2023-03-12 18:00:57 +03:00
|
|
|
// GoToSocial
|
|
|
|
// Copyright (C) GoToSocial Authors admin@gotosocial.org
|
|
|
|
// SPDX-License-Identifier: AGPL-3.0-or-later
|
|
|
|
//
|
|
|
|
// This program is free software: you can redistribute it and/or modify
|
|
|
|
// it under the terms of the GNU Affero General Public License as published by
|
|
|
|
// the Free Software Foundation, either version 3 of the License, or
|
|
|
|
// (at your option) any later version.
|
|
|
|
//
|
|
|
|
// This program is distributed in the hope that it will be useful,
|
|
|
|
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
// GNU Affero General Public License for more details.
|
|
|
|
//
|
|
|
|
// You should have received a copy of the GNU Affero General Public License
|
|
|
|
// along with this program. If not, see <http://www.gnu.org/licenses/>.
|
2022-07-03 13:08:30 +03:00
|
|
|
|
|
|
|
package storage
|
|
|
|
|
|
|
|
import (
|
|
|
|
"context"
|
2024-05-22 12:46:24 +03:00
|
|
|
"errors"
|
2022-07-03 13:08:30 +03:00
|
|
|
"fmt"
|
2023-03-01 12:44:54 +03:00
|
|
|
"io"
|
2022-11-24 11:35:46 +03:00
|
|
|
"mime"
|
2022-07-03 13:08:30 +03:00
|
|
|
"net/url"
|
2024-07-12 12:39:47 +03:00
|
|
|
"os"
|
2022-07-03 13:08:30 +03:00
|
|
|
"path"
|
2022-11-24 11:35:46 +03:00
|
|
|
"time"
|
2022-07-03 13:08:30 +03:00
|
|
|
|
2023-01-11 14:13:13 +03:00
|
|
|
"codeberg.org/gruf/go-bytesize"
|
2022-12-05 13:09:22 +03:00
|
|
|
"codeberg.org/gruf/go-cache/v3/ttl"
|
2024-05-22 12:46:24 +03:00
|
|
|
"codeberg.org/gruf/go-storage"
|
|
|
|
"codeberg.org/gruf/go-storage/disk"
|
|
|
|
"codeberg.org/gruf/go-storage/s3"
|
2022-07-03 13:08:30 +03:00
|
|
|
"github.com/minio/minio-go/v7"
|
|
|
|
"github.com/minio/minio-go/v7/pkg/credentials"
|
|
|
|
"github.com/superseriousbusiness/gotosocial/internal/config"
|
2023-08-20 14:35:55 +03:00
|
|
|
"github.com/superseriousbusiness/gotosocial/internal/gtserror"
|
|
|
|
"github.com/superseriousbusiness/gotosocial/internal/log"
|
2022-07-03 13:08:30 +03:00
|
|
|
)
|
|
|
|
|
2022-12-02 21:40:49 +03:00
|
|
|
const (
|
|
|
|
urlCacheTTL = time.Hour * 24
|
|
|
|
urlCacheExpiryFrequency = time.Minute * 5
|
|
|
|
)
|
|
|
|
|
2023-02-16 16:18:53 +03:00
|
|
|
// PresignedURL represents a pre signed S3 URL with
|
|
|
|
// an expiry time.
|
|
|
|
type PresignedURL struct {
|
|
|
|
*url.URL
|
|
|
|
Expiry time.Time // link expires at this time
|
|
|
|
}
|
|
|
|
|
2024-07-22 20:45:48 +03:00
|
|
|
// IsInvalidKey returns whether error is an invalid-key
|
|
|
|
// type error returned by the underlying storage library.
|
|
|
|
func IsInvalidKey(err error) bool {
|
|
|
|
return errors.Is(err, storage.ErrInvalidKey)
|
|
|
|
}
|
|
|
|
|
2024-05-22 12:46:24 +03:00
|
|
|
// IsAlreadyExist returns whether error is an already-exists
|
|
|
|
// type error returned by the underlying storage library.
|
|
|
|
func IsAlreadyExist(err error) bool {
|
|
|
|
return errors.Is(err, storage.ErrAlreadyExists)
|
|
|
|
}
|
|
|
|
|
|
|
|
// IsNotFound returns whether error is a not-found error
|
|
|
|
// type returned by the underlying storage library.
|
|
|
|
func IsNotFound(err error) bool {
|
|
|
|
return errors.Is(err, storage.ErrNotFound)
|
|
|
|
}
|
2022-11-24 11:35:46 +03:00
|
|
|
|
|
|
|
// Driver wraps a kv.KVStore to also provide S3 presigned GET URLs.
|
|
|
|
type Driver struct {
|
|
|
|
// Underlying storage
|
|
|
|
Storage storage.Storage
|
2022-07-03 13:08:30 +03:00
|
|
|
|
2022-11-24 11:35:46 +03:00
|
|
|
// S3-only parameters
|
2022-12-02 21:40:49 +03:00
|
|
|
Proxy bool
|
|
|
|
Bucket string
|
2023-02-16 16:18:53 +03:00
|
|
|
PresignedCache *ttl.Cache[string, PresignedURL]
|
2024-07-31 15:44:18 +03:00
|
|
|
RedirectURL string
|
2022-07-03 13:08:30 +03:00
|
|
|
}
|
|
|
|
|
2023-03-01 12:44:54 +03:00
|
|
|
// Get returns the byte value for key in storage.
|
|
|
|
func (d *Driver) Get(ctx context.Context, key string) ([]byte, error) {
|
|
|
|
return d.Storage.ReadBytes(ctx, key)
|
|
|
|
}
|
|
|
|
|
|
|
|
// GetStream returns an io.ReadCloser for the value bytes at key in the storage.
|
|
|
|
func (d *Driver) GetStream(ctx context.Context, key string) (io.ReadCloser, error) {
|
|
|
|
return d.Storage.ReadStream(ctx, key)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Put writes the supplied value bytes at key in the storage
|
|
|
|
func (d *Driver) Put(ctx context.Context, key string, value []byte) (int, error) {
|
|
|
|
return d.Storage.WriteBytes(ctx, key, value)
|
|
|
|
}
|
|
|
|
|
|
|
|
// PutStream writes the bytes from supplied reader at key in the storage
|
|
|
|
func (d *Driver) PutStream(ctx context.Context, key string, r io.Reader) (int64, error) {
|
|
|
|
return d.Storage.WriteStream(ctx, key, r)
|
|
|
|
}
|
|
|
|
|
2024-07-12 12:39:47 +03:00
|
|
|
// PutFile moves the contents of file at path, to storage.Driver{} under given key.
|
|
|
|
func (d *Driver) PutFile(ctx context.Context, key string, filepath string) (int64, error) {
|
|
|
|
// Open file at path for reading.
|
|
|
|
file, err := os.Open(filepath)
|
|
|
|
if err != nil {
|
|
|
|
return 0, gtserror.Newf("error opening file %s: %w", filepath, err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Write the file data to storage under key. Note
|
|
|
|
// that for disk.DiskStorage{} this should end up
|
|
|
|
// being a highly optimized Linux sendfile syscall.
|
|
|
|
sz, err := d.Storage.WriteStream(ctx, key, file)
|
|
|
|
if err != nil {
|
|
|
|
err = gtserror.Newf("error writing file %s: %w", key, err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Close the file: done with it.
|
|
|
|
if e := file.Close(); e != nil {
|
|
|
|
log.Errorf(ctx, "error closing file %s: %v", filepath, e)
|
|
|
|
}
|
|
|
|
|
|
|
|
return sz, err
|
|
|
|
}
|
|
|
|
|
2024-06-26 18:01:16 +03:00
|
|
|
// Delete attempts to remove the supplied key (and corresponding value) from storage.
|
2023-03-01 12:44:54 +03:00
|
|
|
func (d *Driver) Delete(ctx context.Context, key string) error {
|
|
|
|
return d.Storage.Remove(ctx, key)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Has checks if the supplied key is in the storage.
|
|
|
|
func (d *Driver) Has(ctx context.Context, key string) (bool, error) {
|
2024-05-22 12:46:24 +03:00
|
|
|
stat, err := d.Storage.Stat(ctx, key)
|
|
|
|
return (stat != nil), err
|
2023-03-01 12:44:54 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
// WalkKeys walks the keys in the storage.
|
2024-05-22 12:46:24 +03:00
|
|
|
func (d *Driver) WalkKeys(ctx context.Context, walk func(string) error) error {
|
|
|
|
return d.Storage.WalkKeys(ctx, storage.WalkKeysOpts{
|
|
|
|
Step: func(entry storage.Entry) error {
|
|
|
|
return walk(entry.Key)
|
2023-03-01 12:44:54 +03:00
|
|
|
},
|
|
|
|
})
|
|
|
|
}
|
|
|
|
|
2022-11-24 11:35:46 +03:00
|
|
|
// URL will return a presigned GET object URL, but only if running on S3 storage with proxying disabled.
|
2023-02-16 16:18:53 +03:00
|
|
|
func (d *Driver) URL(ctx context.Context, key string) *PresignedURL {
|
2022-11-24 11:35:46 +03:00
|
|
|
// Check whether S3 *without* proxying is enabled
|
2024-05-22 12:46:24 +03:00
|
|
|
s3, ok := d.Storage.(*s3.S3Storage)
|
2022-11-24 11:35:46 +03:00
|
|
|
if !ok || d.Proxy {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2023-01-11 14:13:13 +03:00
|
|
|
// Check cache underlying cache map directly to
|
|
|
|
// avoid extending the TTL (which cache.Get() does).
|
|
|
|
d.PresignedCache.Lock()
|
|
|
|
e, ok := d.PresignedCache.Cache.Get(key)
|
|
|
|
d.PresignedCache.Unlock()
|
|
|
|
|
|
|
|
if ok {
|
2023-02-16 16:18:53 +03:00
|
|
|
return &e.Value
|
2022-12-02 21:40:49 +03:00
|
|
|
}
|
|
|
|
|
2024-07-31 15:44:18 +03:00
|
|
|
var (
|
|
|
|
u *url.URL
|
|
|
|
err error
|
|
|
|
)
|
|
|
|
|
|
|
|
if d.RedirectURL != "" {
|
|
|
|
u, err = url.Parse(d.RedirectURL + "/" + key)
|
|
|
|
if err != nil {
|
|
|
|
// If URL parsing fails, fallback is to
|
|
|
|
// fetch the file. So ignore the error here
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
u, err = s3.Client().PresignedGetObject(ctx, d.Bucket, key, urlCacheTTL, url.Values{
|
|
|
|
"response-content-type": []string{mime.TypeByExtension(path.Ext(key))},
|
|
|
|
})
|
|
|
|
if err != nil {
|
|
|
|
// If URL request fails, fallback is to
|
|
|
|
// fetch the file. So ignore the error here
|
|
|
|
return nil
|
|
|
|
}
|
2022-12-02 21:40:49 +03:00
|
|
|
}
|
2023-02-16 16:18:53 +03:00
|
|
|
|
|
|
|
psu := PresignedURL{
|
|
|
|
URL: u,
|
|
|
|
Expiry: time.Now().Add(urlCacheTTL), // link expires in 24h time
|
|
|
|
}
|
|
|
|
|
|
|
|
d.PresignedCache.Set(key, psu)
|
|
|
|
return &psu
|
2022-11-24 11:35:46 +03:00
|
|
|
}
|
|
|
|
|
2023-08-20 14:35:55 +03:00
|
|
|
// ProbeCSPUri returns a URI string that can be added
|
|
|
|
// to a content-security-policy to allow requests to
|
|
|
|
// endpoints served by this driver.
|
|
|
|
//
|
|
|
|
// If the driver is not backed by non-proxying S3,
|
|
|
|
// this will return an empty string and no error.
|
|
|
|
//
|
|
|
|
// Otherwise, this function probes for a CSP URI by
|
|
|
|
// doing the following:
|
|
|
|
//
|
|
|
|
// 1. Create a temporary file in the S3 bucket.
|
|
|
|
// 2. Generate a pre-signed URL for that file.
|
|
|
|
// 3. Extract '[scheme]://[host]' from the URL.
|
|
|
|
// 4. Remove the temporary file.
|
|
|
|
// 5. Return the '[scheme]://[host]' string.
|
|
|
|
func (d *Driver) ProbeCSPUri(ctx context.Context) (string, error) {
|
|
|
|
// Check whether S3 without proxying
|
|
|
|
// is enabled. If it's not, there's
|
|
|
|
// no need to add anything to the CSP.
|
2024-05-22 12:46:24 +03:00
|
|
|
s3, ok := d.Storage.(*s3.S3Storage)
|
2023-08-20 14:35:55 +03:00
|
|
|
if !ok || d.Proxy {
|
|
|
|
return "", nil
|
|
|
|
}
|
|
|
|
|
2024-07-31 15:44:18 +03:00
|
|
|
// If an S3 redirect URL is set, just
|
|
|
|
// return this URL without probing; we
|
|
|
|
// likely don't have write access on it
|
|
|
|
// anyway since it's probs a CDN bucket.
|
|
|
|
if d.RedirectURL != "" {
|
|
|
|
return d.RedirectURL + "/", nil
|
|
|
|
}
|
|
|
|
|
2023-08-20 14:35:55 +03:00
|
|
|
const cspKey = "gotosocial-csp-probe"
|
|
|
|
|
|
|
|
// Create an empty file in S3 storage.
|
|
|
|
if _, err := d.Put(ctx, cspKey, make([]byte, 0)); err != nil {
|
|
|
|
return "", gtserror.Newf("error putting file in bucket at key %s: %w", cspKey, err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Try to clean up file whatever happens.
|
|
|
|
defer func() {
|
|
|
|
if err := d.Delete(ctx, cspKey); err != nil {
|
|
|
|
log.Warnf(ctx, "error deleting file from bucket at key %s (%v); "+
|
|
|
|
"you may want to remove this file manually from your S3 bucket", cspKey, err)
|
|
|
|
}
|
|
|
|
}()
|
|
|
|
|
|
|
|
// Get a presigned URL for that empty file.
|
|
|
|
u, err := s3.Client().PresignedGetObject(ctx, d.Bucket, cspKey, 1*time.Second, nil)
|
|
|
|
if err != nil {
|
|
|
|
return "", err
|
|
|
|
}
|
|
|
|
|
|
|
|
// Create a stripped version of the presigned
|
|
|
|
// URL that includes only the host and scheme.
|
|
|
|
uStripped := &url.URL{
|
|
|
|
Scheme: u.Scheme,
|
|
|
|
Host: u.Host,
|
|
|
|
}
|
|
|
|
|
|
|
|
return uStripped.String(), nil
|
|
|
|
}
|
|
|
|
|
2022-11-24 11:35:46 +03:00
|
|
|
func AutoConfig() (*Driver, error) {
|
|
|
|
switch backend := config.GetStorageBackend(); backend {
|
2022-07-03 13:08:30 +03:00
|
|
|
case "s3":
|
2022-12-02 21:40:49 +03:00
|
|
|
return NewS3Storage()
|
2022-07-03 13:08:30 +03:00
|
|
|
case "local":
|
2022-12-02 21:40:49 +03:00
|
|
|
return NewFileStorage()
|
2022-11-24 11:35:46 +03:00
|
|
|
default:
|
|
|
|
return nil, fmt.Errorf("invalid storage backend: %s", backend)
|
2022-07-03 13:08:30 +03:00
|
|
|
}
|
2022-12-02 21:40:49 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
func NewFileStorage() (*Driver, error) {
|
|
|
|
// Load runtime configuration
|
|
|
|
basePath := config.GetStorageLocalBasePath()
|
|
|
|
|
2024-07-17 18:26:33 +03:00
|
|
|
// Use default disk config with
|
|
|
|
// increased write buffer size.
|
2024-05-22 12:46:24 +03:00
|
|
|
diskCfg := disk.DefaultConfig()
|
|
|
|
diskCfg.WriteBufSize = int(16 * bytesize.KiB)
|
|
|
|
|
2022-12-02 21:40:49 +03:00
|
|
|
// Open the disk storage implementation
|
2024-05-22 12:46:24 +03:00
|
|
|
disk, err := disk.Open(basePath, &diskCfg)
|
2022-12-02 21:40:49 +03:00
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("error opening disk storage: %w", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
return &Driver{
|
|
|
|
Storage: disk,
|
|
|
|
}, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func NewS3Storage() (*Driver, error) {
|
|
|
|
// Load runtime configuration
|
|
|
|
endpoint := config.GetStorageS3Endpoint()
|
|
|
|
access := config.GetStorageS3AccessKey()
|
|
|
|
secret := config.GetStorageS3SecretKey()
|
|
|
|
secure := config.GetStorageS3UseSSL()
|
|
|
|
bucket := config.GetStorageS3BucketName()
|
2024-07-31 15:44:18 +03:00
|
|
|
redirectURL := config.GetStorageS3RedirectURL()
|
2022-12-02 21:40:49 +03:00
|
|
|
|
|
|
|
// Open the s3 storage implementation
|
2024-05-22 12:46:24 +03:00
|
|
|
s3, err := s3.Open(endpoint, bucket, &s3.Config{
|
2022-12-02 21:40:49 +03:00
|
|
|
CoreOpts: minio.Options{
|
|
|
|
Creds: credentials.NewStaticV4(access, secret, ""),
|
|
|
|
Secure: secure,
|
|
|
|
},
|
|
|
|
GetOpts: minio.GetObjectOptions{},
|
|
|
|
PutOpts: minio.PutObjectOptions{},
|
|
|
|
PutChunkSize: 5 * 1024 * 1024, // 5MiB
|
|
|
|
StatOpts: minio.StatObjectOptions{},
|
|
|
|
RemoveOpts: minio.RemoveObjectOptions{},
|
|
|
|
ListSize: 200,
|
|
|
|
})
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("error opening s3 storage: %w", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// ttl should be lower than the expiry used by S3 to avoid serving invalid URLs
|
2023-02-16 16:18:53 +03:00
|
|
|
presignedCache := ttl.New[string, PresignedURL](0, 1000, urlCacheTTL-urlCacheExpiryFrequency)
|
2022-12-02 21:40:49 +03:00
|
|
|
presignedCache.Start(urlCacheExpiryFrequency)
|
|
|
|
|
2022-11-24 11:35:46 +03:00
|
|
|
return &Driver{
|
2022-12-02 21:40:49 +03:00
|
|
|
Proxy: config.GetStorageS3Proxy(),
|
|
|
|
Bucket: config.GetStorageS3BucketName(),
|
|
|
|
Storage: s3,
|
|
|
|
PresignedCache: presignedCache,
|
2024-07-31 15:44:18 +03:00
|
|
|
RedirectURL: redirectURL,
|
2022-11-24 11:35:46 +03:00
|
|
|
}, nil
|
2022-07-03 13:08:30 +03:00
|
|
|
}
|