mirror of
https://github.com/minio/minio.git
synced 2024-12-26 23:25:54 -05:00
37d066b563
This PR fixes couple of behaviors with service accounts - not need to have session token for service accounts - service accounts can be generated by any user for themselves implicitly, with a valid signature. - policy input for AddNewServiceAccount API is not fully typed allowing for validation before it is sent to the server. - also bring in additional context for admin API errors if any when replying back to client. - deprecate GetServiceAccount API as we do not need to reply back session tokens
178 lines
4.4 KiB
Go
178 lines
4.4 KiB
Go
/*
|
|
* MinIO Cloud Storage, (C) 2018-2020 MinIO, Inc.
|
|
*
|
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
* you may not use this file except in compliance with the License.
|
|
* You may obtain a copy of the License at
|
|
*
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
*
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
* See the License for the specific language governing permissions and
|
|
* limitations under the License.
|
|
*
|
|
*/
|
|
|
|
package madmin
|
|
|
|
import (
|
|
"context"
|
|
"encoding/json"
|
|
"io/ioutil"
|
|
"net/http"
|
|
"net/url"
|
|
|
|
iampolicy "github.com/minio/minio/pkg/iam/policy"
|
|
)
|
|
|
|
// InfoCannedPolicy - expand canned policy into JSON structure.
|
|
func (adm *AdminClient) InfoCannedPolicy(ctx context.Context, policyName string) (*iampolicy.Policy, error) {
|
|
queryValues := url.Values{}
|
|
queryValues.Set("name", policyName)
|
|
|
|
reqData := requestData{
|
|
relPath: adminAPIPrefix + "/info-canned-policy",
|
|
queryValues: queryValues,
|
|
}
|
|
|
|
// Execute GET on /minio/admin/v3/info-canned-policy
|
|
resp, err := adm.executeMethod(ctx, http.MethodGet, reqData)
|
|
|
|
defer closeResponse(resp)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
if resp.StatusCode != http.StatusOK {
|
|
return nil, httpRespToErrorResponse(resp)
|
|
}
|
|
|
|
return iampolicy.ParseConfig(resp.Body)
|
|
}
|
|
|
|
// ListCannedPolicies - list all configured canned policies.
|
|
func (adm *AdminClient) ListCannedPolicies(ctx context.Context) (map[string]*iampolicy.Policy, error) {
|
|
reqData := requestData{
|
|
relPath: adminAPIPrefix + "/list-canned-policies",
|
|
}
|
|
|
|
// Execute GET on /minio/admin/v3/list-canned-policies
|
|
resp, err := adm.executeMethod(ctx, http.MethodGet, reqData)
|
|
|
|
defer closeResponse(resp)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
if resp.StatusCode != http.StatusOK {
|
|
return nil, httpRespToErrorResponse(resp)
|
|
}
|
|
|
|
respBytes, err := ioutil.ReadAll(resp.Body)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
var policies = make(map[string]*iampolicy.Policy)
|
|
if err = json.Unmarshal(respBytes, &policies); err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
return policies, nil
|
|
}
|
|
|
|
// RemoveCannedPolicy - remove a policy for a canned.
|
|
func (adm *AdminClient) RemoveCannedPolicy(ctx context.Context, policyName string) error {
|
|
queryValues := url.Values{}
|
|
queryValues.Set("name", policyName)
|
|
|
|
reqData := requestData{
|
|
relPath: adminAPIPrefix + "/remove-canned-policy",
|
|
queryValues: queryValues,
|
|
}
|
|
|
|
// Execute DELETE on /minio/admin/v3/remove-canned-policy to remove policy.
|
|
resp, err := adm.executeMethod(ctx, http.MethodDelete, reqData)
|
|
|
|
defer closeResponse(resp)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
if resp.StatusCode != http.StatusOK {
|
|
return httpRespToErrorResponse(resp)
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
// AddCannedPolicy - adds a policy for a canned.
|
|
func (adm *AdminClient) AddCannedPolicy(ctx context.Context, policyName string, policy *iampolicy.Policy) error {
|
|
if policy == nil {
|
|
return ErrInvalidArgument("policy input cannot be empty")
|
|
}
|
|
|
|
if err := policy.Validate(); err != nil {
|
|
return err
|
|
}
|
|
|
|
buf, err := json.Marshal(policy)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
queryValues := url.Values{}
|
|
queryValues.Set("name", policyName)
|
|
|
|
reqData := requestData{
|
|
relPath: adminAPIPrefix + "/add-canned-policy",
|
|
queryValues: queryValues,
|
|
content: buf,
|
|
}
|
|
|
|
// Execute PUT on /minio/admin/v3/add-canned-policy to set policy.
|
|
resp, err := adm.executeMethod(ctx, http.MethodPut, reqData)
|
|
|
|
defer closeResponse(resp)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
if resp.StatusCode != http.StatusOK {
|
|
return httpRespToErrorResponse(resp)
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
// SetPolicy - sets the policy for a user or a group.
|
|
func (adm *AdminClient) SetPolicy(ctx context.Context, policyName, entityName string, isGroup bool) error {
|
|
queryValues := url.Values{}
|
|
queryValues.Set("policyName", policyName)
|
|
queryValues.Set("userOrGroup", entityName)
|
|
groupStr := "false"
|
|
if isGroup {
|
|
groupStr = "true"
|
|
}
|
|
queryValues.Set("isGroup", groupStr)
|
|
|
|
reqData := requestData{
|
|
relPath: adminAPIPrefix + "/set-user-or-group-policy",
|
|
queryValues: queryValues,
|
|
}
|
|
|
|
// Execute PUT on /minio/admin/v3/set-user-or-group-policy to set policy.
|
|
resp, err := adm.executeMethod(ctx, http.MethodPut, reqData)
|
|
defer closeResponse(resp)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
if resp.StatusCode != http.StatusOK {
|
|
return httpRespToErrorResponse(resp)
|
|
}
|
|
return nil
|
|
}
|