diff options
| author | Chris Lu <chrislusf@users.noreply.github.com> | 2025-07-18 02:19:50 -0700 |
|---|---|---|
| committer | GitHub <noreply@github.com> | 2025-07-18 02:19:50 -0700 |
| commit | c6a22ce43a3c0318b7c6841bcbf97937fd11e27c (patch) | |
| tree | fd027c20f547e1be7f550c96c1e5935f2579c4ca /weed/s3api/s3api_object_handlers_put.go | |
| parent | 69553e5ba6d46ed924b0c3adc3f8d9666550999a (diff) | |
| download | seaweedfs-c6a22ce43a3c0318b7c6841bcbf97937fd11e27c.tar.xz seaweedfs-c6a22ce43a3c0318b7c6841bcbf97937fd11e27c.zip | |
Fix get object lock configuration handler (#6996)
* fix GetObjectLockConfigurationHandler
* cache and use bucket object lock config
* subscribe to bucket configuration changes
* increase bucket config cache TTL
* refactor
* Update weed/s3api/s3api_server.go
Co-authored-by: gemini-code-assist[bot] <176961590+gemini-code-assist[bot]@users.noreply.github.com>
* avoid duplidated work
* rename variable
* Update s3api_object_handlers_put.go
* fix routing
* admin ui and api handler are consistent now
* use fields instead of xml
* fix test
* address comments
* Update weed/s3api/s3api_object_handlers_put.go
Co-authored-by: Copilot <175728472+Copilot@users.noreply.github.com>
* Update test/s3/retention/s3_retention_test.go
Co-authored-by: Copilot <175728472+Copilot@users.noreply.github.com>
* Update weed/s3api/object_lock_utils.go
Co-authored-by: Copilot <175728472+Copilot@users.noreply.github.com>
* change error style
* errorf
---------
Co-authored-by: gemini-code-assist[bot] <176961590+gemini-code-assist[bot]@users.noreply.github.com>
Co-authored-by: Copilot <175728472+Copilot@users.noreply.github.com>
Diffstat (limited to 'weed/s3api/s3api_object_handlers_put.go')
| -rw-r--r-- | weed/s3api/s3api_object_handlers_put.go | 103 |
1 files changed, 91 insertions, 12 deletions
diff --git a/weed/s3api/s3api_object_handlers_put.go b/weed/s3api/s3api_object_handlers_put.go index 1d9fe9f92..50d308566 100644 --- a/weed/s3api/s3api_object_handlers_put.go +++ b/weed/s3api/s3api_object_handlers_put.go @@ -12,12 +12,11 @@ import ( "time" "github.com/pquerna/cachecontrol/cacheobject" + "github.com/seaweedfs/seaweedfs/weed/glog" + "github.com/seaweedfs/seaweedfs/weed/pb/filer_pb" "github.com/seaweedfs/seaweedfs/weed/s3api/s3_constants" "github.com/seaweedfs/seaweedfs/weed/s3api/s3err" "github.com/seaweedfs/seaweedfs/weed/security" - - "github.com/seaweedfs/seaweedfs/weed/glog" - "github.com/seaweedfs/seaweedfs/weed/pb/filer_pb" weed_server "github.com/seaweedfs/seaweedfs/weed/server" stats_collect "github.com/seaweedfs/seaweedfs/weed/stats" ) @@ -32,6 +31,8 @@ var ( ErrObjectLockModeRequiresDate = errors.New("object lock mode requires retention until date") ErrRetentionDateRequiresMode = errors.New("retention until date requires object lock mode") ErrGovernanceBypassVersioningRequired = errors.New("governance bypass header can only be used on versioned buckets") + ErrInvalidObjectLockDuration = errors.New("object lock duration must be greater than 0 days") + ErrObjectLockDurationExceeded = errors.New("object lock duration exceeds maximum allowed days") ) func (s3a *S3ApiServer) PutObjectHandler(w http.ResponseWriter, r *http.Request) { @@ -374,28 +375,30 @@ func (s3a *S3ApiServer) updateLatestVersionInDirectory(bucket, object, versionId } // extractObjectLockMetadataFromRequest extracts object lock headers from PUT requests -// and stores them in the entry's Extended attributes +// and applies bucket default retention if no explicit retention is provided func (s3a *S3ApiServer) extractObjectLockMetadataFromRequest(r *http.Request, entry *filer_pb.Entry) error { if entry.Extended == nil { entry.Extended = make(map[string][]byte) } - // Extract object lock mode (GOVERNANCE or COMPLIANCE) - if mode := r.Header.Get(s3_constants.AmzObjectLockMode); mode != "" { - entry.Extended[s3_constants.ExtObjectLockModeKey] = []byte(mode) - glog.V(2).Infof("extractObjectLockMetadataFromRequest: storing object lock mode: %s", mode) + // Extract explicit object lock mode (GOVERNANCE or COMPLIANCE) + explicitMode := r.Header.Get(s3_constants.AmzObjectLockMode) + if explicitMode != "" { + entry.Extended[s3_constants.ExtObjectLockModeKey] = []byte(explicitMode) + glog.V(2).Infof("extractObjectLockMetadataFromRequest: storing explicit object lock mode: %s", explicitMode) } - // Extract retention until date - if retainUntilDate := r.Header.Get(s3_constants.AmzObjectLockRetainUntilDate); retainUntilDate != "" { + // Extract explicit retention until date + explicitRetainUntilDate := r.Header.Get(s3_constants.AmzObjectLockRetainUntilDate) + if explicitRetainUntilDate != "" { // Parse the ISO8601 date and convert to Unix timestamp for storage - parsedTime, err := time.Parse(time.RFC3339, retainUntilDate) + parsedTime, err := time.Parse(time.RFC3339, explicitRetainUntilDate) if err != nil { glog.Errorf("extractObjectLockMetadataFromRequest: failed to parse retention until date, expected format: %s, error: %v", time.RFC3339, err) return ErrInvalidRetentionDateFormat } entry.Extended[s3_constants.ExtRetentionUntilDateKey] = []byte(strconv.FormatInt(parsedTime.Unix(), 10)) - glog.V(2).Infof("extractObjectLockMetadataFromRequest: storing retention until date (timestamp: %d)", parsedTime.Unix()) + glog.V(2).Infof("extractObjectLockMetadataFromRequest: storing explicit retention until date (timestamp: %d)", parsedTime.Unix()) } // Extract legal hold status @@ -410,6 +413,78 @@ func (s3a *S3ApiServer) extractObjectLockMetadataFromRequest(r *http.Request, en } } + // Apply bucket default retention if no explicit retention was provided + // This implements AWS S3 behavior where bucket default retention automatically applies to new objects + if explicitMode == "" && explicitRetainUntilDate == "" { + bucket, _ := s3_constants.GetBucketAndObject(r) + if err := s3a.applyBucketDefaultRetention(bucket, entry); err != nil { + glog.V(2).Infof("extractObjectLockMetadataFromRequest: skipping bucket default retention for %s: %v", bucket, err) + // Don't fail the upload if default retention can't be applied - this matches AWS behavior + } + } + + return nil +} + +// applyBucketDefaultRetention applies bucket default retention settings to a new object +// This implements AWS S3 behavior where bucket default retention automatically applies to new objects +// when no explicit retention headers are provided in the upload request +func (s3a *S3ApiServer) applyBucketDefaultRetention(bucket string, entry *filer_pb.Entry) error { + // Safety check - if bucket config cache is not available, skip default retention + if s3a.bucketConfigCache == nil { + return nil + } + + // Get bucket configuration (getBucketConfig handles caching internally) + bucketConfig, errCode := s3a.getBucketConfig(bucket) + if errCode != s3err.ErrNone { + return fmt.Errorf("failed to get bucket config: %v", errCode) + } + + // Check if bucket has cached Object Lock configuration + if bucketConfig.ObjectLockConfig == nil { + return nil // No Object Lock configuration + } + + objectLockConfig := bucketConfig.ObjectLockConfig + + // Check if there's a default retention rule + if objectLockConfig.Rule == nil || objectLockConfig.Rule.DefaultRetention == nil { + return nil // No default retention configured + } + + defaultRetention := objectLockConfig.Rule.DefaultRetention + + // Validate default retention has required fields + if defaultRetention.Mode == "" { + return fmt.Errorf("default retention missing mode") + } + + if defaultRetention.Days == 0 && defaultRetention.Years == 0 { + return fmt.Errorf("default retention missing period") + } + + // Calculate retention until date based on default retention period + var retainUntilDate time.Time + now := time.Now() + + if defaultRetention.Days > 0 { + retainUntilDate = now.AddDate(0, 0, defaultRetention.Days) + } else if defaultRetention.Years > 0 { + retainUntilDate = now.AddDate(defaultRetention.Years, 0, 0) + } + + // Apply default retention to the object + if entry.Extended == nil { + entry.Extended = make(map[string][]byte) + } + + entry.Extended[s3_constants.ExtObjectLockModeKey] = []byte(defaultRetention.Mode) + entry.Extended[s3_constants.ExtRetentionUntilDateKey] = []byte(strconv.FormatInt(retainUntilDate.Unix(), 10)) + + glog.V(2).Infof("applyBucketDefaultRetention: applied default retention %s until %s for bucket %s", + defaultRetention.Mode, retainUntilDate.Format(time.RFC3339), bucket) + return nil } @@ -493,6 +568,10 @@ func mapValidationErrorToS3Error(err error) s3err.ErrorCode { return s3err.ErrInvalidRequest case errors.Is(err, ErrGovernanceBypassVersioningRequired): return s3err.ErrInvalidRequest + case errors.Is(err, ErrInvalidObjectLockDuration): + return s3err.ErrInvalidRequest + case errors.Is(err, ErrObjectLockDurationExceeded): + return s3err.ErrInvalidRequest default: return s3err.ErrInvalidRequest } |
