You can not select more than 25 topics
			Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
		
		
		
		
		
			
		
			
				
					
					
						
							861 lines
						
					
					
						
							30 KiB
						
					
					
				
			
		
		
		
			
			
			
		
		
	
	
							861 lines
						
					
					
						
							30 KiB
						
					
					
				
								package s3api
							 | 
						|
								
							 | 
						|
								import (
							 | 
						|
									"context"
							 | 
						|
									"fmt"
							 | 
						|
									"sort"
							 | 
						|
									"strings"
							 | 
						|
									"sync"
							 | 
						|
									"testing"
							 | 
						|
									"time"
							 | 
						|
								
							 | 
						|
									"github.com/aws/aws-sdk-go-v2/aws"
							 | 
						|
									"github.com/aws/aws-sdk-go-v2/config"
							 | 
						|
									"github.com/aws/aws-sdk-go-v2/credentials"
							 | 
						|
									"github.com/aws/aws-sdk-go-v2/service/s3"
							 | 
						|
									"github.com/aws/aws-sdk-go-v2/service/s3/types"
							 | 
						|
									"github.com/stretchr/testify/assert"
							 | 
						|
									"github.com/stretchr/testify/require"
							 | 
						|
								)
							 | 
						|
								
							 | 
						|
								// TestListObjectVersionsIncludesDirectories tests that directories are included in list-object-versions response
							 | 
						|
								// This ensures compatibility with Minio and AWS S3 behavior
							 | 
						|
								func TestListObjectVersionsIncludesDirectories(t *testing.T) {
							 | 
						|
									bucketName := "test-versioning-directories"
							 | 
						|
								
							 | 
						|
									client := setupS3Client(t)
							 | 
						|
								
							 | 
						|
									// Create bucket
							 | 
						|
									_, err := client.CreateBucket(context.TODO(), &s3.CreateBucketInput{
							 | 
						|
										Bucket: aws.String(bucketName),
							 | 
						|
									})
							 | 
						|
									require.NoError(t, err)
							 | 
						|
								
							 | 
						|
									// Clean up
							 | 
						|
									defer func() {
							 | 
						|
										cleanupBucket(t, client, bucketName)
							 | 
						|
									}()
							 | 
						|
								
							 | 
						|
									// Enable versioning
							 | 
						|
									_, err = client.PutBucketVersioning(context.TODO(), &s3.PutBucketVersioningInput{
							 | 
						|
										Bucket: aws.String(bucketName),
							 | 
						|
										VersioningConfiguration: &types.VersioningConfiguration{
							 | 
						|
											Status: types.BucketVersioningStatusEnabled,
							 | 
						|
										},
							 | 
						|
									})
							 | 
						|
									require.NoError(t, err)
							 | 
						|
								
							 | 
						|
									// First create explicit directory objects (keys ending with "/")
							 | 
						|
									// These are the directories that should appear in list-object-versions
							 | 
						|
									explicitDirectories := []string{
							 | 
						|
										"Veeam/",
							 | 
						|
										"Veeam/Archive/",
							 | 
						|
										"Veeam/Archive/vbr/",
							 | 
						|
										"Veeam/Backup/",
							 | 
						|
										"Veeam/Backup/vbr/",
							 | 
						|
										"Veeam/Backup/vbr/Clients/",
							 | 
						|
									}
							 | 
						|
								
							 | 
						|
									// Create explicit directory objects
							 | 
						|
									for _, dirKey := range explicitDirectories {
							 | 
						|
										_, err := client.PutObject(context.TODO(), &s3.PutObjectInput{
							 | 
						|
											Bucket: aws.String(bucketName),
							 | 
						|
											Key:    aws.String(dirKey),
							 | 
						|
											Body:   strings.NewReader(""), // Empty content for directories
							 | 
						|
										})
							 | 
						|
										require.NoError(t, err, "Failed to create directory object %s", dirKey)
							 | 
						|
									}
							 | 
						|
								
							 | 
						|
									// Now create some test files
							 | 
						|
									testFiles := []string{
							 | 
						|
										"Veeam/test-file.txt",
							 | 
						|
										"Veeam/Archive/test-file2.txt",
							 | 
						|
										"Veeam/Archive/vbr/test-file3.txt",
							 | 
						|
										"Veeam/Backup/test-file4.txt",
							 | 
						|
										"Veeam/Backup/vbr/test-file5.txt",
							 | 
						|
										"Veeam/Backup/vbr/Clients/test-file6.txt",
							 | 
						|
									}
							 | 
						|
								
							 | 
						|
									// Upload test files
							 | 
						|
									for _, objectKey := range testFiles {
							 | 
						|
										_, err := client.PutObject(context.TODO(), &s3.PutObjectInput{
							 | 
						|
											Bucket: aws.String(bucketName),
							 | 
						|
											Key:    aws.String(objectKey),
							 | 
						|
											Body:   strings.NewReader("test content"),
							 | 
						|
										})
							 | 
						|
										require.NoError(t, err, "Failed to create file %s", objectKey)
							 | 
						|
									}
							 | 
						|
								
							 | 
						|
									// List object versions
							 | 
						|
									listResp, err := client.ListObjectVersions(context.TODO(), &s3.ListObjectVersionsInput{
							 | 
						|
										Bucket: aws.String(bucketName),
							 | 
						|
									})
							 | 
						|
									require.NoError(t, err)
							 | 
						|
								
							 | 
						|
									// Extract all keys from versions
							 | 
						|
									var allKeys []string
							 | 
						|
									for _, version := range listResp.Versions {
							 | 
						|
										allKeys = append(allKeys, *version.Key)
							 | 
						|
									}
							 | 
						|
								
							 | 
						|
									// Expected directories that should be included (with trailing slash)
							 | 
						|
									expectedDirectories := []string{
							 | 
						|
										"Veeam/",
							 | 
						|
										"Veeam/Archive/",
							 | 
						|
										"Veeam/Archive/vbr/",
							 | 
						|
										"Veeam/Backup/",
							 | 
						|
										"Veeam/Backup/vbr/",
							 | 
						|
										"Veeam/Backup/vbr/Clients/",
							 | 
						|
									}
							 | 
						|
								
							 | 
						|
									// Verify that directories are included in the response
							 | 
						|
									t.Logf("Found %d total versions", len(listResp.Versions))
							 | 
						|
									t.Logf("All keys: %v", allKeys)
							 | 
						|
								
							 | 
						|
									for _, expectedDir := range expectedDirectories {
							 | 
						|
										found := false
							 | 
						|
										for _, version := range listResp.Versions {
							 | 
						|
											if *version.Key == expectedDir {
							 | 
						|
												found = true
							 | 
						|
												// Verify directory properties
							 | 
						|
												assert.Equal(t, "null", *version.VersionId, "Directory %s should have VersionId 'null'", expectedDir)
							 | 
						|
												assert.Equal(t, int64(0), *version.Size, "Directory %s should have size 0", expectedDir)
							 | 
						|
												assert.True(t, *version.IsLatest, "Directory %s should be marked as latest", expectedDir)
							 | 
						|
												assert.Equal(t, "\"d41d8cd98f00b204e9800998ecf8427e\"", *version.ETag, "Directory %s should have MD5 of empty string as ETag", expectedDir)
							 | 
						|
												assert.Equal(t, types.ObjectStorageClassStandard, version.StorageClass, "Directory %s should have STANDARD storage class", expectedDir)
							 | 
						|
												break
							 | 
						|
											}
							 | 
						|
										}
							 | 
						|
										assert.True(t, found, "Directory %s should be included in list-object-versions response", expectedDir)
							 | 
						|
									}
							 | 
						|
								
							 | 
						|
									// Also verify that actual files are included
							 | 
						|
									for _, objectKey := range testFiles {
							 | 
						|
										found := false
							 | 
						|
										for _, version := range listResp.Versions {
							 | 
						|
											if *version.Key == objectKey {
							 | 
						|
												found = true
							 | 
						|
												assert.NotEqual(t, "null", *version.VersionId, "File %s should have a real version ID", objectKey)
							 | 
						|
												assert.Greater(t, *version.Size, int64(0), "File %s should have size > 0", objectKey)
							 | 
						|
												break
							 | 
						|
											}
							 | 
						|
										}
							 | 
						|
										assert.True(t, found, "File %s should be included in list-object-versions response", objectKey)
							 | 
						|
									}
							 | 
						|
								
							 | 
						|
									// Count directories vs files
							 | 
						|
									directoryCount := 0
							 | 
						|
									fileCount := 0
							 | 
						|
									for _, version := range listResp.Versions {
							 | 
						|
										if strings.HasSuffix(*version.Key, "/") && *version.Size == 0 && *version.VersionId == "null" {
							 | 
						|
											directoryCount++
							 | 
						|
										} else {
							 | 
						|
											fileCount++
							 | 
						|
										}
							 | 
						|
									}
							 | 
						|
								
							 | 
						|
									t.Logf("Found %d directories and %d files", directoryCount, fileCount)
							 | 
						|
									assert.Equal(t, len(expectedDirectories), directoryCount, "Should find exactly %d directories", len(expectedDirectories))
							 | 
						|
									assert.Equal(t, len(testFiles), fileCount, "Should find exactly %d files", len(testFiles))
							 | 
						|
								}
							 | 
						|
								
							 | 
						|
								// TestListObjectVersionsDeleteMarkers tests that delete markers are properly separated from versions
							 | 
						|
								// This test verifies the fix for the issue where delete markers were incorrectly categorized as versions
							 | 
						|
								func TestListObjectVersionsDeleteMarkers(t *testing.T) {
							 | 
						|
									bucketName := "test-delete-markers"
							 | 
						|
								
							 | 
						|
									client := setupS3Client(t)
							 | 
						|
								
							 | 
						|
									// Create bucket
							 | 
						|
									_, err := client.CreateBucket(context.TODO(), &s3.CreateBucketInput{
							 | 
						|
										Bucket: aws.String(bucketName),
							 | 
						|
									})
							 | 
						|
									require.NoError(t, err)
							 | 
						|
								
							 | 
						|
									// Clean up
							 | 
						|
									defer func() {
							 | 
						|
										cleanupBucket(t, client, bucketName)
							 | 
						|
									}()
							 | 
						|
								
							 | 
						|
									// Enable versioning
							 | 
						|
									_, err = client.PutBucketVersioning(context.TODO(), &s3.PutBucketVersioningInput{
							 | 
						|
										Bucket: aws.String(bucketName),
							 | 
						|
										VersioningConfiguration: &types.VersioningConfiguration{
							 | 
						|
											Status: types.BucketVersioningStatusEnabled,
							 | 
						|
										},
							 | 
						|
									})
							 | 
						|
									require.NoError(t, err)
							 | 
						|
								
							 | 
						|
									objectKey := "test1/a"
							 | 
						|
								
							 | 
						|
									// 1. Create one version of the file
							 | 
						|
									_, err = client.PutObject(context.TODO(), &s3.PutObjectInput{
							 | 
						|
										Bucket: aws.String(bucketName),
							 | 
						|
										Key:    aws.String(objectKey),
							 | 
						|
										Body:   strings.NewReader("test content"),
							 | 
						|
									})
							 | 
						|
									require.NoError(t, err)
							 | 
						|
								
							 | 
						|
									// 2. Delete the object 3 times to create 3 delete markers
							 | 
						|
									for i := 0; i < 3; i++ {
							 | 
						|
										_, err = client.DeleteObject(context.TODO(), &s3.DeleteObjectInput{
							 | 
						|
											Bucket: aws.String(bucketName),
							 | 
						|
											Key:    aws.String(objectKey),
							 | 
						|
										})
							 | 
						|
										require.NoError(t, err)
							 | 
						|
									}
							 | 
						|
								
							 | 
						|
									// 3. List object versions and verify the response structure
							 | 
						|
									listResp, err := client.ListObjectVersions(context.TODO(), &s3.ListObjectVersionsInput{
							 | 
						|
										Bucket: aws.String(bucketName),
							 | 
						|
									})
							 | 
						|
									require.NoError(t, err)
							 | 
						|
								
							 | 
						|
									// 4. Verify that we have exactly 1 version and 3 delete markers
							 | 
						|
									assert.Len(t, listResp.Versions, 1, "Should have exactly 1 file version")
							 | 
						|
									assert.Len(t, listResp.DeleteMarkers, 3, "Should have exactly 3 delete markers")
							 | 
						|
								
							 | 
						|
									// 5. Verify the version is for our test file
							 | 
						|
									version := listResp.Versions[0]
							 | 
						|
									assert.Equal(t, objectKey, *version.Key, "Version should be for our test file")
							 | 
						|
									assert.NotEqual(t, "null", *version.VersionId, "File version should have a real version ID")
							 | 
						|
									assert.Greater(t, *version.Size, int64(0), "File version should have size > 0")
							 | 
						|
								
							 | 
						|
									// 6. Verify all delete markers are for our test file
							 | 
						|
									for i, deleteMarker := range listResp.DeleteMarkers {
							 | 
						|
										assert.Equal(t, objectKey, *deleteMarker.Key, "Delete marker %d should be for our test file", i)
							 | 
						|
										assert.NotEqual(t, "null", *deleteMarker.VersionId, "Delete marker %d should have a real version ID", i)
							 | 
						|
									}
							 | 
						|
								
							 | 
						|
									t.Logf("Successfully verified: 1 version + 3 delete markers for object %s", objectKey)
							 | 
						|
								}
							 | 
						|
								
							 | 
						|
								// TestVersionedObjectAcl tests that ACL operations work correctly on objects in versioned buckets
							 | 
						|
								// This test verifies the fix for the NoSuchKey error when getting ACLs for objects in versioned buckets
							 | 
						|
								func TestVersionedObjectAcl(t *testing.T) {
							 | 
						|
									bucketName := "test-versioned-acl"
							 | 
						|
								
							 | 
						|
									client := setupS3Client(t)
							 | 
						|
								
							 | 
						|
									// Create bucket
							 | 
						|
									_, err := client.CreateBucket(context.TODO(), &s3.CreateBucketInput{
							 | 
						|
										Bucket: aws.String(bucketName),
							 | 
						|
									})
							 | 
						|
									require.NoError(t, err)
							 | 
						|
								
							 | 
						|
									// Clean up
							 | 
						|
									defer func() {
							 | 
						|
										cleanupBucket(t, client, bucketName)
							 | 
						|
									}()
							 | 
						|
								
							 | 
						|
									// Enable versioning
							 | 
						|
									_, err = client.PutBucketVersioning(context.TODO(), &s3.PutBucketVersioningInput{
							 | 
						|
										Bucket: aws.String(bucketName),
							 | 
						|
										VersioningConfiguration: &types.VersioningConfiguration{
							 | 
						|
											Status: types.BucketVersioningStatusEnabled,
							 | 
						|
										},
							 | 
						|
									})
							 | 
						|
									require.NoError(t, err)
							 | 
						|
								
							 | 
						|
									objectKey := "test-acl-object"
							 | 
						|
								
							 | 
						|
									// Create an object in the versioned bucket
							 | 
						|
									putResp, err := client.PutObject(context.TODO(), &s3.PutObjectInput{
							 | 
						|
										Bucket: aws.String(bucketName),
							 | 
						|
										Key:    aws.String(objectKey),
							 | 
						|
										Body:   strings.NewReader("test content for ACL"),
							 | 
						|
									})
							 | 
						|
									require.NoError(t, err)
							 | 
						|
									require.NotNil(t, putResp.VersionId, "Object should have a version ID")
							 | 
						|
								
							 | 
						|
									// Test 1: Get ACL for the object (without specifying version ID - should get latest version)
							 | 
						|
									getAclResp, err := client.GetObjectAcl(context.TODO(), &s3.GetObjectAclInput{
							 | 
						|
										Bucket: aws.String(bucketName),
							 | 
						|
										Key:    aws.String(objectKey),
							 | 
						|
									})
							 | 
						|
									require.NoError(t, err, "Should be able to get ACL for object in versioned bucket")
							 | 
						|
									require.NotNil(t, getAclResp.Owner, "ACL response should have owner information")
							 | 
						|
								
							 | 
						|
									// Test 2: Get ACL for specific version ID
							 | 
						|
									getAclVersionResp, err := client.GetObjectAcl(context.TODO(), &s3.GetObjectAclInput{
							 | 
						|
										Bucket:    aws.String(bucketName),
							 | 
						|
										Key:       aws.String(objectKey),
							 | 
						|
										VersionId: putResp.VersionId,
							 | 
						|
									})
							 | 
						|
									require.NoError(t, err, "Should be able to get ACL for specific version")
							 | 
						|
									require.NotNil(t, getAclVersionResp.Owner, "Versioned ACL response should have owner information")
							 | 
						|
								
							 | 
						|
									// Test 3: Verify both ACL responses are the same (same object, same version)
							 | 
						|
									assert.Equal(t, getAclResp.Owner.ID, getAclVersionResp.Owner.ID, "Owner ID should match for latest and specific version")
							 | 
						|
								
							 | 
						|
									// Test 4: Create another version of the same object
							 | 
						|
									putResp2, err := client.PutObject(context.TODO(), &s3.PutObjectInput{
							 | 
						|
										Bucket: aws.String(bucketName),
							 | 
						|
										Key:    aws.String(objectKey),
							 | 
						|
										Body:   strings.NewReader("updated content for ACL"),
							 | 
						|
									})
							 | 
						|
									require.NoError(t, err)
							 | 
						|
									require.NotNil(t, putResp2.VersionId, "Second object version should have a version ID")
							 | 
						|
									require.NotEqual(t, putResp.VersionId, putResp2.VersionId, "Version IDs should be different")
							 | 
						|
								
							 | 
						|
									// Test 5: Get ACL for latest version (should be the second version)
							 | 
						|
									getAclLatestResp, err := client.GetObjectAcl(context.TODO(), &s3.GetObjectAclInput{
							 | 
						|
										Bucket: aws.String(bucketName),
							 | 
						|
										Key:    aws.String(objectKey),
							 | 
						|
									})
							 | 
						|
									require.NoError(t, err, "Should be able to get ACL for latest version after update")
							 | 
						|
									require.NotNil(t, getAclLatestResp.Owner, "Latest ACL response should have owner information")
							 | 
						|
								
							 | 
						|
									// Test 6: Get ACL for the first version specifically
							 | 
						|
									getAclFirstResp, err := client.GetObjectAcl(context.TODO(), &s3.GetObjectAclInput{
							 | 
						|
										Bucket:    aws.String(bucketName),
							 | 
						|
										Key:       aws.String(objectKey),
							 | 
						|
										VersionId: putResp.VersionId,
							 | 
						|
									})
							 | 
						|
									require.NoError(t, err, "Should be able to get ACL for first version specifically")
							 | 
						|
									require.NotNil(t, getAclFirstResp.Owner, "First version ACL response should have owner information")
							 | 
						|
								
							 | 
						|
									// Test 7: Verify we can put ACL on versioned objects
							 | 
						|
									_, err = client.PutObjectAcl(context.TODO(), &s3.PutObjectAclInput{
							 | 
						|
										Bucket: aws.String(bucketName),
							 | 
						|
										Key:    aws.String(objectKey),
							 | 
						|
										ACL:    types.ObjectCannedACLPrivate,
							 | 
						|
									})
							 | 
						|
									require.NoError(t, err, "Should be able to put ACL on versioned object")
							 | 
						|
								
							 | 
						|
									t.Logf("Successfully verified ACL operations on versioned object %s with versions %s and %s",
							 | 
						|
										objectKey, *putResp.VersionId, *putResp2.VersionId)
							 | 
						|
								}
							 | 
						|
								
							 | 
						|
								// TestConcurrentMultiObjectDelete tests that concurrent delete operations work correctly without race conditions
							 | 
						|
								// This test verifies the fix for the race condition in deleteSpecificObjectVersion
							 | 
						|
								func TestConcurrentMultiObjectDelete(t *testing.T) {
							 | 
						|
									bucketName := "test-concurrent-delete"
							 | 
						|
									numObjects := 5
							 | 
						|
									numThreads := 5
							 | 
						|
								
							 | 
						|
									client := setupS3Client(t)
							 | 
						|
								
							 | 
						|
									// Create bucket
							 | 
						|
									_, err := client.CreateBucket(context.TODO(), &s3.CreateBucketInput{
							 | 
						|
										Bucket: aws.String(bucketName),
							 | 
						|
									})
							 | 
						|
									require.NoError(t, err)
							 | 
						|
								
							 | 
						|
									// Clean up
							 | 
						|
									defer func() {
							 | 
						|
										cleanupBucket(t, client, bucketName)
							 | 
						|
									}()
							 | 
						|
								
							 | 
						|
									// Enable versioning
							 | 
						|
									_, err = client.PutBucketVersioning(context.TODO(), &s3.PutBucketVersioningInput{
							 | 
						|
										Bucket: aws.String(bucketName),
							 | 
						|
										VersioningConfiguration: &types.VersioningConfiguration{
							 | 
						|
											Status: types.BucketVersioningStatusEnabled,
							 | 
						|
										},
							 | 
						|
									})
							 | 
						|
									require.NoError(t, err)
							 | 
						|
								
							 | 
						|
									// Create objects
							 | 
						|
									var objectKeys []string
							 | 
						|
									var versionIds []string
							 | 
						|
								
							 | 
						|
									for i := 0; i < numObjects; i++ {
							 | 
						|
										objectKey := fmt.Sprintf("key_%d", i)
							 | 
						|
										objectKeys = append(objectKeys, objectKey)
							 | 
						|
								
							 | 
						|
										putResp, err := client.PutObject(context.TODO(), &s3.PutObjectInput{
							 | 
						|
											Bucket: aws.String(bucketName),
							 | 
						|
											Key:    aws.String(objectKey),
							 | 
						|
											Body:   strings.NewReader(fmt.Sprintf("content for key_%d", i)),
							 | 
						|
										})
							 | 
						|
										require.NoError(t, err)
							 | 
						|
										require.NotNil(t, putResp.VersionId)
							 | 
						|
										versionIds = append(versionIds, *putResp.VersionId)
							 | 
						|
									}
							 | 
						|
								
							 | 
						|
									// Verify objects were created
							 | 
						|
									listResp, err := client.ListObjectVersions(context.TODO(), &s3.ListObjectVersionsInput{
							 | 
						|
										Bucket: aws.String(bucketName),
							 | 
						|
									})
							 | 
						|
									require.NoError(t, err)
							 | 
						|
									assert.Len(t, listResp.Versions, numObjects, "Should have created %d objects", numObjects)
							 | 
						|
								
							 | 
						|
									// Create delete objects request
							 | 
						|
									var objectsToDelete []types.ObjectIdentifier
							 | 
						|
									for i, objectKey := range objectKeys {
							 | 
						|
										objectsToDelete = append(objectsToDelete, types.ObjectIdentifier{
							 | 
						|
											Key:       aws.String(objectKey),
							 | 
						|
											VersionId: aws.String(versionIds[i]),
							 | 
						|
										})
							 | 
						|
									}
							 | 
						|
								
							 | 
						|
									// Run concurrent delete operations
							 | 
						|
									results := make([]*s3.DeleteObjectsOutput, numThreads)
							 | 
						|
									var wg sync.WaitGroup
							 | 
						|
								
							 | 
						|
									for i := 0; i < numThreads; i++ {
							 | 
						|
										wg.Add(1)
							 | 
						|
										go func(threadIdx int) {
							 | 
						|
											defer wg.Done()
							 | 
						|
											deleteResp, err := client.DeleteObjects(context.TODO(), &s3.DeleteObjectsInput{
							 | 
						|
												Bucket: aws.String(bucketName),
							 | 
						|
												Delete: &types.Delete{
							 | 
						|
													Objects: objectsToDelete,
							 | 
						|
													Quiet:   aws.Bool(false),
							 | 
						|
												},
							 | 
						|
											})
							 | 
						|
											if err != nil {
							 | 
						|
												t.Errorf("Thread %d: delete objects failed: %v", threadIdx, err)
							 | 
						|
												return
							 | 
						|
											}
							 | 
						|
											results[threadIdx] = deleteResp
							 | 
						|
										}(i)
							 | 
						|
									}
							 | 
						|
								
							 | 
						|
									wg.Wait()
							 | 
						|
								
							 | 
						|
									// Verify results
							 | 
						|
									for i, result := range results {
							 | 
						|
										require.NotNil(t, result, "Thread %d should have a result", i)
							 | 
						|
										assert.Len(t, result.Deleted, numObjects, "Thread %d should have deleted all %d objects", i, numObjects)
							 | 
						|
								
							 | 
						|
										if len(result.Errors) > 0 {
							 | 
						|
											for _, deleteError := range result.Errors {
							 | 
						|
												t.Errorf("Thread %d delete error: %s - %s (Key: %s, VersionId: %s)",
							 | 
						|
													i, *deleteError.Code, *deleteError.Message, *deleteError.Key,
							 | 
						|
													func() string {
							 | 
						|
														if deleteError.VersionId != nil {
							 | 
						|
															return *deleteError.VersionId
							 | 
						|
														} else {
							 | 
						|
															return "nil"
							 | 
						|
														}
							 | 
						|
													}())
							 | 
						|
											}
							 | 
						|
										}
							 | 
						|
										assert.Empty(t, result.Errors, "Thread %d should have no delete errors", i)
							 | 
						|
									}
							 | 
						|
								
							 | 
						|
									// Verify objects are deleted (bucket should be empty)
							 | 
						|
									finalListResp, err := client.ListObjects(context.TODO(), &s3.ListObjectsInput{
							 | 
						|
										Bucket: aws.String(bucketName),
							 | 
						|
									})
							 | 
						|
									require.NoError(t, err)
							 | 
						|
									assert.Nil(t, finalListResp.Contents, "Bucket should be empty after all deletions")
							 | 
						|
								
							 | 
						|
									t.Logf("Successfully verified concurrent deletion of %d objects from %d threads", numObjects, numThreads)
							 | 
						|
								}
							 | 
						|
								
							 | 
						|
								// TestSuspendedVersioningDeleteBehavior tests that delete operations during suspended versioning
							 | 
						|
								// actually delete the "null" version object rather than creating delete markers
							 | 
						|
								func TestSuspendedVersioningDeleteBehavior(t *testing.T) {
							 | 
						|
									bucketName := "test-suspended-versioning-delete"
							 | 
						|
									objectKey := "testobj"
							 | 
						|
								
							 | 
						|
									client := setupS3Client(t)
							 | 
						|
								
							 | 
						|
									// Create bucket
							 | 
						|
									_, err := client.CreateBucket(context.TODO(), &s3.CreateBucketInput{
							 | 
						|
										Bucket: aws.String(bucketName),
							 | 
						|
									})
							 | 
						|
									require.NoError(t, err)
							 | 
						|
								
							 | 
						|
									// Clean up
							 | 
						|
									defer func() {
							 | 
						|
										cleanupBucket(t, client, bucketName)
							 | 
						|
									}()
							 | 
						|
								
							 | 
						|
									// Enable versioning and create some versions
							 | 
						|
									_, err = client.PutBucketVersioning(context.TODO(), &s3.PutBucketVersioningInput{
							 | 
						|
										Bucket: aws.String(bucketName),
							 | 
						|
										VersioningConfiguration: &types.VersioningConfiguration{
							 | 
						|
											Status: types.BucketVersioningStatusEnabled,
							 | 
						|
										},
							 | 
						|
									})
							 | 
						|
									require.NoError(t, err)
							 | 
						|
								
							 | 
						|
									// Create 3 versions
							 | 
						|
									var versionIds []string
							 | 
						|
									for i := 0; i < 3; i++ {
							 | 
						|
										putResp, err := client.PutObject(context.TODO(), &s3.PutObjectInput{
							 | 
						|
											Bucket: aws.String(bucketName),
							 | 
						|
											Key:    aws.String(objectKey),
							 | 
						|
											Body:   strings.NewReader(fmt.Sprintf("content version %d", i+1)),
							 | 
						|
										})
							 | 
						|
										require.NoError(t, err)
							 | 
						|
										require.NotNil(t, putResp.VersionId)
							 | 
						|
										versionIds = append(versionIds, *putResp.VersionId)
							 | 
						|
									}
							 | 
						|
								
							 | 
						|
									// Verify 3 versions exist
							 | 
						|
									listResp, err := client.ListObjectVersions(context.TODO(), &s3.ListObjectVersionsInput{
							 | 
						|
										Bucket: aws.String(bucketName),
							 | 
						|
									})
							 | 
						|
									require.NoError(t, err)
							 | 
						|
									assert.Len(t, listResp.Versions, 3, "Should have 3 versions initially")
							 | 
						|
								
							 | 
						|
									// Suspend versioning
							 | 
						|
									_, err = client.PutBucketVersioning(context.TODO(), &s3.PutBucketVersioningInput{
							 | 
						|
										Bucket: aws.String(bucketName),
							 | 
						|
										VersioningConfiguration: &types.VersioningConfiguration{
							 | 
						|
											Status: types.BucketVersioningStatusSuspended,
							 | 
						|
										},
							 | 
						|
									})
							 | 
						|
									require.NoError(t, err)
							 | 
						|
								
							 | 
						|
									// Create a new object during suspended versioning (this should be a "null" version)
							 | 
						|
									_, err = client.PutObject(context.TODO(), &s3.PutObjectInput{
							 | 
						|
										Bucket: aws.String(bucketName),
							 | 
						|
										Key:    aws.String(objectKey),
							 | 
						|
										Body:   strings.NewReader("null version content"),
							 | 
						|
									})
							 | 
						|
									require.NoError(t, err)
							 | 
						|
								
							 | 
						|
									// Verify we still have 3 versions + 1 null version = 4 total
							 | 
						|
									listResp, err = client.ListObjectVersions(context.TODO(), &s3.ListObjectVersionsInput{
							 | 
						|
										Bucket: aws.String(bucketName),
							 | 
						|
									})
							 | 
						|
									require.NoError(t, err)
							 | 
						|
									assert.Len(t, listResp.Versions, 4, "Should have 3 versions + 1 null version")
							 | 
						|
								
							 | 
						|
									// Find the null version
							 | 
						|
									var nullVersionFound bool
							 | 
						|
									for _, version := range listResp.Versions {
							 | 
						|
										if *version.VersionId == "null" {
							 | 
						|
											nullVersionFound = true
							 | 
						|
											assert.True(t, *version.IsLatest, "Null version should be marked as latest during suspended versioning")
							 | 
						|
											break
							 | 
						|
										}
							 | 
						|
									}
							 | 
						|
									assert.True(t, nullVersionFound, "Should have found a null version")
							 | 
						|
								
							 | 
						|
									// Delete the object during suspended versioning (should actually delete the null version)
							 | 
						|
									_, err = client.DeleteObject(context.TODO(), &s3.DeleteObjectInput{
							 | 
						|
										Bucket: aws.String(bucketName),
							 | 
						|
										Key:    aws.String(objectKey),
							 | 
						|
										// No VersionId specified - should delete the "null" version during suspended versioning
							 | 
						|
									})
							 | 
						|
									require.NoError(t, err)
							 | 
						|
								
							 | 
						|
									// Verify the null version was actually deleted (not a delete marker created)
							 | 
						|
									listResp, err = client.ListObjectVersions(context.TODO(), &s3.ListObjectVersionsInput{
							 | 
						|
										Bucket: aws.String(bucketName),
							 | 
						|
									})
							 | 
						|
									require.NoError(t, err)
							 | 
						|
									assert.Len(t, listResp.Versions, 3, "Should be back to 3 versions after deleting null version")
							 | 
						|
									assert.Empty(t, listResp.DeleteMarkers, "Should have no delete markers during suspended versioning delete")
							 | 
						|
								
							 | 
						|
									// Verify null version is gone
							 | 
						|
									nullVersionFound = false
							 | 
						|
									for _, version := range listResp.Versions {
							 | 
						|
										if *version.VersionId == "null" {
							 | 
						|
											nullVersionFound = true
							 | 
						|
											break
							 | 
						|
										}
							 | 
						|
									}
							 | 
						|
									assert.False(t, nullVersionFound, "Null version should be deleted, not present")
							 | 
						|
								
							 | 
						|
									// Create another null version and delete it multiple times to test idempotency
							 | 
						|
									_, err = client.PutObject(context.TODO(), &s3.PutObjectInput{
							 | 
						|
										Bucket: aws.String(bucketName),
							 | 
						|
										Key:    aws.String(objectKey),
							 | 
						|
										Body:   strings.NewReader("another null version"),
							 | 
						|
									})
							 | 
						|
									require.NoError(t, err)
							 | 
						|
								
							 | 
						|
									// Delete it twice to test idempotency
							 | 
						|
									for i := 0; i < 2; i++ {
							 | 
						|
										_, err = client.DeleteObject(context.TODO(), &s3.DeleteObjectInput{
							 | 
						|
											Bucket: aws.String(bucketName),
							 | 
						|
											Key:    aws.String(objectKey),
							 | 
						|
										})
							 | 
						|
										require.NoError(t, err, "Delete should be idempotent - iteration %d", i+1)
							 | 
						|
									}
							 | 
						|
								
							 | 
						|
									// Re-enable versioning
							 | 
						|
									_, err = client.PutBucketVersioning(context.TODO(), &s3.PutBucketVersioningInput{
							 | 
						|
										Bucket: aws.String(bucketName),
							 | 
						|
										VersioningConfiguration: &types.VersioningConfiguration{
							 | 
						|
											Status: types.BucketVersioningStatusEnabled,
							 | 
						|
										},
							 | 
						|
									})
							 | 
						|
									require.NoError(t, err)
							 | 
						|
								
							 | 
						|
									// Create a new version with versioning enabled
							 | 
						|
									putResp, err := client.PutObject(context.TODO(), &s3.PutObjectInput{
							 | 
						|
										Bucket: aws.String(bucketName),
							 | 
						|
										Key:    aws.String(objectKey),
							 | 
						|
										Body:   strings.NewReader("new version after re-enabling"),
							 | 
						|
									})
							 | 
						|
									require.NoError(t, err)
							 | 
						|
									require.NotNil(t, putResp.VersionId)
							 | 
						|
								
							 | 
						|
									// Now delete without version ID (should create delete marker)
							 | 
						|
									deleteResp, err := client.DeleteObject(context.TODO(), &s3.DeleteObjectInput{
							 | 
						|
										Bucket: aws.String(bucketName),
							 | 
						|
										Key:    aws.String(objectKey),
							 | 
						|
									})
							 | 
						|
									require.NoError(t, err)
							 | 
						|
									assert.Equal(t, "true", deleteResp.DeleteMarker, "Should create delete marker when versioning is enabled")
							 | 
						|
								
							 | 
						|
									// Verify final state
							 | 
						|
									listResp, err = client.ListObjectVersions(context.TODO(), &s3.ListObjectVersionsInput{
							 | 
						|
										Bucket: aws.String(bucketName),
							 | 
						|
									})
							 | 
						|
									require.NoError(t, err)
							 | 
						|
									assert.Len(t, listResp.Versions, 4, "Should have 3 original versions + 1 new version")
							 | 
						|
									assert.Len(t, listResp.DeleteMarkers, 1, "Should have 1 delete marker")
							 | 
						|
								
							 | 
						|
									t.Logf("Successfully verified suspended versioning delete behavior")
							 | 
						|
								}
							 | 
						|
								
							 | 
						|
								// TestVersionedObjectListBehavior tests that list operations show logical object names for versioned objects
							 | 
						|
								// and that owner information is properly extracted from S3 metadata
							 | 
						|
								func TestVersionedObjectListBehavior(t *testing.T) {
							 | 
						|
									bucketName := "test-versioned-list"
							 | 
						|
									objectKey := "testfile"
							 | 
						|
								
							 | 
						|
									client := setupS3Client(t)
							 | 
						|
								
							 | 
						|
									// Create bucket with object lock enabled (which enables versioning)
							 | 
						|
									_, err := client.CreateBucket(context.TODO(), &s3.CreateBucketInput{
							 | 
						|
										Bucket:                     aws.String(bucketName),
							 | 
						|
										ObjectLockEnabledForBucket: aws.Bool(true),
							 | 
						|
									})
							 | 
						|
									require.NoError(t, err)
							 | 
						|
								
							 | 
						|
									// Clean up
							 | 
						|
									defer func() {
							 | 
						|
										cleanupBucket(t, client, bucketName)
							 | 
						|
									}()
							 | 
						|
								
							 | 
						|
									// Verify versioning is enabled
							 | 
						|
									versioningResp, err := client.GetBucketVersioning(context.TODO(), &s3.GetBucketVersioningInput{
							 | 
						|
										Bucket: aws.String(bucketName),
							 | 
						|
									})
							 | 
						|
									require.NoError(t, err)
							 | 
						|
									assert.Equal(t, types.BucketVersioningStatusEnabled, versioningResp.Status, "Bucket versioning should be enabled")
							 | 
						|
								
							 | 
						|
									// Create a versioned object
							 | 
						|
									content := "test content for versioned object"
							 | 
						|
									putResp, err := client.PutObject(context.TODO(), &s3.PutObjectInput{
							 | 
						|
										Bucket: aws.String(bucketName),
							 | 
						|
										Key:    aws.String(objectKey),
							 | 
						|
										Body:   strings.NewReader(content),
							 | 
						|
									})
							 | 
						|
									require.NoError(t, err)
							 | 
						|
									require.NotNil(t, putResp.VersionId)
							 | 
						|
								
							 | 
						|
									versionId := *putResp.VersionId
							 | 
						|
									t.Logf("Created versioned object with version ID: %s", versionId)
							 | 
						|
								
							 | 
						|
									// Test list-objects operation - should show logical object name, not internal versioned path
							 | 
						|
									listResp, err := client.ListObjects(context.TODO(), &s3.ListObjectsInput{
							 | 
						|
										Bucket: aws.String(bucketName),
							 | 
						|
									})
							 | 
						|
									require.NoError(t, err)
							 | 
						|
									require.Len(t, listResp.Contents, 1, "Should list exactly one object")
							 | 
						|
								
							 | 
						|
									listedObject := listResp.Contents[0]
							 | 
						|
								
							 | 
						|
									// Verify the object key is the logical name, not the internal versioned path
							 | 
						|
									assert.Equal(t, objectKey, *listedObject.Key, "Should show logical object name, not internal versioned path")
							 | 
						|
									assert.NotContains(t, *listedObject.Key, ".versions", "Object key should not contain .versions")
							 | 
						|
									assert.NotContains(t, *listedObject.Key, versionId, "Object key should not contain version ID")
							 | 
						|
								
							 | 
						|
									// Verify object properties
							 | 
						|
									assert.Equal(t, int64(len(content)), listedObject.Size, "Object size should match")
							 | 
						|
									assert.NotNil(t, listedObject.ETag, "Object should have ETag")
							 | 
						|
									assert.NotNil(t, listedObject.LastModified, "Object should have LastModified")
							 | 
						|
								
							 | 
						|
									// Verify owner information is present (even if anonymous)
							 | 
						|
									require.NotNil(t, listedObject.Owner, "Object should have Owner information")
							 | 
						|
									assert.NotEmpty(t, listedObject.Owner.ID, "Owner ID should not be empty")
							 | 
						|
									assert.NotEmpty(t, listedObject.Owner.DisplayName, "Owner DisplayName should not be empty")
							 | 
						|
								
							 | 
						|
									t.Logf("Listed object: Key=%s, Size=%d, Owner.ID=%s, Owner.DisplayName=%s",
							 | 
						|
										*listedObject.Key, listedObject.Size, *listedObject.Owner.ID, *listedObject.Owner.DisplayName)
							 | 
						|
								
							 | 
						|
									// Test list-objects-v2 operation as well
							 | 
						|
									listV2Resp, err := client.ListObjectsV2(context.TODO(), &s3.ListObjectsV2Input{
							 | 
						|
										Bucket:     aws.String(bucketName),
							 | 
						|
										FetchOwner: aws.Bool(true), // Explicitly request owner information
							 | 
						|
									})
							 | 
						|
									require.NoError(t, err)
							 | 
						|
									require.Len(t, listV2Resp.Contents, 1, "ListObjectsV2 should also list exactly one object")
							 | 
						|
								
							 | 
						|
									listedObjectV2 := listV2Resp.Contents[0]
							 | 
						|
									assert.Equal(t, objectKey, *listedObjectV2.Key, "ListObjectsV2 should also show logical object name")
							 | 
						|
									assert.NotNil(t, listedObjectV2.Owner, "ListObjectsV2 should include owner when FetchOwner=true")
							 | 
						|
								
							 | 
						|
									// Create another version to ensure multiple versions don't appear in regular list
							 | 
						|
									_, err = client.PutObject(context.TODO(), &s3.PutObjectInput{
							 | 
						|
										Bucket: aws.String(bucketName),
							 | 
						|
										Key:    aws.String(objectKey),
							 | 
						|
										Body:   strings.NewReader("updated content"),
							 | 
						|
									})
							 | 
						|
									require.NoError(t, err)
							 | 
						|
								
							 | 
						|
									// List again - should still show only one logical object (the latest version)
							 | 
						|
									listRespAfterUpdate, err := client.ListObjects(context.TODO(), &s3.ListObjectsInput{
							 | 
						|
										Bucket: aws.String(bucketName),
							 | 
						|
									})
							 | 
						|
									require.NoError(t, err)
							 | 
						|
									assert.Len(t, listRespAfterUpdate.Contents, 1, "Should still list exactly one object after creating second version")
							 | 
						|
								
							 | 
						|
									// Compare with list-object-versions which should show both versions
							 | 
						|
									versionsResp, err := client.ListObjectVersions(context.TODO(), &s3.ListObjectVersionsInput{
							 | 
						|
										Bucket: aws.String(bucketName),
							 | 
						|
									})
							 | 
						|
									require.NoError(t, err)
							 | 
						|
									assert.Len(t, versionsResp.Versions, 2, "list-object-versions should show both versions")
							 | 
						|
								
							 | 
						|
									t.Logf("Successfully verified versioned object list behavior")
							 | 
						|
								}
							 | 
						|
								
							 | 
						|
								// TestPrefixFilteringLogic tests the prefix filtering logic fix for list object versions
							 | 
						|
								// This addresses the issue raised by gemini-code-assist bot where files could be incorrectly included
							 | 
						|
								func TestPrefixFilteringLogic(t *testing.T) {
							 | 
						|
									s3Client := setupS3Client(t)
							 | 
						|
									bucketName := "test-bucket-" + fmt.Sprintf("%d", time.Now().UnixNano())
							 | 
						|
								
							 | 
						|
									// Create bucket
							 | 
						|
									_, err := s3Client.CreateBucket(context.TODO(), &s3.CreateBucketInput{
							 | 
						|
										Bucket: aws.String(bucketName),
							 | 
						|
									})
							 | 
						|
									require.NoError(t, err)
							 | 
						|
									defer cleanupBucket(t, s3Client, bucketName)
							 | 
						|
								
							 | 
						|
									// Enable versioning
							 | 
						|
									_, err = s3Client.PutBucketVersioning(context.Background(), &s3.PutBucketVersioningInput{
							 | 
						|
										Bucket: aws.String(bucketName),
							 | 
						|
										VersioningConfiguration: &types.VersioningConfiguration{
							 | 
						|
											Status: types.BucketVersioningStatusEnabled,
							 | 
						|
										},
							 | 
						|
									})
							 | 
						|
									require.NoError(t, err)
							 | 
						|
								
							 | 
						|
									// Create test files that could trigger the edge case:
							 | 
						|
									// - File "a" (which should NOT be included when searching for prefix "a/b")
							 | 
						|
									// - File "a/b" (which SHOULD be included when searching for prefix "a/b")
							 | 
						|
									_, err = s3Client.PutObject(context.Background(), &s3.PutObjectInput{
							 | 
						|
										Bucket: aws.String(bucketName),
							 | 
						|
										Key:    aws.String("a"),
							 | 
						|
										Body:   strings.NewReader("content of file a"),
							 | 
						|
									})
							 | 
						|
									require.NoError(t, err)
							 | 
						|
								
							 | 
						|
									_, err = s3Client.PutObject(context.Background(), &s3.PutObjectInput{
							 | 
						|
										Bucket: aws.String(bucketName),
							 | 
						|
										Key:    aws.String("a/b"),
							 | 
						|
										Body:   strings.NewReader("content of file a/b"),
							 | 
						|
									})
							 | 
						|
									require.NoError(t, err)
							 | 
						|
								
							 | 
						|
									// Test list-object-versions with prefix "a/b" - should NOT include file "a"
							 | 
						|
									versionsResponse, err := s3Client.ListObjectVersions(context.Background(), &s3.ListObjectVersionsInput{
							 | 
						|
										Bucket: aws.String(bucketName),
							 | 
						|
										Prefix: aws.String("a/b"),
							 | 
						|
									})
							 | 
						|
									require.NoError(t, err)
							 | 
						|
								
							 | 
						|
									// Verify that only "a/b" is returned, not "a"
							 | 
						|
									require.Len(t, versionsResponse.Versions, 1, "Should only find one version matching prefix 'a/b'")
							 | 
						|
									assert.Equal(t, "a/b", aws.ToString(versionsResponse.Versions[0].Key), "Should only return 'a/b', not 'a'")
							 | 
						|
								
							 | 
						|
									// Test list-object-versions with prefix "a/" - should include "a/b" but not "a"
							 | 
						|
									versionsResponse, err = s3Client.ListObjectVersions(context.Background(), &s3.ListObjectVersionsInput{
							 | 
						|
										Bucket: aws.String(bucketName),
							 | 
						|
										Prefix: aws.String("a/"),
							 | 
						|
									})
							 | 
						|
									require.NoError(t, err)
							 | 
						|
								
							 | 
						|
									// Verify that only "a/b" is returned, not "a"
							 | 
						|
									require.Len(t, versionsResponse.Versions, 1, "Should only find one version matching prefix 'a/'")
							 | 
						|
									assert.Equal(t, "a/b", aws.ToString(versionsResponse.Versions[0].Key), "Should only return 'a/b', not 'a'")
							 | 
						|
								
							 | 
						|
									// Test list-object-versions with prefix "a" - should include both "a" and "a/b"
							 | 
						|
									versionsResponse, err = s3Client.ListObjectVersions(context.Background(), &s3.ListObjectVersionsInput{
							 | 
						|
										Bucket: aws.String(bucketName),
							 | 
						|
										Prefix: aws.String("a"),
							 | 
						|
									})
							 | 
						|
									require.NoError(t, err)
							 | 
						|
								
							 | 
						|
									// Should find both files
							 | 
						|
									require.Len(t, versionsResponse.Versions, 2, "Should find both versions matching prefix 'a'")
							 | 
						|
								
							 | 
						|
									// Extract keys and sort them for predictable comparison
							 | 
						|
									var keys []string
							 | 
						|
									for _, version := range versionsResponse.Versions {
							 | 
						|
										keys = append(keys, aws.ToString(version.Key))
							 | 
						|
									}
							 | 
						|
									sort.Strings(keys)
							 | 
						|
								
							 | 
						|
									assert.Equal(t, []string{"a", "a/b"}, keys, "Should return both 'a' and 'a/b'")
							 | 
						|
								
							 | 
						|
									t.Logf("Prefix filtering logic correctly handles edge cases")
							 | 
						|
								}
							 | 
						|
								
							 | 
						|
								// Helper function to setup S3 client
							 | 
						|
								func setupS3Client(t *testing.T) *s3.Client {
							 | 
						|
									// S3TestConfig holds configuration for S3 tests
							 | 
						|
									type S3TestConfig struct {
							 | 
						|
										Endpoint      string
							 | 
						|
										AccessKey     string
							 | 
						|
										SecretKey     string
							 | 
						|
										Region        string
							 | 
						|
										BucketPrefix  string
							 | 
						|
										UseSSL        bool
							 | 
						|
										SkipVerifySSL bool
							 | 
						|
									}
							 | 
						|
								
							 | 
						|
									// Default test configuration - should match s3tests.conf
							 | 
						|
									defaultConfig := &S3TestConfig{
							 | 
						|
										Endpoint:      "http://localhost:8333", // Default SeaweedFS S3 port
							 | 
						|
										AccessKey:     "some_access_key1",
							 | 
						|
										SecretKey:     "some_secret_key1",
							 | 
						|
										Region:        "us-east-1",
							 | 
						|
										BucketPrefix:  "test-versioning-",
							 | 
						|
										UseSSL:        false,
							 | 
						|
										SkipVerifySSL: true,
							 | 
						|
									}
							 | 
						|
								
							 | 
						|
									cfg, err := config.LoadDefaultConfig(context.TODO(),
							 | 
						|
										config.WithRegion(defaultConfig.Region),
							 | 
						|
										config.WithCredentialsProvider(credentials.NewStaticCredentialsProvider(
							 | 
						|
											defaultConfig.AccessKey,
							 | 
						|
											defaultConfig.SecretKey,
							 | 
						|
											"",
							 | 
						|
										)),
							 | 
						|
										config.WithEndpointResolverWithOptions(aws.EndpointResolverWithOptionsFunc(
							 | 
						|
											func(service, region string, options ...interface{}) (aws.Endpoint, error) {
							 | 
						|
												return aws.Endpoint{
							 | 
						|
													URL:               defaultConfig.Endpoint,
							 | 
						|
													SigningRegion:     defaultConfig.Region,
							 | 
						|
													HostnameImmutable: true,
							 | 
						|
												}, nil
							 | 
						|
											})),
							 | 
						|
									)
							 | 
						|
									require.NoError(t, err)
							 | 
						|
								
							 | 
						|
									return s3.NewFromConfig(cfg, func(o *s3.Options) {
							 | 
						|
										o.UsePathStyle = true // Important for SeaweedFS
							 | 
						|
									})
							 | 
						|
								}
							 | 
						|
								
							 | 
						|
								// Helper function to clean up bucket
							 | 
						|
								func cleanupBucket(t *testing.T, client *s3.Client, bucketName string) {
							 | 
						|
									// First, delete all objects and versions
							 | 
						|
									err := deleteAllObjectVersions(t, client, bucketName)
							 | 
						|
									if err != nil {
							 | 
						|
										t.Logf("Warning: failed to delete all object versions: %v", err)
							 | 
						|
									}
							 | 
						|
								
							 | 
						|
									// Then delete the bucket
							 | 
						|
									_, err = client.DeleteBucket(context.TODO(), &s3.DeleteBucketInput{
							 | 
						|
										Bucket: aws.String(bucketName),
							 | 
						|
									})
							 | 
						|
									if err != nil {
							 | 
						|
										t.Logf("Warning: failed to delete bucket %s: %v", bucketName, err)
							 | 
						|
									}
							 | 
						|
								}
							 |