diff --git a/Cargo.toml b/Cargo.toml new file mode 100644 index 0000000..59588d3 --- /dev/null +++ b/Cargo.toml @@ -0,0 +1,19 @@ +[package] +name = "simple-oss" +version = "0.1.0" +authors = ["Hatter Jiang "] +edition = "2018" +description = "Simple Alibaba Cloud OSS Client in Rust" +license = "MIT" +readme="README.md" +repository = "https://git.hatter.ink/hatter/simple-oss" + + +# See more keys and their definitions at https://doc.rust-lang.org/cargo/reference/manifest.html + +[dependencies] +rust-crypto = "0.2.36" +urlencoding = "1.0.0" +base64 = "0.11.0" +reqwest = "0.9.22" +rust_util="0.1.0" diff --git a/src/lib.rs b/src/lib.rs new file mode 100644 index 0000000..43a8a27 --- /dev/null +++ b/src/lib.rs @@ -0,0 +1,128 @@ +use std::{ + fs::File, + time::SystemTime, +}; +use crypto::{ + mac::{ + Mac, + MacResult, + }, + hmac::Hmac, + sha1::Sha1, +}; +use reqwest::{ + Response, +}; +use rust_util::*; + +pub const OSS_VERB_GET: &str = "GET"; +pub const OSS_VERB_PUT: &str = "PUT"; +pub const OSS_VERB_DELETE: &str = "DELETE"; + +/// OSSClient - Alibaba Cloud OSS Client +/// +/// Reference URL: https://help.aliyun.com/document_detail/31952.html +pub struct OSSClient<'a> { + pub endpoint: &'a str, + pub access_key_id: &'a str, + pub access_key_secret: &'a str, +} + +impl<'a> OSSClient<'a> { + pub fn new(endpoint: &'a str, access_key_id: &'a str, access_key_secret: &'a str) -> OSSClient<'a> { + OSSClient { + endpoint: endpoint, + access_key_id: access_key_id, + access_key_secret: access_key_secret, + } + } + + pub fn put_file(&self, bucket_name: &str, key: &str, expire_in_seconds: u64, file: File) -> XResult { + let client = reqwest::Client::new(); + Ok(client.put(&self.generate_signed_put_url(bucket_name, key, expire_in_seconds)).body(file).send()?) + } + + pub fn delete_file(&self, bucket_name: &str, key: &str) -> XResult { + let delete_url = self.generate_signed_delete_url(bucket_name, key, 30_u64); + let client = reqwest::Client::new(); + Ok(client.delete(&delete_url).send()?) + } + + pub fn get_file_content(&self, bucket_name: &str, key: &str) -> XResult> { + let get_url = self.generate_signed_get_url(bucket_name, key, 30_u64); + let mut response = reqwest::get(&get_url)?; + match response.status().as_u16() { + 404_u16 => Ok(None), + 200_u16 => Ok(Some(response.text()?)), + _ => Err(new_box_ioerror(&format!("Error in read: {}/{}, returns: {:?}", bucket_name, key, response))), + } + } + + pub fn put_file_content(&self, bucket_name: &str, key: &str, content: &str) -> XResult { + let put_url = self.generate_signed_put_url(bucket_name, key, 30_u64); + let client = reqwest::Client::new(); + Ok(client.put(&put_url).body(content.as_bytes().to_vec()).send()?) + } + + pub fn generate_signed_put_url(&self, bucket_name: &str, key: &str, expire_in_seconds: u64) -> String { + self.generate_signed_url(OSS_VERB_PUT, bucket_name, key, expire_in_seconds, true) + } + + pub fn generate_signed_get_url(&self, bucket_name: &str, key: &str, expire_in_seconds: u64) -> String { + self.generate_signed_url(OSS_VERB_GET, bucket_name, key, expire_in_seconds, true) + } + + pub fn generate_signed_delete_url(&self, bucket_name: &str, key: &str, expire_in_seconds: u64) -> String { + self.generate_signed_url(OSS_VERB_DELETE, bucket_name, key, expire_in_seconds, true) + } + + pub fn generate_signed_url(&self, verb: &str, bucket_name: &str, key: &str, expire_in_seconds: u64, is_https: bool) -> String { + let mut signed_url = String::with_capacity(1024); + signed_url.push_str(if is_https { "https://" } else { "http://" }); + signed_url.push_str(&format!("{}.{}/{}", bucket_name, self.endpoint, key)); + + let current_secs = get_current_secs(); + let expire_secs = current_secs + expire_in_seconds; + + signed_url.push_str("?Expires="); + signed_url.push_str(expire_secs.to_string().as_str()); + signed_url.push_str("&OSSAccessKeyId="); + signed_url.push_str(&urlencoding::encode(self.access_key_id)); + signed_url.push_str("&Signature="); + + let to_be_signed = get_to_be_signed(verb, expire_secs, bucket_name, key); + let signature = to_base64(calc_hmac_sha1(self.access_key_secret.as_bytes(), to_be_signed.as_bytes())); + signed_url.push_str(&urlencoding::encode(signature.as_str())); + + signed_url + } +} + +fn get_to_be_signed(verb: &str, expire_secs: u64, bucket_name: &str, key: &str) -> String { + let mut to_be_signed = String::with_capacity(512); + to_be_signed.push_str(verb); + to_be_signed.push_str("\n"); + to_be_signed.push_str("\n"); + to_be_signed.push_str("\n"); + to_be_signed.push_str(expire_secs.to_string().as_str()); + to_be_signed.push_str("\n"); + to_be_signed.push_str("/"); + to_be_signed.push_str(bucket_name); + to_be_signed.push_str("/"); + to_be_signed.push_str(key); + to_be_signed +} + +fn to_base64(mac_result: MacResult) -> String { + base64::encode(mac_result.code()) +} + +fn calc_hmac_sha1(key: &[u8], message: &[u8]) -> MacResult { + let mut hmac = Hmac::new(Sha1::new(), key); + hmac.input(message); + hmac.result() +} + +fn get_current_secs() -> u64 { + SystemTime::now().duration_since(SystemTime::UNIX_EPOCH).unwrap().as_secs() +}