seaweedfs/weed/shell/command_s3_configure.go

183 lines
4.9 KiB
Go
Raw Normal View History

2020-11-25 16:02:31 +00:00
package shell
import (
2020-12-07 07:16:20 +00:00
"bytes"
2020-11-25 16:02:31 +00:00
"flag"
"fmt"
2020-12-07 07:16:20 +00:00
"github.com/chrislusf/seaweedfs/weed/filer"
2020-11-25 16:02:31 +00:00
"io"
"sort"
"strings"
"github.com/chrislusf/seaweedfs/weed/pb/filer_pb"
2020-11-25 20:30:11 +00:00
"github.com/chrislusf/seaweedfs/weed/pb/iam_pb"
2020-11-25 16:02:31 +00:00
)
func init() {
Commands = append(Commands, &commandS3Configure{})
}
type commandS3Configure struct {
}
func (c *commandS3Configure) Name() string {
return "s3.configure"
}
func (c *commandS3Configure) Help() string {
2020-12-07 02:56:58 +00:00
return `<WIP> configure and apply s3 options for each bucket
2020-11-25 16:02:31 +00:00
# see the current configuration file content
s3.configure
`
}
func (c *commandS3Configure) Do(args []string, commandEnv *CommandEnv, writer io.Writer) (err error) {
2020-12-07 07:16:20 +00:00
2020-11-25 16:02:31 +00:00
s3ConfigureCommand := flag.NewFlagSet(c.Name(), flag.ContinueOnError)
2020-12-07 05:54:55 +00:00
actions := s3ConfigureCommand.String("actions", "", "comma separated actions names: Read,Write,List,Tagging,Admin")
2020-11-25 16:02:31 +00:00
user := s3ConfigureCommand.String("user", "", "user name")
buckets := s3ConfigureCommand.String("buckets", "", "bucket name")
accessKey := s3ConfigureCommand.String("access_key", "", "specify the access key")
secretKey := s3ConfigureCommand.String("secret_key", "", "specify the secret key")
isDelete := s3ConfigureCommand.Bool("delete", false, "delete users, actions or access keys")
apply := s3ConfigureCommand.Bool("apply", false, "update and apply s3 configuration")
if err = s3ConfigureCommand.Parse(args); err != nil {
return nil
}
2020-12-07 07:16:20 +00:00
var buf bytes.Buffer
2020-11-25 16:02:31 +00:00
if err = commandEnv.WithFilerClient(func(client filer_pb.SeaweedFilerClient) error {
2020-12-07 07:16:20 +00:00
return filer.ReadEntry(commandEnv.MasterClient, client, filer.IamConfigDirecotry, filer.IamIdentityFile, &buf)
}); err != nil && err != filer_pb.ErrNotFound {
2020-11-25 16:02:31 +00:00
return err
}
2020-12-07 07:16:20 +00:00
s3cfg := &iam_pb.S3ApiConfiguration{}
if buf.Len() > 0 {
if err = filer.ParseS3ConfigurationFromBytes(buf.Bytes(), s3cfg); err != nil {
return err
}
}
2020-11-25 16:02:31 +00:00
idx := 0
changed := false
2020-11-25 22:50:53 +00:00
if *user != "" {
2020-11-25 20:30:11 +00:00
for i, identity := range s3cfg.Identities {
2020-11-25 16:02:31 +00:00
if *user == identity.Name {
idx = i
changed = true
break
}
}
}
2020-11-25 20:30:11 +00:00
var cmdActions []string
2020-11-25 22:50:53 +00:00
for _, action := range strings.Split(*actions, ",") {
if *buckets == "" {
cmdActions = append(cmdActions, action)
} else {
for _, bucket := range strings.Split(*buckets, ",") {
cmdActions = append(cmdActions, fmt.Sprintf("%s:%s", action, bucket))
}
2020-11-25 16:02:31 +00:00
}
}
if changed {
if *isDelete {
2020-11-25 20:30:11 +00:00
var exists []int
2020-11-25 16:02:31 +00:00
for _, cmdAction := range cmdActions {
2020-11-25 20:30:11 +00:00
for i, currentAction := range s3cfg.Identities[idx].Actions {
2020-11-25 16:02:31 +00:00
if cmdAction == currentAction {
exists = append(exists, i)
}
}
}
sort.Sort(sort.Reverse(sort.IntSlice(exists)))
for _, i := range exists {
2020-11-25 20:30:11 +00:00
s3cfg.Identities[idx].Actions = append(
s3cfg.Identities[idx].Actions[:i],
s3cfg.Identities[idx].Actions[i+1:]...,
)
2020-11-25 16:02:31 +00:00
}
if *accessKey != "" {
exists = []int{}
2020-11-25 20:30:11 +00:00
for i, credential := range s3cfg.Identities[idx].Credentials {
2020-11-25 16:02:31 +00:00
if credential.AccessKey == *accessKey {
exists = append(exists, i)
}
}
sort.Sort(sort.Reverse(sort.IntSlice(exists)))
for _, i := range exists {
2020-11-25 20:30:11 +00:00
s3cfg.Identities[idx].Credentials = append(
s3cfg.Identities[idx].Credentials[:i],
s3cfg.Identities[idx].Credentials[:i+1]...,
)
2020-11-25 16:02:31 +00:00
}
}
2020-11-25 22:50:53 +00:00
if *actions == "" && *accessKey == "" && *buckets == "" {
2020-11-25 20:30:11 +00:00
s3cfg.Identities = append(s3cfg.Identities[:idx], s3cfg.Identities[idx+1:]...)
2020-11-25 16:02:31 +00:00
}
} else {
2020-11-25 22:50:53 +00:00
if *actions != "" {
for _, cmdAction := range cmdActions {
found := false
for _, action := range s3cfg.Identities[idx].Actions {
if cmdAction == action {
found = true
break
}
}
if !found {
s3cfg.Identities[idx].Actions = append(s3cfg.Identities[idx].Actions, cmdAction)
}
}
}
if *accessKey != "" && *user != "anonymous" {
found := false
for _, credential := range s3cfg.Identities[idx].Credentials {
if credential.AccessKey == *accessKey {
found = true
credential.SecretKey = *secretKey
break
}
}
if !found {
s3cfg.Identities[idx].Credentials = append(s3cfg.Identities[idx].Credentials, &iam_pb.Credential{
AccessKey: *accessKey,
SecretKey: *secretKey,
})
}
}
2020-11-25 16:02:31 +00:00
}
2020-11-25 22:50:53 +00:00
} else if *user != "" && *actions != "" {
2020-11-25 20:30:11 +00:00
identity := iam_pb.Identity{
2020-11-25 22:50:53 +00:00
Name: *user,
Actions: cmdActions,
Credentials: []*iam_pb.Credential{},
}
if *user != "anonymous" {
identity.Credentials = append(identity.Credentials,
&iam_pb.Credential{AccessKey: *accessKey, SecretKey: *secretKey})
2020-11-25 16:02:31 +00:00
}
2020-11-25 20:30:11 +00:00
s3cfg.Identities = append(s3cfg.Identities, &identity)
2020-11-25 16:02:31 +00:00
}
2020-12-07 07:16:20 +00:00
buf.Reset()
filer.S3ConfigurationToText(&buf, s3cfg)
2020-11-25 22:50:53 +00:00
2020-12-07 07:16:20 +00:00
fmt.Fprintf(writer, string(buf.Bytes()))
2020-11-25 16:02:31 +00:00
fmt.Fprintln(writer)
2020-12-07 07:16:20 +00:00
2020-11-25 20:30:11 +00:00
if *apply {
2020-12-07 07:16:20 +00:00
if err := filer.SaveAs(commandEnv.option.FilerHost, int(commandEnv.option.FilerPort), filer.IamConfigDirecotry, filer.IamIdentityFile, "text/plain; charset=utf-8", &buf); err != nil {
2020-11-25 16:02:31 +00:00
return err
}
2020-12-07 07:16:20 +00:00
2020-11-25 16:02:31 +00:00
}
2020-11-25 20:30:11 +00:00
2020-11-25 16:02:31 +00:00
return nil
}