Roman Loginov
8efcc957ea
All checks were successful
/ DCO (pull_request) Successful in 1m35s
/ Builds (1.19) (pull_request) Successful in 2m14s
/ Builds (1.20) (pull_request) Successful in 2m9s
/ Vulncheck (pull_request) Successful in 5m39s
/ Lint (pull_request) Successful in 2m49s
/ Tests (1.19) (pull_request) Successful in 7m34s
/ Tests (1.20) (pull_request) Successful in 1m44s
Signed-off-by: Roman Loginov <r.loginov@yadro.com>
156 lines
4.3 KiB
Go
156 lines
4.3 KiB
Go
package layer
|
|
|
|
import (
|
|
"context"
|
|
"fmt"
|
|
"strconv"
|
|
|
|
v2container "git.frostfs.info/TrueCloudLab/frostfs-api-go/v2/container"
|
|
"git.frostfs.info/TrueCloudLab/frostfs-s3-gw/api"
|
|
"git.frostfs.info/TrueCloudLab/frostfs-s3-gw/api/data"
|
|
s3errors "git.frostfs.info/TrueCloudLab/frostfs-s3-gw/api/errors"
|
|
"git.frostfs.info/TrueCloudLab/frostfs-s3-gw/internal/logs"
|
|
"git.frostfs.info/TrueCloudLab/frostfs-sdk-go/client"
|
|
"git.frostfs.info/TrueCloudLab/frostfs-sdk-go/container"
|
|
cid "git.frostfs.info/TrueCloudLab/frostfs-sdk-go/container/id"
|
|
"git.frostfs.info/TrueCloudLab/frostfs-sdk-go/eacl"
|
|
"git.frostfs.info/TrueCloudLab/frostfs-sdk-go/session"
|
|
"go.uber.org/zap"
|
|
)
|
|
|
|
type (
|
|
// BucketACL extends BucketInfo by eacl.Table.
|
|
BucketACL struct {
|
|
Info *data.BucketInfo
|
|
EACL *eacl.Table
|
|
}
|
|
)
|
|
|
|
const (
|
|
attributeLocationConstraint = ".s3-location-constraint"
|
|
AttributeLockEnabled = "LockEnabled"
|
|
)
|
|
|
|
func (n *layer) containerInfo(ctx context.Context, idCnr cid.ID) (*data.BucketInfo, error) {
|
|
var (
|
|
err error
|
|
res *container.Container
|
|
log = n.reqLogger(ctx).With(zap.Stringer("cid", idCnr))
|
|
|
|
info = &data.BucketInfo{
|
|
CID: idCnr,
|
|
Name: idCnr.EncodeToString(),
|
|
}
|
|
)
|
|
res, err = n.frostFS.Container(ctx, idCnr)
|
|
if err != nil {
|
|
if client.IsErrContainerNotFound(err) {
|
|
return nil, fmt.Errorf("%w: %s", s3errors.GetAPIError(s3errors.ErrNoSuchBucket), err.Error())
|
|
}
|
|
return nil, fmt.Errorf("get frostfs container: %w", err)
|
|
}
|
|
|
|
cnr := *res
|
|
|
|
info.Owner = cnr.Owner()
|
|
if domain := container.ReadDomain(cnr); domain.Name() != "" {
|
|
info.Name = domain.Name()
|
|
info.Zone = domain.Zone()
|
|
}
|
|
info.Created = container.CreatedAt(cnr)
|
|
info.LocationConstraint = cnr.Attribute(attributeLocationConstraint)
|
|
|
|
attrLockEnabled := cnr.Attribute(AttributeLockEnabled)
|
|
if len(attrLockEnabled) > 0 {
|
|
info.ObjectLockEnabled, err = strconv.ParseBool(attrLockEnabled)
|
|
if err != nil {
|
|
log.Error(logs.CouldNotParseContainerObjectLockEnabledAttribute,
|
|
zap.String("lock_enabled", attrLockEnabled),
|
|
zap.Error(err),
|
|
)
|
|
}
|
|
}
|
|
|
|
n.cache.PutBucket(info)
|
|
|
|
return info, nil
|
|
}
|
|
|
|
func (n *layer) containerList(ctx context.Context) ([]*data.BucketInfo, error) {
|
|
res, err := n.frostFS.UserContainers(ctx, n.BearerOwner(ctx))
|
|
if err != nil {
|
|
n.reqLogger(ctx).Error(logs.CouldNotListUserContainers, zap.Error(err))
|
|
return nil, err
|
|
}
|
|
|
|
list := make([]*data.BucketInfo, 0, len(res))
|
|
for i := range res {
|
|
info, err := n.containerInfo(ctx, res[i])
|
|
if err != nil {
|
|
n.reqLogger(ctx).Error(logs.CouldNotFetchContainerInfo, zap.Error(err))
|
|
continue
|
|
}
|
|
|
|
list = append(list, info)
|
|
}
|
|
|
|
return list, nil
|
|
}
|
|
|
|
func (n *layer) createContainer(ctx context.Context, p *CreateBucketParams) (*data.BucketInfo, error) {
|
|
if p.LocationConstraint == "" {
|
|
p.LocationConstraint = api.DefaultLocationConstraint // s3tests_boto3.functional.test_s3:test_bucket_get_location
|
|
}
|
|
bktInfo := &data.BucketInfo{
|
|
Name: p.Name,
|
|
Zone: v2container.SysAttributeZoneDefault,
|
|
Owner: n.BearerOwner(ctx),
|
|
Created: TimeNow(ctx),
|
|
LocationConstraint: p.LocationConstraint,
|
|
ObjectLockEnabled: p.ObjectLockEnabled,
|
|
}
|
|
|
|
var attributes [][2]string
|
|
|
|
attributes = append(attributes, [2]string{
|
|
attributeLocationConstraint, p.LocationConstraint,
|
|
})
|
|
|
|
if p.ObjectLockEnabled {
|
|
attributes = append(attributes, [2]string{
|
|
AttributeLockEnabled, "true",
|
|
})
|
|
}
|
|
|
|
idCnr, err := n.frostFS.CreateContainer(ctx, PrmContainerCreate{
|
|
Creator: bktInfo.Owner,
|
|
Policy: p.Policy,
|
|
Name: p.Name,
|
|
SessionToken: p.SessionContainerCreation,
|
|
CreationTime: bktInfo.Created,
|
|
AdditionalAttributes: attributes,
|
|
})
|
|
if err != nil {
|
|
return nil, fmt.Errorf("create container: %w", err)
|
|
}
|
|
|
|
bktInfo.CID = idCnr
|
|
|
|
if err = n.setContainerEACLTable(ctx, bktInfo.CID, p.EACL, p.SessionEACL); err != nil {
|
|
return nil, fmt.Errorf("set container eacl: %w", err)
|
|
}
|
|
|
|
n.cache.PutBucket(bktInfo)
|
|
|
|
return bktInfo, nil
|
|
}
|
|
|
|
func (n *layer) setContainerEACLTable(ctx context.Context, idCnr cid.ID, table *eacl.Table, sessionToken *session.Container) error {
|
|
table.SetCID(idCnr)
|
|
|
|
return n.frostFS.SetContainerEACL(ctx, *table, sessionToken)
|
|
}
|
|
|
|
func (n *layer) GetContainerEACL(ctx context.Context, idCnr cid.ID) (*eacl.Table, error) {
|
|
return n.frostFS.ContainerEACL(ctx, idCnr)
|
|
}
|