cluster_read_config.go 14 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375
  1. // Copyright 2018 The etcd Authors
  2. //
  3. // Licensed under the Apache License, Version 2.0 (the "License");
  4. // you may not use this file except in compliance with the License.
  5. // You may obtain a copy of the License at
  6. //
  7. // http://www.apache.org/licenses/LICENSE-2.0
  8. //
  9. // Unless required by applicable law or agreed to in writing, software
  10. // distributed under the License is distributed on an "AS IS" BASIS,
  11. // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  12. // See the License for the specific language governing permissions and
  13. // limitations under the License.
  14. package tester
  15. import (
  16. "errors"
  17. "fmt"
  18. "io/ioutil"
  19. "net/url"
  20. "path/filepath"
  21. "strings"
  22. "github.com/coreos/etcd/functional/rpcpb"
  23. "go.uber.org/zap"
  24. yaml "gopkg.in/yaml.v2"
  25. )
  26. func read(lg *zap.Logger, fpath string) (*Cluster, error) {
  27. bts, err := ioutil.ReadFile(fpath)
  28. if err != nil {
  29. return nil, err
  30. }
  31. lg.Info("opened configuration file", zap.String("path", fpath))
  32. clus := &Cluster{lg: lg}
  33. if err = yaml.Unmarshal(bts, clus); err != nil {
  34. return nil, err
  35. }
  36. if len(clus.Members) < 3 {
  37. return nil, fmt.Errorf("len(clus.Members) expects at least 3, got %d", len(clus.Members))
  38. }
  39. failpointsEnabled := false
  40. for _, c := range clus.Tester.Cases {
  41. if c == rpcpb.Case_FAILPOINTS.String() {
  42. failpointsEnabled = true
  43. break
  44. }
  45. }
  46. for i, mem := range clus.Members {
  47. if mem.EtcdExec == "embed" && failpointsEnabled {
  48. return nil, errors.New("EtcdExec 'embed' cannot be run with failpoints enabled")
  49. }
  50. if mem.BaseDir == "" {
  51. return nil, fmt.Errorf("BaseDir cannot be empty (got %q)", mem.BaseDir)
  52. }
  53. if mem.Etcd.Name == "" {
  54. return nil, fmt.Errorf("'--name' cannot be empty (got %+v)", mem)
  55. }
  56. if mem.Etcd.DataDir == "" {
  57. return nil, fmt.Errorf("'--data-dir' cannot be empty (got %+v)", mem)
  58. }
  59. if mem.Etcd.SnapshotCount == 0 {
  60. return nil, fmt.Errorf("'--snapshot-count' cannot be 0 (got %+v)", mem.Etcd.SnapshotCount)
  61. }
  62. if mem.Etcd.DataDir == "" {
  63. return nil, fmt.Errorf("'--data-dir' cannot be empty (got %q)", mem.Etcd.DataDir)
  64. }
  65. if mem.Etcd.WALDir == "" {
  66. clus.Members[i].Etcd.WALDir = filepath.Join(mem.Etcd.DataDir, "member", "wal")
  67. }
  68. switch mem.Etcd.InitialClusterState {
  69. case "new":
  70. case "existing":
  71. default:
  72. return nil, fmt.Errorf("'--initial-cluster-state' got %q", mem.Etcd.InitialClusterState)
  73. }
  74. if mem.Etcd.HeartbeatIntervalMs == 0 {
  75. return nil, fmt.Errorf("'--heartbeat-interval' cannot be 0 (got %+v)", mem.Etcd)
  76. }
  77. if mem.Etcd.ElectionTimeoutMs == 0 {
  78. return nil, fmt.Errorf("'--election-timeout' cannot be 0 (got %+v)", mem.Etcd)
  79. }
  80. if int64(clus.Tester.DelayLatencyMs) <= mem.Etcd.ElectionTimeoutMs {
  81. return nil, fmt.Errorf("delay latency %d ms must be greater than election timeout %d ms", clus.Tester.DelayLatencyMs, mem.Etcd.ElectionTimeoutMs)
  82. }
  83. port := ""
  84. listenClientPorts := make([]string, len(clus.Members))
  85. for i, u := range mem.Etcd.ListenClientURLs {
  86. if !isValidURL(u) {
  87. return nil, fmt.Errorf("'--listen-client-urls' has valid URL %q", u)
  88. }
  89. listenClientPorts[i], err = getPort(u)
  90. if err != nil {
  91. return nil, fmt.Errorf("'--listen-client-urls' has no port %q", u)
  92. }
  93. }
  94. for i, u := range mem.Etcd.AdvertiseClientURLs {
  95. if !isValidURL(u) {
  96. return nil, fmt.Errorf("'--advertise-client-urls' has valid URL %q", u)
  97. }
  98. port, err = getPort(u)
  99. if err != nil {
  100. return nil, fmt.Errorf("'--advertise-client-urls' has no port %q", u)
  101. }
  102. if mem.EtcdClientProxy && listenClientPorts[i] == port {
  103. return nil, fmt.Errorf("clus.Members[%d] requires client port proxy, but advertise port %q conflicts with listener port %q", i, port, listenClientPorts[i])
  104. }
  105. }
  106. listenPeerPorts := make([]string, len(clus.Members))
  107. for i, u := range mem.Etcd.ListenPeerURLs {
  108. if !isValidURL(u) {
  109. return nil, fmt.Errorf("'--listen-peer-urls' has valid URL %q", u)
  110. }
  111. listenPeerPorts[i], err = getPort(u)
  112. if err != nil {
  113. return nil, fmt.Errorf("'--listen-peer-urls' has no port %q", u)
  114. }
  115. }
  116. for j, u := range mem.Etcd.AdvertisePeerURLs {
  117. if !isValidURL(u) {
  118. return nil, fmt.Errorf("'--initial-advertise-peer-urls' has valid URL %q", u)
  119. }
  120. port, err = getPort(u)
  121. if err != nil {
  122. return nil, fmt.Errorf("'--initial-advertise-peer-urls' has no port %q", u)
  123. }
  124. if mem.EtcdPeerProxy && listenPeerPorts[j] == port {
  125. return nil, fmt.Errorf("clus.Members[%d] requires peer port proxy, but advertise port %q conflicts with listener port %q", i, port, listenPeerPorts[j])
  126. }
  127. }
  128. if !strings.HasPrefix(mem.Etcd.DataDir, mem.BaseDir) {
  129. return nil, fmt.Errorf("Etcd.DataDir must be prefixed with BaseDir (got %q)", mem.Etcd.DataDir)
  130. }
  131. // TODO: support separate WALDir that can be handled via failure-archive
  132. if !strings.HasPrefix(mem.Etcd.WALDir, mem.BaseDir) {
  133. return nil, fmt.Errorf("Etcd.WALDir must be prefixed with BaseDir (got %q)", mem.Etcd.WALDir)
  134. }
  135. // TODO: only support generated certs with TLS generator
  136. // deprecate auto TLS
  137. if mem.Etcd.PeerAutoTLS && mem.Etcd.PeerCertFile != "" {
  138. return nil, fmt.Errorf("Etcd.PeerAutoTLS 'true', but Etcd.PeerCertFile is %q", mem.Etcd.PeerCertFile)
  139. }
  140. if mem.Etcd.PeerAutoTLS && mem.Etcd.PeerKeyFile != "" {
  141. return nil, fmt.Errorf("Etcd.PeerAutoTLS 'true', but Etcd.PeerKeyFile is %q", mem.Etcd.PeerKeyFile)
  142. }
  143. if mem.Etcd.PeerAutoTLS && mem.Etcd.PeerTrustedCAFile != "" {
  144. return nil, fmt.Errorf("Etcd.PeerAutoTLS 'true', but Etcd.PeerTrustedCAFile is %q", mem.Etcd.PeerTrustedCAFile)
  145. }
  146. if mem.Etcd.ClientAutoTLS && mem.Etcd.ClientCertFile != "" {
  147. return nil, fmt.Errorf("Etcd.ClientAutoTLS 'true', but Etcd.ClientCertFile is %q", mem.Etcd.ClientCertFile)
  148. }
  149. if mem.Etcd.ClientAutoTLS && mem.Etcd.ClientKeyFile != "" {
  150. return nil, fmt.Errorf("Etcd.ClientAutoTLS 'true', but Etcd.ClientKeyFile is %q", mem.Etcd.ClientKeyFile)
  151. }
  152. if mem.Etcd.ClientAutoTLS && mem.Etcd.ClientTrustedCAFile != "" {
  153. return nil, fmt.Errorf("Etcd.ClientAutoTLS 'true', but Etcd.ClientTrustedCAFile is %q", mem.Etcd.ClientTrustedCAFile)
  154. }
  155. if mem.Etcd.PeerClientCertAuth && mem.Etcd.PeerCertFile == "" {
  156. return nil, fmt.Errorf("Etcd.PeerClientCertAuth 'true', but Etcd.PeerCertFile is %q", mem.Etcd.PeerCertFile)
  157. }
  158. if mem.Etcd.PeerClientCertAuth && mem.Etcd.PeerKeyFile == "" {
  159. return nil, fmt.Errorf("Etcd.PeerClientCertAuth 'true', but Etcd.PeerKeyFile is %q", mem.Etcd.PeerCertFile)
  160. }
  161. // only support self-signed certs
  162. if mem.Etcd.PeerClientCertAuth && mem.Etcd.PeerTrustedCAFile == "" {
  163. return nil, fmt.Errorf("Etcd.PeerClientCertAuth 'true', but Etcd.PeerTrustedCAFile is %q", mem.Etcd.PeerCertFile)
  164. }
  165. if !mem.Etcd.PeerClientCertAuth && mem.Etcd.PeerCertFile != "" {
  166. return nil, fmt.Errorf("Etcd.PeerClientCertAuth 'false', but Etcd.PeerCertFile is %q", mem.Etcd.PeerCertFile)
  167. }
  168. if !mem.Etcd.PeerClientCertAuth && mem.Etcd.PeerKeyFile != "" {
  169. return nil, fmt.Errorf("Etcd.PeerClientCertAuth 'false', but Etcd.PeerKeyFile is %q", mem.Etcd.PeerCertFile)
  170. }
  171. if !mem.Etcd.PeerClientCertAuth && mem.Etcd.PeerTrustedCAFile != "" {
  172. return nil, fmt.Errorf("Etcd.PeerClientCertAuth 'false', but Etcd.PeerTrustedCAFile is %q", mem.Etcd.PeerTrustedCAFile)
  173. }
  174. if mem.Etcd.PeerClientCertAuth && mem.Etcd.PeerAutoTLS {
  175. return nil, fmt.Errorf("Etcd.PeerClientCertAuth and Etcd.PeerAutoTLS cannot be both 'true'")
  176. }
  177. if (mem.Etcd.PeerCertFile == "") != (mem.Etcd.PeerKeyFile == "") {
  178. return nil, fmt.Errorf("Both Etcd.PeerCertFile %q and Etcd.PeerKeyFile %q must be either empty or non-empty", mem.Etcd.PeerCertFile, mem.Etcd.PeerKeyFile)
  179. }
  180. if mem.Etcd.ClientCertAuth && mem.Etcd.ClientAutoTLS {
  181. return nil, fmt.Errorf("Etcd.ClientCertAuth and Etcd.ClientAutoTLS cannot be both 'true'")
  182. }
  183. if mem.Etcd.ClientCertAuth && mem.Etcd.ClientCertFile == "" {
  184. return nil, fmt.Errorf("Etcd.ClientCertAuth 'true', but Etcd.ClientCertFile is %q", mem.Etcd.PeerCertFile)
  185. }
  186. if mem.Etcd.ClientCertAuth && mem.Etcd.ClientKeyFile == "" {
  187. return nil, fmt.Errorf("Etcd.ClientCertAuth 'true', but Etcd.ClientKeyFile is %q", mem.Etcd.PeerCertFile)
  188. }
  189. if mem.Etcd.ClientCertAuth && mem.Etcd.ClientTrustedCAFile == "" {
  190. return nil, fmt.Errorf("Etcd.ClientCertAuth 'true', but Etcd.ClientTrustedCAFile is %q", mem.Etcd.ClientTrustedCAFile)
  191. }
  192. if !mem.Etcd.ClientCertAuth && mem.Etcd.ClientCertFile != "" {
  193. return nil, fmt.Errorf("Etcd.ClientCertAuth 'false', but Etcd.ClientCertFile is %q", mem.Etcd.PeerCertFile)
  194. }
  195. if !mem.Etcd.ClientCertAuth && mem.Etcd.ClientKeyFile != "" {
  196. return nil, fmt.Errorf("Etcd.ClientCertAuth 'false', but Etcd.ClientKeyFile is %q", mem.Etcd.PeerCertFile)
  197. }
  198. if !mem.Etcd.ClientCertAuth && mem.Etcd.ClientTrustedCAFile != "" {
  199. return nil, fmt.Errorf("Etcd.ClientCertAuth 'false', but Etcd.ClientTrustedCAFile is %q", mem.Etcd.PeerCertFile)
  200. }
  201. if (mem.Etcd.ClientCertFile == "") != (mem.Etcd.ClientKeyFile == "") {
  202. return nil, fmt.Errorf("Both Etcd.ClientCertFile %q and Etcd.ClientKeyFile %q must be either empty or non-empty", mem.Etcd.ClientCertFile, mem.Etcd.ClientKeyFile)
  203. }
  204. peerTLS := mem.Etcd.PeerAutoTLS ||
  205. (mem.Etcd.PeerClientCertAuth && mem.Etcd.PeerCertFile != "" && mem.Etcd.PeerKeyFile != "" && mem.Etcd.PeerTrustedCAFile != "")
  206. if peerTLS {
  207. for _, cu := range mem.Etcd.ListenPeerURLs {
  208. var u *url.URL
  209. u, err = url.Parse(cu)
  210. if err != nil {
  211. return nil, err
  212. }
  213. if u.Scheme != "https" { // TODO: support unix
  214. return nil, fmt.Errorf("peer TLS is enabled with wrong scheme %q", cu)
  215. }
  216. }
  217. for _, cu := range mem.Etcd.AdvertisePeerURLs {
  218. var u *url.URL
  219. u, err = url.Parse(cu)
  220. if err != nil {
  221. return nil, err
  222. }
  223. if u.Scheme != "https" { // TODO: support unix
  224. return nil, fmt.Errorf("peer TLS is enabled with wrong scheme %q", cu)
  225. }
  226. }
  227. clus.Members[i].PeerCertPath = mem.Etcd.PeerCertFile
  228. if mem.Etcd.PeerCertFile != "" {
  229. var data []byte
  230. data, err = ioutil.ReadFile(mem.Etcd.PeerCertFile)
  231. if err != nil {
  232. return nil, fmt.Errorf("failed to read %q (%v)", mem.Etcd.PeerCertFile, err)
  233. }
  234. clus.Members[i].PeerCertData = string(data)
  235. }
  236. clus.Members[i].PeerKeyPath = mem.Etcd.PeerKeyFile
  237. if mem.Etcd.PeerKeyFile != "" {
  238. var data []byte
  239. data, err = ioutil.ReadFile(mem.Etcd.PeerKeyFile)
  240. if err != nil {
  241. return nil, fmt.Errorf("failed to read %q (%v)", mem.Etcd.PeerKeyFile, err)
  242. }
  243. clus.Members[i].PeerCertData = string(data)
  244. }
  245. clus.Members[i].PeerTrustedCAPath = mem.Etcd.PeerTrustedCAFile
  246. if mem.Etcd.PeerTrustedCAFile != "" {
  247. var data []byte
  248. data, err = ioutil.ReadFile(mem.Etcd.PeerTrustedCAFile)
  249. if err != nil {
  250. return nil, fmt.Errorf("failed to read %q (%v)", mem.Etcd.PeerTrustedCAFile, err)
  251. }
  252. clus.Members[i].PeerCertData = string(data)
  253. }
  254. }
  255. clientTLS := mem.Etcd.ClientAutoTLS ||
  256. (mem.Etcd.ClientCertAuth && mem.Etcd.ClientCertFile != "" && mem.Etcd.ClientKeyFile != "" && mem.Etcd.ClientTrustedCAFile != "")
  257. if clientTLS {
  258. for _, cu := range mem.Etcd.ListenClientURLs {
  259. var u *url.URL
  260. u, err = url.Parse(cu)
  261. if err != nil {
  262. return nil, err
  263. }
  264. if u.Scheme != "https" { // TODO: support unix
  265. return nil, fmt.Errorf("client TLS is enabled with wrong scheme %q", cu)
  266. }
  267. }
  268. for _, cu := range mem.Etcd.AdvertiseClientURLs {
  269. var u *url.URL
  270. u, err = url.Parse(cu)
  271. if err != nil {
  272. return nil, err
  273. }
  274. if u.Scheme != "https" { // TODO: support unix
  275. return nil, fmt.Errorf("client TLS is enabled with wrong scheme %q", cu)
  276. }
  277. }
  278. clus.Members[i].ClientCertPath = mem.Etcd.ClientCertFile
  279. if mem.Etcd.ClientCertFile != "" {
  280. var data []byte
  281. data, err = ioutil.ReadFile(mem.Etcd.ClientCertFile)
  282. if err != nil {
  283. return nil, fmt.Errorf("failed to read %q (%v)", mem.Etcd.ClientCertFile, err)
  284. }
  285. clus.Members[i].ClientCertData = string(data)
  286. }
  287. clus.Members[i].ClientKeyPath = mem.Etcd.ClientKeyFile
  288. if mem.Etcd.ClientKeyFile != "" {
  289. var data []byte
  290. data, err = ioutil.ReadFile(mem.Etcd.ClientKeyFile)
  291. if err != nil {
  292. return nil, fmt.Errorf("failed to read %q (%v)", mem.Etcd.ClientKeyFile, err)
  293. }
  294. clus.Members[i].ClientCertData = string(data)
  295. }
  296. clus.Members[i].ClientTrustedCAPath = mem.Etcd.ClientTrustedCAFile
  297. if mem.Etcd.ClientTrustedCAFile != "" {
  298. var data []byte
  299. data, err = ioutil.ReadFile(mem.Etcd.ClientTrustedCAFile)
  300. if err != nil {
  301. return nil, fmt.Errorf("failed to read %q (%v)", mem.Etcd.ClientTrustedCAFile, err)
  302. }
  303. clus.Members[i].ClientCertData = string(data)
  304. }
  305. if len(mem.Etcd.LogOutputs) == 0 {
  306. return nil, fmt.Errorf("mem.Etcd.LogOutputs cannot be empty")
  307. }
  308. for _, v := range mem.Etcd.LogOutputs {
  309. switch v {
  310. case "stderr", "stdout", "/dev/null", "default":
  311. default:
  312. if !strings.HasPrefix(v, mem.BaseDir) {
  313. return nil, fmt.Errorf("LogOutput %q must be prefixed with BaseDir %q", v, mem.BaseDir)
  314. }
  315. }
  316. }
  317. }
  318. }
  319. if len(clus.Tester.Cases) == 0 {
  320. return nil, errors.New("Cases not found")
  321. }
  322. if clus.Tester.DelayLatencyMs <= clus.Tester.DelayLatencyMsRv*5 {
  323. return nil, fmt.Errorf("delay latency %d ms must be greater than 5x of delay latency random variable %d ms", clus.Tester.DelayLatencyMs, clus.Tester.DelayLatencyMsRv)
  324. }
  325. if clus.Tester.UpdatedDelayLatencyMs == 0 {
  326. clus.Tester.UpdatedDelayLatencyMs = clus.Tester.DelayLatencyMs
  327. }
  328. for _, v := range clus.Tester.Cases {
  329. if _, ok := rpcpb.Case_value[v]; !ok {
  330. return nil, fmt.Errorf("%q is not defined in 'rpcpb.Case_value'", v)
  331. }
  332. }
  333. for _, v := range clus.Tester.Stressers {
  334. if _, ok := rpcpb.Stresser_value[v]; !ok {
  335. return nil, fmt.Errorf("Stresser is unknown; got %q", v)
  336. }
  337. }
  338. for _, v := range clus.Tester.Checkers {
  339. if _, ok := rpcpb.Checker_value[v]; !ok {
  340. return nil, fmt.Errorf("Checker is unknown; got %q", v)
  341. }
  342. }
  343. if clus.Tester.StressKeySuffixRangeTxn > 100 {
  344. return nil, fmt.Errorf("StressKeySuffixRangeTxn maximum value is 100, got %v", clus.Tester.StressKeySuffixRangeTxn)
  345. }
  346. if clus.Tester.StressKeyTxnOps > 64 {
  347. return nil, fmt.Errorf("StressKeyTxnOps maximum value is 64, got %v", clus.Tester.StressKeyTxnOps)
  348. }
  349. return clus, err
  350. }