-
Notifications
You must be signed in to change notification settings - Fork 15
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Allow 'Internet' for data providers IP #2247
Conversation
Coverage reportClick to see where and how coverage changed
This report was generated by python-coverage-comment-action |
This might be a bit more tricky as storage accounts use IP address ranges and not service tags for restricting external access. It is possible to allow connection from any network. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Should this be targeting develop
instead of latest
?
I did have it as a hotfix. However, happy to move it to the next minor release as that should be soon, and this does change networking somewhat. |
✅ Checklist
Enable foobar integration
rather than515 foobar
).develop
.🚦 Depends on
#2246
Allows data providers (as well as research users) IP addresses to be defined as the Azure service tag 'Internet'.
🌂 Related issues
🔬 Tests
Tested on a new deployment. Ingress and Egress blobs anonymous access and with SAS token. Checked download from egress is possible with appropriate SAS token. Checked upload to ingress is possible with appropriate SAS token.
With the storage account set to allow all network connections and blob public access disabled (which is default, but also explicitly set here),
With the storage account URL, you cannot anonymously access the containers
With a valid SAS token you can access the containers and manipulate the data according to the permissions the SAS allows