Compare commits

...

19 Commits

Author SHA1 Message Date
8de11a955c Update Rust crate serde_json to 1.0.114
All checks were successful
continuous-integration/drone/push Build is passing
continuous-integration/drone/pr Build is passing
2024-03-05 00:13:17 +00:00
df0cc997cf Update Rust crate log to 0.4.21
All checks were successful
continuous-integration/drone/pr Build is passing
continuous-integration/drone/push Build is passing
2024-02-29 00:12:37 +00:00
baf2964a09 Ran cargo update
All checks were successful
continuous-integration/drone/push Build is passing
2024-01-14 21:29:04 +01:00
7300def6dc Fix issue with read only configuration
Some checks failed
continuous-integration/drone Build is passing
continuous-integration/drone/push Build was killed
2024-01-14 21:17:01 +01:00
b8a102bd0b Can set location of temporary directory 2024-01-14 21:11:15 +01:00
a39f2139df Update base Docker image
All checks were successful
continuous-integration/drone/push Build is passing
2024-01-14 19:49:35 +01:00
5eff31c336 Fix bad deployment configuration
All checks were successful
continuous-integration/drone/push Build is passing
2024-01-14 19:45:38 +01:00
0eaaf6d577 Improve deployment security
All checks were successful
continuous-integration/drone/push Build is passing
2024-01-14 19:37:57 +01:00
a02f8e4dea Update all dependencies
All checks were successful
continuous-integration/drone/push Build is passing
2024-01-14 19:35:08 +01:00
90356554a8 Fix cargo clippy issues 2024-01-14 19:26:16 +01:00
e9f5ecddd5 Update Rust crate anyhow to 1.0.77
All checks were successful
continuous-integration/drone/pr Build is passing
continuous-integration/drone/push Build is passing
2023-12-28 00:20:47 +00:00
05cb9ad33d Update Rust crate futures to 0.3.30
All checks were successful
continuous-integration/drone/pr Build is passing
continuous-integration/drone/push Build is passing
2023-12-25 00:19:18 +00:00
dfa8c1ccb6 Update Rust crate anyhow to 1.0.76
All checks were successful
continuous-integration/drone/pr Build is passing
continuous-integration/drone/push Build is passing
2023-12-21 08:21:41 +00:00
e6bd7ac854 Update Rust crate schemars to 0.8.16
All checks were successful
continuous-integration/drone/pr Build is passing
continuous-integration/drone/push Build is passing
2023-11-12 00:24:38 +00:00
d347a48c2a Update Rust crate tokio to 1.34.0
All checks were successful
continuous-integration/drone/pr Build is passing
continuous-integration/drone/push Build is passing
2023-11-10 00:34:37 +00:00
a0fb764842 Update Rust crate futures to 0.3.29
All checks were successful
continuous-integration/drone/pr Build is passing
continuous-integration/drone/push Build is passing
2023-10-27 00:28:12 +00:00
7b25a9cc96 Update Rust crate tokio to 1.33.0
All checks were successful
continuous-integration/drone/pr Build is passing
continuous-integration/drone/push Build is passing
2023-10-10 00:06:28 +00:00
270d96389d Update Rust crate thiserror to 1.0.49
All checks were successful
continuous-integration/drone/pr Build is passing
continuous-integration/drone/push Build is passing
2023-09-28 00:08:09 +00:00
0569d41777 Update Rust crate schemars to 0.8.15
All checks were successful
continuous-integration/drone/pr Build is passing
continuous-integration/drone/push Build is passing
2023-09-18 00:05:55 +00:00
8 changed files with 689 additions and 414 deletions

993
Cargo.lock generated

File diff suppressed because it is too large Load Diff

View File

@@ -6,17 +6,17 @@ edition = "2021"
# See more keys and their definitions at https://doc.rust-lang.org/cargo/reference/manifest.html # See more keys and their definitions at https://doc.rust-lang.org/cargo/reference/manifest.html
[dependencies] [dependencies]
log = "0.4.20" log = "0.4.21"
env_logger = "0.10.0" env_logger = "0.10.1"
anyhow = "1.0.75" anyhow = "1.0.79"
serde = { version = "1.0.185", features = ["derive"] } serde = { version = "1.0.195", features = ["derive"] }
serde_json = "1.0.105" serde_json = "1.0.114"
schemars = "0.8.13" schemars = "0.8.16"
tokio = { version = "1.32.0", features = ["full"] } tokio = { version = "1.35.1", features = ["full"] }
kube = { version = "0.85.0", features = ["runtime", "derive"] } kube = { version = "0.87.2", features = ["runtime", "derive"] }
k8s-openapi = { version = "0.19.0", features = ["v1_27"] } k8s-openapi = { version = "0.20.0", features = ["v1_27"] }
futures = "0.3.28" futures = "0.3.30"
thiserror = "1.0.48" thiserror = "1.0.56"
rand = "0.8.5" rand = "0.8.5"
mktemp = "0.5.1" mktemp = "0.5.1"
reqwest = "0.11.20" reqwest = "0.11.23"

View File

@@ -1,4 +1,4 @@
FROM debian:bullseye-slim FROM debian:bookworm-slim
COPY minio-operator /usr/local/bin/minio-operator COPY minio-operator /usr/local/bin/minio-operator
COPY mc /usr/local/bin/mc COPY mc /usr/local/bin/mc

View File

@@ -4,4 +4,5 @@ pub mod minio;
#[cfg(test)] #[cfg(test)]
pub mod minio_test_server; pub mod minio_test_server;
pub mod secrets; pub mod secrets;
pub mod temp;
pub mod utils; pub mod utils;

View File

@@ -5,6 +5,7 @@ use serde::Deserialize;
use crate::constants::{MC_EXE, SECRET_MINIO_BUCKET_ACCESS_LEN, SECRET_MINIO_BUCKET_SECRET_LEN}; use crate::constants::{MC_EXE, SECRET_MINIO_BUCKET_ACCESS_LEN, SECRET_MINIO_BUCKET_SECRET_LEN};
use crate::crd::{BucketRetention, MinioBucketSpec, RetentionType}; use crate::crd::{BucketRetention, MinioBucketSpec, RetentionType};
use crate::temp;
use crate::utils::rand_str; use crate::utils::rand_str;
const MC_ALIAS_NAME: &str = "managedminioinst"; const MC_ALIAS_NAME: &str = "managedminioinst";
@@ -173,7 +174,7 @@ impl MinioService {
{ {
log::debug!("exec_mc_cmd with args {:?}", args); log::debug!("exec_mc_cmd with args {:?}", args);
let conf_dir = mktemp::Temp::new_dir()?; let conf_dir = temp::create_temp_dir()?;
let global_flags = ["--config-dir", conf_dir.to_str().unwrap(), "--json"]; let global_flags = ["--config-dir", conf_dir.to_str().unwrap(), "--json"];
// First, set our alias to mc in a temporary directory // First, set our alias to mc in a temporary directory
@@ -261,7 +262,7 @@ impl MinioService {
} }
let res = self.exec_mc_cmd::<BasicMinioResult>(&args).await?; let res = self.exec_mc_cmd::<BasicMinioResult>(&args).await?;
if res.get(0).map(|r| r.success()) != Some(true) { if res.first().map(|r| r.success()) != Some(true) {
return Err(MinioError::MakeBucketFailed.into()); return Err(MinioError::MakeBucketFailed.into());
} }
@@ -292,7 +293,7 @@ impl MinioService {
]) ])
.await?; .await?;
if res.get(0).map(|r| r.success()) != Some(true) { if res.first().map(|r| r.success()) != Some(true) {
return Err(MinioError::SetQuotaFailed.into()); return Err(MinioError::SetQuotaFailed.into());
} }
Ok(()) Ok(())
@@ -330,7 +331,7 @@ impl MinioService {
]) ])
.await?; .await?;
if res.get(0).map(|r| r.success()) != Some(true) { if res.first().map(|r| r.success()) != Some(true) {
return Err(MinioError::SetAnonymousAcccessFailed.into()); return Err(MinioError::SetAnonymousAcccessFailed.into());
} }
@@ -367,7 +368,7 @@ impl MinioService {
.await? .await?
}; };
if res.get(0).map(|r| r.success()) != Some(true) { if res.first().map(|r| r.success()) != Some(true) {
return Err(MinioError::SetQuotaFailed.into()); return Err(MinioError::SetQuotaFailed.into());
} }
Ok(()) Ok(())
@@ -415,7 +416,7 @@ impl MinioService {
.await? .await?
}; };
if res.get(0).map(|r| r.success()) != Some(true) { if res.first().map(|r| r.success()) != Some(true) {
return Err(MinioError::SetRetentionFailed.into()); return Err(MinioError::SetRetentionFailed.into());
} }
@@ -458,7 +459,7 @@ impl MinioService {
/// Apply a bucket policy /// Apply a bucket policy
pub async fn policy_apply(&self, name: &str, content: &str) -> anyhow::Result<()> { pub async fn policy_apply(&self, name: &str, content: &str) -> anyhow::Result<()> {
let tmp_file = mktemp::Temp::new_file()?; let tmp_file = temp::create_temp_file()?;
std::fs::write(&tmp_file, content)?; std::fs::write(&tmp_file, content)?;
let res = self let res = self
@@ -472,7 +473,7 @@ impl MinioService {
]) ])
.await?; .await?;
if res.get(0).map(|r| r.success()) != Some(true) { if res.first().map(|r| r.success()) != Some(true) {
return Err(MinioError::ApplyPolicyFailed.into()); return Err(MinioError::ApplyPolicyFailed.into());
} }
@@ -512,7 +513,7 @@ impl MinioService {
]) ])
.await?; .await?;
if res.get(0).map(|r| r.success()) != Some(true) { if res.first().map(|r| r.success()) != Some(true) {
return Err(MinioError::CreateUserFailed.into()); return Err(MinioError::CreateUserFailed.into());
} }
@@ -552,7 +553,7 @@ impl MinioService {
]) ])
.await?; .await?;
if res.get(0).map(|r| r.success()) != Some(true) { if res.first().map(|r| r.success()) != Some(true) {
return Err(MinioError::CreateUserFailed.into()); return Err(MinioError::CreateUserFailed.into());
} }
@@ -579,7 +580,7 @@ impl MinioService {
.userMappings; .userMappings;
if let Some(mapping) = res { if let Some(mapping) = res {
if let Some(e) = mapping.get(0) { if let Some(e) = mapping.first() {
return Ok(e.policies.clone()); return Ok(e.policies.clone());
} }
} }

View File

@@ -3,6 +3,7 @@
//! Used for testing only //! Used for testing only
use crate::minio::MinioService; use crate::minio::MinioService;
use crate::temp;
use crate::utils::rand_str; use crate::utils::rand_str;
use rand::RngCore; use rand::RngCore;
use std::io::ErrorKind; use std::io::ErrorKind;
@@ -20,7 +21,7 @@ pub struct MinioTestServer {
impl MinioTestServer { impl MinioTestServer {
pub async fn start() -> anyhow::Result<Self> { pub async fn start() -> anyhow::Result<Self> {
let storage_dir = mktemp::Temp::new_dir()?; let storage_dir = temp::create_temp_dir()?;
let root_user = rand_str(30); let root_user = rand_str(30);
let root_password = rand_str(30); let root_password = rand_str(30);

26
src/temp.rs Normal file
View File

@@ -0,0 +1,26 @@
use std::path::{Path, PathBuf};
/// Get the directory where temp files should be created
fn temp_path() -> Option<PathBuf> {
std::env::var("TEMP_DIR")
.as_deref()
.ok()
.map(Path::new)
.map(|p| p.to_path_buf())
}
/// Create a temporary directory
pub fn create_temp_dir() -> std::io::Result<mktemp::Temp> {
match temp_path() {
None => mktemp::Temp::new_dir(),
Some(p) => mktemp::Temp::new_dir_in(p),
}
}
/// Create a temporary file
pub fn create_temp_file() -> std::io::Result<mktemp::Temp> {
match temp_path() {
None => mktemp::Temp::new_file(),
Some(p) => mktemp::Temp::new_file_in(p),
}
}

View File

@@ -63,8 +63,19 @@ spec:
requests: requests:
memory: 150Mi memory: 150Mi
cpu: "0.01" cpu: "0.01"
volumeMounts:
- mountPath: /tmp
readOnly: false
name: tempdir
securityContext: securityContext:
allowPrivilegeEscalation: false allowPrivilegeEscalation: false
readOnlyRootFilesystem: true
runAsUser: 1000
runAsGroup: 1000
capabilities: capabilities:
drop: drop:
- ALL - ALL
volumes:
- name: tempdir
emptyDir:
sizeLimit: 500Mi