* Changes the reddwarf.conf.test flag so "use_nova_server_volume" is turned off, as it should be, and fixes a resulting fake mode bug. * Fixes tests to not check for volume when "reddwarf_main_instance_has_volume" is specified in the test config. * Changes poll_until to reuse Reddwarf implementation instead of rewriting it just for the tests. * Adds tests to confirm its possible to log into a real MySQL instance. These are only run for "real mode" in a VM or other environment, but it's necessary that they live here. * Changes the "get_address" method of the InstanceTestInfo object to get pulled from the test config (necessary when hitting other environments). * Fixes some bugs in guest agent models. * Deleted the pagination test. It can't run very quickly in the tox fake mode, so there's no point in keeping it here (it still exists in Reddwarf-Integration). Change-Id: I2835762c4180e1ca594b27194564b8f993aa4066 Fixes: bug #1085188
182 lines
7.2 KiB
Python
182 lines
7.2 KiB
Python
# Copyright 2011 OpenStack LLC
|
|
#
|
|
# Licensed under the Apache License, Version 2.0 (the "License"); you may
|
|
# not use this file except in compliance with the License. You may obtain
|
|
# a copy of the License at
|
|
#
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
#
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
|
|
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
|
|
# License for the specific language governing permissions and limitations
|
|
# under the License.
|
|
|
|
import time
|
|
|
|
from reddwarfclient import exceptions
|
|
|
|
from nose.plugins.skip import SkipTest
|
|
from proboscis import before_class
|
|
from proboscis import test
|
|
from proboscis.asserts import assert_equal
|
|
from proboscis.asserts import assert_false
|
|
from proboscis.asserts import assert_not_equal
|
|
from proboscis.asserts import assert_raises
|
|
from proboscis.asserts import assert_true
|
|
from proboscis.asserts import fail
|
|
from proboscis.decorators import expect_exception
|
|
from proboscis.decorators import time_out
|
|
|
|
from reddwarf import tests
|
|
from reddwarf.tests.api.users import TestUsers
|
|
from reddwarf.tests.api.instances import GROUP_START
|
|
from reddwarf.tests.api.instances import instance_info
|
|
from reddwarf.tests import util
|
|
from reddwarf.tests.util import test_config
|
|
from reddwarf.tests.api.databases import TestMysqlAccess
|
|
|
|
|
|
GROUP = "dbaas.api.root"
|
|
|
|
|
|
def log_in_as_root(root_password):
|
|
con = create_mysql_connection(instance_info.get_address(), 'root',
|
|
root_password)
|
|
return con
|
|
|
|
|
|
@test(depends_on_classes=[TestMysqlAccess],
|
|
runs_after=[TestUsers],
|
|
groups=[tests.DBAAS_API, GROUP, tests.INSTANCES])
|
|
class TestRoot(object):
|
|
"""
|
|
Test the root operations
|
|
"""
|
|
|
|
root_enabled_timestamp = 'Never'
|
|
system_users = ['root', 'debian_sys_maint']
|
|
|
|
@before_class
|
|
def setUp(self):
|
|
self.dbaas = util.create_dbaas_client(instance_info.user)
|
|
self.dbaas_admin = util.create_dbaas_client(instance_info.admin_user)
|
|
|
|
def _verify_root_timestamp(self, id):
|
|
reh = self.dbaas_admin.management.root_enabled_history(id)
|
|
timestamp = reh.enabled
|
|
assert_equal(self.root_enabled_timestamp, timestamp)
|
|
assert_equal(id, reh.id)
|
|
|
|
def _root(self):
|
|
global root_password
|
|
host = "%"
|
|
user, password = self.dbaas.root.create(instance_info.id)
|
|
assert_equal(200, self.dbaas.last_http_code)
|
|
reh = self.dbaas_admin.management.root_enabled_history
|
|
self.root_enabled_timestamp = reh(instance_info.id).enabled
|
|
|
|
@test
|
|
def test_root_initially_disabled(self):
|
|
"""Test that root is disabled"""
|
|
enabled = self.dbaas.root.is_root_enabled(instance_info.id)
|
|
assert_equal(200, self.dbaas.last_http_code)
|
|
assert_false(enabled, "Root SHOULD NOT be enabled.")
|
|
|
|
@test
|
|
def test_create_user_os_admin_failure(self):
|
|
users = []
|
|
users.append({"name": "os_admin", "password": "12345"})
|
|
assert_raises(exceptions.BadRequest, self.dbaas.users.create,
|
|
instance_info.id, users)
|
|
|
|
@test
|
|
def test_delete_user_os_admin_failure(self):
|
|
assert_raises(exceptions.BadRequest, self.dbaas.users.delete,
|
|
instance_info.id, "os_admin")
|
|
|
|
@test(depends_on=[test_root_initially_disabled],
|
|
enabled=not test_config.values['root_removed_from_instance_api'])
|
|
def test_root_initially_disabled_details(self):
|
|
"""Use instance details to test that root is disabled."""
|
|
instance = self.dbaas.instances.get(instance_info.id)
|
|
assert_true(hasattr(instance, 'rootEnabled'),
|
|
"Instance has no rootEnabled property.")
|
|
assert_false(instance.rootEnabled, "Root SHOULD NOT be enabled.")
|
|
assert_equal(self.root_enabled_timestamp, 'Never')
|
|
|
|
@test(depends_on=[test_root_initially_disabled_details])
|
|
def test_root_disabled_in_mgmt_api(self):
|
|
"""Verifies in the management api that the timestamp exists"""
|
|
self._verify_root_timestamp(instance_info.id)
|
|
|
|
@test(depends_on=[test_root_initially_disabled_details])
|
|
def test_enable_root(self):
|
|
self._root()
|
|
|
|
@test(depends_on=[test_enable_root])
|
|
def test_enabled_timestamp(self):
|
|
assert_not_equal(self.root_enabled_timestamp, 'Never')
|
|
|
|
@test(depends_on=[test_enable_root])
|
|
def test_root_not_in_users_list(self):
|
|
"""
|
|
Tests that despite having enabled root, user root doesn't appear
|
|
in the users list for the instance.
|
|
"""
|
|
users = self.dbaas.users.list(instance_info.id)
|
|
usernames = [user.name for user in users]
|
|
assert_true('root' not in usernames)
|
|
|
|
@test(depends_on=[test_enable_root])
|
|
def test_root_now_enabled(self):
|
|
"""Test that root is now enabled."""
|
|
enabled = self.dbaas.root.is_root_enabled(instance_info.id)
|
|
assert_equal(200, self.dbaas.last_http_code)
|
|
assert_true(enabled, "Root SHOULD be enabled.")
|
|
|
|
@test(depends_on=[test_root_now_enabled],
|
|
enabled=not test_config.values['root_removed_from_instance_api'])
|
|
def test_root_now_enabled_details(self):
|
|
"""Use instance details to test that root is now enabled."""
|
|
instance = self.dbaas.instances.get(instance_info.id)
|
|
assert_true(hasattr(instance, 'rootEnabled'),
|
|
"Instance has no rootEnabled property.")
|
|
assert_true(instance.rootEnabled, "Root SHOULD be enabled.")
|
|
assert_not_equal(self.root_enabled_timestamp, 'Never')
|
|
self._verify_root_timestamp(instance_info.id)
|
|
|
|
@test(depends_on=[test_root_now_enabled_details])
|
|
def test_reset_root(self):
|
|
if test_config.values['root_timestamp_disabled']:
|
|
raise SkipTest("Enabled timestamp not enabled yet")
|
|
old_ts = self.root_enabled_timestamp
|
|
self._root()
|
|
assert_not_equal(self.root_enabled_timestamp, 'Never')
|
|
assert_equal(self.root_enabled_timestamp, old_ts)
|
|
|
|
@test(depends_on=[test_reset_root])
|
|
def test_root_still_enabled(self):
|
|
"""Test that after root was reset it's still enabled."""
|
|
enabled = self.dbaas.root.is_root_enabled(instance_info.id)
|
|
assert_equal(200, self.dbaas.last_http_code)
|
|
assert_true(enabled, "Root SHOULD still be enabled.")
|
|
|
|
@test(depends_on=[test_root_still_enabled],
|
|
enabled=not test_config.values['root_removed_from_instance_api'])
|
|
def test_root_still_enabled_details(self):
|
|
"""Use instance details to test that after root was reset,
|
|
it's still enabled."""
|
|
instance = self.dbaas.instances.get(instance_info.id)
|
|
assert_true(hasattr(instance, 'rootEnabled'),
|
|
"Instance has no rootEnabled property.")
|
|
assert_true(instance.rootEnabled, "Root SHOULD still be enabled.")
|
|
assert_not_equal(self.root_enabled_timestamp, 'Never')
|
|
self._verify_root_timestamp(instance_info.id)
|
|
|
|
@test(depends_on=[test_enable_root])
|
|
def test_root_cannot_be_deleted(self):
|
|
"""Even if root was enabled, the user root cannot be deleted."""
|
|
assert_raises(exceptions.BadRequest, self.dbaas.users.delete,
|
|
instance_info.id, "root")
|