mirror of
https://github.com/ceph/ceph
synced 2024-12-24 12:24:19 +00:00
f04e29557e
this is not a nose suite, so I simply added test case descriptions in csv format, and put a file to extract them at the top of the file. Signed-off-by: Mark Kampe <mark.kampe@dreamhost.com>
312 lines
11 KiB
Python
312 lines
11 KiB
Python
# The test cases in this file have been annotated for inventory.
|
|
# To extract the inventory (in csv format) use the command:
|
|
#
|
|
# grep '^ *# TESTCASE' | sed 's/^ *# TESTCASE //'
|
|
#
|
|
|
|
from cStringIO import StringIO
|
|
import logging
|
|
import json
|
|
|
|
import boto.exception
|
|
import boto.s3.connection
|
|
import boto.s3.acl
|
|
|
|
from teuthology import misc as teuthology
|
|
|
|
log = logging.getLogger(__name__)
|
|
|
|
def rgwadmin(ctx, client, cmd):
|
|
log.info('radosgw-admin: %s' % cmd)
|
|
pre = [
|
|
'LD_LIBRARY_PATH=/tmp/cephtest/binary/usr/local/lib',
|
|
'/tmp/cephtest/enable-coredump',
|
|
'/tmp/cephtest/binary/usr/local/bin/ceph-coverage',
|
|
'/tmp/cephtest/archive/coverage',
|
|
'/tmp/cephtest/binary/usr/local/bin/radosgw-admin',
|
|
'-c', '/tmp/cephtest/ceph.conf',
|
|
'--log-to-stderr',
|
|
'--format', 'json',
|
|
]
|
|
pre.extend(cmd)
|
|
(remote,) = ctx.cluster.only(client).remotes.iterkeys()
|
|
proc = remote.run(
|
|
args=pre,
|
|
check_status=False,
|
|
stdout=StringIO(),
|
|
stderr=StringIO(),
|
|
)
|
|
r = proc.exitstatus
|
|
out = proc.stdout.getvalue()
|
|
j = None
|
|
if not r and out != '':
|
|
j = json.loads(out)
|
|
log.info(' json result: %s' % j)
|
|
return (r, j)
|
|
|
|
def task(ctx, config):
|
|
"""
|
|
Test radosgw-admin functionality against a running rgw instance.
|
|
"""
|
|
assert config is None or isinstance(config, list) \
|
|
or isinstance(config, dict), \
|
|
"task s3tests only supports a list or dictionary for configuration"
|
|
all_clients = ['client.{id}'.format(id=id_)
|
|
for id_ in teuthology.all_roles_of_type(ctx.cluster, 'client')]
|
|
if config is None:
|
|
config = all_clients
|
|
if isinstance(config, list):
|
|
config = dict.fromkeys(config)
|
|
clients = config.keys()
|
|
|
|
# just use the first client...
|
|
client = clients[0];
|
|
|
|
##
|
|
user='foo'
|
|
subuser1='foo:foo1'
|
|
subuser2='foo:foo2'
|
|
display_name='Foo'
|
|
email='foo@foo.com'
|
|
access_key='9te6NH5mcdcq0Tc5i8i1'
|
|
secret_key='Ny4IOauQoL18Gp2zM7lC1vLmoawgqcYP/YGcWfXu'
|
|
access_key2='p5YnriCv1nAtykxBrupQ'
|
|
secret_key2='Q8Tk6Q/27hfbFSYdSkPtUqhqx1GgzvpXa4WARozh'
|
|
swift_secret1='gpS2G9RREMrnbqlp29PP2D36kgPR1tm72n5fPYfL'
|
|
swift_secret2='ri2VJQcKSYATOY6uaDUX7pxgkW+W1YmC6OCxPHwy'
|
|
|
|
bucket_name='myfoo'
|
|
|
|
# legend (test cases can be easily grep-ed out)
|
|
# TESTCASE 'testname','object','method','operation','assertion'
|
|
# TESTCASE 'info-nosuch','user','info','non-existent user','fails'
|
|
(err, out) = rgwadmin(ctx, client, ['user', 'info', '--uid', user])
|
|
assert err
|
|
|
|
# TESTCASE 'create-ok','user','create','w/all valid info','succeeds'
|
|
(err, out) = rgwadmin(ctx, client, [
|
|
'user', 'create',
|
|
'--uid', user,
|
|
'--display-name', display_name,
|
|
'--email', email,
|
|
'--access-key', access_key,
|
|
'--secret', secret_key
|
|
])
|
|
assert not err
|
|
|
|
# TESTCASE 'info-existing','user','info','existing user','returns correct info'
|
|
(err, out) = rgwadmin(ctx, client, ['user', 'info', '--uid', user])
|
|
assert not err
|
|
assert out['user_id'] == user
|
|
assert out['email'] == email
|
|
assert out['display_name'] == display_name
|
|
assert len(out['keys']) == 1
|
|
assert out['keys'][0]['access_key'] == access_key
|
|
assert out['keys'][0]['secret_key'] == secret_key
|
|
assert not out['suspended']
|
|
|
|
# TESTCASE 'suspend-ok','user','suspend','active user','succeeds'
|
|
(err, out) = rgwadmin(ctx, client, ['user', 'suspend', '--uid', user])
|
|
assert not err
|
|
|
|
# TESTCASE 'suspend-suspended','user','suspend','suspended user','succeeds w/advisory'
|
|
(err, out) = rgwadmin(ctx, client, ['user', 'info', '--uid', user])
|
|
assert not err
|
|
assert out['suspended']
|
|
|
|
# TESTCASE 're-enable','user','enable','suspended user','succeeds'
|
|
(err, out) = rgwadmin(ctx, client, ['user', 'enable', '--uid', user])
|
|
assert not err
|
|
|
|
# TESTCASE 'info-re-enabled','user','info','re-enabled user','no longer suspended'
|
|
(err, out) = rgwadmin(ctx, client, ['user', 'info', '--uid', user])
|
|
assert not err
|
|
assert not out['suspended']
|
|
|
|
# TESTCASE 'add-keys','key','create','w/valid info','succeeds'
|
|
(err, out) = rgwadmin(ctx, client, [
|
|
'key', 'create', '--uid', user,
|
|
'--access-key', access_key2, '--secret', secret_key2,
|
|
])
|
|
assert not err
|
|
|
|
# TESTCASE 'info-new-key','user','info','after key addition','returns all keys'
|
|
(err, out) = rgwadmin(ctx, client, ['user', 'info', '--uid', user])
|
|
assert not err
|
|
assert len(out['keys']) == 2
|
|
assert out['keys'][0]['access_key'] == access_key2 or out['keys'][1]['access_key'] == access_key2
|
|
assert out['keys'][0]['secret_key'] == secret_key2 or out['keys'][1]['secret_key'] == secret_key2
|
|
|
|
# TESTCASE 'rm-key','key','rm','newly added key','succeeds, key is removed'
|
|
(err, out) = rgwadmin(ctx, client, [
|
|
'key', 'rm', '--uid', user,
|
|
'--access-key', access_key2,
|
|
])
|
|
assert not err
|
|
assert len(out['keys']) == 1
|
|
assert out['keys'][0]['access_key'] == access_key
|
|
assert out['keys'][0]['secret_key'] == secret_key
|
|
|
|
# TESTCASE 'add-swift-key','key','create','swift key','succeeds'
|
|
(err, out) = rgwadmin(ctx, client, [
|
|
'key', 'create', '--subuser', subuser1,
|
|
'--secret', swift_secret1,
|
|
'--key-type', 'swift',
|
|
])
|
|
assert not err
|
|
|
|
# TESTCASE 'info-swift-key','user','info','after key addition','returns all keys'
|
|
(err, out) = rgwadmin(ctx, client, ['user', 'info', '--uid', user])
|
|
assert not err
|
|
assert len(out['swift_keys']) == 1
|
|
assert out['swift_keys'][0]['user'] == subuser1
|
|
assert out['swift_keys'][0]['secret_key'] == swift_secret1
|
|
|
|
# TESTCASE 'add-swift-subuser','key','create','swift sub-user key','succeeds'
|
|
(err, out) = rgwadmin(ctx, client, [
|
|
'key', 'create', '--subuser', subuser2,
|
|
'--secret', swift_secret2,
|
|
'--key-type', 'swift',
|
|
])
|
|
assert not err
|
|
|
|
# TESTCASE 'info-swift-subuser','user','info','after key addition','returns all sub-users/keys'
|
|
(err, out) = rgwadmin(ctx, client, ['user', 'info', '--uid', user])
|
|
assert not err
|
|
assert len(out['swift_keys']) == 2
|
|
assert out['swift_keys'][0]['user'] == subuser2 or out['swift_keys'][1]['user'] == subuser2
|
|
assert out['swift_keys'][0]['secret_key'] == swift_secret2 or out['swift_keys'][1]['secret_key'] == swift_secret2
|
|
|
|
# TESTCASE 'rm-swift-key1','key','rm','subuser','succeeds, one key is removed'
|
|
(err, out) = rgwadmin(ctx, client, [
|
|
'key', 'rm', '--subuser', subuser1,
|
|
'--key-type', 'swift',
|
|
])
|
|
assert not err
|
|
assert len(out['swift_keys']) == 1
|
|
|
|
# TESTCASE 'rm-swift-key2','key','rm','subuser','succeeds, second key is removed'
|
|
(err, out) = rgwadmin(ctx, client, [
|
|
'key', 'rm', '--subuser', subuser2,
|
|
'--key-type', 'swift',
|
|
])
|
|
assert not err
|
|
assert len(out['swift_keys']) == 0
|
|
|
|
# TESTCASE 'bucket-stats','bucket','stats','no session/buckets','succeeds, empty list'
|
|
(err, out) = rgwadmin(ctx, client, ['bucket', 'stats', '--uid', user])
|
|
assert not err
|
|
assert len(out) == 0
|
|
|
|
# connect to rgw
|
|
(remote,) = ctx.cluster.only(client).remotes.iterkeys()
|
|
(remote_user, remote_host) = remote.name.split('@')
|
|
connection = boto.s3.connection.S3Connection(
|
|
aws_access_key_id=access_key,
|
|
aws_secret_access_key=secret_key,
|
|
is_secure=False,
|
|
port=7280,
|
|
host=remote_host,
|
|
calling_format=boto.s3.connection.OrdinaryCallingFormat(),
|
|
)
|
|
|
|
# TESTCASE 'bucket-stats2','bucket','stats','no buckets','succeeds, empty list'
|
|
(err, out) = rgwadmin(ctx, client, ['bucket', 'list', '--uid', user])
|
|
assert not err
|
|
assert len(out) == 0
|
|
|
|
# creat a first bucket
|
|
bucket = connection.create_bucket(bucket_name)
|
|
|
|
# TESTCASE 'bucket-list','bucket','list','one bucket','succeeds, expected list'
|
|
(err, out) = rgwadmin(ctx, client, ['bucket', 'list', '--uid', user])
|
|
assert not err
|
|
assert len(out) == 1
|
|
assert out[0] == bucket_name
|
|
|
|
# TESTCASE 'bucket-stats3','bucket','stats','new empty bucket','succeeds, empty list'
|
|
(err, out) = rgwadmin(ctx, client, [
|
|
'bucket', 'stats', '--bucket', bucket_name])
|
|
assert not err
|
|
assert out['owner'] == user
|
|
bucket_id = out['id']
|
|
|
|
# TESTCASE 'bucket-stats4','bucket','stats','new empty bucket','succeeds, expected bucket ID'
|
|
(err, out) = rgwadmin(ctx, client, ['bucket', 'stats', '--uid', user])
|
|
assert not err
|
|
assert len(out) == 1
|
|
assert out[0]['id'] == bucket_id # does it return the same ID twice in a row?
|
|
|
|
# use some space
|
|
key = boto.s3.key.Key(bucket)
|
|
key.set_contents_from_string('one')
|
|
|
|
# TESTCASE 'bucket-stats5','bucket','stats','after creating key','succeeds, lists one non-empty object'
|
|
(err, out) = rgwadmin(ctx, client, [
|
|
'bucket', 'stats', '--bucket-id', '%d' % bucket_id])
|
|
assert not err
|
|
assert out['id'] == bucket_id
|
|
assert out['usage']['rgw.main']['num_objects'] == 1
|
|
assert out['usage']['rgw.main']['size_kb'] > 0
|
|
|
|
# reclaim it
|
|
key.delete()
|
|
|
|
# TESTCASE 'bucket-stats6','bucket','stats','after deleting key','succeeds, lists one no objects'
|
|
(err, out) = rgwadmin(ctx, client, [
|
|
'bucket', 'stats', '--bucket-id', '%d' % bucket_id])
|
|
assert not err
|
|
assert out['id'] == bucket_id
|
|
assert out['usage']['rgw.main']['num_objects'] == 0
|
|
|
|
# list log objects
|
|
# TESTCASE 'log-list','log','list','after activity','succeeds, lists one no objects'
|
|
(err, out) = rgwadmin(ctx, client, ['log', 'list'])
|
|
assert not err
|
|
assert len(out) > 0
|
|
|
|
for obj in out:
|
|
# TESTCASE 'log-show','log','show','after activity','returns expected info'
|
|
(err, log) = rgwadmin(ctx, client, ['log', 'show', '--object', obj])
|
|
assert not err
|
|
assert len(log) > 0
|
|
assert log['bucket'] == bucket_name
|
|
assert log['bucket_id'] == bucket_id
|
|
assert log['bucket_owner'] == user
|
|
for entry in log['log_entries']:
|
|
assert entry['bucket'] == bucket_name
|
|
assert entry['user'] == user
|
|
|
|
# TESTCASE 'log-rm','log','rm','delete log objects','succeeds'
|
|
(err, out) = rgwadmin(ctx, client, ['log', 'rm', '--object', obj])
|
|
assert not err
|
|
|
|
# TODO: show log by bucket+date
|
|
|
|
# TESTCASE 'user-suspend2','user','suspend','existing user','succeeds'
|
|
(err, out) = rgwadmin(ctx, client, ['user', 'suspend', '--uid', user])
|
|
assert not err
|
|
|
|
# TESTCASE 'user-suspend3','user','suspend','suspended user','cannot write objects'
|
|
try:
|
|
key = boto.s3.key.Key(bucket)
|
|
key.set_contents_from_string('two')
|
|
except boto.exception.S3ResponseError as e:
|
|
assert e.status == 403
|
|
|
|
# TESTCASE 'user-renable2','user','enable','suspended user','succeeds'
|
|
(err, out) = rgwadmin(ctx, client, ['user', 'enable', '--uid', user])
|
|
assert not err
|
|
|
|
# TESTCASE 'user-renable3','user','enable','reenabled user','can write objects'
|
|
key = boto.s3.key.Key(bucket)
|
|
key.set_contents_from_string('three')
|
|
|
|
# TESTCASE 'rm-user','user','rm','existing user','succeeds'
|
|
(err, out) = rgwadmin(ctx, client, ['user', 'rm', '--uid', user])
|
|
assert not err
|
|
|
|
# TESTCASE 'rm-user2','user','rm','deleted user','fails'
|
|
(err, out) = rgwadmin(ctx, client, ['user', 'info', '--uid', user])
|
|
assert err
|