@@ -17,13 +17,11 @@ limitations under the License.
17
17
package main
18
18
19
19
import (
20
- "fmt"
21
-
22
20
"github.com/minio/minio-go"
23
- "github.com/minio/minio/pkg/auth"
24
- "github.com/minio/minio/pkg/bucket/policy"
25
- "github.com/minio/minio/pkg/bucket/policy/condition"
26
- iampolicy "github.com/minio/minio/pkg/iam/policy"
21
+ // "github.com/minio/minio/pkg/auth"
22
+ // "github.com/minio/minio/pkg/bucket/policy"
23
+ // "github.com/minio/minio/pkg/bucket/policy/condition"
24
+ // iampolicy "github.com/minio/minio/pkg/iam/policy"
27
25
"github.com/minio/minio/pkg/madmin"
28
26
29
27
"golang.org/x/net/context"
@@ -40,6 +38,16 @@ type DriverServer struct {
40
38
S3AdminClient * madmin.AdminClient
41
39
}
42
40
41
+ // type IdentityServer struct {
42
+ // Name, Version string
43
+ // }
44
+
45
+ // func (ds *IdentityServer) ProvisionerGetInfo(context.Context, *cosi.ProvisionerGetInfoRequest) (*cosi.ProvisionerGetInfoResponse, error) {
46
+ // rsp := &cosi.ProvisionerGetInfoResponse{}
47
+ // rsp.Name = fmt.Sprintf("%s-%s", ds.Name, ds.Version)
48
+ // return rsp, nil
49
+ // }
50
+
43
51
func (ds DriverServer ) ProvisionerCreateBucket (ctx context.Context , req * cosi.ProvisionerCreateBucketRequest ) (* cosi.ProvisionerCreateBucketResponse , error ) {
44
52
klog .Infof ("Using minio to create Backend Bucket" )
45
53
@@ -66,63 +74,65 @@ func (ds DriverServer) ProvisionerCreateBucket(ctx context.Context, req *cosi.Pr
66
74
}
67
75
68
76
func (ds * DriverServer ) ProvisionerDeleteBucket (ctx context.Context , req * cosi.ProvisionerDeleteBucketRequest ) (* cosi.ProvisionerDeleteBucketResponse , error ) {
69
- s3 := req .Protocol .GetS3 ()
70
- if s3 == nil {
71
- return nil , status .Error (codes .Unavailable , "Driver is missing protocol" )
72
- }
77
+ // s3 := req.Protocol.GetS3()
78
+ // if s3 == nil {
79
+ // return nil, status.Error(codes.Unavailable, "Driver is missing protocol")
80
+ // }
73
81
74
- if err := ds .S3Client .RemoveBucket (s3 .BucketName ); err != nil {
75
- klog .Info ("failed to delete bucket" , s3 .BucketName )
76
- return nil , err
77
- }
82
+ // if err := ds.S3Client.RemoveBucket(s3.BucketName); err != nil {
83
+ // klog.Info("failed to delete bucket", s3.BucketName)
84
+ // return nil, err
85
+ // }
78
86
79
87
return & cosi.ProvisionerDeleteBucketResponse {}, nil
80
88
}
81
89
82
90
func (ds * DriverServer ) ProvisionerGrantBucketAccess (ctx context.Context , req * cosi.ProvisionerGrantBucketAccessRequest ) (* cosi.ProvisionerGrantBucketAccessResponse , error ) {
83
- creds , err := auth .GetNewCredentials ()
84
- if err != nil {
85
- klog .Error ("failed to generate new credentails" )
86
- return nil , err
87
- }
88
-
89
- s3 := req .Protocol .GetS3 ()
90
- if s3 == nil {
91
- return nil , status .Error (codes .Unavailable , "Driver is missing protocol" )
92
- }
93
-
94
- if err := ds .S3AdminClient .AddUser (context .Background (), creds .AccessKey , creds .SecretKey ); err != nil {
95
- klog .Error ("failed to create user" , err )
96
- return nil , err
97
- }
98
-
99
- // Create policy
100
- p := iampolicy.Policy {
101
- Version : iampolicy .DefaultVersion ,
102
- Statements : []iampolicy.Statement {
103
- iampolicy .NewStatement (
104
- policy .Allow ,
105
- iampolicy .NewActionSet ("s3:*" ),
106
- iampolicy .NewResourceSet (iampolicy .NewResource (s3 .BucketName + "/*" , "" )),
107
- condition .NewFunctions (),
108
- )},
109
- }
110
-
111
- if err := ds .S3AdminClient .AddCannedPolicy (context .Background (), "s3:*" , & p ); err != nil {
112
- klog .Error ("failed to add canned policy" , err )
113
- return nil , err
114
- }
115
-
116
- if err := ds .S3AdminClient .SetPolicy (context .Background (), "s3:*" , creds .AccessKey , false ); err != nil {
117
- klog .Error ("failed to set policy" , err )
118
- return nil , err
119
- }
120
-
121
- return & cosi.ProvisionerGrantBucketAccessResponse {
122
- Principal : req .Principal ,
123
- CredentialsFileContents : fmt .Sprintf ("[default]\n aws_access_key %s\n aws_secret_key %s" , creds .AccessKey , creds .SecretKey ),
124
- CredentialsFilePath : ".aws/credentials" ,
125
- }, nil
91
+ // creds, err := auth.GetNewCredentials()
92
+ // if err != nil {
93
+ // klog.Error("failed to generate new credentails")
94
+ // return nil, err
95
+ // }
96
+
97
+ // s3 := req.Protocol.GetS3()
98
+ // if s3 == nil {
99
+ // return nil, status.Error(codes.Unavailable, "Driver is missing protocol")
100
+ // }
101
+
102
+ // if err := ds.S3AdminClient.AddUser(context.Background(), creds.AccessKey, creds.SecretKey); err != nil {
103
+ // klog.Error("failed to create user", err)
104
+ // return nil, err
105
+ // }
106
+
107
+ // // Create policy
108
+ // p := iampolicy.Policy{
109
+ // Version: iampolicy.DefaultVersion,
110
+ // Statements: []iampolicy.Statement{
111
+ // iampolicy.NewStatement(
112
+ // policy.Allow,
113
+ // iampolicy.NewActionSet("s3:*"),
114
+ // iampolicy.NewResourceSet(iampolicy.NewResource(s3.BucketName+"/*", "")),
115
+ // condition.NewFunctions(),
116
+ // )},
117
+ // }
118
+
119
+ // if err := ds.S3AdminClient.AddCannedPolicy(context.Background(), "s3:*", &p); err != nil {
120
+ // klog.Error("failed to add canned policy", err)
121
+ // return nil, err
122
+ // }
123
+
124
+ // if err := ds.S3AdminClient.SetPolicy(context.Background(), "s3:*", creds.AccessKey, false); err != nil {
125
+ // klog.Error("failed to set policy", err)
126
+ // return nil, err
127
+ // }
128
+
129
+ // return &cosi.ProvisionerGrantBucketAccessResponse{
130
+ // Principal: req.Principal,
131
+ // CredentialsFileContents: fmt.Sprintf("[default]\naws_access_key %s\naws_secret_key %s", creds.AccessKey, creds.SecretKey),
132
+ // CredentialsFilePath: ".aws/credentials",
133
+ // }, nil
134
+
135
+ return & cosi.ProvisionerGrantBucketAccessResponse {}, nil
126
136
}
127
137
128
138
func (ds * DriverServer ) ProvisionerRevokeBucketAccess (ctx context.Context , req * cosi.ProvisionerRevokeBucketAccessRequest ) (* cosi.ProvisionerRevokeBucketAccessResponse , error ) {
0 commit comments