79a17dedd0
* Rename RegistryInfo -> RegistryInfoDeprecated * Add BlockId parameter to Registrar::get_address and RegistrarClient::call_contract * Remove RegistrarClient::Call (use async for now); add RegistrarClient::get_address * Remove Registrar type in favour of naked trait * Use CallContract trait bound instead of separate call_contract method * Make RegistrarClient::get_address and URLHint::resolve synchronous * RegistrarClient::get_address: return check if address is zero * Modify RegistryInfo::registry_address to take &str * return Result from RegistryInfo::registry_address * Replace RegistryInfo with RegistrarClient - Modifed RegistrarClient::registrar_address to return Option - Removed BlockChainClient::registrar_address * Fix other build configs * Fix unit test builds * Remove local RegistrarClient type from run::execute_impl * Remove registrar.json from ethcore * Formatting/line breaks * Update RegistrarClient docs, remove explicit lifetime * Weak ref to ethcore client from hash fetch client * Fix unit tests
1280 lines
42 KiB
Rust
1280 lines
42 KiB
Rust
// Copyright 2015-2019 Parity Technologies (UK) Ltd.
|
|
// This file is part of Parity Ethereum.
|
|
|
|
// Parity Ethereum is free software: you can redistribute it and/or modify
|
|
// it under the terms of the GNU General Public License as published by
|
|
// the Free Software Foundation, either version 3 of the License, or
|
|
// (at your option) any later version.
|
|
|
|
// Parity Ethereum is distributed in the hope that it will be useful,
|
|
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
// GNU General Public License for more details.
|
|
|
|
// You should have received a copy of the GNU General Public License
|
|
// along with Parity Ethereum. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
use std::cmp;
|
|
use std::fs;
|
|
use std::io::Write;
|
|
use std::path::{Path, PathBuf};
|
|
use std::sync::{Arc, Weak};
|
|
use std::time::{Duration, Instant};
|
|
|
|
use parking_lot::{Mutex, MutexGuard};
|
|
use rand::{self, Rng};
|
|
use target_info::Target;
|
|
|
|
use common_types::{
|
|
BlockNumber,
|
|
ids::BlockId,
|
|
filter::Filter,
|
|
chain_notify::NewBlocks,
|
|
};
|
|
use client_traits::{BlockChainClient, ChainNotify};
|
|
use ethereum_types::{H256, H160};
|
|
use hash_fetch::{self as fetch, HashFetch};
|
|
use parity_path::restrict_permissions_owner;
|
|
use service::Service;
|
|
use sync::{SyncProvider};
|
|
use types::{ReleaseInfo, OperationsInfo, CapState, VersionInfo, ReleaseTrack};
|
|
use version;
|
|
use semver::Version;
|
|
use ethabi::FunctionOutputDecoder;
|
|
|
|
use_contract!(operations, "res/operations.json");
|
|
|
|
/// Filter for releases.
|
|
#[derive(Debug, Eq, PartialEq, Clone)]
|
|
pub enum UpdateFilter {
|
|
/// All releases following the same track.
|
|
All,
|
|
/// As with `All`, but only those which are known to be critical.
|
|
Critical,
|
|
/// None.
|
|
None,
|
|
}
|
|
|
|
/// The policy for auto-updating.
|
|
#[derive(Debug, Eq, PartialEq, Clone)]
|
|
pub struct UpdatePolicy {
|
|
/// Download potential updates.
|
|
pub enable_downloading: bool,
|
|
/// Disable client if we know we're incapable of syncing.
|
|
pub require_consensus: bool,
|
|
/// Which of those downloaded should be automatically installed.
|
|
pub filter: UpdateFilter,
|
|
/// Which track we should be following.
|
|
pub track: ReleaseTrack,
|
|
/// Path for the updates to go.
|
|
pub path: PathBuf,
|
|
/// Maximum download size.
|
|
pub max_size: usize,
|
|
/// Random update delay range in blocks.
|
|
pub max_delay: u64,
|
|
/// Number of blocks between each check for updates.
|
|
pub frequency: u64,
|
|
}
|
|
|
|
impl Default for UpdatePolicy {
|
|
fn default() -> Self {
|
|
UpdatePolicy {
|
|
enable_downloading: false,
|
|
require_consensus: true,
|
|
filter: UpdateFilter::None,
|
|
track: ReleaseTrack::Unknown,
|
|
path: Default::default(),
|
|
max_size: 128 * 1024 * 1024,
|
|
max_delay: 100,
|
|
frequency: 20,
|
|
}
|
|
}
|
|
}
|
|
|
|
/// The current updater status
|
|
#[derive(Clone, Debug, PartialEq)]
|
|
enum UpdaterStatus {
|
|
/// Updater is currently disabled.
|
|
Disabled,
|
|
/// Updater is currently idle.
|
|
Idle,
|
|
/// Updater is waiting for block number to fetch a new release.
|
|
Waiting {
|
|
release: ReleaseInfo,
|
|
binary: H256,
|
|
block_number: BlockNumber,
|
|
},
|
|
/// Updater is fetching a new release.
|
|
Fetching {
|
|
release: ReleaseInfo,
|
|
binary: H256,
|
|
retries: u32,
|
|
},
|
|
/// Updater failed fetching a new release and it is now backing off until the next retry.
|
|
FetchBackoff {
|
|
release: ReleaseInfo,
|
|
binary: H256,
|
|
backoff: (u32, Instant),
|
|
},
|
|
/// Updater is ready to update to a new release.
|
|
Ready {
|
|
release: ReleaseInfo,
|
|
},
|
|
/// Updater has installed a new release and can be manually restarted.
|
|
Installed {
|
|
release: ReleaseInfo,
|
|
},
|
|
}
|
|
|
|
impl Default for UpdaterStatus {
|
|
fn default() -> Self {
|
|
UpdaterStatus::Idle
|
|
}
|
|
}
|
|
|
|
#[derive(Debug, Default)]
|
|
struct UpdaterState {
|
|
latest: Option<OperationsInfo>,
|
|
capability: CapState,
|
|
status: UpdaterStatus,
|
|
}
|
|
|
|
/// Service for checking for updates and determining whether we can achieve consensus.
|
|
pub struct Updater<O = OperationsContractClient, F = fetch::Client, T = StdTimeProvider, R = ThreadRngGenRange> {
|
|
// Useful environmental stuff.
|
|
update_policy: UpdatePolicy,
|
|
weak_self: Mutex<Weak<Updater<O, F, T, R>>>,
|
|
client: Weak<dyn BlockChainClient>,
|
|
sync: Option<Weak<dyn SyncProvider>>,
|
|
fetcher: F,
|
|
operations_client: O,
|
|
exit_handler: Mutex<Option<Box<dyn Fn() + 'static + Send>>>,
|
|
|
|
time_provider: T,
|
|
rng: R,
|
|
|
|
// Our version info (static)
|
|
this: VersionInfo,
|
|
|
|
// All the other info - this changes so leave it behind a Mutex.
|
|
state: Mutex<UpdaterState>,
|
|
}
|
|
|
|
const CLIENT_ID: &str = "parity";
|
|
|
|
lazy_static! {
|
|
static ref CLIENT_ID_HASH: H256 = h256_from_str_resizing(CLIENT_ID);
|
|
}
|
|
|
|
lazy_static! {
|
|
static ref PLATFORM: String = {
|
|
if cfg!(target_os = "macos") {
|
|
"x86_64-apple-darwin".into()
|
|
} else if cfg!(windows) {
|
|
"x86_64-pc-windows-msvc".into()
|
|
} else if cfg!(target_os = "linux") {
|
|
format!("{}-unknown-linux-gnu", Target::arch())
|
|
} else {
|
|
version::platform()
|
|
}
|
|
};
|
|
}
|
|
|
|
lazy_static! {
|
|
static ref PLATFORM_ID_HASH: H256 = h256_from_str_resizing(&PLATFORM);
|
|
}
|
|
|
|
|
|
// Pads the bytes with zeros or truncates the last bytes to H256::len_bytes()
|
|
// before the conversion to match the previous behavior.
|
|
fn h256_from_str_resizing(s: &str) -> H256 {
|
|
let mut bytes = s.as_bytes().to_vec();
|
|
bytes.resize(H256::len_bytes(), 0);
|
|
H256::from_slice(&bytes)
|
|
}
|
|
|
|
/// Client trait for getting latest release information from operations contract.
|
|
/// Useful for mocking in tests.
|
|
pub trait OperationsClient: Send + Sync + 'static {
|
|
/// Get the latest release operations info for the given track.
|
|
fn latest(&self, this: &VersionInfo, track: ReleaseTrack) -> Result<OperationsInfo, String>;
|
|
|
|
/// Fetches the block number when the given release was added, checking the interval [from; latest_block].
|
|
fn release_block_number(&self, from: BlockNumber, release: &ReleaseInfo) -> Option<BlockNumber>;
|
|
}
|
|
|
|
/// `OperationsClient` that delegates calls to the operations contract.
|
|
pub struct OperationsContractClient {
|
|
client: Weak<dyn BlockChainClient>,
|
|
}
|
|
|
|
impl OperationsContractClient {
|
|
fn new(client: Weak<dyn BlockChainClient>) -> Self {
|
|
OperationsContractClient {
|
|
client
|
|
}
|
|
}
|
|
|
|
/// Get the hash of the latest release for the given track
|
|
fn latest_hash<F>(&self, track: ReleaseTrack, do_call: &F) -> Result<H256, String>
|
|
where F: Fn(Vec<u8>) -> Result<Vec<u8>, String> {
|
|
let (data, decoder) = operations::functions::latest_in_track::call(*CLIENT_ID_HASH, u8::from(track));
|
|
let value = do_call(data)?;
|
|
decoder.decode(&value).map_err(|e| e.to_string())
|
|
}
|
|
|
|
/// Get release info for the given release
|
|
fn release_info<F>(&self, release_id: H256, do_call: &F) -> Result<ReleaseInfo, String>
|
|
where F: Fn(Vec<u8>) -> Result<Vec<u8>, String> {
|
|
let (data, decoder) = operations::functions::release::call(*CLIENT_ID_HASH, release_id);
|
|
|
|
let (fork, track, semver, is_critical) = decoder.decode(&do_call(data)?).map_err(|e| e.to_string())?;
|
|
|
|
let (fork, track, semver) = (fork.low_u64(), track.low_u32(), semver.low_u32());
|
|
|
|
let (data, decoder) = operations::functions::checksum::call(*CLIENT_ID_HASH, release_id, *PLATFORM_ID_HASH);
|
|
let latest_binary = decoder.decode(&do_call(data)?).map_err(|e| e.to_string())?;
|
|
|
|
Ok(ReleaseInfo {
|
|
version: VersionInfo::from_raw(semver, track as u8, release_id.into()),
|
|
is_critical,
|
|
fork,
|
|
binary: if latest_binary.is_zero() { None } else { Some(latest_binary) },
|
|
})
|
|
}
|
|
}
|
|
|
|
impl OperationsClient for OperationsContractClient {
|
|
fn latest(&self, this: &VersionInfo, track: ReleaseTrack) -> Result<OperationsInfo, String> {
|
|
if track == ReleaseTrack::Unknown {
|
|
return Err(format!("Current executable ({}) is unreleased.", this.hash));
|
|
}
|
|
|
|
let client = self.client.upgrade().ok_or_else(|| "Cannot obtain client")?;
|
|
let address = client.get_address("operations", BlockId::Latest)?
|
|
.ok_or_else(|| "Cannot get operations contract address")?;
|
|
let do_call = |data| {
|
|
client.call_contract(BlockId::Latest, address, data).map_err(|e| format!("{:?}", e))
|
|
};
|
|
|
|
trace!(target: "updater", "Looking up this_fork for our release: {}/{:?}", CLIENT_ID, this.hash);
|
|
|
|
// get the fork number of this release
|
|
let (data, decoder) = operations::functions::release::call(*CLIENT_ID_HASH, this.hash);
|
|
let this_fork = do_call(data)
|
|
.and_then(|value| decoder.decode(&value).map_err(|e| e.to_string()))
|
|
.ok()
|
|
.and_then(|(fork, track, _, _)| {
|
|
let this_track: ReleaseTrack = (track.low_u64() as u8).into();
|
|
match this_track {
|
|
ReleaseTrack::Unknown => None,
|
|
_ => Some(fork.low_u64()),
|
|
}
|
|
});
|
|
|
|
// get the hash of the latest release in our track
|
|
let latest_in_track = self.latest_hash(track, &do_call)?;
|
|
|
|
// get the release info for the latest version in track
|
|
let in_track = self.release_info(latest_in_track, &do_call)?;
|
|
let mut in_minor = Some(in_track.clone());
|
|
const PROOF: &str = "in_minor initialized and assigned with Some; loop breaks if None assigned; qed";
|
|
|
|
// if the minor version has changed, let's check the minor version on a different track
|
|
while in_minor.as_ref().expect(PROOF).version.version.minor != this.version.minor {
|
|
let track = match in_minor.as_ref().expect(PROOF).version.track {
|
|
ReleaseTrack::Beta => ReleaseTrack::Stable,
|
|
ReleaseTrack::Nightly => ReleaseTrack::Beta,
|
|
_ => { in_minor = None; break; }
|
|
};
|
|
|
|
let latest_in_track = self.latest_hash(track, &do_call)?;
|
|
in_minor = Some(self.release_info(latest_in_track, &do_call)?);
|
|
}
|
|
|
|
let (data, decoder) = operations::functions::latest_fork::call();
|
|
let fork = do_call(data)
|
|
.and_then(|value| decoder.decode(&value).map_err(|e| e.to_string()))?
|
|
.low_u64();
|
|
|
|
Ok(OperationsInfo {
|
|
fork,
|
|
this_fork,
|
|
track: in_track,
|
|
minor: in_minor,
|
|
})
|
|
}
|
|
|
|
fn release_block_number(&self, from: BlockNumber, release: &ReleaseInfo) -> Option<BlockNumber> {
|
|
let client = self.client.upgrade()?;
|
|
let address = client.get_address("operations", BlockId::Latest).unwrap_or(None)?;
|
|
|
|
let topics = operations::events::release_added::filter(Some(*CLIENT_ID_HASH), Some(release.fork.into()), Some(release.is_critical));
|
|
let topics = vec![topics.topic0, topics.topic1, topics.topic2, topics.topic3];
|
|
let topics = topics.into_iter().map(Into::into).map(Some).collect();
|
|
|
|
let filter = Filter {
|
|
from_block: BlockId::Number(from),
|
|
to_block: BlockId::Latest,
|
|
address: Some(vec![address]),
|
|
topics,
|
|
limit: None,
|
|
};
|
|
|
|
client.logs(filter)
|
|
.unwrap_or_default()
|
|
.iter()
|
|
.filter_map(|log| {
|
|
let event = operations::events::release_added::parse_log((log.topics.clone(), log.data.clone()).into()).ok()?;
|
|
let version_info = VersionInfo::from_raw(event.semver.low_u32(), event.track.low_u32() as u8, event.release.into());
|
|
if version_info == release.version {
|
|
Some(log.block_number)
|
|
} else {
|
|
None
|
|
}
|
|
})
|
|
.last()
|
|
}
|
|
}
|
|
|
|
/// Trait to provide current time. Useful for mocking in tests.
|
|
pub trait TimeProvider: Send + Sync + 'static {
|
|
/// Returns an instant corresponding to "now".
|
|
fn now(&self) -> Instant;
|
|
}
|
|
|
|
/// `TimeProvider` implementation that delegates calls to `std::time`.
|
|
pub struct StdTimeProvider;
|
|
|
|
impl TimeProvider for StdTimeProvider {
|
|
fn now(&self) -> Instant {
|
|
Instant::now()
|
|
}
|
|
}
|
|
|
|
/// Trait to generate a random number within a given range.
|
|
/// Useful for mocking in tests.
|
|
pub trait GenRange: Send + Sync + 'static {
|
|
/// Generate a random value in the range [low, high), i.e. inclusive of low and exclusive of high.
|
|
fn gen_range(&self, low: u64, high: u64) -> u64;
|
|
}
|
|
|
|
/// `GenRange` implementation that uses a `rand::thread_rng` for randomness.
|
|
pub struct ThreadRngGenRange;
|
|
|
|
impl GenRange for ThreadRngGenRange {
|
|
fn gen_range(&self, low: u64, high: u64) -> u64 {
|
|
rand::thread_rng().gen_range(low, high)
|
|
}
|
|
}
|
|
|
|
impl Updater {
|
|
/// `Updater` constructor
|
|
pub fn new(
|
|
client: &Weak<dyn BlockChainClient>,
|
|
sync: &Weak<dyn SyncProvider>,
|
|
update_policy: UpdatePolicy,
|
|
fetcher: fetch::Client,
|
|
) -> Arc<Updater> {
|
|
let r = Arc::new(Updater {
|
|
update_policy,
|
|
weak_self: Mutex::new(Default::default()),
|
|
client: client.clone(),
|
|
sync: Some(sync.clone()),
|
|
fetcher,
|
|
operations_client: OperationsContractClient::new(
|
|
client.clone()),
|
|
exit_handler: Mutex::new(None),
|
|
this: if cfg!(feature = "test-updater") {
|
|
VersionInfo {
|
|
track: ReleaseTrack::Stable,
|
|
version: Version::new(1, 3, 7),
|
|
hash: H160::zero(),
|
|
}
|
|
} else {
|
|
VersionInfo::this()
|
|
},
|
|
time_provider: StdTimeProvider,
|
|
rng: ThreadRngGenRange,
|
|
state: Mutex::new(Default::default()),
|
|
});
|
|
*r.weak_self.lock() = Arc::downgrade(&r);
|
|
|
|
r.poll();
|
|
r
|
|
}
|
|
|
|
fn update_file_name(v: &VersionInfo) -> String {
|
|
format!("parity-{}.{}.{}-{:x}", v.version.major, v.version.minor, v.version.patch, v.hash)
|
|
}
|
|
}
|
|
|
|
impl<O: OperationsClient, F: HashFetch, T: TimeProvider, R: GenRange> Updater<O, F, T, R> {
|
|
/// Set a closure to call when we want to restart the client
|
|
pub fn set_exit_handler<G>(&self, g: G) where G: Fn() + 'static + Send {
|
|
*self.exit_handler.lock() = Some(Box::new(g));
|
|
}
|
|
|
|
/// Returns release track of the parity node.
|
|
/// `update_policy.track` is the track specified from the command line, whereas `this.track`
|
|
/// is the track of the software which is currently run
|
|
fn track(&self) -> ReleaseTrack {
|
|
match self.update_policy.track {
|
|
ReleaseTrack::Unknown => self.this.track,
|
|
x => x,
|
|
}
|
|
}
|
|
|
|
fn updates_path(&self, name: &str) -> PathBuf {
|
|
self.update_policy.path.join(name)
|
|
}
|
|
|
|
fn on_fetch(&self, latest: &OperationsInfo, res: Result<PathBuf, fetch::Error>) {
|
|
let mut state = self.state.lock();
|
|
|
|
// Bail out if the latest release has changed in the meantime
|
|
if state.latest.as_ref() != Some(&latest) {
|
|
return;
|
|
}
|
|
|
|
// The updated status should be set to fetching
|
|
if let UpdaterStatus::Fetching { ref release, binary, retries } = state.status.clone() {
|
|
match res {
|
|
// We've successfully fetched the binary
|
|
Ok(path) => {
|
|
let setup = |path: &Path| -> Result<(), String> {
|
|
let dest = self.updates_path(&Updater::update_file_name(&release.version));
|
|
if !dest.exists() {
|
|
info!(target: "updater", "Fetched latest version ({}) OK to {}", release.version, path.display());
|
|
fs::create_dir_all(dest.parent().expect("at least one thing pushed; qed")).map_err(|e| format!("Unable to create updates path: {:?}", e))?;
|
|
fs::copy(path, &dest).map_err(|e| format!("Unable to copy update: {:?}", e))?;
|
|
restrict_permissions_owner(&dest, false, true).map_err(|e| format!("Unable to update permissions: {}", e))?;
|
|
info!(target: "updater", "Copied updated binary to {}", dest.display());
|
|
}
|
|
|
|
Ok(())
|
|
};
|
|
|
|
// There was a fatal error setting up the update, disable the updater
|
|
if let Err(err) = setup(&path) {
|
|
state.status = UpdaterStatus::Disabled;
|
|
warn!("{}", err);
|
|
} else {
|
|
state.status = UpdaterStatus::Ready { release: release.clone() };
|
|
self.updater_step(state);
|
|
}
|
|
},
|
|
// There was an error fetching the update, apply a backoff delay before retrying
|
|
Err(err) => {
|
|
let delay = 2_usize.pow(retries) as u64;
|
|
// cap maximum backoff to 1 day
|
|
let delay = cmp::min(delay, 24 * 60 * 60);
|
|
let backoff = (retries, self.time_provider.now() + Duration::from_secs(delay));
|
|
|
|
state.status = UpdaterStatus::FetchBackoff { release: release.clone(), backoff, binary };
|
|
|
|
warn!("Unable to fetch update ({}): {:?}, retrying in {} seconds.", release.version, err, delay);
|
|
},
|
|
}
|
|
}
|
|
}
|
|
|
|
fn execute_upgrade(&self, mut state: MutexGuard<UpdaterState>) -> bool {
|
|
if let UpdaterStatus::Ready { ref release } = state.status.clone() {
|
|
let file = Updater::update_file_name(&release.version);
|
|
let path = self.updates_path("latest");
|
|
|
|
// TODO: creating then writing is a bit fragile. would be nice to make it atomic.
|
|
if let Err(err) = fs::File::create(&path).and_then(|mut f| f.write_all(file.as_bytes())) {
|
|
state.status = UpdaterStatus::Disabled;
|
|
|
|
warn!(target: "updater", "Unable to create soft-link for update {:?}", err);
|
|
return false;
|
|
}
|
|
|
|
info!(target: "updater", "Completed upgrade to {}", &release.version);
|
|
state.status = UpdaterStatus::Installed { release: release.clone() };
|
|
|
|
match *self.exit_handler.lock() {
|
|
Some(ref h) => (*h)(),
|
|
None => info!(target: "updater", "Update installed, ready for restart."),
|
|
}
|
|
|
|
return true;
|
|
};
|
|
|
|
warn!(target: "updater", "Execute upgrade called when no upgrade ready.");
|
|
false
|
|
}
|
|
|
|
fn updater_step(&self, mut state: MutexGuard<UpdaterState>) {
|
|
let current_block_number = self.client.upgrade().map_or(0, |c| c.block_number(BlockId::Latest).unwrap_or(0));
|
|
|
|
if let Some(latest) = state.latest.clone() {
|
|
let fetch = |latest, binary| {
|
|
info!(target: "updater", "Attempting to get parity binary {}", binary);
|
|
let weak_self = self.weak_self.lock().clone();
|
|
let f = move |res: Result<PathBuf, fetch::Error>| {
|
|
if let Some(this) = weak_self.upgrade() {
|
|
this.on_fetch(&latest, res)
|
|
}
|
|
};
|
|
|
|
self.fetcher.fetch(
|
|
binary,
|
|
fetch::Abort::default().with_max_size(self.update_policy.max_size),
|
|
Box::new(f));
|
|
};
|
|
|
|
match state.status.clone() {
|
|
// updater is disabled
|
|
UpdaterStatus::Disabled => {},
|
|
// the update has already been installed
|
|
UpdaterStatus::Installed { ref release, .. } if *release == latest.track => {},
|
|
// we're currently fetching this update
|
|
UpdaterStatus::Fetching { ref release, .. } if *release == latest.track => {},
|
|
// the fetch has failed and we're backing off the next retry
|
|
UpdaterStatus::FetchBackoff { ref release, backoff, .. } if *release == latest.track && self.time_provider.now() < backoff.1 => {},
|
|
// we're delaying the update until the given block number
|
|
UpdaterStatus::Waiting { ref release, block_number, .. } if *release == latest.track && current_block_number < block_number => {},
|
|
// we're at (or past) the block that triggers the update, let's fetch the binary
|
|
UpdaterStatus::Waiting { ref release, block_number, binary } if *release == latest.track && current_block_number >= block_number => {
|
|
info!(target: "updater", "Update for binary {} triggered", binary);
|
|
|
|
state.status = UpdaterStatus::Fetching { release: release.clone(), binary, retries: 1 };
|
|
fetch(latest, binary);
|
|
},
|
|
// we're ready to retry the fetch after we applied a backoff for the previous failure
|
|
UpdaterStatus::FetchBackoff { ref release, backoff, binary } if *release == latest.track && self.time_provider.now() >= backoff.1 => {
|
|
state.status = UpdaterStatus::Fetching { release: release.clone(), binary, retries: backoff.0 + 1 };
|
|
fetch(latest, binary);
|
|
},
|
|
// the update is ready to be installed
|
|
UpdaterStatus::Ready { ref release } if *release == latest.track => {
|
|
let auto = match self.update_policy.filter {
|
|
UpdateFilter::All => true,
|
|
UpdateFilter::Critical if release.is_critical /* TODO: or is on a bad fork */ => true,
|
|
_ => false,
|
|
};
|
|
|
|
if auto {
|
|
self.execute_upgrade(state);
|
|
}
|
|
},
|
|
// this is the default case that does the initial triggering to update. we can reach this case by being
|
|
// `Idle` but also if the latest release is updated, regardless of the state we're in (except if the
|
|
// updater is in the `Disabled` state). if we push a bad update (e.g. wrong hashes or download url)
|
|
// clients might eventually be on a really long backoff state for that release, but as soon a new
|
|
// release is pushed we'll fall through to the default case.
|
|
_ => {
|
|
if let Some(binary) = latest.track.binary {
|
|
let running_later = latest.track.version.version < self.version_info().version;
|
|
let running_latest = latest.track.version.hash == self.version_info().hash;
|
|
|
|
// Bail out if we're already running the latest version or a later one
|
|
if running_later || running_latest {
|
|
return;
|
|
}
|
|
|
|
let path = self.updates_path(&Updater::update_file_name(&latest.track.version));
|
|
if path.exists() {
|
|
info!(target: "updater", "Already fetched binary.");
|
|
state.status = UpdaterStatus::Ready { release: latest.track.clone() };
|
|
self.updater_step(state);
|
|
|
|
} else if self.update_policy.enable_downloading {
|
|
let update_block_number = {
|
|
let max_delay = if latest.fork >= current_block_number {
|
|
cmp::min(latest.fork - current_block_number, self.update_policy.max_delay)
|
|
} else {
|
|
self.update_policy.max_delay
|
|
};
|
|
|
|
let from = current_block_number.saturating_sub(max_delay);
|
|
match self.operations_client.release_block_number(from, &latest.track) {
|
|
Some(block_number) => {
|
|
let delay = self.rng.gen_range(0, max_delay);
|
|
block_number.saturating_add(delay)
|
|
},
|
|
None => current_block_number,
|
|
}
|
|
};
|
|
|
|
state.status = UpdaterStatus::Waiting { release: latest.track.clone(), binary, block_number: update_block_number };
|
|
|
|
if update_block_number > current_block_number {
|
|
info!(target: "updater", "Update for binary {} will be triggered at block {}", binary, update_block_number);
|
|
} else {
|
|
self.updater_step(state);
|
|
}
|
|
}
|
|
}
|
|
},
|
|
}
|
|
}
|
|
}
|
|
|
|
fn poll(&self) {
|
|
trace!(target: "updater", "Current release is {} ({:?})", self.this, self.this.hash);
|
|
|
|
// We rely on a secure state. Bail if we're unsure about it.
|
|
if !cfg!(feature = "test-updater") {
|
|
if self.client.upgrade().map_or(true, |c| !c.chain_info().security_level().is_full()) {
|
|
return;
|
|
}
|
|
}
|
|
|
|
// Only check for updates every n blocks
|
|
let current_block_number = self.client.upgrade().map_or(0, |c| c.block_number(BlockId::Latest).unwrap_or(0));
|
|
|
|
if !cfg!(feature = "test-updater") {
|
|
if current_block_number % cmp::max(self.update_policy.frequency, 1) != 0 {
|
|
return;
|
|
}
|
|
}
|
|
|
|
let mut state = self.state.lock();
|
|
|
|
// Get the latest available release
|
|
let latest = self.operations_client.latest(&self.this, self.track()).ok();
|
|
|
|
if let Some(latest) = latest {
|
|
// Update current capability
|
|
state.capability = match latest.this_fork {
|
|
// We're behind the latest fork. Now is the time to be upgrading, perhaps we're too late...
|
|
Some(this_fork) if this_fork < latest.fork => {
|
|
if current_block_number >= latest.fork - 1 {
|
|
// We're at (or past) the last block we can import. Disable the client.
|
|
if self.update_policy.require_consensus {
|
|
if let Some(c) = self.client.upgrade() {
|
|
c.disable();
|
|
}
|
|
}
|
|
|
|
CapState::IncapableSince(latest.fork)
|
|
} else {
|
|
CapState::CapableUntil(latest.fork)
|
|
}
|
|
},
|
|
Some(_) => CapState::Capable,
|
|
None => CapState::Unknown,
|
|
};
|
|
|
|
// There's a new release available
|
|
if state.latest.as_ref() != Some(&latest) {
|
|
trace!(target: "updater", "Latest release in our track is v{} it is {}critical ({} binary is {})",
|
|
latest.track.version,
|
|
if latest.track.is_critical {""} else {"non-"},
|
|
*PLATFORM,
|
|
latest.track.binary.map_or_else(|| "unreleased".into(), |b| format!("{}", b)));
|
|
|
|
trace!(target: "updater", "Fork: this/current/latest/latest-known: {}/#{}/#{}/#{}",
|
|
latest.this_fork.map_or_else(|| "unknown".into(), |f| format!("#{}", f)),
|
|
current_block_number,
|
|
latest.track.fork,
|
|
latest.fork);
|
|
|
|
// Update latest release
|
|
state.latest = Some(latest);
|
|
}
|
|
}
|
|
|
|
self.updater_step(state);
|
|
}
|
|
}
|
|
|
|
impl ChainNotify for Updater {
|
|
fn new_blocks(&self, new_blocks: NewBlocks) {
|
|
if new_blocks.has_more_blocks_to_import { return }
|
|
match self.sync.as_ref().and_then(Weak::upgrade) {
|
|
Some(ref s) if !s.is_major_syncing() => self.poll(),
|
|
_ => {},
|
|
}
|
|
}
|
|
}
|
|
|
|
impl<O: OperationsClient, F: HashFetch, T: TimeProvider, R: GenRange> Service for Updater<O, F, T, R> {
|
|
fn capability(&self) -> CapState {
|
|
self.state.lock().capability
|
|
}
|
|
|
|
fn upgrade_ready(&self) -> Option<ReleaseInfo> {
|
|
match self.state.lock().status {
|
|
UpdaterStatus::Ready { ref release, .. } => Some(release.clone()),
|
|
_ => None,
|
|
}
|
|
}
|
|
|
|
fn execute_upgrade(&self) -> bool {
|
|
let state = self.state.lock();
|
|
self.execute_upgrade(state)
|
|
}
|
|
|
|
fn version_info(&self) -> VersionInfo {
|
|
self.this.clone()
|
|
}
|
|
|
|
fn info(&self) -> Option<OperationsInfo> {
|
|
self.state.lock().latest.clone()
|
|
}
|
|
}
|
|
|
|
#[cfg(test)]
|
|
pub mod tests {
|
|
use std::fs::File;
|
|
use std::io::Read;
|
|
use std::sync::Arc;
|
|
use semver::Version;
|
|
use tempdir::TempDir;
|
|
use ethcore::test_helpers::{TestBlockChainClient, EachBlockWith};
|
|
use self::fetch::Error;
|
|
use super::*;
|
|
|
|
#[derive(Clone)]
|
|
struct FakeOperationsClient {
|
|
result: Arc<Mutex<(Option<OperationsInfo>, Option<BlockNumber>)>>,
|
|
}
|
|
|
|
impl FakeOperationsClient {
|
|
fn new() -> FakeOperationsClient {
|
|
FakeOperationsClient { result: Arc::new(Mutex::new((None, None))) }
|
|
}
|
|
|
|
fn set_result(&self, operations_info: Option<OperationsInfo>, release_block_number: Option<BlockNumber>) {
|
|
let mut result = self.result.lock();
|
|
result.0 = operations_info;
|
|
result.1 = release_block_number;
|
|
}
|
|
}
|
|
|
|
impl OperationsClient for FakeOperationsClient {
|
|
fn latest(&self, _this: &VersionInfo, _track: ReleaseTrack) -> Result<OperationsInfo, String> {
|
|
self.result.lock().0.clone().ok_or("unavailable".into())
|
|
}
|
|
|
|
fn release_block_number(&self, _from: BlockNumber, _release: &ReleaseInfo) -> Option<BlockNumber> {
|
|
self.result.lock().1.clone()
|
|
}
|
|
}
|
|
|
|
#[derive(Clone)]
|
|
struct FakeFetch {
|
|
on_done: Arc<Mutex<Option<Box<dyn Fn(Result<PathBuf, Error>) + Send>>>>,
|
|
}
|
|
|
|
impl FakeFetch {
|
|
fn new() -> FakeFetch {
|
|
FakeFetch { on_done: Arc::new(Mutex::new(None)) }
|
|
}
|
|
|
|
fn trigger(&self, result: Option<PathBuf>) {
|
|
if let Some(ref on_done) = *self.on_done.lock() {
|
|
on_done(result.ok_or(Error::NoResolution))
|
|
}
|
|
}
|
|
}
|
|
|
|
impl HashFetch for FakeFetch {
|
|
fn fetch(&self, _hash: H256, _abort: fetch::Abort, on_done: Box<dyn Fn(Result<PathBuf, Error>) + Send>) {
|
|
*self.on_done.lock() = Some(on_done);
|
|
}
|
|
}
|
|
|
|
#[derive(Clone)]
|
|
struct FakeTimeProvider {
|
|
result: Arc<Mutex<Instant>>,
|
|
}
|
|
|
|
impl FakeTimeProvider {
|
|
fn new() -> FakeTimeProvider {
|
|
FakeTimeProvider { result: Arc::new(Mutex::new(Instant::now())) }
|
|
}
|
|
|
|
fn set_result(&self, result: Instant) {
|
|
*self.result.lock() = result;
|
|
}
|
|
}
|
|
|
|
impl TimeProvider for FakeTimeProvider {
|
|
fn now(&self) -> Instant {
|
|
*self.result.lock()
|
|
}
|
|
}
|
|
|
|
#[derive(Clone)]
|
|
struct FakeGenRange {
|
|
result: Arc<Mutex<u64>>,
|
|
}
|
|
|
|
impl FakeGenRange {
|
|
fn new() -> FakeGenRange {
|
|
FakeGenRange { result: Arc::new(Mutex::new(0)) }
|
|
}
|
|
|
|
fn set_result(&self, result: u64) {
|
|
*self.result.lock() = result;
|
|
}
|
|
}
|
|
|
|
impl GenRange for FakeGenRange {
|
|
fn gen_range(&self, _low: u64, _high: u64) -> u64 {
|
|
*self.result.lock()
|
|
}
|
|
}
|
|
|
|
type TestUpdater = Updater<FakeOperationsClient, FakeFetch, FakeTimeProvider, FakeGenRange>;
|
|
|
|
fn setup(update_policy: UpdatePolicy) -> (
|
|
Arc<TestBlockChainClient>,
|
|
Arc<TestUpdater>,
|
|
FakeOperationsClient,
|
|
FakeFetch,
|
|
FakeTimeProvider,
|
|
FakeGenRange) {
|
|
|
|
let client = Arc::new(TestBlockChainClient::new());
|
|
let weak_client = Arc::downgrade(&client);
|
|
|
|
let operations_client = FakeOperationsClient::new();
|
|
let fetcher = FakeFetch::new();
|
|
let time_provider = FakeTimeProvider::new();
|
|
let rng = FakeGenRange::new();
|
|
|
|
let this = VersionInfo {
|
|
track: ReleaseTrack::Beta,
|
|
version: Version::parse("1.0.0").unwrap(),
|
|
hash: H160::zero(),
|
|
};
|
|
|
|
let updater = Arc::new(Updater {
|
|
update_policy: update_policy,
|
|
weak_self: Mutex::new(Default::default()),
|
|
client: weak_client,
|
|
sync: None,
|
|
fetcher: fetcher.clone(),
|
|
operations_client: operations_client.clone(),
|
|
exit_handler: Mutex::new(None),
|
|
this: this,
|
|
time_provider: time_provider.clone(),
|
|
rng: rng.clone(),
|
|
state: Mutex::new(Default::default()),
|
|
});
|
|
|
|
*updater.weak_self.lock() = Arc::downgrade(&updater);
|
|
|
|
(client, updater, operations_client, fetcher, time_provider, rng)
|
|
}
|
|
|
|
fn update_policy() -> (UpdatePolicy, TempDir) {
|
|
let tempdir = TempDir::new("").unwrap();
|
|
|
|
let update_policy = UpdatePolicy {
|
|
path: tempdir.path().into(),
|
|
enable_downloading: true,
|
|
max_delay: 10,
|
|
frequency: 1,
|
|
..Default::default()
|
|
};
|
|
|
|
(update_policy, tempdir)
|
|
}
|
|
|
|
fn new_upgrade(version: &str) -> (VersionInfo, ReleaseInfo, OperationsInfo) {
|
|
let latest_version = VersionInfo {
|
|
track: ReleaseTrack::Beta,
|
|
version: Version::parse(version).unwrap(),
|
|
hash: H160::from_low_u64_be(1),
|
|
};
|
|
|
|
let latest_release = ReleaseInfo {
|
|
version: latest_version.clone(),
|
|
is_critical: false,
|
|
fork: 0,
|
|
binary: Some(H256::zero()),
|
|
};
|
|
|
|
let latest = OperationsInfo {
|
|
fork: 0,
|
|
this_fork: Some(0),
|
|
track: latest_release.clone(),
|
|
minor: None,
|
|
};
|
|
|
|
(latest_version, latest_release, latest)
|
|
}
|
|
|
|
#[test]
|
|
fn should_stay_idle_when_no_release() {
|
|
let (update_policy, _) = update_policy();
|
|
let (_client, updater, _, _, ..) = setup(update_policy);
|
|
|
|
assert_eq!(updater.state.lock().status, UpdaterStatus::Idle);
|
|
updater.poll();
|
|
assert_eq!(updater.state.lock().status, UpdaterStatus::Idle);
|
|
}
|
|
|
|
#[test]
|
|
fn should_update_on_new_release() {
|
|
let (update_policy, tempdir) = update_policy();
|
|
let (_client, updater, operations_client, fetcher, ..) = setup(update_policy);
|
|
let (latest_version, latest_release, latest) = new_upgrade("1.0.1");
|
|
|
|
// mock operations contract with a new version
|
|
operations_client.set_result(Some(latest.clone()), None);
|
|
|
|
// we start in idle state and with no information regarding the latest release
|
|
assert_eq!(updater.state.lock().latest, None);
|
|
assert_eq!(updater.state.lock().status, UpdaterStatus::Idle);
|
|
|
|
updater.poll();
|
|
|
|
// after the first poll the latest release should be set to the one we're mocking and the updater should be
|
|
// fetching it
|
|
assert_eq!(updater.state.lock().latest, Some(latest));
|
|
assert_matches!(
|
|
updater.state.lock().status,
|
|
UpdaterStatus::Fetching { ref release, retries, .. } if *release == latest_release && retries == 1);
|
|
|
|
// mock fetcher with update binary and trigger the fetch
|
|
let update_file = tempdir.path().join("parity");
|
|
File::create(update_file.clone()).unwrap();
|
|
fetcher.trigger(Some(update_file));
|
|
|
|
// after the fetch finishes the upgrade should be ready to install
|
|
assert_eq!(updater.state.lock().status, UpdaterStatus::Ready { release: latest_release.clone() });
|
|
assert_eq!(updater.upgrade_ready(), Some(latest_release.clone()));
|
|
|
|
// the current update_policy doesn't allow updating automatically, but we can trigger the update manually
|
|
<TestUpdater as Service>::execute_upgrade(&*updater);
|
|
|
|
assert_eq!(updater.state.lock().status, UpdaterStatus::Installed { release: latest_release });
|
|
|
|
// the final binary should exist in the updates folder and the 'latest' file should be updated to point to it
|
|
let updated_binary = tempdir.path().join(Updater::update_file_name(&latest_version));
|
|
let latest_file = tempdir.path().join("latest");
|
|
|
|
assert!(updated_binary.exists());
|
|
assert!(latest_file.exists());
|
|
|
|
let mut latest_file_content = String::new();
|
|
File::open(latest_file).unwrap().read_to_string(&mut latest_file_content).unwrap();
|
|
|
|
assert_eq!(latest_file_content, updated_binary.file_name().and_then(|n| n.to_str()).unwrap());
|
|
}
|
|
|
|
#[test]
|
|
fn should_randomly_delay_new_updates() {
|
|
let (update_policy, _) = update_policy();
|
|
let (client, updater, operations_client, _, _, rng) = setup(update_policy);
|
|
|
|
let (_, latest_release, latest) = new_upgrade("1.0.1");
|
|
operations_client.set_result(Some(latest.clone()), Some(0));
|
|
|
|
rng.set_result(5);
|
|
|
|
updater.poll();
|
|
|
|
// the update should be delayed for 5 blocks
|
|
assert_matches!(
|
|
updater.state.lock().status,
|
|
UpdaterStatus::Waiting { ref release, block_number, .. } if *release == latest_release && block_number == 5);
|
|
|
|
client.add_blocks(1, EachBlockWith::Nothing);
|
|
updater.poll();
|
|
|
|
// we should still be in the waiting state after we push one block
|
|
assert_matches!(
|
|
updater.state.lock().status,
|
|
UpdaterStatus::Waiting { ref release, block_number, .. } if *release == latest_release && block_number == 5);
|
|
|
|
client.add_blocks(5, EachBlockWith::Nothing);
|
|
updater.poll();
|
|
|
|
// after we're past the delay the status should switch to fetching
|
|
assert_matches!(
|
|
updater.state.lock().status,
|
|
UpdaterStatus::Fetching { ref release, .. } if *release == latest_release);
|
|
}
|
|
|
|
#[test]
|
|
fn should_not_delay_old_updates() {
|
|
let (update_policy, _) = update_policy();
|
|
let (client, updater, operations_client, ..) = setup(update_policy);
|
|
client.add_blocks(100, EachBlockWith::Nothing);
|
|
|
|
let (_, latest_release, latest) = new_upgrade("1.0.1");
|
|
operations_client.set_result(Some(latest.clone()), Some(0));
|
|
|
|
updater.poll();
|
|
|
|
// the update should not be delayed since it's older than the maximum delay
|
|
// the update was at block 0 (100 blocks ago), and the maximum delay is 10 blocks
|
|
assert_matches!(
|
|
updater.state.lock().status,
|
|
UpdaterStatus::Fetching { ref release, .. } if *release == latest_release);
|
|
}
|
|
|
|
#[test]
|
|
fn should_check_for_updates_with_configured_frequency() {
|
|
let (mut update_policy, _) = update_policy();
|
|
update_policy.frequency = 2;
|
|
|
|
let (client, updater, operations_client, _, _, rng) = setup(update_policy);
|
|
let (_, latest_release, latest) = new_upgrade("1.0.1");
|
|
operations_client.set_result(Some(latest.clone()), Some(0));
|
|
rng.set_result(5);
|
|
|
|
client.add_blocks(1, EachBlockWith::Nothing);
|
|
updater.poll();
|
|
|
|
// the updater should stay idle since we only check for updates every other block (odd blocks in this case)
|
|
assert_eq!(updater.state.lock().status, UpdaterStatus::Idle);
|
|
|
|
client.add_blocks(1, EachBlockWith::Nothing);
|
|
updater.poll();
|
|
|
|
// after adding a block we check for a new update and trigger the random delay (of 5 blocks)
|
|
assert_matches!(
|
|
updater.state.lock().status,
|
|
UpdaterStatus::Waiting { ref release, block_number, .. } if *release == latest_release && block_number == 5);
|
|
}
|
|
|
|
#[test]
|
|
fn should_backoff_retry_when_update_fails() {
|
|
let (update_policy, tempdir) = update_policy();
|
|
let (_client, updater, operations_client, fetcher, time_provider, ..) = setup(update_policy);
|
|
let (_, latest_release, latest) = new_upgrade("1.0.1");
|
|
|
|
// mock operations contract with a new version
|
|
operations_client.set_result(Some(latest.clone()), None);
|
|
|
|
let mut now = Instant::now();
|
|
time_provider.set_result(now);
|
|
|
|
updater.poll();
|
|
fetcher.trigger(None);
|
|
|
|
// we triggered the fetcher with an error result so the updater should backoff any retry
|
|
assert_matches!(
|
|
updater.state.lock().status,
|
|
UpdaterStatus::FetchBackoff { ref release, ref backoff, .. } if *release == latest_release && backoff.0 == 1);
|
|
|
|
now += Duration::from_secs(1);
|
|
time_provider.set_result(now);
|
|
updater.poll();
|
|
|
|
// if we don't wait for the elapsed time the updater status should stay the same
|
|
assert_matches!(
|
|
updater.state.lock().status,
|
|
UpdaterStatus::FetchBackoff { ref release, ref backoff, .. } if *release == latest_release && backoff.0 == 1);
|
|
|
|
now += Duration::from_secs(1);
|
|
time_provider.set_result(now);
|
|
updater.poll();
|
|
fetcher.trigger(None);
|
|
|
|
// the backoff time has elapsed so we retried again (and failed)
|
|
assert_matches!(
|
|
updater.state.lock().status,
|
|
UpdaterStatus::FetchBackoff { ref release, ref backoff, .. } if *release == latest_release && backoff.0 == 2);
|
|
|
|
now += Duration::from_secs(4);
|
|
time_provider.set_result(now);
|
|
updater.poll();
|
|
|
|
let update_file = tempdir.path().join("parity");
|
|
File::create(update_file.clone()).unwrap();
|
|
fetcher.trigger(Some(update_file));
|
|
|
|
// after setting up the mocked fetch and waiting for the backoff period the update should succeed
|
|
assert_eq!(updater.state.lock().status, UpdaterStatus::Ready { release: latest_release });
|
|
}
|
|
|
|
#[test]
|
|
fn should_quit_backoff_on_new_release() {
|
|
let (update_policy, tempdir) = update_policy();
|
|
let (_client, updater, operations_client, fetcher, ..) = setup(update_policy);
|
|
let (_, latest_release, latest) = new_upgrade("1.0.1");
|
|
|
|
// mock operations contract with a new version
|
|
operations_client.set_result(Some(latest.clone()), None);
|
|
|
|
updater.poll();
|
|
fetcher.trigger(None);
|
|
|
|
// we triggered the fetcher with an error result so the updater should backoff any retry
|
|
assert_matches!(
|
|
updater.state.lock().status,
|
|
UpdaterStatus::FetchBackoff { ref release, ref backoff, .. } if *release == latest_release && backoff.0 == 1);
|
|
|
|
// mock new working release and trigger the fetch afterwards
|
|
let (_, latest_release, latest) = new_upgrade("1.0.2");
|
|
operations_client.set_result(Some(latest.clone()), None);
|
|
let update_file = tempdir.path().join("parity");
|
|
File::create(update_file.clone()).unwrap();
|
|
|
|
updater.poll();
|
|
fetcher.trigger(Some(update_file));
|
|
|
|
// a new release should short-circuit the backoff
|
|
assert_eq!(updater.state.lock().status, UpdaterStatus::Ready { release: latest_release });
|
|
}
|
|
|
|
#[test]
|
|
fn should_detect_already_downloaded_releases() {
|
|
let (update_policy, tempdir) = update_policy();
|
|
let (_client, updater, operations_client, ..) = setup(update_policy);
|
|
let (latest_version, latest_release, latest) = new_upgrade("1.0.1");
|
|
|
|
// mock operations contract with a new version
|
|
operations_client.set_result(Some(latest.clone()), None);
|
|
|
|
// mock final update file
|
|
let update_file = tempdir.path().join(Updater::update_file_name(&latest_version));
|
|
File::create(update_file.clone()).unwrap();
|
|
|
|
updater.poll();
|
|
|
|
// after checking for a new update we immediately declare it as ready since it already exists on disk
|
|
// there was no need to trigger the fetch
|
|
assert_eq!(updater.state.lock().status, UpdaterStatus::Ready { release: latest_release });
|
|
}
|
|
|
|
#[test]
|
|
fn should_stay_disabled_after_fatal_error() {
|
|
let (update_policy, tempdir) = update_policy();
|
|
let (client, updater, operations_client, fetcher, ..) = setup(update_policy);
|
|
let (_, _, latest) = new_upgrade("1.0.1");
|
|
|
|
// mock operations contract with a new version
|
|
operations_client.set_result(Some(latest.clone()), None);
|
|
|
|
updater.poll();
|
|
// trigger the fetch but don't create the file on-disk. this should lead to a fatal error that disables the updater
|
|
let update_file = tempdir.path().join("parity");
|
|
fetcher.trigger(Some(update_file));
|
|
|
|
assert_eq!(updater.state.lock().status, UpdaterStatus::Disabled);
|
|
|
|
client.add_blocks(100, EachBlockWith::Nothing);
|
|
updater.poll();
|
|
|
|
// the updater should stay disabled after new blocks are pushed
|
|
assert_eq!(updater.state.lock().status, UpdaterStatus::Disabled);
|
|
|
|
let (_, _, latest) = new_upgrade("1.0.2");
|
|
operations_client.set_result(Some(latest.clone()), None);
|
|
|
|
updater.poll();
|
|
|
|
// the updater should stay disabled after a new release is pushed
|
|
assert_eq!(updater.state.lock().status, UpdaterStatus::Disabled);
|
|
}
|
|
|
|
#[test]
|
|
fn should_ignore_current_fetch_on_new_release() {
|
|
let (update_policy, _) = update_policy();
|
|
let (_client, updater, operations_client, fetcher, ..) = setup(update_policy);
|
|
let (_, latest_release, latest) = new_upgrade("1.0.1");
|
|
|
|
// mock operations contract with a new version
|
|
operations_client.set_result(Some(latest.clone()), None);
|
|
|
|
updater.poll();
|
|
|
|
assert_matches!(
|
|
updater.state.lock().status,
|
|
UpdaterStatus::Fetching { ref release, .. } if *release == latest_release);
|
|
|
|
let (_, latest_release, latest) = new_upgrade("1.0.2");
|
|
operations_client.set_result(Some(latest.clone()), None);
|
|
fetcher.trigger(None);
|
|
updater.poll();
|
|
|
|
// even though we triggered the previous fetch with an error, the current state was updated to fetch the new
|
|
// release, and the previous fetch is ignored
|
|
assert_matches!(
|
|
updater.state.lock().status,
|
|
UpdaterStatus::Fetching { ref release, .. } if *release == latest_release);
|
|
}
|
|
|
|
#[test]
|
|
fn should_auto_install_updates_if_update_policy_allows() {
|
|
let (mut update_policy, tempdir) = update_policy();
|
|
update_policy.filter = UpdateFilter::All;
|
|
let (_client, updater, operations_client, fetcher, ..) = setup(update_policy);
|
|
let (latest_version, latest_release, latest) = new_upgrade("1.0.1");
|
|
|
|
// mock operations contract with a new version
|
|
operations_client.set_result(Some(latest.clone()), None);
|
|
|
|
// we start in idle state and with no information regarding the latest release
|
|
assert_eq!(updater.state.lock().latest, None);
|
|
assert_eq!(updater.state.lock().status, UpdaterStatus::Idle);
|
|
|
|
updater.poll();
|
|
|
|
// mock fetcher with update binary and trigger the fetch
|
|
let update_file = tempdir.path().join("parity");
|
|
File::create(update_file.clone()).unwrap();
|
|
fetcher.trigger(Some(update_file));
|
|
|
|
// the update is auto installed since the update policy allows it
|
|
assert_eq!(updater.state.lock().status, UpdaterStatus::Installed { release: latest_release });
|
|
|
|
// the final binary should exist in the updates folder and the 'latest' file should be updated to point to it
|
|
let updated_binary = tempdir.path().join(Updater::update_file_name(&latest_version));
|
|
let latest_file = tempdir.path().join("latest");
|
|
|
|
assert!(updated_binary.exists());
|
|
assert!(latest_file.exists());
|
|
|
|
let mut latest_file_content = String::new();
|
|
File::open(latest_file).unwrap().read_to_string(&mut latest_file_content).unwrap();
|
|
|
|
assert_eq!(latest_file_content, updated_binary.file_name().and_then(|n| n.to_str()).unwrap());
|
|
}
|
|
|
|
#[test]
|
|
fn should_update_capability() {
|
|
let (update_policy, _tempdir) = update_policy();
|
|
let (client, updater, operations_client, _, ..) = setup(update_policy);
|
|
let (_, _, mut latest) = new_upgrade("1.0.1");
|
|
|
|
// mock operations contract with a new version
|
|
operations_client.set_result(Some(latest.clone()), None);
|
|
|
|
// we start with no information regarding our node's capabilities
|
|
assert_eq!(updater.state.lock().capability, CapState::Unknown);
|
|
|
|
updater.poll();
|
|
|
|
// our node supports the current fork
|
|
assert_eq!(updater.state.lock().capability, CapState::Capable);
|
|
|
|
// lets announce a new fork which our node doesn't support
|
|
latest.fork = 2;
|
|
operations_client.set_result(Some(latest.clone()), None);
|
|
updater.poll();
|
|
|
|
// our node is only capable of operating until block #2 when the fork triggers
|
|
assert_eq!(updater.state.lock().capability, CapState::CapableUntil(2));
|
|
|
|
client.add_blocks(3, EachBlockWith::Nothing);
|
|
updater.poll();
|
|
|
|
// after we move past the fork the capability should be updated to incapable
|
|
assert_eq!(updater.state.lock().capability, CapState::IncapableSince(2));
|
|
|
|
// and since our update policy requires consensus, the client should be disabled
|
|
assert!(client.is_disabled());
|
|
}
|
|
|
|
#[test]
|
|
fn static_hashes_do_not_panic() {
|
|
let client_id_hash: H256 = *CLIENT_ID_HASH;
|
|
assert_eq!(&format!("{:x}", client_id_hash), "7061726974790000000000000000000000000000000000000000000000000000");
|
|
let _: H256 = *PLATFORM_ID_HASH;
|
|
}
|
|
}
|