restic/internal/backend/s3/s3_test.go

225 lines
4.6 KiB
Go
Raw Normal View History

2016-01-23 17:46:04 +00:00
package s3_test
2016-01-02 13:38:45 +00:00
2016-01-23 17:46:04 +00:00
import (
"context"
"crypto/rand"
"encoding/hex"
2017-05-11 20:48:46 +00:00
"fmt"
"io"
"net"
2016-01-23 17:46:04 +00:00
"os"
"os/exec"
"path/filepath"
"testing"
"time"
2017-07-23 12:21:03 +00:00
"github.com/restic/restic/internal/backend/s3"
"github.com/restic/restic/internal/backend/test"
"github.com/restic/restic/internal/options"
2017-10-02 13:06:39 +00:00
rtest "github.com/restic/restic/internal/test"
2016-01-23 17:46:04 +00:00
)
2016-01-02 13:38:45 +00:00
func mkdir(t testing.TB, dir string) {
err := os.MkdirAll(dir, 0700)
if err != nil {
t.Fatal(err)
2016-01-23 17:46:04 +00:00
}
}
2016-01-23 17:46:04 +00:00
func runMinio(ctx context.Context, t testing.TB, dir, key, secret string) func() {
mkdir(t, filepath.Join(dir, "config"))
mkdir(t, filepath.Join(dir, "root"))
cmd := exec.CommandContext(ctx, "minio",
"server",
"--address", "127.0.0.1:9000",
"--config-dir", filepath.Join(dir, "config"),
filepath.Join(dir, "root"))
cmd.Env = append(os.Environ(),
"MINIO_ACCESS_KEY="+key,
"MINIO_SECRET_KEY="+secret,
)
cmd.Stderr = os.Stderr
err := cmd.Start()
2016-01-23 17:46:04 +00:00
if err != nil {
t.Fatal(err)
2016-01-23 17:46:04 +00:00
}
// wait until the TCP port is reachable
var success bool
for i := 0; i < 100; i++ {
time.Sleep(200 * time.Millisecond)
c, err := net.Dial("tcp", "localhost:9000")
if err == nil {
success = true
if err := c.Close(); err != nil {
t.Fatal(err)
}
break
}
2016-01-23 17:46:04 +00:00
}
if !success {
t.Fatal("unable to connect to minio server")
return nil
2016-01-23 17:46:04 +00:00
}
return func() {
err = cmd.Process.Kill()
2016-01-23 17:46:04 +00:00
if err != nil {
t.Fatal(err)
2016-01-23 17:46:04 +00:00
}
// ignore errors, we've killed the process
_ = cmd.Wait()
}
}
2016-01-23 17:46:04 +00:00
2017-05-13 19:44:19 +00:00
func newRandomCredentials(t testing.TB) (key, secret string) {
buf := make([]byte, 10)
_, err := io.ReadFull(rand.Reader, buf)
if err != nil {
t.Fatal(err)
}
key = hex.EncodeToString(buf)
2016-01-23 17:46:04 +00:00
_, err = io.ReadFull(rand.Reader, buf)
if err != nil {
t.Fatal(err)
}
secret = hex.EncodeToString(buf)
2016-01-23 17:46:04 +00:00
return key, secret
}
func newMinioTestSuite(ctx context.Context, t testing.TB, key string, secret string) *test.Suite[s3.Config] {
return &test.Suite[s3.Config]{
// NewConfig returns a config for a new temporary backend that will be used in tests.
NewConfig: func() (*s3.Config, error) {
cfg := s3.NewConfig()
cfg.Endpoint = "localhost:9000"
cfg.Bucket = "restictestbucket"
cfg.Prefix = fmt.Sprintf("test-%d", time.Now().UnixNano())
cfg.UseHTTP = true
cfg.KeyID = key
cfg.Secret = options.NewSecretString(secret)
return &cfg, nil
},
Factory: s3.NewFactory(),
}
}
func createMinioTestSuite(t testing.TB) (*test.Suite[s3.Config], func()) {
ctx, cancel := context.WithCancel(context.Background())
tempdir := rtest.TempDir(t)
key, secret := newRandomCredentials(t)
cleanup := runMinio(ctx, t, tempdir, key, secret)
return newMinioTestSuite(ctx, t, key, secret), func() {
defer cancel()
defer cleanup()
}
2016-01-02 13:38:45 +00:00
}
2017-05-11 20:38:25 +00:00
2017-05-13 19:44:19 +00:00
func TestBackendMinio(t *testing.T) {
defer func() {
if t.Skipped() {
2017-10-02 13:06:39 +00:00
rtest.SkipDisallowed(t, "restic/backend/s3.TestBackendMinio")
}
}()
2017-05-13 19:44:19 +00:00
// try to find a minio binary
_, err := exec.LookPath("minio")
if err != nil {
t.Skip(err)
return
2017-05-11 20:38:25 +00:00
}
suite, cleanup := createMinioTestSuite(t)
defer cleanup()
2017-05-13 19:44:19 +00:00
suite.RunTests(t)
2017-05-13 19:44:19 +00:00
}
func BenchmarkBackendMinio(t *testing.B) {
// try to find a minio binary
_, err := exec.LookPath("minio")
if err != nil {
t.Skip(err)
return
2017-05-11 20:38:25 +00:00
}
suite, cleanup := createMinioTestSuite(t)
defer cleanup()
2017-05-13 19:44:19 +00:00
suite.RunBenchmarks(t)
2017-05-13 19:44:19 +00:00
}
func newS3TestSuite(t testing.TB) *test.Suite[s3.Config] {
return &test.Suite[s3.Config]{
2017-05-11 20:38:25 +00:00
// do not use excessive data
MinimalData: true,
// NewConfig returns a config for a new temporary backend that will be used in tests.
NewConfig: func() (*s3.Config, error) {
cfg, err := s3.ParseConfig(os.Getenv("RESTIC_TEST_S3_REPOSITORY"))
2017-05-11 20:38:25 +00:00
if err != nil {
return nil, err
2017-05-11 20:38:25 +00:00
}
cfg.KeyID = os.Getenv("RESTIC_TEST_S3_KEY")
cfg.Secret = options.NewSecretString(os.Getenv("RESTIC_TEST_S3_SECRET"))
2017-05-11 20:48:46 +00:00
cfg.Prefix = fmt.Sprintf("test-%d", time.Now().UnixNano())
2017-05-11 20:38:25 +00:00
return cfg, nil
},
Factory: s3.NewFactory(),
2017-05-11 20:38:25 +00:00
}
2017-05-13 19:44:19 +00:00
}
func TestBackendS3(t *testing.T) {
defer func() {
if t.Skipped() {
2017-10-02 13:06:39 +00:00
rtest.SkipDisallowed(t, "restic/backend/s3.TestBackendS3")
2017-05-13 19:44:19 +00:00
}
}()
vars := []string{
"RESTIC_TEST_S3_KEY",
"RESTIC_TEST_S3_SECRET",
"RESTIC_TEST_S3_REPOSITORY",
}
for _, v := range vars {
if os.Getenv(v) == "" {
t.Skipf("environment variable %v not set", v)
return
}
}
t.Logf("run tests")
newS3TestSuite(t).RunTests(t)
}
func BenchmarkBackendS3(t *testing.B) {
vars := []string{
"RESTIC_TEST_S3_KEY",
"RESTIC_TEST_S3_SECRET",
"RESTIC_TEST_S3_REPOSITORY",
}
for _, v := range vars {
if os.Getenv(v) == "" {
t.Skipf("environment variable %v not set", v)
return
}
}
2017-05-11 20:38:25 +00:00
t.Logf("run tests")
2017-05-13 19:44:19 +00:00
newS3TestSuite(t).RunBenchmarks(t)
2017-05-11 20:38:25 +00:00
}