aboutsummaryrefslogtreecommitdiff
path: root/test/s3/versioning/s3_directory_versioning_test.go
diff options
context:
space:
mode:
Diffstat (limited to 'test/s3/versioning/s3_directory_versioning_test.go')
-rw-r--r--test/s3/versioning/s3_directory_versioning_test.go776
1 files changed, 776 insertions, 0 deletions
diff --git a/test/s3/versioning/s3_directory_versioning_test.go b/test/s3/versioning/s3_directory_versioning_test.go
new file mode 100644
index 000000000..7874bc055
--- /dev/null
+++ b/test/s3/versioning/s3_directory_versioning_test.go
@@ -0,0 +1,776 @@
+package s3api
+
+import (
+ "context"
+ "fmt"
+ "strings"
+ "sync"
+ "testing"
+
+ "github.com/aws/aws-sdk-go-v2/aws"
+ "github.com/aws/aws-sdk-go-v2/config"
+ "github.com/aws/aws-sdk-go-v2/credentials"
+ "github.com/aws/aws-sdk-go-v2/service/s3"
+ "github.com/aws/aws-sdk-go-v2/service/s3/types"
+ "github.com/stretchr/testify/assert"
+ "github.com/stretchr/testify/require"
+)
+
+// TestListObjectVersionsIncludesDirectories tests that directories are included in list-object-versions response
+// This ensures compatibility with Minio and AWS S3 behavior
+func TestListObjectVersionsIncludesDirectories(t *testing.T) {
+ bucketName := "test-versioning-directories"
+
+ client := setupS3Client(t)
+
+ // Create bucket
+ _, err := client.CreateBucket(context.TODO(), &s3.CreateBucketInput{
+ Bucket: aws.String(bucketName),
+ })
+ require.NoError(t, err)
+
+ // Clean up
+ defer func() {
+ cleanupBucket(t, client, bucketName)
+ }()
+
+ // Enable versioning
+ _, err = client.PutBucketVersioning(context.TODO(), &s3.PutBucketVersioningInput{
+ Bucket: aws.String(bucketName),
+ VersioningConfiguration: &types.VersioningConfiguration{
+ Status: types.BucketVersioningStatusEnabled,
+ },
+ })
+ require.NoError(t, err)
+
+ // First create explicit directory objects (keys ending with "/")
+ // These are the directories that should appear in list-object-versions
+ explicitDirectories := []string{
+ "Veeam/",
+ "Veeam/Archive/",
+ "Veeam/Archive/vbr/",
+ "Veeam/Backup/",
+ "Veeam/Backup/vbr/",
+ "Veeam/Backup/vbr/Clients/",
+ }
+
+ // Create explicit directory objects
+ for _, dirKey := range explicitDirectories {
+ _, err := client.PutObject(context.TODO(), &s3.PutObjectInput{
+ Bucket: aws.String(bucketName),
+ Key: aws.String(dirKey),
+ Body: strings.NewReader(""), // Empty content for directories
+ })
+ require.NoError(t, err, "Failed to create directory object %s", dirKey)
+ }
+
+ // Now create some test files
+ testFiles := []string{
+ "Veeam/test-file.txt",
+ "Veeam/Archive/test-file2.txt",
+ "Veeam/Archive/vbr/test-file3.txt",
+ "Veeam/Backup/test-file4.txt",
+ "Veeam/Backup/vbr/test-file5.txt",
+ "Veeam/Backup/vbr/Clients/test-file6.txt",
+ }
+
+ // Upload test files
+ for _, objectKey := range testFiles {
+ _, err := client.PutObject(context.TODO(), &s3.PutObjectInput{
+ Bucket: aws.String(bucketName),
+ Key: aws.String(objectKey),
+ Body: strings.NewReader("test content"),
+ })
+ require.NoError(t, err, "Failed to create file %s", objectKey)
+ }
+
+ // List object versions
+ listResp, err := client.ListObjectVersions(context.TODO(), &s3.ListObjectVersionsInput{
+ Bucket: aws.String(bucketName),
+ })
+ require.NoError(t, err)
+
+ // Extract all keys from versions
+ var allKeys []string
+ for _, version := range listResp.Versions {
+ allKeys = append(allKeys, *version.Key)
+ }
+
+ // Expected directories that should be included (with trailing slash)
+ expectedDirectories := []string{
+ "Veeam/",
+ "Veeam/Archive/",
+ "Veeam/Archive/vbr/",
+ "Veeam/Backup/",
+ "Veeam/Backup/vbr/",
+ "Veeam/Backup/vbr/Clients/",
+ }
+
+ // Verify that directories are included in the response
+ t.Logf("Found %d total versions", len(listResp.Versions))
+ t.Logf("All keys: %v", allKeys)
+
+ for _, expectedDir := range expectedDirectories {
+ found := false
+ for _, version := range listResp.Versions {
+ if *version.Key == expectedDir {
+ found = true
+ // Verify directory properties
+ assert.Equal(t, "null", *version.VersionId, "Directory %s should have VersionId 'null'", expectedDir)
+ assert.Equal(t, int64(0), *version.Size, "Directory %s should have size 0", expectedDir)
+ assert.True(t, *version.IsLatest, "Directory %s should be marked as latest", expectedDir)
+ assert.Equal(t, "\"d41d8cd98f00b204e9800998ecf8427e\"", *version.ETag, "Directory %s should have MD5 of empty string as ETag", expectedDir)
+ assert.Equal(t, types.ObjectStorageClassStandard, version.StorageClass, "Directory %s should have STANDARD storage class", expectedDir)
+ break
+ }
+ }
+ assert.True(t, found, "Directory %s should be included in list-object-versions response", expectedDir)
+ }
+
+ // Also verify that actual files are included
+ for _, objectKey := range testFiles {
+ found := false
+ for _, version := range listResp.Versions {
+ if *version.Key == objectKey {
+ found = true
+ assert.NotEqual(t, "null", *version.VersionId, "File %s should have a real version ID", objectKey)
+ assert.Greater(t, *version.Size, int64(0), "File %s should have size > 0", objectKey)
+ break
+ }
+ }
+ assert.True(t, found, "File %s should be included in list-object-versions response", objectKey)
+ }
+
+ // Count directories vs files
+ directoryCount := 0
+ fileCount := 0
+ for _, version := range listResp.Versions {
+ if strings.HasSuffix(*version.Key, "/") && *version.Size == 0 && *version.VersionId == "null" {
+ directoryCount++
+ } else {
+ fileCount++
+ }
+ }
+
+ t.Logf("Found %d directories and %d files", directoryCount, fileCount)
+ assert.Equal(t, len(expectedDirectories), directoryCount, "Should find exactly %d directories", len(expectedDirectories))
+ assert.Equal(t, len(testFiles), fileCount, "Should find exactly %d files", len(testFiles))
+}
+
+// TestListObjectVersionsDeleteMarkers tests that delete markers are properly separated from versions
+// This test verifies the fix for the issue where delete markers were incorrectly categorized as versions
+func TestListObjectVersionsDeleteMarkers(t *testing.T) {
+ bucketName := "test-delete-markers"
+
+ client := setupS3Client(t)
+
+ // Create bucket
+ _, err := client.CreateBucket(context.TODO(), &s3.CreateBucketInput{
+ Bucket: aws.String(bucketName),
+ })
+ require.NoError(t, err)
+
+ // Clean up
+ defer func() {
+ cleanupBucket(t, client, bucketName)
+ }()
+
+ // Enable versioning
+ _, err = client.PutBucketVersioning(context.TODO(), &s3.PutBucketVersioningInput{
+ Bucket: aws.String(bucketName),
+ VersioningConfiguration: &types.VersioningConfiguration{
+ Status: types.BucketVersioningStatusEnabled,
+ },
+ })
+ require.NoError(t, err)
+
+ objectKey := "test1/a"
+
+ // 1. Create one version of the file
+ _, err = client.PutObject(context.TODO(), &s3.PutObjectInput{
+ Bucket: aws.String(bucketName),
+ Key: aws.String(objectKey),
+ Body: strings.NewReader("test content"),
+ })
+ require.NoError(t, err)
+
+ // 2. Delete the object 3 times to create 3 delete markers
+ for i := 0; i < 3; i++ {
+ _, err = client.DeleteObject(context.TODO(), &s3.DeleteObjectInput{
+ Bucket: aws.String(bucketName),
+ Key: aws.String(objectKey),
+ })
+ require.NoError(t, err)
+ }
+
+ // 3. List object versions and verify the response structure
+ listResp, err := client.ListObjectVersions(context.TODO(), &s3.ListObjectVersionsInput{
+ Bucket: aws.String(bucketName),
+ })
+ require.NoError(t, err)
+
+ // 4. Verify that we have exactly 1 version and 3 delete markers
+ assert.Len(t, listResp.Versions, 1, "Should have exactly 1 file version")
+ assert.Len(t, listResp.DeleteMarkers, 3, "Should have exactly 3 delete markers")
+
+ // 5. Verify the version is for our test file
+ version := listResp.Versions[0]
+ assert.Equal(t, objectKey, *version.Key, "Version should be for our test file")
+ assert.NotEqual(t, "null", *version.VersionId, "File version should have a real version ID")
+ assert.Greater(t, *version.Size, int64(0), "File version should have size > 0")
+
+ // 6. Verify all delete markers are for our test file
+ for i, deleteMarker := range listResp.DeleteMarkers {
+ assert.Equal(t, objectKey, *deleteMarker.Key, "Delete marker %d should be for our test file", i)
+ assert.NotEqual(t, "null", *deleteMarker.VersionId, "Delete marker %d should have a real version ID", i)
+ }
+
+ t.Logf("Successfully verified: 1 version + 3 delete markers for object %s", objectKey)
+}
+
+// TestVersionedObjectAcl tests that ACL operations work correctly on objects in versioned buckets
+// This test verifies the fix for the NoSuchKey error when getting ACLs for objects in versioned buckets
+func TestVersionedObjectAcl(t *testing.T) {
+ bucketName := "test-versioned-acl"
+
+ client := setupS3Client(t)
+
+ // Create bucket
+ _, err := client.CreateBucket(context.TODO(), &s3.CreateBucketInput{
+ Bucket: aws.String(bucketName),
+ })
+ require.NoError(t, err)
+
+ // Clean up
+ defer func() {
+ cleanupBucket(t, client, bucketName)
+ }()
+
+ // Enable versioning
+ _, err = client.PutBucketVersioning(context.TODO(), &s3.PutBucketVersioningInput{
+ Bucket: aws.String(bucketName),
+ VersioningConfiguration: &types.VersioningConfiguration{
+ Status: types.BucketVersioningStatusEnabled,
+ },
+ })
+ require.NoError(t, err)
+
+ objectKey := "test-acl-object"
+
+ // Create an object in the versioned bucket
+ putResp, err := client.PutObject(context.TODO(), &s3.PutObjectInput{
+ Bucket: aws.String(bucketName),
+ Key: aws.String(objectKey),
+ Body: strings.NewReader("test content for ACL"),
+ })
+ require.NoError(t, err)
+ require.NotNil(t, putResp.VersionId, "Object should have a version ID")
+
+ // Test 1: Get ACL for the object (without specifying version ID - should get latest version)
+ getAclResp, err := client.GetObjectAcl(context.TODO(), &s3.GetObjectAclInput{
+ Bucket: aws.String(bucketName),
+ Key: aws.String(objectKey),
+ })
+ require.NoError(t, err, "Should be able to get ACL for object in versioned bucket")
+ require.NotNil(t, getAclResp.Owner, "ACL response should have owner information")
+
+ // Test 2: Get ACL for specific version ID
+ getAclVersionResp, err := client.GetObjectAcl(context.TODO(), &s3.GetObjectAclInput{
+ Bucket: aws.String(bucketName),
+ Key: aws.String(objectKey),
+ VersionId: putResp.VersionId,
+ })
+ require.NoError(t, err, "Should be able to get ACL for specific version")
+ require.NotNil(t, getAclVersionResp.Owner, "Versioned ACL response should have owner information")
+
+ // Test 3: Verify both ACL responses are the same (same object, same version)
+ assert.Equal(t, getAclResp.Owner.ID, getAclVersionResp.Owner.ID, "Owner ID should match for latest and specific version")
+
+ // Test 4: Create another version of the same object
+ putResp2, err := client.PutObject(context.TODO(), &s3.PutObjectInput{
+ Bucket: aws.String(bucketName),
+ Key: aws.String(objectKey),
+ Body: strings.NewReader("updated content for ACL"),
+ })
+ require.NoError(t, err)
+ require.NotNil(t, putResp2.VersionId, "Second object version should have a version ID")
+ require.NotEqual(t, putResp.VersionId, putResp2.VersionId, "Version IDs should be different")
+
+ // Test 5: Get ACL for latest version (should be the second version)
+ getAclLatestResp, err := client.GetObjectAcl(context.TODO(), &s3.GetObjectAclInput{
+ Bucket: aws.String(bucketName),
+ Key: aws.String(objectKey),
+ })
+ require.NoError(t, err, "Should be able to get ACL for latest version after update")
+ require.NotNil(t, getAclLatestResp.Owner, "Latest ACL response should have owner information")
+
+ // Test 6: Get ACL for the first version specifically
+ getAclFirstResp, err := client.GetObjectAcl(context.TODO(), &s3.GetObjectAclInput{
+ Bucket: aws.String(bucketName),
+ Key: aws.String(objectKey),
+ VersionId: putResp.VersionId,
+ })
+ require.NoError(t, err, "Should be able to get ACL for first version specifically")
+ require.NotNil(t, getAclFirstResp.Owner, "First version ACL response should have owner information")
+
+ // Test 7: Verify we can put ACL on versioned objects
+ _, err = client.PutObjectAcl(context.TODO(), &s3.PutObjectAclInput{
+ Bucket: aws.String(bucketName),
+ Key: aws.String(objectKey),
+ ACL: types.ObjectCannedACLPrivate,
+ })
+ require.NoError(t, err, "Should be able to put ACL on versioned object")
+
+ t.Logf("Successfully verified ACL operations on versioned object %s with versions %s and %s",
+ objectKey, *putResp.VersionId, *putResp2.VersionId)
+}
+
+// TestConcurrentMultiObjectDelete tests that concurrent delete operations work correctly without race conditions
+// This test verifies the fix for the race condition in deleteSpecificObjectVersion
+func TestConcurrentMultiObjectDelete(t *testing.T) {
+ bucketName := "test-concurrent-delete"
+ numObjects := 5
+ numThreads := 5
+
+ client := setupS3Client(t)
+
+ // Create bucket
+ _, err := client.CreateBucket(context.TODO(), &s3.CreateBucketInput{
+ Bucket: aws.String(bucketName),
+ })
+ require.NoError(t, err)
+
+ // Clean up
+ defer func() {
+ cleanupBucket(t, client, bucketName)
+ }()
+
+ // Enable versioning
+ _, err = client.PutBucketVersioning(context.TODO(), &s3.PutBucketVersioningInput{
+ Bucket: aws.String(bucketName),
+ VersioningConfiguration: &types.VersioningConfiguration{
+ Status: types.BucketVersioningStatusEnabled,
+ },
+ })
+ require.NoError(t, err)
+
+ // Create objects
+ var objectKeys []string
+ var versionIds []string
+
+ for i := 0; i < numObjects; i++ {
+ objectKey := fmt.Sprintf("key_%d", i)
+ objectKeys = append(objectKeys, objectKey)
+
+ putResp, err := client.PutObject(context.TODO(), &s3.PutObjectInput{
+ Bucket: aws.String(bucketName),
+ Key: aws.String(objectKey),
+ Body: strings.NewReader(fmt.Sprintf("content for key_%d", i)),
+ })
+ require.NoError(t, err)
+ require.NotNil(t, putResp.VersionId)
+ versionIds = append(versionIds, *putResp.VersionId)
+ }
+
+ // Verify objects were created
+ listResp, err := client.ListObjectVersions(context.TODO(), &s3.ListObjectVersionsInput{
+ Bucket: aws.String(bucketName),
+ })
+ require.NoError(t, err)
+ assert.Len(t, listResp.Versions, numObjects, "Should have created %d objects", numObjects)
+
+ // Create delete objects request
+ var objectsToDelete []types.ObjectIdentifier
+ for i, objectKey := range objectKeys {
+ objectsToDelete = append(objectsToDelete, types.ObjectIdentifier{
+ Key: aws.String(objectKey),
+ VersionId: aws.String(versionIds[i]),
+ })
+ }
+
+ // Run concurrent delete operations
+ results := make([]*s3.DeleteObjectsOutput, numThreads)
+ var wg sync.WaitGroup
+
+ for i := 0; i < numThreads; i++ {
+ wg.Add(1)
+ go func(threadIdx int) {
+ defer wg.Done()
+ deleteResp, err := client.DeleteObjects(context.TODO(), &s3.DeleteObjectsInput{
+ Bucket: aws.String(bucketName),
+ Delete: &types.Delete{
+ Objects: objectsToDelete,
+ Quiet: aws.Bool(false),
+ },
+ })
+ if err != nil {
+ t.Errorf("Thread %d: delete objects failed: %v", threadIdx, err)
+ return
+ }
+ results[threadIdx] = deleteResp
+ }(i)
+ }
+
+ wg.Wait()
+
+ // Verify results
+ for i, result := range results {
+ require.NotNil(t, result, "Thread %d should have a result", i)
+ assert.Len(t, result.Deleted, numObjects, "Thread %d should have deleted all %d objects", i, numObjects)
+
+ if len(result.Errors) > 0 {
+ for _, deleteError := range result.Errors {
+ t.Errorf("Thread %d delete error: %s - %s (Key: %s, VersionId: %s)",
+ i, *deleteError.Code, *deleteError.Message, *deleteError.Key,
+ func() string {
+ if deleteError.VersionId != nil {
+ return *deleteError.VersionId
+ } else {
+ return "nil"
+ }
+ }())
+ }
+ }
+ assert.Empty(t, result.Errors, "Thread %d should have no delete errors", i)
+ }
+
+ // Verify objects are deleted (bucket should be empty)
+ finalListResp, err := client.ListObjects(context.TODO(), &s3.ListObjectsInput{
+ Bucket: aws.String(bucketName),
+ })
+ require.NoError(t, err)
+ assert.Nil(t, finalListResp.Contents, "Bucket should be empty after all deletions")
+
+ t.Logf("Successfully verified concurrent deletion of %d objects from %d threads", numObjects, numThreads)
+}
+
+// TestSuspendedVersioningDeleteBehavior tests that delete operations during suspended versioning
+// actually delete the "null" version object rather than creating delete markers
+func TestSuspendedVersioningDeleteBehavior(t *testing.T) {
+ bucketName := "test-suspended-versioning-delete"
+ objectKey := "testobj"
+
+ client := setupS3Client(t)
+
+ // Create bucket
+ _, err := client.CreateBucket(context.TODO(), &s3.CreateBucketInput{
+ Bucket: aws.String(bucketName),
+ })
+ require.NoError(t, err)
+
+ // Clean up
+ defer func() {
+ cleanupBucket(t, client, bucketName)
+ }()
+
+ // Enable versioning and create some versions
+ _, err = client.PutBucketVersioning(context.TODO(), &s3.PutBucketVersioningInput{
+ Bucket: aws.String(bucketName),
+ VersioningConfiguration: &types.VersioningConfiguration{
+ Status: types.BucketVersioningStatusEnabled,
+ },
+ })
+ require.NoError(t, err)
+
+ // Create 3 versions
+ var versionIds []string
+ for i := 0; i < 3; i++ {
+ putResp, err := client.PutObject(context.TODO(), &s3.PutObjectInput{
+ Bucket: aws.String(bucketName),
+ Key: aws.String(objectKey),
+ Body: strings.NewReader(fmt.Sprintf("content version %d", i+1)),
+ })
+ require.NoError(t, err)
+ require.NotNil(t, putResp.VersionId)
+ versionIds = append(versionIds, *putResp.VersionId)
+ }
+
+ // Verify 3 versions exist
+ listResp, err := client.ListObjectVersions(context.TODO(), &s3.ListObjectVersionsInput{
+ Bucket: aws.String(bucketName),
+ })
+ require.NoError(t, err)
+ assert.Len(t, listResp.Versions, 3, "Should have 3 versions initially")
+
+ // Suspend versioning
+ _, err = client.PutBucketVersioning(context.TODO(), &s3.PutBucketVersioningInput{
+ Bucket: aws.String(bucketName),
+ VersioningConfiguration: &types.VersioningConfiguration{
+ Status: types.BucketVersioningStatusSuspended,
+ },
+ })
+ require.NoError(t, err)
+
+ // Create a new object during suspended versioning (this should be a "null" version)
+ _, err = client.PutObject(context.TODO(), &s3.PutObjectInput{
+ Bucket: aws.String(bucketName),
+ Key: aws.String(objectKey),
+ Body: strings.NewReader("null version content"),
+ })
+ require.NoError(t, err)
+
+ // Verify we still have 3 versions + 1 null version = 4 total
+ listResp, err = client.ListObjectVersions(context.TODO(), &s3.ListObjectVersionsInput{
+ Bucket: aws.String(bucketName),
+ })
+ require.NoError(t, err)
+ assert.Len(t, listResp.Versions, 4, "Should have 3 versions + 1 null version")
+
+ // Find the null version
+ var nullVersionFound bool
+ for _, version := range listResp.Versions {
+ if *version.VersionId == "null" {
+ nullVersionFound = true
+ assert.True(t, *version.IsLatest, "Null version should be marked as latest during suspended versioning")
+ break
+ }
+ }
+ assert.True(t, nullVersionFound, "Should have found a null version")
+
+ // Delete the object during suspended versioning (should actually delete the null version)
+ _, err = client.DeleteObject(context.TODO(), &s3.DeleteObjectInput{
+ Bucket: aws.String(bucketName),
+ Key: aws.String(objectKey),
+ // No VersionId specified - should delete the "null" version during suspended versioning
+ })
+ require.NoError(t, err)
+
+ // Verify the null version was actually deleted (not a delete marker created)
+ listResp, err = client.ListObjectVersions(context.TODO(), &s3.ListObjectVersionsInput{
+ Bucket: aws.String(bucketName),
+ })
+ require.NoError(t, err)
+ assert.Len(t, listResp.Versions, 3, "Should be back to 3 versions after deleting null version")
+ assert.Empty(t, listResp.DeleteMarkers, "Should have no delete markers during suspended versioning delete")
+
+ // Verify null version is gone
+ nullVersionFound = false
+ for _, version := range listResp.Versions {
+ if *version.VersionId == "null" {
+ nullVersionFound = true
+ break
+ }
+ }
+ assert.False(t, nullVersionFound, "Null version should be deleted, not present")
+
+ // Create another null version and delete it multiple times to test idempotency
+ _, err = client.PutObject(context.TODO(), &s3.PutObjectInput{
+ Bucket: aws.String(bucketName),
+ Key: aws.String(objectKey),
+ Body: strings.NewReader("another null version"),
+ })
+ require.NoError(t, err)
+
+ // Delete it twice to test idempotency
+ for i := 0; i < 2; i++ {
+ _, err = client.DeleteObject(context.TODO(), &s3.DeleteObjectInput{
+ Bucket: aws.String(bucketName),
+ Key: aws.String(objectKey),
+ })
+ require.NoError(t, err, "Delete should be idempotent - iteration %d", i+1)
+ }
+
+ // Re-enable versioning
+ _, err = client.PutBucketVersioning(context.TODO(), &s3.PutBucketVersioningInput{
+ Bucket: aws.String(bucketName),
+ VersioningConfiguration: &types.VersioningConfiguration{
+ Status: types.BucketVersioningStatusEnabled,
+ },
+ })
+ require.NoError(t, err)
+
+ // Create a new version with versioning enabled
+ putResp, err := client.PutObject(context.TODO(), &s3.PutObjectInput{
+ Bucket: aws.String(bucketName),
+ Key: aws.String(objectKey),
+ Body: strings.NewReader("new version after re-enabling"),
+ })
+ require.NoError(t, err)
+ require.NotNil(t, putResp.VersionId)
+
+ // Now delete without version ID (should create delete marker)
+ deleteResp, err := client.DeleteObject(context.TODO(), &s3.DeleteObjectInput{
+ Bucket: aws.String(bucketName),
+ Key: aws.String(objectKey),
+ })
+ require.NoError(t, err)
+ assert.Equal(t, "true", deleteResp.DeleteMarker, "Should create delete marker when versioning is enabled")
+
+ // Verify final state
+ listResp, err = client.ListObjectVersions(context.TODO(), &s3.ListObjectVersionsInput{
+ Bucket: aws.String(bucketName),
+ })
+ require.NoError(t, err)
+ assert.Len(t, listResp.Versions, 4, "Should have 3 original versions + 1 new version")
+ assert.Len(t, listResp.DeleteMarkers, 1, "Should have 1 delete marker")
+
+ t.Logf("Successfully verified suspended versioning delete behavior")
+}
+
+// TestVersionedObjectListBehavior tests that list operations show logical object names for versioned objects
+// and that owner information is properly extracted from S3 metadata
+func TestVersionedObjectListBehavior(t *testing.T) {
+ bucketName := "test-versioned-list"
+ objectKey := "testfile"
+
+ client := setupS3Client(t)
+
+ // Create bucket with object lock enabled (which enables versioning)
+ _, err := client.CreateBucket(context.TODO(), &s3.CreateBucketInput{
+ Bucket: aws.String(bucketName),
+ ObjectLockEnabledForBucket: aws.Bool(true),
+ })
+ require.NoError(t, err)
+
+ // Clean up
+ defer func() {
+ cleanupBucket(t, client, bucketName)
+ }()
+
+ // Verify versioning is enabled
+ versioningResp, err := client.GetBucketVersioning(context.TODO(), &s3.GetBucketVersioningInput{
+ Bucket: aws.String(bucketName),
+ })
+ require.NoError(t, err)
+ assert.Equal(t, types.BucketVersioningStatusEnabled, versioningResp.Status, "Bucket versioning should be enabled")
+
+ // Create a versioned object
+ content := "test content for versioned object"
+ putResp, err := client.PutObject(context.TODO(), &s3.PutObjectInput{
+ Bucket: aws.String(bucketName),
+ Key: aws.String(objectKey),
+ Body: strings.NewReader(content),
+ })
+ require.NoError(t, err)
+ require.NotNil(t, putResp.VersionId)
+
+ versionId := *putResp.VersionId
+ t.Logf("Created versioned object with version ID: %s", versionId)
+
+ // Test list-objects operation - should show logical object name, not internal versioned path
+ listResp, err := client.ListObjects(context.TODO(), &s3.ListObjectsInput{
+ Bucket: aws.String(bucketName),
+ })
+ require.NoError(t, err)
+ require.Len(t, listResp.Contents, 1, "Should list exactly one object")
+
+ listedObject := listResp.Contents[0]
+
+ // Verify the object key is the logical name, not the internal versioned path
+ assert.Equal(t, objectKey, *listedObject.Key, "Should show logical object name, not internal versioned path")
+ assert.NotContains(t, *listedObject.Key, ".versions", "Object key should not contain .versions")
+ assert.NotContains(t, *listedObject.Key, versionId, "Object key should not contain version ID")
+
+ // Verify object properties
+ assert.Equal(t, int64(len(content)), listedObject.Size, "Object size should match")
+ assert.NotNil(t, listedObject.ETag, "Object should have ETag")
+ assert.NotNil(t, listedObject.LastModified, "Object should have LastModified")
+
+ // Verify owner information is present (even if anonymous)
+ require.NotNil(t, listedObject.Owner, "Object should have Owner information")
+ assert.NotEmpty(t, listedObject.Owner.ID, "Owner ID should not be empty")
+ assert.NotEmpty(t, listedObject.Owner.DisplayName, "Owner DisplayName should not be empty")
+
+ t.Logf("Listed object: Key=%s, Size=%d, Owner.ID=%s, Owner.DisplayName=%s",
+ *listedObject.Key, listedObject.Size, *listedObject.Owner.ID, *listedObject.Owner.DisplayName)
+
+ // Test list-objects-v2 operation as well
+ listV2Resp, err := client.ListObjectsV2(context.TODO(), &s3.ListObjectsV2Input{
+ Bucket: aws.String(bucketName),
+ FetchOwner: aws.Bool(true), // Explicitly request owner information
+ })
+ require.NoError(t, err)
+ require.Len(t, listV2Resp.Contents, 1, "ListObjectsV2 should also list exactly one object")
+
+ listedObjectV2 := listV2Resp.Contents[0]
+ assert.Equal(t, objectKey, *listedObjectV2.Key, "ListObjectsV2 should also show logical object name")
+ assert.NotNil(t, listedObjectV2.Owner, "ListObjectsV2 should include owner when FetchOwner=true")
+
+ // Create another version to ensure multiple versions don't appear in regular list
+ _, err = client.PutObject(context.TODO(), &s3.PutObjectInput{
+ Bucket: aws.String(bucketName),
+ Key: aws.String(objectKey),
+ Body: strings.NewReader("updated content"),
+ })
+ require.NoError(t, err)
+
+ // List again - should still show only one logical object (the latest version)
+ listRespAfterUpdate, err := client.ListObjects(context.TODO(), &s3.ListObjectsInput{
+ Bucket: aws.String(bucketName),
+ })
+ require.NoError(t, err)
+ assert.Len(t, listRespAfterUpdate.Contents, 1, "Should still list exactly one object after creating second version")
+
+ // Compare with list-object-versions which should show both versions
+ versionsResp, err := client.ListObjectVersions(context.TODO(), &s3.ListObjectVersionsInput{
+ Bucket: aws.String(bucketName),
+ })
+ require.NoError(t, err)
+ assert.Len(t, versionsResp.Versions, 2, "list-object-versions should show both versions")
+
+ t.Logf("Successfully verified versioned object list behavior")
+}
+
+// Helper function to setup S3 client
+func setupS3Client(t *testing.T) *s3.Client {
+ // S3TestConfig holds configuration for S3 tests
+ type S3TestConfig struct {
+ Endpoint string
+ AccessKey string
+ SecretKey string
+ Region string
+ BucketPrefix string
+ UseSSL bool
+ SkipVerifySSL bool
+ }
+
+ // Default test configuration - should match s3tests.conf
+ defaultConfig := &S3TestConfig{
+ Endpoint: "http://localhost:8333", // Default SeaweedFS S3 port
+ AccessKey: "some_access_key1",
+ SecretKey: "some_secret_key1",
+ Region: "us-east-1",
+ BucketPrefix: "test-versioning-",
+ UseSSL: false,
+ SkipVerifySSL: true,
+ }
+
+ cfg, err := config.LoadDefaultConfig(context.TODO(),
+ config.WithRegion(defaultConfig.Region),
+ config.WithCredentialsProvider(credentials.NewStaticCredentialsProvider(
+ defaultConfig.AccessKey,
+ defaultConfig.SecretKey,
+ "",
+ )),
+ config.WithEndpointResolverWithOptions(aws.EndpointResolverWithOptionsFunc(
+ func(service, region string, options ...interface{}) (aws.Endpoint, error) {
+ return aws.Endpoint{
+ URL: defaultConfig.Endpoint,
+ SigningRegion: defaultConfig.Region,
+ HostnameImmutable: true,
+ }, nil
+ })),
+ )
+ require.NoError(t, err)
+
+ return s3.NewFromConfig(cfg, func(o *s3.Options) {
+ o.UsePathStyle = true // Important for SeaweedFS
+ })
+}
+
+// Helper function to clean up bucket
+func cleanupBucket(t *testing.T, client *s3.Client, bucketName string) {
+ // First, delete all objects and versions
+ err := deleteAllObjectVersions(t, client, bucketName)
+ if err != nil {
+ t.Logf("Warning: failed to delete all object versions: %v", err)
+ }
+
+ // Then delete the bucket
+ _, err = client.DeleteBucket(context.TODO(), &s3.DeleteBucketInput{
+ Bucket: aws.String(bucketName),
+ })
+ if err != nil {
+ t.Logf("Warning: failed to delete bucket %s: %v", bucketName, err)
+ }
+}