1
use std::time::Duration;
2

            
3
#[cfg(feature = "encryption")]
4
use bonsaidb_core::test_util::EncryptedBasic;
5
use bonsaidb_core::{
6
    connection::{AccessPolicy, Connection, StorageConnection},
7
    permissions::{Permissions, Statement},
8
    test_util::{
9
        Basic, BasicByBrokenParentId, BasicByParentId, BasicCollectionWithNoViews,
10
        BasicCollectionWithOnlyBrokenParentId, BasicSchema, HarnessTest, TestDirectory,
11
    },
12
};
13
use config::StorageConfiguration;
14

            
15
use super::*;
16
use crate::{config::Builder, Database};
17

            
18
struct TestHarness {
19
    _directory: TestDirectory,
20
    db: Database,
21
}
22

            
23
impl TestHarness {
24
30
    async fn new(test: HarnessTest) -> anyhow::Result<Self> {
25
30
        let directory = TestDirectory::new(format!("local-{}", test));
26
30
        let storage =
27
455
            Storage::open(StorageConfiguration::new(&directory).with_schema::<BasicSchema>()?)
28
455
                .await?;
29
30
        storage
30
60
            .create_database::<BasicSchema>("tests", false)
31
60
            .await?;
32
30
        let db = storage.database::<BasicSchema>("tests").await?;
33

            
34
30
        Ok(Self {
35
30
            _directory: directory,
36
30
            db,
37
30
        })
38
30
    }
39

            
40
2
    const fn server_name() -> &'static str {
41
2
        "local"
42
2
    }
43

            
44
2
    fn server(&self) -> &'_ Storage {
45
2
        self.db.storage()
46
2
    }
47

            
48
    #[allow(dead_code)]
49
    async fn connect_with_permissions(
50
        &self,
51
        permissions: Vec<Statement>,
52
        _label: &str,
53
    ) -> anyhow::Result<Database> {
54
        Ok(self
55
            .db
56
            .with_effective_permissions(Permissions::from(permissions)))
57
    }
58

            
59
29
    async fn connect(&self) -> anyhow::Result<Database> {
60
29
        Ok(self.db.clone())
61
29
    }
62

            
63
26
    pub async fn shutdown(&self) -> anyhow::Result<()> {
64
26
        Ok(())
65
26
    }
66
}
67

            
68
38
bonsaidb_core::define_connection_test_suite!(TestHarness);
69

            
70
9
bonsaidb_core::define_pubsub_test_suite!(TestHarness);
71

            
72
258
bonsaidb_core::define_kv_test_suite!(TestHarness);
73

            
74
1
#[test]
75
1
fn integrity_checks() -> anyhow::Result<()> {
76
1
    let path = TestDirectory::new("integrity-checks");
77
    // To ensure full cleanup between each block, each runs in its own runtime;
78

            
79
    // Add a doc with no views installed
80
1
    {
81
1
        let rt = tokio::runtime::Builder::new_current_thread()
82
1
            .enable_all()
83
1
            .build()?;
84
1
        rt.block_on(async {
85
            {
86
1
                let db =
87
20
                    Database::open::<BasicCollectionWithNoViews>(StorageConfiguration::new(&path))
88
20
                        .await?;
89
1
                let collection = db.collection::<BasicCollectionWithNoViews>();
90
1
                collection.push(&Basic::default().with_parent_id(1)).await?;
91
            }
92
1
            Result::<(), anyhow::Error>::Ok(())
93
1
        })
94
1
        .unwrap();
95
    }
96
    // Connect with a new view and see the automatic update with a query
97
1
    {
98
1
        let rt = tokio::runtime::Builder::new_current_thread()
99
1
            .enable_all()
100
1
            .build()?;
101
1
        rt.block_on(async {
102
1
            let db = Database::open::<BasicCollectionWithOnlyBrokenParentId>(
103
1
                StorageConfiguration::new(&path),
104
16
            )
105
16
            .await?;
106
            // Give the integrity scanner time to run if it were to run (it shouldn't in this configuration).
107
1
            tokio::time::sleep(Duration::from_millis(100)).await;
108

            
109
            // NoUpdate should return data without the validation checker having run.
110
1
            assert_eq!(
111
1
                db.view::<BasicByBrokenParentId>()
112
1
                    .with_access_policy(AccessPolicy::NoUpdate)
113
1
                    .query()
114
                    .await?
115
1
                    .len(),
116
                0
117
            );
118

            
119
            // Regular query should show the correct data
120
2
            assert_eq!(db.view::<BasicByBrokenParentId>().query().await?.len(), 1);
121
1
            Result::<(), anyhow::Error>::Ok(())
122
1
        })
123
1
        .unwrap();
124
    }
125
    // Connect with a fixed view, and wait for the integrity scanner to work
126
1
    {
127
1
        let rt = tokio::runtime::Builder::new_current_thread()
128
1
            .enable_all()
129
1
            .build()?;
130
1
        rt.block_on(async {
131
1
            let db = Database::open::<Basic>(
132
1
                StorageConfiguration::new(&path).check_view_integrity_on_open(true),
133
15
            )
134
15
            .await?;
135
1
            for _ in 0_u8..10 {
136
1
                tokio::time::sleep(Duration::from_millis(1000)).await;
137
1
                if db
138
1
                    .view::<BasicByParentId>()
139
1
                    .with_access_policy(AccessPolicy::NoUpdate)
140
1
                    .with_key(Some(1))
141
1
                    .query()
142
                    .await?
143
1
                    .len()
144
                    == 1
145
                {
146
1
                    return Result::<(), anyhow::Error>::Ok(());
147
                }
148
            }
149

            
150
            panic!("Integrity checker didn't run in the allocated time")
151
1
        })
152
1
        .unwrap();
153
1
    }
154
1

            
155
1
    Ok(())
156
1
}
157

            
158
1
#[test]
159
#[cfg(feature = "encryption")]
160
1
fn encryption() -> anyhow::Result<()> {
161
1
    use bonsaidb_core::document::Document;
162
1

            
163
1
    let path = TestDirectory::new("encryption");
164
1
    let document_header = {
165
1
        let rt = tokio::runtime::Runtime::new()?;
166
1
        rt.block_on(async {
167
16
            let db = Database::open::<BasicSchema>(StorageConfiguration::new(&path)).await?;
168

            
169
1
            let document_header = db
170
1
                .collection::<EncryptedBasic>()
171
1
                .push(&EncryptedBasic::new("hello"))
172
1
                .await?;
173

            
174
            // Retrieve the document, showing that it was stored successfully.
175
1
            let doc = db
176
1
                .collection::<EncryptedBasic>()
177
1
                .get(document_header.id)
178
1
                .await?
179
1
                .expect("doc not found");
180
1
            assert_eq!(&doc.contents::<EncryptedBasic>()?.value, "hello");
181

            
182
1
            Result::<_, anyhow::Error>::Ok(document_header)
183
1
        })?
184
    };
185

            
186
    // By resetting the encryption key, we should be able to force an error in
187
    // decryption, which proves that the document was encrypted. To ensure the
188
    // server starts up and generates a new key, we must delete the sealing key.
189
1
    std::fs::remove_file(path.join("master-keys"))?;
190

            
191
1
    let rt = tokio::runtime::Runtime::new()?;
192
1
    rt.block_on(async move {
193
18
        let db = Database::open::<BasicSchema>(StorageConfiguration::new(&path)).await?;
194

            
195
        // Try retrieving the document, but expect an error decrypting.
196
1
        if let Err(bonsaidb_core::Error::Database(err)) = db
197
1
            .collection::<EncryptedBasic>()
198
1
            .get(document_header.id)
199
1
            .await
200
        {
201
1
            assert!(err.contains("vault"));
202
        } else {
203
            panic!("successfully retrieved encrypted document without keys");
204
        }
205

            
206
1
        Result::<_, anyhow::Error>::Ok(())
207
1
    })?;
208

            
209
1
    Ok(())
210
1
}
211

            
212
1
#[test]
213
1
fn expiration_after_close() -> anyhow::Result<()> {
214
    use bonsaidb_core::{keyvalue::KeyValue, test_util::TimingTest};
215
1
    loop {
216
1
        let path = TestDirectory::new("expiration-after-close");
217
1
        // To ensure full cleanup between each block, each runs in its own runtime;
218
1
        let timing = TimingTest::new(Duration::from_millis(100));
219
        // Set a key with an expiration, then close it. Then try to validate it
220
        // exists after opening, and then expires at the correct time.
221
        {
222
1
            let rt = tokio::runtime::Runtime::new()?;
223
1
            rt.block_on(async {
224
17
                let db = Database::open::<()>(StorageConfiguration::new(&path)).await?;
225

            
226
                // TODO This is a workaroun for the key-value expiration task
227
                // taking ownership of an instance of Database. If this async
228
                // task runs too quickly, sometimes things don't get cleaned up
229
                // if that task hasn't completed. This pause ensures the startup
230
                // tasks complete before we continue with the test. This should
231
                // be replaced with a proper shutdown call for the local
232
                // storage/database.
233
1
                tokio::time::sleep(Duration::from_millis(100)).await;
234

            
235
1
                db.set_key("a", &0_u32)
236
1
                    .expire_in(Duration::from_secs(3))
237
                    .await?;
238
1
                Result::<(), anyhow::Error>::Ok(())
239
1
            })?;
240
        }
241

            
242
        {
243
1
            let rt = tokio::runtime::Runtime::new()?;
244
1
            let retry = rt.block_on(async {
245
16
                let db = Database::open::<()>(StorageConfiguration::new(&path)).await?;
246

            
247
1
                let key = db.get_key("a").into().await?;
248

            
249
1
                if timing.elapsed() > Duration::from_secs(1) {
250
                    return Ok(true);
251
1
                }
252
1

            
253
1
                assert_eq!(key, Some(0_u32));
254

            
255
1
                timing.wait_until(Duration::from_secs(4)).await;
256

            
257
1
                assert!(db.get_key("a").await?.is_none());
258

            
259
1
                Result::<bool, anyhow::Error>::Ok(false)
260
1
            })?;
261

            
262
1
            if retry {
263
                println!("Retrying  expiration_after_close because it was too slow");
264
                continue;
265
1
            }
266
1
        }
267
1

            
268
1
        break;
269
1
    }
270
1
    Ok(())
271
1
}