use crate::manifest::{
FleetBackupManifest, FleetMember, IdentityMode, ManifestValidationError, SourceSnapshot,
VerificationCheck,
};
use candid::Principal;
use serde::{Deserialize, Serialize};
use std::{
collections::{BTreeMap, BTreeSet},
str::FromStr,
};
use thiserror::Error as ThisError;
#[derive(Clone, Debug, Default, Deserialize, Serialize)]
pub struct RestoreMapping {
pub members: Vec<RestoreMappingEntry>,
}
impl RestoreMapping {
fn target_for(&self, source_canister: &str) -> Option<&str> {
self.members
.iter()
.find(|entry| entry.source_canister == source_canister)
.map(|entry| entry.target_canister.as_str())
}
}
#[derive(Clone, Debug, Deserialize, Serialize)]
pub struct RestoreMappingEntry {
pub source_canister: String,
pub target_canister: String,
}
#[derive(Clone, Debug, Deserialize, Eq, PartialEq, Serialize)]
pub struct RestorePlan {
pub backup_id: String,
pub source_environment: String,
pub source_root_canister: String,
pub topology_hash: String,
pub member_count: usize,
pub identity_summary: RestoreIdentitySummary,
pub verification_summary: RestoreVerificationSummary,
pub ordering_summary: RestoreOrderingSummary,
pub phases: Vec<RestorePhase>,
}
impl RestorePlan {
#[must_use]
pub fn ordered_members(&self) -> Vec<&RestorePlanMember> {
self.phases
.iter()
.flat_map(|phase| phase.members.iter())
.collect()
}
}
#[derive(Clone, Debug, Deserialize, Eq, PartialEq, Serialize)]
pub struct RestoreIdentitySummary {
pub fixed_members: usize,
pub relocatable_members: usize,
pub in_place_members: usize,
pub mapped_members: usize,
pub remapped_members: usize,
}
#[derive(Clone, Debug, Deserialize, Eq, PartialEq, Serialize)]
pub struct RestoreVerificationSummary {
pub fleet_checks: usize,
pub member_check_groups: usize,
pub member_checks: usize,
pub members_with_checks: usize,
pub total_checks: usize,
}
#[derive(Clone, Debug, Deserialize, Eq, PartialEq, Serialize)]
pub struct RestoreOrderingSummary {
pub phase_count: usize,
pub dependency_free_members: usize,
pub in_group_parent_edges: usize,
pub cross_group_parent_edges: usize,
}
#[derive(Clone, Debug, Deserialize, Eq, PartialEq, Serialize)]
pub struct RestorePhase {
pub restore_group: u16,
pub members: Vec<RestorePlanMember>,
}
#[derive(Clone, Debug, Deserialize, Eq, PartialEq, Serialize)]
pub struct RestorePlanMember {
pub source_canister: String,
pub target_canister: String,
pub role: String,
pub parent_source_canister: Option<String>,
pub parent_target_canister: Option<String>,
pub ordering_dependency: Option<RestoreOrderingDependency>,
pub phase_order: usize,
pub restore_group: u16,
pub identity_mode: IdentityMode,
pub verification_class: String,
pub verification_checks: Vec<VerificationCheck>,
pub source_snapshot: SourceSnapshot,
}
#[derive(Clone, Debug, Deserialize, Eq, PartialEq, Serialize)]
pub struct RestoreOrderingDependency {
pub source_canister: String,
pub target_canister: String,
pub relationship: RestoreOrderingRelationship,
}
#[derive(Clone, Debug, Deserialize, Eq, PartialEq, Serialize)]
#[serde(rename_all = "kebab-case")]
pub enum RestoreOrderingRelationship {
ParentInSameGroup,
ParentInEarlierGroup,
}
pub struct RestorePlanner;
impl RestorePlanner {
pub fn plan(
manifest: &FleetBackupManifest,
mapping: Option<&RestoreMapping>,
) -> Result<RestorePlan, RestorePlanError> {
manifest.validate()?;
if let Some(mapping) = mapping {
validate_mapping(mapping)?;
validate_mapping_sources(manifest, mapping)?;
}
let members = resolve_members(manifest, mapping)?;
let identity_summary = restore_identity_summary(&members, mapping.is_some());
let verification_summary = restore_verification_summary(manifest, &members);
validate_restore_group_dependencies(&members)?;
let phases = group_and_order_members(members)?;
let ordering_summary = restore_ordering_summary(&phases);
Ok(RestorePlan {
backup_id: manifest.backup_id.clone(),
source_environment: manifest.source.environment.clone(),
source_root_canister: manifest.source.root_canister.clone(),
topology_hash: manifest.fleet.topology_hash.clone(),
member_count: manifest.fleet.members.len(),
identity_summary,
verification_summary,
ordering_summary,
phases,
})
}
}
#[derive(Debug, ThisError)]
pub enum RestorePlanError {
#[error(transparent)]
InvalidManifest(#[from] ManifestValidationError),
#[error("field {field} must be a valid principal: {value}")]
InvalidPrincipal { field: &'static str, value: String },
#[error("mapping contains duplicate source canister {0}")]
DuplicateMappingSource(String),
#[error("mapping contains duplicate target canister {0}")]
DuplicateMappingTarget(String),
#[error("mapping references unknown source canister {0}")]
UnknownMappingSource(String),
#[error("mapping is missing source canister {0}")]
MissingMappingSource(String),
#[error("fixed-identity member {source_canister} cannot be mapped to {target_canister}")]
FixedIdentityRemap {
source_canister: String,
target_canister: String,
},
#[error("restore plan contains duplicate target canister {0}")]
DuplicatePlanTarget(String),
#[error("restore group {0} contains a parent cycle or unresolved dependency")]
RestoreOrderCycle(u16),
#[error(
"restore plan places parent {parent_source_canister} in group {parent_restore_group} after child {child_source_canister} in group {child_restore_group}"
)]
ParentRestoreGroupAfterChild {
child_source_canister: String,
parent_source_canister: String,
child_restore_group: u16,
parent_restore_group: u16,
},
}
fn validate_mapping(mapping: &RestoreMapping) -> Result<(), RestorePlanError> {
let mut sources = BTreeSet::new();
let mut targets = BTreeSet::new();
for entry in &mapping.members {
validate_principal("mapping.members[].source_canister", &entry.source_canister)?;
validate_principal("mapping.members[].target_canister", &entry.target_canister)?;
if !sources.insert(entry.source_canister.clone()) {
return Err(RestorePlanError::DuplicateMappingSource(
entry.source_canister.clone(),
));
}
if !targets.insert(entry.target_canister.clone()) {
return Err(RestorePlanError::DuplicateMappingTarget(
entry.target_canister.clone(),
));
}
}
Ok(())
}
fn validate_mapping_sources(
manifest: &FleetBackupManifest,
mapping: &RestoreMapping,
) -> Result<(), RestorePlanError> {
let sources = manifest
.fleet
.members
.iter()
.map(|member| member.canister_id.as_str())
.collect::<BTreeSet<_>>();
for entry in &mapping.members {
if !sources.contains(entry.source_canister.as_str()) {
return Err(RestorePlanError::UnknownMappingSource(
entry.source_canister.clone(),
));
}
}
Ok(())
}
fn resolve_members(
manifest: &FleetBackupManifest,
mapping: Option<&RestoreMapping>,
) -> Result<Vec<RestorePlanMember>, RestorePlanError> {
let mut plan_members = Vec::with_capacity(manifest.fleet.members.len());
let mut targets = BTreeSet::new();
let mut source_to_target = BTreeMap::new();
for member in &manifest.fleet.members {
let target = resolve_target(member, mapping)?;
if !targets.insert(target.clone()) {
return Err(RestorePlanError::DuplicatePlanTarget(target));
}
source_to_target.insert(member.canister_id.clone(), target.clone());
plan_members.push(RestorePlanMember {
source_canister: member.canister_id.clone(),
target_canister: target,
role: member.role.clone(),
parent_source_canister: member.parent_canister_id.clone(),
parent_target_canister: None,
ordering_dependency: None,
phase_order: 0,
restore_group: member.restore_group,
identity_mode: member.identity_mode.clone(),
verification_class: member.verification_class.clone(),
verification_checks: member.verification_checks.clone(),
source_snapshot: member.source_snapshot.clone(),
});
}
for member in &mut plan_members {
member.parent_target_canister = member
.parent_source_canister
.as_ref()
.and_then(|parent| source_to_target.get(parent))
.cloned();
}
Ok(plan_members)
}
fn resolve_target(
member: &FleetMember,
mapping: Option<&RestoreMapping>,
) -> Result<String, RestorePlanError> {
let target = match mapping {
Some(mapping) => mapping
.target_for(&member.canister_id)
.ok_or_else(|| RestorePlanError::MissingMappingSource(member.canister_id.clone()))?
.to_string(),
None => member.canister_id.clone(),
};
if matches!(member.identity_mode, IdentityMode::Fixed) && target != member.canister_id {
return Err(RestorePlanError::FixedIdentityRemap {
source_canister: member.canister_id.clone(),
target_canister: target,
});
}
Ok(target)
}
fn restore_identity_summary(
members: &[RestorePlanMember],
mapping_supplied: bool,
) -> RestoreIdentitySummary {
let mut summary = RestoreIdentitySummary {
fixed_members: 0,
relocatable_members: 0,
in_place_members: 0,
mapped_members: 0,
remapped_members: 0,
};
for member in members {
match member.identity_mode {
IdentityMode::Fixed => summary.fixed_members += 1,
IdentityMode::Relocatable => summary.relocatable_members += 1,
}
if member.source_canister == member.target_canister {
summary.in_place_members += 1;
} else {
summary.remapped_members += 1;
}
if mapping_supplied {
summary.mapped_members += 1;
}
}
summary
}
fn restore_verification_summary(
manifest: &FleetBackupManifest,
members: &[RestorePlanMember],
) -> RestoreVerificationSummary {
let fleet_checks = manifest.verification.fleet_checks.len();
let member_check_groups = manifest.verification.member_checks.len();
let role_check_counts = manifest
.verification
.member_checks
.iter()
.map(|group| (group.role.as_str(), group.checks.len()))
.collect::<BTreeMap<_, _>>();
let inline_member_checks = members
.iter()
.map(|member| member.verification_checks.len())
.sum::<usize>();
let role_member_checks = members
.iter()
.map(|member| {
role_check_counts
.get(member.role.as_str())
.copied()
.unwrap_or(0)
})
.sum::<usize>();
let member_checks = inline_member_checks + role_member_checks;
let members_with_checks = members
.iter()
.filter(|member| {
!member.verification_checks.is_empty()
|| role_check_counts.contains_key(member.role.as_str())
})
.count();
RestoreVerificationSummary {
fleet_checks,
member_check_groups,
member_checks,
members_with_checks,
total_checks: fleet_checks + member_checks,
}
}
fn validate_restore_group_dependencies(
members: &[RestorePlanMember],
) -> Result<(), RestorePlanError> {
let groups_by_source = members
.iter()
.map(|member| (member.source_canister.as_str(), member.restore_group))
.collect::<BTreeMap<_, _>>();
for member in members {
let Some(parent) = &member.parent_source_canister else {
continue;
};
let Some(parent_group) = groups_by_source.get(parent.as_str()) else {
continue;
};
if *parent_group > member.restore_group {
return Err(RestorePlanError::ParentRestoreGroupAfterChild {
child_source_canister: member.source_canister.clone(),
parent_source_canister: parent.clone(),
child_restore_group: member.restore_group,
parent_restore_group: *parent_group,
});
}
}
Ok(())
}
fn group_and_order_members(
members: Vec<RestorePlanMember>,
) -> Result<Vec<RestorePhase>, RestorePlanError> {
let mut groups = BTreeMap::<u16, Vec<RestorePlanMember>>::new();
for member in members {
groups.entry(member.restore_group).or_default().push(member);
}
groups
.into_iter()
.map(|(restore_group, members)| {
let members = order_group(restore_group, members)?;
Ok(RestorePhase {
restore_group,
members,
})
})
.collect()
}
fn order_group(
restore_group: u16,
members: Vec<RestorePlanMember>,
) -> Result<Vec<RestorePlanMember>, RestorePlanError> {
let mut remaining = members;
let group_sources = remaining
.iter()
.map(|member| member.source_canister.clone())
.collect::<BTreeSet<_>>();
let mut emitted = BTreeSet::new();
let mut ordered = Vec::with_capacity(remaining.len());
while !remaining.is_empty() {
let Some(index) = remaining
.iter()
.position(|member| parent_satisfied(member, &group_sources, &emitted))
else {
return Err(RestorePlanError::RestoreOrderCycle(restore_group));
};
let mut member = remaining.remove(index);
member.phase_order = ordered.len();
member.ordering_dependency = ordering_dependency(&member, &group_sources);
emitted.insert(member.source_canister.clone());
ordered.push(member);
}
Ok(ordered)
}
fn ordering_dependency(
member: &RestorePlanMember,
group_sources: &BTreeSet<String>,
) -> Option<RestoreOrderingDependency> {
let parent_source = member.parent_source_canister.as_ref()?;
let parent_target = member.parent_target_canister.as_ref()?;
let relationship = if group_sources.contains(parent_source) {
RestoreOrderingRelationship::ParentInSameGroup
} else {
RestoreOrderingRelationship::ParentInEarlierGroup
};
Some(RestoreOrderingDependency {
source_canister: parent_source.clone(),
target_canister: parent_target.clone(),
relationship,
})
}
fn restore_ordering_summary(phases: &[RestorePhase]) -> RestoreOrderingSummary {
let mut summary = RestoreOrderingSummary {
phase_count: phases.len(),
dependency_free_members: 0,
in_group_parent_edges: 0,
cross_group_parent_edges: 0,
};
for member in phases.iter().flat_map(|phase| phase.members.iter()) {
match &member.ordering_dependency {
Some(dependency)
if dependency.relationship == RestoreOrderingRelationship::ParentInSameGroup =>
{
summary.in_group_parent_edges += 1;
}
Some(dependency)
if dependency.relationship == RestoreOrderingRelationship::ParentInEarlierGroup =>
{
summary.cross_group_parent_edges += 1;
}
Some(_) => {}
None => summary.dependency_free_members += 1,
}
}
summary
}
fn parent_satisfied(
member: &RestorePlanMember,
group_sources: &BTreeSet<String>,
emitted: &BTreeSet<String>,
) -> bool {
match &member.parent_source_canister {
Some(parent) if group_sources.contains(parent) => emitted.contains(parent),
_ => true,
}
}
fn validate_principal(field: &'static str, value: &str) -> Result<(), RestorePlanError> {
Principal::from_str(value)
.map(|_| ())
.map_err(|_| RestorePlanError::InvalidPrincipal {
field,
value: value.to_string(),
})
}
#[cfg(test)]
mod tests {
use super::*;
use crate::manifest::{
BackupUnit, BackupUnitKind, ConsistencyMode, ConsistencySection, FleetSection,
MemberVerificationChecks, SourceMetadata, SourceSnapshot, ToolMetadata, VerificationCheck,
VerificationPlan,
};
const ROOT: &str = "aaaaa-aa";
const CHILD: &str = "renrk-eyaaa-aaaaa-aaada-cai";
const CHILD_TWO: &str = "r7inp-6aaaa-aaaaa-aaabq-cai";
const TARGET: &str = "rno2w-sqaaa-aaaaa-aaacq-cai";
const HASH: &str = "0123456789abcdef0123456789abcdef0123456789abcdef0123456789abcdef";
fn valid_manifest(identity_mode: IdentityMode) -> FleetBackupManifest {
FleetBackupManifest {
manifest_version: 1,
backup_id: "fbk_test_001".to_string(),
created_at: "2026-04-10T12:00:00Z".to_string(),
tool: ToolMetadata {
name: "canic".to_string(),
version: "v1".to_string(),
},
source: SourceMetadata {
environment: "local".to_string(),
root_canister: ROOT.to_string(),
},
consistency: ConsistencySection {
mode: ConsistencyMode::CrashConsistent,
backup_units: vec![BackupUnit {
unit_id: "whole-fleet".to_string(),
kind: BackupUnitKind::WholeFleet,
roles: vec!["root".to_string(), "app".to_string()],
consistency_reason: None,
dependency_closure: Vec::new(),
topology_validation: "subtree-closed".to_string(),
quiescence_strategy: None,
}],
},
fleet: FleetSection {
topology_hash_algorithm: "sha256".to_string(),
topology_hash_input: "sorted(pid,parent_pid,role,module_hash)".to_string(),
discovery_topology_hash: HASH.to_string(),
pre_snapshot_topology_hash: HASH.to_string(),
topology_hash: HASH.to_string(),
members: vec![
fleet_member("app", CHILD, Some(ROOT), identity_mode, 1),
fleet_member("root", ROOT, None, IdentityMode::Fixed, 1),
],
},
verification: VerificationPlan {
fleet_checks: Vec::new(),
member_checks: Vec::new(),
},
}
}
fn fleet_member(
role: &str,
canister_id: &str,
parent_canister_id: Option<&str>,
identity_mode: IdentityMode,
restore_group: u16,
) -> FleetMember {
FleetMember {
role: role.to_string(),
canister_id: canister_id.to_string(),
parent_canister_id: parent_canister_id.map(str::to_string),
subnet_canister_id: None,
controller_hint: Some(ROOT.to_string()),
identity_mode,
restore_group,
verification_class: "basic".to_string(),
verification_checks: vec![VerificationCheck {
kind: "call".to_string(),
method: Some("canic_ready".to_string()),
roles: Vec::new(),
}],
source_snapshot: SourceSnapshot {
snapshot_id: format!("snap-{role}"),
module_hash: Some(HASH.to_string()),
wasm_hash: Some(HASH.to_string()),
code_version: Some("v0.30.0".to_string()),
artifact_path: format!("artifacts/{role}"),
checksum_algorithm: "sha256".to_string(),
checksum: Some(HASH.to_string()),
},
}
}
#[test]
fn in_place_plan_orders_parent_before_child() {
let manifest = valid_manifest(IdentityMode::Relocatable);
let plan = RestorePlanner::plan(&manifest, None).expect("plan should build");
let ordered = plan.ordered_members();
assert_eq!(plan.backup_id, "fbk_test_001");
assert_eq!(plan.source_environment, "local");
assert_eq!(plan.source_root_canister, ROOT);
assert_eq!(plan.topology_hash, HASH);
assert_eq!(plan.member_count, 2);
assert_eq!(plan.identity_summary.fixed_members, 1);
assert_eq!(plan.identity_summary.relocatable_members, 1);
assert_eq!(plan.identity_summary.in_place_members, 2);
assert_eq!(plan.identity_summary.mapped_members, 0);
assert_eq!(plan.identity_summary.remapped_members, 0);
assert_eq!(plan.verification_summary.fleet_checks, 0);
assert_eq!(plan.verification_summary.member_check_groups, 0);
assert_eq!(plan.verification_summary.member_checks, 2);
assert_eq!(plan.verification_summary.members_with_checks, 2);
assert_eq!(plan.verification_summary.total_checks, 2);
assert_eq!(plan.ordering_summary.phase_count, 1);
assert_eq!(plan.ordering_summary.dependency_free_members, 1);
assert_eq!(plan.ordering_summary.in_group_parent_edges, 1);
assert_eq!(plan.ordering_summary.cross_group_parent_edges, 0);
assert_eq!(ordered[0].phase_order, 0);
assert_eq!(ordered[1].phase_order, 1);
assert_eq!(ordered[0].source_canister, ROOT);
assert_eq!(ordered[1].source_canister, CHILD);
assert_eq!(
ordered[1].ordering_dependency,
Some(RestoreOrderingDependency {
source_canister: ROOT.to_string(),
target_canister: ROOT.to_string(),
relationship: RestoreOrderingRelationship::ParentInSameGroup,
})
);
}
#[test]
fn plan_reports_parent_dependency_from_earlier_group() {
let mut manifest = valid_manifest(IdentityMode::Relocatable);
manifest.fleet.members[0].restore_group = 2;
manifest.fleet.members[1].restore_group = 1;
let plan = RestorePlanner::plan(&manifest, None).expect("plan should build");
let ordered = plan.ordered_members();
assert_eq!(plan.phases.len(), 2);
assert_eq!(plan.ordering_summary.phase_count, 2);
assert_eq!(plan.ordering_summary.dependency_free_members, 1);
assert_eq!(plan.ordering_summary.in_group_parent_edges, 0);
assert_eq!(plan.ordering_summary.cross_group_parent_edges, 1);
assert_eq!(ordered[0].source_canister, ROOT);
assert_eq!(ordered[1].source_canister, CHILD);
assert_eq!(
ordered[1].ordering_dependency,
Some(RestoreOrderingDependency {
source_canister: ROOT.to_string(),
target_canister: ROOT.to_string(),
relationship: RestoreOrderingRelationship::ParentInEarlierGroup,
})
);
}
#[test]
fn plan_rejects_parent_in_later_restore_group() {
let mut manifest = valid_manifest(IdentityMode::Relocatable);
manifest.fleet.members[0].restore_group = 1;
manifest.fleet.members[1].restore_group = 2;
let err = RestorePlanner::plan(&manifest, None)
.expect_err("parent-after-child group ordering should fail");
assert!(matches!(
err,
RestorePlanError::ParentRestoreGroupAfterChild { .. }
));
}
#[test]
fn fixed_identity_member_cannot_be_remapped() {
let manifest = valid_manifest(IdentityMode::Fixed);
let mapping = RestoreMapping {
members: vec![
RestoreMappingEntry {
source_canister: ROOT.to_string(),
target_canister: ROOT.to_string(),
},
RestoreMappingEntry {
source_canister: CHILD.to_string(),
target_canister: TARGET.to_string(),
},
],
};
let err = RestorePlanner::plan(&manifest, Some(&mapping))
.expect_err("fixed member remap should fail");
assert!(matches!(err, RestorePlanError::FixedIdentityRemap { .. }));
}
#[test]
fn relocatable_member_can_be_mapped() {
let manifest = valid_manifest(IdentityMode::Relocatable);
let mapping = RestoreMapping {
members: vec![
RestoreMappingEntry {
source_canister: ROOT.to_string(),
target_canister: ROOT.to_string(),
},
RestoreMappingEntry {
source_canister: CHILD.to_string(),
target_canister: TARGET.to_string(),
},
],
};
let plan = RestorePlanner::plan(&manifest, Some(&mapping)).expect("plan should build");
let child = plan
.ordered_members()
.into_iter()
.find(|member| member.source_canister == CHILD)
.expect("child member should be planned");
assert_eq!(plan.identity_summary.fixed_members, 1);
assert_eq!(plan.identity_summary.relocatable_members, 1);
assert_eq!(plan.identity_summary.in_place_members, 1);
assert_eq!(plan.identity_summary.mapped_members, 2);
assert_eq!(plan.identity_summary.remapped_members, 1);
assert_eq!(child.target_canister, TARGET);
assert_eq!(child.parent_target_canister, Some(ROOT.to_string()));
}
#[test]
fn plan_members_include_snapshot_and_verification_metadata() {
let manifest = valid_manifest(IdentityMode::Relocatable);
let plan = RestorePlanner::plan(&manifest, None).expect("plan should build");
let root = plan
.ordered_members()
.into_iter()
.find(|member| member.source_canister == ROOT)
.expect("root member should be planned");
assert_eq!(root.identity_mode, IdentityMode::Fixed);
assert_eq!(root.verification_class, "basic");
assert_eq!(root.verification_checks[0].kind, "call");
assert_eq!(root.source_snapshot.snapshot_id, "snap-root");
assert_eq!(root.source_snapshot.artifact_path, "artifacts/root");
}
#[test]
fn plan_includes_verification_summary() {
let mut manifest = valid_manifest(IdentityMode::Relocatable);
manifest.verification.fleet_checks.push(VerificationCheck {
kind: "fleet-ready".to_string(),
method: None,
roles: Vec::new(),
});
manifest
.verification
.member_checks
.push(MemberVerificationChecks {
role: "app".to_string(),
checks: vec![VerificationCheck {
kind: "app-ready".to_string(),
method: Some("ready".to_string()),
roles: Vec::new(),
}],
});
let plan = RestorePlanner::plan(&manifest, None).expect("plan should build");
assert_eq!(plan.verification_summary.fleet_checks, 1);
assert_eq!(plan.verification_summary.member_check_groups, 1);
assert_eq!(plan.verification_summary.member_checks, 3);
assert_eq!(plan.verification_summary.members_with_checks, 2);
assert_eq!(plan.verification_summary.total_checks, 4);
}
#[test]
fn plan_expands_role_verification_checks_per_matching_member() {
let mut manifest = valid_manifest(IdentityMode::Relocatable);
manifest.fleet.members.push(fleet_member(
"app",
CHILD_TWO,
Some(ROOT),
IdentityMode::Relocatable,
1,
));
manifest
.verification
.member_checks
.push(MemberVerificationChecks {
role: "app".to_string(),
checks: vec![VerificationCheck {
kind: "app-ready".to_string(),
method: Some("ready".to_string()),
roles: Vec::new(),
}],
});
let plan = RestorePlanner::plan(&manifest, None).expect("plan should build");
assert_eq!(plan.verification_summary.fleet_checks, 0);
assert_eq!(plan.verification_summary.member_check_groups, 1);
assert_eq!(plan.verification_summary.member_checks, 5);
assert_eq!(plan.verification_summary.members_with_checks, 3);
assert_eq!(plan.verification_summary.total_checks, 5);
}
#[test]
fn mapped_restore_requires_complete_mapping() {
let manifest = valid_manifest(IdentityMode::Relocatable);
let mapping = RestoreMapping {
members: vec![RestoreMappingEntry {
source_canister: ROOT.to_string(),
target_canister: ROOT.to_string(),
}],
};
let err = RestorePlanner::plan(&manifest, Some(&mapping))
.expect_err("incomplete mapping should fail");
assert!(matches!(err, RestorePlanError::MissingMappingSource(_)));
}
#[test]
fn mapped_restore_rejects_unknown_mapping_sources() {
let manifest = valid_manifest(IdentityMode::Relocatable);
let unknown = "rdmx6-jaaaa-aaaaa-aaadq-cai";
let mapping = RestoreMapping {
members: vec![
RestoreMappingEntry {
source_canister: ROOT.to_string(),
target_canister: ROOT.to_string(),
},
RestoreMappingEntry {
source_canister: CHILD.to_string(),
target_canister: TARGET.to_string(),
},
RestoreMappingEntry {
source_canister: unknown.to_string(),
target_canister: unknown.to_string(),
},
],
};
let err = RestorePlanner::plan(&manifest, Some(&mapping))
.expect_err("unknown mapping source should fail");
assert!(matches!(err, RestorePlanError::UnknownMappingSource(_)));
}
#[test]
fn duplicate_mapping_targets_fail_validation() {
let manifest = valid_manifest(IdentityMode::Relocatable);
let mapping = RestoreMapping {
members: vec![
RestoreMappingEntry {
source_canister: ROOT.to_string(),
target_canister: ROOT.to_string(),
},
RestoreMappingEntry {
source_canister: CHILD.to_string(),
target_canister: ROOT.to_string(),
},
],
};
let err = RestorePlanner::plan(&manifest, Some(&mapping))
.expect_err("duplicate targets should fail");
assert!(matches!(err, RestorePlanError::DuplicateMappingTarget(_)));
}
}