ctl_v3_test.go 5.9 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250
  1. // Copyright 2016 The etcd Authors
  2. //
  3. // Licensed under the Apache License, Version 2.0 (the "License");
  4. // you may not use this file except in compliance with the License.
  5. // You may obtain a copy of the License at
  6. //
  7. // http://www.apache.org/licenses/LICENSE-2.0
  8. //
  9. // Unless required by applicable law or agreed to in writing, software
  10. // distributed under the License is distributed on an "AS IS" BASIS,
  11. // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  12. // See the License for the specific language governing permissions and
  13. // limitations under the License.
  14. package e2e
  15. import (
  16. "fmt"
  17. "os"
  18. "strings"
  19. "testing"
  20. "time"
  21. "github.com/coreos/etcd/pkg/flags"
  22. "github.com/coreos/etcd/pkg/testutil"
  23. "github.com/coreos/etcd/version"
  24. )
  25. func TestCtlV3Version(t *testing.T) { testCtl(t, versionTest) }
  26. func versionTest(cx ctlCtx) {
  27. if err := ctlV3Version(cx); err != nil {
  28. cx.t.Fatalf("versionTest ctlV3Version error (%v)", err)
  29. }
  30. }
  31. func ctlV3Version(cx ctlCtx) error {
  32. cmdArgs := append(cx.PrefixArgs(), "version")
  33. return spawnWithExpect(cmdArgs, version.Version)
  34. }
  35. // TestCtlV3DialWithHTTPScheme ensures that client handles endpoints with HTTPS scheme.
  36. func TestCtlV3DialWithHTTPScheme(t *testing.T) {
  37. testCtl(t, dialWithSchemeTest, withCfg(configClientTLS))
  38. }
  39. func dialWithSchemeTest(cx ctlCtx) {
  40. cmdArgs := append(cx.prefixArgs(cx.epc.EndpointsV3()), "put", "foo", "bar")
  41. if err := spawnWithExpect(cmdArgs, "OK"); err != nil {
  42. cx.t.Fatal(err)
  43. }
  44. }
  45. type ctlCtx struct {
  46. t *testing.T
  47. cfg etcdProcessClusterConfig
  48. quotaBackendBytes int64
  49. corruptFunc func(string) error
  50. noStrictReconfig bool
  51. epc *etcdProcessCluster
  52. envMap map[string]struct{}
  53. dialTimeout time.Duration
  54. quorum bool // if true, set up 3-node cluster and linearizable read
  55. interactive bool
  56. user string
  57. pass string
  58. initialCorruptCheck bool
  59. // for compaction
  60. compactPhysical bool
  61. }
  62. type ctlOption func(*ctlCtx)
  63. func (cx *ctlCtx) applyOpts(opts []ctlOption) {
  64. for _, opt := range opts {
  65. opt(cx)
  66. }
  67. cx.initialCorruptCheck = true
  68. }
  69. func withCfg(cfg etcdProcessClusterConfig) ctlOption {
  70. return func(cx *ctlCtx) { cx.cfg = cfg }
  71. }
  72. func withDialTimeout(timeout time.Duration) ctlOption {
  73. return func(cx *ctlCtx) { cx.dialTimeout = timeout }
  74. }
  75. func withQuorum() ctlOption {
  76. return func(cx *ctlCtx) { cx.quorum = true }
  77. }
  78. func withInteractive() ctlOption {
  79. return func(cx *ctlCtx) { cx.interactive = true }
  80. }
  81. func withQuota(b int64) ctlOption {
  82. return func(cx *ctlCtx) { cx.quotaBackendBytes = b }
  83. }
  84. func withCompactPhysical() ctlOption {
  85. return func(cx *ctlCtx) { cx.compactPhysical = true }
  86. }
  87. func withInitialCorruptCheck() ctlOption {
  88. return func(cx *ctlCtx) { cx.initialCorruptCheck = true }
  89. }
  90. func withCorruptFunc(f func(string) error) ctlOption {
  91. return func(cx *ctlCtx) { cx.corruptFunc = f }
  92. }
  93. func withNoStrictReconfig() ctlOption {
  94. return func(cx *ctlCtx) { cx.noStrictReconfig = true }
  95. }
  96. func withFlagByEnv() ctlOption {
  97. return func(cx *ctlCtx) { cx.envMap = make(map[string]struct{}) }
  98. }
  99. func testCtl(t *testing.T, testFunc func(ctlCtx), opts ...ctlOption) {
  100. defer testutil.AfterTest(t)
  101. ret := ctlCtx{
  102. t: t,
  103. cfg: configAutoTLS,
  104. dialTimeout: 7 * time.Second,
  105. }
  106. ret.applyOpts(opts)
  107. mustEtcdctl(t)
  108. if !ret.quorum {
  109. ret.cfg = *configStandalone(ret.cfg)
  110. }
  111. if ret.quotaBackendBytes > 0 {
  112. ret.cfg.quotaBackendBytes = ret.quotaBackendBytes
  113. }
  114. ret.cfg.noStrictReconfig = ret.noStrictReconfig
  115. if ret.initialCorruptCheck {
  116. ret.cfg.initialCorruptCheck = ret.initialCorruptCheck
  117. }
  118. epc, err := newEtcdProcessCluster(&ret.cfg)
  119. if err != nil {
  120. t.Fatalf("could not start etcd process cluster (%v)", err)
  121. }
  122. ret.epc = epc
  123. defer func() {
  124. if ret.envMap != nil {
  125. for k := range ret.envMap {
  126. os.Unsetenv(k)
  127. }
  128. }
  129. if errC := ret.epc.Close(); errC != nil {
  130. t.Fatalf("error closing etcd processes (%v)", errC)
  131. }
  132. }()
  133. donec := make(chan struct{})
  134. go func() {
  135. defer close(donec)
  136. testFunc(ret)
  137. }()
  138. timeout := 2*ret.dialTimeout + time.Second
  139. if ret.dialTimeout == 0 {
  140. timeout = 30 * time.Second
  141. }
  142. select {
  143. case <-time.After(timeout):
  144. testutil.FatalStack(t, fmt.Sprintf("test timed out after %v", timeout))
  145. case <-donec:
  146. }
  147. }
  148. func (cx *ctlCtx) prefixArgs(eps []string) []string {
  149. fmap := make(map[string]string)
  150. fmap["endpoints"] = strings.Join(eps, ",")
  151. fmap["dial-timeout"] = cx.dialTimeout.String()
  152. if cx.epc.cfg.clientTLS == clientTLS {
  153. if cx.epc.cfg.isClientAutoTLS {
  154. fmap["insecure-transport"] = "false"
  155. fmap["insecure-skip-tls-verify"] = "true"
  156. } else if cx.epc.cfg.isClientCRL {
  157. fmap["cacert"] = caPath
  158. fmap["cert"] = revokedCertPath
  159. fmap["key"] = revokedPrivateKeyPath
  160. } else {
  161. fmap["cacert"] = caPath
  162. fmap["cert"] = certPath
  163. fmap["key"] = privateKeyPath
  164. }
  165. }
  166. if cx.user != "" {
  167. fmap["user"] = cx.user + ":" + cx.pass
  168. }
  169. useEnv := cx.envMap != nil
  170. cmdArgs := []string{ctlBinPath + "3"}
  171. for k, v := range fmap {
  172. if useEnv {
  173. ek := flags.FlagToEnv("ETCDCTL", k)
  174. os.Setenv(ek, v)
  175. cx.envMap[ek] = struct{}{}
  176. } else {
  177. cmdArgs = append(cmdArgs, fmt.Sprintf("--%s=%s", k, v))
  178. }
  179. }
  180. return cmdArgs
  181. }
  182. // PrefixArgs prefixes etcdctl command.
  183. // Make sure to unset environment variables after tests.
  184. func (cx *ctlCtx) PrefixArgs() []string {
  185. return cx.prefixArgs(cx.epc.EndpointsV3())
  186. }
  187. func isGRPCTimedout(err error) bool {
  188. return strings.Contains(err.Error(), "grpc: timed out trying to connect")
  189. }
  190. func (cx *ctlCtx) memberToRemove() (ep string, memberID string, clusterID string) {
  191. n1 := cx.cfg.clusterSize
  192. if n1 < 2 {
  193. cx.t.Fatalf("%d-node is too small to test 'member remove'", n1)
  194. }
  195. resp, err := getMemberList(*cx)
  196. if err != nil {
  197. cx.t.Fatal(err)
  198. }
  199. if n1 != len(resp.Members) {
  200. cx.t.Fatalf("expected %d, got %d", n1, len(resp.Members))
  201. }
  202. ep = resp.Members[0].ClientURLs[0]
  203. clusterID = fmt.Sprintf("%x", resp.Header.ClusterId)
  204. memberID = fmt.Sprintf("%x", resp.Members[1].ID)
  205. return ep, memberID, clusterID
  206. }