2022-05-10 11:16:57 +00:00
use garage_table ::util ::* ;
2022-01-03 16:22:40 +00:00
use garage_util ::crdt ::* ;
2022-01-03 12:58:05 +00:00
use garage_util ::data ::* ;
2022-01-03 16:22:40 +00:00
use garage_util ::error ::{ Error as GarageError , OkOrMessage } ;
use garage_util ::time ::* ;
2021-12-14 12:55:11 +00:00
2022-01-03 16:22:40 +00:00
use crate ::bucket_alias_table ::* ;
use crate ::bucket_table ::* ;
2021-12-14 12:55:11 +00:00
use crate ::garage ::Garage ;
2022-01-03 12:58:05 +00:00
use crate ::helper ::error ::* ;
2022-01-03 16:22:40 +00:00
use crate ::key_table ::{ Key , KeyFilter } ;
use crate ::permission ::BucketKeyPerm ;
2021-12-14 12:55:11 +00:00
pub struct BucketHelper < ' a > ( pub ( crate ) & ' a Garage ) ;
2022-01-03 16:22:40 +00:00
#[ allow(clippy::ptr_arg) ]
2021-12-14 12:55:11 +00:00
impl < ' a > BucketHelper < ' a > {
pub async fn resolve_global_bucket_name (
& self ,
bucket_name : & String ,
) -> Result < Option < Uuid > , Error > {
2021-12-17 10:53:13 +00:00
// Bucket names in Garage are aliases, true bucket identifiers
// are 32-byte UUIDs. This function resolves bucket names into
// their full identifier by looking up in the bucket_alias_table.
// This function also allows buckets to be identified by their
// full UUID (hex-encoded). Here, if the name to be resolved is a
// hex string of the correct length, it is directly parsed as a bucket
// identifier which is returned. There is no risk of this conflicting
// with an actual bucket name: bucket names are max 63 chars long by
// the AWS spec, and hex-encoded UUIDs are 64 chars long.
2021-12-15 17:36:15 +00:00
let hexbucket = hex ::decode ( bucket_name . as_str ( ) )
. ok ( )
2022-03-14 11:00:23 +00:00
. and_then ( | by | Uuid ::try_from ( & by ) ) ;
2021-12-15 17:36:15 +00:00
if let Some ( bucket_id ) = hexbucket {
Ok ( self
. 0
. bucket_table
2022-01-03 18:06:04 +00:00
. get ( & EmptyKey , & bucket_id )
2021-12-15 17:36:15 +00:00
. await ?
. filter ( | x | ! x . state . is_deleted ( ) )
. map ( | _ | bucket_id ) )
} else {
Ok ( self
. 0
. bucket_alias_table
. get ( & EmptyKey , bucket_name )
. await ?
2022-03-14 11:00:23 +00:00
. and_then ( | x | * x . state . get ( ) ) )
2021-12-15 17:36:15 +00:00
}
2021-12-14 12:55:11 +00:00
}
2022-01-03 16:22:40 +00:00
/// Returns a Bucket if it is present in bucket table,
/// even if it is in deleted state. Querying a non-existing
/// bucket ID returns an internal error.
pub async fn get_internal_bucket ( & self , bucket_id : Uuid ) -> Result < Bucket , Error > {
Ok ( self
. 0
. bucket_table
2022-01-03 18:06:04 +00:00
. get ( & EmptyKey , & bucket_id )
2022-01-03 16:22:40 +00:00
. await ?
. ok_or_message ( format! ( " Bucket {:?} does not exist " , bucket_id ) ) ? )
}
/// Returns a Bucket if it is present in bucket table,
/// only if it is in non-deleted state.
/// Querying a non-existing bucket ID or a deleted bucket
/// returns a bad request error.
2021-12-14 12:55:11 +00:00
pub async fn get_existing_bucket ( & self , bucket_id : Uuid ) -> Result < Bucket , Error > {
self . 0
. bucket_table
2022-01-03 18:06:04 +00:00
. get ( & EmptyKey , & bucket_id )
2021-12-14 12:55:11 +00:00
. await ?
. filter ( | b | ! b . is_deleted ( ) )
2022-01-03 16:22:40 +00:00
. ok_or_bad_request ( format! (
" Bucket {:?} does not exist or has been deleted " ,
bucket_id
) )
}
/// Returns a Key if it is present in key table,
/// even if it is in deleted state. Querying a non-existing
/// key ID returns an internal error.
pub async fn get_internal_key ( & self , key_id : & String ) -> Result < Key , Error > {
Ok ( self
. 0
. key_table
. get ( & EmptyKey , key_id )
. await ?
. ok_or_message ( format! ( " Key {} does not exist " , key_id ) ) ? )
}
/// Returns a Key if it is present in key table,
/// only if it is in non-deleted state.
/// Querying a non-existing key ID or a deleted key
/// returns a bad request error.
pub async fn get_existing_key ( & self , key_id : & String ) -> Result < Key , Error > {
self . 0
. key_table
. get ( & EmptyKey , key_id )
. await ?
. filter ( | b | ! b . state . is_deleted ( ) )
. ok_or_bad_request ( format! ( " Key {} does not exist or has been deleted " , key_id ) )
}
/// Returns a Key if it is present in key table,
/// looking it up by key ID or by a match on its name,
/// only if it is in non-deleted state.
/// Querying a non-existing key ID or a deleted key
/// returns a bad request error.
pub async fn get_existing_matching_key ( & self , pattern : & str ) -> Result < Key , Error > {
let candidates = self
. 0
. key_table
. get_range (
& EmptyKey ,
None ,
2022-01-03 17:03:12 +00:00
Some ( KeyFilter ::MatchesAndNotDeleted ( pattern . to_string ( ) ) ) ,
2022-01-03 16:22:40 +00:00
10 ,
2022-05-10 11:16:57 +00:00
EnumerationOrder ::Forward ,
2022-01-03 16:22:40 +00:00
)
. await ?
. into_iter ( )
. collect ::< Vec < _ > > ( ) ;
if candidates . len ( ) ! = 1 {
Err ( Error ::BadRequest ( format! (
" {} matching keys " ,
candidates . len ( )
) ) )
} else {
Ok ( candidates . into_iter ( ) . next ( ) . unwrap ( ) )
}
}
/// Sets a new alias for a bucket in global namespace.
/// This function fails if:
/// - alias name is not valid according to S3 spec
/// - bucket does not exist or is deleted
/// - alias already exists and points to another bucket
pub async fn set_global_bucket_alias (
& self ,
bucket_id : Uuid ,
alias_name : & String ,
) -> Result < ( ) , Error > {
if ! is_valid_bucket_name ( alias_name ) {
return Err ( Error ::BadRequest ( format! (
" {}: {} " ,
alias_name , INVALID_BUCKET_NAME_MESSAGE
) ) ) ;
}
let mut bucket = self . get_existing_bucket ( bucket_id ) . await ? ;
let alias = self . 0. bucket_alias_table . get ( & EmptyKey , alias_name ) . await ? ;
if let Some ( existing_alias ) = alias . as_ref ( ) {
2022-01-03 17:32:15 +00:00
if let Some ( p_bucket ) = existing_alias . state . get ( ) {
if * p_bucket ! = bucket_id {
2022-01-03 16:22:40 +00:00
return Err ( Error ::BadRequest ( format! (
" Alias {} already exists and points to different bucket: {:?} " ,
2022-01-03 17:32:15 +00:00
alias_name , p_bucket
2022-01-03 16:22:40 +00:00
) ) ) ;
}
}
}
// Checks ok, add alias
let mut bucket_p = bucket . state . as_option_mut ( ) . unwrap ( ) ;
let alias_ts = increment_logical_clock_2 (
bucket_p . aliases . get_timestamp ( alias_name ) ,
alias . as_ref ( ) . map ( | a | a . state . timestamp ( ) ) . unwrap_or ( 0 ) ,
) ;
// ---- timestamp-ensured causality barrier ----
// writes are now done and all writes use timestamp alias_ts
let alias = match alias {
2022-01-03 17:32:15 +00:00
None = > BucketAlias ::new ( alias_name . clone ( ) , alias_ts , Some ( bucket_id ) )
2022-01-03 16:22:40 +00:00
. ok_or_bad_request ( format! ( " {} : {} " , alias_name , INVALID_BUCKET_NAME_MESSAGE ) ) ? ,
Some ( mut a ) = > {
2022-01-03 17:32:15 +00:00
a . state = Lww ::raw ( alias_ts , Some ( bucket_id ) ) ;
2022-01-03 16:22:40 +00:00
a
}
} ;
self . 0. bucket_alias_table . insert ( & alias ) . await ? ;
bucket_p . aliases = LwwMap ::raw_item ( alias_name . clone ( ) , alias_ts , true ) ;
self . 0. bucket_table . insert ( & bucket ) . await ? ;
Ok ( ( ) )
}
/// Unsets an alias for a bucket in global namespace.
/// This function fails if:
/// - bucket does not exist or is deleted
/// - alias does not exist or maps to another bucket (-> internal error)
/// - bucket has no other aliases (global or local)
pub async fn unset_global_bucket_alias (
& self ,
bucket_id : Uuid ,
alias_name : & String ,
) -> Result < ( ) , Error > {
let mut bucket = self . get_existing_bucket ( bucket_id ) . await ? ;
let mut bucket_state = bucket . state . as_option_mut ( ) . unwrap ( ) ;
let mut alias = self
. 0
. bucket_alias_table
. get ( & EmptyKey , alias_name )
. await ?
2022-01-03 17:32:15 +00:00
. filter ( | a | a . state . get ( ) . map ( | x | x = = bucket_id ) . unwrap_or ( false ) )
2022-01-03 16:22:40 +00:00
. ok_or_message ( format! (
" Internal error: alias not found or does not point to bucket {:?} " ,
bucket_id
) ) ? ;
let has_other_global_aliases = bucket_state
. aliases
. items ( )
. iter ( )
. any ( | ( name , _ , active ) | name ! = alias_name & & * active ) ;
let has_other_local_aliases = bucket_state
. local_aliases
. items ( )
. iter ( )
. any ( | ( _ , _ , active ) | * active ) ;
if ! has_other_global_aliases & & ! has_other_local_aliases {
return Err ( Error ::BadRequest ( format! ( " Bucket {} doesn't have other aliases, please delete it instead of just unaliasing. " , alias_name ) ) ) ;
}
// Checks ok, remove alias
let alias_ts = increment_logical_clock_2 (
alias . state . timestamp ( ) ,
bucket_state . aliases . get_timestamp ( alias_name ) ,
) ;
// ---- timestamp-ensured causality barrier ----
// writes are now done and all writes use timestamp alias_ts
2022-01-03 17:32:15 +00:00
alias . state = Lww ::raw ( alias_ts , None ) ;
2022-01-03 16:22:40 +00:00
self . 0. bucket_alias_table . insert ( & alias ) . await ? ;
bucket_state . aliases = LwwMap ::raw_item ( alias_name . clone ( ) , alias_ts , false ) ;
self . 0. bucket_table . insert ( & bucket ) . await ? ;
Ok ( ( ) )
}
2022-01-03 17:32:15 +00:00
/// Ensures a bucket does not have a certain global alias.
/// Contrarily to unset_global_bucket_alias, this does not
/// fail on any condition other than:
/// - bucket cannot be found (its fine if it is in deleted state)
/// - alias cannot be found (its fine if it points to nothing or
/// to another bucket)
pub async fn purge_global_bucket_alias (
& self ,
bucket_id : Uuid ,
alias_name : & String ,
) -> Result < ( ) , Error > {
let mut bucket = self . get_internal_bucket ( bucket_id ) . await ? ;
let mut alias = self
. 0
. bucket_alias_table
. get ( & EmptyKey , alias_name )
. await ?
. ok_or_message ( format! ( " Alias {} not found " , alias_name ) ) ? ;
// Checks ok, remove alias
let alias_ts = match bucket . state . as_option ( ) {
Some ( bucket_state ) = > increment_logical_clock_2 (
alias . state . timestamp ( ) ,
bucket_state . aliases . get_timestamp ( alias_name ) ,
) ,
None = > increment_logical_clock ( alias . state . timestamp ( ) ) ,
} ;
// ---- timestamp-ensured causality barrier ----
// writes are now done and all writes use timestamp alias_ts
if alias . state . get ( ) = = & Some ( bucket_id ) {
alias . state = Lww ::raw ( alias_ts , None ) ;
self . 0. bucket_alias_table . insert ( & alias ) . await ? ;
}
if let Some ( mut bucket_state ) = bucket . state . as_option_mut ( ) {
bucket_state . aliases = LwwMap ::raw_item ( alias_name . clone ( ) , alias_ts , false ) ;
self . 0. bucket_table . insert ( & bucket ) . await ? ;
}
Ok ( ( ) )
}
2022-01-03 16:22:40 +00:00
/// Sets a new alias for a bucket in the local namespace of a key.
/// This function fails if:
/// - alias name is not valid according to S3 spec
/// - bucket does not exist or is deleted
/// - key does not exist or is deleted
/// - alias already exists and points to another bucket
pub async fn set_local_bucket_alias (
& self ,
bucket_id : Uuid ,
key_id : & String ,
alias_name : & String ,
) -> Result < ( ) , Error > {
if ! is_valid_bucket_name ( alias_name ) {
return Err ( Error ::BadRequest ( format! (
" {}: {} " ,
alias_name , INVALID_BUCKET_NAME_MESSAGE
) ) ) ;
}
let mut bucket = self . get_existing_bucket ( bucket_id ) . await ? ;
let mut key = self . get_existing_key ( key_id ) . await ? ;
let mut key_param = key . state . as_option_mut ( ) . unwrap ( ) ;
2022-01-03 17:32:15 +00:00
if let Some ( Some ( existing_alias ) ) = key_param . local_aliases . get ( alias_name ) {
2022-01-03 16:22:40 +00:00
if * existing_alias ! = bucket_id {
return Err ( Error ::BadRequest ( format! ( " Alias {} already exists in namespace of key {} and points to different bucket: {:?} " , alias_name , key . key_id , existing_alias ) ) ) ;
}
}
// Checks ok, add alias
let mut bucket_p = bucket . state . as_option_mut ( ) . unwrap ( ) ;
let bucket_p_local_alias_key = ( key . key_id . clone ( ) , alias_name . clone ( ) ) ;
// Calculate the timestamp to assign to this aliasing in the two local_aliases maps
// (the one from key to bucket, and the reverse one stored in the bucket iself)
// so that merges on both maps in case of a concurrent operation resolve
// to the same alias being set
let alias_ts = increment_logical_clock_2 (
key_param . local_aliases . get_timestamp ( alias_name ) ,
bucket_p
. local_aliases
. get_timestamp ( & bucket_p_local_alias_key ) ,
) ;
// ---- timestamp-ensured causality barrier ----
// writes are now done and all writes use timestamp alias_ts
2022-01-03 17:32:15 +00:00
key_param . local_aliases = LwwMap ::raw_item ( alias_name . clone ( ) , alias_ts , Some ( bucket_id ) ) ;
2022-01-03 16:22:40 +00:00
self . 0. key_table . insert ( & key ) . await ? ;
bucket_p . local_aliases = LwwMap ::raw_item ( bucket_p_local_alias_key , alias_ts , true ) ;
self . 0. bucket_table . insert ( & bucket ) . await ? ;
Ok ( ( ) )
}
/// Unsets an alias for a bucket in the local namespace of a key.
/// This function fails if:
/// - bucket does not exist or is deleted
/// - key does not exist or is deleted
/// - alias does not exist or maps to another bucket (-> internal error)
/// - bucket has no other aliases (global or local)
pub async fn unset_local_bucket_alias (
& self ,
bucket_id : Uuid ,
key_id : & String ,
alias_name : & String ,
) -> Result < ( ) , Error > {
let mut bucket = self . get_existing_bucket ( bucket_id ) . await ? ;
let mut key = self . get_existing_key ( key_id ) . await ? ;
let mut bucket_p = bucket . state . as_option_mut ( ) . unwrap ( ) ;
if key
. state
. as_option ( )
. unwrap ( )
. local_aliases
. get ( alias_name )
2022-01-03 17:32:15 +00:00
. cloned ( )
. flatten ( ) ! = Some ( bucket_id )
2022-01-03 16:22:40 +00:00
{
return Err ( GarageError ::Message ( format! (
" Bucket {:?} does not have alias {} in namespace of key {} " ,
bucket_id , alias_name , key_id
) )
. into ( ) ) ;
}
let has_other_global_aliases = bucket_p
. aliases
. items ( )
. iter ( )
. any ( | ( _ , _ , active ) | * active ) ;
let has_other_local_aliases = bucket_p
. local_aliases
. items ( )
. iter ( )
. any ( | ( ( k , n ) , _ , active ) | * k = = key . key_id & & n = = alias_name & & * active ) ;
if ! has_other_global_aliases & & ! has_other_local_aliases {
return Err ( Error ::BadRequest ( format! ( " Bucket {} doesn't have other aliases, please delete it instead of just unaliasing. " , alias_name ) ) ) ;
}
// Checks ok, remove alias
let mut key_param = key . state . as_option_mut ( ) . unwrap ( ) ;
let bucket_p_local_alias_key = ( key . key_id . clone ( ) , alias_name . clone ( ) ) ;
let alias_ts = increment_logical_clock_2 (
key_param . local_aliases . get_timestamp ( alias_name ) ,
bucket_p
. local_aliases
. get_timestamp ( & bucket_p_local_alias_key ) ,
) ;
// ---- timestamp-ensured causality barrier ----
// writes are now done and all writes use timestamp alias_ts
2022-01-03 17:32:15 +00:00
key_param . local_aliases = LwwMap ::raw_item ( alias_name . clone ( ) , alias_ts , None ) ;
2022-01-03 16:22:40 +00:00
self . 0. key_table . insert ( & key ) . await ? ;
bucket_p . local_aliases = LwwMap ::raw_item ( bucket_p_local_alias_key , alias_ts , false ) ;
self . 0. bucket_table . insert ( & bucket ) . await ? ;
Ok ( ( ) )
}
/// Sets permissions for a key on a bucket.
/// This function fails if:
/// - bucket or key cannot be found at all (its ok if they are in deleted state)
/// - bucket or key is in deleted state and we are trying to set permissions other than "deny
/// all"
pub async fn set_bucket_key_permissions (
& self ,
bucket_id : Uuid ,
key_id : & String ,
mut perm : BucketKeyPerm ,
) -> Result < ( ) , Error > {
let mut bucket = self . get_internal_bucket ( bucket_id ) . await ? ;
let mut key = self . get_internal_key ( key_id ) . await ? ;
if let Some ( bstate ) = bucket . state . as_option ( ) {
if let Some ( kp ) = bstate . authorized_keys . get ( key_id ) {
perm . timestamp = increment_logical_clock_2 ( perm . timestamp , kp . timestamp ) ;
}
2022-01-05 14:56:48 +00:00
} else if perm . is_any ( ) {
2022-01-03 16:22:40 +00:00
return Err ( Error ::BadRequest (
" Trying to give permissions on a deleted bucket " . into ( ) ,
) ) ;
}
if let Some ( kstate ) = key . state . as_option ( ) {
if let Some ( bp ) = kstate . authorized_buckets . get ( & bucket_id ) {
perm . timestamp = increment_logical_clock_2 ( perm . timestamp , bp . timestamp ) ;
}
2022-01-05 14:56:48 +00:00
} else if perm . is_any ( ) {
2022-01-03 16:22:40 +00:00
return Err ( Error ::BadRequest (
" Trying to give permissions to a deleted key " . into ( ) ,
) ) ;
}
// ---- timestamp-ensured causality barrier ----
if let Some ( bstate ) = bucket . state . as_option_mut ( ) {
bstate . authorized_keys = Map ::put_mutator ( key_id . clone ( ) , perm ) ;
self . 0. bucket_table . insert ( & bucket ) . await ? ;
}
if let Some ( kstate ) = key . state . as_option_mut ( ) {
kstate . authorized_buckets = Map ::put_mutator ( bucket_id , perm ) ;
self . 0. key_table . insert ( & key ) . await ? ;
}
Ok ( ( ) )
2021-12-14 12:55:11 +00:00
}
}