Commit Graph

15 Commits

Author SHA1 Message Date
Chris Lu
e4b70c2521 go fix 2026-02-20 18:42:00 -08:00
Chris Lu
8b5d31e5eb s3api/policy_engine: use forwarded client IP for aws:SourceIp (#8304)
* s3api: honor forwarded source IP for policy conditions

Prefer X-Forwarded-For/X-Real-Ip before RemoteAddr when populating aws:SourceIp in policy condition evaluation. Also avoid noisy parsing behavior for unix socket markers and add coverage for precedence/fallback paths.\n\nFixes #8301.

* s3api: simplify remote addr parsing

* s3api: guard aws:SourceIp against DNS hosts

* s3api: simplify remote addr fallback

* s3api: simplify remote addr parsing

* Update weed/s3api/policy_engine/engine.go

Co-authored-by: Copilot <175728472+Copilot@users.noreply.github.com>

* Fix TestExtractConditionValuesFromRequestSourceIPPrecedence using trusted private IP

* Refactor extractSourceIP to use R-to-L XFF parsing and net.IP.IsPrivate

---------

Co-authored-by: Copilot <175728472+Copilot@users.noreply.github.com>
2026-02-11 12:47:03 -08:00
Chris Lu
7831257ed5 s3: allow single Statement object in policy document (#8212)
* s3: allow single Statement object in policy document

Fixes #8201

* s3: add unit test for single Statement object in policy

* s3: improve error message for malformed PolicyDocument.Statement

* s3: simplify error message for malformed PolicyDocument.Statement
2026-02-04 16:23:20 -08:00
Chris Lu
1274cf038c s3: enforce authentication and JSON error format for Iceberg REST Catalog (#8192)
* s3: enforce authentication and JSON error format for Iceberg REST Catalog

* s3/iceberg: align error exception types with OpenAPI spec examples

* s3api: refactor AuthenticateRequest to return identity object

* s3/iceberg: propagate full identity object to request context

* s3/iceberg: differentiate NotAuthorizedException and ForbiddenException

* s3/iceberg: reject requests if authenticator is nil to prevent auth bypass

* s3/iceberg: refactor Auth middleware to build context incrementally and use switch for error mapping

* s3api: update misleading comment for authRequestWithAuthType

* s3api: return ErrAccessDenied if IAM is not configured to prevent auth bypass

* s3/iceberg: optimize context update in Auth middleware

* s3api: export CanDo for external authorization use

* s3/iceberg: enforce identity-based authorization in all API handlers

* s3api: fix compilation errors by updating internal CanDo references

* s3/iceberg: robust identity validation and consistent action usage in handlers

* s3api: complete CanDo rename across tests and policy engine integration

* s3api: fix integration tests by allowing admin access when auth is disabled and explicit gRPC ports

* duckdb

* create test bucket
2026-02-03 11:55:12 -08:00
SoSweetHam
2662420194 fix(s3api): correct wildcard matching (#8052)
* fix(s3api): correct wildcard matching

* chore(tests): add multi-slash test case

in ref. to cases provided here https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_elements_resource.html\#reference_policies_elements_resource_wildcards

* fix: gemini suggestions
2026-01-18 14:54:03 -08:00
Chris Lu
ee3813787e feat(s3api): Implement S3 Policy Variables (#8039)
* feat: Add AWS IAM Policy Variables support to S3 API

Implements policy variables for dynamic access control in bucket policies.

Supported variables:
- aws:username - Extracted from principal ARN
- aws:userid - User identifier (same as username in SeaweedFS)
- aws:principaltype - IAMUser, IAMRole, or AssumedRole
- jwt:* - Any JWT claim (e.g., jwt:preferred_username, jwt:sub)

Key changes:
- Added PolicyVariableRegex to detect ${...} patterns
- Extended CompiledStatement with DynamicResourcePatterns, DynamicPrincipalPatterns, DynamicActionPatterns
- Added Claims field to PolicyEvaluationArgs for JWT claim access
- Implemented SubstituteVariables() for variable replacement from context and JWT claims
- Implemented extractPrincipalVariables() for ARN parsing
- Updated EvaluateConditions() to support variable substitution
- Comprehensive unit and integration tests

Resolves #8037

* feat: Add LDAP and PrincipalAccount variable support

Completes future enhancements for policy variables:

- Added ldap:* variable support for LDAP claims
  - ldap:username - LDAP username from claims
  - ldap:dn - LDAP distinguished name from claims
  - ldap:* - Any LDAP claim

- Added aws:PrincipalAccount extraction from ARN
  - Extracts account ID from principal ARN
  - Available as ${aws:PrincipalAccount} in policies

Updated SubstituteVariables() to check LDAP claims
Updated extractPrincipalVariables() to extract account ID
Added comprehensive tests for new variables

* feat(s3api): implement IAM policy variables core logic and optimization

* feat(s3api): integrate policy variables with S3 authentication and handlers

* test(s3api): add integration tests for policy variables

* cleanup: remove unused policy conversion files

* Add S3 policy variables integration tests and path support

- Add comprehensive integration tests for policy variables
- Test username isolation, JWT claims, LDAP claims
- Add support for IAM paths in principal ARN parsing
- Add tests for principals with paths

* Fix IAM Role principal variable extraction

IAM Roles should not have aws:userid or aws:PrincipalAccount
according to AWS behavior. Only IAM Users and Assumed Roles
should have these variables.

Fixes TestExtractPrincipalVariables test failures.

* Security fixes and bug fixes for S3 policy variables

SECURITY FIXES:
- Prevent X-SeaweedFS-Principal header spoofing by clearing internal
  headers at start of authentication (auth_credentials.go)
- Restrict policy variable substitution to safe allowlist to prevent
  client header injection (iam/policy/policy_engine.go)
- Add core policy validation before storing bucket policies

BUG FIXES:
- Remove unused sid variable in evaluateStatement
- Fix LDAP claim lookup to check both prefixed and unprefixed keys
- Add ValidatePolicy call in PutBucketPolicyHandler

These fixes prevent privilege escalation via header injection and
ensure only validated identity claims are used in policy evaluation.

* Additional security fixes and code cleanup

SECURITY FIXES:
- Fixed X-Forwarded-For spoofing by only trusting proxy headers from
  private/localhost IPs (s3_iam_middleware.go)
- Changed context key from "sourceIP" to "aws:SourceIp" for proper
  policy variable substitution

CODE IMPROVEMENTS:
- Kept aws:PrincipalAccount for IAM Roles to support condition evaluations
- Removed redundant STS principaltype override
- Removed unused service variable
- Cleaned up commented-out debug logging statements
- Updated tests to reflect new IAM Role behavior

These changes prevent IP spoofing attacks and ensure policy variables
work correctly with the safe allowlist.

* Add security documentation for ParseJWTToken

Added comprehensive security comments explaining that ParseJWTToken
is safe despite parsing without verification because:
- It's only used for routing to the correct verification method
- All code paths perform cryptographic verification before trusting claims
- OIDC tokens: validated via validateExternalOIDCToken
- STS tokens: validated via ValidateSessionToken

Enhanced function documentation with clear security warnings about
proper usage to prevent future misuse.

* Fix IP condition evaluation to use aws:SourceIp key

Fixed evaluateIPCondition in IAM policy engine to use "aws:SourceIp"
instead of "sourceIP" to match the updated extractRequestContext.

This fixes the failing IP-restricted role test where IP-based policy
conditions were not being evaluated correctly.

Updated all test cases to use the correct "aws:SourceIp" key.

* Address code review feedback: optimize and clarify

PERFORMANCE IMPROVEMENT:
- Optimized expandPolicyVariables to use regexp.ReplaceAllStringFunc
  for single-pass variable substitution instead of iterating through
  all safe variables. This improves performance from O(n*m) to O(m)
  where n is the number of safe variables and m is the pattern length.

CODE CLARITY:
- Added detailed comment explaining LDAP claim fallback mechanism
  (checks both prefixed and unprefixed keys for compatibility)
- Enhanced TODO comment for trusted proxy configuration with rationale
  and recommendations for supporting cloud load balancers, CDNs, and
  complex network topologies

All tests passing.

* Address Copilot code review feedback

BUG FIXES:
- Fixed type switch for int/int32/int64 - separated into individual cases
  since interface type switches only match the first type in multi-type cases
- Fixed grammatically incorrect error message in types.go

CODE QUALITY:
- Removed duplicate Resource/NotResource validation (already in ValidateStatement)
- Added comprehensive comment explaining isEnabled() logic and security implications
- Improved trusted proxy NOTE comment to be more concise while noting limitations

All tests passing.

* Fix test failures after extractSourceIP security changes

Updated tests to work with the security fix that only trusts
X-Forwarded-For/X-Real-IP headers from private IP addresses:

- Set RemoteAddr to 127.0.0.1 in tests to simulate trusted proxy
- Changed context key from "sourceIP" to "aws:SourceIp"
- Added test case for untrusted proxy (public RemoteAddr)
- Removed invalid ValidateStatement call (validation happens in ValidatePolicy)

All tests now passing.

* Address remaining Gemini code review feedback

CODE SAFETY:
- Deep clone Action field in CompileStatement to prevent potential data races
  if the original policy document is modified after compilation

TEST CLEANUP:
- Remove debug logging (fmt.Fprintf) from engine_notresource_test.go
- Remove unused imports in engine_notresource_test.go

All tests passing.

* Fix insecure JWT parsing in IAM auth flow

SECURITY FIX:
- Renamed ParseJWTToken to ParseUnverifiedJWTToken with explicit security warnings.
- Refactored AuthenticateJWT to use the trusted SessionInfo returned by ValidateSessionToken
  instead of relying on unverified claims from the initial parse.
- Refactored ValidatePresignedURLWithIAM to reuse the robust AuthenticateJWT logic, removing
  duplicated and insecure manual token parsing.

This ensures all identity information (Role, Principal, Subject) used for authorization
decisions is derived solely from cryptographically verified tokens.

* Security: Fix insecure JWT claim extraction in policy engine

- Refactored EvaluatePolicy to accept trusted claims from verified Identity instead of parsing unverified tokens
- Updated AuthenticateJWT to populate Claims in IAMIdentity from verified sources (SessionInfo/ExternalIdentity)
- Updated s3api_server and handlers to pass claims correctly
- Improved isPrivateIP to support IPv6 loopback, link-local, and ULA
- Fixed flaky distributed_session_consistency test with retry logic

* fix(iam): populate Subject in STSSessionInfo to ensure correct identity propagation

This fixes the TestS3IAMAuthentication/valid_jwt_token_authentication failure by ensuring the session subject (sub) is correctly mapped to the internal SessionInfo struct, allowing bucket ownership validation to succeed.

* Optimized isPrivateIP

* Create s3-policy-tests.yml

* fix tests

* fix tests

* tests(s3/iam): simplify policy to resource-based \ (step 1)

* tests(s3/iam): add explicit Deny NotResource for isolation (step 2)

* fixes

* policy: skip resource matching for STS trust policies to allow AssumeRole evaluation

* refactor: remove debug logging and hoist policy variables for performance

* test: fix TestS3IAMBucketPolicyIntegration cleanup to handle per-subtest object lifecycle

* test: fix bucket name generation to comply with S3 63-char limit

* test: skip TestS3IAMPolicyEnforcement until role setup is implemented

* test: use weed mini for simpler test server deployment

Replace 'weed server' with 'weed mini' for IAM tests to avoid port binding issues
and simplify the all-in-one server deployment. This improves test reliability
and execution time.

* security: prevent allocation overflow in policy evaluation

Add maxPoliciesForEvaluation constant to cap the number of policies evaluated
in a single request. This prevents potential integer overflow when allocating
slices for policy lists that may be influenced by untrusted input.

Changes:
- Add const maxPoliciesForEvaluation = 1024 to set an upper bound
- Validate len(policies) < maxPoliciesForEvaluation before appending bucket policy
- Use append() instead of make([]string, len+1) to avoid arithmetic overflow
- Apply fix to both IsActionAllowed policy evaluation paths
2026-01-16 11:12:28 -08:00
Chris Lu
5469b7c58f fix: resolve inconsistent S3 API authorization for DELETE operations (issue #7864) (#7865)
* fix(iam): add support for fine-grained S3 actions in IAM policies

Add support for fine-grained S3 actions like s3:DeleteObject, s3:PutObject,
and other specific S3 actions in IAM policy mapping. Previously, only
coarse-grained action patterns (Put*, Get*, etc.) were supported, causing
IAM policies with specific actions to be rejected with 'not a valid action'
error.

Fixes issue #7864 part 2: s3:DeleteObject IAM action is now supported.

Changes:
- Extended MapToStatementAction() to handle fine-grained S3 actions
- Maps S3-specific actions to appropriate internal action constants
- Supports 30+ S3 actions including DeleteObject, PutObject, GetObject, etc.

* fix(s3api): correct resource ARN generation for subpath permissions

Fix convertSingleAction() to properly handle subpath patterns in legacy
actions. Previously, when a user was granted Write permission to a subpath
(e.g., Write:bucket/sub_path/*), the resource ARN was incorrectly generated,
causing DELETE operations to be denied even though s3:DeleteObject was
included in the Write action.

The fix:
- Extract bucket name and prefix path separately from patterns like
  'bucket/prefix/*'
- Generate correct S3 ARN format: arn:aws:s3:::bucket/prefix/*
- Ensure all permission checks (Read, Write, List, Tagging, etc.) work
  correctly with subpaths
- Support nested paths (e.g., bucket/a/b/c/*)

Fixes issue #7864 part 1: Write permission on subpath now allows DELETE.

Example:
- Permission: Write:mybucket/documents/*
- Objects can now be: PUT, DELETE, or ACL operations on mybucket/documents/*
- Objects outside this path are still denied

* test(iam): add tests for fine-grained S3 action mappings

Extend TestMapToStatementAction with test cases for fine-grained S3 actions:
- s3:DeleteObject
- s3:PutObject
- s3:GetObject
- s3:ListBucket
- s3:PutObjectAcl
- s3:GetObjectAcl

Ensures the new action mapping support is working correctly.

* test(s3api): add comprehensive tests for subpath permission handling

Add new test file with comprehensive tests for convertSingleAction():

1. TestConvertSingleActionDeleteObject: Verifies s3:DeleteObject is
   included in Write actions (fixes issue #7864 part 2)

2. TestConvertSingleActionSubpath: Tests proper resource ARN generation
   for different permission patterns:
   - Bucket-level: Write:mybucket -> arn:aws:s3:::mybucket
   - Wildcard: Write:mybucket/* -> arn:aws:s3:::mybucket/*
   - Subpath: Write:mybucket/sub_path/* -> arn:aws:s3:::mybucket/sub_path/*
   - Nested: Read:mybucket/documents/* -> arn:aws:s3:::mybucket/documents/*

3. TestConvertSingleActionSubpathDeleteAllowed: Specifically validates
   that subpath Write permissions allow DELETE operations

4. TestConvertSingleActionNestedPaths: Tests deeply nested path handling
   (e.g., bucket/a/b/c/*)

All tests pass and validate the fixes for issue #7864.

* fix: address review comments from PR #7865

- Fix critical bug: use parsed 'bucket' instead of 'resourcePattern' for GetObjectRetention, GetObjectLegalHold, and PutObjectLegalHold actions to avoid malformed ARNs like arn:aws:s3:::bucket/*/*
- Refactor large switch statement in MapToStatementAction() into a map-based lookup for better performance and maintainability

* fmt

* refactor: extract extractBucketAndPrefix helper and simplify convertSingleAction

- Extract extractBucketAndPrefix as a package-level function for better testability and reusability
- Remove unused bucketName parameter from convertSingleAction signature
- Update GetResourcesFromLegacyAction to use the extracted helper for consistent ARN generation
- Update all call sites in tests to match new function signature
- All tests pass and module compiles without errors

* fix: use extracted bucket variable consistently in all ARN generation branches

Replace resourcePattern with extracted bucket variable in else branches and bucket-level cases to avoid malformed ARNs like 'arn:aws:s3:::mybucket/*/*':

- Read case: bucket-level else branch
- Write case: bucket-level else branch
- Admin case: both bucket and object ARNs
- List case: bucket-level else branch
- GetBucketObjectLockConfiguration: bucket extraction
- PutBucketObjectLockConfiguration: bucket extraction

This ensures consistent ARN format: arn:aws:s3:::bucket or arn:aws:s3:::bucket/*

* fix: address remaining review comments from PR #7865

High priority fixes:
- Write action on bucket-level now generates arn:aws:s3:::mybucket/* instead of
  arn:aws:s3:::mybucket to enable object-level S3 actions (s3:PutObject, s3:DeleteObject)
- GetResourcesFromLegacyAction now generates both bucket and object ARNs for /*
  patterns to maintain backward compatibility with mixed action groups

Medium priority improvements:
- Remove unused 'bucket' field from TestConvertSingleActionSubpath test struct
- Update test to use assert.ElementsMatch instead of assert.Contains for more
  comprehensive resource ARN validation
- Clarify test expectations with expectedResources slice instead of single expectedResource

All tests pass, compilation verified

* test: improve TestConvertSingleActionNestedPaths with comprehensive assertions

Update test to use assert.ElementsMatch for more robust resource ARN verification:
- Change struct from single expectedResource to expectedResources slice
- Update Read nested path test to expect both bucket and prefix ARNs
- Use assert.ElementsMatch to verify all generated resources match exactly
- Provides complete coverage for nested path handling

This matches the improvement pattern used in TestConvertSingleActionSubpath

* refactor: simplify S3 action map and improve resource ARN detection

- Refactor fineGrainedActionMap to use init() function for programmatic population of both prefixed (s3:Action) and unprefixed (Action) variants, eliminating 70+ duplicate entries
- Add buildObjectResourceArn() helper to eliminate duplicated resource ARN generation logic across switch cases
- Fix bucket vs object-level access detection: only use HasSuffix(/*) check instead of Contains('/') which incorrectly matched patterns like 'bucket/prefix' without wildcard
- Apply buildObjectResourceArn() consistently to Tagging, BypassGovernanceRetention, GetObjectRetention, PutObjectRetention, GetObjectLegalHold, and PutObjectLegalHold cases

* fmt

* fix: generate object-level ARNs for bucket-level read access

When bucket-level read access is granted (e.g., 'Read:mybucket'),
generate both bucket and object ARNs so that object-level actions
like s3:GetObject can properly authorize.

Similarly, in GetResourcesFromLegacyAction, bucket-level patterns
should generate both ARN levels for consistency with patterns that
include wildcards. This ensures that users with bucket-level
permissions can read objects, not just the bucket itself.

* fix: address Copilot code review comments

- Remove unused bucketName parameter from ConvertIdentityToPolicy signature
  - Update all callers in examples.go and engine_test.go
  - Bucket is now extracted from action string itself

- Update extractBucketAndPrefix documentation
  - Add nested path example (bucket/a/b/c/*)
  - Clarify that prefix can contain multiple path segments

- Make GetResourcesFromLegacyAction action-aware
  - Different action types have different resource requirements
  - List actions only need bucket ARN (bucket-only operations)
  - Read/Write/Tagging actions need both bucket and object ARNs
  - Aligns with convertSingleAction logic for consistency

All tests pass successfully

* test: add comprehensive tests for GetResourcesFromLegacyAction consistency

- Add TestGetResourcesFromLegacyAction to verify action-aware resource generation
- Validate consistency with convertSingleAction for all action types:
  * List actions: bucket-only ARNs (s3:ListBucket is bucket-level operation)
  * Read actions: both bucket and object ARNs
  * Write actions: object-only ARNs (subpaths) or object ARNs (bucket-level)
  * Admin actions: both bucket and object ARNs
- Update GetResourcesFromLegacyAction to generate Admin ARNs consistent with convertSingleAction
- All tests pass (35+ test cases across integration_test.go)

* refactor: eliminate code duplication in GetResourcesFromLegacyAction

- Simplify GetResourcesFromLegacyAction to delegate to convertSingleAction
- Eliminates ~50 lines of duplicated action-type-specific logic
- Ensures single source of truth for resource ARN generation
- Improves maintainability: changes to ARN logic only need to be made in one place
- All tests pass: any inconsistencies would be caught immediately
- Addresses Gemini Code Assist review comment about code duplication

* fix: remove fragile 'dummy' action type in CreatePolicyFromLegacyIdentity

- Replace hardcoded 'dummy:' prefix with proper representative action type
- Use first valid action type from the action list to determine resource requirements
- Ensures GetResourcesFromLegacyAction receives a valid action type
- Prevents silent failures when convertSingleAction encounters unknown action
- Improves code clarity: explains why representative action type is needed
- All tests pass: policy engine tests verify correct behavior

* security: prevent privilege escalation in Admin action subpath handling

- Admin action with subpath (e.g., Admin:bucket/admin/*) now correctly restricts
  to the specified subpath instead of granting full bucket access
- If prefix exists: resources restricted to bucket + bucket/prefix/*
- If no prefix: full bucket access (unchanged behavior for root Admin)
- Added test case Admin_on_subpath to validate the security fix
- All 40+ policy engine tests pass

* refactor: address Copilot code review comments on S3 authorization

- Fix GetObjectTagging mapping: change from ACTION_READ to ACTION_TAGGING
  (tagging operations should not be classified as general read operations)

- Enhance extractBucketAndPrefix edge case handling:
  - Add input validation (reject empty strings, whitespace, slash-only)
  - Normalize double slashes and trailing slashes
  - Return empty bucket/prefix for invalid patterns
  - Prevent generation of malformed ARNs

- Separate Read action from ListBucket (AWS S3 IAM semantics):
  - ListBucket is a bucket-level operation, not object-level
  - Read action now only includes s3:GetObject, s3:GetObjectVersion
  - This aligns with AWS S3 IAM policy best practices

- Update buildObjectResourceArn to handle invalid bucket names gracefully:
  - Return empty slice if bucket is empty after validation
  - Prevents malformed ARN generation

- Add comprehensive TestExtractBucketAndPrefixEdgeCases with 8 test cases:
  - Validates empty strings, whitespace, special characters
  - Confirms proper normalization of double/trailing slashes
  - Ensures robust parsing of nested paths

- Update existing tests to reflect removed ListBucket from Read action

All 40+ policy engine tests pass

* fix: aggregate resource ARNs from all action types in CreatePolicyFromLegacyIdentity

CRITICAL FIX: The previous implementation incorrectly used a single representative
action type to determine resource ARNs when multiple legacy actions targeted the
same resource pattern. This caused incorrect policy generation when action types
with different resource requirements (e.g., List vs Write) were grouped together.

Example of the bug:
- Input: List:mybucket/path/*, Write:mybucket/path/*
- Old behavior: Used only List's resources (bucket-level ARN)
- Result: Policy had Write actions (s3:PutObject) but only bucket ARN
- Consequence: s3:PutObject would be denied due to missing object-level ARN

Solution:
- Iterate through all action types for a given resource pattern
- For each action type, call GetResourcesFromLegacyAction to get required ARNs
- Aggregate all ARNs into a set to eliminate duplicates
- Use the merged set for the final policy statement
- Admin action short-circuits (always includes full permissions)

Example of correct behavior:
- Input: List:mybucket/path/*, Write:mybucket/path/*
- New behavior: Aggregates both List and Write resource requirements
- Result: Policy has Write actions with BOTH bucket and object-level ARNs
- Outcome: s3:PutObject works correctly on mybucket/path/*

Added TestCreatePolicyFromLegacyIdentityMultipleActions with 3 test cases:
1. List + Write on subpath: verifies bucket + object ARN aggregation
2. Read + Tagging on bucket: verifies action-specific ARN combinations
3. Admin with other actions: verifies Admin dominates resource ARNs

All 45+ policy engine tests pass

* fix: remove bucket-level ARN from Read action for consistency

ISSUE: The Read action was including bucket-level ARNs (arn:aws:s3:::bucket)
even though the only S3 actions in Read are s3:GetObject and s3:GetObjectVersion,
which are object-level operations. This created a mismatch between the actions
and resources in the policy statement.

ROOT CAUSE: s3:ListBucket was previously removed from the Read action, but the
bucket-level ARN was not removed, creating an inconsistency.

SOLUTION: Update Read action to only generate object-level ARNs using
buildObjectResourceArn, consistent with how Write and Tagging actions work.

This ensures:
- Read:mybucket generates arn:aws:s3:::mybucket/* (not bucket ARN)
- Read:bucket/prefix/* generates arn:aws:s3:::bucket/prefix/* (object-level only)
- Consistency: same actions, same resources, same logic across all object operations

Updated test expectations:
- TestConvertSingleActionSubpath: Read_on_subpath now expects only object ARN
- TestConvertSingleActionNestedPaths: Read nested path now expects only object ARN
- TestConvertIdentityToPolicy: Read resources now 1 instead of 2
- TestCreatePolicyFromLegacyIdentityMultipleActions: Read+Tagging aggregates to 1 ARN

All 45+ policy engine tests pass

* doc

* fmt

* fix: address Copilot code review on Read action consistency and missing S3 action mappings

- Clarify MapToStatementAction comment to reflect exact lookup (not pattern matching)
- Add missing S3 actions to baseS3ActionMap:
  - ListBucketVersions, ListAllMyBuckets for bucket operations
  - GetBucketCors, PutBucketCors, DeleteBucketCors for CORS
  - GetBucketNotification, PutBucketNotification for notifications
  - GetBucketObjectLockConfiguration, PutBucketObjectLockConfiguration for object lock
  - GetObjectVersionTagging for version tagging
  - GetObjectVersionAcl, PutBucketAcl for ACL operations
  - PutBucketTagging, DeleteBucketTagging for bucket tagging

- Fix Read action scope inconsistency with GetActionMappings():
  - Previously: only included GetObject, GetObjectVersion
  - Now: includes full Read set (14 actions) from GetActionMappings
  - Includes both bucket-level (ListBucket*, GetBucket*) and object-level (GetObject*) ARNs
  - Bucket ARN enables ListBucket operations, object ARN enables GetObject operations

- Update all test expectations:
  - TestConvertSingleActionSubpath: Read now returns 2 ARNs (bucket + objects)
  - TestConvertSingleActionNestedPaths: Read nested path now includes bucket ARN
  - TestGetResourcesFromLegacyAction: Read test cases updated for consistency
  - TestCreatePolicyFromLegacyIdentityMultipleActions: Read_and_Tagging now returns 2 ARNs
  - TestConvertIdentityToPolicy: Updated to expect 14 Read actions and 2 resources

Fixes: Inconsistency between convertSingleAction Read case and GetActionMappings function

* fmt

* fix: align convertSingleAction with GetActionMappings and add bucket validation

- Fix Write action: now includes all 16 actions from GetActionMappings (object and bucket operations)
  - Includes PutBucketVersioning, PutBucketCors, PutBucketAcl, PutBucketTagging, etc.
  - Generates both bucket and object ARNs to support bucket-level operations

- Fix List action: add ListAllMyBuckets from GetActionMappings
  - Previously: ListBucket, ListBucketVersions
  - Now: ListBucket, ListBucketVersions, ListAllMyBuckets
  - Add bucket validation to prevent malformed ARNs with empty bucket

- Fix Tagging action: include bucket-level tagging operations
  - Previously: only object-level (GetObjectTagging, PutObjectTagging, DeleteObjectTagging)
  - Now: includes bucket-level (GetBucketTagging, PutBucketTagging, DeleteBucketTagging)
  - Generates both bucket and object ARNs to support bucket-level operations

- Add bucket validation to prevent malformed ARNs:
  - Admin: return error if bucket is empty
  - List: generate empty resources if bucket is empty
  - Tagging: check bucket before generating ARNs
  - GetBucketObjectLockConfiguration, PutBucketObjectLockConfiguration: validate bucket

- Fix TrimRight issue in extractBucketAndPrefix:
  - Change from strings.TrimRight(pattern, "/") to remove only one trailing slash
  - Prevents loss of prefix when pattern has multiple trailing slashes

- Update all test cases:
  - TestConvertSingleActionSubpath: Write now returns 16 actions and bucket+object ARNs
  - TestConvertSingleActionNestedPaths: Write includes bucket ARN
  - TestGetResourcesFromLegacyAction: Updated Write and Tagging expectations
  - TestCreatePolicyFromLegacyIdentityMultipleActions: Updated action/resource counts

Fixes: Inconsistencies between convertSingleAction and GetActionMappings for Write/List/Tagging actions

* fmt

* fix: resolve ListMultipartUploads/ListParts mapping inconsistency and add action validation

- Fix ListMultipartUploads and ListParts mapping in helpers.go:
  - Changed from ACTION_LIST to ACTION_WRITE for consistency with GetActionMappings
  - These operations are part of the multipart write workflow and should map to Write action
  - Prevents inconsistent behavior when same actions processed through different code paths

- Add documentation to clarify multipart operations in Write action:
  - Explain why ListMultipartUploads and ListParts are part of Write permissions
  - These are required for meaningful multipart upload workflow management

- Add action validation to CreatePolicyFromLegacyIdentity:
  - Validates action format before processing using ValidateActionMapping
  - Logs warnings for invalid actions instead of silently skipping them
  - Provides clearer error messages when invalid action types are used
  - Ensures users know when their intended permissions weren't applied
  - Consistent with ConvertLegacyActions validation approach

Fixes: Inconsistent action type mappings and silent failure for invalid actions
2025-12-24 10:29:30 -08:00
Chris Lu
d6d893c8c3 s3: add s3:ExistingObjectTag condition support for bucket policies (#7677)
* s3: add s3:ExistingObjectTag condition support in policy engine

Add support for s3:ExistingObjectTag/<tag-key> condition keys in bucket
policies, allowing access control based on object tags.

Changes:
- Add ObjectEntry field to PolicyEvaluationArgs (entry.Extended metadata)
- Update EvaluateConditions to handle s3:ExistingObjectTag/<key> format
- Extract tag value from entry metadata using X-Amz-Tagging-<key> prefix

This enables policies like:
{
  "Condition": {
    "StringEquals": {
      "s3:ExistingObjectTag/status": ["public"]
    }
  }
}

Fixes: https://github.com/seaweedfs/seaweedfs/issues/7447

* s3: update EvaluatePolicy to accept object entry for tag conditions

Update BucketPolicyEngine.EvaluatePolicy to accept objectEntry parameter
(entry.Extended metadata) for evaluating tag-based policy conditions.

Changes:
- Add objectEntry parameter to EvaluatePolicy method
- Update callers in auth_credentials.go and s3api_bucket_handlers.go
- Pass nil for objectEntry in auth layer (entry fetched later in handlers)

For tag-based conditions to work, handlers should call EvaluatePolicy
with the object's entry.Extended after fetching the entry from filer.

* s3: add tests for s3:ExistingObjectTag policy conditions

Add comprehensive tests for object tag-based policy conditions:

- TestExistingObjectTagCondition: Basic tag matching scenarios
  - Matching/non-matching tag values
  - Missing tags, no tags, empty tags
  - Multiple tags with one matching

- TestExistingObjectTagConditionMultipleTags: Multiple tag conditions
  - Both tags match
  - Only one tag matches

- TestExistingObjectTagDenyPolicy: Deny policies with tag conditions
  - Default allow without tag
  - Deny when specific tag present

* s3: document s3:ExistingObjectTag support and feature status

Update policy engine documentation:

- Add s3:ExistingObjectTag/<tag-key> to supported condition keys
- Add 'Object Tag-Based Access Control' section with examples
- Add 'Feature Status' section with implemented and planned features

Planned features for future implementation:
- s3:RequestObjectTag/<key>
- s3:RequestObjectTagKeys
- s3:x-amz-server-side-encryption
- Cross-account access

* Implement tag-based policy re-check in handlers

- Add checkPolicyWithEntry helper to S3ApiServer for handlers to re-check
  policy after fetching object entry (for s3:ExistingObjectTag conditions)
- Add HasPolicyForBucket method to policy engine for efficient check
- Integrate policy re-check in GetObjectHandler after entry is fetched
- Integrate policy re-check in HeadObjectHandler after entry is fetched
- Update auth_credentials.go comments to explain two-phase evaluation
- Update documentation with supported operations for tag-based conditions

This implements 'Approach 1' where handlers re-check the policy with
the object entry after fetching it, allowing tag-based conditions to
be properly evaluated.

* Add integration tests for s3:ExistingObjectTag conditions

- Add TestCheckPolicyWithEntry: tests checkPolicyWithEntry helper with various
  tag scenarios (matching tags, non-matching tags, empty entry, nil entry)
- Add TestCheckPolicyWithEntryNoPolicyForBucket: tests early return when no policy
- Add TestCheckPolicyWithEntryNilPolicyEngine: tests nil engine handling
- Add TestCheckPolicyWithEntryDenyPolicy: tests deny policies with tag conditions
- Add TestHasPolicyForBucket: tests HasPolicyForBucket method

These tests cover the Phase 2 policy evaluation with object entry metadata,
ensuring tag-based conditions are properly evaluated.

* Address code review nitpicks

- Remove unused extractObjectTags placeholder function (engine.go)
- Add clarifying comment about s3:ExistingObjectTag/<key> evaluation
- Consolidate duplicate tag-based examples in README
- Factor out tagsToEntry helper to package level in tests

* Address code review feedback

- Fix unsafe type assertions in GetObjectHandler and HeadObjectHandler
  when getting identity from context (properly handle type assertion failure)
- Extract getConditionContextValue helper to eliminate duplicated logic
  between EvaluateConditions and EvaluateConditionsLegacy
- Ensure consistent handling of missing condition keys (always return
  empty slice)

* Fix GetObjectHandler to match HeadObjectHandler pattern

Add safety check for nil objectEntryForSSE before tag-based policy
evaluation, ensuring tag-based conditions are always evaluated rather
than silently skipped if entry is unexpectedly nil.

Addresses review comment from Copilot.

* Fix HeadObject action name in docs for consistency

Change 'HeadObject' to 's3:HeadObject' to match other action names.

* Extract recheckPolicyWithObjectEntry helper to reduce duplication

Move the repeated identity extraction and policy re-check logic from
GetObjectHandler and HeadObjectHandler into a shared helper method.

* Add validation for empty tag key in s3:ExistingObjectTag condition

Prevent potential issues with malformed policies containing
s3:ExistingObjectTag/ (empty tag key after slash).
2025-12-09 09:48:13 -08:00
Chris Lu
508d06d9a5 S3: Enforce bucket policy (#7471)
* evaluate policies during authorization

* cache bucket policy

* refactor

* matching with regex special characters

* Case Sensitivity, pattern cache, Dead Code Removal

* Fixed Typo, Restored []string Case, Added Cache Size Limit

* hook up with policy engine

* remove old implementation

* action mapping

* validate

* if not specified, fall through to IAM checks

* fmt

* Fail-close on policy evaluation errors

* Explicit `Allow` bypasses IAM checks

* fix error message

* arn:seaweed => arn:aws

* remove legacy support

* fix tests

* Clean up bucket policy after this test

* fix for tests

* address comments

* security fixes

* fix tests

* temp comment out
2025-11-12 22:14:50 -08:00
Chris Lu
c5a9c27449 Migrate from deprecated azure-storage-blob-go to modern Azure SDK (#7310)
* Migrate from deprecated azure-storage-blob-go to modern Azure SDK

Migrates Azure Blob Storage integration from the deprecated
github.com/Azure/azure-storage-blob-go to the modern
github.com/Azure/azure-sdk-for-go/sdk/storage/azblob SDK.

## Changes

### Removed Files
- weed/remote_storage/azure/azure_highlevel.go
  - Custom upload helper no longer needed with new SDK

### Updated Files
- weed/remote_storage/azure/azure_storage_client.go
  - Migrated from ServiceURL/ContainerURL/BlobURL to Client-based API
  - Updated client creation using NewClientWithSharedKeyCredential
  - Replaced ListBlobsFlatSegment with NewListBlobsFlatPager
  - Updated Download to DownloadStream with proper HTTPRange
  - Replaced custom uploadReaderAtToBlockBlob with UploadStream
  - Updated GetProperties, SetMetadata, Delete to use new client methods
  - Fixed metadata conversion to return map[string]*string

- weed/replication/sink/azuresink/azure_sink.go
  - Migrated from ContainerURL to Client-based API
  - Updated client initialization
  - Replaced AppendBlobURL with AppendBlobClient
  - Updated error handling to use azcore.ResponseError
  - Added streaming.NopCloser for AppendBlock

### New Test Files
- weed/remote_storage/azure/azure_storage_client_test.go
  - Comprehensive unit tests for all client operations
  - Tests for Traverse, ReadFile, WriteFile, UpdateMetadata, Delete
  - Tests for metadata conversion function
  - Benchmark tests
  - Integration tests (skippable without credentials)

- weed/replication/sink/azuresink/azure_sink_test.go
  - Unit tests for Azure sink operations
  - Tests for CreateEntry, UpdateEntry, DeleteEntry
  - Tests for cleanKey function
  - Tests for configuration-based initialization
  - Integration tests (skippable without credentials)
  - Benchmark tests

### Dependency Updates
- go.mod: Removed github.com/Azure/azure-storage-blob-go v0.15.0
- go.mod: Made github.com/Azure/azure-sdk-for-go/sdk/storage/azblob v1.6.2 direct dependency
- All deprecated dependencies automatically cleaned up

## API Migration Summary

Old SDK → New SDK mappings:
- ServiceURL → Client (service-level operations)
- ContainerURL → ContainerClient
- BlobURL → BlobClient
- BlockBlobURL → BlockBlobClient
- AppendBlobURL → AppendBlobClient
- ListBlobsFlatSegment() → NewListBlobsFlatPager()
- Download() → DownloadStream()
- Upload() → UploadStream()
- Marker-based pagination → Pager-based pagination
- azblob.ResponseError → azcore.ResponseError

## Testing

All tests pass:
-  Unit tests for metadata conversion
-  Unit tests for helper functions (cleanKey)
-  Interface implementation tests
-  Build successful
-  No compilation errors
-  Integration tests available (require Azure credentials)

## Benefits

-  Uses actively maintained SDK
-  Better performance with modern API design
-  Improved error handling
-  Removes ~200 lines of custom upload code
-  Reduces dependency count
-  Better async/streaming support
-  Future-proof against SDK deprecation

## Backward Compatibility

The changes are transparent to users:
- Same configuration parameters (account name, account key)
- Same functionality and behavior
- No changes to SeaweedFS API or user-facing features
- Existing Azure storage configurations continue to work

## Breaking Changes

None - this is an internal implementation change only.

* Address Gemini Code Assist review comments

Fixed three issues identified by Gemini Code Assist:

1. HIGH: ReadFile now uses blob.CountToEnd when size is 0
   - Old SDK: size=0 meant "read to end"
   - New SDK: size=0 means "read 0 bytes"
   - Fix: Use blob.CountToEnd (-1) to read entire blob from offset

2. MEDIUM: Use to.Ptr() instead of slice trick for DeleteSnapshots
   - Replaced &[]Type{value}[0] with to.Ptr(value)
   - Cleaner, more idiomatic Azure SDK pattern
   - Applied to both azure_storage_client.go and azure_sink.go

3. Added missing imports:
   - github.com/Azure/azure-sdk-for-go/sdk/azcore/to

These changes improve code clarity and correctness while following
Azure SDK best practices.

* Address second round of Gemini Code Assist review comments

Fixed all issues identified in the second review:

1. MEDIUM: Added constants for hardcoded values
   - Defined defaultBlockSize (4 MB) and defaultConcurrency (16)
   - Applied to WriteFile UploadStream options
   - Improves maintainability and readability

2. MEDIUM: Made DeleteFile idempotent
   - Now returns nil (no error) if blob doesn't exist
   - Uses bloberror.HasCode(err, bloberror.BlobNotFound)
   - Consistent with idempotent operation expectations

3. Fixed TestToMetadata test failures
   - Test was using lowercase 'x-amz-meta-' but constant is 'X-Amz-Meta-'
   - Updated test to use s3_constants.AmzUserMetaPrefix
   - All tests now pass

Changes:
- Added import: github.com/Azure/azure-sdk-for-go/sdk/storage/azblob/bloberror
- Added constants: defaultBlockSize, defaultConcurrency
- Updated WriteFile to use constants
- Updated DeleteFile to be idempotent
- Fixed test to use correct S3 metadata prefix constant

All tests pass. Build succeeds. Code follows Azure SDK best practices.

* Address third round of Gemini Code Assist review comments

Fixed all issues identified in the third review:

1. MEDIUM: Use bloberror.HasCode for ContainerAlreadyExists
   - Replaced fragile string check with bloberror.HasCode()
   - More robust and aligned with Azure SDK best practices
   - Applied to CreateBucket test

2. MEDIUM: Use bloberror.HasCode for BlobNotFound in test
   - Replaced generic error check with specific BlobNotFound check
   - Makes test more precise and verifies correct error returned
   - Applied to VerifyDeleted test

3. MEDIUM: Made DeleteEntry idempotent in azure_sink.go
   - Now returns nil (no error) if blob doesn't exist
   - Uses bloberror.HasCode(err, bloberror.BlobNotFound)
   - Consistent with DeleteFile implementation
   - Makes replication sink more robust to retries

Changes:
- Added import to azure_storage_client_test.go: bloberror
- Added import to azure_sink.go: bloberror
- Updated CreateBucket test to use bloberror.HasCode
- Updated VerifyDeleted test to use bloberror.HasCode
- Updated DeleteEntry to be idempotent

All tests pass. Build succeeds. Code uses Azure SDK best practices.

* Address fourth round of Gemini Code Assist review comments

Fixed two critical issues identified in the fourth review:

1. HIGH: Handle BlobAlreadyExists in append blob creation
   - Problem: If append blob already exists, Create() fails causing replication failure
   - Fix: Added bloberror.HasCode(err, bloberror.BlobAlreadyExists) check
   - Behavior: Existing append blobs are now acceptable, appends can proceed
   - Impact: Makes replication sink more robust, prevents unnecessary failures
   - Location: azure_sink.go CreateEntry function

2. MEDIUM: Configure custom retry policy for download resiliency
   - Problem: Old SDK had MaxRetryRequests: 20, new SDK defaults to 3 retries
   - Fix: Configured policy.RetryOptions with MaxRetries: 10
   - Settings: TryTimeout=1min, RetryDelay=2s, MaxRetryDelay=1min
   - Impact: Maintains similar resiliency in unreliable network conditions
   - Location: azure_storage_client.go client initialization

Changes:
- Added import: github.com/Azure/azure-sdk-for-go/sdk/azcore/policy
- Updated NewClientWithSharedKeyCredential to include ClientOptions with retry policy
- Updated CreateEntry error handling to allow BlobAlreadyExists

Technical details:
- Retry policy uses exponential backoff (default SDK behavior)
- MaxRetries=10 provides good balance (was 20 in old SDK, default is 3)
- TryTimeout prevents individual requests from hanging indefinitely
- BlobAlreadyExists handling allows idempotent append operations

All tests pass. Build succeeds. Code is more resilient and robust.

* Update weed/replication/sink/azuresink/azure_sink.go

Co-authored-by: gemini-code-assist[bot] <176961590+gemini-code-assist[bot]@users.noreply.github.com>

* Revert "Update weed/replication/sink/azuresink/azure_sink.go"

This reverts commit 605e41cadf4aaa3bb7b1796f71233ff73d90ed72.

* Address fifth round of Gemini Code Assist review comment

Added retry policy to azure_sink.go for consistency and resiliency:

1. MEDIUM: Configure retry policy in azure_sink.go client
   - Problem: azure_sink.go was using default retry policy (3 retries) while
     azure_storage_client.go had custom policy (10 retries)
   - Fix: Added same retry policy configuration for consistency
   - Settings: MaxRetries=10, TryTimeout=1min, RetryDelay=2s, MaxRetryDelay=1min
   - Impact: Replication sink now has same resiliency as storage client
   - Rationale: Replication sink needs to be robust against transient network errors

Changes:
- Added import: github.com/Azure/azure-sdk-for-go/sdk/azcore/policy
- Updated NewClientWithSharedKeyCredential call in initialize() function
- Both azure_storage_client.go and azure_sink.go now have identical retry policies

Benefits:
- Consistency: Both Azure clients now use same retry configuration
- Resiliency: Replication operations more robust to network issues
- Best practices: Follows Azure SDK recommended patterns for production use

All tests pass. Build succeeds. Code is consistent and production-ready.

* fmt

* Address sixth round of Gemini Code Assist review comment

Fixed HIGH priority metadata key validation for Azure compliance:

1. HIGH: Handle metadata keys starting with digits
   - Problem: Azure Blob Storage requires metadata keys to be valid C# identifiers
   - Constraint: C# identifiers cannot start with a digit (0-9)
   - Issue: S3 metadata like 'x-amz-meta-123key' would fail with InvalidInput error
   - Fix: Prefix keys starting with digits with underscore '_'
   - Example: '123key' becomes '_123key', '456-test' becomes '_456_test'

2. Code improvement: Use strings.ReplaceAll for better readability
   - Changed from: strings.Replace(str, "-", "_", -1)
   - Changed to: strings.ReplaceAll(str, "-", "_")
   - Both are functionally equivalent, ReplaceAll is more readable

Changes:
- Updated toMetadata() function in azure_storage_client.go
- Added digit prefix check: if key[0] >= '0' && key[0] <= '9'
- Added comprehensive test case 'keys starting with digits'
- Tests cover: '123key' -> '_123key', '456-test' -> '_456_test', '789' -> '_789'

Technical details:
- Azure SDK validates metadata keys as C# identifiers
- C# identifier rules: must start with letter or underscore
- Digits allowed in identifiers but not as first character
- This prevents SetMetadata() and UploadStream() failures

All tests pass including new test case. Build succeeds.
Code is now fully compliant with Azure metadata requirements.

* Address seventh round of Gemini Code Assist review comment

Normalize metadata keys to lowercase for S3 compatibility:

1. MEDIUM: Convert metadata keys to lowercase
   - Rationale: S3 specification stores user-defined metadata keys in lowercase
   - Consistency: Azure Blob Storage metadata is case-insensitive
   - Best practice: Normalizing to lowercase ensures consistent behavior
   - Example: 'x-amz-meta-My-Key' -> 'my_key' (not 'My_Key')

Changes:
- Updated toMetadata() to apply strings.ToLower() to keys
- Added comment explaining S3 lowercase normalization
- Order of operations: strip prefix -> lowercase -> replace dashes -> check digits

Test coverage:
- Added new test case 'uppercase and mixed case keys'
- Tests: 'My-Key' -> 'my_key', 'UPPERCASE' -> 'uppercase', 'MiXeD-CaSe' -> 'mixed_case'
- All 6 test cases pass

Benefits:
- S3 compatibility: Matches S3 metadata key behavior
- Azure consistency: Case-insensitive keys work predictably
- Cross-platform: Same metadata keys work identically on both S3 and Azure
- Prevents issues: No surprises from case-sensitive key handling

Implementation:
```go
key := strings.ReplaceAll(strings.ToLower(k[len(s3_constants.AmzUserMetaPrefix):]), "-", "_")
```

All tests pass. Build succeeds. Metadata handling is now fully S3-compatible.

* Address eighth round of Gemini Code Assist review comments

Use %w instead of %v for error wrapping across both files:

1. MEDIUM: Error wrapping in azure_storage_client.go
   - Problem: Using %v in fmt.Errorf loses error type information
   - Modern Go practice: Use %w to preserve error chains
   - Benefit: Enables errors.Is() and errors.As() for callers
   - Example: Can check for bloberror.BlobNotFound after wrapping

2. MEDIUM: Error wrapping in azure_sink.go
   - Applied same improvement for consistency
   - All error wrapping now preserves underlying errors
   - Improved debugging and error handling capabilities

Changes applied to all fmt.Errorf calls:
- azure_storage_client.go: 10 instances changed from %v to %w
  - Invalid credential error
  - Client creation error
  - Traverse errors
  - Download errors (2)
  - Upload error
  - Delete error
  - Create/Delete bucket errors (2)

- azure_sink.go: 3 instances changed from %v to %w
  - Credential creation error
  - Client creation error
  - Delete entry error
  - Create append blob error

Benefits:
- Error inspection: Callers can use errors.Is(err, target)
- Error unwrapping: Callers can use errors.As(err, &target)
- Type preservation: Original error types maintained through wraps
- Better debugging: Full error chain available for inspection
- Modern Go: Follows Go 1.13+ error wrapping best practices

Example usage after this change:
```go
err := client.ReadFile(...)
if errors.Is(err, bloberror.BlobNotFound) {
    // Can detect specific Azure errors even after wrapping
}
```

All tests pass. Build succeeds. Error handling is now modern and robust.

* Address ninth round of Gemini Code Assist review comment

Improve metadata key sanitization with comprehensive character validation:

1. MEDIUM: Complete Azure C# identifier validation
   - Problem: Previous implementation only handled dashes, not all invalid chars
   - Issue: Keys like 'my.key', 'key+plus', 'key@symbol' would cause InvalidMetadata
   - Azure requirement: Metadata keys must be valid C# identifiers
   - Valid characters: letters (a-z, A-Z), digits (0-9), underscore (_) only

2. Implemented robust regex-based sanitization
   - Added package-level regex: `[^a-zA-Z0-9_]`
   - Matches ANY character that's not alphanumeric or underscore
   - Replaces all invalid characters with underscore
   - Compiled once at package init for performance

Implementation details:
- Regex declared at package level: var invalidMetadataChars = regexp.MustCompile(`[^a-zA-Z0-9_]`)
- Avoids recompiling regex on every toMetadata() call
- Efficient single-pass replacement of all invalid characters
- Processing order: lowercase -> regex replace -> digit check

Examples of character transformations:
- Dots: 'my.key' -> 'my_key'
- Plus: 'key+plus' -> 'key_plus'
- At symbol: 'key@symbol' -> 'key_symbol'
- Mixed: 'key-with.' -> 'key_with_'
- Slash: 'key/slash' -> 'key_slash'
- Combined: '123-key.value+test' -> '_123_key_value_test'

Test coverage:
- Added comprehensive test case 'keys with invalid characters'
- Tests: dot, plus, at-symbol, dash+dot, slash
- All 7 test cases pass (was 6, now 7)

Benefits:
- Complete Azure compliance: Handles ALL invalid characters
- Robust: Works with any S3 metadata key format
- Performant: Regex compiled once, reused efficiently
- Maintainable: Single source of truth for valid characters
- Prevents errors: No more InvalidMetadata errors during upload

All tests pass. Build succeeds. Metadata sanitization is now bulletproof.

* Address tenth round review - HIGH: Fix metadata key collision issue

Prevent metadata loss by using hex encoding for invalid characters:

1. HIGH PRIORITY: Metadata key collision prevention
   - Critical Issue: Different S3 keys mapping to same Azure key causes data loss
   - Example collisions (BEFORE):
     * 'my-key' -> 'my_key'
     * 'my.key' -> 'my_key'   COLLISION! Second overwrites first
     * 'my_key' -> 'my_key'   All three map to same key!

   - Fixed with hex encoding (AFTER):
     * 'my-key' -> 'my_2d_key' (dash = 0x2d)
     * 'my.key' -> 'my_2e_key' (dot = 0x2e)
     * 'my_key' -> 'my_key'    (underscore is valid)
      All three are now unique!

2. Implemented collision-proof hex encoding
   - Pattern: Invalid chars -> _XX_ where XX is hex code
   - Dash (0x2d): 'content-type' -> 'content_2d_type'
   - Dot (0x2e): 'my.key' -> 'my_2e_key'
   - Plus (0x2b): 'key+plus' -> 'key_2b_plus'
   - At (0x40): 'key@symbol' -> 'key_40_symbol'
   - Slash (0x2f): 'key/slash' -> 'key_2f_slash'

3. Created sanitizeMetadataKey() function
   - Encapsulates hex encoding logic
   - Uses ReplaceAllStringFunc for efficient transformation
   - Maintains digit prefix check for Azure C# identifier rules
   - Clear documentation with examples

Implementation details:
```go
func sanitizeMetadataKey(key string) string {
    // Replace each invalid character with _XX_ where XX is the hex code
    result := invalidMetadataChars.ReplaceAllStringFunc(key, func(s string) string {
        return fmt.Sprintf("_%02x_", s[0])
    })

    // Azure metadata keys cannot start with a digit
    if len(result) > 0 && result[0] >= '0' && result[0] <= '9' {
        result = "_" + result
    }

    return result
}
```

Why hex encoding solves the collision problem:
- Each invalid character gets unique hex representation
- Two-digit hex ensures no confusion (always _XX_ format)
- Preserves all information from original key
- Reversible (though not needed for this use case)
- Azure-compliant (hex codes don't introduce new invalid chars)

Test coverage:
- Updated all test expectations to match hex encoding
- Added 'collision prevention' test case demonstrating uniqueness:
  * Tests my-key, my.key, my_key all produce different results
  * Proves metadata from different S3 keys won't collide
- Total test cases: 8 (was 7, added collision prevention)

Examples from tests:
- 'content-type' -> 'content_2d_type' (0x2d = dash)
- '456-test' -> '_456_2d_test' (digit prefix + dash)
- 'My-Key' -> 'my_2d_key' (lowercase + hex encode dash)
- 'key-with.' -> 'key_2d_with_2e_' (multiple chars: dash, dot, trailing dot)

Benefits:
-  Zero collision risk: Every unique S3 key -> unique Azure key
-  Data integrity: No metadata loss from overwrites
-  Complete info preservation: Original key distinguishable
-  Azure compliant: Hex-encoded keys are valid C# identifiers
-  Maintainable: Clean function with clear purpose
-  Testable: Collision prevention explicitly tested

All tests pass. Build succeeds. Metadata integrity is now guaranteed.

---------

Co-authored-by: gemini-code-assist[bot] <176961590+gemini-code-assist[bot]@users.noreply.github.com>
2025-10-08 23:12:03 -07:00
Chris Lu
50530e2553 S3 API: Add SSE-S3 (#7151)
* implement sse-c

* fix Content-Range

* adding tests

* Update s3_sse_c_test.go

* copy sse-c objects

* adding tests

* refactor

* multi reader

* remove extra write header call

* refactor

* SSE-C encrypted objects do not support HTTP Range requests

* robust

* fix server starts

* Update Makefile

* Update Makefile

* ci: remove SSE-C integration tests and workflows; delete test/s3/encryption/

* s3: SSE-C MD5 must be base64 (case-sensitive); fix validation, comparisons, metadata storage; update tests

* minor

* base64

* Update SSE-C_IMPLEMENTATION.md

Co-authored-by: gemini-code-assist[bot] <176961590+gemini-code-assist[bot]@users.noreply.github.com>

* Update weed/s3api/s3api_object_handlers.go

Co-authored-by: gemini-code-assist[bot] <176961590+gemini-code-assist[bot]@users.noreply.github.com>

* Update SSE-C_IMPLEMENTATION.md

Co-authored-by: gemini-code-assist[bot] <176961590+gemini-code-assist[bot]@users.noreply.github.com>

* address comments

* fix test

* fix compilation

* Bucket Default Encryption

To complete the SSE-KMS implementation for production use:
Add AWS KMS Provider - Implement weed/kms/aws/aws_kms.go using AWS SDK
Integrate with S3 Handlers - Update PUT/GET object handlers to use SSE-KMS
Add Multipart Upload Support - Extend SSE-KMS to multipart uploads
Configuration Integration - Add KMS configuration to filer.toml
Documentation - Update SeaweedFS wiki with SSE-KMS usage examples

* store bucket sse config in proto

* add more tests

* Update SSE-C_IMPLEMENTATION.md

Co-authored-by: gemini-code-assist[bot] <176961590+gemini-code-assist[bot]@users.noreply.github.com>

* Fix rebase errors and restore structured BucketMetadata API

Merge Conflict Fixes:
- Fixed merge conflicts in header.go (SSE-C and SSE-KMS headers)
- Fixed merge conflicts in s3api_errors.go (SSE-C and SSE-KMS error codes)
- Fixed merge conflicts in s3_sse_c.go (copy strategy constants)
- Fixed merge conflicts in s3api_object_handlers_copy.go (copy strategy usage)

API Restoration:
- Restored BucketMetadata struct with Tags, CORS, and Encryption fields
- Restored structured API functions: GetBucketMetadata, SetBucketMetadata, UpdateBucketMetadata
- Restored helper functions: UpdateBucketTags, UpdateBucketCORS, UpdateBucketEncryption
- Restored clear functions: ClearBucketTags, ClearBucketCORS, ClearBucketEncryption

Handler Updates:
- Updated GetBucketTaggingHandler to use GetBucketMetadata() directly
- Updated PutBucketTaggingHandler to use UpdateBucketTags()
- Updated DeleteBucketTaggingHandler to use ClearBucketTags()
- Updated CORS handlers to use UpdateBucketCORS() and ClearBucketCORS()
- Updated loadCORSFromBucketContent to use GetBucketMetadata()

Internal Function Updates:
- Updated getBucketMetadata() to return *BucketMetadata struct
- Updated setBucketMetadata() to accept *BucketMetadata struct
- Updated getBucketEncryptionMetadata() to use GetBucketMetadata()
- Updated setBucketEncryptionMetadata() to use SetBucketMetadata()

Benefits:
- Resolved all rebase conflicts while preserving both SSE-C and SSE-KMS functionality
- Maintained consistent structured API throughout the codebase
- Eliminated intermediate wrapper functions for cleaner code
- Proper error handling with better granularity
- All tests passing and build successful

The bucket metadata system now uses a unified, type-safe, structured API
that supports tags, CORS, and encryption configuration consistently.

* Fix updateEncryptionConfiguration for first-time bucket encryption setup

- Change getBucketEncryptionMetadata to getBucketMetadata to avoid failures when no encryption config exists
- Change setBucketEncryptionMetadata to setBucketMetadataWithEncryption for consistency
- This fixes the critical issue where bucket encryption configuration failed for buckets without existing encryption

Fixes: https://github.com/seaweedfs/seaweedfs/pull/7144#discussion_r2285669572

* Fix rebase conflicts and maintain structured BucketMetadata API

Resolved Conflicts:
- Fixed merge conflicts in s3api_bucket_config.go between structured API (HEAD) and old intermediate functions
- Kept modern structured API approach: UpdateBucketCORS, ClearBucketCORS, UpdateBucketEncryption
- Removed old intermediate functions: setBucketTags, deleteBucketTags, setBucketMetadataWithEncryption

API Consistency Maintained:
- updateCORSConfiguration: Uses UpdateBucketCORS() directly
- removeCORSConfiguration: Uses ClearBucketCORS() directly
- updateEncryptionConfiguration: Uses UpdateBucketEncryption() directly
- All structured API functions preserved: GetBucketMetadata, SetBucketMetadata, UpdateBucketMetadata

Benefits:
- Maintains clean separation between API layers
- Preserves atomic metadata updates with proper error handling
- Eliminates function indirection for better performance
- Consistent API usage pattern throughout codebase
- All tests passing and build successful

The bucket metadata system continues to use the unified, type-safe, structured API
that properly handles tags, CORS, and encryption configuration without any
intermediate wrapper functions.

* Fix complex rebase conflicts and maintain clean structured BucketMetadata API

Resolved Complex Conflicts:
- Fixed merge conflicts between modern structured API (HEAD) and mixed approach
- Removed duplicate function declarations that caused compilation errors
- Consistently chose structured API approach over intermediate functions

Fixed Functions:
- BucketMetadata struct: Maintained clean field alignment
- loadCORSFromBucketContent: Uses GetBucketMetadata() directly
- updateCORSConfiguration: Uses UpdateBucketCORS() directly
- removeCORSConfiguration: Uses ClearBucketCORS() directly
- getBucketMetadata: Returns *BucketMetadata struct consistently
- setBucketMetadata: Accepts *BucketMetadata struct consistently

Removed Duplicates:
- Eliminated duplicate GetBucketMetadata implementations
- Eliminated duplicate SetBucketMetadata implementations
- Eliminated duplicate UpdateBucketMetadata implementations
- Eliminated duplicate helper functions (UpdateBucketTags, etc.)

API Consistency Achieved:
- Single, unified BucketMetadata struct for all operations
- Atomic updates through UpdateBucketMetadata with function callbacks
- Type-safe operations with proper error handling
- No intermediate wrapper functions cluttering the API

Benefits:
- Clean, maintainable codebase with no function duplication
- Consistent structured API usage throughout all bucket operations
- Proper error handling and type safety
- Build successful and all tests passing

The bucket metadata system now has a completely clean, structured API
without any conflicts, duplicates, or inconsistencies.

* Update remaining functions to use new structured BucketMetadata APIs directly

Updated functions to follow the pattern established in bucket config:
- getEncryptionConfiguration() -> Uses GetBucketMetadata() directly
- removeEncryptionConfiguration() -> Uses ClearBucketEncryption() directly

Benefits:
- Consistent API usage pattern across all bucket metadata operations
- Simpler, more readable code that leverages the structured API
- Eliminates calls to intermediate legacy functions
- Better error handling and logging consistency
- All tests pass with improved functionality

This completes the transition to using the new structured BucketMetadata API
throughout the entire bucket configuration and encryption subsystem.

* Fix GitHub PR #7144 code review comments

Address all code review comments from Gemini Code Assist bot:

1. **High Priority - SSE-KMS Key Validation**: Fixed ValidateSSEKMSKey to allow empty KMS key ID
   - Empty key ID now indicates use of default KMS key (consistent with AWS behavior)
   - Updated ParseSSEKMSHeaders to call validation after parsing
   - Enhanced isValidKMSKeyID to reject keys with spaces and invalid characters

2. **Medium Priority - KMS Registry Error Handling**: Improved error collection in CloseAll
   - Now collects all provider close errors instead of only returning the last one
   - Uses proper error formatting with %w verb for error wrapping
   - Returns single error for one failure, combined message for multiple failures

3. **Medium Priority - Local KMS Aliases Consistency**: Fixed alias handling in CreateKey
   - Now updates the aliases slice in-place to maintain consistency
   - Ensures both p.keys map and key.Aliases slice use the same prefixed format

All changes maintain backward compatibility and improve error handling robustness.
Tests updated and passing for all scenarios including edge cases.

* Use errors.Join for KMS registry error handling

Replace manual string building with the more idiomatic errors.Join function:

- Removed manual error message concatenation with strings.Builder
- Simplified error handling logic by using errors.Join(allErrors...)
- Removed unnecessary string import
- Added errors import for errors.Join

This approach is cleaner, more idiomatic, and automatically handles:
- Returning nil for empty error slice
- Returning single error for one-element slice
- Properly formatting multiple errors with newlines

The errors.Join function was introduced in Go 1.20 and is the
recommended way to combine multiple errors.

* Update registry.go

* Fix GitHub PR #7144 latest review comments

Address all new code review comments from Gemini Code Assist bot:

1. **High Priority - SSE-KMS Detection Logic**: Tightened IsSSEKMSEncrypted function
   - Now relies only on the canonical x-amz-server-side-encryption header
   - Removed redundant check for x-amz-encrypted-data-key metadata
   - Prevents misinterpretation of objects with inconsistent metadata state
   - Updated test case to reflect correct behavior (encrypted data key only = false)

2. **Medium Priority - UUID Validation**: Enhanced KMS key ID validation
   - Replaced simplistic length/hyphen count check with proper regex validation
   - Added regexp import for robust UUID format checking
   - Regex pattern: ^[a-fA-F0-9]{8}-[a-fA-F0-9]{4}-[a-fA-F0-9]{4}-[a-fA-F0-9]{4}-[a-fA-F0-9]{12}$
   - Prevents invalid formats like '------------------------------------' from passing

3. **Medium Priority - Alias Mutation Fix**: Avoided input slice modification
   - Changed CreateKey to not mutate the input aliases slice in-place
   - Uses local variable for modified alias to prevent side effects
   - Maintains backward compatibility while being safer for callers

All changes improve code robustness and follow AWS S3 standards more closely.
Tests updated and passing for all scenarios including edge cases.

* Fix failing SSE tests

Address two failing test cases:

1. **TestSSEHeaderConflicts**: Fixed SSE-C and SSE-KMS mutual exclusion
   - Modified IsSSECRequest to return false if SSE-KMS headers are present
   - Modified IsSSEKMSRequest to return false if SSE-C headers are present
   - This prevents both detection functions from returning true simultaneously
   - Aligns with AWS S3 behavior where SSE-C and SSE-KMS are mutually exclusive

2. **TestBucketEncryptionEdgeCases**: Fixed XML namespace validation
   - Added namespace validation in encryptionConfigFromXMLBytes function
   - Now rejects XML with invalid namespaces (only allows empty or AWS standard namespace)
   - Validates XMLName.Space to ensure proper XML structure
   - Prevents acceptance of malformed XML with incorrect namespaces

Both fixes improve compliance with AWS S3 standards and prevent invalid
configurations from being accepted. All SSE and bucket encryption tests
now pass successfully.

* Fix GitHub PR #7144 latest review comments

Address two new code review comments from Gemini Code Assist bot:

1. **High Priority - Race Condition in UpdateBucketMetadata**: Fixed thread safety issue
   - Added per-bucket locking mechanism to prevent race conditions
   - Introduced bucketMetadataLocks map with RWMutex for each bucket
   - Added getBucketMetadataLock helper with double-checked locking pattern
   - UpdateBucketMetadata now uses bucket-specific locks to serialize metadata updates
   - Prevents last-writer-wins scenarios when concurrent requests update different metadata parts

2. **Medium Priority - KMS Key ARN Validation**: Improved robustness of ARN validation
   - Enhanced isValidKMSKeyID function to strictly validate ARN structure
   - Changed from 'len(parts) >= 6' to 'len(parts) != 6' for exact part count
   - Added proper resource validation for key/ and alias/ prefixes
   - Prevents malformed ARNs with incorrect structure from being accepted
   - Now validates: arn:aws:kms:region:account:key/keyid or arn:aws:kms:region:account:alias/aliasname

Both fixes improve system reliability and prevent edge cases that could cause
data corruption or security issues. All existing tests continue to pass.

* format

* address comments

* Configuration Adapter

* Regex Optimization

* Caching Integration

* add negative cache for non-existent buckets

* remove bucketMetadataLocks

* address comments

* address comments

* copying objects with sse-kms

* copying strategy

* store IV in entry metadata

* implement compression reader

* extract json map as sse kms context

* bucket key

* comments

* rotate sse chunks

* KMS Data Keys use AES-GCM + nonce

* add comments

* Update weed/s3api/s3_sse_kms.go

Co-authored-by: gemini-code-assist[bot] <176961590+gemini-code-assist[bot]@users.noreply.github.com>

* Update s3api_object_handlers_put.go

* get IV from response header

* set sse headers

* Update s3api_object_handlers.go

* deterministic JSON marshaling

* store iv in entry metadata

* address comments

* not used

* store iv in destination metadata

ensures that SSE-C copy operations with re-encryption (decrypt/re-encrypt scenario) now properly store the destination encryption metadata

* add todo

* address comments

* SSE-S3 Deserialization

* add BucketKMSCache to BucketConfig

* fix test compilation

* already not empty

* use constants

* fix: critical metadata (encrypted data keys, encryption context, etc.) was never stored during PUT/copy operations

* address comments

* fix tests

* Fix SSE-KMS Copy Re-encryption

* Cache now persists across requests

* fix test

* iv in metadata only

* SSE-KMS copy operations should follow the same pattern as SSE-C

* fix size overhead calculation

* Filer-Side SSE Metadata Processing

* SSE Integration Tests

* fix tests

* clean up

* Update s3_sse_multipart_test.go

* add s3 sse tests

* unused

* add logs

* Update Makefile

* Update Makefile

* s3 health check

* The tests were failing because they tried to run both SSE-C and SSE-KMS tests

* Update weed/s3api/s3_sse_c.go

Co-authored-by: gemini-code-assist[bot] <176961590+gemini-code-assist[bot]@users.noreply.github.com>

* Update Makefile

* add back

* Update Makefile

* address comments

* fix tests

* Update s3-sse-tests.yml

* Update s3-sse-tests.yml

* fix sse-kms for PUT operation

* IV

* Update auth_credentials.go

* fix multipart with kms

* constants

* multipart sse kms

Modified handleSSEKMSResponse to detect multipart SSE-KMS objects
Added createMultipartSSEKMSDecryptedReader to handle each chunk independently
Each chunk now gets its own decrypted reader before combining into the final stream

* validate key id

* add SSEType

* permissive kms key format

* Update s3_sse_kms_test.go

* format

* assert equal

* uploading SSE-KMS metadata per chunk

* persist sse type and metadata

* avoid re-chunk multipart uploads

* decryption process to use stored PartOffset values

* constants

* sse-c multipart upload

* Unified Multipart SSE Copy

* purge

* fix fatalf

* avoid io.MultiReader which does not close underlying readers

* unified cross-encryption

* fix Single-object SSE-C

* adjust constants

* range read sse files

* remove debug logs

* add sse-s3

* copying sse-s3 objects

* fix copying

* Resolve merge conflicts: integrate SSE-S3 encryption support

- Resolved conflicts in protobuf definitions to add SSE_S3 enum value
- Integrated SSE-S3 server-side encryption with S3-managed keys
- Updated S3 API handlers to support SSE-S3 alongside existing SSE-C and SSE-KMS
- Added comprehensive SSE-S3 integration tests
- Resolved conflicts in filer server handlers for encryption support
- Updated constants and headers for SSE-S3 metadata handling
- Ensured backward compatibility with existing encryption methods

All merge conflicts resolved and codebase compiles successfully.

* Regenerate corrupted protobuf file after merge

- Regenerated weed/pb/filer_pb/filer.pb.go using protoc
- Fixed protobuf initialization panic caused by merge conflict resolution
- Verified SSE functionality works correctly after regeneration

* Refactor repetitive encryption header filtering logic

Address PR comment by creating a helper function shouldSkipEncryptionHeader()
to consolidate repetitive code when copying extended attributes during S3
object copy operations.

Changes:
- Extract repetitive if/else blocks into shouldSkipEncryptionHeader()
- Support all encryption types: SSE-C, SSE-KMS, and SSE-S3
- Group header constants by encryption type for cleaner logic
- Handle all cross-encryption scenarios (e.g., SSE-KMS→SSE-C, SSE-S3→unencrypted)
- Improve code maintainability and readability
- Add comprehensive documentation for the helper function

The refactoring reduces code duplication from ~50 lines to ~10 lines while
maintaining identical functionality. All SSE copy tests continue to pass.

* reduce logs

* Address PR comments: consolidate KMS validation & reduce debug logging

1. Create shared s3_validation_utils.go for consistent KMS key validation
   - Move isValidKMSKeyID from s3_sse_kms.go to shared utility
   - Ensures consistent validation across bucket encryption, object operations, and copy validation
   - Eliminates coupling between s3_bucket_encryption.go and s3_sse_kms.go
   - Provides comprehensive validation: rejects spaces, control characters, validates length

2. Reduce verbose debug logging in calculateIVWithOffset function
   - Change glog.Infof to glog.V(4).Infof for debug statements
   - Prevents log flooding in production environments
   - Consistent with other debug logs in the codebase

Both changes improve code quality, maintainability, and production readiness.

* Fix critical issues identified in PR review #7151

1. Remove unreachable return statement in s3_sse_s3.go
   - Fixed dead code on line 43 that was unreachable after return on line 42
   - Ensures proper function termination and eliminates confusion

2. Fix malformed error handling in s3api_object_handlers_put.go
   - Corrected incorrectly indented and duplicated error handling block
   - Fixed compilation error caused by syntax issues in merge conflict resolution
   - Proper error handling for encryption context parsing now restored

3. Remove misleading test case in s3_sse_integration_test.go
   - Eliminated "Explicit Encryption Overrides Default" test that was misleading
   - Test claimed to verify override behavior but only tested normal bucket defaults
   - Reduces confusion and eliminates redundant test coverage

All changes verified with successful compilation and basic S3 API tests passing.

* Fix critical SSE-S3 security vulnerabilities and functionality gaps from PR review #7151

🔒 SECURITY FIXES:
1. Fix severe IV reuse vulnerability in SSE-S3 CTR mode encryption
   - Added calculateSSES3IVWithOffset function to ensure unique IVs per chunk/part
   - Updated CreateSSES3EncryptedReaderWithBaseIV to accept offset parameter
   - Prevents CTR mode IV reuse which could compromise confidentiality
   - Same secure approach as used in SSE-KMS implementation

🚀 FUNCTIONALITY FIXES:
2. Add missing SSE-S3 multipart upload support in PutObjectPartHandler
   - SSE-S3 multipart uploads now properly inherit encryption settings from CreateMultipartUpload
   - Added logic to check for SeaweedFSSSES3Encryption metadata in upload entry
   - Sets appropriate headers for putToFiler to handle SSE-S3 encryption
   - Mirrors existing SSE-KMS multipart implementation pattern

3. Fix incorrect SSE type tracking for SSE-S3 chunks
   - Changed from filer_pb.SSEType_NONE to filer_pb.SSEType_SSE_S3
   - Ensures proper chunk metadata tracking and consistency
   - Eliminates confusion about encryption status of SSE-S3 chunks

🔧 LOGGING IMPROVEMENTS:
4. Reduce verbose debug logging in SSE-S3 detection
   - Changed glog.Infof to glog.V(4).Infof for debug messages
   - Prevents log flooding in production environments
   - Consistent with other debug logging patterns

 VERIFICATION:
- All changes compile successfully
- Basic S3 API tests pass
- Security vulnerability eliminated with proper IV offset calculation
- Multipart SSE-S3 uploads now properly supported
- Chunk metadata correctly tagged with SSE-S3 type

* Address code maintainability issues from PR review #7151

🔄 CODE DEDUPLICATION:
1. Eliminate duplicate IV calculation functions
   - Created shared s3_sse_utils.go with unified calculateIVWithOffset function
   - Removed duplicate calculateSSES3IVWithOffset from s3_sse_s3.go
   - Removed duplicate calculateIVWithOffset from s3_sse_kms.go
   - Both SSE-KMS and SSE-S3 now use the same proven IV offset calculation
   - Ensures consistent cryptographic behavior across all SSE implementations

📋 SHARED HEADER LOGIC IMPROVEMENT:
2. Refactor shouldSkipEncryptionHeader for better clarity
   - Explicitly identify shared headers (AmzServerSideEncryption) used by multiple SSE types
   - Separate SSE-specific headers from shared headers for clearer reasoning
   - Added isSharedSSEHeader, isSSECOnlyHeader, isSSEKMSOnlyHeader, isSSES3OnlyHeader
   - Improved logic flow: shared headers are contextually assigned to appropriate SSE types
   - Enhanced code maintainability and reduced confusion about header ownership

🎯 BENEFITS:
- DRY principle: Single source of truth for IV offset calculation (40 lines → shared utility)
- Maintainability: Changes to IV calculation logic now only need updates in one place
- Clarity: Header filtering logic is now explicit about shared vs. specific headers
- Consistency: Same cryptographic operations across SSE-KMS and SSE-S3
- Future-proofing: Easier to add new SSE types or shared headers

 VERIFICATION:
- All code compiles successfully
- Basic S3 API tests pass
- No functional changes - purely structural improvements
- Same security guarantees maintained with better organization

* 🚨 CRITICAL FIX: Complete SSE-S3 multipart upload implementation - prevents data corruption

⚠️  CRITICAL BUG FIXED:
The SSE-S3 multipart upload implementation was incomplete and would have caused
data corruption for all multipart SSE-S3 uploads. Each part would be encrypted
with a different key, making the final assembled object unreadable.

🔍 ROOT CAUSE:
PutObjectPartHandler only set AmzServerSideEncryption header but did NOT retrieve
and pass the shared base IV and key data that were stored during CreateMultipartUpload.
This caused putToFiler to generate NEW encryption keys for each part instead of
using the consistent shared key.

 COMPREHENSIVE SOLUTION:

1. **Added missing header constants** (s3_constants/header.go):
   - SeaweedFSSSES3BaseIVHeader: for passing base IV to putToFiler
   - SeaweedFSSSES3KeyDataHeader: for passing key data to putToFiler

2. **Fixed PutObjectPartHandler** (s3api_object_handlers_multipart.go):
   - Retrieve base IV from uploadEntry.Extended[SeaweedFSSSES3BaseIV]
   - Retrieve key data from uploadEntry.Extended[SeaweedFSSSES3KeyData]
   - Pass both to putToFiler via request headers
   - Added comprehensive error handling and logging for missing data
   - Mirrors the proven SSE-KMS multipart implementation pattern

3. **Enhanced putToFiler SSE-S3 logic** (s3api_object_handlers_put.go):
   - Detect multipart parts via presence of SSE-S3 headers
   - For multipart: deserialize provided key + use base IV with offset calculation
   - For single-part: maintain existing logic (generate new key + IV)
   - Use CreateSSES3EncryptedReaderWithBaseIV for consistent multipart encryption

🔐 SECURITY & CONSISTENCY:
- Same encryption key used across ALL parts of a multipart upload
- Unique IV per part using calculateIVWithOffset (prevents CTR mode vulnerabilities)
- Proper base IV offset calculation ensures cryptographic security
- Complete metadata serialization for storage and retrieval

📊 DATA FLOW FIX:
Before: CreateMultipartUpload stores key/IV → PutObjectPart ignores → new key per part → CORRUPTED FINAL OBJECT
After:  CreateMultipartUpload stores key/IV → PutObjectPart retrieves → same key all parts → VALID FINAL OBJECT

 VERIFICATION:
- All code compiles successfully
- Basic S3 API tests pass
- Follows same proven patterns as working SSE-KMS multipart implementation
- Comprehensive error handling prevents silent failures

This fix is essential for SSE-S3 multipart uploads to function correctly in production.

* 🚨 CRITICAL FIX: Activate bucket default encryption - was completely non-functional

⚠️  CRITICAL BUG FIXED:
Bucket default encryption functions were implemented but NEVER CALLED anywhere
in the request handling pipeline, making the entire feature completely non-functional.
Users setting bucket default encryption would expect automatic encryption, but
objects would be stored unencrypted.

🔍 ROOT CAUSE:
The functions applyBucketDefaultEncryption(), applySSES3DefaultEncryption(), and
applySSEKMSDefaultEncryption() were defined in putToFiler but never invoked.
No integration point existed to check for bucket defaults when no explicit
encryption headers were provided.

 COMPLETE INTEGRATION:

1. **Added bucket default encryption logic in putToFiler** (lines 361-385):
   - Check if no explicit encryption was applied (SSE-C, SSE-KMS, or SSE-S3)
   - Call applyBucketDefaultEncryption() to check bucket configuration
   - Apply appropriate default encryption (SSE-S3 or SSE-KMS) if configured
   - Handle all metadata serialization for applied default encryption

2. **Automatic coverage for ALL upload types**:
    Regular PutObject uploads (PutObjectHandler)
    Versioned object uploads (putVersionedObject)
    Suspended versioning uploads (putSuspendedVersioningObject)
    POST policy uploads (PostPolicyHandler)
    Multipart parts (intentionally skip - inherit from CreateMultipartUpload)

3. **Proper response headers**:
   - Existing SSE type detection automatically includes bucket default encryption
   - PutObjectHandler already sets response headers based on returned sseType
   - No additional changes needed for proper S3 API compliance

🔄 AWS S3 BEHAVIOR IMPLEMENTED:
- Bucket default encryption automatically applies when no explicit encryption specified
- Explicit encryption headers always override bucket defaults (correct precedence)
- Response headers correctly indicate applied encryption method
- Supports both SSE-S3 and SSE-KMS bucket default encryption

📊 IMPACT:
Before: Bucket default encryption = COMPLETELY IGNORED (major S3 compatibility gap)
After:  Bucket default encryption = FULLY FUNCTIONAL (complete S3 compatibility)

 VERIFICATION:
- All code compiles successfully
- Basic S3 API tests pass
- Universal application through putToFiler ensures consistent behavior
- Proper error handling prevents silent failures

This fix makes bucket default encryption feature fully operational for the first time.

* 🚨 CRITICAL SECURITY FIX: Fix insufficient error handling in SSE multipart uploads

CRITICAL VULNERABILITY FIXED:
Silent failures in SSE-S3 and SSE-KMS multipart upload initialization could
lead to severe security vulnerabilities, specifically zero-value IV usage
which completely compromises encryption security.

ROOT CAUSE ANALYSIS:

1. Zero-value IV vulnerability (CRITICAL):
   - If rand.Read(baseIV) fails, IV remains all zeros
   - Zero IV in CTR mode = catastrophic crypto failure
   - All encrypted data becomes trivially decryptable

2. Silent key generation failure (HIGH):
   - If keyManager.GetOrCreateKey() fails, no encryption key stored
   - Parts upload without encryption while appearing to be encrypted
   - Data stored unencrypted despite SSE headers

3. Invalid serialization handling (MEDIUM):
   - If SerializeSSES3Metadata() fails, corrupted key data stored
   - Causes decryption failures during object retrieval
   - Silent data corruption with delayed failure

COMPREHENSIVE FIXES APPLIED:

1. Proper error propagation pattern:
   - Added criticalError variable to capture failures within anonymous function
   - Check criticalError after mkdir() call and return s3err.ErrInternalError
   - Prevents silent failures that could compromise security

2. Fixed ALL critical crypto operations:
    SSE-S3 rand.Read(baseIV) - prevents zero-value IV
    SSE-S3 keyManager.GetOrCreateKey() - prevents missing encryption keys
    SSE-S3 SerializeSSES3Metadata() - prevents invalid key data storage
    SSE-KMS rand.Read(baseIV) - prevents zero-value IV (consistency fix)

3. Fail-fast security model:
   - Any critical crypto operation failure → immediate request termination
   - No partial initialization that could lead to security vulnerabilities
   - Clear error messages for debugging without exposing sensitive details

SECURITY IMPACT:
Before: Critical crypto vulnerabilities possible
After: Cryptographically secure initialization guaranteed

This fix prevents potential data exposure and ensures cryptographic security
for all SSE multipart uploads.

* 🚨 CRITICAL FIX: Address PR review issues from #7151

⚠️  ADDRESSES CRITICAL AND MEDIUM PRIORITY ISSUES:

1. **CRITICAL: Fix IV storage for bucket default SSE-S3 encryption**
   - Problem: IV was stored in separate variable, not on SSES3Key object
   - Impact: Made decryption impossible for bucket default encrypted objects
   - Fix: Store IV directly on key.IV for proper decryption access

2. **MEDIUM: Remove redundant sseS3IV parameter**
   - Simplified applyBucketDefaultEncryption and applySSES3DefaultEncryption signatures
   - Removed unnecessary IV parameter passing since IV is now stored on key object
   - Cleaner, more maintainable API

3. **MEDIUM: Remove empty else block for code clarity**
   - Removed empty else block in filer_server_handlers_write_upload.go
   - Improves code readability and eliminates dead code

📊 DETAILED CHANGES:

**weed/s3api/s3api_object_handlers_put.go**:
- Updated applyBucketDefaultEncryption signature: removed sseS3IV parameter
- Updated applySSES3DefaultEncryption signature: removed sseS3IV parameter
- Added key.IV = iv assignment in applySSES3DefaultEncryption
- Updated putToFiler call site: removed sseS3IV variable and parameter

**weed/server/filer_server_handlers_write_upload.go**:
- Removed empty else block (lines 314-315 in original)
- Fixed missing closing brace for if r != nil block
- Improved code structure and readability

🔒 SECURITY IMPACT:

**Before Fix:**
- Bucket default SSE-S3 encryption generated objects that COULD NOT be decrypted
- IV was stored separately and lost during key retrieval process
- Silent data loss - objects appeared encrypted but were unreadable

**After Fix:**
- Bucket default SSE-S3 encryption works correctly end-to-end
- IV properly stored on key object and available during decryption
- Complete functionality restoration for bucket default encryption feature

 VERIFICATION:
- All code compiles successfully
- Bucket encryption tests pass (TestBucketEncryptionAPIOperations, etc.)
- No functional regressions detected
- Code structure improved with better clarity

These fixes ensure bucket default encryption is fully functional and secure,
addressing critical issues that would have prevented successful decryption
of encrypted objects.

* 📝 MEDIUM FIX: Improve error message clarity for SSE-S3 serialization failures

🔍 ISSUE IDENTIFIED:
Copy-paste error in SSE-S3 multipart upload error handling resulted in
identical error messages for two different failure scenarios, making
debugging difficult.

📊 BEFORE (CONFUSING):
- Key generation failure: "failed to generate SSE-S3 key for multipart upload"
- Serialization failure: "failed to serialize SSE-S3 key for multipart upload"
  ^^ SAME MESSAGE - impossible to distinguish which operation failed

 AFTER (CLEAR):
- Key generation failure: "failed to generate SSE-S3 key for multipart upload"
- Serialization failure: "failed to serialize SSE-S3 metadata for multipart upload"
  ^^ DISTINCT MESSAGE - immediately clear what failed

🛠️ CHANGE DETAILS:
**weed/s3api/filer_multipart.go (line 133)**:
- Updated criticalError message to be specific about metadata serialization
- Changed from generic "key" to specific "metadata" to indicate the operation
- Maintains consistency with the glog.Errorf message which was already correct

🔍 DEBUGGING BENEFIT:
When multipart upload initialization fails, developers can now immediately
identify whether the failure was in:
1. Key generation (crypto operation failure)
2. Metadata serialization (data encoding failure)

This distinction is critical for proper error handling and debugging in
production environments.

 VERIFICATION:
- Code compiles successfully
- All multipart tests pass (TestMultipartSSEMixedScenarios, TestMultipartSSEPerformance)
- No functional impact - purely improves error message clarity
- Follows best practices for distinct, actionable error messages

This fix improves developer experience and production debugging capabilities.

* 🚨 CRITICAL FIX: Fix IV storage for explicit SSE-S3 uploads - prevents unreadable objects

⚠️  CRITICAL VULNERABILITY FIXED:
The initialization vector (IV) returned by CreateSSES3EncryptedReader was being
discarded for explicit SSE-S3 uploads, making encrypted objects completely
unreadable. This affected all single-part PUT operations with explicit
SSE-S3 headers (X-Amz-Server-Side-Encryption: AES256).

🔍 ROOT CAUSE ANALYSIS:

**weed/s3api/s3api_object_handlers_put.go (line 338)**:

**IMPACT**:
- Objects encrypted but IMPOSSIBLE TO DECRYPT
- Silent data loss - encryption appeared successful
- Complete feature non-functionality for explicit SSE-S3 uploads

🔧 COMPREHENSIVE FIX APPLIED:

📊 AFFECTED UPLOAD SCENARIOS:

| Upload Type | Before Fix | After Fix |
|-------------|------------|-----------|
| **Explicit SSE-S3 (single-part)** |  Objects unreadable |  Full functionality |
| **Bucket default SSE-S3** |  Fixed in prev commit |  Working |
| **SSE-S3 multipart uploads** |  Already working |  Working |
| **SSE-C/SSE-KMS uploads** |  Unaffected |  Working |

🔒 SECURITY & FUNCTIONALITY RESTORATION:

**Before Fix:**
- 💥 **Explicit SSE-S3 uploads = data loss** - objects encrypted but unreadable
- 💥 **Silent failure** - no error during upload, failure during retrieval
- 💥 **Inconsistent behavior** - bucket defaults worked, explicit headers didn't

**After Fix:**
-  **Complete SSE-S3 functionality** - all upload types work end-to-end
-  **Proper IV management** - stored on key objects for reliable decryption
-  **Consistent behavior** - explicit headers and bucket defaults both work

🛠️ TECHNICAL IMPLEMENTATION:

1. **Capture IV from CreateSSES3EncryptedReader**:
   - Changed from discarding (_) to capturing (iv) the return value

2. **Store IV on key object**:
   - Added sseS3Key.IV = iv assignment
   - Ensures IV is included in metadata serialization

3. **Maintains compatibility**:
   - No changes to function signatures or external APIs
   - Consistent with bucket default encryption pattern

 VERIFICATION:
- All code compiles successfully
- All SSE tests pass (48 SSE-related tests)
- Integration tests run successfully
- No functional regressions detected
- Fixes critical data accessibility issue

This completes the SSE-S3 implementation by ensuring IVs are properly stored
for ALL SSE-S3 upload scenarios, making the feature fully production-ready.

* 🧪 ADD CRITICAL REGRESSION TESTS: Prevent IV storage bugs in SSE-S3

⚠️  BACKGROUND - WHY THESE TESTS ARE NEEDED:
The two critical IV storage bugs I fixed earlier were NOT caught by existing
integration tests because the existing tests were too high-level and didn't
verify the specific implementation details where the bugs existed.

🔍 EXISTING TEST ANALYSIS:
- 10 SSE test files with 56 test functions existed
- Tests covered component functionality but missed integration points
- TestSSES3IntegrationBasic and TestSSES3BucketDefaultEncryption existed
- BUT they didn't catch IV storage bugs - they tested overall flow, not internals

🎯 NEW REGRESSION TESTS ADDED:

1. **TestSSES3IVStorageRegression**:
   - Tests explicit SSE-S3 uploads (X-Amz-Server-Side-Encryption: AES256)
   - Verifies IV is properly stored on key object for decryption
   - Would have FAILED with original bug where IV was discarded in putToFiler
   - Tests multiple objects to ensure unique IV storage

2. **TestSSES3BucketDefaultIVStorageRegression**:
   - Tests bucket default SSE-S3 encryption (no explicit headers)
   - Verifies applySSES3DefaultEncryption stores IV on key object
   - Would have FAILED with original bug where IV wasn't stored on key
   - Tests multiple objects with bucket default encryption

3. **TestSSES3EdgeCaseRegression**:
   - Tests empty objects (0 bytes) with SSE-S3
   - Tests large objects (1MB) with SSE-S3
   - Ensures IV storage works across all object sizes

4. **TestSSES3ErrorHandlingRegression**:
   - Tests SSE-S3 with metadata and other S3 operations
   - Verifies integration doesn't break with additional headers

5. **TestSSES3FunctionalityCompletion**:
   - Comprehensive test of all SSE-S3 scenarios
   - Both explicit headers and bucket defaults
   - Ensures complete functionality after bug fixes

🔒 CRITICAL TEST CHARACTERISTICS:

**Explicit Decryption Verification**:

**Targeted Bug Detection**:
- Tests the exact code paths where bugs existed
- Verifies IV storage at metadata/key object level
- Tests both explicit SSE-S3 and bucket default scenarios
- Covers edge cases (empty, large objects)

**Integration Point Testing**:
- putToFiler() → CreateSSES3EncryptedReader() → IV storage
- applySSES3DefaultEncryption() → IV storage on key object
- Bucket configuration → automatic encryption application

📊 TEST RESULTS:
 All 4 new regression test suites pass (11 sub-tests total)
 TestSSES3IVStorageRegression: PASS (0.26s)
 TestSSES3BucketDefaultIVStorageRegression: PASS (0.46s)
 TestSSES3EdgeCaseRegression: PASS (0.46s)
 TestSSES3FunctionalityCompletion: PASS (0.25s)

🎯 FUTURE BUG PREVENTION:

**What These Tests Catch**:
- IV storage failures (both explicit and bucket default)
- Metadata serialization issues
- Key object integration problems
- Decryption failures due to missing/corrupted IVs

**Test Strategy Improvement**:
- Added integration-point testing alongside component testing
- End-to-end encrypt→store→retrieve→decrypt verification
- Edge case coverage (empty, large objects)
- Error condition testing

🔄 CI/CD INTEGRATION:
These tests run automatically in the test suite and will catch similar
critical bugs before they reach production. The regression tests complement
existing unit tests by focusing on integration points and data flow.

This ensures the SSE-S3 feature remains fully functional and prevents
regression of the critical IV storage bugs that were fixed.

* Clean up dead code: remove commented-out code blocks and unused TODO comments

* 🔒 CRITICAL SECURITY FIX: Address IV reuse vulnerability in SSE-S3/KMS multipart uploads

**VULNERABILITY ADDRESSED:**
Resolved critical IV reuse vulnerability in SSE-S3 and SSE-KMS multipart uploads
identified in GitHub PR review #3142971052. Using hardcoded offset of 0 for all
multipart upload parts created identical encryption keystreams, compromising
data confidentiality in CTR mode encryption.

**CHANGES MADE:**

1. **Enhanced putToFiler Function Signature:**
   - Added partNumber parameter to calculate unique offsets for each part
   - Prevents IV reuse by ensuring each part gets a unique starting IV

2. **Part Offset Calculation:**
   - Implemented secure offset calculation: (partNumber-1) * 8GB
   - 8GB multiplier ensures no overlap between parts (S3 max part size is 5GB)
   - Applied to both SSE-S3 and SSE-KMS encryption modes

3. **Updated SSE-S3 Implementation:**
   - Modified putToFiler to use partOffset instead of hardcoded 0
   - Enhanced CreateSSES3EncryptedReaderWithBaseIV calls with unique offsets

4. **Added SSE-KMS Security Fix:**
   - Created CreateSSEKMSEncryptedReaderWithBaseIVAndOffset function
   - Updated KMS multipart encryption to use unique IV offsets

5. **Updated All Call Sites:**
   - PutObjectPartHandler: passes actual partID for multipart uploads
   - Single-part uploads: use partNumber=1 for consistency
   - Post-policy uploads: use partNumber=1

**SECURITY IMPACT:**
 BEFORE: All multipart parts used same IV (critical vulnerability)
 AFTER: Each part uses unique IV calculated from part number (secure)

**VERIFICATION:**
 All regression tests pass (TestSSES3.*Regression)
 Basic SSE-S3 functionality verified
 Both explicit SSE-S3 and bucket default scenarios tested
 Build verification successful

**AFFECTED FILES:**
- weed/s3api/s3api_object_handlers_put.go (main fix)
- weed/s3api/s3api_object_handlers_multipart.go (part ID passing)
- weed/s3api/s3api_object_handlers_postpolicy.go (call site update)
- weed/s3api/s3_sse_kms.go (SSE-KMS offset function added)

This fix ensures that the SSE-S3 and SSE-KMS multipart upload implementations
are cryptographically secure and prevent IV reuse attacks in CTR mode encryption.

* ♻️ REFACTOR: Extract crypto constants to eliminate magic numbers

 Changes:
• Create new s3_constants/crypto.go with centralized cryptographic constants
• Replace hardcoded values:
  - AESBlockSize = 16 → s3_constants.AESBlockSize
  - SSEAlgorithmAES256 = "AES256" → s3_constants.SSEAlgorithmAES256
  - SSEAlgorithmKMS = "aws:kms" → s3_constants.SSEAlgorithmKMS
  - PartOffsetMultiplier = 1<<33 → s3_constants.PartOffsetMultiplier
• Remove duplicate AESBlockSize from s3_sse_c.go
• Update all 16 references across 8 files for consistency
• Remove dead/unreachable code in s3_sse_s3.go

🎯 Benefits:
• Eliminates magic numbers for better maintainability
• Centralizes crypto constants in one location
• Improves code readability and reduces duplication
• Makes future updates easier (change in one place)

 Tested: All S3 API packages compile successfully

* ♻️ REFACTOR: Extract common validation utilities

 Changes:
• Enhanced s3_validation_utils.go with reusable validation functions:
  - ValidateIV() - centralized IV length validation (16 bytes for AES)
  - ValidateSSEKMSKey() - null check for SSE-KMS keys
  - ValidateSSECKey() - null check for SSE-C customer keys
  - ValidateSSES3Key() - null check for SSE-S3 keys

• Updated 7 validation call sites across 3 files:
  - s3_sse_kms.go: 5 IV validation calls + 1 key validation
  - s3_sse_c.go: 1 IV validation call
  - Replaced repetitive validation patterns with function calls

🎯 Benefits:
• Eliminates duplicated validation logic (DRY principle)
• Consistent error messaging across all SSE validation
• Easier to update validation rules in one place
• Better maintainability and readability
• Reduces cognitive complexity of individual functions

 Tested: All S3 API packages compile successfully, no lint errors

* ♻️ REFACTOR: Extract SSE-KMS data key generation utilities (part 1/2)

 Changes:
• Create new s3_sse_kms_utils.go with common utility functions:
  - generateKMSDataKey() - centralized KMS data key generation
  - clearKMSDataKey() - safe memory cleanup for data keys
  - createSSEKMSKey() - SSEKMSKey struct creation from results
  - KMSDataKeyResult type - structured result container

• Refactor CreateSSEKMSEncryptedReaderWithBucketKey to use utilities:
  - Replace 30+ lines of repetitive code with 3 utility function calls
  - Maintain same functionality with cleaner structure
  - Improved error handling and memory management
  - Use s3_constants.AESBlockSize for consistency

🎯 Benefits:
• Eliminates code duplication across multiple SSE-KMS functions
• Centralizes KMS provider setup and error handling
• Consistent data key generation pattern
• Easier to maintain and update KMS integration
• Better separation of concerns

📋 Next: Refactor remaining 2 SSE-KMS functions to use same utilities

 Tested: All S3 API packages compile successfully

* ♻️ REFACTOR: Complete SSE-KMS utilities extraction (part 2/2)

 Changes:
• Refactored remaining 2 SSE-KMS functions to use common utilities:
  - CreateSSEKMSEncryptedReaderWithBaseIV (lines 121-138)
  - CreateSSEKMSEncryptedReaderWithBaseIVAndOffset (lines 157-173)

• Eliminated 60+ lines of duplicate code across 3 functions:
  - Before: Each function had ~25 lines of KMS setup + cipher creation
  - After: Each function uses 3 utility function calls
  - Total code reduction: ~75 lines → ~15 lines of core logic

• Consistent patterns now used everywhere:
  - generateKMSDataKey() for all KMS data key generation
  - clearKMSDataKey() for all memory cleanup
  - createSSEKMSKey() for all SSEKMSKey struct creation
  - s3_constants.AESBlockSize for all IV allocations

🎯 Benefits:
• 80% reduction in SSE-KMS implementation duplication
• Single source of truth for KMS data key generation
• Centralized error handling and memory management
• Consistent behavior across all SSE-KMS functions
• Much easier to maintain, test, and update

 Tested: All S3 API packages compile successfully, no lint errors
🏁 Phase 2 Step 1 Complete: Core SSE-KMS patterns extracted

* ♻️ REFACTOR: Consolidate error handling patterns

 Changes:
• Create new s3_error_utils.go with common error handling utilities:
  - handlePutToFilerError() - standardized putToFiler error format
  - handlePutToFilerInternalError() - convenience for internal errors
  - handleMultipartError() - standardized multipart error format
  - handleMultipartInternalError() - convenience for multipart internal errors
  - handleSSEError() - SSE-specific error handling with context
  - handleSSEInternalError() - convenience for SSE internal errors
  - logErrorAndReturn() - general error logging with S3 error codes

• Refactored 12+ error handling call sites across 2 key files:
  - s3api_object_handlers_put.go: 10+ SSE error patterns simplified
  - filer_multipart.go: 2 multipart error patterns simplified

• Benefits achieved:
  - Consistent error messages across all S3 operations
  - Reduced code duplication from ~3 lines per error → 1 line
  - Centralized error logging format and context
  - Easier to modify error handling behavior globally
  - Better maintainability for error response patterns

🎯 Impact:
• ~30 lines of repetitive error handling → ~12 utility function calls
• Consistent error context (operation names, SSE types)
• Single source of truth for error message formatting

 Tested: All S3 API packages compile successfully
🏁 Phase 2 Step 2 Complete: Error handling patterns consolidated

* 🚀 REFACTOR: Break down massive putToFiler function (MAJOR)

 Changes:
• Created new s3api_put_handlers.go with focused encryption functions:
  - calculatePartOffset() - part offset calculation (5 lines)
  - handleSSECEncryption() - SSE-C processing (25 lines)
  - handleSSEKMSEncryption() - SSE-KMS processing (60 lines)
  - handleSSES3Encryption() - SSE-S3 processing (80 lines)

• Refactored putToFiler function from 311+ lines → ~161 lines (48% reduction):
  - Replaced 150+ lines of encryption logic with 4 function calls
  - Eliminated duplicate metadata serialization calls
  - Improved error handling consistency
  - Better separation of concerns

• Additional improvements:
  - Fixed AESBlockSize references in 3 test files
  - Consistent function signatures and return patterns
  - Centralized encryption logic in dedicated functions
  - Each function handles single responsibility (SSE type)

📊 Impact:
• putToFiler complexity: Very High → Medium
• Total encryption code: ~200 lines → ~170 lines (reusable functions)
• Code duplication: Eliminated across 3 SSE types
• Maintainability: Significantly improved
• Testability: Much easier to unit test individual components

🎯 Benefits:
• Single Responsibility Principle: Each function handles one SSE type
• DRY Principle: No more duplicate encryption patterns
• Open/Closed Principle: Easy to add new SSE types
• Better debugging: Focused functions with clear scope
• Improved readability: Logic flow much easier to follow

 Tested: All S3 API packages compile successfully
🏁 FINAL PHASE: All major refactoring goals achieved

* 🔧 FIX: Store SSE-S3 metadata per-chunk for consistency

 Changes:
• Store SSE-S3 metadata in sseKmsMetadata field per-chunk (lines 306-308)
• Updated comment to reflect proper metadata storage behavior
• Changed log message from 'Processing' to 'Storing' for accuracy

🎯 Benefits:
• Consistent metadata handling across all SSE types (SSE-KMS, SSE-C, SSE-S3)
• Future-proof design for potential object modification features
• Proper per-chunk metadata storage matches architectural patterns
• Better consistency with existing SSE implementations

🔍 Technical Details:
• SSE-S3 metadata now stored in same field used by SSE-KMS/SSE-C
• Maintains backward compatibility with object-level metadata
• Follows established pattern in ToPbFileChunkWithSSE method
• Addresses PR reviewer feedback for improved architecture

 Impact:
• No breaking changes - purely additive improvement
• Better consistency across SSE type implementations
• Enhanced future maintainability and extensibility

* ♻️ REFACTOR: Rename sseKmsMetadata to sseMetadata for accuracy

 Changes:
• Renamed misleading variable sseKmsMetadata → sseMetadata (5 occurrences)
• Variable now properly reflects it stores metadata for all SSE types
• Updated all references consistently throughout the function

🎯 Benefits:
• Accurate naming: Variable stores SSE-KMS, SSE-C, AND SSE-S3 metadata
• Better code clarity: Name reflects actual usage across all SSE types
• Improved maintainability: No more confusion about variable purpose
• Consistent with unified metadata handling approach

📝 Technical Details:
• Variable declared on line 249: var sseMetadata []byte
• Used for SSE-KMS metadata (line 258)
• Used for SSE-C metadata (line 287)
• Used for SSE-S3 metadata (line 308)
• Passed to ToPbFileChunkWithSSE (line 319)

 Quality: All server packages compile successfully
🎯 Impact: Better code readability and maintainability

* ♻️ REFACTOR: Simplify shouldSkipEncryptionHeader logic for better readability

 Changes:
• Eliminated indirect is...OnlyHeader and isSharedSSEHeader variables
• Defined header types directly with inline shared header logic
• Merged intermediate variable definitions into final header categorizations
• Fixed missing import in s3_sse_multipart_test.go for s3_constants

🎯 Benefits:
• More self-contained and easier to follow logic
• Reduced code indirection and complexity
• Improved readability and maintainability
• Direct header type definitions incorporate shared AmzServerSideEncryption logic inline

📝 Technical Details:
Before:
• Used separate isSharedSSEHeader, is...OnlyHeader variables
• Required convenience groupings to combine shared and specific headers

After:
• Direct isSSECHeader, isSSEKMSHeader, isSSES3Header definitions
• Inline logic for shared AmzServerSideEncryption header
• Cleaner, more self-documenting code structure

 Quality: All copy tests pass successfully
🎯 Impact: Better code maintainability without behavioral changes

Addresses: https://github.com/seaweedfs/seaweedfs/pull/7151#pullrequestreview-3143093588

* 🐛 FIX: Correct SSE-S3 logging condition to avoid misleading logs

 Problem Fixed:
• Logging condition 'sseHeader != "" || result' was too broad
• Logged for ANY SSE request (SSE-C, SSE-KMS, SSE-S3) due to logical equivalence
• Log message said 'SSE-S3 detection' but fired for other SSE types too
• Misleading debugging information for developers

🔧 Solution:
• Changed condition from 'sseHeader != "" || result' to 'if result'
• Now only logs when SSE-S3 is actually detected (result = true)
• Updated comment from 'for any SSE-S3 requests' to 'for SSE-S3 requests'
• Log precision matches the actual SSE-S3 detection logic

🎯 Technical Analysis:
Before: sseHeader != "" || result
• Since result = (sseHeader == SSES3Algorithm)
• If result is true, then sseHeader is not empty
• Condition equivalent to sseHeader != "" (logs all SSE types)

After: if result
• Only logs when sseHeader == SSES3Algorithm
• Precise logging that matches the function's purpose
• No more false positives from other SSE types

 Quality: SSE-S3 integration tests pass successfully
🎯 Impact: More accurate debugging logs, less log noise

* Update s3_sse_s3.go

* 📝 IMPROVE: Address Copilot AI code review suggestions for better performance and clarity

 Changes Applied:
1. **Enhanced Function Documentation**
   • Clarified CreateSSES3EncryptedReaderWithBaseIV return value
   • Added comment indicating returned IV is offset-derived, not input baseIV
   • Added inline comment /* derivedIV */ for return type clarity

2. **Optimized Logging Performance**
   • Reduced verbose logging in calculateIVWithOffset function
   • Removed 3 debug glog.V(4).Infof calls from hot path loop
   • Consolidated to single summary log statement
   • Prevents performance impact in high-throughput scenarios

3. **Improved Code Readability**
   • Fixed shouldSkipEncryptionHeader function call formatting
   • Improved multi-line parameter alignment for better readability
   • Cleaner, more consistent code structure

🎯 Benefits:
• **Performance**: Eliminated per-iteration logging in IV calculation hot path
• **Clarity**: Clear documentation on what IV is actually returned
• **Maintainability**: Better formatted function calls, easier to read
• **Production Ready**: Reduced log noise for high-volume encryption operations

📝 Technical Details:
• calculateIVWithOffset: 4 debug statements → 1 consolidated statement
• CreateSSES3EncryptedReaderWithBaseIV: Enhanced documentation accuracy
• shouldSkipEncryptionHeader: Improved parameter formatting consistency

 Quality: All SSE-S3, copy, and multipart tests pass successfully
🎯 Impact: Better performance and code clarity without behavioral changes

Addresses: https://github.com/seaweedfs/seaweedfs/pull/7151#pullrequestreview-3143190092

* 🐛 FIX: Enable comprehensive KMS key ID validation in ParseSSEKMSHeaders

 Problem Identified:
• Test TestSSEKMSInvalidConfigurations/Invalid_key_ID_format was failing
• ParseSSEKMSHeaders only called ValidateSSEKMSKey (basic nil check)
• Did not call ValidateSSEKMSKeyInternal which includes isValidKMSKeyID format validation
• Invalid key IDs like "invalid key id with spaces" were accepted when they should be rejected

🔧 Solution Implemented:
• Changed ParseSSEKMSHeaders to call ValidateSSEKMSKeyInternal instead of ValidateSSEKMSKey
• ValidateSSEKMSKeyInternal includes comprehensive validation:
  - Basic nil checks (via ValidateSSEKMSKey)
  - Key ID format validation (via isValidKMSKeyID)
  - Proper rejection of key IDs with spaces, invalid formats

📝 Technical Details:
Before:
• ValidateSSEKMSKey: Only checks if sseKey is nil
• Missing key ID format validation in header parsing

After:
• ValidateSSEKMSKeyInternal: Full validation chain
  - Calls ValidateSSEKMSKey for nil checks
  - Validates key ID format using isValidKMSKeyID
  - Rejects keys with spaces, invalid formats

🎯 Test Results:
 TestSSEKMSInvalidConfigurations/Invalid_key_ID_format: Now properly fails invalid formats
 All existing SSE tests continue to pass (30+ test cases)
 Comprehensive validation without breaking existing functionality

🔍 Impact:
• Better security: Invalid key IDs properly rejected at parse time
• Consistent validation: Same validation logic across all KMS operations
• Test coverage: Previously untested validation path now working correctly

Fixes failing test case expecting rejection of key ID: "invalid key id with spaces"

* Update s3_sse_kms.go

* ♻️ REFACTOR: Address Copilot AI suggestions for better code quality

 Improvements Applied:
• Enhanced SerializeSSES3Metadata validation consistency
• Removed trailing spaces from comment lines
• Extracted deep nested SSE-S3 multipart logic into helper function
• Reduced nesting complexity from 4+ levels to 2 levels

🎯 Benefits:
• Better validation consistency across SSE serialization functions
• Improved code readability and maintainability
• Reduced cognitive complexity in multipart handlers
• Enhanced testability through better separation of concerns

 Quality: All multipart SSE tests pass successfully
🎯 Impact: Better code structure without behavioral changes

Addresses GitHub PR review suggestions for improved code quality

* ♻️ REFACTOR: Eliminate repetitive dataReader assignments in SSE handling

 Problem Addressed:
• Repetitive dataReader = encryptedReader assignments after each SSE handler
• Code duplication in SSE processing pipeline (SSE-C → SSE-KMS → SSE-S3)
• Manual SSE type determination logic at function end

🔧 Solution Implemented:
• Created unified handleAllSSEEncryption function that processes all SSE types
• Eliminated 3 repetitive dataReader assignments in putToFiler function
• Centralized SSE type determination in unified handler
• Returns structured PutToFilerEncryptionResult with all encryption data

🎯 Benefits:
• Reduced Code Duplication: 15+ lines → 3 lines in putToFiler
• Better Maintainability: Single point of SSE processing logic
• Improved Readability: Clear separation of concerns
• Enhanced Testability: Unified handler can be tested independently

 Quality: All SSE unit tests (35+) and integration tests pass successfully
🎯 Impact: Cleaner code structure with zero behavioral changes

Addresses Copilot AI suggestion to eliminate dataReader assignment duplication

* refactor

* constants

* ♻️ REFACTOR: Replace hard-coded SSE type strings with constants

• Created SSETypeC, SSETypeKMS, SSETypeS3 constants in s3_constants/crypto.go
• Replaced magic strings in 7 files for better maintainability
• All 54 SSE unit tests pass successfully
• Addresses Copilot AI suggestion to use constants instead of magic strings

* 🔒 FIX: Address critical Copilot AI security and code quality concerns

 Problem Addressed:
• Resource leak risk in filer_multipart.go encryption preparation
• High cyclomatic complexity in shouldSkipEncryptionHeader function
• Missing KMS keyID validation allowing potential injection attacks

🔧 Solution Implemented:

**1. Fix Resource Leak in Multipart Encryption**
• Moved encryption config preparation INSIDE mkdir callback
• Prevents key/IV allocation if directory creation fails
• Added proper error propagation from callback scope
• Ensures encryption resources only allocated on successful directory creation

**2. Reduce Cyclomatic Complexity in Copy Header Logic**
• Broke down shouldSkipEncryptionHeader into focused helper functions
• Created EncryptionHeaderContext struct for better data organization
• Added isSSECHeader, isSSEKMSHeader, isSSES3Header classification functions
• Split cross-encryption and encrypted-to-unencrypted logic into separate methods
• Improved testability and maintainability with structured approach

**3. Add KMS KeyID Security Validation**
• Added keyID validation in generateKMSDataKey using existing isValidKMSKeyID
• Prevents injection attacks and malformed requests to KMS service
• Validates format before making expensive KMS API calls
• Provides clear error messages for invalid key formats

🎯 Benefits:
• Security: Prevents KMS injection attacks and validates all key IDs
• Resource Safety: Eliminates encryption key leaks on mkdir failures
• Code Quality: Reduced complexity with better separation of concerns
• Maintainability: Structured approach with focused single-responsibility functions

 Quality: All 54+ SSE unit tests pass successfully
🎯 Impact: Enhanced security posture with cleaner, more robust code

Addresses 3 critical concerns from Copilot AI review:
https://github.com/seaweedfs/seaweedfs/pull/7151#pullrequestreview-3143244067

* format

* 🔒 FIX: Address additional Copilot AI security vulnerabilities

 Problem Addressed:
• Silent failures in SSE-S3 multipart header setup could corrupt uploads
• Missing validation in CreateSSES3EncryptedReaderWithBaseIV allows panics
• Unvalidated encryption context in KMS requests poses security risk
• Partial rand.Read could create predictable IVs for CTR mode encryption

🔧 Solution Implemented:

**1. Fix Silent SSE-S3 Multipart Failures**
• Modified handleSSES3MultipartHeaders to return error instead of void
• Added robust validation for base IV decoding and length checking
• Enhanced error messages with specific failure context
• Updated caller to handle errors and return HTTP 500 on failure
• Prevents silent multipart upload corruption

**2. Add SSES3Key Security Validation**
• Added ValidateSSES3Key() call in CreateSSES3EncryptedReaderWithBaseIV
• Validates key is non-nil and has correct 32-byte length
• Prevents panics from nil pointer dereferences
• Ensures cryptographic security with proper key validation

**3. Add KMS Encryption Context Validation**
• Added comprehensive validation in generateKMSDataKey function
• Validates context keys/values for control characters and length limits
• Enforces AWS KMS limits: ≤10 pairs, ≤2048 chars per key/value
• Prevents injection attacks and malformed KMS requests
• Added required 'strings' import for validation functions

**4. Fix Predictable IV Vulnerability**
• Modified rand.Read calls in filer_multipart.go to validate byte count
• Checks both error AND bytes read to prevent partial fills
• Added detailed error messages showing read/expected byte counts
• Prevents CTR mode IV predictability which breaks encryption security
• Applied to both SSE-KMS and SSE-S3 base IV generation

🎯 Benefits:
• Security: Prevents IV predictability, KMS injection, and nil pointer panics
• Reliability: Eliminates silent multipart upload failures
• Robustness: Comprehensive input validation across all SSE functions
• AWS Compliance: Enforces KMS service limits and validation rules

 Quality: All 54+ SSE unit tests pass successfully
🎯 Impact: Hardened security posture with comprehensive input validation

Addresses 4 critical security vulnerabilities from Copilot AI review:
https://github.com/seaweedfs/seaweedfs/pull/7151#pullrequestreview-3143271266

* Update s3api_object_handlers_multipart.go

* 🔒 FIX: Add critical part number validation in calculatePartOffset

 Problem Addressed:
• Function accepted invalid part numbers (≤0) which violates AWS S3 specification
• Silent failure (returning 0) could lead to IV reuse vulnerability in CTR mode
• Programming errors were masked instead of being caught during development

🔧 Solution Implemented:
• Changed validation from partNumber <= 0 to partNumber < 1 for clarity
• Added panic with descriptive error message for invalid part numbers
• AWS S3 compliance: part numbers must start from 1, never 0 or negative
• Added fmt import for proper error formatting

🎯 Benefits:
• Security: Prevents IV reuse by failing fast on invalid part numbers
• AWS Compliance: Enforces S3 specification for part number validation
• Developer Experience: Clear panic message helps identify programming errors
• Fail Fast: Programming errors caught immediately during development/testing

 Quality: All 54+ SSE unit tests pass successfully
🎯 Impact: Critical security improvement for multipart upload IV generation

Addresses Copilot AI concern about part number validation:
AWS S3 part numbers start from 1, and invalid values could compromise IV calculations

* fail fast with invalid part number

* 🎯 FIX: Address 4 Copilot AI code quality improvements

 Problems Addressed from PR #7151 Review 3143338544:
• Pointer parameters in bucket default encryption functions reduced code clarity
• Magic numbers for KMS validation limits lacked proper constants
• crypto/rand usage already explicit but could be clearer for reviewers

🔧 Solutions Implemented:

**1. Eliminate Pointer Parameter Pattern** 
• Created BucketDefaultEncryptionResult struct for clear return values
• Refactored applyBucketDefaultEncryption() to return result instead of modifying pointers
• Refactored applySSES3DefaultEncryption() for clarity and testability
• Refactored applySSEKMSDefaultEncryption() with improved signature
• Updated call site in putToFiler() to handle new return-based pattern

**2. Add Constants for Magic Numbers** 
• Added MaxKMSEncryptionContextPairs = 10 to s3_constants/crypto.go
• Added MaxKMSKeyIDLength = 500 to s3_constants/crypto.go
• Updated s3_sse_kms_utils.go to use MaxKMSEncryptionContextPairs
• Updated s3_validation_utils.go to use MaxKMSKeyIDLength
• Added missing s3_constants import to s3_sse_kms_utils.go

**3. Crypto/rand Usage Already Explicit** 
• Verified filer_multipart.go correctly imports crypto/rand (not math/rand)
• All rand.Read() calls use cryptographically secure implementation
• No changes needed - already following security best practices

🎯 Benefits:
• Code Clarity: Eliminated confusing pointer parameter modifications
• Maintainability: Constants make validation limits explicit and configurable
• Testability: Return-based functions easier to unit test in isolation
• Security: Verified cryptographically secure random number generation
• Standards: Follows Go best practices for function design

 Quality: All 54+ SSE unit tests pass successfully
🎯 Impact: Improved code maintainability and readability

Addresses Copilot AI code quality review comments:
https://github.com/seaweedfs/seaweedfs/pull/7151#pullrequestreview-3143338544

* format

* 🔧 FIX: Correct AWS S3 multipart upload part number validation

 Problem Addressed (Copilot AI Issue):
• Part validation was allowing up to 100,000 parts vs AWS S3 limit of 10,000
• Missing explicit validation warning users about the 10,000 part limit
• Inconsistent error types between part validation scenarios

🔧 Solution Implemented:

**1. Fix Incorrect Part Limit Constant** 
• Corrected globalMaxPartID from 100000 → 10000 (matches AWS S3 specification)
• Added MaxS3MultipartParts = 10000 constant to s3_constants/crypto.go
• Consolidated multipart limits with other S3 service constraints

**2. Updated Part Number Validation** 
• Updated PutObjectPartHandler to use s3_constants.MaxS3MultipartParts
• Updated CopyObjectPartHandler to use s3_constants.MaxS3MultipartParts
• Changed error type from ErrInvalidMaxParts → ErrInvalidPart for consistency
• Removed obsolete globalMaxPartID constant definition

**3. Consistent Error Handling** 
• Both regular and copy part handlers now use ErrInvalidPart for part number validation
• Aligned with AWS S3 behavior for invalid part number responses
• Maintains existing validation for partID < 1 (already correct)

🎯 Benefits:
• AWS S3 Compliance: Enforces correct 10,000 part limit per AWS specification
• Security: Prevents resource exhaustion from excessive part numbers
• Consistency: Unified validation logic across multipart upload and copy operations
• Constants: Better maintainability with centralized S3 service constraints
• Error Clarity: Consistent error responses for all part number validation failures

 Quality: All 54+ SSE unit tests pass successfully
🎯 Impact: Critical AWS S3 compliance fix for multipart upload validation

Addresses Copilot AI validation concern:
AWS S3 allows maximum 10,000 parts in a multipart upload, not 100,000

* 📚 REFACTOR: Extract SSE-S3 encryption helper functions for better readability

 Problem Addressed (Copilot AI Nitpick):
• handleSSES3Encryption function had high complexity with nested conditionals
• Complex multipart upload logic (lines 134-168) made function hard to read and maintain
• Single monolithic function handling two distinct scenarios (single-part vs multipart)

🔧 Solution Implemented:

**1. Extracted Multipart Logic** 
• Created handleSSES3MultipartEncryption() for multipart upload scenarios
• Handles key data decoding, base IV processing, and offset-aware encryption
• Clear single-responsibility function with focused error handling

**2. Extracted Single-Part Logic** 
• Created handleSSES3SinglePartEncryption() for single-part upload scenarios
• Handles key generation, IV creation, and key storage
• Simplified function signature without unused parameters

**3. Simplified Main Function** 
• Refactored handleSSES3Encryption() to orchestrate the two helper functions
• Reduced from 70+ lines to 35 lines with clear decision logic
• Eliminated deeply nested conditionals and improved readability

**4. Improved Code Organization** 
• Each function now has single responsibility (SRP compliance)
• Better error propagation with consistent s3err.ErrorCode returns
• Enhanced maintainability through focused, testable functions

🎯 Benefits:
• Readability: Complex nested logic now split into focused functions
• Maintainability: Each function handles one specific encryption scenario
• Testability: Smaller functions are easier to unit test in isolation
• Reusability: Helper functions can be used independently if needed
• Debugging: Clearer stack traces with specific function names
• Code Review: Easier to review smaller, focused functions

 Quality: All 54+ SSE unit tests pass successfully
🎯 Impact: Significantly improved code readability without functional changes

Addresses Copilot AI complexity concern:
Function had high complexity with nested conditionals - now properly factored

* 🏷️ RENAME: Change sse_kms_metadata to sse_metadata for clarity

 Problem Addressed:
• Protobuf field sse_kms_metadata was misleading - used for ALL SSE types, not just KMS
• Field name suggested KMS-only usage but actually stored SSE-C, SSE-KMS, and SSE-S3 metadata
• Code comments and field name were inconsistent with actual unified metadata usage

🔧 Solution Implemented:

**1. Updated Protobuf Schema** 
• Renamed field from sse_kms_metadata → sse_metadata
• Updated comment to clarify: 'Serialized SSE metadata for this chunk (SSE-C, SSE-KMS, or SSE-S3)'
• Regenerated protobuf Go code with correct field naming

**2. Updated All Code References** 
• Updated 29 references across all Go files
• Changed SseKmsMetadata → SseMetadata (struct field)
• Changed GetSseKmsMetadata() → GetSseMetadata() (getter method)
• Updated function parameters: sseKmsMetadata → sseMetadata
• Fixed parameter references in function bodies

**3. Preserved Unified Metadata Pattern** 
• Maintained existing behavior: one field stores all SSE metadata types
• SseType field still determines how to deserialize the metadata
• No breaking changes to the unified metadata storage approach
• All SSE functionality continues to work identically

🎯 Benefits:
• Clarity: Field name now accurately reflects its unified purpose
• Documentation: Comments clearly indicate support for all SSE types
• Maintainability: No confusion about what metadata the field contains
• Consistency: Field name aligns with actual usage patterns
• Future-proof: Clear naming for additional SSE types

 Quality: All 54+ SSE unit tests pass successfully
🎯 Impact: Better code clarity without functional changes

This change eliminates the misleading KMS-specific naming while preserving
the proven unified metadata storage architecture.

* Update weed/s3api/s3api_object_handlers_multipart.go

Co-authored-by: Copilot <175728472+Copilot@users.noreply.github.com>

* Update weed/s3api/s3api_object_handlers_copy.go

Co-authored-by: Copilot <175728472+Copilot@users.noreply.github.com>

* Fix Copilot AI code quality suggestions: hasExplicitEncryption helper and SSE-S3 validation order

* Update weed/s3api/s3api_object_handlers_multipart.go

Co-authored-by: Copilot <175728472+Copilot@users.noreply.github.com>

* Update weed/s3api/s3api_put_handlers.go

Co-authored-by: Copilot <175728472+Copilot@users.noreply.github.com>

* Update weed/s3api/s3api_object_handlers_copy.go

Co-authored-by: Copilot <175728472+Copilot@users.noreply.github.com>

---------

Co-authored-by: gemini-code-assist[bot] <176961590+gemini-code-assist[bot]@users.noreply.github.com>
Co-authored-by: Copilot <175728472+Copilot@users.noreply.github.com>
2025-08-22 01:15:42 -07:00
chrislu
a4df110e77 address List permission
fix https://github.com/seaweedfs/seaweedfs/issues/7039
2025-07-28 02:39:41 -07:00
Chris Lu
69553e5ba6 convert error fromating to %w everywhere (#6995) 2025-07-16 23:39:27 -07:00
chrislu
e7dfc3552c admin ui adds object lock permissions 2025-07-13 20:29:25 -07:00
Chris Lu
7cb1ca1308 Add policy engine (#6970) 2025-07-13 16:21:36 -07:00