mirror of
https://github.com/minio/mc.git
synced 2025-11-12 01:02:26 +03:00
Refacture structure proposal. (#1793)
This commit is contained in:
committed by
Harshavardhana
parent
c9ecd023fa
commit
b51fb32054
207
command/policy-main.go
Normal file
207
command/policy-main.go
Normal file
@@ -0,0 +1,207 @@
|
||||
/*
|
||||
* Minio Client, (C) 2015, 2016 Minio, Inc.
|
||||
*
|
||||
* Licensed under the Apache License, Version 2.0 (the "License");
|
||||
* you may not use this file except in compliance with the License.
|
||||
* You may obtain a copy of the License at
|
||||
*
|
||||
* http://www.apache.org/licenses/LICENSE-2.0
|
||||
*
|
||||
* Unless required by applicable law or agreed to in writing, software
|
||||
* distributed under the License is distributed on an "AS IS" BASIS,
|
||||
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
* See the License for the specific language governing permissions and
|
||||
* limitations under the License.
|
||||
*/
|
||||
|
||||
package command
|
||||
|
||||
import (
|
||||
"encoding/json"
|
||||
|
||||
"github.com/fatih/color"
|
||||
"github.com/minio/cli"
|
||||
"github.com/minio/mc/pkg/console"
|
||||
"github.com/minio/minio/pkg/probe"
|
||||
)
|
||||
|
||||
var (
|
||||
policyFlags = []cli.Flag{
|
||||
cli.BoolFlag{
|
||||
Name: "help, h",
|
||||
Usage: "Help of policy.",
|
||||
},
|
||||
}
|
||||
)
|
||||
|
||||
// Set public policy
|
||||
var policyCmd = cli.Command{
|
||||
Name: "policy",
|
||||
Usage: "Set public policy on bucket or prefix.",
|
||||
Action: mainPolicy,
|
||||
Flags: append(policyFlags, globalFlags...),
|
||||
CustomHelpTemplate: `Name:
|
||||
mc {{.Name}} - {{.Usage}}
|
||||
|
||||
USAGE:
|
||||
mc {{.Name}} [FLAGS] PERMISSION TARGET
|
||||
mc {{.Name}} [FLAGS] TARGET
|
||||
|
||||
PERMISSION:
|
||||
Allowed policies are: [none, download, upload, both].
|
||||
|
||||
FLAGS:
|
||||
{{range .Flags}}{{.}}
|
||||
{{end}}
|
||||
EXAMPLES:
|
||||
1. Set bucket to "download" on Amazon S3 cloud storage.
|
||||
$ mc {{.Name}} download s3/burningman2011
|
||||
|
||||
2. Set bucket to "both" on Amazon S3 cloud storage.
|
||||
$ mc {{.Name}} both s3/shared
|
||||
|
||||
3. Set bucket to "upload" on Amazon S3 cloud storage.
|
||||
$ mc {{.Name}} upload s3/incoming
|
||||
|
||||
4. Set a prefix to "both" on Amazon S3 cloud storage.
|
||||
$ mc {{.Name}} both s3/public-commons/images
|
||||
|
||||
5. Get bucket permissions.
|
||||
$ mc {{.Name}} s3/shared
|
||||
|
||||
`,
|
||||
}
|
||||
|
||||
// policyMessage is container for policy command on bucket success and failure messages.
|
||||
type policyMessage struct {
|
||||
Operation string `json:"operation"`
|
||||
Status string `json:"status"`
|
||||
Bucket string `json:"bucket"`
|
||||
Perms accessPerms `json:"permission"`
|
||||
}
|
||||
|
||||
// String colorized access message.
|
||||
func (s policyMessage) String() string {
|
||||
if s.Operation == "set" {
|
||||
return console.Colorize("Policy",
|
||||
"Access permission for ‘"+s.Bucket+"’ is set to ‘"+string(s.Perms)+"’")
|
||||
}
|
||||
if s.Operation == "get" {
|
||||
return console.Colorize("Policy",
|
||||
"Access permission for ‘"+s.Bucket+"’"+" is ‘"+string(s.Perms)+"’")
|
||||
}
|
||||
// nothing to print
|
||||
return ""
|
||||
}
|
||||
|
||||
// JSON jsonified policy message.
|
||||
func (s policyMessage) JSON() string {
|
||||
policyJSONBytes, e := json.Marshal(s)
|
||||
fatalIf(probe.NewError(e), "Unable to marshal into JSON.")
|
||||
|
||||
return string(policyJSONBytes)
|
||||
}
|
||||
|
||||
// checkPolicySyntax check for incoming syntax.
|
||||
func checkPolicySyntax(ctx *cli.Context) {
|
||||
if !ctx.Args().Present() {
|
||||
cli.ShowCommandHelpAndExit(ctx, "policy", 1) // last argument is exit code.
|
||||
}
|
||||
if len(ctx.Args()) > 2 {
|
||||
cli.ShowCommandHelpAndExit(ctx, "policy", 1) // last argument is exit code.
|
||||
}
|
||||
if len(ctx.Args()) == 2 {
|
||||
perms := accessPerms(ctx.Args().Get(0))
|
||||
if !perms.isValidAccessPERM() {
|
||||
fatalIf(errDummy().Trace(),
|
||||
"Unrecognized permission ‘"+string(perms)+"’. Allowed values are [none, download, upload, both].")
|
||||
}
|
||||
}
|
||||
if len(ctx.Args()) < 1 {
|
||||
cli.ShowCommandHelpAndExit(ctx, "policy", 1) // last argument is exit code.
|
||||
}
|
||||
}
|
||||
|
||||
// doSetAccess do set access.
|
||||
func doSetAccess(targetURL string, targetPERMS accessPerms) *probe.Error {
|
||||
clnt, err := newClient(targetURL)
|
||||
if err != nil {
|
||||
return err.Trace(targetURL)
|
||||
}
|
||||
policy := ""
|
||||
switch targetPERMS {
|
||||
case accessNone:
|
||||
policy = "none"
|
||||
case accessDownload:
|
||||
policy = "readonly"
|
||||
case accessUpload:
|
||||
policy = "writeonly"
|
||||
case accessBoth:
|
||||
policy = "readwrite"
|
||||
}
|
||||
if err = clnt.SetAccess(policy); err != nil {
|
||||
return err.Trace(targetURL, string(targetPERMS))
|
||||
}
|
||||
return nil
|
||||
}
|
||||
|
||||
// doGetAccess do get access.
|
||||
func doGetAccess(targetURL string) (perms accessPerms, err *probe.Error) {
|
||||
clnt, err := newClient(targetURL)
|
||||
if err != nil {
|
||||
return "", err.Trace(targetURL)
|
||||
}
|
||||
perm, err := clnt.GetAccess()
|
||||
if err != nil {
|
||||
return "", err.Trace(targetURL)
|
||||
}
|
||||
var policy accessPerms
|
||||
switch perm {
|
||||
case "none":
|
||||
policy = accessNone
|
||||
case "readonly":
|
||||
policy = accessDownload
|
||||
case "writeonly":
|
||||
policy = accessUpload
|
||||
case "readwrite":
|
||||
policy = accessBoth
|
||||
}
|
||||
|
||||
return policy, nil
|
||||
}
|
||||
|
||||
func mainPolicy(ctx *cli.Context) {
|
||||
// Set global flags from context.
|
||||
setGlobalsFromContext(ctx)
|
||||
|
||||
// check 'policy' cli arguments.
|
||||
checkPolicySyntax(ctx)
|
||||
|
||||
// Additional command speific theme customization.
|
||||
console.SetColor("Policy", color.New(color.FgGreen, color.Bold))
|
||||
|
||||
perms := accessPerms(ctx.Args().First())
|
||||
if perms.isValidAccessPERM() {
|
||||
targetURL := ctx.Args().Last()
|
||||
err := doSetAccess(targetURL, perms)
|
||||
// Upon error exit.
|
||||
fatalIf(err.Trace(targetURL, string(perms)),
|
||||
"Unable to set policy ‘"+string(perms)+"’ for ‘"+targetURL+"’.")
|
||||
printMsg(policyMessage{
|
||||
Status: "success",
|
||||
Operation: "set",
|
||||
Bucket: targetURL,
|
||||
Perms: perms,
|
||||
})
|
||||
} else {
|
||||
targetURL := ctx.Args().First()
|
||||
perms, err := doGetAccess(targetURL)
|
||||
fatalIf(err.Trace(targetURL), "Unable to get policy for ‘"+targetURL+"’.")
|
||||
printMsg(policyMessage{
|
||||
Status: "success",
|
||||
Operation: "get",
|
||||
Bucket: targetURL,
|
||||
Perms: perms,
|
||||
})
|
||||
}
|
||||
}
|
||||
Reference in New Issue
Block a user