-
Notifications
You must be signed in to change notification settings - Fork 51
/
enterprise_backup_restore_base.py
3807 lines (3546 loc) · 193 KB
/
enterprise_backup_restore_base.py
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
863
864
865
866
867
868
869
870
871
872
873
874
875
876
877
878
879
880
881
882
883
884
885
886
887
888
889
890
891
892
893
894
895
896
897
898
899
900
901
902
903
904
905
906
907
908
909
910
911
912
913
914
915
916
917
918
919
920
921
922
923
924
925
926
927
928
929
930
931
932
933
934
935
936
937
938
939
940
941
942
943
944
945
946
947
948
949
950
951
952
953
954
955
956
957
958
959
960
961
962
963
964
965
966
967
968
969
970
971
972
973
974
975
976
977
978
979
980
981
982
983
984
985
986
987
988
989
990
991
992
993
994
995
996
997
998
999
1000
import copy
import os, shutil, ast, re, subprocess
import json
import urllib, datetime, time, random
from boto3 import s3, resource
from botocore.exceptions import ClientError
from basetestcase import BaseTestCase
from TestInput import TestInputSingleton, TestInputServer
from couchbase_helper.data_analysis_helper import DataCollector
from membase.helper.rebalance_helper import RebalanceHelper
from couchbase_helper.documentgenerator import BlobGenerator,DocumentGenerator
from ent_backup_restore.validation_helpers.backup_restore_validations \
import BackupRestoreValidations
from membase.helper.bucket_helper import BucketOperationHelper
from membase.helper.cluster_helper import ClusterOperationHelper
from remote.remote_util import RemoteMachineShellConnection
from membase.api.rest_client import RestHelper, RestConnection, \
Bucket as CBBucket
from couchbase_helper.document import View
from testconstants import LINUX_COUCHBASE_BIN_PATH,\
COUCHBASE_DATA_PATH, WIN_COUCHBASE_DATA_PATH_RAW,\
WIN_COUCHBASE_BIN_PATH_RAW, WIN_COUCHBASE_BIN_PATH, WIN_TMP_PATH_RAW,\
MAC_COUCHBASE_BIN_PATH, LINUX_ROOT_PATH, WIN_ROOT_PATH,\
WIN_TMP_PATH, STANDARD_BUCKET_PORT, WIN_CYGWIN_BIN_PATH
from testconstants import INDEX_QUOTA, FTS_QUOTA, COUCHBASE_FROM_MAD_HATTER,\
CLUSTER_QUOTA_RATIO
from security.rbac_base import RbacBase
from couchbase.bucket import Bucket
from lib.memcached.helper.data_helper import VBucketAwareMemcached, MemcachedClientHelper
from ent_backup_restore.provider.s3 import S3
SOURCE_CB_PARAMS = {
"authUser": "default",
"authPassword": "",
"authSaslUser": "",
"authSaslPassword": "",
"clusterManagerBackoffFactor": 0,
"clusterManagerSleepInitMS": 0,
"clusterManagerSleepMaxMS": 20000,
"dataManagerBackoffFactor": 0,
"dataManagerSleepInitMS": 0,
"dataManagerSleepMaxMS": 20000,
"feedBufferSizeBytes": 0,
"feedBufferAckThreshold": 0
}
INDEX_DEFINITION = {
"type": "fulltext-index",
"name": "",
"uuid": "",
"params": {},
"sourceType": "couchbase",
"sourceName": "default",
"sourceUUID": "",
"sourceParams": SOURCE_CB_PARAMS,
"planParams": {}
}
class EnterpriseBackupRestoreBase(BaseTestCase):
def setUp(self):
super(EnterpriseBackupRestoreBase, self).setUp()
""" from version 4.6.0 and later, --host flag is deprecated """
self.cluster_flag = "--host"
self.backupset = Backupset()
self.cmd_ext = ""
self.should_fail = self.input.param("should-fail", False)
self.restore_should_fail = self.input.param("restore_should_fail", False)
self.merge_should_fail = self.input.param("merge_should_fail", False)
self.database_path = COUCHBASE_DATA_PATH
cmd = 'curl -g {0}:8091/diag/eval -u {1}:{2} '.format(self.master.ip,
self.master.rest_username,
self.master.rest_password)
cmd += '-d "path_config:component_path(bin)."'
bin_path = subprocess.check_output(cmd, shell=True)
if not self.skip_init_check_cbserver:
if "bin" not in bin_path:
self.fail("Check if cb server install on %s" % self.master.ip)
else:
self.cli_command_location = bin_path.replace('"','') + "/"
self.debug_logs = self.input.param("debug-logs", False)
self.show_bk_list = self.input.param("show_bk_list", True)
self.vbuckets_filter_no_data = False
self.backupset.directory = self.input.param("dir", "/tmp/entbackup")
self.backupset.user_env = self.input.param("user-env", False)
self.backupset.passwd_env = self.input.param("passwd-env", False)
self.backupset.log_archive_env = self.input.param("log-archive-env", False)
self.backupset.log_redaction = self.input.param("log-redaction", False)
self.backupset.redaction_salt = self.input.param("redaction-salt", None)
self.backupset.no_log_output_flag = self.input.param("no-log-output-flag", False)
self.backupset.ex_logs_path = self.input.param("ex-logs-path", None)
self.backupset.overwrite_user_env = self.input.param("overwrite-user-env", False)
self.backupset.overwrite_passwd_env = self.input.param("overwrite-passwd-env", False)
self.replace_ttl_with = self.input.param("replace-ttl-with", None)
self.num_shards = self.input.param("num_shards", None)
self.multi_num_shards = self.input.param("multi_num_shards", False)
self.shards_action = self.input.param("shards_action", None)
self.bkrs_flag = self.input.param("bkrs_flag", None)
self.force_restart_erlang = self.input.param("force_restart_erlang", False)
self.force_restart_couchbase_server = \
self.input.param("force_restart_couchbase_server", False)
self.bk_with_ttl = self.input.param("bk-with-ttl", None)
self.backupset.user_env_with_prompt = \
self.input.param("user-env-with-prompt", False)
self.backupset.passwd_env_with_prompt = \
self.input.param("passwd-env-with-prompt", False)
self.backup_corrupted = False
shell = RemoteMachineShellConnection(self.servers[0])
info = shell.extract_remote_info().type.lower()
self.root_path = LINUX_ROOT_PATH
self.wget = "wget"
self.os_name = "linux"
self.tmp_path = "/tmp/"
self.long_help_flag = "--help"
self.short_help_flag = "-h"
self.cygwin_bin_path = ""
self.enable_firewal = False
self.rfc3339_date = "date +%s --date='{0} seconds' | ".format(self.replace_ttl_with) + \
"xargs -I {} date --date='@{}' --rfc-3339=seconds | "\
"sed 's/ /T/'"
self.seconds_with_ttl = "date +%s --date='{0} seconds'".format(self.replace_ttl_with)
if info == 'linux':
if self.nonroot:
base_path = "/home/%s" % self.master.ssh_username
self.database_path = "%s%s" % (base_path, COUCHBASE_DATA_PATH)
self.root_path = "/home/%s/" % self.master.ssh_username
elif info == 'windows':
self.os_name = "windows"
self.cmd_ext = ".exe"
self.wget = "/cygdrive/c/automation/wget.exe"
self.database_path = WIN_COUCHBASE_DATA_PATH_RAW
self.root_path = WIN_ROOT_PATH
self.tmp_path = WIN_TMP_PATH
self.long_help_flag = "help"
self.short_help_flag = "h"
self.cygwin_bin_path = WIN_CYGWIN_BIN_PATH
self.rfc3339_date = "date +%s --date='{0} seconds' | ".format(self.replace_ttl_with) + \
"{0}xargs -I {{}} date --date=\"@'{{}}'\" --rfc-3339=seconds | "\
.format(self.cygwin_bin_path) + \
"sed 's/ /T/'"
win_format = "C:/Program Files"
cygwin_format = "/cygdrive/c/Program\ Files"
if win_format in self.cli_command_location:
self.cli_command_location = self.cli_command_location.replace(win_format,
cygwin_format)
self.backupset.directory = self.input.param("dir", WIN_TMP_PATH_RAW + "entbackup")
elif info == 'mac':
self.backupset.directory = self.input.param("dir", "/tmp/entbackup")
else:
raise Exception("OS not supported.")
self.backup_validation_files_location = "/tmp/backuprestore" + self.master.ip
if self.input.bkrs_client is not None:
self.backupset.backup_host = self.input.bkrs_client
else:
self.backupset.backup_host = self.input.clusters[1][0]
self.backupset.directory += "_" + self.master.ip
self.backupset.name = self.input.param("name", "backup")
self.non_master_host = self.input.param("non-master", False)
self.compact_backup = self.input.param("compact-backup", False)
self.merged = self.input.param("merged", None)
self.expire_time = self.input.param('expire_time', 0)
self.after_upgrade_merged = self.input.param("after-upgrade-merged", False)
self.batch_size = self.input.param("batch_size", 1000)
self.create_gsi = self.input.param("create-gsi", False)
self.gsi_names = ["num1", "num2"]
self.enable_firewall = False
self.eventing_log_level = self.input.param('eventing_log_level', 'INFO')
self.timer_storage_chan_size = self.input.param('timer_storage_chan_size', 10000)
self.dcp_gen_chan_size = self.input.param('dcp_gen_chan_size', 10000)
self.is_sbm = self.input.param('source_bucket_mutation',False)
self.is_curl = self.input.param('curl',False)
self.print_eventing_handler_code_in_logs = self.input.param('print_eventing_handler_code_in_logs', True)
self.do_restore = self.input.param("do-restore", False)
self.do_verify = self.input.param("do-verify", False)
self.create_views = self.input.param("create-views", False)
self.create_fts_index = self.input.param("create-fts-index", False)
self.test_fts = self.input.param("test_fts", False)
self.cluster_new_user = self.input.param("new_user", None)
self.cluster_new_role = self.input.param("new_role", None)
self.new_replicas = self.input.param("new-replicas", None)
self.restore_only = self.input.param("restore-only", False)
self.replace_ttl = self.input.param("replace-ttl", None)
self.vbucket_filter = self.input.param("vbucket-filter", None)
self.restore_compression_mode = self.input.param("restore-compression-mode", None)
self.force_version_upgrade = self.input.param("force-version-upgrade", None)
if self.non_master_host:
self.backupset.cluster_host = self.servers[1]
self.backupset.cluster_host_username = self.servers[1].rest_username
self.backupset.cluster_host_password = self.servers[1].rest_password
else:
self.backupset.cluster_host = self.servers[0]
self.backupset.cluster_host_username = self.servers[0].rest_username
self.backupset.cluster_host_password = self.servers[0].rest_password
self.same_cluster = self.input.param("same-cluster", False)
self.reset_restore_cluster = self.input.param("reset-restore-cluster", True)
self.no_progress_bar = self.input.param("no-progress-bar", True)
self.multi_threads = self.input.param("multi_threads", False)
self.threads_count = self.input.param("threads_count", 1)
self.bucket_delete = self.input.param("bucket_delete", False)
self.bucket_flush = self.input.param("bucket_flush", False)
if self.same_cluster:
self.backupset.restore_cluster = self.servers
self.backupset.restore_cluster_host = self.servers[0]
self.backupset.restore_cluster_host_username = self.servers[0].rest_username
self.backupset.restore_cluster_host_password = self.servers[0].rest_password
else:
self.backupset.restore_cluster = self.input.clusters[0]
self.backupset.restore_cluster_host = self.input.clusters[0][0]
self.backupset.restore_cluster_host_username = self.input.clusters[0][0].rest_username
self.backupset.restore_cluster_host_password = self.input.clusters[0][0].rest_password
""" new user to test RBAC """
if self.cluster_new_user:
self.backupset.cluster_host_username = self.cluster_new_user
self.backupset.restore_cluster_host_username = self.cluster_new_user
""" Get cb version of cbm client from bkrs client server """
if self.backupset.current_bkrs_client_version is None:
self.backupset.current_bkrs_client_version = \
self._get_current_bkrs_client_version()
include_buckets = self.input.param("include-buckets", "")
include_buckets = include_buckets.split(",") if include_buckets else []
exclude_buckets = self.input.param("exclude-buckets", "")
exclude_buckets = exclude_buckets.split(",") if exclude_buckets else []
self.backupset.exclude_buckets = exclude_buckets
self.backupset.include_buckets = include_buckets
self.backupset.disable_bucket_config = self.input.param("disable-bucket-config", False)
self.backupset.disable_views = self.input.param("disable-views", False)
self.backupset.disable_gsi_indexes = self.input.param("disable-gsi-indexes", False)
self.backupset.disable_ft_indexes = self.input.param("disable-ft-indexes", False)
self.backupset.disable_ft_alias = self.input.param("disable-ft-alias", False)
self.backupset.disable_analytics = self.input.param("disable-analytics", False)
self.backupset.disable_data = self.input.param("disable-data", False)
self.backupset.disable_conf_res_restriction = self.input.param("disable-conf-res-restriction", None)
self.backupset.force_updates = self.input.param("force-updates", False)
self.backupset.resume = self.input.param("resume", False)
self.backupset.purge = self.input.param("purge", False)
self.backupset.threads = self.input.param("threads", self.number_of_processors())
self.backupset.start = self.input.param("start", 1)
self.backupset.end = self.input.param("stop", 1)
self.backupset.number_of_backups = self.input.param("number_of_backups", 1)
self.backupset.number_of_backups_after_upgrade = \
self.input.param("number_of_backups_after_upgrade", 0)
self.backupset.filter_keys = self.input.param("filter-keys", "")
self.backupset.random_keys = self.input.param("random_keys", False)
self.backupset.filter_values = self.input.param("filter-values", "")
self.backupset.no_ssl_verify = self.input.param("no-ssl-verify", False)
self.backupset.secure_conn = self.input.param("secure-conn", False)
self.backupset.bk_no_cert = self.input.param("bk-no-cert", False)
self.backupset.rt_no_cert = self.input.param("rt-no-cert", False)
self.backupset.backup_list_name = self.input.param("list-names", None)
self.backupset.backup_incr_backup = self.input.param("incr-backup", None)
self.backupset.bucket_backup = self.input.param("bucket-backup", None)
self.backupset.backup_to_compact = self.input.param("backup-to-compact", 0)
self.backupset.map_buckets = self.input.param("map-buckets", None)
self.backupset.delete_old_bucket = self.input.param("delete-old-bucket", False)
self.add_node_services = self.input.param("add-node-services", "kv")
self.backupset.backup_compressed = \
self.input.param("backup-conpressed", False)
self.backups = []
self.number_of_backups_taken = 0
self.vbucket_seqno = []
self.expires = self.input.param("expires", 0)
self.auto_failover = self.input.param("enable-autofailover", False)
self.auto_failover_timeout = self.input.param("autofailover-timeout", 30)
self.graceful = self.input.param("graceful",False)
self.failover_ip = None
self.done_failover = False
self.recoveryType = self.input.param("recoveryType", "full")
self.skip_buckets = self.input.param("skip_buckets", False)
self.lww_new = self.input.param("lww_new", False)
self.skip_consistency = self.input.param("skip_consistency", False)
self.master_services = self.get_services([self.backupset.cluster_host],
self.services_init, start_node=0)
if not self.master_services:
self.master_services = ["kv"]
self.restore_services = self.get_services([self.backupset.restore_cluster_host],
self.services_init, start_node=0)
if not self.restore_services:
self.restore_services = ["kv"]
self.per_node = self.input.param("per_node", True)
if not os.path.exists(self.backup_validation_files_location):
os.mkdir(self.backup_validation_files_location)
shell.disconnect()
# Common configuration which are shared accross cloud providers
self.backupset.objstore_access_key_id = self.input.cbbackupmgr_param('access_key_id', '')
self.backupset.objstore_bucket = self.input.cbbackupmgr_param('bucket', 'cbbackupmgr-testing')
self.backupset.objstore_endpoint = self.input.cbbackupmgr_param('endpoint', '')
self.backupset.objstore_region = self.input.cbbackupmgr_param('region', '')
self.backupset.objstore_secret_access_key = self.input.cbbackupmgr_param('secret_access_key', '') # Required
self.backupset.objstore_staging_directory = self.input.cbbackupmgr_param('staging_directory')
# S3 specific configuration
self.backupset.s3_force_path_style = self.input.cbbackupmgr_param('s3_force_path_style', False)
# The setup/teardown is provider specific, this is hidden behind the 'Provider' abstract class
self.objstore_provider = None
provider = self.input.param("objstore_provider", None)
if provider == "s3":
self.objstore_provider = S3(self.backupset.objstore_access_key_id, self.backupset.objstore_bucket,
self.backupset.objstore_endpoint, self.backupset.objstore_region,
self.backupset.objstore_secret_access_key,
self.backupset.objstore_staging_directory)
elif not provider:
self.objstore_provider = None
# We run in a separate branch so when we add more providers the setup will be run by default
if provider:
self.objstore_provider.setup()
self.backupset.directory = "archive-{}".format(self.master.ip)
self.objstore_provider.setup()
self.validation_helper = BackupRestoreValidations(self.backupset,
self.cluster_to_backup,
self.cluster_to_restore,
self.buckets,
self.backup_validation_files_location,
self.backups,
self.num_items,
self.vbuckets,
self.objstore_provider)
def tearDown(self):
super(EnterpriseBackupRestoreBase, self).tearDown()
if not self.input.param("skip_cleanup", False):
remote_client = RemoteMachineShellConnection(self.input.clusters[1][0])
info = remote_client.extract_remote_info().type.lower()
self.tmp_path = "/tmp/"
if info == 'linux' or info == 'mac':
backup_directory = "/tmp/entbackup"
elif info == 'windows':
self.tmp_path = WIN_TMP_PATH
backup_directory = WIN_TMP_PATH_RAW + "entbackup"
else:
raise Exception("OS not supported.")
backup_directory += "_" + self.master.ip
validation_files_location = "%sbackuprestore" % self.tmp_path + self.master.ip
if info == 'linux':
command = "rm -rf {0}".format(backup_directory)
output, error = remote_client.execute_command(command)
remote_client.log_command_output(output, error)
elif info == 'windows':
remote_client.remove_directory_recursive(backup_directory)
if info == 'linux':
command = "rm -rf /cbqe3043/entbackup"
output, error = remote_client.execute_command(command)
remote_client.log_command_output(output, error)
if self.input.clusters:
for key in self.input.clusters.keys():
servers = self.input.clusters[key]
try:
self.backup_reset_clusters(servers)
except:
self.log.error("was not able to cleanup cluster the first time")
self.backup_reset_clusters(servers)
if os.path.exists(validation_files_location):
self.log.info("delete dir %s" % validation_files_location)
shutil.rmtree(validation_files_location)
# testrunner runs the teardown before running setup which means the 'objstore_provider' will be undefined
# we can continue in this case knowing that we haven't yet loaded any data into the cloud.
try:
if self.objstore_provider:
self.objstore_provider.teardown(info, remote_client)
except AttributeError:
pass
remote_client.disconnect()
@property
def cluster_to_backup(self):
return self.get_nodes_in_cluster(self.backupset.cluster_host)
@property
def cluster_to_restore(self):
return self.get_nodes_in_cluster(self.backupset.restore_cluster_host)
def number_of_processors(self):
remote_client = RemoteMachineShellConnection(self.input.clusters[1][0])
info = remote_client.extract_remote_info().type.lower()
if info == 'linux' or info == 'mac':
command = "nproc"
output, error = remote_client.execute_command(command)
if output:
return output[0]
else:
return error[0]
elif info == 'windows':
sysinfo = remote_client.get_windows_system_info()
numprocs = sysinfo['Processor(s)'].split(' ')
return numprocs[0]
def _get_current_bkrs_client_version(self):
self.backupset.current_bkrs_client_version = \
RestConnection(self.backupset.backup_host).get_nodes_version()
self.backupset.current_bkrs_client_version = \
"-".join(self.backupset.current_bkrs_client_version.split('-')[:2])
return self.backupset.current_bkrs_client_version
def backup_reset_clusters(self, servers):
BucketOperationHelper.delete_all_buckets_or_assert(servers, self)
ClusterOperationHelper.cleanup_cluster(servers, master=servers[0])
ClusterOperationHelper.wait_for_ns_servers_or_assert(servers,
self, debug=False)
def store_vbucket_seqno(self):
try:
vseqno = self.get_vbucket_seqnos(self.cluster_to_backup,
self.buckets,
self.skip_consistency, self.per_node)
self.vbucket_seqno.append(vseqno)
except Exception as e:
if e:
if "Memcached error #1 'Not found'" in str(e) and self.done_failover:
self.log.info("error as expected")
else:
self.fail(e)
def backup_create(self, del_old_backup=True):
args = "config --archive {}{} ".format(self.objstore_provider.schema_prefix() + self.backupset.objstore_bucket + '/' if self.objstore_provider else '', self.backupset.directory)
args += "--repo {} ".format(self.backupset.name)
args += "{} ".format('--obj-staging-dir ' + self.backupset.objstore_staging_directory if self.objstore_provider else '')
args += "{} ".format('--obj-endpoint ' + self.backupset.objstore_endpoint if self.objstore_provider and self.backupset.objstore_endpoint else '')
args += "{} ".format('--obj-region ' + self.backupset.objstore_region if self.objstore_provider and self.backupset.objstore_region else '')
args += "{} ".format('--obj-access-key-id ' + self.backupset.objstore_access_key_id if self.objstore_provider and self.backupset.objstore_access_key_id else '')
args += "{} ".format('--obj-secret-access-key ' + self.backupset.objstore_secret_access_key if self.objstore_provider and self.backupset.objstore_secret_access_key else '')
args += "{} ".format('--s3-force-path-style' if self.objstore_provider and self.objstore_provider.schema_prefix() == 's3://' else '')
if self.backupset.exclude_buckets:
args += " --exclude-buckets \"{0}\"".format(",".join(self.backupset.exclude_buckets))
if self.backupset.include_buckets:
args += " --include-buckets \"{0}\"".format(",".join(self.backupset.include_buckets))
if self.backupset.disable_bucket_config:
args += " --disable-bucket-config"
if self.backupset.disable_views:
args += " --disable-views"
if self.backupset.disable_gsi_indexes:
args += " --disable-gsi-indexes"
if self.backupset.disable_ft_indexes:
args += " --disable-ft-indexes"
if self.backupset.disable_data:
args += " --disable-data"
if self.backupset.current_bkrs_client_version[:3] >= "6.5":
if self.vbucket_filter is not None:
args += " --vbucket-filter {0}".format(self.vbucket_filter)
if self.backupset.log_to_stdout:
args += " --log-to-stdout"
if self.vbucket_filter:
if self.vbucket_filter == "all":
all_vbuckets = "0"
for x in range (1, 1024):
all_vbuckets += "," + str(x)
args += " --vbucket-filter {0}".format(all_vbuckets)
else:
args += " --vbucket-filter {0}".format(self.vbucket_filter)
remote_client = RemoteMachineShellConnection(self.backupset.backup_host)
command = "{0}/cbbackupmgr {1}".format(self.cli_command_location, args)
if del_old_backup:
# Since we are just wiping out the archive here, we can just run the object store teardown
if self.objstore_provider:
self.objstore_provider.teardown(remote_client.extract_remote_info().type.lower(), remote_client)
remote_client.execute_command("rm -rf {0}".format(self.backupset.directory))
output, error = remote_client.execute_command(command)
remote_client.log_command_output(output, error)
remote_client.disconnect()
return output, error
def backup_info(self, json_out=True):
args = "info --archive {}{} ".format(self.objstore_provider.schema_prefix() + self.backupset.objstore_bucket + '/' if self.objstore_provider else '', self.backupset.directory)
args += "--repo {} ".format(self.backupset.name)
args += "{} ".format('--obj-staging-dir ' + self.backupset.objstore_staging_directory if self.objstore_provider else '')
args += "{} ".format('--obj-endpoint ' + self.backupset.objstore_endpoint if self.objstore_provider and self.backupset.objstore_endpoint else '')
args += "{} ".format('--obj-region ' + self.backupset.objstore_region if self.objstore_provider and self.backupset.objstore_region else '')
args += "{} ".format('--obj-access-key-id ' + self.backupset.objstore_access_key_id if self.objstore_provider and self.backupset.objstore_access_key_id else '')
args += "{}".format('--obj-secret-access-key ' + self.backupset.objstore_secret_access_key if self.objstore_provider and self.backupset.objstore_secret_access_key else '')
args += "{}".format(' --s3-force-path-style' if self.objstore_provider and self.objstore_provider.schema_prefix() == 's3://' else '')
args += "{}".format(' --json' if json_out else '')
remote_client = RemoteMachineShellConnection(self.backupset.backup_host)
command = "{0}/cbbackupmgr {1}".format(self.cli_command_location, args)
output, error = remote_client.execute_command(command)
remote_client.log_command_output(output, error)
remote_client.disconnect()
return output, error
def _verify_backup_directory_count(self, expected):
shell = RemoteMachineShellConnection(self.backupset.backup_host)
command = "ls -l {}".format(self.backupset.objstore_staging_directory + '/' if self.objstore_provider else '')
command += "{}/{} | wc -l".format(self.backupset.directory, self.backupset.name)
output, _ = shell.execute_command(command)
output = " ".join(output)
try:
count = int(output)
self.assertEqual(count - 2, expected,
"Number of backup directories {0} does not match expected {1}".format(count - 2, expected))
except ValueError as e:
self.fail("Could not get the number of backups in the archive due to: {0}".format(e))
shell.disconnect()
# It's important that we check to ensure the backups were removed in object store as well as in the staging
# directory.
if self.objstore_provider:
count = len(self.objstore_provider.list_backups(self.backupset.directory, self.backupset.name))
self.assertEqual(count, expected,
"Number of remote backup directories {} does not match expected {}".format(count, expected))
def backup_create_validate(self):
output, error = self.backup_create()
if error or "Backup repository `{0}` created successfully".format(self.backupset.name) not in output[0]:
self.fail("Creating backupset failed.")
status, msg = self.validation_helper.validate_backup_create()
if not status:
self.fail(msg)
self.log.info(msg)
def backup_cluster(self, threads_count=1):
url_format = ""
secure_port = ""
if self.backupset.secure_conn:
cacert = self.get_cluster_certificate_info(self.backupset.backup_host,
self.backupset.cluster_host)
secure_port = "1"
url_format = "s"
user_input = "--username %s " % self.backupset.cluster_host_username
password_input = "--password %s " % self.backupset.cluster_host_password
if self.backupset.user_env and not self.backupset.overwrite_user_env:
user_input = ""
elif self.backupset.user_env_with_prompt:
password_input = "-u "
if self.backupset.passwd_env and not self.backupset.overwrite_passwd_env:
password_input = ""
elif self.backupset.passwd_env_with_prompt:
password_input = "-p "
""" Print out of cbbackupmgr from 6.5 is different with older version """
self.cbbkmgr_version = "6.5"
self.bk_printout = "Backup successfully completed".split(",")
if RestHelper(RestConnection(self.backupset.backup_host)).is_ns_server_running():
self.cbbkmgr_version = RestConnection(self.backupset.backup_host).get_nodes_version()
if "4.6" <= self.cbbkmgr_version[:3]:
self.cluster_flag = "--cluster"
args = "backup --archive {}{}".format(self.objstore_provider.schema_prefix() + self.backupset.objstore_bucket + '/' if self.objstore_provider else '', self.backupset.directory)
args += " --repo {}".format(self.backupset.name)
args += " {} http{}://{}:{}{}".format(self.cluster_flag, url_format, self.backupset.cluster_host.ip, secure_port, self.backupset.cluster_host.port)
args += " {}".format(user_input)
args += " {}".format(password_input)
args += "{}".format(' --full-backup' if self.backupset.full_backup else '')
args += "{}".format(' --obj-staging-dir ' + self.backupset.objstore_staging_directory if self.objstore_provider else '')
args += "{}".format(' --obj-endpoint ' + self.backupset.objstore_endpoint if self.objstore_provider and self.backupset.objstore_endpoint else '')
args += "{}".format(' --obj-region ' + self.backupset.objstore_region if self.objstore_provider and self.backupset.objstore_region else '')
args += "{}".format(' --obj-access-key-id ' + self.backupset.objstore_access_key_id if self.objstore_provider and self.backupset.objstore_access_key_id else '')
args += "{}".format(' --obj-secret-access-key ' + self.backupset.objstore_secret_access_key if self.objstore_provider and self.backupset.objstore_secret_access_key else '')
args += "{}".format(' --s3-force-path-style' if self.objstore_provider and self.objstore_provider.schema_prefix() == 's3://' else '')
if self.backupset.no_ssl_verify:
args += " --no-ssl-verify"
if self.backupset.secure_conn:
if not self.backupset.bk_no_cert:
args += " --cacert %s" % cacert
if self.backupset.resume:
args += " --resume"
if self.backupset.purge:
args += " --purge"
if self.no_progress_bar:
args += " --no-progress-bar"
if self.multi_threads:
args += " --threads %s " % threads_count
if self.backupset.backup_compressed:
args += " --value-compression compressed"
if self.backupset.log_to_stdout:
args += " --log-to-stdout"
if self.backupset.auto_select_threads:
args += " --auto-select-threads"
user_env = ""
password_env = ""
if self.backupset.user_env:
self.log.info("set user env to Administrator")
user_env = "export CB_USERNAME=Administrator; "
if self.backupset.passwd_env:
self.log.info("set password env to password")
password_env = "export CB_PASSWORD=password; "
if self.backupset.user_env_with_prompt:
self.log.info("set username env to prompt")
user_env = "unset CB_USERNAME; export CB_USERNAME;"
if self.backupset.passwd_env_with_prompt:
self.log.info("set password env to prompt")
password_env = "unset CB_PASSWORD; export CB_PASSWORD;"
remote_client = RemoteMachineShellConnection(self.backupset.backup_host)
command = "{3} {2} {0}/cbbackupmgr {1}".format(self.cli_command_location, args,
password_env, user_env)
output, error = remote_client.execute_command(command)
if self.debug_logs:
remote_client.log_command_output(output, error)
for bucket in self.buckets:
if self.cbbkmgr_version[:5] in COUCHBASE_FROM_MAD_HATTER:
self.bk_printout.append('Backed up bucket "{0}" succeeded'.format(bucket.name))
if error or not self._check_output(self.bk_printout, output):
self.log.error("Failed to backup bucket {0}".format(bucket.name))
return output, error
command = "ls -tr {}".format(self.backupset.objstore_staging_directory + '/' if self.objstore_provider else '')
command += "{}/{} | tail -1".format(self.backupset.directory, self.backupset.name)
o, e = remote_client.execute_command(command)
if o:
self.backups.append(o[0])
self.number_of_backups_taken += 1
self.log.info("Finished taking backup with args: {0}".format(args))
remote_client.disconnect()
return output, error
def backup_cluster_validate(self, skip_backup=False, repeats=1,
validate_directory_structure=True):
if not skip_backup:
output, error = self.backup_cluster()
if error or not self._check_output(self.bk_printout, output):
if self.vbucket_filter is not None:
self.log.info("These vbuckets {0} may not contain data"
.format(self.vbucket_filter))
self.vbuckets_filter_no_data = True
return
else:
self.fail("Taking cluster backup failed. Check printout below. "
"\nErrors: {0} \nOutput: {1}".format(error, output))
if self.show_bk_list:
self.backup_list()
if repeats < 2 and validate_directory_structure:
status, msg = self.validation_helper.validate_backup()
if not status:
self.fail(msg)
self.log.info(msg)
if not self.backupset.deleted_buckets:
if not self.backupset.force_updates:
if not self.done_failover:
self.store_vbucket_seqno()
else:
return
self.validation_helper.store_keys(self.cluster_to_backup, self.buckets, self.number_of_backups_taken,
self.backup_validation_files_location)
self.validation_helper.store_latest(self.cluster_to_backup, self.buckets, self.number_of_backups_taken,
self.backup_validation_files_location)
self.validation_helper.store_range_json(self.buckets, self.number_of_backups_taken,
self.backup_validation_files_location,
self.objstore_provider)
def backup_restore(self):
if self.restore_only:
self.backups.append("2020-07-28T16_20_05.720270674-07_00")
if self.vbuckets_filter_no_data:
self.log.info("No data in backup repo as expected.")
return
try:
backup_start = self.backups[int(self.backupset.start) - 1]
except IndexError:
backup_start = "{0}{1}".format(self.backups[-1], self.backupset.start)
try:
backup_end = self.backups[int(self.backupset.end) - 1]
except IndexError:
backup_end = "{0}{1}".format(self.backups[-1], self.backupset.end)
url_format = ""
secure_port = ""
if self.backupset.secure_conn:
cacert = self.get_cluster_certificate_info(self.backupset.backup_host,
self.backupset.restore_cluster_host)
url_format = "s"
secure_port = "1"
user_input = "--username %s " % self.backupset.restore_cluster_host_username
password_input = "--password %s " % self.backupset.restore_cluster_host_password
if self.backupset.user_env and not self.backupset.overwrite_user_env:
user_input = ""
elif self.backupset.user_env_with_prompt:
user_input = "-u "
if self.backupset.passwd_env and not self.backupset.overwrite_passwd_env:
password_input = ""
elif self.backupset.passwd_env_with_prompt:
password_input = "-p "
version = RestConnection(self.backupset.backup_host).get_nodes_version()
if "4.6" <= self.backupset.current_bkrs_client_version[:3]:
self.cluster_flag = "--cluster"
args = "restore --archive {}{} ".format(self.objstore_provider.schema_prefix() + self.backupset.objstore_bucket + '/' if self.objstore_provider else '', self.backupset.directory)
args += "--repo {} ".format(self.backupset.name)
args += "{} http{}://{}:{}{} ".format(self.cluster_flag, url_format, self.backupset.restore_cluster_host.ip, secure_port, self.backupset.restore_cluster_host.port)
args += "{} ".format(user_input)
args += "{} ".format(password_input)
args += "--start {} ".format(backup_start)
args += "--end {} ".format(backup_end)
args += "{} ".format('--obj-staging-dir ' + self.backupset.objstore_staging_directory if self.objstore_provider else '')
args += "{} ".format('--obj-endpoint ' + self.backupset.objstore_endpoint if self.objstore_provider and self.backupset.objstore_endpoint else '')
args += "{} ".format('--obj-region ' + self.backupset.objstore_region if self.objstore_provider and self.backupset.objstore_region else '')
args += "{} ".format('--obj-access-key-id ' + self.backupset.objstore_access_key_id if self.objstore_provider and self.backupset.objstore_access_key_id else '')
args += "{}".format('--obj-secret-access-key ' + self.backupset.objstore_secret_access_key if self.objstore_provider and self.backupset.objstore_secret_access_key else '')
args += "{}".format(' --s3-force-path-style' if self.objstore_provider and self.objstore_provider.schema_prefix() == 's3://' else '')
if version >= "6.5" and self.backupset.auto_select_threads:
args += " --auto-select-threads"
if version >= "6.5" and self.backupset.log_to_stdout:
args += " --log-to-stdout"
if self.backupset.no_ssl_verify:
args += " --no-ssl-verify"
if self.backupset.secure_conn:
if not self.backupset.rt_no_cert:
args += " --cacert %s" % cacert
if self.backupset.exclude_buckets:
args += " {} {}".format('--exclude-data' if int(version[0]) >= 7 else '--exclude-buckets', ''.join(self.backupset.exclude_buckets))
if self.backupset.include_buckets:
args += " {} {}".format('--include-data' if int(version[0]) >= 7 else '--include-buckets', ''.join(self.backupset.include_buckets))
if self.backupset.disable_bucket_config:
args += " --disable-bucket-config {0}".format(self.backupset.disable_bucket_config)
if self.backupset.disable_views:
args += " --disable-views "
if self.backupset.disable_gsi_indexes:
args += " --disable-gsi-indexes {0}".format(self.backupset.disable_gsi_indexes)
if self.backupset.disable_ft_indexes:
args += " --disable-ft-indexes {0}".format(self.backupset.disable_ft_indexes)
if self.backupset.disable_data:
args += " --disable-data {0}".format(self.backupset.disable_data)
if self.backupset.disable_conf_res_restriction is not None:
args += " --disable-conf-res-restriction {0}".format(
self.backupset.disable_conf_res_restriction)
filter_chars = {"star": "*", "dot": "."}
if self.backupset.filter_keys:
for key in filter_chars:
if key in self.backupset.filter_keys:
self.backupset.filter_keys = self.backupset.filter_keys.replace(key,
filter_chars[key])
args += " --filter-keys '{0}'".format(self.backupset.filter_keys)
if self.backupset.filter_values:
for key in filter_chars:
if key in self.backupset.filter_values:
self.backupset.filter_values = self.backupset.filter_values.replace(key,
filter_chars[key])
args += " --filter-values '{0}'".format(self.backupset.filter_values)
if self.backupset.force_updates:
args += " --force-updates"
if self.no_progress_bar:
args += " --no-progress-bar"
bucket_compression_mode = self.compression_mode
if self.restore_compression_mode is not None:
bucket_compression_mode = self.restore_compression_mode
if not self.skip_buckets:
rest_conn = RestConnection(self.backupset.restore_cluster_host)
restore_cluster_services = rest_conn.get_nodes_services()
restore_services = restore_cluster_services.values()[0]
shell = RemoteMachineShellConnection(self.backupset.restore_cluster_host)
shell.enable_diag_eval_on_non_local_hosts()
shell.disconnect()
self.log.info("Services in restore cluster: {0}".format(restore_services))
rest_helper = RestHelper(rest_conn)
total_mem = rest_conn.get_nodes_self().mcdMemoryReserved
ram_size = rest_conn.get_nodes_self().mcdMemoryReserved * CLUSTER_QUOTA_RATIO
has_index_node = False
if "index" in restore_services:
has_index_node = True
ram_size = int(ram_size) - INDEX_QUOTA
if "fts" in restore_services:
ram_size = int(ram_size) - FTS_QUOTA
all_buckets = self.total_buckets
if len(self.buckets) > 0:
all_buckets = len(self.buckets)
bucket_size = self._get_bucket_size(ram_size, all_buckets)
if "index" in restore_services and "fts" in restore_services:
bucket_size = bucket_size * .8
if self.dgm_run:
bucket_size = 256
count = 0
buckets = []
replicas = self.num_replicas
if self.new_replicas:
replicas = self.new_replicas
reset_restore_cluster = False
reset_cluster_count = 0
for bucket in self.buckets:
bucket_name = bucket.name
if not rest_helper.bucket_exists(bucket_name):
if self.backupset.map_buckets is None:
self.log.info("Creating bucket {0} in restore host {1}"
.format(bucket_name,
self.backupset.restore_cluster_host.ip))
elif self.backupset.map_buckets:
self.log.info("Create new bucket name to restore to this bucket")
bucket_maps = ""
bucket_name = bucket.name + "_" + str(count)
if self.bucket_type == "ephemeral":
self.eviction_policy = "noEviction"
self.log.info("ephemeral bucket needs to set restore cluster "
"to memopt for gsi.")
self.test_storage_mode = "memory_optimized"
kv_quota = self._reset_storage_mode(rest_conn, self.test_storage_mode)
if self.test_fts:
if reset_cluster_count == 0:
self._create_restore_cluster()
reset_restore_cluster = True
reset_cluster_count +=1
if not self.dgm_run and int(kv_quota) > 0:
bucket_size = kv_quota
if not reset_restore_cluster and reset_cluster_count == 0:
self._create_restore_cluster()
self.log.info("replica in bucket {0} is {1}".format(bucket.name, replicas))
try:
rest_conn.create_bucket(bucket=bucket_name,
ramQuotaMB=int(bucket_size) - 1,
replicaNumber=replicas,
authType=bucket.authType if bucket.authType else 'none',
bucketType=self.bucket_type,
proxyPort=bucket.port,
evictionPolicy=self.eviction_policy,
lww=self.lww_new,
compressionMode=bucket_compression_mode)
except Exception as e:
if "unable to create bucket" in str(e):
self.sleep(15, "wait for cluster ready if it was reset")
rest_conn.create_bucket(bucket=bucket_name,
ramQuotaMB=int(bucket_size) - 1,
replicaNumber=replicas,
authType=bucket.authType if bucket.authType else 'none',
bucketType=self.bucket_type,
proxyPort=bucket.port,
evictionPolicy=self.eviction_policy,
lww=self.lww_new,
compressionMode=bucket_compression_mode)
bucket_ready = rest_helper.vbucket_map_ready(bucket_name)
if not bucket_ready:
self.fail("Bucket {0} not created after 120 seconds.".format(bucket_name))
elif self.backupset.map_buckets and self.same_cluster:
bucket_maps = ""
bucket_name = bucket.name + "_" + str(count)
self.log.info("replica in bucket {0} is {1}".format(bucket_name, replicas))
if self.backupset.delete_old_bucket:
BucketOperationHelper.delete_bucket_or_assert(\
self.backupset.restore_cluster_host, bucket.name, self)
rest_conn.create_bucket(bucket=bucket_name,
ramQuotaMB=int(bucket_size) - 1,
replicaNumber=replicas,
authType=bucket.authType if bucket.authType else 'none',
bucketType=self.bucket_type,
proxyPort=bucket.port,
evictionPolicy=self.eviction_policy,
lww=self.lww_new,
compressionMode=bucket_compression_mode)
bucket_ready = rest_helper.vbucket_map_ready(bucket_name)
if not bucket_ready:
self.fail("Bucket {0} not created after 120 seconds.".format(bucket_name))
count = 0
bucket_status = rest_conn.get_bucket_status(bucket_name)
while bucket_status == "warmup":
self.sleep(5, "wait for bucket is up")
bucket_status = rest_conn.get_bucket_status(bucket_name)
count += 1
if count == 15:
raise Exception ("Bucket does not ready after 30 seconds")
if has_index_node:
self.sleep(15, "wait for index service ready")
buckets.append("%s=%s" % (bucket.name, bucket_name))
count +=1
reset_cluster_count +=1
bucket_maps = ",".join(buckets)
if self.backupset.map_buckets:
args += " --map-buckets %s " % bucket_maps
user_env = ""
password_env = ""
if self.backupset.user_env:
self.log.info("set user env to Administrator")
user_env = "export CB_USERNAME=Administrator; "
if self.backupset.passwd_env:
self.log.info("set password env to password")
password_env = "export CB_PASSWORD=password; "
if self.backupset.user_env_with_prompt:
self.log.info("set username env to prompt")
user_env = "unset CB_USERNAME; export CB_USERNAME;"
if self.backupset.passwd_env_with_prompt:
self.log.info("set password env to prompt")
password_env = "unset CB_PASSWORD; export CB_PASSWORD;"
shell = RemoteMachineShellConnection(self.backupset.backup_host)
self.ttl_value = ""
if self.replace_ttl is not None:
if self.replace_ttl == "all" or self.replace_ttl == "expired":
if self.replace_ttl_with is None:
self.fail("Need to include param 'replace-ttl-with' value")
else:
if self.replace_ttl_with == 0:
self.ttl_value = "0"
args += " --replace-ttl {0} --replace-ttl-with 0"\
.format(self.replace_ttl)
else:
ttl_date, _ = shell.execute_command(self.rfc3339_date)
self.seconds_with_ttl, _ = shell.execute_command(self.seconds_with_ttl)
if self.seconds_with_ttl:
self.ttl_value = self.seconds_with_ttl[0]
if ttl_date and ttl_date[0]:
args += " --replace-ttl {0} --replace-ttl-with {1}"\
.format(self.replace_ttl, ttl_date[0])
elif isinstance(self.replace_ttl_with, str):
args += " --replace-ttl {0} --replace-ttl-with {1}"\
.format(self.replace_ttl, self.replace_ttl_with)
elif self.replace_ttl == "add-none":
args += " --replace-ttl none"
elif self.replace_ttl == "empty-flag":
args += " --replace-ttl-with {0}".format(self.replace_ttl_with)
else:
args += " --replace-ttl {0}".format(self.replace_ttl)
command = "{3} {2} {0}/cbbackupmgr {1}".format(self.cli_command_location, args,
password_env, user_env)
output, error = shell.execute_command_raw(command)
shell.log_command_output(output, error)
if not self.enable_firewall:
self._verify_bucket_compression_mode(bucket_compression_mode)
eventing_service_in = False
errs_check = ["Unable to process value", "Error restoring cluster",
"Expected argument for option"]
rest_rs = RestConnection(self.backupset.restore_cluster_host)
rs_cluster_services = rest_rs.get_nodes_services().values()
for srv in rs_cluster_services:
if "eventing" in srv:
eventing_service_in = True
errs_check.append("User needs one of the following permissions: cluster.eventing")
accepted_errs = False
for err in errs_check:
if self._check_output(err, output):
accepted_errs = True
break
if accepted_errs:
if not self.should_fail:
if not self.restore_should_fail and not eventing_service_in:
self.fail("Failed to restore cluster")
else:
self.log.info("This test is for negative test")
res = output
res.extend(error)
error_str = "Error restoring cluster: Transfer failed. "\
"Check the logs for more information."
if error_str in res:
bk_log_file_name = "backup.log"
if "6.5" <= RestConnection(self.backupset.backup_host).get_nodes_version():
bk_log_file_name = "backup-*.log"
command = "cat {}".format(self.backupset.objstore_staging_directory + '/' if self.objstore_provider else '')
command += "{}/logs/{} | grep {} -A 10 -B 100".format(self.backupset.directory, bk_log_file_name, error_str)
output, error = shell.execute_command(command)
shell.log_command_output(output, error)
if 'Required Flags:' in res:
if not self.should_fail:
self.fail("Command line failed. Please check test params.")
shell.disconnect()
return output, error
def backup_restore_validate(self, compare_uuid=False,
seqno_compare_function="==",
replicas=False, mode="memory",
expected_error=None):
if self.vbuckets_filter_no_data:
self.log.info("No data in backup repo as expected.")
return
output, error =self.backup_restore()
if expected_error:
output.extend(error)
error_found = False
if expected_error:
for line in output:
if self.debug_logs:
print "output from cmd: ", line
print "expect error : ", expected_error
if line.find(expected_error) != -1:
error_found = True
break
self.assertTrue(error_found, "Expected error not found: %s" % expected_error)
return
remote_client = RemoteMachineShellConnection(self.backupset.backup_host)
bk_log_file_name = "backup.log"
if "6.5" <= RestConnection(self.backupset.backup_host).get_nodes_version():
bk_log_file_name = "backup-*.log"
ipv6_raw_format = [":", "[", "]"]
ipv6_raw_ip = False
bk_raw_ipv6_dir = ""
if ":" in self.backupset.directory:
ipv6_raw_ip = True
bk_raw_ipv6_dir = self.backupset.directory