puppet-swift/spec/acceptance/10_basic_swift_spec.rb
Takashi Kajinami 4d23e9e9b7 Ensure storage servers are listening
This adds a few more assertions in acceptance tests to ensure storage
servers(account-server, container-server and object-server) are
listening on their tcp ports as expected.

Change-Id: Idbcb3d6df962d99402a06f895369fe5f812d49ab
2023-03-22 18:24:22 +09:00

340 lines
12 KiB
Ruby

require 'spec_helper_acceptance'
describe 'basic swift' do
context 'default parameters' do
it 'should work with no errors' do
pp= <<-EOS
include openstack_integration
include openstack_integration::repos
include openstack_integration::apache
include openstack_integration::rabbitmq
include openstack_integration::mysql
include openstack_integration::memcached
include openstack_integration::keystone
exec { 'setenforce 0':
path => '/bin:/sbin:/usr/bin:/usr/sbin',
onlyif => 'which setenforce && getenforce | grep Enforcing',
before => Class['::swift'],
}
package { 'curl': ensure => present }
# Swift resources
class { 'swift':
# not sure how I want to deal with this shared secret
swift_hash_path_suffix => 'secrete',
package_ensure => latest,
}
class { 'swift::keystone::auth':
public_url => "http://${::openstack_integration::config::ip_for_url}:8080/v1/AUTH_%(tenant_id)s",
admin_url => "http://${::openstack_integration::config::ip_for_url}:8080",
internal_url => "http://${::openstack_integration::config::ip_for_url}:8080/v1/AUTH_%(tenant_id)s",
password => 'a_big_secret',
}
# === Configure Storage
class { 'swift::storage':
storage_local_net_ip => $::openstack_integration::config::host,
}
# create xfs partitions on a loopback device and mounts them
swift::storage::loopback { ['2','3','4']:
seek => '200000',
require => Class['swift'],
}
# Create storage policy 0 in swift.conf
swift::storage::policy { '0':
policy_name => 'Policy-0',
policy_aliases => 'basic, single, A',
default_policy => true,
policy_type => 'replication'
}
# Create storage policy 1 in swift.conf
swift::storage::policy { '1':
policy_name => '3-Replica-Policy',
policy_aliases => 'extra, triple, B',
default_policy => false,
deprecated => 'No',
}
# sets up storage nodes which is composed of a single
# device that contains an endpoint for an object, account, and container
swift::storage::node { '0':
mnt_base_dir => '/srv/node',
weight => 1,
zone => '2',
storage_local_net_ip => $::openstack_integration::config::host,
policy_index => 0,
require => Swift::Storage::Loopback['2','3','4'] ,
}
# ring_object_devices for a storage policy start with the policy id.
# Create 3 ring_object_device starting with "1:" to be
# added to an object-1 ring for storage policy 1.
ring_object_device { "1:${::openstack_integration::config::ip_for_url}:6000/2":
zone => 2,
weight => 1,
require => Swift::Storage::Loopback['2'],
}
ring_object_device { "1:${::openstack_integration::config::ip_for_url}:6000/3":
zone => 2,
weight => 1,
require => Swift::Storage::Loopback['3'] ,
}
ring_object_device { "1:${::openstack_integration::config::ip_for_url}:6000/4":
zone => 2,
weight => 1,
require => Swift::Storage::Loopback['4'] ,
}
class { 'swift::ringbuilder':
part_power => 18,
replicas => 1,
min_part_hours => 1,
}
swift::ringbuilder::policy_ring { '1':
part_power => 18,
replicas => 3,
min_part_hours => 1,
}
class { 'swift::proxy':
proxy_local_net_ip => $::openstack_integration::config::host,
pipeline => [
'catch_errors', 'gatekeeper', 'healthcheck', 'proxy-logging',
'cache', 'authtoken', 'keystone', 'symlink', 'proxy-logging',
'proxy-server'
],
account_autocreate => true,
}
class { 'swift::proxy::authtoken':
www_authenticate_uri => "${::openstack_integration::config::keystone_auth_uri}/v3",
auth_url => "${::openstack_integration::config::keystone_admin_uri}/",
password => 'a_big_secret',
}
class { 'swift::keystone::dispersion': } -> class { 'swift::dispersion': }
class { 'swift::objectexpirer':
interval => 600,
}
class { 'swift::proxy::cache':
memcache_servers => $::openstack_integration::config::swift_memcached_servers
}
class {
[
'swift::proxy::catch_errors',
'swift::proxy::gatekeeper',
'swift::proxy::healthcheck',
'swift::proxy::proxy_logging',
'swift::proxy::keystone',
'swift::proxy::symlink'
]:
}
class { 'swift::internal_client':
pipeline => [ 'catch_errors', 'proxy-logging', 'cache', 'symlink', 'proxy-server' ],
}
class { 'swift::internal_client::cache':
memcache_servers => $::openstack_integration::config::swift_memcached_servers
}
class {
[
'swift::internal_client::catch_errors',
'swift::internal_client::proxy_logging',
'swift::internal_client::symlink'
]:
}
EOS
# Need to be run 2 times because we have an exported when creating the ring.
apply_manifest(pp, :catch_failures => false)
apply_manifest(pp, :catch_failures => true)
# The third run tests idempotency
apply_manifest(pp, :catch_changes => true)
end
describe port(8080) do
it { is_expected.to be_listening.with('tcp') }
end
describe port(6000) do
it { is_expected.to be_listening.with('tcp') }
end
describe port(6001) do
it { is_expected.to be_listening.with('tcp') }
end
describe port(6002) do
it { is_expected.to be_listening.with('tcp') }
end
end
context 'Using swiftinit service provider' do
it 'should work with no errors' do
swiftinit_pp= <<-EOS
include openstack_integration
include openstack_integration::repos
include openstack_integration::apache
include openstack_integration::rabbitmq
include openstack_integration::mysql
include openstack_integration::memcached
include openstack_integration::keystone
exec { 'setenforce 0':
path => '/bin:/sbin:/usr/bin:/usr/sbin',
onlyif => 'which setenforce && getenforce | grep Enforcing',
before => Class['::swift'],
}
package { 'curl': ensure => present }
# Swift resources
class { 'swift':
# not sure how I want to deal with this shared secret
swift_hash_path_suffix => 'secrete',
package_ensure => latest,
}
class { 'swift::keystone::auth':
public_url => "http://${::openstack_integration::config::ip_for_url}:8080/v1/AUTH_%(tenant_id)s",
admin_url => "http://${::openstack_integration::config::ip_for_url}:8080",
internal_url => "http://${::openstack_integration::config::ip_for_url}:8080/v1/AUTH_%(tenant_id)s",
password => 'a_big_secret',
}
# === Configure Storage
class { 'swift::storage':
storage_local_net_ip => $::openstack_integration::config::host,
}
# create xfs partitions on a loopback device and mounts them
swift::storage::loopback { ['2','3','4']:
seek => '200000',
require => Class['swift'],
}
# Create storage policy 0 in swift.conf
swift::storage::policy { '0':
policy_name => 'Policy-0',
policy_aliases => 'basic, single, A',
default_policy => true,
policy_type => 'replication'
}
# Create storage policy 1 in swift.conf
swift::storage::policy { '1':
policy_name => '3-Replica-Policy',
policy_aliases => 'extra, triple, B',
default_policy => false,
deprecated => 'No',
}
# sets up storage nodes which is composed of a single
# device that contains an endpoint for an object, account, and container
swift::storage::node { '0':
mnt_base_dir => '/srv/node',
weight => 1,
zone => '2',
storage_local_net_ip => $::openstack_integration::config::host,
policy_index => 0,
require => Swift::Storage::Loopback['2','3','4'] ,
}
# ring_object_devices for a storage policy start with the policy id.
# Create 3 ring_object_device starting with "1:" to be
# added to an object-1 ring for storage policy 1.
ring_object_device { "1:${::openstack_integration::config::ip_for_url}:6000/2":
zone => 2,
weight => 1,
require => Swift::Storage::Loopback['2'],
}
ring_object_device { "1:${::openstack_integration::config::ip_for_url}:6000/3":
zone => 2,
weight => 1,
require => Swift::Storage::Loopback['3'] ,
}
ring_object_device { "1:${::openstack_integration::config::ip_for_url}:6000/4":
zone => 2,
weight => 1,
require => Swift::Storage::Loopback['4'] ,
}
class { 'swift::storage::account':
service_provider => 'swiftinit',
}
class { 'swift::storage::container':
service_provider => 'swiftinit',
}
class { 'swift::storage::object':
service_provider => 'swiftinit',
}
class { 'swift::ringbuilder':
part_power => 18,
replicas => 1,
min_part_hours => 1,
}
swift::ringbuilder::policy_ring { '1':
part_power => 18,
replicas => 3,
min_part_hours => 1,
}
class { 'swift::proxy':
proxy_local_net_ip => $::openstack_integration::config::host,
pipeline => [
'catch_errors', 'gatekeeper', 'healthcheck', 'proxy-logging',
'cache', 'authtoken', 'keystone', 'symlink', 'proxy-logging',
'proxy-server'
],
account_autocreate => true,
service_provider => 'swiftinit',
}
class { 'swift::proxy::authtoken':
www_authenticate_uri => "${::openstack_integration::config::keystone_auth_uri}/v3",
auth_url => "${::openstack_integration::config::keystone_admin_uri}/",
password => 'a_big_secret',
}
class { 'swift::keystone::dispersion': } -> class { 'swift::dispersion': }
class { 'swift::objectexpirer':
interval => 600,
service_provider => 'swiftinit',
}
class { 'swift::proxy::cache':
memcache_servers => $::openstack_integration::config::swift_memcached_servers
}
class {
[
'swift::proxy::catch_errors',
'swift::proxy::gatekeeper',
'swift::proxy::healthcheck',
'swift::proxy::proxy_logging',
'swift::proxy::keystone',
'swift::proxy::symlink'
]:
}
class { 'swift::internal_client':
pipeline => [ 'catch_errors', 'proxy-logging', 'cache', 'symlink', 'proxy-server' ],
}
class { 'swift::internal_client::cache':
memcache_servers => $::openstack_integration::config::swift_memcached_servers
}
class {
[
'swift::internal_client::catch_errors',
'swift::internal_client::proxy_logging',
'swift::internal_client::symlink'
]:
}
EOS
# NOTE(tkajinam): The scenario with swiftinit provider causes broken
# idempotency. We disable the scenario temporarily.
if os[:family].casecmp('RedHat') == 0
# Run one time to catch any errors upgrading to swiftinit service provider
apply_manifest(swiftinit_pp, :catch_failures => true)
# The second run tests idempotency
apply_manifest(swiftinit_pp, :catch_changes => true)
end
end
describe port(8080) do
it { is_expected.to be_listening.with('tcp') }
end
describe port(6000) do
it { is_expected.to be_listening.with('tcp') }
end
describe port(6001) do
it { is_expected.to be_listening.with('tcp') }
end
describe port(6002) do
it { is_expected.to be_listening.with('tcp') }
end
end
end