forked from Deuxfleurs/garage
Small changes in key model and refactoring
This commit is contained in:
parent
df35feba18
commit
677ab60cc1
7 changed files with 120 additions and 104 deletions
|
@ -38,8 +38,8 @@ pub fn handle_get_bucket_versioning() -> Result<Response<Body>, Error> {
|
||||||
}
|
}
|
||||||
|
|
||||||
pub async fn handle_list_buckets(garage: &Garage, api_key: &Key) -> Result<Response<Body>, Error> {
|
pub async fn handle_list_buckets(garage: &Garage, api_key: &Key) -> Result<Response<Body>, Error> {
|
||||||
let key_state = api_key.state.as_option().ok_or_internal_error(
|
let key_p = api_key.params().ok_or_internal_error(
|
||||||
"Key should not be in deleted state at this point (internal error)",
|
"Key should not be in deleted state at this point (in handle_list_buckets)",
|
||||||
)?;
|
)?;
|
||||||
|
|
||||||
// Collect buckets user has access to
|
// Collect buckets user has access to
|
||||||
|
@ -74,7 +74,7 @@ pub async fn handle_list_buckets(garage: &Garage, api_key: &Key) -> Result<Respo
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
for (alias, _, id_opt) in key_state.local_aliases.items() {
|
for (alias, _, id_opt) in key_p.local_aliases.items() {
|
||||||
if let Some(id) = id_opt {
|
if let Some(id) = id_opt {
|
||||||
aliases.insert(alias.clone(), *id);
|
aliases.insert(alias.clone(), *id);
|
||||||
}
|
}
|
||||||
|
@ -83,7 +83,7 @@ pub async fn handle_list_buckets(garage: &Garage, api_key: &Key) -> Result<Respo
|
||||||
// Generate response
|
// Generate response
|
||||||
let list_buckets = s3_xml::ListAllMyBucketsResult {
|
let list_buckets = s3_xml::ListAllMyBucketsResult {
|
||||||
owner: s3_xml::Owner {
|
owner: s3_xml::Owner {
|
||||||
display_name: s3_xml::Value(api_key.name.get().to_string()),
|
display_name: s3_xml::Value(key_p.name.get().to_string()),
|
||||||
id: s3_xml::Value(api_key.key_id.to_string()),
|
id: s3_xml::Value(api_key.key_id.to_string()),
|
||||||
},
|
},
|
||||||
buckets: s3_xml::BucketList {
|
buckets: s3_xml::BucketList {
|
||||||
|
|
|
@ -66,6 +66,7 @@ pub async fn check_signature(
|
||||||
.await?
|
.await?
|
||||||
.filter(|k| !k.state.is_deleted())
|
.filter(|k| !k.state.is_deleted())
|
||||||
.ok_or_else(|| Error::Forbidden(format!("No such key: {}", authorization.key_id)))?;
|
.ok_or_else(|| Error::Forbidden(format!("No such key: {}", authorization.key_id)))?;
|
||||||
|
let key_p = key.params().unwrap();
|
||||||
|
|
||||||
let canonical_request = canonical_request(
|
let canonical_request = canonical_request(
|
||||||
request.method(),
|
request.method(),
|
||||||
|
@ -79,7 +80,7 @@ pub async fn check_signature(
|
||||||
|
|
||||||
let mut hmac = signing_hmac(
|
let mut hmac = signing_hmac(
|
||||||
&date,
|
&date,
|
||||||
&key.secret_key,
|
&key_p.secret_key,
|
||||||
&garage.config.s3_api.s3_region,
|
&garage.config.s3_api.s3_region,
|
||||||
"s3",
|
"s3",
|
||||||
)
|
)
|
||||||
|
|
|
@ -107,7 +107,13 @@ impl AdminRpcHandler {
|
||||||
.items()
|
.items()
|
||||||
.iter()
|
.iter()
|
||||||
{
|
{
|
||||||
if let Some(key) = self.garage.key_table.get(&EmptyKey, k).await? {
|
if let Some(key) = self
|
||||||
|
.garage
|
||||||
|
.key_table
|
||||||
|
.get(&EmptyKey, k)
|
||||||
|
.await?
|
||||||
|
.filter(|k| !k.is_deleted())
|
||||||
|
{
|
||||||
relevant_keys.insert(k.clone(), key);
|
relevant_keys.insert(k.clone(), key);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
@ -222,7 +228,7 @@ impl AdminRpcHandler {
|
||||||
// 1. delete authorization from keys that had access
|
// 1. delete authorization from keys that had access
|
||||||
for (key_id, _) in bucket.authorized_keys() {
|
for (key_id, _) in bucket.authorized_keys() {
|
||||||
helper
|
helper
|
||||||
.set_bucket_key_permissions(bucket.id, key_id, BucketKeyPerm::no_permissions())
|
.set_bucket_key_permissions(bucket.id, key_id, BucketKeyPerm::NO_PERMISSIONS)
|
||||||
.await?;
|
.await?;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -439,7 +445,7 @@ impl AdminRpcHandler {
|
||||||
)
|
)
|
||||||
.await?
|
.await?
|
||||||
.iter()
|
.iter()
|
||||||
.map(|k| (k.key_id.to_string(), k.name.get().clone()))
|
.map(|k| (k.key_id.to_string(), k.params().unwrap().name.get().clone()))
|
||||||
.collect::<Vec<_>>();
|
.collect::<Vec<_>>();
|
||||||
Ok(AdminRpc::KeyList(key_ids))
|
Ok(AdminRpc::KeyList(key_ids))
|
||||||
}
|
}
|
||||||
|
@ -454,7 +460,7 @@ impl AdminRpcHandler {
|
||||||
}
|
}
|
||||||
|
|
||||||
async fn handle_create_key(&self, query: &KeyNewOpt) -> Result<AdminRpc, Error> {
|
async fn handle_create_key(&self, query: &KeyNewOpt) -> Result<AdminRpc, Error> {
|
||||||
let key = Key::new(query.name.clone());
|
let key = Key::new(&query.name);
|
||||||
self.garage.key_table.insert(&key).await?;
|
self.garage.key_table.insert(&key).await?;
|
||||||
self.key_info_result(key).await
|
self.key_info_result(key).await
|
||||||
}
|
}
|
||||||
|
@ -465,7 +471,10 @@ impl AdminRpcHandler {
|
||||||
.bucket_helper()
|
.bucket_helper()
|
||||||
.get_existing_matching_key(&query.key_pattern)
|
.get_existing_matching_key(&query.key_pattern)
|
||||||
.await?;
|
.await?;
|
||||||
key.name.update(query.new_name.clone());
|
key.params_mut()
|
||||||
|
.unwrap()
|
||||||
|
.name
|
||||||
|
.update(query.new_name.clone());
|
||||||
self.garage.key_table.insert(&key).await?;
|
self.garage.key_table.insert(&key).await?;
|
||||||
self.key_info_result(key).await
|
self.key_info_result(key).await
|
||||||
}
|
}
|
||||||
|
@ -500,7 +509,7 @@ impl AdminRpcHandler {
|
||||||
// 2. Remove permissions on all authorized buckets
|
// 2. Remove permissions on all authorized buckets
|
||||||
for (ab_id, _auth) in state.authorized_buckets.items().iter() {
|
for (ab_id, _auth) in state.authorized_buckets.items().iter() {
|
||||||
helper
|
helper
|
||||||
.set_bucket_key_permissions(*ab_id, &key.key_id, BucketKeyPerm::no_permissions())
|
.set_bucket_key_permissions(*ab_id, &key.key_id, BucketKeyPerm::NO_PERMISSIONS)
|
||||||
.await?;
|
.await?;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
|
@ -65,11 +65,11 @@ pub fn print_key_info(key: &Key, relevant_buckets: &HashMap<Uuid, Bucket>) {
|
||||||
"".to_string()
|
"".to_string()
|
||||||
};
|
};
|
||||||
|
|
||||||
println!("Key name: {}", key.name.get());
|
|
||||||
println!("Key ID: {}", key.key_id);
|
|
||||||
println!("Secret key: {}", key.secret_key);
|
|
||||||
match &key.state {
|
match &key.state {
|
||||||
Deletable::Present(p) => {
|
Deletable::Present(p) => {
|
||||||
|
println!("Key name: {}", p.name.get());
|
||||||
|
println!("Key ID: {}", key.key_id);
|
||||||
|
println!("Secret key: {}", p.secret_key);
|
||||||
println!("Can create buckets: {}", p.allow_create_bucket.get());
|
println!("Can create buckets: {}", p.allow_create_bucket.get());
|
||||||
println!("\nKey-specific bucket aliases:");
|
println!("\nKey-specific bucket aliases:");
|
||||||
let mut table = vec![];
|
let mut table = vec![];
|
||||||
|
@ -112,12 +112,19 @@ pub fn print_key_info(key: &Key, relevant_buckets: &HashMap<Uuid, Bucket>) {
|
||||||
format_table(table);
|
format_table(table);
|
||||||
}
|
}
|
||||||
Deletable::Deleted => {
|
Deletable::Deleted => {
|
||||||
println!("\nKey is deleted.");
|
println!("Key {} is deleted.", key.key_id);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
pub fn print_bucket_info(bucket: &Bucket, relevant_keys: &HashMap<String, Key>) {
|
pub fn print_bucket_info(bucket: &Bucket, relevant_keys: &HashMap<String, Key>) {
|
||||||
|
let key_name = |k| {
|
||||||
|
relevant_keys
|
||||||
|
.get(k)
|
||||||
|
.map(|k| k.params().unwrap().name.get().as_str())
|
||||||
|
.unwrap_or("<deleted>")
|
||||||
|
};
|
||||||
|
|
||||||
println!("Bucket: {}", hex::encode(bucket.id));
|
println!("Bucket: {}", hex::encode(bucket.id));
|
||||||
match &bucket.state {
|
match &bucket.state {
|
||||||
Deletable::Deleted => println!("Bucket is deleted."),
|
Deletable::Deleted => println!("Bucket is deleted."),
|
||||||
|
@ -135,11 +142,7 @@ pub fn print_bucket_info(bucket: &Bucket, relevant_keys: &HashMap<String, Key>)
|
||||||
let mut table = vec![];
|
let mut table = vec![];
|
||||||
for ((key_id, alias), _, active) in p.local_aliases.items().iter() {
|
for ((key_id, alias), _, active) in p.local_aliases.items().iter() {
|
||||||
if *active {
|
if *active {
|
||||||
let key_name = relevant_keys
|
table.push(format!("\t{} ({})\t{}", key_id, key_name(key_id), alias));
|
||||||
.get(key_id)
|
|
||||||
.map(|k| k.name.get().as_str())
|
|
||||||
.unwrap_or("");
|
|
||||||
table.push(format!("\t{} ({})\t{}", key_id, key_name, alias));
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
format_table(table);
|
format_table(table);
|
||||||
|
@ -150,13 +153,13 @@ pub fn print_bucket_info(bucket: &Bucket, relevant_keys: &HashMap<String, Key>)
|
||||||
let rflag = if perm.allow_read { "R" } else { " " };
|
let rflag = if perm.allow_read { "R" } else { " " };
|
||||||
let wflag = if perm.allow_write { "W" } else { " " };
|
let wflag = if perm.allow_write { "W" } else { " " };
|
||||||
let oflag = if perm.allow_owner { "O" } else { " " };
|
let oflag = if perm.allow_owner { "O" } else { " " };
|
||||||
let key_name = relevant_keys
|
|
||||||
.get(k)
|
|
||||||
.map(|k| k.name.get().as_str())
|
|
||||||
.unwrap_or("");
|
|
||||||
table.push(format!(
|
table.push(format!(
|
||||||
"\t{}{}{}\t{}\t{}",
|
"\t{}{}{}\t{}\t{}",
|
||||||
rflag, wflag, oflag, k, key_name
|
rflag,
|
||||||
|
wflag,
|
||||||
|
oflag,
|
||||||
|
k,
|
||||||
|
key_name(k)
|
||||||
));
|
));
|
||||||
}
|
}
|
||||||
format_table(table);
|
format_table(table);
|
||||||
|
|
|
@ -97,27 +97,32 @@ impl Bucket {
|
||||||
self.state.is_deleted()
|
self.state.is_deleted()
|
||||||
}
|
}
|
||||||
|
|
||||||
|
/// Returns an option representing the parameters (None if in deleted state)
|
||||||
|
pub fn params(&self) -> Option<&BucketParams> {
|
||||||
|
self.state.as_option()
|
||||||
|
}
|
||||||
|
|
||||||
|
/// Mutable version of `.params()`
|
||||||
|
pub fn params_mut(&mut self) -> Option<&mut BucketParams> {
|
||||||
|
self.state.as_option_mut()
|
||||||
|
}
|
||||||
|
|
||||||
/// Return the list of authorized keys, when each was updated, and the permission associated to
|
/// Return the list of authorized keys, when each was updated, and the permission associated to
|
||||||
/// the key
|
/// the key
|
||||||
pub fn authorized_keys(&self) -> &[(String, BucketKeyPerm)] {
|
pub fn authorized_keys(&self) -> &[(String, BucketKeyPerm)] {
|
||||||
match &self.state {
|
self.params()
|
||||||
crdt::Deletable::Deleted => &[],
|
.map(|s| s.authorized_keys.items())
|
||||||
crdt::Deletable::Present(state) => state.authorized_keys.items(),
|
.unwrap_or(&[])
|
||||||
}
|
|
||||||
}
|
}
|
||||||
|
|
||||||
pub fn aliases(&self) -> &[(String, u64, bool)] {
|
pub fn aliases(&self) -> &[(String, u64, bool)] {
|
||||||
match &self.state {
|
self.params().map(|s| s.aliases.items()).unwrap_or(&[])
|
||||||
crdt::Deletable::Deleted => &[],
|
|
||||||
crdt::Deletable::Present(state) => state.aliases.items(),
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
|
|
||||||
pub fn local_aliases(&self) -> &[((String, String), u64, bool)] {
|
pub fn local_aliases(&self) -> &[((String, String), u64, bool)] {
|
||||||
match &self.state {
|
self.params()
|
||||||
crdt::Deletable::Deleted => &[],
|
.map(|s| s.local_aliases.items())
|
||||||
crdt::Deletable::Present(state) => state.local_aliases.items(),
|
.unwrap_or(&[])
|
||||||
}
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
|
@ -14,29 +14,37 @@ pub struct Key {
|
||||||
/// The id of the key (immutable), used as partition key
|
/// The id of the key (immutable), used as partition key
|
||||||
pub key_id: String,
|
pub key_id: String,
|
||||||
|
|
||||||
/// The secret_key associated
|
/// Internal state of the key
|
||||||
pub secret_key: String,
|
|
||||||
|
|
||||||
/// Name for the key
|
|
||||||
pub name: crdt::Lww<String>,
|
|
||||||
|
|
||||||
/// If the key is present: it gives some permissions,
|
|
||||||
/// a map of bucket IDs (uuids) to permissions.
|
|
||||||
/// Otherwise no permissions are granted to key
|
|
||||||
pub state: crdt::Deletable<KeyParams>,
|
pub state: crdt::Deletable<KeyParams>,
|
||||||
}
|
}
|
||||||
|
|
||||||
/// Configuration for a key
|
/// Configuration for a key
|
||||||
#[derive(PartialEq, Clone, Debug, Serialize, Deserialize)]
|
#[derive(PartialEq, Clone, Debug, Serialize, Deserialize)]
|
||||||
pub struct KeyParams {
|
pub struct KeyParams {
|
||||||
|
/// The secret_key associated (immutable)
|
||||||
|
pub secret_key: String,
|
||||||
|
|
||||||
|
/// Name for the key
|
||||||
|
pub name: crdt::Lww<String>,
|
||||||
|
|
||||||
|
/// Flag to allow users having this key to create buckets
|
||||||
pub allow_create_bucket: crdt::Lww<bool>,
|
pub allow_create_bucket: crdt::Lww<bool>,
|
||||||
|
|
||||||
|
/// If the key is present: it gives some permissions,
|
||||||
|
/// a map of bucket IDs (uuids) to permissions.
|
||||||
|
/// Otherwise no permissions are granted to key
|
||||||
pub authorized_buckets: crdt::Map<Uuid, BucketKeyPerm>,
|
pub authorized_buckets: crdt::Map<Uuid, BucketKeyPerm>,
|
||||||
|
|
||||||
|
/// A key can have a local view of buckets names it is
|
||||||
|
/// the only one to see, this is the namespace for these aliases
|
||||||
pub local_aliases: crdt::LwwMap<String, Option<Uuid>>,
|
pub local_aliases: crdt::LwwMap<String, Option<Uuid>>,
|
||||||
}
|
}
|
||||||
|
|
||||||
impl KeyParams {
|
impl KeyParams {
|
||||||
pub fn new() -> Self {
|
fn new(secret_key: &str, name: &str) -> Self {
|
||||||
KeyParams {
|
KeyParams {
|
||||||
|
secret_key: secret_key.to_string(),
|
||||||
|
name: crdt::Lww::new(name.to_string()),
|
||||||
allow_create_bucket: crdt::Lww::new(false),
|
allow_create_bucket: crdt::Lww::new(false),
|
||||||
authorized_buckets: crdt::Map::new(),
|
authorized_buckets: crdt::Map::new(),
|
||||||
local_aliases: crdt::LwwMap::new(),
|
local_aliases: crdt::LwwMap::new(),
|
||||||
|
@ -44,14 +52,9 @@ impl KeyParams {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
impl Default for KeyParams {
|
|
||||||
fn default() -> Self {
|
|
||||||
Self::new()
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
impl Crdt for KeyParams {
|
impl Crdt for KeyParams {
|
||||||
fn merge(&mut self, o: &Self) {
|
fn merge(&mut self, o: &Self) {
|
||||||
|
self.name.merge(&o.name);
|
||||||
self.allow_create_bucket.merge(&o.allow_create_bucket);
|
self.allow_create_bucket.merge(&o.allow_create_bucket);
|
||||||
self.authorized_buckets.merge(&o.authorized_buckets);
|
self.authorized_buckets.merge(&o.authorized_buckets);
|
||||||
self.local_aliases.merge(&o.local_aliases);
|
self.local_aliases.merge(&o.local_aliases);
|
||||||
|
@ -60,14 +63,12 @@ impl Crdt for KeyParams {
|
||||||
|
|
||||||
impl Key {
|
impl Key {
|
||||||
/// Initialize a new Key, generating a random identifier and associated secret key
|
/// Initialize a new Key, generating a random identifier and associated secret key
|
||||||
pub fn new(name: String) -> Self {
|
pub fn new(name: &str) -> Self {
|
||||||
let key_id = format!("GK{}", hex::encode(&rand::random::<[u8; 12]>()[..]));
|
let key_id = format!("GK{}", hex::encode(&rand::random::<[u8; 12]>()[..]));
|
||||||
let secret_key = hex::encode(&rand::random::<[u8; 32]>()[..]);
|
let secret_key = hex::encode(&rand::random::<[u8; 32]>()[..]);
|
||||||
Self {
|
Self {
|
||||||
key_id,
|
key_id,
|
||||||
secret_key,
|
state: crdt::Deletable::present(KeyParams::new(&secret_key, name)),
|
||||||
name: crdt::Lww::new(name),
|
|
||||||
state: crdt::Deletable::present(KeyParams::new()),
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -75,9 +76,7 @@ impl Key {
|
||||||
pub fn import(key_id: &str, secret_key: &str, name: &str) -> Self {
|
pub fn import(key_id: &str, secret_key: &str, name: &str) -> Self {
|
||||||
Self {
|
Self {
|
||||||
key_id: key_id.to_string(),
|
key_id: key_id.to_string(),
|
||||||
secret_key: secret_key.to_string(),
|
state: crdt::Deletable::present(KeyParams::new(secret_key, name)),
|
||||||
name: crdt::Lww::new(name.to_string()),
|
|
||||||
state: crdt::Deletable::present(KeyParams::new()),
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -85,49 +84,47 @@ impl Key {
|
||||||
pub fn delete(key_id: String) -> Self {
|
pub fn delete(key_id: String) -> Self {
|
||||||
Self {
|
Self {
|
||||||
key_id,
|
key_id,
|
||||||
secret_key: "".into(),
|
|
||||||
name: crdt::Lww::new("".to_string()),
|
|
||||||
state: crdt::Deletable::Deleted,
|
state: crdt::Deletable::Deleted,
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
/// Returns true if this represents a deleted bucket
|
||||||
|
pub fn is_deleted(&self) -> bool {
|
||||||
|
self.state.is_deleted()
|
||||||
|
}
|
||||||
|
|
||||||
|
/// Returns an option representing the params (None if in deleted state)
|
||||||
|
pub fn params(&self) -> Option<&KeyParams> {
|
||||||
|
self.state.as_option()
|
||||||
|
}
|
||||||
|
|
||||||
|
/// Mutable version of `.state()`
|
||||||
|
pub fn params_mut(&mut self) -> Option<&mut KeyParams> {
|
||||||
|
self.state.as_option_mut()
|
||||||
|
}
|
||||||
|
|
||||||
|
/// Get permissions for a bucket
|
||||||
|
pub fn bucket_permissions(&self, bucket: &Uuid) -> BucketKeyPerm {
|
||||||
|
self.params()
|
||||||
|
.map(|params| params.authorized_buckets.get(bucket))
|
||||||
|
.flatten()
|
||||||
|
.cloned()
|
||||||
|
.unwrap_or(BucketKeyPerm::NO_PERMISSIONS)
|
||||||
|
}
|
||||||
|
|
||||||
/// Check if `Key` is allowed to read in bucket
|
/// Check if `Key` is allowed to read in bucket
|
||||||
pub fn allow_read(&self, bucket: &Uuid) -> bool {
|
pub fn allow_read(&self, bucket: &Uuid) -> bool {
|
||||||
if let crdt::Deletable::Present(params) = &self.state {
|
self.bucket_permissions(bucket).allow_read
|
||||||
params
|
|
||||||
.authorized_buckets
|
|
||||||
.get(bucket)
|
|
||||||
.map(|x| x.allow_read)
|
|
||||||
.unwrap_or(false)
|
|
||||||
} else {
|
|
||||||
false
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
|
|
||||||
/// Check if `Key` is allowed to write in bucket
|
/// Check if `Key` is allowed to write in bucket
|
||||||
pub fn allow_write(&self, bucket: &Uuid) -> bool {
|
pub fn allow_write(&self, bucket: &Uuid) -> bool {
|
||||||
if let crdt::Deletable::Present(params) = &self.state {
|
self.bucket_permissions(bucket).allow_write
|
||||||
params
|
|
||||||
.authorized_buckets
|
|
||||||
.get(bucket)
|
|
||||||
.map(|x| x.allow_write)
|
|
||||||
.unwrap_or(false)
|
|
||||||
} else {
|
|
||||||
false
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
|
|
||||||
/// Check if `Key` is owner of bucket
|
/// Check if `Key` is owner of bucket
|
||||||
pub fn allow_owner(&self, bucket: &Uuid) -> bool {
|
pub fn allow_owner(&self, bucket: &Uuid) -> bool {
|
||||||
if let crdt::Deletable::Present(params) = &self.state {
|
self.bucket_permissions(bucket).allow_owner
|
||||||
params
|
|
||||||
.authorized_buckets
|
|
||||||
.get(bucket)
|
|
||||||
.map(|x| x.allow_owner)
|
|
||||||
.unwrap_or(false)
|
|
||||||
} else {
|
|
||||||
false
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -142,7 +139,6 @@ impl Entry<EmptyKey, String> for Key {
|
||||||
|
|
||||||
impl Crdt for Key {
|
impl Crdt for Key {
|
||||||
fn merge(&mut self, other: &Self) {
|
fn merge(&mut self, other: &Self) {
|
||||||
self.name.merge(&other.name);
|
|
||||||
self.state.merge(&other.state);
|
self.state.merge(&other.state);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
@ -168,15 +164,20 @@ impl TableSchema for KeyTable {
|
||||||
KeyFilter::Deleted(df) => df.apply(entry.state.is_deleted()),
|
KeyFilter::Deleted(df) => df.apply(entry.state.is_deleted()),
|
||||||
KeyFilter::MatchesAndNotDeleted(pat) => {
|
KeyFilter::MatchesAndNotDeleted(pat) => {
|
||||||
let pat = pat.to_lowercase();
|
let pat = pat.to_lowercase();
|
||||||
!entry.state.is_deleted()
|
entry
|
||||||
&& (entry.key_id.to_lowercase().starts_with(&pat)
|
.params()
|
||||||
|| entry.name.get().to_lowercase() == pat)
|
.map(|p| {
|
||||||
|
entry.key_id.to_lowercase().starts_with(&pat)
|
||||||
|
|| p.name.get().to_lowercase() == pat
|
||||||
|
})
|
||||||
|
.unwrap_or(false)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
fn try_migrate(bytes: &[u8]) -> Option<Self::E> {
|
fn try_migrate(bytes: &[u8]) -> Option<Self::E> {
|
||||||
let old_k = rmp_serde::decode::from_read_ref::<_, old::Key>(bytes).ok()?;
|
let old_k = rmp_serde::decode::from_read_ref::<_, old::Key>(bytes).ok()?;
|
||||||
|
let name = crdt::Lww::raw(old_k.name.timestamp(), old_k.name.get().clone());
|
||||||
|
|
||||||
let state = if old_k.deleted.get() {
|
let state = if old_k.deleted.get() {
|
||||||
crdt::Deletable::Deleted
|
crdt::Deletable::Deleted
|
||||||
|
@ -185,16 +186,15 @@ impl TableSchema for KeyTable {
|
||||||
// migration is performed in specific migration code in
|
// migration is performed in specific migration code in
|
||||||
// garage/migrate.rs
|
// garage/migrate.rs
|
||||||
crdt::Deletable::Present(KeyParams {
|
crdt::Deletable::Present(KeyParams {
|
||||||
|
secret_key: old_k.secret_key,
|
||||||
|
name,
|
||||||
allow_create_bucket: crdt::Lww::new(false),
|
allow_create_bucket: crdt::Lww::new(false),
|
||||||
authorized_buckets: crdt::Map::new(),
|
authorized_buckets: crdt::Map::new(),
|
||||||
local_aliases: crdt::LwwMap::new(),
|
local_aliases: crdt::LwwMap::new(),
|
||||||
})
|
})
|
||||||
};
|
};
|
||||||
let name = crdt::Lww::raw(old_k.name.timestamp(), old_k.name.get().clone());
|
|
||||||
Some(Key {
|
Some(Key {
|
||||||
key_id: old_k.key_id,
|
key_id: old_k.key_id,
|
||||||
secret_key: old_k.secret_key,
|
|
||||||
name,
|
|
||||||
state,
|
state,
|
||||||
})
|
})
|
||||||
}
|
}
|
||||||
|
|
|
@ -21,14 +21,12 @@ pub struct BucketKeyPerm {
|
||||||
}
|
}
|
||||||
|
|
||||||
impl BucketKeyPerm {
|
impl BucketKeyPerm {
|
||||||
pub fn no_permissions() -> Self {
|
pub const NO_PERMISSIONS: Self = Self {
|
||||||
Self {
|
|
||||||
timestamp: 0,
|
timestamp: 0,
|
||||||
allow_read: false,
|
allow_read: false,
|
||||||
allow_write: false,
|
allow_write: false,
|
||||||
allow_owner: false,
|
allow_owner: false,
|
||||||
}
|
};
|
||||||
}
|
|
||||||
}
|
}
|
||||||
|
|
||||||
impl Crdt for BucketKeyPerm {
|
impl Crdt for BucketKeyPerm {
|
||||||
|
|
Loading…
Reference in a new issue