You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

101 lines
3.0 KiB

  1. package s3api
  2. import (
  3. "github.com/seaweedfs/seaweedfs/weed/glog"
  4. "github.com/seaweedfs/seaweedfs/weed/pb/filer_pb"
  5. "github.com/seaweedfs/seaweedfs/weed/s3api/s3_constants"
  6. "github.com/seaweedfs/seaweedfs/weed/s3api/s3account"
  7. "github.com/seaweedfs/seaweedfs/weed/s3api/s3acl"
  8. "github.com/seaweedfs/seaweedfs/weed/s3api/s3err"
  9. "net/http"
  10. )
  11. func getAccountId(r *http.Request) string {
  12. id := r.Header.Get(s3_constants.AmzAccountId)
  13. if len(id) == 0 {
  14. return s3account.AccountAnonymous.Id
  15. } else {
  16. return id
  17. }
  18. }
  19. func (s3a *S3ApiServer) checkAccessByOwnership(r *http.Request, bucket string) s3err.ErrorCode {
  20. metadata, errCode := s3a.bucketRegistry.GetBucketMetadata(bucket)
  21. if errCode != s3err.ErrNone {
  22. return errCode
  23. }
  24. accountId := getAccountId(r)
  25. if accountId == s3account.AccountAdmin.Id || accountId == *metadata.Owner.ID {
  26. return s3err.ErrNone
  27. }
  28. return s3err.ErrAccessDenied
  29. }
  30. //Check access for PutBucketAclHandler
  31. func (s3a *S3ApiServer) checkAccessForPutBucketAcl(accountId, bucket string) (*BucketMetaData, s3err.ErrorCode) {
  32. bucketMetadata, errCode := s3a.bucketRegistry.GetBucketMetadata(bucket)
  33. if errCode != s3err.ErrNone {
  34. return nil, errCode
  35. }
  36. if bucketMetadata.ObjectOwnership == s3_constants.OwnershipBucketOwnerEnforced {
  37. return nil, s3err.AccessControlListNotSupported
  38. }
  39. if accountId == s3account.AccountAdmin.Id || accountId == *bucketMetadata.Owner.ID {
  40. return bucketMetadata, s3err.ErrNone
  41. }
  42. if len(bucketMetadata.Acl) > 0 {
  43. reqGrants := s3acl.DetermineReqGrants(accountId, s3_constants.PermissionWriteAcp)
  44. for _, bucketGrant := range bucketMetadata.Acl {
  45. for _, reqGrant := range reqGrants {
  46. if s3acl.GrantEquals(bucketGrant, reqGrant) {
  47. return bucketMetadata, s3err.ErrNone
  48. }
  49. }
  50. }
  51. }
  52. glog.V(3).Infof("acl denied! request account id: %s", accountId)
  53. return nil, s3err.ErrAccessDenied
  54. }
  55. func updateBucketEntry(s3a *S3ApiServer, entry *filer_pb.Entry) error {
  56. return s3a.updateEntry(s3a.option.BucketsPath, entry)
  57. }
  58. // Check Bucket/BucketAcl Read related access
  59. // includes:
  60. // - HeadBucketHandler
  61. // - GetBucketAclHandler
  62. // - ListObjectsV1Handler
  63. // - ListObjectsV2Handler
  64. func (s3a *S3ApiServer) checkAccessForReadBucket(r *http.Request, bucket, aclAction string) (*BucketMetaData, s3err.ErrorCode) {
  65. bucketMetadata, errCode := s3a.bucketRegistry.GetBucketMetadata(bucket)
  66. if errCode != s3err.ErrNone {
  67. return nil, errCode
  68. }
  69. if bucketMetadata.ObjectOwnership == s3_constants.OwnershipBucketOwnerEnforced {
  70. return bucketMetadata, s3err.ErrNone
  71. }
  72. accountId := s3acl.GetAccountId(r)
  73. if accountId == s3account.AccountAdmin.Id || accountId == *bucketMetadata.Owner.ID {
  74. return bucketMetadata, s3err.ErrNone
  75. }
  76. if len(bucketMetadata.Acl) > 0 {
  77. reqGrants := s3acl.DetermineReqGrants(accountId, aclAction)
  78. for _, bucketGrant := range bucketMetadata.Acl {
  79. for _, reqGrant := range reqGrants {
  80. if s3acl.GrantEquals(bucketGrant, reqGrant) {
  81. return bucketMetadata, s3err.ErrNone
  82. }
  83. }
  84. }
  85. }
  86. glog.V(3).Infof("acl denied! request account id: %s", accountId)
  87. return nil, s3err.ErrAccessDenied
  88. }