mirror of
https://github.com/Luzifer/cloudbox.git
synced 2024-11-08 22:20:09 +00:00
194 lines
4.9 KiB
Go
194 lines
4.9 KiB
Go
package s3
|
|
|
|
import (
|
|
"bytes"
|
|
"context"
|
|
"crypto/md5"
|
|
"fmt"
|
|
"hash"
|
|
"io"
|
|
"net/url"
|
|
"strings"
|
|
|
|
"github.com/aws/aws-sdk-go/aws"
|
|
"github.com/aws/aws-sdk-go/aws/credentials"
|
|
"github.com/aws/aws-sdk-go/aws/session"
|
|
"github.com/aws/aws-sdk-go/service/s3"
|
|
"github.com/aws/aws-sdk-go/service/s3/s3manager"
|
|
"github.com/pkg/errors"
|
|
|
|
"github.com/Luzifer/cloudbox/providers"
|
|
)
|
|
|
|
type Provider struct {
|
|
bucket string
|
|
bucketRegion string
|
|
defaultACL string
|
|
prefix string
|
|
s3 *s3.S3
|
|
}
|
|
|
|
func New(uri string) (providers.CloudProvider, error) {
|
|
if !strings.HasPrefix(uri, "s3://") {
|
|
return nil, providers.ErrInvalidURI
|
|
}
|
|
|
|
u, err := url.Parse(uri)
|
|
if err != nil {
|
|
return nil, errors.Wrap(err, "Invalid URI specified")
|
|
}
|
|
|
|
region, err := s3manager.GetBucketRegion(context.Background(), session.New(), u.Host, "us-east-1")
|
|
if err != nil {
|
|
return nil, errors.Wrap(err, "Unable to find bucket region")
|
|
}
|
|
|
|
cfg := aws.NewConfig().WithRegion(region)
|
|
if u.User != nil {
|
|
user := u.User.Username()
|
|
pass, _ := u.User.Password()
|
|
cfg = cfg.WithCredentials(credentials.NewStaticCredentials(user, pass, ""))
|
|
}
|
|
|
|
sess := session.Must(session.NewSession(cfg))
|
|
svc := s3.New(sess)
|
|
|
|
p := &Provider{
|
|
bucket: u.Host,
|
|
bucketRegion: region,
|
|
defaultACL: s3.ObjectCannedACLPrivate,
|
|
prefix: strings.Trim(u.Path, "/"),
|
|
s3: svc,
|
|
}
|
|
|
|
if acl := u.Query().Get("acl"); acl == s3.ObjectCannedACLPublicRead || acl == s3.ObjectCannedACLPrivate {
|
|
p.defaultACL = acl
|
|
}
|
|
|
|
return p, nil
|
|
}
|
|
|
|
func (p *Provider) Capabilities() providers.Capability {
|
|
return providers.CapBasic | providers.CapAutoChecksum | providers.CapShare
|
|
}
|
|
func (p *Provider) Name() string { return "s3" }
|
|
func (p *Provider) GetChecksumMethod() hash.Hash { return md5.New() }
|
|
|
|
func (p *Provider) DeleteFile(relativeName string) error {
|
|
_, err := p.s3.DeleteObject(&s3.DeleteObjectInput{
|
|
Bucket: aws.String(p.bucket),
|
|
Key: p.relativeNameToKey(relativeName),
|
|
})
|
|
|
|
return errors.Wrap(err, "Unable to delete object")
|
|
}
|
|
|
|
func (p *Provider) GetFile(relativeName string) (providers.File, error) {
|
|
resp, err := p.s3.HeadObject(&s3.HeadObjectInput{
|
|
Bucket: aws.String(p.bucket),
|
|
Key: p.relativeNameToKey(relativeName),
|
|
})
|
|
if err != nil {
|
|
return nil, errors.Wrap(err, "Unable to fetch head information")
|
|
}
|
|
|
|
return File{
|
|
key: relativeName,
|
|
lastModified: *resp.LastModified,
|
|
checksum: strings.Trim(*resp.ETag, `"`),
|
|
size: uint64(*resp.ContentLength),
|
|
|
|
s3Conn: p.s3,
|
|
bucket: p.bucket,
|
|
}, nil
|
|
}
|
|
|
|
func (p *Provider) ListFiles() ([]providers.File, error) {
|
|
var files []providers.File
|
|
|
|
err := p.s3.ListObjectsPages(&s3.ListObjectsInput{
|
|
Bucket: aws.String(p.bucket),
|
|
Prefix: aws.String(p.prefix),
|
|
}, func(out *s3.ListObjectsOutput, lastPage bool) bool {
|
|
for _, obj := range out.Contents {
|
|
files = append(files, File{
|
|
key: *obj.Key,
|
|
lastModified: *obj.LastModified,
|
|
checksum: strings.Trim(*obj.ETag, `"`),
|
|
size: uint64(*obj.Size),
|
|
|
|
s3Conn: p.s3,
|
|
bucket: p.bucket,
|
|
prefix: p.prefix,
|
|
})
|
|
}
|
|
|
|
return !lastPage
|
|
})
|
|
|
|
return files, errors.Wrap(err, "Unable to list objects")
|
|
}
|
|
|
|
func (p *Provider) PutFile(f providers.File) (providers.File, error) {
|
|
body, err := f.Content()
|
|
if err != nil {
|
|
return nil, errors.Wrap(err, "Unable to get file reader")
|
|
}
|
|
defer body.Close()
|
|
|
|
buf := new(bytes.Buffer)
|
|
if _, err := io.Copy(buf, body); err != nil {
|
|
return nil, errors.Wrap(err, "Unable to read source file")
|
|
}
|
|
|
|
if _, err = p.s3.PutObject(&s3.PutObjectInput{
|
|
ACL: aws.String(p.getFileACL(f.Info().RelativeName)),
|
|
Body: bytes.NewReader(buf.Bytes()),
|
|
Bucket: aws.String(p.bucket),
|
|
Key: p.relativeNameToKey(f.Info().RelativeName),
|
|
}); err != nil {
|
|
return nil, errors.Wrap(err, "Unable to write file")
|
|
}
|
|
|
|
return p.GetFile(f.Info().RelativeName)
|
|
}
|
|
|
|
func (p *Provider) Share(relativeName string) (string, error) {
|
|
_, err := p.s3.PutObjectAcl(&s3.PutObjectAclInput{
|
|
ACL: aws.String(s3.ObjectCannedACLPublicRead),
|
|
Bucket: aws.String(p.bucket),
|
|
Key: p.relativeNameToKey(relativeName),
|
|
})
|
|
if err != nil {
|
|
return "", errors.Wrap(err, "Unable to publish file")
|
|
}
|
|
|
|
return fmt.Sprintf("https://s3-%s.amazonaws.com/%s/%s", p.bucketRegion, p.bucket, relativeName), nil
|
|
}
|
|
|
|
func (p *Provider) getFileACL(relativeName string) string {
|
|
objACL, err := p.s3.GetObjectAcl(&s3.GetObjectAclInput{
|
|
Bucket: aws.String(p.bucket),
|
|
Key: p.relativeNameToKey(relativeName),
|
|
})
|
|
|
|
if err != nil {
|
|
return p.defaultACL
|
|
}
|
|
|
|
for _, g := range objACL.Grants {
|
|
if g.Grantee == nil || g.Grantee.URI == nil {
|
|
continue
|
|
}
|
|
if *g.Grantee.URI == "http://acs.amazonaws.com/groups/global/AllUsers" && *g.Permission == "READ" {
|
|
return s3.ObjectCannedACLPublicRead
|
|
}
|
|
}
|
|
|
|
return p.defaultACL
|
|
}
|
|
|
|
func (p Provider) relativeNameToKey(relativeName string) *string {
|
|
key := strings.Join([]string{p.prefix, relativeName}, "/")
|
|
return &key
|
|
}
|