2 changed files with 411 additions and 5 deletions
@ -0,0 +1,404 @@ |
|||
package sse_test |
|||
|
|||
import ( |
|||
"bytes" |
|||
"context" |
|||
"fmt" |
|||
"io" |
|||
"net/http" |
|||
"testing" |
|||
|
|||
"github.com/aws/aws-sdk-go-v2/aws" |
|||
"github.com/aws/aws-sdk-go-v2/service/s3" |
|||
s3types "github.com/aws/aws-sdk-go-v2/service/s3/types" |
|||
"github.com/stretchr/testify/assert" |
|||
"github.com/stretchr/testify/require" |
|||
) |
|||
|
|||
// TestSSECRangeRequestsServerBehavior tests that the server correctly handles Range requests
|
|||
// for SSE-C encrypted objects by checking actual HTTP response (not SDK-processed response)
|
|||
func TestSSECRangeRequestsServerBehavior(t *testing.T) { |
|||
ctx := context.Background() |
|||
client, err := createS3Client(ctx, defaultConfig) |
|||
require.NoError(t, err, "Failed to create S3 client") |
|||
|
|||
bucketName, err := createTestBucket(ctx, client, defaultConfig.BucketPrefix+"ssec-range-server-") |
|||
require.NoError(t, err, "Failed to create test bucket") |
|||
defer cleanupTestBucket(ctx, client, bucketName) |
|||
|
|||
sseKey := generateSSECKey() |
|||
testData := generateTestData(2048) // 2KB test file
|
|||
objectKey := "test-range-server-validation" |
|||
|
|||
// Upload with SSE-C
|
|||
_, err = client.PutObject(ctx, &s3.PutObjectInput{ |
|||
Bucket: aws.String(bucketName), |
|||
Key: aws.String(objectKey), |
|||
Body: bytes.NewReader(testData), |
|||
SSECustomerAlgorithm: aws.String("AES256"), |
|||
SSECustomerKey: aws.String(sseKey.KeyB64), |
|||
SSECustomerKeyMD5: aws.String(sseKey.KeyMD5), |
|||
}) |
|||
require.NoError(t, err, "Failed to upload SSE-C object") |
|||
|
|||
// Test cases for range requests
|
|||
testCases := []struct { |
|||
name string |
|||
rangeHeader string |
|||
expectedStart int64 |
|||
expectedEnd int64 |
|||
expectedTotal int64 |
|||
}{ |
|||
{ |
|||
name: "First 100 bytes", |
|||
rangeHeader: "bytes=0-99", |
|||
expectedStart: 0, |
|||
expectedEnd: 99, |
|||
expectedTotal: 2048, |
|||
}, |
|||
{ |
|||
name: "Middle range", |
|||
rangeHeader: "bytes=500-699", |
|||
expectedStart: 500, |
|||
expectedEnd: 699, |
|||
expectedTotal: 2048, |
|||
}, |
|||
{ |
|||
name: "Last 100 bytes", |
|||
rangeHeader: "bytes=1948-2047", |
|||
expectedStart: 1948, |
|||
expectedEnd: 2047, |
|||
expectedTotal: 2048, |
|||
}, |
|||
{ |
|||
name: "Single byte", |
|||
rangeHeader: "bytes=1000-1000", |
|||
expectedStart: 1000, |
|||
expectedEnd: 1000, |
|||
expectedTotal: 2048, |
|||
}, |
|||
{ |
|||
name: "AES block boundary crossing", |
|||
rangeHeader: "bytes=15-17", |
|||
expectedStart: 15, |
|||
expectedEnd: 17, |
|||
expectedTotal: 2048, |
|||
}, |
|||
{ |
|||
name: "Open-ended range", |
|||
rangeHeader: "bytes=2000-", |
|||
expectedStart: 2000, |
|||
expectedEnd: 2047, |
|||
expectedTotal: 2048, |
|||
}, |
|||
{ |
|||
name: "Suffix range (last 100 bytes)", |
|||
rangeHeader: "bytes=-100", |
|||
expectedStart: 1948, |
|||
expectedEnd: 2047, |
|||
expectedTotal: 2048, |
|||
}, |
|||
} |
|||
|
|||
for _, tc := range testCases { |
|||
t.Run(tc.name, func(t *testing.T) { |
|||
// Build object URL
|
|||
objectURL := fmt.Sprintf("http://%s/%s/%s", |
|||
defaultConfig.Endpoint, |
|||
bucketName, |
|||
objectKey, |
|||
) |
|||
|
|||
// Create raw HTTP request
|
|||
req, err := http.NewRequest("GET", objectURL, nil) |
|||
require.NoError(t, err, "Failed to create HTTP request") |
|||
|
|||
// Add Range header
|
|||
req.Header.Set("Range", tc.rangeHeader) |
|||
|
|||
// Add SSE-C headers
|
|||
req.Header.Set("x-amz-server-side-encryption-customer-algorithm", "AES256") |
|||
req.Header.Set("x-amz-server-side-encryption-customer-key", sseKey.KeyB64) |
|||
req.Header.Set("x-amz-server-side-encryption-customer-key-MD5", sseKey.KeyMD5) |
|||
|
|||
// Make request with raw HTTP client
|
|||
httpClient := &http.Client{} |
|||
resp, err := httpClient.Do(req) |
|||
require.NoError(t, err, "Failed to execute range request") |
|||
defer resp.Body.Close() |
|||
|
|||
// CRITICAL CHECK 1: Status code must be 206 Partial Content
|
|||
assert.Equal(t, http.StatusPartialContent, resp.StatusCode, |
|||
"Server must return 206 Partial Content for range request, got %d", resp.StatusCode) |
|||
|
|||
// CRITICAL CHECK 2: Content-Range header must be present and correct
|
|||
expectedContentRange := fmt.Sprintf("bytes %d-%d/%d", |
|||
tc.expectedStart, tc.expectedEnd, tc.expectedTotal) |
|||
actualContentRange := resp.Header.Get("Content-Range") |
|||
assert.Equal(t, expectedContentRange, actualContentRange, |
|||
"Content-Range header mismatch") |
|||
|
|||
// CRITICAL CHECK 3: Content-Length must match requested range size
|
|||
expectedLength := tc.expectedEnd - tc.expectedStart + 1 |
|||
actualLength := resp.ContentLength |
|||
assert.Equal(t, expectedLength, actualLength, |
|||
"Content-Length mismatch: expected %d, got %d", expectedLength, actualLength) |
|||
|
|||
// CRITICAL CHECK 4: Actual bytes received from network
|
|||
bodyBytes, err := io.ReadAll(resp.Body) |
|||
require.NoError(t, err, "Failed to read response body") |
|||
assert.Equal(t, int(expectedLength), len(bodyBytes), |
|||
"Actual bytes received from server mismatch: expected %d, got %d", |
|||
expectedLength, len(bodyBytes)) |
|||
|
|||
// CRITICAL CHECK 5: Verify decrypted content matches expected range
|
|||
expectedData := testData[tc.expectedStart : tc.expectedEnd+1] |
|||
assert.Equal(t, expectedData, bodyBytes, |
|||
"Decrypted range content doesn't match expected data") |
|||
|
|||
// Verify SSE-C headers are present in response
|
|||
assert.Equal(t, "AES256", resp.Header.Get("x-amz-server-side-encryption-customer-algorithm"), |
|||
"SSE-C algorithm header missing in range response") |
|||
assert.Equal(t, sseKey.KeyMD5, resp.Header.Get("x-amz-server-side-encryption-customer-key-MD5"), |
|||
"SSE-C key MD5 header missing in range response") |
|||
}) |
|||
} |
|||
} |
|||
|
|||
// TestSSEKMSRangeRequestsServerBehavior tests server-side Range handling for SSE-KMS
|
|||
func TestSSEKMSRangeRequestsServerBehavior(t *testing.T) { |
|||
ctx := context.Background() |
|||
client, err := createS3Client(ctx, defaultConfig) |
|||
require.NoError(t, err, "Failed to create S3 client") |
|||
|
|||
bucketName, err := createTestBucket(ctx, client, defaultConfig.BucketPrefix+"ssekms-range-server-") |
|||
require.NoError(t, err, "Failed to create test bucket") |
|||
defer cleanupTestBucket(ctx, client, bucketName) |
|||
|
|||
kmsKeyID := "test-range-key" |
|||
testData := generateTestData(4096) // 4KB test file
|
|||
objectKey := "test-kms-range-server-validation" |
|||
|
|||
// Upload with SSE-KMS
|
|||
_, err = client.PutObject(ctx, &s3.PutObjectInput{ |
|||
Bucket: aws.String(bucketName), |
|||
Key: aws.String(objectKey), |
|||
Body: bytes.NewReader(testData), |
|||
ServerSideEncryption: "aws:kms", |
|||
SSEKMSKeyId: aws.String(kmsKeyID), |
|||
}) |
|||
require.NoError(t, err, "Failed to upload SSE-KMS object") |
|||
|
|||
// Test various ranges
|
|||
testCases := []struct { |
|||
name string |
|||
rangeHeader string |
|||
start int64 |
|||
end int64 |
|||
}{ |
|||
{"First KB", "bytes=0-1023", 0, 1023}, |
|||
{"Second KB", "bytes=1024-2047", 1024, 2047}, |
|||
{"Last KB", "bytes=3072-4095", 3072, 4095}, |
|||
{"Unaligned range", "bytes=100-299", 100, 299}, |
|||
} |
|||
|
|||
for _, tc := range testCases { |
|||
t.Run(tc.name, func(t *testing.T) { |
|||
objectURL := fmt.Sprintf("http://%s/%s/%s", |
|||
defaultConfig.Endpoint, |
|||
bucketName, |
|||
objectKey, |
|||
) |
|||
|
|||
req, err := http.NewRequest("GET", objectURL, nil) |
|||
require.NoError(t, err) |
|||
req.Header.Set("Range", tc.rangeHeader) |
|||
|
|||
httpClient := &http.Client{} |
|||
resp, err := httpClient.Do(req) |
|||
require.NoError(t, err) |
|||
defer resp.Body.Close() |
|||
|
|||
// Verify 206 status
|
|||
assert.Equal(t, http.StatusPartialContent, resp.StatusCode, |
|||
"SSE-KMS range request must return 206, got %d", resp.StatusCode) |
|||
|
|||
// Verify Content-Range
|
|||
expectedContentRange := fmt.Sprintf("bytes %d-%d/%d", tc.start, tc.end, int64(len(testData))) |
|||
assert.Equal(t, expectedContentRange, resp.Header.Get("Content-Range")) |
|||
|
|||
// Verify actual bytes received
|
|||
bodyBytes, err := io.ReadAll(resp.Body) |
|||
require.NoError(t, err) |
|||
expectedLength := tc.end - tc.start + 1 |
|||
assert.Equal(t, int(expectedLength), len(bodyBytes), |
|||
"Actual network bytes mismatch") |
|||
|
|||
// Verify content
|
|||
expectedData := testData[tc.start : tc.end+1] |
|||
assert.Equal(t, expectedData, bodyBytes) |
|||
}) |
|||
} |
|||
} |
|||
|
|||
// TestSSES3RangeRequestsServerBehavior tests server-side Range handling for SSE-S3
|
|||
func TestSSES3RangeRequestsServerBehavior(t *testing.T) { |
|||
ctx := context.Background() |
|||
client, err := createS3Client(ctx, defaultConfig) |
|||
require.NoError(t, err, "Failed to create S3 client") |
|||
|
|||
bucketName, err := createTestBucket(ctx, client, "sses3-range-server") |
|||
require.NoError(t, err, "Failed to create test bucket") |
|||
defer cleanupTestBucket(ctx, client, bucketName) |
|||
|
|||
testData := generateTestData(8192) // 8KB test file
|
|||
objectKey := "test-s3-range-server-validation" |
|||
|
|||
// Upload with SSE-S3
|
|||
_, err = client.PutObject(ctx, &s3.PutObjectInput{ |
|||
Bucket: aws.String(bucketName), |
|||
Key: aws.String(objectKey), |
|||
Body: bytes.NewReader(testData), |
|||
ServerSideEncryption: "AES256", |
|||
}) |
|||
require.NoError(t, err, "Failed to upload SSE-S3 object") |
|||
|
|||
// Test range request
|
|||
objectURL := fmt.Sprintf("http://%s/%s/%s", |
|||
defaultConfig.Endpoint, |
|||
bucketName, |
|||
objectKey, |
|||
) |
|||
|
|||
req, err := http.NewRequest("GET", objectURL, nil) |
|||
require.NoError(t, err) |
|||
req.Header.Set("Range", "bytes=1000-1999") |
|||
|
|||
httpClient := &http.Client{} |
|||
resp, err := httpClient.Do(req) |
|||
require.NoError(t, err) |
|||
defer resp.Body.Close() |
|||
|
|||
// Verify server response
|
|||
assert.Equal(t, http.StatusPartialContent, resp.StatusCode) |
|||
assert.Equal(t, "bytes 1000-1999/8192", resp.Header.Get("Content-Range")) |
|||
assert.Equal(t, int64(1000), resp.ContentLength) |
|||
|
|||
bodyBytes, err := io.ReadAll(resp.Body) |
|||
require.NoError(t, err) |
|||
assert.Equal(t, 1000, len(bodyBytes)) |
|||
assert.Equal(t, testData[1000:2000], bodyBytes) |
|||
} |
|||
|
|||
// TestSSEMultipartRangeRequestsServerBehavior tests Range requests on multipart encrypted objects
|
|||
func TestSSEMultipartRangeRequestsServerBehavior(t *testing.T) { |
|||
ctx := context.Background() |
|||
client, err := createS3Client(ctx, defaultConfig) |
|||
require.NoError(t, err) |
|||
|
|||
bucketName, err := createTestBucket(ctx, client, defaultConfig.BucketPrefix+"ssec-mp-range-") |
|||
require.NoError(t, err) |
|||
defer cleanupTestBucket(ctx, client, bucketName) |
|||
|
|||
sseKey := generateSSECKey() |
|||
objectKey := "test-multipart-range-server" |
|||
|
|||
// Create 10MB test data (2 parts of 5MB each)
|
|||
partSize := 5 * 1024 * 1024 |
|||
part1Data := generateTestData(partSize) |
|||
part2Data := generateTestData(partSize) |
|||
fullData := append(part1Data, part2Data...) |
|||
|
|||
// Initiate multipart upload
|
|||
createResp, err := client.CreateMultipartUpload(ctx, &s3.CreateMultipartUploadInput{ |
|||
Bucket: aws.String(bucketName), |
|||
Key: aws.String(objectKey), |
|||
SSECustomerAlgorithm: aws.String("AES256"), |
|||
SSECustomerKey: aws.String(sseKey.KeyB64), |
|||
SSECustomerKeyMD5: aws.String(sseKey.KeyMD5), |
|||
}) |
|||
require.NoError(t, err) |
|||
uploadID := aws.ToString(createResp.UploadId) |
|||
|
|||
// Upload part 1
|
|||
part1Resp, err := client.UploadPart(ctx, &s3.UploadPartInput{ |
|||
Bucket: aws.String(bucketName), |
|||
Key: aws.String(objectKey), |
|||
UploadId: aws.String(uploadID), |
|||
PartNumber: aws.Int32(1), |
|||
Body: bytes.NewReader(part1Data), |
|||
SSECustomerAlgorithm: aws.String("AES256"), |
|||
SSECustomerKey: aws.String(sseKey.KeyB64), |
|||
SSECustomerKeyMD5: aws.String(sseKey.KeyMD5), |
|||
}) |
|||
require.NoError(t, err) |
|||
|
|||
// Upload part 2
|
|||
part2Resp, err := client.UploadPart(ctx, &s3.UploadPartInput{ |
|||
Bucket: aws.String(bucketName), |
|||
Key: aws.String(objectKey), |
|||
UploadId: aws.String(uploadID), |
|||
PartNumber: aws.Int32(2), |
|||
Body: bytes.NewReader(part2Data), |
|||
SSECustomerAlgorithm: aws.String("AES256"), |
|||
SSECustomerKey: aws.String(sseKey.KeyB64), |
|||
SSECustomerKeyMD5: aws.String(sseKey.KeyMD5), |
|||
}) |
|||
require.NoError(t, err) |
|||
|
|||
// Complete multipart upload
|
|||
_, err = client.CompleteMultipartUpload(ctx, &s3.CompleteMultipartUploadInput{ |
|||
Bucket: aws.String(bucketName), |
|||
Key: aws.String(objectKey), |
|||
UploadId: aws.String(uploadID), |
|||
MultipartUpload: &s3types.CompletedMultipartUpload{ |
|||
Parts: []s3types.CompletedPart{ |
|||
{PartNumber: aws.Int32(1), ETag: part1Resp.ETag}, |
|||
{PartNumber: aws.Int32(2), ETag: part2Resp.ETag}, |
|||
}, |
|||
}, |
|||
}) |
|||
require.NoError(t, err) |
|||
|
|||
// Test range that crosses part boundary
|
|||
objectURL := fmt.Sprintf("http://%s/%s/%s", |
|||
defaultConfig.Endpoint, |
|||
bucketName, |
|||
objectKey, |
|||
) |
|||
|
|||
// Range spanning across the part boundary
|
|||
start := int64(partSize - 1000) |
|||
end := int64(partSize + 1000) |
|||
|
|||
req, err := http.NewRequest("GET", objectURL, nil) |
|||
require.NoError(t, err) |
|||
req.Header.Set("Range", fmt.Sprintf("bytes=%d-%d", start, end)) |
|||
req.Header.Set("x-amz-server-side-encryption-customer-algorithm", "AES256") |
|||
req.Header.Set("x-amz-server-side-encryption-customer-key", sseKey.KeyB64) |
|||
req.Header.Set("x-amz-server-side-encryption-customer-key-MD5", sseKey.KeyMD5) |
|||
|
|||
httpClient := &http.Client{} |
|||
resp, err := httpClient.Do(req) |
|||
require.NoError(t, err) |
|||
defer resp.Body.Close() |
|||
|
|||
// Verify server behavior for cross-part range
|
|||
assert.Equal(t, http.StatusPartialContent, resp.StatusCode, |
|||
"Multipart range request must return 206") |
|||
|
|||
expectedLength := end - start + 1 |
|||
assert.Equal(t, expectedLength, resp.ContentLength, |
|||
"Content-Length for cross-part range") |
|||
|
|||
bodyBytes, err := io.ReadAll(resp.Body) |
|||
require.NoError(t, err) |
|||
assert.Equal(t, int(expectedLength), len(bodyBytes), |
|||
"Actual bytes for cross-part range") |
|||
|
|||
// Verify content spans the part boundary correctly
|
|||
expectedData := fullData[start : end+1] |
|||
assert.Equal(t, expectedData, bodyBytes, |
|||
"Cross-part range content must be correctly decrypted and assembled") |
|||
} |
|||
|
|||
Write
Preview
Loading…
Cancel
Save
Reference in new issue