You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
205 lines
5.9 KiB
205 lines
5.9 KiB
package shell
|
|
|
|
import (
|
|
"bytes"
|
|
"context"
|
|
"flag"
|
|
"fmt"
|
|
"io"
|
|
"sort"
|
|
"strings"
|
|
|
|
"github.com/seaweedfs/seaweedfs/weed/filer"
|
|
"github.com/seaweedfs/seaweedfs/weed/pb"
|
|
"github.com/seaweedfs/seaweedfs/weed/pb/iam_pb"
|
|
"google.golang.org/grpc"
|
|
"google.golang.org/grpc/codes"
|
|
"google.golang.org/grpc/status"
|
|
)
|
|
|
|
// canonicalActions maps lowercased action names to their canonical form.
|
|
var canonicalActions = map[string]string{
|
|
"read": "Read",
|
|
"write": "Write",
|
|
"list": "List",
|
|
"tagging": "Tagging",
|
|
"admin": "Admin",
|
|
}
|
|
|
|
func init() {
|
|
Commands = append(Commands, &commandS3BucketAccess{})
|
|
}
|
|
|
|
type commandS3BucketAccess struct {
|
|
}
|
|
|
|
func (c *commandS3BucketAccess) Name() string {
|
|
return "s3.bucket.access"
|
|
}
|
|
|
|
func (c *commandS3BucketAccess) Help() string {
|
|
return `view or set per-bucket access for a user
|
|
|
|
Example:
|
|
# View current access for a user on a bucket
|
|
s3.bucket.access -name <bucket_name> -user <username>
|
|
|
|
# Grant anonymous read and list access
|
|
s3.bucket.access -name <bucket_name> -user anonymous -access Read,List
|
|
|
|
# Grant full anonymous access
|
|
s3.bucket.access -name <bucket_name> -user anonymous -access Read,Write,List
|
|
|
|
# Remove all access for a user on a bucket
|
|
s3.bucket.access -name <bucket_name> -user <username> -access none
|
|
|
|
Supported action names (comma-separated):
|
|
Read, Write, List, Tagging, Admin
|
|
|
|
The user is auto-created if it does not exist. Actions are scoped to
|
|
the specified bucket (stored as "Action:bucket" in the identity).
|
|
`
|
|
}
|
|
|
|
func (c *commandS3BucketAccess) HasTag(CommandTag) bool {
|
|
return false
|
|
}
|
|
|
|
func (c *commandS3BucketAccess) Do(args []string, commandEnv *CommandEnv, writer io.Writer) (err error) {
|
|
|
|
bucketCommand := flag.NewFlagSet(c.Name(), flag.ContinueOnError)
|
|
bucketName := bucketCommand.String("name", "", "bucket name")
|
|
userName := bucketCommand.String("user", "", "user name")
|
|
access := bucketCommand.String("access", "", "comma-separated actions: Read,Write,List,Tagging,Admin or none")
|
|
if err = bucketCommand.Parse(args); err != nil {
|
|
return err
|
|
}
|
|
|
|
if *bucketName == "" {
|
|
return fmt.Errorf("empty bucket name")
|
|
}
|
|
if *userName == "" {
|
|
return fmt.Errorf("empty user name")
|
|
}
|
|
|
|
accessStr := strings.TrimSpace(*access)
|
|
|
|
// Validate and normalize actions to canonical casing
|
|
if accessStr != "" && strings.ToLower(accessStr) != "none" {
|
|
var normalized []string
|
|
for _, a := range strings.Split(accessStr, ",") {
|
|
a = strings.TrimSpace(a)
|
|
canonical, ok := canonicalActions[strings.ToLower(a)]
|
|
if !ok {
|
|
return fmt.Errorf("invalid action %q: must be Read, Write, List, Tagging, Admin, or none", a)
|
|
}
|
|
normalized = append(normalized, canonical)
|
|
}
|
|
accessStr = strings.Join(normalized, ",")
|
|
}
|
|
|
|
err = pb.WithGrpcClient(false, 0, func(conn *grpc.ClientConn) error {
|
|
client := iam_pb.NewSeaweedIdentityAccessManagementClient(conn)
|
|
|
|
// Get or create user
|
|
identity, isNewUser, getErr := getOrCreateIdentity(client, *userName)
|
|
if getErr != nil {
|
|
return getErr
|
|
}
|
|
|
|
// View mode: show current bucket-scoped actions
|
|
if accessStr == "" {
|
|
return displayBucketAccess(writer, *bucketName, *userName, identity)
|
|
}
|
|
|
|
// Set mode: update actions
|
|
updateBucketActions(identity, *bucketName, accessStr)
|
|
|
|
// Show the resulting identity
|
|
var buf bytes.Buffer
|
|
filer.ProtoToText(&buf, identity)
|
|
fmt.Fprint(writer, buf.String())
|
|
fmt.Fprintln(writer)
|
|
|
|
// Save
|
|
if isNewUser {
|
|
if _, err := client.CreateUser(context.Background(), &iam_pb.CreateUserRequest{Identity: identity}); err != nil {
|
|
return fmt.Errorf("failed to create user %s: %w", *userName, err)
|
|
}
|
|
fmt.Fprintf(writer, "Created user %q and set access on bucket %s.\n", *userName, *bucketName)
|
|
} else {
|
|
if _, err := client.UpdateUser(context.Background(), &iam_pb.UpdateUserRequest{Username: *userName, Identity: identity}); err != nil {
|
|
return fmt.Errorf("failed to update user %s: %w", *userName, err)
|
|
}
|
|
fmt.Fprintf(writer, "Updated access for user %q on bucket %s.\n", *userName, *bucketName)
|
|
}
|
|
return nil
|
|
}, commandEnv.option.FilerAddress.ToGrpcAddress(), false, commandEnv.option.GrpcDialOption)
|
|
|
|
return err
|
|
}
|
|
|
|
func getOrCreateIdentity(client iam_pb.SeaweedIdentityAccessManagementClient, userName string) (*iam_pb.Identity, bool, error) {
|
|
resp, getErr := client.GetUser(context.Background(), &iam_pb.GetUserRequest{
|
|
Username: userName,
|
|
})
|
|
if getErr == nil && resp.Identity != nil {
|
|
return resp.Identity, false, nil
|
|
}
|
|
|
|
st, ok := status.FromError(getErr)
|
|
if ok && st.Code() == codes.NotFound {
|
|
return &iam_pb.Identity{
|
|
Name: userName,
|
|
Credentials: []*iam_pb.Credential{},
|
|
Actions: []string{},
|
|
PolicyNames: []string{},
|
|
}, true, nil
|
|
}
|
|
|
|
return nil, false, fmt.Errorf("failed to get user %s: %v", userName, getErr)
|
|
}
|
|
|
|
func displayBucketAccess(writer io.Writer, bucketName, userName string, identity *iam_pb.Identity) error {
|
|
suffix := ":" + bucketName
|
|
var actions []string
|
|
for _, a := range identity.Actions {
|
|
if strings.HasSuffix(a, suffix) {
|
|
actions = append(actions, strings.TrimSuffix(a, suffix))
|
|
}
|
|
}
|
|
fmt.Fprintf(writer, "Bucket: %s\n", bucketName)
|
|
fmt.Fprintf(writer, "User: %s\n", userName)
|
|
if len(actions) == 0 {
|
|
fmt.Fprintln(writer, "Access: none")
|
|
} else {
|
|
sort.Strings(actions)
|
|
fmt.Fprintf(writer, "Access: %s\n", strings.Join(actions, ","))
|
|
}
|
|
return nil
|
|
}
|
|
|
|
// updateBucketActions removes existing actions for the bucket and adds the new ones.
|
|
func updateBucketActions(identity *iam_pb.Identity, bucketName, accessStr string) {
|
|
suffix := ":" + bucketName
|
|
|
|
// Remove existing actions for this bucket
|
|
var kept []string
|
|
for _, a := range identity.Actions {
|
|
if !strings.HasSuffix(a, suffix) {
|
|
kept = append(kept, a)
|
|
}
|
|
}
|
|
|
|
// Add new actions (unless "none")
|
|
if strings.ToLower(accessStr) != "none" {
|
|
for _, action := range strings.Split(accessStr, ",") {
|
|
action = strings.TrimSpace(action)
|
|
if action != "" {
|
|
kept = append(kept, action+suffix)
|
|
}
|
|
}
|
|
}
|
|
|
|
identity.Actions = kept
|
|
}
|