apply.go 21 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762
  1. // Copyright 2016 The etcd Authors
  2. //
  3. // Licensed under the Apache License, Version 2.0 (the "License");
  4. // you may not use this file except in compliance with the License.
  5. // You may obtain a copy of the License at
  6. //
  7. // http://www.apache.org/licenses/LICENSE-2.0
  8. //
  9. // Unless required by applicable law or agreed to in writing, software
  10. // distributed under the License is distributed on an "AS IS" BASIS,
  11. // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  12. // See the License for the specific language governing permissions and
  13. // limitations under the License.
  14. package etcdserver
  15. import (
  16. "bytes"
  17. "fmt"
  18. "sort"
  19. "time"
  20. "github.com/coreos/etcd/auth"
  21. pb "github.com/coreos/etcd/etcdserver/etcdserverpb"
  22. "github.com/coreos/etcd/lease"
  23. "github.com/coreos/etcd/mvcc"
  24. "github.com/coreos/etcd/mvcc/mvccpb"
  25. "github.com/coreos/etcd/pkg/types"
  26. "github.com/gogo/protobuf/proto"
  27. "golang.org/x/net/context"
  28. )
  29. const (
  30. // noTxn is an invalid txn ID.
  31. // To apply with independent Range, Put, Delete, you can pass noTxn
  32. // to apply functions instead of a valid txn ID.
  33. noTxn = -1
  34. warnApplyDuration = 10 * time.Millisecond
  35. )
  36. type applyResult struct {
  37. resp proto.Message
  38. err error
  39. // physc signals the physical effect of the request has completed in addition
  40. // to being logically reflected by the node. Currently only used for
  41. // Compaction requests.
  42. physc <-chan struct{}
  43. }
  44. // applierV3 is the interface for processing V3 raft messages
  45. type applierV3 interface {
  46. Put(txnID int64, p *pb.PutRequest) (*pb.PutResponse, error)
  47. Range(txnID int64, r *pb.RangeRequest) (*pb.RangeResponse, error)
  48. DeleteRange(txnID int64, dr *pb.DeleteRangeRequest) (*pb.DeleteRangeResponse, error)
  49. Txn(rt *pb.TxnRequest) (*pb.TxnResponse, error)
  50. Compaction(compaction *pb.CompactionRequest) (*pb.CompactionResponse, <-chan struct{}, error)
  51. LeaseGrant(lc *pb.LeaseGrantRequest) (*pb.LeaseGrantResponse, error)
  52. LeaseRevoke(lc *pb.LeaseRevokeRequest) (*pb.LeaseRevokeResponse, error)
  53. Alarm(*pb.AlarmRequest) (*pb.AlarmResponse, error)
  54. AuthEnable() (*pb.AuthEnableResponse, error)
  55. AuthDisable() (*pb.AuthDisableResponse, error)
  56. Authenticate(ctx context.Context, username, password string) (*pb.AuthenticateResponse, error)
  57. UserAdd(ua *pb.AuthUserAddRequest) (*pb.AuthUserAddResponse, error)
  58. UserDelete(ua *pb.AuthUserDeleteRequest) (*pb.AuthUserDeleteResponse, error)
  59. UserChangePassword(ua *pb.AuthUserChangePasswordRequest) (*pb.AuthUserChangePasswordResponse, error)
  60. UserGrantRole(ua *pb.AuthUserGrantRoleRequest) (*pb.AuthUserGrantRoleResponse, error)
  61. UserGet(ua *pb.AuthUserGetRequest) (*pb.AuthUserGetResponse, error)
  62. UserRevokeRole(ua *pb.AuthUserRevokeRoleRequest) (*pb.AuthUserRevokeRoleResponse, error)
  63. RoleAdd(ua *pb.AuthRoleAddRequest) (*pb.AuthRoleAddResponse, error)
  64. RoleGrantPermission(ua *pb.AuthRoleGrantPermissionRequest) (*pb.AuthRoleGrantPermissionResponse, error)
  65. RoleGet(ua *pb.AuthRoleGetRequest) (*pb.AuthRoleGetResponse, error)
  66. RoleRevokePermission(ua *pb.AuthRoleRevokePermissionRequest) (*pb.AuthRoleRevokePermissionResponse, error)
  67. RoleDelete(ua *pb.AuthRoleDeleteRequest) (*pb.AuthRoleDeleteResponse, error)
  68. }
  69. type applierV3backend struct {
  70. s *EtcdServer
  71. }
  72. func (s *EtcdServer) applyV3Request(r *pb.InternalRaftRequest) *applyResult {
  73. ar := &applyResult{}
  74. username := r.Header.Username
  75. if needAdminPermission(r) && !s.AuthStore().IsAdminPermitted(username) {
  76. ar.err = auth.ErrPermissionDenied
  77. return ar
  78. }
  79. switch {
  80. case r.Range != nil:
  81. if s.AuthStore().IsRangePermitted(r.Header, r.Range.Key, r.Range.RangeEnd) {
  82. ar.resp, ar.err = s.applyV3.Range(noTxn, r.Range)
  83. } else {
  84. ar.err = auth.ErrPermissionDenied
  85. }
  86. case r.Put != nil:
  87. if s.AuthStore().IsPutPermitted(r.Header, r.Put.Key) {
  88. ar.resp, ar.err = s.applyV3.Put(noTxn, r.Put)
  89. } else {
  90. ar.err = auth.ErrPermissionDenied
  91. }
  92. case r.DeleteRange != nil:
  93. if s.AuthStore().IsDeleteRangePermitted(r.Header.Username, r.DeleteRange.Key, r.DeleteRange.RangeEnd) {
  94. ar.resp, ar.err = s.applyV3.DeleteRange(noTxn, r.DeleteRange)
  95. } else {
  96. ar.err = auth.ErrPermissionDenied
  97. }
  98. case r.Txn != nil:
  99. ar.resp, ar.err = s.applyV3.Txn(r.Txn)
  100. case r.Compaction != nil:
  101. ar.resp, ar.physc, ar.err = s.applyV3.Compaction(r.Compaction)
  102. case r.LeaseGrant != nil:
  103. ar.resp, ar.err = s.applyV3.LeaseGrant(r.LeaseGrant)
  104. case r.LeaseRevoke != nil:
  105. ar.resp, ar.err = s.applyV3.LeaseRevoke(r.LeaseRevoke)
  106. case r.Alarm != nil:
  107. ar.resp, ar.err = s.applyV3.Alarm(r.Alarm)
  108. case r.AuthEnable != nil:
  109. ar.resp, ar.err = s.applyV3.AuthEnable()
  110. case r.AuthDisable != nil:
  111. ar.resp, ar.err = s.applyV3.AuthDisable()
  112. case r.Authenticate != nil:
  113. ctx := context.WithValue(context.WithValue(context.TODO(), "index", s.consistIndex.ConsistentIndex()), "simpleToken", r.Authenticate.SimpleToken)
  114. ar.resp, ar.err = s.applyV3.Authenticate(ctx, r.Authenticate.Name, r.Authenticate.Password)
  115. case r.AuthUserAdd != nil:
  116. ar.resp, ar.err = s.applyV3.UserAdd(r.AuthUserAdd)
  117. case r.AuthUserDelete != nil:
  118. ar.resp, ar.err = s.applyV3.UserDelete(r.AuthUserDelete)
  119. case r.AuthUserChangePassword != nil:
  120. ar.resp, ar.err = s.applyV3.UserChangePassword(r.AuthUserChangePassword)
  121. case r.AuthUserGrantRole != nil:
  122. ar.resp, ar.err = s.applyV3.UserGrantRole(r.AuthUserGrantRole)
  123. case r.AuthUserGet != nil:
  124. ar.resp, ar.err = s.applyV3.UserGet(r.AuthUserGet)
  125. case r.AuthUserRevokeRole != nil:
  126. ar.resp, ar.err = s.applyV3.UserRevokeRole(r.AuthUserRevokeRole)
  127. case r.AuthRoleAdd != nil:
  128. ar.resp, ar.err = s.applyV3.RoleAdd(r.AuthRoleAdd)
  129. case r.AuthRoleGrantPermission != nil:
  130. ar.resp, ar.err = s.applyV3.RoleGrantPermission(r.AuthRoleGrantPermission)
  131. case r.AuthRoleGet != nil:
  132. ar.resp, ar.err = s.applyV3.RoleGet(r.AuthRoleGet)
  133. case r.AuthRoleRevokePermission != nil:
  134. ar.resp, ar.err = s.applyV3.RoleRevokePermission(r.AuthRoleRevokePermission)
  135. case r.AuthRoleDelete != nil:
  136. ar.resp, ar.err = s.applyV3.RoleDelete(r.AuthRoleDelete)
  137. default:
  138. panic("not implemented")
  139. }
  140. return ar
  141. }
  142. func (a *applierV3backend) Put(txnID int64, p *pb.PutRequest) (*pb.PutResponse, error) {
  143. resp := &pb.PutResponse{}
  144. resp.Header = &pb.ResponseHeader{}
  145. var (
  146. rev int64
  147. err error
  148. )
  149. if txnID != noTxn {
  150. rev, err = a.s.KV().TxnPut(txnID, p.Key, p.Value, lease.LeaseID(p.Lease))
  151. if err != nil {
  152. return nil, err
  153. }
  154. } else {
  155. leaseID := lease.LeaseID(p.Lease)
  156. if leaseID != lease.NoLease {
  157. if l := a.s.lessor.Lookup(leaseID); l == nil {
  158. return nil, lease.ErrLeaseNotFound
  159. }
  160. }
  161. rev = a.s.KV().Put(p.Key, p.Value, leaseID)
  162. }
  163. resp.Header.Revision = rev
  164. return resp, nil
  165. }
  166. func (a *applierV3backend) DeleteRange(txnID int64, dr *pb.DeleteRangeRequest) (*pb.DeleteRangeResponse, error) {
  167. resp := &pb.DeleteRangeResponse{}
  168. resp.Header = &pb.ResponseHeader{}
  169. var (
  170. n int64
  171. rev int64
  172. err error
  173. )
  174. if isGteRange(dr.RangeEnd) {
  175. dr.RangeEnd = []byte{}
  176. }
  177. if txnID != noTxn {
  178. n, rev, err = a.s.KV().TxnDeleteRange(txnID, dr.Key, dr.RangeEnd)
  179. if err != nil {
  180. return nil, err
  181. }
  182. } else {
  183. n, rev = a.s.KV().DeleteRange(dr.Key, dr.RangeEnd)
  184. }
  185. resp.Deleted = n
  186. resp.Header.Revision = rev
  187. return resp, nil
  188. }
  189. func (a *applierV3backend) Range(txnID int64, r *pb.RangeRequest) (*pb.RangeResponse, error) {
  190. resp := &pb.RangeResponse{}
  191. resp.Header = &pb.ResponseHeader{}
  192. var (
  193. kvs []mvccpb.KeyValue
  194. rev int64
  195. err error
  196. )
  197. if isGteRange(r.RangeEnd) {
  198. r.RangeEnd = []byte{}
  199. }
  200. limit := r.Limit
  201. if r.SortOrder != pb.RangeRequest_NONE {
  202. // fetch everything; sort and truncate afterwards
  203. limit = 0
  204. }
  205. if limit > 0 {
  206. // fetch one extra for 'more' flag
  207. limit = limit + 1
  208. }
  209. if txnID != noTxn {
  210. kvs, rev, err = a.s.KV().TxnRange(txnID, r.Key, r.RangeEnd, limit, r.Revision)
  211. if err != nil {
  212. return nil, err
  213. }
  214. } else {
  215. kvs, rev, err = a.s.KV().Range(r.Key, r.RangeEnd, limit, r.Revision)
  216. if err != nil {
  217. return nil, err
  218. }
  219. }
  220. if r.SortOrder != pb.RangeRequest_NONE {
  221. var sorter sort.Interface
  222. switch {
  223. case r.SortTarget == pb.RangeRequest_KEY:
  224. sorter = &kvSortByKey{&kvSort{kvs}}
  225. case r.SortTarget == pb.RangeRequest_VERSION:
  226. sorter = &kvSortByVersion{&kvSort{kvs}}
  227. case r.SortTarget == pb.RangeRequest_CREATE:
  228. sorter = &kvSortByCreate{&kvSort{kvs}}
  229. case r.SortTarget == pb.RangeRequest_MOD:
  230. sorter = &kvSortByMod{&kvSort{kvs}}
  231. case r.SortTarget == pb.RangeRequest_VALUE:
  232. sorter = &kvSortByValue{&kvSort{kvs}}
  233. }
  234. switch {
  235. case r.SortOrder == pb.RangeRequest_ASCEND:
  236. sort.Sort(sorter)
  237. case r.SortOrder == pb.RangeRequest_DESCEND:
  238. sort.Sort(sort.Reverse(sorter))
  239. }
  240. }
  241. if r.Limit > 0 && len(kvs) > int(r.Limit) {
  242. kvs = kvs[:r.Limit]
  243. resp.More = true
  244. }
  245. resp.Header.Revision = rev
  246. for i := range kvs {
  247. resp.Kvs = append(resp.Kvs, &kvs[i])
  248. }
  249. return resp, nil
  250. }
  251. func (a *applierV3backend) Txn(rt *pb.TxnRequest) (*pb.TxnResponse, error) {
  252. ok := true
  253. for _, c := range rt.Compare {
  254. if _, ok = a.applyCompare(c); !ok {
  255. break
  256. }
  257. }
  258. var reqs []*pb.RequestOp
  259. if ok {
  260. reqs = rt.Success
  261. } else {
  262. reqs = rt.Failure
  263. }
  264. if err := a.checkRequestLeases(reqs); err != nil {
  265. return nil, err
  266. }
  267. if err := a.checkRequestRange(reqs); err != nil {
  268. return nil, err
  269. }
  270. revision := a.s.KV().Rev()
  271. // When executing the operations of txn, we need to hold the txn lock.
  272. // So the reader will not see any intermediate results.
  273. txnID := a.s.KV().TxnBegin()
  274. defer func() {
  275. err := a.s.KV().TxnEnd(txnID)
  276. if err != nil {
  277. panic(fmt.Sprint("unexpected error when closing txn", txnID))
  278. }
  279. }()
  280. resps := make([]*pb.ResponseOp, len(reqs))
  281. changedKV := false
  282. for i := range reqs {
  283. if reqs[i].GetRequestRange() == nil {
  284. changedKV = true
  285. }
  286. resps[i] = a.applyUnion(txnID, reqs[i])
  287. }
  288. if changedKV {
  289. revision += 1
  290. }
  291. txnResp := &pb.TxnResponse{}
  292. txnResp.Header = &pb.ResponseHeader{}
  293. txnResp.Header.Revision = revision
  294. txnResp.Responses = resps
  295. txnResp.Succeeded = ok
  296. return txnResp, nil
  297. }
  298. // applyCompare applies the compare request.
  299. // It returns the revision at which the comparison happens. If the comparison
  300. // succeeds, the it returns true. Otherwise it returns false.
  301. func (a *applierV3backend) applyCompare(c *pb.Compare) (int64, bool) {
  302. ckvs, rev, err := a.s.KV().Range(c.Key, nil, 1, 0)
  303. if err != nil {
  304. if err == mvcc.ErrTxnIDMismatch {
  305. panic("unexpected txn ID mismatch error")
  306. }
  307. return rev, false
  308. }
  309. var ckv mvccpb.KeyValue
  310. if len(ckvs) != 0 {
  311. ckv = ckvs[0]
  312. } else {
  313. // Use the zero value of ckv normally. However...
  314. if c.Target == pb.Compare_VALUE {
  315. // Always fail if we're comparing a value on a key that doesn't exist.
  316. // We can treat non-existence as the empty set explicitly, such that
  317. // even a key with a value of length 0 bytes is still a real key
  318. // that was written that way
  319. return rev, false
  320. }
  321. }
  322. // -1 is less, 0 is equal, 1 is greater
  323. var result int
  324. switch c.Target {
  325. case pb.Compare_VALUE:
  326. tv, _ := c.TargetUnion.(*pb.Compare_Value)
  327. if tv != nil {
  328. result = bytes.Compare(ckv.Value, tv.Value)
  329. }
  330. case pb.Compare_CREATE:
  331. tv, _ := c.TargetUnion.(*pb.Compare_CreateRevision)
  332. if tv != nil {
  333. result = compareInt64(ckv.CreateRevision, tv.CreateRevision)
  334. }
  335. case pb.Compare_MOD:
  336. tv, _ := c.TargetUnion.(*pb.Compare_ModRevision)
  337. if tv != nil {
  338. result = compareInt64(ckv.ModRevision, tv.ModRevision)
  339. }
  340. case pb.Compare_VERSION:
  341. tv, _ := c.TargetUnion.(*pb.Compare_Version)
  342. if tv != nil {
  343. result = compareInt64(ckv.Version, tv.Version)
  344. }
  345. }
  346. switch c.Result {
  347. case pb.Compare_EQUAL:
  348. if result != 0 {
  349. return rev, false
  350. }
  351. case pb.Compare_GREATER:
  352. if result != 1 {
  353. return rev, false
  354. }
  355. case pb.Compare_LESS:
  356. if result != -1 {
  357. return rev, false
  358. }
  359. }
  360. return rev, true
  361. }
  362. func (a *applierV3backend) applyUnion(txnID int64, union *pb.RequestOp) *pb.ResponseOp {
  363. switch tv := union.Request.(type) {
  364. case *pb.RequestOp_RequestRange:
  365. if tv.RequestRange != nil {
  366. resp, err := a.Range(txnID, tv.RequestRange)
  367. if err != nil {
  368. panic("unexpected error during txn")
  369. }
  370. return &pb.ResponseOp{Response: &pb.ResponseOp_ResponseRange{ResponseRange: resp}}
  371. }
  372. case *pb.RequestOp_RequestPut:
  373. if tv.RequestPut != nil {
  374. resp, err := a.Put(txnID, tv.RequestPut)
  375. if err != nil {
  376. panic("unexpected error during txn")
  377. }
  378. return &pb.ResponseOp{Response: &pb.ResponseOp_ResponsePut{ResponsePut: resp}}
  379. }
  380. case *pb.RequestOp_RequestDeleteRange:
  381. if tv.RequestDeleteRange != nil {
  382. resp, err := a.DeleteRange(txnID, tv.RequestDeleteRange)
  383. if err != nil {
  384. panic("unexpected error during txn")
  385. }
  386. return &pb.ResponseOp{Response: &pb.ResponseOp_ResponseDeleteRange{ResponseDeleteRange: resp}}
  387. }
  388. default:
  389. // empty union
  390. return nil
  391. }
  392. return nil
  393. }
  394. func (a *applierV3backend) Compaction(compaction *pb.CompactionRequest) (*pb.CompactionResponse, <-chan struct{}, error) {
  395. resp := &pb.CompactionResponse{}
  396. resp.Header = &pb.ResponseHeader{}
  397. ch, err := a.s.KV().Compact(compaction.Revision)
  398. if err != nil {
  399. return nil, ch, err
  400. }
  401. // get the current revision. which key to get is not important.
  402. _, resp.Header.Revision, _ = a.s.KV().Range([]byte("compaction"), nil, 1, 0)
  403. return resp, ch, err
  404. }
  405. func (a *applierV3backend) LeaseGrant(lc *pb.LeaseGrantRequest) (*pb.LeaseGrantResponse, error) {
  406. l, err := a.s.lessor.Grant(lease.LeaseID(lc.ID), lc.TTL)
  407. resp := &pb.LeaseGrantResponse{}
  408. if err == nil {
  409. resp.ID = int64(l.ID)
  410. resp.TTL = l.TTL
  411. resp.Header = &pb.ResponseHeader{Revision: a.s.KV().Rev()}
  412. }
  413. return resp, err
  414. }
  415. func (a *applierV3backend) LeaseRevoke(lc *pb.LeaseRevokeRequest) (*pb.LeaseRevokeResponse, error) {
  416. err := a.s.lessor.Revoke(lease.LeaseID(lc.ID))
  417. return &pb.LeaseRevokeResponse{Header: &pb.ResponseHeader{Revision: a.s.KV().Rev()}}, err
  418. }
  419. func (a *applierV3backend) Alarm(ar *pb.AlarmRequest) (*pb.AlarmResponse, error) {
  420. resp := &pb.AlarmResponse{}
  421. oldCount := len(a.s.alarmStore.Get(ar.Alarm))
  422. switch ar.Action {
  423. case pb.AlarmRequest_GET:
  424. resp.Alarms = a.s.alarmStore.Get(ar.Alarm)
  425. case pb.AlarmRequest_ACTIVATE:
  426. m := a.s.alarmStore.Activate(types.ID(ar.MemberID), ar.Alarm)
  427. if m == nil {
  428. break
  429. }
  430. resp.Alarms = append(resp.Alarms, m)
  431. activated := oldCount == 0 && len(a.s.alarmStore.Get(m.Alarm)) == 1
  432. if !activated {
  433. break
  434. }
  435. switch m.Alarm {
  436. case pb.AlarmType_NOSPACE:
  437. plog.Warningf("alarm raised %+v", m)
  438. a.s.applyV3 = newApplierV3Capped(a)
  439. default:
  440. plog.Errorf("unimplemented alarm activation (%+v)", m)
  441. }
  442. case pb.AlarmRequest_DEACTIVATE:
  443. m := a.s.alarmStore.Deactivate(types.ID(ar.MemberID), ar.Alarm)
  444. if m == nil {
  445. break
  446. }
  447. resp.Alarms = append(resp.Alarms, m)
  448. deactivated := oldCount > 0 && len(a.s.alarmStore.Get(ar.Alarm)) == 0
  449. if !deactivated {
  450. break
  451. }
  452. switch m.Alarm {
  453. case pb.AlarmType_NOSPACE:
  454. plog.Infof("alarm disarmed %+v", ar)
  455. a.s.applyV3 = newQuotaApplierV3(a.s, &applierV3backend{a.s})
  456. default:
  457. plog.Errorf("unimplemented alarm deactivation (%+v)", m)
  458. }
  459. default:
  460. return nil, nil
  461. }
  462. return resp, nil
  463. }
  464. type applierV3Capped struct {
  465. applierV3
  466. q backendQuota
  467. }
  468. // newApplierV3Capped creates an applyV3 that will reject Puts and transactions
  469. // with Puts so that the number of keys in the store is capped.
  470. func newApplierV3Capped(base applierV3) applierV3 { return &applierV3Capped{applierV3: base} }
  471. func (a *applierV3Capped) Put(txnID int64, p *pb.PutRequest) (*pb.PutResponse, error) {
  472. return nil, ErrNoSpace
  473. }
  474. func (a *applierV3Capped) Txn(r *pb.TxnRequest) (*pb.TxnResponse, error) {
  475. if a.q.Cost(r) > 0 {
  476. return nil, ErrNoSpace
  477. }
  478. return a.applierV3.Txn(r)
  479. }
  480. func (a *applierV3Capped) LeaseGrant(lc *pb.LeaseGrantRequest) (*pb.LeaseGrantResponse, error) {
  481. return nil, ErrNoSpace
  482. }
  483. func (a *applierV3backend) AuthEnable() (*pb.AuthEnableResponse, error) {
  484. err := a.s.AuthStore().AuthEnable()
  485. if err != nil {
  486. return nil, err
  487. }
  488. return &pb.AuthEnableResponse{}, nil
  489. }
  490. func (a *applierV3backend) AuthDisable() (*pb.AuthDisableResponse, error) {
  491. a.s.AuthStore().AuthDisable()
  492. return &pb.AuthDisableResponse{}, nil
  493. }
  494. func (a *applierV3backend) Authenticate(ctx context.Context, username, password string) (*pb.AuthenticateResponse, error) {
  495. return a.s.AuthStore().Authenticate(ctx, username, password)
  496. }
  497. func (a *applierV3backend) UserAdd(r *pb.AuthUserAddRequest) (*pb.AuthUserAddResponse, error) {
  498. return a.s.AuthStore().UserAdd(r)
  499. }
  500. func (a *applierV3backend) UserDelete(r *pb.AuthUserDeleteRequest) (*pb.AuthUserDeleteResponse, error) {
  501. return a.s.AuthStore().UserDelete(r)
  502. }
  503. func (a *applierV3backend) UserChangePassword(r *pb.AuthUserChangePasswordRequest) (*pb.AuthUserChangePasswordResponse, error) {
  504. return a.s.AuthStore().UserChangePassword(r)
  505. }
  506. func (a *applierV3backend) UserGrantRole(r *pb.AuthUserGrantRoleRequest) (*pb.AuthUserGrantRoleResponse, error) {
  507. return a.s.AuthStore().UserGrantRole(r)
  508. }
  509. func (a *applierV3backend) UserGet(r *pb.AuthUserGetRequest) (*pb.AuthUserGetResponse, error) {
  510. return a.s.AuthStore().UserGet(r)
  511. }
  512. func (a *applierV3backend) UserRevokeRole(r *pb.AuthUserRevokeRoleRequest) (*pb.AuthUserRevokeRoleResponse, error) {
  513. return a.s.AuthStore().UserRevokeRole(r)
  514. }
  515. func (a *applierV3backend) RoleAdd(r *pb.AuthRoleAddRequest) (*pb.AuthRoleAddResponse, error) {
  516. return a.s.AuthStore().RoleAdd(r)
  517. }
  518. func (a *applierV3backend) RoleGrantPermission(r *pb.AuthRoleGrantPermissionRequest) (*pb.AuthRoleGrantPermissionResponse, error) {
  519. return a.s.AuthStore().RoleGrantPermission(r)
  520. }
  521. func (a *applierV3backend) RoleGet(r *pb.AuthRoleGetRequest) (*pb.AuthRoleGetResponse, error) {
  522. return a.s.AuthStore().RoleGet(r)
  523. }
  524. func (a *applierV3backend) RoleRevokePermission(r *pb.AuthRoleRevokePermissionRequest) (*pb.AuthRoleRevokePermissionResponse, error) {
  525. return a.s.AuthStore().RoleRevokePermission(r)
  526. }
  527. func (a *applierV3backend) RoleDelete(r *pb.AuthRoleDeleteRequest) (*pb.AuthRoleDeleteResponse, error) {
  528. return a.s.AuthStore().RoleDelete(r)
  529. }
  530. type quotaApplierV3 struct {
  531. applierV3
  532. q Quota
  533. }
  534. func newQuotaApplierV3(s *EtcdServer, app applierV3) applierV3 {
  535. return &quotaApplierV3{app, NewBackendQuota(s)}
  536. }
  537. func (a *quotaApplierV3) Put(txnID int64, p *pb.PutRequest) (*pb.PutResponse, error) {
  538. ok := a.q.Available(p)
  539. resp, err := a.applierV3.Put(txnID, p)
  540. if err == nil && !ok {
  541. err = ErrNoSpace
  542. }
  543. return resp, err
  544. }
  545. func (a *quotaApplierV3) Txn(rt *pb.TxnRequest) (*pb.TxnResponse, error) {
  546. ok := a.q.Available(rt)
  547. resp, err := a.applierV3.Txn(rt)
  548. if err == nil && !ok {
  549. err = ErrNoSpace
  550. }
  551. return resp, err
  552. }
  553. func (a *quotaApplierV3) LeaseGrant(lc *pb.LeaseGrantRequest) (*pb.LeaseGrantResponse, error) {
  554. ok := a.q.Available(lc)
  555. resp, err := a.applierV3.LeaseGrant(lc)
  556. if err == nil && !ok {
  557. err = ErrNoSpace
  558. }
  559. return resp, err
  560. }
  561. type kvSort struct{ kvs []mvccpb.KeyValue }
  562. func (s *kvSort) Swap(i, j int) {
  563. t := s.kvs[i]
  564. s.kvs[i] = s.kvs[j]
  565. s.kvs[j] = t
  566. }
  567. func (s *kvSort) Len() int { return len(s.kvs) }
  568. type kvSortByKey struct{ *kvSort }
  569. func (s *kvSortByKey) Less(i, j int) bool {
  570. return bytes.Compare(s.kvs[i].Key, s.kvs[j].Key) < 0
  571. }
  572. type kvSortByVersion struct{ *kvSort }
  573. func (s *kvSortByVersion) Less(i, j int) bool {
  574. return (s.kvs[i].Version - s.kvs[j].Version) < 0
  575. }
  576. type kvSortByCreate struct{ *kvSort }
  577. func (s *kvSortByCreate) Less(i, j int) bool {
  578. return (s.kvs[i].CreateRevision - s.kvs[j].CreateRevision) < 0
  579. }
  580. type kvSortByMod struct{ *kvSort }
  581. func (s *kvSortByMod) Less(i, j int) bool {
  582. return (s.kvs[i].ModRevision - s.kvs[j].ModRevision) < 0
  583. }
  584. type kvSortByValue struct{ *kvSort }
  585. func (s *kvSortByValue) Less(i, j int) bool {
  586. return bytes.Compare(s.kvs[i].Value, s.kvs[j].Value) < 0
  587. }
  588. func (a *applierV3backend) checkRequestLeases(reqs []*pb.RequestOp) error {
  589. for _, requ := range reqs {
  590. tv, ok := requ.Request.(*pb.RequestOp_RequestPut)
  591. if !ok {
  592. continue
  593. }
  594. preq := tv.RequestPut
  595. if preq == nil || lease.LeaseID(preq.Lease) == lease.NoLease {
  596. continue
  597. }
  598. if l := a.s.lessor.Lookup(lease.LeaseID(preq.Lease)); l == nil {
  599. return lease.ErrLeaseNotFound
  600. }
  601. }
  602. return nil
  603. }
  604. func (a *applierV3backend) checkRequestRange(reqs []*pb.RequestOp) error {
  605. for _, requ := range reqs {
  606. tv, ok := requ.Request.(*pb.RequestOp_RequestRange)
  607. if !ok {
  608. continue
  609. }
  610. greq := tv.RequestRange
  611. if greq == nil || greq.Revision == 0 {
  612. continue
  613. }
  614. if greq.Revision > a.s.KV().Rev() {
  615. return mvcc.ErrFutureRev
  616. }
  617. if greq.Revision < a.s.KV().FirstRev() {
  618. return mvcc.ErrCompacted
  619. }
  620. }
  621. return nil
  622. }
  623. func compareInt64(a, b int64) int {
  624. switch {
  625. case a < b:
  626. return -1
  627. case a > b:
  628. return 1
  629. default:
  630. return 0
  631. }
  632. }
  633. // isGteRange determines if the range end is a >= range. This works around grpc
  634. // sending empty byte strings as nil; >= is encoded in the range end as '\0'.
  635. func isGteRange(rangeEnd []byte) bool {
  636. return len(rangeEnd) == 1 && rangeEnd[0] == 0
  637. }
  638. func needAdminPermission(r *pb.InternalRaftRequest) bool {
  639. switch {
  640. case r.AuthEnable != nil:
  641. return true
  642. case r.AuthDisable != nil:
  643. return true
  644. case r.AuthUserAdd != nil:
  645. return true
  646. case r.AuthUserDelete != nil:
  647. return true
  648. case r.AuthUserChangePassword != nil:
  649. return true
  650. case r.AuthUserGrantRole != nil:
  651. return true
  652. case r.AuthUserGet != nil:
  653. return true
  654. case r.AuthUserRevokeRole != nil:
  655. return true
  656. case r.AuthRoleAdd != nil:
  657. return true
  658. case r.AuthRoleGrantPermission != nil:
  659. return true
  660. case r.AuthRoleGet != nil:
  661. return true
  662. case r.AuthRoleRevokePermission != nil:
  663. return true
  664. case r.AuthRoleDelete != nil:
  665. return true
  666. default:
  667. return false
  668. }
  669. }