v3_lease_test.go 19 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685
  1. // Copyright 2016 The etcd Authors
  2. //
  3. // Licensed under the Apache License, Version 2.0 (the "License");
  4. // you may not use this file except in compliance with the License.
  5. // You may obtain a copy of the License at
  6. //
  7. // http://www.apache.org/licenses/LICENSE-2.0
  8. //
  9. // Unless required by applicable law or agreed to in writing, software
  10. // distributed under the License is distributed on an "AS IS" BASIS,
  11. // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  12. // See the License for the specific language governing permissions and
  13. // limitations under the License.
  14. package integration
  15. import (
  16. "fmt"
  17. "testing"
  18. "time"
  19. "github.com/coreos/etcd/etcdserver/api/v3rpc/rpctypes"
  20. pb "github.com/coreos/etcd/etcdserver/etcdserverpb"
  21. "github.com/coreos/etcd/mvcc/mvccpb"
  22. "github.com/coreos/etcd/pkg/testutil"
  23. "golang.org/x/net/context"
  24. )
  25. // TestV3LeasePrmote ensures the newly elected leader can promote itself
  26. // to the primary lessor, refresh the leases and start to manage leases.
  27. // TODO: use customized clock to make this test go faster?
  28. func TestV3LeasePrmote(t *testing.T) {
  29. clus := NewClusterV3(t, &ClusterConfig{Size: 3})
  30. defer clus.Terminate(t)
  31. // create lease
  32. lresp, err := toGRPC(clus.RandClient()).Lease.LeaseGrant(context.TODO(), &pb.LeaseGrantRequest{TTL: 5})
  33. if err != nil {
  34. t.Fatal(err)
  35. }
  36. if lresp.Error != "" {
  37. t.Fatal(lresp.Error)
  38. }
  39. // wait until the lease is going to expire.
  40. time.Sleep(time.Duration(lresp.TTL-1) * time.Second)
  41. // kill the current leader, all leases should be refreshed.
  42. toStop := clus.waitLeader(t, clus.Members)
  43. clus.Members[toStop].Stop(t)
  44. var toWait []*member
  45. for i, m := range clus.Members {
  46. if i != toStop {
  47. toWait = append(toWait, m)
  48. }
  49. }
  50. clus.waitLeader(t, toWait)
  51. clus.Members[toStop].Restart(t)
  52. clus.waitLeader(t, clus.Members)
  53. // ensure lease is refreshed by waiting for a "long" time.
  54. // it was going to expire anyway.
  55. time.Sleep(3 * time.Second)
  56. if !leaseExist(t, clus, lresp.ID) {
  57. t.Error("unexpected lease not exists")
  58. }
  59. // let lease expires. total lease = 5 seconds and we already
  60. // waits for 3 seconds, so 3 seconds more is enough.
  61. time.Sleep(3 * time.Second)
  62. if leaseExist(t, clus, lresp.ID) {
  63. t.Error("unexpected lease exists")
  64. }
  65. }
  66. // TestV3LeaseRevoke ensures a key is deleted once its lease is revoked.
  67. func TestV3LeaseRevoke(t *testing.T) {
  68. defer testutil.AfterTest(t)
  69. testLeaseRemoveLeasedKey(t, func(clus *ClusterV3, leaseID int64) error {
  70. lc := toGRPC(clus.RandClient()).Lease
  71. _, err := lc.LeaseRevoke(context.TODO(), &pb.LeaseRevokeRequest{ID: leaseID})
  72. return err
  73. })
  74. }
  75. // TestV3LeaseGrantById ensures leases may be created by a given id.
  76. func TestV3LeaseGrantByID(t *testing.T) {
  77. defer testutil.AfterTest(t)
  78. clus := NewClusterV3(t, &ClusterConfig{Size: 3})
  79. defer clus.Terminate(t)
  80. // create fixed lease
  81. lresp, err := toGRPC(clus.RandClient()).Lease.LeaseGrant(
  82. context.TODO(),
  83. &pb.LeaseGrantRequest{ID: 1, TTL: 1})
  84. if err != nil {
  85. t.Errorf("could not create lease 1 (%v)", err)
  86. }
  87. if lresp.ID != 1 {
  88. t.Errorf("got id %v, wanted id %v", lresp.ID, 1)
  89. }
  90. // create duplicate fixed lease
  91. lresp, err = toGRPC(clus.RandClient()).Lease.LeaseGrant(
  92. context.TODO(),
  93. &pb.LeaseGrantRequest{ID: 1, TTL: 1})
  94. if !eqErrGRPC(err, rpctypes.ErrGRPCLeaseExist) {
  95. t.Error(err)
  96. }
  97. // create fresh fixed lease
  98. lresp, err = toGRPC(clus.RandClient()).Lease.LeaseGrant(
  99. context.TODO(),
  100. &pb.LeaseGrantRequest{ID: 2, TTL: 1})
  101. if err != nil {
  102. t.Errorf("could not create lease 2 (%v)", err)
  103. }
  104. if lresp.ID != 2 {
  105. t.Errorf("got id %v, wanted id %v", lresp.ID, 2)
  106. }
  107. }
  108. // TestV3LeaseExpire ensures a key is deleted once a key expires.
  109. func TestV3LeaseExpire(t *testing.T) {
  110. defer testutil.AfterTest(t)
  111. testLeaseRemoveLeasedKey(t, func(clus *ClusterV3, leaseID int64) error {
  112. // let lease lapse; wait for deleted key
  113. ctx, cancel := context.WithCancel(context.Background())
  114. defer cancel()
  115. wStream, err := toGRPC(clus.RandClient()).Watch.Watch(ctx)
  116. if err != nil {
  117. return err
  118. }
  119. wreq := &pb.WatchRequest{RequestUnion: &pb.WatchRequest_CreateRequest{
  120. CreateRequest: &pb.WatchCreateRequest{
  121. Key: []byte("foo"), StartRevision: 1}}}
  122. if err := wStream.Send(wreq); err != nil {
  123. return err
  124. }
  125. if _, err := wStream.Recv(); err != nil {
  126. // the 'created' message
  127. return err
  128. }
  129. if _, err := wStream.Recv(); err != nil {
  130. // the 'put' message
  131. return err
  132. }
  133. errc := make(chan error, 1)
  134. go func() {
  135. resp, err := wStream.Recv()
  136. switch {
  137. case err != nil:
  138. errc <- err
  139. case len(resp.Events) != 1:
  140. fallthrough
  141. case resp.Events[0].Type != mvccpb.DELETE:
  142. errc <- fmt.Errorf("expected key delete, got %v", resp)
  143. default:
  144. errc <- nil
  145. }
  146. }()
  147. select {
  148. case <-time.After(15 * time.Second):
  149. return fmt.Errorf("lease expiration too slow")
  150. case err := <-errc:
  151. return err
  152. }
  153. })
  154. }
  155. // TestV3LeaseKeepAlive ensures keepalive keeps the lease alive.
  156. func TestV3LeaseKeepAlive(t *testing.T) {
  157. defer testutil.AfterTest(t)
  158. testLeaseRemoveLeasedKey(t, func(clus *ClusterV3, leaseID int64) error {
  159. lc := toGRPC(clus.RandClient()).Lease
  160. lreq := &pb.LeaseKeepAliveRequest{ID: leaseID}
  161. ctx, cancel := context.WithCancel(context.Background())
  162. defer cancel()
  163. lac, err := lc.LeaseKeepAlive(ctx)
  164. if err != nil {
  165. return err
  166. }
  167. defer lac.CloseSend()
  168. // renew long enough so lease would've expired otherwise
  169. for i := 0; i < 3; i++ {
  170. if err = lac.Send(lreq); err != nil {
  171. return err
  172. }
  173. lresp, rxerr := lac.Recv()
  174. if rxerr != nil {
  175. return rxerr
  176. }
  177. if lresp.ID != leaseID {
  178. return fmt.Errorf("expected lease ID %v, got %v", leaseID, lresp.ID)
  179. }
  180. time.Sleep(time.Duration(lresp.TTL/2) * time.Second)
  181. }
  182. _, err = lc.LeaseRevoke(context.TODO(), &pb.LeaseRevokeRequest{ID: leaseID})
  183. return err
  184. })
  185. }
  186. // TestV3LeaseExists creates a lease on a random client and confirms it exists in the cluster.
  187. func TestV3LeaseExists(t *testing.T) {
  188. defer testutil.AfterTest(t)
  189. clus := NewClusterV3(t, &ClusterConfig{Size: 3})
  190. defer clus.Terminate(t)
  191. // create lease
  192. ctx0, cancel0 := context.WithCancel(context.Background())
  193. defer cancel0()
  194. lresp, err := toGRPC(clus.RandClient()).Lease.LeaseGrant(
  195. ctx0,
  196. &pb.LeaseGrantRequest{TTL: 30})
  197. if err != nil {
  198. t.Fatal(err)
  199. }
  200. if lresp.Error != "" {
  201. t.Fatal(lresp.Error)
  202. }
  203. if !leaseExist(t, clus, lresp.ID) {
  204. t.Error("unexpected lease not exists")
  205. }
  206. }
  207. func TestV3PutOnNonExistLease(t *testing.T) {
  208. defer testutil.AfterTest(t)
  209. clus := NewClusterV3(t, &ClusterConfig{Size: 1})
  210. defer clus.Terminate(t)
  211. ctx, cancel := context.WithCancel(context.Background())
  212. defer cancel()
  213. badLeaseID := int64(0x12345678)
  214. putr := &pb.PutRequest{Key: []byte("foo"), Value: []byte("bar"), Lease: badLeaseID}
  215. _, err := toGRPC(clus.RandClient()).KV.Put(ctx, putr)
  216. if !eqErrGRPC(err, rpctypes.ErrGRPCLeaseNotFound) {
  217. t.Errorf("err = %v, want %v", err, rpctypes.ErrGRPCLeaseNotFound)
  218. }
  219. }
  220. // TestV3GetNonExistLease tests the case where the non exist lease is report as lease not found error using LeaseTimeToLive()
  221. // A bug was found when a non leader etcd server returns nil instead of lease not found error which caues the server to crash.
  222. // related issue https://github.com/coreos/etcd/issues/6537
  223. func TestV3GetNonExistLease(t *testing.T) {
  224. defer testutil.AfterTest(t)
  225. clus := NewClusterV3(t, &ClusterConfig{Size: 3})
  226. defer clus.Terminate(t)
  227. ctx, cancel := context.WithCancel(context.Background())
  228. defer cancel()
  229. leaseTTLr := &pb.LeaseTimeToLiveRequest{
  230. ID: 123,
  231. Keys: true,
  232. }
  233. for _, client := range clus.clients {
  234. _, err := toGRPC(client).Lease.LeaseTimeToLive(ctx, leaseTTLr)
  235. if !eqErrGRPC(err, rpctypes.ErrGRPCLeaseNotFound) {
  236. t.Errorf("err = %v, want %v", err, rpctypes.ErrGRPCLeaseNotFound)
  237. }
  238. }
  239. }
  240. // TestV3LeaseSwitch tests a key can be switched from one lease to another.
  241. func TestV3LeaseSwitch(t *testing.T) {
  242. defer testutil.AfterTest(t)
  243. clus := NewClusterV3(t, &ClusterConfig{Size: 3})
  244. defer clus.Terminate(t)
  245. key := "foo"
  246. // create lease
  247. ctx, cancel := context.WithCancel(context.Background())
  248. defer cancel()
  249. lresp1, err1 := toGRPC(clus.RandClient()).Lease.LeaseGrant(ctx, &pb.LeaseGrantRequest{TTL: 30})
  250. if err1 != nil {
  251. t.Fatal(err1)
  252. }
  253. lresp2, err2 := toGRPC(clus.RandClient()).Lease.LeaseGrant(ctx, &pb.LeaseGrantRequest{TTL: 30})
  254. if err2 != nil {
  255. t.Fatal(err2)
  256. }
  257. // attach key on lease1 then switch it to lease2
  258. put1 := &pb.PutRequest{Key: []byte(key), Lease: lresp1.ID}
  259. _, err := toGRPC(clus.RandClient()).KV.Put(ctx, put1)
  260. if err != nil {
  261. t.Fatal(err)
  262. }
  263. put2 := &pb.PutRequest{Key: []byte(key), Lease: lresp2.ID}
  264. _, err = toGRPC(clus.RandClient()).KV.Put(ctx, put2)
  265. if err != nil {
  266. t.Fatal(err)
  267. }
  268. // revoke lease1 should not remove key
  269. _, err = toGRPC(clus.RandClient()).Lease.LeaseRevoke(ctx, &pb.LeaseRevokeRequest{ID: lresp1.ID})
  270. if err != nil {
  271. t.Fatal(err)
  272. }
  273. rreq := &pb.RangeRequest{Key: []byte("foo")}
  274. rresp, err := toGRPC(clus.RandClient()).KV.Range(context.TODO(), rreq)
  275. if err != nil {
  276. t.Fatal(err)
  277. }
  278. if len(rresp.Kvs) != 1 {
  279. t.Fatalf("unexpect removal of key")
  280. }
  281. // revoke lease2 should remove key
  282. _, err = toGRPC(clus.RandClient()).Lease.LeaseRevoke(ctx, &pb.LeaseRevokeRequest{ID: lresp2.ID})
  283. if err != nil {
  284. t.Fatal(err)
  285. }
  286. rresp, err = toGRPC(clus.RandClient()).KV.Range(context.TODO(), rreq)
  287. if err != nil {
  288. t.Fatal(err)
  289. }
  290. if len(rresp.Kvs) != 0 {
  291. t.Fatalf("lease removed but key remains")
  292. }
  293. }
  294. // TestV3LeaseFailover ensures the old leader drops lease keepalive requests within
  295. // election timeout after it loses its quorum. And the new leader extends the TTL of
  296. // the lease to at least TTL + election timeout.
  297. func TestV3LeaseFailover(t *testing.T) {
  298. clus := NewClusterV3(t, &ClusterConfig{Size: 3})
  299. defer clus.Terminate(t)
  300. toIsolate := clus.waitLeader(t, clus.Members)
  301. lc := toGRPC(clus.Client(toIsolate)).Lease
  302. // create lease
  303. lresp, err := lc.LeaseGrant(context.TODO(), &pb.LeaseGrantRequest{TTL: 5})
  304. if err != nil {
  305. t.Fatal(err)
  306. }
  307. if lresp.Error != "" {
  308. t.Fatal(lresp.Error)
  309. }
  310. // isolate the current leader with its followers.
  311. clus.Members[toIsolate].Pause()
  312. lreq := &pb.LeaseKeepAliveRequest{ID: lresp.ID}
  313. ctx, cancel := context.WithCancel(context.Background())
  314. defer cancel()
  315. lac, err := lc.LeaseKeepAlive(ctx)
  316. if err != nil {
  317. t.Fatal(err)
  318. }
  319. defer lac.CloseSend()
  320. // send keep alive to old leader until the old leader starts
  321. // to drop lease request.
  322. var expectedExp time.Time
  323. for {
  324. if err = lac.Send(lreq); err != nil {
  325. break
  326. }
  327. lkresp, rxerr := lac.Recv()
  328. if rxerr != nil {
  329. break
  330. }
  331. expectedExp = time.Now().Add(time.Duration(lkresp.TTL) * time.Second)
  332. time.Sleep(time.Duration(lkresp.TTL/2) * time.Second)
  333. }
  334. clus.Members[toIsolate].Resume()
  335. clus.waitLeader(t, clus.Members)
  336. // lease should not expire at the last received expire deadline.
  337. time.Sleep(expectedExp.Sub(time.Now()) - 500*time.Millisecond)
  338. if !leaseExist(t, clus, lresp.ID) {
  339. t.Error("unexpected lease not exists")
  340. }
  341. }
  342. const fiveMinTTL int64 = 300
  343. // TestV3LeaseRecoverAndRevoke ensures that revoking a lease after restart deletes the attached key.
  344. func TestV3LeaseRecoverAndRevoke(t *testing.T) {
  345. clus := NewClusterV3(t, &ClusterConfig{Size: 1})
  346. defer clus.Terminate(t)
  347. kvc := toGRPC(clus.Client(0)).KV
  348. lsc := toGRPC(clus.Client(0)).Lease
  349. lresp, err := lsc.LeaseGrant(context.TODO(), &pb.LeaseGrantRequest{TTL: fiveMinTTL})
  350. if err != nil {
  351. t.Fatal(err)
  352. }
  353. if lresp.Error != "" {
  354. t.Fatal(lresp.Error)
  355. }
  356. _, err = kvc.Put(context.TODO(), &pb.PutRequest{Key: []byte("foo"), Value: []byte("bar"), Lease: lresp.ID})
  357. if err != nil {
  358. t.Fatal(err)
  359. }
  360. // restart server and ensure lease still exists
  361. clus.Members[0].Stop(t)
  362. clus.Members[0].Restart(t)
  363. clus.waitLeader(t, clus.Members)
  364. // overwrite old client with newly dialed connection
  365. // otherwise, error with "grpc: RPC failed fast due to transport failure"
  366. nc, err := NewClientV3(clus.Members[0])
  367. if err != nil {
  368. t.Fatal(err)
  369. }
  370. kvc = toGRPC(nc).KV
  371. lsc = toGRPC(nc).Lease
  372. defer nc.Close()
  373. // revoke should delete the key
  374. _, err = lsc.LeaseRevoke(context.TODO(), &pb.LeaseRevokeRequest{ID: lresp.ID})
  375. if err != nil {
  376. t.Fatal(err)
  377. }
  378. rresp, err := kvc.Range(context.TODO(), &pb.RangeRequest{Key: []byte("foo")})
  379. if err != nil {
  380. t.Fatal(err)
  381. }
  382. if len(rresp.Kvs) != 0 {
  383. t.Fatalf("lease removed but key remains")
  384. }
  385. }
  386. // TestV3LeaseRevokeAndRecover ensures that revoked key stays deleted after restart.
  387. func TestV3LeaseRevokeAndRecover(t *testing.T) {
  388. clus := NewClusterV3(t, &ClusterConfig{Size: 1})
  389. defer clus.Terminate(t)
  390. kvc := toGRPC(clus.Client(0)).KV
  391. lsc := toGRPC(clus.Client(0)).Lease
  392. lresp, err := lsc.LeaseGrant(context.TODO(), &pb.LeaseGrantRequest{TTL: fiveMinTTL})
  393. if err != nil {
  394. t.Fatal(err)
  395. }
  396. if lresp.Error != "" {
  397. t.Fatal(lresp.Error)
  398. }
  399. _, err = kvc.Put(context.TODO(), &pb.PutRequest{Key: []byte("foo"), Value: []byte("bar"), Lease: lresp.ID})
  400. if err != nil {
  401. t.Fatal(err)
  402. }
  403. // revoke should delete the key
  404. _, err = lsc.LeaseRevoke(context.TODO(), &pb.LeaseRevokeRequest{ID: lresp.ID})
  405. if err != nil {
  406. t.Fatal(err)
  407. }
  408. // restart server and ensure revoked key doesn't exist
  409. clus.Members[0].Stop(t)
  410. clus.Members[0].Restart(t)
  411. clus.waitLeader(t, clus.Members)
  412. // overwrite old client with newly dialed connection
  413. // otherwise, error with "grpc: RPC failed fast due to transport failure"
  414. nc, err := NewClientV3(clus.Members[0])
  415. if err != nil {
  416. t.Fatal(err)
  417. }
  418. kvc = toGRPC(nc).KV
  419. defer nc.Close()
  420. rresp, err := kvc.Range(context.TODO(), &pb.RangeRequest{Key: []byte("foo")})
  421. if err != nil {
  422. t.Fatal(err)
  423. }
  424. if len(rresp.Kvs) != 0 {
  425. t.Fatalf("lease removed but key remains")
  426. }
  427. }
  428. // TestV3LeaseRecoverKeyWithDetachedLease ensures that revoking a detached lease after restart
  429. // does not delete the key.
  430. func TestV3LeaseRecoverKeyWithDetachedLease(t *testing.T) {
  431. clus := NewClusterV3(t, &ClusterConfig{Size: 1})
  432. defer clus.Terminate(t)
  433. kvc := toGRPC(clus.Client(0)).KV
  434. lsc := toGRPC(clus.Client(0)).Lease
  435. lresp, err := lsc.LeaseGrant(context.TODO(), &pb.LeaseGrantRequest{TTL: fiveMinTTL})
  436. if err != nil {
  437. t.Fatal(err)
  438. }
  439. if lresp.Error != "" {
  440. t.Fatal(lresp.Error)
  441. }
  442. _, err = kvc.Put(context.TODO(), &pb.PutRequest{Key: []byte("foo"), Value: []byte("bar"), Lease: lresp.ID})
  443. if err != nil {
  444. t.Fatal(err)
  445. }
  446. // overwrite lease with none
  447. _, err = kvc.Put(context.TODO(), &pb.PutRequest{Key: []byte("foo"), Value: []byte("bar")})
  448. if err != nil {
  449. t.Fatal(err)
  450. }
  451. // restart server and ensure lease still exists
  452. clus.Members[0].Stop(t)
  453. clus.Members[0].Restart(t)
  454. clus.waitLeader(t, clus.Members)
  455. // overwrite old client with newly dialed connection
  456. // otherwise, error with "grpc: RPC failed fast due to transport failure"
  457. nc, err := NewClientV3(clus.Members[0])
  458. if err != nil {
  459. t.Fatal(err)
  460. }
  461. kvc = toGRPC(nc).KV
  462. lsc = toGRPC(nc).Lease
  463. defer nc.Close()
  464. // revoke the detached lease
  465. _, err = lsc.LeaseRevoke(context.TODO(), &pb.LeaseRevokeRequest{ID: lresp.ID})
  466. if err != nil {
  467. t.Fatal(err)
  468. }
  469. rresp, err := kvc.Range(context.TODO(), &pb.RangeRequest{Key: []byte("foo")})
  470. if err != nil {
  471. t.Fatal(err)
  472. }
  473. if len(rresp.Kvs) != 1 {
  474. t.Fatalf("only detached lease removed, key should remain")
  475. }
  476. }
  477. func TestV3LeaseRecoverKeyWithMutipleLease(t *testing.T) {
  478. clus := NewClusterV3(t, &ClusterConfig{Size: 1})
  479. defer clus.Terminate(t)
  480. kvc := toGRPC(clus.Client(0)).KV
  481. lsc := toGRPC(clus.Client(0)).Lease
  482. var leaseIDs []int64
  483. for i := 0; i < 2; i++ {
  484. lresp, err := lsc.LeaseGrant(context.TODO(), &pb.LeaseGrantRequest{TTL: fiveMinTTL})
  485. if err != nil {
  486. t.Fatal(err)
  487. }
  488. if lresp.Error != "" {
  489. t.Fatal(lresp.Error)
  490. }
  491. leaseIDs = append(leaseIDs, lresp.ID)
  492. _, err = kvc.Put(context.TODO(), &pb.PutRequest{Key: []byte("foo"), Value: []byte("bar"), Lease: lresp.ID})
  493. if err != nil {
  494. t.Fatal(err)
  495. }
  496. }
  497. // restart server and ensure lease still exists
  498. clus.Members[0].Stop(t)
  499. clus.Members[0].Restart(t)
  500. clus.waitLeader(t, clus.Members)
  501. for i, leaseID := range leaseIDs {
  502. if !leaseExist(t, clus, leaseID) {
  503. t.Errorf("#%d: unexpected lease not exists", i)
  504. }
  505. }
  506. // overwrite old client with newly dialed connection
  507. // otherwise, error with "grpc: RPC failed fast due to transport failure"
  508. nc, err := NewClientV3(clus.Members[0])
  509. if err != nil {
  510. t.Fatal(err)
  511. }
  512. kvc = toGRPC(nc).KV
  513. lsc = toGRPC(nc).Lease
  514. defer nc.Close()
  515. // revoke the old lease
  516. _, err = lsc.LeaseRevoke(context.TODO(), &pb.LeaseRevokeRequest{ID: leaseIDs[0]})
  517. if err != nil {
  518. t.Fatal(err)
  519. }
  520. // key should still exist
  521. rresp, err := kvc.Range(context.TODO(), &pb.RangeRequest{Key: []byte("foo")})
  522. if err != nil {
  523. t.Fatal(err)
  524. }
  525. if len(rresp.Kvs) != 1 {
  526. t.Fatalf("only detached lease removed, key should remain")
  527. }
  528. // revoke the latest lease
  529. _, err = lsc.LeaseRevoke(context.TODO(), &pb.LeaseRevokeRequest{ID: leaseIDs[1]})
  530. if err != nil {
  531. t.Fatal(err)
  532. }
  533. rresp, err = kvc.Range(context.TODO(), &pb.RangeRequest{Key: []byte("foo")})
  534. if err != nil {
  535. t.Fatal(err)
  536. }
  537. if len(rresp.Kvs) != 0 {
  538. t.Fatalf("lease removed but key remains")
  539. }
  540. }
  541. // acquireLeaseAndKey creates a new lease and creates an attached key.
  542. func acquireLeaseAndKey(clus *ClusterV3, key string) (int64, error) {
  543. // create lease
  544. lresp, err := toGRPC(clus.RandClient()).Lease.LeaseGrant(
  545. context.TODO(),
  546. &pb.LeaseGrantRequest{TTL: 1})
  547. if err != nil {
  548. return 0, err
  549. }
  550. if lresp.Error != "" {
  551. return 0, fmt.Errorf(lresp.Error)
  552. }
  553. // attach to key
  554. put := &pb.PutRequest{Key: []byte(key), Lease: lresp.ID}
  555. if _, err := toGRPC(clus.RandClient()).KV.Put(context.TODO(), put); err != nil {
  556. return 0, err
  557. }
  558. return lresp.ID, nil
  559. }
  560. // testLeaseRemoveLeasedKey performs some action while holding a lease with an
  561. // attached key "foo", then confirms the key is gone.
  562. func testLeaseRemoveLeasedKey(t *testing.T, act func(*ClusterV3, int64) error) {
  563. clus := NewClusterV3(t, &ClusterConfig{Size: 3})
  564. defer clus.Terminate(t)
  565. leaseID, err := acquireLeaseAndKey(clus, "foo")
  566. if err != nil {
  567. t.Fatal(err)
  568. }
  569. if err = act(clus, leaseID); err != nil {
  570. t.Fatal(err)
  571. }
  572. // confirm no key
  573. rreq := &pb.RangeRequest{Key: []byte("foo")}
  574. rresp, err := toGRPC(clus.RandClient()).KV.Range(context.TODO(), rreq)
  575. if err != nil {
  576. t.Fatal(err)
  577. }
  578. if len(rresp.Kvs) != 0 {
  579. t.Fatalf("lease removed but key remains")
  580. }
  581. }
  582. func leaseExist(t *testing.T, clus *ClusterV3, leaseID int64) bool {
  583. l := toGRPC(clus.RandClient()).Lease
  584. _, err := l.LeaseGrant(context.Background(), &pb.LeaseGrantRequest{ID: leaseID, TTL: 5})
  585. if err == nil {
  586. _, err = l.LeaseRevoke(context.Background(), &pb.LeaseRevokeRequest{ID: leaseID})
  587. if err != nil {
  588. t.Fatalf("failed to check lease %v", err)
  589. }
  590. return false
  591. }
  592. if eqErrGRPC(err, rpctypes.ErrGRPCLeaseExist) {
  593. return true
  594. }
  595. t.Fatalf("unexpecter error %v", err)
  596. return true
  597. }