Project 'infra/sysadm-environment' was moved to 'swh/infra/sysadm-environment'. Please update any links and bookmarks that may still have the old path.
Hmm, do we really want this to be open to the world with no authentication whatsoever? (which is what infra/puppet/puppet-swh-site!427 seems to be doing)
Sure, we should have authentication / rate limit on this.
But if I'm not wrong, the target is to test the mirroring with ENEA.
If we add authentication, we need to improve the objstorage-replayer / objstorage to support it.
One improvment could also to move it from moma to avoid possible impacts on the webapp in case of request burst (which also means configuring a new public ip for this service).
@douardda could you explain the future milestones with ENEA?
Aside from the specific needs of the mirroring stack, the question at hand is whether the read-only object storage should be by default open to the public or not.
As this is the first time we open it up, I think we should start from a conservative approach of not having it open up to the public without authentication and/or rate limiting, which would put it up to par with the Web API.
Later on we can consider to relax requirements, if our resources permit to do so.
So the main practical question is if we do have already a mechanism in place for having authentication (and/or rate limiting), ideally relying on keycloak, and if that authentication mechanism is compatible with the needs of the various use cases (including mirroring). Do we?
The diff (infra/puppet/puppet-swh-site!427) has been updated to support a basic authentication for the public part. The internal access will remain possible without any authentication.
@zack we have chosen the easy way to have the solution quickly deployed for this POC. It will probably be possible to implement the authentication through keycloack later but it will need some developments in the objstorage code base (I don't know the complexity).