| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883 |
- package s3api
- import (
- "bytes"
- "context"
- "encoding/json"
- "encoding/xml"
- "errors"
- "fmt"
- "math"
- "net/http"
- "sort"
- "strings"
- "time"
- "github.com/aws/aws-sdk-go/private/protocol/xml/xmlutil"
- "github.com/seaweedfs/seaweedfs/weed/s3api/s3bucket"
- "github.com/seaweedfs/seaweedfs/weed/filer"
- "github.com/seaweedfs/seaweedfs/weed/s3api/s3_constants"
- "github.com/seaweedfs/seaweedfs/weed/storage/needle"
- "github.com/seaweedfs/seaweedfs/weed/s3api/s3err"
- "github.com/aws/aws-sdk-go/aws"
- "github.com/aws/aws-sdk-go/service/s3"
- "github.com/seaweedfs/seaweedfs/weed/glog"
- "github.com/seaweedfs/seaweedfs/weed/pb/filer_pb"
- util_http "github.com/seaweedfs/seaweedfs/weed/util/http"
- )
- func (s3a *S3ApiServer) ListBucketsHandler(w http.ResponseWriter, r *http.Request) {
- glog.V(3).Infof("ListBucketsHandler")
- var identity *Identity
- var s3Err s3err.ErrorCode
- if s3a.iam.isEnabled() {
- // Use authRequest instead of authUser for consistency with other endpoints
- // This ensures the same authentication flow and any fixes (like prefix handling) are applied
- identity, s3Err = s3a.iam.authRequest(r, s3_constants.ACTION_LIST)
- if s3Err != s3err.ErrNone {
- s3err.WriteErrorResponse(w, r, s3Err)
- return
- }
- }
- var response ListAllMyBucketsResult
- entries, _, err := s3a.list(s3a.option.BucketsPath, "", "", false, math.MaxInt32)
- if err != nil {
- s3err.WriteErrorResponse(w, r, s3err.ErrInternalError)
- return
- }
- identityId := r.Header.Get(s3_constants.AmzIdentityId)
- var listBuckets ListAllMyBucketsList
- for _, entry := range entries {
- if entry.IsDirectory {
- // Check permissions for each bucket
- if identity != nil {
- // For JWT-authenticated users, use IAM authorization
- sessionToken := r.Header.Get("X-SeaweedFS-Session-Token")
- if s3a.iam.iamIntegration != nil && sessionToken != "" {
- // Use IAM authorization for JWT users
- errCode := s3a.iam.authorizeWithIAM(r, identity, s3_constants.ACTION_LIST, entry.Name, "")
- if errCode != s3err.ErrNone {
- continue
- }
- } else {
- // Use legacy authorization for non-JWT users
- if !identity.canDo(s3_constants.ACTION_LIST, entry.Name, "") {
- continue
- }
- }
- }
- listBuckets.Bucket = append(listBuckets.Bucket, ListAllMyBucketsEntry{
- Name: entry.Name,
- CreationDate: time.Unix(entry.Attributes.Crtime, 0).UTC(),
- })
- }
- }
- response = ListAllMyBucketsResult{
- Owner: CanonicalUser{
- ID: identityId,
- DisplayName: identityId,
- },
- Buckets: listBuckets,
- }
- writeSuccessResponseXML(w, r, response)
- }
- func (s3a *S3ApiServer) PutBucketHandler(w http.ResponseWriter, r *http.Request) {
- // collect parameters
- bucket, _ := s3_constants.GetBucketAndObject(r)
- // validate the bucket name
- err := s3bucket.VerifyS3BucketName(bucket)
- if err != nil {
- glog.Errorf("put invalid bucket name: %v %v", bucket, err)
- s3err.WriteErrorResponse(w, r, s3err.ErrInvalidBucketName)
- return
- }
- // avoid duplicated buckets
- errCode := s3err.ErrNone
- if err := s3a.WithFilerClient(false, func(client filer_pb.SeaweedFilerClient) error {
- if resp, err := client.CollectionList(context.Background(), &filer_pb.CollectionListRequest{
- IncludeEcVolumes: true,
- IncludeNormalVolumes: true,
- }); err != nil {
- glog.Errorf("list collection: %v", err)
- return fmt.Errorf("list collections: %w", err)
- } else {
- for _, c := range resp.Collections {
- if s3a.getCollectionName(bucket) == c.Name {
- errCode = s3err.ErrBucketAlreadyExists
- break
- }
- }
- }
- return nil
- }); err != nil {
- s3err.WriteErrorResponse(w, r, s3err.ErrInternalError)
- return
- }
- if exist, err := s3a.exists(s3a.option.BucketsPath, bucket, true); err == nil && exist {
- errCode = s3err.ErrBucketAlreadyExists
- }
- if errCode != s3err.ErrNone {
- s3err.WriteErrorResponse(w, r, errCode)
- return
- }
- fn := func(entry *filer_pb.Entry) {
- if identityId := r.Header.Get(s3_constants.AmzIdentityId); identityId != "" {
- if entry.Extended == nil {
- entry.Extended = make(map[string][]byte)
- }
- entry.Extended[s3_constants.AmzIdentityId] = []byte(identityId)
- }
- }
- // create the folder for bucket, but lazily create actual collection
- if err := s3a.mkdir(s3a.option.BucketsPath, bucket, fn); err != nil {
- glog.Errorf("PutBucketHandler mkdir: %v", err)
- s3err.WriteErrorResponse(w, r, s3err.ErrInternalError)
- return
- }
- // Check for x-amz-bucket-object-lock-enabled header (S3 standard compliance)
- if objectLockHeaderValue := r.Header.Get(s3_constants.AmzBucketObjectLockEnabled); strings.EqualFold(objectLockHeaderValue, "true") {
- glog.V(3).Infof("PutBucketHandler: enabling Object Lock and Versioning for bucket %s due to x-amz-bucket-object-lock-enabled header", bucket)
- // Atomically update the configuration of the specified bucket. See the updateBucketConfig
- // function definition for detailed documentation on parameters and behavior.
- errCode := s3a.updateBucketConfig(bucket, func(bucketConfig *BucketConfig) error {
- // Enable versioning (required for Object Lock)
- bucketConfig.Versioning = s3_constants.VersioningEnabled
- // Create basic Object Lock configuration (enabled without default retention)
- objectLockConfig := &ObjectLockConfiguration{
- ObjectLockEnabled: s3_constants.ObjectLockEnabled,
- }
- // Set the cached Object Lock configuration
- bucketConfig.ObjectLockConfig = objectLockConfig
- return nil
- })
- if errCode != s3err.ErrNone {
- glog.Errorf("PutBucketHandler: failed to enable Object Lock for bucket %s: %v", bucket, errCode)
- s3err.WriteErrorResponse(w, r, errCode)
- return
- }
- glog.V(3).Infof("PutBucketHandler: enabled Object Lock and Versioning for bucket %s", bucket)
- }
- w.Header().Set("Location", "/"+bucket)
- writeSuccessResponseEmpty(w, r)
- }
- func (s3a *S3ApiServer) DeleteBucketHandler(w http.ResponseWriter, r *http.Request) {
- bucket, _ := s3_constants.GetBucketAndObject(r)
- glog.V(3).Infof("DeleteBucketHandler %s", bucket)
- if err := s3a.checkBucket(r, bucket); err != s3err.ErrNone {
- s3err.WriteErrorResponse(w, r, err)
- return
- }
- err := s3a.WithFilerClient(false, func(client filer_pb.SeaweedFilerClient) error {
- if !s3a.option.AllowDeleteBucketNotEmpty {
- entries, _, err := s3a.list(s3a.option.BucketsPath+"/"+bucket, "", "", false, 2)
- if err != nil {
- return fmt.Errorf("failed to list bucket %s: %v", bucket, err)
- }
- for _, entry := range entries {
- if entry.Name != s3_constants.MultipartUploadsFolder {
- return errors.New(s3err.GetAPIError(s3err.ErrBucketNotEmpty).Code)
- }
- }
- }
- // delete collection
- deleteCollectionRequest := &filer_pb.DeleteCollectionRequest{
- Collection: s3a.getCollectionName(bucket),
- }
- glog.V(1).Infof("delete collection: %v", deleteCollectionRequest)
- if _, err := client.DeleteCollection(context.Background(), deleteCollectionRequest); err != nil {
- return fmt.Errorf("delete collection %s: %v", bucket, err)
- }
- return nil
- })
- if err != nil {
- s3ErrorCode := s3err.ErrInternalError
- if err.Error() == s3err.GetAPIError(s3err.ErrBucketNotEmpty).Code {
- s3ErrorCode = s3err.ErrBucketNotEmpty
- }
- s3err.WriteErrorResponse(w, r, s3ErrorCode)
- return
- }
- err = s3a.rm(s3a.option.BucketsPath, bucket, false, true)
- if err != nil {
- s3err.WriteErrorResponse(w, r, s3err.ErrInternalError)
- return
- }
- // Clean up bucket-related caches and locks after successful deletion
- s3a.invalidateBucketConfigCache(bucket)
- s3err.WriteEmptyResponse(w, r, http.StatusNoContent)
- }
- func (s3a *S3ApiServer) HeadBucketHandler(w http.ResponseWriter, r *http.Request) {
- bucket, _ := s3_constants.GetBucketAndObject(r)
- glog.V(3).Infof("HeadBucketHandler %s", bucket)
- if entry, err := s3a.getEntry(s3a.option.BucketsPath, bucket); entry == nil || errors.Is(err, filer_pb.ErrNotFound) {
- s3err.WriteErrorResponse(w, r, s3err.ErrNoSuchBucket)
- return
- }
- writeSuccessResponseEmpty(w, r)
- }
- func (s3a *S3ApiServer) checkBucket(r *http.Request, bucket string) s3err.ErrorCode {
- entry, err := s3a.getEntry(s3a.option.BucketsPath, bucket)
- if entry == nil || errors.Is(err, filer_pb.ErrNotFound) {
- return s3err.ErrNoSuchBucket
- }
- //if iam is enabled, the access was already checked before
- if s3a.iam.isEnabled() {
- return s3err.ErrNone
- }
- if !s3a.hasAccess(r, entry) {
- return s3err.ErrAccessDenied
- }
- return s3err.ErrNone
- }
- func (s3a *S3ApiServer) hasAccess(r *http.Request, entry *filer_pb.Entry) bool {
- // Check if user is properly authenticated as admin through IAM system
- if s3a.isUserAdmin(r) {
- return true
- }
- if entry.Extended == nil {
- return true
- }
- identityId := r.Header.Get(s3_constants.AmzIdentityId)
- if id, ok := entry.Extended[s3_constants.AmzIdentityId]; ok {
- if identityId != string(id) {
- glog.V(3).Infof("hasAccess: %s != %s (entry.Extended = %v)", identityId, id, entry.Extended)
- return false
- }
- }
- return true
- }
- // isUserAdmin securely checks if the authenticated user is an admin
- // This validates admin status through proper IAM authentication, not spoofable headers
- func (s3a *S3ApiServer) isUserAdmin(r *http.Request) bool {
- // Use a minimal admin action to authenticate and check admin status
- adminAction := Action("Admin")
- identity, errCode := s3a.iam.authRequest(r, adminAction)
- if errCode != s3err.ErrNone {
- return false
- }
- // Check if the authenticated identity has admin privileges
- return identity != nil && identity.isAdmin()
- }
- // isBucketPublicRead checks if a bucket allows anonymous read access based on its cached ACL status
- func (s3a *S3ApiServer) isBucketPublicRead(bucket string) bool {
- // Get bucket configuration which contains cached public-read status
- config, errCode := s3a.getBucketConfig(bucket)
- if errCode != s3err.ErrNone {
- return false
- }
- // Return the cached public-read status (no JSON parsing needed)
- return config.IsPublicRead
- }
- // isPublicReadGrants checks if the grants allow public read access
- func isPublicReadGrants(grants []*s3.Grant) bool {
- for _, grant := range grants {
- if grant.Grantee != nil && grant.Grantee.URI != nil && grant.Permission != nil {
- // Check for AllUsers group with Read permission
- if *grant.Grantee.URI == s3_constants.GranteeGroupAllUsers &&
- (*grant.Permission == s3_constants.PermissionRead || *grant.Permission == s3_constants.PermissionFullControl) {
- return true
- }
- }
- }
- return false
- }
- // AuthWithPublicRead creates an auth wrapper that allows anonymous access for public-read buckets
- func (s3a *S3ApiServer) AuthWithPublicRead(handler http.HandlerFunc, action Action) http.HandlerFunc {
- return func(w http.ResponseWriter, r *http.Request) {
- bucket, _ := s3_constants.GetBucketAndObject(r)
- authType := getRequestAuthType(r)
- isAnonymous := authType == authTypeAnonymous
- // For anonymous requests, check if bucket allows public read
- if isAnonymous {
- isPublic := s3a.isBucketPublicRead(bucket)
- if isPublic {
- handler(w, r)
- return
- }
- }
- // For all authenticated requests and anonymous requests to non-public buckets,
- // use normal IAM auth to enforce policies
- s3a.iam.Auth(handler, action)(w, r)
- }
- }
- // GetBucketAclHandler Get Bucket ACL
- // https://docs.aws.amazon.com/AmazonS3/latest/API/API_GetBucketAcl.html
- func (s3a *S3ApiServer) GetBucketAclHandler(w http.ResponseWriter, r *http.Request) {
- // collect parameters
- bucket, _ := s3_constants.GetBucketAndObject(r)
- glog.V(3).Infof("GetBucketAclHandler %s", bucket)
- if err := s3a.checkBucket(r, bucket); err != s3err.ErrNone {
- s3err.WriteErrorResponse(w, r, err)
- return
- }
- amzAccountId := r.Header.Get(s3_constants.AmzAccountId)
- amzDisplayName := s3a.iam.GetAccountNameById(amzAccountId)
- response := AccessControlPolicy{
- Owner: CanonicalUser{
- ID: amzAccountId,
- DisplayName: amzDisplayName,
- },
- }
- response.AccessControlList.Grant = append(response.AccessControlList.Grant, Grant{
- Grantee: Grantee{
- ID: amzAccountId,
- DisplayName: amzDisplayName,
- Type: "CanonicalUser",
- XMLXSI: "CanonicalUser",
- XMLNS: "http://www.w3.org/2001/XMLSchema-instance"},
- Permission: s3.PermissionFullControl,
- })
- writeSuccessResponseXML(w, r, response)
- }
- // PutBucketAclHandler Put bucket ACL
- // https://docs.aws.amazon.com/AmazonS3/latest/API/API_PutBucketAcl.html //
- func (s3a *S3ApiServer) PutBucketAclHandler(w http.ResponseWriter, r *http.Request) {
- // collect parameters
- bucket, _ := s3_constants.GetBucketAndObject(r)
- glog.V(3).Infof("PutBucketAclHandler %s", bucket)
- if err := s3a.checkBucket(r, bucket); err != s3err.ErrNone {
- s3err.WriteErrorResponse(w, r, err)
- return
- }
- // Get account information for ACL processing
- amzAccountId := r.Header.Get(s3_constants.AmzAccountId)
- // Get bucket ownership settings (these would be used for ownership validation in a full implementation)
- bucketOwnership := "" // Default/simplified for now - in a full implementation this would be retrieved from bucket config
- bucketOwnerId := amzAccountId // Simplified - bucket owner is current account
- // Use the existing ACL parsing logic to handle both canned ACLs and XML body
- grants, errCode := ExtractAcl(r, s3a.iam, bucketOwnership, bucketOwnerId, amzAccountId, amzAccountId)
- if errCode != s3err.ErrNone {
- s3err.WriteErrorResponse(w, r, errCode)
- return
- }
- // Store the bucket ACL in bucket metadata
- errCode = s3a.updateBucketConfig(bucket, func(config *BucketConfig) error {
- if len(grants) > 0 {
- grantsBytes, err := json.Marshal(grants)
- if err != nil {
- glog.Errorf("PutBucketAclHandler: failed to marshal grants: %v", err)
- return err
- }
- config.ACL = grantsBytes
- // Cache the public-read status to avoid JSON parsing on every request
- config.IsPublicRead = isPublicReadGrants(grants)
- } else {
- config.ACL = nil
- config.IsPublicRead = false
- }
- config.Owner = amzAccountId
- return nil
- })
- if errCode != s3err.ErrNone {
- s3err.WriteErrorResponse(w, r, errCode)
- return
- }
- glog.V(3).Infof("PutBucketAclHandler: Successfully stored ACL for bucket %s with %d grants", bucket, len(grants))
- writeSuccessResponseEmpty(w, r)
- }
- // GetBucketLifecycleConfigurationHandler Get Bucket Lifecycle configuration
- // https://docs.aws.amazon.com/AmazonS3/latest/API/API_GetBucketLifecycleConfiguration.html
- func (s3a *S3ApiServer) GetBucketLifecycleConfigurationHandler(w http.ResponseWriter, r *http.Request) {
- // collect parameters
- bucket, _ := s3_constants.GetBucketAndObject(r)
- glog.V(3).Infof("GetBucketLifecycleConfigurationHandler %s", bucket)
- if err := s3a.checkBucket(r, bucket); err != s3err.ErrNone {
- s3err.WriteErrorResponse(w, r, err)
- return
- }
- fc, err := filer.ReadFilerConf(s3a.option.Filer, s3a.option.GrpcDialOption, nil)
- if err != nil {
- glog.Errorf("GetBucketLifecycleConfigurationHandler: %s", err)
- s3err.WriteErrorResponse(w, r, s3err.ErrInternalError)
- return
- }
- ttls := fc.GetCollectionTtls(s3a.getCollectionName(bucket))
- if len(ttls) == 0 {
- s3err.WriteErrorResponse(w, r, s3err.ErrNoSuchLifecycleConfiguration)
- return
- }
- response := Lifecycle{}
- // Sort locationPrefixes to ensure consistent ordering of lifecycle rules
- var locationPrefixes []string
- for locationPrefix := range ttls {
- locationPrefixes = append(locationPrefixes, locationPrefix)
- }
- sort.Strings(locationPrefixes)
- for _, locationPrefix := range locationPrefixes {
- internalTtl := ttls[locationPrefix]
- ttl, _ := needle.ReadTTL(internalTtl)
- days := int(ttl.Minutes() / 60 / 24)
- if days == 0 {
- continue
- }
- prefix, found := strings.CutPrefix(locationPrefix, fmt.Sprintf("%s/%s/", s3a.option.BucketsPath, bucket))
- if !found {
- continue
- }
- response.Rules = append(response.Rules, Rule{
- ID: prefix,
- Status: Enabled,
- Prefix: Prefix{val: prefix, set: true},
- Expiration: Expiration{Days: days, set: true},
- })
- }
- writeSuccessResponseXML(w, r, response)
- }
- // PutBucketLifecycleConfigurationHandler Put Bucket Lifecycle configuration
- // https://docs.aws.amazon.com/AmazonS3/latest/API/API_PutBucketLifecycleConfiguration.html
- func (s3a *S3ApiServer) PutBucketLifecycleConfigurationHandler(w http.ResponseWriter, r *http.Request) {
- // collect parameters
- bucket, _ := s3_constants.GetBucketAndObject(r)
- glog.V(3).Infof("PutBucketLifecycleConfigurationHandler %s", bucket)
- if err := s3a.checkBucket(r, bucket); err != s3err.ErrNone {
- s3err.WriteErrorResponse(w, r, err)
- return
- }
- lifeCycleConfig := Lifecycle{}
- if err := xmlDecoder(r.Body, &lifeCycleConfig, r.ContentLength); err != nil {
- glog.Warningf("PutBucketLifecycleConfigurationHandler xml decode: %s", err)
- s3err.WriteErrorResponse(w, r, s3err.ErrMalformedXML)
- return
- }
- fc, err := filer.ReadFilerConf(s3a.option.Filer, s3a.option.GrpcDialOption, nil)
- if err != nil {
- glog.Errorf("PutBucketLifecycleConfigurationHandler read filer config: %s", err)
- s3err.WriteErrorResponse(w, r, s3err.ErrInternalError)
- return
- }
- collectionName := s3a.getCollectionName(bucket)
- collectionTtls := fc.GetCollectionTtls(collectionName)
- changed := false
- for _, rule := range lifeCycleConfig.Rules {
- if rule.Status != Enabled {
- continue
- }
- var rulePrefix string
- switch {
- case rule.Filter.Prefix.set:
- rulePrefix = rule.Filter.Prefix.val
- case rule.Prefix.set:
- rulePrefix = rule.Prefix.val
- case !rule.Expiration.Date.IsZero() || rule.Transition.Days > 0 || !rule.Transition.Date.IsZero():
- s3err.WriteErrorResponse(w, r, s3err.ErrNotImplemented)
- return
- }
- if rule.Expiration.Days == 0 {
- continue
- }
- locConf := &filer_pb.FilerConf_PathConf{
- LocationPrefix: fmt.Sprintf("%s/%s/%s", s3a.option.BucketsPath, bucket, rulePrefix),
- Collection: collectionName,
- Ttl: fmt.Sprintf("%dd", rule.Expiration.Days),
- }
- if ttl, ok := collectionTtls[locConf.LocationPrefix]; ok && ttl == locConf.Ttl {
- continue
- }
- if err := fc.AddLocationConf(locConf); err != nil {
- glog.Errorf("PutBucketLifecycleConfigurationHandler add location config: %s", err)
- s3err.WriteErrorResponse(w, r, s3err.ErrInternalError)
- return
- }
- changed = true
- }
- if changed {
- var buf bytes.Buffer
- if err := fc.ToText(&buf); err != nil {
- glog.Errorf("PutBucketLifecycleConfigurationHandler save config to text: %s", err)
- s3err.WriteErrorResponse(w, r, s3err.ErrInternalError)
- }
- if err := s3a.WithFilerClient(false, func(client filer_pb.SeaweedFilerClient) error {
- return filer.SaveInsideFiler(client, filer.DirectoryEtcSeaweedFS, filer.FilerConfName, buf.Bytes())
- }); err != nil {
- glog.Errorf("PutBucketLifecycleConfigurationHandler save config inside filer: %s", err)
- s3err.WriteErrorResponse(w, r, s3err.ErrInternalError)
- return
- }
- }
- writeSuccessResponseEmpty(w, r)
- }
- // DeleteBucketLifecycleHandler Delete Bucket Lifecycle
- // https://docs.aws.amazon.com/AmazonS3/latest/API/API_DeleteBucketLifecycle.html
- func (s3a *S3ApiServer) DeleteBucketLifecycleHandler(w http.ResponseWriter, r *http.Request) {
- // collect parameters
- bucket, _ := s3_constants.GetBucketAndObject(r)
- glog.V(3).Infof("DeleteBucketLifecycleHandler %s", bucket)
- if err := s3a.checkBucket(r, bucket); err != s3err.ErrNone {
- s3err.WriteErrorResponse(w, r, err)
- return
- }
- fc, err := filer.ReadFilerConf(s3a.option.Filer, s3a.option.GrpcDialOption, nil)
- if err != nil {
- glog.Errorf("DeleteBucketLifecycleHandler read filer config: %s", err)
- s3err.WriteErrorResponse(w, r, s3err.ErrInternalError)
- return
- }
- collectionTtls := fc.GetCollectionTtls(s3a.getCollectionName(bucket))
- changed := false
- for prefix, ttl := range collectionTtls {
- bucketPrefix := fmt.Sprintf("%s/%s/", s3a.option.BucketsPath, bucket)
- if strings.HasPrefix(prefix, bucketPrefix) && strings.HasSuffix(ttl, "d") {
- pathConf, found := fc.GetLocationConf(prefix)
- if found {
- pathConf.Ttl = ""
- fc.SetLocationConf(pathConf)
- }
- changed = true
- }
- }
- if changed {
- var buf bytes.Buffer
- if err := fc.ToText(&buf); err != nil {
- glog.Errorf("DeleteBucketLifecycleHandler save config to text: %s", err)
- s3err.WriteErrorResponse(w, r, s3err.ErrInternalError)
- }
- if err := s3a.WithFilerClient(false, func(client filer_pb.SeaweedFilerClient) error {
- return filer.SaveInsideFiler(client, filer.DirectoryEtcSeaweedFS, filer.FilerConfName, buf.Bytes())
- }); err != nil {
- glog.Errorf("DeleteBucketLifecycleHandler save config inside filer: %s", err)
- s3err.WriteErrorResponse(w, r, s3err.ErrInternalError)
- return
- }
- }
- s3err.WriteEmptyResponse(w, r, http.StatusNoContent)
- }
- // GetBucketLocationHandler Get bucket location
- // https://docs.aws.amazon.com/AmazonS3/latest/API/API_GetBucketLocation.html
- func (s3a *S3ApiServer) GetBucketLocationHandler(w http.ResponseWriter, r *http.Request) {
- bucket, _ := s3_constants.GetBucketAndObject(r)
- if err := s3a.checkBucket(r, bucket); err != s3err.ErrNone {
- s3err.WriteErrorResponse(w, r, err)
- return
- }
- writeSuccessResponseXML(w, r, CreateBucketConfiguration{})
- }
- // GetBucketRequestPaymentHandler Get bucket location
- // https://docs.aws.amazon.com/AmazonS3/latest/API/API_GetBucketRequestPayment.html
- func (s3a *S3ApiServer) GetBucketRequestPaymentHandler(w http.ResponseWriter, r *http.Request) {
- writeSuccessResponseXML(w, r, RequestPaymentConfiguration{Payer: "BucketOwner"})
- }
- // PutBucketOwnershipControls https://docs.aws.amazon.com/AmazonS3/latest/API/API_PutBucketOwnershipControls.html
- func (s3a *S3ApiServer) PutBucketOwnershipControls(w http.ResponseWriter, r *http.Request) {
- bucket, _ := s3_constants.GetBucketAndObject(r)
- glog.V(3).Infof("PutBucketOwnershipControls %s", bucket)
- errCode := s3a.checkAccessByOwnership(r, bucket)
- if errCode != s3err.ErrNone {
- s3err.WriteErrorResponse(w, r, errCode)
- return
- }
- if r.Body == nil || r.Body == http.NoBody {
- s3err.WriteErrorResponse(w, r, s3err.ErrInvalidRequest)
- return
- }
- var v s3.OwnershipControls
- defer util_http.CloseRequest(r)
- err := xmlutil.UnmarshalXML(&v, xml.NewDecoder(r.Body), "")
- if err != nil {
- s3err.WriteErrorResponse(w, r, s3err.ErrInvalidRequest)
- return
- }
- if len(v.Rules) != 1 {
- s3err.WriteErrorResponse(w, r, s3err.ErrInvalidRequest)
- return
- }
- printOwnership := true
- ownership := *v.Rules[0].ObjectOwnership
- switch ownership {
- case s3_constants.OwnershipObjectWriter:
- case s3_constants.OwnershipBucketOwnerPreferred:
- case s3_constants.OwnershipBucketOwnerEnforced:
- printOwnership = false
- default:
- s3err.WriteErrorResponse(w, r, s3err.ErrInvalidRequest)
- return
- }
- // Check if ownership needs to be updated
- currentOwnership, errCode := s3a.getBucketOwnership(bucket)
- if errCode != s3err.ErrNone {
- s3err.WriteErrorResponse(w, r, errCode)
- return
- }
- if currentOwnership != ownership {
- errCode = s3a.setBucketOwnership(bucket, ownership)
- if errCode != s3err.ErrNone {
- s3err.WriteErrorResponse(w, r, errCode)
- return
- }
- }
- if printOwnership {
- result := &s3.PutBucketOwnershipControlsInput{
- OwnershipControls: &v,
- }
- s3err.WriteAwsXMLResponse(w, r, http.StatusOK, result)
- } else {
- writeSuccessResponseEmpty(w, r)
- }
- }
- // GetBucketOwnershipControls https://docs.aws.amazon.com/AmazonS3/latest/API/API_GetBucketOwnershipControls.html
- func (s3a *S3ApiServer) GetBucketOwnershipControls(w http.ResponseWriter, r *http.Request) {
- bucket, _ := s3_constants.GetBucketAndObject(r)
- glog.V(3).Infof("GetBucketOwnershipControls %s", bucket)
- errCode := s3a.checkAccessByOwnership(r, bucket)
- if errCode != s3err.ErrNone {
- s3err.WriteErrorResponse(w, r, errCode)
- return
- }
- // Get ownership using new bucket config system
- ownership, errCode := s3a.getBucketOwnership(bucket)
- if errCode == s3err.ErrNoSuchBucket {
- s3err.WriteErrorResponse(w, r, s3err.ErrNoSuchBucket)
- return
- } else if errCode != s3err.ErrNone {
- s3err.WriteErrorResponse(w, r, s3err.OwnershipControlsNotFoundError)
- return
- }
- result := &s3.PutBucketOwnershipControlsInput{
- OwnershipControls: &s3.OwnershipControls{
- Rules: []*s3.OwnershipControlsRule{
- {
- ObjectOwnership: &ownership,
- },
- },
- },
- }
- s3err.WriteAwsXMLResponse(w, r, http.StatusOK, result)
- }
- // DeleteBucketOwnershipControls https://docs.aws.amazon.com/AmazonS3/latest/API/API_DeleteBucketOwnershipControls.html
- func (s3a *S3ApiServer) DeleteBucketOwnershipControls(w http.ResponseWriter, r *http.Request) {
- bucket, _ := s3_constants.GetBucketAndObject(r)
- glog.V(3).Infof("PutBucketOwnershipControls %s", bucket)
- errCode := s3a.checkAccessByOwnership(r, bucket)
- if errCode != s3err.ErrNone {
- s3err.WriteErrorResponse(w, r, errCode)
- return
- }
- bucketEntry, err := s3a.getEntry(s3a.option.BucketsPath, bucket)
- if err != nil {
- if errors.Is(err, filer_pb.ErrNotFound) {
- s3err.WriteErrorResponse(w, r, s3err.ErrNoSuchBucket)
- return
- }
- s3err.WriteErrorResponse(w, r, s3err.ErrInternalError)
- return
- }
- _, ok := bucketEntry.Extended[s3_constants.ExtOwnershipKey]
- if !ok {
- s3err.WriteErrorResponse(w, r, s3err.OwnershipControlsNotFoundError)
- return
- }
- delete(bucketEntry.Extended, s3_constants.ExtOwnershipKey)
- err = s3a.updateEntry(s3a.option.BucketsPath, bucketEntry)
- if err != nil {
- s3err.WriteErrorResponse(w, r, s3err.ErrInternalError)
- return
- }
- emptyOwnershipControls := &s3.OwnershipControls{
- Rules: []*s3.OwnershipControlsRule{},
- }
- s3err.WriteAwsXMLResponse(w, r, http.StatusOK, emptyOwnershipControls)
- }
- // GetBucketVersioningHandler Get Bucket Versioning status
- // https://docs.aws.amazon.com/AmazonS3/latest/API/API_GetBucketVersioning.html
- func (s3a *S3ApiServer) GetBucketVersioningHandler(w http.ResponseWriter, r *http.Request) {
- bucket, _ := s3_constants.GetBucketAndObject(r)
- glog.V(3).Infof("GetBucketVersioning %s", bucket)
- if err := s3a.checkBucket(r, bucket); err != s3err.ErrNone {
- s3err.WriteErrorResponse(w, r, err)
- return
- }
- // Get versioning status using new bucket config system
- versioningStatus, errCode := s3a.getBucketVersioningStatus(bucket)
- if errCode != s3err.ErrNone {
- s3err.WriteErrorResponse(w, r, errCode)
- return
- }
- // AWS S3 behavior: If versioning was never configured, don't return Status field
- var response *s3.PutBucketVersioningInput
- if versioningStatus == "" {
- // No versioning configuration - return empty response (no Status field)
- response = &s3.PutBucketVersioningInput{
- VersioningConfiguration: &s3.VersioningConfiguration{},
- }
- } else {
- // Versioning was explicitly configured - return the status
- response = &s3.PutBucketVersioningInput{
- VersioningConfiguration: &s3.VersioningConfiguration{
- Status: aws.String(versioningStatus),
- },
- }
- }
- s3err.WriteAwsXMLResponse(w, r, http.StatusOK, response)
- }
- // PutBucketVersioningHandler Put bucket Versioning
- // https://docs.aws.amazon.com/AmazonS3/latest/API/API_PutBucketVersioning.html
- func (s3a *S3ApiServer) PutBucketVersioningHandler(w http.ResponseWriter, r *http.Request) {
- bucket, _ := s3_constants.GetBucketAndObject(r)
- glog.V(3).Infof("PutBucketVersioning %s", bucket)
- if err := s3a.checkBucket(r, bucket); err != s3err.ErrNone {
- s3err.WriteErrorResponse(w, r, err)
- return
- }
- if r.Body == nil || r.Body == http.NoBody {
- s3err.WriteErrorResponse(w, r, s3err.ErrInvalidRequest)
- return
- }
- var versioningConfig s3.VersioningConfiguration
- defer util_http.CloseRequest(r)
- err := xmlutil.UnmarshalXML(&versioningConfig, xml.NewDecoder(r.Body), "")
- if err != nil {
- glog.Warningf("PutBucketVersioningHandler xml decode: %s", err)
- s3err.WriteErrorResponse(w, r, s3err.ErrMalformedXML)
- return
- }
- if versioningConfig.Status == nil {
- s3err.WriteErrorResponse(w, r, s3err.ErrInvalidRequest)
- return
- }
- status := *versioningConfig.Status
- if status != s3_constants.VersioningEnabled && status != s3_constants.VersioningSuspended {
- s3err.WriteErrorResponse(w, r, s3err.ErrInvalidRequest)
- return
- }
- // Check if trying to suspend versioning on a bucket with object lock enabled
- if status == s3_constants.VersioningSuspended {
- // Get bucket configuration to check for object lock
- bucketConfig, errCode := s3a.getBucketConfig(bucket)
- if errCode == s3err.ErrNone && bucketConfig.ObjectLockConfig != nil {
- // Object lock is enabled, cannot suspend versioning
- s3err.WriteErrorResponse(w, r, s3err.ErrInvalidBucketState)
- return
- }
- }
- // Update bucket versioning configuration using new bucket config system
- if errCode := s3a.setBucketVersioningStatus(bucket, status); errCode != s3err.ErrNone {
- glog.Errorf("PutBucketVersioningHandler save config: %d", errCode)
- s3err.WriteErrorResponse(w, r, errCode)
- return
- }
- writeSuccessResponseEmpty(w, r)
- }
|