You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
2896 lines
106 KiB
2896 lines
106 KiB
#include <windows.h>
|
|
#include <stdlib.h>
|
|
#include <stdio.h>
|
|
#include <conio.h>
|
|
#include <string.h>
|
|
#include <winsock.h>
|
|
#include <tchar.h>
|
|
#include <iphlpapi.h>
|
|
|
|
|
|
#include "wlbsctrl.h"
|
|
#include "wlbsparm.h"
|
|
#include "wlbsiocl.h"
|
|
|
|
#define BUF_SIZE 256
|
|
|
|
typedef enum
|
|
{
|
|
init,
|
|
query,
|
|
suspend,
|
|
resume,
|
|
wlbsstart,
|
|
stop,
|
|
drainstop,
|
|
enable,
|
|
disable,
|
|
drain,
|
|
resolve,
|
|
addresstostring,
|
|
addresstoname,
|
|
readreg,
|
|
writereg,
|
|
commit,
|
|
getnumportrules,
|
|
enumportrules,
|
|
getportrule,
|
|
addportrule,
|
|
deleteportrule,
|
|
setpassword,
|
|
portset,
|
|
destinationset,
|
|
timeoutset,
|
|
codeset
|
|
}
|
|
TEST_COMMAND;
|
|
|
|
PTCHAR ErrStrings [] = {_TEXT("Init"),
|
|
_TEXT("Query"),
|
|
_TEXT("Suspend"),
|
|
_TEXT("Resume"),
|
|
_TEXT("Start"),
|
|
_TEXT("Stop"),
|
|
_TEXT("DrainStop"),
|
|
_TEXT("Enable"),
|
|
_TEXT("Disable"),
|
|
_TEXT("Drain"),
|
|
_TEXT("Resolve"),
|
|
_TEXT("AddressToString"),
|
|
_TEXT("AddressToName"),
|
|
_TEXT("ReadReg"),
|
|
_TEXT("WriteReg"),
|
|
_TEXT("Commit"),
|
|
_TEXT("GetNumPortRules"),
|
|
_TEXT("EnumPortRules"),
|
|
_TEXT("GetPortRule"),
|
|
_TEXT("AddPortRule"),
|
|
_TEXT("SetPassword"),
|
|
_TEXT("PortSet"),
|
|
_TEXT("DestinationSet"),
|
|
_TEXT("TimeoutSet"),
|
|
_TEXT("CodeSet"),
|
|
};
|
|
|
|
typedef struct Err_Struct
|
|
{
|
|
struct Err_Struct * next;
|
|
TCHAR comment [BUF_SIZE];
|
|
}
|
|
Err_Struct, * PErr_Struct;
|
|
|
|
static global_init = WLBS_INIT_ERROR;
|
|
static PErr_Struct headq = NULL, tailq = NULL;
|
|
static total_tests = 0;
|
|
static failed_tests = 0;
|
|
static TCHAR remote_password [BUF_SIZE];
|
|
static TCHAR tbuf [BUF_SIZE];
|
|
static TCHAR status_buf [BUF_SIZE];
|
|
static BOOL verbose = FALSE;
|
|
static remote_cl_ip = 0;
|
|
static remote_host_ip = 0;
|
|
static BOOL remote_test = FALSE;
|
|
static BOOL local_test = FALSE;
|
|
static BOOL init_test = FALSE;
|
|
static BOOL version_nt4 = FALSE;
|
|
static timeout = 1000; /* 1 second by default */
|
|
|
|
void print_error_messages ();
|
|
/* This function adds a error message to the list of error messages.
|
|
* This list will be displayed at the end.
|
|
*/
|
|
void add_error (PTCHAR errmsg)
|
|
{
|
|
PErr_Struct err = (PErr_Struct) malloc (sizeof (Err_Struct));
|
|
|
|
total_tests ++;
|
|
failed_tests++;
|
|
_tcscpy (err -> comment, errmsg);
|
|
err -> next = NULL;
|
|
|
|
if (tailq == NULL)
|
|
headq = tailq = err;
|
|
else
|
|
{
|
|
tailq -> next = err;
|
|
tailq = err;
|
|
}
|
|
|
|
if (verbose)
|
|
_tprintf (_TEXT("%s\n"), err -> comment);
|
|
|
|
return;
|
|
}
|
|
|
|
|
|
/* Compares the expected value with the actual returned value and generates an error message
|
|
* which gets appended to the list of error messages
|
|
*/
|
|
void verify_return_value (PTCHAR string, DWORD expected, DWORD actual)
|
|
{
|
|
|
|
TCHAR tbuf [BUF_SIZE];
|
|
|
|
|
|
if (verbose)
|
|
_tprintf( _TEXT("%s %s\n"), status_buf, string);
|
|
else
|
|
{
|
|
putchar (8);
|
|
putchar (8);
|
|
putchar (8);
|
|
putchar (8);
|
|
printf("%4d", total_tests);
|
|
}
|
|
|
|
if (expected == actual)
|
|
{
|
|
total_tests ++;
|
|
return;
|
|
}
|
|
|
|
_stprintf ( tbuf, _TEXT("Test Number %d %s Testing %s Expected %d Returned %d"),
|
|
total_tests, status_buf, string, expected, actual);
|
|
|
|
add_error (tbuf);
|
|
return;
|
|
}
|
|
|
|
|
|
/* When two return values are possible, such as WLBS_CONVERGED or WLBS_DEFAULT */
|
|
void verify_return_value2 (PTCHAR string, DWORD expected1, DWORD expected2, DWORD actual)
|
|
{
|
|
|
|
if (verbose)
|
|
_tprintf( _TEXT("%s %s\n"), status_buf, string);
|
|
|
|
if (expected1 == actual || expected2 == actual)
|
|
{
|
|
total_tests ++;
|
|
return;
|
|
}
|
|
|
|
_stprintf ( tbuf, _TEXT("Test Number %d %s Testing %s Expected %d or %d Returned %d"),
|
|
total_tests, status_buf, string, expected1, expected2, actual);
|
|
|
|
add_error (tbuf);
|
|
return;
|
|
}
|
|
|
|
|
|
void verify_return_value3 (PTCHAR string, DWORD expected1, DWORD expected2, DWORD expected3, DWORD actual)
|
|
{
|
|
|
|
if (verbose)
|
|
_tprintf( _TEXT("%s %s\n"), status_buf, string);
|
|
|
|
if (expected1 == actual || expected2 == actual || expected3 == actual)
|
|
{
|
|
total_tests ++;
|
|
return;
|
|
}
|
|
|
|
_stprintf ( tbuf, _TEXT("Test Number %d %s Testing %s Expected %d or %d or %d Returned %d"),
|
|
total_tests, status_buf, string, expected1, expected2, expected3, actual);
|
|
|
|
add_error (tbuf);
|
|
return;
|
|
}
|
|
|
|
|
|
/* This function calls all the apis without calling init
|
|
* Each of the apis should return WLBS_INIT_ERROR */
|
|
void check_init()
|
|
{
|
|
TEST_COMMAND cmd;
|
|
WLBS_REG_PARAMS reg_data;
|
|
WLBS_PORT_RULE port_rule;
|
|
WLBS_PORT_RULE port_rules [WLBS_MAX_RULES];
|
|
DWORD num = WLBS_MAX_RULES;
|
|
DWORD status, status1;
|
|
|
|
|
|
_tcscpy (status_buf, _TEXT("Calling the apis without Initializing"));
|
|
|
|
status = WlbsQuery(WLBS_LOCAL_CLUSTER,WLBS_LOCAL_HOST,NULL,NULL,NULL,NULL);
|
|
verify_return_value (_TEXT("Query"), WLBS_INIT_ERROR, status);
|
|
|
|
status = WlbsSuspend(WLBS_LOCAL_CLUSTER,WLBS_LOCAL_HOST,NULL,NULL);
|
|
verify_return_value (_TEXT("Suspend"), WLBS_INIT_ERROR, status);
|
|
|
|
status = WlbsResume(WLBS_LOCAL_CLUSTER,WLBS_LOCAL_HOST,NULL,NULL);
|
|
verify_return_value (_TEXT("Resume"), WLBS_INIT_ERROR, status);
|
|
|
|
status = WlbsStart(WLBS_LOCAL_CLUSTER,WLBS_LOCAL_HOST,NULL,NULL);
|
|
verify_return_value (_TEXT("Start"), WLBS_INIT_ERROR, status);
|
|
|
|
status = WlbsStop(WLBS_LOCAL_CLUSTER,WLBS_LOCAL_HOST,NULL,NULL);
|
|
verify_return_value (_TEXT("Stop"), WLBS_INIT_ERROR, status);
|
|
|
|
status = WlbsDrainStop(WLBS_LOCAL_CLUSTER,WLBS_LOCAL_HOST,NULL,NULL);
|
|
verify_return_value (_TEXT("DrainStop"), WLBS_INIT_ERROR, status);
|
|
|
|
status = WlbsEnable(WLBS_LOCAL_CLUSTER,WLBS_LOCAL_HOST,NULL,NULL,80);
|
|
verify_return_value (_TEXT("Enable"), WLBS_INIT_ERROR, status);
|
|
|
|
status = WlbsDisable(WLBS_LOCAL_CLUSTER,WLBS_LOCAL_HOST,NULL,NULL,80);
|
|
verify_return_value (_TEXT("Disable"), WLBS_INIT_ERROR, status);
|
|
|
|
status = WlbsDrain(WLBS_LOCAL_CLUSTER,WLBS_LOCAL_HOST,NULL,NULL,80);
|
|
verify_return_value (_TEXT("Drain"), WLBS_INIT_ERROR, status);
|
|
|
|
status = WlbsReadReg(WLBS_LOCAL_CLUSTER,WLBS_LOCAL_HOST, ®_data);
|
|
verify_return_value (_TEXT("ReadReg"), WLBS_INIT_ERROR, status);
|
|
|
|
status = WlbsWriteReg(WLBS_LOCAL_CLUSTER,WLBS_LOCAL_HOST, ®_data);
|
|
verify_return_value (_TEXT("WriteReg"), WLBS_INIT_ERROR, status);
|
|
|
|
status = WlbsCommitChanges(WLBS_LOCAL_CLUSTER,WLBS_LOCAL_HOST);
|
|
verify_return_value (_TEXT("CommitChanges"), WLBS_INIT_ERROR, status);
|
|
|
|
status = WlbsGetNumPortRules(®_data);
|
|
verify_return_value (_TEXT("GetNumPortRules"), WLBS_INIT_ERROR, status);
|
|
|
|
status = WlbsEnumPortRules(®_data, port_rules, &num);
|
|
verify_return_value (_TEXT("EnumPortRules"), WLBS_INIT_ERROR, status);
|
|
|
|
status = WlbsGetPortRule(®_data, 80, &port_rule);
|
|
verify_return_value (_TEXT("GetPortRule"), WLBS_INIT_ERROR, status);
|
|
|
|
status = WlbsAddPortRule(®_data, &port_rule);
|
|
verify_return_value (_TEXT("AddPortRule"), WLBS_INIT_ERROR, status);
|
|
|
|
status = WlbsDeletePortRule (®_data, 80);
|
|
verify_return_value (_TEXT("DeletePortRule"), WLBS_INIT_ERROR, status);
|
|
|
|
/* With an invalid product name, init returns REMOTE_ONLY
|
|
* On subsequent calls, it will return the same value.
|
|
* Hence this test has to be performed in isolation
|
|
*/
|
|
if (init_test)
|
|
{
|
|
status = WlbsInit (_TEXT("JunkName"), WLBS_API_VER, NULL);
|
|
verify_return_value2 (_TEXT("Init with junk product name"), WLBS_INIT_ERROR, WLBS_REMOTE_ONLY, status);
|
|
return;
|
|
}
|
|
|
|
status = WlbsInit (_TEXT(WLBS_PRODUCT_NAME), WLBS_API_VER, NULL);
|
|
verify_return_value3 (_TEXT("Init"), WLBS_PRESENT, WLBS_REMOTE_ONLY, WLBS_LOCAL_ONLY, status);
|
|
|
|
status1 = WlbsInit (_TEXT(WLBS_PRODUCT_NAME), WLBS_API_VER, NULL);
|
|
verify_return_value (_TEXT("Init Again"), status, status1);
|
|
|
|
global_init = status;
|
|
return;
|
|
}
|
|
|
|
|
|
/* This function brings a particular host to the converged state.
|
|
* This is done by first suspending the host and then resuming
|
|
* and starting it. Wait till the cluster converges and then return
|
|
*/
|
|
BOOL GetHostToConvergedState (DWORD cluster, DWORD host)
|
|
{
|
|
DWORD status;
|
|
/* suspend the host and then do a resume and start to get it to converged state */
|
|
|
|
status = WlbsSuspend (cluster, host, NULL, NULL);
|
|
if (!(status == WLBS_OK || status == WLBS_ALREADY || status == WLBS_STOPPED))
|
|
return FALSE;
|
|
|
|
status = WlbsResume (cluster, host, NULL, NULL);
|
|
if (status != WLBS_OK)
|
|
return FALSE;
|
|
|
|
status = WlbsStart (cluster, host, NULL, NULL);
|
|
if (status != WLBS_OK)
|
|
return FALSE;
|
|
|
|
Sleep(10000); /* Wait for 10 seconds till it converges */
|
|
|
|
status = WlbsQuery (cluster, host, NULL, NULL, NULL, NULL);
|
|
if (status == WLBS_CONVERGED || status == WLBS_DEFAULT)
|
|
return TRUE;
|
|
else
|
|
return FALSE;
|
|
}
|
|
|
|
|
|
/* This function gets all the hosts on a given cluster to the converged state */
|
|
BOOL GetClusterToConvergedState (DWORD cluster)
|
|
{
|
|
/* suspend the entire cluster
|
|
* resume the entire cluster
|
|
* start the entire cluster
|
|
* wait for convergence
|
|
* Query should return the number of active hosts
|
|
*/
|
|
DWORD status;
|
|
|
|
/* Set the timeout so that this process gets speeded up */
|
|
if (cluster == WLBS_LOCAL_CLUSTER)
|
|
WlbsTimeoutSet (WlbsGetLocalClusterAddress (), 2000);
|
|
else
|
|
WlbsTimeoutSet (cluster, 2000);
|
|
|
|
status = WlbsSuspend (cluster, WLBS_ALL_HOSTS, NULL, NULL);
|
|
status = WlbsResume (cluster, WLBS_ALL_HOSTS, NULL, NULL);
|
|
status = WlbsStart (cluster, WLBS_ALL_HOSTS, NULL, NULL);
|
|
Sleep (10000);
|
|
status = WlbsQuery (cluster, WLBS_ALL_HOSTS, NULL, NULL, NULL, NULL);
|
|
|
|
if (status == WLBS_BAD_PASSW)
|
|
printf("Please ensure that the password on all the machines is the same\n");
|
|
|
|
/* Restore it to the default value */
|
|
if (cluster == WLBS_LOCAL_CLUSTER)
|
|
WlbsTimeoutSet (WlbsGetLocalClusterAddress (), 0);
|
|
else
|
|
WlbsTimeoutSet (cluster, 0);
|
|
|
|
if ( 1 <= status && status <= WLBS_MAX_HOSTS)
|
|
return TRUE;
|
|
else
|
|
return FALSE;
|
|
}
|
|
|
|
|
|
/* This function goes through the response array and verifies that for each host that is converged,
|
|
* the corresponding bit in the hostmap is set.
|
|
* This function is useful only when the response array is from a converged cluster
|
|
*/
|
|
BOOL verify_hostmap_response (PWLBS_RESPONSE response, DWORD num_response, DWORD host_map)
|
|
{
|
|
DWORD i,j;
|
|
|
|
|
|
/* For each response, if the host is converged or is the default host, then it should
|
|
* figure in the hostmap. Verify this.
|
|
*/
|
|
/* This function should be invoked only when the response array is from a converged cluster.
|
|
* or from a single host, when it is converged
|
|
*/
|
|
for (i = 0; i < num_response; i++)
|
|
{
|
|
if (response [i] . status == WLBS_CONVERGED || response [i] . status == WLBS_DEFAULT)
|
|
{
|
|
if ( ! ( host_map & (1 << (response [i] . id - 1))) )
|
|
return FALSE;
|
|
}
|
|
else /* That particular bit should not be set */
|
|
{
|
|
if ( host_map & (1 << (response [i] . id - 1)) )
|
|
return FALSE;
|
|
}
|
|
}
|
|
|
|
return TRUE;
|
|
}
|
|
|
|
|
|
/* Verify that all the responses show the same state. This is used in cluster-wide control tests.
|
|
* If the cluster is reported to be suspended, then all the hosts should show their status
|
|
* to be WLBS_SUSPENDED
|
|
*/
|
|
void verify_response_status (PWLBS_RESPONSE response, DWORD num_host, DWORD expected_status)
|
|
{
|
|
DWORD i;
|
|
TCHAR temp [40];
|
|
|
|
for (i = 0 ; i < num_host; i++)
|
|
{
|
|
_stprintf (temp, _TEXT("Verifying response for host %d"), response [i] . id);
|
|
verify_return_value2 ( temp, expected_status, WLBS_ALREADY, response [i] . status);
|
|
}
|
|
}
|
|
|
|
|
|
/* This function opens a TCP connection to the cluster ip on the specified port.
|
|
* This function is used to test Drainstop
|
|
*/
|
|
SOCKET OpenConnection (DWORD cluster, DWORD port)
|
|
{
|
|
|
|
SOCKET sock = INVALID_SOCKET;
|
|
SOCKADDR_IN caddr, saddr;
|
|
INT ret;
|
|
|
|
sock = socket (AF_INET, SOCK_STREAM, 0);
|
|
|
|
if (sock == INVALID_SOCKET)
|
|
return sock;
|
|
|
|
caddr . sin_family = AF_INET;
|
|
caddr . sin_port = htons (0);
|
|
caddr . sin_addr . s_addr = htonl (INADDR_ANY);
|
|
|
|
ret = bind (sock, (LPSOCKADDR) & caddr, sizeof (caddr));
|
|
|
|
if (ret == SOCKET_ERROR)
|
|
{
|
|
closesocket (sock);
|
|
return INVALID_SOCKET;
|
|
}
|
|
|
|
/* setup server's address */
|
|
|
|
saddr . sin_family = AF_INET;
|
|
saddr . sin_port = htons ((USHORT)port);
|
|
saddr . sin_addr . s_addr = cluster;
|
|
|
|
ret = connect (sock, (LPSOCKADDR) & saddr, sizeof (saddr));
|
|
if (ret == SOCKET_ERROR)
|
|
{
|
|
closesocket (sock);
|
|
return INVALID_SOCKET;
|
|
}
|
|
|
|
return sock;
|
|
}
|
|
|
|
|
|
/* This function performs the password testing. The same function can be used for single host
|
|
* or cluster-wide testing.
|
|
*/
|
|
void password_test (DWORD cluster, DWORD host, PTCHAR password)
|
|
{
|
|
DWORD status1;
|
|
|
|
/* The input password is the correct password */
|
|
_stprintf (status_buf, _TEXT("Password test for cluster %d host %d"), cluster, host);
|
|
|
|
/* If the password is null, then return,since password testing cannot be performed. */
|
|
if (password == NULL)
|
|
return;
|
|
|
|
/* If it is an empty string, then again the testing cannot be performed */
|
|
if (_tcslen (password) == 0)
|
|
return;
|
|
|
|
WlbsPasswordSet(cluster, _TEXT("JunkPassword"));
|
|
|
|
/* All commands should return bad passw */
|
|
status1 = WlbsQuery (cluster, host, NULL, NULL, NULL, NULL);
|
|
verify_return_value (_TEXT("Query"), WLBS_BAD_PASSW, status1);
|
|
|
|
status1 = WlbsDrain (cluster, host, NULL, NULL, 80);
|
|
verify_return_value (_TEXT("Drain"), WLBS_BAD_PASSW, status1);
|
|
|
|
status1 = WlbsDisable (cluster, host, NULL, NULL, 80);
|
|
verify_return_value (_TEXT("Disable"), WLBS_BAD_PASSW, status1);
|
|
|
|
status1 = WlbsEnable (cluster, host, NULL, NULL, 80);
|
|
verify_return_value (_TEXT("Enable"), WLBS_BAD_PASSW, status1);
|
|
|
|
status1 = WlbsSuspend (cluster, host, NULL, NULL);
|
|
verify_return_value (_TEXT("Suspend"), WLBS_BAD_PASSW, status1);
|
|
|
|
status1 = WlbsResume (cluster, host, NULL, NULL);
|
|
verify_return_value (_TEXT("Resume"), WLBS_BAD_PASSW, status1);
|
|
|
|
status1 = WlbsStop (cluster, host, NULL, NULL);
|
|
verify_return_value (_TEXT("Stop"), WLBS_BAD_PASSW, status1);
|
|
|
|
status1 = WlbsDrainStop (cluster, host, NULL, NULL);
|
|
verify_return_value (_TEXT("Drainstop"), WLBS_BAD_PASSW, status1);
|
|
|
|
status1 = WlbsStart (cluster, host, NULL, NULL);
|
|
verify_return_value (_TEXT("Start"), WLBS_BAD_PASSW, status1);
|
|
|
|
WlbsPasswordSet (cluster, password); /* Reset the password for future tests */
|
|
Sleep (10000); /* Wait till the cluster converges */
|
|
return;
|
|
}
|
|
|
|
|
|
/* This function verifies the portset api.
|
|
* It sets the port for a given cluster and makes a query on the host
|
|
* The return value should match the expected value, which can be either
|
|
* WLBS_TIMEOUT or some WINSOCK error in case of an invalid port
|
|
* or the status of the host if the port is a valid one
|
|
*/
|
|
void verify_port (DWORD cluster, DWORD host, DWORD port, DWORD expected)
|
|
{
|
|
DWORD status;
|
|
TCHAR temp [BUF_SIZE];
|
|
|
|
WlbsPortSet (cluster, (WORD)port);
|
|
status = WlbsQuery (cluster, host, NULL, NULL, NULL, NULL);
|
|
|
|
_stprintf (temp, _TEXT("Verifying port set for port %d"), port);
|
|
verify_return_value (temp, expected, status);
|
|
return;
|
|
}
|
|
|
|
|
|
/* Get the cluster/host to drainstopped state by establishing a connection and then drainstopping it */
|
|
BOOL GetDrainstopState (DWORD cluster, DWORD host, SOCKET * sock, DWORD port)
|
|
{
|
|
DWORD status;
|
|
BOOL connected = FALSE;
|
|
|
|
/* First, get the cluster or host to the converged state */
|
|
if (host == WLBS_ALL_HOSTS)
|
|
{
|
|
if (!GetClusterToConvergedState (cluster))
|
|
return FALSE;
|
|
}
|
|
else if (!GetHostToConvergedState (cluster, host))
|
|
return FALSE;
|
|
|
|
/* Open a TCP connection on the specified port */
|
|
*sock = OpenConnection (cluster, port);
|
|
if (*sock == INVALID_SOCKET)
|
|
{
|
|
add_error(_TEXT("Unable to open a connection to the cluster"));
|
|
return FALSE;
|
|
}
|
|
|
|
/* DrainStop the host and then query it. If the status is not draining, something is wrong */
|
|
status = WlbsDrainStop (cluster, host, NULL, NULL);
|
|
verify_return_value (_TEXT("Drainstop with active connection"), WLBS_OK, status);
|
|
Sleep (10000); /* Wait for the cluster to converge */
|
|
|
|
status = WlbsQuery (cluster, host, NULL, NULL, NULL, NULL);
|
|
verify_return_value (_TEXT("Query after Drainstop with active connection"), WLBS_DRAINING, status);
|
|
|
|
if (status != WLBS_DRAINING)
|
|
return FALSE;
|
|
|
|
return TRUE;
|
|
}
|
|
|
|
|
|
/* This function deals with the parameter testing of the apis on a single host */
|
|
void single_host_parameter_test (DWORD cluster, DWORD host)
|
|
{
|
|
DWORD status1, status2;
|
|
DWORD host_map1, host_map2;
|
|
DWORD num_host1, num_host2;
|
|
WLBS_RESPONSE response1, response2, *response;
|
|
DWORD cl_ip, host_ip, host_id;
|
|
TCHAR temp1[40], temp2[40];
|
|
DWORD temp;
|
|
|
|
|
|
temp = 40;
|
|
if (cluster == WLBS_LOCAL_CLUSTER)
|
|
_stprintf (temp1, _TEXT("local cluster"));
|
|
else
|
|
WlbsAddressToString (cluster, temp1, &temp);
|
|
|
|
temp = 40;
|
|
if (cluster == WLBS_LOCAL_HOST)
|
|
_stprintf (temp2, _TEXT("local host"));
|
|
else
|
|
WlbsAddressToString (host, temp2, &temp);
|
|
|
|
_stprintf (status_buf, _TEXT("Single Host Parameter Test for cluster:%s host:%s"), temp1, temp2);
|
|
|
|
/* First verify that the response structure and the returned value match */
|
|
num_host1 = 1;
|
|
host_map1 = 0;
|
|
status1 = WlbsQuery (cluster, host, &response1, &num_host1, &host_map1, NULL);
|
|
|
|
if ( ! verify_hostmap_response (&response1, num_host1, host_map1) )
|
|
{
|
|
_stprintf (tbuf, _TEXT("Querying cluster %d, host %d, returned mismatched hostmap and response"),
|
|
cluster, host);
|
|
add_error (tbuf);
|
|
}
|
|
|
|
if (cluster == WLBS_LOCAL_CLUSTER && host == WLBS_LOCAL_HOST)
|
|
{
|
|
/* On a local host, there can be additional tests. Query the host remotely and verify that
|
|
* both the local and remote queries return the same status, the same id and the same hostmap
|
|
*/
|
|
cl_ip = WlbsGetLocalClusterAddress ();
|
|
host_ip = WlbsGetDedicatedAddress ();
|
|
host_id = response1 . id;
|
|
|
|
/* Query remotely first using the host ip */
|
|
num_host2 = 1;
|
|
host_map2 = 0;
|
|
status2 = WlbsQuery (cl_ip, host_ip, &response2, &num_host2, &host_map2, NULL);
|
|
verify_return_value (_TEXT("Comparing Local and Remote Query"), status1, status2);
|
|
|
|
if (host_map1 != host_map2)
|
|
{
|
|
_stprintf (tbuf, _TEXT("Local host query and remote host query returned different hostmaps %d %d\n"),
|
|
host_map1, host_map2);
|
|
add_error (tbuf);
|
|
}
|
|
|
|
if (response1 . status != response2 . status)
|
|
{
|
|
_stprintf (tbuf, _TEXT("Local host query and remote query returned different statuses in response"));
|
|
add_error (tbuf);
|
|
}
|
|
|
|
if (response1 . id != response2 . id)
|
|
{
|
|
_stprintf (tbuf, _TEXT("Local host query and remote query returned different ids in response"));
|
|
add_error (tbuf);
|
|
}
|
|
|
|
if (response2 . address != host_ip )
|
|
{
|
|
_stprintf (tbuf, _TEXT("Local host query and remote query returned different IP Addresses"));
|
|
add_error (tbuf);
|
|
}
|
|
|
|
|
|
/* Now query the host remotely using the host_id as a parameter and verify the returns */
|
|
num_host2 = 1;
|
|
status2 = WlbsQuery (WLBS_LOCAL_CLUSTER, host_id, &response2, &num_host2, &host_map2, NULL);
|
|
verify_return_value (_TEXT("Querying remotely with host id"), status1, status2);
|
|
|
|
if (host_map1 != host_map2)
|
|
{
|
|
_stprintf (tbuf, _TEXT("Local host query and remote host query with id returned different hostmaps %d %d\n"),
|
|
host_map1, host_map2);
|
|
add_error (tbuf);
|
|
}
|
|
|
|
if (response1 . status != response2 . status)
|
|
{
|
|
_stprintf (tbuf, _TEXT("Local host query and remote query with id returned different statuses in response"));
|
|
add_error (tbuf);
|
|
}
|
|
|
|
if (response1 . id != response2 . id)
|
|
{
|
|
_stprintf (tbuf, _TEXT("Local host query and remote query with id returned different ids in response"));
|
|
add_error (tbuf);
|
|
}
|
|
|
|
if (response2 . address != host_ip )
|
|
{
|
|
_stprintf (tbuf, _TEXT("Local host query and remote query returned different IP Addresses"));
|
|
add_error (tbuf);
|
|
}
|
|
}
|
|
|
|
status2 = WlbsQuery (cluster, host, NULL, NULL, NULL, NULL);
|
|
verify_return_value (_TEXT("Querying with all parameters NULL"), status1, status2);
|
|
|
|
num_host2 = 0;
|
|
status2 = WlbsQuery (cluster, host, NULL, &num_host2, NULL, NULL);
|
|
verify_return_value (_TEXT("Querying with num_host parameter = 0 and host_map = NULL"), status1, status2);
|
|
|
|
status2 = WlbsQuery (1234, 0, NULL, NULL, NULL, NULL);
|
|
verify_return_value (_TEXT("Querying non-existent cluster 1234"), WLBS_TIMEOUT, status2);
|
|
|
|
status2 = WlbsQuery (cluster, 33, NULL, NULL, NULL, NULL);
|
|
verify_return_value (_TEXT("Querying non-existent host 33"), WLBS_TIMEOUT, status2);
|
|
|
|
/* Verify the portset command, only for remote queries
|
|
* since the remote port is not used for local queries
|
|
*/
|
|
if (! ( cluster == WLBS_LOCAL_CLUSTER && host == WLBS_LOCAL_HOST ) )
|
|
{
|
|
verify_port (cluster, host, 3000, WLBS_TIMEOUT);
|
|
verify_port (cluster, host, 0, status1);
|
|
verify_port (cluster, host, CVY_DEF_RCT_PORT, status1);
|
|
}
|
|
|
|
return;
|
|
}
|
|
|
|
|
|
/* This function goes through the state changes of for single host operations */
|
|
void single_host_state_changes (DWORD cluster, DWORD host)
|
|
{
|
|
DWORD status1, status2;
|
|
WLBS_RESPONSE response [WLBS_MAX_HOSTS];
|
|
DWORD num_host1, num_host2;
|
|
DWORD host_map1, host_map2;
|
|
SOCKET sock = INVALID_SOCKET;
|
|
DWORD temp_address;
|
|
TCHAR temp1[40], temp2[40];
|
|
DWORD temp;
|
|
|
|
/* Assume that the host is in the converged state now */
|
|
|
|
temp = 40;
|
|
if (cluster == WLBS_LOCAL_CLUSTER)
|
|
_stprintf (temp1, _TEXT("local cluster"));
|
|
else
|
|
WlbsAddressToString (cluster, temp1, &temp);
|
|
|
|
temp = 40;
|
|
if (cluster == WLBS_LOCAL_HOST)
|
|
_stprintf (temp2, _TEXT("local host"));
|
|
else
|
|
WlbsAddressToString (host, temp2, &temp);
|
|
|
|
|
|
_stprintf (status_buf, _TEXT("Single Host State Changes cluster %s host %s"), temp1, temp2);
|
|
|
|
/* Call each of the apis and verify that the return values are consistent with the current
|
|
* state of the host. For example, Disable would return different values depending on whether
|
|
* the host was suspended or converged ....
|
|
*/
|
|
num_host1 = 1;
|
|
status1 = WlbsQuery (cluster, host, response, &num_host1, &host_map1, NULL);
|
|
verify_return_value2 (_TEXT("Query"), WLBS_CONVERGED, WLBS_DEFAULT, status1);
|
|
|
|
/* The following tests assume that there is a port rule for port number 80.
|
|
* Otherwise the return code will be WLBS_NOT_FOUND.
|
|
*/
|
|
num_host1 = 1;
|
|
status2 = WlbsDisable (cluster, host, response, &num_host1, 80);
|
|
verify_return_value (_TEXT("Disable 80"), WLBS_OK, status2);
|
|
if (status2 == WLBS_NOT_FOUND)
|
|
printf("Please ensure that a port rule exists for port number 80.\n");
|
|
|
|
num_host1 = 1;
|
|
status2 = WlbsDisable (cluster, host, response, &num_host1, 80);
|
|
verify_return_value (_TEXT("Disable Again 80"), WLBS_ALREADY, status2);
|
|
|
|
/* If a port rule is disabled, drain returns already */
|
|
num_host1 = 1;
|
|
status2 = WlbsDrain (cluster, host, response, &num_host1, 80);
|
|
verify_return_value (_TEXT("Drain 80"), WLBS_ALREADY, status2);
|
|
|
|
num_host1 = 1;
|
|
status2 = WlbsEnable (cluster, host, response, &num_host1, 80);
|
|
verify_return_value (_TEXT("Enable 80"), WLBS_OK, status2);
|
|
|
|
num_host1 = 1;
|
|
status2 = WlbsEnable (cluster, host, response, &num_host1, 80);
|
|
verify_return_value (_TEXT("Enable Again 80"), WLBS_ALREADY, status2);
|
|
|
|
num_host1 = 1;
|
|
status2 = WlbsDisable (cluster, host, response, &num_host1, WLBS_ALL_PORTS);
|
|
verify_return_value (_TEXT("Disable ALL"), WLBS_OK, status2);
|
|
|
|
num_host1 = 1;
|
|
status2 = WlbsDisable (cluster, host, response, &num_host1, WLBS_ALL_PORTS);
|
|
verify_return_value (_TEXT("Disable Again ALL"), WLBS_ALREADY, status2);
|
|
|
|
num_host1 = 1;
|
|
status2 = WlbsDrain (cluster, host, response, &num_host1, WLBS_ALL_PORTS);
|
|
verify_return_value (_TEXT("Drain ALL"), WLBS_ALREADY, status2);
|
|
|
|
num_host1 = 1;
|
|
status2 = WlbsEnable (cluster, host, response, &num_host1, WLBS_ALL_PORTS);
|
|
verify_return_value (_TEXT("Enable ALL"), WLBS_OK, status2);
|
|
|
|
num_host1 = 1;
|
|
status2 = WlbsEnable (cluster, host, response, &num_host1, WLBS_ALL_PORTS);
|
|
verify_return_value (_TEXT("Enable Again ALL"), WLBS_ALREADY, status2);
|
|
|
|
num_host1 = 1;
|
|
status2 = WlbsSuspend (cluster, host, response, &num_host1);
|
|
verify_return_value (_TEXT("Suspend"), WLBS_STOPPED, status2);
|
|
|
|
num_host1 = 1;
|
|
status2 = WlbsQuery (cluster, host, response, &num_host1, &host_map1, NULL);
|
|
verify_return_value (_TEXT("Query after Suspend"), WLBS_SUSPENDED, status2);
|
|
|
|
num_host1 = 1;
|
|
status2 = WlbsDrain (cluster, host, response, &num_host1, 80);
|
|
verify_return_value (_TEXT("Drain after Suspend"), WLBS_SUSPENDED, status2);
|
|
|
|
num_host1 = 1;
|
|
status2 = WlbsDisable (cluster, host, response, &num_host1, 80);
|
|
verify_return_value (_TEXT("Disable after Suspend"), WLBS_SUSPENDED, status2);
|
|
|
|
num_host1 = 1;
|
|
status2 = WlbsEnable (cluster, host, response, &num_host1, 80);
|
|
verify_return_value (_TEXT("Enable after Suspend"), WLBS_SUSPENDED, status2);
|
|
|
|
num_host1 = 1;
|
|
status2 = WlbsSuspend (cluster, host, response, &num_host1);
|
|
verify_return_value (_TEXT("Suspend Again"), WLBS_ALREADY, status2);
|
|
|
|
num_host1 = 1;
|
|
status2 = WlbsStop (cluster, host, response, &num_host1);
|
|
verify_return_value (_TEXT("Stop after Suspend"), WLBS_SUSPENDED, status2);
|
|
|
|
num_host1 = 1;
|
|
status2 = WlbsStart (cluster, host, response, &num_host1);
|
|
verify_return_value (_TEXT("Start after Suspend"), WLBS_SUSPENDED, status2);
|
|
|
|
num_host1 = 1;
|
|
status2 = WlbsDrainStop (cluster, host, response, &num_host1);
|
|
verify_return_value (_TEXT("DrainStop after Suspend"), WLBS_SUSPENDED, status2);
|
|
|
|
num_host1 = 1;
|
|
status2 = WlbsResume (cluster, host, response, &num_host1);
|
|
verify_return_value (_TEXT("Resume after Suspend"), WLBS_OK, status2);
|
|
|
|
num_host1 = 1;
|
|
status2 = WlbsQuery (cluster, host, response, &num_host1, &host_map1, NULL);
|
|
verify_return_value (_TEXT("Query after Resume"), WLBS_STOPPED, status2);
|
|
|
|
num_host1 = 1;
|
|
status2 = WlbsDrain (cluster, host, response, &num_host1, 80);
|
|
verify_return_value (_TEXT("Drain when Stopped"), WLBS_STOPPED, status2);
|
|
|
|
num_host1 = 1;
|
|
status2 = WlbsDisable (cluster, host, response, &num_host1, 80);
|
|
verify_return_value (_TEXT("Disable when Stopped"), WLBS_STOPPED, status2);
|
|
|
|
num_host1 = 1;
|
|
status2 = WlbsEnable (cluster, host, response, &num_host1, 80);
|
|
verify_return_value (_TEXT("Enable when Stopped"), WLBS_STOPPED, status2);
|
|
|
|
num_host1 = 1;
|
|
status2 = WlbsResume (cluster, host, response, &num_host1);
|
|
verify_return_value (_TEXT("Resume when Stopped"), WLBS_ALREADY, status2);
|
|
|
|
num_host1 = 1;
|
|
status2 = WlbsStop (cluster, host, response, &num_host1);
|
|
verify_return_value (_TEXT("Stop when Stopped"), WLBS_ALREADY, status2);
|
|
|
|
num_host1 = 1;
|
|
status2 = WlbsDrainStop (cluster, host, response, &num_host1);
|
|
verify_return_value (_TEXT("DrainStop when Stopped"), WLBS_STOPPED, status2);
|
|
|
|
num_host1 = 1;
|
|
status2 = WlbsSuspend (cluster, host, response, &num_host1);
|
|
verify_return_value (_TEXT("Suspend when Stopped"), WLBS_OK, status2);
|
|
|
|
num_host1 = 1;
|
|
status2 = WlbsQuery (cluster, host, response, &num_host1, &host_map1, NULL);
|
|
verify_return_value (_TEXT("Query when Suspended"), WLBS_SUSPENDED, status2);
|
|
|
|
num_host1 = 1;
|
|
status2 = WlbsResume (cluster, host, response, &num_host1);
|
|
verify_return_value (_TEXT("Resume when Suspended"), WLBS_OK, status2);
|
|
|
|
num_host1 = 1;
|
|
status2 = WlbsQuery (cluster, host, response, &num_host1, &host_map1, NULL);
|
|
verify_return_value (_TEXT("Query when Stopped"), WLBS_STOPPED, status2);
|
|
|
|
num_host1 = 1;
|
|
status2 = WlbsStart (cluster, host, response, &num_host1);
|
|
verify_return_value (_TEXT("Start when Stopped"), WLBS_OK, status2);
|
|
|
|
num_host1 = 1;
|
|
status2 = WlbsQuery (cluster, host, response, &num_host1, &host_map1, NULL);
|
|
verify_return_value3 (_TEXT("Query after Starting"), WLBS_CONVERGING, WLBS_CONVERGED, WLBS_DEFAULT, status2);
|
|
|
|
Sleep (10000); /* Wait for the cluster to converge */
|
|
|
|
/* Modify the code to keep polling the host till it is converged ###### */
|
|
|
|
num_host1 = 1;
|
|
status2 = WlbsQuery (cluster, host, response, &num_host1, &host_map1, NULL);
|
|
verify_return_value2 (_TEXT("Query after Waiting for Convergence"), WLBS_CONVERGED, WLBS_DEFAULT, status2);
|
|
|
|
num_host1 = 1;
|
|
status2 = WlbsStart (cluster, host, response, &num_host1);
|
|
verify_return_value (_TEXT("Start when Converged"), WLBS_ALREADY, status2);
|
|
|
|
num_host1 = 1;
|
|
status2 = WlbsResume (cluster, host, response, &num_host1);
|
|
verify_return_value (_TEXT("Resume when Converged"), WLBS_ALREADY, status2);
|
|
|
|
num_host1 = 1;
|
|
status2 = WlbsStop (cluster, host, response, &num_host1);
|
|
verify_return_value (_TEXT("Stop when Converged"), WLBS_OK, status2);
|
|
|
|
num_host1 = 1;
|
|
status2 = WlbsQuery (cluster, host, response, &num_host1, &host_map1, NULL);
|
|
verify_return_value (_TEXT("Query when Stopped"), WLBS_STOPPED, status2);
|
|
|
|
num_host1 = 1;
|
|
status2 = WlbsStart (cluster, host, response, &num_host1);
|
|
verify_return_value (_TEXT("Start when Stopped"), WLBS_OK, status2);
|
|
|
|
num_host1 = 1;
|
|
status2 = WlbsQuery (cluster, host, response, &num_host1, &host_map1, NULL);
|
|
verify_return_value3 (_TEXT("Query after Starting"), WLBS_CONVERGING, WLBS_CONVERGED, WLBS_DEFAULT, status2);
|
|
|
|
Sleep (10000); /* Wait for the cluster to converge */
|
|
|
|
num_host1 = 1;
|
|
status2 = WlbsQuery (cluster, host, response, &num_host1, &host_map1, NULL);
|
|
verify_return_value2 (_TEXT("Query after Waiting for Convergence"), WLBS_CONVERGED, WLBS_DEFAULT, status2);
|
|
|
|
/* DrainStop is to be tested only on a remote host */
|
|
if ((cluster == WLBS_LOCAL_CLUSTER || cluster == WlbsGetLocalClusterAddress()) &&
|
|
(host == WLBS_LOCAL_HOST || host == WlbsGetDedicatedAddress()) )
|
|
return;
|
|
|
|
|
|
/* To test drainstop on a particular host, stop the entire cluster. Then start only this particular host.
|
|
* Open a connection to it. Then do a drainstop. Query should return draining. Then close the connection.
|
|
* Query again. The return value should be stopped. This should be done only on a remote host. This test
|
|
* would fail on a local host, since the connection setup does not go through the wlbs driver, but gets
|
|
* routed up the stack.
|
|
*/
|
|
|
|
num_host1 = WLBS_MAX_HOSTS;
|
|
status2 = WlbsStop (cluster, WLBS_ALL_HOSTS, response, &num_host1);
|
|
verify_return_value (_TEXT("Cluster-wide stop to test drainstop"), WLBS_OK, status2);
|
|
|
|
num_host1 = 1;
|
|
status2 = WlbsStart (cluster, host, response, &num_host1);
|
|
verify_return_value (_TEXT("Start on host after Cluster-wide stop"), WLBS_OK, status2);
|
|
|
|
Sleep (10000); /* Wait till the host converges */
|
|
|
|
num_host1 = 1;
|
|
status2 = WlbsQuery (cluster, host, response, &num_host1, &host_map1, NULL);
|
|
verify_return_value2 (_TEXT("Query after Waiting for Convergence"), WLBS_CONVERGED, WLBS_DEFAULT, status2);
|
|
|
|
|
|
if (!GetDrainstopState (cluster, host, &sock, 80))
|
|
return;
|
|
|
|
num_host1 = 1;
|
|
status2 = WlbsDisable (cluster, host, response, &num_host1, 80);
|
|
verify_return_value (_TEXT("Disable after DrainStop with active connection"), WLBS_ALREADY, status2);
|
|
|
|
num_host1 = 1;
|
|
status2 = WlbsDrain (cluster, host, response, &num_host1, 80);
|
|
verify_return_value (_TEXT("Drain after DrainStop with active connection"), WLBS_ALREADY, status2);
|
|
|
|
num_host1 = 1;
|
|
status2 = WlbsEnable (cluster, host, response, &num_host1, 80);
|
|
verify_return_value (_TEXT("Enable after DrainStop with active connection"), WLBS_OK, status2);
|
|
|
|
num_host1 = 1;
|
|
status2 = WlbsEnable (cluster, host, response, &num_host1, 80);
|
|
verify_return_value (_TEXT("Enable again after DrainStop with active connection"), WLBS_ALREADY, status2);
|
|
|
|
num_host1 = 1;
|
|
status2 = WlbsResume (cluster, host, response, &num_host1);
|
|
verify_return_value (_TEXT("Resume after DrainStop with active connection"), WLBS_ALREADY, status2);
|
|
|
|
num_host1 = 1;
|
|
status2 = WlbsStop (cluster, host, response, &num_host1);
|
|
verify_return_value (_TEXT("Stop after DrainStop with active connection"), WLBS_DRAIN_STOP, status2);
|
|
|
|
closesocket (sock);
|
|
|
|
/* Start the host and open a connection again */
|
|
if (!GetDrainstopState (cluster, host, &sock, 80))
|
|
return;
|
|
|
|
num_host1 = 1;
|
|
status2 = WlbsStart (cluster, host, response, &num_host1);
|
|
verify_return_value (_TEXT("Start after DrainStop with active connection"), WLBS_DRAIN_STOP, status2);
|
|
|
|
closesocket (sock);
|
|
|
|
if (!GetDrainstopState (cluster, host, &sock, 80))
|
|
return;
|
|
|
|
num_host1 = 1;
|
|
status2 = WlbsSuspend (cluster, host, response, &num_host1);
|
|
verify_return_value (_TEXT("Suspend after DrainStop with active connection"), WLBS_DRAIN_STOP, status2);
|
|
|
|
closesocket (sock); /* close the connection */
|
|
|
|
if (!GetDrainstopState (cluster, host, &sock, 80))
|
|
return;
|
|
|
|
num_host1 = 1;
|
|
status2 = WlbsQuery (cluster, host, response, &num_host1, &host_map1, NULL);
|
|
verify_return_value (_TEXT("Query after DrainStop with active connection"), WLBS_DRAINING, status2);
|
|
|
|
closesocket (sock);
|
|
Sleep (10000); /* Wait for it to figure out that all the connections have been terminated */
|
|
|
|
num_host1 = 1;
|
|
status2 = WlbsQuery (cluster, host, response, &num_host1, &host_map1, NULL);
|
|
verify_return_value (_TEXT("Query after DrainStop with closed connection"), WLBS_STOPPED, status2);
|
|
|
|
/* issue a cluster-wide start to bring back all the hosts to the converged state.*/
|
|
num_host1 = WLBS_MAX_HOSTS;
|
|
status2 = WlbsStart (cluster, WLBS_ALL_HOSTS, response, &num_host1);
|
|
verify_return_value (_TEXT("Cluster-wide start to restore original state"), WLBS_OK, status2);
|
|
|
|
Sleep (10000); /* Wait for convergence */
|
|
return;
|
|
}
|
|
|
|
|
|
/* This function tests the single host control operations.
|
|
* It performs both the parameter tests as well as the
|
|
* state change tests.
|
|
*/
|
|
void check_single_host_operations ( )
|
|
{
|
|
DWORD local_cluster_ip = 0;
|
|
DWORD local_dedicated_ip = 0;
|
|
DWORD remote_cluster_ip = 0;
|
|
DWORD remote_host = 0;
|
|
|
|
if (global_init == WLBS_INIT_ERROR)
|
|
{
|
|
add_error(_TEXT("Cannot perform Control test due to Init Error"));
|
|
return;
|
|
}
|
|
|
|
|
|
if (local_test)
|
|
{
|
|
do {
|
|
if (global_init == WLBS_PRESENT)
|
|
{
|
|
WLBS_REG_PARAMS reg_data;
|
|
DWORD status;
|
|
|
|
local_cluster_ip = WlbsGetLocalClusterAddress();
|
|
local_dedicated_ip = WlbsGetDedicatedAddress();
|
|
|
|
status = WlbsReadReg (WLBS_LOCAL_CLUSTER, WLBS_LOCAL_HOST, & reg_data);
|
|
WlbsCodeSet (local_cluster_ip, reg_data . i_rct_password);
|
|
/* test the local call path */
|
|
if ( ! GetHostToConvergedState(WLBS_LOCAL_CLUSTER, WLBS_LOCAL_HOST))
|
|
{
|
|
printf("Unable to get the local host to converged state\n");
|
|
break;
|
|
}
|
|
single_host_parameter_test (WLBS_LOCAL_CLUSTER, WLBS_LOCAL_HOST);
|
|
single_host_state_changes (WLBS_LOCAL_CLUSTER, WLBS_LOCAL_HOST);
|
|
|
|
/* test the remote call path */
|
|
WlbsCodeSet (local_cluster_ip, reg_data . i_rct_password);
|
|
single_host_parameter_test (local_cluster_ip, local_dedicated_ip);
|
|
single_host_state_changes (local_cluster_ip, local_dedicated_ip);
|
|
}
|
|
} while (FALSE);
|
|
}
|
|
|
|
if ( ! remote_test)
|
|
return;
|
|
|
|
if (global_init == WLBS_PRESENT || global_init == WLBS_REMOTE_ONLY)
|
|
{
|
|
/* test a remote host on a remote cluster */
|
|
|
|
if (remote_cl_ip == 0)
|
|
{
|
|
printf("Remote cluster address is invalid, so Control operations on a remote host are not tested\n");
|
|
return;
|
|
}
|
|
|
|
if (remote_host_ip == 0)
|
|
{
|
|
printf("Remote host address is invalid, so Control operations on a remote host are not tested\n");
|
|
return;
|
|
}
|
|
|
|
/* Set the password for the remote host and set it so that the operations can be performed */
|
|
WlbsPasswordSet (remote_cl_ip, remote_password);
|
|
WlbsTimeoutSet (remote_cl_ip, timeout);
|
|
if ( ! GetHostToConvergedState(remote_cl_ip, remote_host_ip) )
|
|
{
|
|
printf("Unable to get the remote host to converged state. Not performing state change tests");
|
|
return;
|
|
}
|
|
|
|
single_host_state_changes (remote_cl_ip, remote_host_ip);
|
|
}
|
|
else
|
|
printf("Unable to perform the remote tests\n");
|
|
|
|
return;
|
|
}
|
|
|
|
|
|
/* This function verifies the parameter testing for cluster-wide queries. It checks the response array
|
|
* verifies it with the hostmap
|
|
*/
|
|
void cluster_parameter_test (DWORD cluster)
|
|
{
|
|
DWORD status1, status2;
|
|
DWORD host_map1, host_map2, temp_host_map;
|
|
DWORD num_host1, num_host2;
|
|
WLBS_RESPONSE response1, response2 [WLBS_MAX_HOSTS];
|
|
PWLBS_RESPONSE response = NULL;
|
|
DWORD stopped_host_id = 0;
|
|
DWORD i;
|
|
|
|
|
|
_stprintf (status_buf, _TEXT("Cluster-wide parameter testing for cluster %d"), cluster);
|
|
|
|
/* Query with all parameters set to null should return the number of active hosts */
|
|
status1 = WlbsQuery (cluster, WLBS_ALL_HOSTS, NULL, NULL, NULL, NULL);
|
|
|
|
/* Query with num_hosts set to 0. On return num_hosts should be >= status1 */
|
|
num_host1 = 0;
|
|
status2 = WlbsQuery (cluster, WLBS_ALL_HOSTS, NULL, &num_host1, &host_map1, NULL);
|
|
if (num_host1 < status1)
|
|
{
|
|
_stprintf (tbuf, _TEXT("Cluster-wide query returned %d active and %d total hosts"), status1, num_host1);
|
|
add_error (tbuf);
|
|
return;
|
|
}
|
|
|
|
/* Response array = #hosts + 1. Check that the boundaries are not overwritten. */
|
|
response = (PWLBS_RESPONSE) malloc (sizeof (WLBS_RESPONSE) * (num_host1 + 1));
|
|
memset (response, 0, (sizeof (WLBS_RESPONSE) * (num_host1 + 1)));
|
|
memset (&response1, 0, sizeof (WLBS_RESPONSE));
|
|
num_host2 = num_host1 - 1;
|
|
|
|
status2 = WlbsQuery (cluster, WLBS_ALL_HOSTS, &response [1], &num_host2, &host_map2, NULL);
|
|
if (memcmp (&response1, &response[0], sizeof (WLBS_RESPONSE)) ||
|
|
memcmp (&response1, &response[num_host1], sizeof (WLBS_RESPONSE)) )
|
|
{
|
|
add_error(_TEXT("Response Array boundaries are over-written"));
|
|
}
|
|
|
|
free (response);
|
|
response = NULL;
|
|
|
|
/* Query again with the full response buffer */
|
|
/* Verify that the hostmap and response array are in sync */
|
|
num_host1 = WLBS_MAX_HOSTS;
|
|
|
|
status2 = WlbsQuery (cluster, WLBS_ALL_HOSTS, response2, &num_host1, &host_map1, NULL);
|
|
if (! verify_hostmap_response (response2, num_host1, host_map1) )
|
|
add_error (_TEXT("Hostmap and Response do not match for the cluster wide query"));
|
|
|
|
/* The following test is to verify the correctness of the hostmap parameter
|
|
* Save the host_map returned in the previous query.
|
|
* Stop a converged host.
|
|
* Query again and get the new host_map.
|
|
* */
|
|
for (i = 0 ; i < num_host1; i++)
|
|
{
|
|
if (response2 [i] . status == WLBS_CONVERGED || response2 [i] . status == WLBS_DEFAULT)
|
|
{
|
|
stopped_host_id = response2 [i] . id;
|
|
break;
|
|
}
|
|
}
|
|
|
|
status1 = WlbsStop (cluster, stopped_host_id, NULL, NULL);
|
|
|
|
Sleep (10000); /* Wait for the cluster to converge */
|
|
|
|
/* Query the cluster again */
|
|
num_host1 = WLBS_MAX_HOSTS;
|
|
status1 = WlbsQuery (cluster, WLBS_ALL_HOSTS, response2, &num_host1, &host_map1, NULL);
|
|
if (status2 == 1) /* This is to take care of single host clusters */
|
|
verify_return_value (_TEXT("Querying cluster after stopping 1 host"), WLBS_STOPPED, status1);
|
|
else
|
|
verify_return_value (_TEXT("Querying cluster after stopping 1 host"), status2 - 1, status1);
|
|
|
|
|
|
if (status2 > 1) /* The following verification can be done only if there are 2 or more hosts in the cluster */
|
|
{
|
|
/* Verify that the corresponding bit in the host_map is not set */
|
|
if (! verify_hostmap_response (response2, num_host1, host_map1) )
|
|
add_error (_TEXT("Hostmap and Response do not match for the cluster wide query"));
|
|
|
|
if (host_map1 & (1 << (stopped_host_id - 1)) )
|
|
{
|
|
_stprintf (tbuf, _TEXT("Stopping host %d did not change the host_map"), stopped_host_id);
|
|
add_error (tbuf);
|
|
}
|
|
}
|
|
|
|
/* start the host again */
|
|
status1 = WlbsStart (cluster, stopped_host_id, NULL, NULL);
|
|
|
|
/* wait for it to converge */
|
|
Sleep (10000);
|
|
|
|
status1 = WlbsQuery (cluster, WLBS_ALL_HOSTS, NULL, NULL, NULL, NULL);
|
|
if (! (status1 >= 1 && status1 <= WLBS_MAX_HOSTS) )
|
|
printf("Unable to get the cluster to the converged state after Cluster parameter testing\n");
|
|
|
|
/* Test portset */
|
|
verify_port (cluster, WLBS_ALL_HOSTS, 3000, WLBS_TIMEOUT);
|
|
verify_port (cluster, WLBS_ALL_HOSTS, 0, status1);
|
|
verify_port (cluster, WLBS_ALL_HOSTS, CVY_DEF_RCT_PORT, status1);
|
|
|
|
return;
|
|
}
|
|
|
|
|
|
void verify_timeout (DWORD cluster, DWORD timeout)
|
|
{
|
|
DWORD time1, time2, time_diff;
|
|
DWORD status;
|
|
|
|
WlbsTimeoutSet (cluster, timeout);
|
|
if (timeout == 0) /* set it to the default value */
|
|
timeout = IOCTL_REMOTE_RECV_DELAY * IOCTL_REMOTE_SEND_RETRIES * IOCTL_REMOTE_RECV_RETRIES;
|
|
|
|
time1 = GetTickCount ();
|
|
status = WlbsQuery (cluster, WLBS_ALL_HOSTS, NULL, NULL, NULL, NULL);
|
|
time2 = GetTickCount ();
|
|
|
|
time_diff = time2 - time1;
|
|
|
|
if (abs (time_diff - timeout) > 1000) /* Keep a margin of 1 sec */
|
|
{
|
|
_stprintf ( tbuf, _TEXT("Expected timeout %d, Actual timeout %d"), timeout, time_diff);
|
|
add_error (tbuf);
|
|
}
|
|
|
|
return;
|
|
}
|
|
|
|
|
|
/* This function takes the entire cluster through the different state changes.
|
|
* Some special cases are when one particular host is suspended
|
|
* or when one particular host is in the drainstop state.
|
|
* In such cases, WLBS_SUSPENDED or WLBS_DRAINING or WLBS_DRAIN_STOP are returned.
|
|
* These return values are also verified.
|
|
* After these special cases, the entire cluster is taken through the state changes.
|
|
* In these tests, the response array is checked to verify that the statuses of each
|
|
* host is in synch with the value returned by the control operation.
|
|
*/
|
|
void cluster_state_changes (DWORD cluster)
|
|
{
|
|
DWORD status1, status2;
|
|
WLBS_REG_PARAMS reg_data;
|
|
BOOL password_flag = TRUE;
|
|
WLBS_RESPONSE response [WLBS_MAX_HOSTS];
|
|
DWORD num_host, host_map;
|
|
DWORD suspended_host_id;
|
|
DWORD temp_address;
|
|
SOCKET sock = INVALID_SOCKET;
|
|
|
|
|
|
_stprintf (status_buf, _TEXT("Checking cluster state changes for cluster %d"), cluster);
|
|
|
|
/* Password check on the local cluster only */
|
|
if (cluster == WLBS_LOCAL_CLUSTER)
|
|
{
|
|
DWORD password;
|
|
DWORD cluster = WlbsGetLocalClusterAddress ();
|
|
|
|
|
|
status1 = WlbsReadReg(WLBS_LOCAL_CLUSTER, WLBS_LOCAL_HOST, & reg_data);
|
|
password = reg_data . i_rct_password;
|
|
status1 = WlbsSetRemotePassword (®_data, _TEXT("NewPassword"));
|
|
status1 = WlbsWriteReg (WLBS_LOCAL_CLUSTER, WLBS_LOCAL_HOST, & reg_data);
|
|
status1 = WlbsCommitChanges (WLBS_LOCAL_CLUSTER, WLBS_LOCAL_HOST);
|
|
Sleep (10000);
|
|
|
|
if (status1 != WLBS_OK)
|
|
{
|
|
password_flag = FALSE;
|
|
add_error (_TEXT("Unable to change the password on the local machine."));
|
|
}
|
|
|
|
if (password_flag)
|
|
password_test (WLBS_LOCAL_CLUSTER, WLBS_ALL_HOSTS, _TEXT("NewPassword"));
|
|
|
|
status1 = WlbsReadReg(WLBS_LOCAL_CLUSTER, WLBS_LOCAL_HOST, & reg_data);
|
|
reg_data . i_rct_password = password;
|
|
status1 = WlbsWriteReg (WLBS_LOCAL_CLUSTER, WLBS_LOCAL_HOST, & reg_data);
|
|
status1 = WlbsCommitChanges (WLBS_LOCAL_CLUSTER, WLBS_LOCAL_HOST);
|
|
WlbsCodeSet (cluster, password);
|
|
Sleep (10000); /* Wait till the cluster converges */
|
|
}
|
|
/* Password check on the remote cluster by getting the password beforehand */
|
|
else
|
|
{
|
|
password_test (cluster, WLBS_ALL_HOSTS, remote_password);
|
|
|
|
/* Reset the password to the original state */
|
|
WlbsPasswordSet (cluster, remote_password);
|
|
}
|
|
|
|
/* Bring any one host to the suspended state. On every command, the response should be WLBS_SUSPENDED */
|
|
_stprintf (status_buf, _TEXT("Cluster-wide commands with one suspended host"));
|
|
|
|
num_host = WLBS_MAX_HOSTS;
|
|
status1 = WlbsQuery (cluster, WLBS_ALL_HOSTS, response, &num_host, &host_map, NULL);
|
|
|
|
suspended_host_id = response [0] . id;
|
|
status1 = WlbsSuspend (cluster, suspended_host_id, NULL, NULL);
|
|
Sleep (10000); /* Wait for the cluster to converge. */
|
|
|
|
num_host = WLBS_MAX_HOSTS;
|
|
status1 = WlbsStop (cluster, WLBS_ALL_HOSTS, response, &num_host);
|
|
verify_return_value (_TEXT("Stop after suspending 1 host"), WLBS_SUSPENDED, status1);
|
|
|
|
num_host = WLBS_MAX_HOSTS;
|
|
status1 = WlbsDrainStop (cluster, WLBS_ALL_HOSTS, response, &num_host);
|
|
verify_return_value (_TEXT("Stop after suspending 1 host"), WLBS_SUSPENDED, status1);
|
|
|
|
num_host = WLBS_MAX_HOSTS;
|
|
status1 = WlbsStart (cluster, WLBS_ALL_HOSTS, response, &num_host);
|
|
verify_return_value (_TEXT("Start after suspending 1 host"), WLBS_SUSPENDED, status1);
|
|
|
|
num_host = WLBS_MAX_HOSTS;
|
|
status1 = WlbsDrain (cluster, WLBS_ALL_HOSTS, response, &num_host, 80);
|
|
verify_return_value (_TEXT("Drain after suspending 1 host"), WLBS_SUSPENDED, status1);
|
|
|
|
num_host = WLBS_MAX_HOSTS;
|
|
status1 = WlbsDisable (cluster, WLBS_ALL_HOSTS, response, &num_host, 80);
|
|
verify_return_value (_TEXT("Disable after suspending 1 host"), WLBS_SUSPENDED, status1);
|
|
|
|
num_host = WLBS_MAX_HOSTS;
|
|
status1 = WlbsEnable (cluster, WLBS_ALL_HOSTS, response, &num_host, 80);
|
|
verify_return_value (_TEXT("Enable after suspending 1 host"), WLBS_SUSPENDED, status1);
|
|
|
|
/* Now get the cluster to the converged state and test the state changes */
|
|
if ( !GetClusterToConvergedState (cluster))
|
|
{
|
|
add_error (_TEXT("Unable to get the cluster to the converged state"));
|
|
return;
|
|
}
|
|
|
|
_stprintf ( status_buf, _TEXT("Cluster-wide commands"));
|
|
|
|
num_host = WLBS_MAX_HOSTS;
|
|
status1 = WlbsSuspend (cluster, WLBS_ALL_HOSTS, response, &num_host);
|
|
verify_return_value (_TEXT("Cluster-wide Suspend"), WLBS_OK, status1);
|
|
|
|
num_host = WLBS_MAX_HOSTS;
|
|
status1 = WlbsQuery (cluster, WLBS_ALL_HOSTS, response, &num_host, &host_map, NULL);
|
|
verify_return_value (_TEXT("Query after Cluster-wide Suspend"), WLBS_SUSPENDED, status1);
|
|
verify_response_status (response, num_host, WLBS_SUSPENDED);
|
|
|
|
num_host = WLBS_MAX_HOSTS;
|
|
status1 = WlbsResume (cluster, WLBS_ALL_HOSTS, response, &num_host);
|
|
verify_return_value (_TEXT("Cluster-wide Resume after Suspend"), WLBS_OK, status1);
|
|
|
|
num_host = WLBS_MAX_HOSTS;
|
|
status1 = WlbsQuery (cluster, WLBS_ALL_HOSTS, response, &num_host, &host_map, NULL);
|
|
verify_return_value (_TEXT("Cluster-wide Query after Resume"), WLBS_STOPPED, status1);
|
|
verify_response_status (response, num_host, WLBS_STOPPED);
|
|
|
|
num_host = WLBS_MAX_HOSTS;
|
|
status1 = WlbsStart (cluster, WLBS_ALL_HOSTS, response, &num_host);
|
|
verify_return_value (_TEXT("Cluster-wide Start after Resume"), WLBS_OK, status1);
|
|
|
|
num_host = WLBS_MAX_HOSTS;
|
|
status1 = WlbsQuery (cluster, WLBS_ALL_HOSTS, response, &num_host, &host_map, NULL);
|
|
if (! (status1 == WLBS_CONVERGING || ( 1 <= status1 && status1 <= WLBS_MAX_HOSTS)) )
|
|
{
|
|
add_error (_TEXT("Error in query after cluster-wide start"));
|
|
}
|
|
|
|
Sleep (10000); /* Wait for the cluster to converge */
|
|
|
|
num_host = WLBS_MAX_HOSTS;
|
|
status1 = WlbsQuery (cluster, WLBS_ALL_HOSTS, response, &num_host, &host_map, NULL);
|
|
if ( ! ( 1 <= status1 && status1 <= WLBS_MAX_HOSTS) )
|
|
printf("Unable to get the cluster to converged state after Starting\n");
|
|
|
|
/* Test for invalid port numbers */
|
|
num_host = WLBS_MAX_HOSTS;
|
|
status1 = WlbsDrain (cluster, WLBS_ALL_HOSTS, response, &num_host, CVY_MAX_PORT + 1);
|
|
verify_return_value (_TEXT("Drain on invalid port"), WLBS_NOT_FOUND, status1);
|
|
|
|
num_host = WLBS_MAX_HOSTS;
|
|
status1 = WlbsDisable (cluster, WLBS_ALL_HOSTS, response, &num_host, CVY_MAX_PORT + 1);
|
|
verify_return_value (_TEXT("Disable on invalid port"), WLBS_NOT_FOUND, status1);
|
|
|
|
num_host = WLBS_MAX_HOSTS;
|
|
status1 = WlbsEnable (cluster, WLBS_ALL_HOSTS, response, &num_host, CVY_MAX_PORT + 1);
|
|
verify_return_value (_TEXT("Enable on invalid port"), WLBS_NOT_FOUND, status1);
|
|
|
|
Sleep (10000); /* Wait for the cluster to converge */
|
|
|
|
/* Test for invalid port numbers */
|
|
num_host = WLBS_MAX_HOSTS;
|
|
status1 = WlbsDrain (cluster, WLBS_ALL_HOSTS, response, &num_host, WLBS_ALL_PORTS);
|
|
verify_return_value (_TEXT("Drain on all port"), WLBS_OK, status1);
|
|
|
|
num_host = WLBS_MAX_HOSTS;
|
|
status1 = WlbsDisable (cluster, WLBS_ALL_HOSTS, response, &num_host, WLBS_ALL_PORTS);
|
|
verify_return_value (_TEXT("Disable on all port"), WLBS_OK, status1);
|
|
|
|
num_host = WLBS_MAX_HOSTS;
|
|
status1 = WlbsEnable (cluster, WLBS_ALL_HOSTS, response, &num_host, WLBS_ALL_PORTS);
|
|
verify_return_value (_TEXT("Enable on all port"), WLBS_OK, status1);
|
|
|
|
Sleep (10000);
|
|
|
|
/* Test timeout */
|
|
if (cluster == WLBS_LOCAL_CLUSTER)
|
|
temp_address = WlbsGetLocalClusterAddress ();
|
|
else
|
|
temp_address = cluster;
|
|
|
|
verify_timeout (temp_address, 5000);
|
|
verify_timeout (temp_address, 1000);
|
|
verify_timeout (temp_address, 0);
|
|
|
|
WlbsTimeoutSet (temp_address, timeout); /* Set the value specified by the user */
|
|
|
|
|
|
if (cluster == WLBS_LOCAL_CLUSTER)
|
|
return; /* DrainStop is not checked, since the connection will not be visible to the wlbs driver */
|
|
|
|
|
|
if (!GetDrainstopState (cluster, WLBS_ALL_HOSTS, &sock, 80))
|
|
return;
|
|
|
|
num_host = WLBS_MAX_HOSTS;
|
|
status1 = WlbsQuery (cluster, WLBS_ALL_HOSTS, response, &num_host, &host_map, NULL);
|
|
verify_return_value (_TEXT("Query after DrainStop with active connection"), WLBS_DRAINING, status1);
|
|
|
|
num_host = WLBS_MAX_HOSTS;
|
|
status1 = WlbsDisable (cluster, WLBS_ALL_HOSTS, response, &num_host, 80);
|
|
verify_return_value (_TEXT("Disable after DrainStop with active connection"), WLBS_OK, status1);
|
|
|
|
num_host = WLBS_MAX_HOSTS;
|
|
status1 = WlbsDrain (cluster, WLBS_ALL_HOSTS, response, &num_host, 80);
|
|
verify_return_value (_TEXT("Drain after DrainStop with active connection"), WLBS_OK, status1);
|
|
|
|
num_host = WLBS_MAX_HOSTS;
|
|
status1 = WlbsEnable (cluster, WLBS_ALL_HOSTS, response, &num_host, 80);
|
|
verify_return_value (_TEXT("Enable after DrainStop with active connection"), WLBS_OK, status1);
|
|
|
|
num_host = WLBS_MAX_HOSTS;
|
|
status1 = WlbsEnable (cluster, WLBS_ALL_HOSTS, response, &num_host, 80);
|
|
verify_return_value (_TEXT("Enable again after DrainStop with active connection"), WLBS_OK, status1);
|
|
|
|
num_host = WLBS_MAX_HOSTS;
|
|
status1 = WlbsStop (cluster, WLBS_ALL_HOSTS, response, &num_host);
|
|
verify_return_value (_TEXT("Stop after DrainStop with active connection"), WLBS_OK, status1);
|
|
|
|
num_host = WLBS_MAX_HOSTS;
|
|
status1 = WlbsQuery (cluster, WLBS_ALL_HOSTS, response, &num_host, &host_map, NULL);
|
|
verify_return_value (_TEXT("Query after Stop on DrainStop with active connection"), WLBS_STOPPED, status1);
|
|
|
|
closesocket (sock);
|
|
|
|
if (!GetDrainstopState (cluster, WLBS_ALL_HOSTS, &sock, 80))
|
|
return;
|
|
|
|
num_host = WLBS_MAX_HOSTS;
|
|
status1 = WlbsStart (cluster, WLBS_ALL_HOSTS, response, &num_host);
|
|
verify_return_value (_TEXT("Start after DrainStop with active connection"), WLBS_OK, status1);
|
|
|
|
Sleep (10000);
|
|
num_host = WLBS_MAX_HOSTS;
|
|
status1 = WlbsQuery (cluster, WLBS_ALL_HOSTS, response, &num_host, &host_map, NULL);
|
|
if (!(1 <= status1 && status1 <= WLBS_MAX_HOSTS))
|
|
return;
|
|
|
|
closesocket (sock);
|
|
|
|
if (!GetDrainstopState (cluster, WLBS_ALL_HOSTS, &sock, 80))
|
|
return;
|
|
|
|
num_host = WLBS_MAX_HOSTS;
|
|
status1 = WlbsSuspend (cluster, WLBS_ALL_HOSTS, response, &num_host);
|
|
verify_return_value (_TEXT("Suspend after DrainStop with active connection"), WLBS_OK, status1);
|
|
|
|
num_host = WLBS_MAX_HOSTS;
|
|
status1 = WlbsQuery (cluster, WLBS_ALL_HOSTS, response, &num_host, &host_map, NULL);
|
|
verify_return_value (_TEXT("Suspend after DrainStop with active connection"), WLBS_SUSPENDED, status1);
|
|
|
|
closesocket (sock);
|
|
|
|
if (!GetDrainstopState (cluster, WLBS_ALL_HOSTS, &sock, 80))
|
|
return;
|
|
|
|
num_host = WLBS_MAX_HOSTS;
|
|
status1 = WlbsResume (cluster, WLBS_ALL_HOSTS, response, &num_host);
|
|
verify_return_value (_TEXT("Resume on DrainStop with active connection"), WLBS_OK, status1);
|
|
|
|
closesocket (sock); /* close the connection */
|
|
|
|
Sleep (10000); /* Wait for the host to figure out that all the connections have terminated */
|
|
num_host = WLBS_MAX_HOSTS;
|
|
status1 = WlbsQuery (cluster, WLBS_ALL_HOSTS, response, &num_host, &host_map, NULL);
|
|
verify_return_value (_TEXT("Query after DrainStop with closed connection"), WLBS_STOPPED, status1);
|
|
|
|
/* issue a cluster-wide start to bring back all the hosts to the converged state.*/
|
|
num_host = WLBS_MAX_HOSTS;
|
|
status1 = WlbsStart (cluster, WLBS_ALL_HOSTS, response, &num_host);
|
|
verify_return_value (_TEXT("Cluster-wide start to restore original state"), WLBS_OK, status1);
|
|
|
|
Sleep (10000); /* Wait for the cluster to converge */
|
|
return;
|
|
}
|
|
|
|
|
|
void check_cluster_operations ( )
|
|
{
|
|
DWORD cluster = 0;
|
|
|
|
if (local_test)
|
|
{
|
|
if (global_init = WLBS_PRESENT)
|
|
{
|
|
WLBS_REG_PARAMS reg_data;
|
|
DWORD status;
|
|
|
|
status = WlbsReadReg (WLBS_LOCAL_CLUSTER, WLBS_LOCAL_HOST, ®_data);
|
|
if (status != WLBS_OK)
|
|
{
|
|
printf("Unable to read from the registry to set the password\nAborting cluster checks\n");
|
|
return;
|
|
}
|
|
|
|
WlbsCodeSet (WlbsGetLocalClusterAddress (), reg_data . i_rct_password );
|
|
WlbsTimeoutSet (WlbsGetLocalClusterAddress (), timeout);
|
|
if (GetClusterToConvergedState (WLBS_LOCAL_CLUSTER))
|
|
{
|
|
cluster_parameter_test (WLBS_LOCAL_CLUSTER);
|
|
cluster_state_changes (WLBS_LOCAL_CLUSTER);
|
|
}
|
|
else
|
|
{
|
|
add_error (_TEXT("Unable to get the local cluster to the converged state"));
|
|
}
|
|
}
|
|
}
|
|
|
|
if (!remote_test)
|
|
return;
|
|
|
|
WlbsPasswordSet (remote_cl_ip, remote_password);
|
|
WlbsTimeoutSet (remote_cl_ip, timeout);
|
|
if ( GetClusterToConvergedState (remote_cl_ip))
|
|
{
|
|
cluster_parameter_test (remote_cl_ip);
|
|
cluster_state_changes (remote_cl_ip);
|
|
}
|
|
else
|
|
add_error (_TEXT("Unable to get the remote cluster to the converged state"));
|
|
|
|
return;
|
|
}
|
|
|
|
|
|
/* This function is used to find the first place where the 2 structures differ */
|
|
DWORD find_mem_change (PWLBS_REG_PARAMS data1, PWLBS_REG_PARAMS data2, DWORD size)
|
|
{
|
|
DWORD i;
|
|
|
|
printf("size of dword %d\n", sizeof (DWORD));
|
|
for (i = 4; i < size ; i += 4)
|
|
{
|
|
if (memcmp (data1, data2, i))
|
|
return i;
|
|
}
|
|
return 0;
|
|
}
|
|
|
|
|
|
void check_rules_in_structure (PWLBS_REG_PARAMS reg_data)
|
|
{
|
|
DWORD i;
|
|
|
|
printf("the number of rules is %d\n", reg_data -> i_num_rules);
|
|
for (i = 0 ; i < WLBS_MAX_RULES; i++)
|
|
{
|
|
if (reg_data -> i_port_rules [i] . i_valid)
|
|
{
|
|
printf("\tFound valid port rule %d with start port %d ep %d\n", i,
|
|
reg_data -> i_port_rules [i] . start_port,
|
|
reg_data -> i_port_rules [i] . end_port);
|
|
}
|
|
}
|
|
return;
|
|
}
|
|
|
|
|
|
/* This function tests the reads and writes to the registry */
|
|
void check_registry_rw ()
|
|
{
|
|
WLBS_REG_PARAMS saved;
|
|
WLBS_REG_PARAMS newdata;
|
|
WLBS_REG_PARAMS temp;
|
|
DWORD status;
|
|
|
|
|
|
if (global_init == WLBS_REMOTE_ONLY || global_init == WLBS_INIT_ERROR)
|
|
{
|
|
add_error (_TEXT("Cannot check registry rw since wlbs is not installed"));
|
|
return;
|
|
}
|
|
|
|
/* parameter testing */
|
|
_stprintf (status_buf, _TEXT("Parameter Test for ReadReg and WriteReg"));
|
|
status = WlbsReadReg (WLBS_LOCAL_CLUSTER, WLBS_LOCAL_HOST, NULL);
|
|
verify_return_value (_TEXT("ReadReg with null regdata"), WLBS_BAD_PARAMS, status);
|
|
|
|
status = WlbsWriteReg (WLBS_LOCAL_CLUSTER, WLBS_LOCAL_HOST, NULL);
|
|
verify_return_value (_TEXT("WriteReg with null regdata"), WLBS_BAD_PARAMS, status);
|
|
|
|
status = WlbsReadReg (12, WLBS_LOCAL_HOST, & saved);
|
|
verify_return_value (_TEXT("ReadReg on remote cluster"), WLBS_LOCAL_ONLY, status);
|
|
|
|
status = WlbsWriteReg (12, WLBS_LOCAL_HOST, & saved);
|
|
verify_return_value (_TEXT("WriteReg on remote cluster"), WLBS_LOCAL_ONLY, status);
|
|
|
|
status = WlbsReadReg (WLBS_LOCAL_CLUSTER, 10, & saved);
|
|
verify_return_value (_TEXT("ReadReg on remote host"), WLBS_LOCAL_ONLY, status);
|
|
|
|
status = WlbsWriteReg (WLBS_LOCAL_CLUSTER, 10, & saved);
|
|
verify_return_value (_TEXT("WriteReg on remote host"), WLBS_LOCAL_ONLY, status);
|
|
|
|
/* now test the actual working of read and write reg */
|
|
|
|
_stprintf (status_buf, _TEXT("Testing ReadReg and WriteReg for correctness"));
|
|
|
|
status = WlbsReadReg (WLBS_LOCAL_CLUSTER, WLBS_LOCAL_HOST, & saved);
|
|
verify_return_value (_TEXT("ReadReg"), WLBS_OK, status);
|
|
|
|
/* The following memset is to avoid any spurious differences */
|
|
memset (&newdata, 0, sizeof (WLBS_REG_PARAMS));
|
|
|
|
/* Fill in the structure with valid values */
|
|
newdata . alive_period = saved . alive_period + 1;
|
|
newdata . alive_tolerance = saved . alive_tolerance + 1;
|
|
_tcscpy (newdata . cl_ip_addr, _TEXT("111.222.111.222"));
|
|
_tcscpy (newdata . cl_mac_addr, _TEXT("11-22-33-44-55-66"));
|
|
_tcscpy (newdata . cl_net_mask, _TEXT("255.255.255.0"));
|
|
newdata . cluster_mode = FALSE;
|
|
_tcscpy (newdata . ded_ip_addr, _TEXT("111.222.111.233"));
|
|
_tcscpy (newdata . ded_net_mask, _TEXT("255.255.255.0"));
|
|
_tcscpy (newdata . domain_name, _TEXT("TESTDOMAINNAME"));
|
|
newdata . dscr_per_alloc = 1024;
|
|
newdata . host_priority = saved . host_priority + 1;
|
|
newdata . i_cleanup_delay = 3600;
|
|
_tcscpy (newdata . i_cluster_nic_name, saved . i_cluster_nic_name); /* This is for read-only */
|
|
newdata . i_convert_mac = FALSE;
|
|
newdata . i_expiration = 0;
|
|
newdata . i_ft_rules_enabled = TRUE;
|
|
newdata . i_ip_chg_delay = saved . i_ip_chg_delay + 1;
|
|
_tcscpy (newdata . i_license_key, _TEXT("JUNKLICENSEKEY"));
|
|
newdata . i_max_hosts = LICENSE_MAX_HOSTS;
|
|
newdata . i_max_rules = LICENSE_RULES;
|
|
newdata . i_mcast_spoof = FALSE;
|
|
newdata . i_num_rules = 0;
|
|
newdata . i_parms_ver = saved . i_parms_ver;
|
|
memset ( newdata . i_port_rules, 0, sizeof (WLBS_PORT_RULE) * WLBS_MAX_RULES);
|
|
newdata . i_rct_password = 23445;
|
|
newdata . i_rmt_password = 98765;
|
|
newdata . i_scale_client = 10;
|
|
newdata . i_verify_date = 0;
|
|
newdata . i_version = 0;
|
|
_tcscpy (newdata . i_virtual_nic_name, _TEXT("TEMP_VIRTUAL_NIC_NAME"));
|
|
newdata . install_date = 50000;
|
|
newdata . mask_src_mac = FALSE;
|
|
newdata . max_dscr_allocs = 1024;
|
|
newdata . mcast_support = FALSE;
|
|
newdata . i_nbt_support = FALSE;
|
|
newdata . num_actions = saved . num_actions + 1;
|
|
newdata . num_packets = saved . num_packets + 1;
|
|
newdata . num_send_msgs = saved . num_send_msgs + 1;
|
|
newdata . rct_enabled = FALSE;
|
|
newdata . rct_port = 2000;
|
|
|
|
|
|
status = WlbsWriteReg (WLBS_LOCAL_CLUSTER, WLBS_LOCAL_HOST, & newdata);
|
|
verify_return_value (_TEXT("WriteReg"), WLBS_OK, status);
|
|
|
|
memset (&temp, 0, sizeof (WLBS_REG_PARAMS));
|
|
|
|
status = WlbsReadReg (WLBS_LOCAL_CLUSTER, WLBS_LOCAL_HOST, & temp);
|
|
verify_return_value (_TEXT("ReadReg after a write"), WLBS_OK, status);
|
|
|
|
memset ( temp . i_port_rules, 0, sizeof (WLBS_PORT_RULE) * WLBS_MAX_RULES);
|
|
if (memcmp(&temp, &newdata, sizeof (WLBS_REG_PARAMS)))
|
|
{
|
|
_stprintf (tbuf, _TEXT("1:The data written and the data read back differ in the location %d\n"),
|
|
find_mem_change (&newdata, &temp, sizeof (WLBS_REG_PARAMS)) );
|
|
add_error (tbuf);
|
|
}
|
|
|
|
/* restore the original status of the registry */
|
|
status = WlbsWriteReg (WLBS_LOCAL_CLUSTER, WLBS_LOCAL_HOST, & saved);
|
|
verify_return_value (_TEXT("WriteReg to restore original state"), WLBS_OK, status);
|
|
|
|
status = WlbsReadReg (WLBS_LOCAL_CLUSTER, WLBS_LOCAL_HOST, & newdata);
|
|
verify_return_value (_TEXT("ReadReg"), WLBS_OK, status);
|
|
|
|
newdata . i_convert_mac = FALSE;
|
|
newdata . mcast_support = FALSE;
|
|
_tcscpy (newdata . cl_mac_addr, _TEXT("11-22-33-44-55-66"));
|
|
|
|
status = WlbsWriteReg (WLBS_LOCAL_CLUSTER, WLBS_LOCAL_HOST, & newdata);
|
|
verify_return_value (_TEXT("WriteReg with convertmac = false; mcast = false"), WLBS_OK, status);
|
|
|
|
status = WlbsReadReg (WLBS_LOCAL_CLUSTER, WLBS_LOCAL_HOST, & temp);
|
|
verify_return_value (_TEXT("ReadReg with convertmac = false; mcast = false"), WLBS_OK, status);
|
|
|
|
if (memcmp (&temp, &newdata, sizeof (WLBS_REG_PARAMS)) )
|
|
{
|
|
_stprintf (tbuf, _TEXT("2:The data written and the data read back differ in the location %d\n"),
|
|
find_mem_change (&newdata, &temp, sizeof (WLBS_REG_PARAMS)) );
|
|
add_error (tbuf);
|
|
}
|
|
|
|
newdata . i_convert_mac = TRUE;
|
|
newdata . mcast_support = FALSE;
|
|
|
|
status = WlbsWriteReg (WLBS_LOCAL_CLUSTER, WLBS_LOCAL_HOST, & newdata);
|
|
verify_return_value (_TEXT("WriteReg with convertmac = true; mcast = false"), WLBS_OK, status);
|
|
|
|
status = WlbsReadReg (WLBS_LOCAL_CLUSTER, WLBS_LOCAL_HOST, & temp);
|
|
if ( _tcsnicmp(_TEXT("02-bf"), temp . cl_mac_addr, _tcslen(_TEXT("02-bf")) ) )
|
|
{
|
|
_stprintf (tbuf, _TEXT("Error in converting mac address in the unicast mode"));
|
|
add_error (tbuf);
|
|
}
|
|
|
|
newdata . mcast_support = TRUE;
|
|
status = WlbsWriteReg (WLBS_LOCAL_CLUSTER, WLBS_LOCAL_HOST, & newdata);
|
|
verify_return_value (_TEXT("WriteReg with convertmac = true; mcast = true"), WLBS_OK, status);
|
|
|
|
status = WlbsReadReg (WLBS_LOCAL_CLUSTER, WLBS_LOCAL_HOST, & temp);
|
|
|
|
if ( _tcsnicmp (_TEXT("03-bf"), temp . cl_mac_addr, _tcslen(_TEXT("03-bf")) ))
|
|
{
|
|
_stprintf (tbuf, _TEXT("Error in converting mac address in the multicast mode"));
|
|
add_error (tbuf);
|
|
}
|
|
|
|
/* These tests are to verify that parameter checking in WlbsWriteReg is o.k. */
|
|
|
|
newdata . host_priority = CVY_MIN_PRIORITY - 1;
|
|
status = WlbsWriteReg (WLBS_LOCAL_CLUSTER, WLBS_LOCAL_HOST, &newdata);
|
|
verify_return_value (_TEXT("WriteReg with host priority = 0"), WLBS_BAD_PARAMS, status);
|
|
|
|
newdata . host_priority = CVY_MAX_PRIORITY + 1;
|
|
status = WlbsWriteReg (WLBS_LOCAL_CLUSTER, WLBS_LOCAL_HOST, &newdata);
|
|
verify_return_value (_TEXT("WriteReg with host priority = 33"), WLBS_BAD_PARAMS, status);
|
|
newdata . host_priority = saved . host_priority;
|
|
|
|
newdata . rct_port = CVY_MIN_RCT_PORT - 1;
|
|
status = WlbsWriteReg (WLBS_LOCAL_CLUSTER, WLBS_LOCAL_HOST, &newdata);
|
|
verify_return_value (_TEXT("WriteReg with RCT port = 0"), WLBS_BAD_PARAMS, status);
|
|
|
|
newdata . rct_port = CVY_MAX_RCT_PORT + 1;
|
|
status = WlbsWriteReg (WLBS_LOCAL_CLUSTER, WLBS_LOCAL_HOST, &newdata);
|
|
verify_return_value (_TEXT("WriteReg with RCT port = 65536"), WLBS_BAD_PARAMS, status);
|
|
newdata . rct_port = saved . rct_port;
|
|
|
|
newdata . i_num_rules = CVY_MAX_NUM_RULES + 1;
|
|
status = WlbsWriteReg (WLBS_LOCAL_CLUSTER, WLBS_LOCAL_HOST, &newdata);
|
|
verify_return_value (_TEXT("WriteReg with num_rules = 33"), WLBS_BAD_PARAMS, status);
|
|
newdata . i_num_rules = saved . i_num_rules;
|
|
|
|
newdata . i_convert_mac = FALSE;
|
|
_tcscpy (newdata . ded_ip_addr, _TEXT("0.0.0.0"));
|
|
_tcscpy (newdata . cl_ip_addr, _TEXT("0.0.0.0"));
|
|
_tcscpy (newdata . ded_net_mask, _TEXT("0.0.0.0"));
|
|
_tcscpy (newdata . cl_net_mask, _TEXT("0.0.0.0"));
|
|
_tcscpy (newdata . cl_mac_addr, _TEXT("00-11-22-33-44-AA"));
|
|
status = WlbsWriteReg (WLBS_LOCAL_CLUSTER, WLBS_LOCAL_HOST, &newdata);
|
|
verify_return_value (_TEXT("WriteReg with all ip addresses = 0"), WLBS_OK, status);
|
|
|
|
_tcscpy (newdata . cl_mac_addr, _TEXT("0g-11-hh-jj-kk-ll"));
|
|
status = WlbsWriteReg (WLBS_LOCAL_CLUSTER, WLBS_LOCAL_HOST, &newdata);
|
|
verify_return_value (_TEXT("WriteReg with cl mac addr = 0g-11-hh-jj-kk-ll"), WLBS_BAD_PARAMS, status);
|
|
_tcscpy (newdata . cl_mac_addr, _TEXT("00-11-22-33-44-AA"));
|
|
|
|
_tcscpy (newdata . cl_mac_addr, _TEXT("00-11-22-33-44-5G"));
|
|
status = WlbsWriteReg (WLBS_LOCAL_CLUSTER, WLBS_LOCAL_HOST, &newdata);
|
|
verify_return_value (_TEXT("WriteReg with cl mac addr = 00-11-22-33-44-5G"), WLBS_BAD_PARAMS, status);
|
|
_tcscpy (newdata . cl_mac_addr, _TEXT("00-11-22-33-44-AA"));
|
|
|
|
_tcscpy (newdata . ded_net_mask, _TEXT("333.222.222.222"));
|
|
status = WlbsWriteReg (WLBS_LOCAL_CLUSTER, WLBS_LOCAL_HOST, &newdata);
|
|
verify_return_value (_TEXT("WriteReg with ded ip mask = 333.222.222.222"), WLBS_BAD_PARAMS, status);
|
|
_tcscpy (newdata . ded_net_mask, _TEXT("0.0.0.0"));
|
|
|
|
_tcscpy (newdata . ded_ip_addr, _TEXT("333.222.222.222"));
|
|
status = WlbsWriteReg (WLBS_LOCAL_CLUSTER, WLBS_LOCAL_HOST, &newdata);
|
|
verify_return_value (_TEXT("WriteReg with ded ip addr = 333.222.222.222"), WLBS_BAD_PARAMS, status);
|
|
_tcscpy (newdata . ded_ip_addr, _TEXT("0.0.0.0"));
|
|
|
|
_tcscpy (newdata . cl_net_mask, _TEXT("333.222.222.222"));
|
|
status = WlbsWriteReg (WLBS_LOCAL_CLUSTER, WLBS_LOCAL_HOST, &newdata);
|
|
verify_return_value (_TEXT("WriteReg with cl ip mask = 333.222.222.222"), WLBS_BAD_PARAMS, status);
|
|
_tcscpy (newdata . cl_net_mask, _TEXT("0.0.0.0"));
|
|
|
|
_tcscpy (newdata . cl_ip_addr, _TEXT("333.222.222.222"));
|
|
status = WlbsWriteReg (WLBS_LOCAL_CLUSTER, WLBS_LOCAL_HOST, &newdata);
|
|
verify_return_value (_TEXT("WriteReg with cl ip addr = 333.222.222.222"), WLBS_BAD_PARAMS, status);
|
|
_tcscpy (newdata . cl_ip_addr, _TEXT("0.0.0.0"));
|
|
|
|
|
|
/* Restore the initial state */
|
|
status = WlbsWriteReg (WLBS_LOCAL_CLUSTER, WLBS_LOCAL_HOST, & saved);
|
|
status = WlbsCommitChanges (WLBS_LOCAL_CLUSTER, WLBS_LOCAL_HOST);
|
|
return;
|
|
}
|
|
|
|
|
|
/* This function verifies the commit functionality.
|
|
* It writes a new priority to the registry and commits it.
|
|
* A local query is made. The host id is checked to see that the commit has
|
|
* indeed forced the driver to load the new host id.
|
|
* This may cause the cluster (in case of multiple hosts) to go into convergence
|
|
* if the id is duplicated .....
|
|
*/
|
|
|
|
void verify_host_id_changes (PWLBS_REG_PARAMS reg_data, DWORD old_priority, DWORD new_priority)
|
|
{
|
|
DWORD status;
|
|
DWORD num_host, host_map;
|
|
WLBS_RESPONSE response;
|
|
|
|
|
|
reg_data -> host_priority = new_priority;
|
|
status = WlbsWriteReg (WLBS_LOCAL_CLUSTER, WLBS_LOCAL_HOST, reg_data);
|
|
status = WlbsCommitChanges (WLBS_LOCAL_CLUSTER, WLBS_LOCAL_HOST);
|
|
verify_return_value (_TEXT("Commit after changing host priority"), WLBS_OK, status);
|
|
num_host = 1;
|
|
status = WlbsQuery (WLBS_LOCAL_CLUSTER, WLBS_LOCAL_HOST, &response, &num_host, &host_map, NULL);
|
|
|
|
/* Hope that Query does not return any winsock error ... */
|
|
verify_return_value (_TEXT("Verifying the host priority after commit"),
|
|
new_priority,
|
|
response . id);
|
|
|
|
return;
|
|
}
|
|
|
|
|
|
/* This function changes only the cluster and dedicated ip addresses and verifies them */
|
|
void verify_ip_address_changes (PWLBS_REG_PARAMS reg_data, PTCHAR cl_ip_addr, PTCHAR ded_ip_addr)
|
|
{
|
|
DWORD status;
|
|
|
|
_tcscpy ( reg_data -> cl_ip_addr, cl_ip_addr);
|
|
_tcscpy ( reg_data -> ded_ip_addr, ded_ip_addr);
|
|
reg_data -> i_convert_mac = FALSE; /* So that the mac address does not change */
|
|
|
|
status = WlbsWriteReg (WLBS_LOCAL_CLUSTER, WLBS_LOCAL_HOST, reg_data);
|
|
status = WlbsCommitChanges (WLBS_LOCAL_CLUSTER, WLBS_LOCAL_HOST);
|
|
/* Both nt4 and nt5 should return WLBS_OK.
|
|
* Reboot should not be returned since the mac address is not changed.
|
|
*/
|
|
verify_return_value (_TEXT("Commit after changing ip addresses"), WLBS_OK, status);
|
|
|
|
verify_return_value (_TEXT("Verify Changed Cluster IP Address"),
|
|
WlbsResolve (cl_ip_addr),
|
|
WlbsGetLocalClusterAddress());
|
|
|
|
verify_return_value (_TEXT("Verify Changed Cluster IP Address"),
|
|
WlbsResolve (ded_ip_addr),
|
|
WlbsGetDedicatedAddress());
|
|
|
|
return;
|
|
}
|
|
|
|
|
|
/* This function verifies that the mac address is as specified in the registry structure.
|
|
* It uses IP helper functions to get the mac address from the adapters.
|
|
* It firsts lists all the adapters and verifies that the address on one of those
|
|
* matches that in the registry.
|
|
* This function will not work on NT4 machines since NT4 does not support some
|
|
* IP helper functions.
|
|
*/
|
|
void verify_mac_address (PWLBS_REG_PARAMS reg_data)
|
|
{
|
|
IP_ADAPTER_INFO *padapter_info = NULL, *temp_adapter_info = NULL;
|
|
ULONG size;
|
|
DWORD status;
|
|
BOOL found = FALSE;
|
|
CHAR AddressFromReg [CVY_MAX_NETWORK_ADDR + 1];
|
|
CHAR AddressFromIPHelper [CVY_MAX_NETWORK_ADDR + 1];
|
|
DWORD i;
|
|
DWORD num_interfaces = 0;
|
|
|
|
|
|
Sleep (30000); /* Wait for the driver to finish reloading and then check */
|
|
|
|
#ifdef UNICODE
|
|
sprintf (AddressFromReg, "%ls", reg_data -> cl_mac_addr);
|
|
#else
|
|
sprintf (AddressFromReg, "%s", reg_data -> cl_mac_addr);
|
|
#endif
|
|
|
|
status = GetNumberOfInterfaces (&num_interfaces);
|
|
if (status != NO_ERROR)
|
|
{
|
|
printf("Unable to find any network interfaces on the local computer\nAborting the test\n");
|
|
return;
|
|
}
|
|
|
|
size = sizeof (IP_ADAPTER_INFO) * num_interfaces;
|
|
padapter_info = (IP_ADAPTER_INFO *) malloc (size);
|
|
if (padapter_info == NULL)
|
|
return;
|
|
|
|
for (i = 0 ; i < num_interfaces; i++)
|
|
padapter_info [i] . Next = NULL;
|
|
|
|
status = GetAdaptersInfo (padapter_info, & size);
|
|
if (status != ERROR_SUCCESS)
|
|
{
|
|
printf("Unable to Get Adapter Info. Cannot verify mac address.\n");
|
|
switch (status)
|
|
{
|
|
case ERROR_BUFFER_OVERFLOW : printf ("Required buffer size is %d\n", size);
|
|
break;
|
|
|
|
case ERROR_INVALID_PARAMETER : printf ("Invalid parameter\n");
|
|
break;
|
|
|
|
case ERROR_NO_DATA : printf ("No Adapter Information\n");
|
|
break;
|
|
|
|
case ERROR_NOT_SUPPORTED : printf ("Error not supported");
|
|
break;
|
|
|
|
default:
|
|
break;
|
|
}
|
|
return;
|
|
}
|
|
|
|
temp_adapter_info = padapter_info;
|
|
while (padapter_info)
|
|
{
|
|
sprintf (AddressFromIPHelper, "%02x-%02x-%02x-%02x-%02x-%02x",
|
|
padapter_info -> Address [0],
|
|
padapter_info -> Address [1],
|
|
padapter_info -> Address [2],
|
|
padapter_info -> Address [3],
|
|
padapter_info -> Address [4],
|
|
padapter_info -> Address [5]);
|
|
|
|
if (_stricmp (AddressFromIPHelper, AddressFromReg) == 0)
|
|
{
|
|
found = TRUE;
|
|
break;
|
|
}
|
|
padapter_info = padapter_info -> Next;
|
|
}
|
|
|
|
/* Free the allocated memory */
|
|
while (temp_adapter_info)
|
|
{
|
|
padapter_info = temp_adapter_info;
|
|
temp_adapter_info = temp_adapter_info -> Next;
|
|
free (padapter_info);
|
|
}
|
|
|
|
if (!found && !reg_data -> mcast_support)
|
|
{
|
|
add_error (_TEXT("In unicast mode, the registry mac address does not match the adapter mac address\n"));
|
|
return;
|
|
}
|
|
|
|
if (found && reg_data -> mcast_support)
|
|
{
|
|
add_error (_TEXT("In multicast mode, the registry mac address was written to the NIC"));
|
|
return;
|
|
}
|
|
/* If mac address is generated by converting the ip address,
|
|
* then verify that the conversion takes place
|
|
*/
|
|
if (reg_data -> i_convert_mac)
|
|
{
|
|
if (!reg_data -> mcast_support)
|
|
if (_strnicmp (AddressFromIPHelper, "02-bf", strlen ("02-bf")) )
|
|
add_error (_TEXT("Generation of MAC address in unicast mode failed"));
|
|
}
|
|
|
|
return;
|
|
}
|
|
|
|
|
|
|
|
/* This function checks the working of commit api. */
|
|
void check_commit (DWORD entry_point)
|
|
{
|
|
|
|
WLBS_REG_PARAMS saved, newdata, temp_data;
|
|
DWORD status;
|
|
WLBS_RESPONSE response;
|
|
DWORD num_host, host_map;
|
|
DWORD old_priority, new_priority;
|
|
|
|
|
|
_stprintf (status_buf, _TEXT("Checking Commit"));
|
|
if (global_init == WLBS_REMOTE_ONLY || global_init == WLBS_INIT_ERROR)
|
|
{
|
|
_stprintf (tbuf, _TEXT("%s Unable to Perform Commit checks"), status_buf);
|
|
add_error(tbuf);
|
|
return;
|
|
}
|
|
|
|
/* Save the original configuration */
|
|
status = WlbsReadReg (WLBS_LOCAL_CLUSTER, WLBS_LOCAL_HOST, &saved);
|
|
if (status != WLBS_OK)
|
|
{
|
|
_stprintf(tbuf, _TEXT("%s Unable to save the original configuration. Aborting the tests\n"), status_buf);
|
|
add_error (tbuf);
|
|
return;
|
|
}
|
|
|
|
status = WlbsReadReg (WLBS_LOCAL_CLUSTER, WLBS_LOCAL_HOST, &newdata);
|
|
|
|
/* This is because commit returns reboot in nt4 on a commit when the mac address changes. */
|
|
if (version_nt4)
|
|
{
|
|
if (entry_point == 1)
|
|
{
|
|
_tprintf(_TEXT("Use ipconfig to ensure that the mac address is %s\n"), newdata . cl_mac_addr);
|
|
goto mac_addr_change1;
|
|
}
|
|
else if (entry_point == 2)
|
|
{
|
|
_tprintf(_TEXT("Use ipconfig to ensure that the mac address is %s\n"), newdata . cl_mac_addr);
|
|
goto mac_addr_change2;
|
|
}
|
|
else if (entry_point == 3)
|
|
{
|
|
_tprintf(_TEXT("Use ipconfig to ensure that the mac address is the manufacturer specified one.\n"));
|
|
goto mac_addr_change3;
|
|
}
|
|
else if (entry_point == 4)
|
|
{
|
|
_tprintf(_TEXT("Use ipconfig to ensure that the mac address is the manufacturer specified one.\n"));
|
|
_tprintf(_TEXT("Please note that the cluster IP address has been changed by this test.\nPlease reset the cluster settings\n"));
|
|
return;
|
|
}
|
|
}
|
|
|
|
/* Write without any changes */
|
|
status = WlbsWriteReg (WLBS_LOCAL_CLUSTER, WLBS_LOCAL_HOST, &newdata);
|
|
status = WlbsCommitChanges (WLBS_LOCAL_CLUSTER, WLBS_LOCAL_HOST);
|
|
verify_return_value (_TEXT("Commit without any changes"), WLBS_OK, status);
|
|
|
|
/* Change only the host priority and verify that query returns the correct priority */
|
|
old_priority = newdata . host_priority;
|
|
new_priority = newdata . host_priority + 1; /* Could cause the cluster to stop operations */
|
|
if (new_priority > CVY_MAX_HOST_PRIORITY)
|
|
new_priority = 1;
|
|
|
|
verify_host_id_changes ( &newdata, old_priority, new_priority);
|
|
|
|
/* Change back to the original value and verify */
|
|
verify_host_id_changes ( &newdata, new_priority, old_priority);
|
|
|
|
/* Verify changes in the ip addresses */
|
|
verify_ip_address_changes ( &newdata, _TEXT("111.111.111.111"), _TEXT("222.222.222.222"));
|
|
|
|
/* Restore the original addresses and verify */
|
|
verify_ip_address_changes ( &newdata, saved . cl_ip_addr, saved . ded_ip_addr);
|
|
|
|
/* Now verify mac address changes */
|
|
newdata . i_convert_mac = FALSE;
|
|
newdata . mcast_support = FALSE;
|
|
_stprintf (newdata . cl_mac_addr, _TEXT("00-12-34-56-78-9a"));
|
|
status = WlbsWriteReg (WLBS_LOCAL_CLUSTER, WLBS_LOCAL_HOST, &newdata);
|
|
status = WlbsCommitChanges (WLBS_LOCAL_CLUSTER, WLBS_LOCAL_HOST);
|
|
|
|
if (!version_nt4)
|
|
{
|
|
verify_return_value (_TEXT("Changing mac address 1"), WLBS_OK, status);
|
|
status = WlbsReadReg (WLBS_LOCAL_CLUSTER, WLBS_LOCAL_HOST, &temp_data);
|
|
verify_mac_address (&temp_data);
|
|
}
|
|
else
|
|
{
|
|
verify_return_value (_TEXT("Changing mac address 1"), WLBS_REBOOT, status);
|
|
printf("\n");
|
|
print_error_messages ();
|
|
printf("Total number of tests: %d Failed Tests: %d\n", total_tests, failed_tests);
|
|
printf("Please reboot the machine and start the test as \n wlbsapitest reboot 1");
|
|
exit (1);
|
|
}
|
|
|
|
mac_addr_change1:
|
|
/* When convert mac is true and mcast support is false */
|
|
newdata . i_convert_mac = TRUE;
|
|
newdata . mcast_support = FALSE;
|
|
_stprintf (newdata . cl_mac_addr, _TEXT("00-12-34-56-78-9a"));
|
|
status = WlbsWriteReg (WLBS_LOCAL_CLUSTER, WLBS_LOCAL_HOST, &newdata);
|
|
status = WlbsCommitChanges (WLBS_LOCAL_CLUSTER, WLBS_LOCAL_HOST);
|
|
|
|
if (!version_nt4)
|
|
{
|
|
verify_return_value (_TEXT("Changing mac address 2"), WLBS_OK, status);
|
|
status = WlbsReadReg (WLBS_LOCAL_CLUSTER, WLBS_LOCAL_HOST, &temp_data);
|
|
verify_mac_address (&temp_data);
|
|
}
|
|
else
|
|
{
|
|
verify_return_value (_TEXT("Changing mac address 2"), WLBS_REBOOT, status);
|
|
printf("\n");
|
|
print_error_messages ();
|
|
printf("Total number of tests: %d Failed Tests: %d\n", total_tests, failed_tests);
|
|
printf("Please reboot the machine and start the test as \n wlbsapitest reboot 2");
|
|
exit (1);
|
|
}
|
|
|
|
mac_addr_change2:
|
|
/* When convertmac is true and mcast_support is also true */
|
|
newdata . i_convert_mac = TRUE;
|
|
newdata . mcast_support = TRUE;
|
|
status = WlbsWriteReg (WLBS_LOCAL_CLUSTER, WLBS_LOCAL_HOST, &newdata);
|
|
status = WlbsCommitChanges (WLBS_LOCAL_CLUSTER, WLBS_LOCAL_HOST);
|
|
|
|
if (!version_nt4)
|
|
{
|
|
verify_return_value (_TEXT("Changing mac address 3"), WLBS_OK, status);
|
|
status = WlbsReadReg (WLBS_LOCAL_CLUSTER, WLBS_LOCAL_HOST, &temp_data);
|
|
verify_mac_address (&temp_data);
|
|
}
|
|
else
|
|
{
|
|
|
|
verify_return_value (_TEXT("Changing mac address 3"), WLBS_REBOOT, status);
|
|
printf("\n");
|
|
print_error_messages ();
|
|
printf("Total number of tests: %d Failed Tests: %d\n", total_tests, failed_tests);
|
|
printf("Please reboot the machine and start the test as \n wlbsapitest reboot 3");
|
|
exit (1);
|
|
}
|
|
|
|
mac_addr_change3:
|
|
|
|
/* Add a test to change the cluster ip address in multicast mode with convertmac set to true
|
|
* and verify that ipconfig does not display this multicast mac address.
|
|
*/
|
|
|
|
_tcscpy (newdata . cl_ip_addr, _TEXT("111.222.111.222"));
|
|
status = WlbsWriteReg (WLBS_LOCAL_CLUSTER, WLBS_LOCAL_HOST, &newdata);
|
|
status = WlbsCommitChanges (WLBS_LOCAL_CLUSTER, WLBS_LOCAL_HOST);
|
|
|
|
if (!version_nt4)
|
|
{
|
|
verify_return_value (_TEXT("Changing mac address 4"), WLBS_OK, status);
|
|
status = WlbsReadReg (WLBS_LOCAL_CLUSTER, WLBS_LOCAL_HOST, &temp_data);
|
|
verify_mac_address (&temp_data);
|
|
}
|
|
else
|
|
{
|
|
|
|
verify_return_value (_TEXT("Changing mac address 4"), WLBS_REBOOT, status);
|
|
printf("\n");
|
|
print_error_messages ();
|
|
printf("Total number of tests: %d Failed Tests: %d\n", total_tests, failed_tests);
|
|
printf("Please reboot the machine and start the test as \n wlbsapitest reboot 4");
|
|
exit (1);
|
|
}
|
|
|
|
|
|
|
|
/* restore the original state */
|
|
if (entry_point == 0)
|
|
{
|
|
status = WlbsWriteReg (WLBS_LOCAL_CLUSTER, WLBS_LOCAL_HOST, &saved);
|
|
status = WlbsCommitChanges (WLBS_LOCAL_CLUSTER, WLBS_LOCAL_HOST);
|
|
}
|
|
|
|
return;
|
|
}
|
|
|
|
|
|
/* This function performs the parameter tests for the port rule APIs.
|
|
* This includes passing NULL parameters, invalid parameters ...
|
|
*/
|
|
void port_rule_parameter_test (PWLBS_REG_PARAMS reg_data)
|
|
{
|
|
DWORD status;
|
|
PWLBS_PORT_RULE rules;
|
|
WLBS_PORT_RULE rule1, rule2;
|
|
DWORD num_rules1, num_rules2;
|
|
|
|
_stprintf (status_buf, _TEXT("Port Rule APIs Parameter Test"));
|
|
|
|
status = WlbsGetNumPortRules (NULL);
|
|
verify_return_value (_TEXT("GetNumPortRules"), WLBS_BAD_PARAMS, status);
|
|
|
|
status = WlbsEnumPortRules (NULL, NULL, NULL);
|
|
verify_return_value (_TEXT("EnumPortRules"), WLBS_BAD_PARAMS, status);
|
|
|
|
status = WlbsEnumPortRules (reg_data, NULL, NULL);
|
|
verify_return_value (_TEXT("EnumPortRules"), WLBS_BAD_PARAMS, status);
|
|
|
|
/* find the number of rules through both EnumPortRules as well as through GetNumPortRules
|
|
* Verify that both return the same number of rules
|
|
*/
|
|
num_rules1 = 0;
|
|
status = WlbsEnumPortRules (reg_data, NULL, &num_rules1);
|
|
verify_return_value (_TEXT("EnumPortRules"), WLBS_TRUNCATED, status);
|
|
num_rules2 = WlbsGetNumPortRules (reg_data);
|
|
verify_return_value (_TEXT("EnumPortRules and GetNumPortRules"), num_rules2, num_rules1);
|
|
|
|
status = WlbsGetPortRule (NULL, 80, NULL);
|
|
verify_return_value (_TEXT("GetPortRule with regdata null"), WLBS_BAD_PARAMS, status);
|
|
|
|
status = WlbsGetPortRule (reg_data, 80, NULL);
|
|
verify_return_value (_TEXT("GetPortRule with port_rule null"), WLBS_BAD_PARAMS, status);
|
|
|
|
status = WlbsGetPortRule (reg_data, CVY_MAX_PORT + 1, &rule1);
|
|
verify_return_value (_TEXT("GetPortRule with invalid port"), WLBS_BAD_PARAMS, status);
|
|
|
|
status = WlbsAddPortRule (NULL, NULL);
|
|
verify_return_value (_TEXT("AddPortRule with regdata null"), WLBS_BAD_PARAMS, status);
|
|
|
|
status = WlbsAddPortRule (reg_data, NULL);
|
|
verify_return_value (_TEXT("AddPortRule with port_rule null"), WLBS_BAD_PARAMS, status);
|
|
|
|
status = WlbsDeletePortRule (NULL, 80);
|
|
verify_return_value (_TEXT("DeletePortRule with regdata null"), WLBS_BAD_PARAMS, status);
|
|
|
|
status = WlbsDeletePortRule (reg_data, CVY_MAX_PORT + 1);
|
|
verify_return_value (_TEXT("DeletePortRule with invalid port number"), WLBS_BAD_PARAMS, status);
|
|
|
|
return;
|
|
}
|
|
|
|
|
|
/* This function deletes all the existing port rules in the reg_params structure.
|
|
* This helps in starting off from a known state.
|
|
*/
|
|
void delete_all_rules ( PWLBS_REG_PARAMS reg_data )
|
|
{
|
|
WLBS_PORT_RULE rules [WLBS_MAX_RULES];
|
|
DWORD num_rules;
|
|
DWORD i;
|
|
|
|
num_rules = WLBS_MAX_RULES;
|
|
WlbsEnumPortRules ( reg_data, rules, & num_rules );
|
|
|
|
for (i = 0 ; i < num_rules ; i++)
|
|
WlbsDeletePortRule ( reg_data, rules [i] . start_port );
|
|
|
|
return;
|
|
}
|
|
|
|
|
|
/* This function generates num_rules number of valid and non-ovelapping port rules
|
|
* and returns it in the rules array
|
|
*/
|
|
void generate_valid_rules ( PWLBS_PORT_RULE rules, DWORD num_rules, DWORD range )
|
|
{
|
|
|
|
DWORD i;
|
|
static DWORD pri = 0;
|
|
|
|
for (i = 0 ; i < num_rules ; i++)
|
|
{
|
|
rules [i] . start_port = i * range;
|
|
rules [i] . end_port = rules [i] . start_port + range - 1;
|
|
rules [i] . mode = (pri++) % CVY_MAX_MODE + 1;
|
|
rules [i] . protocol = (pri++) % CVY_MAX_PROTOCOL + 1;
|
|
|
|
|
|
if (rules [i] . mode == WLBS_SINGLE)
|
|
rules [i] . mode_data . single . priority = (pri++) % (WLBS_MAX_HOSTS) + 1;
|
|
|
|
if (rules [i] . mode == WLBS_MULTI)
|
|
{
|
|
rules [i] . mode_data . multi . affinity = (WORD) ((pri++) % (CVY_MAX_AFFINITY + 1));
|
|
rules [i] . mode_data . multi . equal_load = (WORD) ((pri++) % 2);
|
|
rules [i] . mode_data . multi . load = (WORD) ((pri++) % (CVY_MAX_LOAD + 1));
|
|
}
|
|
}
|
|
return;
|
|
}
|
|
|
|
|
|
/* Verify that the rules returned by Enum are in sorted order */
|
|
BOOL verify_enum_port_rules (PWLBS_PORT_RULE rules, DWORD num_rules)
|
|
{
|
|
DWORD i;
|
|
|
|
if (num_rules == 0)
|
|
return TRUE;
|
|
|
|
for (i = 0 ; i < num_rules - 1; i++)
|
|
{
|
|
if (rules [i] . start_port >= rules [i + 1] . start_port)
|
|
return FALSE;
|
|
}
|
|
|
|
return TRUE;
|
|
}
|
|
|
|
|
|
/* Check that add and delete apis work fine. Verify this through calls to GetNum, Enum, GetPort */
|
|
void check_add_delete_port_rules (PWLBS_REG_PARAMS reg_data,
|
|
PWLBS_PORT_RULE rule_list,
|
|
DWORD num_rules,
|
|
DWORD range)
|
|
{
|
|
DWORD status;
|
|
DWORD num_rules1, num_rules2;
|
|
WLBS_PORT_RULE rule, rules [WLBS_MAX_RULES];
|
|
DWORD i, j, port;
|
|
|
|
/* First check the addportrule functionality.
|
|
* After adding each rule, check that GetNumPortRules returns the correct value.
|
|
* Verify that EnumPortRules also returns the correct number of rules
|
|
*/
|
|
for (i = 0 ; i < WLBS_MAX_RULES ; i++)
|
|
{
|
|
j = (i * range) % num_rules;
|
|
status = WlbsAddPortRule (reg_data, &rule_list [j] );
|
|
verify_return_value (_TEXT("AddPortRule"), WLBS_OK, status);
|
|
|
|
num_rules1 = WlbsGetNumPortRules (reg_data);
|
|
verify_return_value (_TEXT("GetNumPortRules"), i+1, num_rules1);
|
|
|
|
num_rules2 = WLBS_MAX_RULES;
|
|
status = WlbsEnumPortRules (reg_data, rules, &num_rules2);
|
|
verify_return_value (_TEXT("EnumPortRules"), WLBS_OK, status);
|
|
verify_return_value (_TEXT("EnumPortRules and GetNum"), num_rules1, num_rules2);
|
|
|
|
if (!verify_enum_port_rules (rules, num_rules2))
|
|
{
|
|
add_error (_TEXT("Error in Verifying EnumPortRules. Aborting tests"));
|
|
return;
|
|
}
|
|
|
|
/* Verify that GetPortRule returns the correct port rule that was added
|
|
* Do a GetPortRule on the start port, the end port as well as on any port
|
|
* number in between.
|
|
*/
|
|
if (j%3 == 0)
|
|
port = rule_list [j] . start_port;
|
|
else if (j%3 == 1)
|
|
port = rule_list [j] . end_port;
|
|
else
|
|
port = (rule_list [j] . start_port + rule_list [j] . end_port)/2;
|
|
|
|
status = WlbsGetPortRule (reg_data, port, & rule);
|
|
verify_return_value (_TEXT("GetPortRule"), WLBS_OK, status);
|
|
|
|
/* These two fields are set when the rule is added */
|
|
rule_list [j] . i_valid = rule . i_valid;
|
|
rule_list [j] . i_code = rule . i_code;
|
|
|
|
if (memcmp (&rule, &rule_list [j], sizeof (WLBS_PORT_RULE)) )
|
|
add_error (_TEXT("Port rule that was added is changed when retrieved"));
|
|
}
|
|
|
|
/* Now there is no space for any further rules.
|
|
* Try to add the remaining rules.
|
|
* WlbsAddPortRule should return WLBS_MAX_PORT_RULES each time.
|
|
* Also, get port rule should return WLBS_NOT_FOUND
|
|
*/
|
|
for (i = WLBS_MAX_RULES; i < num_rules; i++)
|
|
{
|
|
j = (i * range) % num_rules;
|
|
|
|
status = WlbsAddPortRule (reg_data, & rule_list [j]);
|
|
verify_return_value (_TEXT("AddPortRule more than 32 rules"), WLBS_MAX_PORT_RULES, status);
|
|
|
|
port = rule_list [j] . start_port;
|
|
status = WlbsGetPortRule (reg_data, port, &rule);
|
|
verify_return_value (_TEXT("GetPortRule non-existent rule"), WLBS_NOT_FOUND, status);
|
|
|
|
verify_return_value (_TEXT("GetNumPortRules when max rules"), WLBS_MAX_RULES,
|
|
WlbsGetNumPortRules(reg_data));
|
|
}
|
|
|
|
/* Test delete functionality.
|
|
* Pass the start port, end port or any intermediate port number as input.
|
|
* Verify that the port rule has indeed been deleted by checking GetNumPortRules,
|
|
* EnumPortRules as well GetPortRule
|
|
*/
|
|
for (i = 0 ; i < WLBS_MAX_RULES; i ++)
|
|
{
|
|
j = (i * range) % num_rules;
|
|
|
|
if (j%3 == 0)
|
|
port = rule_list [j] . start_port;
|
|
else if (j%3 == 1)
|
|
port = rule_list [j] . end_port;
|
|
else
|
|
port = (rule_list [j] . start_port + rule_list [j] . end_port) / 2;
|
|
|
|
status = WlbsDeletePortRule (reg_data, port);
|
|
verify_return_value (_TEXT("DeletePortRule"), WLBS_OK, status);
|
|
|
|
num_rules1 = WlbsGetNumPortRules (reg_data);
|
|
verify_return_value (_TEXT("GetNumPortRules after deleting"), WLBS_MAX_RULES - i - 1, num_rules1);
|
|
|
|
num_rules2 = WLBS_MAX_RULES;
|
|
status = WlbsEnumPortRules (reg_data, rules, &num_rules2);
|
|
verify_return_value (_TEXT("EnumPortRules after deleting"), WLBS_OK, status);
|
|
verify_return_value (_TEXT("EnumPortRules and GetNum after deleting"), num_rules1, num_rules2);
|
|
|
|
if (!verify_enum_port_rules (rules, num_rules2))
|
|
{
|
|
add_error (_TEXT("Error in Verifying EnumPortRules. Aborting tests"));
|
|
return;
|
|
}
|
|
|
|
status = WlbsGetPortRule (reg_data, port, & rule);
|
|
verify_return_value (_TEXT("GetPortRule after deleting"), WLBS_NOT_FOUND, status);
|
|
}
|
|
|
|
/* Try to delete the remaining rules. WLBS_NOT_FOUND should be returned in all cases.
|
|
* Also, GetNumPortRules should return 0 always */
|
|
for (i = WLBS_MAX_RULES; i < num_rules; i++)
|
|
{
|
|
j = (i * range) % num_rules;
|
|
status = WlbsDeletePortRule (reg_data, rule_list [j] . start_port);
|
|
verify_return_value (_TEXT("DeletePortRule on empty rule list"), WLBS_NOT_FOUND, status);
|
|
verify_return_value (_TEXT("GetNumPortRules on empty rule list"), 0,
|
|
WlbsGetNumPortRules(reg_data));
|
|
}
|
|
|
|
return;
|
|
}
|
|
|
|
|
|
void port_rule_functional_test (PWLBS_REG_PARAMS reg_data)
|
|
{
|
|
#define MAX_RULES 50
|
|
|
|
WLBS_PORT_RULE rule1, rule2, rule_list1 [MAX_RULES], rule_list2 [WLBS_MAX_RULES];
|
|
DWORD status1, status2;
|
|
DWORD num_rules1, num_rules2;
|
|
|
|
/* Delete all the existing rules. Add invalid rules and check that the error is detected.
|
|
* Add new rules in both sorted and unsorted order and then do an enum to verify that
|
|
* the rules get sorted. Verify that GetNumPortRules returns the correct value each time.
|
|
* Delete the rules in random order and also in sorted order. Verify that the rule is
|
|
* indeed deleted. Also, verify that enum returns all the rules in sorted order.
|
|
*/
|
|
delete_all_rules (reg_data);
|
|
generate_valid_rules (rule_list1, MAX_RULES, 500);
|
|
|
|
rule1 = rule_list1 [0];
|
|
/* First, try adding invalid rules. The return value should be WLBS_BAD_PORT_PARAMS */
|
|
/* The invalid cases are listed in the apitest.c file */
|
|
|
|
/* start port > end port */
|
|
rule1 . start_port = rule1 . end_port + 1;
|
|
status1 = WlbsAddPortRule (reg_data, &rule1);
|
|
verify_return_value (_TEXT("AddPortRule sp > ep"), WLBS_BAD_PORT_PARAMS, status1);
|
|
|
|
/* invalid start port */
|
|
rule1 . start_port = CVY_MAX_PORT + 1;
|
|
rule1 . end_port = rule1 . start_port;
|
|
status1 = WlbsAddPortRule (reg_data, &rule1);
|
|
verify_return_value (_TEXT("AddPortRule sp > MAX_PORT"), WLBS_BAD_PORT_PARAMS, status1);
|
|
|
|
/* invalid end port */
|
|
rule1 . start_port = 80;
|
|
rule1 . end_port = CVY_MAX_PORT + 1;
|
|
status1 = WlbsAddPortRule (reg_data, &rule1);
|
|
verify_return_value (_TEXT("AddPortRule sp = 80 ep > MAX_PORT"), WLBS_BAD_PORT_PARAMS, status1);
|
|
|
|
/* invalid protocol */
|
|
rule1 = rule_list1 [0];
|
|
rule1 . protocol = CVY_MIN_PROTOCOL - 1;
|
|
status1 = WlbsAddPortRule (reg_data, &rule1);
|
|
verify_return_value (_TEXT("AddPortRule InvalidProtocol"), WLBS_BAD_PORT_PARAMS, status1);
|
|
|
|
rule1 . protocol = CVY_MAX_PROTOCOL + 1;
|
|
status1 = WlbsAddPortRule (reg_data, &rule1);
|
|
verify_return_value (_TEXT("AddPortRule InvalidProtocol"), WLBS_BAD_PORT_PARAMS, status1);
|
|
|
|
rule1 . protocol = CVY_MAX_PROTOCOL;
|
|
/* invalid mode */
|
|
rule1 . mode = CVY_MIN_MODE - 1;
|
|
status1 = WlbsAddPortRule (reg_data, &rule1);
|
|
verify_return_value (_TEXT("AddPortRule InvalidMode"), WLBS_BAD_PORT_PARAMS, status1);
|
|
|
|
rule1 . mode = CVY_MAX_MODE + 1;
|
|
status1 = WlbsAddPortRule (reg_data, &rule1);
|
|
verify_return_value (_TEXT("AddPortRule InvalidMode"), WLBS_BAD_PORT_PARAMS, status1);
|
|
|
|
/* invalid priority */
|
|
rule1 . mode = CVY_SINGLE;
|
|
rule1 . mode_data . single . priority = CVY_MIN_PRIORITY - 1;
|
|
status1 = WlbsAddPortRule (reg_data, &rule1);
|
|
verify_return_value (_TEXT("AddPortRule InvalidPriority"), WLBS_BAD_PORT_PARAMS, status1);
|
|
|
|
rule1 . mode_data . single . priority = CVY_MAX_PRIORITY + 1;
|
|
status1 = WlbsAddPortRule (reg_data, &rule1);
|
|
verify_return_value (_TEXT("AddPortRule InvalidPriority"), WLBS_BAD_PORT_PARAMS, status1);
|
|
|
|
/* invalid affinity */
|
|
rule1 . mode = CVY_MULTI;
|
|
rule1 . mode_data . multi . affinity = CVY_MAX_AFFINITY + 1;
|
|
status1 = WlbsAddPortRule (reg_data, &rule1);
|
|
verify_return_value (_TEXT("AddPortRule InvalidAffinity"), WLBS_BAD_PORT_PARAMS, status1);
|
|
|
|
/* invalid equal load */
|
|
rule1 . mode_data . multi . affinity = CVY_MAX_AFFINITY;
|
|
rule1 . mode_data . multi . equal_load = CVY_MAX_EQUAL_LOAD + 1;
|
|
status1 = WlbsAddPortRule (reg_data, &rule1);
|
|
verify_return_value (_TEXT("AddPortRule InvalidEqualLoad"), WLBS_BAD_PORT_PARAMS, status1);
|
|
|
|
/* invalid load */
|
|
rule1 . mode_data . multi . equal_load = CVY_MIN_EQUAL_LOAD;
|
|
rule1 . mode_data . multi . load = CVY_MAX_LOAD + 1;
|
|
status1 = WlbsAddPortRule (reg_data, &rule1);
|
|
verify_return_value (_TEXT("AddPortRule InvalidLoad"), WLBS_BAD_PORT_PARAMS, status1);
|
|
|
|
/* add a valid rule and then test for overlapping rules
|
|
* Test the different cases where overlapping can occur
|
|
*/
|
|
rule1 = rule_list1 [1];
|
|
status1 = WlbsAddPortRule (reg_data, &rule1);
|
|
verify_return_value (_TEXT("AddPortRule ValidRule"), WLBS_OK, status1);
|
|
|
|
rule2 = rule1;
|
|
status1 = WlbsAddPortRule (reg_data, &rule2);
|
|
verify_return_value (_TEXT("AddPortRule Overlap. same start and end ports"), WLBS_PORT_OVERLAP, status1);
|
|
|
|
rule2 . start_port = rule1 . start_port + 1;
|
|
rule2 . end_port = rule2 . end_port - 1;
|
|
status1 = WlbsAddPortRule (reg_data, &rule2);
|
|
verify_return_value (_TEXT("AddPortRule Overlap 2 "), WLBS_PORT_OVERLAP, status1);
|
|
|
|
rule2 . start_port = rule1 . start_port - 1;
|
|
rule2 . end_port = rule2 . end_port + 1;
|
|
status1 = WlbsAddPortRule (reg_data, &rule2);
|
|
verify_return_value (_TEXT("AddPortRule Overlap 3 "), WLBS_PORT_OVERLAP, status1);
|
|
|
|
/* The following two tests would fail if the start port and the end port both are the same */
|
|
rule2 . start_port = rule1 . start_port - 1;
|
|
rule2 . end_port = rule2 . end_port - 1;
|
|
status1 = WlbsAddPortRule (reg_data, &rule2);
|
|
verify_return_value (_TEXT("AddPortRule Overlap 4 "), WLBS_PORT_OVERLAP, status1);
|
|
|
|
rule2 . start_port = rule1 . start_port + 1;
|
|
rule2 . end_port = rule2 . end_port + 1;
|
|
status1 = WlbsAddPortRule (reg_data, &rule2);
|
|
verify_return_value (_TEXT("AddPortRule Overlap 5 "), WLBS_PORT_OVERLAP, status1);
|
|
|
|
status1 = WlbsDeletePortRule (reg_data, rule1 . start_port);
|
|
verify_return_value (_TEXT("DeletePortRule"), WLBS_OK, status1);
|
|
|
|
/* First test the APIs by inserting and deleting the rules in sorted order */
|
|
check_add_delete_port_rules (reg_data, rule_list1, MAX_RULES, 1);
|
|
/* Then test the APIs by inserting and deleting the rules in pseudo - unsorted order */
|
|
check_add_delete_port_rules (reg_data, rule_list1, MAX_RULES, 7);
|
|
|
|
return;
|
|
#undef MAX_RULES
|
|
}
|
|
|
|
|
|
void check_port_rule_apis ()
|
|
{
|
|
|
|
WLBS_REG_PARAMS saved, reg_data;
|
|
DWORD status;
|
|
|
|
if (global_init == WLBS_REMOTE_ONLY || global_init == WLBS_INIT_ERROR)
|
|
{
|
|
add_error (_TEXT("WLBS is not installed on this host. Port rule apis cannot be tested"));
|
|
return;
|
|
}
|
|
|
|
/* Save the existing configuration */
|
|
status = WlbsReadReg (WLBS_LOCAL_CLUSTER, WLBS_LOCAL_HOST, &saved);
|
|
status = WlbsReadReg (WLBS_LOCAL_CLUSTER, WLBS_LOCAL_HOST, ®_data);
|
|
|
|
port_rule_parameter_test (®_data);
|
|
port_rule_functional_test (®_data);
|
|
|
|
status = WlbsWriteReg (WLBS_LOCAL_CLUSTER, WLBS_LOCAL_HOST, &saved);
|
|
|
|
return;
|
|
}
|
|
|
|
|
|
void print_error_messages ()
|
|
{
|
|
PErr_Struct temp;
|
|
DWORD i = 0;
|
|
|
|
while (headq)
|
|
{
|
|
temp = headq;
|
|
i++;
|
|
_tprintf (_TEXT("Error %d %s\n"), i, temp -> comment);
|
|
headq = headq -> next;
|
|
free(temp);
|
|
}
|
|
|
|
return;
|
|
}
|
|
|
|
|
|
#define INTERNET_ADDRESS "111.111.11.11"
|
|
|
|
/* This function tests WlbsResolve, WlbsAddressToString and WlbsAddressToName */
|
|
void check_winsock_wrappers ()
|
|
{
|
|
DWORD lenp;
|
|
DWORD address;
|
|
TCHAR buf1[5], buf2[20], buf3[100], buf4[100];
|
|
CHAR cbuf[100], cbuf2[20];
|
|
int len = 1000;
|
|
struct hostent * host;
|
|
|
|
_stprintf (status_buf, _TEXT("Verifying Winsock Wrappers"));
|
|
verify_return_value (_TEXT("WlbsResolve on invalid name"), WlbsResolve(_TEXT("junkname")), 0);
|
|
gethostname (cbuf, len); /* Assume that this function does not fail */
|
|
#ifdef UNICODE
|
|
swprintf (buf4, _TEXT("%S"), cbuf);
|
|
#else
|
|
sprintf (buf4, "%s", cbuf);
|
|
#endif
|
|
|
|
host = gethostbyname (cbuf);
|
|
if (host == NULL)
|
|
{
|
|
add_error(_TEXT("gethostbyname failed, aborting winsock wrapper test\n"));
|
|
return;
|
|
|
|
}
|
|
|
|
verify_return_value (_TEXT("WlbsResolve on null name"), WlbsResolve(NULL),0);
|
|
|
|
address = ((struct in_addr *) (host -> h_addr)) -> s_addr;
|
|
verify_return_value (_TEXT("WlbsResolve on local machine name"), WlbsResolve(buf4),
|
|
address);
|
|
|
|
verify_return_value (_TEXT("WlbsResolve on valid dotted notation"),
|
|
WlbsResolve(_TEXT("111.111.111.111")),
|
|
inet_addr ("111.111.111.111"));
|
|
|
|
verify_return_value (_TEXT("WlbsResolve on invalid dotted notation"),
|
|
WlbsResolve(_TEXT("333.111.111.111")), 0);
|
|
|
|
|
|
lenp = 0;
|
|
verify_return_value (_TEXT("WlbsAddressToString on null buffer"),
|
|
WlbsAddressToString (address , NULL, &lenp),
|
|
FALSE );
|
|
verify_return_value (_TEXT("WlbsAddressToString required buffer length"),
|
|
strlen (inet_ntoa (* ((struct in_addr *) &address)) ) + 1, lenp);
|
|
|
|
lenp = 5;
|
|
verify_return_value (_TEXT("WlbsAddressToString on insufficient buffer"),
|
|
WlbsAddressToString (address , buf1, &lenp),
|
|
FALSE );
|
|
verify_return_value (_TEXT("WlbsAddressToString required buffer length"),
|
|
strlen (inet_ntoa (* ((struct in_addr *) &address)) ) + 1, lenp);
|
|
|
|
lenp = 20;
|
|
verify_return_value (_TEXT("WlbsAddressToString on sufficient buffer"),
|
|
WlbsAddressToString (address , buf2, &lenp),
|
|
TRUE );
|
|
verify_return_value (_TEXT("WlbsAddressToString required buffer length"),
|
|
strlen (inet_ntoa (* ((struct in_addr *) &address)) ) + 1, lenp);
|
|
|
|
#ifdef UNICODE
|
|
sprintf (cbuf2, "%ls", buf2);
|
|
#else
|
|
sprintf (cbuf2, "%s", buf2);
|
|
#endif
|
|
|
|
if (_stricmp (cbuf2, inet_ntoa (* ((struct in_addr *) &address))) )
|
|
{
|
|
_stprintf (tbuf,
|
|
_TEXT("WlbsAddressToString return was different from the value supplied. Expected %S Got %S"),
|
|
cbuf2, inet_ntoa (* ((struct in_addr *) &address)) );
|
|
|
|
add_error (tbuf);
|
|
}
|
|
|
|
/* WlbsAddressToName */
|
|
lenp = 0;
|
|
verify_return_value (_TEXT("WlbsAddressToName on null buffer"),
|
|
FALSE,
|
|
WlbsAddressToName (address, NULL, &lenp));
|
|
verify_return_value (_TEXT("WlbsAddressToName required buffer length"),
|
|
strlen ((gethostbyaddr ((char *) & address, sizeof (DWORD), AF_INET)) -> h_name) + 1,
|
|
lenp);
|
|
|
|
lenp = 5;
|
|
verify_return_value (_TEXT("WlbsAddressToName on insufficient buffer"),
|
|
FALSE,
|
|
WlbsAddressToName (address , buf1, &lenp));
|
|
verify_return_value (_TEXT("WlbsAddressToName required buffer length"),
|
|
strlen ((gethostbyaddr ((char *) & address, sizeof (DWORD), AF_INET)) -> h_name) + 1,
|
|
lenp);
|
|
|
|
lenp = 100;
|
|
verify_return_value (_TEXT("WlbsAddressToName on sufficient buffer"),
|
|
TRUE,
|
|
WlbsAddressToName (address , buf3, &lenp));
|
|
verify_return_value (_TEXT("WlbsAddressToName required buffer length"),
|
|
strlen ((gethostbyaddr ((char *) & address, sizeof (DWORD), AF_INET)) -> h_name) + 1,
|
|
lenp);
|
|
|
|
sprintf (cbuf, "%s", (gethostbyaddr ((char *) & address, sizeof (DWORD), AF_INET)) -> h_name);
|
|
#ifdef UNICODE
|
|
swprintf (buf4, L"%S", cbuf);
|
|
#else
|
|
sprintf (buf4, "%s", cbuf);
|
|
#endif
|
|
if (_tcsicmp (buf3, buf4) )
|
|
{
|
|
_stprintf (tbuf,
|
|
_TEXT("WlbsAddressToName return was different from the value supplied. Expected %s Got %s"),
|
|
buf4, buf3);
|
|
|
|
add_error (tbuf);
|
|
}
|
|
|
|
return;
|
|
}
|
|
|
|
|
|
|
|
void print_usage ()
|
|
{
|
|
printf("Usage : wlbsapitest [local] [remote cl_ip host_ip] [init] [verbose] [reboot 1|2|3] [timeout t]\n");
|
|
printf("local : for local cluster/host tests\n");
|
|
printf("remote : for remote cluster/host tests\n");
|
|
printf("init : for testing a WlbsInit special case\n");
|
|
printf("verbose: for printing the tests as they are carried out\n");
|
|
printf("reboot : for testing commit on nt4 machines. Contact kumar for further info.\n");
|
|
printf("timeout: for specifying the timeout value for cluster-wide queries. Specify it in milliseconds\n");
|
|
return;
|
|
}
|
|
|
|
|
|
INT __cdecl _tmain
|
|
(
|
|
INT argc,
|
|
PTCHAR __targv []
|
|
)
|
|
{
|
|
DWORD i;
|
|
INT arg_count;
|
|
OSVERSIONINFO osiv;
|
|
DWORD entry_point = 0;
|
|
|
|
if (argc == 1)
|
|
{
|
|
print_usage();
|
|
return 1;
|
|
}
|
|
|
|
/* Now parse the command line */
|
|
arg_count = 1;
|
|
|
|
while (arg_count < argc)
|
|
{
|
|
do {
|
|
|
|
if ( ! _tcsicmp (__targv [arg_count], _TEXT("local")) )
|
|
{
|
|
local_test = TRUE;
|
|
arg_count++;
|
|
break;
|
|
}
|
|
|
|
if ( ! _tcsicmp (__targv [arg_count], _TEXT("remote")) )
|
|
{
|
|
if ( (argc - arg_count) <= 2)
|
|
{
|
|
print_usage ();
|
|
return 1;
|
|
}
|
|
|
|
remote_cl_ip = WlbsResolve (__targv [arg_count + 1]);
|
|
remote_host_ip = WlbsResolve (__targv [arg_count + 2]);
|
|
remote_test = TRUE;
|
|
arg_count += 3;
|
|
break;
|
|
}
|
|
|
|
if ( ! _tcsicmp (__targv [arg_count], _TEXT("verbose")) )
|
|
{
|
|
verbose = TRUE;
|
|
arg_count ++;
|
|
break;
|
|
}
|
|
|
|
if ( ! _tcsicmp (__targv [arg_count], _TEXT("init")) )
|
|
{
|
|
init_test = TRUE;
|
|
arg_count ++;
|
|
break;
|
|
}
|
|
|
|
if ( ! _tcsicmp (__targv [arg_count], _TEXT("timeout")) )
|
|
{
|
|
if (argc - arg_count <= 1)
|
|
{
|
|
print_usage ();
|
|
return 1;
|
|
}
|
|
timeout = _ttoi ( __targv [arg_count + 1] );
|
|
arg_count += 2;
|
|
break;
|
|
}
|
|
|
|
if ( ! _tcsicmp (__targv [arg_count], _TEXT("reboot")) )
|
|
{
|
|
if (argc - arg_count <= 1)
|
|
{
|
|
print_usage ();
|
|
return 1;
|
|
}
|
|
entry_point = _ttoi ( __targv [arg_count + 1] );
|
|
arg_count += 2;
|
|
if (entry_point > 3)
|
|
{
|
|
print_usage ();
|
|
return 1;
|
|
}
|
|
break;
|
|
}
|
|
|
|
print_usage ();
|
|
return 1;
|
|
|
|
} while ( 0 );
|
|
}
|
|
|
|
|
|
if (remote_test)
|
|
{
|
|
printf("Please enter the password for the remote host/cluster : ");
|
|
_tscanf (_TEXT("%s"), remote_password);
|
|
}
|
|
|
|
if (!verbose)
|
|
printf("Test Number: 0000");
|
|
|
|
/* Get the version info on the OS (nt4 or higher) and store the info. */
|
|
memset (&osiv, 0, sizeof (OSVERSIONINFO));
|
|
osiv . dwOSVersionInfoSize = sizeof (OSVERSIONINFO);
|
|
if (GetVersionEx(&osiv) == 0)
|
|
printf("error in getting the os version\n");
|
|
version_nt4 = (osiv . dwPlatformId == VER_PLATFORM_WIN32_NT) &&
|
|
(osiv . dwMajorVersion == 4);
|
|
|
|
check_init();
|
|
if (init_test)
|
|
{
|
|
printf("\n");
|
|
print_error_messages();
|
|
printf("Total number of tests: %d Failed Tests: %d\n", total_tests, failed_tests);
|
|
return 1;
|
|
}
|
|
|
|
if (version_nt4)
|
|
if (entry_point != 0)
|
|
{
|
|
check_commit (entry_point);
|
|
return 1;
|
|
}
|
|
|
|
check_single_host_operations();
|
|
check_cluster_operations();
|
|
|
|
|
|
if (!local_test)
|
|
{
|
|
printf("\n");
|
|
print_error_messages();
|
|
printf("Total number of tests: %d Failed Tests: %d\n", total_tests, failed_tests);
|
|
return 1;
|
|
}
|
|
|
|
check_port_rule_apis();
|
|
check_registry_rw();
|
|
check_commit(0);
|
|
check_winsock_wrappers();
|
|
printf("\n");
|
|
print_error_messages();
|
|
printf("Total number of tests: %d Failed Tests: %d\n", total_tests, failed_tests);
|
|
return 1;
|
|
}
|
|
|