mirror of
https://github.com/minio/minio.git
synced 2024-12-25 22:55:54 -05:00
b0e1776d6d
When using a chain provider all providers do not return a valid access and secret key, an anonymous request is sent, which makes it hard for users to figure out what is going on In the case of S3 tiering, when AWS IAM temporary account generation returns an error, an anonymous login will be used because of the chain provider. Avoid this and use the AWS IAM provider directly to get a good error message.
149 lines
4.3 KiB
Go
149 lines
4.3 KiB
Go
// Copyright (c) 2015-2021 MinIO, Inc.
|
|
//
|
|
// This file is part of MinIO Object Storage stack
|
|
//
|
|
// This program is free software: you can redistribute it and/or modify
|
|
// it under the terms of the GNU Affero General Public License as published by
|
|
// the Free Software Foundation, either version 3 of the License, or
|
|
// (at your option) any later version.
|
|
//
|
|
// This program is distributed in the hope that it will be useful
|
|
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
// GNU Affero General Public License for more details.
|
|
//
|
|
// You should have received a copy of the GNU Affero General Public License
|
|
// along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
package cmd
|
|
|
|
import (
|
|
"context"
|
|
"fmt"
|
|
"io"
|
|
"net/http"
|
|
"net/url"
|
|
"strings"
|
|
"sync"
|
|
"time"
|
|
|
|
"github.com/minio/madmin-go/v3"
|
|
"github.com/minio/minio-go/v7"
|
|
"github.com/minio/minio-go/v7/pkg/credentials"
|
|
)
|
|
|
|
// getRemoteTierTargetInstanceTransport contains a singleton roundtripper.
|
|
var (
|
|
getRemoteTierTargetInstanceTransport http.RoundTripper
|
|
getRemoteTierTargetInstanceTransportOnce sync.Once
|
|
)
|
|
|
|
type warmBackendS3 struct {
|
|
client *minio.Client
|
|
core *minio.Core
|
|
Bucket string
|
|
Prefix string
|
|
StorageClass string
|
|
}
|
|
|
|
func (s3 *warmBackendS3) ToObjectError(err error, params ...string) error {
|
|
object := ""
|
|
if len(params) >= 1 {
|
|
object = params[0]
|
|
}
|
|
|
|
return ErrorRespToObjectError(err, s3.Bucket, s3.getDest(object))
|
|
}
|
|
|
|
func (s3 *warmBackendS3) getDest(object string) string {
|
|
destObj := object
|
|
if s3.Prefix != "" {
|
|
destObj = fmt.Sprintf("%s/%s", s3.Prefix, object)
|
|
}
|
|
return destObj
|
|
}
|
|
|
|
func (s3 *warmBackendS3) Put(ctx context.Context, object string, r io.Reader, length int64) (remoteVersionID, error) {
|
|
res, err := s3.client.PutObject(ctx, s3.Bucket, s3.getDest(object), r, length, minio.PutObjectOptions{
|
|
SendContentMd5: true,
|
|
StorageClass: s3.StorageClass,
|
|
})
|
|
return remoteVersionID(res.VersionID), s3.ToObjectError(err, object)
|
|
}
|
|
|
|
func (s3 *warmBackendS3) Get(ctx context.Context, object string, rv remoteVersionID, opts WarmBackendGetOpts) (io.ReadCloser, error) {
|
|
gopts := minio.GetObjectOptions{}
|
|
|
|
if rv != "" {
|
|
gopts.VersionID = string(rv)
|
|
}
|
|
if opts.startOffset >= 0 && opts.length > 0 {
|
|
if err := gopts.SetRange(opts.startOffset, opts.startOffset+opts.length-1); err != nil {
|
|
return nil, s3.ToObjectError(err, object)
|
|
}
|
|
}
|
|
c := &minio.Core{Client: s3.client}
|
|
// Important to use core primitives here to pass range get options as is.
|
|
r, _, _, err := c.GetObject(ctx, s3.Bucket, s3.getDest(object), gopts)
|
|
if err != nil {
|
|
return nil, s3.ToObjectError(err, object)
|
|
}
|
|
return r, nil
|
|
}
|
|
|
|
func (s3 *warmBackendS3) Remove(ctx context.Context, object string, rv remoteVersionID) error {
|
|
ropts := minio.RemoveObjectOptions{}
|
|
if rv != "" {
|
|
ropts.VersionID = string(rv)
|
|
}
|
|
err := s3.client.RemoveObject(ctx, s3.Bucket, s3.getDest(object), ropts)
|
|
return s3.ToObjectError(err, object)
|
|
}
|
|
|
|
func (s3 *warmBackendS3) InUse(ctx context.Context) (bool, error) {
|
|
result, err := s3.core.ListObjectsV2(s3.Bucket, s3.Prefix, "", "", slashSeparator, 1)
|
|
if err != nil {
|
|
return false, s3.ToObjectError(err)
|
|
}
|
|
return len(result.CommonPrefixes) > 0 || len(result.Contents) > 0, nil
|
|
}
|
|
|
|
func newWarmBackendS3(conf madmin.TierS3, tier string) (*warmBackendS3, error) {
|
|
u, err := url.Parse(conf.Endpoint)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
var creds *credentials.Credentials
|
|
if conf.AWSRole {
|
|
creds = credentials.New(&credentials.IAM{
|
|
Client: &http.Client{
|
|
Transport: NewHTTPTransport(),
|
|
},
|
|
})
|
|
} else {
|
|
creds = credentials.NewStaticV4(conf.AccessKey, conf.SecretKey, "")
|
|
}
|
|
getRemoteTierTargetInstanceTransportOnce.Do(func() {
|
|
getRemoteTierTargetInstanceTransport = NewHTTPTransportWithTimeout(10 * time.Minute)
|
|
})
|
|
opts := &minio.Options{
|
|
Creds: creds,
|
|
Secure: u.Scheme == "https",
|
|
Transport: getRemoteTierTargetInstanceTransport,
|
|
}
|
|
client, err := minio.New(u.Host, opts)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
client.SetAppInfo(fmt.Sprintf("s3-tier-%s", tier), ReleaseTag)
|
|
|
|
core := &minio.Core{Client: client}
|
|
return &warmBackendS3{
|
|
client: client,
|
|
core: core,
|
|
Bucket: conf.Bucket,
|
|
Prefix: strings.TrimSuffix(conf.Prefix, slashSeparator),
|
|
StorageClass: conf.StorageClass,
|
|
}, nil
|
|
}
|