summaryrefslogtreecommitdiffstats
path: root/tests/functional
diff options
context:
space:
mode:
authorJilju Joy <jijoy@localhost.localdomain>2018-06-07 13:43:04 +0530
committerJonathan Holloway <jholloway@redhat.com>2018-06-19 02:50:43 +0000
commit69fdcaccd9bea5b827f1a51c4d68edc0f7d12d86 (patch)
tree085aac4a14a4be210d5ab19169d9b4b6e797c122 /tests/functional
parent16fac017ad8e4450783783b24cd5fb6ba7297978 (diff)
Test to verify auth.allow setting using Fqdn of clients
Change-Id: Iaad1dcb4339aa752a45e39d7bca338d1fdc87da0
Diffstat (limited to 'tests/functional')
-rw-r--r--tests/functional/fuse_subdir/test_auth_allow_fqdn.py175
1 files changed, 175 insertions, 0 deletions
diff --git a/tests/functional/fuse_subdir/test_auth_allow_fqdn.py b/tests/functional/fuse_subdir/test_auth_allow_fqdn.py
new file mode 100644
index 000000000..5428ea913
--- /dev/null
+++ b/tests/functional/fuse_subdir/test_auth_allow_fqdn.py
@@ -0,0 +1,175 @@
+# Copyright (C) 2017-2018 Red Hat, Inc. <http://www.redhat.com>
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License as published by
+# the Free Software Foundation; either version 2 of the License, or
+# any later version.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License along
+# with this program; if not, write to the Free Software Foundation, Inc.,
+# 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
+
+""" Description:
+ Test Cases in this module tests the Fuse sub directory feature
+"""
+import copy
+from glusto.core import Glusto as g
+from glustolibs.gluster.gluster_base_class import (GlusterBaseClass,
+ runs_on)
+from glustolibs.gluster.glusterdir import mkdir
+from glustolibs.gluster.exceptions import ExecutionError
+from glustolibs.gluster.auth_ops import set_auth_allow
+
+
+@runs_on([['replicated', 'distributed', 'distributed-replicated',
+ 'dispersed', 'distributed-dispersed'],
+ ['glusterfs']])
+class FuseSubDirAuthAllowFqdn(GlusterBaseClass):
+ """
+ Tests to verify auth.allow using fqdn on Fuse subdir feature
+ """
+ @classmethod
+ def setUpClass(cls):
+ """
+ Setup and mount volume
+ """
+ GlusterBaseClass.setUpClass.im_func(cls)
+ # Setup Volume and Mount Volume
+ g.log.info("Starting volume setup and mount %s",
+ cls.volname)
+ ret = cls.setup_volume_and_mount_volume(cls.mounts)
+ if not ret:
+ raise ExecutionError("Failed to Setup "
+ "and Mount_Volume %s" % cls.volname)
+ g.log.info("Successfully set and mounted the volume: %s", cls.volname)
+
+ def test_auth_allow_fqdn(self):
+ """
+ Check sub dir auth.allow functionality using FQDN
+
+ Steps:
+ 1. Create two sub directories on mounted volume
+ 2. Unmount volume from clients
+ 3. Set auth.allow on sub dir d1 for client1 and d2 for client2 using
+ fqdn
+ 4. Mount d1 on client1 and d2 on client2. This should pass.
+ 5. Try to mount d1 on client2 and d2 on client1. This should fail.
+ """
+ # Creating sub directories on mounted volume
+ ret = mkdir(self.mounts[0].client_system, "%s/d1"
+ % self.mounts[0].mountpoint)
+ self.assertTrue(ret, ("Failed to create directory 'd1' in volume %s "
+ "from client %s"
+ % (self.volname,
+ self.mounts[0].client_system)))
+ ret = mkdir(self.mounts[0].client_system, "%s/d2"
+ % self.mounts[0].mountpoint)
+ self.assertTrue(ret, ("Failed to create directory 'd2' in volume %s "
+ "from client %s"
+ % (self.volname,
+ self.mounts[0].client_system)))
+
+ # Unmounting volumes
+ ret = self.unmount_volume(self.mounts)
+ self.assertTrue(ret, "Failed to unmount one or more volumes")
+ g.log.info("Successfully unmounted all volumes")
+
+ # Obtain hostname of clients
+ ret, hostname_client1, _ = g.run(self.mounts[0].client_system,
+ "hostname")
+ self.assertEqual(ret, 0, ("Failed to obtain hostname of client %s"
+ % self.mounts[0].client_system))
+ g.log.info("Obtained hostname of client. IP- %s, hostname- %s",
+ self.mounts[0].client_system, hostname_client1.strip())
+
+ ret, hostname_client2, _ = g.run(self.mounts[1].client_system,
+ "hostname")
+ self.assertEqual(ret, 0, ("Failed to obtain hostname of client %s"
+ % self.mounts[1].client_system))
+ g.log.info("Obtained hostname of client. IP- %s, hostname- %s",
+ self.mounts[1].client_system, hostname_client2.strip())
+
+ # Setting authentication
+ auth_dict = {'/d1': [hostname_client1.strip()],
+ '/d2': [hostname_client2.strip()]}
+ if not set_auth_allow(self.volname, self.mnode, auth_dict):
+ raise ExecutionError("Failed to set authentication")
+ g.log.info("Successfully set authentication on sub directories")
+
+ # Creating mounts list for authenticated clients
+ self.subdir_mounts = [copy.deepcopy(self.mounts[0]),
+ copy.deepcopy(self.mounts[1])]
+ self.subdir_mounts[0].volname = "%s/d1" % self.volname
+ self.subdir_mounts[1].volname = "%s/d2" % self.volname
+
+ # Mounting sub directories on authenticated clients
+ for mount_obj in self.subdir_mounts:
+ ret = mount_obj.mount()
+ self.assertTrue(ret, ("Failed to mount sub directory %s on client"
+ " %s" % (mount_obj.volname,
+ mount_obj.client_system)))
+ g.log.info("Successfully mounted sub directory %s on client %s",
+ mount_obj.volname,
+ mount_obj.client_system)
+ g.log.info("Successfully mounted sub directories to authenticated "
+ "clients")
+
+ # Creating mounts list for unauthenticated clients
+ self.unauth_subdir_mounts = [copy.deepcopy(self.mounts[0]),
+ copy.deepcopy(self.mounts[1])]
+ self.unauth_subdir_mounts[0].volname = "%s/d2" % self.volname
+ self.unauth_subdir_mounts[1].volname = "%s/d1" % self.volname
+ self.unauth_subdir_mounts[0].mountpoint \
+ = "%s_unauth" % self.unauth_subdir_mounts[0].mountpoint
+ self.unauth_subdir_mounts[1].mountpoint \
+ = "%s_unauth" % self.unauth_subdir_mounts[1].mountpoint
+
+ # Trying to mount volume sub directories on unauthenticated clients
+ for mount_obj in self.unauth_subdir_mounts:
+ if mount_obj.mount():
+ g.log.warning("Mount command did not fail as expected. "
+ "sub-dir: %s, client: %s, mount point: %s",
+ mount_obj.volname, mount_obj.client_system,
+ mount_obj.mountpoint)
+ ret = mount_obj.is_mounted()
+ if ret:
+ self.subdir_mounts.append(mount_obj)
+ self.assertFalse(ret, ("Mount operation did not fail as "
+ "expected. Mount operation of sub "
+ "directory %s on client %s passed."
+ "Mount point: %s"
+ % (mount_obj.volname,
+ mount_obj.client_system,
+ mount_obj.mountpoint)))
+ g.log.info("Mount command passed. But sub directory "
+ "is not mounted. This is expected. "
+ "sub-dir: %s, client: %s, mount point: %s",
+ mount_obj.volname, mount_obj.client_system,
+ mount_obj.mountpoint)
+ g.log.info("Mount operation of sub directory %s on client %s "
+ "failed as expected.", mount_obj.volname,
+ mount_obj.client_system)
+ g.log.info("Verified mount operation of sub-dirs on "
+ "unauthenticated client. "
+ "Mount operation failed as expected.")
+
+ # Unmount sub-directories
+ ret = self.unmount_volume(self.subdir_mounts)
+ if not ret:
+ raise ExecutionError("Failed to unmount sub-directories.")
+ g.log.info("Successfully unmounted all sub-directories.")
+
+ def tearDown(self):
+ """
+ Cleaning up volume
+ """
+ g.log.info("Cleaning up volume.")
+ ret = self.cleanup_volume()
+ if not ret:
+ raise ExecutionError("Failed to cleanup volume.")
+ g.log.info("Successfully cleaned the volume.")