VictoriaMetrics/vendor/cloud.google.com/go/storage/http_client.go

1425 lines
45 KiB
Go
Raw Normal View History

2022-04-12 11:51:54 +02:00
// Copyright 2022 Google LLC
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
package storage
import (
"context"
2022-06-28 13:51:45 +02:00
"encoding/base64"
2022-04-12 11:51:54 +02:00
"errors"
"fmt"
2022-06-28 13:51:45 +02:00
"io"
"io/ioutil"
2022-04-12 11:51:54 +02:00
"net/http"
"net/url"
"os"
2022-05-20 13:45:24 +02:00
"reflect"
2022-06-28 13:51:45 +02:00
"strconv"
2022-04-12 11:51:54 +02:00
"strings"
2022-06-28 13:51:45 +02:00
"time"
2022-04-12 11:51:54 +02:00
2023-03-15 21:24:12 +01:00
"cloud.google.com/go/iam/apiv1/iampb"
2022-06-28 13:51:45 +02:00
"cloud.google.com/go/internal/optional"
"cloud.google.com/go/internal/trace"
2023-08-29 13:12:56 +02:00
"github.com/googleapis/gax-go/v2/callctx"
2022-04-12 11:51:54 +02:00
"golang.org/x/oauth2/google"
"google.golang.org/api/googleapi"
2022-05-20 13:45:24 +02:00
"google.golang.org/api/iterator"
2022-04-12 11:51:54 +02:00
"google.golang.org/api/option"
"google.golang.org/api/option/internaloption"
raw "google.golang.org/api/storage/v1"
"google.golang.org/api/transport"
htransport "google.golang.org/api/transport/http"
)
// httpStorageClient is the HTTP-JSON API implementation of the transport-agnostic
// storageClient interface.
type httpStorageClient struct {
creds *google.Credentials
hc *http.Client
2023-07-07 09:04:32 +02:00
xmlHost string
2022-04-12 11:51:54 +02:00
raw *raw.Service
scheme string
settings *settings
2023-03-15 21:24:12 +01:00
config *storageConfig
2022-04-12 11:51:54 +02:00
}
// newHTTPStorageClient initializes a new storageClient that uses the HTTP-JSON
// Storage API.
func newHTTPStorageClient(ctx context.Context, opts ...storageOption) (storageClient, error) {
s := initSettings(opts...)
o := s.clientOption
2023-03-15 21:24:12 +01:00
config := newStorageConfig(o...)
2022-04-12 11:51:54 +02:00
var creds *google.Credentials
// In general, it is recommended to use raw.NewService instead of htransport.NewClient
// since raw.NewService configures the correct default endpoints when initializing the
// internal http client. However, in our case, "NewRangeReader" in reader.go needs to
// access the http client directly to make requests, so we create the client manually
// here so it can be re-used by both reader.go and raw.NewService. This means we need to
// manually configure the default endpoint options on the http client. Furthermore, we
// need to account for STORAGE_EMULATOR_HOST override when setting the default endpoints.
if host := os.Getenv("STORAGE_EMULATOR_HOST"); host == "" {
// Prepend default options to avoid overriding options passed by the user.
o = append([]option.ClientOption{option.WithScopes(ScopeFullControl, "https://www.googleapis.com/auth/cloud-platform"), option.WithUserAgent(userAgent)}, o...)
o = append(o, internaloption.WithDefaultEndpoint("https://storage.googleapis.com/storage/v1/"))
o = append(o, internaloption.WithDefaultMTLSEndpoint("https://storage.mtls.googleapis.com/storage/v1/"))
// Don't error out here. The user may have passed in their own HTTP
// client which does not auth with ADC or other common conventions.
c, err := transport.Creds(ctx, o...)
if err == nil {
creds = c
o = append(o, internaloption.WithCredentials(creds))
}
} else {
var hostURL *url.URL
if strings.Contains(host, "://") {
h, err := url.Parse(host)
if err != nil {
return nil, err
}
hostURL = h
} else {
// Add scheme for user if not supplied in STORAGE_EMULATOR_HOST
// URL is only parsed correctly if it has a scheme, so we build it ourselves
hostURL = &url.URL{Scheme: "http", Host: host}
}
hostURL.Path = "storage/v1/"
endpoint := hostURL.String()
// Append the emulator host as default endpoint for the user
o = append([]option.ClientOption{option.WithoutAuthentication()}, o...)
o = append(o, internaloption.WithDefaultEndpoint(endpoint))
o = append(o, internaloption.WithDefaultMTLSEndpoint(endpoint))
}
s.clientOption = o
// htransport selects the correct endpoint among WithEndpoint (user override), WithDefaultEndpoint, and WithDefaultMTLSEndpoint.
hc, ep, err := htransport.NewClient(ctx, s.clientOption...)
if err != nil {
2022-11-10 12:46:33 +01:00
return nil, fmt.Errorf("dialing: %w", err)
2022-04-12 11:51:54 +02:00
}
// RawService should be created with the chosen endpoint to take account of user override.
rawService, err := raw.NewService(ctx, option.WithEndpoint(ep), option.WithHTTPClient(hc))
if err != nil {
2022-11-10 12:46:33 +01:00
return nil, fmt.Errorf("storage client: %w", err)
2022-04-12 11:51:54 +02:00
}
2023-07-07 09:04:32 +02:00
// Update xmlHost and scheme with the chosen endpoint.
2022-04-12 11:51:54 +02:00
u, err := url.Parse(ep)
if err != nil {
2022-11-10 12:46:33 +01:00
return nil, fmt.Errorf("supplied endpoint %q is not valid: %w", ep, err)
2022-04-12 11:51:54 +02:00
}
return &httpStorageClient{
creds: creds,
hc: hc,
2023-07-07 09:04:32 +02:00
xmlHost: u.Host,
2022-04-12 11:51:54 +02:00
raw: rawService,
scheme: u.Scheme,
settings: s,
2023-03-15 21:24:12 +01:00
config: &config,
2022-04-12 11:51:54 +02:00
}, nil
}
func (c *httpStorageClient) Close() error {
c.hc.CloseIdleConnections()
return nil
}
// Top-level methods.
func (c *httpStorageClient) GetServiceAccount(ctx context.Context, project string, opts ...storageOption) (string, error) {
2022-05-20 13:45:24 +02:00
s := callSettings(c.settings, opts...)
call := c.raw.Projects.ServiceAccount.Get(project)
var res *raw.ServiceAccount
2023-10-31 20:19:51 +01:00
err := run(ctx, func(ctx context.Context) error {
2022-05-20 13:45:24 +02:00
var err error
res, err = call.Context(ctx).Do()
return err
2023-10-31 20:19:51 +01:00
}, s.retry, s.idempotent)
2022-05-20 13:45:24 +02:00
if err != nil {
return "", err
}
return res.EmailAddress, nil
2022-04-12 11:51:54 +02:00
}
2022-08-14 23:53:41 +02:00
func (c *httpStorageClient) CreateBucket(ctx context.Context, project, bucket string, attrs *BucketAttrs, opts ...storageOption) (*BucketAttrs, error) {
2022-04-12 11:51:54 +02:00
s := callSettings(c.settings, opts...)
var bkt *raw.Bucket
if attrs != nil {
bkt = attrs.toRawBucket()
} else {
bkt = &raw.Bucket{}
}
2022-08-14 23:53:41 +02:00
bkt.Name = bucket
2022-04-12 11:51:54 +02:00
// If there is lifecycle information but no location, explicitly set
// the location. This is a GCS quirk/bug.
if bkt.Location == "" && bkt.Lifecycle != nil {
bkt.Location = "US"
}
req := c.raw.Buckets.Insert(project, bkt)
setClientHeader(req.Header())
if attrs != nil && attrs.PredefinedACL != "" {
req.PredefinedAcl(attrs.PredefinedACL)
}
if attrs != nil && attrs.PredefinedDefaultObjectACL != "" {
req.PredefinedDefaultObjectAcl(attrs.PredefinedDefaultObjectACL)
}
var battrs *BucketAttrs
2023-10-31 20:19:51 +01:00
err := run(ctx, func(ctx context.Context) error {
2022-04-12 11:51:54 +02:00
b, err := req.Context(ctx).Do()
if err != nil {
return err
}
battrs, err = newBucket(b)
return err
2023-10-31 20:19:51 +01:00
}, s.retry, s.idempotent)
2022-04-12 11:51:54 +02:00
return battrs, err
}
2022-05-20 13:45:24 +02:00
func (c *httpStorageClient) ListBuckets(ctx context.Context, project string, opts ...storageOption) *BucketIterator {
s := callSettings(c.settings, opts...)
it := &BucketIterator{
ctx: ctx,
projectID: project,
}
fetch := func(pageSize int, pageToken string) (token string, err error) {
req := c.raw.Buckets.List(it.projectID)
setClientHeader(req.Header())
req.Projection("full")
req.Prefix(it.Prefix)
req.PageToken(pageToken)
if pageSize > 0 {
req.MaxResults(int64(pageSize))
}
var resp *raw.Buckets
2023-10-31 20:19:51 +01:00
err = run(it.ctx, func(ctx context.Context) error {
resp, err = req.Context(ctx).Do()
2022-05-20 13:45:24 +02:00
return err
2023-10-31 20:19:51 +01:00
}, s.retry, s.idempotent)
2022-05-20 13:45:24 +02:00
if err != nil {
return "", err
}
for _, item := range resp.Items {
b, err := newBucket(item)
if err != nil {
return "", err
}
it.buckets = append(it.buckets, b)
}
return resp.NextPageToken, nil
}
it.pageInfo, it.nextFunc = iterator.NewPageInfo(
fetch,
func() int { return len(it.buckets) },
func() interface{} { b := it.buckets; it.buckets = nil; return b })
return it
2022-04-12 11:51:54 +02:00
}
// Bucket methods.
func (c *httpStorageClient) DeleteBucket(ctx context.Context, bucket string, conds *BucketConditions, opts ...storageOption) error {
s := callSettings(c.settings, opts...)
req := c.raw.Buckets.Delete(bucket)
setClientHeader(req.Header())
if err := applyBucketConds("httpStorageClient.DeleteBucket", conds, req); err != nil {
return err
}
if s.userProject != "" {
req.UserProject(s.userProject)
}
2023-10-31 20:19:51 +01:00
return run(ctx, func(ctx context.Context) error { return req.Context(ctx).Do() }, s.retry, s.idempotent)
2022-04-12 11:51:54 +02:00
}
func (c *httpStorageClient) GetBucket(ctx context.Context, bucket string, conds *BucketConditions, opts ...storageOption) (*BucketAttrs, error) {
s := callSettings(c.settings, opts...)
req := c.raw.Buckets.Get(bucket).Projection("full")
setClientHeader(req.Header())
err := applyBucketConds("httpStorageClient.GetBucket", conds, req)
if err != nil {
return nil, err
}
if s.userProject != "" {
req.UserProject(s.userProject)
}
var resp *raw.Bucket
2023-10-31 20:19:51 +01:00
err = run(ctx, func(ctx context.Context) error {
2022-04-12 11:51:54 +02:00
resp, err = req.Context(ctx).Do()
return err
2023-10-31 20:19:51 +01:00
}, s.retry, s.idempotent)
2022-04-12 11:51:54 +02:00
var e *googleapi.Error
if ok := errors.As(err, &e); ok && e.Code == http.StatusNotFound {
return nil, ErrBucketNotExist
}
if err != nil {
return nil, err
}
return newBucket(resp)
}
2022-05-20 13:45:24 +02:00
func (c *httpStorageClient) UpdateBucket(ctx context.Context, bucket string, uattrs *BucketAttrsToUpdate, conds *BucketConditions, opts ...storageOption) (*BucketAttrs, error) {
s := callSettings(c.settings, opts...)
rb := uattrs.toRawBucket()
req := c.raw.Buckets.Patch(bucket, rb).Projection("full")
setClientHeader(req.Header())
err := applyBucketConds("httpStorageClient.UpdateBucket", conds, req)
if err != nil {
return nil, err
}
if s.userProject != "" {
req.UserProject(s.userProject)
}
if uattrs != nil && uattrs.PredefinedACL != "" {
req.PredefinedAcl(uattrs.PredefinedACL)
}
if uattrs != nil && uattrs.PredefinedDefaultObjectACL != "" {
req.PredefinedDefaultObjectAcl(uattrs.PredefinedDefaultObjectACL)
}
var rawBucket *raw.Bucket
2023-10-31 20:19:51 +01:00
err = run(ctx, func(ctx context.Context) error {
2022-05-20 13:45:24 +02:00
rawBucket, err = req.Context(ctx).Do()
return err
2023-10-31 20:19:51 +01:00
}, s.retry, s.idempotent)
2022-05-20 13:45:24 +02:00
if err != nil {
return nil, err
}
return newBucket(rawBucket)
2022-04-12 11:51:54 +02:00
}
2022-05-20 13:45:24 +02:00
2022-04-12 11:51:54 +02:00
func (c *httpStorageClient) LockBucketRetentionPolicy(ctx context.Context, bucket string, conds *BucketConditions, opts ...storageOption) error {
2022-05-20 13:45:24 +02:00
s := callSettings(c.settings, opts...)
var metageneration int64
if conds != nil {
metageneration = conds.MetagenerationMatch
}
req := c.raw.Buckets.LockRetentionPolicy(bucket, metageneration)
2023-10-31 20:19:51 +01:00
return run(ctx, func(ctx context.Context) error {
2022-05-20 13:45:24 +02:00
_, err := req.Context(ctx).Do()
return err
2023-10-31 20:19:51 +01:00
}, s.retry, s.idempotent)
2022-04-12 11:51:54 +02:00
}
2022-05-20 13:45:24 +02:00
func (c *httpStorageClient) ListObjects(ctx context.Context, bucket string, q *Query, opts ...storageOption) *ObjectIterator {
s := callSettings(c.settings, opts...)
it := &ObjectIterator{
ctx: ctx,
}
if q != nil {
it.query = *q
}
fetch := func(pageSize int, pageToken string) (string, error) {
req := c.raw.Objects.List(bucket)
setClientHeader(req.Header())
projection := it.query.Projection
if projection == ProjectionDefault {
projection = ProjectionFull
}
req.Projection(projection.String())
req.Delimiter(it.query.Delimiter)
req.Prefix(it.query.Prefix)
req.StartOffset(it.query.StartOffset)
req.EndOffset(it.query.EndOffset)
req.Versions(it.query.Versions)
req.IncludeTrailingDelimiter(it.query.IncludeTrailingDelimiter)
2023-07-07 09:04:32 +02:00
req.MatchGlob(it.query.MatchGlob)
2022-11-10 12:46:33 +01:00
if selection := it.query.toFieldSelection(); selection != "" {
req.Fields("nextPageToken", googleapi.Field(selection))
2022-05-20 13:45:24 +02:00
}
req.PageToken(pageToken)
if s.userProject != "" {
req.UserProject(s.userProject)
}
if pageSize > 0 {
req.MaxResults(int64(pageSize))
}
var resp *raw.Objects
var err error
2023-10-31 20:19:51 +01:00
err = run(it.ctx, func(ctx context.Context) error {
resp, err = req.Context(ctx).Do()
2022-05-20 13:45:24 +02:00
return err
2023-10-31 20:19:51 +01:00
}, s.retry, s.idempotent)
2022-05-20 13:45:24 +02:00
if err != nil {
var e *googleapi.Error
if ok := errors.As(err, &e); ok && e.Code == http.StatusNotFound {
err = ErrBucketNotExist
}
return "", err
}
for _, item := range resp.Items {
it.items = append(it.items, newObject(item))
}
for _, prefix := range resp.Prefixes {
it.items = append(it.items, &ObjectAttrs{Prefix: prefix})
}
return resp.NextPageToken, nil
}
it.pageInfo, it.nextFunc = iterator.NewPageInfo(
fetch,
func() int { return len(it.items) },
func() interface{} { b := it.items; it.items = nil; return b })
return it
2022-04-12 11:51:54 +02:00
}
// Object metadata methods.
2022-06-28 13:51:45 +02:00
func (c *httpStorageClient) DeleteObject(ctx context.Context, bucket, object string, gen int64, conds *Conditions, opts ...storageOption) error {
s := callSettings(c.settings, opts...)
req := c.raw.Objects.Delete(bucket, object).Context(ctx)
if err := applyConds("Delete", gen, conds, req); err != nil {
return err
}
if s.userProject != "" {
req.UserProject(s.userProject)
}
2023-10-31 20:19:51 +01:00
err := run(ctx, func(ctx context.Context) error { return req.Context(ctx).Do() }, s.retry, s.idempotent)
2022-06-28 13:51:45 +02:00
var e *googleapi.Error
if ok := errors.As(err, &e); ok && e.Code == http.StatusNotFound {
return ErrObjectNotExist
}
return err
2022-04-12 11:51:54 +02:00
}
2022-06-28 13:51:45 +02:00
func (c *httpStorageClient) GetObject(ctx context.Context, bucket, object string, gen int64, encryptionKey []byte, conds *Conditions, opts ...storageOption) (*ObjectAttrs, error) {
s := callSettings(c.settings, opts...)
req := c.raw.Objects.Get(bucket, object).Projection("full").Context(ctx)
if err := applyConds("Attrs", gen, conds, req); err != nil {
return nil, err
}
if s.userProject != "" {
req.UserProject(s.userProject)
}
if err := setEncryptionHeaders(req.Header(), encryptionKey, false); err != nil {
return nil, err
}
var obj *raw.Object
var err error
2023-10-31 20:19:51 +01:00
err = run(ctx, func(ctx context.Context) error {
2022-06-28 13:51:45 +02:00
obj, err = req.Context(ctx).Do()
return err
2023-10-31 20:19:51 +01:00
}, s.retry, s.idempotent)
2022-06-28 13:51:45 +02:00
var e *googleapi.Error
if ok := errors.As(err, &e); ok && e.Code == http.StatusNotFound {
return nil, ErrObjectNotExist
}
if err != nil {
return nil, err
}
return newObject(obj), nil
2022-04-12 11:51:54 +02:00
}
2022-06-28 13:51:45 +02:00
func (c *httpStorageClient) UpdateObject(ctx context.Context, bucket, object string, uattrs *ObjectAttrsToUpdate, gen int64, encryptionKey []byte, conds *Conditions, opts ...storageOption) (*ObjectAttrs, error) {
s := callSettings(c.settings, opts...)
var attrs ObjectAttrs
// Lists of fields to send, and set to null, in the JSON.
var forceSendFields, nullFields []string
if uattrs.ContentType != nil {
attrs.ContentType = optional.ToString(uattrs.ContentType)
// For ContentType, sending the empty string is a no-op.
// Instead we send a null.
if attrs.ContentType == "" {
nullFields = append(nullFields, "ContentType")
} else {
forceSendFields = append(forceSendFields, "ContentType")
}
}
if uattrs.ContentLanguage != nil {
attrs.ContentLanguage = optional.ToString(uattrs.ContentLanguage)
// For ContentLanguage it's an error to send the empty string.
// Instead we send a null.
if attrs.ContentLanguage == "" {
nullFields = append(nullFields, "ContentLanguage")
} else {
forceSendFields = append(forceSendFields, "ContentLanguage")
}
}
if uattrs.ContentEncoding != nil {
attrs.ContentEncoding = optional.ToString(uattrs.ContentEncoding)
forceSendFields = append(forceSendFields, "ContentEncoding")
}
if uattrs.ContentDisposition != nil {
attrs.ContentDisposition = optional.ToString(uattrs.ContentDisposition)
forceSendFields = append(forceSendFields, "ContentDisposition")
}
if uattrs.CacheControl != nil {
attrs.CacheControl = optional.ToString(uattrs.CacheControl)
forceSendFields = append(forceSendFields, "CacheControl")
}
if uattrs.EventBasedHold != nil {
attrs.EventBasedHold = optional.ToBool(uattrs.EventBasedHold)
forceSendFields = append(forceSendFields, "EventBasedHold")
}
if uattrs.TemporaryHold != nil {
attrs.TemporaryHold = optional.ToBool(uattrs.TemporaryHold)
forceSendFields = append(forceSendFields, "TemporaryHold")
}
if !uattrs.CustomTime.IsZero() {
attrs.CustomTime = uattrs.CustomTime
forceSendFields = append(forceSendFields, "CustomTime")
}
if uattrs.Metadata != nil {
attrs.Metadata = uattrs.Metadata
if len(attrs.Metadata) == 0 {
// Sending the empty map is a no-op. We send null instead.
nullFields = append(nullFields, "Metadata")
} else {
forceSendFields = append(forceSendFields, "Metadata")
}
}
if uattrs.ACL != nil {
attrs.ACL = uattrs.ACL
// It's an error to attempt to delete the ACL, so
// we don't append to nullFields here.
forceSendFields = append(forceSendFields, "Acl")
}
rawObj := attrs.toRawObject(bucket)
rawObj.ForceSendFields = forceSendFields
rawObj.NullFields = nullFields
2023-10-31 20:19:51 +01:00
call := c.raw.Objects.Patch(bucket, object, rawObj).Projection("full")
2022-06-28 13:51:45 +02:00
if err := applyConds("Update", gen, conds, call); err != nil {
return nil, err
}
if s.userProject != "" {
call.UserProject(s.userProject)
}
if uattrs.PredefinedACL != "" {
call.PredefinedAcl(uattrs.PredefinedACL)
}
if err := setEncryptionHeaders(call.Header(), encryptionKey, false); err != nil {
return nil, err
}
var obj *raw.Object
var err error
2023-10-31 20:19:51 +01:00
err = run(ctx, func(ctx context.Context) error { obj, err = call.Context(ctx).Do(); return err }, s.retry, s.idempotent)
2022-06-28 13:51:45 +02:00
var e *googleapi.Error
if errors.As(err, &e) && e.Code == http.StatusNotFound {
return nil, ErrObjectNotExist
}
if err != nil {
return nil, err
}
return newObject(obj), nil
2022-04-12 11:51:54 +02:00
}
// Default Object ACL methods.
func (c *httpStorageClient) DeleteDefaultObjectACL(ctx context.Context, bucket string, entity ACLEntity, opts ...storageOption) error {
2022-05-20 13:45:24 +02:00
s := callSettings(c.settings, opts...)
req := c.raw.DefaultObjectAccessControls.Delete(bucket, string(entity))
configureACLCall(ctx, s.userProject, req)
2023-10-31 20:19:51 +01:00
return run(ctx, func(ctx context.Context) error { return req.Context(ctx).Do() }, s.retry, s.idempotent)
2022-04-12 11:51:54 +02:00
}
2022-05-20 13:45:24 +02:00
2022-04-12 11:51:54 +02:00
func (c *httpStorageClient) ListDefaultObjectACLs(ctx context.Context, bucket string, opts ...storageOption) ([]ACLRule, error) {
2022-05-20 13:45:24 +02:00
s := callSettings(c.settings, opts...)
var acls *raw.ObjectAccessControls
var err error
req := c.raw.DefaultObjectAccessControls.List(bucket)
configureACLCall(ctx, s.userProject, req)
2023-10-31 20:19:51 +01:00
err = run(ctx, func(ctx context.Context) error {
acls, err = req.Context(ctx).Do()
2022-05-20 13:45:24 +02:00
return err
2023-10-31 20:19:51 +01:00
}, s.retry, true)
2022-05-20 13:45:24 +02:00
if err != nil {
return nil, err
}
return toObjectACLRules(acls.Items), nil
2022-04-12 11:51:54 +02:00
}
2022-07-21 20:10:25 +02:00
func (c *httpStorageClient) UpdateDefaultObjectACL(ctx context.Context, bucket string, entity ACLEntity, role ACLRole, opts ...storageOption) error {
s := callSettings(c.settings, opts...)
type setRequest interface {
Do(opts ...googleapi.CallOption) (*raw.ObjectAccessControl, error)
Header() http.Header
}
acl := &raw.ObjectAccessControl{
Bucket: bucket,
Entity: string(entity),
Role: string(role),
}
var err error
2023-10-31 20:19:51 +01:00
req := c.raw.DefaultObjectAccessControls.Update(bucket, string(entity), acl)
2022-07-21 20:10:25 +02:00
configureACLCall(ctx, s.userProject, req)
2023-10-31 20:19:51 +01:00
return run(ctx, func(ctx context.Context) error {
_, err = req.Context(ctx).Do()
2022-07-21 20:10:25 +02:00
return err
2023-10-31 20:19:51 +01:00
}, s.retry, s.idempotent)
2022-04-12 11:51:54 +02:00
}
// Bucket ACL methods.
func (c *httpStorageClient) DeleteBucketACL(ctx context.Context, bucket string, entity ACLEntity, opts ...storageOption) error {
2022-05-20 13:45:24 +02:00
s := callSettings(c.settings, opts...)
req := c.raw.BucketAccessControls.Delete(bucket, string(entity))
configureACLCall(ctx, s.userProject, req)
2023-10-31 20:19:51 +01:00
return run(ctx, func(ctx context.Context) error { return req.Context(ctx).Do() }, s.retry, s.idempotent)
2022-04-12 11:51:54 +02:00
}
2022-05-20 13:45:24 +02:00
2022-04-12 11:51:54 +02:00
func (c *httpStorageClient) ListBucketACLs(ctx context.Context, bucket string, opts ...storageOption) ([]ACLRule, error) {
2022-05-20 13:45:24 +02:00
s := callSettings(c.settings, opts...)
var acls *raw.BucketAccessControls
var err error
req := c.raw.BucketAccessControls.List(bucket)
configureACLCall(ctx, s.userProject, req)
2023-10-31 20:19:51 +01:00
err = run(ctx, func(ctx context.Context) error {
acls, err = req.Context(ctx).Do()
2022-05-20 13:45:24 +02:00
return err
2023-10-31 20:19:51 +01:00
}, s.retry, true)
2022-05-20 13:45:24 +02:00
if err != nil {
return nil, err
}
return toBucketACLRules(acls.Items), nil
2022-04-12 11:51:54 +02:00
}
2022-05-20 13:45:24 +02:00
2022-07-21 20:10:25 +02:00
func (c *httpStorageClient) UpdateBucketACL(ctx context.Context, bucket string, entity ACLEntity, role ACLRole, opts ...storageOption) error {
2022-05-20 13:45:24 +02:00
s := callSettings(c.settings, opts...)
acl := &raw.BucketAccessControl{
Bucket: bucket,
Entity: string(entity),
Role: string(role),
}
req := c.raw.BucketAccessControls.Update(bucket, string(entity), acl)
configureACLCall(ctx, s.userProject, req)
var err error
2023-10-31 20:19:51 +01:00
return run(ctx, func(ctx context.Context) error {
_, err = req.Context(ctx).Do()
2022-05-20 13:45:24 +02:00
return err
2023-10-31 20:19:51 +01:00
}, s.retry, s.idempotent)
2022-05-20 13:45:24 +02:00
}
// configureACLCall sets the context, user project and headers on the apiary library call.
// This will panic if the call does not have the correct methods.
func configureACLCall(ctx context.Context, userProject string, call interface{ Header() http.Header }) {
vc := reflect.ValueOf(call)
vc.MethodByName("Context").Call([]reflect.Value{reflect.ValueOf(ctx)})
if userProject != "" {
vc.MethodByName("UserProject").Call([]reflect.Value{reflect.ValueOf(userProject)})
}
setClientHeader(call.Header())
2022-04-12 11:51:54 +02:00
}
// Object ACL methods.
func (c *httpStorageClient) DeleteObjectACL(ctx context.Context, bucket, object string, entity ACLEntity, opts ...storageOption) error {
2022-07-21 20:10:25 +02:00
s := callSettings(c.settings, opts...)
req := c.raw.ObjectAccessControls.Delete(bucket, object, string(entity))
configureACLCall(ctx, s.userProject, req)
2023-10-31 20:19:51 +01:00
return run(ctx, func(ctx context.Context) error { return req.Context(ctx).Do() }, s.retry, s.idempotent)
2022-04-12 11:51:54 +02:00
}
2022-06-28 13:51:45 +02:00
// ListObjectACLs retrieves object ACL entries. By default, it operates on the latest generation of this object.
// Selecting a specific generation of this object is not currently supported by the client.
2022-04-12 11:51:54 +02:00
func (c *httpStorageClient) ListObjectACLs(ctx context.Context, bucket, object string, opts ...storageOption) ([]ACLRule, error) {
2022-06-28 13:51:45 +02:00
s := callSettings(c.settings, opts...)
var acls *raw.ObjectAccessControls
var err error
req := c.raw.ObjectAccessControls.List(bucket, object)
configureACLCall(ctx, s.userProject, req)
2023-10-31 20:19:51 +01:00
err = run(ctx, func(ctx context.Context) error {
acls, err = req.Context(ctx).Do()
2022-06-28 13:51:45 +02:00
return err
2023-10-31 20:19:51 +01:00
}, s.retry, s.idempotent)
2022-06-28 13:51:45 +02:00
if err != nil {
return nil, err
}
return toObjectACLRules(acls.Items), nil
2022-04-12 11:51:54 +02:00
}
2022-06-28 13:51:45 +02:00
2022-07-21 20:10:25 +02:00
func (c *httpStorageClient) UpdateObjectACL(ctx context.Context, bucket, object string, entity ACLEntity, role ACLRole, opts ...storageOption) error {
s := callSettings(c.settings, opts...)
type setRequest interface {
Do(opts ...googleapi.CallOption) (*raw.ObjectAccessControl, error)
Header() http.Header
}
acl := &raw.ObjectAccessControl{
Bucket: bucket,
Entity: string(entity),
Role: string(role),
}
var err error
2023-10-31 20:19:51 +01:00
req := c.raw.ObjectAccessControls.Update(bucket, object, string(entity), acl)
2022-07-21 20:10:25 +02:00
configureACLCall(ctx, s.userProject, req)
2023-10-31 20:19:51 +01:00
return run(ctx, func(ctx context.Context) error {
_, err = req.Context(ctx).Do()
2022-07-21 20:10:25 +02:00
return err
2023-10-31 20:19:51 +01:00
}, s.retry, s.idempotent)
2022-04-12 11:51:54 +02:00
}
// Media operations.
func (c *httpStorageClient) ComposeObject(ctx context.Context, req *composeObjectRequest, opts ...storageOption) (*ObjectAttrs, error) {
2022-07-21 20:10:25 +02:00
s := callSettings(c.settings, opts...)
rawReq := &raw.ComposeRequest{}
// Compose requires a non-empty Destination, so we always set it,
// even if the caller-provided ObjectAttrs is the zero value.
rawReq.Destination = req.dstObject.attrs.toRawObject(req.dstBucket)
if req.sendCRC32C {
rawReq.Destination.Crc32c = encodeUint32(req.dstObject.attrs.CRC32C)
}
for _, src := range req.srcs {
srcObj := &raw.ComposeRequestSourceObjects{
Name: src.name,
}
if err := applyConds("ComposeFrom source", src.gen, src.conds, composeSourceObj{srcObj}); err != nil {
return nil, err
}
rawReq.SourceObjects = append(rawReq.SourceObjects, srcObj)
}
2023-10-31 20:19:51 +01:00
call := c.raw.Objects.Compose(req.dstBucket, req.dstObject.name, rawReq)
2022-08-14 23:53:41 +02:00
if err := applyConds("ComposeFrom destination", defaultGen, req.dstObject.conds, call); err != nil {
2022-07-21 20:10:25 +02:00
return nil, err
}
if s.userProject != "" {
call.UserProject(s.userProject)
}
if req.predefinedACL != "" {
call.DestinationPredefinedAcl(req.predefinedACL)
}
2022-08-14 23:53:41 +02:00
if err := setEncryptionHeaders(call.Header(), req.dstObject.encryptionKey, false); err != nil {
2022-07-21 20:10:25 +02:00
return nil, err
}
var obj *raw.Object
setClientHeader(call.Header())
var err error
2023-10-31 20:19:51 +01:00
retryCall := func(ctx context.Context) error { obj, err = call.Context(ctx).Do(); return err }
2022-07-21 20:10:25 +02:00
2023-10-31 20:19:51 +01:00
if err := run(ctx, retryCall, s.retry, s.idempotent); err != nil {
2022-07-21 20:10:25 +02:00
return nil, err
}
return newObject(obj), nil
2022-04-12 11:51:54 +02:00
}
func (c *httpStorageClient) RewriteObject(ctx context.Context, req *rewriteObjectRequest, opts ...storageOption) (*rewriteObjectResponse, error) {
2022-07-21 20:10:25 +02:00
s := callSettings(c.settings, opts...)
rawObject := req.dstObject.attrs.toRawObject("")
call := c.raw.Objects.Rewrite(req.srcObject.bucket, req.srcObject.name, req.dstObject.bucket, req.dstObject.name, rawObject)
2023-10-31 20:19:51 +01:00
call.Projection("full")
2022-07-21 20:10:25 +02:00
if req.token != "" {
call.RewriteToken(req.token)
}
if req.dstObject.keyName != "" {
call.DestinationKmsKeyName(req.dstObject.keyName)
}
if req.predefinedACL != "" {
call.DestinationPredefinedAcl(req.predefinedACL)
}
if err := applyConds("Copy destination", defaultGen, req.dstObject.conds, call); err != nil {
return nil, err
}
if err := applySourceConds(req.srcObject.gen, req.srcObject.conds, call); err != nil {
return nil, err
}
if s.userProject != "" {
call.UserProject(s.userProject)
}
// Set destination encryption headers.
if err := setEncryptionHeaders(call.Header(), req.dstObject.encryptionKey, false); err != nil {
return nil, err
}
// Set source encryption headers.
if err := setEncryptionHeaders(call.Header(), req.srcObject.encryptionKey, true); err != nil {
return nil, err
}
2022-11-10 12:46:33 +01:00
if req.maxBytesRewrittenPerCall != 0 {
call.MaxBytesRewrittenPerCall(req.maxBytesRewrittenPerCall)
}
2022-07-21 20:10:25 +02:00
var res *raw.RewriteResponse
var err error
setClientHeader(call.Header())
2023-10-31 20:19:51 +01:00
retryCall := func(ctx context.Context) error { res, err = call.Context(ctx).Do(); return err }
2022-07-21 20:10:25 +02:00
2023-10-31 20:19:51 +01:00
if err := run(ctx, retryCall, s.retry, s.idempotent); err != nil {
2022-07-21 20:10:25 +02:00
return nil, err
}
r := &rewriteObjectResponse{
done: res.Done,
written: res.TotalBytesRewritten,
2022-08-14 23:53:41 +02:00
size: res.ObjectSize,
2022-07-21 20:10:25 +02:00
token: res.RewriteToken,
resource: newObject(res.Resource),
}
return r, nil
2022-04-12 11:51:54 +02:00
}
2022-06-28 13:51:45 +02:00
func (c *httpStorageClient) NewRangeReader(ctx context.Context, params *newRangeReaderParams, opts ...storageOption) (r *Reader, err error) {
ctx = trace.StartSpan(ctx, "cloud.google.com/go/storage.httpStorageClient.NewRangeReader")
defer func() { trace.EndSpan(ctx, err) }()
s := callSettings(c.settings, opts...)
2023-03-15 21:24:12 +01:00
if c.config.useJSONforReads {
return c.newRangeReaderJSON(ctx, params, s)
}
return c.newRangeReaderXML(ctx, params, s)
}
func (c *httpStorageClient) newRangeReaderXML(ctx context.Context, params *newRangeReaderParams, s *settings) (r *Reader, err error) {
2022-06-28 13:51:45 +02:00
u := &url.URL{
2023-07-07 09:04:32 +02:00
Scheme: c.scheme,
Host: c.xmlHost,
Path: fmt.Sprintf("/%s/%s", params.bucket, params.object),
RawPath: fmt.Sprintf("/%s/%s", params.bucket, url.PathEscape(params.object)),
2022-06-28 13:51:45 +02:00
}
verb := "GET"
if params.length == 0 {
verb = "HEAD"
}
req, err := http.NewRequest(verb, u.String(), nil)
if err != nil {
return nil, err
}
2023-03-15 21:24:12 +01:00
2022-06-28 13:51:45 +02:00
if s.userProject != "" {
req.Header.Set("X-Goog-User-Project", s.userProject)
}
2023-03-15 21:24:12 +01:00
if err := setRangeReaderHeaders(req.Header, params); err != nil {
2022-06-28 13:51:45 +02:00
return nil, err
}
2023-08-29 13:12:56 +02:00
// Set custom headers passed in via the context. This is only required for XML;
// for gRPC & JSON this is handled in the GAPIC and Apiary layers respectively.
ctxHeaders := callctx.HeadersFromContext(ctx)
for k, vals := range ctxHeaders {
for _, v := range vals {
req.Header.Add(k, v)
}
}
2023-03-15 21:24:12 +01:00
reopen := readerReopen(ctx, req.Header, params, s,
2023-10-31 20:19:51 +01:00
func(ctx context.Context) (*http.Response, error) { return c.hc.Do(req.WithContext(ctx)) },
2023-03-15 21:24:12 +01:00
func() error { return setConditionsHeaders(req.Header, params.conds) },
func() { req.URL.RawQuery = fmt.Sprintf("generation=%d", params.gen) })
2022-06-28 13:51:45 +02:00
res, err := reopen(0)
if err != nil {
return nil, err
}
2023-03-15 21:24:12 +01:00
return parseReadResponse(res, params, reopen)
}
2022-06-28 13:51:45 +02:00
2023-03-15 21:24:12 +01:00
func (c *httpStorageClient) newRangeReaderJSON(ctx context.Context, params *newRangeReaderParams, s *settings) (r *Reader, err error) {
call := c.raw.Objects.Get(params.bucket, params.object)
2022-06-28 13:51:45 +02:00
2023-03-15 21:24:12 +01:00
setClientHeader(call.Header())
call.Projection("full")
if s.userProject != "" {
call.UserProject(s.userProject)
2022-06-28 13:51:45 +02:00
}
2023-03-15 21:24:12 +01:00
if err := setRangeReaderHeaders(call.Header(), params); err != nil {
return nil, err
2022-06-28 13:51:45 +02:00
}
2023-10-31 20:19:51 +01:00
reopen := readerReopen(ctx, call.Header(), params, s, func(ctx context.Context) (*http.Response, error) { return call.Context(ctx).Download() },
2023-03-15 21:24:12 +01:00
func() error { return applyConds("NewReader", params.gen, params.conds, call) },
func() { call.Generation(params.gen) })
res, err := reopen(0)
if err != nil {
return nil, err
2022-06-28 13:51:45 +02:00
}
2023-03-15 21:24:12 +01:00
return parseReadResponse(res, params, reopen)
2022-04-12 11:51:54 +02:00
}
2022-06-28 13:51:45 +02:00
func (c *httpStorageClient) OpenWriter(params *openWriterParams, opts ...storageOption) (*io.PipeWriter, error) {
s := callSettings(c.settings, opts...)
errorf := params.setError
setObj := params.setObj
progress := params.progress
attrs := params.attrs
mediaOpts := []googleapi.MediaOption{
googleapi.ChunkSize(params.chunkSize),
}
if c := attrs.ContentType; c != "" {
mediaOpts = append(mediaOpts, googleapi.ContentType(c))
}
if params.chunkRetryDeadline != 0 {
mediaOpts = append(mediaOpts, googleapi.ChunkRetryDeadline(params.chunkRetryDeadline))
}
pr, pw := io.Pipe()
go func() {
defer close(params.donec)
rawObj := attrs.toRawObject(params.bucket)
if params.sendCRC32C {
rawObj.Crc32c = encodeUint32(attrs.CRC32C)
}
if attrs.MD5 != nil {
rawObj.Md5Hash = base64.StdEncoding.EncodeToString(attrs.MD5)
}
call := c.raw.Objects.Insert(params.bucket, rawObj).
Media(pr, mediaOpts...).
Projection("full").
Context(params.ctx).
Name(params.attrs.Name)
call.ProgressUpdater(func(n, _ int64) { progress(n) })
if attrs.KMSKeyName != "" {
call.KmsKeyName(attrs.KMSKeyName)
}
if attrs.PredefinedACL != "" {
call.PredefinedAcl(attrs.PredefinedACL)
}
if err := setEncryptionHeaders(call.Header(), params.encryptionKey, false); err != nil {
errorf(err)
pr.CloseWithError(err)
return
}
var resp *raw.Object
2022-08-14 23:53:41 +02:00
err := applyConds("NewWriter", defaultGen, params.conds, call)
2022-06-28 13:51:45 +02:00
if err == nil {
if s.userProject != "" {
call.UserProject(s.userProject)
}
// TODO(tritone): Remove this code when Uploads begin to support
// retry attempt header injection with "client header" injection.
setClientHeader(call.Header())
// The internals that perform call.Do automatically retry both the initial
// call to set up the upload as well as calls to upload individual chunks
// for a resumable upload (as long as the chunk size is non-zero). Hence
// there is no need to add retries here.
// Retry only when the operation is idempotent or the retry policy is RetryAlways.
var useRetry bool
2022-11-10 12:46:33 +01:00
if (s.retry == nil || s.retry.policy == RetryIdempotent) && s.idempotent {
2022-06-28 13:51:45 +02:00
useRetry = true
} else if s.retry != nil && s.retry.policy == RetryAlways {
useRetry = true
}
if useRetry {
if s.retry != nil {
call.WithRetry(s.retry.backoff, s.retry.shouldRetry)
} else {
call.WithRetry(nil, nil)
}
}
resp, err = call.Do()
}
if err != nil {
errorf(err)
pr.CloseWithError(err)
return
}
setObj(newObject(resp))
}()
return pw, nil
2022-04-12 11:51:54 +02:00
}
// IAM methods.
func (c *httpStorageClient) GetIamPolicy(ctx context.Context, resource string, version int32, opts ...storageOption) (*iampb.Policy, error) {
s := callSettings(c.settings, opts...)
call := c.raw.Buckets.GetIamPolicy(resource).OptionsRequestedPolicyVersion(int64(version))
setClientHeader(call.Header())
if s.userProject != "" {
call.UserProject(s.userProject)
}
var rp *raw.Policy
2023-10-31 20:19:51 +01:00
err := run(ctx, func(ctx context.Context) error {
2022-04-12 11:51:54 +02:00
var err error
rp, err = call.Context(ctx).Do()
return err
2023-10-31 20:19:51 +01:00
}, s.retry, s.idempotent)
2022-04-12 11:51:54 +02:00
if err != nil {
return nil, err
}
return iamFromStoragePolicy(rp), nil
}
func (c *httpStorageClient) SetIamPolicy(ctx context.Context, resource string, policy *iampb.Policy, opts ...storageOption) error {
s := callSettings(c.settings, opts...)
rp := iamToStoragePolicy(policy)
call := c.raw.Buckets.SetIamPolicy(resource, rp)
setClientHeader(call.Header())
if s.userProject != "" {
call.UserProject(s.userProject)
}
2023-10-31 20:19:51 +01:00
return run(ctx, func(ctx context.Context) error {
2022-04-12 11:51:54 +02:00
_, err := call.Context(ctx).Do()
return err
2023-10-31 20:19:51 +01:00
}, s.retry, s.idempotent)
2022-04-12 11:51:54 +02:00
}
func (c *httpStorageClient) TestIamPermissions(ctx context.Context, resource string, permissions []string, opts ...storageOption) ([]string, error) {
s := callSettings(c.settings, opts...)
call := c.raw.Buckets.TestIamPermissions(resource, permissions)
setClientHeader(call.Header())
if s.userProject != "" {
call.UserProject(s.userProject)
}
var res *raw.TestIamPermissionsResponse
2023-10-31 20:19:51 +01:00
err := run(ctx, func(ctx context.Context) error {
2022-04-12 11:51:54 +02:00
var err error
res, err = call.Context(ctx).Do()
return err
2023-10-31 20:19:51 +01:00
}, s.retry, s.idempotent)
2022-04-12 11:51:54 +02:00
if err != nil {
return nil, err
}
return res.Permissions, nil
}
// HMAC Key methods.
2022-07-21 20:10:25 +02:00
func (c *httpStorageClient) GetHMACKey(ctx context.Context, project, accessID string, opts ...storageOption) (*HMACKey, error) {
s := callSettings(c.settings, opts...)
call := c.raw.Projects.HmacKeys.Get(project, accessID)
if s.userProject != "" {
call = call.UserProject(s.userProject)
}
var metadata *raw.HmacKeyMetadata
var err error
2023-10-31 20:19:51 +01:00
if err := run(ctx, func(ctx context.Context) error {
2022-07-21 20:10:25 +02:00
metadata, err = call.Context(ctx).Do()
return err
2023-10-31 20:19:51 +01:00
}, s.retry, s.idempotent); err != nil {
2022-07-21 20:10:25 +02:00
return nil, err
}
hk := &raw.HmacKey{
Metadata: metadata,
}
return toHMACKeyFromRaw(hk, false)
2022-04-12 11:51:54 +02:00
}
2022-07-21 20:10:25 +02:00
func (c *httpStorageClient) ListHMACKeys(ctx context.Context, project, serviceAccountEmail string, showDeletedKeys bool, opts ...storageOption) *HMACKeysIterator {
s := callSettings(c.settings, opts...)
it := &HMACKeysIterator{
ctx: ctx,
raw: c.raw.Projects.HmacKeys,
projectID: project,
retry: s.retry,
}
fetch := func(pageSize int, pageToken string) (token string, err error) {
call := c.raw.Projects.HmacKeys.List(project)
setClientHeader(call.Header())
if pageToken != "" {
call = call.PageToken(pageToken)
}
if pageSize > 0 {
call = call.MaxResults(int64(pageSize))
}
if showDeletedKeys {
call = call.ShowDeletedKeys(true)
}
if s.userProject != "" {
call = call.UserProject(s.userProject)
}
if serviceAccountEmail != "" {
call = call.ServiceAccountEmail(serviceAccountEmail)
}
var resp *raw.HmacKeysMetadata
2023-10-31 20:19:51 +01:00
err = run(it.ctx, func(ctx context.Context) error {
resp, err = call.Context(ctx).Do()
2022-07-21 20:10:25 +02:00
return err
2023-10-31 20:19:51 +01:00
}, s.retry, s.idempotent)
2022-07-21 20:10:25 +02:00
if err != nil {
return "", err
}
for _, metadata := range resp.Items {
hk := &raw.HmacKey{
Metadata: metadata,
}
hkey, err := toHMACKeyFromRaw(hk, true)
if err != nil {
return "", err
}
it.hmacKeys = append(it.hmacKeys, hkey)
}
return resp.NextPageToken, nil
}
it.pageInfo, it.nextFunc = iterator.NewPageInfo(
fetch,
func() int { return len(it.hmacKeys) - it.index },
func() interface{} {
prev := it.hmacKeys
it.hmacKeys = it.hmacKeys[:0]
it.index = 0
return prev
})
return it
2022-04-12 11:51:54 +02:00
}
2022-07-21 20:10:25 +02:00
func (c *httpStorageClient) UpdateHMACKey(ctx context.Context, project, serviceAccountEmail, accessID string, attrs *HMACKeyAttrsToUpdate, opts ...storageOption) (*HMACKey, error) {
s := callSettings(c.settings, opts...)
call := c.raw.Projects.HmacKeys.Update(project, accessID, &raw.HmacKeyMetadata{
Etag: attrs.Etag,
State: string(attrs.State),
})
if s.userProject != "" {
call = call.UserProject(s.userProject)
}
var metadata *raw.HmacKeyMetadata
var err error
2023-10-31 20:19:51 +01:00
if err := run(ctx, func(ctx context.Context) error {
2022-07-21 20:10:25 +02:00
metadata, err = call.Context(ctx).Do()
return err
2023-10-31 20:19:51 +01:00
}, s.retry, s.idempotent); err != nil {
2022-07-21 20:10:25 +02:00
return nil, err
}
hk := &raw.HmacKey{
Metadata: metadata,
}
return toHMACKeyFromRaw(hk, false)
2022-04-12 11:51:54 +02:00
}
2022-07-21 20:10:25 +02:00
func (c *httpStorageClient) CreateHMACKey(ctx context.Context, project, serviceAccountEmail string, opts ...storageOption) (*HMACKey, error) {
s := callSettings(c.settings, opts...)
call := c.raw.Projects.HmacKeys.Create(project, serviceAccountEmail)
if s.userProject != "" {
call = call.UserProject(s.userProject)
}
var hk *raw.HmacKey
2023-10-31 20:19:51 +01:00
if err := run(ctx, func(ctx context.Context) error {
2022-07-21 20:10:25 +02:00
h, err := call.Context(ctx).Do()
hk = h
return err
2023-10-31 20:19:51 +01:00
}, s.retry, s.idempotent); err != nil {
2022-07-21 20:10:25 +02:00
return nil, err
}
return toHMACKeyFromRaw(hk, true)
2022-04-12 11:51:54 +02:00
}
2022-07-21 20:10:25 +02:00
func (c *httpStorageClient) DeleteHMACKey(ctx context.Context, project string, accessID string, opts ...storageOption) error {
s := callSettings(c.settings, opts...)
call := c.raw.Projects.HmacKeys.Delete(project, accessID)
if s.userProject != "" {
call = call.UserProject(s.userProject)
}
2023-10-31 20:19:51 +01:00
return run(ctx, func(ctx context.Context) error {
2022-07-21 20:10:25 +02:00
return call.Context(ctx).Do()
2023-10-31 20:19:51 +01:00
}, s.retry, s.idempotent)
2022-04-12 11:51:54 +02:00
}
2022-06-28 13:51:45 +02:00
// Notification methods.
// ListNotifications returns all the Notifications configured for this bucket, as a map indexed by notification ID.
//
// Note: This API does not support pagination. However, entity limits cap the number of notifications on a single bucket,
// so all results will be returned in the first response. See https://cloud.google.com/storage/quotas#buckets.
func (c *httpStorageClient) ListNotifications(ctx context.Context, bucket string, opts ...storageOption) (n map[string]*Notification, err error) {
ctx = trace.StartSpan(ctx, "cloud.google.com/go/storage.httpStorageClient.ListNotifications")
defer func() { trace.EndSpan(ctx, err) }()
s := callSettings(c.settings, opts...)
call := c.raw.Notifications.List(bucket)
if s.userProject != "" {
call.UserProject(s.userProject)
}
var res *raw.Notifications
2023-10-31 20:19:51 +01:00
err = run(ctx, func(ctx context.Context) error {
2022-06-28 13:51:45 +02:00
res, err = call.Context(ctx).Do()
return err
2023-10-31 20:19:51 +01:00
}, s.retry, true)
2022-06-28 13:51:45 +02:00
if err != nil {
return nil, err
}
return notificationsToMap(res.Items), nil
}
func (c *httpStorageClient) CreateNotification(ctx context.Context, bucket string, n *Notification, opts ...storageOption) (ret *Notification, err error) {
ctx = trace.StartSpan(ctx, "cloud.google.com/go/storage.httpStorageClient.CreateNotification")
defer func() { trace.EndSpan(ctx, err) }()
s := callSettings(c.settings, opts...)
call := c.raw.Notifications.Insert(bucket, toRawNotification(n))
if s.userProject != "" {
call.UserProject(s.userProject)
}
var rn *raw.Notification
2023-10-31 20:19:51 +01:00
err = run(ctx, func(ctx context.Context) error {
2022-06-28 13:51:45 +02:00
rn, err = call.Context(ctx).Do()
return err
2023-10-31 20:19:51 +01:00
}, s.retry, s.idempotent)
2022-06-28 13:51:45 +02:00
if err != nil {
return nil, err
}
return toNotification(rn), nil
}
func (c *httpStorageClient) DeleteNotification(ctx context.Context, bucket string, id string, opts ...storageOption) (err error) {
ctx = trace.StartSpan(ctx, "cloud.google.com/go/storage.httpStorageClient.DeleteNotification")
defer func() { trace.EndSpan(ctx, err) }()
s := callSettings(c.settings, opts...)
call := c.raw.Notifications.Delete(bucket, id)
if s.userProject != "" {
call.UserProject(s.userProject)
}
2023-10-31 20:19:51 +01:00
return run(ctx, func(ctx context.Context) error {
2022-06-28 13:51:45 +02:00
return call.Context(ctx).Do()
2023-10-31 20:19:51 +01:00
}, s.retry, s.idempotent)
2022-06-28 13:51:45 +02:00
}
type httpReader struct {
body io.ReadCloser
seen int64
reopen func(seen int64) (*http.Response, error)
}
func (r *httpReader) Read(p []byte) (int, error) {
n := 0
for len(p[n:]) > 0 {
m, err := r.body.Read(p[n:])
n += m
r.seen += int64(m)
if err == nil || err == io.EOF {
return n, err
}
// Read failed (likely due to connection issues), but we will try to reopen
// the pipe and continue. Send a ranged read request that takes into account
// the number of bytes we've already seen.
res, err := r.reopen(r.seen)
if err != nil {
// reopen already retries
return n, err
}
r.body.Close()
r.body = res.Body
}
return n, nil
}
func (r *httpReader) Close() error {
return r.body.Close()
}
2023-03-15 21:24:12 +01:00
func setRangeReaderHeaders(h http.Header, params *newRangeReaderParams) error {
if params.readCompressed {
h.Set("Accept-Encoding", "gzip")
}
if err := setEncryptionHeaders(h, params.encryptionKey, false); err != nil {
return err
}
return nil
}
// readerReopen initiates a Read with offset and length, assuming we
// have already read seen bytes.
func readerReopen(ctx context.Context, header http.Header, params *newRangeReaderParams, s *settings,
2023-10-31 20:19:51 +01:00
doDownload func(context.Context) (*http.Response, error), applyConditions func() error, setGeneration func()) func(int64) (*http.Response, error) {
2023-03-15 21:24:12 +01:00
return func(seen int64) (*http.Response, error) {
// If the context has already expired, return immediately without making a
// call.
if err := ctx.Err(); err != nil {
return nil, err
}
start := params.offset + seen
if params.length < 0 && start < 0 {
header.Set("Range", fmt.Sprintf("bytes=%d", start))
} else if params.length < 0 && start > 0 {
header.Set("Range", fmt.Sprintf("bytes=%d-", start))
} else if params.length > 0 {
// The end character isn't affected by how many bytes we've seen.
header.Set("Range", fmt.Sprintf("bytes=%d-%d", start, params.offset+params.length-1))
}
// We wait to assign conditions here because the generation number can change in between reopen() runs.
if err := applyConditions(); err != nil {
return nil, err
}
// If an object generation is specified, include generation as query string parameters.
if params.gen >= 0 {
setGeneration()
}
var err error
var res *http.Response
2023-10-31 20:19:51 +01:00
err = run(ctx, func(ctx context.Context) error {
res, err = doDownload(ctx)
2023-03-15 21:24:12 +01:00
if err != nil {
var e *googleapi.Error
if errors.As(err, &e) {
if e.Code == http.StatusNotFound {
return ErrObjectNotExist
}
}
return err
}
if res.StatusCode == http.StatusNotFound {
// this check is necessary only for XML
res.Body.Close()
return ErrObjectNotExist
}
if res.StatusCode < 200 || res.StatusCode > 299 {
body, _ := ioutil.ReadAll(res.Body)
res.Body.Close()
return &googleapi.Error{
Code: res.StatusCode,
Header: res.Header,
Body: string(body),
}
}
partialContentNotSatisfied :=
!decompressiveTranscoding(res) &&
start > 0 && params.length != 0 &&
res.StatusCode != http.StatusPartialContent
if partialContentNotSatisfied {
res.Body.Close()
return errors.New("storage: partial request not satisfied")
}
// With "Content-Encoding": "gzip" aka decompressive transcoding, GCS serves
// back the whole file regardless of the range count passed in as per:
// https://cloud.google.com/storage/docs/transcoding#range,
// thus we have to manually move the body forward by seen bytes.
if decompressiveTranscoding(res) && seen > 0 {
_, _ = io.CopyN(ioutil.Discard, res.Body, seen)
}
// If a generation hasn't been specified, and this is the first response we get, let's record the
// generation. In future requests we'll use this generation as a precondition to avoid data races.
if params.gen < 0 && res.Header.Get("X-Goog-Generation") != "" {
gen64, err := strconv.ParseInt(res.Header.Get("X-Goog-Generation"), 10, 64)
if err != nil {
return err
}
params.gen = gen64
}
return nil
2023-10-31 20:19:51 +01:00
}, s.retry, s.idempotent)
2023-03-15 21:24:12 +01:00
if err != nil {
return nil, err
}
return res, nil
}
}
func parseReadResponse(res *http.Response, params *newRangeReaderParams, reopen func(int64) (*http.Response, error)) (*Reader, error) {
var err error
var (
size int64 // total size of object, even if a range was requested.
checkCRC bool
crc uint32
startOffset int64 // non-zero if range request.
)
if res.StatusCode == http.StatusPartialContent {
cr := strings.TrimSpace(res.Header.Get("Content-Range"))
if !strings.HasPrefix(cr, "bytes ") || !strings.Contains(cr, "/") {
return nil, fmt.Errorf("storage: invalid Content-Range %q", cr)
}
// Content range is formatted <first byte>-<last byte>/<total size>. We take
// the total size.
size, err = strconv.ParseInt(cr[strings.LastIndex(cr, "/")+1:], 10, 64)
if err != nil {
return nil, fmt.Errorf("storage: invalid Content-Range %q", cr)
}
dashIndex := strings.Index(cr, "-")
if dashIndex >= 0 {
startOffset, err = strconv.ParseInt(cr[len("bytes="):dashIndex], 10, 64)
if err != nil {
return nil, fmt.Errorf("storage: invalid Content-Range %q: %w", cr, err)
}
}
} else {
size = res.ContentLength
// Check the CRC iff all of the following hold:
// - We asked for content (length != 0).
// - We got all the content (status != PartialContent).
// - The server sent a CRC header.
// - The Go http stack did not uncompress the file.
// - We were not served compressed data that was uncompressed on download.
// The problem with the last two cases is that the CRC will not match -- GCS
// computes it on the compressed contents, but we compute it on the
// uncompressed contents.
if params.length != 0 && !res.Uncompressed && !uncompressedByServer(res) {
crc, checkCRC = parseCRC32c(res)
}
}
remain := res.ContentLength
body := res.Body
2023-07-07 09:04:32 +02:00
// If the user requested zero bytes, explicitly close and remove the request
// body.
2023-03-15 21:24:12 +01:00
if params.length == 0 {
remain = 0
body.Close()
body = emptyBody
}
var metaGen int64
if res.Header.Get("X-Goog-Metageneration") != "" {
metaGen, err = strconv.ParseInt(res.Header.Get("X-Goog-Metageneration"), 10, 64)
if err != nil {
return nil, err
}
}
var lm time.Time
if res.Header.Get("Last-Modified") != "" {
lm, err = http.ParseTime(res.Header.Get("Last-Modified"))
if err != nil {
return nil, err
}
}
attrs := ReaderObjectAttrs{
Size: size,
ContentType: res.Header.Get("Content-Type"),
ContentEncoding: res.Header.Get("Content-Encoding"),
CacheControl: res.Header.Get("Cache-Control"),
LastModified: lm,
StartOffset: startOffset,
Generation: params.gen,
Metageneration: metaGen,
}
return &Reader{
Attrs: attrs,
size: size,
remain: remain,
wantCRC: crc,
checkCRC: checkCRC,
reader: &httpReader{
reopen: reopen,
body: body,
},
}, nil
}