aboutsummaryrefslogtreecommitdiff
path: root/test/s3/sse
diff options
context:
space:
mode:
Diffstat (limited to 'test/s3/sse')
-rw-r--r--test/s3/sse/s3_range_headers_test.go104
-rw-r--r--test/s3/sse/s3_sse_range_server_test.go445
2 files changed, 549 insertions, 0 deletions
diff --git a/test/s3/sse/s3_range_headers_test.go b/test/s3/sse/s3_range_headers_test.go
new file mode 100644
index 000000000..e54004eb7
--- /dev/null
+++ b/test/s3/sse/s3_range_headers_test.go
@@ -0,0 +1,104 @@
+package sse_test
+
+import (
+ "bytes"
+ "context"
+ "fmt"
+ "io"
+ "testing"
+
+ "github.com/aws/aws-sdk-go-v2/aws"
+ "github.com/aws/aws-sdk-go-v2/service/s3"
+ "github.com/stretchr/testify/assert"
+ "github.com/stretchr/testify/require"
+)
+
+// TestPlainObjectRangeAndHeadHeaders ensures non-SSE objects advertise correct
+// Content-Length and Content-Range information for both HEAD and ranged GETs.
+func TestPlainObjectRangeAndHeadHeaders(t *testing.T) {
+ ctx := context.Background()
+
+ client, err := createS3Client(ctx, defaultConfig)
+ require.NoError(t, err, "failed to create S3 client")
+
+ bucketName, err := createTestBucket(ctx, client, defaultConfig.BucketPrefix+"range-plain-")
+ require.NoError(t, err, "failed to create test bucket")
+ defer cleanupTestBucket(ctx, client, bucketName)
+
+ // SeaweedFS S3 auto-chunks uploads at 8MiB (see chunkSize in putToFiler).
+ // Using 16MiB ensures at least two chunks without stressing CI resources.
+ const chunkSize = 8 * 1024 * 1024
+ const objectSize = 2 * chunkSize
+ objectKey := "plain-range-validation"
+ testData := generateTestData(objectSize)
+
+ _, err = client.PutObject(ctx, &s3.PutObjectInput{
+ Bucket: aws.String(bucketName),
+ Key: aws.String(objectKey),
+ Body: bytes.NewReader(testData),
+ })
+ require.NoError(t, err, "failed to upload test object")
+
+ t.Run("HeadObject reports accurate Content-Length", func(t *testing.T) {
+ resp, err := client.HeadObject(ctx, &s3.HeadObjectInput{
+ Bucket: aws.String(bucketName),
+ Key: aws.String(objectKey),
+ })
+ require.NoError(t, err, "HeadObject request failed")
+ assert.Equal(t, int64(objectSize), resp.ContentLength, "Content-Length mismatch on HEAD")
+ assert.Equal(t, "bytes", aws.ToString(resp.AcceptRanges), "Accept-Ranges should advertise bytes")
+ })
+
+ t.Run("Range request across chunk boundary", func(t *testing.T) {
+ // Test range that spans an 8MiB chunk boundary (chunkSize - 1KB to chunkSize + 3KB)
+ rangeStart := int64(chunkSize - 1024)
+ rangeEnd := rangeStart + 4096 - 1
+ rangeHeader := fmt.Sprintf("bytes=%d-%d", rangeStart, rangeEnd)
+
+ resp, err := client.GetObject(ctx, &s3.GetObjectInput{
+ Bucket: aws.String(bucketName),
+ Key: aws.String(objectKey),
+ Range: aws.String(rangeHeader),
+ })
+ require.NoError(t, err, "GetObject range request failed")
+ defer resp.Body.Close()
+
+ expectedLen := rangeEnd - rangeStart + 1
+ assert.Equal(t, expectedLen, resp.ContentLength, "Content-Length must match requested range size")
+ assert.Equal(t,
+ fmt.Sprintf("bytes %d-%d/%d", rangeStart, rangeEnd, objectSize),
+ aws.ToString(resp.ContentRange),
+ "Content-Range header mismatch")
+
+ body, err := io.ReadAll(resp.Body)
+ require.NoError(t, err, "failed to read range response body")
+ assert.Equal(t, int(expectedLen), len(body), "actual bytes read mismatch")
+ assert.Equal(t, testData[rangeStart:rangeEnd+1], body, "range payload mismatch")
+ })
+
+ t.Run("Suffix range request", func(t *testing.T) {
+ const suffixSize = 2048
+ resp, err := client.GetObject(ctx, &s3.GetObjectInput{
+ Bucket: aws.String(bucketName),
+ Key: aws.String(objectKey),
+ Range: aws.String(fmt.Sprintf("bytes=-%d", suffixSize)),
+ })
+ require.NoError(t, err, "GetObject suffix range request failed")
+ defer resp.Body.Close()
+
+ expectedStart := int64(objectSize - suffixSize)
+ expectedEnd := int64(objectSize - 1)
+ expectedLen := expectedEnd - expectedStart + 1
+
+ assert.Equal(t, expectedLen, resp.ContentLength, "suffix Content-Length mismatch")
+ assert.Equal(t,
+ fmt.Sprintf("bytes %d-%d/%d", expectedStart, expectedEnd, objectSize),
+ aws.ToString(resp.ContentRange),
+ "suffix Content-Range mismatch")
+
+ body, err := io.ReadAll(resp.Body)
+ require.NoError(t, err, "failed to read suffix range response body")
+ assert.Equal(t, int(expectedLen), len(body), "suffix range byte count mismatch")
+ assert.Equal(t, testData[expectedStart:expectedEnd+1], body, "suffix range payload mismatch")
+ })
+}
diff --git a/test/s3/sse/s3_sse_range_server_test.go b/test/s3/sse/s3_sse_range_server_test.go
new file mode 100644
index 000000000..0b02ec62b
--- /dev/null
+++ b/test/s3/sse/s3_sse_range_server_test.go
@@ -0,0 +1,445 @@
+package sse_test
+
+import (
+ "bytes"
+ "context"
+ "crypto/sha256"
+ "fmt"
+ "io"
+ "net/http"
+ "testing"
+ "time"
+
+ "github.com/aws/aws-sdk-go-v2/aws"
+ v4 "github.com/aws/aws-sdk-go-v2/aws/signer/v4"
+ "github.com/aws/aws-sdk-go-v2/service/s3"
+ s3types "github.com/aws/aws-sdk-go-v2/service/s3/types"
+ "github.com/stretchr/testify/assert"
+ "github.com/stretchr/testify/require"
+)
+
+// signRawHTTPRequest signs a raw HTTP request with AWS Signature V4
+func signRawHTTPRequest(ctx context.Context, req *http.Request, cfg *S3SSETestConfig) error {
+ // Create credentials
+ creds := aws.Credentials{
+ AccessKeyID: cfg.AccessKey,
+ SecretAccessKey: cfg.SecretKey,
+ }
+
+ // Create signer
+ signer := v4.NewSigner()
+
+ // Calculate payload hash (empty for GET requests)
+ payloadHash := fmt.Sprintf("%x", sha256.Sum256([]byte{}))
+
+ // Sign the request
+ err := signer.SignHTTP(ctx, creds, req, payloadHash, "s3", cfg.Region, time.Now())
+ if err != nil {
+ return fmt.Errorf("failed to sign request: %w", err)
+ }
+
+ return nil
+}
+
+// TestSSECRangeRequestsServerBehavior tests that the server correctly handles Range requests
+// for SSE-C encrypted objects by checking actual HTTP response (not SDK-processed response)
+func TestSSECRangeRequestsServerBehavior(t *testing.T) {
+ ctx := context.Background()
+ client, err := createS3Client(ctx, defaultConfig)
+ require.NoError(t, err, "Failed to create S3 client")
+
+ bucketName, err := createTestBucket(ctx, client, defaultConfig.BucketPrefix+"ssec-range-server-")
+ require.NoError(t, err, "Failed to create test bucket")
+ defer cleanupTestBucket(ctx, client, bucketName)
+
+ sseKey := generateSSECKey()
+ testData := generateTestData(2048) // 2KB test file
+ objectKey := "test-range-server-validation"
+
+ // Upload with SSE-C
+ _, err = client.PutObject(ctx, &s3.PutObjectInput{
+ Bucket: aws.String(bucketName),
+ Key: aws.String(objectKey),
+ Body: bytes.NewReader(testData),
+ SSECustomerAlgorithm: aws.String("AES256"),
+ SSECustomerKey: aws.String(sseKey.KeyB64),
+ SSECustomerKeyMD5: aws.String(sseKey.KeyMD5),
+ })
+ require.NoError(t, err, "Failed to upload SSE-C object")
+
+ // Test cases for range requests
+ testCases := []struct {
+ name string
+ rangeHeader string
+ expectedStart int64
+ expectedEnd int64
+ expectedTotal int64
+ }{
+ {
+ name: "First 100 bytes",
+ rangeHeader: "bytes=0-99",
+ expectedStart: 0,
+ expectedEnd: 99,
+ expectedTotal: 2048,
+ },
+ {
+ name: "Middle range",
+ rangeHeader: "bytes=500-699",
+ expectedStart: 500,
+ expectedEnd: 699,
+ expectedTotal: 2048,
+ },
+ {
+ name: "Last 100 bytes",
+ rangeHeader: "bytes=1948-2047",
+ expectedStart: 1948,
+ expectedEnd: 2047,
+ expectedTotal: 2048,
+ },
+ {
+ name: "Single byte",
+ rangeHeader: "bytes=1000-1000",
+ expectedStart: 1000,
+ expectedEnd: 1000,
+ expectedTotal: 2048,
+ },
+ {
+ name: "AES block boundary crossing",
+ rangeHeader: "bytes=15-17",
+ expectedStart: 15,
+ expectedEnd: 17,
+ expectedTotal: 2048,
+ },
+ {
+ name: "Open-ended range",
+ rangeHeader: "bytes=2000-",
+ expectedStart: 2000,
+ expectedEnd: 2047,
+ expectedTotal: 2048,
+ },
+ {
+ name: "Suffix range (last 100 bytes)",
+ rangeHeader: "bytes=-100",
+ expectedStart: 1948,
+ expectedEnd: 2047,
+ expectedTotal: 2048,
+ },
+ }
+
+ for _, tc := range testCases {
+ t.Run(tc.name, func(t *testing.T) {
+ // Build object URL (Endpoint already includes http://)
+ objectURL := fmt.Sprintf("%s/%s/%s",
+ defaultConfig.Endpoint,
+ bucketName,
+ objectKey,
+ )
+
+ // Create raw HTTP request
+ req, err := http.NewRequest("GET", objectURL, nil)
+ require.NoError(t, err, "Failed to create HTTP request")
+
+ // Add Range header
+ req.Header.Set("Range", tc.rangeHeader)
+
+ // Add SSE-C headers
+ req.Header.Set("x-amz-server-side-encryption-customer-algorithm", "AES256")
+ req.Header.Set("x-amz-server-side-encryption-customer-key", sseKey.KeyB64)
+ req.Header.Set("x-amz-server-side-encryption-customer-key-MD5", sseKey.KeyMD5)
+
+ // Sign the request with AWS Signature V4
+ err = signRawHTTPRequest(ctx, req, defaultConfig)
+ require.NoError(t, err, "Failed to sign HTTP request")
+
+ // Make request with raw HTTP client
+ httpClient := &http.Client{}
+ resp, err := httpClient.Do(req)
+ require.NoError(t, err, "Failed to execute range request")
+ defer resp.Body.Close()
+
+ // CRITICAL CHECK 1: Status code must be 206 Partial Content
+ assert.Equal(t, http.StatusPartialContent, resp.StatusCode,
+ "Server must return 206 Partial Content for range request, got %d", resp.StatusCode)
+
+ // CRITICAL CHECK 2: Content-Range header must be present and correct
+ expectedContentRange := fmt.Sprintf("bytes %d-%d/%d",
+ tc.expectedStart, tc.expectedEnd, tc.expectedTotal)
+ actualContentRange := resp.Header.Get("Content-Range")
+ assert.Equal(t, expectedContentRange, actualContentRange,
+ "Content-Range header mismatch")
+
+ // CRITICAL CHECK 3: Content-Length must match requested range size
+ expectedLength := tc.expectedEnd - tc.expectedStart + 1
+ actualLength := resp.ContentLength
+ assert.Equal(t, expectedLength, actualLength,
+ "Content-Length mismatch: expected %d, got %d", expectedLength, actualLength)
+
+ // CRITICAL CHECK 4: Actual bytes received from network
+ bodyBytes, err := io.ReadAll(resp.Body)
+ require.NoError(t, err, "Failed to read response body")
+ assert.Equal(t, int(expectedLength), len(bodyBytes),
+ "Actual bytes received from server mismatch: expected %d, got %d",
+ expectedLength, len(bodyBytes))
+
+ // CRITICAL CHECK 5: Verify decrypted content matches expected range
+ expectedData := testData[tc.expectedStart : tc.expectedEnd+1]
+ assert.Equal(t, expectedData, bodyBytes,
+ "Decrypted range content doesn't match expected data")
+
+ // Verify SSE-C headers are present in response
+ assert.Equal(t, "AES256", resp.Header.Get("x-amz-server-side-encryption-customer-algorithm"),
+ "SSE-C algorithm header missing in range response")
+ assert.Equal(t, sseKey.KeyMD5, resp.Header.Get("x-amz-server-side-encryption-customer-key-MD5"),
+ "SSE-C key MD5 header missing in range response")
+ })
+ }
+}
+
+// TestSSEKMSRangeRequestsServerBehavior tests server-side Range handling for SSE-KMS
+func TestSSEKMSRangeRequestsServerBehavior(t *testing.T) {
+ ctx := context.Background()
+ client, err := createS3Client(ctx, defaultConfig)
+ require.NoError(t, err, "Failed to create S3 client")
+
+ bucketName, err := createTestBucket(ctx, client, defaultConfig.BucketPrefix+"ssekms-range-server-")
+ require.NoError(t, err, "Failed to create test bucket")
+ defer cleanupTestBucket(ctx, client, bucketName)
+
+ kmsKeyID := "test-range-key"
+ testData := generateTestData(4096) // 4KB test file
+ objectKey := "test-kms-range-server-validation"
+
+ // Upload with SSE-KMS
+ _, err = client.PutObject(ctx, &s3.PutObjectInput{
+ Bucket: aws.String(bucketName),
+ Key: aws.String(objectKey),
+ Body: bytes.NewReader(testData),
+ ServerSideEncryption: "aws:kms",
+ SSEKMSKeyId: aws.String(kmsKeyID),
+ })
+ require.NoError(t, err, "Failed to upload SSE-KMS object")
+
+ // Test various ranges
+ testCases := []struct {
+ name string
+ rangeHeader string
+ start int64
+ end int64
+ }{
+ {"First KB", "bytes=0-1023", 0, 1023},
+ {"Second KB", "bytes=1024-2047", 1024, 2047},
+ {"Last KB", "bytes=3072-4095", 3072, 4095},
+ {"Unaligned range", "bytes=100-299", 100, 299},
+ }
+
+ for _, tc := range testCases {
+ t.Run(tc.name, func(t *testing.T) {
+ objectURL := fmt.Sprintf("%s/%s/%s",
+ defaultConfig.Endpoint,
+ bucketName,
+ objectKey,
+ )
+
+ req, err := http.NewRequest("GET", objectURL, nil)
+ require.NoError(t, err)
+ req.Header.Set("Range", tc.rangeHeader)
+
+ // Sign the request with AWS Signature V4
+ err = signRawHTTPRequest(ctx, req, defaultConfig)
+ require.NoError(t, err, "Failed to sign HTTP request")
+
+ httpClient := &http.Client{}
+ resp, err := httpClient.Do(req)
+ require.NoError(t, err)
+ defer resp.Body.Close()
+
+ // Verify 206 status
+ assert.Equal(t, http.StatusPartialContent, resp.StatusCode,
+ "SSE-KMS range request must return 206, got %d", resp.StatusCode)
+
+ // Verify Content-Range
+ expectedContentRange := fmt.Sprintf("bytes %d-%d/%d", tc.start, tc.end, int64(len(testData)))
+ assert.Equal(t, expectedContentRange, resp.Header.Get("Content-Range"))
+
+ // Verify actual bytes received
+ bodyBytes, err := io.ReadAll(resp.Body)
+ require.NoError(t, err)
+ expectedLength := tc.end - tc.start + 1
+ assert.Equal(t, int(expectedLength), len(bodyBytes),
+ "Actual network bytes mismatch")
+
+ // Verify content
+ expectedData := testData[tc.start : tc.end+1]
+ assert.Equal(t, expectedData, bodyBytes)
+ })
+ }
+}
+
+// TestSSES3RangeRequestsServerBehavior tests server-side Range handling for SSE-S3
+func TestSSES3RangeRequestsServerBehavior(t *testing.T) {
+ ctx := context.Background()
+ client, err := createS3Client(ctx, defaultConfig)
+ require.NoError(t, err, "Failed to create S3 client")
+
+ bucketName, err := createTestBucket(ctx, client, "sses3-range-server")
+ require.NoError(t, err, "Failed to create test bucket")
+ defer cleanupTestBucket(ctx, client, bucketName)
+
+ testData := generateTestData(8192) // 8KB test file
+ objectKey := "test-s3-range-server-validation"
+
+ // Upload with SSE-S3
+ _, err = client.PutObject(ctx, &s3.PutObjectInput{
+ Bucket: aws.String(bucketName),
+ Key: aws.String(objectKey),
+ Body: bytes.NewReader(testData),
+ ServerSideEncryption: "AES256",
+ })
+ require.NoError(t, err, "Failed to upload SSE-S3 object")
+
+ // Test range request
+ objectURL := fmt.Sprintf("%s/%s/%s",
+ defaultConfig.Endpoint,
+ bucketName,
+ objectKey,
+ )
+
+ req, err := http.NewRequest("GET", objectURL, nil)
+ require.NoError(t, err)
+ req.Header.Set("Range", "bytes=1000-1999")
+
+ // Sign the request with AWS Signature V4
+ err = signRawHTTPRequest(ctx, req, defaultConfig)
+ require.NoError(t, err, "Failed to sign HTTP request")
+
+ httpClient := &http.Client{}
+ resp, err := httpClient.Do(req)
+ require.NoError(t, err)
+ defer resp.Body.Close()
+
+ // Verify server response
+ assert.Equal(t, http.StatusPartialContent, resp.StatusCode)
+ assert.Equal(t, "bytes 1000-1999/8192", resp.Header.Get("Content-Range"))
+ assert.Equal(t, int64(1000), resp.ContentLength)
+
+ bodyBytes, err := io.ReadAll(resp.Body)
+ require.NoError(t, err)
+ assert.Equal(t, 1000, len(bodyBytes))
+ assert.Equal(t, testData[1000:2000], bodyBytes)
+}
+
+// TestSSEMultipartRangeRequestsServerBehavior tests Range requests on multipart encrypted objects
+func TestSSEMultipartRangeRequestsServerBehavior(t *testing.T) {
+ ctx := context.Background()
+ client, err := createS3Client(ctx, defaultConfig)
+ require.NoError(t, err)
+
+ bucketName, err := createTestBucket(ctx, client, defaultConfig.BucketPrefix+"ssec-mp-range-")
+ require.NoError(t, err)
+ defer cleanupTestBucket(ctx, client, bucketName)
+
+ sseKey := generateSSECKey()
+ objectKey := "test-multipart-range-server"
+
+ // Create 10MB test data (2 parts of 5MB each)
+ partSize := 5 * 1024 * 1024
+ part1Data := generateTestData(partSize)
+ part2Data := generateTestData(partSize)
+ fullData := append(part1Data, part2Data...)
+
+ // Initiate multipart upload
+ createResp, err := client.CreateMultipartUpload(ctx, &s3.CreateMultipartUploadInput{
+ Bucket: aws.String(bucketName),
+ Key: aws.String(objectKey),
+ SSECustomerAlgorithm: aws.String("AES256"),
+ SSECustomerKey: aws.String(sseKey.KeyB64),
+ SSECustomerKeyMD5: aws.String(sseKey.KeyMD5),
+ })
+ require.NoError(t, err)
+ uploadID := aws.ToString(createResp.UploadId)
+
+ // Upload part 1
+ part1Resp, err := client.UploadPart(ctx, &s3.UploadPartInput{
+ Bucket: aws.String(bucketName),
+ Key: aws.String(objectKey),
+ UploadId: aws.String(uploadID),
+ PartNumber: aws.Int32(1),
+ Body: bytes.NewReader(part1Data),
+ SSECustomerAlgorithm: aws.String("AES256"),
+ SSECustomerKey: aws.String(sseKey.KeyB64),
+ SSECustomerKeyMD5: aws.String(sseKey.KeyMD5),
+ })
+ require.NoError(t, err)
+
+ // Upload part 2
+ part2Resp, err := client.UploadPart(ctx, &s3.UploadPartInput{
+ Bucket: aws.String(bucketName),
+ Key: aws.String(objectKey),
+ UploadId: aws.String(uploadID),
+ PartNumber: aws.Int32(2),
+ Body: bytes.NewReader(part2Data),
+ SSECustomerAlgorithm: aws.String("AES256"),
+ SSECustomerKey: aws.String(sseKey.KeyB64),
+ SSECustomerKeyMD5: aws.String(sseKey.KeyMD5),
+ })
+ require.NoError(t, err)
+
+ // Complete multipart upload
+ _, err = client.CompleteMultipartUpload(ctx, &s3.CompleteMultipartUploadInput{
+ Bucket: aws.String(bucketName),
+ Key: aws.String(objectKey),
+ UploadId: aws.String(uploadID),
+ MultipartUpload: &s3types.CompletedMultipartUpload{
+ Parts: []s3types.CompletedPart{
+ {PartNumber: aws.Int32(1), ETag: part1Resp.ETag},
+ {PartNumber: aws.Int32(2), ETag: part2Resp.ETag},
+ },
+ },
+ })
+ require.NoError(t, err)
+
+ // Test range that crosses part boundary
+ objectURL := fmt.Sprintf("%s/%s/%s",
+ defaultConfig.Endpoint,
+ bucketName,
+ objectKey,
+ )
+
+ // Range spanning across the part boundary
+ start := int64(partSize - 1000)
+ end := int64(partSize + 1000)
+
+ req, err := http.NewRequest("GET", objectURL, nil)
+ require.NoError(t, err)
+ req.Header.Set("Range", fmt.Sprintf("bytes=%d-%d", start, end))
+ req.Header.Set("x-amz-server-side-encryption-customer-algorithm", "AES256")
+ req.Header.Set("x-amz-server-side-encryption-customer-key", sseKey.KeyB64)
+ req.Header.Set("x-amz-server-side-encryption-customer-key-MD5", sseKey.KeyMD5)
+
+ // Sign the request with AWS Signature V4
+ err = signRawHTTPRequest(ctx, req, defaultConfig)
+ require.NoError(t, err, "Failed to sign HTTP request")
+
+ httpClient := &http.Client{}
+ resp, err := httpClient.Do(req)
+ require.NoError(t, err)
+ defer resp.Body.Close()
+
+ // Verify server behavior for cross-part range
+ assert.Equal(t, http.StatusPartialContent, resp.StatusCode,
+ "Multipart range request must return 206")
+
+ expectedLength := end - start + 1
+ assert.Equal(t, expectedLength, resp.ContentLength,
+ "Content-Length for cross-part range")
+
+ bodyBytes, err := io.ReadAll(resp.Body)
+ require.NoError(t, err)
+ assert.Equal(t, int(expectedLength), len(bodyBytes),
+ "Actual bytes for cross-part range")
+
+ // Verify content spans the part boundary correctly
+ expectedData := fullData[start : end+1]
+ assert.Equal(t, expectedData, bodyBytes,
+ "Cross-part range content must be correctly decrypted and assembled")
+}