|
|
|
/*
|
|
|
|
* MinIO Cloud Storage, (C) 2016, 2017 MinIO, Inc.
|
|
|
|
*
|
|
|
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
* you may not use this file except in compliance with the License.
|
|
|
|
* You may obtain a copy of the License at
|
|
|
|
*
|
|
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
*
|
|
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
|
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
* See the License for the specific language governing permissions and
|
|
|
|
* limitations under the License.
|
|
|
|
*/
|
|
|
|
|
|
|
|
package cmd
|
|
|
|
|
|
|
|
import (
|
|
|
|
"context"
|
|
|
|
"encoding/xml"
|
|
|
|
"errors"
|
|
|
|
"fmt"
|
|
|
|
"io"
|
|
|
|
"net/http"
|
|
|
|
"strings"
|
|
|
|
"sync"
|
|
|
|
"time"
|
|
|
|
|
|
|
|
xhttp "github.com/minio/minio/cmd/http"
|
|
|
|
"github.com/minio/minio/cmd/logger"
|
|
|
|
"github.com/minio/minio/pkg/env"
|
|
|
|
)
|
|
|
|
|
|
|
|
// RetentionMode - object retention mode.
|
|
|
|
type RetentionMode string
|
|
|
|
|
|
|
|
const (
|
|
|
|
// Governance - governance mode.
|
|
|
|
Governance RetentionMode = "GOVERNANCE"
|
|
|
|
|
|
|
|
// Compliance - compliance mode.
|
|
|
|
Compliance RetentionMode = "COMPLIANCE"
|
|
|
|
|
|
|
|
// Invalid - invalid retention mode.
|
|
|
|
Invalid RetentionMode = ""
|
|
|
|
)
|
|
|
|
|
|
|
|
func parseRetentionMode(modeStr string) (mode RetentionMode) {
|
|
|
|
switch strings.ToUpper(modeStr) {
|
|
|
|
case "GOVERNANCE":
|
|
|
|
mode = Governance
|
|
|
|
case "COMPLIANCE":
|
|
|
|
mode = Compliance
|
|
|
|
default:
|
|
|
|
mode = Invalid
|
|
|
|
}
|
|
|
|
return mode
|
|
|
|
}
|
|
|
|
|
|
|
|
var (
|
|
|
|
errMalformedBucketObjectConfig = errors.New("Invalid bucket object lock config")
|
|
|
|
errInvalidRetentionDate = errors.New("Date must be provided in ISO 8601 format")
|
|
|
|
errPastObjectLockRetainDate = errors.New("the retain until date must be in the future")
|
|
|
|
errUnknownWORMModeDirective = errors.New("unknown WORM mode directive")
|
|
|
|
errObjectLockMissingContentMD5 = errors.New("Content-MD5 HTTP header is required for Put Object requests with Object Lock parameters")
|
|
|
|
errObjectLockInvalidHeaders = errors.New("x-amz-object-lock-retain-until-date and x-amz-object-lock-mode must both be supplied")
|
|
|
|
)
|
|
|
|
|
|
|
|
const (
|
|
|
|
ntpServerEnv = "MINIO_NTP_SERVER"
|
|
|
|
)
|
|
|
|
|
|
|
|
var (
|
|
|
|
ntpServer = env.Get(ntpServerEnv, "")
|
|
|
|
)
|
|
|
|
|
|
|
|
// Retention - bucket level retention configuration.
|
|
|
|
type Retention struct {
|
|
|
|
Mode RetentionMode
|
|
|
|
Validity time.Duration
|
|
|
|
}
|
|
|
|
|
|
|
|
// IsEmpty - returns whether retention is empty or not.
|
|
|
|
func (r Retention) IsEmpty() bool {
|
|
|
|
return r.Mode == "" || r.Validity == 0
|
|
|
|
}
|
|
|
|
|
|
|
|
// Retain - check whether given date is retainable by validity time.
|
|
|
|
func (r Retention) Retain(created time.Time) bool {
|
|
|
|
t, err := UTCNowNTP()
|
|
|
|
if err != nil {
|
|
|
|
logger.LogIf(context.Background(), err)
|
|
|
|
// Retain
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
return globalWORMEnabled || created.Add(r.Validity).After(t)
|
|
|
|
}
|
|
|
|
|
|
|
|
// BucketObjectLockConfig - map of bucket and retention configuration.
|
|
|
|
type BucketObjectLockConfig struct {
|
|
|
|
sync.RWMutex
|
|
|
|
retentionMap map[string]Retention
|
|
|
|
}
|
|
|
|
|
|
|
|
// Set - set retention configuration.
|
|
|
|
func (config *BucketObjectLockConfig) Set(bucketName string, retention Retention) {
|
|
|
|
config.Lock()
|
|
|
|
config.retentionMap[bucketName] = retention
|
|
|
|
config.Unlock()
|
|
|
|
}
|
|
|
|
|
|
|
|
// Get - Get retention configuration.
|
|
|
|
func (config *BucketObjectLockConfig) Get(bucketName string) (r Retention, ok bool) {
|
|
|
|
config.RLock()
|
|
|
|
defer config.RUnlock()
|
|
|
|
r, ok = config.retentionMap[bucketName]
|
|
|
|
return r, ok
|
|
|
|
}
|
|
|
|
|
|
|
|
// Remove - removes retention configuration.
|
|
|
|
func (config *BucketObjectLockConfig) Remove(bucketName string) {
|
|
|
|
config.Lock()
|
|
|
|
delete(config.retentionMap, bucketName)
|
|
|
|
config.Unlock()
|
|
|
|
}
|
|
|
|
|
|
|
|
func newBucketObjectLockConfig() *BucketObjectLockConfig {
|
|
|
|
return &BucketObjectLockConfig{
|
|
|
|
retentionMap: map[string]Retention{},
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// DefaultRetention - default retention configuration.
|
|
|
|
type DefaultRetention struct {
|
|
|
|
XMLName xml.Name `xml:"DefaultRetention"`
|
|
|
|
Mode RetentionMode `xml:"Mode"`
|
|
|
|
Days *uint64 `xml:"Days"`
|
|
|
|
Years *uint64 `xml:"Years"`
|
|
|
|
}
|
|
|
|
|
|
|
|
// Maximum support retention days and years supported by AWS S3.
|
|
|
|
const (
|
|
|
|
// This tested by using `mc lock` command
|
|
|
|
maximumRetentionDays = 36500
|
|
|
|
maximumRetentionYears = 100
|
|
|
|
)
|
|
|
|
|
|
|
|
// UnmarshalXML - decodes XML data.
|
|
|
|
func (dr *DefaultRetention) UnmarshalXML(d *xml.Decoder, start xml.StartElement) error {
|
|
|
|
// Make subtype to avoid recursive UnmarshalXML().
|
|
|
|
type defaultRetention DefaultRetention
|
|
|
|
retention := defaultRetention{}
|
|
|
|
|
|
|
|
if err := d.DecodeElement(&retention, &start); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
switch string(retention.Mode) {
|
|
|
|
case "GOVERNANCE", "COMPLIANCE":
|
|
|
|
default:
|
|
|
|
return fmt.Errorf("unknown retention mode %v", retention.Mode)
|
|
|
|
}
|
|
|
|
|
|
|
|
if retention.Days == nil && retention.Years == nil {
|
|
|
|
return fmt.Errorf("either Days or Years must be specified")
|
|
|
|
}
|
|
|
|
|
|
|
|
if retention.Days != nil && retention.Years != nil {
|
|
|
|
return fmt.Errorf("either Days or Years must be specified, not both")
|
|
|
|
}
|
|
|
|
|
|
|
|
if retention.Days != nil {
|
|
|
|
if *retention.Days == 0 {
|
|
|
|
return fmt.Errorf("Default retention period must be a positive integer value for 'Days'")
|
|
|
|
}
|
|
|
|
if *retention.Days > maximumRetentionDays {
|
|
|
|
return fmt.Errorf("Default retention period too large for 'Days' %d", *retention.Days)
|
|
|
|
}
|
|
|
|
} else if *retention.Years == 0 {
|
|
|
|
return fmt.Errorf("Default retention period must be a positive integer value for 'Years'")
|
|
|
|
} else if *retention.Years > maximumRetentionYears {
|
|
|
|
return fmt.Errorf("Default retention period too large for 'Years' %d", *retention.Years)
|
|
|
|
}
|
|
|
|
|
|
|
|
*dr = DefaultRetention(retention)
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// ObjectLockConfig - object lock configuration specified in
|
|
|
|
// https://docs.aws.amazon.com/AmazonS3/latest/API/Type_API_ObjectLockConfiguration.html
|
|
|
|
type ObjectLockConfig struct {
|
|
|
|
XMLNS string `xml:"xmlns,attr,omitempty"`
|
|
|
|
XMLName xml.Name `xml:"ObjectLockConfiguration"`
|
|
|
|
ObjectLockEnabled string `xml:"ObjectLockEnabled"`
|
|
|
|
Rule *struct {
|
|
|
|
DefaultRetention DefaultRetention `xml:"DefaultRetention"`
|
|
|
|
} `xml:"Rule,omitempty"`
|
|
|
|
}
|
|
|
|
|
|
|
|
// UnmarshalXML - decodes XML data.
|
|
|
|
func (config *ObjectLockConfig) UnmarshalXML(d *xml.Decoder, start xml.StartElement) error {
|
|
|
|
// Make subtype to avoid recursive UnmarshalXML().
|
|
|
|
type objectLockConfig ObjectLockConfig
|
|
|
|
parsedConfig := objectLockConfig{}
|
|
|
|
|
|
|
|
if err := d.DecodeElement(&parsedConfig, &start); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
if parsedConfig.ObjectLockEnabled != "Enabled" {
|
|
|
|
return fmt.Errorf("only 'Enabled' value is allowd to ObjectLockEnabled element")
|
|
|
|
}
|
|
|
|
|
|
|
|
*config = ObjectLockConfig(parsedConfig)
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// ToRetention - convert to Retention type.
|
|
|
|
func (config *ObjectLockConfig) ToRetention() (r Retention) {
|
|
|
|
if config.Rule != nil {
|
|
|
|
r.Mode = config.Rule.DefaultRetention.Mode
|
|
|
|
|
|
|
|
t, err := UTCNowNTP()
|
|
|
|
if err != nil {
|
|
|
|
logger.LogIf(context.Background(), err)
|
|
|
|
// Do not change any configuration
|
|
|
|
// upon NTP failure.
|
|
|
|
return r
|
|
|
|
}
|
|
|
|
|
|
|
|
if config.Rule.DefaultRetention.Days != nil {
|
|
|
|
r.Validity = t.AddDate(0, 0, int(*config.Rule.DefaultRetention.Days)).Sub(t)
|
|
|
|
} else {
|
|
|
|
r.Validity = t.AddDate(int(*config.Rule.DefaultRetention.Years), 0, 0).Sub(t)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return r
|
|
|
|
}
|
|
|
|
|
|
|
|
func parseObjectLockConfig(reader io.Reader) (*ObjectLockConfig, error) {
|
|
|
|
config := ObjectLockConfig{}
|
|
|
|
if err := xml.NewDecoder(reader).Decode(&config); err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
return &config, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func newObjectLockConfig() *ObjectLockConfig {
|
|
|
|
return &ObjectLockConfig{
|
|
|
|
ObjectLockEnabled: "Enabled",
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// RetentionDate is a embedded type containing time.Time to unmarshal
|
|
|
|
// Date in Retention
|
|
|
|
type RetentionDate struct {
|
|
|
|
time.Time
|
|
|
|
}
|
|
|
|
|
|
|
|
// UnmarshalXML parses date from Expiration and validates date format
|
|
|
|
func (rDate *RetentionDate) UnmarshalXML(d *xml.Decoder, startElement xml.StartElement) error {
|
|
|
|
var dateStr string
|
|
|
|
err := d.DecodeElement(&dateStr, &startElement)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
// While AWS documentation mentions that the date specified
|
|
|
|
// must be present in ISO 8601 format, in reality they allow
|
|
|
|
// users to provide RFC 3339 compliant dates.
|
|
|
|
retDate, err := time.Parse(time.RFC3339, dateStr)
|
|
|
|
if err != nil {
|
|
|
|
return errInvalidRetentionDate
|
|
|
|
}
|
|
|
|
|
|
|
|
*rDate = RetentionDate{retDate}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// MarshalXML encodes expiration date if it is non-zero and encodes
|
|
|
|
// empty string otherwise
|
|
|
|
func (rDate *RetentionDate) MarshalXML(e *xml.Encoder, startElement xml.StartElement) error {
|
|
|
|
if *rDate == (RetentionDate{time.Time{}}) {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
return e.EncodeElement(rDate.Format(time.RFC3339), startElement)
|
|
|
|
}
|
|
|
|
|
|
|
|
// ObjectRetention specified in
|
|
|
|
// https://docs.aws.amazon.com/AmazonS3/latest/API/API_PutObjectRetention.html
|
|
|
|
type ObjectRetention struct {
|
|
|
|
XMLNS string `xml:"xmlns,attr,omitempty"`
|
|
|
|
XMLName xml.Name `xml:"Retention"`
|
|
|
|
Mode RetentionMode `xml:"Mode,omitempty"`
|
|
|
|
RetainUntilDate RetentionDate `xml:"RetainUntilDate,omitempty"`
|
|
|
|
}
|
|
|
|
|
|
|
|
func parseObjectRetention(reader io.Reader) (*ObjectRetention, error) {
|
|
|
|
ret := ObjectRetention{}
|
|
|
|
if err := xml.NewDecoder(reader).Decode(&ret); err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
if ret.Mode != Compliance && ret.Mode != Governance {
|
|
|
|
return &ret, errUnknownWORMModeDirective
|
|
|
|
}
|
|
|
|
|
|
|
|
t, err := UTCNowNTP()
|
|
|
|
if err != nil {
|
|
|
|
logger.LogIf(context.Background(), err)
|
|
|
|
return &ret, errPastObjectLockRetainDate
|
|
|
|
}
|
|
|
|
|
|
|
|
if ret.RetainUntilDate.Before(t) {
|
|
|
|
return &ret, errPastObjectLockRetainDate
|
|
|
|
}
|
|
|
|
|
|
|
|
return &ret, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func isObjectLockRetentionRequested(h http.Header) bool {
|
|
|
|
if _, ok := h[xhttp.AmzObjectLockMode]; ok {
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
if _, ok := h[xhttp.AmzObjectLockRetainUntilDate]; ok {
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
|
|
|
func isObjectLockLegalHoldRequested(h http.Header) bool {
|
|
|
|
_, ok := h[xhttp.AmzObjectLockLegalHold]
|
|
|
|
return ok
|
|
|
|
}
|
|
|
|
|
|
|
|
func isObjectLockGovernanceBypassSet(h http.Header) bool {
|
|
|
|
v, ok := h[xhttp.AmzObjectLockBypassGovernance]
|
|
|
|
if !ok {
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
val := strings.Join(v, "")
|
|
|
|
return strings.ToLower(val) == "true"
|
|
|
|
}
|
|
|
|
|
|
|
|
func isObjectLockRequested(h http.Header) bool {
|
|
|
|
return isObjectLockLegalHoldRequested(h) || isObjectLockRetentionRequested(h)
|
|
|
|
}
|
|
|
|
|
|
|
|
func parseObjectLockRetentionHeaders(h http.Header) (rmode RetentionMode, r RetentionDate, err error) {
|
|
|
|
retMode, ok := h[xhttp.AmzObjectLockMode]
|
|
|
|
if ok {
|
|
|
|
rmode = parseRetentionMode(strings.Join(retMode, ""))
|
|
|
|
if rmode == Invalid {
|
|
|
|
return rmode, r, errUnknownWORMModeDirective
|
|
|
|
}
|
|
|
|
}
|
|
|
|
var retDate time.Time
|
|
|
|
dateStr, ok := h[xhttp.AmzObjectLockRetainUntilDate]
|
|
|
|
if ok {
|
|
|
|
// While AWS documentation mentions that the date specified
|
|
|
|
// must be present in ISO 8601 format, in reality they allow
|
|
|
|
// users to provide RFC 3339 compliant dates.
|
|
|
|
retDate, err = time.Parse(time.RFC3339, strings.Join(dateStr, ""))
|
|
|
|
if err != nil {
|
|
|
|
return rmode, r, errInvalidRetentionDate
|
|
|
|
}
|
|
|
|
|
|
|
|
t, err := UTCNowNTP()
|
|
|
|
if err != nil {
|
|
|
|
logger.LogIf(context.Background(), err)
|
|
|
|
return rmode, r, errPastObjectLockRetainDate
|
|
|
|
}
|
|
|
|
|
|
|
|
if retDate.Before(t) {
|
|
|
|
return rmode, r, errPastObjectLockRetainDate
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if len(retMode) == 0 || len(dateStr) == 0 {
|
|
|
|
return rmode, r, errObjectLockInvalidHeaders
|
|
|
|
}
|
|
|
|
return rmode, RetentionDate{retDate}, nil
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
func getObjectRetentionMeta(meta map[string]string) ObjectRetention {
|
|
|
|
var mode RetentionMode
|
|
|
|
var retainTill RetentionDate
|
|
|
|
|
|
|
|
if modeStr, ok := meta[strings.ToLower(xhttp.AmzObjectLockMode)]; ok {
|
|
|
|
mode = parseRetentionMode(modeStr)
|
|
|
|
}
|
|
|
|
if tillStr, ok := meta[strings.ToLower(xhttp.AmzObjectLockRetainUntilDate)]; ok {
|
|
|
|
if t, e := time.Parse(time.RFC3339, tillStr); e == nil {
|
|
|
|
retainTill = RetentionDate{t.UTC()}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return ObjectRetention{Mode: mode, RetainUntilDate: retainTill}
|
|
|
|
}
|
|
|
|
|
|
|
|
// enforceRetentionBypassForDelete enforces whether an existing object under governance can be deleted
|
|
|
|
// with governance bypass headers set in the request.
|
|
|
|
// Objects under site wide WORM can never be overwritten.
|
|
|
|
// For objects in "Governance" mode, overwrite is allowed if a) object retention date is past OR
|
|
|
|
// governance bypass headers are set and user has governance bypass permissions.
|
|
|
|
// Objects in "Compliance" mode can be overwritten only if retention date is past.
|
|
|
|
func enforceRetentionBypassForDelete(ctx context.Context, r *http.Request, bucket, object string, getObjectInfoFn GetObjectInfoFn, govBypassPerm APIErrorCode) (oi ObjectInfo, s3Err APIErrorCode) {
|
|
|
|
if globalWORMEnabled {
|
|
|
|
return oi, ErrObjectLocked
|
|
|
|
}
|
|
|
|
var err error
|
|
|
|
var opts ObjectOptions
|
|
|
|
opts, err = getOpts(ctx, r, bucket, object)
|
|
|
|
if err != nil {
|
|
|
|
return oi, toAPIErrorCode(ctx, err)
|
|
|
|
}
|
|
|
|
oi, err = getObjectInfoFn(ctx, bucket, object, opts)
|
|
|
|
if err != nil {
|
|
|
|
// ignore case where object no longer exists
|
|
|
|
if toAPIError(ctx, err).Code == "NoSuchKey" {
|
|
|
|
oi.UserDefined = map[string]string{}
|
|
|
|
return oi, ErrNone
|
|
|
|
}
|
|
|
|
return oi, toAPIErrorCode(ctx, err)
|
|
|
|
}
|
|
|
|
ret := getObjectRetentionMeta(oi.UserDefined)
|
|
|
|
|
|
|
|
// Here bucket does not support object lock
|
|
|
|
if ret.Mode == Invalid {
|
|
|
|
return oi, ErrNone
|
|
|
|
}
|
|
|
|
if ret.Mode != Compliance && ret.Mode != Governance {
|
|
|
|
return oi, ErrUnknownWORMModeDirective
|
|
|
|
}
|
|
|
|
t, err := UTCNowNTP()
|
|
|
|
if err != nil {
|
|
|
|
logger.LogIf(ctx, err)
|
|
|
|
return oi, ErrObjectLocked
|
|
|
|
}
|
|
|
|
if ret.RetainUntilDate.Before(t) {
|
|
|
|
return oi, ErrNone
|
|
|
|
}
|
|
|
|
if isObjectLockGovernanceBypassSet(r.Header) && ret.Mode == Governance && govBypassPerm == ErrNone {
|
|
|
|
return oi, ErrNone
|
|
|
|
}
|
|
|
|
return oi, ErrObjectLocked
|
|
|
|
}
|
|
|
|
|
|
|
|
// enforceRetentionBypassForPut enforces whether an existing object under governance can be overwritten
|
|
|
|
// with governance bypass headers set in the request.
|
|
|
|
// Objects under site wide WORM cannot be overwritten.
|
|
|
|
// For objects in "Governance" mode, overwrite is allowed if a) object retention date is past OR
|
|
|
|
// governance bypass headers are set and user has governance bypass permissions.
|
|
|
|
// Objects in compliance mode can be overwritten only if retention date is being extended. No mode change is permitted.
|
|
|
|
func enforceRetentionBypassForPut(ctx context.Context, r *http.Request, bucket, object string, getObjectInfoFn GetObjectInfoFn, govBypassPerm APIErrorCode, objRetention *ObjectRetention) (oi ObjectInfo, s3Err APIErrorCode) {
|
|
|
|
if globalWORMEnabled {
|
|
|
|
return oi, ErrObjectLocked
|
|
|
|
}
|
|
|
|
|
|
|
|
var err error
|
|
|
|
var opts ObjectOptions
|
|
|
|
opts, err = getOpts(ctx, r, bucket, object)
|
|
|
|
if err != nil {
|
|
|
|
return oi, toAPIErrorCode(ctx, err)
|
|
|
|
}
|
|
|
|
oi, err = getObjectInfoFn(ctx, bucket, object, opts)
|
|
|
|
if err != nil {
|
|
|
|
// ignore case where object no longer exists
|
|
|
|
if toAPIError(ctx, err).Code == "NoSuchKey" {
|
|
|
|
oi.UserDefined = map[string]string{}
|
|
|
|
return oi, ErrNone
|
|
|
|
}
|
|
|
|
return oi, toAPIErrorCode(ctx, err)
|
|
|
|
}
|
|
|
|
|
|
|
|
ret := getObjectRetentionMeta(oi.UserDefined)
|
|
|
|
// no retention metadata on object
|
|
|
|
if ret.Mode == Invalid {
|
|
|
|
if _, isWORMBucket := globalBucketObjectLockConfig.Get(bucket); !isWORMBucket {
|
|
|
|
return oi, ErrInvalidBucketObjectLockConfiguration
|
|
|
|
}
|
|
|
|
return oi, ErrNone
|
|
|
|
}
|
|
|
|
t, err := UTCNowNTP()
|
|
|
|
if err != nil {
|
|
|
|
logger.LogIf(ctx, err)
|
|
|
|
return oi, ErrObjectLocked
|
|
|
|
}
|
|
|
|
|
|
|
|
if ret.Mode == Compliance {
|
|
|
|
// Compliance retention mode cannot be changed and retention period cannot be shortened as per
|
|
|
|
// https://docs.aws.amazon.com/AmazonS3/latest/dev/object-lock-overview.html#object-lock-retention-modes
|
|
|
|
if objRetention.Mode != Compliance || objRetention.RetainUntilDate.Before(ret.RetainUntilDate.Time) {
|
|
|
|
return oi, ErrObjectLocked
|
|
|
|
}
|
|
|
|
if objRetention.RetainUntilDate.Before(t) {
|
|
|
|
return oi, ErrInvalidRetentionDate
|
|
|
|
}
|
|
|
|
return oi, ErrNone
|
|
|
|
}
|
|
|
|
|
|
|
|
if ret.Mode == Governance {
|
|
|
|
if !isObjectLockGovernanceBypassSet(r.Header) {
|
|
|
|
if objRetention.RetainUntilDate.Before(t) {
|
|
|
|
return oi, ErrInvalidRetentionDate
|
|
|
|
}
|
|
|
|
if objRetention.RetainUntilDate.Before((ret.RetainUntilDate.Time)) {
|
|
|
|
return oi, ErrObjectLocked
|
|
|
|
}
|
|
|
|
return oi, ErrNone
|
|
|
|
}
|
|
|
|
return oi, govBypassPerm
|
|
|
|
}
|
|
|
|
return oi, ErrNone
|
|
|
|
}
|
|
|
|
|
|
|
|
// checkPutObjectRetentionAllowed enforces object retention policy for requests with WORM headers
|
|
|
|
// See https://docs.aws.amazon.com/AmazonS3/latest/dev/object-lock-managing.html for the spec.
|
|
|
|
// For non-existing objects with object retention headers set, this method returns ErrNone if bucket has
|
|
|
|
// locking enabled and user has requisite permissions (s3:PutObjectRetention)
|
|
|
|
// If object exists on object store and site wide WORM enabled - this method
|
|
|
|
// returns an error. For objects in "Governance" mode, overwrite is allowed if the retention date has expired.
|
|
|
|
// For objects in "Compliance" mode, retention date cannot be shortened, and mode cannot be altered.
|
|
|
|
func checkPutObjectRetentionAllowed(ctx context.Context, r *http.Request, bucket, object string, getObjectInfoFn GetObjectInfoFn, retentionPermErr APIErrorCode) (RetentionMode, RetentionDate, APIErrorCode) {
|
|
|
|
var mode RetentionMode
|
|
|
|
var retainDate RetentionDate
|
|
|
|
|
|
|
|
retention, isWORMBucket := globalBucketObjectLockConfig.Get(bucket)
|
|
|
|
|
|
|
|
retentionRequested := isObjectLockRequested(r.Header)
|
|
|
|
|
|
|
|
var objExists bool
|
|
|
|
opts, err := getOpts(ctx, r, bucket, object)
|
|
|
|
if err != nil {
|
|
|
|
return mode, retainDate, toAPIErrorCode(ctx, err)
|
|
|
|
}
|
|
|
|
if objInfo, err := getObjectInfoFn(ctx, bucket, object, opts); err == nil {
|
|
|
|
objExists = true
|
|
|
|
r := getObjectRetentionMeta(objInfo.UserDefined)
|
|
|
|
if globalWORMEnabled || r.Mode == Compliance {
|
|
|
|
return mode, retainDate, ErrObjectLocked
|
|
|
|
}
|
|
|
|
mode = r.Mode
|
|
|
|
retainDate = r.RetainUntilDate
|
|
|
|
}
|
|
|
|
if retentionRequested {
|
|
|
|
if !isWORMBucket {
|
|
|
|
return mode, retainDate, ErrInvalidBucketObjectLockConfiguration
|
|
|
|
}
|
|
|
|
rMode, rDate, err := parseObjectLockRetentionHeaders(r.Header)
|
|
|
|
if err != nil {
|
|
|
|
return mode, retainDate, toAPIErrorCode(ctx, err)
|
|
|
|
}
|
|
|
|
// AWS S3 just creates a new version of object when an object is being overwritten.
|
|
|
|
t, err := UTCNowNTP()
|
|
|
|
if err != nil {
|
|
|
|
logger.LogIf(ctx, err)
|
|
|
|
return mode, retainDate, ErrObjectLocked
|
|
|
|
}
|
|
|
|
if objExists && retainDate.After(t) {
|
|
|
|
return mode, retainDate, ErrObjectLocked
|
|
|
|
}
|
|
|
|
if rMode == Invalid {
|
|
|
|
return mode, retainDate, toAPIErrorCode(ctx, errObjectLockInvalidHeaders)
|
|
|
|
}
|
|
|
|
if retentionPermErr != ErrNone {
|
|
|
|
return mode, retainDate, retentionPermErr
|
|
|
|
}
|
|
|
|
return rMode, rDate, ErrNone
|
|
|
|
}
|
|
|
|
|
|
|
|
if !retentionRequested && isWORMBucket {
|
|
|
|
if retention.IsEmpty() && (mode == Compliance || mode == Governance) {
|
|
|
|
return mode, retainDate, ErrObjectLocked
|
|
|
|
}
|
|
|
|
if retentionPermErr != ErrNone {
|
|
|
|
return mode, retainDate, retentionPermErr
|
|
|
|
}
|
|
|
|
t, err := UTCNowNTP()
|
|
|
|
if err != nil {
|
|
|
|
logger.LogIf(ctx, err)
|
|
|
|
return mode, retainDate, ErrObjectLocked
|
|
|
|
}
|
|
|
|
// AWS S3 just creates a new version of object when an object is being overwritten.
|
|
|
|
if objExists && retainDate.After(t) {
|
|
|
|
return mode, retainDate, ErrObjectLocked
|
|
|
|
}
|
|
|
|
// inherit retention from bucket configuration
|
|
|
|
return retention.Mode, RetentionDate{t.Add(retention.Validity)}, ErrNone
|
|
|
|
}
|
|
|
|
return mode, retainDate, ErrNone
|
|
|
|
}
|
|
|
|
|
|
|
|
// filter object lock metadata if s3:GetObjectRetention permission is denied or if isCopy flag set.
|
|
|
|
func filterObjectLockMetadata(ctx context.Context, r *http.Request, bucket, object string, metadata map[string]string, isCopy bool, getRetPerms APIErrorCode) map[string]string {
|
|
|
|
// Copy on write
|
|
|
|
dst := metadata
|
|
|
|
var copied bool
|
|
|
|
delKey := func(key string) {
|
|
|
|
if _, ok := metadata[key]; !ok {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
if !copied {
|
|
|
|
dst = make(map[string]string, len(metadata))
|
|
|
|
for k, v := range metadata {
|
|
|
|
dst[k] = v
|
|
|
|
}
|
|
|
|
copied = true
|
|
|
|
}
|
|
|
|
delete(dst, key)
|
|
|
|
}
|
|
|
|
ret := getObjectRetentionMeta(metadata)
|
|
|
|
if ret.Mode == Invalid || isCopy {
|
|
|
|
delKey(xhttp.AmzObjectLockMode)
|
|
|
|
delKey(xhttp.AmzObjectLockRetainUntilDate)
|
|
|
|
return metadata
|
|
|
|
}
|
|
|
|
if getRetPerms == ErrNone {
|
|
|
|
return dst
|
|
|
|
}
|
|
|
|
delKey(xhttp.AmzObjectLockMode)
|
|
|
|
delKey(xhttp.AmzObjectLockRetainUntilDate)
|
|
|
|
return dst
|
|
|
|
}
|