[FEAT MERGE]Added object storage COS as the backup destination
This commit is contained in:
@ -1,4 +1,5 @@
|
||||
storage_unittest(test_backup_path)
|
||||
storage_unittest(test_backup_struct)
|
||||
storage_unittest(test_log_archive_backup_info_mgr)
|
||||
storage_unittest(test_archive_checkpoint_mgr)
|
||||
storage_unittest(test_backup_access_cos)
|
||||
storage_unittest(test_archive_checkpoint_mgr)
|
||||
|
||||
326
unittest/share/backup/test_backup_access_cos.cpp
Normal file
326
unittest/share/backup/test_backup_access_cos.cpp
Normal file
@ -0,0 +1,326 @@
|
||||
/**
|
||||
* Copyright (c) 2021 OceanBase
|
||||
* OceanBase CE is licensed under Mulan PubL v2.
|
||||
* You can use this software according to the terms and conditions of the Mulan PubL v2.
|
||||
* You may obtain a copy of Mulan PubL v2 at:
|
||||
* http://license.coscl.org.cn/MulanPubL-2.0
|
||||
* THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND,
|
||||
* EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT,
|
||||
* MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE.
|
||||
* See the Mulan PubL v2 for more details.
|
||||
*/
|
||||
|
||||
#include <gtest/gtest.h>
|
||||
#include "lib/utility/ob_test_util.h"
|
||||
#include "lib/restore/ob_storage.h"
|
||||
#include "lib/restore/ob_storage_cos_base.h"
|
||||
#include "lib/allocator/page_arena.h"
|
||||
#include "share/backup/ob_backup_io_adapter.h"
|
||||
#include "test_backup_access_cos.h"
|
||||
|
||||
using namespace oceanbase::common;
|
||||
|
||||
class TestStorageCosCommon {
|
||||
public:
|
||||
TestStorageCosCommon() {}
|
||||
~TestStorageCosCommon() {}
|
||||
|
||||
void init()
|
||||
{
|
||||
// ObDeviceManager will init env in first call
|
||||
// init_cos_env();
|
||||
|
||||
ASSERT_EQ(OB_SUCCESS,
|
||||
databuff_printf(account, sizeof(account),
|
||||
"host=%s&access_id=%s&access_key=%s&appid=%s",
|
||||
endpoint, secretid, secretkey, appid));
|
||||
//build cos_base
|
||||
const ObString cos_storage_info(account);
|
||||
ASSERT_EQ(OB_SUCCESS, cos_base.set(ObStorageType::OB_STORAGE_COS, cos_storage_info.ptr()));
|
||||
}
|
||||
void destory()
|
||||
{
|
||||
// fin_cos_env();
|
||||
}
|
||||
protected:
|
||||
char account[OB_MAX_URI_LENGTH];
|
||||
const char *dir_name = "test_backup_io_adapter_access_cos_dir";
|
||||
char uri[OB_MAX_URI_LENGTH];
|
||||
char dir_uri[OB_MAX_URI_LENGTH];
|
||||
oceanbase::share::ObBackupStorageInfo cos_base;
|
||||
|
||||
int object_prefix_len = 5;
|
||||
};
|
||||
|
||||
class TestBackupIOAdapterAccessCos : public ::testing::Test, public TestStorageCosCommon
|
||||
{
|
||||
public:
|
||||
TestBackupIOAdapterAccessCos() : enable_test_(enable_test) {}
|
||||
virtual ~TestBackupIOAdapterAccessCos() {}
|
||||
virtual void SetUp()
|
||||
{
|
||||
init();
|
||||
}
|
||||
virtual void TearDown()
|
||||
{
|
||||
destory();
|
||||
}
|
||||
|
||||
static void SetUpTestCase()
|
||||
{
|
||||
}
|
||||
|
||||
static void TearDownTestCase()
|
||||
{
|
||||
}
|
||||
|
||||
private:
|
||||
// disallow copy
|
||||
DISALLOW_COPY_AND_ASSIGN(TestBackupIOAdapterAccessCos);
|
||||
protected:
|
||||
bool enable_test_;
|
||||
};
|
||||
|
||||
TEST_F(TestBackupIOAdapterAccessCos, test_basic_rw)
|
||||
{
|
||||
int ret = OB_SUCCESS;
|
||||
if (enable_test_) {
|
||||
ObBackupIoAdapter adapter;
|
||||
const char *tmp_dir = "test_basic_rw";
|
||||
const int64_t ts = ObTimeUtility::current_time();
|
||||
ASSERT_EQ(OB_SUCCESS, databuff_printf(dir_uri, sizeof(dir_uri), "%s/%s/%s_%ld",
|
||||
bucket, dir_name, tmp_dir, ts));
|
||||
|
||||
// write
|
||||
const char *write_content = "123456789ABCDEF";
|
||||
ASSERT_EQ(OB_SUCCESS, databuff_printf(uri, sizeof(uri), "%s/0", dir_uri));
|
||||
ASSERT_EQ(OB_SUCCESS,
|
||||
adapter.write_single_file(uri, &cos_base, write_content, strlen(write_content)));
|
||||
|
||||
// read
|
||||
char read_buf[100] = {0};
|
||||
int64_t read_size = 0;
|
||||
ASSERT_EQ(OB_SUCCESS,
|
||||
adapter.read_single_file(uri, &cos_base, read_buf, sizeof(read_buf), read_size));
|
||||
ASSERT_STREQ(write_content, read_buf);
|
||||
ASSERT_EQ(strlen(write_content), read_size);
|
||||
|
||||
ASSERT_EQ(OB_SUCCESS,
|
||||
adapter.read_part_file(uri, &cos_base, read_buf, sizeof(read_buf), 0, read_size));
|
||||
ASSERT_STREQ(write_content, read_buf);
|
||||
ASSERT_EQ(strlen(write_content), read_size);
|
||||
|
||||
int64_t offset = 5;
|
||||
ASSERT_EQ(OB_SUCCESS,
|
||||
adapter.read_part_file(uri, &cos_base, read_buf, sizeof(read_buf), offset, read_size));
|
||||
ASSERT_EQ('6', read_buf[0]);
|
||||
ASSERT_EQ('F', read_buf[9]);
|
||||
ASSERT_EQ(strlen(write_content) - offset, read_size);
|
||||
|
||||
offset = 6;
|
||||
ASSERT_EQ(OB_SUCCESS,
|
||||
adapter.read_part_file(uri, &cos_base, read_buf, 5, offset, read_size));
|
||||
ASSERT_EQ('7', read_buf[0]);
|
||||
ASSERT_EQ('B', read_buf[4]);
|
||||
ASSERT_EQ(5, read_size);
|
||||
|
||||
offset = strlen(write_content);
|
||||
ASSERT_EQ(OB_COS_ERROR,
|
||||
adapter.read_part_file(uri, &cos_base, read_buf, sizeof(read_buf), offset, read_size));
|
||||
|
||||
ASSERT_EQ(OB_SUCCESS, adapter.del_file(uri, &cos_base));
|
||||
}
|
||||
}
|
||||
|
||||
TEST_F(TestBackupIOAdapterAccessCos, test_util)
|
||||
{
|
||||
int ret = OB_SUCCESS;
|
||||
if (enable_test_) {
|
||||
ObBackupIoAdapter adapter;
|
||||
const char *tmp_dir = "test_util";
|
||||
const int64_t ts = ObTimeUtility::current_time();
|
||||
ASSERT_EQ(OB_SUCCESS, databuff_printf(dir_uri, sizeof(dir_uri), "%s/%s/%s_%ld",
|
||||
bucket, dir_name, tmp_dir, ts));
|
||||
ASSERT_EQ(OB_SUCCESS, databuff_printf(uri, sizeof(uri), "%s/0", dir_uri));
|
||||
|
||||
bool is_obj_exist = true;
|
||||
ASSERT_EQ(OB_SUCCESS, adapter.is_exist(uri, &cos_base, is_obj_exist));
|
||||
ASSERT_FALSE(is_obj_exist);
|
||||
|
||||
const char *write_content = "123456789ABCDEF";
|
||||
ASSERT_EQ(OB_SUCCESS,
|
||||
adapter.write_single_file(uri, &cos_base, write_content, strlen(write_content)));
|
||||
ASSERT_EQ(OB_SUCCESS, adapter.is_exist(uri, &cos_base, is_obj_exist));
|
||||
ASSERT_TRUE(is_obj_exist);
|
||||
|
||||
int64_t file_length = -1;
|
||||
ASSERT_EQ(OB_SUCCESS, adapter.get_file_length(uri, &cos_base, file_length));
|
||||
ASSERT_EQ(strlen(write_content), file_length);
|
||||
|
||||
ASSERT_EQ(OB_SUCCESS, adapter.del_file(uri, &cos_base));
|
||||
ASSERT_EQ(OB_SUCCESS, adapter.is_exist(uri, &cos_base, is_obj_exist));
|
||||
ASSERT_FALSE(is_obj_exist);
|
||||
}
|
||||
}
|
||||
|
||||
TEST_F(TestBackupIOAdapterAccessCos, test_list_files)
|
||||
{
|
||||
int ret = OB_SUCCESS;
|
||||
if (enable_test_) {
|
||||
ObBackupIoAdapter adapter;
|
||||
const char *tmp_dir = "test_list_files";
|
||||
const int64_t ts = ObTimeUtility::current_time();
|
||||
ASSERT_EQ(OB_SUCCESS, databuff_printf(dir_uri, sizeof(dir_uri), "%s/%s/%s_%ld",
|
||||
bucket, dir_name, tmp_dir, ts));
|
||||
|
||||
int64_t file_num = 1001;
|
||||
const char *write_content = "0123456789";
|
||||
const char *format = "%s/%0*ld_%ld";
|
||||
for (int64_t file_idx = 0; file_idx < file_num; file_idx++) {
|
||||
ASSERT_EQ(OB_SUCCESS,
|
||||
databuff_printf(uri, sizeof(uri), format, dir_uri, object_prefix_len, file_idx, file_idx));
|
||||
ASSERT_EQ(OB_SUCCESS,
|
||||
adapter.write_single_file(uri, &cos_base, write_content, strlen(write_content)));
|
||||
}
|
||||
|
||||
ObArenaAllocator allocator;
|
||||
ObArray<ObString> name_array;
|
||||
ObFileListArrayOp op(name_array, allocator);
|
||||
ASSERT_EQ(OB_SUCCESS, adapter.list_files(dir_uri, &cos_base, op));
|
||||
ASSERT_EQ(file_num, name_array.size());
|
||||
for (int64_t file_idx = 0; file_idx < file_num; file_idx++) {
|
||||
// listed files do not contain prefix
|
||||
ASSERT_EQ(OB_SUCCESS,
|
||||
databuff_printf(uri, sizeof(uri), "%0*ld_%ld", object_prefix_len, file_idx, file_idx));
|
||||
ASSERT_STREQ(uri, name_array[file_idx].ptr());
|
||||
ASSERT_EQ(OB_SUCCESS,
|
||||
databuff_printf(uri, sizeof(uri), format, dir_uri, object_prefix_len, file_idx, file_idx));
|
||||
ASSERT_EQ(OB_SUCCESS, adapter.del_file(uri, &cos_base));
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
TEST_F(TestBackupIOAdapterAccessCos, test_list_directories)
|
||||
{
|
||||
int ret = OB_SUCCESS;
|
||||
if (enable_test_) {
|
||||
ObBackupIoAdapter adapter;
|
||||
const char *tmp_dir = "test_list_directories";
|
||||
const int64_t ts = ObTimeUtility::current_time();
|
||||
ASSERT_EQ(OB_SUCCESS, databuff_printf(dir_uri, sizeof(dir_uri), "%s/%s/%s_%ld",
|
||||
bucket, dir_name, tmp_dir, ts));
|
||||
|
||||
int64_t file_num = 1001;
|
||||
const char *write_content = "0123456789";
|
||||
const char *format = "%s/%0*ld/%ld";
|
||||
for (int64_t file_idx = 0; file_idx < file_num; file_idx++) {
|
||||
ASSERT_EQ(OB_SUCCESS,
|
||||
databuff_printf(uri, sizeof(uri), format, dir_uri, object_prefix_len, file_idx, file_idx));
|
||||
ASSERT_EQ(OB_SUCCESS,
|
||||
adapter.write_single_file(uri, &cos_base, write_content, strlen(write_content)));
|
||||
}
|
||||
|
||||
ObArenaAllocator allocator;
|
||||
ObArray<ObString> name_array;
|
||||
ObFileListArrayOp op(name_array, allocator);
|
||||
ASSERT_EQ(OB_SUCCESS, adapter.list_directories(dir_uri, &cos_base, op));
|
||||
ASSERT_EQ(file_num, name_array.size());
|
||||
for (int64_t file_idx = 0; file_idx < file_num; file_idx++) {
|
||||
// listed files do not contain prefix
|
||||
ASSERT_EQ(OB_SUCCESS, databuff_printf(uri, sizeof(uri), "%0*ld", object_prefix_len, file_idx));
|
||||
ASSERT_STREQ(uri, name_array[file_idx].ptr());
|
||||
ASSERT_EQ(OB_SUCCESS,
|
||||
databuff_printf(uri, sizeof(uri), format, dir_uri, object_prefix_len, file_idx, file_idx));
|
||||
ASSERT_EQ(OB_SUCCESS, adapter.del_file(uri, &cos_base));
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
TEST_F(TestBackupIOAdapterAccessCos, test_is_tagging)
|
||||
{
|
||||
int ret = OB_SUCCESS;
|
||||
if (enable_test_) {
|
||||
ObBackupIoAdapter adapter;
|
||||
const char *tmp_util_dir = "test_util_is_tagging";
|
||||
const int64_t ts = ObTimeUtility::current_time();
|
||||
ASSERT_EQ(OB_SUCCESS, databuff_printf(dir_uri, sizeof(dir_uri), "%s/%s/%s_%ld",
|
||||
bucket, dir_name, tmp_util_dir, ts));
|
||||
|
||||
bool is_tagging = true;
|
||||
char tmp_account[OB_MAX_URI_LENGTH];
|
||||
oceanbase::share::ObBackupStorageInfo tmp_cos_base;
|
||||
const char *write_content = "123456789ABCDEF";
|
||||
|
||||
// wrong tag mode
|
||||
ASSERT_EQ(OB_SUCCESS,
|
||||
databuff_printf(tmp_account, sizeof(tmp_account),
|
||||
"host=%s&access_id=%s&access_key=%s&appid=%s&delete_mode=tag",
|
||||
endpoint, secretid, secretkey, appid));
|
||||
ASSERT_EQ(OB_INVALID_ARGUMENT, tmp_cos_base.set(ObStorageType::OB_STORAGE_COS, tmp_account));
|
||||
tmp_cos_base.reset();
|
||||
|
||||
ASSERT_EQ(OB_SUCCESS,
|
||||
databuff_printf(tmp_account, sizeof(tmp_account),
|
||||
"host=%s&access_id=%s&access_key=%s&appid=%s&delete_mode=delete_delete",
|
||||
endpoint, secretid, secretkey, appid));
|
||||
ASSERT_EQ(OB_INVALID_ARGUMENT, tmp_cos_base.set(ObStorageType::OB_STORAGE_COS, tmp_account));
|
||||
tmp_cos_base.reset();
|
||||
|
||||
// delete mode
|
||||
ASSERT_EQ(OB_SUCCESS,
|
||||
databuff_printf(tmp_account, sizeof(tmp_account),
|
||||
"host=%s&access_id=%s&access_key=%s&appid=%s&delete_mode=delete",
|
||||
endpoint, secretid, secretkey, appid));
|
||||
ASSERT_EQ(OB_SUCCESS, tmp_cos_base.set(ObStorageType::OB_STORAGE_COS, tmp_account));
|
||||
|
||||
ASSERT_EQ(OB_SUCCESS, databuff_printf(uri, sizeof(uri), "%s/delete_mode", dir_uri));
|
||||
ASSERT_EQ(OB_SUCCESS,
|
||||
adapter.write_single_file(uri, &tmp_cos_base, write_content, strlen(write_content)));
|
||||
ASSERT_EQ(OB_SUCCESS, adapter.is_tagging(uri, &tmp_cos_base, is_tagging));
|
||||
ASSERT_FALSE(is_tagging);
|
||||
|
||||
ASSERT_EQ(OB_SUCCESS, adapter.del_file(uri, &tmp_cos_base));
|
||||
ASSERT_EQ(OB_BACKUP_FILE_NOT_EXIST, adapter.is_tagging(uri, &tmp_cos_base, is_tagging));
|
||||
tmp_cos_base.reset();
|
||||
|
||||
// tagging mode
|
||||
ASSERT_EQ(OB_SUCCESS,
|
||||
databuff_printf(tmp_account, sizeof(tmp_account),
|
||||
"host=%s&access_id=%s&access_key=%s&appid=%s&delete_mode=tagging",
|
||||
endpoint, secretid, secretkey, appid));
|
||||
ASSERT_EQ(OB_SUCCESS, tmp_cos_base.set(ObStorageType::OB_STORAGE_COS, tmp_account));
|
||||
|
||||
ASSERT_EQ(OB_SUCCESS, databuff_printf(uri, sizeof(uri), "%s/tagging_mode", dir_uri));
|
||||
ASSERT_EQ(OB_SUCCESS,
|
||||
adapter.write_single_file(uri, &tmp_cos_base, write_content, strlen(write_content)));
|
||||
|
||||
is_tagging = true;
|
||||
ASSERT_EQ(OB_SUCCESS, adapter.is_tagging(uri, &tmp_cos_base, is_tagging));
|
||||
ASSERT_FALSE(is_tagging);
|
||||
|
||||
ASSERT_EQ(OB_SUCCESS, adapter.del_file(uri, &tmp_cos_base));
|
||||
ASSERT_EQ(OB_SUCCESS, adapter.is_tagging(uri, &tmp_cos_base, is_tagging));
|
||||
ASSERT_TRUE(is_tagging);
|
||||
tmp_cos_base.reset();
|
||||
|
||||
// clean
|
||||
ASSERT_EQ(OB_SUCCESS,
|
||||
databuff_printf(tmp_account, sizeof(tmp_account),
|
||||
"host=%s&access_id=%s&access_key=%s&appid=%s",
|
||||
endpoint, secretid, secretkey, appid));
|
||||
ASSERT_EQ(OB_SUCCESS, tmp_cos_base.set(ObStorageType::OB_STORAGE_COS, tmp_account));
|
||||
|
||||
ASSERT_EQ(OB_SUCCESS, databuff_printf(uri, sizeof(uri), "%s/tagging_mode", dir_uri));
|
||||
ASSERT_EQ(OB_SUCCESS, adapter.del_file(uri, &tmp_cos_base));
|
||||
ASSERT_EQ(OB_BACKUP_FILE_NOT_EXIST, adapter.is_tagging(uri, &tmp_cos_base, is_tagging));
|
||||
}
|
||||
}
|
||||
|
||||
int main(int argc, char **argv)
|
||||
{
|
||||
system("rm -f test_backup_access_cos.log*");
|
||||
OB_LOGGER.set_file_name("test_backup_access_cos.log", true, true);
|
||||
OB_LOGGER.set_log_level("INFO");
|
||||
::testing::InitGoogleTest(&argc, argv);
|
||||
return RUN_ALL_TESTS();
|
||||
}
|
||||
23
unittest/share/backup/test_backup_access_cos.h
Normal file
23
unittest/share/backup/test_backup_access_cos.h
Normal file
@ -0,0 +1,23 @@
|
||||
/**
|
||||
* Copyright (c) 2021 OceanBase
|
||||
* OceanBase CE is licensed under Mulan PubL v2.
|
||||
* You can use this software according to the terms and conditions of the Mulan PubL v2.
|
||||
* You may obtain a copy of Mulan PubL v2 at:
|
||||
* http://license.coscl.org.cn/MulanPubL-2.0
|
||||
* THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND,
|
||||
* EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT,
|
||||
* MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE.
|
||||
* See the Mulan PubL v2 for more details.
|
||||
*/
|
||||
|
||||
#ifndef UNITTEST_BACKUP_ACCESS_COS_H_
|
||||
#define UNITTEST_BACKUP_ACCESS_COS_H_
|
||||
|
||||
const bool enable_test = false;
|
||||
const char *bucket = "cos://xxx";
|
||||
const char *endpoint = "xxx";
|
||||
const char *secretid = "xxx";
|
||||
const char *secretkey = "xxx";
|
||||
const char *appid = "xxx";
|
||||
|
||||
#endif
|
||||
@ -52,6 +52,9 @@ TEST(ObBackupDest, nfs)
|
||||
const char *backup_test = "file:///backup_dir/?&delete_mode=tagging";
|
||||
ObBackupDest dest;
|
||||
ObBackupDest dest1;
|
||||
ASSERT_EQ(OB_INVALID_BACKUP_DEST, dest.set(backup_test));
|
||||
backup_test = "file:///backup_dir/";
|
||||
|
||||
char backup_dest_str[OB_MAX_BACKUP_DEST_LENGTH] = { 0 };
|
||||
char backup_path_str[OB_MAX_BACKUP_DEST_LENGTH] = { 0 };
|
||||
ASSERT_EQ(OB_SUCCESS, dest.set(backup_test));
|
||||
@ -144,10 +147,79 @@ TEST(ObBackupDest, oss_encrypt)
|
||||
ObMasterKeyGetter::instance().wait();
|
||||
ObMasterKeyGetter::instance().reset();
|
||||
}
|
||||
#endif //
|
||||
|
||||
TEST(ObBackupDest, cos)
|
||||
{
|
||||
const char *backup_test = "cos://backup_dir/?host=xxx.com&access_id=111&access_key=222&delete_mode=tagging&appid=333";
|
||||
ObBackupDest dest;
|
||||
ObBackupDest dest1;
|
||||
char backup_dest_str[OB_MAX_BACKUP_DEST_LENGTH] = { 0 };
|
||||
char backup_path_str[OB_MAX_BACKUP_DEST_LENGTH] = { 0 };
|
||||
ASSERT_EQ(OB_SUCCESS, dest.set(backup_test));
|
||||
ASSERT_EQ(OB_SUCCESS, dest1.set(backup_test));
|
||||
LOG_INFO("dump backup dest", K(dest), K(dest.get_root_path()), K(*(dest.get_storage_info())));
|
||||
ASSERT_EQ(0, strcmp(dest.root_path_, "cos://backup_dir"));
|
||||
ASSERT_TRUE(dest.storage_info_->device_type_ == 2);
|
||||
|
||||
EXPECT_EQ(OB_SUCCESS, ObMasterKeyGetter::instance().init(NULL));
|
||||
EXPECT_EQ(OB_SUCCESS, ObMasterKeyGetter::instance().set_root_key(OB_SYS_TENANT_ID,
|
||||
obrpc::RootKeyType::DEFAULT, ObString()));
|
||||
ASSERT_EQ(OB_SUCCESS, dest.get_backup_dest_str(backup_dest_str, sizeof(backup_dest_str)));
|
||||
ASSERT_EQ(0, strcmp(backup_dest_str, "cos://backup_dir?host=xxx.com&access_id=111&encrypt_key=9B6FDE7E1E54CD292CDE5494CEB86B6F&delete_mode=tagging&appid=333"));
|
||||
ASSERT_EQ(OB_SUCCESS, dest.get_backup_path_str(backup_path_str, sizeof(backup_path_str)));
|
||||
ASSERT_EQ(0, strcmp(backup_path_str, "cos://backup_dir?host=xxx.com"));
|
||||
ASSERT_TRUE(dest.is_root_path_equal(dest1));
|
||||
bool is_equal = false;
|
||||
ASSERT_EQ(OB_SUCCESS, dest.is_backup_path_equal(dest1, is_equal));
|
||||
ASSERT_TRUE(is_equal);
|
||||
ASSERT_TRUE(dest == dest1);
|
||||
dest1.reset();
|
||||
ASSERT_EQ(OB_SUCCESS, dest1.set(dest.get_root_path().ptr(), dest.get_storage_info()));
|
||||
ASSERT_TRUE(dest == dest1);
|
||||
ObMasterKeyGetter::instance().stop();
|
||||
ObMasterKeyGetter::instance().wait();
|
||||
ObMasterKeyGetter::instance().reset();
|
||||
}
|
||||
|
||||
TEST(ObBackupDest, cos_encrypt)
|
||||
{
|
||||
const char *backup_test = "cos://backup_dir?host=xxx.com&access_id=111&encrypt_key=9B6FDE7E1E54CD292CDE5494CEB86B6F&appid=333";
|
||||
ObBackupDest dest;
|
||||
EXPECT_EQ(OB_SUCCESS, ObMasterKeyGetter::instance().init(NULL));
|
||||
EXPECT_EQ(OB_SUCCESS, ObMasterKeyGetter::instance().set_root_key(OB_SYS_TENANT_ID,
|
||||
obrpc::RootKeyType::DEFAULT, ObString()));
|
||||
ASSERT_EQ(OB_SUCCESS, dest.set(backup_test));
|
||||
LOG_INFO("dump backup dest", K(dest.get_root_path()), K(*(dest.get_storage_info())));
|
||||
ASSERT_EQ(0, strcmp(dest.root_path_, "cos://backup_dir"));
|
||||
ASSERT_TRUE(dest.storage_info_->device_type_ == 2);
|
||||
const char *path = "cos://backup_dir/";
|
||||
const char *endpoint = "host=xxx.com";
|
||||
const char *authorization = "access_id=111&encrypt_key=9B6FDE7E1E54CD292CDE5494CEB86B6F";
|
||||
const char *extension = "appid=333";
|
||||
ObBackupDest dest1;
|
||||
ASSERT_EQ(OB_SUCCESS, dest1.set(path, endpoint, authorization, extension));
|
||||
ASSERT_TRUE(dest == dest1);
|
||||
|
||||
char backup_dest_str[OB_MAX_BACKUP_DEST_LENGTH] = { 0 };
|
||||
char backup_path_str[OB_MAX_BACKUP_DEST_LENGTH] = { 0 };
|
||||
ASSERT_EQ(OB_SUCCESS, dest.get_backup_dest_str(backup_dest_str, sizeof(backup_dest_str)));
|
||||
ASSERT_EQ(0, strcmp(backup_dest_str, "cos://backup_dir?host=xxx.com&access_id=111&encrypt_key=9B6FDE7E1E54CD292CDE5494CEB86B6F&appid=333"));
|
||||
ASSERT_EQ(OB_SUCCESS, dest.get_backup_path_str(backup_path_str, sizeof(backup_path_str)));
|
||||
ASSERT_EQ(0, strcmp(backup_path_str, "cos://backup_dir?host=xxx.com"));
|
||||
|
||||
dest1.reset();
|
||||
ASSERT_EQ(OB_SUCCESS, dest1.set(path, endpoint, authorization, extension));
|
||||
ASSERT_TRUE(dest == dest1);
|
||||
ObMasterKeyGetter::instance().stop();
|
||||
ObMasterKeyGetter::instance().wait();
|
||||
ObMasterKeyGetter::instance().reset();
|
||||
}
|
||||
#endif
|
||||
|
||||
int main(int argc, char **argv)
|
||||
{
|
||||
system("rm -f test_backup_struct.log*");
|
||||
OB_LOGGER.set_file_name("test_backup_struct.log", true, true);
|
||||
OB_LOGGER.set_log_level("INFO");
|
||||
testing::InitGoogleTest(&argc, argv);
|
||||
return RUN_ALL_TESTS();
|
||||
|
||||
Reference in New Issue
Block a user