2019-01-05 17:16:43 -05:00
|
|
|
/*
|
2019-04-09 14:39:42 -04:00
|
|
|
* MinIO Cloud Storage, (C) 2018 MinIO, Inc.
|
2019-01-05 17:16:43 -05:00
|
|
|
*
|
|
|
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
* you may not use this file except in compliance with the License.
|
|
|
|
* You may obtain a copy of the License at
|
|
|
|
*
|
|
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
*
|
|
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
|
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
* See the License for the specific language governing permissions and
|
|
|
|
* limitations under the License.
|
|
|
|
*/
|
|
|
|
|
|
|
|
package s3
|
|
|
|
|
|
|
|
import (
|
|
|
|
"bytes"
|
|
|
|
"context"
|
|
|
|
"encoding/json"
|
|
|
|
"errors"
|
2019-02-28 14:01:25 -05:00
|
|
|
"net/http"
|
2019-01-05 17:16:43 -05:00
|
|
|
"time"
|
|
|
|
|
2019-09-05 18:51:27 -04:00
|
|
|
jsoniter "github.com/json-iterator/go"
|
2019-01-05 17:16:43 -05:00
|
|
|
minio "github.com/minio/minio/cmd"
|
|
|
|
"github.com/minio/minio/cmd/logger"
|
|
|
|
"github.com/minio/minio/pkg/hash"
|
|
|
|
)
|
|
|
|
|
|
|
|
var (
|
|
|
|
errGWMetaNotFound = errors.New("dare.meta file not found")
|
|
|
|
errGWMetaInvalidFormat = errors.New("dare.meta format is invalid")
|
|
|
|
)
|
|
|
|
|
|
|
|
// A gwMetaV1 represents `gw.json` metadata header.
|
|
|
|
type gwMetaV1 struct {
|
|
|
|
Version string `json:"version"` // Version of the current `gw.json`.
|
|
|
|
Format string `json:"format"` // Format of the current `gw.json`.
|
|
|
|
Stat minio.StatInfo `json:"stat"` // Stat of the current object `gw.json`.
|
|
|
|
ETag string `json:"etag"` // ETag of the current object
|
|
|
|
|
|
|
|
// Metadata map for current object `gw.json`.
|
|
|
|
Meta map[string]string `json:"meta,omitempty"`
|
|
|
|
// Captures all the individual object `gw.json`.
|
|
|
|
Parts []minio.ObjectPartInfo `json:"parts,omitempty"`
|
|
|
|
}
|
|
|
|
|
|
|
|
// Gateway metadata constants.
|
|
|
|
const (
|
|
|
|
// Gateway meta version.
|
|
|
|
gwMetaVersion = "1.0.0"
|
|
|
|
|
|
|
|
// Gateway meta version.
|
|
|
|
gwMetaVersion100 = "1.0.0"
|
|
|
|
|
|
|
|
// Gateway meta format string.
|
|
|
|
gwMetaFormat = "gw"
|
|
|
|
|
|
|
|
// Add new constants here.
|
|
|
|
)
|
|
|
|
|
|
|
|
// newGWMetaV1 - initializes new gwMetaV1, adds version.
|
|
|
|
func newGWMetaV1() (gwMeta gwMetaV1) {
|
|
|
|
gwMeta = gwMetaV1{}
|
|
|
|
gwMeta.Version = gwMetaVersion
|
|
|
|
gwMeta.Format = gwMetaFormat
|
|
|
|
return gwMeta
|
|
|
|
}
|
|
|
|
|
|
|
|
// IsValid - tells if the format is sane by validating the version
|
|
|
|
// string, format fields.
|
|
|
|
func (m gwMetaV1) IsValid() bool {
|
|
|
|
return ((m.Version == gwMetaVersion || m.Version == gwMetaVersion100) &&
|
|
|
|
m.Format == gwMetaFormat)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Converts metadata to object info.
|
|
|
|
func (m gwMetaV1) ToObjectInfo(bucket, object string) minio.ObjectInfo {
|
|
|
|
filterKeys := append([]string{
|
|
|
|
"ETag",
|
|
|
|
"Content-Length",
|
|
|
|
"Last-Modified",
|
|
|
|
"Content-Type",
|
2019-02-28 14:01:25 -05:00
|
|
|
"Expires",
|
2019-01-05 17:16:43 -05:00
|
|
|
}, defaultFilterKeys...)
|
|
|
|
objInfo := minio.ObjectInfo{
|
|
|
|
IsDir: false,
|
|
|
|
Bucket: bucket,
|
|
|
|
Name: object,
|
|
|
|
Size: m.Stat.Size,
|
|
|
|
ModTime: m.Stat.ModTime,
|
|
|
|
ContentType: m.Meta["content-type"],
|
|
|
|
ContentEncoding: m.Meta["content-encoding"],
|
|
|
|
ETag: minio.CanonicalizeETag(m.ETag),
|
2020-05-15 11:06:45 -04:00
|
|
|
UserDefined: minio.CleanMinioInternalMetadataKeys(minio.CleanMetadataKeys(m.Meta, filterKeys...)),
|
2019-01-05 17:16:43 -05:00
|
|
|
Parts: m.Parts,
|
|
|
|
}
|
|
|
|
|
|
|
|
if sc, ok := m.Meta["x-amz-storage-class"]; ok {
|
|
|
|
objInfo.StorageClass = sc
|
|
|
|
}
|
2019-02-28 14:01:25 -05:00
|
|
|
var (
|
|
|
|
t time.Time
|
|
|
|
e error
|
|
|
|
)
|
|
|
|
if exp, ok := m.Meta["expires"]; ok {
|
|
|
|
if t, e = time.Parse(http.TimeFormat, exp); e == nil {
|
|
|
|
objInfo.Expires = t.UTC()
|
|
|
|
}
|
|
|
|
}
|
2019-01-05 17:16:43 -05:00
|
|
|
// Success.
|
|
|
|
return objInfo
|
|
|
|
}
|
|
|
|
|
|
|
|
// ObjectToPartOffset - translate offset of an object to offset of its individual part.
|
|
|
|
func (m gwMetaV1) ObjectToPartOffset(ctx context.Context, offset int64) (partIndex int, partOffset int64, err error) {
|
|
|
|
if offset == 0 {
|
|
|
|
// Special case - if offset is 0, then partIndex and partOffset are always 0.
|
|
|
|
return 0, 0, nil
|
|
|
|
}
|
|
|
|
partOffset = offset
|
|
|
|
// Seek until object offset maps to a particular part offset.
|
|
|
|
for i, part := range m.Parts {
|
|
|
|
partIndex = i
|
|
|
|
// Offset is smaller than size we have reached the proper part offset.
|
|
|
|
if partOffset < part.Size {
|
|
|
|
return partIndex, partOffset, nil
|
|
|
|
}
|
|
|
|
// Continue to towards the next part.
|
|
|
|
partOffset -= part.Size
|
|
|
|
}
|
|
|
|
logger.LogIf(ctx, minio.InvalidRange{})
|
|
|
|
// Offset beyond the size of the object return InvalidRange.
|
|
|
|
return 0, 0, minio.InvalidRange{}
|
|
|
|
}
|
|
|
|
|
2019-09-05 18:51:27 -04:00
|
|
|
// Constructs GWMetaV1 using `jsoniter` lib to retrieve each field.
|
2019-08-19 14:35:52 -04:00
|
|
|
func gwMetaUnmarshalJSON(ctx context.Context, gwMetaBuf []byte) (gwMeta gwMetaV1, err error) {
|
2019-09-05 18:51:27 -04:00
|
|
|
var json = jsoniter.ConfigCompatibleWithStandardLibrary
|
|
|
|
err = json.Unmarshal(gwMetaBuf, &gwMeta)
|
|
|
|
return gwMeta, err
|
2019-01-05 17:16:43 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
// readGWMeta reads `dare.meta` and returns back GW metadata structure.
|
|
|
|
func readGWMetadata(ctx context.Context, buf bytes.Buffer) (gwMeta gwMetaV1, err error) {
|
|
|
|
if buf.Len() == 0 {
|
|
|
|
return gwMetaV1{}, errGWMetaNotFound
|
|
|
|
}
|
|
|
|
gwMeta, err = gwMetaUnmarshalJSON(ctx, buf.Bytes())
|
|
|
|
if err != nil {
|
|
|
|
return gwMetaV1{}, err
|
|
|
|
}
|
|
|
|
if !gwMeta.IsValid() {
|
|
|
|
return gwMetaV1{}, errGWMetaInvalidFormat
|
|
|
|
}
|
|
|
|
// Return structured `dare.meta`.
|
|
|
|
return gwMeta, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// getGWMetadata - unmarshals dare.meta into a *minio.PutObjReader
|
|
|
|
func getGWMetadata(ctx context.Context, bucket, prefix string, gwMeta gwMetaV1) (*minio.PutObjReader, error) {
|
|
|
|
// Marshal json.
|
|
|
|
metadataBytes, err := json.Marshal(&gwMeta)
|
|
|
|
if err != nil {
|
|
|
|
logger.LogIf(ctx, err)
|
|
|
|
return nil, err
|
|
|
|
}
|
pkg/etag: add new package for S3 ETag handling (#11577)
This commit adds a new package `etag` for dealing
with S3 ETags.
Even though ETag is often viewed as MD5 checksum of
an object, handling S3 ETags correctly is a surprisingly
complex task. While it is true that the ETag corresponds
to the MD5 for the most basic S3 API operations, there are
many exceptions in case of multipart uploads or encryption.
In worse, some S3 clients expect very specific behavior when
it comes to ETags. For example, some clients expect that the
ETag is a double-quoted string and fail otherwise.
Non-AWS compliant ETag handling has been a source of many bugs
in the past.
Therefore, this commit adds a dedicated `etag` package that provides
functionality for parsing, generating and converting S3 ETags.
Further, this commit removes the ETag computation from the `hash`
package. Instead, the `hash` package (i.e. `hash.Reader`) should
focus only on computing and verifying the content-sha256.
One core feature of this commit is to provide a mechanism to
communicate a computed ETag from a low-level `io.Reader` to
a high-level `io.Reader`.
This problem occurs when an S3 server receives a request and
has to compute the ETag of the content. However, the server
may also wrap the initial body with several other `io.Reader`,
e.g. when encrypting or compressing the content:
```
reader := Encrypt(Compress(ETag(content)))
```
In such a case, the ETag should be accessible by the high-level
`io.Reader`.
The `etag` provides a mechanism to wrap `io.Reader` implementations
such that the `ETag` can be accessed by a type-check.
This technique is applied to the PUT, COPY and Upload handlers.
2021-02-23 15:31:53 -05:00
|
|
|
hashReader, err := hash.NewReader(bytes.NewReader(metadataBytes), int64(len(metadataBytes)), "", "", int64(len(metadataBytes)))
|
2019-01-05 17:16:43 -05:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
2021-02-10 11:52:50 -05:00
|
|
|
return minio.NewPutObjReader(hashReader), nil
|
2019-01-05 17:16:43 -05:00
|
|
|
}
|