diff --git a/docs/system_base/target-restore/tc_target-restore_fun001.yaml b/docs/system_base/target-restore/tc_target-restore_fun001.yaml new file mode 100644 index 0000000000000000000000000000000000000000..a81f8f4fdd8d9109a6ab83d84f3dd507140ccd43 --- /dev/null +++ b/docs/system_base/target-restore/tc_target-restore_fun001.yaml @@ -0,0 +1,23 @@ +作者: douzhichong +优先级: P1 +支持架构: noarch +执行方式: 自动 +测试类型: 功能测试 +通用标签: local,target.service +用例描述: target.service基本功能 +修改人: douzhichong + +前置条件: +安装target-restore软件包 +测试步骤: +- 测试target.service重启功能 +-测试target.service停止功能 +-测试target.service启动功能 +-判断当前target.service启用状态,测试disable,enable功能 +-查看日志中从测试开始时间(log_time)起的日志中是否有fail或error关键字(排除无关消息)。 +-测试reload +期望结果: +-服务正常启动,停止,查看,重启 +-disable,enable功能正常 +-日志无报错 +-reload返回预期结果 diff --git a/tests/system_base/target-restore/tc_target-restore_fun001.py b/tests/system_base/target-restore/tc_target-restore_fun001.py new file mode 100644 index 0000000000000000000000000000000000000000..e93df4f608463c9ea12ea9d4d087dd9079acad34 --- /dev/null +++ b/tests/system_base/target-restore/tc_target-restore_fun001.py @@ -0,0 +1,100 @@ +""" +@File: tc_target-restore_fun001.py +@Time: 2025/11/27 15:30:20 +@Author: douzhichong +@Version: 1.0 +@Contact: douzhichong@inspur.com +@License: Mulan PSL v2 +@Modify: douzhichong +""" +import subprocess + +from common.basetest import LocalTest + + +class Test(LocalTest): + """ + See tc_target-restore_fun001.yaml for details + + :avocado: tags=P1,noarch,local,target-restore + """ + PARAM_DIC = {"pkg_name": "target-restore"} + + def setUp(self): + super().setUp(self.PARAM_DIC) + + def test(self): + + service = 'target.service' + # test_execution + code, log_time = self.cmd("date '+%Y-%m-%d %T'") + # test_restart + code, result = self.cmd(f"systemctl restart {service}") + self.assertFalse(code, f"{service} restart failed") + self.cmd('sleep 5') + code, result = self.cmd(f"systemctl status {service}| grep 'Active: active'") + self.assertFalse(code, f"{service} restart failed") + code, result = self.cmd(f"systemctl stop {service}") + self.assertFalse(code, f"{service} stop failed") + self.cmd('sleep 5') + code, result = self.cmd(f"systemctl status {service}| grep 'Active: inactive'") + self.assertFalse(code, f"{service} stop failed") + code, result = self.cmd(f"systemctl start {service}") + self.assertFalse(code, f"{service} start failed") + self.cmd('sleep 5') + code, result = self.cmd(f"systemctl status {service}| grep 'Active: active'") + self.assertFalse(code, f"{service} start failed") + # test_enabled + command = f'systemctl is-enabled {service}' + result = subprocess.run(command, shell=True, stdout=subprocess.PIPE, stderr=subprocess.PIPE) + status1 = result.stdout.decode('utf-8').strip() + if status1 == "enabled": + code, symlink_file = self.cmd( + f'systemctl disable {service} 2>&1 | grep "Removed" | awk \'{{print $2}}\' | awk \'{{print substr($0,1,length($0)-1)}}\' | tr -d \'\"\'') + command = f'find {symlink_file}' + result = subprocess.run(command, shell=True, stdout=subprocess.PIPE, stderr=subprocess.PIPE) + self.assertTrue(result.returncode, f"{service} disable failed") + self.cmd(f'systemctl enable {service}') + code, result = self.cmd(f'find {symlink_file}') + self.assertFalse(code, f"{service} enable failed") + elif status1 == "disabled": + code, symlink_file = self.cmd( + f'systemctl enable "{service}" 2>&1 | grep "Created symlink" | awk \'{{print $3}}\' | tr -d \'\"\'') + code, result = self.cmd(f'find {symlink_file}') + self.assertFalse(code, f"{service} enable failed") + self.cmd(f'systemctl disable {service}') + command = f'find {symlink_file}' + result = subprocess.run(command, shell=True, stdout=subprocess.PIPE, stderr=subprocess.PIPE) + self.assertTrue(result.returncode, f"{service} disable failed") + elif status1 == "masked": + self.log.info("Unit is masked, ignoring.") + elif status1 == "static": + self.log.info( + "The unit files have no installation config,This means they are not meant to be enabled using systemctl.") + else: + self.log.info("Unit is indirect, ignoring.") + # execution + command = f' journalctl --since {log_time} -u {service} | grep -i "fail\|error" | grep -v -i "DEBUG\|INFO\|WARNING"' + result = subprocess.run(command, shell=True, stdout=subprocess.PIPE, stderr=subprocess.PIPE) + self.assertTrue(result.returncode, f"There is an error message for the log of {service}") + # test_reload + self.cmd(f'systemctl start {service}') + command = f'systemctl cat {service} | grep -q "ExecReload"' + result = subprocess.run(command, shell=True, stdout=subprocess.PIPE, stderr=subprocess.PIPE) + if not result.returncode: + code, result = self.cmd(f'systemctl reload {service}') + self.assertFalse(code, f"reload unit {service} failed") + else: + code, result = self.cmd(f'systemctl reload {service} 2>&1 | grep "Job type reload is not applicable"') + self.assertFalse(code, f"Job type reload is not applicable for unit {service}") + code, result = self.cmd(f'systemctl status {service} | grep "Active: active"') + if code: + command = f'systemctl status {service} | grep "inactive (dead)"' + result1 = subprocess.run(command, shell=True, stdout=subprocess.PIPE, stderr=subprocess.PIPE) + if not result1.returncode: + code2, result = self.cmd(f'systemctl status {service} | grep "Condition check" | grep "skip"') + self.assertFalse(code2, f'{service} reload causes the service status to change') + + def tearDown(self): + super().tearDown(self.PARAM_DIC) +