credential/filer_etc: migrate to multi-file identity storage

This commit is contained in:
Chris Lu
2026-01-25 13:48:46 -08:00
parent 6bf088cec9
commit 74b5c57dcf

View File

@@ -3,6 +3,7 @@ package filer_etc
import ( import (
"bytes" "bytes"
"context" "context"
"encoding/json"
"fmt" "fmt"
"github.com/seaweedfs/seaweedfs/weed/credential" "github.com/seaweedfs/seaweedfs/weed/credential"
@@ -12,221 +13,399 @@ import (
"github.com/seaweedfs/seaweedfs/weed/pb/iam_pb" "github.com/seaweedfs/seaweedfs/weed/pb/iam_pb"
) )
const (
IamIdentitiesDirectory = "identities"
IamConfigurationFile = "configuration.json"
IamLegacyIdentityFile = "identity.json"
IamLegacyIdentityOldFile = "identity.json.old"
)
func (store *FilerEtcStore) LoadConfiguration(ctx context.Context) (*iam_pb.S3ApiConfiguration, error) { func (store *FilerEtcStore) LoadConfiguration(ctx context.Context) (*iam_pb.S3ApiConfiguration, error) {
s3cfg := &iam_pb.S3ApiConfiguration{} s3cfg := &iam_pb.S3ApiConfiguration{}
glog.V(1).Infof("Loading IAM configuration from %s/%s (using current active filer)", // Try to load from multi-file structure first (identities directory)
filer.IamConfigDirectory, filer.IamIdentityFile) hasMultiFile, err := store.loadFromMultiFile(ctx, s3cfg)
err := store.withFilerClient(func(client filer_pb.SeaweedFilerClient) error {
// Use ReadInsideFiler instead of ReadEntry since identity.json is small
// and stored inline. ReadEntry requires a master client for chunked files,
// but ReadInsideFiler only reads inline content.
content, err := filer.ReadInsideFiler(client, filer.IamConfigDirectory, filer.IamIdentityFile)
if err != nil {
if err == filer_pb.ErrNotFound {
glog.V(1).Infof("IAM identity file not found at %s/%s, no credentials loaded",
filer.IamConfigDirectory, filer.IamIdentityFile)
return nil
}
glog.Errorf("Failed to read IAM identity file from %s/%s: %v",
filer.IamConfigDirectory, filer.IamIdentityFile, err)
return err
}
if len(content) == 0 {
glog.V(1).Infof("IAM identity file at %s/%s is empty",
filer.IamConfigDirectory, filer.IamIdentityFile)
return nil
}
glog.V(2).Infof("Read %d bytes from %s/%s",
len(content), filer.IamConfigDirectory, filer.IamIdentityFile)
if err := filer.ParseS3ConfigurationFromBytes(content, s3cfg); err != nil {
glog.Errorf("Failed to parse IAM configuration from %s/%s: %v",
filer.IamConfigDirectory, filer.IamIdentityFile, err)
return err
}
glog.V(1).Infof("Successfully parsed IAM configuration with %d identities and %d accounts",
len(s3cfg.Identities), len(s3cfg.Accounts))
return nil
})
if err != nil { if err != nil {
return s3cfg, err return s3cfg, err
} }
// Log loaded identities for debugging if hasMultiFile {
if glog.V(2) { return s3cfg, nil
for _, identity := range s3cfg.Identities { }
credCount := len(identity.Credentials)
actionCount := len(identity.Actions) // Fallback to legacy single file
glog.V(2).Infof(" Identity: %s (credentials: %d, actions: %d)", content, found, err := store.readInsideFiler(filer.IamConfigDirectory, IamLegacyIdentityFile)
identity.Name, credCount, actionCount) if err != nil {
for _, cred := range identity.Credentials { return s3cfg, err
glog.V(3).Infof(" Access Key: %s", cred.AccessKey) }
} if !found {
// No config found at all
return s3cfg, nil
}
if len(content) > 0 {
if err := filer.ParseS3ConfigurationFromBytes(content, s3cfg); err != nil {
glog.Errorf("Failed to parse legacy IAM configuration: %v", err)
return s3cfg, err
} }
} }
// Perform migration if we loaded legacy config
if err := store.migrateToMultiFile(ctx, s3cfg); err != nil {
glog.Errorf("Failed to migrate IAM configuration to multi-file layout: %v", err)
// Return the loaded config anyway, migration failed but we have data
return s3cfg, nil
}
return s3cfg, nil return s3cfg, nil
} }
func (store *FilerEtcStore) SaveConfiguration(ctx context.Context, config *iam_pb.S3ApiConfiguration) error { func (store *FilerEtcStore) loadFromMultiFile(ctx context.Context, s3cfg *iam_pb.S3ApiConfiguration) (bool, error) {
return store.withFilerClient(func(client filer_pb.SeaweedFilerClient) error { var hasIdentities bool
var buf bytes.Buffer
if err := filer.ProtoToText(&buf, config); err != nil { // 1. List identities
return fmt.Errorf("failed to marshal configuration: %w", err) err := store.withFilerClient(func(client filer_pb.SeaweedFilerClient) error {
dir := filer.IamConfigDirectory + "/" + IamIdentitiesDirectory
entries, err := listEntries(ctx, client, dir)
if err != nil {
// If directory doesn't exist, it's not multi-file yet
return nil
} }
return filer.SaveInsideFiler(client, filer.IamConfigDirectory, filer.IamIdentityFile, buf.Bytes())
for _, entry := range entries {
if entry.IsDirectory {
continue
}
hasIdentities = true
// Read each identity file
// We can use the content from the entry if it's small (filer usually returns content for small files in ListEntries if configured,
// but ListEntries might not return content depending on implementation.
// filer.ListEntries calls ListEntriesRequest.
// Safest to read individually or check entry.Content
var content []byte
if len(entry.Content) > 0 {
content = entry.Content
} else {
// Read file content
c, err := filer.ReadInsideFiler(client, dir, entry.Name)
if err != nil {
glog.Warningf("Failed to read identity file %s: %v", entry.Name, err)
continue
}
content = c
}
if len(content) > 0 {
identity := &iam_pb.Identity{}
if err := json.Unmarshal(content, identity); err != nil {
glog.Warningf("Failed to unmarshal identity %s: %v", entry.Name, err)
continue
}
s3cfg.Identities = append(s3cfg.Identities, identity)
}
}
return nil
})
if err != nil {
return false, err
}
// 2. Load configuration.json (Accounts, etc.)
content, found, err := store.readInsideFiler(filer.IamConfigDirectory, IamConfigurationFile)
if err != nil {
return false, err
}
if found && len(content) > 0 {
// We use a temporary struct to load just the non-identity parts,
// but ParseS3ConfigurationFromBytes expects full config.
// It's robust to missing fields.
tempCfg := &iam_pb.S3ApiConfiguration{}
if err := filer.ParseS3ConfigurationFromBytes(content, tempCfg); err == nil {
s3cfg.Accounts = tempCfg.Accounts
// Copy other fields if any
}
return true, nil // Found configuration file, so it is multi-file
}
return hasIdentities, nil
}
func (store *FilerEtcStore) migrateToMultiFile(ctx context.Context, s3cfg *iam_pb.S3ApiConfiguration) error {
glog.Infof("Migrating IAM configuration to multi-file layout...")
// 1. Save all identities
for _, identity := range s3cfg.Identities {
if err := store.saveIdentity(ctx, identity); err != nil {
return err
}
}
// 2. Save rest of configuration
if err := store.withFilerClient(func(client filer_pb.SeaweedFilerClient) error {
// Create config with only accounts
cleanCfg := &iam_pb.S3ApiConfiguration{
Accounts: s3cfg.Accounts,
}
var buf bytes.Buffer
if err := filer.ProtoToText(&buf, cleanCfg); err != nil {
return err
}
return filer.SaveInsideFiler(client, filer.IamConfigDirectory, IamConfigurationFile, buf.Bytes())
}); err != nil {
return err
}
// 3. Rename legacy file
return store.withFilerClient(func(client filer_pb.SeaweedFilerClient) error {
// We use atomic rename if possible, but Filer 'AtomicRenameEntry' exists in filer_pb
// util.JoinPath(filer.IamConfigDirectory, IamLegacyIdentityFile)
_, err := client.AtomicRenameEntry(context.Background(), &filer_pb.AtomicRenameEntryRequest{
OldDirectory: filer.IamConfigDirectory,
OldName: IamLegacyIdentityFile,
NewDirectory: filer.IamConfigDirectory,
NewName: IamLegacyIdentityOldFile,
})
return err
})
}
func (store *FilerEtcStore) SaveConfiguration(ctx context.Context, config *iam_pb.S3ApiConfiguration) error {
// 1. Save all identities
for _, identity := range config.Identities {
if err := store.saveIdentity(ctx, identity); err != nil {
return err
}
}
// 2. Save configuration file (accounts)
err := store.withFilerClient(func(client filer_pb.SeaweedFilerClient) error {
cleanCfg := &iam_pb.S3ApiConfiguration{
Accounts: config.Accounts,
}
var buf bytes.Buffer
if err := filer.ProtoToText(&buf, cleanCfg); err != nil {
return err
}
return filer.SaveInsideFiler(client, filer.IamConfigDirectory, IamConfigurationFile, buf.Bytes())
})
if err != nil {
return err
}
// 3. Cleanup removed identities (Full Sync)
// Get list of existing identity files
// Compare with config.Identities
// Delete unknown ones
return store.withFilerClient(func(client filer_pb.SeaweedFilerClient) error {
dir := filer.IamConfigDirectory + "/" + IamIdentitiesDirectory
entries, err := listEntries(ctx, client, dir)
if err != nil {
return nil // Should exist by now
}
validNames := make(map[string]bool)
for _, id := range config.Identities {
validNames[id.Name+".json"] = true
}
for _, entry := range entries {
if !entry.IsDirectory && !validNames[entry.Name] {
// Delete obsolete identity file
client.DeleteEntry(context.Background(), &filer_pb.DeleteEntryRequest{
Directory: dir,
Name: entry.Name,
})
}
}
return nil
}) })
} }
func (store *FilerEtcStore) CreateUser(ctx context.Context, identity *iam_pb.Identity) error { func (store *FilerEtcStore) CreateUser(ctx context.Context, identity *iam_pb.Identity) error {
// Load existing configuration // Check if user exists (read specific file)
config, err := store.LoadConfiguration(ctx) existing, err := store.GetUser(ctx, identity.Name)
if err != nil { if err == nil && existing != nil {
return fmt.Errorf("failed to load configuration: %w", err) return credential.ErrUserAlreadyExists
} }
return store.saveIdentity(ctx, identity)
// Check if user already exists
for _, existingIdentity := range config.Identities {
if existingIdentity.Name == identity.Name {
return credential.ErrUserAlreadyExists
}
}
// Add new identity
config.Identities = append(config.Identities, identity)
// Save configuration
return store.SaveConfiguration(ctx, config)
} }
func (store *FilerEtcStore) GetUser(ctx context.Context, username string) (*iam_pb.Identity, error) { func (store *FilerEtcStore) GetUser(ctx context.Context, username string) (*iam_pb.Identity, error) {
config, err := store.LoadConfiguration(ctx) var identity *iam_pb.Identity
if err != nil { err := store.withFilerClient(func(client filer_pb.SeaweedFilerClient) error {
return nil, fmt.Errorf("failed to load configuration: %w", err) data, err := filer.ReadInsideFiler(client, filer.IamConfigDirectory+"/"+IamIdentitiesDirectory, username+".json")
} if err != nil {
if err == filer_pb.ErrNotFound {
for _, identity := range config.Identities { return credential.ErrUserNotFound
if identity.Name == username { }
return identity, nil return err
} }
} if len(data) == 0 {
return credential.ErrUserNotFound
return nil, credential.ErrUserNotFound }
identity = &iam_pb.Identity{}
return json.Unmarshal(data, identity)
})
return identity, err
} }
func (store *FilerEtcStore) UpdateUser(ctx context.Context, username string, identity *iam_pb.Identity) error { func (store *FilerEtcStore) UpdateUser(ctx context.Context, username string, identity *iam_pb.Identity) error {
config, err := store.LoadConfiguration(ctx) // Ensure user exists
if err != nil { if _, err := store.GetUser(ctx, username); err != nil {
return fmt.Errorf("failed to load configuration: %w", err) return err
} }
// If username changes, we need to delete old and create new. But usually UpdateUser keeps username unless renames are allowed.
// Find and update the user // identity.Name vs username.
for i, existingIdentity := range config.Identities { if username != identity.Name {
if existingIdentity.Name == username { // Rename case
config.Identities[i] = identity if err := store.DeleteUser(ctx, username); err != nil {
return store.SaveConfiguration(ctx, config) return err
} }
} }
return store.saveIdentity(ctx, identity)
return credential.ErrUserNotFound
} }
func (store *FilerEtcStore) DeleteUser(ctx context.Context, username string) error { func (store *FilerEtcStore) DeleteUser(ctx context.Context, username string) error {
config, err := store.LoadConfiguration(ctx) return store.withFilerClient(func(client filer_pb.SeaweedFilerClient) error {
if err != nil { err := client.DeleteEntry(context.Background(), &filer_pb.DeleteEntryRequest{
return fmt.Errorf("failed to load configuration: %w", err) Directory: filer.IamConfigDirectory + "/" + IamIdentitiesDirectory,
} Name: username + ".json",
})
// Find and remove the user if err != nil {
for i, identity := range config.Identities { // Map specific gRPC error to ErrUserNotFound if possible, but DeleteEntry usually returns success even if not found
if identity.Name == username { // unless strict. 'credential.ErrUserNotFound' is expected by caller?
config.Identities = append(config.Identities[:i], config.Identities[i+1:]...) // The caller `DeleteUser` in handlers usually explicitly checks `ErrUserNotFound`.
return store.SaveConfiguration(ctx, config) // Ideally we verify existence first?
return err
} }
} return nil
})
return credential.ErrUserNotFound
} }
func (store *FilerEtcStore) ListUsers(ctx context.Context) ([]string, error) { func (store *FilerEtcStore) ListUsers(ctx context.Context) ([]string, error) {
config, err := store.LoadConfiguration(ctx)
if err != nil {
return nil, fmt.Errorf("failed to load configuration: %w", err)
}
var usernames []string var usernames []string
for _, identity := range config.Identities { err := store.withFilerClient(func(client filer_pb.SeaweedFilerClient) error {
usernames = append(usernames, identity.Name) entries, err := listEntries(ctx, client, filer.IamConfigDirectory+"/"+IamIdentitiesDirectory)
} if err != nil {
return err
return usernames, nil }
for _, entry := range entries {
if !entry.IsDirectory && len(entry.Name) > 5 && entry.Name[len(entry.Name)-5:] == ".json" {
usernames = append(usernames, entry.Name[:len(entry.Name)-5])
}
}
return nil
})
return usernames, err
} }
// Access Key methods still need to operate on the identity object
// We can reuse GetUser / UpdateUser logic to avoid duplicating file IO code here,
// or implement optimized read-modify-write.
// Reusing GetUser/saveIdentity is cleanest.
func (store *FilerEtcStore) GetUserByAccessKey(ctx context.Context, accessKey string) (*iam_pb.Identity, error) { func (store *FilerEtcStore) GetUserByAccessKey(ctx context.Context, accessKey string) (*iam_pb.Identity, error) {
config, err := store.LoadConfiguration(ctx) // This is inefficient in multi-file: requires scanning all files.
// Assuming number of users is not huge.
// For huge number of users, we'd need an index.
s3cfg, err := store.LoadConfiguration(ctx)
if err != nil { if err != nil {
return nil, fmt.Errorf("failed to load configuration: %w", err) return nil, err
} }
for _, identity := range config.Identities { for _, identity := range s3cfg.Identities {
for _, credential := range identity.Credentials { for _, credential := range identity.Credentials {
if credential.AccessKey == accessKey { if credential.AccessKey == accessKey {
// Return the specific identity
return identity, nil return identity, nil
} }
} }
} }
return nil, credential.ErrAccessKeyNotFound return nil, credential.ErrAccessKeyNotFound
} }
func (store *FilerEtcStore) CreateAccessKey(ctx context.Context, username string, cred *iam_pb.Credential) error { func (store *FilerEtcStore) CreateAccessKey(ctx context.Context, username string, cred *iam_pb.Credential) error {
config, err := store.LoadConfiguration(ctx) identity, err := store.GetUser(ctx, username)
if err != nil { if err != nil {
return fmt.Errorf("failed to load configuration: %w", err) return err
} }
// Find the user and add the credential for _, existing := range identity.Credentials {
for _, identity := range config.Identities { if existing.AccessKey == cred.AccessKey {
if identity.Name == username { return fmt.Errorf("access key %s already exists", cred.AccessKey)
// Check if access key already exists
for _, existingCred := range identity.Credentials {
if existingCred.AccessKey == cred.AccessKey {
return fmt.Errorf("access key %s already exists", cred.AccessKey)
}
}
identity.Credentials = append(identity.Credentials, cred)
return store.SaveConfiguration(ctx, config)
} }
} }
return credential.ErrUserNotFound identity.Credentials = append(identity.Credentials, cred)
return store.saveIdentity(ctx, identity)
} }
func (store *FilerEtcStore) DeleteAccessKey(ctx context.Context, username string, accessKey string) error { func (store *FilerEtcStore) DeleteAccessKey(ctx context.Context, username string, accessKey string) error {
config, err := store.LoadConfiguration(ctx) identity, err := store.GetUser(ctx, username)
if err != nil { if err != nil {
return fmt.Errorf("failed to load configuration: %w", err) return err
} }
// Find the user and remove the credential found := false
for _, identity := range config.Identities { for i, cred := range identity.Credentials {
if identity.Name == username { if cred.AccessKey == accessKey {
for i, cred := range identity.Credentials { identity.Credentials = append(identity.Credentials[:i], identity.Credentials[i+1:]...)
if cred.AccessKey == accessKey { found = true
identity.Credentials = append(identity.Credentials[:i], identity.Credentials[i+1:]...) break
return store.SaveConfiguration(ctx, config)
}
}
return credential.ErrAccessKeyNotFound
} }
} }
return credential.ErrUserNotFound if !found {
return credential.ErrAccessKeyNotFound
}
return store.saveIdentity(ctx, identity)
}
// Helpers
func (store *FilerEtcStore) saveIdentity(ctx context.Context, identity *iam_pb.Identity) error {
return store.withFilerClient(func(client filer_pb.SeaweedFilerClient) error {
data, err := json.Marshal(identity)
if err != nil {
return err
}
return filer.SaveInsideFiler(client, filer.IamConfigDirectory+"/"+IamIdentitiesDirectory, identity.Name+".json", data)
})
}
func (store *FilerEtcStore) readInsideFiler(dir string, name string) ([]byte, bool, error) {
var content []byte
found := false
err := store.withFilerClient(func(client filer_pb.SeaweedFilerClient) error {
c, err := filer.ReadInsideFiler(client, dir, name)
if err != nil {
if err == filer_pb.ErrNotFound {
return nil
}
return err
}
content = c
found = true
return nil
})
return content, found, err
}
func listEntries(ctx context.Context, client filer_pb.SeaweedFilerClient, dir string) ([]*filer_pb.Entry, error) {
var entries []*filer_pb.Entry
err := filer_pb.SeaweedList(ctx, client, dir, "", func(entry *filer_pb.Entry, isLast bool) error {
entries = append(entries, entry)
return nil
}, "", false, 100000)
if err != nil {
return nil, err
}
return entries, nil
} }