{- git-annex command - - Copyright 2014 Joey Hess - - Licensed under the GNU GPL version 3 or higher. -} module Command.TestRemote where import Command import qualified Annex import qualified Remote import qualified Types.Remote as Remote import qualified Types.Backend as Backend import Types.KeySource import Annex.Content import Backend import qualified Backend.Hash import Utility.Tmp import Utility.Metered import Utility.DataUnits import Utility.CopyFile import Types.Messages import Types.Export import Remote.Helper.Export import Remote.Helper.Chunked import Git.Types import Test.Tasty import Test.Tasty.Runners import Test.Tasty.HUnit import "crypto-api" Crypto.Random import qualified Data.ByteString as B import qualified Data.ByteString.Lazy as L import qualified Data.Map as M cmd :: Command cmd = command "testremote" SectionTesting "test transfers to/from a remote" paramRemote (seek <$$> optParser) data TestRemoteOptions = TestRemoteOptions { testRemote :: RemoteName , sizeOption :: ByteSize } optParser :: CmdParamsDesc -> Parser TestRemoteOptions optParser desc = TestRemoteOptions <$> argument str ( metavar desc ) <*> option (str >>= maybe (fail "parse error") return . readSize dataUnits) ( long "size" <> metavar paramSize <> value (1024 * 1024) <> help "base key size (default 1MiB)" ) seek :: TestRemoteOptions -> CommandSeek seek o = commandAction $ start (fromInteger $ sizeOption o) (testRemote o) start :: Int -> RemoteName -> CommandStart start basesz name = do showStart' "testremote" (Just name) fast <- Annex.getState Annex.fast r <- either giveup disableExportTree =<< Remote.byName' name rs <- catMaybes <$> mapM (adjustChunkSize r) (chunkSizes basesz fast) rs' <- concat <$> mapM encryptionVariants rs unavailrs <- catMaybes <$> mapM Remote.mkUnavailable [r] exportr <- exportTreeVariant r showAction "generating test keys" ks <- mapM randKey (keySizes basesz fast) next $ perform rs' unavailrs exportr ks perform :: [Remote] -> [Remote] -> Maybe Remote -> [Key] -> CommandPerform perform rs unavailrs exportr ks = do ea <- maybe exportUnsupported Remote.exportActions exportr st <- Annex.getState id let tests = testGroup "Remote Tests" $ concat [ [ testGroup "unavailable remote" (testUnavailable st r (Prelude.head ks)) | r <- unavailrs ] , [ testGroup (desc r k) (test st r k) | k <- ks, r <- rs ] , [ testGroup (descexport k1 k2) (testExportTree st exportr ea k1 k2) | k1 <- take 2 ks, k2 <- take 2 (reverse ks) ] ] ok <- case tryIngredients [consoleTestReporter] mempty tests of Nothing -> error "No tests found!?" Just act -> liftIO act next $ cleanup rs ks ok where desc r' k = intercalate "; " $ map unwords [ [ "key size", show (keySize k) ] , [ show (getChunkConfig (Remote.config r')) ] , ["encryption", fromMaybe "none" (M.lookup "encryption" (Remote.config r'))] ] descexport k1 k2 = intercalate "; " $ map unwords [ [ "exporttree=yes" ] , [ "key1 size", show (keySize k1) ] , [ "key2 size", show (keySize k2) ] ] adjustChunkSize :: Remote -> Int -> Annex (Maybe Remote) adjustChunkSize r chunksize = adjustRemoteConfig r (M.insert "chunk" (show chunksize)) -- Variants of a remote with no encryption, and with simple shared -- encryption. Gpg key based encryption is not tested. encryptionVariants :: Remote -> Annex [Remote] encryptionVariants r = do noenc <- adjustRemoteConfig r (M.insert "encryption" "none") sharedenc <- adjustRemoteConfig r $ M.insert "encryption" "shared" . M.insert "highRandomQuality" "false" return $ catMaybes [noenc, sharedenc] -- Variant of a remote with exporttree disabled. disableExportTree :: Remote -> Annex Remote disableExportTree r = maybe (error "failed disabling exportree") return =<< adjustRemoteConfig r (M.delete "exporttree") -- Variant of a remote with exporttree enabled. exportTreeVariant :: Remote -> Annex (Maybe Remote) exportTreeVariant r = ifM (Remote.isExportSupported r) ( adjustRemoteConfig r $ M.insert "encryption" "none" . M.insert "exporttree" "yes" , return Nothing ) -- Regenerate a remote with a modified config. adjustRemoteConfig :: Remote -> (Remote.RemoteConfig -> Remote.RemoteConfig) -> Annex (Maybe Remote) adjustRemoteConfig r adjustconfig = do repo <- Remote.getRepo r Remote.generate (Remote.remotetype r) repo (Remote.uuid r) (adjustconfig (Remote.config r)) (Remote.gitconfig r) test :: Annex.AnnexState -> Remote -> Key -> [TestTree] test st r k = [ check "removeKey when not present" remove , present False , check "storeKey" store , present True , check "storeKey when already present" store , present True , check "retrieveKeyFile" $ do lockContentForRemoval k removeAnnex get , check "fsck downloaded object" fsck , check "retrieveKeyFile resume from 33%" $ do loc <- Annex.calcRepo (gitAnnexLocation k) tmp <- prepTmp k partial <- liftIO $ bracket (openBinaryFile loc ReadMode) hClose $ \h -> do sz <- hFileSize h L.hGet h $ fromInteger $ sz `div` 3 liftIO $ L.writeFile tmp partial lockContentForRemoval k removeAnnex get , check "fsck downloaded object" fsck , check "retrieveKeyFile resume from 0" $ do tmp <- prepTmp k liftIO $ writeFile tmp "" lockContentForRemoval k removeAnnex get , check "fsck downloaded object" fsck , check "retrieveKeyFile resume from end" $ do loc <- Annex.calcRepo (gitAnnexLocation k) tmp <- prepTmp k void $ liftIO $ copyFileExternal CopyAllMetaData loc tmp lockContentForRemoval k removeAnnex get , check "fsck downloaded object" fsck , check "removeKey when present" remove , present False ] where check desc a = testCase desc $ Annex.eval st (Annex.setOutput QuietOutput >> a) @? "failed" present b = check ("present " ++ show b) $ (== Right b) <$> Remote.hasKey r k fsck = case maybeLookupBackendVariety (keyVariety k) of Nothing -> return True Just b -> case Backend.verifyKeyContent b of Nothing -> return True Just verifier -> verifier k (key2file k) get = getViaTmp (Remote.retrievalSecurityPolicy r) (RemoteVerify r) k $ \dest -> Remote.retrieveKeyFile r k (AssociatedFile Nothing) dest nullMeterUpdate store = Remote.storeKey r k (AssociatedFile Nothing) nullMeterUpdate remove = Remote.removeKey r k testExportTree :: Annex.AnnexState -> Maybe Remote -> Remote.ExportActions Annex -> Key -> Key -> [TestTree] testExportTree _ Nothing _ _ _ = [] testExportTree st (Just _) ea k1 k2 = [ check "check present export when not present" $ not <$> checkpresentexport k1 , check "remove export when not present" (removeexport k1) , check "store export" (storeexport k1) , check "check present export after store" $ checkpresentexport k1 , check "store export when already present" (storeexport k1) , check "retrieve export" (retrieveexport k1) , check "store new content to export" (storeexport k2) , check "check present export after store of new content" $ checkpresentexport k2 , check "retrieve export new content" (retrieveexport k2) , check "remove export" (removeexport k2) , check "check present export after remove" $ not <$> checkpresentexport k2 , check "retrieve export fails after removal" $ not <$> retrieveexport k2 , check "remove export directory" removeexportdirectory , check "remove export directory that is already removed" removeexportdirectory -- renames are not tested because remotes do not need to support them ] where testexportdirectory = "testremote-export" testexportlocation = mkExportLocation (testexportdirectory "location") check desc a = testCase desc $ Annex.eval st (Annex.setOutput QuietOutput >> a) @? "failed" storeexport k = do loc <- Annex.calcRepo (gitAnnexLocation k) Remote.storeExport ea loc k testexportlocation nullMeterUpdate retrieveexport k = withTmpFile "exported" $ \tmp h -> do liftIO $ hClose h ifM (Remote.retrieveExport ea k testexportlocation tmp nullMeterUpdate) ( verifyKeyContent RetrievalAllKeysSecure AlwaysVerify UnVerified k tmp , return False ) checkpresentexport k = Remote.checkPresentExport ea k testexportlocation removeexport k = Remote.removeExport ea k testexportlocation removeexportdirectory = case Remote.removeExportDirectory ea of Nothing -> return True Just a -> a (mkExportDirectory testexportdirectory) testUnavailable :: Annex.AnnexState -> Remote -> Key -> [TestTree] testUnavailable st r k = [ check (== Right False) "removeKey" $ Remote.removeKey r k , check (== Right False) "storeKey" $ Remote.storeKey r k (AssociatedFile Nothing) nullMeterUpdate , check (`notElem` [Right True, Right False]) "checkPresent" $ Remote.checkPresent r k , check (== Right False) "retrieveKeyFile" $ getViaTmp (Remote.retrievalSecurityPolicy r) (RemoteVerify r) k $ \dest -> Remote.retrieveKeyFile r k (AssociatedFile Nothing) dest nullMeterUpdate , check (== Right False) "retrieveKeyFileCheap" $ getViaTmp (Remote.retrievalSecurityPolicy r) (RemoteVerify r) k $ \dest -> unVerified $ Remote.retrieveKeyFileCheap r k (AssociatedFile Nothing) dest ] where check checkval desc a = testCase desc $ do v <- Annex.eval st $ do Annex.setOutput QuietOutput either (Left . show) Right <$> tryNonAsync a checkval v @? ("(got: " ++ show v ++ ")") cleanup :: [Remote] -> [Key] -> Bool -> CommandCleanup cleanup rs ks ok = do forM_ rs $ \r -> forM_ ks (Remote.removeKey r) forM_ ks $ \k -> lockContentForRemoval k removeAnnex return ok chunkSizes :: Int -> Bool -> [Int] chunkSizes base False = [ 0 -- no chunking , base `div` 100 , base `div` 1000 , base ] chunkSizes _ True = [ 0 ] keySizes :: Int -> Bool -> [Int] keySizes base fast = filter want [ 0 -- empty key is a special case when chunking , base , base + 1 , base - 1 , base * 2 ] where want sz | fast = sz <= base && sz > 0 | otherwise = sz > 0 randKey :: Int -> Annex Key randKey sz = withTmpFile "randkey" $ \f h -> do gen <- liftIO (newGenIO :: IO SystemRandom) case genBytes sz gen of Left e -> error $ "failed to generate random key: " ++ show e Right (rand, _) -> liftIO $ B.hPut h rand liftIO $ hClose h let ks = KeySource { keyFilename = f , contentLocation = f , inodeCache = Nothing } k <- fromMaybe (error "failed to generate random key") <$> Backend.getKey Backend.Hash.testKeyBackend ks _ <- moveAnnex k f return k