TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Amazon S3 will no longer support path-style API requests

652 pointsby cyanbaneabout 6 years ago

47 comments

samatabout 6 years ago
One important implication is that collateral freedom techniques [1] using Amazon S3 will no longer work.<p>To put it simply, right now I could put some stuff not liked by Russian or Chinese government (maybe entire website) and give a direct s3 link to <a href="https:&#x2F;&#x2F;" rel="nofollow">https:&#x2F;&#x2F;</a> s3 .amazonaws.com&#x2F;mywebsite&#x2F;index.html. Because it&#x27;s https — there is no way man in the middle knows what people read on s3.amazonaws.com. With this change — dictators see my domain name and block requests to it right away.<p>I don&#x27;t know if they did it on purpose or just forgot about those who are less fortunate in regards to access to information, but this is a sad development.<p>This censorship circumvention technique is actively used in the wild and loosing Amazon is no good.<p>1 <a href="https:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;Collateral_freedom" rel="nofollow">https:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;Collateral_freedom</a>
评论 #19822195 未加载
评论 #19823520 未加载
评论 #19822842 未加载
评论 #19822241 未加载
评论 #19823112 未加载
评论 #19824105 未加载
评论 #19823786 未加载
评论 #19822295 未加载
评论 #19822572 未加载
评论 #19823371 未加载
评论 #19825455 未加载
评论 #19822839 未加载
评论 #19824799 未加载
评论 #19822353 未加载
评论 #19823369 未加载
评论 #19822292 未加载
btownabout 6 years ago
What kind of company deprecates a URL format that&#x27;s still recommended by the Object URL in the S3 Management Console?<p><a href="https:&#x2F;&#x2F;www.dropbox.com&#x2F;s&#x2F;zzr3r1nvmx6ekct&#x2F;Screenshot%202019-05-03%2019.32.48.png?dl=0" rel="nofollow">https:&#x2F;&#x2F;www.dropbox.com&#x2F;s&#x2F;zzr3r1nvmx6ekct&#x2F;Screenshot%202019-...</a><p>There are so, SO many teams that use S3 for static assets, make sure it&#x27;s public, and copy that Object URL. We&#x27;ve done this at my company, and I&#x27;ve seen these types of links in many of our partners&#x27; CSS files. These links may also be stored deep in databases, or even embedded in Markdown in databases.<p>This will quite literally cause a Y2K-level event, and since all that traffic will still head to S3&#x27;s servers, it won&#x27;t even solve any of their routing problems.<p>Set it as a policy for new buckets, if you must, if you change the Object URL output and have a giant disclaimer.<p>But don&#x27;t. Freaking. Break. The. Web.
评论 #19823274 未加载
评论 #19824777 未加载
评论 #19824742 未加载
评论 #19830703 未加载
astrocatabout 6 years ago
Amazon explicitly recommends naming buckets like &quot;example.com&quot; and &quot;www.example.com&quot; : <a href="https:&#x2F;&#x2F;docs.aws.amazon.com&#x2F;AmazonS3&#x2F;latest&#x2F;dev&#x2F;website-hosting-custom-domain-walkthrough.html" rel="nofollow">https:&#x2F;&#x2F;docs.aws.amazon.com&#x2F;AmazonS3&#x2F;latest&#x2F;dev&#x2F;website-host...</a><p>Now, it seems, this is a big problem. V2 resource requests will look like this: <a href="https:&#x2F;&#x2F;example.com.s3.amazonaws.com&#x2F;.." rel="nofollow">https:&#x2F;&#x2F;example.com.s3.amazonaws.com&#x2F;..</a>. or <a href="https:&#x2F;&#x2F;www.example.com.s3.amazonaws.com&#x2F;.." rel="nofollow">https:&#x2F;&#x2F;www.example.com.s3.amazonaws.com&#x2F;..</a>.<p>And, of course, this ruins https. Amazon has you covered for * .s3.amazonaws.com, but not for * .* .s3.amazonaws.com or even * .* .* .s3.amazonaws... and so on.<p>So... I guess I have to rename&#x2F;move all my buckets now? Ugh.
评论 #19822569 未加载
评论 #19822289 未加载
评论 #19822149 未加载
评论 #19822306 未加载
评论 #19822760 未加载
评论 #19822315 未加载
TheLoneTechNerdabout 6 years ago
Does anyone have insight on why they&#x27;re making this change? All they say in this post is &quot;In our effort to continuously improve customer experience&quot;. From my point of view as a customer, I don&#x27;t really see an experiential difference between a subdomain style and a path style - one&#x27;s a &quot;.&quot;, the other&#x27;s a &quot;&#x2F;&quot; - but I imagine there&#x27;s a good reason for the change.
评论 #19822048 未加载
评论 #19822740 未加载
评论 #19822011 未加载
评论 #19822037 未加载
评论 #19822222 未加载
评论 #19822038 未加载
评论 #19822010 未加载
评论 #19822052 未加载
sl1ck731about 6 years ago
Does the &quot;you are no longer logged in&quot; screen not infuriate anyone besides me? There doesn&#x27;t seem any purpose to it just redirecting you to the landing page when you were trying to access a forum post that doesn&#x27;t even require you be logged in.<p>Absolutely mind boggling with as much as they pay people they do something so stupid and haven&#x27;t changed it after so long.
cddotdotslashabout 6 years ago
This is going to break so many legacy codebases in ways I can&#x27;t even imagine.<p>Edit: Could they have found a better place to announce this than a forum post?
评论 #19821802 未加载
评论 #19821909 未加载
评论 #19822027 未加载
jasonkesterabout 6 years ago
I wonder how they’ll handle capitalized bucket names. This seems like it will break that.<p>S3 has been around a long time, and they made some decisions early on that they realised wouldn’t scale, so they reversed them. This v1 vs v2 url thing is one of them.<p>But another was letting you have “BucketName” and “bucketname” as two distinct buckets. You can’t name them like that today, but you could at first, and they still work (and are in conflict under v2 naming).<p>Amazons own docs explain that you still need to use the old v1 scheme for capitalized names, as well as names containing certain special characters.<p>It’d be a shame if they just tossed all those old buckets in the trash by leaving them inaccessible.<p>All in, this seems like another silly, unnecessary, depreciation of an API that was working perfectly well. A trend I’m noticing more often these days.<p>Shame.
euankabout 6 years ago
One of the weird peculiarities of path-style API requests was that it meant CORS headers meant nothing for any bucket pretty much. I wrote a post about this a bit ago [0].<p>I guess after this change, the cors configuration will finally do something!<p>On the flip side, anyone who wants to list buckets entirely from the client-side javascript sdk won&#x27;t be able to anymore unless Amazon also modifies cors headers on the API endpoint further after disabling path-style requests.<p>[0]: <a href="https:&#x2F;&#x2F;euank.com&#x2F;2018&#x2F;11&#x2F;12&#x2F;s3-cors-pfffff.html" rel="nofollow">https:&#x2F;&#x2F;euank.com&#x2F;2018&#x2F;11&#x2F;12&#x2F;s3-cors-pfffff.html</a>
chillaxtianabout 6 years ago
A similar removal is coming in just 2 months for V2 signatures: <a href="https:&#x2F;&#x2F;forums.aws.amazon.com&#x2F;ann.jspa?annID=5816" rel="nofollow">https:&#x2F;&#x2F;forums.aws.amazon.com&#x2F;ann.jspa?annID=5816</a><p>This could be just as disruptive.<p>Difficult to say that they will actually follow through, as the only mention of this date is in the random forum post I linked.
评论 #19824895 未加载
ec109685about 6 years ago
Amazon is proud that they never break backwards compatibility like this. Quotes like the container you are running on Fargate will keep running 10 years from now.<p>Something weird is going on if they don’t keep path style domains working for existing buckets.
评论 #19825585 未加载
sly010about 6 years ago
Is there a deprecation announcement that does not include the phrase &quot;In our effort to continuously improve customer experience&quot;?<p>Edit: autotypo
bagelsabout 6 years ago
Fun fact: The s3 console as of right now still shows v1 urls when you look at the overview page for a key&#x2F;file.
reilly3000about 6 years ago
I was already planning a move to GCP, but this certainly helps. Now that cloud is beating retail in earnings, the ‘optimizations’ come along with it. That and BigQuery is an amazing tool.<p>It’s not like I’m super outraged that they would change their API, the reasoning seems sound. It’s just that if I have to touch S3 paths everywhere I may as well move them elsewhere to gain some synergies with GCP services. I would think twice if I were heavy up on IAM roles and S3 Lambda triggers, but that isn’t the case.
manigandhamabout 6 years ago
This is most likely to help mitigate the domain being abused for browser security due to the same-origin policy. This is very common when dealing with malware, phishing, and errant JS files.
lazyantabout 6 years ago
`In our effort to continuously improve customer experience` , what&#x27;s the actual driver here, I don&#x27;t see how going from two to one option and forcing you to change if you are in the wrong one improves my experience.
评论 #19825404 未加载
评论 #19823152 未加载
geekraxabout 6 years ago
There are millions of results for &quot;<a href="https:&#x2F;&#x2F;s3.amazonaws.com&#x2F;&quot;" rel="nofollow">https:&#x2F;&#x2F;s3.amazonaws.com&#x2F;&quot;</a> on GitHub: <a href="http:&#x2F;&#x2F;bit.ly&#x2F;2GUVjDi" rel="nofollow">http:&#x2F;&#x2F;bit.ly&#x2F;2GUVjDi</a>
评论 #19822652 未加载
merbabout 6 years ago
I see a problem when using the s3 library to other services that support s3 but only have some kind of path style access like minio or ceph with no subdomains enabled. it will break once their java api removes the old code.
pulkitsh1234about 6 years ago
<p><pre><code> ag -o &#x27;https?:&#x2F;&#x2F;s3.amazonaws.com.*?\&#x2F;.*?\&#x2F;&#x27;| awk -F&#x27;:&#x27; &#x27;{print $1, $4}&#x27; | sort | uniq | cut -d&#x27;&#x2F;&#x27; -f 1 | sort | uniq -c | gsort -h -rk1,1 </code></pre> For anyone interesting in finding out the occurrences in their codebase. (Mac)
Roark66about 6 years ago
AWS API is an inconsistent mess. If you don&#x27;t believe me try writing a script to tag resources. Every resource type requires using different way to identify it, different way to pass the tags etc. You&#x27;re pretty much required to write different code to handle each resource type.
mark242about 6 years ago
This will hopefully prevent malicious sites hosted on v1-style buckets from stealing cookies&#x2F;localstorage&#x2F;credentials&#x2F;etc.
评论 #19823210 未加载
caseymarquisabout 6 years ago
I&#x27;m so glad I saw this. I would have been very confused when this went live had I not seen this post today. I wish I could upvote this more.
phlakatonabout 6 years ago
Hm. I had a local testing setup using an S3 standin service from localstack and a Docker Compose cluster, and path-style addressing made that pretty easy to set up. Anyone else in that &quot;bucket?&quot; Suggestions on the best workaround?
swileyabout 6 years ago
Commercial platform breaks things people have built on it for &quot;the sake of continuously improving customer experience. &quot;<p>Also: see photos of your favorite celebrity walking their dog and other news at 11.
segmondyabout 6 years ago
So much for customer obsession.
评论 #19823403 未加载
orfabout 6 years ago
<a href="https:&#x2F;&#x2F;github.com&#x2F;search?q=%22https%3A%2F%2Fs3.amazonaws.com%2F%22&amp;type=Code" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;search?q=%22https%3A%2F%2Fs3.amazonaws.co...</a><p>Over a million results (+250k http). This is going to be painful.
ARandomerDudeabout 6 years ago
TL;DR<p>Migrate<p>from: s3.amazonaws.com&#x2F;&lt;bucketname&gt;&#x2F;key<p>to: &lt;bucketname&gt;.s3.amazonaws.com&#x2F;key<p>no later than: September 30th, 2020
pronoiacabout 6 years ago
For other folks looking for announcement feeds, see <a href="https:&#x2F;&#x2F;forums.aws.amazon.com&#x2F;rss.jspa" rel="nofollow">https:&#x2F;&#x2F;forums.aws.amazon.com&#x2F;rss.jspa</a> - announcements are the asterisks.
rynopabout 6 years ago
How does this impact CloudFront origin domain names? I have an s3 bucket as a CF origin and the format the AWS CF Console auto-completes to is:<p>&lt;bucket&gt;.s3.amazonaws.com<p>Do I need to change my origin to be, Origin domain name: s3.amazonaws.com, Origin Path: &lt;bucket&gt;<p>This is a sneaky one that will bite lots of folks as it is NOT clear.
评论 #19829612 未加载
yeahitslikethatabout 6 years ago
&quot;In our effort to continuously improve customer experience, the path-style naming convention is being retired in favor of virtual-hosted style request format. Customers should update their applications&quot;<p>How does forcing customers to rewrite their code to confirm to this change, improve customer experience?
评论 #19822574 未加载
jasonpeacockabout 6 years ago
IMO, this is an improvement - it makes it clear that the bucket is global and public, whereas with the path you could believe that it was only visible when logged into your account.<p>It also helps people understand why the bucket name is restricted in it&#x27;s naming.
评论 #19822345 未加载
xyzzy_plughabout 6 years ago
This will break software updates for so many systems, probably even some Amazon devices.
miguelmotaabout 6 years ago
Always confused me how they had two different ways of retrieving the same object. Glad that they&#x27;re sticking to the subdomain option. Sucks to go back and check for old urls though. This change might break a good chunk of the web.
niyazpkabout 6 years ago
One way to do this without breaking existing applications would be to charge more for the path style requests for a while. Then deprecate once enough people have moved away from it, so that less people are outraged by the change.
interfixusabout 6 years ago
&gt; <i>In our effort to continuously improve customer experience,</i> [feature x] <i>is being retired</i><p>In this case, the most highly improved experience I can think of eould be that of sundry nefarious entities monitoring internet traffic.
jvarsanikabout 6 years ago
Does anyone know if this will affect uploads? We are getting an upload URL using s3.createPresignedPost and this returns (at least currently) a path-style url...
tckrabout 6 years ago
The title is misleading. Path style request &quot;&#x2F;foo&#x2F;bar&#x2F;file.ext&quot; are still supported.<p>What changes is that the bucket name must be in the hostname.
评论 #19827482 未加载
ajcodezabout 6 years ago
I switched to MinIO for anything new. Happy user - <a href="https:&#x2F;&#x2F;min.io&#x2F;" rel="nofollow">https:&#x2F;&#x2F;min.io&#x2F;</a>
abra559about 6 years ago
this looks to be largely resolved: <a href="https:&#x2F;&#x2F;aws.amazon.com&#x2F;blogs&#x2F;aws&#x2F;amazon-s3-path-deprecation-plan-the-rest-of-the-story&#x2F;" rel="nofollow">https:&#x2F;&#x2F;aws.amazon.com&#x2F;blogs&#x2F;aws&#x2F;amazon-s3-path-deprecation-...</a>
massungabout 6 years ago
Anyone know if this will affect the internal use (e.g. EMR) s3 schema: s3:&#x2F;&#x2F;bucket&#x2F;path&#x2F;key?
评论 #19824670 未加载
评论 #19822673 未加载
gigatexalabout 6 years ago
Hmm I don’t understand why this change is happening. What does this gain? Removal of tech debt?
cs02rm0about 6 years ago
I didn&#x27;t know path style was possible.<p>I&#x27;d have found it really useful. :-&#x2F;
iamgopalabout 6 years ago
They should produce a free redirect service at least.
RocketSyntaxabout 6 years ago
Boo. Now old packages won&#x27;t work.
etxmabout 6 years ago
This is going to be the Y2K of September 2020.
blairandersonabout 6 years ago
TL;DR <a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=19821813" rel="nofollow">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=19821813</a>
gcb0about 6 years ago
Does that mean people still have tons of public-by-mistake s3 buckets because of their clumsy UI, and they just gave up and are swiping what&#x27;s left under the rug?
评论 #19822968 未加载
评论 #19821856 未加载
评论 #19822518 未加载
blantonlabout 6 years ago
I&#x27;m kind of shocked at some of the responses here... everything from outrage, to expressing dismay at how many things could break, to how hard this is to fix, to accusing Amazon of all kinds of nefarious things.<p>How hard is it for 99% of the developers and technical leaders here to search your codebase for s3.amazonaws.com and update your links in the next <i>18 months</i>?
评论 #19822846 未加载
评论 #19822781 未加载
评论 #19822768 未加载
评论 #19824144 未加载