From: Sebastien Buisson Date: Mon, 1 May 2023 23:44:18 +0000 (-0700) Subject: LU-16784 tests: fix path to lgss_sk X-Git-Url: https://git.whamcloud.com/?a=commitdiff_plain;h=dd2649ed83eaa50a4fd35cbfb8bec11fc84513cc;p=fs%2Flustre-release.git LU-16784 tests: fix path to lgss_sk Find correct path to lgss_sk utility, by looking inside Lustre build tree if command is not installed on the local node. Lustre-change: https://review.whamcloud.com/50825 Lustre-commit: 1ba12d98d5b068083fbb855b287d0b6da0ada80d Test-Parameters: trivial Test-Parameters: mdscount=2 mdtcount=4 osscount=1 ostcount=8 clientcount=2 testlist=sanity-sec env=SHARED_KEY=true Signed-off-by: Sebastien Buisson Change-Id: I23920bb2a44d2ec7e9662e75c23bd5302d8dfee2 Reviewed-by: Sarah Liu Reviewed-by: Andreas Dilger Reviewed-on: https://review.whamcloud.com/c/ex/lustre-release/+/53251 Tested-by: jenkins Tested-by: Maloo --- diff --git a/lustre/tests/sanity-sec.sh b/lustre/tests/sanity-sec.sh index 0d0cf0d..cf6bfb0 100755 --- a/lustre/tests/sanity-sec.sh +++ b/lustre/tests/sanity-sec.sh @@ -2251,7 +2251,7 @@ test_30() { do_node ${clients_arr[0]} "keyctl show | awk '/lustre/ { print \\\$1 }' | xargs -IX keyctl unlink X" # generate key with bogus filesystem name - do_node ${clients_arr[0]} "lgss_sk -w $SK_PATH/$FSNAME-bogus.key \ + do_node ${clients_arr[0]} "$LGSS_SK -w $SK_PATH/$FSNAME-bogus.key \ -f $FSNAME.bogus -t client -d /dev/urandom" || error "lgss_sk failed (1)" do_facet $SINGLEMDS lfs flushctx || error "could not run flushctx" @@ -2538,16 +2538,16 @@ test_32() { fi # add mgs key type and MGS NIDs in key on MGS - do_nodes $mgs_HOST "lgss_sk -t mgs,server -g $MGSNID -m \ + do_nodes $mgs_HOST "$LGSS_SK -t mgs,server -g $MGSNID -m \ $SK_PATH/$FSNAME.key >/dev/null 2>&1" || error "could not modify keyfile on MGS" # load modified key file on MGS - do_nodes $mgs_HOST "lgss_sk -l $SK_PATH/$FSNAME.key >/dev/null 2>&1" || + do_nodes $mgs_HOST "$LGSS_SK -l $SK_PATH/$FSNAME.key >/dev/null 2>&1" || error "could not load keyfile on MGS" # add MGS NIDs in key on client - do_nodes ${clients_arr[0]} "lgss_sk -g $MGSNID -m \ + do_nodes ${clients_arr[0]} "$LGSS_SK -g $MGSNID -m \ $SK_PATH/$FSNAME.key >/dev/null 2>&1" || error "could not modify keyfile on MGS" @@ -2660,16 +2660,16 @@ test_33() { fi # add mgs key type and MGS NIDs in key on MGS - do_nodes $mgs_HOST "lgss_sk -t mgs,server -g $MGSNID -m \ + do_nodes $mgs_HOST "$LGSS_SK -t mgs,server -g $MGSNID -m \ $SK_PATH/$FSNAME.key >/dev/null 2>&1" || error "could not modify keyfile on MGS" # load modified key file on MGS - do_nodes $mgs_HOST "lgss_sk -l $SK_PATH/$FSNAME.key >/dev/null 2>&1" || + do_nodes $mgs_HOST "$LGSS_SK -l $SK_PATH/$FSNAME.key >/dev/null 2>&1" || error "could not load keyfile on MGS" # add MGS NIDs in key on client - do_nodes ${clients_arr[0]} "lgss_sk -g $MGSNID -m \ + do_nodes ${clients_arr[0]} "$LGSS_SK -g $MGSNID -m \ $SK_PATH/$FSNAME.key >/dev/null 2>&1" || error "could not modify keyfile on MGS" diff --git a/lustre/tests/sanity-selinux.sh b/lustre/tests/sanity-selinux.sh index 5446caf..863dd25 100755 --- a/lustre/tests/sanity-selinux.sh +++ b/lustre/tests/sanity-selinux.sh @@ -590,7 +590,7 @@ test_21a() { export SK_UNIQUE_NM=true # load specific key on servers - do_nodes $(comma_list $(all_server_nodes)) "lgss_sk -t server \ + do_nodes $(comma_list $(all_server_nodes)) "$LGSS_SK -t server \ -l $SK_PATH/nodemap/c0.key" # set perms for per-nodemap keys else permission denied @@ -678,7 +678,7 @@ test_21b() { export SK_UNIQUE_NM=true # load specific key on servers - do_nodes $(comma_list $(all_server_nodes)) "lgss_sk -t server \ + do_nodes $(comma_list $(all_server_nodes)) "$LGSS_SK -t server \ -l $SK_PATH/nodemap/c0.key" # set perms for per-nodemap keys else permission denied diff --git a/lustre/tests/test-framework.sh b/lustre/tests/test-framework.sh index 02a12bf..d6fc6bb 100755 --- a/lustre/tests/test-framework.sh +++ b/lustre/tests/test-framework.sh @@ -366,7 +366,11 @@ init_test_env() { if $SHARED_KEY; then $RPC_MODE || echo "Using GSS shared-key feature" - which lgss_sk > /dev/null 2>&1 || + [ -n "$LGSS_SK" ] || + export LGSS_SK=$(which lgss_sk 2> /dev/null) + [ -n "$LGSS_SK" ] || + export LGSS_SK="$LUSTRE/utils/gss/lgss_sk" + [ -n "$LGSS_SK" ] || error_exit "built with lgss_sk disabled! SEC=$SEC" GSS=true GSS_SK=true @@ -1106,7 +1110,7 @@ init_gss() { if $GSS_SK && ! $SK_NO_KEY; then echo "Loading basic SSK keys on all servers" do_nodes $(comma_list $(all_server_nodes)) \ - "lgss_sk -t server -l $SK_PATH/$FSNAME.key || true" + "$LGSS_SK -t server -l $SK_PATH/$FSNAME.key || true" do_nodes $(comma_list $(all_server_nodes)) \ "keyctl show | grep lustre | cut -c1-11 | sed -e 's/ //g;' | @@ -1164,19 +1168,19 @@ init_gss() { # and S2S now requires keys as well, both for "client" # and for "server" if $SK_S2S; then - lgss_sk -t server -f$FSNAME -n $SK_S2SNMCLI \ + $LGSS_SK -t server -f$FSNAME -n $SK_S2SNMCLI \ -w $SK_PATH/$FSNAME-nmclient.key \ -d /dev/urandom >/dev/null 2>&1 - lgss_sk -t mgs,server -f$FSNAME -n $SK_S2SNM \ + $LGSS_SK -t mgs,server -f$FSNAME -n $SK_S2SNM \ -w $SK_PATH/$FSNAME-s2s-server.key \ -d /dev/urandom >/dev/null 2>&1 fi # basic key create - lgss_sk -t server -f$FSNAME -w $SK_PATH/$FSNAME.key \ + $LGSS_SK -t server -f$FSNAME -w $SK_PATH/$FSNAME.key \ -d /dev/urandom >/dev/null 2>&1 # per-nodemap keys for i in $(seq 0 $((numclients - 1))); do - lgss_sk -t server -f$FSNAME -n c$i \ + $LGSS_SK -t server -f$FSNAME -n c$i \ -w $SK_PATH/nodemap/c$i.key -d /dev/urandom \ >/dev/null 2>&1 done @@ -1188,13 +1192,14 @@ init_gss() { fi # Set client keys to client type to generate prime P if local_mode; then - do_nodes $(all_nodes) "lgss_sk -t client,server -m \ + do_nodes $(all_nodes) "$LGSS_SK -t client,server -m \ $SK_PATH/$FSNAME.key >/dev/null 2>&1" else - do_nodes $clients "lgss_sk -t client -m \ + do_nodes $clients "$LGSS_SK -t client -m \ $SK_PATH/$FSNAME.key >/dev/null 2>&1" - do_nodes $clients "find $SK_PATH/nodemap -name \*.key | \ - xargs -IX lgss_sk -t client -m X >/dev/null 2>&1" + do_nodes $clients "find $SK_PATH/nodemap \ + -name \*.key | xargs -IX $LGSS_SK -t client \ + -m X >/dev/null 2>&1" # also have a client key available on server side, # for local client mount do_nodes $(comma_list $(all_server_nodes)) \ @@ -1206,15 +1211,15 @@ init_gss() { if $SK_S2S; then do_nodes $(comma_list $(mdts_nodes)) \ "cp $SK_PATH/$FSNAME-s2s-server.key \ - $SK_PATH/$FSNAME-s2s-client.key; lgss_sk \ + $SK_PATH/$FSNAME-s2s-client.key; $LGSS_SK \ -t client -m $SK_PATH/$FSNAME-s2s-client.key \ >/dev/null 2>&1" do_nodes $(comma_list $(osts_nodes)) \ "cp $SK_PATH/$FSNAME-s2s-server.key \ - $SK_PATH/$FSNAME-s2s-client.key; lgss_sk \ + $SK_PATH/$FSNAME-s2s-client.key; $LGSS_SK \ -t client -m $SK_PATH/$FSNAME-s2s-client.key \ >/dev/null 2>&1" - do_nodes $clients "lgss_sk -t client \ + do_nodes $clients "$LGSS_SK -t client \ -m $SK_PATH/$FSNAME-nmclient.key \ >/dev/null 2>&1" fi @@ -2593,8 +2598,8 @@ zconf_mount_clients() { local i=0 # Mount all server nodes first with per-NM keys for nmclient in ${clients//,/ }; do -# do_nodes $(comma_list $(all_server_nodes)) "lgss_sk -t server -l $SK_PATH/nodemap/c$i.key -n c$i" - do_nodes $(comma_list $(all_server_nodes)) "lgss_sk -t server -l $SK_PATH/nodemap/c$i.key" + do_nodes $(comma_list $(all_server_nodes)) \ + "$LGSS_SK -t server -l $SK_PATH/nodemap/c$i.key" i=$((i + 1)) done # set perms for per-nodemap keys else permission denied @@ -8533,7 +8538,7 @@ gather_logs () { $LCTL dk > ${prefix}.debug_log.$(hostname -s).${suffix} dmesg > ${prefix}.dmesg.$(hostname -s).${suffix} [ "$SHARED_KEY" = true ] && find $SK_PATH -name '*.key' -exec \ - lgss_sk -r {} \; &> \ + $LGSS_SK -r {} \; &> \ ${prefix}.ssk_keys.$(hostname -s).${suffix} [ "$SHARED_KEY" = true ] && lctl get_param 'nodemap.*.*' > \ ${prefix}.nodemaps.$(hostname -s).${suffix} @@ -8549,7 +8554,7 @@ gather_logs () { dmesg > ${prefix}.dmesg.\\\$(hostname -s).${suffix}" if [ "$SHARED_KEY" = true ]; then do_nodesv $list "find $SK_PATH -name '*.key' -exec \ - lgss_sk -r {} \; &> \ + $LGSS_SK -r {} \; &> \ ${prefix}.ssk_keys.\\\$(hostname -s).${suffix}" do_facet mds1 "lctl get_param 'nodemap.*.*' > \ ${prefix}.nodemaps.\\\$(hostname -s).${suffix}"