mirror of
https://github.com/minio/mc.git
synced 2025-11-12 01:02:26 +03:00
208 lines
5.2 KiB
Go
208 lines
5.2 KiB
Go
/*
|
||
* Minio Client, (C) 2015, 2016 Minio, Inc.
|
||
*
|
||
* Licensed under the Apache License, Version 2.0 (the "License");
|
||
* you may not use this file except in compliance with the License.
|
||
* You may obtain a copy of the License at
|
||
*
|
||
* http://www.apache.org/licenses/LICENSE-2.0
|
||
*
|
||
* Unless required by applicable law or agreed to in writing, software
|
||
* distributed under the License is distributed on an "AS IS" BASIS,
|
||
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||
* See the License for the specific language governing permissions and
|
||
* limitations under the License.
|
||
*/
|
||
|
||
package cmd
|
||
|
||
import (
|
||
"encoding/json"
|
||
|
||
"github.com/fatih/color"
|
||
"github.com/minio/cli"
|
||
"github.com/minio/mc/pkg/console"
|
||
"github.com/minio/minio/pkg/probe"
|
||
)
|
||
|
||
var (
|
||
policyFlags = []cli.Flag{
|
||
cli.BoolFlag{
|
||
Name: "help, h",
|
||
Usage: "Help of policy.",
|
||
},
|
||
}
|
||
)
|
||
|
||
// Set public policy
|
||
var policyCmd = cli.Command{
|
||
Name: "policy",
|
||
Usage: "Set public policy on bucket or prefix.",
|
||
Action: mainPolicy,
|
||
Flags: append(policyFlags, globalFlags...),
|
||
CustomHelpTemplate: `Name:
|
||
mc {{.Name}} - {{.Usage}}
|
||
|
||
USAGE:
|
||
mc {{.Name}} [FLAGS] PERMISSION TARGET
|
||
mc {{.Name}} [FLAGS] TARGET
|
||
|
||
PERMISSION:
|
||
Allowed policies are: [none, download, upload, both].
|
||
|
||
FLAGS:
|
||
{{range .Flags}}{{.}}
|
||
{{end}}
|
||
EXAMPLES:
|
||
1. Set bucket to "download" on Amazon S3 cloud storage.
|
||
$ mc {{.Name}} download s3/burningman2011
|
||
|
||
2. Set bucket to "both" on Amazon S3 cloud storage.
|
||
$ mc {{.Name}} both s3/shared
|
||
|
||
3. Set bucket to "upload" on Amazon S3 cloud storage.
|
||
$ mc {{.Name}} upload s3/incoming
|
||
|
||
4. Set a prefix to "both" on Amazon S3 cloud storage.
|
||
$ mc {{.Name}} both s3/public-commons/images
|
||
|
||
5. Get bucket permissions.
|
||
$ mc {{.Name}} s3/shared
|
||
|
||
`,
|
||
}
|
||
|
||
// policyMessage is container for policy command on bucket success and failure messages.
|
||
type policyMessage struct {
|
||
Operation string `json:"operation"`
|
||
Status string `json:"status"`
|
||
Bucket string `json:"bucket"`
|
||
Perms accessPerms `json:"permission"`
|
||
}
|
||
|
||
// String colorized access message.
|
||
func (s policyMessage) String() string {
|
||
if s.Operation == "set" {
|
||
return console.Colorize("Policy",
|
||
"Access permission for ‘"+s.Bucket+"’ is set to ‘"+string(s.Perms)+"’")
|
||
}
|
||
if s.Operation == "get" {
|
||
return console.Colorize("Policy",
|
||
"Access permission for ‘"+s.Bucket+"’"+" is ‘"+string(s.Perms)+"’")
|
||
}
|
||
// nothing to print
|
||
return ""
|
||
}
|
||
|
||
// JSON jsonified policy message.
|
||
func (s policyMessage) JSON() string {
|
||
policyJSONBytes, e := json.Marshal(s)
|
||
fatalIf(probe.NewError(e), "Unable to marshal into JSON.")
|
||
|
||
return string(policyJSONBytes)
|
||
}
|
||
|
||
// checkPolicySyntax check for incoming syntax.
|
||
func checkPolicySyntax(ctx *cli.Context) {
|
||
if !ctx.Args().Present() {
|
||
cli.ShowCommandHelpAndExit(ctx, "policy", 1) // last argument is exit code.
|
||
}
|
||
if len(ctx.Args()) > 2 {
|
||
cli.ShowCommandHelpAndExit(ctx, "policy", 1) // last argument is exit code.
|
||
}
|
||
if len(ctx.Args()) == 2 {
|
||
perms := accessPerms(ctx.Args().Get(0))
|
||
if !perms.isValidAccessPERM() {
|
||
fatalIf(errDummy().Trace(),
|
||
"Unrecognized permission ‘"+string(perms)+"’. Allowed values are [none, download, upload, both].")
|
||
}
|
||
}
|
||
if len(ctx.Args()) < 1 {
|
||
cli.ShowCommandHelpAndExit(ctx, "policy", 1) // last argument is exit code.
|
||
}
|
||
}
|
||
|
||
// doSetAccess do set access.
|
||
func doSetAccess(targetURL string, targetPERMS accessPerms) *probe.Error {
|
||
clnt, err := newClient(targetURL)
|
||
if err != nil {
|
||
return err.Trace(targetURL)
|
||
}
|
||
policy := ""
|
||
switch targetPERMS {
|
||
case accessNone:
|
||
policy = "none"
|
||
case accessDownload:
|
||
policy = "readonly"
|
||
case accessUpload:
|
||
policy = "writeonly"
|
||
case accessBoth:
|
||
policy = "readwrite"
|
||
}
|
||
if err = clnt.SetAccess(policy); err != nil {
|
||
return err.Trace(targetURL, string(targetPERMS))
|
||
}
|
||
return nil
|
||
}
|
||
|
||
// doGetAccess do get access.
|
||
func doGetAccess(targetURL string) (perms accessPerms, err *probe.Error) {
|
||
clnt, err := newClient(targetURL)
|
||
if err != nil {
|
||
return "", err.Trace(targetURL)
|
||
}
|
||
perm, err := clnt.GetAccess()
|
||
if err != nil {
|
||
return "", err.Trace(targetURL)
|
||
}
|
||
var policy accessPerms
|
||
switch perm {
|
||
case "none":
|
||
policy = accessNone
|
||
case "readonly":
|
||
policy = accessDownload
|
||
case "writeonly":
|
||
policy = accessUpload
|
||
case "readwrite":
|
||
policy = accessBoth
|
||
}
|
||
|
||
return policy, nil
|
||
}
|
||
|
||
func mainPolicy(ctx *cli.Context) {
|
||
// Set global flags from context.
|
||
setGlobalsFromContext(ctx)
|
||
|
||
// check 'policy' cli arguments.
|
||
checkPolicySyntax(ctx)
|
||
|
||
// Additional command speific theme customization.
|
||
console.SetColor("Policy", color.New(color.FgGreen, color.Bold))
|
||
|
||
perms := accessPerms(ctx.Args().First())
|
||
if perms.isValidAccessPERM() {
|
||
targetURL := ctx.Args().Last()
|
||
err := doSetAccess(targetURL, perms)
|
||
// Upon error exit.
|
||
fatalIf(err.Trace(targetURL, string(perms)),
|
||
"Unable to set policy ‘"+string(perms)+"’ for ‘"+targetURL+"’.")
|
||
printMsg(policyMessage{
|
||
Status: "success",
|
||
Operation: "set",
|
||
Bucket: targetURL,
|
||
Perms: perms,
|
||
})
|
||
} else {
|
||
targetURL := ctx.Args().First()
|
||
perms, err := doGetAccess(targetURL)
|
||
fatalIf(err.Trace(targetURL), "Unable to get policy for ‘"+targetURL+"’.")
|
||
printMsg(policyMessage{
|
||
Status: "success",
|
||
Operation: "get",
|
||
Bucket: targetURL,
|
||
Perms: perms,
|
||
})
|
||
}
|
||
}
|