21640: Stop accidentally reducing NOFILE limit.
[arvados.git] / lib / crunchrun / copier_test.go
index 30e13f65033eef8dc2e93d5a0ba3acbd6356b155..486bf6fa635784eedc78dc326ad0f4dabaf7144e 100644 (file)
@@ -8,7 +8,6 @@ import (
        "bytes"
        "io"
        "io/fs"
-       "io/ioutil"
        "os"
        "sort"
        "syscall"
@@ -117,9 +116,7 @@ func (s *copierSuite) TestSymlinkToMountedCollection(c *check.C) {
        }
 
        // simulate mounted writable collection
-       bindtmp, err := ioutil.TempDir("", "crunch-run.test.")
-       c.Assert(err, check.IsNil)
-       defer os.RemoveAll(bindtmp)
+       bindtmp := c.MkDir()
        f, err := os.OpenFile(bindtmp+"/.arvados#collection", os.O_CREATE|os.O_WRONLY, 0644)
        c.Assert(err, check.IsNil)
        _, err = io.WriteString(f, `{"manifest_text":". 37b51d194a7513e45b56f6524f2d51f2+3 0:3:bar\n"}`)
@@ -217,6 +214,142 @@ func (s *copierSuite) TestWritableMountBelow(c *check.C) {
        })
 }
 
+// Check some glob-matching edge cases. In particular, check that
+// patterns like "foo/**" do not match regular files named "foo"
+// (unless of course they are inside a directory named "foo").
+func (s *copierSuite) TestMatchGlobs(c *check.C) {
+       s.cp.globs = []string{"foo*/**"}
+       c.Check(s.cp.matchGlobs("foo", true), check.Equals, true)
+       c.Check(s.cp.matchGlobs("food", true), check.Equals, true)
+       c.Check(s.cp.matchGlobs("foo", false), check.Equals, false)
+       c.Check(s.cp.matchGlobs("food", false), check.Equals, false)
+       c.Check(s.cp.matchGlobs("foo/bar", false), check.Equals, true)
+       c.Check(s.cp.matchGlobs("food/bar", false), check.Equals, true)
+       c.Check(s.cp.matchGlobs("foo/bar", true), check.Equals, true)
+       c.Check(s.cp.matchGlobs("food/bar", true), check.Equals, true)
+
+       s.cp.globs = []string{"ba[!/]/foo*/**"}
+       c.Check(s.cp.matchGlobs("bar/foo", true), check.Equals, true)
+       c.Check(s.cp.matchGlobs("bar/food", true), check.Equals, true)
+       c.Check(s.cp.matchGlobs("bar/foo", false), check.Equals, false)
+       c.Check(s.cp.matchGlobs("bar/food", false), check.Equals, false)
+       c.Check(s.cp.matchGlobs("bar/foo/z\\[", true), check.Equals, true)
+       c.Check(s.cp.matchGlobs("bar/food/z\\[", true), check.Equals, true)
+       c.Check(s.cp.matchGlobs("bar/foo/z\\[", false), check.Equals, true)
+       c.Check(s.cp.matchGlobs("bar/food/z\\[", false), check.Equals, true)
+
+       s.cp.globs = []string{"waz/**/foo*/**"}
+       c.Check(s.cp.matchGlobs("waz/quux/foo", true), check.Equals, true)
+       c.Check(s.cp.matchGlobs("waz/quux/food", true), check.Equals, true)
+       c.Check(s.cp.matchGlobs("waz/quux/foo", false), check.Equals, false)
+       c.Check(s.cp.matchGlobs("waz/quux/food", false), check.Equals, false)
+       c.Check(s.cp.matchGlobs("waz/quux/foo/foo", true), check.Equals, true)
+       c.Check(s.cp.matchGlobs("waz/quux/food/foo", true), check.Equals, true)
+       c.Check(s.cp.matchGlobs("waz/quux/foo/foo", false), check.Equals, true)
+       c.Check(s.cp.matchGlobs("waz/quux/food/foo", false), check.Equals, true)
+
+       s.cp.globs = []string{"foo/**/*"}
+       c.Check(s.cp.matchGlobs("foo", false), check.Equals, false)
+       c.Check(s.cp.matchGlobs("foo/bar", false), check.Equals, true)
+       c.Check(s.cp.matchGlobs("foo/bar/baz", false), check.Equals, true)
+       c.Check(s.cp.matchGlobs("foo/bar/baz/waz", false), check.Equals, true)
+}
+
+func (s *copierSuite) TestSubtreeCouldMatch(c *check.C) {
+       for _, trial := range []struct {
+               mount string // relative to output dir
+               glob  string
+               could bool
+       }{
+               {mount: "abc", glob: "*"},
+               {mount: "abc", glob: "abc/*", could: true},
+               {mount: "abc", glob: "a*/**", could: true},
+               {mount: "abc", glob: "**", could: true},
+               {mount: "abc", glob: "*/*", could: true},
+               {mount: "abc", glob: "**/*.txt", could: true},
+               {mount: "abc/def", glob: "*"},
+               {mount: "abc/def", glob: "*/*"},
+               {mount: "abc/def", glob: "*/*.txt"},
+               {mount: "abc/def", glob: "*/*/*", could: true},
+               {mount: "abc/def", glob: "**", could: true},
+               {mount: "abc/def", glob: "**/bar", could: true},
+               {mount: "abc/def", glob: "abc/**", could: true},
+               {mount: "abc/def/ghi", glob: "*c/**/bar", could: true},
+               {mount: "abc/def/ghi", glob: "*c/*f/bar"},
+               {mount: "abc/def/ghi", glob: "abc/d[^/]f/ghi/*", could: true},
+       } {
+               c.Logf("=== %+v", trial)
+               got := (&copier{
+                       globs: []string{trial.glob},
+               }).subtreeCouldMatch(trial.mount)
+               c.Check(got, check.Equals, trial.could)
+       }
+}
+
+func (s *copierSuite) TestMountBelowExcludedByGlob(c *check.C) {
+       bindtmp := c.MkDir()
+       s.cp.mounts["/ctr/outdir/include/includer"] = arvados.Mount{
+               Kind:             "collection",
+               PortableDataHash: arvadostest.FooCollectionPDH,
+       }
+       s.cp.mounts["/ctr/outdir/include/includew"] = arvados.Mount{
+               Kind:             "collection",
+               PortableDataHash: arvadostest.FooCollectionPDH,
+               Writable:         true,
+       }
+       s.cp.mounts["/ctr/outdir/exclude/excluder"] = arvados.Mount{
+               Kind:             "collection",
+               PortableDataHash: arvadostest.FooCollectionPDH,
+       }
+       s.cp.mounts["/ctr/outdir/exclude/excludew"] = arvados.Mount{
+               Kind:             "collection",
+               PortableDataHash: arvadostest.FooCollectionPDH,
+               Writable:         true,
+       }
+       s.cp.mounts["/ctr/outdir/nonexistent/collection"] = arvados.Mount{
+               // As extra assurance, plant a collection that will
+               // fail if copier attempts to load its manifest.  (For
+               // performance reasons it's important that copier
+               // doesn't try to load the manifest before deciding
+               // not to copy the contents.)
+               Kind:             "collection",
+               PortableDataHash: "aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa+1234",
+       }
+       s.cp.globs = []string{
+               "?ncl*/*r/*",
+               "*/?ncl*/**",
+       }
+       c.Assert(os.MkdirAll(s.cp.hostOutputDir+"/include/includer", 0755), check.IsNil)
+       c.Assert(os.MkdirAll(s.cp.hostOutputDir+"/include/includew", 0755), check.IsNil)
+       c.Assert(os.MkdirAll(s.cp.hostOutputDir+"/exclude/excluder", 0755), check.IsNil)
+       c.Assert(os.MkdirAll(s.cp.hostOutputDir+"/exclude/excludew", 0755), check.IsNil)
+       s.writeFileInOutputDir(c, "include/includew/foo", "foo")
+       s.writeFileInOutputDir(c, "exclude/excludew/foo", "foo")
+       s.cp.bindmounts = map[string]bindmount{
+               "/ctr/outdir/include/includew": bindmount{HostPath: bindtmp, ReadOnly: false},
+       }
+       s.cp.bindmounts = map[string]bindmount{
+               "/ctr/outdir/include/excludew": bindmount{HostPath: bindtmp, ReadOnly: false},
+       }
+
+       err := s.cp.walkMount("", s.cp.ctrOutputDir, 10, true)
+       c.Check(err, check.IsNil)
+       c.Log(s.log.String())
+
+       // Note it's OK that "/exclude" is not excluded by walkMount:
+       // it is just a local filesystem directory, not a mount point
+       // that's expensive to walk.  In real-life usage, it will be
+       // removed from cp.dirs before any copying happens.
+       c.Check(s.cp.dirs, check.DeepEquals, []string{"/exclude", "/include", "/include/includew"})
+       c.Check(s.cp.files, check.DeepEquals, []filetodo{
+               {src: s.cp.hostOutputDir + "/include/includew/foo", dst: "/include/includew/foo", size: 3},
+       })
+       c.Check(s.cp.manifest, check.Matches, `(?ms).*\./include/includer .*`)
+       c.Check(s.cp.manifest, check.Not(check.Matches), `(?ms).*exclude.*`)
+       c.Check(s.log.String(), check.Matches, `(?ms).*not copying \\"exclude/excluder\\".*`)
+       c.Check(s.log.String(), check.Matches, `(?ms).*not copying \\"nonexistent/collection\\".*`)
+}
+
 func (s *copierSuite) writeFileInOutputDir(c *check.C, path, data string) {
        f, err := os.OpenFile(s.cp.hostOutputDir+"/"+path, os.O_CREATE|os.O_WRONLY, 0644)
        c.Assert(err, check.IsNil)