mirror of
https://github.com/minio/minio.git
synced 2024-12-26 15:15:55 -05:00
069432566f
Signed-off-by: Harshavardhana <harsha@minio.io>
108 lines
2.8 KiB
Go
108 lines
2.8 KiB
Go
// Copyright (c) 2015-2021 MinIO, Inc.
|
|
//
|
|
// This file is part of MinIO Object Storage stack
|
|
//
|
|
// This program is free software: you can redistribute it and/or modify
|
|
// it under the terms of the GNU Affero General Public License as published by
|
|
// the Free Software Foundation, either version 3 of the License, or
|
|
// (at your option) any later version.
|
|
//
|
|
// This program is distributed in the hope that it will be useful
|
|
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
// GNU Affero General Public License for more details.
|
|
//
|
|
// You should have received a copy of the GNU Affero General Public License
|
|
// along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
package iampolicy
|
|
|
|
import (
|
|
"github.com/minio/minio/pkg/bucket/policy"
|
|
"github.com/minio/minio/pkg/bucket/policy/condition"
|
|
)
|
|
|
|
// Policy claim constants
|
|
const (
|
|
PolicyName = "policy"
|
|
SessionPolicyName = "sessionPolicy"
|
|
)
|
|
|
|
// ReadWrite - provides full access to all buckets and all objects
|
|
var ReadWrite = Policy{
|
|
Version: DefaultVersion,
|
|
Statements: []Statement{
|
|
{
|
|
SID: policy.ID(""),
|
|
Effect: policy.Allow,
|
|
Actions: NewActionSet(AllActions),
|
|
Resources: NewResourceSet(NewResource("*", "")),
|
|
},
|
|
},
|
|
}
|
|
|
|
// ReadOnly - read only.
|
|
var ReadOnly = Policy{
|
|
Version: DefaultVersion,
|
|
Statements: []Statement{
|
|
{
|
|
SID: policy.ID(""),
|
|
Effect: policy.Allow,
|
|
Actions: NewActionSet(GetBucketLocationAction, GetObjectAction),
|
|
Resources: NewResourceSet(NewResource("*", "")),
|
|
},
|
|
},
|
|
}
|
|
|
|
// WriteOnly - provides write access.
|
|
var WriteOnly = Policy{
|
|
Version: DefaultVersion,
|
|
Statements: []Statement{
|
|
{
|
|
SID: policy.ID(""),
|
|
Effect: policy.Allow,
|
|
Actions: NewActionSet(PutObjectAction),
|
|
Resources: NewResourceSet(NewResource("*", "")),
|
|
},
|
|
},
|
|
}
|
|
|
|
// AdminDiagnostics - provides admin diagnostics access.
|
|
var AdminDiagnostics = Policy{
|
|
Version: DefaultVersion,
|
|
Statements: []Statement{
|
|
{
|
|
SID: policy.ID(""),
|
|
Effect: policy.Allow,
|
|
Actions: NewActionSet(ProfilingAdminAction,
|
|
TraceAdminAction, ConsoleLogAdminAction,
|
|
ServerInfoAdminAction, TopLocksAdminAction,
|
|
HealthInfoAdminAction, BandwidthMonitorAction,
|
|
PrometheusAdminAction,
|
|
),
|
|
Resources: NewResourceSet(NewResource("*", "")),
|
|
},
|
|
},
|
|
}
|
|
|
|
// Admin - provides admin all-access canned policy
|
|
var Admin = Policy{
|
|
Version: DefaultVersion,
|
|
Statements: []Statement{
|
|
{
|
|
SID: policy.ID(""),
|
|
Effect: policy.Allow,
|
|
Actions: NewActionSet(AllAdminActions),
|
|
Resources: NewResourceSet(),
|
|
Conditions: condition.NewFunctions(),
|
|
},
|
|
{
|
|
SID: policy.ID(""),
|
|
Effect: policy.Allow,
|
|
Actions: NewActionSet(AllActions),
|
|
Resources: NewResourceSet(NewResource("*", "")),
|
|
Conditions: condition.NewFunctions(),
|
|
},
|
|
},
|
|
}
|