This repository has been archived by the owner on Dec 6, 2024. It is now read-only.
Research support for bucket anonymous access modes #83
Labels
lifecycle/rotten
Denotes an issue or PR that has aged beyond stale and will be auto-closed.
Enhancement
Is your feature request related to a problem?/Why is this needed
gRPC spec currently has/had this code (below), which is not captured in the KEP. It is a remnant of KEP discussions that were removed from v1alpha1.
Describe the solution you'd like in detail
COSI will remove this unused proto spec, but we should also consider whether/when to start designing this feature again in the future.
@BlaineEXE remembers 1 Rook user who has mentioned a desire for anonymous access for ObjectBucketClaims.
Describe alternatives you've considered
Alternative that is still possible: if COSI believes this feature is not widely supported and not a good target for the portable API, COSI could recommend that drivers implement this via storage classes, or COSI could suggest instead that all accessors need a BucketAccess, even users external to the k8s cluster.
Additional context
Likely, all users of buckets within kubernetes can use a BucketAccess to access any bucket (provided cross-namespace access is set up).
This feature might therefore be more important when considering bucket users outside of the Kubernetes cluster where BucketAccess self-service isn't available.
The text was updated successfully, but these errors were encountered: