apply.go 27 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968
  1. // Copyright 2016 The etcd Authors
  2. //
  3. // Licensed under the Apache License, Version 2.0 (the "License");
  4. // you may not use this file except in compliance with the License.
  5. // You may obtain a copy of the License at
  6. //
  7. // http://www.apache.org/licenses/LICENSE-2.0
  8. //
  9. // Unless required by applicable law or agreed to in writing, software
  10. // distributed under the License is distributed on an "AS IS" BASIS,
  11. // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  12. // See the License for the specific language governing permissions and
  13. // limitations under the License.
  14. package etcdserver
  15. import (
  16. "bytes"
  17. "context"
  18. "sort"
  19. "time"
  20. pb "github.com/coreos/etcd/etcdserver/etcdserverpb"
  21. "github.com/coreos/etcd/lease"
  22. "github.com/coreos/etcd/mvcc"
  23. "github.com/coreos/etcd/mvcc/mvccpb"
  24. "github.com/coreos/etcd/pkg/types"
  25. "github.com/gogo/protobuf/proto"
  26. )
  27. const (
  28. warnApplyDuration = 100 * time.Millisecond
  29. )
  30. type applyResult struct {
  31. resp proto.Message
  32. err error
  33. // physc signals the physical effect of the request has completed in addition
  34. // to being logically reflected by the node. Currently only used for
  35. // Compaction requests.
  36. physc <-chan struct{}
  37. }
  38. // applierV3 is the interface for processing V3 raft messages
  39. type applierV3 interface {
  40. Apply(r *pb.InternalRaftRequest) *applyResult
  41. Put(txn mvcc.TxnWrite, p *pb.PutRequest) (*pb.PutResponse, error)
  42. Range(txn mvcc.TxnRead, r *pb.RangeRequest) (*pb.RangeResponse, error)
  43. DeleteRange(txn mvcc.TxnWrite, dr *pb.DeleteRangeRequest) (*pb.DeleteRangeResponse, error)
  44. Txn(rt *pb.TxnRequest) (*pb.TxnResponse, error)
  45. Compaction(compaction *pb.CompactionRequest) (*pb.CompactionResponse, <-chan struct{}, error)
  46. LeaseGrant(lc *pb.LeaseGrantRequest) (*pb.LeaseGrantResponse, error)
  47. LeaseRevoke(lc *pb.LeaseRevokeRequest) (*pb.LeaseRevokeResponse, error)
  48. Alarm(*pb.AlarmRequest) (*pb.AlarmResponse, error)
  49. Authenticate(r *pb.InternalAuthenticateRequest) (*pb.AuthenticateResponse, error)
  50. AuthEnable() (*pb.AuthEnableResponse, error)
  51. AuthDisable() (*pb.AuthDisableResponse, error)
  52. UserAdd(ua *pb.AuthUserAddRequest) (*pb.AuthUserAddResponse, error)
  53. UserDelete(ua *pb.AuthUserDeleteRequest) (*pb.AuthUserDeleteResponse, error)
  54. UserChangePassword(ua *pb.AuthUserChangePasswordRequest) (*pb.AuthUserChangePasswordResponse, error)
  55. UserGrantRole(ua *pb.AuthUserGrantRoleRequest) (*pb.AuthUserGrantRoleResponse, error)
  56. UserGet(ua *pb.AuthUserGetRequest) (*pb.AuthUserGetResponse, error)
  57. UserRevokeRole(ua *pb.AuthUserRevokeRoleRequest) (*pb.AuthUserRevokeRoleResponse, error)
  58. RoleAdd(ua *pb.AuthRoleAddRequest) (*pb.AuthRoleAddResponse, error)
  59. RoleGrantPermission(ua *pb.AuthRoleGrantPermissionRequest) (*pb.AuthRoleGrantPermissionResponse, error)
  60. RoleGet(ua *pb.AuthRoleGetRequest) (*pb.AuthRoleGetResponse, error)
  61. RoleRevokePermission(ua *pb.AuthRoleRevokePermissionRequest) (*pb.AuthRoleRevokePermissionResponse, error)
  62. RoleDelete(ua *pb.AuthRoleDeleteRequest) (*pb.AuthRoleDeleteResponse, error)
  63. UserList(ua *pb.AuthUserListRequest) (*pb.AuthUserListResponse, error)
  64. RoleList(ua *pb.AuthRoleListRequest) (*pb.AuthRoleListResponse, error)
  65. }
  66. type checkReqFunc func(mvcc.ReadView, *pb.RequestOp) error
  67. type applierV3backend struct {
  68. s *EtcdServer
  69. checkPut checkReqFunc
  70. checkRange checkReqFunc
  71. }
  72. func (s *EtcdServer) newApplierV3Backend() applierV3 {
  73. base := &applierV3backend{s: s}
  74. base.checkPut = func(rv mvcc.ReadView, req *pb.RequestOp) error {
  75. return base.checkRequestPut(rv, req)
  76. }
  77. base.checkRange = func(rv mvcc.ReadView, req *pb.RequestOp) error {
  78. return base.checkRequestRange(rv, req)
  79. }
  80. return base
  81. }
  82. func (s *EtcdServer) newApplierV3() applierV3 {
  83. return newAuthApplierV3(
  84. s.AuthStore(),
  85. newQuotaApplierV3(s, s.newApplierV3Backend()),
  86. s.lessor,
  87. )
  88. }
  89. func (a *applierV3backend) Apply(r *pb.InternalRaftRequest) *applyResult {
  90. ar := &applyResult{}
  91. // call into a.s.applyV3.F instead of a.F so upper appliers can check individual calls
  92. switch {
  93. case r.Range != nil:
  94. ar.resp, ar.err = a.s.applyV3.Range(nil, r.Range)
  95. case r.Put != nil:
  96. ar.resp, ar.err = a.s.applyV3.Put(nil, r.Put)
  97. case r.DeleteRange != nil:
  98. ar.resp, ar.err = a.s.applyV3.DeleteRange(nil, r.DeleteRange)
  99. case r.Txn != nil:
  100. ar.resp, ar.err = a.s.applyV3.Txn(r.Txn)
  101. case r.Compaction != nil:
  102. ar.resp, ar.physc, ar.err = a.s.applyV3.Compaction(r.Compaction)
  103. case r.LeaseGrant != nil:
  104. ar.resp, ar.err = a.s.applyV3.LeaseGrant(r.LeaseGrant)
  105. case r.LeaseRevoke != nil:
  106. ar.resp, ar.err = a.s.applyV3.LeaseRevoke(r.LeaseRevoke)
  107. case r.Alarm != nil:
  108. ar.resp, ar.err = a.s.applyV3.Alarm(r.Alarm)
  109. case r.Authenticate != nil:
  110. ar.resp, ar.err = a.s.applyV3.Authenticate(r.Authenticate)
  111. case r.AuthEnable != nil:
  112. ar.resp, ar.err = a.s.applyV3.AuthEnable()
  113. case r.AuthDisable != nil:
  114. ar.resp, ar.err = a.s.applyV3.AuthDisable()
  115. case r.AuthUserAdd != nil:
  116. ar.resp, ar.err = a.s.applyV3.UserAdd(r.AuthUserAdd)
  117. case r.AuthUserDelete != nil:
  118. ar.resp, ar.err = a.s.applyV3.UserDelete(r.AuthUserDelete)
  119. case r.AuthUserChangePassword != nil:
  120. ar.resp, ar.err = a.s.applyV3.UserChangePassword(r.AuthUserChangePassword)
  121. case r.AuthUserGrantRole != nil:
  122. ar.resp, ar.err = a.s.applyV3.UserGrantRole(r.AuthUserGrantRole)
  123. case r.AuthUserGet != nil:
  124. ar.resp, ar.err = a.s.applyV3.UserGet(r.AuthUserGet)
  125. case r.AuthUserRevokeRole != nil:
  126. ar.resp, ar.err = a.s.applyV3.UserRevokeRole(r.AuthUserRevokeRole)
  127. case r.AuthRoleAdd != nil:
  128. ar.resp, ar.err = a.s.applyV3.RoleAdd(r.AuthRoleAdd)
  129. case r.AuthRoleGrantPermission != nil:
  130. ar.resp, ar.err = a.s.applyV3.RoleGrantPermission(r.AuthRoleGrantPermission)
  131. case r.AuthRoleGet != nil:
  132. ar.resp, ar.err = a.s.applyV3.RoleGet(r.AuthRoleGet)
  133. case r.AuthRoleRevokePermission != nil:
  134. ar.resp, ar.err = a.s.applyV3.RoleRevokePermission(r.AuthRoleRevokePermission)
  135. case r.AuthRoleDelete != nil:
  136. ar.resp, ar.err = a.s.applyV3.RoleDelete(r.AuthRoleDelete)
  137. case r.AuthUserList != nil:
  138. ar.resp, ar.err = a.s.applyV3.UserList(r.AuthUserList)
  139. case r.AuthRoleList != nil:
  140. ar.resp, ar.err = a.s.applyV3.RoleList(r.AuthRoleList)
  141. default:
  142. panic("not implemented")
  143. }
  144. return ar
  145. }
  146. func (a *applierV3backend) Put(txn mvcc.TxnWrite, p *pb.PutRequest) (resp *pb.PutResponse, err error) {
  147. resp = &pb.PutResponse{}
  148. resp.Header = &pb.ResponseHeader{}
  149. val, leaseID := p.Value, lease.LeaseID(p.Lease)
  150. if txn == nil {
  151. if leaseID != lease.NoLease {
  152. if l := a.s.lessor.Lookup(leaseID); l == nil {
  153. return nil, lease.ErrLeaseNotFound
  154. }
  155. }
  156. txn = a.s.KV().Write()
  157. defer txn.End()
  158. }
  159. var rr *mvcc.RangeResult
  160. if p.IgnoreValue || p.IgnoreLease || p.PrevKv {
  161. rr, err = txn.Range(p.Key, nil, mvcc.RangeOptions{})
  162. if err != nil {
  163. return nil, err
  164. }
  165. }
  166. if p.IgnoreValue || p.IgnoreLease {
  167. if rr == nil || len(rr.KVs) == 0 {
  168. // ignore_{lease,value} flag expects previous key-value pair
  169. return nil, ErrKeyNotFound
  170. }
  171. }
  172. if p.IgnoreValue {
  173. val = rr.KVs[0].Value
  174. }
  175. if p.IgnoreLease {
  176. leaseID = lease.LeaseID(rr.KVs[0].Lease)
  177. }
  178. if p.PrevKv {
  179. if rr != nil && len(rr.KVs) != 0 {
  180. resp.PrevKv = &rr.KVs[0]
  181. }
  182. }
  183. resp.Header.Revision = txn.Put(p.Key, val, leaseID)
  184. return resp, nil
  185. }
  186. func (a *applierV3backend) DeleteRange(txn mvcc.TxnWrite, dr *pb.DeleteRangeRequest) (*pb.DeleteRangeResponse, error) {
  187. resp := &pb.DeleteRangeResponse{}
  188. resp.Header = &pb.ResponseHeader{}
  189. end := mkGteRange(dr.RangeEnd)
  190. if txn == nil {
  191. txn = a.s.kv.Write()
  192. defer txn.End()
  193. }
  194. if dr.PrevKv {
  195. rr, err := txn.Range(dr.Key, end, mvcc.RangeOptions{})
  196. if err != nil {
  197. return nil, err
  198. }
  199. if rr != nil {
  200. resp.PrevKvs = make([]*mvccpb.KeyValue, len(rr.KVs))
  201. for i := range rr.KVs {
  202. resp.PrevKvs[i] = &rr.KVs[i]
  203. }
  204. }
  205. }
  206. resp.Deleted, resp.Header.Revision = txn.DeleteRange(dr.Key, end)
  207. return resp, nil
  208. }
  209. func (a *applierV3backend) Range(txn mvcc.TxnRead, r *pb.RangeRequest) (*pb.RangeResponse, error) {
  210. resp := &pb.RangeResponse{}
  211. resp.Header = &pb.ResponseHeader{}
  212. if txn == nil {
  213. txn = a.s.kv.Read()
  214. defer txn.End()
  215. }
  216. limit := r.Limit
  217. if r.SortOrder != pb.RangeRequest_NONE ||
  218. r.MinModRevision != 0 || r.MaxModRevision != 0 ||
  219. r.MinCreateRevision != 0 || r.MaxCreateRevision != 0 {
  220. // fetch everything; sort and truncate afterwards
  221. limit = 0
  222. }
  223. if limit > 0 {
  224. // fetch one extra for 'more' flag
  225. limit = limit + 1
  226. }
  227. ro := mvcc.RangeOptions{
  228. Limit: limit,
  229. Rev: r.Revision,
  230. Count: r.CountOnly,
  231. }
  232. rr, err := txn.Range(r.Key, mkGteRange(r.RangeEnd), ro)
  233. if err != nil {
  234. return nil, err
  235. }
  236. if r.MaxModRevision != 0 {
  237. f := func(kv *mvccpb.KeyValue) bool { return kv.ModRevision > r.MaxModRevision }
  238. pruneKVs(rr, f)
  239. }
  240. if r.MinModRevision != 0 {
  241. f := func(kv *mvccpb.KeyValue) bool { return kv.ModRevision < r.MinModRevision }
  242. pruneKVs(rr, f)
  243. }
  244. if r.MaxCreateRevision != 0 {
  245. f := func(kv *mvccpb.KeyValue) bool { return kv.CreateRevision > r.MaxCreateRevision }
  246. pruneKVs(rr, f)
  247. }
  248. if r.MinCreateRevision != 0 {
  249. f := func(kv *mvccpb.KeyValue) bool { return kv.CreateRevision < r.MinCreateRevision }
  250. pruneKVs(rr, f)
  251. }
  252. sortOrder := r.SortOrder
  253. if r.SortTarget != pb.RangeRequest_KEY && sortOrder == pb.RangeRequest_NONE {
  254. // Since current mvcc.Range implementation returns results
  255. // sorted by keys in lexiographically ascending order,
  256. // sort ASCEND by default only when target is not 'KEY'
  257. sortOrder = pb.RangeRequest_ASCEND
  258. }
  259. if sortOrder != pb.RangeRequest_NONE {
  260. var sorter sort.Interface
  261. switch {
  262. case r.SortTarget == pb.RangeRequest_KEY:
  263. sorter = &kvSortByKey{&kvSort{rr.KVs}}
  264. case r.SortTarget == pb.RangeRequest_VERSION:
  265. sorter = &kvSortByVersion{&kvSort{rr.KVs}}
  266. case r.SortTarget == pb.RangeRequest_CREATE:
  267. sorter = &kvSortByCreate{&kvSort{rr.KVs}}
  268. case r.SortTarget == pb.RangeRequest_MOD:
  269. sorter = &kvSortByMod{&kvSort{rr.KVs}}
  270. case r.SortTarget == pb.RangeRequest_VALUE:
  271. sorter = &kvSortByValue{&kvSort{rr.KVs}}
  272. }
  273. switch {
  274. case sortOrder == pb.RangeRequest_ASCEND:
  275. sort.Sort(sorter)
  276. case sortOrder == pb.RangeRequest_DESCEND:
  277. sort.Sort(sort.Reverse(sorter))
  278. }
  279. }
  280. if r.Limit > 0 && len(rr.KVs) > int(r.Limit) {
  281. rr.KVs = rr.KVs[:r.Limit]
  282. resp.More = true
  283. }
  284. resp.Header.Revision = rr.Rev
  285. resp.Count = int64(rr.Count)
  286. resp.Kvs = make([]*mvccpb.KeyValue, len(rr.KVs))
  287. for i := range rr.KVs {
  288. if r.KeysOnly {
  289. rr.KVs[i].Value = nil
  290. }
  291. resp.Kvs[i] = &rr.KVs[i]
  292. }
  293. return resp, nil
  294. }
  295. func (a *applierV3backend) Txn(rt *pb.TxnRequest) (*pb.TxnResponse, error) {
  296. isWrite := !isTxnReadonly(rt)
  297. txn := mvcc.NewReadOnlyTxnWrite(a.s.KV().Read())
  298. txnPath := compareToPath(txn, rt)
  299. if isWrite {
  300. if _, err := checkRequests(txn, rt, txnPath, a.checkPut); err != nil {
  301. txn.End()
  302. return nil, err
  303. }
  304. }
  305. if _, err := checkRequests(txn, rt, txnPath, a.checkRange); err != nil {
  306. txn.End()
  307. return nil, err
  308. }
  309. txnResp, _ := newTxnResp(rt, txnPath)
  310. // When executing mutable txn ops, etcd must hold the txn lock so
  311. // readers do not see any intermediate results. Since writes are
  312. // serialized on the raft loop, the revision in the read view will
  313. // be the revision of the write txn.
  314. if isWrite {
  315. txn.End()
  316. txn = a.s.KV().Write()
  317. }
  318. a.applyTxn(txn, rt, txnPath, txnResp)
  319. rev := txn.Rev()
  320. if len(txn.Changes()) != 0 {
  321. rev++
  322. }
  323. txn.End()
  324. txnResp.Header.Revision = rev
  325. return txnResp, nil
  326. }
  327. // newTxnResp allocates a txn response for a txn request given a path.
  328. func newTxnResp(rt *pb.TxnRequest, txnPath []bool) (txnResp *pb.TxnResponse, txnCount int) {
  329. reqs := rt.Success
  330. if !txnPath[0] {
  331. reqs = rt.Failure
  332. }
  333. resps := make([]*pb.ResponseOp, len(reqs))
  334. txnResp = &pb.TxnResponse{
  335. Responses: resps,
  336. Succeeded: txnPath[0],
  337. Header: &pb.ResponseHeader{},
  338. }
  339. for i, req := range reqs {
  340. switch tv := req.Request.(type) {
  341. case *pb.RequestOp_RequestRange:
  342. resps[i] = &pb.ResponseOp{Response: &pb.ResponseOp_ResponseRange{}}
  343. case *pb.RequestOp_RequestPut:
  344. resps[i] = &pb.ResponseOp{Response: &pb.ResponseOp_ResponsePut{}}
  345. case *pb.RequestOp_RequestDeleteRange:
  346. resps[i] = &pb.ResponseOp{Response: &pb.ResponseOp_ResponseDeleteRange{}}
  347. case *pb.RequestOp_RequestTxn:
  348. resp, txns := newTxnResp(tv.RequestTxn, txnPath[1:])
  349. resps[i] = &pb.ResponseOp{Response: &pb.ResponseOp_ResponseTxn{ResponseTxn: resp}}
  350. txnPath = txnPath[1+txns:]
  351. txnCount += txns + 1
  352. default:
  353. }
  354. }
  355. return txnResp, txnCount
  356. }
  357. func compareToPath(rv mvcc.ReadView, rt *pb.TxnRequest) []bool {
  358. txnPath := make([]bool, 1)
  359. ops := rt.Success
  360. if txnPath[0] = applyCompares(rv, rt.Compare); !txnPath[0] {
  361. ops = rt.Failure
  362. }
  363. for _, op := range ops {
  364. tv, ok := op.Request.(*pb.RequestOp_RequestTxn)
  365. if !ok || tv.RequestTxn == nil {
  366. continue
  367. }
  368. txnPath = append(txnPath, compareToPath(rv, tv.RequestTxn)...)
  369. }
  370. return txnPath
  371. }
  372. func applyCompares(rv mvcc.ReadView, cmps []*pb.Compare) bool {
  373. for _, c := range cmps {
  374. if !applyCompare(rv, c) {
  375. return false
  376. }
  377. }
  378. return true
  379. }
  380. // applyCompare applies the compare request.
  381. // If the comparison succeeds, it returns true. Otherwise, returns false.
  382. func applyCompare(rv mvcc.ReadView, c *pb.Compare) bool {
  383. // TODO: possible optimizations
  384. // * chunk reads for large ranges to conserve memory
  385. // * rewrite rules for common patterns:
  386. // ex. "[a, b) createrev > 0" => "limit 1 /\ kvs > 0"
  387. // * caching
  388. rr, err := rv.Range(c.Key, mkGteRange(c.RangeEnd), mvcc.RangeOptions{})
  389. if err != nil {
  390. return false
  391. }
  392. if len(rr.KVs) == 0 {
  393. if c.Target == pb.Compare_VALUE {
  394. // Always fail if comparing a value on a key/keys that doesn't exist;
  395. // nil == empty string in grpc; no way to represent missing value
  396. return false
  397. }
  398. return compareKV(c, mvccpb.KeyValue{})
  399. }
  400. for _, kv := range rr.KVs {
  401. if !compareKV(c, kv) {
  402. return false
  403. }
  404. }
  405. return true
  406. }
  407. func compareKV(c *pb.Compare, ckv mvccpb.KeyValue) bool {
  408. var result int
  409. rev := int64(0)
  410. switch c.Target {
  411. case pb.Compare_VALUE:
  412. v := []byte{}
  413. if tv, _ := c.TargetUnion.(*pb.Compare_Value); tv != nil {
  414. v = tv.Value
  415. }
  416. result = bytes.Compare(ckv.Value, v)
  417. case pb.Compare_CREATE:
  418. if tv, _ := c.TargetUnion.(*pb.Compare_CreateRevision); tv != nil {
  419. rev = tv.CreateRevision
  420. }
  421. result = compareInt64(ckv.CreateRevision, rev)
  422. case pb.Compare_MOD:
  423. if tv, _ := c.TargetUnion.(*pb.Compare_ModRevision); tv != nil {
  424. rev = tv.ModRevision
  425. }
  426. result = compareInt64(ckv.ModRevision, rev)
  427. case pb.Compare_VERSION:
  428. if tv, _ := c.TargetUnion.(*pb.Compare_Version); tv != nil {
  429. rev = tv.Version
  430. }
  431. result = compareInt64(ckv.Version, rev)
  432. case pb.Compare_LEASE:
  433. if tv, _ := c.TargetUnion.(*pb.Compare_Lease); tv != nil {
  434. rev = tv.Lease
  435. }
  436. result = compareInt64(ckv.Lease, rev)
  437. }
  438. switch c.Result {
  439. case pb.Compare_EQUAL:
  440. return result == 0
  441. case pb.Compare_NOT_EQUAL:
  442. return result != 0
  443. case pb.Compare_GREATER:
  444. return result > 0
  445. case pb.Compare_LESS:
  446. return result < 0
  447. }
  448. return true
  449. }
  450. func (a *applierV3backend) applyTxn(txn mvcc.TxnWrite, rt *pb.TxnRequest, txnPath []bool, tresp *pb.TxnResponse) (txns int) {
  451. reqs := rt.Success
  452. if !txnPath[0] {
  453. reqs = rt.Failure
  454. }
  455. for i, req := range reqs {
  456. respi := tresp.Responses[i].Response
  457. switch tv := req.Request.(type) {
  458. case *pb.RequestOp_RequestRange:
  459. resp, err := a.Range(txn, tv.RequestRange)
  460. if err != nil {
  461. plog.Panicf("unexpected error during txn: %v", err)
  462. }
  463. respi.(*pb.ResponseOp_ResponseRange).ResponseRange = resp
  464. case *pb.RequestOp_RequestPut:
  465. resp, err := a.Put(txn, tv.RequestPut)
  466. if err != nil {
  467. plog.Panicf("unexpected error during txn: %v", err)
  468. }
  469. respi.(*pb.ResponseOp_ResponsePut).ResponsePut = resp
  470. case *pb.RequestOp_RequestDeleteRange:
  471. resp, err := a.DeleteRange(txn, tv.RequestDeleteRange)
  472. if err != nil {
  473. plog.Panicf("unexpected error during txn: %v", err)
  474. }
  475. respi.(*pb.ResponseOp_ResponseDeleteRange).ResponseDeleteRange = resp
  476. case *pb.RequestOp_RequestTxn:
  477. resp := respi.(*pb.ResponseOp_ResponseTxn).ResponseTxn
  478. applyTxns := a.applyTxn(txn, tv.RequestTxn, txnPath[1:], resp)
  479. txns += applyTxns + 1
  480. txnPath = txnPath[applyTxns+1:]
  481. default:
  482. // empty union
  483. }
  484. }
  485. return txns
  486. }
  487. func (a *applierV3backend) Compaction(compaction *pb.CompactionRequest) (*pb.CompactionResponse, <-chan struct{}, error) {
  488. resp := &pb.CompactionResponse{}
  489. resp.Header = &pb.ResponseHeader{}
  490. ch, err := a.s.KV().Compact(compaction.Revision)
  491. if err != nil {
  492. return nil, ch, err
  493. }
  494. // get the current revision. which key to get is not important.
  495. rr, _ := a.s.KV().Range([]byte("compaction"), nil, mvcc.RangeOptions{})
  496. resp.Header.Revision = rr.Rev
  497. return resp, ch, err
  498. }
  499. func (a *applierV3backend) LeaseGrant(lc *pb.LeaseGrantRequest) (*pb.LeaseGrantResponse, error) {
  500. l, err := a.s.lessor.Grant(lease.LeaseID(lc.ID), lc.TTL)
  501. resp := &pb.LeaseGrantResponse{}
  502. if err == nil {
  503. resp.ID = int64(l.ID)
  504. resp.TTL = l.TTL()
  505. resp.Header = newHeader(a.s)
  506. }
  507. return resp, err
  508. }
  509. func (a *applierV3backend) LeaseRevoke(lc *pb.LeaseRevokeRequest) (*pb.LeaseRevokeResponse, error) {
  510. err := a.s.lessor.Revoke(lease.LeaseID(lc.ID))
  511. return &pb.LeaseRevokeResponse{Header: newHeader(a.s)}, err
  512. }
  513. func (a *applierV3backend) Alarm(ar *pb.AlarmRequest) (*pb.AlarmResponse, error) {
  514. resp := &pb.AlarmResponse{}
  515. oldCount := len(a.s.alarmStore.Get(ar.Alarm))
  516. switch ar.Action {
  517. case pb.AlarmRequest_GET:
  518. resp.Alarms = a.s.alarmStore.Get(ar.Alarm)
  519. case pb.AlarmRequest_ACTIVATE:
  520. m := a.s.alarmStore.Activate(types.ID(ar.MemberID), ar.Alarm)
  521. if m == nil {
  522. break
  523. }
  524. resp.Alarms = append(resp.Alarms, m)
  525. activated := oldCount == 0 && len(a.s.alarmStore.Get(m.Alarm)) == 1
  526. if !activated {
  527. break
  528. }
  529. plog.Warningf("alarm %v raised by peer %s", m.Alarm, types.ID(m.MemberID))
  530. switch m.Alarm {
  531. case pb.AlarmType_CORRUPT:
  532. a.s.applyV3 = newApplierV3Corrupt(a)
  533. case pb.AlarmType_NOSPACE:
  534. a.s.applyV3 = newApplierV3Capped(a)
  535. default:
  536. plog.Errorf("unimplemented alarm activation (%+v)", m)
  537. }
  538. case pb.AlarmRequest_DEACTIVATE:
  539. m := a.s.alarmStore.Deactivate(types.ID(ar.MemberID), ar.Alarm)
  540. if m == nil {
  541. break
  542. }
  543. resp.Alarms = append(resp.Alarms, m)
  544. deactivated := oldCount > 0 && len(a.s.alarmStore.Get(ar.Alarm)) == 0
  545. if !deactivated {
  546. break
  547. }
  548. switch m.Alarm {
  549. case pb.AlarmType_NOSPACE, pb.AlarmType_CORRUPT:
  550. // TODO: check kv hash before deactivating CORRUPT?
  551. plog.Infof("alarm disarmed %+v", ar)
  552. a.s.applyV3 = a.s.newApplierV3()
  553. default:
  554. plog.Errorf("unimplemented alarm deactivation (%+v)", m)
  555. }
  556. default:
  557. return nil, nil
  558. }
  559. return resp, nil
  560. }
  561. type applierV3Capped struct {
  562. applierV3
  563. q backendQuota
  564. }
  565. // newApplierV3Capped creates an applyV3 that will reject Puts and transactions
  566. // with Puts so that the number of keys in the store is capped.
  567. func newApplierV3Capped(base applierV3) applierV3 { return &applierV3Capped{applierV3: base} }
  568. func (a *applierV3Capped) Put(txn mvcc.TxnWrite, p *pb.PutRequest) (*pb.PutResponse, error) {
  569. return nil, ErrNoSpace
  570. }
  571. func (a *applierV3Capped) Txn(r *pb.TxnRequest) (*pb.TxnResponse, error) {
  572. if a.q.Cost(r) > 0 {
  573. return nil, ErrNoSpace
  574. }
  575. return a.applierV3.Txn(r)
  576. }
  577. func (a *applierV3Capped) LeaseGrant(lc *pb.LeaseGrantRequest) (*pb.LeaseGrantResponse, error) {
  578. return nil, ErrNoSpace
  579. }
  580. func (a *applierV3backend) AuthEnable() (*pb.AuthEnableResponse, error) {
  581. err := a.s.AuthStore().AuthEnable()
  582. if err != nil {
  583. return nil, err
  584. }
  585. return &pb.AuthEnableResponse{Header: newHeader(a.s)}, nil
  586. }
  587. func (a *applierV3backend) AuthDisable() (*pb.AuthDisableResponse, error) {
  588. a.s.AuthStore().AuthDisable()
  589. return &pb.AuthDisableResponse{Header: newHeader(a.s)}, nil
  590. }
  591. func (a *applierV3backend) Authenticate(r *pb.InternalAuthenticateRequest) (*pb.AuthenticateResponse, error) {
  592. ctx := context.WithValue(context.WithValue(a.s.ctx, "index", a.s.consistIndex.ConsistentIndex()), "simpleToken", r.SimpleToken)
  593. resp, err := a.s.AuthStore().Authenticate(ctx, r.Name, r.Password)
  594. if resp != nil {
  595. resp.Header = newHeader(a.s)
  596. }
  597. return resp, err
  598. }
  599. func (a *applierV3backend) UserAdd(r *pb.AuthUserAddRequest) (*pb.AuthUserAddResponse, error) {
  600. resp, err := a.s.AuthStore().UserAdd(r)
  601. if resp != nil {
  602. resp.Header = newHeader(a.s)
  603. }
  604. return resp, err
  605. }
  606. func (a *applierV3backend) UserDelete(r *pb.AuthUserDeleteRequest) (*pb.AuthUserDeleteResponse, error) {
  607. resp, err := a.s.AuthStore().UserDelete(r)
  608. if resp != nil {
  609. resp.Header = newHeader(a.s)
  610. }
  611. return resp, err
  612. }
  613. func (a *applierV3backend) UserChangePassword(r *pb.AuthUserChangePasswordRequest) (*pb.AuthUserChangePasswordResponse, error) {
  614. resp, err := a.s.AuthStore().UserChangePassword(r)
  615. if resp != nil {
  616. resp.Header = newHeader(a.s)
  617. }
  618. return resp, err
  619. }
  620. func (a *applierV3backend) UserGrantRole(r *pb.AuthUserGrantRoleRequest) (*pb.AuthUserGrantRoleResponse, error) {
  621. resp, err := a.s.AuthStore().UserGrantRole(r)
  622. if resp != nil {
  623. resp.Header = newHeader(a.s)
  624. }
  625. return resp, err
  626. }
  627. func (a *applierV3backend) UserGet(r *pb.AuthUserGetRequest) (*pb.AuthUserGetResponse, error) {
  628. resp, err := a.s.AuthStore().UserGet(r)
  629. if resp != nil {
  630. resp.Header = newHeader(a.s)
  631. }
  632. return resp, err
  633. }
  634. func (a *applierV3backend) UserRevokeRole(r *pb.AuthUserRevokeRoleRequest) (*pb.AuthUserRevokeRoleResponse, error) {
  635. resp, err := a.s.AuthStore().UserRevokeRole(r)
  636. if resp != nil {
  637. resp.Header = newHeader(a.s)
  638. }
  639. return resp, err
  640. }
  641. func (a *applierV3backend) RoleAdd(r *pb.AuthRoleAddRequest) (*pb.AuthRoleAddResponse, error) {
  642. resp, err := a.s.AuthStore().RoleAdd(r)
  643. if resp != nil {
  644. resp.Header = newHeader(a.s)
  645. }
  646. return resp, err
  647. }
  648. func (a *applierV3backend) RoleGrantPermission(r *pb.AuthRoleGrantPermissionRequest) (*pb.AuthRoleGrantPermissionResponse, error) {
  649. resp, err := a.s.AuthStore().RoleGrantPermission(r)
  650. if resp != nil {
  651. resp.Header = newHeader(a.s)
  652. }
  653. return resp, err
  654. }
  655. func (a *applierV3backend) RoleGet(r *pb.AuthRoleGetRequest) (*pb.AuthRoleGetResponse, error) {
  656. resp, err := a.s.AuthStore().RoleGet(r)
  657. if resp != nil {
  658. resp.Header = newHeader(a.s)
  659. }
  660. return resp, err
  661. }
  662. func (a *applierV3backend) RoleRevokePermission(r *pb.AuthRoleRevokePermissionRequest) (*pb.AuthRoleRevokePermissionResponse, error) {
  663. resp, err := a.s.AuthStore().RoleRevokePermission(r)
  664. if resp != nil {
  665. resp.Header = newHeader(a.s)
  666. }
  667. return resp, err
  668. }
  669. func (a *applierV3backend) RoleDelete(r *pb.AuthRoleDeleteRequest) (*pb.AuthRoleDeleteResponse, error) {
  670. resp, err := a.s.AuthStore().RoleDelete(r)
  671. if resp != nil {
  672. resp.Header = newHeader(a.s)
  673. }
  674. return resp, err
  675. }
  676. func (a *applierV3backend) UserList(r *pb.AuthUserListRequest) (*pb.AuthUserListResponse, error) {
  677. resp, err := a.s.AuthStore().UserList(r)
  678. if resp != nil {
  679. resp.Header = newHeader(a.s)
  680. }
  681. return resp, err
  682. }
  683. func (a *applierV3backend) RoleList(r *pb.AuthRoleListRequest) (*pb.AuthRoleListResponse, error) {
  684. resp, err := a.s.AuthStore().RoleList(r)
  685. if resp != nil {
  686. resp.Header = newHeader(a.s)
  687. }
  688. return resp, err
  689. }
  690. type quotaApplierV3 struct {
  691. applierV3
  692. q Quota
  693. }
  694. func newQuotaApplierV3(s *EtcdServer, app applierV3) applierV3 {
  695. return &quotaApplierV3{app, NewBackendQuota(s)}
  696. }
  697. func (a *quotaApplierV3) Put(txn mvcc.TxnWrite, p *pb.PutRequest) (*pb.PutResponse, error) {
  698. ok := a.q.Available(p)
  699. resp, err := a.applierV3.Put(txn, p)
  700. if err == nil && !ok {
  701. err = ErrNoSpace
  702. }
  703. return resp, err
  704. }
  705. func (a *quotaApplierV3) Txn(rt *pb.TxnRequest) (*pb.TxnResponse, error) {
  706. ok := a.q.Available(rt)
  707. resp, err := a.applierV3.Txn(rt)
  708. if err == nil && !ok {
  709. err = ErrNoSpace
  710. }
  711. return resp, err
  712. }
  713. func (a *quotaApplierV3) LeaseGrant(lc *pb.LeaseGrantRequest) (*pb.LeaseGrantResponse, error) {
  714. ok := a.q.Available(lc)
  715. resp, err := a.applierV3.LeaseGrant(lc)
  716. if err == nil && !ok {
  717. err = ErrNoSpace
  718. }
  719. return resp, err
  720. }
  721. type kvSort struct{ kvs []mvccpb.KeyValue }
  722. func (s *kvSort) Swap(i, j int) {
  723. t := s.kvs[i]
  724. s.kvs[i] = s.kvs[j]
  725. s.kvs[j] = t
  726. }
  727. func (s *kvSort) Len() int { return len(s.kvs) }
  728. type kvSortByKey struct{ *kvSort }
  729. func (s *kvSortByKey) Less(i, j int) bool {
  730. return bytes.Compare(s.kvs[i].Key, s.kvs[j].Key) < 0
  731. }
  732. type kvSortByVersion struct{ *kvSort }
  733. func (s *kvSortByVersion) Less(i, j int) bool {
  734. return (s.kvs[i].Version - s.kvs[j].Version) < 0
  735. }
  736. type kvSortByCreate struct{ *kvSort }
  737. func (s *kvSortByCreate) Less(i, j int) bool {
  738. return (s.kvs[i].CreateRevision - s.kvs[j].CreateRevision) < 0
  739. }
  740. type kvSortByMod struct{ *kvSort }
  741. func (s *kvSortByMod) Less(i, j int) bool {
  742. return (s.kvs[i].ModRevision - s.kvs[j].ModRevision) < 0
  743. }
  744. type kvSortByValue struct{ *kvSort }
  745. func (s *kvSortByValue) Less(i, j int) bool {
  746. return bytes.Compare(s.kvs[i].Value, s.kvs[j].Value) < 0
  747. }
  748. func checkRequests(rv mvcc.ReadView, rt *pb.TxnRequest, txnPath []bool, f checkReqFunc) (int, error) {
  749. txnCount := 0
  750. reqs := rt.Success
  751. if !txnPath[0] {
  752. reqs = rt.Failure
  753. }
  754. for _, req := range reqs {
  755. if tv, ok := req.Request.(*pb.RequestOp_RequestTxn); ok && tv.RequestTxn != nil {
  756. txns, err := checkRequests(rv, tv.RequestTxn, txnPath[1:], f)
  757. if err != nil {
  758. return 0, err
  759. }
  760. txnCount += txns + 1
  761. txnPath = txnPath[txns+1:]
  762. continue
  763. }
  764. if err := f(rv, req); err != nil {
  765. return 0, err
  766. }
  767. }
  768. return txnCount, nil
  769. }
  770. func (a *applierV3backend) checkRequestPut(rv mvcc.ReadView, reqOp *pb.RequestOp) error {
  771. tv, ok := reqOp.Request.(*pb.RequestOp_RequestPut)
  772. if !ok || tv.RequestPut == nil {
  773. return nil
  774. }
  775. req := tv.RequestPut
  776. if req.IgnoreValue || req.IgnoreLease {
  777. // expects previous key-value, error if not exist
  778. rr, err := rv.Range(req.Key, nil, mvcc.RangeOptions{})
  779. if err != nil {
  780. return err
  781. }
  782. if rr == nil || len(rr.KVs) == 0 {
  783. return ErrKeyNotFound
  784. }
  785. }
  786. if lease.LeaseID(req.Lease) != lease.NoLease {
  787. if l := a.s.lessor.Lookup(lease.LeaseID(req.Lease)); l == nil {
  788. return lease.ErrLeaseNotFound
  789. }
  790. }
  791. return nil
  792. }
  793. func (a *applierV3backend) checkRequestRange(rv mvcc.ReadView, reqOp *pb.RequestOp) error {
  794. tv, ok := reqOp.Request.(*pb.RequestOp_RequestRange)
  795. if !ok || tv.RequestRange == nil {
  796. return nil
  797. }
  798. req := tv.RequestRange
  799. switch {
  800. case req.Revision == 0:
  801. return nil
  802. case req.Revision > rv.Rev():
  803. return mvcc.ErrFutureRev
  804. case req.Revision < rv.FirstRev():
  805. return mvcc.ErrCompacted
  806. }
  807. return nil
  808. }
  809. func compareInt64(a, b int64) int {
  810. switch {
  811. case a < b:
  812. return -1
  813. case a > b:
  814. return 1
  815. default:
  816. return 0
  817. }
  818. }
  819. // mkGteRange determines if the range end is a >= range. This works around grpc
  820. // sending empty byte strings as nil; >= is encoded in the range end as '\0'.
  821. // If it is a GTE range, then []byte{} is returned to indicate the empty byte
  822. // string (vs nil being no byte string).
  823. func mkGteRange(rangeEnd []byte) []byte {
  824. if len(rangeEnd) == 1 && rangeEnd[0] == 0 {
  825. return []byte{}
  826. }
  827. return rangeEnd
  828. }
  829. func noSideEffect(r *pb.InternalRaftRequest) bool {
  830. return r.Range != nil || r.AuthUserGet != nil || r.AuthRoleGet != nil
  831. }
  832. func removeNeedlessRangeReqs(txn *pb.TxnRequest) {
  833. f := func(ops []*pb.RequestOp) []*pb.RequestOp {
  834. j := 0
  835. for i := 0; i < len(ops); i++ {
  836. if _, ok := ops[i].Request.(*pb.RequestOp_RequestRange); ok {
  837. continue
  838. }
  839. ops[j] = ops[i]
  840. j++
  841. }
  842. return ops[:j]
  843. }
  844. txn.Success = f(txn.Success)
  845. txn.Failure = f(txn.Failure)
  846. }
  847. func pruneKVs(rr *mvcc.RangeResult, isPrunable func(*mvccpb.KeyValue) bool) {
  848. j := 0
  849. for i := range rr.KVs {
  850. rr.KVs[j] = rr.KVs[i]
  851. if !isPrunable(&rr.KVs[i]) {
  852. j++
  853. }
  854. }
  855. rr.KVs = rr.KVs[:j]
  856. }
  857. func newHeader(s *EtcdServer) *pb.ResponseHeader {
  858. return &pb.ResponseHeader{
  859. ClusterId: uint64(s.Cluster().ID()),
  860. MemberId: uint64(s.ID()),
  861. Revision: s.KV().Rev(),
  862. RaftTerm: s.Term(),
  863. }
  864. }