fix(s3): improve S3 API compatibility for versioning, SSE, and policy (#2013)

This commit is contained in:
安正超
2026-03-01 02:21:13 +08:00
committed by GitHub
parent 0701e1c35f
commit fe884eabfc
7 changed files with 75 additions and 31 deletions

View File

@@ -168,17 +168,28 @@ impl DefaultBucketUsecase {
counter!("rustfs_create_bucket_total").increment(1);
store
let make_result = store
.make_bucket(
&bucket,
&MakeBucketOptions {
force_create: false, // TODO: force support
force_create: false,
lock_enabled: object_lock_enabled_for_bucket.is_some_and(|v| v),
..Default::default()
},
)
.await
.map_err(ApiError::from)?;
.await;
match make_result {
Ok(()) => {}
Err(StorageError::BucketExists(_)) => {
// Per S3 spec: CreateBucket for a bucket you already own returns 200 OK
let output = CreateBucketOutput::default();
let result = Ok(S3Response::new(output));
let _ = helper.complete(&result);
return result;
}
Err(e) => return Err(ApiError::from(e).into()),
}
let owner = default_owner();
let mut stored_acl = stored_acl_from_grant_headers(

View File

@@ -625,18 +625,27 @@ impl DefaultMultipartUsecase {
return Err(ApiError::from(StorageError::other(format!("add_checksum error={err:?}"))).into());
}
let server_side_encryption = fi
.user_defined
.get("x-amz-server-side-encryption")
.map(|s| {
ServerSideEncryption::from_str(s)
.map_err(|e| ApiError::from(StorageError::other(format!("Invalid server-side encryption: {e}"))))
})
.transpose()?;
let ssekms_key_id = fi
.user_defined
.get("x-amz-server-side-encryption-aws-kms-key-id")
.map(|s| s.to_string());
let has_ssec = sse_customer_algorithm.is_some();
// When SSE-C headers are present, skip managed-encryption metadata to avoid
// false conflict: the bucket default SSE config stored in multipart metadata
// should not block a legitimate SSE-C upload part.
let (server_side_encryption, ssekms_key_id) = if has_ssec {
(None, None)
} else {
let sse = fi
.user_defined
.get("x-amz-server-side-encryption")
.map(|s| {
ServerSideEncryption::from_str(s)
.map_err(|e| ApiError::from(StorageError::other(format!("Invalid server-side encryption: {e}"))))
})
.transpose()?;
let key_id = fi
.user_defined
.get("x-amz-server-side-encryption-aws-kms-key-id")
.map(|s| s.to_string());
(sse, key_id)
};
let part_key = fi.user_defined.get("x-rustfs-encryption-key").cloned();
let part_nonce = fi.user_defined.get("x-rustfs-encryption-iv").cloned();
let encryption_request = EncryptionRequest {

View File

@@ -550,14 +550,21 @@ impl DefaultObjectUsecase {
// Fast in-memory update for immediate quota consistency
rustfs_ecstore::data_usage::increment_bucket_usage_memory(&bucket, obj_info.size as u64).await;
let put_version = obj_info.version_id.map(|v| v.to_string());
let raw_version = obj_info.version_id.map(|v| v.to_string());
helper = helper.object(obj_info.clone());
if let Some(version_id) = &put_version {
if let Some(version_id) = &raw_version {
helper = helper.version_id(version_id.clone());
}
Self::spawn_cache_invalidation(bucket.clone(), key.clone(), put_version.clone());
Self::spawn_cache_invalidation(bucket.clone(), key.clone(), raw_version.clone());
// Per S3 spec: only return VersionId when versioning is Enabled (not Suspended or default)
let put_version = if BucketVersioningSys::prefix_enabled(&bucket, &key).await {
raw_version
} else {
None
};
let e_tag = obj_info.etag.clone().map(|etag| to_s3s_etag(&etag));

View File

@@ -628,11 +628,14 @@ impl S3Access for FS {
}
/// Checks whether the CreateMultipartUpload request has accesses to the resources.
///
/// This method returns `Ok(())` by default.
async fn create_multipart_upload(&self, _req: &mut S3Request<CreateMultipartUploadInput>) -> S3Result<()> {
async fn create_multipart_upload(&self, req: &mut S3Request<CreateMultipartUploadInput>) -> S3Result<()> {
license_check().map_err(|er| s3_error!(AccessDenied, "{:?}", er.to_string()))?;
Ok(())
let req_info = ext_req_info_mut(&mut req.extensions)?;
req_info.bucket = Some(req.input.bucket.clone());
req_info.object = Some(req.input.key.clone());
authorize_request(req, Action::S3Action(S3Action::PutObjectAction)).await
}
/// Checks whether the DeleteBucket request has accesses to the resources.

View File

@@ -204,7 +204,19 @@ async fn prepare_sse_configuration(
}))
} else if let Err(e) = bucket_sse_config_result {
match e {
Error::ConfigNotFound => Ok(None),
Error::ConfigNotFound => {
// The bucket has no SSE config. If the user explicitly requested
// aws:kms, we must honor that — return the explicit SSE header so
// downstream logic can try (and fail if KMS is unavailable).
if let Some(sse) = server_side_encryption {
Ok(Some(SseConfiguration {
effective_sse: sse,
effective_kms_key_id: ssekms_key_id,
}))
} else {
Ok(None)
}
}
_ => Err(ApiError::from(e)),
}
} else {

View File

@@ -20,7 +20,10 @@
# - SSE-C: Server-side encryption with customer-provided keys
# - Object ownership: Bucket ownership controls
#
# Total: 224 tests
# - SSE-KMS: KMS-related edge cases
# - Bucket Policy: Multipart upload authorization
#
# Total: 228 tests
test_basic_key_count
test_bucket_create_naming_bad_short_one
@@ -169,7 +172,9 @@ test_put_obj_enc_conflict_c_kms
test_put_obj_enc_conflict_s3_kms
test_put_obj_enc_conflict_bad_enc_kms
test_sse_kms_not_declared
test_sse_kms_no_key
test_sse_kms_read_declare
test_encryption_sse_c_multipart_bad_download
# ListObjectsV2 delimiter and encoding tests
test_bucket_list_encoding_basic
@@ -207,6 +212,7 @@ test_bucket_policy_acl
test_bucketv2_policy_acl
test_bucket_policy_another_bucket
test_bucket_policy_allow_notprincipal
test_bucket_policy_multipart
test_bucket_policy_put_obj_acl
test_object_presigned_put_object_with_acl
test_object_put_acl_mtime
@@ -255,6 +261,7 @@ test_versioned_concurrent_object_create_and_remove
test_versioned_concurrent_object_create_concurrent_remove
test_versioned_object_acl
test_versioning_bucket_create_suspend
test_versioning_bucket_atomic_upload_return_version_id
test_versioning_bucket_multipart_upload_return_version_id
test_versioning_multi_object_delete
test_versioning_multi_object_delete_with_marker

View File

@@ -6,18 +6,16 @@
#
# Unimplemented features:
# - Bucket Logging: Access logging
# - SSE-KMS: Partial SSE-KMS edge cases
# - Object Lock: Enable after create
# - Checksum: Full checksum validation
# - Conditional writes: If-Match/If-None-Match for writes
# - Bucket Ownership Controls
# Failed tests (21)
# Failed tests (17)
test_bucket_create_delete_bucket_ownership
test_bucket_logging_owner
test_bucket_policy_put_obj_kms_s3
test_bucket_policy_put_obj_s3_kms
test_encryption_sse_c_multipart_bad_download
test_object_checksum_crc64nvme
test_object_checksum_sha256
test_object_lock_put_obj_lock_enable_after_create
@@ -27,8 +25,6 @@ test_put_bucket_logging_errors
test_put_bucket_logging_permissions
test_put_bucket_logging_policy_wildcard
test_rm_bucket_logging
test_sse_kms_no_key
test_versioning_bucket_atomic_upload_return_version_id
test_versioning_concurrent_multi_object_delete
# Skipped tests (require IAM account or multiple storage classes)
@@ -52,6 +48,5 @@ test_atomic_write_8mb
# Tests with known issues (need further investigation)
test_bucket_policy_different_tenant
test_bucket_policy_multipart
test_bucket_policy_put_obj_grant
test_bucket_policy_tenanted_bucket