4d23e9e9b7
This adds a few more assertions in acceptance tests to ensure storage servers(account-server, container-server and object-server) are listening on their tcp ports as expected. Change-Id: Idbcb3d6df962d99402a06f895369fe5f812d49ab
340 lines
12 KiB
Ruby
340 lines
12 KiB
Ruby
require 'spec_helper_acceptance'
|
|
|
|
describe 'basic swift' do
|
|
|
|
context 'default parameters' do
|
|
|
|
it 'should work with no errors' do
|
|
pp= <<-EOS
|
|
include openstack_integration
|
|
include openstack_integration::repos
|
|
include openstack_integration::apache
|
|
include openstack_integration::rabbitmq
|
|
include openstack_integration::mysql
|
|
include openstack_integration::memcached
|
|
include openstack_integration::keystone
|
|
|
|
exec { 'setenforce 0':
|
|
path => '/bin:/sbin:/usr/bin:/usr/sbin',
|
|
onlyif => 'which setenforce && getenforce | grep Enforcing',
|
|
before => Class['::swift'],
|
|
}
|
|
|
|
package { 'curl': ensure => present }
|
|
|
|
# Swift resources
|
|
class { 'swift':
|
|
# not sure how I want to deal with this shared secret
|
|
swift_hash_path_suffix => 'secrete',
|
|
package_ensure => latest,
|
|
}
|
|
class { 'swift::keystone::auth':
|
|
public_url => "http://${::openstack_integration::config::ip_for_url}:8080/v1/AUTH_%(tenant_id)s",
|
|
admin_url => "http://${::openstack_integration::config::ip_for_url}:8080",
|
|
internal_url => "http://${::openstack_integration::config::ip_for_url}:8080/v1/AUTH_%(tenant_id)s",
|
|
password => 'a_big_secret',
|
|
}
|
|
# === Configure Storage
|
|
class { 'swift::storage':
|
|
storage_local_net_ip => $::openstack_integration::config::host,
|
|
}
|
|
# create xfs partitions on a loopback device and mounts them
|
|
swift::storage::loopback { ['2','3','4']:
|
|
seek => '200000',
|
|
require => Class['swift'],
|
|
}
|
|
# Create storage policy 0 in swift.conf
|
|
swift::storage::policy { '0':
|
|
policy_name => 'Policy-0',
|
|
policy_aliases => 'basic, single, A',
|
|
default_policy => true,
|
|
policy_type => 'replication'
|
|
}
|
|
# Create storage policy 1 in swift.conf
|
|
swift::storage::policy { '1':
|
|
policy_name => '3-Replica-Policy',
|
|
policy_aliases => 'extra, triple, B',
|
|
default_policy => false,
|
|
deprecated => 'No',
|
|
}
|
|
# sets up storage nodes which is composed of a single
|
|
# device that contains an endpoint for an object, account, and container
|
|
swift::storage::node { '0':
|
|
mnt_base_dir => '/srv/node',
|
|
weight => 1,
|
|
zone => '2',
|
|
storage_local_net_ip => $::openstack_integration::config::host,
|
|
policy_index => 0,
|
|
require => Swift::Storage::Loopback['2','3','4'] ,
|
|
}
|
|
# ring_object_devices for a storage policy start with the policy id.
|
|
# Create 3 ring_object_device starting with "1:" to be
|
|
# added to an object-1 ring for storage policy 1.
|
|
ring_object_device { "1:${::openstack_integration::config::ip_for_url}:6000/2":
|
|
zone => 2,
|
|
weight => 1,
|
|
require => Swift::Storage::Loopback['2'],
|
|
}
|
|
ring_object_device { "1:${::openstack_integration::config::ip_for_url}:6000/3":
|
|
zone => 2,
|
|
weight => 1,
|
|
require => Swift::Storage::Loopback['3'] ,
|
|
}
|
|
ring_object_device { "1:${::openstack_integration::config::ip_for_url}:6000/4":
|
|
zone => 2,
|
|
weight => 1,
|
|
require => Swift::Storage::Loopback['4'] ,
|
|
}
|
|
class { 'swift::ringbuilder':
|
|
part_power => 18,
|
|
replicas => 1,
|
|
min_part_hours => 1,
|
|
}
|
|
swift::ringbuilder::policy_ring { '1':
|
|
part_power => 18,
|
|
replicas => 3,
|
|
min_part_hours => 1,
|
|
}
|
|
class { 'swift::proxy':
|
|
proxy_local_net_ip => $::openstack_integration::config::host,
|
|
pipeline => [
|
|
'catch_errors', 'gatekeeper', 'healthcheck', 'proxy-logging',
|
|
'cache', 'authtoken', 'keystone', 'symlink', 'proxy-logging',
|
|
'proxy-server'
|
|
],
|
|
account_autocreate => true,
|
|
}
|
|
class { 'swift::proxy::authtoken':
|
|
www_authenticate_uri => "${::openstack_integration::config::keystone_auth_uri}/v3",
|
|
auth_url => "${::openstack_integration::config::keystone_admin_uri}/",
|
|
password => 'a_big_secret',
|
|
}
|
|
class { 'swift::keystone::dispersion': } -> class { 'swift::dispersion': }
|
|
class { 'swift::objectexpirer':
|
|
interval => 600,
|
|
}
|
|
class { 'swift::proxy::cache':
|
|
memcache_servers => $::openstack_integration::config::swift_memcached_servers
|
|
}
|
|
class {
|
|
[
|
|
'swift::proxy::catch_errors',
|
|
'swift::proxy::gatekeeper',
|
|
'swift::proxy::healthcheck',
|
|
'swift::proxy::proxy_logging',
|
|
'swift::proxy::keystone',
|
|
'swift::proxy::symlink'
|
|
]:
|
|
}
|
|
class { 'swift::internal_client':
|
|
pipeline => [ 'catch_errors', 'proxy-logging', 'cache', 'symlink', 'proxy-server' ],
|
|
}
|
|
class { 'swift::internal_client::cache':
|
|
memcache_servers => $::openstack_integration::config::swift_memcached_servers
|
|
}
|
|
class {
|
|
[
|
|
'swift::internal_client::catch_errors',
|
|
'swift::internal_client::proxy_logging',
|
|
'swift::internal_client::symlink'
|
|
]:
|
|
}
|
|
EOS
|
|
|
|
# Need to be run 2 times because we have an exported when creating the ring.
|
|
apply_manifest(pp, :catch_failures => false)
|
|
apply_manifest(pp, :catch_failures => true)
|
|
# The third run tests idempotency
|
|
apply_manifest(pp, :catch_changes => true)
|
|
end
|
|
|
|
describe port(8080) do
|
|
it { is_expected.to be_listening.with('tcp') }
|
|
end
|
|
describe port(6000) do
|
|
it { is_expected.to be_listening.with('tcp') }
|
|
end
|
|
describe port(6001) do
|
|
it { is_expected.to be_listening.with('tcp') }
|
|
end
|
|
describe port(6002) do
|
|
it { is_expected.to be_listening.with('tcp') }
|
|
end
|
|
end
|
|
|
|
context 'Using swiftinit service provider' do
|
|
|
|
it 'should work with no errors' do
|
|
swiftinit_pp= <<-EOS
|
|
include openstack_integration
|
|
include openstack_integration::repos
|
|
include openstack_integration::apache
|
|
include openstack_integration::rabbitmq
|
|
include openstack_integration::mysql
|
|
include openstack_integration::memcached
|
|
include openstack_integration::keystone
|
|
|
|
exec { 'setenforce 0':
|
|
path => '/bin:/sbin:/usr/bin:/usr/sbin',
|
|
onlyif => 'which setenforce && getenforce | grep Enforcing',
|
|
before => Class['::swift'],
|
|
}
|
|
|
|
package { 'curl': ensure => present }
|
|
|
|
# Swift resources
|
|
class { 'swift':
|
|
# not sure how I want to deal with this shared secret
|
|
swift_hash_path_suffix => 'secrete',
|
|
package_ensure => latest,
|
|
}
|
|
class { 'swift::keystone::auth':
|
|
public_url => "http://${::openstack_integration::config::ip_for_url}:8080/v1/AUTH_%(tenant_id)s",
|
|
admin_url => "http://${::openstack_integration::config::ip_for_url}:8080",
|
|
internal_url => "http://${::openstack_integration::config::ip_for_url}:8080/v1/AUTH_%(tenant_id)s",
|
|
password => 'a_big_secret',
|
|
}
|
|
# === Configure Storage
|
|
class { 'swift::storage':
|
|
storage_local_net_ip => $::openstack_integration::config::host,
|
|
}
|
|
# create xfs partitions on a loopback device and mounts them
|
|
swift::storage::loopback { ['2','3','4']:
|
|
seek => '200000',
|
|
require => Class['swift'],
|
|
}
|
|
# Create storage policy 0 in swift.conf
|
|
swift::storage::policy { '0':
|
|
policy_name => 'Policy-0',
|
|
policy_aliases => 'basic, single, A',
|
|
default_policy => true,
|
|
policy_type => 'replication'
|
|
}
|
|
# Create storage policy 1 in swift.conf
|
|
swift::storage::policy { '1':
|
|
policy_name => '3-Replica-Policy',
|
|
policy_aliases => 'extra, triple, B',
|
|
default_policy => false,
|
|
deprecated => 'No',
|
|
}
|
|
# sets up storage nodes which is composed of a single
|
|
# device that contains an endpoint for an object, account, and container
|
|
swift::storage::node { '0':
|
|
mnt_base_dir => '/srv/node',
|
|
weight => 1,
|
|
zone => '2',
|
|
storage_local_net_ip => $::openstack_integration::config::host,
|
|
policy_index => 0,
|
|
require => Swift::Storage::Loopback['2','3','4'] ,
|
|
}
|
|
# ring_object_devices for a storage policy start with the policy id.
|
|
# Create 3 ring_object_device starting with "1:" to be
|
|
# added to an object-1 ring for storage policy 1.
|
|
ring_object_device { "1:${::openstack_integration::config::ip_for_url}:6000/2":
|
|
zone => 2,
|
|
weight => 1,
|
|
require => Swift::Storage::Loopback['2'],
|
|
}
|
|
ring_object_device { "1:${::openstack_integration::config::ip_for_url}:6000/3":
|
|
zone => 2,
|
|
weight => 1,
|
|
require => Swift::Storage::Loopback['3'] ,
|
|
}
|
|
ring_object_device { "1:${::openstack_integration::config::ip_for_url}:6000/4":
|
|
zone => 2,
|
|
weight => 1,
|
|
require => Swift::Storage::Loopback['4'] ,
|
|
}
|
|
class { 'swift::storage::account':
|
|
service_provider => 'swiftinit',
|
|
}
|
|
class { 'swift::storage::container':
|
|
service_provider => 'swiftinit',
|
|
}
|
|
class { 'swift::storage::object':
|
|
service_provider => 'swiftinit',
|
|
}
|
|
class { 'swift::ringbuilder':
|
|
part_power => 18,
|
|
replicas => 1,
|
|
min_part_hours => 1,
|
|
}
|
|
swift::ringbuilder::policy_ring { '1':
|
|
part_power => 18,
|
|
replicas => 3,
|
|
min_part_hours => 1,
|
|
}
|
|
class { 'swift::proxy':
|
|
proxy_local_net_ip => $::openstack_integration::config::host,
|
|
pipeline => [
|
|
'catch_errors', 'gatekeeper', 'healthcheck', 'proxy-logging',
|
|
'cache', 'authtoken', 'keystone', 'symlink', 'proxy-logging',
|
|
'proxy-server'
|
|
],
|
|
account_autocreate => true,
|
|
service_provider => 'swiftinit',
|
|
}
|
|
class { 'swift::proxy::authtoken':
|
|
www_authenticate_uri => "${::openstack_integration::config::keystone_auth_uri}/v3",
|
|
auth_url => "${::openstack_integration::config::keystone_admin_uri}/",
|
|
password => 'a_big_secret',
|
|
}
|
|
class { 'swift::keystone::dispersion': } -> class { 'swift::dispersion': }
|
|
class { 'swift::objectexpirer':
|
|
interval => 600,
|
|
service_provider => 'swiftinit',
|
|
}
|
|
class { 'swift::proxy::cache':
|
|
memcache_servers => $::openstack_integration::config::swift_memcached_servers
|
|
}
|
|
class {
|
|
[
|
|
'swift::proxy::catch_errors',
|
|
'swift::proxy::gatekeeper',
|
|
'swift::proxy::healthcheck',
|
|
'swift::proxy::proxy_logging',
|
|
'swift::proxy::keystone',
|
|
'swift::proxy::symlink'
|
|
]:
|
|
}
|
|
class { 'swift::internal_client':
|
|
pipeline => [ 'catch_errors', 'proxy-logging', 'cache', 'symlink', 'proxy-server' ],
|
|
}
|
|
class { 'swift::internal_client::cache':
|
|
memcache_servers => $::openstack_integration::config::swift_memcached_servers
|
|
}
|
|
class {
|
|
[
|
|
'swift::internal_client::catch_errors',
|
|
'swift::internal_client::proxy_logging',
|
|
'swift::internal_client::symlink'
|
|
]:
|
|
}
|
|
EOS
|
|
|
|
# NOTE(tkajinam): The scenario with swiftinit provider causes broken
|
|
# idempotency. We disable the scenario temporarily.
|
|
if os[:family].casecmp('RedHat') == 0
|
|
# Run one time to catch any errors upgrading to swiftinit service provider
|
|
apply_manifest(swiftinit_pp, :catch_failures => true)
|
|
# The second run tests idempotency
|
|
apply_manifest(swiftinit_pp, :catch_changes => true)
|
|
end
|
|
|
|
end
|
|
|
|
describe port(8080) do
|
|
it { is_expected.to be_listening.with('tcp') }
|
|
end
|
|
describe port(6000) do
|
|
it { is_expected.to be_listening.with('tcp') }
|
|
end
|
|
describe port(6001) do
|
|
it { is_expected.to be_listening.with('tcp') }
|
|
end
|
|
describe port(6002) do
|
|
it { is_expected.to be_listening.with('tcp') }
|
|
end
|
|
end
|
|
end
|