fix: 修复配额说明重复和undefined问题
- 在editStorageForm中初始化oss_storage_quota_value和oss_quota_unit - 删除重复的旧配额说明块,保留新的当前配额设置显示 Co-Authored-By: Claude Opus 4.5 <noreply@anthropic.com>
This commit is contained in:
36
backend/node_modules/@aws-sdk/middleware-sdk-s3/dist-es/bucket-endpoint-middleware.js
generated
vendored
Normal file
36
backend/node_modules/@aws-sdk/middleware-sdk-s3/dist-es/bucket-endpoint-middleware.js
generated
vendored
Normal file
@@ -0,0 +1,36 @@
|
||||
export function bucketEndpointMiddleware(options) {
|
||||
return (next, context) => async (args) => {
|
||||
if (options.bucketEndpoint) {
|
||||
const endpoint = context.endpointV2;
|
||||
if (endpoint) {
|
||||
const bucket = args.input.Bucket;
|
||||
if (typeof bucket === "string") {
|
||||
try {
|
||||
const bucketEndpointUrl = new URL(bucket);
|
||||
context.endpointV2 = {
|
||||
...endpoint,
|
||||
url: bucketEndpointUrl,
|
||||
};
|
||||
}
|
||||
catch (e) {
|
||||
const warning = `@aws-sdk/middleware-sdk-s3: bucketEndpoint=true was set but Bucket=${bucket} could not be parsed as URL.`;
|
||||
if (context.logger?.constructor?.name === "NoOpLogger") {
|
||||
console.warn(warning);
|
||||
}
|
||||
else {
|
||||
context.logger?.warn?.(warning);
|
||||
}
|
||||
throw e;
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
return next(args);
|
||||
};
|
||||
}
|
||||
export const bucketEndpointMiddlewareOptions = {
|
||||
name: "bucketEndpointMiddleware",
|
||||
override: true,
|
||||
relation: "after",
|
||||
toMiddleware: "endpointV2Middleware",
|
||||
};
|
||||
32
backend/node_modules/@aws-sdk/middleware-sdk-s3/dist-es/check-content-length-header.js
generated
vendored
Normal file
32
backend/node_modules/@aws-sdk/middleware-sdk-s3/dist-es/check-content-length-header.js
generated
vendored
Normal file
@@ -0,0 +1,32 @@
|
||||
import { HttpRequest } from "@smithy/protocol-http";
|
||||
import { NoOpLogger } from "@smithy/smithy-client";
|
||||
const CONTENT_LENGTH_HEADER = "content-length";
|
||||
const DECODED_CONTENT_LENGTH_HEADER = "x-amz-decoded-content-length";
|
||||
export function checkContentLengthHeader() {
|
||||
return (next, context) => async (args) => {
|
||||
const { request } = args;
|
||||
if (HttpRequest.isInstance(request)) {
|
||||
if (!(CONTENT_LENGTH_HEADER in request.headers) && !(DECODED_CONTENT_LENGTH_HEADER in request.headers)) {
|
||||
const message = `Are you using a Stream of unknown length as the Body of a PutObject request? Consider using Upload instead from @aws-sdk/lib-storage.`;
|
||||
if (typeof context?.logger?.warn === "function" && !(context.logger instanceof NoOpLogger)) {
|
||||
context.logger.warn(message);
|
||||
}
|
||||
else {
|
||||
console.warn(message);
|
||||
}
|
||||
}
|
||||
}
|
||||
return next({ ...args });
|
||||
};
|
||||
}
|
||||
export const checkContentLengthHeaderMiddlewareOptions = {
|
||||
step: "finalizeRequest",
|
||||
tags: ["CHECK_CONTENT_LENGTH_HEADER"],
|
||||
name: "getCheckContentLengthHeaderPlugin",
|
||||
override: true,
|
||||
};
|
||||
export const getCheckContentLengthHeaderPlugin = (unused) => ({
|
||||
applyToStack: (clientStack) => {
|
||||
clientStack.add(checkContentLengthHeader(), checkContentLengthHeaderMiddlewareOptions);
|
||||
},
|
||||
});
|
||||
8
backend/node_modules/@aws-sdk/middleware-sdk-s3/dist-es/index.js
generated
vendored
Normal file
8
backend/node_modules/@aws-sdk/middleware-sdk-s3/dist-es/index.js
generated
vendored
Normal file
@@ -0,0 +1,8 @@
|
||||
export * from "./check-content-length-header";
|
||||
export * from "./region-redirect-endpoint-middleware";
|
||||
export * from "./region-redirect-middleware";
|
||||
export * from "./s3-expires-middleware";
|
||||
export * from "./s3-express/index";
|
||||
export * from "./s3Configuration";
|
||||
export * from "./throw-200-exceptions";
|
||||
export * from "./validate-bucket-name";
|
||||
41
backend/node_modules/@aws-sdk/middleware-sdk-s3/dist-es/region-redirect-endpoint-middleware.js
generated
vendored
Normal file
41
backend/node_modules/@aws-sdk/middleware-sdk-s3/dist-es/region-redirect-endpoint-middleware.js
generated
vendored
Normal file
@@ -0,0 +1,41 @@
|
||||
export const regionRedirectEndpointMiddleware = (config) => {
|
||||
return (next, context) => async (args) => {
|
||||
const originalRegion = await config.region();
|
||||
const regionProviderRef = config.region;
|
||||
let unlock = () => { };
|
||||
if (context.__s3RegionRedirect) {
|
||||
Object.defineProperty(config, "region", {
|
||||
writable: false,
|
||||
value: async () => {
|
||||
return context.__s3RegionRedirect;
|
||||
},
|
||||
});
|
||||
unlock = () => Object.defineProperty(config, "region", {
|
||||
writable: true,
|
||||
value: regionProviderRef,
|
||||
});
|
||||
}
|
||||
try {
|
||||
const result = await next(args);
|
||||
if (context.__s3RegionRedirect) {
|
||||
unlock();
|
||||
const region = await config.region();
|
||||
if (originalRegion !== region) {
|
||||
throw new Error("Region was not restored following S3 region redirect.");
|
||||
}
|
||||
}
|
||||
return result;
|
||||
}
|
||||
catch (e) {
|
||||
unlock();
|
||||
throw e;
|
||||
}
|
||||
};
|
||||
};
|
||||
export const regionRedirectEndpointMiddlewareOptions = {
|
||||
tags: ["REGION_REDIRECT", "S3"],
|
||||
name: "regionRedirectEndpointMiddleware",
|
||||
override: true,
|
||||
relation: "before",
|
||||
toMiddleware: "endpointV2Middleware",
|
||||
};
|
||||
42
backend/node_modules/@aws-sdk/middleware-sdk-s3/dist-es/region-redirect-middleware.js
generated
vendored
Normal file
42
backend/node_modules/@aws-sdk/middleware-sdk-s3/dist-es/region-redirect-middleware.js
generated
vendored
Normal file
@@ -0,0 +1,42 @@
|
||||
import { regionRedirectEndpointMiddleware, regionRedirectEndpointMiddlewareOptions, } from "./region-redirect-endpoint-middleware";
|
||||
export function regionRedirectMiddleware(clientConfig) {
|
||||
return (next, context) => async (args) => {
|
||||
try {
|
||||
return await next(args);
|
||||
}
|
||||
catch (err) {
|
||||
if (clientConfig.followRegionRedirects) {
|
||||
const statusCode = err?.$metadata?.httpStatusCode;
|
||||
const isHeadBucket = context.commandName === "HeadBucketCommand";
|
||||
const bucketRegionHeader = err?.$response?.headers?.["x-amz-bucket-region"];
|
||||
if (bucketRegionHeader) {
|
||||
if (statusCode === 301 ||
|
||||
(statusCode === 400 && (err?.name === "IllegalLocationConstraintException" || isHeadBucket))) {
|
||||
try {
|
||||
const actualRegion = bucketRegionHeader;
|
||||
context.logger?.debug(`Redirecting from ${await clientConfig.region()} to ${actualRegion}`);
|
||||
context.__s3RegionRedirect = actualRegion;
|
||||
}
|
||||
catch (e) {
|
||||
throw new Error("Region redirect failed: " + e);
|
||||
}
|
||||
return next(args);
|
||||
}
|
||||
}
|
||||
}
|
||||
throw err;
|
||||
}
|
||||
};
|
||||
}
|
||||
export const regionRedirectMiddlewareOptions = {
|
||||
step: "initialize",
|
||||
tags: ["REGION_REDIRECT", "S3"],
|
||||
name: "regionRedirectMiddleware",
|
||||
override: true,
|
||||
};
|
||||
export const getRegionRedirectMiddlewarePlugin = (clientConfig) => ({
|
||||
applyToStack: (clientStack) => {
|
||||
clientStack.add(regionRedirectMiddleware(clientConfig), regionRedirectMiddlewareOptions);
|
||||
clientStack.addRelativeTo(regionRedirectEndpointMiddleware(clientConfig), regionRedirectEndpointMiddlewareOptions);
|
||||
},
|
||||
});
|
||||
33
backend/node_modules/@aws-sdk/middleware-sdk-s3/dist-es/s3-expires-middleware.js
generated
vendored
Normal file
33
backend/node_modules/@aws-sdk/middleware-sdk-s3/dist-es/s3-expires-middleware.js
generated
vendored
Normal file
@@ -0,0 +1,33 @@
|
||||
import { HttpResponse } from "@smithy/protocol-http";
|
||||
import { parseRfc7231DateTime } from "@smithy/smithy-client";
|
||||
export const s3ExpiresMiddleware = (config) => {
|
||||
return (next, context) => async (args) => {
|
||||
const result = await next(args);
|
||||
const { response } = result;
|
||||
if (HttpResponse.isInstance(response)) {
|
||||
if (response.headers.expires) {
|
||||
response.headers.expiresstring = response.headers.expires;
|
||||
try {
|
||||
parseRfc7231DateTime(response.headers.expires);
|
||||
}
|
||||
catch (e) {
|
||||
context.logger?.warn(`AWS SDK Warning for ${context.clientName}::${context.commandName} response parsing (${response.headers.expires}): ${e}`);
|
||||
delete response.headers.expires;
|
||||
}
|
||||
}
|
||||
}
|
||||
return result;
|
||||
};
|
||||
};
|
||||
export const s3ExpiresMiddlewareOptions = {
|
||||
tags: ["S3"],
|
||||
name: "s3ExpiresMiddleware",
|
||||
override: true,
|
||||
relation: "after",
|
||||
toMiddleware: "deserializerMiddleware",
|
||||
};
|
||||
export const getS3ExpiresMiddlewarePlugin = (clientConfig) => ({
|
||||
applyToStack: (clientStack) => {
|
||||
clientStack.addRelativeTo(s3ExpiresMiddleware(clientConfig), s3ExpiresMiddlewareOptions);
|
||||
},
|
||||
});
|
||||
39
backend/node_modules/@aws-sdk/middleware-sdk-s3/dist-es/s3-express/classes/S3ExpressIdentityCache.js
generated
vendored
Normal file
39
backend/node_modules/@aws-sdk/middleware-sdk-s3/dist-es/s3-express/classes/S3ExpressIdentityCache.js
generated
vendored
Normal file
@@ -0,0 +1,39 @@
|
||||
export class S3ExpressIdentityCache {
|
||||
data;
|
||||
lastPurgeTime = Date.now();
|
||||
static EXPIRED_CREDENTIAL_PURGE_INTERVAL_MS = 30_000;
|
||||
constructor(data = {}) {
|
||||
this.data = data;
|
||||
}
|
||||
get(key) {
|
||||
const entry = this.data[key];
|
||||
if (!entry) {
|
||||
return;
|
||||
}
|
||||
return entry;
|
||||
}
|
||||
set(key, entry) {
|
||||
this.data[key] = entry;
|
||||
return entry;
|
||||
}
|
||||
delete(key) {
|
||||
delete this.data[key];
|
||||
}
|
||||
async purgeExpired() {
|
||||
const now = Date.now();
|
||||
if (this.lastPurgeTime + S3ExpressIdentityCache.EXPIRED_CREDENTIAL_PURGE_INTERVAL_MS > now) {
|
||||
return;
|
||||
}
|
||||
for (const key in this.data) {
|
||||
const entry = this.data[key];
|
||||
if (!entry.isRefreshing) {
|
||||
const credential = await entry.identity;
|
||||
if (credential.expiration) {
|
||||
if (credential.expiration.getTime() < now) {
|
||||
delete this.data[key];
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
14
backend/node_modules/@aws-sdk/middleware-sdk-s3/dist-es/s3-express/classes/S3ExpressIdentityCacheEntry.js
generated
vendored
Normal file
14
backend/node_modules/@aws-sdk/middleware-sdk-s3/dist-es/s3-express/classes/S3ExpressIdentityCacheEntry.js
generated
vendored
Normal file
@@ -0,0 +1,14 @@
|
||||
export class S3ExpressIdentityCacheEntry {
|
||||
_identity;
|
||||
isRefreshing;
|
||||
accessed;
|
||||
constructor(_identity, isRefreshing = false, accessed = Date.now()) {
|
||||
this._identity = _identity;
|
||||
this.isRefreshing = isRefreshing;
|
||||
this.accessed = accessed;
|
||||
}
|
||||
get identity() {
|
||||
this.accessed = Date.now();
|
||||
return this._identity;
|
||||
}
|
||||
}
|
||||
49
backend/node_modules/@aws-sdk/middleware-sdk-s3/dist-es/s3-express/classes/S3ExpressIdentityProviderImpl.js
generated
vendored
Normal file
49
backend/node_modules/@aws-sdk/middleware-sdk-s3/dist-es/s3-express/classes/S3ExpressIdentityProviderImpl.js
generated
vendored
Normal file
@@ -0,0 +1,49 @@
|
||||
import { S3ExpressIdentityCache } from "./S3ExpressIdentityCache";
|
||||
import { S3ExpressIdentityCacheEntry } from "./S3ExpressIdentityCacheEntry";
|
||||
export class S3ExpressIdentityProviderImpl {
|
||||
createSessionFn;
|
||||
cache;
|
||||
static REFRESH_WINDOW_MS = 60_000;
|
||||
constructor(createSessionFn, cache = new S3ExpressIdentityCache()) {
|
||||
this.createSessionFn = createSessionFn;
|
||||
this.cache = cache;
|
||||
}
|
||||
async getS3ExpressIdentity(awsIdentity, identityProperties) {
|
||||
const key = identityProperties.Bucket;
|
||||
const { cache } = this;
|
||||
const entry = cache.get(key);
|
||||
if (entry) {
|
||||
return entry.identity.then((identity) => {
|
||||
const isExpired = (identity.expiration?.getTime() ?? 0) < Date.now();
|
||||
if (isExpired) {
|
||||
return cache.set(key, new S3ExpressIdentityCacheEntry(this.getIdentity(key))).identity;
|
||||
}
|
||||
const isExpiringSoon = (identity.expiration?.getTime() ?? 0) < Date.now() + S3ExpressIdentityProviderImpl.REFRESH_WINDOW_MS;
|
||||
if (isExpiringSoon && !entry.isRefreshing) {
|
||||
entry.isRefreshing = true;
|
||||
this.getIdentity(key).then((id) => {
|
||||
cache.set(key, new S3ExpressIdentityCacheEntry(Promise.resolve(id)));
|
||||
});
|
||||
}
|
||||
return identity;
|
||||
});
|
||||
}
|
||||
return cache.set(key, new S3ExpressIdentityCacheEntry(this.getIdentity(key))).identity;
|
||||
}
|
||||
async getIdentity(key) {
|
||||
await this.cache.purgeExpired().catch((error) => {
|
||||
console.warn("Error while clearing expired entries in S3ExpressIdentityCache: \n" + error);
|
||||
});
|
||||
const session = await this.createSessionFn(key);
|
||||
if (!session.Credentials?.AccessKeyId || !session.Credentials?.SecretAccessKey) {
|
||||
throw new Error("s3#createSession response credential missing AccessKeyId or SecretAccessKey.");
|
||||
}
|
||||
const identity = {
|
||||
accessKeyId: session.Credentials.AccessKeyId,
|
||||
secretAccessKey: session.Credentials.SecretAccessKey,
|
||||
sessionToken: session.Credentials.SessionToken,
|
||||
expiration: session.Credentials.Expiration ? new Date(session.Credentials.Expiration) : undefined,
|
||||
};
|
||||
return identity;
|
||||
}
|
||||
}
|
||||
41
backend/node_modules/@aws-sdk/middleware-sdk-s3/dist-es/s3-express/classes/SignatureV4S3Express.js
generated
vendored
Normal file
41
backend/node_modules/@aws-sdk/middleware-sdk-s3/dist-es/s3-express/classes/SignatureV4S3Express.js
generated
vendored
Normal file
@@ -0,0 +1,41 @@
|
||||
import { SignatureV4 } from "@smithy/signature-v4";
|
||||
import { SESSION_TOKEN_HEADER, SESSION_TOKEN_QUERY_PARAM } from "../constants";
|
||||
export class SignatureV4S3Express extends SignatureV4 {
|
||||
async signWithCredentials(requestToSign, credentials, options) {
|
||||
const credentialsWithoutSessionToken = getCredentialsWithoutSessionToken(credentials);
|
||||
requestToSign.headers[SESSION_TOKEN_HEADER] = credentials.sessionToken;
|
||||
const privateAccess = this;
|
||||
setSingleOverride(privateAccess, credentialsWithoutSessionToken);
|
||||
return privateAccess.signRequest(requestToSign, options ?? {});
|
||||
}
|
||||
async presignWithCredentials(requestToSign, credentials, options) {
|
||||
const credentialsWithoutSessionToken = getCredentialsWithoutSessionToken(credentials);
|
||||
delete requestToSign.headers[SESSION_TOKEN_HEADER];
|
||||
requestToSign.headers[SESSION_TOKEN_QUERY_PARAM] = credentials.sessionToken;
|
||||
requestToSign.query = requestToSign.query ?? {};
|
||||
requestToSign.query[SESSION_TOKEN_QUERY_PARAM] = credentials.sessionToken;
|
||||
const privateAccess = this;
|
||||
setSingleOverride(privateAccess, credentialsWithoutSessionToken);
|
||||
return this.presign(requestToSign, options);
|
||||
}
|
||||
}
|
||||
function getCredentialsWithoutSessionToken(credentials) {
|
||||
const credentialsWithoutSessionToken = {
|
||||
accessKeyId: credentials.accessKeyId,
|
||||
secretAccessKey: credentials.secretAccessKey,
|
||||
expiration: credentials.expiration,
|
||||
};
|
||||
return credentialsWithoutSessionToken;
|
||||
}
|
||||
function setSingleOverride(privateAccess, credentialsWithoutSessionToken) {
|
||||
const id = setTimeout(() => {
|
||||
throw new Error("SignatureV4S3Express credential override was created but not called.");
|
||||
}, 10);
|
||||
const currentCredentialProvider = privateAccess.credentialProvider;
|
||||
const overrideCredentialsProviderOnce = () => {
|
||||
clearTimeout(id);
|
||||
privateAccess.credentialProvider = currentCredentialProvider;
|
||||
return Promise.resolve(credentialsWithoutSessionToken);
|
||||
};
|
||||
privateAccess.credentialProvider = overrideCredentialsProviderOnce;
|
||||
}
|
||||
13
backend/node_modules/@aws-sdk/middleware-sdk-s3/dist-es/s3-express/constants.js
generated
vendored
Normal file
13
backend/node_modules/@aws-sdk/middleware-sdk-s3/dist-es/s3-express/constants.js
generated
vendored
Normal file
@@ -0,0 +1,13 @@
|
||||
import { booleanSelector, SelectorType } from "@smithy/util-config-provider";
|
||||
export const S3_EXPRESS_BUCKET_TYPE = "Directory";
|
||||
export const S3_EXPRESS_BACKEND = "S3Express";
|
||||
export const S3_EXPRESS_AUTH_SCHEME = "sigv4-s3express";
|
||||
export const SESSION_TOKEN_QUERY_PARAM = "X-Amz-S3session-Token";
|
||||
export const SESSION_TOKEN_HEADER = SESSION_TOKEN_QUERY_PARAM.toLowerCase();
|
||||
export const NODE_DISABLE_S3_EXPRESS_SESSION_AUTH_ENV_NAME = "AWS_S3_DISABLE_EXPRESS_SESSION_AUTH";
|
||||
export const NODE_DISABLE_S3_EXPRESS_SESSION_AUTH_INI_NAME = "s3_disable_express_session_auth";
|
||||
export const NODE_DISABLE_S3_EXPRESS_SESSION_AUTH_OPTIONS = {
|
||||
environmentVariableSelector: (env) => booleanSelector(env, NODE_DISABLE_S3_EXPRESS_SESSION_AUTH_ENV_NAME, SelectorType.ENV),
|
||||
configFileSelector: (profile) => booleanSelector(profile, NODE_DISABLE_S3_EXPRESS_SESSION_AUTH_INI_NAME, SelectorType.CONFIG),
|
||||
default: false,
|
||||
};
|
||||
39
backend/node_modules/@aws-sdk/middleware-sdk-s3/dist-es/s3-express/functions/s3ExpressHttpSigningMiddleware.js
generated
vendored
Normal file
39
backend/node_modules/@aws-sdk/middleware-sdk-s3/dist-es/s3-express/functions/s3ExpressHttpSigningMiddleware.js
generated
vendored
Normal file
@@ -0,0 +1,39 @@
|
||||
import { httpSigningMiddlewareOptions } from "@smithy/core";
|
||||
import { HttpRequest } from "@smithy/protocol-http";
|
||||
import { SMITHY_CONTEXT_KEY, } from "@smithy/types";
|
||||
import { getSmithyContext } from "@smithy/util-middleware";
|
||||
import { signS3Express } from "./signS3Express";
|
||||
const defaultErrorHandler = (signingProperties) => (error) => {
|
||||
throw error;
|
||||
};
|
||||
const defaultSuccessHandler = (httpResponse, signingProperties) => { };
|
||||
export const s3ExpressHttpSigningMiddlewareOptions = httpSigningMiddlewareOptions;
|
||||
export const s3ExpressHttpSigningMiddleware = (config) => (next, context) => async (args) => {
|
||||
if (!HttpRequest.isInstance(args.request)) {
|
||||
return next(args);
|
||||
}
|
||||
const smithyContext = getSmithyContext(context);
|
||||
const scheme = smithyContext.selectedHttpAuthScheme;
|
||||
if (!scheme) {
|
||||
throw new Error(`No HttpAuthScheme was selected: unable to sign request`);
|
||||
}
|
||||
const { httpAuthOption: { signingProperties = {} }, identity, signer, } = scheme;
|
||||
let request;
|
||||
if (context.s3ExpressIdentity) {
|
||||
request = await signS3Express(context.s3ExpressIdentity, signingProperties, args.request, await config.signer());
|
||||
}
|
||||
else {
|
||||
request = await signer.sign(args.request, identity, signingProperties);
|
||||
}
|
||||
const output = await next({
|
||||
...args,
|
||||
request,
|
||||
}).catch((signer.errorHandler || defaultErrorHandler)(signingProperties));
|
||||
(signer.successHandler || defaultSuccessHandler)(output.response, signingProperties);
|
||||
return output;
|
||||
};
|
||||
export const getS3ExpressHttpSigningPlugin = (config) => ({
|
||||
applyToStack: (clientStack) => {
|
||||
clientStack.addRelativeTo(s3ExpressHttpSigningMiddleware(config), httpSigningMiddlewareOptions);
|
||||
},
|
||||
});
|
||||
41
backend/node_modules/@aws-sdk/middleware-sdk-s3/dist-es/s3-express/functions/s3ExpressMiddleware.js
generated
vendored
Normal file
41
backend/node_modules/@aws-sdk/middleware-sdk-s3/dist-es/s3-express/functions/s3ExpressMiddleware.js
generated
vendored
Normal file
@@ -0,0 +1,41 @@
|
||||
import { setFeature } from "@aws-sdk/core";
|
||||
import { HttpRequest } from "@smithy/protocol-http";
|
||||
import { S3_EXPRESS_AUTH_SCHEME, S3_EXPRESS_BACKEND, S3_EXPRESS_BUCKET_TYPE, SESSION_TOKEN_HEADER } from "../constants";
|
||||
export const s3ExpressMiddleware = (options) => {
|
||||
return (next, context) => async (args) => {
|
||||
if (context.endpointV2) {
|
||||
const endpoint = context.endpointV2;
|
||||
const isS3ExpressAuth = endpoint.properties?.authSchemes?.[0]?.name === S3_EXPRESS_AUTH_SCHEME;
|
||||
const isS3ExpressBucket = endpoint.properties?.backend === S3_EXPRESS_BACKEND ||
|
||||
endpoint.properties?.bucketType === S3_EXPRESS_BUCKET_TYPE;
|
||||
if (isS3ExpressBucket) {
|
||||
setFeature(context, "S3_EXPRESS_BUCKET", "J");
|
||||
context.isS3ExpressBucket = true;
|
||||
}
|
||||
if (isS3ExpressAuth) {
|
||||
const requestBucket = args.input.Bucket;
|
||||
if (requestBucket) {
|
||||
const s3ExpressIdentity = await options.s3ExpressIdentityProvider.getS3ExpressIdentity(await options.credentials(), {
|
||||
Bucket: requestBucket,
|
||||
});
|
||||
context.s3ExpressIdentity = s3ExpressIdentity;
|
||||
if (HttpRequest.isInstance(args.request) && s3ExpressIdentity.sessionToken) {
|
||||
args.request.headers[SESSION_TOKEN_HEADER] = s3ExpressIdentity.sessionToken;
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
return next(args);
|
||||
};
|
||||
};
|
||||
export const s3ExpressMiddlewareOptions = {
|
||||
name: "s3ExpressMiddleware",
|
||||
step: "build",
|
||||
tags: ["S3", "S3_EXPRESS"],
|
||||
override: true,
|
||||
};
|
||||
export const getS3ExpressPlugin = (options) => ({
|
||||
applyToStack: (clientStack) => {
|
||||
clientStack.add(s3ExpressMiddleware(options), s3ExpressMiddlewareOptions);
|
||||
},
|
||||
});
|
||||
7
backend/node_modules/@aws-sdk/middleware-sdk-s3/dist-es/s3-express/functions/signS3Express.js
generated
vendored
Normal file
7
backend/node_modules/@aws-sdk/middleware-sdk-s3/dist-es/s3-express/functions/signS3Express.js
generated
vendored
Normal file
@@ -0,0 +1,7 @@
|
||||
export const signS3Express = async (s3ExpressIdentity, signingOptions, request, sigV4MultiRegionSigner) => {
|
||||
const signedRequest = await sigV4MultiRegionSigner.signWithCredentials(request, s3ExpressIdentity, {});
|
||||
if (signedRequest.headers["X-Amz-Security-Token"] || signedRequest.headers["x-amz-security-token"]) {
|
||||
throw new Error("X-Amz-Security-Token must not be set for s3-express requests.");
|
||||
}
|
||||
return signedRequest;
|
||||
};
|
||||
7
backend/node_modules/@aws-sdk/middleware-sdk-s3/dist-es/s3-express/index.js
generated
vendored
Normal file
7
backend/node_modules/@aws-sdk/middleware-sdk-s3/dist-es/s3-express/index.js
generated
vendored
Normal file
@@ -0,0 +1,7 @@
|
||||
export { S3ExpressIdentityCache } from "./classes/S3ExpressIdentityCache";
|
||||
export { S3ExpressIdentityCacheEntry } from "./classes/S3ExpressIdentityCacheEntry";
|
||||
export { S3ExpressIdentityProviderImpl } from "./classes/S3ExpressIdentityProviderImpl";
|
||||
export { SignatureV4S3Express } from "./classes/SignatureV4S3Express";
|
||||
export { NODE_DISABLE_S3_EXPRESS_SESSION_AUTH_OPTIONS } from "./constants";
|
||||
export { getS3ExpressPlugin, s3ExpressMiddleware, s3ExpressMiddlewareOptions } from "./functions/s3ExpressMiddleware";
|
||||
export { getS3ExpressHttpSigningPlugin, s3ExpressHttpSigningMiddleware, s3ExpressHttpSigningMiddlewareOptions, } from "./functions/s3ExpressHttpSigningMiddleware";
|
||||
1
backend/node_modules/@aws-sdk/middleware-sdk-s3/dist-es/s3-express/interfaces/S3ExpressIdentity.js
generated
vendored
Normal file
1
backend/node_modules/@aws-sdk/middleware-sdk-s3/dist-es/s3-express/interfaces/S3ExpressIdentity.js
generated
vendored
Normal file
@@ -0,0 +1 @@
|
||||
export {};
|
||||
1
backend/node_modules/@aws-sdk/middleware-sdk-s3/dist-es/s3-express/interfaces/S3ExpressIdentityProvider.js
generated
vendored
Normal file
1
backend/node_modules/@aws-sdk/middleware-sdk-s3/dist-es/s3-express/interfaces/S3ExpressIdentityProvider.js
generated
vendored
Normal file
@@ -0,0 +1 @@
|
||||
export {};
|
||||
17
backend/node_modules/@aws-sdk/middleware-sdk-s3/dist-es/s3Configuration.js
generated
vendored
Normal file
17
backend/node_modules/@aws-sdk/middleware-sdk-s3/dist-es/s3Configuration.js
generated
vendored
Normal file
@@ -0,0 +1,17 @@
|
||||
import { S3ExpressIdentityProviderImpl } from "./s3-express";
|
||||
export const resolveS3Config = (input, { session, }) => {
|
||||
const [s3ClientProvider, CreateSessionCommandCtor] = session;
|
||||
const { forcePathStyle, useAccelerateEndpoint, disableMultiregionAccessPoints, followRegionRedirects, s3ExpressIdentityProvider, bucketEndpoint, expectContinueHeader, } = input;
|
||||
return Object.assign(input, {
|
||||
forcePathStyle: forcePathStyle ?? false,
|
||||
useAccelerateEndpoint: useAccelerateEndpoint ?? false,
|
||||
disableMultiregionAccessPoints: disableMultiregionAccessPoints ?? false,
|
||||
followRegionRedirects: followRegionRedirects ?? false,
|
||||
s3ExpressIdentityProvider: s3ExpressIdentityProvider ??
|
||||
new S3ExpressIdentityProviderImpl(async (key) => s3ClientProvider().send(new CreateSessionCommandCtor({
|
||||
Bucket: key,
|
||||
}))),
|
||||
bucketEndpoint: bucketEndpoint ?? false,
|
||||
expectContinueHeader: expectContinueHeader ?? 2_097_152,
|
||||
});
|
||||
};
|
||||
67
backend/node_modules/@aws-sdk/middleware-sdk-s3/dist-es/throw-200-exceptions.js
generated
vendored
Normal file
67
backend/node_modules/@aws-sdk/middleware-sdk-s3/dist-es/throw-200-exceptions.js
generated
vendored
Normal file
@@ -0,0 +1,67 @@
|
||||
import { HttpResponse } from "@smithy/protocol-http";
|
||||
import { headStream, splitStream } from "@smithy/util-stream";
|
||||
const THROW_IF_EMPTY_BODY = {
|
||||
CopyObjectCommand: true,
|
||||
UploadPartCopyCommand: true,
|
||||
CompleteMultipartUploadCommand: true,
|
||||
};
|
||||
const MAX_BYTES_TO_INSPECT = 3000;
|
||||
export const throw200ExceptionsMiddleware = (config) => (next, context) => async (args) => {
|
||||
const result = await next(args);
|
||||
const { response } = result;
|
||||
if (!HttpResponse.isInstance(response)) {
|
||||
return result;
|
||||
}
|
||||
const { statusCode, body: sourceBody } = response;
|
||||
if (statusCode < 200 || statusCode >= 300) {
|
||||
return result;
|
||||
}
|
||||
const isSplittableStream = typeof sourceBody?.stream === "function" ||
|
||||
typeof sourceBody?.pipe === "function" ||
|
||||
typeof sourceBody?.tee === "function";
|
||||
if (!isSplittableStream) {
|
||||
return result;
|
||||
}
|
||||
let bodyCopy = sourceBody;
|
||||
let body = sourceBody;
|
||||
if (sourceBody && typeof sourceBody === "object" && !(sourceBody instanceof Uint8Array)) {
|
||||
[bodyCopy, body] = await splitStream(sourceBody);
|
||||
}
|
||||
response.body = body;
|
||||
const bodyBytes = await collectBody(bodyCopy, {
|
||||
streamCollector: async (stream) => {
|
||||
return headStream(stream, MAX_BYTES_TO_INSPECT);
|
||||
},
|
||||
});
|
||||
if (typeof bodyCopy?.destroy === "function") {
|
||||
bodyCopy.destroy();
|
||||
}
|
||||
const bodyStringTail = config.utf8Encoder(bodyBytes.subarray(bodyBytes.length - 16));
|
||||
if (bodyBytes.length === 0 && THROW_IF_EMPTY_BODY[context.commandName]) {
|
||||
const err = new Error("S3 aborted request");
|
||||
err.name = "InternalError";
|
||||
throw err;
|
||||
}
|
||||
if (bodyStringTail && bodyStringTail.endsWith("</Error>")) {
|
||||
response.statusCode = 400;
|
||||
}
|
||||
return result;
|
||||
};
|
||||
const collectBody = (streamBody = new Uint8Array(), context) => {
|
||||
if (streamBody instanceof Uint8Array) {
|
||||
return Promise.resolve(streamBody);
|
||||
}
|
||||
return context.streamCollector(streamBody) || Promise.resolve(new Uint8Array());
|
||||
};
|
||||
export const throw200ExceptionsMiddlewareOptions = {
|
||||
relation: "after",
|
||||
toMiddleware: "deserializerMiddleware",
|
||||
tags: ["THROW_200_EXCEPTIONS", "S3"],
|
||||
name: "throw200ExceptionsMiddleware",
|
||||
override: true,
|
||||
};
|
||||
export const getThrow200ExceptionsPlugin = (config) => ({
|
||||
applyToStack: (clientStack) => {
|
||||
clientStack.addRelativeTo(throw200ExceptionsMiddleware(config), throw200ExceptionsMiddlewareOptions);
|
||||
},
|
||||
});
|
||||
25
backend/node_modules/@aws-sdk/middleware-sdk-s3/dist-es/validate-bucket-name.js
generated
vendored
Normal file
25
backend/node_modules/@aws-sdk/middleware-sdk-s3/dist-es/validate-bucket-name.js
generated
vendored
Normal file
@@ -0,0 +1,25 @@
|
||||
import { validate as validateArn } from "@aws-sdk/util-arn-parser";
|
||||
import { bucketEndpointMiddleware, bucketEndpointMiddlewareOptions } from "./bucket-endpoint-middleware";
|
||||
export function validateBucketNameMiddleware({ bucketEndpoint }) {
|
||||
return (next) => async (args) => {
|
||||
const { input: { Bucket }, } = args;
|
||||
if (!bucketEndpoint && typeof Bucket === "string" && !validateArn(Bucket) && Bucket.indexOf("/") >= 0) {
|
||||
const err = new Error(`Bucket name shouldn't contain '/', received '${Bucket}'`);
|
||||
err.name = "InvalidBucketName";
|
||||
throw err;
|
||||
}
|
||||
return next({ ...args });
|
||||
};
|
||||
}
|
||||
export const validateBucketNameMiddlewareOptions = {
|
||||
step: "initialize",
|
||||
tags: ["VALIDATE_BUCKET_NAME"],
|
||||
name: "validateBucketNameMiddleware",
|
||||
override: true,
|
||||
};
|
||||
export const getValidateBucketNamePlugin = (options) => ({
|
||||
applyToStack: (clientStack) => {
|
||||
clientStack.add(validateBucketNameMiddleware(options), validateBucketNameMiddlewareOptions);
|
||||
clientStack.addRelativeTo(bucketEndpointMiddleware(options), bucketEndpointMiddlewareOptions);
|
||||
},
|
||||
});
|
||||
Reference in New Issue
Block a user