You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

544 lines
16 KiB

7 years ago
7 years ago
3 years ago
7 years ago
3 years ago
7 years ago
7 years ago
7 years ago
7 years ago
7 years ago
3 years ago
4 years ago
3 years ago
3 years ago
7 years ago
3 years ago
3 years ago
3 years ago
3 years ago
3 years ago
3 years ago
7 years ago
7 years ago
3 years ago
4 years ago
4 years ago
7 years ago
7 years ago
3 years ago
3 years ago
3 years ago
3 years ago
3 years ago
3 years ago
3 years ago
3 years ago
3 years ago
3 years ago
3 years ago
3 years ago
3 years ago
3 years ago
3 years ago
3 years ago
3 years ago
3 years ago
3 years ago
  1. package s3api
  2. import (
  3. "context"
  4. "encoding/xml"
  5. "errors"
  6. "fmt"
  7. "github.com/aws/aws-sdk-go/private/protocol/xml/xmlutil"
  8. "github.com/seaweedfs/seaweedfs/weed/s3api/s3acl"
  9. "github.com/seaweedfs/seaweedfs/weed/util"
  10. "math"
  11. "net/http"
  12. "time"
  13. "github.com/seaweedfs/seaweedfs/weed/filer"
  14. "github.com/seaweedfs/seaweedfs/weed/s3api/s3_constants"
  15. "github.com/seaweedfs/seaweedfs/weed/storage/needle"
  16. "github.com/seaweedfs/seaweedfs/weed/s3api/s3err"
  17. "github.com/aws/aws-sdk-go/aws"
  18. "github.com/aws/aws-sdk-go/service/s3"
  19. "github.com/seaweedfs/seaweedfs/weed/glog"
  20. "github.com/seaweedfs/seaweedfs/weed/pb/filer_pb"
  21. )
  22. type ListAllMyBucketsResult struct {
  23. XMLName xml.Name `xml:"http://s3.amazonaws.com/doc/2006-03-01/ ListAllMyBucketsResult"`
  24. Owner *s3.Owner
  25. Buckets []*s3.Bucket `xml:"Buckets>Bucket"`
  26. }
  27. func (s3a *S3ApiServer) ListBucketsHandler(w http.ResponseWriter, r *http.Request) {
  28. glog.V(3).Infof("ListBucketsHandler")
  29. var identity *Identity
  30. var s3Err s3err.ErrorCode
  31. if s3a.iam.isEnabled() {
  32. identity, s3Err = s3a.iam.authUser(r)
  33. if s3Err != s3err.ErrNone {
  34. s3err.WriteErrorResponse(w, r, s3Err)
  35. return
  36. }
  37. }
  38. var response ListAllMyBucketsResult
  39. entries, _, err := s3a.list(s3a.option.BucketsPath, "", "", false, math.MaxInt32)
  40. if err != nil {
  41. s3err.WriteErrorResponse(w, r, s3err.ErrInternalError)
  42. return
  43. }
  44. identityId := r.Header.Get(s3_constants.AmzIdentityId)
  45. var buckets []*s3.Bucket
  46. for _, entry := range entries {
  47. if entry.IsDirectory {
  48. if identity != nil && !identity.canDo(s3_constants.ACTION_LIST, entry.Name, "") {
  49. continue
  50. }
  51. buckets = append(buckets, &s3.Bucket{
  52. Name: aws.String(entry.Name),
  53. CreationDate: aws.Time(time.Unix(entry.Attributes.Crtime, 0).UTC()),
  54. })
  55. }
  56. }
  57. response = ListAllMyBucketsResult{
  58. Owner: &s3.Owner{
  59. ID: aws.String(identityId),
  60. DisplayName: aws.String(identityId),
  61. },
  62. Buckets: buckets,
  63. }
  64. writeSuccessResponseXML(w, r, response)
  65. }
  66. func (s3a *S3ApiServer) PutBucketHandler(w http.ResponseWriter, r *http.Request) {
  67. bucket, _ := s3_constants.GetBucketAndObject(r)
  68. glog.V(3).Infof("PutBucketHandler %s", bucket)
  69. // avoid duplicated buckets
  70. errCode := s3err.ErrNone
  71. if err := s3a.WithFilerClient(false, func(client filer_pb.SeaweedFilerClient) error {
  72. if resp, err := client.CollectionList(context.Background(), &filer_pb.CollectionListRequest{
  73. IncludeEcVolumes: true,
  74. IncludeNormalVolumes: true,
  75. }); err != nil {
  76. glog.Errorf("list collection: %v", err)
  77. return fmt.Errorf("list collections: %v", err)
  78. } else {
  79. for _, c := range resp.Collections {
  80. if bucket == c.Name {
  81. errCode = s3err.ErrBucketAlreadyExists
  82. break
  83. }
  84. }
  85. }
  86. return nil
  87. }); err != nil {
  88. s3err.WriteErrorResponse(w, r, s3err.ErrInternalError)
  89. return
  90. }
  91. if exist, err := s3a.exists(s3a.option.BucketsPath, bucket, true); err == nil && exist {
  92. errCode = s3err.ErrBucketAlreadyExists
  93. }
  94. if errCode != s3err.ErrNone {
  95. s3err.WriteErrorResponse(w, r, errCode)
  96. return
  97. }
  98. if s3a.iam.isEnabled() {
  99. if _, errCode = s3a.iam.authRequest(r, s3_constants.ACTION_ADMIN); errCode != s3err.ErrNone {
  100. s3err.WriteErrorResponse(w, r, errCode)
  101. return
  102. }
  103. }
  104. fn := func(entry *filer_pb.Entry) {
  105. if identityId := r.Header.Get(s3_constants.AmzIdentityId); identityId != "" {
  106. if entry.Extended == nil {
  107. entry.Extended = make(map[string][]byte)
  108. }
  109. entry.Extended[s3_constants.AmzIdentityId] = []byte(identityId)
  110. }
  111. }
  112. // create the folder for bucket, but lazily create actual collection
  113. if err := s3a.mkdir(s3a.option.BucketsPath, bucket, fn); err != nil {
  114. glog.Errorf("PutBucketHandler mkdir: %v", err)
  115. s3err.WriteErrorResponse(w, r, s3err.ErrInternalError)
  116. return
  117. }
  118. w.Header().Set("Location", "/"+bucket)
  119. writeSuccessResponseEmpty(w, r)
  120. }
  121. func (s3a *S3ApiServer) DeleteBucketHandler(w http.ResponseWriter, r *http.Request) {
  122. bucket, _ := s3_constants.GetBucketAndObject(r)
  123. glog.V(3).Infof("DeleteBucketHandler %s", bucket)
  124. if err := s3a.checkBucket(r, bucket); err != s3err.ErrNone {
  125. s3err.WriteErrorResponse(w, r, err)
  126. return
  127. }
  128. err := s3a.WithFilerClient(false, func(client filer_pb.SeaweedFilerClient) error {
  129. if !s3a.option.AllowDeleteBucketNotEmpty {
  130. entries, _, err := s3a.list(s3a.option.BucketsPath+"/"+bucket, "", "", false, 2)
  131. if err != nil {
  132. return fmt.Errorf("failed to list bucket %s: %v", bucket, err)
  133. }
  134. for _, entry := range entries {
  135. if entry.Name != s3_constants.MultipartUploadsFolder {
  136. return errors.New(s3err.GetAPIError(s3err.ErrBucketNotEmpty).Code)
  137. }
  138. }
  139. }
  140. // delete collection
  141. deleteCollectionRequest := &filer_pb.DeleteCollectionRequest{
  142. Collection: bucket,
  143. }
  144. glog.V(1).Infof("delete collection: %v", deleteCollectionRequest)
  145. if _, err := client.DeleteCollection(context.Background(), deleteCollectionRequest); err != nil {
  146. return fmt.Errorf("delete collection %s: %v", bucket, err)
  147. }
  148. return nil
  149. })
  150. if err != nil {
  151. s3ErrorCode := s3err.ErrInternalError
  152. if err.Error() == s3err.GetAPIError(s3err.ErrBucketNotEmpty).Code {
  153. s3ErrorCode = s3err.ErrBucketNotEmpty
  154. }
  155. s3err.WriteErrorResponse(w, r, s3ErrorCode)
  156. return
  157. }
  158. err = s3a.rm(s3a.option.BucketsPath, bucket, false, true)
  159. if err != nil {
  160. s3err.WriteErrorResponse(w, r, s3err.ErrInternalError)
  161. return
  162. }
  163. s3err.WriteEmptyResponse(w, r, http.StatusNoContent)
  164. }
  165. func (s3a *S3ApiServer) HeadBucketHandler(w http.ResponseWriter, r *http.Request) {
  166. bucket, _ := s3_constants.GetBucketAndObject(r)
  167. glog.V(3).Infof("HeadBucketHandler %s", bucket)
  168. if entry, err := s3a.getEntry(s3a.option.BucketsPath, bucket); entry == nil || err == filer_pb.ErrNotFound {
  169. s3err.WriteErrorResponse(w, r, s3err.ErrNoSuchBucket)
  170. return
  171. }
  172. writeSuccessResponseEmpty(w, r)
  173. }
  174. func (s3a *S3ApiServer) checkBucket(r *http.Request, bucket string) s3err.ErrorCode {
  175. entry, err := s3a.getEntry(s3a.option.BucketsPath, bucket)
  176. if entry == nil || err == filer_pb.ErrNotFound {
  177. return s3err.ErrNoSuchBucket
  178. }
  179. if !s3a.hasAccess(r, entry) {
  180. return s3err.ErrAccessDenied
  181. }
  182. return s3err.ErrNone
  183. }
  184. func (s3a *S3ApiServer) hasAccess(r *http.Request, entry *filer_pb.Entry) bool {
  185. isAdmin := r.Header.Get(s3_constants.AmzIsAdmin) != ""
  186. if isAdmin {
  187. return true
  188. }
  189. if entry.Extended == nil {
  190. return true
  191. }
  192. identityId := r.Header.Get(s3_constants.AmzIdentityId)
  193. if id, ok := entry.Extended[s3_constants.AmzIdentityId]; ok {
  194. if identityId != string(id) {
  195. return false
  196. }
  197. }
  198. return true
  199. }
  200. // PutBucketAclHandler Put bucket ACL
  201. // https://docs.aws.amazon.com/AmazonS3/latest/API/API_PutBucketAcl.html
  202. func (s3a *S3ApiServer) PutBucketAclHandler(w http.ResponseWriter, r *http.Request) {
  203. bucket, _ := s3_constants.GetBucketAndObject(r)
  204. glog.V(3).Infof("PutBucketAclHandler %s", bucket)
  205. accountId := s3acl.GetAccountId(r)
  206. bucketMetadata, errorCode := s3a.checkAccessForPutBucketAcl(accountId, bucket)
  207. if errorCode != s3err.ErrNone {
  208. s3err.WriteErrorResponse(w, r, errorCode)
  209. return
  210. }
  211. grants, errCode := s3acl.ExtractAcl(r, s3a.accountManager, bucketMetadata.ObjectOwnership, "", *bucketMetadata.Owner.ID, accountId)
  212. if errCode != s3err.ErrNone {
  213. s3err.WriteErrorResponse(w, r, errCode)
  214. return
  215. }
  216. bucketEntry, err := s3a.getEntry(s3a.option.BucketsPath, bucket)
  217. if err != nil {
  218. glog.Warning(err)
  219. s3err.WriteErrorResponse(w, r, s3err.ErrInternalError)
  220. return
  221. }
  222. errCode = s3acl.AssembleEntryWithAcp(bucketEntry, *bucketMetadata.Owner.ID, grants)
  223. if errCode != s3err.ErrNone {
  224. s3err.WriteErrorResponse(w, r, errCode)
  225. return
  226. }
  227. err = updateBucketEntry(s3a, bucketEntry)
  228. if err != nil {
  229. s3err.WriteErrorResponse(w, r, s3err.ErrInternalError)
  230. return
  231. }
  232. s3err.WriteEmptyResponse(w, r, http.StatusOK)
  233. }
  234. // GetBucketAclHandler Get Bucket ACL
  235. // https://docs.aws.amazon.com/AmazonS3/latest/API/API_GetBucketAcl.html
  236. func (s3a *S3ApiServer) GetBucketAclHandler(w http.ResponseWriter, r *http.Request) {
  237. // collect parameters
  238. bucket, _ := s3_constants.GetBucketAndObject(r)
  239. glog.V(3).Infof("GetBucketAclHandler %s", bucket)
  240. if err := s3a.checkBucket(r, bucket); err != s3err.ErrNone {
  241. s3err.WriteErrorResponse(w, r, err)
  242. return
  243. }
  244. response := AccessControlPolicy{}
  245. for _, ident := range s3a.iam.identities {
  246. if len(ident.Credentials) == 0 {
  247. continue
  248. }
  249. for _, action := range ident.Actions {
  250. if !action.overBucket(bucket) || action.getPermission() == "" {
  251. continue
  252. }
  253. id := ident.Credentials[0].AccessKey
  254. if response.Owner.DisplayName == "" && action.isOwner(bucket) && len(ident.Credentials) > 0 {
  255. response.Owner.DisplayName = ident.Name
  256. response.Owner.ID = id
  257. }
  258. response.AccessControlList.Grant = append(response.AccessControlList.Grant, Grant{
  259. Grantee: Grantee{
  260. ID: id,
  261. DisplayName: ident.Name,
  262. Type: "CanonicalUser",
  263. XMLXSI: "CanonicalUser",
  264. XMLNS: "http://www.w3.org/2001/XMLSchema-instance"},
  265. Permission: action.getPermission(),
  266. })
  267. }
  268. }
  269. writeSuccessResponseXML(w, r, response)
  270. }
  271. // GetBucketLifecycleConfigurationHandler Get Bucket Lifecycle configuration
  272. // https://docs.aws.amazon.com/AmazonS3/latest/API/API_GetBucketLifecycleConfiguration.html
  273. func (s3a *S3ApiServer) GetBucketLifecycleConfigurationHandler(w http.ResponseWriter, r *http.Request) {
  274. // collect parameters
  275. bucket, _ := s3_constants.GetBucketAndObject(r)
  276. glog.V(3).Infof("GetBucketLifecycleConfigurationHandler %s", bucket)
  277. if err := s3a.checkBucket(r, bucket); err != s3err.ErrNone {
  278. s3err.WriteErrorResponse(w, r, err)
  279. return
  280. }
  281. fc, err := filer.ReadFilerConf(s3a.option.Filer, s3a.option.GrpcDialOption, nil)
  282. if err != nil {
  283. glog.Errorf("GetBucketLifecycleConfigurationHandler: %s", err)
  284. s3err.WriteErrorResponse(w, r, s3err.ErrInternalError)
  285. return
  286. }
  287. ttls := fc.GetCollectionTtls(bucket)
  288. if len(ttls) == 0 {
  289. s3err.WriteErrorResponse(w, r, s3err.ErrNoSuchLifecycleConfiguration)
  290. return
  291. }
  292. response := Lifecycle{}
  293. for prefix, internalTtl := range ttls {
  294. ttl, _ := needle.ReadTTL(internalTtl)
  295. days := int(ttl.Minutes() / 60 / 24)
  296. if days == 0 {
  297. continue
  298. }
  299. response.Rules = append(response.Rules, Rule{
  300. Status: Enabled, Filter: Filter{
  301. Prefix: Prefix{string: prefix, set: true},
  302. set: true,
  303. },
  304. Expiration: Expiration{Days: days, set: true},
  305. })
  306. }
  307. writeSuccessResponseXML(w, r, response)
  308. }
  309. // PutBucketLifecycleConfigurationHandler Put Bucket Lifecycle configuration
  310. // https://docs.aws.amazon.com/AmazonS3/latest/API/API_PutBucketLifecycleConfiguration.html
  311. func (s3a *S3ApiServer) PutBucketLifecycleConfigurationHandler(w http.ResponseWriter, r *http.Request) {
  312. s3err.WriteErrorResponse(w, r, s3err.ErrNotImplemented)
  313. }
  314. // DeleteBucketMetricsConfiguration Delete Bucket Lifecycle
  315. // https://docs.aws.amazon.com/AmazonS3/latest/API/API_DeleteBucketLifecycle.html
  316. func (s3a *S3ApiServer) DeleteBucketLifecycleHandler(w http.ResponseWriter, r *http.Request) {
  317. s3err.WriteEmptyResponse(w, r, http.StatusNoContent)
  318. }
  319. // GetBucketLocationHandler Get bucket location
  320. // https://docs.aws.amazon.com/AmazonS3/latest/API/API_GetBucketLocation.html
  321. func (s3a *S3ApiServer) GetBucketLocationHandler(w http.ResponseWriter, r *http.Request) {
  322. writeSuccessResponseXML(w, r, LocationConstraint{})
  323. }
  324. // GetBucketRequestPaymentHandler Get bucket location
  325. // https://docs.aws.amazon.com/AmazonS3/latest/API/API_GetBucketRequestPayment.html
  326. func (s3a *S3ApiServer) GetBucketRequestPaymentHandler(w http.ResponseWriter, r *http.Request) {
  327. writeSuccessResponseXML(w, r, RequestPaymentConfiguration{Payer: "BucketOwner"})
  328. }
  329. // PutBucketOwnershipControls https://docs.aws.amazon.com/AmazonS3/latest/API/API_PutBucketOwnershipControls.html
  330. func (s3a *S3ApiServer) PutBucketOwnershipControls(w http.ResponseWriter, r *http.Request) {
  331. bucket, _ := s3_constants.GetBucketAndObject(r)
  332. glog.V(3).Infof("PutBucketOwnershipControls %s", bucket)
  333. errCode := s3a.checkAccessByOwnership(r, bucket)
  334. if errCode != s3err.ErrNone {
  335. s3err.WriteErrorResponse(w, r, errCode)
  336. return
  337. }
  338. if r.Body == nil || r.Body == http.NoBody {
  339. s3err.WriteErrorResponse(w, r, s3err.ErrInvalidRequest)
  340. return
  341. }
  342. var v s3.OwnershipControls
  343. defer util.CloseRequest(r)
  344. err := xmlutil.UnmarshalXML(&v, xml.NewDecoder(r.Body), "")
  345. if err != nil {
  346. s3err.WriteErrorResponse(w, r, s3err.ErrInvalidRequest)
  347. return
  348. }
  349. if len(v.Rules) != 1 {
  350. s3err.WriteErrorResponse(w, r, s3err.ErrInvalidRequest)
  351. return
  352. }
  353. printOwnership := true
  354. ownership := *v.Rules[0].ObjectOwnership
  355. switch ownership {
  356. case s3_constants.OwnershipObjectWriter:
  357. case s3_constants.OwnershipBucketOwnerPreferred:
  358. case s3_constants.OwnershipBucketOwnerEnforced:
  359. printOwnership = false
  360. default:
  361. s3err.WriteErrorResponse(w, r, s3err.ErrInvalidRequest)
  362. return
  363. }
  364. bucketEntry, err := s3a.getEntry(s3a.option.BucketsPath, bucket)
  365. if err != nil {
  366. if err == filer_pb.ErrNotFound {
  367. s3err.WriteErrorResponse(w, r, s3err.ErrNoSuchBucket)
  368. return
  369. }
  370. s3err.WriteErrorResponse(w, r, s3err.ErrInternalError)
  371. return
  372. }
  373. oldOwnership, ok := bucketEntry.Extended[s3_constants.ExtOwnershipKey]
  374. if !ok || string(oldOwnership) != ownership {
  375. if bucketEntry.Extended == nil {
  376. bucketEntry.Extended = make(map[string][]byte)
  377. }
  378. bucketEntry.Extended[s3_constants.ExtOwnershipKey] = []byte(ownership)
  379. err = s3a.updateEntry(s3a.option.BucketsPath, bucketEntry)
  380. if err != nil {
  381. s3err.WriteErrorResponse(w, r, s3err.ErrInternalError)
  382. return
  383. }
  384. }
  385. if printOwnership {
  386. result := &s3.PutBucketOwnershipControlsInput{
  387. OwnershipControls: &v,
  388. }
  389. s3err.WriteAwsXMLResponse(w, r, http.StatusOK, result)
  390. } else {
  391. writeSuccessResponseEmpty(w, r)
  392. }
  393. }
  394. // GetBucketOwnershipControls https://docs.aws.amazon.com/AmazonS3/latest/API/API_GetBucketOwnershipControls.html
  395. func (s3a *S3ApiServer) GetBucketOwnershipControls(w http.ResponseWriter, r *http.Request) {
  396. bucket, _ := s3_constants.GetBucketAndObject(r)
  397. glog.V(3).Infof("GetBucketOwnershipControls %s", bucket)
  398. errCode := s3a.checkAccessByOwnership(r, bucket)
  399. if errCode != s3err.ErrNone {
  400. s3err.WriteErrorResponse(w, r, errCode)
  401. return
  402. }
  403. bucketEntry, err := s3a.getEntry(s3a.option.BucketsPath, bucket)
  404. if err != nil {
  405. if err == filer_pb.ErrNotFound {
  406. s3err.WriteErrorResponse(w, r, s3err.ErrNoSuchBucket)
  407. return
  408. }
  409. s3err.WriteErrorResponse(w, r, s3err.ErrInternalError)
  410. return
  411. }
  412. v, ok := bucketEntry.Extended[s3_constants.ExtOwnershipKey]
  413. if !ok {
  414. s3err.WriteErrorResponse(w, r, s3err.OwnershipControlsNotFoundError)
  415. return
  416. }
  417. ownership := string(v)
  418. result := &s3.PutBucketOwnershipControlsInput{
  419. OwnershipControls: &s3.OwnershipControls{
  420. Rules: []*s3.OwnershipControlsRule{
  421. {
  422. ObjectOwnership: &ownership,
  423. },
  424. },
  425. },
  426. }
  427. s3err.WriteAwsXMLResponse(w, r, http.StatusOK, result)
  428. }
  429. // DeleteBucketOwnershipControls https://docs.aws.amazon.com/AmazonS3/latest/API/API_DeleteBucketOwnershipControls.html
  430. func (s3a *S3ApiServer) DeleteBucketOwnershipControls(w http.ResponseWriter, r *http.Request) {
  431. bucket, _ := s3_constants.GetBucketAndObject(r)
  432. glog.V(3).Infof("PutBucketOwnershipControls %s", bucket)
  433. errCode := s3a.checkAccessByOwnership(r, bucket)
  434. if errCode != s3err.ErrNone {
  435. s3err.WriteErrorResponse(w, r, errCode)
  436. return
  437. }
  438. bucketEntry, err := s3a.getEntry(s3a.option.BucketsPath, bucket)
  439. if err != nil {
  440. if err == filer_pb.ErrNotFound {
  441. s3err.WriteErrorResponse(w, r, s3err.ErrNoSuchBucket)
  442. return
  443. }
  444. s3err.WriteErrorResponse(w, r, s3err.ErrInternalError)
  445. return
  446. }
  447. _, ok := bucketEntry.Extended[s3_constants.ExtOwnershipKey]
  448. if !ok {
  449. s3err.WriteErrorResponse(w, r, s3err.OwnershipControlsNotFoundError)
  450. return
  451. }
  452. delete(bucketEntry.Extended, s3_constants.ExtOwnershipKey)
  453. err = s3a.updateEntry(s3a.option.BucketsPath, bucketEntry)
  454. if err != nil {
  455. s3err.WriteErrorResponse(w, r, s3err.ErrInternalError)
  456. return
  457. }
  458. emptyOwnershipControls := &s3.OwnershipControls{
  459. Rules: []*s3.OwnershipControlsRule{},
  460. }
  461. s3err.WriteAwsXMLResponse(w, r, http.StatusOK, emptyOwnershipControls)
  462. }