You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

407 lines
13 KiB

  1. package s3api
  2. import (
  3. "github.com/aws/aws-sdk-go/service/s3"
  4. "github.com/seaweedfs/seaweedfs/weed/glog"
  5. "github.com/seaweedfs/seaweedfs/weed/pb/filer_pb"
  6. "github.com/seaweedfs/seaweedfs/weed/s3api/s3_constants"
  7. "github.com/seaweedfs/seaweedfs/weed/s3api/s3err"
  8. "github.com/seaweedfs/seaweedfs/weed/util"
  9. "net/http"
  10. "path/filepath"
  11. )
  12. func getAccountId(r *http.Request) string {
  13. id := r.Header.Get(s3_constants.AmzAccountId)
  14. if len(id) == 0 {
  15. return AccountAnonymous.Id
  16. } else {
  17. return id
  18. }
  19. }
  20. func (s3a *S3ApiServer) checkAccessByOwnership(r *http.Request, bucket string) s3err.ErrorCode {
  21. bucketMetadata, errCode := s3a.bucketRegistry.GetBucketMetadata(bucket)
  22. if errCode != s3err.ErrNone {
  23. return errCode
  24. }
  25. requestAccountId := getAccountId(r)
  26. if s3acl.ValidateAccount(requestAccountId, *bucketMetadata.Owner.ID) {
  27. return s3err.ErrNone
  28. }
  29. return s3err.ErrAccessDenied
  30. }
  31. // Check access for PutBucketAclHandler
  32. func (s3a *S3ApiServer) checkAccessForPutBucketAcl(requestAccountId, bucket string) (*BucketMetaData, s3err.ErrorCode) {
  33. bucketMetadata, errCode := s3a.bucketRegistry.GetBucketMetadata(bucket)
  34. if errCode != s3err.ErrNone {
  35. return nil, errCode
  36. }
  37. if bucketMetadata.ObjectOwnership == s3_constants.OwnershipBucketOwnerEnforced {
  38. return nil, s3err.AccessControlListNotSupported
  39. }
  40. if s3acl.ValidateAccount(requestAccountId, *bucketMetadata.Owner.ID) {
  41. return bucketMetadata, s3err.ErrNone
  42. }
  43. if len(bucketMetadata.Acl) > 0 {
  44. reqGrants := s3acl.DetermineRequiredGrants(requestAccountId, s3_constants.PermissionWriteAcp)
  45. for _, bucketGrant := range bucketMetadata.Acl {
  46. for _, reqGrant := range reqGrants {
  47. if s3acl.GrantEquals(bucketGrant, reqGrant) {
  48. return bucketMetadata, s3err.ErrNone
  49. }
  50. }
  51. }
  52. }
  53. glog.V(3).Infof("acl denied! request account id: %s", requestAccountId)
  54. return nil, s3err.ErrAccessDenied
  55. }
  56. func updateBucketEntry(s3a *S3ApiServer, entry *filer_pb.Entry) error {
  57. return s3a.updateEntry(s3a.option.BucketsPath, entry)
  58. }
  59. // Check Bucket/BucketAcl Read related access
  60. // includes:
  61. // - HeadBucketHandler
  62. // - GetBucketAclHandler
  63. // - ListObjectsV1Handler
  64. // - ListObjectsV2Handler
  65. // - ListMultipartUploadsHandler
  66. func (s3a *S3ApiServer) checkAccessForReadBucket(r *http.Request, bucket, aclAction string) (*BucketMetaData, s3err.ErrorCode) {
  67. bucketMetadata, errCode := s3a.bucketRegistry.GetBucketMetadata(bucket)
  68. if errCode != s3err.ErrNone {
  69. return nil, errCode
  70. }
  71. if bucketMetadata.ObjectOwnership == s3_constants.OwnershipBucketOwnerEnforced {
  72. return bucketMetadata, s3err.ErrNone
  73. }
  74. requestAccountId := s3acl.GetAccountId(r)
  75. if s3acl.ValidateAccount(requestAccountId, *bucketMetadata.Owner.ID) {
  76. return bucketMetadata, s3err.ErrNone
  77. }
  78. if len(bucketMetadata.Acl) > 0 {
  79. reqGrants := s3acl.DetermineRequiredGrants(requestAccountId, aclAction)
  80. for _, bucketGrant := range bucketMetadata.Acl {
  81. for _, reqGrant := range reqGrants {
  82. if s3acl.GrantEquals(bucketGrant, reqGrant) {
  83. return bucketMetadata, s3err.ErrNone
  84. }
  85. }
  86. }
  87. }
  88. glog.V(3).Infof("acl denied! request account id: %s", requestAccountId)
  89. return nil, s3err.ErrAccessDenied
  90. }
  91. // Check ObjectAcl-Read related access
  92. // includes:
  93. // - GetObjectAclHandler
  94. func (s3a *S3ApiServer) checkAccessForReadObjectAcl(r *http.Request, bucket, object string) (acp *s3.AccessControlPolicy, errCode s3err.ErrorCode) {
  95. bucketMetadata, errCode := s3a.bucketRegistry.GetBucketMetadata(bucket)
  96. if errCode != s3err.ErrNone {
  97. return nil, errCode
  98. }
  99. getAcpFunc := func() (*s3.AccessControlPolicy, s3err.ErrorCode) {
  100. entry, err := getObjectEntry(s3a, bucket, object)
  101. if err != nil {
  102. if err == filer_pb.ErrNotFound {
  103. return nil, s3err.ErrNoSuchKey
  104. } else {
  105. return nil, s3err.ErrInternalError
  106. }
  107. }
  108. if entry.IsDirectory {
  109. return nil, s3err.ErrExistingObjectIsDirectory
  110. }
  111. acpOwnerId := s3acl.GetAcpOwner(entry.Extended, *bucketMetadata.Owner.ID)
  112. acpOwnerName := s3a.accountManager.IdNameMapping[acpOwnerId]
  113. acpGrants := s3acl.GetAcpGrants(&acpOwnerId, entry.Extended)
  114. acp = &s3.AccessControlPolicy{
  115. Owner: &s3.Owner{
  116. ID: &acpOwnerId,
  117. DisplayName: &acpOwnerName,
  118. },
  119. Grants: acpGrants,
  120. }
  121. return acp, s3err.ErrNone
  122. }
  123. if bucketMetadata.ObjectOwnership == s3_constants.OwnershipBucketOwnerEnforced {
  124. return getAcpFunc()
  125. }
  126. requestAccountId := s3acl.GetAccountId(r)
  127. acp, errCode = getAcpFunc()
  128. if errCode != s3err.ErrNone {
  129. return nil, errCode
  130. }
  131. if s3acl.ValidateAccount(requestAccountId, *acp.Owner.ID) {
  132. return acp, s3err.ErrNone
  133. }
  134. if acp.Grants != nil {
  135. reqGrants := s3acl.DetermineRequiredGrants(requestAccountId, s3_constants.PermissionReadAcp)
  136. for _, requiredGrant := range reqGrants {
  137. for _, grant := range acp.Grants {
  138. if s3acl.GrantEquals(requiredGrant, grant) {
  139. return acp, s3err.ErrNone
  140. }
  141. }
  142. }
  143. }
  144. glog.V(3).Infof("CheckAccessForReadObjectAcl denied! request account id: %s", requestAccountId)
  145. return nil, s3err.ErrAccessDenied
  146. }
  147. // Check Object-Read related access
  148. // includes:
  149. // - GetObjectHandler
  150. //
  151. // offload object access validation to Filer layer
  152. // - s3acl.CheckObjectAccessForReadObject
  153. func (s3a *S3ApiServer) checkBucketAccessForReadObject(r *http.Request, bucket string) s3err.ErrorCode {
  154. bucketMetadata, errCode := s3a.bucketRegistry.GetBucketMetadata(bucket)
  155. if errCode != s3err.ErrNone {
  156. return errCode
  157. }
  158. if bucketMetadata.ObjectOwnership != s3_constants.OwnershipBucketOwnerEnforced {
  159. //offload object acl validation to filer layer
  160. _, defaultErrorCode := s3a.checkAccessForReadBucket(r, bucket, s3_constants.PermissionRead)
  161. if defaultErrorCode != s3err.ErrNone {
  162. r.Header.Set(s3_constants.XSeaweedFSHeaderAmzBucketAccessDenied, "true")
  163. }
  164. r.Header.Set(s3_constants.XSeaweedFSHeaderAmzBucketOwnerId, *bucketMetadata.Owner.ID)
  165. }
  166. return s3err.ErrNone
  167. }
  168. // Check ObjectAcl-Write related access
  169. // includes:
  170. // - PutObjectAclHandler
  171. func (s3a *S3ApiServer) checkAccessForWriteObjectAcl(r *http.Request, bucket, object string) (*filer_pb.Entry, string, []*s3.Grant, s3err.ErrorCode) {
  172. bucketMetadata, errCode := s3a.bucketRegistry.GetBucketMetadata(bucket)
  173. if errCode != s3err.ErrNone {
  174. return nil, "", nil, errCode
  175. }
  176. requestAccountId := s3acl.GetAccountId(r)
  177. reqOwnerId, grants, errCode := s3acl.ExtractObjectAcl(r, s3a.accountManager, bucketMetadata.ObjectOwnership, *bucketMetadata.Owner.ID, requestAccountId, false)
  178. if errCode != s3err.ErrNone {
  179. return nil, "", nil, errCode
  180. }
  181. if bucketMetadata.ObjectOwnership == s3_constants.OwnershipBucketOwnerEnforced {
  182. return nil, "", nil, s3err.AccessControlListNotSupported
  183. }
  184. //object acl
  185. objectEntry, err := getObjectEntry(s3a, bucket, object)
  186. if err != nil {
  187. if err == filer_pb.ErrNotFound {
  188. return nil, "", nil, s3err.ErrNoSuchKey
  189. }
  190. return nil, "", nil, s3err.ErrInternalError
  191. }
  192. if objectEntry.IsDirectory {
  193. return nil, "", nil, s3err.ErrExistingObjectIsDirectory
  194. }
  195. objectOwner := s3acl.GetAcpOwner(objectEntry.Extended, *bucketMetadata.Owner.ID)
  196. //object owner is immutable
  197. if reqOwnerId != "" && reqOwnerId != objectOwner {
  198. return nil, "", nil, s3err.ErrAccessDenied
  199. }
  200. if s3acl.ValidateAccount(requestAccountId, objectOwner) {
  201. return objectEntry, objectOwner, grants, s3err.ErrNone
  202. }
  203. objectGrants := s3acl.GetAcpGrants(nil, objectEntry.Extended)
  204. if objectGrants != nil {
  205. requiredGrants := s3acl.DetermineRequiredGrants(requestAccountId, s3_constants.PermissionWriteAcp)
  206. for _, objectGrant := range objectGrants {
  207. for _, requiredGrant := range requiredGrants {
  208. if s3acl.GrantEquals(objectGrant, requiredGrant) {
  209. return objectEntry, objectOwner, grants, s3err.ErrNone
  210. }
  211. }
  212. }
  213. }
  214. glog.V(3).Infof("checkAccessForWriteObjectAcl denied! request account id: %s", requestAccountId)
  215. return nil, "", nil, s3err.ErrAccessDenied
  216. }
  217. func updateObjectEntry(s3a *S3ApiServer, bucket, object string, entry *filer_pb.Entry) error {
  218. dir, _ := filepath.Split(object)
  219. return s3a.updateEntry(util.Join(s3a.option.BucketsPath, bucket, dir), entry)
  220. }
  221. // CheckAccessForPutObject Check ACL for PutObject API
  222. // includes:
  223. // - PutObjectHandler
  224. func (s3a *S3ApiServer) CheckAccessForPutObject(r *http.Request, bucket, object string) s3err.ErrorCode {
  225. accountId := s3acl.GetAccountId(r)
  226. return s3a.checkAccessForWriteObject(r, bucket, object, accountId)
  227. }
  228. // CheckAccessForPutObjectPartHandler Check Acl for Upload object part
  229. // includes:
  230. // - PutObjectPartHandler
  231. func (s3a *S3ApiServer) CheckAccessForPutObjectPartHandler(r *http.Request, bucket string) s3err.ErrorCode {
  232. bucketMetadata, errCode := s3a.bucketRegistry.GetBucketMetadata(bucket)
  233. if errCode != s3err.ErrNone {
  234. return errCode
  235. }
  236. if bucketMetadata.ObjectOwnership == s3_constants.OwnershipBucketOwnerEnforced {
  237. return s3err.ErrNone
  238. }
  239. accountId := s3acl.GetAccountId(r)
  240. if !CheckBucketAccess(accountId, bucketMetadata, s3_constants.PermissionWrite) {
  241. return s3err.ErrAccessDenied
  242. }
  243. return s3err.ErrNone
  244. }
  245. // CheckAccessForNewMultipartUpload Check Acl for API
  246. // includes:
  247. // - NewMultipartUploadHandler
  248. func (s3a *S3ApiServer) CheckAccessForNewMultipartUpload(r *http.Request, bucket, object string) (s3err.ErrorCode, string) {
  249. accountId := s3acl.GetAccountId(r)
  250. if accountId == IdentityAnonymous.AccountId {
  251. return s3err.ErrAccessDenied, ""
  252. }
  253. errCode := s3a.checkAccessForWriteObject(r, bucket, object, accountId)
  254. return errCode, accountId
  255. }
  256. func (s3a *S3ApiServer) CheckAccessForAbortMultipartUpload(r *http.Request, bucket, object string) s3err.ErrorCode {
  257. return s3a.CheckAccessWithBucketOwnerAndInitiator(r, bucket, object)
  258. }
  259. func (s3a *S3ApiServer) CheckAccessForCompleteMultipartUpload(r *http.Request, bucket, object string) s3err.ErrorCode {
  260. bucketMetadata, errCode := s3a.bucketRegistry.GetBucketMetadata(bucket)
  261. if errCode != s3err.ErrNone {
  262. return errCode
  263. }
  264. if bucketMetadata.ObjectOwnership != s3_constants.OwnershipBucketOwnerEnforced {
  265. accountId := getAccountId(r)
  266. if !CheckBucketAccess(accountId, bucketMetadata, s3_constants.PermissionWrite) {
  267. return s3err.ErrAccessDenied
  268. }
  269. }
  270. return s3err.ErrNone
  271. }
  272. func (s3a *S3ApiServer) CheckAccessForListMultipartUploadParts(r *http.Request, bucket, object string) s3err.ErrorCode {
  273. return s3a.CheckAccessWithBucketOwnerAndInitiator(r, bucket, object)
  274. }
  275. // CheckAccessWithBucketOwnerAndInitiator Check Access Permission with 'bucketOwner' and 'multipartUpload initiator'
  276. func (s3a *S3ApiServer) CheckAccessWithBucketOwnerAndInitiator(r *http.Request, bucket, object string) s3err.ErrorCode {
  277. bucketMetadata, errCode := s3a.bucketRegistry.GetBucketMetadata(bucket)
  278. if errCode != s3err.ErrNone {
  279. return errCode
  280. }
  281. //bucket access allowed
  282. accountId := s3acl.GetAccountId(r)
  283. if s3acl.ValidateAccount(*bucketMetadata.Owner.ID, accountId) {
  284. return s3err.ErrNone
  285. }
  286. //multipart initiator allowed
  287. entry, err := getMultipartUpload(s3a, bucket, object)
  288. if err != nil {
  289. if err != filer_pb.ErrNotFound {
  290. return s3err.ErrInternalError
  291. }
  292. } else {
  293. uploadInitiator, ok := entry.Extended[s3_constants.ExtAmzMultipartInitiator]
  294. if !ok || accountId == string(uploadInitiator) {
  295. return s3err.ErrNone
  296. }
  297. }
  298. glog.V(3).Infof("CheckAccessWithBucketOwnerAndInitiator denied! request account id: %s", accountId)
  299. return s3err.ErrAccessDenied
  300. }
  301. func (s3a *S3ApiServer) checkAccessForWriteObject(r *http.Request, bucket, object, requestAccountId string) s3err.ErrorCode {
  302. bucketMetadata, errCode := s3a.bucketRegistry.GetBucketMetadata(bucket)
  303. if errCode != s3err.ErrNone {
  304. return errCode
  305. }
  306. requestOwnerId, grants, errCode := s3acl.ExtractObjectAcl(r, s3a.accountManager, bucketMetadata.ObjectOwnership, *bucketMetadata.Owner.ID, requestAccountId, true)
  307. if errCode != s3err.ErrNone {
  308. return errCode
  309. }
  310. if bucketMetadata.ObjectOwnership == s3_constants.OwnershipBucketOwnerEnforced {
  311. return s3err.ErrNone
  312. }
  313. if !CheckBucketAccess(requestAccountId, bucketMetadata, s3_constants.PermissionWrite) {
  314. return s3err.ErrAccessDenied
  315. }
  316. if requestOwnerId == "" {
  317. requestOwnerId = requestAccountId
  318. }
  319. entry, err := getObjectEntry(s3a, bucket, object)
  320. if err != nil {
  321. if err == filer_pb.ErrNotFound {
  322. s3acl.SetAcpOwnerHeader(r, requestOwnerId)
  323. s3acl.SetAcpGrantsHeader(r, grants)
  324. return s3err.ErrNone
  325. }
  326. return s3err.ErrInternalError
  327. }
  328. objectOwnerId := s3acl.GetAcpOwner(entry.Extended, *bucketMetadata.Owner.ID)
  329. //object owner is immutable
  330. if !s3acl.ValidateAccount(requestOwnerId, objectOwnerId, *bucketMetadata.Owner.ID) {
  331. return s3err.ErrAccessDenied
  332. }
  333. s3acl.SetAcpOwnerHeader(r, objectOwnerId)
  334. s3acl.SetAcpGrantsHeader(r, grants)
  335. return s3err.ErrNone
  336. }
  337. func CheckBucketAccess(requestAccountId string, bucketMetadata *BucketMetaData, permission string) bool {
  338. if s3acl.ValidateAccount(requestAccountId, *bucketMetadata.Owner.ID) {
  339. return true
  340. } else {
  341. if len(bucketMetadata.Acl) > 0 {
  342. reqGrants := s3acl.DetermineRequiredGrants(requestAccountId, permission)
  343. for _, bucketGrant := range bucketMetadata.Acl {
  344. for _, requiredGrant := range reqGrants {
  345. if s3acl.GrantEquals(bucketGrant, requiredGrant) {
  346. return true
  347. }
  348. }
  349. }
  350. }
  351. }
  352. glog.V(3).Infof("CheckBucketAccess denied! request account id: %s", requestAccountId)
  353. return false
  354. }
  355. func getObjectEntry(s3a *S3ApiServer, bucket, object string) (*filer_pb.Entry, error) {
  356. return s3a.getEntry(util.Join(s3a.option.BucketsPath, bucket), object)
  357. }
  358. func getMultipartUpload(s3a *S3ApiServer, bucket, object string) (*filer_pb.Entry, error) {
  359. return s3a.getEntry(s3a.genUploadsFolder(bucket), object)
  360. }