HDDS-705. OS3Exception resource name should be the actual resource name.
Contributed by Bharat Viswanadham. Recommitting after making sure that patch is clean.
This commit is contained in:
parent
c696419f3e
commit
97a41b3dbe
@ -199,11 +199,11 @@ public Response delete(@PathParam("bucket") String bucketName)
|
||||
} catch (IOException ex) {
|
||||
if (ex.getMessage().contains("BUCKET_NOT_EMPTY")) {
|
||||
OS3Exception os3Exception = S3ErrorTable.newError(S3ErrorTable
|
||||
.BUCKET_NOT_EMPTY, S3ErrorTable.Resource.BUCKET);
|
||||
.BUCKET_NOT_EMPTY, bucketName);
|
||||
throw os3Exception;
|
||||
} else if (ex.getMessage().contains("BUCKET_NOT_FOUND")) {
|
||||
OS3Exception os3Exception = S3ErrorTable.newError(S3ErrorTable
|
||||
.NO_SUCH_BUCKET, S3ErrorTable.Resource.BUCKET);
|
||||
.NO_SUCH_BUCKET, bucketName);
|
||||
throw os3Exception;
|
||||
} else {
|
||||
throw ex;
|
||||
|
@ -28,7 +28,6 @@
|
||||
import org.apache.hadoop.ozone.client.OzoneVolume;
|
||||
import org.apache.hadoop.ozone.s3.exception.OS3Exception;
|
||||
import org.apache.hadoop.ozone.s3.exception.S3ErrorTable;
|
||||
import org.apache.hadoop.ozone.s3.exception.S3ErrorTable.Resource;
|
||||
import org.apache.hadoop.ozone.s3.header.AuthorizationHeaderV2;
|
||||
import org.apache.hadoop.ozone.s3.header.AuthorizationHeaderV4;
|
||||
|
||||
@ -61,7 +60,7 @@ protected OzoneBucket getBucket(OzoneVolume volume, String bucketName)
|
||||
LOG.error("Error occurred is {}", ex);
|
||||
if (ex.getMessage().contains("NOT_FOUND")) {
|
||||
OS3Exception oex =
|
||||
S3ErrorTable.newError(S3ErrorTable.NO_SUCH_BUCKET, Resource.BUCKET);
|
||||
S3ErrorTable.newError(S3ErrorTable.NO_SUCH_BUCKET, bucketName);
|
||||
throw oex;
|
||||
} else {
|
||||
throw ex;
|
||||
@ -80,7 +79,7 @@ protected OzoneBucket getBucket(String bucketName)
|
||||
LOG.error("Error occurred is {}", ex);
|
||||
if (ex.getMessage().contains("NOT_FOUND")) {
|
||||
OS3Exception oex =
|
||||
S3ErrorTable.newError(S3ErrorTable.NO_SUCH_BUCKET, Resource.BUCKET);
|
||||
S3ErrorTable.newError(S3ErrorTable.NO_SUCH_BUCKET, bucketName);
|
||||
throw oex;
|
||||
} else {
|
||||
throw ex;
|
||||
@ -187,7 +186,7 @@ public String parseUsername(
|
||||
|
||||
if (auth == null) {
|
||||
throw S3ErrorTable
|
||||
.newError(S3ErrorTable.MALFORMED_HEADER, Resource.HEADER);
|
||||
.newError(S3ErrorTable.MALFORMED_HEADER, auth);
|
||||
}
|
||||
|
||||
String userName;
|
||||
|
@ -150,7 +150,7 @@ public Response get(
|
||||
} catch (IOException ex) {
|
||||
if (ex.getMessage().contains("NOT_FOUND")) {
|
||||
OS3Exception os3Exception = S3ErrorTable.newError(S3ErrorTable
|
||||
.NO_SUCH_OBJECT, S3ErrorTable.Resource.OBJECT);
|
||||
.NO_SUCH_KEY, keyPath);
|
||||
throw os3Exception;
|
||||
} else {
|
||||
throw ex;
|
||||
@ -176,9 +176,8 @@ public Response head(
|
||||
} catch (IOException ex) {
|
||||
LOG.error("Exception occurred in HeadObject", ex);
|
||||
if (ex.getMessage().contains("KEY_NOT_FOUND")) {
|
||||
OS3Exception os3Exception = S3ErrorTable.newError(S3ErrorTable
|
||||
.NO_SUCH_OBJECT, S3ErrorTable.Resource.OBJECT);
|
||||
throw os3Exception;
|
||||
// Just return 404 with no content
|
||||
return Response.status(Status.NOT_FOUND).build();
|
||||
} else {
|
||||
throw ex;
|
||||
}
|
||||
@ -215,7 +214,7 @@ public Response delete(
|
||||
} catch (IOException ex) {
|
||||
if (ex.getMessage().contains("BUCKET_NOT_FOUND")) {
|
||||
throw S3ErrorTable.newError(S3ErrorTable
|
||||
.NO_SUCH_BUCKET, S3ErrorTable.Resource.BUCKET);
|
||||
.NO_SUCH_BUCKET, bucketName);
|
||||
} else if (!ex.getMessage().contains("NOT_FOUND")) {
|
||||
throw ex;
|
||||
}
|
||||
|
@ -45,52 +45,23 @@ private S3ErrorTable() {
|
||||
"BucketNotEmpty", "The bucket you tried to delete is not empty.",
|
||||
HTTP_CONFLICT);
|
||||
|
||||
public static final OS3Exception NO_SUCH_OBJECT = new OS3Exception(
|
||||
"NoSuchObject", "The specified object does not exist", HTTP_NOT_FOUND);
|
||||
|
||||
|
||||
public static final OS3Exception MALFORMED_HEADER = new OS3Exception(
|
||||
"AuthorizationHeaderMalformed", "The authorization header you provided " +
|
||||
"is invalid.", HTTP_NOT_FOUND);
|
||||
|
||||
public static final OS3Exception NO_SUCH_KEY = new OS3Exception(
|
||||
"NoSuchObject", "The specified key does not exist", HTTP_NOT_FOUND);
|
||||
|
||||
/**
|
||||
* Create a new instance of Error.
|
||||
* @param e Error Template
|
||||
* @param resource Resource associated with this exception
|
||||
* @return creates a new instance of error based on the template
|
||||
*/
|
||||
public static OS3Exception newError(OS3Exception e, Resource resource) {
|
||||
public static OS3Exception newError(OS3Exception e, String resource) {
|
||||
OS3Exception err = new OS3Exception(e.getCode(), e.getErrorMessage(),
|
||||
e.getHttpCode());
|
||||
err.setResource(resource.getResource());
|
||||
err.setResource(resource);
|
||||
return err;
|
||||
}
|
||||
|
||||
/**
|
||||
* Resources, which can be defined in OS3Exception.
|
||||
*/
|
||||
public enum Resource {
|
||||
BUCKET("Bucket"),
|
||||
OBJECT("Object"),
|
||||
HEADER("header"),
|
||||
VOLUME("Volume");
|
||||
|
||||
private final String resource;
|
||||
|
||||
/**
|
||||
* Constructs resource.
|
||||
* @param value
|
||||
*/
|
||||
Resource(String value) {
|
||||
this.resource = value;
|
||||
}
|
||||
|
||||
/**
|
||||
* Get resource.
|
||||
* @return string
|
||||
*/
|
||||
public String getResource() {
|
||||
return this.resource;
|
||||
}
|
||||
}
|
||||
}
|
||||
|
@ -52,28 +52,24 @@ public AuthorizationHeaderV2(String auth) throws OS3Exception {
|
||||
public void parseHeader() throws OS3Exception {
|
||||
String[] split = authHeader.split(" ");
|
||||
if (split.length != 2) {
|
||||
throw S3ErrorTable.newError(S3ErrorTable.MALFORMED_HEADER, S3ErrorTable
|
||||
.Resource.HEADER);
|
||||
throw S3ErrorTable.newError(S3ErrorTable.MALFORMED_HEADER, authHeader);
|
||||
}
|
||||
|
||||
identifier = split[0];
|
||||
if (!IDENTIFIER.equals(identifier)) {
|
||||
throw S3ErrorTable.newError(S3ErrorTable.MALFORMED_HEADER, S3ErrorTable
|
||||
.Resource.HEADER);
|
||||
throw S3ErrorTable.newError(S3ErrorTable.MALFORMED_HEADER, authHeader);
|
||||
}
|
||||
|
||||
String[] remainingSplit = split[1].split(":");
|
||||
|
||||
if (remainingSplit.length != 2) {
|
||||
throw S3ErrorTable.newError(S3ErrorTable.MALFORMED_HEADER, S3ErrorTable
|
||||
.Resource.HEADER);
|
||||
throw S3ErrorTable.newError(S3ErrorTable.MALFORMED_HEADER, authHeader);
|
||||
}
|
||||
|
||||
accessKeyID = remainingSplit[0];
|
||||
signature = remainingSplit[1];
|
||||
if (isBlank(accessKeyID) || isBlank(signature)) {
|
||||
throw S3ErrorTable.newError(S3ErrorTable.MALFORMED_HEADER, S3ErrorTable
|
||||
.Resource.HEADER);
|
||||
throw S3ErrorTable.newError(S3ErrorTable.MALFORMED_HEADER, authHeader);
|
||||
}
|
||||
}
|
||||
|
||||
|
@ -64,8 +64,7 @@ public void parseAuthHeader() throws OS3Exception {
|
||||
String[] split = authHeader.split(" ");
|
||||
|
||||
if (split.length != 4) {
|
||||
throw S3ErrorTable.newError(S3ErrorTable.MALFORMED_HEADER, S3ErrorTable
|
||||
.Resource.HEADER);
|
||||
throw S3ErrorTable.newError(S3ErrorTable.MALFORMED_HEADER, authHeader);
|
||||
}
|
||||
|
||||
algorithm = split[0];
|
||||
@ -78,24 +77,21 @@ public void parseAuthHeader() throws OS3Exception {
|
||||
credential = credential.substring(CREDENTIAL.length(), credential
|
||||
.length() - 1);
|
||||
} else {
|
||||
throw S3ErrorTable.newError(S3ErrorTable.MALFORMED_HEADER, S3ErrorTable
|
||||
.Resource.HEADER);
|
||||
throw S3ErrorTable.newError(S3ErrorTable.MALFORMED_HEADER, authHeader);
|
||||
}
|
||||
|
||||
if (signedHeaders.startsWith(SIGNEDHEADERS)) {
|
||||
signedHeaders = signedHeaders.substring(SIGNEDHEADERS.length(),
|
||||
signedHeaders.length() - 1);
|
||||
} else {
|
||||
throw S3ErrorTable.newError(S3ErrorTable.MALFORMED_HEADER, S3ErrorTable
|
||||
.Resource.HEADER);
|
||||
throw S3ErrorTable.newError(S3ErrorTable.MALFORMED_HEADER, authHeader);
|
||||
}
|
||||
|
||||
if (signature.startsWith(SIGNATURE)) {
|
||||
signature = signature.substring(SIGNATURE.length(), signature
|
||||
.length());
|
||||
} else {
|
||||
throw S3ErrorTable.newError(S3ErrorTable.MALFORMED_HEADER, S3ErrorTable
|
||||
.Resource.HEADER);
|
||||
throw S3ErrorTable.newError(S3ErrorTable.MALFORMED_HEADER, authHeader);
|
||||
}
|
||||
|
||||
// Parse credential. Other parts of header are not validated yet. When
|
||||
|
@ -63,8 +63,7 @@ public void parseCredential() throws OS3Exception {
|
||||
awsService = split[3];
|
||||
awsRequest = split[4];
|
||||
} else {
|
||||
throw S3ErrorTable.newError(S3ErrorTable.MALFORMED_HEADER, S3ErrorTable
|
||||
.Resource.HEADER);
|
||||
throw S3ErrorTable.newError(S3ErrorTable.MALFORMED_HEADER, credential);
|
||||
}
|
||||
}
|
||||
|
||||
|
@ -32,7 +32,7 @@ public void testOS3Exception() {
|
||||
OS3Exception ex = new OS3Exception("AccessDenied", "Access Denied",
|
||||
403);
|
||||
String requestId = OzoneUtils.getRequestID();
|
||||
ex = S3ErrorTable.newError(ex, S3ErrorTable.Resource.BUCKET);
|
||||
ex = S3ErrorTable.newError(ex, "bucket");
|
||||
ex.setRequestId(requestId);
|
||||
String val = ex.toXml();
|
||||
String formatString = "<?xml version=\"1.0\" encoding=\"UTF-8\"?>\n" +
|
||||
|
Loading…
Reference in New Issue
Block a user