2016-12-16 01:26:15 -05:00
|
|
|
/*
|
2017-01-18 15:24:34 -05:00
|
|
|
* Minio Cloud Storage, (C) 2016, 2017 Minio, Inc.
|
2016-12-16 01:26:15 -05:00
|
|
|
*
|
|
|
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
* you may not use this file except in compliance with the License.
|
|
|
|
* You may obtain a copy of the License at
|
|
|
|
*
|
|
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
*
|
|
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
|
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
* See the License for the specific language governing permissions and
|
|
|
|
* limitations under the License.
|
|
|
|
*/
|
|
|
|
|
|
|
|
package cmd
|
|
|
|
|
|
|
|
import (
|
2017-02-20 15:58:50 -05:00
|
|
|
"encoding/json"
|
2017-08-12 22:25:43 -04:00
|
|
|
"os"
|
2016-12-16 01:26:15 -05:00
|
|
|
"testing"
|
|
|
|
)
|
|
|
|
|
|
|
|
func testAdminCmd(cmd cmdType, t *testing.T) {
|
2018-01-22 17:54:55 -05:00
|
|
|
// reset globals. this is to make sure that the tests are not
|
|
|
|
// affected by modified globals.
|
2017-01-07 14:27:01 -05:00
|
|
|
resetTestGlobals()
|
|
|
|
|
2017-01-18 15:24:34 -05:00
|
|
|
rootPath, err := newTestConfig(globalMinioDefaultRegion)
|
2016-12-16 01:26:15 -05:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("Failed to create test config - %v", err)
|
|
|
|
}
|
2017-08-12 22:25:43 -04:00
|
|
|
defer os.RemoveAll(rootPath)
|
2016-12-16 01:26:15 -05:00
|
|
|
|
2017-11-29 16:12:47 -05:00
|
|
|
creds := globalServerConfig.GetCredential()
|
2017-09-19 15:37:56 -04:00
|
|
|
token, err := authenticateNode(creds.AccessKey, creds.SecretKey)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
|
|
|
|
adminServer := adminCmd{}
|
2016-12-23 10:12:19 -05:00
|
|
|
args := LoginRPCArgs{
|
2017-09-19 15:37:56 -04:00
|
|
|
AuthToken: token,
|
2016-12-23 10:12:19 -05:00
|
|
|
Version: Version,
|
2017-03-18 14:28:41 -04:00
|
|
|
RequestTime: UTCNow(),
|
2016-12-23 10:12:19 -05:00
|
|
|
}
|
2017-09-19 15:37:56 -04:00
|
|
|
err = adminServer.Login(&args, &LoginRPCReply{})
|
2016-12-16 01:26:15 -05:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("Failed to login to admin server - %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
go func() {
|
2017-01-14 17:48:52 -05:00
|
|
|
// A test signal receiver
|
2016-12-16 01:26:15 -05:00
|
|
|
<-globalServiceSignalCh
|
|
|
|
}()
|
|
|
|
|
2018-01-22 17:54:55 -05:00
|
|
|
sa := SignalServiceArgs{
|
|
|
|
AuthRPCArgs: AuthRPCArgs{AuthToken: token},
|
|
|
|
Sig: cmd.toServiceSignal(),
|
|
|
|
}
|
2016-12-23 10:12:19 -05:00
|
|
|
genReply := AuthRPCReply{}
|
|
|
|
switch cmd {
|
2018-01-22 17:54:55 -05:00
|
|
|
case restartCmd, stopCmd:
|
|
|
|
if err = adminServer.SignalService(&sa, &genReply); err != nil {
|
|
|
|
t.Errorf("restartCmd/stopCmd: Expected: <nil>, got: %v",
|
|
|
|
err)
|
|
|
|
}
|
|
|
|
default:
|
|
|
|
err = adminServer.SignalService(&sa, &genReply)
|
|
|
|
if err != nil && err.Error() != errUnsupportedSignal.Error() {
|
|
|
|
t.Errorf("invalidSignal %s: unexpected error got: %v",
|
|
|
|
cmd, err)
|
2016-12-16 01:26:15 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2017-01-23 03:32:55 -05:00
|
|
|
// TestAdminRestart - test for Admin.Restart RPC service.
|
2016-12-16 01:26:15 -05:00
|
|
|
func TestAdminRestart(t *testing.T) {
|
|
|
|
testAdminCmd(restartCmd, t)
|
|
|
|
}
|
2017-01-23 03:32:55 -05:00
|
|
|
|
2018-01-22 17:54:55 -05:00
|
|
|
// TestAdminStop - test for Admin.Stop RPC service.
|
|
|
|
func TestAdminStop(t *testing.T) {
|
|
|
|
testAdminCmd(stopCmd, t)
|
|
|
|
}
|
|
|
|
|
|
|
|
// TestAdminStatus - test for Admin.Status RPC service (error case)
|
|
|
|
func TestAdminStatus(t *testing.T) {
|
|
|
|
testAdminCmd(statusCmd, t)
|
|
|
|
}
|
|
|
|
|
2017-01-23 03:32:55 -05:00
|
|
|
// TestReInitDisks - test for Admin.ReInitDisks RPC service.
|
|
|
|
func TestReInitDisks(t *testing.T) {
|
|
|
|
// Reset global variables to start afresh.
|
|
|
|
resetTestGlobals()
|
|
|
|
|
|
|
|
rootPath, err := newTestConfig("us-east-1")
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("Unable to initialize server config. %s", err)
|
|
|
|
}
|
2017-08-12 22:25:43 -04:00
|
|
|
defer os.RemoveAll(rootPath)
|
2017-01-23 03:32:55 -05:00
|
|
|
|
|
|
|
// Initializing objectLayer for HealFormatHandler.
|
|
|
|
_, xlDirs, xlErr := initTestXLObjLayer()
|
|
|
|
if xlErr != nil {
|
|
|
|
t.Fatalf("failed to initialize XL based object layer - %v.", xlErr)
|
|
|
|
}
|
|
|
|
defer removeRoots(xlDirs)
|
|
|
|
|
|
|
|
// Set globalEndpoints for a single node XL setup.
|
2017-04-11 18:44:27 -04:00
|
|
|
globalEndpoints = mustGetNewEndpointList(xlDirs...)
|
2017-01-23 03:32:55 -05:00
|
|
|
|
|
|
|
// Setup admin rpc server for an XL backend.
|
|
|
|
globalIsXL = true
|
|
|
|
adminServer := adminCmd{}
|
2017-09-19 15:37:56 -04:00
|
|
|
|
2017-11-29 16:12:47 -05:00
|
|
|
creds := globalServerConfig.GetCredential()
|
2017-09-19 15:37:56 -04:00
|
|
|
token, err := authenticateNode(creds.AccessKey, creds.SecretKey)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
|
2017-01-23 03:32:55 -05:00
|
|
|
args := LoginRPCArgs{
|
2017-09-19 15:37:56 -04:00
|
|
|
AuthToken: token,
|
2017-01-23 03:32:55 -05:00
|
|
|
Version: Version,
|
2017-03-18 14:28:41 -04:00
|
|
|
RequestTime: UTCNow(),
|
2017-01-23 03:32:55 -05:00
|
|
|
}
|
2017-09-19 15:37:56 -04:00
|
|
|
err = adminServer.Login(&args, &LoginRPCReply{})
|
2017-01-23 03:32:55 -05:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("Failed to login to admin server - %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
authArgs := AuthRPCArgs{
|
2017-09-19 15:37:56 -04:00
|
|
|
AuthToken: token,
|
2017-01-23 03:32:55 -05:00
|
|
|
}
|
|
|
|
authReply := AuthRPCReply{}
|
|
|
|
|
|
|
|
err = adminServer.ReInitDisks(&authArgs, &authReply)
|
|
|
|
if err != nil {
|
|
|
|
t.Errorf("Expected to pass, but failed with %v", err)
|
|
|
|
}
|
|
|
|
|
2017-09-19 15:37:56 -04:00
|
|
|
token, err = authenticateNode(creds.AccessKey, creds.SecretKey)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
2017-01-23 03:32:55 -05:00
|
|
|
// Negative test case with admin rpc server setup for FS.
|
|
|
|
globalIsXL = false
|
|
|
|
fsAdminServer := adminCmd{}
|
|
|
|
fsArgs := LoginRPCArgs{
|
2017-09-19 15:37:56 -04:00
|
|
|
AuthToken: token,
|
2017-01-23 03:32:55 -05:00
|
|
|
Version: Version,
|
2017-03-18 14:28:41 -04:00
|
|
|
RequestTime: UTCNow(),
|
2017-01-23 03:32:55 -05:00
|
|
|
}
|
|
|
|
fsReply := LoginRPCReply{}
|
|
|
|
err = fsAdminServer.Login(&fsArgs, &fsReply)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("Failed to login to fs admin server - %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
authArgs = AuthRPCArgs{
|
2017-09-19 15:37:56 -04:00
|
|
|
AuthToken: token,
|
2017-01-23 03:32:55 -05:00
|
|
|
}
|
|
|
|
authReply = AuthRPCReply{}
|
|
|
|
// Attempt ReInitDisks service on a FS backend.
|
|
|
|
err = fsAdminServer.ReInitDisks(&authArgs, &authReply)
|
|
|
|
if err != errUnsupportedBackend {
|
|
|
|
t.Errorf("Expected to fail with %v, but received %v",
|
|
|
|
errUnsupportedBackend, err)
|
|
|
|
}
|
|
|
|
}
|
2017-02-20 15:58:50 -05:00
|
|
|
|
2017-02-27 14:40:27 -05:00
|
|
|
// TestGetConfig - Test for GetConfig admin RPC.
|
2017-02-20 15:58:50 -05:00
|
|
|
func TestGetConfig(t *testing.T) {
|
|
|
|
// Reset global variables to start afresh.
|
|
|
|
resetTestGlobals()
|
|
|
|
|
|
|
|
rootPath, err := newTestConfig("us-east-1")
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("Unable to initialize server config. %s", err)
|
|
|
|
}
|
2017-08-12 22:25:43 -04:00
|
|
|
defer os.RemoveAll(rootPath)
|
2017-02-20 15:58:50 -05:00
|
|
|
|
|
|
|
adminServer := adminCmd{}
|
2017-11-29 16:12:47 -05:00
|
|
|
creds := globalServerConfig.GetCredential()
|
2017-09-19 15:37:56 -04:00
|
|
|
|
|
|
|
token, err := authenticateNode(creds.AccessKey, creds.SecretKey)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
|
2017-02-20 15:58:50 -05:00
|
|
|
args := LoginRPCArgs{
|
2017-09-19 15:37:56 -04:00
|
|
|
AuthToken: token,
|
2017-02-20 15:58:50 -05:00
|
|
|
Version: Version,
|
2017-03-18 14:28:41 -04:00
|
|
|
RequestTime: UTCNow(),
|
2017-02-20 15:58:50 -05:00
|
|
|
}
|
|
|
|
reply := LoginRPCReply{}
|
|
|
|
err = adminServer.Login(&args, &reply)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("Failed to login to admin server - %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
authArgs := AuthRPCArgs{
|
2017-09-19 15:37:56 -04:00
|
|
|
AuthToken: token,
|
2017-02-20 15:58:50 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
configReply := ConfigReply{}
|
|
|
|
|
|
|
|
err = adminServer.GetConfig(&authArgs, &configReply)
|
|
|
|
if err != nil {
|
|
|
|
t.Errorf("Expected GetConfig to pass but failed with %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
var config serverConfigV13
|
|
|
|
err = json.Unmarshal(configReply.Config, &config)
|
|
|
|
if err != nil {
|
|
|
|
t.Errorf("Expected json unmarshal to pass but failed with %v", err)
|
|
|
|
}
|
|
|
|
}
|
2017-02-27 14:40:27 -05:00
|
|
|
|
|
|
|
// TestWriteAndCommitConfig - test for WriteTmpConfig and CommitConfig
|
|
|
|
// RPC handler.
|
|
|
|
func TestWriteAndCommitConfig(t *testing.T) {
|
|
|
|
// Reset global variables to start afresh.
|
|
|
|
resetTestGlobals()
|
|
|
|
|
|
|
|
rootPath, err := newTestConfig("us-east-1")
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("Unable to initialize server config. %s", err)
|
|
|
|
}
|
2017-08-12 22:25:43 -04:00
|
|
|
defer os.RemoveAll(rootPath)
|
2017-02-27 14:40:27 -05:00
|
|
|
|
|
|
|
adminServer := adminCmd{}
|
2017-11-29 16:12:47 -05:00
|
|
|
creds := globalServerConfig.GetCredential()
|
2017-09-19 15:37:56 -04:00
|
|
|
token, err := authenticateNode(creds.AccessKey, creds.SecretKey)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
2017-02-27 14:40:27 -05:00
|
|
|
args := LoginRPCArgs{
|
2017-09-19 15:37:56 -04:00
|
|
|
AuthToken: token,
|
2017-02-27 14:40:27 -05:00
|
|
|
Version: Version,
|
2017-03-18 14:28:41 -04:00
|
|
|
RequestTime: UTCNow(),
|
2017-02-27 14:40:27 -05:00
|
|
|
}
|
|
|
|
reply := LoginRPCReply{}
|
|
|
|
err = adminServer.Login(&args, &reply)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("Failed to login to admin server - %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Write temporary config.
|
|
|
|
buf := []byte("hello")
|
|
|
|
tmpFileName := mustGetUUID()
|
|
|
|
wArgs := WriteConfigArgs{
|
|
|
|
AuthRPCArgs: AuthRPCArgs{
|
2017-09-19 15:37:56 -04:00
|
|
|
AuthToken: token,
|
2017-02-27 14:40:27 -05:00
|
|
|
},
|
|
|
|
TmpFileName: tmpFileName,
|
|
|
|
Buf: buf,
|
|
|
|
}
|
|
|
|
|
|
|
|
err = adminServer.WriteTmpConfig(&wArgs, &WriteConfigReply{})
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("Failed to write temporary config %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
if err != nil {
|
|
|
|
t.Errorf("Expected to succeed but failed %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
cArgs := CommitConfigArgs{
|
|
|
|
AuthRPCArgs: AuthRPCArgs{
|
2017-09-19 15:37:56 -04:00
|
|
|
AuthToken: token,
|
2017-02-27 14:40:27 -05:00
|
|
|
},
|
|
|
|
FileName: tmpFileName,
|
|
|
|
}
|
|
|
|
cReply := CommitConfigReply{}
|
|
|
|
|
|
|
|
err = adminServer.CommitConfig(&cArgs, &cReply)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("Failed to commit config file %v", err)
|
|
|
|
}
|
|
|
|
}
|