v3_curl_test.go 7.9 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247
  1. // Copyright 2016 The etcd Authors
  2. //
  3. // Licensed under the Apache License, Version 2.0 (the "License");
  4. // you may not use this file except in compliance with the License.
  5. // You may obtain a copy of the License at
  6. //
  7. // http://www.apache.org/licenses/LICENSE-2.0
  8. //
  9. // Unless required by applicable law or agreed to in writing, software
  10. // distributed under the License is distributed on an "AS IS" BASIS,
  11. // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  12. // See the License for the specific language governing permissions and
  13. // limitations under the License.
  14. package e2e
  15. import (
  16. "encoding/json"
  17. "testing"
  18. pb "github.com/coreos/etcd/etcdserver/etcdserverpb"
  19. "github.com/coreos/etcd/pkg/testutil"
  20. "github.com/grpc-ecosystem/grpc-gateway/runtime"
  21. )
  22. func TestV3CurlPutGetNoTLS(t *testing.T) { testCurlPutGetGRPCGateway(t, &configNoTLS) }
  23. func TestV3CurlPutGetAutoTLS(t *testing.T) { testCurlPutGetGRPCGateway(t, &configAutoTLS) }
  24. func TestV3CurlPutGetAllTLS(t *testing.T) { testCurlPutGetGRPCGateway(t, &configTLS) }
  25. func TestV3CurlPutGetPeerTLS(t *testing.T) { testCurlPutGetGRPCGateway(t, &configPeerTLS) }
  26. func TestV3CurlPutGetClientTLS(t *testing.T) { testCurlPutGetGRPCGateway(t, &configClientTLS) }
  27. func testCurlPutGetGRPCGateway(t *testing.T, cfg *etcdProcessClusterConfig) {
  28. defer testutil.AfterTest(t)
  29. epc, err := newEtcdProcessCluster(cfg)
  30. if err != nil {
  31. t.Fatalf("could not start etcd process cluster (%v)", err)
  32. }
  33. defer func() {
  34. if cerr := epc.Close(); err != nil {
  35. t.Fatalf("error closing etcd processes (%v)", cerr)
  36. }
  37. }()
  38. var (
  39. key = []byte("foo")
  40. value = []byte("bar") // this will be automatically base64-encoded by Go
  41. expectPut = `"revision":"`
  42. expectGet = `"value":"`
  43. )
  44. putData, err := json.Marshal(&pb.PutRequest{
  45. Key: key,
  46. Value: value,
  47. })
  48. if err != nil {
  49. t.Fatal(err)
  50. }
  51. rangeData, err := json.Marshal(&pb.RangeRequest{
  52. Key: key,
  53. })
  54. if err != nil {
  55. t.Fatal(err)
  56. }
  57. if err := cURLPost(epc, cURLReq{endpoint: "/v3beta/kv/put", value: string(putData), expected: expectPut}); err != nil {
  58. t.Fatalf("failed put with curl (%v)", err)
  59. }
  60. if err := cURLPost(epc, cURLReq{endpoint: "/v3beta/kv/range", value: string(rangeData), expected: expectGet}); err != nil {
  61. t.Fatalf("failed get with curl (%v)", err)
  62. }
  63. if cfg.clientTLS == clientTLSAndNonTLS {
  64. if err := cURLPost(epc, cURLReq{endpoint: "/v3beta/kv/range", value: string(rangeData), expected: expectGet, isTLS: true}); err != nil {
  65. t.Fatalf("failed get with curl (%v)", err)
  66. }
  67. }
  68. }
  69. func TestV3CurlWatch(t *testing.T) {
  70. defer testutil.AfterTest(t)
  71. epc, err := newEtcdProcessCluster(&configNoTLS)
  72. if err != nil {
  73. t.Fatalf("could not start etcd process cluster (%v)", err)
  74. }
  75. defer func() {
  76. if cerr := epc.Close(); err != nil {
  77. t.Fatalf("error closing etcd processes (%v)", cerr)
  78. }
  79. }()
  80. // store "bar" into "foo"
  81. putreq, err := json.Marshal(&pb.PutRequest{Key: []byte("foo"), Value: []byte("bar")})
  82. if err != nil {
  83. t.Fatal(err)
  84. }
  85. if err = cURLPost(epc, cURLReq{endpoint: "/v3beta/kv/put", value: string(putreq), expected: "revision"}); err != nil {
  86. t.Fatalf("failed put with curl (%v)", err)
  87. }
  88. // watch for first update to "foo"
  89. wcr := &pb.WatchCreateRequest{Key: []byte("foo"), StartRevision: 1}
  90. wreq, err := json.Marshal(wcr)
  91. if err != nil {
  92. t.Fatal(err)
  93. }
  94. // marshaling the grpc to json gives:
  95. // "{"RequestUnion":{"CreateRequest":{"key":"Zm9v","start_revision":1}}}"
  96. // but the gprc-gateway expects a different format..
  97. wstr := `{"create_request" : ` + string(wreq) + "}"
  98. // expects "bar", timeout after 2 seconds since stream waits forever
  99. if err = cURLPost(epc, cURLReq{endpoint: "/v3beta/watch", value: wstr, expected: `"YmFy"`, timeout: 2}); err != nil {
  100. t.Fatal(err)
  101. }
  102. }
  103. func TestV3CurlTxn(t *testing.T) {
  104. defer testutil.AfterTest(t)
  105. epc, err := newEtcdProcessCluster(&configNoTLS)
  106. if err != nil {
  107. t.Fatalf("could not start etcd process cluster (%v)", err)
  108. }
  109. defer func() {
  110. if cerr := epc.Close(); err != nil {
  111. t.Fatalf("error closing etcd processes (%v)", cerr)
  112. }
  113. }()
  114. txn := &pb.TxnRequest{
  115. Compare: []*pb.Compare{
  116. {
  117. Key: []byte("foo"),
  118. Result: pb.Compare_EQUAL,
  119. Target: pb.Compare_CREATE,
  120. TargetUnion: &pb.Compare_CreateRevision{0},
  121. },
  122. },
  123. Success: []*pb.RequestOp{
  124. {
  125. Request: &pb.RequestOp_RequestPut{
  126. RequestPut: &pb.PutRequest{
  127. Key: []byte("foo"),
  128. Value: []byte("bar"),
  129. },
  130. },
  131. },
  132. },
  133. }
  134. m := &runtime.JSONPb{}
  135. jsonDat, jerr := m.Marshal(txn)
  136. if jerr != nil {
  137. t.Fatal(jerr)
  138. }
  139. expected := `"succeeded":true,"responses":[{"response_put":{"header":{"revision":"2"}}}]`
  140. if err = cURLPost(epc, cURLReq{endpoint: "/v3beta/kv/txn", value: string(jsonDat), expected: expected}); err != nil {
  141. t.Fatalf("failed txn with curl (%v)", err)
  142. }
  143. // was crashing etcd server
  144. malformed := `{"compare":[{"result":0,"target":1,"key":"Zm9v","TargetUnion":null}],"success":[{"Request":{"RequestPut":{"key":"Zm9v","value":"YmFy"}}}]}`
  145. if err = cURLPost(epc, cURLReq{endpoint: "/v3beta/kv/txn", value: malformed, expected: "error"}); err != nil {
  146. t.Fatalf("failed put with curl (%v)", err)
  147. }
  148. }
  149. func TestV3CurlAuth(t *testing.T) {
  150. defer testutil.AfterTest(t)
  151. epc, err := newEtcdProcessCluster(&configNoTLS)
  152. if err != nil {
  153. t.Fatalf("could not start etcd process cluster (%v)", err)
  154. }
  155. defer func() {
  156. if cerr := epc.Close(); err != nil {
  157. t.Fatalf("error closing etcd processes (%v)", cerr)
  158. }
  159. }()
  160. // create root user
  161. userreq, err := json.Marshal(&pb.AuthUserAddRequest{Name: string("root"), Password: string("toor")})
  162. testutil.AssertNil(t, err)
  163. if err = cURLPost(epc, cURLReq{endpoint: "/v3beta/auth/user/add", value: string(userreq), expected: "revision"}); err != nil {
  164. t.Fatalf("failed add user with curl (%v)", err)
  165. }
  166. // create root role
  167. rolereq, err := json.Marshal(&pb.AuthRoleAddRequest{Name: string("root")})
  168. testutil.AssertNil(t, err)
  169. if err = cURLPost(epc, cURLReq{endpoint: "/v3beta/auth/role/add", value: string(rolereq), expected: "revision"}); err != nil {
  170. t.Fatalf("failed create role with curl (%v)", err)
  171. }
  172. // grant root role
  173. grantrolereq, err := json.Marshal(&pb.AuthUserGrantRoleRequest{User: string("root"), Role: string("root")})
  174. testutil.AssertNil(t, err)
  175. if err = cURLPost(epc, cURLReq{endpoint: "/v3beta/auth/user/grant", value: string(grantrolereq), expected: "revision"}); err != nil {
  176. t.Fatalf("failed grant role with curl (%v)", err)
  177. }
  178. // enable auth
  179. if err = cURLPost(epc, cURLReq{endpoint: "/v3beta/auth/enable", value: string("{}"), expected: "revision"}); err != nil {
  180. t.Fatalf("failed enable auth with curl (%v)", err)
  181. }
  182. // put "bar" into "foo"
  183. putreq, err := json.Marshal(&pb.PutRequest{Key: []byte("foo"), Value: []byte("bar")})
  184. testutil.AssertNil(t, err)
  185. // fail put no auth
  186. if err = cURLPost(epc, cURLReq{endpoint: "/v3beta/kv/put", value: string(putreq), expected: "error"}); err != nil {
  187. t.Fatalf("failed no auth put with curl (%v)", err)
  188. }
  189. // auth request
  190. authreq, err := json.Marshal(&pb.AuthenticateRequest{Name: string("root"), Password: string("toor")})
  191. testutil.AssertNil(t, err)
  192. var (
  193. authHeader string
  194. cmdArgs []string
  195. lineFunc = func(txt string) bool { return true }
  196. )
  197. cmdArgs = cURLPrefixArgs(epc, "POST", cURLReq{endpoint: "/v3beta/auth/authenticate", value: string(authreq)})
  198. proc, err := spawnCmd(cmdArgs)
  199. testutil.AssertNil(t, err)
  200. cURLRes, err := proc.ExpectFunc(lineFunc)
  201. testutil.AssertNil(t, err)
  202. authRes := make(map[string]interface{})
  203. testutil.AssertNil(t, json.Unmarshal([]byte(cURLRes), &authRes))
  204. token, ok := authRes["token"].(string)
  205. if !ok {
  206. t.Fatalf("failed invalid token in authenticate response with curl")
  207. }
  208. authHeader = "Authorization : " + token
  209. // put with auth
  210. if err = cURLPost(epc, cURLReq{endpoint: "/v3beta/kv/put", value: string(putreq), header: authHeader, expected: "revision"}); err != nil {
  211. t.Fatalf("failed auth put with curl (%v)", err)
  212. }
  213. }