2013-01-31 14:40:38 -05:00
require 'fog/internet_archive'
require 'fog/storage'
module Fog
module Storage
class InternetArchive < Fog :: Service
requires :ia_access_key_id , :ia_secret_access_key
recognizes :endpoint , :region , :host , :path , :port , :scheme , :persistent , :ia_session_token , :ia_credentials_expire_at
secrets :ia_secret_access_key , :hmac
model_path 'fog/internet_archive/models/storage'
collection :directories
model :directory
collection :files
model :file
request_path 'fog/internet_archive/requests/storage'
request :abort_multipart_upload
request :complete_multipart_upload
request :copy_object
request :delete_bucket
request :delete_bucket_cors
request :delete_bucket_lifecycle
request :delete_bucket_policy
request :delete_bucket_website
request :delete_object
request :delete_multiple_objects
request :get_bucket
request :get_bucket_acl
request :get_bucket_cors
request :get_bucket_lifecycle
request :get_bucket_location
request :get_bucket_logging
request :get_bucket_policy
request :get_bucket_website
request :get_object
request :get_object_acl
request :get_object_torrent
request :get_object_http_url
request :get_object_https_url
request :get_object_url
request :get_request_payment
request :get_service
request :head_object
request :initiate_multipart_upload
request :list_multipart_uploads
request :list_parts
request :post_object_hidden_fields
request :put_bucket
request :put_bucket_acl
request :put_bucket_cors
request :put_bucket_lifecycle
request :put_bucket_logging
request :put_bucket_policy
request :put_bucket_website
request :put_object
request :put_object_acl
request :put_object_url
request :put_request_payment
request :sync_clock
request :upload_part
module Utils
attr_accessor :region
def http_url ( params , expires )
scheme_host_path_query ( params . merge ( :scheme = > 'http' , :port = > 80 ) , expires )
end
def https_url ( params , expires )
scheme_host_path_query ( params . merge ( :scheme = > 'https' , :port = > 443 ) , expires )
end
def url ( params , expires )
Fog :: Logger . deprecation ( " Fog::Storage::InternetArchive => # url is deprecated, use # https_url instead [light_black]( #{ caller . first } )[/] " )
2013-03-06 15:06:26 -05:00
http_url ( params , expires )
2013-01-31 14:40:38 -05:00
end
2013-03-26 17:21:57 -04:00
2013-01-31 14:40:38 -05:00
private
def scheme_host_path_query ( params , expires )
params [ :scheme ] || = @scheme
if params [ :port ] == 80 && params [ :scheme ] == 'http'
params . delete ( :port )
end
if params [ :port ] == 443 && params [ :scheme ] == 'https'
params . delete ( :port )
end
params [ :headers ] || = { }
params [ :headers ] [ 'Date' ] = expires . to_i
params [ :path ] = Fog :: InternetArchive . escape ( params [ :path ] ) . gsub ( '%2F' , '/' )
query = [ ]
params [ :headers ] [ 'x-amz-security-token' ] = @ia_session_token if @ia_session_token
if params [ :query ]
for key , value in params [ :query ]
query << " #{ key } = #{ Fog :: InternetArchive . escape ( value ) } "
end
end
query << " AWSAccessKeyId= #{ @ia_access_key_id } "
query << " Signature= #{ Fog :: InternetArchive . escape ( signature ( params ) ) } "
query << " Expires= #{ params [ :headers ] [ 'Date' ] } "
query << " x-amz-security-token= #{ Fog :: InternetArchive . escape ( @ia_session_token ) } " if @ia_session_token
port_part = params [ :port ] && " : #{ params [ :port ] } "
" #{ params [ :scheme ] } :// #{ params [ :host ] } #{ port_part } / #{ params [ :path ] } ? #{ query . join ( '&' ) } "
end
end
class Mock
include Utils
def self . acls ( type )
case type
when 'private'
{
" AccessControlList " = > [
{
" Permission " = > " FULL_CONTROL " ,
" Grantee " = > { " DisplayName " = > " me " , " ID " = > " 2744ccd10c7533bd736ad890f9dd5cab2adb27b07d500b9493f29cdc420cb2e0 " }
}
] ,
" Owner " = > { " DisplayName " = > " me " , " ID " = > " 2744ccd10c7533bd736ad890f9dd5cab2adb27b07d500b9493f29cdc420cb2e0 " }
}
when 'public-read'
{
" AccessControlList " = > [
{
" Permission " = > " FULL_CONTROL " ,
" Grantee " = > { " DisplayName " = > " me " , " ID " = > " 2744ccd10c7533bd736ad890f9dd5cab2adb27b07d500b9493f29cdc420cb2e0 " }
} ,
{
" Permission " = > " READ " ,
" Grantee " = > { " URI " = > " http://acs.amazonaws.com/groups/global/AllUsers " }
}
] ,
" Owner " = > { " DisplayName " = > " me " , " ID " = > " 2744ccd10c7533bd736ad890f9dd5cab2adb27b07d500b9493f29cdc420cb2e0 " }
}
when 'public-read-write'
{
" AccessControlList " = > [
{
" Permission " = > " FULL_CONTROL " ,
" Grantee " = > { " DisplayName " = > " me " , " ID " = > " 2744ccd10c7533bd736ad890f9dd5cab2adb27b07d500b9493f29cdc420cb2e0 " }
} ,
{
" Permission " = > " READ " ,
" Grantee " = > { " URI " = > " http://acs.amazonaws.com/groups/global/AllUsers " }
} ,
{
" Permission " = > " WRITE " ,
" Grantee " = > { " URI " = > " http://acs.amazonaws.com/groups/global/AllUsers " }
}
] ,
" Owner " = > { " DisplayName " = > " me " , " ID " = > " 2744ccd10c7533bd736ad890f9dd5cab2adb27b07d500b9493f29cdc420cb2e0 " }
}
when 'authenticated-read'
{
" AccessControlList " = > [
{
" Permission " = > " FULL_CONTROL " ,
" Grantee " = > { " DisplayName " = > " me " , " ID " = > " 2744ccd10c7533bd736ad890f9dd5cab2adb27b07d500b9493f29cdc420cb2e0 " }
} ,
{
" Permission " = > " READ " ,
" Grantee " = > { " URI " = > " http://acs.amazonaws.com/groups/global/AuthenticatedUsers " }
}
] ,
" Owner " = > { " DisplayName " = > " me " , " ID " = > " 2744ccd10c7533bd736ad890f9dd5cab2adb27b07d500b9493f29cdc420cb2e0 " }
}
end
end
def self . data
@data || = Hash . new do | hash , region |
hash [ region ] = Hash . new do | region_hash , key |
region_hash [ key ] = {
:acls = > {
:bucket = > { } ,
:object = > { }
} ,
:buckets = > { } ,
:cors = > {
:bucket = > { }
}
}
end
end
end
def self . reset
@data = nil
end
def initialize ( options = { } )
require 'mime/types'
setup_credentials ( options )
options [ :region ] || = 'us-east-1'
2013-03-26 17:21:57 -04:00
@host = options [ :host ] || Fog :: InternetArchive :: API_DOMAIN_NAME
2013-03-06 15:06:26 -05:00
@scheme = options [ :scheme ] || 'http'
2013-01-31 14:40:38 -05:00
@region = options [ :region ]
end
def data
self . class . data [ @region ] [ @ia_access_key_id ]
end
def reset_data
self . class . data [ @region ] . delete ( @ia_access_key_id )
end
def signature ( params )
" foo "
end
def setup_credentials ( options )
@ia_access_key_id = options [ :ia_access_key_id ]
@ia_secret_access_key = options [ :ia_secret_access_key ]
@ia_session_token = options [ :ia_session_token ]
@ia_credentials_expire_at = options [ :ia_credentials_expire_at ]
end
end
class Real
include Utils
# include Fog::InternetArchive::CredentialFetcher::ConnectionMethods
# Initialize connection to S3
#
# ==== Notes
# options parameter must include values for :ia_access_key_id and
# :ia_secret_access_key in order to create a connection
#
# ==== Examples
# s3 = Fog::Storage.new(
# :provider => "InternetArchive",
# :ia_access_key_id => your_ia_access_key_id,
# :ia_secret_access_key => your_ia_secret_access_key
# )
#
# ==== Parameters
# * options<~Hash> - config arguments for connection. Defaults to {}.
#
# ==== Returns
# * S3 object with connection to aws.
def initialize ( options = { } )
require 'fog/core/parser'
require 'mime/types'
setup_credentials ( options )
@connection_options = options [ :connection_options ] || { }
if @endpoint = options [ :endpoint ]
endpoint = URI . parse ( @endpoint )
@host = endpoint . host
@path = if endpoint . path . empty?
'/'
else
endpoint . path
end
@port = endpoint . port
@scheme = endpoint . scheme
else
options [ :region ] || = 'us-east-1'
@region = options [ :region ]
2013-03-26 17:21:57 -04:00
@host = options [ :host ] || Fog :: InternetArchive :: API_DOMAIN_NAME
2013-01-31 14:40:38 -05:00
@path = options [ :path ] || '/'
@persistent = options . fetch ( :persistent , false )
2013-01-31 15:11:43 -05:00
@port = options [ :port ] || 80
@scheme = options [ :scheme ] || 'http'
2013-01-31 14:40:38 -05:00
end
@connection = Fog :: Connection . new ( " #{ @scheme } :// #{ @host } : #{ @port } #{ @path } " , @persistent , @connection_options )
end
def reload
@connection . reset
end
def signature ( params )
string_to_sign =
<<-DATA
#{params[:method].to_s.upcase}
#{params[:headers]['Content-MD5']}
#{params[:headers]['Content-Type']}
#{params[:headers]['Date']}
DATA
amz_headers , canonical_amz_headers = { } , ''
for key , value in params [ :headers ]
if key [ 0 .. 5 ] == 'x-amz-'
amz_headers [ key ] = value
end
end
amz_headers = amz_headers . sort { | x , y | x [ 0 ] < = > y [ 0 ] }
for key , value in amz_headers
canonical_amz_headers << " #{ key } : #{ value } \n "
end
string_to_sign << canonical_amz_headers
subdomain = params [ :host ] . split ( " . #{ @host } " ) . first
unless subdomain =~ / ^(?:[a-z]| \ d(?! \ d{0,2}(?: \ . \ d{1,3}){3}$))(?:[a-z0-9]| \ .(?![ \ . \ -])| \ -(?![ \ .])){1,61}[a-z0-9]$ /
Fog :: Logger . warning ( " fog: the specified s3 bucket name( #{ subdomain } ) is not a valid dns name, which will negatively impact performance. For details see: http://docs.amazonwebservices.com/AmazonS3/latest/dev/BucketRestrictions.html " )
params [ :host ] = params [ :host ] . split ( " #{ subdomain } . " ) [ - 1 ]
if params [ :path ]
params [ :path ] = " #{ subdomain } / #{ params [ :path ] } "
else
params [ :path ] = subdomain
end
subdomain = nil
end
canonical_resource = @path . dup
unless subdomain . nil? || subdomain == @host
canonical_resource << " #{ Fog :: InternetArchive . escape ( subdomain ) . downcase } / "
end
canonical_resource << params [ :path ] . to_s
canonical_resource << '?'
for key in ( params [ :query ] || { } ) . keys . sort
if %w{
acl
cors
delete
lifecycle
location
logging
notification
partNumber
policy
requestPayment
response - cache - control
response - content - disposition
response - content - encoding
response - content - language
response - content - type
response - expires
torrent
uploadId
uploads
versionId
versioning
versions
website
} . include? ( key )
canonical_resource << " #{ key } #{ " = #{ params [ :query ] [ key ] } " unless params [ :query ] [ key ] . nil? } & "
end
end
canonical_resource . chop!
string_to_sign << canonical_resource
signed_string = @hmac . sign ( string_to_sign )
Base64 . encode64 ( signed_string ) . chomp!
end
private
def setup_credentials ( options )
@ia_access_key_id = options [ :ia_access_key_id ]
@ia_secret_access_key = options [ :ia_secret_access_key ]
@ia_session_token = options [ :ia_session_token ]
@ia_credentials_expire_at = options [ :ia_credentials_expire_at ]
@hmac = Fog :: HMAC . new ( 'sha1' , @ia_secret_access_key )
end
def request ( params , & block )
# refresh_credentials_if_expired
params [ :headers ] [ 'Date' ] = Fog :: Time . now . to_date_header
params [ :headers ] [ 'x-amz-security-token' ] = @ia_session_token if @ia_session_token
params [ :headers ] [ 'Authorization' ] = " AWS #{ @ia_access_key_id } : #{ signature ( params ) } "
# FIXME: ToHashParser should make this not needed
original_params = params . dup
begin
response = @connection . request ( params , & block )
rescue Excon :: Errors :: TemporaryRedirect = > error
2013-03-06 15:06:26 -05:00
uri = URI . parse ( error . response . headers [ 'location' ] )
2013-01-31 14:40:38 -05:00
Fog :: Logger . warning ( " fog: followed redirect to #{ uri . host } , connecting to the matching region will be more performant " )
response = Fog :: Connection . new ( " #{ @scheme } :// #{ uri . host } : #{ @port } " , false , @connection_options ) . request ( original_params , & block )
end
response
end
end
end
end
end