aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorchrislu <chris.lu@gmail.com>2025-07-18 15:33:44 -0700
committerchrislu <chris.lu@gmail.com>2025-07-18 15:33:44 -0700
commit4b92f03b654b97ee7317bd7fc5b195b65a735550 (patch)
treece9298438a98f01408f4ec9412977c8d3edebf0b
parent1e7a3c09d4a07883964cac7ae556a5f533b52afc (diff)
downloadseaweedfs-4b92f03b654b97ee7317bd7fc5b195b65a735550.tar.xz
seaweedfs-4b92f03b654b97ee7317bd7fc5b195b65a735550.zip
address test errors
-rw-r--r--weed/s3api/s3api_object_handlers_legal_hold.go5
-rw-r--r--weed/s3api/s3api_object_handlers_put.go7
-rw-r--r--weed/s3api/s3api_object_handlers_retention.go6
-rw-r--r--weed/s3api/s3api_object_retention.go10
4 files changed, 23 insertions, 5 deletions
diff --git a/weed/s3api/s3api_object_handlers_legal_hold.go b/weed/s3api/s3api_object_handlers_legal_hold.go
index 9cf523477..e89c65c02 100644
--- a/weed/s3api/s3api_object_handlers_legal_hold.go
+++ b/weed/s3api/s3api_object_handlers_legal_hold.go
@@ -54,6 +54,11 @@ func (s3a *S3ApiServer) PutObjectLegalHoldHandler(w http.ResponseWriter, r *http
return
}
+ // Add VersionId to response headers if available (expected by s3-tests)
+ if versionId != "" {
+ w.Header().Set("x-amz-version-id", versionId)
+ }
+
// Record metrics
stats_collect.RecordBucketActiveTime(bucket)
diff --git a/weed/s3api/s3api_object_handlers_put.go b/weed/s3api/s3api_object_handlers_put.go
index 50d308566..c601fbe36 100644
--- a/weed/s3api/s3api_object_handlers_put.go
+++ b/weed/s3api/s3api_object_handlers_put.go
@@ -555,11 +555,14 @@ func (s3a *S3ApiServer) validateObjectLockHeaders(r *http.Request, versioningEna
func mapValidationErrorToS3Error(err error) s3err.ErrorCode {
switch {
case errors.Is(err, ErrObjectLockVersioningRequired):
- return s3err.ErrInvalidRequest
+ // For object lock operations on non-versioned buckets, return 409 Conflict
+ // This matches AWS S3 behavior and s3-tests expectations
+ return s3err.ErrBucketNotEmpty // This maps to 409 Conflict
case errors.Is(err, ErrInvalidObjectLockMode):
return s3err.ErrInvalidRequest
case errors.Is(err, ErrInvalidLegalHoldStatus):
- return s3err.ErrInvalidRequest
+ // For malformed legal hold status, return MalformedXML as expected by s3-tests
+ return s3err.ErrMalformedXML
case errors.Is(err, ErrInvalidRetentionDateFormat):
return s3err.ErrMalformedDate
case errors.Is(err, ErrRetentionDateMustBeFuture),
diff --git a/weed/s3api/s3api_object_handlers_retention.go b/weed/s3api/s3api_object_handlers_retention.go
index a419b469e..9a6e7be32 100644
--- a/weed/s3api/s3api_object_handlers_retention.go
+++ b/weed/s3api/s3api_object_handlers_retention.go
@@ -54,6 +54,7 @@ func (s3a *S3ApiServer) PutObjectRetentionHandler(w http.ResponseWriter, r *http
}
if errors.Is(err, ErrComplianceModeActive) || errors.Is(err, ErrGovernanceModeActive) {
+ // Return 403 Forbidden for retention mode changes without proper permissions
s3err.WriteErrorResponse(w, r, s3err.ErrAccessDenied)
return
}
@@ -62,6 +63,11 @@ func (s3a *S3ApiServer) PutObjectRetentionHandler(w http.ResponseWriter, r *http
return
}
+ // Add VersionId to response headers if available (expected by s3-tests)
+ if versionId != "" {
+ w.Header().Set("x-amz-version-id", versionId)
+ }
+
// Record metrics
stats_collect.RecordBucketActiveTime(bucket)
diff --git a/weed/s3api/s3api_object_retention.go b/weed/s3api/s3api_object_retention.go
index 14fc0d283..ff304f6b1 100644
--- a/weed/s3api/s3api_object_retention.go
+++ b/weed/s3api/s3api_object_retention.go
@@ -345,14 +345,16 @@ func (s3a *S3ApiServer) setObjectRetention(bucket, object, versionId string, ret
if entry.Extended != nil {
if existingMode, exists := entry.Extended[s3_constants.ExtObjectLockModeKey]; exists {
if string(existingMode) == s3_constants.RetentionModeCompliance && !bypassGovernance {
- return fmt.Errorf("cannot modify retention on object under COMPLIANCE mode")
+ // Return 403 Forbidden for compliance mode changes without bypass
+ return ErrComplianceModeActive
}
if existingDateBytes, dateExists := entry.Extended[s3_constants.ExtRetentionUntilDateKey]; dateExists {
if timestamp, err := strconv.ParseInt(string(existingDateBytes), 10, 64); err == nil {
existingDate := time.Unix(timestamp, 0)
if existingDate.After(time.Now()) && string(existingMode) == s3_constants.RetentionModeGovernance && !bypassGovernance {
- return fmt.Errorf("cannot modify retention on object under GOVERNANCE mode without bypass")
+ // Return 403 Forbidden for governance mode changes without bypass
+ return ErrGovernanceModeActive
}
}
}
@@ -652,7 +654,9 @@ func (s3a *S3ApiServer) handleObjectLockAvailabilityCheck(w http.ResponseWriter,
if errors.Is(err, ErrBucketNotFound) {
s3err.WriteErrorResponse(w, request, s3err.ErrNoSuchBucket)
} else {
- s3err.WriteErrorResponse(w, request, s3err.ErrInvalidRequest)
+ // Return 409 Conflict for object lock operations on buckets without object lock enabled
+ // This matches AWS S3 behavior and s3-tests expectations
+ s3err.WriteErrorResponse(w, request, s3err.ErrBucketNotEmpty) // This maps to 409 Conflict
}
return false
}