apply.go 27 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969
  1. // Copyright 2016 The etcd Authors
  2. //
  3. // Licensed under the Apache License, Version 2.0 (the "License");
  4. // you may not use this file except in compliance with the License.
  5. // You may obtain a copy of the License at
  6. //
  7. // http://www.apache.org/licenses/LICENSE-2.0
  8. //
  9. // Unless required by applicable law or agreed to in writing, software
  10. // distributed under the License is distributed on an "AS IS" BASIS,
  11. // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  12. // See the License for the specific language governing permissions and
  13. // limitations under the License.
  14. package etcdserver
  15. import (
  16. "bytes"
  17. "context"
  18. "sort"
  19. "time"
  20. "github.com/coreos/etcd/auth"
  21. pb "github.com/coreos/etcd/etcdserver/etcdserverpb"
  22. "github.com/coreos/etcd/lease"
  23. "github.com/coreos/etcd/mvcc"
  24. "github.com/coreos/etcd/mvcc/mvccpb"
  25. "github.com/coreos/etcd/pkg/types"
  26. "github.com/gogo/protobuf/proto"
  27. )
  28. const (
  29. warnApplyDuration = 100 * time.Millisecond
  30. )
  31. type applyResult struct {
  32. resp proto.Message
  33. err error
  34. // physc signals the physical effect of the request has completed in addition
  35. // to being logically reflected by the node. Currently only used for
  36. // Compaction requests.
  37. physc <-chan struct{}
  38. }
  39. // applierV3 is the interface for processing V3 raft messages
  40. type applierV3 interface {
  41. Apply(r *pb.InternalRaftRequest) *applyResult
  42. Put(txn mvcc.TxnWrite, p *pb.PutRequest) (*pb.PutResponse, error)
  43. Range(txn mvcc.TxnRead, r *pb.RangeRequest) (*pb.RangeResponse, error)
  44. DeleteRange(txn mvcc.TxnWrite, dr *pb.DeleteRangeRequest) (*pb.DeleteRangeResponse, error)
  45. Txn(rt *pb.TxnRequest) (*pb.TxnResponse, error)
  46. Compaction(compaction *pb.CompactionRequest) (*pb.CompactionResponse, <-chan struct{}, error)
  47. LeaseGrant(lc *pb.LeaseGrantRequest) (*pb.LeaseGrantResponse, error)
  48. LeaseRevoke(lc *pb.LeaseRevokeRequest) (*pb.LeaseRevokeResponse, error)
  49. Alarm(*pb.AlarmRequest) (*pb.AlarmResponse, error)
  50. Authenticate(r *pb.InternalAuthenticateRequest) (*pb.AuthenticateResponse, error)
  51. AuthEnable() (*pb.AuthEnableResponse, error)
  52. AuthDisable() (*pb.AuthDisableResponse, error)
  53. UserAdd(ua *pb.AuthUserAddRequest) (*pb.AuthUserAddResponse, error)
  54. UserDelete(ua *pb.AuthUserDeleteRequest) (*pb.AuthUserDeleteResponse, error)
  55. UserChangePassword(ua *pb.AuthUserChangePasswordRequest) (*pb.AuthUserChangePasswordResponse, error)
  56. UserGrantRole(ua *pb.AuthUserGrantRoleRequest) (*pb.AuthUserGrantRoleResponse, error)
  57. UserGet(ua *pb.AuthUserGetRequest) (*pb.AuthUserGetResponse, error)
  58. UserRevokeRole(ua *pb.AuthUserRevokeRoleRequest) (*pb.AuthUserRevokeRoleResponse, error)
  59. RoleAdd(ua *pb.AuthRoleAddRequest) (*pb.AuthRoleAddResponse, error)
  60. RoleGrantPermission(ua *pb.AuthRoleGrantPermissionRequest) (*pb.AuthRoleGrantPermissionResponse, error)
  61. RoleGet(ua *pb.AuthRoleGetRequest) (*pb.AuthRoleGetResponse, error)
  62. RoleRevokePermission(ua *pb.AuthRoleRevokePermissionRequest) (*pb.AuthRoleRevokePermissionResponse, error)
  63. RoleDelete(ua *pb.AuthRoleDeleteRequest) (*pb.AuthRoleDeleteResponse, error)
  64. UserList(ua *pb.AuthUserListRequest) (*pb.AuthUserListResponse, error)
  65. RoleList(ua *pb.AuthRoleListRequest) (*pb.AuthRoleListResponse, error)
  66. }
  67. type checkReqFunc func(mvcc.ReadView, *pb.RequestOp) error
  68. type applierV3backend struct {
  69. s *EtcdServer
  70. checkPut checkReqFunc
  71. checkRange checkReqFunc
  72. }
  73. func (s *EtcdServer) newApplierV3Backend() applierV3 {
  74. base := &applierV3backend{s: s}
  75. base.checkPut = func(rv mvcc.ReadView, req *pb.RequestOp) error {
  76. return base.checkRequestPut(rv, req)
  77. }
  78. base.checkRange = func(rv mvcc.ReadView, req *pb.RequestOp) error {
  79. return base.checkRequestRange(rv, req)
  80. }
  81. return base
  82. }
  83. func (s *EtcdServer) newApplierV3() applierV3 {
  84. return newAuthApplierV3(
  85. s.AuthStore(),
  86. newQuotaApplierV3(s, s.newApplierV3Backend()),
  87. s.lessor,
  88. )
  89. }
  90. func (a *applierV3backend) Apply(r *pb.InternalRaftRequest) *applyResult {
  91. ar := &applyResult{}
  92. // call into a.s.applyV3.F instead of a.F so upper appliers can check individual calls
  93. switch {
  94. case r.Range != nil:
  95. ar.resp, ar.err = a.s.applyV3.Range(nil, r.Range)
  96. case r.Put != nil:
  97. ar.resp, ar.err = a.s.applyV3.Put(nil, r.Put)
  98. case r.DeleteRange != nil:
  99. ar.resp, ar.err = a.s.applyV3.DeleteRange(nil, r.DeleteRange)
  100. case r.Txn != nil:
  101. ar.resp, ar.err = a.s.applyV3.Txn(r.Txn)
  102. case r.Compaction != nil:
  103. ar.resp, ar.physc, ar.err = a.s.applyV3.Compaction(r.Compaction)
  104. case r.LeaseGrant != nil:
  105. ar.resp, ar.err = a.s.applyV3.LeaseGrant(r.LeaseGrant)
  106. case r.LeaseRevoke != nil:
  107. ar.resp, ar.err = a.s.applyV3.LeaseRevoke(r.LeaseRevoke)
  108. case r.Alarm != nil:
  109. ar.resp, ar.err = a.s.applyV3.Alarm(r.Alarm)
  110. case r.Authenticate != nil:
  111. ar.resp, ar.err = a.s.applyV3.Authenticate(r.Authenticate)
  112. case r.AuthEnable != nil:
  113. ar.resp, ar.err = a.s.applyV3.AuthEnable()
  114. case r.AuthDisable != nil:
  115. ar.resp, ar.err = a.s.applyV3.AuthDisable()
  116. case r.AuthUserAdd != nil:
  117. ar.resp, ar.err = a.s.applyV3.UserAdd(r.AuthUserAdd)
  118. case r.AuthUserDelete != nil:
  119. ar.resp, ar.err = a.s.applyV3.UserDelete(r.AuthUserDelete)
  120. case r.AuthUserChangePassword != nil:
  121. ar.resp, ar.err = a.s.applyV3.UserChangePassword(r.AuthUserChangePassword)
  122. case r.AuthUserGrantRole != nil:
  123. ar.resp, ar.err = a.s.applyV3.UserGrantRole(r.AuthUserGrantRole)
  124. case r.AuthUserGet != nil:
  125. ar.resp, ar.err = a.s.applyV3.UserGet(r.AuthUserGet)
  126. case r.AuthUserRevokeRole != nil:
  127. ar.resp, ar.err = a.s.applyV3.UserRevokeRole(r.AuthUserRevokeRole)
  128. case r.AuthRoleAdd != nil:
  129. ar.resp, ar.err = a.s.applyV3.RoleAdd(r.AuthRoleAdd)
  130. case r.AuthRoleGrantPermission != nil:
  131. ar.resp, ar.err = a.s.applyV3.RoleGrantPermission(r.AuthRoleGrantPermission)
  132. case r.AuthRoleGet != nil:
  133. ar.resp, ar.err = a.s.applyV3.RoleGet(r.AuthRoleGet)
  134. case r.AuthRoleRevokePermission != nil:
  135. ar.resp, ar.err = a.s.applyV3.RoleRevokePermission(r.AuthRoleRevokePermission)
  136. case r.AuthRoleDelete != nil:
  137. ar.resp, ar.err = a.s.applyV3.RoleDelete(r.AuthRoleDelete)
  138. case r.AuthUserList != nil:
  139. ar.resp, ar.err = a.s.applyV3.UserList(r.AuthUserList)
  140. case r.AuthRoleList != nil:
  141. ar.resp, ar.err = a.s.applyV3.RoleList(r.AuthRoleList)
  142. default:
  143. panic("not implemented")
  144. }
  145. return ar
  146. }
  147. func (a *applierV3backend) Put(txn mvcc.TxnWrite, p *pb.PutRequest) (resp *pb.PutResponse, err error) {
  148. resp = &pb.PutResponse{}
  149. resp.Header = &pb.ResponseHeader{}
  150. val, leaseID := p.Value, lease.LeaseID(p.Lease)
  151. if txn == nil {
  152. if leaseID != lease.NoLease {
  153. if l := a.s.lessor.Lookup(leaseID); l == nil {
  154. return nil, lease.ErrLeaseNotFound
  155. }
  156. }
  157. txn = a.s.KV().Write()
  158. defer txn.End()
  159. }
  160. var rr *mvcc.RangeResult
  161. if p.IgnoreValue || p.IgnoreLease || p.PrevKv {
  162. rr, err = txn.Range(p.Key, nil, mvcc.RangeOptions{})
  163. if err != nil {
  164. return nil, err
  165. }
  166. }
  167. if p.IgnoreValue || p.IgnoreLease {
  168. if rr == nil || len(rr.KVs) == 0 {
  169. // ignore_{lease,value} flag expects previous key-value pair
  170. return nil, ErrKeyNotFound
  171. }
  172. }
  173. if p.IgnoreValue {
  174. val = rr.KVs[0].Value
  175. }
  176. if p.IgnoreLease {
  177. leaseID = lease.LeaseID(rr.KVs[0].Lease)
  178. }
  179. if p.PrevKv {
  180. if rr != nil && len(rr.KVs) != 0 {
  181. resp.PrevKv = &rr.KVs[0]
  182. }
  183. }
  184. resp.Header.Revision = txn.Put(p.Key, val, leaseID)
  185. return resp, nil
  186. }
  187. func (a *applierV3backend) DeleteRange(txn mvcc.TxnWrite, dr *pb.DeleteRangeRequest) (*pb.DeleteRangeResponse, error) {
  188. resp := &pb.DeleteRangeResponse{}
  189. resp.Header = &pb.ResponseHeader{}
  190. end := mkGteRange(dr.RangeEnd)
  191. if txn == nil {
  192. txn = a.s.kv.Write()
  193. defer txn.End()
  194. }
  195. if dr.PrevKv {
  196. rr, err := txn.Range(dr.Key, end, mvcc.RangeOptions{})
  197. if err != nil {
  198. return nil, err
  199. }
  200. if rr != nil {
  201. resp.PrevKvs = make([]*mvccpb.KeyValue, len(rr.KVs))
  202. for i := range rr.KVs {
  203. resp.PrevKvs[i] = &rr.KVs[i]
  204. }
  205. }
  206. }
  207. resp.Deleted, resp.Header.Revision = txn.DeleteRange(dr.Key, end)
  208. return resp, nil
  209. }
  210. func (a *applierV3backend) Range(txn mvcc.TxnRead, r *pb.RangeRequest) (*pb.RangeResponse, error) {
  211. resp := &pb.RangeResponse{}
  212. resp.Header = &pb.ResponseHeader{}
  213. if txn == nil {
  214. txn = a.s.kv.Read()
  215. defer txn.End()
  216. }
  217. limit := r.Limit
  218. if r.SortOrder != pb.RangeRequest_NONE ||
  219. r.MinModRevision != 0 || r.MaxModRevision != 0 ||
  220. r.MinCreateRevision != 0 || r.MaxCreateRevision != 0 {
  221. // fetch everything; sort and truncate afterwards
  222. limit = 0
  223. }
  224. if limit > 0 {
  225. // fetch one extra for 'more' flag
  226. limit = limit + 1
  227. }
  228. ro := mvcc.RangeOptions{
  229. Limit: limit,
  230. Rev: r.Revision,
  231. Count: r.CountOnly,
  232. }
  233. rr, err := txn.Range(r.Key, mkGteRange(r.RangeEnd), ro)
  234. if err != nil {
  235. return nil, err
  236. }
  237. if r.MaxModRevision != 0 {
  238. f := func(kv *mvccpb.KeyValue) bool { return kv.ModRevision > r.MaxModRevision }
  239. pruneKVs(rr, f)
  240. }
  241. if r.MinModRevision != 0 {
  242. f := func(kv *mvccpb.KeyValue) bool { return kv.ModRevision < r.MinModRevision }
  243. pruneKVs(rr, f)
  244. }
  245. if r.MaxCreateRevision != 0 {
  246. f := func(kv *mvccpb.KeyValue) bool { return kv.CreateRevision > r.MaxCreateRevision }
  247. pruneKVs(rr, f)
  248. }
  249. if r.MinCreateRevision != 0 {
  250. f := func(kv *mvccpb.KeyValue) bool { return kv.CreateRevision < r.MinCreateRevision }
  251. pruneKVs(rr, f)
  252. }
  253. sortOrder := r.SortOrder
  254. if r.SortTarget != pb.RangeRequest_KEY && sortOrder == pb.RangeRequest_NONE {
  255. // Since current mvcc.Range implementation returns results
  256. // sorted by keys in lexiographically ascending order,
  257. // sort ASCEND by default only when target is not 'KEY'
  258. sortOrder = pb.RangeRequest_ASCEND
  259. }
  260. if sortOrder != pb.RangeRequest_NONE {
  261. var sorter sort.Interface
  262. switch {
  263. case r.SortTarget == pb.RangeRequest_KEY:
  264. sorter = &kvSortByKey{&kvSort{rr.KVs}}
  265. case r.SortTarget == pb.RangeRequest_VERSION:
  266. sorter = &kvSortByVersion{&kvSort{rr.KVs}}
  267. case r.SortTarget == pb.RangeRequest_CREATE:
  268. sorter = &kvSortByCreate{&kvSort{rr.KVs}}
  269. case r.SortTarget == pb.RangeRequest_MOD:
  270. sorter = &kvSortByMod{&kvSort{rr.KVs}}
  271. case r.SortTarget == pb.RangeRequest_VALUE:
  272. sorter = &kvSortByValue{&kvSort{rr.KVs}}
  273. }
  274. switch {
  275. case sortOrder == pb.RangeRequest_ASCEND:
  276. sort.Sort(sorter)
  277. case sortOrder == pb.RangeRequest_DESCEND:
  278. sort.Sort(sort.Reverse(sorter))
  279. }
  280. }
  281. if r.Limit > 0 && len(rr.KVs) > int(r.Limit) {
  282. rr.KVs = rr.KVs[:r.Limit]
  283. resp.More = true
  284. }
  285. resp.Header.Revision = rr.Rev
  286. resp.Count = int64(rr.Count)
  287. resp.Kvs = make([]*mvccpb.KeyValue, len(rr.KVs))
  288. for i := range rr.KVs {
  289. if r.KeysOnly {
  290. rr.KVs[i].Value = nil
  291. }
  292. resp.Kvs[i] = &rr.KVs[i]
  293. }
  294. return resp, nil
  295. }
  296. func (a *applierV3backend) Txn(rt *pb.TxnRequest) (*pb.TxnResponse, error) {
  297. isWrite := !isTxnReadonly(rt)
  298. txn := mvcc.NewReadOnlyTxnWrite(a.s.KV().Read())
  299. txnPath := compareToPath(txn, rt)
  300. if isWrite {
  301. if _, err := checkRequests(txn, rt, txnPath, a.checkPut); err != nil {
  302. txn.End()
  303. return nil, err
  304. }
  305. }
  306. if _, err := checkRequests(txn, rt, txnPath, a.checkRange); err != nil {
  307. txn.End()
  308. return nil, err
  309. }
  310. txnResp, _ := newTxnResp(rt, txnPath)
  311. // When executing mutable txn ops, etcd must hold the txn lock so
  312. // readers do not see any intermediate results. Since writes are
  313. // serialized on the raft loop, the revision in the read view will
  314. // be the revision of the write txn.
  315. if isWrite {
  316. txn.End()
  317. txn = a.s.KV().Write()
  318. }
  319. a.applyTxn(txn, rt, txnPath, txnResp)
  320. rev := txn.Rev()
  321. if len(txn.Changes()) != 0 {
  322. rev++
  323. }
  324. txn.End()
  325. txnResp.Header.Revision = rev
  326. return txnResp, nil
  327. }
  328. // newTxnResp allocates a txn response for a txn request given a path.
  329. func newTxnResp(rt *pb.TxnRequest, txnPath []bool) (txnResp *pb.TxnResponse, txnCount int) {
  330. reqs := rt.Success
  331. if !txnPath[0] {
  332. reqs = rt.Failure
  333. }
  334. resps := make([]*pb.ResponseOp, len(reqs))
  335. txnResp = &pb.TxnResponse{
  336. Responses: resps,
  337. Succeeded: txnPath[0],
  338. Header: &pb.ResponseHeader{},
  339. }
  340. for i, req := range reqs {
  341. switch tv := req.Request.(type) {
  342. case *pb.RequestOp_RequestRange:
  343. resps[i] = &pb.ResponseOp{Response: &pb.ResponseOp_ResponseRange{}}
  344. case *pb.RequestOp_RequestPut:
  345. resps[i] = &pb.ResponseOp{Response: &pb.ResponseOp_ResponsePut{}}
  346. case *pb.RequestOp_RequestDeleteRange:
  347. resps[i] = &pb.ResponseOp{Response: &pb.ResponseOp_ResponseDeleteRange{}}
  348. case *pb.RequestOp_RequestTxn:
  349. resp, txns := newTxnResp(tv.RequestTxn, txnPath[1:])
  350. resps[i] = &pb.ResponseOp{Response: &pb.ResponseOp_ResponseTxn{ResponseTxn: resp}}
  351. txnPath = txnPath[1+txns:]
  352. txnCount += txns + 1
  353. default:
  354. }
  355. }
  356. return txnResp, txnCount
  357. }
  358. func compareToPath(rv mvcc.ReadView, rt *pb.TxnRequest) []bool {
  359. txnPath := make([]bool, 1)
  360. ops := rt.Success
  361. if txnPath[0] = applyCompares(rv, rt.Compare); !txnPath[0] {
  362. ops = rt.Failure
  363. }
  364. for _, op := range ops {
  365. tv, ok := op.Request.(*pb.RequestOp_RequestTxn)
  366. if !ok || tv.RequestTxn == nil {
  367. continue
  368. }
  369. txnPath = append(txnPath, compareToPath(rv, tv.RequestTxn)...)
  370. }
  371. return txnPath
  372. }
  373. func applyCompares(rv mvcc.ReadView, cmps []*pb.Compare) bool {
  374. for _, c := range cmps {
  375. if !applyCompare(rv, c) {
  376. return false
  377. }
  378. }
  379. return true
  380. }
  381. // applyCompare applies the compare request.
  382. // If the comparison succeeds, it returns true. Otherwise, returns false.
  383. func applyCompare(rv mvcc.ReadView, c *pb.Compare) bool {
  384. // TODO: possible optimizations
  385. // * chunk reads for large ranges to conserve memory
  386. // * rewrite rules for common patterns:
  387. // ex. "[a, b) createrev > 0" => "limit 1 /\ kvs > 0"
  388. // * caching
  389. rr, err := rv.Range(c.Key, mkGteRange(c.RangeEnd), mvcc.RangeOptions{})
  390. if err != nil {
  391. return false
  392. }
  393. if len(rr.KVs) == 0 {
  394. if c.Target == pb.Compare_VALUE {
  395. // Always fail if comparing a value on a key/keys that doesn't exist;
  396. // nil == empty string in grpc; no way to represent missing value
  397. return false
  398. }
  399. return compareKV(c, mvccpb.KeyValue{})
  400. }
  401. for _, kv := range rr.KVs {
  402. if !compareKV(c, kv) {
  403. return false
  404. }
  405. }
  406. return true
  407. }
  408. func compareKV(c *pb.Compare, ckv mvccpb.KeyValue) bool {
  409. var result int
  410. rev := int64(0)
  411. switch c.Target {
  412. case pb.Compare_VALUE:
  413. v := []byte{}
  414. if tv, _ := c.TargetUnion.(*pb.Compare_Value); tv != nil {
  415. v = tv.Value
  416. }
  417. result = bytes.Compare(ckv.Value, v)
  418. case pb.Compare_CREATE:
  419. if tv, _ := c.TargetUnion.(*pb.Compare_CreateRevision); tv != nil {
  420. rev = tv.CreateRevision
  421. }
  422. result = compareInt64(ckv.CreateRevision, rev)
  423. case pb.Compare_MOD:
  424. if tv, _ := c.TargetUnion.(*pb.Compare_ModRevision); tv != nil {
  425. rev = tv.ModRevision
  426. }
  427. result = compareInt64(ckv.ModRevision, rev)
  428. case pb.Compare_VERSION:
  429. if tv, _ := c.TargetUnion.(*pb.Compare_Version); tv != nil {
  430. rev = tv.Version
  431. }
  432. result = compareInt64(ckv.Version, rev)
  433. case pb.Compare_LEASE:
  434. if tv, _ := c.TargetUnion.(*pb.Compare_Lease); tv != nil {
  435. rev = tv.Lease
  436. }
  437. result = compareInt64(ckv.Lease, rev)
  438. }
  439. switch c.Result {
  440. case pb.Compare_EQUAL:
  441. return result == 0
  442. case pb.Compare_NOT_EQUAL:
  443. return result != 0
  444. case pb.Compare_GREATER:
  445. return result > 0
  446. case pb.Compare_LESS:
  447. return result < 0
  448. }
  449. return true
  450. }
  451. func (a *applierV3backend) applyTxn(txn mvcc.TxnWrite, rt *pb.TxnRequest, txnPath []bool, tresp *pb.TxnResponse) (txns int) {
  452. reqs := rt.Success
  453. if !txnPath[0] {
  454. reqs = rt.Failure
  455. }
  456. for i, req := range reqs {
  457. respi := tresp.Responses[i].Response
  458. switch tv := req.Request.(type) {
  459. case *pb.RequestOp_RequestRange:
  460. resp, err := a.Range(txn, tv.RequestRange)
  461. if err != nil {
  462. plog.Panicf("unexpected error during txn: %v", err)
  463. }
  464. respi.(*pb.ResponseOp_ResponseRange).ResponseRange = resp
  465. case *pb.RequestOp_RequestPut:
  466. resp, err := a.Put(txn, tv.RequestPut)
  467. if err != nil {
  468. plog.Panicf("unexpected error during txn: %v", err)
  469. }
  470. respi.(*pb.ResponseOp_ResponsePut).ResponsePut = resp
  471. case *pb.RequestOp_RequestDeleteRange:
  472. resp, err := a.DeleteRange(txn, tv.RequestDeleteRange)
  473. if err != nil {
  474. plog.Panicf("unexpected error during txn: %v", err)
  475. }
  476. respi.(*pb.ResponseOp_ResponseDeleteRange).ResponseDeleteRange = resp
  477. case *pb.RequestOp_RequestTxn:
  478. resp := respi.(*pb.ResponseOp_ResponseTxn).ResponseTxn
  479. applyTxns := a.applyTxn(txn, tv.RequestTxn, txnPath[1:], resp)
  480. txns += applyTxns + 1
  481. txnPath = txnPath[applyTxns+1:]
  482. default:
  483. // empty union
  484. }
  485. }
  486. return txns
  487. }
  488. func (a *applierV3backend) Compaction(compaction *pb.CompactionRequest) (*pb.CompactionResponse, <-chan struct{}, error) {
  489. resp := &pb.CompactionResponse{}
  490. resp.Header = &pb.ResponseHeader{}
  491. ch, err := a.s.KV().Compact(compaction.Revision)
  492. if err != nil {
  493. return nil, ch, err
  494. }
  495. // get the current revision. which key to get is not important.
  496. rr, _ := a.s.KV().Range([]byte("compaction"), nil, mvcc.RangeOptions{})
  497. resp.Header.Revision = rr.Rev
  498. return resp, ch, err
  499. }
  500. func (a *applierV3backend) LeaseGrant(lc *pb.LeaseGrantRequest) (*pb.LeaseGrantResponse, error) {
  501. l, err := a.s.lessor.Grant(lease.LeaseID(lc.ID), lc.TTL)
  502. resp := &pb.LeaseGrantResponse{}
  503. if err == nil {
  504. resp.ID = int64(l.ID)
  505. resp.TTL = l.TTL()
  506. resp.Header = newHeader(a.s)
  507. }
  508. return resp, err
  509. }
  510. func (a *applierV3backend) LeaseRevoke(lc *pb.LeaseRevokeRequest) (*pb.LeaseRevokeResponse, error) {
  511. err := a.s.lessor.Revoke(lease.LeaseID(lc.ID))
  512. return &pb.LeaseRevokeResponse{Header: newHeader(a.s)}, err
  513. }
  514. func (a *applierV3backend) Alarm(ar *pb.AlarmRequest) (*pb.AlarmResponse, error) {
  515. resp := &pb.AlarmResponse{}
  516. oldCount := len(a.s.alarmStore.Get(ar.Alarm))
  517. switch ar.Action {
  518. case pb.AlarmRequest_GET:
  519. resp.Alarms = a.s.alarmStore.Get(ar.Alarm)
  520. case pb.AlarmRequest_ACTIVATE:
  521. m := a.s.alarmStore.Activate(types.ID(ar.MemberID), ar.Alarm)
  522. if m == nil {
  523. break
  524. }
  525. resp.Alarms = append(resp.Alarms, m)
  526. activated := oldCount == 0 && len(a.s.alarmStore.Get(m.Alarm)) == 1
  527. if !activated {
  528. break
  529. }
  530. plog.Warningf("alarm %v raised by peer %s", m.Alarm, types.ID(m.MemberID))
  531. switch m.Alarm {
  532. case pb.AlarmType_CORRUPT:
  533. a.s.applyV3 = newApplierV3Corrupt(a)
  534. case pb.AlarmType_NOSPACE:
  535. a.s.applyV3 = newApplierV3Capped(a)
  536. default:
  537. plog.Errorf("unimplemented alarm activation (%+v)", m)
  538. }
  539. case pb.AlarmRequest_DEACTIVATE:
  540. m := a.s.alarmStore.Deactivate(types.ID(ar.MemberID), ar.Alarm)
  541. if m == nil {
  542. break
  543. }
  544. resp.Alarms = append(resp.Alarms, m)
  545. deactivated := oldCount > 0 && len(a.s.alarmStore.Get(ar.Alarm)) == 0
  546. if !deactivated {
  547. break
  548. }
  549. switch m.Alarm {
  550. case pb.AlarmType_NOSPACE, pb.AlarmType_CORRUPT:
  551. // TODO: check kv hash before deactivating CORRUPT?
  552. plog.Infof("alarm disarmed %+v", ar)
  553. a.s.applyV3 = a.s.newApplierV3()
  554. default:
  555. plog.Errorf("unimplemented alarm deactivation (%+v)", m)
  556. }
  557. default:
  558. return nil, nil
  559. }
  560. return resp, nil
  561. }
  562. type applierV3Capped struct {
  563. applierV3
  564. q backendQuota
  565. }
  566. // newApplierV3Capped creates an applyV3 that will reject Puts and transactions
  567. // with Puts so that the number of keys in the store is capped.
  568. func newApplierV3Capped(base applierV3) applierV3 { return &applierV3Capped{applierV3: base} }
  569. func (a *applierV3Capped) Put(txn mvcc.TxnWrite, p *pb.PutRequest) (*pb.PutResponse, error) {
  570. return nil, ErrNoSpace
  571. }
  572. func (a *applierV3Capped) Txn(r *pb.TxnRequest) (*pb.TxnResponse, error) {
  573. if a.q.Cost(r) > 0 {
  574. return nil, ErrNoSpace
  575. }
  576. return a.applierV3.Txn(r)
  577. }
  578. func (a *applierV3Capped) LeaseGrant(lc *pb.LeaseGrantRequest) (*pb.LeaseGrantResponse, error) {
  579. return nil, ErrNoSpace
  580. }
  581. func (a *applierV3backend) AuthEnable() (*pb.AuthEnableResponse, error) {
  582. err := a.s.AuthStore().AuthEnable()
  583. if err != nil {
  584. return nil, err
  585. }
  586. return &pb.AuthEnableResponse{Header: newHeader(a.s)}, nil
  587. }
  588. func (a *applierV3backend) AuthDisable() (*pb.AuthDisableResponse, error) {
  589. a.s.AuthStore().AuthDisable()
  590. return &pb.AuthDisableResponse{Header: newHeader(a.s)}, nil
  591. }
  592. func (a *applierV3backend) Authenticate(r *pb.InternalAuthenticateRequest) (*pb.AuthenticateResponse, error) {
  593. ctx := context.WithValue(context.WithValue(a.s.ctx, auth.AuthenticateParamIndex{}, a.s.consistIndex.ConsistentIndex()), auth.AuthenticateParamSimpleTokenPrefix{}, r.SimpleToken)
  594. resp, err := a.s.AuthStore().Authenticate(ctx, r.Name, r.Password)
  595. if resp != nil {
  596. resp.Header = newHeader(a.s)
  597. }
  598. return resp, err
  599. }
  600. func (a *applierV3backend) UserAdd(r *pb.AuthUserAddRequest) (*pb.AuthUserAddResponse, error) {
  601. resp, err := a.s.AuthStore().UserAdd(r)
  602. if resp != nil {
  603. resp.Header = newHeader(a.s)
  604. }
  605. return resp, err
  606. }
  607. func (a *applierV3backend) UserDelete(r *pb.AuthUserDeleteRequest) (*pb.AuthUserDeleteResponse, error) {
  608. resp, err := a.s.AuthStore().UserDelete(r)
  609. if resp != nil {
  610. resp.Header = newHeader(a.s)
  611. }
  612. return resp, err
  613. }
  614. func (a *applierV3backend) UserChangePassword(r *pb.AuthUserChangePasswordRequest) (*pb.AuthUserChangePasswordResponse, error) {
  615. resp, err := a.s.AuthStore().UserChangePassword(r)
  616. if resp != nil {
  617. resp.Header = newHeader(a.s)
  618. }
  619. return resp, err
  620. }
  621. func (a *applierV3backend) UserGrantRole(r *pb.AuthUserGrantRoleRequest) (*pb.AuthUserGrantRoleResponse, error) {
  622. resp, err := a.s.AuthStore().UserGrantRole(r)
  623. if resp != nil {
  624. resp.Header = newHeader(a.s)
  625. }
  626. return resp, err
  627. }
  628. func (a *applierV3backend) UserGet(r *pb.AuthUserGetRequest) (*pb.AuthUserGetResponse, error) {
  629. resp, err := a.s.AuthStore().UserGet(r)
  630. if resp != nil {
  631. resp.Header = newHeader(a.s)
  632. }
  633. return resp, err
  634. }
  635. func (a *applierV3backend) UserRevokeRole(r *pb.AuthUserRevokeRoleRequest) (*pb.AuthUserRevokeRoleResponse, error) {
  636. resp, err := a.s.AuthStore().UserRevokeRole(r)
  637. if resp != nil {
  638. resp.Header = newHeader(a.s)
  639. }
  640. return resp, err
  641. }
  642. func (a *applierV3backend) RoleAdd(r *pb.AuthRoleAddRequest) (*pb.AuthRoleAddResponse, error) {
  643. resp, err := a.s.AuthStore().RoleAdd(r)
  644. if resp != nil {
  645. resp.Header = newHeader(a.s)
  646. }
  647. return resp, err
  648. }
  649. func (a *applierV3backend) RoleGrantPermission(r *pb.AuthRoleGrantPermissionRequest) (*pb.AuthRoleGrantPermissionResponse, error) {
  650. resp, err := a.s.AuthStore().RoleGrantPermission(r)
  651. if resp != nil {
  652. resp.Header = newHeader(a.s)
  653. }
  654. return resp, err
  655. }
  656. func (a *applierV3backend) RoleGet(r *pb.AuthRoleGetRequest) (*pb.AuthRoleGetResponse, error) {
  657. resp, err := a.s.AuthStore().RoleGet(r)
  658. if resp != nil {
  659. resp.Header = newHeader(a.s)
  660. }
  661. return resp, err
  662. }
  663. func (a *applierV3backend) RoleRevokePermission(r *pb.AuthRoleRevokePermissionRequest) (*pb.AuthRoleRevokePermissionResponse, error) {
  664. resp, err := a.s.AuthStore().RoleRevokePermission(r)
  665. if resp != nil {
  666. resp.Header = newHeader(a.s)
  667. }
  668. return resp, err
  669. }
  670. func (a *applierV3backend) RoleDelete(r *pb.AuthRoleDeleteRequest) (*pb.AuthRoleDeleteResponse, error) {
  671. resp, err := a.s.AuthStore().RoleDelete(r)
  672. if resp != nil {
  673. resp.Header = newHeader(a.s)
  674. }
  675. return resp, err
  676. }
  677. func (a *applierV3backend) UserList(r *pb.AuthUserListRequest) (*pb.AuthUserListResponse, error) {
  678. resp, err := a.s.AuthStore().UserList(r)
  679. if resp != nil {
  680. resp.Header = newHeader(a.s)
  681. }
  682. return resp, err
  683. }
  684. func (a *applierV3backend) RoleList(r *pb.AuthRoleListRequest) (*pb.AuthRoleListResponse, error) {
  685. resp, err := a.s.AuthStore().RoleList(r)
  686. if resp != nil {
  687. resp.Header = newHeader(a.s)
  688. }
  689. return resp, err
  690. }
  691. type quotaApplierV3 struct {
  692. applierV3
  693. q Quota
  694. }
  695. func newQuotaApplierV3(s *EtcdServer, app applierV3) applierV3 {
  696. return &quotaApplierV3{app, NewBackendQuota(s)}
  697. }
  698. func (a *quotaApplierV3) Put(txn mvcc.TxnWrite, p *pb.PutRequest) (*pb.PutResponse, error) {
  699. ok := a.q.Available(p)
  700. resp, err := a.applierV3.Put(txn, p)
  701. if err == nil && !ok {
  702. err = ErrNoSpace
  703. }
  704. return resp, err
  705. }
  706. func (a *quotaApplierV3) Txn(rt *pb.TxnRequest) (*pb.TxnResponse, error) {
  707. ok := a.q.Available(rt)
  708. resp, err := a.applierV3.Txn(rt)
  709. if err == nil && !ok {
  710. err = ErrNoSpace
  711. }
  712. return resp, err
  713. }
  714. func (a *quotaApplierV3) LeaseGrant(lc *pb.LeaseGrantRequest) (*pb.LeaseGrantResponse, error) {
  715. ok := a.q.Available(lc)
  716. resp, err := a.applierV3.LeaseGrant(lc)
  717. if err == nil && !ok {
  718. err = ErrNoSpace
  719. }
  720. return resp, err
  721. }
  722. type kvSort struct{ kvs []mvccpb.KeyValue }
  723. func (s *kvSort) Swap(i, j int) {
  724. t := s.kvs[i]
  725. s.kvs[i] = s.kvs[j]
  726. s.kvs[j] = t
  727. }
  728. func (s *kvSort) Len() int { return len(s.kvs) }
  729. type kvSortByKey struct{ *kvSort }
  730. func (s *kvSortByKey) Less(i, j int) bool {
  731. return bytes.Compare(s.kvs[i].Key, s.kvs[j].Key) < 0
  732. }
  733. type kvSortByVersion struct{ *kvSort }
  734. func (s *kvSortByVersion) Less(i, j int) bool {
  735. return (s.kvs[i].Version - s.kvs[j].Version) < 0
  736. }
  737. type kvSortByCreate struct{ *kvSort }
  738. func (s *kvSortByCreate) Less(i, j int) bool {
  739. return (s.kvs[i].CreateRevision - s.kvs[j].CreateRevision) < 0
  740. }
  741. type kvSortByMod struct{ *kvSort }
  742. func (s *kvSortByMod) Less(i, j int) bool {
  743. return (s.kvs[i].ModRevision - s.kvs[j].ModRevision) < 0
  744. }
  745. type kvSortByValue struct{ *kvSort }
  746. func (s *kvSortByValue) Less(i, j int) bool {
  747. return bytes.Compare(s.kvs[i].Value, s.kvs[j].Value) < 0
  748. }
  749. func checkRequests(rv mvcc.ReadView, rt *pb.TxnRequest, txnPath []bool, f checkReqFunc) (int, error) {
  750. txnCount := 0
  751. reqs := rt.Success
  752. if !txnPath[0] {
  753. reqs = rt.Failure
  754. }
  755. for _, req := range reqs {
  756. if tv, ok := req.Request.(*pb.RequestOp_RequestTxn); ok && tv.RequestTxn != nil {
  757. txns, err := checkRequests(rv, tv.RequestTxn, txnPath[1:], f)
  758. if err != nil {
  759. return 0, err
  760. }
  761. txnCount += txns + 1
  762. txnPath = txnPath[txns+1:]
  763. continue
  764. }
  765. if err := f(rv, req); err != nil {
  766. return 0, err
  767. }
  768. }
  769. return txnCount, nil
  770. }
  771. func (a *applierV3backend) checkRequestPut(rv mvcc.ReadView, reqOp *pb.RequestOp) error {
  772. tv, ok := reqOp.Request.(*pb.RequestOp_RequestPut)
  773. if !ok || tv.RequestPut == nil {
  774. return nil
  775. }
  776. req := tv.RequestPut
  777. if req.IgnoreValue || req.IgnoreLease {
  778. // expects previous key-value, error if not exist
  779. rr, err := rv.Range(req.Key, nil, mvcc.RangeOptions{})
  780. if err != nil {
  781. return err
  782. }
  783. if rr == nil || len(rr.KVs) == 0 {
  784. return ErrKeyNotFound
  785. }
  786. }
  787. if lease.LeaseID(req.Lease) != lease.NoLease {
  788. if l := a.s.lessor.Lookup(lease.LeaseID(req.Lease)); l == nil {
  789. return lease.ErrLeaseNotFound
  790. }
  791. }
  792. return nil
  793. }
  794. func (a *applierV3backend) checkRequestRange(rv mvcc.ReadView, reqOp *pb.RequestOp) error {
  795. tv, ok := reqOp.Request.(*pb.RequestOp_RequestRange)
  796. if !ok || tv.RequestRange == nil {
  797. return nil
  798. }
  799. req := tv.RequestRange
  800. switch {
  801. case req.Revision == 0:
  802. return nil
  803. case req.Revision > rv.Rev():
  804. return mvcc.ErrFutureRev
  805. case req.Revision < rv.FirstRev():
  806. return mvcc.ErrCompacted
  807. }
  808. return nil
  809. }
  810. func compareInt64(a, b int64) int {
  811. switch {
  812. case a < b:
  813. return -1
  814. case a > b:
  815. return 1
  816. default:
  817. return 0
  818. }
  819. }
  820. // mkGteRange determines if the range end is a >= range. This works around grpc
  821. // sending empty byte strings as nil; >= is encoded in the range end as '\0'.
  822. // If it is a GTE range, then []byte{} is returned to indicate the empty byte
  823. // string (vs nil being no byte string).
  824. func mkGteRange(rangeEnd []byte) []byte {
  825. if len(rangeEnd) == 1 && rangeEnd[0] == 0 {
  826. return []byte{}
  827. }
  828. return rangeEnd
  829. }
  830. func noSideEffect(r *pb.InternalRaftRequest) bool {
  831. return r.Range != nil || r.AuthUserGet != nil || r.AuthRoleGet != nil
  832. }
  833. func removeNeedlessRangeReqs(txn *pb.TxnRequest) {
  834. f := func(ops []*pb.RequestOp) []*pb.RequestOp {
  835. j := 0
  836. for i := 0; i < len(ops); i++ {
  837. if _, ok := ops[i].Request.(*pb.RequestOp_RequestRange); ok {
  838. continue
  839. }
  840. ops[j] = ops[i]
  841. j++
  842. }
  843. return ops[:j]
  844. }
  845. txn.Success = f(txn.Success)
  846. txn.Failure = f(txn.Failure)
  847. }
  848. func pruneKVs(rr *mvcc.RangeResult, isPrunable func(*mvccpb.KeyValue) bool) {
  849. j := 0
  850. for i := range rr.KVs {
  851. rr.KVs[j] = rr.KVs[i]
  852. if !isPrunable(&rr.KVs[i]) {
  853. j++
  854. }
  855. }
  856. rr.KVs = rr.KVs[:j]
  857. }
  858. func newHeader(s *EtcdServer) *pb.ResponseHeader {
  859. return &pb.ResponseHeader{
  860. ClusterId: uint64(s.Cluster().ID()),
  861. MemberId: uint64(s.ID()),
  862. Revision: s.KV().Rev(),
  863. RaftTerm: s.Term(),
  864. }
  865. }