mirror of
				https://codeberg.org/forgejo/forgejo.git
				synced 2025-10-31 14:31:02 +00:00 
			
		
		
		
	* Add a storage layer for attachments * Fix some bug * fix test * Fix copyright head and lint * Fix bug * Add setting for minio and flags for migrate-storage * Add documents * fix lint * Add test for minio store type on attachments * fix test * fix test * Apply suggestions from code review Co-authored-by: guillep2k <18600385+guillep2k@users.noreply.github.com> * Add warning when storage migrated successfully * Fix drone * fix test * rebase * Fix test * display the error on console * Move minio test to amd64 since minio docker don't support arm64 * refactor the codes * add trace * Fix test * remove log on xorm * Fi download bug * Add a storage layer for attachments * Add setting for minio and flags for migrate-storage * fix lint * Add test for minio store type on attachments * Apply suggestions from code review Co-authored-by: guillep2k <18600385+guillep2k@users.noreply.github.com> * Fix drone * fix test * Fix test * display the error on console * Move minio test to amd64 since minio docker don't support arm64 * refactor the codes * add trace * Fix test * Add URL function to serve attachments directly from S3/Minio * Add ability to enable/disable redirection in attachment configuration * Fix typo * Add a storage layer for attachments * Add setting for minio and flags for migrate-storage * fix lint * Add test for minio store type on attachments * Apply suggestions from code review Co-authored-by: guillep2k <18600385+guillep2k@users.noreply.github.com> * Fix drone * fix test * Fix test * display the error on console * Move minio test to amd64 since minio docker don't support arm64 * don't change unrelated files * Fix lint * Fix build * update go.mod and go.sum * Use github.com/minio/minio-go/v6 * Remove unused function * Upgrade minio to v7 and some other improvements * fix lint * Fix go mod Co-authored-by: guillep2k <18600385+guillep2k@users.noreply.github.com> Co-authored-by: Tyler <tystuyfzand@gmail.com>
		
			
				
	
	
		
			309 lines
		
	
	
	
		
			8.7 KiB
		
	
	
	
		
			Go
		
	
	
	
		
			Vendored
		
	
	
	
			
		
		
	
	
			309 lines
		
	
	
	
		
			8.7 KiB
		
	
	
	
		
			Go
		
	
	
	
		
			Vendored
		
	
	
	
| /*
 | |
|  * MinIO Go Library for Amazon S3 Compatible Cloud Storage
 | |
|  * Copyright 2015-2017 MinIO, Inc.
 | |
|  *
 | |
|  * Licensed under the Apache License, Version 2.0 (the "License");
 | |
|  * you may not use this file except in compliance with the License.
 | |
|  * You may obtain a copy of the License at
 | |
|  *
 | |
|  *     http://www.apache.org/licenses/LICENSE-2.0
 | |
|  *
 | |
|  * Unless required by applicable law or agreed to in writing, software
 | |
|  * distributed under the License is distributed on an "AS IS" BASIS,
 | |
|  * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 | |
|  * See the License for the specific language governing permissions and
 | |
|  * limitations under the License.
 | |
|  */
 | |
| 
 | |
| package minio
 | |
| 
 | |
| import (
 | |
| 	"encoding/base64"
 | |
| 	"fmt"
 | |
| 	"strings"
 | |
| 	"time"
 | |
| )
 | |
| 
 | |
| // expirationDateFormat date format for expiration key in json policy.
 | |
| const expirationDateFormat = "2006-01-02T15:04:05.999Z"
 | |
| 
 | |
| // policyCondition explanation:
 | |
| // http://docs.aws.amazon.com/AmazonS3/latest/API/sigv4-HTTPPOSTConstructPolicy.html
 | |
| //
 | |
| // Example:
 | |
| //
 | |
| //   policyCondition {
 | |
| //       matchType: "$eq",
 | |
| //       key: "$Content-Type",
 | |
| //       value: "image/png",
 | |
| //   }
 | |
| //
 | |
| type policyCondition struct {
 | |
| 	matchType string
 | |
| 	condition string
 | |
| 	value     string
 | |
| }
 | |
| 
 | |
| // PostPolicy - Provides strict static type conversion and validation
 | |
| // for Amazon S3's POST policy JSON string.
 | |
| type PostPolicy struct {
 | |
| 	// Expiration date and time of the POST policy.
 | |
| 	expiration time.Time
 | |
| 	// Collection of different policy conditions.
 | |
| 	conditions []policyCondition
 | |
| 	// ContentLengthRange minimum and maximum allowable size for the
 | |
| 	// uploaded content.
 | |
| 	contentLengthRange struct {
 | |
| 		min int64
 | |
| 		max int64
 | |
| 	}
 | |
| 
 | |
| 	// Post form data.
 | |
| 	formData map[string]string
 | |
| }
 | |
| 
 | |
| // NewPostPolicy - Instantiate new post policy.
 | |
| func NewPostPolicy() *PostPolicy {
 | |
| 	p := &PostPolicy{}
 | |
| 	p.conditions = make([]policyCondition, 0)
 | |
| 	p.formData = make(map[string]string)
 | |
| 	return p
 | |
| }
 | |
| 
 | |
| // SetExpires - Sets expiration time for the new policy.
 | |
| func (p *PostPolicy) SetExpires(t time.Time) error {
 | |
| 	if t.IsZero() {
 | |
| 		return errInvalidArgument("No expiry time set.")
 | |
| 	}
 | |
| 	p.expiration = t
 | |
| 	return nil
 | |
| }
 | |
| 
 | |
| // SetKey - Sets an object name for the policy based upload.
 | |
| func (p *PostPolicy) SetKey(key string) error {
 | |
| 	if strings.TrimSpace(key) == "" || key == "" {
 | |
| 		return errInvalidArgument("Object name is empty.")
 | |
| 	}
 | |
| 	policyCond := policyCondition{
 | |
| 		matchType: "eq",
 | |
| 		condition: "$key",
 | |
| 		value:     key,
 | |
| 	}
 | |
| 	if err := p.addNewPolicy(policyCond); err != nil {
 | |
| 		return err
 | |
| 	}
 | |
| 	p.formData["key"] = key
 | |
| 	return nil
 | |
| }
 | |
| 
 | |
| // SetKeyStartsWith - Sets an object name that an policy based upload
 | |
| // can start with.
 | |
| func (p *PostPolicy) SetKeyStartsWith(keyStartsWith string) error {
 | |
| 	if strings.TrimSpace(keyStartsWith) == "" || keyStartsWith == "" {
 | |
| 		return errInvalidArgument("Object prefix is empty.")
 | |
| 	}
 | |
| 	policyCond := policyCondition{
 | |
| 		matchType: "starts-with",
 | |
| 		condition: "$key",
 | |
| 		value:     keyStartsWith,
 | |
| 	}
 | |
| 	if err := p.addNewPolicy(policyCond); err != nil {
 | |
| 		return err
 | |
| 	}
 | |
| 	p.formData["key"] = keyStartsWith
 | |
| 	return nil
 | |
| }
 | |
| 
 | |
| // SetBucket - Sets bucket at which objects will be uploaded to.
 | |
| func (p *PostPolicy) SetBucket(bucketName string) error {
 | |
| 	if strings.TrimSpace(bucketName) == "" || bucketName == "" {
 | |
| 		return errInvalidArgument("Bucket name is empty.")
 | |
| 	}
 | |
| 	policyCond := policyCondition{
 | |
| 		matchType: "eq",
 | |
| 		condition: "$bucket",
 | |
| 		value:     bucketName,
 | |
| 	}
 | |
| 	if err := p.addNewPolicy(policyCond); err != nil {
 | |
| 		return err
 | |
| 	}
 | |
| 	p.formData["bucket"] = bucketName
 | |
| 	return nil
 | |
| }
 | |
| 
 | |
| // SetCondition - Sets condition for credentials, date and algorithm
 | |
| func (p *PostPolicy) SetCondition(matchType, condition, value string) error {
 | |
| 	if strings.TrimSpace(value) == "" || value == "" {
 | |
| 		return errInvalidArgument("No value specified for condition")
 | |
| 	}
 | |
| 
 | |
| 	policyCond := policyCondition{
 | |
| 		matchType: matchType,
 | |
| 		condition: "$" + condition,
 | |
| 		value:     value,
 | |
| 	}
 | |
| 	if condition == "X-Amz-Credential" || condition == "X-Amz-Date" || condition == "X-Amz-Algorithm" {
 | |
| 		if err := p.addNewPolicy(policyCond); err != nil {
 | |
| 			return err
 | |
| 		}
 | |
| 		p.formData[condition] = value
 | |
| 		return nil
 | |
| 	}
 | |
| 	return errInvalidArgument("Invalid condition in policy")
 | |
| }
 | |
| 
 | |
| // SetContentType - Sets content-type of the object for this policy
 | |
| // based upload.
 | |
| func (p *PostPolicy) SetContentType(contentType string) error {
 | |
| 	if strings.TrimSpace(contentType) == "" || contentType == "" {
 | |
| 		return errInvalidArgument("No content type specified.")
 | |
| 	}
 | |
| 	policyCond := policyCondition{
 | |
| 		matchType: "eq",
 | |
| 		condition: "$Content-Type",
 | |
| 		value:     contentType,
 | |
| 	}
 | |
| 	if err := p.addNewPolicy(policyCond); err != nil {
 | |
| 		return err
 | |
| 	}
 | |
| 	p.formData["Content-Type"] = contentType
 | |
| 	return nil
 | |
| }
 | |
| 
 | |
| // SetContentLengthRange - Set new min and max content length
 | |
| // condition for all incoming uploads.
 | |
| func (p *PostPolicy) SetContentLengthRange(min, max int64) error {
 | |
| 	if min > max {
 | |
| 		return errInvalidArgument("Minimum limit is larger than maximum limit.")
 | |
| 	}
 | |
| 	if min < 0 {
 | |
| 		return errInvalidArgument("Minimum limit cannot be negative.")
 | |
| 	}
 | |
| 	if max < 0 {
 | |
| 		return errInvalidArgument("Maximum limit cannot be negative.")
 | |
| 	}
 | |
| 	p.contentLengthRange.min = min
 | |
| 	p.contentLengthRange.max = max
 | |
| 	return nil
 | |
| }
 | |
| 
 | |
| // SetSuccessActionRedirect - Sets the redirect success url of the object for this policy
 | |
| // based upload.
 | |
| func (p *PostPolicy) SetSuccessActionRedirect(redirect string) error {
 | |
| 	if strings.TrimSpace(redirect) == "" || redirect == "" {
 | |
| 		return errInvalidArgument("Redirect is empty")
 | |
| 	}
 | |
| 	policyCond := policyCondition{
 | |
| 		matchType: "eq",
 | |
| 		condition: "$success_action_redirect",
 | |
| 		value:     redirect,
 | |
| 	}
 | |
| 	if err := p.addNewPolicy(policyCond); err != nil {
 | |
| 		return err
 | |
| 	}
 | |
| 	p.formData["success_action_redirect"] = redirect
 | |
| 	return nil
 | |
| }
 | |
| 
 | |
| // SetSuccessStatusAction - Sets the status success code of the object for this policy
 | |
| // based upload.
 | |
| func (p *PostPolicy) SetSuccessStatusAction(status string) error {
 | |
| 	if strings.TrimSpace(status) == "" || status == "" {
 | |
| 		return errInvalidArgument("Status is empty")
 | |
| 	}
 | |
| 	policyCond := policyCondition{
 | |
| 		matchType: "eq",
 | |
| 		condition: "$success_action_status",
 | |
| 		value:     status,
 | |
| 	}
 | |
| 	if err := p.addNewPolicy(policyCond); err != nil {
 | |
| 		return err
 | |
| 	}
 | |
| 	p.formData["success_action_status"] = status
 | |
| 	return nil
 | |
| }
 | |
| 
 | |
| // SetUserMetadata - Set user metadata as a key/value couple.
 | |
| // Can be retrieved through a HEAD request or an event.
 | |
| func (p *PostPolicy) SetUserMetadata(key string, value string) error {
 | |
| 	if strings.TrimSpace(key) == "" || key == "" {
 | |
| 		return errInvalidArgument("Key is empty")
 | |
| 	}
 | |
| 	if strings.TrimSpace(value) == "" || value == "" {
 | |
| 		return errInvalidArgument("Value is empty")
 | |
| 	}
 | |
| 	headerName := fmt.Sprintf("x-amz-meta-%s", key)
 | |
| 	policyCond := policyCondition{
 | |
| 		matchType: "eq",
 | |
| 		condition: fmt.Sprintf("$%s", headerName),
 | |
| 		value:     value,
 | |
| 	}
 | |
| 	if err := p.addNewPolicy(policyCond); err != nil {
 | |
| 		return err
 | |
| 	}
 | |
| 	p.formData[headerName] = value
 | |
| 	return nil
 | |
| }
 | |
| 
 | |
| // SetUserData - Set user data as a key/value couple.
 | |
| // Can be retrieved through a HEAD request or an event.
 | |
| func (p *PostPolicy) SetUserData(key string, value string) error {
 | |
| 	if key == "" {
 | |
| 		return errInvalidArgument("Key is empty")
 | |
| 	}
 | |
| 	if value == "" {
 | |
| 		return errInvalidArgument("Value is empty")
 | |
| 	}
 | |
| 	headerName := fmt.Sprintf("x-amz-%s", key)
 | |
| 	policyCond := policyCondition{
 | |
| 		matchType: "eq",
 | |
| 		condition: fmt.Sprintf("$%s", headerName),
 | |
| 		value:     value,
 | |
| 	}
 | |
| 	if err := p.addNewPolicy(policyCond); err != nil {
 | |
| 		return err
 | |
| 	}
 | |
| 	p.formData[headerName] = value
 | |
| 	return nil
 | |
| }
 | |
| 
 | |
| // addNewPolicy - internal helper to validate adding new policies.
 | |
| func (p *PostPolicy) addNewPolicy(policyCond policyCondition) error {
 | |
| 	if policyCond.matchType == "" || policyCond.condition == "" || policyCond.value == "" {
 | |
| 		return errInvalidArgument("Policy fields are empty.")
 | |
| 	}
 | |
| 	p.conditions = append(p.conditions, policyCond)
 | |
| 	return nil
 | |
| }
 | |
| 
 | |
| // String function for printing policy in json formatted string.
 | |
| func (p PostPolicy) String() string {
 | |
| 	return string(p.marshalJSON())
 | |
| }
 | |
| 
 | |
| // marshalJSON - Provides Marshaled JSON in bytes.
 | |
| func (p PostPolicy) marshalJSON() []byte {
 | |
| 	expirationStr := `"expiration":"` + p.expiration.Format(expirationDateFormat) + `"`
 | |
| 	var conditionsStr string
 | |
| 	conditions := []string{}
 | |
| 	for _, po := range p.conditions {
 | |
| 		conditions = append(conditions, fmt.Sprintf("[\"%s\",\"%s\",\"%s\"]", po.matchType, po.condition, po.value))
 | |
| 	}
 | |
| 	if p.contentLengthRange.min != 0 || p.contentLengthRange.max != 0 {
 | |
| 		conditions = append(conditions, fmt.Sprintf("[\"content-length-range\", %d, %d]",
 | |
| 			p.contentLengthRange.min, p.contentLengthRange.max))
 | |
| 	}
 | |
| 	if len(conditions) > 0 {
 | |
| 		conditionsStr = `"conditions":[` + strings.Join(conditions, ",") + "]"
 | |
| 	}
 | |
| 	retStr := "{"
 | |
| 	retStr = retStr + expirationStr + ","
 | |
| 	retStr = retStr + conditionsStr
 | |
| 	retStr = retStr + "}"
 | |
| 	return []byte(retStr)
 | |
| }
 | |
| 
 | |
| // base64 - Produces base64 of PostPolicy's Marshaled json.
 | |
| func (p PostPolicy) base64() string {
 | |
| 	return base64.StdEncoding.EncodeToString(p.marshalJSON())
 | |
| }
 |