Skip to content
Snippets Groups Projects
test_plugin.py 10 KiB
Newer Older
  • Learn to ignore specific revisions
  • # Copyright 2019 PrivateStorage.io, LLC
    #
    # Licensed under the Apache License, Version 2.0 (the "License");
    # you may not use this file except in compliance with the License.
    # You may obtain a copy of the License at
    #
    #     http://www.apache.org/licenses/LICENSE-2.0
    #
    # Unless required by applicable law or agreed to in writing, software
    # distributed under the License is distributed on an "AS IS" BASIS,
    # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
    # See the License for the specific language governing permissions and
    # limitations under the License.
    
    """
    Tests for the Tahoe-LAFS plugin.
    """
    
    
    from __future__ import (
        absolute_import,
    )
    
    
    from zope.interface import (
        implementer,
    )
    
    
    from fixtures import (
        TempDir,
    )
    
    
    from testtools import (
        TestCase,
    )
    from testtools.matchers import (
    
        Contains,
    
        AfterPreprocessing,
    
    )
    from testtools.twistedsupport import (
        succeeded,
    )
    
    from testtools.content import (
        text_content,
    )
    
    from hypothesis import (
        given,
    )
    
    from foolscap.broker import (
        Broker,
    )
    
    from foolscap.ipb import (
        IReferenceable,
        IRemotelyCallable,
    
    from foolscap.referenceable import (
        LocalReferenceable,
    )
    
    
    from allmydata.interfaces import (
        IFoolscapStoragePlugin,
    
        IAnnounceableStorageServer,
    
        IStorageServer,
    
        RIStorageServer,
    
    from twisted.python.filepath import (
        FilePath,
    )
    
    from twisted.plugin import (
        getPlugins,
    )
    
    from twisted.test.proto_helpers import (
        StringTransport,
    )
    
    from twisted.web.resource import (
        IResource,
    )
    
    from twisted.plugins.zkapauthorizer import (
    
        storage_server,
    )
    
    
    from ..controller import (
        IssuerConfigurationMismatch,
    )
    
    from .strategies import (
    
    )
    from .matchers import (
        Provides,
    )
    
    
    SIGNING_KEY_PATH = FilePath(__file__).sibling(u"testing-signing.key")
    
    
    
    @implementer(RIStorageServer)
    class StubStorageServer(object):
        pass
    
    
    
    def get_anonymous_storage_server():
    
        return StubStorageServer()
    
    def get_rref():
    
    class PluginTests(TestCase):
        """
    
        Tests for ``twisted.plugins.zkapauthorizer.storage_server``.
    
        """
        def test_discoverable(self):
            """
            The plugin can be discovered.
            """
            self.assertThat(
                getPlugins(IFoolscapStoragePlugin),
                Contains(storage_server),
            )
    
    
    
        def test_provides_interface(self):
            """
            ``storage_server`` provides ``IFoolscapStoragePlugin``.
            """
    
            self.assertThat(
                storage_server,
                Provides([IFoolscapStoragePlugin]),
            )
    
    
    class ServerPluginTests(TestCase):
        """
        Tests for the plugin's implementation of
        ``IFoolscapStoragePlugin.get_storage_server``.
        """
    
        @given(server_configurations(SIGNING_KEY_PATH))
    
        def test_returns_announceable(self, configuration):
            """
            ``storage_server.get_storage_server`` returns an instance which provides
            ``IAnnounceableStorageServer``.
            """
            storage_server_deferred = storage_server.get_storage_server(
                configuration,
                get_anonymous_storage_server,
            )
            self.assertThat(
                storage_server_deferred,
                succeeded(Provides([IAnnounceableStorageServer])),
            )
    
    
    
        @given(server_configurations(SIGNING_KEY_PATH))
    
        def test_returns_referenceable(self, configuration):
            """
            The storage server attached to the result of
            ``storage_server.get_storage_server`` provides ``IReferenceable`` and
            ``IRemotelyCallable``.
            """
            storage_server_deferred = storage_server.get_storage_server(
                configuration,
                get_anonymous_storage_server,
            )
            self.assertThat(
                storage_server_deferred,
                succeeded(
                    AfterPreprocessing(
                        lambda ann: ann.storage_server,
                        Provides([IReferenceable, IRemotelyCallable]),
                    ),
                ),
            )
    
        @given(server_configurations(SIGNING_KEY_PATH))
    
        def test_returns_serializable(self, configuration):
            """
            The storage server attached to the result of
            ``storage_server.get_storage_server`` can be serialized by a banana
            Broker (for Foolscap).
            """
            storage_server_deferred = storage_server.get_storage_server(
                configuration,
                get_anonymous_storage_server,
            )
            broker = Broker(None)
            broker.makeConnection(StringTransport())
            self.expectThat(
                storage_server_deferred,
                succeeded(
                    AfterPreprocessing(
                        lambda ann: broker.send(ann.storage_server),
                        Always(),
                    ),
                ),
            )
    
        @given(server_configurations(SIGNING_KEY_PATH))
    
        def test_returns_hashable(self, configuration):
            """
            The storage server attached to the result of
            ``storage_server.get_storage_server`` is hashable for use as a Python
            dictionary key.
    
            This is another requirement of Foolscap.
            """
            storage_server_deferred = storage_server.get_storage_server(
                configuration,
                get_anonymous_storage_server,
            )
            broker = Broker(None)
            broker.makeConnection(StringTransport())
            self.expectThat(
                storage_server_deferred,
                succeeded(
                    AfterPreprocessing(
                        lambda ann: hash(ann.storage_server),
                        Always(),
                    ),
                ),
            )
    
    tahoe_configs_with_dummy_redeemer = minimal_tahoe_configs({
        u"privatestorageio-zkapauthz-v1": just({u"redeemer": u"dummy"}),
    })
    
    
    tahoe_configs_with_mismatched_issuer = minimal_tahoe_configs({
        u"privatestorageio-zkapauthz-v1": just({u"ristretto-issuer-root-url": u"https://another-issuer.example.invalid/"}),
    })
    
    
    class ClientPluginTests(TestCase):
        """
        Tests for the plugin's implementation of
        ``IFoolscapStoragePlugin.get_storage_client``.
        """
    
        @given(tahoe_configs(), announcements())
        def test_interface(self, get_config, announcement):
    
            ``get_storage_client`` returns an object which provides
            ``IStorageServer``.
    
            tempdir = self.useFixture(TempDir())
            node_config = get_config(
                tempdir.join(b"node"),
                b"tub.port",
            )
    
    
            storage_client = storage_server.get_storage_client(
    
                announcement,
                get_rref,
            )
    
            self.assertThat(
    
                storage_client,
                Provides([IStorageServer]),
    
        @given(tahoe_configs_with_mismatched_issuer, announcements())
        def test_mismatched_ristretto_issuer(self, get_config, announcement):
            """
            ``get_storage_client`` raises an exception when called with an
            announcement and local configuration which specify different issuers.
            """
            tempdir = self.useFixture(TempDir())
            node_config = get_config(
                tempdir.join(b"node"),
                b"tub.port",
            )
            config_text = BytesIO()
            node_config.config.write(config_text)
            self.addDetail(u"config", text_content(config_text.getvalue()))
            self.addDetail(u"announcement", text_content(unicode(announcement)))
            try:
                result = storage_server.get_storage_client(node_config, announcement, get_rref)
            except IssuerConfigurationMismatch:
                pass
            except Exception as e:
                self.fail("get_storage_client raised the wrong exception: {}".format(e))
            else:
                self.fail("get_storage_client didn't raise, returned: {}".format(result))
    
    
    
            announcements(),
            vouchers(),
            random_tokens(),
    
            storage_indexes(),
            lease_renew_secrets(),
        )
    
        def test_unblinded_tokens_extracted(
    
                storage_index,
                renew_secret,
        ):
            """
            The ``ZKAPAuthorizerStorageServer`` returned by ``get_storage_client``
    
            extracts unblinded tokens from the plugin database.
    
            """
            tempdir = self.useFixture(TempDir())
            node_config = get_config(
                tempdir.join(b"node"),
                b"tub.port",
            )
    
            store = VoucherStore.from_node_config(node_config)
            store.add(voucher, [token])
    
            store.insert_unblinded_tokens_for_voucher(voucher, [unblinded_token])
    
            storage_client = storage_server.get_storage_client(
    
                node_config,
                announcement,
                get_rref,
            )
    
            # This is hooked up to a garbage reference.  We don't care about its
            # _result_, anyway, right now.
            d = storage_client.renew_lease(
                storage_index,
                renew_secret,
            )
            d.addBoth(lambda ignored: None)
    
    
            # There should be no unblinded tokens left to extract.
            remaining = store.extract_unblinded_tokens(1)
    
    class ClientResourceTests(TestCase):
        """
        Tests for the plugin's implementation of
        ``IFoolscapStoragePlugin.get_client_resource``.
        """
    
        def test_interface(self, get_config):
    
            """
            ``get_client_resource`` returns an object that provides ``IResource``.
            """
    
            tempdir = self.useFixture(TempDir())
            nodedir = tempdir.join(b"node")
            config = get_config(nodedir, b"tub.port")
    
                storage_server.get_client_resource(config),