From 7a6946dcfebddc983df9f154907f832d6c3adf81 Mon Sep 17 00:00:00 2001 From: Mohit Agrawal Date: Wed, 27 Jun 2018 11:22:27 +0530 Subject: Adding test case for change owner, group, permission for directory 1) Create Dir with some file inside dir 2) Verify dir exists on all bricks as well as mount point 3) Compare dir stat with mount-point and brick location path 4) Change the ownership of directory 5) Compare dir stats with mount-point and brick path 6) Try to change pemission with different user for directory 7) Compare dir stat with mount-point and brick path 8) Try to change permission with different user for directory 9) change permission of directory 10) Compare dir stat with mount-point and brick path 11) Try to change permission with different user for same directory Change-Id: I284842be8c7562d4618d4e69e202c4d80945f1c5 Signed-off-by: Mohit Agrawal --- tests/functional/dht/test_dir_change_perm.py | 188 +++++++++++++++++ .../dht/test_dir_change_perm_recursive.py | 226 +++++++++++++++++++++ 2 files changed, 414 insertions(+) create mode 100644 tests/functional/dht/test_dir_change_perm.py create mode 100644 tests/functional/dht/test_dir_change_perm_recursive.py (limited to 'tests/functional/dht') diff --git a/tests/functional/dht/test_dir_change_perm.py b/tests/functional/dht/test_dir_change_perm.py new file mode 100644 index 000000000..c07cfb16e --- /dev/null +++ b/tests/functional/dht/test_dir_change_perm.py @@ -0,0 +1,188 @@ +# Copyright (C) 2018 Red Hat, Inc. +# +# This program is free software; you can redistribute it and/or modify +# it under the terms of the GNU General Public License as published by +# the Free Software Foundation; either version 2 of the License, or +# any later version. +# +# This program is distributed in the hope that it will be useful, +# but WITHOUT ANY WARRANTY; without even the implied warranty of +# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the +# GNU General Public License for more details. +# +# You should have received a copy of the GNU General Public License along +# with this program; if not, write to the Free Software Foundation, Inc., +# 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA. + +from glusto.core import Glusto as g + +from glustolibs.gluster.constants import \ + TEST_LAYOUT_IS_COMPLETE as LAYOUT_IS_COMPLETE +from glustolibs.gluster.constants import FILETYPE_DIRS +from glustolibs.gluster.dht_test_utils import validate_files_in_dir +from glustolibs.io.utils import list_all_files_and_dirs_mounts +from glustolibs.gluster.exceptions import ExecutionError +from glustolibs.gluster.gluster_base_class import GlusterBaseClass, runs_on +from glustolibs.gluster.brick_libs import get_all_bricks +from glustolibs.io.utils import \ + compare_dir_structure_mount_with_brick as compare_dir_structure +from glustolibs.gluster.lib_utils import (add_user, del_user) + + +@runs_on([['distributed', 'distributed-replicated', + 'dispersed', 'distributed-dispersed', 'replicated'], + ['glusterfs']]) +class DirChangePerm(GlusterBaseClass): + def setUp(self): + + # Calling GlusterBaseClass setUp + GlusterBaseClass.setUp.im_func(self) + + # Setup Volume and Mount Volume + g.log.info("Starting to Setup Volume and Mount Volume") + ret = self.setup_volume_and_mount_volume(mounts=self.mounts) + if not ret: + raise ExecutionError("Failed to Setup_Volume and Mount_Volume") + g.log.info("Successful in Setup Volume and Mount Volume") + + brick_list = get_all_bricks(self.mnode, self.volname) + # Add user on all nodes + for brick in brick_list: + brick_node, _ = brick.split(":") + add_user(brick_node, "test_user1") + add_user(brick_node, "test_user2") + + for mount_obj in self.mounts: + add_user(mount_obj.client_system, "test_user1") + add_user(mount_obj.client_system, "test_user2") + + def tearDown(self): + + brick_list = get_all_bricks(self.mnode, self.volname) + for brick in brick_list: + brick_node, _ = brick.split(":") + del_user(brick_node, "test_user1") + del_user(brick_node, "test_user2") + + for mount_obj in self.mounts: + del_user(mount_obj.client_system, "test_user1") + del_user(mount_obj.client_system, "test_user2") + + # Unmount Volume and Cleanup Volume + g.log.info("Starting to Unmount Volume and Cleanup Volume") + ret = self.unmount_volume_and_cleanup_volume(mounts=self.mounts) + if not ret: + raise ExecutionError("Failed to Unmount Volume and Cleanup Volume") + g.log.info("Successful in Unmount Volume and Cleanup Volume") + + # Calling GlusterBaseClass tearDown + GlusterBaseClass.tearDown.im_func(self) + + def test_dir_change_perm(self): + # pylint: disable=too-many-statements + # Start IO on mounts + g.log.info("Starting IO on all mounts...") + mount_obj = self.mounts[0] + cmd = ('cd %s ; mkdir testdir; ' + 'mkdir -p testdir/dir{1..10} ' + 'touch testdir/file{1..10}') % (mount_obj.mountpoint) + rcode, _, err = g.run(mount_obj.client_system, cmd) + self.assertEqual(rcode, 0, err) + g.log.info("IO is successful on mount %s", self.clients[0]) + + # List all files and dirs created + g.log.info("List all files and directories:") + ret = list_all_files_and_dirs_mounts(mount_obj) + self.assertTrue(ret, "Failed to list all files and dirs") + g.log.info("Listing all files and directories is successful") + + # DHT Layout validation + g.log.debug("Verifying hash layout values %s:%s", + self.clients[0], self.mounts[0].mountpoint) + ret = validate_files_in_dir(self.clients[0], self.mounts[0].mountpoint, + test_type=LAYOUT_IS_COMPLETE, + file_type=FILETYPE_DIRS) + self.assertTrue(ret, "layout is complete: FAILED") + g.log.info("layout is complete: PASS") + + brick_list = get_all_bricks(self.mnode, self.volname) + self.assertIsNotNone(brick_list, "Failed to get brick list") + g.log.info("Successful in getting brick list %s", brick_list) + + cmd = ("find %s -mindepth 1 -maxdepth 1 -type d | " + "xargs chown test_user1" % (mount_obj.mountpoint)) + rcode, _, err = g.run(mount_obj.client_system, cmd) + self.assertEqual(rcode, 0, err) + g.log.info("Change user owner successfully for testdir on %s", + mount_obj.client_system) + + retval = compare_dir_structure(mount_obj.client_system, + mount_obj.mountpoint, + brick_list, 0) + self.assertTrue(retval, "Failed to compare user permission for all" + " files/dir in mount directory with brick directory") + g.log.info("User permission is same on mount and brick directory") + + cmd = ("su -l test_user2 -c \"find %s -mindepth 1 -maxdepth 1" + " -type d\"" % (mount_obj.mountpoint)) + rcode, _, err = g.run(mount_obj.client_system, cmd) + self.assertEqual(rcode, 0, err) + g.log.info("directory is successfully accessed with different user") + + cmd = ("su -l test_user2 -c \"find %s -mindepth 1 -maxdepth 1" + " -type d | xargs chmod 777\"" % (mount_obj.mountpoint)) + rcode, _, err = g.run(mount_obj.client_system, cmd) + self.assertNotEqual(rcode, 0, err) + g.log.info("directory permission are not changed by different user") + + cmd = ("find %s -mindepth 1 -maxdepth 1 -type d | " + "xargs chgrp test_user1" % (mount_obj.mountpoint)) + rcode, _, err = g.run(mount_obj.client_system, cmd) + self.assertEqual(rcode, 0, err) + g.log.info("Change group owner successfully for testdir on %s", + mount_obj.client_system) + + retval = compare_dir_structure(mount_obj.client_system, + mount_obj.mountpoint, + brick_list, 1) + self.assertTrue(retval, "Failed to compare group permission for all" + " files/dir in mount directory with brick directory") + g.log.info("Group permission is same on mount and brick directory") + + cmd = ("su -l test_user2 -c \"find %s -mindepth 1 -maxdepth 1" + " -type d\"" % (mount_obj.mountpoint)) + rcode, _, err = g.run(mount_obj.client_system, cmd) + self.assertEqual(rcode, 0, err) + g.log.info("directory is successfully accessed with different user") + + cmd = ("su -l test_user2 -c \"find %s -mindepth 1 -maxdepth 1 -type d " + "| xargs chmod 777\"" % (mount_obj.mountpoint)) + rcode, _, err = g.run(mount_obj.client_system, cmd) + self.assertNotEqual(rcode, 0, err) + g.log.info("directory permission are not changed by different user") + + cmd = ("find %s -mindepth 1 -maxdepth 1 -type d | xargs chmod 777" + % (mount_obj.mountpoint)) + rcode, _, err = g.run(mount_obj.client_system, cmd) + self.assertEqual(rcode, 0, err) + g.log.info("Change permission 777 successfully for testdir on %s", + mount_obj.client_system) + + retval = compare_dir_structure(mount_obj.client_system, + mount_obj.mountpoint, + brick_list, 2) + self.assertTrue(retval, "Failed to compare permission for all" + " files/dir in mount directory with brick directory") + g.log.info("Permission is same on mount and brick directory") + + cmd = ("su -l test_user2 -c \"find %s -mindepth 1 -maxdepth 1" + " -type d\"" % (mount_obj.mountpoint)) + rcode, _, err = g.run(mount_obj.client_system, cmd) + self.assertEqual(rcode, 0, err) + g.log.info("directory is successfully accessed with different user") + + cmd = ("su -l test_user2 -c \"find %s -mindepth 1 -maxdepth 1" + " -type d | xargs chmod 666\"" % (mount_obj.mountpoint)) + rcode, _, err = g.run(mount_obj.client_system, cmd) + self.assertNotEqual(rcode, 0, err) + g.log.info("directory permission are not changed by different user") diff --git a/tests/functional/dht/test_dir_change_perm_recursive.py b/tests/functional/dht/test_dir_change_perm_recursive.py new file mode 100644 index 000000000..0ae02a9b4 --- /dev/null +++ b/tests/functional/dht/test_dir_change_perm_recursive.py @@ -0,0 +1,226 @@ +# Copyright (C) 2018 Red Hat, Inc. +# +# This program is free software; you can redistribute it and/or modify +# it under the terms of the GNU General Public License as published by +# the Free Software Foundation; either version 2 of the License, or +# any later version. +# +# This program is distributed in the hope that it will be useful, +# but WITHOUT ANY WARRANTY; without even the implied warranty of +# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the +# GNU General Public License for more details. +# +# You should have received a copy of the GNU General Public License along +# with this program; if not, write to the Free Software Foundation, Inc., +# 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA. + +from glusto.core import Glusto as g + +from glustolibs.gluster.constants import \ + TEST_LAYOUT_IS_COMPLETE as LAYOUT_IS_COMPLETE +from glustolibs.gluster.constants import FILETYPE_DIRS +from glustolibs.gluster.dht_test_utils import validate_files_in_dir +from glustolibs.gluster.exceptions import ExecutionError +from glustolibs.gluster.gluster_base_class import GlusterBaseClass, runs_on +from glustolibs.gluster.brick_libs import get_all_bricks +from glustolibs.io.utils import \ + compare_dir_structure_mount_with_brick as compare_dir_structure +from glustolibs.gluster.lib_utils import (add_user, del_user) +from glustolibs.misc.misc_libs import upload_scripts +from glustolibs.io.utils import ( + list_all_files_and_dirs_mounts, + wait_for_io_to_complete +) + + +@runs_on([['distributed', 'distributed-replicated', + 'dispersed', 'distributed-dispersed', 'replicated'], + ['glusterfs']]) +class DirChangePermRecursive(GlusterBaseClass): + @classmethod + def setUpClass(cls): + + # Calling GlusterBaseClass setUpClass + GlusterBaseClass.setUpClass.im_func(cls) + + # Upload io scripts for running IO on mounts + g.log.info("Upload io scripts to clients %s for running IO on " + "mounts", cls.clients) + script_local_path = ("/usr/share/glustolibs/io/scripts/" + "file_dir_ops.py") + cls.script_upload_path = ("/usr/share/glustolibs/io/scripts/" + "file_dir_ops.py") + ret = upload_scripts(cls.clients, script_local_path) + if not ret: + raise ExecutionError("Failed to upload IO scripts to clients %s" % + cls.clients) + g.log.info("Successfully uploaded IO scripts to clients %s", + cls.clients) + + def setUp(self): + # Calling GlusterBaseClass setUp + GlusterBaseClass.setUp.im_func(self) + + # Setup Volume and Mount Volume + g.log.info("Starting to Setup Volume and Mount Volume") + ret = self.setup_volume_and_mount_volume(mounts=self.mounts) + if not ret: + raise ExecutionError("Failed to Setup_Volume and Mount_Volume") + g.log.info("Successful in Setup Volume and Mount Volume") + + brick_list = get_all_bricks(self.mnode, self.volname) + # Add user on all nodes + for brick in brick_list: + brick_node, _ = brick.split(":") + add_user(brick_node, "test_user1") + add_user(brick_node, "test_user2") + + for mount_obj in self.mounts: + add_user(mount_obj.client_system, "test_user1") + add_user(mount_obj.client_system, "test_user2") + + def tearDown(self): + brick_list = get_all_bricks(self.mnode, self.volname) + for brick in brick_list: + brick_node, _ = brick.split(":") + del_user(brick_node, "test_user1") + del_user(brick_node, "test_user2") + + for mount_obj in self.mounts: + del_user(mount_obj.client_system, "test_user1") + del_user(mount_obj.client_system, "test_user2") + + # Unmount Volume and Cleanup Volume + g.log.info("Starting to Unmount Volume and Cleanup Volume") + ret = self.unmount_volume_and_cleanup_volume(mounts=self.mounts) + if not ret: + raise ExecutionError("Failed to Unmount Volume and Cleanup Volume") + g.log.info("Successful in Unmount Volume and Cleanup Volume") + + # Calling GlusterBaseClass tearDown + GlusterBaseClass.tearDownClass.im_func(self) + + def test_dir_change_perm_recursive(self): + # pylint: disable=too-many-statements + # Start IO on mounts + g.log.info("Starting IO on all mounts...") + self.all_mounts_procs = [] + for index, mount_obj in enumerate(self.mounts, start=1): + g.log.info("Starting IO on %s:%s", mount_obj.client_system, + mount_obj.mountpoint) + cmd = ("python %s create_deep_dirs_with_files " + "--dirname-start-num %d " + "--dir-depth 2 " + "--dir-length 5 " + "--max-num-of-dirs 5 " + "--num-of-files 5 %s" % (self.script_upload_path, + index + 10, + mount_obj.mountpoint)) + proc = g.run_async(mount_obj.client_system, cmd, + user=mount_obj.user) + self.all_mounts_procs.append(proc) + + # Wait for IO to complete + g.log.info("Wait for IO to complete as IO validation did not " + "succeed in test method") + ret = wait_for_io_to_complete(self.all_mounts_procs, self.mounts) + self.assertTrue(ret, "IO failed on some of the clients") + g.log.info("IO is successful on mount %s", self.clients[0]) + + # List all files and dirs created + g.log.info("List all files and directories:") + ret = list_all_files_and_dirs_mounts(self.mounts) + self.assertTrue(ret, "Failed to list all files and dirs") + g.log.info("Listing all files and directories is successful") + + # DHT Layout validation + g.log.debug("Verifying hash layout values %s:%s", + self.clients[0], self.mounts[0].mountpoint) + ret = validate_files_in_dir(self.clients[0], self.mounts[0].mountpoint, + test_type=LAYOUT_IS_COMPLETE, + file_type=FILETYPE_DIRS) + self.assertTrue(ret, "layout is complete: FAILED") + g.log.info("layout is complete: PASS") + + brick_list = get_all_bricks(self.mnode, self.volname) + self.assertIsNotNone(brick_list, "Failed to get brick list") + g.log.info("Successful in getting brick list %s", brick_list) + + mount_obj = self.mounts[0] + cmd = ("find %s -mindepth 1 -maxdepth 1 -type d | " + "xargs chown -R test_user1" % (mount_obj.mountpoint)) + rcode, _, err = g.run(mount_obj.client_system, cmd) + self.assertEqual(rcode, 0, err) + g.log.info("Change user owner successfully for testdir on %s", + mount_obj.client_system) + + retval = compare_dir_structure(mount_obj.client_system, + mount_obj.mountpoint, + brick_list, 0) + self.assertTrue(retval, "Failed to compare user permission for all" + " files/dir in mount directory with brick directory") + g.log.info("User permission is same on mount and brick directory") + + cmd = ("su -l test_user2 -c \"find %s -mindepth 1" + " -type d\"" % (mount_obj.mountpoint)) + rcode, _, err = g.run(mount_obj.client_system, cmd) + self.assertEqual(rcode, 0, err) + g.log.info("directory is successfully accessed with different user") + + cmd = ("su -l test_user2 -c \"find %s -mindepth 1" + " -type d | xargs chmod 777\"" % (mount_obj.mountpoint)) + rcode, _, err = g.run(mount_obj.client_system, cmd) + self.assertNotEqual(rcode, 0, err) + g.log.info("directory permission are not changed by different user") + + cmd = ("find %s -mindepth 1 -maxdepth 1 -type d | " + "xargs chgrp -R test_user1" % (mount_obj.mountpoint)) + rcode, _, err = g.run(mount_obj.client_system, cmd) + self.assertEqual(rcode, 0, err) + g.log.info("Change group owner successfully for testdir on %s", + mount_obj.client_system) + + retval = compare_dir_structure(mount_obj.client_system, + mount_obj.mountpoint, + brick_list, 1) + self.assertTrue(retval, "Failed to compare group permission for all" + " files/dir in mount directory with brick directory") + g.log.info("Group permission is same on mount and brick directory") + + cmd = ("su -l test_user2 -c \"find %s -mindepth 1" + " -type d\"" % (mount_obj.mountpoint)) + rcode, _, err = g.run(mount_obj.client_system, cmd) + self.assertEqual(rcode, 0, err) + g.log.info("directory is successfully accessed with different user") + + cmd = ("su -l test_user2 -c \"find %s -mindepth 1 -type d " + "| xargs chmod 777\"" % (mount_obj.mountpoint)) + rcode, _, err = g.run(mount_obj.client_system, cmd) + self.assertNotEqual(rcode, 0, err) + g.log.info("directory permission are not changed by different user") + + cmd = ("find %s -mindepth 1 -maxdepth 1 -type d | xargs chmod -R 777" + % (mount_obj.mountpoint)) + rcode, _, err = g.run(mount_obj.client_system, cmd) + self.assertEqual(rcode, 0, err) + g.log.info("Change permission 777 successfully for testdir on %s", + mount_obj.client_system) + + retval = compare_dir_structure(mount_obj.client_system, + mount_obj.mountpoint, + brick_list, 2) + self.assertTrue(retval, "Failed to compare permission for all" + " files/dir in mount directory with brick directory") + g.log.info("Permission is same on mount and brick directory") + + cmd = ("su -l test_user2 -c \"find %s -mindepth 1" + " -type d\"" % (mount_obj.mountpoint)) + rcode, _, err = g.run(mount_obj.client_system, cmd) + self.assertEqual(rcode, 0, err) + g.log.info("directory is successfully accessed with different user") + + cmd = ("su -l test_user2 -c \"find %s -mindepth 1" + " -type d | xargs chmod 666\"" % (mount_obj.mountpoint)) + rcode, _, err = g.run(mount_obj.client_system, cmd) + self.assertNotEqual(rcode, 0, err) + g.log.info("directory permission are not changed by different user") -- cgit