s3_iam_integration_test.go 18 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596
  1. package iam
  2. import (
  3. "bytes"
  4. "fmt"
  5. "io"
  6. "strings"
  7. "testing"
  8. "github.com/aws/aws-sdk-go/aws"
  9. "github.com/aws/aws-sdk-go/aws/awserr"
  10. "github.com/aws/aws-sdk-go/service/s3"
  11. "github.com/stretchr/testify/assert"
  12. "github.com/stretchr/testify/require"
  13. )
  14. const (
  15. testEndpoint = "http://localhost:8333"
  16. testRegion = "us-west-2"
  17. testBucketPrefix = "test-iam-bucket"
  18. testObjectKey = "test-object.txt"
  19. testObjectData = "Hello, SeaweedFS IAM Integration!"
  20. )
  21. var (
  22. testBucket = testBucketPrefix
  23. )
  24. // TestS3IAMAuthentication tests S3 API authentication with IAM JWT tokens
  25. func TestS3IAMAuthentication(t *testing.T) {
  26. framework := NewS3IAMTestFramework(t)
  27. defer framework.Cleanup()
  28. t.Run("valid_jwt_token_authentication", func(t *testing.T) {
  29. // Create S3 client with valid JWT token
  30. s3Client, err := framework.CreateS3ClientWithJWT("admin-user", "TestAdminRole")
  31. require.NoError(t, err)
  32. // Test bucket operations
  33. err = framework.CreateBucket(s3Client, testBucket)
  34. require.NoError(t, err)
  35. // Verify bucket exists
  36. buckets, err := s3Client.ListBuckets(&s3.ListBucketsInput{})
  37. require.NoError(t, err)
  38. found := false
  39. for _, bucket := range buckets.Buckets {
  40. if *bucket.Name == testBucket {
  41. found = true
  42. break
  43. }
  44. }
  45. assert.True(t, found, "Created bucket should be listed")
  46. })
  47. t.Run("invalid_jwt_token_authentication", func(t *testing.T) {
  48. // Create S3 client with invalid JWT token
  49. s3Client, err := framework.CreateS3ClientWithInvalidJWT()
  50. require.NoError(t, err)
  51. // Attempt bucket operations - should fail
  52. err = framework.CreateBucket(s3Client, testBucket+"-invalid")
  53. require.Error(t, err)
  54. // Verify it's an access denied error
  55. if awsErr, ok := err.(awserr.Error); ok {
  56. assert.Equal(t, "AccessDenied", awsErr.Code())
  57. } else {
  58. t.Error("Expected AWS error with AccessDenied code")
  59. }
  60. })
  61. t.Run("expired_jwt_token_authentication", func(t *testing.T) {
  62. // Create S3 client with expired JWT token
  63. s3Client, err := framework.CreateS3ClientWithExpiredJWT("expired-user", "TestAdminRole")
  64. require.NoError(t, err)
  65. // Attempt bucket operations - should fail
  66. err = framework.CreateBucket(s3Client, testBucket+"-expired")
  67. require.Error(t, err)
  68. // Verify it's an access denied error
  69. if awsErr, ok := err.(awserr.Error); ok {
  70. assert.Equal(t, "AccessDenied", awsErr.Code())
  71. } else {
  72. t.Error("Expected AWS error with AccessDenied code")
  73. }
  74. })
  75. }
  76. // TestS3IAMPolicyEnforcement tests policy enforcement for different S3 operations
  77. func TestS3IAMPolicyEnforcement(t *testing.T) {
  78. framework := NewS3IAMTestFramework(t)
  79. defer framework.Cleanup()
  80. // Setup test bucket with admin client
  81. adminClient, err := framework.CreateS3ClientWithJWT("admin-user", "TestAdminRole")
  82. require.NoError(t, err)
  83. err = framework.CreateBucket(adminClient, testBucket)
  84. require.NoError(t, err)
  85. // Put test object with admin client
  86. _, err = adminClient.PutObject(&s3.PutObjectInput{
  87. Bucket: aws.String(testBucket),
  88. Key: aws.String(testObjectKey),
  89. Body: strings.NewReader(testObjectData),
  90. })
  91. require.NoError(t, err)
  92. t.Run("read_only_policy_enforcement", func(t *testing.T) {
  93. // Create S3 client with read-only role
  94. readOnlyClient, err := framework.CreateS3ClientWithJWT("read-user", "TestReadOnlyRole")
  95. require.NoError(t, err)
  96. // Should be able to read objects
  97. result, err := readOnlyClient.GetObject(&s3.GetObjectInput{
  98. Bucket: aws.String(testBucket),
  99. Key: aws.String(testObjectKey),
  100. })
  101. require.NoError(t, err)
  102. data, err := io.ReadAll(result.Body)
  103. require.NoError(t, err)
  104. assert.Equal(t, testObjectData, string(data))
  105. result.Body.Close()
  106. // Should be able to list objects
  107. listResult, err := readOnlyClient.ListObjects(&s3.ListObjectsInput{
  108. Bucket: aws.String(testBucket),
  109. })
  110. require.NoError(t, err)
  111. assert.Len(t, listResult.Contents, 1)
  112. assert.Equal(t, testObjectKey, *listResult.Contents[0].Key)
  113. // Should NOT be able to put objects
  114. _, err = readOnlyClient.PutObject(&s3.PutObjectInput{
  115. Bucket: aws.String(testBucket),
  116. Key: aws.String("forbidden-object.txt"),
  117. Body: strings.NewReader("This should fail"),
  118. })
  119. require.Error(t, err)
  120. if awsErr, ok := err.(awserr.Error); ok {
  121. assert.Equal(t, "AccessDenied", awsErr.Code())
  122. }
  123. // Should NOT be able to delete objects
  124. _, err = readOnlyClient.DeleteObject(&s3.DeleteObjectInput{
  125. Bucket: aws.String(testBucket),
  126. Key: aws.String(testObjectKey),
  127. })
  128. require.Error(t, err)
  129. if awsErr, ok := err.(awserr.Error); ok {
  130. assert.Equal(t, "AccessDenied", awsErr.Code())
  131. }
  132. })
  133. t.Run("write_only_policy_enforcement", func(t *testing.T) {
  134. // Create S3 client with write-only role
  135. writeOnlyClient, err := framework.CreateS3ClientWithJWT("write-user", "TestWriteOnlyRole")
  136. require.NoError(t, err)
  137. // Should be able to put objects
  138. testWriteKey := "write-test-object.txt"
  139. testWriteData := "Write-only test data"
  140. _, err = writeOnlyClient.PutObject(&s3.PutObjectInput{
  141. Bucket: aws.String(testBucket),
  142. Key: aws.String(testWriteKey),
  143. Body: strings.NewReader(testWriteData),
  144. })
  145. require.NoError(t, err)
  146. // Should be able to delete objects
  147. _, err = writeOnlyClient.DeleteObject(&s3.DeleteObjectInput{
  148. Bucket: aws.String(testBucket),
  149. Key: aws.String(testWriteKey),
  150. })
  151. require.NoError(t, err)
  152. // Should NOT be able to read objects
  153. _, err = writeOnlyClient.GetObject(&s3.GetObjectInput{
  154. Bucket: aws.String(testBucket),
  155. Key: aws.String(testObjectKey),
  156. })
  157. require.Error(t, err)
  158. if awsErr, ok := err.(awserr.Error); ok {
  159. assert.Equal(t, "AccessDenied", awsErr.Code())
  160. }
  161. // Should NOT be able to list objects
  162. _, err = writeOnlyClient.ListObjects(&s3.ListObjectsInput{
  163. Bucket: aws.String(testBucket),
  164. })
  165. require.Error(t, err)
  166. if awsErr, ok := err.(awserr.Error); ok {
  167. assert.Equal(t, "AccessDenied", awsErr.Code())
  168. }
  169. })
  170. t.Run("admin_policy_enforcement", func(t *testing.T) {
  171. // Admin client should be able to do everything
  172. testAdminKey := "admin-test-object.txt"
  173. testAdminData := "Admin test data"
  174. // Should be able to put objects
  175. _, err = adminClient.PutObject(&s3.PutObjectInput{
  176. Bucket: aws.String(testBucket),
  177. Key: aws.String(testAdminKey),
  178. Body: strings.NewReader(testAdminData),
  179. })
  180. require.NoError(t, err)
  181. // Should be able to read objects
  182. result, err := adminClient.GetObject(&s3.GetObjectInput{
  183. Bucket: aws.String(testBucket),
  184. Key: aws.String(testAdminKey),
  185. })
  186. require.NoError(t, err)
  187. data, err := io.ReadAll(result.Body)
  188. require.NoError(t, err)
  189. assert.Equal(t, testAdminData, string(data))
  190. result.Body.Close()
  191. // Should be able to list objects
  192. listResult, err := adminClient.ListObjects(&s3.ListObjectsInput{
  193. Bucket: aws.String(testBucket),
  194. })
  195. require.NoError(t, err)
  196. assert.GreaterOrEqual(t, len(listResult.Contents), 1)
  197. // Should be able to delete objects
  198. _, err = adminClient.DeleteObject(&s3.DeleteObjectInput{
  199. Bucket: aws.String(testBucket),
  200. Key: aws.String(testAdminKey),
  201. })
  202. require.NoError(t, err)
  203. // Should be able to delete buckets
  204. // First delete remaining objects
  205. _, err = adminClient.DeleteObject(&s3.DeleteObjectInput{
  206. Bucket: aws.String(testBucket),
  207. Key: aws.String(testObjectKey),
  208. })
  209. require.NoError(t, err)
  210. // Then delete the bucket
  211. _, err = adminClient.DeleteBucket(&s3.DeleteBucketInput{
  212. Bucket: aws.String(testBucket),
  213. })
  214. require.NoError(t, err)
  215. })
  216. }
  217. // TestS3IAMSessionExpiration tests session expiration handling
  218. func TestS3IAMSessionExpiration(t *testing.T) {
  219. framework := NewS3IAMTestFramework(t)
  220. defer framework.Cleanup()
  221. t.Run("session_expiration_enforcement", func(t *testing.T) {
  222. // Create S3 client with valid JWT token
  223. s3Client, err := framework.CreateS3ClientWithJWT("session-user", "TestAdminRole")
  224. require.NoError(t, err)
  225. // Initially should work
  226. err = framework.CreateBucket(s3Client, testBucket+"-session")
  227. require.NoError(t, err)
  228. // Create S3 client with expired JWT token
  229. expiredClient, err := framework.CreateS3ClientWithExpiredJWT("session-user", "TestAdminRole")
  230. require.NoError(t, err)
  231. // Now operations should fail with expired token
  232. err = framework.CreateBucket(expiredClient, testBucket+"-session-expired")
  233. require.Error(t, err)
  234. if awsErr, ok := err.(awserr.Error); ok {
  235. assert.Equal(t, "AccessDenied", awsErr.Code())
  236. }
  237. // Cleanup the successful bucket
  238. adminClient, err := framework.CreateS3ClientWithJWT("admin-user", "TestAdminRole")
  239. require.NoError(t, err)
  240. _, err = adminClient.DeleteBucket(&s3.DeleteBucketInput{
  241. Bucket: aws.String(testBucket + "-session"),
  242. })
  243. require.NoError(t, err)
  244. })
  245. }
  246. // TestS3IAMMultipartUploadPolicyEnforcement tests multipart upload with IAM policies
  247. func TestS3IAMMultipartUploadPolicyEnforcement(t *testing.T) {
  248. framework := NewS3IAMTestFramework(t)
  249. defer framework.Cleanup()
  250. // Setup test bucket with admin client
  251. adminClient, err := framework.CreateS3ClientWithJWT("admin-user", "TestAdminRole")
  252. require.NoError(t, err)
  253. err = framework.CreateBucket(adminClient, testBucket)
  254. require.NoError(t, err)
  255. t.Run("multipart_upload_with_write_permissions", func(t *testing.T) {
  256. // Create S3 client with admin role (has multipart permissions)
  257. s3Client := adminClient
  258. // Initiate multipart upload
  259. multipartKey := "large-test-file.txt"
  260. initResult, err := s3Client.CreateMultipartUpload(&s3.CreateMultipartUploadInput{
  261. Bucket: aws.String(testBucket),
  262. Key: aws.String(multipartKey),
  263. })
  264. require.NoError(t, err)
  265. uploadId := initResult.UploadId
  266. // Upload a part
  267. partNumber := int64(1)
  268. partData := strings.Repeat("Test data for multipart upload. ", 1000) // ~30KB
  269. uploadResult, err := s3Client.UploadPart(&s3.UploadPartInput{
  270. Bucket: aws.String(testBucket),
  271. Key: aws.String(multipartKey),
  272. PartNumber: aws.Int64(partNumber),
  273. UploadId: uploadId,
  274. Body: strings.NewReader(partData),
  275. })
  276. require.NoError(t, err)
  277. // Complete multipart upload
  278. _, err = s3Client.CompleteMultipartUpload(&s3.CompleteMultipartUploadInput{
  279. Bucket: aws.String(testBucket),
  280. Key: aws.String(multipartKey),
  281. UploadId: uploadId,
  282. MultipartUpload: &s3.CompletedMultipartUpload{
  283. Parts: []*s3.CompletedPart{
  284. {
  285. ETag: uploadResult.ETag,
  286. PartNumber: aws.Int64(partNumber),
  287. },
  288. },
  289. },
  290. })
  291. require.NoError(t, err)
  292. // Verify object was created
  293. result, err := s3Client.GetObject(&s3.GetObjectInput{
  294. Bucket: aws.String(testBucket),
  295. Key: aws.String(multipartKey),
  296. })
  297. require.NoError(t, err)
  298. data, err := io.ReadAll(result.Body)
  299. require.NoError(t, err)
  300. assert.Equal(t, partData, string(data))
  301. result.Body.Close()
  302. // Cleanup
  303. _, err = s3Client.DeleteObject(&s3.DeleteObjectInput{
  304. Bucket: aws.String(testBucket),
  305. Key: aws.String(multipartKey),
  306. })
  307. require.NoError(t, err)
  308. })
  309. t.Run("multipart_upload_denied_for_read_only", func(t *testing.T) {
  310. // Create S3 client with read-only role
  311. readOnlyClient, err := framework.CreateS3ClientWithJWT("read-user", "TestReadOnlyRole")
  312. require.NoError(t, err)
  313. // Attempt to initiate multipart upload - should fail
  314. multipartKey := "denied-multipart-file.txt"
  315. _, err = readOnlyClient.CreateMultipartUpload(&s3.CreateMultipartUploadInput{
  316. Bucket: aws.String(testBucket),
  317. Key: aws.String(multipartKey),
  318. })
  319. require.Error(t, err)
  320. if awsErr, ok := err.(awserr.Error); ok {
  321. assert.Equal(t, "AccessDenied", awsErr.Code())
  322. }
  323. })
  324. // Cleanup
  325. _, err = adminClient.DeleteBucket(&s3.DeleteBucketInput{
  326. Bucket: aws.String(testBucket),
  327. })
  328. require.NoError(t, err)
  329. }
  330. // TestS3IAMBucketPolicyIntegration tests bucket policy integration with IAM
  331. func TestS3IAMBucketPolicyIntegration(t *testing.T) {
  332. framework := NewS3IAMTestFramework(t)
  333. defer framework.Cleanup()
  334. // Setup test bucket with admin client
  335. adminClient, err := framework.CreateS3ClientWithJWT("admin-user", "TestAdminRole")
  336. require.NoError(t, err)
  337. err = framework.CreateBucket(adminClient, testBucket)
  338. require.NoError(t, err)
  339. t.Run("bucket_policy_allows_public_read", func(t *testing.T) {
  340. // Set bucket policy to allow public read access
  341. bucketPolicy := fmt.Sprintf(`{
  342. "Version": "2012-10-17",
  343. "Statement": [
  344. {
  345. "Sid": "PublicReadGetObject",
  346. "Effect": "Allow",
  347. "Principal": "*",
  348. "Action": ["s3:GetObject"],
  349. "Resource": ["arn:seaweed:s3:::%s/*"]
  350. }
  351. ]
  352. }`, testBucket)
  353. _, err = adminClient.PutBucketPolicy(&s3.PutBucketPolicyInput{
  354. Bucket: aws.String(testBucket),
  355. Policy: aws.String(bucketPolicy),
  356. })
  357. require.NoError(t, err)
  358. // Put test object
  359. _, err = adminClient.PutObject(&s3.PutObjectInput{
  360. Bucket: aws.String(testBucket),
  361. Key: aws.String(testObjectKey),
  362. Body: strings.NewReader(testObjectData),
  363. })
  364. require.NoError(t, err)
  365. // Test with read-only client - should now be allowed due to bucket policy
  366. readOnlyClient, err := framework.CreateS3ClientWithJWT("read-user", "TestReadOnlyRole")
  367. require.NoError(t, err)
  368. result, err := readOnlyClient.GetObject(&s3.GetObjectInput{
  369. Bucket: aws.String(testBucket),
  370. Key: aws.String(testObjectKey),
  371. })
  372. require.NoError(t, err)
  373. data, err := io.ReadAll(result.Body)
  374. require.NoError(t, err)
  375. assert.Equal(t, testObjectData, string(data))
  376. result.Body.Close()
  377. })
  378. t.Run("bucket_policy_denies_specific_action", func(t *testing.T) {
  379. // Set bucket policy to deny delete operations
  380. bucketPolicy := fmt.Sprintf(`{
  381. "Version": "2012-10-17",
  382. "Statement": [
  383. {
  384. "Sid": "DenyDelete",
  385. "Effect": "Deny",
  386. "Principal": "*",
  387. "Action": ["s3:DeleteObject"],
  388. "Resource": ["arn:seaweed:s3:::%s/*"]
  389. }
  390. ]
  391. }`, testBucket)
  392. _, err = adminClient.PutBucketPolicy(&s3.PutBucketPolicyInput{
  393. Bucket: aws.String(testBucket),
  394. Policy: aws.String(bucketPolicy),
  395. })
  396. require.NoError(t, err)
  397. // Verify that the bucket policy was stored successfully by retrieving it
  398. policyResult, err := adminClient.GetBucketPolicy(&s3.GetBucketPolicyInput{
  399. Bucket: aws.String(testBucket),
  400. })
  401. require.NoError(t, err)
  402. assert.Contains(t, *policyResult.Policy, "s3:DeleteObject")
  403. assert.Contains(t, *policyResult.Policy, "Deny")
  404. // IMPLEMENTATION NOTE: Bucket policy enforcement in authorization flow
  405. // is planned for a future phase. Currently, this test validates policy
  406. // storage and retrieval. When enforcement is implemented, this test
  407. // should be extended to verify that delete operations are actually denied.
  408. })
  409. // Cleanup - delete bucket policy first, then objects and bucket
  410. _, err = adminClient.DeleteBucketPolicy(&s3.DeleteBucketPolicyInput{
  411. Bucket: aws.String(testBucket),
  412. })
  413. require.NoError(t, err)
  414. _, err = adminClient.DeleteObject(&s3.DeleteObjectInput{
  415. Bucket: aws.String(testBucket),
  416. Key: aws.String(testObjectKey),
  417. })
  418. require.NoError(t, err)
  419. _, err = adminClient.DeleteBucket(&s3.DeleteBucketInput{
  420. Bucket: aws.String(testBucket),
  421. })
  422. require.NoError(t, err)
  423. }
  424. // TestS3IAMContextualPolicyEnforcement tests context-aware policy enforcement
  425. func TestS3IAMContextualPolicyEnforcement(t *testing.T) {
  426. framework := NewS3IAMTestFramework(t)
  427. defer framework.Cleanup()
  428. // This test would verify IP-based restrictions, time-based restrictions,
  429. // and other context-aware policy conditions
  430. // For now, we'll focus on the basic structure
  431. t.Run("ip_based_policy_enforcement", func(t *testing.T) {
  432. // IMPLEMENTATION NOTE: IP-based policy testing framework planned for future release
  433. // Requirements:
  434. // - Configure IAM policies with IpAddress/NotIpAddress conditions
  435. // - Multi-container test setup with controlled source IP addresses
  436. // - Test policy enforcement from allowed vs denied IP ranges
  437. t.Skip("IP-based policy testing requires advanced network configuration and multi-container setup")
  438. })
  439. t.Run("time_based_policy_enforcement", func(t *testing.T) {
  440. // IMPLEMENTATION NOTE: Time-based policy testing framework planned for future release
  441. // Requirements:
  442. // - Configure IAM policies with DateGreaterThan/DateLessThan conditions
  443. // - Time manipulation capabilities for testing different time windows
  444. // - Test policy enforcement during allowed vs restricted time periods
  445. t.Skip("Time-based policy testing requires time manipulation capabilities")
  446. })
  447. }
  448. // Helper function to create test content of specific size
  449. func createTestContent(size int) *bytes.Reader {
  450. content := make([]byte, size)
  451. for i := range content {
  452. content[i] = byte(i % 256)
  453. }
  454. return bytes.NewReader(content)
  455. }
  456. // TestS3IAMPresignedURLIntegration tests presigned URL generation with IAM
  457. func TestS3IAMPresignedURLIntegration(t *testing.T) {
  458. framework := NewS3IAMTestFramework(t)
  459. defer framework.Cleanup()
  460. // Setup test bucket with admin client
  461. adminClient, err := framework.CreateS3ClientWithJWT("admin-user", "TestAdminRole")
  462. require.NoError(t, err)
  463. // Use static bucket name but with cleanup to handle conflicts
  464. err = framework.CreateBucketWithCleanup(adminClient, testBucketPrefix)
  465. require.NoError(t, err)
  466. // Put test object
  467. _, err = adminClient.PutObject(&s3.PutObjectInput{
  468. Bucket: aws.String(testBucketPrefix),
  469. Key: aws.String(testObjectKey),
  470. Body: strings.NewReader(testObjectData),
  471. })
  472. require.NoError(t, err)
  473. t.Run("presigned_url_generation_and_usage", func(t *testing.T) {
  474. // ARCHITECTURAL NOTE: AWS SDK presigned URLs are incompatible with JWT Bearer authentication
  475. //
  476. // AWS SDK presigned URLs use AWS Signature Version 4 (SigV4) which requires:
  477. // - Access Key ID and Secret Access Key for signing
  478. // - Query parameter-based authentication in the URL
  479. //
  480. // SeaweedFS JWT authentication uses:
  481. // - Bearer tokens in the Authorization header
  482. // - Stateless JWT validation without AWS-style signing
  483. //
  484. // RECOMMENDATION: For JWT-authenticated applications, use direct API calls
  485. // with Bearer tokens rather than presigned URLs.
  486. // Test direct object access with JWT Bearer token (recommended approach)
  487. _, err := adminClient.GetObject(&s3.GetObjectInput{
  488. Bucket: aws.String(testBucketPrefix),
  489. Key: aws.String(testObjectKey),
  490. })
  491. require.NoError(t, err, "Direct object access with JWT Bearer token works correctly")
  492. t.Log("✅ JWT Bearer token authentication confirmed working for direct S3 API calls")
  493. t.Log("ℹ️ Note: Presigned URLs are not supported with JWT Bearer authentication by design")
  494. })
  495. // Cleanup
  496. _, err = adminClient.DeleteObject(&s3.DeleteObjectInput{
  497. Bucket: aws.String(testBucket),
  498. Key: aws.String(testObjectKey),
  499. })
  500. require.NoError(t, err)
  501. _, err = adminClient.DeleteBucket(&s3.DeleteBucketInput{
  502. Bucket: aws.String(testBucket),
  503. })
  504. require.NoError(t, err)
  505. }