2021-03-31 18:24:41 +00:00
|
|
|
package downloader
|
2019-12-13 16:02:48 +00:00
|
|
|
|
|
|
|
import (
|
2021-10-19 07:52:41 +00:00
|
|
|
"archive/zip"
|
2022-03-04 06:53:49 +00:00
|
|
|
"bytes"
|
2021-03-31 18:24:41 +00:00
|
|
|
"context"
|
2021-04-29 15:32:01 +00:00
|
|
|
"errors"
|
|
|
|
"fmt"
|
2019-12-13 16:02:48 +00:00
|
|
|
"io"
|
|
|
|
"net/http"
|
2022-01-24 14:04:34 +00:00
|
|
|
"net/url"
|
2020-02-04 11:02:29 +00:00
|
|
|
"path"
|
2019-12-13 16:02:48 +00:00
|
|
|
"strconv"
|
2020-11-09 13:43:23 +00:00
|
|
|
"strings"
|
2020-02-14 10:06:43 +00:00
|
|
|
"time"
|
2022-04-07 13:43:59 +00:00
|
|
|
"unicode"
|
|
|
|
"unicode/utf8"
|
2019-12-13 16:02:48 +00:00
|
|
|
|
2021-11-12 11:37:05 +00:00
|
|
|
"github.com/nspcc-dev/neofs-http-gw/response"
|
2021-05-18 11:18:50 +00:00
|
|
|
"github.com/nspcc-dev/neofs-http-gw/tokens"
|
2021-11-30 07:22:05 +00:00
|
|
|
"github.com/nspcc-dev/neofs-http-gw/utils"
|
2021-11-15 11:12:15 +00:00
|
|
|
cid "github.com/nspcc-dev/neofs-sdk-go/container/id"
|
|
|
|
"github.com/nspcc-dev/neofs-sdk-go/object"
|
2022-02-08 16:24:23 +00:00
|
|
|
"github.com/nspcc-dev/neofs-sdk-go/object/address"
|
|
|
|
oid "github.com/nspcc-dev/neofs-sdk-go/object/id"
|
2021-11-15 11:12:15 +00:00
|
|
|
"github.com/nspcc-dev/neofs-sdk-go/pool"
|
2022-04-07 12:56:18 +00:00
|
|
|
"github.com/nspcc-dev/neofs-sdk-go/token"
|
2020-02-28 17:03:56 +00:00
|
|
|
"github.com/valyala/fasthttp"
|
2019-12-13 16:02:48 +00:00
|
|
|
"go.uber.org/zap"
|
|
|
|
)
|
|
|
|
|
2022-03-04 06:53:49 +00:00
|
|
|
type request struct {
|
|
|
|
*fasthttp.RequestCtx
|
2022-04-21 15:04:41 +00:00
|
|
|
appCtx context.Context
|
|
|
|
log *zap.Logger
|
2021-06-23 10:51:53 +00:00
|
|
|
}
|
|
|
|
|
2022-03-04 06:53:49 +00:00
|
|
|
var errObjectNotFound = errors.New("object not found")
|
2020-11-09 13:43:23 +00:00
|
|
|
|
2022-04-19 12:02:18 +00:00
|
|
|
const attributeFilePath = "FilePath"
|
|
|
|
|
2021-04-29 20:46:38 +00:00
|
|
|
func isValidToken(s string) bool {
|
|
|
|
for _, c := range s {
|
|
|
|
if c <= ' ' || c > 127 {
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
if strings.ContainsRune("()<>@,;:\\\"/[]?={}", c) {
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
|
|
|
|
func isValidValue(s string) bool {
|
|
|
|
for _, c := range s {
|
|
|
|
// HTTP specification allows for more technically, but we don't want to escape things.
|
|
|
|
if c < ' ' || c > 127 || c == '"' {
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
|
2022-03-04 06:53:49 +00:00
|
|
|
type readCloser struct {
|
|
|
|
io.Reader
|
|
|
|
io.Closer
|
|
|
|
}
|
|
|
|
|
|
|
|
// initializes io.Reader with limited size and detects Content-Type from it.
|
|
|
|
// Returns r's error directly. Also returns processed data.
|
|
|
|
func readContentType(maxSize uint64, rInit func(uint64) (io.Reader, error)) (string, []byte, error) {
|
|
|
|
if maxSize > sizeToDetectType {
|
|
|
|
maxSize = sizeToDetectType
|
|
|
|
}
|
|
|
|
|
|
|
|
buf := make([]byte, maxSize) // maybe sync-pool the slice?
|
|
|
|
|
|
|
|
r, err := rInit(maxSize)
|
|
|
|
if err != nil {
|
|
|
|
return "", nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
n, err := r.Read(buf)
|
|
|
|
if err != nil && err != io.EOF {
|
|
|
|
return "", nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
buf = buf[:n]
|
|
|
|
|
|
|
|
return http.DetectContentType(buf), buf, err // to not lose io.EOF
|
|
|
|
}
|
|
|
|
|
2022-03-16 08:10:56 +00:00
|
|
|
func (r request) receiveFile(clnt *pool.Pool, objectAddress *address.Address) {
|
2019-12-13 16:02:48 +00:00
|
|
|
var (
|
2020-12-03 15:00:43 +00:00
|
|
|
err error
|
|
|
|
dis = "inline"
|
|
|
|
start = time.Now()
|
2020-11-09 13:43:23 +00:00
|
|
|
filename string
|
2019-12-13 16:02:48 +00:00
|
|
|
)
|
2021-03-31 16:58:42 +00:00
|
|
|
if err = tokens.StoreBearerToken(r.RequestCtx); err != nil {
|
2021-03-30 22:46:33 +00:00
|
|
|
r.log.Error("could not fetch and store bearer token", zap.Error(err))
|
2022-04-20 10:03:06 +00:00
|
|
|
response.Error(r.RequestCtx, "could not fetch and store bearer token: "+err.Error(), fasthttp.StatusBadRequest)
|
2021-02-16 15:20:15 +00:00
|
|
|
return
|
|
|
|
}
|
2022-02-08 16:24:23 +00:00
|
|
|
|
2022-04-07 12:56:18 +00:00
|
|
|
var prm pool.PrmObjectGet
|
|
|
|
prm.SetAddress(*objectAddress)
|
|
|
|
prm.UseBearer(bearerToken(r.RequestCtx))
|
|
|
|
|
2022-04-21 15:04:41 +00:00
|
|
|
rObj, err := clnt.GetObject(r.appCtx, prm)
|
2020-11-09 13:43:23 +00:00
|
|
|
if err != nil {
|
2021-07-09 13:28:39 +00:00
|
|
|
r.handleNeoFSErr(err, start)
|
2020-02-28 17:03:56 +00:00
|
|
|
return
|
2019-12-13 16:02:48 +00:00
|
|
|
}
|
2022-02-08 16:24:23 +00:00
|
|
|
|
|
|
|
// we can't close reader in this function, so how to do it?
|
|
|
|
|
2020-12-03 15:00:43 +00:00
|
|
|
if r.Request.URI().QueryArgs().GetBool("download") {
|
|
|
|
dis = "attachment"
|
2020-11-09 13:43:23 +00:00
|
|
|
}
|
2022-02-08 16:24:23 +00:00
|
|
|
|
2022-03-04 06:53:49 +00:00
|
|
|
payloadSize := rObj.Header.PayloadSize()
|
2022-02-08 16:24:23 +00:00
|
|
|
|
2022-03-04 06:53:49 +00:00
|
|
|
r.Response.Header.Set(fasthttp.HeaderContentLength, strconv.FormatUint(payloadSize, 10))
|
2021-06-23 10:51:53 +00:00
|
|
|
var contentType string
|
2022-02-08 16:24:23 +00:00
|
|
|
for _, attr := range rObj.Header.Attributes() {
|
2020-11-23 09:32:03 +00:00
|
|
|
key := attr.Key()
|
|
|
|
val := attr.Value()
|
2021-04-29 20:46:38 +00:00
|
|
|
if !isValidToken(key) || !isValidValue(val) {
|
|
|
|
continue
|
|
|
|
}
|
2021-11-30 09:25:50 +00:00
|
|
|
if strings.HasPrefix(key, utils.SystemAttributePrefix) {
|
|
|
|
key = systemBackwardTranslator(key)
|
|
|
|
}
|
2021-11-30 07:22:05 +00:00
|
|
|
r.Response.Header.Set(utils.UserAttributeHeaderPrefix+key, val)
|
2020-11-23 09:32:03 +00:00
|
|
|
switch key {
|
|
|
|
case object.AttributeFileName:
|
2020-11-09 13:43:23 +00:00
|
|
|
filename = val
|
2020-11-23 09:32:03 +00:00
|
|
|
case object.AttributeTimestamp:
|
|
|
|
value, err := strconv.ParseInt(val, 10, 64)
|
|
|
|
if err != nil {
|
2020-12-03 15:00:43 +00:00
|
|
|
r.log.Info("couldn't parse creation date",
|
2020-11-23 09:32:03 +00:00
|
|
|
zap.String("key", key),
|
|
|
|
zap.String("val", val),
|
|
|
|
zap.Error(err))
|
|
|
|
continue
|
|
|
|
}
|
2022-02-15 08:27:51 +00:00
|
|
|
r.Response.Header.Set(fasthttp.HeaderLastModified,
|
2021-06-29 09:25:14 +00:00
|
|
|
time.Unix(value, 0).UTC().Format(http.TimeFormat))
|
2021-06-21 13:56:51 +00:00
|
|
|
case object.AttributeContentType:
|
2021-06-23 10:51:53 +00:00
|
|
|
contentType = val
|
2020-02-28 17:03:56 +00:00
|
|
|
}
|
2020-11-09 13:43:23 +00:00
|
|
|
}
|
2022-02-15 09:13:43 +00:00
|
|
|
|
2022-02-08 16:24:23 +00:00
|
|
|
idsToResponse(&r.Response, &rObj.Header)
|
2021-06-23 10:51:53 +00:00
|
|
|
|
|
|
|
if len(contentType) == 0 {
|
2022-03-04 06:53:49 +00:00
|
|
|
// determine the Content-Type from the payload head
|
|
|
|
var payloadHead []byte
|
|
|
|
|
|
|
|
contentType, payloadHead, err = readContentType(payloadSize, func(uint64) (io.Reader, error) {
|
|
|
|
return rObj.Payload, nil
|
|
|
|
})
|
|
|
|
if err != nil && err != io.EOF {
|
|
|
|
r.log.Error("could not detect Content-Type from payload", zap.Error(err))
|
2022-04-20 10:03:06 +00:00
|
|
|
response.Error(r.RequestCtx, "could not detect Content-Type from payload: "+err.Error(), fasthttp.StatusBadRequest)
|
2021-06-23 10:51:53 +00:00
|
|
|
return
|
|
|
|
}
|
2022-03-04 06:53:49 +00:00
|
|
|
|
|
|
|
// reset payload reader since part of the data has been read
|
2022-03-04 08:36:23 +00:00
|
|
|
var headReader io.Reader = bytes.NewReader(payloadHead)
|
2022-03-04 06:53:49 +00:00
|
|
|
|
|
|
|
if err != io.EOF { // otherwise, we've already read full payload
|
2022-03-04 08:36:23 +00:00
|
|
|
headReader = io.MultiReader(headReader, rObj.Payload)
|
2022-03-04 06:53:49 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// note: we could do with io.Reader, but SetBodyStream below closes body stream
|
|
|
|
// if it implements io.Closer and that's useful for us.
|
2022-03-04 08:36:23 +00:00
|
|
|
rObj.Payload = readCloser{headReader, rObj.Payload}
|
2021-06-23 10:51:53 +00:00
|
|
|
}
|
|
|
|
r.SetContentType(contentType)
|
|
|
|
|
2022-02-15 08:27:51 +00:00
|
|
|
r.Response.Header.Set(fasthttp.HeaderContentDisposition, dis+"; filename="+path.Base(filename))
|
2022-03-04 06:53:49 +00:00
|
|
|
|
|
|
|
r.Response.SetBodyStream(rObj.Payload, int(payloadSize))
|
2020-12-03 15:00:43 +00:00
|
|
|
}
|
|
|
|
|
2021-11-30 09:25:50 +00:00
|
|
|
// systemBackwardTranslator is used to convert headers looking like '__NEOFS__ATTR_NAME' to 'Neofs-Attr-Name'.
|
|
|
|
func systemBackwardTranslator(key string) string {
|
|
|
|
// trim specified prefix '__NEOFS__'
|
|
|
|
key = strings.TrimPrefix(key, utils.SystemAttributePrefix)
|
|
|
|
|
|
|
|
var res strings.Builder
|
|
|
|
res.WriteString("Neofs-")
|
|
|
|
|
|
|
|
strs := strings.Split(key, "_")
|
|
|
|
for i, s := range strs {
|
2022-04-07 13:43:59 +00:00
|
|
|
s = title(strings.ToLower(s))
|
2021-11-30 09:25:50 +00:00
|
|
|
res.WriteString(s)
|
|
|
|
if i != len(strs)-1 {
|
|
|
|
res.WriteString("-")
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return res.String()
|
|
|
|
}
|
|
|
|
|
2022-04-07 13:43:59 +00:00
|
|
|
func title(str string) string {
|
|
|
|
if str == "" {
|
|
|
|
return ""
|
|
|
|
}
|
|
|
|
|
|
|
|
r, size := utf8.DecodeRuneInString(str)
|
|
|
|
r0 := unicode.ToTitle(r)
|
|
|
|
return string(r0) + str[size:]
|
|
|
|
}
|
|
|
|
|
2022-04-07 12:56:18 +00:00
|
|
|
func bearerToken(ctx context.Context) *token.BearerToken {
|
2021-07-09 13:28:39 +00:00
|
|
|
if tkn, err := tokens.LoadBearerToken(ctx); err == nil {
|
2022-04-07 12:56:18 +00:00
|
|
|
return tkn
|
2021-07-09 13:28:39 +00:00
|
|
|
}
|
2022-04-07 12:56:18 +00:00
|
|
|
return nil
|
2021-07-09 13:28:39 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
func (r *request) handleNeoFSErr(err error, start time.Time) {
|
|
|
|
r.log.Error(
|
|
|
|
"could not receive object",
|
|
|
|
zap.Stringer("elapsed", time.Since(start)),
|
|
|
|
zap.Error(err),
|
|
|
|
)
|
|
|
|
var (
|
|
|
|
msg = fmt.Sprintf("could not receive object: %v", err)
|
|
|
|
code = fasthttp.StatusBadRequest
|
|
|
|
cause = err
|
|
|
|
)
|
|
|
|
for unwrap := errors.Unwrap(err); unwrap != nil; unwrap = errors.Unwrap(cause) {
|
|
|
|
cause = unwrap
|
|
|
|
}
|
2021-07-20 10:40:39 +00:00
|
|
|
|
|
|
|
if strings.Contains(cause.Error(), "not found") ||
|
|
|
|
strings.Contains(cause.Error(), "can't fetch container info") {
|
|
|
|
code = fasthttp.StatusNotFound
|
|
|
|
msg = errObjectNotFound.Error()
|
2021-07-09 13:28:39 +00:00
|
|
|
}
|
2021-07-20 10:40:39 +00:00
|
|
|
|
2021-11-12 11:37:05 +00:00
|
|
|
response.Error(r.RequestCtx, msg, code)
|
2021-07-09 13:28:39 +00:00
|
|
|
}
|
|
|
|
|
2021-05-13 12:22:03 +00:00
|
|
|
// Downloader is a download request handler.
|
2021-03-31 18:24:41 +00:00
|
|
|
type Downloader struct {
|
2022-04-21 15:04:41 +00:00
|
|
|
appCtx context.Context
|
2021-10-29 13:11:34 +00:00
|
|
|
log *zap.Logger
|
2022-03-16 08:10:56 +00:00
|
|
|
pool *pool.Pool
|
2021-10-29 13:11:34 +00:00
|
|
|
settings Settings
|
|
|
|
}
|
|
|
|
|
|
|
|
type Settings struct {
|
|
|
|
ZipCompression bool
|
2021-03-31 18:24:41 +00:00
|
|
|
}
|
|
|
|
|
2021-05-13 12:22:03 +00:00
|
|
|
// New creates an instance of Downloader using specified options.
|
2022-04-21 15:04:41 +00:00
|
|
|
func New(ctx context.Context, log *zap.Logger, settings Settings, conns *pool.Pool) *Downloader {
|
|
|
|
return &Downloader{appCtx: ctx, log: log, pool: conns, settings: settings}
|
2021-03-31 18:24:41 +00:00
|
|
|
}
|
|
|
|
|
2021-04-07 12:54:30 +00:00
|
|
|
func (d *Downloader) newRequest(ctx *fasthttp.RequestCtx, log *zap.Logger) *request {
|
2020-12-03 15:00:43 +00:00
|
|
|
return &request{
|
2021-05-28 08:57:28 +00:00
|
|
|
RequestCtx: ctx,
|
2022-04-21 15:04:41 +00:00
|
|
|
appCtx: d.appCtx,
|
2021-05-28 08:57:28 +00:00
|
|
|
log: log,
|
2020-12-03 15:00:43 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-05-13 12:22:03 +00:00
|
|
|
// DownloadByAddress handles download requests using simple cid/oid format.
|
2021-04-07 12:54:30 +00:00
|
|
|
func (d *Downloader) DownloadByAddress(c *fasthttp.RequestCtx) {
|
2021-07-09 13:28:39 +00:00
|
|
|
d.byAddress(c, request.receiveFile)
|
|
|
|
}
|
|
|
|
|
|
|
|
// byAddress is wrapper for function (e.g. request.headObject, request.receiveFile) that
|
|
|
|
// prepares request and object address to it.
|
2022-03-16 08:10:56 +00:00
|
|
|
func (d *Downloader) byAddress(c *fasthttp.RequestCtx, f func(request, *pool.Pool, *address.Address)) {
|
2020-12-03 15:00:43 +00:00
|
|
|
var (
|
2022-02-08 16:24:23 +00:00
|
|
|
addr = address.NewAddress()
|
|
|
|
idCnr, _ = c.UserValue("cid").(string)
|
|
|
|
idObj, _ = c.UserValue("oid").(string)
|
|
|
|
val = strings.Join([]string{idCnr, idObj}, "/")
|
|
|
|
log = d.log.With(zap.String("cid", idCnr), zap.String("oid", idObj))
|
2020-12-03 15:00:43 +00:00
|
|
|
)
|
2022-02-08 16:24:23 +00:00
|
|
|
if err := addr.Parse(val); err != nil {
|
2020-12-03 15:00:43 +00:00
|
|
|
log.Error("wrong object address", zap.Error(err))
|
2021-11-12 11:37:05 +00:00
|
|
|
response.Error(c, "wrong object address", fasthttp.StatusBadRequest)
|
2020-12-03 15:00:43 +00:00
|
|
|
return
|
|
|
|
}
|
2021-05-28 08:57:28 +00:00
|
|
|
|
2022-02-08 16:24:23 +00:00
|
|
|
f(*d.newRequest(c, log), d.pool, addr)
|
2020-12-03 15:00:43 +00:00
|
|
|
}
|
|
|
|
|
2021-05-13 12:22:03 +00:00
|
|
|
// DownloadByAttribute handles attribute-based download requests.
|
2021-04-07 12:54:30 +00:00
|
|
|
func (d *Downloader) DownloadByAttribute(c *fasthttp.RequestCtx) {
|
2021-07-09 13:28:39 +00:00
|
|
|
d.byAttribute(c, request.receiveFile)
|
|
|
|
}
|
|
|
|
|
|
|
|
// byAttribute is wrapper similar to byAddress.
|
2022-03-16 08:10:56 +00:00
|
|
|
func (d *Downloader) byAttribute(c *fasthttp.RequestCtx, f func(request, *pool.Pool, *address.Address)) {
|
2020-12-03 15:00:43 +00:00
|
|
|
var (
|
2021-07-09 13:28:39 +00:00
|
|
|
httpStatus = fasthttp.StatusBadRequest
|
|
|
|
scid, _ = c.UserValue("cid").(string)
|
2022-01-24 14:04:34 +00:00
|
|
|
key, _ = url.QueryUnescape(c.UserValue("attr_key").(string))
|
|
|
|
val, _ = url.QueryUnescape(c.UserValue("attr_val").(string))
|
2021-07-09 13:28:39 +00:00
|
|
|
log = d.log.With(zap.String("cid", scid), zap.String("attr_key", key), zap.String("attr_val", val))
|
2020-12-03 15:00:43 +00:00
|
|
|
)
|
2021-07-09 13:28:39 +00:00
|
|
|
containerID := cid.New()
|
|
|
|
if err := containerID.Parse(scid); err != nil {
|
2020-12-03 15:00:43 +00:00
|
|
|
log.Error("wrong container id", zap.Error(err))
|
2021-11-12 11:37:05 +00:00
|
|
|
response.Error(c, "wrong container id", httpStatus)
|
2021-07-09 13:28:39 +00:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2022-02-08 16:24:23 +00:00
|
|
|
res, err := d.search(c, containerID, key, val, object.MatchStringEqual)
|
2021-07-09 13:28:39 +00:00
|
|
|
if err != nil {
|
2022-02-08 16:24:23 +00:00
|
|
|
log.Error("could not search for objects", zap.Error(err))
|
2022-04-20 10:03:06 +00:00
|
|
|
response.Error(c, "could not search for objects: "+err.Error(), fasthttp.StatusBadRequest)
|
2020-12-03 15:00:43 +00:00
|
|
|
return
|
2021-03-30 22:46:33 +00:00
|
|
|
}
|
2021-05-28 08:57:28 +00:00
|
|
|
|
2022-02-08 16:24:23 +00:00
|
|
|
defer res.Close()
|
2021-07-09 13:28:39 +00:00
|
|
|
|
2022-02-08 16:24:23 +00:00
|
|
|
buf := make([]oid.ID, 1)
|
2021-10-19 07:52:41 +00:00
|
|
|
|
2022-02-08 16:24:23 +00:00
|
|
|
n, err := res.Read(buf)
|
|
|
|
if n == 0 {
|
|
|
|
if errors.Is(err, io.EOF) {
|
|
|
|
log.Error("object not found", zap.Error(err))
|
|
|
|
response.Error(c, "object not found", fasthttp.StatusNotFound)
|
|
|
|
return
|
|
|
|
}
|
2021-10-19 07:52:41 +00:00
|
|
|
|
2022-02-08 16:24:23 +00:00
|
|
|
log.Error("read object list failed", zap.Error(err))
|
2022-04-20 10:03:06 +00:00
|
|
|
response.Error(c, "read object list failed: "+err.Error(), fasthttp.StatusBadRequest)
|
2022-02-08 16:24:23 +00:00
|
|
|
return
|
|
|
|
}
|
2021-10-19 07:52:41 +00:00
|
|
|
|
2022-02-08 16:24:23 +00:00
|
|
|
var addrObj address.Address
|
|
|
|
addrObj.SetContainerID(containerID)
|
|
|
|
addrObj.SetObjectID(&buf[0])
|
2021-05-28 08:57:28 +00:00
|
|
|
|
2022-02-08 16:24:23 +00:00
|
|
|
f(*d.newRequest(c, log), d.pool, &addrObj)
|
2021-10-19 07:52:41 +00:00
|
|
|
}
|
|
|
|
|
2022-02-08 16:24:23 +00:00
|
|
|
func (d *Downloader) search(c *fasthttp.RequestCtx, cid *cid.ID, key, val string, op object.SearchMatchType) (*pool.ResObjectSearch, error) {
|
|
|
|
filters := object.NewSearchFilters()
|
|
|
|
filters.AddRootFilter()
|
|
|
|
filters.AddFilter(key, val, op)
|
2021-10-19 07:52:41 +00:00
|
|
|
|
2022-04-07 12:56:18 +00:00
|
|
|
var prm pool.PrmObjectSearch
|
|
|
|
prm.SetContainerID(*cid)
|
|
|
|
prm.SetFilters(filters)
|
|
|
|
prm.UseBearer(bearerToken(c))
|
|
|
|
|
2022-04-21 15:04:41 +00:00
|
|
|
return d.pool.SearchObjects(d.appCtx, prm)
|
2021-10-19 07:52:41 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// DownloadZipped handles zip by prefix requests.
|
|
|
|
func (d *Downloader) DownloadZipped(c *fasthttp.RequestCtx) {
|
|
|
|
scid, _ := c.UserValue("cid").(string)
|
2022-01-26 14:54:10 +00:00
|
|
|
prefix, _ := url.QueryUnescape(c.UserValue("prefix").(string))
|
2021-10-19 07:52:41 +00:00
|
|
|
log := d.log.With(zap.String("cid", scid), zap.String("prefix", prefix))
|
|
|
|
|
|
|
|
containerID := cid.New()
|
|
|
|
if err := containerID.Parse(scid); err != nil {
|
|
|
|
log.Error("wrong container id", zap.Error(err))
|
2022-02-08 16:24:23 +00:00
|
|
|
response.Error(c, "wrong container id", fasthttp.StatusBadRequest)
|
2021-10-19 07:52:41 +00:00
|
|
|
return
|
2020-12-03 15:00:43 +00:00
|
|
|
}
|
2021-10-19 07:52:41 +00:00
|
|
|
|
|
|
|
if err := tokens.StoreBearerToken(c); err != nil {
|
|
|
|
log.Error("could not fetch and store bearer token", zap.Error(err))
|
2022-04-20 10:03:06 +00:00
|
|
|
response.Error(c, "could not fetch and store bearer token: "+err.Error(), fasthttp.StatusBadRequest)
|
2021-10-19 07:52:41 +00:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2022-04-19 12:02:18 +00:00
|
|
|
resSearch, err := d.search(c, containerID, attributeFilePath, prefix, object.MatchCommonPrefix)
|
2021-10-19 07:52:41 +00:00
|
|
|
if err != nil {
|
2022-02-08 16:24:23 +00:00
|
|
|
log.Error("could not search for objects", zap.Error(err))
|
2022-04-20 10:03:06 +00:00
|
|
|
response.Error(c, "could not search for objects: "+err.Error(), fasthttp.StatusBadRequest)
|
2021-10-19 07:52:41 +00:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2022-02-08 16:24:23 +00:00
|
|
|
defer resSearch.Close()
|
|
|
|
|
2022-02-15 08:27:51 +00:00
|
|
|
c.Response.Header.Set(fasthttp.HeaderContentType, "application/zip")
|
|
|
|
c.Response.Header.Set(fasthttp.HeaderContentDisposition, "attachment; filename=\"archive.zip\"")
|
2021-10-19 07:52:41 +00:00
|
|
|
c.Response.SetStatusCode(http.StatusOK)
|
|
|
|
|
|
|
|
zipWriter := zip.NewWriter(c)
|
2021-10-29 13:11:34 +00:00
|
|
|
compression := zip.Store
|
|
|
|
if d.settings.ZipCompression {
|
|
|
|
compression = zip.Deflate
|
|
|
|
}
|
|
|
|
|
2022-02-08 16:24:23 +00:00
|
|
|
var (
|
|
|
|
addr address.Address
|
|
|
|
resGet *pool.ResGetObject
|
|
|
|
w io.Writer
|
|
|
|
bufZip []byte
|
|
|
|
)
|
2021-10-19 07:52:41 +00:00
|
|
|
|
2022-02-08 16:24:23 +00:00
|
|
|
addr.SetContainerID(containerID)
|
2021-10-19 07:52:41 +00:00
|
|
|
|
2022-04-07 12:56:18 +00:00
|
|
|
btoken := bearerToken(c)
|
2022-02-08 16:24:23 +00:00
|
|
|
empty := true
|
2022-03-01 20:38:03 +00:00
|
|
|
called := false
|
2022-02-08 16:24:23 +00:00
|
|
|
|
2022-03-01 20:38:03 +00:00
|
|
|
errIter := resSearch.Iterate(func(id oid.ID) bool {
|
|
|
|
called = true
|
2021-10-19 07:52:41 +00:00
|
|
|
|
2022-02-08 16:24:23 +00:00
|
|
|
if empty {
|
|
|
|
bufZip = make([]byte, 1024) // configure?
|
2021-10-19 07:52:41 +00:00
|
|
|
}
|
|
|
|
|
2022-02-08 16:24:23 +00:00
|
|
|
empty = false
|
|
|
|
|
2022-03-01 20:38:03 +00:00
|
|
|
addr.SetObjectID(&id)
|
2022-02-08 16:24:23 +00:00
|
|
|
|
2022-04-07 12:56:18 +00:00
|
|
|
var prm pool.PrmObjectGet
|
|
|
|
prm.SetAddress(addr)
|
|
|
|
prm.UseBearer(btoken)
|
|
|
|
|
2022-04-21 15:04:41 +00:00
|
|
|
resGet, err = d.pool.GetObject(d.appCtx, prm)
|
2022-03-01 20:38:03 +00:00
|
|
|
if err != nil {
|
|
|
|
err = fmt.Errorf("get NeoFS object: %v", err)
|
|
|
|
return true
|
|
|
|
}
|
2022-02-08 16:24:23 +00:00
|
|
|
|
2022-03-01 20:38:03 +00:00
|
|
|
w, err = zipWriter.CreateHeader(&zip.FileHeader{
|
2022-04-19 12:02:18 +00:00
|
|
|
Name: getZipFilePath(&resGet.Header),
|
2022-03-01 20:38:03 +00:00
|
|
|
Method: compression,
|
|
|
|
Modified: time.Now(),
|
|
|
|
})
|
|
|
|
if err != nil {
|
|
|
|
err = fmt.Errorf("zip create header: %v", err)
|
|
|
|
return true
|
|
|
|
}
|
2022-02-08 16:24:23 +00:00
|
|
|
|
2022-03-01 20:38:03 +00:00
|
|
|
_, err = io.CopyBuffer(w, resGet.Payload, bufZip)
|
|
|
|
if err != nil {
|
|
|
|
err = fmt.Errorf("copy object payload to zip file: %v", err)
|
|
|
|
return true
|
|
|
|
}
|
2022-02-08 16:24:23 +00:00
|
|
|
|
2022-03-01 20:38:03 +00:00
|
|
|
_ = resGet.Payload.Close()
|
2022-02-08 16:24:23 +00:00
|
|
|
|
2022-03-01 20:38:03 +00:00
|
|
|
err = zipWriter.Flush()
|
|
|
|
if err != nil {
|
|
|
|
err = fmt.Errorf("flush zip writer: %v", err)
|
|
|
|
return true
|
2021-10-19 07:52:41 +00:00
|
|
|
}
|
2022-03-01 20:38:03 +00:00
|
|
|
|
|
|
|
return false
|
|
|
|
})
|
|
|
|
if errIter != nil {
|
|
|
|
log.Error("iterating over selected objects failed", zap.Error(errIter))
|
2022-04-20 10:03:06 +00:00
|
|
|
response.Error(c, "iterating over selected objects: "+errIter.Error(), fasthttp.StatusBadRequest)
|
2022-03-01 20:38:03 +00:00
|
|
|
return
|
|
|
|
} else if !called {
|
|
|
|
log.Error("objects not found")
|
|
|
|
response.Error(c, "objects not found", fasthttp.StatusNotFound)
|
|
|
|
return
|
2021-10-19 07:52:41 +00:00
|
|
|
}
|
|
|
|
|
2022-02-08 16:24:23 +00:00
|
|
|
if err == nil {
|
|
|
|
err = zipWriter.Close()
|
|
|
|
}
|
|
|
|
|
|
|
|
if err != nil {
|
|
|
|
log.Error("file streaming failure", zap.Error(err))
|
2022-04-20 10:03:06 +00:00
|
|
|
response.Error(c, "file streaming failure: "+err.Error(), fasthttp.StatusInternalServerError)
|
2022-02-08 16:24:23 +00:00
|
|
|
return
|
|
|
|
}
|
2021-10-19 07:52:41 +00:00
|
|
|
}
|
|
|
|
|
2022-04-19 12:02:18 +00:00
|
|
|
func getZipFilePath(obj *object.Object) string {
|
2021-10-19 07:52:41 +00:00
|
|
|
for _, attr := range obj.Attributes() {
|
2022-04-19 12:02:18 +00:00
|
|
|
if attr.Key() == attributeFilePath {
|
2021-10-19 07:52:41 +00:00
|
|
|
return attr.Value()
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return ""
|
2019-12-13 16:02:48 +00:00
|
|
|
}
|