Arbutus object storage clients

From Alliance Doc
Revision as of 14:49, 10 January 2022 by Rmc (talk | contribs)
Jump to navigation Jump to search


This article is a draft

This is not a complete article: This is a draft, a work in progress that is intended to be published into an article, which may or may not be ready for inclusion in the main wiki. It should not necessarily be considered factual or authoritative.



For information on obtaining Arbutus Object Storage, please see the Object Storage User Guide. This page describes how to configure and use two common object storage clients:

  1. s3cmd
  2. WinSCP

It is important to note that Arbutus Object Storage does not use Amazon's DNS-style buckets/Virtual Hosts which these clients assume by default. They need to be configured not to use that approach as described below.

s3cmd[edit]

Installing s3cmd[edit]

Depending on your Linux distribution, the s3cmd command can be installed using the appropriate yum (RHEL, DENTOS) or apt (Debian, Ubuntu) command:

$ sudo yum install s3cmd
$ sudo apt install s3cmd

Configuring s3cmd[edit]

To configure the s3cmd tool use the command:
$ s3cmd --configure

And make the following configurations with the keys provided by the Arbutus team:

Enter new values or accept defaults in brackets with Enter.
Refer to user manual for detailed description of all options.

Access key and Secret key are your identifiers for Amazon S3. Leave them empty for using the env variables.
Access Key []: 20_DIGIT_ACCESS_KEY
Secret Key []: 40_DIGIT_SECRET_KEY
Default Region [US]:

Use "s3.amazonaws.com" for S3 Endpoint and not modify it to the target Amazon S3.
S3 Endpoint []: object-arbutus.cloud.computecanada.ca

Use "%(bucket)s.s3.amazonaws.com" to the target Amazon S3. "%(bucket)s" and "%(location)s" vars can be used
if the target S3 system supports dns based buckets.
DNS-style bucket+hostname:port template for accessing a bucket []: object-arbutus.cloud.computecanada.ca

Encryption password is used to protect your files from reading
by unauthorized persons while in transfer to S3
Encryption password []: PASSWORD
Path to GPG program []: /usr/bin/gpg

When using secure HTTPS protocol all communication with Amazon S3
servers is protected from 3rd party eavesdropping. This method is
slower than plain HTTP, and can only be proxied with Python 2.7 or newer
Use HTTPS protocol []: Yes

On some networks all internet access must go through a HTTP proxy.
Try setting it here if you can't connect to S3 directly
HTTP Proxy server name:

Create buckets[edit]

The next task is to make a bucket. Buckets contain files. Bucket names must be globally unique across the Arbutus object storage solution. Therefore, you will need to create a uniquely named bucket which will not conflict with other users. For example, the buckets "s3://test/" and "s3://data" are likely already taken. Consider creating buckets reflective of your project, for example "s3://def-test-bucket1" or "s3://atlas_project_bucket". Bucket names can only use the characters A-Z, a-z, 0-9, ., - and _.

To create a bucket, use the tool's mb (make bucket) command:

$ s3cmd mb s3://BUCKET_NAME/

To see the status of a bucket, use the command:

$ s3cmd info s3://BUCKET_NAME/

The output will look something like this:

s3://BUCKET_NAME/ (bucket):
   Location:  default
   Payer:     BucketOwner
   Expiration Rule: none
   Policy:    none
   CORS:      none
   ACL:       *anon*: READ
   ACL:       USER: FULL_CONTROL
   URL:       http://object-arbutus.cloud.computecanada.ca/BUCKET_NAME/

Upload files[edit]

To upload a file to the bucket, use the put command similar to this:

$ s3cmd put --guess-mime-type FILE_NAME.dat s3://BUCKET_NAME/FILE_NAME.dat

Where the bucket name and the file name are specified. Multipurpose Internet Mail Extensions (MIME) is a mechanism for handling files based on their type. The --guess-mime-type command parameter will guess the MIME type based on the file extension. The default MIME type is binary/octet-stream.

ACLs and Policies[edit]

Buckets can have Access Control Lists (ACLs) and policies which govern who can access what resources in the object store. These features are quite sophisticated. Here are two simple examples of using ACLs using the tool's setacl command.

$ s3cmd setacl --acl-public s3://BUCKET_NAME

The result of this command is that anyone can access the bucket and the files in the bucket. Files can be accessed via URLs such as
https://object-arbutus.cloud.computecanada.ca/BUCKET_NAME/FILE_NAME.dat.

The second ACL example limits access to the bucket to only the owner:

$ s3cmd setacl --acl-privte s3://BUCKET_NAME

Other more sophisticated examples can be found in the s3cmd man page.

WinSCP[edit]

Installing WinSCP[edit]

WinSCP can be downloaded from https://winscp.net/ and installed by launching the downloaded installer.

Configuring WinSCP[edit]

Under "New Session", make the following configurations:

  • File protocol: Amazon S3
  • Host name: object-arbutus.cloud.computecanada.ca
  • Port number: 443
  • Access key ID: 20_DIGIT_ACCESS_KEY provided by the Arbutus team

and "Save" these settings as shown below

WinSCP configuration screen

Next, follow the "Edit" button's "Advanced..." settings to "Environment" to "S3" to "Protocol options" to "URL style:" which must changed from "Virtual Host" to "Path" as shown below:

WinSCP Path Configuration

This setting is important, otherwise you will see hostname resolution errors, like this:

WinSCP resolve error

Using WinSCP[edit]

Click on the "Login" button and use the WinSCP GUI to create buckets and to transfer files:

WinSCP file transfer screen