v3_grpc_test.go 23 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863
  1. // Copyright 2016 CoreOS, Inc.
  2. //
  3. // Licensed under the Apache License, Version 2.0 (the "License");
  4. // you may not use this file except in compliance with the License.
  5. // You may obtain a copy of the License at
  6. //
  7. // http://www.apache.org/licenses/LICENSE-2.0
  8. //
  9. // Unless required by applicable law or agreed to in writing, software
  10. // distributed under the License is distributed on an "AS IS" BASIS,
  11. // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  12. // See the License for the specific language governing permissions and
  13. // limitations under the License.
  14. package integration
  15. import (
  16. "fmt"
  17. "reflect"
  18. "testing"
  19. "time"
  20. "github.com/coreos/etcd/etcdserver/api/v3rpc"
  21. "github.com/coreos/etcd/etcdserver/api/v3rpc/rpctypes"
  22. pb "github.com/coreos/etcd/etcdserver/etcdserverpb"
  23. "github.com/coreos/etcd/pkg/testutil"
  24. "github.com/coreos/etcd/storage/backend"
  25. "golang.org/x/net/context"
  26. "google.golang.org/grpc"
  27. )
  28. // TestV3PutOverwrite puts a key with the v3 api to a random cluster member,
  29. // overwrites it, then checks that the change was applied.
  30. func TestV3PutOverwrite(t *testing.T) {
  31. defer testutil.AfterTest(t)
  32. clus := NewClusterV3(t, &ClusterConfig{Size: 3})
  33. defer clus.Terminate(t)
  34. kvc := toGRPC(clus.RandClient()).KV
  35. key := []byte("foo")
  36. reqput := &pb.PutRequest{Key: key, Value: []byte("bar")}
  37. respput, err := kvc.Put(context.TODO(), reqput)
  38. if err != nil {
  39. t.Fatalf("couldn't put key (%v)", err)
  40. }
  41. // overwrite
  42. reqput.Value = []byte("baz")
  43. respput2, err := kvc.Put(context.TODO(), reqput)
  44. if err != nil {
  45. t.Fatalf("couldn't put key (%v)", err)
  46. }
  47. if respput2.Header.Revision <= respput.Header.Revision {
  48. t.Fatalf("expected newer revision on overwrite, got %v <= %v",
  49. respput2.Header.Revision, respput.Header.Revision)
  50. }
  51. reqrange := &pb.RangeRequest{Key: key}
  52. resprange, err := kvc.Range(context.TODO(), reqrange)
  53. if err != nil {
  54. t.Fatalf("couldn't get key (%v)", err)
  55. }
  56. if len(resprange.Kvs) != 1 {
  57. t.Fatalf("expected 1 key, got %v", len(resprange.Kvs))
  58. }
  59. kv := resprange.Kvs[0]
  60. if kv.ModRevision <= kv.CreateRevision {
  61. t.Errorf("expected modRev > createRev, got %d <= %d",
  62. kv.ModRevision, kv.CreateRevision)
  63. }
  64. if !reflect.DeepEqual(reqput.Value, kv.Value) {
  65. t.Errorf("expected value %v, got %v", reqput.Value, kv.Value)
  66. }
  67. }
  68. func TestV3TxnTooManyOps(t *testing.T) {
  69. defer testutil.AfterTest(t)
  70. clus := NewClusterV3(t, &ClusterConfig{Size: 3})
  71. defer clus.Terminate(t)
  72. kvc := toGRPC(clus.RandClient()).KV
  73. // unique keys
  74. i := new(int)
  75. keyf := func() []byte {
  76. *i++
  77. return []byte(fmt.Sprintf("key-%d", i))
  78. }
  79. addCompareOps := func(txn *pb.TxnRequest) {
  80. txn.Compare = append(txn.Compare,
  81. &pb.Compare{
  82. Result: pb.Compare_GREATER,
  83. Target: pb.Compare_CREATE,
  84. Key: keyf(),
  85. })
  86. }
  87. addSuccessOps := func(txn *pb.TxnRequest) {
  88. txn.Success = append(txn.Success,
  89. &pb.RequestUnion{
  90. Request: &pb.RequestUnion_RequestPut{
  91. RequestPut: &pb.PutRequest{
  92. Key: keyf(),
  93. Value: []byte("bar"),
  94. },
  95. },
  96. })
  97. }
  98. addFailureOps := func(txn *pb.TxnRequest) {
  99. txn.Failure = append(txn.Failure,
  100. &pb.RequestUnion{
  101. Request: &pb.RequestUnion_RequestPut{
  102. RequestPut: &pb.PutRequest{
  103. Key: keyf(),
  104. Value: []byte("bar"),
  105. },
  106. },
  107. })
  108. }
  109. tests := []func(txn *pb.TxnRequest){
  110. addCompareOps,
  111. addSuccessOps,
  112. addFailureOps,
  113. }
  114. for i, tt := range tests {
  115. txn := &pb.TxnRequest{}
  116. for j := 0; j < v3rpc.MaxOpsPerTxn+1; j++ {
  117. tt(txn)
  118. }
  119. _, err := kvc.Txn(context.Background(), txn)
  120. if err != rpctypes.ErrTooManyOps {
  121. t.Errorf("#%d: err = %v, want %v", i, err, rpctypes.ErrTooManyOps)
  122. }
  123. }
  124. }
  125. func TestV3TxnDuplicateKeys(t *testing.T) {
  126. defer testutil.AfterTest(t)
  127. clus := NewClusterV3(t, &ClusterConfig{Size: 3})
  128. defer clus.Terminate(t)
  129. putreq := &pb.RequestUnion{Request: &pb.RequestUnion_RequestPut{RequestPut: &pb.PutRequest{Key: []byte("abc"), Value: []byte("def")}}}
  130. delKeyReq := &pb.RequestUnion{Request: &pb.RequestUnion_RequestDeleteRange{
  131. RequestDeleteRange: &pb.DeleteRangeRequest{
  132. Key: []byte("abc"),
  133. },
  134. },
  135. }
  136. delInRangeReq := &pb.RequestUnion{Request: &pb.RequestUnion_RequestDeleteRange{
  137. RequestDeleteRange: &pb.DeleteRangeRequest{
  138. Key: []byte("a"), RangeEnd: []byte("b"),
  139. },
  140. },
  141. }
  142. delOutOfRangeReq := &pb.RequestUnion{Request: &pb.RequestUnion_RequestDeleteRange{
  143. RequestDeleteRange: &pb.DeleteRangeRequest{
  144. Key: []byte("abb"), RangeEnd: []byte("abc"),
  145. },
  146. },
  147. }
  148. kvc := toGRPC(clus.RandClient()).KV
  149. tests := []struct {
  150. txnSuccess []*pb.RequestUnion
  151. werr error
  152. }{
  153. {
  154. txnSuccess: []*pb.RequestUnion{putreq, putreq},
  155. werr: rpctypes.ErrDuplicateKey,
  156. },
  157. {
  158. txnSuccess: []*pb.RequestUnion{putreq, delKeyReq},
  159. werr: rpctypes.ErrDuplicateKey,
  160. },
  161. {
  162. txnSuccess: []*pb.RequestUnion{putreq, delInRangeReq},
  163. werr: rpctypes.ErrDuplicateKey,
  164. },
  165. {
  166. txnSuccess: []*pb.RequestUnion{delKeyReq, delInRangeReq, delKeyReq, delInRangeReq},
  167. werr: nil,
  168. },
  169. {
  170. txnSuccess: []*pb.RequestUnion{putreq, delOutOfRangeReq},
  171. werr: nil,
  172. },
  173. }
  174. for i, tt := range tests {
  175. txn := &pb.TxnRequest{Success: tt.txnSuccess}
  176. _, err := kvc.Txn(context.Background(), txn)
  177. if err != tt.werr {
  178. t.Errorf("#%d: err = %v, want %v", i, err, tt.werr)
  179. }
  180. }
  181. }
  182. // TestV3PutMissingLease ensures that a Put on a key with a bogus lease fails.
  183. func TestV3PutMissingLease(t *testing.T) {
  184. defer testutil.AfterTest(t)
  185. clus := NewClusterV3(t, &ClusterConfig{Size: 3})
  186. defer clus.Terminate(t)
  187. kvc := toGRPC(clus.RandClient()).KV
  188. key := []byte("foo")
  189. preq := &pb.PutRequest{Key: key, Lease: 123456}
  190. tests := []func(){
  191. // put case
  192. func() {
  193. if presp, err := kvc.Put(context.TODO(), preq); err == nil {
  194. t.Errorf("succeeded put key. req: %v. resp: %v", preq, presp)
  195. }
  196. },
  197. // txn success case
  198. func() {
  199. txn := &pb.TxnRequest{}
  200. txn.Success = append(txn.Success, &pb.RequestUnion{
  201. Request: &pb.RequestUnion_RequestPut{
  202. RequestPut: preq}})
  203. if tresp, err := kvc.Txn(context.TODO(), txn); err == nil {
  204. t.Errorf("succeeded txn success. req: %v. resp: %v", txn, tresp)
  205. }
  206. },
  207. // txn failure case
  208. func() {
  209. txn := &pb.TxnRequest{}
  210. txn.Failure = append(txn.Failure, &pb.RequestUnion{
  211. Request: &pb.RequestUnion_RequestPut{
  212. RequestPut: preq}})
  213. cmp := &pb.Compare{
  214. Result: pb.Compare_GREATER,
  215. Target: pb.Compare_CREATE,
  216. Key: []byte("bar"),
  217. }
  218. txn.Compare = append(txn.Compare, cmp)
  219. if tresp, err := kvc.Txn(context.TODO(), txn); err == nil {
  220. t.Errorf("succeeded txn failure. req: %v. resp: %v", txn, tresp)
  221. }
  222. },
  223. // ignore bad lease in failure on success txn
  224. func() {
  225. txn := &pb.TxnRequest{}
  226. rreq := &pb.RangeRequest{Key: []byte("bar")}
  227. txn.Success = append(txn.Success, &pb.RequestUnion{
  228. Request: &pb.RequestUnion_RequestRange{
  229. RequestRange: rreq}})
  230. txn.Failure = append(txn.Failure, &pb.RequestUnion{
  231. Request: &pb.RequestUnion_RequestPut{
  232. RequestPut: preq}})
  233. if tresp, err := kvc.Txn(context.TODO(), txn); err != nil {
  234. t.Errorf("failed good txn. req: %v. resp: %v", txn, tresp)
  235. }
  236. },
  237. }
  238. for i, f := range tests {
  239. f()
  240. // key shouldn't have been stored
  241. rreq := &pb.RangeRequest{Key: key}
  242. rresp, err := kvc.Range(context.TODO(), rreq)
  243. if err != nil {
  244. t.Errorf("#%d. could not rangereq (%v)", i, err)
  245. } else if len(rresp.Kvs) != 0 {
  246. t.Errorf("#%d. expected no keys, got %v", i, rresp)
  247. }
  248. }
  249. }
  250. // TestV3DeleteRange tests various edge cases in the DeleteRange API.
  251. func TestV3DeleteRange(t *testing.T) {
  252. defer testutil.AfterTest(t)
  253. tests := []struct {
  254. keySet []string
  255. begin string
  256. end string
  257. wantSet [][]byte
  258. deleted int64
  259. }{
  260. // delete middle
  261. {
  262. []string{"foo", "foo/abc", "fop"},
  263. "foo/", "fop",
  264. [][]byte{[]byte("foo"), []byte("fop")}, 1,
  265. },
  266. // no delete
  267. {
  268. []string{"foo", "foo/abc", "fop"},
  269. "foo/", "foo/",
  270. [][]byte{[]byte("foo"), []byte("foo/abc"), []byte("fop")}, 0,
  271. },
  272. // delete first
  273. {
  274. []string{"foo", "foo/abc", "fop"},
  275. "fo", "fop",
  276. [][]byte{[]byte("fop")}, 2,
  277. },
  278. // delete tail
  279. {
  280. []string{"foo", "foo/abc", "fop"},
  281. "foo/", "fos",
  282. [][]byte{[]byte("foo")}, 2,
  283. },
  284. // delete exact
  285. {
  286. []string{"foo", "foo/abc", "fop"},
  287. "foo/abc", "",
  288. [][]byte{[]byte("foo"), []byte("fop")}, 1,
  289. },
  290. // delete none, [x,x)
  291. {
  292. []string{"foo"},
  293. "foo", "foo",
  294. [][]byte{[]byte("foo")}, 0,
  295. },
  296. }
  297. for i, tt := range tests {
  298. clus := NewClusterV3(t, &ClusterConfig{Size: 3})
  299. kvc := toGRPC(clus.RandClient()).KV
  300. ks := tt.keySet
  301. for j := range ks {
  302. reqput := &pb.PutRequest{Key: []byte(ks[j]), Value: []byte{}}
  303. _, err := kvc.Put(context.TODO(), reqput)
  304. if err != nil {
  305. t.Fatalf("couldn't put key (%v)", err)
  306. }
  307. }
  308. dreq := &pb.DeleteRangeRequest{
  309. Key: []byte(tt.begin),
  310. RangeEnd: []byte(tt.end)}
  311. dresp, err := kvc.DeleteRange(context.TODO(), dreq)
  312. if err != nil {
  313. t.Fatalf("couldn't delete range on test %d (%v)", i, err)
  314. }
  315. if tt.deleted != dresp.Deleted {
  316. t.Errorf("expected %d on test %v, got %d", tt.deleted, i, dresp.Deleted)
  317. }
  318. rreq := &pb.RangeRequest{Key: []byte{0x0}, RangeEnd: []byte{0xff}}
  319. rresp, err := kvc.Range(context.TODO(), rreq)
  320. if err != nil {
  321. t.Errorf("couldn't get range on test %v (%v)", i, err)
  322. }
  323. if dresp.Header.Revision != rresp.Header.Revision {
  324. t.Errorf("expected revision %v, got %v",
  325. dresp.Header.Revision, rresp.Header.Revision)
  326. }
  327. keys := [][]byte{}
  328. for j := range rresp.Kvs {
  329. keys = append(keys, rresp.Kvs[j].Key)
  330. }
  331. if reflect.DeepEqual(tt.wantSet, keys) == false {
  332. t.Errorf("expected %v on test %v, got %v", tt.wantSet, i, keys)
  333. }
  334. // can't defer because tcp ports will be in use
  335. clus.Terminate(t)
  336. }
  337. }
  338. // TestV3TxnInvaildRange tests txn
  339. func TestV3TxnInvaildRange(t *testing.T) {
  340. defer testutil.AfterTest(t)
  341. clus := NewClusterV3(t, &ClusterConfig{Size: 3})
  342. defer clus.Terminate(t)
  343. kvc := toGRPC(clus.RandClient()).KV
  344. preq := &pb.PutRequest{Key: []byte("foo"), Value: []byte("bar")}
  345. for i := 0; i < 3; i++ {
  346. _, err := kvc.Put(context.Background(), preq)
  347. if err != nil {
  348. t.Fatalf("couldn't put key (%v)", err)
  349. }
  350. }
  351. _, err := kvc.Compact(context.Background(), &pb.CompactionRequest{Revision: 2})
  352. if err != nil {
  353. t.Fatalf("couldn't compact kv space (%v)", err)
  354. }
  355. // future rev
  356. txn := &pb.TxnRequest{}
  357. txn.Success = append(txn.Success, &pb.RequestUnion{
  358. Request: &pb.RequestUnion_RequestPut{
  359. RequestPut: preq}})
  360. rreq := &pb.RangeRequest{Key: []byte("foo"), Revision: 100}
  361. txn.Success = append(txn.Success, &pb.RequestUnion{
  362. Request: &pb.RequestUnion_RequestRange{
  363. RequestRange: rreq}})
  364. if _, err := kvc.Txn(context.TODO(), txn); err != rpctypes.ErrFutureRev {
  365. t.Errorf("err = %v, want %v", err, rpctypes.ErrFutureRev)
  366. }
  367. // compacted rev
  368. tv, _ := txn.Success[1].Request.(*pb.RequestUnion_RequestRange)
  369. tv.RequestRange.Revision = 1
  370. if _, err := kvc.Txn(context.TODO(), txn); err != rpctypes.ErrCompacted {
  371. t.Errorf("err = %v, want %v", err, rpctypes.ErrCompacted)
  372. }
  373. }
  374. func TestV3TooLargeRequest(t *testing.T) {
  375. defer testutil.AfterTest(t)
  376. clus := NewClusterV3(t, &ClusterConfig{Size: 3})
  377. defer clus.Terminate(t)
  378. kvc := toGRPC(clus.RandClient()).KV
  379. // 2MB request value
  380. largeV := make([]byte, 2*1024*1024)
  381. preq := &pb.PutRequest{Key: []byte("foo"), Value: largeV}
  382. _, err := kvc.Put(context.Background(), preq)
  383. if err != rpctypes.ErrRequestTooLarge {
  384. t.Errorf("err = %v, want %v", err, rpctypes.ErrRequestTooLarge)
  385. }
  386. }
  387. // TestV3Hash tests hash.
  388. func TestV3Hash(t *testing.T) {
  389. defer testutil.AfterTest(t)
  390. clus := NewClusterV3(t, &ClusterConfig{Size: 3})
  391. defer clus.Terminate(t)
  392. cli := clus.RandClient()
  393. kvc := toGRPC(cli).KV
  394. m := toGRPC(cli).Maintenance
  395. preq := &pb.PutRequest{Key: []byte("foo"), Value: []byte("bar")}
  396. for i := 0; i < 3; i++ {
  397. _, err := kvc.Put(context.Background(), preq)
  398. if err != nil {
  399. t.Fatalf("couldn't put key (%v)", err)
  400. }
  401. }
  402. resp, err := m.Hash(context.Background(), &pb.HashRequest{})
  403. if err != nil || resp.Hash == 0 {
  404. t.Fatalf("couldn't hash (%v, hash %d)", err, resp.Hash)
  405. }
  406. }
  407. // TestV3StorageQuotaAPI tests the V3 server respects quotas at the API layer
  408. func TestV3StorageQuotaAPI(t *testing.T) {
  409. oldSize := backend.InitialMmapSize
  410. defer func() {
  411. backend.InitialMmapSize = oldSize
  412. testutil.AfterTest(t)
  413. }()
  414. backend.InitialMmapSize = 64 * 1024
  415. clus := NewClusterV3(t, &ClusterConfig{Size: 3})
  416. defer clus.Terminate(t)
  417. kvc := toGRPC(clus.RandClient()).KV
  418. key := []byte("abc")
  419. // test small put that fits in quota
  420. smallbuf := make([]byte, 512)
  421. if _, err := kvc.Put(context.TODO(), &pb.PutRequest{Key: key, Value: smallbuf}); err != nil {
  422. t.Fatal(err)
  423. }
  424. // test big put
  425. bigbuf := make([]byte, 64*1024)
  426. _, err := kvc.Put(context.TODO(), &pb.PutRequest{Key: key, Value: bigbuf})
  427. if err == nil || err != rpctypes.ErrNoSpace {
  428. t.Fatalf("big put got %v, expected %v", err, rpctypes.ErrNoSpace)
  429. }
  430. // test big txn
  431. puttxn := &pb.RequestUnion{
  432. Request: &pb.RequestUnion_RequestPut{
  433. RequestPut: &pb.PutRequest{
  434. Key: key,
  435. Value: bigbuf,
  436. },
  437. },
  438. }
  439. txnreq := &pb.TxnRequest{}
  440. txnreq.Success = append(txnreq.Success, puttxn)
  441. _, txnerr := kvc.Txn(context.TODO(), txnreq)
  442. if txnerr == nil || err != rpctypes.ErrNoSpace {
  443. t.Fatalf("big txn got %v, expected %v", err, rpctypes.ErrNoSpace)
  444. }
  445. }
  446. // TestV3StorageQuotaApply tests the V3 server respects quotas during apply
  447. func TestV3StorageQuotaApply(t *testing.T) {
  448. oldSize := backend.InitialMmapSize
  449. defer func() {
  450. backend.InitialMmapSize = oldSize
  451. testutil.AfterTest(t)
  452. }()
  453. clus := NewClusterV3(t, &ClusterConfig{Size: 2})
  454. defer clus.Terminate(t)
  455. kvc0 := toGRPC(clus.Client(0)).KV
  456. kvc1 := toGRPC(clus.Client(1)).KV
  457. // force a node to have a different quota
  458. backend.InitialMmapSize = 64 * 1024
  459. clus.Members[0].Stop(t)
  460. clus.Members[0].Restart(t)
  461. clus.waitLeader(t, clus.Members)
  462. key := []byte("abc")
  463. // test small put still works
  464. smallbuf := make([]byte, 1024)
  465. _, serr := kvc0.Put(context.TODO(), &pb.PutRequest{Key: key, Value: smallbuf})
  466. if serr != nil {
  467. t.Fatal(serr)
  468. }
  469. // test big put
  470. bigbuf := make([]byte, 64*1024)
  471. _, err := kvc1.Put(context.TODO(), &pb.PutRequest{Key: key, Value: bigbuf})
  472. if err != nil {
  473. t.Fatal(err)
  474. }
  475. // small quota machine should reject put
  476. // first, synchronize with the cluster via quorum get
  477. kvc0.Range(context.TODO(), &pb.RangeRequest{Key: []byte("foo")})
  478. if _, err := kvc0.Put(context.TODO(), &pb.PutRequest{Key: key, Value: smallbuf}); err == nil {
  479. t.Fatalf("past-quota instance should reject put")
  480. }
  481. // large quota machine should reject put
  482. if _, err := kvc1.Put(context.TODO(), &pb.PutRequest{Key: key, Value: smallbuf}); err == nil {
  483. t.Fatalf("past-quota instance should reject put")
  484. }
  485. // reset large quota node to ensure alarm persisted
  486. backend.InitialMmapSize = oldSize
  487. clus.Members[1].Stop(t)
  488. clus.Members[1].Restart(t)
  489. clus.waitLeader(t, clus.Members)
  490. if _, err := kvc1.Put(context.TODO(), &pb.PutRequest{Key: key, Value: smallbuf}); err == nil {
  491. t.Fatalf("alarmed instance should reject put after reset")
  492. }
  493. }
  494. // TestV3AlarmDeactivate ensures that space alarms can be deactivated so puts go through.
  495. func TestV3AlarmDeactivate(t *testing.T) {
  496. clus := NewClusterV3(t, &ClusterConfig{Size: 3})
  497. defer clus.Terminate(t)
  498. kvc := toGRPC(clus.RandClient()).KV
  499. mt := toGRPC(clus.RandClient()).Maintenance
  500. alarmReq := &pb.AlarmRequest{
  501. MemberID: 123,
  502. Action: pb.AlarmRequest_ACTIVATE,
  503. Alarm: pb.AlarmType_NOSPACE,
  504. }
  505. if _, err := mt.Alarm(context.TODO(), alarmReq); err != nil {
  506. t.Fatal(err)
  507. }
  508. key := []byte("abc")
  509. smallbuf := make([]byte, 512)
  510. _, err := kvc.Put(context.TODO(), &pb.PutRequest{Key: key, Value: smallbuf})
  511. if err == nil && err != rpctypes.ErrNoSpace {
  512. t.Fatalf("put got %v, expected %v", err, rpctypes.ErrNoSpace)
  513. }
  514. alarmReq.Action = pb.AlarmRequest_DEACTIVATE
  515. if _, err = mt.Alarm(context.TODO(), alarmReq); err != nil {
  516. t.Fatal(err)
  517. }
  518. if _, err = kvc.Put(context.TODO(), &pb.PutRequest{Key: key, Value: smallbuf}); err != nil {
  519. t.Fatal(err)
  520. }
  521. }
  522. func TestV3RangeRequest(t *testing.T) {
  523. defer testutil.AfterTest(t)
  524. tests := []struct {
  525. putKeys []string
  526. reqs []pb.RangeRequest
  527. wresps [][]string
  528. wmores []bool
  529. }{
  530. // single key
  531. {
  532. []string{"foo", "bar"},
  533. []pb.RangeRequest{
  534. // exists
  535. {Key: []byte("foo")},
  536. // doesn't exist
  537. {Key: []byte("baz")},
  538. },
  539. [][]string{
  540. {"foo"},
  541. {},
  542. },
  543. []bool{false, false},
  544. },
  545. // multi-key
  546. {
  547. []string{"a", "b", "c", "d", "e"},
  548. []pb.RangeRequest{
  549. // all in range
  550. {Key: []byte("a"), RangeEnd: []byte("z")},
  551. // [b, d)
  552. {Key: []byte("b"), RangeEnd: []byte("d")},
  553. // out of range
  554. {Key: []byte("f"), RangeEnd: []byte("z")},
  555. // [c,c) = empty
  556. {Key: []byte("c"), RangeEnd: []byte("c")},
  557. // [d, b) = empty
  558. {Key: []byte("d"), RangeEnd: []byte("b")},
  559. // ["\0", "\0") => all in range
  560. {Key: []byte{0}, RangeEnd: []byte{0}},
  561. },
  562. [][]string{
  563. {"a", "b", "c", "d", "e"},
  564. {"b", "c"},
  565. {},
  566. {},
  567. {},
  568. {"a", "b", "c", "d", "e"},
  569. },
  570. []bool{false, false, false, false, false, false},
  571. },
  572. // revision
  573. {
  574. []string{"a", "b", "c", "d", "e"},
  575. []pb.RangeRequest{
  576. {Key: []byte("a"), RangeEnd: []byte("z"), Revision: 0},
  577. {Key: []byte("a"), RangeEnd: []byte("z"), Revision: 1},
  578. {Key: []byte("a"), RangeEnd: []byte("z"), Revision: 2},
  579. {Key: []byte("a"), RangeEnd: []byte("z"), Revision: 3},
  580. },
  581. [][]string{
  582. {"a", "b", "c", "d", "e"},
  583. {},
  584. {"a"},
  585. {"a", "b"},
  586. },
  587. []bool{false, false, false, false},
  588. },
  589. // limit
  590. {
  591. []string{"foo", "bar"},
  592. []pb.RangeRequest{
  593. // more
  594. {Key: []byte("a"), RangeEnd: []byte("z"), Limit: 1},
  595. // no more
  596. {Key: []byte("a"), RangeEnd: []byte("z"), Limit: 2},
  597. },
  598. [][]string{
  599. {"bar"},
  600. {"bar", "foo"},
  601. },
  602. []bool{true, false},
  603. },
  604. // sort
  605. {
  606. []string{"b", "a", "c", "d", "c"},
  607. []pb.RangeRequest{
  608. {
  609. Key: []byte("a"), RangeEnd: []byte("z"),
  610. Limit: 1,
  611. SortOrder: pb.RangeRequest_ASCEND,
  612. SortTarget: pb.RangeRequest_KEY,
  613. },
  614. {
  615. Key: []byte("a"), RangeEnd: []byte("z"),
  616. Limit: 1,
  617. SortOrder: pb.RangeRequest_DESCEND,
  618. SortTarget: pb.RangeRequest_KEY,
  619. },
  620. {
  621. Key: []byte("a"), RangeEnd: []byte("z"),
  622. Limit: 1,
  623. SortOrder: pb.RangeRequest_ASCEND,
  624. SortTarget: pb.RangeRequest_CREATE,
  625. },
  626. {
  627. Key: []byte("a"), RangeEnd: []byte("z"),
  628. Limit: 1,
  629. SortOrder: pb.RangeRequest_DESCEND,
  630. SortTarget: pb.RangeRequest_MOD,
  631. },
  632. {
  633. Key: []byte("z"), RangeEnd: []byte("z"),
  634. Limit: 1,
  635. SortOrder: pb.RangeRequest_DESCEND,
  636. SortTarget: pb.RangeRequest_CREATE,
  637. },
  638. },
  639. [][]string{
  640. {"a"},
  641. {"d"},
  642. {"b"},
  643. {"c"},
  644. {},
  645. },
  646. []bool{true, true, true, true, false},
  647. },
  648. }
  649. for i, tt := range tests {
  650. clus := NewClusterV3(t, &ClusterConfig{Size: 3})
  651. for _, k := range tt.putKeys {
  652. kvc := toGRPC(clus.RandClient()).KV
  653. req := &pb.PutRequest{Key: []byte(k), Value: []byte("bar")}
  654. if _, err := kvc.Put(context.TODO(), req); err != nil {
  655. t.Fatalf("#%d: couldn't put key (%v)", i, err)
  656. }
  657. }
  658. for j, req := range tt.reqs {
  659. kvc := toGRPC(clus.RandClient()).KV
  660. resp, err := kvc.Range(context.TODO(), &req)
  661. if err != nil {
  662. t.Errorf("#%d.%d: Range error: %v", i, j, err)
  663. continue
  664. }
  665. if len(resp.Kvs) != len(tt.wresps[j]) {
  666. t.Errorf("#%d.%d: bad len(resp.Kvs). got = %d, want = %d, ", i, j, len(resp.Kvs), len(tt.wresps[j]))
  667. continue
  668. }
  669. for k, wKey := range tt.wresps[j] {
  670. respKey := string(resp.Kvs[k].Key)
  671. if respKey != wKey {
  672. t.Errorf("#%d.%d: key[%d]. got = %v, want = %v, ", i, j, k, respKey, wKey)
  673. }
  674. }
  675. if resp.More != tt.wmores[j] {
  676. t.Errorf("#%d.%d: bad more. got = %v, want = %v, ", i, j, resp.More, tt.wmores[j])
  677. }
  678. wrev := int64(len(tt.putKeys) + 1)
  679. if resp.Header.Revision != wrev {
  680. t.Errorf("#%d.%d: bad header revision. got = %d. want = %d", i, j, resp.Header.Revision, wrev)
  681. }
  682. }
  683. clus.Terminate(t)
  684. }
  685. }
  686. func newClusterV3NoClients(t *testing.T, cfg *ClusterConfig) *ClusterV3 {
  687. cfg.UseGRPC = true
  688. clus := &ClusterV3{cluster: NewClusterByConfig(t, cfg)}
  689. clus.Launch(t)
  690. return clus
  691. }
  692. // TestTLSGRPCRejectInsecureClient checks that connection is rejected if server is TLS but not client.
  693. func TestTLSGRPCRejectInsecureClient(t *testing.T) {
  694. defer testutil.AfterTest(t)
  695. cfg := ClusterConfig{Size: 3, ClientTLS: &testTLSInfo}
  696. clus := newClusterV3NoClients(t, &cfg)
  697. defer clus.Terminate(t)
  698. // nil out TLS field so client will use an insecure connection
  699. clus.Members[0].ClientTLSInfo = nil
  700. client, err := NewClientV3(clus.Members[0])
  701. if err != nil && err != grpc.ErrClientConnTimeout {
  702. t.Fatalf("unexpected error (%v)", err)
  703. } else if client == nil {
  704. // Ideally, no client would be returned. However, grpc will
  705. // return a connection without trying to handshake first so
  706. // the connection appears OK.
  707. return
  708. }
  709. defer client.Close()
  710. ctx, cancel := context.WithTimeout(context.TODO(), 5*time.Second)
  711. conn := client.ActiveConnection()
  712. st, err := conn.State()
  713. if err != nil {
  714. t.Fatal(err)
  715. } else if st != grpc.Ready {
  716. t.Fatalf("expected Ready, got %v", st)
  717. }
  718. // rpc will fail to handshake, triggering a connection state change
  719. donec := make(chan error, 1)
  720. go func() {
  721. reqput := &pb.PutRequest{Key: []byte("foo"), Value: []byte("bar")}
  722. _, perr := toGRPC(client).KV.Put(ctx, reqput)
  723. donec <- perr
  724. }()
  725. st, err = conn.WaitForStateChange(ctx, st)
  726. if err != nil {
  727. t.Fatalf("unexpected error waiting for change (%v)", err)
  728. } else if st == grpc.Ready {
  729. t.Fatalf("expected failure state, got %v", st)
  730. }
  731. cancel()
  732. if perr := <-donec; perr == nil {
  733. t.Fatalf("expected client error on put")
  734. }
  735. }
  736. // TestTLSGRPCRejectSecureClient checks that connection is rejected if client is TLS but not server.
  737. func TestTLSGRPCRejectSecureClient(t *testing.T) {
  738. defer testutil.AfterTest(t)
  739. cfg := ClusterConfig{Size: 3}
  740. clus := newClusterV3NoClients(t, &cfg)
  741. defer clus.Terminate(t)
  742. clus.Members[0].ClientTLSInfo = &testTLSInfo
  743. client, err := NewClientV3(clus.Members[0])
  744. if client != nil || err == nil {
  745. t.Fatalf("expected no client")
  746. } else if err != grpc.ErrClientConnTimeout {
  747. t.Fatalf("unexpected error (%v)", err)
  748. }
  749. }
  750. // TestTLSGRPCAcceptSecureAll checks that connection is accepted if both client and server are TLS
  751. func TestTLSGRPCAcceptSecureAll(t *testing.T) {
  752. defer testutil.AfterTest(t)
  753. cfg := ClusterConfig{Size: 3, ClientTLS: &testTLSInfo}
  754. clus := newClusterV3NoClients(t, &cfg)
  755. defer clus.Terminate(t)
  756. client, err := NewClientV3(clus.Members[0])
  757. if err != nil {
  758. t.Fatalf("expected tls client (%v)", err)
  759. }
  760. defer client.Close()
  761. reqput := &pb.PutRequest{Key: []byte("foo"), Value: []byte("bar")}
  762. if _, err := toGRPC(client).KV.Put(context.TODO(), reqput); err != nil {
  763. t.Fatalf("unexpected error on put over tls (%v)", err)
  764. }
  765. }