|
|
|
@ -53,7 +53,7 @@ func (s3a *S3ApiServer) DeleteObjectHandler(w http.ResponseWriter, r *http.Reque |
|
|
|
// Handle versioned delete
|
|
|
|
if versionId != "" { |
|
|
|
// Check object lock permissions before deleting specific version
|
|
|
|
bypassGovernance := r.Header.Get("x-amz-bypass-governance-retention") == "true" |
|
|
|
bypassGovernance := s3a.validateGovernanceBypass(r, bucket, object) |
|
|
|
if err := s3a.checkObjectLockPermissions(r, bucket, object, versionId, bypassGovernance); err != nil { |
|
|
|
glog.V(2).Infof("DeleteObjectHandler: object lock check failed for %s/%s: %v", bucket, object, err) |
|
|
|
s3err.WriteErrorResponse(w, r, s3err.ErrAccessDenied) |
|
|
|
@ -71,7 +71,16 @@ func (s3a *S3ApiServer) DeleteObjectHandler(w http.ResponseWriter, r *http.Reque |
|
|
|
// Set version ID in response header
|
|
|
|
w.Header().Set("x-amz-version-id", versionId) |
|
|
|
} else { |
|
|
|
// Create delete marker (logical delete) - this is NOT blocked by object lock retention
|
|
|
|
// Check object lock permissions before creating delete marker
|
|
|
|
// AWS S3 behavior: delete operations fail if latest version has retention protection
|
|
|
|
bypassGovernance := s3a.validateGovernanceBypass(r, bucket, object) |
|
|
|
if err := s3a.checkObjectLockPermissions(r, bucket, object, "", bypassGovernance); err != nil { |
|
|
|
glog.V(2).Infof("DeleteObjectHandler: object lock check failed for %s/%s: %v", bucket, object, err) |
|
|
|
s3err.WriteErrorResponse(w, r, s3err.ErrAccessDenied) |
|
|
|
return |
|
|
|
} |
|
|
|
|
|
|
|
// Create delete marker (logical delete)
|
|
|
|
deleteMarkerVersionId, err := s3a.createDeleteMarker(bucket, object) |
|
|
|
if err != nil { |
|
|
|
glog.Errorf("Failed to create delete marker: %v", err) |
|
|
|
@ -85,6 +94,14 @@ func (s3a *S3ApiServer) DeleteObjectHandler(w http.ResponseWriter, r *http.Reque |
|
|
|
} |
|
|
|
} else { |
|
|
|
// Handle regular delete (non-versioned)
|
|
|
|
// Check object lock permissions before deleting object
|
|
|
|
bypassGovernance := s3a.validateGovernanceBypass(r, bucket, object) |
|
|
|
if err := s3a.checkObjectLockPermissions(r, bucket, object, "", bypassGovernance); err != nil { |
|
|
|
glog.V(2).Infof("DeleteObjectHandler: object lock check failed for %s/%s: %v", bucket, object, err) |
|
|
|
s3err.WriteErrorResponse(w, r, s3err.ErrAccessDenied) |
|
|
|
return |
|
|
|
} |
|
|
|
|
|
|
|
target := util.FullPath(fmt.Sprintf("%s/%s%s", s3a.option.BucketsPath, bucket, object)) |
|
|
|
dir, name := target.DirAndName() |
|
|
|
|
|
|
|
@ -191,9 +208,6 @@ func (s3a *S3ApiServer) DeleteMultipleObjectsHandler(w http.ResponseWriter, r *h |
|
|
|
auditLog = s3err.GetAccessLog(r, http.StatusNoContent, s3err.ErrNone) |
|
|
|
} |
|
|
|
|
|
|
|
// Check for bypass governance retention header
|
|
|
|
bypassGovernance := r.Header.Get("x-amz-bypass-governance-retention") == "true" |
|
|
|
|
|
|
|
// Check if versioning is enabled for the bucket (needed for object lock checks)
|
|
|
|
versioningEnabled, err := s3a.isVersioningEnabled(bucket) |
|
|
|
if err != nil { |
|
|
|
@ -216,6 +230,8 @@ func (s3a *S3ApiServer) DeleteMultipleObjectsHandler(w http.ResponseWriter, r *h |
|
|
|
|
|
|
|
// Check object lock permissions before deletion (only for versioned buckets)
|
|
|
|
if versioningEnabled { |
|
|
|
// Validate governance bypass for this specific object
|
|
|
|
bypassGovernance := s3a.validateGovernanceBypass(r, bucket, object.Key) |
|
|
|
if err := s3a.checkObjectLockPermissions(r, bucket, object.Key, object.VersionId, bypassGovernance); err != nil { |
|
|
|
glog.V(2).Infof("DeleteMultipleObjectsHandler: object lock check failed for %s/%s (version: %s): %v", bucket, object.Key, object.VersionId, err) |
|
|
|
deleteErrors = append(deleteErrors, DeleteError{ |
|
|
|
|