summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorGravatar Joey Hess <joey@kitenet.net>2011-05-16 11:20:30 -0400
committerGravatar Joey Hess <joey@kitenet.net>2011-05-16 11:20:35 -0400
commit1d2984441c654f01e88e427f3289f8066cd2e6b0 (patch)
tree6e0232740696fc94e2f78becb262c18f45ef2506
parent79c74bf27dfb9795ad35bc4e4c2061004212621d (diff)
add a few tweaks to make it easy to use the Internet Archive's variant of S3
In particular, munge key filenames to comply with the IA's filename limits, disable encryption, support their nonstandard way of creating buckets, and allow x-amz-* headers to be specified in initremote to set item metadata. Still TODO: initremote does not handle multiword metadata headers right.
-rw-r--r--Remote/S3real.hs90
-rw-r--r--debian/changelog5
-rw-r--r--doc/special_remotes/S3.mdwn13
-rw-r--r--doc/walkthrough/Internet_Archive_via_S3.mdwn42
4 files changed, 109 insertions, 41 deletions
diff --git a/Remote/S3real.hs b/Remote/S3real.hs
index e8c700e2c..7d6b5d5ba 100644
--- a/Remote/S3real.hs
+++ b/Remote/S3real.hs
@@ -15,6 +15,9 @@ import Network.AWS.AWSResult
import qualified Data.ByteString.Lazy.Char8 as L
import qualified Data.Map as M
import Data.Maybe
+import Data.List
+import Data.Char
+import Data.String.Utils
import Control.Monad (when)
import Control.Monad.State (liftIO)
import System.Environment
@@ -68,24 +71,53 @@ gen' r u c cst = do
}
s3Setup :: UUID -> RemoteConfig -> Annex RemoteConfig
-s3Setup u c = do
- -- verify configuration is sane
- c' <- encryptionSetup c
- let fullconfig = M.union c' defaults
-
- genBucket fullconfig
- gitConfigSpecialRemote u fullconfig "s3" "true"
- s3SetCreds fullconfig
+s3Setup u c = handlehost $ M.lookup "host" c
where
remotename = fromJust (M.lookup "name" c)
- bucket = remotename ++ "-" ++ u
+ defbucket = remotename ++ "-" ++ u
defaults = M.fromList
[ ("datacenter", "US")
, ("storageclass", "STANDARD")
, ("host", defaultAmazonS3Host)
, ("port", show defaultAmazonS3Port)
- , ("bucket", bucket)
+ , ("bucket", defbucket)
]
+
+ handlehost Nothing = defaulthost
+ handlehost (Just h)
+ | ".archive.org" `isSuffixOf` (map toLower h) = archiveorg
+ | otherwise = defaulthost
+
+ use fullconfig = do
+ genBucket fullconfig
+ gitConfigSpecialRemote u fullconfig "s3" "true"
+ s3SetCreds fullconfig
+
+ defaulthost = do
+ c' <- encryptionSetup c
+ use $ M.union c' defaults
+
+ archiveorg = do
+ showNote $ "Internet Archive mode"
+ maybe (error "specify bucket=") (const $ return ()) $
+ M.lookup "bucket" archiveconfig
+ use archiveconfig
+ where
+ archiveconfig =
+ -- hS3 does not pass through
+ -- x-archive-* headers
+ M.mapKeys (replace "x-archive-" "x-amz-") $
+ -- encryption does not make sense here
+ M.insert "encryption" "none" $
+ M.union c $
+ -- special constraints on key names
+ M.insert "mungekeys" "ia" $
+ -- buckets created only as files
+ -- are uploaded
+ M.insert "x-amz-auto-make-bucket" "1" $
+ -- no default bucket name; should
+ -- be human-readable
+ M.delete "bucket" defaults
store :: Remote Annex -> Key -> Annex Bool
store r k = s3Action r False $ \(conn, bucket) -> do
@@ -111,8 +143,8 @@ storeHelper (conn, bucket) r k file = do
-- buffered to calculate it
size <- maybe getsize (return . fromIntegral) $ keySize k
let object = setStorageClass storageclass $
- S3Object bucket (show k) ""
- [("Content-Length",(show size)), ("x-amz-auto-make-bucket","1")] content
+ S3Object bucket (bucketFile r k) ""
+ (("Content-Length", show size) : xheaders) content
sendObject conn object
where
storageclass =
@@ -122,10 +154,13 @@ storeHelper (conn, bucket) r k file = do
getsize = do
s <- liftIO $ getFileStatus file
return $ fileSize s
+
+ xheaders = filter isxheader $ M.assocs $ fromJust $ config r
+ isxheader (h, _) = "x-amz-" `isPrefixOf` h
retrieve :: Remote Annex -> Key -> FilePath -> Annex Bool
retrieve r k f = s3Action r False $ \(conn, bucket) -> do
- res <- liftIO $ getObject conn $ bucketKey bucket k
+ res <- liftIO $ getObject conn $ bucketKey r bucket k
case res of
Right o -> do
liftIO $ L.writeFile f $ obj_data o
@@ -134,7 +169,7 @@ retrieve r k f = s3Action r False $ \(conn, bucket) -> do
retrieveEncrypted :: Remote Annex -> (Cipher, Key) -> FilePath -> Annex Bool
retrieveEncrypted r (cipher, enck) f = s3Action r False $ \(conn, bucket) -> do
- res <- liftIO $ getObject conn $ bucketKey bucket enck
+ res <- liftIO $ getObject conn $ bucketKey r bucket enck
case res of
Right o -> liftIO $
withDecryptedContent cipher (return $ obj_data o) $ \content -> do
@@ -144,13 +179,13 @@ retrieveEncrypted r (cipher, enck) f = s3Action r False $ \(conn, bucket) -> do
remove :: Remote Annex -> Key -> Annex Bool
remove r k = s3Action r False $ \(conn, bucket) -> do
- res <- liftIO $ deleteObject conn $ bucketKey bucket k
+ res <- liftIO $ deleteObject conn $ bucketKey r bucket k
s3Bool res
checkPresent :: Remote Annex -> Key -> Annex (Either IOException Bool)
checkPresent r k = s3Action r noconn $ \(conn, bucket) -> do
showNote ("checking " ++ name r ++ "...")
- res <- liftIO $ getObjectInfo conn $ bucketKey bucket k
+ res <- liftIO $ getObjectInfo conn $ bucketKey r bucket k
case res of
Right _ -> return $ Right True
Left (AWSError _ _) -> return $ Right False
@@ -182,8 +217,27 @@ s3Action r noconn action = do
(Just b, Just c) -> action (c, b)
_ -> return noconn
-bucketKey :: String -> Key -> S3Object
-bucketKey bucket k = S3Object bucket (show k) "" [] L.empty
+bucketFile :: Remote Annex -> Key -> FilePath
+bucketFile r k = (munge $ show k)
+ where
+ munge s = case M.lookup "mungekeys" $ fromJust $ config r of
+ Just "ia" -> iaMunge s
+ _ -> s
+
+bucketKey :: Remote Annex -> String -> Key -> S3Object
+bucketKey r bucket k = S3Object bucket (bucketFile r k) "" [] L.empty
+
+{- Internet Archive limits filenames to a subset of ascii,
+ - with no whitespace. Other characters are xml entity
+ - encoded. -}
+iaMunge :: String -> String
+iaMunge = concat . (map munge)
+ where
+ munge c
+ | isAsciiUpper c || isAsciiLower c || isNumber c = [c]
+ | c `elem` "_-.\"" = [c]
+ | isSpace c = []
+ | otherwise = "&" ++ show (ord c) ++ ";"
genBucket :: RemoteConfig -> Annex ()
genBucket c = do
diff --git a/debian/changelog b/debian/changelog
index 09dde346c..59ebb1deb 100644
--- a/debian/changelog
+++ b/debian/changelog
@@ -1,6 +1,11 @@
git-annex (0.20110504) UNRELEASED; urgency=low
* Work around a bug in Network.URI's handling of bracketed ipv6 addresses.
+ * Add a few tweaks to make it easy to use the Internet Archive's variant
+ of S3. In particular, munge key filenames to comply with the IA's filename
+ limits, disable encryption, support their nonstandard way of creating
+ buckets, and allow x-amz-* headers to be specified in initremote to set
+ item metadata.
-- Joey Hess <joeyh@debian.org> Fri, 06 May 2011 15:20:38 -0400
diff --git a/doc/special_remotes/S3.mdwn b/doc/special_remotes/S3.mdwn
index abd61ac79..d6a7229e3 100644
--- a/doc/special_remotes/S3.mdwn
+++ b/doc/special_remotes/S3.mdwn
@@ -5,6 +5,12 @@ See [[walkthrough/using_Amazon_S3]] for usage examples.
## configuration
+The standard environment variables `ANNEX_S3_ACCESS_KEY_ID` and
+`ANNEX_S3_SECRET_ACCESS_KEY` are used to supply login credentials
+for Amazon. When encryption is enabled, they are stored in encrypted form
+by `git annex initremote`, so you do not need to keep the environment
+variables set after the initial initalization of the remote.
+
A number of parameters can be passed to `git annex initremote` to configure
the S3 remote.
@@ -29,8 +35,5 @@ the S3 remote.
so by default, a bucket name is chosen based on the remote name
and UUID. This can be specified to pick a bucket name.
-The standard environment variables `ANNEX_S3_ACCESS_KEY_ID` and
-`ANNEX_S3_SECRET_ACCESS_KEY` can be used to supply login credentials
-for Amazon. When encryption is enabled, they are stored in encrypted form
-by `git annex initremote`, so you do not need to keep the environment
-variables set after the initial initalization of the remote.
+* `x-amz-*` are passed through as http headers when storing keys
+ in S3.
diff --git a/doc/walkthrough/Internet_Archive_via_S3.mdwn b/doc/walkthrough/Internet_Archive_via_S3.mdwn
index 3cd83a2e7..e0f8fafb4 100644
--- a/doc/walkthrough/Internet_Archive_via_S3.mdwn
+++ b/doc/walkthrough/Internet_Archive_via_S3.mdwn
@@ -15,20 +15,18 @@ Sign up for an account, and get your access keys here:
# export AWS_ACCESS_KEY_ID=blahblah
# export AWS_SECRET_ACCESS_KEY=xxxxxxx
-Now go to <http://www.archive.org/create/> and create the item.
-This allows you to fill in metadata which git-annex cannot provide to the
-Internet Archive. (It also works around a bug with bucket creation.)
-
-(Note that there seems to be a bug in either hS3 or the archive that
-breaks authentication when the item name contains spaces or upper-case
-letters.. use all lowercase and no spaces.)
-
-Specify `host=s3.us.archive.org` when doing initremote to set up
-a remote at the Archive. It does not make sense to use encryption.
-For the bucket name, specify the item name you created earlier.
-
- # git annex initremote panama type=S3 encryption=none host=s3.us.archive.org bucket=panama-canal-lock-blueprints
- initremote archive-panama (checking bucket) (creating bucket in US) ok
+Specify `host=s3.us.archive.org` when doing `initremote` to set up
+a remote at the Archive. This will enable a special Internet Archive mode:
+Encryption is not allowed; you are required to specify a bucket name
+rather than letting git-annex pick a random one; and you can optionally
+specify `x-archive-meta*` headers to add metadata as explained in their
+[documentation](http://www.archive.org/help/abouts3.txt).
+
+ # git annex initremote archive-panama type=S3
+ # host=s3.us.archive.org bucket=panama-canal-lock-blueprints \
+ x-archive-meta-mediatype=texts x-archive-meta-language=eng \
+ x-archive-meta-title="original Panama Canal lock design blueprints"
+ initremote archive-panama (Internet Archive mode) (checking bucket) (creating bucket in US) ok
# git annex describe archive-panama "Internet Archive item for my grandfather's Panama Canal lock design blueprints"
describe archive-panama ok
@@ -36,11 +34,19 @@ Then you can annex files and copy them to the remote as usual:
# git annex add photo1.jpeg
add photo1.jpeg ok
- # git annex copy photo1.jpeg --to archive-panama
- copy (checking archive-panama...) (to archive-panama...) ok
+ # git annex copy photo1.jpeg --fast --to archive-panama
+ copy (to archive-panama...) ok
+
+-----
Note that it probably makes the most sense to use the WORM backend
for files, since that exposes the original filename in the key stored
in the Archive, which allows its special processing for sound files,
-movies, etc to be done. Also, the Internet Archive has restrictions
-on what is allowed in a filename; particularly no spaces are allowed.
+movies, etc to be done.
+
+Also, the Internet Archive has restrictions on what is allowed in a
+filename; particularly no spaces are allowed.
+
+There seems to be a bug in either hS3 or the archive that breaks
+authentication when the bucket name contains spaces or upper-case letters..
+use all lowercase and no spaces when making the bucket with `initremote`.