diff options
-rw-r--r-- | glustolibs-gluster/glustolibs/gluster/lib_utils.py | 35 | ||||
-rw-r--r-- | glustolibs-io/glustolibs/io/utils.py | 42 | ||||
-rw-r--r-- | tests/functional/dht/test_dir_change_perm.py | 188 | ||||
-rw-r--r-- | tests/functional/dht/test_dir_change_perm_recursive.py | 226 |
4 files changed, 491 insertions, 0 deletions
diff --git a/glustolibs-gluster/glustolibs/gluster/lib_utils.py b/glustolibs-gluster/glustolibs/gluster/lib_utils.py index e4459eec2..dcfb297c5 100644 --- a/glustolibs-gluster/glustolibs/gluster/lib_utils.py +++ b/glustolibs-gluster/glustolibs/gluster/lib_utils.py @@ -940,3 +940,38 @@ def get_size_of_mountpoint(node, mount_point): _, out, _ = g.run(node, cmd) return out + + +def add_user(host, uname): + """ + Add user with default home directory + Args: + host (str): hostname/ip of the system + uname (str): username + Returns always True + """ + + command = "useradd -m %s -d /home/%s" % (uname, uname) + ret, _, err = g.run(host, command) + if 'already exists' in err: + g.log.warn("User %s is already exists", uname) + else: + g.log.info("User %s is created successfully", uname) + return True + + +def del_user(host, uname): + """ + Delete user with home directory + Args: + host (str): hostname/ip of the system + uname (str): username + Return always True + """ + command = "userdel -r %s" % (uname) + ret, _, err = g.run(host, command) + if 'does not exist' in err: + g.log.warn("User %s is already deleted", uname) + else: + g.log.info("User %s successfully deleted", uname) + return True diff --git a/glustolibs-io/glustolibs/io/utils.py b/glustolibs-io/glustolibs/io/utils.py index 6f9f642e3..0f6811310 100644 --- a/glustolibs-io/glustolibs/io/utils.py +++ b/glustolibs-io/glustolibs/io/utils.py @@ -629,3 +629,45 @@ def is_io_procs_fail_with_rofs(self, all_mounts_procs, mounts): ret = all(io_results.values()) return ret, io_results + + +def compare_dir_structure_mount_with_brick(mnthost, mntloc, brick_list, type): + """ Compare directory structure from mount point with brick path along + with stat parameter + + Args: + mnthost (str): hostname or ip of mnt system + mntloc (str) : mount location of gluster file system + brick_list (list) : list of all brick ip's with brick path + type (int) : 0 represent user permission + : 1 represent group permission + : 2 represent access permission + Returns: + True if directory structure are same + False if structure is not same + """ + + statformat = '' + if type == 0: + statformat = '%U' + if type == 1: + statformat = '%G' + if type == 2: + statformat = '%A' + + command = ("find %s -mindepth 1 -type d | xargs -r stat -c '%s'" + % (mntloc, statformat)) + rcode, rout, _ = g.run(mnthost, command) + all_dir_mnt_perm = rout.strip().split('\n') + + for brick in brick_list: + brick_node, brick_path = brick.split(":") + command = ("find %s -mindepth 1 -type d | grep -ve \".glusterfs\" | " + "xargs -r stat -c '%s'" % (brick_path, statformat)) + rcode, rout, _ = g.run(brick_node, command) + all_brick_dir_perm = rout.strip().split('\n') + retval = cmp(all_dir_mnt_perm, all_brick_dir_perm) + if retval != 0: + return False + + return True diff --git a/tests/functional/dht/test_dir_change_perm.py b/tests/functional/dht/test_dir_change_perm.py new file mode 100644 index 000000000..c07cfb16e --- /dev/null +++ b/tests/functional/dht/test_dir_change_perm.py @@ -0,0 +1,188 @@ +# Copyright (C) 2018 Red Hat, Inc. <http://www.redhat.com> +# +# This program is free software; you can redistribute it and/or modify +# it under the terms of the GNU General Public License as published by +# the Free Software Foundation; either version 2 of the License, or +# any later version. +# +# This program is distributed in the hope that it will be useful, +# but WITHOUT ANY WARRANTY; without even the implied warranty of +# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the +# GNU General Public License for more details. +# +# You should have received a copy of the GNU General Public License along +# with this program; if not, write to the Free Software Foundation, Inc., +# 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA. + +from glusto.core import Glusto as g + +from glustolibs.gluster.constants import \ + TEST_LAYOUT_IS_COMPLETE as LAYOUT_IS_COMPLETE +from glustolibs.gluster.constants import FILETYPE_DIRS +from glustolibs.gluster.dht_test_utils import validate_files_in_dir +from glustolibs.io.utils import list_all_files_and_dirs_mounts +from glustolibs.gluster.exceptions import ExecutionError +from glustolibs.gluster.gluster_base_class import GlusterBaseClass, runs_on +from glustolibs.gluster.brick_libs import get_all_bricks +from glustolibs.io.utils import \ + compare_dir_structure_mount_with_brick as compare_dir_structure +from glustolibs.gluster.lib_utils import (add_user, del_user) + + +@runs_on([['distributed', 'distributed-replicated', + 'dispersed', 'distributed-dispersed', 'replicated'], + ['glusterfs']]) +class DirChangePerm(GlusterBaseClass): + def setUp(self): + + # Calling GlusterBaseClass setUp + GlusterBaseClass.setUp.im_func(self) + + # Setup Volume and Mount Volume + g.log.info("Starting to Setup Volume and Mount Volume") + ret = self.setup_volume_and_mount_volume(mounts=self.mounts) + if not ret: + raise ExecutionError("Failed to Setup_Volume and Mount_Volume") + g.log.info("Successful in Setup Volume and Mount Volume") + + brick_list = get_all_bricks(self.mnode, self.volname) + # Add user on all nodes + for brick in brick_list: + brick_node, _ = brick.split(":") + add_user(brick_node, "test_user1") + add_user(brick_node, "test_user2") + + for mount_obj in self.mounts: + add_user(mount_obj.client_system, "test_user1") + add_user(mount_obj.client_system, "test_user2") + + def tearDown(self): + + brick_list = get_all_bricks(self.mnode, self.volname) + for brick in brick_list: + brick_node, _ = brick.split(":") + del_user(brick_node, "test_user1") + del_user(brick_node, "test_user2") + + for mount_obj in self.mounts: + del_user(mount_obj.client_system, "test_user1") + del_user(mount_obj.client_system, "test_user2") + + # Unmount Volume and Cleanup Volume + g.log.info("Starting to Unmount Volume and Cleanup Volume") + ret = self.unmount_volume_and_cleanup_volume(mounts=self.mounts) + if not ret: + raise ExecutionError("Failed to Unmount Volume and Cleanup Volume") + g.log.info("Successful in Unmount Volume and Cleanup Volume") + + # Calling GlusterBaseClass tearDown + GlusterBaseClass.tearDown.im_func(self) + + def test_dir_change_perm(self): + # pylint: disable=too-many-statements + # Start IO on mounts + g.log.info("Starting IO on all mounts...") + mount_obj = self.mounts[0] + cmd = ('cd %s ; mkdir testdir; ' + 'mkdir -p testdir/dir{1..10} ' + 'touch testdir/file{1..10}') % (mount_obj.mountpoint) + rcode, _, err = g.run(mount_obj.client_system, cmd) + self.assertEqual(rcode, 0, err) + g.log.info("IO is successful on mount %s", self.clients[0]) + + # List all files and dirs created + g.log.info("List all files and directories:") + ret = list_all_files_and_dirs_mounts(mount_obj) + self.assertTrue(ret, "Failed to list all files and dirs") + g.log.info("Listing all files and directories is successful") + + # DHT Layout validation + g.log.debug("Verifying hash layout values %s:%s", + self.clients[0], self.mounts[0].mountpoint) + ret = validate_files_in_dir(self.clients[0], self.mounts[0].mountpoint, + test_type=LAYOUT_IS_COMPLETE, + file_type=FILETYPE_DIRS) + self.assertTrue(ret, "layout is complete: FAILED") + g.log.info("layout is complete: PASS") + + brick_list = get_all_bricks(self.mnode, self.volname) + self.assertIsNotNone(brick_list, "Failed to get brick list") + g.log.info("Successful in getting brick list %s", brick_list) + + cmd = ("find %s -mindepth 1 -maxdepth 1 -type d | " + "xargs chown test_user1" % (mount_obj.mountpoint)) + rcode, _, err = g.run(mount_obj.client_system, cmd) + self.assertEqual(rcode, 0, err) + g.log.info("Change user owner successfully for testdir on %s", + mount_obj.client_system) + + retval = compare_dir_structure(mount_obj.client_system, + mount_obj.mountpoint, + brick_list, 0) + self.assertTrue(retval, "Failed to compare user permission for all" + " files/dir in mount directory with brick directory") + g.log.info("User permission is same on mount and brick directory") + + cmd = ("su -l test_user2 -c \"find %s -mindepth 1 -maxdepth 1" + " -type d\"" % (mount_obj.mountpoint)) + rcode, _, err = g.run(mount_obj.client_system, cmd) + self.assertEqual(rcode, 0, err) + g.log.info("directory is successfully accessed with different user") + + cmd = ("su -l test_user2 -c \"find %s -mindepth 1 -maxdepth 1" + " -type d | xargs chmod 777\"" % (mount_obj.mountpoint)) + rcode, _, err = g.run(mount_obj.client_system, cmd) + self.assertNotEqual(rcode, 0, err) + g.log.info("directory permission are not changed by different user") + + cmd = ("find %s -mindepth 1 -maxdepth 1 -type d | " + "xargs chgrp test_user1" % (mount_obj.mountpoint)) + rcode, _, err = g.run(mount_obj.client_system, cmd) + self.assertEqual(rcode, 0, err) + g.log.info("Change group owner successfully for testdir on %s", + mount_obj.client_system) + + retval = compare_dir_structure(mount_obj.client_system, + mount_obj.mountpoint, + brick_list, 1) + self.assertTrue(retval, "Failed to compare group permission for all" + " files/dir in mount directory with brick directory") + g.log.info("Group permission is same on mount and brick directory") + + cmd = ("su -l test_user2 -c \"find %s -mindepth 1 -maxdepth 1" + " -type d\"" % (mount_obj.mountpoint)) + rcode, _, err = g.run(mount_obj.client_system, cmd) + self.assertEqual(rcode, 0, err) + g.log.info("directory is successfully accessed with different user") + + cmd = ("su -l test_user2 -c \"find %s -mindepth 1 -maxdepth 1 -type d " + "| xargs chmod 777\"" % (mount_obj.mountpoint)) + rcode, _, err = g.run(mount_obj.client_system, cmd) + self.assertNotEqual(rcode, 0, err) + g.log.info("directory permission are not changed by different user") + + cmd = ("find %s -mindepth 1 -maxdepth 1 -type d | xargs chmod 777" + % (mount_obj.mountpoint)) + rcode, _, err = g.run(mount_obj.client_system, cmd) + self.assertEqual(rcode, 0, err) + g.log.info("Change permission 777 successfully for testdir on %s", + mount_obj.client_system) + + retval = compare_dir_structure(mount_obj.client_system, + mount_obj.mountpoint, + brick_list, 2) + self.assertTrue(retval, "Failed to compare permission for all" + " files/dir in mount directory with brick directory") + g.log.info("Permission is same on mount and brick directory") + + cmd = ("su -l test_user2 -c \"find %s -mindepth 1 -maxdepth 1" + " -type d\"" % (mount_obj.mountpoint)) + rcode, _, err = g.run(mount_obj.client_system, cmd) + self.assertEqual(rcode, 0, err) + g.log.info("directory is successfully accessed with different user") + + cmd = ("su -l test_user2 -c \"find %s -mindepth 1 -maxdepth 1" + " -type d | xargs chmod 666\"" % (mount_obj.mountpoint)) + rcode, _, err = g.run(mount_obj.client_system, cmd) + self.assertNotEqual(rcode, 0, err) + g.log.info("directory permission are not changed by different user") diff --git a/tests/functional/dht/test_dir_change_perm_recursive.py b/tests/functional/dht/test_dir_change_perm_recursive.py new file mode 100644 index 000000000..0ae02a9b4 --- /dev/null +++ b/tests/functional/dht/test_dir_change_perm_recursive.py @@ -0,0 +1,226 @@ +# Copyright (C) 2018 Red Hat, Inc. <http://www.redhat.com> +# +# This program is free software; you can redistribute it and/or modify +# it under the terms of the GNU General Public License as published by +# the Free Software Foundation; either version 2 of the License, or +# any later version. +# +# This program is distributed in the hope that it will be useful, +# but WITHOUT ANY WARRANTY; without even the implied warranty of +# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the +# GNU General Public License for more details. +# +# You should have received a copy of the GNU General Public License along +# with this program; if not, write to the Free Software Foundation, Inc., +# 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA. + +from glusto.core import Glusto as g + +from glustolibs.gluster.constants import \ + TEST_LAYOUT_IS_COMPLETE as LAYOUT_IS_COMPLETE +from glustolibs.gluster.constants import FILETYPE_DIRS +from glustolibs.gluster.dht_test_utils import validate_files_in_dir +from glustolibs.gluster.exceptions import ExecutionError +from glustolibs.gluster.gluster_base_class import GlusterBaseClass, runs_on +from glustolibs.gluster.brick_libs import get_all_bricks +from glustolibs.io.utils import \ + compare_dir_structure_mount_with_brick as compare_dir_structure +from glustolibs.gluster.lib_utils import (add_user, del_user) +from glustolibs.misc.misc_libs import upload_scripts +from glustolibs.io.utils import ( + list_all_files_and_dirs_mounts, + wait_for_io_to_complete +) + + +@runs_on([['distributed', 'distributed-replicated', + 'dispersed', 'distributed-dispersed', 'replicated'], + ['glusterfs']]) +class DirChangePermRecursive(GlusterBaseClass): + @classmethod + def setUpClass(cls): + + # Calling GlusterBaseClass setUpClass + GlusterBaseClass.setUpClass.im_func(cls) + + # Upload io scripts for running IO on mounts + g.log.info("Upload io scripts to clients %s for running IO on " + "mounts", cls.clients) + script_local_path = ("/usr/share/glustolibs/io/scripts/" + "file_dir_ops.py") + cls.script_upload_path = ("/usr/share/glustolibs/io/scripts/" + "file_dir_ops.py") + ret = upload_scripts(cls.clients, script_local_path) + if not ret: + raise ExecutionError("Failed to upload IO scripts to clients %s" % + cls.clients) + g.log.info("Successfully uploaded IO scripts to clients %s", + cls.clients) + + def setUp(self): + # Calling GlusterBaseClass setUp + GlusterBaseClass.setUp.im_func(self) + + # Setup Volume and Mount Volume + g.log.info("Starting to Setup Volume and Mount Volume") + ret = self.setup_volume_and_mount_volume(mounts=self.mounts) + if not ret: + raise ExecutionError("Failed to Setup_Volume and Mount_Volume") + g.log.info("Successful in Setup Volume and Mount Volume") + + brick_list = get_all_bricks(self.mnode, self.volname) + # Add user on all nodes + for brick in brick_list: + brick_node, _ = brick.split(":") + add_user(brick_node, "test_user1") + add_user(brick_node, "test_user2") + + for mount_obj in self.mounts: + add_user(mount_obj.client_system, "test_user1") + add_user(mount_obj.client_system, "test_user2") + + def tearDown(self): + brick_list = get_all_bricks(self.mnode, self.volname) + for brick in brick_list: + brick_node, _ = brick.split(":") + del_user(brick_node, "test_user1") + del_user(brick_node, "test_user2") + + for mount_obj in self.mounts: + del_user(mount_obj.client_system, "test_user1") + del_user(mount_obj.client_system, "test_user2") + + # Unmount Volume and Cleanup Volume + g.log.info("Starting to Unmount Volume and Cleanup Volume") + ret = self.unmount_volume_and_cleanup_volume(mounts=self.mounts) + if not ret: + raise ExecutionError("Failed to Unmount Volume and Cleanup Volume") + g.log.info("Successful in Unmount Volume and Cleanup Volume") + + # Calling GlusterBaseClass tearDown + GlusterBaseClass.tearDownClass.im_func(self) + + def test_dir_change_perm_recursive(self): + # pylint: disable=too-many-statements + # Start IO on mounts + g.log.info("Starting IO on all mounts...") + self.all_mounts_procs = [] + for index, mount_obj in enumerate(self.mounts, start=1): + g.log.info("Starting IO on %s:%s", mount_obj.client_system, + mount_obj.mountpoint) + cmd = ("python %s create_deep_dirs_with_files " + "--dirname-start-num %d " + "--dir-depth 2 " + "--dir-length 5 " + "--max-num-of-dirs 5 " + "--num-of-files 5 %s" % (self.script_upload_path, + index + 10, + mount_obj.mountpoint)) + proc = g.run_async(mount_obj.client_system, cmd, + user=mount_obj.user) + self.all_mounts_procs.append(proc) + + # Wait for IO to complete + g.log.info("Wait for IO to complete as IO validation did not " + "succeed in test method") + ret = wait_for_io_to_complete(self.all_mounts_procs, self.mounts) + self.assertTrue(ret, "IO failed on some of the clients") + g.log.info("IO is successful on mount %s", self.clients[0]) + + # List all files and dirs created + g.log.info("List all files and directories:") + ret = list_all_files_and_dirs_mounts(self.mounts) + self.assertTrue(ret, "Failed to list all files and dirs") + g.log.info("Listing all files and directories is successful") + + # DHT Layout validation + g.log.debug("Verifying hash layout values %s:%s", + self.clients[0], self.mounts[0].mountpoint) + ret = validate_files_in_dir(self.clients[0], self.mounts[0].mountpoint, + test_type=LAYOUT_IS_COMPLETE, + file_type=FILETYPE_DIRS) + self.assertTrue(ret, "layout is complete: FAILED") + g.log.info("layout is complete: PASS") + + brick_list = get_all_bricks(self.mnode, self.volname) + self.assertIsNotNone(brick_list, "Failed to get brick list") + g.log.info("Successful in getting brick list %s", brick_list) + + mount_obj = self.mounts[0] + cmd = ("find %s -mindepth 1 -maxdepth 1 -type d | " + "xargs chown -R test_user1" % (mount_obj.mountpoint)) + rcode, _, err = g.run(mount_obj.client_system, cmd) + self.assertEqual(rcode, 0, err) + g.log.info("Change user owner successfully for testdir on %s", + mount_obj.client_system) + + retval = compare_dir_structure(mount_obj.client_system, + mount_obj.mountpoint, + brick_list, 0) + self.assertTrue(retval, "Failed to compare user permission for all" + " files/dir in mount directory with brick directory") + g.log.info("User permission is same on mount and brick directory") + + cmd = ("su -l test_user2 -c \"find %s -mindepth 1" + " -type d\"" % (mount_obj.mountpoint)) + rcode, _, err = g.run(mount_obj.client_system, cmd) + self.assertEqual(rcode, 0, err) + g.log.info("directory is successfully accessed with different user") + + cmd = ("su -l test_user2 -c \"find %s -mindepth 1" + " -type d | xargs chmod 777\"" % (mount_obj.mountpoint)) + rcode, _, err = g.run(mount_obj.client_system, cmd) + self.assertNotEqual(rcode, 0, err) + g.log.info("directory permission are not changed by different user") + + cmd = ("find %s -mindepth 1 -maxdepth 1 -type d | " + "xargs chgrp -R test_user1" % (mount_obj.mountpoint)) + rcode, _, err = g.run(mount_obj.client_system, cmd) + self.assertEqual(rcode, 0, err) + g.log.info("Change group owner successfully for testdir on %s", + mount_obj.client_system) + + retval = compare_dir_structure(mount_obj.client_system, + mount_obj.mountpoint, + brick_list, 1) + self.assertTrue(retval, "Failed to compare group permission for all" + " files/dir in mount directory with brick directory") + g.log.info("Group permission is same on mount and brick directory") + + cmd = ("su -l test_user2 -c \"find %s -mindepth 1" + " -type d\"" % (mount_obj.mountpoint)) + rcode, _, err = g.run(mount_obj.client_system, cmd) + self.assertEqual(rcode, 0, err) + g.log.info("directory is successfully accessed with different user") + + cmd = ("su -l test_user2 -c \"find %s -mindepth 1 -type d " + "| xargs chmod 777\"" % (mount_obj.mountpoint)) + rcode, _, err = g.run(mount_obj.client_system, cmd) + self.assertNotEqual(rcode, 0, err) + g.log.info("directory permission are not changed by different user") + + cmd = ("find %s -mindepth 1 -maxdepth 1 -type d | xargs chmod -R 777" + % (mount_obj.mountpoint)) + rcode, _, err = g.run(mount_obj.client_system, cmd) + self.assertEqual(rcode, 0, err) + g.log.info("Change permission 777 successfully for testdir on %s", + mount_obj.client_system) + + retval = compare_dir_structure(mount_obj.client_system, + mount_obj.mountpoint, + brick_list, 2) + self.assertTrue(retval, "Failed to compare permission for all" + " files/dir in mount directory with brick directory") + g.log.info("Permission is same on mount and brick directory") + + cmd = ("su -l test_user2 -c \"find %s -mindepth 1" + " -type d\"" % (mount_obj.mountpoint)) + rcode, _, err = g.run(mount_obj.client_system, cmd) + self.assertEqual(rcode, 0, err) + g.log.info("directory is successfully accessed with different user") + + cmd = ("su -l test_user2 -c \"find %s -mindepth 1" + " -type d | xargs chmod 666\"" % (mount_obj.mountpoint)) + rcode, _, err = g.run(mount_obj.client_system, cmd) + self.assertNotEqual(rcode, 0, err) + g.log.info("directory permission are not changed by different user") |