Kea  1.5.0
Building Kea with Unit Tests

Depending on how you compiled or installed gtest (e.g.

from sources or using some package management system) one of those two switches will find gtest. After that you make and run the unit-tests with:

make check

Environment Variables

The following environment variable can affect the unit tests:

  • KEA_LOCKFILE_DIR - Specifies a directory where the logging system should create its lock file. If not specified, it is prefix/var/run/kea, where prefix defaults to /usr/local. This variable must not end with a slash. There is one special value, "none", which instructs Kea to not create a lock file at all. This may cause issues if several processes log to the same file. (Also see the Kea User's Guide, section 15.3.)
  • KEA_LOGGER_DESTINATION - Specifies the logging destination. If not set, logged messages will not be recorded anywhere. There are three special values: stdout, stderr and syslog. Any other value is interpreted as a filename. (Also see Kea User's Guide, section 15.3.)
  • KEA_PIDFILE_DIR - Specifies the directory which should be used for PID files as used by dhcp::Daemon or its derivatives. If not specified, the default is prefix/var/run/kea, where prefix defaults to /usr/local. This variable must not end with a slash.
  • KEA_SOCKET_TEST_DIR - if set, it specifies the directory where Unix sockets are created. There is an operating system limitation on how long a Unix socket path can be, typically slightly over 100 characters. If you happen to build and run unit-tests in deeply nested directories, this may become a problem. KEA_SOCKET_TEST_DIR can be specified to instruct unit-test to use a different directory. It must not end with slash.

Databases Configuration for Unit Tests

With the use of databases requiring separate authorisation, there are certain database-specific pre-requisites for successfully running the unit tests. These are listed in the following sections.

Database Users Required for Unit Tests

Unit tests validating database backends require that the keatest database is created. This database should be empty. The unit tests also require that the keatest user is created and that this user is configured to access the database with a password of keatest. Unit tests use these credentials to create database schema, run test cases and drop the schema. Thus, the keatest user must have sufficiently high privileges to create and drop tables, as well as insert and modify the data within those tables.

The database backends which support read only access to the host reservations databases (currently MySQL and PostgreSQL) include unit tests verifying that a database user with read-only privileges can be used to retrieve host reservations. Those tests require another user, keatest_readonly, with SQL SELECT privilege to the keatest database (i.e. without INSERT, UPDATE etc.), is also created. keatest_readonly should also have the password keatest.

The following sections provide step-by-step guidelines how to setup the databases for running unit tests.

MySQL Database

The steps to create the database and users are:

  1. Log into MySQL as root:
      % mysql -u root -p
      Enter password:
         :
      mysql>

  2. Create the test database. This must be called "keatest":
      mysql> CREATE DATABASE keatest;
      mysql>

  3. Create the users under which the test client will connect to the database (the apostrophes around the words keatest, keatest_readonly, and localhost are required):
      mysql> CREATE USER 'keatest'@'localhost' IDENTIFIED BY 'keatest';
      mysql> CREATE USER 'keatest_readonly'@'localhost' IDENTIFIED BY 'keatest';
      mysql>

  4. Grant the created users permissions to access the keatest database (again, the apostrophes around the user names and localhost are required):
      mysql> GRANT ALL ON keatest.* TO 'keatest'@'localhost';
      mysql> GRANT SELECT ON keatest.* TO 'keatest_readonly'@'localhost';
      mysql>

  5. Exit MySQL:
      mysql> quit
      Bye
      %

The unit tests are run automatically when "make check" is executed (providing that Kea has been build with the –with-mysql switch (see the installation section in the Kea Administrator Reference Manual).

PostgreSQL Database

PostgreSQL set up differs from system to system. Please consult your operating system-specific PostgreSQL documentation. The remainder of that section uses Ubuntu 13.10 x64 (with PostgreSQL 9.0+) as an example.

On Ubuntu, PostgreSQL is installed (with sudo apt-get install postgresql) under user postgres. To create new databases or add new users, initial commands must be issued under this username:

$ sudo -u postgres psql postgres
[sudo] password for thomson:
psql (9.1.12)
Type "help" for help.
postgres=# CREATE USER keatest WITH PASSWORD 'keatest';
CREATE ROLE
postgres=# CREATE DATABASE keatest;
CREATE DATABASE
postgres=# GRANT ALL PRIVILEGES ON DATABASE keatest TO keatest;
GRANT
postgres=# \q

PostgreSQL versions earlier than 9.0 don't provide an SQL statement for granting privileges on all tables in a database. In newer PostgreSQL versions, it is possible to grant specific privileges on all tables within a schema. However, this only affects tables which exist when the privileges are granted. To ensure that the user has specific privileges to tables dynamically created by the unit tests, the default schema privileges must be altered.

The following example demonstrates how to create the user keatest_readonly, which has SELECT privilege to the tables within the keatest database, in Postgres 9.0+. For earlier versions of Postgres, it is recommended to simply grant full privileges to keatest_readonly, using the same steps as for the keatest user.

$ psql -U postgres
Password for user postgres:
psql (9.1.12)
Type "help" for help.

postgres=# CREATE USER keatest_readonly WITH PASSWORD 'keatest';
CREATE ROLE
postgres=# \q

$ psql -U keatest
Password for user keatest:
psql (9.1.12)
Type "help" for help.

keatest=> ALTER DEFAULT PRIVILEGES IN SCHEMA public GRANT SELECT ON TABLES to keatest_readonly;
ALTER DEFAULT PRIVILEGES
keatest=> \q

Note that the keatest user (rather than postgres) is used to grant privileges to the keatest_readonly user. This ensures that the SELECT privilege is granted only on the tables that the keatest user can access within the public schema.

Now we should be able to log into the newly created database using both user names:

$ psql -d keatest -U keatest
Password for user keatest:
psql (9.1.12)
Type "help" for help.

keatest=> \q

$ psql -d keatest -U keatest_readonly
Password for user keatest_readonly:
psql (9.1.12)
Type "help" for help.

keatest=>

If instead of seeing keatest=> prompt, your login is refused with an error code about failed peer or indent authentication, it means that PostgreSQL is configured to check unix username and reject login attempts if PostgreSQL names are different. To alter that, the PostgreSQL configuration must be changed - the /etc/postgresql/9.1/main/pg_hba.conf config file has to be altered. (It may be in a different location in your system.) The following lines:

local   all             all                                     peer
host    all             all             127.0.0.1/32            md5
host    all             all             ::1/128                 md5

need to be replaced with:

local   all             all                                     password
host    all             all             127.0.0.1/32            password
host    all             all             ::1/128                 password

Another possible problem is that you get no password prompt. This is most probably because you have no pg_hba.conf config file and everybody is by default trusted. As it has a very bad effect on the security you should have been warned this is a highly unsafe configuration. The solution is the same, i.e., require password or md5 authentication method.

If you lose the postgres user access you can first add:

local   all             postgres                                trust

to trust only the local postgres user. Note the postgres user can be pgsql on some systems.

Please consult your PostgreSQL user manual before applying those changes as those changes may expose your other databases that you run on the same system. In general case, it is a poor idea to run anything of value on a system that runs tests. Use caution!

The unit tests are run automatically when "make check" is executed (providing that Kea has been build with the –with-pgsql switch (see the installation section in the Kea Administrator Reference Manual).

Cassandra database

Todo:
: Describe steps necessary to set up Cassandra database suitable for running unittests.

It seems this was enough:

  1. Launch cassandra if not running (-f for foreground)
     % cassandra -f

The tool is cqlsh:

  1. Run the tool
     % cqlsh
     Connected to Test Cluster at 127.0.0.1:9042.
     [cqlsh 5.0.1 | Cassandra 3.11.1 | CQL spec 3.4.4 | Native protocol v4]
     Use HELP for help.
     cqlsh>