Skip to content

wenisch-tech/s3webui

Repository files navigation

S3 Web UI

CI GitHub Release License: AGPL v3 Container Signed

Buckets dark A modern, clean graphical web interface for S3-compatible object storage, with optional OIDC Support, audit history and clientside multipart upload built with Spring Boot and Bootstrap 5.

Screenshots

Dark theme by default — switch to light with the toggle in the top-right corner.

Dark theme — Bucket browser Upload modal with progress Light theme
Bucket browser dark Upload modal Buckets light

Features

  • Browse buckets — list all buckets with creation date
  • Navigate folders — browse objects with breadcrumb navigation
  • Create buckets — create new buckets directly from the UI
  • Upload files — client-side multipart upload with real-time progress bar and ETA
  • Download files — download any object in a single click
  • Rename objects — rename files without re-uploading
  • Delete — delete individual objects or entire buckets
  • Folder support — create virtual folders (prefix-based)
  • Audit history — per-session activity log (uploads, downloads, deletes, renames) with user and action filters
  • Dark / Light theme — toggle stored in localStorage, dark is the default
  • OIDC / Keycloak — optional single-sign-on with role-based access control

Configuration

All settings are provided via environment variables:

S3 connection

Variable Description Default
S3_ACCESS_KEY S3 access key / username minioadmin
S3_SECRET_KEY S3 secret key / password minioadmin
S3_ENDPOINT_URL S3-compatible endpoint URL http://localhost:9000
S3_REGION AWS region (optional) us-east-1
S3_INSECURE_SKIP_TLS_VERIFY Skip TLS certificate verification for S3 endpoint false

OIDC / Keycloak (optional)

Variable Description Default
OIDC_ENABLED Enable OIDC authentication false
OIDC_CLIENT_ID OAuth2 client ID
OIDC_CLIENT_SECRET OAuth2 client secret
OIDC_ISSUER_URI Keycloak realm issuer URI (e.g. http://keycloak:8080/realms/myrealm)
OIDC_REQUIRED_ROLE Keycloak realm role required to access the app (optional)
OIDC_INSECURE_SKIP_TLS_VERIFY Skip TLS certificate verification for the OIDC issuer false

When OIDC_ENABLED=true, unauthenticated users are redirected to the login page where they can sign in via Keycloak.
If OIDC_REQUIRED_ROLE is set, users without that realm role receive an Access Denied page.

Running locally

Prerequisites: Java 17+, Maven 3.9+

Without OIDC

export S3_ACCESS_KEY=your-access-key
export S3_SECRET_KEY=your-secret-key
export S3_ENDPOINT_URL=http://your-s3-endpoint:9000
export S3_REGION=us-east-1

mvn spring-boot:run

Then open http://localhost:8080 in your browser.

With Keycloak OIDC

export S3_ACCESS_KEY=your-access-key
export S3_SECRET_KEY=your-secret-key
export S3_ENDPOINT_URL=http://your-s3-endpoint:9000

export OIDC_ENABLED=true
export OIDC_CLIENT_ID=s3webui
export OIDC_CLIENT_SECRET=your-client-secret
export OIDC_ISSUER_URI=http://localhost:8180/realms/myrealm
# Optional — require a specific Keycloak realm role:
export OIDC_REQUIRED_ROLE=s3-access

mvn spring-boot:run

Keycloak setup: Create a client in your realm with:

  • Client Protocol: openid-connect
  • Access Type: confidential
  • Valid Redirect URIs: http://localhost:8080/*
  • Set OIDC_ISSUER_URI to http://<keycloak-host>/realms/<realm-name>

Quick start with MinIO

# Start MinIO
docker run -d -p 9000:9000 -p 9001:9001 \
  -e MINIO_ROOT_USER=minioadmin \
  -e MINIO_ROOT_PASSWORD=minioadmin \
  minio/minio server /data --console-address ":9001"

# Start S3 Web UI
docker run -d -p 8080:8080 \
  -e S3_ACCESS_KEY=minioadmin \
  -e S3_SECRET_KEY=minioadmin \
  -e S3_ENDPOINT_URL=http://host.docker.internal:9000 \
  ghcr.io/wenisch-tech/s3webui:latest

Docker

docker run -d -p 8080:8080 \
  -e S3_ACCESS_KEY=your-access-key \
  -e S3_SECRET_KEY=your-secret-key \
  -e S3_ENDPOINT_URL=http://your-s3-endpoint:9000 \
  -e S3_REGION=us-east-1 \
  ghcr.io/wenisch-tech/s3webui:latest

With Keycloak OIDC:

docker run -d -p 8080:8080 \
  -e S3_ACCESS_KEY=your-access-key \
  -e S3_SECRET_KEY=your-secret-key \
  -e S3_ENDPOINT_URL=http://minio:9000 \
  -e OIDC_ENABLED=true \
  -e OIDC_CLIENT_ID=s3webui \
  -e OIDC_CLIENT_SECRET=your-client-secret \
  -e OIDC_ISSUER_URI=http://keycloak:8080/realms/myrealm \
  -e OIDC_REQUIRED_ROLE=s3-access \
  ghcr.io/wenisch-tech/s3webui:latest

Helm chart

helm repo add wenisch-tech https://charts.wenisch.tech
helm repo update

helm install s3webui wenisch-tech/s3webui \
  --set env.S3_ENDPOINT_URL=http://minio:9000 \
  --set secrets.S3_ACCESS_KEY=your-access-key \
  --set secrets.S3_SECRET_KEY=your-secret-key

Example values.yaml with OIDC

env:
  S3_ENDPOINT_URL: "http://minio.minio.svc.cluster.local:9000"
  S3_REGION: "us-east-1"
  OIDC_ENABLED: "true"
  OIDC_CLIENT_ID: "s3webui"
  OIDC_ISSUER_URI: "http://keycloak.auth.svc.cluster.local:8080/realms/myrealm"
  OIDC_REQUIRED_ROLE: "s3-access"

secrets:
  S3_ACCESS_KEY: "your-access-key"
  S3_SECRET_KEY: "your-secret-key"
  OIDC_CLIENT_SECRET: "your-client-secret"

ingress:
  enabled: true
  className: nginx
  hosts:
    - host: s3webui.example.com
      paths:
        - path: /
          pathType: Prefix

Building from source

mvn -B package -DskipTests
java -jar target/s3webui-*.jar

Architecture

src/main/java/tech/wenisch/s3webui/
├── S3WebUiApplication.java          # Spring Boot entry point
├── config/
│   ├── S3Config.java                # S3Client / S3Presigner beans
│   ├── SecurityConfig.java          # Spring Security (permit-all or OIDC)
│   ├── GlobalModelAttributes.java   # Injects oidcEnabled into all templates
│   ├── FileIconHelper.java          # Maps file extension → Bootstrap icon
│   └── FileSizeFormatter.java       # Formats byte counts for display
├── controller/
│   ├── UiController.java            # Thymeleaf MVC (buckets, bucket, history, login, access-denied)
│   ├── S3ApiController.java         # REST API (CRUD + multipart upload)
│   └── AuditController.java         # REST API for the in-memory audit history
├── service/
│   ├── S3Service.java               # All S3 SDK interactions
│   └── AuditHistoryService.java     # In-memory session-scoped audit event store
└── model/
    ├── BucketDto.java
    ├── S3ObjectDto.java
    ├── AuditEvent.java
    └── CompleteMultipartRequest.java

Upload flow

Files ≤ 5 MB are uploaded via a simple multipart form POST through the backend.

Files > 5 MB use server-proxied S3 multipart upload:

  1. Browser calls POST /api/buckets/{b}/multipart/initiate to get an uploadId
  2. For each 5 MB chunk, the browser PUTs the raw bytes to PUT /api/buckets/{b}/multipart/part — the backend forwards the chunk directly to S3 using the AWS SDK and returns the ETag
  3. Browser calls POST /api/buckets/{b}/multipart/complete to finish the upload

Routing parts through the backend avoids cross-origin (CORS) issues that would occur if the browser PUTted directly to the S3 endpoint.

Progress percentage and estimated time remaining are computed entirely in the browser using XMLHttpRequest upload events.

Contributing

Pull requests welcomed.

Please note : CVE scanning via Trivy is an essential part of the development process and runs automatically on every pull request. Fixing identified vulnerabilities is a mandatory step before merging.

License

AGPL-3.0 — see LICENSE for details.

Copyright (C) 2026 Jean-Fabian Wenisch / wenisch.tech

About

A modern, clean graphical web interface for S3-compatible object storage, with optional OIDC Support, audit history and clientside multipart upload built with Spring Boot and Bootstrap 5.

Topics

Resources

License

Stars

Watchers

Forks

Packages

 
 
 

Contributors