123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552 |
- package s3api
- import (
- "context"
- "encoding/xml"
- "errors"
- "fmt"
- "github.com/aws/aws-sdk-go/private/protocol/xml/xmlutil"
- "github.com/seaweedfs/seaweedfs/weed/s3api/s3bucket"
- "github.com/seaweedfs/seaweedfs/weed/util"
- "math"
- "net/http"
- "time"
- "github.com/seaweedfs/seaweedfs/weed/filer"
- "github.com/seaweedfs/seaweedfs/weed/s3api/s3_constants"
- "github.com/seaweedfs/seaweedfs/weed/storage/needle"
- "github.com/seaweedfs/seaweedfs/weed/s3api/s3err"
- "github.com/aws/aws-sdk-go/aws"
- "github.com/aws/aws-sdk-go/service/s3"
- "github.com/seaweedfs/seaweedfs/weed/glog"
- "github.com/seaweedfs/seaweedfs/weed/pb/filer_pb"
- )
- type ListAllMyBucketsResult struct {
- XMLName xml.Name `xml:"http://s3.amazonaws.com/doc/2006-03-01/ ListAllMyBucketsResult"`
- Owner *s3.Owner
- Buckets []*s3.Bucket `xml:"Buckets>Bucket"`
- }
- func (s3a *S3ApiServer) ListBucketsHandler(w http.ResponseWriter, r *http.Request) {
- glog.V(3).Infof("ListBucketsHandler")
- var identity *Identity
- var s3Err s3err.ErrorCode
- if s3a.iam.isEnabled() {
- identity, s3Err = s3a.iam.authUser(r)
- if s3Err != s3err.ErrNone {
- s3err.WriteErrorResponse(w, r, s3Err)
- return
- }
- }
- var response ListAllMyBucketsResult
- entries, _, err := s3a.list(s3a.option.BucketsPath, "", "", false, math.MaxInt32)
- if err != nil {
- s3err.WriteErrorResponse(w, r, s3err.ErrInternalError)
- return
- }
- identityId := r.Header.Get(s3_constants.AmzIdentityId)
- var buckets []*s3.Bucket
- for _, entry := range entries {
- if entry.IsDirectory {
- if identity != nil && !identity.canDo(s3_constants.ACTION_LIST, entry.Name, "") {
- continue
- }
- buckets = append(buckets, &s3.Bucket{
- Name: aws.String(entry.Name),
- CreationDate: aws.Time(time.Unix(entry.Attributes.Crtime, 0).UTC()),
- })
- }
- }
- response = ListAllMyBucketsResult{
- Owner: &s3.Owner{
- ID: aws.String(identityId),
- DisplayName: aws.String(identityId),
- },
- Buckets: buckets,
- }
- writeSuccessResponseXML(w, r, response)
- }
- func (s3a *S3ApiServer) PutBucketHandler(w http.ResponseWriter, r *http.Request) {
- bucket, _ := s3_constants.GetBucketAndObject(r)
- glog.V(3).Infof("PutBucketHandler %s", bucket)
- // validate the bucket name
- err := s3bucket.VerifyS3BucketName(bucket)
- if err != nil {
- glog.Errorf("put invalid bucket name: %v %v", bucket, err)
- s3err.WriteErrorResponse(w, r, s3err.ErrInvalidBucketName)
- return
- }
- // avoid duplicated buckets
- errCode := s3err.ErrNone
- if err := s3a.WithFilerClient(false, func(client filer_pb.SeaweedFilerClient) error {
- if resp, err := client.CollectionList(context.Background(), &filer_pb.CollectionListRequest{
- IncludeEcVolumes: true,
- IncludeNormalVolumes: true,
- }); err != nil {
- glog.Errorf("list collection: %v", err)
- return fmt.Errorf("list collections: %v", err)
- } else {
- for _, c := range resp.Collections {
- if s3a.getCollectionName(bucket) == c.Name {
- errCode = s3err.ErrBucketAlreadyExists
- break
- }
- }
- }
- return nil
- }); err != nil {
- s3err.WriteErrorResponse(w, r, s3err.ErrInternalError)
- return
- }
- if exist, err := s3a.exists(s3a.option.BucketsPath, bucket, true); err == nil && exist {
- errCode = s3err.ErrBucketAlreadyExists
- }
- if errCode != s3err.ErrNone {
- s3err.WriteErrorResponse(w, r, errCode)
- return
- }
- if s3a.iam.isEnabled() {
- if _, errCode = s3a.iam.authRequest(r, s3_constants.ACTION_ADMIN); errCode != s3err.ErrNone {
- s3err.WriteErrorResponse(w, r, errCode)
- return
- }
- }
- fn := func(entry *filer_pb.Entry) {
- if identityId := r.Header.Get(s3_constants.AmzIdentityId); identityId != "" {
- if entry.Extended == nil {
- entry.Extended = make(map[string][]byte)
- }
- entry.Extended[s3_constants.AmzIdentityId] = []byte(identityId)
- }
- }
- // create the folder for bucket, but lazily create actual collection
- if err := s3a.mkdir(s3a.option.BucketsPath, bucket, fn); err != nil {
- glog.Errorf("PutBucketHandler mkdir: %v", err)
- s3err.WriteErrorResponse(w, r, s3err.ErrInternalError)
- return
- }
- w.Header().Set("Location", "/"+bucket)
- writeSuccessResponseEmpty(w, r)
- }
- func (s3a *S3ApiServer) DeleteBucketHandler(w http.ResponseWriter, r *http.Request) {
- bucket, _ := s3_constants.GetBucketAndObject(r)
- glog.V(3).Infof("DeleteBucketHandler %s", bucket)
- if err := s3a.checkBucket(r, bucket); err != s3err.ErrNone {
- s3err.WriteErrorResponse(w, r, err)
- return
- }
- err := s3a.WithFilerClient(false, func(client filer_pb.SeaweedFilerClient) error {
- if !s3a.option.AllowDeleteBucketNotEmpty {
- entries, _, err := s3a.list(s3a.option.BucketsPath+"/"+bucket, "", "", false, 2)
- if err != nil {
- return fmt.Errorf("failed to list bucket %s: %v", bucket, err)
- }
- for _, entry := range entries {
- if entry.Name != s3_constants.MultipartUploadsFolder {
- return errors.New(s3err.GetAPIError(s3err.ErrBucketNotEmpty).Code)
- }
- }
- }
- // delete collection
- deleteCollectionRequest := &filer_pb.DeleteCollectionRequest{
- Collection: s3a.getCollectionName(bucket),
- }
- glog.V(1).Infof("delete collection: %v", deleteCollectionRequest)
- if _, err := client.DeleteCollection(context.Background(), deleteCollectionRequest); err != nil {
- return fmt.Errorf("delete collection %s: %v", bucket, err)
- }
- return nil
- })
- if err != nil {
- s3ErrorCode := s3err.ErrInternalError
- if err.Error() == s3err.GetAPIError(s3err.ErrBucketNotEmpty).Code {
- s3ErrorCode = s3err.ErrBucketNotEmpty
- }
- s3err.WriteErrorResponse(w, r, s3ErrorCode)
- return
- }
- err = s3a.rm(s3a.option.BucketsPath, bucket, false, true)
- if err != nil {
- s3err.WriteErrorResponse(w, r, s3err.ErrInternalError)
- return
- }
- s3err.WriteEmptyResponse(w, r, http.StatusNoContent)
- }
- func (s3a *S3ApiServer) HeadBucketHandler(w http.ResponseWriter, r *http.Request) {
- bucket, _ := s3_constants.GetBucketAndObject(r)
- glog.V(3).Infof("HeadBucketHandler %s", bucket)
- if entry, err := s3a.getEntry(s3a.option.BucketsPath, bucket); entry == nil || err == filer_pb.ErrNotFound {
- s3err.WriteErrorResponse(w, r, s3err.ErrNoSuchBucket)
- return
- }
- writeSuccessResponseEmpty(w, r)
- }
- func (s3a *S3ApiServer) checkBucket(r *http.Request, bucket string) s3err.ErrorCode {
- entry, err := s3a.getEntry(s3a.option.BucketsPath, bucket)
- if entry == nil || err == filer_pb.ErrNotFound {
- return s3err.ErrNoSuchBucket
- }
- if !s3a.hasAccess(r, entry) {
- return s3err.ErrAccessDenied
- }
- return s3err.ErrNone
- }
- func (s3a *S3ApiServer) hasAccess(r *http.Request, entry *filer_pb.Entry) bool {
- isAdmin := r.Header.Get(s3_constants.AmzIsAdmin) != ""
- if isAdmin {
- return true
- }
- if entry.Extended == nil {
- return true
- }
- identityId := r.Header.Get(s3_constants.AmzIdentityId)
- if id, ok := entry.Extended[s3_constants.AmzIdentityId]; ok {
- if identityId != string(id) {
- return false
- }
- }
- return true
- }
- // GetBucketAclHandler Get Bucket ACL
- // https://docs.aws.amazon.com/AmazonS3/latest/API/API_GetBucketAcl.html
- func (s3a *S3ApiServer) GetBucketAclHandler(w http.ResponseWriter, r *http.Request) {
- // collect parameters
- bucket, _ := s3_constants.GetBucketAndObject(r)
- glog.V(3).Infof("GetBucketAclHandler %s", bucket)
- if err := s3a.checkBucket(r, bucket); err != s3err.ErrNone {
- s3err.WriteErrorResponse(w, r, err)
- return
- }
- amzAccountId := r.Header.Get(s3_constants.AmzAccountId)
- amzDisplayName := s3a.iam.GetAccountNameById(amzAccountId)
- response := AccessControlPolicy{
- Owner: CanonicalUser{
- ID: amzAccountId,
- DisplayName: amzDisplayName,
- },
- }
- response.AccessControlList.Grant = append(response.AccessControlList.Grant, Grant{
- Grantee: Grantee{
- ID: amzAccountId,
- DisplayName: amzDisplayName,
- Type: "CanonicalUser",
- XMLXSI: "CanonicalUser",
- XMLNS: "http://www.w3.org/2001/XMLSchema-instance"},
- Permission: s3.PermissionFullControl,
- })
- writeSuccessResponseXML(w, r, response)
- }
- // PutBucketAclHandler Put bucket ACL only responds success if the ACL is private.
- // https://docs.aws.amazon.com/AmazonS3/latest/API/API_PutBucketAcl.html //
- func (s3a *S3ApiServer) PutBucketAclHandler(w http.ResponseWriter, r *http.Request) {
- // collect parameters
- bucket, _ := s3_constants.GetBucketAndObject(r)
- glog.V(3).Infof("PutBucketAclHandler %s", bucket)
- if err := s3a.checkBucket(r, bucket); err != s3err.ErrNone {
- s3err.WriteErrorResponse(w, r, err)
- return
- }
- cannedAcl := r.Header.Get(s3_constants.AmzCannedAcl)
- switch {
- case cannedAcl == "":
- acl := &s3.AccessControlPolicy{}
- if err := xmlDecoder(r.Body, acl, r.ContentLength); err != nil {
- glog.Errorf("PutBucketAclHandler: %s", err)
- s3err.WriteErrorResponse(w, r, s3err.ErrInvalidRequest)
- return
- }
- if len(acl.Grants) == 1 && acl.Grants[0].Permission != nil && *acl.Grants[0].Permission == s3_constants.PermissionFullControl {
- writeSuccessResponseEmpty(w, r)
- return
- }
- case cannedAcl == s3_constants.CannedAclPrivate:
- writeSuccessResponseEmpty(w, r)
- return
- }
- s3err.WriteErrorResponse(w, r, s3err.ErrNotImplemented)
- }
- // GetBucketLifecycleConfigurationHandler Get Bucket Lifecycle configuration
- // https://docs.aws.amazon.com/AmazonS3/latest/API/API_GetBucketLifecycleConfiguration.html
- func (s3a *S3ApiServer) GetBucketLifecycleConfigurationHandler(w http.ResponseWriter, r *http.Request) {
- // collect parameters
- bucket, _ := s3_constants.GetBucketAndObject(r)
- glog.V(3).Infof("GetBucketLifecycleConfigurationHandler %s", bucket)
- if err := s3a.checkBucket(r, bucket); err != s3err.ErrNone {
- s3err.WriteErrorResponse(w, r, err)
- return
- }
- fc, err := filer.ReadFilerConf(s3a.option.Filer, s3a.option.GrpcDialOption, nil)
- if err != nil {
- glog.Errorf("GetBucketLifecycleConfigurationHandler: %s", err)
- s3err.WriteErrorResponse(w, r, s3err.ErrInternalError)
- return
- }
- ttls := fc.GetCollectionTtls(s3a.getCollectionName(bucket))
- if len(ttls) == 0 {
- s3err.WriteErrorResponse(w, r, s3err.ErrNoSuchLifecycleConfiguration)
- return
- }
- response := Lifecycle{}
- for prefix, internalTtl := range ttls {
- ttl, _ := needle.ReadTTL(internalTtl)
- days := int(ttl.Minutes() / 60 / 24)
- if days == 0 {
- continue
- }
- response.Rules = append(response.Rules, Rule{
- Status: Enabled, Filter: Filter{
- Prefix: Prefix{string: prefix, set: true},
- set: true,
- },
- Expiration: Expiration{Days: days, set: true},
- })
- }
- writeSuccessResponseXML(w, r, response)
- }
- // PutBucketLifecycleConfigurationHandler Put Bucket Lifecycle configuration
- // https://docs.aws.amazon.com/AmazonS3/latest/API/API_PutBucketLifecycleConfiguration.html
- func (s3a *S3ApiServer) PutBucketLifecycleConfigurationHandler(w http.ResponseWriter, r *http.Request) {
- s3err.WriteErrorResponse(w, r, s3err.ErrNotImplemented)
- }
- // DeleteBucketMetricsConfiguration Delete Bucket Lifecycle
- // https://docs.aws.amazon.com/AmazonS3/latest/API/API_DeleteBucketLifecycle.html
- func (s3a *S3ApiServer) DeleteBucketLifecycleHandler(w http.ResponseWriter, r *http.Request) {
- s3err.WriteEmptyResponse(w, r, http.StatusNoContent)
- }
- // GetBucketLocationHandler Get bucket location
- // https://docs.aws.amazon.com/AmazonS3/latest/API/API_GetBucketLocation.html
- func (s3a *S3ApiServer) GetBucketLocationHandler(w http.ResponseWriter, r *http.Request) {
- writeSuccessResponseXML(w, r, LocationConstraint{})
- }
- // GetBucketRequestPaymentHandler Get bucket location
- // https://docs.aws.amazon.com/AmazonS3/latest/API/API_GetBucketRequestPayment.html
- func (s3a *S3ApiServer) GetBucketRequestPaymentHandler(w http.ResponseWriter, r *http.Request) {
- writeSuccessResponseXML(w, r, RequestPaymentConfiguration{Payer: "BucketOwner"})
- }
- // PutBucketOwnershipControls https://docs.aws.amazon.com/AmazonS3/latest/API/API_PutBucketOwnershipControls.html
- func (s3a *S3ApiServer) PutBucketOwnershipControls(w http.ResponseWriter, r *http.Request) {
- bucket, _ := s3_constants.GetBucketAndObject(r)
- glog.V(3).Infof("PutBucketOwnershipControls %s", bucket)
- errCode := s3a.checkAccessByOwnership(r, bucket)
- if errCode != s3err.ErrNone {
- s3err.WriteErrorResponse(w, r, errCode)
- return
- }
- if r.Body == nil || r.Body == http.NoBody {
- s3err.WriteErrorResponse(w, r, s3err.ErrInvalidRequest)
- return
- }
- var v s3.OwnershipControls
- defer util.CloseRequest(r)
- err := xmlutil.UnmarshalXML(&v, xml.NewDecoder(r.Body), "")
- if err != nil {
- s3err.WriteErrorResponse(w, r, s3err.ErrInvalidRequest)
- return
- }
- if len(v.Rules) != 1 {
- s3err.WriteErrorResponse(w, r, s3err.ErrInvalidRequest)
- return
- }
- printOwnership := true
- ownership := *v.Rules[0].ObjectOwnership
- switch ownership {
- case s3_constants.OwnershipObjectWriter:
- case s3_constants.OwnershipBucketOwnerPreferred:
- case s3_constants.OwnershipBucketOwnerEnforced:
- printOwnership = false
- default:
- s3err.WriteErrorResponse(w, r, s3err.ErrInvalidRequest)
- return
- }
- bucketEntry, err := s3a.getEntry(s3a.option.BucketsPath, bucket)
- if err != nil {
- if err == filer_pb.ErrNotFound {
- s3err.WriteErrorResponse(w, r, s3err.ErrNoSuchBucket)
- return
- }
- s3err.WriteErrorResponse(w, r, s3err.ErrInternalError)
- return
- }
- oldOwnership, ok := bucketEntry.Extended[s3_constants.ExtOwnershipKey]
- if !ok || string(oldOwnership) != ownership {
- if bucketEntry.Extended == nil {
- bucketEntry.Extended = make(map[string][]byte)
- }
- bucketEntry.Extended[s3_constants.ExtOwnershipKey] = []byte(ownership)
- err = s3a.updateEntry(s3a.option.BucketsPath, bucketEntry)
- if err != nil {
- s3err.WriteErrorResponse(w, r, s3err.ErrInternalError)
- return
- }
- }
- if printOwnership {
- result := &s3.PutBucketOwnershipControlsInput{
- OwnershipControls: &v,
- }
- s3err.WriteAwsXMLResponse(w, r, http.StatusOK, result)
- } else {
- writeSuccessResponseEmpty(w, r)
- }
- }
- // GetBucketOwnershipControls https://docs.aws.amazon.com/AmazonS3/latest/API/API_GetBucketOwnershipControls.html
- func (s3a *S3ApiServer) GetBucketOwnershipControls(w http.ResponseWriter, r *http.Request) {
- bucket, _ := s3_constants.GetBucketAndObject(r)
- glog.V(3).Infof("GetBucketOwnershipControls %s", bucket)
- errCode := s3a.checkAccessByOwnership(r, bucket)
- if errCode != s3err.ErrNone {
- s3err.WriteErrorResponse(w, r, errCode)
- return
- }
- bucketEntry, err := s3a.getEntry(s3a.option.BucketsPath, bucket)
- if err != nil {
- if err == filer_pb.ErrNotFound {
- s3err.WriteErrorResponse(w, r, s3err.ErrNoSuchBucket)
- return
- }
- s3err.WriteErrorResponse(w, r, s3err.ErrInternalError)
- return
- }
- v, ok := bucketEntry.Extended[s3_constants.ExtOwnershipKey]
- if !ok {
- s3err.WriteErrorResponse(w, r, s3err.OwnershipControlsNotFoundError)
- return
- }
- ownership := string(v)
- result := &s3.PutBucketOwnershipControlsInput{
- OwnershipControls: &s3.OwnershipControls{
- Rules: []*s3.OwnershipControlsRule{
- {
- ObjectOwnership: &ownership,
- },
- },
- },
- }
- s3err.WriteAwsXMLResponse(w, r, http.StatusOK, result)
- }
- // DeleteBucketOwnershipControls https://docs.aws.amazon.com/AmazonS3/latest/API/API_DeleteBucketOwnershipControls.html
- func (s3a *S3ApiServer) DeleteBucketOwnershipControls(w http.ResponseWriter, r *http.Request) {
- bucket, _ := s3_constants.GetBucketAndObject(r)
- glog.V(3).Infof("PutBucketOwnershipControls %s", bucket)
- errCode := s3a.checkAccessByOwnership(r, bucket)
- if errCode != s3err.ErrNone {
- s3err.WriteErrorResponse(w, r, errCode)
- return
- }
- bucketEntry, err := s3a.getEntry(s3a.option.BucketsPath, bucket)
- if err != nil {
- if err == filer_pb.ErrNotFound {
- s3err.WriteErrorResponse(w, r, s3err.ErrNoSuchBucket)
- return
- }
- s3err.WriteErrorResponse(w, r, s3err.ErrInternalError)
- return
- }
- _, ok := bucketEntry.Extended[s3_constants.ExtOwnershipKey]
- if !ok {
- s3err.WriteErrorResponse(w, r, s3err.OwnershipControlsNotFoundError)
- return
- }
- delete(bucketEntry.Extended, s3_constants.ExtOwnershipKey)
- err = s3a.updateEntry(s3a.option.BucketsPath, bucketEntry)
- if err != nil {
- s3err.WriteErrorResponse(w, r, s3err.ErrInternalError)
- return
- }
- emptyOwnershipControls := &s3.OwnershipControls{
- Rules: []*s3.OwnershipControlsRule{},
- }
- s3err.WriteAwsXMLResponse(w, r, http.StatusOK, emptyOwnershipControls)
- }
- // GetBucketVersioningHandler Get Bucket Versioning status
- // https://docs.aws.amazon.com/AmazonS3/latest/API/API_GetBucketVersioning.html
- func (s3a *S3ApiServer) GetBucketVersioningHandler(w http.ResponseWriter, r *http.Request) {
- bucket, _ := s3_constants.GetBucketAndObject(r)
- glog.V(3).Infof("GetBucketVersioning %s", bucket)
- if err := s3a.checkBucket(r, bucket); err != s3err.ErrNone {
- s3err.WriteErrorResponse(w, r, err)
- return
- }
- result := &s3.VersioningConfiguration{}
- result.SetStatus(s3.BucketVersioningStatusSuspended)
- s3err.WriteAwsXMLResponse(w, r, http.StatusOK, result)
- }
|