raise SkipTest unless service?(:couchdb) require 'json' class CouchDB < LeapTest depends_on "Network" def setup end def test_00_Are_daemons_running? assert_running match: 'bin/beam' if multimaster? assert_running match: 'bin/epmd' end pass end # # check to make sure we can get welcome response from local couchdb # def test_01_Is_CouchDB_running? assert_get(couchdb_url) do |body| assert_match /"couchdb":"Welcome"/, body, "Could not get welcome message from #{couchdb_url}. Probably couchdb is not running." end pass end # # all configured nodes are in 'cluster_nodes' # all nodes online and communicating are in 'all_nodes' # # this seems backward to me, so it might be the other way around. # def test_03_Are_configured_nodes_online? return unless multimaster? url = couchdb_url("/_membership", :username => 'admin') assert_get(url) do |body| response = JSON.parse(body) nodes_configured_but_not_available = response['cluster_nodes'] - response['all_nodes'] nodes_available_but_not_configured = response['all_nodes'] - response['cluster_nodes'] if nodes_configured_but_not_available.any? warn "These nodes are configured but not available:", nodes_configured_but_not_available end if nodes_available_but_not_configured.any? warn "These nodes are available but not configured:", nodes_available_but_not_configured end if response['cluster_nodes'] == response['all_nodes'] pass end end end def test_04_Do_ACL_users_exist? acl_users = ['_design/_auth', 'leap_mx', 'nickserver', 'soledad', 'webapp', 'replication'] url = couchdb_backend_url("/_users/_all_docs", :username => 'admin') assert_get(url) do |body| response = JSON.parse(body) assert_equal acl_users.count, response['total_rows'] actual_users = response['rows'].map{|row| row['id'].sub(/^org.couchdb.user:/, '') } assert_equal acl_users.sort, actual_users.sort end pass end def test_05_Do_required_databases_exist? dbs_that_should_exist = ["customers","identities","keycache","shared","tickets","users", "tmp_users"] dbs_that_should_exist << "tokens_#{rotation_suffix}" dbs_that_should_exist << "sessions_#{rotation_suffix}" dbs_that_should_exist.each do |db_name| url = couchdb_url("/"+db_name, :username => 'admin') assert_get(url) do |body| assert response = JSON.parse(body) assert_equal db_name, response['db_name'] end end pass end # disable ACL enforcement, because it's a known issue with bigcouch # and will only confuse the user # see https://leap.se/code/issues/6030 for more details # ## for now, this just prints warnings, since we are failing these tests. ## #def test_06_Is_ACL_enforced? # ok = assert_auth_fail( # couchdb_url('/users/_all_docs', :username => 'leap_mx'), # {:limit => 1} # ) # ok = assert_auth_fail( # couchdb_url('/users/_all_docs', :username => 'leap_mx'), # {:limit => 1} # ) && ok # pass if ok #end def test_07_Can_records_be_created? record = DummyRecord.new url = couchdb_url("/tokens_#{rotation_suffix}", :username => 'admin') assert_post(url, record, :format => :json) do |body| assert response = JSON.parse(body), "POST response should be JSON" assert response["ok"], "POST response should be OK" assert_delete(File.join(url, response["id"]), :rev => response["rev"]) do |body| assert response = JSON.parse(body), "DELETE response should be JSON" assert response["ok"], "DELETE response should be OK" end end pass end # # This is not really a "test", just an attempt to make sure that # the mx tests that fire off dummy emails don't fill up the # storage db. # # mx tests can't run this because they don't have access to # the storage db. # # This "test" is responsible for both creating the db if it does not # exist, and destroying if it does. # # Yes, this is super hacky. Properly, we should add something to # the soledad api to support create/delete of user storage dbs. # def test_99_Delete_mail_storage_used_in_mx_tests user = find_user_by_login(TEST_EMAIL_USER) if user if user_db_exists?(user["id"]) # keep the test email db from filling up: assert_destroy_user_db(user["id"], :username => 'admin') end # either way, make sure we leave a db for the mx tests: assert_create_user_db(user["id"], :username => 'admin') end silent_pass end private def multimaster? mode == "multimaster" end def mode assert_property('couch.mode') end # TODO: admin port is hardcoded for now but should be configurable. def couchdb_backend_url(path="", options={}) options = {port: multimaster? && "5986"}.merge options couchdb_url(path, options) end def rotation_suffix rotation_suffix = Time.now.utc.to_i / 2592000 # monthly end require 'securerandom' require 'digest/sha2' class DummyRecord < Hash def initialize self['data'] = SecureRandom.urlsafe_base64(32).gsub(/^_*/, '') self['_id'] = Digest::SHA512.hexdigest(self['data']) end end end