ctl_v3_test.go 5.9 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249
  1. // Copyright 2016 The etcd Authors
  2. //
  3. // Licensed under the Apache License, Version 2.0 (the "License");
  4. // you may not use this file except in compliance with the License.
  5. // You may obtain a copy of the License at
  6. //
  7. // http://www.apache.org/licenses/LICENSE-2.0
  8. //
  9. // Unless required by applicable law or agreed to in writing, software
  10. // distributed under the License is distributed on an "AS IS" BASIS,
  11. // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  12. // See the License for the specific language governing permissions and
  13. // limitations under the License.
  14. package e2e
  15. import (
  16. "fmt"
  17. "os"
  18. "strings"
  19. "testing"
  20. "time"
  21. "github.com/coreos/etcd/pkg/flags"
  22. "github.com/coreos/etcd/pkg/testutil"
  23. "github.com/coreos/etcd/version"
  24. )
  25. func TestCtlV3Version(t *testing.T) { testCtl(t, versionTest) }
  26. func versionTest(cx ctlCtx) {
  27. if err := ctlV3Version(cx); err != nil {
  28. cx.t.Fatalf("versionTest ctlV3Version error (%v)", err)
  29. }
  30. }
  31. func ctlV3Version(cx ctlCtx) error {
  32. cmdArgs := append(cx.PrefixArgs(), "version")
  33. return spawnWithExpect(cmdArgs, version.Version)
  34. }
  35. // TestCtlV3DialWithHTTPScheme ensures that client handles endpoints with HTTPS scheme.
  36. func TestCtlV3DialWithHTTPScheme(t *testing.T) {
  37. testCtl(t, dialWithSchemeTest, withCfg(configClientTLS))
  38. }
  39. func dialWithSchemeTest(cx ctlCtx) {
  40. cmdArgs := append(cx.prefixArgs(cx.epc.EndpointsV3()), "put", "foo", "bar")
  41. if err := spawnWithExpect(cmdArgs, "OK"); err != nil {
  42. cx.t.Fatal(err)
  43. }
  44. }
  45. type ctlCtx struct {
  46. t *testing.T
  47. cfg etcdProcessClusterConfig
  48. quotaBackendBytes int64
  49. corruptFunc func(string) error
  50. noStrictReconfig bool
  51. epc *etcdProcessCluster
  52. envMap map[string]struct{}
  53. dialTimeout time.Duration
  54. quorum bool // if true, set up 3-node cluster and linearizable read
  55. interactive bool
  56. user string
  57. pass string
  58. initialCorruptCheck bool
  59. // for compaction
  60. compactPhysical bool
  61. }
  62. type ctlOption func(*ctlCtx)
  63. func (cx *ctlCtx) applyOpts(opts []ctlOption) {
  64. for _, opt := range opts {
  65. opt(cx)
  66. }
  67. }
  68. func withCfg(cfg etcdProcessClusterConfig) ctlOption {
  69. return func(cx *ctlCtx) { cx.cfg = cfg }
  70. }
  71. func withDialTimeout(timeout time.Duration) ctlOption {
  72. return func(cx *ctlCtx) { cx.dialTimeout = timeout }
  73. }
  74. func withQuorum() ctlOption {
  75. return func(cx *ctlCtx) { cx.quorum = true }
  76. }
  77. func withInteractive() ctlOption {
  78. return func(cx *ctlCtx) { cx.interactive = true }
  79. }
  80. func withQuota(b int64) ctlOption {
  81. return func(cx *ctlCtx) { cx.quotaBackendBytes = b }
  82. }
  83. func withCompactPhysical() ctlOption {
  84. return func(cx *ctlCtx) { cx.compactPhysical = true }
  85. }
  86. func withInitialCorruptCheck() ctlOption {
  87. return func(cx *ctlCtx) { cx.initialCorruptCheck = true }
  88. }
  89. func withCorruptFunc(f func(string) error) ctlOption {
  90. return func(cx *ctlCtx) { cx.corruptFunc = f }
  91. }
  92. func withNoStrictReconfig() ctlOption {
  93. return func(cx *ctlCtx) { cx.noStrictReconfig = true }
  94. }
  95. func withFlagByEnv() ctlOption {
  96. return func(cx *ctlCtx) { cx.envMap = make(map[string]struct{}) }
  97. }
  98. func testCtl(t *testing.T, testFunc func(ctlCtx), opts ...ctlOption) {
  99. defer testutil.AfterTest(t)
  100. ret := ctlCtx{
  101. t: t,
  102. cfg: configAutoTLS,
  103. dialTimeout: 7 * time.Second,
  104. }
  105. ret.applyOpts(opts)
  106. mustEtcdctl(t)
  107. if !ret.quorum {
  108. ret.cfg = *configStandalone(ret.cfg)
  109. }
  110. if ret.quotaBackendBytes > 0 {
  111. ret.cfg.quotaBackendBytes = ret.quotaBackendBytes
  112. }
  113. ret.cfg.noStrictReconfig = ret.noStrictReconfig
  114. if ret.initialCorruptCheck {
  115. ret.cfg.initialCorruptCheck = ret.initialCorruptCheck
  116. }
  117. epc, err := newEtcdProcessCluster(&ret.cfg)
  118. if err != nil {
  119. t.Fatalf("could not start etcd process cluster (%v)", err)
  120. }
  121. ret.epc = epc
  122. defer func() {
  123. if ret.envMap != nil {
  124. for k := range ret.envMap {
  125. os.Unsetenv(k)
  126. }
  127. }
  128. if errC := ret.epc.Close(); errC != nil {
  129. t.Fatalf("error closing etcd processes (%v)", errC)
  130. }
  131. }()
  132. donec := make(chan struct{})
  133. go func() {
  134. defer close(donec)
  135. testFunc(ret)
  136. }()
  137. timeout := 2*ret.dialTimeout + time.Second
  138. if ret.dialTimeout == 0 {
  139. timeout = 30 * time.Second
  140. }
  141. select {
  142. case <-time.After(timeout):
  143. testutil.FatalStack(t, fmt.Sprintf("test timed out after %v", timeout))
  144. case <-donec:
  145. }
  146. }
  147. func (cx *ctlCtx) prefixArgs(eps []string) []string {
  148. fmap := make(map[string]string)
  149. fmap["endpoints"] = strings.Join(eps, ",")
  150. fmap["dial-timeout"] = cx.dialTimeout.String()
  151. if cx.epc.cfg.clientTLS == clientTLS {
  152. if cx.epc.cfg.isClientAutoTLS {
  153. fmap["insecure-transport"] = "false"
  154. fmap["insecure-skip-tls-verify"] = "true"
  155. } else if cx.epc.cfg.isClientCRL {
  156. fmap["cacert"] = caPath
  157. fmap["cert"] = revokedCertPath
  158. fmap["key"] = revokedPrivateKeyPath
  159. } else {
  160. fmap["cacert"] = caPath
  161. fmap["cert"] = certPath
  162. fmap["key"] = privateKeyPath
  163. }
  164. }
  165. if cx.user != "" {
  166. fmap["user"] = cx.user + ":" + cx.pass
  167. }
  168. useEnv := cx.envMap != nil
  169. cmdArgs := []string{ctlBinPath + "3"}
  170. for k, v := range fmap {
  171. if useEnv {
  172. ek := flags.FlagToEnv("ETCDCTL", k)
  173. os.Setenv(ek, v)
  174. cx.envMap[ek] = struct{}{}
  175. } else {
  176. cmdArgs = append(cmdArgs, fmt.Sprintf("--%s=%s", k, v))
  177. }
  178. }
  179. return cmdArgs
  180. }
  181. // PrefixArgs prefixes etcdctl command.
  182. // Make sure to unset environment variables after tests.
  183. func (cx *ctlCtx) PrefixArgs() []string {
  184. return cx.prefixArgs(cx.epc.EndpointsV3())
  185. }
  186. func isGRPCTimedout(err error) bool {
  187. return strings.Contains(err.Error(), "grpc: timed out trying to connect")
  188. }
  189. func (cx *ctlCtx) memberToRemove() (ep string, memberID string, clusterID string) {
  190. n1 := cx.cfg.clusterSize
  191. if n1 < 2 {
  192. cx.t.Fatalf("%d-node is too small to test 'member remove'", n1)
  193. }
  194. resp, err := getMemberList(*cx)
  195. if err != nil {
  196. cx.t.Fatal(err)
  197. }
  198. if n1 != len(resp.Members) {
  199. cx.t.Fatalf("expected %d, got %d", n1, len(resp.Members))
  200. }
  201. ep = resp.Members[0].ClientURLs[0]
  202. clusterID = fmt.Sprintf("%x", resp.Header.ClusterId)
  203. memberID = fmt.Sprintf("%x", resp.Members[1].ID)
  204. return ep, memberID, clusterID
  205. }