forked from TrueCloudLab/frostfs-testcases
Vladimir Domnich
d935c2cafa
Installation of iptables was implemented in environment preparation pipeline and tests do not need to worry about it. Removed conditions that were checking pytest mode vs robot mode, because we got rid of robot tests in this branch of codebase. Signed-off-by: Vladimir Domnich <v.domnich@yadro.com>
99 lines
4.2 KiB
Python
99 lines
4.2 KiB
Python
import logging
|
|
from random import choices
|
|
from time import sleep
|
|
|
|
import allure
|
|
import pytest
|
|
|
|
from common import (STORAGE_NODE_SSH_PRIVATE_KEY_PATH, STORAGE_NODE_SSH_USER,
|
|
STORAGE_NODE_SSH_PASSWORD)
|
|
from failover_utils import wait_all_storage_node_returned, wait_object_replication_on_nodes
|
|
from iptables_helper import IpTablesHelper
|
|
from python_keywords.container import create_container
|
|
from python_keywords.neofs_verbs import get_object, put_object
|
|
from python_keywords.utility_keywords import generate_file, get_file_hash
|
|
from ssh_helper import HostClient
|
|
from wellknown_acl import PUBLIC_ACL
|
|
|
|
logger = logging.getLogger('NeoLogger')
|
|
STORAGE_NODE_COMMUNICATION_PORT = '8080'
|
|
STORAGE_NODE_COMMUNICATION_PORT_TLS = '8082'
|
|
PORTS_TO_BLOCK = [STORAGE_NODE_COMMUNICATION_PORT, STORAGE_NODE_COMMUNICATION_PORT_TLS]
|
|
blocked_hosts = []
|
|
|
|
|
|
@pytest.fixture(autouse=True)
|
|
@allure.step('Restore network')
|
|
def restore_network():
|
|
yield
|
|
|
|
not_empty = len(blocked_hosts) != 0
|
|
for host in list(blocked_hosts):
|
|
with allure.step(f'Start storage node {host}'):
|
|
client = HostClient(ip=host, login=STORAGE_NODE_SSH_USER,
|
|
password=STORAGE_NODE_SSH_PASSWORD,
|
|
private_key_path=STORAGE_NODE_SSH_PRIVATE_KEY_PATH)
|
|
with client.create_ssh_connection():
|
|
IpTablesHelper.restore_input_traffic_to_port(client, PORTS_TO_BLOCK)
|
|
blocked_hosts.remove(host)
|
|
if not_empty:
|
|
wait_all_storage_node_returned()
|
|
|
|
|
|
@allure.title('Block Storage node traffic')
|
|
@pytest.mark.failover
|
|
@pytest.mark.failover_net
|
|
def test_block_storage_node_traffic(prepare_wallet_and_deposit, cloud_infrastructure_check):
|
|
"""
|
|
Block storage nodes traffic using iptables and wait for replication for objects.
|
|
"""
|
|
wallet = prepare_wallet_and_deposit
|
|
placement_rule = 'REP 2 IN X CBF 2 SELECT 2 FROM * AS X'
|
|
excluded_nodes = []
|
|
wakeup_node_timeout = 10 # timeout to let nodes detect that traffic has blocked
|
|
nodes_to_block_count = 2
|
|
|
|
source_file_path = generate_file()
|
|
cid = create_container(wallet, rule=placement_rule, basic_acl=PUBLIC_ACL)
|
|
oid = put_object(wallet, source_file_path, cid)
|
|
nodes = wait_object_replication_on_nodes(wallet, cid, oid, 2)
|
|
|
|
logger.info(f'Nodes are {nodes}')
|
|
random_nodes = [(node, node.split(':')[0]) for node in nodes]
|
|
if nodes_to_block_count > len(nodes):
|
|
random_nodes = [(node, node.split(':')[0]) for node in choices(nodes, k=2)]
|
|
|
|
for random_node, random_node_ip in random_nodes:
|
|
client = HostClient(ip=random_node_ip, login=STORAGE_NODE_SSH_USER,
|
|
password=STORAGE_NODE_SSH_PASSWORD,
|
|
private_key_path=STORAGE_NODE_SSH_PRIVATE_KEY_PATH)
|
|
|
|
with allure.step(f'Block incoming traffic for node {random_node} on port {PORTS_TO_BLOCK}'):
|
|
with client.create_ssh_connection():
|
|
IpTablesHelper.drop_input_traffic_to_port(client, PORTS_TO_BLOCK)
|
|
blocked_hosts.append(random_node_ip)
|
|
excluded_nodes.append(random_node)
|
|
sleep(wakeup_node_timeout)
|
|
|
|
new_nodes = wait_object_replication_on_nodes(wallet, cid, oid, 2, excluded_nodes=excluded_nodes)
|
|
|
|
assert random_node not in new_nodes
|
|
|
|
got_file_path = get_object(wallet, cid, oid, endpoint=new_nodes[0])
|
|
assert get_file_hash(source_file_path) == get_file_hash(got_file_path)
|
|
|
|
for random_node, random_node_ip in random_nodes:
|
|
client = HostClient(ip=random_node_ip, login=STORAGE_NODE_SSH_USER,
|
|
password=STORAGE_NODE_SSH_PASSWORD,
|
|
private_key_path=STORAGE_NODE_SSH_PRIVATE_KEY_PATH)
|
|
|
|
with allure.step(f'Unblock incoming traffic for node {random_node} on port {PORTS_TO_BLOCK}'):
|
|
with client.create_ssh_connection():
|
|
IpTablesHelper.restore_input_traffic_to_port(client, PORTS_TO_BLOCK)
|
|
blocked_hosts.remove(random_node_ip)
|
|
sleep(wakeup_node_timeout)
|
|
|
|
new_nodes = wait_object_replication_on_nodes(wallet, cid, oid, 2)
|
|
|
|
got_file_path = get_object(wallet, cid, oid, endpoint=new_nodes[0])
|
|
assert get_file_hash(source_file_path) == get_file_hash(got_file_path)
|