From 69fdcaccd9bea5b827f1a51c4d68edc0f7d12d86 Mon Sep 17 00:00:00 2001 From: Jilju Joy Date: Thu, 7 Jun 2018 13:43:04 +0530 Subject: Test to verify auth.allow setting using Fqdn of clients Change-Id: Iaad1dcb4339aa752a45e39d7bca338d1fdc87da0 --- .../functional/fuse_subdir/test_auth_allow_fqdn.py | 175 +++++++++++++++++++++ 1 file changed, 175 insertions(+) create mode 100644 tests/functional/fuse_subdir/test_auth_allow_fqdn.py (limited to 'tests') diff --git a/tests/functional/fuse_subdir/test_auth_allow_fqdn.py b/tests/functional/fuse_subdir/test_auth_allow_fqdn.py new file mode 100644 index 000000000..5428ea913 --- /dev/null +++ b/tests/functional/fuse_subdir/test_auth_allow_fqdn.py @@ -0,0 +1,175 @@ +# Copyright (C) 2017-2018 Red Hat, Inc. +# +# This program is free software; you can redistribute it and/or modify +# it under the terms of the GNU General Public License as published by +# the Free Software Foundation; either version 2 of the License, or +# any later version. +# +# This program is distributed in the hope that it will be useful, +# but WITHOUT ANY WARRANTY; without even the implied warranty of +# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the +# GNU General Public License for more details. +# +# You should have received a copy of the GNU General Public License along +# with this program; if not, write to the Free Software Foundation, Inc., +# 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA. + +""" Description: + Test Cases in this module tests the Fuse sub directory feature +""" +import copy +from glusto.core import Glusto as g +from glustolibs.gluster.gluster_base_class import (GlusterBaseClass, + runs_on) +from glustolibs.gluster.glusterdir import mkdir +from glustolibs.gluster.exceptions import ExecutionError +from glustolibs.gluster.auth_ops import set_auth_allow + + +@runs_on([['replicated', 'distributed', 'distributed-replicated', + 'dispersed', 'distributed-dispersed'], + ['glusterfs']]) +class FuseSubDirAuthAllowFqdn(GlusterBaseClass): + """ + Tests to verify auth.allow using fqdn on Fuse subdir feature + """ + @classmethod + def setUpClass(cls): + """ + Setup and mount volume + """ + GlusterBaseClass.setUpClass.im_func(cls) + # Setup Volume and Mount Volume + g.log.info("Starting volume setup and mount %s", + cls.volname) + ret = cls.setup_volume_and_mount_volume(cls.mounts) + if not ret: + raise ExecutionError("Failed to Setup " + "and Mount_Volume %s" % cls.volname) + g.log.info("Successfully set and mounted the volume: %s", cls.volname) + + def test_auth_allow_fqdn(self): + """ + Check sub dir auth.allow functionality using FQDN + + Steps: + 1. Create two sub directories on mounted volume + 2. Unmount volume from clients + 3. Set auth.allow on sub dir d1 for client1 and d2 for client2 using + fqdn + 4. Mount d1 on client1 and d2 on client2. This should pass. + 5. Try to mount d1 on client2 and d2 on client1. This should fail. + """ + # Creating sub directories on mounted volume + ret = mkdir(self.mounts[0].client_system, "%s/d1" + % self.mounts[0].mountpoint) + self.assertTrue(ret, ("Failed to create directory 'd1' in volume %s " + "from client %s" + % (self.volname, + self.mounts[0].client_system))) + ret = mkdir(self.mounts[0].client_system, "%s/d2" + % self.mounts[0].mountpoint) + self.assertTrue(ret, ("Failed to create directory 'd2' in volume %s " + "from client %s" + % (self.volname, + self.mounts[0].client_system))) + + # Unmounting volumes + ret = self.unmount_volume(self.mounts) + self.assertTrue(ret, "Failed to unmount one or more volumes") + g.log.info("Successfully unmounted all volumes") + + # Obtain hostname of clients + ret, hostname_client1, _ = g.run(self.mounts[0].client_system, + "hostname") + self.assertEqual(ret, 0, ("Failed to obtain hostname of client %s" + % self.mounts[0].client_system)) + g.log.info("Obtained hostname of client. IP- %s, hostname- %s", + self.mounts[0].client_system, hostname_client1.strip()) + + ret, hostname_client2, _ = g.run(self.mounts[1].client_system, + "hostname") + self.assertEqual(ret, 0, ("Failed to obtain hostname of client %s" + % self.mounts[1].client_system)) + g.log.info("Obtained hostname of client. IP- %s, hostname- %s", + self.mounts[1].client_system, hostname_client2.strip()) + + # Setting authentication + auth_dict = {'/d1': [hostname_client1.strip()], + '/d2': [hostname_client2.strip()]} + if not set_auth_allow(self.volname, self.mnode, auth_dict): + raise ExecutionError("Failed to set authentication") + g.log.info("Successfully set authentication on sub directories") + + # Creating mounts list for authenticated clients + self.subdir_mounts = [copy.deepcopy(self.mounts[0]), + copy.deepcopy(self.mounts[1])] + self.subdir_mounts[0].volname = "%s/d1" % self.volname + self.subdir_mounts[1].volname = "%s/d2" % self.volname + + # Mounting sub directories on authenticated clients + for mount_obj in self.subdir_mounts: + ret = mount_obj.mount() + self.assertTrue(ret, ("Failed to mount sub directory %s on client" + " %s" % (mount_obj.volname, + mount_obj.client_system))) + g.log.info("Successfully mounted sub directory %s on client %s", + mount_obj.volname, + mount_obj.client_system) + g.log.info("Successfully mounted sub directories to authenticated " + "clients") + + # Creating mounts list for unauthenticated clients + self.unauth_subdir_mounts = [copy.deepcopy(self.mounts[0]), + copy.deepcopy(self.mounts[1])] + self.unauth_subdir_mounts[0].volname = "%s/d2" % self.volname + self.unauth_subdir_mounts[1].volname = "%s/d1" % self.volname + self.unauth_subdir_mounts[0].mountpoint \ + = "%s_unauth" % self.unauth_subdir_mounts[0].mountpoint + self.unauth_subdir_mounts[1].mountpoint \ + = "%s_unauth" % self.unauth_subdir_mounts[1].mountpoint + + # Trying to mount volume sub directories on unauthenticated clients + for mount_obj in self.unauth_subdir_mounts: + if mount_obj.mount(): + g.log.warning("Mount command did not fail as expected. " + "sub-dir: %s, client: %s, mount point: %s", + mount_obj.volname, mount_obj.client_system, + mount_obj.mountpoint) + ret = mount_obj.is_mounted() + if ret: + self.subdir_mounts.append(mount_obj) + self.assertFalse(ret, ("Mount operation did not fail as " + "expected. Mount operation of sub " + "directory %s on client %s passed." + "Mount point: %s" + % (mount_obj.volname, + mount_obj.client_system, + mount_obj.mountpoint))) + g.log.info("Mount command passed. But sub directory " + "is not mounted. This is expected. " + "sub-dir: %s, client: %s, mount point: %s", + mount_obj.volname, mount_obj.client_system, + mount_obj.mountpoint) + g.log.info("Mount operation of sub directory %s on client %s " + "failed as expected.", mount_obj.volname, + mount_obj.client_system) + g.log.info("Verified mount operation of sub-dirs on " + "unauthenticated client. " + "Mount operation failed as expected.") + + # Unmount sub-directories + ret = self.unmount_volume(self.subdir_mounts) + if not ret: + raise ExecutionError("Failed to unmount sub-directories.") + g.log.info("Successfully unmounted all sub-directories.") + + def tearDown(self): + """ + Cleaning up volume + """ + g.log.info("Cleaning up volume.") + ret = self.cleanup_volume() + if not ret: + raise ExecutionError("Failed to cleanup volume.") + g.log.info("Successfully cleaned the volume.") -- cgit