// Copyright 2022 Huawei Cloud Computing Technology Co., Ltd. // // Licensed under the Apache License, Version 2.0 (the "License"); // you may not use this file except in compliance with the License. // You may obtain a copy of the License at // // http://www.apache.org/licenses/LICENSE-2.0 // // Unless required by applicable law or agreed to in writing, software // distributed under the License is distributed on an "AS IS" BASIS, // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. // See the License for the specific language governing permissions and // limitations under the License. #include // std::equal_to #include #include #include "catch2/catch_test_macros.hpp" #include "gsl/gsl" #include "src/buildtool/common/artifact_digest.hpp" #include "src/buildtool/common/remote/retry_config.hpp" #include "src/buildtool/crypto/hash_function.hpp" #include "src/buildtool/execution_api/bazel_msg/bazel_blob_container.hpp" #include "src/buildtool/execution_api/remote/bazel/bazel_cas_client.hpp" #include "src/buildtool/execution_api/remote/bazel/bazel_execution_client.hpp" #include "src/buildtool/execution_api/remote/config.hpp" #include "src/buildtool/file_system/object_type.hpp" #include "test/utils/remote_execution/test_auth_config.hpp" #include "test/utils/remote_execution/test_remote_config.hpp" TEST_CASE("Bazel internals: CAS Client", "[execution_api]") { std::string instance_name{"remote-execution"}; std::string content("test"); auto auth_config = TestAuthConfig::ReadFromEnvironment(); REQUIRE(auth_config); // Create CAS client auto remote_config = TestRemoteConfig::ReadFromEnvironment(); REQUIRE(remote_config); REQUIRE(remote_config->remote_address); RetryConfig retry_config{}; // default retry config BazelCasClient cas_client(remote_config->remote_address->host, remote_config->remote_address->port, &*auth_config, &retry_config); SECTION("Valid digest and blob") { // digest of "test" HashFunction const hash_function{ Compatibility::IsCompatible() ? HashFunction::JustHash::Compatible : HashFunction::JustHash::Native}; auto digest = ArtifactDigest::Create(hash_function, content); // Valid blob BazelBlob blob{digest, content, /*is_exec=*/false}; // Search blob via digest auto digests = cas_client.FindMissingBlobs(instance_name, {digest}); CHECK(digests.size() <= 1); if (!digests.empty()) { // Upload blob, if not found std::vector> to_upload{&blob}; CHECK(cas_client.BatchUpdateBlobs( instance_name, to_upload.begin(), to_upload.end()) == 1U); } // Read blob std::vector to_read{digest}; auto blobs = cas_client.BatchReadBlobs( instance_name, to_read.begin(), to_read.end()); REQUIRE(blobs.size() == 1); CHECK(std::equal_to{}(blobs[0].digest, digest)); CHECK(*blobs[0].data == content); } SECTION("Invalid digest and blob") { // Faulty digest bazel_re::Digest faulty_digest{}; faulty_digest.set_hash( "0123456789abcdef0123456789abcdef0123456789abcdef0123456789abcdef"); faulty_digest.set_size_bytes(4); // Faulty blob BazelBlob faulty_blob{faulty_digest, content, /*is_exec=*/false}; // Search faulty digest CHECK(cas_client.FindMissingBlobs(instance_name, {faulty_digest}) .size() == 1); // Try upload faulty blob std::vector> to_upload{&faulty_blob}; CHECK(cas_client.BatchUpdateBlobs( instance_name, to_upload.begin(), to_upload.end()) == 0U); // Read blob via faulty digest std::vector to_read{faulty_digest}; CHECK(cas_client .BatchReadBlobs(instance_name, to_read.begin(), to_read.end()) .empty()); } }