
Don't create db2 in tests to avoid potential failure. Change-Id: I5aba1c5236ae2773bd926136feca951c45911208
192 lines
7.4 KiB
Python
192 lines
7.4 KiB
Python
# Copyright 2019 Catalyst Cloud Ltd.
|
|
#
|
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
|
# you may not use this file except in compliance with the License.
|
|
# You may obtain a copy of the License at
|
|
#
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
#
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
# See the License for the specific language governing permissions and
|
|
# limitations under the License.
|
|
|
|
import time
|
|
|
|
from oslo_log import log as logging
|
|
from tempest.lib import decorators
|
|
|
|
from trove_tempest_plugin.tests import constants
|
|
from trove_tempest_plugin.tests.scenario import base_basic
|
|
from trove_tempest_plugin.tests import utils
|
|
|
|
LOG = logging.getLogger(__name__)
|
|
|
|
|
|
class TestInstanceBasicMySQL(base_basic.TestInstanceBasicMySQLBase):
|
|
datastore = 'mysql'
|
|
|
|
|
|
class TestInstanceBasicMariaDB(base_basic.TestInstanceBasicMySQLBase):
|
|
datastore = 'mariadb'
|
|
|
|
|
|
class TestInstanceBasicPostgreSQL(base_basic.TestInstanceBasicBase):
|
|
datastore = 'postgresql'
|
|
create_user = True
|
|
enable_root = True
|
|
|
|
def _check_db_privilege(self, ip, username, password, database):
|
|
db_url = f'postgresql://{username}:{password}@{ip}:5432/{database}'
|
|
with utils.SQLClient(db_url) as db_client:
|
|
# Check if the user can create a table
|
|
try:
|
|
cmd = "CREATE TABLE test_table (id INT);"
|
|
db_client.pgsql_execute(cmd)
|
|
# If successful, drop the table
|
|
cmd = "DROP TABLE test_table;"
|
|
db_client.pgsql_execute(cmd)
|
|
return True
|
|
except Exception:
|
|
return False
|
|
|
|
def _access_db(self, ip, username=constants.DB_USER,
|
|
password=constants.DB_PASS, database=constants.DB_NAME):
|
|
db_url = f'postgresql+psycopg2://{username}:{password}@{ip}:5432/'\
|
|
f'{database}'
|
|
with utils.SQLClient(db_url) as db_client:
|
|
cmd = "SELECT 1;"
|
|
db_client.pgsql_execute(cmd)
|
|
|
|
def get_config_value(self, ip, option):
|
|
db_url = (f'postgresql+psycopg2://root:{self.password}@'
|
|
f'{ip}:5432/postgres')
|
|
with utils.SQLClient(db_url) as db_client:
|
|
cmd = f"SELECT setting FROM pg_settings WHERE name='{option}';"
|
|
ret = db_client.pgsql_execute(cmd)
|
|
rows = ret.fetchall()
|
|
|
|
self.assertEqual(1, len(rows))
|
|
return int(rows[0][0])
|
|
|
|
@decorators.idempotent_id('e9f78628-8bf9-46fb-84b2-367de3f0e0fe')
|
|
def test_database_access(self):
|
|
databases = self.get_databases(self.instance_id)
|
|
db_names = [db['name'] for db in databases]
|
|
self.assertIn(constants.DB_NAME, db_names)
|
|
|
|
users = self.get_users(self.instance_id)
|
|
user_names = [user['name'] for user in users]
|
|
self.assertIn(constants.DB_USER, user_names)
|
|
|
|
LOG.info(f"Accessing database on {self.instance_ip}")
|
|
self._access_db(self.instance_ip)
|
|
|
|
@decorators.idempotent_id('6c2c710c-0138-4215-8e08-6dfe605ba6a6')
|
|
def test_user_database(self):
|
|
db1 = 'foo'
|
|
user1 = 'foo_user'
|
|
user2 = 'bar_user'
|
|
|
|
users = self.get_users(self.instance_id)
|
|
cur_user_names = [user['name'] for user in users]
|
|
self.assertNotIn(user1, cur_user_names)
|
|
|
|
databases = self.get_databases(self.instance_id)
|
|
cur_db_names = [db['name'] for db in databases]
|
|
self.assertNotIn(db1, cur_db_names)
|
|
|
|
LOG.info(f"Creating databases in instance {self.instance_id}")
|
|
create_db = {
|
|
"databases": [
|
|
{
|
|
"name": db1
|
|
}
|
|
]
|
|
}
|
|
self.client.create_resource(f"instances/{self.instance_id}/databases",
|
|
create_db, expected_status_code=202,
|
|
need_response=False)
|
|
# waiting for resources to be created.
|
|
time.sleep(3)
|
|
databases = self.get_databases(self.instance_id)
|
|
cur_db_names = [db['name'] for db in databases]
|
|
self.assertIn(db1, cur_db_names)
|
|
|
|
LOG.info(f"Creating users in instance {self.instance_id}")
|
|
create_user = {
|
|
"users": [
|
|
{
|
|
"databases": [
|
|
{
|
|
"name": db1
|
|
}
|
|
],
|
|
"name": user1,
|
|
"password": constants.DB_PASS
|
|
}
|
|
]
|
|
}
|
|
self.client.create_resource(f"instances/{self.instance_id}/users",
|
|
create_user, expected_status_code=202,
|
|
need_response=False)
|
|
time.sleep(3)
|
|
users = self.get_users(self.instance_id)
|
|
cur_user_names = [user['name'] for user in users]
|
|
self.assertIn(user1, cur_user_names)
|
|
|
|
# user1 should have access to db1
|
|
LOG.info(f"Accessing database on {self.instance_ip}, user: {user1}, "
|
|
f"db: {db1}")
|
|
self._access_db(self.instance_ip, user1, constants.DB_PASS, db1)
|
|
# user1 should also have previlege to create table
|
|
self.assertTrue(self._check_db_privilege(self.instance_ip,
|
|
user1,
|
|
constants.DB_PASS, db1))
|
|
|
|
LOG.info(f"Revoking user {user1} access to database {db1}")
|
|
self.client.delete_resource(
|
|
f'instances/{self.instance_id}/users/{user1}/databases', db1)
|
|
# FIXME: user1 still have access to db1 because of the
|
|
# havior of public schema
|
|
# self.assertRaises(exceptions.TempestException, self._access_db,
|
|
# self.instance_ip, user1, constants.DB_PASS, db1)
|
|
# self.assertFalse(self._check_db_privilege(self.instance_ip,
|
|
# user1,
|
|
# constants.DB_PASS, db1))
|
|
|
|
# test update_attributes interface
|
|
LOG.info(f"Updating user {user1} to {user2}")
|
|
new_user_body = {"user": {"name": user2}}
|
|
self.client.put_resource(
|
|
f'instances/{self.instance_id}/users/{user1}', new_user_body)
|
|
time.sleep(3)
|
|
users = self.get_users(self.instance_id)
|
|
cur_user_names = [user['name'] for user in users]
|
|
self.assertIn(user2, cur_user_names)
|
|
|
|
LOG.info(f"Deleting user {user2}")
|
|
self.client.delete_resource(
|
|
f'instances/{self.instance_id}/users', user2)
|
|
time.sleep(3)
|
|
users = self.get_users(self.instance_id)
|
|
cur_user_names = [user['name'] for user in users]
|
|
self.assertNotIn(user2, cur_user_names)
|
|
|
|
LOG.info(f"Deleting database {db1}")
|
|
self.client.delete_resource(
|
|
f'instances/{self.instance_id}/databases', db1)
|
|
time.sleep(3)
|
|
databases = self.get_databases(self.instance_id)
|
|
cur_db_names = [db['name'] for db in databases]
|
|
self.assertNotIn(db1, cur_db_names)
|
|
|
|
@decorators.idempotent_id("b6c03cb6-f40f-11ea-a950-00224d6b7bc1")
|
|
def test_configuration(self):
|
|
# Default is 100
|
|
create_values = {"max_connections": 101}
|
|
update_values = {"max_connections": 102}
|
|
self.configuration_test(create_values, update_values,
|
|
need_restart=True)
|