Skip to content

feat: add replicationAdmin and securityAuditAdmin canned policies#227

Open
varun0630 wants to merge 7 commits intominio:mainfrom
varun0630:replication-security-audit-policies
Open

feat: add replicationAdmin and securityAuditAdmin canned policies#227
varun0630 wants to merge 7 commits intominio:mainfrom
varun0630:replication-security-audit-policies

Conversation

@varun0630
Copy link
Copy Markdown
Contributor

Description

Adds two new scoped admin canned policies to DefaultPolicies:

  • replicationAdmin: site replication and bucket replication management
    (SiteReplication*, TablesReplication*, bucket replication config) but
    no IAM, general infrastructure, or S3 data access.
  • securityAuditAdmin: read-only access to IAM config, server topology,
    diagnostics, and bucket security settings for compliance auditing. Mirrors
    the intent of AWS SecurityAudit.
    No write or S3 data access.

Motivation and Context

Organizations need scoped admin roles beyond iamAdmin and infraAdmin.
replicationAdmin enables dedicated replication operators without granting
broad infra access. securityAuditAdmin enables compliance/security teams
to audit configuration without any mutation capabilities.

How to test

make test

Unit tests validating enforcement are in miniohq/eos (companion PR).

Varun Venkatesh and others added 4 commits March 19, 2026 04:33
tablesReadOnly mirrors AWS AmazonS3TablesReadOnlyAccess (Get* + List*).
tablesReadWrite adds data write, non-destructive table mutations, and
full view CRUD on top of read-only, without DDL (no create/delete
namespace or table).
…policy

The tablesReadWrite policy was missing S3TablesCreateTableAction, causing
all CreateTable requests from users with this policy to receive 403 Access
Denied even though the policy intent includes non-destructive table mutations.
Adds two new scoped admin canned policies to DefaultPolicies:

- replicationAdmin: site replication and bucket replication management
  (SiteReplication*, TablesReplication*, bucket replication config) but
  no IAM, general infrastructure, or S3 data access.

- securityAuditAdmin: read-only access to IAM config, server topology,
  diagnostics, and bucket security settings for compliance auditing.
  Mirrors the intent of AWS SecurityAudit. No write or S3 data access.
@varun0630 varun0630 requested a review from klauspost April 8, 2026 12:26
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants