Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Unsigned request option #1149

Open
wjordan opened this issue Apr 1, 2016 · 9 comments
Open

Unsigned request option #1149

wjordan opened this issue Apr 1, 2016 · 9 comments
Labels
feature-request A feature should be added or improved. needs-major-version Can only be considered for the next major release

Comments

@wjordan
Copy link

wjordan commented Apr 1, 2016

The AWS CLI has a --no-sign-request option which I've found useful for anonymously downloading S3 objects with public-read ACLs, and I'd like to see a similar feature added to the Ruby SDK.

Although it's currently possible to pass an S3 object's #public_url to open or another Ruby HTTP client, I'd like to be able to leverage the AWS SDK's existing functionality for optimized downloading, file integrity verification and network-error retries, but without requiring credentials to be provided when not necessary.

@trevorrowe trevorrowe added the feature-request A feature should be added or improved. label Apr 1, 2016
@trevorrowe
Copy link
Member

This is something I've been considering adding to the SDK recently. I'm still considering what the mechanism would be to allow for unauthenticated requests.

wjordan added a commit to code-dot-org/code-dot-org that referenced this issue Apr 6, 2016
@awood45
Copy link
Member

awood45 commented Jun 3, 2016

Added to feature request backlog.

@Techbrunch
Copy link

@awood45 is this still in the request backlog ?

@mullermp
Copy link
Contributor

Reopening - deprecating usage of Feature Requests backlog markdown file.

@mullermp mullermp reopened this Oct 21, 2019
@mullermp mullermp added the needs-major-version Can only be considered for the next major release label Oct 21, 2019
@github-actions
Copy link

Greetings! We’re closing this issue because it has been open a long time and hasn’t been updated in a while and may not be getting the attention it deserves. We encourage you to check if this is still an issue in the latest release and if you find that this is still a problem, please feel free to comment or open a new issue.

@github-actions github-actions bot added the closing-soon This issue will automatically close in 4 days unless further comments are made. label Oct 21, 2020
@mullermp mullermp removed the closing-soon This issue will automatically close in 4 days unless further comments are made. label Oct 21, 2020
@github-actions
Copy link

Greetings! We’re closing this issue because it has been open a long time and hasn’t been updated in a while and may not be getting the attention it deserves. We encourage you to check if this is still an issue in the latest release and if you find that this is still a problem, please feel free to comment or open a new issue.

@github-actions github-actions bot added the closing-soon This issue will automatically close in 4 days unless further comments are made. label Oct 22, 2021
@mullermp mullermp removed the closing-soon This issue will automatically close in 4 days unless further comments are made. label Oct 22, 2021
@github-actions
Copy link

Greetings! We’re closing this issue because it has been open a long time and hasn’t been updated in a while and may not be getting the attention it deserves. We encourage you to check if this is still an issue in the latest release and if you find that this is still a problem, please feel free to comment or open a new issue.

@github-actions github-actions bot added the closing-soon This issue will automatically close in 4 days unless further comments are made. label Oct 23, 2022
@mullermp mullermp removed the closing-soon This issue will automatically close in 4 days unless further comments are made. label Oct 23, 2022
@yashdave31
Copy link

Hey @mullermp, is this still in the feature backlog?

@mullermp
Copy link
Contributor

Yes, but it's not prioritized. I think that there is a workaround however. The Clients support an undocumented unsigned_operations key. I can't guarantee the backwards compatibility for it going forward (like in a new major version), but you can do something like this:

Aws::S3::Client.new(unsigned_operations: [:get_object]).get_object(bucket: 'bucket', key: 'test')

In the future we are trying to do pluggable signers, and in a case like this, it would be an AnonymousSigner object but that is a long term goal.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
feature-request A feature should be added or improved. needs-major-version Can only be considered for the next major release
Projects
None yet
Development

No branches or pull requests

6 participants