summaryrefslogtreecommitdiffstats
path: root/tests/functional/afr/test_client_side_quorum.py
diff options
context:
space:
mode:
authorVijay Avuthu <vavuthu@redhat.com>2018-01-24 12:09:42 +0530
committerNigel Babu <nigelb@redhat.com>2018-02-01 16:13:03 +0000
commit50a5048ef2054e054cb59c1cccb1198dedcf677d (patch)
treef2f416d309d6b75cd43737704f82221b65480ae7 /tests/functional/afr/test_client_side_quorum.py
parent422fb33ba827710ea9b567ee01cb68b7fecf0999 (diff)
Adding Client Side Quorum Test Case
Change-Id: I73512dde33207295fa954a3b3949f653f03f23c0 Signed-off-by: Vijay Avuthu <vavuthu@redhat.com>
Diffstat (limited to 'tests/functional/afr/test_client_side_quorum.py')
-rw-r--r--tests/functional/afr/test_client_side_quorum.py294
1 files changed, 294 insertions, 0 deletions
diff --git a/tests/functional/afr/test_client_side_quorum.py b/tests/functional/afr/test_client_side_quorum.py
new file mode 100644
index 000000000..6ef4f2c84
--- /dev/null
+++ b/tests/functional/afr/test_client_side_quorum.py
@@ -0,0 +1,294 @@
+# Copyright (C) 2016-2017 Red Hat, Inc. <http://www.redhat.com>
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License as published by
+# the Free Software Foundation; either version 2 of the License, or
+# any later version.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License along
+# with this program; if not, write to the Free Software Foundation, Inc.,
+# 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
+
+""" Description:
+ Test Cases in this module tests the client side quorum.
+"""
+
+
+from glusto.core import Glusto as g
+from glustolibs.gluster.exceptions import ExecutionError
+from glustolibs.gluster.gluster_base_class import GlusterBaseClass, runs_on
+from glustolibs.gluster.volume_libs import (
+ set_volume_options, get_subvols)
+from glustolibs.misc.misc_libs import upload_scripts
+from glustolibs.gluster.brick_libs import bring_bricks_offline
+from glustolibs.io.utils import (validate_io_procs,
+ is_io_procs_fail_with_rofs)
+
+
+@runs_on([['replicated', 'distributed-replicated'],
+ ['glusterfs', 'nfs', 'cifs']])
+class ClientSideQuorumTests(GlusterBaseClass):
+ """
+ ClientSideQuorumTests contains tests which verifies the
+ client side quorum Test Cases
+ """
+ @classmethod
+ def setUpClass(cls):
+ """
+ Upload the necessary scripts to run tests.
+ """
+
+ # calling GlusterBaseClass setUpClass
+ GlusterBaseClass.setUpClass.im_func(cls)
+
+ # Upload io scripts for running IO on mounts
+ g.log.info("Upload io scripts to clients %s for running IO on "
+ "mounts", cls.clients)
+ script_abs_path = "/usr/share/glustolibs/io/scripts/file_dir_ops.py"
+ cls.script_upload_path = "/usr/share/glustolibs/io/scripts/" \
+ "file_dir_ops.py"
+ ret = upload_scripts(cls.clients, script_abs_path)
+ if not ret:
+ raise ExecutionError("Failed to upload IO scripts to clients")
+
+ def setUp(self):
+ """
+ setUp method for every test
+ """
+
+ # calling GlusterBaseClass setUp
+ GlusterBaseClass.setUp.im_func(self)
+
+ # Setup Volume and Mount Volume
+ g.log.info("Starting to Setup Volume %s" % self.volname)
+ ret = self.setup_volume_and_mount_volume(self.mounts)
+ if not ret:
+ raise ExecutionError("Failed to Setup_Volume and Mount_Volume")
+ g.log.info("Successful in Setup Volume and Mount Volume")
+
+ def tearDown(self):
+ """
+ tearDown for every test
+ """
+
+ # stopping the volume
+ g.log.info("Starting to Unmount Volume and Cleanup Volume")
+ ret = self.unmount_volume_and_cleanup_volume(mounts=self.mounts)
+ if not ret:
+ raise ExecutionError("Failed to Unmount Volume and Cleanup Volume")
+ g.log.info("Successful in Unmount Volume and Cleanup Volume")
+
+ # Calling GlusterBaseClass tearDown
+ GlusterBaseClass.tearDown.im_func(self)
+
+ def test_client_side_quorum_with_auto_option(self):
+ """
+ Test Script to verify the Client Side Quorum with auto option
+
+ * set cluster.quorum-type to auto.
+ * start I/O from the mount point.
+ * kill 2 of the brick process from the each and every replica set
+ * perform ops
+
+ """
+ # set cluster.quorum-type to auto
+ options = {"cluster.quorum-type": "auto"}
+ g.log.info("setting cluster.quorum-type to auto on "
+ "volume %s" % self.volname)
+ ret = set_volume_options(self.mnode, self.volname, options)
+ self.assertTrue(ret, ("Unable to set volume option %s for"
+ "volume %s" % (options, self.volname)))
+ g.log.info("Sucessfully set %s for volume %s"
+ % (options, self.volname))
+
+ # write files on all mounts
+ g.log.info("Starting IO on all mounts...")
+ g.log.info("mounts: %s" % self.mounts)
+ all_mounts_procs = []
+ for mount_obj in self.mounts:
+ cmd = ("python %s create_files "
+ "-f 10 --base-file-name file %s" % (self.script_upload_path,
+ mount_obj.mountpoint))
+ proc = g.run_async(mount_obj.client_system, cmd,
+ user=mount_obj.user)
+ all_mounts_procs.append(proc)
+
+ # Validate IO
+ g.log.info("Validating IO on mounts")
+ ret = validate_io_procs(all_mounts_procs, self.mounts)
+ self.assertTrue(ret, "IO failed on some of the clients")
+ g.log.info("IO is successful on all mounts")
+
+ # get the subvolumes
+ g.log.info("Starting to get sub-volumes for volume %s" % self.volname)
+ subvols_dict = get_subvols(self.mnode, self.volname)
+ num_subvols = len(subvols_dict['volume_subvols'])
+ g.log.info("Number of subvolumes in volume %s:" % num_subvols)
+
+ # bring bricks offline( 2 bricks ) for all the subvolumes
+ for i in range(0, num_subvols):
+ subvol_brick_list = subvols_dict['volume_subvols'][i]
+ g.log.info("sub-volume %s brick list : %s"
+ % (i, subvol_brick_list))
+ # For volume type: 1 * 2, bring 1 brick offline
+ if len(subvol_brick_list) == 2:
+ bricks_to_bring_offline = subvol_brick_list[0:1]
+ else:
+ bricks_to_bring_offline = subvol_brick_list[0:2]
+ g.log.info("Going to bring down the brick process "
+ "for %s" % bricks_to_bring_offline)
+ ret = bring_bricks_offline(self.volname, bricks_to_bring_offline)
+ self.assertTrue(ret, ("Failed to bring down the bricks. Please "
+ "check the log file for more details."))
+ g.log.info("Brought down the brick process "
+ "for %s succesfully" % bricks_to_bring_offline)
+
+ # create 2 files named newfile0.txt and newfile1.txt
+ g.log.info("Start creating 2 files on all mounts...")
+ all_mounts_procs = []
+ for mount_obj in self.mounts:
+ cmd = ("python %s create_files "
+ "-f 2 --base-file-name newfile %s" %
+ (self.script_upload_path, mount_obj.mountpoint))
+ proc = g.run_async(mount_obj.client_system, cmd,
+ user=mount_obj.user)
+ all_mounts_procs.append(proc)
+
+ # Validate IO
+ g.log.info("Validating whether IO failed with read-only filesystem")
+ ret = is_io_procs_fail_with_rofs(self, all_mounts_procs, self.mounts)
+ self.assertTrue(ret, ("Unexpected error and IO successfull"
+ " on read-only filesystem"))
+ g.log.info("EXPECTED: Read-only file system in IO while creating file")
+
+ # create directory user1
+ g.log.info("Start creating directory on all mounts...")
+ all_mounts_procs = []
+ for mount_obj in self.mounts:
+ cmd = ("python %s create_deep_dir "
+ "%s" % (self.script_upload_path, mount_obj.mountpoint))
+ proc = g.run_async(mount_obj.client_system, cmd,
+ user=mount_obj.user)
+ all_mounts_procs.append(proc)
+
+ # Validate IO
+ g.log.info("Validating whether IO failed with read-only filesystem")
+ ret = is_io_procs_fail_with_rofs(self, all_mounts_procs, self.mounts)
+ self.assertTrue(ret, ("Unexpected error and IO successfull"
+ " on read-only filesystem"))
+ g.log.info("EXPECTED: Read-only file system in IO while"
+ " creating directory")
+
+ # create h/w link to file
+ g.log.info("Start creating hard link for file0.txt on all mounts")
+ for mount_obj in self.mounts:
+ cmd = "ln %s/file0.txt %s/file0.txt_hwlink" \
+ % (mount_obj.mountpoint, mount_obj.mountpoint)
+ ret, out, err = g.run(mount_obj.client_system, cmd)
+ self.assertTrue(ret, ("Unexpected error and creating hard link"
+ " successful on read-only filesystem"))
+ self.assertIn("Read-only file system",
+ err, "Read-only filesystem not found in "
+ "IO while truncating file")
+ g.log.info("EXPECTED: Read-only file system in IO")
+
+ # create s/w link
+ g.log.info("Start creating soft link for file1.txt on all mounts")
+ for mount_obj in self.mounts:
+ cmd = "ln -s %s/file1.txt %s/file1.txt_swlink" %\
+ (mount_obj.mountpoint, mount_obj.mountpoint)
+ ret, out, err = g.run(mount_obj.client_system, cmd)
+ self.assertTrue(ret, ("Unexpected error and creating soft link"
+ " successful on read-only filesystem"))
+ self.assertIn("Read-only file system",
+ err, "Read-only filesystem not found in "
+ "IO while truncating file")
+ g.log.info("EXPECTED: Read-only file system in IO")
+
+ # append to file
+ g.log.info("Appending to file1.txt on all mounts")
+ for mount_obj in self.mounts:
+ cmd = "cat %s/file0.txt >> %s/file1.txt" %\
+ (mount_obj.mountpoint, mount_obj.mountpoint)
+ ret, out, err = g.run(mount_obj.client_system, cmd)
+ self.assertTrue(ret, ("Unexpected error and append successful"
+ " on read-only filesystem"))
+ self.assertIn("Read-only file system",
+ err, "Read-only filesystem not found in "
+ "IO while truncating file")
+ g.log.info("EXPECTED: Read-only file system in IO")
+
+ # modify the file
+ g.log.info("Modifying file1.txt on all mounts")
+ for mount_obj in self.mounts:
+ cmd = "echo 'Modify Contents' > %s/file1.txt"\
+ % (mount_obj.mountpoint)
+ ret, out, err = g.run(mount_obj.client_system, cmd)
+ self.assertTrue(ret, ("Unexpected error and modifying successful"
+ " on read-only filesystem"))
+ self.assertIn("Read-only file system",
+ err, "Read-only filesystem not found in "
+ "IO while truncating file")
+ g.log.info("EXPECTED: Read-only file system in IO")
+
+ # truncate the file
+ g.log.info("Truncating file1.txt on all mounts")
+ for mount_obj in self.mounts:
+ cmd = "truncate -s 0 %s/file1.txt" % (mount_obj.mountpoint)
+ ret, out, err = g.run(mount_obj.client_system, cmd)
+ self.assertTrue(ret, ("Unexpected error and truncating file"
+ " successful on read-only filesystem"))
+ self.assertIn("Read-only file system",
+ err, "Read-only filesystem not found in "
+ "IO while truncating file")
+ g.log.info("EXPECTED: Read-only file system in IO")
+
+ # read the file
+ g.log.info("Starting reading files on all mounts")
+ all_mounts_procs = []
+ for mount_obj in self.mounts:
+ cmd = ("python %s read "
+ "%s" % (self.script_upload_path, mount_obj.mountpoint))
+ proc = g.run_async(mount_obj.client_system, cmd,
+ user=mount_obj.user)
+ all_mounts_procs.append(proc)
+
+ # Validate IO
+ g.log.info("validating IO on all mounts")
+ ret = validate_io_procs(all_mounts_procs, self.mounts)
+ self.assertTrue(ret, "Reads failed on some of the clients")
+ g.log.info("Reads successful on all mounts")
+
+ # stat on file
+ g.log.info("stat on file1.txt on all mounts")
+ for mount_obj in self.mounts:
+ cmd = "stat %s/file1.txt" % (mount_obj.mountpoint)
+ ret, out, err = g.run(mount_obj.client_system, cmd)
+ self.assertFalse(ret, ("Unexpected error and stat on file fails"
+ " on read-only filesystem"))
+ g.log.info("stat on file is successfull on read-only filesystem")
+
+ # stat on dir
+ g.log.info("stat on directory on all mounts")
+ for mount_obj in self.mounts:
+ cmd = ("python %s stat %s"
+ % (self.script_upload_path, mount_obj.mountpoint))
+ ret, out, err = g.run(mount_obj.client_system, cmd)
+ self.assertFalse(ret, ("Unexpected error and stat on directory"
+ " fails on read-only filesystem"))
+ g.log.info("stat on dir is successfull on read-only filesystem")
+
+ # ls on mount point
+ g.log.info("ls on mount point on all mounts")
+ for mount_obj in self.mounts:
+ cmd = ("python %s ls %s"
+ % (self.script_upload_path, mount_obj.mountpoint))
+ ret, out, err = g.run(mount_obj.client_system, cmd)
+ self.assertFalse(ret, ("Unexpected error and listing file fails"
+ " on read-only filesystem"))
+ g.log.info("listing files is successfull on read-only filesystem")