The hardware and bandwidth for this mirror is donated by METANET, the Webhosting and Full Service-Cloud Provider.
If you wish to report a bug, or if you are interested in having us mirror your free-software or open-source project, please feel free to contact us at mirror[@]metanet.ch.
While AWS S3 storage can be public, storage buckets are private by default. The best practice is to set up security policies and credentials to control access to storage buckets. This appendix walks through S3 storage setup and credential creation. It assumes you have an AWs account but nothing more.
In the AWS management console, navigate to the S3 console and click the Create Bucket button.
The key part of the Create Bucket wizard is the first screen, where you give the bucket a unique name. The closest region should be selected by default, but you can select a different one if needed.
Step through the rest of the wizard. You can accept the defaults – they can be changed later if needed.
Once the S3 bucket exists, the next steps are setting up an Identity and Access Management (IAM) policy, creating a user, and generating credentials to access the storage.
In the IAM console, navigate to Policies. AWS provides some pre-configured policies that provide access to all S3 buckets in the account. These include the DataScientist, AmazonS3ReadOnlyAccess, and AmazonS3FullAccess policies. If you choose to use one of these predefined policies, proceed to Step 5. However, if you want to limit access to a specific bucket, it’s best to create a custom policy.
In the JSON tab, copy and paste the below policy, editing the bucket name as needed. This policy will allow a credential-holder to see the names of all the buckets owned by the AWS account and will grant full access to the specified bucket.
{
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Action": [
"s3:ListAllMyBuckets"
],
"Resource": [
"arn:aws:s3:::*"
]
},
{
"Effect": "Allow",
"Action": [
"s3:*"
],
"Resource": [
"arn:aws:s3:::myexamplebucket",
"arn:aws:s3:::myexamplebucket/*"
]
}
]
}
(Optional) If you switch to the Visual editor tab, you will see warnings as full access permissions include some resources that haven’t been set up, but they can be ignored. You can also expand the actions menu here and fine-tune permissions.
On the Review policy screen, give the policy a name. The summary might show a notice that the policy defines some actions, resources, or conditions that do not provide permissions. You can ignore this notice and click Create policy.
Head to the Users section of the IAM console and Add user. Give the user a name. For AWS access type, select Programmatic access.
In the Set permissions screen, choose Add user to group, then Create group.
In the Create group dialogue box, give the group a name, then search for and attach the chosen policy and create the group.
Click through the Tags screen, review and Create user.
The next screen will provide the access key and secret key.
The secret key won’t be shown again, but if you need you can generate a new key at any time via the Users section. Click on the user name, then the Security credentials tab to create a new access key or deactivate an old one.
These binaries (installable software) and packages are in development.
They may not be fully stable and should be used with caution. We make no claims about them.