~bzr-pqm/bzr/bzr.dev

2052.3.2 by John Arbash Meinel
Change Copyright .. by Canonical to Copyright ... Canonical
1
# Copyright (C) 2005, 2006 Canonical Ltd
1887.1.1 by Adeodato Simó
Do not separate paragraphs in the copyright statement with blank lines,
2
#
1185.67.4 by Aaron Bentley
Throw if we try to write to a LockableFiles with no write lock
3
# This program is free software; you can redistribute it and/or modify
4
# it under the terms of the GNU General Public License as published by
5
# the Free Software Foundation; either version 2 of the License, or
6
# (at your option) any later version.
1887.1.1 by Adeodato Simó
Do not separate paragraphs in the copyright statement with blank lines,
7
#
1185.67.4 by Aaron Bentley
Throw if we try to write to a LockableFiles with no write lock
8
# This program is distributed in the hope that it will be useful,
9
# but WITHOUT ANY WARRANTY; without even the implied warranty of
10
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
11
# GNU General Public License for more details.
1887.1.1 by Adeodato Simó
Do not separate paragraphs in the copyright statement with blank lines,
12
#
1185.67.4 by Aaron Bentley
Throw if we try to write to a LockableFiles with no write lock
13
# You should have received a copy of the GNU General Public License
14
# along with this program; if not, write to the Free Software
15
# Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA  02111-1307  USA
16
1185.70.2 by Martin Pool
Fix funny mistake
17
from StringIO import StringIO
18
1687.1.6 by Robert Collins
Extend LockableFiles to support break_lock() calls.
19
import bzrlib
20
import bzrlib.errors as errors
1185.65.29 by Robert Collins
Implement final review suggestions.
21
from bzrlib.errors import BzrBadParameterNotString, NoSuchFile, ReadOnlyError
1553.5.63 by Martin Pool
Lock type is now mandatory for LockableFiles constructor
22
from bzrlib.lockable_files import LockableFiles, TransportLock
2279.7.1 by Andrew Bennetts
``LockableFiles.lock_write()`` now accepts a ``token`` keyword argument, so that
23
from bzrlib import lockdir
1553.5.44 by Martin Pool
LockableFiles can now call LockDir directly
24
from bzrlib.lockdir import LockDir
1185.67.4 by Aaron Bentley
Throw if we try to write to a LockableFiles with no write lock
25
from bzrlib.tests import TestCaseInTempDir
2018.5.59 by Robert Collins
Get BranchConfig working somewhat on RemoteBranches (Robert Collins, Vincent Ladeuil).
26
from bzrlib.tests.test_smart import TestCaseWithSmartMedium
1594.2.22 by Robert Collins
Ensure that lockable files calls finish() on transactions.:
27
from bzrlib.tests.test_transactions import DummyWeave
1563.2.34 by Robert Collins
Remove the commit and rollback transaction methods as misleading, and implement a WriteTransaction
28
from bzrlib.transactions import (PassThroughTransaction,
29
                                 ReadOnlyTransaction,
30
                                 WriteTransaction,
31
                                 )
1185.67.4 by Aaron Bentley
Throw if we try to write to a LockableFiles with no write lock
32
from bzrlib.transport import get_transport
1185.65.23 by Robert Collins
update tests somewhat
33
1553.5.42 by Martin Pool
Start to parameterize LockableFiles test cases.
34
35
# these tests are applied in each parameterized suite for LockableFiles
36
class _TestLockableFiles_mixin(object):
1185.67.4 by Aaron Bentley
Throw if we try to write to a LockableFiles with no write lock
37
1185.67.6 by Aaron Bentley
Added tests and fixes for LockableFiles.put_utf8(); imported IterableFile
38
    def test_read_write(self):
1185.65.29 by Robert Collins
Implement final review suggestions.
39
        self.assertRaises(NoSuchFile, self.lockable.get, 'foo')
40
        self.assertRaises(NoSuchFile, self.lockable.get_utf8, 'foo')
1185.67.6 by Aaron Bentley
Added tests and fixes for LockableFiles.put_utf8(); imported IterableFile
41
        self.lockable.lock_write()
42
        try:
43
            unicode_string = u'bar\u1234'
44
            self.assertEqual(4, len(unicode_string))
45
            byte_string = unicode_string.encode('utf-8')
46
            self.assertEqual(6, len(byte_string))
2018.5.133 by Andrew Bennetts
All TestLockableFiles_RemoteLockDir tests passing.
47
            self.assertRaises(UnicodeEncodeError, self.lockable.put, 'foo',
1185.67.6 by Aaron Bentley
Added tests and fixes for LockableFiles.put_utf8(); imported IterableFile
48
                              StringIO(unicode_string))
49
            self.lockable.put('foo', StringIO(byte_string))
50
            self.assertEqual(byte_string,
1185.65.29 by Robert Collins
Implement final review suggestions.
51
                             self.lockable.get('foo').read())
1185.67.6 by Aaron Bentley
Added tests and fixes for LockableFiles.put_utf8(); imported IterableFile
52
            self.assertEqual(unicode_string,
1185.65.29 by Robert Collins
Implement final review suggestions.
53
                             self.lockable.get_utf8('foo').read())
54
            self.assertRaises(BzrBadParameterNotString,
55
                              self.lockable.put_utf8,
56
                              'bar',
57
                              StringIO(unicode_string)
58
                              )
59
            self.lockable.put_utf8('bar', unicode_string)
2249.5.11 by John Arbash Meinel
Audit Branch to ensure utf8 revision ids.
60
            self.assertEqual(unicode_string,
1185.65.29 by Robert Collins
Implement final review suggestions.
61
                             self.lockable.get_utf8('bar').read())
2249.5.11 by John Arbash Meinel
Audit Branch to ensure utf8 revision ids.
62
            self.assertEqual(byte_string,
1185.65.29 by Robert Collins
Implement final review suggestions.
63
                             self.lockable.get('bar').read())
2249.5.11 by John Arbash Meinel
Audit Branch to ensure utf8 revision ids.
64
            self.lockable.put_bytes('raw', 'raw\xffbytes')
65
            self.assertEqual('raw\xffbytes',
66
                             self.lockable.get('raw').read())
1185.67.6 by Aaron Bentley
Added tests and fixes for LockableFiles.put_utf8(); imported IterableFile
67
        finally:
68
            self.lockable.unlock()
69
1185.67.4 by Aaron Bentley
Throw if we try to write to a LockableFiles with no write lock
70
    def test_locks(self):
1185.67.8 by Aaron Bentley
Test and fix read locks
71
        self.lockable.lock_read()
1185.65.27 by Robert Collins
Tweak storage towards mergability.
72
        try:
73
            self.assertRaises(ReadOnlyError, self.lockable.put, 'foo', 
74
                              StringIO('bar\u1234'))
75
        finally:
76
            self.lockable.unlock()
1185.68.1 by Aaron Bentley
test transactions
77
78
    def test_transactions(self):
79
        self.assertIs(self.lockable.get_transaction().__class__,
80
                      PassThroughTransaction)
81
        self.lockable.lock_read()
82
        try:
83
            self.assertIs(self.lockable.get_transaction().__class__,
84
                          ReadOnlyTransaction)
85
        finally:
86
            self.lockable.unlock()
87
        self.assertIs(self.lockable.get_transaction().__class__,
88
                      PassThroughTransaction)
89
        self.lockable.lock_write()
90
        self.assertIs(self.lockable.get_transaction().__class__,
1563.2.34 by Robert Collins
Remove the commit and rollback transaction methods as misleading, and implement a WriteTransaction
91
                      WriteTransaction)
1594.2.22 by Robert Collins
Ensure that lockable files calls finish() on transactions.:
92
        # check that finish is called:
93
        vf = DummyWeave('a')
94
        self.lockable.get_transaction().register_dirty(vf)
1185.68.1 by Aaron Bentley
test transactions
95
        self.lockable.unlock()
1594.2.22 by Robert Collins
Ensure that lockable files calls finish() on transactions.:
96
        self.assertTrue(vf.finished)
1185.65.23 by Robert Collins
update tests somewhat
97
98
    def test__escape(self):
99
        self.assertEqual('%25', self.lockable._escape('%'))
100
        
101
    def test__escape_empty(self):
102
        self.assertEqual('', self.lockable._escape(''))
103
1687.1.6 by Robert Collins
Extend LockableFiles to support break_lock() calls.
104
    def test_break_lock(self):
105
        # some locks are not breakable
106
        self.lockable.lock_write()
107
        try:
108
            self.assertRaises(AssertionError, self.lockable.break_lock)
109
        except NotImplementedError:
110
            # this lock cannot be broken
111
            self.lockable.unlock()
112
            return
113
        l2 = self.get_lockable()
114
        orig_factory = bzrlib.ui.ui_factory
115
        # silent ui - no need for stdout
116
        bzrlib.ui.ui_factory = bzrlib.ui.SilentUIFactory()
117
        bzrlib.ui.ui_factory.stdin = StringIO("y\n")
118
        try:
119
            l2.break_lock()
120
        finally:
121
            bzrlib.ui.ui_factory = orig_factory
122
        try:
123
            l2.lock_write()
124
            l2.unlock()
125
        finally:
126
            self.assertRaises(errors.LockBroken, self.lockable.unlock)
127
            self.assertFalse(self.lockable.is_locked())
128
2279.7.1 by Andrew Bennetts
``LockableFiles.lock_write()`` now accepts a ``token`` keyword argument, so that
129
    def test_lock_write_returns_None_refuses_token(self):
130
        token = self.lockable.lock_write()
131
        try:
132
            if token is not None:
133
                # This test does not apply, because this lockable supports
134
                # tokens.
135
                return
136
            self.assertRaises(errors.TokenLockingNotSupported,
137
                              self.lockable.lock_write, token='token')
138
        finally:
139
            self.lockable.unlock()
140
2018.5.78 by Andrew Bennetts
Implement RemoteRepository.lock_write/unlock to expect and send tokens over the
141
    def test_lock_write_returns_token_when_given_token(self):
142
        token = self.lockable.lock_write()
143
        try:
144
            if token is None:
145
                # This test does not apply, because this lockable refuses
146
                # tokens.
147
                return
148
            new_lockable = self.get_lockable()
149
            token_from_new_lockable = new_lockable.lock_write(token=token)
150
            try:
151
                self.assertEqual(token, token_from_new_lockable)
152
            finally:
153
                new_lockable.unlock()
154
        finally:
155
            self.lockable.unlock()
156
2279.7.1 by Andrew Bennetts
``LockableFiles.lock_write()`` now accepts a ``token`` keyword argument, so that
157
    def test_lock_write_raises_on_token_mismatch(self):
158
        token = self.lockable.lock_write()
159
        try:
160
            if token is None:
161
                # This test does not apply, because this lockable refuses
162
                # tokens.
163
                return
164
            different_token = token + 'xxx'
165
            # Re-using the same lockable instance with a different token will
166
            # raise TokenMismatch.
167
            self.assertRaises(errors.TokenMismatch,
168
                              self.lockable.lock_write, token=different_token)
169
            # A seperate instance for the same lockable will also raise
170
            # TokenMismatch.
171
            # This detects the case where a caller claims to have a lock (via
172
            # the token) for an external resource, but doesn't (the token is
173
            # different).  Clients need a seperate lock object to make sure the
174
            # external resource is probed, whereas the existing lock object
175
            # might cache.
176
            new_lockable = self.get_lockable()
177
            self.assertRaises(errors.TokenMismatch,
178
                              new_lockable.lock_write, token=different_token)
179
        finally:
180
            self.lockable.unlock()
181
182
    def test_lock_write_with_matching_token(self):
183
        # If the token matches, so no exception is raised by lock_write.
184
        token = self.lockable.lock_write()
185
        try:
186
            if token is None:
187
                # This test does not apply, because this lockable refuses
188
                # tokens.
189
                return
190
            # The same instance will accept a second lock_write if the specified
191
            # token matches.
192
            self.lockable.lock_write(token=token)
193
            self.lockable.unlock()
194
            # Calling lock_write on a new instance for the same lockable will
195
            # also succeed.
196
            new_lockable = self.get_lockable()
197
            new_lockable.lock_write(token=token)
198
            new_lockable.unlock()
199
        finally:
200
            self.lockable.unlock()
201
202
    def test_unlock_after_lock_write_with_token(self):
203
        # If lock_write did not physically acquire the lock (because it was
204
        # passed a token), then unlock should not physically release it.
205
        token = self.lockable.lock_write()
206
        try:
207
            if token is None:
208
                # This test does not apply, because this lockable refuses
209
                # tokens.
210
                return
211
            new_lockable = self.get_lockable()
212
            new_lockable.lock_write(token=token)
213
            new_lockable.unlock()
214
            self.assertTrue(self.lockable.get_physical_lock_status())
215
        finally:
216
            self.lockable.unlock()
217
218
    def test_lock_write_with_token_fails_when_unlocked(self):
219
        # Lock and unlock to get a superficially valid token.  This mimics a
220
        # likely programming error, where a caller accidentally tries to lock
221
        # with a token that is no longer valid (because the original lock was
222
        # released).
223
        token = self.lockable.lock_write()
224
        self.lockable.unlock()
225
        if token is None:
226
            # This test does not apply, because this lockable refuses
227
            # tokens.
228
            return
229
230
        self.assertRaises(errors.TokenMismatch,
231
                          self.lockable.lock_write, token=token)
232
233
    def test_lock_write_reenter_with_token(self):
234
        token = self.lockable.lock_write()
235
        try:
236
            if token is None:
237
                # This test does not apply, because this lockable refuses
238
                # tokens.
239
                return
240
            # Relock with a token.
2018.5.79 by Andrew Bennetts
Implement RemoteBranch.lock_write/unlock as smart operations.
241
            token_from_reentry = self.lockable.lock_write(token=token)
242
            try:
243
                self.assertEqual(token, token_from_reentry)
244
            finally:
245
                self.lockable.unlock()
2279.7.1 by Andrew Bennetts
``LockableFiles.lock_write()`` now accepts a ``token`` keyword argument, so that
246
        finally:
247
            self.lockable.unlock()
248
        # The lock should be unlocked on disk.  Verify that with a new lock
249
        # instance.
250
        new_lockable = self.get_lockable()
251
        # Calling lock_write now should work, rather than raise LockContention.
252
        new_lockable.lock_write()
253
        new_lockable.unlock()
254
2279.7.11 by Andrew Bennetts
Remove some XXXs.
255
    def test_second_lock_write_returns_same_token(self):
256
        first_token = self.lockable.lock_write()
257
        try:
258
            if first_token is None:
259
                # This test does not apply, because this lockable refuses
260
                # tokens.
261
                return
262
            # Relock the already locked lockable.  It should return the same
263
            # token.
264
            second_token = self.lockable.lock_write()
265
            try:
266
                self.assertEqual(first_token, second_token)
267
            finally:
268
                self.lockable.unlock()
269
        finally:
270
            self.lockable.unlock()
271
2018.5.75 by Andrew Bennetts
Add Repository.{dont_,}leave_lock_in_place.
272
    def test_leave_in_place(self):
273
        token = self.lockable.lock_write()
274
        try:
275
            if token is None:
276
                # This test does not apply, because this lockable refuses
277
                # tokens.
278
                return
279
            self.lockable.leave_in_place()
280
        finally:
281
            self.lockable.unlock()
282
        # At this point, the lock is still in place on disk
283
        self.assertRaises(errors.LockContention, self.lockable.lock_write)
284
        # But should be relockable with a token.
285
        self.lockable.lock_write(token=token)
286
        self.lockable.unlock()
287
288
    def test_dont_leave_in_place(self):
289
        token = self.lockable.lock_write()
290
        try:
291
            if token is None:
292
                # This test does not apply, because this lockable refuses
293
                # tokens.
294
                return
295
            self.lockable.leave_in_place()
296
        finally:
297
            self.lockable.unlock()
298
        # At this point, the lock is still in place on disk.
299
        # Acquire the existing lock with the token, and ask that it is removed
300
        # when this object unlocks, and unlock to trigger that removal.
301
        new_lockable = self.get_lockable()
302
        new_lockable.lock_write(token=token)
303
        new_lockable.dont_leave_in_place()
304
        new_lockable.unlock()
305
        # At this point, the lock is no longer on disk, so we can lock it.
306
        third_lockable = self.get_lockable()
307
        third_lockable.lock_write()
308
        third_lockable.unlock()
2279.7.7 by Andrew Bennetts
LockDir, Repository and Branch lock token changes from the hpss branch.
309
310
1553.5.42 by Martin Pool
Start to parameterize LockableFiles test cases.
311
# This method of adapting tests to parameters is different to 
312
# the TestProviderAdapters used elsewhere, but seems simpler for this 
313
# case.  
1553.5.45 by Martin Pool
Clean up Transport-based locks for old branches
314
class TestLockableFiles_TransportLock(TestCaseInTempDir,
315
                                      _TestLockableFiles_mixin):
1553.5.42 by Martin Pool
Start to parameterize LockableFiles test cases.
316
317
    def setUp(self):
2279.7.1 by Andrew Bennetts
``LockableFiles.lock_write()`` now accepts a ``token`` keyword argument, so that
318
        TestCaseInTempDir.setUp(self)
1553.5.42 by Martin Pool
Start to parameterize LockableFiles test cases.
319
        transport = get_transport('.')
320
        transport.mkdir('.bzr')
1687.1.6 by Robert Collins
Extend LockableFiles to support break_lock() calls.
321
        self.sub_transport = transport.clone('.bzr')
322
        self.lockable = self.get_lockable()
1553.5.61 by Martin Pool
Locks protecting LockableFiles must now be explicitly created before use.
323
        self.lockable.create_lock()
1687.1.6 by Robert Collins
Extend LockableFiles to support break_lock() calls.
324
325
    def tearDown(self):
326
        super(TestLockableFiles_TransportLock, self).tearDown()
1687.1.15 by Robert Collins
Review comments.
327
        # free the subtransport so that we do not get a 5 second
328
        # timeout due to the SFTP connection cache.
1687.1.6 by Robert Collins
Extend LockableFiles to support break_lock() calls.
329
        del self.sub_transport
330
331
    def get_lockable(self):
332
        return LockableFiles(self.sub_transport, 'my-lock', TransportLock)
1553.5.43 by Martin Pool
Get LockableFiles tests running against LockDir
333
        
334
335
class TestLockableFiles_LockDir(TestCaseInTempDir,
336
                              _TestLockableFiles_mixin):
337
    """LockableFile tests run with LockDir underneath"""
338
339
    def setUp(self):
2279.7.1 by Andrew Bennetts
``LockableFiles.lock_write()`` now accepts a ``token`` keyword argument, so that
340
        TestCaseInTempDir.setUp(self)
1553.5.61 by Martin Pool
Locks protecting LockableFiles must now be explicitly created before use.
341
        self.transport = get_transport('.')
1687.1.6 by Robert Collins
Extend LockableFiles to support break_lock() calls.
342
        self.lockable = self.get_lockable()
1666.1.4 by Robert Collins
* 'Metadir' is now the default disk format. This improves behaviour in
343
        # the lock creation here sets mode - test_permissions on branch 
344
        # tests that implicitly, but it might be a good idea to factor 
345
        # out the mode checking logic and have it applied to loackable files
346
        # directly. RBC 20060418
1553.5.61 by Martin Pool
Locks protecting LockableFiles must now be explicitly created before use.
347
        self.lockable.create_lock()
1553.5.43 by Martin Pool
Get LockableFiles tests running against LockDir
348
1687.1.6 by Robert Collins
Extend LockableFiles to support break_lock() calls.
349
    def get_lockable(self):
350
        return LockableFiles(self.transport, 'my-lock', LockDir)
1553.5.60 by Martin Pool
New LockableFiles.create_lock() method
351
352
    def test_lock_created(self):
1553.5.61 by Martin Pool
Locks protecting LockableFiles must now be explicitly created before use.
353
        self.assertTrue(self.transport.has('my-lock'))
354
        self.lockable.lock_write()
355
        self.assertTrue(self.transport.has('my-lock/held/info'))
356
        self.lockable.unlock()
357
        self.assertFalse(self.transport.has('my-lock/held/info'))
358
        self.assertTrue(self.transport.has('my-lock'))
359
360
361
    # TODO: Test the lockdir inherits the right file and directory permissions
362
    # from the LockableFiles.
2018.5.59 by Robert Collins
Get BranchConfig working somewhat on RemoteBranches (Robert Collins, Vincent Ladeuil).
363
        
364
365
class TestLockableFiles_RemoteLockDir(TestCaseWithSmartMedium,
366
                              _TestLockableFiles_mixin):
367
    """LockableFile tests run with RemoteLockDir on a branch."""
368
369
    def setUp(self):
2018.5.75 by Andrew Bennetts
Add Repository.{dont_,}leave_lock_in_place.
370
        TestCaseWithSmartMedium.setUp(self)
2018.5.59 by Robert Collins
Get BranchConfig working somewhat on RemoteBranches (Robert Collins, Vincent Ladeuil).
371
        # can only get a RemoteLockDir with some RemoteObject...
372
        # use a branch as thats what we want. These mixin tests test the end
373
        # to end behaviour, so stubbing out the backend and simulating would
374
        # defeat the purpose. We test the protocol implementation separately
375
        # in test_remote and test_smart as usual.
376
        self.make_branch('foo')
377
        self.transport = get_transport('.')
378
        self.lockable = self.get_lockable()
379
380
    def get_lockable(self):
381
        # getting a new lockable involves opening a new instance of the branch
382
        branch = bzrlib.branch.Branch.open(self.get_url('foo'))
383
        return branch.control_files