s3tables: harden auth and error handling
- Add authorization checks to all S3 Tables handlers (policy, table ops) to enforce security - Improve error handling to distinguish between NotFound (404) and InternalError (500) - Fix directory FileMode usage in filer_ops - Improve test randomness for version tokens - Update permissions comments to acknowledge IAM gaps
This commit is contained in:
@@ -94,6 +94,7 @@ func CheckPermission(operation, principal, owner string) bool {
|
||||
|
||||
// For now, only the owner can perform operations
|
||||
// This can be extended to support more granular permissions via policies
|
||||
// TODO: Integrate with full IAM policy evaluation
|
||||
return false
|
||||
}
|
||||
|
||||
@@ -181,8 +182,10 @@ func ExtractPrincipalFromContext(contextID string) string {
|
||||
}
|
||||
}
|
||||
|
||||
// Extract from context, e.g., "user123" or "account-id"
|
||||
// Extract from context, e.g., "user123" or "account-id"
|
||||
// This is a simplified version - in production, this would parse AWS auth headers
|
||||
// TODO: Parse AWS Signature V4 identity or mTLS identity
|
||||
if strings.Contains(contextID, ":") {
|
||||
parts := strings.Split(contextID, ":")
|
||||
return parts[0]
|
||||
|
||||
Reference in New Issue
Block a user