You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
 
 
 
 
 
 

861 lines
30 KiB

package s3api
import (
"context"
"fmt"
"sort"
"strings"
"sync"
"testing"
"time"
"github.com/aws/aws-sdk-go-v2/aws"
"github.com/aws/aws-sdk-go-v2/config"
"github.com/aws/aws-sdk-go-v2/credentials"
"github.com/aws/aws-sdk-go-v2/service/s3"
"github.com/aws/aws-sdk-go-v2/service/s3/types"
"github.com/stretchr/testify/assert"
"github.com/stretchr/testify/require"
)
// TestListObjectVersionsIncludesDirectories tests that directories are included in list-object-versions response
// This ensures compatibility with Minio and AWS S3 behavior
func TestListObjectVersionsIncludesDirectories(t *testing.T) {
bucketName := "test-versioning-directories"
client := setupS3Client(t)
// Create bucket
_, err := client.CreateBucket(context.TODO(), &s3.CreateBucketInput{
Bucket: aws.String(bucketName),
})
require.NoError(t, err)
// Clean up
defer func() {
cleanupBucket(t, client, bucketName)
}()
// Enable versioning
_, err = client.PutBucketVersioning(context.TODO(), &s3.PutBucketVersioningInput{
Bucket: aws.String(bucketName),
VersioningConfiguration: &types.VersioningConfiguration{
Status: types.BucketVersioningStatusEnabled,
},
})
require.NoError(t, err)
// First create explicit directory objects (keys ending with "/")
// These are the directories that should appear in list-object-versions
explicitDirectories := []string{
"Veeam/",
"Veeam/Archive/",
"Veeam/Archive/vbr/",
"Veeam/Backup/",
"Veeam/Backup/vbr/",
"Veeam/Backup/vbr/Clients/",
}
// Create explicit directory objects
for _, dirKey := range explicitDirectories {
_, err := client.PutObject(context.TODO(), &s3.PutObjectInput{
Bucket: aws.String(bucketName),
Key: aws.String(dirKey),
Body: strings.NewReader(""), // Empty content for directories
})
require.NoError(t, err, "Failed to create directory object %s", dirKey)
}
// Now create some test files
testFiles := []string{
"Veeam/test-file.txt",
"Veeam/Archive/test-file2.txt",
"Veeam/Archive/vbr/test-file3.txt",
"Veeam/Backup/test-file4.txt",
"Veeam/Backup/vbr/test-file5.txt",
"Veeam/Backup/vbr/Clients/test-file6.txt",
}
// Upload test files
for _, objectKey := range testFiles {
_, err := client.PutObject(context.TODO(), &s3.PutObjectInput{
Bucket: aws.String(bucketName),
Key: aws.String(objectKey),
Body: strings.NewReader("test content"),
})
require.NoError(t, err, "Failed to create file %s", objectKey)
}
// List object versions
listResp, err := client.ListObjectVersions(context.TODO(), &s3.ListObjectVersionsInput{
Bucket: aws.String(bucketName),
})
require.NoError(t, err)
// Extract all keys from versions
var allKeys []string
for _, version := range listResp.Versions {
allKeys = append(allKeys, *version.Key)
}
// Expected directories that should be included (with trailing slash)
expectedDirectories := []string{
"Veeam/",
"Veeam/Archive/",
"Veeam/Archive/vbr/",
"Veeam/Backup/",
"Veeam/Backup/vbr/",
"Veeam/Backup/vbr/Clients/",
}
// Verify that directories are included in the response
t.Logf("Found %d total versions", len(listResp.Versions))
t.Logf("All keys: %v", allKeys)
for _, expectedDir := range expectedDirectories {
found := false
for _, version := range listResp.Versions {
if *version.Key == expectedDir {
found = true
// Verify directory properties
assert.Equal(t, "null", *version.VersionId, "Directory %s should have VersionId 'null'", expectedDir)
assert.Equal(t, int64(0), *version.Size, "Directory %s should have size 0", expectedDir)
assert.True(t, *version.IsLatest, "Directory %s should be marked as latest", expectedDir)
assert.Equal(t, "\"d41d8cd98f00b204e9800998ecf8427e\"", *version.ETag, "Directory %s should have MD5 of empty string as ETag", expectedDir)
assert.Equal(t, types.ObjectStorageClassStandard, version.StorageClass, "Directory %s should have STANDARD storage class", expectedDir)
break
}
}
assert.True(t, found, "Directory %s should be included in list-object-versions response", expectedDir)
}
// Also verify that actual files are included
for _, objectKey := range testFiles {
found := false
for _, version := range listResp.Versions {
if *version.Key == objectKey {
found = true
assert.NotEqual(t, "null", *version.VersionId, "File %s should have a real version ID", objectKey)
assert.Greater(t, *version.Size, int64(0), "File %s should have size > 0", objectKey)
break
}
}
assert.True(t, found, "File %s should be included in list-object-versions response", objectKey)
}
// Count directories vs files
directoryCount := 0
fileCount := 0
for _, version := range listResp.Versions {
if strings.HasSuffix(*version.Key, "/") && *version.Size == 0 && *version.VersionId == "null" {
directoryCount++
} else {
fileCount++
}
}
t.Logf("Found %d directories and %d files", directoryCount, fileCount)
assert.Equal(t, len(expectedDirectories), directoryCount, "Should find exactly %d directories", len(expectedDirectories))
assert.Equal(t, len(testFiles), fileCount, "Should find exactly %d files", len(testFiles))
}
// TestListObjectVersionsDeleteMarkers tests that delete markers are properly separated from versions
// This test verifies the fix for the issue where delete markers were incorrectly categorized as versions
func TestListObjectVersionsDeleteMarkers(t *testing.T) {
bucketName := "test-delete-markers"
client := setupS3Client(t)
// Create bucket
_, err := client.CreateBucket(context.TODO(), &s3.CreateBucketInput{
Bucket: aws.String(bucketName),
})
require.NoError(t, err)
// Clean up
defer func() {
cleanupBucket(t, client, bucketName)
}()
// Enable versioning
_, err = client.PutBucketVersioning(context.TODO(), &s3.PutBucketVersioningInput{
Bucket: aws.String(bucketName),
VersioningConfiguration: &types.VersioningConfiguration{
Status: types.BucketVersioningStatusEnabled,
},
})
require.NoError(t, err)
objectKey := "test1/a"
// 1. Create one version of the file
_, err = client.PutObject(context.TODO(), &s3.PutObjectInput{
Bucket: aws.String(bucketName),
Key: aws.String(objectKey),
Body: strings.NewReader("test content"),
})
require.NoError(t, err)
// 2. Delete the object 3 times to create 3 delete markers
for i := 0; i < 3; i++ {
_, err = client.DeleteObject(context.TODO(), &s3.DeleteObjectInput{
Bucket: aws.String(bucketName),
Key: aws.String(objectKey),
})
require.NoError(t, err)
}
// 3. List object versions and verify the response structure
listResp, err := client.ListObjectVersions(context.TODO(), &s3.ListObjectVersionsInput{
Bucket: aws.String(bucketName),
})
require.NoError(t, err)
// 4. Verify that we have exactly 1 version and 3 delete markers
assert.Len(t, listResp.Versions, 1, "Should have exactly 1 file version")
assert.Len(t, listResp.DeleteMarkers, 3, "Should have exactly 3 delete markers")
// 5. Verify the version is for our test file
version := listResp.Versions[0]
assert.Equal(t, objectKey, *version.Key, "Version should be for our test file")
assert.NotEqual(t, "null", *version.VersionId, "File version should have a real version ID")
assert.Greater(t, *version.Size, int64(0), "File version should have size > 0")
// 6. Verify all delete markers are for our test file
for i, deleteMarker := range listResp.DeleteMarkers {
assert.Equal(t, objectKey, *deleteMarker.Key, "Delete marker %d should be for our test file", i)
assert.NotEqual(t, "null", *deleteMarker.VersionId, "Delete marker %d should have a real version ID", i)
}
t.Logf("Successfully verified: 1 version + 3 delete markers for object %s", objectKey)
}
// TestVersionedObjectAcl tests that ACL operations work correctly on objects in versioned buckets
// This test verifies the fix for the NoSuchKey error when getting ACLs for objects in versioned buckets
func TestVersionedObjectAcl(t *testing.T) {
bucketName := "test-versioned-acl"
client := setupS3Client(t)
// Create bucket
_, err := client.CreateBucket(context.TODO(), &s3.CreateBucketInput{
Bucket: aws.String(bucketName),
})
require.NoError(t, err)
// Clean up
defer func() {
cleanupBucket(t, client, bucketName)
}()
// Enable versioning
_, err = client.PutBucketVersioning(context.TODO(), &s3.PutBucketVersioningInput{
Bucket: aws.String(bucketName),
VersioningConfiguration: &types.VersioningConfiguration{
Status: types.BucketVersioningStatusEnabled,
},
})
require.NoError(t, err)
objectKey := "test-acl-object"
// Create an object in the versioned bucket
putResp, err := client.PutObject(context.TODO(), &s3.PutObjectInput{
Bucket: aws.String(bucketName),
Key: aws.String(objectKey),
Body: strings.NewReader("test content for ACL"),
})
require.NoError(t, err)
require.NotNil(t, putResp.VersionId, "Object should have a version ID")
// Test 1: Get ACL for the object (without specifying version ID - should get latest version)
getAclResp, err := client.GetObjectAcl(context.TODO(), &s3.GetObjectAclInput{
Bucket: aws.String(bucketName),
Key: aws.String(objectKey),
})
require.NoError(t, err, "Should be able to get ACL for object in versioned bucket")
require.NotNil(t, getAclResp.Owner, "ACL response should have owner information")
// Test 2: Get ACL for specific version ID
getAclVersionResp, err := client.GetObjectAcl(context.TODO(), &s3.GetObjectAclInput{
Bucket: aws.String(bucketName),
Key: aws.String(objectKey),
VersionId: putResp.VersionId,
})
require.NoError(t, err, "Should be able to get ACL for specific version")
require.NotNil(t, getAclVersionResp.Owner, "Versioned ACL response should have owner information")
// Test 3: Verify both ACL responses are the same (same object, same version)
assert.Equal(t, getAclResp.Owner.ID, getAclVersionResp.Owner.ID, "Owner ID should match for latest and specific version")
// Test 4: Create another version of the same object
putResp2, err := client.PutObject(context.TODO(), &s3.PutObjectInput{
Bucket: aws.String(bucketName),
Key: aws.String(objectKey),
Body: strings.NewReader("updated content for ACL"),
})
require.NoError(t, err)
require.NotNil(t, putResp2.VersionId, "Second object version should have a version ID")
require.NotEqual(t, putResp.VersionId, putResp2.VersionId, "Version IDs should be different")
// Test 5: Get ACL for latest version (should be the second version)
getAclLatestResp, err := client.GetObjectAcl(context.TODO(), &s3.GetObjectAclInput{
Bucket: aws.String(bucketName),
Key: aws.String(objectKey),
})
require.NoError(t, err, "Should be able to get ACL for latest version after update")
require.NotNil(t, getAclLatestResp.Owner, "Latest ACL response should have owner information")
// Test 6: Get ACL for the first version specifically
getAclFirstResp, err := client.GetObjectAcl(context.TODO(), &s3.GetObjectAclInput{
Bucket: aws.String(bucketName),
Key: aws.String(objectKey),
VersionId: putResp.VersionId,
})
require.NoError(t, err, "Should be able to get ACL for first version specifically")
require.NotNil(t, getAclFirstResp.Owner, "First version ACL response should have owner information")
// Test 7: Verify we can put ACL on versioned objects
_, err = client.PutObjectAcl(context.TODO(), &s3.PutObjectAclInput{
Bucket: aws.String(bucketName),
Key: aws.String(objectKey),
ACL: types.ObjectCannedACLPrivate,
})
require.NoError(t, err, "Should be able to put ACL on versioned object")
t.Logf("Successfully verified ACL operations on versioned object %s with versions %s and %s",
objectKey, *putResp.VersionId, *putResp2.VersionId)
}
// TestConcurrentMultiObjectDelete tests that concurrent delete operations work correctly without race conditions
// This test verifies the fix for the race condition in deleteSpecificObjectVersion
func TestConcurrentMultiObjectDelete(t *testing.T) {
bucketName := "test-concurrent-delete"
numObjects := 5
numThreads := 5
client := setupS3Client(t)
// Create bucket
_, err := client.CreateBucket(context.TODO(), &s3.CreateBucketInput{
Bucket: aws.String(bucketName),
})
require.NoError(t, err)
// Clean up
defer func() {
cleanupBucket(t, client, bucketName)
}()
// Enable versioning
_, err = client.PutBucketVersioning(context.TODO(), &s3.PutBucketVersioningInput{
Bucket: aws.String(bucketName),
VersioningConfiguration: &types.VersioningConfiguration{
Status: types.BucketVersioningStatusEnabled,
},
})
require.NoError(t, err)
// Create objects
var objectKeys []string
var versionIds []string
for i := 0; i < numObjects; i++ {
objectKey := fmt.Sprintf("key_%d", i)
objectKeys = append(objectKeys, objectKey)
putResp, err := client.PutObject(context.TODO(), &s3.PutObjectInput{
Bucket: aws.String(bucketName),
Key: aws.String(objectKey),
Body: strings.NewReader(fmt.Sprintf("content for key_%d", i)),
})
require.NoError(t, err)
require.NotNil(t, putResp.VersionId)
versionIds = append(versionIds, *putResp.VersionId)
}
// Verify objects were created
listResp, err := client.ListObjectVersions(context.TODO(), &s3.ListObjectVersionsInput{
Bucket: aws.String(bucketName),
})
require.NoError(t, err)
assert.Len(t, listResp.Versions, numObjects, "Should have created %d objects", numObjects)
// Create delete objects request
var objectsToDelete []types.ObjectIdentifier
for i, objectKey := range objectKeys {
objectsToDelete = append(objectsToDelete, types.ObjectIdentifier{
Key: aws.String(objectKey),
VersionId: aws.String(versionIds[i]),
})
}
// Run concurrent delete operations
results := make([]*s3.DeleteObjectsOutput, numThreads)
var wg sync.WaitGroup
for i := 0; i < numThreads; i++ {
wg.Add(1)
go func(threadIdx int) {
defer wg.Done()
deleteResp, err := client.DeleteObjects(context.TODO(), &s3.DeleteObjectsInput{
Bucket: aws.String(bucketName),
Delete: &types.Delete{
Objects: objectsToDelete,
Quiet: aws.Bool(false),
},
})
if err != nil {
t.Errorf("Thread %d: delete objects failed: %v", threadIdx, err)
return
}
results[threadIdx] = deleteResp
}(i)
}
wg.Wait()
// Verify results
for i, result := range results {
require.NotNil(t, result, "Thread %d should have a result", i)
assert.Len(t, result.Deleted, numObjects, "Thread %d should have deleted all %d objects", i, numObjects)
if len(result.Errors) > 0 {
for _, deleteError := range result.Errors {
t.Errorf("Thread %d delete error: %s - %s (Key: %s, VersionId: %s)",
i, *deleteError.Code, *deleteError.Message, *deleteError.Key,
func() string {
if deleteError.VersionId != nil {
return *deleteError.VersionId
} else {
return "nil"
}
}())
}
}
assert.Empty(t, result.Errors, "Thread %d should have no delete errors", i)
}
// Verify objects are deleted (bucket should be empty)
finalListResp, err := client.ListObjects(context.TODO(), &s3.ListObjectsInput{
Bucket: aws.String(bucketName),
})
require.NoError(t, err)
assert.Nil(t, finalListResp.Contents, "Bucket should be empty after all deletions")
t.Logf("Successfully verified concurrent deletion of %d objects from %d threads", numObjects, numThreads)
}
// TestSuspendedVersioningDeleteBehavior tests that delete operations during suspended versioning
// actually delete the "null" version object rather than creating delete markers
func TestSuspendedVersioningDeleteBehavior(t *testing.T) {
bucketName := "test-suspended-versioning-delete"
objectKey := "testobj"
client := setupS3Client(t)
// Create bucket
_, err := client.CreateBucket(context.TODO(), &s3.CreateBucketInput{
Bucket: aws.String(bucketName),
})
require.NoError(t, err)
// Clean up
defer func() {
cleanupBucket(t, client, bucketName)
}()
// Enable versioning and create some versions
_, err = client.PutBucketVersioning(context.TODO(), &s3.PutBucketVersioningInput{
Bucket: aws.String(bucketName),
VersioningConfiguration: &types.VersioningConfiguration{
Status: types.BucketVersioningStatusEnabled,
},
})
require.NoError(t, err)
// Create 3 versions
var versionIds []string
for i := 0; i < 3; i++ {
putResp, err := client.PutObject(context.TODO(), &s3.PutObjectInput{
Bucket: aws.String(bucketName),
Key: aws.String(objectKey),
Body: strings.NewReader(fmt.Sprintf("content version %d", i+1)),
})
require.NoError(t, err)
require.NotNil(t, putResp.VersionId)
versionIds = append(versionIds, *putResp.VersionId)
}
// Verify 3 versions exist
listResp, err := client.ListObjectVersions(context.TODO(), &s3.ListObjectVersionsInput{
Bucket: aws.String(bucketName),
})
require.NoError(t, err)
assert.Len(t, listResp.Versions, 3, "Should have 3 versions initially")
// Suspend versioning
_, err = client.PutBucketVersioning(context.TODO(), &s3.PutBucketVersioningInput{
Bucket: aws.String(bucketName),
VersioningConfiguration: &types.VersioningConfiguration{
Status: types.BucketVersioningStatusSuspended,
},
})
require.NoError(t, err)
// Create a new object during suspended versioning (this should be a "null" version)
_, err = client.PutObject(context.TODO(), &s3.PutObjectInput{
Bucket: aws.String(bucketName),
Key: aws.String(objectKey),
Body: strings.NewReader("null version content"),
})
require.NoError(t, err)
// Verify we still have 3 versions + 1 null version = 4 total
listResp, err = client.ListObjectVersions(context.TODO(), &s3.ListObjectVersionsInput{
Bucket: aws.String(bucketName),
})
require.NoError(t, err)
assert.Len(t, listResp.Versions, 4, "Should have 3 versions + 1 null version")
// Find the null version
var nullVersionFound bool
for _, version := range listResp.Versions {
if *version.VersionId == "null" {
nullVersionFound = true
assert.True(t, *version.IsLatest, "Null version should be marked as latest during suspended versioning")
break
}
}
assert.True(t, nullVersionFound, "Should have found a null version")
// Delete the object during suspended versioning (should actually delete the null version)
_, err = client.DeleteObject(context.TODO(), &s3.DeleteObjectInput{
Bucket: aws.String(bucketName),
Key: aws.String(objectKey),
// No VersionId specified - should delete the "null" version during suspended versioning
})
require.NoError(t, err)
// Verify the null version was actually deleted (not a delete marker created)
listResp, err = client.ListObjectVersions(context.TODO(), &s3.ListObjectVersionsInput{
Bucket: aws.String(bucketName),
})
require.NoError(t, err)
assert.Len(t, listResp.Versions, 3, "Should be back to 3 versions after deleting null version")
assert.Empty(t, listResp.DeleteMarkers, "Should have no delete markers during suspended versioning delete")
// Verify null version is gone
nullVersionFound = false
for _, version := range listResp.Versions {
if *version.VersionId == "null" {
nullVersionFound = true
break
}
}
assert.False(t, nullVersionFound, "Null version should be deleted, not present")
// Create another null version and delete it multiple times to test idempotency
_, err = client.PutObject(context.TODO(), &s3.PutObjectInput{
Bucket: aws.String(bucketName),
Key: aws.String(objectKey),
Body: strings.NewReader("another null version"),
})
require.NoError(t, err)
// Delete it twice to test idempotency
for i := 0; i < 2; i++ {
_, err = client.DeleteObject(context.TODO(), &s3.DeleteObjectInput{
Bucket: aws.String(bucketName),
Key: aws.String(objectKey),
})
require.NoError(t, err, "Delete should be idempotent - iteration %d", i+1)
}
// Re-enable versioning
_, err = client.PutBucketVersioning(context.TODO(), &s3.PutBucketVersioningInput{
Bucket: aws.String(bucketName),
VersioningConfiguration: &types.VersioningConfiguration{
Status: types.BucketVersioningStatusEnabled,
},
})
require.NoError(t, err)
// Create a new version with versioning enabled
putResp, err := client.PutObject(context.TODO(), &s3.PutObjectInput{
Bucket: aws.String(bucketName),
Key: aws.String(objectKey),
Body: strings.NewReader("new version after re-enabling"),
})
require.NoError(t, err)
require.NotNil(t, putResp.VersionId)
// Now delete without version ID (should create delete marker)
deleteResp, err := client.DeleteObject(context.TODO(), &s3.DeleteObjectInput{
Bucket: aws.String(bucketName),
Key: aws.String(objectKey),
})
require.NoError(t, err)
assert.Equal(t, "true", deleteResp.DeleteMarker, "Should create delete marker when versioning is enabled")
// Verify final state
listResp, err = client.ListObjectVersions(context.TODO(), &s3.ListObjectVersionsInput{
Bucket: aws.String(bucketName),
})
require.NoError(t, err)
assert.Len(t, listResp.Versions, 4, "Should have 3 original versions + 1 new version")
assert.Len(t, listResp.DeleteMarkers, 1, "Should have 1 delete marker")
t.Logf("Successfully verified suspended versioning delete behavior")
}
// TestVersionedObjectListBehavior tests that list operations show logical object names for versioned objects
// and that owner information is properly extracted from S3 metadata
func TestVersionedObjectListBehavior(t *testing.T) {
bucketName := "test-versioned-list"
objectKey := "testfile"
client := setupS3Client(t)
// Create bucket with object lock enabled (which enables versioning)
_, err := client.CreateBucket(context.TODO(), &s3.CreateBucketInput{
Bucket: aws.String(bucketName),
ObjectLockEnabledForBucket: aws.Bool(true),
})
require.NoError(t, err)
// Clean up
defer func() {
cleanupBucket(t, client, bucketName)
}()
// Verify versioning is enabled
versioningResp, err := client.GetBucketVersioning(context.TODO(), &s3.GetBucketVersioningInput{
Bucket: aws.String(bucketName),
})
require.NoError(t, err)
assert.Equal(t, types.BucketVersioningStatusEnabled, versioningResp.Status, "Bucket versioning should be enabled")
// Create a versioned object
content := "test content for versioned object"
putResp, err := client.PutObject(context.TODO(), &s3.PutObjectInput{
Bucket: aws.String(bucketName),
Key: aws.String(objectKey),
Body: strings.NewReader(content),
})
require.NoError(t, err)
require.NotNil(t, putResp.VersionId)
versionId := *putResp.VersionId
t.Logf("Created versioned object with version ID: %s", versionId)
// Test list-objects operation - should show logical object name, not internal versioned path
listResp, err := client.ListObjects(context.TODO(), &s3.ListObjectsInput{
Bucket: aws.String(bucketName),
})
require.NoError(t, err)
require.Len(t, listResp.Contents, 1, "Should list exactly one object")
listedObject := listResp.Contents[0]
// Verify the object key is the logical name, not the internal versioned path
assert.Equal(t, objectKey, *listedObject.Key, "Should show logical object name, not internal versioned path")
assert.NotContains(t, *listedObject.Key, ".versions", "Object key should not contain .versions")
assert.NotContains(t, *listedObject.Key, versionId, "Object key should not contain version ID")
// Verify object properties
assert.Equal(t, int64(len(content)), listedObject.Size, "Object size should match")
assert.NotNil(t, listedObject.ETag, "Object should have ETag")
assert.NotNil(t, listedObject.LastModified, "Object should have LastModified")
// Verify owner information is present (even if anonymous)
require.NotNil(t, listedObject.Owner, "Object should have Owner information")
assert.NotEmpty(t, listedObject.Owner.ID, "Owner ID should not be empty")
assert.NotEmpty(t, listedObject.Owner.DisplayName, "Owner DisplayName should not be empty")
t.Logf("Listed object: Key=%s, Size=%d, Owner.ID=%s, Owner.DisplayName=%s",
*listedObject.Key, listedObject.Size, *listedObject.Owner.ID, *listedObject.Owner.DisplayName)
// Test list-objects-v2 operation as well
listV2Resp, err := client.ListObjectsV2(context.TODO(), &s3.ListObjectsV2Input{
Bucket: aws.String(bucketName),
FetchOwner: aws.Bool(true), // Explicitly request owner information
})
require.NoError(t, err)
require.Len(t, listV2Resp.Contents, 1, "ListObjectsV2 should also list exactly one object")
listedObjectV2 := listV2Resp.Contents[0]
assert.Equal(t, objectKey, *listedObjectV2.Key, "ListObjectsV2 should also show logical object name")
assert.NotNil(t, listedObjectV2.Owner, "ListObjectsV2 should include owner when FetchOwner=true")
// Create another version to ensure multiple versions don't appear in regular list
_, err = client.PutObject(context.TODO(), &s3.PutObjectInput{
Bucket: aws.String(bucketName),
Key: aws.String(objectKey),
Body: strings.NewReader("updated content"),
})
require.NoError(t, err)
// List again - should still show only one logical object (the latest version)
listRespAfterUpdate, err := client.ListObjects(context.TODO(), &s3.ListObjectsInput{
Bucket: aws.String(bucketName),
})
require.NoError(t, err)
assert.Len(t, listRespAfterUpdate.Contents, 1, "Should still list exactly one object after creating second version")
// Compare with list-object-versions which should show both versions
versionsResp, err := client.ListObjectVersions(context.TODO(), &s3.ListObjectVersionsInput{
Bucket: aws.String(bucketName),
})
require.NoError(t, err)
assert.Len(t, versionsResp.Versions, 2, "list-object-versions should show both versions")
t.Logf("Successfully verified versioned object list behavior")
}
// TestPrefixFilteringLogic tests the prefix filtering logic fix for list object versions
// This addresses the issue raised by gemini-code-assist bot where files could be incorrectly included
func TestPrefixFilteringLogic(t *testing.T) {
s3Client := setupS3Client(t)
bucketName := "test-bucket-" + fmt.Sprintf("%d", time.Now().UnixNano())
// Create bucket
_, err := s3Client.CreateBucket(context.TODO(), &s3.CreateBucketInput{
Bucket: aws.String(bucketName),
})
require.NoError(t, err)
defer cleanupBucket(t, s3Client, bucketName)
// Enable versioning
_, err = s3Client.PutBucketVersioning(context.Background(), &s3.PutBucketVersioningInput{
Bucket: aws.String(bucketName),
VersioningConfiguration: &types.VersioningConfiguration{
Status: types.BucketVersioningStatusEnabled,
},
})
require.NoError(t, err)
// Create test files that could trigger the edge case:
// - File "a" (which should NOT be included when searching for prefix "a/b")
// - File "a/b" (which SHOULD be included when searching for prefix "a/b")
_, err = s3Client.PutObject(context.Background(), &s3.PutObjectInput{
Bucket: aws.String(bucketName),
Key: aws.String("a"),
Body: strings.NewReader("content of file a"),
})
require.NoError(t, err)
_, err = s3Client.PutObject(context.Background(), &s3.PutObjectInput{
Bucket: aws.String(bucketName),
Key: aws.String("a/b"),
Body: strings.NewReader("content of file a/b"),
})
require.NoError(t, err)
// Test list-object-versions with prefix "a/b" - should NOT include file "a"
versionsResponse, err := s3Client.ListObjectVersions(context.Background(), &s3.ListObjectVersionsInput{
Bucket: aws.String(bucketName),
Prefix: aws.String("a/b"),
})
require.NoError(t, err)
// Verify that only "a/b" is returned, not "a"
require.Len(t, versionsResponse.Versions, 1, "Should only find one version matching prefix 'a/b'")
assert.Equal(t, "a/b", aws.ToString(versionsResponse.Versions[0].Key), "Should only return 'a/b', not 'a'")
// Test list-object-versions with prefix "a/" - should include "a/b" but not "a"
versionsResponse, err = s3Client.ListObjectVersions(context.Background(), &s3.ListObjectVersionsInput{
Bucket: aws.String(bucketName),
Prefix: aws.String("a/"),
})
require.NoError(t, err)
// Verify that only "a/b" is returned, not "a"
require.Len(t, versionsResponse.Versions, 1, "Should only find one version matching prefix 'a/'")
assert.Equal(t, "a/b", aws.ToString(versionsResponse.Versions[0].Key), "Should only return 'a/b', not 'a'")
// Test list-object-versions with prefix "a" - should include both "a" and "a/b"
versionsResponse, err = s3Client.ListObjectVersions(context.Background(), &s3.ListObjectVersionsInput{
Bucket: aws.String(bucketName),
Prefix: aws.String("a"),
})
require.NoError(t, err)
// Should find both files
require.Len(t, versionsResponse.Versions, 2, "Should find both versions matching prefix 'a'")
// Extract keys and sort them for predictable comparison
var keys []string
for _, version := range versionsResponse.Versions {
keys = append(keys, aws.ToString(version.Key))
}
sort.Strings(keys)
assert.Equal(t, []string{"a", "a/b"}, keys, "Should return both 'a' and 'a/b'")
t.Logf("✅ Prefix filtering logic correctly handles edge cases")
}
// Helper function to setup S3 client
func setupS3Client(t *testing.T) *s3.Client {
// S3TestConfig holds configuration for S3 tests
type S3TestConfig struct {
Endpoint string
AccessKey string
SecretKey string
Region string
BucketPrefix string
UseSSL bool
SkipVerifySSL bool
}
// Default test configuration - should match s3tests.conf
defaultConfig := &S3TestConfig{
Endpoint: "http://localhost:8333", // Default SeaweedFS S3 port
AccessKey: "some_access_key1",
SecretKey: "some_secret_key1",
Region: "us-east-1",
BucketPrefix: "test-versioning-",
UseSSL: false,
SkipVerifySSL: true,
}
cfg, err := config.LoadDefaultConfig(context.TODO(),
config.WithRegion(defaultConfig.Region),
config.WithCredentialsProvider(credentials.NewStaticCredentialsProvider(
defaultConfig.AccessKey,
defaultConfig.SecretKey,
"",
)),
config.WithEndpointResolverWithOptions(aws.EndpointResolverWithOptionsFunc(
func(service, region string, options ...interface{}) (aws.Endpoint, error) {
return aws.Endpoint{
URL: defaultConfig.Endpoint,
SigningRegion: defaultConfig.Region,
HostnameImmutable: true,
}, nil
})),
)
require.NoError(t, err)
return s3.NewFromConfig(cfg, func(o *s3.Options) {
o.UsePathStyle = true // Important for SeaweedFS
})
}
// Helper function to clean up bucket
func cleanupBucket(t *testing.T, client *s3.Client, bucketName string) {
// First, delete all objects and versions
err := deleteAllObjectVersions(t, client, bucketName)
if err != nil {
t.Logf("Warning: failed to delete all object versions: %v", err)
}
// Then delete the bucket
_, err = client.DeleteBucket(context.TODO(), &s3.DeleteBucketInput{
Bucket: aws.String(bucketName),
})
if err != nil {
t.Logf("Warning: failed to delete bucket %s: %v", bucketName, err)
}
}