271 lines
12 KiB
C++
271 lines
12 KiB
C++
/**
|
|
* Copyright (c) 2021 OceanBase
|
|
* OceanBase CE is licensed under Mulan PubL v2.
|
|
* You can use this software according to the terms and conditions of the Mulan PubL v2.
|
|
* You may obtain a copy of Mulan PubL v2 at:
|
|
* http://license.coscl.org.cn/MulanPubL-2.0
|
|
* THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND,
|
|
* EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT,
|
|
* MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE.
|
|
* See the Mulan PubL v2 for more details.
|
|
*/
|
|
|
|
#define USING_LOG_PREFIX SHARE
|
|
|
|
#include <gtest/gtest.h>
|
|
#include "lib/container/ob_array_iterator.h"
|
|
#define private public
|
|
#include "share/backup/ob_backup_path.h"
|
|
#ifdef OB_BUILD_TDE_SECURITY
|
|
#include "share/ob_master_key_getter.h"
|
|
#endif
|
|
|
|
using namespace oceanbase;
|
|
using namespace common;
|
|
using namespace share;
|
|
|
|
TEST(ObBackupUtils, check_is_tmp_file)
|
|
{
|
|
bool is_tmp_file = false;
|
|
ObString file_name_1 = "file_name.tmp.123456";
|
|
ASSERT_EQ(OB_SUCCESS, ObBackupUtils::check_is_tmp_file(file_name_1, is_tmp_file));
|
|
ASSERT_TRUE(is_tmp_file);
|
|
ObString file_name_2 = "file_name.TMP.123456";
|
|
ASSERT_EQ(OB_SUCCESS, ObBackupUtils::check_is_tmp_file(file_name_2, is_tmp_file));
|
|
ASSERT_FALSE(is_tmp_file);
|
|
ObString file_name_3 = "file_name.tmp";
|
|
ASSERT_EQ(OB_SUCCESS, ObBackupUtils::check_is_tmp_file(file_name_3, is_tmp_file));
|
|
ASSERT_FALSE(is_tmp_file);
|
|
ObString file_name_4 = "file_name.tmp.";
|
|
ASSERT_EQ(OB_SUCCESS, ObBackupUtils::check_is_tmp_file(file_name_4, is_tmp_file));
|
|
ASSERT_FALSE(is_tmp_file);
|
|
ObString file_name_5 = "file_name";
|
|
ASSERT_EQ(OB_SUCCESS, ObBackupUtils::check_is_tmp_file(file_name_5, is_tmp_file));
|
|
ASSERT_FALSE(is_tmp_file);
|
|
ObString file_name_6 = "file_name.123456";
|
|
ASSERT_EQ(OB_SUCCESS, ObBackupUtils::check_is_tmp_file(file_name_6, is_tmp_file));
|
|
ASSERT_FALSE(is_tmp_file);
|
|
}
|
|
|
|
TEST(ObBackupDest, nfs)
|
|
{
|
|
const char *backup_test = "file:///backup_dir/?&delete_mode=tagging";
|
|
ObBackupDest dest;
|
|
ObBackupDest dest1;
|
|
ASSERT_EQ(OB_INVALID_BACKUP_DEST, dest.set(backup_test));
|
|
backup_test = "file:///backup_dir/";
|
|
|
|
char backup_dest_str[OB_MAX_BACKUP_DEST_LENGTH] = { 0 };
|
|
char backup_path_str[OB_MAX_BACKUP_DEST_LENGTH] = { 0 };
|
|
ASSERT_EQ(OB_SUCCESS, dest.set(backup_test));
|
|
ASSERT_EQ(OB_SUCCESS, dest1.set(backup_test));
|
|
LOG_INFO("dump backup dest", K(dest), K(dest.get_root_path()), K(*(dest.get_storage_info())));
|
|
ASSERT_EQ(0, strcmp(dest.root_path_, "file:///backup_dir"));
|
|
ASSERT_TRUE(dest.storage_info_->device_type_ == 1);
|
|
ObString backup_str("file:///backup_dir/");
|
|
ObBackupDest dest2;
|
|
ASSERT_EQ(OB_SUCCESS, dest2.set(backup_str));
|
|
ASSERT_EQ(0, strcmp(dest.root_path_, "file:///backup_dir"));
|
|
|
|
ASSERT_EQ(OB_SUCCESS, dest.get_backup_dest_str(backup_dest_str, sizeof(backup_dest_str)));
|
|
ASSERT_EQ(0, strcmp(backup_dest_str, "file:///backup_dir"));
|
|
ASSERT_EQ(OB_SUCCESS, dest.get_backup_path_str(backup_path_str, sizeof(backup_path_str)));
|
|
ASSERT_EQ(0, strcmp(backup_path_str, "file:///backup_dir"));
|
|
ASSERT_TRUE(dest.is_root_path_equal(dest1));
|
|
bool is_equal = false;
|
|
ASSERT_EQ(OB_SUCCESS, dest.is_backup_path_equal(dest1, is_equal));
|
|
ASSERT_TRUE(is_equal);
|
|
ASSERT_TRUE(dest == dest1);
|
|
ASSERT_EQ(OB_SUCCESS, dest2.deep_copy(dest));
|
|
ASSERT_EQ(0, strcmp(dest.root_path_, "file:///backup_dir"));
|
|
}
|
|
|
|
TEST(ObBackupDestAttributeParser, parse_option)
|
|
{
|
|
int64_t max_iops = 0;
|
|
int64_t max_bandwidth = 0;
|
|
const char *option = "max_iops=1000&max_bandwidth=1024000b";
|
|
ObBackupDestAttribute dest_option;
|
|
dest_option.reset();
|
|
ASSERT_EQ(OB_SUCCESS, ObBackupDestAttributeParser::parse(option, dest_option));
|
|
ASSERT_EQ(1000, dest_option.max_iops_);
|
|
ASSERT_EQ(1024000, dest_option.max_bandwidth_);
|
|
|
|
const char *option_1 = "max_iops=1000";
|
|
dest_option.reset();
|
|
ASSERT_EQ(OB_SUCCESS, ObBackupDestAttributeParser::parse(option_1, dest_option));
|
|
ASSERT_EQ(1000, dest_option.max_iops_);
|
|
ASSERT_EQ(0, dest_option.max_bandwidth_);
|
|
|
|
const char *option_2 = "max_bandwidth=10000b";
|
|
dest_option.reset();
|
|
ASSERT_EQ(OB_SUCCESS, ObBackupDestAttributeParser::parse(option_2, dest_option));
|
|
ASSERT_EQ(0, dest_option.max_iops_);
|
|
ASSERT_EQ(10000, dest_option.max_bandwidth_);
|
|
|
|
const char *option_3 = "";
|
|
dest_option.reset();
|
|
ASSERT_EQ(-4002, ObBackupDestAttributeParser::parse(option_3, dest_option));
|
|
}
|
|
|
|
TEST(ObBackupDestAttributeParser, parse_acces_info)
|
|
{
|
|
const char *option = "access_id=AAA&access_key=BBB";
|
|
ObBackupDestAttribute dest_option;
|
|
dest_option.reset();
|
|
ASSERT_EQ(OB_SUCCESS, ObBackupDestAttributeParser::parse(option, dest_option));
|
|
ASSERT_EQ(0, strcmp(dest_option.access_id_, "AAA"));
|
|
ASSERT_EQ(0, strcmp(dest_option.access_key_, "BBB"));
|
|
}
|
|
|
|
#ifdef OB_BUILD_TDE_SECURITY
|
|
TEST(ObBackupDest, oss)
|
|
{
|
|
const char *backup_test = "oss://backup_dir/?host=xxx.com&access_id=111&access_key=222&delete_mode=tagging";
|
|
ObBackupDest dest;
|
|
ObBackupDest dest1;
|
|
char backup_dest_str[OB_MAX_BACKUP_DEST_LENGTH] = { 0 };
|
|
char backup_path_str[OB_MAX_BACKUP_DEST_LENGTH] = { 0 };
|
|
ASSERT_EQ(OB_SUCCESS, dest.set(backup_test));
|
|
ASSERT_EQ(OB_SUCCESS, dest1.set(backup_test));
|
|
LOG_INFO("dump backup dest", K(dest), K(dest.get_root_path()), K(*(dest.get_storage_info())));
|
|
ASSERT_EQ(0, strcmp(dest.root_path_, "oss://backup_dir"));
|
|
ASSERT_TRUE(dest.storage_info_->device_type_ == 0);
|
|
|
|
EXPECT_EQ(OB_SUCCESS, ObMasterKeyGetter::instance().init(NULL));
|
|
EXPECT_EQ(OB_SUCCESS, ObMasterKeyGetter::instance().set_root_key(OB_SYS_TENANT_ID,
|
|
obrpc::RootKeyType::DEFAULT, ObString()));
|
|
ASSERT_EQ(OB_SUCCESS, dest.get_backup_dest_str(backup_dest_str, sizeof(backup_dest_str)));
|
|
ASSERT_EQ(0, strcmp(backup_dest_str, "oss://backup_dir?host=xxx.com&access_id=111&encrypt_key=9B6FDE7E1E54CD292CDE5494CEB86B6F&delete_mode=tagging"));
|
|
ASSERT_EQ(OB_SUCCESS, dest.get_backup_path_str(backup_path_str, sizeof(backup_path_str)));
|
|
ASSERT_EQ(0, strcmp(backup_path_str, "oss://backup_dir?host=xxx.com"));
|
|
ASSERT_TRUE(dest.is_root_path_equal(dest1));
|
|
bool is_equal = false;
|
|
ASSERT_EQ(OB_SUCCESS, dest.is_backup_path_equal(dest1, is_equal));
|
|
ASSERT_TRUE(is_equal);
|
|
ASSERT_TRUE(dest == dest1);
|
|
dest1.reset();
|
|
ASSERT_EQ(OB_SUCCESS, dest1.set(dest.get_root_path().ptr(), dest.get_storage_info()));
|
|
ASSERT_TRUE(dest == dest1);
|
|
ObMasterKeyGetter::instance().stop();
|
|
ObMasterKeyGetter::instance().wait();
|
|
ObMasterKeyGetter::instance().reset();
|
|
}
|
|
|
|
TEST(ObBackupDest, oss_encrypt)
|
|
{
|
|
const char *backup_test = "oss://backup_dir?host=xxx.com&access_id=111&encrypt_key=9B6FDE7E1E54CD292CDE5494CEB86B6F";
|
|
ObBackupDest dest;
|
|
EXPECT_EQ(OB_SUCCESS, ObMasterKeyGetter::instance().init(NULL));
|
|
EXPECT_EQ(OB_SUCCESS, ObMasterKeyGetter::instance().set_root_key(OB_SYS_TENANT_ID,
|
|
obrpc::RootKeyType::DEFAULT, ObString()));
|
|
ASSERT_EQ(OB_SUCCESS, dest.set(backup_test));
|
|
LOG_INFO("dump backup dest", K(dest.get_root_path()), K(*(dest.get_storage_info())));
|
|
ASSERT_EQ(0, strcmp(dest.root_path_, "oss://backup_dir"));
|
|
ASSERT_TRUE(dest.storage_info_->device_type_ == 0);
|
|
const char *path = "oss://backup_dir/";
|
|
const char *endpoint = "host=xxx.com";
|
|
const char *authorization = "access_id=111&encrypt_key=9B6FDE7E1E54CD292CDE5494CEB86B6F";
|
|
const char *extension = "";
|
|
ObBackupDest dest1;
|
|
ASSERT_EQ(OB_SUCCESS, dest1.set(path, endpoint, authorization, extension));
|
|
ASSERT_TRUE(dest == dest1);
|
|
ObString backup_test_str(backup_test);
|
|
ObBackupDest dest2;
|
|
ASSERT_EQ(OB_INVALID_BACKUP_DEST, dest2.set_without_decryption(backup_test_str));
|
|
|
|
char backup_dest_str[OB_MAX_BACKUP_DEST_LENGTH] = { 0 };
|
|
char backup_path_str[OB_MAX_BACKUP_DEST_LENGTH] = { 0 };
|
|
ASSERT_EQ(OB_SUCCESS, dest.get_backup_dest_str(backup_dest_str, sizeof(backup_dest_str)));
|
|
ASSERT_EQ(0, strcmp(backup_dest_str, "oss://backup_dir?host=xxx.com&access_id=111&encrypt_key=9B6FDE7E1E54CD292CDE5494CEB86B6F"));
|
|
ASSERT_EQ(OB_SUCCESS, dest.get_backup_path_str(backup_path_str, sizeof(backup_path_str)));
|
|
ASSERT_EQ(0, strcmp(backup_path_str, "oss://backup_dir?host=xxx.com"));
|
|
|
|
dest1.reset();
|
|
ASSERT_EQ(OB_SUCCESS, dest1.set(path, endpoint, authorization, extension));
|
|
ASSERT_TRUE(dest == dest1);
|
|
ObMasterKeyGetter::instance().stop();
|
|
ObMasterKeyGetter::instance().wait();
|
|
ObMasterKeyGetter::instance().reset();
|
|
}
|
|
|
|
TEST(ObBackupDest, cos)
|
|
{
|
|
const char *backup_test = "cos://backup_dir/?host=xxx.com&access_id=111&access_key=222&delete_mode=tagging&appid=333";
|
|
ObBackupDest dest;
|
|
ObBackupDest dest1;
|
|
char backup_dest_str[OB_MAX_BACKUP_DEST_LENGTH] = { 0 };
|
|
char backup_path_str[OB_MAX_BACKUP_DEST_LENGTH] = { 0 };
|
|
ASSERT_EQ(OB_SUCCESS, dest.set(backup_test));
|
|
ASSERT_EQ(OB_SUCCESS, dest1.set(backup_test));
|
|
LOG_INFO("dump backup dest", K(dest), K(dest.get_root_path()), K(*(dest.get_storage_info())));
|
|
ASSERT_EQ(0, strcmp(dest.root_path_, "cos://backup_dir"));
|
|
ASSERT_TRUE(dest.storage_info_->device_type_ == 2);
|
|
|
|
EXPECT_EQ(OB_SUCCESS, ObMasterKeyGetter::instance().init(NULL));
|
|
EXPECT_EQ(OB_SUCCESS, ObMasterKeyGetter::instance().set_root_key(OB_SYS_TENANT_ID,
|
|
obrpc::RootKeyType::DEFAULT, ObString()));
|
|
ASSERT_EQ(OB_SUCCESS, dest.get_backup_dest_str(backup_dest_str, sizeof(backup_dest_str)));
|
|
ASSERT_EQ(0, strcmp(backup_dest_str, "cos://backup_dir?host=xxx.com&access_id=111&encrypt_key=9B6FDE7E1E54CD292CDE5494CEB86B6F&delete_mode=tagging&appid=333"));
|
|
ASSERT_EQ(OB_SUCCESS, dest.get_backup_path_str(backup_path_str, sizeof(backup_path_str)));
|
|
ASSERT_EQ(0, strcmp(backup_path_str, "cos://backup_dir?host=xxx.com"));
|
|
ASSERT_TRUE(dest.is_root_path_equal(dest1));
|
|
bool is_equal = false;
|
|
ASSERT_EQ(OB_SUCCESS, dest.is_backup_path_equal(dest1, is_equal));
|
|
ASSERT_TRUE(is_equal);
|
|
ASSERT_TRUE(dest == dest1);
|
|
dest1.reset();
|
|
ASSERT_EQ(OB_SUCCESS, dest1.set(dest.get_root_path().ptr(), dest.get_storage_info()));
|
|
ASSERT_TRUE(dest == dest1);
|
|
ObMasterKeyGetter::instance().stop();
|
|
ObMasterKeyGetter::instance().wait();
|
|
ObMasterKeyGetter::instance().reset();
|
|
}
|
|
|
|
TEST(ObBackupDest, cos_encrypt)
|
|
{
|
|
const char *backup_test = "cos://backup_dir?host=xxx.com&access_id=111&encrypt_key=9B6FDE7E1E54CD292CDE5494CEB86B6F&appid=333";
|
|
ObBackupDest dest;
|
|
EXPECT_EQ(OB_SUCCESS, ObMasterKeyGetter::instance().init(NULL));
|
|
EXPECT_EQ(OB_SUCCESS, ObMasterKeyGetter::instance().set_root_key(OB_SYS_TENANT_ID,
|
|
obrpc::RootKeyType::DEFAULT, ObString()));
|
|
ASSERT_EQ(OB_SUCCESS, dest.set(backup_test));
|
|
LOG_INFO("dump backup dest", K(dest.get_root_path()), K(*(dest.get_storage_info())));
|
|
ASSERT_EQ(0, strcmp(dest.root_path_, "cos://backup_dir"));
|
|
ASSERT_TRUE(dest.storage_info_->device_type_ == 2);
|
|
const char *path = "cos://backup_dir/";
|
|
const char *endpoint = "host=xxx.com";
|
|
const char *authorization = "access_id=111&encrypt_key=9B6FDE7E1E54CD292CDE5494CEB86B6F";
|
|
const char *extension = "appid=333";
|
|
ObBackupDest dest1;
|
|
ASSERT_EQ(OB_SUCCESS, dest1.set(path, endpoint, authorization, extension));
|
|
ASSERT_TRUE(dest == dest1);
|
|
ObString backup_test_str(backup_test);
|
|
ObBackupDest dest2;
|
|
ASSERT_EQ(OB_INVALID_BACKUP_DEST, dest2.set_without_decryption(backup_test_str));
|
|
|
|
char backup_dest_str[OB_MAX_BACKUP_DEST_LENGTH] = { 0 };
|
|
char backup_path_str[OB_MAX_BACKUP_DEST_LENGTH] = { 0 };
|
|
ASSERT_EQ(OB_SUCCESS, dest.get_backup_dest_str(backup_dest_str, sizeof(backup_dest_str)));
|
|
ASSERT_EQ(0, strcmp(backup_dest_str, "cos://backup_dir?host=xxx.com&access_id=111&encrypt_key=9B6FDE7E1E54CD292CDE5494CEB86B6F&appid=333"));
|
|
ASSERT_EQ(OB_SUCCESS, dest.get_backup_path_str(backup_path_str, sizeof(backup_path_str)));
|
|
ASSERT_EQ(0, strcmp(backup_path_str, "cos://backup_dir?host=xxx.com"));
|
|
|
|
dest1.reset();
|
|
ASSERT_EQ(OB_SUCCESS, dest1.set(path, endpoint, authorization, extension));
|
|
ASSERT_TRUE(dest == dest1);
|
|
ObMasterKeyGetter::instance().stop();
|
|
ObMasterKeyGetter::instance().wait();
|
|
ObMasterKeyGetter::instance().reset();
|
|
}
|
|
#endif
|
|
|
|
int main(int argc, char **argv)
|
|
{
|
|
system("rm -f test_backup_struct.log*");
|
|
OB_LOGGER.set_file_name("test_backup_struct.log", true, true);
|
|
OB_LOGGER.set_log_level("INFO");
|
|
testing::InitGoogleTest(&argc, argv);
|
|
return RUN_ALL_TESTS();
|
|
}
|