You can not select more than 25 topics
			Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
		
		
		
		
		
			
		
			
				
					
					
						
							662 lines
						
					
					
						
							25 KiB
						
					
					
				
			
		
		
		
			
			
			
		
		
	
	
							662 lines
						
					
					
						
							25 KiB
						
					
					
				| package s3api | |
| 
 | |
| import ( | |
| 	"fmt" | |
| 	"net/http/httptest" | |
| 	"strconv" | |
| 	"testing" | |
| 	"time" | |
| 
 | |
| 	"errors" | |
| 
 | |
| 	"github.com/seaweedfs/seaweedfs/weed/pb/filer_pb" | |
| 	"github.com/seaweedfs/seaweedfs/weed/s3api/s3_constants" | |
| 	"github.com/seaweedfs/seaweedfs/weed/s3api/s3err" | |
| 	"github.com/stretchr/testify/assert" | |
| ) | |
| 
 | |
| // TestExtractObjectLockMetadataFromRequest tests the function that extracts | |
| // object lock headers from PUT requests and stores them in Extended attributes. | |
| // This test would have caught the bug where object lock headers were ignored. | |
| func TestExtractObjectLockMetadataFromRequest(t *testing.T) { | |
| 	s3a := &S3ApiServer{} | |
| 
 | |
| 	t.Run("Extract COMPLIANCE mode and retention date", func(t *testing.T) { | |
| 		req := httptest.NewRequest("PUT", "/bucket/object", nil) | |
| 		retainUntilDate := time.Now().Add(24 * time.Hour) | |
| 		req.Header.Set(s3_constants.AmzObjectLockMode, "COMPLIANCE") | |
| 		req.Header.Set(s3_constants.AmzObjectLockRetainUntilDate, retainUntilDate.Format(time.RFC3339)) | |
| 
 | |
| 		entry := &filer_pb.Entry{ | |
| 			Extended: make(map[string][]byte), | |
| 		} | |
| 
 | |
| 		err := s3a.extractObjectLockMetadataFromRequest(req, entry) | |
| 		assert.NoError(t, err) | |
| 
 | |
| 		// Verify mode was stored | |
| 		assert.Contains(t, entry.Extended, s3_constants.ExtObjectLockModeKey) | |
| 		assert.Equal(t, "COMPLIANCE", string(entry.Extended[s3_constants.ExtObjectLockModeKey])) | |
| 
 | |
| 		// Verify retention date was stored | |
| 		assert.Contains(t, entry.Extended, s3_constants.ExtRetentionUntilDateKey) | |
| 		storedTimestamp, err := strconv.ParseInt(string(entry.Extended[s3_constants.ExtRetentionUntilDateKey]), 10, 64) | |
| 		assert.NoError(t, err) | |
| 		storedTime := time.Unix(storedTimestamp, 0) | |
| 		assert.WithinDuration(t, retainUntilDate, storedTime, 1*time.Second) | |
| 	}) | |
| 
 | |
| 	t.Run("Extract GOVERNANCE mode and retention date", func(t *testing.T) { | |
| 		req := httptest.NewRequest("PUT", "/bucket/object", nil) | |
| 		retainUntilDate := time.Now().Add(12 * time.Hour) | |
| 		req.Header.Set(s3_constants.AmzObjectLockMode, "GOVERNANCE") | |
| 		req.Header.Set(s3_constants.AmzObjectLockRetainUntilDate, retainUntilDate.Format(time.RFC3339)) | |
| 
 | |
| 		entry := &filer_pb.Entry{ | |
| 			Extended: make(map[string][]byte), | |
| 		} | |
| 
 | |
| 		err := s3a.extractObjectLockMetadataFromRequest(req, entry) | |
| 		assert.NoError(t, err) | |
| 
 | |
| 		assert.Equal(t, "GOVERNANCE", string(entry.Extended[s3_constants.ExtObjectLockModeKey])) | |
| 		assert.Contains(t, entry.Extended, s3_constants.ExtRetentionUntilDateKey) | |
| 	}) | |
| 
 | |
| 	t.Run("Extract legal hold ON", func(t *testing.T) { | |
| 		req := httptest.NewRequest("PUT", "/bucket/object", nil) | |
| 		req.Header.Set(s3_constants.AmzObjectLockLegalHold, "ON") | |
| 
 | |
| 		entry := &filer_pb.Entry{ | |
| 			Extended: make(map[string][]byte), | |
| 		} | |
| 
 | |
| 		err := s3a.extractObjectLockMetadataFromRequest(req, entry) | |
| 		assert.NoError(t, err) | |
| 
 | |
| 		assert.Contains(t, entry.Extended, s3_constants.ExtLegalHoldKey) | |
| 		assert.Equal(t, "ON", string(entry.Extended[s3_constants.ExtLegalHoldKey])) | |
| 	}) | |
| 
 | |
| 	t.Run("Extract legal hold OFF", func(t *testing.T) { | |
| 		req := httptest.NewRequest("PUT", "/bucket/object", nil) | |
| 		req.Header.Set(s3_constants.AmzObjectLockLegalHold, "OFF") | |
| 
 | |
| 		entry := &filer_pb.Entry{ | |
| 			Extended: make(map[string][]byte), | |
| 		} | |
| 
 | |
| 		err := s3a.extractObjectLockMetadataFromRequest(req, entry) | |
| 		assert.NoError(t, err) | |
| 
 | |
| 		assert.Contains(t, entry.Extended, s3_constants.ExtLegalHoldKey) | |
| 		assert.Equal(t, "OFF", string(entry.Extended[s3_constants.ExtLegalHoldKey])) | |
| 	}) | |
| 
 | |
| 	t.Run("Handle all object lock headers together", func(t *testing.T) { | |
| 		req := httptest.NewRequest("PUT", "/bucket/object", nil) | |
| 		retainUntilDate := time.Now().Add(24 * time.Hour) | |
| 		req.Header.Set(s3_constants.AmzObjectLockMode, "COMPLIANCE") | |
| 		req.Header.Set(s3_constants.AmzObjectLockRetainUntilDate, retainUntilDate.Format(time.RFC3339)) | |
| 		req.Header.Set(s3_constants.AmzObjectLockLegalHold, "ON") | |
| 
 | |
| 		entry := &filer_pb.Entry{ | |
| 			Extended: make(map[string][]byte), | |
| 		} | |
| 
 | |
| 		err := s3a.extractObjectLockMetadataFromRequest(req, entry) | |
| 		assert.NoError(t, err) | |
| 
 | |
| 		// All metadata should be stored | |
| 		assert.Equal(t, "COMPLIANCE", string(entry.Extended[s3_constants.ExtObjectLockModeKey])) | |
| 		assert.Contains(t, entry.Extended, s3_constants.ExtRetentionUntilDateKey) | |
| 		assert.Equal(t, "ON", string(entry.Extended[s3_constants.ExtLegalHoldKey])) | |
| 	}) | |
| 
 | |
| 	t.Run("Handle no object lock headers", func(t *testing.T) { | |
| 		req := httptest.NewRequest("PUT", "/bucket/object", nil) | |
| 		// No object lock headers set | |
|  | |
| 		entry := &filer_pb.Entry{ | |
| 			Extended: make(map[string][]byte), | |
| 		} | |
| 
 | |
| 		err := s3a.extractObjectLockMetadataFromRequest(req, entry) | |
| 		assert.NoError(t, err) | |
| 
 | |
| 		// No object lock metadata should be stored | |
| 		assert.NotContains(t, entry.Extended, s3_constants.ExtObjectLockModeKey) | |
| 		assert.NotContains(t, entry.Extended, s3_constants.ExtRetentionUntilDateKey) | |
| 		assert.NotContains(t, entry.Extended, s3_constants.ExtLegalHoldKey) | |
| 	}) | |
| 
 | |
| 	t.Run("Handle invalid retention date - should return error", func(t *testing.T) { | |
| 		req := httptest.NewRequest("PUT", "/bucket/object", nil) | |
| 		req.Header.Set(s3_constants.AmzObjectLockMode, "GOVERNANCE") | |
| 		req.Header.Set(s3_constants.AmzObjectLockRetainUntilDate, "invalid-date") | |
| 
 | |
| 		entry := &filer_pb.Entry{ | |
| 			Extended: make(map[string][]byte), | |
| 		} | |
| 
 | |
| 		err := s3a.extractObjectLockMetadataFromRequest(req, entry) | |
| 		assert.Error(t, err) | |
| 		assert.True(t, errors.Is(err, ErrInvalidRetentionDateFormat)) | |
| 
 | |
| 		// Mode should be stored but not invalid date | |
| 		assert.Equal(t, "GOVERNANCE", string(entry.Extended[s3_constants.ExtObjectLockModeKey])) | |
| 		assert.NotContains(t, entry.Extended, s3_constants.ExtRetentionUntilDateKey) | |
| 	}) | |
| 
 | |
| 	t.Run("Handle invalid legal hold value - should return error", func(t *testing.T) { | |
| 		req := httptest.NewRequest("PUT", "/bucket/object", nil) | |
| 		req.Header.Set(s3_constants.AmzObjectLockLegalHold, "INVALID") | |
| 
 | |
| 		entry := &filer_pb.Entry{ | |
| 			Extended: make(map[string][]byte), | |
| 		} | |
| 
 | |
| 		err := s3a.extractObjectLockMetadataFromRequest(req, entry) | |
| 		assert.Error(t, err) | |
| 		assert.True(t, errors.Is(err, ErrInvalidLegalHoldStatus)) | |
| 
 | |
| 		// No legal hold metadata should be stored due to error | |
| 		assert.NotContains(t, entry.Extended, s3_constants.ExtLegalHoldKey) | |
| 	}) | |
| } | |
| 
 | |
| // TestAddObjectLockHeadersToResponse tests the function that adds object lock | |
| // metadata from Extended attributes to HTTP response headers. | |
| // This test would have caught the bug where HEAD responses didn't include object lock metadata. | |
| func TestAddObjectLockHeadersToResponse(t *testing.T) { | |
| 	s3a := &S3ApiServer{} | |
| 
 | |
| 	t.Run("Add COMPLIANCE mode and retention date to response", func(t *testing.T) { | |
| 		w := httptest.NewRecorder() | |
| 		retainUntilTime := time.Now().Add(24 * time.Hour) | |
| 
 | |
| 		entry := &filer_pb.Entry{ | |
| 			Extended: map[string][]byte{ | |
| 				s3_constants.ExtObjectLockModeKey:     []byte("COMPLIANCE"), | |
| 				s3_constants.ExtRetentionUntilDateKey: []byte(strconv.FormatInt(retainUntilTime.Unix(), 10)), | |
| 			}, | |
| 		} | |
| 
 | |
| 		s3a.addObjectLockHeadersToResponse(w, entry) | |
| 
 | |
| 		// Verify headers were set | |
| 		assert.Equal(t, "COMPLIANCE", w.Header().Get(s3_constants.AmzObjectLockMode)) | |
| 		assert.NotEmpty(t, w.Header().Get(s3_constants.AmzObjectLockRetainUntilDate)) | |
| 
 | |
| 		// Verify the date format is correct | |
| 		returnedDate := w.Header().Get(s3_constants.AmzObjectLockRetainUntilDate) | |
| 		parsedTime, err := time.Parse(time.RFC3339, returnedDate) | |
| 		assert.NoError(t, err) | |
| 		assert.WithinDuration(t, retainUntilTime, parsedTime, 1*time.Second) | |
| 	}) | |
| 
 | |
| 	t.Run("Add GOVERNANCE mode to response", func(t *testing.T) { | |
| 		w := httptest.NewRecorder() | |
| 		entry := &filer_pb.Entry{ | |
| 			Extended: map[string][]byte{ | |
| 				s3_constants.ExtObjectLockModeKey: []byte("GOVERNANCE"), | |
| 			}, | |
| 		} | |
| 
 | |
| 		s3a.addObjectLockHeadersToResponse(w, entry) | |
| 
 | |
| 		assert.Equal(t, "GOVERNANCE", w.Header().Get(s3_constants.AmzObjectLockMode)) | |
| 	}) | |
| 
 | |
| 	t.Run("Add legal hold ON to response", func(t *testing.T) { | |
| 		w := httptest.NewRecorder() | |
| 		entry := &filer_pb.Entry{ | |
| 			Extended: map[string][]byte{ | |
| 				s3_constants.ExtLegalHoldKey: []byte("ON"), | |
| 			}, | |
| 		} | |
| 
 | |
| 		s3a.addObjectLockHeadersToResponse(w, entry) | |
| 
 | |
| 		assert.Equal(t, "ON", w.Header().Get(s3_constants.AmzObjectLockLegalHold)) | |
| 	}) | |
| 
 | |
| 	t.Run("Add legal hold OFF to response", func(t *testing.T) { | |
| 		w := httptest.NewRecorder() | |
| 		entry := &filer_pb.Entry{ | |
| 			Extended: map[string][]byte{ | |
| 				s3_constants.ExtLegalHoldKey: []byte("OFF"), | |
| 			}, | |
| 		} | |
| 
 | |
| 		s3a.addObjectLockHeadersToResponse(w, entry) | |
| 
 | |
| 		assert.Equal(t, "OFF", w.Header().Get(s3_constants.AmzObjectLockLegalHold)) | |
| 	}) | |
| 
 | |
| 	t.Run("Add all object lock headers to response", func(t *testing.T) { | |
| 		w := httptest.NewRecorder() | |
| 		retainUntilTime := time.Now().Add(12 * time.Hour) | |
| 
 | |
| 		entry := &filer_pb.Entry{ | |
| 			Extended: map[string][]byte{ | |
| 				s3_constants.ExtObjectLockModeKey:     []byte("GOVERNANCE"), | |
| 				s3_constants.ExtRetentionUntilDateKey: []byte(strconv.FormatInt(retainUntilTime.Unix(), 10)), | |
| 				s3_constants.ExtLegalHoldKey:          []byte("ON"), | |
| 			}, | |
| 		} | |
| 
 | |
| 		s3a.addObjectLockHeadersToResponse(w, entry) | |
| 
 | |
| 		// All headers should be set | |
| 		assert.Equal(t, "GOVERNANCE", w.Header().Get(s3_constants.AmzObjectLockMode)) | |
| 		assert.NotEmpty(t, w.Header().Get(s3_constants.AmzObjectLockRetainUntilDate)) | |
| 		assert.Equal(t, "ON", w.Header().Get(s3_constants.AmzObjectLockLegalHold)) | |
| 	}) | |
| 
 | |
| 	t.Run("Handle entry with no object lock metadata", func(t *testing.T) { | |
| 		w := httptest.NewRecorder() | |
| 		entry := &filer_pb.Entry{ | |
| 			Extended: map[string][]byte{ | |
| 				"other-metadata": []byte("some-value"), | |
| 			}, | |
| 		} | |
| 
 | |
| 		s3a.addObjectLockHeadersToResponse(w, entry) | |
| 
 | |
| 		// No object lock headers should be set for entries without object lock metadata | |
| 		assert.Empty(t, w.Header().Get(s3_constants.AmzObjectLockMode)) | |
| 		assert.Empty(t, w.Header().Get(s3_constants.AmzObjectLockRetainUntilDate)) | |
| 		assert.Empty(t, w.Header().Get(s3_constants.AmzObjectLockLegalHold)) | |
| 	}) | |
| 
 | |
| 	t.Run("Handle entry with object lock mode but no legal hold - should default to OFF", func(t *testing.T) { | |
| 		w := httptest.NewRecorder() | |
| 		entry := &filer_pb.Entry{ | |
| 			Extended: map[string][]byte{ | |
| 				s3_constants.ExtObjectLockModeKey: []byte("GOVERNANCE"), | |
| 			}, | |
| 		} | |
| 
 | |
| 		s3a.addObjectLockHeadersToResponse(w, entry) | |
| 
 | |
| 		// Should set mode and default legal hold to OFF | |
| 		assert.Equal(t, "GOVERNANCE", w.Header().Get(s3_constants.AmzObjectLockMode)) | |
| 		assert.Empty(t, w.Header().Get(s3_constants.AmzObjectLockRetainUntilDate)) | |
| 		assert.Equal(t, "OFF", w.Header().Get(s3_constants.AmzObjectLockLegalHold)) | |
| 	}) | |
| 
 | |
| 	t.Run("Handle entry with retention date but no legal hold - should default to OFF", func(t *testing.T) { | |
| 		w := httptest.NewRecorder() | |
| 		retainUntilTime := time.Now().Add(24 * time.Hour) | |
| 		entry := &filer_pb.Entry{ | |
| 			Extended: map[string][]byte{ | |
| 				s3_constants.ExtRetentionUntilDateKey: []byte(strconv.FormatInt(retainUntilTime.Unix(), 10)), | |
| 			}, | |
| 		} | |
| 
 | |
| 		s3a.addObjectLockHeadersToResponse(w, entry) | |
| 
 | |
| 		// Should set retention date and default legal hold to OFF | |
| 		assert.Empty(t, w.Header().Get(s3_constants.AmzObjectLockMode)) | |
| 		assert.NotEmpty(t, w.Header().Get(s3_constants.AmzObjectLockRetainUntilDate)) | |
| 		assert.Equal(t, "OFF", w.Header().Get(s3_constants.AmzObjectLockLegalHold)) | |
| 	}) | |
| 
 | |
| 	t.Run("Handle nil entry gracefully", func(t *testing.T) { | |
| 		w := httptest.NewRecorder() | |
| 
 | |
| 		// Should not panic | |
| 		s3a.addObjectLockHeadersToResponse(w, nil) | |
| 
 | |
| 		// No headers should be set | |
| 		assert.Empty(t, w.Header().Get(s3_constants.AmzObjectLockMode)) | |
| 		assert.Empty(t, w.Header().Get(s3_constants.AmzObjectLockRetainUntilDate)) | |
| 		assert.Empty(t, w.Header().Get(s3_constants.AmzObjectLockLegalHold)) | |
| 	}) | |
| 
 | |
| 	t.Run("Handle entry with nil Extended map gracefully", func(t *testing.T) { | |
| 		w := httptest.NewRecorder() | |
| 		entry := &filer_pb.Entry{ | |
| 			Extended: nil, | |
| 		} | |
| 
 | |
| 		// Should not panic | |
| 		s3a.addObjectLockHeadersToResponse(w, entry) | |
| 
 | |
| 		// No headers should be set | |
| 		assert.Empty(t, w.Header().Get(s3_constants.AmzObjectLockMode)) | |
| 		assert.Empty(t, w.Header().Get(s3_constants.AmzObjectLockRetainUntilDate)) | |
| 		assert.Empty(t, w.Header().Get(s3_constants.AmzObjectLockLegalHold)) | |
| 	}) | |
| 
 | |
| 	t.Run("Handle invalid retention timestamp gracefully", func(t *testing.T) { | |
| 		w := httptest.NewRecorder() | |
| 		entry := &filer_pb.Entry{ | |
| 			Extended: map[string][]byte{ | |
| 				s3_constants.ExtObjectLockModeKey:     []byte("COMPLIANCE"), | |
| 				s3_constants.ExtRetentionUntilDateKey: []byte("invalid-timestamp"), | |
| 			}, | |
| 		} | |
| 
 | |
| 		s3a.addObjectLockHeadersToResponse(w, entry) | |
| 
 | |
| 		// Mode should be set but not retention date due to invalid timestamp | |
| 		assert.Equal(t, "COMPLIANCE", w.Header().Get(s3_constants.AmzObjectLockMode)) | |
| 		assert.Empty(t, w.Header().Get(s3_constants.AmzObjectLockRetainUntilDate)) | |
| 	}) | |
| } | |
| 
 | |
| // TestObjectLockHeaderRoundTrip tests the complete round trip: | |
| // extract from request → store in Extended attributes → add to response | |
| func TestObjectLockHeaderRoundTrip(t *testing.T) { | |
| 	s3a := &S3ApiServer{} | |
| 
 | |
| 	t.Run("Complete round trip for COMPLIANCE mode", func(t *testing.T) { | |
| 		// 1. Create request with object lock headers | |
| 		req := httptest.NewRequest("PUT", "/bucket/object", nil) | |
| 		retainUntilDate := time.Now().Add(24 * time.Hour) | |
| 		req.Header.Set(s3_constants.AmzObjectLockMode, "COMPLIANCE") | |
| 		req.Header.Set(s3_constants.AmzObjectLockRetainUntilDate, retainUntilDate.Format(time.RFC3339)) | |
| 		req.Header.Set(s3_constants.AmzObjectLockLegalHold, "ON") | |
| 
 | |
| 		// 2. Extract and store in Extended attributes | |
| 		entry := &filer_pb.Entry{ | |
| 			Extended: make(map[string][]byte), | |
| 		} | |
| 		err := s3a.extractObjectLockMetadataFromRequest(req, entry) | |
| 		assert.NoError(t, err) | |
| 
 | |
| 		// 3. Add to response headers | |
| 		w := httptest.NewRecorder() | |
| 		s3a.addObjectLockHeadersToResponse(w, entry) | |
| 
 | |
| 		// 4. Verify round trip preserved all data | |
| 		assert.Equal(t, "COMPLIANCE", w.Header().Get(s3_constants.AmzObjectLockMode)) | |
| 		assert.Equal(t, "ON", w.Header().Get(s3_constants.AmzObjectLockLegalHold)) | |
| 
 | |
| 		returnedDate := w.Header().Get(s3_constants.AmzObjectLockRetainUntilDate) | |
| 		parsedTime, err := time.Parse(time.RFC3339, returnedDate) | |
| 		assert.NoError(t, err) | |
| 		assert.WithinDuration(t, retainUntilDate, parsedTime, 1*time.Second) | |
| 	}) | |
| 
 | |
| 	t.Run("Complete round trip for GOVERNANCE mode", func(t *testing.T) { | |
| 		req := httptest.NewRequest("PUT", "/bucket/object", nil) | |
| 		retainUntilDate := time.Now().Add(12 * time.Hour) | |
| 		req.Header.Set(s3_constants.AmzObjectLockMode, "GOVERNANCE") | |
| 		req.Header.Set(s3_constants.AmzObjectLockRetainUntilDate, retainUntilDate.Format(time.RFC3339)) | |
| 
 | |
| 		entry := &filer_pb.Entry{Extended: make(map[string][]byte)} | |
| 		err := s3a.extractObjectLockMetadataFromRequest(req, entry) | |
| 		assert.NoError(t, err) | |
| 
 | |
| 		w := httptest.NewRecorder() | |
| 		s3a.addObjectLockHeadersToResponse(w, entry) | |
| 
 | |
| 		assert.Equal(t, "GOVERNANCE", w.Header().Get(s3_constants.AmzObjectLockMode)) | |
| 		assert.NotEmpty(t, w.Header().Get(s3_constants.AmzObjectLockRetainUntilDate)) | |
| 	}) | |
| } | |
| 
 | |
| // TestValidateObjectLockHeaders tests the validateObjectLockHeaders function | |
| // to ensure proper validation of object lock headers in PUT requests | |
| func TestValidateObjectLockHeaders(t *testing.T) { | |
| 	s3a := &S3ApiServer{} | |
| 
 | |
| 	t.Run("Valid COMPLIANCE mode with retention date on versioned bucket", func(t *testing.T) { | |
| 		req := httptest.NewRequest("PUT", "/bucket/object", nil) | |
| 		retainUntilDate := time.Now().Add(24 * time.Hour) | |
| 		req.Header.Set(s3_constants.AmzObjectLockMode, "COMPLIANCE") | |
| 		req.Header.Set(s3_constants.AmzObjectLockRetainUntilDate, retainUntilDate.Format(time.RFC3339)) | |
| 
 | |
| 		err := s3a.validateObjectLockHeaders(req, true) // versioned bucket | |
| 		assert.NoError(t, err) | |
| 	}) | |
| 
 | |
| 	t.Run("Valid GOVERNANCE mode with retention date on versioned bucket", func(t *testing.T) { | |
| 		req := httptest.NewRequest("PUT", "/bucket/object", nil) | |
| 		retainUntilDate := time.Now().Add(12 * time.Hour) | |
| 		req.Header.Set(s3_constants.AmzObjectLockMode, "GOVERNANCE") | |
| 		req.Header.Set(s3_constants.AmzObjectLockRetainUntilDate, retainUntilDate.Format(time.RFC3339)) | |
| 
 | |
| 		err := s3a.validateObjectLockHeaders(req, true) // versioned bucket | |
| 		assert.NoError(t, err) | |
| 	}) | |
| 
 | |
| 	t.Run("Valid legal hold ON on versioned bucket", func(t *testing.T) { | |
| 		req := httptest.NewRequest("PUT", "/bucket/object", nil) | |
| 		req.Header.Set(s3_constants.AmzObjectLockLegalHold, "ON") | |
| 
 | |
| 		err := s3a.validateObjectLockHeaders(req, true) // versioned bucket | |
| 		assert.NoError(t, err) | |
| 	}) | |
| 
 | |
| 	t.Run("Valid legal hold OFF on versioned bucket", func(t *testing.T) { | |
| 		req := httptest.NewRequest("PUT", "/bucket/object", nil) | |
| 		req.Header.Set(s3_constants.AmzObjectLockLegalHold, "OFF") | |
| 
 | |
| 		err := s3a.validateObjectLockHeaders(req, true) // versioned bucket | |
| 		assert.NoError(t, err) | |
| 	}) | |
| 
 | |
| 	t.Run("Invalid object lock mode", func(t *testing.T) { | |
| 		req := httptest.NewRequest("PUT", "/bucket/object", nil) | |
| 		req.Header.Set(s3_constants.AmzObjectLockMode, "INVALID_MODE") | |
| 		retainUntilDate := time.Now().Add(24 * time.Hour) | |
| 		req.Header.Set(s3_constants.AmzObjectLockRetainUntilDate, retainUntilDate.Format(time.RFC3339)) | |
| 
 | |
| 		err := s3a.validateObjectLockHeaders(req, true) // versioned bucket | |
| 		assert.Error(t, err) | |
| 		assert.True(t, errors.Is(err, ErrInvalidObjectLockMode)) | |
| 	}) | |
| 
 | |
| 	t.Run("Invalid legal hold status", func(t *testing.T) { | |
| 		req := httptest.NewRequest("PUT", "/bucket/object", nil) | |
| 		req.Header.Set(s3_constants.AmzObjectLockLegalHold, "INVALID_STATUS") | |
| 
 | |
| 		err := s3a.validateObjectLockHeaders(req, true) // versioned bucket | |
| 		assert.Error(t, err) | |
| 		assert.True(t, errors.Is(err, ErrInvalidLegalHoldStatus)) | |
| 	}) | |
| 
 | |
| 	t.Run("Object lock headers on non-versioned bucket", func(t *testing.T) { | |
| 		req := httptest.NewRequest("PUT", "/bucket/object", nil) | |
| 		req.Header.Set(s3_constants.AmzObjectLockMode, "COMPLIANCE") | |
| 		retainUntilDate := time.Now().Add(24 * time.Hour) | |
| 		req.Header.Set(s3_constants.AmzObjectLockRetainUntilDate, retainUntilDate.Format(time.RFC3339)) | |
| 
 | |
| 		err := s3a.validateObjectLockHeaders(req, false) // non-versioned bucket | |
| 		assert.Error(t, err) | |
| 		assert.True(t, errors.Is(err, ErrObjectLockVersioningRequired)) | |
| 	}) | |
| 
 | |
| 	t.Run("Invalid retention date format", func(t *testing.T) { | |
| 		req := httptest.NewRequest("PUT", "/bucket/object", nil) | |
| 		req.Header.Set(s3_constants.AmzObjectLockMode, "COMPLIANCE") | |
| 		req.Header.Set(s3_constants.AmzObjectLockRetainUntilDate, "invalid-date-format") | |
| 
 | |
| 		err := s3a.validateObjectLockHeaders(req, true) // versioned bucket | |
| 		assert.Error(t, err) | |
| 		assert.True(t, errors.Is(err, ErrInvalidRetentionDateFormat)) | |
| 	}) | |
| 
 | |
| 	t.Run("Retention date in the past", func(t *testing.T) { | |
| 		req := httptest.NewRequest("PUT", "/bucket/object", nil) | |
| 		req.Header.Set(s3_constants.AmzObjectLockMode, "COMPLIANCE") | |
| 		pastDate := time.Now().Add(-24 * time.Hour) | |
| 		req.Header.Set(s3_constants.AmzObjectLockRetainUntilDate, pastDate.Format(time.RFC3339)) | |
| 
 | |
| 		err := s3a.validateObjectLockHeaders(req, true) // versioned bucket | |
| 		assert.Error(t, err) | |
| 		assert.True(t, errors.Is(err, ErrRetentionDateMustBeFuture)) | |
| 	}) | |
| 
 | |
| 	t.Run("Mode without retention date", func(t *testing.T) { | |
| 		req := httptest.NewRequest("PUT", "/bucket/object", nil) | |
| 		req.Header.Set(s3_constants.AmzObjectLockMode, "COMPLIANCE") | |
| 
 | |
| 		err := s3a.validateObjectLockHeaders(req, true) // versioned bucket | |
| 		assert.Error(t, err) | |
| 		assert.True(t, errors.Is(err, ErrObjectLockModeRequiresDate)) | |
| 	}) | |
| 
 | |
| 	t.Run("Retention date without mode", func(t *testing.T) { | |
| 		req := httptest.NewRequest("PUT", "/bucket/object", nil) | |
| 		retainUntilDate := time.Now().Add(24 * time.Hour) | |
| 		req.Header.Set(s3_constants.AmzObjectLockRetainUntilDate, retainUntilDate.Format(time.RFC3339)) | |
| 
 | |
| 		err := s3a.validateObjectLockHeaders(req, true) // versioned bucket | |
| 		assert.Error(t, err) | |
| 		assert.True(t, errors.Is(err, ErrRetentionDateRequiresMode)) | |
| 	}) | |
| 
 | |
| 	t.Run("Governance bypass header on non-versioned bucket", func(t *testing.T) { | |
| 		req := httptest.NewRequest("PUT", "/bucket/object", nil) | |
| 		req.Header.Set("x-amz-bypass-governance-retention", "true") | |
| 
 | |
| 		err := s3a.validateObjectLockHeaders(req, false) // non-versioned bucket | |
| 		assert.Error(t, err) | |
| 		assert.True(t, errors.Is(err, ErrGovernanceBypassVersioningRequired)) | |
| 	}) | |
| 
 | |
| 	t.Run("Governance bypass header on versioned bucket should pass", func(t *testing.T) { | |
| 		req := httptest.NewRequest("PUT", "/bucket/object", nil) | |
| 		req.Header.Set("x-amz-bypass-governance-retention", "true") | |
| 
 | |
| 		err := s3a.validateObjectLockHeaders(req, true) // versioned bucket | |
| 		assert.NoError(t, err) | |
| 	}) | |
| 
 | |
| 	t.Run("No object lock headers should pass", func(t *testing.T) { | |
| 		req := httptest.NewRequest("PUT", "/bucket/object", nil) | |
| 		// No object lock headers set | |
|  | |
| 		err := s3a.validateObjectLockHeaders(req, true) // versioned bucket | |
| 		assert.NoError(t, err) | |
| 	}) | |
| 
 | |
| 	t.Run("Mixed valid headers should pass", func(t *testing.T) { | |
| 		req := httptest.NewRequest("PUT", "/bucket/object", nil) | |
| 		retainUntilDate := time.Now().Add(48 * time.Hour) | |
| 		req.Header.Set(s3_constants.AmzObjectLockMode, "GOVERNANCE") | |
| 		req.Header.Set(s3_constants.AmzObjectLockRetainUntilDate, retainUntilDate.Format(time.RFC3339)) | |
| 		req.Header.Set(s3_constants.AmzObjectLockLegalHold, "ON") | |
| 
 | |
| 		err := s3a.validateObjectLockHeaders(req, true) // versioned bucket | |
| 		assert.NoError(t, err) | |
| 	}) | |
| } | |
| 
 | |
| // TestMapValidationErrorToS3Error tests the error mapping function | |
| func TestMapValidationErrorToS3Error(t *testing.T) { | |
| 	tests := []struct { | |
| 		name         string | |
| 		inputError   error | |
| 		expectedCode s3err.ErrorCode | |
| 	}{ | |
| 		{ | |
| 			name:         "ErrObjectLockVersioningRequired", | |
| 			inputError:   ErrObjectLockVersioningRequired, | |
| 			expectedCode: s3err.ErrInvalidRequest, | |
| 		}, | |
| 		{ | |
| 			name:         "ErrInvalidObjectLockMode", | |
| 			inputError:   ErrInvalidObjectLockMode, | |
| 			expectedCode: s3err.ErrInvalidRequest, | |
| 		}, | |
| 		{ | |
| 			name:         "ErrInvalidLegalHoldStatus", | |
| 			inputError:   ErrInvalidLegalHoldStatus, | |
| 			expectedCode: s3err.ErrInvalidRequest, | |
| 		}, | |
| 		{ | |
| 			name:         "ErrInvalidRetentionDateFormat", | |
| 			inputError:   ErrInvalidRetentionDateFormat, | |
| 			expectedCode: s3err.ErrMalformedDate, | |
| 		}, | |
| 		{ | |
| 			name:         "ErrRetentionDateMustBeFuture", | |
| 			inputError:   ErrRetentionDateMustBeFuture, | |
| 			expectedCode: s3err.ErrInvalidRequest, | |
| 		}, | |
| 		{ | |
| 			name:         "ErrObjectLockModeRequiresDate", | |
| 			inputError:   ErrObjectLockModeRequiresDate, | |
| 			expectedCode: s3err.ErrInvalidRequest, | |
| 		}, | |
| 		{ | |
| 			name:         "ErrRetentionDateRequiresMode", | |
| 			inputError:   ErrRetentionDateRequiresMode, | |
| 			expectedCode: s3err.ErrInvalidRequest, | |
| 		}, | |
| 		{ | |
| 			name:         "ErrGovernanceBypassVersioningRequired", | |
| 			inputError:   ErrGovernanceBypassVersioningRequired, | |
| 			expectedCode: s3err.ErrInvalidRequest, | |
| 		}, | |
| 		{ | |
| 			name:         "Unknown error defaults to ErrInvalidRequest", | |
| 			inputError:   fmt.Errorf("unknown error"), | |
| 			expectedCode: s3err.ErrInvalidRequest, | |
| 		}, | |
| 	} | |
| 
 | |
| 	for _, tt := range tests { | |
| 		t.Run(tt.name, func(t *testing.T) { | |
| 			result := mapValidationErrorToS3Error(tt.inputError) | |
| 			assert.Equal(t, tt.expectedCode, result) | |
| 		}) | |
| 	} | |
| } | |
| 
 | |
| // TestObjectLockPermissionLogic documents the correct behavior for object lock permission checks | |
| // in PUT operations for both versioned and non-versioned buckets | |
| func TestObjectLockPermissionLogic(t *testing.T) { | |
| 	t.Run("Non-versioned bucket PUT operation logic", func(t *testing.T) { | |
| 		// In non-versioned buckets, PUT operations overwrite existing objects | |
| 		// Therefore, we MUST check if the existing object has object lock protections | |
| 		// that would prevent overwrite before allowing the PUT operation. | |
| 		// | |
| 		// This test documents the expected behavior: | |
| 		// 1. Check object lock headers validity (handled by validateObjectLockHeaders) | |
| 		// 2. Check if existing object has object lock protections (handled by checkObjectLockPermissions) | |
| 		// 3. If existing object is under retention/legal hold, deny the PUT unless governance bypass is valid | |
|  | |
| 		t.Log("For non-versioned buckets:") | |
| 		t.Log("- PUT operations overwrite existing objects") | |
| 		t.Log("- Must check existing object lock protections before allowing overwrite") | |
| 		t.Log("- Governance bypass headers can be used to override GOVERNANCE mode retention") | |
| 		t.Log("- COMPLIANCE mode retention and legal holds cannot be bypassed") | |
| 	}) | |
| 
 | |
| 	t.Run("Versioned bucket PUT operation logic", func(t *testing.T) { | |
| 		// In versioned buckets, PUT operations create new versions without overwriting existing ones | |
| 		// Therefore, we do NOT need to check existing object permissions since we're not modifying them. | |
| 		// We only need to validate the object lock headers for the new version being created. | |
| 		// | |
| 		// This test documents the expected behavior: | |
| 		// 1. Check object lock headers validity (handled by validateObjectLockHeaders) | |
| 		// 2. Skip checking existing object permissions (since we're creating a new version) | |
| 		// 3. Apply object lock metadata to the new version being created | |
|  | |
| 		t.Log("For versioned buckets:") | |
| 		t.Log("- PUT operations create new versions without overwriting existing objects") | |
| 		t.Log("- No need to check existing object lock protections") | |
| 		t.Log("- Only validate object lock headers for the new version being created") | |
| 		t.Log("- Each version has independent object lock settings") | |
| 	}) | |
| 
 | |
| 	t.Run("Governance bypass header validation", func(t *testing.T) { | |
| 		// Governance bypass headers should only be used in specific scenarios: | |
| 		// 1. Only valid on versioned buckets (consistent with object lock headers) | |
| 		// 2. For non-versioned buckets: Used to override existing object's GOVERNANCE retention | |
| 		// 3. For versioned buckets: Not typically needed since new versions don't conflict with existing ones | |
|  | |
| 		t.Log("Governance bypass behavior:") | |
| 		t.Log("- Only valid on versioned buckets (header validation)") | |
| 		t.Log("- For non-versioned buckets: Allows overwriting objects under GOVERNANCE retention") | |
| 		t.Log("- For versioned buckets: Not typically needed for PUT operations") | |
| 		t.Log("- Must have s3:BypassGovernanceRetention permission") | |
| 	}) | |
| }
 |