2012-03-28 06:10:13 +00:00
|
|
|
'''
|
|
|
|
Set up the Salt integration test suite
|
|
|
|
'''
|
|
|
|
|
|
|
|
# Import Python libs
|
2012-07-20 06:21:01 +00:00
|
|
|
import optparse
|
2012-02-20 12:18:13 +00:00
|
|
|
import multiprocessing
|
|
|
|
import os
|
2012-04-21 23:27:59 +00:00
|
|
|
import sys
|
2012-03-28 06:10:13 +00:00
|
|
|
import shutil
|
2012-10-04 23:52:00 +00:00
|
|
|
import tempfile
|
2012-11-06 11:20:06 +00:00
|
|
|
import time
|
2012-12-01 22:58:19 +00:00
|
|
|
import signal
|
2012-12-01 18:12:59 +00:00
|
|
|
from hashlib import md5
|
2012-12-04 16:29:53 +00:00
|
|
|
from subprocess import PIPE, Popen
|
2012-11-17 17:37:53 +00:00
|
|
|
from datetime import datetime, timedelta
|
2012-06-23 09:47:53 +00:00
|
|
|
try:
|
|
|
|
import pwd
|
|
|
|
except ImportError:
|
|
|
|
pass
|
2012-02-20 12:18:13 +00:00
|
|
|
|
2012-03-28 06:10:13 +00:00
|
|
|
# Import Salt libs
|
2012-02-20 12:18:13 +00:00
|
|
|
import salt
|
|
|
|
import salt.config
|
|
|
|
import salt.master
|
|
|
|
import salt.minion
|
2012-05-28 03:00:10 +00:00
|
|
|
import salt.runner
|
2012-12-01 18:12:59 +00:00
|
|
|
from salt.utils import fopen, get_colors
|
2012-03-09 07:47:34 +00:00
|
|
|
from salt.utils.verify import verify_env
|
2012-11-23 12:19:09 +00:00
|
|
|
from saltunittest import TestCase, RedirectStdStreams
|
2012-02-20 12:18:13 +00:00
|
|
|
|
2012-11-06 11:20:06 +00:00
|
|
|
try:
|
|
|
|
import console
|
|
|
|
width, height = console.getTerminalSize()
|
|
|
|
PNUM = width
|
|
|
|
except:
|
|
|
|
PNUM = 70
|
|
|
|
|
|
|
|
|
2012-06-30 20:10:34 +00:00
|
|
|
INTEGRATION_TEST_DIR = os.path.dirname(
|
|
|
|
os.path.normpath(os.path.abspath(__file__))
|
|
|
|
)
|
2012-04-21 22:58:03 +00:00
|
|
|
CODE_DIR = os.path.dirname(os.path.dirname(INTEGRATION_TEST_DIR))
|
|
|
|
SCRIPT_DIR = os.path.join(CODE_DIR, 'scripts')
|
|
|
|
|
|
|
|
PYEXEC = 'python{0}.{1}'.format(sys.version_info[0], sys.version_info[1])
|
2012-02-20 12:18:13 +00:00
|
|
|
|
2012-11-06 12:14:02 +00:00
|
|
|
SYS_TMP_DIR = tempfile.gettempdir()
|
|
|
|
TMP = os.path.join(SYS_TMP_DIR, 'salt-tests-tmpdir')
|
2012-02-20 12:18:13 +00:00
|
|
|
FILES = os.path.join(INTEGRATION_TEST_DIR, 'files')
|
2012-07-26 16:14:00 +00:00
|
|
|
MOCKBIN = os.path.join(INTEGRATION_TEST_DIR, 'mockbin')
|
2012-11-06 11:20:06 +00:00
|
|
|
|
|
|
|
|
|
|
|
def print_header(header, sep='~', top=True, bottom=True, inline=False,
|
|
|
|
centered=False):
|
|
|
|
'''
|
|
|
|
Allows some pretty printing of headers on the console, either with a
|
|
|
|
"ruler" on bottom and/or top, inline, centered, etc.
|
|
|
|
'''
|
|
|
|
if top and not inline:
|
|
|
|
print(sep * PNUM)
|
|
|
|
|
|
|
|
if centered and not inline:
|
|
|
|
fmt = u'{0:^{width}}'
|
|
|
|
elif inline and not centered:
|
|
|
|
fmt = u'{0:{sep}<{width}}'
|
|
|
|
elif inline and centered:
|
|
|
|
fmt = u'{0:{sep}^{width}}'
|
|
|
|
else:
|
|
|
|
fmt = u'{0}'
|
|
|
|
print(fmt.format(header, sep=sep, width=PNUM))
|
|
|
|
|
|
|
|
if bottom and not inline:
|
|
|
|
print(sep * PNUM)
|
2012-02-20 12:18:13 +00:00
|
|
|
|
2012-05-29 16:40:20 +00:00
|
|
|
|
2012-07-20 06:21:01 +00:00
|
|
|
def run_tests(TestCase):
|
|
|
|
'''
|
|
|
|
Run integration tests for a chosen test case.
|
|
|
|
|
|
|
|
Function uses optparse to set up test environment
|
|
|
|
'''
|
|
|
|
from saltunittest import TestLoader, TextTestRunner
|
|
|
|
opts = parse_opts()
|
|
|
|
loader = TestLoader()
|
|
|
|
tests = loader.loadTestsFromTestCase(TestCase)
|
|
|
|
print('Setting up Salt daemons to execute tests')
|
|
|
|
with TestDaemon(clean=opts.clean):
|
|
|
|
runner = TextTestRunner(verbosity=opts.verbosity).run(tests)
|
|
|
|
sys.exit(runner.wasSuccessful())
|
|
|
|
|
|
|
|
|
|
|
|
def parse_opts():
|
|
|
|
'''
|
|
|
|
Parse command line options for running integration tests
|
|
|
|
'''
|
|
|
|
parser = optparse.OptionParser()
|
|
|
|
parser.add_option('-v',
|
|
|
|
'--verbose',
|
|
|
|
dest='verbosity',
|
|
|
|
default=1,
|
|
|
|
action='count',
|
|
|
|
help='Verbose test runner output')
|
|
|
|
parser.add_option('--clean',
|
|
|
|
dest='clean',
|
|
|
|
default=True,
|
|
|
|
action='store_true',
|
|
|
|
help=('Clean up test environment before and after '
|
|
|
|
'integration testing (default behaviour)'))
|
|
|
|
parser.add_option('--no-clean',
|
|
|
|
dest='clean',
|
|
|
|
action='store_false',
|
|
|
|
help=('Don\'t clean up test environment before and after '
|
|
|
|
'integration testing (speed up test process)'))
|
|
|
|
options, _ = parser.parse_args()
|
|
|
|
return options
|
|
|
|
|
|
|
|
|
2012-02-20 12:18:13 +00:00
|
|
|
class TestDaemon(object):
|
|
|
|
'''
|
|
|
|
Set up the master and minion daemons, and run related cases
|
|
|
|
'''
|
2012-12-04 13:02:56 +00:00
|
|
|
MINIONS_CONNECT_TIMEOUT = MINIONS_SYNC_TIMEOUT = 120
|
2012-07-20 06:16:14 +00:00
|
|
|
|
2012-11-06 18:11:26 +00:00
|
|
|
def __init__(self, opts=None):
|
|
|
|
self.opts = opts
|
2012-11-21 10:01:45 +00:00
|
|
|
self.colors = get_colors(opts.no_colors is False)
|
2012-07-20 06:16:14 +00:00
|
|
|
|
2012-02-20 12:18:13 +00:00
|
|
|
def __enter__(self):
|
|
|
|
'''
|
|
|
|
Start a master and minion
|
|
|
|
'''
|
2012-03-09 07:47:34 +00:00
|
|
|
self.master_opts = salt.config.master_config(
|
2012-06-30 20:10:34 +00:00
|
|
|
os.path.join(INTEGRATION_TEST_DIR, 'files', 'conf', 'master')
|
|
|
|
)
|
2012-03-09 07:47:34 +00:00
|
|
|
self.minion_opts = salt.config.minion_config(
|
2012-06-30 20:10:34 +00:00
|
|
|
os.path.join(INTEGRATION_TEST_DIR, 'files', 'conf', 'minion')
|
|
|
|
)
|
2012-12-03 23:35:32 +00:00
|
|
|
#if sys.version_info < (2, 7):
|
|
|
|
# self.minion_opts['multiprocessing'] = False
|
2012-05-23 14:04:38 +00:00
|
|
|
self.sub_minion_opts = salt.config.minion_config(
|
2012-06-30 20:10:34 +00:00
|
|
|
os.path.join(INTEGRATION_TEST_DIR, 'files', 'conf', 'sub_minion')
|
|
|
|
)
|
2012-12-03 23:35:32 +00:00
|
|
|
#if sys.version_info < (2, 7):
|
|
|
|
# self.sub_minion_opts['multiprocessing'] = False
|
2012-03-29 04:14:31 +00:00
|
|
|
self.smaster_opts = salt.config.master_config(
|
2012-06-30 20:10:34 +00:00
|
|
|
os.path.join(
|
|
|
|
INTEGRATION_TEST_DIR, 'files', 'conf', 'syndic_master'
|
|
|
|
)
|
|
|
|
)
|
2012-03-29 07:03:37 +00:00
|
|
|
self.syndic_opts = salt.config.minion_config(
|
2012-05-10 04:36:20 +00:00
|
|
|
os.path.join(INTEGRATION_TEST_DIR, 'files', 'conf', 'syndic'))
|
2012-04-09 03:31:08 +00:00
|
|
|
self.syndic_opts['_master_conf_file'] = os.path.join(
|
2012-06-30 20:10:34 +00:00
|
|
|
INTEGRATION_TEST_DIR,
|
|
|
|
'files/conf/master'
|
|
|
|
)
|
2012-03-29 22:19:19 +00:00
|
|
|
# Set up config options that require internal data
|
|
|
|
self.master_opts['pillar_roots'] = {
|
2012-06-30 20:10:34 +00:00
|
|
|
'base': [os.path.join(FILES, 'pillar', 'base')]
|
|
|
|
}
|
2012-03-29 22:51:56 +00:00
|
|
|
self.master_opts['file_roots'] = {
|
2012-06-30 20:10:34 +00:00
|
|
|
'base': [os.path.join(FILES, 'file', 'base')]
|
|
|
|
}
|
2012-04-09 03:31:08 +00:00
|
|
|
self.master_opts['ext_pillar'] = [
|
2012-06-30 20:10:34 +00:00
|
|
|
{'cmd_yaml': 'cat {0}'.format(
|
|
|
|
os.path.join(
|
|
|
|
FILES,
|
|
|
|
'ext.yaml'
|
|
|
|
)
|
|
|
|
)}
|
|
|
|
]
|
2012-03-28 06:10:13 +00:00
|
|
|
# clean up the old files
|
2012-04-04 05:14:26 +00:00
|
|
|
self._clean()
|
2012-10-05 06:10:53 +00:00
|
|
|
|
|
|
|
# Point the config values to the correct temporary paths
|
|
|
|
for name in ('hosts', 'aliases'):
|
2012-11-06 11:20:06 +00:00
|
|
|
optname = '{0}.file'.format(name)
|
|
|
|
optname_path = os.path.join(TMP, name)
|
|
|
|
self.master_opts[optname] = optname_path
|
|
|
|
self.minion_opts[optname] = optname_path
|
|
|
|
self.sub_minion_opts[optname] = optname_path
|
2012-10-05 06:10:53 +00:00
|
|
|
|
2012-07-09 04:50:12 +00:00
|
|
|
verify_env([os.path.join(self.master_opts['pki_dir'], 'minions'),
|
2012-02-20 12:18:13 +00:00
|
|
|
os.path.join(self.master_opts['pki_dir'], 'minions_pre'),
|
2012-07-09 04:50:12 +00:00
|
|
|
os.path.join(self.master_opts['pki_dir'],
|
|
|
|
'minions_rejected'),
|
2012-02-20 12:18:13 +00:00
|
|
|
os.path.join(self.master_opts['cachedir'], 'jobs'),
|
2012-03-29 04:14:31 +00:00
|
|
|
os.path.join(self.smaster_opts['pki_dir'], 'minions'),
|
|
|
|
os.path.join(self.smaster_opts['pki_dir'], 'minions_pre'),
|
2012-07-09 04:50:12 +00:00
|
|
|
os.path.join(self.smaster_opts['pki_dir'],
|
|
|
|
'minions_rejected'),
|
2012-03-29 04:14:31 +00:00
|
|
|
os.path.join(self.smaster_opts['cachedir'], 'jobs'),
|
2012-02-20 12:18:13 +00:00
|
|
|
os.path.dirname(self.master_opts['log_file']),
|
|
|
|
self.minion_opts['extension_modules'],
|
2012-05-23 14:04:38 +00:00
|
|
|
self.sub_minion_opts['extension_modules'],
|
|
|
|
self.sub_minion_opts['pki_dir'],
|
2012-02-20 12:18:13 +00:00
|
|
|
self.master_opts['sock_dir'],
|
2012-03-29 04:14:31 +00:00
|
|
|
self.smaster_opts['sock_dir'],
|
2012-07-08 04:11:36 +00:00
|
|
|
self.sub_minion_opts['sock_dir'],
|
|
|
|
self.minion_opts['sock_dir'],
|
2012-10-05 01:45:35 +00:00
|
|
|
TMP
|
2012-06-03 05:17:52 +00:00
|
|
|
],
|
2012-10-02 12:04:22 +00:00
|
|
|
pwd.getpwuid(os.getuid()).pw_name)
|
|
|
|
|
2012-07-26 16:14:00 +00:00
|
|
|
# Set up PATH to mockbin
|
|
|
|
self._enter_mockbin()
|
2012-02-20 12:18:13 +00:00
|
|
|
|
|
|
|
master = salt.master.Master(self.master_opts)
|
|
|
|
self.master_process = multiprocessing.Process(target=master.start)
|
|
|
|
self.master_process.start()
|
|
|
|
|
|
|
|
minion = salt.minion.Minion(self.minion_opts)
|
|
|
|
self.minion_process = multiprocessing.Process(target=minion.tune_in)
|
|
|
|
self.minion_process.start()
|
|
|
|
|
2012-05-23 14:04:38 +00:00
|
|
|
sub_minion = salt.minion.Minion(self.sub_minion_opts)
|
|
|
|
self.sub_minion_process = multiprocessing.Process(
|
2012-06-30 20:10:34 +00:00
|
|
|
target=sub_minion.tune_in
|
|
|
|
)
|
2012-05-23 14:04:38 +00:00
|
|
|
self.sub_minion_process.start()
|
|
|
|
|
2012-03-29 04:14:31 +00:00
|
|
|
smaster = salt.master.Master(self.smaster_opts)
|
|
|
|
self.smaster_process = multiprocessing.Process(target=smaster.start)
|
|
|
|
self.smaster_process.start()
|
|
|
|
|
|
|
|
syndic = salt.minion.Syndic(self.syndic_opts)
|
|
|
|
self.syndic_process = multiprocessing.Process(target=syndic.tune_in)
|
|
|
|
self.syndic_process.start()
|
|
|
|
|
2012-11-06 18:11:26 +00:00
|
|
|
#if os.environ.get('DUMP_SALT_CONFIG', None) is not None:
|
|
|
|
# try:
|
|
|
|
# import yaml
|
|
|
|
# os.makedirs('/tmp/salttest/conf')
|
|
|
|
# except OSError:
|
|
|
|
# pass
|
|
|
|
# self.master_opts['user'] = pwd.getpwuid(os.getuid()).pw_name
|
|
|
|
# self.minion_opts['user'] = pwd.getpwuid(os.getuid()).pw_name
|
|
|
|
# open('/tmp/salttest/conf/master', 'w').write(
|
|
|
|
# yaml.dump(self.master_opts)
|
|
|
|
# )
|
|
|
|
# open('/tmp/salttest/conf/minion', 'w').write(
|
|
|
|
# yaml.dump(self.minion_opts)
|
|
|
|
# )
|
|
|
|
|
2012-11-06 11:20:06 +00:00
|
|
|
# Let's create a local client to ping and sync minions
|
|
|
|
self.client = salt.client.LocalClient(
|
|
|
|
os.path.join(INTEGRATION_TEST_DIR, 'files', 'conf', 'master')
|
|
|
|
)
|
|
|
|
|
2012-11-26 05:44:18 +00:00
|
|
|
self.minion_targets = set(['minion', 'sub_minion'])
|
|
|
|
self.pre_setup_minions()
|
|
|
|
self.setup_minions()
|
2012-11-06 11:20:06 +00:00
|
|
|
|
2012-11-06 18:11:26 +00:00
|
|
|
if self.opts.sysinfo:
|
|
|
|
from salt import version
|
|
|
|
print_header('~~~~~~~ Versions Report ', inline=True)
|
|
|
|
print('\n'.join(version.versions_report()))
|
|
|
|
|
|
|
|
print_header(
|
|
|
|
'~~~~~~~ Minion Grains Information ', inline=True,
|
|
|
|
)
|
|
|
|
grains = self.client.cmd('minion', 'grains.items')
|
|
|
|
import pprint
|
|
|
|
pprint.pprint(grains['minion'])
|
|
|
|
|
|
|
|
print_header('', sep='=', inline=True)
|
|
|
|
|
2012-11-26 05:44:18 +00:00
|
|
|
try:
|
|
|
|
return self
|
|
|
|
finally:
|
|
|
|
self.post_setup_minions()
|
2012-02-20 12:18:13 +00:00
|
|
|
|
|
|
|
def __exit__(self, type, value, traceback):
|
|
|
|
'''
|
|
|
|
Kill the minion and master processes
|
|
|
|
'''
|
2012-05-23 14:04:38 +00:00
|
|
|
self.sub_minion_process.terminate()
|
2012-02-20 12:18:13 +00:00
|
|
|
self.minion_process.terminate()
|
|
|
|
self.master_process.terminate()
|
2012-03-29 04:14:31 +00:00
|
|
|
self.syndic_process.terminate()
|
|
|
|
self.smaster_process.terminate()
|
2012-07-26 16:14:00 +00:00
|
|
|
self._exit_mockbin()
|
2012-04-04 05:14:26 +00:00
|
|
|
self._clean()
|
2012-02-20 12:18:13 +00:00
|
|
|
|
2012-11-26 05:44:18 +00:00
|
|
|
def pre_setup_minions(self):
|
|
|
|
"""
|
|
|
|
Subclass this method for additional minion setups.
|
|
|
|
"""
|
|
|
|
|
|
|
|
def setup_minions(self):
|
|
|
|
# Wait for minions to connect back
|
|
|
|
wait_minion_connections = multiprocessing.Process(
|
|
|
|
target=self.wait_for_minion_connections,
|
|
|
|
args=(self.minion_targets, self.MINIONS_CONNECT_TIMEOUT)
|
|
|
|
)
|
|
|
|
wait_minion_connections.start()
|
|
|
|
wait_minion_connections.join()
|
|
|
|
wait_minion_connections.terminate()
|
|
|
|
if wait_minion_connections.exitcode > 0:
|
2012-12-04 13:36:33 +00:00
|
|
|
print(
|
2012-12-04 16:29:53 +00:00
|
|
|
'\n {RED_BOLD}*{ENDC} ERROR: Minions failed to connect'.format(
|
2012-12-04 13:36:33 +00:00
|
|
|
**self.colors
|
|
|
|
)
|
|
|
|
)
|
2012-11-26 05:44:18 +00:00
|
|
|
return False
|
|
|
|
|
|
|
|
del(wait_minion_connections)
|
|
|
|
|
2012-12-04 13:36:33 +00:00
|
|
|
sync_needed = self.opts.clean
|
|
|
|
if self.opts.clean is False:
|
2012-12-01 18:12:59 +00:00
|
|
|
def sumfile(fpath):
|
2012-12-04 13:36:33 +00:00
|
|
|
# Since we will be do'in this for small files, it should be ok
|
2012-12-01 18:12:59 +00:00
|
|
|
fobj = fopen(fpath)
|
|
|
|
m = md5()
|
|
|
|
while True:
|
|
|
|
d = fobj.read(8096)
|
|
|
|
if not d:
|
|
|
|
break
|
|
|
|
m.update(d)
|
|
|
|
return m.hexdigest()
|
|
|
|
# Since we're not cleaning up, let's see if modules are already up
|
|
|
|
# to date so we don't need to re-sync them
|
|
|
|
modules_dir = os.path.join(FILES, 'file', 'base', '_modules')
|
|
|
|
for fname in os.listdir(modules_dir):
|
|
|
|
if not fname.endswith('.py'):
|
|
|
|
continue
|
|
|
|
dfile = os.path.join(
|
|
|
|
'/tmp/salttest/cachedir/extmods/modules/', fname
|
|
|
|
)
|
|
|
|
|
|
|
|
if not os.path.exists(dfile):
|
|
|
|
sync_needed = True
|
|
|
|
break
|
|
|
|
|
|
|
|
sfile = os.path.join(modules_dir, fname)
|
|
|
|
if sumfile(sfile) != sumfile(dfile):
|
|
|
|
sync_needed = True
|
|
|
|
break
|
|
|
|
|
|
|
|
if sync_needed:
|
|
|
|
# Wait for minions to "sync_all"
|
|
|
|
sync_minions = multiprocessing.Process(
|
2012-12-04 17:36:45 +00:00
|
|
|
target=self.sync_minion_modules,
|
2012-12-01 18:12:59 +00:00
|
|
|
args=(self.minion_targets, self.MINIONS_SYNC_TIMEOUT)
|
|
|
|
)
|
|
|
|
sync_minions.start()
|
|
|
|
sync_minions.join()
|
|
|
|
if sync_minions.exitcode > 0:
|
|
|
|
return False
|
|
|
|
sync_minions.terminate()
|
|
|
|
del(sync_minions)
|
|
|
|
|
2012-11-26 05:44:18 +00:00
|
|
|
return True
|
|
|
|
|
|
|
|
def post_setup_minions(self):
|
|
|
|
"""
|
|
|
|
Subclass this method to execute code after the minions have been setup
|
|
|
|
"""
|
|
|
|
|
2012-07-26 16:14:00 +00:00
|
|
|
def _enter_mockbin(self):
|
|
|
|
path = os.environ.get('PATH', '')
|
|
|
|
path_items = path.split(os.pathsep)
|
|
|
|
if MOCKBIN not in path_items:
|
|
|
|
path_items.insert(0, MOCKBIN)
|
|
|
|
os.environ['PATH'] = os.pathsep.join(path_items)
|
|
|
|
|
|
|
|
def _exit_mockbin(self):
|
|
|
|
path = os.environ.get('PATH', '')
|
|
|
|
path_items = path.split(os.pathsep)
|
|
|
|
try:
|
|
|
|
path_items.remove(MOCKBIN)
|
|
|
|
except ValueError:
|
|
|
|
pass
|
|
|
|
os.environ['PATH'] = os.pathsep.join(path_items)
|
|
|
|
|
2012-04-04 05:14:26 +00:00
|
|
|
def _clean(self):
|
|
|
|
'''
|
|
|
|
Clean out the tmp files
|
|
|
|
'''
|
2012-11-21 10:01:45 +00:00
|
|
|
if not self.opts.clean:
|
2012-07-20 06:16:14 +00:00
|
|
|
return
|
2012-05-31 10:43:03 +00:00
|
|
|
if os.path.isdir(self.sub_minion_opts['root_dir']):
|
|
|
|
shutil.rmtree(self.sub_minion_opts['root_dir'])
|
2012-04-04 05:14:26 +00:00
|
|
|
if os.path.isdir(self.master_opts['root_dir']):
|
|
|
|
shutil.rmtree(self.master_opts['root_dir'])
|
2012-05-31 10:43:03 +00:00
|
|
|
if os.path.isdir(self.smaster_opts['root_dir']):
|
|
|
|
shutil.rmtree(self.smaster_opts['root_dir'])
|
2012-10-04 23:52:00 +00:00
|
|
|
if os.path.isdir(TMP):
|
|
|
|
shutil.rmtree(TMP)
|
2012-02-20 12:18:13 +00:00
|
|
|
|
2012-11-09 15:25:16 +00:00
|
|
|
def wait_for_jid(self, targets, jid, timeout=120):
|
2012-11-26 05:44:18 +00:00
|
|
|
time.sleep(1) # Allow some time for minions to accept jobs
|
2012-11-17 17:37:53 +00:00
|
|
|
now = datetime.now()
|
|
|
|
expire = now + timedelta(seconds=timeout)
|
2012-11-26 05:44:18 +00:00
|
|
|
job_finished = False
|
2012-11-17 17:37:53 +00:00
|
|
|
while now <= expire:
|
2012-11-09 15:25:16 +00:00
|
|
|
running = self.__client_job_running(targets, jid)
|
|
|
|
sys.stdout.write('\r' + ' ' * PNUM + '\r')
|
2012-11-26 05:44:18 +00:00
|
|
|
if not running and job_finished is False:
|
|
|
|
# Let's not have false positives and wait one more seconds
|
|
|
|
job_finished = True
|
|
|
|
elif not running and job_finished is True:
|
2012-11-09 15:25:16 +00:00
|
|
|
return True
|
2012-11-26 05:44:18 +00:00
|
|
|
elif running and job_finished is True:
|
|
|
|
job_finished = False
|
|
|
|
|
|
|
|
if job_finished is False:
|
|
|
|
sys.stdout.write(
|
|
|
|
' * {YELLOW}[Quit in {0}]{ENDC} Waiting for {1}'.format(
|
|
|
|
'{0}'.format(expire - now).rsplit('.', 1)[0],
|
|
|
|
', '.join(running),
|
|
|
|
**self.colors
|
|
|
|
)
|
2012-11-09 15:25:16 +00:00
|
|
|
)
|
2012-11-26 05:44:18 +00:00
|
|
|
sys.stdout.flush()
|
2012-11-09 15:25:16 +00:00
|
|
|
time.sleep(1)
|
2012-11-17 17:37:53 +00:00
|
|
|
now = datetime.now()
|
2012-11-09 15:25:16 +00:00
|
|
|
else:
|
2012-11-26 05:44:18 +00:00
|
|
|
sys.stdout.write(
|
|
|
|
'\n {RED_BOLD}*{ENDC} ERROR: Failed to get information '
|
|
|
|
'back\n'.format(**self.colors)
|
|
|
|
)
|
2012-11-09 15:25:16 +00:00
|
|
|
sys.stdout.flush()
|
|
|
|
return False
|
|
|
|
|
|
|
|
def __client_job_running(self, targets, jid):
|
|
|
|
running = self.client.cmd(
|
|
|
|
','.join(targets), 'saltutil.running', expr_form='list'
|
|
|
|
)
|
|
|
|
return [
|
|
|
|
k for (k, v) in running.iteritems() if v and v[0]['jid'] == jid
|
|
|
|
]
|
|
|
|
|
2012-11-26 05:44:18 +00:00
|
|
|
def wait_for_minion_connections(self, targets, timeout):
|
|
|
|
sys.stdout.write(
|
|
|
|
' {LIGHT_BLUE}*{ENDC} Waiting at most {0} for minions({1}) to '
|
|
|
|
'connect back\n'.format(
|
|
|
|
(timeout > 60 and
|
|
|
|
timedelta(seconds=timeout) or
|
|
|
|
'{0} secs'.format(timeout)),
|
|
|
|
', '.join(targets),
|
|
|
|
**self.colors
|
|
|
|
)
|
2012-11-06 11:20:06 +00:00
|
|
|
)
|
2012-11-26 05:44:18 +00:00
|
|
|
sys.stdout.flush()
|
2012-11-06 11:20:06 +00:00
|
|
|
expected_connections = set(targets)
|
2012-11-26 05:44:18 +00:00
|
|
|
now = datetime.now()
|
|
|
|
expire = now + timedelta(seconds=timeout)
|
|
|
|
while now <= expire:
|
|
|
|
sys.stdout.write('\r' + ' ' * PNUM + '\r')
|
|
|
|
sys.stdout.write(
|
|
|
|
' * {YELLOW}[Quit in {0}]{ENDC} Waiting for {1}'.format(
|
|
|
|
'{0}'.format(expire - now).rsplit('.', 1)[0],
|
|
|
|
', '.join(expected_connections),
|
|
|
|
**self.colors
|
|
|
|
)
|
|
|
|
)
|
|
|
|
sys.stdout.flush()
|
2012-11-26 04:32:25 +00:00
|
|
|
|
2012-11-26 05:44:18 +00:00
|
|
|
responses = self.client.cmd(
|
|
|
|
','.join(expected_connections), 'test.ping', expr_form='list',
|
|
|
|
)
|
|
|
|
for target in responses:
|
2012-11-06 11:20:06 +00:00
|
|
|
if target not in expected_connections:
|
|
|
|
# Someone(minion) else "listening"?
|
2012-11-26 05:44:18 +00:00
|
|
|
print target
|
2012-11-06 11:20:06 +00:00
|
|
|
continue
|
|
|
|
expected_connections.remove(target)
|
2012-11-26 05:44:18 +00:00
|
|
|
sys.stdout.write('\r' + ' ' * PNUM + '\r')
|
|
|
|
sys.stdout.write(
|
|
|
|
' {LIGHT_GREEN}*{ENDC} {0} connected.\n'.format(
|
2012-11-26 04:32:25 +00:00
|
|
|
target, **self.colors
|
|
|
|
)
|
|
|
|
)
|
2012-11-26 05:44:18 +00:00
|
|
|
sys.stdout.flush()
|
|
|
|
|
2012-11-06 11:20:06 +00:00
|
|
|
if not expected_connections:
|
2012-11-26 05:44:18 +00:00
|
|
|
return
|
|
|
|
|
2012-11-06 11:20:06 +00:00
|
|
|
time.sleep(1)
|
2012-11-26 05:44:18 +00:00
|
|
|
now = datetime.now()
|
|
|
|
else:
|
|
|
|
print(
|
|
|
|
'\n {RED_BOLD}*{ENDC} WARNING: Minions failed to connect '
|
|
|
|
'back. Tests requiring them WILL fail'.format(**self.colors)
|
|
|
|
)
|
|
|
|
print_header('=', sep='=', inline=True)
|
|
|
|
raise SystemExit()
|
2012-11-06 11:20:06 +00:00
|
|
|
|
2012-12-04 16:29:53 +00:00
|
|
|
def sync_minion_modules(self, targets, timeout=120):
|
2012-11-06 11:20:06 +00:00
|
|
|
# Let's sync all connected minions
|
2012-11-26 05:44:18 +00:00
|
|
|
print(
|
2012-12-04 16:29:53 +00:00
|
|
|
' {LIGHT_BLUE}*{ENDC} Syncing minion\'s modules '
|
|
|
|
'(saltutil.sync_modules)'.format(
|
2012-11-26 05:44:18 +00:00
|
|
|
', '.join(targets),
|
|
|
|
**self.colors
|
|
|
|
)
|
|
|
|
)
|
2012-11-06 11:20:06 +00:00
|
|
|
syncing = set(targets)
|
|
|
|
jid_info = self.client.run_job(
|
2012-12-04 16:29:53 +00:00
|
|
|
','.join(targets), 'saltutil.sync_modules',
|
2012-11-06 11:20:06 +00:00
|
|
|
expr_form='list',
|
|
|
|
timeout=9999999999999999,
|
|
|
|
)
|
|
|
|
|
2012-11-26 05:44:18 +00:00
|
|
|
if self.wait_for_jid(targets, jid_info['jid'], timeout) is False:
|
|
|
|
print(
|
2012-12-04 16:29:53 +00:00
|
|
|
' {RED_BOLD}*{ENDC} WARNING: Minions failed to sync modules. '
|
|
|
|
'Tests requiring these modules WILL fail'.format(**self.colors)
|
2012-11-26 05:44:18 +00:00
|
|
|
)
|
|
|
|
raise SystemExit()
|
2012-11-09 15:25:16 +00:00
|
|
|
|
2012-11-06 11:20:06 +00:00
|
|
|
while syncing:
|
|
|
|
rdata = self.client.get_returns(jid_info['jid'], syncing, 1)
|
|
|
|
if rdata:
|
2012-11-26 05:44:18 +00:00
|
|
|
for name, output in rdata.iteritems():
|
|
|
|
print(
|
2012-12-04 16:29:53 +00:00
|
|
|
' {LIGHT_GREEN}*{ENDC} Synced {0} modules: '
|
2012-12-04 17:36:45 +00:00
|
|
|
'{1}'.format(name, ', '.join(output), **self.colors)
|
2012-11-26 05:44:18 +00:00
|
|
|
)
|
2012-11-06 11:20:06 +00:00
|
|
|
# Synced!
|
|
|
|
try:
|
|
|
|
syncing.remove(name)
|
|
|
|
except KeyError:
|
2012-11-26 05:44:18 +00:00
|
|
|
print(
|
|
|
|
' {RED_BOLD}*{ENDC} {0} already synced??? '
|
|
|
|
'{1}'.format(name, output, **self.colors)
|
|
|
|
)
|
|
|
|
return True
|
2012-11-06 11:20:06 +00:00
|
|
|
|
2012-05-28 03:00:10 +00:00
|
|
|
|
2012-12-04 11:51:37 +00:00
|
|
|
class SaltClientTestCaseMixIn(object):
|
2012-11-07 13:40:39 +00:00
|
|
|
|
2012-12-04 11:51:37 +00:00
|
|
|
_salt_client_config_file_name_ = 'master'
|
|
|
|
__slots__ = ('client', '_salt_client_config_file_name_')
|
2012-11-07 13:40:39 +00:00
|
|
|
|
|
|
|
@property
|
|
|
|
def client(self):
|
2012-12-04 11:51:37 +00:00
|
|
|
return salt.client.LocalClient(
|
|
|
|
os.path.join(
|
|
|
|
INTEGRATION_TEST_DIR, 'files', 'conf',
|
|
|
|
self._salt_client_config_file_name_
|
2012-11-07 13:40:39 +00:00
|
|
|
)
|
2012-12-04 11:51:37 +00:00
|
|
|
)
|
|
|
|
|
|
|
|
|
|
|
|
class ModuleCase(TestCase, SaltClientTestCaseMixIn):
|
|
|
|
'''
|
|
|
|
Execute a module function
|
|
|
|
'''
|
2012-02-20 12:18:13 +00:00
|
|
|
|
2012-10-17 18:06:17 +00:00
|
|
|
def minion_run(self, _function, *args, **kw):
|
|
|
|
'''
|
|
|
|
Run a single salt function on the 'minion' target and condition
|
|
|
|
the return down to match the behavior of the raw function call
|
|
|
|
'''
|
|
|
|
return self.run_function(_function, args, **kw)
|
|
|
|
|
2012-09-01 06:29:06 +00:00
|
|
|
def run_function(self, function, arg=(), minion_tgt='minion', **kwargs):
|
2012-02-20 12:18:13 +00:00
|
|
|
'''
|
|
|
|
Run a single salt function and condition the return down to match the
|
|
|
|
behavior of the raw function call
|
|
|
|
'''
|
2012-09-01 04:20:53 +00:00
|
|
|
know_to_return_none = ('file.chown', 'file.chgrp')
|
2012-08-04 22:25:37 +00:00
|
|
|
orig = self.client.cmd(
|
2012-10-04 23:52:00 +00:00
|
|
|
minion_tgt, function, arg, timeout=500, kwarg=kwargs
|
2012-08-04 22:25:37 +00:00
|
|
|
)
|
2012-09-01 06:29:06 +00:00
|
|
|
|
2012-09-07 19:03:44 +00:00
|
|
|
if minion_tgt not in orig:
|
|
|
|
self.skipTest(
|
|
|
|
'WARNING(SHOULD NOT HAPPEN #1935): Failed to get a reply '
|
2012-10-05 06:10:53 +00:00
|
|
|
'from the minion \'{0}\'. Command output: {1}'.format(
|
|
|
|
minion_tgt, orig
|
|
|
|
)
|
2012-09-07 19:03:44 +00:00
|
|
|
)
|
|
|
|
elif orig[minion_tgt] is None and function not in know_to_return_none:
|
2012-09-01 04:20:53 +00:00
|
|
|
self.skipTest(
|
|
|
|
'WARNING(SHOULD NOT HAPPEN #1935): Failed to get \'{0}\' from '
|
2012-10-05 06:10:53 +00:00
|
|
|
'the minion \'{1}\'. Command output: {2}'.format(
|
|
|
|
function, minion_tgt, orig
|
|
|
|
)
|
2012-09-01 04:20:53 +00:00
|
|
|
)
|
2012-09-01 06:29:06 +00:00
|
|
|
return orig[minion_tgt]
|
2012-02-20 12:18:13 +00:00
|
|
|
|
2012-05-13 02:40:28 +00:00
|
|
|
def run_state(self, function, **kwargs):
|
|
|
|
'''
|
|
|
|
Run the state.single command and return the state return structure
|
|
|
|
'''
|
2012-05-13 04:27:30 +00:00
|
|
|
return self.run_function('state.single', [function], **kwargs)
|
2012-05-13 02:40:28 +00:00
|
|
|
|
2012-06-30 20:54:23 +00:00
|
|
|
@property
|
2012-02-20 12:18:13 +00:00
|
|
|
def minion_opts(self):
|
|
|
|
'''
|
|
|
|
Return the options used for the minion
|
|
|
|
'''
|
|
|
|
return salt.config.minion_config(
|
2012-08-04 22:25:37 +00:00
|
|
|
os.path.join(INTEGRATION_TEST_DIR, 'files', 'conf', 'minion')
|
2012-07-09 04:50:12 +00:00
|
|
|
)
|
2012-02-20 12:18:13 +00:00
|
|
|
|
2012-06-30 20:54:23 +00:00
|
|
|
@property
|
2012-09-01 06:29:06 +00:00
|
|
|
def sub_minion_opts(self):
|
2012-02-20 12:18:13 +00:00
|
|
|
'''
|
|
|
|
Return the options used for the minion
|
|
|
|
'''
|
|
|
|
return salt.config.minion_config(
|
2012-09-01 06:29:06 +00:00
|
|
|
os.path.join(INTEGRATION_TEST_DIR, 'files', 'conf', 'sub_minion')
|
|
|
|
)
|
|
|
|
|
|
|
|
@property
|
|
|
|
def master_opts(self):
|
|
|
|
'''
|
|
|
|
Return the options used for the minion
|
|
|
|
'''
|
|
|
|
return salt.config.master_config(
|
2012-08-04 22:25:37 +00:00
|
|
|
os.path.join(INTEGRATION_TEST_DIR, 'files', 'conf', 'master')
|
2012-07-09 04:50:12 +00:00
|
|
|
)
|
2012-03-29 04:25:59 +00:00
|
|
|
|
2012-05-29 16:40:20 +00:00
|
|
|
|
2012-12-04 11:51:37 +00:00
|
|
|
class SyndicCase(TestCase, SaltClientTestCaseMixIn):
|
2012-03-29 04:25:59 +00:00
|
|
|
'''
|
|
|
|
Execute a syndic based execution test
|
|
|
|
'''
|
2012-12-04 11:51:37 +00:00
|
|
|
_salt_client_config_file_name_ = 'syndic_master'
|
2012-03-29 04:25:59 +00:00
|
|
|
|
|
|
|
def run_function(self, function, arg=()):
|
|
|
|
'''
|
|
|
|
Run a single salt function and condition the return down to match the
|
|
|
|
behavior of the raw function call
|
|
|
|
'''
|
2012-10-04 23:52:00 +00:00
|
|
|
orig = self.client.cmd('minion', function, arg, timeout=500)
|
2012-09-07 19:24:35 +00:00
|
|
|
if 'minion' not in orig:
|
|
|
|
self.skipTest(
|
|
|
|
'WARNING(SHOULD NOT HAPPEN #1935): Failed to get a reply '
|
2012-10-05 06:10:53 +00:00
|
|
|
'from the minion. Command output: {0}'.format(orig)
|
2012-09-07 19:24:35 +00:00
|
|
|
)
|
2012-03-29 04:25:59 +00:00
|
|
|
return orig['minion']
|
2012-04-21 22:58:03 +00:00
|
|
|
|
2012-05-13 02:40:28 +00:00
|
|
|
|
2012-04-21 23:52:29 +00:00
|
|
|
class ShellCase(TestCase):
|
2012-04-21 22:58:03 +00:00
|
|
|
'''
|
|
|
|
Execute a test for a shell command
|
|
|
|
'''
|
2012-12-01 22:58:19 +00:00
|
|
|
def run_script(self, script, arg_str, catch_stderr=False, timeout=None):
|
2012-04-21 22:58:03 +00:00
|
|
|
'''
|
|
|
|
Execute a script with the given argument string
|
|
|
|
'''
|
|
|
|
path = os.path.join(SCRIPT_DIR, script)
|
|
|
|
if not os.path.isfile(path):
|
|
|
|
return False
|
2012-06-05 23:04:28 +00:00
|
|
|
ppath = 'PYTHONPATH={0}:{1}'.format(CODE_DIR, ':'.join(sys.path[1:]))
|
2012-04-21 22:58:03 +00:00
|
|
|
cmd = '{0} {1} {2} {3}'.format(ppath, PYEXEC, path, arg_str)
|
2012-08-04 18:58:32 +00:00
|
|
|
|
2012-11-18 23:49:37 +00:00
|
|
|
popen_kwargs = {
|
|
|
|
'shell': True,
|
2012-11-19 01:21:06 +00:00
|
|
|
'stdout': PIPE
|
2012-11-18 23:49:37 +00:00
|
|
|
}
|
|
|
|
|
2012-12-01 22:58:19 +00:00
|
|
|
if catch_stderr is True:
|
2012-11-19 01:21:06 +00:00
|
|
|
popen_kwargs['stderr'] = PIPE
|
2012-11-18 23:49:37 +00:00
|
|
|
|
|
|
|
if not sys.platform.lower().startswith('win'):
|
|
|
|
popen_kwargs['close_fds'] = True
|
|
|
|
|
2012-12-03 23:41:45 +00:00
|
|
|
def detach_from_parent_group():
|
2012-12-03 23:58:08 +00:00
|
|
|
# detach from parent group (no more inherited signals!)
|
2012-12-03 23:41:45 +00:00
|
|
|
os.setpgrp()
|
2012-12-03 23:30:21 +00:00
|
|
|
|
2012-12-03 23:41:45 +00:00
|
|
|
popen_kwargs['preexec_fn'] = detach_from_parent_group
|
2012-12-03 23:30:21 +00:00
|
|
|
|
2012-12-03 23:58:08 +00:00
|
|
|
elif sys.platform.lower().startswith('win') and timeout is not None:
|
|
|
|
raise RuntimeError('Timeout is not supported under windows')
|
|
|
|
|
2012-11-19 01:21:06 +00:00
|
|
|
process = Popen(cmd, **popen_kwargs)
|
2012-11-18 23:49:37 +00:00
|
|
|
|
2012-12-01 22:58:19 +00:00
|
|
|
if timeout is not None:
|
|
|
|
stop_at = datetime.now() + timedelta(seconds=timeout)
|
|
|
|
term_sent = False
|
|
|
|
while True:
|
|
|
|
process.poll()
|
|
|
|
if process.returncode is not None:
|
|
|
|
break
|
|
|
|
|
|
|
|
if datetime.now() > stop_at:
|
|
|
|
if term_sent is False:
|
2012-12-03 23:30:21 +00:00
|
|
|
# Kill the process group since sending the term signal
|
|
|
|
# would only terminate the shell, not the command
|
|
|
|
# executed in the shell
|
|
|
|
os.killpg(os.getpgid(process.pid), signal.SIGINT)
|
2012-12-01 22:58:19 +00:00
|
|
|
term_sent = True
|
|
|
|
continue
|
|
|
|
|
2012-12-03 23:30:21 +00:00
|
|
|
# As a last resort, kill the process group
|
|
|
|
os.killpg(os.getpgid(process.pid), signal.SIGKILL)
|
2012-12-01 22:58:19 +00:00
|
|
|
|
|
|
|
out = [
|
|
|
|
'Process took more than {0} seconds to complete. '
|
|
|
|
'Process Killed!'.format(timeout)
|
|
|
|
]
|
|
|
|
if catch_stderr:
|
|
|
|
return out, [
|
|
|
|
'Process killed, unable to catch stderr output'
|
|
|
|
]
|
|
|
|
return out
|
|
|
|
|
2012-11-18 23:49:37 +00:00
|
|
|
if catch_stderr:
|
2012-12-04 16:29:53 +00:00
|
|
|
if sys.version_info < (2, 7):
|
|
|
|
# On python 2.6, the subprocess'es communicate() method uses
|
|
|
|
# select which, is limited by the OS to 1024 file descriptors
|
|
|
|
# We need more available descriptors to run the tests which
|
|
|
|
# need the stderr output.
|
|
|
|
# So instead of .communicate() we wait for the process to
|
|
|
|
# finish, but, as the python docs state "This will deadlock
|
|
|
|
# when using stdout=PIPE and/or stderr=PIPE and the child
|
|
|
|
# process generates enough output to a pipe such that it
|
|
|
|
# blocks waiting for the OS pipe buffer to accept more data.
|
|
|
|
# Use communicate() to avoid that." <- a catch, catch situation
|
|
|
|
#
|
|
|
|
# Use this work around were it's needed only, python 2.6
|
|
|
|
process.wait()
|
|
|
|
out = process.stdout.read()
|
|
|
|
err = process.stderr.read()
|
|
|
|
else:
|
|
|
|
out, err = process.communicate()
|
2012-08-08 08:04:52 +00:00
|
|
|
# Force closing stderr/stdout to release file descriptors
|
2012-08-08 00:21:16 +00:00
|
|
|
process.stdout.close()
|
|
|
|
process.stderr.close()
|
2012-11-07 13:40:39 +00:00
|
|
|
try:
|
2012-11-07 14:10:02 +00:00
|
|
|
return out.splitlines(), err.splitlines()
|
|
|
|
finally:
|
|
|
|
try:
|
|
|
|
process.terminate()
|
|
|
|
except OSError, err:
|
|
|
|
# process already terminated
|
|
|
|
pass
|
2012-08-04 18:58:32 +00:00
|
|
|
|
2012-08-08 00:21:16 +00:00
|
|
|
data = process.communicate()
|
|
|
|
process.stdout.close()
|
2012-11-07 14:10:02 +00:00
|
|
|
|
2012-11-07 13:40:39 +00:00
|
|
|
try:
|
2012-11-07 14:10:02 +00:00
|
|
|
return data[0].splitlines()
|
|
|
|
finally:
|
|
|
|
try:
|
|
|
|
process.terminate()
|
|
|
|
except OSError, err:
|
|
|
|
# process already terminated
|
|
|
|
pass
|
2012-04-21 23:27:59 +00:00
|
|
|
|
2012-04-21 23:52:29 +00:00
|
|
|
def run_salt(self, arg_str):
|
|
|
|
'''
|
2012-05-23 14:14:16 +00:00
|
|
|
Execute salt
|
2012-04-21 23:52:29 +00:00
|
|
|
'''
|
2012-08-04 21:08:06 +00:00
|
|
|
mconf = os.path.join(INTEGRATION_TEST_DIR, 'files', 'conf')
|
2012-04-21 23:52:29 +00:00
|
|
|
arg_str = '-c {0} {1}'.format(mconf, arg_str)
|
|
|
|
return self.run_script('salt', arg_str)
|
|
|
|
|
2012-04-22 00:04:50 +00:00
|
|
|
def run_run(self, arg_str):
|
2012-04-21 23:52:29 +00:00
|
|
|
'''
|
2012-05-23 14:14:16 +00:00
|
|
|
Execute salt-run
|
2012-04-21 23:52:29 +00:00
|
|
|
'''
|
2012-08-04 22:25:37 +00:00
|
|
|
mconf = os.path.join(INTEGRATION_TEST_DIR, 'files', 'conf')
|
2012-04-21 23:52:29 +00:00
|
|
|
arg_str = '-c {0} {1}'.format(mconf, arg_str)
|
|
|
|
return self.run_script('salt-run', arg_str)
|
|
|
|
|
2012-05-28 03:00:10 +00:00
|
|
|
def run_run_plus(self, fun, options='', *arg):
|
|
|
|
'''
|
|
|
|
Execute Salt run and the salt run function and return the data from
|
|
|
|
each in a dict
|
|
|
|
'''
|
|
|
|
ret = {}
|
|
|
|
ret['out'] = self.run_run(
|
2012-07-09 04:50:12 +00:00
|
|
|
'{0} {1} {2}'.format(options, fun, ' '.join(arg))
|
|
|
|
)
|
2012-05-28 03:00:10 +00:00
|
|
|
opts = salt.config.master_config(
|
2012-08-04 22:25:37 +00:00
|
|
|
os.path.join(INTEGRATION_TEST_DIR, 'files', 'conf', 'master')
|
|
|
|
)
|
|
|
|
opts.update({'doc': False, 'fun': fun, 'arg': arg})
|
2012-11-23 12:19:09 +00:00
|
|
|
with RedirectStdStreams():
|
|
|
|
runner = salt.runner.Runner(opts)
|
|
|
|
ret['fun'] = runner.run()
|
2012-05-28 03:00:10 +00:00
|
|
|
return ret
|
|
|
|
|
2012-09-05 21:31:12 +00:00
|
|
|
def run_key(self, arg_str, catch_stderr=False):
|
2012-04-21 23:27:59 +00:00
|
|
|
'''
|
|
|
|
Execute salt-key
|
|
|
|
'''
|
2012-08-04 21:55:15 +00:00
|
|
|
mconf = os.path.join(INTEGRATION_TEST_DIR, 'files', 'conf')
|
2012-04-21 23:27:59 +00:00
|
|
|
arg_str = '-c {0} {1}'.format(mconf, arg_str)
|
2012-09-05 21:31:12 +00:00
|
|
|
return self.run_script('salt-key', arg_str, catch_stderr=catch_stderr)
|
2012-08-04 21:28:51 +00:00
|
|
|
|
|
|
|
def run_cp(self, arg_str):
|
|
|
|
'''
|
|
|
|
Execute salt-cp
|
|
|
|
'''
|
|
|
|
mconf = os.path.join(INTEGRATION_TEST_DIR, 'files', 'conf')
|
|
|
|
arg_str = '--config-dir {0} {1}'.format(mconf, arg_str)
|
|
|
|
return self.run_script('salt-cp', arg_str)
|
2012-08-13 06:10:42 +00:00
|
|
|
|
|
|
|
def run_call(self, arg_str):
|
|
|
|
mconf = os.path.join(INTEGRATION_TEST_DIR, 'files', 'conf')
|
|
|
|
arg_str = '--config-dir {0} {1}'.format(mconf, arg_str)
|
|
|
|
return self.run_script('salt-call', arg_str)
|
2012-08-04 18:58:32 +00:00
|
|
|
|
|
|
|
|
|
|
|
class ShellCaseCommonTestsMixIn(object):
|
|
|
|
|
|
|
|
def test_deprecated_config(self):
|
|
|
|
"""
|
|
|
|
test for the --config deprecation warning
|
|
|
|
|
|
|
|
Once --config is fully deprecated, this test can be removed
|
|
|
|
|
|
|
|
"""
|
|
|
|
|
|
|
|
if getattr(self, '_call_binary_', None) is None:
|
|
|
|
self.skipTest("'_call_binary_' not defined.")
|
|
|
|
|
|
|
|
cfgfile = os.path.join(INTEGRATION_TEST_DIR, 'files', 'conf', 'master')
|
|
|
|
out, err = self.run_script(
|
2012-09-07 21:14:38 +00:00
|
|
|
self._call_binary_,
|
|
|
|
'--config {0}'.format(cfgfile),
|
|
|
|
catch_stderr=True
|
2012-08-04 18:58:32 +00:00
|
|
|
)
|
|
|
|
self.assertIn('Usage: {0}'.format(self._call_binary_), '\n'.join(err))
|
|
|
|
self.assertIn('deprecated', '\n'.join(err))
|
|
|
|
|
|
|
|
def test_version_includes_binary_name(self):
|
|
|
|
if getattr(self, '_call_binary_', None) is None:
|
|
|
|
self.skipTest("'_call_binary_' not defined.")
|
|
|
|
|
|
|
|
out = '\n'.join(self.run_script(self._call_binary_, "--version"))
|
|
|
|
self.assertIn(self._call_binary_, out)
|
|
|
|
self.assertIn(salt.__version__, out)
|
2012-11-20 16:09:57 +00:00
|
|
|
|
|
|
|
|
|
|
|
class SaltReturnAssertsMixIn(object):
|
|
|
|
|
2012-11-25 22:29:08 +00:00
|
|
|
def assertReturnSaltType(self, ret):
|
2012-11-20 16:09:57 +00:00
|
|
|
try:
|
2012-11-21 12:16:17 +00:00
|
|
|
self.assertTrue(isinstance(ret, dict))
|
2012-11-20 16:09:57 +00:00
|
|
|
except AssertionError:
|
|
|
|
raise AssertionError(
|
2012-11-21 12:16:17 +00:00
|
|
|
'{0} is not dict. Salt returned: {1}'.format(
|
2012-11-25 22:29:08 +00:00
|
|
|
type(ret).__name__, ret
|
2012-11-20 16:09:57 +00:00
|
|
|
)
|
|
|
|
)
|
|
|
|
|
2012-11-25 22:29:08 +00:00
|
|
|
def assertReturnNonEmptySaltType(self, ret):
|
|
|
|
self.assertReturnSaltType(ret)
|
2012-11-21 12:16:17 +00:00
|
|
|
try:
|
|
|
|
self.assertNotEqual(ret, {})
|
|
|
|
except AssertionError:
|
|
|
|
raise AssertionError(
|
|
|
|
'{} is equal to {}. Salt returned an empty dictionary.'
|
|
|
|
)
|
|
|
|
|
2012-11-25 22:29:08 +00:00
|
|
|
def __assertReturn(self, ret, which_case):
|
|
|
|
self.assertReturnNonEmptySaltType(ret)
|
|
|
|
|
2012-11-21 12:16:17 +00:00
|
|
|
for part in ret.itervalues():
|
2012-11-25 22:29:08 +00:00
|
|
|
self.assertReturnNonEmptySaltType(part)
|
2012-11-25 20:11:24 +00:00
|
|
|
try:
|
|
|
|
self.assertTrue(isinstance(part, dict))
|
|
|
|
except AssertionError:
|
|
|
|
raise AssertionError(
|
|
|
|
'{0} is not dict. Salt returned: {1}'.format(
|
|
|
|
type(part), part
|
|
|
|
)
|
|
|
|
)
|
2012-11-21 12:16:17 +00:00
|
|
|
try:
|
|
|
|
if which_case is True:
|
|
|
|
self.assertTrue(part['result'])
|
2012-11-21 12:43:53 +00:00
|
|
|
elif which_case is False:
|
2012-11-21 12:16:17 +00:00
|
|
|
self.assertFalse(part['result'])
|
2012-11-21 12:43:53 +00:00
|
|
|
elif which_case is None:
|
|
|
|
self.assertIsNone(part['result'])
|
2012-11-21 12:16:17 +00:00
|
|
|
except AssertionError:
|
|
|
|
raise AssertionError(
|
|
|
|
'{result} is not {0}. Salt Comment:\n{comment}'.format(
|
|
|
|
which_case, **part
|
|
|
|
)
|
|
|
|
)
|
|
|
|
|
2012-11-20 16:09:57 +00:00
|
|
|
def assertSaltTrueReturn(self, ret):
|
|
|
|
self.__assertReturn(ret, True)
|
|
|
|
|
|
|
|
def assertSaltFalseReturn(self, ret):
|
|
|
|
self.__assertReturn(ret, False)
|
2012-11-21 12:43:53 +00:00
|
|
|
|
|
|
|
def assertSaltNoneReturn(self, ret):
|
|
|
|
self.__assertReturn(ret, None)
|
2012-11-28 17:35:25 +00:00
|
|
|
|
Abstract `SaltReturnAssertsMixIn` to allow more tests using it.
* Created a method which gets a deep keyed value in a salt state return. For example, allow getting, `ret['changes']['new']`.
* Created a method which tries to make sure the correct type of the passed keys for the above added method.
* Also added were the methods, `assertInSaltReturn`, `assertNotInSaltReturn`, `assertInSaltReturnRegexpMatches`, which simplified the existing `assertInSaltComment`, `assertNotInSaltComment`, `assertSaltCommentRegexpMatches`, `assertSaltStateChangesEqual` and `assertSaltStateChangesNotEqual`, also allowing to do similar tests in every key(deep or not) of a salt state return dictionary.
2012-12-12 13:29:43 +00:00
|
|
|
def __return_valid_keys(self, keys):
|
2012-12-07 12:46:02 +00:00
|
|
|
if keys and isinstance(keys, tuple):
|
Abstract `SaltReturnAssertsMixIn` to allow more tests using it.
* Created a method which gets a deep keyed value in a salt state return. For example, allow getting, `ret['changes']['new']`.
* Created a method which tries to make sure the correct type of the passed keys for the above added method.
* Also added were the methods, `assertInSaltReturn`, `assertNotInSaltReturn`, `assertInSaltReturnRegexpMatches`, which simplified the existing `assertInSaltComment`, `assertNotInSaltComment`, `assertSaltCommentRegexpMatches`, `assertSaltStateChangesEqual` and `assertSaltStateChangesNotEqual`, also allowing to do similar tests in every key(deep or not) of a salt state return dictionary.
2012-12-12 13:29:43 +00:00
|
|
|
# If it's a tuple, turn it into a list
|
2012-12-07 12:46:02 +00:00
|
|
|
keys = list(keys)
|
2012-12-12 00:33:54 +00:00
|
|
|
elif keys and isinstance(keys, basestring):
|
Abstract `SaltReturnAssertsMixIn` to allow more tests using it.
* Created a method which gets a deep keyed value in a salt state return. For example, allow getting, `ret['changes']['new']`.
* Created a method which tries to make sure the correct type of the passed keys for the above added method.
* Also added were the methods, `assertInSaltReturn`, `assertNotInSaltReturn`, `assertInSaltReturnRegexpMatches`, which simplified the existing `assertInSaltComment`, `assertNotInSaltComment`, `assertSaltCommentRegexpMatches`, `assertSaltStateChangesEqual` and `assertSaltStateChangesNotEqual`, also allowing to do similar tests in every key(deep or not) of a salt state return dictionary.
2012-12-12 13:29:43 +00:00
|
|
|
# If it's a basestring , make it a one item list
|
2012-12-07 12:46:02 +00:00
|
|
|
keys = [keys]
|
|
|
|
elif keys and not isinstance(keys, list):
|
Abstract `SaltReturnAssertsMixIn` to allow more tests using it.
* Created a method which gets a deep keyed value in a salt state return. For example, allow getting, `ret['changes']['new']`.
* Created a method which tries to make sure the correct type of the passed keys for the above added method.
* Also added were the methods, `assertInSaltReturn`, `assertNotInSaltReturn`, `assertInSaltReturnRegexpMatches`, which simplified the existing `assertInSaltComment`, `assertNotInSaltComment`, `assertSaltCommentRegexpMatches`, `assertSaltStateChangesEqual` and `assertSaltStateChangesNotEqual`, also allowing to do similar tests in every key(deep or not) of a salt state return dictionary.
2012-12-12 13:29:43 +00:00
|
|
|
# If we've reached here, it's a bad type passed to keys
|
2012-12-07 12:46:02 +00:00
|
|
|
raise RuntimeError('The passed keys need to be a list')
|
Abstract `SaltReturnAssertsMixIn` to allow more tests using it.
* Created a method which gets a deep keyed value in a salt state return. For example, allow getting, `ret['changes']['new']`.
* Created a method which tries to make sure the correct type of the passed keys for the above added method.
* Also added were the methods, `assertInSaltReturn`, `assertNotInSaltReturn`, `assertInSaltReturnRegexpMatches`, which simplified the existing `assertInSaltComment`, `assertNotInSaltComment`, `assertSaltCommentRegexpMatches`, `assertSaltStateChangesEqual` and `assertSaltStateChangesNotEqual`, also allowing to do similar tests in every key(deep or not) of a salt state return dictionary.
2012-12-12 13:29:43 +00:00
|
|
|
return keys
|
2012-12-07 12:46:02 +00:00
|
|
|
|
Abstract `SaltReturnAssertsMixIn` to allow more tests using it.
* Created a method which gets a deep keyed value in a salt state return. For example, allow getting, `ret['changes']['new']`.
* Created a method which tries to make sure the correct type of the passed keys for the above added method.
* Also added were the methods, `assertInSaltReturn`, `assertNotInSaltReturn`, `assertInSaltReturnRegexpMatches`, which simplified the existing `assertInSaltComment`, `assertNotInSaltComment`, `assertSaltCommentRegexpMatches`, `assertSaltStateChangesEqual` and `assertSaltStateChangesNotEqual`, also allowing to do similar tests in every key(deep or not) of a salt state return dictionary.
2012-12-12 13:29:43 +00:00
|
|
|
def __getWithinSaltReturn(self, ret, keys):
|
|
|
|
self.assertReturnSaltType(ret)
|
|
|
|
keys = self.__return_valid_keys(keys)
|
|
|
|
okeys = keys[:]
|
2012-12-07 12:46:02 +00:00
|
|
|
for part in ret.itervalues():
|
Abstract `SaltReturnAssertsMixIn` to allow more tests using it.
* Created a method which gets a deep keyed value in a salt state return. For example, allow getting, `ret['changes']['new']`.
* Created a method which tries to make sure the correct type of the passed keys for the above added method.
* Also added were the methods, `assertInSaltReturn`, `assertNotInSaltReturn`, `assertInSaltReturnRegexpMatches`, which simplified the existing `assertInSaltComment`, `assertNotInSaltComment`, `assertSaltCommentRegexpMatches`, `assertSaltStateChangesEqual` and `assertSaltStateChangesNotEqual`, also allowing to do similar tests in every key(deep or not) of a salt state return dictionary.
2012-12-12 13:29:43 +00:00
|
|
|
try:
|
|
|
|
ret_item = part[okeys.pop(0)]
|
|
|
|
except (KeyError, TypeError):
|
|
|
|
raise AssertionError(
|
|
|
|
'Could not get ret{0} from salt\'s return: {1}'.format(
|
|
|
|
''.join(['[{0!r}]'.format(k) for k in keys]), part
|
|
|
|
)
|
|
|
|
)
|
2012-12-07 12:46:02 +00:00
|
|
|
while okeys:
|
|
|
|
try:
|
Abstract `SaltReturnAssertsMixIn` to allow more tests using it.
* Created a method which gets a deep keyed value in a salt state return. For example, allow getting, `ret['changes']['new']`.
* Created a method which tries to make sure the correct type of the passed keys for the above added method.
* Also added were the methods, `assertInSaltReturn`, `assertNotInSaltReturn`, `assertInSaltReturnRegexpMatches`, which simplified the existing `assertInSaltComment`, `assertNotInSaltComment`, `assertSaltCommentRegexpMatches`, `assertSaltStateChangesEqual` and `assertSaltStateChangesNotEqual`, also allowing to do similar tests in every key(deep or not) of a salt state return dictionary.
2012-12-12 13:29:43 +00:00
|
|
|
ret_item = ret_item[okeys.pop(0)]
|
2012-12-07 12:46:02 +00:00
|
|
|
except (KeyError, TypeError):
|
|
|
|
raise AssertionError(
|
Abstract `SaltReturnAssertsMixIn` to allow more tests using it.
* Created a method which gets a deep keyed value in a salt state return. For example, allow getting, `ret['changes']['new']`.
* Created a method which tries to make sure the correct type of the passed keys for the above added method.
* Also added were the methods, `assertInSaltReturn`, `assertNotInSaltReturn`, `assertInSaltReturnRegexpMatches`, which simplified the existing `assertInSaltComment`, `assertNotInSaltComment`, `assertSaltCommentRegexpMatches`, `assertSaltStateChangesEqual` and `assertSaltStateChangesNotEqual`, also allowing to do similar tests in every key(deep or not) of a salt state return dictionary.
2012-12-12 13:29:43 +00:00
|
|
|
'Could not get ret{0} from salt\'s return: {1}'.format(
|
|
|
|
''.join(['[{0!r}]'.format(k) for k in keys]), part
|
2012-12-07 12:46:02 +00:00
|
|
|
)
|
|
|
|
)
|
Abstract `SaltReturnAssertsMixIn` to allow more tests using it.
* Created a method which gets a deep keyed value in a salt state return. For example, allow getting, `ret['changes']['new']`.
* Created a method which tries to make sure the correct type of the passed keys for the above added method.
* Also added were the methods, `assertInSaltReturn`, `assertNotInSaltReturn`, `assertInSaltReturnRegexpMatches`, which simplified the existing `assertInSaltComment`, `assertNotInSaltComment`, `assertSaltCommentRegexpMatches`, `assertSaltStateChangesEqual` and `assertSaltStateChangesNotEqual`, also allowing to do similar tests in every key(deep or not) of a salt state return dictionary.
2012-12-12 13:29:43 +00:00
|
|
|
return ret_item
|
|
|
|
|
|
|
|
def assertInSaltComment(self, ret, in_comment):
|
|
|
|
return self.assertIn(
|
|
|
|
in_comment, self.__getWithinSaltReturn(ret, 'comment')
|
|
|
|
)
|
|
|
|
|
|
|
|
def assertNotInSaltComment(self, ret, not_in_comment):
|
|
|
|
return self.assertNotIn(
|
|
|
|
not_in_comment, self.__getWithinSaltReturn(ret, 'comment')
|
|
|
|
)
|
|
|
|
|
|
|
|
def assertSaltCommentRegexpMatches(self, ret, pattern):
|
|
|
|
return self.assertInSaltReturnRegexpMatches(ret, pattern, 'comment')
|
|
|
|
|
|
|
|
def assertInSaltReturn(self, ret, item_to_check, keys):
|
|
|
|
return self.assertIn(
|
|
|
|
item_to_check, self.__getWithinSaltReturn(ret, keys)
|
|
|
|
)
|
|
|
|
|
|
|
|
def assertNotInSaltReturn(self, ret, item_to_check, keys):
|
|
|
|
return self.assertNotIn(
|
|
|
|
item_to_check, self.__getWithinSaltReturn(ret, keys)
|
|
|
|
)
|
|
|
|
|
|
|
|
def assertInSaltReturnRegexpMatches(self, ret, pattern, keys=()):
|
|
|
|
return self.assertRegexpMatches(
|
|
|
|
self.__getWithinSaltReturn(ret, keys), pattern
|
|
|
|
)
|
2012-12-07 12:46:02 +00:00
|
|
|
|
|
|
|
def assertSaltStateChangesEqual(self, ret, comparison, keys=()):
|
Abstract `SaltReturnAssertsMixIn` to allow more tests using it.
* Created a method which gets a deep keyed value in a salt state return. For example, allow getting, `ret['changes']['new']`.
* Created a method which tries to make sure the correct type of the passed keys for the above added method.
* Also added were the methods, `assertInSaltReturn`, `assertNotInSaltReturn`, `assertInSaltReturnRegexpMatches`, which simplified the existing `assertInSaltComment`, `assertNotInSaltComment`, `assertSaltCommentRegexpMatches`, `assertSaltStateChangesEqual` and `assertSaltStateChangesNotEqual`, also allowing to do similar tests in every key(deep or not) of a salt state return dictionary.
2012-12-12 13:29:43 +00:00
|
|
|
keys = ['changes'] + self.__return_valid_keys(keys)
|
|
|
|
return self.assertEqual(
|
|
|
|
self.__getWithinSaltReturn(ret, keys), comparison
|
|
|
|
)
|
2012-12-07 12:46:02 +00:00
|
|
|
|
|
|
|
def assertSaltStateChangesNotEqual(self, ret, comparison, keys=()):
|
Abstract `SaltReturnAssertsMixIn` to allow more tests using it.
* Created a method which gets a deep keyed value in a salt state return. For example, allow getting, `ret['changes']['new']`.
* Created a method which tries to make sure the correct type of the passed keys for the above added method.
* Also added were the methods, `assertInSaltReturn`, `assertNotInSaltReturn`, `assertInSaltReturnRegexpMatches`, which simplified the existing `assertInSaltComment`, `assertNotInSaltComment`, `assertSaltCommentRegexpMatches`, `assertSaltStateChangesEqual` and `assertSaltStateChangesNotEqual`, also allowing to do similar tests in every key(deep or not) of a salt state return dictionary.
2012-12-12 13:29:43 +00:00
|
|
|
keys = ['changes'] + self.__return_valid_keys(keys)
|
|
|
|
return self.assertNotEqual(
|
|
|
|
self.__getWithinSaltReturn(ret, keys), comparison
|
|
|
|
)
|