diff options
author | Micah Anderson <micah@riseup.net> | 2016-11-04 10:54:28 -0400 |
---|---|---|
committer | Micah Anderson <micah@riseup.net> | 2016-11-04 10:54:28 -0400 |
commit | 34a381efa8f6295080c843f86bfa07d4e41056af (patch) | |
tree | 9282cf5d4c876688602705a7fa0002bc4a810bde /tests/white-box/couchdb.rb | |
parent | 0a72bc6fd292bf9367b314fcb0347c4d35042f16 (diff) | |
parent | 5821964ff7e16ca7aa9141bd09a77d355db492a9 (diff) |
Merge branch 'develop'
Diffstat (limited to 'tests/white-box/couchdb.rb')
-rw-r--r-- | tests/white-box/couchdb.rb | 186 |
1 files changed, 0 insertions, 186 deletions
diff --git a/tests/white-box/couchdb.rb b/tests/white-box/couchdb.rb deleted file mode 100644 index 85dc6840..00000000 --- a/tests/white-box/couchdb.rb +++ /dev/null @@ -1,186 +0,0 @@ -raise SkipTest unless service?(:couchdb) - -require 'json' - -class CouchDB < LeapTest - depends_on "Network" - - def setup - end - - def test_00_Are_daemons_running? - assert_running 'bin/beam' - if multimaster? - assert_running 'bin/epmd' - end - pass - end - - # - # check to make sure we can get welcome response from local couchdb - # - def test_01_Is_CouchDB_running? - assert_get(couchdb_url) do |body| - assert_match /"couchdb":"Welcome"/, body, "Could not get welcome message from #{couchdb_url}. Probably couchdb is not running." - end - pass - end - - # - # compare the configured nodes to the nodes that are actually listed in bigcouch - # - def test_02_Is_cluster_membership_ok? - return unless multimaster? - url = couchdb_backend_url("/nodes/_all_docs") - neighbors = assert_property('couch.bigcouch.neighbors') - neighbors << assert_property('domain.full') - neighbors.sort! - assert_get(url) do |body| - response = JSON.parse(body) - nodes_in_db = response['rows'].collect{|row| row['id'].sub(/^bigcouch@/, '')}.sort - assert_equal neighbors, nodes_in_db, "The couchdb replication node list is wrong (/nodes/_all_docs)" - end - pass - end - - # - # all configured nodes are in 'cluster_nodes' - # all nodes online and communicating are in 'all_nodes' - # - # this seems backward to me, so it might be the other way around. - # - def test_03_Are_configured_nodes_online? - return unless multimaster? - url = couchdb_url("/_membership", :username => 'admin') - assert_get(url) do |body| - response = JSON.parse(body) - nodes_configured_but_not_available = response['cluster_nodes'] - response['all_nodes'] - nodes_available_but_not_configured = response['all_nodes'] - response['cluster_nodes'] - if nodes_configured_but_not_available.any? - warn "These nodes are configured but not available:", nodes_configured_but_not_available - end - if nodes_available_but_not_configured.any? - warn "These nodes are available but not configured:", nodes_available_but_not_configured - end - if response['cluster_nodes'] == response['all_nodes'] - pass - end - end - end - - def test_04_Do_ACL_users_exist? - acl_users = ['_design/_auth', 'leap_mx', 'nickserver', 'soledad', 'webapp', 'replication'] - url = couchdb_backend_url("/_users/_all_docs", :username => 'admin') - assert_get(url) do |body| - response = JSON.parse(body) - assert_equal acl_users.count, response['total_rows'] - actual_users = response['rows'].map{|row| row['id'].sub(/^org.couchdb.user:/, '') } - assert_equal acl_users.sort, actual_users.sort - end - pass - end - - def test_05_Do_required_databases_exist? - dbs_that_should_exist = ["customers","identities","keycache","shared","tickets","users", "tmp_users"] - dbs_that_should_exist << "tokens_#{rotation_suffix}" - dbs_that_should_exist << "sessions_#{rotation_suffix}" - dbs_that_should_exist.each do |db_name| - url = couchdb_url("/"+db_name, :username => 'admin') - assert_get(url) do |body| - assert response = JSON.parse(body) - assert_equal db_name, response['db_name'] - end - end - pass - end - - # disable ACL enforcement, because it's a known issue with bigcouch - # and will only confuse the user - # see https://leap.se/code/issues/6030 for more details - # - ## for now, this just prints warnings, since we are failing these tests. - ## - - #def test_06_Is_ACL_enforced? - # ok = assert_auth_fail( - # couchdb_url('/users/_all_docs', :username => 'leap_mx'), - # {:limit => 1} - # ) - # ok = assert_auth_fail( - # couchdb_url('/users/_all_docs', :username => 'leap_mx'), - # {:limit => 1} - # ) && ok - # pass if ok - #end - - def test_07_Can_records_be_created? - record = DummyRecord.new - url = couchdb_url("/tokens_#{rotation_suffix}", :username => 'admin') - assert_post(url, record, :format => :json) do |body| - assert response = JSON.parse(body), "POST response should be JSON" - assert response["ok"], "POST response should be OK" - assert_delete(File.join(url, response["id"]), :rev => response["rev"]) do |body| - assert response = JSON.parse(body), "DELETE response should be JSON" - assert response["ok"], "DELETE response should be OK" - end - end - pass - end - - # - # This is not really a "test", just an attempt to make sure that - # the mx tests that fire off dummy emails don't fill up the - # storage db. - # - # mx tests can't run this because they don't have access to - # the storage db. - # - # This "test" is responsible for both creating the db if it does not - # exist, and destroying if it does. - # - # Yes, this is super hacky. Properly, we should add something to - # the soledad api to support create/delete of user storage dbs. - # - def test_99_Delete_mail_storage_used_in_mx_tests - user = find_user_by_login(TEST_EMAIL_USER) - if user - if user_db_exists?(user["id"]) - # keep the test email db from filling up: - assert_destroy_user_db(user["id"], :username => 'admin') - end - # either way, make sure we leave a db for the mx tests: - assert_create_user_db(user["id"], :username => 'admin') - end - silent_pass - end - - private - - def multimaster? - mode == "multimaster" - end - - def mode - assert_property('couch.mode') - end - - # TODO: admin port is hardcoded for now but should be configurable. - def couchdb_backend_url(path="", options={}) - options = {port: multimaster? && "5986"}.merge options - couchdb_url(path, options) - end - - def rotation_suffix - rotation_suffix = Time.now.utc.to_i / 2592000 # monthly - end - - require 'securerandom' - require 'digest/sha2' - class DummyRecord < Hash - def initialize - self['data'] = SecureRandom.urlsafe_base64(32).gsub(/^_*/, '') - self['_id'] = Digest::SHA512.hexdigest(self['data']) - end - end - -end |