You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
176 lines
5.1 KiB
176 lines
5.1 KiB
package s3api
|
|
|
|
import (
|
|
"bytes"
|
|
"testing"
|
|
|
|
"github.com/seaweedfs/seaweedfs/weed/pb/filer_pb"
|
|
"github.com/seaweedfs/seaweedfs/weed/util"
|
|
)
|
|
|
|
// TestCreateDestinationChunkPreservesEncryption tests that createDestinationChunk preserves CipherKey and IsCompressed
|
|
func TestCreateDestinationChunkPreservesEncryption(t *testing.T) {
|
|
s3a := &S3ApiServer{}
|
|
|
|
testCases := []struct {
|
|
name string
|
|
sourceChunk *filer_pb.FileChunk
|
|
expectedOffset int64
|
|
expectedSize uint64
|
|
shouldPreserveCK bool
|
|
shouldPreserveIC bool
|
|
}{
|
|
{
|
|
name: "Encrypted and compressed chunk",
|
|
sourceChunk: &filer_pb.FileChunk{
|
|
Offset: 0,
|
|
Size: 1024,
|
|
CipherKey: []byte("test-cipher-key-1234567890123456"),
|
|
IsCompressed: true,
|
|
ETag: "test-etag",
|
|
},
|
|
expectedOffset: 0,
|
|
expectedSize: 1024,
|
|
shouldPreserveCK: true,
|
|
shouldPreserveIC: true,
|
|
},
|
|
{
|
|
name: "Only encrypted chunk",
|
|
sourceChunk: &filer_pb.FileChunk{
|
|
Offset: 1024,
|
|
Size: 2048,
|
|
CipherKey: []byte("test-cipher-key-1234567890123456"),
|
|
IsCompressed: false,
|
|
ETag: "test-etag-2",
|
|
},
|
|
expectedOffset: 1024,
|
|
expectedSize: 2048,
|
|
shouldPreserveCK: true,
|
|
shouldPreserveIC: false,
|
|
},
|
|
{
|
|
name: "Only compressed chunk",
|
|
sourceChunk: &filer_pb.FileChunk{
|
|
Offset: 2048,
|
|
Size: 512,
|
|
CipherKey: nil,
|
|
IsCompressed: true,
|
|
ETag: "test-etag-3",
|
|
},
|
|
expectedOffset: 2048,
|
|
expectedSize: 512,
|
|
shouldPreserveCK: false,
|
|
shouldPreserveIC: true,
|
|
},
|
|
{
|
|
name: "Unencrypted and uncompressed chunk",
|
|
sourceChunk: &filer_pb.FileChunk{
|
|
Offset: 4096,
|
|
Size: 1024,
|
|
CipherKey: nil,
|
|
IsCompressed: false,
|
|
ETag: "test-etag-4",
|
|
},
|
|
expectedOffset: 4096,
|
|
expectedSize: 1024,
|
|
shouldPreserveCK: false,
|
|
shouldPreserveIC: false,
|
|
},
|
|
}
|
|
|
|
for _, tc := range testCases {
|
|
t.Run(tc.name, func(t *testing.T) {
|
|
dstChunk := s3a.createDestinationChunk(tc.sourceChunk, tc.expectedOffset, tc.expectedSize)
|
|
|
|
// Verify offset and size
|
|
if dstChunk.Offset != tc.expectedOffset {
|
|
t.Errorf("Expected offset %d, got %d", tc.expectedOffset, dstChunk.Offset)
|
|
}
|
|
if dstChunk.Size != tc.expectedSize {
|
|
t.Errorf("Expected size %d, got %d", tc.expectedSize, dstChunk.Size)
|
|
}
|
|
|
|
// Verify CipherKey preservation
|
|
if tc.shouldPreserveCK {
|
|
if !bytes.Equal(dstChunk.CipherKey, tc.sourceChunk.CipherKey) {
|
|
t.Errorf("CipherKey not preserved: expected %v, got %v", tc.sourceChunk.CipherKey, dstChunk.CipherKey)
|
|
}
|
|
} else {
|
|
if len(dstChunk.CipherKey) > 0 {
|
|
t.Errorf("Expected no CipherKey, got %v", dstChunk.CipherKey)
|
|
}
|
|
}
|
|
|
|
// Verify IsCompressed preservation
|
|
if dstChunk.IsCompressed != tc.shouldPreserveIC {
|
|
t.Errorf("IsCompressed not preserved: expected %v, got %v", tc.shouldPreserveIC, dstChunk.IsCompressed)
|
|
}
|
|
|
|
// Verify ETag preservation
|
|
if dstChunk.ETag != tc.sourceChunk.ETag {
|
|
t.Errorf("ETag not preserved: expected %s, got %s", tc.sourceChunk.ETag, dstChunk.ETag)
|
|
}
|
|
})
|
|
}
|
|
}
|
|
|
|
// TestEncryptedVolumeCopyScenario documents the expected behavior for encrypted volumes (issue #7530)
|
|
func TestEncryptedVolumeCopyScenario(t *testing.T) {
|
|
t.Run("Scenario: Copy file on encrypted volume with multiple chunks", func(t *testing.T) {
|
|
// Scenario description for issue #7530:
|
|
// 1. Volume is started with -filer.encryptVolumeData
|
|
// 2. File is uploaded via S3 (automatically encrypted, multiple chunks)
|
|
// 3. File is copied/renamed via S3 CopyObject
|
|
// 4. Copied file should be readable
|
|
//
|
|
// The bug was that IsCompressed flag was not preserved during copy,
|
|
// causing the upload logic to potentially double-compress the data,
|
|
// making the copied file unreadable.
|
|
|
|
sourceChunks := []*filer_pb.FileChunk{
|
|
{
|
|
FileId: "1,abc123",
|
|
Offset: 0,
|
|
Size: 4194304,
|
|
CipherKey: util.GenCipherKey(), // Simulates encrypted volume
|
|
IsCompressed: true, // Simulates compression
|
|
ETag: "etag1",
|
|
},
|
|
{
|
|
FileId: "2,def456",
|
|
Offset: 4194304,
|
|
Size: 4194304,
|
|
CipherKey: util.GenCipherKey(),
|
|
IsCompressed: true,
|
|
ETag: "etag2",
|
|
},
|
|
}
|
|
|
|
s3a := &S3ApiServer{}
|
|
|
|
// Verify that createDestinationChunk preserves all necessary metadata
|
|
for i, srcChunk := range sourceChunks {
|
|
dstChunk := s3a.createDestinationChunk(srcChunk, srcChunk.Offset, srcChunk.Size)
|
|
|
|
// Critical checks for issue #7530
|
|
if !dstChunk.IsCompressed {
|
|
t.Errorf("Chunk %d: IsCompressed flag MUST be preserved to prevent double-compression", i)
|
|
}
|
|
if !bytes.Equal(dstChunk.CipherKey, srcChunk.CipherKey) {
|
|
t.Errorf("Chunk %d: CipherKey MUST be preserved for encrypted volumes", i)
|
|
}
|
|
if dstChunk.Offset != srcChunk.Offset {
|
|
t.Errorf("Chunk %d: Offset must be preserved", i)
|
|
}
|
|
if dstChunk.Size != srcChunk.Size {
|
|
t.Errorf("Chunk %d: Size must be preserved", i)
|
|
}
|
|
if dstChunk.ETag != srcChunk.ETag {
|
|
t.Errorf("Chunk %d: ETag must be preserved", i)
|
|
}
|
|
}
|
|
|
|
t.Log("✓ All chunk metadata properly preserved for encrypted volume copy scenario")
|
|
})
|
|
}
|
|
|