2021-04-19 13:30:42 -04:00
|
|
|
// Copyright (c) 2015-2021 MinIO, Inc.
|
|
|
|
//
|
|
|
|
// This file is part of MinIO Object Storage stack
|
|
|
|
//
|
|
|
|
// This program is free software: you can redistribute it and/or modify
|
|
|
|
// it under the terms of the GNU Affero General Public License as published by
|
|
|
|
// the Free Software Foundation, either version 3 of the License, or
|
|
|
|
// (at your option) any later version.
|
|
|
|
//
|
|
|
|
// This program is distributed in the hope that it will be useful
|
|
|
|
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
// GNU Affero General Public License for more details.
|
|
|
|
//
|
|
|
|
// You should have received a copy of the GNU Affero General Public License
|
|
|
|
// along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
|
|
|
|
package cmd
|
|
|
|
|
|
|
|
import (
|
|
|
|
"context"
|
2023-12-14 17:01:49 -05:00
|
|
|
"errors"
|
2021-04-19 13:30:42 -04:00
|
|
|
"fmt"
|
|
|
|
"io"
|
2022-02-23 14:50:40 -05:00
|
|
|
"net/http"
|
2021-04-19 13:30:42 -04:00
|
|
|
"net/url"
|
|
|
|
"strings"
|
|
|
|
|
2023-06-19 20:53:08 -04:00
|
|
|
"github.com/minio/madmin-go/v3"
|
2022-12-05 14:18:50 -05:00
|
|
|
"github.com/minio/minio-go/v7"
|
2021-04-19 13:30:42 -04:00
|
|
|
"github.com/minio/minio-go/v7/pkg/credentials"
|
|
|
|
)
|
|
|
|
|
|
|
|
type warmBackendS3 struct {
|
|
|
|
client *minio.Client
|
|
|
|
core *minio.Core
|
|
|
|
Bucket string
|
|
|
|
Prefix string
|
|
|
|
StorageClass string
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s3 *warmBackendS3) ToObjectError(err error, params ...string) error {
|
|
|
|
object := ""
|
|
|
|
if len(params) >= 1 {
|
|
|
|
object = params[0]
|
|
|
|
}
|
|
|
|
|
|
|
|
return ErrorRespToObjectError(err, s3.Bucket, s3.getDest(object))
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s3 *warmBackendS3) getDest(object string) string {
|
|
|
|
destObj := object
|
|
|
|
if s3.Prefix != "" {
|
|
|
|
destObj = fmt.Sprintf("%s/%s", s3.Prefix, object)
|
|
|
|
}
|
|
|
|
return destObj
|
|
|
|
}
|
|
|
|
|
2024-10-31 18:10:24 -04:00
|
|
|
func (s3 *warmBackendS3) PutWithMeta(ctx context.Context, object string, r io.Reader, length int64, meta map[string]string) (remoteVersionID, error) {
|
2023-09-12 22:11:13 -04:00
|
|
|
res, err := s3.client.PutObject(ctx, s3.Bucket, s3.getDest(object), r, length, minio.PutObjectOptions{
|
|
|
|
SendContentMd5: true,
|
|
|
|
StorageClass: s3.StorageClass,
|
2024-10-31 18:10:24 -04:00
|
|
|
UserMetadata: meta,
|
2023-09-12 22:11:13 -04:00
|
|
|
})
|
2021-06-03 17:26:51 -04:00
|
|
|
return remoteVersionID(res.VersionID), s3.ToObjectError(err, object)
|
2021-04-19 13:30:42 -04:00
|
|
|
}
|
|
|
|
|
2024-10-31 18:10:24 -04:00
|
|
|
func (s3 *warmBackendS3) Put(ctx context.Context, object string, r io.Reader, length int64) (remoteVersionID, error) {
|
|
|
|
return s3.PutWithMeta(ctx, object, r, length, map[string]string{})
|
|
|
|
}
|
|
|
|
|
2021-06-03 17:26:51 -04:00
|
|
|
func (s3 *warmBackendS3) Get(ctx context.Context, object string, rv remoteVersionID, opts WarmBackendGetOpts) (io.ReadCloser, error) {
|
2021-04-19 13:30:42 -04:00
|
|
|
gopts := minio.GetObjectOptions{}
|
|
|
|
|
2021-06-03 17:26:51 -04:00
|
|
|
if rv != "" {
|
|
|
|
gopts.VersionID = string(rv)
|
|
|
|
}
|
2021-04-19 13:30:42 -04:00
|
|
|
if opts.startOffset >= 0 && opts.length > 0 {
|
|
|
|
if err := gopts.SetRange(opts.startOffset, opts.startOffset+opts.length-1); err != nil {
|
|
|
|
return nil, s3.ToObjectError(err, object)
|
|
|
|
}
|
|
|
|
}
|
2022-12-05 14:18:50 -05:00
|
|
|
c := &minio.Core{Client: s3.client}
|
2021-04-19 13:30:42 -04:00
|
|
|
// Important to use core primitives here to pass range get options as is.
|
|
|
|
r, _, _, err := c.GetObject(ctx, s3.Bucket, s3.getDest(object), gopts)
|
|
|
|
if err != nil {
|
|
|
|
return nil, s3.ToObjectError(err, object)
|
|
|
|
}
|
|
|
|
return r, nil
|
|
|
|
}
|
|
|
|
|
2021-06-03 17:26:51 -04:00
|
|
|
func (s3 *warmBackendS3) Remove(ctx context.Context, object string, rv remoteVersionID) error {
|
|
|
|
ropts := minio.RemoveObjectOptions{}
|
|
|
|
if rv != "" {
|
|
|
|
ropts.VersionID = string(rv)
|
|
|
|
}
|
|
|
|
err := s3.client.RemoveObject(ctx, s3.Bucket, s3.getDest(object), ropts)
|
2021-04-19 13:30:42 -04:00
|
|
|
return s3.ToObjectError(err, object)
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s3 *warmBackendS3) InUse(ctx context.Context) (bool, error) {
|
2021-07-05 21:44:00 -04:00
|
|
|
result, err := s3.core.ListObjectsV2(s3.Bucket, s3.Prefix, "", "", slashSeparator, 1)
|
2021-04-19 13:30:42 -04:00
|
|
|
if err != nil {
|
|
|
|
return false, s3.ToObjectError(err)
|
|
|
|
}
|
2021-07-05 21:44:00 -04:00
|
|
|
return len(result.CommonPrefixes) > 0 || len(result.Contents) > 0, nil
|
2021-04-19 13:30:42 -04:00
|
|
|
}
|
|
|
|
|
2023-02-16 01:09:46 -05:00
|
|
|
func newWarmBackendS3(conf madmin.TierS3, tier string) (*warmBackendS3, error) {
|
2021-04-19 13:30:42 -04:00
|
|
|
u, err := url.Parse(conf.Endpoint)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
2023-12-21 19:58:10 -05:00
|
|
|
|
|
|
|
// Validation code
|
|
|
|
switch {
|
|
|
|
case conf.AWSRoleWebIdentityTokenFile == "" && conf.AWSRoleARN != "" || conf.AWSRoleWebIdentityTokenFile != "" && conf.AWSRoleARN == "":
|
|
|
|
return nil, errors.New("both the token file and the role ARN are required")
|
|
|
|
case conf.AccessKey == "" && conf.SecretKey != "" || conf.AccessKey != "" && conf.SecretKey == "":
|
|
|
|
return nil, errors.New("both the access and secret keys are required")
|
|
|
|
case conf.AWSRole && (conf.AWSRoleWebIdentityTokenFile != "" || conf.AWSRoleARN != "" || conf.AccessKey != "" || conf.SecretKey != ""):
|
|
|
|
return nil, errors.New("AWS Role cannot be activated with static credentials or the web identity token file")
|
|
|
|
case conf.Bucket == "":
|
|
|
|
return nil, errors.New("no bucket name was provided")
|
|
|
|
}
|
|
|
|
|
|
|
|
// Credentials initialization
|
2021-06-04 15:47:00 -04:00
|
|
|
var creds *credentials.Credentials
|
2023-12-14 17:01:49 -05:00
|
|
|
switch {
|
|
|
|
case conf.AWSRole:
|
2023-09-14 18:28:20 -04:00
|
|
|
creds = credentials.New(&credentials.IAM{
|
|
|
|
Client: &http.Client{
|
|
|
|
Transport: NewHTTPTransport(),
|
|
|
|
},
|
|
|
|
})
|
2023-12-14 17:01:49 -05:00
|
|
|
case conf.AWSRoleWebIdentityTokenFile != "" && conf.AWSRoleARN != "":
|
|
|
|
sessionName := conf.AWSRoleSessionName
|
|
|
|
if sessionName == "" {
|
|
|
|
// RoleSessionName has a limited set of characters (https://docs.aws.amazon.com/STS/latest/APIReference/API_AssumeRole.html)
|
|
|
|
sessionName = "minio-tier-" + mustGetUUID()
|
|
|
|
}
|
|
|
|
s3WebIdentityIAM := credentials.IAM{
|
|
|
|
Client: &http.Client{
|
|
|
|
Transport: NewHTTPTransport(),
|
|
|
|
},
|
|
|
|
EKSIdentity: struct {
|
|
|
|
TokenFile string
|
|
|
|
RoleARN string
|
|
|
|
RoleSessionName string
|
|
|
|
}{
|
|
|
|
conf.AWSRoleWebIdentityTokenFile,
|
|
|
|
conf.AWSRoleARN,
|
|
|
|
sessionName,
|
|
|
|
},
|
|
|
|
}
|
|
|
|
creds = credentials.New(&s3WebIdentityIAM)
|
|
|
|
case conf.AccessKey != "" && conf.SecretKey != "":
|
2021-06-04 15:47:00 -04:00
|
|
|
creds = credentials.NewStaticV4(conf.AccessKey, conf.SecretKey, "")
|
2023-12-14 17:01:49 -05:00
|
|
|
default:
|
|
|
|
return nil, errors.New("insufficient parameters for S3 backend authentication")
|
2021-06-04 15:47:00 -04:00
|
|
|
}
|
2021-04-19 13:30:42 -04:00
|
|
|
opts := &minio.Options{
|
|
|
|
Creds: creds,
|
|
|
|
Secure: u.Scheme == "https",
|
2024-04-21 07:43:18 -04:00
|
|
|
Transport: globalRemoteTargetTransport,
|
2021-04-19 13:30:42 -04:00
|
|
|
}
|
|
|
|
client, err := minio.New(u.Host, opts)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
2023-02-16 01:09:46 -05:00
|
|
|
client.SetAppInfo(fmt.Sprintf("s3-tier-%s", tier), ReleaseTag)
|
2023-02-14 16:19:30 -05:00
|
|
|
|
|
|
|
core := &minio.Core{Client: client}
|
2021-04-19 13:30:42 -04:00
|
|
|
return &warmBackendS3{
|
|
|
|
client: client,
|
|
|
|
core: core,
|
|
|
|
Bucket: conf.Bucket,
|
|
|
|
Prefix: strings.TrimSuffix(conf.Prefix, slashSeparator),
|
|
|
|
StorageClass: conf.StorageClass,
|
|
|
|
}, nil
|
|
|
|
}
|