mirror of
https://github.com/superseriousbusiness/gotosocial.git
synced 2024-12-04 22:20:53 +01:00
9d0df426da
* feat: vendor minio client * feat: introduce storage package with s3 support * feat: serve s3 files directly this saves a lot of bandwith as the files are fetched from the object store directly * fix: use explicit local storage in tests * feat: integrate s3 storage with the main server * fix: add s3 config to cli tests * docs: explicitly set values in example config also adds license header to the storage package * fix: use better http status code on s3 redirect HTTP 302 Found is the best fit, as it signifies that the resource requested was found but not under its presumed URL 307/TemporaryRedirect would mean that this resource is usually located here, not in this case 303/SeeOther indicates that the redirection does not link to the requested resource but to another page * refactor: use context in storage driver interface
229 lines
8.0 KiB
Go
229 lines
8.0 KiB
Go
/*
|
|
* MinIO Go Library for Amazon S3 Compatible Cloud Storage
|
|
* Copyright 2015-2017 MinIO, Inc.
|
|
*
|
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
* you may not use this file except in compliance with the License.
|
|
* You may obtain a copy of the License at
|
|
*
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
*
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
* See the License for the specific language governing permissions and
|
|
* limitations under the License.
|
|
*/
|
|
|
|
package minio
|
|
|
|
import (
|
|
"context"
|
|
"errors"
|
|
"net/http"
|
|
"net/url"
|
|
"time"
|
|
|
|
"github.com/minio/minio-go/v7/pkg/s3utils"
|
|
"github.com/minio/minio-go/v7/pkg/signer"
|
|
)
|
|
|
|
// presignURL - Returns a presigned URL for an input 'method'.
|
|
// Expires maximum is 7days - ie. 604800 and minimum is 1.
|
|
func (c *Client) presignURL(ctx context.Context, method string, bucketName string, objectName string, expires time.Duration, reqParams url.Values, extraHeaders http.Header) (u *url.URL, err error) {
|
|
// Input validation.
|
|
if method == "" {
|
|
return nil, errInvalidArgument("method cannot be empty.")
|
|
}
|
|
if err = s3utils.CheckValidBucketName(bucketName); err != nil {
|
|
return nil, err
|
|
}
|
|
if err = isValidExpiry(expires); err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
// Convert expires into seconds.
|
|
expireSeconds := int64(expires / time.Second)
|
|
reqMetadata := requestMetadata{
|
|
presignURL: true,
|
|
bucketName: bucketName,
|
|
objectName: objectName,
|
|
expires: expireSeconds,
|
|
queryValues: reqParams,
|
|
extraPresignHeader: extraHeaders,
|
|
}
|
|
|
|
// Instantiate a new request.
|
|
// Since expires is set newRequest will presign the request.
|
|
var req *http.Request
|
|
if req, err = c.newRequest(ctx, method, reqMetadata); err != nil {
|
|
return nil, err
|
|
}
|
|
return req.URL, nil
|
|
}
|
|
|
|
// PresignedGetObject - Returns a presigned URL to access an object
|
|
// data without credentials. URL can have a maximum expiry of
|
|
// upto 7days or a minimum of 1sec. Additionally you can override
|
|
// a set of response headers using the query parameters.
|
|
func (c *Client) PresignedGetObject(ctx context.Context, bucketName string, objectName string, expires time.Duration, reqParams url.Values) (u *url.URL, err error) {
|
|
if err = s3utils.CheckValidObjectName(objectName); err != nil {
|
|
return nil, err
|
|
}
|
|
return c.presignURL(ctx, http.MethodGet, bucketName, objectName, expires, reqParams, nil)
|
|
}
|
|
|
|
// PresignedHeadObject - Returns a presigned URL to access
|
|
// object metadata without credentials. URL can have a maximum expiry
|
|
// of upto 7days or a minimum of 1sec. Additionally you can override
|
|
// a set of response headers using the query parameters.
|
|
func (c *Client) PresignedHeadObject(ctx context.Context, bucketName string, objectName string, expires time.Duration, reqParams url.Values) (u *url.URL, err error) {
|
|
if err = s3utils.CheckValidObjectName(objectName); err != nil {
|
|
return nil, err
|
|
}
|
|
return c.presignURL(ctx, http.MethodHead, bucketName, objectName, expires, reqParams, nil)
|
|
}
|
|
|
|
// PresignedPutObject - Returns a presigned URL to upload an object
|
|
// without credentials. URL can have a maximum expiry of upto 7days
|
|
// or a minimum of 1sec.
|
|
func (c *Client) PresignedPutObject(ctx context.Context, bucketName string, objectName string, expires time.Duration) (u *url.URL, err error) {
|
|
if err = s3utils.CheckValidObjectName(objectName); err != nil {
|
|
return nil, err
|
|
}
|
|
return c.presignURL(ctx, http.MethodPut, bucketName, objectName, expires, nil, nil)
|
|
}
|
|
|
|
// PresignHeader - similar to Presign() but allows including HTTP headers that
|
|
// will be used to build the signature. The request using the resulting URL will
|
|
// need to have the exact same headers to be added for signature validation to
|
|
// pass.
|
|
//
|
|
// FIXME: The extra header parameter should be included in Presign() in the next
|
|
// major version bump, and this function should then be deprecated.
|
|
func (c *Client) PresignHeader(ctx context.Context, method string, bucketName string, objectName string, expires time.Duration, reqParams url.Values, extraHeaders http.Header) (u *url.URL, err error) {
|
|
return c.presignURL(ctx, method, bucketName, objectName, expires, reqParams, extraHeaders)
|
|
}
|
|
|
|
// Presign - returns a presigned URL for any http method of your choice along
|
|
// with custom request params and extra signed headers. URL can have a maximum
|
|
// expiry of upto 7days or a minimum of 1sec.
|
|
func (c *Client) Presign(ctx context.Context, method string, bucketName string, objectName string, expires time.Duration, reqParams url.Values) (u *url.URL, err error) {
|
|
return c.presignURL(ctx, method, bucketName, objectName, expires, reqParams, nil)
|
|
}
|
|
|
|
// PresignedPostPolicy - Returns POST urlString, form data to upload an object.
|
|
func (c *Client) PresignedPostPolicy(ctx context.Context, p *PostPolicy) (u *url.URL, formData map[string]string, err error) {
|
|
// Validate input arguments.
|
|
if p.expiration.IsZero() {
|
|
return nil, nil, errors.New("Expiration time must be specified")
|
|
}
|
|
if _, ok := p.formData["key"]; !ok {
|
|
return nil, nil, errors.New("object key must be specified")
|
|
}
|
|
if _, ok := p.formData["bucket"]; !ok {
|
|
return nil, nil, errors.New("bucket name must be specified")
|
|
}
|
|
|
|
bucketName := p.formData["bucket"]
|
|
// Fetch the bucket location.
|
|
location, err := c.getBucketLocation(ctx, bucketName)
|
|
if err != nil {
|
|
return nil, nil, err
|
|
}
|
|
|
|
isVirtualHost := c.isVirtualHostStyleRequest(*c.endpointURL, bucketName)
|
|
|
|
u, err = c.makeTargetURL(bucketName, "", location, isVirtualHost, nil)
|
|
if err != nil {
|
|
return nil, nil, err
|
|
}
|
|
|
|
// Get credentials from the configured credentials provider.
|
|
credValues, err := c.credsProvider.Get()
|
|
if err != nil {
|
|
return nil, nil, err
|
|
}
|
|
|
|
var (
|
|
signerType = credValues.SignerType
|
|
sessionToken = credValues.SessionToken
|
|
accessKeyID = credValues.AccessKeyID
|
|
secretAccessKey = credValues.SecretAccessKey
|
|
)
|
|
|
|
if signerType.IsAnonymous() {
|
|
return nil, nil, errInvalidArgument("Presigned operations are not supported for anonymous credentials")
|
|
}
|
|
|
|
// Keep time.
|
|
t := time.Now().UTC()
|
|
// For signature version '2' handle here.
|
|
if signerType.IsV2() {
|
|
policyBase64 := p.base64()
|
|
p.formData["policy"] = policyBase64
|
|
// For Google endpoint set this value to be 'GoogleAccessId'.
|
|
if s3utils.IsGoogleEndpoint(*c.endpointURL) {
|
|
p.formData["GoogleAccessId"] = accessKeyID
|
|
} else {
|
|
// For all other endpoints set this value to be 'AWSAccessKeyId'.
|
|
p.formData["AWSAccessKeyId"] = accessKeyID
|
|
}
|
|
// Sign the policy.
|
|
p.formData["signature"] = signer.PostPresignSignatureV2(policyBase64, secretAccessKey)
|
|
return u, p.formData, nil
|
|
}
|
|
|
|
// Add date policy.
|
|
if err = p.addNewPolicy(policyCondition{
|
|
matchType: "eq",
|
|
condition: "$x-amz-date",
|
|
value: t.Format(iso8601DateFormat),
|
|
}); err != nil {
|
|
return nil, nil, err
|
|
}
|
|
|
|
// Add algorithm policy.
|
|
if err = p.addNewPolicy(policyCondition{
|
|
matchType: "eq",
|
|
condition: "$x-amz-algorithm",
|
|
value: signV4Algorithm,
|
|
}); err != nil {
|
|
return nil, nil, err
|
|
}
|
|
|
|
// Add a credential policy.
|
|
credential := signer.GetCredential(accessKeyID, location, t, signer.ServiceTypeS3)
|
|
if err = p.addNewPolicy(policyCondition{
|
|
matchType: "eq",
|
|
condition: "$x-amz-credential",
|
|
value: credential,
|
|
}); err != nil {
|
|
return nil, nil, err
|
|
}
|
|
|
|
if sessionToken != "" {
|
|
if err = p.addNewPolicy(policyCondition{
|
|
matchType: "eq",
|
|
condition: "$x-amz-security-token",
|
|
value: sessionToken,
|
|
}); err != nil {
|
|
return nil, nil, err
|
|
}
|
|
}
|
|
|
|
// Get base64 encoded policy.
|
|
policyBase64 := p.base64()
|
|
|
|
// Fill in the form data.
|
|
p.formData["policy"] = policyBase64
|
|
p.formData["x-amz-algorithm"] = signV4Algorithm
|
|
p.formData["x-amz-credential"] = credential
|
|
p.formData["x-amz-date"] = t.Format(iso8601DateFormat)
|
|
if sessionToken != "" {
|
|
p.formData["x-amz-security-token"] = sessionToken
|
|
}
|
|
p.formData["x-amz-signature"] = signer.PostPresignSignatureV4(policyBase64, t, secretAccessKey, location)
|
|
return u, p.formData, nil
|
|
}
|