2019-11-07 19:05:39 +00:00
|
|
|
// Copyright 2019 Google LLC
|
|
|
|
//
|
|
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
// you may not use this file except in compliance with the License.
|
|
|
|
// You may obtain a copy of the License at
|
|
|
|
//
|
|
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
//
|
|
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
// See the License for the specific language governing permissions and
|
|
|
|
// limitations under the License.
|
|
|
|
|
|
|
|
package storage
|
|
|
|
|
|
|
|
import (
|
|
|
|
"context"
|
|
|
|
"errors"
|
|
|
|
"fmt"
|
|
|
|
"time"
|
|
|
|
|
2023-07-07 07:05:50 +00:00
|
|
|
"cloud.google.com/go/storage/internal/apiv2/storagepb"
|
2019-11-07 19:05:39 +00:00
|
|
|
"google.golang.org/api/iterator"
|
|
|
|
raw "google.golang.org/api/storage/v1"
|
|
|
|
)
|
|
|
|
|
|
|
|
// HMACState is the state of the HMAC key.
|
|
|
|
type HMACState string
|
|
|
|
|
|
|
|
const (
|
|
|
|
// Active is the status for an active key that can be used to sign
|
|
|
|
// requests.
|
|
|
|
Active HMACState = "ACTIVE"
|
|
|
|
|
|
|
|
// Inactive is the status for an inactive key thus requests signed by
|
|
|
|
// this key will be denied.
|
|
|
|
Inactive HMACState = "INACTIVE"
|
|
|
|
|
|
|
|
// Deleted is the status for a key that is deleted.
|
|
|
|
// Once in this state the key cannot key cannot be recovered
|
|
|
|
// and does not count towards key limits. Deleted keys will be cleaned
|
|
|
|
// up later.
|
|
|
|
Deleted HMACState = "DELETED"
|
|
|
|
)
|
|
|
|
|
|
|
|
// HMACKey is the representation of a Google Cloud Storage HMAC key.
|
|
|
|
//
|
|
|
|
// HMAC keys are used to authenticate signed access to objects. To enable HMAC key
|
|
|
|
// authentication, please visit https://cloud.google.com/storage/docs/migrating.
|
|
|
|
type HMACKey struct {
|
|
|
|
// The HMAC's secret key.
|
|
|
|
Secret string
|
|
|
|
|
|
|
|
// AccessID is the ID of the HMAC key.
|
|
|
|
AccessID string
|
|
|
|
|
|
|
|
// Etag is the HTTP/1.1 Entity tag.
|
|
|
|
Etag string
|
|
|
|
|
|
|
|
// ID is the ID of the HMAC key, including the ProjectID and AccessID.
|
|
|
|
ID string
|
|
|
|
|
|
|
|
// ProjectID is the ID of the project that owns the
|
|
|
|
// service account to which the key authenticates.
|
|
|
|
ProjectID string
|
|
|
|
|
|
|
|
// ServiceAccountEmail is the email address
|
|
|
|
// of the key's associated service account.
|
|
|
|
ServiceAccountEmail string
|
|
|
|
|
|
|
|
// CreatedTime is the creation time of the HMAC key.
|
|
|
|
CreatedTime time.Time
|
|
|
|
|
|
|
|
// UpdatedTime is the last modification time of the HMAC key metadata.
|
|
|
|
UpdatedTime time.Time
|
|
|
|
|
|
|
|
// State is the state of the HMAC key.
|
|
|
|
// It can be one of StateActive, StateInactive or StateDeleted.
|
|
|
|
State HMACState
|
|
|
|
}
|
|
|
|
|
|
|
|
// HMACKeyHandle helps provide access and management for HMAC keys.
|
|
|
|
type HMACKeyHandle struct {
|
|
|
|
projectID string
|
|
|
|
accessID string
|
2022-01-27 11:16:16 +00:00
|
|
|
retry *retryConfig
|
2022-08-14 21:53:41 +00:00
|
|
|
tc storageClient
|
2019-11-07 19:05:39 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// HMACKeyHandle creates a handle that will be used for HMACKey operations.
|
|
|
|
func (c *Client) HMACKeyHandle(projectID, accessID string) *HMACKeyHandle {
|
|
|
|
return &HMACKeyHandle{
|
|
|
|
projectID: projectID,
|
|
|
|
accessID: accessID,
|
2022-01-27 11:16:16 +00:00
|
|
|
retry: c.retry,
|
2022-08-14 21:53:41 +00:00
|
|
|
tc: c.tc,
|
2019-11-07 19:05:39 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Get invokes an RPC to retrieve the HMAC key referenced by the
|
|
|
|
// HMACKeyHandle's accessID.
|
|
|
|
//
|
|
|
|
// Options such as UserProjectForHMACKeys can be used to set the
|
|
|
|
// userProject to be billed against for operations.
|
|
|
|
func (hkh *HMACKeyHandle) Get(ctx context.Context, opts ...HMACKeyOption) (*HMACKey, error) {
|
|
|
|
desc := new(hmacKeyDesc)
|
|
|
|
for _, opt := range opts {
|
|
|
|
opt.withHMACKeyDesc(desc)
|
|
|
|
}
|
|
|
|
|
2022-08-14 21:53:41 +00:00
|
|
|
o := makeStorageOpts(true, hkh.retry, desc.userProjectID)
|
|
|
|
hk, err := hkh.tc.GetHMACKey(ctx, hkh.projectID, hkh.accessID, o...)
|
2019-11-07 19:05:39 +00:00
|
|
|
|
2022-08-14 21:53:41 +00:00
|
|
|
return hk, err
|
2019-11-07 19:05:39 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Delete invokes an RPC to delete the key referenced by accessID, on Google Cloud Storage.
|
|
|
|
// Only inactive HMAC keys can be deleted.
|
|
|
|
// After deletion, a key cannot be used to authenticate requests.
|
|
|
|
func (hkh *HMACKeyHandle) Delete(ctx context.Context, opts ...HMACKeyOption) error {
|
|
|
|
desc := new(hmacKeyDesc)
|
|
|
|
for _, opt := range opts {
|
|
|
|
opt.withHMACKeyDesc(desc)
|
|
|
|
}
|
|
|
|
|
2022-08-14 21:53:41 +00:00
|
|
|
o := makeStorageOpts(true, hkh.retry, desc.userProjectID)
|
|
|
|
return hkh.tc.DeleteHMACKey(ctx, hkh.projectID, hkh.accessID, o...)
|
2019-11-07 19:05:39 +00:00
|
|
|
}
|
|
|
|
|
2022-07-21 18:10:25 +00:00
|
|
|
func toHMACKeyFromRaw(hk *raw.HmacKey, updatedTimeCanBeNil bool) (*HMACKey, error) {
|
|
|
|
hkmd := hk.Metadata
|
|
|
|
if hkmd == nil {
|
2019-11-07 19:05:39 +00:00
|
|
|
return nil, errors.New("field Metadata cannot be nil")
|
|
|
|
}
|
2022-07-21 18:10:25 +00:00
|
|
|
createdTime, err := time.Parse(time.RFC3339, hkmd.TimeCreated)
|
2019-11-07 19:05:39 +00:00
|
|
|
if err != nil {
|
2022-11-10 11:46:33 +00:00
|
|
|
return nil, fmt.Errorf("field CreatedTime: %w", err)
|
2019-11-07 19:05:39 +00:00
|
|
|
}
|
2022-07-21 18:10:25 +00:00
|
|
|
updatedTime, err := time.Parse(time.RFC3339, hkmd.Updated)
|
2019-11-07 19:05:39 +00:00
|
|
|
if err != nil && !updatedTimeCanBeNil {
|
2022-11-10 11:46:33 +00:00
|
|
|
return nil, fmt.Errorf("field UpdatedTime: %w", err)
|
2019-11-07 19:05:39 +00:00
|
|
|
}
|
|
|
|
|
2022-07-21 18:10:25 +00:00
|
|
|
hmKey := &HMACKey{
|
|
|
|
AccessID: hkmd.AccessId,
|
|
|
|
Secret: hk.Secret,
|
|
|
|
Etag: hkmd.Etag,
|
|
|
|
ID: hkmd.Id,
|
|
|
|
State: HMACState(hkmd.State),
|
|
|
|
ProjectID: hkmd.ProjectId,
|
2019-11-07 19:05:39 +00:00
|
|
|
CreatedTime: createdTime,
|
|
|
|
UpdatedTime: updatedTime,
|
|
|
|
|
2022-07-21 18:10:25 +00:00
|
|
|
ServiceAccountEmail: hkmd.ServiceAccountEmail,
|
2019-11-07 19:05:39 +00:00
|
|
|
}
|
|
|
|
|
2022-07-21 18:10:25 +00:00
|
|
|
return hmKey, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func toHMACKeyFromProto(pbmd *storagepb.HmacKeyMetadata) *HMACKey {
|
|
|
|
if pbmd == nil {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
return &HMACKey{
|
|
|
|
AccessID: pbmd.GetAccessId(),
|
|
|
|
ID: pbmd.GetId(),
|
|
|
|
State: HMACState(pbmd.GetState()),
|
|
|
|
ProjectID: pbmd.GetProject(),
|
|
|
|
CreatedTime: convertProtoTime(pbmd.GetCreateTime()),
|
|
|
|
UpdatedTime: convertProtoTime(pbmd.GetUpdateTime()),
|
|
|
|
ServiceAccountEmail: pbmd.GetServiceAccountEmail(),
|
|
|
|
}
|
2019-11-07 19:05:39 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// CreateHMACKey invokes an RPC for Google Cloud Storage to create a new HMACKey.
|
|
|
|
func (c *Client) CreateHMACKey(ctx context.Context, projectID, serviceAccountEmail string, opts ...HMACKeyOption) (*HMACKey, error) {
|
|
|
|
if projectID == "" {
|
|
|
|
return nil, errors.New("storage: expecting a non-blank projectID")
|
|
|
|
}
|
|
|
|
if serviceAccountEmail == "" {
|
|
|
|
return nil, errors.New("storage: expecting a non-blank service account email")
|
|
|
|
}
|
|
|
|
|
|
|
|
desc := new(hmacKeyDesc)
|
|
|
|
for _, opt := range opts {
|
|
|
|
opt.withHMACKeyDesc(desc)
|
|
|
|
}
|
|
|
|
|
2022-08-14 21:53:41 +00:00
|
|
|
o := makeStorageOpts(false, c.retry, desc.userProjectID)
|
|
|
|
hk, err := c.tc.CreateHMACKey(ctx, projectID, serviceAccountEmail, o...)
|
|
|
|
return hk, err
|
2019-11-07 19:05:39 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// HMACKeyAttrsToUpdate defines the attributes of an HMACKey that will be updated.
|
|
|
|
type HMACKeyAttrsToUpdate struct {
|
|
|
|
// State is required and must be either StateActive or StateInactive.
|
|
|
|
State HMACState
|
|
|
|
|
|
|
|
// Etag is an optional field and it is the HTTP/1.1 Entity tag.
|
|
|
|
Etag string
|
|
|
|
}
|
|
|
|
|
|
|
|
// Update mutates the HMACKey referred to by accessID.
|
|
|
|
func (h *HMACKeyHandle) Update(ctx context.Context, au HMACKeyAttrsToUpdate, opts ...HMACKeyOption) (*HMACKey, error) {
|
|
|
|
if au.State != Active && au.State != Inactive {
|
|
|
|
return nil, fmt.Errorf("storage: invalid state %q for update, must be either %q or %q", au.State, Active, Inactive)
|
|
|
|
}
|
|
|
|
|
|
|
|
desc := new(hmacKeyDesc)
|
|
|
|
for _, opt := range opts {
|
|
|
|
opt.withHMACKeyDesc(desc)
|
|
|
|
}
|
|
|
|
|
2022-01-27 11:16:16 +00:00
|
|
|
isIdempotent := len(au.Etag) > 0
|
2022-08-14 21:53:41 +00:00
|
|
|
o := makeStorageOpts(isIdempotent, h.retry, desc.userProjectID)
|
|
|
|
hk, err := h.tc.UpdateHMACKey(ctx, h.projectID, desc.forServiceAccountEmail, h.accessID, &au, o...)
|
|
|
|
return hk, err
|
2019-11-07 19:05:39 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// An HMACKeysIterator is an iterator over HMACKeys.
|
|
|
|
//
|
|
|
|
// Note: This iterator is not safe for concurrent operations without explicit synchronization.
|
|
|
|
type HMACKeysIterator struct {
|
|
|
|
ctx context.Context
|
|
|
|
raw *raw.ProjectsHmacKeysService
|
|
|
|
projectID string
|
|
|
|
hmacKeys []*HMACKey
|
|
|
|
pageInfo *iterator.PageInfo
|
|
|
|
nextFunc func() error
|
|
|
|
index int
|
|
|
|
desc hmacKeyDesc
|
2022-01-27 11:16:16 +00:00
|
|
|
retry *retryConfig
|
2019-11-07 19:05:39 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// ListHMACKeys returns an iterator for listing HMACKeys.
|
|
|
|
//
|
|
|
|
// Note: This iterator is not safe for concurrent operations without explicit synchronization.
|
|
|
|
func (c *Client) ListHMACKeys(ctx context.Context, projectID string, opts ...HMACKeyOption) *HMACKeysIterator {
|
2022-08-14 21:53:41 +00:00
|
|
|
desc := new(hmacKeyDesc)
|
2019-11-07 19:05:39 +00:00
|
|
|
for _, opt := range opts {
|
2022-08-14 21:53:41 +00:00
|
|
|
opt.withHMACKeyDesc(desc)
|
2019-11-07 19:05:39 +00:00
|
|
|
}
|
|
|
|
|
2022-08-14 21:53:41 +00:00
|
|
|
o := makeStorageOpts(true, c.retry, desc.userProjectID)
|
|
|
|
return c.tc.ListHMACKeys(ctx, projectID, desc.forServiceAccountEmail, desc.showDeletedKeys, o...)
|
2019-11-07 19:05:39 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Next returns the next result. Its second return value is iterator.Done if
|
|
|
|
// there are no more results. Once Next returns iterator.Done, all subsequent
|
|
|
|
// calls will return iterator.Done.
|
|
|
|
//
|
|
|
|
// Note: This iterator is not safe for concurrent operations without explicit synchronization.
|
|
|
|
func (it *HMACKeysIterator) Next() (*HMACKey, error) {
|
|
|
|
if err := it.nextFunc(); err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
key := it.hmacKeys[it.index]
|
|
|
|
it.index++
|
|
|
|
|
|
|
|
return key, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// PageInfo supports pagination. See the google.golang.org/api/iterator package for details.
|
|
|
|
//
|
|
|
|
// Note: This iterator is not safe for concurrent operations without explicit synchronization.
|
|
|
|
func (it *HMACKeysIterator) PageInfo() *iterator.PageInfo { return it.pageInfo }
|
|
|
|
|
|
|
|
func (it *HMACKeysIterator) fetch(pageSize int, pageToken string) (token string, err error) {
|
2022-07-21 18:10:25 +00:00
|
|
|
// TODO: Remove fetch method upon integration. This method is internalized into
|
|
|
|
// httpStorageClient.ListHMACKeys() as it is the only caller.
|
2019-11-07 19:05:39 +00:00
|
|
|
call := it.raw.List(it.projectID)
|
|
|
|
setClientHeader(call.Header())
|
|
|
|
if pageToken != "" {
|
|
|
|
call = call.PageToken(pageToken)
|
|
|
|
}
|
|
|
|
if it.desc.showDeletedKeys {
|
|
|
|
call = call.ShowDeletedKeys(true)
|
|
|
|
}
|
|
|
|
if it.desc.userProjectID != "" {
|
|
|
|
call = call.UserProject(it.desc.userProjectID)
|
|
|
|
}
|
|
|
|
if it.desc.forServiceAccountEmail != "" {
|
|
|
|
call = call.ServiceAccountEmail(it.desc.forServiceAccountEmail)
|
|
|
|
}
|
|
|
|
if pageSize > 0 {
|
|
|
|
call = call.MaxResults(int64(pageSize))
|
|
|
|
}
|
|
|
|
|
|
|
|
var resp *raw.HmacKeysMetadata
|
2023-11-01 22:32:17 +00:00
|
|
|
err = run(it.ctx, func(ctx context.Context) error {
|
2019-11-07 19:05:39 +00:00
|
|
|
resp, err = call.Context(ctx).Do()
|
|
|
|
return err
|
2023-11-01 22:32:17 +00:00
|
|
|
}, it.retry, true)
|
2019-11-07 19:05:39 +00:00
|
|
|
if err != nil {
|
|
|
|
return "", err
|
|
|
|
}
|
|
|
|
|
|
|
|
for _, metadata := range resp.Items {
|
2022-07-21 18:10:25 +00:00
|
|
|
hk := &raw.HmacKey{
|
2019-11-07 19:05:39 +00:00
|
|
|
Metadata: metadata,
|
|
|
|
}
|
2022-07-21 18:10:25 +00:00
|
|
|
hkey, err := toHMACKeyFromRaw(hk, true)
|
2019-11-07 19:05:39 +00:00
|
|
|
if err != nil {
|
|
|
|
return "", err
|
|
|
|
}
|
|
|
|
it.hmacKeys = append(it.hmacKeys, hkey)
|
|
|
|
}
|
|
|
|
return resp.NextPageToken, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
type hmacKeyDesc struct {
|
|
|
|
forServiceAccountEmail string
|
|
|
|
showDeletedKeys bool
|
|
|
|
userProjectID string
|
|
|
|
}
|
|
|
|
|
|
|
|
// HMACKeyOption configures the behavior of HMACKey related methods and actions.
|
|
|
|
type HMACKeyOption interface {
|
|
|
|
withHMACKeyDesc(*hmacKeyDesc)
|
|
|
|
}
|
|
|
|
|
|
|
|
type hmacKeyDescFunc func(*hmacKeyDesc)
|
|
|
|
|
|
|
|
func (hkdf hmacKeyDescFunc) withHMACKeyDesc(hkd *hmacKeyDesc) {
|
|
|
|
hkdf(hkd)
|
|
|
|
}
|
|
|
|
|
|
|
|
// ForHMACKeyServiceAccountEmail returns HMAC Keys that are
|
|
|
|
// associated with the email address of a service account in the project.
|
|
|
|
//
|
|
|
|
// Only one service account email can be used as a filter, so if multiple
|
|
|
|
// of these options are applied, the last email to be set will be used.
|
|
|
|
func ForHMACKeyServiceAccountEmail(serviceAccountEmail string) HMACKeyOption {
|
|
|
|
return hmacKeyDescFunc(func(hkd *hmacKeyDesc) {
|
|
|
|
hkd.forServiceAccountEmail = serviceAccountEmail
|
|
|
|
})
|
|
|
|
}
|
|
|
|
|
|
|
|
// ShowDeletedHMACKeys will also list keys whose state is "DELETED".
|
|
|
|
func ShowDeletedHMACKeys() HMACKeyOption {
|
|
|
|
return hmacKeyDescFunc(func(hkd *hmacKeyDesc) {
|
|
|
|
hkd.showDeletedKeys = true
|
|
|
|
})
|
|
|
|
}
|
|
|
|
|
|
|
|
// UserProjectForHMACKeys will bill the request against userProjectID
|
|
|
|
// if userProjectID is non-empty.
|
|
|
|
//
|
|
|
|
// Note: This is a noop right now and only provided for API compatibility.
|
|
|
|
func UserProjectForHMACKeys(userProjectID string) HMACKeyOption {
|
|
|
|
return hmacKeyDescFunc(func(hkd *hmacKeyDesc) {
|
|
|
|
hkd.userProjectID = userProjectID
|
|
|
|
})
|
|
|
|
}
|