I would like to clear the Proget feed cache through the API. I might of missed it but don't see any method listed under feed management API. Is there a way to execute the clear-cache through the API or programmatically on the local host?
Thanks,
I would like to clear the Proget feed cache through the API. I might of missed it but don't see any method listed under feed management API. Is there a way to execute the clear-cache through the API or programmatically on the local host?
Thanks,
We are experiencing the same issue @abm_4780 has experienced. We have the Proget container behind an AWS application load balancer and see the timeouts when one teamcity build agent(4vCPU and 8GB) requests the nuget packages. @abm_4780, did putting the container behind nginx solve your issue? Also worth noting that this looks like Proget is using all pooled data connections, and increasing max pool size does not seem to have an impact. Moving to Microsoft IIS stack did solve the problem but we were trying to avoid using a Windows server.
Thanks,
Adam
Hey atripp,
That worked for us! Was able to set the option in AWS S3 to Block public access to buckets and objects granted through new access control lists (ACLs)
. Thanks for getting that fix out so quick.
-Adam
Hi atripp,
Thanks for the fast response!
I believe the canned acl should not be set when the public check box is not selected.
You can specify S3CannedACL.Private but ideally I think you would not alter the default object ACL. Details on those ACL fields can be found here: https://docs.aws.amazon.com/sdkfornet/v3/apidocs/items/S3/TS3CannedACL.html
AWS mentions here https://docs.aws.amazon.com/AmazonS3/latest/dev/acl-overview.html that objects will default to owner full control (private acl)
"
*When you create a bucket or an object, Amazon S3 creates a default ACL that grants the resource owner full control over the resource.*
"
And also here is their warning about using AuthenticatedUsers:
"
*Authenticated Users group – Represented by http://acs.amazonaws.com/groups/global/AuthenticatedUsers.
This group represents all AWS accounts. Access permission to this group allows any AWS account to access the resource. However, all requests must be signed (authenticated).
Warning
When you grant access to the Authenticated Users group any AWS authenticated user in the world can access your resource.*
"
-https://docs.aws.amazon.com/AmazonS3/latest/dev/acl-overview.html
Thanks,
-Adam
Hi Support,
We are using the s3 package store for one of our nuget feeds with the AWS S3 "Block all public access" enabled on the bucket. When we upload an nuget package to the feed we get an error when the block public access is enabled. And we have confirmed the Proget s3 package store configuration Make public
is not enabled. After investigation we found that Proget s3 Extension is trying to add the object with the following ACL enabled:
{
"Grantee": {
"Type": "Group",
"URI": "http://acs.amazonaws.com/groups/global/AuthenticatedUsers"
},
"Permission": "READ"
}
This will get blocked by the AWS S3 public rule Block public access to buckets and objects granted through new access control lists (ACLs)
This above policy would allow any authenticated AWS account access to the bucket and is not what we want to set for the object. Any possibility we can get someone to look at that extension to change the behavior?
Thanks,
Adam