| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675 |
- package s3api
- import (
- "encoding/xml"
- "errors"
- "fmt"
- "net/http"
- "strconv"
- "strings"
- "time"
- "github.com/seaweedfs/seaweedfs/weed/glog"
- "github.com/seaweedfs/seaweedfs/weed/pb/filer_pb"
- "github.com/seaweedfs/seaweedfs/weed/s3api/s3_constants"
- "github.com/seaweedfs/seaweedfs/weed/s3api/s3err"
- )
- // ====================================================================
- // ERROR DEFINITIONS
- // ====================================================================
- // Sentinel errors for proper error handling instead of string matching
- var (
- ErrNoRetentionConfiguration = errors.New("no retention configuration found")
- ErrNoLegalHoldConfiguration = errors.New("no legal hold configuration found")
- ErrBucketNotFound = errors.New("bucket not found")
- ErrObjectNotFound = errors.New("object not found")
- ErrVersionNotFound = errors.New("version not found")
- ErrLatestVersionNotFound = errors.New("latest version not found")
- ErrComplianceModeActive = errors.New("object is under COMPLIANCE mode retention and cannot be deleted or modified")
- ErrGovernanceModeActive = errors.New("object is under GOVERNANCE mode retention and cannot be deleted or modified without bypass")
- )
- // Error definitions for Object Lock
- var (
- ErrObjectUnderLegalHold = errors.New("object is under legal hold and cannot be deleted or modified")
- ErrGovernanceBypassNotPermitted = errors.New("user does not have permission to bypass governance retention")
- ErrInvalidRetentionPeriod = errors.New("invalid retention period specified")
- ErrBothDaysAndYearsSpecified = errors.New("both days and years cannot be specified in the same retention configuration")
- ErrMalformedXML = errors.New("malformed XML in request body")
- // Validation error constants with specific messages for tests
- ErrRetentionMissingMode = errors.New("retention configuration must specify Mode")
- ErrRetentionMissingRetainUntilDate = errors.New("retention configuration must specify RetainUntilDate")
- ErrInvalidRetentionModeValue = errors.New("invalid retention mode")
- )
- const (
- // Maximum retention period limits according to AWS S3 specifications
- MaxRetentionDays = 36500 // Maximum number of days for object retention (100 years)
- MaxRetentionYears = 100 // Maximum number of years for object retention
- )
- // ====================================================================
- // DATA STRUCTURES
- // ====================================================================
- // ObjectRetention represents S3 Object Retention configuration
- type ObjectRetention struct {
- XMLName xml.Name `xml:"http://s3.amazonaws.com/doc/2006-03-01/ Retention"`
- Mode string `xml:"http://s3.amazonaws.com/doc/2006-03-01/ Mode,omitempty"`
- RetainUntilDate *time.Time `xml:"http://s3.amazonaws.com/doc/2006-03-01/ RetainUntilDate,omitempty"`
- }
- // ObjectLegalHold represents S3 Object Legal Hold configuration
- type ObjectLegalHold struct {
- XMLName xml.Name `xml:"http://s3.amazonaws.com/doc/2006-03-01/ LegalHold"`
- Status string `xml:"http://s3.amazonaws.com/doc/2006-03-01/ Status,omitempty"`
- }
- // ObjectLockConfiguration represents S3 Object Lock Configuration
- type ObjectLockConfiguration struct {
- XMLName xml.Name `xml:"http://s3.amazonaws.com/doc/2006-03-01/ ObjectLockConfiguration"`
- ObjectLockEnabled string `xml:"http://s3.amazonaws.com/doc/2006-03-01/ ObjectLockEnabled,omitempty"`
- Rule *ObjectLockRule `xml:"http://s3.amazonaws.com/doc/2006-03-01/ Rule,omitempty"`
- }
- // ObjectLockRule represents an Object Lock Rule
- type ObjectLockRule struct {
- XMLName xml.Name `xml:"http://s3.amazonaws.com/doc/2006-03-01/ Rule"`
- DefaultRetention *DefaultRetention `xml:"http://s3.amazonaws.com/doc/2006-03-01/ DefaultRetention,omitempty"`
- }
- // DefaultRetention represents default retention settings
- // Implements custom XML unmarshal to track if Days/Years were present in XML
- type DefaultRetention struct {
- XMLName xml.Name `xml:"http://s3.amazonaws.com/doc/2006-03-01/ DefaultRetention"`
- Mode string `xml:"http://s3.amazonaws.com/doc/2006-03-01/ Mode,omitempty"`
- Days int `xml:"http://s3.amazonaws.com/doc/2006-03-01/ Days,omitempty"`
- Years int `xml:"http://s3.amazonaws.com/doc/2006-03-01/ Years,omitempty"`
- DaysSet bool `xml:"-"`
- YearsSet bool `xml:"-"`
- }
- // ====================================================================
- // XML PARSING
- // ====================================================================
- // UnmarshalXML implements custom XML unmarshaling for DefaultRetention
- // to track whether Days/Years fields were explicitly present in the XML
- func (dr *DefaultRetention) UnmarshalXML(d *xml.Decoder, start xml.StartElement) error {
- type Alias DefaultRetention
- aux := &struct {
- *Alias
- Days *int `xml:"http://s3.amazonaws.com/doc/2006-03-01/ Days,omitempty"`
- Years *int `xml:"http://s3.amazonaws.com/doc/2006-03-01/ Years,omitempty"`
- }{Alias: (*Alias)(dr)}
- if err := d.DecodeElement(aux, &start); err != nil {
- glog.V(2).Infof("DefaultRetention.UnmarshalXML: decode error: %v", err)
- return err
- }
- if aux.Days != nil {
- dr.Days = *aux.Days
- dr.DaysSet = true
- glog.V(4).Infof("DefaultRetention.UnmarshalXML: Days present, value=%d", dr.Days)
- } else {
- glog.V(4).Infof("DefaultRetention.UnmarshalXML: Days not present")
- }
- if aux.Years != nil {
- dr.Years = *aux.Years
- dr.YearsSet = true
- glog.V(4).Infof("DefaultRetention.UnmarshalXML: Years present, value=%d", dr.Years)
- } else {
- glog.V(4).Infof("DefaultRetention.UnmarshalXML: Years not present")
- }
- return nil
- }
- // parseXML is a generic helper function to parse XML from an HTTP request body.
- // It uses xml.Decoder for streaming XML parsing, which is more memory-efficient
- // and avoids loading the entire request body into memory.
- //
- // The function assumes:
- // - The request body is not nil (returns error if it is)
- // - The request body will be closed after parsing (deferred close)
- // - The XML content matches the structure of the provided result type T
- //
- // This approach is optimized for small XML payloads typical in S3 API requests
- // (retention configurations, legal hold settings, etc.) where the overhead of
- // streaming parsing is acceptable for the memory efficiency benefits.
- func parseXML[T any](request *http.Request, result *T) error {
- if request.Body == nil {
- return fmt.Errorf("error parsing XML: empty request body")
- }
- defer request.Body.Close()
- decoder := xml.NewDecoder(request.Body)
- if err := decoder.Decode(result); err != nil {
- return fmt.Errorf("error parsing XML: %w", err)
- }
- return nil
- }
- // parseObjectRetention parses XML retention configuration from request body
- func parseObjectRetention(request *http.Request) (*ObjectRetention, error) {
- var retention ObjectRetention
- if err := parseXML(request, &retention); err != nil {
- return nil, err
- }
- return &retention, nil
- }
- // parseObjectLegalHold parses XML legal hold configuration from request body
- func parseObjectLegalHold(request *http.Request) (*ObjectLegalHold, error) {
- var legalHold ObjectLegalHold
- if err := parseXML(request, &legalHold); err != nil {
- return nil, err
- }
- return &legalHold, nil
- }
- // parseObjectLockConfiguration parses XML object lock configuration from request body
- func parseObjectLockConfiguration(request *http.Request) (*ObjectLockConfiguration, error) {
- var config ObjectLockConfiguration
- if err := parseXML(request, &config); err != nil {
- return nil, err
- }
- return &config, nil
- }
- // ====================================================================
- // OBJECT ENTRY OPERATIONS
- // ====================================================================
- // getObjectEntry retrieves the appropriate object entry based on versioning and versionId
- func (s3a *S3ApiServer) getObjectEntry(bucket, object, versionId string) (*filer_pb.Entry, error) {
- var entry *filer_pb.Entry
- var err error
- if versionId != "" {
- entry, err = s3a.getSpecificObjectVersion(bucket, object, versionId)
- } else {
- // Check if versioning is enabled
- versioningEnabled, vErr := s3a.isVersioningEnabled(bucket)
- if vErr != nil {
- return nil, fmt.Errorf("error checking versioning: %w", vErr)
- }
- if versioningEnabled {
- entry, err = s3a.getLatestObjectVersion(bucket, object)
- } else {
- bucketDir := s3a.option.BucketsPath + "/" + bucket
- entry, err = s3a.getEntry(bucketDir, object)
- }
- }
- if err != nil {
- return nil, fmt.Errorf("failed to retrieve object %s/%s: %w", bucket, object, ErrObjectNotFound)
- }
- return entry, nil
- }
- // ====================================================================
- // RETENTION OPERATIONS
- // ====================================================================
- // getObjectRetention retrieves object retention configuration
- func (s3a *S3ApiServer) getObjectRetention(bucket, object, versionId string) (*ObjectRetention, error) {
- entry, err := s3a.getObjectEntry(bucket, object, versionId)
- if err != nil {
- return nil, err
- }
- if entry.Extended == nil {
- return nil, ErrNoRetentionConfiguration
- }
- retention := &ObjectRetention{}
- if modeBytes, exists := entry.Extended[s3_constants.ExtObjectLockModeKey]; exists {
- retention.Mode = string(modeBytes)
- }
- if dateBytes, exists := entry.Extended[s3_constants.ExtRetentionUntilDateKey]; exists {
- if timestamp, err := strconv.ParseInt(string(dateBytes), 10, 64); err == nil {
- t := time.Unix(timestamp, 0)
- retention.RetainUntilDate = &t
- } else {
- return nil, fmt.Errorf("failed to parse retention timestamp for %s/%s: corrupted timestamp data", bucket, object)
- }
- }
- if retention.Mode == "" || retention.RetainUntilDate == nil {
- return nil, ErrNoRetentionConfiguration
- }
- return retention, nil
- }
- // setObjectRetention sets object retention configuration
- func (s3a *S3ApiServer) setObjectRetention(bucket, object, versionId string, retention *ObjectRetention, bypassGovernance bool) error {
- var entry *filer_pb.Entry
- var err error
- var entryPath string
- if versionId != "" {
- entry, err = s3a.getSpecificObjectVersion(bucket, object, versionId)
- if err != nil {
- return fmt.Errorf("failed to get version %s for object %s/%s: %w", versionId, bucket, object, ErrVersionNotFound)
- }
- entryPath = object + ".versions/" + s3a.getVersionFileName(versionId)
- } else {
- // Check if versioning is enabled
- versioningEnabled, vErr := s3a.isVersioningEnabled(bucket)
- if vErr != nil {
- return fmt.Errorf("error checking versioning: %w", vErr)
- }
- if versioningEnabled {
- entry, err = s3a.getLatestObjectVersion(bucket, object)
- if err != nil {
- return fmt.Errorf("failed to get latest version for object %s/%s: %w", bucket, object, ErrLatestVersionNotFound)
- }
- // Extract version ID from entry metadata
- if entry.Extended != nil {
- if versionIdBytes, exists := entry.Extended[s3_constants.ExtVersionIdKey]; exists {
- versionId = string(versionIdBytes)
- entryPath = object + ".versions/" + s3a.getVersionFileName(versionId)
- }
- }
- } else {
- bucketDir := s3a.option.BucketsPath + "/" + bucket
- entry, err = s3a.getEntry(bucketDir, object)
- if err != nil {
- return fmt.Errorf("failed to get object %s/%s: %w", bucket, object, ErrObjectNotFound)
- }
- entryPath = object
- }
- }
- // Check if object is already under retention
- if entry.Extended != nil {
- if existingMode, exists := entry.Extended[s3_constants.ExtObjectLockModeKey]; exists {
- // Check if attempting to change retention mode
- if retention.Mode != "" && string(existingMode) != retention.Mode {
- // Attempting to change retention mode
- if string(existingMode) == s3_constants.RetentionModeCompliance {
- // Cannot change compliance mode retention without bypass
- return ErrComplianceModeActive
- }
- if string(existingMode) == s3_constants.RetentionModeGovernance && !bypassGovernance {
- // Cannot change governance mode retention without bypass
- return ErrGovernanceModeActive
- }
- }
- if existingDateBytes, dateExists := entry.Extended[s3_constants.ExtRetentionUntilDateKey]; dateExists {
- if timestamp, err := strconv.ParseInt(string(existingDateBytes), 10, 64); err == nil {
- existingDate := time.Unix(timestamp, 0)
- // Check if the new retention date is earlier than the existing one
- if retention.RetainUntilDate != nil && retention.RetainUntilDate.Before(existingDate) {
- // Attempting to decrease retention period
- if string(existingMode) == s3_constants.RetentionModeCompliance {
- // Cannot decrease compliance mode retention without bypass
- return ErrComplianceModeActive
- }
- if string(existingMode) == s3_constants.RetentionModeGovernance && !bypassGovernance {
- // Cannot decrease governance mode retention without bypass
- return ErrGovernanceModeActive
- }
- }
- // If new retention date is later or same, allow the operation
- // This covers both increasing retention period and overriding with same/later date
- }
- }
- }
- }
- // Update retention metadata
- if entry.Extended == nil {
- entry.Extended = make(map[string][]byte)
- }
- if retention.Mode != "" {
- entry.Extended[s3_constants.ExtObjectLockModeKey] = []byte(retention.Mode)
- }
- if retention.RetainUntilDate != nil {
- entry.Extended[s3_constants.ExtRetentionUntilDateKey] = []byte(strconv.FormatInt(retention.RetainUntilDate.Unix(), 10))
- // Also update the existing WORM fields for compatibility
- entry.WormEnforcedAtTsNs = time.Now().UnixNano()
- }
- // Update the entry
- // NOTE: Potential race condition exists if concurrent calls to PutObjectRetention
- // and PutObjectLegalHold update the same object simultaneously, as they might
- // overwrite each other's Extended map changes. This is mitigated by the fact
- // that mkFile operations are typically serialized at the filer level, but
- // future implementations might consider using atomic update operations or
- // entry-level locking for complete safety.
- bucketDir := s3a.option.BucketsPath + "/" + bucket
- return s3a.mkFile(bucketDir, entryPath, entry.Chunks, func(updatedEntry *filer_pb.Entry) {
- updatedEntry.Extended = entry.Extended
- updatedEntry.WormEnforcedAtTsNs = entry.WormEnforcedAtTsNs
- })
- }
- // ====================================================================
- // LEGAL HOLD OPERATIONS
- // ====================================================================
- // getObjectLegalHold retrieves object legal hold configuration
- func (s3a *S3ApiServer) getObjectLegalHold(bucket, object, versionId string) (*ObjectLegalHold, error) {
- entry, err := s3a.getObjectEntry(bucket, object, versionId)
- if err != nil {
- return nil, err
- }
- if entry.Extended == nil {
- return nil, ErrNoLegalHoldConfiguration
- }
- legalHold := &ObjectLegalHold{}
- if statusBytes, exists := entry.Extended[s3_constants.ExtLegalHoldKey]; exists {
- legalHold.Status = string(statusBytes)
- } else {
- return nil, ErrNoLegalHoldConfiguration
- }
- return legalHold, nil
- }
- // setObjectLegalHold sets object legal hold configuration
- func (s3a *S3ApiServer) setObjectLegalHold(bucket, object, versionId string, legalHold *ObjectLegalHold) error {
- var entry *filer_pb.Entry
- var err error
- var entryPath string
- if versionId != "" {
- entry, err = s3a.getSpecificObjectVersion(bucket, object, versionId)
- if err != nil {
- return fmt.Errorf("failed to get version %s for object %s/%s: %w", versionId, bucket, object, ErrVersionNotFound)
- }
- entryPath = object + ".versions/" + s3a.getVersionFileName(versionId)
- } else {
- // Check if versioning is enabled
- versioningEnabled, vErr := s3a.isVersioningEnabled(bucket)
- if vErr != nil {
- return fmt.Errorf("error checking versioning: %w", vErr)
- }
- if versioningEnabled {
- entry, err = s3a.getLatestObjectVersion(bucket, object)
- if err != nil {
- return fmt.Errorf("failed to get latest version for object %s/%s: %w", bucket, object, ErrLatestVersionNotFound)
- }
- // Extract version ID from entry metadata
- if entry.Extended != nil {
- if versionIdBytes, exists := entry.Extended[s3_constants.ExtVersionIdKey]; exists {
- versionId = string(versionIdBytes)
- entryPath = object + ".versions/" + s3a.getVersionFileName(versionId)
- }
- }
- } else {
- bucketDir := s3a.option.BucketsPath + "/" + bucket
- entry, err = s3a.getEntry(bucketDir, object)
- if err != nil {
- return fmt.Errorf("failed to get object %s/%s: %w", bucket, object, ErrObjectNotFound)
- }
- entryPath = object
- }
- }
- // Update legal hold metadata
- if entry.Extended == nil {
- entry.Extended = make(map[string][]byte)
- }
- entry.Extended[s3_constants.ExtLegalHoldKey] = []byte(legalHold.Status)
- // Update the entry
- // NOTE: Potential race condition exists if concurrent calls to PutObjectRetention
- // and PutObjectLegalHold update the same object simultaneously, as they might
- // overwrite each other's Extended map changes. This is mitigated by the fact
- // that mkFile operations are typically serialized at the filer level, but
- // future implementations might consider using atomic update operations or
- // entry-level locking for complete safety.
- bucketDir := s3a.option.BucketsPath + "/" + bucket
- return s3a.mkFile(bucketDir, entryPath, entry.Chunks, func(updatedEntry *filer_pb.Entry) {
- updatedEntry.Extended = entry.Extended
- })
- }
- // ====================================================================
- // PROTECTION ENFORCEMENT
- // ====================================================================
- // isObjectRetentionActive checks if object has active retention
- func (s3a *S3ApiServer) isObjectRetentionActive(bucket, object, versionId string) (bool, error) {
- retention, err := s3a.getObjectRetention(bucket, object, versionId)
- if err != nil {
- // If no retention found, object is not under retention
- if errors.Is(err, ErrNoRetentionConfiguration) {
- return false, nil
- }
- return false, err
- }
- if retention.RetainUntilDate != nil && retention.RetainUntilDate.After(time.Now()) {
- return true, nil
- }
- return false, nil
- }
- // getRetentionFromEntry extracts retention configuration from filer entry
- func (s3a *S3ApiServer) getRetentionFromEntry(entry *filer_pb.Entry) (*ObjectRetention, bool, error) {
- if entry.Extended == nil {
- return nil, false, nil
- }
- retention := &ObjectRetention{}
- if modeBytes, exists := entry.Extended[s3_constants.ExtObjectLockModeKey]; exists {
- retention.Mode = string(modeBytes)
- }
- if dateBytes, exists := entry.Extended[s3_constants.ExtRetentionUntilDateKey]; exists {
- if timestamp, err := strconv.ParseInt(string(dateBytes), 10, 64); err == nil {
- t := time.Unix(timestamp, 0)
- retention.RetainUntilDate = &t
- } else {
- return nil, false, fmt.Errorf("failed to parse retention timestamp: corrupted timestamp data")
- }
- }
- if retention.Mode == "" || retention.RetainUntilDate == nil {
- return nil, false, nil
- }
- // Check if retention is currently active
- isActive := retention.RetainUntilDate.After(time.Now())
- return retention, isActive, nil
- }
- // getLegalHoldFromEntry extracts legal hold configuration from filer entry
- func (s3a *S3ApiServer) getLegalHoldFromEntry(entry *filer_pb.Entry) (*ObjectLegalHold, bool, error) {
- if entry.Extended == nil {
- return nil, false, nil
- }
- legalHold := &ObjectLegalHold{}
- if statusBytes, exists := entry.Extended[s3_constants.ExtLegalHoldKey]; exists {
- legalHold.Status = string(statusBytes)
- } else {
- return nil, false, nil
- }
- isActive := legalHold.Status == s3_constants.LegalHoldOn
- return legalHold, isActive, nil
- }
- // ====================================================================
- // GOVERNANCE BYPASS
- // ====================================================================
- // checkGovernanceBypassPermission checks if user has permission to bypass governance retention
- func (s3a *S3ApiServer) checkGovernanceBypassPermission(request *http.Request, bucket, object string) bool {
- // Use the existing IAM auth system to check the specific permission
- // Create the governance bypass action with proper bucket/object concatenation
- // Note: path.Join would drop bucket if object has leading slash, so use explicit formatting
- resource := fmt.Sprintf("%s/%s", bucket, strings.TrimPrefix(object, "/"))
- action := Action(fmt.Sprintf("%s:%s", s3_constants.ACTION_BYPASS_GOVERNANCE_RETENTION, resource))
- // Use the IAM system to authenticate and authorize this specific action
- identity, errCode := s3a.iam.authRequest(request, action)
- if errCode != s3err.ErrNone {
- glog.V(3).Infof("IAM auth failed for governance bypass: %v", errCode)
- return false
- }
- // Verify that the authenticated identity can perform this action
- if identity != nil && identity.canDo(action, bucket, object) {
- return true
- }
- // Additional check: allow users with Admin action to bypass governance retention
- // Use the proper S3 Admin action constant instead of generic isAdmin() method
- adminAction := Action(fmt.Sprintf("%s:%s", s3_constants.ACTION_ADMIN, resource))
- if identity != nil && identity.canDo(adminAction, bucket, object) {
- glog.V(2).Infof("Admin user %s granted governance bypass permission for %s/%s", identity.Name, bucket, object)
- return true
- }
- return false
- }
- // evaluateGovernanceBypassRequest evaluates if governance bypass is requested and permitted
- func (s3a *S3ApiServer) evaluateGovernanceBypassRequest(r *http.Request, bucket, object string) bool {
- // Step 1: Check if governance bypass was requested via header
- bypassRequested := r.Header.Get("x-amz-bypass-governance-retention") == "true"
- if !bypassRequested {
- // No bypass requested - normal retention enforcement applies
- return false
- }
- // Step 2: Validate user has permission to bypass governance retention
- hasPermission := s3a.checkGovernanceBypassPermission(r, bucket, object)
- if !hasPermission {
- glog.V(2).Infof("Governance bypass denied for %s/%s: user lacks s3:BypassGovernanceRetention permission", bucket, object)
- return false
- }
- glog.V(2).Infof("Governance bypass granted for %s/%s: header present and user has permission", bucket, object)
- return true
- }
- // enforceObjectLockProtections enforces object lock protections for operations
- func (s3a *S3ApiServer) enforceObjectLockProtections(request *http.Request, bucket, object, versionId string, governanceBypassAllowed bool) error {
- // Get the object entry to check both retention and legal hold
- // For delete operations without versionId, we need to check the latest version
- var entry *filer_pb.Entry
- var err error
- if versionId != "" {
- // Check specific version
- entry, err = s3a.getObjectEntry(bucket, object, versionId)
- } else {
- // Check latest version for delete marker creation
- entry, err = s3a.getObjectEntry(bucket, object, "")
- }
- if err != nil {
- // If object doesn't exist, it's not under retention or legal hold - this is expected during delete operations
- if errors.Is(err, filer_pb.ErrNotFound) || errors.Is(err, ErrObjectNotFound) || errors.Is(err, ErrVersionNotFound) || errors.Is(err, ErrLatestVersionNotFound) {
- // Object doesn't exist, so it can't be under retention or legal hold - this is normal
- glog.V(4).Infof("Object %s/%s (versionId: %s) not found during object lock check (expected during delete operations)", bucket, object, versionId)
- return nil
- }
- glog.Warningf("Error retrieving object %s/%s (versionId: %s) for lock check: %v", bucket, object, versionId, err)
- return err
- }
- // Extract retention information from the entry
- retention, retentionActive, err := s3a.getRetentionFromEntry(entry)
- if err != nil {
- glog.Warningf("Error parsing retention for %s/%s (versionId: %s): %v", bucket, object, versionId, err)
- // Continue with legal hold check even if retention parsing fails
- }
- // Extract legal hold information from the entry
- _, legalHoldActive, err := s3a.getLegalHoldFromEntry(entry)
- if err != nil {
- glog.Warningf("Error parsing legal hold for %s/%s (versionId: %s): %v", bucket, object, versionId, err)
- // Continue with retention check even if legal hold parsing fails
- }
- // If object is under legal hold, it cannot be deleted or modified (including delete marker creation)
- if legalHoldActive {
- return ErrObjectUnderLegalHold
- }
- // If object is under retention, check the mode
- if retentionActive && retention != nil {
- if retention.Mode == s3_constants.RetentionModeCompliance {
- return ErrComplianceModeActive
- }
- if retention.Mode == s3_constants.RetentionModeGovernance {
- if !governanceBypassAllowed {
- return ErrGovernanceModeActive
- }
- // Note: governanceBypassAllowed parameter is already validated by evaluateGovernanceBypassRequest()
- // which checks both header presence and IAM permissions, so we trust it here
- }
- }
- return nil
- }
- // ====================================================================
- // AVAILABILITY CHECKS
- // ====================================================================
- // isObjectLockAvailable checks if object lock is available for the bucket
- func (s3a *S3ApiServer) isObjectLockAvailable(bucket string) error {
- versioningEnabled, err := s3a.isVersioningEnabled(bucket)
- if err != nil {
- if errors.Is(err, filer_pb.ErrNotFound) {
- return ErrBucketNotFound
- }
- return fmt.Errorf("error checking versioning status: %w", err)
- }
- if !versioningEnabled {
- return fmt.Errorf("object lock requires versioning to be enabled")
- }
- return nil
- }
- // handleObjectLockAvailabilityCheck handles object lock availability checks for API endpoints
- func (s3a *S3ApiServer) handleObjectLockAvailabilityCheck(w http.ResponseWriter, request *http.Request, bucket, handlerName string) bool {
- if err := s3a.isObjectLockAvailable(bucket); err != nil {
- glog.Errorf("%s: object lock not available for bucket %s: %v", handlerName, bucket, err)
- if errors.Is(err, ErrBucketNotFound) {
- s3err.WriteErrorResponse(w, request, s3err.ErrNoSuchBucket)
- } else {
- // Return InvalidRequest for object lock operations on buckets without object lock enabled
- // This matches AWS S3 behavior and s3-tests expectations (400 Bad Request)
- s3err.WriteErrorResponse(w, request, s3err.ErrInvalidRequest)
- }
- return false
- }
- return true
- }
|