X-Git-Url: http://git.onelab.eu/?a=blobdiff_plain;f=tests%2Fovsdb-server.at;h=b603cf7d51e4ae569a696a2fb6b830ecb5a8f685;hb=3594990b070f8cd6df9d7693cacb8ff4d91429fe;hp=23125ab460ebecbf98bbd5998e3346c4215c1247;hpb=8159b984dced44851670bd48e204b4e854941a24;p=sliver-openvswitch.git diff --git a/tests/ovsdb-server.at b/tests/ovsdb-server.at index 23125ab46..b603cf7d5 100644 --- a/tests/ovsdb-server.at +++ b/tests/ovsdb-server.at @@ -38,6 +38,101 @@ cat stdout >> output EXECUTION_EXAMPLES +AT_SETUP([truncating corrupted database log]) +AT_KEYWORDS([ovsdb server positive unix]) +AT_DATA([schema], [ORDINAL_SCHEMA +]) +AT_CHECK([ovsdb-tool create db schema], [0], [stdout], [ignore]) +dnl Do one transaction and save the output. +AT_DATA([txnfile], [[ovsdb-client transact unix:socket \ +'["ordinals", + {"op": "insert", + "table": "ordinals", + "row": {"number": 0, "name": "zero"}}]' +]]) +AT_CHECK([ovsdb-server -vlockfile:ANY:EMER --remote=punix:socket --unixctl=$PWD/unixctl db --run="sh txnfile"], [0], [stdout], []) +cat stdout >> output +dnl Add some crap to the database log and run another transaction, which should +dnl ignore the crap and truncate it out of the log. +echo 'xxx' >> db +AT_DATA([txnfile], [[ovsdb-client transact unix:socket \ +'["ordinals", + {"op": "insert", + "table": "ordinals", + "row": {"number": 1, "name": "one"}}]' +]]) +AT_CHECK([ovsdb-server -vlockfile:ANY:EMER --remote=punix:socket --unixctl=$PWD/unixctl db --run="sh txnfile"], [0], [stdout], [stderr]) +AT_CHECK([grep 'syntax error: db: parse error.* in header line "xxx"' stderr], + [0], [ignore]) +cat stdout >> output +dnl Run a final transaction to verify that both transactions succeeeded. +dnl The crap that we added should have been truncated by the previous run, +dnl so ovsdb-server shouldn't log a warning this time. +AT_DATA([txnfile], [[ovsdb-client transact unix:socket \ +'["ordinals", + {"op": "select", + "table": "ordinals", + "where": [], + "sort": ["number"]}]' +]]) +AT_CHECK([ovsdb-server -vlockfile:ANY:EMER --remote=punix:socket --unixctl=$PWD/unixctl db --run="sh txnfile"], [0], [stdout], []) +cat stdout >> output +AT_CHECK([perl $srcdir/uuidfilt.pl output], [0], + [[[{"uuid":["uuid","<0>"]}] +[{"uuid":["uuid","<1>"]}] +[{"rows":[{"_uuid":["uuid","<0>"],"_version":["uuid","<2>"],"name":"zero","number":0},{"_uuid":["uuid","<1>"],"_version":["uuid","<3>"],"name":"one","number":1}]}] +]], [], + [test ! -e pid || kill `cat pid`]) +AT_CLEANUP + +AT_SETUP([truncating database log with bad transaction]) +AT_KEYWORDS([ovsdb server positive unix]) +AT_DATA([schema], [ORDINAL_SCHEMA +]) +AT_CHECK([ovsdb-tool create db schema], [0], [stdout], [ignore]) +dnl Do one transaction and save the output. +AT_DATA([txnfile], [[ovsdb-client transact unix:socket \ +'["ordinals", + {"op": "insert", + "table": "ordinals", + "row": {"number": 0, "name": "zero"}}]' +]]) +AT_CHECK([ovsdb-server -vlockfile:ANY:EMER --remote=punix:socket --unixctl=$PWD/unixctl db --run="sh txnfile"], [0], [stdout], []) +cat stdout >> output +dnl Add some crap to the database log and run another transaction, which should +dnl ignore the crap and truncate it out of the log. +echo 'OVSDB JSON 15 ffbcdae4b0386265f9ea3280dd7c8f0b72a20e56 +{"invalid":{}}' >> db +AT_DATA([txnfile], [[ovsdb-client transact unix:socket \ +'["ordinals", + {"op": "insert", + "table": "ordinals", + "row": {"number": 1, "name": "one"}}]' +]]) +AT_CHECK([ovsdb-server -vlockfile:ANY:EMER --remote=punix:socket --unixctl=$PWD/unixctl db --run="sh txnfile"], [0], [stdout], [stderr]) +AT_CHECK([grep 'syntax "{"invalid":{}}": unknown table: No table named invalid.' stderr], + [0], [ignore]) +cat stdout >> output +dnl Run a final transaction to verify that both transactions succeeeded. +dnl The crap that we added should have been truncated by the previous run, +dnl so ovsdb-server shouldn't log a warning this time. +AT_DATA([txnfile], [[ovsdb-client transact unix:socket \ +'["ordinals", + {"op": "select", + "table": "ordinals", + "where": [], + "sort": ["number"]}]' +]]) +AT_CHECK([ovsdb-server -vlockfile:ANY:EMER --remote=punix:socket --unixctl=$PWD/unixctl db --run="sh txnfile"], [0], [stdout], []) +cat stdout >> output +AT_CHECK([perl $srcdir/uuidfilt.pl output], [0], + [[[{"uuid":["uuid","<0>"]}] +[{"uuid":["uuid","<1>"]}] +[{"rows":[{"_uuid":["uuid","<0>"],"_version":["uuid","<2>"],"name":"zero","number":0},{"_uuid":["uuid","<1>"],"_version":["uuid","<3>"],"name":"one","number":1}]}] +]], [], + [test ! -e pid || kill `cat pid`]) +AT_CLEANUP + AT_SETUP([ovsdb-client get-schema-version]) AT_KEYWORDS([ovsdb server positive]) AT_DATA([schema], [ORDINAL_SCHEMA @@ -106,7 +201,7 @@ AT_KEYWORDS([ovsdb server positive ssl $5]) AT_SKIP_IF([test "$HAVE_OPENSSL" = no]) AT_SKIP_IF([test "x$RANDOM" = x]) SSL_PORT=`expr 32767 + \( $RANDOM % 32767 \)` -PKIDIR=$abs_top_srcdir/tests +PKIDIR=$abs_top_builddir/tests AT_SKIP_IF([expr "$PKIDIR" : ".*[ '\" \\]"]) AT_DATA([schema], @@ -192,7 +287,7 @@ AT_CHECK( [0], [stdout], [ignore], [test ! -e pid || kill `cat pid`]) dnl Check that all the crap is in fact in the database log. AT_CHECK([[perl $srcdir/uuidfilt.pl db | grep -v ^OVSDB | sed 's/"_date":[0-9]*/"_date":0/' | test-json --multiple -]], [0], - [[{"name":"ordinals","tables":{"ordinals":{"columns":{"name":{"type":"string"},"number":{"type":"integer"}}}},"version":"5.1.3"} + [[{"cksum":"12345678 9","name":"ordinals","tables":{"ordinals":{"columns":{"name":{"type":"string"},"number":{"type":"integer"}}}},"version":"5.1.3"} {"_comment":"add row for zero 0","_date":0,"ordinals":{"<0>":{"name":"zero"}}} {"_comment":"delete row for 0","_date":0,"ordinals":{"<0>":null}} {"_comment":"add back row for zero 0","_date":0,"ordinals":{"<1>":{"name":"zero"}}} @@ -299,7 +394,7 @@ m4_define([OVSDB_CHECK_EXECUTION], AT_DATA([schema], [$2 ]) SSL_PORT=`expr 32767 + \( $RANDOM % 32767 \)` - PKIDIR=$abs_top_srcdir/tests + PKIDIR=$abs_top_builddir/tests AT_CHECK([ovsdb-tool create db schema], [0], [stdout], [ignore]) AT_CHECK([ovsdb-server --detach --pidfile=$PWD/pid --private-key=$PKIDIR/testpki-privkey2.pem --certificate=$PKIDIR/testpki-cert2.pem --ca-cert=$PKIDIR/testpki-cacert.pem --remote=pssl:$SSL_PORT:127.0.0.1 --unixctl=$PWD/unixctl db], [0], [ignore], [ignore]) m4_foreach([txn], [$3],