summaryrefslogtreecommitdiff
path: root/tests/white-box/couchdb.rb
diff options
context:
space:
mode:
authorMicah Anderson <micah@riseup.net>2016-11-04 10:54:28 -0400
committerMicah Anderson <micah@riseup.net>2016-11-04 10:54:28 -0400
commit34a381efa8f6295080c843f86bfa07d4e41056af (patch)
tree9282cf5d4c876688602705a7fa0002bc4a810bde /tests/white-box/couchdb.rb
parent0a72bc6fd292bf9367b314fcb0347c4d35042f16 (diff)
parent5821964ff7e16ca7aa9141bd09a77d355db492a9 (diff)
Merge branch 'develop'
Diffstat (limited to 'tests/white-box/couchdb.rb')
-rw-r--r--tests/white-box/couchdb.rb186
1 files changed, 0 insertions, 186 deletions
diff --git a/tests/white-box/couchdb.rb b/tests/white-box/couchdb.rb
deleted file mode 100644
index 85dc6840..00000000
--- a/tests/white-box/couchdb.rb
+++ /dev/null
@@ -1,186 +0,0 @@
-raise SkipTest unless service?(:couchdb)
-
-require 'json'
-
-class CouchDB < LeapTest
- depends_on "Network"
-
- def setup
- end
-
- def test_00_Are_daemons_running?
- assert_running 'bin/beam'
- if multimaster?
- assert_running 'bin/epmd'
- end
- pass
- end
-
- #
- # check to make sure we can get welcome response from local couchdb
- #
- def test_01_Is_CouchDB_running?
- assert_get(couchdb_url) do |body|
- assert_match /"couchdb":"Welcome"/, body, "Could not get welcome message from #{couchdb_url}. Probably couchdb is not running."
- end
- pass
- end
-
- #
- # compare the configured nodes to the nodes that are actually listed in bigcouch
- #
- def test_02_Is_cluster_membership_ok?
- return unless multimaster?
- url = couchdb_backend_url("/nodes/_all_docs")
- neighbors = assert_property('couch.bigcouch.neighbors')
- neighbors << assert_property('domain.full')
- neighbors.sort!
- assert_get(url) do |body|
- response = JSON.parse(body)
- nodes_in_db = response['rows'].collect{|row| row['id'].sub(/^bigcouch@/, '')}.sort
- assert_equal neighbors, nodes_in_db, "The couchdb replication node list is wrong (/nodes/_all_docs)"
- end
- pass
- end
-
- #
- # all configured nodes are in 'cluster_nodes'
- # all nodes online and communicating are in 'all_nodes'
- #
- # this seems backward to me, so it might be the other way around.
- #
- def test_03_Are_configured_nodes_online?
- return unless multimaster?
- url = couchdb_url("/_membership", :username => 'admin')
- assert_get(url) do |body|
- response = JSON.parse(body)
- nodes_configured_but_not_available = response['cluster_nodes'] - response['all_nodes']
- nodes_available_but_not_configured = response['all_nodes'] - response['cluster_nodes']
- if nodes_configured_but_not_available.any?
- warn "These nodes are configured but not available:", nodes_configured_but_not_available
- end
- if nodes_available_but_not_configured.any?
- warn "These nodes are available but not configured:", nodes_available_but_not_configured
- end
- if response['cluster_nodes'] == response['all_nodes']
- pass
- end
- end
- end
-
- def test_04_Do_ACL_users_exist?
- acl_users = ['_design/_auth', 'leap_mx', 'nickserver', 'soledad', 'webapp', 'replication']
- url = couchdb_backend_url("/_users/_all_docs", :username => 'admin')
- assert_get(url) do |body|
- response = JSON.parse(body)
- assert_equal acl_users.count, response['total_rows']
- actual_users = response['rows'].map{|row| row['id'].sub(/^org.couchdb.user:/, '') }
- assert_equal acl_users.sort, actual_users.sort
- end
- pass
- end
-
- def test_05_Do_required_databases_exist?
- dbs_that_should_exist = ["customers","identities","keycache","shared","tickets","users", "tmp_users"]
- dbs_that_should_exist << "tokens_#{rotation_suffix}"
- dbs_that_should_exist << "sessions_#{rotation_suffix}"
- dbs_that_should_exist.each do |db_name|
- url = couchdb_url("/"+db_name, :username => 'admin')
- assert_get(url) do |body|
- assert response = JSON.parse(body)
- assert_equal db_name, response['db_name']
- end
- end
- pass
- end
-
- # disable ACL enforcement, because it's a known issue with bigcouch
- # and will only confuse the user
- # see https://leap.se/code/issues/6030 for more details
- #
- ## for now, this just prints warnings, since we are failing these tests.
- ##
-
- #def test_06_Is_ACL_enforced?
- # ok = assert_auth_fail(
- # couchdb_url('/users/_all_docs', :username => 'leap_mx'),
- # {:limit => 1}
- # )
- # ok = assert_auth_fail(
- # couchdb_url('/users/_all_docs', :username => 'leap_mx'),
- # {:limit => 1}
- # ) && ok
- # pass if ok
- #end
-
- def test_07_Can_records_be_created?
- record = DummyRecord.new
- url = couchdb_url("/tokens_#{rotation_suffix}", :username => 'admin')
- assert_post(url, record, :format => :json) do |body|
- assert response = JSON.parse(body), "POST response should be JSON"
- assert response["ok"], "POST response should be OK"
- assert_delete(File.join(url, response["id"]), :rev => response["rev"]) do |body|
- assert response = JSON.parse(body), "DELETE response should be JSON"
- assert response["ok"], "DELETE response should be OK"
- end
- end
- pass
- end
-
- #
- # This is not really a "test", just an attempt to make sure that
- # the mx tests that fire off dummy emails don't fill up the
- # storage db.
- #
- # mx tests can't run this because they don't have access to
- # the storage db.
- #
- # This "test" is responsible for both creating the db if it does not
- # exist, and destroying if it does.
- #
- # Yes, this is super hacky. Properly, we should add something to
- # the soledad api to support create/delete of user storage dbs.
- #
- def test_99_Delete_mail_storage_used_in_mx_tests
- user = find_user_by_login(TEST_EMAIL_USER)
- if user
- if user_db_exists?(user["id"])
- # keep the test email db from filling up:
- assert_destroy_user_db(user["id"], :username => 'admin')
- end
- # either way, make sure we leave a db for the mx tests:
- assert_create_user_db(user["id"], :username => 'admin')
- end
- silent_pass
- end
-
- private
-
- def multimaster?
- mode == "multimaster"
- end
-
- def mode
- assert_property('couch.mode')
- end
-
- # TODO: admin port is hardcoded for now but should be configurable.
- def couchdb_backend_url(path="", options={})
- options = {port: multimaster? && "5986"}.merge options
- couchdb_url(path, options)
- end
-
- def rotation_suffix
- rotation_suffix = Time.now.utc.to_i / 2592000 # monthly
- end
-
- require 'securerandom'
- require 'digest/sha2'
- class DummyRecord < Hash
- def initialize
- self['data'] = SecureRandom.urlsafe_base64(32).gsub(/^_*/, '')
- self['_id'] = Digest::SHA512.hexdigest(self['data'])
- end
- end
-
-end