cyberduck access to bucket

0

when i try to add this permission to allow cyberduck to list the files from a bucket. cyberduck list all the buckets in my account, but only have access to the bucket i entered the key for. what i would like it to do is only list the bucket that i entered the key to and only have access to that bucket . this is the JSON script

{
  "Version": "2012-10-17",
  "Statement": [
    {
      "Sid": "Stmt1480515305000",
      "Effect": "Allow",
      "Action": [
        "s3:ListAllMyBuckets",
        "s3:GetBucketLocation"
      ],
      "Resource": [
        "arn:aws:s3:::*"
      ]
    },
    {
      "Sid": "Stmt1480515305002",
      "Effect": "Allow",
      "Action": [
        "s3:List*",
        "s3:GetObject",
        "s3:PutObject",
        "s3:DeleteObject"
      ],
      "Resource": [
        "arn:aws:s3:::allowed-bucket",
        "arn:aws:s3:::allowed-bucket/*"
      ]
    }
  ]
}

thank you

已提問 2 年前檢視次數 226 次
2 個答案
1

Hi, in reviewing the JSON policy document that you provided, what you are seeing is expected.

The first Sid (Stmt1480515305000) allows the IAM user/role to list all of your buckets in the account and get their locations (e.g., AWS region). If you add the specific resource block that you use for the second Sid (Stmt1480515305002), you will restrict the bucket list to the one bucket that you want cyberduck to access. I've included my example below.

{
      "Sid": "Stmt1480515305000",
      "Effect": "Allow",
      "Action": [
        "s3:ListAllMyBuckets",
        "s3:GetBucketLocation"
      ],
      "Resource": [
        "arn:aws:s3:::allowed-bucket"
      ]
    }
AWS
awsendo
已回答 2 年前
0

Hello . thank you for your answer . i wasn't able to apply what you said . lets suppose the bucket i want to list is called bucket1 . how would the code look for that bucket . thank you

已回答 2 年前

您尚未登入。 登入 去張貼答案。

一個好的回答可以清楚地回答問題並提供建設性的意見回饋,同時有助於提問者的專業成長。

回答問題指南