apply.go 29 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019
  1. // Copyright 2016 The etcd Authors
  2. //
  3. // Licensed under the Apache License, Version 2.0 (the "License");
  4. // you may not use this file except in compliance with the License.
  5. // You may obtain a copy of the License at
  6. //
  7. // http://www.apache.org/licenses/LICENSE-2.0
  8. //
  9. // Unless required by applicable law or agreed to in writing, software
  10. // distributed under the License is distributed on an "AS IS" BASIS,
  11. // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  12. // See the License for the specific language governing permissions and
  13. // limitations under the License.
  14. package etcdserver
  15. import (
  16. "bytes"
  17. "context"
  18. "fmt"
  19. "sort"
  20. "time"
  21. "go.etcd.io/etcd/auth"
  22. pb "go.etcd.io/etcd/etcdserver/etcdserverpb"
  23. "go.etcd.io/etcd/lease"
  24. "go.etcd.io/etcd/mvcc"
  25. "go.etcd.io/etcd/mvcc/mvccpb"
  26. "go.etcd.io/etcd/pkg/types"
  27. "github.com/gogo/protobuf/proto"
  28. "go.uber.org/zap"
  29. )
  30. const (
  31. warnApplyDuration = 100 * time.Millisecond
  32. )
  33. type applyResult struct {
  34. resp proto.Message
  35. err error
  36. // physc signals the physical effect of the request has completed in addition
  37. // to being logically reflected by the node. Currently only used for
  38. // Compaction requests.
  39. physc <-chan struct{}
  40. }
  41. // applierV3 is the interface for processing V3 raft messages
  42. type applierV3 interface {
  43. Apply(r *pb.InternalRaftRequest) *applyResult
  44. Put(txn mvcc.TxnWrite, p *pb.PutRequest) (*pb.PutResponse, error)
  45. Range(txn mvcc.TxnRead, r *pb.RangeRequest) (*pb.RangeResponse, error)
  46. DeleteRange(txn mvcc.TxnWrite, dr *pb.DeleteRangeRequest) (*pb.DeleteRangeResponse, error)
  47. Txn(rt *pb.TxnRequest) (*pb.TxnResponse, error)
  48. Compaction(compaction *pb.CompactionRequest) (*pb.CompactionResponse, <-chan struct{}, error)
  49. LeaseGrant(lc *pb.LeaseGrantRequest) (*pb.LeaseGrantResponse, error)
  50. LeaseRevoke(lc *pb.LeaseRevokeRequest) (*pb.LeaseRevokeResponse, error)
  51. LeaseCheckpoint(lc *pb.LeaseCheckpointRequest) (*pb.LeaseCheckpointResponse, error)
  52. Alarm(*pb.AlarmRequest) (*pb.AlarmResponse, error)
  53. Authenticate(r *pb.InternalAuthenticateRequest) (*pb.AuthenticateResponse, error)
  54. AuthEnable() (*pb.AuthEnableResponse, error)
  55. AuthDisable() (*pb.AuthDisableResponse, error)
  56. UserAdd(ua *pb.AuthUserAddRequest) (*pb.AuthUserAddResponse, error)
  57. UserDelete(ua *pb.AuthUserDeleteRequest) (*pb.AuthUserDeleteResponse, error)
  58. UserChangePassword(ua *pb.AuthUserChangePasswordRequest) (*pb.AuthUserChangePasswordResponse, error)
  59. UserGrantRole(ua *pb.AuthUserGrantRoleRequest) (*pb.AuthUserGrantRoleResponse, error)
  60. UserGet(ua *pb.AuthUserGetRequest) (*pb.AuthUserGetResponse, error)
  61. UserRevokeRole(ua *pb.AuthUserRevokeRoleRequest) (*pb.AuthUserRevokeRoleResponse, error)
  62. RoleAdd(ua *pb.AuthRoleAddRequest) (*pb.AuthRoleAddResponse, error)
  63. RoleGrantPermission(ua *pb.AuthRoleGrantPermissionRequest) (*pb.AuthRoleGrantPermissionResponse, error)
  64. RoleGet(ua *pb.AuthRoleGetRequest) (*pb.AuthRoleGetResponse, error)
  65. RoleRevokePermission(ua *pb.AuthRoleRevokePermissionRequest) (*pb.AuthRoleRevokePermissionResponse, error)
  66. RoleDelete(ua *pb.AuthRoleDeleteRequest) (*pb.AuthRoleDeleteResponse, error)
  67. UserList(ua *pb.AuthUserListRequest) (*pb.AuthUserListResponse, error)
  68. RoleList(ua *pb.AuthRoleListRequest) (*pb.AuthRoleListResponse, error)
  69. }
  70. type checkReqFunc func(mvcc.ReadView, *pb.RequestOp) error
  71. type applierV3backend struct {
  72. s *EtcdServer
  73. checkPut checkReqFunc
  74. checkRange checkReqFunc
  75. }
  76. func (s *EtcdServer) newApplierV3Backend() applierV3 {
  77. base := &applierV3backend{s: s}
  78. base.checkPut = func(rv mvcc.ReadView, req *pb.RequestOp) error {
  79. return base.checkRequestPut(rv, req)
  80. }
  81. base.checkRange = func(rv mvcc.ReadView, req *pb.RequestOp) error {
  82. return base.checkRequestRange(rv, req)
  83. }
  84. return base
  85. }
  86. func (s *EtcdServer) newApplierV3() applierV3 {
  87. return newAuthApplierV3(
  88. s.AuthStore(),
  89. newQuotaApplierV3(s, s.newApplierV3Backend()),
  90. s.lessor,
  91. )
  92. }
  93. func (a *applierV3backend) Apply(r *pb.InternalRaftRequest) *applyResult {
  94. ar := &applyResult{}
  95. defer func(start time.Time) {
  96. warnOfExpensiveRequest(a.s.getLogger(), start, &pb.InternalRaftStringer{Request: r}, ar.resp, ar.err)
  97. }(time.Now())
  98. // call into a.s.applyV3.F instead of a.F so upper appliers can check individual calls
  99. switch {
  100. case r.Range != nil:
  101. ar.resp, ar.err = a.s.applyV3.Range(nil, r.Range)
  102. case r.Put != nil:
  103. ar.resp, ar.err = a.s.applyV3.Put(nil, r.Put)
  104. case r.DeleteRange != nil:
  105. ar.resp, ar.err = a.s.applyV3.DeleteRange(nil, r.DeleteRange)
  106. case r.Txn != nil:
  107. ar.resp, ar.err = a.s.applyV3.Txn(r.Txn)
  108. case r.Compaction != nil:
  109. ar.resp, ar.physc, ar.err = a.s.applyV3.Compaction(r.Compaction)
  110. case r.LeaseGrant != nil:
  111. ar.resp, ar.err = a.s.applyV3.LeaseGrant(r.LeaseGrant)
  112. case r.LeaseRevoke != nil:
  113. ar.resp, ar.err = a.s.applyV3.LeaseRevoke(r.LeaseRevoke)
  114. case r.LeaseCheckpoint != nil:
  115. ar.resp, ar.err = a.s.applyV3.LeaseCheckpoint(r.LeaseCheckpoint)
  116. case r.Alarm != nil:
  117. ar.resp, ar.err = a.s.applyV3.Alarm(r.Alarm)
  118. case r.Authenticate != nil:
  119. ar.resp, ar.err = a.s.applyV3.Authenticate(r.Authenticate)
  120. case r.AuthEnable != nil:
  121. ar.resp, ar.err = a.s.applyV3.AuthEnable()
  122. case r.AuthDisable != nil:
  123. ar.resp, ar.err = a.s.applyV3.AuthDisable()
  124. case r.AuthUserAdd != nil:
  125. ar.resp, ar.err = a.s.applyV3.UserAdd(r.AuthUserAdd)
  126. case r.AuthUserDelete != nil:
  127. ar.resp, ar.err = a.s.applyV3.UserDelete(r.AuthUserDelete)
  128. case r.AuthUserChangePassword != nil:
  129. ar.resp, ar.err = a.s.applyV3.UserChangePassword(r.AuthUserChangePassword)
  130. case r.AuthUserGrantRole != nil:
  131. ar.resp, ar.err = a.s.applyV3.UserGrantRole(r.AuthUserGrantRole)
  132. case r.AuthUserGet != nil:
  133. ar.resp, ar.err = a.s.applyV3.UserGet(r.AuthUserGet)
  134. case r.AuthUserRevokeRole != nil:
  135. ar.resp, ar.err = a.s.applyV3.UserRevokeRole(r.AuthUserRevokeRole)
  136. case r.AuthRoleAdd != nil:
  137. ar.resp, ar.err = a.s.applyV3.RoleAdd(r.AuthRoleAdd)
  138. case r.AuthRoleGrantPermission != nil:
  139. ar.resp, ar.err = a.s.applyV3.RoleGrantPermission(r.AuthRoleGrantPermission)
  140. case r.AuthRoleGet != nil:
  141. ar.resp, ar.err = a.s.applyV3.RoleGet(r.AuthRoleGet)
  142. case r.AuthRoleRevokePermission != nil:
  143. ar.resp, ar.err = a.s.applyV3.RoleRevokePermission(r.AuthRoleRevokePermission)
  144. case r.AuthRoleDelete != nil:
  145. ar.resp, ar.err = a.s.applyV3.RoleDelete(r.AuthRoleDelete)
  146. case r.AuthUserList != nil:
  147. ar.resp, ar.err = a.s.applyV3.UserList(r.AuthUserList)
  148. case r.AuthRoleList != nil:
  149. ar.resp, ar.err = a.s.applyV3.RoleList(r.AuthRoleList)
  150. default:
  151. panic("not implemented")
  152. }
  153. return ar
  154. }
  155. func (a *applierV3backend) Put(txn mvcc.TxnWrite, p *pb.PutRequest) (resp *pb.PutResponse, err error) {
  156. resp = &pb.PutResponse{}
  157. resp.Header = &pb.ResponseHeader{}
  158. val, leaseID := p.Value, lease.LeaseID(p.Lease)
  159. if txn == nil {
  160. if leaseID != lease.NoLease {
  161. if l := a.s.lessor.Lookup(leaseID); l == nil {
  162. return nil, lease.ErrLeaseNotFound
  163. }
  164. }
  165. txn = a.s.KV().Write()
  166. defer txn.End()
  167. }
  168. var rr *mvcc.RangeResult
  169. if p.IgnoreValue || p.IgnoreLease || p.PrevKv {
  170. rr, err = txn.Range(p.Key, nil, mvcc.RangeOptions{})
  171. if err != nil {
  172. return nil, err
  173. }
  174. }
  175. if p.IgnoreValue || p.IgnoreLease {
  176. if rr == nil || len(rr.KVs) == 0 {
  177. // ignore_{lease,value} flag expects previous key-value pair
  178. return nil, ErrKeyNotFound
  179. }
  180. }
  181. if p.IgnoreValue {
  182. val = rr.KVs[0].Value
  183. }
  184. if p.IgnoreLease {
  185. leaseID = lease.LeaseID(rr.KVs[0].Lease)
  186. }
  187. if p.PrevKv {
  188. if rr != nil && len(rr.KVs) != 0 {
  189. resp.PrevKv = &rr.KVs[0]
  190. }
  191. }
  192. resp.Header.Revision = txn.Put(p.Key, val, leaseID)
  193. return resp, nil
  194. }
  195. func (a *applierV3backend) DeleteRange(txn mvcc.TxnWrite, dr *pb.DeleteRangeRequest) (*pb.DeleteRangeResponse, error) {
  196. resp := &pb.DeleteRangeResponse{}
  197. resp.Header = &pb.ResponseHeader{}
  198. end := mkGteRange(dr.RangeEnd)
  199. if txn == nil {
  200. txn = a.s.kv.Write()
  201. defer txn.End()
  202. }
  203. if dr.PrevKv {
  204. rr, err := txn.Range(dr.Key, end, mvcc.RangeOptions{})
  205. if err != nil {
  206. return nil, err
  207. }
  208. if rr != nil {
  209. resp.PrevKvs = make([]*mvccpb.KeyValue, len(rr.KVs))
  210. for i := range rr.KVs {
  211. resp.PrevKvs[i] = &rr.KVs[i]
  212. }
  213. }
  214. }
  215. resp.Deleted, resp.Header.Revision = txn.DeleteRange(dr.Key, end)
  216. return resp, nil
  217. }
  218. func (a *applierV3backend) Range(txn mvcc.TxnRead, r *pb.RangeRequest) (*pb.RangeResponse, error) {
  219. resp := &pb.RangeResponse{}
  220. resp.Header = &pb.ResponseHeader{}
  221. if txn == nil {
  222. txn = a.s.kv.Read()
  223. defer txn.End()
  224. }
  225. limit := r.Limit
  226. if r.SortOrder != pb.RangeRequest_NONE ||
  227. r.MinModRevision != 0 || r.MaxModRevision != 0 ||
  228. r.MinCreateRevision != 0 || r.MaxCreateRevision != 0 {
  229. // fetch everything; sort and truncate afterwards
  230. limit = 0
  231. }
  232. if limit > 0 {
  233. // fetch one extra for 'more' flag
  234. limit = limit + 1
  235. }
  236. ro := mvcc.RangeOptions{
  237. Limit: limit,
  238. Rev: r.Revision,
  239. Count: r.CountOnly,
  240. }
  241. rr, err := txn.Range(r.Key, mkGteRange(r.RangeEnd), ro)
  242. if err != nil {
  243. return nil, err
  244. }
  245. if r.MaxModRevision != 0 {
  246. f := func(kv *mvccpb.KeyValue) bool { return kv.ModRevision > r.MaxModRevision }
  247. pruneKVs(rr, f)
  248. }
  249. if r.MinModRevision != 0 {
  250. f := func(kv *mvccpb.KeyValue) bool { return kv.ModRevision < r.MinModRevision }
  251. pruneKVs(rr, f)
  252. }
  253. if r.MaxCreateRevision != 0 {
  254. f := func(kv *mvccpb.KeyValue) bool { return kv.CreateRevision > r.MaxCreateRevision }
  255. pruneKVs(rr, f)
  256. }
  257. if r.MinCreateRevision != 0 {
  258. f := func(kv *mvccpb.KeyValue) bool { return kv.CreateRevision < r.MinCreateRevision }
  259. pruneKVs(rr, f)
  260. }
  261. sortOrder := r.SortOrder
  262. if r.SortTarget != pb.RangeRequest_KEY && sortOrder == pb.RangeRequest_NONE {
  263. // Since current mvcc.Range implementation returns results
  264. // sorted by keys in lexiographically ascending order,
  265. // sort ASCEND by default only when target is not 'KEY'
  266. sortOrder = pb.RangeRequest_ASCEND
  267. }
  268. if sortOrder != pb.RangeRequest_NONE {
  269. var sorter sort.Interface
  270. switch {
  271. case r.SortTarget == pb.RangeRequest_KEY:
  272. sorter = &kvSortByKey{&kvSort{rr.KVs}}
  273. case r.SortTarget == pb.RangeRequest_VERSION:
  274. sorter = &kvSortByVersion{&kvSort{rr.KVs}}
  275. case r.SortTarget == pb.RangeRequest_CREATE:
  276. sorter = &kvSortByCreate{&kvSort{rr.KVs}}
  277. case r.SortTarget == pb.RangeRequest_MOD:
  278. sorter = &kvSortByMod{&kvSort{rr.KVs}}
  279. case r.SortTarget == pb.RangeRequest_VALUE:
  280. sorter = &kvSortByValue{&kvSort{rr.KVs}}
  281. }
  282. switch {
  283. case sortOrder == pb.RangeRequest_ASCEND:
  284. sort.Sort(sorter)
  285. case sortOrder == pb.RangeRequest_DESCEND:
  286. sort.Sort(sort.Reverse(sorter))
  287. }
  288. }
  289. if r.Limit > 0 && len(rr.KVs) > int(r.Limit) {
  290. rr.KVs = rr.KVs[:r.Limit]
  291. resp.More = true
  292. }
  293. resp.Header.Revision = rr.Rev
  294. resp.Count = int64(rr.Count)
  295. resp.Kvs = make([]*mvccpb.KeyValue, len(rr.KVs))
  296. for i := range rr.KVs {
  297. if r.KeysOnly {
  298. rr.KVs[i].Value = nil
  299. }
  300. resp.Kvs[i] = &rr.KVs[i]
  301. }
  302. return resp, nil
  303. }
  304. func (a *applierV3backend) Txn(rt *pb.TxnRequest) (*pb.TxnResponse, error) {
  305. isWrite := !isTxnReadonly(rt)
  306. txn := mvcc.NewReadOnlyTxnWrite(a.s.KV().Read())
  307. txnPath := compareToPath(txn, rt)
  308. if isWrite {
  309. if _, err := checkRequests(txn, rt, txnPath, a.checkPut); err != nil {
  310. txn.End()
  311. return nil, err
  312. }
  313. }
  314. if _, err := checkRequests(txn, rt, txnPath, a.checkRange); err != nil {
  315. txn.End()
  316. return nil, err
  317. }
  318. txnResp, _ := newTxnResp(rt, txnPath)
  319. // When executing mutable txn ops, etcd must hold the txn lock so
  320. // readers do not see any intermediate results. Since writes are
  321. // serialized on the raft loop, the revision in the read view will
  322. // be the revision of the write txn.
  323. if isWrite {
  324. txn.End()
  325. txn = a.s.KV().Write()
  326. }
  327. a.applyTxn(txn, rt, txnPath, txnResp)
  328. rev := txn.Rev()
  329. if len(txn.Changes()) != 0 {
  330. rev++
  331. }
  332. txn.End()
  333. txnResp.Header.Revision = rev
  334. return txnResp, nil
  335. }
  336. // newTxnResp allocates a txn response for a txn request given a path.
  337. func newTxnResp(rt *pb.TxnRequest, txnPath []bool) (txnResp *pb.TxnResponse, txnCount int) {
  338. reqs := rt.Success
  339. if !txnPath[0] {
  340. reqs = rt.Failure
  341. }
  342. resps := make([]*pb.ResponseOp, len(reqs))
  343. txnResp = &pb.TxnResponse{
  344. Responses: resps,
  345. Succeeded: txnPath[0],
  346. Header: &pb.ResponseHeader{},
  347. }
  348. for i, req := range reqs {
  349. switch tv := req.Request.(type) {
  350. case *pb.RequestOp_RequestRange:
  351. resps[i] = &pb.ResponseOp{Response: &pb.ResponseOp_ResponseRange{}}
  352. case *pb.RequestOp_RequestPut:
  353. resps[i] = &pb.ResponseOp{Response: &pb.ResponseOp_ResponsePut{}}
  354. case *pb.RequestOp_RequestDeleteRange:
  355. resps[i] = &pb.ResponseOp{Response: &pb.ResponseOp_ResponseDeleteRange{}}
  356. case *pb.RequestOp_RequestTxn:
  357. resp, txns := newTxnResp(tv.RequestTxn, txnPath[1:])
  358. resps[i] = &pb.ResponseOp{Response: &pb.ResponseOp_ResponseTxn{ResponseTxn: resp}}
  359. txnPath = txnPath[1+txns:]
  360. txnCount += txns + 1
  361. default:
  362. }
  363. }
  364. return txnResp, txnCount
  365. }
  366. func compareToPath(rv mvcc.ReadView, rt *pb.TxnRequest) []bool {
  367. txnPath := make([]bool, 1)
  368. ops := rt.Success
  369. if txnPath[0] = applyCompares(rv, rt.Compare); !txnPath[0] {
  370. ops = rt.Failure
  371. }
  372. for _, op := range ops {
  373. tv, ok := op.Request.(*pb.RequestOp_RequestTxn)
  374. if !ok || tv.RequestTxn == nil {
  375. continue
  376. }
  377. txnPath = append(txnPath, compareToPath(rv, tv.RequestTxn)...)
  378. }
  379. return txnPath
  380. }
  381. func applyCompares(rv mvcc.ReadView, cmps []*pb.Compare) bool {
  382. for _, c := range cmps {
  383. if !applyCompare(rv, c) {
  384. return false
  385. }
  386. }
  387. return true
  388. }
  389. // applyCompare applies the compare request.
  390. // If the comparison succeeds, it returns true. Otherwise, returns false.
  391. func applyCompare(rv mvcc.ReadView, c *pb.Compare) bool {
  392. // TODO: possible optimizations
  393. // * chunk reads for large ranges to conserve memory
  394. // * rewrite rules for common patterns:
  395. // ex. "[a, b) createrev > 0" => "limit 1 /\ kvs > 0"
  396. // * caching
  397. rr, err := rv.Range(c.Key, mkGteRange(c.RangeEnd), mvcc.RangeOptions{})
  398. if err != nil {
  399. return false
  400. }
  401. if len(rr.KVs) == 0 {
  402. if c.Target == pb.Compare_VALUE {
  403. // Always fail if comparing a value on a key/keys that doesn't exist;
  404. // nil == empty string in grpc; no way to represent missing value
  405. return false
  406. }
  407. return compareKV(c, mvccpb.KeyValue{})
  408. }
  409. for _, kv := range rr.KVs {
  410. if !compareKV(c, kv) {
  411. return false
  412. }
  413. }
  414. return true
  415. }
  416. func compareKV(c *pb.Compare, ckv mvccpb.KeyValue) bool {
  417. var result int
  418. rev := int64(0)
  419. switch c.Target {
  420. case pb.Compare_VALUE:
  421. v := []byte{}
  422. if tv, _ := c.TargetUnion.(*pb.Compare_Value); tv != nil {
  423. v = tv.Value
  424. }
  425. result = bytes.Compare(ckv.Value, v)
  426. case pb.Compare_CREATE:
  427. if tv, _ := c.TargetUnion.(*pb.Compare_CreateRevision); tv != nil {
  428. rev = tv.CreateRevision
  429. }
  430. result = compareInt64(ckv.CreateRevision, rev)
  431. case pb.Compare_MOD:
  432. if tv, _ := c.TargetUnion.(*pb.Compare_ModRevision); tv != nil {
  433. rev = tv.ModRevision
  434. }
  435. result = compareInt64(ckv.ModRevision, rev)
  436. case pb.Compare_VERSION:
  437. if tv, _ := c.TargetUnion.(*pb.Compare_Version); tv != nil {
  438. rev = tv.Version
  439. }
  440. result = compareInt64(ckv.Version, rev)
  441. case pb.Compare_LEASE:
  442. if tv, _ := c.TargetUnion.(*pb.Compare_Lease); tv != nil {
  443. rev = tv.Lease
  444. }
  445. result = compareInt64(ckv.Lease, rev)
  446. }
  447. switch c.Result {
  448. case pb.Compare_EQUAL:
  449. return result == 0
  450. case pb.Compare_NOT_EQUAL:
  451. return result != 0
  452. case pb.Compare_GREATER:
  453. return result > 0
  454. case pb.Compare_LESS:
  455. return result < 0
  456. }
  457. return true
  458. }
  459. func (a *applierV3backend) applyTxn(txn mvcc.TxnWrite, rt *pb.TxnRequest, txnPath []bool, tresp *pb.TxnResponse) (txns int) {
  460. reqs := rt.Success
  461. if !txnPath[0] {
  462. reqs = rt.Failure
  463. }
  464. lg := a.s.getLogger()
  465. for i, req := range reqs {
  466. respi := tresp.Responses[i].Response
  467. switch tv := req.Request.(type) {
  468. case *pb.RequestOp_RequestRange:
  469. resp, err := a.Range(txn, tv.RequestRange)
  470. if err != nil {
  471. if lg != nil {
  472. lg.Panic("unexpected error during txn", zap.Error(err))
  473. } else {
  474. plog.Panicf("unexpected error during txn: %v", err)
  475. }
  476. }
  477. respi.(*pb.ResponseOp_ResponseRange).ResponseRange = resp
  478. case *pb.RequestOp_RequestPut:
  479. resp, err := a.Put(txn, tv.RequestPut)
  480. if err != nil {
  481. if lg != nil {
  482. lg.Panic("unexpected error during txn", zap.Error(err))
  483. } else {
  484. plog.Panicf("unexpected error during txn: %v", err)
  485. }
  486. }
  487. respi.(*pb.ResponseOp_ResponsePut).ResponsePut = resp
  488. case *pb.RequestOp_RequestDeleteRange:
  489. resp, err := a.DeleteRange(txn, tv.RequestDeleteRange)
  490. if err != nil {
  491. if lg != nil {
  492. lg.Panic("unexpected error during txn", zap.Error(err))
  493. } else {
  494. plog.Panicf("unexpected error during txn: %v", err)
  495. }
  496. }
  497. respi.(*pb.ResponseOp_ResponseDeleteRange).ResponseDeleteRange = resp
  498. case *pb.RequestOp_RequestTxn:
  499. resp := respi.(*pb.ResponseOp_ResponseTxn).ResponseTxn
  500. applyTxns := a.applyTxn(txn, tv.RequestTxn, txnPath[1:], resp)
  501. txns += applyTxns + 1
  502. txnPath = txnPath[applyTxns+1:]
  503. default:
  504. // empty union
  505. }
  506. }
  507. return txns
  508. }
  509. func (a *applierV3backend) Compaction(compaction *pb.CompactionRequest) (*pb.CompactionResponse, <-chan struct{}, error) {
  510. resp := &pb.CompactionResponse{}
  511. resp.Header = &pb.ResponseHeader{}
  512. ch, err := a.s.KV().Compact(compaction.Revision)
  513. if err != nil {
  514. return nil, ch, err
  515. }
  516. // get the current revision. which key to get is not important.
  517. rr, _ := a.s.KV().Range([]byte("compaction"), nil, mvcc.RangeOptions{})
  518. resp.Header.Revision = rr.Rev
  519. return resp, ch, err
  520. }
  521. func (a *applierV3backend) LeaseGrant(lc *pb.LeaseGrantRequest) (*pb.LeaseGrantResponse, error) {
  522. l, err := a.s.lessor.Grant(lease.LeaseID(lc.ID), lc.TTL)
  523. resp := &pb.LeaseGrantResponse{}
  524. if err == nil {
  525. resp.ID = int64(l.ID)
  526. resp.TTL = l.TTL()
  527. resp.Header = newHeader(a.s)
  528. }
  529. return resp, err
  530. }
  531. func (a *applierV3backend) LeaseRevoke(lc *pb.LeaseRevokeRequest) (*pb.LeaseRevokeResponse, error) {
  532. err := a.s.lessor.Revoke(lease.LeaseID(lc.ID))
  533. return &pb.LeaseRevokeResponse{Header: newHeader(a.s)}, err
  534. }
  535. func (a *applierV3backend) LeaseCheckpoint(lc *pb.LeaseCheckpointRequest) (*pb.LeaseCheckpointResponse, error) {
  536. for _, c := range lc.Checkpoints {
  537. err := a.s.lessor.Checkpoint(lease.LeaseID(c.ID), c.Remaining_TTL)
  538. if err != nil {
  539. return &pb.LeaseCheckpointResponse{Header: newHeader(a.s)}, err
  540. }
  541. }
  542. return &pb.LeaseCheckpointResponse{Header: newHeader(a.s)}, nil
  543. }
  544. func (a *applierV3backend) Alarm(ar *pb.AlarmRequest) (*pb.AlarmResponse, error) {
  545. resp := &pb.AlarmResponse{}
  546. oldCount := len(a.s.alarmStore.Get(ar.Alarm))
  547. lg := a.s.getLogger()
  548. switch ar.Action {
  549. case pb.AlarmRequest_GET:
  550. resp.Alarms = a.s.alarmStore.Get(ar.Alarm)
  551. case pb.AlarmRequest_ACTIVATE:
  552. m := a.s.alarmStore.Activate(types.ID(ar.MemberID), ar.Alarm)
  553. if m == nil {
  554. break
  555. }
  556. resp.Alarms = append(resp.Alarms, m)
  557. activated := oldCount == 0 && len(a.s.alarmStore.Get(m.Alarm)) == 1
  558. if !activated {
  559. break
  560. }
  561. if lg != nil {
  562. lg.Warn("alarm raised", zap.String("alarm", m.Alarm.String()), zap.String("from", types.ID(m.MemberID).String()))
  563. } else {
  564. plog.Warningf("alarm %v raised by peer %s", m.Alarm, types.ID(m.MemberID))
  565. }
  566. switch m.Alarm {
  567. case pb.AlarmType_CORRUPT:
  568. a.s.applyV3 = newApplierV3Corrupt(a)
  569. case pb.AlarmType_NOSPACE:
  570. a.s.applyV3 = newApplierV3Capped(a)
  571. default:
  572. if lg != nil {
  573. lg.Warn("unimplemented alarm activation", zap.String("alarm", fmt.Sprintf("%+v", m)))
  574. } else {
  575. plog.Errorf("unimplemented alarm activation (%+v)", m)
  576. }
  577. }
  578. case pb.AlarmRequest_DEACTIVATE:
  579. m := a.s.alarmStore.Deactivate(types.ID(ar.MemberID), ar.Alarm)
  580. if m == nil {
  581. break
  582. }
  583. resp.Alarms = append(resp.Alarms, m)
  584. deactivated := oldCount > 0 && len(a.s.alarmStore.Get(ar.Alarm)) == 0
  585. if !deactivated {
  586. break
  587. }
  588. switch m.Alarm {
  589. case pb.AlarmType_NOSPACE, pb.AlarmType_CORRUPT:
  590. // TODO: check kv hash before deactivating CORRUPT?
  591. if lg != nil {
  592. lg.Warn("alarm disarmed", zap.String("alarm", m.Alarm.String()), zap.String("from", types.ID(m.MemberID).String()))
  593. } else {
  594. plog.Infof("alarm disarmed %+v", ar)
  595. }
  596. a.s.applyV3 = a.s.newApplierV3()
  597. default:
  598. if lg != nil {
  599. lg.Warn("unimplemented alarm deactivation", zap.String("alarm", fmt.Sprintf("%+v", m)))
  600. } else {
  601. plog.Errorf("unimplemented alarm deactivation (%+v)", m)
  602. }
  603. }
  604. default:
  605. return nil, nil
  606. }
  607. return resp, nil
  608. }
  609. type applierV3Capped struct {
  610. applierV3
  611. q backendQuota
  612. }
  613. // newApplierV3Capped creates an applyV3 that will reject Puts and transactions
  614. // with Puts so that the number of keys in the store is capped.
  615. func newApplierV3Capped(base applierV3) applierV3 { return &applierV3Capped{applierV3: base} }
  616. func (a *applierV3Capped) Put(txn mvcc.TxnWrite, p *pb.PutRequest) (*pb.PutResponse, error) {
  617. return nil, ErrNoSpace
  618. }
  619. func (a *applierV3Capped) Txn(r *pb.TxnRequest) (*pb.TxnResponse, error) {
  620. if a.q.Cost(r) > 0 {
  621. return nil, ErrNoSpace
  622. }
  623. return a.applierV3.Txn(r)
  624. }
  625. func (a *applierV3Capped) LeaseGrant(lc *pb.LeaseGrantRequest) (*pb.LeaseGrantResponse, error) {
  626. return nil, ErrNoSpace
  627. }
  628. func (a *applierV3backend) AuthEnable() (*pb.AuthEnableResponse, error) {
  629. err := a.s.AuthStore().AuthEnable()
  630. if err != nil {
  631. return nil, err
  632. }
  633. return &pb.AuthEnableResponse{Header: newHeader(a.s)}, nil
  634. }
  635. func (a *applierV3backend) AuthDisable() (*pb.AuthDisableResponse, error) {
  636. a.s.AuthStore().AuthDisable()
  637. return &pb.AuthDisableResponse{Header: newHeader(a.s)}, nil
  638. }
  639. func (a *applierV3backend) Authenticate(r *pb.InternalAuthenticateRequest) (*pb.AuthenticateResponse, error) {
  640. ctx := context.WithValue(context.WithValue(a.s.ctx, auth.AuthenticateParamIndex{}, a.s.consistIndex.ConsistentIndex()), auth.AuthenticateParamSimpleTokenPrefix{}, r.SimpleToken)
  641. resp, err := a.s.AuthStore().Authenticate(ctx, r.Name, r.Password)
  642. if resp != nil {
  643. resp.Header = newHeader(a.s)
  644. }
  645. return resp, err
  646. }
  647. func (a *applierV3backend) UserAdd(r *pb.AuthUserAddRequest) (*pb.AuthUserAddResponse, error) {
  648. resp, err := a.s.AuthStore().UserAdd(r)
  649. if resp != nil {
  650. resp.Header = newHeader(a.s)
  651. }
  652. return resp, err
  653. }
  654. func (a *applierV3backend) UserDelete(r *pb.AuthUserDeleteRequest) (*pb.AuthUserDeleteResponse, error) {
  655. resp, err := a.s.AuthStore().UserDelete(r)
  656. if resp != nil {
  657. resp.Header = newHeader(a.s)
  658. }
  659. return resp, err
  660. }
  661. func (a *applierV3backend) UserChangePassword(r *pb.AuthUserChangePasswordRequest) (*pb.AuthUserChangePasswordResponse, error) {
  662. resp, err := a.s.AuthStore().UserChangePassword(r)
  663. if resp != nil {
  664. resp.Header = newHeader(a.s)
  665. }
  666. return resp, err
  667. }
  668. func (a *applierV3backend) UserGrantRole(r *pb.AuthUserGrantRoleRequest) (*pb.AuthUserGrantRoleResponse, error) {
  669. resp, err := a.s.AuthStore().UserGrantRole(r)
  670. if resp != nil {
  671. resp.Header = newHeader(a.s)
  672. }
  673. return resp, err
  674. }
  675. func (a *applierV3backend) UserGet(r *pb.AuthUserGetRequest) (*pb.AuthUserGetResponse, error) {
  676. resp, err := a.s.AuthStore().UserGet(r)
  677. if resp != nil {
  678. resp.Header = newHeader(a.s)
  679. }
  680. return resp, err
  681. }
  682. func (a *applierV3backend) UserRevokeRole(r *pb.AuthUserRevokeRoleRequest) (*pb.AuthUserRevokeRoleResponse, error) {
  683. resp, err := a.s.AuthStore().UserRevokeRole(r)
  684. if resp != nil {
  685. resp.Header = newHeader(a.s)
  686. }
  687. return resp, err
  688. }
  689. func (a *applierV3backend) RoleAdd(r *pb.AuthRoleAddRequest) (*pb.AuthRoleAddResponse, error) {
  690. resp, err := a.s.AuthStore().RoleAdd(r)
  691. if resp != nil {
  692. resp.Header = newHeader(a.s)
  693. }
  694. return resp, err
  695. }
  696. func (a *applierV3backend) RoleGrantPermission(r *pb.AuthRoleGrantPermissionRequest) (*pb.AuthRoleGrantPermissionResponse, error) {
  697. resp, err := a.s.AuthStore().RoleGrantPermission(r)
  698. if resp != nil {
  699. resp.Header = newHeader(a.s)
  700. }
  701. return resp, err
  702. }
  703. func (a *applierV3backend) RoleGet(r *pb.AuthRoleGetRequest) (*pb.AuthRoleGetResponse, error) {
  704. resp, err := a.s.AuthStore().RoleGet(r)
  705. if resp != nil {
  706. resp.Header = newHeader(a.s)
  707. }
  708. return resp, err
  709. }
  710. func (a *applierV3backend) RoleRevokePermission(r *pb.AuthRoleRevokePermissionRequest) (*pb.AuthRoleRevokePermissionResponse, error) {
  711. resp, err := a.s.AuthStore().RoleRevokePermission(r)
  712. if resp != nil {
  713. resp.Header = newHeader(a.s)
  714. }
  715. return resp, err
  716. }
  717. func (a *applierV3backend) RoleDelete(r *pb.AuthRoleDeleteRequest) (*pb.AuthRoleDeleteResponse, error) {
  718. resp, err := a.s.AuthStore().RoleDelete(r)
  719. if resp != nil {
  720. resp.Header = newHeader(a.s)
  721. }
  722. return resp, err
  723. }
  724. func (a *applierV3backend) UserList(r *pb.AuthUserListRequest) (*pb.AuthUserListResponse, error) {
  725. resp, err := a.s.AuthStore().UserList(r)
  726. if resp != nil {
  727. resp.Header = newHeader(a.s)
  728. }
  729. return resp, err
  730. }
  731. func (a *applierV3backend) RoleList(r *pb.AuthRoleListRequest) (*pb.AuthRoleListResponse, error) {
  732. resp, err := a.s.AuthStore().RoleList(r)
  733. if resp != nil {
  734. resp.Header = newHeader(a.s)
  735. }
  736. return resp, err
  737. }
  738. type quotaApplierV3 struct {
  739. applierV3
  740. q Quota
  741. }
  742. func newQuotaApplierV3(s *EtcdServer, app applierV3) applierV3 {
  743. return &quotaApplierV3{app, NewBackendQuota(s, "v3-applier")}
  744. }
  745. func (a *quotaApplierV3) Put(txn mvcc.TxnWrite, p *pb.PutRequest) (*pb.PutResponse, error) {
  746. ok := a.q.Available(p)
  747. resp, err := a.applierV3.Put(txn, p)
  748. if err == nil && !ok {
  749. err = ErrNoSpace
  750. }
  751. return resp, err
  752. }
  753. func (a *quotaApplierV3) Txn(rt *pb.TxnRequest) (*pb.TxnResponse, error) {
  754. ok := a.q.Available(rt)
  755. resp, err := a.applierV3.Txn(rt)
  756. if err == nil && !ok {
  757. err = ErrNoSpace
  758. }
  759. return resp, err
  760. }
  761. func (a *quotaApplierV3) LeaseGrant(lc *pb.LeaseGrantRequest) (*pb.LeaseGrantResponse, error) {
  762. ok := a.q.Available(lc)
  763. resp, err := a.applierV3.LeaseGrant(lc)
  764. if err == nil && !ok {
  765. err = ErrNoSpace
  766. }
  767. return resp, err
  768. }
  769. type kvSort struct{ kvs []mvccpb.KeyValue }
  770. func (s *kvSort) Swap(i, j int) {
  771. t := s.kvs[i]
  772. s.kvs[i] = s.kvs[j]
  773. s.kvs[j] = t
  774. }
  775. func (s *kvSort) Len() int { return len(s.kvs) }
  776. type kvSortByKey struct{ *kvSort }
  777. func (s *kvSortByKey) Less(i, j int) bool {
  778. return bytes.Compare(s.kvs[i].Key, s.kvs[j].Key) < 0
  779. }
  780. type kvSortByVersion struct{ *kvSort }
  781. func (s *kvSortByVersion) Less(i, j int) bool {
  782. return (s.kvs[i].Version - s.kvs[j].Version) < 0
  783. }
  784. type kvSortByCreate struct{ *kvSort }
  785. func (s *kvSortByCreate) Less(i, j int) bool {
  786. return (s.kvs[i].CreateRevision - s.kvs[j].CreateRevision) < 0
  787. }
  788. type kvSortByMod struct{ *kvSort }
  789. func (s *kvSortByMod) Less(i, j int) bool {
  790. return (s.kvs[i].ModRevision - s.kvs[j].ModRevision) < 0
  791. }
  792. type kvSortByValue struct{ *kvSort }
  793. func (s *kvSortByValue) Less(i, j int) bool {
  794. return bytes.Compare(s.kvs[i].Value, s.kvs[j].Value) < 0
  795. }
  796. func checkRequests(rv mvcc.ReadView, rt *pb.TxnRequest, txnPath []bool, f checkReqFunc) (int, error) {
  797. txnCount := 0
  798. reqs := rt.Success
  799. if !txnPath[0] {
  800. reqs = rt.Failure
  801. }
  802. for _, req := range reqs {
  803. if tv, ok := req.Request.(*pb.RequestOp_RequestTxn); ok && tv.RequestTxn != nil {
  804. txns, err := checkRequests(rv, tv.RequestTxn, txnPath[1:], f)
  805. if err != nil {
  806. return 0, err
  807. }
  808. txnCount += txns + 1
  809. txnPath = txnPath[txns+1:]
  810. continue
  811. }
  812. if err := f(rv, req); err != nil {
  813. return 0, err
  814. }
  815. }
  816. return txnCount, nil
  817. }
  818. func (a *applierV3backend) checkRequestPut(rv mvcc.ReadView, reqOp *pb.RequestOp) error {
  819. tv, ok := reqOp.Request.(*pb.RequestOp_RequestPut)
  820. if !ok || tv.RequestPut == nil {
  821. return nil
  822. }
  823. req := tv.RequestPut
  824. if req.IgnoreValue || req.IgnoreLease {
  825. // expects previous key-value, error if not exist
  826. rr, err := rv.Range(req.Key, nil, mvcc.RangeOptions{})
  827. if err != nil {
  828. return err
  829. }
  830. if rr == nil || len(rr.KVs) == 0 {
  831. return ErrKeyNotFound
  832. }
  833. }
  834. if lease.LeaseID(req.Lease) != lease.NoLease {
  835. if l := a.s.lessor.Lookup(lease.LeaseID(req.Lease)); l == nil {
  836. return lease.ErrLeaseNotFound
  837. }
  838. }
  839. return nil
  840. }
  841. func (a *applierV3backend) checkRequestRange(rv mvcc.ReadView, reqOp *pb.RequestOp) error {
  842. tv, ok := reqOp.Request.(*pb.RequestOp_RequestRange)
  843. if !ok || tv.RequestRange == nil {
  844. return nil
  845. }
  846. req := tv.RequestRange
  847. switch {
  848. case req.Revision == 0:
  849. return nil
  850. case req.Revision > rv.Rev():
  851. return mvcc.ErrFutureRev
  852. case req.Revision < rv.FirstRev():
  853. return mvcc.ErrCompacted
  854. }
  855. return nil
  856. }
  857. func compareInt64(a, b int64) int {
  858. switch {
  859. case a < b:
  860. return -1
  861. case a > b:
  862. return 1
  863. default:
  864. return 0
  865. }
  866. }
  867. // mkGteRange determines if the range end is a >= range. This works around grpc
  868. // sending empty byte strings as nil; >= is encoded in the range end as '\0'.
  869. // If it is a GTE range, then []byte{} is returned to indicate the empty byte
  870. // string (vs nil being no byte string).
  871. func mkGteRange(rangeEnd []byte) []byte {
  872. if len(rangeEnd) == 1 && rangeEnd[0] == 0 {
  873. return []byte{}
  874. }
  875. return rangeEnd
  876. }
  877. func noSideEffect(r *pb.InternalRaftRequest) bool {
  878. return r.Range != nil || r.AuthUserGet != nil || r.AuthRoleGet != nil
  879. }
  880. func removeNeedlessRangeReqs(txn *pb.TxnRequest) {
  881. f := func(ops []*pb.RequestOp) []*pb.RequestOp {
  882. j := 0
  883. for i := 0; i < len(ops); i++ {
  884. if _, ok := ops[i].Request.(*pb.RequestOp_RequestRange); ok {
  885. continue
  886. }
  887. ops[j] = ops[i]
  888. j++
  889. }
  890. return ops[:j]
  891. }
  892. txn.Success = f(txn.Success)
  893. txn.Failure = f(txn.Failure)
  894. }
  895. func pruneKVs(rr *mvcc.RangeResult, isPrunable func(*mvccpb.KeyValue) bool) {
  896. j := 0
  897. for i := range rr.KVs {
  898. rr.KVs[j] = rr.KVs[i]
  899. if !isPrunable(&rr.KVs[i]) {
  900. j++
  901. }
  902. }
  903. rr.KVs = rr.KVs[:j]
  904. }
  905. func newHeader(s *EtcdServer) *pb.ResponseHeader {
  906. return &pb.ResponseHeader{
  907. ClusterId: uint64(s.Cluster().ID()),
  908. MemberId: uint64(s.ID()),
  909. Revision: s.KV().Rev(),
  910. RaftTerm: s.Term(),
  911. }
  912. }