S3Proxy implements the S3 API and proxies requests
 
 
 
Go to file
Andrew Gaul 10f2e930a4 Rewrite summary and rework features
Users should assume these features work; instead document the
limitations.
2015-11-10 17:23:01 -08:00
s3-tests@021113bf30 Update s3-tests to include multipart copy tests 2015-10-27 10:29:51 -07:00
src Remove redundant private modifier from enum 2015-10-26 13:11:14 -07:00
.gitignore more gitignore 2015-03-26 17:17:29 -07:00
.gitmodules Add s3-tests submodule 2015-01-22 17:05:04 -08:00
.travis.yml Re-enable s3-tests with Travis 2015-07-14 11:35:27 -07:00
LICENSE Initial commit of S3Proxy 2014-07-27 13:32:04 -07:00
README.md Rewrite summary and rework features 2015-11-10 17:23:01 -08:00
pom.xml Upgrade to error-prone 2.0.5 2015-10-28 13:38:54 -07:00

README.md

S3Proxy

S3Proxy allows applications using the S3 API to access other storage backends, e.g., local file system, Google Cloud Storage, Microsoft Azure, OpenStack Swift.

Installation

Users can download releases from GitHub. One can also build the project by running mvn package which produces a binary at target/s3proxy. S3Proxy requires Java 7 to run.

Examples

Linux and Mac OS X users can run S3Proxy via the executable jar:

chmod +x s3proxy
s3proxy --properties s3proxy.conf

Windows users must explicitly invoke java:

java -jar s3proxy --properties s3proxy.conf

Users can configure S3Proxy via a properties file. An example using Rackspace CloudFiles (based on OpenStack Swift) as the backing store:

s3proxy.endpoint=http://127.0.0.1:8080
s3proxy.authorization=aws-v2
s3proxy.identity=local-identity
s3proxy.credential=local-credential
jclouds.provider=rackspace-cloudfiles-us
jclouds.identity=remote-identity
jclouds.credential=remote-credential

Another example using the local file system as the backing store with anonymous access:

s3proxy.authorization=none
s3proxy.endpoint=http://127.0.0.1:8080
jclouds.provider=filesystem
jclouds.identity=identity
jclouds.credential=credential
jclouds.filesystem.basedir=/tmp

S3Proxy can listen on HTTPS by setting the secure-endpoint and configuring a keystore. An example:

s3proxy.secure-endpoint=https://127.0.0.1:8080
s3proxy.keystore-path=keystore.jks
s3proxy.keystore-password=password

To setup the keystore, do

$ keytool -keystore keystore.jks -alias aws -genkey -keyalg RSA

Use *.s3.amazonaws.com as the CN if you wish to proxy access to Amazon S3 itself. Applications will reject the self-signed certificate, unless you import it to the application's trusted store. If the application is written in Java, you can do:

$ keytool -exportcert -keystore keystore.jks -alias aws -rfc > aws.crt
$ keytool -keystore $JAVA_HOME/jre/lib/security/cacerts -import -alias aws -file aws.crt -trustcacerts

Users can also set other Java, jclouds, and S3Proxy properties.

Supported storage backends

  • atmos
  • aws-s3
  • azureblob
  • filesystem (on-disk storage)
  • google-cloud-storage
  • hpcloud-objectstorage
  • openstack-swift
  • rackspace-cloudfiles-uk and rackspace-cloudfiles-us
  • s3
  • swift and swift-keystone (legacy)
  • transient (in-memory storage)

Limitations

S3Proxy does not support:

  • POST uploads, see #73
  • object metadata with filesystem provider on Mac OS X, see JDK-8030048
  • object server-side encryption
  • object versioning, see #74
  • XML ACLs

S3Proxy emulates the following operations:

  • multi-part uploads, see #2
  • copy objects, see #46

References

  • Apache jclouds provides object store support for S3Proxy
  • Ceph s3-tests help maintain and improve compatibility with the S3 API
  • fake-s3 and S3 ninja provide functionality similar to S3Proxy when using the filesystem provider
  • Another project named s3proxy provides HTTP access to non-S3-aware applications
  • SwiftProxy provides similar functionality for the OpenStack Swift API

License

Copyright (C) 2014-2015 Andrew Gaul

Licensed under the Apache License, Version 2.0