53e550f7d8
* uplink docs Change-Id: I67414c9e91b158ba1c120188aeb41b2907282431 * review Change-Id: I34b2185e261e3425beb5099f0a161f988d920966
168 lines
3.9 KiB
Go
168 lines
3.9 KiB
Go
// Copyright (C) 2019 Storj Labs, Inc.
|
|
// See LICENSE for copying information.
|
|
|
|
package uplink_test
|
|
|
|
import (
|
|
"context"
|
|
"fmt"
|
|
"io"
|
|
"io/ioutil"
|
|
"os"
|
|
|
|
"github.com/zeebo/errs"
|
|
|
|
"storj.io/storj/lib/uplink"
|
|
"storj.io/storj/pkg/macaroon"
|
|
)
|
|
|
|
func RestrictAccessExampleByAdmin(ctx context.Context,
|
|
satelliteAddress, apiKey, adminAccess string,
|
|
cfg *uplink.Config, out io.Writer) (
|
|
serializedUserAPIKey string, serializedAccess string, err error) {
|
|
|
|
// Parse the API key. API keys are "macaroons" that allow you to create new,
|
|
// restricted API keys.
|
|
key, err := uplink.ParseAPIKey(apiKey)
|
|
if err != nil {
|
|
return "", "", err
|
|
}
|
|
|
|
// Restrict the API key to be read only and to be for just the prod and
|
|
// staging buckets for the path webserver/logs/
|
|
userAPIKey, err := key.Restrict(macaroon.Caveat{
|
|
DisallowWrites: true,
|
|
DisallowDeletes: true,
|
|
})
|
|
if err != nil {
|
|
return "", "", err
|
|
}
|
|
|
|
// Load the existing encryption access context
|
|
access, err := uplink.ParseEncryptionAccess(adminAccess)
|
|
if err != nil {
|
|
return "", "", err
|
|
}
|
|
|
|
// Restrict the encryption access context to just the prod and staging
|
|
// buckets for webserver/logs/
|
|
userAPIKey, userAccess, err := access.Restrict(userAPIKey,
|
|
uplink.EncryptionRestriction{
|
|
Bucket: "prod",
|
|
PathPrefix: "webserver/logs",
|
|
},
|
|
uplink.EncryptionRestriction{
|
|
Bucket: "staging",
|
|
PathPrefix: "webserver/logs",
|
|
},
|
|
)
|
|
if err != nil {
|
|
return "", "", err
|
|
}
|
|
|
|
// Serialize the encryption access context
|
|
serializedUserAccess, err := userAccess.Serialize()
|
|
if err != nil {
|
|
return "", "", err
|
|
}
|
|
|
|
fmt.Fprintln(out, "success!")
|
|
return userAPIKey.Serialize(), serializedUserAccess, nil
|
|
}
|
|
|
|
func RestrictAccessExampleByUser(ctx context.Context,
|
|
satelliteAddress, apiKey, serializedAccess string,
|
|
cfg *uplink.Config, out io.Writer) (err error) {
|
|
|
|
errCatch := func(fn func() error) { err = errs.Combine(err, fn()) }
|
|
|
|
// First, create an Uplink handle.
|
|
ul, err := uplink.NewUplink(ctx, cfg)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
defer errCatch(ul.Close)
|
|
|
|
// Parse the API key.
|
|
key, err := uplink.ParseAPIKey(apiKey)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
// Open the project in question. Projects are identified by a specific
|
|
// Satellite and API key
|
|
p, err := ul.OpenProject(ctx, satelliteAddress, key)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
defer errCatch(p.Close)
|
|
|
|
// Parse the encryption access context
|
|
access, err := uplink.ParseEncryptionAccess(serializedAccess)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
// Open bucket
|
|
bucket, err := p.OpenBucket(ctx, "prod", access)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
defer errCatch(bucket.Close)
|
|
|
|
// Open file
|
|
obj, err := bucket.OpenObject(ctx, "webserver/logs/log.txt")
|
|
if err != nil {
|
|
return err
|
|
}
|
|
defer errCatch(obj.Close)
|
|
|
|
// Get a reader for the entire file
|
|
r, err := obj.DownloadRange(ctx, 0, -1)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
defer errCatch(r.Close)
|
|
|
|
// Read the file
|
|
data, err := ioutil.ReadAll(r)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
// Print it!
|
|
fmt.Fprintln(out, string(data))
|
|
return nil
|
|
}
|
|
|
|
func Example_restrictAccess() {
|
|
// The satellite address is the address of the satellite your API key is
|
|
// valid on
|
|
satelliteAddress := "us-central-1.tardigrade.io:7777"
|
|
|
|
// The API key can be created in the web interface
|
|
adminAPIKey := "qPSUM3k0bZyOIyil2xrVWiSuc9HuB2yBP3qDrA2Gc"
|
|
|
|
// The encryption access context was created using
|
|
// NewEncryptionAccessWithDefaultKey and
|
|
// (*Project).SaltedKeyFromPassphrase() earlier
|
|
adminAccess := "HYGoqCEz43mCE40Hc5lQD3DtUYynx9Vo1GjOx75hQ"
|
|
|
|
ctx := context.Background()
|
|
|
|
// Admin1 is going to create an encryption access context and share it
|
|
userAPIKey, access, err := RestrictAccessExampleByAdmin(ctx,
|
|
satelliteAddress, adminAPIKey, adminAccess, &uplink.Config{}, os.Stdout)
|
|
if err != nil {
|
|
panic(err)
|
|
}
|
|
|
|
// Admin2 is going to use the provided encryption access context to load
|
|
// the uploaded file
|
|
err = RestrictAccessExampleByUser(ctx, satelliteAddress, userAPIKey, access,
|
|
&uplink.Config{}, os.Stdout)
|
|
if err != nil {
|
|
panic(err)
|
|
}
|
|
}
|