@ -443,4 +443,3 @@ func TestSSEMultipartRangeRequestsServerBehavior(t *testing.T) {
assert.Equal(t, expectedData, bodyBytes,
"Cross-part range content must be correctly decrypted and assembled")
}
@ -265,4 +265,3 @@ uploadLoop:
SmallContent: nil,
}, nil
@ -310,4 +310,3 @@ func TestUploadReaderInChunksReaderFailure(t *testing.T) {
t.Logf("✓ Got partial result on read failure: chunks=%d, totalSize=%d",
len(result.FileChunks), result.TotalSize)
@ -236,4 +236,3 @@ func getMapKeys(m map[string]interface{}) []string {
return keys
@ -611,4 +611,3 @@ func TestConvertPolicyDocumentWithId(t *testing.T) {
t.Errorf("Expected 1 statement, got %d", len(dest.Statement))
@ -264,4 +264,3 @@ func TestSSES3EncryptionConsistency(t *testing.T) {
t.Error("Second decryption should also work with fresh stream")
@ -123,4 +123,3 @@ func TestBuildPrincipalARN(t *testing.T) {
})
@ -283,4 +283,3 @@ func BenchmarkHasChildrenCheck(b *testing.B) {
// Expected: ~1-5ms per call (one gRPC LIST request with Limit=1)
b.Skip("Benchmark - requires full filer setup")
@ -359,4 +359,3 @@ func TestSSEChunkMetadataComparison(t *testing.T) {
@ -187,4 +187,3 @@ func TestSSEDecryptionDifferences(t *testing.T) {
// This test documents the critical differences and serves as executable documentation
@ -255,4 +255,3 @@ func TestSSES3HeaderEncoding(t *testing.T) {
s3_constants.AESBlockSize, len(decodedBaseIV))
@ -222,4 +222,3 @@ func TestNoSilentCorruption(t *testing.T) {