t0060-daemon.sh 4.84 KB
Newer Older
Łukasz Magiera's avatar
Łukasz Magiera committed
1
#!/usr/bin/env bash
2 3 4 5 6 7 8 9 10
#
# Copyright (c) 2014 Juan Batiz-Benet
# MIT Licensed; see the LICENSE file in this repository.
#

test_description="Test daemon command"

. lib/test-lib.sh

11

Jeromy's avatar
Jeromy committed
12
test_init_ipfs
Stephen Whitmore's avatar
Stephen Whitmore committed
13
test_launch_ipfs_daemon
14

Stephen Whitmore's avatar
Stephen Whitmore committed
15
# this errors if we didn't --init $IPFS_PATH correctly
16
test_expect_success "'ipfs config Identity.PeerID' works" '
Łukasz Magiera's avatar
Łukasz Magiera committed
17
  PEERID=$(ipfs config Identity.PeerID)
18 19
'

20
test_expect_success "'ipfs swarm addrs local' works" '
Łukasz Magiera's avatar
Łukasz Magiera committed
21
  ipfs swarm addrs local >local_addrs
22 23
'

24
test_expect_success "ipfs swarm addrs listen; works" '
Łukasz Magiera's avatar
Łukasz Magiera committed
25
  ipfs swarm addrs listen >listen_addrs
26 27
'

28
test_expect_success "ipfs peer id looks good" '
Łukasz Magiera's avatar
Łukasz Magiera committed
29
  test_check_peerid "$PEERID"
30 31
'

rht's avatar
rht committed
32 33 34
# this is for checking SetAllowedOrigins race condition for the api and gateway
# See https://github.com/ipfs/go-ipfs/pull/1966
test_expect_success "ipfs API works with the correct allowed origin port" '
Łukasz Magiera's avatar
Łukasz Magiera committed
35
  curl -s -X GET -H "Origin:http://localhost:$API_PORT" -I "http://$API_ADDR/api/v0/version"
rht's avatar
rht committed
36 37 38
'

test_expect_success "ipfs gateway works with the correct allowed origin port" '
Łukasz Magiera's avatar
Łukasz Magiera committed
39
  curl -s -X GET -H "Origin:http://localhost:$GWAY_PORT" -I "http://$GWAY_ADDR/api/v0/version"
rht's avatar
rht committed
40 41
'

42
test_expect_success "ipfs daemon output looks good" '
Łukasz Magiera's avatar
Łukasz Magiera committed
43 44
  STARTFILE="ipfs cat /ipfs/$HASH_WELCOME_DOCS/readme" &&
  echo "Initializing daemon..." >expected_daemon &&
Overbool's avatar
Overbool committed
45
  ipfs version --all >> expected_daemon &&
Łukasz Magiera's avatar
Łukasz Magiera committed
46 47 48
  sed "s/^/Swarm listening on /" listen_addrs >>expected_daemon &&
  sed "s/^/Swarm announcing /" local_addrs >>expected_daemon &&
  echo "API server listening on '$API_MADDR'" >>expected_daemon &&
49
  echo "WebUI: http://'$API_ADDR'/webui" >>expected_daemon &&
Łukasz Magiera's avatar
Łukasz Magiera committed
50 51 52
  echo "Gateway (readonly) server listening on '$GWAY_MADDR'" >>expected_daemon &&
  echo "Daemon is ready" >>expected_daemon &&
  test_cmp expected_daemon actual_daemon
53 54
'

55
test_expect_success ".ipfs/ has been created" '
Łukasz Magiera's avatar
Łukasz Magiera committed
56 57 58 59 60
  test -d ".ipfs" &&
  test -f ".ipfs/config" &&
  test -d ".ipfs/datastore" &&
  test -d ".ipfs/blocks" ||
  test_fsh ls -al .ipfs
61 62
'

63 64 65
# begin same as in t0010

test_expect_success "ipfs version succeeds" '
Łukasz Magiera's avatar
Łukasz Magiera committed
66
  ipfs version >version.txt
67 68 69
'

test_expect_success "ipfs version output looks good" '
Łukasz Magiera's avatar
Łukasz Magiera committed
70 71
  egrep "^ipfs version [0-9]+\.[0-9]+\.[0-9]" version.txt >/dev/null ||
  test_fsh cat version.txt
72 73
'

74 75 76 77 78 79 80 81 82 83
test_expect_success "ipfs version deps succeeds" '
  ipfs version deps >deps.txt
'

test_expect_success "ipfs version deps output looks good" '
  head -1 deps.txt | grep "go-ipfs@(devel)" &&
  [[ $(tail -n +2 deps.txt | egrep -v -c "^[^ @]+@v[^ @]+( => [^ @]+@v[^ @]+)?$") -eq 0 ]] ||
  test_fsh cat deps.txt
'

84
test_expect_success "ipfs help succeeds" '
Łukasz Magiera's avatar
Łukasz Magiera committed
85
  ipfs help >help.txt
86 87 88
'

test_expect_success "ipfs help output looks good" '
Łukasz Magiera's avatar
Łukasz Magiera committed
89 90 91
  egrep -i "^Usage" help.txt >/dev/null &&
  egrep "ipfs .* <command>" help.txt >/dev/null ||
  test_fsh cat help.txt
92 93
'

Christian Couder's avatar
Christian Couder committed
94
# netcat (nc) is needed for the following test
Jakub Sztandera's avatar
Jakub Sztandera committed
95 96
test_expect_success "socat is available" '
  type socat >/dev/null
Christian Couder's avatar
Christian Couder committed
97
'
98

Christian Couder's avatar
Christian Couder committed
99
# check transport is encrypted
rht's avatar
rht committed
100
test_expect_success "transport should be encrypted" '
Jakub Sztandera's avatar
Jakub Sztandera committed
101
  socat - tcp:localhost:$SWARM_PORT,connect-timeout=1 > swarmnc < ../t0060-data/mss-ls &&
Łukasz Magiera's avatar
Łukasz Magiera committed
102 103 104
  grep -q "/secio" swarmnc &&
  test_must_fail grep -q "/plaintext/1.0.0" swarmnc ||
  test_fsh cat swarmnc
105 106
'

107
test_expect_success "output from streaming commands works" '
Łukasz Magiera's avatar
Łukasz Magiera committed
108
  test_expect_code 28 curl -m 5 http://localhost:$API_PORT/api/v0/stats/bw\?poll=true > statsout
109 110 111
'

test_expect_success "output looks good" '
Łukasz Magiera's avatar
Łukasz Magiera committed
112 113 114 115
  grep TotalIn statsout > /dev/null &&
  grep TotalOut statsout > /dev/null &&
  grep RateIn statsout > /dev/null &&
  grep RateOut statsout >/dev/null
116 117
'

118 119
# end same as in t0010

120
test_expect_success "daemon is still running" '
Łukasz Magiera's avatar
Łukasz Magiera committed
121
  kill -0 $IPFS_PID
122 123 124
'

test_expect_success "'ipfs daemon' can be killed" '
Łukasz Magiera's avatar
Łukasz Magiera committed
125
  test_kill_repeat_10_sec $IPFS_PID
126 127
'

128
test_expect_success "'ipfs daemon' should be able to run with a pipe attached to stdin (issue #861)" '
Łukasz Magiera's avatar
Łukasz Magiera committed
129 130 131 132
  yes | ipfs daemon >stdin_daemon_out 2>stdin_daemon_err &
  DAEMON_PID=$!
  test_wait_for_file 20 100ms "$IPFS_PATH/api" &&
  test_set_address_vars stdin_daemon_out
Jeromy's avatar
Jeromy committed
133 134 135
'

test_expect_success "daemon with pipe eventually becomes live" '
Łukasz Magiera's avatar
Łukasz Magiera committed
136 137 138
  pollEndpoint -host='$API_MADDR' -ep=/version -v -tout=1s -tries=10 >stdin_poll_apiout 2>stdin_poll_apierr &&
  test_kill_repeat_10_sec $DAEMON_PID ||
  test_fsh cat stdin_daemon_out || test_fsh cat stdin_daemon_err || test_fsh cat stdin_poll_apiout || test_fsh cat stdin_poll_apierr
139 140
'

141 142 143 144 145
test_expect_success "'ipfs daemon' cleans up when it fails to start" '
  test_must_fail ipfs daemon --routing=foobar &&
  test ! -e "$IPFS_PATH/repo.lock"
'

146
ulimit -S -n 512
Jeromy's avatar
Jeromy committed
147 148 149 150
TEST_ULIMIT_PRESET=1
test_launch_ipfs_daemon

test_expect_success "daemon raised its fd limit" '
151
  grep -v "setting file descriptor limit" actual_daemon > /dev/null
Jeromy's avatar
Jeromy committed
152 153
'

154
test_expect_success "daemon actually can handle 2048 file descriptors" '
Łukasz Magiera's avatar
Łukasz Magiera committed
155
  hang-fds -hold=2s 2000 '$API_MADDR' > /dev/null
156 157 158
'

test_expect_success "daemon didnt throw any errors" '
Łukasz Magiera's avatar
Łukasz Magiera committed
159
  test_expect_code 1 grep "too many open files" daemon_err
160
'
161

Jeromy's avatar
Jeromy committed
162 163
test_kill_ipfs_daemon

164
test_done