use base "installedtest";
use strict;
use testapi;
use lockapi;
use mmapi;
use tapnet;

sub run {
    my $self=shift;
    ## DNS / DHCP (dnsmasq)
    # create config
    assert_script_run "printf 'domain=domain.local\ndhcp-range=10.0.2.112,10.0.2.199\ndhcp-option=option:router,10.0.2.2' > /etc/dnsmasq.conf";
    # open firewall ports
    assert_script_run "firewall-cmd --add-service=dhcp";
    assert_script_run "firewall-cmd --add-service=dns";
    # start server
    # FIXME: workaround RHBZ#1554390
    assert_script_run "setenforce Permissive";
    assert_script_run "systemctl restart dnsmasq.service";
    assert_script_run "systemctl is-active dnsmasq.service";
    assert_script_run "setenforce Enforcing";

    ## ISCSI

    # start up iscsi target
    assert_script_run "printf '<target iqn.2016-06.local.domain:support.target1>\n    backing-store /dev/vdb\n    incominguser test weakpassword\n</target>' > /etc/tgt/conf.d/openqa.conf";
    # open firewall port
    assert_script_run "firewall-cmd --add-service=iscsi-target";
    # tgtd currently fails to run on f26 with SELinux enforcing
    assert_script_run "setenforce Permissive";
    assert_script_run "systemctl restart tgtd.service";
    assert_script_run "systemctl is-active tgtd.service";

    ## NFS

    # create the file share
    assert_script_run "mkdir -p /export";
    # get the kickstart
    assert_script_run "curl -o /export/root-user-crypted-net.ks https://jskladan.fedorapeople.org/kickstarts/root-user-crypted-net.ks";
    # create the repo share
    assert_script_run "mkdir -p /repo";
    # create a mount point for the ISO
    assert_script_run "mkdir -p /mnt/iso";
    # mount the ISO there
    assert_script_run "mount /dev/cdrom /mnt/iso";
    # copy the contents of the ISO to the repo share
    assert_script_run "cp -R /mnt/iso/* /repo", 180;
    # put the updates image in the NFS repo (for testing this update
    # image delivery method)
    assert_script_run "curl -o /repo/images/updates.img https://fedorapeople.org/groups/qa/updates/updates-openqa.img";
    # set up the exports
    assert_script_run "printf '/export 10.0.2.0/24(ro)\n/repo 10.0.2.0/24(ro)' > /etc/exports";
    # open firewall port
    assert_script_run "firewall-cmd --add-service=nfs";
    # workaround RHBZ #1402427: somehow the file is incorrectly labelled
    # even after a clean install with fixed selinux-policy
    # Bypass: do not execute restorecon if file do not exist
    # (for PowerPC rpcbind not in same path)
    assert_script_run 'for xx in /usr/bin/rpcbind /sbin/rpcbind; do [ -f $xx ] && restorecon $xx; done';
    # start the server
    assert_script_run "systemctl restart nfs-server.service";
    assert_script_run "systemctl is-active nfs-server.service";

    # report ready, wait for children
    mutex_create('support_ready');
    wait_for_children;
    # TODO we should add systematic data capture to help investigation when children failed.
}

sub test_flags {
    return { fatal => 1 };
}

1;

# vim: set sw=4 et: