2015-05-20 14:54:26 +00:00
|
|
|
package physical
|
|
|
|
|
|
|
|
import (
|
|
|
|
"fmt"
|
2016-04-26 03:10:32 +00:00
|
|
|
"log"
|
2015-05-20 14:54:26 +00:00
|
|
|
"math/rand"
|
|
|
|
"os"
|
|
|
|
"testing"
|
|
|
|
"time"
|
|
|
|
|
2015-06-03 19:02:49 +00:00
|
|
|
"github.com/aws/aws-sdk-go/aws"
|
2015-10-30 22:22:48 +00:00
|
|
|
"github.com/aws/aws-sdk-go/aws/credentials"
|
|
|
|
"github.com/aws/aws-sdk-go/aws/session"
|
2015-06-03 19:02:49 +00:00
|
|
|
"github.com/aws/aws-sdk-go/service/s3"
|
2015-05-20 14:54:26 +00:00
|
|
|
)
|
|
|
|
|
|
|
|
func TestS3Backend(t *testing.T) {
|
2015-05-21 00:42:41 +00:00
|
|
|
if os.Getenv("AWS_ACCESS_KEY_ID") == "" || os.Getenv("AWS_SECRET_ACCESS_KEY") == "" {
|
|
|
|
t.SkipNow()
|
|
|
|
}
|
2015-05-20 14:54:26 +00:00
|
|
|
|
2015-10-30 22:22:48 +00:00
|
|
|
creds, err := credentials.NewEnvCredentials().Get()
|
2015-05-20 14:54:26 +00:00
|
|
|
if err != nil {
|
2015-05-21 00:42:41 +00:00
|
|
|
t.Fatalf("err: %v", err)
|
2015-05-20 14:54:26 +00:00
|
|
|
}
|
|
|
|
|
2015-11-04 12:34:40 +00:00
|
|
|
// If the variable is empty or doesn't exist, the default
|
|
|
|
// AWS endpoints will be used
|
|
|
|
endpoint := os.Getenv("AWS_S3_ENDPOINT")
|
|
|
|
|
2015-05-20 14:54:26 +00:00
|
|
|
region := os.Getenv("AWS_DEFAULT_REGION")
|
|
|
|
if region == "" {
|
|
|
|
region = "us-east-1"
|
|
|
|
}
|
|
|
|
|
2015-10-30 22:22:48 +00:00
|
|
|
s3conn := s3.New(session.New(&aws.Config{
|
|
|
|
Credentials: credentials.NewEnvCredentials(),
|
2015-11-04 12:34:40 +00:00
|
|
|
Endpoint: aws.String(endpoint),
|
2015-08-06 16:37:08 +00:00
|
|
|
Region: aws.String(region),
|
2015-10-30 22:22:48 +00:00
|
|
|
}))
|
2015-05-20 14:54:26 +00:00
|
|
|
|
|
|
|
var randInt = rand.New(rand.NewSource(time.Now().UnixNano())).Int()
|
|
|
|
bucket := fmt.Sprintf("vault-s3-testacc-%d", randInt)
|
|
|
|
|
|
|
|
_, err = s3conn.CreateBucket(&s3.CreateBucketInput{
|
|
|
|
Bucket: aws.String(bucket),
|
|
|
|
})
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("unable to create test bucket: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
defer func() {
|
|
|
|
// Gotta list all the objects and delete them
|
|
|
|
// before being able to delete the bucket
|
|
|
|
listResp, _ := s3conn.ListObjects(&s3.ListObjectsInput{
|
|
|
|
Bucket: aws.String(bucket),
|
|
|
|
})
|
|
|
|
|
|
|
|
objects := &s3.Delete{}
|
|
|
|
for _, key := range listResp.Contents {
|
|
|
|
oi := &s3.ObjectIdentifier{Key: key.Key}
|
|
|
|
objects.Objects = append(objects.Objects, oi)
|
|
|
|
}
|
|
|
|
|
|
|
|
s3conn.DeleteObjects(&s3.DeleteObjectsInput{
|
|
|
|
Bucket: aws.String(bucket),
|
|
|
|
Delete: objects,
|
|
|
|
})
|
|
|
|
|
|
|
|
_, err := s3conn.DeleteBucket(&s3.DeleteBucketInput{Bucket: aws.String(bucket)})
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
|
|
|
}()
|
|
|
|
|
2016-04-26 03:10:32 +00:00
|
|
|
logger := log.New(os.Stderr, "", log.LstdFlags)
|
|
|
|
b, err := NewBackend("s3", logger, map[string]string{
|
2015-08-06 16:37:08 +00:00
|
|
|
"access_key": creds.AccessKeyID,
|
|
|
|
"secret_key": creds.SecretAccessKey,
|
2015-07-18 06:48:23 +00:00
|
|
|
"session_token": creds.SessionToken,
|
2015-08-06 16:37:08 +00:00
|
|
|
"bucket": bucket,
|
2015-05-20 14:54:26 +00:00
|
|
|
})
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
testBackend(t, b)
|
|
|
|
testBackend_ListPrefix(t, b)
|
|
|
|
|
|
|
|
}
|