forked from TrueCloudLab/frostfs-s3-gw
188 lines
5.1 KiB
Go
188 lines
5.1 KiB
Go
package layer
|
|
|
|
import (
|
|
"context"
|
|
"fmt"
|
|
"strconv"
|
|
|
|
"git.frostfs.info/TrueCloudLab/frostfs-s3-gw/api"
|
|
"git.frostfs.info/TrueCloudLab/frostfs-s3-gw/api/data"
|
|
s3errors "git.frostfs.info/TrueCloudLab/frostfs-s3-gw/api/errors"
|
|
"git.frostfs.info/TrueCloudLab/frostfs-s3-gw/api/middleware"
|
|
"git.frostfs.info/TrueCloudLab/frostfs-s3-gw/internal/logs"
|
|
"git.frostfs.info/TrueCloudLab/frostfs-sdk-go/client"
|
|
"git.frostfs.info/TrueCloudLab/frostfs-sdk-go/container"
|
|
"git.frostfs.info/TrueCloudLab/frostfs-sdk-go/container/acl"
|
|
cid "git.frostfs.info/TrueCloudLab/frostfs-sdk-go/container/id"
|
|
"git.frostfs.info/TrueCloudLab/frostfs-sdk-go/eacl"
|
|
"git.frostfs.info/TrueCloudLab/frostfs-sdk-go/session"
|
|
"go.uber.org/zap"
|
|
)
|
|
|
|
type (
|
|
// BucketACL extends BucketInfo by eacl.Table.
|
|
BucketACL struct {
|
|
Info *data.BucketInfo
|
|
EACL *eacl.Table
|
|
}
|
|
)
|
|
|
|
const (
|
|
attributeLocationConstraint = ".s3-location-constraint"
|
|
AttributeLockEnabled = "LockEnabled"
|
|
)
|
|
|
|
func (n *Layer) containerInfo(ctx context.Context, prm PrmContainer) (*data.BucketInfo, error) {
|
|
var (
|
|
err error
|
|
res *container.Container
|
|
log = n.reqLogger(ctx).With(zap.Stringer("cid", prm.ContainerID))
|
|
|
|
info = &data.BucketInfo{
|
|
CID: prm.ContainerID,
|
|
Name: prm.ContainerID.EncodeToString(),
|
|
}
|
|
|
|
reqInfo = middleware.GetReqInfo(ctx)
|
|
)
|
|
|
|
res, err = n.frostFS.Container(ctx, prm)
|
|
if err != nil {
|
|
if client.IsErrContainerNotFound(err) {
|
|
return nil, fmt.Errorf("%w: %s", s3errors.GetAPIError(s3errors.ErrNoSuchBucket), err.Error())
|
|
}
|
|
return nil, fmt.Errorf("get frostfs container: %w", err)
|
|
}
|
|
|
|
cnr := *res
|
|
|
|
info.Owner = cnr.Owner()
|
|
if domain := container.ReadDomain(cnr); domain.Name() != "" {
|
|
info.Name = domain.Name()
|
|
info.Zone = domain.Zone()
|
|
}
|
|
info.Created = container.CreatedAt(cnr)
|
|
info.LocationConstraint = cnr.Attribute(attributeLocationConstraint)
|
|
info.HomomorphicHashDisabled = container.IsHomomorphicHashingDisabled(cnr)
|
|
info.APEEnabled = cnr.BasicACL().Bits() == 0
|
|
|
|
attrLockEnabled := cnr.Attribute(AttributeLockEnabled)
|
|
if len(attrLockEnabled) > 0 {
|
|
info.ObjectLockEnabled, err = strconv.ParseBool(attrLockEnabled)
|
|
if err != nil {
|
|
log.Error(logs.CouldNotParseContainerObjectLockEnabledAttribute,
|
|
zap.String("lock_enabled", attrLockEnabled),
|
|
zap.Error(err),
|
|
)
|
|
}
|
|
}
|
|
|
|
zone, _ := n.features.FormContainerZone(reqInfo.Namespace)
|
|
if zone != info.Zone {
|
|
return nil, fmt.Errorf("ns '%s' and zone '%s' are mismatched for container '%s'", zone, info.Zone, prm.ContainerID)
|
|
}
|
|
|
|
n.cache.PutBucket(info)
|
|
|
|
return info, nil
|
|
}
|
|
|
|
func (n *Layer) containerList(ctx context.Context) ([]*data.BucketInfo, error) {
|
|
stoken := n.SessionTokenForRead(ctx)
|
|
|
|
prm := PrmUserContainers{
|
|
UserID: n.BearerOwner(ctx),
|
|
SessionToken: stoken,
|
|
}
|
|
|
|
res, err := n.frostFS.UserContainers(ctx, prm)
|
|
if err != nil {
|
|
n.reqLogger(ctx).Error(logs.CouldNotListUserContainers, zap.Error(err))
|
|
return nil, err
|
|
}
|
|
|
|
list := make([]*data.BucketInfo, 0, len(res))
|
|
for i := range res {
|
|
getPrm := PrmContainer{
|
|
ContainerID: res[i],
|
|
SessionToken: stoken,
|
|
}
|
|
info, err := n.containerInfo(ctx, getPrm)
|
|
if err != nil {
|
|
n.reqLogger(ctx).Error(logs.CouldNotFetchContainerInfo, zap.Error(err))
|
|
continue
|
|
}
|
|
|
|
list = append(list, info)
|
|
}
|
|
|
|
return list, nil
|
|
}
|
|
|
|
func (n *Layer) createContainer(ctx context.Context, p *CreateBucketParams) (*data.BucketInfo, error) {
|
|
if p.LocationConstraint == "" {
|
|
p.LocationConstraint = api.DefaultLocationConstraint // s3tests_boto3.functional.test_s3:test_bucket_get_location
|
|
}
|
|
|
|
zone, _ := n.features.FormContainerZone(p.Namespace)
|
|
|
|
bktInfo := &data.BucketInfo{
|
|
Name: p.Name,
|
|
Zone: zone,
|
|
Owner: n.BearerOwner(ctx),
|
|
Created: TimeNow(ctx),
|
|
LocationConstraint: p.LocationConstraint,
|
|
ObjectLockEnabled: p.ObjectLockEnabled,
|
|
APEEnabled: p.APEEnabled,
|
|
}
|
|
|
|
attributes := [][2]string{
|
|
{attributeLocationConstraint, p.LocationConstraint},
|
|
}
|
|
|
|
if p.ObjectLockEnabled {
|
|
attributes = append(attributes, [2]string{
|
|
AttributeLockEnabled, "true",
|
|
})
|
|
}
|
|
|
|
basicACL := acl.PublicRWExtended
|
|
if p.APEEnabled {
|
|
basicACL = 0
|
|
}
|
|
|
|
res, err := n.frostFS.CreateContainer(ctx, PrmContainerCreate{
|
|
Creator: bktInfo.Owner,
|
|
Policy: p.Policy,
|
|
Name: p.Name,
|
|
Zone: zone,
|
|
SessionToken: p.SessionContainerCreation,
|
|
CreationTime: bktInfo.Created,
|
|
AdditionalAttributes: attributes,
|
|
BasicACL: basicACL,
|
|
})
|
|
if err != nil {
|
|
return nil, fmt.Errorf("create container: %w", err)
|
|
}
|
|
|
|
bktInfo.CID = res.ContainerID
|
|
bktInfo.HomomorphicHashDisabled = res.HomomorphicHashDisabled
|
|
|
|
n.cache.PutBucket(bktInfo)
|
|
|
|
return bktInfo, nil
|
|
}
|
|
|
|
func (n *Layer) setContainerEACLTable(ctx context.Context, idCnr cid.ID, table *eacl.Table, sessionToken *session.Container) error {
|
|
table.SetCID(idCnr)
|
|
|
|
return n.frostFS.SetContainerEACL(ctx, *table, sessionToken)
|
|
}
|
|
|
|
func (n *Layer) GetContainerEACL(ctx context.Context, cnrID cid.ID) (*eacl.Table, error) {
|
|
prm := PrmContainerEACL{
|
|
ContainerID: cnrID,
|
|
SessionToken: n.SessionTokenForRead(ctx),
|
|
}
|
|
return n.frostFS.ContainerEACL(ctx, prm)
|
|
}
|