mirror of https://github.com/restic/restic.git
225 lines
4.6 KiB
Go
225 lines
4.6 KiB
Go
package s3_test
|
|
|
|
import (
|
|
"context"
|
|
"crypto/rand"
|
|
"encoding/hex"
|
|
"fmt"
|
|
"io"
|
|
"net"
|
|
"os"
|
|
"os/exec"
|
|
"path/filepath"
|
|
"testing"
|
|
"time"
|
|
|
|
"github.com/restic/restic/internal/backend/s3"
|
|
"github.com/restic/restic/internal/backend/test"
|
|
"github.com/restic/restic/internal/options"
|
|
rtest "github.com/restic/restic/internal/test"
|
|
)
|
|
|
|
func mkdir(t testing.TB, dir string) {
|
|
err := os.MkdirAll(dir, 0700)
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
}
|
|
|
|
func runMinio(ctx context.Context, t testing.TB, dir, key, secret string) func() {
|
|
mkdir(t, filepath.Join(dir, "config"))
|
|
mkdir(t, filepath.Join(dir, "root"))
|
|
|
|
cmd := exec.CommandContext(ctx, "minio",
|
|
"server",
|
|
"--address", "127.0.0.1:9000",
|
|
"--config-dir", filepath.Join(dir, "config"),
|
|
filepath.Join(dir, "root"))
|
|
cmd.Env = append(os.Environ(),
|
|
"MINIO_ACCESS_KEY="+key,
|
|
"MINIO_SECRET_KEY="+secret,
|
|
)
|
|
cmd.Stderr = os.Stderr
|
|
|
|
err := cmd.Start()
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
|
|
// wait until the TCP port is reachable
|
|
var success bool
|
|
for i := 0; i < 100; i++ {
|
|
time.Sleep(200 * time.Millisecond)
|
|
|
|
c, err := net.Dial("tcp", "localhost:9000")
|
|
if err == nil {
|
|
success = true
|
|
if err := c.Close(); err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
break
|
|
}
|
|
}
|
|
|
|
if !success {
|
|
t.Fatal("unable to connect to minio server")
|
|
return nil
|
|
}
|
|
|
|
return func() {
|
|
err = cmd.Process.Kill()
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
|
|
// ignore errors, we've killed the process
|
|
_ = cmd.Wait()
|
|
}
|
|
}
|
|
|
|
func newRandomCredentials(t testing.TB) (key, secret string) {
|
|
buf := make([]byte, 10)
|
|
_, err := io.ReadFull(rand.Reader, buf)
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
key = hex.EncodeToString(buf)
|
|
|
|
_, err = io.ReadFull(rand.Reader, buf)
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
secret = hex.EncodeToString(buf)
|
|
|
|
return key, secret
|
|
}
|
|
|
|
func newMinioTestSuite(ctx context.Context, t testing.TB, key string, secret string) *test.Suite[s3.Config] {
|
|
return &test.Suite[s3.Config]{
|
|
// NewConfig returns a config for a new temporary backend that will be used in tests.
|
|
NewConfig: func() (*s3.Config, error) {
|
|
cfg := s3.NewConfig()
|
|
cfg.Endpoint = "localhost:9000"
|
|
cfg.Bucket = "restictestbucket"
|
|
cfg.Prefix = fmt.Sprintf("test-%d", time.Now().UnixNano())
|
|
cfg.UseHTTP = true
|
|
cfg.KeyID = key
|
|
cfg.Secret = options.NewSecretString(secret)
|
|
return &cfg, nil
|
|
},
|
|
|
|
Factory: s3.NewFactory(),
|
|
}
|
|
}
|
|
|
|
func createMinioTestSuite(t testing.TB) (*test.Suite[s3.Config], func()) {
|
|
ctx, cancel := context.WithCancel(context.Background())
|
|
|
|
tempdir := rtest.TempDir(t)
|
|
key, secret := newRandomCredentials(t)
|
|
cleanup := runMinio(ctx, t, tempdir, key, secret)
|
|
|
|
return newMinioTestSuite(ctx, t, key, secret), func() {
|
|
defer cancel()
|
|
defer cleanup()
|
|
}
|
|
}
|
|
|
|
func TestBackendMinio(t *testing.T) {
|
|
defer func() {
|
|
if t.Skipped() {
|
|
rtest.SkipDisallowed(t, "restic/backend/s3.TestBackendMinio")
|
|
}
|
|
}()
|
|
|
|
// try to find a minio binary
|
|
_, err := exec.LookPath("minio")
|
|
if err != nil {
|
|
t.Skip(err)
|
|
return
|
|
}
|
|
|
|
suite, cleanup := createMinioTestSuite(t)
|
|
defer cleanup()
|
|
|
|
suite.RunTests(t)
|
|
}
|
|
|
|
func BenchmarkBackendMinio(t *testing.B) {
|
|
// try to find a minio binary
|
|
_, err := exec.LookPath("minio")
|
|
if err != nil {
|
|
t.Skip(err)
|
|
return
|
|
}
|
|
|
|
suite, cleanup := createMinioTestSuite(t)
|
|
defer cleanup()
|
|
|
|
suite.RunBenchmarks(t)
|
|
}
|
|
|
|
func newS3TestSuite(t testing.TB) *test.Suite[s3.Config] {
|
|
return &test.Suite[s3.Config]{
|
|
// do not use excessive data
|
|
MinimalData: true,
|
|
|
|
// NewConfig returns a config for a new temporary backend that will be used in tests.
|
|
NewConfig: func() (*s3.Config, error) {
|
|
cfg, err := s3.ParseConfig(os.Getenv("RESTIC_TEST_S3_REPOSITORY"))
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
cfg.KeyID = os.Getenv("RESTIC_TEST_S3_KEY")
|
|
cfg.Secret = options.NewSecretString(os.Getenv("RESTIC_TEST_S3_SECRET"))
|
|
cfg.Prefix = fmt.Sprintf("test-%d", time.Now().UnixNano())
|
|
return cfg, nil
|
|
},
|
|
|
|
Factory: s3.NewFactory(),
|
|
}
|
|
}
|
|
|
|
func TestBackendS3(t *testing.T) {
|
|
defer func() {
|
|
if t.Skipped() {
|
|
rtest.SkipDisallowed(t, "restic/backend/s3.TestBackendS3")
|
|
}
|
|
}()
|
|
|
|
vars := []string{
|
|
"RESTIC_TEST_S3_KEY",
|
|
"RESTIC_TEST_S3_SECRET",
|
|
"RESTIC_TEST_S3_REPOSITORY",
|
|
}
|
|
|
|
for _, v := range vars {
|
|
if os.Getenv(v) == "" {
|
|
t.Skipf("environment variable %v not set", v)
|
|
return
|
|
}
|
|
}
|
|
|
|
t.Logf("run tests")
|
|
newS3TestSuite(t).RunTests(t)
|
|
}
|
|
|
|
func BenchmarkBackendS3(t *testing.B) {
|
|
vars := []string{
|
|
"RESTIC_TEST_S3_KEY",
|
|
"RESTIC_TEST_S3_SECRET",
|
|
"RESTIC_TEST_S3_REPOSITORY",
|
|
}
|
|
|
|
for _, v := range vars {
|
|
if os.Getenv(v) == "" {
|
|
t.Skipf("environment variable %v not set", v)
|
|
return
|
|
}
|
|
}
|
|
|
|
t.Logf("run tests")
|
|
newS3TestSuite(t).RunBenchmarks(t)
|
|
}
|