* S3 API: Fix SSE-S3 decryption on object download Fixes #7363 This commit adds missing SSE-S3 decryption support when downloading objects from SSE-S3 encrypted buckets. Previously, SSE-S3 encrypted objects were returned in their encrypted form, causing data corruption and hash mismatches. Changes: - Updated detectPrimarySSEType() to detect SSE-S3 encrypted objects by examining chunk metadata and distinguishing SSE-S3 from SSE-KMS - Added SSE-S3 handling in handleSSEResponse() to route to new handler - Implemented handleSSES3Response() for both single-part and multipart SSE-S3 encrypted objects with proper decryption - Implemented createMultipartSSES3DecryptedReader() for multipart objects with per-chunk decryption using stored IVs - Updated addSSEHeadersToResponse() to include SSE-S3 response headers The fix follows the existing SSE-C and SSE-KMS patterns, using the envelope encryption architecture where each object's DEK is encrypted with the KEK stored in the filer. * Add comprehensive tests for SSE-S3 decryption - TestSSES3EncryptionDecryption: basic encryption/decryption - TestSSES3IsRequestInternal: request detection - TestSSES3MetadataSerialization: metadata serialization/deserialization - TestDetectPrimarySSETypeS3: SSE type detection for various scenarios - TestAddSSES3HeadersToResponse: response header validation - TestSSES3EncryptionWithBaseIV: multipart encryption with base IV - TestSSES3WrongKeyDecryption: wrong key error handling - TestSSES3KeyGeneration: key generation and uniqueness - TestSSES3VariousSizes: encryption/decryption with various data sizes - TestSSES3ResponseHeaders: response header correctness - TestSSES3IsEncryptedInternal: metadata-based encryption detection - TestSSES3InvalidMetadataDeserialization: error handling for invalid metadata - TestGetSSES3Headers: header generation - TestProcessSSES3Request: request processing - TestGetSSES3KeyFromMetadata: key extraction from metadata - TestSSES3EnvelopeEncryption: envelope encryption correctness - TestValidateSSES3Key: key validation All tests pass successfully, providing comprehensive coverage for the SSE-S3 decryption fix. * Address PR review comments 1. Fix resource leak in createMultipartSSES3DecryptedReader: - Wrap decrypted reader with closer to properly release resources - Ensure underlying chunkReader is closed when done 2. Handle mixed-encryption objects correctly: - Check chunk encryption type before attempting decryption - Pass through non-SSE-S3 chunks unmodified - Log encryption type for debugging 3. Improve SSE type detection logic: - Add explicit case for aws:kms algorithm - Handle unknown algorithms gracefully - Better documentation for tie-breaking precedence 4. Document tie-breaking behavior: - Clarify that mixed encryption indicates potential corruption - Explicit precedence order: SSE-C > SSE-KMS > SSE-S3 These changes address high-severity resource management issues and improve robustness when handling edge cases and mixed-encryption scenarios. * Fix IV retrieval for small/inline SSE-S3 encrypted files Critical bug fix: The previous implementation only looked for the IV in chunk metadata, which would fail for small files stored inline (without chunks). Changes: - Check object-level metadata (sseS3Key.IV) first for inline files - Fallback to first chunk metadata only if object-level IV not found - Improved error message to indicate both locations were checked This ensures small SSE-S3 encrypted files (stored inline in entry.Content) can be properly decrypted, as their IV is stored in the object-level SeaweedFSSSES3Key metadata rather than in chunk metadata. Fixes the high-severity issue identified in PR review. * Clean up unused SSE metadata helper functions Remove legacy SSE metadata helper functions that were never fully implemented or used: Removed unused functions: - StoreSSECMetadata() / GetSSECMetadata() - StoreSSEKMSMetadata() / GetSSEKMSMetadata() - StoreSSES3Metadata() / GetSSES3Metadata() - IsSSEEncrypted() - GetSSEAlgorithm() Removed unused constants: - MetaSSEAlgorithm - MetaSSECKeyMD5 - MetaSSEKMSKeyID - MetaSSEKMSEncryptedKey - MetaSSEKMSContext - MetaSSES3KeyID These functions were from an earlier design where IV and other metadata would be stored in common entry.Extended keys. The actual implementations use type-specific serialization: - SSE-C: Uses StoreIVInMetadata()/GetIVFromMetadata() directly for IV - SSE-KMS: Serializes entire SSEKMSKey structure as JSON (includes IV) - SSE-S3: Serializes entire SSES3Key structure as JSON (includes IV) This follows Option A: SSE-S3 uses envelope encryption pattern like SSE-KMS, where IV is stored within the serialized key metadata rather than in a separate metadata field. Kept functions still in use: - StoreIVInMetadata() - Used by SSE-C - GetIVFromMetadata() - Used by SSE-C and streaming copy - MetaSSEIV constant - Used by SSE-C All tests pass after cleanup. * Rename SSE metadata functions to clarify SSE-C specific usage Renamed functions and constants to explicitly indicate they are SSE-C specific, improving code clarity: Renamed: - MetaSSEIV → MetaSSECIV - StoreIVInMetadata() → StoreSSECIVInMetadata() - GetIVFromMetadata() → GetSSECIVFromMetadata() Updated all usages across: - s3api_key_rotation.go - s3api_streaming_copy.go - s3api_object_handlers_copy.go - s3_sse_copy_test.go - s3_sse_test_utils_test.go Rationale: These functions are exclusively used by SSE-C for storing/retrieving the IV in entry.Extended metadata. SSE-KMS and SSE-S3 use different approaches (IV stored in serialized key structures), so the generic names were misleading. The new names make it clear these are part of the SSE-C implementation. All tests pass. * Add integration tests for SSE-S3 end-to-end encryption/decryption These integration tests cover the complete encrypt->store->decrypt cycle that was missing from the original test suite. They would have caught the IV retrieval bug for inline files. Tests added: - TestSSES3EndToEndSmallFile: Tests inline files (10, 50, 256 bytes) * Specifically tests the critical IV retrieval path for inline files * This test explicitly checks the bug we fixed where inline files couldn't retrieve their IV from object-level metadata - TestSSES3EndToEndChunkedFile: Tests multipart encrypted files * Verifies per-chunk metadata serialization/deserialization * Tests that each chunk can be independently decrypted with its own IV - TestSSES3EndToEndWithDetectPrimaryType: Tests type detection * Verifies inline vs chunked SSE-S3 detection * Ensures SSE-S3 is distinguished from SSE-KMS Note: Full HTTP handler tests (PUT -> GET through actual handlers) would require a complete mock server with filer connections, which is complex. These tests focus on the critical decrypt path and data flow. Why these tests are important: - Unit tests alone don't catch integration issues - The IV retrieval bug existed because there was no end-to-end test - These tests simulate the actual storage/retrieval flow - They verify the complete encryption architecture works correctly All tests pass. * Fix TestValidateSSES3Key expectations to match actual implementation The ValidateSSES3Key function only validates that the key struct is not nil, but doesn't validate the Key field contents or size. The test was expecting validation that doesn't exist. Updated test cases: - Nil key struct → should error (correct) - Valid key → should not error (correct) - Invalid key size → should not error (validation doesn't check this) - Nil key bytes → should not error (validation doesn't check this) Added comments to clarify what the current validation actually checks. This matches the behavior of ValidateSSEKMSKey and ValidateSSECKey which also only check for nil struct, not field contents. All SSE tests now pass. * Improve ValidateSSES3Key to properly validate key contents Enhanced the validation function from only checking nil struct to comprehensive validation of all key fields: Validations added: 1. Key bytes not nil 2. Key size exactly 32 bytes (SSES3KeySize) 3. Algorithm must be "AES256" (SSES3Algorithm) 4. Key ID must not be empty 5. IV length must be 16 bytes if set (optional - set during encryption) Test improvements (10 test cases): - Nil key struct - Valid key without IV - Valid key with IV - Invalid key size (too small) - Invalid key size (too large) - Nil key bytes - Empty key ID - Invalid algorithm - Invalid IV length - Empty IV (allowed - set during encryption) This matches the robustness of SSE-C and SSE-KMS validation and will catch configuration errors early rather than failing during encryption/decryption. All SSE tests pass. * Replace custom string helper functions with strings.Contains Address Gemini Code Assist review feedback: - Remove custom contains() and findSubstring() helper functions - Use standard library strings.Contains() instead - Add strings import This makes the code more idiomatic and easier to maintain by using the standard library instead of reimplementing functionality. Changes: - Added "strings" to imports - Replaced contains(err.Error(), tc.errorMsg) with strings.Contains(err.Error(), tc.errorMsg) - Removed 15 lines of custom helper code All tests pass. * filer fix reading and writing SSE-S3 headers * filter out seaweedfs internal headers * Update weed/s3api/s3api_object_handlers.go Co-authored-by: Copilot <175728472+Copilot@users.noreply.github.com> * Update weed/s3api/s3_validation_utils.go Co-authored-by: Copilot <175728472+Copilot@users.noreply.github.com> * Update s3api_streaming_copy.go * remove fallback * remove redundant check * refactor * remove extra object fetching * in case object is not found * Correct Version Entry for SSE Routing * Proper Error Handling for SSE Entry Fetching * Eliminated All Redundant Lookups * Removed brittle “exactly 5 successes/failures” assertions. Added invariant checks total recorded attempts equals request count, successes never exceed capacity, failures cover remaining attempts, final AvailableSpace matches capacity - successes. * refactor * fix test * Fixed Broken Fallback Logic * refactor * Better Error for Encryption Type Mismatch * refactor --------- Co-authored-by: Copilot <175728472+Copilot@users.noreply.github.com>
629 lines
18 KiB
Go
629 lines
18 KiB
Go
package s3api
|
|
|
|
import (
|
|
"bytes"
|
|
"io"
|
|
"net/http"
|
|
"strings"
|
|
"testing"
|
|
|
|
"github.com/seaweedfs/seaweedfs/weed/s3api/s3_constants"
|
|
)
|
|
|
|
// TestSSECObjectCopy tests copying SSE-C encrypted objects with different keys
|
|
func TestSSECObjectCopy(t *testing.T) {
|
|
// Original key for source object
|
|
sourceKey := GenerateTestSSECKey(1)
|
|
sourceCustomerKey := &SSECustomerKey{
|
|
Algorithm: "AES256",
|
|
Key: sourceKey.Key,
|
|
KeyMD5: sourceKey.KeyMD5,
|
|
}
|
|
|
|
// Destination key for target object
|
|
destKey := GenerateTestSSECKey(2)
|
|
destCustomerKey := &SSECustomerKey{
|
|
Algorithm: "AES256",
|
|
Key: destKey.Key,
|
|
KeyMD5: destKey.KeyMD5,
|
|
}
|
|
|
|
testData := "Hello, SSE-C copy world!"
|
|
|
|
// Encrypt with source key
|
|
encryptedReader, iv, err := CreateSSECEncryptedReader(strings.NewReader(testData), sourceCustomerKey)
|
|
if err != nil {
|
|
t.Fatalf("Failed to create encrypted reader: %v", err)
|
|
}
|
|
|
|
encryptedData, err := io.ReadAll(encryptedReader)
|
|
if err != nil {
|
|
t.Fatalf("Failed to read encrypted data: %v", err)
|
|
}
|
|
|
|
// Test copy strategy determination
|
|
sourceMetadata := make(map[string][]byte)
|
|
StoreSSECIVInMetadata(sourceMetadata, iv)
|
|
sourceMetadata[s3_constants.AmzServerSideEncryptionCustomerAlgorithm] = []byte("AES256")
|
|
sourceMetadata[s3_constants.AmzServerSideEncryptionCustomerKeyMD5] = []byte(sourceKey.KeyMD5)
|
|
|
|
t.Run("Same key copy (direct copy)", func(t *testing.T) {
|
|
strategy, err := DetermineSSECCopyStrategy(sourceMetadata, sourceCustomerKey, sourceCustomerKey)
|
|
if err != nil {
|
|
t.Fatalf("Failed to determine copy strategy: %v", err)
|
|
}
|
|
|
|
if strategy != SSECCopyStrategyDirect {
|
|
t.Errorf("Expected direct copy strategy for same key, got %v", strategy)
|
|
}
|
|
})
|
|
|
|
t.Run("Different key copy (decrypt-encrypt)", func(t *testing.T) {
|
|
strategy, err := DetermineSSECCopyStrategy(sourceMetadata, sourceCustomerKey, destCustomerKey)
|
|
if err != nil {
|
|
t.Fatalf("Failed to determine copy strategy: %v", err)
|
|
}
|
|
|
|
if strategy != SSECCopyStrategyDecryptEncrypt {
|
|
t.Errorf("Expected decrypt-encrypt copy strategy for different keys, got %v", strategy)
|
|
}
|
|
})
|
|
|
|
t.Run("Can direct copy check", func(t *testing.T) {
|
|
// Same key should allow direct copy
|
|
canDirect := CanDirectCopySSEC(sourceMetadata, sourceCustomerKey, sourceCustomerKey)
|
|
if !canDirect {
|
|
t.Error("Should allow direct copy with same key")
|
|
}
|
|
|
|
// Different key should not allow direct copy
|
|
canDirect = CanDirectCopySSEC(sourceMetadata, sourceCustomerKey, destCustomerKey)
|
|
if canDirect {
|
|
t.Error("Should not allow direct copy with different keys")
|
|
}
|
|
})
|
|
|
|
// Test actual copy operation (decrypt with source key, encrypt with dest key)
|
|
t.Run("Full copy operation", func(t *testing.T) {
|
|
// Decrypt with source key
|
|
decryptedReader, err := CreateSSECDecryptedReader(bytes.NewReader(encryptedData), sourceCustomerKey, iv)
|
|
if err != nil {
|
|
t.Fatalf("Failed to create decrypted reader: %v", err)
|
|
}
|
|
|
|
// Re-encrypt with destination key
|
|
reEncryptedReader, destIV, err := CreateSSECEncryptedReader(decryptedReader, destCustomerKey)
|
|
if err != nil {
|
|
t.Fatalf("Failed to create re-encrypted reader: %v", err)
|
|
}
|
|
|
|
reEncryptedData, err := io.ReadAll(reEncryptedReader)
|
|
if err != nil {
|
|
t.Fatalf("Failed to read re-encrypted data: %v", err)
|
|
}
|
|
|
|
// Verify we can decrypt with destination key
|
|
finalDecryptedReader, err := CreateSSECDecryptedReader(bytes.NewReader(reEncryptedData), destCustomerKey, destIV)
|
|
if err != nil {
|
|
t.Fatalf("Failed to create final decrypted reader: %v", err)
|
|
}
|
|
|
|
finalData, err := io.ReadAll(finalDecryptedReader)
|
|
if err != nil {
|
|
t.Fatalf("Failed to read final decrypted data: %v", err)
|
|
}
|
|
|
|
if string(finalData) != testData {
|
|
t.Errorf("Expected %s, got %s", testData, string(finalData))
|
|
}
|
|
})
|
|
}
|
|
|
|
// TestSSEKMSObjectCopy tests copying SSE-KMS encrypted objects
|
|
func TestSSEKMSObjectCopy(t *testing.T) {
|
|
kmsKey := SetupTestKMS(t)
|
|
defer kmsKey.Cleanup()
|
|
|
|
testData := "Hello, SSE-KMS copy world!"
|
|
encryptionContext := BuildEncryptionContext("test-bucket", "test-object", false)
|
|
|
|
// Encrypt with SSE-KMS
|
|
encryptedReader, sseKey, err := CreateSSEKMSEncryptedReader(strings.NewReader(testData), kmsKey.KeyID, encryptionContext)
|
|
if err != nil {
|
|
t.Fatalf("Failed to create encrypted reader: %v", err)
|
|
}
|
|
|
|
encryptedData, err := io.ReadAll(encryptedReader)
|
|
if err != nil {
|
|
t.Fatalf("Failed to read encrypted data: %v", err)
|
|
}
|
|
|
|
t.Run("Same KMS key copy", func(t *testing.T) {
|
|
// Decrypt with original key
|
|
decryptedReader, err := CreateSSEKMSDecryptedReader(bytes.NewReader(encryptedData), sseKey)
|
|
if err != nil {
|
|
t.Fatalf("Failed to create decrypted reader: %v", err)
|
|
}
|
|
|
|
// Re-encrypt with same KMS key
|
|
reEncryptedReader, newSseKey, err := CreateSSEKMSEncryptedReader(decryptedReader, kmsKey.KeyID, encryptionContext)
|
|
if err != nil {
|
|
t.Fatalf("Failed to create re-encrypted reader: %v", err)
|
|
}
|
|
|
|
reEncryptedData, err := io.ReadAll(reEncryptedReader)
|
|
if err != nil {
|
|
t.Fatalf("Failed to read re-encrypted data: %v", err)
|
|
}
|
|
|
|
// Verify we can decrypt with new key
|
|
finalDecryptedReader, err := CreateSSEKMSDecryptedReader(bytes.NewReader(reEncryptedData), newSseKey)
|
|
if err != nil {
|
|
t.Fatalf("Failed to create final decrypted reader: %v", err)
|
|
}
|
|
|
|
finalData, err := io.ReadAll(finalDecryptedReader)
|
|
if err != nil {
|
|
t.Fatalf("Failed to read final decrypted data: %v", err)
|
|
}
|
|
|
|
if string(finalData) != testData {
|
|
t.Errorf("Expected %s, got %s", testData, string(finalData))
|
|
}
|
|
})
|
|
}
|
|
|
|
// TestSSECToSSEKMSCopy tests cross-encryption copy (SSE-C to SSE-KMS)
|
|
func TestSSECToSSEKMSCopy(t *testing.T) {
|
|
// Setup SSE-C key
|
|
ssecKey := GenerateTestSSECKey(1)
|
|
ssecCustomerKey := &SSECustomerKey{
|
|
Algorithm: "AES256",
|
|
Key: ssecKey.Key,
|
|
KeyMD5: ssecKey.KeyMD5,
|
|
}
|
|
|
|
// Setup SSE-KMS
|
|
kmsKey := SetupTestKMS(t)
|
|
defer kmsKey.Cleanup()
|
|
|
|
testData := "Hello, cross-encryption copy world!"
|
|
|
|
// Encrypt with SSE-C
|
|
encryptedReader, ssecIV, err := CreateSSECEncryptedReader(strings.NewReader(testData), ssecCustomerKey)
|
|
if err != nil {
|
|
t.Fatalf("Failed to create SSE-C encrypted reader: %v", err)
|
|
}
|
|
|
|
encryptedData, err := io.ReadAll(encryptedReader)
|
|
if err != nil {
|
|
t.Fatalf("Failed to read SSE-C encrypted data: %v", err)
|
|
}
|
|
|
|
// Decrypt SSE-C data
|
|
decryptedReader, err := CreateSSECDecryptedReader(bytes.NewReader(encryptedData), ssecCustomerKey, ssecIV)
|
|
if err != nil {
|
|
t.Fatalf("Failed to create SSE-C decrypted reader: %v", err)
|
|
}
|
|
|
|
// Re-encrypt with SSE-KMS
|
|
encryptionContext := BuildEncryptionContext("test-bucket", "test-object", false)
|
|
reEncryptedReader, sseKmsKey, err := CreateSSEKMSEncryptedReader(decryptedReader, kmsKey.KeyID, encryptionContext)
|
|
if err != nil {
|
|
t.Fatalf("Failed to create SSE-KMS encrypted reader: %v", err)
|
|
}
|
|
|
|
reEncryptedData, err := io.ReadAll(reEncryptedReader)
|
|
if err != nil {
|
|
t.Fatalf("Failed to read SSE-KMS encrypted data: %v", err)
|
|
}
|
|
|
|
// Decrypt with SSE-KMS
|
|
finalDecryptedReader, err := CreateSSEKMSDecryptedReader(bytes.NewReader(reEncryptedData), sseKmsKey)
|
|
if err != nil {
|
|
t.Fatalf("Failed to create SSE-KMS decrypted reader: %v", err)
|
|
}
|
|
|
|
finalData, err := io.ReadAll(finalDecryptedReader)
|
|
if err != nil {
|
|
t.Fatalf("Failed to read final decrypted data: %v", err)
|
|
}
|
|
|
|
if string(finalData) != testData {
|
|
t.Errorf("Expected %s, got %s", testData, string(finalData))
|
|
}
|
|
}
|
|
|
|
// TestSSEKMSToSSECCopy tests cross-encryption copy (SSE-KMS to SSE-C)
|
|
func TestSSEKMSToSSECCopy(t *testing.T) {
|
|
// Setup SSE-KMS
|
|
kmsKey := SetupTestKMS(t)
|
|
defer kmsKey.Cleanup()
|
|
|
|
// Setup SSE-C key
|
|
ssecKey := GenerateTestSSECKey(1)
|
|
ssecCustomerKey := &SSECustomerKey{
|
|
Algorithm: "AES256",
|
|
Key: ssecKey.Key,
|
|
KeyMD5: ssecKey.KeyMD5,
|
|
}
|
|
|
|
testData := "Hello, reverse cross-encryption copy world!"
|
|
encryptionContext := BuildEncryptionContext("test-bucket", "test-object", false)
|
|
|
|
// Encrypt with SSE-KMS
|
|
encryptedReader, sseKmsKey, err := CreateSSEKMSEncryptedReader(strings.NewReader(testData), kmsKey.KeyID, encryptionContext)
|
|
if err != nil {
|
|
t.Fatalf("Failed to create SSE-KMS encrypted reader: %v", err)
|
|
}
|
|
|
|
encryptedData, err := io.ReadAll(encryptedReader)
|
|
if err != nil {
|
|
t.Fatalf("Failed to read SSE-KMS encrypted data: %v", err)
|
|
}
|
|
|
|
// Decrypt SSE-KMS data
|
|
decryptedReader, err := CreateSSEKMSDecryptedReader(bytes.NewReader(encryptedData), sseKmsKey)
|
|
if err != nil {
|
|
t.Fatalf("Failed to create SSE-KMS decrypted reader: %v", err)
|
|
}
|
|
|
|
// Re-encrypt with SSE-C
|
|
reEncryptedReader, reEncryptedIV, err := CreateSSECEncryptedReader(decryptedReader, ssecCustomerKey)
|
|
if err != nil {
|
|
t.Fatalf("Failed to create SSE-C encrypted reader: %v", err)
|
|
}
|
|
|
|
reEncryptedData, err := io.ReadAll(reEncryptedReader)
|
|
if err != nil {
|
|
t.Fatalf("Failed to read SSE-C encrypted data: %v", err)
|
|
}
|
|
|
|
// Decrypt with SSE-C
|
|
finalDecryptedReader, err := CreateSSECDecryptedReader(bytes.NewReader(reEncryptedData), ssecCustomerKey, reEncryptedIV)
|
|
if err != nil {
|
|
t.Fatalf("Failed to create SSE-C decrypted reader: %v", err)
|
|
}
|
|
|
|
finalData, err := io.ReadAll(finalDecryptedReader)
|
|
if err != nil {
|
|
t.Fatalf("Failed to read final decrypted data: %v", err)
|
|
}
|
|
|
|
if string(finalData) != testData {
|
|
t.Errorf("Expected %s, got %s", testData, string(finalData))
|
|
}
|
|
}
|
|
|
|
// TestSSECopyWithCorruptedSource tests copy operations with corrupted source data
|
|
func TestSSECopyWithCorruptedSource(t *testing.T) {
|
|
ssecKey := GenerateTestSSECKey(1)
|
|
ssecCustomerKey := &SSECustomerKey{
|
|
Algorithm: "AES256",
|
|
Key: ssecKey.Key,
|
|
KeyMD5: ssecKey.KeyMD5,
|
|
}
|
|
|
|
testData := "Hello, corruption test!"
|
|
|
|
// Encrypt data
|
|
encryptedReader, iv, err := CreateSSECEncryptedReader(strings.NewReader(testData), ssecCustomerKey)
|
|
if err != nil {
|
|
t.Fatalf("Failed to create encrypted reader: %v", err)
|
|
}
|
|
|
|
encryptedData, err := io.ReadAll(encryptedReader)
|
|
if err != nil {
|
|
t.Fatalf("Failed to read encrypted data: %v", err)
|
|
}
|
|
|
|
// Corrupt the encrypted data
|
|
corruptedData := make([]byte, len(encryptedData))
|
|
copy(corruptedData, encryptedData)
|
|
if len(corruptedData) > s3_constants.AESBlockSize {
|
|
// Corrupt a byte after the IV
|
|
corruptedData[s3_constants.AESBlockSize] ^= 0xFF
|
|
}
|
|
|
|
// Try to decrypt corrupted data
|
|
decryptedReader, err := CreateSSECDecryptedReader(bytes.NewReader(corruptedData), ssecCustomerKey, iv)
|
|
if err != nil {
|
|
t.Fatalf("Failed to create decrypted reader for corrupted data: %v", err)
|
|
}
|
|
|
|
decryptedData, err := io.ReadAll(decryptedReader)
|
|
if err != nil {
|
|
// This is okay - corrupted data might cause read errors
|
|
t.Logf("Read error for corrupted data (expected): %v", err)
|
|
return
|
|
}
|
|
|
|
// If we can read it, the data should be different from original
|
|
if string(decryptedData) == testData {
|
|
t.Error("Decrypted corrupted data should not match original")
|
|
}
|
|
}
|
|
|
|
// TestSSEKMSCopyStrategy tests SSE-KMS copy strategy determination
|
|
func TestSSEKMSCopyStrategy(t *testing.T) {
|
|
tests := []struct {
|
|
name string
|
|
srcMetadata map[string][]byte
|
|
destKeyID string
|
|
expectedStrategy SSEKMSCopyStrategy
|
|
}{
|
|
{
|
|
name: "Unencrypted to unencrypted",
|
|
srcMetadata: map[string][]byte{},
|
|
destKeyID: "",
|
|
expectedStrategy: SSEKMSCopyStrategyDirect,
|
|
},
|
|
{
|
|
name: "Same KMS key",
|
|
srcMetadata: map[string][]byte{
|
|
s3_constants.AmzServerSideEncryption: []byte("aws:kms"),
|
|
s3_constants.AmzServerSideEncryptionAwsKmsKeyId: []byte("test-key-123"),
|
|
},
|
|
destKeyID: "test-key-123",
|
|
expectedStrategy: SSEKMSCopyStrategyDirect,
|
|
},
|
|
{
|
|
name: "Different KMS keys",
|
|
srcMetadata: map[string][]byte{
|
|
s3_constants.AmzServerSideEncryption: []byte("aws:kms"),
|
|
s3_constants.AmzServerSideEncryptionAwsKmsKeyId: []byte("test-key-123"),
|
|
},
|
|
destKeyID: "test-key-456",
|
|
expectedStrategy: SSEKMSCopyStrategyDecryptEncrypt,
|
|
},
|
|
{
|
|
name: "Encrypted to unencrypted",
|
|
srcMetadata: map[string][]byte{
|
|
s3_constants.AmzServerSideEncryption: []byte("aws:kms"),
|
|
s3_constants.AmzServerSideEncryptionAwsKmsKeyId: []byte("test-key-123"),
|
|
},
|
|
destKeyID: "",
|
|
expectedStrategy: SSEKMSCopyStrategyDecryptEncrypt,
|
|
},
|
|
{
|
|
name: "Unencrypted to encrypted",
|
|
srcMetadata: map[string][]byte{},
|
|
destKeyID: "test-key-123",
|
|
expectedStrategy: SSEKMSCopyStrategyDecryptEncrypt,
|
|
},
|
|
}
|
|
|
|
for _, tt := range tests {
|
|
t.Run(tt.name, func(t *testing.T) {
|
|
strategy, err := DetermineSSEKMSCopyStrategy(tt.srcMetadata, tt.destKeyID)
|
|
if err != nil {
|
|
t.Fatalf("DetermineSSEKMSCopyStrategy failed: %v", err)
|
|
}
|
|
if strategy != tt.expectedStrategy {
|
|
t.Errorf("Expected strategy %v, got %v", tt.expectedStrategy, strategy)
|
|
}
|
|
})
|
|
}
|
|
}
|
|
|
|
// TestSSEKMSCopyHeaders tests SSE-KMS copy header parsing
|
|
func TestSSEKMSCopyHeaders(t *testing.T) {
|
|
tests := []struct {
|
|
name string
|
|
headers map[string]string
|
|
expectedKeyID string
|
|
expectedContext map[string]string
|
|
expectedBucketKey bool
|
|
expectError bool
|
|
}{
|
|
{
|
|
name: "No SSE-KMS headers",
|
|
headers: map[string]string{},
|
|
expectedKeyID: "",
|
|
expectedContext: nil,
|
|
expectedBucketKey: false,
|
|
expectError: false,
|
|
},
|
|
{
|
|
name: "SSE-KMS with key ID",
|
|
headers: map[string]string{
|
|
s3_constants.AmzServerSideEncryption: "aws:kms",
|
|
s3_constants.AmzServerSideEncryptionAwsKmsKeyId: "test-key-123",
|
|
},
|
|
expectedKeyID: "test-key-123",
|
|
expectedContext: nil,
|
|
expectedBucketKey: false,
|
|
expectError: false,
|
|
},
|
|
{
|
|
name: "SSE-KMS with all options",
|
|
headers: map[string]string{
|
|
s3_constants.AmzServerSideEncryption: "aws:kms",
|
|
s3_constants.AmzServerSideEncryptionAwsKmsKeyId: "test-key-123",
|
|
s3_constants.AmzServerSideEncryptionContext: "eyJ0ZXN0IjoidmFsdWUifQ==", // base64 of {"test":"value"}
|
|
s3_constants.AmzServerSideEncryptionBucketKeyEnabled: "true",
|
|
},
|
|
expectedKeyID: "test-key-123",
|
|
expectedContext: map[string]string{"test": "value"},
|
|
expectedBucketKey: true,
|
|
expectError: false,
|
|
},
|
|
{
|
|
name: "Invalid key ID",
|
|
headers: map[string]string{
|
|
s3_constants.AmzServerSideEncryption: "aws:kms",
|
|
s3_constants.AmzServerSideEncryptionAwsKmsKeyId: "invalid key id",
|
|
},
|
|
expectError: true,
|
|
},
|
|
{
|
|
name: "Invalid encryption context",
|
|
headers: map[string]string{
|
|
s3_constants.AmzServerSideEncryption: "aws:kms",
|
|
s3_constants.AmzServerSideEncryptionContext: "invalid-base64!",
|
|
},
|
|
expectError: true,
|
|
},
|
|
}
|
|
|
|
for _, tt := range tests {
|
|
t.Run(tt.name, func(t *testing.T) {
|
|
req, _ := http.NewRequest("PUT", "/test", nil)
|
|
for k, v := range tt.headers {
|
|
req.Header.Set(k, v)
|
|
}
|
|
|
|
keyID, context, bucketKey, err := ParseSSEKMSCopyHeaders(req)
|
|
|
|
if tt.expectError {
|
|
if err == nil {
|
|
t.Error("Expected error but got none")
|
|
}
|
|
return
|
|
}
|
|
|
|
if err != nil {
|
|
t.Fatalf("Unexpected error: %v", err)
|
|
}
|
|
|
|
if keyID != tt.expectedKeyID {
|
|
t.Errorf("Expected keyID %s, got %s", tt.expectedKeyID, keyID)
|
|
}
|
|
|
|
if !mapsEqual(context, tt.expectedContext) {
|
|
t.Errorf("Expected context %v, got %v", tt.expectedContext, context)
|
|
}
|
|
|
|
if bucketKey != tt.expectedBucketKey {
|
|
t.Errorf("Expected bucketKey %v, got %v", tt.expectedBucketKey, bucketKey)
|
|
}
|
|
})
|
|
}
|
|
}
|
|
|
|
// TestSSEKMSDirectCopy tests direct copy scenarios
|
|
func TestSSEKMSDirectCopy(t *testing.T) {
|
|
tests := []struct {
|
|
name string
|
|
srcMetadata map[string][]byte
|
|
destKeyID string
|
|
canDirect bool
|
|
}{
|
|
{
|
|
name: "Both unencrypted",
|
|
srcMetadata: map[string][]byte{},
|
|
destKeyID: "",
|
|
canDirect: true,
|
|
},
|
|
{
|
|
name: "Same key ID",
|
|
srcMetadata: map[string][]byte{
|
|
s3_constants.AmzServerSideEncryption: []byte("aws:kms"),
|
|
s3_constants.AmzServerSideEncryptionAwsKmsKeyId: []byte("test-key-123"),
|
|
},
|
|
destKeyID: "test-key-123",
|
|
canDirect: true,
|
|
},
|
|
{
|
|
name: "Different key IDs",
|
|
srcMetadata: map[string][]byte{
|
|
s3_constants.AmzServerSideEncryption: []byte("aws:kms"),
|
|
s3_constants.AmzServerSideEncryptionAwsKmsKeyId: []byte("test-key-123"),
|
|
},
|
|
destKeyID: "test-key-456",
|
|
canDirect: false,
|
|
},
|
|
{
|
|
name: "Source encrypted, dest unencrypted",
|
|
srcMetadata: map[string][]byte{
|
|
s3_constants.AmzServerSideEncryption: []byte("aws:kms"),
|
|
s3_constants.AmzServerSideEncryptionAwsKmsKeyId: []byte("test-key-123"),
|
|
},
|
|
destKeyID: "",
|
|
canDirect: false,
|
|
},
|
|
{
|
|
name: "Source unencrypted, dest encrypted",
|
|
srcMetadata: map[string][]byte{},
|
|
destKeyID: "test-key-123",
|
|
canDirect: false,
|
|
},
|
|
}
|
|
|
|
for _, tt := range tests {
|
|
t.Run(tt.name, func(t *testing.T) {
|
|
canDirect := CanDirectCopySSEKMS(tt.srcMetadata, tt.destKeyID)
|
|
if canDirect != tt.canDirect {
|
|
t.Errorf("Expected canDirect %v, got %v", tt.canDirect, canDirect)
|
|
}
|
|
})
|
|
}
|
|
}
|
|
|
|
// TestGetSourceSSEKMSInfo tests extraction of SSE-KMS info from metadata
|
|
func TestGetSourceSSEKMSInfo(t *testing.T) {
|
|
tests := []struct {
|
|
name string
|
|
metadata map[string][]byte
|
|
expectedKeyID string
|
|
expectedEncrypted bool
|
|
}{
|
|
{
|
|
name: "No encryption",
|
|
metadata: map[string][]byte{},
|
|
expectedKeyID: "",
|
|
expectedEncrypted: false,
|
|
},
|
|
{
|
|
name: "SSE-KMS with key ID",
|
|
metadata: map[string][]byte{
|
|
s3_constants.AmzServerSideEncryption: []byte("aws:kms"),
|
|
s3_constants.AmzServerSideEncryptionAwsKmsKeyId: []byte("test-key-123"),
|
|
},
|
|
expectedKeyID: "test-key-123",
|
|
expectedEncrypted: true,
|
|
},
|
|
{
|
|
name: "SSE-KMS without key ID (default key)",
|
|
metadata: map[string][]byte{
|
|
s3_constants.AmzServerSideEncryption: []byte("aws:kms"),
|
|
},
|
|
expectedKeyID: "",
|
|
expectedEncrypted: true,
|
|
},
|
|
{
|
|
name: "Non-KMS encryption",
|
|
metadata: map[string][]byte{
|
|
s3_constants.AmzServerSideEncryption: []byte("AES256"),
|
|
},
|
|
expectedKeyID: "",
|
|
expectedEncrypted: false,
|
|
},
|
|
}
|
|
|
|
for _, tt := range tests {
|
|
t.Run(tt.name, func(t *testing.T) {
|
|
keyID, encrypted := GetSourceSSEKMSInfo(tt.metadata)
|
|
if keyID != tt.expectedKeyID {
|
|
t.Errorf("Expected keyID %s, got %s", tt.expectedKeyID, keyID)
|
|
}
|
|
if encrypted != tt.expectedEncrypted {
|
|
t.Errorf("Expected encrypted %v, got %v", tt.expectedEncrypted, encrypted)
|
|
}
|
|
})
|
|
}
|
|
}
|
|
|
|
// Helper function to compare maps
|
|
func mapsEqual(a, b map[string]string) bool {
|
|
if len(a) != len(b) {
|
|
return false
|
|
}
|
|
for k, v := range a {
|
|
if b[k] != v {
|
|
return false
|
|
}
|
|
}
|
|
return true
|
|
}
|