Browse Source

test: Phase 5 QA adversarial tests -- 49 tests for CHAP, resize, snapshots

- qa_chap_test.go: 16 tests (empty secret, replay, missing fields, hex cases)
- qa_resize_test.go: 12 tests (concurrent, reopen, replica reject, alignment)
- qa_snapshot_test.go: 21 tests (concurrent create, CoW, recovery, role checks)

Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
feature/sw-block
Ping Qiu 7 days ago
parent
commit
797854b2d9
  1. 358
      weed/storage/blockvol/iscsi/qa_chap_test.go
  2. 286
      weed/storage/blockvol/qa_resize_test.go
  3. 717
      weed/storage/blockvol/qa_snapshot_test.go

358
weed/storage/blockvol/iscsi/qa_chap_test.go

@ -0,0 +1,358 @@
package iscsi
import (
"crypto/md5"
"encoding/hex"
"fmt"
"strings"
"testing"
)
// TestQACHAP runs adversarial tests for CP5-3 CHAP authentication.
func TestQACHAP(t *testing.T) {
tests := []struct {
name string
run func(t *testing.T)
}{
// Config validation
{name: "validate_empty_secret_rejected", run: testQACHAP_ValidateEmptySecret},
{name: "validate_disabled_empty_secret_ok", run: testQACHAP_ValidateDisabledEmptyOK},
// CHAP state machine
{name: "verify_before_challenge_fails", run: testQACHAP_VerifyBeforeChallenge},
{name: "double_verify_fails", run: testQACHAP_DoubleVerify},
{name: "wrong_username_rejected", run: testQACHAP_WrongUsername},
{name: "empty_username_config_accepts_any", run: testQACHAP_EmptyUsernameAcceptsAny},
{name: "response_hex_case_insensitive", run: testQACHAP_HexCaseInsensitive},
{name: "response_with_0x_prefix", run: testQACHAP_ResponseWith0xPrefix},
{name: "response_with_0X_prefix", run: testQACHAP_ResponseWith0XPrefix},
{name: "truncated_response_rejected", run: testQACHAP_TruncatedResponse},
{name: "empty_response_rejected", run: testQACHAP_EmptyResponse},
// Login flow integration
{name: "login_chap_no_authmethod_offered", run: testQACHAP_LoginNoAuthMethod},
{name: "login_chap_none_only_rejected", run: testQACHAP_LoginNoneOnlyRejected},
{name: "login_chap_missing_chap_n", run: testQACHAP_LoginMissingChapN},
{name: "login_chap_missing_chap_r", run: testQACHAP_LoginMissingChapR},
{name: "login_chap_replayed_challenge", run: testQACHAP_LoginReplayedChallenge},
}
for _, tt := range tests {
t.Run(tt.name, tt.run)
}
}
// --- Config validation ---
func testQACHAP_ValidateEmptySecret(t *testing.T) {
err := ValidateCHAPConfig(CHAPConfig{Enabled: true, Secret: ""})
if err != ErrCHAPSecretEmpty {
t.Fatalf("expected ErrCHAPSecretEmpty, got %v", err)
}
}
func testQACHAP_ValidateDisabledEmptyOK(t *testing.T) {
err := ValidateCHAPConfig(CHAPConfig{Enabled: false, Secret: ""})
if err != nil {
t.Fatalf("expected nil, got %v", err)
}
}
// --- CHAP state machine ---
func testQACHAP_VerifyBeforeChallenge(t *testing.T) {
auth := NewCHAPAuthenticator(CHAPConfig{Enabled: true, Secret: "secret"})
// Verify without generating challenge should fail.
if auth.Verify("user", "deadbeef") {
t.Fatal("Verify before GenerateChallenge should return false")
}
}
func testQACHAP_DoubleVerify(t *testing.T) {
auth := NewCHAPAuthenticator(CHAPConfig{Enabled: true, Secret: "secret"})
params, err := auth.GenerateChallenge()
if err != nil {
t.Fatal(err)
}
// Compute correct response.
resp := computeCHAPResponse(auth.id, "secret", auth.challenge)
// First verify should succeed.
if !auth.Verify("", resp) {
t.Fatal("first Verify should succeed")
}
// Second verify should fail (state is chapDone, not chapChallengeSent).
if auth.Verify("", resp) {
t.Fatal("second Verify should fail (state already chapDone)")
}
_ = params
}
func testQACHAP_WrongUsername(t *testing.T) {
auth := NewCHAPAuthenticator(CHAPConfig{
Enabled: true, Username: "correctuser", Secret: "secret",
})
auth.GenerateChallenge()
resp := computeCHAPResponse(auth.id, "secret", auth.challenge)
if auth.Verify("wronguser", resp) {
t.Fatal("wrong username should be rejected")
}
}
func testQACHAP_EmptyUsernameAcceptsAny(t *testing.T) {
auth := NewCHAPAuthenticator(CHAPConfig{
Enabled: true, Username: "", Secret: "secret",
})
auth.GenerateChallenge()
resp := computeCHAPResponse(auth.id, "secret", auth.challenge)
if !auth.Verify("anyuser", resp) {
t.Fatal("empty username config should accept any username")
}
}
func testQACHAP_HexCaseInsensitive(t *testing.T) {
auth := NewCHAPAuthenticator(CHAPConfig{Enabled: true, Secret: "secret"})
auth.GenerateChallenge()
resp := computeCHAPResponse(auth.id, "secret", auth.challenge)
// Upper-case the response.
upper := strings.ToUpper(resp)
if !auth.Verify("", upper) {
t.Fatal("hex comparison should be case-insensitive")
}
}
func testQACHAP_ResponseWith0xPrefix(t *testing.T) {
auth := NewCHAPAuthenticator(CHAPConfig{Enabled: true, Secret: "secret"})
auth.GenerateChallenge()
resp := computeCHAPResponse(auth.id, "secret", auth.challenge)
if !auth.Verify("", "0x"+resp) {
t.Fatal("response with 0x prefix should be accepted")
}
}
func testQACHAP_ResponseWith0XPrefix(t *testing.T) {
auth := NewCHAPAuthenticator(CHAPConfig{Enabled: true, Secret: "secret"})
auth.GenerateChallenge()
resp := computeCHAPResponse(auth.id, "secret", auth.challenge)
if !auth.Verify("", "0X"+resp) {
t.Fatal("response with 0X prefix should be accepted")
}
}
func testQACHAP_TruncatedResponse(t *testing.T) {
auth := NewCHAPAuthenticator(CHAPConfig{Enabled: true, Secret: "secret"})
auth.GenerateChallenge()
resp := computeCHAPResponse(auth.id, "secret", auth.challenge)
// Truncate to half.
if auth.Verify("", resp[:len(resp)/2]) {
t.Fatal("truncated response should be rejected")
}
}
func testQACHAP_EmptyResponse(t *testing.T) {
auth := NewCHAPAuthenticator(CHAPConfig{Enabled: true, Secret: "secret"})
auth.GenerateChallenge()
if auth.Verify("", "") {
t.Fatal("empty response should be rejected")
}
}
// --- Login flow integration ---
// mkResolver returns a TargetResolver that accepts the given target name.
type simpleResolver struct{ name string }
func (r *simpleResolver) HasTarget(n string) bool { return n == r.name }
func testQACHAP_LoginNoAuthMethod(t *testing.T) {
config := DefaultTargetConfig()
config.TargetName = "iqn.test:target"
config.CHAPConfig = CHAPConfig{Enabled: true, Secret: "secret"}
ln := NewLoginNegotiator(config)
// First PDU: SecurityNeg with InitiatorName but no AuthMethod.
req := buildLoginPDU(StageSecurityNeg, StageLoginOp, false, map[string]string{
"InitiatorName": "iqn.test:init",
"TargetName": "iqn.test:target",
})
resp := ln.HandleLoginPDU(req, &simpleResolver{"iqn.test:target"})
class, detail := resp.LoginStatusClass(), resp.LoginStatusDetail()
if class != LoginStatusInitiatorErr || detail != LoginDetailAuthFailure {
t.Fatalf("expected auth failure, got class=%d detail=%d", class, detail)
}
}
func testQACHAP_LoginNoneOnlyRejected(t *testing.T) {
config := DefaultTargetConfig()
config.TargetName = "iqn.test:target"
config.CHAPConfig = CHAPConfig{Enabled: true, Secret: "secret"}
ln := NewLoginNegotiator(config)
// Initiator only offers "None".
req := buildLoginPDU(StageSecurityNeg, StageLoginOp, false, map[string]string{
"InitiatorName": "iqn.test:init",
"TargetName": "iqn.test:target",
"AuthMethod": "None",
})
resp := ln.HandleLoginPDU(req, &simpleResolver{"iqn.test:target"})
class, detail := resp.LoginStatusClass(), resp.LoginStatusDetail()
if class != LoginStatusInitiatorErr || detail != LoginDetailAuthFailure {
t.Fatalf("expected auth failure for None-only, got class=%d detail=%d", class, detail)
}
}
func testQACHAP_LoginMissingChapN(t *testing.T) {
config := DefaultTargetConfig()
config.TargetName = "iqn.test:target"
config.CHAPConfig = CHAPConfig{Enabled: true, Secret: "secret"}
ln := NewLoginNegotiator(config)
resolver := &simpleResolver{"iqn.test:target"}
// Step 1: send AuthMethod=CHAP, get challenge back.
req1 := buildLoginPDU(StageSecurityNeg, StageLoginOp, false, map[string]string{
"InitiatorName": "iqn.test:init",
"TargetName": "iqn.test:target",
"AuthMethod": "CHAP",
})
resp1 := ln.HandleLoginPDU(req1, resolver)
class1, _ := resp1.LoginStatusClass(), resp1.LoginStatusDetail()
if class1 != LoginStatusSuccess {
t.Fatalf("step 1: expected success, got class=%d", class1)
}
// Step 2: send CHAP_R but no CHAP_N.
req2 := buildLoginPDU(StageSecurityNeg, StageLoginOp, true, map[string]string{
"CHAP_R": "deadbeef",
})
resp2 := ln.HandleLoginPDU(req2, resolver)
class2, detail2 := resp2.LoginStatusClass(), resp2.LoginStatusDetail()
if class2 != LoginStatusInitiatorErr || detail2 != LoginDetailAuthFailure {
t.Fatalf("expected auth failure for missing CHAP_N, got class=%d detail=%d", class2, detail2)
}
}
func testQACHAP_LoginMissingChapR(t *testing.T) {
config := DefaultTargetConfig()
config.TargetName = "iqn.test:target"
config.CHAPConfig = CHAPConfig{Enabled: true, Secret: "secret"}
ln := NewLoginNegotiator(config)
resolver := &simpleResolver{"iqn.test:target"}
req1 := buildLoginPDU(StageSecurityNeg, StageLoginOp, false, map[string]string{
"InitiatorName": "iqn.test:init",
"TargetName": "iqn.test:target",
"AuthMethod": "CHAP",
})
ln.HandleLoginPDU(req1, resolver)
// Step 2: send CHAP_N but no CHAP_R.
req2 := buildLoginPDU(StageSecurityNeg, StageLoginOp, true, map[string]string{
"CHAP_N": "user",
})
resp2 := ln.HandleLoginPDU(req2, resolver)
class2, detail2 := resp2.LoginStatusClass(), resp2.LoginStatusDetail()
if class2 != LoginStatusInitiatorErr || detail2 != LoginDetailAuthFailure {
t.Fatalf("expected auth failure for missing CHAP_R, got class=%d detail=%d", class2, detail2)
}
}
func testQACHAP_LoginReplayedChallenge(t *testing.T) {
config := DefaultTargetConfig()
config.TargetName = "iqn.test:target"
config.CHAPConfig = CHAPConfig{Enabled: true, Secret: "secret"}
resolver := &simpleResolver{"iqn.test:target"}
// Session 1: complete login.
ln1 := NewLoginNegotiator(config)
req1a := buildLoginPDU(StageSecurityNeg, StageLoginOp, false, map[string]string{
"InitiatorName": "iqn.test:init",
"TargetName": "iqn.test:target",
"AuthMethod": "CHAP",
})
resp1a := ln1.HandleLoginPDU(req1a, resolver)
params1a, _ := ParseParams(resp1a.DataSegment)
chapC1, _ := params1a.Get("CHAP_C")
chapI1, _ := params1a.Get("CHAP_I")
// Compute valid response for session 1.
id1 := parseChapID(chapI1)
challenge1 := parseChapChallenge(chapC1)
validResp := computeCHAPResponse(id1, "secret", challenge1)
// Complete session 1.
req1b := buildLoginPDU(StageSecurityNeg, StageFullFeature, true, map[string]string{
"CHAP_N": "user",
"CHAP_R": validResp,
})
resp1b := ln1.HandleLoginPDU(req1b, resolver)
class1b, _ := resp1b.LoginStatusClass(), resp1b.LoginStatusDetail()
if class1b != LoginStatusSuccess {
t.Fatalf("session 1 should succeed, got class=%d", class1b)
}
// Session 2: try to replay session 1's response.
ln2 := NewLoginNegotiator(config)
req2a := buildLoginPDU(StageSecurityNeg, StageLoginOp, false, map[string]string{
"InitiatorName": "iqn.test:init",
"TargetName": "iqn.test:target",
"AuthMethod": "CHAP",
})
ln2.HandleLoginPDU(req2a, resolver)
// Replay session 1's response on session 2 (different challenge).
req2b := buildLoginPDU(StageSecurityNeg, StageFullFeature, true, map[string]string{
"CHAP_N": "user",
"CHAP_R": validResp,
})
resp2b := ln2.HandleLoginPDU(req2b, resolver)
class2b, detail2b := resp2b.LoginStatusClass(), resp2b.LoginStatusDetail()
if class2b != LoginStatusInitiatorErr || detail2b != LoginDetailAuthFailure {
t.Fatalf("replayed response should be rejected, got class=%d detail=%d", class2b, detail2b)
}
}
// --- Helpers ---
func computeCHAPResponse(id uint8, secret string, challenge []byte) string {
h := md5.New()
h.Write([]byte{id})
h.Write([]byte(secret))
h.Write(challenge)
return hex.EncodeToString(h.Sum(nil))
}
func parseChapID(s string) uint8 {
var id int
fmt.Sscanf(s, "%d", &id)
return uint8(id)
}
func parseChapChallenge(s string) []byte {
s = strings.TrimPrefix(s, "0x")
s = strings.TrimPrefix(s, "0X")
b, _ := hex.DecodeString(s)
return b
}
func buildLoginPDU(csg, nsg uint8, transit bool, kvs map[string]string) *PDU {
pdu := &PDU{}
pdu.SetOpcode(OpLoginReq)
pdu.SetLoginStages(csg, nsg)
pdu.SetLoginTransit(transit)
pdu.SetInitiatorTaskTag(1)
params := NewParams()
for k, v := range kvs {
params.Set(k, v)
}
pdu.DataSegment = params.Encode()
return pdu
}

286
weed/storage/blockvol/qa_resize_test.go

@ -0,0 +1,286 @@
package blockvol
import (
"os"
"path/filepath"
"sync"
"testing"
)
// TestQAResize runs adversarial tests for CP5-3 online volume expand.
func TestQAResize(t *testing.T) {
tests := []struct {
name string
run func(t *testing.T)
}{
// Rejection
{name: "shrink_rejected", run: testQAResize_ShrinkRejected},
{name: "same_size_noop", run: testQAResize_SameSize},
{name: "unaligned_size_rejected", run: testQAResize_UnalignedRejected},
{name: "expand_with_snapshots_rejected", run: testQAResize_WithSnapshotsRejected},
{name: "expand_on_closed_volume", run: testQAResize_ClosedVolume},
{name: "expand_on_replica_rejected", run: testQAResize_ReplicaRejected},
// Correctness
{name: "expand_doubles_size", run: testQAResize_DoublesSize},
{name: "expand_preserves_existing_data", run: testQAResize_PreservesData},
{name: "expand_new_region_writable", run: testQAResize_NewRegionWritable},
{name: "expand_survives_reopen", run: testQAResize_SurvivesReopen},
{name: "expand_file_size_correct", run: testQAResize_FileSizeCorrect},
// Concurrency
{name: "concurrent_expand_and_writes", run: testQAResize_ConcurrentWrites},
}
for _, tt := range tests {
t.Run(tt.name, tt.run)
}
}
// --- Rejection ---
func testQAResize_ShrinkRejected(t *testing.T) {
v := createTestVol(t)
defer v.Close()
err := v.Expand(512 * 1024) // 512KB < 1MB
if err != ErrShrinkNotSupported {
t.Fatalf("expected ErrShrinkNotSupported, got %v", err)
}
}
func testQAResize_SameSize(t *testing.T) {
v := createTestVol(t)
defer v.Close()
err := v.Expand(1 * 1024 * 1024) // same as creation size
if err != nil {
t.Fatalf("same size should be no-op, got %v", err)
}
if v.Info().VolumeSize != 1*1024*1024 {
t.Fatalf("size changed unexpectedly")
}
}
func testQAResize_UnalignedRejected(t *testing.T) {
v := createTestVol(t)
defer v.Close()
err := v.Expand(1*1024*1024 + 1000) // not aligned to 4096
if err != ErrAlignment {
t.Fatalf("expected ErrAlignment, got %v", err)
}
}
func testQAResize_WithSnapshotsRejected(t *testing.T) {
v := createTestVol(t)
defer v.Close()
v.WriteLBA(0, makeBlock('A'))
v.SyncCache()
v.CreateSnapshot(1)
err := v.Expand(2 * 1024 * 1024)
if err != ErrSnapshotsPreventResize {
t.Fatalf("expected ErrSnapshotsPreventResize, got %v", err)
}
}
func testQAResize_ClosedVolume(t *testing.T) {
v := createTestVol(t)
v.Close()
err := v.Expand(2 * 1024 * 1024)
if err == nil {
t.Fatal("expand on closed volume should fail")
}
}
func testQAResize_ReplicaRejected(t *testing.T) {
v := createTestVol(t)
defer v.Close()
// Replicas have writeGate rejecting writes; Expand also calls writeGate.
v.SetRole(RoleReplica)
err := v.Expand(2 * 1024 * 1024)
if err == nil {
t.Fatal("expand on replica should be rejected by writeGate")
}
}
// --- Correctness ---
func testQAResize_DoublesSize(t *testing.T) {
v := createTestVol(t)
defer v.Close()
if err := v.Expand(2 * 1024 * 1024); err != nil {
t.Fatal(err)
}
if v.Info().VolumeSize != 2*1024*1024 {
t.Fatalf("VolumeSize = %d, want %d", v.Info().VolumeSize, 2*1024*1024)
}
}
func testQAResize_PreservesData(t *testing.T) {
v := createTestVol(t)
defer v.Close()
// Write to last LBA of original size.
lastLBA := uint64(255) // 1MB / 4KB - 1
v.WriteLBA(lastLBA, makeBlock('Z'))
v.SyncCache()
v.flusher.FlushOnce()
// Expand.
if err := v.Expand(2 * 1024 * 1024); err != nil {
t.Fatal(err)
}
// Old data should still be there.
data, err := v.ReadLBA(lastLBA, 4096)
if err != nil {
t.Fatal(err)
}
if data[0] != 'Z' {
t.Fatalf("data after expand: got %c, want Z", data[0])
}
}
func testQAResize_NewRegionWritable(t *testing.T) {
v := createTestVol(t)
defer v.Close()
if err := v.Expand(2 * 1024 * 1024); err != nil {
t.Fatal(err)
}
// Write to a block in the new region (LBA 300, beyond original 256).
newLBA := uint64(300)
if err := v.WriteLBA(newLBA, makeBlock('N')); err != nil {
t.Fatalf("write to new region: %v", err)
}
v.SyncCache()
data, err := v.ReadLBA(newLBA, 4096)
if err != nil {
t.Fatal(err)
}
if data[0] != 'N' {
t.Fatalf("read new region: got %c, want N", data[0])
}
}
func testQAResize_SurvivesReopen(t *testing.T) {
dir := t.TempDir()
path := filepath.Join(dir, "test.blockvol")
v, err := CreateBlockVol(path, CreateOptions{
VolumeSize: 1 * 1024 * 1024,
BlockSize: 4096,
WALSize: 256 * 1024,
})
if err != nil {
t.Fatal(err)
}
v.WriteLBA(0, makeBlock('A'))
v.SyncCache()
v.Expand(2 * 1024 * 1024)
v.WriteLBA(300, makeBlock('B'))
v.SyncCache()
v.flusher.FlushOnce()
v.Close()
v2, err := OpenBlockVol(path)
if err != nil {
t.Fatal(err)
}
defer v2.Close()
if v2.Info().VolumeSize != 2*1024*1024 {
t.Fatalf("VolumeSize after reopen = %d, want %d", v2.Info().VolumeSize, 2*1024*1024)
}
d0, _ := v2.ReadLBA(0, 4096)
if d0[0] != 'A' {
t.Fatalf("LBA 0: got %c, want A", d0[0])
}
d300, _ := v2.ReadLBA(300, 4096)
if d300[0] != 'B' {
t.Fatalf("LBA 300: got %c, want B", d300[0])
}
}
func testQAResize_FileSizeCorrect(t *testing.T) {
dir := t.TempDir()
path := filepath.Join(dir, "test.blockvol")
v, err := CreateBlockVol(path, CreateOptions{
VolumeSize: 1 * 1024 * 1024,
BlockSize: 4096,
WALSize: 256 * 1024,
})
if err != nil {
t.Fatal(err)
}
defer v.Close()
// Original file size = superblock(4096) + WAL(256KB) + extent(1MB)
expectedBefore := int64(4096 + 256*1024 + 1*1024*1024)
fi, _ := os.Stat(path)
if fi.Size() != expectedBefore {
t.Fatalf("original file size = %d, want %d", fi.Size(), expectedBefore)
}
v.Expand(2 * 1024 * 1024)
// New file size = superblock(4096) + WAL(256KB) + extent(2MB)
expectedAfter := int64(4096 + 256*1024 + 2*1024*1024)
fi2, _ := os.Stat(path)
if fi2.Size() != expectedAfter {
t.Fatalf("expanded file size = %d, want %d", fi2.Size(), expectedAfter)
}
}
// --- Concurrency ---
func testQAResize_ConcurrentWrites(t *testing.T) {
v := createTestVol(t)
defer v.Close()
// Start writers.
var wg sync.WaitGroup
errCh := make(chan error, 100)
wg.Add(1)
go func() {
defer wg.Done()
for i := 0; i < 20; i++ {
if err := v.WriteLBA(uint64(i%10), makeBlock(byte('0'+i%10))); err != nil {
errCh <- err
return
}
}
}()
// Expand while writes are in progress.
wg.Add(1)
go func() {
defer wg.Done()
if err := v.Expand(2 * 1024 * 1024); err != nil {
errCh <- err
}
}()
wg.Wait()
close(errCh)
for err := range errCh {
t.Fatalf("concurrent error: %v", err)
}
// Volume should be expanded and functional.
if v.Info().VolumeSize != 2*1024*1024 {
t.Fatalf("VolumeSize = %d after concurrent expand", v.Info().VolumeSize)
}
}

717
weed/storage/blockvol/qa_snapshot_test.go

@ -0,0 +1,717 @@
package blockvol
import (
"os"
"path/filepath"
"sync"
"sync/atomic"
"testing"
"time"
)
// TestQASnapshot runs adversarial tests for CP5-2 CoW snapshots.
func TestQASnapshot(t *testing.T) {
tests := []struct {
name string
run func(t *testing.T)
}{
// Group A: Race conditions and concurrency
{name: "concurrent_create_same_id", run: testQASnap_ConcurrentCreateSameID},
{name: "concurrent_create_different_ids", run: testQASnap_ConcurrentCreateDifferentIDs},
{name: "delete_during_flush_cow", run: testQASnap_DeleteDuringFlushCoW},
{name: "concurrent_read_snapshot_during_cow", run: testQASnap_ConcurrentReadDuringCoW},
{name: "create_snapshot_during_close", run: testQASnap_CreateDuringClose},
// Group B: Role and state rejection
{name: "create_on_replica_rejected", run: testQASnap_CreateOnReplicaRejected},
{name: "create_on_stale_rejected", run: testQASnap_CreateOnStaleRejected},
{name: "create_on_rebuilding_rejected", run: testQASnap_CreateOnRebuildingRejected},
{name: "create_duplicate_id_rejected", run: testQASnap_CreateDuplicateIDRejected},
// Group C: Edge cases
{name: "read_unmodified_block_returns_zeros", run: testQASnap_ReadUnmodifiedBlockZeros},
{name: "cow_trim_block_preserves_old_data", run: testQASnap_CoWTrimBlockPreservesOldData},
{name: "delete_nonexistent_snapshot", run: testQASnap_DeleteNonexistent},
{name: "read_nonexistent_snapshot", run: testQASnap_ReadNonexistent},
{name: "restore_nonexistent_snapshot", run: testQASnap_RestoreNonexistent},
{name: "snapshot_at_boundary_lba", run: testQASnap_BoundaryLBA},
// Group D: Stress and lifecycle
{name: "create_delete_many_snapshots", run: testQASnap_CreateDeleteMany},
{name: "restore_then_new_snapshot", run: testQASnap_RestoreThenNewSnapshot},
{name: "multiple_flush_cycles_cow_idempotent", run: testQASnap_MultiFlushCoWIdempotent},
{name: "snapshot_recovery_after_post_cow_writes", run: testQASnap_RecoveryAfterPostCoWWrites},
// Group E: Restore correctness
{name: "restore_with_multiple_snapshots", run: testQASnap_RestoreWithMultiple},
{name: "restore_volume_writable_after", run: testQASnap_RestoreWritableAfter},
}
for _, tt := range tests {
t.Run(tt.name, tt.run)
}
}
// --- Group A: Race conditions and concurrency ---
// testQASnap_ConcurrentCreateSameID: two goroutines race to create
// the same snapshot ID. Exactly one must succeed, the other must get
// ErrSnapshotExists (or O_EXCL file error). No double-registration.
func testQASnap_ConcurrentCreateSameID(t *testing.T) {
v := createTestVol(t)
defer v.Close()
v.WriteLBA(0, makeBlock('A'))
v.SyncCache()
var wg sync.WaitGroup
var successes atomic.Int32
var failures atomic.Int32
for i := 0; i < 10; i++ {
wg.Add(1)
go func() {
defer wg.Done()
err := v.CreateSnapshot(42)
if err == nil {
successes.Add(1)
} else {
failures.Add(1)
}
}()
}
wg.Wait()
// Exactly one should succeed.
if s := successes.Load(); s != 1 {
t.Fatalf("expected exactly 1 success, got %d", s)
}
// Snapshot map should have exactly one entry.
v.snapMu.RLock()
n := len(v.snapshots)
v.snapMu.RUnlock()
if n != 1 {
t.Fatalf("expected 1 snapshot in map, got %d", n)
}
// Delta file should exist exactly once.
deltaPath := deltaFilePath(v.path, 42)
if _, err := os.Stat(deltaPath); err != nil {
t.Fatalf("delta file missing: %v", err)
}
}
// testQASnap_ConcurrentCreateDifferentIDs: multiple goroutines create
// different snapshot IDs concurrently. All should succeed.
func testQASnap_ConcurrentCreateDifferentIDs(t *testing.T) {
v := createTestVol(t)
defer v.Close()
v.WriteLBA(0, makeBlock('A'))
v.SyncCache()
const n = 5
var wg sync.WaitGroup
errs := make([]error, n)
for i := 0; i < n; i++ {
wg.Add(1)
go func(id int) {
defer wg.Done()
errs[id] = v.CreateSnapshot(uint32(id + 1))
}(i)
}
wg.Wait()
for i, err := range errs {
if err != nil {
t.Fatalf("snapshot %d failed: %v", i+1, err)
}
}
infos := v.ListSnapshots()
if len(infos) != n {
t.Fatalf("expected %d snapshots, got %d", n, len(infos))
}
}
// testQASnap_DeleteDuringFlushCoW: tries to trigger the race where
// the flusher copies snapshots into a local slice, then DeleteSnapshot
// closes the fd while flusher is still using it.
func testQASnap_DeleteDuringFlushCoW(t *testing.T) {
v := createTestVol(t)
defer v.Close()
// Write initial data and create snapshot.
v.WriteLBA(0, makeBlock('A'))
v.SyncCache()
if err := v.CreateSnapshot(1); err != nil {
t.Fatal(err)
}
// Write new data to trigger CoW on next flush.
v.WriteLBA(0, makeBlock('B'))
v.SyncCache()
// Race: flush (which does CoW) vs delete.
var wg sync.WaitGroup
wg.Add(2)
go func() {
defer wg.Done()
v.flusher.FlushOnce()
}()
go func() {
defer wg.Done()
// Small delay to let flush start.
time.Sleep(100 * time.Microsecond)
v.DeleteSnapshot(1)
}()
wg.Wait()
// Volume should still be functional (no panic, no EBADF crash).
if err := v.WriteLBA(0, makeBlock('C')); err != nil {
t.Fatalf("write after race: %v", err)
}
}
// testQASnap_ConcurrentReadDuringCoW: reads from a snapshot while the
// flusher is actively performing CoW on other blocks.
func testQASnap_ConcurrentReadDuringCoW(t *testing.T) {
v := createTestVol(t)
defer v.Close()
// Write blocks 0-9.
for i := uint64(0); i < 10; i++ {
v.WriteLBA(i, makeBlock(byte('A'+i)))
}
v.SyncCache()
v.CreateSnapshot(1)
// Modify blocks 5-9 to trigger CoW.
for i := uint64(5); i < 10; i++ {
v.WriteLBA(i, makeBlock('Z'))
}
v.SyncCache()
// Race: flush (CoW) vs snapshot read.
var wg sync.WaitGroup
var readErr error
var readData []byte
wg.Add(2)
go func() {
defer wg.Done()
v.flusher.FlushOnce()
}()
go func() {
defer wg.Done()
// Read block 0 from snapshot (not being CoW'd).
readData, readErr = v.ReadSnapshot(1, 0, 4096)
}()
wg.Wait()
if readErr != nil {
t.Fatalf("snapshot read during CoW: %v", readErr)
}
if readData[0] != 'A' {
t.Fatalf("snapshot read: got %c, want A", readData[0])
}
}
// testQASnap_CreateDuringClose: CreateSnapshot should fail cleanly on
// a closed volume, not panic or deadlock.
func testQASnap_CreateDuringClose(t *testing.T) {
v := createTestVol(t)
v.WriteLBA(0, makeBlock('A'))
v.SyncCache()
// Close the volume.
v.Close()
// Creating a snapshot on a closed volume should return error.
err := v.CreateSnapshot(1)
if err == nil {
t.Fatal("expected error creating snapshot on closed volume")
}
}
// --- Group B: Role and state rejection ---
func testQASnap_CreateOnReplicaRejected(t *testing.T) {
v := createTestVol(t)
defer v.Close()
// Transition: None -> Replica
v.SetRole(RoleReplica)
err := v.CreateSnapshot(1)
if err != ErrSnapshotRoleReject {
t.Fatalf("expected ErrSnapshotRoleReject, got %v", err)
}
}
func testQASnap_CreateOnStaleRejected(t *testing.T) {
v := createTestVol(t)
defer v.Close()
// None -> Replica -> (need to get to Stale)
// Stale is only reachable from Draining. Use role.Store directly for test.
v.role.Store(uint32(RoleStale))
err := v.CreateSnapshot(1)
if err != ErrSnapshotRoleReject {
t.Fatalf("expected ErrSnapshotRoleReject, got %v", err)
}
}
func testQASnap_CreateOnRebuildingRejected(t *testing.T) {
v := createTestVol(t)
defer v.Close()
// Force to Rebuilding for test.
v.role.Store(uint32(RoleRebuilding))
err := v.CreateSnapshot(1)
if err != ErrSnapshotRoleReject {
t.Fatalf("expected ErrSnapshotRoleReject, got %v", err)
}
}
func testQASnap_CreateDuplicateIDRejected(t *testing.T) {
v := createTestVol(t)
defer v.Close()
v.WriteLBA(0, makeBlock('A'))
v.SyncCache()
if err := v.CreateSnapshot(1); err != nil {
t.Fatal(err)
}
err := v.CreateSnapshot(1)
if err != ErrSnapshotExists {
t.Fatalf("expected ErrSnapshotExists, got %v", err)
}
}
// --- Group C: Edge cases ---
// testQASnap_ReadUnmodifiedBlockZeros: reading a block from a snapshot
// that was never written to should return zeros (from extent).
func testQASnap_ReadUnmodifiedBlockZeros(t *testing.T) {
v := createTestVol(t)
defer v.Close()
// Create snapshot without writing anything.
if err := v.CreateSnapshot(1); err != nil {
t.Fatal(err)
}
// Read block 100 (never written).
data, err := v.ReadSnapshot(1, 100, 4096)
if err != nil {
t.Fatal(err)
}
for i, b := range data {
if b != 0 {
t.Fatalf("byte %d: got %d, want 0", i, b)
}
}
}
// testQASnap_CoWTrimBlockPreservesOldData: snapshot preserves data that
// was present before a TRIM operation.
func testQASnap_CoWTrimBlockPreservesOldData(t *testing.T) {
v := createTestVol(t)
defer v.Close()
// Write 'X' to LBA 3.
v.WriteLBA(3, makeBlock('X'))
v.SyncCache()
v.flusher.FlushOnce() // flush to extent
// Snapshot captures 'X' at LBA 3.
if err := v.CreateSnapshot(1); err != nil {
t.Fatal(err)
}
// TRIM LBA 3 (zeros it).
v.Trim(3, 4096)
v.SyncCache()
v.flusher.FlushOnce() // CoW 'X' to delta, then zero extent
// Live read should be zeros.
live, err := v.ReadLBA(3, 4096)
if err != nil {
t.Fatal(err)
}
if live[0] != 0 {
t.Fatalf("live after TRIM: got %d, want 0", live[0])
}
// Snapshot should still see 'X'.
snap, err := v.ReadSnapshot(1, 3, 4096)
if err != nil {
t.Fatal(err)
}
if snap[0] != 'X' {
t.Fatalf("snapshot after TRIM: got %c, want X", snap[0])
}
}
func testQASnap_DeleteNonexistent(t *testing.T) {
v := createTestVol(t)
defer v.Close()
err := v.DeleteSnapshot(999)
if err != ErrSnapshotNotFound {
t.Fatalf("expected ErrSnapshotNotFound, got %v", err)
}
}
func testQASnap_ReadNonexistent(t *testing.T) {
v := createTestVol(t)
defer v.Close()
_, err := v.ReadSnapshot(999, 0, 4096)
if err != ErrSnapshotNotFound {
t.Fatalf("expected ErrSnapshotNotFound, got %v", err)
}
}
func testQASnap_RestoreNonexistent(t *testing.T) {
v := createTestVol(t)
defer v.Close()
err := v.RestoreSnapshot(999)
if err != ErrSnapshotNotFound {
t.Fatalf("expected ErrSnapshotNotFound, got %v", err)
}
}
// testQASnap_BoundaryLBA: test CoW at LBA 0 and the last valid LBA.
func testQASnap_BoundaryLBA(t *testing.T) {
v := createTestVol(t)
defer v.Close()
// Volume is 1MB = 256 blocks (LBA 0..255).
lastLBA := uint64(255)
v.WriteLBA(0, makeBlock('F'))
v.WriteLBA(lastLBA, makeBlock('L'))
v.SyncCache()
v.CreateSnapshot(1)
// Overwrite both boundaries.
v.WriteLBA(0, makeBlock('f'))
v.WriteLBA(lastLBA, makeBlock('l'))
v.SyncCache()
v.flusher.FlushOnce()
// Snapshot should see originals.
s0, _ := v.ReadSnapshot(1, 0, 4096)
sL, _ := v.ReadSnapshot(1, lastLBA, 4096)
if s0[0] != 'F' {
t.Fatalf("LBA 0: got %c, want F", s0[0])
}
if sL[0] != 'L' {
t.Fatalf("LBA %d: got %c, want L", lastLBA, sL[0])
}
}
// --- Group D: Stress and lifecycle ---
// testQASnap_CreateDeleteMany: create and delete many snapshots to
// stress the lifecycle. No leaks, no stale entries.
func testQASnap_CreateDeleteMany(t *testing.T) {
v := createTestVol(t)
defer v.Close()
v.WriteLBA(0, makeBlock('A'))
v.SyncCache()
for i := uint32(1); i <= 20; i++ {
if err := v.CreateSnapshot(i); err != nil {
t.Fatalf("create snapshot %d: %v", i, err)
}
// Write after each snapshot to force CoW.
v.WriteLBA(0, makeBlock(byte('A'+i%26)))
v.SyncCache()
v.flusher.FlushOnce()
}
if len(v.ListSnapshots()) != 20 {
t.Fatalf("expected 20 snapshots, got %d", len(v.ListSnapshots()))
}
// Delete odd-numbered snapshots.
for i := uint32(1); i <= 20; i += 2 {
if err := v.DeleteSnapshot(i); err != nil {
t.Fatalf("delete snapshot %d: %v", i, err)
}
}
if len(v.ListSnapshots()) != 10 {
t.Fatalf("expected 10 snapshots after deletion, got %d", len(v.ListSnapshots()))
}
// Verify delta files of deleted snapshots are gone.
for i := uint32(1); i <= 20; i += 2 {
p := deltaFilePath(v.path, i)
if _, err := os.Stat(p); !os.IsNotExist(err) {
t.Fatalf("delta file for snapshot %d still exists", i)
}
}
// Verify remaining snapshots are readable.
for i := uint32(2); i <= 20; i += 2 {
if _, err := v.ReadSnapshot(i, 0, 4096); err != nil {
t.Fatalf("read snapshot %d: %v", i, err)
}
}
}
// testQASnap_RestoreThenNewSnapshot: after restore, creating a new
// snapshot should work cleanly (no leftover state).
func testQASnap_RestoreThenNewSnapshot(t *testing.T) {
v := createTestVol(t)
defer v.Close()
v.WriteLBA(0, makeBlock('A'))
v.SyncCache()
v.CreateSnapshot(1)
v.WriteLBA(0, makeBlock('B'))
v.SyncCache()
v.flusher.FlushOnce()
// Restore back to 'A'.
v.RestoreSnapshot(1)
// All snapshots gone.
if len(v.ListSnapshots()) != 0 {
t.Fatal("snapshots should be empty after restore")
}
// Create a new snapshot on the restored state.
if err := v.CreateSnapshot(10); err != nil {
t.Fatalf("create after restore: %v", err)
}
// Write new data.
v.WriteLBA(0, makeBlock('C'))
v.SyncCache()
v.flusher.FlushOnce()
// New snapshot should see 'A' (the restored state).
data, err := v.ReadSnapshot(10, 0, 4096)
if err != nil {
t.Fatal(err)
}
if data[0] != 'A' {
t.Fatalf("snapshot after restore: got %c, want A", data[0])
}
// Live should see 'C'.
live, _ := v.ReadLBA(0, 4096)
if live[0] != 'C' {
t.Fatalf("live after restore+write: got %c, want C", live[0])
}
}
// testQASnap_MultiFlushCoWIdempotent: flushing multiple times after a
// snapshot should only CoW each block once (bitmap prevents double CoW).
func testQASnap_MultiFlushCoWIdempotent(t *testing.T) {
v := createTestVol(t)
defer v.Close()
v.WriteLBA(0, makeBlock('A'))
v.SyncCache()
v.CreateSnapshot(1)
// Write 'B', flush (CoW 'A' to delta).
v.WriteLBA(0, makeBlock('B'))
v.SyncCache()
v.flusher.FlushOnce()
// Write 'C', flush (should NOT re-CoW -- bitmap[0] already set).
v.WriteLBA(0, makeBlock('C'))
v.SyncCache()
v.flusher.FlushOnce()
// Write 'D', flush again.
v.WriteLBA(0, makeBlock('D'))
v.SyncCache()
v.flusher.FlushOnce()
// Snapshot should still see 'A' (the first CoW), not 'B' or 'C'.
data, err := v.ReadSnapshot(1, 0, 4096)
if err != nil {
t.Fatal(err)
}
if data[0] != 'A' {
t.Fatalf("snapshot after multi-flush: got %c, want A", data[0])
}
// Bitmap should have exactly 1 bit set.
v.snapMu.RLock()
cowCount := v.snapshots[1].bitmap.CountSet()
v.snapMu.RUnlock()
if cowCount != 1 {
t.Fatalf("CoW count = %d, want 1 (idempotent)", cowCount)
}
}
// testQASnap_RecoveryAfterPostCoWWrites: create snapshot, do CoW writes,
// close, reopen. Verify snapshot data and live data are both correct.
func testQASnap_RecoveryAfterPostCoWWrites(t *testing.T) {
dir := t.TempDir()
path := filepath.Join(dir, "test.blockvol")
v, err := CreateBlockVol(path, CreateOptions{
VolumeSize: 1 * 1024 * 1024,
BlockSize: 4096,
WALSize: 256 * 1024,
})
if err != nil {
t.Fatal(err)
}
// Write multiple blocks.
v.WriteLBA(0, makeBlock('A'))
v.WriteLBA(1, makeBlock('B'))
v.WriteLBA(2, makeBlock('C'))
v.SyncCache()
v.CreateSnapshot(1)
// Overwrite all three blocks.
v.WriteLBA(0, makeBlock('X'))
v.WriteLBA(1, makeBlock('Y'))
v.WriteLBA(2, makeBlock('Z'))
v.SyncCache()
v.flusher.FlushOnce()
// Write even more data.
v.WriteLBA(0, makeBlock('1'))
v.SyncCache()
v.flusher.FlushOnce()
v.Close()
// Reopen.
v2, err := OpenBlockVol(path)
if err != nil {
t.Fatal(err)
}
defer v2.Close()
// Snapshot should see original A, B, C.
for i, expected := range []byte{'A', 'B', 'C'} {
data, err := v2.ReadSnapshot(1, uint64(i), 4096)
if err != nil {
t.Fatalf("LBA %d: %v", i, err)
}
if data[0] != expected {
t.Fatalf("LBA %d snapshot: got %c, want %c", i, data[0], expected)
}
}
// Live should see '1', 'Y', 'Z'.
for i, expected := range []byte{'1', 'Y', 'Z'} {
data, err := v2.ReadLBA(uint64(i), 4096)
if err != nil {
t.Fatalf("LBA %d: %v", i, err)
}
if data[0] != expected {
t.Fatalf("LBA %d live: got %c, want %c", i, data[0], expected)
}
}
}
// --- Group E: Restore correctness ---
// testQASnap_RestoreWithMultiple: with two snapshots S1 and S2, restoring
// S1 should revert to S1's state and remove both snapshots.
func testQASnap_RestoreWithMultiple(t *testing.T) {
v := createTestVol(t)
defer v.Close()
// A -> S1 -> B -> S2 -> C
v.WriteLBA(0, makeBlock('A'))
v.SyncCache()
v.CreateSnapshot(1)
v.WriteLBA(0, makeBlock('B'))
v.SyncCache()
v.flusher.FlushOnce()
v.CreateSnapshot(2)
v.WriteLBA(0, makeBlock('C'))
v.SyncCache()
v.flusher.FlushOnce()
// Restore S1 (should revert to 'A').
if err := v.RestoreSnapshot(1); err != nil {
t.Fatal(err)
}
data, _ := v.ReadLBA(0, 4096)
if data[0] != 'A' {
t.Fatalf("after restore S1: got %c, want A", data[0])
}
// Both snapshots should be removed.
if len(v.ListSnapshots()) != 0 {
t.Fatal("all snapshots should be removed after restore")
}
// Delta files for both should be gone.
for _, id := range []uint32{1, 2} {
p := deltaFilePath(v.path, id)
if _, err := os.Stat(p); !os.IsNotExist(err) {
t.Fatalf("delta file for snapshot %d still exists", id)
}
}
}
// testQASnap_RestoreWritableAfter: after restore, verify the volume can
// handle a full write-read-flush cycle and nextLSN is correct.
func testQASnap_RestoreWritableAfter(t *testing.T) {
v := createTestVol(t)
defer v.Close()
v.WriteLBA(0, makeBlock('A'))
v.SyncCache()
v.CreateSnapshot(1)
// Many writes to advance LSN.
for i := 0; i < 50; i++ {
v.WriteLBA(0, makeBlock(byte('0'+i%10)))
}
v.SyncCache()
v.flusher.FlushOnce()
v.RestoreSnapshot(1)
// nextLSN should be baseLSN+1 (low number, reset).
currentLSN := v.nextLSN.Load()
if currentLSN > 10 {
t.Fatalf("nextLSN after restore too high: %d (expected reset to ~baseLSN+1)", currentLSN)
}
// Write-read cycle should work.
if err := v.WriteLBA(0, makeBlock('W')); err != nil {
t.Fatalf("write after restore: %v", err)
}
v.SyncCache()
v.flusher.FlushOnce()
data, err := v.ReadLBA(0, 4096)
if err != nil {
t.Fatal(err)
}
if data[0] != 'W' {
t.Fatalf("read after restore write: got %c, want W", data[0])
}
}
Loading…
Cancel
Save