Common integration tests should not need to care about specific ORG ID configured in the worker, but they should be able to get access token and check compose status without providing a specific ORG ID. The only integration test that should care about ORG ID is the `multi-tenancy.sh`. Modify the `access_token` and `compose_status` functions to hide the existence of ORG ID from the user and instead read it from the worker's configuration, specifically `/etc/osbuild-worker/token`. The original implementations of the functions mentioned above are now available under `access_token_with_org_id` and `compose_status_with_org_id` names. Modify the `multi-tenancy.sh` to use the new function names.
188 lines
4.7 KiB
Bash
Executable file
188 lines
4.7 KiB
Bash
Executable file
#!/bin/bash
|
|
|
|
# Tests the multi-tenancy feature of cloud and remote worker API.
|
|
#
|
|
# Note that the power of this is very limited. It cannot check that a certain
|
|
# tenant can only access jobs on its channel. It has its value though that
|
|
# it checks the whole E2E setup including parsing of the JWT token which is
|
|
# not tested in the unit test.
|
|
|
|
|
|
set -euo pipefail
|
|
|
|
OSBUILD_COMPOSER_TEST_DATA=/usr/share/tests/osbuild-composer/
|
|
|
|
# Get OS data.
|
|
source /usr/libexec/osbuild-composer-test/set-env-variables.sh
|
|
|
|
# Colorful output.
|
|
function greenprint {
|
|
echo -e "\033[1;32m[$(date -Isecond)] ${1}\033[0m"
|
|
}
|
|
|
|
# Provision the software under test.
|
|
/usr/libexec/osbuild-composer-test/provision.sh jwt
|
|
|
|
# Source common functions
|
|
source /usr/libexec/tests/osbuild-composer/api/common/common.sh
|
|
|
|
greenprint "Registering clean ups"
|
|
KILL_PIDS=()
|
|
function cleanup() {
|
|
greenprint "== Script execution stopped or finished - Cleaning up =="
|
|
set +eu
|
|
greenprint "Stopping containers"
|
|
sudo /usr/libexec/osbuild-composer-test/run-koji-container.sh stop
|
|
|
|
greenprint "Removing generated CA cert"
|
|
sudo rm \
|
|
/etc/pki/ca-trust/source/anchors/osbuild-composer-tests-ca-crt.pem
|
|
sudo update-ca-trust
|
|
|
|
for P in "${KILL_PIDS[@]}"; do
|
|
sudo pkill -P "$P"
|
|
done
|
|
|
|
/usr/libexec/osbuild-composer-test/run-mock-auth-servers.sh stop
|
|
|
|
set -eu
|
|
}
|
|
trap cleanup EXIT
|
|
|
|
greenprint "Adding the testsuite's CA cert to the system trust store"
|
|
# the worker cannot handle koji with self-signed certs
|
|
sudo cp \
|
|
/etc/osbuild-composer/ca-crt.pem \
|
|
/etc/pki/ca-trust/source/anchors/osbuild-composer-tests-ca-crt.pem
|
|
sudo update-ca-trust
|
|
|
|
greenprint "Starting containers"
|
|
sudo /usr/libexec/osbuild-composer-test/run-koji-container.sh start
|
|
|
|
greenprint "Adding kerberos config"
|
|
sudo cp \
|
|
/tmp/osbuild-composer-koji-test/client.keytab \
|
|
/etc/osbuild-worker/client.keytab
|
|
sudo cp \
|
|
"${OSBUILD_COMPOSER_TEST_DATA}"/kerberos/krb5-local.conf \
|
|
/etc/krb5.conf.d/local
|
|
|
|
DISTRO=rhel-86
|
|
|
|
function s3_request {
|
|
cat <<EOF
|
|
{
|
|
"distribution": "$DISTRO",
|
|
"image_request": {
|
|
"architecture": "$ARCH",
|
|
"image_type": "guest-image",
|
|
"repositories": $(jq ".\"$ARCH\"" /usr/share/tests/osbuild-composer/repositories/"$DISTRO".json),
|
|
"upload_options": {
|
|
"region": "${AWS_REGION}"
|
|
}
|
|
}
|
|
}
|
|
EOF
|
|
}
|
|
|
|
function koji_request {
|
|
local task_id="$1"
|
|
cat <<EOF
|
|
{
|
|
"distribution": "$DISTRO",
|
|
"image_request": {
|
|
"architecture": "$ARCH",
|
|
"image_type": "guest-image",
|
|
"repositories": $(jq ".\"$ARCH\"" /usr/share/tests/osbuild-composer/repositories/"$DISTRO".json)
|
|
},
|
|
"koji": {
|
|
"server": "https://localhost:4343/kojihub",
|
|
"task_id": $task_id,
|
|
"name": "name",
|
|
"version": "version",
|
|
"release": "release"
|
|
}
|
|
}
|
|
EOF
|
|
}
|
|
|
|
function send_compose {
|
|
local request_file="$1"
|
|
local refresh_token="$2"
|
|
curl \
|
|
--silent \
|
|
--show-error \
|
|
--fail \
|
|
--header 'Content-Type: application/json' \
|
|
--header "Authorization: Bearer $(access_token_with_org_id "$refresh_token")" \
|
|
--request POST \
|
|
--data @"$request_file" \
|
|
http://localhost:443/api/image-builder-composer/v2/compose | jq -r '.id'
|
|
}
|
|
|
|
function assert_status {
|
|
local compose="$1"
|
|
local refresh_token="$2"
|
|
local status="$3"
|
|
[[ $(compose_status_with_org_id "$compose" "$refresh_token" | jq -r '.status') == "$status" ]]
|
|
}
|
|
|
|
function wait_for_status {
|
|
local compose="$1"
|
|
local refresh_token="$2"
|
|
local desired_status="$3"
|
|
while true
|
|
do
|
|
local current_status
|
|
current_status=$(compose_status_with_org_id "$compose" "$refresh_token" | jq -r '.status')
|
|
|
|
case "$current_status" in
|
|
"$desired_status")
|
|
break
|
|
;;
|
|
# default undesired state
|
|
"failure")
|
|
echo "Image compose failed"
|
|
exit 1
|
|
;;
|
|
esac
|
|
|
|
sleep 10
|
|
done
|
|
}
|
|
|
|
function set_worker_org {
|
|
local org="$1"
|
|
greenprint "Setting worker's org ID to $org"
|
|
sudo tee "/etc/osbuild-worker/token" >/dev/null <<EOF
|
|
$org
|
|
EOF
|
|
sudo systemctl restart osbuild-remote-worker@localhost:8700
|
|
}
|
|
|
|
ORG=42
|
|
greenprint "Sending 1st compose, koji, org id = $ORG"
|
|
koji --server=http://localhost:8080/kojihub --user kojiadmin --password kojipass --authtype=password make-task image
|
|
ID=$(send_compose <( koji_request 1 ) $ORG)
|
|
|
|
greenprint "Making sure that a different worker doesn't pick up the compose."
|
|
set_worker_org 100
|
|
sleep 10
|
|
assert_status "$ID" $ORG pending
|
|
|
|
greenprint "Building the compose."
|
|
set_worker_org $ORG
|
|
wait_for_status "$ID" $ORG success
|
|
|
|
ORG=2022
|
|
greenprint "Sending 2nd compose, s3, org id = $ORG"
|
|
ID=$(send_compose <( s3_request ) $ORG)
|
|
|
|
greenprint "Making sure that a different worker doesn't pick up the compose."
|
|
set_worker_org 42
|
|
sleep 10
|
|
assert_status "$ID" $ORG pending
|
|
|
|
greenprint "Building the compose."
|
|
set_worker_org $ORG
|
|
wait_for_status "$ID" $ORG success
|