123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786 |
- // Copyright 2016 The etcd Authors
- //
- // Licensed under the Apache License, Version 2.0 (the "License");
- // you may not use this file except in compliance with the License.
- // You may obtain a copy of the License at
- //
- // http://www.apache.org/licenses/LICENSE-2.0
- //
- // Unless required by applicable law or agreed to in writing, software
- // distributed under the License is distributed on an "AS IS" BASIS,
- // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
- // See the License for the specific language governing permissions and
- // limitations under the License.
- package etcdserver
- import (
- "bytes"
- "fmt"
- "sort"
- "time"
- pb "github.com/coreos/etcd/etcdserver/etcdserverpb"
- "github.com/coreos/etcd/lease"
- "github.com/coreos/etcd/mvcc"
- "github.com/coreos/etcd/mvcc/mvccpb"
- "github.com/coreos/etcd/pkg/types"
- "github.com/gogo/protobuf/proto"
- "golang.org/x/net/context"
- )
- const (
- // noTxn is an invalid txn ID.
- // To apply with independent Range, Put, Delete, you can pass noTxn
- // to apply functions instead of a valid txn ID.
- noTxn = -1
- warnApplyDuration = 10 * time.Millisecond
- )
- type applyResult struct {
- resp proto.Message
- err error
- // physc signals the physical effect of the request has completed in addition
- // to being logically reflected by the node. Currently only used for
- // Compaction requests.
- physc <-chan struct{}
- }
- // applierV3 is the interface for processing V3 raft messages
- type applierV3 interface {
- Apply(r *pb.InternalRaftRequest) *applyResult
- Put(txnID int64, p *pb.PutRequest) (*pb.PutResponse, error)
- Range(txnID int64, r *pb.RangeRequest) (*pb.RangeResponse, error)
- DeleteRange(txnID int64, dr *pb.DeleteRangeRequest) (*pb.DeleteRangeResponse, error)
- Txn(rt *pb.TxnRequest) (*pb.TxnResponse, error)
- Compaction(compaction *pb.CompactionRequest) (*pb.CompactionResponse, <-chan struct{}, error)
- LeaseGrant(lc *pb.LeaseGrantRequest) (*pb.LeaseGrantResponse, error)
- LeaseRevoke(lc *pb.LeaseRevokeRequest) (*pb.LeaseRevokeResponse, error)
- Alarm(*pb.AlarmRequest) (*pb.AlarmResponse, error)
- Authenticate(r *pb.InternalAuthenticateRequest) (*pb.AuthenticateResponse, error)
- AuthEnable() (*pb.AuthEnableResponse, error)
- AuthDisable() (*pb.AuthDisableResponse, error)
- UserAdd(ua *pb.AuthUserAddRequest) (*pb.AuthUserAddResponse, error)
- UserDelete(ua *pb.AuthUserDeleteRequest) (*pb.AuthUserDeleteResponse, error)
- UserChangePassword(ua *pb.AuthUserChangePasswordRequest) (*pb.AuthUserChangePasswordResponse, error)
- UserGrantRole(ua *pb.AuthUserGrantRoleRequest) (*pb.AuthUserGrantRoleResponse, error)
- UserGet(ua *pb.AuthUserGetRequest) (*pb.AuthUserGetResponse, error)
- UserRevokeRole(ua *pb.AuthUserRevokeRoleRequest) (*pb.AuthUserRevokeRoleResponse, error)
- RoleAdd(ua *pb.AuthRoleAddRequest) (*pb.AuthRoleAddResponse, error)
- RoleGrantPermission(ua *pb.AuthRoleGrantPermissionRequest) (*pb.AuthRoleGrantPermissionResponse, error)
- RoleGet(ua *pb.AuthRoleGetRequest) (*pb.AuthRoleGetResponse, error)
- RoleRevokePermission(ua *pb.AuthRoleRevokePermissionRequest) (*pb.AuthRoleRevokePermissionResponse, error)
- RoleDelete(ua *pb.AuthRoleDeleteRequest) (*pb.AuthRoleDeleteResponse, error)
- UserList(ua *pb.AuthUserListRequest) (*pb.AuthUserListResponse, error)
- RoleList(ua *pb.AuthRoleListRequest) (*pb.AuthRoleListResponse, error)
- }
- type applierV3backend struct {
- s *EtcdServer
- }
- func (s *EtcdServer) newApplierV3() applierV3 {
- return newAuthApplierV3(
- s.AuthStore(),
- newQuotaApplierV3(s, &applierV3backend{s}),
- )
- }
- func (a *applierV3backend) Apply(r *pb.InternalRaftRequest) *applyResult {
- ar := &applyResult{}
- // call into a.s.applyV3.F instead of a.F so upper appliers can check individual calls
- switch {
- case r.Range != nil:
- ar.resp, ar.err = a.s.applyV3.Range(noTxn, r.Range)
- case r.Put != nil:
- ar.resp, ar.err = a.s.applyV3.Put(noTxn, r.Put)
- case r.DeleteRange != nil:
- ar.resp, ar.err = a.s.applyV3.DeleteRange(noTxn, r.DeleteRange)
- case r.Txn != nil:
- ar.resp, ar.err = a.s.applyV3.Txn(r.Txn)
- case r.Compaction != nil:
- ar.resp, ar.physc, ar.err = a.s.applyV3.Compaction(r.Compaction)
- case r.LeaseGrant != nil:
- ar.resp, ar.err = a.s.applyV3.LeaseGrant(r.LeaseGrant)
- case r.LeaseRevoke != nil:
- ar.resp, ar.err = a.s.applyV3.LeaseRevoke(r.LeaseRevoke)
- case r.Alarm != nil:
- ar.resp, ar.err = a.s.applyV3.Alarm(r.Alarm)
- case r.Authenticate != nil:
- ar.resp, ar.err = a.s.applyV3.Authenticate(r.Authenticate)
- case r.AuthEnable != nil:
- ar.resp, ar.err = a.s.applyV3.AuthEnable()
- case r.AuthDisable != nil:
- ar.resp, ar.err = a.s.applyV3.AuthDisable()
- case r.AuthUserAdd != nil:
- ar.resp, ar.err = a.s.applyV3.UserAdd(r.AuthUserAdd)
- case r.AuthUserDelete != nil:
- ar.resp, ar.err = a.s.applyV3.UserDelete(r.AuthUserDelete)
- case r.AuthUserChangePassword != nil:
- ar.resp, ar.err = a.s.applyV3.UserChangePassword(r.AuthUserChangePassword)
- case r.AuthUserGrantRole != nil:
- ar.resp, ar.err = a.s.applyV3.UserGrantRole(r.AuthUserGrantRole)
- case r.AuthUserGet != nil:
- ar.resp, ar.err = a.s.applyV3.UserGet(r.AuthUserGet)
- case r.AuthUserRevokeRole != nil:
- ar.resp, ar.err = a.s.applyV3.UserRevokeRole(r.AuthUserRevokeRole)
- case r.AuthRoleAdd != nil:
- ar.resp, ar.err = a.s.applyV3.RoleAdd(r.AuthRoleAdd)
- case r.AuthRoleGrantPermission != nil:
- ar.resp, ar.err = a.s.applyV3.RoleGrantPermission(r.AuthRoleGrantPermission)
- case r.AuthRoleGet != nil:
- ar.resp, ar.err = a.s.applyV3.RoleGet(r.AuthRoleGet)
- case r.AuthRoleRevokePermission != nil:
- ar.resp, ar.err = a.s.applyV3.RoleRevokePermission(r.AuthRoleRevokePermission)
- case r.AuthRoleDelete != nil:
- ar.resp, ar.err = a.s.applyV3.RoleDelete(r.AuthRoleDelete)
- case r.AuthUserList != nil:
- ar.resp, ar.err = a.s.applyV3.UserList(r.AuthUserList)
- case r.AuthRoleList != nil:
- ar.resp, ar.err = a.s.applyV3.RoleList(r.AuthRoleList)
- default:
- panic("not implemented")
- }
- return ar
- }
- func (a *applierV3backend) Put(txnID int64, p *pb.PutRequest) (*pb.PutResponse, error) {
- resp := &pb.PutResponse{}
- resp.Header = &pb.ResponseHeader{}
- var (
- rev int64
- err error
- )
- var rr *mvcc.RangeResult
- if p.PrevKv {
- if txnID != noTxn {
- rr, err = a.s.KV().TxnRange(txnID, p.Key, nil, mvcc.RangeOptions{})
- if err != nil {
- return nil, err
- }
- } else {
- rr, err = a.s.KV().Range(p.Key, nil, mvcc.RangeOptions{})
- if err != nil {
- return nil, err
- }
- }
- }
- if txnID != noTxn {
- rev, err = a.s.KV().TxnPut(txnID, p.Key, p.Value, lease.LeaseID(p.Lease))
- if err != nil {
- return nil, err
- }
- } else {
- leaseID := lease.LeaseID(p.Lease)
- if leaseID != lease.NoLease {
- if l := a.s.lessor.Lookup(leaseID); l == nil {
- return nil, lease.ErrLeaseNotFound
- }
- }
- rev = a.s.KV().Put(p.Key, p.Value, leaseID)
- }
- resp.Header.Revision = rev
- if rr != nil && len(rr.KVs) != 0 {
- resp.PrevKv = &rr.KVs[0]
- }
- return resp, nil
- }
- func (a *applierV3backend) DeleteRange(txnID int64, dr *pb.DeleteRangeRequest) (*pb.DeleteRangeResponse, error) {
- resp := &pb.DeleteRangeResponse{}
- resp.Header = &pb.ResponseHeader{}
- var (
- n int64
- rev int64
- err error
- )
- if isGteRange(dr.RangeEnd) {
- dr.RangeEnd = []byte{}
- }
- var rr *mvcc.RangeResult
- if dr.PrevKv {
- if txnID != noTxn {
- rr, err = a.s.KV().TxnRange(txnID, dr.Key, dr.RangeEnd, mvcc.RangeOptions{})
- if err != nil {
- return nil, err
- }
- } else {
- rr, err = a.s.KV().Range(dr.Key, dr.RangeEnd, mvcc.RangeOptions{})
- if err != nil {
- return nil, err
- }
- }
- }
- if txnID != noTxn {
- n, rev, err = a.s.KV().TxnDeleteRange(txnID, dr.Key, dr.RangeEnd)
- if err != nil {
- return nil, err
- }
- } else {
- n, rev = a.s.KV().DeleteRange(dr.Key, dr.RangeEnd)
- }
- resp.Deleted = n
- if rr != nil {
- for i := range rr.KVs {
- resp.PrevKvs = append(resp.PrevKvs, &rr.KVs[i])
- }
- }
- resp.Header.Revision = rev
- return resp, nil
- }
- func (a *applierV3backend) Range(txnID int64, r *pb.RangeRequest) (*pb.RangeResponse, error) {
- resp := &pb.RangeResponse{}
- resp.Header = &pb.ResponseHeader{}
- var (
- rr *mvcc.RangeResult
- err error
- )
- if isGteRange(r.RangeEnd) {
- r.RangeEnd = []byte{}
- }
- limit := r.Limit
- if r.SortOrder != pb.RangeRequest_NONE {
- // fetch everything; sort and truncate afterwards
- limit = 0
- }
- if limit > 0 {
- // fetch one extra for 'more' flag
- limit = limit + 1
- }
- ro := mvcc.RangeOptions{
- Limit: limit,
- Rev: r.Revision,
- Count: r.CountOnly,
- }
- if txnID != noTxn {
- rr, err = a.s.KV().TxnRange(txnID, r.Key, r.RangeEnd, ro)
- if err != nil {
- return nil, err
- }
- } else {
- rr, err = a.s.KV().Range(r.Key, r.RangeEnd, ro)
- if err != nil {
- return nil, err
- }
- }
- if r.SortOrder != pb.RangeRequest_NONE {
- var sorter sort.Interface
- switch {
- case r.SortTarget == pb.RangeRequest_KEY:
- sorter = &kvSortByKey{&kvSort{rr.KVs}}
- case r.SortTarget == pb.RangeRequest_VERSION:
- sorter = &kvSortByVersion{&kvSort{rr.KVs}}
- case r.SortTarget == pb.RangeRequest_CREATE:
- sorter = &kvSortByCreate{&kvSort{rr.KVs}}
- case r.SortTarget == pb.RangeRequest_MOD:
- sorter = &kvSortByMod{&kvSort{rr.KVs}}
- case r.SortTarget == pb.RangeRequest_VALUE:
- sorter = &kvSortByValue{&kvSort{rr.KVs}}
- }
- switch {
- case r.SortOrder == pb.RangeRequest_ASCEND:
- sort.Sort(sorter)
- case r.SortOrder == pb.RangeRequest_DESCEND:
- sort.Sort(sort.Reverse(sorter))
- }
- }
- if r.Limit > 0 && len(rr.KVs) > int(r.Limit) {
- rr.KVs = rr.KVs[:r.Limit]
- resp.More = true
- }
- resp.Header.Revision = rr.Rev
- resp.Count = int64(rr.Count)
- for i := range rr.KVs {
- if r.KeysOnly {
- rr.KVs[i].Value = nil
- }
- resp.Kvs = append(resp.Kvs, &rr.KVs[i])
- }
- return resp, nil
- }
- func (a *applierV3backend) Txn(rt *pb.TxnRequest) (*pb.TxnResponse, error) {
- ok := true
- for _, c := range rt.Compare {
- if _, ok = a.applyCompare(c); !ok {
- break
- }
- }
- var reqs []*pb.RequestOp
- if ok {
- reqs = rt.Success
- } else {
- reqs = rt.Failure
- }
- if err := a.checkRequestLeases(reqs); err != nil {
- return nil, err
- }
- if err := a.checkRequestRange(reqs); err != nil {
- return nil, err
- }
- revision := a.s.KV().Rev()
- // When executing the operations of txn, we need to hold the txn lock.
- // So the reader will not see any intermediate results.
- txnID := a.s.KV().TxnBegin()
- defer func() {
- err := a.s.KV().TxnEnd(txnID)
- if err != nil {
- panic(fmt.Sprint("unexpected error when closing txn", txnID))
- }
- }()
- resps := make([]*pb.ResponseOp, len(reqs))
- changedKV := false
- for i := range reqs {
- if reqs[i].GetRequestRange() == nil {
- changedKV = true
- }
- resps[i] = a.applyUnion(txnID, reqs[i])
- }
- if changedKV {
- revision += 1
- }
- txnResp := &pb.TxnResponse{}
- txnResp.Header = &pb.ResponseHeader{}
- txnResp.Header.Revision = revision
- txnResp.Responses = resps
- txnResp.Succeeded = ok
- return txnResp, nil
- }
- // applyCompare applies the compare request.
- // It returns the revision at which the comparison happens. If the comparison
- // succeeds, the it returns true. Otherwise it returns false.
- func (a *applierV3backend) applyCompare(c *pb.Compare) (int64, bool) {
- rr, err := a.s.KV().Range(c.Key, nil, mvcc.RangeOptions{})
- rev := rr.Rev
- if err != nil {
- if err == mvcc.ErrTxnIDMismatch {
- panic("unexpected txn ID mismatch error")
- }
- return rev, false
- }
- var ckv mvccpb.KeyValue
- if len(rr.KVs) != 0 {
- ckv = rr.KVs[0]
- } else {
- // Use the zero value of ckv normally. However...
- if c.Target == pb.Compare_VALUE {
- // Always fail if we're comparing a value on a key that doesn't exist.
- // We can treat non-existence as the empty set explicitly, such that
- // even a key with a value of length 0 bytes is still a real key
- // that was written that way
- return rev, false
- }
- }
- // -1 is less, 0 is equal, 1 is greater
- var result int
- switch c.Target {
- case pb.Compare_VALUE:
- tv, _ := c.TargetUnion.(*pb.Compare_Value)
- if tv != nil {
- result = bytes.Compare(ckv.Value, tv.Value)
- }
- case pb.Compare_CREATE:
- tv, _ := c.TargetUnion.(*pb.Compare_CreateRevision)
- if tv != nil {
- result = compareInt64(ckv.CreateRevision, tv.CreateRevision)
- }
- case pb.Compare_MOD:
- tv, _ := c.TargetUnion.(*pb.Compare_ModRevision)
- if tv != nil {
- result = compareInt64(ckv.ModRevision, tv.ModRevision)
- }
- case pb.Compare_VERSION:
- tv, _ := c.TargetUnion.(*pb.Compare_Version)
- if tv != nil {
- result = compareInt64(ckv.Version, tv.Version)
- }
- }
- switch c.Result {
- case pb.Compare_EQUAL:
- if result != 0 {
- return rev, false
- }
- case pb.Compare_GREATER:
- if result != 1 {
- return rev, false
- }
- case pb.Compare_LESS:
- if result != -1 {
- return rev, false
- }
- }
- return rev, true
- }
- func (a *applierV3backend) applyUnion(txnID int64, union *pb.RequestOp) *pb.ResponseOp {
- switch tv := union.Request.(type) {
- case *pb.RequestOp_RequestRange:
- if tv.RequestRange != nil {
- resp, err := a.Range(txnID, tv.RequestRange)
- if err != nil {
- panic("unexpected error during txn")
- }
- return &pb.ResponseOp{Response: &pb.ResponseOp_ResponseRange{ResponseRange: resp}}
- }
- case *pb.RequestOp_RequestPut:
- if tv.RequestPut != nil {
- resp, err := a.Put(txnID, tv.RequestPut)
- if err != nil {
- panic("unexpected error during txn")
- }
- return &pb.ResponseOp{Response: &pb.ResponseOp_ResponsePut{ResponsePut: resp}}
- }
- case *pb.RequestOp_RequestDeleteRange:
- if tv.RequestDeleteRange != nil {
- resp, err := a.DeleteRange(txnID, tv.RequestDeleteRange)
- if err != nil {
- panic("unexpected error during txn")
- }
- return &pb.ResponseOp{Response: &pb.ResponseOp_ResponseDeleteRange{ResponseDeleteRange: resp}}
- }
- default:
- // empty union
- return nil
- }
- return nil
- }
- func (a *applierV3backend) Compaction(compaction *pb.CompactionRequest) (*pb.CompactionResponse, <-chan struct{}, error) {
- resp := &pb.CompactionResponse{}
- resp.Header = &pb.ResponseHeader{}
- ch, err := a.s.KV().Compact(compaction.Revision)
- if err != nil {
- return nil, ch, err
- }
- // get the current revision. which key to get is not important.
- rr, _ := a.s.KV().Range([]byte("compaction"), nil, mvcc.RangeOptions{})
- resp.Header.Revision = rr.Rev
- return resp, ch, err
- }
- func (a *applierV3backend) LeaseGrant(lc *pb.LeaseGrantRequest) (*pb.LeaseGrantResponse, error) {
- l, err := a.s.lessor.Grant(lease.LeaseID(lc.ID), lc.TTL)
- resp := &pb.LeaseGrantResponse{}
- if err == nil {
- resp.ID = int64(l.ID)
- resp.TTL = l.TTL
- resp.Header = &pb.ResponseHeader{Revision: a.s.KV().Rev()}
- }
- return resp, err
- }
- func (a *applierV3backend) LeaseRevoke(lc *pb.LeaseRevokeRequest) (*pb.LeaseRevokeResponse, error) {
- err := a.s.lessor.Revoke(lease.LeaseID(lc.ID))
- return &pb.LeaseRevokeResponse{Header: &pb.ResponseHeader{Revision: a.s.KV().Rev()}}, err
- }
- func (a *applierV3backend) Alarm(ar *pb.AlarmRequest) (*pb.AlarmResponse, error) {
- resp := &pb.AlarmResponse{}
- oldCount := len(a.s.alarmStore.Get(ar.Alarm))
- switch ar.Action {
- case pb.AlarmRequest_GET:
- resp.Alarms = a.s.alarmStore.Get(ar.Alarm)
- case pb.AlarmRequest_ACTIVATE:
- m := a.s.alarmStore.Activate(types.ID(ar.MemberID), ar.Alarm)
- if m == nil {
- break
- }
- resp.Alarms = append(resp.Alarms, m)
- activated := oldCount == 0 && len(a.s.alarmStore.Get(m.Alarm)) == 1
- if !activated {
- break
- }
- switch m.Alarm {
- case pb.AlarmType_NOSPACE:
- plog.Warningf("alarm raised %+v", m)
- a.s.applyV3 = newApplierV3Capped(a)
- default:
- plog.Errorf("unimplemented alarm activation (%+v)", m)
- }
- case pb.AlarmRequest_DEACTIVATE:
- m := a.s.alarmStore.Deactivate(types.ID(ar.MemberID), ar.Alarm)
- if m == nil {
- break
- }
- resp.Alarms = append(resp.Alarms, m)
- deactivated := oldCount > 0 && len(a.s.alarmStore.Get(ar.Alarm)) == 0
- if !deactivated {
- break
- }
- switch m.Alarm {
- case pb.AlarmType_NOSPACE:
- plog.Infof("alarm disarmed %+v", ar)
- a.s.applyV3 = a.s.newApplierV3()
- default:
- plog.Errorf("unimplemented alarm deactivation (%+v)", m)
- }
- default:
- return nil, nil
- }
- return resp, nil
- }
- type applierV3Capped struct {
- applierV3
- q backendQuota
- }
- // newApplierV3Capped creates an applyV3 that will reject Puts and transactions
- // with Puts so that the number of keys in the store is capped.
- func newApplierV3Capped(base applierV3) applierV3 { return &applierV3Capped{applierV3: base} }
- func (a *applierV3Capped) Put(txnID int64, p *pb.PutRequest) (*pb.PutResponse, error) {
- return nil, ErrNoSpace
- }
- func (a *applierV3Capped) Txn(r *pb.TxnRequest) (*pb.TxnResponse, error) {
- if a.q.Cost(r) > 0 {
- return nil, ErrNoSpace
- }
- return a.applierV3.Txn(r)
- }
- func (a *applierV3Capped) LeaseGrant(lc *pb.LeaseGrantRequest) (*pb.LeaseGrantResponse, error) {
- return nil, ErrNoSpace
- }
- func (a *applierV3backend) AuthEnable() (*pb.AuthEnableResponse, error) {
- err := a.s.AuthStore().AuthEnable()
- if err != nil {
- return nil, err
- }
- return &pb.AuthEnableResponse{}, nil
- }
- func (a *applierV3backend) AuthDisable() (*pb.AuthDisableResponse, error) {
- a.s.AuthStore().AuthDisable()
- return &pb.AuthDisableResponse{}, nil
- }
- func (a *applierV3backend) Authenticate(r *pb.InternalAuthenticateRequest) (*pb.AuthenticateResponse, error) {
- ctx := context.WithValue(context.WithValue(context.TODO(), "index", a.s.consistIndex.ConsistentIndex()), "simpleToken", r.SimpleToken)
- return a.s.AuthStore().Authenticate(ctx, r.Name, r.Password)
- }
- func (a *applierV3backend) UserAdd(r *pb.AuthUserAddRequest) (*pb.AuthUserAddResponse, error) {
- return a.s.AuthStore().UserAdd(r)
- }
- func (a *applierV3backend) UserDelete(r *pb.AuthUserDeleteRequest) (*pb.AuthUserDeleteResponse, error) {
- return a.s.AuthStore().UserDelete(r)
- }
- func (a *applierV3backend) UserChangePassword(r *pb.AuthUserChangePasswordRequest) (*pb.AuthUserChangePasswordResponse, error) {
- return a.s.AuthStore().UserChangePassword(r)
- }
- func (a *applierV3backend) UserGrantRole(r *pb.AuthUserGrantRoleRequest) (*pb.AuthUserGrantRoleResponse, error) {
- return a.s.AuthStore().UserGrantRole(r)
- }
- func (a *applierV3backend) UserGet(r *pb.AuthUserGetRequest) (*pb.AuthUserGetResponse, error) {
- return a.s.AuthStore().UserGet(r)
- }
- func (a *applierV3backend) UserRevokeRole(r *pb.AuthUserRevokeRoleRequest) (*pb.AuthUserRevokeRoleResponse, error) {
- return a.s.AuthStore().UserRevokeRole(r)
- }
- func (a *applierV3backend) RoleAdd(r *pb.AuthRoleAddRequest) (*pb.AuthRoleAddResponse, error) {
- return a.s.AuthStore().RoleAdd(r)
- }
- func (a *applierV3backend) RoleGrantPermission(r *pb.AuthRoleGrantPermissionRequest) (*pb.AuthRoleGrantPermissionResponse, error) {
- return a.s.AuthStore().RoleGrantPermission(r)
- }
- func (a *applierV3backend) RoleGet(r *pb.AuthRoleGetRequest) (*pb.AuthRoleGetResponse, error) {
- return a.s.AuthStore().RoleGet(r)
- }
- func (a *applierV3backend) RoleRevokePermission(r *pb.AuthRoleRevokePermissionRequest) (*pb.AuthRoleRevokePermissionResponse, error) {
- return a.s.AuthStore().RoleRevokePermission(r)
- }
- func (a *applierV3backend) RoleDelete(r *pb.AuthRoleDeleteRequest) (*pb.AuthRoleDeleteResponse, error) {
- return a.s.AuthStore().RoleDelete(r)
- }
- func (a *applierV3backend) UserList(r *pb.AuthUserListRequest) (*pb.AuthUserListResponse, error) {
- return a.s.AuthStore().UserList(r)
- }
- func (a *applierV3backend) RoleList(r *pb.AuthRoleListRequest) (*pb.AuthRoleListResponse, error) {
- return a.s.AuthStore().RoleList(r)
- }
- type quotaApplierV3 struct {
- applierV3
- q Quota
- }
- func newQuotaApplierV3(s *EtcdServer, app applierV3) applierV3 {
- return "aApplierV3{app, NewBackendQuota(s)}
- }
- func (a *quotaApplierV3) Put(txnID int64, p *pb.PutRequest) (*pb.PutResponse, error) {
- ok := a.q.Available(p)
- resp, err := a.applierV3.Put(txnID, p)
- if err == nil && !ok {
- err = ErrNoSpace
- }
- return resp, err
- }
- func (a *quotaApplierV3) Txn(rt *pb.TxnRequest) (*pb.TxnResponse, error) {
- ok := a.q.Available(rt)
- resp, err := a.applierV3.Txn(rt)
- if err == nil && !ok {
- err = ErrNoSpace
- }
- return resp, err
- }
- func (a *quotaApplierV3) LeaseGrant(lc *pb.LeaseGrantRequest) (*pb.LeaseGrantResponse, error) {
- ok := a.q.Available(lc)
- resp, err := a.applierV3.LeaseGrant(lc)
- if err == nil && !ok {
- err = ErrNoSpace
- }
- return resp, err
- }
- type kvSort struct{ kvs []mvccpb.KeyValue }
- func (s *kvSort) Swap(i, j int) {
- t := s.kvs[i]
- s.kvs[i] = s.kvs[j]
- s.kvs[j] = t
- }
- func (s *kvSort) Len() int { return len(s.kvs) }
- type kvSortByKey struct{ *kvSort }
- func (s *kvSortByKey) Less(i, j int) bool {
- return bytes.Compare(s.kvs[i].Key, s.kvs[j].Key) < 0
- }
- type kvSortByVersion struct{ *kvSort }
- func (s *kvSortByVersion) Less(i, j int) bool {
- return (s.kvs[i].Version - s.kvs[j].Version) < 0
- }
- type kvSortByCreate struct{ *kvSort }
- func (s *kvSortByCreate) Less(i, j int) bool {
- return (s.kvs[i].CreateRevision - s.kvs[j].CreateRevision) < 0
- }
- type kvSortByMod struct{ *kvSort }
- func (s *kvSortByMod) Less(i, j int) bool {
- return (s.kvs[i].ModRevision - s.kvs[j].ModRevision) < 0
- }
- type kvSortByValue struct{ *kvSort }
- func (s *kvSortByValue) Less(i, j int) bool {
- return bytes.Compare(s.kvs[i].Value, s.kvs[j].Value) < 0
- }
- func (a *applierV3backend) checkRequestLeases(reqs []*pb.RequestOp) error {
- for _, requ := range reqs {
- tv, ok := requ.Request.(*pb.RequestOp_RequestPut)
- if !ok {
- continue
- }
- preq := tv.RequestPut
- if preq == nil || lease.LeaseID(preq.Lease) == lease.NoLease {
- continue
- }
- if l := a.s.lessor.Lookup(lease.LeaseID(preq.Lease)); l == nil {
- return lease.ErrLeaseNotFound
- }
- }
- return nil
- }
- func (a *applierV3backend) checkRequestRange(reqs []*pb.RequestOp) error {
- for _, requ := range reqs {
- tv, ok := requ.Request.(*pb.RequestOp_RequestRange)
- if !ok {
- continue
- }
- greq := tv.RequestRange
- if greq == nil || greq.Revision == 0 {
- continue
- }
- if greq.Revision > a.s.KV().Rev() {
- return mvcc.ErrFutureRev
- }
- if greq.Revision < a.s.KV().FirstRev() {
- return mvcc.ErrCompacted
- }
- }
- return nil
- }
- func compareInt64(a, b int64) int {
- switch {
- case a < b:
- return -1
- case a > b:
- return 1
- default:
- return 0
- }
- }
- // isGteRange determines if the range end is a >= range. This works around grpc
- // sending empty byte strings as nil; >= is encoded in the range end as '\0'.
- func isGteRange(rangeEnd []byte) bool {
- return len(rangeEnd) == 1 && rangeEnd[0] == 0
- }
|