You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

668 lines
20 KiB

7 years ago
7 years ago
7 years ago
3 years ago
7 years ago
3 years ago
7 years ago
7 years ago
7 years ago
7 years ago
7 years ago
3 years ago
4 years ago
3 years ago
3 years ago
7 years ago
3 years ago
3 years ago
3 years ago
3 years ago
3 years ago
3 years ago
7 years ago
7 years ago
3 years ago
4 years ago
4 years ago
7 years ago
7 years ago
3 years ago
3 years ago
3 years ago
3 years ago
3 years ago
3 years ago
3 years ago
3 years ago
3 years ago
3 years ago
3 years ago
3 years ago
3 years ago
3 years ago
3 years ago
3 years ago
3 years ago
3 years ago
3 years ago
3 years ago
3 years ago
3 years ago
3 years ago
  1. package s3api
  2. import (
  3. "bytes"
  4. "context"
  5. "encoding/xml"
  6. "errors"
  7. "fmt"
  8. "math"
  9. "net/http"
  10. "sort"
  11. "strings"
  12. "time"
  13. "github.com/aws/aws-sdk-go/private/protocol/xml/xmlutil"
  14. "github.com/seaweedfs/seaweedfs/weed/s3api/s3bucket"
  15. "github.com/seaweedfs/seaweedfs/weed/util"
  16. "github.com/seaweedfs/seaweedfs/weed/filer"
  17. "github.com/seaweedfs/seaweedfs/weed/s3api/s3_constants"
  18. "github.com/seaweedfs/seaweedfs/weed/storage/needle"
  19. "github.com/seaweedfs/seaweedfs/weed/s3api/s3err"
  20. "github.com/aws/aws-sdk-go/aws"
  21. "github.com/aws/aws-sdk-go/service/s3"
  22. "github.com/seaweedfs/seaweedfs/weed/glog"
  23. "github.com/seaweedfs/seaweedfs/weed/pb/filer_pb"
  24. )
  25. func (s3a *S3ApiServer) ListBucketsHandler(w http.ResponseWriter, r *http.Request) {
  26. glog.V(3).Infof("ListBucketsHandler")
  27. var identity *Identity
  28. var s3Err s3err.ErrorCode
  29. if s3a.iam.isEnabled() {
  30. identity, s3Err = s3a.iam.authUser(r)
  31. if s3Err != s3err.ErrNone {
  32. s3err.WriteErrorResponse(w, r, s3Err)
  33. return
  34. }
  35. }
  36. var response ListAllMyBucketsResult
  37. entries, _, err := s3a.list(s3a.option.BucketsPath, "", "", false, math.MaxInt32)
  38. if err != nil {
  39. s3err.WriteErrorResponse(w, r, s3err.ErrInternalError)
  40. return
  41. }
  42. identityId := r.Header.Get(s3_constants.AmzIdentityId)
  43. var listBuckets ListAllMyBucketsList
  44. for _, entry := range entries {
  45. if entry.IsDirectory {
  46. if identity != nil && !identity.canDo(s3_constants.ACTION_LIST, entry.Name, "") {
  47. continue
  48. }
  49. listBuckets.Bucket = append(listBuckets.Bucket, ListAllMyBucketsEntry{
  50. Name: entry.Name,
  51. CreationDate: time.Unix(entry.Attributes.Crtime, 0).UTC(),
  52. })
  53. }
  54. }
  55. response = ListAllMyBucketsResult{
  56. Owner: CanonicalUser{
  57. ID: identityId,
  58. DisplayName: identityId,
  59. },
  60. Buckets: listBuckets,
  61. }
  62. writeSuccessResponseXML(w, r, response)
  63. }
  64. func (s3a *S3ApiServer) PutBucketHandler(w http.ResponseWriter, r *http.Request) {
  65. bucket, _ := s3_constants.GetBucketAndObject(r)
  66. glog.V(3).Infof("PutBucketHandler %s", bucket)
  67. // validate the bucket name
  68. err := s3bucket.VerifyS3BucketName(bucket)
  69. if err != nil {
  70. glog.Errorf("put invalid bucket name: %v %v", bucket, err)
  71. s3err.WriteErrorResponse(w, r, s3err.ErrInvalidBucketName)
  72. return
  73. }
  74. // avoid duplicated buckets
  75. errCode := s3err.ErrNone
  76. if err := s3a.WithFilerClient(false, func(client filer_pb.SeaweedFilerClient) error {
  77. if resp, err := client.CollectionList(context.Background(), &filer_pb.CollectionListRequest{
  78. IncludeEcVolumes: true,
  79. IncludeNormalVolumes: true,
  80. }); err != nil {
  81. glog.Errorf("list collection: %v", err)
  82. return fmt.Errorf("list collections: %v", err)
  83. } else {
  84. for _, c := range resp.Collections {
  85. if s3a.getCollectionName(bucket) == c.Name {
  86. errCode = s3err.ErrBucketAlreadyExists
  87. break
  88. }
  89. }
  90. }
  91. return nil
  92. }); err != nil {
  93. s3err.WriteErrorResponse(w, r, s3err.ErrInternalError)
  94. return
  95. }
  96. if exist, err := s3a.exists(s3a.option.BucketsPath, bucket, true); err == nil && exist {
  97. errCode = s3err.ErrBucketAlreadyExists
  98. }
  99. if errCode != s3err.ErrNone {
  100. s3err.WriteErrorResponse(w, r, errCode)
  101. return
  102. }
  103. fn := func(entry *filer_pb.Entry) {
  104. if identityId := r.Header.Get(s3_constants.AmzIdentityId); identityId != "" {
  105. if entry.Extended == nil {
  106. entry.Extended = make(map[string][]byte)
  107. }
  108. entry.Extended[s3_constants.AmzIdentityId] = []byte(identityId)
  109. }
  110. }
  111. // create the folder for bucket, but lazily create actual collection
  112. if err := s3a.mkdir(s3a.option.BucketsPath, bucket, fn); err != nil {
  113. glog.Errorf("PutBucketHandler mkdir: %v", err)
  114. s3err.WriteErrorResponse(w, r, s3err.ErrInternalError)
  115. return
  116. }
  117. w.Header().Set("Location", "/"+bucket)
  118. writeSuccessResponseEmpty(w, r)
  119. }
  120. func (s3a *S3ApiServer) DeleteBucketHandler(w http.ResponseWriter, r *http.Request) {
  121. bucket, _ := s3_constants.GetBucketAndObject(r)
  122. glog.V(3).Infof("DeleteBucketHandler %s", bucket)
  123. if err := s3a.checkBucket(r, bucket); err != s3err.ErrNone {
  124. s3err.WriteErrorResponse(w, r, err)
  125. return
  126. }
  127. err := s3a.WithFilerClient(false, func(client filer_pb.SeaweedFilerClient) error {
  128. if !s3a.option.AllowDeleteBucketNotEmpty {
  129. entries, _, err := s3a.list(s3a.option.BucketsPath+"/"+bucket, "", "", false, 2)
  130. if err != nil {
  131. return fmt.Errorf("failed to list bucket %s: %v", bucket, err)
  132. }
  133. for _, entry := range entries {
  134. if entry.Name != s3_constants.MultipartUploadsFolder {
  135. return errors.New(s3err.GetAPIError(s3err.ErrBucketNotEmpty).Code)
  136. }
  137. }
  138. }
  139. // delete collection
  140. deleteCollectionRequest := &filer_pb.DeleteCollectionRequest{
  141. Collection: s3a.getCollectionName(bucket),
  142. }
  143. glog.V(1).Infof("delete collection: %v", deleteCollectionRequest)
  144. if _, err := client.DeleteCollection(context.Background(), deleteCollectionRequest); err != nil {
  145. return fmt.Errorf("delete collection %s: %v", bucket, err)
  146. }
  147. return nil
  148. })
  149. if err != nil {
  150. s3ErrorCode := s3err.ErrInternalError
  151. if err.Error() == s3err.GetAPIError(s3err.ErrBucketNotEmpty).Code {
  152. s3ErrorCode = s3err.ErrBucketNotEmpty
  153. }
  154. s3err.WriteErrorResponse(w, r, s3ErrorCode)
  155. return
  156. }
  157. err = s3a.rm(s3a.option.BucketsPath, bucket, false, true)
  158. if err != nil {
  159. s3err.WriteErrorResponse(w, r, s3err.ErrInternalError)
  160. return
  161. }
  162. s3err.WriteEmptyResponse(w, r, http.StatusNoContent)
  163. }
  164. func (s3a *S3ApiServer) HeadBucketHandler(w http.ResponseWriter, r *http.Request) {
  165. bucket, _ := s3_constants.GetBucketAndObject(r)
  166. glog.V(3).Infof("HeadBucketHandler %s", bucket)
  167. if entry, err := s3a.getEntry(s3a.option.BucketsPath, bucket); entry == nil || err == filer_pb.ErrNotFound {
  168. s3err.WriteErrorResponse(w, r, s3err.ErrNoSuchBucket)
  169. return
  170. }
  171. writeSuccessResponseEmpty(w, r)
  172. }
  173. func (s3a *S3ApiServer) checkBucket(r *http.Request, bucket string) s3err.ErrorCode {
  174. entry, err := s3a.getEntry(s3a.option.BucketsPath, bucket)
  175. if entry == nil || err == filer_pb.ErrNotFound {
  176. return s3err.ErrNoSuchBucket
  177. }
  178. //if iam is enabled, the access was already checked before
  179. if s3a.iam.isEnabled() {
  180. return s3err.ErrNone
  181. }
  182. if !s3a.hasAccess(r, entry) {
  183. return s3err.ErrAccessDenied
  184. }
  185. return s3err.ErrNone
  186. }
  187. func (s3a *S3ApiServer) hasAccess(r *http.Request, entry *filer_pb.Entry) bool {
  188. isAdmin := r.Header.Get(s3_constants.AmzIsAdmin) != ""
  189. if isAdmin {
  190. return true
  191. }
  192. if entry.Extended == nil {
  193. return true
  194. }
  195. identityId := r.Header.Get(s3_constants.AmzIdentityId)
  196. if id, ok := entry.Extended[s3_constants.AmzIdentityId]; ok {
  197. if identityId != string(id) {
  198. glog.V(3).Infof("hasAccess: %s != %s (entry.Extended = %v)", identityId, id, entry.Extended)
  199. return false
  200. }
  201. }
  202. return true
  203. }
  204. // GetBucketAclHandler Get Bucket ACL
  205. // https://docs.aws.amazon.com/AmazonS3/latest/API/API_GetBucketAcl.html
  206. func (s3a *S3ApiServer) GetBucketAclHandler(w http.ResponseWriter, r *http.Request) {
  207. // collect parameters
  208. bucket, _ := s3_constants.GetBucketAndObject(r)
  209. glog.V(3).Infof("GetBucketAclHandler %s", bucket)
  210. if err := s3a.checkBucket(r, bucket); err != s3err.ErrNone {
  211. s3err.WriteErrorResponse(w, r, err)
  212. return
  213. }
  214. amzAccountId := r.Header.Get(s3_constants.AmzAccountId)
  215. amzDisplayName := s3a.iam.GetAccountNameById(amzAccountId)
  216. response := AccessControlPolicy{
  217. Owner: CanonicalUser{
  218. ID: amzAccountId,
  219. DisplayName: amzDisplayName,
  220. },
  221. }
  222. response.AccessControlList.Grant = append(response.AccessControlList.Grant, Grant{
  223. Grantee: Grantee{
  224. ID: amzAccountId,
  225. DisplayName: amzDisplayName,
  226. Type: "CanonicalUser",
  227. XMLXSI: "CanonicalUser",
  228. XMLNS: "http://www.w3.org/2001/XMLSchema-instance"},
  229. Permission: s3.PermissionFullControl,
  230. })
  231. writeSuccessResponseXML(w, r, response)
  232. }
  233. // PutBucketAclHandler Put bucket ACL only responds success if the ACL is private.
  234. // https://docs.aws.amazon.com/AmazonS3/latest/API/API_PutBucketAcl.html //
  235. func (s3a *S3ApiServer) PutBucketAclHandler(w http.ResponseWriter, r *http.Request) {
  236. // collect parameters
  237. bucket, _ := s3_constants.GetBucketAndObject(r)
  238. glog.V(3).Infof("PutBucketAclHandler %s", bucket)
  239. if err := s3a.checkBucket(r, bucket); err != s3err.ErrNone {
  240. s3err.WriteErrorResponse(w, r, err)
  241. return
  242. }
  243. cannedAcl := r.Header.Get(s3_constants.AmzCannedAcl)
  244. switch {
  245. case cannedAcl == "":
  246. acl := &s3.AccessControlPolicy{}
  247. if err := xmlDecoder(r.Body, acl, r.ContentLength); err != nil {
  248. glog.Errorf("PutBucketAclHandler: %s", err)
  249. s3err.WriteErrorResponse(w, r, s3err.ErrInvalidRequest)
  250. return
  251. }
  252. if len(acl.Grants) == 1 && acl.Grants[0].Permission != nil && *acl.Grants[0].Permission == s3_constants.PermissionFullControl {
  253. writeSuccessResponseEmpty(w, r)
  254. return
  255. }
  256. case cannedAcl == s3_constants.CannedAclPrivate:
  257. writeSuccessResponseEmpty(w, r)
  258. return
  259. }
  260. s3err.WriteErrorResponse(w, r, s3err.ErrNotImplemented)
  261. }
  262. // GetBucketLifecycleConfigurationHandler Get Bucket Lifecycle configuration
  263. // https://docs.aws.amazon.com/AmazonS3/latest/API/API_GetBucketLifecycleConfiguration.html
  264. func (s3a *S3ApiServer) GetBucketLifecycleConfigurationHandler(w http.ResponseWriter, r *http.Request) {
  265. // collect parameters
  266. bucket, _ := s3_constants.GetBucketAndObject(r)
  267. glog.V(3).Infof("GetBucketLifecycleConfigurationHandler %s", bucket)
  268. if err := s3a.checkBucket(r, bucket); err != s3err.ErrNone {
  269. s3err.WriteErrorResponse(w, r, err)
  270. return
  271. }
  272. fc, err := filer.ReadFilerConf(s3a.option.Filer, s3a.option.GrpcDialOption, nil)
  273. if err != nil {
  274. glog.Errorf("GetBucketLifecycleConfigurationHandler: %s", err)
  275. s3err.WriteErrorResponse(w, r, s3err.ErrInternalError)
  276. return
  277. }
  278. ttls := fc.GetCollectionTtls(s3a.getCollectionName(bucket))
  279. if len(ttls) == 0 {
  280. s3err.WriteErrorResponse(w, r, s3err.ErrNoSuchLifecycleConfiguration)
  281. return
  282. }
  283. response := Lifecycle{}
  284. for locationPrefix, internalTtl := range ttls {
  285. ttl, _ := needle.ReadTTL(internalTtl)
  286. days := int(ttl.Minutes() / 60 / 24)
  287. if days == 0 {
  288. continue
  289. }
  290. prefix, found := strings.CutPrefix(locationPrefix, fmt.Sprintf("%s/%s/", s3a.option.BucketsPath, bucket))
  291. if !found {
  292. continue
  293. }
  294. response.Rules = append(response.Rules, Rule{
  295. ID: prefix,
  296. Status: Enabled,
  297. Prefix: Prefix{val: prefix, set: true},
  298. Expiration: Expiration{Days: days, set: true},
  299. })
  300. }
  301. sort.Slice(response.Rules, func(i, j int) bool {
  302. return response.Rules[i].ID < response.Rules[j].ID
  303. })
  304. writeSuccessResponseXML(w, r, response)
  305. }
  306. // PutBucketLifecycleConfigurationHandler Put Bucket Lifecycle configuration
  307. // https://docs.aws.amazon.com/AmazonS3/latest/API/API_PutBucketLifecycleConfiguration.html
  308. func (s3a *S3ApiServer) PutBucketLifecycleConfigurationHandler(w http.ResponseWriter, r *http.Request) {
  309. // collect parameters
  310. bucket, _ := s3_constants.GetBucketAndObject(r)
  311. glog.V(3).Infof("PutBucketLifecycleConfigurationHandler %s", bucket)
  312. if err := s3a.checkBucket(r, bucket); err != s3err.ErrNone {
  313. s3err.WriteErrorResponse(w, r, err)
  314. return
  315. }
  316. lifeCycleConfig := Lifecycle{}
  317. if err := xmlDecoder(r.Body, &lifeCycleConfig, r.ContentLength); err != nil {
  318. glog.Warningf("PutBucketLifecycleConfigurationHandler xml decode: %s", err)
  319. s3err.WriteErrorResponse(w, r, s3err.ErrMalformedXML)
  320. return
  321. }
  322. fc, err := filer.ReadFilerConf(s3a.option.Filer, s3a.option.GrpcDialOption, nil)
  323. if err != nil {
  324. glog.Errorf("PutBucketLifecycleConfigurationHandler read filer config: %s", err)
  325. s3err.WriteErrorResponse(w, r, s3err.ErrInternalError)
  326. return
  327. }
  328. collectionName := s3a.getCollectionName(bucket)
  329. collectionTtls := fc.GetCollectionTtls(collectionName)
  330. changed := false
  331. for _, rule := range lifeCycleConfig.Rules {
  332. if rule.Status != Enabled {
  333. continue
  334. }
  335. var rulePrefix string
  336. switch {
  337. case rule.Filter.Prefix.set:
  338. rulePrefix = rule.Filter.Prefix.val
  339. case rule.Prefix.set:
  340. rulePrefix = rule.Prefix.val
  341. case !rule.Expiration.Date.IsZero() || rule.Transition.Days > 0 || !rule.Transition.Date.IsZero():
  342. s3err.WriteErrorResponse(w, r, s3err.ErrNotImplemented)
  343. return
  344. }
  345. if rule.Expiration.Days == 0 {
  346. continue
  347. }
  348. locConf := &filer_pb.FilerConf_PathConf{
  349. LocationPrefix: fmt.Sprintf("%s/%s/%s", s3a.option.BucketsPath, bucket, rulePrefix),
  350. Collection: collectionName,
  351. Ttl: fmt.Sprintf("%dd", rule.Expiration.Days),
  352. }
  353. if ttl, ok := collectionTtls[locConf.LocationPrefix]; ok && ttl == locConf.Ttl {
  354. continue
  355. }
  356. if err := fc.AddLocationConf(locConf); err != nil {
  357. glog.Errorf("PutBucketLifecycleConfigurationHandler add location config: %s", err)
  358. s3err.WriteErrorResponse(w, r, s3err.ErrInternalError)
  359. return
  360. }
  361. changed = true
  362. }
  363. if changed {
  364. var buf bytes.Buffer
  365. if err := fc.ToText(&buf); err != nil {
  366. glog.Errorf("PutBucketLifecycleConfigurationHandler save config to text: %s", err)
  367. s3err.WriteErrorResponse(w, r, s3err.ErrInternalError)
  368. }
  369. if err := s3a.WithFilerClient(false, func(client filer_pb.SeaweedFilerClient) error {
  370. return filer.SaveInsideFiler(client, filer.DirectoryEtcSeaweedFS, filer.FilerConfName, buf.Bytes())
  371. }); err != nil {
  372. glog.Errorf("PutBucketLifecycleConfigurationHandler save config inside filer: %s", err)
  373. s3err.WriteErrorResponse(w, r, s3err.ErrInternalError)
  374. return
  375. }
  376. }
  377. writeSuccessResponseEmpty(w, r)
  378. }
  379. // DeleteBucketLifecycleHandler Delete Bucket Lifecycle
  380. // https://docs.aws.amazon.com/AmazonS3/latest/API/API_DeleteBucketLifecycle.html
  381. func (s3a *S3ApiServer) DeleteBucketLifecycleHandler(w http.ResponseWriter, r *http.Request) {
  382. // collect parameters
  383. bucket, _ := s3_constants.GetBucketAndObject(r)
  384. glog.V(3).Infof("DeleteBucketLifecycleHandler %s", bucket)
  385. if err := s3a.checkBucket(r, bucket); err != s3err.ErrNone {
  386. s3err.WriteErrorResponse(w, r, err)
  387. return
  388. }
  389. fc, err := filer.ReadFilerConf(s3a.option.Filer, s3a.option.GrpcDialOption, nil)
  390. if err != nil {
  391. glog.Errorf("DeleteBucketLifecycleHandler read filer config: %s", err)
  392. s3err.WriteErrorResponse(w, r, s3err.ErrInternalError)
  393. return
  394. }
  395. collectionTtls := fc.GetCollectionTtls(s3a.getCollectionName(bucket))
  396. changed := false
  397. for prefix, ttl := range collectionTtls {
  398. bucketPrefix := fmt.Sprintf("%s/%s/", s3a.option.BucketsPath, bucket)
  399. if strings.HasPrefix(prefix, bucketPrefix) && strings.HasSuffix(ttl, "d") {
  400. fc.DeleteLocationConf(prefix)
  401. changed = true
  402. }
  403. }
  404. if changed {
  405. var buf bytes.Buffer
  406. if err := fc.ToText(&buf); err != nil {
  407. glog.Errorf("DeleteBucketLifecycleHandler save config to text: %s", err)
  408. s3err.WriteErrorResponse(w, r, s3err.ErrInternalError)
  409. }
  410. if err := s3a.WithFilerClient(false, func(client filer_pb.SeaweedFilerClient) error {
  411. return filer.SaveInsideFiler(client, filer.DirectoryEtcSeaweedFS, filer.FilerConfName, buf.Bytes())
  412. }); err != nil {
  413. glog.Errorf("DeleteBucketLifecycleHandler save config inside filer: %s", err)
  414. s3err.WriteErrorResponse(w, r, s3err.ErrInternalError)
  415. return
  416. }
  417. }
  418. s3err.WriteEmptyResponse(w, r, http.StatusNoContent)
  419. }
  420. // GetBucketLocationHandler Get bucket location
  421. // https://docs.aws.amazon.com/AmazonS3/latest/API/API_GetBucketLocation.html
  422. func (s3a *S3ApiServer) GetBucketLocationHandler(w http.ResponseWriter, r *http.Request) {
  423. writeSuccessResponseXML(w, r, CreateBucketConfiguration{})
  424. }
  425. // GetBucketRequestPaymentHandler Get bucket location
  426. // https://docs.aws.amazon.com/AmazonS3/latest/API/API_GetBucketRequestPayment.html
  427. func (s3a *S3ApiServer) GetBucketRequestPaymentHandler(w http.ResponseWriter, r *http.Request) {
  428. writeSuccessResponseXML(w, r, RequestPaymentConfiguration{Payer: "BucketOwner"})
  429. }
  430. // PutBucketOwnershipControls https://docs.aws.amazon.com/AmazonS3/latest/API/API_PutBucketOwnershipControls.html
  431. func (s3a *S3ApiServer) PutBucketOwnershipControls(w http.ResponseWriter, r *http.Request) {
  432. bucket, _ := s3_constants.GetBucketAndObject(r)
  433. glog.V(3).Infof("PutBucketOwnershipControls %s", bucket)
  434. errCode := s3a.checkAccessByOwnership(r, bucket)
  435. if errCode != s3err.ErrNone {
  436. s3err.WriteErrorResponse(w, r, errCode)
  437. return
  438. }
  439. if r.Body == nil || r.Body == http.NoBody {
  440. s3err.WriteErrorResponse(w, r, s3err.ErrInvalidRequest)
  441. return
  442. }
  443. var v s3.OwnershipControls
  444. defer util.CloseRequest(r)
  445. err := xmlutil.UnmarshalXML(&v, xml.NewDecoder(r.Body), "")
  446. if err != nil {
  447. s3err.WriteErrorResponse(w, r, s3err.ErrInvalidRequest)
  448. return
  449. }
  450. if len(v.Rules) != 1 {
  451. s3err.WriteErrorResponse(w, r, s3err.ErrInvalidRequest)
  452. return
  453. }
  454. printOwnership := true
  455. ownership := *v.Rules[0].ObjectOwnership
  456. switch ownership {
  457. case s3_constants.OwnershipObjectWriter:
  458. case s3_constants.OwnershipBucketOwnerPreferred:
  459. case s3_constants.OwnershipBucketOwnerEnforced:
  460. printOwnership = false
  461. default:
  462. s3err.WriteErrorResponse(w, r, s3err.ErrInvalidRequest)
  463. return
  464. }
  465. bucketEntry, err := s3a.getEntry(s3a.option.BucketsPath, bucket)
  466. if err != nil {
  467. if err == filer_pb.ErrNotFound {
  468. s3err.WriteErrorResponse(w, r, s3err.ErrNoSuchBucket)
  469. return
  470. }
  471. s3err.WriteErrorResponse(w, r, s3err.ErrInternalError)
  472. return
  473. }
  474. oldOwnership, ok := bucketEntry.Extended[s3_constants.ExtOwnershipKey]
  475. if !ok || string(oldOwnership) != ownership {
  476. if bucketEntry.Extended == nil {
  477. bucketEntry.Extended = make(map[string][]byte)
  478. }
  479. bucketEntry.Extended[s3_constants.ExtOwnershipKey] = []byte(ownership)
  480. err = s3a.updateEntry(s3a.option.BucketsPath, bucketEntry)
  481. if err != nil {
  482. s3err.WriteErrorResponse(w, r, s3err.ErrInternalError)
  483. return
  484. }
  485. }
  486. if printOwnership {
  487. result := &s3.PutBucketOwnershipControlsInput{
  488. OwnershipControls: &v,
  489. }
  490. s3err.WriteAwsXMLResponse(w, r, http.StatusOK, result)
  491. } else {
  492. writeSuccessResponseEmpty(w, r)
  493. }
  494. }
  495. // GetBucketOwnershipControls https://docs.aws.amazon.com/AmazonS3/latest/API/API_GetBucketOwnershipControls.html
  496. func (s3a *S3ApiServer) GetBucketOwnershipControls(w http.ResponseWriter, r *http.Request) {
  497. bucket, _ := s3_constants.GetBucketAndObject(r)
  498. glog.V(3).Infof("GetBucketOwnershipControls %s", bucket)
  499. errCode := s3a.checkAccessByOwnership(r, bucket)
  500. if errCode != s3err.ErrNone {
  501. s3err.WriteErrorResponse(w, r, errCode)
  502. return
  503. }
  504. bucketEntry, err := s3a.getEntry(s3a.option.BucketsPath, bucket)
  505. if err != nil {
  506. if err == filer_pb.ErrNotFound {
  507. s3err.WriteErrorResponse(w, r, s3err.ErrNoSuchBucket)
  508. return
  509. }
  510. s3err.WriteErrorResponse(w, r, s3err.ErrInternalError)
  511. return
  512. }
  513. v, ok := bucketEntry.Extended[s3_constants.ExtOwnershipKey]
  514. if !ok {
  515. s3err.WriteErrorResponse(w, r, s3err.OwnershipControlsNotFoundError)
  516. return
  517. }
  518. ownership := string(v)
  519. result := &s3.PutBucketOwnershipControlsInput{
  520. OwnershipControls: &s3.OwnershipControls{
  521. Rules: []*s3.OwnershipControlsRule{
  522. {
  523. ObjectOwnership: &ownership,
  524. },
  525. },
  526. },
  527. }
  528. s3err.WriteAwsXMLResponse(w, r, http.StatusOK, result)
  529. }
  530. // DeleteBucketOwnershipControls https://docs.aws.amazon.com/AmazonS3/latest/API/API_DeleteBucketOwnershipControls.html
  531. func (s3a *S3ApiServer) DeleteBucketOwnershipControls(w http.ResponseWriter, r *http.Request) {
  532. bucket, _ := s3_constants.GetBucketAndObject(r)
  533. glog.V(3).Infof("PutBucketOwnershipControls %s", bucket)
  534. errCode := s3a.checkAccessByOwnership(r, bucket)
  535. if errCode != s3err.ErrNone {
  536. s3err.WriteErrorResponse(w, r, errCode)
  537. return
  538. }
  539. bucketEntry, err := s3a.getEntry(s3a.option.BucketsPath, bucket)
  540. if err != nil {
  541. if err == filer_pb.ErrNotFound {
  542. s3err.WriteErrorResponse(w, r, s3err.ErrNoSuchBucket)
  543. return
  544. }
  545. s3err.WriteErrorResponse(w, r, s3err.ErrInternalError)
  546. return
  547. }
  548. _, ok := bucketEntry.Extended[s3_constants.ExtOwnershipKey]
  549. if !ok {
  550. s3err.WriteErrorResponse(w, r, s3err.OwnershipControlsNotFoundError)
  551. return
  552. }
  553. delete(bucketEntry.Extended, s3_constants.ExtOwnershipKey)
  554. err = s3a.updateEntry(s3a.option.BucketsPath, bucketEntry)
  555. if err != nil {
  556. s3err.WriteErrorResponse(w, r, s3err.ErrInternalError)
  557. return
  558. }
  559. emptyOwnershipControls := &s3.OwnershipControls{
  560. Rules: []*s3.OwnershipControlsRule{},
  561. }
  562. s3err.WriteAwsXMLResponse(w, r, http.StatusOK, emptyOwnershipControls)
  563. }
  564. // GetBucketVersioningHandler Get Bucket Versioning status
  565. // https://docs.aws.amazon.com/AmazonS3/latest/API/API_GetBucketVersioning.html
  566. func (s3a *S3ApiServer) GetBucketVersioningHandler(w http.ResponseWriter, r *http.Request) {
  567. bucket, _ := s3_constants.GetBucketAndObject(r)
  568. glog.V(3).Infof("GetBucketVersioning %s", bucket)
  569. if err := s3a.checkBucket(r, bucket); err != s3err.ErrNone {
  570. s3err.WriteErrorResponse(w, r, err)
  571. return
  572. }
  573. s3err.WriteAwsXMLResponse(w, r, http.StatusOK, &s3.PutBucketVersioningInput{
  574. VersioningConfiguration: &s3.VersioningConfiguration{
  575. Status: aws.String(s3.BucketVersioningStatusSuspended),
  576. },
  577. })
  578. }