config.rb 1.8 KB
Newer Older
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36
# frozen_string_literal: true

module ObjectStorage
  class Config
    attr_reader :options

    def initialize(options)
      @options = options.to_hash.deep_symbolize_keys
    end

    def credentials
      @credentials ||= options[:connection] || {}
    end

    def storage_options
      @storage_options ||= options[:storage_options] || {}
    end

    def enabled?
      options[:enabled]
    end

    def bucket
      options[:remote_directory]
    end

    def consolidated_settings?
      options.fetch(:consolidated_settings, false)
    end

    # AWS-specific options
    def aws?
      provider == 'AWS'
    end

    def use_iam_profile?
37
      Gitlab::Utils.to_boolean(credentials[:use_iam_profile], default: false)
38 39 40
    end

    def use_path_style?
41
      Gitlab::Utils.to_boolean(credentials[:path_style], default: false)
42 43 44 45 46 47 48 49 50 51 52 53 54 55 56
    end

    def server_side_encryption
      storage_options[:server_side_encryption]
    end

    def server_side_encryption_kms_key_id
      storage_options[:server_side_encryption_kms_key_id]
    end

    def provider
      credentials[:provider].to_s
    end
    # End AWS-specific options

57 58 59 60 61 62
    # Begin Azure-specific options
    def azure_storage_domain
      credentials[:azure_storage_domain]
    end
    # End Azure-specific options

63 64 65 66
    def google?
      provider == 'Google'
    end

67 68 69 70
    def azure?
      provider == 'AzureRM'
    end

71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89
    def fog_attributes
      @fog_attributes ||= begin
        return {} unless enabled? && aws?
        return {} unless server_side_encryption.present?

        aws_server_side_encryption_headers.compact
      end
    end

    private

    def aws_server_side_encryption_headers
      {
        'x-amz-server-side-encryption' => server_side_encryption,
        'x-amz-server-side-encryption-aws-kms-key-id' => server_side_encryption_kms_key_id
      }
    end
  end
end