mirror of
https://github.com/seaweedfs/seaweedfs.git
synced 2025-11-24 08:46:54 +08:00
check errors
This commit is contained in:
@@ -2,12 +2,14 @@ package s3api
|
|||||||
|
|
||||||
import (
|
import (
|
||||||
"context"
|
"context"
|
||||||
|
"errors"
|
||||||
"fmt"
|
"fmt"
|
||||||
"net/http"
|
"net/http"
|
||||||
|
|
||||||
"github.com/seaweedfs/seaweedfs/weed/glog"
|
"github.com/seaweedfs/seaweedfs/weed/glog"
|
||||||
"github.com/seaweedfs/seaweedfs/weed/pb/filer_pb"
|
"github.com/seaweedfs/seaweedfs/weed/pb/filer_pb"
|
||||||
"github.com/seaweedfs/seaweedfs/weed/s3api/s3err"
|
"github.com/seaweedfs/seaweedfs/weed/s3api/s3err"
|
||||||
|
weed_server "github.com/seaweedfs/seaweedfs/weed/server"
|
||||||
)
|
)
|
||||||
|
|
||||||
// executeUnifiedCopyStrategy executes the appropriate copy strategy based on encryption state
|
// executeUnifiedCopyStrategy executes the appropriate copy strategy based on encryption state
|
||||||
@@ -76,6 +78,14 @@ func (s3a *S3ApiServer) mapCopyErrorToS3Error(err error) s3err.ErrorCode {
|
|||||||
return s3err.ErrNone
|
return s3err.ErrNone
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// Check for read-only errors (quota enforcement)
|
||||||
|
// Uses errors.Is() to properly detect wrapped errors
|
||||||
|
if errors.Is(err, weed_server.ErrReadOnly) {
|
||||||
|
// Bucket is read-only due to quota enforcement or other configuration
|
||||||
|
// Return 403 Forbidden per S3 semantics (similar to MinIO's quota enforcement)
|
||||||
|
return s3err.ErrAccessDenied
|
||||||
|
}
|
||||||
|
|
||||||
// Check for KMS errors first
|
// Check for KMS errors first
|
||||||
if kmsErr := MapKMSErrorToS3Error(err); kmsErr != s3err.ErrInvalidRequest {
|
if kmsErr := MapKMSErrorToS3Error(err); kmsErr != s3err.ErrInvalidRequest {
|
||||||
return kmsErr
|
return kmsErr
|
||||||
|
|||||||
@@ -23,6 +23,7 @@ import (
|
|||||||
"github.com/seaweedfs/seaweedfs/weed/s3api/s3_constants"
|
"github.com/seaweedfs/seaweedfs/weed/s3api/s3_constants"
|
||||||
"github.com/seaweedfs/seaweedfs/weed/s3api/s3err"
|
"github.com/seaweedfs/seaweedfs/weed/s3api/s3err"
|
||||||
"github.com/seaweedfs/seaweedfs/weed/security"
|
"github.com/seaweedfs/seaweedfs/weed/security"
|
||||||
|
weed_server "github.com/seaweedfs/seaweedfs/weed/server"
|
||||||
stats_collect "github.com/seaweedfs/seaweedfs/weed/stats"
|
stats_collect "github.com/seaweedfs/seaweedfs/weed/stats"
|
||||||
"github.com/seaweedfs/seaweedfs/weed/util/constants"
|
"github.com/seaweedfs/seaweedfs/weed/util/constants"
|
||||||
)
|
)
|
||||||
@@ -605,7 +606,7 @@ func (s3a *S3ApiServer) putToFiler(r *http.Request, uploadUrl string, dataReader
|
|||||||
s3a.deleteOrphanedChunks(chunkResult.FileChunks)
|
s3a.deleteOrphanedChunks(chunkResult.FileChunks)
|
||||||
}
|
}
|
||||||
|
|
||||||
return "", filerErrorToS3Error(createErr.Error()), SSEResponseMetadata{}
|
return "", filerErrorToS3Error(createErr), SSEResponseMetadata{}
|
||||||
}
|
}
|
||||||
glog.V(3).Infof("putToFiler: CreateEntry SUCCESS for %s", filePath)
|
glog.V(3).Infof("putToFiler: CreateEntry SUCCESS for %s", filePath)
|
||||||
|
|
||||||
@@ -677,10 +678,21 @@ func (s3a *S3ApiServer) setSSEResponseHeaders(w http.ResponseWriter, r *http.Req
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
func filerErrorToS3Error(errString string) s3err.ErrorCode {
|
func filerErrorToS3Error(err error) s3err.ErrorCode {
|
||||||
|
if err == nil {
|
||||||
|
return s3err.ErrNone
|
||||||
|
}
|
||||||
|
|
||||||
|
errString := err.Error()
|
||||||
|
|
||||||
switch {
|
switch {
|
||||||
case errString == constants.ErrMsgBadDigest:
|
case errString == constants.ErrMsgBadDigest:
|
||||||
return s3err.ErrBadDigest
|
return s3err.ErrBadDigest
|
||||||
|
case errors.Is(err, weed_server.ErrReadOnly):
|
||||||
|
// Bucket is read-only due to quota enforcement or other configuration
|
||||||
|
// Return 403 Forbidden per S3 semantics (similar to MinIO's quota enforcement)
|
||||||
|
// Uses errors.Is() to properly detect wrapped errors
|
||||||
|
return s3err.ErrAccessDenied
|
||||||
case strings.Contains(errString, "context canceled") || strings.Contains(errString, "code = Canceled"):
|
case strings.Contains(errString, "context canceled") || strings.Contains(errString, "code = Canceled"):
|
||||||
// Client canceled the request, return client error not server error
|
// Client canceled the request, return client error not server error
|
||||||
return s3err.ErrInvalidRequest
|
return s3err.ErrInvalidRequest
|
||||||
|
|||||||
@@ -1,55 +1,73 @@
|
|||||||
package s3api
|
package s3api
|
||||||
|
|
||||||
import (
|
import (
|
||||||
|
"errors"
|
||||||
|
"fmt"
|
||||||
"testing"
|
"testing"
|
||||||
|
|
||||||
"github.com/seaweedfs/seaweedfs/weed/s3api/s3err"
|
"github.com/seaweedfs/seaweedfs/weed/s3api/s3err"
|
||||||
|
weed_server "github.com/seaweedfs/seaweedfs/weed/server"
|
||||||
"github.com/seaweedfs/seaweedfs/weed/util/constants"
|
"github.com/seaweedfs/seaweedfs/weed/util/constants"
|
||||||
)
|
)
|
||||||
|
|
||||||
func TestFilerErrorToS3Error(t *testing.T) {
|
func TestFilerErrorToS3Error(t *testing.T) {
|
||||||
tests := []struct {
|
tests := []struct {
|
||||||
name string
|
name string
|
||||||
errString string
|
err error
|
||||||
expectedErr s3err.ErrorCode
|
expectedErr s3err.ErrorCode
|
||||||
}{
|
}{
|
||||||
|
{
|
||||||
|
name: "nil error",
|
||||||
|
err: nil,
|
||||||
|
expectedErr: s3err.ErrNone,
|
||||||
|
},
|
||||||
{
|
{
|
||||||
name: "MD5 mismatch error",
|
name: "MD5 mismatch error",
|
||||||
errString: constants.ErrMsgBadDigest,
|
err: errors.New(constants.ErrMsgBadDigest),
|
||||||
expectedErr: s3err.ErrBadDigest,
|
expectedErr: s3err.ErrBadDigest,
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
name: "Read only error (direct)",
|
||||||
|
err: weed_server.ErrReadOnly,
|
||||||
|
expectedErr: s3err.ErrAccessDenied,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "Read only error (wrapped)",
|
||||||
|
err: fmt.Errorf("create file /buckets/test/file.txt: %w", weed_server.ErrReadOnly),
|
||||||
|
expectedErr: s3err.ErrAccessDenied,
|
||||||
|
},
|
||||||
{
|
{
|
||||||
name: "Context canceled error",
|
name: "Context canceled error",
|
||||||
errString: "rpc error: code = Canceled desc = context canceled",
|
err: errors.New("rpc error: code = Canceled desc = context canceled"),
|
||||||
expectedErr: s3err.ErrInvalidRequest,
|
expectedErr: s3err.ErrInvalidRequest,
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
name: "Context canceled error (simple)",
|
name: "Context canceled error (simple)",
|
||||||
errString: "context canceled",
|
err: errors.New("context canceled"),
|
||||||
expectedErr: s3err.ErrInvalidRequest,
|
expectedErr: s3err.ErrInvalidRequest,
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
name: "Directory exists error",
|
name: "Directory exists error",
|
||||||
errString: "existing /path/to/file is a directory",
|
err: errors.New("existing /path/to/file is a directory"),
|
||||||
expectedErr: s3err.ErrExistingObjectIsDirectory,
|
expectedErr: s3err.ErrExistingObjectIsDirectory,
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
name: "File exists error",
|
name: "File exists error",
|
||||||
errString: "/path/to/file is a file",
|
err: errors.New("/path/to/file is a file"),
|
||||||
expectedErr: s3err.ErrExistingObjectIsFile,
|
expectedErr: s3err.ErrExistingObjectIsFile,
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
name: "Unknown error",
|
name: "Unknown error",
|
||||||
errString: "some random error",
|
err: errors.New("some random error"),
|
||||||
expectedErr: s3err.ErrInternalError,
|
expectedErr: s3err.ErrInternalError,
|
||||||
},
|
},
|
||||||
}
|
}
|
||||||
|
|
||||||
for _, tt := range tests {
|
for _, tt := range tests {
|
||||||
t.Run(tt.name, func(t *testing.T) {
|
t.Run(tt.name, func(t *testing.T) {
|
||||||
result := filerErrorToS3Error(tt.errString)
|
result := filerErrorToS3Error(tt.err)
|
||||||
if result != tt.expectedErr {
|
if result != tt.expectedErr {
|
||||||
t.Errorf("filerErrorToS3Error(%q) = %v, want %v", tt.errString, result, tt.expectedErr)
|
t.Errorf("filerErrorToS3Error(%v) = %v, want %v", tt.err, result, tt.expectedErr)
|
||||||
}
|
}
|
||||||
})
|
})
|
||||||
}
|
}
|
||||||
|
|||||||
Reference in New Issue
Block a user