613 lines
21 KiB
Go
613 lines
21 KiB
Go
// This file is part of MinIO Console Server
|
|
// Copyright (c) 2021 MinIO, Inc.
|
|
//
|
|
// This program is free software: you can redistribute it and/or modify
|
|
// it under the terms of the GNU Affero General Public License as published by
|
|
// the Free Software Foundation, either version 3 of the License, or
|
|
// (at your option) any later version.
|
|
//
|
|
// This program is distributed in the hope that it will be useful,
|
|
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
// GNU Affero General Public License for more details.
|
|
//
|
|
// You should have received a copy of the GNU Affero General Public License
|
|
// along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
package api
|
|
|
|
import (
|
|
"context"
|
|
"encoding/json"
|
|
"errors"
|
|
"fmt"
|
|
"net/http"
|
|
"strings"
|
|
"time"
|
|
|
|
"github.com/minio/minio-go/v7"
|
|
|
|
"github.com/minio/madmin-go/v3"
|
|
"github.com/minio/mc/cmd"
|
|
"github.com/minio/mc/pkg/probe"
|
|
"github.com/minio/minio-go/v7/pkg/credentials"
|
|
"github.com/minio/minio-go/v7/pkg/tags"
|
|
|
|
"github.com/go-openapi/runtime/middleware"
|
|
"github.com/go-openapi/swag"
|
|
"github.com/minio/console/api/operations"
|
|
bucketApi "github.com/minio/console/api/operations/bucket"
|
|
"github.com/minio/console/models"
|
|
"github.com/minio/console/pkg/auth/token"
|
|
"github.com/minio/minio-go/v7/pkg/policy"
|
|
minioIAMPolicy "github.com/minio/pkg/v3/policy"
|
|
)
|
|
|
|
func registerBucketsHandlers(api *operations.ConsoleAPI) {
|
|
// list buckets
|
|
api.BucketListBucketsHandler = bucketApi.ListBucketsHandlerFunc(func(params bucketApi.ListBucketsParams, session *models.Principal) middleware.Responder {
|
|
listBucketsResponse, err := getListBucketsResponse(session, params)
|
|
if err != nil {
|
|
return bucketApi.NewListBucketsDefault(err.Code).WithPayload(err.APIError)
|
|
}
|
|
return bucketApi.NewListBucketsOK().WithPayload(listBucketsResponse)
|
|
})
|
|
// make bucket
|
|
api.BucketMakeBucketHandler = bucketApi.MakeBucketHandlerFunc(func(params bucketApi.MakeBucketParams, session *models.Principal) middleware.Responder {
|
|
makeBucketResponse, err := getMakeBucketResponse(session, params)
|
|
if err != nil {
|
|
return bucketApi.NewMakeBucketDefault(err.Code).WithPayload(err.APIError)
|
|
}
|
|
return bucketApi.NewMakeBucketOK().WithPayload(makeBucketResponse)
|
|
})
|
|
// get bucket info
|
|
api.BucketBucketInfoHandler = bucketApi.BucketInfoHandlerFunc(func(params bucketApi.BucketInfoParams, session *models.Principal) middleware.Responder {
|
|
bucketInfoResp, err := getBucketInfoResponse(session, params)
|
|
if err != nil {
|
|
return bucketApi.NewBucketInfoDefault(err.Code).WithPayload(err.APIError)
|
|
}
|
|
|
|
return bucketApi.NewBucketInfoOK().WithPayload(bucketInfoResp)
|
|
})
|
|
// set bucket tags
|
|
api.BucketPutBucketTagsHandler = bucketApi.PutBucketTagsHandlerFunc(func(params bucketApi.PutBucketTagsParams, session *models.Principal) middleware.Responder {
|
|
err := getPutBucketTagsResponse(session, params)
|
|
if err != nil {
|
|
return bucketApi.NewPutBucketTagsDefault(err.Code).WithPayload(err.APIError)
|
|
}
|
|
return bucketApi.NewPutBucketTagsOK()
|
|
})
|
|
// get bucket versioning
|
|
api.BucketGetBucketVersioningHandler = bucketApi.GetBucketVersioningHandlerFunc(func(params bucketApi.GetBucketVersioningParams, session *models.Principal) middleware.Responder {
|
|
getBucketVersioning, err := getBucketVersionedResponse(session, params)
|
|
if err != nil {
|
|
return bucketApi.NewGetBucketVersioningDefault(err.Code).WithPayload(err.APIError)
|
|
}
|
|
return bucketApi.NewGetBucketVersioningOK().WithPayload(getBucketVersioning)
|
|
})
|
|
// update bucket versioning
|
|
api.BucketSetBucketVersioningHandler = bucketApi.SetBucketVersioningHandlerFunc(func(params bucketApi.SetBucketVersioningParams, session *models.Principal) middleware.Responder {
|
|
err := setBucketVersioningResponse(session, params)
|
|
if err != nil {
|
|
return bucketApi.NewSetBucketVersioningDefault(err.Code).WithPayload(err.APIError)
|
|
}
|
|
return bucketApi.NewSetBucketVersioningCreated()
|
|
})
|
|
// get objects rewind for a bucket
|
|
api.BucketGetBucketRewindHandler = bucketApi.GetBucketRewindHandlerFunc(func(params bucketApi.GetBucketRewindParams, session *models.Principal) middleware.Responder {
|
|
getBucketRewind, err := getBucketRewindResponse(session, params)
|
|
if err != nil {
|
|
return bucketApi.NewGetBucketRewindDefault(err.Code).WithPayload(err.APIError)
|
|
}
|
|
return bucketApi.NewGetBucketRewindOK().WithPayload(getBucketRewind)
|
|
})
|
|
// get max allowed share link expiration time
|
|
api.BucketGetMaxShareLinkExpHandler = bucketApi.GetMaxShareLinkExpHandlerFunc(func(params bucketApi.GetMaxShareLinkExpParams, session *models.Principal) middleware.Responder {
|
|
val, err := getMaxShareLinkExpirationResponse(session, params)
|
|
if err != nil {
|
|
return bucketApi.NewGetMaxShareLinkExpDefault(err.Code).WithPayload(err.APIError)
|
|
}
|
|
return bucketApi.NewGetMaxShareLinkExpOK().WithPayload(val)
|
|
})
|
|
}
|
|
|
|
type VersionState string
|
|
|
|
const (
|
|
VersionEnable VersionState = "enable"
|
|
VersionSuspend VersionState = "suspend"
|
|
)
|
|
|
|
// removeBucket deletes a bucket
|
|
func doSetVersioning(ctx context.Context, client MCClient, state VersionState, excludePrefix []string, excludeFolders bool) error {
|
|
err := client.setVersioning(ctx, string(state), excludePrefix, excludeFolders)
|
|
if err != nil {
|
|
return err.Cause
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
func setBucketVersioningResponse(session *models.Principal, params bucketApi.SetBucketVersioningParams) *CodedAPIError {
|
|
ctx, cancel := context.WithCancel(params.HTTPRequest.Context())
|
|
defer cancel()
|
|
|
|
bucketName := params.BucketName
|
|
s3Client, err := newS3BucketClient(session, bucketName, "", getClientIP(params.HTTPRequest))
|
|
if err != nil {
|
|
return ErrorWithContext(ctx, err)
|
|
}
|
|
// create a mc S3Client interface implementation
|
|
// defining the client to be used
|
|
amcClient := mcClient{client: s3Client}
|
|
|
|
versioningState := VersionSuspend
|
|
|
|
if params.Body.Enabled {
|
|
versioningState = VersionEnable
|
|
}
|
|
|
|
var excludePrefixes []string
|
|
|
|
if params.Body.ExcludePrefixes != nil {
|
|
excludePrefixes = params.Body.ExcludePrefixes
|
|
}
|
|
|
|
excludeFolders := params.Body.ExcludeFolders
|
|
|
|
if err := doSetVersioning(ctx, amcClient, versioningState, excludePrefixes, excludeFolders); err != nil {
|
|
return ErrorWithContext(ctx, fmt.Errorf("error setting versioning for bucket: %s", err))
|
|
}
|
|
return nil
|
|
}
|
|
|
|
func getBucketVersionedResponse(session *models.Principal, params bucketApi.GetBucketVersioningParams) (*models.BucketVersioningResponse, *CodedAPIError) {
|
|
ctx, cancel := context.WithCancel(params.HTTPRequest.Context())
|
|
defer cancel()
|
|
|
|
mClient, err := newMinioClient(session, getClientIP(params.HTTPRequest))
|
|
if err != nil {
|
|
return nil, ErrorWithContext(ctx, err)
|
|
}
|
|
|
|
// create a minioClient interface implementation
|
|
// defining the client to be used
|
|
minioClient := minioClient{client: mClient}
|
|
|
|
// we will tolerate this call failing
|
|
res, err := minioClient.getBucketVersioning(ctx, params.BucketName)
|
|
if err != nil {
|
|
ErrorWithContext(ctx, fmt.Errorf("error versioning bucket: %v", err))
|
|
}
|
|
|
|
excludedPrefixes := make([]*models.BucketVersioningResponseExcludedPrefixesItems0, len(res.ExcludedPrefixes))
|
|
for i, v := range res.ExcludedPrefixes {
|
|
excludedPrefixes[i] = &models.BucketVersioningResponseExcludedPrefixesItems0{
|
|
Prefix: v.Prefix,
|
|
}
|
|
}
|
|
|
|
// serialize output
|
|
bucketVResponse := &models.BucketVersioningResponse{
|
|
ExcludeFolders: res.ExcludeFolders,
|
|
ExcludedPrefixes: excludedPrefixes,
|
|
MFADelete: res.MFADelete,
|
|
Status: res.Status,
|
|
}
|
|
return bucketVResponse, nil
|
|
}
|
|
|
|
// getAccountBuckets fetches a list of all buckets allowed to that particular client from MinIO Servers
|
|
func getAccountBuckets(ctx context.Context, client MinioAdmin) ([]*models.Bucket, error) {
|
|
info, err := client.AccountInfo(ctx)
|
|
if err != nil {
|
|
return []*models.Bucket{}, err
|
|
}
|
|
bucketInfos := []*models.Bucket{}
|
|
for _, bucket := range info.Buckets {
|
|
bucketElem := &models.Bucket{
|
|
CreationDate: bucket.Created.Format(time.RFC3339),
|
|
Details: &models.BucketDetails{
|
|
Quota: nil,
|
|
},
|
|
RwAccess: &models.BucketRwAccess{
|
|
Read: bucket.Access.Read,
|
|
Write: bucket.Access.Write,
|
|
},
|
|
Name: swag.String(bucket.Name),
|
|
Objects: int64(bucket.Objects),
|
|
Size: int64(bucket.Size),
|
|
}
|
|
|
|
if bucket.Details != nil {
|
|
if bucket.Details.Tagging != nil {
|
|
bucketElem.Details.Tags = bucket.Details.Tagging.ToMap()
|
|
}
|
|
|
|
bucketElem.Details.Locking = bucket.Details.Locking
|
|
bucketElem.Details.Replication = bucket.Details.Replication
|
|
bucketElem.Details.Versioning = bucket.Details.Versioning
|
|
bucketElem.Details.VersioningSuspended = bucket.Details.VersioningSuspended
|
|
if bucket.Details.Quota != nil {
|
|
bucketElem.Details.Quota = &models.BucketDetailsQuota{
|
|
Quota: int64(bucket.Details.Quota.Quota),
|
|
Type: string(bucket.Details.Quota.Type),
|
|
}
|
|
}
|
|
}
|
|
|
|
bucketInfos = append(bucketInfos, bucketElem)
|
|
}
|
|
return bucketInfos, nil
|
|
}
|
|
|
|
// getListBucketsResponse performs listBuckets() and serializes it to the handler's output
|
|
func getListBucketsResponse(session *models.Principal, params bucketApi.ListBucketsParams) (*models.ListBucketsResponse, *CodedAPIError) {
|
|
ctx, cancel := context.WithCancel(params.HTTPRequest.Context())
|
|
defer cancel()
|
|
|
|
mAdmin, err := NewMinioAdminClient(params.HTTPRequest.Context(), session)
|
|
if err != nil {
|
|
return nil, ErrorWithContext(ctx, err)
|
|
}
|
|
// create a minioClient interface implementation
|
|
// defining the client to be used
|
|
adminClient := AdminClient{Client: mAdmin}
|
|
buckets, err := getAccountBuckets(ctx, adminClient)
|
|
if err != nil {
|
|
return nil, ErrorWithContext(ctx, err)
|
|
}
|
|
|
|
// serialize output
|
|
listBucketsResponse := &models.ListBucketsResponse{
|
|
Buckets: buckets,
|
|
Total: int64(len(buckets)),
|
|
}
|
|
return listBucketsResponse, nil
|
|
}
|
|
|
|
// makeBucket creates a bucket for an specific minio client
|
|
func makeBucket(ctx context.Context, client MinioClient, bucketName string, objectLocking bool) error {
|
|
// creates a new bucket with bucketName with a context to control cancellations and timeouts.
|
|
return client.makeBucketWithContext(ctx, bucketName, "", objectLocking)
|
|
}
|
|
|
|
// getMakeBucketResponse performs makeBucket() to create a bucket with its access policy
|
|
func getMakeBucketResponse(session *models.Principal, params bucketApi.MakeBucketParams) (*models.MakeBucketsResponse, *CodedAPIError) {
|
|
ctx, cancel := context.WithCancel(params.HTTPRequest.Context())
|
|
defer cancel()
|
|
// bucket request needed to proceed
|
|
br := params.Body
|
|
if br == nil {
|
|
return nil, ErrorWithContext(ctx, ErrBucketBodyNotInRequest)
|
|
}
|
|
mClient, err := newMinioClient(session, getClientIP(params.HTTPRequest))
|
|
if err != nil {
|
|
return nil, ErrorWithContext(ctx, err)
|
|
}
|
|
// create a minioClient interface implementation
|
|
// defining the client to be used
|
|
minioClient := minioClient{client: mClient}
|
|
|
|
if err := makeBucket(ctx, minioClient, *br.Name, false); err != nil {
|
|
return nil, ErrorWithContext(ctx, err)
|
|
}
|
|
|
|
// make sure to delete bucket if an errors occurs after bucket was created
|
|
defer func() {
|
|
if err != nil {
|
|
ErrorWithContext(ctx, fmt.Errorf("error creating bucket: %v", err))
|
|
if err := removeBucket(minioClient, *br.Name); err != nil {
|
|
ErrorWithContext(ctx, fmt.Errorf("error removing bucket: %v", err))
|
|
}
|
|
}
|
|
}()
|
|
|
|
return &models.MakeBucketsResponse{BucketName: *br.Name}, nil
|
|
}
|
|
|
|
// setBucketAccessPolicy set the access permissions on an existing bucket.
|
|
func setBucketAccessPolicy(ctx context.Context, client MinioClient, bucketName string, access models.BucketAccess, policyDefinition string) error {
|
|
if strings.TrimSpace(bucketName) == "" {
|
|
return fmt.Errorf("error: bucket name not present")
|
|
}
|
|
if strings.TrimSpace(string(access)) == "" {
|
|
return fmt.Errorf("error: bucket access not present")
|
|
}
|
|
// Prepare policyJSON corresponding to the access type
|
|
if access != models.BucketAccessPRIVATE && access != models.BucketAccessPUBLIC && access != models.BucketAccessCUSTOM {
|
|
return fmt.Errorf("access: `%s` not supported", access)
|
|
}
|
|
|
|
bucketAccessPolicy := policy.BucketAccessPolicy{Version: minioIAMPolicy.DefaultVersion}
|
|
if access == models.BucketAccessCUSTOM {
|
|
err := client.setBucketPolicyWithContext(ctx, bucketName, policyDefinition)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
return nil
|
|
}
|
|
bucketPolicy := consoleAccess2policyAccess(access)
|
|
bucketAccessPolicy.Statements = policy.SetPolicy(bucketAccessPolicy.Statements,
|
|
bucketPolicy, bucketName, "")
|
|
policyJSON, err := json.Marshal(bucketAccessPolicy)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
return client.setBucketPolicyWithContext(ctx, bucketName, string(policyJSON))
|
|
}
|
|
|
|
// putBucketTags sets tags for a bucket
|
|
func getPutBucketTagsResponse(session *models.Principal, params bucketApi.PutBucketTagsParams) *CodedAPIError {
|
|
ctx, cancel := context.WithCancel(params.HTTPRequest.Context())
|
|
defer cancel()
|
|
|
|
mClient, err := newMinioClient(session, getClientIP(params.HTTPRequest))
|
|
if err != nil {
|
|
return ErrorWithContext(ctx, err)
|
|
}
|
|
// create a minioClient interface implementation
|
|
// defining the client to be used
|
|
minioClient := minioClient{client: mClient}
|
|
|
|
req := params.Body
|
|
bucketName := params.BucketName
|
|
|
|
newTagSet, err := tags.NewTags(req.Tags, true)
|
|
if err != nil {
|
|
return ErrorWithContext(ctx, err)
|
|
}
|
|
|
|
err = minioClient.SetBucketTagging(ctx, bucketName, newTagSet)
|
|
if err != nil {
|
|
return ErrorWithContext(ctx, err)
|
|
}
|
|
return nil
|
|
}
|
|
|
|
// removeBucket deletes a bucket
|
|
func removeBucket(client MinioClient, bucketName string) error {
|
|
return client.removeBucket(context.Background(), bucketName)
|
|
}
|
|
|
|
// getBucketInfo return bucket information including name, policy access, size and creation date
|
|
func getBucketInfo(ctx context.Context, client MinioClient, adminClient MinioAdmin, bucketName string) (*models.Bucket, error) {
|
|
var bucketAccess models.BucketAccess
|
|
policyStr, err := client.getBucketPolicy(context.Background(), bucketName)
|
|
if err != nil {
|
|
// we can tolerate this errors
|
|
ErrorWithContext(ctx, fmt.Errorf("error getting bucket policy: %v", err))
|
|
}
|
|
|
|
if policyStr == "" {
|
|
bucketAccess = models.BucketAccessPRIVATE
|
|
} else {
|
|
var p policy.BucketAccessPolicy
|
|
if err = json.Unmarshal([]byte(policyStr), &p); err != nil {
|
|
return nil, err
|
|
}
|
|
policyAccess := policy.GetPolicy(p.Statements, bucketName, "")
|
|
if len(p.Statements) > 0 && policyAccess == policy.BucketPolicyNone {
|
|
bucketAccess = models.BucketAccessCUSTOM
|
|
} else {
|
|
bucketAccess = policyAccess2consoleAccess(policyAccess)
|
|
}
|
|
}
|
|
bucketTags, err := client.GetBucketTagging(ctx, bucketName)
|
|
if err != nil {
|
|
// we can tolerate this errors
|
|
ErrorWithContext(ctx, fmt.Errorf("error getting bucket tags: %v", err))
|
|
}
|
|
bucketDetails := &models.BucketDetails{}
|
|
if bucketTags != nil {
|
|
bucketDetails.Tags = bucketTags.ToMap()
|
|
}
|
|
|
|
info, err := adminClient.AccountInfo(ctx)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
var bucketInfo madmin.BucketAccessInfo
|
|
|
|
for _, bucket := range info.Buckets {
|
|
if bucket.Name == bucketName {
|
|
bucketInfo = bucket
|
|
break
|
|
}
|
|
}
|
|
|
|
return &models.Bucket{
|
|
Name: &bucketName,
|
|
Access: &bucketAccess,
|
|
Definition: policyStr,
|
|
CreationDate: bucketInfo.Created.Format(time.RFC3339),
|
|
Size: int64(bucketInfo.Size),
|
|
Details: bucketDetails,
|
|
Objects: int64(bucketInfo.Objects),
|
|
}, nil
|
|
}
|
|
|
|
// getBucketInfoResponse calls getBucketInfo() to get the bucket's info
|
|
func getBucketInfoResponse(session *models.Principal, params bucketApi.BucketInfoParams) (*models.Bucket, *CodedAPIError) {
|
|
ctx, cancel := context.WithCancel(params.HTTPRequest.Context())
|
|
defer cancel()
|
|
mClient, err := newMinioClient(session, getClientIP(params.HTTPRequest))
|
|
if err != nil {
|
|
return nil, ErrorWithContext(ctx, err)
|
|
}
|
|
// create a minioClient interface implementation
|
|
// defining the client to be used
|
|
minioClient := minioClient{client: mClient}
|
|
|
|
mAdmin, err := NewMinioAdminClient(params.HTTPRequest.Context(), session)
|
|
if err != nil {
|
|
return nil, ErrorWithContext(ctx, err)
|
|
}
|
|
// create a minioClient interface implementation
|
|
// defining the client to be used
|
|
adminClient := AdminClient{Client: mAdmin}
|
|
|
|
bucket, err := getBucketInfo(ctx, minioClient, adminClient, params.Name)
|
|
if err != nil {
|
|
return nil, ErrorWithContext(ctx, err)
|
|
}
|
|
return bucket, nil
|
|
}
|
|
|
|
// policyAccess2consoleAccess gets the equivalent of policy.BucketPolicy to models.BucketAccess
|
|
func policyAccess2consoleAccess(bucketPolicy policy.BucketPolicy) (bucketAccess models.BucketAccess) {
|
|
switch bucketPolicy {
|
|
case policy.BucketPolicyReadWrite:
|
|
bucketAccess = models.BucketAccessPUBLIC
|
|
case policy.BucketPolicyNone:
|
|
bucketAccess = models.BucketAccessPRIVATE
|
|
default:
|
|
bucketAccess = models.BucketAccessCUSTOM
|
|
}
|
|
return bucketAccess
|
|
}
|
|
|
|
// consoleAccess2policyAccess gets the equivalent of models.BucketAccess to policy.BucketPolicy
|
|
func consoleAccess2policyAccess(bucketAccess models.BucketAccess) (bucketPolicy policy.BucketPolicy) {
|
|
switch bucketAccess {
|
|
case models.BucketAccessPUBLIC:
|
|
bucketPolicy = policy.BucketPolicyReadWrite
|
|
case models.BucketAccessPRIVATE:
|
|
bucketPolicy = policy.BucketPolicyNone
|
|
}
|
|
return bucketPolicy
|
|
}
|
|
|
|
// disableBucketEncryption will disable bucket for the provided bucket name
|
|
func disableBucketEncryption(ctx context.Context, client MinioClient, bucketName string) error {
|
|
return client.removeBucketEncryption(ctx, bucketName)
|
|
}
|
|
|
|
func getBucketRetentionConfig(ctx context.Context, client MinioClient, bucketName string) (*models.GetBucketRetentionConfig, error) {
|
|
m, v, u, err := client.getBucketObjectLockConfig(ctx, bucketName)
|
|
if err != nil {
|
|
errResp := minio.ToErrorResponse(probe.NewError(err).ToGoError())
|
|
if errResp.Code == "ObjectLockConfigurationNotFoundError" {
|
|
return &models.GetBucketRetentionConfig{}, nil
|
|
}
|
|
return nil, err
|
|
}
|
|
|
|
// These values can be empty when all are empty, it means
|
|
// object was created with object locking enabled but
|
|
// does not have any default object locking configuration.
|
|
if m == nil && v == nil && u == nil {
|
|
return &models.GetBucketRetentionConfig{}, nil
|
|
}
|
|
|
|
var mode models.ObjectRetentionMode
|
|
var unit models.ObjectRetentionUnit
|
|
|
|
if m != nil {
|
|
switch *m {
|
|
case minio.Governance:
|
|
mode = models.ObjectRetentionModeGovernance
|
|
case minio.Compliance:
|
|
mode = models.ObjectRetentionModeCompliance
|
|
default:
|
|
return nil, errors.New("invalid retention mode")
|
|
}
|
|
}
|
|
|
|
if u != nil {
|
|
switch *u {
|
|
case minio.Days:
|
|
unit = models.ObjectRetentionUnitDays
|
|
case minio.Years:
|
|
unit = models.ObjectRetentionUnitYears
|
|
default:
|
|
return nil, errors.New("invalid retention unit")
|
|
}
|
|
}
|
|
|
|
var validity int32
|
|
if v != nil {
|
|
validity = int32(*v)
|
|
}
|
|
|
|
config := &models.GetBucketRetentionConfig{
|
|
Mode: mode,
|
|
Unit: unit,
|
|
Validity: validity,
|
|
}
|
|
return config, nil
|
|
}
|
|
|
|
func getBucketRewindResponse(session *models.Principal, params bucketApi.GetBucketRewindParams) (*models.RewindResponse, *CodedAPIError) {
|
|
ctx, cancel := context.WithCancel(params.HTTPRequest.Context())
|
|
defer cancel()
|
|
prefix := ""
|
|
if params.Prefix != nil {
|
|
prefix = *params.Prefix
|
|
}
|
|
s3Client, err := newS3BucketClient(session, params.BucketName, prefix, getClientIP(params.HTTPRequest))
|
|
if err != nil {
|
|
return nil, ErrorWithContext(ctx, fmt.Errorf("error creating S3Client: %v", err))
|
|
}
|
|
|
|
// create a mc S3Client interface implementation
|
|
// defining the client to be used
|
|
mcClient := mcClient{client: s3Client}
|
|
|
|
parsedDate, errDate := time.Parse(time.RFC3339, params.Date)
|
|
|
|
if errDate != nil {
|
|
return nil, ErrorWithContext(ctx, errDate)
|
|
}
|
|
|
|
var rewindItems []*models.RewindItem
|
|
|
|
for content := range mcClient.client.List(ctx, cmd.ListOptions{TimeRef: parsedDate, WithDeleteMarkers: true}) {
|
|
// build object name
|
|
name := strings.ReplaceAll(content.URL.Path, fmt.Sprintf("/%s/", params.BucketName), "")
|
|
|
|
listElement := &models.RewindItem{
|
|
LastModified: content.Time.Format(time.RFC3339),
|
|
Size: content.Size,
|
|
VersionID: content.VersionID,
|
|
DeleteFlag: content.IsDeleteMarker,
|
|
Action: "",
|
|
Name: name,
|
|
}
|
|
|
|
rewindItems = append(rewindItems, listElement)
|
|
}
|
|
|
|
return &models.RewindResponse{
|
|
Objects: rewindItems,
|
|
}, nil
|
|
}
|
|
|
|
func getMaxShareLinkExpirationResponse(session *models.Principal, params bucketApi.GetMaxShareLinkExpParams) (*models.MaxShareLinkExpResponse, *CodedAPIError) {
|
|
ctx, cancel := context.WithCancel(params.HTTPRequest.Context())
|
|
defer cancel()
|
|
|
|
maxShareLinkExpSeconds, err := getMaxShareLinkExpirationSeconds(session)
|
|
if err != nil {
|
|
return nil, ErrorWithContext(ctx, err)
|
|
}
|
|
return &models.MaxShareLinkExpResponse{Exp: swag.Int64(maxShareLinkExpSeconds)}, nil
|
|
}
|
|
|
|
// getMaxShareLinkExpirationSeconds returns the max share link expiration time in seconds which is the sts token expiration time
|
|
func getMaxShareLinkExpirationSeconds(session *models.Principal) (int64, error) {
|
|
creds := getConsoleCredentialsFromSession(session)
|
|
val, err := creds.GetWithContext(&credentials.CredContext{Client: http.DefaultClient})
|
|
if err != nil {
|
|
return 0, err
|
|
}
|
|
|
|
if val.SignerType.IsAnonymous() {
|
|
return 0, ErrAccessDenied
|
|
}
|
|
maxShareLinkExp := token.GetConsoleSTSDuration()
|
|
|
|
return int64(maxShareLinkExp.Seconds()), nil
|
|
}
|