250 lines
10 KiB
Python
250 lines
10 KiB
Python
# Copyright 2015 Tesora Inc.
|
|
# All Rights Reserved.
|
|
#
|
|
# Licensed under the Apache License, Version 2.0 (the "License"); you may
|
|
# not use this file except in compliance with the License. You may obtain
|
|
# a copy of the License at
|
|
#
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
#
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
|
|
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
|
|
# License for the specific language governing permissions and limitations
|
|
# under the License.
|
|
|
|
from proboscis import SkipTest
|
|
|
|
from trove.common import utils
|
|
from trove.tests.scenario import runners
|
|
from trove.tests.scenario.runners.test_runners import SkipKnownBug
|
|
from trove.tests.scenario.runners.test_runners import TestRunner
|
|
from troveclient.compat import exceptions
|
|
|
|
|
|
class RootActionsRunner(TestRunner):
|
|
|
|
def __init__(self):
|
|
self.current_root_creds = None
|
|
self.restored_root_creds = None
|
|
self.restored_root_creds2 = None
|
|
super(RootActionsRunner, self).__init__()
|
|
|
|
def run_check_root_never_enabled(self, expected_http_code=200):
|
|
self.assert_root_disabled(self.instance_info.id, expected_http_code)
|
|
|
|
def assert_root_disabled(self, instance_id, expected_http_code):
|
|
self._assert_root_state(instance_id, False, expected_http_code,
|
|
"The root has already been enabled on the "
|
|
"instance.")
|
|
|
|
def _assert_root_state(self, instance_id, expected_state,
|
|
expected_http_code, message):
|
|
# The call returns a nameless user object with 'rootEnabled' attribute.
|
|
client = self.auth_client
|
|
response = client.root.is_root_enabled(instance_id)
|
|
self.assert_client_code(client, expected_http_code)
|
|
actual_state = getattr(response, 'rootEnabled', None)
|
|
self.assert_equal(expected_state, actual_state, message)
|
|
|
|
def run_disable_root_before_enabled(
|
|
self, expected_exception=exceptions.NotFound,
|
|
expected_http_code=404):
|
|
self.assert_root_disable_failure(
|
|
self.instance_info.id, expected_exception, expected_http_code)
|
|
|
|
def assert_root_disable_failure(self, instance_id, expected_exception,
|
|
expected_http_code):
|
|
client = self.auth_client
|
|
self.assert_raises(expected_exception, expected_http_code,
|
|
client, client.root.delete, instance_id)
|
|
|
|
def run_enable_root_no_password(self, expected_http_code=200):
|
|
root_credentials = self.test_helper.get_helper_credentials_root()
|
|
self.current_root_creds = self.assert_root_create(
|
|
self.instance_info.id, None, root_credentials['name'],
|
|
expected_http_code)
|
|
self.restored_root_creds = list(self.current_root_creds)
|
|
|
|
def assert_root_create(self, instance_id, root_password,
|
|
expected_root_name, expected_http_code):
|
|
client = self.auth_client
|
|
if root_password is not None:
|
|
root_creds = client.root.create_instance_root(
|
|
instance_id, root_password)
|
|
self.assert_equal(root_password, root_creds[1])
|
|
else:
|
|
root_creds = client.root.create(instance_id)
|
|
|
|
self.assert_client_code(client, expected_http_code)
|
|
if expected_root_name is not None:
|
|
self.assert_equal(expected_root_name, root_creds[0])
|
|
|
|
self.assert_can_connect(instance_id, root_creds)
|
|
|
|
return root_creds
|
|
|
|
def assert_can_connect(self, instance_id, test_connect_creds):
|
|
self._assert_connect(instance_id, True, test_connect_creds)
|
|
|
|
def _assert_connect(self, instance_id, expected_response,
|
|
test_connect_creds):
|
|
host = self.get_instance_host(instance_id=instance_id)
|
|
self.report.log(
|
|
"Pinging instance %s with credentials: %s, database: %s" %
|
|
(instance_id, test_connect_creds,
|
|
self.test_helper.credentials.get("database"))
|
|
)
|
|
|
|
ping_response = self.test_helper.ping(
|
|
host,
|
|
username=test_connect_creds[0],
|
|
password=test_connect_creds[1],
|
|
database=self.test_helper.credentials.get("database")
|
|
)
|
|
|
|
self.assert_equal(expected_response, ping_response)
|
|
|
|
def run_check_root_enabled(self, expected_http_code=200):
|
|
self.assert_root_enabled(self.instance_info.id, expected_http_code)
|
|
|
|
def assert_root_enabled(self, instance_id, expected_http_code):
|
|
self._assert_root_state(instance_id, True, expected_http_code,
|
|
"The root has not been enabled on the "
|
|
"instance yet.")
|
|
|
|
def run_enable_root_with_password(self, expected_http_code=200):
|
|
root_credentials = self.test_helper.get_helper_credentials_root()
|
|
password = root_credentials['password']
|
|
if password is not None:
|
|
self.current_root_creds = self.assert_root_create(
|
|
self.instance_info.id,
|
|
password, root_credentials['name'],
|
|
expected_http_code)
|
|
else:
|
|
raise SkipTest("No valid root password defined in %s."
|
|
% self.test_helper.get_class_name())
|
|
|
|
def run_disable_root(self, expected_http_code=204):
|
|
self.restored_root_creds2 = list(self.current_root_creds)
|
|
self.assert_root_disable(self.instance_info.id, expected_http_code)
|
|
|
|
def assert_root_disable(self, instance_id, expected_http_code):
|
|
client = self.auth_client
|
|
client.root.delete(instance_id)
|
|
self.assert_client_code(client, expected_http_code)
|
|
self.assert_cannot_connect(self.instance_info.id,
|
|
self.current_root_creds)
|
|
|
|
def assert_cannot_connect(self, instance_id, test_connect_creds):
|
|
self._assert_connect(instance_id, False, test_connect_creds)
|
|
|
|
def run_check_root_still_enabled_after_disable(
|
|
self, expected_http_code=200):
|
|
self.assert_root_enabled(self.instance_info.id, expected_http_code)
|
|
|
|
def run_delete_root(self, expected_exception=exceptions.BadRequest,
|
|
expected_http_code=400):
|
|
self.assert_root_delete_failure(
|
|
self.instance_info.id, expected_exception, expected_http_code)
|
|
|
|
def assert_root_delete_failure(self, instance_id, expected_exception,
|
|
expected_http_code):
|
|
root_user_name = self.current_root_creds[0]
|
|
client = self.auth_client
|
|
self.assert_raises(expected_exception, expected_http_code,
|
|
client, client.users.delete,
|
|
instance_id, root_user_name)
|
|
|
|
def run_check_root_enabled_after_restore(
|
|
self, restored_instance_id, restored_creds,
|
|
expected_http_code=200):
|
|
self.assert_root_enabled_after_restore(
|
|
restored_instance_id, restored_creds, True, expected_http_code)
|
|
|
|
def run_check_root_enabled_after_restore2(
|
|
self, restored_instance_id, restored_creds,
|
|
expected_http_code=200):
|
|
self.assert_root_enabled_after_restore(
|
|
restored_instance_id, restored_creds, False, expected_http_code)
|
|
|
|
def assert_root_enabled_after_restore(
|
|
self, restored_instance_id, restored_creds,
|
|
expected_connect_response, expected_http_code):
|
|
if restored_instance_id:
|
|
self.assert_root_enabled(restored_instance_id, expected_http_code)
|
|
self._assert_connect(restored_instance_id,
|
|
expected_connect_response, restored_creds)
|
|
else:
|
|
raise SkipTest("No restored instance.")
|
|
|
|
def check_root_disable_supported(self):
|
|
"""Throw SkipTest if root-disable is not supported."""
|
|
pass
|
|
|
|
def check_inherit_root_state_supported(self):
|
|
"""Throw SkipTest if inherting root state is not supported."""
|
|
pass
|
|
|
|
|
|
class PerconaRootActionsRunner(RootActionsRunner):
|
|
|
|
def check_root_disable_supported(self):
|
|
raise SkipTest("Operation is currently not supported.")
|
|
|
|
|
|
class MariadbRootActionsRunner(RootActionsRunner):
|
|
|
|
def check_root_disable_supported(self):
|
|
raise SkipTest("Operation is currently not supported.")
|
|
|
|
|
|
class PxcRootActionsRunner(RootActionsRunner):
|
|
|
|
def check_root_disable_supported(self):
|
|
raise SkipTest("Operation is currently not supported.")
|
|
|
|
|
|
class PostgresqlRootActionsRunner(RootActionsRunner):
|
|
|
|
def check_root_disable_supported(self):
|
|
raise SkipTest("Operation is currently not supported.")
|
|
|
|
def run_enable_root_with_password(self):
|
|
raise SkipTest("Operation is currently not supported.")
|
|
|
|
def run_delete_root(self):
|
|
raise SkipKnownBug(runners.BUG_WRONG_API_VALIDATION)
|
|
|
|
|
|
class CouchbaseRootActionsRunner(RootActionsRunner):
|
|
|
|
def _assert_connect(
|
|
self, instance_id, expected_response, test_connect_creds):
|
|
host = self.get_instance_host(instance_id=instance_id)
|
|
self.report.log("Pinging instance %s with credentials: %s"
|
|
% (instance_id, test_connect_creds))
|
|
mgmt_port = 8091
|
|
mgmt_creds = '%s:%s' % (test_connect_creds[0], test_connect_creds[1])
|
|
rest_endpoint = ('http://%s:%d/pools/nodes'
|
|
% (host, mgmt_port))
|
|
out, err = utils.execute_with_timeout(
|
|
'curl', '-u', mgmt_creds, rest_endpoint)
|
|
self.assert_equal(expected_response, out and len(out) > 0)
|
|
|
|
def check_root_disable_supported(self):
|
|
raise SkipTest("Operation is currently not supported.")
|
|
|
|
def run_enable_root_with_password(self):
|
|
raise SkipTest("Operation is currently not supported.")
|
|
|
|
def run_delete_root(self):
|
|
raise SkipKnownBug(runners.BUG_WRONG_API_VALIDATION)
|
|
|
|
|
|
class RedisRootActionsRunner(RootActionsRunner):
|
|
|
|
def check_inherit_root_state_supported(self):
|
|
raise SkipTest("Redis instances does not inherit root state "
|
|
"from backups.")
|