2022-08-01 06:16:36 +00:00
|
|
|
import logging
|
2023-10-10 13:39:24 +00:00
|
|
|
import os
|
2023-05-15 09:59:33 +00:00
|
|
|
import random
|
2022-08-01 06:16:36 +00:00
|
|
|
from time import sleep
|
|
|
|
|
|
|
|
import allure
|
|
|
|
import pytest
|
2023-05-15 09:59:33 +00:00
|
|
|
from frostfs_testlib.resources.wellknown_acl import PUBLIC_ACL
|
2023-10-03 10:54:53 +00:00
|
|
|
from frostfs_testlib.steps.cli.container import create_container
|
2023-10-10 13:39:24 +00:00
|
|
|
from frostfs_testlib.steps.cli.object import get_object, get_object_nodes, put_object_to_random_node
|
|
|
|
from frostfs_testlib.steps.storage_object import delete_objects
|
2023-10-03 10:54:53 +00:00
|
|
|
from frostfs_testlib.storage.cluster import ClusterNode
|
2023-08-16 08:53:14 +00:00
|
|
|
from frostfs_testlib.storage.controllers import ClusterStateController
|
2023-08-02 11:54:03 +00:00
|
|
|
from frostfs_testlib.storage.dataclasses.object_size import ObjectSize
|
2023-10-10 13:39:24 +00:00
|
|
|
from frostfs_testlib.storage.dataclasses.storage_object_info import StorageObjectInfo
|
2023-05-15 09:59:33 +00:00
|
|
|
from frostfs_testlib.testing.cluster_test_base import ClusterTestBase
|
2023-10-10 13:39:24 +00:00
|
|
|
from frostfs_testlib.utils.failover_utils import wait_all_storage_nodes_returned, wait_object_replication
|
2023-05-15 09:59:33 +00:00
|
|
|
from frostfs_testlib.utils.file_utils import generate_file, get_file_hash
|
|
|
|
|
2022-09-28 12:07:16 +00:00
|
|
|
logger = logging.getLogger("NeoLogger")
|
|
|
|
STORAGE_NODE_COMMUNICATION_PORT = "8080"
|
|
|
|
STORAGE_NODE_COMMUNICATION_PORT_TLS = "8082"
|
2022-08-01 06:16:36 +00:00
|
|
|
PORTS_TO_BLOCK = [STORAGE_NODE_COMMUNICATION_PORT, STORAGE_NODE_COMMUNICATION_PORT_TLS]
|
2023-08-16 08:53:14 +00:00
|
|
|
blocked_nodes: list[ClusterNode] = []
|
2023-10-10 13:39:24 +00:00
|
|
|
file_wait_delete = []
|
|
|
|
|
|
|
|
OBJECT_ATTRIBUTES = [
|
|
|
|
None,
|
|
|
|
{"key1": 1, "key2": "abc", "common_key": "common_value"},
|
|
|
|
{"key1": 2, "common_key": "common_value"},
|
|
|
|
]
|
2023-08-16 08:53:14 +00:00
|
|
|
|
|
|
|
|
2022-08-01 06:16:36 +00:00
|
|
|
@pytest.mark.failover
|
2022-11-10 05:27:52 +00:00
|
|
|
@pytest.mark.failover_network
|
2022-12-05 22:31:45 +00:00
|
|
|
class TestFailoverNetwork(ClusterTestBase):
|
|
|
|
@pytest.fixture(autouse=True)
|
2023-07-12 09:05:36 +00:00
|
|
|
@allure.title("Restore network")
|
2023-08-16 08:53:14 +00:00
|
|
|
def restore_network(self, cluster_state_controller: ClusterStateController):
|
2022-12-05 22:31:45 +00:00
|
|
|
yield
|
2023-07-12 09:05:36 +00:00
|
|
|
with allure.step(f"Count blocked nodes {len(blocked_nodes)}"):
|
|
|
|
not_empty = len(blocked_nodes) != 0
|
2022-12-05 22:31:45 +00:00
|
|
|
for node in list(blocked_nodes):
|
2023-09-19 07:21:52 +00:00
|
|
|
with allure.step(f"Restore network for {node}"):
|
2023-08-16 08:53:14 +00:00
|
|
|
cluster_state_controller.restore_traffic(mode="ports", node=node)
|
2022-12-05 22:31:45 +00:00
|
|
|
blocked_nodes.remove(node)
|
|
|
|
if not_empty:
|
2023-05-15 09:59:33 +00:00
|
|
|
wait_all_storage_nodes_returned(self.shell, self.cluster)
|
2022-12-05 22:31:45 +00:00
|
|
|
|
2023-10-10 13:39:24 +00:00
|
|
|
@pytest.fixture()
|
|
|
|
@allure.title("Restore drop traffic to system")
|
|
|
|
def restore_traffic(self, cluster_state_controller: ClusterStateController):
|
|
|
|
yield
|
|
|
|
cluster_state_controller.restore_interfaces()
|
|
|
|
|
|
|
|
@pytest.fixture()
|
|
|
|
@allure.title("Delete file after test")
|
|
|
|
def delete_file_after_test(self) -> None:
|
|
|
|
yield
|
|
|
|
for path in file_wait_delete:
|
|
|
|
os.remove(path)
|
|
|
|
|
|
|
|
@pytest.fixture()
|
|
|
|
def storage_objects(self, simple_object_size: ObjectSize, default_wallet: str) -> list[StorageObjectInfo]:
|
|
|
|
|
|
|
|
file_path = generate_file(simple_object_size.value)
|
|
|
|
file_hash = get_file_hash(file_path)
|
|
|
|
|
|
|
|
with allure.step("Create container"):
|
|
|
|
placement_rule = "REP 1"
|
|
|
|
cid = create_container(
|
|
|
|
wallet=default_wallet,
|
|
|
|
shell=self.shell,
|
|
|
|
endpoint=self.cluster.default_rpc_endpoint,
|
|
|
|
rule=placement_rule,
|
|
|
|
await_mode=True,
|
|
|
|
)
|
|
|
|
|
|
|
|
storage_objects = []
|
|
|
|
|
|
|
|
with allure.step("Put object"):
|
|
|
|
for attribute in OBJECT_ATTRIBUTES:
|
|
|
|
oid = put_object_to_random_node(
|
|
|
|
wallet=default_wallet,
|
|
|
|
path=file_path,
|
|
|
|
cid=cid,
|
|
|
|
shell=self.shell,
|
|
|
|
cluster=self.cluster,
|
|
|
|
)
|
|
|
|
|
|
|
|
storage_object = StorageObjectInfo(cid=cid, oid=oid)
|
|
|
|
storage_object.size = simple_object_size.value
|
|
|
|
storage_object.wallet_file_path = default_wallet
|
|
|
|
storage_object.file_path = file_path
|
|
|
|
storage_object.file_hash = file_hash
|
|
|
|
storage_object.attributes = attribute
|
|
|
|
|
|
|
|
storage_objects.append(storage_object)
|
|
|
|
|
|
|
|
yield storage_objects
|
|
|
|
|
|
|
|
delete_objects(storage_objects, self.shell, self.cluster)
|
|
|
|
|
2022-12-05 22:31:45 +00:00
|
|
|
@allure.title("Block Storage node traffic")
|
2022-12-07 12:38:56 +00:00
|
|
|
def test_block_storage_node_traffic(
|
2023-07-12 09:05:36 +00:00
|
|
|
self,
|
|
|
|
default_wallet: str,
|
|
|
|
require_multiple_hosts,
|
2023-08-02 11:54:03 +00:00
|
|
|
simple_object_size: ObjectSize,
|
2023-08-16 08:53:14 +00:00
|
|
|
cluster_state_controller: ClusterStateController,
|
2022-12-07 12:38:56 +00:00
|
|
|
):
|
2022-12-05 22:31:45 +00:00
|
|
|
"""
|
|
|
|
Block storage nodes traffic using iptables and wait for replication for objects.
|
|
|
|
"""
|
|
|
|
wallet = default_wallet
|
|
|
|
placement_rule = "REP 2 IN X CBF 2 SELECT 2 FROM * AS X"
|
|
|
|
wakeup_node_timeout = 10 # timeout to let nodes detect that traffic has blocked
|
|
|
|
nodes_to_block_count = 2
|
|
|
|
|
2023-08-02 11:54:03 +00:00
|
|
|
source_file_path = generate_file(simple_object_size.value)
|
2022-12-05 22:31:45 +00:00
|
|
|
cid = create_container(
|
|
|
|
wallet,
|
|
|
|
shell=self.shell,
|
|
|
|
endpoint=self.cluster.default_rpc_endpoint,
|
|
|
|
rule=placement_rule,
|
|
|
|
basic_acl=PUBLIC_ACL,
|
|
|
|
)
|
2023-10-10 13:39:24 +00:00
|
|
|
oid = put_object_to_random_node(wallet, source_file_path, cid, shell=self.shell, cluster=self.cluster)
|
2022-12-05 22:31:45 +00:00
|
|
|
|
2023-10-10 13:39:24 +00:00
|
|
|
nodes = wait_object_replication(cid, oid, 2, shell=self.shell, nodes=self.cluster.storage_nodes)
|
2022-12-05 22:31:45 +00:00
|
|
|
|
|
|
|
logger.info(f"Nodes are {nodes}")
|
|
|
|
nodes_to_block = nodes
|
|
|
|
if nodes_to_block_count > len(nodes):
|
|
|
|
# TODO: the intent of this logic is not clear, need to revisit
|
2023-05-15 09:59:33 +00:00
|
|
|
nodes_to_block = random.choices(nodes, k=2)
|
2022-12-05 22:31:45 +00:00
|
|
|
|
|
|
|
excluded_nodes = []
|
|
|
|
for node in nodes_to_block:
|
|
|
|
with allure.step(f"Block incoming traffic at node {node} on port {PORTS_TO_BLOCK}"):
|
2023-08-16 08:53:14 +00:00
|
|
|
block_node = [
|
2023-10-10 13:39:24 +00:00
|
|
|
cluster_node for cluster_node in self.cluster.cluster_nodes if cluster_node.storage_node == node
|
2023-08-16 08:53:14 +00:00
|
|
|
]
|
|
|
|
blocked_nodes.append(*block_node)
|
2022-12-05 22:31:45 +00:00
|
|
|
excluded_nodes.append(node)
|
2023-08-16 08:53:14 +00:00
|
|
|
cluster_state_controller.drop_traffic(
|
|
|
|
mode="ports",
|
|
|
|
node=node,
|
|
|
|
wakeup_timeout=wakeup_node_timeout,
|
|
|
|
ports=PORTS_TO_BLOCK,
|
|
|
|
)
|
2022-12-05 22:31:45 +00:00
|
|
|
|
|
|
|
with allure.step(f"Check object is not stored on node {node}"):
|
|
|
|
new_nodes = wait_object_replication(
|
|
|
|
cid,
|
|
|
|
oid,
|
|
|
|
2,
|
|
|
|
shell=self.shell,
|
|
|
|
nodes=list(set(self.cluster.storage_nodes) - set(excluded_nodes)),
|
|
|
|
)
|
|
|
|
assert node not in new_nodes
|
|
|
|
|
2023-05-15 09:59:33 +00:00
|
|
|
with allure.step("Check object data is not corrupted"):
|
2023-10-10 13:39:24 +00:00
|
|
|
got_file_path = get_object(wallet, cid, oid, endpoint=new_nodes[0].get_rpc_endpoint(), shell=self.shell)
|
2022-12-05 22:31:45 +00:00
|
|
|
assert get_file_hash(source_file_path) == get_file_hash(got_file_path)
|
|
|
|
|
|
|
|
for node in nodes_to_block:
|
|
|
|
with allure.step(f"Unblock incoming traffic at host {node} on port {PORTS_TO_BLOCK}"):
|
2023-08-16 08:53:14 +00:00
|
|
|
cluster_state_controller.restore_traffic(mode="ports", node=node)
|
|
|
|
block_node = [
|
2023-10-10 13:39:24 +00:00
|
|
|
cluster_node for cluster_node in self.cluster.cluster_nodes if cluster_node.storage_node == node
|
2023-08-16 08:53:14 +00:00
|
|
|
]
|
|
|
|
blocked_nodes.remove(*block_node)
|
2022-12-05 22:31:45 +00:00
|
|
|
sleep(wakeup_node_timeout)
|
2022-10-13 16:13:45 +00:00
|
|
|
|
2023-05-15 09:59:33 +00:00
|
|
|
with allure.step("Check object data is not corrupted"):
|
2023-10-10 13:39:24 +00:00
|
|
|
new_nodes = wait_object_replication(cid, oid, 2, shell=self.shell, nodes=self.cluster.storage_nodes)
|
|
|
|
|
|
|
|
got_file_path = get_object(wallet, cid, oid, shell=self.shell, endpoint=new_nodes[0].get_rpc_endpoint())
|
|
|
|
assert get_file_hash(source_file_path) == get_file_hash(got_file_path)
|
|
|
|
|
|
|
|
@allure.title("Block DATA interface node")
|
|
|
|
def test_block_data_interface(
|
|
|
|
self,
|
|
|
|
cluster_state_controller: ClusterStateController,
|
|
|
|
default_wallet: str,
|
|
|
|
restore_traffic: None,
|
|
|
|
delete_file_after_test: None,
|
|
|
|
storage_objects: list[StorageObjectInfo],
|
|
|
|
):
|
|
|
|
storage_object = storage_objects[0]
|
|
|
|
|
|
|
|
with allure.step("Search nodes with object"):
|
|
|
|
nodes_with_object = get_object_nodes(
|
|
|
|
cluster=self.cluster,
|
|
|
|
wallet=default_wallet,
|
|
|
|
cid=storage_object.cid,
|
|
|
|
oid=storage_object.oid,
|
|
|
|
shell=self.shell,
|
|
|
|
endpoint=self.cluster.default_rpc_endpoint,
|
2022-12-05 22:31:45 +00:00
|
|
|
)
|
2022-08-01 06:16:36 +00:00
|
|
|
|
2023-10-10 13:39:24 +00:00
|
|
|
with allure.step("Get data interface to node"):
|
|
|
|
data = "data"
|
|
|
|
config_interfaces = list(nodes_with_object[0].host.config.interfaces.keys())
|
|
|
|
with allure.step(f"Get {data} in {config_interfaces}"):
|
|
|
|
data_interfaces = [interface for interface in config_interfaces if data in interface]
|
|
|
|
|
|
|
|
with allure.step("Block data interfaces for node"):
|
|
|
|
for interface in data_interfaces:
|
|
|
|
cluster_state_controller.down_interface(nodes=nodes_with_object, interface=interface)
|
|
|
|
|
|
|
|
with allure.step("Tick epoch and wait 2 block"):
|
|
|
|
nodes_without_an_object = list(set(self.cluster.cluster_nodes) - set(nodes_with_object))
|
|
|
|
self.tick_epochs(1, alive_node=nodes_without_an_object[0].storage_node, wait_block=2)
|
|
|
|
|
|
|
|
with allure.step("Get object for target nodes to data interfaces, expect false"):
|
|
|
|
with pytest.raises(RuntimeError, match="return code: 1"):
|
|
|
|
get_object(
|
|
|
|
wallet=default_wallet,
|
|
|
|
cid=storage_object.cid,
|
|
|
|
oid=storage_object.oid,
|
|
|
|
shell=self.shell,
|
|
|
|
endpoint=nodes_with_object[0].storage_node.get_rpc_endpoint(),
|
|
|
|
)
|
|
|
|
|
|
|
|
with allure.step(f"Get object others nodes, expect true"):
|
|
|
|
input_file = get_object(
|
|
|
|
wallet=default_wallet,
|
|
|
|
cid=storage_object.cid,
|
|
|
|
oid=storage_object.oid,
|
|
|
|
shell=self.shell,
|
|
|
|
endpoint=nodes_without_an_object[0].storage_node.get_rpc_endpoint(),
|
2022-12-05 22:31:45 +00:00
|
|
|
)
|
2023-10-10 13:39:24 +00:00
|
|
|
file_wait_delete.append(input_file)
|