2752: Adapt Go tests to the new Python test infrastructure.
[arvados.git] / services / keep / src / arvados.org / keepproxy / keepproxy_test.go
index 256f7f427717ec7d8cafe93d0247baaf3a633ff7..47c33b4e1b2384e724a8b0194957d522de22c3e8 100644 (file)
@@ -2,6 +2,7 @@ package main
 
 import (
        "arvados.org/keepclient"
+       "crypto/md5"
        "crypto/tls"
        "fmt"
        . "gopkg.in/check.v1"
@@ -14,6 +15,7 @@ import (
        "os/exec"
        "strings"
        "testing"
+       "time"
 )
 
 // Gocheck boilerplate
@@ -29,7 +31,7 @@ type ServerRequiredSuite struct{}
 
 func pythonDir() string {
        gopath := os.Getenv("GOPATH")
-       return fmt.Sprintf("%s/../../sdk/python", strings.Split(gopath, ":")[0])
+       return fmt.Sprintf("%s/../../sdk/python/tests", strings.Split(gopath, ":")[0])
 }
 
 func (s *ServerRequiredSuite) SetUpSuite(c *C) {
@@ -37,14 +39,17 @@ func (s *ServerRequiredSuite) SetUpSuite(c *C) {
        defer os.Chdir(cwd)
 
        os.Chdir(pythonDir())
-       exec.Command("python", "run_test_server.py", "start").Run()
-       exec.Command("python", "run_test_server.py", "start_keep").Run()
+
+       if err := exec.Command("python", "run_test_server.py", "start").Run(); err != nil {
+               panic("'python run_test_server.py start' returned error")
+       }
+       if err := exec.Command("python", "run_test_server.py", "start_keep").Run(); err != nil {
+               panic("'python run_test_server.py start_keep' returned error")
+       }
 
        os.Setenv("ARVADOS_API_HOST", "localhost:3001")
        os.Setenv("ARVADOS_API_TOKEN", "4axaw8zxe0qm22wa6urpp5nskcne8z88cvbupv653y1njyi05h")
        os.Setenv("ARVADOS_API_HOST_INSECURE", "true")
-
-       SetupProxyService()
 }
 
 func (s *ServerRequiredSuite) TearDownSuite(c *C) {
@@ -56,7 +61,7 @@ func (s *ServerRequiredSuite) TearDownSuite(c *C) {
        exec.Command("python", "run_test_server.py", "stop").Run()
 }
 
-func SetupProxyService() {
+func setupProxyService() {
 
        client := &http.Client{Transport: &http.Transport{
                TLSClientConfig: &tls.Config{InsecureSkipVerify: true}}}
@@ -94,42 +99,178 @@ func SetupProxyService() {
        }
 }
 
-func (s *ServerRequiredSuite) TestPutAndGet(c *C) {
+func runProxy(c *C, args []string, token string, port int) keepclient.KeepClient {
+       os.Args = append(args, fmt.Sprintf("-listen=:%v", port))
+       os.Setenv("ARVADOS_API_TOKEN", "4axaw8zxe0qm22wa6urpp5nskcne8z88cvbupv653y1njyi05h")
+
+       go main()
+       time.Sleep(100 * time.Millisecond)
+
+       os.Setenv("ARVADOS_KEEP_PROXY", fmt.Sprintf("http://localhost:%v", port))
+       os.Setenv("ARVADOS_API_TOKEN", token)
+       kc, err := keepclient.MakeKeepClient()
+       c.Check(kc.Using_proxy, Equals, true)
+       c.Check(len(kc.ServiceRoots()), Equals, 1)
+       c.Check(kc.ServiceRoots()[0], Equals, fmt.Sprintf("http://localhost:%v", port))
+       c.Check(err, Equals, nil)
+       os.Setenv("ARVADOS_KEEP_PROXY", "")
+       log.Print("keepclient created")
+       return kc
+}
+
+func (s *ServerRequiredSuite) TestPutAskGet(c *C) {
        log.Print("TestPutAndGet start")
 
+       os.Args = []string{"keepproxy", "-listen=:29950"}
+       os.Setenv("ARVADOS_API_TOKEN", "4axaw8zxe0qm22wa6urpp5nskcne8z88cvbupv653y1njyi05h")
+       go main()
+       time.Sleep(100 * time.Millisecond)
+
+       setupProxyService()
+
        os.Setenv("ARVADOS_EXTERNAL_CLIENT", "true")
        kc, err := keepclient.MakeKeepClient()
        c.Check(kc.External, Equals, true)
        c.Check(kc.Using_proxy, Equals, true)
-       c.Check(len(kc.Service_roots), Equals, 1)
-       c.Check(kc.Service_roots[0], Equals, "http://localhost:29950")
+       c.Check(len(kc.ServiceRoots()), Equals, 1)
+       c.Check(kc.ServiceRoots()[0], Equals, "http://localhost:29950")
        c.Check(err, Equals, nil)
        os.Setenv("ARVADOS_EXTERNAL_CLIENT", "")
+       log.Print("keepclient created")
+
+       defer listener.Close()
+
+       hash := fmt.Sprintf("%x", md5.Sum([]byte("foo")))
+       var hash2 string
+
+       {
+               _, _, err := kc.Ask(hash)
+               c.Check(err, Equals, keepclient.BlockNotFound)
+               log.Print("Ask 1")
+       }
+
+       {
+               var rep int
+               var err error
+               hash2, rep, err = kc.PutB([]byte("foo"))
+               c.Check(hash2, Equals, fmt.Sprintf("%s+3", hash))
+               c.Check(rep, Equals, 2)
+               c.Check(err, Equals, nil)
+               log.Print("PutB")
+       }
+
+       {
+               blocklen, _, err := kc.Ask(hash2)
+               c.Assert(err, Equals, nil)
+               c.Check(blocklen, Equals, int64(3))
+               log.Print("Ask 2")
+       }
+
+       {
+               reader, blocklen, _, err := kc.Get(hash2)
+               c.Assert(err, Equals, nil)
+               all, err := ioutil.ReadAll(reader)
+               c.Check(all, DeepEquals, []byte("foo"))
+               c.Check(blocklen, Equals, int64(3))
+               log.Print("Get")
+       }
+
+       log.Print("TestPutAndGet done")
+}
+
+func (s *ServerRequiredSuite) TestPutAskGetForbidden(c *C) {
+       log.Print("TestPutAndGet start")
+
+       kc := runProxy(c, []string{"keepproxy"}, "123abc", 29951)
+       defer listener.Close()
 
        log.Print("keepclient created")
 
-       os.Args = []string{"keepproxy", "-listen=:29950"}
-       go main()
+       hash := fmt.Sprintf("%x", md5.Sum([]byte("bar")))
 
-       log.Print("keepproxy main started")
+       {
+               _, _, err := kc.Ask(hash)
+               c.Check(err, Equals, keepclient.BlockNotFound)
+               log.Print("Ask 1")
+       }
 
-       hash, rep, err2 := kc.PutB([]byte("foo"))
+       {
+               hash2, rep, err := kc.PutB([]byte("bar"))
+               c.Check(hash2, Equals, "")
+               c.Check(rep, Equals, 0)
+               c.Check(err, Equals, keepclient.InsufficientReplicasError)
+               log.Print("PutB")
+       }
 
-       log.Print("PutB")
+       {
+               blocklen, _, err := kc.Ask(hash)
+               c.Assert(err, Equals, keepclient.BlockNotFound)
+               c.Check(blocklen, Equals, int64(0))
+               log.Print("Ask 2")
+       }
 
-       c.Check(rep, Equals, 2)
-       c.Check(err2, Equals, nil)
+       {
+               _, blocklen, _, err := kc.Get(hash)
+               c.Assert(err, Equals, keepclient.BlockNotFound)
+               c.Check(blocklen, Equals, int64(0))
+               log.Print("Get")
+       }
 
-       reader, blocklen, _, err3 := kc.Get(hash)
-       all, err := ioutil.ReadAll(reader)
-       c.Check(all, DeepEquals, []byte("foo"))
-       c.Check(blocklen, Equals, int64(3))
-       c.Check(err3, Equals, nil)
+       log.Print("TestPutAndGetForbidden done")
+}
 
-       log.Print("Get")
+func (s *ServerRequiredSuite) TestGetDisabled(c *C) {
+       log.Print("TestGetDisabled start")
 
-       // Close internal listener socket.
-       listener.Close()
+       kc := runProxy(c, []string{"keepproxy", "-no-get"}, "4axaw8zxe0qm22wa6urpp5nskcne8z88cvbupv653y1njyi05h", 29952)
+       defer listener.Close()
 
-       log.Print("TestPutAndGet done")
+       hash := fmt.Sprintf("%x", md5.Sum([]byte("baz")))
+
+       {
+               _, _, err := kc.Ask(hash)
+               c.Check(err, Equals, keepclient.BlockNotFound)
+               log.Print("Ask 1")
+       }
+
+       {
+               hash2, rep, err := kc.PutB([]byte("baz"))
+               c.Check(hash2, Equals, fmt.Sprintf("%s+3", hash))
+               c.Check(rep, Equals, 2)
+               c.Check(err, Equals, nil)
+               log.Print("PutB")
+       }
+
+       {
+               blocklen, _, err := kc.Ask(hash)
+               c.Assert(err, Equals, keepclient.BlockNotFound)
+               c.Check(blocklen, Equals, int64(0))
+               log.Print("Ask 2")
+       }
+
+       {
+               _, blocklen, _, err := kc.Get(hash)
+               c.Assert(err, Equals, keepclient.BlockNotFound)
+               c.Check(blocklen, Equals, int64(0))
+               log.Print("Get")
+       }
+
+       log.Print("TestGetDisabled done")
+}
+
+func (s *ServerRequiredSuite) TestPutDisabled(c *C) {
+       log.Print("TestPutDisabled start")
+
+       kc := runProxy(c, []string{"keepproxy", "-no-put"}, "4axaw8zxe0qm22wa6urpp5nskcne8z88cvbupv653y1njyi05h", 29953)
+       defer listener.Close()
+
+       {
+               hash2, rep, err := kc.PutB([]byte("quux"))
+               c.Check(hash2, Equals, "")
+               c.Check(rep, Equals, 0)
+               c.Check(err, Equals, keepclient.InsufficientReplicasError)
+               log.Print("PutB")
+       }
+
+       log.Print("TestPutDisabled done")
 }