You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

109 lines
3.3 KiB

  1. package s3api
  2. import (
  3. "github.com/seaweedfs/seaweedfs/weed/glog"
  4. "github.com/seaweedfs/seaweedfs/weed/pb/filer_pb"
  5. "github.com/seaweedfs/seaweedfs/weed/s3api/s3_constants"
  6. "github.com/seaweedfs/seaweedfs/weed/s3api/s3account"
  7. "github.com/seaweedfs/seaweedfs/weed/s3api/s3acl"
  8. "github.com/seaweedfs/seaweedfs/weed/s3api/s3err"
  9. "github.com/seaweedfs/seaweedfs/weed/util"
  10. "net/http"
  11. "path/filepath"
  12. )
  13. func getAccountId(r *http.Request) string {
  14. id := r.Header.Get(s3_constants.AmzAccountId)
  15. if len(id) == 0 {
  16. return s3account.AccountAnonymous.Id
  17. } else {
  18. return id
  19. }
  20. }
  21. func (s3a *S3ApiServer) checkAccessByOwnership(r *http.Request, bucket string) s3err.ErrorCode {
  22. metadata, errCode := s3a.bucketRegistry.GetBucketMetadata(bucket)
  23. if errCode != s3err.ErrNone {
  24. return errCode
  25. }
  26. accountId := getAccountId(r)
  27. if accountId == s3account.AccountAdmin.Id || accountId == *metadata.Owner.ID {
  28. return s3err.ErrNone
  29. }
  30. return s3err.ErrAccessDenied
  31. }
  32. // Check ObjectAcl-Write related access
  33. // includes:
  34. // - PutObjectAclHandler
  35. func (s3a *S3ApiServer) checkAccessForWriteObjectAcl(accountId, bucket, object string) (bucketMetadata *BucketMetaData, objectEntry *filer_pb.Entry, objectOwner string, errCode s3err.ErrorCode) {
  36. bucketMetadata, errCode = s3a.bucketRegistry.GetBucketMetadata(bucket)
  37. if errCode != s3err.ErrNone {
  38. return nil, nil, "", errCode
  39. }
  40. if bucketMetadata.ObjectOwnership == s3_constants.OwnershipBucketOwnerEnforced {
  41. return nil, nil, "", s3err.AccessControlListNotSupported
  42. }
  43. //bucket acl
  44. bucketAclAllowed := false
  45. reqGrants := s3acl.DetermineReqGrants(accountId, s3_constants.PermissionWrite)
  46. if accountId == *bucketMetadata.Owner.ID {
  47. bucketAclAllowed = true
  48. } else if bucketMetadata.Acl != nil {
  49. bucketLoop:
  50. for _, bucketGrant := range bucketMetadata.Acl {
  51. for _, requiredGrant := range reqGrants {
  52. if s3acl.GrantEquals(bucketGrant, requiredGrant) {
  53. bucketAclAllowed = true
  54. break bucketLoop
  55. }
  56. }
  57. }
  58. }
  59. if !bucketAclAllowed {
  60. return nil, nil, "", s3err.ErrAccessDenied
  61. }
  62. //object acl
  63. objectEntry, err := getObjectEntry(s3a, bucket, object)
  64. if err != nil {
  65. if err == filer_pb.ErrNotFound {
  66. return nil, nil, "", s3err.ErrNoSuchKey
  67. }
  68. return nil, nil, "", s3err.ErrInternalError
  69. }
  70. if objectEntry.IsDirectory {
  71. return nil, nil, "", s3err.ErrExistingObjectIsDirectory
  72. }
  73. objectOwner = s3acl.GetAcpOwner(objectEntry.Extended, *bucketMetadata.Owner.ID)
  74. if accountId == objectOwner {
  75. return bucketMetadata, objectEntry, objectOwner, s3err.ErrNone
  76. }
  77. objectGrants := s3acl.GetAcpGrants(objectEntry.Extended)
  78. if objectGrants != nil {
  79. for _, objectGrant := range objectGrants {
  80. for _, requiredGrant := range reqGrants {
  81. if s3acl.GrantEquals(objectGrant, requiredGrant) {
  82. return bucketMetadata, objectEntry, objectOwner, s3err.ErrNone
  83. }
  84. }
  85. }
  86. }
  87. glog.V(3).Infof("acl denied! request account id: %s", accountId)
  88. return nil, nil, "", s3err.ErrAccessDenied
  89. }
  90. func getObjectEntry(s3a *S3ApiServer, bucket, object string) (*filer_pb.Entry, error) {
  91. return s3a.getEntry(util.Join(s3a.option.BucketsPath, bucket), object)
  92. }
  93. func updateObjectEntry(s3a *S3ApiServer, bucket, object string, entry *filer_pb.Entry) error {
  94. dir, _ := filepath.Split(object)
  95. return s3a.updateEntry(util.Join(s3a.option.BucketsPath, bucket, dir), entry)
  96. }