s3_sse_multipart_test.go 15 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517
  1. package s3api
  2. import (
  3. "bytes"
  4. "fmt"
  5. "io"
  6. "strings"
  7. "testing"
  8. "github.com/seaweedfs/seaweedfs/weed/s3api/s3_constants"
  9. )
  10. // TestSSECMultipartUpload tests SSE-C with multipart uploads
  11. func TestSSECMultipartUpload(t *testing.T) {
  12. keyPair := GenerateTestSSECKey(1)
  13. customerKey := &SSECustomerKey{
  14. Algorithm: "AES256",
  15. Key: keyPair.Key,
  16. KeyMD5: keyPair.KeyMD5,
  17. }
  18. // Test data larger than typical part size
  19. testData := strings.Repeat("Hello, SSE-C multipart world! ", 1000) // ~30KB
  20. t.Run("Single part encryption/decryption", func(t *testing.T) {
  21. // Encrypt the data
  22. encryptedReader, iv, err := CreateSSECEncryptedReader(strings.NewReader(testData), customerKey)
  23. if err != nil {
  24. t.Fatalf("Failed to create encrypted reader: %v", err)
  25. }
  26. encryptedData, err := io.ReadAll(encryptedReader)
  27. if err != nil {
  28. t.Fatalf("Failed to read encrypted data: %v", err)
  29. }
  30. // Decrypt the data
  31. decryptedReader, err := CreateSSECDecryptedReader(bytes.NewReader(encryptedData), customerKey, iv)
  32. if err != nil {
  33. t.Fatalf("Failed to create decrypted reader: %v", err)
  34. }
  35. decryptedData, err := io.ReadAll(decryptedReader)
  36. if err != nil {
  37. t.Fatalf("Failed to read decrypted data: %v", err)
  38. }
  39. if string(decryptedData) != testData {
  40. t.Error("Decrypted data doesn't match original")
  41. }
  42. })
  43. t.Run("Simulated multipart upload parts", func(t *testing.T) {
  44. // Simulate multiple parts (each part gets encrypted separately)
  45. partSize := 5 * 1024 // 5KB parts
  46. var encryptedParts [][]byte
  47. var partIVs [][]byte
  48. for i := 0; i < len(testData); i += partSize {
  49. end := i + partSize
  50. if end > len(testData) {
  51. end = len(testData)
  52. }
  53. partData := testData[i:end]
  54. // Each part is encrypted separately in multipart uploads
  55. encryptedReader, iv, err := CreateSSECEncryptedReader(strings.NewReader(partData), customerKey)
  56. if err != nil {
  57. t.Fatalf("Failed to create encrypted reader for part %d: %v", i/partSize, err)
  58. }
  59. encryptedPart, err := io.ReadAll(encryptedReader)
  60. if err != nil {
  61. t.Fatalf("Failed to read encrypted part %d: %v", i/partSize, err)
  62. }
  63. encryptedParts = append(encryptedParts, encryptedPart)
  64. partIVs = append(partIVs, iv)
  65. }
  66. // Simulate reading back the multipart object
  67. var reconstructedData strings.Builder
  68. for i, encryptedPart := range encryptedParts {
  69. decryptedReader, err := CreateSSECDecryptedReader(bytes.NewReader(encryptedPart), customerKey, partIVs[i])
  70. if err != nil {
  71. t.Fatalf("Failed to create decrypted reader for part %d: %v", i, err)
  72. }
  73. decryptedPart, err := io.ReadAll(decryptedReader)
  74. if err != nil {
  75. t.Fatalf("Failed to read decrypted part %d: %v", i, err)
  76. }
  77. reconstructedData.Write(decryptedPart)
  78. }
  79. if reconstructedData.String() != testData {
  80. t.Error("Reconstructed multipart data doesn't match original")
  81. }
  82. })
  83. t.Run("Multipart with different part sizes", func(t *testing.T) {
  84. partSizes := []int{1024, 2048, 4096, 8192} // Various part sizes
  85. for _, partSize := range partSizes {
  86. t.Run(fmt.Sprintf("PartSize_%d", partSize), func(t *testing.T) {
  87. var encryptedParts [][]byte
  88. var partIVs [][]byte
  89. for i := 0; i < len(testData); i += partSize {
  90. end := i + partSize
  91. if end > len(testData) {
  92. end = len(testData)
  93. }
  94. partData := testData[i:end]
  95. encryptedReader, iv, err := CreateSSECEncryptedReader(strings.NewReader(partData), customerKey)
  96. if err != nil {
  97. t.Fatalf("Failed to create encrypted reader: %v", err)
  98. }
  99. encryptedPart, err := io.ReadAll(encryptedReader)
  100. if err != nil {
  101. t.Fatalf("Failed to read encrypted part: %v", err)
  102. }
  103. encryptedParts = append(encryptedParts, encryptedPart)
  104. partIVs = append(partIVs, iv)
  105. }
  106. // Verify reconstruction
  107. var reconstructedData strings.Builder
  108. for j, encryptedPart := range encryptedParts {
  109. decryptedReader, err := CreateSSECDecryptedReader(bytes.NewReader(encryptedPart), customerKey, partIVs[j])
  110. if err != nil {
  111. t.Fatalf("Failed to create decrypted reader: %v", err)
  112. }
  113. decryptedPart, err := io.ReadAll(decryptedReader)
  114. if err != nil {
  115. t.Fatalf("Failed to read decrypted part: %v", err)
  116. }
  117. reconstructedData.Write(decryptedPart)
  118. }
  119. if reconstructedData.String() != testData {
  120. t.Errorf("Reconstructed data doesn't match original for part size %d", partSize)
  121. }
  122. })
  123. }
  124. })
  125. }
  126. // TestSSEKMSMultipartUpload tests SSE-KMS with multipart uploads
  127. func TestSSEKMSMultipartUpload(t *testing.T) {
  128. kmsKey := SetupTestKMS(t)
  129. defer kmsKey.Cleanup()
  130. // Test data larger than typical part size
  131. testData := strings.Repeat("Hello, SSE-KMS multipart world! ", 1000) // ~30KB
  132. encryptionContext := BuildEncryptionContext("test-bucket", "test-object", false)
  133. t.Run("Single part encryption/decryption", func(t *testing.T) {
  134. // Encrypt the data
  135. encryptedReader, sseKey, err := CreateSSEKMSEncryptedReader(strings.NewReader(testData), kmsKey.KeyID, encryptionContext)
  136. if err != nil {
  137. t.Fatalf("Failed to create encrypted reader: %v", err)
  138. }
  139. encryptedData, err := io.ReadAll(encryptedReader)
  140. if err != nil {
  141. t.Fatalf("Failed to read encrypted data: %v", err)
  142. }
  143. // Decrypt the data
  144. decryptedReader, err := CreateSSEKMSDecryptedReader(bytes.NewReader(encryptedData), sseKey)
  145. if err != nil {
  146. t.Fatalf("Failed to create decrypted reader: %v", err)
  147. }
  148. decryptedData, err := io.ReadAll(decryptedReader)
  149. if err != nil {
  150. t.Fatalf("Failed to read decrypted data: %v", err)
  151. }
  152. if string(decryptedData) != testData {
  153. t.Error("Decrypted data doesn't match original")
  154. }
  155. })
  156. t.Run("Simulated multipart upload parts", func(t *testing.T) {
  157. // Simulate multiple parts (each part might use the same or different KMS operations)
  158. partSize := 5 * 1024 // 5KB parts
  159. var encryptedParts [][]byte
  160. var sseKeys []*SSEKMSKey
  161. for i := 0; i < len(testData); i += partSize {
  162. end := i + partSize
  163. if end > len(testData) {
  164. end = len(testData)
  165. }
  166. partData := testData[i:end]
  167. // Each part might get its own data key in KMS multipart uploads
  168. encryptedReader, sseKey, err := CreateSSEKMSEncryptedReader(strings.NewReader(partData), kmsKey.KeyID, encryptionContext)
  169. if err != nil {
  170. t.Fatalf("Failed to create encrypted reader for part %d: %v", i/partSize, err)
  171. }
  172. encryptedPart, err := io.ReadAll(encryptedReader)
  173. if err != nil {
  174. t.Fatalf("Failed to read encrypted part %d: %v", i/partSize, err)
  175. }
  176. encryptedParts = append(encryptedParts, encryptedPart)
  177. sseKeys = append(sseKeys, sseKey)
  178. }
  179. // Simulate reading back the multipart object
  180. var reconstructedData strings.Builder
  181. for i, encryptedPart := range encryptedParts {
  182. decryptedReader, err := CreateSSEKMSDecryptedReader(bytes.NewReader(encryptedPart), sseKeys[i])
  183. if err != nil {
  184. t.Fatalf("Failed to create decrypted reader for part %d: %v", i, err)
  185. }
  186. decryptedPart, err := io.ReadAll(decryptedReader)
  187. if err != nil {
  188. t.Fatalf("Failed to read decrypted part %d: %v", i, err)
  189. }
  190. reconstructedData.Write(decryptedPart)
  191. }
  192. if reconstructedData.String() != testData {
  193. t.Error("Reconstructed multipart data doesn't match original")
  194. }
  195. })
  196. t.Run("Multipart consistency checks", func(t *testing.T) {
  197. // Test that all parts use the same KMS key ID but different data keys
  198. partSize := 5 * 1024
  199. var sseKeys []*SSEKMSKey
  200. for i := 0; i < len(testData); i += partSize {
  201. end := i + partSize
  202. if end > len(testData) {
  203. end = len(testData)
  204. }
  205. partData := testData[i:end]
  206. _, sseKey, err := CreateSSEKMSEncryptedReader(strings.NewReader(partData), kmsKey.KeyID, encryptionContext)
  207. if err != nil {
  208. t.Fatalf("Failed to create encrypted reader: %v", err)
  209. }
  210. sseKeys = append(sseKeys, sseKey)
  211. }
  212. // Verify all parts use the same KMS key ID
  213. for i, sseKey := range sseKeys {
  214. if sseKey.KeyID != kmsKey.KeyID {
  215. t.Errorf("Part %d has wrong KMS key ID: expected %s, got %s", i, kmsKey.KeyID, sseKey.KeyID)
  216. }
  217. }
  218. // Verify each part has different encrypted data keys (they should be unique)
  219. for i := 0; i < len(sseKeys); i++ {
  220. for j := i + 1; j < len(sseKeys); j++ {
  221. if bytes.Equal(sseKeys[i].EncryptedDataKey, sseKeys[j].EncryptedDataKey) {
  222. t.Errorf("Parts %d and %d have identical encrypted data keys (should be unique)", i, j)
  223. }
  224. }
  225. }
  226. })
  227. }
  228. // TestMultipartSSEMixedScenarios tests edge cases with multipart and SSE
  229. func TestMultipartSSEMixedScenarios(t *testing.T) {
  230. t.Run("Empty parts handling", func(t *testing.T) {
  231. keyPair := GenerateTestSSECKey(1)
  232. customerKey := &SSECustomerKey{
  233. Algorithm: "AES256",
  234. Key: keyPair.Key,
  235. KeyMD5: keyPair.KeyMD5,
  236. }
  237. // Test empty part
  238. encryptedReader, iv, err := CreateSSECEncryptedReader(strings.NewReader(""), customerKey)
  239. if err != nil {
  240. t.Fatalf("Failed to create encrypted reader for empty data: %v", err)
  241. }
  242. encryptedData, err := io.ReadAll(encryptedReader)
  243. if err != nil {
  244. t.Fatalf("Failed to read encrypted empty data: %v", err)
  245. }
  246. // Empty part should produce empty encrypted data, but still have a valid IV
  247. if len(encryptedData) != 0 {
  248. t.Errorf("Expected empty encrypted data for empty part, got %d bytes", len(encryptedData))
  249. }
  250. if len(iv) != s3_constants.AESBlockSize {
  251. t.Errorf("Expected IV of size %d, got %d", s3_constants.AESBlockSize, len(iv))
  252. }
  253. // Decrypt and verify
  254. decryptedReader, err := CreateSSECDecryptedReader(bytes.NewReader(encryptedData), customerKey, iv)
  255. if err != nil {
  256. t.Fatalf("Failed to create decrypted reader for empty data: %v", err)
  257. }
  258. decryptedData, err := io.ReadAll(decryptedReader)
  259. if err != nil {
  260. t.Fatalf("Failed to read decrypted empty data: %v", err)
  261. }
  262. if len(decryptedData) != 0 {
  263. t.Errorf("Expected empty decrypted data, got %d bytes", len(decryptedData))
  264. }
  265. })
  266. t.Run("Single byte parts", func(t *testing.T) {
  267. keyPair := GenerateTestSSECKey(1)
  268. customerKey := &SSECustomerKey{
  269. Algorithm: "AES256",
  270. Key: keyPair.Key,
  271. KeyMD5: keyPair.KeyMD5,
  272. }
  273. testData := "ABCDEFGHIJ"
  274. var encryptedParts [][]byte
  275. var partIVs [][]byte
  276. // Encrypt each byte as a separate part
  277. for i, b := range []byte(testData) {
  278. partData := string(b)
  279. encryptedReader, iv, err := CreateSSECEncryptedReader(strings.NewReader(partData), customerKey)
  280. if err != nil {
  281. t.Fatalf("Failed to create encrypted reader for byte %d: %v", i, err)
  282. }
  283. encryptedPart, err := io.ReadAll(encryptedReader)
  284. if err != nil {
  285. t.Fatalf("Failed to read encrypted byte %d: %v", i, err)
  286. }
  287. encryptedParts = append(encryptedParts, encryptedPart)
  288. partIVs = append(partIVs, iv)
  289. }
  290. // Reconstruct
  291. var reconstructedData strings.Builder
  292. for i, encryptedPart := range encryptedParts {
  293. decryptedReader, err := CreateSSECDecryptedReader(bytes.NewReader(encryptedPart), customerKey, partIVs[i])
  294. if err != nil {
  295. t.Fatalf("Failed to create decrypted reader for byte %d: %v", i, err)
  296. }
  297. decryptedPart, err := io.ReadAll(decryptedReader)
  298. if err != nil {
  299. t.Fatalf("Failed to read decrypted byte %d: %v", i, err)
  300. }
  301. reconstructedData.Write(decryptedPart)
  302. }
  303. if reconstructedData.String() != testData {
  304. t.Errorf("Expected %s, got %s", testData, reconstructedData.String())
  305. }
  306. })
  307. t.Run("Very large parts", func(t *testing.T) {
  308. keyPair := GenerateTestSSECKey(1)
  309. customerKey := &SSECustomerKey{
  310. Algorithm: "AES256",
  311. Key: keyPair.Key,
  312. KeyMD5: keyPair.KeyMD5,
  313. }
  314. // Create a large part (1MB)
  315. largeData := make([]byte, 1024*1024)
  316. for i := range largeData {
  317. largeData[i] = byte(i % 256)
  318. }
  319. // Encrypt
  320. encryptedReader, iv, err := CreateSSECEncryptedReader(bytes.NewReader(largeData), customerKey)
  321. if err != nil {
  322. t.Fatalf("Failed to create encrypted reader for large data: %v", err)
  323. }
  324. encryptedData, err := io.ReadAll(encryptedReader)
  325. if err != nil {
  326. t.Fatalf("Failed to read encrypted large data: %v", err)
  327. }
  328. // Decrypt
  329. decryptedReader, err := CreateSSECDecryptedReader(bytes.NewReader(encryptedData), customerKey, iv)
  330. if err != nil {
  331. t.Fatalf("Failed to create decrypted reader for large data: %v", err)
  332. }
  333. decryptedData, err := io.ReadAll(decryptedReader)
  334. if err != nil {
  335. t.Fatalf("Failed to read decrypted large data: %v", err)
  336. }
  337. if !bytes.Equal(decryptedData, largeData) {
  338. t.Error("Large data doesn't match after encryption/decryption")
  339. }
  340. })
  341. }
  342. // TestMultipartSSEPerformance tests performance characteristics of SSE with multipart
  343. func TestMultipartSSEPerformance(t *testing.T) {
  344. if testing.Short() {
  345. t.Skip("Skipping performance test in short mode")
  346. }
  347. t.Run("SSE-C performance with multiple parts", func(t *testing.T) {
  348. keyPair := GenerateTestSSECKey(1)
  349. customerKey := &SSECustomerKey{
  350. Algorithm: "AES256",
  351. Key: keyPair.Key,
  352. KeyMD5: keyPair.KeyMD5,
  353. }
  354. partSize := 64 * 1024 // 64KB parts
  355. numParts := 10
  356. for partNum := 0; partNum < numParts; partNum++ {
  357. partData := make([]byte, partSize)
  358. for i := range partData {
  359. partData[i] = byte((partNum + i) % 256)
  360. }
  361. // Encrypt
  362. encryptedReader, iv, err := CreateSSECEncryptedReader(bytes.NewReader(partData), customerKey)
  363. if err != nil {
  364. t.Fatalf("Failed to create encrypted reader for part %d: %v", partNum, err)
  365. }
  366. encryptedData, err := io.ReadAll(encryptedReader)
  367. if err != nil {
  368. t.Fatalf("Failed to read encrypted data for part %d: %v", partNum, err)
  369. }
  370. // Decrypt
  371. decryptedReader, err := CreateSSECDecryptedReader(bytes.NewReader(encryptedData), customerKey, iv)
  372. if err != nil {
  373. t.Fatalf("Failed to create decrypted reader for part %d: %v", partNum, err)
  374. }
  375. decryptedData, err := io.ReadAll(decryptedReader)
  376. if err != nil {
  377. t.Fatalf("Failed to read decrypted data for part %d: %v", partNum, err)
  378. }
  379. if !bytes.Equal(decryptedData, partData) {
  380. t.Errorf("Data mismatch for part %d", partNum)
  381. }
  382. }
  383. })
  384. t.Run("SSE-KMS performance with multiple parts", func(t *testing.T) {
  385. kmsKey := SetupTestKMS(t)
  386. defer kmsKey.Cleanup()
  387. partSize := 64 * 1024 // 64KB parts
  388. numParts := 5 // Fewer parts for KMS due to overhead
  389. encryptionContext := BuildEncryptionContext("test-bucket", "test-object", false)
  390. for partNum := 0; partNum < numParts; partNum++ {
  391. partData := make([]byte, partSize)
  392. for i := range partData {
  393. partData[i] = byte((partNum + i) % 256)
  394. }
  395. // Encrypt
  396. encryptedReader, sseKey, err := CreateSSEKMSEncryptedReader(bytes.NewReader(partData), kmsKey.KeyID, encryptionContext)
  397. if err != nil {
  398. t.Fatalf("Failed to create encrypted reader for part %d: %v", partNum, err)
  399. }
  400. encryptedData, err := io.ReadAll(encryptedReader)
  401. if err != nil {
  402. t.Fatalf("Failed to read encrypted data for part %d: %v", partNum, err)
  403. }
  404. // Decrypt
  405. decryptedReader, err := CreateSSEKMSDecryptedReader(bytes.NewReader(encryptedData), sseKey)
  406. if err != nil {
  407. t.Fatalf("Failed to create decrypted reader for part %d: %v", partNum, err)
  408. }
  409. decryptedData, err := io.ReadAll(decryptedReader)
  410. if err != nil {
  411. t.Fatalf("Failed to read decrypted data for part %d: %v", partNum, err)
  412. }
  413. if !bytes.Equal(decryptedData, partData) {
  414. t.Errorf("Data mismatch for part %d", partNum)
  415. }
  416. }
  417. })
  418. }