| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494 |
- package s3api
- import (
- "context"
- "encoding/json"
- "fmt"
- "net"
- "net/http"
- "os"
- "strings"
- "time"
- "github.com/seaweedfs/seaweedfs/weed/credential"
- "github.com/seaweedfs/seaweedfs/weed/filer"
- "github.com/seaweedfs/seaweedfs/weed/glog"
- "github.com/seaweedfs/seaweedfs/weed/iam/integration"
- "github.com/seaweedfs/seaweedfs/weed/iam/policy"
- "github.com/seaweedfs/seaweedfs/weed/iam/sts"
- "github.com/seaweedfs/seaweedfs/weed/pb/s3_pb"
- "github.com/seaweedfs/seaweedfs/weed/util/grace"
- "github.com/gorilla/mux"
- "github.com/seaweedfs/seaweedfs/weed/pb"
- . "github.com/seaweedfs/seaweedfs/weed/s3api/s3_constants"
- "github.com/seaweedfs/seaweedfs/weed/s3api/s3err"
- "github.com/seaweedfs/seaweedfs/weed/security"
- "github.com/seaweedfs/seaweedfs/weed/util"
- util_http "github.com/seaweedfs/seaweedfs/weed/util/http"
- util_http_client "github.com/seaweedfs/seaweedfs/weed/util/http/client"
- "google.golang.org/grpc"
- )
- type S3ApiServerOption struct {
- Filer pb.ServerAddress
- Port int
- Config string
- DomainName string
- AllowedOrigins []string
- BucketsPath string
- GrpcDialOption grpc.DialOption
- AllowEmptyFolder bool
- AllowDeleteBucketNotEmpty bool
- LocalFilerSocket string
- DataCenter string
- FilerGroup string
- IamConfig string // Advanced IAM configuration file path
- }
- type S3ApiServer struct {
- s3_pb.UnimplementedSeaweedS3Server
- option *S3ApiServerOption
- iam *IdentityAccessManagement
- iamIntegration *S3IAMIntegration // Advanced IAM integration for JWT authentication
- cb *CircuitBreaker
- randomClientId int32
- filerGuard *security.Guard
- client util_http_client.HTTPClientInterface
- bucketRegistry *BucketRegistry
- credentialManager *credential.CredentialManager
- bucketConfigCache *BucketConfigCache
- }
- func NewS3ApiServer(router *mux.Router, option *S3ApiServerOption) (s3ApiServer *S3ApiServer, err error) {
- return NewS3ApiServerWithStore(router, option, "")
- }
- func NewS3ApiServerWithStore(router *mux.Router, option *S3ApiServerOption, explicitStore string) (s3ApiServer *S3ApiServer, err error) {
- startTsNs := time.Now().UnixNano()
- v := util.GetViper()
- signingKey := v.GetString("jwt.filer_signing.key")
- v.SetDefault("jwt.filer_signing.expires_after_seconds", 10)
- expiresAfterSec := v.GetInt("jwt.filer_signing.expires_after_seconds")
- readSigningKey := v.GetString("jwt.filer_signing.read.key")
- v.SetDefault("jwt.filer_signing.read.expires_after_seconds", 60)
- readExpiresAfterSec := v.GetInt("jwt.filer_signing.read.expires_after_seconds")
- v.SetDefault("cors.allowed_origins.values", "*")
- if len(option.AllowedOrigins) == 0 {
- allowedOrigins := v.GetString("cors.allowed_origins.values")
- domains := strings.Split(allowedOrigins, ",")
- option.AllowedOrigins = domains
- }
- var iam *IdentityAccessManagement
- iam = NewIdentityAccessManagementWithStore(option, explicitStore)
- s3ApiServer = &S3ApiServer{
- option: option,
- iam: iam,
- randomClientId: util.RandomInt32(),
- filerGuard: security.NewGuard([]string{}, signingKey, expiresAfterSec, readSigningKey, readExpiresAfterSec),
- cb: NewCircuitBreaker(option),
- credentialManager: iam.credentialManager,
- bucketConfigCache: NewBucketConfigCache(60 * time.Minute), // Increased TTL since cache is now event-driven
- }
- // Initialize advanced IAM system if config is provided
- if option.IamConfig != "" {
- glog.V(0).Infof("Loading advanced IAM configuration from: %s", option.IamConfig)
- iamManager, err := loadIAMManagerFromConfig(option.IamConfig, func() string {
- return string(option.Filer)
- })
- if err != nil {
- glog.Errorf("Failed to load IAM configuration: %v", err)
- } else {
- // Create S3 IAM integration with the loaded IAM manager
- s3iam := NewS3IAMIntegration(iamManager, string(option.Filer))
- // Set IAM integration in server
- s3ApiServer.iamIntegration = s3iam
- // Set the integration in the traditional IAM for compatibility
- iam.SetIAMIntegration(s3iam)
- glog.V(0).Infof("Advanced IAM system initialized successfully")
- }
- }
- if option.Config != "" {
- grace.OnReload(func() {
- if err := s3ApiServer.iam.loadS3ApiConfigurationFromFile(option.Config); err != nil {
- glog.Errorf("fail to load config file %s: %v", option.Config, err)
- } else {
- glog.V(0).Infof("Loaded %d identities from config file %s", len(s3ApiServer.iam.identities), option.Config)
- }
- })
- }
- s3ApiServer.bucketRegistry = NewBucketRegistry(s3ApiServer)
- if option.LocalFilerSocket == "" {
- if s3ApiServer.client, err = util_http.NewGlobalHttpClient(); err != nil {
- return nil, err
- }
- } else {
- s3ApiServer.client = &http.Client{
- Transport: &http.Transport{
- DialContext: func(_ context.Context, _, _ string) (net.Conn, error) {
- return net.Dial("unix", option.LocalFilerSocket)
- },
- },
- }
- }
- s3ApiServer.registerRouter(router)
- go s3ApiServer.subscribeMetaEvents("s3", startTsNs, filer.DirectoryEtcRoot, []string{option.BucketsPath})
- return s3ApiServer, nil
- }
- // handleCORSOriginValidation handles the common CORS origin validation logic
- func (s3a *S3ApiServer) handleCORSOriginValidation(w http.ResponseWriter, r *http.Request) bool {
- origin := r.Header.Get("Origin")
- if origin != "" {
- if len(s3a.option.AllowedOrigins) == 0 || s3a.option.AllowedOrigins[0] == "*" {
- origin = "*"
- } else {
- originFound := false
- for _, allowedOrigin := range s3a.option.AllowedOrigins {
- if origin == allowedOrigin {
- originFound = true
- break
- }
- }
- if !originFound {
- writeFailureResponse(w, r, http.StatusForbidden)
- return false
- }
- }
- }
- w.Header().Set("Access-Control-Allow-Origin", origin)
- w.Header().Set("Access-Control-Expose-Headers", "*")
- w.Header().Set("Access-Control-Allow-Methods", "*")
- w.Header().Set("Access-Control-Allow-Headers", "*")
- w.Header().Set("Access-Control-Allow-Credentials", "true")
- return true
- }
- func (s3a *S3ApiServer) registerRouter(router *mux.Router) {
- // API Router
- apiRouter := router.PathPrefix("/").Subrouter()
- // Readiness Probe
- apiRouter.Methods(http.MethodGet).Path("/status").HandlerFunc(s3a.StatusHandler)
- apiRouter.Methods(http.MethodGet).Path("/healthz").HandlerFunc(s3a.StatusHandler)
- var routers []*mux.Router
- if s3a.option.DomainName != "" {
- domainNames := strings.Split(s3a.option.DomainName, ",")
- for _, domainName := range domainNames {
- routers = append(routers, apiRouter.Host(
- fmt.Sprintf("%s.%s:%d", "{bucket:.+}", domainName, s3a.option.Port)).Subrouter())
- routers = append(routers, apiRouter.Host(
- fmt.Sprintf("%s.%s", "{bucket:.+}", domainName)).Subrouter())
- }
- }
- routers = append(routers, apiRouter.PathPrefix("/{bucket}").Subrouter())
- // Get CORS middleware instance with caching
- corsMiddleware := s3a.getCORSMiddleware()
- for _, bucket := range routers {
- // Apply CORS middleware to bucket routers for automatic CORS header handling
- bucket.Use(corsMiddleware.Handler)
- // Bucket-specific OPTIONS handler for CORS preflight requests
- // Use PathPrefix to catch all bucket-level preflight routes including /bucket/object
- bucket.PathPrefix("/").Methods(http.MethodOptions).HandlerFunc(corsMiddleware.HandleOptionsRequest)
- // each case should follow the next rule:
- // - requesting object with query must precede any other methods
- // - requesting object must precede any methods with buckets
- // - requesting bucket with query must precede raw methods with buckets
- // - requesting bucket must be processed in the end
- // objects with query
- // CopyObjectPart
- bucket.Methods(http.MethodPut).Path("/{object:.+}").HeadersRegexp("X-Amz-Copy-Source", `.*?(\/|%2F).*?`).HandlerFunc(track(s3a.iam.Auth(s3a.cb.Limit(s3a.CopyObjectPartHandler, ACTION_WRITE)), "PUT")).Queries("partNumber", "{partNumber:[0-9]+}", "uploadId", "{uploadId:.*}")
- // PutObjectPart
- bucket.Methods(http.MethodPut).Path("/{object:.+}").HandlerFunc(track(s3a.iam.Auth(s3a.cb.Limit(s3a.PutObjectPartHandler, ACTION_WRITE)), "PUT")).Queries("partNumber", "{partNumber:[0-9]+}", "uploadId", "{uploadId:.*}")
- // CompleteMultipartUpload
- bucket.Methods(http.MethodPost).Path("/{object:.+}").HandlerFunc(track(s3a.iam.Auth(s3a.cb.Limit(s3a.CompleteMultipartUploadHandler, ACTION_WRITE)), "POST")).Queries("uploadId", "{uploadId:.*}")
- // NewMultipartUpload
- bucket.Methods(http.MethodPost).Path("/{object:.+}").HandlerFunc(track(s3a.iam.Auth(s3a.cb.Limit(s3a.NewMultipartUploadHandler, ACTION_WRITE)), "POST")).Queries("uploads", "")
- // AbortMultipartUpload
- bucket.Methods(http.MethodDelete).Path("/{object:.+}").HandlerFunc(track(s3a.iam.Auth(s3a.cb.Limit(s3a.AbortMultipartUploadHandler, ACTION_WRITE)), "DELETE")).Queries("uploadId", "{uploadId:.*}")
- // ListObjectParts
- bucket.Methods(http.MethodGet).Path("/{object:.+}").HandlerFunc(track(s3a.iam.Auth(s3a.cb.Limit(s3a.ListObjectPartsHandler, ACTION_READ)), "GET")).Queries("uploadId", "{uploadId:.*}")
- // ListMultipartUploads
- bucket.Methods(http.MethodGet).HandlerFunc(track(s3a.iam.Auth(s3a.cb.Limit(s3a.ListMultipartUploadsHandler, ACTION_READ)), "GET")).Queries("uploads", "")
- // GetObjectTagging
- bucket.Methods(http.MethodGet).Path("/{object:.+}").HandlerFunc(track(s3a.iam.Auth(s3a.cb.Limit(s3a.GetObjectTaggingHandler, ACTION_READ)), "GET")).Queries("tagging", "")
- // PutObjectTagging
- bucket.Methods(http.MethodPut).Path("/{object:.+}").HandlerFunc(track(s3a.iam.Auth(s3a.cb.Limit(s3a.PutObjectTaggingHandler, ACTION_TAGGING)), "PUT")).Queries("tagging", "")
- // DeleteObjectTagging
- bucket.Methods(http.MethodDelete).Path("/{object:.+}").HandlerFunc(track(s3a.iam.Auth(s3a.cb.Limit(s3a.DeleteObjectTaggingHandler, ACTION_TAGGING)), "DELETE")).Queries("tagging", "")
- // PutObjectACL
- bucket.Methods(http.MethodPut).Path("/{object:.+}").HandlerFunc(track(s3a.iam.Auth(s3a.cb.Limit(s3a.PutObjectAclHandler, ACTION_WRITE_ACP)), "PUT")).Queries("acl", "")
- // PutObjectRetention
- bucket.Methods(http.MethodPut).Path("/{object:.+}").HandlerFunc(track(s3a.iam.Auth(s3a.cb.Limit(s3a.PutObjectRetentionHandler, ACTION_WRITE)), "PUT")).Queries("retention", "")
- // PutObjectLegalHold
- bucket.Methods(http.MethodPut).Path("/{object:.+}").HandlerFunc(track(s3a.iam.Auth(s3a.cb.Limit(s3a.PutObjectLegalHoldHandler, ACTION_WRITE)), "PUT")).Queries("legal-hold", "")
- // GetObjectACL
- bucket.Methods(http.MethodGet).Path("/{object:.+}").HandlerFunc(track(s3a.iam.Auth(s3a.cb.Limit(s3a.GetObjectAclHandler, ACTION_READ_ACP)), "GET")).Queries("acl", "")
- // GetObjectRetention
- bucket.Methods(http.MethodGet).Path("/{object:.+}").HandlerFunc(track(s3a.iam.Auth(s3a.cb.Limit(s3a.GetObjectRetentionHandler, ACTION_READ)), "GET")).Queries("retention", "")
- // GetObjectLegalHold
- bucket.Methods(http.MethodGet).Path("/{object:.+}").HandlerFunc(track(s3a.iam.Auth(s3a.cb.Limit(s3a.GetObjectLegalHoldHandler, ACTION_READ)), "GET")).Queries("legal-hold", "")
- // objects with query
- // raw objects
- // HeadObject
- bucket.Methods(http.MethodHead).Path("/{object:.+}").HandlerFunc(track(s3a.AuthWithPublicRead(func(w http.ResponseWriter, r *http.Request) {
- limitedHandler, _ := s3a.cb.Limit(s3a.HeadObjectHandler, ACTION_READ)
- limitedHandler(w, r)
- }, ACTION_READ), "GET"))
- // GetObject, but directory listing is not supported
- bucket.Methods(http.MethodGet).Path("/{object:.+}").HandlerFunc(track(s3a.AuthWithPublicRead(func(w http.ResponseWriter, r *http.Request) {
- limitedHandler, _ := s3a.cb.Limit(s3a.GetObjectHandler, ACTION_READ)
- limitedHandler(w, r)
- }, ACTION_READ), "GET"))
- // CopyObject
- bucket.Methods(http.MethodPut).Path("/{object:.+}").HeadersRegexp("X-Amz-Copy-Source", ".*?(\\/|%2F).*?").HandlerFunc(track(s3a.iam.Auth(s3a.cb.Limit(s3a.CopyObjectHandler, ACTION_WRITE)), "COPY"))
- // PutObject
- bucket.Methods(http.MethodPut).Path("/{object:.+}").HandlerFunc(track(s3a.iam.Auth(s3a.cb.Limit(s3a.PutObjectHandler, ACTION_WRITE)), "PUT"))
- // DeleteObject
- bucket.Methods(http.MethodDelete).Path("/{object:.+}").HandlerFunc(track(s3a.iam.Auth(s3a.cb.Limit(s3a.DeleteObjectHandler, ACTION_WRITE)), "DELETE"))
- // raw objects
- // buckets with query
- // DeleteMultipleObjects
- bucket.Methods(http.MethodPost).HandlerFunc(track(s3a.iam.Auth(s3a.cb.Limit(s3a.DeleteMultipleObjectsHandler, ACTION_WRITE)), "DELETE")).Queries("delete", "")
- // GetBucketACL
- bucket.Methods(http.MethodGet).HandlerFunc(track(s3a.iam.Auth(s3a.cb.Limit(s3a.GetBucketAclHandler, ACTION_READ_ACP)), "GET")).Queries("acl", "")
- // PutBucketACL
- bucket.Methods(http.MethodPut).HandlerFunc(track(s3a.iam.Auth(s3a.cb.Limit(s3a.PutBucketAclHandler, ACTION_WRITE_ACP)), "PUT")).Queries("acl", "")
- // GetBucketPolicy
- bucket.Methods(http.MethodGet).HandlerFunc(track(s3a.iam.Auth(s3a.cb.Limit(s3a.GetBucketPolicyHandler, ACTION_READ)), "GET")).Queries("policy", "")
- // PutBucketPolicy
- bucket.Methods(http.MethodPut).HandlerFunc(track(s3a.iam.Auth(s3a.cb.Limit(s3a.PutBucketPolicyHandler, ACTION_WRITE)), "PUT")).Queries("policy", "")
- // DeleteBucketPolicy
- bucket.Methods(http.MethodDelete).HandlerFunc(track(s3a.iam.Auth(s3a.cb.Limit(s3a.DeleteBucketPolicyHandler, ACTION_WRITE)), "DELETE")).Queries("policy", "")
- // GetBucketCors
- bucket.Methods(http.MethodGet).HandlerFunc(track(s3a.iam.Auth(s3a.cb.Limit(s3a.GetBucketCorsHandler, ACTION_READ)), "GET")).Queries("cors", "")
- // PutBucketCors
- bucket.Methods(http.MethodPut).HandlerFunc(track(s3a.iam.Auth(s3a.cb.Limit(s3a.PutBucketCorsHandler, ACTION_WRITE)), "PUT")).Queries("cors", "")
- // DeleteBucketCors
- bucket.Methods(http.MethodDelete).HandlerFunc(track(s3a.iam.Auth(s3a.cb.Limit(s3a.DeleteBucketCorsHandler, ACTION_WRITE)), "DELETE")).Queries("cors", "")
- // GetBucketLifecycleConfiguration
- bucket.Methods(http.MethodGet).HandlerFunc(track(s3a.iam.Auth(s3a.cb.Limit(s3a.GetBucketLifecycleConfigurationHandler, ACTION_READ)), "GET")).Queries("lifecycle", "")
- // PutBucketLifecycleConfiguration
- bucket.Methods(http.MethodPut).HandlerFunc(track(s3a.iam.Auth(s3a.cb.Limit(s3a.PutBucketLifecycleConfigurationHandler, ACTION_WRITE)), "PUT")).Queries("lifecycle", "")
- // DeleteBucketLifecycleConfiguration
- bucket.Methods(http.MethodDelete).HandlerFunc(track(s3a.iam.Auth(s3a.cb.Limit(s3a.DeleteBucketLifecycleHandler, ACTION_WRITE)), "DELETE")).Queries("lifecycle", "")
- // GetBucketLocation
- bucket.Methods(http.MethodGet).HandlerFunc(track(s3a.iam.Auth(s3a.cb.Limit(s3a.GetBucketLocationHandler, ACTION_READ)), "GET")).Queries("location", "")
- // GetBucketRequestPayment
- bucket.Methods(http.MethodGet).HandlerFunc(track(s3a.iam.Auth(s3a.cb.Limit(s3a.GetBucketRequestPaymentHandler, ACTION_READ)), "GET")).Queries("requestPayment", "")
- // GetBucketVersioning
- bucket.Methods(http.MethodGet).HandlerFunc(track(s3a.iam.Auth(s3a.cb.Limit(s3a.GetBucketVersioningHandler, ACTION_READ)), "GET")).Queries("versioning", "")
- bucket.Methods(http.MethodPut).HandlerFunc(track(s3a.iam.Auth(s3a.cb.Limit(s3a.PutBucketVersioningHandler, ACTION_WRITE)), "PUT")).Queries("versioning", "")
- // GetObjectLockConfiguration / PutObjectLockConfiguration (bucket-level operations)
- bucket.Methods(http.MethodGet).HandlerFunc(track(s3a.iam.Auth(s3a.cb.Limit(s3a.GetObjectLockConfigurationHandler, ACTION_READ)), "GET")).Queries("object-lock", "")
- bucket.Methods(http.MethodPut).HandlerFunc(track(s3a.iam.Auth(s3a.cb.Limit(s3a.PutObjectLockConfigurationHandler, ACTION_WRITE)), "PUT")).Queries("object-lock", "")
- // GetBucketTagging
- bucket.Methods(http.MethodGet).HandlerFunc(track(s3a.iam.Auth(s3a.cb.Limit(s3a.GetBucketTaggingHandler, ACTION_TAGGING)), "GET")).Queries("tagging", "")
- bucket.Methods(http.MethodPut).HandlerFunc(track(s3a.iam.Auth(s3a.cb.Limit(s3a.PutBucketTaggingHandler, ACTION_TAGGING)), "PUT")).Queries("tagging", "")
- bucket.Methods(http.MethodDelete).HandlerFunc(track(s3a.iam.Auth(s3a.cb.Limit(s3a.DeleteBucketTaggingHandler, ACTION_TAGGING)), "DELETE")).Queries("tagging", "")
- // GetBucketEncryption
- bucket.Methods(http.MethodGet).HandlerFunc(track(s3a.iam.Auth(s3a.cb.Limit(s3a.GetBucketEncryptionHandler, ACTION_ADMIN)), "GET")).Queries("encryption", "")
- bucket.Methods(http.MethodPut).HandlerFunc(track(s3a.iam.Auth(s3a.cb.Limit(s3a.PutBucketEncryptionHandler, ACTION_ADMIN)), "PUT")).Queries("encryption", "")
- bucket.Methods(http.MethodDelete).HandlerFunc(track(s3a.iam.Auth(s3a.cb.Limit(s3a.DeleteBucketEncryptionHandler, ACTION_ADMIN)), "DELETE")).Queries("encryption", "")
- // GetPublicAccessBlockHandler
- bucket.Methods(http.MethodGet).HandlerFunc(track(s3a.iam.Auth(s3a.cb.Limit(s3a.GetPublicAccessBlockHandler, ACTION_ADMIN)), "GET")).Queries("publicAccessBlock", "")
- bucket.Methods(http.MethodPut).HandlerFunc(track(s3a.iam.Auth(s3a.cb.Limit(s3a.PutPublicAccessBlockHandler, ACTION_ADMIN)), "PUT")).Queries("publicAccessBlock", "")
- bucket.Methods(http.MethodDelete).HandlerFunc(track(s3a.iam.Auth(s3a.cb.Limit(s3a.DeletePublicAccessBlockHandler, ACTION_ADMIN)), "DELETE")).Queries("publicAccessBlock", "")
- // ListObjectsV2
- bucket.Methods(http.MethodGet).HandlerFunc(track(s3a.AuthWithPublicRead(func(w http.ResponseWriter, r *http.Request) {
- limitedHandler, _ := s3a.cb.Limit(s3a.ListObjectsV2Handler, ACTION_LIST)
- limitedHandler(w, r)
- }, ACTION_LIST), "LIST")).Queries("list-type", "2")
- // ListObjectVersions
- bucket.Methods(http.MethodGet).HandlerFunc(track(s3a.iam.Auth(s3a.cb.Limit(s3a.ListObjectVersionsHandler, ACTION_LIST)), "LIST")).Queries("versions", "")
- // buckets with query
- // PutBucketOwnershipControls
- bucket.Methods(http.MethodPut).HandlerFunc(track(s3a.iam.Auth(s3a.PutBucketOwnershipControls, ACTION_ADMIN), "PUT")).Queries("ownershipControls", "")
- //GetBucketOwnershipControls
- bucket.Methods(http.MethodGet).HandlerFunc(track(s3a.iam.Auth(s3a.GetBucketOwnershipControls, ACTION_READ), "GET")).Queries("ownershipControls", "")
- //DeleteBucketOwnershipControls
- bucket.Methods(http.MethodDelete).HandlerFunc(track(s3a.iam.Auth(s3a.DeleteBucketOwnershipControls, ACTION_ADMIN), "DELETE")).Queries("ownershipControls", "")
- // raw buckets
- // PostPolicy
- bucket.Methods(http.MethodPost).HeadersRegexp("Content-Type", "multipart/form-data*").HandlerFunc(track(s3a.iam.Auth(s3a.cb.Limit(s3a.PostPolicyBucketHandler, ACTION_WRITE)), "POST"))
- // HeadBucket
- bucket.Methods(http.MethodHead).HandlerFunc(track(s3a.AuthWithPublicRead(func(w http.ResponseWriter, r *http.Request) {
- limitedHandler, _ := s3a.cb.Limit(s3a.HeadBucketHandler, ACTION_READ)
- limitedHandler(w, r)
- }, ACTION_READ), "GET"))
- // PutBucket
- bucket.Methods(http.MethodPut).HandlerFunc(track(s3a.iam.Auth(s3a.cb.Limit(s3a.PutBucketHandler, ACTION_ADMIN)), "PUT"))
- // DeleteBucket
- bucket.Methods(http.MethodDelete).HandlerFunc(track(s3a.iam.Auth(s3a.cb.Limit(s3a.DeleteBucketHandler, ACTION_DELETE_BUCKET)), "DELETE"))
- // ListObjectsV1 (Legacy)
- bucket.Methods(http.MethodGet).HandlerFunc(track(s3a.AuthWithPublicRead(func(w http.ResponseWriter, r *http.Request) {
- limitedHandler, _ := s3a.cb.Limit(s3a.ListObjectsV1Handler, ACTION_LIST)
- limitedHandler(w, r)
- }, ACTION_LIST), "LIST"))
- // raw buckets
- }
- // Global OPTIONS handler for service-level requests (non-bucket requests)
- // This handles requests like OPTIONS /, OPTIONS /status, OPTIONS /healthz
- // Place this after bucket handlers to avoid interfering with bucket CORS middleware
- apiRouter.Methods(http.MethodOptions).PathPrefix("/").HandlerFunc(
- func(w http.ResponseWriter, r *http.Request) {
- // Only handle if this is not a bucket-specific request
- vars := mux.Vars(r)
- bucket := vars["bucket"]
- if bucket != "" {
- // This is a bucket-specific request, let bucket CORS middleware handle it
- http.NotFound(w, r)
- return
- }
- if s3a.handleCORSOriginValidation(w, r) {
- writeSuccessResponseEmpty(w, r)
- }
- })
- // ListBuckets
- apiRouter.Methods(http.MethodGet).Path("/").HandlerFunc(track(s3a.ListBucketsHandler, "LIST"))
- // NotFound
- apiRouter.NotFoundHandler = http.HandlerFunc(s3err.NotFoundHandler)
- }
- // loadIAMManagerFromConfig loads the advanced IAM manager from configuration file
- func loadIAMManagerFromConfig(configPath string, filerAddressProvider func() string) (*integration.IAMManager, error) {
- // Read configuration file
- configData, err := os.ReadFile(configPath)
- if err != nil {
- return nil, fmt.Errorf("failed to read config file: %w", err)
- }
- // Parse configuration structure
- var configRoot struct {
- STS *sts.STSConfig `json:"sts"`
- Policy *policy.PolicyEngineConfig `json:"policy"`
- Providers []map[string]interface{} `json:"providers"`
- Roles []*integration.RoleDefinition `json:"roles"`
- Policies []struct {
- Name string `json:"name"`
- Document *policy.PolicyDocument `json:"document"`
- } `json:"policies"`
- }
- if err := json.Unmarshal(configData, &configRoot); err != nil {
- return nil, fmt.Errorf("failed to parse config: %w", err)
- }
- // Create IAM configuration
- iamConfig := &integration.IAMConfig{
- STS: configRoot.STS,
- Policy: configRoot.Policy,
- Roles: &integration.RoleStoreConfig{
- StoreType: "memory", // Use memory store for JSON config-based setup
- },
- }
- // Initialize IAM manager
- iamManager := integration.NewIAMManager()
- if err := iamManager.Initialize(iamConfig, filerAddressProvider); err != nil {
- return nil, fmt.Errorf("failed to initialize IAM manager: %w", err)
- }
- // Load identity providers
- providerFactory := sts.NewProviderFactory()
- for _, providerConfig := range configRoot.Providers {
- provider, err := providerFactory.CreateProvider(&sts.ProviderConfig{
- Name: providerConfig["name"].(string),
- Type: providerConfig["type"].(string),
- Enabled: true,
- Config: providerConfig["config"].(map[string]interface{}),
- })
- if err != nil {
- glog.Warningf("Failed to create provider %s: %v", providerConfig["name"], err)
- continue
- }
- if provider != nil {
- if err := iamManager.RegisterIdentityProvider(provider); err != nil {
- glog.Warningf("Failed to register provider %s: %v", providerConfig["name"], err)
- } else {
- glog.V(1).Infof("Registered identity provider: %s", providerConfig["name"])
- }
- }
- }
- // Load policies
- for _, policyDef := range configRoot.Policies {
- if err := iamManager.CreatePolicy(context.Background(), "", policyDef.Name, policyDef.Document); err != nil {
- glog.Warningf("Failed to create policy %s: %v", policyDef.Name, err)
- }
- }
- // Load roles
- for _, roleDef := range configRoot.Roles {
- if err := iamManager.CreateRole(context.Background(), "", roleDef.RoleName, roleDef); err != nil {
- glog.Warningf("Failed to create role %s: %v", roleDef.RoleName, err)
- }
- }
- glog.V(0).Infof("Loaded %d providers, %d policies and %d roles from config", len(configRoot.Providers), len(configRoot.Policies), len(configRoot.Roles))
- return iamManager, nil
- }
|