summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
-rw-r--r--glustolibs-gluster/glustolibs/gluster/lib_utils.py35
-rw-r--r--glustolibs-io/glustolibs/io/utils.py42
-rw-r--r--tests/functional/dht/test_dir_change_perm.py188
-rw-r--r--tests/functional/dht/test_dir_change_perm_recursive.py226
4 files changed, 491 insertions, 0 deletions
diff --git a/glustolibs-gluster/glustolibs/gluster/lib_utils.py b/glustolibs-gluster/glustolibs/gluster/lib_utils.py
index e4459eec2..dcfb297c5 100644
--- a/glustolibs-gluster/glustolibs/gluster/lib_utils.py
+++ b/glustolibs-gluster/glustolibs/gluster/lib_utils.py
@@ -940,3 +940,38 @@ def get_size_of_mountpoint(node, mount_point):
_, out, _ = g.run(node, cmd)
return out
+
+
+def add_user(host, uname):
+ """
+ Add user with default home directory
+ Args:
+ host (str): hostname/ip of the system
+ uname (str): username
+ Returns always True
+ """
+
+ command = "useradd -m %s -d /home/%s" % (uname, uname)
+ ret, _, err = g.run(host, command)
+ if 'already exists' in err:
+ g.log.warn("User %s is already exists", uname)
+ else:
+ g.log.info("User %s is created successfully", uname)
+ return True
+
+
+def del_user(host, uname):
+ """
+ Delete user with home directory
+ Args:
+ host (str): hostname/ip of the system
+ uname (str): username
+ Return always True
+ """
+ command = "userdel -r %s" % (uname)
+ ret, _, err = g.run(host, command)
+ if 'does not exist' in err:
+ g.log.warn("User %s is already deleted", uname)
+ else:
+ g.log.info("User %s successfully deleted", uname)
+ return True
diff --git a/glustolibs-io/glustolibs/io/utils.py b/glustolibs-io/glustolibs/io/utils.py
index 6f9f642e3..0f6811310 100644
--- a/glustolibs-io/glustolibs/io/utils.py
+++ b/glustolibs-io/glustolibs/io/utils.py
@@ -629,3 +629,45 @@ def is_io_procs_fail_with_rofs(self, all_mounts_procs, mounts):
ret = all(io_results.values())
return ret, io_results
+
+
+def compare_dir_structure_mount_with_brick(mnthost, mntloc, brick_list, type):
+ """ Compare directory structure from mount point with brick path along
+ with stat parameter
+
+ Args:
+ mnthost (str): hostname or ip of mnt system
+ mntloc (str) : mount location of gluster file system
+ brick_list (list) : list of all brick ip's with brick path
+ type (int) : 0 represent user permission
+ : 1 represent group permission
+ : 2 represent access permission
+ Returns:
+ True if directory structure are same
+ False if structure is not same
+ """
+
+ statformat = ''
+ if type == 0:
+ statformat = '%U'
+ if type == 1:
+ statformat = '%G'
+ if type == 2:
+ statformat = '%A'
+
+ command = ("find %s -mindepth 1 -type d | xargs -r stat -c '%s'"
+ % (mntloc, statformat))
+ rcode, rout, _ = g.run(mnthost, command)
+ all_dir_mnt_perm = rout.strip().split('\n')
+
+ for brick in brick_list:
+ brick_node, brick_path = brick.split(":")
+ command = ("find %s -mindepth 1 -type d | grep -ve \".glusterfs\" | "
+ "xargs -r stat -c '%s'" % (brick_path, statformat))
+ rcode, rout, _ = g.run(brick_node, command)
+ all_brick_dir_perm = rout.strip().split('\n')
+ retval = cmp(all_dir_mnt_perm, all_brick_dir_perm)
+ if retval != 0:
+ return False
+
+ return True
diff --git a/tests/functional/dht/test_dir_change_perm.py b/tests/functional/dht/test_dir_change_perm.py
new file mode 100644
index 000000000..c07cfb16e
--- /dev/null
+++ b/tests/functional/dht/test_dir_change_perm.py
@@ -0,0 +1,188 @@
+# Copyright (C) 2018 Red Hat, Inc. <http://www.redhat.com>
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License as published by
+# the Free Software Foundation; either version 2 of the License, or
+# any later version.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License along
+# with this program; if not, write to the Free Software Foundation, Inc.,
+# 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
+
+from glusto.core import Glusto as g
+
+from glustolibs.gluster.constants import \
+ TEST_LAYOUT_IS_COMPLETE as LAYOUT_IS_COMPLETE
+from glustolibs.gluster.constants import FILETYPE_DIRS
+from glustolibs.gluster.dht_test_utils import validate_files_in_dir
+from glustolibs.io.utils import list_all_files_and_dirs_mounts
+from glustolibs.gluster.exceptions import ExecutionError
+from glustolibs.gluster.gluster_base_class import GlusterBaseClass, runs_on
+from glustolibs.gluster.brick_libs import get_all_bricks
+from glustolibs.io.utils import \
+ compare_dir_structure_mount_with_brick as compare_dir_structure
+from glustolibs.gluster.lib_utils import (add_user, del_user)
+
+
+@runs_on([['distributed', 'distributed-replicated',
+ 'dispersed', 'distributed-dispersed', 'replicated'],
+ ['glusterfs']])
+class DirChangePerm(GlusterBaseClass):
+ def setUp(self):
+
+ # Calling GlusterBaseClass setUp
+ GlusterBaseClass.setUp.im_func(self)
+
+ # Setup Volume and Mount Volume
+ g.log.info("Starting to Setup Volume and Mount Volume")
+ ret = self.setup_volume_and_mount_volume(mounts=self.mounts)
+ if not ret:
+ raise ExecutionError("Failed to Setup_Volume and Mount_Volume")
+ g.log.info("Successful in Setup Volume and Mount Volume")
+
+ brick_list = get_all_bricks(self.mnode, self.volname)
+ # Add user on all nodes
+ for brick in brick_list:
+ brick_node, _ = brick.split(":")
+ add_user(brick_node, "test_user1")
+ add_user(brick_node, "test_user2")
+
+ for mount_obj in self.mounts:
+ add_user(mount_obj.client_system, "test_user1")
+ add_user(mount_obj.client_system, "test_user2")
+
+ def tearDown(self):
+
+ brick_list = get_all_bricks(self.mnode, self.volname)
+ for brick in brick_list:
+ brick_node, _ = brick.split(":")
+ del_user(brick_node, "test_user1")
+ del_user(brick_node, "test_user2")
+
+ for mount_obj in self.mounts:
+ del_user(mount_obj.client_system, "test_user1")
+ del_user(mount_obj.client_system, "test_user2")
+
+ # Unmount Volume and Cleanup Volume
+ g.log.info("Starting to Unmount Volume and Cleanup Volume")
+ ret = self.unmount_volume_and_cleanup_volume(mounts=self.mounts)
+ if not ret:
+ raise ExecutionError("Failed to Unmount Volume and Cleanup Volume")
+ g.log.info("Successful in Unmount Volume and Cleanup Volume")
+
+ # Calling GlusterBaseClass tearDown
+ GlusterBaseClass.tearDown.im_func(self)
+
+ def test_dir_change_perm(self):
+ # pylint: disable=too-many-statements
+ # Start IO on mounts
+ g.log.info("Starting IO on all mounts...")
+ mount_obj = self.mounts[0]
+ cmd = ('cd %s ; mkdir testdir; '
+ 'mkdir -p testdir/dir{1..10} '
+ 'touch testdir/file{1..10}') % (mount_obj.mountpoint)
+ rcode, _, err = g.run(mount_obj.client_system, cmd)
+ self.assertEqual(rcode, 0, err)
+ g.log.info("IO is successful on mount %s", self.clients[0])
+
+ # List all files and dirs created
+ g.log.info("List all files and directories:")
+ ret = list_all_files_and_dirs_mounts(mount_obj)
+ self.assertTrue(ret, "Failed to list all files and dirs")
+ g.log.info("Listing all files and directories is successful")
+
+ # DHT Layout validation
+ g.log.debug("Verifying hash layout values %s:%s",
+ self.clients[0], self.mounts[0].mountpoint)
+ ret = validate_files_in_dir(self.clients[0], self.mounts[0].mountpoint,
+ test_type=LAYOUT_IS_COMPLETE,
+ file_type=FILETYPE_DIRS)
+ self.assertTrue(ret, "layout is complete: FAILED")
+ g.log.info("layout is complete: PASS")
+
+ brick_list = get_all_bricks(self.mnode, self.volname)
+ self.assertIsNotNone(brick_list, "Failed to get brick list")
+ g.log.info("Successful in getting brick list %s", brick_list)
+
+ cmd = ("find %s -mindepth 1 -maxdepth 1 -type d | "
+ "xargs chown test_user1" % (mount_obj.mountpoint))
+ rcode, _, err = g.run(mount_obj.client_system, cmd)
+ self.assertEqual(rcode, 0, err)
+ g.log.info("Change user owner successfully for testdir on %s",
+ mount_obj.client_system)
+
+ retval = compare_dir_structure(mount_obj.client_system,
+ mount_obj.mountpoint,
+ brick_list, 0)
+ self.assertTrue(retval, "Failed to compare user permission for all"
+ " files/dir in mount directory with brick directory")
+ g.log.info("User permission is same on mount and brick directory")
+
+ cmd = ("su -l test_user2 -c \"find %s -mindepth 1 -maxdepth 1"
+ " -type d\"" % (mount_obj.mountpoint))
+ rcode, _, err = g.run(mount_obj.client_system, cmd)
+ self.assertEqual(rcode, 0, err)
+ g.log.info("directory is successfully accessed with different user")
+
+ cmd = ("su -l test_user2 -c \"find %s -mindepth 1 -maxdepth 1"
+ " -type d | xargs chmod 777\"" % (mount_obj.mountpoint))
+ rcode, _, err = g.run(mount_obj.client_system, cmd)
+ self.assertNotEqual(rcode, 0, err)
+ g.log.info("directory permission are not changed by different user")
+
+ cmd = ("find %s -mindepth 1 -maxdepth 1 -type d | "
+ "xargs chgrp test_user1" % (mount_obj.mountpoint))
+ rcode, _, err = g.run(mount_obj.client_system, cmd)
+ self.assertEqual(rcode, 0, err)
+ g.log.info("Change group owner successfully for testdir on %s",
+ mount_obj.client_system)
+
+ retval = compare_dir_structure(mount_obj.client_system,
+ mount_obj.mountpoint,
+ brick_list, 1)
+ self.assertTrue(retval, "Failed to compare group permission for all"
+ " files/dir in mount directory with brick directory")
+ g.log.info("Group permission is same on mount and brick directory")
+
+ cmd = ("su -l test_user2 -c \"find %s -mindepth 1 -maxdepth 1"
+ " -type d\"" % (mount_obj.mountpoint))
+ rcode, _, err = g.run(mount_obj.client_system, cmd)
+ self.assertEqual(rcode, 0, err)
+ g.log.info("directory is successfully accessed with different user")
+
+ cmd = ("su -l test_user2 -c \"find %s -mindepth 1 -maxdepth 1 -type d "
+ "| xargs chmod 777\"" % (mount_obj.mountpoint))
+ rcode, _, err = g.run(mount_obj.client_system, cmd)
+ self.assertNotEqual(rcode, 0, err)
+ g.log.info("directory permission are not changed by different user")
+
+ cmd = ("find %s -mindepth 1 -maxdepth 1 -type d | xargs chmod 777"
+ % (mount_obj.mountpoint))
+ rcode, _, err = g.run(mount_obj.client_system, cmd)
+ self.assertEqual(rcode, 0, err)
+ g.log.info("Change permission 777 successfully for testdir on %s",
+ mount_obj.client_system)
+
+ retval = compare_dir_structure(mount_obj.client_system,
+ mount_obj.mountpoint,
+ brick_list, 2)
+ self.assertTrue(retval, "Failed to compare permission for all"
+ " files/dir in mount directory with brick directory")
+ g.log.info("Permission is same on mount and brick directory")
+
+ cmd = ("su -l test_user2 -c \"find %s -mindepth 1 -maxdepth 1"
+ " -type d\"" % (mount_obj.mountpoint))
+ rcode, _, err = g.run(mount_obj.client_system, cmd)
+ self.assertEqual(rcode, 0, err)
+ g.log.info("directory is successfully accessed with different user")
+
+ cmd = ("su -l test_user2 -c \"find %s -mindepth 1 -maxdepth 1"
+ " -type d | xargs chmod 666\"" % (mount_obj.mountpoint))
+ rcode, _, err = g.run(mount_obj.client_system, cmd)
+ self.assertNotEqual(rcode, 0, err)
+ g.log.info("directory permission are not changed by different user")
diff --git a/tests/functional/dht/test_dir_change_perm_recursive.py b/tests/functional/dht/test_dir_change_perm_recursive.py
new file mode 100644
index 000000000..0ae02a9b4
--- /dev/null
+++ b/tests/functional/dht/test_dir_change_perm_recursive.py
@@ -0,0 +1,226 @@
+# Copyright (C) 2018 Red Hat, Inc. <http://www.redhat.com>
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License as published by
+# the Free Software Foundation; either version 2 of the License, or
+# any later version.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License along
+# with this program; if not, write to the Free Software Foundation, Inc.,
+# 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
+
+from glusto.core import Glusto as g
+
+from glustolibs.gluster.constants import \
+ TEST_LAYOUT_IS_COMPLETE as LAYOUT_IS_COMPLETE
+from glustolibs.gluster.constants import FILETYPE_DIRS
+from glustolibs.gluster.dht_test_utils import validate_files_in_dir
+from glustolibs.gluster.exceptions import ExecutionError
+from glustolibs.gluster.gluster_base_class import GlusterBaseClass, runs_on
+from glustolibs.gluster.brick_libs import get_all_bricks
+from glustolibs.io.utils import \
+ compare_dir_structure_mount_with_brick as compare_dir_structure
+from glustolibs.gluster.lib_utils import (add_user, del_user)
+from glustolibs.misc.misc_libs import upload_scripts
+from glustolibs.io.utils import (
+ list_all_files_and_dirs_mounts,
+ wait_for_io_to_complete
+)
+
+
+@runs_on([['distributed', 'distributed-replicated',
+ 'dispersed', 'distributed-dispersed', 'replicated'],
+ ['glusterfs']])
+class DirChangePermRecursive(GlusterBaseClass):
+ @classmethod
+ def setUpClass(cls):
+
+ # Calling GlusterBaseClass setUpClass
+ GlusterBaseClass.setUpClass.im_func(cls)
+
+ # Upload io scripts for running IO on mounts
+ g.log.info("Upload io scripts to clients %s for running IO on "
+ "mounts", cls.clients)
+ script_local_path = ("/usr/share/glustolibs/io/scripts/"
+ "file_dir_ops.py")
+ cls.script_upload_path = ("/usr/share/glustolibs/io/scripts/"
+ "file_dir_ops.py")
+ ret = upload_scripts(cls.clients, script_local_path)
+ if not ret:
+ raise ExecutionError("Failed to upload IO scripts to clients %s" %
+ cls.clients)
+ g.log.info("Successfully uploaded IO scripts to clients %s",
+ cls.clients)
+
+ def setUp(self):
+ # Calling GlusterBaseClass setUp
+ GlusterBaseClass.setUp.im_func(self)
+
+ # Setup Volume and Mount Volume
+ g.log.info("Starting to Setup Volume and Mount Volume")
+ ret = self.setup_volume_and_mount_volume(mounts=self.mounts)
+ if not ret:
+ raise ExecutionError("Failed to Setup_Volume and Mount_Volume")
+ g.log.info("Successful in Setup Volume and Mount Volume")
+
+ brick_list = get_all_bricks(self.mnode, self.volname)
+ # Add user on all nodes
+ for brick in brick_list:
+ brick_node, _ = brick.split(":")
+ add_user(brick_node, "test_user1")
+ add_user(brick_node, "test_user2")
+
+ for mount_obj in self.mounts:
+ add_user(mount_obj.client_system, "test_user1")
+ add_user(mount_obj.client_system, "test_user2")
+
+ def tearDown(self):
+ brick_list = get_all_bricks(self.mnode, self.volname)
+ for brick in brick_list:
+ brick_node, _ = brick.split(":")
+ del_user(brick_node, "test_user1")
+ del_user(brick_node, "test_user2")
+
+ for mount_obj in self.mounts:
+ del_user(mount_obj.client_system, "test_user1")
+ del_user(mount_obj.client_system, "test_user2")
+
+ # Unmount Volume and Cleanup Volume
+ g.log.info("Starting to Unmount Volume and Cleanup Volume")
+ ret = self.unmount_volume_and_cleanup_volume(mounts=self.mounts)
+ if not ret:
+ raise ExecutionError("Failed to Unmount Volume and Cleanup Volume")
+ g.log.info("Successful in Unmount Volume and Cleanup Volume")
+
+ # Calling GlusterBaseClass tearDown
+ GlusterBaseClass.tearDownClass.im_func(self)
+
+ def test_dir_change_perm_recursive(self):
+ # pylint: disable=too-many-statements
+ # Start IO on mounts
+ g.log.info("Starting IO on all mounts...")
+ self.all_mounts_procs = []
+ for index, mount_obj in enumerate(self.mounts, start=1):
+ g.log.info("Starting IO on %s:%s", mount_obj.client_system,
+ mount_obj.mountpoint)
+ cmd = ("python %s create_deep_dirs_with_files "
+ "--dirname-start-num %d "
+ "--dir-depth 2 "
+ "--dir-length 5 "
+ "--max-num-of-dirs 5 "
+ "--num-of-files 5 %s" % (self.script_upload_path,
+ index + 10,
+ mount_obj.mountpoint))
+ proc = g.run_async(mount_obj.client_system, cmd,
+ user=mount_obj.user)
+ self.all_mounts_procs.append(proc)
+
+ # Wait for IO to complete
+ g.log.info("Wait for IO to complete as IO validation did not "
+ "succeed in test method")
+ ret = wait_for_io_to_complete(self.all_mounts_procs, self.mounts)
+ self.assertTrue(ret, "IO failed on some of the clients")
+ g.log.info("IO is successful on mount %s", self.clients[0])
+
+ # List all files and dirs created
+ g.log.info("List all files and directories:")
+ ret = list_all_files_and_dirs_mounts(self.mounts)
+ self.assertTrue(ret, "Failed to list all files and dirs")
+ g.log.info("Listing all files and directories is successful")
+
+ # DHT Layout validation
+ g.log.debug("Verifying hash layout values %s:%s",
+ self.clients[0], self.mounts[0].mountpoint)
+ ret = validate_files_in_dir(self.clients[0], self.mounts[0].mountpoint,
+ test_type=LAYOUT_IS_COMPLETE,
+ file_type=FILETYPE_DIRS)
+ self.assertTrue(ret, "layout is complete: FAILED")
+ g.log.info("layout is complete: PASS")
+
+ brick_list = get_all_bricks(self.mnode, self.volname)
+ self.assertIsNotNone(brick_list, "Failed to get brick list")
+ g.log.info("Successful in getting brick list %s", brick_list)
+
+ mount_obj = self.mounts[0]
+ cmd = ("find %s -mindepth 1 -maxdepth 1 -type d | "
+ "xargs chown -R test_user1" % (mount_obj.mountpoint))
+ rcode, _, err = g.run(mount_obj.client_system, cmd)
+ self.assertEqual(rcode, 0, err)
+ g.log.info("Change user owner successfully for testdir on %s",
+ mount_obj.client_system)
+
+ retval = compare_dir_structure(mount_obj.client_system,
+ mount_obj.mountpoint,
+ brick_list, 0)
+ self.assertTrue(retval, "Failed to compare user permission for all"
+ " files/dir in mount directory with brick directory")
+ g.log.info("User permission is same on mount and brick directory")
+
+ cmd = ("su -l test_user2 -c \"find %s -mindepth 1"
+ " -type d\"" % (mount_obj.mountpoint))
+ rcode, _, err = g.run(mount_obj.client_system, cmd)
+ self.assertEqual(rcode, 0, err)
+ g.log.info("directory is successfully accessed with different user")
+
+ cmd = ("su -l test_user2 -c \"find %s -mindepth 1"
+ " -type d | xargs chmod 777\"" % (mount_obj.mountpoint))
+ rcode, _, err = g.run(mount_obj.client_system, cmd)
+ self.assertNotEqual(rcode, 0, err)
+ g.log.info("directory permission are not changed by different user")
+
+ cmd = ("find %s -mindepth 1 -maxdepth 1 -type d | "
+ "xargs chgrp -R test_user1" % (mount_obj.mountpoint))
+ rcode, _, err = g.run(mount_obj.client_system, cmd)
+ self.assertEqual(rcode, 0, err)
+ g.log.info("Change group owner successfully for testdir on %s",
+ mount_obj.client_system)
+
+ retval = compare_dir_structure(mount_obj.client_system,
+ mount_obj.mountpoint,
+ brick_list, 1)
+ self.assertTrue(retval, "Failed to compare group permission for all"
+ " files/dir in mount directory with brick directory")
+ g.log.info("Group permission is same on mount and brick directory")
+
+ cmd = ("su -l test_user2 -c \"find %s -mindepth 1"
+ " -type d\"" % (mount_obj.mountpoint))
+ rcode, _, err = g.run(mount_obj.client_system, cmd)
+ self.assertEqual(rcode, 0, err)
+ g.log.info("directory is successfully accessed with different user")
+
+ cmd = ("su -l test_user2 -c \"find %s -mindepth 1 -type d "
+ "| xargs chmod 777\"" % (mount_obj.mountpoint))
+ rcode, _, err = g.run(mount_obj.client_system, cmd)
+ self.assertNotEqual(rcode, 0, err)
+ g.log.info("directory permission are not changed by different user")
+
+ cmd = ("find %s -mindepth 1 -maxdepth 1 -type d | xargs chmod -R 777"
+ % (mount_obj.mountpoint))
+ rcode, _, err = g.run(mount_obj.client_system, cmd)
+ self.assertEqual(rcode, 0, err)
+ g.log.info("Change permission 777 successfully for testdir on %s",
+ mount_obj.client_system)
+
+ retval = compare_dir_structure(mount_obj.client_system,
+ mount_obj.mountpoint,
+ brick_list, 2)
+ self.assertTrue(retval, "Failed to compare permission for all"
+ " files/dir in mount directory with brick directory")
+ g.log.info("Permission is same on mount and brick directory")
+
+ cmd = ("su -l test_user2 -c \"find %s -mindepth 1"
+ " -type d\"" % (mount_obj.mountpoint))
+ rcode, _, err = g.run(mount_obj.client_system, cmd)
+ self.assertEqual(rcode, 0, err)
+ g.log.info("directory is successfully accessed with different user")
+
+ cmd = ("su -l test_user2 -c \"find %s -mindepth 1"
+ " -type d | xargs chmod 666\"" % (mount_obj.mountpoint))
+ rcode, _, err = g.run(mount_obj.client_system, cmd)
+ self.assertNotEqual(rcode, 0, err)
+ g.log.info("directory permission are not changed by different user")