-17",
"Statement": [
{
"Sid": "Allow access de deb packages",
"Effect": "Allow",
"Principal": {
"AWS": [
"arn:aws:iam:::1d3f9948-47e1-4d11-9ef7-e63925f84e6a"
]
},
"Action": "s3:GetObject",
"Resource": ["arn:aws:s3:::orisha/packages/*"]
}]
}

This seem to allow my user to access object stored in /packages, but it also seems to set my files to public. I can access them using curl. Is it possible remove public access without removing my user access ?

1 Reply

Linode Staff

I want to direct you to another post here in the site which talks about giving specific users access to buckets, and at the same time restricting access. This might be a solution for you:

Object Storage Access

let us know if that helps you out.

Reply

Please enter an answer
Tips:

You can mention users to notify them: @username

You can use Markdown to format your question. For more examples see the Markdown Cheatsheet.

> I’m a blockquote.

I’m a blockquote.

[I'm a link] (https://www.google.com)

I'm a link

**I am bold** I am bold

*I am italicized* I am italicized

Community Code of Conduct