| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661 |
- // Copyright 2018 The etcd Authors
- //
- // Licensed under the Apache License, Version 2.0 (the "License");
- // you may not use this file except in compliance with the License.
- // You may obtain a copy of the License at
- //
- // http://www.apache.org/licenses/LICENSE-2.0
- //
- // Unless required by applicable law or agreed to in writing, software
- // distributed under the License is distributed on an "AS IS" BASIS,
- // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
- // See the License for the specific language governing permissions and
- // limitations under the License.
- package tester
- import (
- "context"
- "errors"
- "fmt"
- "io/ioutil"
- "math/rand"
- "net/http"
- "net/url"
- "path/filepath"
- "strings"
- "sync"
- "time"
- "github.com/coreos/etcd/functional/rpcpb"
- "github.com/coreos/etcd/pkg/debugutil"
- "github.com/coreos/etcd/pkg/fileutil"
- "github.com/prometheus/client_golang/prometheus/promhttp"
- "go.uber.org/zap"
- "golang.org/x/time/rate"
- "google.golang.org/grpc"
- )
- // Cluster defines tester cluster.
- type Cluster struct {
- lg *zap.Logger
- agentConns []*grpc.ClientConn
- agentClients []rpcpb.TransportClient
- agentStreams []rpcpb.Transport_TransportClient
- agentRequests []*rpcpb.Request
- testerHTTPServer *http.Server
- Members []*rpcpb.Member `yaml:"agent-configs"`
- Tester *rpcpb.Tester `yaml:"tester-config"`
- failures []Failure
- rateLimiter *rate.Limiter
- stresser Stresser
- checker Checker
- currentRevision int64
- rd int
- cs int
- }
- var dialOpts = []grpc.DialOption{
- grpc.WithInsecure(),
- grpc.WithTimeout(5 * time.Second),
- grpc.WithBlock(),
- }
- // NewCluster creates a client from a tester configuration.
- func NewCluster(lg *zap.Logger, fpath string) (*Cluster, error) {
- clus, err := read(lg, fpath)
- if err != nil {
- return nil, err
- }
- clus.agentConns = make([]*grpc.ClientConn, len(clus.Members))
- clus.agentClients = make([]rpcpb.TransportClient, len(clus.Members))
- clus.agentStreams = make([]rpcpb.Transport_TransportClient, len(clus.Members))
- clus.agentRequests = make([]*rpcpb.Request, len(clus.Members))
- clus.failures = make([]Failure, 0)
- for i, ap := range clus.Members {
- var err error
- clus.agentConns[i], err = grpc.Dial(ap.AgentAddr, dialOpts...)
- if err != nil {
- return nil, err
- }
- clus.agentClients[i] = rpcpb.NewTransportClient(clus.agentConns[i])
- clus.lg.Info("connected", zap.String("agent-address", ap.AgentAddr))
- clus.agentStreams[i], err = clus.agentClients[i].Transport(context.Background())
- if err != nil {
- return nil, err
- }
- clus.lg.Info("created stream", zap.String("agent-address", ap.AgentAddr))
- }
- mux := http.NewServeMux()
- mux.Handle("/metrics", promhttp.Handler())
- if clus.Tester.EnablePprof {
- for p, h := range debugutil.PProfHandlers() {
- mux.Handle(p, h)
- }
- }
- clus.testerHTTPServer = &http.Server{
- Addr: clus.Tester.Addr,
- Handler: mux,
- }
- go clus.serveTesterServer()
- clus.updateFailures()
- clus.rateLimiter = rate.NewLimiter(
- rate.Limit(int(clus.Tester.StressQPS)),
- int(clus.Tester.StressQPS),
- )
- clus.updateStresserChecker()
- return clus, nil
- }
- func (clus *Cluster) serveTesterServer() {
- clus.lg.Info(
- "started tester HTTP server",
- zap.String("tester-address", clus.Tester.Addr),
- )
- err := clus.testerHTTPServer.ListenAndServe()
- clus.lg.Info(
- "tester HTTP server returned",
- zap.String("tester-address", clus.Tester.Addr),
- zap.Error(err),
- )
- if err != nil && err != http.ErrServerClosed {
- clus.lg.Fatal("tester HTTP errored", zap.Error(err))
- }
- }
- func (clus *Cluster) updateFailures() {
- for _, cs := range clus.Tester.FailureCases {
- switch cs {
- case "KILL_ONE_FOLLOWER":
- clus.failures = append(clus.failures, newFailureKillOneFollower())
- case "KILL_ONE_FOLLOWER_UNTIL_TRIGGER_SNAPSHOT":
- clus.failures = append(clus.failures, newFailureKillOneFollowerUntilTriggerSnapshot())
- case "KILL_LEADER":
- clus.failures = append(clus.failures, newFailureKillLeader())
- case "KILL_LEADER_UNTIL_TRIGGER_SNAPSHOT":
- clus.failures = append(clus.failures, newFailureKillLeaderUntilTriggerSnapshot())
- case "KILL_QUORUM":
- clus.failures = append(clus.failures, newFailureKillQuorum())
- case "KILL_ALL":
- clus.failures = append(clus.failures, newFailureKillAll())
- case "BLACKHOLE_PEER_PORT_TX_RX_ONE_FOLLOWER":
- clus.failures = append(clus.failures, newFailureBlackholePeerPortTxRxOneFollower(clus))
- case "BLACKHOLE_PEER_PORT_TX_RX_ONE_FOLLOWER_UNTIL_TRIGGER_SNAPSHOT":
- clus.failures = append(clus.failures, newFailureBlackholePeerPortTxRxOneFollowerUntilTriggerSnapshot())
- case "BLACKHOLE_PEER_PORT_TX_RX_LEADER":
- clus.failures = append(clus.failures, newFailureBlackholePeerPortTxRxLeader(clus))
- case "BLACKHOLE_PEER_PORT_TX_RX_LEADER_UNTIL_TRIGGER_SNAPSHOT":
- clus.failures = append(clus.failures, newFailureBlackholePeerPortTxRxLeaderUntilTriggerSnapshot())
- case "BLACKHOLE_PEER_PORT_TX_RX_QUORUM":
- clus.failures = append(clus.failures, newFailureBlackholePeerPortTxRxQuorum(clus))
- case "BLACKHOLE_PEER_PORT_TX_RX_ALL":
- clus.failures = append(clus.failures, newFailureBlackholePeerPortTxRxAll(clus))
- case "DELAY_PEER_PORT_TX_RX_ONE_FOLLOWER":
- clus.failures = append(clus.failures, newFailureDelayPeerPortTxRxOneFollower(clus, false))
- case "RANDOM_DELAY_PEER_PORT_TX_RX_ONE_FOLLOWER":
- clus.failures = append(clus.failures, newFailureDelayPeerPortTxRxOneFollower(clus, true))
- case "DELAY_PEER_PORT_TX_RX_ONE_FOLLOWER_UNTIL_TRIGGER_SNAPSHOT":
- clus.failures = append(clus.failures, newFailureDelayPeerPortTxRxOneFollowerUntilTriggerSnapshot(clus, false))
- case "RANDOM_DELAY_PEER_PORT_TX_RX_ONE_FOLLOWER_UNTIL_TRIGGER_SNAPSHOT":
- clus.failures = append(clus.failures, newFailureDelayPeerPortTxRxOneFollowerUntilTriggerSnapshot(clus, true))
- case "DELAY_PEER_PORT_TX_RX_LEADER":
- clus.failures = append(clus.failures, newFailureDelayPeerPortTxRxLeader(clus, false))
- case "RANDOM_DELAY_PEER_PORT_TX_RX_LEADER":
- clus.failures = append(clus.failures, newFailureDelayPeerPortTxRxLeader(clus, true))
- case "DELAY_PEER_PORT_TX_RX_LEADER_UNTIL_TRIGGER_SNAPSHOT":
- clus.failures = append(clus.failures, newFailureDelayPeerPortTxRxLeaderUntilTriggerSnapshot(clus, false))
- case "RANDOM_DELAY_PEER_PORT_TX_RX_LEADER_UNTIL_TRIGGER_SNAPSHOT":
- clus.failures = append(clus.failures, newFailureDelayPeerPortTxRxLeaderUntilTriggerSnapshot(clus, true))
- case "DELAY_PEER_PORT_TX_RX_QUORUM":
- clus.failures = append(clus.failures, newFailureDelayPeerPortTxRxQuorum(clus, false))
- case "RANDOM_DELAY_PEER_PORT_TX_RX_QUORUM":
- clus.failures = append(clus.failures, newFailureDelayPeerPortTxRxQuorum(clus, true))
- case "DELAY_PEER_PORT_TX_RX_ALL":
- clus.failures = append(clus.failures, newFailureDelayPeerPortTxRxAll(clus, false))
- case "RANDOM_DELAY_PEER_PORT_TX_RX_ALL":
- clus.failures = append(clus.failures, newFailureDelayPeerPortTxRxAll(clus, true))
- case "NO_FAIL_WITH_STRESS":
- clus.failures = append(clus.failures, newFailureNoFailWithStress(clus))
- case "NO_FAIL_WITH_NO_STRESS_FOR_LIVENESS":
- clus.failures = append(clus.failures, newFailureNoFailWithNoStressForLiveness(clus))
- case "EXTERNAL":
- clus.failures = append(clus.failures, newFailureExternal(clus.Tester.ExternalExecPath))
- case "FAILPOINTS":
- fpFailures, fperr := failpointFailures(clus)
- if len(fpFailures) == 0 {
- clus.lg.Info("no failpoints found!", zap.Error(fperr))
- }
- clus.failures = append(clus.failures, fpFailures...)
- }
- }
- }
- func (clus *Cluster) failureStrings() (fs []string) {
- fs = make([]string, len(clus.failures))
- for i := range clus.failures {
- fs[i] = clus.failures[i].Desc()
- }
- return fs
- }
- // UpdateDelayLatencyMs updates delay latency with random value
- // within election timeout.
- func (clus *Cluster) UpdateDelayLatencyMs() {
- rand.Seed(time.Now().UnixNano())
- clus.Tester.UpdatedDelayLatencyMs = uint32(rand.Int63n(clus.Members[0].Etcd.ElectionTimeoutMs))
- minLatRv := clus.Tester.DelayLatencyMsRv + clus.Tester.DelayLatencyMsRv/5
- if clus.Tester.UpdatedDelayLatencyMs <= minLatRv {
- clus.Tester.UpdatedDelayLatencyMs += minLatRv
- }
- }
- func (clus *Cluster) updateStresserChecker() {
- cs := &compositeStresser{}
- for _, m := range clus.Members {
- cs.stressers = append(cs.stressers, newStresser(clus, m))
- }
- clus.stresser = cs
- if clus.Tester.ConsistencyCheck {
- clus.checker = newHashChecker(clus.lg, hashAndRevGetter(clus))
- if schk := cs.Checker(); schk != nil {
- clus.checker = newCompositeChecker([]Checker{clus.checker, schk})
- }
- } else {
- clus.checker = newNoChecker()
- }
- clus.lg.Info(
- "updated stressers",
- zap.Int("round", clus.rd),
- zap.Int("case", clus.cs),
- )
- }
- func (clus *Cluster) checkConsistency() (err error) {
- defer func() {
- if err != nil {
- return
- }
- if err = clus.updateRevision(); err != nil {
- clus.lg.Warn(
- "updateRevision failed",
- zap.Error(err),
- )
- return
- }
- }()
- if err = clus.checker.Check(); err != nil {
- clus.lg.Warn(
- "consistency check FAIL",
- zap.Int("round", clus.rd),
- zap.Int("case", clus.cs),
- zap.Error(err),
- )
- return err
- }
- clus.lg.Info(
- "consistency check ALL PASS",
- zap.Int("round", clus.rd),
- zap.Int("case", clus.cs),
- zap.String("desc", clus.failures[clus.cs].Desc()),
- )
- return err
- }
- // Bootstrap bootstraps etcd cluster the very first time.
- // After this, just continue to call kill/restart.
- func (clus *Cluster) Bootstrap() error {
- // this is the only time that creates request from scratch
- return clus.broadcastOperation(rpcpb.Operation_InitialStartEtcd)
- }
- // FailArchive sends "FailArchive" operation.
- func (clus *Cluster) FailArchive() error {
- return clus.broadcastOperation(rpcpb.Operation_FailArchive)
- }
- // Restart sends "Restart" operation.
- func (clus *Cluster) Restart() error {
- return clus.broadcastOperation(rpcpb.Operation_RestartEtcd)
- }
- func (clus *Cluster) broadcastOperation(op rpcpb.Operation) error {
- var wg sync.WaitGroup
- wg.Add(len(clus.agentStreams))
- errc := make(chan error, len(clus.agentStreams))
- for i := range clus.agentStreams {
- go func(idx int, o rpcpb.Operation) {
- defer wg.Done()
- errc <- clus.sendOperation(idx, o)
- }(i, op)
- }
- wg.Wait()
- close(errc)
- errs := []string{}
- for err := range errc {
- if err == nil {
- continue
- }
- if err != nil &&
- op == rpcpb.Operation_DestroyEtcdAgent &&
- strings.Contains(err.Error(), "rpc error: code = Unavailable desc = transport is closing") {
- // agent server has already closed;
- // so this error is expected
- clus.lg.Info("successfully destroyed all")
- continue
- }
- errs = append(errs, err.Error())
- }
- if len(errs) == 0 {
- return nil
- }
- return errors.New(strings.Join(errs, ", "))
- }
- func (clus *Cluster) sendOperation(idx int, op rpcpb.Operation) error {
- if op == rpcpb.Operation_InitialStartEtcd {
- clus.agentRequests[idx] = &rpcpb.Request{
- Operation: op,
- Member: clus.Members[idx],
- Tester: clus.Tester,
- }
- } else {
- clus.agentRequests[idx].Operation = op
- }
- err := clus.agentStreams[idx].Send(clus.agentRequests[idx])
- clus.lg.Info(
- "sent request",
- zap.String("operation", op.String()),
- zap.String("to", clus.Members[idx].EtcdClientEndpoint),
- zap.Error(err),
- )
- if err != nil {
- return err
- }
- resp, err := clus.agentStreams[idx].Recv()
- if resp != nil {
- clus.lg.Info(
- "received response",
- zap.String("operation", op.String()),
- zap.String("from", clus.Members[idx].EtcdClientEndpoint),
- zap.Bool("success", resp.Success),
- zap.String("status", resp.Status),
- zap.Error(err),
- )
- } else {
- clus.lg.Info(
- "received empty response",
- zap.String("operation", op.String()),
- zap.String("from", clus.Members[idx].EtcdClientEndpoint),
- zap.Error(err),
- )
- }
- if err != nil {
- return err
- }
- if !resp.Success {
- return errors.New(resp.Status)
- }
- m, secure := clus.Members[idx], false
- for _, cu := range m.Etcd.AdvertiseClientURLs {
- u, err := url.Parse(cu)
- if err != nil {
- return err
- }
- if u.Scheme == "https" { // TODO: handle unix
- secure = true
- }
- }
- // store TLS assets from agents/servers onto disk
- if secure && (op == rpcpb.Operation_InitialStartEtcd || op == rpcpb.Operation_RestartEtcd) {
- dirClient := filepath.Join(
- clus.Tester.DataDir,
- clus.Members[idx].Etcd.Name,
- "fixtures",
- "client",
- )
- if err = fileutil.TouchDirAll(dirClient); err != nil {
- return err
- }
- clientCertData := []byte(resp.Member.ClientCertData)
- if len(clientCertData) == 0 {
- return fmt.Errorf("got empty client cert from %q", m.EtcdClientEndpoint)
- }
- clientCertPath := filepath.Join(dirClient, "cert.pem")
- if err = ioutil.WriteFile(clientCertPath, clientCertData, 0644); err != nil { // overwrite if exists
- return err
- }
- resp.Member.ClientCertPath = clientCertPath
- clus.lg.Info(
- "saved client cert file",
- zap.String("path", clientCertPath),
- )
- clientKeyData := []byte(resp.Member.ClientKeyData)
- if len(clientKeyData) == 0 {
- return fmt.Errorf("got empty client key from %q", m.EtcdClientEndpoint)
- }
- clientKeyPath := filepath.Join(dirClient, "key.pem")
- if err = ioutil.WriteFile(clientKeyPath, clientKeyData, 0644); err != nil { // overwrite if exists
- return err
- }
- resp.Member.ClientKeyPath = clientKeyPath
- clus.lg.Info(
- "saved client key file",
- zap.String("path", clientKeyPath),
- )
- clientTrustedCAData := []byte(resp.Member.ClientTrustedCAData)
- if len(clientTrustedCAData) != 0 {
- // TODO: disable this when auto TLS is deprecated
- clientTrustedCAPath := filepath.Join(dirClient, "ca.pem")
- if err = ioutil.WriteFile(clientTrustedCAPath, clientTrustedCAData, 0644); err != nil { // overwrite if exists
- return err
- }
- resp.Member.ClientTrustedCAPath = clientTrustedCAPath
- clus.lg.Info(
- "saved client trusted CA file",
- zap.String("path", clientTrustedCAPath),
- )
- }
- // no need to store peer certs for tester clients
- clus.Members[idx] = resp.Member
- }
- return nil
- }
- // DestroyEtcdAgents terminates all tester connections to agents and etcd servers.
- func (clus *Cluster) DestroyEtcdAgents() {
- err := clus.broadcastOperation(rpcpb.Operation_DestroyEtcdAgent)
- if err != nil {
- clus.lg.Warn("destroying etcd/agents FAIL", zap.Error(err))
- } else {
- clus.lg.Info("destroying etcd/agents PASS")
- }
- for i, conn := range clus.agentConns {
- err := conn.Close()
- clus.lg.Info("closed connection to agent", zap.String("agent-address", clus.Members[i].AgentAddr), zap.Error(err))
- }
- if clus.testerHTTPServer != nil {
- ctx, cancel := context.WithTimeout(context.Background(), 3*time.Second)
- err := clus.testerHTTPServer.Shutdown(ctx)
- cancel()
- clus.lg.Info("closed tester HTTP server", zap.String("tester-address", clus.Tester.Addr), zap.Error(err))
- }
- }
- // WaitHealth ensures all members are healthy
- // by writing a test key to etcd cluster.
- func (clus *Cluster) WaitHealth() error {
- var err error
- // wait 60s to check cluster health.
- // TODO: set it to a reasonable value. It is set that high because
- // follower may use long time to catch up the leader when reboot under
- // reasonable workload (https://github.com/coreos/etcd/issues/2698)
- for i := 0; i < 60; i++ {
- for _, m := range clus.Members {
- if err = m.WriteHealthKey(); err != nil {
- clus.lg.Warn(
- "health check FAIL",
- zap.Int("retries", i),
- zap.String("endpoint", m.EtcdClientEndpoint),
- zap.Error(err),
- )
- break
- }
- clus.lg.Info(
- "health check PASS",
- zap.Int("retries", i),
- zap.String("endpoint", m.EtcdClientEndpoint),
- )
- }
- if err == nil {
- clus.lg.Info(
- "health check ALL PASS",
- zap.Int("round", clus.rd),
- zap.Int("case", clus.cs),
- )
- return nil
- }
- time.Sleep(time.Second)
- }
- return err
- }
- // GetLeader returns the index of leader and error if any.
- func (clus *Cluster) GetLeader() (int, error) {
- for i, m := range clus.Members {
- isLeader, err := m.IsLeader()
- if isLeader || err != nil {
- return i, err
- }
- }
- return 0, fmt.Errorf("no leader found")
- }
- // maxRev returns the maximum revision found on the cluster.
- func (clus *Cluster) maxRev() (rev int64, err error) {
- ctx, cancel := context.WithTimeout(context.TODO(), time.Second)
- defer cancel()
- revc, errc := make(chan int64, len(clus.Members)), make(chan error, len(clus.Members))
- for i := range clus.Members {
- go func(m *rpcpb.Member) {
- mrev, merr := m.Rev(ctx)
- revc <- mrev
- errc <- merr
- }(clus.Members[i])
- }
- for i := 0; i < len(clus.Members); i++ {
- if merr := <-errc; merr != nil {
- err = merr
- }
- if mrev := <-revc; mrev > rev {
- rev = mrev
- }
- }
- return rev, err
- }
- func (clus *Cluster) getRevisionHash() (map[string]int64, map[string]int64, error) {
- revs := make(map[string]int64)
- hashes := make(map[string]int64)
- for _, m := range clus.Members {
- rev, hash, err := m.RevHash()
- if err != nil {
- return nil, nil, err
- }
- revs[m.EtcdClientEndpoint] = rev
- hashes[m.EtcdClientEndpoint] = hash
- }
- return revs, hashes, nil
- }
- func (clus *Cluster) compactKV(rev int64, timeout time.Duration) (err error) {
- if rev <= 0 {
- return nil
- }
- for i, m := range clus.Members {
- clus.lg.Info(
- "compact START",
- zap.String("endpoint", m.EtcdClientEndpoint),
- zap.Int64("compact-revision", rev),
- zap.Duration("timeout", timeout),
- )
- now := time.Now()
- cerr := m.Compact(rev, timeout)
- succeed := true
- if cerr != nil {
- if strings.Contains(cerr.Error(), "required revision has been compacted") && i > 0 {
- clus.lg.Info(
- "compact error is ignored",
- zap.String("endpoint", m.EtcdClientEndpoint),
- zap.Int64("compact-revision", rev),
- zap.Error(cerr),
- )
- } else {
- clus.lg.Warn(
- "compact FAIL",
- zap.String("endpoint", m.EtcdClientEndpoint),
- zap.Int64("compact-revision", rev),
- zap.Error(cerr),
- )
- err = cerr
- succeed = false
- }
- }
- if succeed {
- clus.lg.Info(
- "compact PASS",
- zap.String("endpoint", m.EtcdClientEndpoint),
- zap.Int64("compact-revision", rev),
- zap.Duration("timeout", timeout),
- zap.Duration("took", time.Since(now)),
- )
- }
- }
- return err
- }
- func (clus *Cluster) checkCompact(rev int64) error {
- if rev == 0 {
- return nil
- }
- for _, m := range clus.Members {
- if err := m.CheckCompact(rev); err != nil {
- return err
- }
- }
- return nil
- }
- func (clus *Cluster) defrag() error {
- for _, m := range clus.Members {
- if err := m.Defrag(); err != nil {
- clus.lg.Warn(
- "defrag FAIL",
- zap.String("endpoint", m.EtcdClientEndpoint),
- zap.Error(err),
- )
- return err
- }
- clus.lg.Info(
- "defrag PASS",
- zap.String("endpoint", m.EtcdClientEndpoint),
- )
- }
- clus.lg.Info(
- "defrag ALL PASS",
- zap.Int("round", clus.rd),
- zap.Int("case", clus.cs),
- )
- return nil
- }
- // GetFailureDelayDuration computes failure delay duration.
- func (clus *Cluster) GetFailureDelayDuration() time.Duration {
- return time.Duration(clus.Tester.FailureDelayMs) * time.Millisecond
- }
- // Report reports the number of modified keys.
- func (clus *Cluster) Report() int64 {
- return clus.stresser.ModifiedKeys()
- }
|