OCI layer blobs accumulate forever — every pull writes layers to
~/.cache/banger/oci/blobs/sha256/<hex> via go-containerregistry's
filesystem cache, and nothing ever evicts them. The cache is purely
a re-pull-avoidance (every flattened image is independent of the
blobs that sourced it), so it's a perfect candidate for an opt-in
operator-driven prune.
New surface:
* api: ImageCachePruneParams{DryRun}, ImageCachePruneResult
{BytesFreed, BlobsFreed, DryRun, CacheDir}.
* daemon: ImageService.PruneOCICache walks layout.OCICacheDir for
a (bytes, blobs) tally, then — outside dry-run — atomically
renames the cache aside, recreates it empty, and rm -rf's the
aside dir. The rename-then-rm avoids leaving the cache in a
half-removed state if a pull starts mid-prune (the in-flight
pull's open files survive the rename via standard Linux
semantics; it just sees a fresh empty cache afterwards). Missing
cache dir is treated as zero — fresh installs that have never
pulled an OCI image don't error.
* dispatch: image.cache.prune RPC (paramHandler-wrapped, mirroring
every other image RPC). Documented-methods test list updated.
* cli: `banger image cache` group with a `prune` subcommand
(--dry-run flag). Output is a single line: "freed 1.2 GiB
across 47 blob(s) in /var/cache/banger/oci" or "would free …".
formatBytes helper for the size pretty-print.
docs/oci-import.md: replaced the "Tech debt: cache eviction" bullet
with a "Cache lifecycle" section describing the new command and
the in-flight-pull caveat.
Tests: PruneOCICache covers the happy path (real prune empties the
cache, recreates an empty dir, doesn't leak the .pruning- aside),
the dry-run path (returns size, leaves blobs intact), and the
fresh-install path (cache dir absent → zero result, no error).
Smoke at JOBS=4 still green; live exercise against an empty cache
on a system install prints the expected zero summary.
Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
141 lines
4 KiB
Go
141 lines
4 KiB
Go
package daemon
|
|
|
|
import (
|
|
"context"
|
|
"sort"
|
|
"strings"
|
|
"testing"
|
|
|
|
"banger/internal/rpc"
|
|
)
|
|
|
|
// TestRPCHandlersMatchDocumentedMethods pins the surface of the RPC
|
|
// table: adding or removing a method should be an explicit, reviewable
|
|
// change. If the keyset drifts and this test isn't updated alongside,
|
|
// that's a red flag — either the documented list is stale, or a
|
|
// method sneaked in without being discussed.
|
|
//
|
|
// The expected list is the single source of truth for "methods
|
|
// banger speaks." Any production code consulting it (CLI completions,
|
|
// docs generator) can grep this test.
|
|
func TestRPCHandlersMatchDocumentedMethods(t *testing.T) {
|
|
expected := []string{
|
|
"image.cache.prune",
|
|
"image.delete",
|
|
"image.list",
|
|
"image.promote",
|
|
"image.pull",
|
|
"image.register",
|
|
"image.show",
|
|
|
|
"kernel.catalog",
|
|
"kernel.delete",
|
|
"kernel.import",
|
|
"kernel.list",
|
|
"kernel.pull",
|
|
"kernel.show",
|
|
|
|
"ping",
|
|
"shutdown",
|
|
|
|
"vm.create",
|
|
"vm.create.begin",
|
|
"vm.create.cancel",
|
|
"vm.create.status",
|
|
"vm.delete",
|
|
"vm.health",
|
|
"vm.kill",
|
|
"vm.list",
|
|
"vm.logs",
|
|
"vm.ping",
|
|
"vm.ports",
|
|
"vm.restart",
|
|
"vm.set",
|
|
"vm.show",
|
|
"vm.ssh",
|
|
"vm.start",
|
|
"vm.stats",
|
|
"vm.stop",
|
|
|
|
"vm.workspace.export",
|
|
"vm.workspace.prepare",
|
|
}
|
|
|
|
got := make([]string, 0, len(rpcHandlers))
|
|
for name := range rpcHandlers {
|
|
got = append(got, name)
|
|
}
|
|
sort.Strings(got)
|
|
sort.Strings(expected)
|
|
|
|
if len(got) != len(expected) {
|
|
t.Fatalf("method count: got %d, want %d\n got: %v\n want: %v", len(got), len(expected), got, expected)
|
|
}
|
|
for i := range expected {
|
|
if got[i] != expected[i] {
|
|
t.Fatalf("method[%d]: got %q, want %q\n full got: %v\n full want: %v", i, got[i], expected[i], got, expected)
|
|
}
|
|
}
|
|
}
|
|
|
|
// TestRPCHandlersAllNonNil catches a silly-but-possible footgun:
|
|
// registering a method with a nil function literal.
|
|
func TestRPCHandlersAllNonNil(t *testing.T) {
|
|
for name, h := range rpcHandlers {
|
|
if h == nil {
|
|
t.Errorf("rpcHandlers[%q] = nil", name)
|
|
}
|
|
}
|
|
}
|
|
|
|
// TestDispatchStampsOpIDOnError pins the contract that every error
|
|
// response leaving dispatch carries an op_id, even on the
|
|
// short-circuit paths (bad_version, unknown_method) that never
|
|
// reach a handler. Operators rely on this id to correlate a CLI
|
|
// failure to a daemon log line.
|
|
func TestDispatchStampsOpIDOnError(t *testing.T) {
|
|
d := &Daemon{}
|
|
t.Run("unknown_method", func(t *testing.T) {
|
|
resp := d.dispatch(context.Background(), rpc.Request{Version: rpc.Version, Method: "no.such.method"})
|
|
if resp.OK {
|
|
t.Fatalf("expected error response, got %+v", resp)
|
|
}
|
|
if resp.Error == nil || resp.Error.Code != "unknown_method" {
|
|
t.Fatalf("error = %+v, want unknown_method", resp.Error)
|
|
}
|
|
if !strings.HasPrefix(resp.Error.OpID, "op-") {
|
|
t.Fatalf("op_id = %q, want op-* prefix", resp.Error.OpID)
|
|
}
|
|
})
|
|
t.Run("bad_version", func(t *testing.T) {
|
|
resp := d.dispatch(context.Background(), rpc.Request{Version: rpc.Version + 99, Method: "ping"})
|
|
if resp.OK {
|
|
t.Fatalf("expected error response, got %+v", resp)
|
|
}
|
|
if resp.Error == nil || resp.Error.Code != "bad_version" {
|
|
t.Fatalf("error = %+v, want bad_version", resp.Error)
|
|
}
|
|
if !strings.HasPrefix(resp.Error.OpID, "op-") {
|
|
t.Fatalf("op_id = %q, want op-* prefix", resp.Error.OpID)
|
|
}
|
|
})
|
|
}
|
|
|
|
// TestDispatchPropagatesOpIDFromContext covers the case where a
|
|
// handler returns its own rpc.NewError with an empty op_id (most
|
|
// service errors do); the dispatch wrapper must stamp the
|
|
// dispatch-generated id on the way out.
|
|
func TestDispatchPropagatesOpIDFromContext(t *testing.T) {
|
|
d := &Daemon{
|
|
requestHandler: func(_ context.Context, _ rpc.Request) rpc.Response {
|
|
return rpc.NewError("operation_failed", "deliberate test failure")
|
|
},
|
|
}
|
|
resp := d.dispatch(context.Background(), rpc.Request{Version: rpc.Version, Method: "anything"})
|
|
if resp.OK || resp.Error == nil {
|
|
t.Fatalf("expected error response, got %+v", resp)
|
|
}
|
|
if !strings.HasPrefix(resp.Error.OpID, "op-") {
|
|
t.Fatalf("dispatch did not stamp op_id: %+v", resp.Error)
|
|
}
|
|
}
|