Skip to content

Conversation

@benzekrimaha
Copy link
Contributor

@benzekrimaha benzekrimaha commented Oct 23, 2025

Issue: CLDSRV-724

@benzekrimaha benzekrimaha force-pushed the improvement/CLDSRV-724-service-get-related-functional-tests branch 3 times, most recently from 72dd6ed to cd35cca Compare October 28, 2025 15:59
@benzekrimaha benzekrimaha force-pushed the improvement/CLDSRV-724-backbeat-related-functional-tests branch from a2c5289 to 425731c Compare October 28, 2025 16:03
@benzekrimaha benzekrimaha force-pushed the improvement/CLDSRV-724-backbeat-related-functional-tests branch from 425731c to 2b9959d Compare October 28, 2025 16:03
@scality scality deleted a comment from codecov bot Nov 5, 2025
@codecov
Copy link

codecov bot commented Nov 5, 2025

❌ 170 Tests Failed:

Tests completed Failed Passed Skipped
4700 170 4530 0
View the top 3 failed test(s) by shortest run time
"before each" hook for "should put an object with tags to scality-internal-mem backend"::Object tagging with multiple backends With default signature "before each" hook for "should put an object with tags to scality-internal-mem backend"
Stack Traces | 0s run time
s3.createBucket is not a function
should copy empty object from scality-internal-mem to bucket on AWS backend with versioning with REPLACE::AWS backend object copy with versioning With v4 signature should copy empty object from scality-internal-mem to bucket on AWS backend with versioning with REPLACE
Stack Traces | 0s run time
s3.createBucket is not a function
"before each" hook for "should put an object with tags to scality-internal-mem backend"::Object tagging with multiple backends With v4 signature "before each" hook for "should put an object with tags to scality-internal-mem backend"
Stack Traces | 0.001s run time
s3.createBucket is not a function
should copy empty object from scality-internal-mem to bucket on AWS backend with versioning with REPLACE::AWS backend object copy with versioning With default signature should copy empty object from scality-internal-mem to bucket on AWS backend with versioning with REPLACE
Stack Traces | 0.001s run time
s3.createBucket is not a function
"after each" hook for "should copy empty object from scality-internal-mem to bucket on AWS backend with versioning with REPLACE"::AWS backend object copy with versioning With v4 signature "after each" hook for "should copy empty object from scality-internal-mem to bucket on AWS backend with versioning with REPLACE"
Stack Traces | 0.002s run time
The specified bucket does not exist.
"after each" hook for "should put an object with tags to scality-internal-mem backend"::Object tagging with multiple backends With v4 signature "after each" hook for "should put an object with tags to scality-internal-mem backend"
Stack Traces | 0.002s run time
The specified bucket does not exist.
"after each" hook for "should copy empty object from scality-internal-mem to bucket on AWS backend with versioning with REPLACE"::AWS backend object copy with versioning With default signature "after each" hook for "should copy empty object from scality-internal-mem to bucket on AWS backend with versioning with REPLACE"
Stack Traces | 0.004s run time
The specified bucket does not exist.
"after each" hook for "should put an object with tags to scality-internal-mem backend"::Object tagging with multiple backends With default signature "after each" hook for "should put an object with tags to scality-internal-mem backend"
Stack Traces | 0.004s run time
The specified bucket does not exist.
should return an error to put request without a valid location constraint::MultipleBackend put object With default signature with set location from "x-amz-meta-scal-location-constraint" header should return an error to put request without a valid location constraint
Stack Traces | 0.004s run time
Expected values to be strictly equal:
+ actual - expected

+ undefined
- 'InvalidArgument'
should return an error to put request without a valid location constraint::MultipleBackend put object With v4 signature with set location from "x-amz-meta-scal-location-constraint" header should return an error to put request without a valid location constraint
Stack Traces | 0.004s run time
Expected values to be strictly equal:
+ actual - expected

+ undefined
- 'InvalidArgument'
should copy an object on AWS to a different AWS location with source object READ access::MultipleBackend object copy: AWS With default signature should copy an object on AWS to a different AWS location with source object READ access
Stack Traces | 0.008s run time
The request has failed due to a temporary failure of the server.
should copy an object on AWS to a different AWS location with source object READ access::MultipleBackend object copy: AWS With v4 signature should copy an object on AWS to a different AWS location with source object READ access
Stack Traces | 0.008s run time
The request has failed due to a temporary failure of the server.
should get correct data from aws backend using version IDs::AWS backend get object with versioning With v4 signature should get correct data from aws backend using version IDs
Stack Traces | 0.008s run time
The request has failed due to a temporary failure of the server.
should get correct version when getting without version ID::AWS backend get object with versioning With default signature should get correct version when getting without version ID
Stack Traces | 0.009s run time
The request has failed due to a temporary failure of the server.
should get correct data from aws backend using version IDs::AWS backend get object with versioning With default signature should get correct data from aws backend using version IDs
Stack Traces | 0.01s run time
The request has failed due to a temporary failure of the server.
should return a version id putting object to to AWS with versioning enabled::MultipleBackend put object With v4 signature with set location from "x-amz-meta-scal-location-constraint" header should return a version id putting object to to AWS with versioning enabled
Stack Traces | 0.01s run time
The request has failed due to a temporary failure of the server.
"before each" hook for "versioning not configured: should delete a tag set on the latest version if no version is specified"::AWS backend object delete tagging with versioning  With v4 signature "before each" hook for "versioning not configured: should delete a tag set on the latest version if no version is specified"
Stack Traces | 0.012s run time
Resolution method is overspecified. Specify a callback *or* return a Promise; not both.
should put objects with same key to file then AWS, and object should only be present on AWS::MultipleBackend put object With default signature with set location from "x-amz-meta-scal-location-constraint" header should put objects with same key to file then AWS, and object should only be present on AWS
Stack Traces | 0.012s run time
Expected success, got error: ServiceUnavailable: The request has failed due to a temporary failure of the server.
should put objects with same key to file then AWS, and object should only be present on AWS::MultipleBackend put object With v4 signature with set location from "x-amz-meta-scal-location-constraint" header should put objects with same key to file then AWS, and object should only be present on AWS
Stack Traces | 0.012s run time
Expected success, got error: ServiceUnavailable: The request has failed due to a temporary failure of the server.
"before each" hook for "versioning not configured: should delete a tag set on the latest version if no version is specified"::AWS backend object delete tagging with versioning  With default signature "before each" hook for "versioning not configured: should delete a tag set on the latest version if no version is specified"
Stack Traces | 0.013s run time
Resolution method is overspecified. Specify a callback *or* return a Promise; not both.
"before each" hook for "versioning not configured: should not return version id completing mpu"::AWS backend complete mpu with versioning With default signature "before each" hook for "versioning not configured: should not return version id completing mpu"
Stack Traces | 0.015s run time
Resolution method is overspecified. Specify a callback *or* return a Promise; not both.
"before each" hook for "versioning not configured: should not return version id completing mpu"::AWS backend complete mpu with versioning With v4 signature "before each" hook for "versioning not configured: should not return version id completing mpu"
Stack Traces | 0.015s run time
Resolution method is overspecified. Specify a callback *or* return a Promise; not both.
should put an object to AWS with no location header::MultipleBackend put object based on bucket location With v4 signature should put an object to AWS with no location header
Stack Traces | 0.017s run time
Expected success, got error: ServiceUnavailable: The request has failed due to a temporary failure of the server.
should put an object to AWS with no location header::MultipleBackend put object based on bucket location With default signature should put an object to AWS with no location header
Stack Traces | 0.02s run time
Expected success, got error: ServiceUnavailable: The request has failed due to a temporary failure of the server.
should put a large object to AWS::MultipleBackend put object With v4 signature with set location from "x-amz-meta-scal-location-constraint" header should put a large object to AWS
Stack Traces | 0.031s run time
Expected success, got error: ServiceUnavailable: The request has failed due to a temporary failure of the server.
should put a large object to AWS::MultipleBackend put object With default signature with set location from "x-amz-meta-scal-location-constraint" header should put a large object to AWS
Stack Traces | 0.033s run time
Expected success, got error: ServiceUnavailable: The request has failed due to a temporary failure of the server.
should put objects with same key to AWS then file, and object should only be present in file::MultipleBackend put object With default signature with set location from "x-amz-meta-scal-location-constraint" header should put objects with same key to AWS then file, and object should only be present in file
Stack Traces | 0.046s run time
Expected success, got error: ServiceUnavailable: The request has failed due to a temporary failure of the server.
should put objects with same key to AWS then file, and object should only be present in file::MultipleBackend put object With v4 signature with set location from "x-amz-meta-scal-location-constraint" header should put objects with same key to AWS then file, and object should only be present in file
Stack Traces | 0.046s run time
Expected success, got error: ServiceUnavailable: The request has failed due to a temporary failure of the server.
should put two objects to AWS with same key, and newest object should be returned::MultipleBackend put object With default signature with set location from "x-amz-meta-scal-location-constraint" header should put two objects to AWS with same key, and newest object should be returned
Stack Traces | 0.046s run time
Expected success, got error: ServiceUnavailable: The request has failed due to a temporary failure of the server.
should encrypt body only if bucket encrypted putting object to AWS::MultipleBackend put object With default signature with set location from "x-amz-meta-scal-location-constraint" header should encrypt body only if bucket encrypted putting object to AWS
Stack Traces | 0.047s run time
Expected success, got error: ServiceUnavailable: The request has failed due to a temporary failure of the server.
should put actual object with body and mdonly header::MultipleBackend put object With v4 signature with set location from "x-amz-meta-scal-location-constraint" header should put actual object with body and mdonly header
Stack Traces | 0.047s run time
Expected success, got error: ServiceUnavailable: The request has failed due to a temporary failure of the server.
should put two objects to AWS with same key, and newest object should be returned::MultipleBackend put object With v4 signature with set location from "x-amz-meta-scal-location-constraint" header should put two objects to AWS with same key, and newest object should be returned
Stack Traces | 0.047s run time
Expected success, got error: ServiceUnavailable: The request has failed due to a temporary failure of the server.
should encrypt body only if bucket encrypted putting object to AWS::MultipleBackend put object With v4 signature with set location from "x-amz-meta-scal-location-constraint" header should encrypt body only if bucket encrypted putting object to AWS
Stack Traces | 0.048s run time
Expected success, got error: ServiceUnavailable: The request has failed due to a temporary failure of the server.
should put actual object with body and mdonly header::MultipleBackend put object With default signature with set location from "x-amz-meta-scal-location-constraint" header should put actual object with body and mdonly header
Stack Traces | 0.048s run time
Expected success, got error: ServiceUnavailable: The request has failed due to a temporary failure of the server.
should put an object to AWS::MultipleBackend put object With default signature with set location from "x-amz-meta-scal-location-constraint" header should put an object to AWS
Stack Traces | 0.048s run time
Expected success, got error: ServiceUnavailable: The request has failed due to a temporary failure of the server.
should put an object to AWS::MultipleBackend put object With v4 signature with set location from "x-amz-meta-scal-location-constraint" header should put an object to AWS
Stack Traces | 0.048s run time
Expected success, got error: ServiceUnavailable: The request has failed due to a temporary failure of the server.
should get correct version when getting without version ID::AWS backend get object with versioning With v4 signature should get correct version when getting without version ID
Stack Traces | 0.05s run time
The request has failed due to a temporary failure of the server.
should return a version id putting object to to AWS with versioning enabled::MultipleBackend put object With default signature with set location from "x-amz-meta-scal-location-constraint" header should return a version id putting object to to AWS with versioning enabled
Stack Traces | 0.05s run time
The request has failed due to a temporary failure of the server.
should get correct data from aws backend using version IDs after putting null versions, putting versions, putting more null versions and then putting more versions::AWS backend get object with versioning With v4 signature should get correct data from aws backend using version IDs after putting null versions, putting versions, putting more null versions and then putting more versions
Stack Traces | 30s run time
Timeout of 30000ms exceeded. For async tests and hooks, ensure "done()" is called; if returning a Promise, ensure it resolves. (.../multipleBackend/get/getAwsVersioning.js)
should return the correct data getting versioned object even if object was deleted from AWS (creating a delete marker)::AWS backend get object with versioning With default signature should return the correct data getting versioned object even if object was deleted from AWS (creating a delete marker)
Stack Traces | 30s run time
Timeout of 30000ms exceeded. For async tests and hooks, ensure "done()" is called; if returning a Promise, ensure it resolves. (.../multipleBackend/get/getAwsVersioning.js)
should not return version ids when versioning has not been configured via CloudServer, even when version id specified::AWS backend get object with versioning With v4 signature should not return version ids when versioning has not been configured via CloudServer, even when version id specified
Stack Traces | 30s run time
Timeout of 30000ms exceeded. For async tests and hooks, ensure "done()" is called; if returning a Promise, ensure it resolves. (.../multipleBackend/get/getAwsVersioning.js)
should get correct data from aws backend using version IDs after putting null versions, putting versions, putting more null versions and then putting more versions::AWS backend get object with versioning With default signature should get correct data from aws backend using version IDs after putting null versions, putting versions, putting more null versions and then putting more versions
Stack Traces | 30s run time
Timeout of 30000ms exceeded. For async tests and hooks, ensure "done()" is called; if returning a Promise, ensure it resolves. (.../multipleBackend/get/getAwsVersioning.js)
should not return version ids when versioning has not been configured via CloudServer, even when version id specified::AWS backend get object with versioning With default signature should not return version ids when versioning has not been configured via CloudServer, even when version id specified
Stack Traces | 30s run time
Timeout of 30000ms exceeded. For async tests and hooks, ensure "done()" is called; if returning a Promise, ensure it resolves. (.../multipleBackend/get/getAwsVersioning.js)
should return version id for null version when versioning has been configured via CloudServer::AWS backend get object with versioning With v4 signature should return version id for null version when versioning has been configured via CloudServer
Stack Traces | 30s run time
Timeout of 30000ms exceeded. For async tests and hooks, ensure "done()" is called; if returning a Promise, ensure it resolves. (.../multipleBackend/get/getAwsVersioning.js)
should not return version ids when versioning has not been configured via CloudServer::AWS backend get object with versioning With default signature should not return version ids when versioning has not been configured via CloudServer
Stack Traces | 30s run time
Timeout of 30000ms exceeded. For async tests and hooks, ensure "done()" is called; if returning a Promise, ensure it resolves. (.../multipleBackend/get/getAwsVersioning.js)
versioning suspended then enabled: should put/get acl on null version successfully even when latest version is not null version::AWS backend put/get object acl with versioning With v4 signature versioning suspended then enabled: should put/get acl on null version successfully even when latest version is not null version
Stack Traces | 30s run time
Timeout of 30000ms exceeded. For async tests and hooks, ensure "done()" is called; if returning a Promise, ensure it resolves. (.../multipleBackend/acl/aclAwsVersioning.js)
should overwrite existing null version if putting object after suspending versioning::AWS backend get object with versioning With default signature should overwrite existing null version if putting object after suspending versioning
Stack Traces | 30s run time
Timeout of 30000ms exceeded. For async tests and hooks, ensure "done()" is called; if returning a Promise, ensure it resolves. (.../multipleBackend/get/getAwsVersioning.js)
should return a LocationNotFound if trying to get a version that was deleted in AWS but exists in s3 metadata::AWS backend get object with versioning With v4 signature should return a LocationNotFound if trying to get a version that was deleted in AWS but exists in s3 metadata
Stack Traces | 30s run time
Timeout of 30000ms exceeded. For async tests and hooks, ensure "done()" is called; if returning a Promise, ensure it resolves. (.../multipleBackend/get/getAwsVersioning.js)
should overwrite null version if putting object when versioning is suspended after versioning enabled::AWS backend get object with versioning With v4 signature should overwrite null version if putting object when versioning is suspended after versioning enabled
Stack Traces | 30s run time
Timeout of 30000ms exceeded. For async tests and hooks, ensure "done()" is called; if returning a Promise, ensure it resolves. (.../multipleBackend/get/getAwsVersioning.js)
should return a LocationNotFound if trying to get an object that was deleted in AWS but exists in s3 metadata::AWS backend get object with versioning With default signature should return a LocationNotFound if trying to get an object that was deleted in AWS but exists in s3 metadata
Stack Traces | 30s run time
Timeout of 30000ms exceeded. For async tests and hooks, ensure "done()" is called; if returning a Promise, ensure it resolves. (.../multipleBackend/get/getAwsVersioning.js)
versioning enabled: should get correct acl using version IDs::AWS backend put/get object acl with versioning With v4 signature versioning enabled: should get correct acl using version IDs
Stack Traces | 30s run time
Timeout of 30000ms exceeded. For async tests and hooks, ensure "done()" is called; if returning a Promise, ensure it resolves. (.../multipleBackend/acl/aclAwsVersioning.js)
should not return version ids when versioning has not been configured via CloudServer::AWS backend get object with versioning With v4 signature should not return version ids when versioning has not been configured via CloudServer
Stack Traces | 30s run time
Timeout of 30000ms exceeded. For async tests and hooks, ensure "done()" is called; if returning a Promise, ensure it resolves. (.../multipleBackend/get/getAwsVersioning.js)
versioning enabled: should get correct acl when getting without version ID::AWS backend put/get object acl with versioning With default signature versioning enabled: should get correct acl when getting without version ID
Stack Traces | 30s run time
Timeout of 30000ms exceeded. For async tests and hooks, ensure "done()" is called; if returning a Promise, ensure it resolves. (.../multipleBackend/acl/aclAwsVersioning.js)
should return the correct data getting versioned object even if object is put directly to AWS (creating new version)::AWS backend get object with versioning With default signature should return the correct data getting versioned object even if object is put directly to AWS (creating new version)
Stack Traces | 30s run time
Timeout of 30000ms exceeded. For async tests and hooks, ensure "done()" is called; if returning a Promise, ensure it resolves. (.../multipleBackend/get/getAwsVersioning.js)
versioning suspended then enabled: should put/get acl on null version successfully even when latest version is not null version::AWS backend put/get object acl with versioning With default signature versioning suspended then enabled: should put/get acl on null version successfully even when latest version is not null version
Stack Traces | 30s run time
Timeout of 30000ms exceeded. For async tests and hooks, ensure "done()" is called; if returning a Promise, ensure it resolves. (.../multipleBackend/acl/aclAwsVersioning.js)
should overwrite existing null version if putting object after suspending versioning::AWS backend get object with versioning With v4 signature should overwrite existing null version if putting object after suspending versioning
Stack Traces | 30s run time
Timeout of 30000ms exceeded. For async tests and hooks, ensure "done()" is called; if returning a Promise, ensure it resolves. (.../multipleBackend/get/getAwsVersioning.js)
should overwrite the null version if putting object twice before versioning is configured::AWS backend get object with versioning With default signature should overwrite the null version if putting object twice before versioning is configured
Stack Traces | 30s run time
Timeout of 30000ms exceeded. For async tests and hooks, ensure "done()" is called; if returning a Promise, ensure it resolves. (.../multipleBackend/get/getAwsVersioning.js)
should return the correct data getting versioned object even if object was deleted from AWS (creating a delete marker)::AWS backend get object with versioning With v4 signature should return the correct data getting versioned object even if object was deleted from AWS (creating a delete marker)
Stack Traces | 30s run time
Timeout of 30000ms exceeded. For async tests and hooks, ensure "done()" is called; if returning a Promise, ensure it resolves. (.../multipleBackend/get/getAwsVersioning.js)
versioning enabled: should get correct acl when getting without version ID::AWS backend put/get object acl with versioning With v4 signature versioning enabled: should get correct acl when getting without version ID
Stack Traces | 30s run time
Timeout of 30000ms exceeded. For async tests and hooks, ensure "done()" is called; if returning a Promise, ensure it resolves. (.../multipleBackend/acl/aclAwsVersioning.js)
should overwrite the null version if putting object twice before versioning is configured::AWS backend get object with versioning With v4 signature should overwrite the null version if putting object twice before versioning is configured
Stack Traces | 30s run time
Timeout of 30000ms exceeded. For async tests and hooks, ensure "done()" is called; if returning a Promise, ensure it resolves. (.../multipleBackend/get/getAwsVersioning.js)
should overwrite null version if putting object when versioning is suspended after versioning enabled::AWS backend get object with versioning With default signature should overwrite null version if putting object when versioning is suspended after versioning enabled
Stack Traces | 30s run time
Timeout of 30000ms exceeded. For async tests and hooks, ensure "done()" is called; if returning a Promise, ensure it resolves. (.../multipleBackend/get/getAwsVersioning.js)
should return the correct data getting versioned object even if object is put directly to AWS (creating new version)::AWS backend get object with versioning With v4 signature should return the correct data getting versioned object even if object is put directly to AWS (creating new version)
Stack Traces | 30s run time
Timeout of 30000ms exceeded. For async tests and hooks, ensure "done()" is called; if returning a Promise, ensure it resolves. (.../multipleBackend/get/getAwsVersioning.js)
versioning enabled: should get correct acl using version IDs::AWS backend put/get object acl with versioning With default signature versioning enabled: should get correct acl using version IDs
Stack Traces | 30s run time
Timeout of 30000ms exceeded. For async tests and hooks, ensure "done()" is called; if returning a Promise, ensure it resolves. (.../multipleBackend/acl/aclAwsVersioning.js)
should return a LocationNotFound if trying to get a version that was deleted in AWS but exists in s3 metadata::AWS backend get object with versioning With default signature should return a LocationNotFound if trying to get a version that was deleted in AWS but exists in s3 metadata
Stack Traces | 30s run time
Timeout of 30000ms exceeded. For async tests and hooks, ensure "done()" is called; if returning a Promise, ensure it resolves. (.../multipleBackend/get/getAwsVersioning.js)
should return a LocationNotFound if trying to get an object that was deleted in AWS but exists in s3 metadata::AWS backend get object with versioning With v4 signature should return a LocationNotFound if trying to get an object that was deleted in AWS but exists in s3 metadata
Stack Traces | 30s run time
Timeout of 30000ms exceeded. For async tests and hooks, ensure "done()" is called; if returning a Promise, ensure it resolves. (.../multipleBackend/get/getAwsVersioning.js)
should return version id for null version when versioning has been configured via CloudServer::AWS backend get object with versioning With default signature should return version id for null version when versioning has been configured via CloudServer
Stack Traces | 30s run time
Timeout of 30000ms exceeded. For async tests and hooks, ensure "done()" is called; if returning a Promise, ensure it resolves. (.../multipleBackend/get/getAwsVersioning.js)
should delete the correct version even if other versions or delete markers put directly on aws::AWS backend delete object w. versioning: using object location constraint With v4 signature should delete the correct version even if other versions or delete markers put directly on aws
Stack Traces | 120s run time
Timeout of 120000ms exceeded. For async tests and hooks, ensure "done()" is called; if returning a Promise, ensure it resolves. (.../multipleBackend/delete/deleteAwsVersioning.js)
versioning suspended: should create a delete marker in s3 and aws successfully when deleting non-existing object::AWS backend delete object w. versioning: using bucket location constraint With default signature versioning suspended: should create a delete marker in s3 and aws successfully when deleting non-existing object
Stack Traces | 120s run time
Timeout of 120000ms exceeded. For async tests and hooks, ensure "done()" is called; if returning a Promise, ensure it resolves. (.../multipleBackend/delete/deleteAwsVersioning.js)
versioning suspended: should create a delete marker in s3 and aws successfully when deleting existing object::AWS backend delete object w. versioning: using object location constraint With v4 signature versioning suspended: should create a delete marker in s3 and aws successfully when deleting existing object
Stack Traces | 120s run time
Timeout of 120000ms exceeded. For async tests and hooks, ensure "done()" is called; if returning a Promise, ensure it resolves. (.../multipleBackend/delete/deleteAwsVersioning.js)
versioning enabled: should create a delete marker in s3 and aws successfully when deleting existing object::AWS backend delete object w. versioning: using object location constraint With v4 signature versioning enabled: should create a delete marker in s3 and aws successfully when deleting existing object
Stack Traces | 120s run time
Timeout of 120000ms exceeded. For async tests and hooks, ensure "done()" is called; if returning a Promise, ensure it resolves. (.../multipleBackend/delete/deleteAwsVersioning.js)
versioning not configured: if specifying "null" version, should delete specific version in AWS backend::AWS backend delete multiple objects w. versioning: using object location constraint With v4 signature versioning not configured: if specifying "null" version, should delete specific version in AWS backend
Stack Traces | 120s run time
Timeout of 120000ms exceeded. For async tests and hooks, ensure "done()" is called; if returning a Promise, ensure it resolves. (.../multipleBackend/delete/deleteAwsVersioning.js)
versioning suspended: should delete a specific version in AWS backend successfully::AWS backend delete object w. versioning: using object location constraint With v4 signature versioning suspended: should delete a specific version in AWS backend successfully
Stack Traces | 120s run time
Timeout of 120000ms exceeded. For async tests and hooks, ensure "done()" is called; if returning a Promise, ensure it resolves. (.../multipleBackend/delete/deleteAwsVersioning.js)
versioning enabled: should create a delete marker in s3 and aws successfully when deleting existing object::AWS backend delete object w. versioning: using object location constraint With default signature versioning enabled: should create a delete marker in s3 and aws successfully when deleting existing object
Stack Traces | 120s run time
Timeout of 120000ms exceeded. For async tests and hooks, ensure "done()" is called; if returning a Promise, ensure it resolves. (.../multipleBackend/delete/deleteAwsVersioning.js)
should return an ServiceUnavailable if trying to put tags on version that was deleted from AWS directly::AWS backend object put/get tagging with versioning With default signature should return an ServiceUnavailable if trying to put tags on version that was deleted from AWS directly
Stack Traces | 120s run time
Timeout of 120000ms exceeded. For async tests and hooks, ensure "done()" is called; if returning a Promise, ensure it resolves. (.../multipleBackend/objectTagging/taggingAwsVersioning-putget.js)
should return an ServiceUnavailable if trying to put tags from object that was deleted from AWS directly::AWS backend object put/get tagging with versioning With v4 signature should return an ServiceUnavailable if trying to put tags from object that was deleted from AWS directly
Stack Traces | 120s run time
Timeout of 120000ms exceeded. For async tests and hooks, ensure "done()" is called; if returning a Promise, ensure it resolves. (.../multipleBackend/objectTagging/taggingAwsVersioning-putget.js)
versioning enabled then suspended: should put/get a tag set on a specific (non-null) version if specified::AWS backend object put/get tagging with versioning With v4 signature versioning enabled then suspended: should put/get a tag set on a specific (non-null) version if specified
Stack Traces | 120s run time
Timeout of 120000ms exceeded. For async tests and hooks, ensure "done()" is called; if returning a Promise, ensure it resolves. (.../multipleBackend/objectTagging/taggingAwsVersioning-putget.js)
versioning suspended: should delete a specific version in AWS backend successfully::AWS backend delete multiple objects w. versioning: using object location constraint With v4 signature versioning suspended: should delete a specific version in AWS backend successfully
Stack Traces | 120s run time
Timeout of 120000ms exceeded. For async tests and hooks, ensure "done()" is called; if returning a Promise, ensure it resolves. (.../multipleBackend/delete/deleteAwsVersioning.js)
should get tags for an object even if it was deleted from AWS directly (we rely on s3 metadata)::AWS backend object put/get tagging with versioning With default signature should get tags for an object even if it was deleted from AWS directly (we rely on s3 metadata)
Stack Traces | 120s run time
Timeout of 120000ms exceeded. For async tests and hooks, ensure "done()" is called; if returning a Promise, ensure it resolves. (.../multipleBackend/objectTagging/taggingAwsVersioning-putget.js)
should delete the correct version even if other versions or delete markers put directly on aws::AWS backend delete object w. versioning: using object location constraint With default signature should delete the correct version even if other versions or delete markers put directly on aws
Stack Traces | 120s run time
Timeout of 120000ms exceeded. For async tests and hooks, ensure "done()" is called; if returning a Promise, ensure it resolves. (.../multipleBackend/delete/deleteAwsVersioning.js)
should return an ServiceUnavailable if trying to put tags from object that was deleted from AWS directly::AWS backend object put/get tagging with versioning With default signature should return an ServiceUnavailable if trying to put tags from object that was deleted from AWS directly
Stack Traces | 120s run time
Timeout of 120000ms exceeded. For async tests and hooks, ensure "done()" is called; if returning a Promise, ensure it resolves. (.../multipleBackend/objectTagging/taggingAwsVersioning-putget.js)
versioning enabled: should put/get a tag set on a specific version that is not the latest version::AWS backend object put/get tagging with versioning With v4 signature versioning enabled: should put/get a tag set on a specific version that is not the latest version
Stack Traces | 120s run time
Timeout of 120000ms exceeded. For async tests and hooks, ensure "done()" is called; if returning a Promise, ensure it resolves. (.../multipleBackend/objectTagging/taggingAwsVersioning-putget.js)
versioning not configured: should put/get a tag set on a specific version if specified (null)::AWS backend object put/get tagging with versioning With default signature versioning not configured: should put/get a tag set on a specific version if specified (null)
Stack Traces | 120s run time
Timeout of 120000ms exceeded. For async tests and hooks, ensure "done()" is called; if returning a Promise, ensure it resolves. (.../multipleBackend/objectTagging/taggingAwsVersioning-putget.js)
multiple delete markers: should be able to get pre-existing versions after creating and deleting several delete markers::AWS backend delete object w. versioning: using object location constraint With v4 signature multiple delete markers: should be able to get pre-existing versions after creating and deleting several delete markers
Stack Traces | 120s run time
Timeout of 120000ms exceeded. For async tests and hooks, ensure "done()" is called; if returning a Promise, ensure it resolves. (.../multipleBackend/delete/deleteAwsVersioning.js)
versioning enabled: should delete a delete marker in s3 and aws successfully::AWS backend delete object w. versioning: using object location constraint With v4 signature versioning enabled: should delete a delete marker in s3 and aws successfully
Stack Traces | 120s run time
Timeout of 120000ms exceeded. For async tests and hooks, ensure "done()" is called; if returning a Promise, ensure it resolves. (.../multipleBackend/delete/deleteAwsVersioning.js)
versioning not configured: if specifying "null" version, should delete specific version in AWS backend::AWS backend delete multiple objects w. versioning: using object location constraint With default signature versioning not configured: if specifying "null" version, should delete specific version in AWS backend
Stack Traces | 120s run time
Timeout of 120000ms exceeded. For async tests and hooks, ensure "done()" is called; if returning a Promise, ensure it resolves. (.../multipleBackend/delete/deleteAwsVersioning.js)
should get tags for an object even if it was deleted from AWS directly (we rely on s3 metadata)::AWS backend object put/get tagging with versioning With v4 signature should get tags for an object even if it was deleted from AWS directly (we rely on s3 metadata)
Stack Traces | 120s run time
Timeout of 120000ms exceeded. For async tests and hooks, ensure "done()" is called; if returning a Promise, ensure it resolves. (.../multipleBackend/objectTagging/taggingAwsVersioning-putget.js)
versioning enabled: should delete a specific version in AWS backend successfully::AWS backend delete multiple objects w. versioning: using object location constraint With default signature versioning enabled: should delete a specific version in AWS backend successfully
Stack Traces | 120s run time
Timeout of 120000ms exceeded. For async tests and hooks, ensure "done()" is called; if returning a Promise, ensure it resolves. (.../multipleBackend/delete/deleteAwsVersioning.js)
versioning not configured: should put/get a tag set on the latest version if no version is specified::AWS backend object put/get tagging with versioning With v4 signature versioning not configured: should put/get a tag set on the latest version if no version is specified
Stack Traces | 120s run time
Timeout of 120000ms exceeded. For async tests and hooks, ensure "done()" is called; if returning a Promise, ensure it resolves. (.../multipleBackend/objectTagging/taggingAwsVersioning-putget.js)
versioning not configured: should put/get a tag set on the latest version if no version is specified::AWS backend object put/get tagging with versioning With default signature versioning not configured: should put/get a tag set on the latest version if no version is specified
Stack Traces | 120s run time
Timeout of 120000ms exceeded. For async tests and hooks, ensure "done()" is called; if returning a Promise, ensure it resolves. (.../multipleBackend/objectTagging/taggingAwsVersioning-putget.js)
should return an ServiceUnavailable if trying to put tags on version that was deleted from AWS directly::AWS backend object put/get tagging with versioning With v4 signature should return an ServiceUnavailable if trying to put tags on version that was deleted from AWS directly
Stack Traces | 120s run time
Timeout of 120000ms exceeded. For async tests and hooks, ensure "done()" is called; if returning a Promise, ensure it resolves. (.../multipleBackend/objectTagging/taggingAwsVersioning-putget.js)
multiple delete markers: should be able to get pre-existing versions after creating and deleting several delete markers::AWS backend delete object w. versioning: using object location constraint With default signature multiple delete markers: should be able to get pre-existing versions after creating and deleting several delete markers
Stack Traces | 120s run time
Timeout of 120000ms exceeded. For async tests and hooks, ensure "done()" is called; if returning a Promise, ensure it resolves. (.../multipleBackend/delete/deleteAwsVersioning.js)
versioning suspended: should create a delete marker in s3 and aws successfully when deleting existing object::AWS backend delete object w. versioning: using object location constraint With default signature versioning suspended: should create a delete marker in s3 and aws successfully when deleting existing object
Stack Traces | 120s run time
Timeout of 120000ms exceeded. For async tests and hooks, ensure "done()" is called; if returning a Promise, ensure it resolves. (.../multipleBackend/delete/deleteAwsVersioning.js)
versioning enabled: should delete a delete marker in s3 and aws successfully::AWS backend delete object w. versioning: using object location constraint With default signature versioning enabled: should delete a delete marker in s3 and aws successfully
Stack Traces | 120s run time
Timeout of 120000ms exceeded. For async tests and hooks, ensure "done()" is called; if returning a Promise, ensure it resolves. (.../multipleBackend/delete/deleteAwsVersioning.js)
multiple delete markers: should get NoSuchObject if only one of the delete markers is deleted::AWS backend delete object w. versioning: using object location constraint With v4 signature multiple delete markers: should get NoSuchObject if only one of the delete markers is deleted
Stack Traces | 120s run time
Timeout of 120000ms exceeded. For async tests and hooks, ensure "done()" is called; if returning a Promise, ensure it resolves. (.../multipleBackend/delete/deleteAwsVersioning.js)
versioning enabled then suspended: should put/get a tag set on a specific (non-null) version if specified::AWS backend object put/get tagging with versioning With default signature versioning enabled then suspended: should put/get a tag set on a specific (non-null) version if specified
Stack Traces | 120s run time
Timeout of 120000ms exceeded. For async tests and hooks, ensure "done()" is called; if returning a Promise, ensure it resolves. (.../multipleBackend/objectTagging/taggingAwsVersioning-putget.js)
versioning suspended then enabled: should put/get a tag set on a specific version (null) if specified::AWS backend object put/get tagging with versioning With v4 signature versioning suspended then enabled: should put/get a tag set on a specific version (null) if specified
Stack Traces | 120s run time
Timeout of 120000ms exceeded. For async tests and hooks, ensure "done()" is called; if returning a Promise, ensure it resolves. (.../multipleBackend/objectTagging/taggingAwsVersioning-putget.js)
should get tags for an version even if it was deleted from AWS directly (we rely on s3 metadata)::AWS backend object put/get tagging with versioning With v4 signature should get tags for an version even if it was deleted from AWS directly (we rely on s3 metadata)
Stack Traces | 120s run time
Timeout of 120000ms exceeded. For async tests and hooks, ensure "done()" is called; if returning a Promise, ensure it resolves. (.../multipleBackend/objectTagging/taggingAwsVersioning-putget.js)
versioning enabled: should put/get a tag set on the latest version if no version is specified::AWS backend object put/get tagging with versioning With v4 signature versioning enabled: should put/get a tag set on the latest version if no version is specified
Stack Traces | 120s run time
Timeout of 120000ms exceeded. For async tests and hooks, ensure "done()" is called; if returning a Promise, ensure it resolves. (.../multipleBackend/objectTagging/taggingAwsVersioning-putget.js)
versioning suspended: creating a delete marker will overwrite an existing null version that is the latest version in s3 metadata, but the data of the first null version will remain in AWS::AWS backend delete object w. versioning: using object location constraint With v4 signature versioning suspended: creating a delete marker will overwrite an existing null version that is the latest version in s3 metadata, but the data of the first null version will remain in AWS
Stack Traces | 120s run time
Timeout of 120000ms exceeded. For async tests and hooks, ensure "done()" is called; if returning a Promise, ensure it resolves. (.../multipleBackend/delete/deleteAwsVersioning.js)
should get the new latest version after deleting the latestspecific version::AWS backend delete object w. versioning: using object location constraint With v4 signature should get the new latest version after deleting the latestspecific version
Stack Traces | 120s run time
Timeout of 120000ms exceeded. For async tests and hooks, ensure "done()" is called; if returning a Promise, ensure it resolves. (.../multipleBackend/delete/deleteAwsVersioning.js)
versioning enabled: should create a delete marker in s3 and aws successfully when deleting non-existing object::AWS backend delete object w. versioning: using bucket location constraint With default signature versioning enabled: should create a delete marker in s3 and aws successfully when deleting non-existing object
Stack Traces | 120s run time
Timeout of 120000ms exceeded. For async tests and hooks, ensure "done()" is called; if returning a Promise, ensure it resolves. (.../multipleBackend/delete/deleteAwsVersioning.js)
versioning suspended: creating a delete marker will overwrite an existing null version that is not the latest version in s3 metadata, but the data of the first null version will remain in AWS::AWS backend delete object w. versioning: using object location constraint With default signature versioning suspended: creating a delete marker will overwrite an existing null version that is not the latest version in s3 metadata, but the data of the first null version will remain in AWS
Stack Traces | 120s run time
Timeout of 120000ms exceeded. For async tests and hooks, ensure "done()" is called; if returning a Promise, ensure it resolves. (.../multipleBackend/delete/deleteAwsVersioning.js)
versioning not configured: deleting existing object should not return version id or x-amz-delete-marker: true but should create a delete marker in aws ::AWS backend delete object w. versioning: using object location constraint With v4 signature versioning not configured: deleting existing object should not return version id or x-amz-delete-marker: true but should create a delete marker in aws 
Stack Traces | 120s run time
Timeout of 120000ms exceeded. For async tests and hooks, ensure "done()" is called; if returning a Promise, ensure it resolves. (.../multipleBackend/delete/deleteAwsVersioning.js)
versioning not configured: if specifying "null" version, should delete specific version in AWS backend::AWS backend delete object w. versioning: using object location constraint With default signature versioning not configured: if specifying "null" version, should delete specific version in AWS backend
Stack Traces | 120s run time
Timeout of 120000ms exceeded. For async tests and hooks, ensure "done()" is called; if returning a Promise, ensure it resolves. (.../multipleBackend/delete/deleteAwsVersioning.js)
versioning enabled: should create a delete marker in s3 and aws successfully when deleting non-existing object::AWS backend delete object w. versioning: using bucket location constraint With v4 signature versioning enabled: should create a delete marker in s3 and aws successfully when deleting non-existing object
Stack Traces | 120s run time
Timeout of 120000ms exceeded. For async tests and hooks, ensure "done()" is called; if returning a Promise, ensure it resolves. (.../multipleBackend/delete/deleteAwsVersioning.js)
versioning enabled: should delete a specific version in AWS backend successfully::AWS backend delete multiple objects w. versioning: using object location constraint With v4 signature versioning enabled: should delete a specific version in AWS backend successfully
Stack Traces | 120s run time
Timeout of 120000ms exceeded. For async tests and hooks, ensure "done()" is called; if returning a Promise, ensure it resolves. (.../multipleBackend/delete/deleteAwsVersioning.js)
versioning enabled: should put/get a tag set on a specific version that is not the latest version::AWS backend object put/get tagging with versioning With default signature versioning enabled: should put/get a tag set on a specific version that is not the latest version
Stack Traces | 120s run time
Timeout of 120000ms exceeded. For async tests and hooks, ensure "done()" is called; if returning a Promise, ensure it resolves. (.../multipleBackend/objectTagging/taggingAwsVersioning-putget.js)
versioning enabled: should put/get a tag set on a specific version::AWS backend object put/get tagging with versioning With v4 signature versioning enabled: should put/get a tag set on a specific version
Stack Traces | 120s run time
Timeout of 120000ms exceeded. For async tests and hooks, ensure "done()" is called; if returning a Promise, ensure it resolves. (.../multipleBackend/objectTagging/taggingAwsVersioning-putget.js)
versioning suspended: should put/get a tag set on the latest version if no version is specified::AWS backend object put/get tagging with versioning With default signature versioning suspended: should put/get a tag set on the latest version if no version is specified
Stack Traces | 120s run time
Timeout of 120000ms exceeded. For async tests and hooks, ensure "done()" is called; if returning a Promise, ensure it resolves. (.../multipleBackend/objectTagging/taggingAwsVersioning-putget.js)
versioning not configured: deleting existing object should not return version id or x-amz-delete-marker: true but should create a delete marker in aws ::AWS backend delete object w. versioning: using object location constraint With default signature versioning not configured: deleting existing object should not return version id or x-amz-delete-marker: true but should create a delete marker in aws 
Stack Traces | 120s run time
Timeout of 120000ms exceeded. For async tests and hooks, ensure "done()" is called; if returning a Promise, ensure it resolves. (.../multipleBackend/delete/deleteAwsVersioning.js)
versioning not configured: specifying any version id other than null should not result in its deletion in AWS backend::AWS backend delete object w. versioning: using object location constraint With default signature versioning not configured: specifying any version id other than null should not result in its deletion in AWS backend
Stack Traces | 120s run time
Timeout of 120000ms exceeded. For async tests and hooks, ensure "done()" is called; if returning a Promise, ensure it resolves. (.../multipleBackend/delete/deleteAwsVersioning.js)
versioning suspended: should put/get a tag set on the latest version if no version is specified::AWS backend object put/get tagging with versioning With v4 signature versioning suspended: should put/get a tag set on the latest version if no version is specified
Stack Traces | 120s run time
Timeout of 120000ms exceeded. For async tests and hooks, ensure "done()" is called; if returning a Promise, ensure it resolves. (.../multipleBackend/objectTagging/taggingAwsVersioning-putget.js)
versioning not configured: specifying any version id other than null should not result in its deletion in AWS backend::AWS backend delete object w. versioning: using object location constraint With v4 signature versioning not configured: specifying any version id other than null should not result in its deletion in AWS backend
Stack Traces | 120s run time
Timeout of 120000ms exceeded. For async tests and hooks, ensure "done()" is called; if returning a Promise, ensure it resolves. (.../multipleBackend/delete/deleteAwsVersioning.js)
versioning suspended: should delete a specific version in AWS backend successfully::AWS backend delete object w. versioning: using object location constraint With default signature versioning suspended: should delete a specific version in AWS backend successfully
Stack Traces | 120s run time
Timeout of 120000ms exceeded. For async tests and hooks, ensure "done()" is called; if returning a Promise, ensure it resolves. (.../multipleBackend/delete/deleteAwsVersioning.js)
versioning enabled: should delete a specific version in AWS backend successfully::AWS backend delete object w. versioning: using object location constraint With v4 signature versioning enabled: should delete a specific version in AWS backend successfully
Stack Traces | 120s run time
Timeout of 120000ms exceeded. For async tests and hooks, ensure "done()" is called; if returning a Promise, ensure it resolves. (.../multipleBackend/delete/deleteAwsVersioning.js)
versioning not configured: if specifying "null" version, should delete specific version in AWS backend::AWS backend delete object w. versioning: using object location constraint With v4 signature versioning not configured: if specifying "null" version, should delete specific version in AWS backend
Stack Traces | 120s run time
Timeout of 120000ms exceeded. For async tests and hooks, ensure "done()" is called; if returning a Promise, ensure it resolves. (.../multipleBackend/delete/deleteAwsVersioning.js)
should not return an error deleting a version that was already deleted directly from AWS backend::AWS backend delete object w. versioning: using object location constraint With default signature should not return an error deleting a version that was already deleted directly from AWS backend
Stack Traces | 120s run time
Timeout of 120000ms exceeded. For async tests and hooks, ensure "done()" is called; if returning a Promise, ensure it resolves. (.../multipleBackend/delete/deleteAwsVersioning.js)
versioning suspended then enabled: should put/get a tag set on a specific version (null) if specified::AWS backend object put/get tagging with versioning With default signature versioning suspended then enabled: should put/get a tag set on a specific version (null) if specified
Stack Traces | 120s run time
Timeout of 120000ms exceeded. For async tests and hooks, ensure "done()" is called; if returning a Promise, ensure it resolves. (.../multipleBackend/objectTagging/taggingAwsVersioning-putget.js)
should get the new latest version after deleting the latestspecific version::AWS backend delete object w. versioning: using object location constraint With default signature should get the new latest version after deleting the latestspecific version
Stack Traces | 120s run time
Timeout of 120000ms exceeded. For async tests and hooks, ensure "done()" is called; if returning a Promise, ensure it resolves. (.../multipleBackend/delete/deleteAwsVersioning.js)
versioning enabled: should put/get a tag set on the latest version if no version is specified::AWS backend object put/get tagging with versioning With default signature versioning enabled: should put/get a tag set on the latest version if no version is specified
Stack Traces | 120s run time
Timeout of 120000ms exceeded. For async tests and hooks, ensure "done()" is called; if returning a Promise, ensure it resolves. (.../multipleBackend/objectTagging/taggingAwsVersioning-putget.js)
should not return an error deleting a version that was already deleted directly from AWS backend::AWS backend delete object w. versioning: using object location constraint With v4 signature should not return an error deleting a version that was already deleted directly from AWS backend
Stack Traces | 120s run time
Timeout of 120000ms exceeded. For async tests and hooks, ensure "done()" is called; if returning a Promise, ensure it resolves. (.../multipleBackend/delete/deleteAwsVersioning.js)
versioning suspended: creating a delete marker will overwrite an existing null version that is not the latest version in s3 metadata, but the data of the first null version will remain in AWS::AWS backend delete object w. versioning: using object location constraint With v4 signature versioning suspended: creating a delete marker will overwrite an existing null version that is not the latest version in s3 metadata, but the data of the first null version will remain in AWS
Stack Traces | 120s run time
Timeout of 120000ms exceeded. For async tests and hooks, ensure "done()" is called; if returning a Promise, ensure it resolves. (.../multipleBackend/delete/deleteAwsVersioning.js)
multiple delete markers: should get NoSuchObject if only one of the delete markers is deleted::AWS backend delete object w. versioning: using object location constraint With default signature multiple delete markers: should get NoSuchObject if only one of the delete markers is deleted
Stack Traces | 120s run time
Timeout of 120000ms exceeded. For async tests and hooks, ensure "done()" is called; if returning a Promise, ensure it resolves. (.../multipleBackend/delete/deleteAwsVersioning.js)
should get tags for an version even if it was deleted from AWS directly (we rely on s3 metadata)::AWS backend object put/get tagging with versioning With default signature should get tags for an version even if it was deleted from AWS directly (we rely on s3 metadata)
Stack Traces | 120s run time
Timeout of 120000ms exceeded. For async tests and hooks, ensure "done()" is called; if returning a Promise, ensure it resolves. (.../multipleBackend/objectTagging/taggingAwsVersioning-putget.js)
versioning enabled: should put/get a tag set on a specific version::AWS backend object put/get tagging with versioning With default signature versioning enabled: should put/get a tag set on a specific version
Stack Traces | 120s run time
Timeout of 120000ms exceeded. For async tests and hooks, ensure "done()" is called; if returning a Promise, ensure it resolves. (.../multipleBackend/objectTagging/taggingAwsVersioning-putget.js)
versioning suspended: creating a delete marker will overwrite an existing null version that is the latest version in s3 metadata, but the data of the first null version will remain in AWS::AWS backend delete object w. versioning: using object location constraint With default signature versioning suspended: creating a delete marker will overwrite an existing null version that is the latest version in s3 metadata, but the data of the first null version will remain in AWS
Stack Traces | 120s run time
Timeout of 120000ms exceeded. For async tests and hooks, ensure "done()" is called; if returning a Promise, ensure it resolves. (.../multipleBackend/delete/deleteAwsVersioning.js)
versioning not configured: should put/get a tag set on a specific version if specified (null)::AWS backend object put/get tagging with versioning With v4 signature versioning not configured: should put/get a tag set on a specific version if specified (null)
Stack Traces | 120s run time
Timeout of 120000ms exceeded. For async tests and hooks, ensure "done()" is called; if returning a Promise, ensure it resolves. (.../multipleBackend/objectTagging/taggingAwsVersioning-putget.js)
versioning suspended: should create a delete marker in s3 and aws successfully when deleting non-existing object::AWS backend delete object w. versioning: using bucket location constraint With v4 signature versioning suspended: should create a delete marker in s3 and aws successfully when deleting non-existing object
Stack Traces | 120s run time
Timeout of 120000ms exceeded. For async tests and hooks, ensure "done()" is called; if returning a Promise, ensure it resolves. (.../multipleBackend/delete/deleteAwsVersioning.js)
versioning suspended: should delete a specific version in AWS backend successfully::AWS backend delete multiple objects w. versioning: using object location constraint With default signature versioning suspended: should delete a specific version in AWS backend successfully
Stack Traces | 120s run time
Timeout of 120000ms exceeded. For async tests and hooks, ensure "done()" is called; if returning a Promise, ensure it resolves. (.../multipleBackend/delete/deleteAwsVersioning.js)
versioning suspended: should put/get a tag set on a specific version (null)::AWS backend object put/get tagging with versioning With v4 signature versioning suspended: should put/get a tag set on a specific version (null)
Stack Traces | 120s run time
Timeout of 120000ms exceeded. For async tests and hooks, ensure "done()" is called; if returning a Promise, ensure it resolves. (.../multipleBackend/objectTagging/taggingAwsVersioning-putget.js)
versioning enabled: should delete a specific version in AWS backend successfully::AWS backend delete object w. versioning: using object location constraint With default signature versioning enabled: should delete a specific version in AWS backend successfully
Stack Traces | 120s run time
Timeout of 120000ms exceeded. For async tests and hooks, ensure "done()" is called; if returning a Promise, ensure it resolves. (.../multipleBackend/delete/deleteAwsVersioning.js)
versioning suspended: should put/get a tag set on a specific version (null)::AWS backend object put/get tagging with versioning With default signature versioning suspended: should put/get a tag set on a specific version (null)
Stack Traces | 120s run time
Timeout of 120000ms exceeded. For async tests and hooks, ensure "done()" is called; if returning a Promise, ensure it resolves. (.../multipleBackend/objectTagging/taggingAwsVersioning-putget.js)
should copy an object from AWS to mem with "COPY" directive and aws location metadata::MultipleBackend object copy: AWS With default signature should copy an object from AWS to mem with "COPY" directive and aws location metadata
Stack Traces | 250s run time
Timeout of 250000ms exceeded. For async tests and hooks, ensure "done()" is called; if returning a Promise, ensure it resolves. (.../multipleBackend/objectCopy/objectCopy.js)
should copy an object from mem to AWS with encryption with REPLACE directive but no location constraint::MultipleBackend object copy: AWS With default signature should copy an object from mem to AWS with encryption with REPLACE directive but no location constraint
Stack Traces | 250s run time
Timeout of 250000ms exceeded. For async tests and hooks, ensure "done()" is called; if returning a Promise, ensure it resolves. (.../multipleBackend/objectCopy/objectCopy.js)
should copy an object from Azure to AWS relying on destination bucket location::MultipleBackend object copy: AWS With default signature should copy an object from Azure to AWS relying on destination bucket location
Stack Traces | 250s run time
Timeout of 250000ms exceeded. For async tests and hooks, ensure "done()" is called; if returning a Promise, ensure it resolves. (.../multipleBackend/objectCopy/objectCopy.js)
should copy an object from mem to AWS relying on destination bucket location::MultipleBackend object copy: AWS With default signature should copy an object from mem to AWS relying on destination bucket location
Stack Traces | 250s run time
Timeout of 250000ms exceeded. For async tests and hooks, ensure "done()" is called; if returning a Promise, ensure it resolves. (.../multipleBackend/objectCopy/objectCopy.js)
should copy a 0-byte object from mem to AWS::MultipleBackend object copy: AWS With v4 signature should copy a 0-byte object from mem to AWS
Stack Traces | 250s run time
Timeout of 250000ms exceeded. For async tests and hooks, ensure "done()" is called; if returning a Promise, ensure it resolves. (.../multipleBackend/objectCopy/objectCopy.js)
should copy an object from AWS to mem relying on destination bucket location::MultipleBackend object copy: AWS With v4 signature should copy an object from AWS to mem relying on destination bucket location
Stack Traces | 250s run time
Timeout of 250000ms exceeded. For async tests and hooks, ensure "done()" is called; if returning a Promise, ensure it resolves. (.../multipleBackend/objectCopy/objectCopy.js)
should copy an object on AWS with REPLACE::MultipleBackend object copy: AWS With v4 signature should copy an object on AWS with REPLACE
Stack Traces | 250s run time
Timeout of 250000ms exceeded. For async tests and hooks, ensure "done()" is called; if returning a Promise, ensure it resolves. (.../multipleBackend/objectCopy/objectCopy.js)
should copy an object on AWS::MultipleBackend object copy: AWS With v4 signature should copy an object on AWS
Stack Traces | 250s run time
Timeout of 250000ms exceeded. For async tests and hooks, ensure "done()" is called; if returning a Promise, ensure it resolves. (.../multipleBackend/objectCopy/objectCopy.js)
should copy an object from mem to AWS with encryption with REPLACE directive but no location constraint::MultipleBackend object copy: AWS With v4 signature should copy an object from mem to AWS with encryption with REPLACE directive but no location constraint
Stack Traces | 250s run time
Timeout of 250000ms exceeded. For async tests and hooks, ensure "done()" is called; if returning a Promise, ensure it resolves. (.../multipleBackend/objectCopy/objectCopy.js)
should copy an object from mem to AWS::MultipleBackend object copy: AWS With v4 signature should copy an object from mem to AWS
Stack Traces | 250s run time
Timeout of 250000ms exceeded. For async tests and hooks, ensure "done()" is called; if returning a Promise, ensure it resolves. (.../multipleBackend/objectCopy/objectCopy.js)
should copy an object without location contraint from mem to AWS relying on destination bucket location::MultipleBackend object copy: AWS With v4 signature should copy an object without location contraint from mem to AWS relying on destination bucket location
Stack Traces | 250s run time
Timeout of 250000ms exceeded. For async tests and hooks, ensure "done()" is called; if returning a Promise, ensure it resolves. (.../multipleBackend/objectCopy/objectCopy.js)
should copy an object without location contraint from mem to AWS relying on destination bucket location::MultipleBackend object copy: AWS With default signature should copy an object without location contraint from mem to AWS relying on destination bucket location
Stack Traces | 250s run time
Timeout of 250000ms exceeded. For async tests and hooks, ensure "done()" is called; if returning a Promise, ensure it resolves. (.../multipleBackend/objectCopy/objectCopy.js)
should copy an object from AWS to mem with encryption with REPLACE directive but no location constraint::MultipleBackend object copy: AWS With v4 signature should copy an object from AWS to mem with encryption with REPLACE directive but no location constraint
Stack Traces | 250s run time
Timeout of 250000ms exceeded. For async tests and hooks, ensure "done()" is called; if returning a Promise, ensure it resolves. (.../multipleBackend/objectCopy/objectCopy.js)
should copy a 0-byte object on AWS::MultipleBackend object copy: AWS With v4 signature should copy a 0-byte object on AWS
Stack Traces | 250s run time
Timeout of 250000ms exceeded. For async tests and hooks, ensure "done()" is called; if returning a Promise, ensure it resolves. (.../multipleBackend/objectCopy/objectCopy.js)
should copy an object from AWS to mem with "COPY" directive and aws location metadata::MultipleBackend object copy: AWS With v4 signature should copy an object from AWS to mem with "COPY" directive and aws location metadata
Stack Traces | 250s run time
Timeout of 250000ms exceeded. For async tests and hooks, ensure "done()" is called; if returning a Promise, ensure it resolves. (.../multipleBackend/objectCopy/objectCopy.js)
should copy an object from mem to AWS::MultipleBackend object copy: AWS With default signature should copy an object from mem to AWS
Stack Traces | 250s run time
Timeout of 250000ms exceeded. For async tests and hooks, ensure "done()" is called; if returning a Promise, ensure it resolves. (.../multipleBackend/objectCopy/objectCopy.js)
should copy a 0-byte object from mem to AWS::MultipleBackend object copy: AWS With default signature should copy a 0-byte object from mem to AWS
Stack Traces | 250s run time
Timeout of 250000ms exceeded. For async tests and hooks, ensure "done()" is called; if returning a Promise, ensure it resolves. (.../multipleBackend/objectCopy/objectCopy.js)
should copy an object on AWS with REPLACE::MultipleBackend object copy: AWS With default signature should copy an object on AWS with REPLACE
Stack Traces | 250s run time
Timeout of 250000ms exceeded. For async tests and hooks, ensure "done()" is called; if returning a Promise, ensure it resolves. (.../multipleBackend/objectCopy/objectCopy.js)
should copy a 0-byte object on AWS::MultipleBackend object copy: AWS With default signature should copy a 0-byte object on AWS
Stack Traces | 250s run time
Timeout of 250000ms exceeded. For async tests and hooks, ensure "done()" is called; if returning a Promise, ensure it resolves. (.../multipleBackend/objectCopy/objectCopy.js)
should copy an object from Azure to AWS relying on destination bucket location::MultipleBackend object copy: AWS With v4 signature should copy an object from Azure to AWS relying on destination bucket location
Stack Traces | 250s run time
Timeout of 250000ms exceeded. For async tests and hooks, ensure "done()" is called; if returning a Promise, ensure it resolves. (.../multipleBackend/objectCopy/objectCopy.js)
should copy an object on AWS location with bucketMatch equals false to a different AWS location with bucketMatch equals true::MultipleBackend object copy: AWS With default signature should copy an object on AWS location with bucketMatch equals false to a different AWS location with bucketMatch equals true
Stack Traces | 250s run time
Timeout of 250000ms exceeded. For async tests and hooks, ensure "done()" is called; if returning a Promise, ensure it resolves. (.../multipleBackend/objectCopy/objectCopy.js)
should copy an object on AWS::MultipleBackend object copy: AWS With default signature should copy an object on AWS
Stack Traces | 250s run time
Timeout of 250000ms exceeded. For async tests and hooks, ensure "done()" is called; if returning a Promise, ensure it resolves. (.../multipleBackend/objectCopy/objectCopy.js)
should return error if AWS source object has been deleted::MultipleBackend object copy: AWS With v4 signature should return error if AWS source object has been deleted
Stack Traces | 250s run time
Timeout of 250000ms exceeded. For async tests and hooks, ensure "done()" is called; if returning a Promise, ensure it resolves. (.../multipleBackend/objectCopy/objectCopy.js)
should copy an object from mem to AWS relying on destination bucket location::MultipleBackend object copy: AWS With v4 signature should copy an object from mem to AWS relying on destination bucket location
Stack Traces | 250s run time
Timeout of 250000ms exceeded. For async tests and hooks, ensure "done()" is called; if returning a Promise, ensure it resolves. (.../multipleBackend/objectCopy/objectCopy.js)
should return error if AWS source object has been deleted::MultipleBackend object copy: AWS With default signature should return error if AWS source object has been deleted
Stack Traces | 250s run time
Timeout of 250000ms exceeded. For async tests and hooks, ensure "done()" is called; if returning a Promise, ensure it resolves. (.../multipleBackend/objectCopy/objectCopy.js)
should copy an object from AWS to mem relying on destination bucket location::MultipleBackend object copy: AWS With default signature should copy an object from AWS to mem relying on destination bucket location
Stack Traces | 250s run time
Timeout of 250000ms exceeded. For async tests and hooks, ensure "done()" is called; if returning a Promise, ensure it resolves. (.../multipleBackend/objectCopy/objectCopy.js)
should copy an object from AWS to mem with encryption with REPLACE directive but no location constraint::MultipleBackend object copy: AWS With default signature should copy an object from AWS to mem with encryption with REPLACE directive but no location constraint
Stack Traces | 250s run time
Timeout of 250000ms exceeded. For async tests and hooks, ensure "done()" is called; if returning a Promise, ensure it resolves. (.../multipleBackend/objectCopy/objectCopy.js)
should copy an object on AWS location with bucketMatch equals false to a different AWS location with bucketMatch equals true::MultipleBackend object copy: AWS With v4 signature should copy an object on AWS location with bucketMatch equals false to a different AWS location with bucketMatch equals true
Stack Traces | 250s run time
Timeout of 250000ms exceeded. For async tests and hooks, ensure "done()" is called; if returning a Promise, ensure it resolves. (.../multipleBackend/objectCopy/objectCopy.js)
View the full list of 10 ❄️ flaky test(s)
"before all" hook for "should delete object from mem"::Multiple backend delete With default signature "before all" hook for "should delete object from mem"

Flake rate in main: 100.00% (Passed 0 times, Failed 2 times)

Stack Traces | 0.052s run time
The request has failed due to a temporary failure of the server.
"before all" hook for "should delete object from mem"::Multiple backend delete With v4 signature "before all" hook for "should delete object from mem"

Flake rate in main: 100.00% (Passed 0 times, Failed 1 times)

Stack Traces | 0.038s run time
The request has failed due to a temporary failure of the server.
"before all" hook for "should get an object from mem"::Multiple backend get object With default signature with objects in all available backends (mem/file/AWS) "before all" hook for "should get an object from mem"

Flake rate in main: 100.00% (Passed 0 times, Failed 1 times)

Stack Traces | 0.024s run time
The request has failed due to a temporary failure of the server.
"before all" hook for "should get an object from mem"::Multiple backend get object With v4 signature with objects in all available backends (mem/file/AWS) "before all" hook for "should get an object from mem"

Flake rate in main: 100.00% (Passed 0 times, Failed 1 times)

Stack Traces | 0.024s run time
The request has failed due to a temporary failure of the server.
"before each" hook for "should get an object from AWS"::Multiple backend get object With default signature with bucketMatch set to false "before each" hook for "should get an object from AWS"

Flake rate in main: 100.00% (Passed 0 times, Failed 1 times)

Stack Traces | 30s run time
Timeout of 30000ms exceeded. For async tests and hooks, ensure "done()" is called; if returning a Promise, ensure it resolves. (.../multipleBackend/acl/aclAwsVersioning.js)
"before each" hook for "should get an object from AWS"::Multiple backend get object With v4 signature with bucketMatch set to false "before each" hook for "should get an object from AWS"

Flake rate in main: 100.00% (Passed 0 times, Failed 1 times)

Stack Traces | 30s run time
Timeout of 30000ms exceeded. For async tests and hooks, ensure "done()" is called; if returning a Promise, ensure it resolves. (.../multipleBackend/acl/aclAwsVersioning.js)
"before each" hook: beforeEachFn for "should get object from MPU on AWS location with bucketMatch: false "::Multiple backend get object With default signature Complete MPU then get object on AWS location with bucketMatch: false  "before each" hook: beforeEachFn for "should get object from MPU on AWS location with bucketMatch: false "

Flake rate in main: 100.00% (Passed 0 times, Failed 1 times)

Stack Traces | 0.062s run time
Error returned from AWS: UnknownError
"before each" hook: beforeEachFn for "should get object from MPU on AWS location with bucketMatch: false "::Multiple backend get object With v4 signature Complete MPU then get object on AWS location with bucketMatch: false  "before each" hook: beforeEachFn for "should get object from MPU on AWS location with bucketMatch: false "

Flake rate in main: 100.00% (Passed 0 times, Failed 1 times)

Stack Traces | 0.063s run time
Error returned from AWS: UnknownError
"before each" hook: beforeEachFn for "should get object from MPU on AWS location with bucketMatch: true "::Multiple backend get object With default signature Complete MPU then get object on AWS location with bucketMatch: true  "before each" hook: beforeEachFn for "should get object from MPU on AWS location with bucketMatch: true "

Flake rate in main: 100.00% (Passed 0 times, Failed 1 times)

Stack Traces | 1.38s run time
Error returned from AWS: UnknownError
"before each" hook: beforeEachFn for "should get object from MPU on AWS location with bucketMatch: true "::Multiple backend get object With v4 signature Complete MPU then get object on AWS location with bucketMatch: true  "before each" hook: beforeEachFn for "should get object from MPU on AWS location with bucketMatch: true "

Flake rate in main: 100.00% (Passed 0 times, Failed 1 times)

Stack Traces | 0.07s run time
Error returned from AWS: UnknownError

To view more test analytics, go to the Test Analytics Dashboard
📋 Got 3 mins? Take this short survey to help us improve Test Analytics.

@benzekrimaha benzekrimaha force-pushed the improvement/CLDSRV-724-backbeat-related-functional-tests branch from bc63e7a to 825a9df Compare November 7, 2025 10:31
@benzekrimaha benzekrimaha force-pushed the improvement/CLDSRV-724-backbeat-related-functional-tests branch from c5c7d2d to 97c2891 Compare November 7, 2025 12:40
@benzekrimaha benzekrimaha force-pushed the improvement/CLDSRV-724-backbeat-related-functional-tests branch from b7760b6 to f928e99 Compare November 12, 2025 09:47
@benzekrimaha benzekrimaha force-pushed the improvement/CLDSRV-724-backbeat-related-functional-tests branch from 17d2fcb to 198582c Compare November 20, 2025 17:19
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants