Skip to main content

Declare what MinIO buckets, IAM policies, ILM policies you want, and let MinIO Manager do the work.

Project description

minio-manager

Release Build status Commit activity License

Declare what MinIO buckets, IAM policies, ILM policies you want, and let MinIO Manager do the work.

Description

The concept for management is to have so-called "bucket groups".

Each bucket group is managed by an account that only has access to buckets in that group.

It should be noted that this is explicitly intended for the creation and updating of resources in MinIO. It does not delete any resources anywhere.

Requirements

Getting started with your project

Install the environment and the pre-commit hooks with

make install

You are now ready to start development on your project! The CI/CD pipeline will be triggered when you open a pull request, merge to main, or when you create a new release.

To finalize the set-up for publishing to PyPi or Artifactory, see here. For activating the automatic documentation with MkDocs, see here. To enable the code coverage reports, see here.

Releasing a new version

Set up

An admin user should be used for these steps.

  1. Create the bucket for the secret backend minio-manager-secrets

    mc mb $ALIAS/minio-manager-secrets

  2. Create a user (either in MinIO or your identity provider)

    You can use mc admin user add $ALIAS minio-manager for a MinIO user

  3. Create a policy that gives read/write access to the bucket for the secret backend

    You can use the example provided in the examples directory:

    mc admin policy create $ALIAS minio-manager examples/minio-manager-secrets-policy.json

  4. Attach the policy to the user:

    • For MinIO: mc admin policy attach $ALIAS minio-manager --user=minio-manager
    • For LDAP: mc idp ldap policy attach $ALIAS minio-manager --user='uid=minio-manager,cn=users,dc=your,dc=domain'
  5. Upload your secret backend (e.g. secrets.kdbx) to the bucket root

  6. Create a MinIO service account/access key with either option:

    • mc admin user svcacct add $ALIAS minio-manager and note down the access and secret keys
  7. Copy .env.example to .env and set the following variables to the obtained keys

    • MINIO_MANAGER_SECRET_BACKEND_S3_ACCESS_KEY
    • MINIO_MANAGER_SECRET_BACKEND_S3_SECRET_KEY
  8. Configure the other variables in the .env file. Descriptions of each variable can be found in the Environment variables section

  9. Each "bucket group" manager user must get its own policy.

    1. You can find an example in examples/bucket-group-user-policy.json
    2. mc admin policy create $ALIAS infra-test-manager examples/bucket-group-user-policy.json
    3. mc idp ldap policy attach $ALIAS infra-test-manager --user='uid=infra-test-manager,cn=users,dc=your,dc=domain'
  10. You can then log in to the web console with this user to create an access key exactly like how we did it previously

MinIO

At least two users are required in MinIO. One with access to a single bucket containing the secret backend, all other users are to be used as "bucket group" managers. For each bucket created under this manager user a service account (or access key in S3/MinIO terms) will be created.

Secret manager

This is the controller user, that is able to authenticate to the secret backend, in order to retrieve the credentials to the service accounts

Secret backend

By default we are storing our Keepass database inside a MinIO bucket. You can specify the name of this backend bucket by using the MINIO_MANAGER_SECRET_BACKEND_S3_BUCKET variable. In addition, you have to specify the password of this database with MINIO_MANAGER_SECRET_BACKEND_S3_SECRET_KEY, so that the controller user specified in MINIO_MANAGER_SECRET_BACKEND_S3_ACCESS_KEY can access it.

We highly recommend to pass these variables via masked and/or protected variables.

Service accounts

Service accounts are used in order to create buckets, they are also the owner of these buckets. By default we have a one-on-one relationship between service accounts and buckets.

However, there is an option to give ownership of multiple bucket to one service account. By specifying create_service_account: False for a bucket in the environment's resource.yaml. But you do have to specify the ownership through a policy_file:

buckets:
  - name: infra-test-without-sa
    create_service_account: False
service_accounts:
  - name: infra-test-for-multiple-sa
    policy_file: service_account_policies/infra-test-two-buckets.json

The Resource section of this json will specify which bucket this service account has ownership of, in this example infra-test-two-buckets.json the service account will get ownership over 2 buckets and all of its objects:

"Resource": [
                "arn:aws:s3:::infra-test-without-sa",
                "arn:aws:s3:::infra-test-without-sa/*",
                "arn:aws:s3:::infra-test-multiple-access",
                "arn:aws:s3:::infra-test-multiple-access/*"
            ]

Resources

Resources that should be deployed are to be specified in each environments resource.yaml. There are currently 5 resources supported; buckets, bucket_policies, service_accounts, iam_policies, and iam_policy_attachments.

Buckets

Buckets are used to organize and store objects. The resource.yaml supports the following properties:

Property Required Description Default Example
name YES Specify the name of the bucket None infra-test-tomato-bucket
create_service_account NO Do you want to automatically create a service account that has ownership of this bucket? TRUE FALSE
object_lifecycle_file NO Specify the lifecycle policy that you want to attach to this bucket None lifecycle_policies/my_lifecycle.json
versioning NO Do you want to enable versioning for this bucket? TRUE FALSE
Bucket policies

Bucket policies are used to restrict bucket access or action on a bucket level. The resource.yaml supports the following properties:

Property Required Description Default Example
name YES Specify the name of the bucket None infra-test-tomato-bucket
policy_file YES Specify the name of the policy that should be assigned to the bucket None bucket_policies/my_bucketpolicy.json

Service accounts

Service accounts are, by default, automatically created when creating a bucket. However, it is possible to create them seperately. The resource.yaml supports the following properties:

Property Required Description Default Example
name YES Specify the name of the service account None infra-test-tomato-bucket
policy_file NO Specify the policy file for this service account None user_policies/my_user.json

IAM policies

IAM policies consist of actions and resources to which an authenticated user has access. Each policy describes one or more actions and conditions that outline the permissions of a user or group of users. The resource.yaml supports the following properties:

Property Required Description Default Example
name YES Specify the name of the IAM policy None infra-test-adminpolicy
policy_file YES Specify the policy file to use for this policy None iam_policies/my_iam.json

IAM policy attachment

For IAM policies to be effective we have to attach them to users. The resource.yaml supports the following properties:

Property Required Description Default Example
username YES Specify the username which should get a specific policy assigned None my-user
policies YES Specify a list of policies to assign to this specific username None policy-1

Keepass

The Keepass database's root group must be named "Passwords".

You must have a group called "s3" and subgroups with the name of each MinIO cluster.

Entry names must be unique.

Entries are found by way of the title of the entry, the username is not considered when searching.

Environment variables

Required

  • MINIO_MANAGER_CLUSTER_NAME The name of the cluster, used for example in the secret backend
  • MINIO_MANAGER_S3_ENDPOINT What host:port to use as MinIO/S3 endpoint
  • MINIO_MANAGER_MINIO_CONTROLLER_USER The entry of the MinIO controller user in the secret backend that contains its access and secret keys
  • MINIO_MANAGER_SECRET_BACKEND_TYPE What secret backend to use. Currently only keepass is supported
  • MINIO_MANAGER_SECRET_BACKEND_S3_ACCESS_KEY The access key to the S3 bucket where the secret database is stored
  • MINIO_MANAGER_SECRET_BACKEND_S3_SECRET_KEY The secret key to the S3 bucket where the secret database is stored

Required for Keepass

  • MINIO_MANAGER_KEEPASS_PASSWORD Keepass database password

Optional

  • MINIO_MANAGER_CLUSTER_RESOURCES_FILE The YAML file with the MinIO resource configuration (buckets, policies, etc.), defaults to resources.yaml
  • MINIO_MANAGER_MINIO_ENDPOINT_SECURE Whether to use HTTPS for the endpoint. Defaults to True
  • MINIO_MANAGER_SECRET_BACKEND_S3_BUCKET The name of the bucket where the secret backend is kept. Defaults to minio-manager-secrets
  • MINIO_MANAGER_KEEPASS_FILE The name of the database file in the S3 bucket. Defaults to secrets.kdbx
  • MINIO_MANAGER_LOG_LEVEL The log level of the application. Defaults to INFO, may also use DEBUG
  • MINIO_MANAGER_DEFAULT_BUCKET_VERSIONING What bucket versioning level to use for all buckets by default if not specified on the bucket level. Defaults to "Suspended", can also configure "Enabled"
  • MINIO_MANAGER_DEFAULT_LIFECYCLE_POLICY What lifecycle policy (in mc ilm export format) to attach to all buckets by default
  • MINIO_MANAGER_DEFAULT_BUCKET_CREATE_SERVICE_ACCOUNT Whether to automatically create service accounts for each bucket with access to just that bucket. Defaults to False
  • MINIO_MANAGER_SERVICE_ACCOUNT_POLICY_BASE_FILE What policy to use as a base for a service account when automatically generated, defaults to service-account-policy-base.json. MUST contain BUCKET_NAME_REPLACE_ME in the resources
  • MINIO_MANAGER_ALLOWED_BUCKET_PREFIX If using multiple controller users, this defines what bucket names are allowed to be parsed.

To do features

Check the open enhancement issues.


Repository initiated with fpgmaas/cookiecutter-pdm.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

minio_manager-0.2.0b2.tar.gz (22.5 kB view details)

Uploaded Source

Built Distribution

minio_manager-0.2.0b2-py3-none-any.whl (24.8 kB view details)

Uploaded Python 3

File details

Details for the file minio_manager-0.2.0b2.tar.gz.

File metadata

  • Download URL: minio_manager-0.2.0b2.tar.gz
  • Upload date:
  • Size: 22.5 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? Yes
  • Uploaded via: pdm/2.12.4 CPython/3.10.12

File hashes

Hashes for minio_manager-0.2.0b2.tar.gz
Algorithm Hash digest
SHA256 6f0cf8fd546b4452f8ee816385e5288c4ec10eacce35cf4ed767ab537faa6a51
MD5 e65f69af37095a9d2419363995df52e9
BLAKE2b-256 efd2a6209bded77c6d5fb2c304d6beaf1dc82b6f1dbedf59431a06e8ca5e86f1

See more details on using hashes here.

File details

Details for the file minio_manager-0.2.0b2-py3-none-any.whl.

File metadata

File hashes

Hashes for minio_manager-0.2.0b2-py3-none-any.whl
Algorithm Hash digest
SHA256 8b2f4ee3c9383d7883c2f960818d08737dcdd87ddb4165c7133914b10ce5fa8e
MD5 09bbbe4652d4b28be47b5a013b204797
BLAKE2b-256 550e4305e331bebae11422daa0bb517da058e8292445594eb9797aad28cdd90f

See more details on using hashes here.

Supported by

AWS AWS Cloud computing and Security Sponsor Datadog Datadog Monitoring Fastly Fastly CDN Google Google Download Analytics Microsoft Microsoft PSF Sponsor Pingdom Pingdom Monitoring Sentry Sentry Error logging StatusPage StatusPage Status page