use base "installedtest"; use strict; use testapi; use lockapi; use mmapi; use tapnet; sub run { my $self=shift; ## DNS / DHCP (dnsmasq) # create config assert_script_run "printf 'domain=domain.local\ndhcp-range=10.0.2.112,10.0.2.199\ndhcp-option=option:router,10.0.2.2' > /etc/dnsmasq.conf"; # open firewall ports assert_script_run "firewall-cmd --add-service=dhcp"; assert_script_run "firewall-cmd --add-service=dns"; # start server assert_script_run "systemctl restart dnsmasq.service"; assert_script_run "systemctl is-active dnsmasq.service"; ## ISCSI # start up iscsi target # different backing store for PowerPC and other arches # on PowerPC, the installation disk is set on /dev/vdb # so the iscsi backing store must be the /dev/vda if (get_var('OFW')) { assert_script_run "printf '\n backing-store /dev/vda\n incominguser test weakpassword\n' > /etc/tgt/conf.d/openqa.conf"; } else { assert_script_run "printf '\n backing-store /dev/vdb\n incominguser test weakpassword\n' > /etc/tgt/conf.d/openqa.conf"; } # open firewall port assert_script_run "firewall-cmd --add-service=iscsi-target"; assert_script_run "systemctl restart tgtd.service"; assert_script_run "systemctl is-active tgtd.service"; ## NFS # create the file share assert_script_run "mkdir -p /export"; # get the kickstart assert_script_run "curl -o /export/root-user-crypted-net.ks https://jskladan.fedorapeople.org/kickstarts/root-user-crypted-net.ks"; # create the repo share assert_script_run "mkdir -p /repo"; # create a mount point for the ISO assert_script_run "mkdir -p /mnt/iso"; # mount the ISO there assert_script_run "mount /dev/cdrom /mnt/iso"; # copy the contents of the ISO to the repo share assert_script_run "cp -R /mnt/iso/* /repo", 180; # put the updates image in the NFS repo (for testing this update # image delivery method) assert_script_run "curl -o /repo/images/updates.img https://fedorapeople.org/groups/qa/updates/updates-openqa.img"; # set up the exports assert_script_run "printf '/export 10.0.2.0/24(ro)\n/repo 10.0.2.0/24(ro)' > /etc/exports"; # open firewall port assert_script_run "firewall-cmd --add-service=nfs"; # workaround RHBZ #1402427: somehow the file is incorrectly labelled # even after a clean install with fixed selinux-policy # Bypass: do not execute restorecon if file do not exist # (for PowerPC rpcbind not in same path) assert_script_run 'for xx in /usr/bin/rpcbind /sbin/rpcbind; do [ -f $xx ] && restorecon $xx; done'; # start the server assert_script_run "systemctl restart nfs-server.service"; assert_script_run "systemctl is-active nfs-server.service"; # report ready, wait for children mutex_create('support_ready'); wait_for_children; # TODO we should add systematic data capture to help investigation when children failed. } sub test_flags { return { fatal => 1 }; } 1; # vim: set sw=4 et: