use garage_table::util::*; use garage_util::crdt::*; use garage_util::error::OkOrMessage; use crate::garage::Garage; use crate::helper::bucket::BucketHelper; use crate::helper::error::*; use crate::key_table::{Key, KeyFilter}; use crate::permission::BucketKeyPerm; pub struct KeyHelper<'a>(pub(crate) &'a Garage); #[allow(clippy::ptr_arg)] impl<'a> KeyHelper<'a> { /// Returns a Key if it is present in key table, /// even if it is in deleted state. Querying a non-existing /// key ID returns an internal error. pub async fn get_internal_key(&self, key_id: &String) -> Result { Ok(self .0 .key_table .get(&EmptyKey, key_id) .await? .ok_or_message(format!("Key {} does not exist", key_id))?) } /// Returns a Key if it is present in key table, /// only if it is in non-deleted state. /// Querying a non-existing key ID or a deleted key /// returns a bad request error. pub async fn get_existing_key(&self, key_id: &String) -> Result { self.0 .key_table .get(&EmptyKey, key_id) .await? .filter(|b| !b.state.is_deleted()) .ok_or_else(|| Error::NoSuchAccessKey(key_id.to_string())) } /// Returns a Key if it is present in key table, /// looking it up by key ID or by a match on its name, /// only if it is in non-deleted state. /// Querying a non-existing key ID or a deleted key /// returns a bad request error. pub async fn get_existing_matching_key(&self, pattern: &str) -> Result { let candidates = self .0 .key_table .get_range( &EmptyKey, None, Some(KeyFilter::MatchesAndNotDeleted(pattern.to_string())), 10, EnumerationOrder::Forward, ) .await? .into_iter() .collect::>(); if candidates.len() != 1 { Err(Error::BadRequest(format!( "{} matching keys", candidates.len() ))) } else { Ok(candidates.into_iter().next().unwrap()) } } /// Deletes an API access key pub async fn delete_key(&self, key: &mut Key) -> Result<(), Error> { let bucket_helper = BucketHelper(self.0); let state = key.state.as_option_mut().unwrap(); // --- done checking, now commit --- // (the step at unset_local_bucket_alias will fail if a bucket // does not have another alias, the deletion will be // interrupted in the middle if that happens) // 1. Delete local aliases for (alias, _, to) in state.local_aliases.items().iter() { if let Some(bucket_id) = to { bucket_helper .unset_local_bucket_alias(*bucket_id, &key.key_id, alias) .await?; } } // 2. Remove permissions on all authorized buckets for (ab_id, _auth) in state.authorized_buckets.items().iter() { bucket_helper .set_bucket_key_permissions(*ab_id, &key.key_id, BucketKeyPerm::NO_PERMISSIONS) .await?; } // 3. Actually delete key key.state = Deletable::delete(); self.0.key_table.insert(key).await?; Ok(()) } }