2022-02-07 20:27:56 +00:00
|
|
|
package client
|
|
|
|
|
|
|
|
import (
|
|
|
|
"context"
|
|
|
|
"errors"
|
|
|
|
"fmt"
|
|
|
|
"io"
|
|
|
|
|
2022-03-24 08:05:41 +00:00
|
|
|
"github.com/nspcc-dev/neofs-api-go/v2/acl"
|
2022-02-07 20:27:56 +00:00
|
|
|
v2object "github.com/nspcc-dev/neofs-api-go/v2/object"
|
|
|
|
v2refs "github.com/nspcc-dev/neofs-api-go/v2/refs"
|
|
|
|
rpcapi "github.com/nspcc-dev/neofs-api-go/v2/rpc"
|
|
|
|
"github.com/nspcc-dev/neofs-api-go/v2/rpc/client"
|
|
|
|
v2session "github.com/nspcc-dev/neofs-api-go/v2/session"
|
2022-03-24 08:05:41 +00:00
|
|
|
"github.com/nspcc-dev/neofs-sdk-go/bearer"
|
2022-02-07 20:27:56 +00:00
|
|
|
apistatus "github.com/nspcc-dev/neofs-sdk-go/client/status"
|
|
|
|
cid "github.com/nspcc-dev/neofs-sdk-go/container/id"
|
2023-04-25 08:31:27 +00:00
|
|
|
neofscrypto "github.com/nspcc-dev/neofs-sdk-go/crypto"
|
2022-02-07 20:27:56 +00:00
|
|
|
"github.com/nspcc-dev/neofs-sdk-go/object"
|
|
|
|
oid "github.com/nspcc-dev/neofs-sdk-go/object/id"
|
|
|
|
"github.com/nspcc-dev/neofs-sdk-go/session"
|
|
|
|
)
|
|
|
|
|
2022-02-11 16:13:53 +00:00
|
|
|
// shared parameters of GET/HEAD/RANGE.
|
|
|
|
type prmObjectRead struct {
|
2022-08-23 19:30:39 +00:00
|
|
|
meta v2session.RequestMetaHeader
|
2022-03-03 11:04:53 +00:00
|
|
|
|
2022-02-07 20:27:56 +00:00
|
|
|
raw bool
|
|
|
|
|
2022-08-25 10:29:31 +00:00
|
|
|
addr v2refs.Address
|
2022-02-07 20:27:56 +00:00
|
|
|
}
|
|
|
|
|
2022-08-23 19:30:39 +00:00
|
|
|
// WithXHeaders specifies list of extended headers (string key-value pairs)
|
|
|
|
// to be attached to the request. Must have an even length.
|
|
|
|
//
|
|
|
|
// Slice must not be mutated until the operation completes.
|
|
|
|
func (x *prmObjectRead) WithXHeaders(hs ...string) {
|
|
|
|
writeXHeadersToMeta(hs, &x.meta)
|
2022-03-03 11:04:53 +00:00
|
|
|
}
|
|
|
|
|
2022-02-07 20:27:56 +00:00
|
|
|
// MarkRaw marks an intent to read physically stored object.
|
2022-02-11 16:13:53 +00:00
|
|
|
func (x *prmObjectRead) MarkRaw() {
|
2022-02-07 20:27:56 +00:00
|
|
|
x.raw = true
|
|
|
|
}
|
|
|
|
|
|
|
|
// MarkLocal tells the server to execute the operation locally.
|
2022-02-11 16:13:53 +00:00
|
|
|
func (x *prmObjectRead) MarkLocal() {
|
2022-08-23 19:30:39 +00:00
|
|
|
x.meta.SetTTL(1)
|
2022-02-07 20:27:56 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// WithinSession specifies session within which object should be read.
|
2022-02-11 16:13:53 +00:00
|
|
|
//
|
|
|
|
// Creator of the session acquires the authorship of the request.
|
|
|
|
// This may affect the execution of an operation (e.g. access control).
|
|
|
|
//
|
|
|
|
// Must be signed.
|
2022-04-07 16:09:15 +00:00
|
|
|
func (x *prmObjectRead) WithinSession(t session.Object) {
|
2022-08-23 19:30:39 +00:00
|
|
|
var tokv2 v2session.Token
|
|
|
|
t.WriteToV2(&tokv2)
|
|
|
|
x.meta.SetSessionToken(&tokv2)
|
2022-02-07 20:27:56 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// WithBearerToken attaches bearer token to be used for the operation.
|
2022-02-11 16:13:53 +00:00
|
|
|
//
|
|
|
|
// If set, underlying eACL rules will be used in access control.
|
|
|
|
//
|
|
|
|
// Must be signed.
|
2022-03-24 08:05:41 +00:00
|
|
|
func (x *prmObjectRead) WithBearerToken(t bearer.Token) {
|
2022-08-23 19:30:39 +00:00
|
|
|
var v2token acl.BearerToken
|
|
|
|
t.WriteToV2(&v2token)
|
|
|
|
x.meta.SetBearerToken(&v2token)
|
2022-02-07 20:27:56 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// FromContainer specifies NeoFS container of the object.
|
2023-05-04 07:09:43 +00:00
|
|
|
// Required parameter. It is an alternative to ByAddress.
|
2022-02-11 16:13:53 +00:00
|
|
|
func (x *prmObjectRead) FromContainer(id cid.ID) {
|
2022-08-25 10:29:31 +00:00
|
|
|
var cnrV2 v2refs.ContainerID
|
|
|
|
id.WriteToV2(&cnrV2)
|
|
|
|
x.addr.SetContainerID(&cnrV2)
|
2022-02-07 20:27:56 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// ByID specifies identifier of the requested object.
|
2023-05-04 07:09:43 +00:00
|
|
|
// Required parameter. It is an alternative to ByAddress.
|
2022-02-11 16:13:53 +00:00
|
|
|
func (x *prmObjectRead) ByID(id oid.ID) {
|
2022-08-25 10:29:31 +00:00
|
|
|
var objV2 v2refs.ObjectID
|
|
|
|
id.WriteToV2(&objV2)
|
|
|
|
x.addr.SetObjectID(&objV2)
|
2022-02-07 20:27:56 +00:00
|
|
|
}
|
|
|
|
|
2023-05-04 07:09:43 +00:00
|
|
|
// ByAddress specifies address of the requested object.
|
|
|
|
// Required parameter. It is an alternative to ByID, FromContainer.
|
|
|
|
func (x *prmObjectRead) ByAddress(addr oid.Address) {
|
|
|
|
addr.WriteToV2(&x.addr)
|
|
|
|
}
|
|
|
|
|
2022-02-11 16:13:53 +00:00
|
|
|
// PrmObjectGet groups parameters of ObjectGetInit operation.
|
|
|
|
type PrmObjectGet struct {
|
|
|
|
prmObjectRead
|
2022-08-25 11:45:50 +00:00
|
|
|
|
2023-04-25 08:31:27 +00:00
|
|
|
signer neofscrypto.Signer
|
2022-02-11 16:13:53 +00:00
|
|
|
}
|
|
|
|
|
2022-02-07 20:27:56 +00:00
|
|
|
// ResObjectGet groups the final result values of ObjectGetInit operation.
|
|
|
|
type ResObjectGet struct {
|
|
|
|
statusRes
|
|
|
|
}
|
|
|
|
|
|
|
|
// ObjectReader is designed to read one object from NeoFS system.
|
|
|
|
//
|
|
|
|
// Must be initialized using Client.ObjectGetInit, any other
|
|
|
|
// usage is unsafe.
|
|
|
|
type ObjectReader struct {
|
|
|
|
cancelCtxStream context.CancelFunc
|
|
|
|
|
2022-08-25 11:45:50 +00:00
|
|
|
client *Client
|
|
|
|
stream interface {
|
|
|
|
Read(resp *v2object.GetResponse) error
|
|
|
|
}
|
2022-02-07 20:27:56 +00:00
|
|
|
|
2022-08-25 11:45:50 +00:00
|
|
|
res ResObjectGet
|
|
|
|
err error
|
2022-02-07 20:27:56 +00:00
|
|
|
|
|
|
|
tailPayload []byte
|
2022-02-16 17:14:24 +00:00
|
|
|
|
|
|
|
remainingPayloadLen int
|
2022-02-07 20:27:56 +00:00
|
|
|
}
|
|
|
|
|
2023-04-25 08:31:27 +00:00
|
|
|
// UseSigner specifies private signer to sign the requests.
|
|
|
|
// If signer is not provided, then Client default signer is used.
|
|
|
|
func (x *PrmObjectGet) UseSigner(signer neofscrypto.Signer) {
|
|
|
|
x.signer = signer
|
2022-02-11 16:13:53 +00:00
|
|
|
}
|
|
|
|
|
2022-02-07 20:27:56 +00:00
|
|
|
// ReadHeader reads header of the object. Result means success.
|
|
|
|
// Failure reason can be received via Close.
|
|
|
|
func (x *ObjectReader) ReadHeader(dst *object.Object) bool {
|
2022-08-25 11:45:50 +00:00
|
|
|
var resp v2object.GetResponse
|
|
|
|
x.err = x.stream.Read(&resp)
|
|
|
|
if x.err != nil {
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
|
|
|
x.res.st, x.err = x.client.processResponse(&resp)
|
|
|
|
if x.err != nil || !apistatus.IsSuccessful(x.res.st) {
|
2022-02-07 20:27:56 +00:00
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
|
|
|
var partInit *v2object.GetObjectPartInit
|
|
|
|
|
2022-08-25 11:45:50 +00:00
|
|
|
switch v := resp.GetBody().GetObjectPart().(type) {
|
2022-02-07 20:27:56 +00:00
|
|
|
default:
|
2022-08-25 11:45:50 +00:00
|
|
|
x.err = fmt.Errorf("unexpected message instead of heading part: %T", v)
|
2022-02-07 20:27:56 +00:00
|
|
|
return false
|
|
|
|
case *v2object.SplitInfo:
|
2022-08-25 11:45:50 +00:00
|
|
|
x.err = object.NewSplitInfoError(object.NewSplitInfoFromV2(v))
|
2022-02-07 20:27:56 +00:00
|
|
|
return false
|
|
|
|
case *v2object.GetObjectPartInit:
|
|
|
|
partInit = v
|
|
|
|
}
|
|
|
|
|
|
|
|
var objv2 v2object.Object
|
|
|
|
|
|
|
|
objv2.SetObjectID(partInit.GetObjectID())
|
|
|
|
objv2.SetHeader(partInit.GetHeader())
|
|
|
|
objv2.SetSignature(partInit.GetSignature())
|
|
|
|
|
2022-02-16 17:14:24 +00:00
|
|
|
x.remainingPayloadLen = int(objv2.GetHeader().GetPayloadLength())
|
|
|
|
|
2022-02-07 20:27:56 +00:00
|
|
|
*dst = *object.NewFromV2(&objv2) // need smth better
|
|
|
|
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
|
|
|
|
func (x *ObjectReader) readChunk(buf []byte) (int, bool) {
|
|
|
|
var read int
|
|
|
|
|
|
|
|
// read remaining tail
|
|
|
|
read = copy(buf, x.tailPayload)
|
|
|
|
|
|
|
|
x.tailPayload = x.tailPayload[read:]
|
|
|
|
|
|
|
|
if len(buf) == read {
|
|
|
|
return read, true
|
|
|
|
}
|
|
|
|
|
2022-02-24 11:33:43 +00:00
|
|
|
var chunk []byte
|
|
|
|
var lastRead int
|
|
|
|
|
|
|
|
for {
|
2022-08-25 11:45:50 +00:00
|
|
|
var resp v2object.GetResponse
|
|
|
|
x.err = x.stream.Read(&resp)
|
|
|
|
if x.err != nil {
|
2022-02-24 11:33:43 +00:00
|
|
|
return read, false
|
|
|
|
}
|
2022-02-07 20:27:56 +00:00
|
|
|
|
2022-08-25 11:45:50 +00:00
|
|
|
x.res.st, x.err = x.client.processResponse(&resp)
|
|
|
|
if x.err != nil || !apistatus.IsSuccessful(x.res.st) {
|
|
|
|
return read, false
|
|
|
|
}
|
2022-02-07 20:27:56 +00:00
|
|
|
|
2022-08-25 11:45:50 +00:00
|
|
|
part := resp.GetBody().GetObjectPart()
|
|
|
|
partChunk, ok := part.(*v2object.GetObjectPartChunk)
|
2022-02-24 11:33:43 +00:00
|
|
|
if !ok {
|
2022-08-25 11:45:50 +00:00
|
|
|
x.err = fmt.Errorf("unexpected message instead of chunk part: %T", part)
|
2022-02-24 11:33:43 +00:00
|
|
|
return read, false
|
|
|
|
}
|
2022-02-07 20:27:56 +00:00
|
|
|
|
2022-02-24 11:33:43 +00:00
|
|
|
// read new chunk
|
|
|
|
chunk = partChunk.GetChunk()
|
|
|
|
if len(chunk) == 0 {
|
|
|
|
// just skip empty chunks since they are not prohibited by protocol
|
|
|
|
continue
|
|
|
|
}
|
2022-02-07 20:27:56 +00:00
|
|
|
|
2022-02-24 11:33:43 +00:00
|
|
|
lastRead = copy(buf[read:], chunk)
|
2022-02-07 20:27:56 +00:00
|
|
|
|
2022-02-24 11:33:43 +00:00
|
|
|
read += lastRead
|
2022-02-07 20:27:56 +00:00
|
|
|
|
2022-02-24 11:33:43 +00:00
|
|
|
if read == len(buf) {
|
|
|
|
// save the tail
|
|
|
|
x.tailPayload = append(x.tailPayload, chunk[lastRead:]...)
|
2022-02-07 20:27:56 +00:00
|
|
|
|
2022-02-24 11:33:43 +00:00
|
|
|
return read, true
|
|
|
|
}
|
|
|
|
}
|
2022-02-07 20:27:56 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// ReadChunk reads another chunk of the object payload. Works similar to
|
|
|
|
// io.Reader.Read but returns success flag instead of error.
|
|
|
|
//
|
|
|
|
// Failure reason can be received via Close.
|
|
|
|
func (x *ObjectReader) ReadChunk(buf []byte) (int, bool) {
|
|
|
|
return x.readChunk(buf)
|
|
|
|
}
|
|
|
|
|
|
|
|
func (x *ObjectReader) close(ignoreEOF bool) (*ResObjectGet, error) {
|
|
|
|
defer x.cancelCtxStream()
|
|
|
|
|
2022-08-25 11:45:50 +00:00
|
|
|
if x.err != nil {
|
|
|
|
if !errors.Is(x.err, io.EOF) {
|
|
|
|
return nil, x.err
|
2022-02-07 20:27:56 +00:00
|
|
|
} else if !ignoreEOF {
|
2022-02-24 11:44:49 +00:00
|
|
|
if x.remainingPayloadLen > 0 {
|
|
|
|
return nil, io.ErrUnexpectedEOF
|
|
|
|
}
|
|
|
|
|
2022-02-07 20:27:56 +00:00
|
|
|
return nil, io.EOF
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2022-08-25 11:45:50 +00:00
|
|
|
return &x.res, nil
|
2022-02-07 20:27:56 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Close ends reading the object and returns the result of the operation
|
|
|
|
// along with the final results. Must be called after using the ObjectReader.
|
|
|
|
//
|
|
|
|
// Exactly one return value is non-nil. By default, server status is returned in res structure.
|
|
|
|
// Any client's internal or transport errors are returned as Go built-in error.
|
|
|
|
// If Client is tuned to resolve NeoFS API statuses, then NeoFS failures
|
|
|
|
// codes are returned as error.
|
|
|
|
//
|
|
|
|
// Return errors:
|
2022-08-24 14:17:40 +00:00
|
|
|
//
|
|
|
|
// *object.SplitInfoError (returned on virtual objects with PrmObjectGet.MakeRaw).
|
2022-02-07 20:27:56 +00:00
|
|
|
//
|
|
|
|
// Return statuses:
|
2022-02-28 10:56:46 +00:00
|
|
|
// - global (see Client docs);
|
|
|
|
// - *apistatus.ContainerNotFound;
|
|
|
|
// - *apistatus.ObjectNotFound;
|
|
|
|
// - *apistatus.ObjectAccessDenied;
|
|
|
|
// - *apistatus.ObjectAlreadyRemoved;
|
|
|
|
// - *apistatus.SessionTokenExpired.
|
2022-02-07 20:27:56 +00:00
|
|
|
func (x *ObjectReader) Close() (*ResObjectGet, error) {
|
|
|
|
return x.close(true)
|
|
|
|
}
|
|
|
|
|
2022-02-17 15:34:38 +00:00
|
|
|
// Read implements io.Reader of the object payload.
|
2022-02-07 20:27:56 +00:00
|
|
|
func (x *ObjectReader) Read(p []byte) (int, error) {
|
|
|
|
n, ok := x.readChunk(p)
|
2022-02-17 17:16:30 +00:00
|
|
|
|
|
|
|
x.remainingPayloadLen -= n
|
|
|
|
|
2022-02-07 20:27:56 +00:00
|
|
|
if !ok {
|
|
|
|
res, err := x.close(false)
|
|
|
|
if err != nil {
|
|
|
|
return n, err
|
|
|
|
}
|
2022-02-16 17:14:24 +00:00
|
|
|
|
|
|
|
return n, apistatus.ErrFromStatus(res.Status())
|
2022-02-07 20:27:56 +00:00
|
|
|
}
|
|
|
|
|
2022-02-17 17:16:30 +00:00
|
|
|
if x.remainingPayloadLen < 0 {
|
2022-02-16 17:14:24 +00:00
|
|
|
return n, errors.New("payload size overflow")
|
|
|
|
}
|
|
|
|
|
2022-02-07 20:27:56 +00:00
|
|
|
return n, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// ObjectGetInit initiates reading an object through a remote server using NeoFS API protocol.
|
|
|
|
//
|
2022-02-11 16:13:53 +00:00
|
|
|
// The call only opens the transmission channel, explicit fetching is done using the ObjectReader.
|
2022-02-07 20:27:56 +00:00
|
|
|
// Exactly one return value is non-nil. Resulting reader must be finally closed.
|
|
|
|
//
|
|
|
|
// Immediately panics if parameters are set incorrectly (see PrmObjectGet docs).
|
|
|
|
// Context is required and must not be nil. It is used for network communication.
|
|
|
|
func (c *Client) ObjectGetInit(ctx context.Context, prm PrmObjectGet) (*ObjectReader, error) {
|
|
|
|
// check parameters
|
|
|
|
switch {
|
|
|
|
case ctx == nil:
|
|
|
|
panic(panicMsgMissingContext)
|
2022-08-25 10:29:31 +00:00
|
|
|
case prm.addr.GetContainerID() == nil:
|
2022-02-07 20:27:56 +00:00
|
|
|
panic(panicMsgMissingContainer)
|
2022-08-25 10:29:31 +00:00
|
|
|
case prm.addr.GetObjectID() == nil:
|
2022-08-23 17:15:55 +00:00
|
|
|
panic(panicMsgMissingObject)
|
2022-02-07 20:27:56 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// form request body
|
|
|
|
var body v2object.GetRequestBody
|
|
|
|
|
|
|
|
body.SetRaw(prm.raw)
|
2022-08-25 10:29:31 +00:00
|
|
|
body.SetAddress(&prm.addr)
|
2022-02-07 20:27:56 +00:00
|
|
|
|
|
|
|
// form request
|
|
|
|
var req v2object.GetRequest
|
|
|
|
|
|
|
|
req.SetBody(&body)
|
2022-08-25 11:45:50 +00:00
|
|
|
c.prepareRequest(&req, &prm.meta)
|
2022-02-07 20:27:56 +00:00
|
|
|
|
2023-04-25 08:31:27 +00:00
|
|
|
signer := prm.signer
|
|
|
|
if signer == nil {
|
|
|
|
signer = c.prm.signer
|
2022-09-14 06:02:26 +00:00
|
|
|
}
|
|
|
|
|
2023-04-25 08:31:27 +00:00
|
|
|
err := signServiceMessage(signer, &req)
|
2022-08-25 11:45:50 +00:00
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("sign request: %w", err)
|
|
|
|
}
|
2022-02-07 20:27:56 +00:00
|
|
|
|
2022-08-25 11:45:50 +00:00
|
|
|
ctx, cancel := context.WithCancel(ctx)
|
2022-02-07 20:27:56 +00:00
|
|
|
|
2022-08-25 11:45:50 +00:00
|
|
|
stream, err := rpcapi.GetObject(&c.c, &req, client.WithContext(ctx))
|
|
|
|
if err != nil {
|
|
|
|
cancel()
|
|
|
|
return nil, fmt.Errorf("open stream: %w", err)
|
2022-02-07 20:27:56 +00:00
|
|
|
}
|
|
|
|
|
2022-08-25 11:45:50 +00:00
|
|
|
var r ObjectReader
|
|
|
|
r.cancelCtxStream = cancel
|
|
|
|
r.stream = stream
|
|
|
|
r.client = c
|
|
|
|
|
2022-02-07 20:27:56 +00:00
|
|
|
return &r, nil
|
|
|
|
}
|
2022-02-11 16:13:53 +00:00
|
|
|
|
|
|
|
// PrmObjectHead groups parameters of ObjectHead operation.
|
|
|
|
type PrmObjectHead struct {
|
|
|
|
prmObjectRead
|
2022-02-21 12:02:23 +00:00
|
|
|
|
2023-04-25 08:31:27 +00:00
|
|
|
signer neofscrypto.Signer
|
2022-02-21 12:02:23 +00:00
|
|
|
}
|
|
|
|
|
2023-04-25 08:31:27 +00:00
|
|
|
// UseSigner specifies private signer to sign the requests.
|
|
|
|
// If signer is not provided, then Client default signer is used.
|
|
|
|
func (x *PrmObjectHead) UseSigner(signer neofscrypto.Signer) {
|
|
|
|
x.signer = signer
|
2022-02-11 16:13:53 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// ResObjectHead groups resulting values of ObjectHead operation.
|
|
|
|
type ResObjectHead struct {
|
|
|
|
statusRes
|
|
|
|
|
|
|
|
// requested object (response doesn't carry the ID)
|
|
|
|
idObj oid.ID
|
|
|
|
|
|
|
|
hdr *v2object.HeaderWithSignature
|
|
|
|
}
|
|
|
|
|
|
|
|
// ReadHeader reads header of the requested object.
|
|
|
|
// Returns false if header is missing in the response (not read).
|
|
|
|
func (x *ResObjectHead) ReadHeader(dst *object.Object) bool {
|
|
|
|
if x.hdr == nil {
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
|
|
|
var objv2 v2object.Object
|
|
|
|
|
|
|
|
objv2.SetHeader(x.hdr.GetHeader())
|
|
|
|
objv2.SetSignature(x.hdr.GetSignature())
|
|
|
|
|
2022-03-03 11:48:55 +00:00
|
|
|
obj := object.NewFromV2(&objv2)
|
2022-04-11 16:25:14 +00:00
|
|
|
obj.SetID(x.idObj)
|
2022-02-11 16:13:53 +00:00
|
|
|
|
2022-03-03 11:48:55 +00:00
|
|
|
*dst = *obj
|
2022-02-11 16:13:53 +00:00
|
|
|
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
|
|
|
|
// ObjectHead reads object header through a remote server using NeoFS API protocol.
|
|
|
|
//
|
|
|
|
// Exactly one return value is non-nil. By default, server status is returned in res structure.
|
|
|
|
// Any client's internal or transport errors are returned as `error`,
|
2022-07-04 15:33:33 +00:00
|
|
|
// If PrmInit.ResolveNeoFSFailures has been called, unsuccessful
|
2022-02-11 16:13:53 +00:00
|
|
|
// NeoFS status codes are returned as `error`, otherwise, are included
|
|
|
|
// in the returned result structure.
|
|
|
|
//
|
|
|
|
// Immediately panics if parameters are set incorrectly (see PrmObjectHead docs).
|
|
|
|
// Context is required and must not be nil. It is used for network communication.
|
|
|
|
//
|
|
|
|
// Return errors:
|
2022-08-24 14:17:40 +00:00
|
|
|
//
|
|
|
|
// *object.SplitInfoError (returned on virtual objects with PrmObjectHead.MakeRaw).
|
2022-02-11 16:13:53 +00:00
|
|
|
//
|
|
|
|
// Return statuses:
|
2022-02-28 10:56:46 +00:00
|
|
|
// - global (see Client docs);
|
|
|
|
// - *apistatus.ContainerNotFound;
|
|
|
|
// - *apistatus.ObjectNotFound;
|
|
|
|
// - *apistatus.ObjectAccessDenied;
|
|
|
|
// - *apistatus.ObjectAlreadyRemoved;
|
|
|
|
// - *apistatus.SessionTokenExpired.
|
2022-02-11 16:13:53 +00:00
|
|
|
func (c *Client) ObjectHead(ctx context.Context, prm PrmObjectHead) (*ResObjectHead, error) {
|
|
|
|
switch {
|
|
|
|
case ctx == nil:
|
|
|
|
panic(panicMsgMissingContext)
|
2022-08-25 10:29:31 +00:00
|
|
|
case prm.addr.GetContainerID() == nil:
|
2022-02-11 16:13:53 +00:00
|
|
|
panic(panicMsgMissingContainer)
|
2022-08-25 10:29:31 +00:00
|
|
|
case prm.addr.GetObjectID() == nil:
|
2022-08-23 17:15:55 +00:00
|
|
|
panic(panicMsgMissingObject)
|
2022-02-11 16:13:53 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
var body v2object.HeadRequestBody
|
|
|
|
body.SetRaw(prm.raw)
|
2022-08-25 10:29:31 +00:00
|
|
|
body.SetAddress(&prm.addr)
|
2022-02-11 16:13:53 +00:00
|
|
|
|
|
|
|
var req v2object.HeadRequest
|
|
|
|
req.SetBody(&body)
|
2022-08-25 10:42:43 +00:00
|
|
|
c.prepareRequest(&req, &prm.meta)
|
2022-02-11 16:13:53 +00:00
|
|
|
|
2023-04-25 08:31:27 +00:00
|
|
|
signer := prm.signer
|
|
|
|
if signer == nil {
|
|
|
|
signer = c.prm.signer
|
2022-08-25 10:42:43 +00:00
|
|
|
}
|
2022-02-11 16:13:53 +00:00
|
|
|
|
2022-08-25 10:42:43 +00:00
|
|
|
// sign the request
|
2023-04-25 08:31:27 +00:00
|
|
|
err := signServiceMessage(signer, &req)
|
2022-08-25 10:42:43 +00:00
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("sign request: %w", err)
|
|
|
|
}
|
2022-02-11 16:13:53 +00:00
|
|
|
|
2022-08-25 10:42:43 +00:00
|
|
|
resp, err := rpcapi.HeadObject(&c.c, &req, client.WithContext(ctx))
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("write request: %w", err)
|
2022-02-21 12:02:23 +00:00
|
|
|
}
|
|
|
|
|
2022-08-25 10:42:43 +00:00
|
|
|
var res ResObjectHead
|
|
|
|
res.st, err = c.processResponse(resp)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
2022-02-11 16:13:53 +00:00
|
|
|
}
|
2022-08-25 10:42:43 +00:00
|
|
|
|
|
|
|
if !apistatus.IsSuccessful(res.st) {
|
|
|
|
return &res, nil
|
2022-02-11 16:13:53 +00:00
|
|
|
}
|
|
|
|
|
2022-08-25 10:42:43 +00:00
|
|
|
_ = res.idObj.ReadFromV2(*prm.addr.GetObjectID())
|
|
|
|
|
|
|
|
switch v := resp.GetBody().GetHeaderPart().(type) {
|
|
|
|
default:
|
|
|
|
return nil, fmt.Errorf("unexpected header type %T", v)
|
|
|
|
case *v2object.SplitInfo:
|
|
|
|
return nil, object.NewSplitInfoError(object.NewSplitInfoFromV2(v))
|
|
|
|
case *v2object.HeaderWithSignature:
|
|
|
|
res.hdr = v
|
2022-02-11 16:13:53 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
return &res, nil
|
|
|
|
}
|
2022-02-12 09:26:38 +00:00
|
|
|
|
|
|
|
// PrmObjectRange groups parameters of ObjectRange operation.
|
|
|
|
type PrmObjectRange struct {
|
|
|
|
prmObjectRead
|
|
|
|
|
2023-04-25 08:31:27 +00:00
|
|
|
signer neofscrypto.Signer
|
2022-08-25 11:32:37 +00:00
|
|
|
|
2022-08-25 10:29:31 +00:00
|
|
|
rng v2object.Range
|
2022-02-12 09:26:38 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// SetOffset sets offset of the payload range to be read.
|
2023-05-04 07:28:31 +00:00
|
|
|
// Zero by default. It is an alternative to [PrmObjectRange.SetRange].
|
2022-02-12 09:26:38 +00:00
|
|
|
func (x *PrmObjectRange) SetOffset(off uint64) {
|
2022-08-25 10:29:31 +00:00
|
|
|
x.rng.SetOffset(off)
|
2022-02-12 09:26:38 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// SetLength sets length of the payload range to be read.
|
2023-05-04 07:28:31 +00:00
|
|
|
// Must be positive. It is an alternative to [PrmObjectRange.SetRange].
|
2022-02-12 09:26:38 +00:00
|
|
|
func (x *PrmObjectRange) SetLength(ln uint64) {
|
2022-08-25 10:29:31 +00:00
|
|
|
x.rng.SetLength(ln)
|
2022-02-12 09:26:38 +00:00
|
|
|
}
|
|
|
|
|
2023-05-04 07:28:31 +00:00
|
|
|
// SetRange sets range of the payload to be read.
|
|
|
|
// It is an alternative to [PrmObjectRange.SetOffset], [PrmObjectRange.SetLength].
|
|
|
|
func (x *PrmObjectRange) SetRange(rng object.Range) {
|
|
|
|
x.rng = *rng.ToV2()
|
|
|
|
}
|
|
|
|
|
2023-04-25 08:31:27 +00:00
|
|
|
// UseSigner specifies private signer to sign the requests.
|
|
|
|
// If signer is not provided, then Client default signer is used.
|
|
|
|
func (x *PrmObjectRange) UseSigner(signer neofscrypto.Signer) {
|
|
|
|
x.signer = signer
|
2022-08-25 11:32:37 +00:00
|
|
|
}
|
|
|
|
|
2022-02-12 09:26:38 +00:00
|
|
|
// ResObjectRange groups the final result values of ObjectRange operation.
|
|
|
|
type ResObjectRange struct {
|
|
|
|
statusRes
|
|
|
|
}
|
|
|
|
|
|
|
|
// ObjectRangeReader is designed to read payload range of one object
|
|
|
|
// from NeoFS system.
|
|
|
|
//
|
|
|
|
// Must be initialized using Client.ObjectRangeInit, any other
|
|
|
|
// usage is unsafe.
|
|
|
|
type ObjectRangeReader struct {
|
|
|
|
cancelCtxStream context.CancelFunc
|
|
|
|
|
2022-08-25 11:32:37 +00:00
|
|
|
client *Client
|
2022-02-12 09:26:38 +00:00
|
|
|
|
2022-08-25 11:32:37 +00:00
|
|
|
res ResObjectRange
|
|
|
|
err error
|
2022-02-12 09:26:38 +00:00
|
|
|
|
2022-08-25 11:32:37 +00:00
|
|
|
stream interface {
|
|
|
|
Read(resp *v2object.GetRangeResponse) error
|
|
|
|
}
|
2022-02-12 09:26:38 +00:00
|
|
|
|
|
|
|
tailPayload []byte
|
2022-02-16 17:14:24 +00:00
|
|
|
|
|
|
|
remainingPayloadLen int
|
2022-02-12 09:26:38 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
func (x *ObjectRangeReader) readChunk(buf []byte) (int, bool) {
|
|
|
|
var read int
|
|
|
|
|
|
|
|
// read remaining tail
|
|
|
|
read = copy(buf, x.tailPayload)
|
|
|
|
|
|
|
|
x.tailPayload = x.tailPayload[read:]
|
|
|
|
|
|
|
|
if len(buf) == read {
|
|
|
|
return read, true
|
|
|
|
}
|
|
|
|
|
|
|
|
var partChunk *v2object.GetRangePartChunk
|
2022-02-24 11:33:43 +00:00
|
|
|
var chunk []byte
|
|
|
|
var lastRead int
|
|
|
|
|
|
|
|
for {
|
2022-08-25 11:32:37 +00:00
|
|
|
var resp v2object.GetRangeResponse
|
|
|
|
x.err = x.stream.Read(&resp)
|
|
|
|
if x.err != nil {
|
|
|
|
return read, false
|
|
|
|
}
|
|
|
|
|
|
|
|
x.res.st, x.err = x.client.processResponse(&resp)
|
|
|
|
if x.err != nil || !apistatus.IsSuccessful(x.res.st) {
|
2022-02-24 11:33:43 +00:00
|
|
|
return read, false
|
|
|
|
}
|
2022-02-12 09:26:38 +00:00
|
|
|
|
2022-02-24 11:33:43 +00:00
|
|
|
// get chunk message
|
2022-08-25 11:32:37 +00:00
|
|
|
switch v := resp.GetBody().GetRangePart().(type) {
|
2022-02-24 11:33:43 +00:00
|
|
|
default:
|
2022-08-25 11:32:37 +00:00
|
|
|
x.err = fmt.Errorf("unexpected message received: %T", v)
|
2022-02-24 11:33:43 +00:00
|
|
|
return read, false
|
|
|
|
case *v2object.SplitInfo:
|
2022-08-25 11:32:37 +00:00
|
|
|
x.err = object.NewSplitInfoError(object.NewSplitInfoFromV2(v))
|
2022-02-24 11:33:43 +00:00
|
|
|
return read, false
|
|
|
|
case *v2object.GetRangePartChunk:
|
|
|
|
partChunk = v
|
|
|
|
}
|
2022-02-12 09:26:38 +00:00
|
|
|
|
2022-02-24 11:33:43 +00:00
|
|
|
chunk = partChunk.GetChunk()
|
|
|
|
if len(chunk) == 0 {
|
|
|
|
// just skip empty chunks since they are not prohibited by protocol
|
|
|
|
continue
|
|
|
|
}
|
2022-02-12 09:26:38 +00:00
|
|
|
|
2022-02-24 11:33:43 +00:00
|
|
|
lastRead = copy(buf[read:], chunk)
|
2022-02-12 09:26:38 +00:00
|
|
|
|
2022-02-24 11:33:43 +00:00
|
|
|
read += lastRead
|
2022-02-12 09:26:38 +00:00
|
|
|
|
2022-02-24 11:33:43 +00:00
|
|
|
if read == len(buf) {
|
|
|
|
// save the tail
|
|
|
|
x.tailPayload = append(x.tailPayload, chunk[lastRead:]...)
|
2022-02-12 09:26:38 +00:00
|
|
|
|
2022-02-24 11:33:43 +00:00
|
|
|
return read, true
|
|
|
|
}
|
|
|
|
}
|
2022-02-12 09:26:38 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// ReadChunk reads another chunk of the object payload range.
|
|
|
|
// Works similar to io.Reader.Read but returns success flag instead of error.
|
|
|
|
//
|
|
|
|
// Failure reason can be received via Close.
|
|
|
|
func (x *ObjectRangeReader) ReadChunk(buf []byte) (int, bool) {
|
|
|
|
return x.readChunk(buf)
|
|
|
|
}
|
|
|
|
|
|
|
|
func (x *ObjectRangeReader) close(ignoreEOF bool) (*ResObjectRange, error) {
|
|
|
|
defer x.cancelCtxStream()
|
|
|
|
|
2022-08-25 11:32:37 +00:00
|
|
|
if x.err != nil {
|
|
|
|
if !errors.Is(x.err, io.EOF) {
|
|
|
|
return nil, x.err
|
2022-02-12 09:26:38 +00:00
|
|
|
} else if !ignoreEOF {
|
2022-02-24 11:44:49 +00:00
|
|
|
if x.remainingPayloadLen > 0 {
|
|
|
|
return nil, io.ErrUnexpectedEOF
|
|
|
|
}
|
|
|
|
|
2022-02-12 09:26:38 +00:00
|
|
|
return nil, io.EOF
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2022-08-25 11:32:37 +00:00
|
|
|
return &x.res, nil
|
2022-02-12 09:26:38 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Close ends reading the payload range and returns the result of the operation
|
|
|
|
// along with the final results. Must be called after using the ObjectRangeReader.
|
|
|
|
//
|
|
|
|
// Exactly one return value is non-nil. By default, server status is returned in res structure.
|
|
|
|
// Any client's internal or transport errors are returned as Go built-in error.
|
|
|
|
// If Client is tuned to resolve NeoFS API statuses, then NeoFS failures
|
|
|
|
// codes are returned as error.
|
|
|
|
//
|
|
|
|
// Return errors:
|
2022-08-24 14:17:40 +00:00
|
|
|
//
|
|
|
|
// *object.SplitInfoError (returned on virtual objects with PrmObjectRange.MakeRaw).
|
2022-02-12 09:26:38 +00:00
|
|
|
//
|
|
|
|
// Return statuses:
|
2022-02-28 10:56:46 +00:00
|
|
|
// - global (see Client docs);
|
|
|
|
// - *apistatus.ContainerNotFound;
|
|
|
|
// - *apistatus.ObjectNotFound;
|
|
|
|
// - *apistatus.ObjectAccessDenied;
|
|
|
|
// - *apistatus.ObjectAlreadyRemoved;
|
2022-06-29 17:24:56 +00:00
|
|
|
// - *apistatus.ObjectOutOfRange;
|
2022-02-28 10:56:46 +00:00
|
|
|
// - *apistatus.SessionTokenExpired.
|
2022-02-12 09:26:38 +00:00
|
|
|
func (x *ObjectRangeReader) Close() (*ResObjectRange, error) {
|
|
|
|
return x.close(true)
|
|
|
|
}
|
|
|
|
|
2022-02-17 15:34:38 +00:00
|
|
|
// Read implements io.Reader of the object payload.
|
2022-02-12 09:26:38 +00:00
|
|
|
func (x *ObjectRangeReader) Read(p []byte) (int, error) {
|
|
|
|
n, ok := x.readChunk(p)
|
2022-02-17 17:16:30 +00:00
|
|
|
|
|
|
|
x.remainingPayloadLen -= n
|
|
|
|
|
2022-02-12 09:26:38 +00:00
|
|
|
if !ok {
|
|
|
|
res, err := x.close(false)
|
|
|
|
if err != nil {
|
|
|
|
return n, err
|
|
|
|
}
|
2022-02-16 17:14:24 +00:00
|
|
|
|
|
|
|
return n, apistatus.ErrFromStatus(res.Status())
|
|
|
|
}
|
|
|
|
|
2022-02-17 17:16:30 +00:00
|
|
|
if x.remainingPayloadLen < 0 {
|
2022-02-16 17:14:24 +00:00
|
|
|
return n, errors.New("payload range size overflow")
|
2022-02-12 09:26:38 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
return n, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// ObjectRangeInit initiates reading an object's payload range through a remote
|
|
|
|
// server using NeoFS API protocol.
|
|
|
|
//
|
|
|
|
// The call only opens the transmission channel, explicit fetching is done using the ObjectRangeReader.
|
|
|
|
// Exactly one return value is non-nil. Resulting reader must be finally closed.
|
|
|
|
//
|
|
|
|
// Immediately panics if parameters are set incorrectly (see PrmObjectRange docs).
|
|
|
|
// Context is required and must not be nil. It is used for network communication.
|
|
|
|
func (c *Client) ObjectRangeInit(ctx context.Context, prm PrmObjectRange) (*ObjectRangeReader, error) {
|
|
|
|
// check parameters
|
|
|
|
switch {
|
|
|
|
case ctx == nil:
|
|
|
|
panic(panicMsgMissingContext)
|
2022-08-25 10:29:31 +00:00
|
|
|
case prm.addr.GetContainerID() == nil:
|
2022-02-12 09:26:38 +00:00
|
|
|
panic(panicMsgMissingContainer)
|
2022-08-25 10:29:31 +00:00
|
|
|
case prm.addr.GetObjectID() == nil:
|
2022-08-23 17:15:55 +00:00
|
|
|
panic(panicMsgMissingObject)
|
2022-08-25 10:29:31 +00:00
|
|
|
case prm.rng.GetLength() == 0:
|
2022-02-12 09:26:38 +00:00
|
|
|
panic("zero range length")
|
|
|
|
}
|
|
|
|
|
|
|
|
// form request body
|
|
|
|
var body v2object.GetRangeRequestBody
|
|
|
|
|
|
|
|
body.SetRaw(prm.raw)
|
2022-08-25 10:29:31 +00:00
|
|
|
body.SetAddress(&prm.addr)
|
|
|
|
body.SetRange(&prm.rng)
|
2022-02-12 09:26:38 +00:00
|
|
|
|
|
|
|
// form request
|
|
|
|
var req v2object.GetRangeRequest
|
|
|
|
|
|
|
|
req.SetBody(&body)
|
2022-08-25 11:32:37 +00:00
|
|
|
c.prepareRequest(&req, &prm.meta)
|
2022-02-12 09:26:38 +00:00
|
|
|
|
2023-04-25 08:31:27 +00:00
|
|
|
signer := prm.signer
|
|
|
|
if signer == nil {
|
|
|
|
signer = c.prm.signer
|
2022-08-29 10:13:21 +00:00
|
|
|
}
|
|
|
|
|
2023-04-25 08:31:27 +00:00
|
|
|
err := signServiceMessage(signer, &req)
|
2022-08-29 10:13:21 +00:00
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("sign request: %w", err)
|
|
|
|
}
|
|
|
|
|
2022-08-25 11:32:37 +00:00
|
|
|
ctx, cancel := context.WithCancel(ctx)
|
2022-02-12 09:26:38 +00:00
|
|
|
|
2022-08-25 11:32:37 +00:00
|
|
|
stream, err := rpcapi.GetObjectRange(&c.c, &req, client.WithContext(ctx))
|
|
|
|
if err != nil {
|
|
|
|
cancel()
|
|
|
|
return nil, fmt.Errorf("open stream: %w", err)
|
2022-02-12 09:26:38 +00:00
|
|
|
}
|
|
|
|
|
2022-08-25 11:32:37 +00:00
|
|
|
var r ObjectRangeReader
|
|
|
|
r.remainingPayloadLen = int(prm.rng.GetLength())
|
|
|
|
r.cancelCtxStream = cancel
|
|
|
|
r.stream = stream
|
|
|
|
r.client = c
|
|
|
|
|
2022-02-12 09:26:38 +00:00
|
|
|
return &r, nil
|
|
|
|
}
|