fix: invalid checksum on site replication with conforming checksum types (#21535)
Some checks failed
VulnCheck / Analysis (push) Has been cancelled
Lock Threads / action (push) Has been cancelled

This commit is contained in:
Mark Theunissen 2025-08-22 16:15:21 +02:00 committed by GitHub
parent 86d9d9b55e
commit 4ea6f3b06b
No known key found for this signature in database
GPG Key ID: B5690EEEBB952194
5 changed files with 97 additions and 28 deletions

View File

@ -3797,14 +3797,13 @@ func getCRCMeta(oi ObjectInfo, partNum int, h http.Header) (cs map[string]string
meta := make(map[string]string)
cs, isMP = oi.decryptChecksums(partNum, h)
for k, v := range cs {
cksum := hash.NewChecksumString(k, v)
if cksum == nil {
if k == xhttp.AmzChecksumType {
continue
}
if cksum.Valid() {
meta[cksum.Type.Key()] = v
meta[xhttp.AmzChecksumType] = cs[xhttp.AmzChecksumType]
meta[xhttp.AmzChecksumAlgo] = cksum.Type.String()
cktype := hash.ChecksumStringToType(k)
if cktype.IsSet() {
meta[cktype.Key()] = v
meta[xhttp.AmzChecksumAlgo] = cktype.String()
}
}
return meta, isMP

View File

@ -1161,6 +1161,7 @@ func (er erasureObjects) CompleteMultipartUpload(ctx context.Context, bucket str
Err: fmt.Errorf("checksum type mismatch. got %q (%s) expected %q (%s)", checksumType.String(), checksumType.ObjType(), opts.WantChecksum.Type.String(), opts.WantChecksum.Type.ObjType()),
}
}
checksumType |= hash.ChecksumMultipart | hash.ChecksumIncludesMultipart
}
var checksumCombined []byte

View File

@ -221,6 +221,10 @@ func (api objectAPIHandlers) NewMultipartUploadHandler(w http.ResponseWriter, r
opts.WantChecksum = &hash.Checksum{Type: checksumType}
}
if opts.WantChecksum != nil {
opts.WantChecksum.Type |= hash.ChecksumMultipart | hash.ChecksumIncludesMultipart
}
newMultipartUpload := objectAPI.NewMultipartUpload
res, err := newMultipartUpload(ctx, bucket, object, opts)

View File

@ -145,6 +145,26 @@ func (c ChecksumType) IsSet() bool {
return !c.Is(ChecksumInvalid) && !c.Base().Is(ChecksumNone)
}
// ChecksumStringToType is like NewChecksumType but without the `mode`
func ChecksumStringToType(alg string) ChecksumType {
switch strings.ToUpper(alg) {
case "CRC32":
return ChecksumCRC32
case "CRC32C":
return ChecksumCRC32C
case "SHA1":
return ChecksumSHA1
case "SHA256":
return ChecksumSHA256
case "CRC64NVME":
// AWS seems to ignore full value, and just assume it.
return ChecksumCRC64NVME
case "":
return ChecksumNone
}
return ChecksumInvalid
}
// NewChecksumType returns a checksum type based on the algorithm string and obj type.
func NewChecksumType(alg, objType string) ChecksumType {
full := ChecksumFullObject
@ -240,6 +260,12 @@ func (c ChecksumType) ObjType() string {
if c.FullObjectRequested() {
return xhttp.AmzChecksumTypeFullObject
}
if c.IsMultipartComposite() {
return xhttp.AmzChecksumTypeComposite
}
if !c.Is(ChecksumMultipart) {
return xhttp.AmzChecksumTypeFullObject
}
if c.IsSet() {
return xhttp.AmzChecksumTypeComposite
}
@ -340,12 +366,8 @@ func ReadCheckSums(b []byte, part int) (cs map[string]string, isMP bool) {
}
if cs != "" {
res[typ.String()] = cs
res[xhttp.AmzChecksumType] = typ.ObjType()
if !typ.Is(ChecksumMultipart) {
// Single part PUTs are always FULL_OBJECT checksum
// Refer https://docs.aws.amazon.com/AmazonS3/latest/API/API_PutObject.html
// **For PutObject uploads, the checksum type is always FULL_OBJECT.**
res[xhttp.AmzChecksumType] = ChecksumFullObject.ObjType()
if ckType := typ.ObjType(); ckType != "" {
res[xhttp.AmzChecksumType] = ckType
}
}
}

View File

@ -20,6 +20,8 @@ package hash
import (
"net/http/httptest"
"testing"
xhttp "github.com/minio/minio/internal/http"
)
// TestChecksumAddToHeader tests that adding and retrieving a checksum on a header works
@ -28,36 +30,77 @@ func TestChecksumAddToHeader(t *testing.T) {
name string
checksum ChecksumType
fullobj bool
wantErr bool
}{
{"CRC32-composite", ChecksumCRC32, false},
{"CRC32-full-object", ChecksumCRC32, true},
{"CRC32C-composite", ChecksumCRC32C, false},
{"CRC32C-full-object", ChecksumCRC32C, true},
{"CRC64NVME-full-object", ChecksumCRC64NVME, false}, // testing with false, because it always is full object.
{"ChecksumSHA1-composite", ChecksumSHA1, false},
{"ChecksumSHA256-composite", ChecksumSHA256, false},
{"CRC32-composite", ChecksumCRC32, false, false},
{"CRC32-full-object", ChecksumCRC32, true, false},
{"CRC32C-composite", ChecksumCRC32C, false, false},
{"CRC32C-full-object", ChecksumCRC32C, true, false},
{"CRC64NVME-full-object", ChecksumCRC64NVME, false, false}, // CRC64NVME is always full object
{"ChecksumSHA1-composite", ChecksumSHA1, false, false},
{"ChecksumSHA256-composite", ChecksumSHA256, false, false},
{"ChecksumSHA1-full-object", ChecksumSHA1, true, true}, // SHA1 does not support full object
{"ChecksumSHA256-full-object", ChecksumSHA256, true, true}, // SHA256 does not support full object
}
for _, tt := range tests {
t.Run(tt.name, func(t *testing.T) {
// Skip invalid cases where SHA1 or SHA256 is used with full object
if (tt.checksum.Is(ChecksumSHA1) || tt.checksum.Is(ChecksumSHA256)) && tt.fullobj {
// Validate that NewChecksumType correctly marks these as invalid
alg := tt.checksum.String()
typ := NewChecksumType(alg, xhttp.AmzChecksumTypeFullObject)
if !typ.Is(ChecksumInvalid) {
t.Fatalf("Expected ChecksumInvalid for %s with full object, got %s", tt.name, typ.StringFull())
}
return
}
myData := []byte("this-is-a-checksum-data-test")
chksm := NewChecksumFromData(tt.checksum, myData)
if chksm == nil {
t.Fatalf("NewChecksumFromData failed for %s", tt.name)
}
if tt.fullobj {
chksm.Type |= ChecksumFullObject
}
w := httptest.NewRecorder()
AddChecksumHeader(w, chksm.AsMap())
gotChksm, err := GetContentChecksum(w.Result().Header)
if err != nil {
t.Fatalf("GetContentChecksum failed: %v", err)
}
// In the CRC64NVM case, it is always full object, so add the flag for easier equality comparison
// CRC64NVME is always full object
if chksm.Type.Base().Is(ChecksumCRC64NVME) {
chksm.Type |= ChecksumFullObject
}
// Prepare the checksum map with appropriate headers
m := chksm.AsMap()
m[xhttp.AmzChecksumAlgo] = chksm.Type.String() // Set the algorithm explicitly
if chksm.Type.FullObjectRequested() {
m[xhttp.AmzChecksumType] = xhttp.AmzChecksumTypeFullObject
} else {
m[xhttp.AmzChecksumType] = xhttp.AmzChecksumTypeComposite
}
w := httptest.NewRecorder()
AddChecksumHeader(w, m)
gotChksm, err := GetContentChecksum(w.Result().Header)
if tt.wantErr {
if err == nil {
t.Fatalf("Expected error for %s, got none", tt.name)
}
return
}
if err != nil {
t.Fatalf("GetContentChecksum failed for %s: %v", tt.name, err)
}
if gotChksm == nil {
t.Fatalf("Got nil checksum for %s", tt.name)
}
// Compare the full checksum structs
if !chksm.Equal(gotChksm) {
t.Fatalf("Checksum mismatch: expected %+v, got %+v", chksm, gotChksm)
t.Errorf("Checksum mismatch for %s: expected %+v, got %+v", tt.name, chksm, gotChksm)
}
// Verify the checksum type
expectedType := chksm.Type
if gotChksm.Type != expectedType {
t.Errorf("Type mismatch for %s: expected %s, got %s", tt.name, expectedType.StringFull(), gotChksm.Type.StringFull())
}
})
}