From 0cd353707a3a07ce32747c23bb86d9265e1e4584 Mon Sep 17 00:00:00 2001 From: Denis Kirillov Date: Fri, 23 Jun 2023 16:09:44 +0300 Subject: [PATCH] [#131] authmate: Make authmate use cobra Signed-off-by: Denis Kirillov --- authmate/authmate.go | 1 - cmd/s3-authmate/main.go | 751 +------------------------------- cmd/s3-authmate/modules/root.go | 56 +++ go.mod | 2 + go.sum | 4 + 5 files changed, 68 insertions(+), 746 deletions(-) create mode 100644 cmd/s3-authmate/modules/root.go diff --git a/authmate/authmate.go b/authmate/authmate.go index 5e80e364..870e7b5d 100644 --- a/authmate/authmate.go +++ b/authmate/authmate.go @@ -107,7 +107,6 @@ type ( Lifetime time.Duration AwsCliCredentialsFile string ContainerPolicies ContainerPolicies - UpdateCreds *UpdateOptions } // UpdateSecretOptions contains options for passing to Agent.UpdateSecret method. diff --git a/cmd/s3-authmate/main.go b/cmd/s3-authmate/main.go index fded16e0..5465c803 100644 --- a/cmd/s3-authmate/main.go +++ b/cmd/s3-authmate/main.go @@ -2,758 +2,19 @@ package main import ( "context" - "crypto/ecdsa" - "encoding/hex" - "encoding/json" - "fmt" "os" "os/signal" - "runtime" - "strings" "syscall" - "time" - "git.frostfs.info/TrueCloudLab/frostfs-s3-gw/api" - "git.frostfs.info/TrueCloudLab/frostfs-s3-gw/api/auth" - "git.frostfs.info/TrueCloudLab/frostfs-s3-gw/authmate" - "git.frostfs.info/TrueCloudLab/frostfs-s3-gw/internal/frostfs" - "git.frostfs.info/TrueCloudLab/frostfs-s3-gw/internal/version" - "git.frostfs.info/TrueCloudLab/frostfs-s3-gw/internal/wallet" - cid "git.frostfs.info/TrueCloudLab/frostfs-sdk-go/container/id" - oid "git.frostfs.info/TrueCloudLab/frostfs-sdk-go/object/id" - "git.frostfs.info/TrueCloudLab/frostfs-sdk-go/pool" - "github.com/aws/aws-sdk-go/aws" - "github.com/aws/aws-sdk-go/aws/credentials" - "github.com/aws/aws-sdk-go/aws/session" - "github.com/nspcc-dev/neo-go/pkg/crypto/keys" - "github.com/spf13/viper" - "github.com/urfave/cli/v2" - "go.uber.org/zap" - "go.uber.org/zap/zapcore" + "git.frostfs.info/TrueCloudLab/frostfs-s3-gw/cmd/s3-authmate/modules" ) -const ( - poolDialTimeout = 5 * time.Second - poolHealthcheckTimeout = 5 * time.Second - poolRebalanceInterval = 30 * time.Second - poolStreamTimeout = 10 * time.Second - - // a month. - defaultLifetime = 30 * 24 * time.Hour - defaultPresignedLifetime = 12 * time.Hour -) - -type PoolConfig struct { - Key *ecdsa.PrivateKey - Address string - DialTimeout time.Duration - HealthcheckTimeout time.Duration - StreamTimeout time.Duration - RebalanceInterval time.Duration -} - -var ( - walletPathFlag string - accountAddressFlag string - peerAddressFlag string - eaclRulesFlag string - disableImpersonateFlag bool - gateWalletPathFlag string - gateAccountAddressFlag string - accessKeyIDFlag string - containerIDFlag string - containerFriendlyName string - containerPlacementPolicy string - gatesPublicKeysFlag cli.StringSlice - logEnabledFlag bool - logDebugEnabledFlag bool - sessionTokenFlag string - lifetimeFlag time.Duration - endpointFlag string - bucketFlag string - objectFlag string - methodFlag string - profileFlag string - regionFlag string - secretAccessKeyFlag string - containerPolicies string - awcCliCredFile string - timeoutFlag time.Duration - - // pool timeouts flag. - poolDialTimeoutFlag time.Duration - poolHealthcheckTimeoutFlag time.Duration - poolRebalanceIntervalFlag time.Duration - poolStreamTimeoutFlag time.Duration -) - -const ( - envWalletPassphrase = "wallet.passphrase" - envWalletGatePassphrase = "wallet.gate.passphrase" - envSecretAccessKey = "secret.access.key" -) - -var zapConfig = zap.Config{ - Development: true, - Encoding: "console", - Level: zap.NewAtomicLevelAt(zapcore.FatalLevel), - OutputPaths: []string{"stdout"}, - EncoderConfig: zapcore.EncoderConfig{ - MessageKey: "message", - LevelKey: "level", - EncodeLevel: zapcore.CapitalLevelEncoder, - TimeKey: "time", - EncodeTime: zapcore.ISO8601TimeEncoder, - CallerKey: "caller", - EncodeCaller: zapcore.ShortCallerEncoder, - }, -} - -func prepare() (context.Context, *zap.Logger) { - var ( - err error - log = zap.NewNop() - ctx, _ = signal.NotifyContext(context.Background(), syscall.SIGINT, syscall.SIGTERM, syscall.SIGHUP) - ) - - if !logEnabledFlag { - return ctx, log - } else if logDebugEnabledFlag { - zapConfig.Level = zap.NewAtomicLevelAt(zapcore.DebugLevel) - } - - if log, err = zapConfig.Build(); err != nil { - panic(fmt.Errorf("create logger: %w", err)) - } - - return ctx, log -} - func main() { - app := &cli.App{ - Name: "FrostFS S3 Authmate", - Usage: "Helps manage delegated access via gates to data stored in FrostFS network", - Version: version.Version, - Flags: appFlags(), - Commands: appCommands(), - } - cli.VersionPrinter = func(c *cli.Context) { - fmt.Printf("%s\nVersion: %s\nGoVersion: %s\n", c.App.Name, c.App.Version, runtime.Version()) - } + ctx, _ := signal.NotifyContext(context.Background(), syscall.SIGINT, syscall.SIGTERM, syscall.SIGHUP) - viper.AutomaticEnv() - viper.SetEnvPrefix("AUTHMATE") - viper.SetEnvKeyReplacer(strings.NewReplacer(".", "_")) - viper.AllowEmptyEnv(true) - - if err := app.Run(os.Args); err != nil { - _, _ = fmt.Fprintf(os.Stderr, "error: %s\n", err) - os.Exit(100) + if cmd, err := modules.Execute(ctx); err != nil { + cmd.PrintErrln("Error:", err.Error()) + cmd.PrintErrf("Run '%v --help' for usage.\n", cmd.CommandPath()) + os.Exit(1) } } - -func appFlags() []cli.Flag { - return []cli.Flag{ - &cli.BoolFlag{ - Name: "with-log", - Usage: "Enable logger", - Destination: &logEnabledFlag, - }, - &cli.BoolFlag{ - Name: "debug", - Usage: "Enable debug logger level", - Destination: &logDebugEnabledFlag, - }, - &cli.DurationFlag{ - Name: "timeout", - Usage: "timeout of processing of the command, for example 2m " + - "(note: max time unit is an hour so to set a day you should use 24h)", - Destination: &timeoutFlag, - Value: 1 * time.Minute, - }, - } -} - -func appCommands() []*cli.Command { - return []*cli.Command{ - issueSecret(), - obtainSecret(), - generatePresignedURL(), - } -} - -func issueSecret() *cli.Command { - return &cli.Command{ - Name: "issue-secret", - Usage: "Issue a secret in FrostFS network", - Flags: []cli.Flag{ - &cli.StringFlag{ - Name: "wallet", - Value: "", - Usage: "path to the wallet", - Required: true, - Destination: &walletPathFlag, - }, - &cli.StringFlag{ - Name: "address", - Value: "", - Usage: "address of wallet account", - Required: false, - Destination: &accountAddressFlag, - }, - &cli.StringFlag{ - Name: "peer", - Value: "", - Usage: "address of a frostfs peer to connect to", - Required: true, - Destination: &peerAddressFlag, - }, - &cli.StringFlag{ - Name: "bearer-rules", - Usage: "rules for bearer token (filepath or a plain json string are allowed, can be used only with --disable-impersonate)", - Required: false, - Destination: &eaclRulesFlag, - }, - &cli.BoolFlag{ - Name: "disable-impersonate", - Usage: "mark token as not impersonate to don't consider token signer as request owner (must be provided to use --bearer-rules flag)", - Required: false, - Destination: &disableImpersonateFlag, - }, - &cli.StringSliceFlag{ - Name: "gate-public-key", - Usage: "public 256r1 key of a gate (use flags repeatedly for multiple gates)", - Required: true, - Destination: &gatesPublicKeysFlag, - }, - &cli.StringFlag{ - Name: "container-id", - Usage: "auth container id to put the secret into", - Required: false, - Destination: &containerIDFlag, - }, - &cli.StringFlag{ - Name: "access-key-id", - Usage: "access key id for s3 (use this flag to update existing creds, if this flag is provided '--container-id', '--container-friendly-name' and '--container-placement-policy' are ineffective)", - Required: false, - Destination: &accessKeyIDFlag, - }, - &cli.StringFlag{ - Name: "container-friendly-name", - Usage: "friendly name of auth container to put the secret into", - Required: false, - Destination: &containerFriendlyName, - }, - &cli.StringFlag{ - Name: "container-placement-policy", - Usage: "placement policy of auth container to put the secret into", - Required: false, - Destination: &containerPlacementPolicy, - Value: "REP 2 IN X CBF 3 SELECT 2 FROM * AS X", - }, - &cli.StringFlag{ - Name: "session-tokens", - Usage: "create session tokens with rules, if the rules are set as 'none', no session tokens will be created", - Required: false, - Destination: &sessionTokenFlag, - Value: "", - }, - &cli.DurationFlag{ - Name: "lifetime", - Usage: `Lifetime of tokens. For example 50h30m (note: max time unit is an hour so to set a day you should use 24h). -It will be ceil rounded to the nearest amount of epoch.`, - Required: false, - Destination: &lifetimeFlag, - Value: defaultLifetime, - }, - &cli.StringFlag{ - Name: "container-policy", - Usage: "mapping AWS storage class to FrostFS storage policy as plain json string or path to json file", - Required: false, - Destination: &containerPolicies, - }, - &cli.StringFlag{ - Name: "aws-cli-credentials", - Usage: "path to the aws cli credential file", - Required: false, - Destination: &awcCliCredFile, - }, - &cli.DurationFlag{ - Name: "pool-dial-timeout", - Usage: `Timeout for connection to the node in pool to be established`, - Required: false, - Destination: &poolDialTimeoutFlag, - Value: poolDialTimeout, - }, - &cli.DurationFlag{ - Name: "pool-healthcheck-timeout", - Usage: `Timeout for request to node to decide if it is alive`, - Required: false, - Destination: &poolHealthcheckTimeoutFlag, - Value: poolHealthcheckTimeout, - }, - &cli.DurationFlag{ - Name: "pool-rebalance-interval", - Usage: `Interval for updating nodes health status`, - Required: false, - Destination: &poolRebalanceIntervalFlag, - Value: poolRebalanceInterval, - }, - &cli.DurationFlag{ - Name: "pool-stream-timeout", - Usage: `Timeout for individual operation in streaming RPC`, - Required: false, - Destination: &poolStreamTimeoutFlag, - Value: poolStreamTimeout, - }, - }, - Action: func(c *cli.Context) error { - ctx, log := prepare() - - password := wallet.GetPassword(viper.GetViper(), envWalletPassphrase) - key, err := wallet.GetKeyFromPath(walletPathFlag, accountAddressFlag, password) - if err != nil { - return cli.Exit(fmt.Sprintf("failed to load frostfs private key: %s", err), 1) - } - - ctx, cancel := context.WithCancel(ctx) - defer cancel() - - poolCfg := PoolConfig{ - Key: &key.PrivateKey, - Address: peerAddressFlag, - DialTimeout: poolDialTimeoutFlag, - HealthcheckTimeout: poolHealthcheckTimeoutFlag, - StreamTimeout: poolStreamTimeoutFlag, - RebalanceInterval: poolRebalanceIntervalFlag, - } - - frostFS, err := createFrostFS(ctx, log, poolCfg) - if err != nil { - return cli.Exit(fmt.Sprintf("failed to create FrostFS component: %s", err), 2) - } - - agent := authmate.New(log, frostFS) - - var containerID cid.ID - if len(containerIDFlag) > 0 { - if err = containerID.DecodeString(containerIDFlag); err != nil { - return cli.Exit(fmt.Sprintf("failed to parse auth container id: %s", err), 3) - } - } - - var credsToUpdate *authmate.UpdateOptions - if len(accessKeyIDFlag) > 0 { - secretAccessKeyStr := wallet.GetPassword(viper.GetViper(), envSecretAccessKey) - if secretAccessKeyStr == nil { - return fmt.Errorf("you must provide AUTHMATE_SECRET_ACCESS_KEY env to update existing creds") - } - - secretAccessKey, err := hex.DecodeString(*secretAccessKeyStr) - if err != nil { - return fmt.Errorf("access key must be hex encoded") - } - - var addr oid.Address - credAddr := strings.Replace(accessKeyIDFlag, "0", "/", 1) - if err = addr.DecodeString(credAddr); err != nil { - return fmt.Errorf("failed to parse creds address: %w", err) - } - // we can create new creds version only in the same container - containerID = addr.Container() - - credsToUpdate = &authmate.UpdateOptions{ - Address: addr, - SecretAccessKey: secretAccessKey, - } - } - - var gatesPublicKeys []*keys.PublicKey - for _, key := range gatesPublicKeysFlag.Value() { - gpk, err := keys.NewPublicKeyFromString(key) - if err != nil { - return cli.Exit(fmt.Sprintf("failed to load gate's public key: %s", err), 4) - } - gatesPublicKeys = append(gatesPublicKeys, gpk) - } - - if lifetimeFlag <= 0 { - return cli.Exit(fmt.Sprintf("lifetime must be greater 0, current value: %d", lifetimeFlag), 5) - } - - policies, err := parsePolicies(containerPolicies) - if err != nil { - return cli.Exit(fmt.Sprintf("couldn't parse container policy: %s", err.Error()), 6) - } - - if !disableImpersonateFlag && eaclRulesFlag != "" { - return cli.Exit("--bearer-rules flag can be used only with --disable-impersonate", 6) - } - - bearerRules, err := getJSONRules(eaclRulesFlag) - if err != nil { - return cli.Exit(fmt.Sprintf("couldn't parse 'bearer-rules' flag: %s", err.Error()), 7) - } - - sessionRules, skipSessionRules, err := getSessionRules(sessionTokenFlag) - if err != nil { - return cli.Exit(fmt.Sprintf("couldn't parse 'session-tokens' flag: %s", err.Error()), 8) - } - - issueSecretOptions := &authmate.IssueSecretOptions{ - Container: authmate.ContainerOptions{ - ID: containerID, - FriendlyName: containerFriendlyName, - PlacementPolicy: containerPlacementPolicy, - }, - FrostFSKey: key, - GatesPublicKeys: gatesPublicKeys, - EACLRules: bearerRules, - Impersonate: !disableImpersonateFlag, - SessionTokenRules: sessionRules, - SkipSessionRules: skipSessionRules, - ContainerPolicies: policies, - Lifetime: lifetimeFlag, - AwsCliCredentialsFile: awcCliCredFile, - UpdateCreds: credsToUpdate, - } - - var tcancel context.CancelFunc - ctx, tcancel = context.WithTimeout(ctx, timeoutFlag) - defer tcancel() - - if err = agent.IssueSecret(ctx, os.Stdout, issueSecretOptions); err != nil { - return cli.Exit(fmt.Sprintf("failed to issue secret: %s", err), 7) - } - return nil - }, - } -} - -func generatePresignedURL() *cli.Command { - return &cli.Command{ - Name: "generate-presigned-url", - Description: `Generate presigned url using AWS credentials. Credentials must be placed in ~/.aws/credentials. -You provide profile to load using --profile flag or explicitly provide credentials and region using ---aws-access-key-id, --aws-secret-access-key, --region. -Note to override credentials you must provide both access key and secret key.`, - Usage: "generate-presigned-url --endpoint http://s3.frostfs.devenv:8080 --bucket bucket-name --object object-name --method get --profile aws-profile", - Flags: []cli.Flag{ - &cli.DurationFlag{ - Name: "lifetime", - Usage: `Lifetime of presigned URL. For example 50h30m (note: max time unit is an hour so to set a day you should use 24h). -It will be ceil rounded to the nearest amount of epoch.`, - Required: false, - Destination: &lifetimeFlag, - Value: defaultPresignedLifetime, - }, - &cli.StringFlag{ - Name: "endpoint", - Usage: `Endpoint of s3-gw`, - Required: true, - Destination: &endpointFlag, - }, - &cli.StringFlag{ - Name: "bucket", - Usage: `Bucket name to perform action`, - Required: true, - Destination: &bucketFlag, - }, - &cli.StringFlag{ - Name: "object", - Usage: `Object name to perform action`, - Required: true, - Destination: &objectFlag, - }, - &cli.StringFlag{ - Name: "method", - Usage: `HTTP method to perform action`, - Required: true, - Destination: &methodFlag, - }, - &cli.StringFlag{ - Name: "profile", - Usage: `AWS profile to load`, - Required: false, - Destination: &profileFlag, - }, - &cli.StringFlag{ - Name: "region", - Usage: `AWS region to use in signature (default is taken from ~/.aws/config)`, - Required: false, - Destination: ®ionFlag, - }, - &cli.StringFlag{ - Name: "aws-access-key-id", - Usage: `AWS access key id to sign the URL (default is taken from ~/.aws/credentials)`, - Required: false, - Destination: &accessKeyIDFlag, - }, - &cli.StringFlag{ - Name: "aws-secret-access-key", - Usage: `AWS access secret access key to sign the URL (default is taken from ~/.aws/credentials)`, - Required: false, - Destination: &secretAccessKeyFlag, - }, - }, - Action: func(c *cli.Context) error { - var cfg aws.Config - if regionFlag != "" { - cfg.Region = ®ionFlag - } - if accessKeyIDFlag != "" && secretAccessKeyFlag != "" { - cfg.Credentials = credentials.NewStaticCredentialsFromCreds(credentials.Value{ - AccessKeyID: accessKeyIDFlag, - SecretAccessKey: secretAccessKeyFlag, - }) - } - - sess, err := session.NewSessionWithOptions(session.Options{ - Config: cfg, - Profile: profileFlag, - SharedConfigState: session.SharedConfigEnable, - }) - if err != nil { - return fmt.Errorf("couldn't get credentials: %w", err) - } - - reqData := auth.RequestData{ - Method: methodFlag, - Endpoint: endpointFlag, - Bucket: bucketFlag, - Object: objectFlag, - } - presignData := auth.PresignData{ - Service: "s3", - Region: *sess.Config.Region, - Lifetime: lifetimeFlag, - SignTime: time.Now().UTC(), - } - - req, err := auth.PresignRequest(sess.Config.Credentials, reqData, presignData) - if err != nil { - return err - } - - res := &struct{ URL string }{ - URL: req.URL.String(), - } - - enc := json.NewEncoder(os.Stdout) - enc.SetIndent("", " ") - enc.SetEscapeHTML(false) - return enc.Encode(res) - }, - } -} - -func parsePolicies(val string) (authmate.ContainerPolicies, error) { - if val == "" { - return nil, nil - } - - var ( - data = []byte(val) - err error - ) - - if !json.Valid(data) { - if data, err = os.ReadFile(val); err != nil { - return nil, fmt.Errorf("coudln't read json file or provided json is invalid") - } - } - - var policies authmate.ContainerPolicies - if err = json.Unmarshal(data, &policies); err != nil { - return nil, fmt.Errorf("unmarshal policies: %w", err) - } - if _, ok := policies[api.DefaultLocationConstraint]; ok { - return nil, fmt.Errorf("config overrides %s location constraint", api.DefaultLocationConstraint) - } - - return policies, nil -} - -func getJSONRules(val string) ([]byte, error) { - if val == "" { - return nil, nil - } - data := []byte(val) - if json.Valid(data) { - return data, nil - } - - if data, err := os.ReadFile(val); err == nil { - if json.Valid(data) { - return data, nil - } - } - - return nil, fmt.Errorf("coudln't read json file or provided json is invalid") -} - -// getSessionRules reads json session rules. -// It returns true if rules must be skipped. -func getSessionRules(r string) ([]byte, bool, error) { - if r == "none" { - return nil, true, nil - } - - data, err := getJSONRules(r) - return data, false, err -} - -func obtainSecret() *cli.Command { - command := &cli.Command{ - Name: "obtain-secret", - Usage: "Obtain a secret from FrostFS network", - Flags: []cli.Flag{ - &cli.StringFlag{ - Name: "wallet", - Value: "", - Usage: "path to the wallet", - Required: true, - Destination: &walletPathFlag, - }, - &cli.StringFlag{ - Name: "address", - Value: "", - Usage: "address of wallet account", - Required: false, - Destination: &accountAddressFlag, - }, - &cli.StringFlag{ - Name: "peer", - Value: "", - Usage: "address of frostfs peer to connect to", - Required: true, - Destination: &peerAddressFlag, - }, - &cli.StringFlag{ - Name: "gate-wallet", - Value: "", - Usage: "path to the wallet", - Required: true, - Destination: &gateWalletPathFlag, - }, - &cli.StringFlag{ - Name: "gate-address", - Value: "", - Usage: "address of wallet account", - Required: false, - Destination: &gateAccountAddressFlag, - }, - &cli.StringFlag{ - Name: "access-key-id", - Usage: "access key id for s3", - Required: true, - Destination: &accessKeyIDFlag, - }, - &cli.DurationFlag{ - Name: "pool-dial-timeout", - Usage: `Timeout for connection to the node in pool to be established`, - Required: false, - Destination: &poolDialTimeoutFlag, - Value: poolDialTimeout, - }, - &cli.DurationFlag{ - Name: "pool-healthcheck-timeout", - Usage: `Timeout for request to node to decide if it is alive`, - Required: false, - Destination: &poolHealthcheckTimeoutFlag, - Value: poolHealthcheckTimeout, - }, - &cli.DurationFlag{ - Name: "pool-rebalance-interval", - Usage: `Interval for updating nodes health status`, - Required: false, - Destination: &poolRebalanceIntervalFlag, - Value: poolRebalanceInterval, - }, - &cli.DurationFlag{ - Name: "pool-stream-timeout", - Usage: `Timeout for individual operation in streaming RPC`, - Required: false, - Destination: &poolStreamTimeoutFlag, - Value: poolStreamTimeout, - }, - }, - Action: func(c *cli.Context) error { - ctx, log := prepare() - - password := wallet.GetPassword(viper.GetViper(), envWalletPassphrase) - key, err := wallet.GetKeyFromPath(walletPathFlag, accountAddressFlag, password) - if err != nil { - return cli.Exit(fmt.Sprintf("failed to load frostfs private key: %s", err), 1) - } - - ctx, cancel := context.WithCancel(ctx) - defer cancel() - - poolCfg := PoolConfig{ - Key: &key.PrivateKey, - Address: peerAddressFlag, - DialTimeout: poolDialTimeoutFlag, - HealthcheckTimeout: poolHealthcheckTimeoutFlag, - StreamTimeout: poolStreamTimeoutFlag, - RebalanceInterval: poolRebalanceIntervalFlag, - } - - frostFS, err := createFrostFS(ctx, log, poolCfg) - if err != nil { - return cli.Exit(fmt.Sprintf("failed to create FrostFS component: %s", err), 2) - } - - agent := authmate.New(log, frostFS) - - var _ = agent - - password = wallet.GetPassword(viper.GetViper(), envWalletGatePassphrase) - gateCreds, err := wallet.GetKeyFromPath(gateWalletPathFlag, gateAccountAddressFlag, password) - if err != nil { - return cli.Exit(fmt.Sprintf("failed to create owner's private key: %s", err), 4) - } - - secretAddress := strings.Replace(accessKeyIDFlag, "0", "/", 1) - - obtainSecretOptions := &authmate.ObtainSecretOptions{ - SecretAddress: secretAddress, - GatePrivateKey: gateCreds, - } - - var tcancel context.CancelFunc - ctx, tcancel = context.WithTimeout(ctx, timeoutFlag) - defer tcancel() - - if err = agent.ObtainSecret(ctx, os.Stdout, obtainSecretOptions); err != nil { - return cli.Exit(fmt.Sprintf("failed to obtain secret: %s", err), 5) - } - - return nil - }, - } - return command -} - -func createFrostFS(ctx context.Context, log *zap.Logger, cfg PoolConfig) (authmate.FrostFS, error) { - log.Debug("prepare connection pool") - - var prm pool.InitParameters - prm.SetKey(cfg.Key) - prm.SetNodeDialTimeout(cfg.DialTimeout) - prm.SetHealthcheckTimeout(cfg.HealthcheckTimeout) - prm.SetNodeStreamTimeout(cfg.StreamTimeout) - prm.SetClientRebalanceInterval(cfg.RebalanceInterval) - prm.AddNode(pool.NewNodeParam(1, cfg.Address, 1)) - - p, err := pool.NewPool(prm) - if err != nil { - return nil, fmt.Errorf("create pool: %w", err) - } - - if err = p.Dial(ctx); err != nil { - return nil, fmt.Errorf("dial pool: %w", err) - } - - return frostfs.NewAuthmateFrostFS(p), nil -} diff --git a/cmd/s3-authmate/modules/root.go b/cmd/s3-authmate/modules/root.go new file mode 100644 index 00000000..72d82e7c --- /dev/null +++ b/cmd/s3-authmate/modules/root.go @@ -0,0 +1,56 @@ +package modules + +import ( + "context" + "runtime" + "strings" + "time" + + "git.frostfs.info/TrueCloudLab/frostfs-s3-gw/internal/version" + "github.com/spf13/cobra" + "github.com/spf13/viper" +) + +// rootCmd represents the base command when called without any subcommands. +var rootCmd = &cobra.Command{ + Use: "frostfs-s3-authmate", + Version: version.Version, + Short: "FrostFS S3 Authmate", + Long: "Helps manage delegated access via gates to data stored in FrostFS network", + Example: "frostfs-s3-authmate --version", + SilenceErrors: true, + SilenceUsage: true, + PersistentPreRunE: func(cmd *cobra.Command, _ []string) error { + viper.AutomaticEnv() + viper.SetEnvPrefix("AUTHMATE") + viper.SetEnvKeyReplacer(strings.NewReplacer(".", "_")) + viper.AllowEmptyEnv(true) + + return viper.BindPFlags(cmd.Flags()) + }, + RunE: func(cmd *cobra.Command, _ []string) error { + return cmd.Help() + }, +} + +const ( + withLogFlag = "with-log" + debugFlag = "debug" + timeoutFlag = "timeout" +) + +func Execute(ctx context.Context) (*cobra.Command, error) { + return rootCmd.ExecuteContextC(ctx) +} + +func init() { + rootCmd.PersistentFlags().Bool(withLogFlag, false, "Enable logger") + rootCmd.PersistentFlags().Bool(debugFlag, false, "Enable debug logger level") + rootCmd.PersistentFlags().Duration(timeoutFlag, time.Minute, "Timeout of processing of the command, for example 2m (note: max time unit is an hour so to set a day you should use 24h)") + + cobra.AddTemplateFunc("runtimeVersion", runtime.Version) + rootCmd.SetVersionTemplate(`Frostfs S3 Authmate +{{printf "Version: %s" .Version }} +GoVersion: {{ runtimeVersion }} +`) +} diff --git a/go.mod b/go.mod index b817a3fa..a1fb4d0f 100644 --- a/go.mod +++ b/go.mod @@ -16,6 +16,7 @@ require ( github.com/panjf2000/ants/v2 v2.5.0 github.com/prometheus/client_golang v1.15.1 github.com/prometheus/client_model v0.3.0 + github.com/spf13/cobra v1.7.0 github.com/spf13/pflag v1.0.5 github.com/spf13/viper v1.15.0 github.com/stretchr/testify v1.8.3 @@ -52,6 +53,7 @@ require ( github.com/hashicorp/golang-lru v0.6.0 // indirect github.com/hashicorp/golang-lru/v2 v2.0.2 // indirect github.com/hashicorp/hcl v1.0.0 // indirect + github.com/inconshreveable/mousetrap v1.1.0 // indirect github.com/jmespath/go-jmespath v0.4.0 // indirect github.com/magiconair/properties v1.8.7 // indirect github.com/matttproud/golang_protobuf_extensions v1.0.4 // indirect diff --git a/go.sum b/go.sum index 92ddea3d..26654e19 100644 --- a/go.sum +++ b/go.sum @@ -264,6 +264,8 @@ github.com/holiman/uint256 v1.2.0/go.mod h1:y4ga/t+u+Xwd7CpDgZESaRcWy0I7XMlTMA25 github.com/hpcloud/tail v1.0.0/go.mod h1:ab1qPbhIpdTxEkNHXyeSf5vhxWSCs/tWer42PpOxQnU= github.com/ianlancetaylor/demangle v0.0.0-20181102032728-5e5cf60278f6/go.mod h1:aSSvb/t6k1mPoxDqO4vJh6VOCGPwU4O0C2/Eqndh1Sc= github.com/ianlancetaylor/demangle v0.0.0-20200824232613-28f6c0f3b639/go.mod h1:aSSvb/t6k1mPoxDqO4vJh6VOCGPwU4O0C2/Eqndh1Sc= +github.com/inconshreveable/mousetrap v1.1.0 h1:wN+x4NVGpMsO7ErUn/mUI3vEoE6Jt13X2s0bqwp9tc8= +github.com/inconshreveable/mousetrap v1.1.0/go.mod h1:vpF70FUmC8bwa3OWnCshd2FqLfsEA9PFc4w1p2J65bw= github.com/jessevdk/go-flags v0.0.0-20141203071132-1679536dcc89/go.mod h1:4FA24M0QyGHXBuZZK/XkWh8h0e1EYbRYJSGM75WSRxI= github.com/jessevdk/go-flags v1.4.0/go.mod h1:4FA24M0QyGHXBuZZK/XkWh8h0e1EYbRYJSGM75WSRxI= github.com/jmespath/go-jmespath v0.4.0 h1:BEgLn5cpjn8UN1mAw4NjwDrS35OdebyEtFe+9YPoQUg= @@ -433,6 +435,8 @@ github.com/spf13/afero v1.9.3 h1:41FoI0fD7OR7mGcKE/aOiLkGreyf8ifIOQmJANWogMk= github.com/spf13/afero v1.9.3/go.mod h1:iUV7ddyEEZPO5gA3zD4fJt6iStLlL+Lg4m2cihcDf8Y= github.com/spf13/cast v1.5.0 h1:rj3WzYc11XZaIZMPKmwP96zkFEnnAmV8s6XbB2aY32w= github.com/spf13/cast v1.5.0/go.mod h1:SpXXQ5YoyJw6s3/6cMTQuxvgRl3PCJiyaX9p6b155UU= +github.com/spf13/cobra v1.7.0 h1:hyqWnYt1ZQShIddO5kBpj3vu05/++x6tJ6dg8EC572I= +github.com/spf13/cobra v1.7.0/go.mod h1:uLxZILRyS/50WlhOIKD7W6V5bgeIt+4sICxh6uRMrb0= github.com/spf13/jwalterweatherman v1.1.0 h1:ue6voC5bR5F8YxI5S67j9i582FU4Qvo2bmqnqMYADFk= github.com/spf13/jwalterweatherman v1.1.0/go.mod h1:aNWZUN0dPAAO/Ljvb5BEdw96iTZ0EXowPYD95IqWIGo= github.com/spf13/pflag v1.0.5 h1:iy+VFUOCP1a+8yFto/drg2CJ5u0yRoB7fZw3DKv/JXA=