etcd_release_upgrade_test.go 6.9 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258
  1. // Copyright 2016 The etcd Authors
  2. //
  3. // Licensed under the Apache License, Version 2.0 (the "License");
  4. // you may not use this file except in compliance with the License.
  5. // You may obtain a copy of the License at
  6. //
  7. // http://www.apache.org/licenses/LICENSE-2.0
  8. //
  9. // Unless required by applicable law or agreed to in writing, software
  10. // distributed under the License is distributed on an "AS IS" BASIS,
  11. // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  12. // See the License for the specific language governing permissions and
  13. // limitations under the License.
  14. package e2e
  15. import (
  16. "fmt"
  17. "math/rand"
  18. "os"
  19. "strings"
  20. "sync"
  21. "testing"
  22. "time"
  23. "github.com/coreos/etcd/pkg/fileutil"
  24. "github.com/coreos/etcd/pkg/testutil"
  25. "github.com/coreos/etcd/version"
  26. )
  27. // TestReleaseUpgrade ensures that changes to master branch does not affect
  28. // upgrade from latest etcd releases.
  29. func TestReleaseUpgrade(t *testing.T) {
  30. lastReleaseBinary := binDir + "/etcd-last-release"
  31. if !fileutil.Exist(lastReleaseBinary) {
  32. t.Skipf("%q does not exist", lastReleaseBinary)
  33. }
  34. defer testutil.AfterTest(t)
  35. copiedCfg := configNoTLS
  36. copiedCfg.execPath = lastReleaseBinary
  37. copiedCfg.snapshotCount = 3
  38. copiedCfg.baseScheme = "unix" // to avoid port conflict
  39. epc, err := newEtcdProcessCluster(&copiedCfg)
  40. if err != nil {
  41. t.Fatalf("could not start etcd process cluster (%v)", err)
  42. }
  43. defer func() {
  44. if errC := epc.Close(); errC != nil {
  45. t.Fatalf("error closing etcd processes (%v)", errC)
  46. }
  47. }()
  48. // 3.0 boots as 2.3 then negotiates up to 3.0
  49. // so there's a window at boot time where it doesn't have V3rpcCapability enabled
  50. // poll /version until etcdcluster is >2.3.x before making v3 requests
  51. for i := 0; i < 7; i++ {
  52. if err = cURLGet(epc, cURLReq{endpoint: "/version", expected: `"etcdcluster":"` + version.Cluster(version.Version)}); err != nil {
  53. t.Logf("#%d: v3 is not ready yet (%v)", i, err)
  54. time.Sleep(time.Second)
  55. continue
  56. }
  57. break
  58. }
  59. if err != nil {
  60. t.Fatalf("cannot pull version (%v)", err)
  61. }
  62. os.Setenv("ETCDCTL_API", "3")
  63. defer os.Unsetenv("ETCDCTL_API")
  64. cx := ctlCtx{
  65. t: t,
  66. cfg: configNoTLS,
  67. dialTimeout: 7 * time.Second,
  68. quorum: true,
  69. epc: epc,
  70. }
  71. var kvs []kv
  72. for i := 0; i < 5; i++ {
  73. kvs = append(kvs, kv{key: fmt.Sprintf("foo%d", i), val: "bar"})
  74. }
  75. for i := range kvs {
  76. if err := ctlV3Put(cx, kvs[i].key, kvs[i].val, ""); err != nil {
  77. cx.t.Fatalf("#%d: ctlV3Put error (%v)", i, err)
  78. }
  79. }
  80. for i := range epc.procs {
  81. if err := epc.procs[i].Stop(); err != nil {
  82. t.Fatalf("#%d: error closing etcd process (%v)", i, err)
  83. }
  84. epc.procs[i].Config().execPath = binDir + "/etcd"
  85. epc.procs[i].Config().keepDataDir = true
  86. if err := epc.procs[i].Restart(); err != nil {
  87. t.Fatalf("error restarting etcd process (%v)", err)
  88. }
  89. for j := range kvs {
  90. if err := ctlV3Get(cx, []string{kvs[j].key}, []kv{kvs[j]}...); err != nil {
  91. cx.t.Fatalf("#%d-%d: ctlV3Get error (%v)", i, j, err)
  92. }
  93. }
  94. }
  95. }
  96. func TestReleaseUpgradeWithRestart(t *testing.T) {
  97. lastReleaseBinary := binDir + "/etcd-last-release"
  98. if !fileutil.Exist(lastReleaseBinary) {
  99. t.Skipf("%q does not exist", lastReleaseBinary)
  100. }
  101. defer testutil.AfterTest(t)
  102. copiedCfg := configNoTLS
  103. copiedCfg.execPath = lastReleaseBinary
  104. copiedCfg.snapshotCount = 10
  105. copiedCfg.baseScheme = "unix"
  106. epc, err := newEtcdProcessCluster(&copiedCfg)
  107. if err != nil {
  108. t.Fatalf("could not start etcd process cluster (%v)", err)
  109. }
  110. defer func() {
  111. if errC := epc.Close(); errC != nil {
  112. t.Fatalf("error closing etcd processes (%v)", errC)
  113. }
  114. }()
  115. os.Setenv("ETCDCTL_API", "3")
  116. defer os.Unsetenv("ETCDCTL_API")
  117. cx := ctlCtx{
  118. t: t,
  119. cfg: configNoTLS,
  120. dialTimeout: 7 * time.Second,
  121. quorum: true,
  122. epc: epc,
  123. }
  124. var kvs []kv
  125. for i := 0; i < 50; i++ {
  126. kvs = append(kvs, kv{key: fmt.Sprintf("foo%d", i), val: "bar"})
  127. }
  128. for i := range kvs {
  129. if err := ctlV3Put(cx, kvs[i].key, kvs[i].val, ""); err != nil {
  130. cx.t.Fatalf("#%d: ctlV3Put error (%v)", i, err)
  131. }
  132. }
  133. for i := range epc.procs {
  134. if err := epc.procs[i].Stop(); err != nil {
  135. t.Fatalf("#%d: error closing etcd process (%v)", i, err)
  136. }
  137. }
  138. var wg sync.WaitGroup
  139. wg.Add(len(epc.procs))
  140. for i := range epc.procs {
  141. go func(i int) {
  142. epc.procs[i].Config().execPath = binDir + "/etcd"
  143. epc.procs[i].Config().keepDataDir = true
  144. if err := epc.procs[i].Restart(); err != nil {
  145. t.Fatalf("error restarting etcd process (%v)", err)
  146. }
  147. wg.Done()
  148. }(i)
  149. }
  150. wg.Wait()
  151. if err := ctlV3Get(cx, []string{kvs[0].key}, []kv{kvs[0]}...); err != nil {
  152. t.Fatal(err)
  153. }
  154. }
  155. type cURLReq struct {
  156. username string
  157. password string
  158. isTLS bool
  159. timeout int
  160. endpoint string
  161. value string
  162. expected string
  163. header string
  164. metricsURLScheme string
  165. ciphers string
  166. }
  167. // cURLPrefixArgs builds the beginning of a curl command for a given key
  168. // addressed to a random URL in the given cluster.
  169. func cURLPrefixArgs(clus *etcdProcessCluster, method string, req cURLReq) []string {
  170. var (
  171. cmdArgs = []string{"curl"}
  172. acurl = clus.procs[rand.Intn(clus.cfg.clusterSize)].Config().acurl
  173. )
  174. if req.metricsURLScheme != "https" {
  175. if req.isTLS {
  176. if clus.cfg.clientTLS != clientTLSAndNonTLS {
  177. panic("should not use cURLPrefixArgsUseTLS when serving only TLS or non-TLS")
  178. }
  179. cmdArgs = append(cmdArgs, "--cacert", caPath, "--cert", certPath, "--key", privateKeyPath)
  180. acurl = toTLS(clus.procs[rand.Intn(clus.cfg.clusterSize)].Config().acurl)
  181. } else if clus.cfg.clientTLS == clientTLS {
  182. if !clus.cfg.noCN {
  183. cmdArgs = append(cmdArgs, "--cacert", caPath, "--cert", certPath, "--key", privateKeyPath)
  184. } else {
  185. cmdArgs = append(cmdArgs, "--cacert", caPath, "--cert", certPath3, "--key", privateKeyPath3)
  186. }
  187. }
  188. }
  189. if req.metricsURLScheme != "" {
  190. acurl = clus.procs[rand.Intn(clus.cfg.clusterSize)].EndpointsMetrics()[0]
  191. }
  192. ep := acurl + req.endpoint
  193. if req.username != "" || req.password != "" {
  194. cmdArgs = append(cmdArgs, "-L", "-u", fmt.Sprintf("%s:%s", req.username, req.password), ep)
  195. } else {
  196. cmdArgs = append(cmdArgs, "-L", ep)
  197. }
  198. if req.timeout != 0 {
  199. cmdArgs = append(cmdArgs, "-m", fmt.Sprintf("%d", req.timeout))
  200. }
  201. if req.header != "" {
  202. cmdArgs = append(cmdArgs, "-H", req.header)
  203. }
  204. if req.ciphers != "" {
  205. cmdArgs = append(cmdArgs, "--ciphers", req.ciphers)
  206. }
  207. switch method {
  208. case "POST", "PUT":
  209. dt := req.value
  210. if !strings.HasPrefix(dt, "{") { // for non-JSON value
  211. dt = "value=" + dt
  212. }
  213. cmdArgs = append(cmdArgs, "-X", method, "-d", dt)
  214. }
  215. return cmdArgs
  216. }
  217. func cURLPost(clus *etcdProcessCluster, req cURLReq) error {
  218. return spawnWithExpect(cURLPrefixArgs(clus, "POST", req), req.expected)
  219. }
  220. func cURLPut(clus *etcdProcessCluster, req cURLReq) error {
  221. return spawnWithExpect(cURLPrefixArgs(clus, "PUT", req), req.expected)
  222. }
  223. func cURLGet(clus *etcdProcessCluster, req cURLReq) error {
  224. return spawnWithExpect(cURLPrefixArgs(clus, "GET", req), req.expected)
  225. }