# ROLE: primary-controller # ROLE: controller require 'spec_helper' require 'shared-examples' manifest = 'swift/proxy.pp' describe manifest do shared_examples 'catalog' do workers_max = Noop.hiera 'workers_max' role = Noop.hiera 'role' storage_hash = Noop.hiera_hash 'storage' swift_hash = Noop.hiera_hash 'swift' network_scheme = Noop.hiera_hash 'network_scheme' network_metadata = Noop.hiera_hash 'network_metadata' memcached_nodes = Noop.puppet_function('get_nodes_hash_by_roles', network_metadata, ['primary-controller', 'controller']) memcached_addresses = Noop.hiera 'memcached_addresses' memcached_port = Noop.hiera 'memcache_server_port', '11211' memcached_servers = memcached_addresses.map{ |n| n = n + ':' + memcached_port } swift_operator_roles = storage_hash.fetch('swift_operator_roles', ['admin', 'SwiftOperator', '_member_']) ring_part_power = swift_hash.fetch('ring_part_power', 10) ring_min_part_hours = Noop.hiera 'swift_ring_min_part_hours', 1 deploy_swift_proxy = Noop.hiera('deploy_swift_proxy') swift_proxies_num = (Noop.hiera('swift_proxies')).size rabbit_hosts = Noop.hiera('amqp_hosts') rabbit_user = Noop.hiera_structure('rabbit/user', 'nova') rabbit_password = Noop.hiera_structure('rabbit/password') network_scheme = Noop.hiera_hash 'network_scheme' internal_virtual_ip = Noop.hiera_structure('network_metadata/vips/management/ipaddr') if swift_proxies_num < 2 ring_replicas = 2 else ring_replicas = 3 end let (:storage_nets){ Noop.puppet_function 'get_routable_networks_for_network_role', network_scheme, 'swift/replication', ' ' } let (:mgmt_nets){ Noop.puppet_function 'get_routable_networks_for_network_role', network_scheme, 'swift/api', ' ' } let (:bind_to_one) { api_net = Noop.puppet_function 'get_network_role_property', 'swift/api', 'network' Noop.puppet_function 'has_ip_in_network', internal_virtual_ip, api_net } let(:ssl_hash) { Noop.hiera_hash 'use_ssl' } let(:internal_auth_protocol) { Noop.puppet_function 'get_ssl_property',ssl_hash,{},'keystone','internal','protocol','http' } let(:internal_auth_address) { Noop.puppet_function 'get_ssl_property',ssl_hash,{},'keystone','internal','hostname',[Noop.hiera('service_endpoint', ''), management_vip] } let(:admin_auth_protocol) { Noop.puppet_function 'get_ssl_property',ssl_hash,{},'keystone','admin','protocol','http' } let(:admin_auth_address) { Noop.puppet_function 'get_ssl_property',ssl_hash,{},'keystone','admin','hostname',[Noop.hiera('service_endpoint', ''), management_vip] } let(:auth_uri) { "#{internal_auth_protocol}://#{internal_auth_address}:5000/" } let(:identity_uri) { "#{admin_auth_protocol}://#{admin_auth_address}:35357/" } let(:proxy_port) { Noop.hiera 'proxy_port', '8080' } let(:swift_api_ipaddr) { Noop.puppet_function 'get_network_role_property', 'swift/api', 'ipaddr' } let(:swift_internal_protocol) { Noop.puppet_function 'get_ssl_property',ssl_hash,{},'swift','internal','protocol','http' } let(:swift_interal_address) { Noop.puppet_function 'get_ssl_property',ssl_hash,{},'swift','internal','hostname',[swift_api_ipaddr, management_vip] } # Swift if !(storage_hash['images_ceph'] and storage_hash['objects_ceph']) and !storage_hash['images_vcenter'] swift_partition = Noop.hiera 'swift_partition' if role == 'primary-controller' ['account', 'object', 'container'].each do | ring | it "should run rebalancing swift #{ring} ring" do should contain_exec("rebalance_#{ring}").with( 'command' => "swift-ring-builder /etc/swift/#{ring}.builder rebalance", 'user' => 'swift', 'returns' => [0,1], ) should contain_exec("create_#{ring}").with( 'command' => "swift-ring-builder /etc/swift/#{ring}.builder create #{ring_part_power} #{ring_replicas} #{ring_min_part_hours}", 'user' => 'swift', ) end end ['account', 'object', 'container'].each do | ring | it "should define swift::ringbuilder::rebalance[#{ring}] before swift proxy service" do should contain_swift__ringbuilder__rebalance(ring).that_comes_before('Service[swift-proxy-server]') end end ['account', 'object', 'container'].each do | ring | ['account', 'object', 'container'].each do | storage | it "should define swift::ringbuilder::rebalance[#{ring}] before swift::storage::generic[#{storage}]" do # expect(graph).to ensure_transitive_dependency("Swift::Ringbuilder::Rebalance[#{ring}]", # "Swift::Storage::Generic[#{storage}]") end end end end it 'should declare swift::proxy::cache class with correct memcache_servers parameter' do should contain_class('swift::proxy::cache').with( 'memcache_servers' => memcached_servers, ) end it 'should declare class swift::proxy::keystone with correct operator_roles parameter' do should contain_class('swift::proxy::keystone').with( 'operator_roles' => swift_operator_roles, ) end it 'should configure proxy workers' do fallback_workers = [[facts[:processorcount].to_i, 2].max, workers_max.to_i].min workers = swift_hash.fetch('workers', fallback_workers) should contain_class('swift::proxy').with( 'workers' => workers) end it 'should declare swift::proxy class with 4 processess on 4 CPU & 32G system' do should contain_class('swift::proxy').with( 'workers' => '4', ) end end if deploy_swift_proxy it 'should configure proxy workers' do fallback_workers = [[facts[:processorcount].to_i, 2].max, workers_max.to_i].min workers = swift_hash.fetch('workers', fallback_workers) should contain_class('swift::proxy').with( 'workers' => workers) end it 'should declare swift::proxy class with 4 processess on 4 CPU & 32G system' do should contain_class('swift::proxy').with( 'workers' => '4', ) end it 'should contain rabbit params' do should contain_class('openstack::swift::proxy').with( :rabbit_user => rabbit_user, :rabbit_password => rabbit_password, :rabbit_hosts => rabbit_hosts.split(', '), ) end it 'should configure health check service correctly' do if !bind_to_one should_not contain_class('openstack::swift:status').with( :endpoint => "#{swift_internal_protocol}://#{swift_internal_address}:#{proxy_port}", :scan_target => "#{internal_auth_address}:5000", :only_from => "127.0.0.1 240.0.0.2 #{storage_nets} #{mgmt_nets}", :con_timeout => 5 ).that_comes_before('Class[swift::dispersion]') else should_not contain_class('openstack::swift:status') end end it 'should contain valid auth uris' do should contain_class('swift::proxy::authtoken').with( 'auth_uri' => auth_uri, 'identity_uri' => identity_uri, ) end it 'should contain swift backups section in rsync conf' do should contain rsync__server__module('swift_backups').with( 'path' => '/etc/swift/backups', 'lock_file' => '/var/lock/swift_backups.lock', 'uid' => 'swift', 'gid' => 'swift', 'incoming_chmod' => false, 'outgoing_chmod' => false, 'max_connections' => '5', 'read_only' => true, ) end end end test_ubuntu_and_centos manifest end