ceph/qa/tasks/cephfs/test_multifs_auth.py
Rishabh Dave 9bac23b197 qa/cephfs: improve test_multifs_auth.py
Remove setup_test_env() because removing this methods removes an extra
layer of abstraction which makes tests more readable. Rename
_create_client_and_keyring_file() to just _create_client() and reverse
the order of parameters in remount_with_new_client() and set default
value of cephfs_mntpt to '/'.

Signed-off-by: Rishabh Dave <ridave@redhat.com>
2022-07-21 17:53:16 +05:30

298 lines
12 KiB
Python

"""
Test for Ceph clusters with multiple FSs.
"""
import logging
from tasks.cephfs.cephfs_test_case import CephFSTestCase
from tasks.cephfs.caps_helper import CapTester
from teuthology.exceptions import CommandFailedError
log = logging.getLogger(__name__)
class TestMultiFS(CephFSTestCase):
client_id = 'testuser'
client_name = 'client.' + client_id
# one dedicated for each FS
MDSS_REQUIRED = 2
CLIENTS_REQUIRED = 2
def setUp(self):
super(TestMultiFS, self).setUp()
self.captester = CapTester()
# we might have it - the client - if the same cluster was used for a
# different vstart_runner.py run.
self.run_cluster_cmd(f'auth rm {self.client_name}')
self.fs1 = self.fs
self.fs2 = self.mds_cluster.newfs(name='cephfs2', create=True)
# we'll reassign caps to client.1 so that it can operate with cephfs2
self.run_cluster_cmd(f'auth caps client.{self.mount_b.client_id} mon '
f'"allow r" osd "allow rw '
f'pool={self.fs2.get_data_pool_name()}" mds allow')
self.mount_b.remount(cephfs_name=self.fs2.name)
class TestMONCaps(TestMultiFS):
def test_moncap_with_one_fs_names(self):
moncap = f'allow r fsname={self.fs1.name}'
self.create_client(self.client_id, moncap)
self.captester.run_mon_cap_tests(self.fs1, self.client_id)
def test_moncap_with_multiple_fs_names(self):
moncap = (f'allow r fsname={self.fs1.name}, '
f'allow r fsname={self.fs2.name}')
self.create_client(self.client_id, moncap)
self.captester.run_mon_cap_tests(self.fs1, self.client_id)
def test_moncap_with_blanket_allow(self):
moncap = 'allow r'
self.create_client(self.client_id, moncap)
self.captester.run_mon_cap_tests(self.fs1, self.client_id)
#TODO: add tests for capsecs 'p' and 's'.
class TestMDSCaps(TestMultiFS):
"""
0. Have 2 FSs on Ceph cluster.
1. Create new files on both FSs.
2. Create a new client that has authorization for both FSs.
3. Remount the current mounts with this new client.
4. Test read and write on both FSs.
"""
def setUp(self):
super(self.__class__, self).setUp()
self.mounts = (self.mount_a, self.mount_b)
def test_rw_with_fsname_and_no_path_in_cap(self):
PERM = 'rw'
self.captester.write_test_files(self.mounts)
keyring_paths = self._create_client(PERM, fsname=True)
self.remount_with_new_client(keyring_paths)
self.captester.run_mds_cap_tests(PERM)
def test_r_with_fsname_and_no_path_in_cap(self):
PERM = 'r'
self.captester.write_test_files(self.mounts)
keyring_paths = self._create_client(PERM, fsname=True)
self.remount_with_new_client(keyring_paths)
self.captester.run_mds_cap_tests(PERM)
def test_rw_with_fsname_and_path_in_cap(self):
PERM, CEPHFS_MNTPT = 'rw', 'dir1'
self.mount_a.run_shell(f'mkdir {CEPHFS_MNTPT}')
self.mount_b.run_shell(f'mkdir {CEPHFS_MNTPT}')
self.captester.write_test_files(self.mounts, CEPHFS_MNTPT)
keyring_paths = self._create_client(PERM, fsname=True)
self.remount_with_new_client(keyring_paths, CEPHFS_MNTPT)
self.captester.run_mds_cap_tests(PERM, CEPHFS_MNTPT)
def test_r_with_fsname_and_path_in_cap(self):
PERM, CEPHFS_MNTPT = 'r', 'dir1'
self.mount_a.run_shell(f'mkdir {CEPHFS_MNTPT}')
self.mount_b.run_shell(f'mkdir {CEPHFS_MNTPT}')
self.captester.write_test_files(self.mounts, CEPHFS_MNTPT)
keyring_paths = self._create_client(PERM, fsname=True)
self.remount_with_new_client(keyring_paths, CEPHFS_MNTPT)
self.captester.run_mds_cap_tests(PERM, CEPHFS_MNTPT)
# XXX: this tests the backward compatibility; "allow rw path=<dir1>" is
# treated as "allow rw fsname=* path=<dir1>"
def test_rw_with_no_fsname_and_path_in_cap(self):
PERM, CEPHFS_MNTPT = 'rw', 'dir1'
self.mount_a.run_shell(f'mkdir {CEPHFS_MNTPT}')
self.mount_b.run_shell(f'mkdir {CEPHFS_MNTPT}')
self.captester.write_test_files(self.mounts, CEPHFS_MNTPT)
keyring_paths = self._create_client(PERM)
self.remount_with_new_client(keyring_paths, CEPHFS_MNTPT)
self.captester.run_mds_cap_tests(PERM, CEPHFS_MNTPT)
# XXX: this tests the backward compatibility; "allow r path=<dir1>" is
# treated as "allow r fsname=* path=<dir1>"
def test_r_with_no_fsname_and_path_in_cap(self):
PERM, CEPHFS_MNTPT = 'r', 'dir1'
self.mount_a.run_shell(f'mkdir {CEPHFS_MNTPT}')
self.mount_b.run_shell(f'mkdir {CEPHFS_MNTPT}')
self.captester.write_test_files(self.mounts, CEPHFS_MNTPT)
keyring_paths = self._create_client(PERM)
self.remount_with_new_client(keyring_paths, CEPHFS_MNTPT)
self.captester.run_mds_cap_tests(PERM, CEPHFS_MNTPT)
def test_rw_with_no_fsname_and_no_path(self):
PERM = 'rw'
self.captester.write_test_files(self.mounts)
keyring_paths = self._create_client(PERM)
self.remount_with_new_client(keyring_paths)
self.captester.run_mds_cap_tests(PERM)
def test_r_with_no_fsname_and_no_path(self):
PERM = 'r'
self.captester.write_test_files(self.mounts)
keyring_paths = self._create_client(PERM)
self.remount_with_new_client(keyring_paths)
self.captester.run_mds_cap_tests(PERM)
def tearDown(self):
self.mount_a.umount_wait()
self.mount_b.umount_wait()
super(type(self), self).tearDown()
def generate_caps(self, perm, fsname, cephfs_mntpt):
moncap = 'allow r'
osdcap = (f'allow {perm} tag cephfs data={self.fs1.name}, '
f'allow {perm} tag cephfs data={self.fs2.name}')
if fsname:
if cephfs_mntpt == '/':
mdscap = (f'allow {perm} fsname={self.fs1.name}, '
f'allow {perm} fsname={self.fs2.name}')
else:
mdscap = (f'allow {perm} fsname={self.fs1.name} '
f'path=/{cephfs_mntpt}, '
f'allow {perm} fsname={self.fs2.name} '
f'path=/{cephfs_mntpt}')
else:
if cephfs_mntpt == '/':
mdscap = f'allow {perm}'
else:
mdscap = f'allow {perm} path=/{cephfs_mntpt}'
return moncap, osdcap, mdscap
def _create_client(self, perm, fsname=False, cephfs_mntpt='/'):
moncap, osdcap, mdscap = self.generate_caps(perm, fsname,
cephfs_mntpt)
keyring = self.create_client(self.client_id, moncap, osdcap, mdscap)
keyring_paths = []
for mount_x in self.mounts:
keyring_paths.append(mount_x.client_remote.mktemp(data=keyring))
return keyring_paths
def remount_with_new_client(self, keyring_paths, cephfs_mntpt='/'):
if isinstance(cephfs_mntpt, str) and cephfs_mntpt != '/' :
cephfs_mntpt = '/' + cephfs_mntpt
self.mount_a.remount(client_id=self.client_id,
client_keyring_path=keyring_paths[0],
client_remote=self.mount_a.client_remote,
cephfs_name=self.fs1.name,
cephfs_mntpt=cephfs_mntpt,
hostfs_mntpt=self.mount_a.hostfs_mntpt,
wait=True)
self.mount_b.remount(client_id=self.client_id,
client_keyring_path=keyring_paths[1],
client_remote=self.mount_b.client_remote,
cephfs_name=self.fs2.name,
cephfs_mntpt=cephfs_mntpt,
hostfs_mntpt=self.mount_b.hostfs_mntpt,
wait=True)
class TestClientsWithoutAuth(TestMultiFS):
def setUp(self):
super(TestClientsWithoutAuth, self).setUp()
# TODO: When MON and OSD caps for a Ceph FS are assigned to a
# client but MDS caps are not, mount.ceph prints "permission
# denied". But when MON caps are not assigned and MDS and OSD
# caps are, mount.ceph prints "no mds server or cluster laggy"
# instead of "permission denied".
#
# Before uncommenting the following line a fix would be required
# for latter case to change "no mds server is up or the cluster is
# laggy" to "permission denied".
self.kernel_errmsgs = ('permission denied', 'no mds server is up or '
'the cluster is laggy', 'no such file or '
'directory',
'input/output error')
# TODO: When MON and OSD caps are assigned for a Ceph FS to a
# client but MDS caps are not, ceph-fuse prints "operation not
# permitted". But when MON caps are not assigned and MDS and OSD
# caps are, ceph-fuse prints "no such file or directory" instead
# of "operation not permitted".
#
# Before uncommenting the following line a fix would be required
# for the latter case to change "no such file or directory" to
# "operation not permitted".
#self.assertIn('operation not permitted', retval[2].lower())
self.fuse_errmsgs = ('operation not permitted', 'no such file or '
'directory')
if 'kernel' in str(type(self.mount_a)).lower():
self.errmsgs = self.kernel_errmsgs
elif 'fuse' in str(type(self.mount_a)).lower():
self.errmsgs = self.fuse_errmsgs
else:
raise RuntimeError('strange, the client was neither based on '
'kernel nor FUSE.')
def check_that_mount_failed_for_right_reason(self, stderr):
stderr = stderr.lower()
for errmsg in self.errmsgs:
if errmsg in stderr:
break
else:
raise AssertionError('can\'t find expected set of words in the '
f'stderr\nself.errmsgs - {self.errmsgs}\n'
f'stderr - {stderr}')
def test_mount_all_caps_absent(self):
# setup part...
keyring = self.fs1.authorize(self.client_id, ('/', 'rw'))
keyring_path = self.mount_a.client_remote.mktemp(data=keyring)
# mount the FS for which client has no auth...
retval = self.mount_a.remount(client_id=self.client_id,
client_keyring_path=keyring_path,
cephfs_name=self.fs2.name,
check_status=False)
# tests...
self.assertIsInstance(retval, tuple)
self.assertEqual(len(retval), 3)
self.assertIsInstance(retval[0], CommandFailedError)
self.check_that_mount_failed_for_right_reason(retval[2])
def test_mount_mon_and_osd_caps_present_mds_caps_absent(self):
# setup part...
moncap = f'allow rw fsname={self.fs1.name}, allow rw fsname={self.fs2.name}'
mdscap = f'allow rw fsname={self.fs1.name}'
osdcap = (f'allow rw tag cephfs data={self.fs1.name}, allow rw tag '
f'cephfs data={self.fs2.name}')
keyring = self.create_client(self.client_id, moncap, osdcap, mdscap)
keyring_path = self.mount_a.client_remote.mktemp(data=keyring)
# mount the FS for which client has no auth...
retval = self.mount_a.remount(client_id=self.client_id,
client_keyring_path=keyring_path,
cephfs_name=self.fs2.name,
check_status=False)
# tests...
self.assertIsInstance(retval, tuple)
self.assertEqual(len(retval), 3)
self.assertIsInstance(retval[0], CommandFailedError)
self.check_that_mount_failed_for_right_reason(retval[2])