You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

134 lines
4.1 KiB

  1. package s3api
  2. import (
  3. "github.com/aws/aws-sdk-go/service/s3"
  4. "github.com/seaweedfs/seaweedfs/weed/glog"
  5. "github.com/seaweedfs/seaweedfs/weed/pb/filer_pb"
  6. "github.com/seaweedfs/seaweedfs/weed/s3api/s3_constants"
  7. "github.com/seaweedfs/seaweedfs/weed/s3api/s3account"
  8. "github.com/seaweedfs/seaweedfs/weed/s3api/s3acl"
  9. "github.com/seaweedfs/seaweedfs/weed/s3api/s3err"
  10. "github.com/seaweedfs/seaweedfs/weed/util"
  11. "net/http"
  12. )
  13. func getAccountId(r *http.Request) string {
  14. id := r.Header.Get(s3_constants.AmzAccountId)
  15. if len(id) == 0 {
  16. return s3account.AccountAnonymous.Id
  17. } else {
  18. return id
  19. }
  20. }
  21. func (s3a *S3ApiServer) checkAccessByOwnership(r *http.Request, bucket string) s3err.ErrorCode {
  22. metadata, errCode := s3a.bucketRegistry.GetBucketMetadata(bucket)
  23. if errCode != s3err.ErrNone {
  24. return errCode
  25. }
  26. accountId := getAccountId(r)
  27. if accountId == s3account.AccountAdmin.Id || accountId == *metadata.Owner.ID {
  28. return s3err.ErrNone
  29. }
  30. return s3err.ErrAccessDenied
  31. }
  32. // Check Object-Write related access
  33. // includes:
  34. // - PutObjectHandler
  35. // - PutObjectPartHandler
  36. func (s3a *S3ApiServer) checkAccessForWriteObject(r *http.Request, bucket, object string) s3err.ErrorCode {
  37. bucketMetadata, errCode := s3a.bucketRegistry.GetBucketMetadata(bucket)
  38. if errCode != s3err.ErrNone {
  39. return errCode
  40. }
  41. accountId := s3acl.GetAccountId(r)
  42. if bucketMetadata.ObjectOwnership == s3_constants.OwnershipBucketOwnerEnforced {
  43. // validate grants (only bucketOwnerFullControl acl is allowed)
  44. _, grants, errCode := s3acl.ParseAndValidateAclHeaders(r, s3a.accountManager, bucketMetadata.ObjectOwnership, *bucketMetadata.Owner.ID, accountId, false)
  45. if errCode != s3err.ErrNone {
  46. return errCode
  47. }
  48. if len(grants) > 1 {
  49. return s3err.AccessControlListNotSupported
  50. }
  51. bucketOwnerFullControlGrant := &s3.Grant{
  52. Permission: &s3_constants.PermissionFullControl,
  53. Grantee: &s3.Grantee{
  54. Type: &s3_constants.GrantTypeCanonicalUser,
  55. ID: bucketMetadata.Owner.ID,
  56. },
  57. }
  58. if len(grants) == 0 {
  59. // set default grants
  60. s3acl.SetAcpOwnerHeader(r, accountId)
  61. s3acl.SetAcpGrantsHeader(r, []*s3.Grant{bucketOwnerFullControlGrant})
  62. return s3err.ErrNone
  63. }
  64. if !s3acl.GrantEquals(bucketOwnerFullControlGrant, grants[0]) {
  65. return s3err.AccessControlListNotSupported
  66. }
  67. s3acl.SetAcpOwnerHeader(r, accountId)
  68. s3acl.SetAcpGrantsHeader(r, []*s3.Grant{bucketOwnerFullControlGrant})
  69. return s3err.ErrNone
  70. }
  71. //bucket access allowed
  72. bucketAclAllowed := false
  73. if accountId == *bucketMetadata.Owner.ID {
  74. bucketAclAllowed = true
  75. } else {
  76. if len(bucketMetadata.Acl) > 0 {
  77. reqGrants := s3acl.DetermineReqGrants(accountId, s3_constants.PermissionWrite)
  78. bucketLoop:
  79. for _, bucketGrant := range bucketMetadata.Acl {
  80. for _, requiredGrant := range reqGrants {
  81. if s3acl.GrantEquals(bucketGrant, requiredGrant) {
  82. bucketAclAllowed = true
  83. break bucketLoop
  84. }
  85. }
  86. }
  87. }
  88. }
  89. if !bucketAclAllowed {
  90. glog.V(3).Infof("acl denied! request account id: %s", accountId)
  91. return s3err.ErrAccessDenied
  92. }
  93. //object access allowed
  94. entry, err := getObjectEntry(s3a, bucket, object)
  95. if err != nil {
  96. if err != filer_pb.ErrNotFound {
  97. return s3err.ErrInternalError
  98. }
  99. } else {
  100. if entry.IsDirectory {
  101. return s3err.ErrExistingObjectIsDirectory
  102. }
  103. //Only the owner of the bucket and the owner of the object can overwrite the object
  104. objectOwner := s3acl.GetAcpOwner(entry.Extended, *bucketMetadata.Owner.ID)
  105. if accountId != objectOwner && accountId != *bucketMetadata.Owner.ID {
  106. glog.V(3).Infof("acl denied! request account id: %s, expect account id: %s", accountId, *bucketMetadata.Owner.ID)
  107. return s3err.ErrAccessDenied
  108. }
  109. }
  110. ownerId, grants, errCode := s3acl.ParseAndValidateAclHeadersOrElseDefault(r, s3a.accountManager, bucketMetadata.ObjectOwnership, *bucketMetadata.Owner.ID, accountId, false)
  111. if errCode != s3err.ErrNone {
  112. return errCode
  113. }
  114. s3acl.SetAcpOwnerHeader(r, ownerId)
  115. s3acl.SetAcpGrantsHeader(r, grants)
  116. return s3err.ErrNone
  117. }
  118. func getObjectEntry(s3a *S3ApiServer, bucket, object string) (*filer_pb.Entry, error) {
  119. return s3a.getEntry(util.Join(s3a.option.BucketsPath, bucket), object)
  120. }