s3_directory_versioning_test.go 30 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861
  1. package s3api
  2. import (
  3. "context"
  4. "fmt"
  5. "sort"
  6. "strings"
  7. "sync"
  8. "testing"
  9. "time"
  10. "github.com/aws/aws-sdk-go-v2/aws"
  11. "github.com/aws/aws-sdk-go-v2/config"
  12. "github.com/aws/aws-sdk-go-v2/credentials"
  13. "github.com/aws/aws-sdk-go-v2/service/s3"
  14. "github.com/aws/aws-sdk-go-v2/service/s3/types"
  15. "github.com/stretchr/testify/assert"
  16. "github.com/stretchr/testify/require"
  17. )
  18. // TestListObjectVersionsIncludesDirectories tests that directories are included in list-object-versions response
  19. // This ensures compatibility with Minio and AWS S3 behavior
  20. func TestListObjectVersionsIncludesDirectories(t *testing.T) {
  21. bucketName := "test-versioning-directories"
  22. client := setupS3Client(t)
  23. // Create bucket
  24. _, err := client.CreateBucket(context.TODO(), &s3.CreateBucketInput{
  25. Bucket: aws.String(bucketName),
  26. })
  27. require.NoError(t, err)
  28. // Clean up
  29. defer func() {
  30. cleanupBucket(t, client, bucketName)
  31. }()
  32. // Enable versioning
  33. _, err = client.PutBucketVersioning(context.TODO(), &s3.PutBucketVersioningInput{
  34. Bucket: aws.String(bucketName),
  35. VersioningConfiguration: &types.VersioningConfiguration{
  36. Status: types.BucketVersioningStatusEnabled,
  37. },
  38. })
  39. require.NoError(t, err)
  40. // First create explicit directory objects (keys ending with "/")
  41. // These are the directories that should appear in list-object-versions
  42. explicitDirectories := []string{
  43. "Veeam/",
  44. "Veeam/Archive/",
  45. "Veeam/Archive/vbr/",
  46. "Veeam/Backup/",
  47. "Veeam/Backup/vbr/",
  48. "Veeam/Backup/vbr/Clients/",
  49. }
  50. // Create explicit directory objects
  51. for _, dirKey := range explicitDirectories {
  52. _, err := client.PutObject(context.TODO(), &s3.PutObjectInput{
  53. Bucket: aws.String(bucketName),
  54. Key: aws.String(dirKey),
  55. Body: strings.NewReader(""), // Empty content for directories
  56. })
  57. require.NoError(t, err, "Failed to create directory object %s", dirKey)
  58. }
  59. // Now create some test files
  60. testFiles := []string{
  61. "Veeam/test-file.txt",
  62. "Veeam/Archive/test-file2.txt",
  63. "Veeam/Archive/vbr/test-file3.txt",
  64. "Veeam/Backup/test-file4.txt",
  65. "Veeam/Backup/vbr/test-file5.txt",
  66. "Veeam/Backup/vbr/Clients/test-file6.txt",
  67. }
  68. // Upload test files
  69. for _, objectKey := range testFiles {
  70. _, err := client.PutObject(context.TODO(), &s3.PutObjectInput{
  71. Bucket: aws.String(bucketName),
  72. Key: aws.String(objectKey),
  73. Body: strings.NewReader("test content"),
  74. })
  75. require.NoError(t, err, "Failed to create file %s", objectKey)
  76. }
  77. // List object versions
  78. listResp, err := client.ListObjectVersions(context.TODO(), &s3.ListObjectVersionsInput{
  79. Bucket: aws.String(bucketName),
  80. })
  81. require.NoError(t, err)
  82. // Extract all keys from versions
  83. var allKeys []string
  84. for _, version := range listResp.Versions {
  85. allKeys = append(allKeys, *version.Key)
  86. }
  87. // Expected directories that should be included (with trailing slash)
  88. expectedDirectories := []string{
  89. "Veeam/",
  90. "Veeam/Archive/",
  91. "Veeam/Archive/vbr/",
  92. "Veeam/Backup/",
  93. "Veeam/Backup/vbr/",
  94. "Veeam/Backup/vbr/Clients/",
  95. }
  96. // Verify that directories are included in the response
  97. t.Logf("Found %d total versions", len(listResp.Versions))
  98. t.Logf("All keys: %v", allKeys)
  99. for _, expectedDir := range expectedDirectories {
  100. found := false
  101. for _, version := range listResp.Versions {
  102. if *version.Key == expectedDir {
  103. found = true
  104. // Verify directory properties
  105. assert.Equal(t, "null", *version.VersionId, "Directory %s should have VersionId 'null'", expectedDir)
  106. assert.Equal(t, int64(0), *version.Size, "Directory %s should have size 0", expectedDir)
  107. assert.True(t, *version.IsLatest, "Directory %s should be marked as latest", expectedDir)
  108. assert.Equal(t, "\"d41d8cd98f00b204e9800998ecf8427e\"", *version.ETag, "Directory %s should have MD5 of empty string as ETag", expectedDir)
  109. assert.Equal(t, types.ObjectStorageClassStandard, version.StorageClass, "Directory %s should have STANDARD storage class", expectedDir)
  110. break
  111. }
  112. }
  113. assert.True(t, found, "Directory %s should be included in list-object-versions response", expectedDir)
  114. }
  115. // Also verify that actual files are included
  116. for _, objectKey := range testFiles {
  117. found := false
  118. for _, version := range listResp.Versions {
  119. if *version.Key == objectKey {
  120. found = true
  121. assert.NotEqual(t, "null", *version.VersionId, "File %s should have a real version ID", objectKey)
  122. assert.Greater(t, *version.Size, int64(0), "File %s should have size > 0", objectKey)
  123. break
  124. }
  125. }
  126. assert.True(t, found, "File %s should be included in list-object-versions response", objectKey)
  127. }
  128. // Count directories vs files
  129. directoryCount := 0
  130. fileCount := 0
  131. for _, version := range listResp.Versions {
  132. if strings.HasSuffix(*version.Key, "/") && *version.Size == 0 && *version.VersionId == "null" {
  133. directoryCount++
  134. } else {
  135. fileCount++
  136. }
  137. }
  138. t.Logf("Found %d directories and %d files", directoryCount, fileCount)
  139. assert.Equal(t, len(expectedDirectories), directoryCount, "Should find exactly %d directories", len(expectedDirectories))
  140. assert.Equal(t, len(testFiles), fileCount, "Should find exactly %d files", len(testFiles))
  141. }
  142. // TestListObjectVersionsDeleteMarkers tests that delete markers are properly separated from versions
  143. // This test verifies the fix for the issue where delete markers were incorrectly categorized as versions
  144. func TestListObjectVersionsDeleteMarkers(t *testing.T) {
  145. bucketName := "test-delete-markers"
  146. client := setupS3Client(t)
  147. // Create bucket
  148. _, err := client.CreateBucket(context.TODO(), &s3.CreateBucketInput{
  149. Bucket: aws.String(bucketName),
  150. })
  151. require.NoError(t, err)
  152. // Clean up
  153. defer func() {
  154. cleanupBucket(t, client, bucketName)
  155. }()
  156. // Enable versioning
  157. _, err = client.PutBucketVersioning(context.TODO(), &s3.PutBucketVersioningInput{
  158. Bucket: aws.String(bucketName),
  159. VersioningConfiguration: &types.VersioningConfiguration{
  160. Status: types.BucketVersioningStatusEnabled,
  161. },
  162. })
  163. require.NoError(t, err)
  164. objectKey := "test1/a"
  165. // 1. Create one version of the file
  166. _, err = client.PutObject(context.TODO(), &s3.PutObjectInput{
  167. Bucket: aws.String(bucketName),
  168. Key: aws.String(objectKey),
  169. Body: strings.NewReader("test content"),
  170. })
  171. require.NoError(t, err)
  172. // 2. Delete the object 3 times to create 3 delete markers
  173. for i := 0; i < 3; i++ {
  174. _, err = client.DeleteObject(context.TODO(), &s3.DeleteObjectInput{
  175. Bucket: aws.String(bucketName),
  176. Key: aws.String(objectKey),
  177. })
  178. require.NoError(t, err)
  179. }
  180. // 3. List object versions and verify the response structure
  181. listResp, err := client.ListObjectVersions(context.TODO(), &s3.ListObjectVersionsInput{
  182. Bucket: aws.String(bucketName),
  183. })
  184. require.NoError(t, err)
  185. // 4. Verify that we have exactly 1 version and 3 delete markers
  186. assert.Len(t, listResp.Versions, 1, "Should have exactly 1 file version")
  187. assert.Len(t, listResp.DeleteMarkers, 3, "Should have exactly 3 delete markers")
  188. // 5. Verify the version is for our test file
  189. version := listResp.Versions[0]
  190. assert.Equal(t, objectKey, *version.Key, "Version should be for our test file")
  191. assert.NotEqual(t, "null", *version.VersionId, "File version should have a real version ID")
  192. assert.Greater(t, *version.Size, int64(0), "File version should have size > 0")
  193. // 6. Verify all delete markers are for our test file
  194. for i, deleteMarker := range listResp.DeleteMarkers {
  195. assert.Equal(t, objectKey, *deleteMarker.Key, "Delete marker %d should be for our test file", i)
  196. assert.NotEqual(t, "null", *deleteMarker.VersionId, "Delete marker %d should have a real version ID", i)
  197. }
  198. t.Logf("Successfully verified: 1 version + 3 delete markers for object %s", objectKey)
  199. }
  200. // TestVersionedObjectAcl tests that ACL operations work correctly on objects in versioned buckets
  201. // This test verifies the fix for the NoSuchKey error when getting ACLs for objects in versioned buckets
  202. func TestVersionedObjectAcl(t *testing.T) {
  203. bucketName := "test-versioned-acl"
  204. client := setupS3Client(t)
  205. // Create bucket
  206. _, err := client.CreateBucket(context.TODO(), &s3.CreateBucketInput{
  207. Bucket: aws.String(bucketName),
  208. })
  209. require.NoError(t, err)
  210. // Clean up
  211. defer func() {
  212. cleanupBucket(t, client, bucketName)
  213. }()
  214. // Enable versioning
  215. _, err = client.PutBucketVersioning(context.TODO(), &s3.PutBucketVersioningInput{
  216. Bucket: aws.String(bucketName),
  217. VersioningConfiguration: &types.VersioningConfiguration{
  218. Status: types.BucketVersioningStatusEnabled,
  219. },
  220. })
  221. require.NoError(t, err)
  222. objectKey := "test-acl-object"
  223. // Create an object in the versioned bucket
  224. putResp, err := client.PutObject(context.TODO(), &s3.PutObjectInput{
  225. Bucket: aws.String(bucketName),
  226. Key: aws.String(objectKey),
  227. Body: strings.NewReader("test content for ACL"),
  228. })
  229. require.NoError(t, err)
  230. require.NotNil(t, putResp.VersionId, "Object should have a version ID")
  231. // Test 1: Get ACL for the object (without specifying version ID - should get latest version)
  232. getAclResp, err := client.GetObjectAcl(context.TODO(), &s3.GetObjectAclInput{
  233. Bucket: aws.String(bucketName),
  234. Key: aws.String(objectKey),
  235. })
  236. require.NoError(t, err, "Should be able to get ACL for object in versioned bucket")
  237. require.NotNil(t, getAclResp.Owner, "ACL response should have owner information")
  238. // Test 2: Get ACL for specific version ID
  239. getAclVersionResp, err := client.GetObjectAcl(context.TODO(), &s3.GetObjectAclInput{
  240. Bucket: aws.String(bucketName),
  241. Key: aws.String(objectKey),
  242. VersionId: putResp.VersionId,
  243. })
  244. require.NoError(t, err, "Should be able to get ACL for specific version")
  245. require.NotNil(t, getAclVersionResp.Owner, "Versioned ACL response should have owner information")
  246. // Test 3: Verify both ACL responses are the same (same object, same version)
  247. assert.Equal(t, getAclResp.Owner.ID, getAclVersionResp.Owner.ID, "Owner ID should match for latest and specific version")
  248. // Test 4: Create another version of the same object
  249. putResp2, err := client.PutObject(context.TODO(), &s3.PutObjectInput{
  250. Bucket: aws.String(bucketName),
  251. Key: aws.String(objectKey),
  252. Body: strings.NewReader("updated content for ACL"),
  253. })
  254. require.NoError(t, err)
  255. require.NotNil(t, putResp2.VersionId, "Second object version should have a version ID")
  256. require.NotEqual(t, putResp.VersionId, putResp2.VersionId, "Version IDs should be different")
  257. // Test 5: Get ACL for latest version (should be the second version)
  258. getAclLatestResp, err := client.GetObjectAcl(context.TODO(), &s3.GetObjectAclInput{
  259. Bucket: aws.String(bucketName),
  260. Key: aws.String(objectKey),
  261. })
  262. require.NoError(t, err, "Should be able to get ACL for latest version after update")
  263. require.NotNil(t, getAclLatestResp.Owner, "Latest ACL response should have owner information")
  264. // Test 6: Get ACL for the first version specifically
  265. getAclFirstResp, err := client.GetObjectAcl(context.TODO(), &s3.GetObjectAclInput{
  266. Bucket: aws.String(bucketName),
  267. Key: aws.String(objectKey),
  268. VersionId: putResp.VersionId,
  269. })
  270. require.NoError(t, err, "Should be able to get ACL for first version specifically")
  271. require.NotNil(t, getAclFirstResp.Owner, "First version ACL response should have owner information")
  272. // Test 7: Verify we can put ACL on versioned objects
  273. _, err = client.PutObjectAcl(context.TODO(), &s3.PutObjectAclInput{
  274. Bucket: aws.String(bucketName),
  275. Key: aws.String(objectKey),
  276. ACL: types.ObjectCannedACLPrivate,
  277. })
  278. require.NoError(t, err, "Should be able to put ACL on versioned object")
  279. t.Logf("Successfully verified ACL operations on versioned object %s with versions %s and %s",
  280. objectKey, *putResp.VersionId, *putResp2.VersionId)
  281. }
  282. // TestConcurrentMultiObjectDelete tests that concurrent delete operations work correctly without race conditions
  283. // This test verifies the fix for the race condition in deleteSpecificObjectVersion
  284. func TestConcurrentMultiObjectDelete(t *testing.T) {
  285. bucketName := "test-concurrent-delete"
  286. numObjects := 5
  287. numThreads := 5
  288. client := setupS3Client(t)
  289. // Create bucket
  290. _, err := client.CreateBucket(context.TODO(), &s3.CreateBucketInput{
  291. Bucket: aws.String(bucketName),
  292. })
  293. require.NoError(t, err)
  294. // Clean up
  295. defer func() {
  296. cleanupBucket(t, client, bucketName)
  297. }()
  298. // Enable versioning
  299. _, err = client.PutBucketVersioning(context.TODO(), &s3.PutBucketVersioningInput{
  300. Bucket: aws.String(bucketName),
  301. VersioningConfiguration: &types.VersioningConfiguration{
  302. Status: types.BucketVersioningStatusEnabled,
  303. },
  304. })
  305. require.NoError(t, err)
  306. // Create objects
  307. var objectKeys []string
  308. var versionIds []string
  309. for i := 0; i < numObjects; i++ {
  310. objectKey := fmt.Sprintf("key_%d", i)
  311. objectKeys = append(objectKeys, objectKey)
  312. putResp, err := client.PutObject(context.TODO(), &s3.PutObjectInput{
  313. Bucket: aws.String(bucketName),
  314. Key: aws.String(objectKey),
  315. Body: strings.NewReader(fmt.Sprintf("content for key_%d", i)),
  316. })
  317. require.NoError(t, err)
  318. require.NotNil(t, putResp.VersionId)
  319. versionIds = append(versionIds, *putResp.VersionId)
  320. }
  321. // Verify objects were created
  322. listResp, err := client.ListObjectVersions(context.TODO(), &s3.ListObjectVersionsInput{
  323. Bucket: aws.String(bucketName),
  324. })
  325. require.NoError(t, err)
  326. assert.Len(t, listResp.Versions, numObjects, "Should have created %d objects", numObjects)
  327. // Create delete objects request
  328. var objectsToDelete []types.ObjectIdentifier
  329. for i, objectKey := range objectKeys {
  330. objectsToDelete = append(objectsToDelete, types.ObjectIdentifier{
  331. Key: aws.String(objectKey),
  332. VersionId: aws.String(versionIds[i]),
  333. })
  334. }
  335. // Run concurrent delete operations
  336. results := make([]*s3.DeleteObjectsOutput, numThreads)
  337. var wg sync.WaitGroup
  338. for i := 0; i < numThreads; i++ {
  339. wg.Add(1)
  340. go func(threadIdx int) {
  341. defer wg.Done()
  342. deleteResp, err := client.DeleteObjects(context.TODO(), &s3.DeleteObjectsInput{
  343. Bucket: aws.String(bucketName),
  344. Delete: &types.Delete{
  345. Objects: objectsToDelete,
  346. Quiet: aws.Bool(false),
  347. },
  348. })
  349. if err != nil {
  350. t.Errorf("Thread %d: delete objects failed: %v", threadIdx, err)
  351. return
  352. }
  353. results[threadIdx] = deleteResp
  354. }(i)
  355. }
  356. wg.Wait()
  357. // Verify results
  358. for i, result := range results {
  359. require.NotNil(t, result, "Thread %d should have a result", i)
  360. assert.Len(t, result.Deleted, numObjects, "Thread %d should have deleted all %d objects", i, numObjects)
  361. if len(result.Errors) > 0 {
  362. for _, deleteError := range result.Errors {
  363. t.Errorf("Thread %d delete error: %s - %s (Key: %s, VersionId: %s)",
  364. i, *deleteError.Code, *deleteError.Message, *deleteError.Key,
  365. func() string {
  366. if deleteError.VersionId != nil {
  367. return *deleteError.VersionId
  368. } else {
  369. return "nil"
  370. }
  371. }())
  372. }
  373. }
  374. assert.Empty(t, result.Errors, "Thread %d should have no delete errors", i)
  375. }
  376. // Verify objects are deleted (bucket should be empty)
  377. finalListResp, err := client.ListObjects(context.TODO(), &s3.ListObjectsInput{
  378. Bucket: aws.String(bucketName),
  379. })
  380. require.NoError(t, err)
  381. assert.Nil(t, finalListResp.Contents, "Bucket should be empty after all deletions")
  382. t.Logf("Successfully verified concurrent deletion of %d objects from %d threads", numObjects, numThreads)
  383. }
  384. // TestSuspendedVersioningDeleteBehavior tests that delete operations during suspended versioning
  385. // actually delete the "null" version object rather than creating delete markers
  386. func TestSuspendedVersioningDeleteBehavior(t *testing.T) {
  387. bucketName := "test-suspended-versioning-delete"
  388. objectKey := "testobj"
  389. client := setupS3Client(t)
  390. // Create bucket
  391. _, err := client.CreateBucket(context.TODO(), &s3.CreateBucketInput{
  392. Bucket: aws.String(bucketName),
  393. })
  394. require.NoError(t, err)
  395. // Clean up
  396. defer func() {
  397. cleanupBucket(t, client, bucketName)
  398. }()
  399. // Enable versioning and create some versions
  400. _, err = client.PutBucketVersioning(context.TODO(), &s3.PutBucketVersioningInput{
  401. Bucket: aws.String(bucketName),
  402. VersioningConfiguration: &types.VersioningConfiguration{
  403. Status: types.BucketVersioningStatusEnabled,
  404. },
  405. })
  406. require.NoError(t, err)
  407. // Create 3 versions
  408. var versionIds []string
  409. for i := 0; i < 3; i++ {
  410. putResp, err := client.PutObject(context.TODO(), &s3.PutObjectInput{
  411. Bucket: aws.String(bucketName),
  412. Key: aws.String(objectKey),
  413. Body: strings.NewReader(fmt.Sprintf("content version %d", i+1)),
  414. })
  415. require.NoError(t, err)
  416. require.NotNil(t, putResp.VersionId)
  417. versionIds = append(versionIds, *putResp.VersionId)
  418. }
  419. // Verify 3 versions exist
  420. listResp, err := client.ListObjectVersions(context.TODO(), &s3.ListObjectVersionsInput{
  421. Bucket: aws.String(bucketName),
  422. })
  423. require.NoError(t, err)
  424. assert.Len(t, listResp.Versions, 3, "Should have 3 versions initially")
  425. // Suspend versioning
  426. _, err = client.PutBucketVersioning(context.TODO(), &s3.PutBucketVersioningInput{
  427. Bucket: aws.String(bucketName),
  428. VersioningConfiguration: &types.VersioningConfiguration{
  429. Status: types.BucketVersioningStatusSuspended,
  430. },
  431. })
  432. require.NoError(t, err)
  433. // Create a new object during suspended versioning (this should be a "null" version)
  434. _, err = client.PutObject(context.TODO(), &s3.PutObjectInput{
  435. Bucket: aws.String(bucketName),
  436. Key: aws.String(objectKey),
  437. Body: strings.NewReader("null version content"),
  438. })
  439. require.NoError(t, err)
  440. // Verify we still have 3 versions + 1 null version = 4 total
  441. listResp, err = client.ListObjectVersions(context.TODO(), &s3.ListObjectVersionsInput{
  442. Bucket: aws.String(bucketName),
  443. })
  444. require.NoError(t, err)
  445. assert.Len(t, listResp.Versions, 4, "Should have 3 versions + 1 null version")
  446. // Find the null version
  447. var nullVersionFound bool
  448. for _, version := range listResp.Versions {
  449. if *version.VersionId == "null" {
  450. nullVersionFound = true
  451. assert.True(t, *version.IsLatest, "Null version should be marked as latest during suspended versioning")
  452. break
  453. }
  454. }
  455. assert.True(t, nullVersionFound, "Should have found a null version")
  456. // Delete the object during suspended versioning (should actually delete the null version)
  457. _, err = client.DeleteObject(context.TODO(), &s3.DeleteObjectInput{
  458. Bucket: aws.String(bucketName),
  459. Key: aws.String(objectKey),
  460. // No VersionId specified - should delete the "null" version during suspended versioning
  461. })
  462. require.NoError(t, err)
  463. // Verify the null version was actually deleted (not a delete marker created)
  464. listResp, err = client.ListObjectVersions(context.TODO(), &s3.ListObjectVersionsInput{
  465. Bucket: aws.String(bucketName),
  466. })
  467. require.NoError(t, err)
  468. assert.Len(t, listResp.Versions, 3, "Should be back to 3 versions after deleting null version")
  469. assert.Empty(t, listResp.DeleteMarkers, "Should have no delete markers during suspended versioning delete")
  470. // Verify null version is gone
  471. nullVersionFound = false
  472. for _, version := range listResp.Versions {
  473. if *version.VersionId == "null" {
  474. nullVersionFound = true
  475. break
  476. }
  477. }
  478. assert.False(t, nullVersionFound, "Null version should be deleted, not present")
  479. // Create another null version and delete it multiple times to test idempotency
  480. _, err = client.PutObject(context.TODO(), &s3.PutObjectInput{
  481. Bucket: aws.String(bucketName),
  482. Key: aws.String(objectKey),
  483. Body: strings.NewReader("another null version"),
  484. })
  485. require.NoError(t, err)
  486. // Delete it twice to test idempotency
  487. for i := 0; i < 2; i++ {
  488. _, err = client.DeleteObject(context.TODO(), &s3.DeleteObjectInput{
  489. Bucket: aws.String(bucketName),
  490. Key: aws.String(objectKey),
  491. })
  492. require.NoError(t, err, "Delete should be idempotent - iteration %d", i+1)
  493. }
  494. // Re-enable versioning
  495. _, err = client.PutBucketVersioning(context.TODO(), &s3.PutBucketVersioningInput{
  496. Bucket: aws.String(bucketName),
  497. VersioningConfiguration: &types.VersioningConfiguration{
  498. Status: types.BucketVersioningStatusEnabled,
  499. },
  500. })
  501. require.NoError(t, err)
  502. // Create a new version with versioning enabled
  503. putResp, err := client.PutObject(context.TODO(), &s3.PutObjectInput{
  504. Bucket: aws.String(bucketName),
  505. Key: aws.String(objectKey),
  506. Body: strings.NewReader("new version after re-enabling"),
  507. })
  508. require.NoError(t, err)
  509. require.NotNil(t, putResp.VersionId)
  510. // Now delete without version ID (should create delete marker)
  511. deleteResp, err := client.DeleteObject(context.TODO(), &s3.DeleteObjectInput{
  512. Bucket: aws.String(bucketName),
  513. Key: aws.String(objectKey),
  514. })
  515. require.NoError(t, err)
  516. assert.Equal(t, "true", deleteResp.DeleteMarker, "Should create delete marker when versioning is enabled")
  517. // Verify final state
  518. listResp, err = client.ListObjectVersions(context.TODO(), &s3.ListObjectVersionsInput{
  519. Bucket: aws.String(bucketName),
  520. })
  521. require.NoError(t, err)
  522. assert.Len(t, listResp.Versions, 4, "Should have 3 original versions + 1 new version")
  523. assert.Len(t, listResp.DeleteMarkers, 1, "Should have 1 delete marker")
  524. t.Logf("Successfully verified suspended versioning delete behavior")
  525. }
  526. // TestVersionedObjectListBehavior tests that list operations show logical object names for versioned objects
  527. // and that owner information is properly extracted from S3 metadata
  528. func TestVersionedObjectListBehavior(t *testing.T) {
  529. bucketName := "test-versioned-list"
  530. objectKey := "testfile"
  531. client := setupS3Client(t)
  532. // Create bucket with object lock enabled (which enables versioning)
  533. _, err := client.CreateBucket(context.TODO(), &s3.CreateBucketInput{
  534. Bucket: aws.String(bucketName),
  535. ObjectLockEnabledForBucket: aws.Bool(true),
  536. })
  537. require.NoError(t, err)
  538. // Clean up
  539. defer func() {
  540. cleanupBucket(t, client, bucketName)
  541. }()
  542. // Verify versioning is enabled
  543. versioningResp, err := client.GetBucketVersioning(context.TODO(), &s3.GetBucketVersioningInput{
  544. Bucket: aws.String(bucketName),
  545. })
  546. require.NoError(t, err)
  547. assert.Equal(t, types.BucketVersioningStatusEnabled, versioningResp.Status, "Bucket versioning should be enabled")
  548. // Create a versioned object
  549. content := "test content for versioned object"
  550. putResp, err := client.PutObject(context.TODO(), &s3.PutObjectInput{
  551. Bucket: aws.String(bucketName),
  552. Key: aws.String(objectKey),
  553. Body: strings.NewReader(content),
  554. })
  555. require.NoError(t, err)
  556. require.NotNil(t, putResp.VersionId)
  557. versionId := *putResp.VersionId
  558. t.Logf("Created versioned object with version ID: %s", versionId)
  559. // Test list-objects operation - should show logical object name, not internal versioned path
  560. listResp, err := client.ListObjects(context.TODO(), &s3.ListObjectsInput{
  561. Bucket: aws.String(bucketName),
  562. })
  563. require.NoError(t, err)
  564. require.Len(t, listResp.Contents, 1, "Should list exactly one object")
  565. listedObject := listResp.Contents[0]
  566. // Verify the object key is the logical name, not the internal versioned path
  567. assert.Equal(t, objectKey, *listedObject.Key, "Should show logical object name, not internal versioned path")
  568. assert.NotContains(t, *listedObject.Key, ".versions", "Object key should not contain .versions")
  569. assert.NotContains(t, *listedObject.Key, versionId, "Object key should not contain version ID")
  570. // Verify object properties
  571. assert.Equal(t, int64(len(content)), listedObject.Size, "Object size should match")
  572. assert.NotNil(t, listedObject.ETag, "Object should have ETag")
  573. assert.NotNil(t, listedObject.LastModified, "Object should have LastModified")
  574. // Verify owner information is present (even if anonymous)
  575. require.NotNil(t, listedObject.Owner, "Object should have Owner information")
  576. assert.NotEmpty(t, listedObject.Owner.ID, "Owner ID should not be empty")
  577. assert.NotEmpty(t, listedObject.Owner.DisplayName, "Owner DisplayName should not be empty")
  578. t.Logf("Listed object: Key=%s, Size=%d, Owner.ID=%s, Owner.DisplayName=%s",
  579. *listedObject.Key, listedObject.Size, *listedObject.Owner.ID, *listedObject.Owner.DisplayName)
  580. // Test list-objects-v2 operation as well
  581. listV2Resp, err := client.ListObjectsV2(context.TODO(), &s3.ListObjectsV2Input{
  582. Bucket: aws.String(bucketName),
  583. FetchOwner: aws.Bool(true), // Explicitly request owner information
  584. })
  585. require.NoError(t, err)
  586. require.Len(t, listV2Resp.Contents, 1, "ListObjectsV2 should also list exactly one object")
  587. listedObjectV2 := listV2Resp.Contents[0]
  588. assert.Equal(t, objectKey, *listedObjectV2.Key, "ListObjectsV2 should also show logical object name")
  589. assert.NotNil(t, listedObjectV2.Owner, "ListObjectsV2 should include owner when FetchOwner=true")
  590. // Create another version to ensure multiple versions don't appear in regular list
  591. _, err = client.PutObject(context.TODO(), &s3.PutObjectInput{
  592. Bucket: aws.String(bucketName),
  593. Key: aws.String(objectKey),
  594. Body: strings.NewReader("updated content"),
  595. })
  596. require.NoError(t, err)
  597. // List again - should still show only one logical object (the latest version)
  598. listRespAfterUpdate, err := client.ListObjects(context.TODO(), &s3.ListObjectsInput{
  599. Bucket: aws.String(bucketName),
  600. })
  601. require.NoError(t, err)
  602. assert.Len(t, listRespAfterUpdate.Contents, 1, "Should still list exactly one object after creating second version")
  603. // Compare with list-object-versions which should show both versions
  604. versionsResp, err := client.ListObjectVersions(context.TODO(), &s3.ListObjectVersionsInput{
  605. Bucket: aws.String(bucketName),
  606. })
  607. require.NoError(t, err)
  608. assert.Len(t, versionsResp.Versions, 2, "list-object-versions should show both versions")
  609. t.Logf("Successfully verified versioned object list behavior")
  610. }
  611. // TestPrefixFilteringLogic tests the prefix filtering logic fix for list object versions
  612. // This addresses the issue raised by gemini-code-assist bot where files could be incorrectly included
  613. func TestPrefixFilteringLogic(t *testing.T) {
  614. s3Client := setupS3Client(t)
  615. bucketName := "test-bucket-" + fmt.Sprintf("%d", time.Now().UnixNano())
  616. // Create bucket
  617. _, err := s3Client.CreateBucket(context.TODO(), &s3.CreateBucketInput{
  618. Bucket: aws.String(bucketName),
  619. })
  620. require.NoError(t, err)
  621. defer cleanupBucket(t, s3Client, bucketName)
  622. // Enable versioning
  623. _, err = s3Client.PutBucketVersioning(context.Background(), &s3.PutBucketVersioningInput{
  624. Bucket: aws.String(bucketName),
  625. VersioningConfiguration: &types.VersioningConfiguration{
  626. Status: types.BucketVersioningStatusEnabled,
  627. },
  628. })
  629. require.NoError(t, err)
  630. // Create test files that could trigger the edge case:
  631. // - File "a" (which should NOT be included when searching for prefix "a/b")
  632. // - File "a/b" (which SHOULD be included when searching for prefix "a/b")
  633. _, err = s3Client.PutObject(context.Background(), &s3.PutObjectInput{
  634. Bucket: aws.String(bucketName),
  635. Key: aws.String("a"),
  636. Body: strings.NewReader("content of file a"),
  637. })
  638. require.NoError(t, err)
  639. _, err = s3Client.PutObject(context.Background(), &s3.PutObjectInput{
  640. Bucket: aws.String(bucketName),
  641. Key: aws.String("a/b"),
  642. Body: strings.NewReader("content of file a/b"),
  643. })
  644. require.NoError(t, err)
  645. // Test list-object-versions with prefix "a/b" - should NOT include file "a"
  646. versionsResponse, err := s3Client.ListObjectVersions(context.Background(), &s3.ListObjectVersionsInput{
  647. Bucket: aws.String(bucketName),
  648. Prefix: aws.String("a/b"),
  649. })
  650. require.NoError(t, err)
  651. // Verify that only "a/b" is returned, not "a"
  652. require.Len(t, versionsResponse.Versions, 1, "Should only find one version matching prefix 'a/b'")
  653. assert.Equal(t, "a/b", aws.ToString(versionsResponse.Versions[0].Key), "Should only return 'a/b', not 'a'")
  654. // Test list-object-versions with prefix "a/" - should include "a/b" but not "a"
  655. versionsResponse, err = s3Client.ListObjectVersions(context.Background(), &s3.ListObjectVersionsInput{
  656. Bucket: aws.String(bucketName),
  657. Prefix: aws.String("a/"),
  658. })
  659. require.NoError(t, err)
  660. // Verify that only "a/b" is returned, not "a"
  661. require.Len(t, versionsResponse.Versions, 1, "Should only find one version matching prefix 'a/'")
  662. assert.Equal(t, "a/b", aws.ToString(versionsResponse.Versions[0].Key), "Should only return 'a/b', not 'a'")
  663. // Test list-object-versions with prefix "a" - should include both "a" and "a/b"
  664. versionsResponse, err = s3Client.ListObjectVersions(context.Background(), &s3.ListObjectVersionsInput{
  665. Bucket: aws.String(bucketName),
  666. Prefix: aws.String("a"),
  667. })
  668. require.NoError(t, err)
  669. // Should find both files
  670. require.Len(t, versionsResponse.Versions, 2, "Should find both versions matching prefix 'a'")
  671. // Extract keys and sort them for predictable comparison
  672. var keys []string
  673. for _, version := range versionsResponse.Versions {
  674. keys = append(keys, aws.ToString(version.Key))
  675. }
  676. sort.Strings(keys)
  677. assert.Equal(t, []string{"a", "a/b"}, keys, "Should return both 'a' and 'a/b'")
  678. t.Logf("✅ Prefix filtering logic correctly handles edge cases")
  679. }
  680. // Helper function to setup S3 client
  681. func setupS3Client(t *testing.T) *s3.Client {
  682. // S3TestConfig holds configuration for S3 tests
  683. type S3TestConfig struct {
  684. Endpoint string
  685. AccessKey string
  686. SecretKey string
  687. Region string
  688. BucketPrefix string
  689. UseSSL bool
  690. SkipVerifySSL bool
  691. }
  692. // Default test configuration - should match s3tests.conf
  693. defaultConfig := &S3TestConfig{
  694. Endpoint: "http://localhost:8333", // Default SeaweedFS S3 port
  695. AccessKey: "some_access_key1",
  696. SecretKey: "some_secret_key1",
  697. Region: "us-east-1",
  698. BucketPrefix: "test-versioning-",
  699. UseSSL: false,
  700. SkipVerifySSL: true,
  701. }
  702. cfg, err := config.LoadDefaultConfig(context.TODO(),
  703. config.WithRegion(defaultConfig.Region),
  704. config.WithCredentialsProvider(credentials.NewStaticCredentialsProvider(
  705. defaultConfig.AccessKey,
  706. defaultConfig.SecretKey,
  707. "",
  708. )),
  709. config.WithEndpointResolverWithOptions(aws.EndpointResolverWithOptionsFunc(
  710. func(service, region string, options ...interface{}) (aws.Endpoint, error) {
  711. return aws.Endpoint{
  712. URL: defaultConfig.Endpoint,
  713. SigningRegion: defaultConfig.Region,
  714. HostnameImmutable: true,
  715. }, nil
  716. })),
  717. )
  718. require.NoError(t, err)
  719. return s3.NewFromConfig(cfg, func(o *s3.Options) {
  720. o.UsePathStyle = true // Important for SeaweedFS
  721. })
  722. }
  723. // Helper function to clean up bucket
  724. func cleanupBucket(t *testing.T, client *s3.Client, bucketName string) {
  725. // First, delete all objects and versions
  726. err := deleteAllObjectVersions(t, client, bucketName)
  727. if err != nil {
  728. t.Logf("Warning: failed to delete all object versions: %v", err)
  729. }
  730. // Then delete the bucket
  731. _, err = client.DeleteBucket(context.TODO(), &s3.DeleteBucketInput{
  732. Bucket: aws.String(bucketName),
  733. })
  734. if err != nil {
  735. t.Logf("Warning: failed to delete bucket %s: %v", bucketName, err)
  736. }
  737. }