2023-09-19 01:13:03 -04:00
|
|
|
// Copyright (c) 2015-2023 MinIO, Inc.
|
2021-04-18 15:41:13 -04:00
|
|
|
//
|
|
|
|
// This file is part of MinIO Object Storage stack
|
|
|
|
//
|
|
|
|
// This program is free software: you can redistribute it and/or modify
|
|
|
|
// it under the terms of the GNU Affero General Public License as published by
|
|
|
|
// the Free Software Foundation, either version 3 of the License, or
|
|
|
|
// (at your option) any later version.
|
|
|
|
//
|
|
|
|
// This program is distributed in the hope that it will be useful
|
|
|
|
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
// GNU Affero General Public License for more details.
|
|
|
|
//
|
|
|
|
// You should have received a copy of the GNU Affero General Public License
|
|
|
|
// along with this program. If not, see <http://www.gnu.org/licenses/>.
|
2019-11-09 12:27:23 -05:00
|
|
|
|
|
|
|
package cmd
|
|
|
|
|
|
|
|
import (
|
2021-05-06 11:52:02 -04:00
|
|
|
"bytes"
|
2023-09-19 01:13:03 -04:00
|
|
|
"context"
|
2019-11-09 12:27:23 -05:00
|
|
|
"encoding/json"
|
2021-03-23 20:39:20 -04:00
|
|
|
"errors"
|
2023-01-23 21:47:18 -05:00
|
|
|
"fmt"
|
2019-11-09 12:27:23 -05:00
|
|
|
"io"
|
|
|
|
"net/http"
|
2022-06-23 12:25:15 -04:00
|
|
|
"os"
|
2021-02-09 12:53:07 -05:00
|
|
|
"sort"
|
2022-06-23 12:25:15 -04:00
|
|
|
"time"
|
2019-11-09 12:27:23 -05:00
|
|
|
|
2022-06-23 12:25:15 -04:00
|
|
|
"github.com/klauspost/compress/zip"
|
2023-06-19 20:53:08 -04:00
|
|
|
"github.com/minio/madmin-go/v3"
|
2021-10-06 19:36:31 -04:00
|
|
|
"github.com/minio/minio/internal/auth"
|
2021-06-01 17:59:40 -04:00
|
|
|
"github.com/minio/minio/internal/config/dns"
|
|
|
|
"github.com/minio/minio/internal/logger"
|
2023-01-23 06:12:47 -05:00
|
|
|
"github.com/minio/mux"
|
2023-09-14 17:50:16 -04:00
|
|
|
"github.com/minio/pkg/v2/policy"
|
2019-11-09 12:27:23 -05:00
|
|
|
)
|
|
|
|
|
2020-04-07 22:30:59 -04:00
|
|
|
// RemoveUser - DELETE /minio/admin/v3/remove-user?accessKey=<access_key>
|
2019-11-09 12:27:23 -05:00
|
|
|
func (a adminAPIHandlers) RemoveUser(w http.ResponseWriter, r *http.Request) {
|
2023-07-13 17:52:21 -04:00
|
|
|
ctx := r.Context()
|
2020-05-11 13:34:08 -04:00
|
|
|
|
2023-09-14 17:50:16 -04:00
|
|
|
objectAPI, cred := validateAdminReq(ctx, w, r, policy.DeleteUserAdminAction)
|
2019-11-09 12:27:23 -05:00
|
|
|
if objectAPI == nil {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
vars := mux.Vars(r)
|
|
|
|
accessKey := vars["accessKey"]
|
|
|
|
|
2021-02-25 16:49:59 -05:00
|
|
|
ok, _, err := globalIAMSys.IsTempUser(accessKey)
|
2019-12-19 17:21:21 -05:00
|
|
|
if err != nil {
|
|
|
|
writeErrorResponseJSON(ctx, w, toAdminAPIErr(ctx, err), r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
if ok {
|
|
|
|
writeErrorResponseJSON(ctx, w, toAdminAPIErr(ctx, errIAMActionNotAllowed), r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2023-04-28 15:24:14 -04:00
|
|
|
// When the user is root credential you are not allowed to
|
|
|
|
// remove the root user. Also you cannot delete yourself.
|
|
|
|
if accessKey == globalActiveCred.AccessKey || accessKey == cred.AccessKey {
|
|
|
|
writeErrorResponseJSON(ctx, w, toAdminAPIErr(ctx, errIAMActionNotAllowed), r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2021-12-21 05:16:50 -05:00
|
|
|
if err := globalIAMSys.DeleteUser(ctx, accessKey, true); err != nil {
|
2019-11-09 12:27:23 -05:00
|
|
|
writeErrorResponseJSON(ctx, w, toAdminAPIErr(ctx, err), r.URL)
|
|
|
|
return
|
|
|
|
}
|
2022-01-06 18:52:43 -05:00
|
|
|
|
2023-01-26 14:11:54 -05:00
|
|
|
logger.LogIf(ctx, globalSiteReplicationSys.IAMChangeHook(ctx, madmin.SRIAMItem{
|
2022-01-06 18:52:43 -05:00
|
|
|
Type: madmin.SRIAMItemIAMUser,
|
|
|
|
IAMUser: &madmin.SRIAMUser{
|
|
|
|
AccessKey: accessKey,
|
|
|
|
IsDeleteReq: true,
|
|
|
|
},
|
2022-07-01 16:19:13 -04:00
|
|
|
UpdatedAt: UTCNow(),
|
2023-01-26 14:11:54 -05:00
|
|
|
}))
|
2019-11-09 12:27:23 -05:00
|
|
|
}
|
|
|
|
|
2022-01-19 13:45:13 -05:00
|
|
|
// ListBucketUsers - GET /minio/admin/v3/list-users?bucket={bucket}
|
2021-05-27 13:15:02 -04:00
|
|
|
func (a adminAPIHandlers) ListBucketUsers(w http.ResponseWriter, r *http.Request) {
|
2023-07-13 17:52:21 -04:00
|
|
|
ctx := r.Context()
|
2021-05-27 13:15:02 -04:00
|
|
|
|
2023-09-14 17:50:16 -04:00
|
|
|
objectAPI, cred := validateAdminReq(ctx, w, r, policy.ListUsersAdminAction)
|
2021-05-27 13:15:02 -04:00
|
|
|
if objectAPI == nil {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
bucket := mux.Vars(r)["bucket"]
|
|
|
|
|
|
|
|
password := cred.SecretKey
|
|
|
|
|
2022-04-19 12:00:19 -04:00
|
|
|
allCredentials, err := globalIAMSys.ListBucketUsers(ctx, bucket)
|
2021-05-27 13:15:02 -04:00
|
|
|
if err != nil {
|
|
|
|
writeErrorResponseJSON(ctx, w, toAdminAPIErr(ctx, err), r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
data, err := json.Marshal(allCredentials)
|
|
|
|
if err != nil {
|
|
|
|
writeErrorResponseJSON(ctx, w, toAdminAPIErr(ctx, err), r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
econfigData, err := madmin.EncryptData(password, data)
|
|
|
|
if err != nil {
|
|
|
|
writeErrorResponseJSON(ctx, w, toAdminAPIErr(ctx, err), r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
writeSuccessResponseJSON(w, econfigData)
|
|
|
|
}
|
|
|
|
|
2020-04-07 22:30:59 -04:00
|
|
|
// ListUsers - GET /minio/admin/v3/list-users
|
2019-11-09 12:27:23 -05:00
|
|
|
func (a adminAPIHandlers) ListUsers(w http.ResponseWriter, r *http.Request) {
|
2023-07-13 17:52:21 -04:00
|
|
|
ctx := r.Context()
|
2020-05-11 13:34:08 -04:00
|
|
|
|
2023-09-14 17:50:16 -04:00
|
|
|
objectAPI, cred := validateAdminReq(ctx, w, r, policy.ListUsersAdminAction)
|
2019-11-09 12:27:23 -05:00
|
|
|
if objectAPI == nil {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2020-03-23 17:06:00 -04:00
|
|
|
password := cred.SecretKey
|
|
|
|
|
2022-04-19 12:00:19 -04:00
|
|
|
allCredentials, err := globalIAMSys.ListUsers(ctx)
|
2019-11-09 12:27:23 -05:00
|
|
|
if err != nil {
|
|
|
|
writeErrorResponseJSON(ctx, w, toAdminAPIErr(ctx, err), r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2022-04-16 00:26:02 -04:00
|
|
|
// Add ldap users which have mapped policies if in LDAP mode
|
|
|
|
// FIXME(vadmeste): move this to policy info in the future
|
2022-10-04 13:41:47 -04:00
|
|
|
ldapUsers, err := globalIAMSys.ListLDAPUsers(ctx)
|
2022-04-16 00:26:02 -04:00
|
|
|
if err != nil && err != errIAMActionNotAllowed {
|
|
|
|
writeErrorResponseJSON(ctx, w, toAdminAPIErr(ctx, err), r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
for k, v := range ldapUsers {
|
|
|
|
allCredentials[k] = v
|
|
|
|
}
|
|
|
|
|
|
|
|
// Marshal the response
|
2019-11-09 12:27:23 -05:00
|
|
|
data, err := json.Marshal(allCredentials)
|
|
|
|
if err != nil {
|
|
|
|
writeErrorResponseJSON(ctx, w, toAdminAPIErr(ctx, err), r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
econfigData, err := madmin.EncryptData(password, data)
|
|
|
|
if err != nil {
|
|
|
|
writeErrorResponseJSON(ctx, w, toAdminAPIErr(ctx, err), r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
writeSuccessResponseJSON(w, econfigData)
|
|
|
|
}
|
|
|
|
|
2020-04-07 22:30:59 -04:00
|
|
|
// GetUserInfo - GET /minio/admin/v3/user-info
|
2019-11-09 12:27:23 -05:00
|
|
|
func (a adminAPIHandlers) GetUserInfo(w http.ResponseWriter, r *http.Request) {
|
2023-07-13 17:52:21 -04:00
|
|
|
ctx := r.Context()
|
2020-05-11 13:34:08 -04:00
|
|
|
|
2020-11-27 20:23:57 -05:00
|
|
|
vars := mux.Vars(r)
|
|
|
|
name := vars["accessKey"]
|
|
|
|
|
|
|
|
// Get current object layer instance.
|
|
|
|
objectAPI := newObjectLayerFn()
|
|
|
|
if objectAPI == nil || globalNotificationSys == nil {
|
|
|
|
writeErrorResponseJSON(ctx, w, errorCodes.ToAPIErr(ErrServerNotInitialized), r.URL)
|
2019-11-09 12:27:23 -05:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2023-02-06 12:27:29 -05:00
|
|
|
cred, owner, s3Err := validateAdminSignature(ctx, r, "")
|
2020-11-27 20:23:57 -05:00
|
|
|
if s3Err != ErrNone {
|
|
|
|
writeErrorResponseJSON(ctx, w, errorCodes.ToAPIErr(s3Err), r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2021-12-10 18:03:39 -05:00
|
|
|
checkDenyOnly := false
|
|
|
|
if name == cred.AccessKey {
|
|
|
|
// Check that there is no explicit deny - otherwise it's allowed
|
|
|
|
// to view one's own info.
|
|
|
|
checkDenyOnly = true
|
|
|
|
}
|
|
|
|
|
2023-09-14 17:50:16 -04:00
|
|
|
if !globalIAMSys.IsAllowed(policy.Args{
|
2021-12-10 18:03:39 -05:00
|
|
|
AccountName: cred.AccessKey,
|
|
|
|
Groups: cred.Groups,
|
2023-09-14 17:50:16 -04:00
|
|
|
Action: policy.GetUserAdminAction,
|
2023-02-06 12:27:29 -05:00
|
|
|
ConditionValues: getConditionValues(r, "", cred),
|
2021-12-10 18:03:39 -05:00
|
|
|
IsOwner: owner,
|
2023-02-06 12:27:29 -05:00
|
|
|
Claims: cred.Claims,
|
2021-12-10 18:03:39 -05:00
|
|
|
DenyOnly: checkDenyOnly,
|
|
|
|
}) {
|
|
|
|
writeErrorResponseJSON(ctx, w, errorCodes.ToAPIErr(ErrAccessDenied), r.URL)
|
|
|
|
return
|
2020-11-27 20:23:57 -05:00
|
|
|
}
|
2019-11-09 12:27:23 -05:00
|
|
|
|
2021-11-15 17:14:22 -05:00
|
|
|
userInfo, err := globalIAMSys.GetUserInfo(ctx, name)
|
2019-11-09 12:27:23 -05:00
|
|
|
if err != nil {
|
|
|
|
writeErrorResponseJSON(ctx, w, toAdminAPIErr(ctx, err), r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
data, err := json.Marshal(userInfo)
|
|
|
|
if err != nil {
|
|
|
|
writeErrorResponseJSON(ctx, w, toAdminAPIErr(ctx, err), r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
writeSuccessResponseJSON(w, data)
|
|
|
|
}
|
|
|
|
|
2020-04-07 22:30:59 -04:00
|
|
|
// UpdateGroupMembers - PUT /minio/admin/v3/update-group-members
|
2019-11-09 12:27:23 -05:00
|
|
|
func (a adminAPIHandlers) UpdateGroupMembers(w http.ResponseWriter, r *http.Request) {
|
2023-07-13 17:52:21 -04:00
|
|
|
ctx := r.Context()
|
2020-05-11 13:34:08 -04:00
|
|
|
|
2023-09-14 17:50:16 -04:00
|
|
|
objectAPI, _ := validateAdminReq(ctx, w, r, policy.AddUserToGroupAdminAction)
|
2019-11-09 12:27:23 -05:00
|
|
|
if objectAPI == nil {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2022-09-19 14:05:16 -04:00
|
|
|
data, err := io.ReadAll(r.Body)
|
2019-11-09 12:27:23 -05:00
|
|
|
if err != nil {
|
|
|
|
writeErrorResponseJSON(ctx, w, errorCodes.ToAPIErr(ErrInvalidRequest), r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
var updReq madmin.GroupAddRemove
|
|
|
|
err = json.Unmarshal(data, &updReq)
|
|
|
|
if err != nil {
|
|
|
|
writeErrorResponseJSON(ctx, w, errorCodes.ToAPIErr(ErrInvalidRequest), r.URL)
|
|
|
|
return
|
|
|
|
}
|
2023-04-28 15:24:14 -04:00
|
|
|
|
|
|
|
// Reject if the group add and remove are temporary credentials, or root credential.
|
|
|
|
for _, member := range updReq.Members {
|
|
|
|
ok, _, err := globalIAMSys.IsTempUser(member)
|
|
|
|
if err != nil && err != errNoSuchUser {
|
|
|
|
writeErrorResponseJSON(ctx, w, toAdminAPIErr(ctx, err), r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
if ok {
|
|
|
|
writeErrorResponseJSON(ctx, w, toAdminAPIErr(ctx, errIAMActionNotAllowed), r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
// When the user is root credential you are not allowed to
|
|
|
|
// add policies for root user.
|
|
|
|
if member == globalActiveCred.AccessKey {
|
|
|
|
writeErrorResponseJSON(ctx, w, toAdminAPIErr(ctx, errIAMActionNotAllowed), r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2022-07-01 16:19:13 -04:00
|
|
|
var updatedAt time.Time
|
2019-11-09 12:27:23 -05:00
|
|
|
if updReq.IsRemove {
|
2022-07-01 16:19:13 -04:00
|
|
|
updatedAt, err = globalIAMSys.RemoveUsersFromGroup(ctx, updReq.Group, updReq.Members)
|
2019-11-09 12:27:23 -05:00
|
|
|
} else {
|
2022-05-02 12:27:35 -04:00
|
|
|
// Check if group already exists
|
|
|
|
if _, gerr := globalIAMSys.GetGroupDescription(updReq.Group); gerr != nil {
|
|
|
|
// If group does not exist, then check if the group has beginning and end space characters
|
|
|
|
// we will reject such group names.
|
|
|
|
if errors.Is(gerr, errNoSuchGroup) && hasSpaceBE(updReq.Group) {
|
|
|
|
writeErrorResponseJSON(ctx, w, errorCodes.ToAPIErr(ErrAdminResourceInvalidArgument), r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
2022-07-01 16:19:13 -04:00
|
|
|
updatedAt, err = globalIAMSys.AddUsersToGroup(ctx, updReq.Group, updReq.Members)
|
2019-11-09 12:27:23 -05:00
|
|
|
}
|
|
|
|
if err != nil {
|
|
|
|
writeErrorResponseJSON(ctx, w, toAdminAPIErr(ctx, err), r.URL)
|
|
|
|
return
|
|
|
|
}
|
2022-01-06 18:52:43 -05:00
|
|
|
|
2023-01-26 14:11:54 -05:00
|
|
|
logger.LogIf(ctx, globalSiteReplicationSys.IAMChangeHook(ctx, madmin.SRIAMItem{
|
2022-01-06 18:52:43 -05:00
|
|
|
Type: madmin.SRIAMItemGroupInfo,
|
|
|
|
GroupInfo: &madmin.SRGroupInfo{
|
|
|
|
UpdateReq: updReq,
|
|
|
|
},
|
2022-07-01 16:19:13 -04:00
|
|
|
UpdatedAt: updatedAt,
|
2023-01-26 14:11:54 -05:00
|
|
|
}))
|
2019-11-09 12:27:23 -05:00
|
|
|
}
|
|
|
|
|
2020-04-07 22:30:59 -04:00
|
|
|
// GetGroup - /minio/admin/v3/group?group=mygroup1
|
2019-11-09 12:27:23 -05:00
|
|
|
func (a adminAPIHandlers) GetGroup(w http.ResponseWriter, r *http.Request) {
|
2023-07-13 17:52:21 -04:00
|
|
|
ctx := r.Context()
|
2020-05-11 13:34:08 -04:00
|
|
|
|
2023-09-14 17:50:16 -04:00
|
|
|
objectAPI, _ := validateAdminReq(ctx, w, r, policy.GetGroupAdminAction)
|
2019-11-09 12:27:23 -05:00
|
|
|
if objectAPI == nil {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
vars := mux.Vars(r)
|
|
|
|
group := vars["group"]
|
|
|
|
|
|
|
|
gdesc, err := globalIAMSys.GetGroupDescription(group)
|
|
|
|
if err != nil {
|
|
|
|
writeErrorResponseJSON(ctx, w, toAdminAPIErr(ctx, err), r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
body, err := json.Marshal(gdesc)
|
|
|
|
if err != nil {
|
|
|
|
writeErrorResponseJSON(ctx, w, toAdminAPIErr(ctx, err), r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
writeSuccessResponseJSON(w, body)
|
|
|
|
}
|
|
|
|
|
2020-04-07 22:30:59 -04:00
|
|
|
// ListGroups - GET /minio/admin/v3/groups
|
2019-11-09 12:27:23 -05:00
|
|
|
func (a adminAPIHandlers) ListGroups(w http.ResponseWriter, r *http.Request) {
|
2023-07-13 17:52:21 -04:00
|
|
|
ctx := r.Context()
|
2020-05-11 13:34:08 -04:00
|
|
|
|
2023-09-14 17:50:16 -04:00
|
|
|
objectAPI, _ := validateAdminReq(ctx, w, r, policy.ListGroupsAdminAction)
|
2019-11-09 12:27:23 -05:00
|
|
|
if objectAPI == nil {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2021-11-15 17:14:22 -05:00
|
|
|
groups, err := globalIAMSys.ListGroups(ctx)
|
2019-11-09 12:27:23 -05:00
|
|
|
if err != nil {
|
|
|
|
writeErrorResponseJSON(ctx, w, toAdminAPIErr(ctx, err), r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
body, err := json.Marshal(groups)
|
|
|
|
if err != nil {
|
|
|
|
writeErrorResponseJSON(ctx, w, toAdminAPIErr(ctx, err), r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
writeSuccessResponseJSON(w, body)
|
|
|
|
}
|
|
|
|
|
2020-04-07 22:30:59 -04:00
|
|
|
// SetGroupStatus - PUT /minio/admin/v3/set-group-status?group=mygroup1&status=enabled
|
2019-11-09 12:27:23 -05:00
|
|
|
func (a adminAPIHandlers) SetGroupStatus(w http.ResponseWriter, r *http.Request) {
|
2023-07-13 17:52:21 -04:00
|
|
|
ctx := r.Context()
|
2020-05-11 13:34:08 -04:00
|
|
|
|
2023-09-14 17:50:16 -04:00
|
|
|
objectAPI, _ := validateAdminReq(ctx, w, r, policy.EnableGroupAdminAction)
|
2019-11-09 12:27:23 -05:00
|
|
|
if objectAPI == nil {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
vars := mux.Vars(r)
|
|
|
|
group := vars["group"]
|
|
|
|
status := vars["status"]
|
|
|
|
|
2022-07-01 16:19:13 -04:00
|
|
|
var (
|
|
|
|
err error
|
|
|
|
updatedAt time.Time
|
|
|
|
)
|
2021-11-16 12:28:29 -05:00
|
|
|
switch status {
|
|
|
|
case statusEnabled:
|
2022-07-01 16:19:13 -04:00
|
|
|
updatedAt, err = globalIAMSys.SetGroupStatus(ctx, group, true)
|
2021-11-16 12:28:29 -05:00
|
|
|
case statusDisabled:
|
2022-07-01 16:19:13 -04:00
|
|
|
updatedAt, err = globalIAMSys.SetGroupStatus(ctx, group, false)
|
2021-11-16 12:28:29 -05:00
|
|
|
default:
|
2019-11-09 12:27:23 -05:00
|
|
|
err = errInvalidArgument
|
|
|
|
}
|
|
|
|
if err != nil {
|
|
|
|
writeErrorResponseJSON(ctx, w, toAdminAPIErr(ctx, err), r.URL)
|
|
|
|
return
|
|
|
|
}
|
2022-01-19 23:02:24 -05:00
|
|
|
|
2023-01-26 14:11:54 -05:00
|
|
|
logger.LogIf(ctx, globalSiteReplicationSys.IAMChangeHook(ctx, madmin.SRIAMItem{
|
2022-01-19 23:02:24 -05:00
|
|
|
Type: madmin.SRIAMItemGroupInfo,
|
|
|
|
GroupInfo: &madmin.SRGroupInfo{
|
|
|
|
UpdateReq: madmin.GroupAddRemove{
|
|
|
|
Group: group,
|
|
|
|
Status: madmin.GroupStatus(status),
|
|
|
|
IsRemove: false,
|
|
|
|
},
|
|
|
|
},
|
2022-07-01 16:19:13 -04:00
|
|
|
UpdatedAt: updatedAt,
|
2023-01-26 14:11:54 -05:00
|
|
|
}))
|
2019-11-09 12:27:23 -05:00
|
|
|
}
|
|
|
|
|
2020-04-07 22:30:59 -04:00
|
|
|
// SetUserStatus - PUT /minio/admin/v3/set-user-status?accessKey=<access_key>&status=[enabled|disabled]
|
2019-11-09 12:27:23 -05:00
|
|
|
func (a adminAPIHandlers) SetUserStatus(w http.ResponseWriter, r *http.Request) {
|
2023-07-13 17:52:21 -04:00
|
|
|
ctx := r.Context()
|
2020-05-11 13:34:08 -04:00
|
|
|
|
2023-09-14 17:50:16 -04:00
|
|
|
objectAPI, creds := validateAdminReq(ctx, w, r, policy.EnableUserAdminAction)
|
2019-11-09 12:27:23 -05:00
|
|
|
if objectAPI == nil {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
vars := mux.Vars(r)
|
|
|
|
accessKey := vars["accessKey"]
|
|
|
|
status := vars["status"]
|
|
|
|
|
2023-04-28 15:24:14 -04:00
|
|
|
// you cannot enable or disable yourself.
|
|
|
|
if accessKey == creds.AccessKey {
|
|
|
|
writeErrorResponseJSON(ctx, w, toAdminAPIErr(ctx, errInvalidArgument), r.URL)
|
2019-11-09 12:27:23 -05:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2022-07-01 16:19:13 -04:00
|
|
|
updatedAt, err := globalIAMSys.SetUserStatus(ctx, accessKey, madmin.AccountStatus(status))
|
|
|
|
if err != nil {
|
2019-11-09 12:27:23 -05:00
|
|
|
writeErrorResponseJSON(ctx, w, toAdminAPIErr(ctx, err), r.URL)
|
|
|
|
return
|
|
|
|
}
|
2022-01-19 23:02:24 -05:00
|
|
|
|
2023-01-26 14:11:54 -05:00
|
|
|
logger.LogIf(ctx, globalSiteReplicationSys.IAMChangeHook(ctx, madmin.SRIAMItem{
|
2022-01-19 23:02:24 -05:00
|
|
|
Type: madmin.SRIAMItemIAMUser,
|
|
|
|
IAMUser: &madmin.SRIAMUser{
|
|
|
|
AccessKey: accessKey,
|
|
|
|
IsDeleteReq: false,
|
|
|
|
UserReq: &madmin.AddOrUpdateUserReq{
|
|
|
|
Status: madmin.AccountStatus(status),
|
|
|
|
},
|
|
|
|
},
|
2022-07-01 16:19:13 -04:00
|
|
|
UpdatedAt: updatedAt,
|
2023-01-26 14:11:54 -05:00
|
|
|
}))
|
2019-11-09 12:27:23 -05:00
|
|
|
}
|
|
|
|
|
2020-04-07 22:30:59 -04:00
|
|
|
// AddUser - PUT /minio/admin/v3/add-user?accessKey=<access_key>
|
2019-11-09 12:27:23 -05:00
|
|
|
func (a adminAPIHandlers) AddUser(w http.ResponseWriter, r *http.Request) {
|
2023-07-13 17:52:21 -04:00
|
|
|
ctx := r.Context()
|
2020-05-11 13:34:08 -04:00
|
|
|
|
2020-11-27 20:23:57 -05:00
|
|
|
vars := mux.Vars(r)
|
2021-04-15 19:32:13 -04:00
|
|
|
accessKey := vars["accessKey"]
|
2020-11-27 20:23:57 -05:00
|
|
|
|
|
|
|
// Get current object layer instance.
|
|
|
|
objectAPI := newObjectLayerFn()
|
|
|
|
if objectAPI == nil || globalNotificationSys == nil {
|
|
|
|
writeErrorResponseJSON(ctx, w, errorCodes.ToAPIErr(ErrServerNotInitialized), r.URL)
|
2019-11-09 12:27:23 -05:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2023-02-06 12:27:29 -05:00
|
|
|
cred, owner, s3Err := validateAdminSignature(ctx, r, "")
|
2020-11-27 20:23:57 -05:00
|
|
|
if s3Err != ErrNone {
|
|
|
|
writeErrorResponseJSON(ctx, w, errorCodes.ToAPIErr(s3Err), r.URL)
|
|
|
|
return
|
|
|
|
}
|
2019-11-09 12:27:23 -05:00
|
|
|
|
2020-12-19 16:24:21 -05:00
|
|
|
// Not allowed to add a user with same access key as root credential
|
2023-03-13 15:46:17 -04:00
|
|
|
if accessKey == globalActiveCred.AccessKey {
|
2020-12-19 16:24:21 -05:00
|
|
|
writeErrorResponseJSON(ctx, w, errorCodes.ToAPIErr(ErrAddUserInvalidArgument), r.URL)
|
2020-11-27 20:23:57 -05:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2022-07-01 16:19:13 -04:00
|
|
|
user, exists := globalIAMSys.GetUser(ctx, accessKey)
|
|
|
|
if exists && (user.Credentials.IsTemp() || user.Credentials.IsServiceAccount()) {
|
2021-12-09 20:48:51 -05:00
|
|
|
// Updating STS credential is not allowed, and this API does not
|
|
|
|
// support updating service accounts.
|
|
|
|
writeErrorResponseJSON(ctx, w, errorCodes.ToAPIErr(ErrAddUserInvalidArgument), r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2020-12-19 16:24:21 -05:00
|
|
|
if (cred.IsTemp() || cred.IsServiceAccount()) && cred.ParentUser == accessKey {
|
|
|
|
// Incoming access key matches parent user then we should
|
|
|
|
// reject password change requests.
|
2019-11-09 12:27:23 -05:00
|
|
|
writeErrorResponseJSON(ctx, w, errorCodes.ToAPIErr(ErrAddUserInvalidArgument), r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2022-05-02 12:27:35 -04:00
|
|
|
// Check if accessKey has beginning and end space characters, this only applies to new users.
|
|
|
|
if !exists && hasSpaceBE(accessKey) {
|
|
|
|
writeErrorResponseJSON(ctx, w, errorCodes.ToAPIErr(ErrAdminResourceInvalidArgument), r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2021-12-09 20:48:51 -05:00
|
|
|
checkDenyOnly := false
|
|
|
|
if accessKey == cred.AccessKey {
|
|
|
|
// Check that there is no explicit deny - otherwise it's allowed
|
|
|
|
// to change one's own password.
|
|
|
|
checkDenyOnly = true
|
2020-11-27 20:23:57 -05:00
|
|
|
}
|
|
|
|
|
2023-09-14 17:50:16 -04:00
|
|
|
if !globalIAMSys.IsAllowed(policy.Args{
|
2021-12-09 20:48:51 -05:00
|
|
|
AccountName: cred.AccessKey,
|
2021-03-23 18:15:51 -04:00
|
|
|
Groups: cred.Groups,
|
2023-09-14 17:50:16 -04:00
|
|
|
Action: policy.CreateUserAdminAction,
|
2023-02-06 12:27:29 -05:00
|
|
|
ConditionValues: getConditionValues(r, "", cred),
|
2021-03-02 20:02:29 -05:00
|
|
|
IsOwner: owner,
|
2023-02-06 12:27:29 -05:00
|
|
|
Claims: cred.Claims,
|
2021-12-09 20:48:51 -05:00
|
|
|
DenyOnly: checkDenyOnly,
|
2021-03-02 18:35:50 -05:00
|
|
|
}) {
|
|
|
|
writeErrorResponseJSON(ctx, w, errorCodes.ToAPIErr(ErrAccessDenied), r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2019-11-09 12:27:23 -05:00
|
|
|
if r.ContentLength > maxEConfigJSONSize || r.ContentLength == -1 {
|
|
|
|
// More than maxConfigSize bytes were available
|
|
|
|
writeErrorResponseJSON(ctx, w, errorCodes.ToAPIErr(ErrAdminConfigTooLarge), r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2019-11-19 05:03:18 -05:00
|
|
|
password := cred.SecretKey
|
2019-11-09 12:27:23 -05:00
|
|
|
configBytes, err := madmin.DecryptData(password, io.LimitReader(r.Body, r.ContentLength))
|
|
|
|
if err != nil {
|
|
|
|
logger.LogIf(ctx, err)
|
|
|
|
writeErrorResponseJSON(ctx, w, errorCodes.ToAPIErr(ErrAdminConfigBadJSON), r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2021-12-23 12:21:21 -05:00
|
|
|
var ureq madmin.AddOrUpdateUserReq
|
|
|
|
if err = json.Unmarshal(configBytes, &ureq); err != nil {
|
2019-11-09 12:27:23 -05:00
|
|
|
logger.LogIf(ctx, err)
|
|
|
|
writeErrorResponseJSON(ctx, w, errorCodes.ToAPIErr(ErrAdminConfigBadJSON), r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2022-07-01 16:19:13 -04:00
|
|
|
updatedAt, err := globalIAMSys.CreateUser(ctx, accessKey, ureq)
|
|
|
|
if err != nil {
|
2019-11-09 12:27:23 -05:00
|
|
|
writeErrorResponseJSON(ctx, w, toAdminAPIErr(ctx, err), r.URL)
|
|
|
|
return
|
|
|
|
}
|
2022-01-06 18:52:43 -05:00
|
|
|
|
2023-01-26 14:11:54 -05:00
|
|
|
logger.LogIf(ctx, globalSiteReplicationSys.IAMChangeHook(ctx, madmin.SRIAMItem{
|
2022-01-06 18:52:43 -05:00
|
|
|
Type: madmin.SRIAMItemIAMUser,
|
|
|
|
IAMUser: &madmin.SRIAMUser{
|
|
|
|
AccessKey: accessKey,
|
|
|
|
IsDeleteReq: false,
|
|
|
|
UserReq: &ureq,
|
|
|
|
},
|
2022-07-01 16:19:13 -04:00
|
|
|
UpdatedAt: updatedAt,
|
2023-01-26 14:11:54 -05:00
|
|
|
}))
|
2019-11-09 12:27:23 -05:00
|
|
|
}
|
|
|
|
|
2022-12-13 11:38:50 -05:00
|
|
|
// TemporaryAccountInfo - GET /minio/admin/v3/temporary-account-info
|
|
|
|
func (a adminAPIHandlers) TemporaryAccountInfo(w http.ResponseWriter, r *http.Request) {
|
2023-07-13 17:52:21 -04:00
|
|
|
ctx := r.Context()
|
2022-12-13 11:38:50 -05:00
|
|
|
|
|
|
|
// Get current object layer instance.
|
|
|
|
objectAPI := newObjectLayerFn()
|
|
|
|
if objectAPI == nil || globalNotificationSys == nil {
|
|
|
|
writeErrorResponseJSON(ctx, w, errorCodes.ToAPIErr(ErrServerNotInitialized), r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2023-02-06 12:27:29 -05:00
|
|
|
cred, owner, s3Err := validateAdminSignature(ctx, r, "")
|
2022-12-13 11:38:50 -05:00
|
|
|
if s3Err != ErrNone {
|
|
|
|
writeErrorResponseJSON(ctx, w, errorCodes.ToAPIErr(s3Err), r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
accessKey := mux.Vars(r)["accessKey"]
|
|
|
|
if accessKey == "" {
|
|
|
|
writeErrorResponseJSON(ctx, w, errorCodes.ToAPIErr(ErrInvalidRequest), r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2023-11-29 19:07:35 -05:00
|
|
|
args := policy.Args{
|
2022-12-13 11:38:50 -05:00
|
|
|
AccountName: cred.AccessKey,
|
2023-02-06 12:27:29 -05:00
|
|
|
Groups: cred.Groups,
|
2023-09-14 17:50:16 -04:00
|
|
|
Action: policy.ListTemporaryAccountsAdminAction,
|
2023-02-06 12:27:29 -05:00
|
|
|
ConditionValues: getConditionValues(r, "", cred),
|
2022-12-13 11:38:50 -05:00
|
|
|
IsOwner: owner,
|
2023-02-06 12:27:29 -05:00
|
|
|
Claims: cred.Claims,
|
2023-11-29 19:07:35 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
if !globalIAMSys.IsAllowed(args) {
|
2022-12-13 11:38:50 -05:00
|
|
|
writeErrorResponseJSON(ctx, w, errorCodes.ToAPIErr(ErrAccessDenied), r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2023-09-14 17:50:16 -04:00
|
|
|
stsAccount, sessionPolicy, err := globalIAMSys.GetTemporaryAccount(ctx, accessKey)
|
2022-12-13 11:38:50 -05:00
|
|
|
if err != nil {
|
|
|
|
writeErrorResponseJSON(ctx, w, toAdminAPIErr(ctx, err), r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2023-09-14 17:50:16 -04:00
|
|
|
var stsAccountPolicy policy.Policy
|
2022-12-13 11:38:50 -05:00
|
|
|
|
2023-09-14 17:50:16 -04:00
|
|
|
if sessionPolicy != nil {
|
|
|
|
stsAccountPolicy = *sessionPolicy
|
2022-12-13 11:38:50 -05:00
|
|
|
} else {
|
2023-11-29 19:07:35 -05:00
|
|
|
policiesNames, err := globalIAMSys.PolicyDBGet(stsAccount.ParentUser, stsAccount.Groups...)
|
2022-12-13 11:38:50 -05:00
|
|
|
if err != nil {
|
|
|
|
writeErrorResponseJSON(ctx, w, toAdminAPIErr(ctx, err), r.URL)
|
|
|
|
return
|
|
|
|
}
|
2023-11-29 19:07:35 -05:00
|
|
|
if len(policiesNames) == 0 {
|
|
|
|
policySet, _ := args.GetPolicies(iamPolicyClaimNameOpenID())
|
|
|
|
policiesNames = policySet.ToSlice()
|
|
|
|
}
|
|
|
|
|
2022-12-13 11:38:50 -05:00
|
|
|
stsAccountPolicy = globalIAMSys.GetCombinedPolicy(policiesNames...)
|
|
|
|
}
|
|
|
|
|
|
|
|
policyJSON, err := json.MarshalIndent(stsAccountPolicy, "", " ")
|
|
|
|
if err != nil {
|
|
|
|
writeErrorResponseJSON(ctx, w, toAdminAPIErr(ctx, err), r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
infoResp := madmin.TemporaryAccountInfoResp{
|
|
|
|
ParentUser: stsAccount.ParentUser,
|
|
|
|
AccountStatus: stsAccount.Status,
|
2023-09-14 17:50:16 -04:00
|
|
|
ImpliedPolicy: sessionPolicy == nil,
|
2022-12-13 11:38:50 -05:00
|
|
|
Policy: string(policyJSON),
|
2023-03-22 19:47:02 -04:00
|
|
|
Expiration: &stsAccount.Expiration,
|
2022-12-13 11:38:50 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
data, err := json.Marshal(infoResp)
|
|
|
|
if err != nil {
|
|
|
|
writeErrorResponseJSON(ctx, w, toAdminAPIErr(ctx, err), r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
encryptedData, err := madmin.EncryptData(cred.SecretKey, data)
|
|
|
|
if err != nil {
|
|
|
|
writeErrorResponseJSON(ctx, w, toAdminAPIErr(ctx, err), r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
writeSuccessResponseJSON(w, encryptedData)
|
|
|
|
}
|
|
|
|
|
2020-04-14 14:28:56 -04:00
|
|
|
// AddServiceAccount - PUT /minio/admin/v3/add-service-account
|
2020-03-17 13:36:13 -04:00
|
|
|
func (a adminAPIHandlers) AddServiceAccount(w http.ResponseWriter, r *http.Request) {
|
2023-12-15 16:00:43 -05:00
|
|
|
ctx, cred, opts, createReq, targetUser, APIError := commonAddServiceAccount(r)
|
|
|
|
if APIError.Code != "" {
|
|
|
|
writeErrorResponseJSON(ctx, w, APIError, r.URL)
|
2023-05-17 20:05:36 -04:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2021-04-15 01:51:14 -04:00
|
|
|
var (
|
|
|
|
targetGroups []string
|
2023-12-15 16:00:43 -05:00
|
|
|
err error
|
2021-04-15 01:51:14 -04:00
|
|
|
)
|
|
|
|
|
2021-09-20 17:28:19 -04:00
|
|
|
// Find the user for the request sender (as it may be sent via a service
|
|
|
|
// account or STS account):
|
|
|
|
requestorUser := cred.AccessKey
|
|
|
|
requestorParentUser := cred.AccessKey
|
|
|
|
requestorGroups := cred.Groups
|
|
|
|
requestorIsDerivedCredential := false
|
|
|
|
if cred.IsServiceAccount() || cred.IsTemp() {
|
|
|
|
requestorParentUser = cred.ParentUser
|
|
|
|
requestorIsDerivedCredential = true
|
|
|
|
}
|
|
|
|
|
2023-01-23 21:47:18 -05:00
|
|
|
if globalIAMSys.GetUsersSysType() == MinIOUsersSysType && targetUser != cred.AccessKey {
|
|
|
|
// For internal IDP, ensure that the targetUser's parent account exists.
|
|
|
|
// It could be a regular user account or the root account.
|
|
|
|
_, isRegularUser := globalIAMSys.GetUser(ctx, targetUser)
|
|
|
|
if !isRegularUser && targetUser != globalActiveCred.AccessKey {
|
2023-02-20 05:11:47 -05:00
|
|
|
apiErr := toAdminAPIErr(ctx, errNoSuchUser)
|
|
|
|
apiErr.Description = fmt.Sprintf("Specified target user %s does not exist", targetUser)
|
|
|
|
writeErrorResponseJSON(ctx, w, apiErr, r.URL)
|
2023-01-23 21:47:18 -05:00
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-09-20 17:28:19 -04:00
|
|
|
// Check if we are creating svc account for request sender.
|
|
|
|
isSvcAccForRequestor := false
|
|
|
|
if targetUser == requestorUser || targetUser == requestorParentUser {
|
|
|
|
isSvcAccForRequestor = true
|
|
|
|
}
|
2021-04-15 01:51:14 -04:00
|
|
|
|
2021-09-20 17:28:19 -04:00
|
|
|
// If we are creating svc account for request sender, ensure
|
|
|
|
// that targetUser is a real user (i.e. not derived
|
|
|
|
// credentials).
|
|
|
|
if isSvcAccForRequestor {
|
|
|
|
if requestorIsDerivedCredential {
|
|
|
|
if requestorParentUser == "" {
|
|
|
|
writeErrorResponseJSON(ctx, w, toAdminAPIErr(ctx,
|
|
|
|
errors.New("service accounts cannot be generated for temporary credentials without parent")), r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
targetUser = requestorParentUser
|
|
|
|
}
|
|
|
|
targetGroups = requestorGroups
|
|
|
|
|
2021-10-05 14:49:33 -04:00
|
|
|
// In case of LDAP/OIDC we need to set `opts.claims` to ensure
|
|
|
|
// it is associated with the LDAP/OIDC user properly.
|
|
|
|
for k, v := range cred.Claims {
|
|
|
|
if k == expClaim {
|
|
|
|
continue
|
2021-09-20 17:28:19 -04:00
|
|
|
}
|
2021-10-05 14:49:33 -04:00
|
|
|
opts.claims[k] = v
|
2021-09-20 17:28:19 -04:00
|
|
|
}
|
2023-12-15 16:00:43 -05:00
|
|
|
} else if globalIAMSys.LDAPConfig.Enabled() {
|
2021-09-20 17:28:19 -04:00
|
|
|
// In case of LDAP we need to resolve the targetUser to a DN and
|
|
|
|
// query their groups:
|
2023-12-15 16:00:43 -05:00
|
|
|
opts.claims[ldapUserN] = targetUser // simple username
|
|
|
|
targetUser, targetGroups, err = globalIAMSys.LDAPConfig.LookupUserDN(targetUser)
|
|
|
|
if err != nil {
|
|
|
|
writeErrorResponseJSON(ctx, w, toAdminAPIErr(ctx, err), r.URL)
|
|
|
|
return
|
2021-05-13 00:25:07 -04:00
|
|
|
}
|
2023-12-15 16:00:43 -05:00
|
|
|
opts.claims[ldapUser] = targetUser // username DN
|
2021-09-20 17:28:19 -04:00
|
|
|
|
|
|
|
// NOTE: if not using LDAP, then internal IDP or open ID is
|
|
|
|
// being used - in the former, group info is enforced when
|
|
|
|
// generated credentials are used to make requests, and in the
|
|
|
|
// latter, a group notion is not supported.
|
2021-04-15 01:51:14 -04:00
|
|
|
}
|
|
|
|
|
2022-07-01 16:19:13 -04:00
|
|
|
newCred, updatedAt, err := globalIAMSys.NewServiceAccount(ctx, targetUser, targetGroups, opts)
|
2020-03-17 13:36:13 -04:00
|
|
|
if err != nil {
|
|
|
|
writeErrorResponseJSON(ctx, w, toAdminAPIErr(ctx, err), r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2022-05-20 22:09:11 -04:00
|
|
|
createResp := madmin.AddServiceAccountResp{
|
|
|
|
Credentials: madmin.Credentials{
|
2023-02-27 13:10:22 -05:00
|
|
|
AccessKey: newCred.AccessKey,
|
|
|
|
SecretKey: newCred.SecretKey,
|
|
|
|
Expiration: newCred.Expiration,
|
2022-05-20 22:09:11 -04:00
|
|
|
},
|
|
|
|
}
|
|
|
|
|
|
|
|
data, err := json.Marshal(createResp)
|
|
|
|
if err != nil {
|
|
|
|
writeErrorResponseJSON(ctx, w, toAdminAPIErr(ctx, err), r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2023-12-15 16:00:43 -05:00
|
|
|
encryptedData, err := madmin.EncryptData(cred.SecretKey, data)
|
2022-05-20 22:09:11 -04:00
|
|
|
if err != nil {
|
|
|
|
writeErrorResponseJSON(ctx, w, toAdminAPIErr(ctx, err), r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
writeSuccessResponseJSON(w, encryptedData)
|
|
|
|
|
2022-01-06 18:52:43 -05:00
|
|
|
// Call hook for cluster-replication if the service account is not for a
|
|
|
|
// root user.
|
|
|
|
if newCred.ParentUser != globalActiveCred.AccessKey {
|
2023-01-26 14:11:54 -05:00
|
|
|
logger.LogIf(ctx, globalSiteReplicationSys.IAMChangeHook(ctx, madmin.SRIAMItem{
|
2021-10-06 19:36:31 -04:00
|
|
|
Type: madmin.SRIAMItemSvcAcc,
|
|
|
|
SvcAccChange: &madmin.SRSvcAccChange{
|
|
|
|
Create: &madmin.SRSvcAccCreate{
|
|
|
|
Parent: newCred.ParentUser,
|
|
|
|
AccessKey: newCred.AccessKey,
|
|
|
|
SecretKey: newCred.SecretKey,
|
|
|
|
Groups: newCred.Groups,
|
2023-05-17 20:05:36 -04:00
|
|
|
Name: newCred.Name,
|
|
|
|
Description: newCred.Description,
|
2021-10-06 19:36:31 -04:00
|
|
|
Claims: opts.claims,
|
|
|
|
SessionPolicy: createReq.Policy,
|
|
|
|
Status: auth.AccountOn,
|
2023-02-27 13:10:22 -05:00
|
|
|
Expiration: createReq.Expiration,
|
2021-10-06 19:36:31 -04:00
|
|
|
},
|
|
|
|
},
|
2022-07-01 16:19:13 -04:00
|
|
|
UpdatedAt: updatedAt,
|
2023-01-26 14:11:54 -05:00
|
|
|
}))
|
2021-10-06 19:36:31 -04:00
|
|
|
}
|
2020-04-24 15:10:09 -04:00
|
|
|
}
|
|
|
|
|
2021-04-15 01:51:14 -04:00
|
|
|
// UpdateServiceAccount - POST /minio/admin/v3/update-service-account
|
|
|
|
func (a adminAPIHandlers) UpdateServiceAccount(w http.ResponseWriter, r *http.Request) {
|
2023-07-13 17:52:21 -04:00
|
|
|
ctx := r.Context()
|
2021-04-15 01:51:14 -04:00
|
|
|
|
|
|
|
// Get current object layer instance.
|
|
|
|
objectAPI := newObjectLayerFn()
|
|
|
|
if objectAPI == nil || globalNotificationSys == nil {
|
|
|
|
writeErrorResponseJSON(ctx, w, errorCodes.ToAPIErr(ErrServerNotInitialized), r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2023-02-06 12:27:29 -05:00
|
|
|
cred, owner, s3Err := validateAdminSignature(ctx, r, "")
|
2021-04-15 01:51:14 -04:00
|
|
|
if s3Err != ErrNone {
|
|
|
|
writeErrorResponseJSON(ctx, w, errorCodes.ToAPIErr(s3Err), r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
accessKey := mux.Vars(r)["accessKey"]
|
|
|
|
if accessKey == "" {
|
|
|
|
writeErrorResponseJSON(ctx, w, errorCodes.ToAPIErr(ErrInvalidRequest), r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
svcAccount, _, err := globalIAMSys.GetServiceAccount(ctx, accessKey)
|
|
|
|
if err != nil {
|
|
|
|
writeErrorResponseJSON(ctx, w, toAdminAPIErr(ctx, err), r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2024-01-31 13:56:45 -05:00
|
|
|
// Permission checks:
|
|
|
|
//
|
|
|
|
// 1. Any type of account (i.e. access keys (previously/still called service
|
|
|
|
// accounts), STS accounts, internal IDP accounts, etc) with the
|
|
|
|
// policy.UpdateServiceAccountAdminAction permission can update any service
|
|
|
|
// account.
|
|
|
|
//
|
|
|
|
// 2. We would like to let a user update their own access keys, however it
|
|
|
|
// is currently blocked pending a re-design. Users are still able to delete
|
|
|
|
// and re-create them.
|
2023-09-14 17:50:16 -04:00
|
|
|
if !globalIAMSys.IsAllowed(policy.Args{
|
2021-04-15 01:51:14 -04:00
|
|
|
AccountName: cred.AccessKey,
|
2023-02-06 12:27:29 -05:00
|
|
|
Groups: cred.Groups,
|
2023-09-14 17:50:16 -04:00
|
|
|
Action: policy.UpdateServiceAccountAdminAction,
|
2023-02-06 12:27:29 -05:00
|
|
|
ConditionValues: getConditionValues(r, "", cred),
|
2021-04-15 01:51:14 -04:00
|
|
|
IsOwner: owner,
|
2023-02-06 12:27:29 -05:00
|
|
|
Claims: cred.Claims,
|
2021-04-15 01:51:14 -04:00
|
|
|
}) {
|
2024-01-31 13:56:45 -05:00
|
|
|
writeErrorResponseJSON(ctx, w, errorCodes.ToAPIErr(ErrAccessDenied), r.URL)
|
|
|
|
return
|
2021-04-15 01:51:14 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
password := cred.SecretKey
|
|
|
|
reqBytes, err := madmin.DecryptData(password, io.LimitReader(r.Body, r.ContentLength))
|
|
|
|
if err != nil {
|
|
|
|
writeErrorResponseJSON(ctx, w, errorCodes.ToAPIErrWithErr(ErrAdminConfigBadJSON, err), r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
var updateReq madmin.UpdateServiceAccountReq
|
|
|
|
if err = json.Unmarshal(reqBytes, &updateReq); err != nil {
|
|
|
|
writeErrorResponseJSON(ctx, w, errorCodes.ToAPIErrWithErr(ErrAdminConfigBadJSON, err), r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2023-05-17 20:05:36 -04:00
|
|
|
if err := updateReq.Validate(); err != nil {
|
|
|
|
// Since this validation would happen client side as well, we only send
|
|
|
|
// a generic error message here.
|
|
|
|
writeErrorResponseJSON(ctx, w, errorCodes.ToAPIErr(ErrAdminResourceInvalidArgument), r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2023-09-14 17:50:16 -04:00
|
|
|
var sp *policy.Policy
|
2021-05-06 11:52:02 -04:00
|
|
|
if len(updateReq.NewPolicy) > 0 {
|
2023-09-14 17:50:16 -04:00
|
|
|
sp, err = policy.ParseConfig(bytes.NewReader(updateReq.NewPolicy))
|
2021-05-06 11:52:02 -04:00
|
|
|
if err != nil {
|
|
|
|
writeErrorResponseJSON(ctx, w, toAdminAPIErr(ctx, err), r.URL)
|
|
|
|
return
|
|
|
|
}
|
2023-10-31 15:30:36 -04:00
|
|
|
if sp.Version == "" && len(sp.Statements) == 0 {
|
|
|
|
sp = nil
|
|
|
|
}
|
2021-05-06 11:52:02 -04:00
|
|
|
}
|
|
|
|
opts := updateServiceAccountOpts{
|
|
|
|
secretKey: updateReq.NewSecretKey,
|
|
|
|
status: updateReq.NewStatus,
|
2023-05-17 20:05:36 -04:00
|
|
|
name: updateReq.NewName,
|
|
|
|
description: updateReq.NewDescription,
|
2023-02-27 13:10:22 -05:00
|
|
|
expiration: updateReq.NewExpiration,
|
2021-05-06 11:52:02 -04:00
|
|
|
sessionPolicy: sp,
|
|
|
|
}
|
2022-07-01 16:19:13 -04:00
|
|
|
updatedAt, err := globalIAMSys.UpdateServiceAccount(ctx, accessKey, opts)
|
2021-04-15 01:51:14 -04:00
|
|
|
if err != nil {
|
|
|
|
writeErrorResponseJSON(ctx, w, toAdminAPIErr(ctx, err), r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2022-01-07 20:41:43 -05:00
|
|
|
// Call site replication hook - non-root user accounts are replicated.
|
|
|
|
if svcAccount.ParentUser != globalActiveCred.AccessKey {
|
2023-01-26 14:11:54 -05:00
|
|
|
logger.LogIf(ctx, globalSiteReplicationSys.IAMChangeHook(ctx, madmin.SRIAMItem{
|
2021-10-06 19:36:31 -04:00
|
|
|
Type: madmin.SRIAMItemSvcAcc,
|
|
|
|
SvcAccChange: &madmin.SRSvcAccChange{
|
|
|
|
Update: &madmin.SRSvcAccUpdate{
|
|
|
|
AccessKey: accessKey,
|
|
|
|
SecretKey: opts.secretKey,
|
|
|
|
Status: opts.status,
|
2023-05-17 20:05:36 -04:00
|
|
|
Name: opts.name,
|
|
|
|
Description: opts.description,
|
2021-10-06 19:36:31 -04:00
|
|
|
SessionPolicy: updateReq.NewPolicy,
|
2023-02-27 13:10:22 -05:00
|
|
|
Expiration: updateReq.NewExpiration,
|
2021-10-06 19:36:31 -04:00
|
|
|
},
|
|
|
|
},
|
2022-07-01 16:19:13 -04:00
|
|
|
UpdatedAt: updatedAt,
|
2023-01-26 14:11:54 -05:00
|
|
|
}))
|
2021-10-06 19:36:31 -04:00
|
|
|
}
|
2022-01-07 20:41:43 -05:00
|
|
|
|
2021-04-15 01:51:14 -04:00
|
|
|
writeSuccessNoContent(w)
|
|
|
|
}
|
|
|
|
|
|
|
|
// InfoServiceAccount - GET /minio/admin/v3/info-service-account
|
|
|
|
func (a adminAPIHandlers) InfoServiceAccount(w http.ResponseWriter, r *http.Request) {
|
2023-07-13 17:52:21 -04:00
|
|
|
ctx := r.Context()
|
2021-04-15 01:51:14 -04:00
|
|
|
|
|
|
|
// Get current object layer instance.
|
|
|
|
objectAPI := newObjectLayerFn()
|
|
|
|
if objectAPI == nil || globalNotificationSys == nil {
|
|
|
|
writeErrorResponseJSON(ctx, w, errorCodes.ToAPIErr(ErrServerNotInitialized), r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2023-02-06 12:27:29 -05:00
|
|
|
cred, owner, s3Err := validateAdminSignature(ctx, r, "")
|
2021-04-15 01:51:14 -04:00
|
|
|
if s3Err != ErrNone {
|
|
|
|
writeErrorResponseJSON(ctx, w, errorCodes.ToAPIErr(s3Err), r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
accessKey := mux.Vars(r)["accessKey"]
|
|
|
|
if accessKey == "" {
|
|
|
|
writeErrorResponseJSON(ctx, w, errorCodes.ToAPIErr(ErrInvalidRequest), r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2023-09-14 17:50:16 -04:00
|
|
|
svcAccount, sessionPolicy, err := globalIAMSys.GetServiceAccount(ctx, accessKey)
|
2021-04-15 01:51:14 -04:00
|
|
|
if err != nil {
|
|
|
|
writeErrorResponseJSON(ctx, w, toAdminAPIErr(ctx, err), r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2023-09-14 17:50:16 -04:00
|
|
|
if !globalIAMSys.IsAllowed(policy.Args{
|
2021-04-15 01:51:14 -04:00
|
|
|
AccountName: cred.AccessKey,
|
2023-02-06 12:27:29 -05:00
|
|
|
Groups: cred.Groups,
|
2023-09-14 17:50:16 -04:00
|
|
|
Action: policy.ListServiceAccountsAdminAction,
|
2023-02-06 12:27:29 -05:00
|
|
|
ConditionValues: getConditionValues(r, "", cred),
|
2021-04-15 01:51:14 -04:00
|
|
|
IsOwner: owner,
|
2023-02-06 12:27:29 -05:00
|
|
|
Claims: cred.Claims,
|
2021-04-15 01:51:14 -04:00
|
|
|
}) {
|
|
|
|
requestUser := cred.AccessKey
|
|
|
|
if cred.ParentUser != "" {
|
|
|
|
requestUser = cred.ParentUser
|
|
|
|
}
|
|
|
|
|
|
|
|
if requestUser != svcAccount.ParentUser {
|
|
|
|
writeErrorResponseJSON(ctx, w, errorCodes.ToAPIErr(ErrAccessDenied), r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2023-10-31 15:30:36 -04:00
|
|
|
// if session policy is nil or empty, then it is implied policy
|
|
|
|
impliedPolicy := sessionPolicy == nil || (sessionPolicy.Version == "" && len(sessionPolicy.Statements) == 0)
|
|
|
|
|
2023-09-14 17:50:16 -04:00
|
|
|
var svcAccountPolicy policy.Policy
|
2021-04-15 01:51:14 -04:00
|
|
|
|
2023-10-31 15:30:36 -04:00
|
|
|
if !impliedPolicy {
|
2023-09-14 17:50:16 -04:00
|
|
|
svcAccountPolicy = *sessionPolicy
|
2021-04-15 01:51:14 -04:00
|
|
|
} else {
|
2023-11-29 19:07:35 -05:00
|
|
|
policiesNames, err := globalIAMSys.PolicyDBGet(svcAccount.ParentUser, svcAccount.Groups...)
|
2021-04-15 01:51:14 -04:00
|
|
|
if err != nil {
|
|
|
|
writeErrorResponseJSON(ctx, w, toAdminAPIErr(ctx, err), r.URL)
|
|
|
|
return
|
|
|
|
}
|
2022-01-10 17:26:26 -05:00
|
|
|
svcAccountPolicy = globalIAMSys.GetCombinedPolicy(policiesNames...)
|
2021-04-15 01:51:14 -04:00
|
|
|
}
|
|
|
|
|
2021-05-29 12:22:22 -04:00
|
|
|
policyJSON, err := json.MarshalIndent(svcAccountPolicy, "", " ")
|
2021-04-15 01:51:14 -04:00
|
|
|
if err != nil {
|
|
|
|
writeErrorResponseJSON(ctx, w, toAdminAPIErr(ctx, err), r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2023-02-27 13:10:22 -05:00
|
|
|
var expiration *time.Time
|
|
|
|
if !svcAccount.Expiration.IsZero() && !svcAccount.Expiration.Equal(timeSentinel) {
|
|
|
|
expiration = &svcAccount.Expiration
|
|
|
|
}
|
|
|
|
|
2022-01-02 12:15:06 -05:00
|
|
|
infoResp := madmin.InfoServiceAccountResp{
|
2021-04-15 01:51:14 -04:00
|
|
|
ParentUser: svcAccount.ParentUser,
|
2023-05-17 20:05:36 -04:00
|
|
|
Name: svcAccount.Name,
|
|
|
|
Description: svcAccount.Description,
|
2021-04-15 01:51:14 -04:00
|
|
|
AccountStatus: svcAccount.Status,
|
2023-10-31 15:30:36 -04:00
|
|
|
ImpliedPolicy: impliedPolicy,
|
2021-04-15 01:51:14 -04:00
|
|
|
Policy: string(policyJSON),
|
2023-02-27 13:10:22 -05:00
|
|
|
Expiration: expiration,
|
2021-04-15 01:51:14 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
data, err := json.Marshal(infoResp)
|
|
|
|
if err != nil {
|
|
|
|
writeErrorResponseJSON(ctx, w, toAdminAPIErr(ctx, err), r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
encryptedData, err := madmin.EncryptData(cred.SecretKey, data)
|
|
|
|
if err != nil {
|
|
|
|
writeErrorResponseJSON(ctx, w, toAdminAPIErr(ctx, err), r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
writeSuccessResponseJSON(w, encryptedData)
|
|
|
|
}
|
|
|
|
|
2020-04-24 15:10:09 -04:00
|
|
|
// ListServiceAccounts - GET /minio/admin/v3/list-service-accounts
|
|
|
|
func (a adminAPIHandlers) ListServiceAccounts(w http.ResponseWriter, r *http.Request) {
|
2023-07-13 17:52:21 -04:00
|
|
|
ctx := r.Context()
|
2020-05-11 13:34:08 -04:00
|
|
|
|
2020-04-24 15:10:09 -04:00
|
|
|
// Get current object layer instance.
|
2020-10-09 12:59:52 -04:00
|
|
|
objectAPI := newObjectLayerFn()
|
2020-10-19 12:54:40 -04:00
|
|
|
if objectAPI == nil || globalNotificationSys == nil {
|
2020-04-24 15:10:09 -04:00
|
|
|
writeErrorResponseJSON(ctx, w, errorCodes.ToAPIErr(ErrServerNotInitialized), r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2023-02-06 12:27:29 -05:00
|
|
|
cred, owner, s3Err := validateAdminSignature(ctx, r, "")
|
2020-04-24 15:10:09 -04:00
|
|
|
if s3Err != ErrNone {
|
|
|
|
writeErrorResponseJSON(ctx, w, errorCodes.ToAPIErr(s3Err), r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2021-04-15 01:51:14 -04:00
|
|
|
var targetAccount string
|
|
|
|
|
2021-11-19 15:35:35 -05:00
|
|
|
// If listing is requested for a specific user (who is not the request
|
|
|
|
// sender), check that the user has permissions.
|
2021-08-08 01:43:01 -04:00
|
|
|
user := r.Form.Get("user")
|
2021-11-19 15:35:35 -05:00
|
|
|
if user != "" && user != cred.AccessKey {
|
2023-09-14 17:50:16 -04:00
|
|
|
if !globalIAMSys.IsAllowed(policy.Args{
|
2021-04-15 01:51:14 -04:00
|
|
|
AccountName: cred.AccessKey,
|
2023-02-06 12:27:29 -05:00
|
|
|
Groups: cred.Groups,
|
2023-09-14 17:50:16 -04:00
|
|
|
Action: policy.ListServiceAccountsAdminAction,
|
2023-02-06 12:27:29 -05:00
|
|
|
ConditionValues: getConditionValues(r, "", cred),
|
2021-04-15 01:51:14 -04:00
|
|
|
IsOwner: owner,
|
2023-02-06 12:27:29 -05:00
|
|
|
Claims: cred.Claims,
|
2021-04-15 01:51:14 -04:00
|
|
|
}) {
|
|
|
|
writeErrorResponseJSON(ctx, w, errorCodes.ToAPIErr(ErrAccessDenied), r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
targetAccount = user
|
|
|
|
} else {
|
|
|
|
targetAccount = cred.AccessKey
|
|
|
|
if cred.ParentUser != "" {
|
|
|
|
targetAccount = cred.ParentUser
|
|
|
|
}
|
2020-05-01 11:05:14 -04:00
|
|
|
}
|
|
|
|
|
2021-04-15 01:51:14 -04:00
|
|
|
serviceAccounts, err := globalIAMSys.ListServiceAccounts(ctx, targetAccount)
|
2020-04-24 15:10:09 -04:00
|
|
|
if err != nil {
|
|
|
|
writeErrorResponseJSON(ctx, w, toAdminAPIErr(ctx, err), r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2023-06-02 19:17:26 -04:00
|
|
|
var serviceAccountList []madmin.ServiceAccountInfo
|
2021-04-15 01:51:14 -04:00
|
|
|
|
|
|
|
for _, svc := range serviceAccounts {
|
2023-06-02 19:17:26 -04:00
|
|
|
expiryTime := svc.Expiration
|
|
|
|
serviceAccountList = append(serviceAccountList, madmin.ServiceAccountInfo{
|
|
|
|
AccessKey: svc.AccessKey,
|
|
|
|
Expiration: &expiryTime,
|
|
|
|
})
|
2021-04-15 01:51:14 -04:00
|
|
|
}
|
|
|
|
|
2022-01-02 12:15:06 -05:00
|
|
|
listResp := madmin.ListServiceAccountsResp{
|
2023-06-02 19:17:26 -04:00
|
|
|
Accounts: serviceAccountList,
|
2020-04-24 15:10:09 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
data, err := json.Marshal(listResp)
|
|
|
|
if err != nil {
|
|
|
|
writeErrorResponseJSON(ctx, w, toAdminAPIErr(ctx, err), r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
encryptedData, err := madmin.EncryptData(cred.SecretKey, data)
|
|
|
|
if err != nil {
|
|
|
|
writeErrorResponseJSON(ctx, w, toAdminAPIErr(ctx, err), r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
writeSuccessResponseJSON(w, encryptedData)
|
|
|
|
}
|
|
|
|
|
|
|
|
// DeleteServiceAccount - DELETE /minio/admin/v3/delete-service-account
|
|
|
|
func (a adminAPIHandlers) DeleteServiceAccount(w http.ResponseWriter, r *http.Request) {
|
2023-07-13 17:52:21 -04:00
|
|
|
ctx := r.Context()
|
2020-05-11 13:34:08 -04:00
|
|
|
|
2020-04-24 15:10:09 -04:00
|
|
|
// Get current object layer instance.
|
2020-10-09 12:59:52 -04:00
|
|
|
objectAPI := newObjectLayerFn()
|
2020-10-19 12:54:40 -04:00
|
|
|
if objectAPI == nil || globalNotificationSys == nil {
|
2020-04-24 15:10:09 -04:00
|
|
|
writeErrorResponseJSON(ctx, w, errorCodes.ToAPIErr(ErrServerNotInitialized), r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2023-02-06 12:27:29 -05:00
|
|
|
cred, owner, s3Err := validateAdminSignature(ctx, r, "")
|
2020-04-24 15:10:09 -04:00
|
|
|
if s3Err != ErrNone {
|
|
|
|
writeErrorResponseJSON(ctx, w, errorCodes.ToAPIErr(s3Err), r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
serviceAccount := mux.Vars(r)["accessKey"]
|
|
|
|
if serviceAccount == "" {
|
|
|
|
writeErrorResponseJSON(ctx, w, errorCodes.ToAPIErr(ErrAdminInvalidArgument), r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2022-05-02 20:56:19 -04:00
|
|
|
// We do not care if service account is readable or not at this point,
|
|
|
|
// since this is a delete call we shall allow it to be deleted if possible.
|
2023-10-08 15:13:18 -04:00
|
|
|
svcAccount, _, err := globalIAMSys.GetServiceAccount(ctx, serviceAccount)
|
|
|
|
if errors.Is(err, errNoSuchServiceAccount) {
|
|
|
|
writeErrorResponseJSON(ctx, w, errorCodes.ToAPIErr(ErrAdminServiceAccountNotFound), r.URL)
|
|
|
|
return
|
|
|
|
}
|
2020-04-24 15:10:09 -04:00
|
|
|
|
2023-09-14 17:50:16 -04:00
|
|
|
adminPrivilege := globalIAMSys.IsAllowed(policy.Args{
|
2021-04-15 01:51:14 -04:00
|
|
|
AccountName: cred.AccessKey,
|
2023-02-06 12:27:29 -05:00
|
|
|
Groups: cred.Groups,
|
2023-09-14 17:50:16 -04:00
|
|
|
Action: policy.RemoveServiceAccountAdminAction,
|
2023-02-06 12:27:29 -05:00
|
|
|
ConditionValues: getConditionValues(r, "", cred),
|
2021-04-15 01:51:14 -04:00
|
|
|
IsOwner: owner,
|
2023-02-06 12:27:29 -05:00
|
|
|
Claims: cred.Claims,
|
2021-04-15 01:51:14 -04:00
|
|
|
})
|
2020-05-01 11:05:14 -04:00
|
|
|
|
2021-04-15 01:51:14 -04:00
|
|
|
if !adminPrivilege {
|
|
|
|
parentUser := cred.AccessKey
|
|
|
|
if cred.ParentUser != "" {
|
|
|
|
parentUser = cred.ParentUser
|
|
|
|
}
|
2022-05-02 20:56:19 -04:00
|
|
|
if svcAccount.ParentUser != "" && parentUser != svcAccount.ParentUser {
|
2021-04-15 01:51:14 -04:00
|
|
|
// The service account belongs to another user but return not
|
|
|
|
// found error to mitigate brute force attacks. or the
|
|
|
|
// serviceAccount doesn't exist.
|
|
|
|
writeErrorResponseJSON(ctx, w, errorCodes.ToAPIErr(ErrAdminServiceAccountNotFound), r.URL)
|
|
|
|
return
|
|
|
|
}
|
2020-04-24 15:10:09 -04:00
|
|
|
}
|
|
|
|
|
2022-05-02 20:56:19 -04:00
|
|
|
if err := globalIAMSys.DeleteServiceAccount(ctx, serviceAccount, true); err != nil {
|
2020-04-24 15:10:09 -04:00
|
|
|
writeErrorResponseJSON(ctx, w, toAdminAPIErr(ctx, err), r.URL)
|
|
|
|
return
|
|
|
|
}
|
2021-07-15 00:28:53 -04:00
|
|
|
|
2022-01-07 20:41:43 -05:00
|
|
|
// Call site replication hook - non-root user accounts are replicated.
|
2022-05-02 20:56:19 -04:00
|
|
|
if svcAccount.ParentUser != "" && svcAccount.ParentUser != globalActiveCred.AccessKey {
|
2023-01-26 14:11:54 -05:00
|
|
|
logger.LogIf(ctx, globalSiteReplicationSys.IAMChangeHook(ctx, madmin.SRIAMItem{
|
2021-10-06 19:36:31 -04:00
|
|
|
Type: madmin.SRIAMItemSvcAcc,
|
|
|
|
SvcAccChange: &madmin.SRSvcAccChange{
|
|
|
|
Delete: &madmin.SRSvcAccDelete{
|
|
|
|
AccessKey: serviceAccount,
|
|
|
|
},
|
|
|
|
},
|
2022-07-01 16:19:13 -04:00
|
|
|
UpdatedAt: UTCNow(),
|
2023-01-26 14:11:54 -05:00
|
|
|
}))
|
2021-10-06 19:36:31 -04:00
|
|
|
}
|
|
|
|
|
2020-04-24 15:10:09 -04:00
|
|
|
writeSuccessNoContent(w)
|
2020-03-17 13:36:13 -04:00
|
|
|
}
|
|
|
|
|
2023-09-19 01:13:03 -04:00
|
|
|
// AccountInfoHandler returns usage, permissions and other bucket metadata for incoming us
|
2020-11-27 20:23:57 -05:00
|
|
|
func (a adminAPIHandlers) AccountInfoHandler(w http.ResponseWriter, r *http.Request) {
|
2023-07-13 17:52:21 -04:00
|
|
|
ctx := r.Context()
|
2020-05-15 21:16:45 -04:00
|
|
|
|
|
|
|
// Get current object layer instance.
|
2020-10-09 12:59:52 -04:00
|
|
|
objectAPI := newObjectLayerFn()
|
2020-10-19 12:54:40 -04:00
|
|
|
if objectAPI == nil || globalNotificationSys == nil {
|
2020-05-15 21:16:45 -04:00
|
|
|
writeErrorResponseJSON(ctx, w, errorCodes.ToAPIErr(ErrServerNotInitialized), r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2023-02-06 12:27:29 -05:00
|
|
|
cred, owner, s3Err := validateAdminSignature(ctx, r, "")
|
2020-05-15 21:16:45 -04:00
|
|
|
if s3Err != ErrNone {
|
|
|
|
writeErrorResponseJSON(ctx, w, errorCodes.ToAPIErr(s3Err), r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
// Set prefix value for "s3:prefix" policy conditionals.
|
|
|
|
r.Header.Set("prefix", "")
|
|
|
|
|
|
|
|
// Set delimiter value for "s3:delimiter" policy conditionals.
|
|
|
|
r.Header.Set("delimiter", SlashSeparator)
|
|
|
|
|
2021-07-14 11:51:10 -04:00
|
|
|
// Check if we are asked to return prefix usage
|
2021-08-08 01:43:01 -04:00
|
|
|
enablePrefixUsage := r.Form.Get("prefix-usage") == "true"
|
2021-07-14 11:51:10 -04:00
|
|
|
|
2020-05-15 21:16:45 -04:00
|
|
|
isAllowedAccess := func(bucketName string) (rd, wr bool) {
|
2023-09-14 17:50:16 -04:00
|
|
|
if globalIAMSys.IsAllowed(policy.Args{
|
2021-07-11 20:39:52 -04:00
|
|
|
AccountName: cred.AccessKey,
|
2021-03-23 18:15:51 -04:00
|
|
|
Groups: cred.Groups,
|
2023-09-14 17:50:16 -04:00
|
|
|
Action: policy.ListBucketAction,
|
2020-05-15 21:16:45 -04:00
|
|
|
BucketName: bucketName,
|
2023-02-06 12:27:29 -05:00
|
|
|
ConditionValues: getConditionValues(r, "", cred),
|
2020-05-15 21:16:45 -04:00
|
|
|
IsOwner: owner,
|
|
|
|
ObjectName: "",
|
2023-02-06 12:27:29 -05:00
|
|
|
Claims: cred.Claims,
|
2020-05-15 21:16:45 -04:00
|
|
|
}) {
|
|
|
|
rd = true
|
|
|
|
}
|
|
|
|
|
2023-09-14 17:50:16 -04:00
|
|
|
if globalIAMSys.IsAllowed(policy.Args{
|
2022-05-12 13:46:20 -04:00
|
|
|
AccountName: cred.AccessKey,
|
|
|
|
Groups: cred.Groups,
|
2023-09-14 17:50:16 -04:00
|
|
|
Action: policy.GetBucketLocationAction,
|
2022-05-12 13:46:20 -04:00
|
|
|
BucketName: bucketName,
|
2023-02-06 12:27:29 -05:00
|
|
|
ConditionValues: getConditionValues(r, "", cred),
|
2022-05-12 13:46:20 -04:00
|
|
|
IsOwner: owner,
|
|
|
|
ObjectName: "",
|
2023-02-06 12:27:29 -05:00
|
|
|
Claims: cred.Claims,
|
2022-05-12 13:46:20 -04:00
|
|
|
}) {
|
|
|
|
rd = true
|
|
|
|
}
|
|
|
|
|
2023-09-14 17:50:16 -04:00
|
|
|
if globalIAMSys.IsAllowed(policy.Args{
|
2021-07-11 20:39:52 -04:00
|
|
|
AccountName: cred.AccessKey,
|
2021-03-23 18:15:51 -04:00
|
|
|
Groups: cred.Groups,
|
2023-09-14 17:50:16 -04:00
|
|
|
Action: policy.PutObjectAction,
|
2020-05-15 21:16:45 -04:00
|
|
|
BucketName: bucketName,
|
2023-02-06 12:27:29 -05:00
|
|
|
ConditionValues: getConditionValues(r, "", cred),
|
2020-05-15 21:16:45 -04:00
|
|
|
IsOwner: owner,
|
|
|
|
ObjectName: "",
|
2023-02-06 12:27:29 -05:00
|
|
|
Claims: cred.Claims,
|
2020-05-15 21:16:45 -04:00
|
|
|
}) {
|
|
|
|
wr = true
|
|
|
|
}
|
|
|
|
|
|
|
|
return rd, wr
|
|
|
|
}
|
|
|
|
|
2023-09-19 01:13:03 -04:00
|
|
|
bucketStorageCache.Once.Do(func() {
|
|
|
|
// Set this to 10 secs since its enough, as scanner
|
|
|
|
// does not update the bucket usage values frequently.
|
|
|
|
bucketStorageCache.TTL = 10 * time.Second
|
|
|
|
|
|
|
|
// Rely on older value if usage loading fails from disk.
|
|
|
|
bucketStorageCache.Relax = true
|
|
|
|
bucketStorageCache.Update = func() (interface{}, error) {
|
|
|
|
ctx, done := context.WithTimeout(context.Background(), 2*time.Second)
|
|
|
|
defer done()
|
|
|
|
|
|
|
|
return loadDataUsageFromBackend(ctx, objectAPI)
|
|
|
|
}
|
|
|
|
})
|
|
|
|
|
|
|
|
var dataUsageInfo DataUsageInfo
|
|
|
|
v, _ := bucketStorageCache.Get()
|
|
|
|
if v != nil {
|
|
|
|
dataUsageInfo, _ = v.(DataUsageInfo)
|
|
|
|
}
|
2020-05-15 21:16:45 -04:00
|
|
|
|
2021-02-09 12:53:07 -05:00
|
|
|
// If etcd, dns federation configured list buckets from etcd.
|
2022-10-24 20:44:15 -04:00
|
|
|
var err error
|
2023-09-19 01:13:03 -04:00
|
|
|
var buckets []BucketInfo
|
2021-02-09 12:53:07 -05:00
|
|
|
if globalDNSConfig != nil && globalBucketFederation {
|
|
|
|
dnsBuckets, err := globalDNSConfig.List()
|
|
|
|
if err != nil && !IsErrIgnored(err,
|
|
|
|
dns.ErrNoEntriesFound,
|
|
|
|
dns.ErrDomainMissing) {
|
2021-06-15 21:52:01 -04:00
|
|
|
writeErrorResponseJSON(ctx, w, toAdminAPIErr(ctx, err), r.URL)
|
2021-02-09 12:53:07 -05:00
|
|
|
return
|
|
|
|
}
|
|
|
|
for _, dnsRecords := range dnsBuckets {
|
|
|
|
buckets = append(buckets, BucketInfo{
|
|
|
|
Name: dnsRecords[0].Key,
|
|
|
|
Created: dnsRecords[0].CreationDate,
|
|
|
|
})
|
|
|
|
}
|
|
|
|
sort.Slice(buckets, func(i, j int) bool {
|
|
|
|
return buckets[i].Name < buckets[j].Name
|
|
|
|
})
|
|
|
|
} else {
|
2023-09-19 01:13:03 -04:00
|
|
|
buckets, err = objectAPI.ListBuckets(ctx, BucketOptions{Cached: true})
|
2021-02-09 12:53:07 -05:00
|
|
|
if err != nil {
|
|
|
|
writeErrorResponseJSON(ctx, w, toAdminAPIErr(ctx, err), r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-05-15 21:16:45 -04:00
|
|
|
accountName := cred.AccessKey
|
2021-12-20 17:07:16 -05:00
|
|
|
if cred.IsTemp() || cred.IsServiceAccount() {
|
|
|
|
// For derived credentials, check the parent user's permissions.
|
|
|
|
accountName = cred.ParentUser
|
2021-03-23 20:39:20 -04:00
|
|
|
}
|
2020-11-27 20:23:57 -05:00
|
|
|
|
2023-09-14 17:50:16 -04:00
|
|
|
roleArn := policy.Args{Claims: cred.Claims}.GetRoleArn()
|
|
|
|
policySetFromClaims, hasPolicyClaim := policy.GetPoliciesFromClaims(cred.Claims, iamPolicyClaimNameOpenID())
|
|
|
|
var effectivePolicy policy.Policy
|
2022-10-19 20:54:41 -04:00
|
|
|
|
2022-07-29 23:58:03 -04:00
|
|
|
var buf []byte
|
2022-10-19 20:54:41 -04:00
|
|
|
switch {
|
|
|
|
case accountName == globalActiveCred.AccessKey:
|
2023-09-14 17:50:16 -04:00
|
|
|
for _, policy := range policy.DefaultPolicies {
|
2022-07-29 23:58:03 -04:00
|
|
|
if policy.Name == "consoleAdmin" {
|
2022-10-19 20:54:41 -04:00
|
|
|
effectivePolicy = policy.Definition
|
2022-07-29 23:58:03 -04:00
|
|
|
break
|
|
|
|
}
|
|
|
|
}
|
2022-11-29 18:40:49 -05:00
|
|
|
|
2022-10-19 20:54:41 -04:00
|
|
|
case roleArn != "":
|
|
|
|
_, policy, err := globalIAMSys.GetRolePolicy(roleArn)
|
2022-07-29 23:58:03 -04:00
|
|
|
if err != nil {
|
|
|
|
writeErrorResponseJSON(ctx, w, toAdminAPIErr(ctx, err), r.URL)
|
|
|
|
return
|
|
|
|
}
|
2022-10-19 20:54:41 -04:00
|
|
|
policySlice := newMappedPolicy(policy).toSlice()
|
|
|
|
effectivePolicy = globalIAMSys.GetCombinedPolicy(policySlice...)
|
2022-07-29 23:58:03 -04:00
|
|
|
|
2022-11-29 18:40:49 -05:00
|
|
|
case hasPolicyClaim:
|
|
|
|
effectivePolicy = globalIAMSys.GetCombinedPolicy(policySetFromClaims.ToSlice()...)
|
|
|
|
|
2022-10-19 20:54:41 -04:00
|
|
|
default:
|
2023-11-29 19:07:35 -05:00
|
|
|
policies, err := globalIAMSys.PolicyDBGet(accountName, cred.Groups...)
|
2022-07-29 23:58:03 -04:00
|
|
|
if err != nil {
|
2022-10-19 20:54:41 -04:00
|
|
|
logger.LogIf(ctx, err)
|
2022-07-29 23:58:03 -04:00
|
|
|
writeErrorResponseJSON(ctx, w, toAdminAPIErr(ctx, err), r.URL)
|
|
|
|
return
|
|
|
|
}
|
2022-10-19 20:54:41 -04:00
|
|
|
effectivePolicy = globalIAMSys.GetCombinedPolicy(policies...)
|
|
|
|
|
|
|
|
}
|
|
|
|
buf, err = json.MarshalIndent(effectivePolicy, "", " ")
|
|
|
|
if err != nil {
|
|
|
|
writeErrorResponseJSON(ctx, w, toAdminAPIErr(ctx, err), r.URL)
|
|
|
|
return
|
2021-05-06 11:52:02 -04:00
|
|
|
}
|
|
|
|
|
2020-11-27 20:23:57 -05:00
|
|
|
acctInfo := madmin.AccountInfo{
|
2020-05-15 21:16:45 -04:00
|
|
|
AccountName: accountName,
|
2021-07-16 17:37:06 -04:00
|
|
|
Server: objectAPI.BackendInfo(),
|
2021-05-06 11:52:02 -04:00
|
|
|
Policy: buf,
|
2020-05-15 21:16:45 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
for _, bucket := range buckets {
|
|
|
|
rd, wr := isAllowedAccess(bucket.Name)
|
|
|
|
if rd || wr {
|
|
|
|
// Fetch the data usage of the current bucket
|
2021-07-14 11:51:10 -04:00
|
|
|
var size uint64
|
2021-09-17 18:02:21 -04:00
|
|
|
var objectsCount uint64
|
2023-03-10 11:53:59 -05:00
|
|
|
var objectsHist, versionsHist map[string]uint64
|
2020-05-27 09:45:43 -04:00
|
|
|
if !dataUsageInfo.LastUpdate.IsZero() {
|
|
|
|
size = dataUsageInfo.BucketsUsage[bucket.Name].Size
|
2021-09-17 18:02:21 -04:00
|
|
|
objectsCount = dataUsageInfo.BucketsUsage[bucket.Name].ObjectsCount
|
|
|
|
objectsHist = dataUsageInfo.BucketsUsage[bucket.Name].ObjectSizesHistogram
|
2023-03-10 11:53:59 -05:00
|
|
|
versionsHist = dataUsageInfo.BucketsUsage[bucket.Name].ObjectVersionsHistogram
|
2020-05-15 21:16:45 -04:00
|
|
|
}
|
2021-07-14 11:51:10 -04:00
|
|
|
// Fetch the prefix usage of the current bucket
|
|
|
|
var prefixUsage map[string]uint64
|
|
|
|
if enablePrefixUsage {
|
2022-01-11 11:43:18 -05:00
|
|
|
prefixUsage, _ = loadPrefixUsageFromBackend(ctx, objectAPI, bucket.Name)
|
2021-07-14 11:51:10 -04:00
|
|
|
}
|
2021-09-17 18:02:21 -04:00
|
|
|
|
|
|
|
lcfg, _ := globalBucketObjectLockSys.Get(bucket.Name)
|
2022-01-31 20:27:43 -05:00
|
|
|
quota, _ := globalBucketQuotaSys.Get(ctx, bucket.Name)
|
2022-04-24 05:36:31 -04:00
|
|
|
rcfg, _, _ := globalBucketMetadataSys.GetReplicationConfig(ctx, bucket.Name)
|
|
|
|
tcfg, _, _ := globalBucketMetadataSys.GetTaggingConfig(bucket.Name)
|
2021-09-17 18:02:21 -04:00
|
|
|
|
2021-04-03 12:03:42 -04:00
|
|
|
acctInfo.Buckets = append(acctInfo.Buckets, madmin.BucketAccessInfo{
|
2023-03-10 11:53:59 -05:00
|
|
|
Name: bucket.Name,
|
|
|
|
Created: bucket.Created,
|
|
|
|
Size: size,
|
|
|
|
Objects: objectsCount,
|
|
|
|
ObjectSizesHistogram: objectsHist,
|
|
|
|
ObjectVersionsHistogram: versionsHist,
|
|
|
|
PrefixUsage: prefixUsage,
|
2021-09-17 18:02:21 -04:00
|
|
|
Details: &madmin.BucketDetails{
|
|
|
|
Versioning: globalBucketVersioningSys.Enabled(bucket.Name),
|
|
|
|
VersioningSuspended: globalBucketVersioningSys.Suspended(bucket.Name),
|
|
|
|
Replication: rcfg != nil,
|
|
|
|
Locking: lcfg.LockEnabled,
|
|
|
|
Quota: quota,
|
|
|
|
Tagging: tcfg,
|
|
|
|
},
|
2020-05-15 21:16:45 -04:00
|
|
|
Access: madmin.AccountAccess{
|
|
|
|
Read: rd,
|
|
|
|
Write: wr,
|
|
|
|
},
|
|
|
|
})
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
usageInfoJSON, err := json.Marshal(acctInfo)
|
|
|
|
if err != nil {
|
|
|
|
writeErrorResponseJSON(ctx, w, toAdminAPIErr(ctx, err), r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
writeSuccessResponseJSON(w, usageInfoJSON)
|
|
|
|
}
|
|
|
|
|
2020-04-07 22:30:59 -04:00
|
|
|
// InfoCannedPolicy - GET /minio/admin/v3/info-canned-policy?name={policyName}
|
2021-12-11 12:03:39 -05:00
|
|
|
//
|
|
|
|
// Newer API response with policy timestamps is returned with query parameter
|
|
|
|
// `v=2` like:
|
|
|
|
//
|
|
|
|
// GET /minio/admin/v3/info-canned-policy?name={policyName}&v=2
|
|
|
|
//
|
|
|
|
// The newer API will eventually become the default (and only) one. The older
|
|
|
|
// response is to return only the policy JSON. The newer response returns
|
|
|
|
// timestamps along with the policy JSON. Both versions are supported for now,
|
|
|
|
// for smooth transition to new API.
|
2019-11-09 12:27:23 -05:00
|
|
|
func (a adminAPIHandlers) InfoCannedPolicy(w http.ResponseWriter, r *http.Request) {
|
2023-07-13 17:52:21 -04:00
|
|
|
ctx := r.Context()
|
2020-05-11 13:34:08 -04:00
|
|
|
|
2023-09-14 17:50:16 -04:00
|
|
|
objectAPI, _ := validateAdminReq(ctx, w, r, policy.GetPolicyAdminAction)
|
2019-11-09 12:27:23 -05:00
|
|
|
if objectAPI == nil {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2021-12-11 12:03:39 -05:00
|
|
|
name := mux.Vars(r)["name"]
|
|
|
|
policies := newMappedPolicy(name).toSlice()
|
|
|
|
if len(policies) != 1 {
|
|
|
|
writeErrorResponseJSON(ctx, w, toAdminAPIErr(ctx, errTooManyPolicies), r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
policyDoc, err := globalIAMSys.InfoPolicy(name)
|
2019-11-09 12:27:23 -05:00
|
|
|
if err != nil {
|
|
|
|
writeErrorResponseJSON(ctx, w, toAdminAPIErr(ctx, err), r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2021-12-11 12:03:39 -05:00
|
|
|
// Is the new API version being requested?
|
|
|
|
infoPolicyAPIVersion := r.Form.Get("v")
|
|
|
|
if infoPolicyAPIVersion == "2" {
|
|
|
|
buf, err := json.MarshalIndent(policyDoc, "", " ")
|
|
|
|
if err != nil {
|
|
|
|
writeErrorResponseJSON(ctx, w, toAdminAPIErr(ctx, err), r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
w.Write(buf)
|
|
|
|
return
|
|
|
|
} else if infoPolicyAPIVersion != "" {
|
|
|
|
writeErrorResponseJSON(ctx, w, toAdminAPIErr(ctx, errors.New("invalid version parameter 'v' supplied")), r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
// Return the older API response value of just the policy json.
|
|
|
|
buf, err := json.MarshalIndent(policyDoc.Policy, "", " ")
|
2021-05-29 12:22:22 -04:00
|
|
|
if err != nil {
|
2020-09-27 13:24:04 -04:00
|
|
|
writeErrorResponseJSON(ctx, w, toAdminAPIErr(ctx, err), r.URL)
|
|
|
|
return
|
|
|
|
}
|
2021-05-29 12:22:22 -04:00
|
|
|
w.Write(buf)
|
2020-04-07 22:30:59 -04:00
|
|
|
}
|
|
|
|
|
2021-05-27 13:15:02 -04:00
|
|
|
// ListBucketPolicies - GET /minio/admin/v3/list-canned-policies?bucket={bucket}
|
|
|
|
func (a adminAPIHandlers) ListBucketPolicies(w http.ResponseWriter, r *http.Request) {
|
2023-07-13 17:52:21 -04:00
|
|
|
ctx := r.Context()
|
2020-05-11 13:34:08 -04:00
|
|
|
|
2023-09-14 17:50:16 -04:00
|
|
|
objectAPI, _ := validateAdminReq(ctx, w, r, policy.ListUserPoliciesAdminAction)
|
2020-04-07 22:30:59 -04:00
|
|
|
if objectAPI == nil {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2021-05-27 13:15:02 -04:00
|
|
|
bucket := mux.Vars(r)["bucket"]
|
2021-11-15 17:14:22 -05:00
|
|
|
policies, err := globalIAMSys.ListPolicies(ctx, bucket)
|
2020-04-07 22:30:59 -04:00
|
|
|
if err != nil {
|
|
|
|
writeErrorResponseJSON(ctx, w, toAdminAPIErr(ctx, err), r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2023-09-14 17:50:16 -04:00
|
|
|
newPolicies := make(map[string]policy.Policy)
|
2021-05-27 13:15:02 -04:00
|
|
|
for name, p := range policies {
|
|
|
|
_, err = json.Marshal(p)
|
2020-04-07 22:30:59 -04:00
|
|
|
if err != nil {
|
|
|
|
logger.LogIf(ctx, err)
|
|
|
|
continue
|
|
|
|
}
|
2021-05-27 13:15:02 -04:00
|
|
|
newPolicies[name] = p
|
2020-04-07 22:30:59 -04:00
|
|
|
}
|
2021-05-27 13:15:02 -04:00
|
|
|
if err = json.NewEncoder(w).Encode(newPolicies); err != nil {
|
2020-04-07 22:30:59 -04:00
|
|
|
writeErrorResponseJSON(ctx, w, toAdminAPIErr(ctx, err), r.URL)
|
|
|
|
return
|
|
|
|
}
|
2019-11-09 12:27:23 -05:00
|
|
|
}
|
|
|
|
|
2020-04-07 22:30:59 -04:00
|
|
|
// ListCannedPolicies - GET /minio/admin/v3/list-canned-policies
|
2019-11-09 12:27:23 -05:00
|
|
|
func (a adminAPIHandlers) ListCannedPolicies(w http.ResponseWriter, r *http.Request) {
|
2023-07-13 17:52:21 -04:00
|
|
|
ctx := r.Context()
|
2020-05-11 13:34:08 -04:00
|
|
|
|
2023-09-14 17:50:16 -04:00
|
|
|
objectAPI, _ := validateAdminReq(ctx, w, r, policy.ListUserPoliciesAdminAction)
|
2019-11-09 12:27:23 -05:00
|
|
|
if objectAPI == nil {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2021-11-15 17:14:22 -05:00
|
|
|
policies, err := globalIAMSys.ListPolicies(ctx, "")
|
2019-11-09 12:27:23 -05:00
|
|
|
if err != nil {
|
|
|
|
writeErrorResponseJSON(ctx, w, toAdminAPIErr(ctx, err), r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2023-09-14 17:50:16 -04:00
|
|
|
newPolicies := make(map[string]policy.Policy)
|
2020-04-15 15:16:40 -04:00
|
|
|
for name, p := range policies {
|
|
|
|
_, err = json.Marshal(p)
|
|
|
|
if err != nil {
|
|
|
|
logger.LogIf(ctx, err)
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
newPolicies[name] = p
|
|
|
|
}
|
|
|
|
if err = json.NewEncoder(w).Encode(newPolicies); err != nil {
|
2019-11-09 12:27:23 -05:00
|
|
|
writeErrorResponseJSON(ctx, w, toAdminAPIErr(ctx, err), r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-04-07 22:30:59 -04:00
|
|
|
// RemoveCannedPolicy - DELETE /minio/admin/v3/remove-canned-policy?name=<policy_name>
|
2019-11-09 12:27:23 -05:00
|
|
|
func (a adminAPIHandlers) RemoveCannedPolicy(w http.ResponseWriter, r *http.Request) {
|
2023-07-13 17:52:21 -04:00
|
|
|
ctx := r.Context()
|
2020-05-11 13:34:08 -04:00
|
|
|
|
2023-09-14 17:50:16 -04:00
|
|
|
objectAPI, _ := validateAdminReq(ctx, w, r, policy.DeletePolicyAdminAction)
|
2019-11-09 12:27:23 -05:00
|
|
|
if objectAPI == nil {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
vars := mux.Vars(r)
|
|
|
|
policyName := vars["name"]
|
|
|
|
|
2021-11-29 17:38:57 -05:00
|
|
|
if err := globalIAMSys.DeletePolicy(ctx, policyName, true); err != nil {
|
2019-11-09 12:27:23 -05:00
|
|
|
writeErrorResponseJSON(ctx, w, toAdminAPIErr(ctx, err), r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2021-10-06 19:36:31 -04:00
|
|
|
// Call cluster-replication policy creation hook to replicate policy deletion to
|
|
|
|
// other minio clusters.
|
2023-01-26 14:11:54 -05:00
|
|
|
logger.LogIf(ctx, globalSiteReplicationSys.IAMChangeHook(ctx, madmin.SRIAMItem{
|
2022-07-01 16:19:13 -04:00
|
|
|
Type: madmin.SRIAMItemPolicy,
|
|
|
|
Name: policyName,
|
|
|
|
UpdatedAt: UTCNow(),
|
2023-01-26 14:11:54 -05:00
|
|
|
}))
|
2019-11-09 12:27:23 -05:00
|
|
|
}
|
|
|
|
|
2020-04-07 22:30:59 -04:00
|
|
|
// AddCannedPolicy - PUT /minio/admin/v3/add-canned-policy?name=<policy_name>
|
2019-11-09 12:27:23 -05:00
|
|
|
func (a adminAPIHandlers) AddCannedPolicy(w http.ResponseWriter, r *http.Request) {
|
2023-07-13 17:52:21 -04:00
|
|
|
ctx := r.Context()
|
2020-05-11 13:34:08 -04:00
|
|
|
|
2023-09-14 17:50:16 -04:00
|
|
|
objectAPI, _ := validateAdminReq(ctx, w, r, policy.CreatePolicyAdminAction)
|
2019-11-09 12:27:23 -05:00
|
|
|
if objectAPI == nil {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
vars := mux.Vars(r)
|
|
|
|
policyName := vars["name"]
|
|
|
|
|
2022-05-02 12:27:35 -04:00
|
|
|
// Policy has space characters in begin and end reject such inputs.
|
|
|
|
if hasSpaceBE(policyName) {
|
|
|
|
writeErrorResponseJSON(ctx, w, errorCodes.ToAPIErr(ErrAdminResourceInvalidArgument), r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2019-11-09 12:27:23 -05:00
|
|
|
// Error out if Content-Length is missing.
|
|
|
|
if r.ContentLength <= 0 {
|
|
|
|
writeErrorResponseJSON(ctx, w, errorCodes.ToAPIErr(ErrMissingContentLength), r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
// Error out if Content-Length is beyond allowed size.
|
|
|
|
if r.ContentLength > maxBucketPolicySize {
|
|
|
|
writeErrorResponseJSON(ctx, w, errorCodes.ToAPIErr(ErrEntityTooLarge), r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2022-09-19 14:05:16 -04:00
|
|
|
iamPolicyBytes, err := io.ReadAll(io.LimitReader(r.Body, r.ContentLength))
|
2021-10-06 19:36:31 -04:00
|
|
|
if err != nil {
|
|
|
|
writeErrorResponseJSON(ctx, w, toAdminAPIErr(ctx, err), r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2023-09-14 17:50:16 -04:00
|
|
|
iamPolicy, err := policy.ParseConfig(bytes.NewReader(iamPolicyBytes))
|
2019-11-09 12:27:23 -05:00
|
|
|
if err != nil {
|
2020-01-03 14:28:52 -05:00
|
|
|
writeErrorResponseJSON(ctx, w, toAdminAPIErr(ctx, err), r.URL)
|
2019-11-09 12:27:23 -05:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
// Version in policy must not be empty
|
|
|
|
if iamPolicy.Version == "" {
|
2022-12-06 11:07:24 -05:00
|
|
|
writeErrorResponseJSON(ctx, w, errorCodes.ToAPIErr(ErrPolicyInvalidVersion), r.URL)
|
2019-11-09 12:27:23 -05:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2022-07-01 16:19:13 -04:00
|
|
|
updatedAt, err := globalIAMSys.SetPolicy(ctx, policyName, *iamPolicy)
|
|
|
|
if err != nil {
|
2019-11-09 12:27:23 -05:00
|
|
|
writeErrorResponseJSON(ctx, w, toAdminAPIErr(ctx, err), r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2021-10-06 19:36:31 -04:00
|
|
|
// Call cluster-replication policy creation hook to replicate policy to
|
|
|
|
// other minio clusters.
|
2023-01-26 14:11:54 -05:00
|
|
|
logger.LogIf(ctx, globalSiteReplicationSys.IAMChangeHook(ctx, madmin.SRIAMItem{
|
2022-07-01 16:19:13 -04:00
|
|
|
Type: madmin.SRIAMItemPolicy,
|
|
|
|
Name: policyName,
|
|
|
|
Policy: iamPolicyBytes,
|
|
|
|
UpdatedAt: updatedAt,
|
2023-01-26 14:11:54 -05:00
|
|
|
}))
|
2019-11-09 12:27:23 -05:00
|
|
|
}
|
|
|
|
|
2020-04-07 22:30:59 -04:00
|
|
|
// SetPolicyForUserOrGroup - PUT /minio/admin/v3/set-policy?policy=xxx&user-or-group=?[&is-group]
|
2019-11-09 12:27:23 -05:00
|
|
|
func (a adminAPIHandlers) SetPolicyForUserOrGroup(w http.ResponseWriter, r *http.Request) {
|
2023-07-13 17:52:21 -04:00
|
|
|
ctx := r.Context()
|
2020-05-11 13:34:08 -04:00
|
|
|
|
2023-09-14 17:50:16 -04:00
|
|
|
objectAPI, _ := validateAdminReq(ctx, w, r, policy.AttachPolicyAdminAction)
|
2019-11-09 12:27:23 -05:00
|
|
|
if objectAPI == nil {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
vars := mux.Vars(r)
|
|
|
|
policyName := vars["policyName"]
|
|
|
|
entityName := vars["userOrGroup"]
|
|
|
|
isGroup := vars["isGroup"] == "true"
|
|
|
|
|
2019-12-19 17:21:21 -05:00
|
|
|
if !isGroup {
|
2021-02-25 16:49:59 -05:00
|
|
|
ok, _, err := globalIAMSys.IsTempUser(entityName)
|
2020-04-09 04:04:08 -04:00
|
|
|
if err != nil && err != errNoSuchUser {
|
2019-12-19 17:21:21 -05:00
|
|
|
writeErrorResponseJSON(ctx, w, toAdminAPIErr(ctx, err), r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
if ok {
|
|
|
|
writeErrorResponseJSON(ctx, w, toAdminAPIErr(ctx, errIAMActionNotAllowed), r.URL)
|
|
|
|
return
|
|
|
|
}
|
2023-04-28 15:24:14 -04:00
|
|
|
// When the user is root credential you are not allowed to
|
|
|
|
// add policies for root user.
|
|
|
|
if entityName == globalActiveCred.AccessKey {
|
|
|
|
writeErrorResponseJSON(ctx, w, toAdminAPIErr(ctx, errIAMActionNotAllowed), r.URL)
|
|
|
|
return
|
|
|
|
}
|
2019-12-19 17:21:21 -05:00
|
|
|
}
|
|
|
|
|
2022-08-23 14:11:45 -04:00
|
|
|
// Validate that user or group exists.
|
|
|
|
if !isGroup {
|
|
|
|
if globalIAMSys.GetUsersSysType() == MinIOUsersSysType {
|
|
|
|
_, ok := globalIAMSys.GetUser(ctx, entityName)
|
|
|
|
if !ok {
|
|
|
|
writeErrorResponseJSON(ctx, w, toAdminAPIErr(ctx, errNoSuchUser), r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
_, err := globalIAMSys.GetGroupDescription(entityName)
|
|
|
|
if err != nil {
|
|
|
|
writeErrorResponseJSON(ctx, w, toAdminAPIErr(ctx, err), r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
userType := regUser
|
|
|
|
if globalIAMSys.GetUsersSysType() == LDAPUsersSysType {
|
|
|
|
userType = stsUser
|
|
|
|
}
|
|
|
|
|
|
|
|
updatedAt, err := globalIAMSys.PolicyDBSet(ctx, entityName, policyName, userType, isGroup)
|
2022-07-01 16:19:13 -04:00
|
|
|
if err != nil {
|
2019-11-09 12:27:23 -05:00
|
|
|
writeErrorResponseJSON(ctx, w, toAdminAPIErr(ctx, err), r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2023-01-26 14:11:54 -05:00
|
|
|
logger.LogIf(ctx, globalSiteReplicationSys.IAMChangeHook(ctx, madmin.SRIAMItem{
|
2021-10-06 19:36:31 -04:00
|
|
|
Type: madmin.SRIAMItemPolicyMapping,
|
|
|
|
PolicyMapping: &madmin.SRPolicyMapping{
|
|
|
|
UserOrGroup: entityName,
|
2022-08-23 14:11:45 -04:00
|
|
|
UserType: int(userType),
|
2021-10-06 19:36:31 -04:00
|
|
|
IsGroup: isGroup,
|
|
|
|
Policy: policyName,
|
|
|
|
},
|
2022-07-01 16:19:13 -04:00
|
|
|
UpdatedAt: updatedAt,
|
2023-01-26 14:11:54 -05:00
|
|
|
}))
|
2019-11-09 12:27:23 -05:00
|
|
|
}
|
2022-06-23 12:25:15 -04:00
|
|
|
|
2022-12-19 13:37:03 -05:00
|
|
|
// ListPolicyMappingEntities - GET /minio/admin/v3/idp/builtin/polciy-entities?policy=xxx&user=xxx&group=xxx
|
|
|
|
func (a adminAPIHandlers) ListPolicyMappingEntities(w http.ResponseWriter, r *http.Request) {
|
2023-07-13 17:52:21 -04:00
|
|
|
ctx := r.Context()
|
2022-12-19 13:37:03 -05:00
|
|
|
|
|
|
|
// Check authorization.
|
|
|
|
objectAPI, cred := validateAdminReq(ctx, w, r,
|
2023-09-14 17:50:16 -04:00
|
|
|
policy.ListGroupsAdminAction, policy.ListUsersAdminAction, policy.ListUserPoliciesAdminAction)
|
2022-12-19 13:37:03 -05:00
|
|
|
if objectAPI == nil {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
// Validate API arguments.
|
|
|
|
q := madmin.PolicyEntitiesQuery{
|
|
|
|
Users: r.Form["user"],
|
|
|
|
Groups: r.Form["group"],
|
|
|
|
Policy: r.Form["policy"],
|
|
|
|
}
|
|
|
|
|
|
|
|
// Query IAM
|
|
|
|
res, err := globalIAMSys.QueryPolicyEntities(r.Context(), q)
|
|
|
|
if err != nil {
|
|
|
|
writeErrorResponseJSON(ctx, w, toAdminAPIErr(ctx, err), r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
// Encode result and send response.
|
|
|
|
data, err := json.Marshal(res)
|
|
|
|
if err != nil {
|
|
|
|
writeErrorResponseJSON(ctx, w, toAdminAPIErr(ctx, err), r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
password := cred.SecretKey
|
|
|
|
econfigData, err := madmin.EncryptData(password, data)
|
|
|
|
if err != nil {
|
|
|
|
writeErrorResponseJSON(ctx, w, toAdminAPIErr(ctx, err), r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
writeSuccessResponseJSON(w, econfigData)
|
|
|
|
}
|
|
|
|
|
2023-06-22 01:44:50 -04:00
|
|
|
// AttachDetachPolicyBuiltin - POST /minio/admin/v3/idp/builtin/policy/{operation}
|
|
|
|
func (a adminAPIHandlers) AttachDetachPolicyBuiltin(w http.ResponseWriter, r *http.Request) {
|
2023-07-13 17:52:21 -04:00
|
|
|
ctx := r.Context()
|
2022-12-13 15:13:23 -05:00
|
|
|
|
2023-09-14 17:50:16 -04:00
|
|
|
objectAPI, cred := validateAdminReq(ctx, w, r, policy.UpdatePolicyAssociationAction,
|
|
|
|
policy.AttachPolicyAdminAction)
|
2022-12-13 15:13:23 -05:00
|
|
|
if objectAPI == nil {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2023-06-22 01:44:50 -04:00
|
|
|
if r.ContentLength > maxEConfigJSONSize || r.ContentLength == -1 {
|
|
|
|
// More than maxConfigSize bytes were available
|
|
|
|
writeErrorResponseJSON(ctx, w, errorCodes.ToAPIErr(ErrAdminConfigTooLarge), r.URL)
|
2022-12-13 15:13:23 -05:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2023-06-22 01:44:50 -04:00
|
|
|
// Ensure body content type is opaque to ensure that request body has not
|
|
|
|
// been interpreted as form data.
|
|
|
|
contentType := r.Header.Get("Content-Type")
|
|
|
|
if contentType != "application/octet-stream" {
|
|
|
|
writeErrorResponseJSON(ctx, w, errorCodes.ToAPIErr(ErrBadRequest), r.URL)
|
2022-12-13 15:13:23 -05:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2023-06-22 01:44:50 -04:00
|
|
|
operation := mux.Vars(r)["operation"]
|
|
|
|
if operation != "attach" && operation != "detach" {
|
|
|
|
writeErrorResponseJSON(ctx, w, errorCodes.ToAPIErr(ErrAdminInvalidArgument), r.URL)
|
2022-12-13 15:13:23 -05:00
|
|
|
return
|
|
|
|
}
|
2023-06-22 01:44:50 -04:00
|
|
|
isAttach := operation == "attach"
|
2022-12-13 15:13:23 -05:00
|
|
|
|
|
|
|
password := cred.SecretKey
|
|
|
|
reqBytes, err := madmin.DecryptData(password, io.LimitReader(r.Body, r.ContentLength))
|
|
|
|
if err != nil {
|
|
|
|
writeErrorResponseJSON(ctx, w, toAdminAPIErr(ctx, err), r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
var par madmin.PolicyAssociationReq
|
|
|
|
if err = json.Unmarshal(reqBytes, &par); err != nil {
|
|
|
|
writeErrorResponseJSON(ctx, w, toAdminAPIErr(ctx, err), r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
if err = par.IsValid(); err != nil {
|
|
|
|
writeErrorResponseJSON(ctx, w, toAdminAPIErr(ctx, err), r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2023-06-22 01:44:50 -04:00
|
|
|
updatedAt, addedOrRemoved, _, err := globalIAMSys.PolicyDBUpdateBuiltin(ctx, isAttach, par)
|
|
|
|
if err != nil {
|
|
|
|
if err == errNoSuchUser || err == errNoSuchGroup {
|
2023-05-26 09:31:24 -04:00
|
|
|
if globalIAMSys.LDAPConfig.Enabled() {
|
|
|
|
// When LDAP is enabled, warn user that they are using the wrong
|
2023-06-22 01:44:50 -04:00
|
|
|
// API. FIXME: error can be no such group as well - fix errNoSuchUserLDAPWarn
|
2023-05-26 09:31:24 -04:00
|
|
|
writeErrorResponseJSON(ctx, w, toAdminAPIErr(ctx, errNoSuchUserLDAPWarn), r.URL)
|
2022-12-13 15:13:23 -05:00
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
2023-06-22 01:44:50 -04:00
|
|
|
writeErrorResponseJSON(ctx, w, toAdminAPIErr(ctx, err), r.URL)
|
|
|
|
return
|
2022-12-13 15:13:23 -05:00
|
|
|
}
|
|
|
|
|
2023-06-22 01:44:50 -04:00
|
|
|
respBody := madmin.PolicyAssociationResp{
|
|
|
|
UpdatedAt: updatedAt,
|
2022-12-13 15:13:23 -05:00
|
|
|
}
|
2023-06-22 01:44:50 -04:00
|
|
|
if isAttach {
|
|
|
|
respBody.PoliciesAttached = addedOrRemoved
|
2022-12-13 15:13:23 -05:00
|
|
|
} else {
|
2023-06-22 01:44:50 -04:00
|
|
|
respBody.PoliciesDetached = addedOrRemoved
|
2022-12-13 15:13:23 -05:00
|
|
|
}
|
2023-06-22 01:44:50 -04:00
|
|
|
|
|
|
|
data, err := json.Marshal(respBody)
|
2022-12-13 15:13:23 -05:00
|
|
|
if err != nil {
|
|
|
|
writeErrorResponseJSON(ctx, w, toAdminAPIErr(ctx, err), r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2023-06-22 01:44:50 -04:00
|
|
|
encryptedData, err := madmin.EncryptData(password, data)
|
2022-12-13 15:13:23 -05:00
|
|
|
if err != nil {
|
|
|
|
writeErrorResponseJSON(ctx, w, toAdminAPIErr(ctx, err), r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2023-06-22 01:44:50 -04:00
|
|
|
writeSuccessResponseJSON(w, encryptedData)
|
2022-12-13 15:13:23 -05:00
|
|
|
}
|
|
|
|
|
2022-06-23 12:25:15 -04:00
|
|
|
const (
|
|
|
|
allPoliciesFile = "policies.json"
|
|
|
|
allUsersFile = "users.json"
|
|
|
|
allGroupsFile = "groups.json"
|
|
|
|
allSvcAcctsFile = "svcaccts.json"
|
|
|
|
userPolicyMappingsFile = "user_mappings.json"
|
|
|
|
groupPolicyMappingsFile = "group_mappings.json"
|
|
|
|
stsUserPolicyMappingsFile = "stsuser_mappings.json"
|
|
|
|
stsGroupPolicyMappingsFile = "stsgroup_mappings.json"
|
2022-07-21 20:51:33 -04:00
|
|
|
iamAssetsDir = "iam-assets"
|
2022-06-23 12:25:15 -04:00
|
|
|
)
|
|
|
|
|
|
|
|
// ExportIAMHandler - exports all iam info as a zipped file
|
|
|
|
func (a adminAPIHandlers) ExportIAM(w http.ResponseWriter, r *http.Request) {
|
2023-07-13 17:52:21 -04:00
|
|
|
ctx := r.Context()
|
2022-06-23 12:25:15 -04:00
|
|
|
|
|
|
|
// Get current object layer instance.
|
2023-09-14 17:50:16 -04:00
|
|
|
objectAPI, _ := validateAdminReq(ctx, w, r, policy.ExportIAMAction)
|
2022-06-23 12:25:15 -04:00
|
|
|
if objectAPI == nil {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
// Initialize a zip writer which will provide a zipped content
|
|
|
|
// of bucket metadata
|
|
|
|
zipWriter := zip.NewWriter(w)
|
|
|
|
defer zipWriter.Close()
|
|
|
|
rawDataFn := func(r io.Reader, filename string, sz int) error {
|
|
|
|
header, zerr := zip.FileInfoHeader(dummyFileInfo{
|
|
|
|
name: filename,
|
|
|
|
size: int64(sz),
|
|
|
|
mode: 0o600,
|
|
|
|
modTime: time.Now(),
|
|
|
|
isDir: false,
|
|
|
|
sys: nil,
|
|
|
|
})
|
|
|
|
if zerr != nil {
|
|
|
|
logger.LogIf(ctx, zerr)
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
header.Method = zip.Deflate
|
|
|
|
zwriter, zerr := zipWriter.CreateHeader(header)
|
|
|
|
if zerr != nil {
|
|
|
|
logger.LogIf(ctx, zerr)
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
if _, err := io.Copy(zwriter, r); err != nil {
|
|
|
|
logger.LogIf(ctx, err)
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
iamFiles := []string{
|
|
|
|
allPoliciesFile,
|
|
|
|
allUsersFile,
|
|
|
|
allGroupsFile,
|
|
|
|
allSvcAcctsFile,
|
|
|
|
userPolicyMappingsFile,
|
|
|
|
groupPolicyMappingsFile,
|
|
|
|
stsUserPolicyMappingsFile,
|
|
|
|
stsGroupPolicyMappingsFile,
|
|
|
|
}
|
2022-07-21 20:51:33 -04:00
|
|
|
for _, f := range iamFiles {
|
|
|
|
iamFile := pathJoin(iamAssetsDir, f)
|
|
|
|
switch f {
|
2022-06-23 12:25:15 -04:00
|
|
|
case allPoliciesFile:
|
|
|
|
allPolicies, err := globalIAMSys.ListPolicies(ctx, "")
|
|
|
|
if err != nil {
|
|
|
|
logger.LogIf(ctx, err)
|
|
|
|
writeErrorResponse(ctx, w, exportError(ctx, err, iamFile, ""), r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
policiesData, err := json.Marshal(allPolicies)
|
|
|
|
if err != nil {
|
|
|
|
writeErrorResponse(ctx, w, exportError(ctx, err, iamFile, ""), r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
if err = rawDataFn(bytes.NewReader(policiesData), iamFile, len(policiesData)); err != nil {
|
|
|
|
writeErrorResponse(ctx, w, exportError(ctx, err, iamFile, ""), r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
case allUsersFile:
|
2022-07-01 16:19:13 -04:00
|
|
|
userIdentities := make(map[string]UserIdentity)
|
|
|
|
err := globalIAMSys.store.loadUsers(ctx, regUser, userIdentities)
|
2022-06-23 12:25:15 -04:00
|
|
|
if err != nil {
|
|
|
|
writeErrorResponse(ctx, w, exportError(ctx, err, iamFile, ""), r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
userAccounts := make(map[string]madmin.AddOrUpdateUserReq)
|
2022-07-01 16:19:13 -04:00
|
|
|
for u, uid := range userIdentities {
|
2022-06-23 12:25:15 -04:00
|
|
|
userAccounts[u] = madmin.AddOrUpdateUserReq{
|
2022-07-01 16:19:13 -04:00
|
|
|
SecretKey: uid.Credentials.SecretKey,
|
2023-04-28 15:24:14 -04:00
|
|
|
Status: func() madmin.AccountStatus {
|
|
|
|
// Export current credential status
|
|
|
|
if uid.Credentials.Status == auth.AccountOff {
|
|
|
|
return madmin.AccountDisabled
|
|
|
|
}
|
|
|
|
return madmin.AccountEnabled
|
|
|
|
}(),
|
2022-06-23 12:25:15 -04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
userData, err := json.Marshal(userAccounts)
|
|
|
|
if err != nil {
|
|
|
|
writeErrorResponse(ctx, w, exportError(ctx, err, iamFile, ""), r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
if err = rawDataFn(bytes.NewReader(userData), iamFile, len(userData)); err != nil {
|
|
|
|
writeErrorResponse(ctx, w, exportError(ctx, err, iamFile, ""), r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
case allGroupsFile:
|
|
|
|
groups := make(map[string]GroupInfo)
|
|
|
|
err := globalIAMSys.store.loadGroups(ctx, groups)
|
|
|
|
if err != nil {
|
|
|
|
writeErrorResponse(ctx, w, exportError(ctx, err, iamFile, ""), r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
groupData, err := json.Marshal(groups)
|
|
|
|
if err != nil {
|
|
|
|
writeErrorResponse(ctx, w, exportError(ctx, err, iamFile, ""), r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
if err = rawDataFn(bytes.NewReader(groupData), iamFile, len(groupData)); err != nil {
|
|
|
|
writeErrorResponse(ctx, w, exportError(ctx, err, iamFile, ""), r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
case allSvcAcctsFile:
|
2022-07-01 16:19:13 -04:00
|
|
|
serviceAccounts := make(map[string]UserIdentity)
|
2022-06-23 12:25:15 -04:00
|
|
|
err := globalIAMSys.store.loadUsers(ctx, svcUser, serviceAccounts)
|
|
|
|
if err != nil {
|
|
|
|
writeErrorResponse(ctx, w, exportError(ctx, err, iamFile, ""), r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
svcAccts := make(map[string]madmin.SRSvcAccCreate)
|
|
|
|
for user, acc := range serviceAccounts {
|
2023-04-28 15:24:14 -04:00
|
|
|
if user == siteReplicatorSvcAcc {
|
|
|
|
// skip site-replication service account.
|
|
|
|
continue
|
|
|
|
}
|
2022-07-01 16:19:13 -04:00
|
|
|
claims, err := globalIAMSys.GetClaimsForSvcAcc(ctx, acc.Credentials.AccessKey)
|
2022-06-23 12:25:15 -04:00
|
|
|
if err != nil {
|
|
|
|
writeErrorResponse(ctx, w, exportError(ctx, err, iamFile, ""), r.URL)
|
|
|
|
return
|
|
|
|
}
|
2022-07-01 16:19:13 -04:00
|
|
|
_, policy, err := globalIAMSys.GetServiceAccount(ctx, acc.Credentials.AccessKey)
|
2022-06-23 12:25:15 -04:00
|
|
|
if err != nil {
|
|
|
|
writeErrorResponse(ctx, w, exportError(ctx, err, iamFile, ""), r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
var policyJSON []byte
|
|
|
|
if policy != nil {
|
|
|
|
policyJSON, err = json.Marshal(policy)
|
|
|
|
if err != nil {
|
|
|
|
writeErrorResponse(ctx, w, exportError(ctx, err, iamFile, ""), r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
|
|
|
svcAccts[user] = madmin.SRSvcAccCreate{
|
2022-07-01 16:19:13 -04:00
|
|
|
Parent: acc.Credentials.ParentUser,
|
2022-06-23 12:25:15 -04:00
|
|
|
AccessKey: user,
|
2022-07-01 16:19:13 -04:00
|
|
|
SecretKey: acc.Credentials.SecretKey,
|
|
|
|
Groups: acc.Credentials.Groups,
|
2022-06-23 12:25:15 -04:00
|
|
|
Claims: claims,
|
|
|
|
SessionPolicy: json.RawMessage(policyJSON),
|
2022-07-01 16:19:13 -04:00
|
|
|
Status: acc.Credentials.Status,
|
2022-06-23 12:25:15 -04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
svcAccData, err := json.Marshal(svcAccts)
|
|
|
|
if err != nil {
|
|
|
|
writeErrorResponse(ctx, w, exportError(ctx, err, iamFile, ""), r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
if err = rawDataFn(bytes.NewReader(svcAccData), iamFile, len(svcAccData)); err != nil {
|
|
|
|
writeErrorResponse(ctx, w, exportError(ctx, err, iamFile, ""), r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
case userPolicyMappingsFile:
|
|
|
|
userPolicyMap := make(map[string]MappedPolicy)
|
|
|
|
err := globalIAMSys.store.loadMappedPolicies(ctx, regUser, false, userPolicyMap)
|
|
|
|
if err != nil {
|
|
|
|
writeErrorResponse(ctx, w, exportError(ctx, err, iamFile, ""), r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
userPolData, err := json.Marshal(userPolicyMap)
|
|
|
|
if err != nil {
|
|
|
|
writeErrorResponse(ctx, w, exportError(ctx, err, iamFile, ""), r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
if err = rawDataFn(bytes.NewReader(userPolData), iamFile, len(userPolData)); err != nil {
|
|
|
|
writeErrorResponse(ctx, w, exportError(ctx, err, iamFile, ""), r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
case groupPolicyMappingsFile:
|
|
|
|
groupPolicyMap := make(map[string]MappedPolicy)
|
|
|
|
err := globalIAMSys.store.loadMappedPolicies(ctx, regUser, true, groupPolicyMap)
|
|
|
|
if err != nil {
|
|
|
|
writeErrorResponse(ctx, w, exportError(ctx, err, iamFile, ""), r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
grpPolData, err := json.Marshal(groupPolicyMap)
|
|
|
|
if err != nil {
|
|
|
|
writeErrorResponse(ctx, w, exportError(ctx, err, iamFile, ""), r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
if err = rawDataFn(bytes.NewReader(grpPolData), iamFile, len(grpPolData)); err != nil {
|
|
|
|
writeErrorResponse(ctx, w, exportError(ctx, err, iamFile, ""), r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
case stsUserPolicyMappingsFile:
|
|
|
|
userPolicyMap := make(map[string]MappedPolicy)
|
|
|
|
err := globalIAMSys.store.loadMappedPolicies(ctx, stsUser, false, userPolicyMap)
|
|
|
|
if err != nil {
|
|
|
|
writeErrorResponse(ctx, w, exportError(ctx, err, iamFile, ""), r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
userPolData, err := json.Marshal(userPolicyMap)
|
|
|
|
if err != nil {
|
|
|
|
writeErrorResponse(ctx, w, exportError(ctx, err, iamFile, ""), r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
if err = rawDataFn(bytes.NewReader(userPolData), iamFile, len(userPolData)); err != nil {
|
|
|
|
writeErrorResponse(ctx, w, exportError(ctx, err, iamFile, ""), r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
case stsGroupPolicyMappingsFile:
|
|
|
|
groupPolicyMap := make(map[string]MappedPolicy)
|
|
|
|
err := globalIAMSys.store.loadMappedPolicies(ctx, stsUser, true, groupPolicyMap)
|
|
|
|
if err != nil {
|
|
|
|
writeErrorResponse(ctx, w, exportError(ctx, err, iamFile, ""), r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
grpPolData, err := json.Marshal(groupPolicyMap)
|
|
|
|
if err != nil {
|
|
|
|
writeErrorResponse(ctx, w, exportError(ctx, err, iamFile, ""), r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
if err = rawDataFn(bytes.NewReader(grpPolData), iamFile, len(grpPolData)); err != nil {
|
|
|
|
writeErrorResponse(ctx, w, exportError(ctx, err, iamFile, ""), r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// ImportIAM - imports all IAM info into MinIO
|
|
|
|
func (a adminAPIHandlers) ImportIAM(w http.ResponseWriter, r *http.Request) {
|
2023-07-13 17:52:21 -04:00
|
|
|
ctx := r.Context()
|
2022-06-23 12:25:15 -04:00
|
|
|
|
|
|
|
// Get current object layer instance.
|
|
|
|
objectAPI := newObjectLayerFn()
|
|
|
|
if objectAPI == nil || globalNotificationSys == nil {
|
|
|
|
writeErrorResponseJSON(ctx, w, errorCodes.ToAPIErr(ErrServerNotInitialized), r.URL)
|
|
|
|
return
|
|
|
|
}
|
2023-02-06 12:27:29 -05:00
|
|
|
cred, owner, s3Err := validateAdminSignature(ctx, r, "")
|
2022-06-23 12:25:15 -04:00
|
|
|
if s3Err != ErrNone {
|
|
|
|
writeErrorResponseJSON(ctx, w, errorCodes.ToAPIErr(s3Err), r.URL)
|
|
|
|
return
|
|
|
|
}
|
2022-09-19 14:05:16 -04:00
|
|
|
data, err := io.ReadAll(r.Body)
|
2022-06-23 12:25:15 -04:00
|
|
|
if err != nil {
|
|
|
|
writeErrorResponseJSON(ctx, w, errorCodes.ToAPIErr(ErrInvalidRequest), r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
reader := bytes.NewReader(data)
|
|
|
|
zr, err := zip.NewReader(reader, int64(len(data)))
|
|
|
|
if err != nil {
|
|
|
|
writeErrorResponseJSON(ctx, w, errorCodes.ToAPIErr(ErrInvalidRequest), r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
// import policies first
|
|
|
|
{
|
2022-07-21 20:51:33 -04:00
|
|
|
|
|
|
|
f, err := zr.Open(pathJoin(iamAssetsDir, allPoliciesFile))
|
2022-06-23 12:25:15 -04:00
|
|
|
switch {
|
|
|
|
case errors.Is(err, os.ErrNotExist):
|
|
|
|
case err != nil:
|
|
|
|
writeErrorResponseJSON(ctx, w, importErrorWithAPIErr(ctx, ErrInvalidRequest, err, allPoliciesFile, ""), r.URL)
|
|
|
|
return
|
|
|
|
default:
|
|
|
|
defer f.Close()
|
2023-09-14 17:50:16 -04:00
|
|
|
var allPolicies map[string]policy.Policy
|
2022-09-19 14:05:16 -04:00
|
|
|
data, err = io.ReadAll(f)
|
2022-06-23 12:25:15 -04:00
|
|
|
if err != nil {
|
|
|
|
writeErrorResponseJSON(ctx, w, importErrorWithAPIErr(ctx, ErrInvalidRequest, err, allPoliciesFile, ""), r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
err = json.Unmarshal(data, &allPolicies)
|
|
|
|
if err != nil {
|
|
|
|
writeErrorResponseJSON(ctx, w, importErrorWithAPIErr(ctx, ErrAdminConfigBadJSON, err, allPoliciesFile, ""), r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
for policyName, policy := range allPolicies {
|
|
|
|
if policy.IsEmpty() {
|
|
|
|
err = globalIAMSys.DeletePolicy(ctx, policyName, true)
|
|
|
|
} else {
|
2022-07-01 16:19:13 -04:00
|
|
|
_, err = globalIAMSys.SetPolicy(ctx, policyName, policy)
|
2022-06-23 12:25:15 -04:00
|
|
|
}
|
|
|
|
if err != nil {
|
|
|
|
writeErrorResponseJSON(ctx, w, importError(ctx, err, allPoliciesFile, policyName), r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// import users
|
|
|
|
{
|
2022-07-21 20:51:33 -04:00
|
|
|
f, err := zr.Open(pathJoin(iamAssetsDir, allUsersFile))
|
2022-06-23 12:25:15 -04:00
|
|
|
switch {
|
|
|
|
case errors.Is(err, os.ErrNotExist):
|
|
|
|
case err != nil:
|
|
|
|
writeErrorResponseJSON(ctx, w, importErrorWithAPIErr(ctx, ErrInvalidRequest, err, allUsersFile, ""), r.URL)
|
|
|
|
return
|
|
|
|
default:
|
|
|
|
defer f.Close()
|
|
|
|
var userAccts map[string]madmin.AddOrUpdateUserReq
|
2022-09-19 14:05:16 -04:00
|
|
|
data, err := io.ReadAll(f)
|
2022-06-23 12:25:15 -04:00
|
|
|
if err != nil {
|
|
|
|
writeErrorResponseJSON(ctx, w, importErrorWithAPIErr(ctx, ErrInvalidRequest, err, allUsersFile, ""), r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
err = json.Unmarshal(data, &userAccts)
|
|
|
|
if err != nil {
|
|
|
|
writeErrorResponseJSON(ctx, w, importErrorWithAPIErr(ctx, ErrAdminConfigBadJSON, err, allUsersFile, ""), r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
for accessKey, ureq := range userAccts {
|
|
|
|
// Not allowed to add a user with same access key as root credential
|
2023-03-13 15:46:17 -04:00
|
|
|
if accessKey == globalActiveCred.AccessKey {
|
2022-06-23 12:25:15 -04:00
|
|
|
writeErrorResponseJSON(ctx, w, importErrorWithAPIErr(ctx, ErrAddUserInvalidArgument, err, allUsersFile, accessKey), r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2022-07-01 16:19:13 -04:00
|
|
|
user, exists := globalIAMSys.GetUser(ctx, accessKey)
|
|
|
|
if exists && (user.Credentials.IsTemp() || user.Credentials.IsServiceAccount()) {
|
2022-06-23 12:25:15 -04:00
|
|
|
// Updating STS credential is not allowed, and this API does not
|
|
|
|
// support updating service accounts.
|
|
|
|
writeErrorResponseJSON(ctx, w, importErrorWithAPIErr(ctx, ErrAddUserInvalidArgument, err, allUsersFile, accessKey), r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
if (cred.IsTemp() || cred.IsServiceAccount()) && cred.ParentUser == accessKey {
|
|
|
|
// Incoming access key matches parent user then we should
|
|
|
|
// reject password change requests.
|
|
|
|
writeErrorResponseJSON(ctx, w, importErrorWithAPIErr(ctx, ErrAddUserInvalidArgument, err, allUsersFile, accessKey), r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
// Check if accessKey has beginning and end space characters, this only applies to new users.
|
|
|
|
if !exists && hasSpaceBE(accessKey) {
|
|
|
|
writeErrorResponseJSON(ctx, w, importErrorWithAPIErr(ctx, ErrAdminResourceInvalidArgument, err, allUsersFile, accessKey), r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
checkDenyOnly := false
|
|
|
|
if accessKey == cred.AccessKey {
|
|
|
|
// Check that there is no explicit deny - otherwise it's allowed
|
|
|
|
// to change one's own password.
|
|
|
|
checkDenyOnly = true
|
|
|
|
}
|
|
|
|
|
2023-09-14 17:50:16 -04:00
|
|
|
if !globalIAMSys.IsAllowed(policy.Args{
|
2022-06-23 12:25:15 -04:00
|
|
|
AccountName: cred.AccessKey,
|
|
|
|
Groups: cred.Groups,
|
2023-09-14 17:50:16 -04:00
|
|
|
Action: policy.CreateUserAdminAction,
|
2023-02-06 12:27:29 -05:00
|
|
|
ConditionValues: getConditionValues(r, "", cred),
|
2022-06-23 12:25:15 -04:00
|
|
|
IsOwner: owner,
|
2023-02-06 12:27:29 -05:00
|
|
|
Claims: cred.Claims,
|
2022-06-23 12:25:15 -04:00
|
|
|
DenyOnly: checkDenyOnly,
|
|
|
|
}) {
|
|
|
|
writeErrorResponseJSON(ctx, w, importErrorWithAPIErr(ctx, ErrAccessDenied, err, allUsersFile, accessKey), r.URL)
|
|
|
|
return
|
|
|
|
}
|
2022-07-01 16:19:13 -04:00
|
|
|
if _, err = globalIAMSys.CreateUser(ctx, accessKey, ureq); err != nil {
|
2022-06-23 12:25:15 -04:00
|
|
|
writeErrorResponseJSON(ctx, w, importErrorWithAPIErr(ctx, toAdminAPIErrCode(ctx, err), err, allUsersFile, accessKey), r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// import groups
|
|
|
|
{
|
2022-07-21 20:51:33 -04:00
|
|
|
f, err := zr.Open(pathJoin(iamAssetsDir, allGroupsFile))
|
2022-06-23 12:25:15 -04:00
|
|
|
switch {
|
|
|
|
case errors.Is(err, os.ErrNotExist):
|
|
|
|
case err != nil:
|
|
|
|
writeErrorResponseJSON(ctx, w, importErrorWithAPIErr(ctx, ErrInvalidRequest, err, allGroupsFile, ""), r.URL)
|
|
|
|
return
|
|
|
|
default:
|
|
|
|
defer f.Close()
|
|
|
|
var grpInfos map[string]GroupInfo
|
2022-09-19 14:05:16 -04:00
|
|
|
data, err := io.ReadAll(f)
|
2022-06-23 12:25:15 -04:00
|
|
|
if err != nil {
|
|
|
|
writeErrorResponseJSON(ctx, w, importErrorWithAPIErr(ctx, ErrInvalidRequest, err, allGroupsFile, ""), r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
if err = json.Unmarshal(data, &grpInfos); err != nil {
|
|
|
|
writeErrorResponseJSON(ctx, w, importErrorWithAPIErr(ctx, ErrAdminConfigBadJSON, err, allGroupsFile, ""), r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
for group, grpInfo := range grpInfos {
|
|
|
|
// Check if group already exists
|
|
|
|
if _, gerr := globalIAMSys.GetGroupDescription(group); gerr != nil {
|
|
|
|
// If group does not exist, then check if the group has beginning and end space characters
|
|
|
|
// we will reject such group names.
|
|
|
|
if errors.Is(gerr, errNoSuchGroup) && hasSpaceBE(group) {
|
|
|
|
writeErrorResponseJSON(ctx, w, importErrorWithAPIErr(ctx, ErrAdminResourceInvalidArgument, err, allGroupsFile, group), r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
2022-07-01 16:19:13 -04:00
|
|
|
if _, gerr := globalIAMSys.AddUsersToGroup(ctx, group, grpInfo.Members); gerr != nil {
|
2022-06-23 12:25:15 -04:00
|
|
|
writeErrorResponseJSON(ctx, w, importError(ctx, err, allGroupsFile, group), r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// import service accounts
|
|
|
|
{
|
2022-07-21 20:51:33 -04:00
|
|
|
f, err := zr.Open(pathJoin(iamAssetsDir, allSvcAcctsFile))
|
2022-06-23 12:25:15 -04:00
|
|
|
switch {
|
|
|
|
case errors.Is(err, os.ErrNotExist):
|
|
|
|
case err != nil:
|
|
|
|
writeErrorResponseJSON(ctx, w, importErrorWithAPIErr(ctx, ErrInvalidRequest, err, allSvcAcctsFile, ""), r.URL)
|
|
|
|
return
|
|
|
|
default:
|
|
|
|
defer f.Close()
|
|
|
|
var serviceAcctReqs map[string]madmin.SRSvcAccCreate
|
2022-09-19 14:05:16 -04:00
|
|
|
data, err := io.ReadAll(f)
|
2022-06-23 12:25:15 -04:00
|
|
|
if err != nil {
|
|
|
|
writeErrorResponseJSON(ctx, w, importErrorWithAPIErr(ctx, ErrInvalidRequest, err, allSvcAcctsFile, ""), r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
if err = json.Unmarshal(data, &serviceAcctReqs); err != nil {
|
|
|
|
writeErrorResponseJSON(ctx, w, importErrorWithAPIErr(ctx, ErrAdminConfigBadJSON, err, allSvcAcctsFile, ""), r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
for user, svcAcctReq := range serviceAcctReqs {
|
2023-09-14 17:50:16 -04:00
|
|
|
var sp *policy.Policy
|
2022-06-23 12:25:15 -04:00
|
|
|
var err error
|
|
|
|
if len(svcAcctReq.SessionPolicy) > 0 {
|
2023-09-14 17:50:16 -04:00
|
|
|
sp, err = policy.ParseConfig(bytes.NewReader(svcAcctReq.SessionPolicy))
|
2022-06-23 12:25:15 -04:00
|
|
|
if err != nil {
|
|
|
|
writeErrorResponseJSON(ctx, w, importError(ctx, err, allSvcAcctsFile, user), r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
|
|
|
// service account access key cannot have space characters beginning and end of the string.
|
|
|
|
if hasSpaceBE(svcAcctReq.AccessKey) {
|
|
|
|
writeErrorResponseJSON(ctx, w, errorCodes.ToAPIErr(ErrAdminResourceInvalidArgument), r.URL)
|
|
|
|
return
|
|
|
|
}
|
2023-09-14 17:50:16 -04:00
|
|
|
if !globalIAMSys.IsAllowed(policy.Args{
|
2023-02-06 12:27:29 -05:00
|
|
|
AccountName: cred.AccessKey,
|
|
|
|
Groups: cred.Groups,
|
2023-09-14 17:50:16 -04:00
|
|
|
Action: policy.CreateServiceAccountAdminAction,
|
2023-02-06 12:27:29 -05:00
|
|
|
ConditionValues: getConditionValues(r, "", cred),
|
2022-06-23 12:25:15 -04:00
|
|
|
IsOwner: owner,
|
2023-02-06 12:27:29 -05:00
|
|
|
Claims: cred.Claims,
|
2022-06-23 12:25:15 -04:00
|
|
|
}) {
|
|
|
|
writeErrorResponseJSON(ctx, w, importErrorWithAPIErr(ctx, ErrAccessDenied, err, allSvcAcctsFile, user), r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
updateReq := true
|
|
|
|
_, _, err = globalIAMSys.GetServiceAccount(ctx, svcAcctReq.AccessKey)
|
|
|
|
if err != nil {
|
|
|
|
if !errors.Is(err, errNoSuchServiceAccount) {
|
|
|
|
writeErrorResponseJSON(ctx, w, importError(ctx, err, allSvcAcctsFile, user), r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
updateReq = false
|
|
|
|
}
|
|
|
|
if updateReq {
|
|
|
|
opts := updateServiceAccountOpts{
|
|
|
|
secretKey: svcAcctReq.SecretKey,
|
|
|
|
status: svcAcctReq.Status,
|
2023-05-17 20:05:36 -04:00
|
|
|
name: svcAcctReq.Name,
|
|
|
|
description: svcAcctReq.Description,
|
2023-02-27 13:10:22 -05:00
|
|
|
expiration: svcAcctReq.Expiration,
|
2022-06-23 12:25:15 -04:00
|
|
|
sessionPolicy: sp,
|
|
|
|
}
|
2022-07-01 16:19:13 -04:00
|
|
|
_, err = globalIAMSys.UpdateServiceAccount(ctx, svcAcctReq.AccessKey, opts)
|
2022-06-23 12:25:15 -04:00
|
|
|
if err != nil {
|
|
|
|
writeErrorResponseJSON(ctx, w, importError(ctx, err, allSvcAcctsFile, user), r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
opts := newServiceAccountOpts{
|
2023-04-28 15:24:14 -04:00
|
|
|
accessKey: user,
|
|
|
|
secretKey: svcAcctReq.SecretKey,
|
|
|
|
sessionPolicy: sp,
|
|
|
|
claims: svcAcctReq.Claims,
|
2023-05-17 20:05:36 -04:00
|
|
|
name: svcAcctReq.Name,
|
|
|
|
description: svcAcctReq.Description,
|
2023-04-28 15:24:14 -04:00
|
|
|
expiration: svcAcctReq.Expiration,
|
|
|
|
allowSiteReplicatorAccount: false,
|
2022-06-23 12:25:15 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
// In case of LDAP we need to resolve the targetUser to a DN and
|
|
|
|
// query their groups:
|
2023-02-24 21:37:22 -05:00
|
|
|
if globalIAMSys.LDAPConfig.Enabled() {
|
2022-06-23 12:25:15 -04:00
|
|
|
opts.claims[ldapUserN] = svcAcctReq.AccessKey // simple username
|
2023-02-24 21:37:22 -05:00
|
|
|
targetUser, _, err := globalIAMSys.LDAPConfig.LookupUserDN(svcAcctReq.AccessKey)
|
2022-06-23 12:25:15 -04:00
|
|
|
if err != nil {
|
|
|
|
writeErrorResponseJSON(ctx, w, importError(ctx, err, allSvcAcctsFile, user), r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
opts.claims[ldapUser] = targetUser // username DN
|
|
|
|
}
|
|
|
|
|
2022-07-01 16:19:13 -04:00
|
|
|
if _, _, err = globalIAMSys.NewServiceAccount(ctx, svcAcctReq.Parent, svcAcctReq.Groups, opts); err != nil {
|
2022-06-23 12:25:15 -04:00
|
|
|
writeErrorResponseJSON(ctx, w, importError(ctx, err, allSvcAcctsFile, user), r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// import user policy mappings
|
|
|
|
{
|
2022-07-21 20:51:33 -04:00
|
|
|
f, err := zr.Open(pathJoin(iamAssetsDir, userPolicyMappingsFile))
|
2022-06-23 12:25:15 -04:00
|
|
|
switch {
|
|
|
|
case errors.Is(err, os.ErrNotExist):
|
|
|
|
case err != nil:
|
|
|
|
writeErrorResponseJSON(ctx, w, importErrorWithAPIErr(ctx, ErrInvalidRequest, err, userPolicyMappingsFile, ""), r.URL)
|
|
|
|
return
|
|
|
|
default:
|
|
|
|
defer f.Close()
|
|
|
|
var userPolicyMap map[string]MappedPolicy
|
2022-09-19 14:05:16 -04:00
|
|
|
data, err := io.ReadAll(f)
|
2022-06-23 12:25:15 -04:00
|
|
|
if err != nil {
|
|
|
|
writeErrorResponseJSON(ctx, w, importErrorWithAPIErr(ctx, ErrInvalidRequest, err, userPolicyMappingsFile, ""), r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
if err = json.Unmarshal(data, &userPolicyMap); err != nil {
|
|
|
|
writeErrorResponseJSON(ctx, w, importErrorWithAPIErr(ctx, ErrAdminConfigBadJSON, err, userPolicyMappingsFile, ""), r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
for u, pm := range userPolicyMap {
|
|
|
|
// disallow setting policy mapping if user is a temporary user
|
|
|
|
ok, _, err := globalIAMSys.IsTempUser(u)
|
|
|
|
if err != nil && err != errNoSuchUser {
|
|
|
|
writeErrorResponseJSON(ctx, w, importError(ctx, err, userPolicyMappingsFile, u), r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
if ok {
|
|
|
|
writeErrorResponseJSON(ctx, w, importError(ctx, errIAMActionNotAllowed, userPolicyMappingsFile, u), r.URL)
|
|
|
|
return
|
|
|
|
}
|
2022-08-23 14:11:45 -04:00
|
|
|
if _, err := globalIAMSys.PolicyDBSet(ctx, u, pm.Policies, regUser, false); err != nil {
|
2022-06-23 12:25:15 -04:00
|
|
|
writeErrorResponseJSON(ctx, w, importError(ctx, err, userPolicyMappingsFile, u), r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// import group policy mappings
|
|
|
|
{
|
2022-07-21 20:51:33 -04:00
|
|
|
f, err := zr.Open(pathJoin(iamAssetsDir, groupPolicyMappingsFile))
|
2022-06-23 12:25:15 -04:00
|
|
|
switch {
|
|
|
|
case errors.Is(err, os.ErrNotExist):
|
|
|
|
case err != nil:
|
|
|
|
writeErrorResponseJSON(ctx, w, importErrorWithAPIErr(ctx, ErrInvalidRequest, err, groupPolicyMappingsFile, ""), r.URL)
|
|
|
|
return
|
|
|
|
default:
|
|
|
|
defer f.Close()
|
|
|
|
var grpPolicyMap map[string]MappedPolicy
|
2022-09-19 14:05:16 -04:00
|
|
|
data, err := io.ReadAll(f)
|
2022-06-23 12:25:15 -04:00
|
|
|
if err != nil {
|
|
|
|
writeErrorResponseJSON(ctx, w, importErrorWithAPIErr(ctx, ErrInvalidRequest, err, groupPolicyMappingsFile, ""), r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
if err = json.Unmarshal(data, &grpPolicyMap); err != nil {
|
|
|
|
writeErrorResponseJSON(ctx, w, importErrorWithAPIErr(ctx, ErrAdminConfigBadJSON, err, groupPolicyMappingsFile, ""), r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
for g, pm := range grpPolicyMap {
|
2022-08-23 14:11:45 -04:00
|
|
|
if _, err := globalIAMSys.PolicyDBSet(ctx, g, pm.Policies, unknownIAMUserType, true); err != nil {
|
2022-06-23 12:25:15 -04:00
|
|
|
writeErrorResponseJSON(ctx, w, importError(ctx, err, groupPolicyMappingsFile, g), r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// import sts user policy mappings
|
|
|
|
{
|
2022-07-21 20:51:33 -04:00
|
|
|
f, err := zr.Open(pathJoin(iamAssetsDir, stsUserPolicyMappingsFile))
|
2022-06-23 12:25:15 -04:00
|
|
|
switch {
|
|
|
|
case errors.Is(err, os.ErrNotExist):
|
|
|
|
case err != nil:
|
|
|
|
writeErrorResponseJSON(ctx, w, importErrorWithAPIErr(ctx, ErrInvalidRequest, err, stsUserPolicyMappingsFile, ""), r.URL)
|
|
|
|
return
|
|
|
|
default:
|
|
|
|
defer f.Close()
|
|
|
|
var userPolicyMap map[string]MappedPolicy
|
2022-09-19 14:05:16 -04:00
|
|
|
data, err := io.ReadAll(f)
|
2022-06-23 12:25:15 -04:00
|
|
|
if err != nil {
|
|
|
|
writeErrorResponseJSON(ctx, w, importErrorWithAPIErr(ctx, ErrInvalidRequest, err, stsUserPolicyMappingsFile, ""), r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
if err = json.Unmarshal(data, &userPolicyMap); err != nil {
|
|
|
|
writeErrorResponseJSON(ctx, w, importErrorWithAPIErr(ctx, ErrAdminConfigBadJSON, err, stsUserPolicyMappingsFile, ""), r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
for u, pm := range userPolicyMap {
|
|
|
|
// disallow setting policy mapping if user is a temporary user
|
|
|
|
ok, _, err := globalIAMSys.IsTempUser(u)
|
|
|
|
if err != nil && err != errNoSuchUser {
|
|
|
|
writeErrorResponseJSON(ctx, w, importError(ctx, err, stsUserPolicyMappingsFile, u), r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
if ok {
|
|
|
|
writeErrorResponseJSON(ctx, w, importError(ctx, errIAMActionNotAllowed, stsUserPolicyMappingsFile, u), r.URL)
|
|
|
|
return
|
|
|
|
}
|
2022-08-23 14:11:45 -04:00
|
|
|
if _, err := globalIAMSys.PolicyDBSet(ctx, u, pm.Policies, stsUser, false); err != nil {
|
2022-06-23 12:25:15 -04:00
|
|
|
writeErrorResponseJSON(ctx, w, importError(ctx, err, stsUserPolicyMappingsFile, u), r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// import sts group policy mappings
|
|
|
|
{
|
2022-07-21 20:51:33 -04:00
|
|
|
f, err := zr.Open(pathJoin(iamAssetsDir, stsGroupPolicyMappingsFile))
|
2022-06-23 12:25:15 -04:00
|
|
|
switch {
|
|
|
|
case errors.Is(err, os.ErrNotExist):
|
|
|
|
case err != nil:
|
|
|
|
writeErrorResponseJSON(ctx, w, importErrorWithAPIErr(ctx, ErrInvalidRequest, err, stsGroupPolicyMappingsFile, ""), r.URL)
|
|
|
|
return
|
|
|
|
default:
|
|
|
|
defer f.Close()
|
|
|
|
var grpPolicyMap map[string]MappedPolicy
|
2022-09-19 14:05:16 -04:00
|
|
|
data, err := io.ReadAll(f)
|
2022-06-23 12:25:15 -04:00
|
|
|
if err != nil {
|
|
|
|
writeErrorResponseJSON(ctx, w, importErrorWithAPIErr(ctx, ErrInvalidRequest, err, stsGroupPolicyMappingsFile, ""), r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
if err = json.Unmarshal(data, &grpPolicyMap); err != nil {
|
|
|
|
writeErrorResponseJSON(ctx, w, importErrorWithAPIErr(ctx, ErrAdminConfigBadJSON, err, stsGroupPolicyMappingsFile, ""), r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
for g, pm := range grpPolicyMap {
|
2022-08-23 14:11:45 -04:00
|
|
|
if _, err := globalIAMSys.PolicyDBSet(ctx, g, pm.Policies, unknownIAMUserType, true); err != nil {
|
2022-06-23 12:25:15 -04:00
|
|
|
writeErrorResponseJSON(ctx, w, importError(ctx, err, stsGroupPolicyMappingsFile, g), r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2023-12-15 16:00:43 -05:00
|
|
|
|
|
|
|
func commonAddServiceAccount(r *http.Request) (context.Context, auth.Credentials, newServiceAccountOpts, madmin.AddServiceAccountReq, string, APIError) {
|
|
|
|
ctx := r.Context()
|
|
|
|
|
|
|
|
// Get current object layer instance.
|
|
|
|
objectAPI := newObjectLayerFn()
|
|
|
|
if objectAPI == nil || globalNotificationSys == nil {
|
|
|
|
return ctx, auth.Credentials{}, newServiceAccountOpts{}, madmin.AddServiceAccountReq{}, "", errorCodes.ToAPIErr(ErrServerNotInitialized)
|
|
|
|
}
|
|
|
|
|
|
|
|
cred, owner, s3Err := validateAdminSignature(ctx, r, "")
|
|
|
|
if s3Err != ErrNone {
|
|
|
|
return ctx, auth.Credentials{}, newServiceAccountOpts{}, madmin.AddServiceAccountReq{}, "", errorCodes.ToAPIErr(s3Err)
|
|
|
|
}
|
|
|
|
|
|
|
|
password := cred.SecretKey
|
|
|
|
reqBytes, err := madmin.DecryptData(password, io.LimitReader(r.Body, r.ContentLength))
|
|
|
|
if err != nil {
|
|
|
|
return ctx, auth.Credentials{}, newServiceAccountOpts{}, madmin.AddServiceAccountReq{}, "", errorCodes.ToAPIErrWithErr(ErrAdminConfigBadJSON, err)
|
|
|
|
}
|
|
|
|
|
|
|
|
var createReq madmin.AddServiceAccountReq
|
|
|
|
if err = json.Unmarshal(reqBytes, &createReq); err != nil {
|
|
|
|
return ctx, auth.Credentials{}, newServiceAccountOpts{}, madmin.AddServiceAccountReq{}, "", errorCodes.ToAPIErrWithErr(ErrAdminConfigBadJSON, err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// service account access key cannot have space characters beginning and end of the string.
|
|
|
|
if hasSpaceBE(createReq.AccessKey) {
|
|
|
|
return ctx, auth.Credentials{}, newServiceAccountOpts{}, madmin.AddServiceAccountReq{}, "", errorCodes.ToAPIErr(ErrAdminResourceInvalidArgument)
|
|
|
|
}
|
|
|
|
|
|
|
|
if err := createReq.Validate(); err != nil {
|
|
|
|
// Since this validation would happen client side as well, we only send
|
|
|
|
// a generic error message here.
|
|
|
|
return ctx, auth.Credentials{}, newServiceAccountOpts{}, madmin.AddServiceAccountReq{}, "", errorCodes.ToAPIErr(ErrAdminResourceInvalidArgument)
|
|
|
|
}
|
|
|
|
// If the request did not set a TargetUser, the service account is
|
|
|
|
// created for the request sender.
|
|
|
|
targetUser := createReq.TargetUser
|
|
|
|
if targetUser == "" {
|
|
|
|
targetUser = cred.AccessKey
|
|
|
|
}
|
|
|
|
|
|
|
|
description := createReq.Description
|
|
|
|
if description == "" {
|
|
|
|
description = createReq.Comment
|
|
|
|
}
|
|
|
|
opts := newServiceAccountOpts{
|
|
|
|
accessKey: createReq.AccessKey,
|
|
|
|
secretKey: createReq.SecretKey,
|
|
|
|
name: createReq.Name,
|
|
|
|
description: description,
|
|
|
|
expiration: createReq.Expiration,
|
|
|
|
claims: make(map[string]interface{}),
|
|
|
|
}
|
|
|
|
|
|
|
|
// Check if action is allowed if creating access key for another user
|
|
|
|
// Check if action is explicitly denied if for self
|
|
|
|
if !globalIAMSys.IsAllowed(policy.Args{
|
|
|
|
AccountName: cred.AccessKey,
|
|
|
|
Groups: cred.Groups,
|
|
|
|
Action: policy.CreateServiceAccountAdminAction,
|
|
|
|
ConditionValues: getConditionValues(r, "", cred),
|
|
|
|
IsOwner: owner,
|
|
|
|
Claims: cred.Claims,
|
|
|
|
DenyOnly: (targetUser == cred.AccessKey || targetUser == cred.ParentUser),
|
|
|
|
}) {
|
|
|
|
return ctx, auth.Credentials{}, newServiceAccountOpts{}, madmin.AddServiceAccountReq{}, "", errorCodes.ToAPIErr(ErrAccessDenied)
|
|
|
|
}
|
|
|
|
|
|
|
|
var sp *policy.Policy
|
|
|
|
if len(createReq.Policy) > 0 {
|
|
|
|
sp, err = policy.ParseConfig(bytes.NewReader(createReq.Policy))
|
|
|
|
if err != nil {
|
|
|
|
return ctx, auth.Credentials{}, newServiceAccountOpts{}, madmin.AddServiceAccountReq{}, "", toAdminAPIErr(ctx, err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
opts.sessionPolicy = sp
|
|
|
|
|
|
|
|
return ctx, cred, opts, createReq, targetUser, APIError{}
|
|
|
|
}
|