s3api: fix static IAM policy enforcement after reload (#8532)
* s3api: honor attached IAM policies over legacy actions * s3api: hydrate IAM policy docs during config reload * s3api: use policy-aware auth when listing buckets * credential: propagate context through filer_etc policy reads * credential: make legacy policy deletes durable * s3api: exercise managed policy runtime loader * s3api: allow static IAM users without session tokens * iam: deny unmatched attached policies under default allow * iam: load embedded policy files from filer store * s3api: require session tokens for IAM presigning * s3api: sync runtime policies into zero-config IAM * credential: respect context in policy file loads * credential: serialize legacy policy deletes * iam: align filer policy store naming * s3api: use authenticated principals for presigning * iam: deep copy policy conditions * s3api: require request creation in policy tests * filer: keep ReadInsideFiler as the context-aware API * iam: harden filer policy store writes * credential: strengthen legacy policy serialization test * credential: forward runtime policy loaders through wrapper * s3api: harden runtime policy merging * iam: require typed already-exists errors
This commit is contained in:
@@ -248,7 +248,7 @@ func (s3iam *S3IAMIntegration) AuthorizeAction(ctx context.Context, identity *IA
|
||||
return s3err.ErrNone // Fallback to existing authorization
|
||||
}
|
||||
|
||||
if identity.SessionToken == "" {
|
||||
if identity == nil || identity.Principal == "" {
|
||||
return s3err.ErrAccessDenied
|
||||
}
|
||||
|
||||
@@ -292,9 +292,12 @@ func (s3iam *S3IAMIntegration) AuthorizeAction(ctx context.Context, identity *IA
|
||||
|
||||
// Create action request
|
||||
actionRequest := &integration.ActionRequest{
|
||||
Principal: identity.Principal,
|
||||
Action: specificAction,
|
||||
Resource: resourceArn,
|
||||
Principal: identity.Principal,
|
||||
Action: specificAction,
|
||||
Resource: resourceArn,
|
||||
// Static SigV4 IAM users do not carry a session token. IAMManager
|
||||
// evaluates their attached policies directly and only validates STS/OIDC
|
||||
// session state when a token is actually present.
|
||||
SessionToken: identity.SessionToken,
|
||||
RequestContext: requestContext,
|
||||
PolicyNames: identity.PolicyNames,
|
||||
|
||||
Reference in New Issue
Block a user