mirror of
https://github.com/NixOS/nix.git
synced 2025-11-08 19:46:02 +01:00
feat(libstore/filetransfer): add S3 signing support
This commit is contained in:
parent
3c1e2e56ea
commit
00c2a57666
4 changed files with 100 additions and 24 deletions
|
|
@ -24,6 +24,22 @@ namespace nix {
|
|||
|
||||
namespace {
|
||||
|
||||
// Global credential provider cache using boost's concurrent map
|
||||
// Key: profile name (empty string for default profile)
|
||||
using CredentialProviderCache =
|
||||
boost::concurrent_flat_map<std::string, std::shared_ptr<Aws::Crt::Auth::ICredentialsProvider>>;
|
||||
|
||||
static CredentialProviderCache credentialProviderCache;
|
||||
|
||||
/**
|
||||
* Clear all cached credential providers.
|
||||
* Called automatically by CrtWrapper destructor during static destruction.
|
||||
*/
|
||||
static void clearAwsCredentialsCache()
|
||||
{
|
||||
credentialProviderCache.clear();
|
||||
}
|
||||
|
||||
static void initAwsCrt()
|
||||
{
|
||||
struct CrtWrapper
|
||||
|
|
@ -95,13 +111,6 @@ static AwsCredentials getCredentialsFromProvider(std::shared_ptr<Aws::Crt::Auth:
|
|||
return fut.get(); // This will throw if set_exception was called
|
||||
}
|
||||
|
||||
// Global credential provider cache using boost's concurrent map
|
||||
// Key: profile name (empty string for default profile)
|
||||
using CredentialProviderCache =
|
||||
boost::concurrent_flat_map<std::string, std::shared_ptr<Aws::Crt::Auth::ICredentialsProvider>>;
|
||||
|
||||
static CredentialProviderCache credentialProviderCache;
|
||||
|
||||
} // anonymous namespace
|
||||
|
||||
AwsCredentials getAwsCredentials(const std::string & profile)
|
||||
|
|
@ -160,11 +169,6 @@ void invalidateAwsCredentials(const std::string & profile)
|
|||
credentialProviderCache.erase(profile);
|
||||
}
|
||||
|
||||
void clearAwsCredentialsCache()
|
||||
{
|
||||
credentialProviderCache.clear();
|
||||
}
|
||||
|
||||
AwsCredentials preResolveAwsCredentials(const ParsedS3URL & s3Url)
|
||||
{
|
||||
std::string profile = s3Url.profile.value_or("");
|
||||
|
|
|
|||
|
|
@ -9,9 +9,14 @@
|
|||
#include "nix/util/signals.hh"
|
||||
|
||||
#include "store-config-private.hh"
|
||||
#include <optional>
|
||||
#if NIX_WITH_S3_SUPPORT
|
||||
# include <aws/core/client/ClientConfiguration.h>
|
||||
#endif
|
||||
#if NIX_WITH_CURL_S3
|
||||
# include "nix/store/aws-creds.hh"
|
||||
# include "nix/store/s3-url.hh"
|
||||
#endif
|
||||
|
||||
#ifdef __linux__
|
||||
# include "nix/util/linux-namespaces.hh"
|
||||
|
|
@ -434,6 +439,16 @@ struct curlFileTransfer : public FileTransfer
|
|||
}
|
||||
}
|
||||
|
||||
#if NIX_WITH_CURL_S3
|
||||
// Set up AWS SigV4 signing if this is an S3 request
|
||||
// Note: AWS SigV4 support guaranteed available (curl >= 7.75.0 checked at build time)
|
||||
// The username/password (access key ID and secret key) are set via the general
|
||||
// usernameAuth mechanism above.
|
||||
if (request.awsSigV4Provider) {
|
||||
curl_easy_setopt(req, CURLOPT_AWS_SIGV4, request.awsSigV4Provider->c_str());
|
||||
}
|
||||
#endif
|
||||
|
||||
result.data.clear();
|
||||
result.bodySize = 0;
|
||||
}
|
||||
|
|
@ -808,7 +823,11 @@ struct curlFileTransfer : public FileTransfer
|
|||
|
||||
void enqueueItem(std::shared_ptr<TransferItem> item)
|
||||
{
|
||||
if (item->request.data && item->request.uri.scheme() != "http" && item->request.uri.scheme() != "https")
|
||||
if (item->request.data && item->request.uri.scheme() != "http" && item->request.uri.scheme() != "https"
|
||||
#if NIX_WITH_CURL_S3
|
||||
&& item->request.uri.scheme() != "s3"
|
||||
#endif
|
||||
)
|
||||
throw nix::Error("uploading to '%s' is not supported", item->request.uri.to_string());
|
||||
|
||||
{
|
||||
|
|
@ -826,9 +845,15 @@ struct curlFileTransfer : public FileTransfer
|
|||
{
|
||||
/* Ugly hack to support s3:// URIs. */
|
||||
if (request.uri.scheme() == "s3") {
|
||||
#if NIX_WITH_CURL_S3
|
||||
// New curl-based S3 implementation
|
||||
auto modifiedRequest = request;
|
||||
modifiedRequest.setupForS3();
|
||||
enqueueItem(std::make_shared<TransferItem>(*this, std::move(modifiedRequest), std::move(callback)));
|
||||
#elif NIX_WITH_S3_SUPPORT
|
||||
// Old AWS SDK-based implementation
|
||||
// FIXME: do this on a worker thread
|
||||
try {
|
||||
#if NIX_WITH_S3_SUPPORT
|
||||
auto parsed = ParsedS3URL::parse(request.uri.parsed());
|
||||
|
||||
std::string profile = parsed.profile.value_or("");
|
||||
|
|
@ -846,13 +871,12 @@ struct curlFileTransfer : public FileTransfer
|
|||
res.data = std::move(*s3Res.data);
|
||||
res.urls.push_back(request.uri.to_string());
|
||||
callback(std::move(res));
|
||||
#else
|
||||
throw nix::Error(
|
||||
"cannot download '%s' because Nix is not built with S3 support", request.uri.to_string());
|
||||
#endif
|
||||
} catch (...) {
|
||||
callback.rethrow();
|
||||
}
|
||||
#else
|
||||
throw nix::Error("cannot download '%s' because Nix is not built with S3 support", request.uri.to_string());
|
||||
#endif
|
||||
return;
|
||||
}
|
||||
|
||||
|
|
@ -880,6 +904,41 @@ ref<FileTransfer> makeFileTransfer()
|
|||
return makeCurlFileTransfer();
|
||||
}
|
||||
|
||||
#if NIX_WITH_CURL_S3
|
||||
void FileTransferRequest::setupForS3()
|
||||
{
|
||||
auto parsedS3 = ParsedS3URL::parse(uri.parsed());
|
||||
// Update the request URI to use HTTPS
|
||||
uri = parsedS3.toHttpsUrl();
|
||||
// This gets used later in a curl setopt
|
||||
awsSigV4Provider = "aws:amz:" + parsedS3.region.value_or("us-east-1") + ":s3";
|
||||
// check if the request already has pre-resolved credentials
|
||||
std::optional<std::string> sessionToken;
|
||||
if (usernameAuth) {
|
||||
debug("Using pre-resolved AWS credentials from parent process");
|
||||
sessionToken = preResolvedAwsSessionToken;
|
||||
} else {
|
||||
std::string profile = parsedS3.profile.value_or("");
|
||||
try {
|
||||
auto creds = getAwsCredentials(profile);
|
||||
usernameAuth = UsernameAuth{
|
||||
.username = creds.accessKeyId,
|
||||
.password = creds.secretAccessKey,
|
||||
};
|
||||
sessionToken = creds.sessionToken;
|
||||
} catch (const AwsAuthError & e) {
|
||||
warn("AWS authentication failed for S3 request %s: %s", uri, e.what());
|
||||
// Invalidate the cached credentials so next request will retry
|
||||
invalidateAwsCredentials(profile);
|
||||
// Continue without authentication - might be a public bucket
|
||||
return;
|
||||
}
|
||||
}
|
||||
if (sessionToken)
|
||||
headers.emplace_back("x-amz-security-token", *sessionToken);
|
||||
}
|
||||
#endif
|
||||
|
||||
std::future<FileTransferResult> FileTransfer::enqueueFileTransfer(const FileTransferRequest & request)
|
||||
{
|
||||
auto promise = std::make_shared<std::promise<FileTransferResult>>();
|
||||
|
|
|
|||
|
|
@ -57,12 +57,6 @@ AwsCredentials getAwsCredentials(const std::string & profile = "");
|
|||
*/
|
||||
void invalidateAwsCredentials(const std::string & profile);
|
||||
|
||||
/**
|
||||
* Clear all cached credential providers.
|
||||
* Typically called during application cleanup.
|
||||
*/
|
||||
void clearAwsCredentialsCache();
|
||||
|
||||
/**
|
||||
* Pre-resolve AWS credentials for S3 URLs.
|
||||
* Used to cache credentials in parent process before forking.
|
||||
|
|
|
|||
|
|
@ -11,6 +11,11 @@
|
|||
#include "nix/util/serialise.hh"
|
||||
#include "nix/util/url.hh"
|
||||
|
||||
#include "nix/store/config.hh"
|
||||
#if NIX_WITH_CURL_S3
|
||||
# include "nix/store/aws-creds.hh"
|
||||
#endif
|
||||
|
||||
namespace nix {
|
||||
|
||||
struct FileTransferSettings : Config
|
||||
|
|
@ -108,6 +113,13 @@ struct FileTransferRequest
|
|||
* When provided, these credentials will be used with curl's CURLOPT_USERNAME/PASSWORD option.
|
||||
*/
|
||||
std::optional<UsernameAuth> usernameAuth;
|
||||
#if NIX_WITH_CURL_S3
|
||||
/**
|
||||
* Pre-resolved AWS session token for S3 requests.
|
||||
* When provided along with usernameAuth, this will be used instead of fetching fresh credentials.
|
||||
*/
|
||||
std::optional<std::string> preResolvedAwsSessionToken;
|
||||
#endif
|
||||
|
||||
FileTransferRequest(ValidURL uri)
|
||||
: uri(std::move(uri))
|
||||
|
|
@ -119,6 +131,13 @@ struct FileTransferRequest
|
|||
{
|
||||
return data ? "upload" : "download";
|
||||
}
|
||||
|
||||
#if NIX_WITH_CURL_S3
|
||||
private:
|
||||
friend struct curlFileTransfer;
|
||||
void setupForS3();
|
||||
std::optional<std::string> awsSigV4Provider;
|
||||
#endif
|
||||
};
|
||||
|
||||
struct FileTransferResult
|
||||
|
|
|
|||
Loading…
Add table
Add a link
Reference in a new issue