Browse Source

s3api: fix multipart Complete ETag matching and lower empty-upload log noise (#8264)

s3api: fix multipart part etag validation and reduce empty upload warning noise
pull/8265/head
Chris Lu 2 days ago
committed by GitHub
parent
commit
59b02e0cba
No known key found for this signature in database GPG Key ID: B5690EEEBB952194
  1. 4
      weed/operation/upload_chunked.go
  2. 33
      weed/s3api/filer_multipart.go
  3. 58
      weed/s3api/filer_multipart_test.go

4
weed/operation/upload_chunked.go

@ -113,7 +113,9 @@ uploadLoop:
// Only break if we've already read some data (chunkOffset > 0) or if this is truly EOF
if dataSize == 0 {
if chunkOffset == 0 {
glog.Warningf("UploadReaderInChunks: received 0 bytes on first read - creating empty file")
// Empty objects are valid for S3/HTTP uploads (e.g. zero-byte files).
// Keep this at verbose level to avoid warning noise in normal operation.
glog.V(4).Infof("UploadReaderInChunks: received 0 bytes on first read - creating empty file")
}
chunkBufferPool.Put(bytesBuffer)
<-bytesBufferLimitChan

33
weed/s3api/filer_multipart.go

@ -243,17 +243,16 @@ func (s3a *S3ApiServer) completeMultipartUpload(r *http.Request, input *s3.Compl
continue
}
for _, partETag := range completedPartsByNumber {
partETag = strings.Trim(partETag, `"`)
entryETag := hex.EncodeToString(entry.Attributes.GetMd5())
if partETag != "" && len(partETag) == 32 && entryETag != "" {
if entryETag != partETag {
glog.Errorf("completeMultipartUpload %s ETag mismatch chunk: %s part: %s", entry.Name, entryETag, partETag)
stats.S3HandlerCounter.WithLabelValues(stats.ErrorCompletedEtagMismatch).Inc()
continue
}
} else {
glog.Warningf("invalid complete etag %s, partEtag %s", partETag, entryETag)
match, invalid, normalizedPartETag, normalizedEntryETag := validateCompletePartETag(partETag, entry)
if invalid {
glog.Warningf("invalid complete etag %s, storedEtag %s", normalizedPartETag, normalizedEntryETag)
stats.S3HandlerCounter.WithLabelValues(stats.ErrorCompletedEtagInvalid).Inc()
continue
}
if !match {
glog.Errorf("completeMultipartUpload %s ETag mismatch stored: %s part: %s", entry.Name, normalizedEntryETag, normalizedPartETag)
stats.S3HandlerCounter.WithLabelValues(stats.ErrorCompletedEtagMismatch).Inc()
continue
}
if len(entry.Chunks) == 0 && partNumber != maxPartNo {
glog.Warningf("completeMultipartUpload %s empty chunks", entry.Name)
@ -1001,3 +1000,17 @@ func getEtagFromEntry(entry *filer_pb.Entry) string {
glog.V(4).Infof("getEtagFromEntry: fallback to filer.ETag for %s: %s, chunkCount: %d", entryName, etag, len(entry.Chunks))
return "\"" + etag + "\""
}
func validateCompletePartETag(partETag string, entry *filer_pb.Entry) (match bool, invalid bool, normalizedPartETag string, normalizedEntryETag string) {
normalizedPartETag = strings.Trim(strings.TrimSpace(partETag), `"`)
if normalizedPartETag == "" {
return false, true, normalizedPartETag, ""
}
normalizedEntryETag = strings.Trim(getEtagFromEntry(entry), `"`)
if normalizedEntryETag == "" {
return false, true, normalizedPartETag, normalizedEntryETag
}
return normalizedPartETag == normalizedEntryETag, false, normalizedPartETag, normalizedEntryETag
}

58
weed/s3api/filer_multipart_test.go

@ -1,11 +1,14 @@
package s3api
import (
"encoding/hex"
"testing"
"time"
"github.com/aws/aws-sdk-go/aws"
"github.com/aws/aws-sdk-go/service/s3"
"github.com/seaweedfs/seaweedfs/weed/pb/filer_pb"
"github.com/seaweedfs/seaweedfs/weed/s3api/s3_constants"
"github.com/seaweedfs/seaweedfs/weed/s3api/s3err"
"github.com/stretchr/testify/assert"
)
@ -132,3 +135,58 @@ func TestGetEntryNameAndDir(t *testing.T) {
})
}
}
func TestValidateCompletePartETag(t *testing.T) {
t.Run("matches_composite_etag_from_extended", func(t *testing.T) {
entry := &filer_pb.Entry{
Extended: map[string][]byte{
s3_constants.ExtETagKey: []byte("ea58527f14c6ae0dd53089966e44941b-2"),
},
Attributes: &filer_pb.FuseAttributes{},
}
match, invalid, part, stored := validateCompletePartETag(`"ea58527f14c6ae0dd53089966e44941b-2"`, entry)
assert.True(t, match)
assert.False(t, invalid)
assert.Equal(t, "ea58527f14c6ae0dd53089966e44941b-2", part)
assert.Equal(t, "ea58527f14c6ae0dd53089966e44941b-2", stored)
})
t.Run("matches_md5_from_attributes", func(t *testing.T) {
md5Bytes, err := hex.DecodeString("324b2665939fde5b8678d3a8b5c46970")
assert.NoError(t, err)
entry := &filer_pb.Entry{
Attributes: &filer_pb.FuseAttributes{
Md5: md5Bytes,
},
}
match, invalid, part, stored := validateCompletePartETag("324b2665939fde5b8678d3a8b5c46970", entry)
assert.True(t, match)
assert.False(t, invalid)
assert.Equal(t, "324b2665939fde5b8678d3a8b5c46970", part)
assert.Equal(t, "324b2665939fde5b8678d3a8b5c46970", stored)
})
t.Run("detects_mismatch", func(t *testing.T) {
entry := &filer_pb.Entry{
Extended: map[string][]byte{
s3_constants.ExtETagKey: []byte("67fdd2e302502ff9f9b606bc036e6892-2"),
},
Attributes: &filer_pb.FuseAttributes{},
}
match, invalid, _, _ := validateCompletePartETag("686f7d71bacdcd539dd4e17a0d7f1e5f-2", entry)
assert.False(t, match)
assert.False(t, invalid)
})
t.Run("flags_empty_client_etag_as_invalid", func(t *testing.T) {
entry := &filer_pb.Entry{
Extended: map[string][]byte{
s3_constants.ExtETagKey: []byte("67fdd2e302502ff9f9b606bc036e6892-2"),
},
Attributes: &filer_pb.FuseAttributes{},
}
match, invalid, _, _ := validateCompletePartETag(`""`, entry)
assert.False(t, match)
assert.True(t, invalid)
})
}
Loading…
Cancel
Save