dataStoreRecovery_test.go 7.3 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303
  1. //go:build !PSIPHON_USE_BADGER_DB && !PSIPHON_USE_FILES_DB
  2. // +build !PSIPHON_USE_BADGER_DB,!PSIPHON_USE_FILES_DB
  3. /*
  4. * Copyright (c) 2019, Psiphon Inc.
  5. * All rights reserved.
  6. *
  7. * This program is free software: you can redistribute it and/or modify
  8. * it under the terms of the GNU General Public License as published by
  9. * the Free Software Foundation, either version 3 of the License, or
  10. * (at your option) any later version.
  11. *
  12. * This program is distributed in the hope that it will be useful,
  13. * but WITHOUT ANY WARRANTY; without even the implied warranty of
  14. * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  15. * GNU General Public License for more details.
  16. *
  17. * You should have received a copy of the GNU General Public License
  18. * along with this program. If not, see <http://www.gnu.org/licenses/>.
  19. *
  20. */
  21. package psiphon
  22. import (
  23. "context"
  24. "fmt"
  25. "io/ioutil"
  26. "os"
  27. "path/filepath"
  28. "strings"
  29. "sync"
  30. "testing"
  31. "github.com/Psiphon-Labs/psiphon-tunnel-core/psiphon/common"
  32. "github.com/Psiphon-Labs/psiphon-tunnel-core/psiphon/common/prng"
  33. "github.com/Psiphon-Labs/psiphon-tunnel-core/psiphon/common/protocol"
  34. )
  35. // Set canTruncateOpenDataStore to false on platforms, such as Windows, where
  36. // the OS doesn't allow an open memory-mapped file to be truncated. This will
  37. // skip the associated test cases.
  38. var canTruncateOpenDataStore = true
  39. func TestBoltResiliency(t *testing.T) {
  40. testDataDirName, err := ioutil.TempDir("", "psiphon-bolt-recovery-test")
  41. if err != nil {
  42. t.Fatalf("TempDir failed: %s", err)
  43. }
  44. defer os.RemoveAll(testDataDirName)
  45. SetEmitDiagnosticNotices(true, true)
  46. clientConfigJSON := `
  47. {
  48. "ClientPlatform" : "",
  49. "ClientVersion" : "0000000000000000",
  50. "SponsorId" : "0000000000000000",
  51. "PropagationChannelId" : "0",
  52. "ConnectionWorkerPoolSize" : 10,
  53. "EstablishTunnelTimeoutSeconds" : 1,
  54. "EstablishTunnelPausePeriodSeconds" : 1
  55. }`
  56. clientConfig, err := LoadConfig([]byte(clientConfigJSON))
  57. if err != nil {
  58. t.Fatalf("LoadConfig failed: %s", err)
  59. }
  60. clientConfig.DataRootDirectory = testDataDirName
  61. err = clientConfig.Commit(false)
  62. if err != nil {
  63. t.Fatalf("Commit failed: %s", err)
  64. }
  65. serverEntryCount := 100
  66. noticeCandidateServers := make(chan struct{}, 1)
  67. noticeExiting := make(chan struct{}, 1)
  68. noticeResetDatastore := make(chan struct{}, 1)
  69. noticeDatastoreFailed := make(chan struct{}, 1)
  70. err = SetNoticeWriter(NewNoticeReceiver(
  71. func(notice []byte) {
  72. noticeType, payload, err := GetNotice(notice)
  73. if err != nil {
  74. return
  75. }
  76. printNotice := false
  77. switch noticeType {
  78. case "CandidateServers":
  79. count := int(payload["count"].(float64))
  80. if count != serverEntryCount {
  81. t.Fatalf("unexpected server entry count: %d", count)
  82. }
  83. select {
  84. case noticeCandidateServers <- struct{}{}:
  85. default:
  86. }
  87. case "Exiting":
  88. select {
  89. case noticeExiting <- struct{}{}:
  90. default:
  91. }
  92. case "Alert":
  93. message := payload["message"].(string)
  94. var channel chan struct{}
  95. if strings.Contains(message, "tryDatastoreOpenDB: reset") {
  96. channel = noticeResetDatastore
  97. } else if strings.Contains(message, "datastore has failed") {
  98. channel = noticeDatastoreFailed
  99. }
  100. if channel != nil {
  101. select {
  102. case channel <- struct{}{}:
  103. default:
  104. }
  105. }
  106. }
  107. if printNotice {
  108. fmt.Printf("%s\n", string(notice))
  109. }
  110. }))
  111. if err != nil {
  112. t.Fatalf("error setting notice writer: %s", err)
  113. }
  114. defer ResetNoticeWriter()
  115. drainNoticeChannel := func(channel chan struct{}) {
  116. for {
  117. select {
  118. case channel <- struct{}{}:
  119. default:
  120. return
  121. }
  122. }
  123. }
  124. drainNoticeChannels := func() {
  125. drainNoticeChannel(noticeCandidateServers)
  126. drainNoticeChannel(noticeExiting)
  127. drainNoticeChannel(noticeResetDatastore)
  128. drainNoticeChannel(noticeDatastoreFailed)
  129. }
  130. // Paving sufficient server entries, then truncating the datastore file to
  131. // remove some server entry data, then iterating over all server entries (to
  132. // produce the CandidateServers output) triggers datastore corruption
  133. // detection and, at start up, reset/recovery.
  134. paveServerEntries := func() {
  135. for i := 0; i < serverEntryCount; i++ {
  136. n := 16
  137. fields := make(protocol.ServerEntryFields)
  138. fields["ipAddress"] = fmt.Sprintf("127.0.0.%d", i+1)
  139. fields["sshPort"] = 2222
  140. fields["sshUsername"] = prng.HexString(n)
  141. fields["sshPassword"] = prng.HexString(n)
  142. fields["sshHostKey"] = prng.HexString(n)
  143. fields["capabilities"] = []string{"SSH", "ssh-api-requests"}
  144. fields["region"] = "US"
  145. fields["configurationVersion"] = 1
  146. fields.SetLocalSource(protocol.SERVER_ENTRY_SOURCE_EMBEDDED)
  147. fields.SetLocalTimestamp(
  148. common.TruncateTimestampToHour(common.GetCurrentTimestamp()))
  149. err = StoreServerEntry(fields, true)
  150. if err != nil {
  151. t.Fatalf("StoreServerEntry failed: %s", err)
  152. }
  153. }
  154. }
  155. startController := func() func() {
  156. controller, err := NewController(clientConfig)
  157. if err != nil {
  158. t.Fatalf("NewController failed: %s", err)
  159. }
  160. ctx, cancelFunc := context.WithCancel(context.Background())
  161. controllerWaitGroup := new(sync.WaitGroup)
  162. controllerWaitGroup.Add(1)
  163. go func() {
  164. defer controllerWaitGroup.Done()
  165. controller.Run(ctx)
  166. }()
  167. return func() {
  168. cancelFunc()
  169. controllerWaitGroup.Wait()
  170. }
  171. }
  172. truncateDataStore := func() {
  173. filename := filepath.Join(testDataDirName, "ca.psiphon.PsiphonTunnel.tunnel-core", "datastore", "psiphon.boltdb")
  174. file, err := os.OpenFile(filename, os.O_RDWR, 0666)
  175. if err != nil {
  176. t.Fatalf("OpenFile failed: %s", err)
  177. }
  178. defer file.Close()
  179. fileInfo, err := file.Stat()
  180. if err != nil {
  181. t.Fatalf("Stat failed: %s", err)
  182. }
  183. err = file.Truncate(fileInfo.Size() / 4)
  184. if err != nil {
  185. t.Fatalf("Truncate failed: %s", err)
  186. }
  187. err = file.Sync()
  188. if err != nil {
  189. t.Fatalf("Sync failed: %s", err)
  190. }
  191. }
  192. // Populate datastore with 100 server entries.
  193. err = OpenDataStore(clientConfig)
  194. if err != nil {
  195. t.Fatalf("OpenDataStore failed: %s", err)
  196. }
  197. paveServerEntries()
  198. stopController := startController()
  199. <-noticeCandidateServers
  200. stopController()
  201. CloseDataStore()
  202. drainNoticeChannels()
  203. // Truncate datastore file before running controller; expect a datastore
  204. // "reset" notice on OpenDataStore.
  205. t.Logf("test: recover from datastore corrupted before opening")
  206. truncateDataStore()
  207. err = OpenDataStore(clientConfig)
  208. if err != nil {
  209. t.Fatalf("OpenDataStore failed: %s", err)
  210. }
  211. <-noticeResetDatastore
  212. if !canTruncateOpenDataStore {
  213. CloseDataStore()
  214. return
  215. }
  216. paveServerEntries()
  217. // Truncate datastore while running the controller. First, complete one
  218. // successful data scan (CandidateServers). The next scan should trigger a
  219. // datastore "failed" notice.
  220. t.Logf("test: detect corrupt datastore while running")
  221. stopController = startController()
  222. <-noticeCandidateServers
  223. truncateDataStore()
  224. <-noticeDatastoreFailed
  225. <-noticeExiting
  226. stopController()
  227. CloseDataStore()
  228. drainNoticeChannels()
  229. // Restart successfully after previous failure shutdown.
  230. t.Logf("test: after restart, recover from datastore corrupted while running")
  231. err = OpenDataStore(clientConfig)
  232. if err != nil {
  233. t.Fatalf("OpenDataStore failed: %s", err)
  234. }
  235. <-noticeResetDatastore
  236. paveServerEntries()
  237. stopController = startController()
  238. <-noticeCandidateServers
  239. stopController()
  240. CloseDataStore()
  241. }