Python client for managing IAM policies fine grained access control in IBM Cloud Object Storage
Project description
cosaccess
Setup
pip install coaccess
Manage IBM Cloud COS access privileges on bucket and object level
Example usage
from cosaccess import CosAccessManager
cosaccess = CosAccessManager('<your api key here>')
cosaccess.get_policies_for_cos_bucket('<your bucket name>')
Demo
Here is a little demo notebook that shows a few more usage examples.
CosAccessManager method list
Initialization
CosAccessManager(apikey, account_id=None)
Constructor.apikey
: IAM API key.account_id
: The IBM Cloud account holding the COS instance(s) for which you want to manage access. Default is the account of the provided API Key.
Retrieving Access Policies
get_policies_for_cos_bucket(cosBucket, prefix = None, roles = None):
Returns a dataframe with all policies defined on the COS bucket. When prefix is provided the results only show polcies that are relevant for access to that prefix path. When a list of roles is provided only policies that assign at least on of these roles are returned.get_policy(policy_id)
Returns a JSON dict with all policy details for the provided policy IDlist_policies(roles = None)
Returns an array of JSON dicts with all policies and their details in the account. When a list of roles is provided only policies that assign at least on of these roles are returned.list_policies_for_service(serviceName, roles = None)
Returns an array of JSON dicts with all policies and their details specified for the provided service type (e.g.,cloud-object-storage
). When a list of roles is provided only policies that assign at least on of these roles are returned.list_policies_for_cos_instance(cosServiceInstance, roles = None)
Returns an array of JSON dicts with all policies and their details specified COS service instance ID. When a list of roles is provided only policies that assign at least on of these roles are returned.list_policies_for_cos_bucket(cosBucket, prefix = None, roles = None):
Returns an array of JSON dicts with all policies defined on the COS bucket. When prefix is provided the results only show polcies that are relevant for access to that prefix path. When a list of roles is provided only policies that assign at least on of these roles are returned.
CRUD for Access Policies
grant_bucket_access(roles, cos_bucket, prefixes = None, access_group = None, iam_id = None)
Create new access policy for the COS bucket and optionally prefixupdate_bucket_access(policy_id, roles, cos_bucket, prefixes = None, access_group = None, iam_id = None)
Overwrites an existing access policy for the COS bucket and optionally prefixremove_bucket_access(policy_id)
Deletes an existing access policy
COS Helper Methods
get_cos_instance_id(bucket)
Returns the instance ID of the COS instance holding the provided COS bucket
Working with Users
get_users()
Returns a dataframe with all users and their details in the accountget_user_iam_id(user_id):
Get the IAM ID of a user specified by name (IBM ID email address)get_user_name(iam_id)
Get user name in format<given name> <last name> <email>
for a given IAM ID
Working with Service IDs
get_service_ids()
Returns a dataframe with all Service IDs and their details in the accountget_service_id_iam_id(service_id):
Get the IAM ID of a Service ID specified by Service ID nameget_service_id_name(iam_id)
Get Service ID name for a given IAM IDget_service_id_details(service_id_name, service_id)
Return the details of a service ID identified by either name or ID.create_service_id(service_id_name, with_apikey)
Create a new service ID. When optional parameter with_apikey is set to True there will also be an API krey created and assoctiated with the new service IDdelete_service_id(service_id_name, service_id)
Delete a service ID identified by either name or ID.
Working with Access Groups
get_access_groups()
Returns a dataframe with all acces groups and their details in the accountget_access_group_id(access_group)
Get the access group ID for an access group nameget_access_group_name(access_group_id)
Get the access group name for an access group IDget_access_group_members(access_group_name, access_group_id)
Return a dataframe with all members of an access group identified by either name or IDadd_member_to_access_group(access_group_name, access_group_id, user_name, user_id, service_id_name, service_id)
Add a new member (either a user or a Service ID) to an access group identified by either name or IDdelete_member_from_access_groupaccess_group_name, access_group_id, user_name, user_id, service_id_name, service_id)
Remove a member (either a user or a Service ID) from an access group identified by either name or IDcreate_access_group(access_group_name)
Create a new access groupdelete_access_group(access_group_name, access_group_id, force)
Delete an access group identified by either name or ID. Set force to True to delete the group also when it still has members.
Building and testing the library locally
Set up Python environment
Run source ./setup_env.sh
which creates and activates a clean virtual Python environment.
Install the local code in your Python environment
Run ./_install.sh
.
Test the library locally
- Create a file
cosaccess/test_credentials.py
with the IBM Cloud IAM API Key:
apikey='<your IBM Cloud API key>'
you can use the template file cosaccess/test_credentials.py.template
- Run
python cosaccess/test.py
.
Packaging and publishing distribution
- Make sure to increase
version=...
insetup.py
before creating a new package. - Run
package.sh
. It will prompt for user and password that must be authorized for packagecosaccess
on pypi.org.
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
cosaccess-0.1.18.tar.gz
(13.0 kB
view details)
File details
Details for the file cosaccess-0.1.18.tar.gz
.
File metadata
- Download URL: cosaccess-0.1.18.tar.gz
- Upload date:
- Size: 13.0 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/4.0.2 CPython/3.11.5
File hashes
Algorithm | Hash digest | |
---|---|---|
SHA256 | aafa8156b4bc5fd68f97e29b10091bbfa422eb596b4aabb765b592d996198f9d |
|
MD5 | cbd24226475c6ccb0ecb2595fcb6762d |
|
BLAKE2b-256 | 9af06546ce39600305012174e7ac60c7b1cee4803fd146c7c5a933c501c32fcf |