v3_grpc_test.go 25 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942
  1. // Copyright 2016 CoreOS, Inc.
  2. //
  3. // Licensed under the Apache License, Version 2.0 (the "License");
  4. // you may not use this file except in compliance with the License.
  5. // You may obtain a copy of the License at
  6. //
  7. // http://www.apache.org/licenses/LICENSE-2.0
  8. //
  9. // Unless required by applicable law or agreed to in writing, software
  10. // distributed under the License is distributed on an "AS IS" BASIS,
  11. // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  12. // See the License for the specific language governing permissions and
  13. // limitations under the License.
  14. package integration
  15. import (
  16. "fmt"
  17. "reflect"
  18. "testing"
  19. "time"
  20. "github.com/coreos/etcd/etcdserver/api/v3rpc"
  21. "github.com/coreos/etcd/etcdserver/api/v3rpc/rpctypes"
  22. pb "github.com/coreos/etcd/etcdserver/etcdserverpb"
  23. "github.com/coreos/etcd/pkg/testutil"
  24. "golang.org/x/net/context"
  25. "google.golang.org/grpc"
  26. )
  27. // TestV3PutOverwrite puts a key with the v3 api to a random cluster member,
  28. // overwrites it, then checks that the change was applied.
  29. func TestV3PutOverwrite(t *testing.T) {
  30. defer testutil.AfterTest(t)
  31. clus := NewClusterV3(t, &ClusterConfig{Size: 3})
  32. defer clus.Terminate(t)
  33. kvc := toGRPC(clus.RandClient()).KV
  34. key := []byte("foo")
  35. reqput := &pb.PutRequest{Key: key, Value: []byte("bar")}
  36. respput, err := kvc.Put(context.TODO(), reqput)
  37. if err != nil {
  38. t.Fatalf("couldn't put key (%v)", err)
  39. }
  40. // overwrite
  41. reqput.Value = []byte("baz")
  42. respput2, err := kvc.Put(context.TODO(), reqput)
  43. if err != nil {
  44. t.Fatalf("couldn't put key (%v)", err)
  45. }
  46. if respput2.Header.Revision <= respput.Header.Revision {
  47. t.Fatalf("expected newer revision on overwrite, got %v <= %v",
  48. respput2.Header.Revision, respput.Header.Revision)
  49. }
  50. reqrange := &pb.RangeRequest{Key: key}
  51. resprange, err := kvc.Range(context.TODO(), reqrange)
  52. if err != nil {
  53. t.Fatalf("couldn't get key (%v)", err)
  54. }
  55. if len(resprange.Kvs) != 1 {
  56. t.Fatalf("expected 1 key, got %v", len(resprange.Kvs))
  57. }
  58. kv := resprange.Kvs[0]
  59. if kv.ModRevision <= kv.CreateRevision {
  60. t.Errorf("expected modRev > createRev, got %d <= %d",
  61. kv.ModRevision, kv.CreateRevision)
  62. }
  63. if !reflect.DeepEqual(reqput.Value, kv.Value) {
  64. t.Errorf("expected value %v, got %v", reqput.Value, kv.Value)
  65. }
  66. }
  67. // TestV3CompactCurrentRev ensures keys are present when compacting on current revision.
  68. func TestV3CompactCurrentRev(t *testing.T) {
  69. defer testutil.AfterTest(t)
  70. clus := NewClusterV3(t, &ClusterConfig{Size: 1})
  71. defer clus.Terminate(t)
  72. kvc := toGRPC(clus.RandClient()).KV
  73. preq := &pb.PutRequest{Key: []byte("foo"), Value: []byte("bar")}
  74. for i := 0; i < 3; i++ {
  75. if _, err := kvc.Put(context.Background(), preq); err != nil {
  76. t.Fatalf("couldn't put key (%v)", err)
  77. }
  78. }
  79. // compact on current revision
  80. _, err := kvc.Compact(context.Background(), &pb.CompactionRequest{Revision: 4})
  81. if err != nil {
  82. t.Fatalf("couldn't compact kv space (%v)", err)
  83. }
  84. // key still exists?
  85. _, err = kvc.Range(context.Background(), &pb.RangeRequest{Key: []byte("foo")})
  86. if err != nil {
  87. t.Fatalf("couldn't get key after compaction (%v)", err)
  88. }
  89. }
  90. func TestV3TxnTooManyOps(t *testing.T) {
  91. defer testutil.AfterTest(t)
  92. clus := NewClusterV3(t, &ClusterConfig{Size: 3})
  93. defer clus.Terminate(t)
  94. kvc := toGRPC(clus.RandClient()).KV
  95. // unique keys
  96. i := new(int)
  97. keyf := func() []byte {
  98. *i++
  99. return []byte(fmt.Sprintf("key-%d", i))
  100. }
  101. addCompareOps := func(txn *pb.TxnRequest) {
  102. txn.Compare = append(txn.Compare,
  103. &pb.Compare{
  104. Result: pb.Compare_GREATER,
  105. Target: pb.Compare_CREATE,
  106. Key: keyf(),
  107. })
  108. }
  109. addSuccessOps := func(txn *pb.TxnRequest) {
  110. txn.Success = append(txn.Success,
  111. &pb.RequestUnion{
  112. Request: &pb.RequestUnion_RequestPut{
  113. RequestPut: &pb.PutRequest{
  114. Key: keyf(),
  115. Value: []byte("bar"),
  116. },
  117. },
  118. })
  119. }
  120. addFailureOps := func(txn *pb.TxnRequest) {
  121. txn.Failure = append(txn.Failure,
  122. &pb.RequestUnion{
  123. Request: &pb.RequestUnion_RequestPut{
  124. RequestPut: &pb.PutRequest{
  125. Key: keyf(),
  126. Value: []byte("bar"),
  127. },
  128. },
  129. })
  130. }
  131. tests := []func(txn *pb.TxnRequest){
  132. addCompareOps,
  133. addSuccessOps,
  134. addFailureOps,
  135. }
  136. for i, tt := range tests {
  137. txn := &pb.TxnRequest{}
  138. for j := 0; j < v3rpc.MaxOpsPerTxn+1; j++ {
  139. tt(txn)
  140. }
  141. _, err := kvc.Txn(context.Background(), txn)
  142. if err != rpctypes.ErrTooManyOps {
  143. t.Errorf("#%d: err = %v, want %v", i, err, rpctypes.ErrTooManyOps)
  144. }
  145. }
  146. }
  147. func TestV3TxnDuplicateKeys(t *testing.T) {
  148. defer testutil.AfterTest(t)
  149. clus := NewClusterV3(t, &ClusterConfig{Size: 3})
  150. defer clus.Terminate(t)
  151. putreq := &pb.RequestUnion{Request: &pb.RequestUnion_RequestPut{RequestPut: &pb.PutRequest{Key: []byte("abc"), Value: []byte("def")}}}
  152. delKeyReq := &pb.RequestUnion{Request: &pb.RequestUnion_RequestDeleteRange{
  153. RequestDeleteRange: &pb.DeleteRangeRequest{
  154. Key: []byte("abc"),
  155. },
  156. },
  157. }
  158. delInRangeReq := &pb.RequestUnion{Request: &pb.RequestUnion_RequestDeleteRange{
  159. RequestDeleteRange: &pb.DeleteRangeRequest{
  160. Key: []byte("a"), RangeEnd: []byte("b"),
  161. },
  162. },
  163. }
  164. delOutOfRangeReq := &pb.RequestUnion{Request: &pb.RequestUnion_RequestDeleteRange{
  165. RequestDeleteRange: &pb.DeleteRangeRequest{
  166. Key: []byte("abb"), RangeEnd: []byte("abc"),
  167. },
  168. },
  169. }
  170. kvc := toGRPC(clus.RandClient()).KV
  171. tests := []struct {
  172. txnSuccess []*pb.RequestUnion
  173. werr error
  174. }{
  175. {
  176. txnSuccess: []*pb.RequestUnion{putreq, putreq},
  177. werr: rpctypes.ErrDuplicateKey,
  178. },
  179. {
  180. txnSuccess: []*pb.RequestUnion{putreq, delKeyReq},
  181. werr: rpctypes.ErrDuplicateKey,
  182. },
  183. {
  184. txnSuccess: []*pb.RequestUnion{putreq, delInRangeReq},
  185. werr: rpctypes.ErrDuplicateKey,
  186. },
  187. {
  188. txnSuccess: []*pb.RequestUnion{delKeyReq, delInRangeReq, delKeyReq, delInRangeReq},
  189. werr: nil,
  190. },
  191. {
  192. txnSuccess: []*pb.RequestUnion{putreq, delOutOfRangeReq},
  193. werr: nil,
  194. },
  195. }
  196. for i, tt := range tests {
  197. txn := &pb.TxnRequest{Success: tt.txnSuccess}
  198. _, err := kvc.Txn(context.Background(), txn)
  199. if err != tt.werr {
  200. t.Errorf("#%d: err = %v, want %v", i, err, tt.werr)
  201. }
  202. }
  203. }
  204. // Testv3TxnRevision tests that the transaction header revision is set as expected.
  205. func TestV3TxnRevision(t *testing.T) {
  206. defer testutil.AfterTest(t)
  207. clus := NewClusterV3(t, &ClusterConfig{Size: 1})
  208. defer clus.Terminate(t)
  209. kvc := toGRPC(clus.RandClient()).KV
  210. pr := &pb.PutRequest{Key: []byte("abc"), Value: []byte("def")}
  211. presp, err := kvc.Put(context.TODO(), pr)
  212. if err != nil {
  213. t.Fatal(err)
  214. }
  215. txnget := &pb.RequestUnion{Request: &pb.RequestUnion_RequestRange{RequestRange: &pb.RangeRequest{Key: []byte("abc")}}}
  216. txn := &pb.TxnRequest{Success: []*pb.RequestUnion{txnget}}
  217. tresp, err := kvc.Txn(context.TODO(), txn)
  218. if err != nil {
  219. t.Fatal(err)
  220. }
  221. // did not update revision
  222. if presp.Header.Revision != tresp.Header.Revision {
  223. t.Fatalf("got rev %d, wanted rev %d", tresp.Header.Revision, presp.Header.Revision)
  224. }
  225. txnput := &pb.RequestUnion{Request: &pb.RequestUnion_RequestPut{RequestPut: &pb.PutRequest{Key: []byte("abc"), Value: []byte("123")}}}
  226. txn = &pb.TxnRequest{Success: []*pb.RequestUnion{txnput}}
  227. tresp, err = kvc.Txn(context.TODO(), txn)
  228. if err != nil {
  229. t.Fatal(err)
  230. }
  231. // updated revision
  232. if tresp.Header.Revision != presp.Header.Revision+1 {
  233. t.Fatalf("got rev %d, wanted rev %d", tresp.Header.Revision, presp.Header.Revision+1)
  234. }
  235. }
  236. // TestV3PutMissingLease ensures that a Put on a key with a bogus lease fails.
  237. func TestV3PutMissingLease(t *testing.T) {
  238. defer testutil.AfterTest(t)
  239. clus := NewClusterV3(t, &ClusterConfig{Size: 3})
  240. defer clus.Terminate(t)
  241. kvc := toGRPC(clus.RandClient()).KV
  242. key := []byte("foo")
  243. preq := &pb.PutRequest{Key: key, Lease: 123456}
  244. tests := []func(){
  245. // put case
  246. func() {
  247. if presp, err := kvc.Put(context.TODO(), preq); err == nil {
  248. t.Errorf("succeeded put key. req: %v. resp: %v", preq, presp)
  249. }
  250. },
  251. // txn success case
  252. func() {
  253. txn := &pb.TxnRequest{}
  254. txn.Success = append(txn.Success, &pb.RequestUnion{
  255. Request: &pb.RequestUnion_RequestPut{
  256. RequestPut: preq}})
  257. if tresp, err := kvc.Txn(context.TODO(), txn); err == nil {
  258. t.Errorf("succeeded txn success. req: %v. resp: %v", txn, tresp)
  259. }
  260. },
  261. // txn failure case
  262. func() {
  263. txn := &pb.TxnRequest{}
  264. txn.Failure = append(txn.Failure, &pb.RequestUnion{
  265. Request: &pb.RequestUnion_RequestPut{
  266. RequestPut: preq}})
  267. cmp := &pb.Compare{
  268. Result: pb.Compare_GREATER,
  269. Target: pb.Compare_CREATE,
  270. Key: []byte("bar"),
  271. }
  272. txn.Compare = append(txn.Compare, cmp)
  273. if tresp, err := kvc.Txn(context.TODO(), txn); err == nil {
  274. t.Errorf("succeeded txn failure. req: %v. resp: %v", txn, tresp)
  275. }
  276. },
  277. // ignore bad lease in failure on success txn
  278. func() {
  279. txn := &pb.TxnRequest{}
  280. rreq := &pb.RangeRequest{Key: []byte("bar")}
  281. txn.Success = append(txn.Success, &pb.RequestUnion{
  282. Request: &pb.RequestUnion_RequestRange{
  283. RequestRange: rreq}})
  284. txn.Failure = append(txn.Failure, &pb.RequestUnion{
  285. Request: &pb.RequestUnion_RequestPut{
  286. RequestPut: preq}})
  287. if tresp, err := kvc.Txn(context.TODO(), txn); err != nil {
  288. t.Errorf("failed good txn. req: %v. resp: %v", txn, tresp)
  289. }
  290. },
  291. }
  292. for i, f := range tests {
  293. f()
  294. // key shouldn't have been stored
  295. rreq := &pb.RangeRequest{Key: key}
  296. rresp, err := kvc.Range(context.TODO(), rreq)
  297. if err != nil {
  298. t.Errorf("#%d. could not rangereq (%v)", i, err)
  299. } else if len(rresp.Kvs) != 0 {
  300. t.Errorf("#%d. expected no keys, got %v", i, rresp)
  301. }
  302. }
  303. }
  304. // TestV3DeleteRange tests various edge cases in the DeleteRange API.
  305. func TestV3DeleteRange(t *testing.T) {
  306. defer testutil.AfterTest(t)
  307. tests := []struct {
  308. keySet []string
  309. begin string
  310. end string
  311. wantSet [][]byte
  312. deleted int64
  313. }{
  314. // delete middle
  315. {
  316. []string{"foo", "foo/abc", "fop"},
  317. "foo/", "fop",
  318. [][]byte{[]byte("foo"), []byte("fop")}, 1,
  319. },
  320. // no delete
  321. {
  322. []string{"foo", "foo/abc", "fop"},
  323. "foo/", "foo/",
  324. [][]byte{[]byte("foo"), []byte("foo/abc"), []byte("fop")}, 0,
  325. },
  326. // delete first
  327. {
  328. []string{"foo", "foo/abc", "fop"},
  329. "fo", "fop",
  330. [][]byte{[]byte("fop")}, 2,
  331. },
  332. // delete tail
  333. {
  334. []string{"foo", "foo/abc", "fop"},
  335. "foo/", "fos",
  336. [][]byte{[]byte("foo")}, 2,
  337. },
  338. // delete exact
  339. {
  340. []string{"foo", "foo/abc", "fop"},
  341. "foo/abc", "",
  342. [][]byte{[]byte("foo"), []byte("fop")}, 1,
  343. },
  344. // delete none, [x,x)
  345. {
  346. []string{"foo"},
  347. "foo", "foo",
  348. [][]byte{[]byte("foo")}, 0,
  349. },
  350. }
  351. for i, tt := range tests {
  352. clus := NewClusterV3(t, &ClusterConfig{Size: 3})
  353. kvc := toGRPC(clus.RandClient()).KV
  354. ks := tt.keySet
  355. for j := range ks {
  356. reqput := &pb.PutRequest{Key: []byte(ks[j]), Value: []byte{}}
  357. _, err := kvc.Put(context.TODO(), reqput)
  358. if err != nil {
  359. t.Fatalf("couldn't put key (%v)", err)
  360. }
  361. }
  362. dreq := &pb.DeleteRangeRequest{
  363. Key: []byte(tt.begin),
  364. RangeEnd: []byte(tt.end)}
  365. dresp, err := kvc.DeleteRange(context.TODO(), dreq)
  366. if err != nil {
  367. t.Fatalf("couldn't delete range on test %d (%v)", i, err)
  368. }
  369. if tt.deleted != dresp.Deleted {
  370. t.Errorf("expected %d on test %v, got %d", tt.deleted, i, dresp.Deleted)
  371. }
  372. rreq := &pb.RangeRequest{Key: []byte{0x0}, RangeEnd: []byte{0xff}}
  373. rresp, err := kvc.Range(context.TODO(), rreq)
  374. if err != nil {
  375. t.Errorf("couldn't get range on test %v (%v)", i, err)
  376. }
  377. if dresp.Header.Revision != rresp.Header.Revision {
  378. t.Errorf("expected revision %v, got %v",
  379. dresp.Header.Revision, rresp.Header.Revision)
  380. }
  381. keys := [][]byte{}
  382. for j := range rresp.Kvs {
  383. keys = append(keys, rresp.Kvs[j].Key)
  384. }
  385. if !reflect.DeepEqual(tt.wantSet, keys) {
  386. t.Errorf("expected %v on test %v, got %v", tt.wantSet, i, keys)
  387. }
  388. // can't defer because tcp ports will be in use
  389. clus.Terminate(t)
  390. }
  391. }
  392. // TestV3TxnInvaildRange tests txn
  393. func TestV3TxnInvaildRange(t *testing.T) {
  394. defer testutil.AfterTest(t)
  395. clus := NewClusterV3(t, &ClusterConfig{Size: 3})
  396. defer clus.Terminate(t)
  397. kvc := toGRPC(clus.RandClient()).KV
  398. preq := &pb.PutRequest{Key: []byte("foo"), Value: []byte("bar")}
  399. for i := 0; i < 3; i++ {
  400. _, err := kvc.Put(context.Background(), preq)
  401. if err != nil {
  402. t.Fatalf("couldn't put key (%v)", err)
  403. }
  404. }
  405. _, err := kvc.Compact(context.Background(), &pb.CompactionRequest{Revision: 2})
  406. if err != nil {
  407. t.Fatalf("couldn't compact kv space (%v)", err)
  408. }
  409. // future rev
  410. txn := &pb.TxnRequest{}
  411. txn.Success = append(txn.Success, &pb.RequestUnion{
  412. Request: &pb.RequestUnion_RequestPut{
  413. RequestPut: preq}})
  414. rreq := &pb.RangeRequest{Key: []byte("foo"), Revision: 100}
  415. txn.Success = append(txn.Success, &pb.RequestUnion{
  416. Request: &pb.RequestUnion_RequestRange{
  417. RequestRange: rreq}})
  418. if _, err := kvc.Txn(context.TODO(), txn); err != rpctypes.ErrFutureRev {
  419. t.Errorf("err = %v, want %v", err, rpctypes.ErrFutureRev)
  420. }
  421. // compacted rev
  422. tv, _ := txn.Success[1].Request.(*pb.RequestUnion_RequestRange)
  423. tv.RequestRange.Revision = 1
  424. if _, err := kvc.Txn(context.TODO(), txn); err != rpctypes.ErrCompacted {
  425. t.Errorf("err = %v, want %v", err, rpctypes.ErrCompacted)
  426. }
  427. }
  428. func TestV3TooLargeRequest(t *testing.T) {
  429. defer testutil.AfterTest(t)
  430. clus := NewClusterV3(t, &ClusterConfig{Size: 3})
  431. defer clus.Terminate(t)
  432. kvc := toGRPC(clus.RandClient()).KV
  433. // 2MB request value
  434. largeV := make([]byte, 2*1024*1024)
  435. preq := &pb.PutRequest{Key: []byte("foo"), Value: largeV}
  436. _, err := kvc.Put(context.Background(), preq)
  437. if err != rpctypes.ErrRequestTooLarge {
  438. t.Errorf("err = %v, want %v", err, rpctypes.ErrRequestTooLarge)
  439. }
  440. }
  441. // TestV3Hash tests hash.
  442. func TestV3Hash(t *testing.T) {
  443. defer testutil.AfterTest(t)
  444. clus := NewClusterV3(t, &ClusterConfig{Size: 3})
  445. defer clus.Terminate(t)
  446. cli := clus.RandClient()
  447. kvc := toGRPC(cli).KV
  448. m := toGRPC(cli).Maintenance
  449. preq := &pb.PutRequest{Key: []byte("foo"), Value: []byte("bar")}
  450. for i := 0; i < 3; i++ {
  451. _, err := kvc.Put(context.Background(), preq)
  452. if err != nil {
  453. t.Fatalf("couldn't put key (%v)", err)
  454. }
  455. }
  456. resp, err := m.Hash(context.Background(), &pb.HashRequest{})
  457. if err != nil || resp.Hash == 0 {
  458. t.Fatalf("couldn't hash (%v, hash %d)", err, resp.Hash)
  459. }
  460. }
  461. // TestV3StorageQuotaAPI tests the V3 server respects quotas at the API layer
  462. func TestV3StorageQuotaAPI(t *testing.T) {
  463. defer testutil.AfterTest(t)
  464. clus := NewClusterV3(t, &ClusterConfig{Size: 3})
  465. clus.Members[0].QuotaBackendBytes = 64 * 1024
  466. clus.Members[0].Stop(t)
  467. clus.Members[0].Restart(t)
  468. defer clus.Terminate(t)
  469. kvc := toGRPC(clus.Client(0)).KV
  470. key := []byte("abc")
  471. // test small put that fits in quota
  472. smallbuf := make([]byte, 512)
  473. if _, err := kvc.Put(context.TODO(), &pb.PutRequest{Key: key, Value: smallbuf}); err != nil {
  474. t.Fatal(err)
  475. }
  476. // test big put
  477. bigbuf := make([]byte, 64*1024)
  478. _, err := kvc.Put(context.TODO(), &pb.PutRequest{Key: key, Value: bigbuf})
  479. if err == nil || err != rpctypes.ErrNoSpace {
  480. t.Fatalf("big put got %v, expected %v", err, rpctypes.ErrNoSpace)
  481. }
  482. // test big txn
  483. puttxn := &pb.RequestUnion{
  484. Request: &pb.RequestUnion_RequestPut{
  485. RequestPut: &pb.PutRequest{
  486. Key: key,
  487. Value: bigbuf,
  488. },
  489. },
  490. }
  491. txnreq := &pb.TxnRequest{}
  492. txnreq.Success = append(txnreq.Success, puttxn)
  493. _, txnerr := kvc.Txn(context.TODO(), txnreq)
  494. if txnerr == nil || err != rpctypes.ErrNoSpace {
  495. t.Fatalf("big txn got %v, expected %v", err, rpctypes.ErrNoSpace)
  496. }
  497. }
  498. // TestV3StorageQuotaApply tests the V3 server respects quotas during apply
  499. func TestV3StorageQuotaApply(t *testing.T) {
  500. testutil.AfterTest(t)
  501. clus := NewClusterV3(t, &ClusterConfig{Size: 2})
  502. defer clus.Terminate(t)
  503. kvc0 := toGRPC(clus.Client(0)).KV
  504. kvc1 := toGRPC(clus.Client(1)).KV
  505. // force a node to have a different quota
  506. clus.Members[0].QuotaBackendBytes = 64 * 1024
  507. clus.Members[0].Stop(t)
  508. clus.Members[0].Restart(t)
  509. clus.waitLeader(t, clus.Members)
  510. key := []byte("abc")
  511. // test small put still works
  512. smallbuf := make([]byte, 1024)
  513. _, serr := kvc0.Put(context.TODO(), &pb.PutRequest{Key: key, Value: smallbuf})
  514. if serr != nil {
  515. t.Fatal(serr)
  516. }
  517. // test big put
  518. bigbuf := make([]byte, 64*1024)
  519. _, err := kvc1.Put(context.TODO(), &pb.PutRequest{Key: key, Value: bigbuf})
  520. if err != nil {
  521. t.Fatal(err)
  522. }
  523. // quorum get should work regardless of whether alarm is raised
  524. _, err = kvc0.Range(context.TODO(), &pb.RangeRequest{Key: []byte("foo")})
  525. if err != nil {
  526. t.Fatal(err)
  527. }
  528. // wait until alarm is raised for sure-- poll the alarms
  529. stopc := time.After(5 * time.Second)
  530. for {
  531. req := &pb.AlarmRequest{Action: pb.AlarmRequest_GET}
  532. resp, aerr := clus.Members[0].s.Alarm(context.TODO(), req)
  533. if aerr != nil {
  534. t.Fatal(aerr)
  535. }
  536. if len(resp.Alarms) != 0 {
  537. break
  538. }
  539. select {
  540. case <-stopc:
  541. t.Fatalf("timed out waiting for alarm")
  542. case <-time.After(10 * time.Millisecond):
  543. }
  544. }
  545. // small quota machine should reject put
  546. if _, err := kvc0.Put(context.TODO(), &pb.PutRequest{Key: key, Value: smallbuf}); err == nil {
  547. t.Fatalf("past-quota instance should reject put")
  548. }
  549. // large quota machine should reject put
  550. if _, err := kvc1.Put(context.TODO(), &pb.PutRequest{Key: key, Value: smallbuf}); err == nil {
  551. t.Fatalf("past-quota instance should reject put")
  552. }
  553. // reset large quota node to ensure alarm persisted
  554. clus.Members[1].Stop(t)
  555. clus.Members[1].Restart(t)
  556. clus.waitLeader(t, clus.Members)
  557. if _, err := kvc1.Put(context.TODO(), &pb.PutRequest{Key: key, Value: smallbuf}); err == nil {
  558. t.Fatalf("alarmed instance should reject put after reset")
  559. }
  560. }
  561. // TestV3AlarmDeactivate ensures that space alarms can be deactivated so puts go through.
  562. func TestV3AlarmDeactivate(t *testing.T) {
  563. clus := NewClusterV3(t, &ClusterConfig{Size: 3})
  564. defer clus.Terminate(t)
  565. kvc := toGRPC(clus.RandClient()).KV
  566. mt := toGRPC(clus.RandClient()).Maintenance
  567. alarmReq := &pb.AlarmRequest{
  568. MemberID: 123,
  569. Action: pb.AlarmRequest_ACTIVATE,
  570. Alarm: pb.AlarmType_NOSPACE,
  571. }
  572. if _, err := mt.Alarm(context.TODO(), alarmReq); err != nil {
  573. t.Fatal(err)
  574. }
  575. key := []byte("abc")
  576. smallbuf := make([]byte, 512)
  577. _, err := kvc.Put(context.TODO(), &pb.PutRequest{Key: key, Value: smallbuf})
  578. if err == nil && err != rpctypes.ErrNoSpace {
  579. t.Fatalf("put got %v, expected %v", err, rpctypes.ErrNoSpace)
  580. }
  581. alarmReq.Action = pb.AlarmRequest_DEACTIVATE
  582. if _, err = mt.Alarm(context.TODO(), alarmReq); err != nil {
  583. t.Fatal(err)
  584. }
  585. if _, err = kvc.Put(context.TODO(), &pb.PutRequest{Key: key, Value: smallbuf}); err != nil {
  586. t.Fatal(err)
  587. }
  588. }
  589. func TestV3RangeRequest(t *testing.T) {
  590. defer testutil.AfterTest(t)
  591. tests := []struct {
  592. putKeys []string
  593. reqs []pb.RangeRequest
  594. wresps [][]string
  595. wmores []bool
  596. }{
  597. // single key
  598. {
  599. []string{"foo", "bar"},
  600. []pb.RangeRequest{
  601. // exists
  602. {Key: []byte("foo")},
  603. // doesn't exist
  604. {Key: []byte("baz")},
  605. },
  606. [][]string{
  607. {"foo"},
  608. {},
  609. },
  610. []bool{false, false},
  611. },
  612. // multi-key
  613. {
  614. []string{"a", "b", "c", "d", "e"},
  615. []pb.RangeRequest{
  616. // all in range
  617. {Key: []byte("a"), RangeEnd: []byte("z")},
  618. // [b, d)
  619. {Key: []byte("b"), RangeEnd: []byte("d")},
  620. // out of range
  621. {Key: []byte("f"), RangeEnd: []byte("z")},
  622. // [c,c) = empty
  623. {Key: []byte("c"), RangeEnd: []byte("c")},
  624. // [d, b) = empty
  625. {Key: []byte("d"), RangeEnd: []byte("b")},
  626. // ["\0", "\0") => all in range
  627. {Key: []byte{0}, RangeEnd: []byte{0}},
  628. },
  629. [][]string{
  630. {"a", "b", "c", "d", "e"},
  631. {"b", "c"},
  632. {},
  633. {},
  634. {},
  635. {"a", "b", "c", "d", "e"},
  636. },
  637. []bool{false, false, false, false, false, false},
  638. },
  639. // revision
  640. {
  641. []string{"a", "b", "c", "d", "e"},
  642. []pb.RangeRequest{
  643. {Key: []byte("a"), RangeEnd: []byte("z"), Revision: 0},
  644. {Key: []byte("a"), RangeEnd: []byte("z"), Revision: 1},
  645. {Key: []byte("a"), RangeEnd: []byte("z"), Revision: 2},
  646. {Key: []byte("a"), RangeEnd: []byte("z"), Revision: 3},
  647. },
  648. [][]string{
  649. {"a", "b", "c", "d", "e"},
  650. {},
  651. {"a"},
  652. {"a", "b"},
  653. },
  654. []bool{false, false, false, false},
  655. },
  656. // limit
  657. {
  658. []string{"foo", "bar"},
  659. []pb.RangeRequest{
  660. // more
  661. {Key: []byte("a"), RangeEnd: []byte("z"), Limit: 1},
  662. // no more
  663. {Key: []byte("a"), RangeEnd: []byte("z"), Limit: 2},
  664. },
  665. [][]string{
  666. {"bar"},
  667. {"bar", "foo"},
  668. },
  669. []bool{true, false},
  670. },
  671. // sort
  672. {
  673. []string{"b", "a", "c", "d", "c"},
  674. []pb.RangeRequest{
  675. {
  676. Key: []byte("a"), RangeEnd: []byte("z"),
  677. Limit: 1,
  678. SortOrder: pb.RangeRequest_ASCEND,
  679. SortTarget: pb.RangeRequest_KEY,
  680. },
  681. {
  682. Key: []byte("a"), RangeEnd: []byte("z"),
  683. Limit: 1,
  684. SortOrder: pb.RangeRequest_DESCEND,
  685. SortTarget: pb.RangeRequest_KEY,
  686. },
  687. {
  688. Key: []byte("a"), RangeEnd: []byte("z"),
  689. Limit: 1,
  690. SortOrder: pb.RangeRequest_ASCEND,
  691. SortTarget: pb.RangeRequest_CREATE,
  692. },
  693. {
  694. Key: []byte("a"), RangeEnd: []byte("z"),
  695. Limit: 1,
  696. SortOrder: pb.RangeRequest_DESCEND,
  697. SortTarget: pb.RangeRequest_MOD,
  698. },
  699. {
  700. Key: []byte("z"), RangeEnd: []byte("z"),
  701. Limit: 1,
  702. SortOrder: pb.RangeRequest_DESCEND,
  703. SortTarget: pb.RangeRequest_CREATE,
  704. },
  705. },
  706. [][]string{
  707. {"a"},
  708. {"d"},
  709. {"b"},
  710. {"c"},
  711. {},
  712. },
  713. []bool{true, true, true, true, false},
  714. },
  715. }
  716. for i, tt := range tests {
  717. clus := NewClusterV3(t, &ClusterConfig{Size: 3})
  718. for _, k := range tt.putKeys {
  719. kvc := toGRPC(clus.RandClient()).KV
  720. req := &pb.PutRequest{Key: []byte(k), Value: []byte("bar")}
  721. if _, err := kvc.Put(context.TODO(), req); err != nil {
  722. t.Fatalf("#%d: couldn't put key (%v)", i, err)
  723. }
  724. }
  725. for j, req := range tt.reqs {
  726. kvc := toGRPC(clus.RandClient()).KV
  727. resp, err := kvc.Range(context.TODO(), &req)
  728. if err != nil {
  729. t.Errorf("#%d.%d: Range error: %v", i, j, err)
  730. continue
  731. }
  732. if len(resp.Kvs) != len(tt.wresps[j]) {
  733. t.Errorf("#%d.%d: bad len(resp.Kvs). got = %d, want = %d, ", i, j, len(resp.Kvs), len(tt.wresps[j]))
  734. continue
  735. }
  736. for k, wKey := range tt.wresps[j] {
  737. respKey := string(resp.Kvs[k].Key)
  738. if respKey != wKey {
  739. t.Errorf("#%d.%d: key[%d]. got = %v, want = %v, ", i, j, k, respKey, wKey)
  740. }
  741. }
  742. if resp.More != tt.wmores[j] {
  743. t.Errorf("#%d.%d: bad more. got = %v, want = %v, ", i, j, resp.More, tt.wmores[j])
  744. }
  745. wrev := int64(len(tt.putKeys) + 1)
  746. if resp.Header.Revision != wrev {
  747. t.Errorf("#%d.%d: bad header revision. got = %d. want = %d", i, j, resp.Header.Revision, wrev)
  748. }
  749. }
  750. clus.Terminate(t)
  751. }
  752. }
  753. func newClusterV3NoClients(t *testing.T, cfg *ClusterConfig) *ClusterV3 {
  754. cfg.UseGRPC = true
  755. clus := &ClusterV3{cluster: NewClusterByConfig(t, cfg)}
  756. clus.Launch(t)
  757. return clus
  758. }
  759. // TestTLSGRPCRejectInsecureClient checks that connection is rejected if server is TLS but not client.
  760. func TestTLSGRPCRejectInsecureClient(t *testing.T) {
  761. defer testutil.AfterTest(t)
  762. cfg := ClusterConfig{Size: 3, ClientTLS: &testTLSInfo}
  763. clus := newClusterV3NoClients(t, &cfg)
  764. defer clus.Terminate(t)
  765. // nil out TLS field so client will use an insecure connection
  766. clus.Members[0].ClientTLSInfo = nil
  767. client, err := NewClientV3(clus.Members[0])
  768. if err != nil && err != grpc.ErrClientConnTimeout {
  769. t.Fatalf("unexpected error (%v)", err)
  770. } else if client == nil {
  771. // Ideally, no client would be returned. However, grpc will
  772. // return a connection without trying to handshake first so
  773. // the connection appears OK.
  774. return
  775. }
  776. defer client.Close()
  777. ctx, cancel := context.WithTimeout(context.TODO(), 5*time.Second)
  778. conn := client.ActiveConnection()
  779. st, err := conn.State()
  780. if err != nil {
  781. t.Fatal(err)
  782. } else if st != grpc.Ready {
  783. t.Fatalf("expected Ready, got %v", st)
  784. }
  785. // rpc will fail to handshake, triggering a connection state change
  786. donec := make(chan error, 1)
  787. go func() {
  788. reqput := &pb.PutRequest{Key: []byte("foo"), Value: []byte("bar")}
  789. _, perr := toGRPC(client).KV.Put(ctx, reqput)
  790. donec <- perr
  791. }()
  792. st, err = conn.WaitForStateChange(ctx, st)
  793. if err != nil {
  794. t.Fatalf("unexpected error waiting for change (%v)", err)
  795. } else if st == grpc.Ready {
  796. t.Fatalf("expected failure state, got %v", st)
  797. }
  798. cancel()
  799. if perr := <-donec; perr == nil {
  800. t.Fatalf("expected client error on put")
  801. }
  802. }
  803. // TestTLSGRPCRejectSecureClient checks that connection is rejected if client is TLS but not server.
  804. func TestTLSGRPCRejectSecureClient(t *testing.T) {
  805. defer testutil.AfterTest(t)
  806. cfg := ClusterConfig{Size: 3}
  807. clus := newClusterV3NoClients(t, &cfg)
  808. defer clus.Terminate(t)
  809. clus.Members[0].ClientTLSInfo = &testTLSInfo
  810. client, err := NewClientV3(clus.Members[0])
  811. if client != nil || err == nil {
  812. t.Fatalf("expected no client")
  813. } else if err != grpc.ErrClientConnTimeout {
  814. t.Fatalf("unexpected error (%v)", err)
  815. }
  816. }
  817. // TestTLSGRPCAcceptSecureAll checks that connection is accepted if both client and server are TLS
  818. func TestTLSGRPCAcceptSecureAll(t *testing.T) {
  819. defer testutil.AfterTest(t)
  820. cfg := ClusterConfig{Size: 3, ClientTLS: &testTLSInfo}
  821. clus := newClusterV3NoClients(t, &cfg)
  822. defer clus.Terminate(t)
  823. client, err := NewClientV3(clus.Members[0])
  824. if err != nil {
  825. t.Fatalf("expected tls client (%v)", err)
  826. }
  827. defer client.Close()
  828. reqput := &pb.PutRequest{Key: []byte("foo"), Value: []byte("bar")}
  829. if _, err := toGRPC(client).KV.Put(context.TODO(), reqput); err != nil {
  830. t.Fatalf("unexpected error on put over tls (%v)", err)
  831. }
  832. }