github.com/keybase/client/go@v0.0.0-20241007131713-f10651d043c8/kbfs/libkbfs/test_common.go (about)

     1  // Copyright 2016 Keybase Inc. All rights reserved.
     2  // Use of this source code is governed by a BSD
     3  // license that can be found in the LICENSE file.
     4  
     5  package libkbfs
     6  
     7  import (
     8  	"fmt"
     9  	"net"
    10  	"os"
    11  	"time"
    12  
    13  	"github.com/keybase/client/go/externals"
    14  	"github.com/keybase/client/go/kbfs/data"
    15  	"github.com/keybase/client/go/kbfs/env"
    16  	"github.com/keybase/client/go/kbfs/idutil"
    17  	"github.com/keybase/client/go/kbfs/kbfscrypto"
    18  	"github.com/keybase/client/go/kbfs/kbfsmd"
    19  	"github.com/keybase/client/go/kbfs/libkey"
    20  	"github.com/keybase/client/go/kbfs/tlf"
    21  	"github.com/keybase/client/go/kbfs/tlfhandle"
    22  	kbname "github.com/keybase/client/go/kbun"
    23  	"github.com/keybase/client/go/libkb"
    24  	"github.com/keybase/client/go/logger"
    25  	"github.com/keybase/client/go/protocol/keybase1"
    26  	"github.com/keybase/go-framed-msgpack-rpc/rpc"
    27  	"github.com/pkg/errors"
    28  	"github.com/stretchr/testify/assert"
    29  	"golang.org/x/net/context"
    30  )
    31  
    32  const (
    33  	// EnvTestMDServerAddr is the environment variable name for an
    34  	// mdserver address.
    35  	EnvTestMDServerAddr = "KEYBASE_TEST_MDSERVER_ADDR"
    36  	// EnvTestBServerAddr is the environment variable name for a block
    37  	// server address.
    38  	EnvTestBServerAddr = "KEYBASE_TEST_BSERVER_ADDR"
    39  	// TempdirServerAddr is the special value of the
    40  	// EnvTest{B,MD}ServerAddr environment value to signify that
    41  	// an on-disk implementation of the {b,md}server should be
    42  	// used with a temporary directory.
    43  	TempdirServerAddr = "tempdir"
    44  )
    45  
    46  // newConfigForTest returns a ConfigLocal object suitable for use by
    47  // MakeTestConfigOrBust or ConfigAsUser.
    48  //
    49  // TODO: Move more common code here.
    50  func newConfigForTest(modeType InitModeType, loggerFn func(module string) logger.Logger) *ConfigLocal {
    51  	mode := modeTest{NewInitModeFromType(modeType)}
    52  	g := &libkb.GlobalContext{
    53  		// Env is needed by simplefs.
    54  		Env: libkb.NewEnv(nil, nil, func() logger.Logger {
    55  			return loggerFn("G")
    56  		}),
    57  	}
    58  	g.MobileAppState = libkb.NewMobileAppState(g)
    59  	config := NewConfigLocal(mode, loggerFn, "", DiskCacheModeOff, env.NewContextFromGlobalContext(g))
    60  	config.SetVLogLevel(libkb.VLog1String)
    61  
    62  	bops := NewBlockOpsStandard(
    63  		config, testBlockRetrievalWorkerQueueSize, testPrefetchWorkerQueueSize,
    64  		0, env.EmptyAppStateUpdater{})
    65  	config.SetBlockOps(bops)
    66  
    67  	bsplit, err := data.NewBlockSplitterSimpleExact(
    68  		64*1024, 64*1024/int(data.BPSize), 8*1024)
    69  	if err != nil {
    70  		panic(err)
    71  	}
    72  	err = bsplit.SetMaxDirEntriesByBlockSize(config.Codec())
    73  	if err != nil {
    74  		panic(err)
    75  	}
    76  	config.SetBlockSplitter(bsplit)
    77  
    78  	return config
    79  }
    80  
    81  // MakeTestBlockServerOrBust makes a block server from the given
    82  // arguments and environment variables.
    83  func MakeTestBlockServerOrBust(t logger.TestLogBackend, c *ConfigLocal,
    84  	config blockServerRemoteConfig,
    85  	rpcLogFactory rpc.LogFactory) BlockServer {
    86  	// see if a local remote server is specified
    87  	bserverAddr := os.Getenv(EnvTestBServerAddr)
    88  	switch {
    89  	case bserverAddr == TempdirServerAddr:
    90  		var err error
    91  		blockServer, err := NewBlockServerTempDir(config.Codec(), config.MakeLogger(""))
    92  		if err != nil {
    93  			t.Fatal(err)
    94  		}
    95  		return blockServer
    96  
    97  	case len(bserverAddr) != 0:
    98  		remote, err := rpc.ParsePrioritizedRoundRobinRemote(bserverAddr)
    99  		if err != nil {
   100  			t.Fatal(err)
   101  		}
   102  		return NewBlockServerRemote(c.kbCtx, config, remote, rpcLogFactory)
   103  
   104  	default:
   105  		return NewBlockServerMemory(config.MakeLogger(""))
   106  	}
   107  }
   108  
   109  // TODO: Put the below code (also duplicated in kbfs-server) somewhere
   110  // in rpc and use that instead.
   111  
   112  type testLogger interface {
   113  	Logf(format string, args ...interface{})
   114  }
   115  
   116  type testLogOutput struct {
   117  	t testLogger
   118  }
   119  
   120  func (t testLogOutput) log(ch string, fmts string, args []interface{}) {
   121  	fmts = fmt.Sprintf("[%s] %s", ch, fmts)
   122  	t.t.Logf(fmts, args...)
   123  }
   124  
   125  func (t testLogOutput) Info(fmt string, args ...interface{})    { t.log("I", fmt, args) }
   126  func (t testLogOutput) Error(fmt string, args ...interface{})   { t.log("E", fmt, args) }
   127  func (t testLogOutput) Debug(fmt string, args ...interface{})   { t.log("D", fmt, args) }
   128  func (t testLogOutput) Warning(fmt string, args ...interface{}) { t.log("W", fmt, args) }
   129  func (t testLogOutput) Profile(fmt string, args ...interface{}) { t.log("P", fmt, args) }
   130  
   131  func newTestRPCLogFactory(t testLogger) rpc.LogFactory {
   132  	return rpc.NewSimpleLogFactory(testLogOutput{t}, nil)
   133  }
   134  
   135  // MakeTestConfigOrBustLoggedInWithMode creates and returns a config
   136  // suitable for unit-testing with the given mode and list of
   137  // users. loggedInIndex specifies the index (in the list) of the user
   138  // being logged in.
   139  func MakeTestConfigOrBustLoggedInWithMode(
   140  	t logger.TestLogBackend, loggedInIndex int,
   141  	mode InitModeType, users ...kbname.NormalizedUsername) *ConfigLocal {
   142  	log := logger.NewTestLogger(t)
   143  	config := newConfigForTest(mode, func(m string) logger.Logger {
   144  		return log
   145  	})
   146  
   147  	initDoneCh := make(chan struct{})
   148  	kbfsOps := NewKBFSOpsStandard(
   149  		env.EmptyAppStateUpdater{}, config, initDoneCh)
   150  	defer close(initDoneCh)
   151  	config.SetKBFSOps(kbfsOps)
   152  	config.SetNotifier(kbfsOps)
   153  
   154  	config.SetKeyManager(NewKeyManagerStandard(config))
   155  	config.SetMDOps(NewMDOpsStandard(config))
   156  
   157  	localUsers := idutil.MakeLocalUsers(users)
   158  	loggedInUser := localUsers[loggedInIndex]
   159  
   160  	daemon := NewKeybaseDaemonMemory(loggedInUser.UID, localUsers, nil,
   161  		config.Codec())
   162  	config.SetKeybaseService(daemon)
   163  	config.SetChat(newChatLocal(config))
   164  
   165  	kbpki := NewKBPKIClient(config, config.MakeLogger(""))
   166  	config.SetKBPKI(kbpki)
   167  
   168  	kbfsOps.favs.Initialize(context.TODO())
   169  
   170  	signingKey := idutil.MakeLocalUserSigningKeyOrBust(loggedInUser.Name)
   171  	cryptPrivateKey := idutil.MakeLocalUserCryptPrivateKeyOrBust(
   172  		loggedInUser.Name)
   173  	crypto := NewCryptoLocal(
   174  		config.Codec(), signingKey, cryptPrivateKey, config)
   175  	config.SetCrypto(crypto)
   176  
   177  	blockServer := MakeTestBlockServerOrBust(
   178  		t, config, config, newTestRPCLogFactory(t))
   179  	config.SetBlockServer(blockServer)
   180  
   181  	// see if a local remote server is specified
   182  	mdServerAddr := os.Getenv(EnvTestMDServerAddr)
   183  	var mdServer MDServer
   184  	var keyServer libkey.KeyServer
   185  	switch {
   186  	case mdServerAddr == TempdirServerAddr:
   187  		var err error
   188  		mdServer, err = NewMDServerTempDir(
   189  			mdServerLocalConfigAdapter{config})
   190  		if err != nil {
   191  			t.Fatal(err)
   192  		}
   193  		keyServer, err = libkey.NewKeyServerTempDir(
   194  			keyOpsConfigWrapper{config}, log)
   195  		if err != nil {
   196  			t.Fatal(err)
   197  		}
   198  
   199  	case len(mdServerAddr) != 0:
   200  		remote, err := rpc.ParsePrioritizedRoundRobinRemote(mdServerAddr)
   201  		if err != nil {
   202  			t.Fatal(err)
   203  		}
   204  		// connect to server
   205  		mdServer = NewMDServerRemote(config.kbCtx, config, remote, newTestRPCLogFactory(t))
   206  		// for now the MD server acts as the key server in production
   207  		keyServer = mdServer.(*MDServerRemote)
   208  
   209  	default:
   210  		var err error
   211  		// create in-memory server shim
   212  		mdServer, err = NewMDServerMemory(
   213  			mdServerLocalConfigAdapter{config})
   214  		if err != nil {
   215  			t.Fatal(err)
   216  		}
   217  		// shim for the key server too
   218  		keyServer, err = libkey.NewKeyServerMemory(
   219  			keyOpsConfigWrapper{config}, log)
   220  		if err != nil {
   221  			t.Fatal(err)
   222  		}
   223  	}
   224  	config.SetMDServer(mdServer)
   225  	config.SetKeyServer(keyServer)
   226  
   227  	// turn off background flushing by default during tests
   228  	config.noBGFlush = true
   229  
   230  	configs := []Config{config}
   231  	config.allKnownConfigsForTesting = &configs
   232  
   233  	return config
   234  }
   235  
   236  // MakeTestConfigOrBustLoggedIn creates and returns a config suitable for
   237  // unit-testing with the given list of users. loggedInIndex specifies the
   238  // index (in the list) of the user being logged in.
   239  func MakeTestConfigOrBustLoggedIn(t logger.TestLogBackend, loggedInIndex int,
   240  	users ...kbname.NormalizedUsername) *ConfigLocal {
   241  	return MakeTestConfigOrBustLoggedInWithMode(
   242  		t, loggedInIndex, InitDefault, users...)
   243  }
   244  
   245  // MakeTestConfigOrBust creates and returns a config suitable for
   246  // unit-testing with the given list of users.
   247  func MakeTestConfigOrBust(t logger.TestLogBackend,
   248  	users ...kbname.NormalizedUsername) *ConfigLocal {
   249  	return MakeTestConfigOrBustLoggedIn(t, 0, users...)
   250  }
   251  
   252  // ConfigAsUserWithMode clones a test configuration in the given mode,
   253  // setting another user as the logged in user.  Journaling will not be
   254  // enabled in the returned Config, regardless of the journal status in
   255  // `config`.
   256  func ConfigAsUserWithMode(config *ConfigLocal,
   257  	loggedInUser kbname.NormalizedUsername, mode InitModeType) *ConfigLocal {
   258  	c := newConfigForTest(mode, config.loggerFn)
   259  	c.SetMetadataVersion(config.MetadataVersion())
   260  	c.SetRekeyWithPromptWaitTime(config.RekeyWithPromptWaitTime())
   261  
   262  	initDoneCh := make(chan struct{})
   263  	kbfsOps := NewKBFSOpsStandard(env.EmptyAppStateUpdater{}, c, initDoneCh)
   264  	defer close(initDoneCh)
   265  	c.SetKBFSOps(kbfsOps)
   266  	c.SetNotifier(kbfsOps)
   267  
   268  	c.SetKeyManager(NewKeyManagerStandard(c))
   269  	c.SetMDOps(NewMDOpsStandard(c))
   270  	c.SetClock(config.Clock())
   271  
   272  	if chatLocal, ok := config.Chat().(*chatLocal); ok {
   273  		c.SetChat(chatLocal.copy(c))
   274  	} else {
   275  		c.SetChat(config.Chat())
   276  	}
   277  
   278  	daemon := config.KeybaseService().(*KeybaseDaemonLocal)
   279  	loggedInUID, ok := daemon.GetIDForAssertion(string(loggedInUser))
   280  	if !ok {
   281  		panic("bad test: unknown user: " + loggedInUser)
   282  	}
   283  
   284  	localUsers := daemon.GetLocalUsers()
   285  	newDaemon := NewKeybaseDaemonMemory(
   286  		loggedInUID.AsUserOrBust(), localUsers, nil, c.Codec())
   287  	c.SetKeybaseService(newDaemon)
   288  	c.SetKBPKI(NewKBPKIClient(c, c.MakeLogger("")))
   289  	kbfsOps.favs.InitForTest()
   290  
   291  	signingKey := idutil.MakeLocalUserSigningKeyOrBust(loggedInUser)
   292  	cryptPrivateKey := idutil.MakeLocalUserCryptPrivateKeyOrBust(loggedInUser)
   293  	crypto := NewCryptoLocal(
   294  		config.Codec(), signingKey, cryptPrivateKey, config)
   295  	c.SetCrypto(crypto)
   296  	c.noBGFlush = config.noBGFlush
   297  
   298  	if s, ok := config.BlockServer().(*BlockServerRemote); ok {
   299  		remote, err := rpc.ParsePrioritizedRoundRobinRemote(s.RemoteAddress())
   300  		if err != nil {
   301  			panic(err)
   302  		}
   303  		blockServer := NewBlockServerRemote(c.kbCtx, c, remote, s.putConn.rpcLogFactory)
   304  		c.SetBlockServer(blockServer)
   305  	} else {
   306  		c.SetBlockServer(config.BlockServer())
   307  	}
   308  
   309  	// If journaling was on in `config`, disable it in `c`.
   310  	jManager, err := GetJournalManager(config)
   311  	if err == nil {
   312  		c.SetBlockServer(jManager.delegateBlockServer)
   313  	}
   314  
   315  	var mdServer MDServer
   316  	var keyServer libkey.KeyServer
   317  	if s, ok := config.MDServer().(*MDServerRemote); ok {
   318  		remote, err := rpc.ParsePrioritizedRoundRobinRemote(s.RemoteAddress())
   319  		if err != nil {
   320  			panic(err)
   321  		}
   322  		// connect to server
   323  		mdServer = NewMDServerRemote(c.kbCtx, c, remote, s.rpcLogFactory)
   324  		// for now the MD server also acts as the key server.
   325  		keyServer = mdServer.(*MDServerRemote)
   326  	} else {
   327  		// copy the existing mdServer but update the config
   328  		// this way the current device key is paired with
   329  		// the proper user yet the DB state is all shared.
   330  		mdServerToCopy := config.MDServer().(mdServerLocal)
   331  		mdServer = mdServerToCopy.copy(mdServerLocalConfigAdapter{c})
   332  
   333  		// use the same db but swap configs
   334  		keyServerToCopy := config.KeyServer().(*libkey.KeyServerLocal)
   335  		keyServer = keyServerToCopy.CopyWithConfigAndLogger(
   336  			keyOpsConfigWrapper{c}, c.MakeLogger(""))
   337  	}
   338  	c.SetMDServer(mdServer)
   339  	c.SetKeyServer(keyServer)
   340  
   341  	// Keep track of all the other configs in a shared slice.
   342  	c.allKnownConfigsForTesting = config.allKnownConfigsForTesting
   343  	*c.allKnownConfigsForTesting = append(*c.allKnownConfigsForTesting, c)
   344  
   345  	return c
   346  }
   347  
   348  // ConfigAsUser clones a test configuration in default init mode,
   349  // setting another user as the logged in user.  Journaling will not be
   350  // enabled in the returned Config, regardless of the journal status in
   351  // `config`.
   352  func ConfigAsUser(config *ConfigLocal,
   353  	loggedInUser kbname.NormalizedUsername) *ConfigLocal {
   354  	c := ConfigAsUserWithMode(config, loggedInUser, config.Mode().Type())
   355  	c.SetMode(config.mode) // preserve any unusual test mode wrappers
   356  	return c
   357  }
   358  
   359  // NewEmptyTLFWriterKeyBundle creates a new empty kbfsmd.TLFWriterKeyBundleV2
   360  func NewEmptyTLFWriterKeyBundle() kbfsmd.TLFWriterKeyBundleV2 {
   361  	return kbfsmd.TLFWriterKeyBundleV2{
   362  		WKeys: make(kbfsmd.UserDeviceKeyInfoMapV2),
   363  	}
   364  }
   365  
   366  // NewEmptyTLFReaderKeyBundle creates a new empty kbfsmd.TLFReaderKeyBundleV2
   367  func NewEmptyTLFReaderKeyBundle() kbfsmd.TLFReaderKeyBundleV2 {
   368  	return kbfsmd.TLFReaderKeyBundleV2{
   369  		RKeys: make(kbfsmd.UserDeviceKeyInfoMapV2),
   370  	}
   371  }
   372  
   373  func keySaltForUserDevice(name kbname.NormalizedUsername,
   374  	index int) kbname.NormalizedUsername {
   375  	if index > 0 {
   376  		// We can't include the device index when it's 0, because we
   377  		// have to match what's done in MakeLocalUsers.
   378  		return kbname.NormalizedUsername(string(name) + " " + fmt.Sprint(index))
   379  	}
   380  	return name
   381  }
   382  
   383  func makeFakeKeys(name kbname.NormalizedUsername, index int) (
   384  	kbfscrypto.CryptPublicKey, kbfscrypto.VerifyingKey) {
   385  	keySalt := keySaltForUserDevice(name, index)
   386  	newCryptPublicKey := idutil.MakeLocalUserCryptPublicKeyOrBust(keySalt)
   387  	newVerifyingKey := idutil.MakeLocalUserVerifyingKeyOrBust(keySalt)
   388  	return newCryptPublicKey, newVerifyingKey
   389  }
   390  
   391  // AddDeviceForLocalUserOrBust creates a new device for a user and
   392  // returns the index for that device.
   393  func AddDeviceForLocalUserOrBust(t logger.TestLogBackend, config Config,
   394  	uid keybase1.UID) int {
   395  	kbd, ok := config.KeybaseService().(*KeybaseDaemonLocal)
   396  	if !ok {
   397  		t.Fatal("Bad keybase daemon")
   398  	}
   399  
   400  	index, err := kbd.addDeviceForTesting(uid, makeFakeKeys)
   401  	if err != nil {
   402  		t.Fatal(err.Error())
   403  	}
   404  	return index
   405  }
   406  
   407  // RevokeDeviceForLocalUserOrBust revokes a device for a user in the
   408  // given index.
   409  func RevokeDeviceForLocalUserOrBust(t logger.TestLogBackend, config Config,
   410  	uid keybase1.UID, index int) {
   411  	kbd, ok := config.KeybaseService().(*KeybaseDaemonLocal)
   412  	if !ok {
   413  		t.Fatal("Bad keybase daemon")
   414  	}
   415  
   416  	if err := kbd.revokeDeviceForTesting(
   417  		config.Clock(), uid, index); err != nil {
   418  		t.Fatal(err.Error())
   419  	}
   420  }
   421  
   422  // SwitchDeviceForLocalUserOrBust switches the current user's current device
   423  func SwitchDeviceForLocalUserOrBust(t logger.TestLogBackend, config Config, index int) {
   424  	session, err := config.KBPKI().GetCurrentSession(context.Background())
   425  	if err != nil {
   426  		t.Fatalf("Couldn't get UID: %+v", err)
   427  	}
   428  
   429  	kbd, ok := config.KeybaseService().(*KeybaseDaemonLocal)
   430  	if !ok {
   431  		t.Fatal("Bad keybase daemon")
   432  	}
   433  
   434  	if err := kbd.switchDeviceForTesting(session.UID, index); err != nil {
   435  		t.Fatal(err.Error())
   436  	}
   437  
   438  	if _, ok := config.Crypto().(*CryptoLocal); !ok {
   439  		t.Fatal("Bad crypto")
   440  	}
   441  
   442  	keySalt := keySaltForUserDevice(session.Name, index)
   443  	signingKey := idutil.MakeLocalUserSigningKeyOrBust(keySalt)
   444  	cryptPrivateKey := idutil.MakeLocalUserCryptPrivateKeyOrBust(keySalt)
   445  	config.SetCrypto(
   446  		NewCryptoLocal(config.Codec(), signingKey, cryptPrivateKey, config))
   447  }
   448  
   449  // AddNewAssertionForTest makes newAssertion, which should be a single
   450  // assertion that doesn't already resolve to anything, resolve to the
   451  // same UID as oldAssertion, which should be an arbitrary assertion
   452  // that does already resolve to something.  It only applies to the
   453  // given config.
   454  func AddNewAssertionForTest(
   455  	config Config, oldAssertion, newAssertion string) error {
   456  	kbd, ok := config.KeybaseService().(*KeybaseDaemonLocal)
   457  	if !ok {
   458  		return errors.New("Bad keybase daemon")
   459  	}
   460  
   461  	uid, err := kbd.AddNewAssertionForTest(oldAssertion, newAssertion)
   462  	if err != nil {
   463  		return err
   464  	}
   465  
   466  	// Let the mdserver know about the name change
   467  	md, ok := config.MDServer().(mdServerLocal)
   468  	if !ok {
   469  		return errors.New("Bad md server")
   470  	}
   471  	// If this function is called multiple times for different
   472  	// configs, it may end up invoking the following call more than
   473  	// once on the shared md databases.  That's ok though, it's an
   474  	// idempotent call.
   475  	newSocialAssertion, ok := externals.NormalizeSocialAssertionStatic(context.Background(), newAssertion)
   476  	if !ok {
   477  		return errors.Errorf("%s couldn't be parsed as a social assertion", newAssertion)
   478  	}
   479  	if err := md.addNewAssertionForTest(uid, newSocialAssertion); err != nil {
   480  		return errors.Errorf("Couldn't update md server: %+v", err)
   481  	}
   482  	return nil
   483  }
   484  
   485  // AddNewAssertionForTestOrBust is like AddNewAssertionForTest, but
   486  // dies if there's an error.
   487  func AddNewAssertionForTestOrBust(t logger.TestLogBackend, config Config,
   488  	oldAssertion, newAssertion string) {
   489  	err := AddNewAssertionForTest(config, oldAssertion, newAssertion)
   490  	if err != nil {
   491  		t.Fatal(err)
   492  	}
   493  }
   494  
   495  // AddTeamWriterForTest makes the given user a team writer.
   496  func AddTeamWriterForTest(
   497  	config Config, tid keybase1.TeamID, uid keybase1.UID) error {
   498  	kbd, ok := config.KeybaseService().(*KeybaseDaemonLocal)
   499  	if !ok {
   500  		return errors.New("Bad keybase daemon")
   501  	}
   502  
   503  	return kbd.addTeamWriterForTest(tid, uid)
   504  }
   505  
   506  // AddTeamWriterForTestOrBust is like AddTeamWriterForTest, but
   507  // dies if there's an error.
   508  func AddTeamWriterForTestOrBust(t logger.TestLogBackend, config Config,
   509  	tid keybase1.TeamID, uid keybase1.UID) {
   510  	err := AddTeamWriterForTest(config, tid, uid)
   511  	if err != nil {
   512  		t.Fatal(err)
   513  	}
   514  }
   515  
   516  // RemoveTeamWriterForTest removes the given user from a team.
   517  func RemoveTeamWriterForTest(
   518  	config Config, tid keybase1.TeamID, uid keybase1.UID) error {
   519  	kbd, ok := config.KeybaseService().(*KeybaseDaemonLocal)
   520  	if !ok {
   521  		return errors.New("Bad keybase daemon")
   522  	}
   523  
   524  	return kbd.removeTeamWriterForTest(tid, uid)
   525  }
   526  
   527  // RemoveTeamWriterForTestOrBust is like RemoveTeamWriterForTest, but
   528  // dies if there's an error.
   529  func RemoveTeamWriterForTestOrBust(t logger.TestLogBackend, config Config,
   530  	tid keybase1.TeamID, uid keybase1.UID) {
   531  	err := RemoveTeamWriterForTest(config, tid, uid)
   532  	if err != nil {
   533  		t.Fatal(err)
   534  	}
   535  }
   536  
   537  // AddTeamReaderForTest makes the given user a team reader.
   538  func AddTeamReaderForTest(
   539  	config Config, tid keybase1.TeamID, uid keybase1.UID) error {
   540  	kbd, ok := config.KeybaseService().(*KeybaseDaemonLocal)
   541  	if !ok {
   542  		return errors.New("Bad keybase daemon")
   543  	}
   544  
   545  	return kbd.addTeamReaderForTest(tid, uid)
   546  }
   547  
   548  // AddTeamReaderForTestOrBust is like AddTeamWriterForTest, but
   549  // dies if there's an error.
   550  func AddTeamReaderForTestOrBust(t logger.TestLogBackend, config Config,
   551  	tid keybase1.TeamID, uid keybase1.UID) {
   552  	err := AddTeamReaderForTest(config, tid, uid)
   553  	if err != nil {
   554  		t.Fatal(err)
   555  	}
   556  }
   557  
   558  // AddTeamKeyForTest adds a new key for the given team.
   559  func AddTeamKeyForTest(config Config, tid keybase1.TeamID) error {
   560  	kbd, ok := config.KeybaseService().(*KeybaseDaemonLocal)
   561  	if !ok {
   562  		return errors.New("Bad keybase daemon")
   563  	}
   564  
   565  	ti, err := kbd.LoadTeamPlusKeys(
   566  		context.Background(), tid, tlf.Unknown, kbfsmd.UnspecifiedKeyGen,
   567  		keybase1.UserVersion{}, kbfscrypto.VerifyingKey{},
   568  		keybase1.TeamRole_NONE, keybase1.OfflineAvailability_NONE)
   569  	if err != nil {
   570  		return err
   571  	}
   572  	newKeyGen := ti.LatestKeyGen + 1
   573  	newKey := idutil.MakeLocalTLFCryptKeyOrBust(
   574  		tlf.SingleTeam.String()+"/"+string(ti.Name),
   575  		newKeyGen)
   576  	return kbd.AddTeamKeyForTest(tid, newKeyGen, newKey)
   577  }
   578  
   579  // AddTeamKeyForTestOrBust is like AddTeamKeyForTest, but
   580  // dies if there's an error.
   581  func AddTeamKeyForTestOrBust(t logger.TestLogBackend, config Config,
   582  	tid keybase1.TeamID) {
   583  	err := AddTeamKeyForTest(config, tid)
   584  	if err != nil {
   585  		t.Fatal(err)
   586  	}
   587  }
   588  
   589  // AddEmptyTeamsForTest creates teams for the given names with empty
   590  // membership lists.
   591  func AddEmptyTeamsForTest(
   592  	config Config, teams ...kbname.NormalizedUsername) ([]idutil.TeamInfo, error) {
   593  	teamInfos := idutil.MakeLocalTeams(teams)
   594  
   595  	kbd, ok := config.KeybaseService().(*KeybaseDaemonLocal)
   596  	if !ok {
   597  		return nil, errors.New("Bad keybase daemon")
   598  	}
   599  
   600  	kbd.addTeamsForTest(teamInfos)
   601  	return teamInfos, nil
   602  }
   603  
   604  // AddEmptyTeamsForTestOrBust is like AddEmptyTeamsForTest, but dies
   605  // if there's an error.
   606  func AddEmptyTeamsForTestOrBust(t logger.TestLogBackend,
   607  	config Config, teams ...kbname.NormalizedUsername) []idutil.TeamInfo {
   608  	teamInfos, err := AddEmptyTeamsForTest(config, teams...)
   609  	if err != nil {
   610  		t.Fatal(err)
   611  	}
   612  	return teamInfos
   613  }
   614  
   615  // AddImplicitTeamForTest adds an implicit team with a TLF ID.
   616  func AddImplicitTeamForTest(
   617  	config Config, name, suffix string, teamNumber byte, ty tlf.Type) (
   618  	keybase1.TeamID, error) {
   619  	iteamInfo, err := config.KeybaseService().ResolveIdentifyImplicitTeam(
   620  		context.Background(), name, suffix, ty, true, "",
   621  		keybase1.OfflineAvailability_NONE)
   622  	if err != nil {
   623  		return "", err
   624  	}
   625  	return iteamInfo.TID, nil
   626  }
   627  
   628  // AddImplicitTeamForTestOrBust is like AddImplicitTeamForTest, but
   629  // dies if there's an error.
   630  func AddImplicitTeamForTestOrBust(t logger.TestLogBackend,
   631  	config Config, name, suffix string, teamNumber byte,
   632  	ty tlf.Type) keybase1.TeamID {
   633  	teamID, err := AddImplicitTeamForTest(config, name, suffix, teamNumber, ty)
   634  	if err != nil {
   635  		t.Fatal(err)
   636  	}
   637  	return teamID
   638  }
   639  
   640  // ChangeTeamNameForTest renames a team.
   641  func ChangeTeamNameForTest(
   642  	config Config, oldName, newName string) error {
   643  	kbd, ok := config.KeybaseService().(*KeybaseDaemonLocal)
   644  	if !ok {
   645  		return errors.New("Bad keybase daemon")
   646  	}
   647  
   648  	tid, err := kbd.ChangeTeamNameForTest(oldName, newName)
   649  	if err != nil {
   650  		return err
   651  	}
   652  
   653  	config.KBFSOps().TeamNameChanged(context.Background(), tid)
   654  	return nil
   655  }
   656  
   657  // ChangeTeamNameForTestOrBust is like ChangeTeamNameForTest, but dies
   658  // if there's an error.
   659  func ChangeTeamNameForTestOrBust(t logger.TestLogBackend, config Config,
   660  	oldName, newName string) {
   661  	err := ChangeTeamNameForTest(config, oldName, newName)
   662  	if err != nil {
   663  		t.Fatal(err)
   664  	}
   665  }
   666  
   667  // SetGlobalMerkleRootForTest sets the global Merkle root and time.
   668  func SetGlobalMerkleRootForTest(
   669  	config Config, root keybase1.MerkleRootV2, rootTime time.Time) error {
   670  	kbd, ok := config.KeybaseService().(*KeybaseDaemonLocal)
   671  	if !ok {
   672  		return errors.New("Bad keybase daemon")
   673  	}
   674  
   675  	kbd.SetCurrentMerkleRoot(root, rootTime)
   676  	return nil
   677  }
   678  
   679  // SetGlobalMerkleRootForTestOrBust is like
   680  // SetGlobalMerkleRootForTest, but dies if there's an error.
   681  func SetGlobalMerkleRootForTestOrBust(
   682  	t logger.TestLogBackend, config Config, root keybase1.MerkleRootV2,
   683  	rootTime time.Time) {
   684  	err := SetGlobalMerkleRootForTest(config, root, rootTime)
   685  	if err != nil {
   686  		t.Fatal(err)
   687  	}
   688  }
   689  
   690  // SetKbfsMerkleRootForTest sets a Merkle root for the given KBFS tree ID.
   691  func SetKbfsMerkleRootForTest(
   692  	config Config, treeID keybase1.MerkleTreeID,
   693  	root *kbfsmd.MerkleRoot) error {
   694  	md, ok := config.MDServer().(mdServerLocal)
   695  	if !ok {
   696  		return errors.New("Bad md server")
   697  	}
   698  	md.setKbfsMerkleRoot(treeID, root)
   699  	return nil
   700  }
   701  
   702  // SetKbfsMerkleRootForTestOrBust is like SetKbfsMerkleRootForTest,
   703  // but dies if there's an error.
   704  func SetKbfsMerkleRootForTestOrBust(
   705  	t logger.TestLogBackend, config Config, treeID keybase1.MerkleTreeID,
   706  	root *kbfsmd.MerkleRoot) {
   707  	err := SetKbfsMerkleRootForTest(config, treeID, root)
   708  	if err != nil {
   709  		t.Fatal(err)
   710  	}
   711  }
   712  
   713  // EnableImplicitTeamsForTest causes the mdserver to stop returning
   714  // random TLF IDs for new TLFs.
   715  func EnableImplicitTeamsForTest(config Config) error {
   716  	md, ok := config.MDServer().(mdServerLocal)
   717  	if !ok {
   718  		return errors.New("Bad md server")
   719  	}
   720  	md.enableImplicitTeams()
   721  	return nil
   722  }
   723  
   724  func testRPCWithCanceledContext(t logger.TestLogBackend,
   725  	serverConn net.Conn, fn func(context.Context) error) {
   726  	ctx, cancel := context.WithCancel(context.Background())
   727  	go func() {
   728  		// Wait for RPC in fn to make progress.
   729  		n, err := serverConn.Read([]byte{1})
   730  		assert.Equal(t, n, 1)
   731  		assert.NoError(t, err)
   732  		cancel()
   733  	}()
   734  
   735  	err := fn(ctx)
   736  	if errors.Cause(err) != context.Canceled {
   737  		t.Fatalf("Function did not return a canceled error: %+v", err)
   738  	}
   739  }
   740  
   741  // DisableUpdatesForTesting stops the given folder from acting on new
   742  // updates.  Send a struct{}{} down the returned channel to restart
   743  // notifications
   744  func DisableUpdatesForTesting(config Config, folderBranch data.FolderBranch) (
   745  	chan<- struct{}, error) {
   746  	kbfsOps, ok := config.KBFSOps().(*KBFSOpsStandard)
   747  	if !ok {
   748  		return nil, errors.New("Unexpected KBFSOps type")
   749  	}
   750  
   751  	ops := kbfsOps.getOpsNoAdd(context.TODO(), folderBranch)
   752  	c := make(chan struct{})
   753  	ops.updatePauseChan <- c
   754  	return c, nil
   755  }
   756  
   757  // DisableCRForTesting stops conflict resolution for the given folder.
   758  // RestartCRForTesting should be called to restart it.
   759  func DisableCRForTesting(config Config, folderBranch data.FolderBranch) error {
   760  	kbfsOps, ok := config.KBFSOps().(*KBFSOpsStandard)
   761  	if !ok {
   762  		return errors.New("Unexpected KBFSOps type")
   763  	}
   764  
   765  	ops := kbfsOps.getOpsNoAdd(context.TODO(), folderBranch)
   766  	ops.cr.Pause()
   767  	return nil
   768  }
   769  
   770  // RestartCRForTesting re-enables conflict resolution for the given
   771  // folder.  baseCtx must have a cancellation delayer.
   772  func RestartCRForTesting(baseCtx context.Context, config Config,
   773  	folderBranch data.FolderBranch) error {
   774  	kbfsOps, ok := config.KBFSOps().(*KBFSOpsStandard)
   775  	if !ok {
   776  		return errors.New("Unexpected KBFSOps type")
   777  	}
   778  
   779  	ops := kbfsOps.getOpsNoAdd(baseCtx, folderBranch)
   780  	ops.cr.Restart(baseCtx)
   781  
   782  	// Start a resolution for anything we've missed.
   783  	lState := makeFBOLockState()
   784  	if ops.isUnmerged(lState) {
   785  		ops.cr.Resolve(baseCtx, ops.getCurrMDRevision(lState),
   786  			kbfsmd.RevisionUninitialized)
   787  	}
   788  	return nil
   789  }
   790  
   791  // SetCRFailureForTesting sets whether CR should always fail on the folder
   792  // branch.
   793  func SetCRFailureForTesting(ctx context.Context, config Config,
   794  	folderBranch data.FolderBranch, fail failModeForTesting) error {
   795  	kbfsOps, ok := config.KBFSOps().(*KBFSOpsStandard)
   796  	if !ok {
   797  		return errors.New("Unexpected KBFSOps type")
   798  	}
   799  
   800  	ops := kbfsOps.getOpsNoAdd(ctx, folderBranch)
   801  	ops.cr.setFailModeForTesting(fail)
   802  	return nil
   803  }
   804  
   805  // ForceQuotaReclamationForTesting kicks off quota reclamation under
   806  // the given config, for the given folder-branch.
   807  func ForceQuotaReclamationForTesting(config Config,
   808  	folderBranch data.FolderBranch) error {
   809  	kbfsOps, ok := config.KBFSOps().(*KBFSOpsStandard)
   810  	if !ok {
   811  		return errors.New("Unexpected KBFSOps type")
   812  	}
   813  
   814  	ops := kbfsOps.getOpsNoAdd(context.TODO(), folderBranch)
   815  	ops.fbm.forceQuotaReclamation()
   816  	return nil
   817  }
   818  
   819  // CheckConfigAndShutdown shuts down the given config, but fails the
   820  // test if there's an error.
   821  func CheckConfigAndShutdown(
   822  	ctx context.Context, t logger.TestLogBackend, config Config) {
   823  	err := config.Shutdown(ctx)
   824  	switch errors.Cause(err).(type) {
   825  	case data.ShutdownHappenedError:
   826  	case nil:
   827  	default:
   828  		t.Errorf("err=%+v", err)
   829  	}
   830  }
   831  
   832  // GetRootNodeForTest gets the root node for the given TLF name, which
   833  // must be canonical, creating it if necessary.
   834  func GetRootNodeForTest(
   835  	ctx context.Context, config Config, name string,
   836  	t tlf.Type) (Node, error) {
   837  	h, err := tlfhandle.ParseHandle(
   838  		ctx, config.KBPKI(), config.MDOps(), config, name, t)
   839  	if err != nil {
   840  		return nil, err
   841  	}
   842  
   843  	n, _, err := config.KBFSOps().GetOrCreateRootNode(ctx, h, data.MasterBranch)
   844  	if err != nil {
   845  		return nil, err
   846  	}
   847  
   848  	return n, nil
   849  }
   850  
   851  // GetRootNodeOrBust gets the root node for the given TLF name, which
   852  // must be canonical, creating it if necessary, and failing if there's
   853  // an error.
   854  func GetRootNodeOrBust(
   855  	ctx context.Context, t logger.TestLogBackend,
   856  	config Config, name string, ty tlf.Type) Node {
   857  	n, err := GetRootNodeForTest(ctx, config, name, ty)
   858  	if err != nil {
   859  		t.Fatalf("Couldn't get root node for %s (type=%s): %+v",
   860  			name, ty, err)
   861  	}
   862  	return n
   863  }