From 5fe01703e7c82edf2bfb652adc256904cc754b15 Mon Sep 17 00:00:00 2001 From: Matt Benjamin Date: Mon, 14 Dec 2015 14:16:30 -0500 Subject: [PATCH] librgw: add initial atomic write unit test Tests are focused on open-write-close, open-read-close sequences. Signed-off-by: Matt Benjamin --- src/test/CMakeLists.txt | 16 ++ src/test/librgw_file_aw.cc | 342 +++++++++++++++++++++++++++++++++++++ 2 files changed, 358 insertions(+) create mode 100644 src/test/librgw_file_aw.cc diff --git a/src/test/CMakeLists.txt b/src/test/CMakeLists.txt index 2be7e964fc0..e2021a16306 100644 --- a/src/test/CMakeLists.txt +++ b/src/test/CMakeLists.txt @@ -2447,6 +2447,22 @@ target_link_libraries(test_librgw_file_nfsns ${CMAKE_DL_LIBS} ) +# librgw_file_aw (nfs write transaction [atomic write] tests) +add_executable(test_librgw_file_aw + librgw_file_aw.cc + $ + ) +set_target_properties(test_librgw_file_aw PROPERTIES COMPILE_FLAGS + ${UNITTEST_CXX_FLAGS}) +target_link_libraries(test_librgw_file_aw + rgw + librados + ${UNITTEST_LIBS} + ${EXTRALIBS} + ${ALLOC_LIBS} + ${CMAKE_DL_LIBS} + ) + if(${HAVE_LIBFUSE}) add_executable(test_cfuse_cache_invalidate test_cfuse_cache_invalidate.cc diff --git a/src/test/librgw_file_aw.cc b/src/test/librgw_file_aw.cc new file mode 100644 index 00000000000..3c7a64aa16b --- /dev/null +++ b/src/test/librgw_file_aw.cc @@ -0,0 +1,342 @@ +// -*- mode:C++; tab-width:8; c-basic-offset:2; indent-tabs-mode:t -*- +// vim: ts=8 sw=2 smarttab +/* + * Ceph - scalable distributed file system + * + * Copyright (C) 2015 New Dream Network + * + * This is free software; you can redistribute it and/or + * modify it under the terms of the GNU Lesser General Public + * License version 2.1, as published by the Free Software + * Foundation. See file COPYING. + * + */ + +#include +#include +#include +#include +#include +#include +#include "xxhash.h" + +#include "include/rados/librgw.h" +#include "include/rados/rgw_file.h" + +#include "gtest/gtest.h" +#include "common/ceph_argparse.h" +#include "common/debug.h" +#include "global/global_init.h" + +#define dout_subsys ceph_subsys_rgw + +namespace { + librgw_t rgw = nullptr; + string uid("testuser"); + string access_key(""); + string secret_key(""); + struct rgw_fs *fs = nullptr; + + bool do_delete = false; + bool do_verify = false; + bool do_hexdump = false; + + string bucket_name = "sorry_dave"; + string object_name = "jocaml"; + + struct rgw_file_handle *bucket_fh = nullptr; + struct rgw_file_handle *object_fh = nullptr; + + typedef std::tuple fid_type; + std::vector fids; + + std::uniform_int_distribution uint_dist; + std::mt19937 rng; + + constexpr int iovcnt = 16; + constexpr int page_size = 65536; + constexpr int seed = 8675309; + + struct ZPage + { + char data[page_size]; + uint64_t cksum; + }; /* ZPage */ + + struct ZPageSet + { + std::vector pages; + struct iovec* iovs; + + ZPageSet(int n) { + pages.reserve(n); + iovs = (struct iovec*) calloc(n, sizeof(struct iovec)); + for (int page_ix = 0; page_ix < n; ++page_ix) { + ZPage* p = new ZPage(); + for (int data_ix = 0; data_ix < page_size; ++data_ix) { + p->data[data_ix] = uint_dist(rng); + } // data_ix + p->cksum = XXH64(p->data, page_size, seed); + pages.emplace_back(p); + // and iovs + struct iovec* iov = &iovs[page_ix]; + iov->iov_base = p->data; + iov->iov_len = page_size; + } // page_ix + } + + int size() { return pages.size(); } + + struct iovec* get_iovs() { return iovs; } + + bool operator==(const ZPageSet& rhs) { + int n = size(); + for (int page_ix = 0; page_ix < n; ++page_ix) { + ZPage* p1 = pages[page_ix]; + ZPage* p2 = rhs.pages[page_ix]; + if (p1->cksum != p2->cksum) + return false; + } + return true; + } + + bool operator==(const rgw_uio* uio) { + uint64_t cksum; + int vix = 0, off = 0; + rgw_vio* vio = &uio->uio_vio[vix]; + int vio_len = vio->vio_len; + char *data; + + for (int ix = 0; ix < iovcnt; ++ix) { + ZPage* p1 = pages[ix]; + data = static_cast(vio->vio_base) + off; + cksum = XXH64(data, page_size, seed); + + if (p1->cksum != cksum) { + int r = memcmp(data, p1->data, page_size); + std::cout << "problem at ix " << ix << " r " << r<< std::endl; + return false; + } + + off += page_size; + if (off >= vio_len) { + vio = &uio->uio_vio[++vix]; + vio_len = vio->vio_len; + off = 0; + } + } + return true; + } + + void cksum() { + int n = size(); + for (int page_ix = 0; page_ix < n; ++page_ix) { + ZPage* p = pages[page_ix]; + p->cksum = XXH64(p->data, page_size, seed); + } + } + + void reset_iovs() { // VOP_READ and VOP_WRITE update + int n = size(); + for (int page_ix = 0; page_ix < n; ++page_ix) { + ZPage* p = pages[page_ix]; + struct iovec* iov = &iovs[page_ix]; + iov->iov_base = p->data; + iov->iov_len = page_size; + } + } + + ~ZPageSet() { + for (unsigned int ix = 0; ix < pages.size(); ++ix) + delete pages[ix]; + free(iovs); + } + }; /* ZPageSet */ + + ZPageSet zp_set1{iovcnt}; // 1M random data in 16 64K pages + + struct { + int argc; + char **argv; + } saved_args; +} + +TEST(LibRGW, INIT) { + int ret = librgw_create(&rgw, saved_args.argc, saved_args.argv); + ASSERT_EQ(ret, 0); + ASSERT_NE(rgw, nullptr); +} + +TEST(LibRGW, MOUNT) { + int ret = rgw_mount(rgw, uid.c_str(), access_key.c_str(), secret_key.c_str(), + &fs); + ASSERT_EQ(ret, 0); + ASSERT_NE(fs, nullptr); +} + +TEST(LibRGW, CREATE_BUCKET) { + struct stat st; + struct rgw_file_handle *fh; + int ret = rgw_mkdir(fs, fs->root_fh, bucket_name.c_str(), 755, &st, &fh); + ASSERT_EQ(ret, 0); +} + +TEST(LibRGW, LOOKUP_BUCKET) { + int ret = rgw_lookup(fs, fs->root_fh, bucket_name.c_str(), &bucket_fh, + 0 /* flags */); + ASSERT_EQ(ret, 0); +} + +TEST(LibRGW, LOOKUP_OBJECT) { + int ret = rgw_lookup(fs, bucket_fh, object_name.c_str(), &object_fh, + RGW_LOOKUP_FLAG_CREATE); + ASSERT_EQ(ret, 0); +} + +TEST(LibRGW, OPEN1) { + int ret = rgw_open(fs, object_fh, 0 /* flags */); + ASSERT_EQ(ret, 0); +} + +TEST(LibRGW, PUT_OBJECT) { + size_t nbytes; + struct iovec *iovs = zp_set1.get_iovs(); + off_t offset = 0; + for (int ix : {0, 1}) { + struct iovec *iov = &iovs[ix]; + // quick check + sprintf(static_cast(iov->iov_base), "::hi mom (%d)", ix); + int ret = rgw_write(fs, object_fh, offset, iov->iov_len, &nbytes, + iov->iov_base); + offset += iov->iov_len; + ASSERT_EQ(ret, 0); + ASSERT_EQ(nbytes, iov->iov_len); + } +} + +TEST(LibRGW, CLOSE1) { + int ret = rgw_close(fs, object_fh, 0 /* flags */); + ASSERT_EQ(ret, 0); +} + +TEST(LibRGW, OPEN2) { + int ret = rgw_open(fs, object_fh, 0 /* flags */); + ASSERT_EQ(ret, 0); +} + +TEST(LibRGW, GET_OBJECT) { + uint64_t nread; + off_t offset = 0; + struct iovec *iovs = zp_set1.get_iovs(); + for (int ix : {2, 3}) { + struct iovec *iov = &iovs[ix]; + int ret = rgw_read(fs, object_fh, offset, iov[ix-2].iov_len, &nread, + iov->iov_base); + offset += iov->iov_len; + ASSERT_EQ(ret, 0); + ASSERT_EQ(nread, iov[ix-2].iov_len); + std::cout << "read: " << static_cast(iov->iov_base) << std::endl; + } +} + +TEST(LibRGW, CLOSE2) { + int ret = rgw_close(fs, object_fh, 0 /* flags */); + ASSERT_EQ(ret, 0); +} + +TEST(LibRGW, STAT_OBJECT) { + struct stat st; + int ret = rgw_getattr(fs, object_fh, &st); + ASSERT_EQ(ret, 0); + dout(15) << "rgw_getattr on " << object_name << " size = " + << st.st_size << dendl; +} + +TEST(LibRGW, DELETE_OBJECT) { + if (do_delete) { + int ret = rgw_unlink(fs, bucket_fh, object_name.c_str()); + ASSERT_EQ(ret, 0); + } +} + +TEST(LibRGW, CLEANUP) { + int ret; + if (object_fh) { + ret = rgw_fh_rele(fs, object_fh, 0 /* flags */); + ASSERT_EQ(ret, 0); + } + ret = rgw_fh_rele(fs, bucket_fh, 0 /* flags */); + ASSERT_EQ(ret, 0); +} + +TEST(LibRGW, UMOUNT) { + if (! fs) + return; + + int ret = rgw_umount(fs); + ASSERT_EQ(ret, 0); +} + +TEST(LibRGW, SHUTDOWN) { + librgw_shutdown(rgw); +} + +int main(int argc, char *argv[]) +{ + char *v{nullptr}; + string val; + vector args; + + argv_to_vec(argc, const_cast(argv), args); + env_to_vec(args); + + v = getenv("AWS_ACCESS_KEY_ID"); + if (v) { + access_key = v; + } + + v = getenv("AWS_SECRET_ACCESS_KEY"); + if (v) { + secret_key = v; + } + + for (auto arg_iter = args.begin(); arg_iter != args.end();) { + if (ceph_argparse_witharg(args, arg_iter, &val, "--access", + (char*) nullptr)) { + access_key = val; + } else if (ceph_argparse_witharg(args, arg_iter, &val, "--secret", + (char*) nullptr)) { + secret_key = val; + } else if (ceph_argparse_witharg(args, arg_iter, &val, "--uid", + (char*) nullptr)) { + uid = val; + } else if (ceph_argparse_witharg(args, arg_iter, &val, "--bn", + (char*) nullptr)) { + bucket_name = val; + } else if (ceph_argparse_flag(args, arg_iter, "--verify", + (char*) nullptr)) { + do_verify = true; + } else if (ceph_argparse_flag(args, arg_iter, "--delete", + (char*) nullptr)) { + do_delete = true; + } else if (ceph_argparse_flag(args, arg_iter, "--hexdump", + (char*) nullptr)) { + do_hexdump = true; + } else { + ++arg_iter; + } + } + + /* dont accidentally run as anonymous */ + if ((access_key == "") || + (secret_key == "")) { + std::cout << argv[0] << " no AWS credentials, exiting" << std::endl; + return EPERM; + } + + saved_args.argc = argc; + saved_args.argv = argv; + + ::testing::InitGoogleTest(&argc, argv); + return RUN_ALL_TESTS(); +} -- 2.39.5