github.com/keybase/client/go@v0.0.0-20241007131713-f10651d043c8/kbfs/libkbfs/mdserver_test.go (about) 1 // Copyright 2016 Keybase Inc. All rights reserved. 2 // Use of this source code is governed by a BSD 3 // license that can be found in the LICENSE file. 4 5 package libkbfs 6 7 import ( 8 "testing" 9 "time" 10 11 "github.com/keybase/client/go/kbfs/kbfscodec" 12 "github.com/keybase/client/go/kbfs/kbfscrypto" 13 "github.com/keybase/client/go/kbfs/kbfsmd" 14 "github.com/keybase/client/go/kbfs/tlf" 15 "github.com/keybase/client/go/protocol/keybase1" 16 "github.com/stretchr/testify/require" 17 18 "golang.org/x/net/context" 19 ) 20 21 func makeBRMDForTest(t *testing.T, codec kbfscodec.Codec, 22 id tlf.ID, h tlf.Handle, revision kbfsmd.Revision, uid keybase1.UID, 23 prevRoot kbfsmd.ID) *kbfsmd.RootMetadataV2 { 24 var md kbfsmd.RootMetadataV2 25 // MDv3 TODO: uncomment the below when we're ready for MDv3 26 // md := &kbfsmd.RootMetadataV3{} 27 md.SetTlfID(id) 28 md.SetSerializedPrivateMetadata([]byte{0x1}) 29 md.SetRevision(revision) 30 md.SetLastModifyingWriter(uid) 31 md.SetLastModifyingUser(uid) 32 kbfsmd.FakeInitialRekey(&md, h, kbfscrypto.TLFPublicKey{}) 33 md.SetPrevRoot(prevRoot) 34 return &md 35 } 36 37 func signRMDSForTest( 38 t *testing.T, codec kbfscodec.Codec, signer kbfscrypto.Signer, 39 brmd *kbfsmd.RootMetadataV2) *RootMetadataSigned { 40 ctx := context.Background() 41 42 // Encode and sign writer metadata. 43 err := brmd.SignWriterMetadataInternally(ctx, codec, signer) 44 require.NoError(t, err) 45 46 rmds, err := SignBareRootMetadata( 47 ctx, codec, signer, signer, brmd, time.Time{}) 48 require.NoError(t, err) 49 50 return rmds 51 } 52 53 // This should pass for both local and remote servers. 54 func TestMDServerBasics(t *testing.T) { 55 // setup 56 ctx := context.Background() 57 config := MakeTestConfigOrBust(t, "test_user") 58 defer CheckConfigAndShutdown(ctx, t, config) 59 mdServer := config.MDServer() 60 61 session, err := config.KBPKI().GetCurrentSession(ctx) 62 require.NoError(t, err) 63 uid := session.UID 64 65 // (1) get metadata -- allocates an ID 66 h, err := tlf.MakeHandle( 67 []keybase1.UserOrTeamID{uid.AsUserOrTeam()}, nil, nil, nil, nil) 68 require.NoError(t, err) 69 70 id, rmds, err := mdServer.GetForHandle(ctx, h, kbfsmd.Merged, nil) 71 require.NoError(t, err) 72 require.Nil(t, rmds) 73 74 // (2) push some new metadata blocks 75 prevRoot := kbfsmd.ID{} 76 middleRoot := kbfsmd.ID{} 77 for i := kbfsmd.Revision(1); i <= 10; i++ { 78 brmd := makeBRMDForTest(t, config.Codec(), id, h, i, uid, prevRoot) 79 rmds := signRMDSForTest(t, config.Codec(), config.Crypto(), brmd) 80 // MDv3 TODO: pass actual key bundles 81 err = mdServer.Put(ctx, rmds, nil, nil, keybase1.MDPriorityNormal) 82 require.NoError(t, err) 83 prevRoot, err = kbfsmd.MakeID(config.Codec(), rmds.MD) 84 require.NoError(t, err) 85 if i == 5 { 86 middleRoot = prevRoot 87 } 88 } 89 90 // (3) trigger a conflict 91 brmd := makeBRMDForTest(t, config.Codec(), id, h, 10, uid, prevRoot) 92 rmds = signRMDSForTest(t, config.Codec(), config.Crypto(), brmd) 93 // MDv3 TODO: pass actual key bundles 94 err = mdServer.Put(ctx, rmds, nil, nil, keybase1.MDPriorityNormal) 95 require.IsType(t, kbfsmd.ServerErrorConflictRevision{}, err) 96 97 // (4) push some new unmerged metadata blocks linking to the 98 // middle merged block. 99 prevRoot = middleRoot 100 bid, err := config.Crypto().MakeRandomBranchID() 101 require.NoError(t, err) 102 for i := kbfsmd.Revision(6); i < 41; i++ { 103 brmd := makeBRMDForTest(t, config.Codec(), id, h, i, uid, prevRoot) 104 brmd.SetUnmerged() 105 brmd.SetBranchID(bid) 106 rmds := signRMDSForTest(t, config.Codec(), config.Crypto(), brmd) 107 // MDv3 TODO: pass actual key bundles 108 err = mdServer.Put(ctx, rmds, nil, nil, keybase1.MDPriorityNormal) 109 require.NoError(t, err) 110 prevRoot, err = kbfsmd.MakeID(config.Codec(), rmds.MD) 111 require.NoError(t, err) 112 } 113 114 // (5) check for proper unmerged head 115 head, err := mdServer.GetForTLF(ctx, id, bid, kbfsmd.Unmerged, nil) 116 require.NoError(t, err) 117 require.NotNil(t, head) 118 require.Equal(t, kbfsmd.Revision(40), head.MD.RevisionNumber()) 119 120 // (6a) try to get unmerged range 121 rmdses, err := mdServer.GetRange(ctx, id, bid, kbfsmd.Unmerged, 1, 100, nil) 122 require.NoError(t, err) 123 require.Equal(t, 35, len(rmdses)) 124 for i := kbfsmd.Revision(6); i < 41; i++ { 125 require.Equal(t, i, rmdses[i-6].MD.RevisionNumber()) 126 } 127 128 // (6b) try to get unmerged range subset. 129 rmdses, err = mdServer.GetRange(ctx, id, bid, kbfsmd.Unmerged, 7, 14, nil) 130 require.NoError(t, err) 131 require.Equal(t, 8, len(rmdses)) 132 for i := kbfsmd.Revision(7); i <= 14; i++ { 133 require.Equal(t, i, rmdses[i-7].MD.RevisionNumber()) 134 } 135 136 // (7) prune unmerged 137 err = mdServer.PruneBranch(ctx, id, bid) 138 require.NoError(t, err) 139 140 // (8) verify head is pruned 141 head, err = mdServer.GetForTLF(ctx, id, kbfsmd.NullBranchID, kbfsmd.Unmerged, nil) 142 require.NoError(t, err) 143 require.Nil(t, head) 144 145 // (9) verify revision history is pruned 146 rmdses, err = mdServer.GetRange(ctx, id, kbfsmd.NullBranchID, kbfsmd.Unmerged, 1, 100, nil) 147 require.NoError(t, err) 148 require.Equal(t, 0, len(rmdses)) 149 150 // (10) check for proper merged head 151 head, err = mdServer.GetForTLF(ctx, id, kbfsmd.NullBranchID, kbfsmd.Merged, nil) 152 require.NoError(t, err) 153 require.NotNil(t, head) 154 require.Equal(t, kbfsmd.Revision(10), head.MD.RevisionNumber()) 155 156 // (11) try to get merged range 157 rmdses, err = mdServer.GetRange(ctx, id, kbfsmd.NullBranchID, kbfsmd.Merged, 1, 100, nil) 158 require.NoError(t, err) 159 require.Equal(t, 10, len(rmdses)) 160 for i := kbfsmd.Revision(1); i <= 10; i++ { 161 require.Equal(t, i, rmdses[i-1].MD.RevisionNumber()) 162 } 163 } 164 165 // This should pass for both local and remote servers. Make sure that 166 // registering multiple TLFs for updates works. This is a regression 167 // test for https://keybase.atlassian.net/browse/KBFS-467 . 168 func TestMDServerRegisterForUpdate(t *testing.T) { 169 // setup 170 ctx := context.Background() 171 config := MakeTestConfigOrBust(t, "test_user") 172 defer CheckConfigAndShutdown(ctx, t, config) 173 mdServer := config.MDServer() 174 175 session, err := config.KBPKI().GetCurrentSession(ctx) 176 require.NoError(t, err) 177 id := session.UID.AsUserOrTeam() 178 179 // Create first TLF. 180 h1, err := tlf.MakeHandle([]keybase1.UserOrTeamID{id}, nil, nil, nil, nil) 181 require.NoError(t, err) 182 183 id1, _, err := mdServer.GetForHandle(ctx, h1, kbfsmd.Merged, nil) 184 require.NoError(t, err) 185 186 // Create second TLF, which should end up being different from 187 // the first one. 188 h2, err := tlf.MakeHandle([]keybase1.UserOrTeamID{id}, 189 []keybase1.UserOrTeamID{keybase1.UserOrTeamID(keybase1.PUBLIC_UID)}, 190 nil, nil, nil) 191 require.NoError(t, err) 192 193 id2, _, err := mdServer.GetForHandle(ctx, h2, kbfsmd.Merged, nil) 194 require.NoError(t, err) 195 require.NotEqual(t, id1, id2) 196 197 _, err = mdServer.RegisterForUpdate(ctx, id1, kbfsmd.RevisionInitial) 198 require.NoError(t, err) 199 200 _, err = mdServer.RegisterForUpdate(ctx, id2, kbfsmd.RevisionInitial) 201 require.NoError(t, err) 202 }