package layer import ( "context" "crypto/ecdsa" "crypto/rand" "encoding/json" "encoding/xml" stderrors "errors" "fmt" "io" "net/url" "sort" "strconv" "strings" "time" "git.frostfs.info/TrueCloudLab/frostfs-s3-gw/api" "git.frostfs.info/TrueCloudLab/frostfs-s3-gw/api/data" "git.frostfs.info/TrueCloudLab/frostfs-s3-gw/api/errors" s3errors "git.frostfs.info/TrueCloudLab/frostfs-s3-gw/api/errors" "git.frostfs.info/TrueCloudLab/frostfs-s3-gw/api/layer/encryption" "git.frostfs.info/TrueCloudLab/frostfs-s3-gw/api/middleware" "git.frostfs.info/TrueCloudLab/frostfs-s3-gw/internal/logs" "git.frostfs.info/TrueCloudLab/frostfs-sdk-go/bearer" "git.frostfs.info/TrueCloudLab/frostfs-sdk-go/client" cid "git.frostfs.info/TrueCloudLab/frostfs-sdk-go/container/id" "git.frostfs.info/TrueCloudLab/frostfs-sdk-go/netmap" oid "git.frostfs.info/TrueCloudLab/frostfs-sdk-go/object/id" "git.frostfs.info/TrueCloudLab/frostfs-sdk-go/session" "git.frostfs.info/TrueCloudLab/frostfs-sdk-go/user" "github.com/nspcc-dev/neo-go/pkg/crypto/keys" "go.uber.org/zap" ) type ( BucketResolver interface { Resolve(ctx context.Context, zone, name string) (cid.ID, error) } FeatureSettings interface { ClientCut() bool BufferMaxSizeForPut() uint64 MD5Enabled() bool FormContainerZone(ns string) string } Layer struct { frostFS FrostFS gateOwner user.ID log *zap.Logger anonKey AnonymousKey resolver BucketResolver cache *Cache treeService TreeService features FeatureSettings gateKey *keys.PrivateKey corsCnrInfo *data.BucketInfo lifecycleCnrInfo *data.BucketInfo } Config struct { GateOwner user.ID ChainAddress string Cache *Cache AnonKey AnonymousKey Resolver BucketResolver TreeService TreeService Features FeatureSettings GateKey *keys.PrivateKey CORSCnrInfo *data.BucketInfo LifecycleCnrInfo *data.BucketInfo } // AnonymousKey contains data for anonymous requests. AnonymousKey struct { Key *keys.PrivateKey } // GetObjectParams stores object get request parameters. GetObjectParams struct { Range *RangeParams ObjectInfo *data.ObjectInfo BucketInfo *data.BucketInfo Versioned bool Encryption encryption.Params } // HeadObjectParams stores object head request parameters. HeadObjectParams struct { BktInfo *data.BucketInfo Object string VersionID string } // RangeParams stores range header request parameters. RangeParams struct { Start uint64 End uint64 } // PutObjectParams stores object put request parameters. PutObjectParams struct { BktInfo *data.BucketInfo Object string Size *uint64 Reader io.Reader Header map[string]string Lock *data.ObjectLock Encryption encryption.Params CopiesNumbers []uint32 CompleteMD5Hash string ContentMD5 string ContentSHA256Hash string } PutCombinedObjectParams struct { BktInfo *data.BucketInfo Object string Size uint64 Header map[string]string Lock *data.ObjectLock Encryption encryption.Params } DeleteObjectParams struct { BktInfo *data.BucketInfo Objects []*VersionedObject Settings *data.BucketSettings NetworkInfo netmap.NetworkInfo IsMultiple bool } // PutSettingsParams stores object copy request parameters. PutSettingsParams struct { BktInfo *data.BucketInfo Settings *data.BucketSettings } // PutCORSParams stores PutCORS request parameters. PutCORSParams struct { BktInfo *data.BucketInfo Reader io.Reader CopiesNumbers []uint32 NewDecoder func(io.Reader) *xml.Decoder } // CopyObjectParams stores object copy request parameters. CopyObjectParams struct { SrcVersioned bool SrcObject *data.ObjectInfo ScrBktInfo *data.BucketInfo DstBktInfo *data.BucketInfo DstObject string DstSize uint64 Header map[string]string Range *RangeParams Lock *data.ObjectLock SrcEncryption encryption.Params DstEncryption encryption.Params CopiesNumbers []uint32 } // CreateBucketParams stores bucket create request parameters. CreateBucketParams struct { Name string Namespace string Policy netmap.PlacementPolicy SessionContainerCreation *session.Container LocationConstraint string ObjectLockEnabled bool } // DeleteBucketParams stores delete bucket request parameters. DeleteBucketParams struct { BktInfo *data.BucketInfo SessionToken *session.Container SkipCheck bool } // ListObjectVersionsParams stores list objects versions parameters. ListObjectVersionsParams struct { BktInfo *data.BucketInfo Delimiter string KeyMarker string MaxKeys int Prefix string VersionIDMarker string Encode string } // VersionedObject stores info about objects to delete. VersionedObject struct { Name string VersionID string DeleteMarkVersion string DeleteMarkerEtag string Error error } ObjectPayload struct { r io.Reader params getParams encrypted bool decryptedLen uint64 } ) const ( tagPrefix = "S3-Tag-" AESEncryptionAlgorithm = "AES256" AESKeySize = 32 AttributeEncryptionAlgorithm = api.FrostFSSystemMetadataPrefix + "Algorithm" AttributeDecryptedSize = api.FrostFSSystemMetadataPrefix + "Decrypted-Size" AttributeHMACSalt = api.FrostFSSystemMetadataPrefix + "HMAC-Salt" AttributeHMACKey = api.FrostFSSystemMetadataPrefix + "HMAC-Key" AttributeFrostfsCopiesNumber = "frostfs-copies-number" // such format to match X-Amz-Meta-Frostfs-Copies-Number header ) var EncryptionMetadata = map[string]struct{}{ AttributeEncryptionAlgorithm: {}, AttributeDecryptedSize: {}, AttributeHMACSalt: {}, AttributeHMACKey: {}, } func (t *VersionedObject) String() string { return t.Name + ":" + t.VersionID } func (p HeadObjectParams) Versioned() bool { return len(p.VersionID) > 0 } // NewLayer creates an instance of a Layer. It checks credentials // and establishes gRPC connection with the node. func NewLayer(log *zap.Logger, frostFS FrostFS, config *Config) *Layer { return &Layer{ frostFS: frostFS, log: log, gateOwner: config.GateOwner, anonKey: config.AnonKey, resolver: config.Resolver, cache: config.Cache, treeService: config.TreeService, features: config.Features, gateKey: config.GateKey, corsCnrInfo: config.CORSCnrInfo, lifecycleCnrInfo: config.LifecycleCnrInfo, } } func (n *Layer) EphemeralKey() *keys.PublicKey { return n.anonKey.Key.PublicKey() } // IsAuthenticatedRequest checks if access box exists in the current request. func IsAuthenticatedRequest(ctx context.Context) bool { _, err := middleware.GetBoxData(ctx) return err == nil } // TimeNow returns client time from request or time.Now(). func TimeNow(ctx context.Context) time.Time { if now, err := middleware.GetClientTime(ctx); err == nil { return now } return time.Now() } // BearerOwner returns owner id from BearerToken (context) or from client owner. func (n *Layer) BearerOwner(ctx context.Context) user.ID { if bd, err := middleware.GetBoxData(ctx); err == nil && bd.Gate.BearerToken != nil { return bearer.ResolveIssuer(*bd.Gate.BearerToken) } var ownerID user.ID user.IDFromKey(&ownerID, (ecdsa.PublicKey)(*n.EphemeralKey())) return ownerID } // SessionTokenForRead returns session container token. func (n *Layer) SessionTokenForRead(ctx context.Context) *session.Container { if bd, err := middleware.GetBoxData(ctx); err == nil && bd.Gate != nil { return bd.Gate.SessionToken() } return nil } func (n *Layer) reqLogger(ctx context.Context) *zap.Logger { reqLogger := middleware.GetReqLog(ctx) if reqLogger != nil { return reqLogger } return n.log } func (n *Layer) prepareAuthParameters(ctx context.Context, prm *PrmAuth, bktOwner user.ID) { if prm.BearerToken != nil || prm.PrivateKey != nil { return } if bd, err := middleware.GetBoxData(ctx); err == nil && bd.Gate.BearerToken != nil { if bd.Gate.BearerToken.Impersonate() || bktOwner.Equals(bearer.ResolveIssuer(*bd.Gate.BearerToken)) { prm.BearerToken = bd.Gate.BearerToken return } } prm.PrivateKey = &n.anonKey.Key.PrivateKey } // GetBucketInfo returns bucket info by name. func (n *Layer) GetBucketInfo(ctx context.Context, name string) (*data.BucketInfo, error) { name, err := url.QueryUnescape(name) if err != nil { return nil, fmt.Errorf("unescape bucket name: %w", err) } reqInfo := middleware.GetReqInfo(ctx) zone := n.features.FormContainerZone(reqInfo.Namespace) if bktInfo := n.cache.GetBucket(zone, name); bktInfo != nil { return bktInfo, nil } containerID, err := n.ResolveBucket(ctx, zone, name) if err != nil { if strings.Contains(err.Error(), "not found") { return nil, fmt.Errorf("%w: %s", errors.GetAPIError(errors.ErrNoSuchBucket), err.Error()) } return nil, err } prm := PrmContainer{ ContainerID: containerID, SessionToken: n.SessionTokenForRead(ctx), } return n.containerInfo(ctx, prm) } // ResolveCID returns container id by name. func (n *Layer) ResolveCID(ctx context.Context, name string) (cid.ID, error) { name, err := url.QueryUnescape(name) if err != nil { return cid.ID{}, fmt.Errorf("unescape bucket name: %w", err) } reqInfo := middleware.GetReqInfo(ctx) zone := n.features.FormContainerZone(reqInfo.Namespace) if bktInfo := n.cache.GetBucket(zone, name); bktInfo != nil { return bktInfo.CID, nil } return n.ResolveBucket(ctx, zone, name) } // ListBuckets returns all user containers. The name of the bucket is a container // id. Timestamp is omitted since it is not saved in frostfs container. func (n *Layer) ListBuckets(ctx context.Context) ([]*data.BucketInfo, error) { return n.containerList(ctx) } // GetObject from storage. func (n *Layer) GetObject(ctx context.Context, p *GetObjectParams) (*ObjectPayload, error) { var params getParams params.objInfo = p.ObjectInfo params.bktInfo = p.BucketInfo var decReader *encryption.Decrypter if p.Encryption.Enabled() { var err error decReader, err = getDecrypter(p) if err != nil { return nil, fmt.Errorf("creating decrypter: %w", err) } params.off = decReader.EncryptedOffset() params.ln = decReader.EncryptedLength() } else { if p.Range != nil { if p.Range.Start > p.Range.End { panic("invalid range") } params.ln = p.Range.End - p.Range.Start + 1 params.off = p.Range.Start } } r, err := n.initObjectPayloadReader(ctx, params) if err != nil { if client.IsErrObjectNotFound(err) { if p.Versioned { err = fmt.Errorf("%w: %s", errors.GetAPIError(errors.ErrNoSuchVersion), err.Error()) } else { err = fmt.Errorf("%w: %s", errors.GetAPIError(errors.ErrNoSuchKey), err.Error()) } } return nil, fmt.Errorf("init object payload reader: %w", err) } var decryptedLen uint64 if decReader != nil { if err = decReader.SetReader(r); err != nil { return nil, fmt.Errorf("set reader to decrypter: %w", err) } r = io.LimitReader(decReader, int64(decReader.DecryptedLength())) decryptedLen = decReader.DecryptedLength() } return &ObjectPayload{ r: r, params: params, encrypted: decReader != nil, decryptedLen: decryptedLen, }, nil } // Read implements io.Reader. If you want to use ObjectPayload as io.Reader // you must not use ObjectPayload.StreamTo method and vice versa. func (o *ObjectPayload) Read(p []byte) (int, error) { return o.r.Read(p) } // StreamTo reads all payload to provided writer. // If you want to use this method you must not use ObjectPayload.Read and vice versa. func (o *ObjectPayload) StreamTo(w io.Writer) error { bufSize := uint64(32 * 1024) // configure? if o.params.ln != 0 && o.params.ln < bufSize { bufSize = o.params.ln } // alloc buffer for copying buf := make([]byte, bufSize) // sync-pool it? // copy full payload written, err := io.CopyBuffer(w, o.r, buf) if err != nil { if o.encrypted { return fmt.Errorf("copy object payload written: '%d', decLength: '%d', params.ln: '%d' : %w", written, o.decryptedLen, o.params.ln, err) } return fmt.Errorf("copy object payload written: '%d': %w", written, err) } return nil } func getDecrypter(p *GetObjectParams) (*encryption.Decrypter, error) { var encRange *encryption.Range if p.Range != nil { encRange = &encryption.Range{Start: p.Range.Start, End: p.Range.End} } header := p.ObjectInfo.Headers[UploadCompletedParts] if len(header) == 0 { return encryption.NewDecrypter(p.Encryption, uint64(p.ObjectInfo.Size), encRange) } decryptedObjectSize, err := strconv.ParseUint(p.ObjectInfo.Headers[AttributeDecryptedSize], 10, 64) if err != nil { return nil, fmt.Errorf("parse decrypted size: %w", err) } splits := strings.Split(header, ",") sizes := make([]uint64, len(splits)) for i, splitInfo := range splits { part, err := ParseCompletedPartHeader(splitInfo) if err != nil { return nil, fmt.Errorf("parse completed part: %w", err) } sizes[i] = uint64(part.Size) } return encryption.NewMultipartDecrypter(p.Encryption, decryptedObjectSize, sizes, encRange) } // GetObjectInfo returns meta information about the object. func (n *Layer) GetObjectInfo(ctx context.Context, p *HeadObjectParams) (*data.ObjectInfo, error) { extendedObjectInfo, err := n.GetExtendedObjectInfo(ctx, p) if err != nil { return nil, err } return extendedObjectInfo.ObjectInfo, nil } // GetExtendedObjectInfo returns meta information and corresponding info from the tree service about the object. func (n *Layer) GetExtendedObjectInfo(ctx context.Context, p *HeadObjectParams) (*data.ExtendedObjectInfo, error) { var objInfo *data.ExtendedObjectInfo var err error if p.Versioned() { objInfo, err = n.headVersion(ctx, p.BktInfo, p) } else { objInfo, err = n.headLastVersionIfNotDeleted(ctx, p.BktInfo, p.Object) } if err != nil { return nil, err } n.reqLogger(ctx).Debug(logs.GetObject, zap.Stringer("cid", p.BktInfo.CID), zap.Stringer("oid", objInfo.ObjectInfo.ID)) return objInfo, nil } // CopyObject from one bucket into another bucket. func (n *Layer) CopyObject(ctx context.Context, p *CopyObjectParams) (*data.ExtendedObjectInfo, error) { objPayload, err := n.GetObject(ctx, &GetObjectParams{ ObjectInfo: p.SrcObject, Versioned: p.SrcVersioned, Range: p.Range, BucketInfo: p.ScrBktInfo, Encryption: p.SrcEncryption, }) if err != nil { return nil, fmt.Errorf("get object to copy: %w", err) } return n.PutObject(ctx, &PutObjectParams{ BktInfo: p.DstBktInfo, Object: p.DstObject, Size: &p.DstSize, Reader: objPayload, Header: p.Header, Encryption: p.DstEncryption, CopiesNumbers: p.CopiesNumbers, }) } func getRandomOID() (oid.ID, error) { b := [32]byte{} if _, err := rand.Read(b[:]); err != nil { return oid.ID{}, err } var objID oid.ID objID.SetSHA256(b) return objID, nil } func (n *Layer) deleteObject(ctx context.Context, bkt *data.BucketInfo, settings *data.BucketSettings, obj *VersionedObject, networkInfo netmap.NetworkInfo) *VersionedObject { if len(obj.VersionID) != 0 || settings.Unversioned() { var nodeVersions []*data.NodeVersion if nodeVersions, obj.Error = n.getNodeVersionsToDelete(ctx, bkt, obj); obj.Error != nil { return n.handleNotFoundError(bkt, obj) } for _, nodeVersion := range nodeVersions { if obj.DeleteMarkVersion, obj.Error = n.removeOldVersion(ctx, bkt, nodeVersion, obj); obj.Error != nil { if !client.IsErrObjectAlreadyRemoved(obj.Error) && !client.IsErrObjectNotFound(obj.Error) { return obj } n.reqLogger(ctx).Debug(logs.CouldntDeleteObjectFromStorageContinueDeleting, zap.Stringer("cid", bkt.CID), zap.String("oid", obj.VersionID), zap.Error(obj.Error)) } if obj.Error = n.treeService.RemoveVersion(ctx, bkt, nodeVersion.ID); obj.Error != nil { return obj } } n.cache.DeleteObjectName(bkt.CID, bkt.Name, obj.Name) return obj } lastVersion, err := n.getLastNodeVersion(ctx, bkt, obj) if err != nil { obj.Error = err return n.handleNotFoundError(bkt, obj) } if settings.VersioningSuspended() { obj.VersionID = data.UnversionedObjectVersionID var nodeVersions []*data.NodeVersion if nodeVersions, obj.Error = n.getNodeVersionsToDelete(ctx, bkt, obj); obj.Error != nil { if !isNotFoundError(obj.Error) { return obj } } for _, nodeVersion := range nodeVersions { if nodeVersion.ID == lastVersion.ID && nodeVersion.IsDeleteMarker { continue } if !nodeVersion.IsDeleteMarker { if obj.DeleteMarkVersion, obj.Error = n.removeOldVersion(ctx, bkt, nodeVersion, obj); obj.Error != nil { if !client.IsErrObjectAlreadyRemoved(obj.Error) && !client.IsErrObjectNotFound(obj.Error) { return obj } n.reqLogger(ctx).Debug(logs.CouldntDeleteObjectFromStorageContinueDeleting, zap.Stringer("cid", bkt.CID), zap.String("oid", obj.VersionID), zap.Error(obj.Error)) } } if obj.Error = n.treeService.RemoveVersion(ctx, bkt, nodeVersion.ID); obj.Error != nil { return obj } } } if lastVersion.IsDeleteMarker { obj.DeleteMarkVersion = lastVersion.OID.EncodeToString() return obj } randOID, err := getRandomOID() if err != nil { obj.Error = fmt.Errorf("couldn't get random oid: %w", err) return obj } obj.DeleteMarkVersion = randOID.EncodeToString() now := TimeNow(ctx) newVersion := &data.NodeVersion{ BaseNodeVersion: data.BaseNodeVersion{ OID: randOID, FilePath: obj.Name, Created: &now, Owner: &n.gateOwner, IsDeleteMarker: true, CreationEpoch: networkInfo.CurrentEpoch(), }, IsUnversioned: settings.VersioningSuspended(), } if _, obj.Error = n.treeService.AddVersion(ctx, bkt, newVersion); obj.Error != nil { return obj } n.cache.DeleteObjectName(bkt.CID, bkt.Name, obj.Name) return obj } func (n *Layer) handleNotFoundError(bkt *data.BucketInfo, obj *VersionedObject) *VersionedObject { if isNotFoundError(obj.Error) { obj.Error = nil n.cache.CleanListCacheEntriesContainingObject(obj.Name, bkt.CID) n.cache.DeleteObjectName(bkt.CID, bkt.Name, obj.Name) } return obj } func isNotFoundError(err error) bool { return errors.IsS3Error(err, errors.ErrNoSuchKey) || errors.IsS3Error(err, errors.ErrNoSuchVersion) } func (n *Layer) getNodeVersionsToDelete(ctx context.Context, bkt *data.BucketInfo, obj *VersionedObject) ([]*data.NodeVersion, error) { var versionsToDelete []*data.NodeVersion versions, err := n.treeService.GetVersions(ctx, bkt, obj.Name) if err != nil { if stderrors.Is(err, ErrNodeNotFound) { return nil, fmt.Errorf("%w: %s", s3errors.GetAPIError(s3errors.ErrNoSuchKey), err.Error()) } return nil, err } if len(versions) == 0 { return nil, fmt.Errorf("%w: there isn't tree node with requested version id", s3errors.GetAPIError(s3errors.ErrNoSuchVersion)) } sort.Slice(versions, func(i, j int) bool { return versions[i].Timestamp < versions[j].Timestamp }) var matchFn func(nv *data.NodeVersion) bool switch { case obj.VersionID == data.UnversionedObjectVersionID: matchFn = func(nv *data.NodeVersion) bool { return nv.IsUnversioned } case len(obj.VersionID) == 0: latest := versions[len(versions)-1] if latest.IsUnversioned { matchFn = func(nv *data.NodeVersion) bool { return nv.IsUnversioned } } else { matchFn = func(nv *data.NodeVersion) bool { return nv.ID == latest.ID } } default: matchFn = func(nv *data.NodeVersion) bool { return nv.OID.EncodeToString() == obj.VersionID } } var oids []string for _, v := range versions { if matchFn(v) { versionsToDelete = append(versionsToDelete, v) if !v.IsDeleteMarker { oids = append(oids, v.OID.EncodeToString()) } } } if len(versionsToDelete) == 0 { return nil, fmt.Errorf("%w: there isn't tree node with requested version id", s3errors.GetAPIError(s3errors.ErrNoSuchVersion)) } n.reqLogger(ctx).Debug(logs.GetTreeNodeToDelete, zap.Stringer("cid", bkt.CID), zap.Strings("oids", oids)) return versionsToDelete, nil } func (n *Layer) getLastNodeVersion(ctx context.Context, bkt *data.BucketInfo, obj *VersionedObject) (*data.NodeVersion, error) { objVersion := &data.ObjectVersion{ BktInfo: bkt, ObjectName: obj.Name, VersionID: "", NoErrorOnDeleteMarker: true, } return n.getNodeVersion(ctx, objVersion) } func (n *Layer) removeOldVersion(ctx context.Context, bkt *data.BucketInfo, nodeVersion *data.NodeVersion, obj *VersionedObject) (string, error) { if nodeVersion.IsDeleteMarker { return obj.VersionID, nil } if nodeVersion.IsCombined { return "", n.removeCombinedObject(ctx, bkt, nodeVersion) } return "", n.objectDelete(ctx, bkt, nodeVersion.OID) } func (n *Layer) removeCombinedObject(ctx context.Context, bkt *data.BucketInfo, nodeVersion *data.NodeVersion) error { combinedObj, err := n.objectGet(ctx, bkt, nodeVersion.OID) if err != nil { return fmt.Errorf("get combined object '%s': %w", nodeVersion.OID.EncodeToString(), err) } var parts []*data.PartInfo if err = json.NewDecoder(combinedObj.Payload).Decode(&parts); err != nil { return fmt.Errorf("unmarshal combined object parts: %w", err) } for _, part := range parts { if err = n.objectDelete(ctx, bkt, part.OID); err == nil { continue } if !client.IsErrObjectAlreadyRemoved(err) && !client.IsErrObjectNotFound(err) { return fmt.Errorf("couldn't delete part '%s': %w", part.OID.EncodeToString(), err) } n.reqLogger(ctx).Warn(logs.CouldntDeletePart, zap.String("cid", bkt.CID.EncodeToString()), zap.String("oid", part.OID.EncodeToString()), zap.Int("part number", part.Number), zap.Error(err)) } return n.objectDelete(ctx, bkt, nodeVersion.OID) } // DeleteObjects from the storage. func (n *Layer) DeleteObjects(ctx context.Context, p *DeleteObjectParams) []*VersionedObject { for i, obj := range p.Objects { p.Objects[i] = n.deleteObject(ctx, p.BktInfo, p.Settings, obj, p.NetworkInfo) if p.IsMultiple && p.Objects[i].Error != nil { n.reqLogger(ctx).Error(logs.CouldntDeleteObject, zap.String("object", obj.String()), zap.Error(p.Objects[i].Error)) } } return p.Objects } func (n *Layer) CreateBucket(ctx context.Context, p *CreateBucketParams) (*data.BucketInfo, error) { bktInfo, err := n.GetBucketInfo(ctx, p.Name) if err != nil { if errors.IsS3Error(err, errors.ErrNoSuchBucket) { return n.createContainer(ctx, p) } return nil, err } if p.SessionContainerCreation != nil && session.IssuedBy(*p.SessionContainerCreation, bktInfo.Owner) { return nil, errors.GetAPIError(errors.ErrBucketAlreadyOwnedByYou) } return nil, errors.GetAPIError(errors.ErrBucketAlreadyExists) } func (n *Layer) ResolveBucket(ctx context.Context, zone, name string) (cid.ID, error) { var cnrID cid.ID if err := cnrID.DecodeString(name); err != nil { if cnrID, err = n.resolver.Resolve(ctx, zone, name); err != nil { return cid.ID{}, err } n.reqLogger(ctx).Info(logs.ResolveBucket, zap.Stringer("cid", cnrID)) } return cnrID, nil } func (n *Layer) DeleteBucket(ctx context.Context, p *DeleteBucketParams) error { if !p.SkipCheck { res, _, err := n.getAllObjectsVersions(ctx, commonVersionsListingParams{ BktInfo: p.BktInfo, MaxKeys: 1, }) if err != nil { return err } if len(res) != 0 { return errors.GetAPIError(errors.ErrBucketNotEmpty) } } n.cache.DeleteBucket(p.BktInfo) corsObj, err := n.treeService.GetBucketCORS(ctx, p.BktInfo) if err != nil { n.reqLogger(ctx).Error(logs.GetBucketCors, zap.Error(err)) } lifecycleObj, treeErr := n.treeService.GetBucketLifecycleConfiguration(ctx, p.BktInfo) if treeErr != nil { n.reqLogger(ctx).Error(logs.GetBucketLifecycle, zap.Error(treeErr)) } err = n.frostFS.DeleteContainer(ctx, p.BktInfo.CID, p.SessionToken) if err != nil { return fmt.Errorf("delete container: %w", err) } if !corsObj.Container().Equals(p.BktInfo.CID) && !corsObj.Container().Equals(cid.ID{}) { n.deleteCORSObject(ctx, p.BktInfo, corsObj) } if treeErr == nil && !lifecycleObj.Container().Equals(p.BktInfo.CID) { n.deleteLifecycleObject(ctx, p.BktInfo, lifecycleObj) } return nil } func (n *Layer) DeleteContainer(ctx context.Context, p *DeleteBucketParams) error { n.cache.DeleteBucket(p.BktInfo) if err := n.frostFS.DeleteContainer(ctx, p.BktInfo.CID, p.SessionToken); err != nil { return fmt.Errorf("delete container: %w", err) } return nil } func (n *Layer) GetNetworkInfo(ctx context.Context) (netmap.NetworkInfo, error) { cachedInfo := n.cache.GetNetworkInfo() if cachedInfo != nil { return *cachedInfo, nil } networkInfo, err := n.frostFS.NetworkInfo(ctx) if err != nil { return netmap.NetworkInfo{}, fmt.Errorf("get network info: %w", err) } n.cache.PutNetworkInfo(networkInfo) return networkInfo, nil }