aboutsummaryrefslogtreecommitdiff
path: root/src/api/s3/website.rs
diff options
context:
space:
mode:
Diffstat (limited to 'src/api/s3/website.rs')
-rw-r--r--src/api/s3/website.rs131
1 files changed, 103 insertions, 28 deletions
diff --git a/src/api/s3/website.rs b/src/api/s3/website.rs
index 6af55677..934a20ff 100644
--- a/src/api/s3/website.rs
+++ b/src/api/s3/website.rs
@@ -10,7 +10,7 @@ use crate::s3::error::*;
use crate::s3::xml::{to_xml_with_header, xmlns_tag, IntValue, Value};
use crate::signature::verify_signed_content;
-use garage_model::bucket_table::*;
+use garage_model::bucket_table::{self, *};
use garage_util::data::*;
pub async fn handle_get_website(ctx: ReqCtx) -> Result<Response<ResBody>, Error> {
@@ -25,7 +25,8 @@ pub async fn handle_get_website(ctx: ReqCtx) -> Result<Response<ResBody>, Error>
suffix: Value(website.index_document.to_string()),
}),
redirect_all_requests_to: None,
- routing_rules: None,
+ // TODO put the correct config here
+ routing_rules: Vec::new(),
};
let xml = to_xml_with_header(&wc)?;
Ok(Response::builder()
@@ -101,8 +102,12 @@ pub struct WebsiteConfiguration {
pub index_document: Option<Suffix>,
#[serde(rename = "RedirectAllRequestsTo")]
pub redirect_all_requests_to: Option<Target>,
- #[serde(rename = "RoutingRules")]
- pub routing_rules: Option<Vec<RoutingRule>>,
+ #[serde(
+ rename = "RoutingRules",
+ default,
+ skip_serializing_if = "Vec::is_empty"
+ )]
+ pub routing_rules: Vec<RoutingRule>,
}
#[derive(Debug, Serialize, Deserialize, PartialEq, Eq, PartialOrd, Ord)]
@@ -166,7 +171,7 @@ impl WebsiteConfiguration {
if self.redirect_all_requests_to.is_some()
&& (self.error_document.is_some()
|| self.index_document.is_some()
- || self.routing_rules.is_some())
+ || !self.routing_rules.is_empty())
{
return Err(Error::bad_request(
"Bad XML: can't have RedirectAllRequestsTo and other fields",
@@ -181,10 +186,15 @@ impl WebsiteConfiguration {
if let Some(ref rart) = self.redirect_all_requests_to {
rart.validate()?;
}
- if let Some(ref rrs) = self.routing_rules {
- for rr in rrs {
- rr.inner.validate()?;
- }
+ for rr in &self.routing_rules {
+ rr.inner.validate()?;
+ }
+ if self.routing_rules.len() > 1000 {
+ // we will do linear scans, best to avoid overly long configuration. The
+ // limit was choosen arbitrarily
+ return Err(Error::bad_request(
+ "Bad XML: RoutingRules can't have more than 1000 child elements",
+ ));
}
Ok(())
@@ -195,10 +205,12 @@ impl WebsiteConfiguration {
Err(Error::NotImplemented(
"S3 website redirects are not currently implemented in Garage.".into(),
))
- } else if self.routing_rules.map(|x| !x.is_empty()).unwrap_or(false) {
- Err(Error::NotImplemented(
- "S3 routing rules are not currently implemented in Garage.".into(),
- ))
+ /*
+ } else if self.routing_rules.map(|x| !x.is_empty()).unwrap_or(false) {
+ Err(Error::NotImplemented(
+ "S3 routing rules are not currently implemented in Garage.".into(),
+ ))
+ */
} else {
Ok(WebsiteConfig {
index_document: self
@@ -206,6 +218,35 @@ impl WebsiteConfiguration {
.map(|x| x.suffix.0)
.unwrap_or_else(|| "index.html".to_string()),
error_document: self.error_document.map(|x| x.key.0),
+ routing_rules: self
+ .routing_rules
+ .into_iter()
+ .map(|rule| {
+ bucket_table::RoutingRule {
+ condition: rule.inner.condition.map(|condition| {
+ bucket_table::Condition {
+ http_error_code: condition.http_error_code.map(|c| c.0 as u16),
+ prefix: condition.prefix.map(|p| p.0),
+ }
+ }),
+ redirect: bucket_table::Redirect {
+ hostname: rule.inner.redirect.hostname.map(|h| h.0),
+ protocol: rule.inner.redirect.protocol.map(|p| p.0),
+ // aws default to 301, which i find punitive in case of
+ // missconfiguration (can be permanently cached on the
+ // user agent)
+ http_redirect_code: rule
+ .inner
+ .redirect
+ .http_redirect_code
+ .map(|c| c.0 as u16)
+ .unwrap_or(302),
+ replace_key_prefix: rule.inner.redirect.replace_prefix.map(|k| k.0),
+ replace_key: rule.inner.redirect.replace_full.map(|k| k.0),
+ },
+ }
+ })
+ .collect(),
})
}
}
@@ -248,35 +289,69 @@ impl Target {
impl RoutingRuleInner {
pub fn validate(&self) -> Result<(), Error> {
- let has_prefix = self
- .condition
- .as_ref()
- .and_then(|c| c.prefix.as_ref())
- .is_some();
- self.redirect.validate(has_prefix)
+ if let Some(condition) = &self.condition {
+ condition.validate()?;
+ }
+ self.redirect.validate()
+ }
+}
+
+impl Condition {
+ pub fn validate(&self) -> Result<bool, Error> {
+ if let Some(ref error_code) = self.http_error_code {
+ // TODO do other error codes make sense? Aws only allows 4xx and 5xx
+ if error_code.0 != 404 {
+ return Err(Error::bad_request(
+ "Bad XML: HttpErrorCodeReturnedEquals must be 404 or absent",
+ ));
+ }
+ }
+ Ok(self.prefix.is_some())
}
}
impl Redirect {
- pub fn validate(&self, has_prefix: bool) -> Result<(), Error> {
+ pub fn validate(&self) -> Result<(), Error> {
if self.replace_prefix.is_some() {
if self.replace_full.is_some() {
return Err(Error::bad_request(
"Bad XML: both ReplaceKeyPrefixWith and ReplaceKeyWith are set",
));
}
- if !has_prefix {
- return Err(Error::bad_request(
- "Bad XML: ReplaceKeyPrefixWith is set, but KeyPrefixEquals isn't",
- ));
- }
}
if let Some(ref protocol) = self.protocol {
if protocol.0 != "http" && protocol.0 != "https" {
return Err(Error::bad_request("Bad XML: invalid protocol"));
}
}
- // TODO there are probably more invalide cases, but which ones?
+ if let Some(ref http_redirect_code) = self.http_redirect_code {
+ match http_redirect_code.0 {
+ // aws allows all 3xx except 300, but some are non-sensical (not modified,
+ // use proxy...)
+ 301 | 302 | 303 | 307 | 308 => {
+ if self.hostname.is_none() && self.protocol.is_some() {
+ return Err(Error::bad_request(
+ "Bad XML: HostName must be set if Protocol is set",
+ ));
+ }
+ }
+ // aws doesn't allow these codes, but netlify does, and it seems like a
+ // cool feature (change the page seen without changing the url shown by the
+ // user agent)
+ 200 | 404 => {
+ if self.hostname.is_some() || self.protocol.is_some() {
+ // hostname would mean different bucket, protocol doesn't make
+ // sense
+ return Err(Error::bad_request(
+ "Bad XML: an HttpRedirectCode of 200 is not acceptable alongside HostName or Protocol",
+ ));
+ }
+ }
+ _ => {
+ return Err(Error::bad_request("Bad XML: invalid HttpRedirectCode"));
+ }
+ }
+ }
Ok(())
}
}
@@ -330,7 +405,7 @@ mod tests {
hostname: Value("garage.tld".to_owned()),
protocol: Some(Value("https".to_owned())),
}),
- routing_rules: Some(vec![RoutingRule {
+ routing_rules: vec![RoutingRule {
inner: RoutingRuleInner {
condition: Some(Condition {
http_error_code: Some(IntValue(404)),
@@ -344,7 +419,7 @@ mod tests {
replace_full: Some(Value("fullkey".to_owned())),
},
},
- }]),
+ }],
};
assert_eq! {
ref_value,