3 from __future__ import print_function
24 MY_DIRNAME = os.path.dirname(os.path.realpath(__file__))
25 if __name__ == '__main__' and os.path.exists(
26 os.path.join(MY_DIRNAME, '..', 'arvados', '__init__.py')):
27 # We're being launched to support another test suite.
28 # Add the Python SDK source to the library path.
29 sys.path.insert(1, os.path.dirname(MY_DIRNAME))
34 ARVADOS_DIR = os.path.realpath(os.path.join(MY_DIRNAME, '../../..'))
35 SERVICES_SRC_DIR = os.path.join(ARVADOS_DIR, 'services')
36 if 'GOPATH' in os.environ:
37 gopaths = os.environ['GOPATH'].split(':')
38 gobins = [os.path.join(path, 'bin') for path in gopaths]
39 os.environ['PATH'] = ':'.join(gobins) + ':' + os.environ['PATH']
41 TEST_TMPDIR = os.path.join(ARVADOS_DIR, 'tmp')
42 if not os.path.exists(TEST_TMPDIR):
47 _cached_db_config = {}
49 def find_server_pid(PID_PATH, wait=10):
53 while (not good_pid) and (now <= timeout):
56 with open(PID_PATH, 'r') as f:
57 server_pid = int(f.read())
58 good_pid = (os.kill(server_pid, 0) is None)
59 except EnvironmentError:
68 def kill_server_pid(pidfile, wait=10, passenger_root=False):
69 # Must re-import modules in order to work during atexit
80 # First try to shut down nicely
81 restore_cwd = os.getcwd()
82 os.chdir(passenger_root)
84 'bundle', 'exec', 'passenger', 'stop', '--pid-file', pidfile])
86 # Use up to half of the +wait+ period waiting for "passenger
87 # stop" to work. If the process hasn't exited by then, start
88 # sending TERM signals.
92 while now <= deadline and server_pid is None:
94 with open(pidfile, 'r') as f:
95 server_pid = int(f.read())
97 # No pidfile = nothing to kill.
99 except ValueError as error:
100 # Pidfile exists, but we can't parse it. Perhaps the
101 # server has created the file but hasn't written its PID
103 print("Parse error reading pidfile {}: {}".format(pidfile, error),
108 while now <= deadline:
110 exited, _ = os.waitpid(server_pid, os.WNOHANG)
114 # already exited, or isn't our child process
118 os.kill(server_pid, signal.SIGTERM)
119 print("Sent SIGTERM to {} ({})".format(server_pid, pidfile),
121 except OSError as error:
122 if error.errno == errno.ESRCH:
123 # Thrown by os.getpgid() or os.kill() if the process
124 # does not exist, i.e., our work here is done.
130 print("Server PID {} ({}) did not exit, giving up after {}s".
131 format(server_pid, pidfile, wait),
134 def find_available_port():
135 """Return an IPv4 port number that is not in use right now.
137 We assume whoever needs to use the returned port is able to reuse
138 a recently used port without waiting for TIME_WAIT (see
139 SO_REUSEADDR / SO_REUSEPORT).
141 Some opportunity for races here, but it's better than choosing
142 something at random and not checking at all. If all of our servers
143 (hey Passenger) knew that listening on port 0 was a thing, the OS
144 would take care of the races, and this wouldn't be needed at all.
147 sock = socket.socket()
148 sock.bind(('0.0.0.0', 0))
149 port = sock.getsockname()[1]
153 def _wait_until_port_listens(port, timeout=10):
154 """Wait for a process to start listening on the given port.
156 If nothing listens on the port within the specified timeout (given
157 in seconds), print a warning on stderr before returning.
160 subprocess.check_output(['which', 'lsof'])
161 except subprocess.CalledProcessError:
162 print("WARNING: No `lsof` -- cannot wait for port to listen. "+
163 "Sleeping 0.5 and hoping for the best.",
167 deadline = time.time() + timeout
168 while time.time() < deadline:
170 subprocess.check_output(
171 ['lsof', '-t', '-i', 'tcp:'+str(port)])
172 except subprocess.CalledProcessError:
177 "WARNING: Nothing is listening on port {} (waited {} seconds).".
178 format(port, timeout),
181 def _fifo2stderr(label):
182 """Create a fifo, and copy it to stderr, prepending label to each line.
184 Return value is the path to the new FIFO.
186 +label+ should contain only alphanumerics: it is also used as part
187 of the FIFO filename.
189 fifo = os.path.join(TEST_TMPDIR, label+'.fifo')
192 except OSError as error:
193 if error.errno != errno.ENOENT:
195 os.mkfifo(fifo, 0700)
197 ['stdbuf', '-i0', '-oL', '-eL', 'sed', '-e', 's/^/['+label+'] /', fifo],
201 def run(leave_running_atexit=False):
202 """Ensure an API server is running, and ARVADOS_API_* env vars have
203 admin credentials for it.
205 If ARVADOS_TEST_API_HOST is set, a parent process has started a
206 test server for us to use: we just need to reset() it using the
209 If a previous call to run() started a new server process, and it
210 is still running, we just need to reset() it to fixture state and
213 If neither of those options work out, we'll really start a new
218 # Delete cached discovery documents.
220 # This will clear cached docs that belong to other processes (like
221 # concurrent test suites) even if they're still running. They should
222 # be able to tolerate that.
223 for fn in glob.glob(os.path.join(arvados.http_cache('discovery'),
224 '*,arvados,v1,rest,*')):
227 pid_file = _pidfile('api')
228 pid_file_ok = find_server_pid(pid_file, 0)
230 existing_api_host = os.environ.get('ARVADOS_TEST_API_HOST', my_api_host)
231 if existing_api_host and pid_file_ok:
232 if existing_api_host == my_api_host:
236 # Fall through to shutdown-and-start case.
239 # Server was provided by parent. Can't recover if it's
243 # Before trying to start up our own server, call stop() to avoid
244 # "Phusion Passenger Standalone is already running on PID 12345".
245 # (If we've gotten this far, ARVADOS_TEST_API_HOST isn't set, so
246 # we know the server is ours to kill.)
249 restore_cwd = os.getcwd()
250 api_src_dir = os.path.join(SERVICES_SRC_DIR, 'api')
251 os.chdir(api_src_dir)
253 # Either we haven't started a server of our own yet, or it has
254 # died, or we have lost our credentials, or something else is
255 # preventing us from calling reset(). Start a new one.
257 if not os.path.exists('tmp'):
260 if not os.path.exists('tmp/api'):
261 os.makedirs('tmp/api')
263 if not os.path.exists('tmp/logs'):
264 os.makedirs('tmp/logs')
266 if not os.path.exists('tmp/self-signed.pem'):
267 # We assume here that either passenger reports its listening
268 # address as https:/0.0.0.0:port/. If it reports "127.0.0.1"
269 # then the certificate won't match the host and reset() will
270 # fail certificate verification. If it reports "localhost",
271 # clients (notably Python SDK's websocket client) might
272 # resolve localhost as ::1 and then fail to connect.
273 subprocess.check_call([
274 'openssl', 'req', '-new', '-x509', '-nodes',
275 '-out', 'tmp/self-signed.pem',
276 '-keyout', 'tmp/self-signed.key',
278 '-subj', '/CN=0.0.0.0'],
281 # Install the git repository fixtures.
282 gitdir = os.path.join(SERVICES_SRC_DIR, 'api', 'tmp', 'git')
283 gittarball = os.path.join(SERVICES_SRC_DIR, 'api', 'test', 'test.git.tar')
284 if not os.path.isdir(gitdir):
286 subprocess.check_output(['tar', '-xC', gitdir, '-f', gittarball])
288 # The nginx proxy isn't listening here yet, but we need to choose
289 # the wss:// port now so we can write the API server config file.
290 wss_port = find_available_port()
291 _setport('wss', wss_port)
293 port = find_available_port()
294 env = os.environ.copy()
295 env['RAILS_ENV'] = 'test'
296 env['ARVADOS_TEST_WSS_PORT'] = str(wss_port)
297 if env.get('ARVADOS_TEST_EXPERIMENTAL_WS'):
298 env.pop('ARVADOS_WEBSOCKETS', None)
300 env['ARVADOS_WEBSOCKETS'] = 'yes'
301 env.pop('ARVADOS_TEST_API_HOST', None)
302 env.pop('ARVADOS_API_HOST', None)
303 env.pop('ARVADOS_API_HOST_INSECURE', None)
304 env.pop('ARVADOS_API_TOKEN', None)
305 start_msg = subprocess.check_output(
307 'passenger', 'start', '-d', '-p{}'.format(port),
308 '--pid-file', pid_file,
309 '--log-file', os.path.join(os.getcwd(), 'log/test.log'),
311 '--ssl-certificate', 'tmp/self-signed.pem',
312 '--ssl-certificate-key', 'tmp/self-signed.key'],
315 if not leave_running_atexit:
316 atexit.register(kill_server_pid, pid_file, passenger_root=api_src_dir)
318 match = re.search(r'Accessible via: https://(.*?)/', start_msg)
321 "Passenger did not report endpoint: {}".format(start_msg))
322 my_api_host = match.group(1)
323 os.environ['ARVADOS_API_HOST'] = my_api_host
325 # Make sure the server has written its pid file and started
326 # listening on its TCP port
327 find_server_pid(pid_file)
328 _wait_until_port_listens(port)
331 os.chdir(restore_cwd)
334 """Reset the test server to fixture state.
336 This resets the ARVADOS_TEST_API_HOST provided by a parent process
337 if any, otherwise the server started by run().
339 It also resets ARVADOS_* environment vars to point to the test
340 server with admin credentials.
342 existing_api_host = os.environ.get('ARVADOS_TEST_API_HOST', my_api_host)
343 token = auth_token('admin')
344 httpclient = httplib2.Http(ca_certs=os.path.join(
345 SERVICES_SRC_DIR, 'api', 'tmp', 'self-signed.pem'))
347 'https://{}/database/reset'.format(existing_api_host),
349 headers={'Authorization': 'OAuth2 {}'.format(token)})
350 os.environ['ARVADOS_API_HOST_INSECURE'] = 'true'
351 os.environ['ARVADOS_API_HOST'] = existing_api_host
352 os.environ['ARVADOS_API_TOKEN'] = token
354 def stop(force=False):
355 """Stop the API server, if one is running.
357 If force==False, kill it only if we started it ourselves. (This
358 supports the use case where a Python test suite calls run(), but
359 run() just uses the ARVADOS_TEST_API_HOST provided by the parent
360 process, and the test suite cleans up after itself by calling
361 stop(). In this case the test server provided by the parent
362 process should be left alone.)
364 If force==True, kill it even if we didn't start it
365 ourselves. (This supports the use case in __main__, where "run"
366 and "stop" happen in different processes.)
369 if force or my_api_host is not None:
370 kill_server_pid(_pidfile('api'))
374 if 'ARVADOS_TEST_PROXY_SERVICES' in os.environ:
377 port = find_available_port()
378 conf = os.path.join(TEST_TMPDIR, 'ws.yml')
379 with open(conf, 'w') as f:
392 """.format(os.environ['ARVADOS_API_HOST'],
394 ('info' if os.environ.get('ARVADOS_DEBUG', '') in ['','0'] else 'debug'),
396 _dbconfig('database'),
397 _dbconfig('username'),
398 _dbconfig('password')))
399 logf = open(_fifo2stderr('ws'), 'w')
400 ws = subprocess.Popen(
401 ["ws", "-config", conf],
402 stdin=open('/dev/null'), stdout=logf, stderr=logf, close_fds=True)
403 with open(_pidfile('ws'), 'w') as f:
405 _wait_until_port_listens(port)
410 if 'ARVADOS_TEST_PROXY_SERVICES' in os.environ:
412 kill_server_pid(_pidfile('ws'))
414 def _start_keep(n, keep_args):
415 keep0 = tempfile.mkdtemp()
416 port = find_available_port()
417 keep_cmd = ["keepstore",
418 "-volume={}".format(keep0),
419 "-listen=:{}".format(port),
420 "-pid="+_pidfile('keep{}'.format(n))]
422 for arg, val in keep_args.iteritems():
423 keep_cmd.append("{}={}".format(arg, val))
425 logf = open(_fifo2stderr('keep{}'.format(n)), 'w')
426 kp0 = subprocess.Popen(
427 keep_cmd, stdin=open('/dev/null'), stdout=logf, stderr=logf, close_fds=True)
429 with open(_pidfile('keep{}'.format(n)), 'w') as f:
430 f.write(str(kp0.pid))
432 with open("{}/keep{}.volume".format(TEST_TMPDIR, n), 'w') as f:
435 _wait_until_port_listens(port)
439 def run_keep(blob_signing_key=None, enforce_permissions=False, num_servers=2):
440 stop_keep(num_servers)
443 if not blob_signing_key:
444 blob_signing_key = 'zfhgfenhffzltr9dixws36j1yhksjoll2grmku38mi7yxd66h5j4q9w4jzanezacp8s6q0ro3hxakfye02152hncy6zml2ed0uc'
445 with open(os.path.join(TEST_TMPDIR, "keep.blob_signing_key"), "w") as f:
446 keep_args['-blob-signing-key-file'] = f.name
447 f.write(blob_signing_key)
448 keep_args['-enforce-permissions'] = str(enforce_permissions).lower()
449 with open(os.path.join(TEST_TMPDIR, "keep.data-manager-token-file"), "w") as f:
450 keep_args['-data-manager-token-file'] = f.name
451 f.write(auth_token('data_manager'))
452 keep_args['-never-delete'] = 'false'
456 host=os.environ['ARVADOS_API_HOST'],
457 token=os.environ['ARVADOS_API_TOKEN'],
460 for d in api.keep_services().list(filters=[['service_type','=','disk']]).execute()['items']:
461 api.keep_services().delete(uuid=d['uuid']).execute()
462 for d in api.keep_disks().list().execute()['items']:
463 api.keep_disks().delete(uuid=d['uuid']).execute()
465 for d in range(0, num_servers):
466 port = _start_keep(d, keep_args)
467 svc = api.keep_services().create(body={'keep_service': {
468 'uuid': 'zzzzz-bi6l4-keepdisk{:07d}'.format(d),
469 'service_host': 'localhost',
470 'service_port': port,
471 'service_type': 'disk',
472 'service_ssl_flag': False,
474 api.keep_disks().create(body={
475 'keep_disk': {'keep_service_uuid': svc['uuid'] }
478 # If keepproxy is running, send SIGHUP to make it discover the new
479 # keepstore services.
480 proxypidfile = _pidfile('keepproxy')
481 if os.path.exists(proxypidfile):
483 os.kill(int(open(proxypidfile).read()), signal.SIGHUP)
485 os.remove(proxypidfile)
488 kill_server_pid(_pidfile('keep{}'.format(n)))
489 if os.path.exists("{}/keep{}.volume".format(TEST_TMPDIR, n)):
490 with open("{}/keep{}.volume".format(TEST_TMPDIR, n), 'r') as r:
491 shutil.rmtree(r.read(), True)
492 os.unlink("{}/keep{}.volume".format(TEST_TMPDIR, n))
493 if os.path.exists(os.path.join(TEST_TMPDIR, "keep.blob_signing_key")):
494 os.remove(os.path.join(TEST_TMPDIR, "keep.blob_signing_key"))
496 def stop_keep(num_servers=2):
497 for n in range(0, num_servers):
500 def run_keep_proxy():
501 if 'ARVADOS_TEST_PROXY_SERVICES' in os.environ:
505 port = find_available_port()
506 env = os.environ.copy()
507 env['ARVADOS_API_TOKEN'] = auth_token('anonymous')
508 logf = open(_fifo2stderr('keepproxy'), 'w')
509 kp = subprocess.Popen(
511 '-pid='+_pidfile('keepproxy'),
512 '-listen=:{}'.format(port)],
513 env=env, stdin=open('/dev/null'), stdout=logf, stderr=logf, close_fds=True)
517 host=os.environ['ARVADOS_API_HOST'],
518 token=auth_token('admin'),
520 for d in api.keep_services().list(
521 filters=[['service_type','=','proxy']]).execute()['items']:
522 api.keep_services().delete(uuid=d['uuid']).execute()
523 api.keep_services().create(body={'keep_service': {
524 'service_host': 'localhost',
525 'service_port': port,
526 'service_type': 'proxy',
527 'service_ssl_flag': False,
529 os.environ["ARVADOS_KEEP_SERVICES"] = "http://localhost:{}".format(port)
530 _setport('keepproxy', port)
531 _wait_until_port_listens(port)
533 def stop_keep_proxy():
534 if 'ARVADOS_TEST_PROXY_SERVICES' in os.environ:
536 kill_server_pid(_pidfile('keepproxy'))
538 def run_arv_git_httpd():
539 if 'ARVADOS_TEST_PROXY_SERVICES' in os.environ:
543 gitdir = os.path.join(SERVICES_SRC_DIR, 'api', 'tmp', 'git')
544 gitport = find_available_port()
545 env = os.environ.copy()
546 env.pop('ARVADOS_API_TOKEN', None)
547 logf = open(_fifo2stderr('arv-git-httpd'), 'w')
548 agh = subprocess.Popen(
550 '-repo-root='+gitdir+'/test',
551 '-address=:'+str(gitport)],
552 env=env, stdin=open('/dev/null'), stdout=logf, stderr=logf)
553 with open(_pidfile('arv-git-httpd'), 'w') as f:
554 f.write(str(agh.pid))
555 _setport('arv-git-httpd', gitport)
556 _wait_until_port_listens(gitport)
558 def stop_arv_git_httpd():
559 if 'ARVADOS_TEST_PROXY_SERVICES' in os.environ:
561 kill_server_pid(_pidfile('arv-git-httpd'))
564 if 'ARVADOS_TEST_PROXY_SERVICES' in os.environ:
568 keepwebport = find_available_port()
569 env = os.environ.copy()
570 env['ARVADOS_API_TOKEN'] = auth_token('anonymous')
571 logf = open(_fifo2stderr('keep-web'), 'w')
572 keepweb = subprocess.Popen(
575 '-attachment-only-host=download:'+str(keepwebport),
576 '-listen=:'+str(keepwebport)],
577 env=env, stdin=open('/dev/null'), stdout=logf, stderr=logf)
578 with open(_pidfile('keep-web'), 'w') as f:
579 f.write(str(keepweb.pid))
580 _setport('keep-web', keepwebport)
581 _wait_until_port_listens(keepwebport)
584 if 'ARVADOS_TEST_PROXY_SERVICES' in os.environ:
586 kill_server_pid(_pidfile('keep-web'))
589 if 'ARVADOS_TEST_PROXY_SERVICES' in os.environ:
593 nginxconf['KEEPWEBPORT'] = _getport('keep-web')
594 nginxconf['KEEPWEBDLSSLPORT'] = find_available_port()
595 nginxconf['KEEPWEBSSLPORT'] = find_available_port()
596 nginxconf['KEEPPROXYPORT'] = _getport('keepproxy')
597 nginxconf['KEEPPROXYSSLPORT'] = find_available_port()
598 nginxconf['GITPORT'] = _getport('arv-git-httpd')
599 nginxconf['GITSSLPORT'] = find_available_port()
600 nginxconf['WSPORT'] = _getport('ws')
601 nginxconf['WSSPORT'] = _getport('wss')
602 nginxconf['SSLCERT'] = os.path.join(SERVICES_SRC_DIR, 'api', 'tmp', 'self-signed.pem')
603 nginxconf['SSLKEY'] = os.path.join(SERVICES_SRC_DIR, 'api', 'tmp', 'self-signed.key')
604 nginxconf['ACCESSLOG'] = _fifo2stderr('nginx_access_log')
606 conftemplatefile = os.path.join(MY_DIRNAME, 'nginx.conf')
607 conffile = os.path.join(TEST_TMPDIR, 'nginx.conf')
608 with open(conffile, 'w') as f:
611 lambda match: str(nginxconf.get(match.group(1))),
612 open(conftemplatefile).read()))
614 env = os.environ.copy()
615 env['PATH'] = env['PATH']+':/sbin:/usr/sbin:/usr/local/sbin'
617 nginx = subprocess.Popen(
619 '-g', 'error_log stderr info;',
620 '-g', 'pid '+_pidfile('nginx')+';',
622 env=env, stdin=open('/dev/null'), stdout=sys.stderr)
623 _setport('keep-web-dl-ssl', nginxconf['KEEPWEBDLSSLPORT'])
624 _setport('keep-web-ssl', nginxconf['KEEPWEBSSLPORT'])
625 _setport('keepproxy-ssl', nginxconf['KEEPPROXYSSLPORT'])
626 _setport('arv-git-httpd-ssl', nginxconf['GITSSLPORT'])
629 if 'ARVADOS_TEST_PROXY_SERVICES' in os.environ:
631 kill_server_pid(_pidfile('nginx'))
633 def _pidfile(program):
634 return os.path.join(TEST_TMPDIR, program + '.pid')
636 def _portfile(program):
637 return os.path.join(TEST_TMPDIR, program + '.port')
639 def _setport(program, port):
640 with open(_portfile(program), 'w') as f:
643 # Returns 9 if program is not up.
644 def _getport(program):
646 return int(open(_portfile(program)).read())
651 global _cached_db_config
652 if not _cached_db_config:
653 _cached_db_config = yaml.load(open(os.path.join(
654 SERVICES_SRC_DIR, 'api', 'config', 'database.yml')))
655 return _cached_db_config['test'][key]
658 global _cached_config
660 return _cached_config[key]
661 def _load(f, required=True):
662 fullpath = os.path.join(SERVICES_SRC_DIR, 'api', 'config', f)
663 if not required and not os.path.exists(fullpath):
665 return yaml.load(fullpath)
666 cdefault = _load('application.default.yml')
667 csite = _load('application.yml', required=False)
669 for section in [cdefault.get('common',{}), cdefault.get('test',{}),
670 csite.get('common',{}), csite.get('test',{})]:
671 _cached_config.update(section)
672 return _cached_config[key]
675 '''load a fixture yaml file'''
676 with open(os.path.join(SERVICES_SRC_DIR, 'api', "test", "fixtures",
680 trim_index = yaml_file.index("# Test Helper trims the rest of the file")
681 yaml_file = yaml_file[0:trim_index]
684 return yaml.load(yaml_file)
686 def auth_token(token_name):
687 return fixture("api_client_authorizations")[token_name]["api_token"]
689 def authorize_with(token_name):
690 '''token_name is the symbolic name of the token from the api_client_authorizations fixture'''
691 arvados.config.settings()["ARVADOS_API_TOKEN"] = auth_token(token_name)
692 arvados.config.settings()["ARVADOS_API_HOST"] = os.environ.get("ARVADOS_API_HOST")
693 arvados.config.settings()["ARVADOS_API_HOST_INSECURE"] = "true"
695 class TestCaseWithServers(unittest.TestCase):
696 """TestCase to start and stop supporting Arvados servers.
698 Define any of MAIN_SERVER, KEEP_SERVER, and/or KEEP_PROXY_SERVER
699 class variables as a dictionary of keyword arguments. If you do,
700 setUpClass will start the corresponding servers by passing these
701 keyword arguments to the run, run_keep, and/or run_keep_server
702 functions, respectively. It will also set Arvados environment
703 variables to point to these servers appropriately. If you don't
704 run a Keep or Keep proxy server, setUpClass will set up a
705 temporary directory for Keep local storage, and set it as
708 tearDownClass will stop any servers started, and restore the
709 original environment.
714 KEEP_PROXY_SERVER = None
715 KEEP_WEB_SERVER = None
718 def _restore_dict(src, dest):
719 for key in dest.keys():
726 cls._orig_environ = os.environ.copy()
727 cls._orig_config = arvados.config.settings().copy()
728 cls._cleanup_funcs = []
729 os.environ.pop('ARVADOS_KEEP_SERVICES', None)
730 os.environ.pop('ARVADOS_EXTERNAL_CLIENT', None)
731 for server_kwargs, start_func, stop_func in (
732 (cls.MAIN_SERVER, run, reset),
733 (cls.WS_SERVER, run_ws, stop_ws),
734 (cls.KEEP_SERVER, run_keep, stop_keep),
735 (cls.KEEP_PROXY_SERVER, run_keep_proxy, stop_keep_proxy),
736 (cls.KEEP_WEB_SERVER, run_keep_web, stop_keep_web)):
737 if server_kwargs is not None:
738 start_func(**server_kwargs)
739 cls._cleanup_funcs.append(stop_func)
740 if (cls.KEEP_SERVER is None) and (cls.KEEP_PROXY_SERVER is None):
741 cls.local_store = tempfile.mkdtemp()
742 os.environ['KEEP_LOCAL_STORE'] = cls.local_store
743 cls._cleanup_funcs.append(
744 lambda: shutil.rmtree(cls.local_store, ignore_errors=True))
746 os.environ.pop('KEEP_LOCAL_STORE', None)
747 arvados.config.initialize()
750 def tearDownClass(cls):
751 for clean_func in cls._cleanup_funcs:
753 cls._restore_dict(cls._orig_environ, os.environ)
754 cls._restore_dict(cls._orig_config, arvados.config.settings())
757 if __name__ == "__main__":
760 'start_ws', 'stop_ws',
761 'start_keep', 'stop_keep',
762 'start_keep_proxy', 'stop_keep_proxy',
763 'start_keep-web', 'stop_keep-web',
764 'start_arv-git-httpd', 'stop_arv-git-httpd',
765 'start_nginx', 'stop_nginx',
767 parser = argparse.ArgumentParser()
768 parser.add_argument('action', type=str, help="one of {}".format(actions))
769 parser.add_argument('--auth', type=str, metavar='FIXTURE_NAME', help='Print authorization info for given api_client_authorizations fixture')
770 parser.add_argument('--num-keep-servers', metavar='int', type=int, default=2, help="Number of keep servers desired")
771 parser.add_argument('--keep-enforce-permissions', action="store_true", help="Enforce keep permissions")
773 args = parser.parse_args()
775 if args.action not in actions:
776 print("Unrecognized action '{}'. Actions are: {}.".
777 format(args.action, actions),
780 if args.action == 'start':
781 stop(force=('ARVADOS_TEST_API_HOST' not in os.environ))
782 run(leave_running_atexit=True)
783 host = os.environ['ARVADOS_API_HOST']
784 if args.auth is not None:
785 token = auth_token(args.auth)
786 print("export ARVADOS_API_TOKEN={}".format(pipes.quote(token)))
787 print("export ARVADOS_API_HOST={}".format(pipes.quote(host)))
788 print("export ARVADOS_API_HOST_INSECURE=true")
791 elif args.action == 'stop':
792 stop(force=('ARVADOS_TEST_API_HOST' not in os.environ))
793 elif args.action == 'start_ws':
795 elif args.action == 'stop_ws':
797 elif args.action == 'start_keep':
798 run_keep(enforce_permissions=args.keep_enforce_permissions, num_servers=args.num_keep_servers)
799 elif args.action == 'stop_keep':
800 stop_keep(num_servers=args.num_keep_servers)
801 elif args.action == 'start_keep_proxy':
803 elif args.action == 'stop_keep_proxy':
805 elif args.action == 'start_arv-git-httpd':
807 elif args.action == 'stop_arv-git-httpd':
809 elif args.action == 'start_keep-web':
811 elif args.action == 'stop_keep-web':
813 elif args.action == 'start_nginx':
815 elif args.action == 'stop_nginx':
818 raise Exception("action recognized but not implemented!?")