From e187711c6545487d4cac3701f0f506bb536234e2 Mon Sep 17 00:00:00 2001 From: ethersphere Date: Wed, 20 Jun 2018 14:06:27 +0200 Subject: swarm: network rewrite merge --- swarm/storage/filestore_test.go | 164 ++++++++++++++++++++++++++++++++++++++++ 1 file changed, 164 insertions(+) create mode 100644 swarm/storage/filestore_test.go (limited to 'swarm/storage/filestore_test.go') diff --git a/swarm/storage/filestore_test.go b/swarm/storage/filestore_test.go new file mode 100644 index 000000000..1aaec5e5c --- /dev/null +++ b/swarm/storage/filestore_test.go @@ -0,0 +1,164 @@ +// Copyright 2016 The go-ethereum Authors +// This file is part of the go-ethereum library. +// +// The go-ethereum library is free software: you can redistribute it and/or modify +// it under the terms of the GNU Lesser General Public License as published by +// the Free Software Foundation, either version 3 of the License, or +// (at your option) any later version. +// +// The go-ethereum library is distributed in the hope that it will be useful, +// but WITHOUT ANY WARRANTY; without even the implied warranty of +// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the +// GNU Lesser General Public License for more details. +// +// You should have received a copy of the GNU Lesser General Public License +// along with the go-ethereum library. If not, see . + +package storage + +import ( + "bytes" + "io" + "io/ioutil" + "os" + "testing" +) + +const testDataSize = 0x1000000 + +func TestFileStorerandom(t *testing.T) { + testFileStoreRandom(false, t) + testFileStoreRandom(true, t) +} + +func testFileStoreRandom(toEncrypt bool, t *testing.T) { + tdb, cleanup, err := newTestDbStore(false, false) + defer cleanup() + if err != nil { + t.Fatalf("init dbStore failed: %v", err) + } + db := tdb.LDBStore + db.setCapacity(50000) + memStore := NewMemStore(NewDefaultStoreParams(), db) + localStore := &LocalStore{ + memStore: memStore, + DbStore: db, + } + + fileStore := NewFileStore(localStore, NewFileStoreParams()) + defer os.RemoveAll("/tmp/bzz") + + reader, slice := generateRandomData(testDataSize) + key, wait, err := fileStore.Store(reader, testDataSize, toEncrypt) + if err != nil { + t.Errorf("Store error: %v", err) + } + wait() + resultReader, isEncrypted := fileStore.Retrieve(key) + if isEncrypted != toEncrypt { + t.Fatalf("isEncrypted expected %v got %v", toEncrypt, isEncrypted) + } + resultSlice := make([]byte, len(slice)) + n, err := resultReader.ReadAt(resultSlice, 0) + if err != io.EOF { + t.Errorf("Retrieve error: %v", err) + } + if n != len(slice) { + t.Errorf("Slice size error got %d, expected %d.", n, len(slice)) + } + if !bytes.Equal(slice, resultSlice) { + t.Errorf("Comparison error.") + } + ioutil.WriteFile("/tmp/slice.bzz.16M", slice, 0666) + ioutil.WriteFile("/tmp/result.bzz.16M", resultSlice, 0666) + localStore.memStore = NewMemStore(NewDefaultStoreParams(), db) + resultReader, isEncrypted = fileStore.Retrieve(key) + if isEncrypted != toEncrypt { + t.Fatalf("isEncrypted expected %v got %v", toEncrypt, isEncrypted) + } + for i := range resultSlice { + resultSlice[i] = 0 + } + n, err = resultReader.ReadAt(resultSlice, 0) + if err != io.EOF { + t.Errorf("Retrieve error after removing memStore: %v", err) + } + if n != len(slice) { + t.Errorf("Slice size error after removing memStore got %d, expected %d.", n, len(slice)) + } + if !bytes.Equal(slice, resultSlice) { + t.Errorf("Comparison error after removing memStore.") + } +} + +func TestFileStoreCapacity(t *testing.T) { + testFileStoreCapacity(false, t) + testFileStoreCapacity(true, t) +} + +func testFileStoreCapacity(toEncrypt bool, t *testing.T) { + tdb, cleanup, err := newTestDbStore(false, false) + defer cleanup() + if err != nil { + t.Fatalf("init dbStore failed: %v", err) + } + db := tdb.LDBStore + memStore := NewMemStore(NewDefaultStoreParams(), db) + localStore := &LocalStore{ + memStore: memStore, + DbStore: db, + } + fileStore := NewFileStore(localStore, NewFileStoreParams()) + reader, slice := generateRandomData(testDataSize) + key, wait, err := fileStore.Store(reader, testDataSize, toEncrypt) + if err != nil { + t.Errorf("Store error: %v", err) + } + wait() + resultReader, isEncrypted := fileStore.Retrieve(key) + if isEncrypted != toEncrypt { + t.Fatalf("isEncrypted expected %v got %v", toEncrypt, isEncrypted) + } + resultSlice := make([]byte, len(slice)) + n, err := resultReader.ReadAt(resultSlice, 0) + if err != io.EOF { + t.Errorf("Retrieve error: %v", err) + } + if n != len(slice) { + t.Errorf("Slice size error got %d, expected %d.", n, len(slice)) + } + if !bytes.Equal(slice, resultSlice) { + t.Errorf("Comparison error.") + } + // Clear memStore + memStore.setCapacity(0) + // check whether it is, indeed, empty + fileStore.ChunkStore = memStore + resultReader, isEncrypted = fileStore.Retrieve(key) + if isEncrypted != toEncrypt { + t.Fatalf("isEncrypted expected %v got %v", toEncrypt, isEncrypted) + } + if _, err = resultReader.ReadAt(resultSlice, 0); err == nil { + t.Errorf("Was able to read %d bytes from an empty memStore.", len(slice)) + } + // check how it works with localStore + fileStore.ChunkStore = localStore + // localStore.dbStore.setCapacity(0) + resultReader, isEncrypted = fileStore.Retrieve(key) + if isEncrypted != toEncrypt { + t.Fatalf("isEncrypted expected %v got %v", toEncrypt, isEncrypted) + } + for i := range resultSlice { + resultSlice[i] = 0 + } + n, err = resultReader.ReadAt(resultSlice, 0) + if err != io.EOF { + t.Errorf("Retrieve error after clearing memStore: %v", err) + } + if n != len(slice) { + t.Errorf("Slice size error after clearing memStore got %d, expected %d.", n, len(slice)) + } + if !bytes.Equal(slice, resultSlice) { + t.Errorf("Comparison error after clearing memStore.") + } +} -- cgit v1.2.3