This is an automated email from the ASF dual-hosted git repository.

xuanwo pushed a commit to branch clean-up-capability
in repository https://gitbox.apache.org/repos/asf/opendal.git

commit 9c9e68bd68e24e4672efe0e154dd0f058b2fa7f9
Author: Xuanwo <[email protected]>
AuthorDate: Mon Oct 20 00:58:41 2025 +0800

    feat: Add Capability Override Layer
    
    Signed-off-by: Xuanwo <[email protected]>
---
 .../docs/rfcs/7010_capability_override_layer.md    | 127 +++++++++++++++++++++
 core/src/docs/rfcs/mod.rs                          |   4 +
 2 files changed, 131 insertions(+)

diff --git a/core/src/docs/rfcs/7010_capability_override_layer.md 
b/core/src/docs/rfcs/7010_capability_override_layer.md
new file mode 100644
index 000000000..f7379c327
--- /dev/null
+++ b/core/src/docs/rfcs/7010_capability_override_layer.md
@@ -0,0 +1,127 @@
+- Proposal Name: capability_override_layer
+- Start Date: 2025-10-19
+- RFC PR: [apache/opendal#0000](https://github.com/apache/opendal/pull/0000)
+- Tracking Issue: 
[apache/opendal#0000](https://github.com/apache/opendal/issues/0000)
+
+# Summary
+
+Introduce a tiny `CapabilityOverrideLayer` that lets integrators adjust an 
accessor's *full* capability by supplying a closure that mutates the existing 
[`Capability`](../../types/capability.rs) instance. The layer supplements the 
default pipeline and replaces the service-specific configuration toggles such 
as `delete_max_size`, `disable_stat_with_override`, or `write_with_if_match`. 
We will deprecate those fields and direct users (and our own behavior harness) 
to the new layer instead.
+
+# Motivation
+
+Today we scatter capability tweaks across several service configs. S3 alone 
exposes `delete_max_size`, `disable_stat_with_override`, and 
`disable_write_with_if_match` on `S3Config` (see 
`core/src/services/s3/config.rs:184-208`). OSS and Azblob mirror the same knobs 
in their configs (`core/src/services/oss/config.rs:76-78`, 
`core/src/services/azblob/config.rs:78`). These options exist only to downgrade 
capabilities when a compatible service lacks full S3 semantics. They dilute the 
purpose [...]
+
+Our behavior tests already bypass those configs and mutate the capability 
directly via `info().update_full_capability(...)` to emulate lower limits 
(`core/tests/behavior/async_delete.rs:288-329`). That ad-hoc pattern hints that 
the real need is an explicit hook to patch capabilities after construction, not 
extra config fields.
+
+We want a single, explicit, and reusable spot for such adjustments that stays 
outside service implementations and keeps native capabilities untouched.
+
+# Guide-level explanation
+
+With this RFC, builders stay focused on connection details while users layer 
capability overrides explicitly:
+
+```rust
+use opendal::layers::CapabilityOverrideLayer;
+use opendal::services::S3;
+
+let op = Operator::new(S3::default().bucket("demo"))?
+    .layer(CapabilityOverrideLayer::new(|mut cap| {
+        // Cloudflare R2 rejects large batch deletes and stat overrides
+        cap.delete_max_size = Some(700);
+        cap.stat_with_override_cache_control = false;
+        cap.stat_with_override_content_disposition = false;
+        cap.stat_with_override_content_type = false;
+        cap.write_with_if_match = false;
+        cap
+    }))
+    .finish();
+```
+
+The closure receives the current `Capability` (already filled by the backend) 
and must return the adjusted value. Only the accessor's *full* capability is 
patched; native capability remains intact so completion layers can still infer 
what the backend supports natively (`core/src/layers/complete.rs:23-62`). 
Downstream layers—`CorrectnessCheckLayer`, retry, delete helpers—observe the 
overridden full capability (`core/src/layers/correctness_check.rs:23-115`), so 
they continue to guard unsup [...]
+
+Behavior tests and diagnostic tools can read environment variables and pass a 
closure to the same layer instead of mutating capability structs manually.
+
+# Reference-level explanation
+
+## Layer structure
+
+The implementation introduces:
+
+```rust
+pub struct CapabilityOverrideLayer {
+    apply: Arc<dyn Fn(Capability) -> Capability + Send + Sync>,
+}
+```
+
+- `CapabilityOverrideLayer::new` accepts any closure that maps the current 
capability to the desired full capability.
+- `Layer::layer` clones the closure, reads `info.full_capability()`, applies 
the function, and writes the result back via `info.update_full_capability`. 
Native capability is untouched.
+- The layer returns the original accessor unwrapped, so it composes with 
existing layers transparently.
+
+## Layer placement
+
+`Operator::new` currently installs `ErrorContextLayer → CompleteLayer → 
CorrectnessCheckLayer`. We insert `CapabilityOverrideLayer` between error 
context and completion:
+
+```
+ErrorContextLayer
+→ CapabilityOverrideLayer
+→ CompleteLayer
+→ CorrectnessCheckLayer
+```
+
+Positioning before `CompleteLayer` let us patch the full capability before 
completion synthesizes derived operations (e.g., auto-creating directories). 
Completion still reads the native capability to decide what to fill in, so we 
do not break its invariants.
+
+## API exposure
+
+- Rust: expose `CapabilityOverrideLayer` within `opendal::layers`.
+- Other language bindings wrap the same primitive with a thin helper that 
accepts a closure-equivalent (e.g., a lambda or struct of booleans) and 
forwards to the Rust layer through FFI.
+- No new `OperatorBuilder` method is required; users call `.layer(...)` 
explicitly.
+
+## Deprecations and migration
+
+The following config fields become deprecated aliases that internally forward 
to `CapabilityOverrideLayer` until they are removed:
+
+- `S3Config::{batch_max_operations, delete_max_size, 
disable_stat_with_override, disable_write_with_if_match}` 
(`core/src/services/s3/config.rs:184-208`)
+- `OssConfig::{batch_max_operations, delete_max_size}` 
(`core/src/services/oss/config.rs:76-78`)
+- `AzblobConfig::batch_max_operations` 
(`core/src/services/azblob/config.rs:78`)
+
+Migration path:
+
+1. Emit a warning when these fields are set, pointing to the new layer-based 
approach.
+2. In a compatibility shim, convert the old configuration into a 
`CapabilityOverrideLayer` injected automatically (only while the fields exist).
+3. Behavior tests stop calling `info().update_full_capability` manually and 
instead always register the layer, keeping env-driven overrides centralised.
+4. Remove the fields in a later release once downstream bindings migrate.
+
+# Drawbacks
+
+- Users must write code (a closure) rather than toggling a config string. For 
trivial overrides this is more verbose, especially in non-Rust bindings.
+- The approach assumes callers are comfortable with the capability semantics; 
there is no compile-time guarantee that they only *downgrade* capabilities.
+
+# Rationale and alternatives
+
+Alternatives considered:
+
+1. **Retain per-service config toggles**. This keeps the status quo but 
perpetuates redundancy and drifts farther from capability-centric design 
(`core/src/docs/rfcs/0409_accessor_capabilities.md`, 
`core/src/docs/rfcs/2852_native_capability.md`).
+2. **Parse override values during config deserialization.** That hides the 
layer but still demands new schema for each field and duplicates logic across 
services.
+3. **Automatic detection at runtime.** Allowing writes to fail before 
downgrading capabilities complicates error handling and caching, and is harder 
to reason about.
+
+The chosen design centralises capability edits, keeps services agnostic, and 
matches the lightweight infrastructure we already use inside tests.
+
+Not acting would leave us with an ever-growing list of service-specific 
toggles and scattered override logic, making future capability changes harder.
+
+# Prior art
+
+- Our own RFCs on capabilities already advocate for a layered approach 
(`core/src/docs/rfcs/0409_accessor_capabilities.md`, 
`core/src/docs/rfcs/2852_native_capability.md`). This proposal follows that 
direction by giving layers first-class control.
+- The behavior test harness demonstrates manual capability mutation 
(`core/tests/behavior/async_delete.rs:288-329`), validating that adjusting 
`full_capability` is viable today; we generalise it into a formal layer.
+
+# Unresolved questions
+
+- How should non-Rust bindings expose the closure-based API ergonomically? Do 
we offer predefined helpers for common toggles?
+- What is the precise deprecation schedule for each config field, and how 
noisy should the warnings be?
+- Do we need guardrails to prevent capability *upgrades* that claim support 
the backend truly lacks?
+
+# Future possibilities
+
+- Provide convenience constructors such as 
`CapabilityOverrideLayer::disable_stat_overrides()` or `::limit_delete(max)` to 
ease usage from other languages.
+- Offer an environment-driven helper (`CapabilityOverrideLayer::from_env`) for 
CLI tools and tests.
+- Build curated profiles for popular S3-compatible services (Cloudflare R2, 
Wasabi, etc.) once the foundational layer lands.
+- Investigate runtime detection or telemetry that suggests required overrides 
to users instead of manual discovery.
+
diff --git a/core/src/docs/rfcs/mod.rs b/core/src/docs/rfcs/mod.rs
index 168a8f9fc..c1573535a 100644
--- a/core/src/docs/rfcs/mod.rs
+++ b/core/src/docs/rfcs/mod.rs
@@ -280,3 +280,7 @@ pub mod rfc_6213_options_api {}
 /// Simulate Layer
 #[doc = include_str!("6678_simulate_layer.md")]
 pub mod rfc_6678_simulate_layer {}
+
+/// Capability Override Layer
+#[doc = include_str!("7010_capability_override_layer.md")]
+pub mod rfc_7010_capability_override_layer {}

Reply via email to