93 KiB
MyFSIO Documentation
This document expands on the README to describe the full workflow for running, configuring, and extending MyFSIO. Use it as a playbook for local S3-style experimentation.
1. System Overview
MyFSIO ships two Flask entrypoints that share the same storage, IAM, and bucket-policy state:
- API server – Implements the S3-compatible REST API, policy evaluation, and Signature Version 4 presign service.
- UI server – Provides the browser console for buckets, IAM, and policies. It proxies all storage operations through the S3 API via boto3 (SigV4-signed), mirroring the architecture used by MinIO and Garage.
Both servers read AppConfig, so editing JSON stores on disk instantly affects both surfaces.
2. Quickstart
python -m venv .venv
. .venv/Scripts/activate # PowerShell: .\.venv\Scripts\Activate.ps1
pip install -r requirements.txt
# Run both API and UI
python run.py
Visit http://127.0.0.1:5100/ui to use the console and http://127.0.0.1:5000/ (with IAM headers) for raw API calls.
Run modes
You can run services individually if needed:
python run.py --mode api # API only (port 5000)
python run.py --mode ui # UI only (port 5100)
Configuration validation
Validate your configuration before deploying:
# Show configuration summary
python run.py --show-config
./myfsio --show-config
# Validate and check for issues (exits with code 1 if critical issues found)
python run.py --check-config
./myfsio --check-config
Linux Installation (Recommended for Production)
For production deployments on Linux, use the provided installation script:
# Download the binary and install script
# Then run the installer with sudo:
sudo ./scripts/install.sh --binary ./myfsio
# Or with custom paths:
sudo ./scripts/install.sh \
--binary ./myfsio \
--install-dir /opt/myfsio \
--data-dir /mnt/storage/myfsio \
--log-dir /var/log/myfsio \
--api-url https://s3.example.com \
--user myfsio
# Non-interactive mode (for automation):
sudo ./scripts/install.sh --binary ./myfsio -y
The installer will:
- Create a dedicated system user
- Set up directories with proper permissions
- Generate a secure
SECRET_KEY - Create an environment file at
/opt/myfsio/myfsio.env - Install and configure a systemd service
After installation:
sudo systemctl start myfsio # Start the service
sudo systemctl enable myfsio # Enable on boot
sudo systemctl status myfsio # Check status
sudo journalctl -u myfsio -f # View logs
To uninstall:
sudo ./scripts/uninstall.sh # Full removal
sudo ./scripts/uninstall.sh --keep-data # Keep data directory
Docker quickstart
The repo now ships a Dockerfile so you can run both services in one container:
docker build -t myfsio .
docker run --rm -p 5000:5000 -p 5100:5100 \
-v "$PWD/data:/app/data" \
-v "$PWD/logs:/app/logs" \
-e SECRET_KEY="change-me" \
--name myfsio myfsio
PowerShell (Windows) example:
docker run --rm -p 5000:5000 -p 5100:5100 `
-v ${PWD}\data:/app/data `
-v ${PWD}\logs:/app/logs `
-e SECRET_KEY="change-me" `
--name myfsio myfsio
Key mount points:
/app/data→ persists buckets directly under/app/data/<bucket>while system metadata (IAM config, bucket policies, versions, multipart uploads, etc.) lives under/app/data/.myfsio.sys(for example,/app/data/.myfsio.sys/config/iam.json)./app/logs→ captures the rotating app log./app/tmp-storage(optional) if you rely on the demo upload staging folders.
With these volumes attached you can rebuild/restart the container without losing stored objects or credentials.
Versioning
The repo now tracks a human-friendly release string inside app/version.py (see the APP_VERSION constant). Edit that value whenever you cut a release. The constant flows into Flask as APP_VERSION and is exposed via GET /myfsio/health, so you can monitor deployments or surface it in UIs.
3. Configuration Reference
All configuration is done via environment variables. The table below lists every supported variable.
Core Settings
| Variable | Default | Notes |
|---|---|---|
STORAGE_ROOT |
<repo>/data |
Filesystem home for all buckets/objects. |
MAX_UPLOAD_SIZE |
1073741824 (1 GiB) |
Bytes. Caps incoming uploads in both API + UI. |
UI_PAGE_SIZE |
100 |
MaxKeys hint shown in listings. |
SECRET_KEY |
Auto-generated | Flask session key. Auto-generates and persists if not set. Set explicitly in production. |
API_BASE_URL |
http://127.0.0.1:5000 |
Internal S3 API URL used by the web UI proxy. Also used for presigned URL generation. Set to your public URL if running behind a reverse proxy. |
AWS_REGION |
us-east-1 |
Region embedded in SigV4 credential scope. |
AWS_SERVICE |
s3 |
Service string for SigV4. |
DISPLAY_TIMEZONE |
UTC |
Timezone for timestamps in the web UI (e.g., US/Eastern, Asia/Tokyo). |
IAM & Security
| Variable | Default | Notes |
|---|---|---|
IAM_CONFIG |
data/.myfsio.sys/config/iam.json |
Stores users, secrets, and inline policies. Encrypted at rest when SECRET_KEY is set. |
BUCKET_POLICY_PATH |
data/.myfsio.sys/config/bucket_policies.json |
Bucket policy store (auto hot-reload). |
AUTH_MAX_ATTEMPTS |
5 |
Failed login attempts before lockout. |
AUTH_LOCKOUT_MINUTES |
15 |
Lockout duration after max failed attempts. |
SESSION_LIFETIME_DAYS |
30 |
How long UI sessions remain valid. |
SECRET_TTL_SECONDS |
300 |
TTL for ephemeral secrets (presigned URLs). |
UI_ENFORCE_BUCKET_POLICIES |
false |
Whether the UI should enforce bucket policies. |
ADMIN_ACCESS_KEY |
(none) | Custom access key for the admin user on first run or credential reset. If unset, a random key is generated. |
ADMIN_SECRET_KEY |
(none) | Custom secret key for the admin user on first run or credential reset. If unset, a random key is generated. |
CORS (Cross-Origin Resource Sharing)
| Variable | Default | Notes |
|---|---|---|
CORS_ORIGINS |
* |
Comma-separated allowed origins. Use specific domains in production. |
CORS_METHODS |
GET,PUT,POST,DELETE,OPTIONS,HEAD |
Allowed HTTP methods. |
CORS_ALLOW_HEADERS |
* |
Allowed request headers. |
CORS_EXPOSE_HEADERS |
* |
Response headers visible to browsers (e.g., ETag). |
Rate Limiting
| Variable | Default | Notes |
|---|---|---|
RATE_LIMIT_DEFAULT |
200 per minute |
Default rate limit for API endpoints. |
RATE_LIMIT_LIST_BUCKETS |
60 per minute |
Rate limit for listing buckets (GET /). |
RATE_LIMIT_BUCKET_OPS |
120 per minute |
Rate limit for bucket operations (PUT/DELETE/GET/POST on /<bucket>). |
RATE_LIMIT_OBJECT_OPS |
240 per minute |
Rate limit for object operations (PUT/GET/DELETE/POST on /<bucket>/<key>). |
RATE_LIMIT_HEAD_OPS |
100 per minute |
Rate limit for HEAD requests (bucket and object). |
RATE_LIMIT_ADMIN |
60 per minute |
Rate limit for admin API endpoints (/admin/*). |
RATE_LIMIT_STORAGE_URI |
memory:// |
Storage backend for rate limits. Use redis://host:port for distributed setups. |
Server Configuration
| Variable | Default | Notes |
|---|---|---|
SERVER_THREADS |
0 (auto) |
Granian blocking threads (1-64). Set to 0 for auto-calculation based on CPU cores (×2). |
SERVER_CONNECTION_LIMIT |
0 (auto) |
Maximum concurrent requests per worker (10-1000). Set to 0 for auto-calculation based on available RAM. |
SERVER_BACKLOG |
0 (auto) |
TCP listen backlog (128-4096). Set to 0 for auto-calculation (connection_limit × 2). |
SERVER_CHANNEL_TIMEOUT |
120 |
Seconds before idle connections are closed (10-300). |
Logging
| Variable | Default | Notes |
|---|---|---|
LOG_LEVEL |
INFO |
Log verbosity: DEBUG, INFO, WARNING, ERROR. |
LOG_TO_FILE |
true |
Enable file logging. |
LOG_DIR |
<repo>/logs |
Directory for log files. |
LOG_FILE |
app.log |
Log filename. |
LOG_MAX_BYTES |
5242880 (5 MB) |
Max log file size before rotation. |
LOG_BACKUP_COUNT |
3 |
Number of rotated log files to keep. |
Encryption
| Variable | Default | Notes |
|---|---|---|
ENCRYPTION_ENABLED |
false |
Enable server-side encryption support. |
ENCRYPTION_MASTER_KEY_PATH |
data/.myfsio.sys/keys/master.key |
Path to the master encryption key file. |
DEFAULT_ENCRYPTION_ALGORITHM |
AES256 |
Default algorithm for new encrypted objects. |
KMS_ENABLED |
false |
Enable KMS key management for encryption. |
KMS_KEYS_PATH |
data/.myfsio.sys/keys/kms_keys.json |
Path to store KMS key metadata. |
Lifecycle Rules
Lifecycle rules automate object management by scheduling deletions based on object age.
Enabling Lifecycle Enforcement
By default, lifecycle enforcement is disabled. Enable it by setting the environment variable:
LIFECYCLE_ENABLED=true python run.py
Or in your myfsio.env file:
LIFECYCLE_ENABLED=true
LIFECYCLE_INTERVAL_SECONDS=3600 # Check interval (default: 1 hour)
Configuring Rules
Once enabled, configure lifecycle rules via:
- Web UI: Bucket Details → Lifecycle tab → Add Rule
- S3 API:
PUT /<bucket>?lifecyclewith XML configuration
Available Actions
| Action | Description |
|---|---|
| Expiration | Delete current version objects after N days |
| NoncurrentVersionExpiration | Delete old versions N days after becoming noncurrent (requires versioning) |
| AbortIncompleteMultipartUpload | Clean up incomplete multipart uploads after N days |
Example Configuration (XML)
<LifecycleConfiguration>
<Rule>
<ID>DeleteOldLogs</ID>
<Status>Enabled</Status>
<Filter><Prefix>logs/</Prefix></Filter>
<Expiration><Days>30</Days></Expiration>
</Rule>
</LifecycleConfiguration>
Garbage Collection
The garbage collector (GC) automatically cleans up orphaned data that accumulates over time: stale temporary files from failed uploads, abandoned multipart uploads, stale lock files, orphaned metadata entries, orphaned version files, and empty directories.
Enabling GC
By default, GC is disabled. Enable it by setting:
GC_ENABLED=true python run.py
Or in your myfsio.env file:
GC_ENABLED=true
GC_INTERVAL_HOURS=6 # Run every 6 hours (default)
GC_TEMP_FILE_MAX_AGE_HOURS=24 # Delete temp files older than 24h
GC_MULTIPART_MAX_AGE_DAYS=7 # Delete orphaned multipart uploads older than 7 days
GC_LOCK_FILE_MAX_AGE_HOURS=1 # Delete stale lock files older than 1h
GC_DRY_RUN=false # Set to true to log without deleting
What Gets Cleaned
| Type | Location | Condition |
|---|---|---|
| Temp files | .myfsio.sys/tmp/ |
Older than GC_TEMP_FILE_MAX_AGE_HOURS |
| Orphaned multipart uploads | .myfsio.sys/multipart/ and <bucket>/.multipart/ |
Older than GC_MULTIPART_MAX_AGE_DAYS |
| Stale lock files | .myfsio.sys/buckets/<bucket>/locks/ |
Older than GC_LOCK_FILE_MAX_AGE_HOURS |
| Orphaned metadata | .myfsio.sys/buckets/<bucket>/meta/ and <bucket>/.meta/ |
Object file no longer exists |
| Orphaned versions | .myfsio.sys/buckets/<bucket>/versions/ and <bucket>/.versions/ |
Main object no longer exists |
| Empty directories | Various internal directories | Directory is empty after cleanup |
Admin API
All GC endpoints require admin (iam:*) permissions.
| Method | Route | Description |
|---|---|---|
GET |
/admin/gc/status |
Get GC status and configuration |
POST |
/admin/gc/run |
Trigger a manual GC run (body: {"dry_run": true} for preview) |
GET |
/admin/gc/history |
Get GC execution history (query: ?limit=50&offset=0) |
Dry Run Mode
Set GC_DRY_RUN=true to log what would be deleted without actually removing anything. You can also trigger a one-time dry run via the admin API:
curl -X POST "http://localhost:5000/admin/gc/run" \
-H "X-Access-Key: <key>" -H "X-Secret-Key: <secret>" \
-H "Content-Type: application/json" \
-d '{"dry_run": true}'
Performance Tuning
| Variable | Default | Notes |
|---|---|---|
STREAM_CHUNK_SIZE |
65536 (64 KB) |
Chunk size for streaming large files. |
MULTIPART_MIN_PART_SIZE |
5242880 (5 MB) |
Minimum part size for multipart uploads. |
BUCKET_STATS_CACHE_TTL |
60 |
Seconds to cache bucket statistics. |
BULK_DELETE_MAX_KEYS |
500 |
Maximum keys per bulk delete request. |
BULK_DOWNLOAD_MAX_BYTES |
1073741824 (1 GiB) |
Maximum total size for bulk ZIP downloads. |
OBJECT_CACHE_TTL |
60 |
Seconds to cache object metadata. |
Gzip Compression
API responses for JSON, XML, HTML, CSS, and JavaScript are automatically gzip-compressed when the client sends Accept-Encoding: gzip. Compression activates for responses larger than 500 bytes and is handled by a WSGI middleware (app/compression.py). Binary object downloads and streaming responses are never compressed. No configuration is needed.
Server Settings
| Variable | Default | Notes |
|---|---|---|
APP_HOST |
0.0.0.0 |
Network interface to bind to. |
APP_PORT |
5000 |
API server port (UI uses 5100). |
FLASK_DEBUG |
0 |
Enable Flask debug mode. Never enable in production. |
Production Checklist
Before deploying to production, ensure you:
- Set
SECRET_KEY- Use a strong, unique value (e.g.,openssl rand -base64 32). This also enables IAM config encryption at rest. - Restrict CORS - Set
CORS_ORIGINSto your specific domains instead of* - Configure
API_BASE_URL- Required for correct presigned URLs behind proxies - Enable HTTPS - Use a reverse proxy (nginx, Cloudflare) with TLS termination
- Review rate limits - Adjust
RATE_LIMIT_DEFAULTbased on your needs - Secure master keys - Back up
ENCRYPTION_MASTER_KEY_PATHif using encryption - Use
--prodflag - Runs with Granian instead of Flask dev server - Set credential expiry - Assign
expires_atto non-admin users for time-limited access
Proxy Configuration
If running behind a reverse proxy (e.g., Nginx, Cloudflare, or a tunnel), ensure the proxy sets the standard forwarding headers:
X-Forwarded-HostX-Forwarded-Proto
The application automatically trusts these headers to generate correct presigned URLs (e.g., https://s3.example.com/... instead of http://127.0.0.1:5000/...). Alternatively, you can explicitly set API_BASE_URL to your public endpoint.
| Variable | Default | Notes |
|---|---|---|
NUM_TRUSTED_PROXIES |
1 |
Number of trusted reverse proxies for X-Forwarded-* header processing. |
ALLOWED_REDIRECT_HOSTS |
"" |
Comma-separated whitelist of safe redirect targets. Empty allows only same-host redirects. |
ALLOW_INTERNAL_ENDPOINTS |
false |
Allow connections to internal/private IPs for webhooks and replication targets. Keep disabled in production unless needed. |
Integrity Scanner
The integrity scanner detects and optionally auto-repairs data inconsistencies: corrupted objects (ETag mismatch), orphaned files without metadata, phantom metadata without files, stale version archives, ETag cache drift, and unmigrated legacy .meta.json files.
Enabling Integrity Scanner
By default, the integrity scanner is disabled. Enable it by setting:
INTEGRITY_ENABLED=true python run.py
Or in your myfsio.env file:
INTEGRITY_ENABLED=true
INTEGRITY_INTERVAL_HOURS=24 # Run every 24 hours (default)
INTEGRITY_BATCH_SIZE=1000 # Max objects to scan per cycle
INTEGRITY_AUTO_HEAL=false # Automatically repair detected issues
INTEGRITY_DRY_RUN=false # Set to true to log without healing
What Gets Checked
| Check | Detection | Heal Action |
|---|---|---|
| Corrupted objects | File MD5 does not match stored __etag__ |
Update __etag__ in index (disk data is authoritative) |
| Orphaned objects | File exists on disk without metadata entry | Create index entry with computed MD5/size/mtime |
| Phantom metadata | Index entry exists but file is missing from disk | Remove stale entry from _index.json |
| Stale versions | .json manifest without .bin data or vice versa |
Remove orphaned version file |
| ETag cache inconsistency | etag_index.json entry differs from metadata __etag__ |
Delete etag_index.json (auto-rebuilt on next list) |
| Legacy metadata drift | Legacy .meta.json differs from index or is unmigrated |
Migrate to index and delete legacy file |
Admin API
All integrity endpoints require admin (iam:*) permissions.
| Method | Route | Description |
|---|---|---|
GET |
/admin/integrity/status |
Get scanner status and configuration |
POST |
/admin/integrity/run |
Trigger a manual scan (body: {"dry_run": true, "auto_heal": true}) |
GET |
/admin/integrity/history |
Get scan history (query: ?limit=50&offset=0) |
Dry Run Mode
Set INTEGRITY_DRY_RUN=true to log detected issues without making any changes. You can also trigger a one-time dry run via the admin API:
curl -X POST "http://localhost:5000/admin/integrity/run" \
-H "X-Access-Key: <key>" -H "X-Secret-Key: <secret>" \
-H "Content-Type: application/json" \
-d '{"dry_run": true, "auto_heal": true}'
Configuration Reference
| Variable | Default | Description |
|---|---|---|
INTEGRITY_ENABLED |
false |
Enable background integrity scanning |
INTEGRITY_INTERVAL_HOURS |
24 |
Hours between scan cycles |
INTEGRITY_BATCH_SIZE |
1000 |
Max objects to scan per cycle |
INTEGRITY_AUTO_HEAL |
false |
Automatically repair detected issues |
INTEGRITY_DRY_RUN |
false |
Log issues without healing |
4. Upgrading and Updates
Version Checking
The application version is tracked in app/version.py and exposed via:
- Health endpoint:
GET /myfsio/healthreturns JSON withversionfield - Metrics dashboard: Navigate to
/ui/metricsto see the running version in the System Status card
To check your current version:
# API health endpoint
curl http://localhost:5000/myfsio/health
# Or inspect version.py directly
cat app/version.py | grep APP_VERSION
Pre-Update Backup Procedures
Always backup before upgrading to prevent data loss:
# 1. Stop the application
# Ctrl+C if running in terminal, or:
docker stop myfsio # if using Docker
# 2. Backup configuration files (CRITICAL)
mkdir -p backups/$(date +%Y%m%d_%H%M%S)
cp -r data/.myfsio.sys/config backups/$(date +%Y%m%d_%H%M%S)/
# 3. Backup all data (optional but recommended)
tar -czf backups/data_$(date +%Y%m%d_%H%M%S).tar.gz data/
# 4. Backup logs for audit trail
cp -r logs backups/$(date +%Y%m%d_%H%M%S)/
Windows PowerShell:
# Create timestamped backup
$timestamp = Get-Date -Format "yyyyMMdd_HHmmss"
New-Item -ItemType Directory -Path "backups\$timestamp" -Force
# Backup configs
Copy-Item -Recurse "data\.myfsio.sys\config" "backups\$timestamp\"
# Backup entire data directory
Compress-Archive -Path "data\" -DestinationPath "backups\data_$timestamp.zip"
Critical files to backup:
data/.myfsio.sys/config/iam.json– User accounts and access keysdata/.myfsio.sys/config/bucket_policies.json– Bucket access policiesdata/.myfsio.sys/config/kms_keys.json– Encryption keys (if using KMS)data/.myfsio.sys/config/secret_store.json– Application secrets
Update Procedures
Source Installation Updates
# 1. Backup (see above)
# 2. Pull latest code
git fetch origin
git checkout main # or your target branch/tag
git pull
# 3. Check for dependency changes
pip install -r requirements.txt
# 4. Review CHANGELOG/release notes for breaking changes
cat CHANGELOG.md # if available
# 5. Run migration scripts (if any)
# python scripts/migrate_vX_to_vY.py # example
# 6. Restart application
python run.py
Docker Updates
# 1. Backup (see above)
# 2. Pull/rebuild image
docker pull yourregistry/myfsio:latest
# OR rebuild from source:
docker build -t myfsio:latest .
# 3. Stop and remove old container
docker stop myfsio
docker rm myfsio
# 4. Start new container with same volumes
docker run -d \
--name myfsio \
-p 5000:5000 -p 5100:5100 \
-v "$(pwd)/data:/app/data" \
-v "$(pwd)/logs:/app/logs" \
-e SECRET_KEY="your-secret" \
myfsio:latest
# 5. Verify health
curl http://localhost:5000/myfsio/health
Version Compatibility Checks
Before upgrading across major versions, verify compatibility:
| From Version | To Version | Breaking Changes | Migration Required |
|---|---|---|---|
| 0.1.x | 0.2.x | None expected | No |
| 0.1.6 | 0.1.7 | None | No |
| < 0.1.0 | >= 0.1.0 | New IAM config format | Yes - run migration script |
Automatic compatibility detection:
The application will log warnings on startup if config files need migration:
WARNING: IAM config format is outdated (v1). Please run: python scripts/migrate_iam.py
Manual compatibility check:
# Compare version schemas
python -c "from app.version import APP_VERSION; print(f'Running: {APP_VERSION}')"
python scripts/check_compatibility.py data/.myfsio.sys/config/
Migration Steps for Breaking Changes
When release notes indicate breaking changes, follow these steps:
Config Format Migrations
# 1. Backup first (critical!)
cp data/.myfsio.sys/config/iam.json data/.myfsio.sys/config/iam.json.backup
# 2. Run provided migration script
python scripts/migrate_iam_v1_to_v2.py
# 3. Validate migration
python scripts/validate_config.py
# 4. Test with read-only mode first (if available)
# python run.py --read-only
# 5. Restart normally
python run.py
Database/Storage Schema Changes
If object metadata format changes:
# 1. Run storage migration script
python scripts/migrate_storage.py --dry-run # preview changes
# 2. Apply migration
python scripts/migrate_storage.py --apply
# 3. Verify integrity
python scripts/verify_storage.py
IAM Policy Updates
If IAM action names change (e.g., s3:Get → s3:GetObject):
# Migration script will update all policies
python scripts/migrate_policies.py \
--input data/.myfsio.sys/config/iam.json \
--backup data/.myfsio.sys/config/iam.json.v1
# Review changes before committing
python scripts/diff_policies.py \
data/.myfsio.sys/config/iam.json.v1 \
data/.myfsio.sys/config/iam.json
Rollback Procedures
If an update causes issues, rollback to the previous version:
Quick Rollback (Source)
# 1. Stop application
# Ctrl+C or kill process
# 2. Revert code
git checkout <previous-version-tag>
# OR
git reset --hard HEAD~1
# 3. Restore configs from backup
cp backups/20241213_103000/config/* data/.myfsio.sys/config/
# 4. Downgrade dependencies if needed
pip install -r requirements.txt
# 5. Restart
python run.py
Docker Rollback
# 1. Stop current container
docker stop myfsio
docker rm myfsio
# 2. Start previous version
docker run -d \
--name myfsio \
-p 5000:5000 -p 5100:5100 \
-v "$(pwd)/data:/app/data" \
-v "$(pwd)/logs:/app/logs" \
-e SECRET_KEY="your-secret" \
myfsio:0.1.3 # specify previous version tag
# 3. Verify
curl http://localhost:5000/myfsio/health
Emergency Config Restore
If only config is corrupted but code is fine:
# Stop app
# Restore from latest backup
cp backups/20241213_103000/config/iam.json data/.myfsio.sys/config/
cp backups/20241213_103000/config/bucket_policies.json data/.myfsio.sys/config/
# Restart app
python run.py
Blue-Green Deployment (Zero Downtime)
For production environments requiring zero downtime:
# 1. Run new version on different port (e.g., 5001/5101)
APP_PORT=5001 UI_PORT=5101 python run.py &
# 2. Health check new instance
curl http://localhost:5001/myfsio/health
# 3. Update load balancer to route to new ports
# 4. Monitor for issues
# 5. Gracefully stop old instance
kill -SIGTERM <old-pid>
Post-Update Verification
After any update, verify functionality:
# 1. Health check
curl http://localhost:5000/myfsio/health
# 2. Login to UI
open http://localhost:5100/ui
# 3. Test IAM authentication
curl -H "X-Amz-Security-Token: <your-access-key>:<your-secret>" \
http://localhost:5000/
# 4. Test presigned URL generation
# Via UI or API
# 5. Check logs for errors
tail -n 100 logs/myfsio.log
Automated Update Scripts
Create a custom update script for your environment:
#!/bin/bash
# update.sh - Automated update with rollback capability
set -e # Exit on error
VERSION_NEW="$1"
BACKUP_DIR="backups/$(date +%Y%m%d_%H%M%S)"
echo "Creating backup..."
mkdir -p "$BACKUP_DIR"
cp -r data/.myfsio.sys/config "$BACKUP_DIR/"
echo "Updating to version $VERSION_NEW..."
git fetch origin
git checkout "v$VERSION_NEW"
pip install -r requirements.txt
echo "Starting application..."
python run.py &
APP_PID=$!
# Wait and health check
sleep 5
if curl -f http://localhost:5000/myfsio/health; then
echo "Update successful!"
else
echo "Health check failed, rolling back..."
kill $APP_PID
git checkout -
cp -r "$BACKUP_DIR/config/*" data/.myfsio.sys/config/
python run.py &
exit 1
fi
4. Authentication & IAM
MyFSIO implements a comprehensive Identity and Access Management (IAM) system that controls who can access your buckets and what operations they can perform. The system supports both simple action-based permissions and AWS-compatible policy syntax.
Getting Started
- On first boot,
data/.myfsio.sys/config/iam.jsonis created with a randomly generated admin user. The access key and secret key are printed to the console during first startup. You can setADMIN_ACCESS_KEYandADMIN_SECRET_KEYenvironment variables to use custom credentials instead of random ones. IfSECRET_KEYis configured, the IAM config file is encrypted at rest using AES (Fernet). To reset admin credentials later, runpython run.py --reset-cred. - Sign into the UI using the generated credentials, then open IAM:
- Create user: supply a display name, optional JSON inline policy array, and optional credential expiry date.
- Set expiry: assign an expiration date to any user's credentials. Expired credentials are rejected at authentication time. The UI shows expiry badges and preset durations (1h, 24h, 7d, 30d, 90d).
- Rotate secret: generates a new secret key; the UI surfaces it once.
- Policy editor: select a user, paste an array of objects (
{"bucket": "*", "actions": ["list", "read"]}), and submit. An optional"prefix"field restricts object-level actions to a key prefix (e.g.,"uploads/"). Alias support includes AWS-style verbs (e.g.,s3:GetObject).
- Wildcard action
iam:*is supported for admin user definitions.
Breaking Change (v0.2.0+): Previous versions used fixed default credentials (
localadmin/localadmin). If upgrading from an older version, your existing credentials remain unchanged, but new installations will generate random credentials.
Authentication
The API expects every request to include authentication headers. The UI persists them in the Flask session after login.
| Header | Description |
|---|---|
X-Access-Key |
The user's access key identifier |
X-Secret-Key |
The user's secret key for signing |
Security Features:
- Lockout Protection: After
AUTH_MAX_ATTEMPTS(default: 5) failed login attempts, the account is locked forAUTH_LOCKOUT_MINUTES(default: 15 minutes). - Credential Expiry: Each user can have an optional
expires_attimestamp (ISO 8601). Once expired, all API requests using those credentials are rejected. Set or clear expiry via the UI or API. - IAM Config Encryption: When
SECRET_KEYis set, the IAM config file (iam.json) is encrypted at rest using Fernet (AES-256-CBC with HMAC). Existing plaintext configs are automatically encrypted on next load. - Session Management: UI sessions remain valid for
SESSION_LIFETIME_DAYS(default: 30 days). - Hot Reload: IAM configuration changes take effect immediately without restart.
- Credential Reset: Run
python run.py --reset-credto reset admin credentials. SupportsADMIN_ACCESS_KEYandADMIN_SECRET_KEYenv vars for deterministic keys.
Permission Model
MyFSIO uses a two-layer permission model:
- IAM User Policies – Define what a user can do across the system (stored in
iam.json) - Bucket Policies – Define who can access a specific bucket (stored in
bucket_policies.json)
Both layers are evaluated for each request. A user must have permission in their IAM policy AND the bucket policy must allow the action (or have no explicit deny).
Available IAM Actions
S3 Actions (Bucket/Object Operations)
| Action | Description | AWS Aliases |
|---|---|---|
list |
List buckets and objects | s3:ListBucket, s3:ListAllMyBuckets, s3:ListBucketVersions, s3:ListMultipartUploads, s3:ListParts |
read |
Download objects, get metadata | s3:GetObject, s3:GetObjectVersion, s3:GetObjectTagging, s3:GetObjectVersionTagging, s3:GetObjectAcl, s3:GetBucketVersioning, s3:HeadObject, s3:HeadBucket |
write |
Upload objects, manage object tags | s3:PutObject, s3:PutObjectTagging, s3:CreateMultipartUpload, s3:UploadPart, s3:CompleteMultipartUpload, s3:AbortMultipartUpload, s3:CopyObject |
delete |
Remove objects and versions | s3:DeleteObject, s3:DeleteObjectVersion, s3:DeleteObjectTagging |
create_bucket |
Create new buckets | s3:CreateBucket |
delete_bucket |
Delete buckets | s3:DeleteBucket |
share |
Manage Access Control Lists (ACLs) | s3:PutObjectAcl, s3:PutBucketAcl, s3:GetBucketAcl |
policy |
Manage bucket policies | s3:PutBucketPolicy, s3:GetBucketPolicy, s3:DeleteBucketPolicy |
versioning |
Manage bucket versioning configuration | s3:GetBucketVersioning, s3:PutBucketVersioning |
tagging |
Manage bucket-level tags | s3:GetBucketTagging, s3:PutBucketTagging, s3:DeleteBucketTagging |
encryption |
Manage bucket encryption configuration | s3:GetEncryptionConfiguration, s3:PutEncryptionConfiguration, s3:DeleteEncryptionConfiguration |
lifecycle |
Manage lifecycle rules | s3:GetLifecycleConfiguration, s3:PutLifecycleConfiguration, s3:DeleteLifecycleConfiguration, s3:GetBucketLifecycle, s3:PutBucketLifecycle |
cors |
Manage CORS configuration | s3:GetBucketCors, s3:PutBucketCors, s3:DeleteBucketCors |
replication |
Configure and manage replication | s3:GetReplicationConfiguration, s3:PutReplicationConfiguration, s3:DeleteReplicationConfiguration, s3:ReplicateObject, s3:ReplicateTags, s3:ReplicateDelete |
quota |
Manage bucket storage quotas | s3:GetBucketQuota, s3:PutBucketQuota, s3:DeleteBucketQuota |
object_lock |
Manage object lock, retention, and legal holds | s3:GetObjectLockConfiguration, s3:PutObjectLockConfiguration, s3:PutObjectRetention, s3:GetObjectRetention, s3:PutObjectLegalHold, s3:GetObjectLegalHold |
notification |
Manage bucket event notifications | s3:GetBucketNotificationConfiguration, s3:PutBucketNotificationConfiguration, s3:DeleteBucketNotificationConfiguration |
logging |
Manage bucket access logging | s3:GetBucketLogging, s3:PutBucketLogging, s3:DeleteBucketLogging |
website |
Manage static website hosting configuration | s3:GetBucketWebsite, s3:PutBucketWebsite, s3:DeleteBucketWebsite |
IAM Actions (User Management)
| Action | Description | AWS Aliases |
|---|---|---|
iam:list_users |
View all IAM users and their policies | iam:ListUsers |
iam:create_user |
Create new IAM users | iam:CreateUser |
iam:delete_user |
Delete IAM users | iam:DeleteUser |
iam:rotate_key |
Rotate user secret keys | iam:RotateAccessKey |
iam:update_policy |
Modify user policies | iam:PutUserPolicy |
iam:create_key |
Create additional access keys for a user | iam:CreateAccessKey |
iam:delete_key |
Delete an access key from a user | iam:DeleteAccessKey |
iam:get_user |
View user details and access keys | iam:GetUser |
iam:get_policy |
View user policy configuration | iam:GetPolicy |
iam:disable_user |
Temporarily disable/enable a user account | iam:DisableUser |
iam:* |
Admin wildcard – grants all IAM actions | — |
Wildcards
| Wildcard | Scope | Description |
|---|---|---|
* (in actions) |
All S3 actions | Grants all 19 S3 actions including list, read, write, delete, create_bucket, delete_bucket, share, policy, versioning, tagging, encryption, lifecycle, cors, replication, quota, object_lock, notification, logging, website |
iam:* |
All IAM actions | Grants all iam:* actions for user management |
* (in bucket) |
All buckets | Policy applies to every bucket |
IAM Policy Structure
User policies are stored as a JSON array of policy objects. Each object specifies a bucket, the allowed actions, and an optional prefix for object-level scoping:
[
{
"bucket": "<bucket-name-or-wildcard>",
"actions": ["<action1>", "<action2>", ...],
"prefix": "<optional-key-prefix>"
}
]
Fields:
bucket: The bucket name (case-insensitive) or*for all bucketsactions: Array of action strings (simple names or AWS aliases)prefix: (optional) Restrict object-level actions to keys starting with this prefix. Defaults to*(all objects). Example:"uploads/"restricts to keys underuploads/
Example User Policies
Full Administrator (complete system access):
[{"bucket": "*", "actions": ["list", "read", "write", "delete", "share", "policy", "create_bucket", "delete_bucket", "versioning", "tagging", "encryption", "lifecycle", "cors", "replication", "quota", "object_lock", "notification", "logging", "website", "iam:*"]}]
Read-Only User (browse and download only):
[{"bucket": "*", "actions": ["list", "read"]}]
Single Bucket Full Access (no access to other buckets):
[{"bucket": "user-bucket", "actions": ["list", "read", "write", "delete"]}]
Operator (data operations + bucket management, no config):
[{"bucket": "*", "actions": ["list", "read", "write", "delete", "create_bucket", "delete_bucket"]}]
Multiple Bucket Access (different permissions per bucket):
[
{"bucket": "public-data", "actions": ["list", "read"]},
{"bucket": "my-uploads", "actions": ["list", "read", "write", "delete"]},
{"bucket": "team-shared", "actions": ["list", "read", "write"]}
]
Prefix-Scoped Access (restrict to a folder inside a shared bucket):
[{"bucket": "shared-data", "actions": ["list", "read", "write", "delete"], "prefix": "team-a/"}]
IAM Manager (manage users but no data access):
[{"bucket": "*", "actions": ["iam:list_users", "iam:create_user", "iam:delete_user", "iam:rotate_key", "iam:update_policy", "iam:create_key", "iam:delete_key", "iam:get_user", "iam:get_policy", "iam:disable_user"]}]
Replication Operator (manage replication only):
[{"bucket": "*", "actions": ["list", "read", "replication"]}]
Lifecycle Manager (configure object expiration):
[{"bucket": "*", "actions": ["list", "lifecycle"]}]
CORS Administrator (configure cross-origin access):
[{"bucket": "*", "actions": ["cors"]}]
Bucket Administrator (full bucket config, no IAM access):
[{"bucket": "my-bucket", "actions": ["list", "read", "write", "delete", "create_bucket", "delete_bucket", "share", "policy", "versioning", "tagging", "encryption", "lifecycle", "cors", "replication", "quota", "object_lock", "notification", "logging", "website"]}]
Upload-Only User (write but cannot create/delete buckets):
[{"bucket": "drop-box", "actions": ["write"]}]
Backup Operator (read, list, and replicate):
[{"bucket": "*", "actions": ["list", "read", "replication"]}]
Using AWS-Style Action Names
You can use AWS S3 action names instead of simple names. They are automatically normalized:
[
{
"bucket": "my-bucket",
"actions": [
"s3:ListBucket",
"s3:GetObject",
"s3:PutObject",
"s3:DeleteObject"
]
}
]
This is equivalent to:
[{"bucket": "my-bucket", "actions": ["list", "read", "write", "delete"]}]
Managing Users via API
# List all users (requires iam:list_users)
curl http://localhost:5000/iam/users \
-H "X-Access-Key: ..." -H "X-Secret-Key: ..."
# Create a new user (requires iam:create_user)
curl -X POST http://localhost:5000/iam/users \
-H "Content-Type: application/json" \
-H "X-Access-Key: ..." -H "X-Secret-Key: ..." \
-d '{
"display_name": "New User",
"policies": [{"bucket": "*", "actions": ["list", "read"]}],
"expires_at": "2026-12-31T23:59:59Z"
}'
# Rotate user secret (requires iam:rotate_key)
curl -X POST http://localhost:5000/iam/users/<access-key>/rotate \
-H "X-Access-Key: ..." -H "X-Secret-Key: ..."
# Update user policies (requires iam:update_policy)
curl -X PUT http://localhost:5000/iam/users/<access-key>/policies \
-H "Content-Type: application/json" \
-H "X-Access-Key: ..." -H "X-Secret-Key: ..." \
-d '[{"bucket": "*", "actions": ["list", "read", "write"]}]'
# Update credential expiry (requires iam:update_policy)
curl -X POST http://localhost:5000/iam/users/<access-key>/expiry \
-H "Content-Type: application/x-www-form-urlencoded" \
-H "X-Access-Key: ..." -H "X-Secret-Key: ..." \
-d 'expires_at=2026-12-31T23:59:59Z'
# Remove credential expiry (never expires)
curl -X POST http://localhost:5000/iam/users/<access-key>/expiry \
-H "Content-Type: application/x-www-form-urlencoded" \
-H "X-Access-Key: ..." -H "X-Secret-Key: ..." \
-d 'expires_at='
# Delete a user (requires iam:delete_user)
curl -X DELETE http://localhost:5000/iam/users/<access-key> \
-H "X-Access-Key: ..." -H "X-Secret-Key: ..."
# Get user details (requires iam:get_user) — via Admin API
curl http://localhost:5000/admin/iam/users/<user-id-or-access-key> \
-H "Authorization: AWS4-HMAC-SHA256 ..."
# Get user policies (requires iam:get_policy) — via Admin API
curl http://localhost:5000/admin/iam/users/<user-id-or-access-key>/policies \
-H "Authorization: AWS4-HMAC-SHA256 ..."
# Create additional access key for a user (requires iam:create_key)
curl -X POST http://localhost:5000/admin/iam/users/<user-id-or-access-key>/keys \
-H "Authorization: AWS4-HMAC-SHA256 ..."
# Delete an access key (requires iam:delete_key)
curl -X DELETE http://localhost:5000/admin/iam/users/<user-id>/keys/<access-key> \
-H "Authorization: AWS4-HMAC-SHA256 ..."
# Disable a user account (requires iam:disable_user)
curl -X POST http://localhost:5000/admin/iam/users/<user-id-or-access-key>/disable \
-H "Authorization: AWS4-HMAC-SHA256 ..."
# Re-enable a user account (requires iam:disable_user)
curl -X POST http://localhost:5000/admin/iam/users/<user-id-or-access-key>/enable \
-H "Authorization: AWS4-HMAC-SHA256 ..."
Permission Precedence
When a request is made, permissions are evaluated in this order:
- Authentication – Verify the access key and secret key are valid
- Lockout Check – Ensure the account is not locked due to failed attempts
- Expiry Check – Reject requests if the user's credentials have expired (
expires_at) - IAM Policy Check – Verify the user has the required action for the target bucket
- Bucket Policy Check – If a bucket policy exists, verify it allows the action
A request is allowed only if:
- The IAM policy grants the action, AND
- The bucket policy allows the action (or no bucket policy exists)
Common Permission Scenarios
| Scenario | Required Actions |
|---|---|
| Browse bucket contents | list |
| Download a file | read |
| Upload a file | write |
| Delete a file | delete |
| Generate presigned URL (GET) | read |
| Generate presigned URL (PUT) | write |
| Generate presigned URL (DELETE) | delete |
| Enable versioning | write (includes s3:PutBucketVersioning) |
| View bucket policy | policy |
| Modify bucket policy | policy |
| Configure lifecycle rules | lifecycle |
| View lifecycle rules | lifecycle |
| Configure CORS | cors |
| View CORS rules | cors |
| Configure replication | replication (admin-only for creation) |
| Pause/resume replication | replication |
| Manage other users | iam:* or specific iam: actions |
| Set bucket quotas | iam:* or iam:list_users (admin feature) |
Security Best Practices
- Principle of Least Privilege – Grant only the permissions users need
- Avoid Wildcards – Use specific bucket names instead of
*when possible - Rotate Secrets Regularly – Use the rotate key feature periodically
- Separate Admin Accounts – Don't use admin accounts for daily operations
- Monitor Failed Logins – Check logs for repeated authentication failures
- Use Bucket Policies for Fine-Grained Control – Combine with IAM for defense in depth
5. Bucket Policies & Presets
- Storage: Policies are persisted in
data/.myfsio.sys/config/bucket_policies.jsonunder{"policies": {"bucket": {...}}}. - Hot reload: Both API and UI call
maybe_reload()before evaluating policies. Editing the JSON on disk is immediately reflected—no restarts required. - UI editor: Each bucket detail page includes:
- A preset selector: Private detaches the policy (delete mode), Public injects an allow policy granting anonymous
s3:ListBucket+s3:GetObject, and Custom restores your draft. - A read-only preview of the attached policy.
- Autosave behavior for custom drafts while you type.
- A preset selector: Private detaches the policy (delete mode), Public injects an allow policy granting anonymous
Editing via CLI
curl -X PUT "http://127.0.0.1:5000/test?policy" \
-H "Content-Type: application/json" \
-H "X-Access-Key: ..." -H "X-Secret-Key: ..." \
-d '{
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Principal": "*",
"Action": ["s3:ListBucket"],
"Resource": ["arn:aws:s3:::test"]
}
]
}'
The UI will reflect this change as soon as the request completes thanks to the hot reload.
UI Object Browser
The bucket detail page includes a powerful object browser with the following features:
Folder Navigation
Objects with forward slashes (/) in their keys are displayed as a folder hierarchy. Click a folder row to navigate into it. A breadcrumb navigation bar shows your current path and allows quick navigation back to parent folders or the root.
Pagination & Infinite Scroll
- Objects load in configurable batches (50, 100, 150, 200, or 250 per page)
- Scroll to the bottom to automatically load more objects (infinite scroll)
- A Load more button is available as a fallback for touch devices or when infinite scroll doesn't trigger
- The footer shows the current load status (e.g., "Showing 100 of 500 objects")
Bulk Operations
- Select multiple objects using checkboxes
- Bulk Delete: Delete multiple objects at once
- Bulk Download: Download selected objects as a single ZIP archive (up to
BULK_DOWNLOAD_MAX_BYTES, default 1 GiB)
Search & Filter
Use the search box to filter objects by name in real-time. The filter applies to the currently loaded objects.
Error Handling
If object loading fails (e.g., network error), a friendly error message is displayed with a Retry button to attempt loading again.
Object Preview
Click any object row to view its details in the preview sidebar:
- File size and last modified date
- ETag (content hash)
- Custom metadata (if present)
- Download and presign (share link) buttons
- Version history (when versioning is enabled)
Drag & Drop Upload
Drag files directly onto the objects table to upload them to the current bucket and folder path.
6. Presigned URLs
- Trigger from the UI using the Presign button after selecting an object.
- Supported methods:
GET,PUT,DELETE; expiration must be1..604800seconds. - The service signs requests using the caller's IAM credentials and enforces bucket policies both when issuing and when the presigned URL is used.
- Legacy share links have been removed; presigned URLs now handle both private and public workflows.
Multipart Upload Example
import boto3
s3 = boto3.client('s3', endpoint_url='http://localhost:5000')
# Initiate
response = s3.create_multipart_upload(Bucket='mybucket', Key='large.bin')
upload_id = response['UploadId']
# Upload parts
parts = []
chunks = [b'chunk1', b'chunk2'] # Example data chunks
for part_number, chunk in enumerate(chunks, start=1):
response = s3.upload_part(
Bucket='mybucket',
Key='large.bin',
PartNumber=part_number,
UploadId=upload_id,
Body=chunk
)
parts.append({'PartNumber': part_number, 'ETag': response['ETag']})
# Complete
s3.complete_multipart_upload(
Bucket='mybucket',
Key='large.bin',
UploadId=upload_id,
MultipartUpload={'Parts': parts}
)
7. Encryption
MyFSIO supports server-side encryption at rest to protect your data. When enabled, objects are encrypted using AES-256-GCM before being written to disk.
Encryption Types
| Type | Description |
|---|---|
| AES-256 (SSE-S3) | Server-managed encryption using a local master key |
| KMS (SSE-KMS) | Encryption using customer-managed keys via the built-in KMS |
| SSE-C | Server-side encryption with customer-provided keys (per-request) |
Enabling Encryption
1. Set Environment Variables
# PowerShell
$env:ENCRYPTION_ENABLED = "true"
$env:KMS_ENABLED = "true" # Optional, for KMS key management
python run.py
# Bash
export ENCRYPTION_ENABLED=true
export KMS_ENABLED=true
python run.py
2. Configure Bucket Default Encryption (UI)
- Navigate to your bucket in the UI
- Click the Properties tab
- Find the Default Encryption card
- Click Enable Encryption
- Choose algorithm:
- AES-256: Uses the server's master key
- aws:kms: Uses a KMS-managed key (select from dropdown)
- Save changes
Once enabled, all new objects uploaded to the bucket will be automatically encrypted.
KMS Key Management
When KMS_ENABLED=true, you can manage encryption keys via the KMS API:
# Create a new KMS key
curl -X POST http://localhost:5000/kms/keys \
-H "Content-Type: application/json" \
-H "X-Access-Key: ..." -H "X-Secret-Key: ..." \
-d '{"alias": "my-key", "description": "Production encryption key"}'
# List all keys
curl http://localhost:5000/kms/keys \
-H "X-Access-Key: ..." -H "X-Secret-Key: ..."
# Get key details
curl http://localhost:5000/kms/keys/{key-id} \
-H "X-Access-Key: ..." -H "X-Secret-Key: ..."
# Rotate a key (creates new key material)
curl -X POST http://localhost:5000/kms/keys/{key-id}/rotate \
-H "X-Access-Key: ..." -H "X-Secret-Key: ..."
# Disable/Enable a key
curl -X POST http://localhost:5000/kms/keys/{key-id}/disable \
-H "X-Access-Key: ..." -H "X-Secret-Key: ..."
curl -X POST http://localhost:5000/kms/keys/{key-id}/enable \
-H "X-Access-Key: ..." -H "X-Secret-Key: ..."
# Schedule key deletion (30-day waiting period)
curl -X DELETE http://localhost:5000/kms/keys/{key-id}?waiting_period_days=30 \
-H "X-Access-Key: ..." -H "X-Secret-Key: ..."
How It Works
- Envelope Encryption: Each object is encrypted with a unique Data Encryption Key (DEK)
- Key Wrapping: The DEK is encrypted (wrapped) by the master key or KMS key
- Storage: The encrypted DEK is stored alongside the encrypted object
- Decryption: On read, the DEK is unwrapped and used to decrypt the object
Client-Side Encryption
For additional security, you can use client-side encryption. The ClientEncryptionHelper class provides utilities:
from app.encryption import ClientEncryptionHelper
# Generate a client-side key
key = ClientEncryptionHelper.generate_key()
key_b64 = ClientEncryptionHelper.key_to_base64(key)
# Encrypt before upload
plaintext = b"sensitive data"
encrypted, metadata = ClientEncryptionHelper.encrypt_for_upload(plaintext, key)
# Upload with metadata headers
# x-amz-meta-x-amz-key: <wrapped-key>
# x-amz-meta-x-amz-iv: <iv>
# x-amz-meta-x-amz-matdesc: <material-description>
# Decrypt after download
decrypted = ClientEncryptionHelper.decrypt_from_download(encrypted, metadata, key)
SSE-C (Customer-Provided Keys)
With SSE-C, you provide your own 256-bit AES encryption key with each request. The server encrypts/decrypts using your key but never stores it. You must supply the same key for both upload and download.
Required headers:
| Header | Value |
|---|---|
x-amz-server-side-encryption-customer-algorithm |
AES256 |
x-amz-server-side-encryption-customer-key |
Base64-encoded 256-bit key |
x-amz-server-side-encryption-customer-key-MD5 |
Base64-encoded MD5 of the key |
# Generate a 256-bit key
KEY=$(openssl rand -base64 32)
KEY_MD5=$(echo -n "$KEY" | base64 -d | openssl dgst -md5 -binary | base64)
# Upload with SSE-C
curl -X PUT "http://localhost:5000/my-bucket/secret.txt" \
-H "X-Access-Key: ..." -H "X-Secret-Key: ..." \
-H "x-amz-server-side-encryption-customer-algorithm: AES256" \
-H "x-amz-server-side-encryption-customer-key: $KEY" \
-H "x-amz-server-side-encryption-customer-key-MD5: $KEY_MD5" \
--data-binary @secret.txt
# Download with SSE-C (same key required)
curl "http://localhost:5000/my-bucket/secret.txt" \
-H "X-Access-Key: ..." -H "X-Secret-Key: ..." \
-H "x-amz-server-side-encryption-customer-algorithm: AES256" \
-H "x-amz-server-side-encryption-customer-key: $KEY" \
-H "x-amz-server-side-encryption-customer-key-MD5: $KEY_MD5"
Key points:
- SSE-C does not require
ENCRYPTION_ENABLEDorKMS_ENABLED— the key is provided per-request - If you lose your key, the data is irrecoverable
- The MD5 header is optional but recommended for integrity verification
Important Notes
- Existing objects are NOT encrypted - Only new uploads after enabling encryption are encrypted
- Master key security - The master key file (
master.key) should be backed up securely and protected - Key rotation - Rotating a KMS key creates new key material; existing objects remain encrypted with the old material
- Disabled keys - Objects encrypted with a disabled key cannot be decrypted until the key is re-enabled
- Deleted keys - Once a key is deleted (after the waiting period), objects encrypted with it are permanently inaccessible
Verifying Encryption
To verify an object is encrypted:
- Check the raw file in
data/<bucket>/- it should be unreadable binary - Look for
.metafiles containing encryption metadata - Download via the API/UI - the object should be automatically decrypted
8. Bucket Quotas
MyFSIO supports storage quotas to limit how much data a bucket can hold. Quotas are enforced on uploads and multipart completions.
Quota Types
| Limit | Description |
|---|---|
| Max Size (MB) | Maximum total storage in megabytes (includes current objects + archived versions) |
| Max Objects | Maximum number of objects (includes current objects + archived versions) |
Managing Quotas (Admin Only)
Quota management is restricted to administrators (users with iam:* or iam:list_users permissions).
Via UI
- Navigate to your bucket in the UI
- Click the Properties tab
- Find the Storage Quota card
- Enter limits:
- Max Size (MB): Leave empty for unlimited
- Max Objects: Leave empty for unlimited
- Click Update Quota
To remove a quota, click Remove Quota.
Via API
# Set quota (max 100MB, max 1000 objects)
curl -X PUT "http://localhost:5000/bucket/<bucket>?quota" \
-H "Content-Type: application/json" \
-H "X-Access-Key: ..." -H "X-Secret-Key: ..." \
-d '{"max_bytes": 104857600, "max_objects": 1000}'
# Get current quota
curl "http://localhost:5000/bucket/<bucket>?quota" \
-H "X-Access-Key: ..." -H "X-Secret-Key: ..."
# Remove quota
curl -X PUT "http://localhost:5000/bucket/<bucket>?quota" \
-H "Content-Type: application/json" \
-H "X-Access-Key: ..." -H "X-Secret-Key: ..." \
-d '{"max_bytes": null, "max_objects": null}'
Quota Behavior
- Version Counting: When versioning is enabled, archived versions count toward the quota
- Enforcement Points: Quotas are checked during
PUTobject andCompleteMultipartUploadoperations - Error Response: When quota is exceeded, the API returns
HTTP 400with error codeQuotaExceeded - Visibility: All users can view quota usage in the bucket detail page, but only admins can modify quotas
Example Error
<Error>
<Code>QuotaExceeded</Code>
<Message>Bucket quota exceeded: storage limit reached</Message>
<BucketName>my-bucket</BucketName>
</Error>
9. Operation Metrics
Operation metrics provide real-time visibility into API request statistics, including request counts, latency, error rates, and bandwidth usage.
Enabling Operation Metrics
By default, operation metrics are disabled. Enable by setting the environment variable:
OPERATION_METRICS_ENABLED=true python run.py
Or in your myfsio.env file:
OPERATION_METRICS_ENABLED=true
OPERATION_METRICS_INTERVAL_MINUTES=5
OPERATION_METRICS_RETENTION_HOURS=24
Configuration Options
| Variable | Default | Description |
|---|---|---|
OPERATION_METRICS_ENABLED |
false |
Enable/disable operation metrics |
OPERATION_METRICS_INTERVAL_MINUTES |
5 |
Snapshot interval (minutes) |
OPERATION_METRICS_RETENTION_HOURS |
24 |
History retention period (hours) |
What's Tracked
Request Statistics:
- Request counts by HTTP method (GET, PUT, POST, DELETE, HEAD, OPTIONS)
- Response status codes grouped by class (2xx, 3xx, 4xx, 5xx)
- Latency statistics (min, max, average)
- Bytes transferred in/out
Endpoint Breakdown:
object- Object operations (GET/PUT/DELETE objects)bucket- Bucket operations (list, create, delete buckets)ui- Web UI requestsservice- Health checks, internal endpointskms- KMS API operations
S3 Error Codes:
Tracks API-specific error codes like NoSuchKey, AccessDenied, BucketNotFound. Note: These are separate from HTTP status codes - a 404 from the UI won't appear here, only S3 API errors.
API Endpoints
# Get current operation metrics
curl http://localhost:5100/ui/metrics/operations \
-H "X-Access-Key: ..." -H "X-Secret-Key: ..."
# Get operation metrics history
curl http://localhost:5100/ui/metrics/operations/history \
-H "X-Access-Key: ..." -H "X-Secret-Key: ..."
# Filter history by time range
curl "http://localhost:5100/ui/metrics/operations/history?hours=6" \
-H "X-Access-Key: ..." -H "X-Secret-Key: ..."
Storage Location
Operation metrics data is stored at:
data/.myfsio.sys/config/operation_metrics.json
UI Dashboard
When enabled, the Metrics page (/ui/metrics) shows an "API Operations" section with:
- Summary cards: Requests, Success Rate, Errors, Latency, Bytes In, Bytes Out
- Charts: Requests by Method (doughnut), Requests by Status (bar), Requests by Endpoint (horizontal bar)
- S3 Error Codes table with distribution
Data refreshes every 5 seconds.
10. Site Replication
Permission Model
Replication uses a two-tier permission system:
| Role | Capabilities |
|---|---|
Admin (users with iam:* permissions) |
Create/delete replication rules, configure connections and target buckets |
Users (with replication permission) |
Enable/disable (pause/resume) existing replication rules |
Note: The Replication tab is hidden for users without the
replicationpermission on the bucket.
This separation allows administrators to pre-configure where data should replicate, while allowing authorized users to toggle replication on/off without accessing connection credentials.
Replication Modes
| Mode | Behavior |
|---|---|
new_only |
Only replicate new/modified objects (default) |
all |
Sync all existing objects when rule is enabled |
bidirectional |
Two-way sync with Last-Write-Wins conflict resolution |
Architecture
- Source Instance: The MyFSIO instance where you upload files. It runs the replication worker.
- Target Instance: Another MyFSIO instance (or any S3-compatible service like AWS S3, MinIO) that receives the copies.
For new_only and all modes, replication is asynchronous (happens in the background) and one-way (Source -> Target).
For bidirectional mode, replication is two-way with automatic conflict resolution.
Setup Guide
1. Prepare the Target Instance
If your target is another MyFSIO server (e.g., running on a different machine or port), you need to create a destination bucket and a user with write permissions.
Option A: Using the UI (Easiest) If you have access to the UI of the target instance:
- Log in to the Target UI.
- Create a new bucket (e.g.,
backup-bucket). - Go to IAM, create a new user (e.g.,
replication-user), and copy the Access/Secret keys.
Option B: Headless Setup (API Only)
If the target server is only running the API (run_api.py) and has no UI access, you can bootstrap the credentials and bucket by running a Python script on the server itself.
Run this script on the Target Server:
# setup_target.py
from pathlib import Path
from app.iam import IamService
from app.storage import ObjectStorage
# Initialize services (paths match default config)
data_dir = Path("data")
iam = IamService(data_dir / ".myfsio.sys" / "config" / "iam.json")
storage = ObjectStorage(data_dir)
# 1. Create the bucket
bucket_name = "backup-bucket"
try:
storage.create_bucket(bucket_name)
print(f"Bucket '{bucket_name}' created.")
except Exception as e:
print(f"Bucket creation skipped: {e}")
# 2. Create the user
try:
# Create user with full access (or restrict policy as needed)
creds = iam.create_user(
display_name="Replication User",
policies=[{"bucket": bucket_name, "actions": ["write", "read", "list"]}]
)
print("\n--- CREDENTIALS GENERATED ---")
print(f"Access Key: {creds['access_key']}")
print(f"Secret Key: {creds['secret_key']}")
print("-----------------------------")
except Exception as e:
print(f"User creation failed: {e}")
Save and run: python setup_target.py
2. Configure the Source Instance
Now, configure the primary instance to replicate to the target.
-
Access the Console: Log in to the UI of your Source Instance.
-
Add a Connection:
- Navigate to Connections in the top menu.
- Click Add Connection.
- Name:
Secondary Site. - Endpoint URL: The URL of your Target Instance's API (e.g.,
http://target-server:5002). - Access Key: The key you generated on the Target.
- Secret Key: The secret you generated on the Target.
- Click Add Connection.
-
Enable Replication (Admin):
- Navigate to Buckets and select the source bucket.
- Switch to the Replication tab.
- Select the
Secondary Siteconnection. - Enter the target bucket name (
backup-bucket). - Click Enable Replication.
Once configured, users with
replicationpermission on this bucket can pause/resume replication without needing access to connection details.
Verification
- Upload a file to the source bucket.
- Check the target bucket (via UI, CLI, or API). The file should appear shortly.
# Verify on target using AWS CLI
aws --endpoint-url http://target-server:5002 s3 ls s3://backup-bucket
Pausing and Resuming Replication
Users with the replication permission (but not admin rights) can pause and resume existing replication rules:
- Navigate to the bucket's Replication tab.
- If replication is Active, click Pause Replication to temporarily stop syncing.
- If replication is Paused, click Resume Replication to continue syncing.
When paused, new objects uploaded to the source will not replicate until replication is resumed. Objects uploaded while paused will be replicated once resumed.
Note: Only admins can create new replication rules, change the target connection/bucket, or delete rules entirely.
Bidirectional Site Replication
For true two-way synchronization with automatic conflict resolution, use the bidirectional replication mode. This enables a background sync worker that periodically pulls changes from the remote site.
Important: Both sites must be configured to sync with each other. Each site pushes its changes and pulls from the other. You must set up connections and replication rules on both ends.
Step 1: Enable Site Sync on Both Sites
Set these environment variables on both Site A and Site B:
SITE_SYNC_ENABLED=true
SITE_SYNC_INTERVAL_SECONDS=60 # How often to pull changes (default: 60)
SITE_SYNC_BATCH_SIZE=100 # Max objects per sync cycle (default: 100)
Step 2: Create IAM Users for Cross-Site Access
On each site, create an IAM user that the other site will use to connect:
| Site | Create User For | Required Permissions |
|---|---|---|
| Site A | Site B to connect | read, write, list, delete on target bucket |
| Site B | Site A to connect | read, write, list, delete on target bucket |
Example policy for the replication user:
[{"bucket": "my-bucket", "actions": ["read", "write", "list", "delete"]}]
Step 3: Create Connections
On each site, add a connection pointing to the other:
On Site A:
- Go to Connections and add a connection to Site B
- Endpoint:
https://site-b.example.com - Credentials: Site B's IAM user (created in Step 2)
On Site B:
- Go to Connections and add a connection to Site A
- Endpoint:
https://site-a.example.com - Credentials: Site A's IAM user (created in Step 2)
Step 4: Enable Bidirectional Replication
On each site, go to the bucket's Replication tab and enable with mode bidirectional:
On Site A:
- Source bucket:
my-bucket - Target connection: Site B connection
- Target bucket:
my-bucket - Mode: Bidirectional sync
On Site B:
- Source bucket:
my-bucket - Target connection: Site A connection
- Target bucket:
my-bucket - Mode: Bidirectional sync
How It Works
- PUSH: Local changes replicate to remote immediately on write/delete
- PULL: Background worker fetches remote changes every
SITE_SYNC_INTERVAL_SECONDS - Loop Prevention:
S3ReplicationAgentandSiteSyncAgentUser-Agents prevent infinite sync loops
Conflict Resolution (Last-Write-Wins)
When the same object exists on both sites, the system uses Last-Write-Wins (LWW) based on last_modified timestamps:
- Remote newer: Pull the remote version
- Local newer: Keep the local version
- Same timestamp: Use ETag as tiebreaker (higher ETag wins)
A 1-second clock skew tolerance prevents false conflicts from minor time differences.
Deletion Synchronization
When sync_deletions=true (default), remote deletions propagate locally only if:
- The object was previously synced FROM remote (tracked in sync state)
- The local version hasn't been modified since last sync
This prevents accidental deletion of local-only objects.
Sync State Storage
Sync state is stored at: data/.myfsio.sys/buckets/<bucket>/site_sync_state.json
{
"synced_objects": {
"path/to/file.txt": {
"last_synced_at": 1706100000.0,
"remote_etag": "abc123",
"source": "remote"
}
},
"last_full_sync": 1706100000.0
}
Legacy Bidirectional Setup (Manual)
For simpler use cases without the site sync worker, you can manually configure two one-way rules:
- Follow the steps above to replicate A → B.
- Repeat the process on Server B to replicate B → A:
- Create a connection on Server B pointing to Server A.
- Enable replication on the target bucket on Server B.
Loop Prevention: The system automatically detects replication traffic using custom User-Agents (S3ReplicationAgent and SiteSyncAgent). This prevents infinite loops where an object replicated from A to B is immediately replicated back to A.
Deletes: Deleting an object on one server will propagate the deletion to the other server.
Note: Deleting a bucket will automatically remove its associated replication configuration.
12. Running Tests
pytest -q
The suite now includes a boto3 integration test that spins up a live HTTP server and drives the API through the official AWS SDK. If you want to skip it (for faster unit-only loops), run pytest -m "not integration".
The suite covers bucket CRUD, presigned downloads, bucket policy enforcement, and regression tests for anonymous reads when a Public policy is attached.
13. Troubleshooting
| Symptom | Likely Cause | Fix |
|---|---|---|
| 403 from API despite Public preset | Policy didn’t save or bucket key path mismatch | Reapply Public preset, confirm bucket name in Resource matches arn:aws:s3:::bucket/*. |
| UI still shows old policy text | Browser cached view before hot reload | Refresh; JSON is already reloaded on server. |
| Presign modal errors with 403 | IAM user lacks read/write/delete for target bucket or bucket policy denies |
Update IAM inline policies or remove conflicting deny statements. |
| Large upload rejected immediately | File exceeds MAX_UPLOAD_SIZE |
Increase env var or shrink object. |
14. API Matrix
# Service Endpoints
GET /myfsio/health # Health check
# Bucket Operations
GET / # List buckets
PUT /<bucket> # Create bucket
DELETE /<bucket> # Remove bucket
GET /<bucket> # List objects (supports ?list-type=2)
HEAD /<bucket> # Check bucket exists
POST /<bucket> # POST object upload (HTML form)
POST /<bucket>?delete # Bulk delete objects
# Bucket Configuration
GET /<bucket>?policy # Fetch bucket policy
PUT /<bucket>?policy # Upsert bucket policy
DELETE /<bucket>?policy # Delete bucket policy
GET /<bucket>?quota # Get bucket quota
PUT /<bucket>?quota # Set bucket quota (admin only)
GET /<bucket>?versioning # Get versioning status
PUT /<bucket>?versioning # Enable/disable versioning
GET /<bucket>?lifecycle # Get lifecycle rules
PUT /<bucket>?lifecycle # Set lifecycle rules
DELETE /<bucket>?lifecycle # Delete lifecycle rules
GET /<bucket>?cors # Get CORS configuration
PUT /<bucket>?cors # Set CORS configuration
DELETE /<bucket>?cors # Delete CORS configuration
GET /<bucket>?encryption # Get encryption configuration
PUT /<bucket>?encryption # Set default encryption
DELETE /<bucket>?encryption # Delete encryption configuration
GET /<bucket>?acl # Get bucket ACL
PUT /<bucket>?acl # Set bucket ACL
GET /<bucket>?tagging # Get bucket tags
PUT /<bucket>?tagging # Set bucket tags
DELETE /<bucket>?tagging # Delete bucket tags
GET /<bucket>?replication # Get replication configuration
PUT /<bucket>?replication # Set replication rules
DELETE /<bucket>?replication # Delete replication configuration
GET /<bucket>?logging # Get access logging configuration
PUT /<bucket>?logging # Set access logging
GET /<bucket>?notification # Get event notifications
PUT /<bucket>?notification # Set event notifications (webhooks)
GET /<bucket>?object-lock # Get object lock configuration
PUT /<bucket>?object-lock # Set object lock configuration
GET /<bucket>?website # Get website configuration
PUT /<bucket>?website # Set website configuration
DELETE /<bucket>?website # Delete website configuration
GET /<bucket>?uploads # List active multipart uploads
GET /<bucket>?versions # List object versions
GET /<bucket>?location # Get bucket location/region
# Object Operations
PUT /<bucket>/<key> # Upload object
GET /<bucket>/<key> # Download object (supports Range header)
DELETE /<bucket>/<key> # Delete object
HEAD /<bucket>/<key> # Get object metadata
POST /<bucket>/<key> # POST upload with policy
POST /<bucket>/<key>?select # SelectObjectContent (SQL query)
# Object Configuration
GET /<bucket>/<key>?tagging # Get object tags
PUT /<bucket>/<key>?tagging # Set object tags
DELETE /<bucket>/<key>?tagging # Delete object tags
GET /<bucket>/<key>?acl # Get object ACL
PUT /<bucket>/<key>?acl # Set object ACL
PUT /<bucket>/<key>?retention # Set object retention
GET /<bucket>/<key>?retention # Get object retention
PUT /<bucket>/<key>?legal-hold # Set legal hold
GET /<bucket>/<key>?legal-hold # Get legal hold status
# Multipart Upload
POST /<bucket>/<key>?uploads # Initiate multipart upload
PUT /<bucket>/<key>?uploadId=X&partNumber=N # Upload part
PUT /<bucket>/<key>?uploadId=X&partNumber=N (with x-amz-copy-source) # UploadPartCopy
POST /<bucket>/<key>?uploadId=X # Complete multipart upload
DELETE /<bucket>/<key>?uploadId=X # Abort multipart upload
GET /<bucket>/<key>?uploadId=X # List parts
# Copy Operations
PUT /<bucket>/<key> (with x-amz-copy-source header) # CopyObject
# Admin API
GET /admin/site # Get local site info
PUT /admin/site # Update local site
GET /admin/sites # List peer sites
POST /admin/sites # Register peer site
GET /admin/sites/<site_id> # Get peer site
PUT /admin/sites/<site_id> # Update peer site
DELETE /admin/sites/<site_id> # Unregister peer site
GET /admin/sites/<site_id>/health # Check peer health
GET /admin/topology # Get cluster topology
GET /admin/website-domains # List domain mappings
POST /admin/website-domains # Create domain mapping
GET /admin/website-domains/<domain> # Get domain mapping
PUT /admin/website-domains/<domain> # Update domain mapping
DELETE /admin/website-domains/<domain> # Delete domain mapping
# KMS API
GET /kms/keys # List KMS keys
POST /kms/keys # Create KMS key
GET /kms/keys/<key_id> # Get key details
DELETE /kms/keys/<key_id> # Schedule key deletion
POST /kms/keys/<key_id>/enable # Enable key
POST /kms/keys/<key_id>/disable # Disable key
POST /kms/keys/<key_id>/rotate # Rotate key material
POST /kms/encrypt # Encrypt data
POST /kms/decrypt # Decrypt data
POST /kms/generate-data-key # Generate data key
POST /kms/generate-random # Generate random bytes
15. Health Check Endpoint
The API exposes a simple health check endpoint for monitoring and load balancer integration:
# Check API health
curl http://localhost:5000/myfsio/health
# Response
{"status": "ok", "version": "0.1.7"}
The response includes:
status: Always"ok"when the server is runningversion: Current application version fromapp/version.py
Use this endpoint for:
- Load balancer health checks
- Kubernetes liveness/readiness probes
- Monitoring system integration (Prometheus, Datadog, etc.)
16. Object Lock & Retention
Object Lock prevents objects from being deleted or overwritten for a specified retention period. MyFSIO supports both GOVERNANCE and COMPLIANCE modes.
Retention Modes
| Mode | Description |
|---|---|
| GOVERNANCE | Objects can't be deleted by normal users, but users with s3:BypassGovernanceRetention permission can override |
| COMPLIANCE | Objects can't be deleted or overwritten by anyone, including root, until the retention period expires |
Enabling Object Lock
Object Lock must be enabled when creating a bucket:
# Create bucket with Object Lock enabled
curl -X PUT "http://localhost:5000/my-bucket" \
-H "X-Access-Key: ..." -H "X-Secret-Key: ..." \
-H "x-amz-bucket-object-lock-enabled: true"
# Set default retention configuration
curl -X PUT "http://localhost:5000/my-bucket?object-lock" \
-H "Content-Type: application/json" \
-H "X-Access-Key: ..." -H "X-Secret-Key: ..." \
-d '{
"ObjectLockEnabled": "Enabled",
"Rule": {
"DefaultRetention": {
"Mode": "GOVERNANCE",
"Days": 30
}
}
}'
Per-Object Retention
Set retention on individual objects:
# Set object retention
curl -X PUT "http://localhost:5000/my-bucket/important.pdf?retention" \
-H "Content-Type: application/json" \
-H "X-Access-Key: ..." -H "X-Secret-Key: ..." \
-d '{
"Mode": "COMPLIANCE",
"RetainUntilDate": "2025-12-31T23:59:59Z"
}'
# Get object retention
curl "http://localhost:5000/my-bucket/important.pdf?retention" \
-H "X-Access-Key: ..." -H "X-Secret-Key: ..."
Legal Hold
Legal hold provides indefinite protection independent of retention settings:
# Enable legal hold
curl -X PUT "http://localhost:5000/my-bucket/document.pdf?legal-hold" \
-H "Content-Type: application/json" \
-H "X-Access-Key: ..." -H "X-Secret-Key: ..." \
-d '{"Status": "ON"}'
# Disable legal hold
curl -X PUT "http://localhost:5000/my-bucket/document.pdf?legal-hold" \
-H "Content-Type: application/json" \
-H "X-Access-Key: ..." -H "X-Secret-Key: ..." \
-d '{"Status": "OFF"}'
# Check legal hold status
curl "http://localhost:5000/my-bucket/document.pdf?legal-hold" \
-H "X-Access-Key: ..." -H "X-Secret-Key: ..."
17. Access Logging
Enable S3-style access logging to track all requests to your buckets.
Configuration
# Enable access logging
curl -X PUT "http://localhost:5000/my-bucket?logging" \
-H "Content-Type: application/json" \
-H "X-Access-Key: ..." -H "X-Secret-Key: ..." \
-d '{
"LoggingEnabled": {
"TargetBucket": "log-bucket",
"TargetPrefix": "logs/my-bucket/"
}
}'
# Get logging configuration
curl "http://localhost:5000/my-bucket?logging" \
-H "X-Access-Key: ..." -H "X-Secret-Key: ..."
# Disable logging (empty configuration)
curl -X PUT "http://localhost:5000/my-bucket?logging" \
-H "Content-Type: application/json" \
-H "X-Access-Key: ..." -H "X-Secret-Key: ..." \
-d '{}'
Log Format
Access logs are written in S3-compatible format with fields including:
- Timestamp, bucket, key
- Operation (REST.GET.OBJECT, REST.PUT.OBJECT, etc.)
- Request ID, requester, source IP
- HTTP status, error code, bytes sent
- Total time, turn-around time
- Referrer, User-Agent
18. Bucket Notifications & Webhooks
Configure event notifications to trigger webhooks when objects are created or deleted.
Supported Events
| Event Type | Description |
|---|---|
s3:ObjectCreated:* |
Any object creation (PUT, POST, COPY, multipart) |
s3:ObjectCreated:Put |
Object created via PUT |
s3:ObjectCreated:Post |
Object created via POST |
s3:ObjectCreated:Copy |
Object created via COPY |
s3:ObjectCreated:CompleteMultipartUpload |
Multipart upload completed |
s3:ObjectRemoved:* |
Any object deletion |
s3:ObjectRemoved:Delete |
Object deleted |
s3:ObjectRemoved:DeleteMarkerCreated |
Delete marker created (versioned bucket) |
Configuration
# Set notification configuration
curl -X PUT "http://localhost:5000/my-bucket?notification" \
-H "Content-Type: application/json" \
-H "X-Access-Key: ..." -H "X-Secret-Key: ..." \
-d '{
"TopicConfigurations": [
{
"Id": "upload-notify",
"TopicArn": "https://webhook.example.com/s3-events",
"Events": ["s3:ObjectCreated:*"],
"Filter": {
"Key": {
"FilterRules": [
{"Name": "prefix", "Value": "uploads/"},
{"Name": "suffix", "Value": ".jpg"}
]
}
}
}
]
}'
# Get notification configuration
curl "http://localhost:5000/my-bucket?notification" \
-H "X-Access-Key: ..." -H "X-Secret-Key: ..."
Webhook Payload
The webhook receives a JSON payload similar to AWS S3 event notifications:
{
"Records": [
{
"eventVersion": "2.1",
"eventSource": "myfsio:s3",
"eventTime": "2024-01-15T10:30:00.000Z",
"eventName": "ObjectCreated:Put",
"s3": {
"bucket": {"name": "my-bucket"},
"object": {
"key": "uploads/photo.jpg",
"size": 102400,
"eTag": "abc123..."
}
}
}
]
}
Security Notes
- Webhook URLs are validated to prevent SSRF attacks
- Internal/private IP ranges are blocked by default
- Use HTTPS endpoints in production
19. SelectObjectContent (SQL Queries)
Query CSV, JSON, or Parquet files directly using SQL without downloading the entire object. Requires DuckDB to be installed.
Prerequisites
pip install duckdb
Usage
# Query a CSV file
curl -X POST "http://localhost:5000/my-bucket/data.csv?select" \
-H "Content-Type: application/json" \
-H "X-Access-Key: ..." -H "X-Secret-Key: ..." \
-d '{
"Expression": "SELECT name, age FROM s3object WHERE age > 25",
"ExpressionType": "SQL",
"InputSerialization": {
"CSV": {
"FileHeaderInfo": "USE",
"FieldDelimiter": ","
}
},
"OutputSerialization": {
"JSON": {}
}
}'
# Query a JSON file
curl -X POST "http://localhost:5000/my-bucket/data.json?select" \
-H "Content-Type: application/json" \
-H "X-Access-Key: ..." -H "X-Secret-Key: ..." \
-d '{
"Expression": "SELECT * FROM s3object s WHERE s.status = '\"active'\"",
"ExpressionType": "SQL",
"InputSerialization": {"JSON": {"Type": "LINES"}},
"OutputSerialization": {"JSON": {}}
}'
Supported Input Formats
| Format | Options |
|---|---|
| CSV | FileHeaderInfo (USE, IGNORE, NONE), FieldDelimiter, QuoteCharacter, RecordDelimiter |
| JSON | Type (DOCUMENT, LINES) |
| Parquet | Automatic schema detection |
Output Formats
- JSON: Returns results as JSON records
- CSV: Returns results as CSV
20. PostObject (HTML Form Upload)
Upload objects using HTML forms with policy-based authorization. Useful for browser-based direct uploads.
Form Fields
| Field | Required | Description |
|---|---|---|
key |
Yes | Object key (can include ${filename} placeholder) |
file |
Yes | The file to upload |
policy |
No | Base64-encoded policy document |
x-amz-signature |
No | Policy signature |
x-amz-credential |
No | Credential scope |
x-amz-algorithm |
No | Signing algorithm (AWS4-HMAC-SHA256) |
x-amz-date |
No | Request timestamp |
Content-Type |
No | MIME type of the file |
x-amz-meta-* |
No | Custom metadata |
Example HTML Form
<form action="http://localhost:5000/my-bucket" method="post" enctype="multipart/form-data">
<input type="hidden" name="key" value="uploads/${filename}">
<input type="hidden" name="Content-Type" value="image/jpeg">
<input type="hidden" name="x-amz-meta-user" value="john">
<input type="file" name="file">
<button type="submit">Upload</button>
</form>
With Policy (Signed Upload)
For authenticated uploads, include a policy document:
# Generate policy and signature using boto3 or similar
# Then include in form:
# - policy: base64(policy_document)
# - x-amz-signature: HMAC-SHA256(policy, signing_key)
# - x-amz-credential: access_key/date/region/s3/aws4_request
# - x-amz-algorithm: AWS4-HMAC-SHA256
# - x-amz-date: YYYYMMDDTHHMMSSZ
21. Advanced S3 Operations
CopyObject
Copy objects within or between buckets:
# Copy within same bucket
curl -X PUT "http://localhost:5000/my-bucket/copy-of-file.txt" \
-H "X-Access-Key: ..." -H "X-Secret-Key: ..." \
-H "x-amz-copy-source: /my-bucket/original-file.txt"
# Copy to different bucket
curl -X PUT "http://localhost:5000/other-bucket/file.txt" \
-H "X-Access-Key: ..." -H "X-Secret-Key: ..." \
-H "x-amz-copy-source: /my-bucket/original-file.txt"
# Copy with metadata replacement
curl -X PUT "http://localhost:5000/my-bucket/file.txt" \
-H "X-Access-Key: ..." -H "X-Secret-Key: ..." \
-H "x-amz-copy-source: /my-bucket/file.txt" \
-H "x-amz-metadata-directive: REPLACE" \
-H "x-amz-meta-newkey: newvalue"
MoveObject (UI)
Move an object to a different key or bucket. This is a UI-only convenience operation that performs a copy followed by a delete of the source. Requires read and delete on the source, and write on the destination.
# Move via UI API
curl -X POST "http://localhost:5100/ui/buckets/my-bucket/objects/old-path/file.txt/move" \
-H "Content-Type: application/json" \
--cookie "session=..." \
-d '{"dest_bucket": "other-bucket", "dest_key": "new-path/file.txt"}'
The move is atomic from the caller's perspective: if the copy succeeds but the delete fails, the object exists in both locations (no data loss).
UploadPartCopy
Copy data from an existing object into a multipart upload part:
# Initiate multipart upload
UPLOAD_ID=$(curl -X POST "http://localhost:5000/my-bucket/large-file.bin?uploads" \
-H "X-Access-Key: ..." -H "X-Secret-Key: ..." | jq -r '.UploadId')
# Copy bytes 0-10485759 from source as part 1
curl -X PUT "http://localhost:5000/my-bucket/large-file.bin?uploadId=$UPLOAD_ID&partNumber=1" \
-H "X-Access-Key: ..." -H "X-Secret-Key: ..." \
-H "x-amz-copy-source: /source-bucket/source-file.bin" \
-H "x-amz-copy-source-range: bytes=0-10485759"
# Copy bytes 10485760-20971519 as part 2
curl -X PUT "http://localhost:5000/my-bucket/large-file.bin?uploadId=$UPLOAD_ID&partNumber=2" \
-H "X-Access-Key: ..." -H "X-Secret-Key: ..." \
-H "x-amz-copy-source: /source-bucket/source-file.bin" \
-H "x-amz-copy-source-range: bytes=10485760-20971519"
Range Requests
Download partial content using the Range header:
# Get first 1000 bytes
curl "http://localhost:5000/my-bucket/large-file.bin" \
-H "X-Access-Key: ..." -H "X-Secret-Key: ..." \
-H "Range: bytes=0-999"
# Get bytes 1000-1999
curl "http://localhost:5000/my-bucket/large-file.bin" \
-H "X-Access-Key: ..." -H "X-Secret-Key: ..." \
-H "Range: bytes=1000-1999"
# Get last 500 bytes
curl "http://localhost:5000/my-bucket/large-file.bin" \
-H "X-Access-Key: ..." -H "X-Secret-Key: ..." \
-H "Range: bytes=-500"
# Get from byte 5000 to end
curl "http://localhost:5000/my-bucket/large-file.bin" \
-H "X-Access-Key: ..." -H "X-Secret-Key: ..." \
-H "Range: bytes=5000-"
Range responses include:
- HTTP 206 Partial Content status
Content-Rangeheader showing the byte rangeAccept-Ranges: bytesheader
Conditional Requests
Use conditional headers for cache validation:
# Only download if modified since
curl "http://localhost:5000/my-bucket/file.txt" \
-H "X-Access-Key: ..." -H "X-Secret-Key: ..." \
-H "If-Modified-Since: Wed, 15 Jan 2025 10:00:00 GMT"
# Only download if ETag doesn't match (changed)
curl "http://localhost:5000/my-bucket/file.txt" \
-H "X-Access-Key: ..." -H "X-Secret-Key: ..." \
-H "If-None-Match: \"abc123...\""
# Only download if ETag matches
curl "http://localhost:5000/my-bucket/file.txt" \
-H "X-Access-Key: ..." -H "X-Secret-Key: ..." \
-H "If-Match: \"abc123...\""
22. Access Control Lists (ACLs)
ACLs provide legacy-style permission management for buckets and objects.
Canned ACLs
| ACL | Description |
|---|---|
private |
Owner gets FULL_CONTROL (default) |
public-read |
Owner FULL_CONTROL, public READ |
public-read-write |
Owner FULL_CONTROL, public READ and WRITE |
authenticated-read |
Owner FULL_CONTROL, authenticated users READ |
Setting ACLs
# Set bucket ACL using canned ACL
curl -X PUT "http://localhost:5000/my-bucket?acl" \
-H "X-Access-Key: ..." -H "X-Secret-Key: ..." \
-H "x-amz-acl: public-read"
# Set object ACL
curl -X PUT "http://localhost:5000/my-bucket/file.txt?acl" \
-H "X-Access-Key: ..." -H "X-Secret-Key: ..." \
-H "x-amz-acl: private"
# Set ACL during upload
curl -X PUT "http://localhost:5000/my-bucket/file.txt" \
-H "X-Access-Key: ..." -H "X-Secret-Key: ..." \
-H "x-amz-acl: public-read" \
--data-binary @file.txt
# Get bucket ACL
curl "http://localhost:5000/my-bucket?acl" \
-H "X-Access-Key: ..." -H "X-Secret-Key: ..."
# Get object ACL
curl "http://localhost:5000/my-bucket/file.txt?acl" \
-H "X-Access-Key: ..." -H "X-Secret-Key: ..."
ACL vs Bucket Policies
- ACLs: Simple, limited options, legacy approach
- Bucket Policies: Powerful, flexible, recommended for new deployments
For most use cases, prefer bucket policies over ACLs.
23. Object & Bucket Tagging
Add metadata tags to buckets and objects for organization, cost allocation, or lifecycle rule filtering.
Bucket Tagging
# Set bucket tags
curl -X PUT "http://localhost:5000/my-bucket?tagging" \
-H "Content-Type: application/json" \
-H "X-Access-Key: ..." -H "X-Secret-Key: ..." \
-d '{
"TagSet": [
{"Key": "Environment", "Value": "Production"},
{"Key": "Team", "Value": "Engineering"}
]
}'
# Get bucket tags
curl "http://localhost:5000/my-bucket?tagging" \
-H "X-Access-Key: ..." -H "X-Secret-Key: ..."
# Delete bucket tags
curl -X DELETE "http://localhost:5000/my-bucket?tagging" \
-H "X-Access-Key: ..." -H "X-Secret-Key: ..."
Object Tagging
# Set object tags
curl -X PUT "http://localhost:5000/my-bucket/file.txt?tagging" \
-H "Content-Type: application/json" \
-H "X-Access-Key: ..." -H "X-Secret-Key: ..." \
-d '{
"TagSet": [
{"Key": "Classification", "Value": "Confidential"},
{"Key": "Owner", "Value": "john@example.com"}
]
}'
# Get object tags
curl "http://localhost:5000/my-bucket/file.txt?tagging" \
-H "X-Access-Key: ..." -H "X-Secret-Key: ..."
# Delete object tags
curl -X DELETE "http://localhost:5000/my-bucket/file.txt?tagging" \
-H "X-Access-Key: ..." -H "X-Secret-Key: ..."
# Set tags during upload
curl -X PUT "http://localhost:5000/my-bucket/file.txt" \
-H "X-Access-Key: ..." -H "X-Secret-Key: ..." \
-H "x-amz-tagging: Environment=Staging&Team=QA" \
--data-binary @file.txt
Tagging Limits
- Maximum 50 tags per object (configurable via
OBJECT_TAG_LIMIT) - Tag key: 1-128 Unicode characters
- Tag value: 0-256 Unicode characters
Use Cases
- Lifecycle Rules: Filter objects for expiration by tag
- Access Control: Use tag conditions in bucket policies
- Cost Tracking: Group objects by project or department
- Automation: Trigger actions based on object tags
24. CORS Configuration
Configure Cross-Origin Resource Sharing for browser-based applications.
Setting CORS Rules
# Set CORS configuration
curl -X PUT "http://localhost:5000/my-bucket?cors" \
-H "Content-Type: application/json" \
-H "X-Access-Key: ..." -H "X-Secret-Key: ..." \
-d '{
"CORSRules": [
{
"AllowedOrigins": ["https://example.com", "https://app.example.com"],
"AllowedMethods": ["GET", "PUT", "POST", "DELETE"],
"AllowedHeaders": ["*"],
"ExposeHeaders": ["ETag", "x-amz-meta-*"],
"MaxAgeSeconds": 3600
}
]
}'
# Get CORS configuration
curl "http://localhost:5000/my-bucket?cors" \
-H "X-Access-Key: ..." -H "X-Secret-Key: ..."
# Delete CORS configuration
curl -X DELETE "http://localhost:5000/my-bucket?cors" \
-H "X-Access-Key: ..." -H "X-Secret-Key: ..."
CORS Rule Fields
| Field | Description |
|---|---|
AllowedOrigins |
Origins allowed to access the bucket (required) |
AllowedMethods |
HTTP methods allowed (GET, PUT, POST, DELETE, HEAD) |
AllowedHeaders |
Request headers allowed in preflight |
ExposeHeaders |
Response headers visible to browser |
MaxAgeSeconds |
How long browser can cache preflight response |
25. List Objects API v2
MyFSIO supports both ListBucketResult v1 and v2 APIs.
Using v2 API
# List with v2 (supports continuation tokens)
curl "http://localhost:5000/my-bucket?list-type=2" \
-H "X-Access-Key: ..." -H "X-Secret-Key: ..."
# With prefix and delimiter (folder-like listing)
curl "http://localhost:5000/my-bucket?list-type=2&prefix=photos/&delimiter=/" \
-H "X-Access-Key: ..." -H "X-Secret-Key: ..."
# Pagination with continuation token
curl "http://localhost:5000/my-bucket?list-type=2&max-keys=100&continuation-token=TOKEN" \
-H "X-Access-Key: ..." -H "X-Secret-Key: ..."
# Start after specific key
curl "http://localhost:5000/my-bucket?list-type=2&start-after=photos/2024/" \
-H "X-Access-Key: ..." -H "X-Secret-Key: ..."
v1 vs v2 Differences
| Feature | v1 | v2 |
|---|---|---|
| Pagination | marker |
continuation-token |
| Start position | marker |
start-after |
| Fetch owner info | Always included | Use fetch-owner=true |
| Max keys | 1000 | 1000 |
Query Parameters
| Parameter | Description |
|---|---|
list-type |
Set to 2 for v2 API |
prefix |
Filter objects by key prefix |
delimiter |
Group objects (typically /) |
max-keys |
Maximum results (1-1000, default 1000) |
continuation-token |
Token from previous response |
start-after |
Start listing after this key |
fetch-owner |
Include owner info in response |
encoding-type |
Set to url for URL-encoded keys |
26. Static Website Hosting
MyFSIO can serve S3 buckets as static websites via custom domain mappings. When a request arrives with a Host header matching a mapped domain, MyFSIO resolves the bucket and serves objects directly.
Enabling
Set the environment variable:
WEBSITE_HOSTING_ENABLED=true
When disabled, all website hosting endpoints return 400 and domain-based serving is skipped.
Configuration
| Variable | Default | Description |
|---|---|---|
WEBSITE_HOSTING_ENABLED |
false |
Master switch for website hosting |
Setting Up a Website
Step 1: Configure the bucket website settings
curl -X PUT "http://localhost:5000/my-site?website" \
-H "Authorization: ..." \
-d '<?xml version="1.0" encoding="UTF-8"?>
<WebsiteConfiguration>
<IndexDocument><Suffix>index.html</Suffix></IndexDocument>
<ErrorDocument><Key>404.html</Key></ErrorDocument>
</WebsiteConfiguration>'
IndexDocumentwithSuffixis required (must not contain/)ErrorDocumentis optional
Step 2: Map a domain to the bucket
curl -X POST "http://localhost:5000/admin/website-domains" \
-H "Authorization: ..." \
-H "Content-Type: application/json" \
-d '{"domain": "example.com", "bucket": "my-site"}'
Step 3: Point your domain to MyFSIO
For HTTP-only (direct access), point DNS to the MyFSIO host on port 5000.
For HTTPS (recommended), use a reverse proxy. The critical requirement is passing the original Host header so MyFSIO can match the domain to a bucket.
nginx example:
server {
server_name example.com;
listen 443 ssl;
ssl_certificate /etc/ssl/certs/example.com.pem;
ssl_certificate_key /etc/ssl/private/example.com.key;
location / {
proxy_pass http://127.0.0.1:5000;
proxy_set_header Host $host;
proxy_set_header X-Real-IP $remote_addr;
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
proxy_set_header X-Forwarded-Proto $scheme;
}
}
proxy_set_header Host $host; is required — without it, MyFSIO cannot match the incoming domain to a bucket. You do not need any path-based routing rules; MyFSIO handles all object resolution internally.
How Domain Routing Works
- A request arrives with
Host: example.com - MyFSIO's
before_requesthook strips the port and looks up the domain in theWebsiteDomainStore - If a match is found, it loads the bucket's website config (index/error documents)
- Object key resolution:
/or trailing/→ appendindex_document(e.g.,index.html)/path→ try exact match, then trypath/index_document- Not found → serve
error_documentwith 404 status
- If no domain match is found, the request falls through to normal S3 API / UI routing
Domain Mapping Admin API
All endpoints require admin (iam:*) permissions.
| Method | Route | Body | Description |
|---|---|---|---|
GET |
/admin/website-domains |
— | List all mappings |
POST |
/admin/website-domains |
{"domain": "...", "bucket": "..."} |
Create mapping |
GET |
/admin/website-domains/<domain> |
— | Get single mapping |
PUT |
/admin/website-domains/<domain> |
{"bucket": "..."} |
Update mapping |
DELETE |
/admin/website-domains/<domain> |
— | Delete mapping |
Bucket Website API
| Method | Route | Description |
|---|---|---|
PUT |
/<bucket>?website |
Set website config (XML body) |
GET |
/<bucket>?website |
Get website config (XML response) |
DELETE |
/<bucket>?website |
Remove website config |
Web UI
- Per-bucket config: Bucket Details → Properties tab → "Static Website Hosting" card
- Domain management: Sidebar → "Domains" (visible when hosting is enabled and user is admin)