Skip to content

Commit 393a752

Browse files
committed
OSG 3.3 purge: Drop condor-ce ping-with-gums test
1 parent 8125afa commit 393a752

File tree

1 file changed

+1
-69
lines changed

1 file changed

+1
-69
lines changed

osgtest/tests/test_550_condorce.py

Lines changed: 1 addition & 69 deletions
Original file line numberDiff line numberDiff line change
@@ -116,75 +116,7 @@ def test_06_slurm_trace(self):
116116
self.skip_ok_unless(service.is_running(core.config['slurm.service-name']), 'slurm service not running')
117117
self.run_blahp_trace('slurm')
118118

119-
@core.osgrelease('3.3')
120-
def test_07_ping_with_gums(self):
121-
core.state['condor-ce.gums-auth'] = False
122-
self.general_requirements()
123-
core.skip_ok_unless_installed('gums-service')
124-
125-
# Setting up GUMS auth using the instructions here:
126-
# https://opensciencegrid.github.io/docs/compute-element/install-htcondor-ce/#authentication-with-gums
127-
hostname = core.get_hostname()
128-
129-
lcmaps_contents = '''gumsclient = "lcmaps_gums_client.mod"
130-
"-resourcetype ce"
131-
"-actiontype execute-now"
132-
"-capath /etc/grid-security/certificates"
133-
"-cert /etc/grid-security/hostcert.pem"
134-
"-key /etc/grid-security/hostkey.pem"
135-
"--cert-owner root"
136-
# Change this URL to your GUMS server
137-
"--endpoint https://%s:8443/gums/services/GUMSXACMLAuthorizationServicePort"
138-
139-
verifyproxy = "lcmaps_verify_proxy.mod"
140-
"--allow-limited-proxy"
141-
" -certdir /etc/grid-security/certificates"
142-
143-
# lcmaps policies require at least two modules, so these are here to
144-
# fill in if only one module is needed. "good | bad" has no effect.
145-
good = "lcmaps_dummy_good.mod"
146-
bad = "lcmaps_dummy_bad.mod"
147-
148-
authorize_only:
149-
## Policy 1: GUMS but not SAZ (most common, default)
150-
gumsclient -> good | bad
151-
''' % hostname
152-
153-
gums_properties_contents = '''gums.location=https://%s:8443/gums/services/GUMSAdmin
154-
gums.authz=https://%s:8443/gums/services/GUMSXACMLAuthorizationServicePort
155-
''' % (hostname, hostname)
156-
157-
core.config['condor-ce.lcmapsdb'] = '/etc/lcmaps.db'
158-
core.config['condor-ce.gums-properties'] = '/etc/gums/gums-client.properties'
159-
core.config['condor-ce.gsi-authz'] = '/etc/grid-security/gsi-authz.conf'
160-
161-
files.write(core.config['condor-ce.lcmapsdb'], lcmaps_contents, owner='condor-ce.gums')
162-
files.write(core.config['condor-ce.gums-properties'], gums_properties_contents, owner='condor-ce')
163-
files.replace(core.config['condor-ce.gsi-authz'],
164-
'# globus_mapping liblcas_lcmaps_gt4_mapping.so lcmaps_callout',
165-
'globus_mapping liblcas_lcmaps_gt4_mapping.so lcmaps_callout',
166-
owner='condor-ce')
167-
try:
168-
core.state['condor-ce.gums-auth'] = True
169-
170-
service.check_stop('condor-ce')
171-
172-
stat = core.get_stat(core.config['condor-ce.collectorlog'])
173-
174-
service.check_start('condor-ce')
175-
# Wait for the schedd to come back up
176-
self.failUnless(condor.wait_for_daemon(core.config['condor-ce.collectorlog'], stat, 'Schedd', 300.0),
177-
'Schedd failed to restart within the 1 min window')
178-
command = ('condor_ce_ping', 'WRITE', '-verbose')
179-
stdout, _, _ = core.check_system(command, 'ping using GSI and gridmap', user=True)
180-
self.assert_(re.search(r'Authorized:\s*TRUE', stdout), 'could not authorize with GSI')
181-
182-
finally:
183-
files.restore(core.config['condor-ce.lcmapsdb'], 'condor-ce.gums')
184-
files.restore(core.config['condor-ce.gsi-authz'], 'condor-ce')
185-
files.restore(core.config['condor-ce.gums-properties'], 'condor-ce')
186-
187-
def test_08_ceview(self):
119+
def test_07_ceview(self):
188120
core.config['condor-ce.view-listening'] = False
189121
self.general_requirements()
190122
core.skip_ok_unless_installed('htcondor-ce-view')

0 commit comments

Comments
 (0)