1
0
mirror of https://github.com/minio/mc.git synced 2025-11-12 01:02:26 +03:00
Files
mc/cmd-access.go
2015-05-02 11:28:31 -07:00

109 lines
3.8 KiB
Go

/*
* Minio Client, (C) 2015 Minio, Inc.
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
package main
import (
"fmt"
"time"
"github.com/minio-io/cli"
"github.com/minio-io/mc/pkg/client"
"github.com/minio-io/mc/pkg/console"
"github.com/minio-io/minio/pkg/iodine"
"github.com/minio-io/minio/pkg/utils/log"
)
func runAccessCmd(ctx *cli.Context) {
if !ctx.Args().Present() || ctx.Args().First() == "help" {
cli.ShowCommandHelpAndExit(ctx, "access", 1) // last argument is exit code
}
if !isMcConfigExist() {
console.Fatalln("\"mc\" is not configured. Please run \"mc config generate\".")
}
config, err := getMcConfig()
if err != nil {
log.Debug.Println(iodine.New(err, nil))
console.Fatalf("loading config file failed with following reason: [%s]\n", iodine.ToError(err))
}
targetURLConfigMap := make(map[string]*hostConfig)
targetURLs, err := getExpandedURLs(ctx.Args(), config.Aliases)
if err != nil {
switch e := iodine.ToError(err).(type) {
case errUnsupportedScheme:
log.Debug.Println(iodine.New(err, nil))
console.Fatalf("reading URL [%s] failed with following reason: [%s]\n", e.url, e)
default:
log.Debug.Println(iodine.New(err, nil))
console.Fatalf("reading URLs failed with following reason: [%s]\n", e)
}
}
acl := bucketACL(ctx.Args().First())
if !acl.isValidBucketACL() {
log.Debug.Println(iodine.New(errInvalidACL{acl: acl.String()}, nil))
console.Fatalf("Access type [%s] is not supported. Valid types are [private, public, readonly].\n", acl)
}
targetURLs = targetURLs[1:] // 1 or more target URLs
for _, targetURL := range targetURLs {
targetConfig, err := getHostConfig(targetURL)
if err != nil {
log.Debug.Println(iodine.New(err, nil))
console.Fatalf("Unable to read configuration for host [%s]. Reason: [%s].\n", targetURL, iodine.ToError(err))
}
targetURLConfigMap[targetURL] = targetConfig
}
for targetURL, targetConfig := range targetURLConfigMap {
errorMsg, err := doUpdateAccessCmd(mcClientMethods{}, targetURL, acl.String(), targetConfig, globalDebugFlag)
err = iodine.New(err, nil)
if err != nil {
if errorMsg == "" {
errorMsg = "Empty error message. Please rerun this command with --debug and file a bug report."
}
log.Debug.Println(err)
console.Errorf("%s", errorMsg)
}
}
}
func doUpdateAccessCmd(methods clientMethods, targetURL, targetACL string, targetConfig *hostConfig, debug bool) (string, error) {
var err error
var clnt client.Client
clnt, err = methods.getNewClient(targetURL, targetConfig, debug)
if err != nil {
err := iodine.New(err, nil)
msg := fmt.Sprintf("Unable to initialize client for [%s]. Reason: [%s].\n",
targetURL, iodine.ToError(err))
return msg, err
}
return doUpdateAccess(clnt, targetURL, targetACL)
}
func doUpdateAccess(clnt client.Client, targetURL, targetACL string) (string, error) {
err := clnt.PutBucketACL(targetACL)
for i := 0; i < globalMaxRetryFlag && err != nil && isValidRetry(err); i++ {
fmt.Println(console.Retry("Retrying ... %d", i))
// Progressively longer delays
time.Sleep(time.Duration(i*i) * time.Second)
err = clnt.PutBucketACL(targetACL)
}
if err != nil {
err := iodine.New(err, nil)
msg := fmt.Sprintf("Failed to add bucket access policy for URL [%s]. Reason: [%s].\n", targetURL, iodine.ToError(err))
return msg, err
}
return "", nil
}