mirror of
https://github.com/versity/versitygw.git
synced 2026-01-11 05:40:10 +00:00
173 lines
5.0 KiB
Bash
173 lines
5.0 KiB
Bash
#!/usr/bin/env bash
|
|
|
|
# Copyright 2024 Versity Software
|
|
# This file is licensed under the Apache License, Version 2.0
|
|
# (the "License"); you may not use this file except in compliance
|
|
# with the License. You may obtain a copy of the License at
|
|
#
|
|
# http:#www.apache.org/licenses/LICENSE-2.0
|
|
#
|
|
# Unless required by applicable law or agreed to in writing,
|
|
# software distributed under the License is distributed on an
|
|
# "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
|
|
# KIND, either express or implied. See the License for the
|
|
# specific language governing permissions and limitations
|
|
# under the License.
|
|
|
|
source ./tests/drivers/delete_object/delete_object_rest.sh
|
|
source ./tests/drivers/get_object_lock_config/get_object_lock_config_rest.sh
|
|
source ./tests/drivers/put_bucket_acl/put_bucket_acl_rest.sh
|
|
source ./tests/drivers/file.sh
|
|
source ./tests/util/util_multipart_abort.sh
|
|
source ./tests/util/util_policy.sh
|
|
source ./tests/util/util_retention.sh
|
|
source ./tests/util/util_users.sh
|
|
|
|
create_versitygw_acl_user_or_get_direct_user() {
|
|
if [ $# -ne 2 ]; then
|
|
log 2 "'create_versitygw_acl_user_or_get_direct_user' requires username, password"
|
|
return 1
|
|
fi
|
|
if [ "$DIRECT" == "true" ]; then
|
|
if [ -z "$AWS_CANONICAL_ID" ] || [ -z "$ACL_AWS_CANONICAL_ID" ] || [ -z "$ACL_AWS_ACCESS_KEY_ID" ] || [ -z "$ACL_AWS_SECRET_ACCESS_KEY" ]; then
|
|
log 2 "direct ACL calls require the following env vars: AWS_CANONICAL_ID, ACL_AWS_CANONICAL_ID, ACL_AWS_ACCESS_KEY_ID, ACL_AWS_SECRET_ACCESS_KEY"
|
|
return 1
|
|
fi
|
|
owner_canonical_id="$AWS_CANONICAL_ID"
|
|
user_canonical_id="$ACL_AWS_CANONICAL_ID"
|
|
username="$ACL_AWS_ACCESS_KEY_ID"
|
|
password="$ACL_AWS_SECRET_ACCESS_KEY"
|
|
else
|
|
owner_canonical_id="$AWS_ACCESS_KEY_ID"
|
|
if ! create_user_versitygw "$1" "$2" "user"; then
|
|
log 2 "error creating versitygw user"
|
|
return 1
|
|
fi
|
|
# shellcheck disable=SC2154
|
|
user_canonical_id="$1"
|
|
username="$1"
|
|
# shellcheck disable=SC2154
|
|
password="$2"
|
|
fi
|
|
echo "$owner_canonical_id"
|
|
echo "$user_canonical_id"
|
|
echo "$username"
|
|
echo "$password"
|
|
}
|
|
|
|
setup_bucket_and_user() {
|
|
if ! check_param_count_v2 "bucket or prefix, username, password, user type" 4 $#; then
|
|
return 1
|
|
fi
|
|
if ! setup_bucket_v2 "$1"; then
|
|
log 2 "error setting up bucket"
|
|
return 1
|
|
fi
|
|
if ! result=$(setup_user_versitygw_or_direct "$2" "$3" "$4" "$1"); then
|
|
log 2 "error setting up user"
|
|
return 1
|
|
fi
|
|
echo "$result"
|
|
return 0
|
|
}
|
|
|
|
setup_bucket_and_acl_user() {
|
|
if ! check_param_count_v2 "bucket, username, password" 3 $#; then
|
|
return 1
|
|
fi
|
|
if ! setup_bucket_v2 "$1"; then
|
|
log 2 "error setting up bucket"
|
|
return 1
|
|
fi
|
|
if ! result=$(create_versitygw_acl_user_or_get_direct_user "$2" "$3"); then
|
|
log 2 "error creating or getting user"
|
|
return 1
|
|
fi
|
|
echo "$result"
|
|
return 0
|
|
}
|
|
|
|
setup_bucket_file_and_user() {
|
|
if ! check_param_count "setup_bucket_file_and_user" "bucket, file, username, password, user type" 5 $#; then
|
|
return 1
|
|
fi
|
|
if ! setup_bucket_and_files "$1" "$2"; then
|
|
log 2 "error setting up bucket and file"
|
|
return 1
|
|
fi
|
|
if ! result=$(setup_user_versitygw_or_direct "$3" "$4" "$5" "$1"); then
|
|
log 2 "error setting up user"
|
|
return 1
|
|
fi
|
|
echo "$result"
|
|
return 0
|
|
}
|
|
|
|
setup_bucket_file_and_user_v2() {
|
|
if ! check_param_count_v2 "bucket name or prefix, file, username, password, user type" 5 $#; then
|
|
return 1
|
|
fi
|
|
if ! setup_bucket_and_files_v2 "$1" "$2"; then
|
|
log 2 "error setting up bucket and file"
|
|
return 1
|
|
fi
|
|
if ! result=$(setup_user_versitygw_or_direct "$3" "$4" "$5" "$1"); then
|
|
log 2 "error setting up user"
|
|
return 1
|
|
fi
|
|
echo "$result"
|
|
return 0
|
|
}
|
|
|
|
reset_bucket() {
|
|
if ! check_param_count "reset_bucket" "bucket" 1 $#; then
|
|
return 1
|
|
fi
|
|
log 6 "reset bucket '$1'"
|
|
|
|
if [[ $LOG_LEVEL_INT -ge 5 ]] && ! log_bucket_policy "$1"; then
|
|
log 3 "error logging bucket policy"
|
|
fi
|
|
|
|
if ! check_object_lock_config "$1"; then
|
|
log 2 "error checking object lock config"
|
|
return 1
|
|
fi
|
|
|
|
if [[ "$DIRECT" != "true" ]] && ! add_governance_bypass_policy "$1"; then
|
|
log 2 "error adding governance bypass policy"
|
|
return 1
|
|
fi
|
|
|
|
if ! list_and_delete_objects "$1"; then
|
|
log 2 "error listing and deleting objects"
|
|
return 1
|
|
fi
|
|
|
|
if ! abort_all_multipart_uploads_rest "$1"; then
|
|
log 2 "error aborting all multipart uploads"
|
|
return 1
|
|
fi
|
|
|
|
if [ "$SKIP_ACL_TESTING" != "true" ] && ! check_ownership_rule_and_reset_acl "$1"; then
|
|
log 2 "error checking ownership rule and resetting acl"
|
|
return 1
|
|
fi
|
|
|
|
if ! delete_bucket_policy_rest "$1"; then
|
|
log 2 "error deleting bucket policy"
|
|
return 1
|
|
fi
|
|
|
|
# shellcheck disable=SC2154
|
|
if [[ $lock_config_exists == true ]] && ! remove_retention_policy_rest "$1"; then
|
|
log 2 "error removing bucket retention policy"
|
|
return 1
|
|
fi
|
|
|
|
if [ "$RUN_USERS" == "true" ] && [ "$DIRECT" != "true" ] && ! change_bucket_owner "$AWS_ACCESS_KEY_ID" "$AWS_SECRET_ACCESS_KEY" "$1" "$AWS_ACCESS_KEY_ID"; then
|
|
log 2 "error changing bucket owner back to root"
|
|
return 1
|
|
fi
|
|
}
|