|
|
|
@ -318,20 +318,29 @@ func TestRetentionModeCompliance(t *testing.T) { |
|
|
|
require.NoError(t, err) |
|
|
|
assert.Equal(t, types.ObjectLockRetentionModeCompliance, retentionResp.Retention.Mode) |
|
|
|
|
|
|
|
// Try to delete object with bypass - should still fail (compliance mode)
|
|
|
|
// Try simple DELETE - should succeed and create delete marker (AWS S3 behavior)
|
|
|
|
_, err = client.DeleteObject(context.TODO(), &s3.DeleteObjectInput{ |
|
|
|
Bucket: aws.String(bucketName), |
|
|
|
Key: aws.String(key), |
|
|
|
BypassGovernanceRetention: aws.Bool(true), |
|
|
|
Bucket: aws.String(bucketName), |
|
|
|
Key: aws.String(key), |
|
|
|
}) |
|
|
|
require.Error(t, err) |
|
|
|
require.NoError(t, err, "Simple DELETE should succeed and create delete marker") |
|
|
|
|
|
|
|
// Try to delete object without bypass - should also fail
|
|
|
|
// Try DELETE with version ID - should fail for COMPLIANCE mode
|
|
|
|
_, err = client.DeleteObject(context.TODO(), &s3.DeleteObjectInput{ |
|
|
|
Bucket: aws.String(bucketName), |
|
|
|
Key: aws.String(key), |
|
|
|
Bucket: aws.String(bucketName), |
|
|
|
Key: aws.String(key), |
|
|
|
VersionId: putResp.VersionId, |
|
|
|
}) |
|
|
|
require.Error(t, err) |
|
|
|
require.Error(t, err, "DELETE with version ID should be blocked by COMPLIANCE retention") |
|
|
|
|
|
|
|
// Try DELETE with version ID and bypass - should still fail (COMPLIANCE mode ignores bypass)
|
|
|
|
_, err = client.DeleteObject(context.TODO(), &s3.DeleteObjectInput{ |
|
|
|
Bucket: aws.String(bucketName), |
|
|
|
Key: aws.String(key), |
|
|
|
VersionId: putResp.VersionId, |
|
|
|
BypassGovernanceRetention: aws.Bool(true), |
|
|
|
}) |
|
|
|
require.Error(t, err, "COMPLIANCE mode should ignore governance bypass") |
|
|
|
} |
|
|
|
|
|
|
|
// TestLegalHoldWorkflow tests legal hold functionality
|
|
|
|
@ -368,12 +377,20 @@ func TestLegalHoldWorkflow(t *testing.T) { |
|
|
|
require.NoError(t, err) |
|
|
|
assert.Equal(t, types.ObjectLockLegalHoldStatusOn, legalHoldResp.LegalHold.Status) |
|
|
|
|
|
|
|
// Try to delete object - should fail due to legal hold
|
|
|
|
// Try simple DELETE - should succeed and create delete marker (AWS S3 behavior)
|
|
|
|
_, err = client.DeleteObject(context.TODO(), &s3.DeleteObjectInput{ |
|
|
|
Bucket: aws.String(bucketName), |
|
|
|
Key: aws.String(key), |
|
|
|
}) |
|
|
|
require.Error(t, err) |
|
|
|
require.NoError(t, err, "Simple DELETE should succeed and create delete marker") |
|
|
|
|
|
|
|
// Try DELETE with version ID - should fail due to legal hold
|
|
|
|
_, err = client.DeleteObject(context.TODO(), &s3.DeleteObjectInput{ |
|
|
|
Bucket: aws.String(bucketName), |
|
|
|
Key: aws.String(key), |
|
|
|
VersionId: putResp.VersionId, |
|
|
|
}) |
|
|
|
require.Error(t, err, "DELETE with version ID should be blocked by legal hold") |
|
|
|
|
|
|
|
// Remove legal hold
|
|
|
|
_, err = client.PutObjectLegalHold(context.TODO(), &s3.PutObjectLegalHoldInput{ |
|
|
|
@ -393,12 +410,13 @@ func TestLegalHoldWorkflow(t *testing.T) { |
|
|
|
require.NoError(t, err) |
|
|
|
assert.Equal(t, types.ObjectLockLegalHoldStatusOff, legalHoldResp.LegalHold.Status) |
|
|
|
|
|
|
|
// Now delete should succeed
|
|
|
|
// Now DELETE with version ID should succeed
|
|
|
|
_, err = client.DeleteObject(context.TODO(), &s3.DeleteObjectInput{ |
|
|
|
Bucket: aws.String(bucketName), |
|
|
|
Key: aws.String(key), |
|
|
|
Bucket: aws.String(bucketName), |
|
|
|
Key: aws.String(key), |
|
|
|
VersionId: putResp.VersionId, |
|
|
|
}) |
|
|
|
require.NoError(t, err) |
|
|
|
require.NoError(t, err, "DELETE with version ID should succeed after legal hold removed") |
|
|
|
} |
|
|
|
|
|
|
|
// TestObjectLockConfiguration tests bucket object lock configuration
|
|
|
|
@ -560,13 +578,21 @@ func TestRetentionAndLegalHoldCombination(t *testing.T) { |
|
|
|
}) |
|
|
|
require.NoError(t, err) |
|
|
|
|
|
|
|
// Try to delete with bypass governance - should still fail due to legal hold
|
|
|
|
// Try simple DELETE - should succeed and create delete marker (AWS S3 behavior)
|
|
|
|
_, err = client.DeleteObject(context.TODO(), &s3.DeleteObjectInput{ |
|
|
|
Bucket: aws.String(bucketName), |
|
|
|
Key: aws.String(key), |
|
|
|
}) |
|
|
|
require.NoError(t, err, "Simple DELETE should succeed and create delete marker") |
|
|
|
|
|
|
|
// Try DELETE with version ID and bypass - should still fail due to legal hold
|
|
|
|
_, err = client.DeleteObject(context.TODO(), &s3.DeleteObjectInput{ |
|
|
|
Bucket: aws.String(bucketName), |
|
|
|
Key: aws.String(key), |
|
|
|
VersionId: putResp.VersionId, |
|
|
|
BypassGovernanceRetention: aws.Bool(true), |
|
|
|
}) |
|
|
|
require.Error(t, err) |
|
|
|
require.Error(t, err, "Legal hold should prevent deletion even with governance bypass") |
|
|
|
|
|
|
|
// Remove legal hold
|
|
|
|
_, err = client.PutObjectLegalHold(context.TODO(), &s3.PutObjectLegalHoldInput{ |
|
|
|
@ -578,13 +604,14 @@ func TestRetentionAndLegalHoldCombination(t *testing.T) { |
|
|
|
}) |
|
|
|
require.NoError(t, err) |
|
|
|
|
|
|
|
// Now delete with bypass governance should succeed
|
|
|
|
// Now DELETE with version ID and bypass governance should succeed
|
|
|
|
_, err = client.DeleteObject(context.TODO(), &s3.DeleteObjectInput{ |
|
|
|
Bucket: aws.String(bucketName), |
|
|
|
Key: aws.String(key), |
|
|
|
VersionId: putResp.VersionId, |
|
|
|
BypassGovernanceRetention: aws.Bool(true), |
|
|
|
}) |
|
|
|
require.NoError(t, err) |
|
|
|
require.NoError(t, err, "DELETE with version ID should succeed after legal hold removed and with governance bypass") |
|
|
|
} |
|
|
|
|
|
|
|
// TestExpiredRetention tests that objects can be deleted after retention expires
|
|
|
|
|