2023-01-08 07:37:07 +00:00
< p align = "center" >
2023-06-07 11:18:31 +00:00
< img src = "./.github/logo.svg" width = "500px" alt = "FrostFS logo" >
2023-01-08 07:37:07 +00:00
< / p >
2021-04-30 16:45:03 +00:00
< p align = "center" >
2022-12-16 08:37:22 +00:00
< a href = "https://frostfs.info" > FrostFS< / a > is a decentralized distributed object storage integrated with the < a href = "https://neo.org" > NEO Blockchain< / a > .
2021-04-30 16:45:03 +00:00
< / p >
---
2023-03-07 14:08:53 +00:00
[![Report ](https://goreportcard.com/badge/git.frostfs.info/TrueCloudLab/frostfs-http-gw )](https://goreportcard.com/report/git.frostfs.info/TrueCloudLab/frostfs-http-gw)
2023-06-06 13:00:31 +00:00
![Release ](https://img.shields.io/badge/dynamic/json.svg?label=release&url=https://git.frostfs.info/api/v1/repos/TrueCloudLab/frostfs-http-gw/releases&query=$[0].tag_name&color=orange )
![License ](https://img.shields.io/badge/license-GPL--3.0-orange.svg )
2021-04-30 16:45:03 +00:00
2022-12-16 08:37:22 +00:00
# FrostFS HTTP Gateway
2019-11-07 17:29:29 +00:00
2022-12-16 08:37:22 +00:00
FrostFS HTTP Gateway bridges FrostFS internal protocol and HTTP standard.
- you can download one file per request from the FrostFS Network
- you can upload one file per request into the FrostFS Network
2019-11-07 17:29:29 +00:00
2022-10-27 11:18:48 +00:00
See available routes in [specification ](./docs/api.md ).
2021-04-29 21:15:04 +00:00
## Installation
2023-03-07 14:08:53 +00:00
```go install git.frostfs.info/TrueCloudLab/frostfs-http-gw```
2021-04-29 21:15:04 +00:00
Or you can call `make` to build it from the cloned repository (the binary will
2022-12-16 08:37:22 +00:00
end up in `bin/frostfs-http-gw` ). To build frostfs-http-gw binary in clean docker
environment, call `make docker/bin/frostfs-http-gw` .
2021-04-29 21:15:04 +00:00
2022-06-07 16:58:33 +00:00
Other notable make targets:
2021-02-05 14:13:37 +00:00
```
2021-04-09 15:29:18 +00:00
dep Check and ensure dependencies
image Build clean docker image
2021-04-29 21:15:04 +00:00
dirty-image Build dirty docker image with host-built binaries
2022-06-07 17:10:23 +00:00
fmt Format the code
2021-04-09 15:29:18 +00:00
lint Run linters
version Show current version
2021-02-05 14:13:37 +00:00
```
2021-05-04 15:19:11 +00:00
Or you can also use a [Docker
2022-12-16 08:45:27 +00:00
image](https://hub.docker.com/r/truecloudlab/frostfs-http-gw) provided for the released
2022-04-21 08:35:57 +00:00
(and occasionally unreleased) versions of the gateway (`:latest` points to the
2021-05-04 15:19:11 +00:00
latest stable release).
2021-04-29 21:15:04 +00:00
## Execution
2019-11-07 17:29:29 +00:00
2022-12-16 08:37:22 +00:00
HTTP gateway itself is not a FrostFS node, so to access FrostFS it uses node's
2021-04-29 21:15:04 +00:00
gRPC interface and you need to provide some node that it will connect to. This
can be done either via `-p` parameter or via `HTTP_GW_PEERS_<N>_ADDRESS` and
`HTTP_GW_PEERS_<N>_WEIGHT` environment variables (the gate supports multiple
2022-12-16 08:37:22 +00:00
FrostFS nodes with weighted load balancing).
2021-04-29 21:15:04 +00:00
2023-03-24 09:35:22 +00:00
If you launch HTTP gateway in bundle with [frostfs-dev-env ](https://git.frostfs.info/TrueCloudLab/frostfs-dev-env ),
you can get the IP address of the node in the output of `make hosts` command
2022-12-20 11:01:50 +00:00
(with s0*.frostfs.devenv name).
2021-05-17 14:30:16 +00:00
2021-04-29 21:15:04 +00:00
These two commands are functionally equivalent, they run the gate with one
backend node (and otherwise default settings):
```
2022-12-16 08:37:22 +00:00
$ frostfs-http-gw -p 192.168.130.72:8080
$ HTTP_GW_PEERS_0_ADDRESS=192.168.130.72:8080 frostfs-http-gw
2021-04-29 21:15:04 +00:00
```
2021-06-09 16:26:27 +00:00
It's also possible to specify uri scheme (grpc or grpcs) when using `-p` :
```
2022-12-16 08:37:22 +00:00
$ frostfs-http-gw -p grpc://192.168.130.72:8080
$ HTTP_GW_PEERS_0_ADDRESS=grpcs://192.168.130.72:8080 frostfs-http-gw
2021-06-09 16:26:27 +00:00
```
2021-04-29 21:15:04 +00:00
2021-05-04 15:19:11 +00:00
## Configuration
2021-04-29 21:15:04 +00:00
In general, everything available as CLI parameter can also be specified via
2022-04-08 09:01:57 +00:00
environment variables (see [example ](./config/config.env )), so they're not specifically mentioned in most cases
2021-06-28 10:24:46 +00:00
(see `--help` also). If you prefer a config file you can use it in yaml format.
2021-04-29 21:15:04 +00:00
2021-12-07 11:57:16 +00:00
### Nodes: weights and priorities
2021-04-29 21:15:04 +00:00
2022-12-16 08:37:22 +00:00
You can specify multiple `-p` options to add more FrostFS nodes, this will make
2021-12-07 11:57:16 +00:00
gateway spread requests equally among them (using weight 1 and priority 1 for every node):
2021-04-29 21:15:04 +00:00
```
2022-12-16 08:37:22 +00:00
$ frostfs-http-gw -p 192.168.130.72:8080 -p 192.168.130.71:8080
2021-04-29 21:15:04 +00:00
```
2021-12-07 11:57:16 +00:00
If you want some specific load distribution proportions, use weights and priorities:
2021-04-29 21:15:04 +00:00
```
2021-12-07 11:57:16 +00:00
$ HTTP_GW_PEERS_0_ADDRESS=192.168.130.71:8080 HTTP_GW_PEERS_0_WEIGHT=1 HTTP_GW_PEERS_0_PRIORITY=1 \
HTTP_GW_PEERS_1_ADDRESS=192.168.130.72:8080 HTTP_GW_PEERS_1_WEIGHT=9 HTTP_GW_PEERS_1_PRIORITY=2 \
HTTP_GW_PEERS_2_ADDRESS=192.168.130.73:8080 HTTP_GW_PEERS_2_WEIGHT=1 HTTP_GW_PEERS_2_PRIORITY=2 \
2022-12-16 08:37:22 +00:00
frostfs-http-gw
2021-04-29 21:15:04 +00:00
```
2023-03-24 09:35:22 +00:00
This command will make gateway use 192.168.130.71 while it is healthy. Otherwise, it will make the gateway use
2021-12-07 11:57:16 +00:00
192.168.130.72 for 90% of requests and 192.168.130.73 for remaining 10%.
2021-04-29 21:15:04 +00:00
2021-05-04 15:19:11 +00:00
### Keys
2023-03-24 09:35:22 +00:00
You can provide a wallet via `--wallet` or `-w` flag. You can also specify the account address using `--address`
(if no address provided default one will be used). If wallet is used, you need to set `HTTP_GW_WALLET_PASSPHRASE` variable to decrypt the wallet.
2022-12-16 08:37:22 +00:00
If no wallet provided, the gateway autogenerates a key pair it will use for FrostFS requests.
2021-05-17 14:30:16 +00:00
```
2022-12-20 11:01:50 +00:00
$ frostfs-http-gw -p $FROSTFS_NODE -w $WALLET_PATH --address $ACCOUNT_ADDRESS
2021-05-17 14:30:16 +00:00
```
2021-06-22 11:53:59 +00:00
Example:
2021-04-29 21:15:04 +00:00
```
2022-12-16 08:37:22 +00:00
$ frostfs-http-gw -p 192.168.130.72:8080 -w wallet.json --address NfgHwwTi3wHAS8aFAN243C5vGbkYDpqLHP
2021-04-29 21:15:04 +00:00
```
2019-11-07 17:29:29 +00:00
2021-05-04 15:19:11 +00:00
### Binding and TLS
2021-04-29 21:15:04 +00:00
2022-07-19 14:06:17 +00:00
You can make the gateway listen on specific address using the `--listen_address` option.
2021-04-29 21:15:04 +00:00
2022-04-21 08:35:57 +00:00
It can also provide TLS interface for its users, just specify paths to the key and
2021-04-29 21:15:04 +00:00
certificate files via `--tls_key` and `--tls_certificate` parameters. Note
2022-04-21 08:35:57 +00:00
that using these options makes gateway TLS-only. If you need to serve both TLS
and plain text HTTP, you either have to run two gateway instances or use some
2021-04-29 21:15:04 +00:00
external redirecting solution.
Example to bind to `192.168.130.130:443` and serve TLS there:
```
2022-12-16 08:37:22 +00:00
$ frostfs-http-gw -p 192.168.130.72:8080 --listen_address 192.168.130.130:443 \
2021-04-29 21:15:04 +00:00
--tls_key=key.pem --tls_certificate=cert.pem
```
2021-05-04 15:19:11 +00:00
### HTTP parameters
2021-04-29 21:15:04 +00:00
You can tune HTTP read and write buffer sizes as well as timeouts with
`HTTP_GW_WEB_READ_BUFFER_SIZE` , `HTTP_GW_WEB_READ_TIMEOUT` ,
`HTTP_GW_WEB_WRITE_BUFFER_SIZE` and `HTTP_GW_WEB_WRITE_TIMEOUT` environment
variables.
2022-04-21 15:53:17 +00:00
**Note:** to allow upload and download of big data streams, disable read
and write timeouts correspondingly. To do that, set `HTTP_GW_WEB_READ_TIMEOUT=0`
and `HTTP_GW_WEB_WRITE_TIMEOUT=0` . Otherwise, HTTP Gateway will terminate
request with data stream after timeout.
2021-04-29 21:15:04 +00:00
`HTTP_GW_WEB_STREAM_REQUEST_BODY` environment variable can be used to disable
2022-04-21 08:35:57 +00:00
request body streaming (effectively it'll make the gateway accept the file completely
2022-12-16 08:37:22 +00:00
first and only then try sending it to FrostFS).
2021-04-29 21:15:04 +00:00
`HTTP_GW_WEB_MAX_REQUEST_BODY_SIZE` controls maximum request body size
limiting uploads to files slightly lower than this limit.
2022-12-16 08:37:22 +00:00
### FrostFS parameters
2021-04-29 21:15:04 +00:00
Gateway can automatically set timestamps for uploaded files based on local
time source, use `HTTP_GW_UPLOAD_HEADER_USE_DEFAULT_TIMESTAMP` environment
variable to control this behavior.
2021-05-04 15:19:11 +00:00
### Monitoring and metrics
2021-04-29 21:15:04 +00:00
2022-07-19 14:06:17 +00:00
Pprof and Prometheus are integrated into the gateway. To enable them use `--pprof` and `--metrics` flags or
2021-04-29 21:15:04 +00:00
`HTTP_GW_PPROF` /`HTTP_GW_METRICS` environment variables.
2021-05-04 15:19:11 +00:00
### Timeouts
2021-04-29 21:15:04 +00:00
You can tune gRPC interface parameters with `--connect_timeout` (for
2022-04-21 08:35:57 +00:00
connection to a node) and `--request_timeout` (for request processing over
2021-06-09 16:26:27 +00:00
established connection) options.
2021-04-29 21:15:04 +00:00
2022-04-21 08:35:57 +00:00
gRPC-level checks allow the gateway to detect dead peers, but it declares them
2021-04-29 21:15:04 +00:00
unhealthy at pool level once per `--rebalance_timer` interval, so check for it
if needed.
All timing options accept values with suffixes, so "15s" is 15 seconds and
"2m" is 2 minutes.
2021-10-29 13:11:34 +00:00
### Zip streaming
2023-03-24 09:35:22 +00:00
The gateway supports downloading files by common prefix (like dir) in zip format. You can enable compression
2021-10-29 13:11:34 +00:00
using config or `HTTP_GW_ZIP_COMPRESSION=true` environment variable.
2021-05-04 15:19:11 +00:00
### Logging
2022-07-19 14:06:17 +00:00
You can specify logging level using variable:
2021-04-29 21:15:04 +00:00
```
2022-04-08 09:01:57 +00:00
HTTP_GW_LOGGER_LEVEL=debug
2021-03-30 22:46:33 +00:00
```
2021-04-29 21:15:04 +00:00
2021-06-28 10:24:46 +00:00
### Yaml file
2023-03-24 09:35:22 +00:00
Configuration file is optional and can be used instead of environment variables/other parameters.
2021-06-28 10:24:46 +00:00
It can be specified with `--config` parameter:
```
2022-12-16 08:37:22 +00:00
$ frostfs-http-gw --config your-config.yaml
2021-06-28 10:24:46 +00:00
```
2022-07-19 14:06:17 +00:00
See [config ](./config/config.yaml ) and [defaults ](./docs/gate-configuration.md ) for example.
2021-06-28 10:24:46 +00:00
2023-02-03 09:46:25 +00:00
#### Multiple configs
You can use several config files when running application. It allows you to split configuration into parts.
For example, you can use separate yaml file for pprof and prometheus section in config (see [config examples ](./config )).
You can either provide several files with repeating `--config` flag or provide path to the dir that contains all configs using `--config-dir` flag.
Also, you can combine these flags:
```shell
$ frostfs-http-gw --config ./config/config.yaml --config /your/partial/config.yaml --config-dir ./config/dir
```
**Note:** next file in `--config` flag overwrites values from the previous one.
Files from `--config-dir` directory overwrite values from `--config` files.
So the command above run `frostfs-http-gw` to listen on `0.0.0.0:8080` address (value from `./config/config.yaml` ),
applies parameters from `/your/partial/config.yaml` ,
enable pprof (value from `./config/dir/pprof.yaml` ) and prometheus (value from `./config/dir/prometheus.yaml` ).
2021-04-29 21:15:04 +00:00
## HTTP API provided
This gateway intentionally provides limited feature set and doesn't try to
2022-12-16 08:37:22 +00:00
substitute (or completely wrap) regular gRPC FrostFS interface. You can download
2021-04-29 21:15:04 +00:00
and upload objects with it, but deleting, searching, managing ACLs, creating
2021-05-04 15:19:11 +00:00
containers and other activities are not supported and not planned to be
2021-04-29 21:15:04 +00:00
supported.
2021-05-17 14:30:16 +00:00
### Preparation
2023-03-24 09:35:22 +00:00
Before uploading or downloading a file make sure you have a prepared container.
2021-05-17 14:30:16 +00:00
You can create it with instructions below.
2022-08-12 15:30:23 +00:00
Also, in case of downloading, you need to have a file inside a container.
### NNS
In all download/upload routes you can use container name instead of its id (`$CID`).
Steps to start using name resolving:
1. Enable NNS resolving in config (`rpc_endpoint` must be a valid neo rpc node, see [configs ](./config ) for other examples):
```yaml
2022-12-20 11:01:50 +00:00
rpc_endpoint: http://morph-chain.frostfs.devenv:30333
2022-08-12 15:30:23 +00:00
resolve_order:
- nns
```
2023-03-24 09:35:22 +00:00
2. Make sure your container is registered in NNS contract. If you use [frostfs-dev-env ](https://git.frostfs.info/TrueCloudLab/frostfs-dev-env )
2022-08-12 15:30:23 +00:00
you can check if your container (e.g. with `container-name` name) is registered in NNS:
```shell
$ curl -s --data '{"id":1,"jsonrpc":"2.0","method":"getcontractstate","params":[1]}' \
2022-12-20 11:01:50 +00:00
http://morph-chain.frostfs.devenv:30333 | jq -r '.result.hash'
2023-03-24 09:35:22 +00:00
2022-08-12 15:30:23 +00:00
0x8e6c3cd4b976b28e84a3788f6ea9e2676c15d667
$ docker exec -it morph_chain neo-go \
contract testinvokefunction \
2022-12-20 11:01:50 +00:00
-r http://morph-chain.frostfs.devenv:30333 0x8e6c3cd4b976b28e84a3788f6ea9e2676c15d667 \
2022-08-12 15:30:23 +00:00
resolve string:container-name.container int:16 \
| jq -r '.stack[0].value | if type=="array" then .[0].value else . end' \
| base64 -d & & echo
2023-03-24 09:35:22 +00:00
2022-08-12 15:30:23 +00:00
7f3vvkw4iTiS5ZZbu5BQXEmJtETWbi3uUjLNaSs29xrL
```
3. Use container name instead of its `$CID` . For example:
```shell
$ curl http://localhost:8082/get_by_attribute/container-name/FileName/object-name
```
2021-05-17 14:30:16 +00:00
#### Create a container
2023-03-07 14:08:53 +00:00
You can create a container via [frostfs-cli ](https://git.frostfs.info/TrueCloudLab/frostfs-node/releases ):
2021-05-17 14:30:16 +00:00
```
2022-12-20 11:01:50 +00:00
$ frostfs-cli -r $FROSTFS_NODE -w $WALLET container create --policy $POLICY --basic-acl $ACL
2021-05-17 14:30:16 +00:00
```
2023-03-24 09:35:22 +00:00
where `$WALLET` is a path to user wallet,
2021-06-04 07:38:01 +00:00
`$ACL` -- hex encoded basic ACL value or keywords 'private, 'public-read', 'public-read-write' and
2021-05-17 14:30:16 +00:00
`$POLICY` -- QL-encoded or JSON-encoded placement policy or path to file with it
For example:
```
2022-12-16 08:37:22 +00:00
$ frostfs-cli -r 192.168.130.72:8080 -w ./wallet.json container create --policy "REP 3" --basic-acl public --await
2021-05-17 14:30:16 +00:00
```
2023-03-07 14:08:53 +00:00
If you have launched nodes via [frostfs-dev-env ](https://git.frostfs.info/TrueCloudLab/frostfs-dev-env ),
2023-03-24 09:35:22 +00:00
you can get the key value from `wallets/wallet.json` or write the path to
2021-05-17 14:30:16 +00:00
the file `wallets/wallet.key` .
#### Prepare a file in a container
2023-03-07 14:08:53 +00:00
To create a file via [frostfs-cli ](https://git.frostfs.info/TrueCloudLab/frostfs-node/releases ), run a command below:
2021-05-17 14:30:16 +00:00
```
2023-03-24 09:35:22 +00:00
$ frostfs-cli -r $FROSTFS_NODE -k $KEY object put --file $FILENAME --cid $CID
2021-05-17 14:30:16 +00:00
```
2023-03-24 09:35:22 +00:00
where
`$KEY` -- the key, please read the information [above ](#create-a-container ),
2021-05-17 14:30:16 +00:00
`$CID` -- container ID.
For example:
```
2022-12-16 08:37:22 +00:00
$ frostfs-cli -r 192.168.130.72:8080 -w ./wallet.json object put --file cat.png --cid Dxhf4PNprrJHWWTG5RGLdfLkJiSQ3AQqit1MSnEPRkDZ --attributes img_type=cat,my_attr=cute
2021-05-17 14:30:16 +00:00
```
2021-04-29 21:15:04 +00:00
### Downloading
#### Requests
2023-03-24 09:35:22 +00:00
The following requests support GET/HEAD methods.
2021-07-15 07:57:22 +00:00
2021-05-17 14:30:16 +00:00
##### By IDs
Basic downloading involves container ID and object ID and is done via GET
2023-03-24 09:35:22 +00:00
requests to `/get/$CID/$OID` path, where `$CID` is a container ID or its name if NNS is enabled,
`$OID` is an object's (i.e. your file's) ID.
2021-05-17 14:30:16 +00:00
2022-08-12 15:30:23 +00:00
For example:
2021-04-29 21:15:04 +00:00
2022-08-12 15:30:23 +00:00
```shell
2021-04-29 21:15:04 +00:00
$ wget http://localhost:8082/get/Dxhf4PNprrJHWWTG5RGLdfLkJiSQ3AQqit1MSnEPRkDZ/2m8PtaoricLouCn5zE8hAFr3gZEBDCZFe9BEgVJTSocY
```
2022-08-12 15:30:23 +00:00
or if container has a name:
```shell
$ wget http://localhost:8082/get/container-name/2m8PtaoricLouCn5zE8hAFr3gZEBDCZFe9BEgVJTSocY
```
2021-05-17 14:30:16 +00:00
##### By attributes
2021-04-29 21:15:04 +00:00
There is also more complex interface provided for attribute-based downloads,
it's usually used to retrieve files by their names, but any other attribute
can be used as well. The generic syntax for it looks like this:
```/get_by_attribute/$CID/$ATTRIBUTE_NAME/$ATTRIBUTE_VALUE```
2023-03-24 09:35:22 +00:00
where
`$CID` is a container ID or its name if NNS is enabled,
2021-05-17 14:30:16 +00:00
`$ATTRIBUTE_NAME` is the name of the attribute we want to use,
`$ATTRIBUTE_VALUE` is the value of this attribute that the target object should have.
2021-04-29 21:15:04 +00:00
2023-03-24 09:35:22 +00:00
**NB!** The attribute key and value should be url encoded, i.e., if you want to download an object with the attribute value
2022-10-26 14:20:25 +00:00
`a cat` , the value in the request must be `a+cat` . In the same way with the attribute key. If you don't escape such values
everything can still work (for example you can use `d@ta` without encoding) but it's HIGHLY RECOMMENDED to encode all your attributes.
2022-01-24 14:04:34 +00:00
2021-04-29 21:15:04 +00:00
If multiple objects have specified attribute with specified value, then the
first one of them is returned (and you can't get others via this interface).
Example for file name attribute:
```
$ wget http://localhost:8082/get_by_attribute/88GdaZFTcYJn1dqiSECss8kKPmmun6d6BfvC4zhwfLYM/FileName/cat.jpeg
```
2022-01-24 14:04:34 +00:00
Or when the filename includes special symbols:
```
$ wget http://localhost:8082/get_by_attribute/88GdaZFTcYJn1dqiSECss8kKPmmun6d6BfvC4zhwfLYM/FileName/cat+jpeg # means 'cat jpeg'
$ wget http://localhost:8082/get_by_attribute/88GdaZFTcYJn1dqiSECss8kKPmmun6d6BfvC4zhwfLYM/FileName/cat%25jpeg # means 'cat%jpeg'
```
2021-04-29 21:15:04 +00:00
2022-04-21 08:35:57 +00:00
Some other user-defined attributes:
2021-04-29 21:15:04 +00:00
```
$ wget http://localhost:8082/get_by_attribute/Dxhf4PNprrJHWWTG5RGLdfLkJiSQ3AQqit1MSnEPRkDZ/Ololo/100500
```
2023-03-24 09:35:22 +00:00
Or when the attribute includes special symbols:
2022-01-24 14:04:34 +00:00
```
$ wget http://localhost:8082/get_by_attribute/Dxhf4PNprrJHWWTG5RGLdfLkJiSQ3AQqit1MSnEPRkDZ/Olo%2Blo/100500 # means Olo+lo
```
2021-04-29 21:15:04 +00:00
An optional `download=true` argument for `Content-Disposition` management is
also supported (more on that below):
```
$ wget http://localhost:8082/get/Dxhf4PNprrJHWWTG5RGLdfLkJiSQ3AQqit1MSnEPRkDZ/2m8PtaoricLouCn5zE8hAFr3gZEBDCZFe9BEgVJTSocY?download=true
```
2021-10-29 13:11:34 +00:00
##### Zip
You can download some dir (files with the same prefix) in zip (it will be compressed if config contains appropriate param):
```
$ wget http://localhost:8082/zip/Dxhf4PNprrJHWWTG5RGLdfLkJiSQ3AQqit1MSnEPRkDZ/common/prefix
```
2023-03-24 09:35:22 +00:00
**Note:** the objects must have a valid `FilePath` attribute (it should not contain trailing `/` ),
2022-11-07 12:31:37 +00:00
otherwise they will not be in the zip archive. You can upload file with this attribute using `curl` :
2022-04-19 12:09:00 +00:00
```
$ curl -F 'file=@cat.jpeg;filename=cat.jpeg' -H 'X-Attribute-FilePath: common/prefix/cat.jpeg' http://localhost:8082/upload/Dxhf4PNprrJHWWTG5RGLdfLkJiSQ3AQqit1MSnEPRkDZ
```
2021-04-29 21:15:04 +00:00
#### Replies
2021-07-15 07:57:22 +00:00
You get object contents in the reply body (if GET method was used), but at the same time you also get a
2021-04-29 21:15:04 +00:00
set of reply headers generated using the following rules:
* `Content-Length` is set to the length of the object
* `Content-Type` is autodetected dynamically by gateway
* `Content-Disposition` is `inline` for regular requests and `attachment` for
requests with `download=true` argument, `filename` is also added if there
is `FileName` attribute set for this object
* `Last-Modified` header is set to `Timestamp` attribute value if it's
present for the object
* `x-container-id` contains container ID
* `x-object-id` contains object ID
* `x-owner-id` contains owner address
2022-12-16 08:37:22 +00:00
* all the other FrostFS attributes are converted to `X-Attribute-*` headers (but only
2021-04-29 21:15:04 +00:00
if they can be safely represented in HTTP header), for example `FileName`
2021-04-30 09:55:51 +00:00
attribute becomes `X-Attribute-FileName` header
2021-04-29 21:15:04 +00:00
2022-11-14 07:47:40 +00:00
##### Caching strategy
2023-03-24 09:35:22 +00:00
HTTP Gateway doesn't control caching (doesn't anything with the `Cache-Control` header). Caching strategy strictly
2022-11-14 07:47:40 +00:00
depends on application use case. So it should be carefully done by proxy server.
2021-04-29 21:15:04 +00:00
### Uploading
2022-08-12 15:30:23 +00:00
You can POST files to `/upload/$CID` path where `$CID` is a container ID or its name if NNS is enabled. The
2021-04-29 21:15:04 +00:00
request must contain multipart form with mandatory `filename` parameter. Only
one part in multipart form will be processed, so to upload another file just
2022-04-21 08:35:57 +00:00
issue a new POST request.
2021-04-29 21:15:04 +00:00
Example request:
```
$ curl -F 'file=@cat.jpeg;filename=cat.jpeg' http://localhost:8082/upload/Dxhf4PNprrJHWWTG5RGLdfLkJiSQ3AQqit1MSnEPRkDZ
```
Chunked encoding is supported by the server (but check for request read
timeouts if you're planning some streaming). You can try streaming support
2022-04-21 08:35:57 +00:00
with a large file piped through named FIFO pipe:
2021-04-29 21:15:04 +00:00
```
$ mkfifo pipe
$ cat video.mp4 > pipe &
$ curl --no-buffer -F 'file=@pipe;filename=catvideo.mp4' http://localhost:8082/upload/Dxhf4PNprrJHWWTG5RGLdfLkJiSQ3AQqit1MSnEPRkDZ
```
You can also add some attributes to your file using the following rules:
* all "X-Attribute-*" headers get converted to object attributes with
"X-Attribute-" prefix stripped, that is if you add "X-Attribute-Ololo:
100500" header to your request the resulting object will get "Ololo:
100500" attribute
2023-03-24 09:35:22 +00:00
* "X-Attribute-SYSTEM-*" headers are special
2023-03-16 08:40:08 +00:00
(`-SYSTEM-` part can also be `-system-` or`-System-` (and even legacy `-Neofs-` for some next releases)), they're used to set internal
FrostFS attributes starting with `__SYSTEM__` prefix, for these attributes all
2021-04-29 21:15:04 +00:00
dashes get converted to underscores and all letters are capitalized. For
2023-03-16 08:40:08 +00:00
example, you can use "X-Attribute-SYSTEM-Expiration-Epoch" header to set
`__SYSTEM__EXPIRATION_EPOCH` attribute
2021-04-29 21:15:04 +00:00
* `FileName` attribute is set from multipart's `filename` if not set
explicitly via `X-Attribute-FileName` header
* `Timestamp` attribute can be set using gateway local time if using
HTTP_GW_UPLOAD_HEADER_USE_DEFAULT_TIMESTAMP option and if request doesn't
provide `X-Attribute-Timestamp` header of its own
2021-11-26 12:44:07 +00:00
---
**NOTE**
2023-03-16 08:40:08 +00:00
There are some reserved headers type of `X-Attribute-SYSTEM-*` (headers are arranged in descending order of priority):
1. `X-Attribute-System-Expiration-Epoch: 100`
2. `X-Attribute-System-Expiration-Duration: 24h30m`
3. `X-Attribute-System-Expiration-Timestamp: 1637574797`
4. `X-Attribute-System-Expiration-RFC3339: 2021-11-22T09:55:49Z`
2021-11-26 12:44:07 +00:00
2023-03-24 09:35:22 +00:00
which transforms to `X-Attribute-System-Expiration-Epoch` . So you can provide expiration any convenient way.
2021-11-26 12:44:07 +00:00
---
2022-04-21 08:35:57 +00:00
For successful uploads you get JSON data in reply body with a container and
2021-04-29 21:15:04 +00:00
object ID, like this:
```
{
"object_id": "9ANhbry2ryjJY1NZbcjryJMRXG5uGNKd73kD3V1sVFsX",
"container_id": "Dxhf4PNprrJHWWTG5RGLdfLkJiSQ3AQqit1MSnEPRkDZ"
}
```
2021-04-30 10:41:45 +00:00
#### Authentication
You can always upload files to public containers (open for anyone to put
2021-05-04 15:19:11 +00:00
objects into), but for restricted containers you need to explicitly allow PUT
2022-04-21 08:35:57 +00:00
operations for a request signed with your HTTP Gateway keys.
2021-05-04 15:19:11 +00:00
2024-06-24 13:54:55 +00:00
If you don't want to manage gateway's secret keys and adjust policies when
2021-05-04 15:19:11 +00:00
gateway configuration changes (new gate, key rotation, etc) or you plan to use
public services, there is an option to let your application backend (or you) to
2024-06-24 13:54:55 +00:00
issue Bearer Tokens and pass them from the client via gate down to FrostFS level
2021-05-04 15:19:11 +00:00
to grant access.
2024-06-24 13:54:55 +00:00
FrostFS Bearer Token basically is a container owner-signed policy (refer to FrostFS
2021-05-04 15:19:11 +00:00
documentation for more details). There are two options to pass them to gateway:
2021-04-30 10:41:45 +00:00
* "Authorization" header with "Bearer" type and base64-encoded token in
credentials field
2021-06-03 12:18:27 +00:00
* "Bearer" cookie with base64-encoded token contents
2021-04-30 10:41:45 +00:00
2022-04-21 08:35:57 +00:00
For example, you have a mobile application frontend with a backend part storing
2022-12-16 08:37:22 +00:00
data in FrostFS. When a user authorizes in the mobile app, the backend issues a FrostFS
2022-04-21 08:35:57 +00:00
Bearer token and provides it to the frontend. Then, the mobile app may generate
2022-12-16 08:37:22 +00:00
some data and upload it via any available FrostFS HTTP Gateway by adding
2024-06-24 13:54:55 +00:00
the corresponding header to the upload request. Accessing policy protected data
2021-05-04 15:19:11 +00:00
works the same way.
2021-06-03 14:11:54 +00:00
##### Example
2024-06-24 13:54:55 +00:00
In order to generate a bearer token, you need to have wallet (which will be used to sign the token)
2021-06-03 14:11:54 +00:00
2024-06-24 13:54:55 +00:00
1. Suppose you have a container with private policy for wallet key
2021-06-03 14:11:54 +00:00
```
2024-06-24 13:54:55 +00:00
$ frostfs-cli container create -r < endpoint > --wallet < wallet > -policy < policy > --basic-acl 0 --await
CID: 9dfzyvq82JnFqp5svxcREf2iy6XNuifYcJPusEDnGK9Z
$ frostfs-cli ape-manager add -r < endpoint > --wallet < wallet > \
--target-type container --target-name 9dfzyvq82JnFqp5svxcREf2iy6XNuifYcJPusEDnGK9Z \
--rule "allow Object.* RequestCondition:"\$Actor:publicKey"=03b09baabff3f6107c7e9acb8721a6fc5618d45b50247a314d82e548702cce8cd5 *" \
--chain-id < chainID >
2021-06-03 14:11:54 +00:00
```
2024-06-24 13:54:55 +00:00
2. Form a Bearer token (10000 is lifetime expiration in epoch) to impersonate
HTTP Gateway request as wallet signed request and save it to **bearer.json** :
2021-06-03 14:11:54 +00:00
```
{
"body": {
2023-05-15 11:29:52 +00:00
"allowImpersonate": true,
2021-06-03 14:11:54 +00:00
"lifetime": {
"exp": "10000",
"nbf": "0",
"iat": "0"
}
},
"signature": null
}
```
2023-05-15 11:29:52 +00:00
3. Sign it with the wallet:
2021-06-03 14:11:54 +00:00
```
2024-06-24 13:54:55 +00:00
$ frostfs-cli util sign bearer-token --from bearer.json --to signed.json -w < wallet >
2021-06-03 14:11:54 +00:00
```
2023-05-15 11:29:52 +00:00
4. Encode to base64 to use in header:
2021-06-03 14:11:54 +00:00
```
2023-03-24 09:35:22 +00:00
$ base64 -w 0 signed.json
2021-06-03 14:11:54 +00:00
# output: Ck4KKgoECAIQBhIiCiCZGdlbN7DPGPMg9rsWqV+p2XdMzUqknRiexewSFp8kmBIbChk17MUri6OJ0X5ftsHzy7NERDNFB4C92PcaGgMIkE4SZgohAxpsb7vfAso1F0X6hrm6WpRS14WsT3/Ct1SMoqRsT89KEkEEGxKi8GjKSf52YqhppgaOTQHbUsL3jn7SHLqS3ndAQ7NtAATnmRHleZw2V2xRRSRBQdjDC05KK83LhdSax72Fsw==
```
2022-04-21 08:35:57 +00:00
After that, the Bearer token can be used:
2021-06-03 14:11:54 +00:00
```
$ curl -F 'file=@cat.jpeg;filename=cat.jpeg' -H "Authorization: Bearer Ck4KKgoECAIQBhIiCiCZGdlbN7DPGPMg9rsWqV+p2XdMzUqknRiexewSFp8kmBIbChk17MUri6OJ0X5ftsHzy7NERDNFB4C92PcaGgMIkE4SZgohAxpsb7vfAso1F0X6hrm6WpRS14WsT3/Ct1SMoqRsT89KEkEEGxKi8GjKSf52YqhppgaOTQHbUsL3jn7SHLqS3ndAQ7NtAATnmRHleZw2V2xRRSRBQdjDC05KK83LhdSax72Fsw==" \
http://localhost:8082/upload/BJeErH9MWmf52VsR1mLWKkgF3pRm3FkubYxM7TZkBP4K
# output:
# {
# "object_id": "DhfES9nVrFksxGDD2jQLunGADfrXExxNwqXbDafyBn9X",
# "container_id": "BJeErH9MWmf52VsR1mLWKkgF3pRm3FkubYxM7TZkBP4K"
# }
```
2024-06-24 13:54:55 +00:00
##### Note: Bearer Token owner
2021-06-07 12:37:03 +00:00
2024-06-24 13:54:55 +00:00
You can specify exact key who can use Bearer Token (gateway wallet address).
To do this, encode wallet address in base64 format
2021-06-07 12:37:03 +00:00
```
2024-06-24 13:54:55 +00:00
$ echo 'NhVtreTTCoqsMQV5Wp55fqnriiUCpEaKm3' | base58 --decode | base64
# output: NezFK4ujidF+X7bB88uzREQzRQeAvdj3Gg==
2021-06-07 12:37:03 +00:00
```
2024-06-24 13:54:55 +00:00
Then specify this value in Bearer Token Json
2021-06-07 12:37:03 +00:00
```
{
2024-06-24 13:54:55 +00:00
"body": {
"ownerID": {
"value": "NezFK4ujidF+X7bB88uzREQzRQeAvdj3Gg=="
},
...
2021-06-07 12:37:03 +00:00
```
2024-06-24 13:54:55 +00:00
##### Note: Policy override
Instead of impersonation, you can define the set of policies that will be applied
to the request sender. This allows to restrict access to specific operation and
specific objects without giving full impersonation control to the token user.
2021-04-29 21:15:04 +00:00
### Metrics and Pprof
2023-03-24 09:35:22 +00:00
If enabled, Prometheus metrics are available at `localhost:8084` endpoint
and Pprof at `localhost:8083/debug/pprof` by default. Host and port can be configured.
2022-08-12 15:30:23 +00:00
See [configuration ](./docs/gate-configuration.md ).
2022-07-14 08:49:22 +00:00
## Credits
Please see [CREDITS ](CREDITS.md ) for details.
2024-08-30 17:06:01 +00:00
## Fuzzing
To run fuzzing tests use the following command:
```shell
$ make fuzz
```
This command will install dependencies for the fuzzing process and run existing fuzzing tests.
You can also use the following arguments:
```
FUZZ_TIMEOUT - time to run each fuzzing test (default 30)
FUZZ_FUNCTIONS - fuzzing tests that will be started (default "all")
FUZZ_AUX - additional parameters for the fuzzer (for example, "-debug")
FUZZ_NGFUZZ_DIR - path to ngfuzz tool
````
## Credits
Please see [CREDITS ](CREDITS.md ) for details.