3 # Run select tests by setting ONLY, or as arguments to the script.
4 # Skip specific tests by setting EXCEPT.
10 # bug number for skipped test: 19430 19967 19967
11 ALWAYS_EXCEPT=" 2 5 6 $SANITY_SEC_EXCEPT"
12 # UPDATE THE COMMENT ABOVE WITH BUG NUMBERS WHEN CHANGING ALWAYS_EXCEPT!
15 export PATH=$PWD/$SRCDIR:$SRCDIR:$PWD/$SRCDIR/../utils:$PATH:/sbin
16 export NAME=${NAME:-local}
18 LUSTRE=${LUSTRE:-$(dirname $0)/..}
19 . $LUSTRE/tests/test-framework.sh
21 . ${CONFIG:=$LUSTRE/tests/cfg/$NAME.sh}
24 [ "$SLOW" = "no" ] && EXCEPT_SLOW="26"
26 [ "$ALWAYS_EXCEPT$EXCEPT$EXCEPT_SLOW" ] &&
27 echo "Skipping tests: $ALWAYS_EXCEPT $EXCEPT $EXCEPT_SLOW"
29 RUNAS_CMD=${RUNAS_CMD:-runas}
31 WTL=${WTL:-"$LUSTRE/tests/write_time_limit"}
34 PERM_CONF=$CONFDIR/perm.conf
37 HOSTNAME_CHECKSUM=$(hostname | sum | awk '{ print $1 }')
38 SUBNET_CHECKSUM=$(expr $HOSTNAME_CHECKSUM % 250 + 1)
41 NODEMAP_IPADDR_LIST="1 10 64 128 200 250"
44 require_dsh_mds || exit 0
45 require_dsh_ost || exit 0
47 clients=${CLIENTS//,/ }
48 num_clients=$(get_node_count ${clients})
49 clients_arr=($clients)
53 USER0=$(grep :$ID0:$ID0: /etc/passwd | cut -d: -f1)
54 USER1=$(grep :$ID1:$ID1: /etc/passwd | cut -d: -f1)
57 skip "need to add user0 ($ID0:$ID0) to /etc/passwd" && exit 0
60 skip "need to add user1 ($ID1:$ID1) to /etc/passwd" && exit 0
62 IDBASE=${IDBASE:-60000}
64 # changes to mappings must be reflected in test 23
66 [0]="$((IDBASE+3)):$((IDBASE+0)) $((IDBASE+4)):$((IDBASE+2))"
67 [1]="$((IDBASE+5)):$((IDBASE+1)) $((IDBASE+6)):$((IDBASE+2))"
70 check_and_setup_lustre
73 if [ "$I_MOUNTED" = "yes" ]; then
74 cleanupall -f || error "sec_cleanup"
79 [ -z "$(echo $DIR | grep $MOUNT)" ] &&
80 error "$DIR not in $MOUNT" && sec_cleanup && exit 1
82 [ $(echo $MOUNT | wc -w) -gt 1 ] &&
83 echo "NAME=$MOUNT mounted more than once" && sec_cleanup && exit 0
86 GSS_REF=$(lsmod | grep ^ptlrpc_gss | awk '{print $3}')
87 if [ ! -z "$GSS_REF" -a "$GSS_REF" != "0" ]; then
89 echo "with GSS support"
92 echo "without GSS support"
95 MDT=$(do_facet $SINGLEMDS lctl get_param -N "mdt.\*MDT0000" |
97 [ -z "$MDT" ] && error "fail to get MDT device" && exit 1
98 do_facet $SINGLEMDS "mkdir -p $CONFDIR"
99 IDENTITY_FLUSH=mdt.$MDT.identity_flush
100 IDENTITY_UPCALL=mdt.$MDT.identity_upcall
101 MDSSECLEVEL=mdt.$MDT.sec_level
104 if [ -z "$(lctl get_param -n llite.*.client_type | grep remote 2>/dev/null)" ]
121 if ! $RUNAS_CMD -u $user krb5_login.sh; then
122 error "$user login kerberos failed."
126 if ! $RUNAS_CMD -u $user -g $group ls $DIR > /dev/null 2>&1; then
127 $RUNAS_CMD -u $user lfs flushctx -k
128 $RUNAS_CMD -u $user krb5_login.sh
129 if ! $RUNAS_CMD -u$user -g$group ls $DIR > /dev/null 2>&1; then
130 error "init $user $group failed."
136 declare -a identity_old
139 for num in $(seq $MDSCOUNT); do
140 switch_identity $num true || identity_old[$num]=$?
143 if ! $RUNAS_CMD -u $ID0 ls $DIR > /dev/null 2>&1; then
144 sec_login $USER0 $USER0
147 if ! $RUNAS_CMD -u $ID1 ls $DIR > /dev/null 2>&1; then
148 sec_login $USER1 $USER1
153 # run as different user
157 chmod 0755 $DIR || error "chmod (1)"
158 rm -rf $DIR/$tdir || error "rm (1)"
159 mkdir -p $DIR/$tdir || error "mkdir (1)"
161 if [ "$CLIENT_TYPE" = "remote" ]; then
162 do_facet $SINGLEMDS "echo '* 0 normtown' > $PERM_CONF"
163 do_facet $SINGLEMDS "lctl set_param -n $IDENTITY_FLUSH=-1"
164 chown $USER0 $DIR/$tdir && error "chown (1)"
165 do_facet $SINGLEMDS "echo '* 0 rmtown' > $PERM_CONF"
166 do_facet $SINGLEMDS "lctl set_param -n $IDENTITY_FLUSH=-1"
168 chown $USER0 $DIR/$tdir || error "chown (2)"
171 $RUNAS_CMD -u $ID0 ls $DIR || error "ls (1)"
172 rm -f $DIR/f0 || error "rm (2)"
173 $RUNAS_CMD -u $ID0 touch $DIR/f0 && error "touch (1)"
174 $RUNAS_CMD -u $ID0 touch $DIR/$tdir/f1 || error "touch (2)"
175 $RUNAS_CMD -u $ID1 touch $DIR/$tdir/f2 && error "touch (3)"
176 touch $DIR/$tdir/f3 || error "touch (4)"
177 chown root $DIR/$tdir || error "chown (3)"
178 chgrp $USER0 $DIR/$tdir || error "chgrp (1)"
179 chmod 0775 $DIR/$tdir || error "chmod (2)"
180 $RUNAS_CMD -u $ID0 touch $DIR/$tdir/f4 || error "touch (5)"
181 $RUNAS_CMD -u $ID1 touch $DIR/$tdir/f5 && error "touch (6)"
182 touch $DIR/$tdir/f6 || error "touch (7)"
183 rm -rf $DIR/$tdir || error "rm (3)"
185 if [ "$CLIENT_TYPE" = "remote" ]; then
186 do_facet $SINGLEMDS "rm -f $PERM_CONF"
187 do_facet $SINGLEMDS "lctl set_param -n $IDENTITY_FLUSH=-1"
190 run_test 0 "uid permission ============================="
194 [ $GSS_SUP = 0 ] && skip "without GSS support." && return
196 if [ "$CLIENT_TYPE" = "remote" ]; then
197 do_facet $SINGLEMDS "echo '* 0 rmtown' > $PERM_CONF"
198 do_facet $SINGLEMDS "lctl set_param -n $IDENTITY_FLUSH=-1"
204 chown $USER0 $DIR/$tdir || error "chown (1)"
205 $RUNAS_CMD -u $ID1 -v $ID0 touch $DIR/$tdir/f0 && error "touch (2)"
206 echo "enable uid $ID1 setuid"
207 do_facet $SINGLEMDS "echo '* $ID1 setuid' >> $PERM_CONF"
208 do_facet $SINGLEMDS "lctl set_param -n $IDENTITY_FLUSH=-1"
209 $RUNAS_CMD -u $ID1 -v $ID0 touch $DIR/$tdir/f1 || error "touch (3)"
211 chown root $DIR/$tdir || error "chown (4)"
212 chgrp $USER0 $DIR/$tdir || error "chgrp (5)"
213 chmod 0770 $DIR/$tdir || error "chmod (6)"
214 $RUNAS_CMD -u $ID1 -g $ID1 touch $DIR/$tdir/f2 && error "touch (7)"
215 $RUNAS_CMD -u$ID1 -g$ID1 -j$ID0 touch $DIR/$tdir/f3 && error "touch (8)"
216 echo "enable uid $ID1 setuid,setgid"
217 do_facet $SINGLEMDS "echo '* $ID1 setuid,setgid' > $PERM_CONF"
218 do_facet $SINGLEMDS "lctl set_param -n $IDENTITY_FLUSH=-1"
219 $RUNAS_CMD -u $ID1 -g $ID1 -j $ID0 touch $DIR/$tdir/f4 ||
221 $RUNAS_CMD -u $ID1 -v $ID0 -g $ID1 -j $ID0 touch $DIR/$tdir/f5 ||
226 do_facet $SINGLEMDS "rm -f $PERM_CONF"
227 do_facet $SINGLEMDS "lctl set_param -n $IDENTITY_FLUSH=-1"
229 run_test 1 "setuid/gid ============================="
231 run_rmtacl_subtest() {
232 $SAVE_PWD/rmtacl/run $SAVE_PWD/rmtacl/$1.test
237 # for remote client only
239 [ "$CLIENT_TYPE" = "local" ] &&
240 skip "remote_acl for remote client only" && return
241 [ -z "$(lctl get_param -n mdc.*-mdc-*.connect_flags | grep ^acl)" ] &&
242 skip "must have acl enabled" && return
243 [ -z "$(which setfacl 2>/dev/null)" ] &&
244 skip "could not find setfacl" && return
245 [ "$UID" != 0 ] && skip "must run as root" && return
247 do_facet $SINGLEMDS "echo '* 0 rmtacl,rmtown' > $PERM_CONF"
248 do_facet $SINGLEMDS "lctl set_param -n $IDENTITY_FLUSH=-1"
252 sec_login daemon daemon
253 sec_login games users
259 echo "performing cp ..."
260 run_rmtacl_subtest cp || error "cp"
261 echo "performing getfacl-noacl..."
262 run_rmtacl_subtest getfacl-noacl || error "getfacl-noacl"
263 echo "performing misc..."
264 run_rmtacl_subtest misc || error "misc"
265 echo "performing permissions..."
266 run_rmtacl_subtest permissions || error "permissions"
267 echo "performing setfacl..."
268 run_rmtacl_subtest setfacl || error "setfacl"
270 # inheritance test got from HP
271 echo "performing inheritance..."
272 cp $SAVE_PWD/rmtacl/make-tree .
274 run_rmtacl_subtest inheritance || error "inheritance"
280 do_facet $SINGLEMDS "rm -f $PERM_CONF"
281 do_facet $SINGLEMDS "lctl set_param -n $IDENTITY_FLUSH=-1"
283 run_test 2 "rmtacl ============================="
285 # bug 3285 - supplementary group should always succeed.
286 # NB: the supplementary groups are set for local client only,
287 # as for remote client, the groups of the specified uid on MDT
288 # will be obtained by upcall /sbin/l_getidentity and used.
290 local server_version=$(lustre_version_code $SINGLEMDS)
292 [[ $server_version -ge $(version_code 2.6.93) ]] ||
293 [[ $server_version -ge $(version_code 2.5.35) &&
294 $server_version -lt $(version_code 2.5.50) ]] ||
295 { skip "Need MDS version at least 2.6.93 or 2.5.35"; return; }
297 if [ "$CLIENT_TYPE" = "remote" ]; then
298 do_facet $SINGLEMDS "echo '* 0 rmtown' > $PERM_CONF"
299 do_facet $SINGLEMDS "lctl set_param -n $IDENTITY_FLUSH=-1"
304 chmod 0771 $DIR/$tdir
305 chgrp $ID0 $DIR/$tdir
306 $RUNAS_CMD -u $ID0 ls $DIR/$tdir || error "setgroups (1)"
307 if [ "$CLIENT_TYPE" = "local" ]; then
308 do_facet $SINGLEMDS "echo '* $ID1 setgrp' > $PERM_CONF"
309 do_facet $SINGLEMDS "lctl set_param -n $IDENTITY_FLUSH=-1"
310 $RUNAS_CMD -u $ID1 -G1,2,$ID0 ls $DIR/$tdir ||
311 error "setgroups (2)"
313 $RUNAS_CMD -u $ID1 -G1,2 ls $DIR/$tdir && error "setgroups (3)"
316 do_facet $SINGLEMDS "rm -f $PERM_CONF"
317 do_facet $SINGLEMDS "lctl set_param -n $IDENTITY_FLUSH=-1"
319 run_test 4 "set supplementary group ==============="
326 squash_id default 99 0
327 squash_id default 99 1
328 for (( i = 0; i < NODEMAP_COUNT; i++ )); do
329 local csum=${HOSTNAME_CHECKSUM}_${i}
331 if ! do_facet mgs $LCTL nodemap_add $csum; then
335 out=$(do_facet mgs $LCTL get_param nodemap.$csum.id)
336 ## This needs to return zero if the following statement is 1
337 [[ $(echo $out | grep -c $csum) == 0 ]] && return 1
346 for ((i = 0; i < NODEMAP_COUNT; i++)); do
347 local csum=${HOSTNAME_CHECKSUM}_${i}
349 if ! do_facet mgs $LCTL nodemap_del $csum; then
350 error "nodemap_del $csum failed with $?"
354 out=$(do_facet mgs $LCTL get_param nodemap.$csum.id)
355 [[ $(echo $out | grep -c $csum) != 0 ]] && return 1
362 local cmd="$LCTL nodemap_add_range"
366 for ((j = 0; j < NODEMAP_RANGE_COUNT; j++)); do
367 range="$SUBNET_CHECKSUM.${2}.${j}.[1-253]@tcp"
368 if ! do_facet mgs $cmd --name $1 --range $range; then
377 local cmd="$LCTL nodemap_del_range"
381 for ((j = 0; j < NODEMAP_RANGE_COUNT; j++)); do
382 range="$SUBNET_CHECKSUM.${2}.${j}.[1-253]@tcp"
383 if ! do_facet mgs $cmd --name $1 --range $range; then
393 local cmd="$LCTL nodemap_add_idmap"
396 for ((i = 0; i < NODEMAP_COUNT; i++)); do
399 for ((j = 500; j < NODEMAP_MAX_ID; j++)); do
400 local csum=${HOSTNAME_CHECKSUM}_${i}
402 local fs_id=$((j + 1))
404 if ! do_facet mgs $cmd --name $csum --idtype uid \
405 --idmap $client_id:$fs_id; then
408 if ! do_facet mgs $cmd --name $csum --idtype gid \
409 --idmap $client_id:$fs_id; then
420 local cmd="$LCTL nodemap_del_idmap"
423 for ((i = 0; i < NODEMAP_COUNT; i++)); do
426 for ((j = 500; j < NODEMAP_MAX_ID; j++)); do
427 local csum=${HOSTNAME_CHECKSUM}_${i}
429 local fs_id=$((j + 1))
431 if ! do_facet mgs $cmd --name $csum --idtype uid \
432 --idmap $client_id:$fs_id; then
435 if ! do_facet mgs $cmd --name $csum --idtype gid \
436 --idmap $client_id:$fs_id; then
449 local cmd="$LCTL nodemap_modify"
452 proc[0]="admin_nodemap"
453 proc[1]="trusted_nodemap"
457 for ((idx = 0; idx < 2; idx++)); do
458 if ! do_facet mgs $cmd --name $1 --property ${option[$idx]} \
463 if ! do_facet mgs $cmd --name $1 --property ${option[$idx]} \
475 cmd[0]="$LCTL nodemap_modify --property squash_uid"
476 cmd[1]="$LCTL nodemap_modify --property squash_gid"
478 if ! do_facet mgs ${cmd[$3]} --name $1 --value $2; then
483 # ensure that the squash defaults are the expected defaults
484 squash_id default 99 0
485 squash_id default 99 1
490 cmd="$LCTL nodemap_test_nid"
492 nid=$(do_facet mgs $cmd $1)
494 if [ $nid == $2 ]; then
503 local cmd="$LCTL nodemap_test_id"
506 ## nodemap deactivated
507 if ! do_facet mgs $LCTL nodemap_activate 0; then
510 for ((id = 500; id < NODEMAP_MAX_ID; id++)); do
513 for ((j = 0; j < NODEMAP_RANGE_COUNT; j++)); do
514 local nid="$SUBNET_CHECKSUM.0.${j}.100@tcp"
515 local fs_id=$(do_facet mgs $cmd --nid $nid \
516 --idtype uid --id $id)
517 if [ $fs_id != $id ]; then
518 echo "expected $id, got $fs_id"
525 if ! do_facet mgs $LCTL nodemap_activate 1; then
529 for ((id = 500; id < NODEMAP_MAX_ID; id++)); do
530 for ((j = 0; j < NODEMAP_RANGE_COUNT; j++)); do
531 nid="$SUBNET_CHECKSUM.0.${j}.100@tcp"
532 fs_id=$(do_facet mgs $cmd --nid $nid \
533 --idtype uid --id $id)
534 expected_id=$((id + 1))
535 if [ $fs_id != $expected_id ]; then
536 echo "expected $expected_id, got $fs_id"
543 for ((i = 0; i < NODEMAP_COUNT; i++)); do
544 local csum=${HOSTNAME_CHECKSUM}_${i}
546 if ! do_facet mgs $LCTL nodemap_modify --name $csum \
547 --property trusted --value 1; then
548 error "nodemap_modify $csum failed with $?"
553 for ((id = 500; id < NODEMAP_MAX_ID; id++)); do
554 for ((j = 0; j < NODEMAP_RANGE_COUNT; j++)); do
555 nid="$SUBNET_CHECKSUM.0.${j}.100@tcp"
556 fs_id=$(do_facet mgs $cmd --nid $nid \
557 --idtype uid --id $id)
558 if [ $fs_id != $id ]; then
559 echo "expected $id, got $fs_id"
565 ## ensure allow_root_access is enabled
566 for ((i = 0; i < NODEMAP_COUNT; i++)); do
567 local csum=${HOSTNAME_CHECKSUM}_${i}
569 if ! do_facet mgs $LCTL nodemap_modify --name $csum \
570 --property admin --value 1; then
571 error "nodemap_modify $csum failed with $?"
576 ## check that root allowed
577 for ((j = 0; j < NODEMAP_RANGE_COUNT; j++)); do
578 nid="$SUBNET_CHECKSUM.0.${j}.100@tcp"
579 fs_id=$(do_facet mgs $cmd --nid $nid --idtype uid --id 0)
580 if [ $fs_id != 0 ]; then
581 echo "root allowed expected 0, got $fs_id"
586 ## ensure allow_root_access is disabled
587 for ((i = 0; i < NODEMAP_COUNT; i++)); do
588 local csum=${HOSTNAME_CHECKSUM}_${i}
590 if ! do_facet mgs $LCTL nodemap_modify --name $csum \
591 --property admin --value 0; then
592 error "nodemap_modify ${HOSTNAME_CHECKSUM}_${i} "
598 ## check that root is mapped to 99
599 for ((j = 0; j < NODEMAP_RANGE_COUNT; j++)); do
600 nid="$SUBNET_CHECKSUM.0.${j}.100@tcp"
601 fs_id=$(do_facet mgs $cmd --nid $nid --idtype uid --id 0)
602 if [ $fs_id != 99 ]; then
603 error "root squash expected 99, got $fs_id"
608 ## reset client trust to 0
609 for ((i = 0; i < NODEMAP_COUNT; i++)); do
610 if ! do_facet mgs $LCTL nodemap_modify \
611 --name ${HOSTNAME_CHECKSUM}_${i} \
612 --property trusted --value 0; then
613 error "nodemap_modify ${HOSTNAME_CHECKSUM}_${i} "
625 remote_mgs_nodsh && skip "remote MGS with nodsh" && return
626 [ $(lustre_version_code mgs) -lt $(version_code 2.5.53) ] &&
627 skip "No nodemap on $(lustre_build_version mgs) MGS < 2.5.53" &&
632 [[ $rc != 0 ]] && error "nodemap_add failed with $rc" && return 1
636 [[ $rc != 0 ]] && error "nodemap_add failed with $rc" && return 2
640 run_test 7 "nodemap create and delete"
645 remote_mgs_nodsh && skip "remote MGS with nodsh" && return
646 [ $(lustre_version_code mgs) -lt $(version_code 2.5.53) ] &&
647 skip "No nodemap on $(lustre_build_version mgs) MGS < 2.5.53" &&
654 [[ $rc != 0 ]] && error "nodemap_add failed with $rc" && return 1
660 [[ $rc == 0 ]] && error "duplicate nodemap_add allowed with $rc" &&
666 [[ $rc != 0 ]] && error "nodemap_add failed with $rc" && return 3
670 run_test 8 "nodemap reject duplicates"
676 remote_mgs_nodsh && skip "remote MGS with nodsh" && return
677 [ $(lustre_version_code mgs) -lt $(version_code 2.5.53) ] &&
678 skip "No nodemap on $(lustre_build_version mgs) MGS < 2.5.53" &&
684 [[ $rc != 0 ]] && error "nodemap_add failed with $rc" && return 1
687 for ((i = 0; i < NODEMAP_COUNT; i++)); do
688 if ! add_range ${HOSTNAME_CHECKSUM}_${i} $i; then
692 [[ $rc != 0 ]] && error "nodemap_add_range failed with $rc" && return 2
695 for ((i = 0; i < NODEMAP_COUNT; i++)); do
696 if ! delete_range ${HOSTNAME_CHECKSUM}_${i} $i; then
700 [[ $rc != 0 ]] && error "nodemap_del_range failed with $rc" && return 4
705 [[ $rc != 0 ]] && error "nodemap_add failed with $rc" && return 4
709 run_test 9 "nodemap range add"
714 remote_mgs_nodsh && skip "remote MGS with nodsh" && return
715 [ $(lustre_version_code mgs) -lt $(version_code 2.5.53) ] &&
716 skip "No nodemap on $(lustre_build_version mgs) MGS < 2.5.53" &&
722 [[ $rc != 0 ]] && error "nodemap_add failed with $rc" && return 1
725 for ((i = 0; i < NODEMAP_COUNT; i++)); do
726 if ! add_range ${HOSTNAME_CHECKSUM}_${i} $i; then
730 [[ $rc != 0 ]] && error "nodemap_add_range failed with $rc" && return 2
733 for ((i = 0; i < NODEMAP_COUNT; i++)); do
734 if ! add_range ${HOSTNAME_CHECKSUM}_${i} $i; then
738 [[ $rc == 0 ]] && error "nodemap_add_range duplicate add with $rc" &&
743 for ((i = 0; i < NODEMAP_COUNT; i++)); do
744 if ! delete_range ${HOSTNAME_CHECKSUM}_${i} $i; then
748 [[ $rc != 0 ]] && error "nodemap_del_range failed with $rc" && return 4
752 [[ $rc != 0 ]] && error "nodemap_add failed with $rc" && return 5
756 run_test 10 "nodemap reject duplicate ranges"
761 remote_mgs_nodsh && skip "remote MGS with nodsh" && return
762 [ $(lustre_version_code mgs) -lt $(version_code 2.5.53) ] &&
763 skip "No nodemap on $(lustre_build_version mgs) MGS < 2.5.53" &&
769 [[ $rc != 0 ]] && error "nodemap_add failed with $rc" && return 1
772 for ((i = 0; i < NODEMAP_COUNT; i++)); do
773 if ! modify_flags ${HOSTNAME_CHECKSUM}_${i}; then
777 [[ $rc != 0 ]] && error "nodemap_modify with $rc" && return 2
782 [[ $rc != 0 ]] && error "nodemap_del failed with $rc" && return 3
786 run_test 11 "nodemap modify"
791 remote_mgs_nodsh && skip "remote MGS with nodsh" && return
792 [ $(lustre_version_code mgs) -lt $(version_code 2.5.53) ] &&
793 skip "No nodemap on $(lustre_build_version mgs) MGS < 2.5.53" &&
799 [[ $rc != 0 ]] && error "nodemap_add failed with $rc" && return 1
802 for ((i = 0; i < NODEMAP_COUNT; i++)); do
803 if ! squash_id ${HOSTNAME_CHECKSUM}_${i} 88 0; then
807 [[ $rc != 0 ]] && error "nodemap squash_uid with $rc" && return 2
810 for ((i = 0; i < NODEMAP_COUNT; i++)); do
811 if ! squash_id ${HOSTNAME_CHECKSUM}_${i} 88 1; then
815 [[ $rc != 0 ]] && error "nodemap squash_gid with $rc" && return 3
820 [[ $rc != 0 ]] && error "nodemap_del failed with $rc" && return 4
824 run_test 12 "nodemap set squash ids"
829 remote_mgs_nodsh && skip "remote MGS with nodsh" && return
830 [ $(lustre_version_code mgs) -lt $(version_code 2.5.53) ] &&
831 skip "No nodemap on $(lustre_build_version mgs) MGS < 2.5.53" &&
837 [[ $rc != 0 ]] && error "nodemap_add failed with $rc" && return 1
840 for ((i = 0; i < NODEMAP_COUNT; i++)); do
841 if ! add_range ${HOSTNAME_CHECKSUM}_${i} $i; then
845 [[ $rc != 0 ]] && error "nodemap_add_range failed with $rc" && return 2
848 for ((i = 0; i < NODEMAP_COUNT; i++)); do
849 for ((j = 0; j < NODEMAP_RANGE_COUNT; j++)); do
850 for k in $NODEMAP_IPADDR_LIST; do
851 if ! test_nid $SUBNET_CHECKSUM.$i.$j.$k \
852 ${HOSTNAME_CHECKSUM}_${i}; then
858 [[ $rc != 0 ]] && error "nodemap_test_nid failed with $rc" && return 3
863 [[ $rc != 0 ]] && error "nodemap_del failed with $rc" && return 4
867 run_test 13 "test nids"
872 remote_mgs_nodsh && skip "remote MGS with nodsh" && return
873 [ $(lustre_version_code mgs) -lt $(version_code 2.5.53) ] &&
874 skip "No nodemap on $(lustre_build_version mgs) MGS < 2.5.53" &&
880 [[ $rc != 0 ]] && error "nodemap_add failed with $rc" && return 1
883 for ((i = 0; i < NODEMAP_COUNT; i++)); do
884 for ((j = 0; j < NODEMAP_RANGE_COUNT; j++)); do
885 for k in $NODEMAP_IPADDR_LIST; do
886 if ! test_nid $SUBNET_CHECKSUM.$i.$j.$k \
893 [[ $rc != 0 ]] && error "nodemap_test_nid failed with $rc" && return 3
898 [[ $rc != 0 ]] && error "nodemap_del failed with $rc" && return 4
902 run_test 14 "test default nodemap nid lookup"
907 remote_mgs_nodsh && skip "remote MGS with nodsh" && return
908 [ $(lustre_version_code mgs) -lt $(version_code 2.5.53) ] &&
909 skip "No nodemap on $(lustre_build_version mgs) MGS < 2.5.53" &&
915 [[ $rc != 0 ]] && error "nodemap_add failed with $rc" && return 1
918 for ((i = 0; i < NODEMAP_COUNT; i++)); do
919 if ! add_range ${HOSTNAME_CHECKSUM}_${i} $i; then
923 [[ $rc != 0 ]] && error "nodemap_add_range failed with $rc" && return 2
928 [[ $rc != 0 ]] && error "nodemap_add_idmap failed with $rc" && return 3
933 [[ $rc != 0 ]] && error "nodemap_test_id failed with $rc" && return 4
938 [[ $rc != 0 ]] && error "nodemap_del_idmap failed with $rc" && return 5
943 [[ $rc != 0 ]] && error "nodemap_delete failed with $rc" && return 6
947 run_test 15 "test id mapping"
949 # Until nodemaps are distributed by MGS, they need to be distributed manually
950 # This function and all calls to it should be removed once the MGS distributes
951 # nodemaps to the MDS and OSS nodes directly.
952 do_servers_not_mgs() {
953 local mgs_ip=$(host_nids_address $mgs_HOST $NETTYPE)
954 for node in $(all_server_nodes); do
955 local node_ip=$(host_nids_address $node $NETTYPE)
956 [ $node_ip == $mgs_ip ] && continue
961 create_fops_nodemaps() {
964 for client in $clients; do
965 local client_ip=$(host_nids_address $client $NETTYPE)
966 local client_nid=$(h2$NETTYPE $client_ip)
967 do_facet mgs $LCTL nodemap_add c${i} || return 1
968 do_facet mgs $LCTL nodemap_add_range \
969 --name c${i} --range $client_nid || return 1
970 do_servers_not_mgs $LCTL set_param nodemap.add_nodemap=c${i} ||
972 do_servers_not_mgs "$LCTL set_param " \
973 "nodemap.add_nodemap_range='c${i} $client_nid'" ||
975 for map in ${FOPS_IDMAPS[i]}; do
976 do_facet mgs $LCTL nodemap_add_idmap --name c${i} \
977 --idtype uid --idmap ${map} || return 1
978 do_servers_not_mgs "$LCTL set_param " \
979 "nodemap.add_nodemap_idmap='c$i uid ${map}'" ||
981 do_facet mgs $LCTL nodemap_add_idmap --name c${i} \
982 --idtype gid --idmap ${map} || return 1
983 do_servers_not_mgs "$LCTL set_param " \
984 " nodemap.add_nodemap_idmap='c$i gid ${map}'" ||
987 out1=$(do_facet mgs $LCTL get_param nodemap.c${i}.idmap)
988 out2=$(do_facet ost0 $LCTL get_param nodemap.c${i}.idmap)
989 [ "$out1" != "$out2" ] && error "mgs and oss maps mismatch"
995 delete_fops_nodemaps() {
998 for client in $clients; do
999 do_facet mgs $LCTL nodemap_del c${i} || return 1
1000 do_servers_not_mgs $LCTL set_param nodemap.remove_nodemap=c$i ||
1009 if [ $MDSCOUNT -le 1 ]; then
1010 do_node ${clients_arr[0]} mkdir -p $DIR/$tdir
1012 # round-robin MDTs to test DNE nodemap support
1013 [ ! -d $DIR ] && do_node ${clients_arr[0]} mkdir -p $DIR
1014 do_node ${clients_arr[0]} $LFS setdirstripe -c 1 -i \
1015 $((fops_mds_index % MDSCOUNT)) $DIR/$tdir
1016 ((fops_mds_index++))
1020 # acl test directory needs to be initialized on a privileged client
1022 local admin=$(do_facet mgs $LCTL get_param -n nodemap.c0.admin_nodemap)
1023 local trust=$(do_facet mgs $LCTL get_param -n \
1024 nodemap.c0.trusted_nodemap)
1026 do_facet mgs $LCTL nodemap_modify --name c0 --property admin --value 1
1027 do_facet mgs $LCTL nodemap_modify --name c0 --property trusted --value 1
1028 do_servers_not_mgs $LCTL set_param nodemap.c0.admin_nodemap=1
1029 do_servers_not_mgs $LCTL set_param nodemap.c0.trusted_nodemap=1
1031 do_node ${clients_arr[0]} rm -rf $DIR/$tdir
1033 do_node ${clients_arr[0]} chown $user $DIR/$tdir
1035 do_facet mgs $LCTL nodemap_modify --name c0 \
1036 --property admin --value $admin
1037 do_facet mgs $LCTL nodemap_modify --name c0 \
1038 --property trusted --value $trust
1039 do_servers_not_mgs $LCTL set_param nodemap.c0.admin_nodemap=$admin
1040 do_servers_not_mgs $LCTL set_param nodemap.c0.trusted_nodemap=$trust
1042 # flush MDT locks to make sure they are reacquired before test
1043 do_node ${clients_arr[0]} $LCTL set_param \
1044 ldlm.namespaces.$FSNAME-MDT*.lru_size=clear
1047 do_create_delete() {
1050 local testfile=$DIR/$tdir/$tfile
1054 if $run_u touch $testfile >& /dev/null; then
1056 $run_u rm $testfile && d=1
1060 local expected=$(get_cr_del_expected $key)
1061 [ "$res" != "$expected" ] &&
1062 error "test $key, wanted $expected, got $res" && rc=$((rc + 1))
1066 nodemap_check_quota() {
1068 $run_u lfs quota -q $DIR | awk '{ print $2; exit; }'
1071 do_fops_quota_test() {
1073 # fuzz quota used to account for possible indirect blocks, etc
1074 local quota_fuzz=$(fs_log_size)
1075 local qused_orig=$(nodemap_check_quota "$run_u")
1076 local qused_high=$((qused_orig + quota_fuzz))
1077 local qused_low=$((qused_orig - quota_fuzz))
1078 local testfile=$DIR/$tdir/$tfile
1079 chmod 777 $DIR/$tdir
1080 $run_u dd if=/dev/zero of=$testfile bs=1M count=1 >& /dev/null
1081 sync; sync_all_data || true
1083 local qused_new=$(nodemap_check_quota "$run_u")
1084 [ $((qused_new)) -lt $((qused_low + 1024)) -o \
1085 $((qused_new)) -gt $((qused_high + 1024)) ] &&
1086 error "$qused_new != $qused_orig + 1M after write, " \
1087 "fuzz is $quota_fuzz"
1088 $run_u rm $testfile && d=1
1089 $NODEMAP_TEST_QUOTA && wait_delete_completed_mds
1091 qused_new=$(nodemap_check_quota "$run_u")
1092 [ $((qused_new)) -lt $((qused_low)) \
1093 -o $((qused_new)) -gt $((qused_high)) ] &&
1094 error "quota not reclaimed, expect $qused_orig, " \
1095 "got $qused_new, fuzz $quota_fuzz"
1098 get_fops_mapped_user() {
1101 for ((i=0; i < ${#FOPS_IDMAPS[@]}; i++)); do
1102 for map in ${FOPS_IDMAPS[i]}; do
1103 if [ $(cut -d: -f1 <<< "$map") == $cli_user ]; then
1104 cut -d: -f2 <<< "$map"
1112 get_cr_del_expected() {
1114 IFS=":" read -a key <<< "$1"
1115 local mapmode="${key[0]}"
1116 local mds_user="${key[1]}"
1117 local cluster="${key[2]}"
1118 local cli_user="${key[3]}"
1119 local mode="0${key[4]}"
1126 [[ $mapmode == *mapped* ]] && mapped=1
1127 # only c1 is mapped in these test cases
1128 [[ $mapmode == mapped_trusted* ]] && [ "$cluster" == "c0" ] && mapped=0
1129 [[ $mapmode == *noadmin* ]] && noadmin=1
1131 # o+wx works as long as the user isn't mapped
1132 if [ $((mode & 3)) -eq 3 ]; then
1136 # if client user is root, check if root is squashed
1137 if [ "$cli_user" == "0" ]; then
1138 # squash root succeed, if other bit is on
1141 1) [ "$other" == "1" ] && echo $SUCCESS
1142 [ "$other" == "0" ] && echo $FAILURE;;
1146 if [ "$mapped" == "0" ]; then
1147 [ "$other" == "1" ] && echo $SUCCESS
1148 [ "$other" == "0" ] && echo $FAILURE
1152 # if mapped user is mds user, check for u+wx
1153 mapped_user=$(get_fops_mapped_user $cli_user)
1154 [ "$mapped_user" == "-1" ] &&
1155 error "unable to find mapping for client user $cli_user"
1157 if [ "$mapped_user" == "$mds_user" -a \
1158 $(((mode & 0300) == 0300)) -eq 1 ]; then
1162 if [ "$mapped_user" != "$mds_user" -a "$other" == "1" ]; then
1171 local single_client="$2"
1172 local client_user_list=([0]="0 $((IDBASE+3)) $((IDBASE+4))"
1173 [1]="0 $((IDBASE+5)) $((IDBASE+6))")
1176 local perm_bit_list="0 3 $((0300)) $((0303))"
1177 # SLOW tests 000-007, 010-070, 100-700 (octal modes)
1178 [ "$SLOW" == "yes" ] &&
1179 perm_bit_list="0 $(seq 1 7) $(seq 8 8 63) $(seq 64 64 511) \
1182 # step through mds users. -1 means root
1183 for mds_i in -1 0 1 2; do
1184 local user=$((mds_i + IDBASE))
1188 [ "$mds_i" == "-1" ] && user=0
1190 echo mkdir -p $DIR/$tdir
1193 for client in $clients; do
1195 local admin=$(do_facet mgs $LCTL get_param -n \
1196 nodemap.c$cli_i.admin_nodemap)
1197 for u in ${client_user_list[$cli_i]}; do
1198 local run_u="do_node $client \
1199 $RUNAS_CMD -u$u -g$u -G$u"
1200 for perm_bits in $perm_bit_list; do
1201 local mode=$(printf %03o $perm_bits)
1203 key="$mapmode:$user:c$cli_i:$u:$mode"
1204 do_facet mgs $LCTL nodemap_modify \
1208 do_servers_not_mgs $LCTL set_param \
1209 nodemap.c$cli_i.admin_nodemap=1
1210 do_node $client chmod $mode $DIR/$tdir \
1211 || error unable to chmod $key
1212 do_facet mgs $LCTL nodemap_modify \
1216 do_servers_not_mgs $LCTL set_param \
1217 nodemap.c$cli_i.admin_nodemap=$admin
1219 do_create_delete "$run_u" "$key"
1223 do_fops_quota_test "$run_u"
1226 cli_i=$((cli_i + 1))
1227 [ "$single_client" == "1" ] && break
1234 nodemap_version_check () {
1235 remote_mgs_nodsh && skip "remote MGS with nodsh" && return 1
1236 [ $(lustre_version_code mgs) -lt $(version_code 2.5.53) ] &&
1237 skip "No nodemap on $(lustre_build_version mgs) MGS < 2.5.53" &&
1242 nodemap_test_setup() {
1244 local active_nodemap=$1
1246 do_nodes $(comma_list $(all_mdts_nodes)) \
1247 $LCTL set_param mdt.*.identity_upcall=NONE
1250 create_fops_nodemaps
1252 [[ $rc != 0 ]] && error "adding fops nodemaps failed $rc"
1254 if [ "$active_nodemap" == "0" ]; then
1255 do_facet mgs $LCTL set_param nodemap.active=0
1256 do_servers_not_mgs $LCTL set_param nodemap.active=0
1260 do_facet mgs $LCTL nodemap_activate 1
1261 do_servers_not_mgs $LCTL set_param nodemap.active=1
1262 do_facet mgs $LCTL nodemap_modify --name default \
1263 --property admin --value 1
1264 do_facet mgs $LCTL nodemap_modify --name default \
1265 --property trusted --value 1
1266 do_servers_not_mgs $LCTL set_param nodemap.default.admin_nodemap=1
1267 do_servers_not_mgs $LCTL set_param nodemap.default.trusted_nodemap=1
1270 nodemap_test_cleanup() {
1272 delete_fops_nodemaps
1274 [[ $rc != 0 ]] && error "removing fops nodemaps failed $rc"
1279 nodemap_clients_admin_trusted() {
1283 for client in $clients; do
1284 do_facet mgs $LCTL nodemap_modify --name c0 \
1285 --property admin --value $admin
1286 do_servers_not_mgs $LCTL set_param \
1287 nodemap.c${i}.admin_nodemap=$admin
1288 do_facet mgs $LCTL nodemap_modify --name c0 \
1289 --property trusted --value $tr
1290 do_servers_not_mgs $LCTL set_param \
1291 nodemap.c${i}.trusted_nodemap=$tr
1297 nodemap_version_check || return 0
1298 nodemap_test_setup 0
1300 trap nodemap_test_cleanup EXIT
1302 nodemap_test_cleanup
1304 run_test 16 "test nodemap all_off fileops"
1307 nodemap_version_check || return 0
1310 trap nodemap_test_cleanup EXIT
1311 nodemap_clients_admin_trusted 0 1
1312 test_fops trusted_noadmin 1
1313 nodemap_test_cleanup
1315 run_test 17 "test nodemap trusted_noadmin fileops"
1318 nodemap_version_check || return 0
1321 trap nodemap_test_cleanup EXIT
1322 nodemap_clients_admin_trusted 0 0
1323 test_fops mapped_noadmin 1
1324 nodemap_test_cleanup
1326 run_test 18 "test nodemap mapped_noadmin fileops"
1329 nodemap_version_check || return 0
1332 trap nodemap_test_cleanup EXIT
1333 nodemap_clients_admin_trusted 1 1
1334 test_fops trusted_admin 1
1335 nodemap_test_cleanup
1337 run_test 19 "test nodemap trusted_admin fileops"
1340 nodemap_version_check || return 0
1343 trap nodemap_test_cleanup EXIT
1344 nodemap_clients_admin_trusted 1 0
1345 test_fops mapped_admin 1
1346 nodemap_test_cleanup
1348 run_test 20 "test nodemap mapped_admin fileops"
1351 nodemap_version_check || return 0
1354 trap nodemap_test_cleanup EXIT
1357 for client in $clients; do
1358 do_facet mgs $LCTL nodemap_modify --name c${i} \
1359 --property admin --value 0
1360 do_facet mgs $LCTL nodemap_modify --name c${i} \
1361 --property trusted --value $x
1362 do_servers_not_mgs $LCTL set_param \
1363 nodemap.c${i}.admin_nodemap=0
1364 do_servers_not_mgs $LCTL set_param \
1365 nodemap.c${i}.trusted_nodemap=$x
1369 test_fops mapped_trusted_noadmin
1370 nodemap_test_cleanup
1372 run_test 21 "test nodemap mapped_trusted_noadmin fileops"
1375 nodemap_version_check || return 0
1378 trap nodemap_test_cleanup EXIT
1381 for client in $clients; do
1382 do_facet mgs $LCTL nodemap_modify --name c${i} \
1383 --property admin --value 1
1384 do_facet mgs $LCTL nodemap_modify --name c${i} \
1385 --property trusted --value $x
1386 do_servers_not_mgs $LCTL set_param \
1387 nodemap.c${i}.admin_nodemap=1
1388 do_servers_not_mgs $LCTL set_param \
1389 nodemap.c${i}.trusted_nodemap=$x
1393 test_fops mapped_trusted_admin
1394 nodemap_test_cleanup
1396 run_test 22 "test nodemap mapped_trusted_admin fileops"
1398 # acl test directory needs to be initialized on a privileged client
1399 nodemap_acl_test_setup() {
1400 local admin=$(do_facet mgs $LCTL get_param -n nodemap.c0.admin_nodemap)
1401 local trust=$(do_facet mgs $LCTL get_param -n \
1402 nodemap.c0.trusted_nodemap)
1404 do_facet mgs $LCTL nodemap_modify --name c0 --property admin --value 1
1405 do_facet mgs $LCTL nodemap_modify --name c0 --property trusted --value 1
1406 do_servers_not_mgs $LCTL set_param nodemap.c0.admin_nodemap=1
1407 do_servers_not_mgs $LCTL set_param nodemap.c0.trusted_nodemap=1
1409 do_node ${clients_arr[0]} rm -rf $DIR/$tdir
1411 do_node ${clients_arr[0]} chmod a+rwx $DIR/$tdir ||
1412 error unable to chmod a+rwx test dir $DIR/$tdir
1414 do_facet mgs $LCTL nodemap_modify --name c0 \
1415 --property admin --value $admin
1416 do_facet mgs $LCTL nodemap_modify --name c0 \
1417 --property trusted --value $trust
1418 do_servers_not_mgs $LCTL set_param nodemap.c0.admin_nodemap=$admin
1419 do_servers_not_mgs $LCTL set_param nodemap.c0.trusted_nodemap=$trust
1423 # returns 0 if the number of ACLs does not change on the second (mapped) client
1424 # after being set on the first client
1425 nodemap_acl_test() {
1427 local set_client="$2"
1428 local get_client="$3"
1429 local check_setfacl="$4"
1430 local setfacl_error=0
1431 local testfile=$DIR/$tdir/$tfile
1432 local RUNAS_USER="$RUNAS_CMD -u $user"
1434 local acl_count_post=0
1436 nodemap_acl_test_setup
1439 do_node $set_client $RUNAS_USER touch $testfile
1441 # ACL masks aren't filtered by nodemap code, so we ignore them
1442 acl_count=$(do_node $get_client getfacl $testfile | grep -v mask |
1444 do_node $set_client $RUNAS_USER setfacl -m $user:rwx $testfile ||
1447 # if check setfacl is set to 1, then it's supposed to error
1448 if [ "$check_setfacl" == "1" ]; then
1449 [ "$setfacl_error" != "1" ] && return 1
1452 [ "$setfacl_error" == "1" ] && echo "WARNING: unable to setfacl"
1454 acl_count_post=$(do_node $get_client getfacl $testfile | grep -v mask |
1456 [ $acl_count -eq $acl_count_post ] && return 0
1461 nodemap_version_check || return 0
1464 trap nodemap_test_cleanup EXIT
1465 # 1 trusted cluster, 1 mapped cluster
1466 local unmapped_fs=$((IDBASE+0))
1467 local unmapped_c1=$((IDBASE+5))
1468 local mapped_fs=$((IDBASE+2))
1469 local mapped_c0=$((IDBASE+4))
1470 local mapped_c1=$((IDBASE+6))
1472 do_facet mgs $LCTL nodemap_modify --name c0 --property admin --value 1
1473 do_facet mgs $LCTL nodemap_modify --name c0 --property trusted --value 1
1474 do_servers_not_mgs $LCTL set_param nodemap.c0.admin_nodemap=1
1475 do_servers_not_mgs $LCTL set_param nodemap.c0.trusted_nodemap=1
1477 do_facet mgs $LCTL nodemap_modify --name c1 --property admin --value 0
1478 do_facet mgs $LCTL nodemap_modify --name c1 --property trusted --value 0
1479 do_servers_not_mgs $LCTL set_param nodemap.c1.admin_nodemap=0
1480 do_servers_not_mgs $LCTL set_param nodemap.c1.trusted_nodemap=0
1482 # setfacl on trusted cluster to unmapped user, verify it's not seen
1483 nodemap_acl_test $unmapped_fs ${clients_arr[0]} ${clients_arr[1]} ||
1484 error "acl count (1)"
1486 # setfacl on trusted cluster to mapped user, verify it's seen
1487 nodemap_acl_test $mapped_fs ${clients_arr[0]} ${clients_arr[1]} &&
1488 error "acl count (2)"
1490 # setfacl on mapped cluster to mapped user, verify it's seen
1491 nodemap_acl_test $mapped_c1 ${clients_arr[1]} ${clients_arr[0]} &&
1492 error "acl count (3)"
1494 # setfacl on mapped cluster to unmapped user, verify error
1495 nodemap_acl_test $unmapped_fs ${clients_arr[1]} ${clients_arr[0]} 1 ||
1496 error "acl count (4)"
1499 do_facet mgs $LCTL nodemap_modify --name c0 --property admin --value 0
1500 do_facet mgs $LCTL nodemap_modify --name c0 --property trusted --value 0
1501 do_servers_not_mgs $LCTL set_param nodemap.c0.admin_nodemap=0
1502 do_servers_not_mgs $LCTL set_param nodemap.c0.trusted_nodemap=0
1504 # setfacl to mapped user on c1, also mapped to c0, verify it's seen
1505 nodemap_acl_test $mapped_c1 ${clients_arr[1]} ${clients_arr[0]} &&
1506 error "acl count (5)"
1508 # setfacl to mapped user on c1, not mapped to c0, verify not seen
1509 nodemap_acl_test $unmapped_c1 ${clients_arr[1]} ${clients_arr[0]} ||
1510 error "acl count (6)"
1512 nodemap_test_cleanup
1514 run_test 23 "test mapped ACLs"
1519 trap nodemap_test_cleanup EXIT
1520 do_nodes $(comma_list $(all_server_nodes)) $LCTL get_param -R nodemap ||
1521 error "proc readable file read failed"
1523 nodemap_test_cleanup
1525 run_test 24 "check nodemap proc files for LBUGs and Oopses"
1528 nodemap_version_check || return 0
1531 trap nodemap_test_cleanup EXIT
1532 local tmpfile=$(mktemp)
1533 do_facet mgs $LCTL nodemap_info > $tmpfile
1534 cleanup_and_setup_lustre
1535 diff -q <(do_facet mgs $LCTL nodemap_info) $tmpfile >& /dev/null ||
1536 error "nodemap_info diff after remount"
1538 nodemap_test_cleanup
1541 run_test 25 "test save and reload nodemap config"
1544 nodemap_version_check || return 0
1548 for ((i = 0; i < large_i; i++)); do
1549 ((i % 1000 == 0)) && echo $i
1550 do_facet mgs $LCTL nodemap_add c$i ||
1551 error "cannot add nodemap $i to config"
1554 for ((i = 0; i < large_i; i++)); do
1555 ((i % 1000 == 0)) && echo $i
1556 do_facet mgs $LCTL nodemap_del c$i ||
1557 error "cannot delete nodemap $i from config"
1560 run_test 26 "test transferring very large nodemap"
1562 log "cleanup: ======================================================"
1565 ## nodemap deactivated
1566 do_facet mgs $LCTL nodemap_activate 0
1568 for num in $(seq $MDSCOUNT); do
1569 if [ "${identity_old[$num]}" = 1 ]; then
1570 switch_identity $num false || identity_old[$num]=$?
1574 $RUNAS_CMD -u $ID0 ls $DIR
1575 $RUNAS_CMD -u $ID1 ls $DIR