package mem import ( "bytes" "context" "crypto/md5" "encoding/base64" "hash" "io" "io/ioutil" "sync" "github.com/restic/restic/internal/backend" "github.com/restic/restic/internal/debug" "github.com/restic/restic/internal/errors" "github.com/restic/restic/internal/restic" "github.com/cenkalti/backoff/v4" ) type memMap map[restic.Handle][]byte // make sure that MemoryBackend implements backend.Backend var _ restic.Backend = &MemoryBackend{} var errNotFound = errors.New("not found") const connectionCount = 2 // MemoryBackend is a mock backend that uses a map for storing all data in // memory. This should only be used for tests. type MemoryBackend struct { data memMap m sync.Mutex sem *backend.Semaphore } // New returns a new backend that saves all data in a map in memory. func New() *MemoryBackend { sem, err := backend.NewSemaphore(connectionCount) if err != nil { panic(err) } be := &MemoryBackend{ data: make(memMap), sem: sem, } debug.Log("created new memory backend") return be } // Test returns whether a file exists. func (be *MemoryBackend) Test(ctx context.Context, h restic.Handle) (bool, error) { be.sem.GetToken() defer be.sem.ReleaseToken() be.m.Lock() defer be.m.Unlock() debug.Log("Test %v", h) if _, ok := be.data[h]; ok { return true, ctx.Err() } return false, ctx.Err() } // IsNotExist returns true if the file does not exist. func (be *MemoryBackend) IsNotExist(err error) bool { return errors.Is(err, errNotFound) } // Save adds new Data to the backend. func (be *MemoryBackend) Save(ctx context.Context, h restic.Handle, rd restic.RewindReader) error { if err := h.Valid(); err != nil { return backoff.Permanent(err) } be.sem.GetToken() defer be.sem.ReleaseToken() be.m.Lock() defer be.m.Unlock() h.ContainedBlobType = restic.InvalidBlob if h.Type == restic.ConfigFile { h.Name = "" } if _, ok := be.data[h]; ok { return errors.New("file already exists") } buf, err := ioutil.ReadAll(rd) if err != nil { return err } // sanity check if int64(len(buf)) != rd.Length() { return errors.Errorf("wrote %d bytes instead of the expected %d bytes", len(buf), rd.Length()) } beHash := be.Hasher() // must never fail according to interface _, err = beHash.Write(buf) if err != nil { panic(err) } if !bytes.Equal(beHash.Sum(nil), rd.Hash()) { return errors.Errorf("invalid file hash or content, got %s expected %s", base64.RawStdEncoding.EncodeToString(beHash.Sum(nil)), base64.RawStdEncoding.EncodeToString(rd.Hash()), ) } be.data[h] = buf debug.Log("saved %v bytes at %v", len(buf), h) return ctx.Err() } // Load runs fn with a reader that yields the contents of the file at h at the // given offset. func (be *MemoryBackend) Load(ctx context.Context, h restic.Handle, length int, offset int64, fn func(rd io.Reader) error) error { return backend.DefaultLoad(ctx, h, length, offset, be.openReader, fn) } func (be *MemoryBackend) openReader(ctx context.Context, h restic.Handle, length int, offset int64) (io.ReadCloser, error) { if err := h.Valid(); err != nil { return nil, backoff.Permanent(err) } be.sem.GetToken() be.m.Lock() defer be.m.Unlock() h.ContainedBlobType = restic.InvalidBlob if h.Type == restic.ConfigFile { h.Name = "" } debug.Log("Load %v offset %v len %v", h, offset, length) if offset < 0 { be.sem.ReleaseToken() return nil, errors.New("offset is negative") } if _, ok := be.data[h]; !ok { be.sem.ReleaseToken() return nil, errNotFound } buf := be.data[h] if offset > int64(len(buf)) { be.sem.ReleaseToken() return nil, errors.New("offset beyond end of file") } buf = buf[offset:] if length > 0 && len(buf) > length { buf = buf[:length] } return be.sem.ReleaseTokenOnClose(ioutil.NopCloser(bytes.NewReader(buf)), nil), ctx.Err() } // Stat returns information about a file in the backend. func (be *MemoryBackend) Stat(ctx context.Context, h restic.Handle) (restic.FileInfo, error) { if err := h.Valid(); err != nil { return restic.FileInfo{}, backoff.Permanent(err) } be.sem.GetToken() defer be.sem.ReleaseToken() be.m.Lock() defer be.m.Unlock() h.ContainedBlobType = restic.InvalidBlob if h.Type == restic.ConfigFile { h.Name = "" } debug.Log("stat %v", h) e, ok := be.data[h] if !ok { return restic.FileInfo{}, errNotFound } return restic.FileInfo{Size: int64(len(e)), Name: h.Name}, ctx.Err() } // Remove deletes a file from the backend. func (be *MemoryBackend) Remove(ctx context.Context, h restic.Handle) error { be.sem.GetToken() defer be.sem.ReleaseToken() be.m.Lock() defer be.m.Unlock() debug.Log("Remove %v", h) h.ContainedBlobType = restic.InvalidBlob if _, ok := be.data[h]; !ok { return errNotFound } delete(be.data, h) return ctx.Err() } // List returns a channel which yields entries from the backend. func (be *MemoryBackend) List(ctx context.Context, t restic.FileType, fn func(restic.FileInfo) error) error { entries := make(map[string]int64) be.m.Lock() for entry, buf := range be.data { if entry.Type != t { continue } entries[entry.Name] = int64(len(buf)) } be.m.Unlock() for name, size := range entries { fi := restic.FileInfo{ Name: name, Size: size, } if ctx.Err() != nil { return ctx.Err() } err := fn(fi) if err != nil { return err } if ctx.Err() != nil { return ctx.Err() } } return ctx.Err() } func (be *MemoryBackend) Connections() uint { return connectionCount } // Location returns the location of the backend (RAM). func (be *MemoryBackend) Location() string { return "RAM" } // Hasher may return a hash function for calculating a content hash for the backend func (be *MemoryBackend) Hasher() hash.Hash { return md5.New() } // HasAtomicReplace returns whether Save() can atomically replace files func (be *MemoryBackend) HasAtomicReplace() bool { return false } // Delete removes all data in the backend. func (be *MemoryBackend) Delete(ctx context.Context) error { be.m.Lock() defer be.m.Unlock() if ctx.Err() != nil { return ctx.Err() } be.data = make(memMap) return nil } // Close closes the backend. func (be *MemoryBackend) Close() error { return nil }