Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Interoperability with path-style requests #10956

Closed
cyberduck opened this issue Jan 22, 2020 · 11 comments
Closed

Interoperability with path-style requests #10956

cyberduck opened this issue Jan 22, 2020 · 11 comments
Assignees
Labels
enhancement fixed s3 AWS S3 Protocol Implementation
Milestone

Comments

@cyberduck
Copy link
Collaborator

fcfe459 created the issue

Hey,

in version 7.2.0, you removed the support for path style URL generation for the S3 protocol:
"Deprecated path-style request usage for (AWS GovCloud) (#10824)"

I am using CyberDuck to connect to en enterprise S3 cluster, that still and only uses path-style.
Would there maybe be the option to bring the support back?

Would be fine for me, if this is then an additional checkbox in the connection settings to use path style.

But currently I am forced to use an old version no Cyberduck and repeatedly ask my, why they can't connect with their (newer) version of CyberDuck.

Thanks a lot.

@cyberduck
Copy link
Collaborator Author

@dkocher commented

Related issue with Minio in #10888.

@cyberduck
Copy link
Collaborator Author

@dkocher commented

Is this instance publicly reachable over the Internet to reproduce the issue?

@cyberduck
Copy link
Collaborator Author

@dkocher commented

We have implemented a fallback in af0c7ed if resolving the DNS name for the bucket fails.

@cyberduck
Copy link
Collaborator Author

@dkocher commented

Also as of e5e2a97 we use path-style requests when the hostname is an IP address.

@cyberduck
Copy link
Collaborator Author

fcfe459 commented

The instance is only partly reachable from the internet, sadly.

It is an instance of DELL ECS, which besides its enterprise hardware, also has a free to use community edition:
https://github.com/EMCECS/ECS-CommunityEdition/releases

Hostname would be something like:
namespace.mydomain.com
and to not get SSL-Certificate problems, hostnames can't look like
bucket.namspace.mydomain.com
as it would require a ..mydomain.com SSL-Cert.
Therefore this instance sticks to namepspace.mydomain.com/bucket

But if you need me to do anything / send any error messages, that would help you to identify the issue,
I can gladly do.

@cyberduck
Copy link
Collaborator Author

c3dd456 commented

Hello. Thanks for sharing such a great tool!

Unfortunately, some environments use a wildcard DNS entry that will always succeed, preventing Cyberduck from falling-back to path-style access. Would it be possible to have a configuration setting (or similar) that disables virtual host style access completely, please?

Thanks!

@cyberduck
Copy link
Collaborator Author

@dkocher commented

Reopen for #11416.

@cyberduck
Copy link
Collaborator Author

@dkocher commented

You can disable the use of virtual host style requests by setting the preference s3service.disable-dns-buckets to true.

@cyberduck
Copy link
Collaborator Author

@dkocher commented

#11548 closed as duplicate.

@cyberduck
Copy link
Collaborator Author

@dkocher commented

In 6ea9384. You will have to define a custom profile to disable the use of virtual host style requests. See 3e93ed4 for a sample.

@cyberduck
Copy link
Collaborator Author

@dkocher commented

We have no made available a preconfigured connection profile.

@iterate-ch iterate-ch locked as resolved and limited conversation to collaborators Nov 26, 2021
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
enhancement fixed s3 AWS S3 Protocol Implementation
Projects
None yet
Development

No branches or pull requests

2 participants