2 Rgw admin testing against a running instance
4 # The test cases in this file have been annotated for inventory.
5 # To extract the inventory (in csv format) use the command:
7 # grep '^ *# TESTCASE' | sed 's/^ *# TESTCASE //'
9 # to run this standalone:
10 # python qa/tasks/radosgw_admin.py [USER] HOSTNAME
23 from cStringIO import StringIO
26 import boto.s3.connection
28 from boto.utils import RequestHook
32 import util.rgw as rgw_utils
34 from util.rgw import rgwadmin, get_user_summary, get_user_successful_ops
36 log = logging.getLogger(__name__)
38 def usage_acc_findentry2(entries, user, add=True):
44 e = {'user': user, 'buckets': []}
47 def usage_acc_findsum2(summaries, user, add=True):
53 e = {'user': user, 'categories': [],
54 'total': {'bytes_received': 0,
55 'bytes_sent': 0, 'ops': 0, 'successful_ops': 0 }}
58 def usage_acc_update2(x, out, b_in, err):
59 x['bytes_sent'] += b_in
60 x['bytes_received'] += out
63 x['successful_ops'] += 1
64 def usage_acc_validate_fields(r, x, x2, what):
66 for field in ['bytes_sent', 'bytes_received', 'ops', 'successful_ops']:
68 if x2[field] < x[field]:
69 q.append("field %s: %d < %d" % (field, x2[field], x[field]))
70 except Exception as ex:
71 r.append( "missing/bad field " + field + " in " + what + " " + str(ex))
74 r.append("incomplete counts in " + what + ": " + ", ".join(q))
77 self.results = {'entries': [], 'summary': []}
78 def findentry(self, user):
79 return usage_acc_findentry2(self.results['entries'], user)
80 def findsum(self, user):
81 return usage_acc_findsum2(self.results['summary'], user)
82 def e2b(self, e, bucket, add=True):
83 for b in e['buckets']:
84 if b['bucket'] == bucket:
88 b = {'bucket': bucket, 'categories': []}
89 e['buckets'].append(b)
91 def c2x(self, c, cat, add=True):
93 if x['category'] == cat:
97 x = {'bytes_received': 0, 'category': cat,
98 'bytes_sent': 0, 'ops': 0, 'successful_ops': 0 }
101 def update(self, c, cat, user, out, b_in, err):
103 usage_acc_update2(x, out, b_in, err)
104 if not err and cat == 'create_bucket' and not x.has_key('owner'):
106 def make_entry(self, cat, bucket, user, out, b_in, err):
107 if cat == 'create_bucket' and err:
109 e = self.findentry(user)
110 b = self.e2b(e, bucket)
111 self.update(b['categories'], cat, user, out, b_in, err)
112 s = self.findsum(user)
113 x = self.c2x(s['categories'], cat)
114 usage_acc_update2(x, out, b_in, err)
116 usage_acc_update2(x, out, b_in, err)
117 def generate_make_entry(self):
118 return lambda cat,bucket,user,out,b_in,err: self.make_entry(cat, bucket, user, out, b_in, err)
121 def compare_results(self, results):
122 if not results.has_key('entries') or not results.has_key('summary'):
123 return ['Missing entries or summary']
125 for e in self.results['entries']:
127 e2 = usage_acc_findentry2(results['entries'], e['user'], False)
128 except Exception as ex:
129 r.append("malformed entry looking for user "
130 + e['user'] + " " + str(ex))
133 r.append("missing entry for user " + e['user'])
135 for b in e['buckets']:
137 if b['bucket'] == 'nosuchbucket':
140 b2 = self.e2b(e2, b['bucket'], False)
142 c2 = b2['categories']
143 except Exception as ex:
144 r.append("malformed entry looking for bucket "
145 + b['bucket'] + " in user " + e['user'] + " " + str(ex))
148 r.append("can't find bucket " + b['bucket']
149 + " in user " + e['user'])
153 x2 = self.c2x(c2, x['category'], False)
154 except Exception as ex:
155 r.append("malformed entry looking for "
156 + x['category'] + " in bucket " + b['bucket']
157 + " user " + e['user'] + " " + str(ex))
159 usage_acc_validate_fields(r, x, x2, "entry: category "
160 + x['category'] + " bucket " + b['bucket']
161 + " in user " + e['user'])
162 for s in self.results['summary']:
165 s2 = usage_acc_findsum2(results['summary'], s['user'], False)
166 except Exception as ex:
167 r.append("malformed summary looking for user " + e['user']
171 r.append("missing summary for user " + e['user'] + " " + str(ex))
174 c2 = s2['categories']
175 except Exception as ex:
176 r.append("malformed summary missing categories for user "
177 + e['user'] + " " + str(ex))
181 x2 = self.c2x(c2, x['category'], False)
182 except Exception as ex:
183 r.append("malformed summary looking for "
184 + x['category'] + " user " + e['user'] + " " + str(ex))
186 usage_acc_validate_fields(r, x, x2, "summary: category "
187 + x['category'] + " in user " + e['user'])
191 except Exception as ex:
192 r.append("malformed summary looking for totals for user "
193 + e['user'] + " " + str(ex))
195 usage_acc_validate_fields(r, x, x2, "summary: totals for user" + e['user'])
198 def ignore_this_entry(cat, bucket, user, out, b_in, err):
200 class requestlog_queue():
201 def __init__(self, add):
202 self.q = Queue.Queue(1000)
204 def handle_request_data(self, request, response, error=False):
205 now = datetime.datetime.now()
208 elif response.status < 200 or response.status >= 400:
210 self.q.put(bunch.Bunch({'t': now, 'o': request, 'i': response, 'e': error}))
214 def log_and_clear(self, cat, bucket, user, add_entry = None):
215 while not self.q.empty():
218 if 'Content-Length' in j.o.headers:
219 bytes_out = int(j.o.headers['Content-Length'])
221 if 'content-length' in j.i.msg.dict:
222 bytes_in = int(j.i.msg.dict['content-length'])
223 log.info('RL: %s %s %s bytes_out=%d bytes_in=%d failed=%r'
224 % (cat, bucket, user, bytes_out, bytes_in, j.e))
225 if add_entry == None:
226 add_entry = self.adder
227 add_entry(cat, bucket, user, bytes_out, bytes_in, j.e)
229 def create_presigned_url(conn, method, bucket_name, key_name, expiration):
230 return conn.generate_url(expires_in=expiration,
237 def send_raw_http_request(conn, method, bucket_name, key_name, follow_redirects = False):
238 url = create_presigned_url(conn, method, bucket_name, key_name, 3600)
241 h.follow_redirects = follow_redirects
242 return h.request(url, method)
247 Helper function to get the xml acl from a key, ensuring that the xml
248 version tag is removed from the acl response
250 raw_acl = key.get_xml_acl()
252 def remove_version(string):
254 '<?xml version="1.0" encoding="UTF-8"?>'
257 def remove_newlines(string):
258 return string.strip('\n')
260 return remove_version(
261 remove_newlines(raw_acl)
264 def task(ctx, config):
266 Test radosgw-admin functionality against a running rgw instance.
270 assert ctx.rgw.config, \
271 "radosgw_admin task needs a config passed from the rgw task"
272 config = ctx.rgw.config
273 log.debug('config is: %r', config)
275 clients_from_config = config.keys()
277 # choose first client as default
278 client = clients_from_config[0]
280 # once the client is chosen, pull the host name and assigned port out of
281 # the role_endpoints that were assigned by the rgw task
282 (remote_host, remote_port) = ctx.rgw.role_endpoints[client]
293 access_key='9te6NH5mcdcq0Tc5i8i1'
294 secret_key='Ny4IOauQoL18Gp2zM7lC1vLmoawgqcYP/YGcWfXu'
295 access_key2='p5YnriCv1nAtykxBrupQ'
296 secret_key2='Q8Tk6Q/27hfbFSYdSkPtUqhqx1GgzvpXa4WARozh'
297 swift_secret1='gpS2G9RREMrnbqlp29PP2D36kgPR1tm72n5fPYfL'
298 swift_secret2='ri2VJQcKSYATOY6uaDUX7pxgkW+W1YmC6OCxPHwy'
304 connection = boto.s3.connection.S3Connection(
305 aws_access_key_id=access_key,
306 aws_secret_access_key=secret_key,
310 calling_format=boto.s3.connection.OrdinaryCallingFormat(),
312 connection2 = boto.s3.connection.S3Connection(
313 aws_access_key_id=access_key2,
314 aws_secret_access_key=secret_key2,
318 calling_format=boto.s3.connection.OrdinaryCallingFormat(),
322 rl = requestlog_queue(acc.generate_make_entry())
323 connection.set_request_hook(rl)
324 connection2.set_request_hook(rl)
326 # legend (test cases can be easily grep-ed out)
327 # TESTCASE 'testname','object','method','operation','assertion'
329 # TESTCASE 'usage-show0' 'usage' 'show' 'all usage' 'succeeds'
330 (err, summary0) = rgwadmin(ctx, client, ['usage', 'show'], check_status=True)
332 # TESTCASE 'info-nosuch','user','info','non-existent user','fails'
333 (err, out) = rgwadmin(ctx, client, ['user', 'info', '--uid', user1])
336 # TESTCASE 'create-ok','user','create','w/all valid info','succeeds'
337 (err, out) = rgwadmin(ctx, client, [
340 '--display-name', display_name1,
342 '--access-key', access_key,
343 '--secret', secret_key,
348 # TESTCASE 'duplicate email','user','create','existing user email','fails'
349 (err, out) = rgwadmin(ctx, client, [
352 '--display-name', display_name2,
357 # TESTCASE 'info-existing','user','info','existing user','returns correct info'
358 (err, out) = rgwadmin(ctx, client, ['user', 'info', '--uid', user1], check_status=True)
359 assert out['user_id'] == user1
360 assert out['email'] == email
361 assert out['display_name'] == display_name1
362 assert len(out['keys']) == 1
363 assert out['keys'][0]['access_key'] == access_key
364 assert out['keys'][0]['secret_key'] == secret_key
365 assert not out['suspended']
367 # TESTCASE 'suspend-ok','user','suspend','active user','succeeds'
368 (err, out) = rgwadmin(ctx, client, ['user', 'suspend', '--uid', user1],
371 # TESTCASE 'suspend-suspended','user','suspend','suspended user','succeeds w/advisory'
372 (err, out) = rgwadmin(ctx, client, ['user', 'info', '--uid', user1], check_status=True)
373 assert out['suspended']
375 # TESTCASE 're-enable','user','enable','suspended user','succeeds'
376 (err, out) = rgwadmin(ctx, client, ['user', 'enable', '--uid', user1], check_status=True)
378 # TESTCASE 'info-re-enabled','user','info','re-enabled user','no longer suspended'
379 (err, out) = rgwadmin(ctx, client, ['user', 'info', '--uid', user1], check_status=True)
380 assert not out['suspended']
382 # TESTCASE 'add-keys','key','create','w/valid info','succeeds'
383 (err, out) = rgwadmin(ctx, client, [
384 'key', 'create', '--uid', user1,
385 '--access-key', access_key2, '--secret', secret_key2,
386 ], check_status=True)
388 # TESTCASE 'info-new-key','user','info','after key addition','returns all keys'
389 (err, out) = rgwadmin(ctx, client, ['user', 'info', '--uid', user1],
391 assert len(out['keys']) == 2
392 assert out['keys'][0]['access_key'] == access_key2 or out['keys'][1]['access_key'] == access_key2
393 assert out['keys'][0]['secret_key'] == secret_key2 or out['keys'][1]['secret_key'] == secret_key2
395 # TESTCASE 'rm-key','key','rm','newly added key','succeeds, key is removed'
396 (err, out) = rgwadmin(ctx, client, [
397 'key', 'rm', '--uid', user1,
398 '--access-key', access_key2,
399 ], check_status=True)
400 assert len(out['keys']) == 1
401 assert out['keys'][0]['access_key'] == access_key
402 assert out['keys'][0]['secret_key'] == secret_key
404 # TESTCASE 'add-swift-key','key','create','swift key','succeeds'
405 subuser_access = 'full'
406 subuser_perm = 'full-control'
408 (err, out) = rgwadmin(ctx, client, [
409 'subuser', 'create', '--subuser', subuser1,
410 '--access', subuser_access
411 ], check_status=True)
413 # TESTCASE 'add-swift-key','key','create','swift key','succeeds'
414 (err, out) = rgwadmin(ctx, client, [
415 'subuser', 'modify', '--subuser', subuser1,
416 '--secret', swift_secret1,
417 '--key-type', 'swift',
418 ], check_status=True)
420 # TESTCASE 'subuser-perm-mask', 'subuser', 'info', 'test subuser perm mask durability', 'succeeds'
421 (err, out) = rgwadmin(ctx, client, ['user', 'info', '--uid', user1])
423 assert out['subusers'][0]['permissions'] == subuser_perm
425 # TESTCASE 'info-swift-key','user','info','after key addition','returns all keys'
426 (err, out) = rgwadmin(ctx, client, ['user', 'info', '--uid', user1], check_status=True)
427 assert len(out['swift_keys']) == 1
428 assert out['swift_keys'][0]['user'] == subuser1
429 assert out['swift_keys'][0]['secret_key'] == swift_secret1
431 # TESTCASE 'add-swift-subuser','key','create','swift sub-user key','succeeds'
432 (err, out) = rgwadmin(ctx, client, [
433 'subuser', 'create', '--subuser', subuser2,
434 '--secret', swift_secret2,
435 '--key-type', 'swift',
436 ], check_status=True)
438 # TESTCASE 'info-swift-subuser','user','info','after key addition','returns all sub-users/keys'
439 (err, out) = rgwadmin(ctx, client, ['user', 'info', '--uid', user1], check_status=True)
440 assert len(out['swift_keys']) == 2
441 assert out['swift_keys'][0]['user'] == subuser2 or out['swift_keys'][1]['user'] == subuser2
442 assert out['swift_keys'][0]['secret_key'] == swift_secret2 or out['swift_keys'][1]['secret_key'] == swift_secret2
444 # TESTCASE 'rm-swift-key1','key','rm','subuser','succeeds, one key is removed'
445 (err, out) = rgwadmin(ctx, client, [
446 'key', 'rm', '--subuser', subuser1,
447 '--key-type', 'swift',
448 ], check_status=True)
449 assert len(out['swift_keys']) == 1
451 # TESTCASE 'rm-subuser','subuser','rm','subuser','success, subuser is removed'
452 (err, out) = rgwadmin(ctx, client, [
453 'subuser', 'rm', '--subuser', subuser1,
454 ], check_status=True)
455 assert len(out['subusers']) == 1
457 # TESTCASE 'rm-subuser-with-keys','subuser','rm','subuser','succeeds, second subser and key is removed'
458 (err, out) = rgwadmin(ctx, client, [
459 'subuser', 'rm', '--subuser', subuser2,
460 '--key-type', 'swift', '--purge-keys',
461 ], check_status=True)
462 assert len(out['swift_keys']) == 0
463 assert len(out['subusers']) == 0
465 # TESTCASE 'bucket-stats','bucket','stats','no session/buckets','succeeds, empty list'
466 (err, out) = rgwadmin(ctx, client, ['bucket', 'stats', '--uid', user1],
470 # TESTCASE 'bucket-stats2','bucket','stats','no buckets','succeeds, empty list'
471 (err, out) = rgwadmin(ctx, client, ['bucket', 'list', '--uid', user1], check_status=True)
474 # create a first bucket
475 bucket = connection.create_bucket(bucket_name)
477 rl.log_and_clear("create_bucket", bucket_name, user1)
479 # TESTCASE 'bucket-list','bucket','list','one bucket','succeeds, expected list'
480 (err, out) = rgwadmin(ctx, client, ['bucket', 'list', '--uid', user1], check_status=True)
482 assert out[0] == bucket_name
484 bucket_list = connection.get_all_buckets()
485 assert len(bucket_list) == 1
486 assert bucket_list[0].name == bucket_name
488 rl.log_and_clear("list_buckets", '', user1)
490 # TESTCASE 'bucket-list-all','bucket','list','all buckets','succeeds, expected list'
491 (err, out) = rgwadmin(ctx, client, ['bucket', 'list'], check_status=True)
493 assert bucket_name in out;
495 # TESTCASE 'max-bucket-limit,'bucket','create','4 buckets','5th bucket fails due to max buckets == 4'
496 bucket2 = connection.create_bucket(bucket_name + '2')
497 rl.log_and_clear("create_bucket", bucket_name + '2', user1)
498 bucket3 = connection.create_bucket(bucket_name + '3')
499 rl.log_and_clear("create_bucket", bucket_name + '3', user1)
500 bucket4 = connection.create_bucket(bucket_name + '4')
501 rl.log_and_clear("create_bucket", bucket_name + '4', user1)
502 # the 5th should fail.
505 connection.create_bucket(bucket_name + '5')
509 rl.log_and_clear("create_bucket", bucket_name + '5', user1)
513 rl.log_and_clear("delete_bucket", bucket_name + '2', user1)
515 rl.log_and_clear("delete_bucket", bucket_name + '3', user1)
517 rl.log_and_clear("delete_bucket", bucket_name + '4', user1)
519 # TESTCASE 'bucket-stats3','bucket','stats','new empty bucket','succeeds, empty list'
520 (err, out) = rgwadmin(ctx, client, [
521 'bucket', 'stats', '--bucket', bucket_name], check_status=True)
522 assert out['owner'] == user1
523 bucket_id = out['id']
525 # TESTCASE 'bucket-stats4','bucket','stats','new empty bucket','succeeds, expected bucket ID'
526 (err, out) = rgwadmin(ctx, client, ['bucket', 'stats', '--uid', user1], check_status=True)
528 assert out[0]['id'] == bucket_id # does it return the same ID twice in a row?
531 key = boto.s3.key.Key(bucket)
532 key.set_contents_from_string('one')
533 rl.log_and_clear("put_obj", bucket_name, user1)
535 # TESTCASE 'bucket-stats5','bucket','stats','after creating key','succeeds, lists one non-empty object'
536 (err, out) = rgwadmin(ctx, client, [
537 'bucket', 'stats', '--bucket', bucket_name], check_status=True)
538 assert out['id'] == bucket_id
539 assert out['usage']['rgw.main']['num_objects'] == 1
540 assert out['usage']['rgw.main']['size_kb'] > 0
544 rl.log_and_clear("delete_obj", bucket_name, user1)
546 # TESTCASE 'bucket unlink', 'bucket', 'unlink', 'unlink bucket from user', 'fails', 'access denied error'
547 (err, out) = rgwadmin(ctx, client,
548 ['bucket', 'unlink', '--uid', user1, '--bucket', bucket_name],
551 # create a second user to link the bucket to
552 (err, out) = rgwadmin(ctx, client, [
555 '--display-name', display_name2,
556 '--access-key', access_key2,
557 '--secret', secret_key2,
558 '--max-buckets', '1',
562 # try creating an object with the first user before the bucket is relinked
564 key = boto.s3.key.Key(bucket)
567 key.set_contents_from_string('two')
568 except boto.exception.S3ResponseError:
572 rl.log_and_clear("put_obj", bucket_name, user1)
576 rl.log_and_clear("delete_obj", bucket_name, user1)
578 # link the bucket to another user
579 (err, out) = rgwadmin(ctx, client, ['metadata', 'get', 'bucket:{n}'.format(n=bucket_name)],
582 bucket_data = out['data']
583 assert bucket_data['bucket']['name'] == bucket_name
585 bucket_id = bucket_data['bucket']['bucket_id']
587 # link the bucket to another user
588 (err, out) = rgwadmin(ctx, client, ['bucket', 'link', '--uid', user2, '--bucket', bucket_name, '--bucket-id', bucket_id],
591 # try to remove user, should fail (has a linked bucket)
592 (err, out) = rgwadmin(ctx, client, ['user', 'rm', '--uid', user2])
595 # TESTCASE 'bucket unlink', 'bucket', 'unlink', 'unlink bucket from user', 'succeeds, bucket unlinked'
596 (err, out) = rgwadmin(ctx, client, ['bucket', 'unlink', '--uid', user2, '--bucket', bucket_name],
599 # relink the bucket to the first user and delete the second user
600 (err, out) = rgwadmin(ctx, client,
601 ['bucket', 'link', '--uid', user1, '--bucket', bucket_name, '--bucket-id', bucket_id],
604 (err, out) = rgwadmin(ctx, client, ['user', 'rm', '--uid', user2],
607 # TESTCASE 'object-rm', 'object', 'rm', 'remove object', 'succeeds, object is removed'
611 key = boto.s3.key.Key(bucket, object_name)
612 key.set_contents_from_string(object_name)
613 rl.log_and_clear("put_obj", bucket_name, user1)
615 # fetch it too (for usage stats presently)
616 s = key.get_contents_as_string()
617 rl.log_and_clear("get_obj", bucket_name, user1)
618 assert s == object_name
619 # list bucket too (for usage stats presently)
620 keys = list(bucket.list())
621 rl.log_and_clear("list_bucket", bucket_name, user1)
622 assert len(keys) == 1
623 assert keys[0].name == object_name
626 (err, out) = rgwadmin(ctx, client,
627 ['object', 'rm', '--bucket', bucket_name, '--object', object_name],
630 # TESTCASE 'bucket-stats6','bucket','stats','after deleting key','succeeds, lists one no objects'
631 (err, out) = rgwadmin(ctx, client, [
632 'bucket', 'stats', '--bucket', bucket_name],
634 assert out['id'] == bucket_id
635 assert out['usage']['rgw.main']['num_objects'] == 0
638 # TESTCASE 'log-list','log','list','after activity','succeeds, lists one no objects'
639 (err, out) = rgwadmin(ctx, client, ['log', 'list'], check_status=True)
643 # TESTCASE 'log-show','log','show','after activity','returns expected info'
644 if obj[:4] == 'meta' or obj[:4] == 'data' or obj[:18] == 'obj_delete_at_hint':
647 (err, rgwlog) = rgwadmin(ctx, client, ['log', 'show', '--object', obj],
649 assert len(rgwlog) > 0
651 # exempt bucket_name2 from checking as it was only used for multi-region tests
652 assert rgwlog['bucket'].find(bucket_name) == 0 or rgwlog['bucket'].find(bucket_name2) == 0
653 assert rgwlog['bucket'] != bucket_name or rgwlog['bucket_id'] == bucket_id
654 assert rgwlog['bucket_owner'] == user1 or rgwlog['bucket'] == bucket_name + '5' or rgwlog['bucket'] == bucket_name2
655 for entry in rgwlog['log_entries']:
656 log.debug('checking log entry: ', entry)
657 assert entry['bucket'] == rgwlog['bucket']
658 possible_buckets = [bucket_name + '5', bucket_name2]
660 assert user == user1 or user.endswith('system-user') or \
661 rgwlog['bucket'] in possible_buckets
663 # TESTCASE 'log-rm','log','rm','delete log objects','succeeds'
664 (err, out) = rgwadmin(ctx, client, ['log', 'rm', '--object', obj],
667 # TODO: show log by bucket+date
669 # TESTCASE 'user-suspend2','user','suspend','existing user','succeeds'
670 (err, out) = rgwadmin(ctx, client, ['user', 'suspend', '--uid', user1],
673 # TESTCASE 'user-suspend3','user','suspend','suspended user','cannot write objects'
676 key = boto.s3.key.Key(bucket)
677 key.set_contents_from_string('five')
678 except boto.exception.S3ResponseError as e:
680 assert e.status == 403
683 rl.log_and_clear("put_obj", bucket_name, user1)
685 # TESTCASE 'user-renable2','user','enable','suspended user','succeeds'
686 (err, out) = rgwadmin(ctx, client, ['user', 'enable', '--uid', user1],
689 # TESTCASE 'user-renable3','user','enable','reenabled user','can write objects'
690 key = boto.s3.key.Key(bucket)
691 key.set_contents_from_string('six')
692 rl.log_and_clear("put_obj", bucket_name, user1)
694 # TESTCASE 'gc-list', 'gc', 'list', 'get list of objects ready for garbage collection'
696 # create an object large enough to be split into multiple parts
697 test_string = 'foo'*10000000
699 big_key = boto.s3.key.Key(bucket)
700 big_key.set_contents_from_string(test_string)
701 rl.log_and_clear("put_obj", bucket_name, user1)
703 # now delete the head
705 rl.log_and_clear("delete_obj", bucket_name, user1)
707 # wait a bit to give the garbage collector time to cycle
710 (err, out) = rgwadmin(ctx, client, ['gc', 'list'])
714 # TESTCASE 'gc-process', 'gc', 'process', 'manually collect garbage'
715 (err, out) = rgwadmin(ctx, client, ['gc', 'process'], check_status=True)
718 (err, out) = rgwadmin(ctx, client, ['gc', 'list'])
722 # TESTCASE 'rm-user-buckets','user','rm','existing user','fails, still has buckets'
723 (err, out) = rgwadmin(ctx, client, ['user', 'rm', '--uid', user1])
726 # delete should fail because ``key`` still exists
729 except boto.exception.S3ResponseError as e:
730 assert e.status == 409
731 rl.log_and_clear("delete_bucket", bucket_name, user1)
734 rl.log_and_clear("delete_obj", bucket_name, user1)
736 rl.log_and_clear("delete_bucket", bucket_name, user1)
738 # TESTCASE 'policy', 'bucket', 'policy', 'get bucket policy', 'returns S3 policy'
739 bucket = connection.create_bucket(bucket_name)
740 rl.log_and_clear("create_bucket", bucket_name, user1)
743 key = boto.s3.key.Key(bucket)
744 key.set_contents_from_string('seven')
745 rl.log_and_clear("put_obj", bucket_name, user1)
747 # should be private already but guarantee it
748 key.set_acl('private')
749 rl.log_and_clear("put_acls", bucket_name, user1)
751 (err, out) = rgwadmin(ctx, client,
752 ['policy', '--bucket', bucket.name, '--object', key.key],
753 check_status=True, format='xml')
756 rl.log_and_clear("get_acls", bucket_name, user1)
758 assert acl == out.strip('\n')
760 # add another grantee by making the object public read
761 key.set_acl('public-read')
762 rl.log_and_clear("put_acls", bucket_name, user1)
764 (err, out) = rgwadmin(ctx, client,
765 ['policy', '--bucket', bucket.name, '--object', key.key],
766 check_status=True, format='xml')
769 rl.log_and_clear("get_acls", bucket_name, user1)
771 assert acl == out.strip('\n')
773 # TESTCASE 'rm-bucket', 'bucket', 'rm', 'bucket with objects', 'succeeds'
774 bucket = connection.create_bucket(bucket_name)
775 rl.log_and_clear("create_bucket", bucket_name, user1)
776 key_name = ['eight', 'nine', 'ten', 'eleven']
778 key = boto.s3.key.Key(bucket)
779 key.set_contents_from_string(key_name[i])
780 rl.log_and_clear("put_obj", bucket_name, user1)
782 (err, out) = rgwadmin(ctx, client,
783 ['bucket', 'rm', '--bucket', bucket_name, '--purge-objects'],
786 # TESTCASE 'caps-add', 'caps', 'add', 'add user cap', 'succeeds'
788 (err, out) = rgwadmin(ctx, client, ['caps', 'add', '--uid', user1, '--caps', caps])
790 assert out['caps'][0]['perm'] == 'read'
792 # TESTCASE 'caps-rm', 'caps', 'rm', 'remove existing cap from user', 'succeeds'
793 (err, out) = rgwadmin(ctx, client, ['caps', 'rm', '--uid', user1, '--caps', caps])
795 assert not out['caps']
797 # TESTCASE 'rm-user','user','rm','existing user','fails, still has buckets'
798 bucket = connection.create_bucket(bucket_name)
799 rl.log_and_clear("create_bucket", bucket_name, user1)
800 key = boto.s3.key.Key(bucket)
802 (err, out) = rgwadmin(ctx, client, ['user', 'rm', '--uid', user1])
805 # TESTCASE 'rm-user2', 'user', 'rm', 'user with data', 'succeeds'
806 bucket = connection.create_bucket(bucket_name)
807 rl.log_and_clear("create_bucket", bucket_name, user1)
808 key = boto.s3.key.Key(bucket)
809 key.set_contents_from_string('twelve')
810 rl.log_and_clear("put_obj", bucket_name, user1)
814 # need to wait for all usage data to get flushed, should take up to 30 seconds
815 timestamp = time.time()
816 while time.time() - timestamp <= (2 * 60): # wait up to 20 minutes
817 (err, out) = rgwadmin(ctx, client, ['usage', 'show', '--categories', 'delete_obj']) # one of the operations we did is delete_obj, should be present.
818 if get_user_successful_ops(out, user1) > 0:
822 assert time.time() - timestamp <= (20 * 60)
824 # TESTCASE 'usage-show' 'usage' 'show' 'all usage' 'succeeds'
825 (err, out) = rgwadmin(ctx, client, ['usage', 'show'], check_status=True)
826 assert len(out['entries']) > 0
827 assert len(out['summary']) > 0
829 r = acc.compare_results(out)
831 sys.stderr.write(("\n".join(r))+"\n")
834 user_summary = get_user_summary(out, user1)
836 total = user_summary['total']
837 assert total['successful_ops'] > 0
839 # TESTCASE 'usage-show2' 'usage' 'show' 'user usage' 'succeeds'
840 (err, out) = rgwadmin(ctx, client, ['usage', 'show', '--uid', user1],
842 assert len(out['entries']) > 0
843 assert len(out['summary']) > 0
844 user_summary = out['summary'][0]
845 for entry in user_summary['categories']:
846 assert entry['successful_ops'] > 0
847 assert user_summary['user'] == user1
849 # TESTCASE 'usage-show3' 'usage' 'show' 'user usage categories' 'succeeds'
850 test_categories = ['create_bucket', 'put_obj', 'delete_obj', 'delete_bucket']
851 for cat in test_categories:
852 (err, out) = rgwadmin(ctx, client, ['usage', 'show', '--uid', user1, '--categories', cat],
854 assert len(out['summary']) > 0
855 user_summary = out['summary'][0]
856 assert user_summary['user'] == user1
857 assert len(user_summary['categories']) == 1
858 entry = user_summary['categories'][0]
859 assert entry['category'] == cat
860 assert entry['successful_ops'] > 0
862 # should be all through with connection. (anything using connection
863 # should be BEFORE the usage stuff above.)
864 rl.log_and_clear("(before-close)", '-', '-', ignore_this_entry)
868 # the usage flush interval is 30 seconds, wait that much an then some
869 # to make sure everything has been flushed
872 # TESTCASE 'usage-trim' 'usage' 'trim' 'user usage' 'succeeds, usage removed'
873 (err, out) = rgwadmin(ctx, client, ['usage', 'trim', '--uid', user1],
875 (err, out) = rgwadmin(ctx, client, ['usage', 'show', '--uid', user1],
877 assert len(out['entries']) == 0
878 assert len(out['summary']) == 0
880 (err, out) = rgwadmin(ctx, client,
881 ['user', 'rm', '--uid', user1, '--purge-data' ],
884 # TESTCASE 'rm-user3','user','rm','deleted user','fails'
885 (err, out) = rgwadmin(ctx, client, ['user', 'info', '--uid', user1])
888 # TESTCASE 'zone-info', 'zone', 'get', 'get zone info', 'succeeds, has default placement rule'
891 (err, out) = rgwadmin(ctx, client, ['zone', 'get','--rgw-zone','default'])
892 orig_placement_pools = len(out['placement_pools'])
894 # removed this test, it is not correct to assume that zone has default placement, it really
895 # depends on how we set it up before
897 # assert len(out) > 0
898 # assert len(out['placement_pools']) == 1
900 # default_rule = out['placement_pools'][0]
901 # assert default_rule['key'] == 'default-placement'
903 rule={'key': 'new-placement', 'val': {'data_pool': '.rgw.buckets.2', 'index_pool': '.rgw.buckets.index.2'}}
905 out['placement_pools'].append(rule)
907 (err, out) = rgwadmin(ctx, client, ['zone', 'set'],
908 stdin=StringIO(json.dumps(out)),
911 (err, out) = rgwadmin(ctx, client, ['zone', 'get','--rgw-zone','default'])
913 assert len(out['placement_pools']) == orig_placement_pools + 1
915 zonecmd = ['zone', 'placement', 'rm',
916 '--rgw-zone', 'default',
917 '--placement-id', 'new-placement']
919 (err, out) = rgwadmin(ctx, client, zonecmd, check_status=True)
922 from tasks.radosgw_admin import task
923 from teuthology.config import config
924 from teuthology.orchestra import cluster, remote
928 if len(sys.argv) == 3:
929 user = sys.argv[1] + "@"
931 elif len(sys.argv) == 2:
935 sys.stderr.write("usage: radosgw_admin.py [user] host\n")
937 client0 = remote.Remote(user + host)
939 ctx.cluster=cluster.Cluster(remotes=[(client0,
940 [ 'ceph.client.rgw.%s' % (host), ]),])
942 ctx.rgw = argparse.Namespace()
944 endpoints['ceph.client.rgw.%s' % host] = (host, 80)
945 ctx.rgw.role_endpoints = endpoints
947 ctx.rgw.regions = {'region0': { 'api name': 'api1',
948 'is master': True, 'master zone': 'r0z0',
949 'zones': ['r0z0', 'r0z1'] }}
950 ctx.rgw.config = {'ceph.client.rgw.%s' % host: {'system user': {'name': '%s-system-user' % host}}}
954 if __name__ == '__main__':