diff options
| author | Kotresh HR <khiremat@redhat.com> | 2017-08-11 04:55:18 -0400 | 
|---|---|---|
| committer | Amar Tumballi <amarts@redhat.com> | 2018-01-05 07:08:10 +0000 | 
| commit | 60a992e69a7cf5a588f5139709d325125d6f04fb (patch) | |
| tree | d96c997f90174e7c0936b38aab5732cbef096e88 /geo-replication/src | |
| parent | 78d67da17356b48cf1d5a6595764650d5b200ba7 (diff) | |
tests: Enable geo-rep test cases
This patch re-enables the geo-rep test cases.
Along with it does following optimizations.
1. Use EXPECT_WITHIN instead of sleep
2. Clean up geo-rep ssh key after test
3. Changes to gverify.sh and S56glusterd-geo-rep-create-post.sh
   to use the given ssh identity file for geo-rep create
4. Make gluster-command-dir configurable and introduce
   slave-gluster-command-dir which points the parent directory
   of gluster binaries in master and slave respectively.
Change-Id: Ia7696278d9dd3ba04224dcd7c3564088ca970b04
BUG: 1480491
Signed-off-by: Kotresh HR <khiremat@redhat.com>
Diffstat (limited to 'geo-replication/src')
| -rwxr-xr-x | geo-replication/src/gverify.sh | 25 | 
1 files changed, 19 insertions, 6 deletions
diff --git a/geo-replication/src/gverify.sh b/geo-replication/src/gverify.sh index 9b1328aa631..8eae8469ff0 100755 --- a/geo-replication/src/gverify.sh +++ b/geo-replication/src/gverify.sh @@ -11,11 +11,19 @@ slave_log_file=`gluster --print-logdir`/geo-replication-slaves/slave.log  function SSHM()  { -    ssh -p ${SSH_PORT} -q \ -	-oPasswordAuthentication=no \ -	-oStrictHostKeyChecking=no \ -	-oControlMaster=yes \ -	"$@"; +    if [[ -z "${GR_SSH_IDENTITY_KEY}" ]]; then +        ssh -p ${SSH_PORT} -q \ +	    -oPasswordAuthentication=no \ +	    -oStrictHostKeyChecking=no \ +	    -oControlMaster=yes \ +	    "$@"; +    else +        ssh -p ${SSH_PORT} -i ${GR_SSH_IDENTITY_KEY} -q \ +	    -oPasswordAuthentication=no \ +	    -oStrictHostKeyChecking=no \ +	    -oControlMaster=yes \ +	    "$@"; +    fi  }  function get_inode_num() @@ -172,7 +180,12 @@ function main()          exit 1;      fi; -    ssh -p ${SSH_PORT} -oNumberOfPasswordPrompts=0 -oStrictHostKeyChecking=no $2@$3 "echo Testing_Passwordless_SSH"; +    if [[ -z "${GR_SSH_IDENTITY_KEY}" ]]; then +        ssh -p ${SSH_PORT} -oNumberOfPasswordPrompts=0 -oStrictHostKeyChecking=no $2@$3 "echo Testing_Passwordless_SSH"; +    else +        ssh -p ${SSH_PORT} -i ${GR_SSH_IDENTITY_KEY} -oNumberOfPasswordPrompts=0 -oStrictHostKeyChecking=no $2@$3 "echo Testing_Passwordless_SSH"; +    fi +      if [ $? -ne 0 ]; then          echo "FORCE_BLOCKER|Passwordless ssh login has not been setup with $3 for user $2." > $log_file          exit 1;  | 
