etcdctl_test.go 9.3 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302
  1. // Copyright 2016 CoreOS, Inc.
  2. //
  3. // Licensed under the Apache License, Version 2.0 (the "License");
  4. // you may not use this file except in compliance with the License.
  5. // You may obtain a copy of the License at
  6. //
  7. // http://www.apache.org/licenses/LICENSE-2.0
  8. //
  9. // Unless required by applicable law or agreed to in writing, software
  10. // distributed under the License is distributed on an "AS IS" BASIS,
  11. // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  12. // See the License for the specific language governing permissions and
  13. // limitations under the License.
  14. package e2e
  15. import (
  16. "strings"
  17. "testing"
  18. "time"
  19. "github.com/coreos/etcd/pkg/fileutil"
  20. "github.com/coreos/etcd/pkg/testutil"
  21. )
  22. func TestCtlV2Set(t *testing.T) { testCtlV2Set(t, &defaultConfig, false) }
  23. func TestCtlV2SetClientTLS(t *testing.T) { testCtlV2Set(t, &defaultConfigClientTLS, false) }
  24. func TestCtlV2SetPeerTLS(t *testing.T) { testCtlV2Set(t, &defaultConfigPeerTLS, false) }
  25. func TestCtlV2SetTLS(t *testing.T) { testCtlV2Set(t, &defaultConfigTLS, false) }
  26. func testCtlV2Set(t *testing.T, cfg *etcdProcessClusterConfig, noSync bool) {
  27. defer testutil.AfterTest(t)
  28. mustEtcdctl(t)
  29. epc, errC := newEtcdProcessCluster(cfg)
  30. if errC != nil {
  31. t.Fatalf("could not start etcd process cluster (%v)", errC)
  32. }
  33. defer func() {
  34. if errC := epc.Close(); errC != nil {
  35. t.Fatalf("error closing etcd processes (%v)", errC)
  36. }
  37. }()
  38. key, value := "foo", "bar"
  39. if err := etcdctlSet(epc, key, value, noSync); err != nil {
  40. t.Fatalf("failed set (%v)", err)
  41. }
  42. if err := etcdctlGet(epc, key, value, noSync); err != nil {
  43. t.Fatalf("failed get (%v)", err)
  44. }
  45. }
  46. func TestCtlV2Mk(t *testing.T) { testCtlV2Mk(t, &defaultConfig, false) }
  47. func TestCtlV2MkTLS(t *testing.T) { testCtlV2Mk(t, &defaultConfigTLS, false) }
  48. func testCtlV2Mk(t *testing.T, cfg *etcdProcessClusterConfig, noSync bool) {
  49. defer testutil.AfterTest(t)
  50. mustEtcdctl(t)
  51. epc, errC := newEtcdProcessCluster(cfg)
  52. if errC != nil {
  53. t.Fatalf("could not start etcd process cluster (%v)", errC)
  54. }
  55. defer func() {
  56. if errC := epc.Close(); errC != nil {
  57. t.Fatalf("error closing etcd processes (%v)", errC)
  58. }
  59. }()
  60. key, value := "foo", "bar"
  61. if err := etcdctlMk(epc, key, value, true, noSync); err != nil {
  62. t.Fatalf("failed mk (%v)", err)
  63. }
  64. if err := etcdctlMk(epc, key, value, false, noSync); err != nil {
  65. t.Fatalf("failed mk (%v)", err)
  66. }
  67. if err := etcdctlGet(epc, key, value, noSync); err != nil {
  68. t.Fatalf("failed get (%v)", err)
  69. }
  70. }
  71. func TestCtlV2Rm(t *testing.T) { testCtlV2Rm(t, &defaultConfig, false) }
  72. func TestCtlV2RmTLS(t *testing.T) { testCtlV2Rm(t, &defaultConfigTLS, false) }
  73. func testCtlV2Rm(t *testing.T, cfg *etcdProcessClusterConfig, noSync bool) {
  74. defer testutil.AfterTest(t)
  75. mustEtcdctl(t)
  76. epc, errC := newEtcdProcessCluster(cfg)
  77. if errC != nil {
  78. t.Fatalf("could not start etcd process cluster (%v)", errC)
  79. }
  80. defer func() {
  81. if errC := epc.Close(); errC != nil {
  82. t.Fatalf("error closing etcd processes (%v)", errC)
  83. }
  84. }()
  85. key, value := "foo", "bar"
  86. if err := etcdctlSet(epc, key, value, noSync); err != nil {
  87. t.Fatalf("failed set (%v)", err)
  88. }
  89. if err := etcdctlRm(epc, key, value, true, noSync); err != nil {
  90. t.Fatalf("failed rm (%v)", err)
  91. }
  92. if err := etcdctlRm(epc, key, value, false, noSync); err != nil {
  93. t.Fatalf("failed rm (%v)", err)
  94. }
  95. }
  96. func TestCtlV2Ls(t *testing.T) { testCtlV2Ls(t, &defaultConfig, false) }
  97. func TestCtlV2LsTLS(t *testing.T) { testCtlV2Ls(t, &defaultConfigTLS, false) }
  98. func testCtlV2Ls(t *testing.T, cfg *etcdProcessClusterConfig, noSync bool) {
  99. defer testutil.AfterTest(t)
  100. mustEtcdctl(t)
  101. epc, errC := newEtcdProcessCluster(cfg)
  102. if errC != nil {
  103. t.Fatalf("could not start etcd process cluster (%v)", errC)
  104. }
  105. defer func() {
  106. if errC := epc.Close(); errC != nil {
  107. t.Fatalf("error closing etcd processes (%v)", errC)
  108. }
  109. }()
  110. key, value := "foo", "bar"
  111. if err := etcdctlSet(epc, key, value, noSync); err != nil {
  112. t.Fatalf("failed set (%v)", err)
  113. }
  114. if err := etcdctlLs(epc, key, noSync); err != nil {
  115. t.Fatalf("failed ls (%v)", err)
  116. }
  117. }
  118. func TestCtlV2Watch(t *testing.T) { testCtlV2Watch(t, &defaultConfig, false) }
  119. func TestCtlV2WatchTLS(t *testing.T) { testCtlV2Watch(t, &defaultConfigTLS, false) }
  120. func TestCtlV2WatchWithProxy(t *testing.T) { testCtlV2Watch(t, &defaultConfigWithProxy, false) }
  121. func TestCtlV2WatchWithProxyNoSync(t *testing.T) { testCtlV2Watch(t, &defaultConfigWithProxy, true) }
  122. func testCtlV2Watch(t *testing.T, cfg *etcdProcessClusterConfig, noSync bool) {
  123. defer testutil.AfterTest(t)
  124. mustEtcdctl(t)
  125. epc, errC := newEtcdProcessCluster(cfg)
  126. if errC != nil {
  127. t.Fatalf("could not start etcd process cluster (%v)", errC)
  128. }
  129. defer func() {
  130. if errC := epc.Close(); errC != nil {
  131. t.Fatalf("error closing etcd processes (%v)", errC)
  132. }
  133. }()
  134. key, value := "foo", "bar"
  135. errc := etcdctlWatch(epc, key, value, noSync)
  136. if err := etcdctlSet(epc, key, value, noSync); err != nil {
  137. t.Fatalf("failed set (%v)", err)
  138. }
  139. select {
  140. case err := <-errc:
  141. if err != nil {
  142. t.Fatalf("failed watch (%v)", err)
  143. }
  144. case <-time.After(5 * time.Second):
  145. t.Fatalf("watch timed out")
  146. }
  147. }
  148. func TestCtlV2GetRoleUser(t *testing.T) { testCtlV2GetRoleUser(t, &defaultConfig) }
  149. func TestCtlV2GetRoleUserWithProxy(t *testing.T) { testCtlV2GetRoleUser(t, &defaultConfigWithProxy) }
  150. func testCtlV2GetRoleUser(t *testing.T, cfg *etcdProcessClusterConfig) {
  151. defer testutil.AfterTest(t)
  152. mustEtcdctl(t)
  153. epc, cerr := newEtcdProcessCluster(cfg)
  154. if cerr != nil {
  155. t.Fatalf("could not start etcd process cluster (%v)", cerr)
  156. }
  157. defer func() {
  158. if err := epc.Close(); err != nil {
  159. t.Fatalf("error closing etcd processes (%v)", err)
  160. }
  161. }()
  162. // wait for the server capabilities to be updated based on the version;
  163. // the update loop has a delay of 500ms, so 1s should be enough wait time
  164. time.Sleep(time.Second)
  165. if err := etcdctlAddRole(epc, "foo"); err != nil {
  166. t.Fatalf("failed to add role (%v)", err)
  167. }
  168. if err := etcdctlUserAdd(epc, "username", "password"); err != nil {
  169. t.Fatalf("failed to add user (%v)", err)
  170. }
  171. if err := etcdctlUserGrant(epc, "username", "foo"); err != nil {
  172. t.Fatalf("failed to grant role (%v)", err)
  173. }
  174. if err := etcdctlUserGet(epc, "username"); err != nil {
  175. t.Fatalf("failed to get user (%v)", err)
  176. }
  177. }
  178. func etcdctlPrefixArgs(clus *etcdProcessCluster, noSync bool) []string {
  179. endpoints := ""
  180. if proxies := clus.proxies(); len(proxies) != 0 {
  181. endpoints = proxies[0].cfg.acurl.String()
  182. } else if backends := clus.backends(); len(backends) != 0 {
  183. es := []string{}
  184. for _, b := range backends {
  185. es = append(es, b.cfg.acurl.String())
  186. }
  187. endpoints = strings.Join(es, ",")
  188. }
  189. cmdArgs := []string{"../bin/etcdctl", "--endpoints", endpoints}
  190. if noSync {
  191. cmdArgs = append(cmdArgs, "--no-sync")
  192. }
  193. if clus.cfg.isClientTLS {
  194. cmdArgs = append(cmdArgs, "--ca-file", caPath, "--cert-file", certPath, "--key-file", privateKeyPath)
  195. }
  196. return cmdArgs
  197. }
  198. func etcdctlSet(clus *etcdProcessCluster, key, value string, noSync bool) error {
  199. cmdArgs := append(etcdctlPrefixArgs(clus, noSync), "set", key, value)
  200. return spawnWithExpect(cmdArgs, value)
  201. }
  202. func etcdctlMk(clus *etcdProcessCluster, key, value string, first, noSync bool) error {
  203. cmdArgs := append(etcdctlPrefixArgs(clus, noSync), "mk", key, value)
  204. if first {
  205. return spawnWithExpectedString(cmdArgs, value)
  206. }
  207. return spawnWithExpectedString(cmdArgs, "Error: 105: Key already exists")
  208. }
  209. func etcdctlGet(clus *etcdProcessCluster, key, value string, noSync bool) error {
  210. cmdArgs := append(etcdctlPrefixArgs(clus, noSync), "get", key)
  211. return spawnWithExpectedString(cmdArgs, value)
  212. }
  213. func etcdctlRm(clus *etcdProcessCluster, key, value string, first, noSync bool) error {
  214. cmdArgs := append(etcdctlPrefixArgs(clus, noSync), "rm", key)
  215. if first {
  216. return spawnWithExpectedString(cmdArgs, "PrevNode.Value: "+value)
  217. }
  218. return spawnWithExpect(cmdArgs, "Error: 100: Key not found")
  219. }
  220. func etcdctlLs(clus *etcdProcessCluster, key string, noSync bool) error {
  221. cmdArgs := append(etcdctlPrefixArgs(clus, noSync), "ls")
  222. return spawnWithExpect(cmdArgs, key)
  223. }
  224. func etcdctlWatch(clus *etcdProcessCluster, key, value string, noSync bool) <-chan error {
  225. cmdArgs := append(etcdctlPrefixArgs(clus, noSync), "watch", "--after-index 1", key)
  226. errc := make(chan error, 1)
  227. go func() {
  228. errc <- spawnWithExpect(cmdArgs, value)
  229. }()
  230. return errc
  231. }
  232. func etcdctlAddRole(clus *etcdProcessCluster, role string) error {
  233. cmdArgs := append(etcdctlPrefixArgs(clus, false), "role", "add", role)
  234. return spawnWithExpectedString(cmdArgs, role)
  235. }
  236. func etcdctlUserAdd(clus *etcdProcessCluster, user, pass string) error {
  237. cmdArgs := append(etcdctlPrefixArgs(clus, false), "user", "add", user+":"+pass)
  238. return spawnWithExpectedString(cmdArgs, "User "+user+" created")
  239. }
  240. func etcdctlUserGrant(clus *etcdProcessCluster, user, role string) error {
  241. cmdArgs := append(etcdctlPrefixArgs(clus, false), "user", "grant", "--roles", role, user)
  242. return spawnWithExpectedString(cmdArgs, "User "+user+" updated")
  243. }
  244. func etcdctlUserGet(clus *etcdProcessCluster, user string) error {
  245. cmdArgs := append(etcdctlPrefixArgs(clus, false), "user", "get", user)
  246. return spawnWithExpectedString(cmdArgs, "User: "+user)
  247. }
  248. func mustEtcdctl(t *testing.T) {
  249. if !fileutil.Exist("../bin/etcdctl") {
  250. t.Fatalf("could not find etcdctl binary")
  251. }
  252. }