File: test_db.h

package info (click to toggle)
golang-github-google-certificate-transparency 0.0~git20160709.0.0f6e3d1~ds1-3
  • links: PTS, VCS
  • area: main
  • in suites: bookworm, bullseye, buster
  • size: 5,676 kB
  • sloc: cpp: 35,278; python: 11,838; java: 1,911; sh: 1,885; makefile: 950; xml: 520; ansic: 225
file content (78 lines) | stat: -rw-r--r-- 2,527 bytes parent folder | download
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
#ifndef CERT_TRANS_LOG_TEST_DB_H_
#define CERT_TRANS_LOG_TEST_DB_H_

#include <sys/stat.h>

#include "log/database.h"
#include "log/file_db.h"
#include "log/file_storage.h"
#include "log/leveldb_db.h"
#include "log/logged_entry.h"
#include "log/sqlite_db.h"
#include "util/test_db.h"

static const unsigned kCertStorageDepth = 3;
static const unsigned kTreeStorageDepth = 8;

template <>
void TestDB<cert_trans::FileDB>::Setup() {
  std::string certs_dir = tmp_.TmpStorageDir() + "/certs";
  std::string tree_dir = tmp_.TmpStorageDir() + "/tree";
  std::string meta_dir = tmp_.TmpStorageDir() + "/meta";
  CHECK_ERR(mkdir(certs_dir.c_str(), 0700));
  CHECK_ERR(mkdir(tree_dir.c_str(), 0700));
  CHECK_ERR(mkdir(meta_dir.c_str(), 0700));

  db_.reset(new cert_trans::FileDB(
      new cert_trans::FileStorage(certs_dir, kCertStorageDepth),
      new cert_trans::FileStorage(tree_dir, kTreeStorageDepth),
      new cert_trans::FileStorage(meta_dir, 0)));
}

template <>
cert_trans::FileDB* TestDB<cert_trans::FileDB>::SecondDB() {
  std::string certs_dir = this->tmp_.TmpStorageDir() + "/certs";
  std::string tree_dir = this->tmp_.TmpStorageDir() + "/tree";
  std::string meta_dir = this->tmp_.TmpStorageDir() + "/meta";
  return new cert_trans::FileDB(
      new cert_trans::FileStorage(certs_dir, kCertStorageDepth),
      new cert_trans::FileStorage(tree_dir, kTreeStorageDepth),
      new cert_trans::FileStorage(meta_dir, 0));
}

template <>
void TestDB<cert_trans::SQLiteDB>::Setup() {
  db_.reset(new cert_trans::SQLiteDB(tmp_.TmpStorageDir() + "/sqlite"));
}

template <>
cert_trans::SQLiteDB* TestDB<cert_trans::SQLiteDB>::SecondDB() {
  return new cert_trans::SQLiteDB(tmp_.TmpStorageDir() + "/sqlite");
}

template <>
void TestDB<cert_trans::LevelDB>::Setup() {
  db_.reset(new cert_trans::LevelDB(tmp_.TmpStorageDir() + "/leveldb"));
}

template <>
cert_trans::LevelDB* TestDB<cert_trans::LevelDB>::SecondDB() {
  // LevelDB won't allow the same DB to be opened concurrently so we have to
  // close the original.
  db_.reset();
  return new cert_trans::LevelDB(tmp_.TmpStorageDir() + "/leveldb");
}

// Not a Database; we just use the same template for setup.
template <>
void TestDB<cert_trans::FileStorage>::Setup() {
  db_.reset(
      new cert_trans::FileStorage(tmp_.TmpStorageDir(), kCertStorageDepth));
}

template <>
cert_trans::FileStorage* TestDB<cert_trans::FileStorage>::SecondDB() {
  return new cert_trans::FileStorage(tmp_.TmpStorageDir(), kCertStorageDepth);
}

#endif  // CERT_TRANS_LOG_TEST_DB_H_