v3_grpc_test.go 26 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978
  1. // Copyright 2016 CoreOS, Inc.
  2. //
  3. // Licensed under the Apache License, Version 2.0 (the "License");
  4. // you may not use this file except in compliance with the License.
  5. // You may obtain a copy of the License at
  6. //
  7. // http://www.apache.org/licenses/LICENSE-2.0
  8. //
  9. // Unless required by applicable law or agreed to in writing, software
  10. // distributed under the License is distributed on an "AS IS" BASIS,
  11. // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  12. // See the License for the specific language governing permissions and
  13. // limitations under the License.
  14. package integration
  15. import (
  16. "fmt"
  17. "math/rand"
  18. "reflect"
  19. "testing"
  20. "time"
  21. "github.com/coreos/etcd/etcdserver/api/v3rpc"
  22. "github.com/coreos/etcd/etcdserver/api/v3rpc/rpctypes"
  23. pb "github.com/coreos/etcd/etcdserver/etcdserverpb"
  24. "github.com/coreos/etcd/pkg/testutil"
  25. "golang.org/x/net/context"
  26. "google.golang.org/grpc"
  27. )
  28. // TestV3PutOverwrite puts a key with the v3 api to a random cluster member,
  29. // overwrites it, then checks that the change was applied.
  30. func TestV3PutOverwrite(t *testing.T) {
  31. defer testutil.AfterTest(t)
  32. clus := NewClusterV3(t, &ClusterConfig{Size: 3})
  33. defer clus.Terminate(t)
  34. kvc := toGRPC(clus.RandClient()).KV
  35. key := []byte("foo")
  36. reqput := &pb.PutRequest{Key: key, Value: []byte("bar")}
  37. respput, err := kvc.Put(context.TODO(), reqput)
  38. if err != nil {
  39. t.Fatalf("couldn't put key (%v)", err)
  40. }
  41. // overwrite
  42. reqput.Value = []byte("baz")
  43. respput2, err := kvc.Put(context.TODO(), reqput)
  44. if err != nil {
  45. t.Fatalf("couldn't put key (%v)", err)
  46. }
  47. if respput2.Header.Revision <= respput.Header.Revision {
  48. t.Fatalf("expected newer revision on overwrite, got %v <= %v",
  49. respput2.Header.Revision, respput.Header.Revision)
  50. }
  51. reqrange := &pb.RangeRequest{Key: key}
  52. resprange, err := kvc.Range(context.TODO(), reqrange)
  53. if err != nil {
  54. t.Fatalf("couldn't get key (%v)", err)
  55. }
  56. if len(resprange.Kvs) != 1 {
  57. t.Fatalf("expected 1 key, got %v", len(resprange.Kvs))
  58. }
  59. kv := resprange.Kvs[0]
  60. if kv.ModRevision <= kv.CreateRevision {
  61. t.Errorf("expected modRev > createRev, got %d <= %d",
  62. kv.ModRevision, kv.CreateRevision)
  63. }
  64. if !reflect.DeepEqual(reqput.Value, kv.Value) {
  65. t.Errorf("expected value %v, got %v", reqput.Value, kv.Value)
  66. }
  67. }
  68. // TestPutRestart checks if a put after an unrelated member restart succeeds
  69. func TestV3PutRestart(t *testing.T) {
  70. // this test might block for 5 seconds, make it parallel to speed up the test.
  71. t.Parallel()
  72. defer testutil.AfterTest(t)
  73. clus := NewClusterV3(t, &ClusterConfig{Size: 3})
  74. defer clus.Terminate(t)
  75. kvIdx := rand.Intn(3)
  76. kvc := toGRPC(clus.Client(kvIdx)).KV
  77. stopIdx := kvIdx
  78. for stopIdx == kvIdx {
  79. stopIdx = rand.Intn(3)
  80. }
  81. clus.clients[stopIdx].Close()
  82. clus.Members[stopIdx].Stop(t)
  83. clus.Members[stopIdx].Restart(t)
  84. c, cerr := NewClientV3(clus.Members[stopIdx])
  85. if cerr != nil {
  86. t.Fatal(cerr)
  87. }
  88. clus.clients[stopIdx] = c
  89. ctx, cancel := context.WithTimeout(context.TODO(), 10*time.Second)
  90. defer cancel()
  91. reqput := &pb.PutRequest{Key: []byte("foo"), Value: []byte("bar")}
  92. _, err := kvc.Put(ctx, reqput)
  93. if err != nil && err == ctx.Err() {
  94. t.Fatalf("expected grpc error, got local ctx error (%v)", err)
  95. }
  96. }
  97. // TestV3CompactCurrentRev ensures keys are present when compacting on current revision.
  98. func TestV3CompactCurrentRev(t *testing.T) {
  99. defer testutil.AfterTest(t)
  100. clus := NewClusterV3(t, &ClusterConfig{Size: 1})
  101. defer clus.Terminate(t)
  102. kvc := toGRPC(clus.RandClient()).KV
  103. preq := &pb.PutRequest{Key: []byte("foo"), Value: []byte("bar")}
  104. for i := 0; i < 3; i++ {
  105. if _, err := kvc.Put(context.Background(), preq); err != nil {
  106. t.Fatalf("couldn't put key (%v)", err)
  107. }
  108. }
  109. // compact on current revision
  110. _, err := kvc.Compact(context.Background(), &pb.CompactionRequest{Revision: 4})
  111. if err != nil {
  112. t.Fatalf("couldn't compact kv space (%v)", err)
  113. }
  114. // key still exists?
  115. _, err = kvc.Range(context.Background(), &pb.RangeRequest{Key: []byte("foo")})
  116. if err != nil {
  117. t.Fatalf("couldn't get key after compaction (%v)", err)
  118. }
  119. }
  120. func TestV3TxnTooManyOps(t *testing.T) {
  121. defer testutil.AfterTest(t)
  122. clus := NewClusterV3(t, &ClusterConfig{Size: 3})
  123. defer clus.Terminate(t)
  124. kvc := toGRPC(clus.RandClient()).KV
  125. // unique keys
  126. i := new(int)
  127. keyf := func() []byte {
  128. *i++
  129. return []byte(fmt.Sprintf("key-%d", i))
  130. }
  131. addCompareOps := func(txn *pb.TxnRequest) {
  132. txn.Compare = append(txn.Compare,
  133. &pb.Compare{
  134. Result: pb.Compare_GREATER,
  135. Target: pb.Compare_CREATE,
  136. Key: keyf(),
  137. })
  138. }
  139. addSuccessOps := func(txn *pb.TxnRequest) {
  140. txn.Success = append(txn.Success,
  141. &pb.RequestUnion{
  142. Request: &pb.RequestUnion_RequestPut{
  143. RequestPut: &pb.PutRequest{
  144. Key: keyf(),
  145. Value: []byte("bar"),
  146. },
  147. },
  148. })
  149. }
  150. addFailureOps := func(txn *pb.TxnRequest) {
  151. txn.Failure = append(txn.Failure,
  152. &pb.RequestUnion{
  153. Request: &pb.RequestUnion_RequestPut{
  154. RequestPut: &pb.PutRequest{
  155. Key: keyf(),
  156. Value: []byte("bar"),
  157. },
  158. },
  159. })
  160. }
  161. tests := []func(txn *pb.TxnRequest){
  162. addCompareOps,
  163. addSuccessOps,
  164. addFailureOps,
  165. }
  166. for i, tt := range tests {
  167. txn := &pb.TxnRequest{}
  168. for j := 0; j < v3rpc.MaxOpsPerTxn+1; j++ {
  169. tt(txn)
  170. }
  171. _, err := kvc.Txn(context.Background(), txn)
  172. if err != rpctypes.ErrGRPCTooManyOps {
  173. t.Errorf("#%d: err = %v, want %v", i, err, rpctypes.ErrGRPCTooManyOps)
  174. }
  175. }
  176. }
  177. func TestV3TxnDuplicateKeys(t *testing.T) {
  178. defer testutil.AfterTest(t)
  179. clus := NewClusterV3(t, &ClusterConfig{Size: 3})
  180. defer clus.Terminate(t)
  181. putreq := &pb.RequestUnion{Request: &pb.RequestUnion_RequestPut{RequestPut: &pb.PutRequest{Key: []byte("abc"), Value: []byte("def")}}}
  182. delKeyReq := &pb.RequestUnion{Request: &pb.RequestUnion_RequestDeleteRange{
  183. RequestDeleteRange: &pb.DeleteRangeRequest{
  184. Key: []byte("abc"),
  185. },
  186. },
  187. }
  188. delInRangeReq := &pb.RequestUnion{Request: &pb.RequestUnion_RequestDeleteRange{
  189. RequestDeleteRange: &pb.DeleteRangeRequest{
  190. Key: []byte("a"), RangeEnd: []byte("b"),
  191. },
  192. },
  193. }
  194. delOutOfRangeReq := &pb.RequestUnion{Request: &pb.RequestUnion_RequestDeleteRange{
  195. RequestDeleteRange: &pb.DeleteRangeRequest{
  196. Key: []byte("abb"), RangeEnd: []byte("abc"),
  197. },
  198. },
  199. }
  200. kvc := toGRPC(clus.RandClient()).KV
  201. tests := []struct {
  202. txnSuccess []*pb.RequestUnion
  203. werr error
  204. }{
  205. {
  206. txnSuccess: []*pb.RequestUnion{putreq, putreq},
  207. werr: rpctypes.ErrGRPCDuplicateKey,
  208. },
  209. {
  210. txnSuccess: []*pb.RequestUnion{putreq, delKeyReq},
  211. werr: rpctypes.ErrGRPCDuplicateKey,
  212. },
  213. {
  214. txnSuccess: []*pb.RequestUnion{putreq, delInRangeReq},
  215. werr: rpctypes.ErrGRPCDuplicateKey,
  216. },
  217. {
  218. txnSuccess: []*pb.RequestUnion{delKeyReq, delInRangeReq, delKeyReq, delInRangeReq},
  219. werr: nil,
  220. },
  221. {
  222. txnSuccess: []*pb.RequestUnion{putreq, delOutOfRangeReq},
  223. werr: nil,
  224. },
  225. }
  226. for i, tt := range tests {
  227. txn := &pb.TxnRequest{Success: tt.txnSuccess}
  228. _, err := kvc.Txn(context.Background(), txn)
  229. if err != tt.werr {
  230. t.Errorf("#%d: err = %v, want %v", i, err, tt.werr)
  231. }
  232. }
  233. }
  234. // Testv3TxnRevision tests that the transaction header revision is set as expected.
  235. func TestV3TxnRevision(t *testing.T) {
  236. defer testutil.AfterTest(t)
  237. clus := NewClusterV3(t, &ClusterConfig{Size: 1})
  238. defer clus.Terminate(t)
  239. kvc := toGRPC(clus.RandClient()).KV
  240. pr := &pb.PutRequest{Key: []byte("abc"), Value: []byte("def")}
  241. presp, err := kvc.Put(context.TODO(), pr)
  242. if err != nil {
  243. t.Fatal(err)
  244. }
  245. txnget := &pb.RequestUnion{Request: &pb.RequestUnion_RequestRange{RequestRange: &pb.RangeRequest{Key: []byte("abc")}}}
  246. txn := &pb.TxnRequest{Success: []*pb.RequestUnion{txnget}}
  247. tresp, err := kvc.Txn(context.TODO(), txn)
  248. if err != nil {
  249. t.Fatal(err)
  250. }
  251. // did not update revision
  252. if presp.Header.Revision != tresp.Header.Revision {
  253. t.Fatalf("got rev %d, wanted rev %d", tresp.Header.Revision, presp.Header.Revision)
  254. }
  255. txnput := &pb.RequestUnion{Request: &pb.RequestUnion_RequestPut{RequestPut: &pb.PutRequest{Key: []byte("abc"), Value: []byte("123")}}}
  256. txn = &pb.TxnRequest{Success: []*pb.RequestUnion{txnput}}
  257. tresp, err = kvc.Txn(context.TODO(), txn)
  258. if err != nil {
  259. t.Fatal(err)
  260. }
  261. // updated revision
  262. if tresp.Header.Revision != presp.Header.Revision+1 {
  263. t.Fatalf("got rev %d, wanted rev %d", tresp.Header.Revision, presp.Header.Revision+1)
  264. }
  265. }
  266. // TestV3PutMissingLease ensures that a Put on a key with a bogus lease fails.
  267. func TestV3PutMissingLease(t *testing.T) {
  268. defer testutil.AfterTest(t)
  269. clus := NewClusterV3(t, &ClusterConfig{Size: 3})
  270. defer clus.Terminate(t)
  271. kvc := toGRPC(clus.RandClient()).KV
  272. key := []byte("foo")
  273. preq := &pb.PutRequest{Key: key, Lease: 123456}
  274. tests := []func(){
  275. // put case
  276. func() {
  277. if presp, err := kvc.Put(context.TODO(), preq); err == nil {
  278. t.Errorf("succeeded put key. req: %v. resp: %v", preq, presp)
  279. }
  280. },
  281. // txn success case
  282. func() {
  283. txn := &pb.TxnRequest{}
  284. txn.Success = append(txn.Success, &pb.RequestUnion{
  285. Request: &pb.RequestUnion_RequestPut{
  286. RequestPut: preq}})
  287. if tresp, err := kvc.Txn(context.TODO(), txn); err == nil {
  288. t.Errorf("succeeded txn success. req: %v. resp: %v", txn, tresp)
  289. }
  290. },
  291. // txn failure case
  292. func() {
  293. txn := &pb.TxnRequest{}
  294. txn.Failure = append(txn.Failure, &pb.RequestUnion{
  295. Request: &pb.RequestUnion_RequestPut{
  296. RequestPut: preq}})
  297. cmp := &pb.Compare{
  298. Result: pb.Compare_GREATER,
  299. Target: pb.Compare_CREATE,
  300. Key: []byte("bar"),
  301. }
  302. txn.Compare = append(txn.Compare, cmp)
  303. if tresp, err := kvc.Txn(context.TODO(), txn); err == nil {
  304. t.Errorf("succeeded txn failure. req: %v. resp: %v", txn, tresp)
  305. }
  306. },
  307. // ignore bad lease in failure on success txn
  308. func() {
  309. txn := &pb.TxnRequest{}
  310. rreq := &pb.RangeRequest{Key: []byte("bar")}
  311. txn.Success = append(txn.Success, &pb.RequestUnion{
  312. Request: &pb.RequestUnion_RequestRange{
  313. RequestRange: rreq}})
  314. txn.Failure = append(txn.Failure, &pb.RequestUnion{
  315. Request: &pb.RequestUnion_RequestPut{
  316. RequestPut: preq}})
  317. if tresp, err := kvc.Txn(context.TODO(), txn); err != nil {
  318. t.Errorf("failed good txn. req: %v. resp: %v", txn, tresp)
  319. }
  320. },
  321. }
  322. for i, f := range tests {
  323. f()
  324. // key shouldn't have been stored
  325. rreq := &pb.RangeRequest{Key: key}
  326. rresp, err := kvc.Range(context.TODO(), rreq)
  327. if err != nil {
  328. t.Errorf("#%d. could not rangereq (%v)", i, err)
  329. } else if len(rresp.Kvs) != 0 {
  330. t.Errorf("#%d. expected no keys, got %v", i, rresp)
  331. }
  332. }
  333. }
  334. // TestV3DeleteRange tests various edge cases in the DeleteRange API.
  335. func TestV3DeleteRange(t *testing.T) {
  336. defer testutil.AfterTest(t)
  337. tests := []struct {
  338. keySet []string
  339. begin string
  340. end string
  341. wantSet [][]byte
  342. deleted int64
  343. }{
  344. // delete middle
  345. {
  346. []string{"foo", "foo/abc", "fop"},
  347. "foo/", "fop",
  348. [][]byte{[]byte("foo"), []byte("fop")}, 1,
  349. },
  350. // no delete
  351. {
  352. []string{"foo", "foo/abc", "fop"},
  353. "foo/", "foo/",
  354. [][]byte{[]byte("foo"), []byte("foo/abc"), []byte("fop")}, 0,
  355. },
  356. // delete first
  357. {
  358. []string{"foo", "foo/abc", "fop"},
  359. "fo", "fop",
  360. [][]byte{[]byte("fop")}, 2,
  361. },
  362. // delete tail
  363. {
  364. []string{"foo", "foo/abc", "fop"},
  365. "foo/", "fos",
  366. [][]byte{[]byte("foo")}, 2,
  367. },
  368. // delete exact
  369. {
  370. []string{"foo", "foo/abc", "fop"},
  371. "foo/abc", "",
  372. [][]byte{[]byte("foo"), []byte("fop")}, 1,
  373. },
  374. // delete none, [x,x)
  375. {
  376. []string{"foo"},
  377. "foo", "foo",
  378. [][]byte{[]byte("foo")}, 0,
  379. },
  380. }
  381. for i, tt := range tests {
  382. clus := NewClusterV3(t, &ClusterConfig{Size: 3})
  383. kvc := toGRPC(clus.RandClient()).KV
  384. ks := tt.keySet
  385. for j := range ks {
  386. reqput := &pb.PutRequest{Key: []byte(ks[j]), Value: []byte{}}
  387. _, err := kvc.Put(context.TODO(), reqput)
  388. if err != nil {
  389. t.Fatalf("couldn't put key (%v)", err)
  390. }
  391. }
  392. dreq := &pb.DeleteRangeRequest{
  393. Key: []byte(tt.begin),
  394. RangeEnd: []byte(tt.end)}
  395. dresp, err := kvc.DeleteRange(context.TODO(), dreq)
  396. if err != nil {
  397. t.Fatalf("couldn't delete range on test %d (%v)", i, err)
  398. }
  399. if tt.deleted != dresp.Deleted {
  400. t.Errorf("expected %d on test %v, got %d", tt.deleted, i, dresp.Deleted)
  401. }
  402. rreq := &pb.RangeRequest{Key: []byte{0x0}, RangeEnd: []byte{0xff}}
  403. rresp, err := kvc.Range(context.TODO(), rreq)
  404. if err != nil {
  405. t.Errorf("couldn't get range on test %v (%v)", i, err)
  406. }
  407. if dresp.Header.Revision != rresp.Header.Revision {
  408. t.Errorf("expected revision %v, got %v",
  409. dresp.Header.Revision, rresp.Header.Revision)
  410. }
  411. keys := [][]byte{}
  412. for j := range rresp.Kvs {
  413. keys = append(keys, rresp.Kvs[j].Key)
  414. }
  415. if !reflect.DeepEqual(tt.wantSet, keys) {
  416. t.Errorf("expected %v on test %v, got %v", tt.wantSet, i, keys)
  417. }
  418. // can't defer because tcp ports will be in use
  419. clus.Terminate(t)
  420. }
  421. }
  422. // TestV3TxnInvaildRange tests txn
  423. func TestV3TxnInvaildRange(t *testing.T) {
  424. defer testutil.AfterTest(t)
  425. clus := NewClusterV3(t, &ClusterConfig{Size: 3})
  426. defer clus.Terminate(t)
  427. kvc := toGRPC(clus.RandClient()).KV
  428. preq := &pb.PutRequest{Key: []byte("foo"), Value: []byte("bar")}
  429. for i := 0; i < 3; i++ {
  430. _, err := kvc.Put(context.Background(), preq)
  431. if err != nil {
  432. t.Fatalf("couldn't put key (%v)", err)
  433. }
  434. }
  435. _, err := kvc.Compact(context.Background(), &pb.CompactionRequest{Revision: 2})
  436. if err != nil {
  437. t.Fatalf("couldn't compact kv space (%v)", err)
  438. }
  439. // future rev
  440. txn := &pb.TxnRequest{}
  441. txn.Success = append(txn.Success, &pb.RequestUnion{
  442. Request: &pb.RequestUnion_RequestPut{
  443. RequestPut: preq}})
  444. rreq := &pb.RangeRequest{Key: []byte("foo"), Revision: 100}
  445. txn.Success = append(txn.Success, &pb.RequestUnion{
  446. Request: &pb.RequestUnion_RequestRange{
  447. RequestRange: rreq}})
  448. if _, err := kvc.Txn(context.TODO(), txn); err != rpctypes.ErrGRPCFutureRev {
  449. t.Errorf("err = %v, want %v", err, rpctypes.ErrGRPCFutureRev)
  450. }
  451. // compacted rev
  452. tv, _ := txn.Success[1].Request.(*pb.RequestUnion_RequestRange)
  453. tv.RequestRange.Revision = 1
  454. if _, err := kvc.Txn(context.TODO(), txn); err != rpctypes.ErrGRPCCompacted {
  455. t.Errorf("err = %v, want %v", err, rpctypes.ErrGRPCCompacted)
  456. }
  457. }
  458. func TestV3TooLargeRequest(t *testing.T) {
  459. defer testutil.AfterTest(t)
  460. clus := NewClusterV3(t, &ClusterConfig{Size: 3})
  461. defer clus.Terminate(t)
  462. kvc := toGRPC(clus.RandClient()).KV
  463. // 2MB request value
  464. largeV := make([]byte, 2*1024*1024)
  465. preq := &pb.PutRequest{Key: []byte("foo"), Value: largeV}
  466. _, err := kvc.Put(context.Background(), preq)
  467. if err != rpctypes.ErrGRPCRequestTooLarge {
  468. t.Errorf("err = %v, want %v", err, rpctypes.ErrGRPCRequestTooLarge)
  469. }
  470. }
  471. // TestV3Hash tests hash.
  472. func TestV3Hash(t *testing.T) {
  473. defer testutil.AfterTest(t)
  474. clus := NewClusterV3(t, &ClusterConfig{Size: 3})
  475. defer clus.Terminate(t)
  476. cli := clus.RandClient()
  477. kvc := toGRPC(cli).KV
  478. m := toGRPC(cli).Maintenance
  479. preq := &pb.PutRequest{Key: []byte("foo"), Value: []byte("bar")}
  480. for i := 0; i < 3; i++ {
  481. _, err := kvc.Put(context.Background(), preq)
  482. if err != nil {
  483. t.Fatalf("couldn't put key (%v)", err)
  484. }
  485. }
  486. resp, err := m.Hash(context.Background(), &pb.HashRequest{})
  487. if err != nil || resp.Hash == 0 {
  488. t.Fatalf("couldn't hash (%v, hash %d)", err, resp.Hash)
  489. }
  490. }
  491. // TestV3StorageQuotaAPI tests the V3 server respects quotas at the API layer
  492. func TestV3StorageQuotaAPI(t *testing.T) {
  493. defer testutil.AfterTest(t)
  494. clus := NewClusterV3(t, &ClusterConfig{Size: 3})
  495. clus.Members[0].QuotaBackendBytes = 64 * 1024
  496. clus.Members[0].Stop(t)
  497. clus.Members[0].Restart(t)
  498. defer clus.Terminate(t)
  499. kvc := toGRPC(clus.Client(0)).KV
  500. key := []byte("abc")
  501. // test small put that fits in quota
  502. smallbuf := make([]byte, 512)
  503. if _, err := kvc.Put(context.TODO(), &pb.PutRequest{Key: key, Value: smallbuf}); err != nil {
  504. t.Fatal(err)
  505. }
  506. // test big put
  507. bigbuf := make([]byte, 64*1024)
  508. _, err := kvc.Put(context.TODO(), &pb.PutRequest{Key: key, Value: bigbuf})
  509. if err == nil || err != rpctypes.ErrGRPCNoSpace {
  510. t.Fatalf("big put got %v, expected %v", err, rpctypes.ErrGRPCNoSpace)
  511. }
  512. // test big txn
  513. puttxn := &pb.RequestUnion{
  514. Request: &pb.RequestUnion_RequestPut{
  515. RequestPut: &pb.PutRequest{
  516. Key: key,
  517. Value: bigbuf,
  518. },
  519. },
  520. }
  521. txnreq := &pb.TxnRequest{}
  522. txnreq.Success = append(txnreq.Success, puttxn)
  523. _, txnerr := kvc.Txn(context.TODO(), txnreq)
  524. if txnerr == nil || err != rpctypes.ErrGRPCNoSpace {
  525. t.Fatalf("big txn got %v, expected %v", err, rpctypes.ErrGRPCNoSpace)
  526. }
  527. }
  528. // TestV3StorageQuotaApply tests the V3 server respects quotas during apply
  529. func TestV3StorageQuotaApply(t *testing.T) {
  530. testutil.AfterTest(t)
  531. clus := NewClusterV3(t, &ClusterConfig{Size: 2})
  532. defer clus.Terminate(t)
  533. kvc0 := toGRPC(clus.Client(0)).KV
  534. kvc1 := toGRPC(clus.Client(1)).KV
  535. // force a node to have a different quota
  536. clus.Members[0].QuotaBackendBytes = 64 * 1024
  537. clus.Members[0].Stop(t)
  538. clus.Members[0].Restart(t)
  539. clus.waitLeader(t, clus.Members)
  540. key := []byte("abc")
  541. // test small put still works
  542. smallbuf := make([]byte, 1024)
  543. _, serr := kvc0.Put(context.TODO(), &pb.PutRequest{Key: key, Value: smallbuf})
  544. if serr != nil {
  545. t.Fatal(serr)
  546. }
  547. // test big put
  548. bigbuf := make([]byte, 64*1024)
  549. _, err := kvc1.Put(context.TODO(), &pb.PutRequest{Key: key, Value: bigbuf})
  550. if err != nil {
  551. t.Fatal(err)
  552. }
  553. // quorum get should work regardless of whether alarm is raised
  554. _, err = kvc0.Range(context.TODO(), &pb.RangeRequest{Key: []byte("foo")})
  555. if err != nil {
  556. t.Fatal(err)
  557. }
  558. // wait until alarm is raised for sure-- poll the alarms
  559. stopc := time.After(5 * time.Second)
  560. for {
  561. req := &pb.AlarmRequest{Action: pb.AlarmRequest_GET}
  562. resp, aerr := clus.Members[0].s.Alarm(context.TODO(), req)
  563. if aerr != nil {
  564. t.Fatal(aerr)
  565. }
  566. if len(resp.Alarms) != 0 {
  567. break
  568. }
  569. select {
  570. case <-stopc:
  571. t.Fatalf("timed out waiting for alarm")
  572. case <-time.After(10 * time.Millisecond):
  573. }
  574. }
  575. // small quota machine should reject put
  576. if _, err := kvc0.Put(context.TODO(), &pb.PutRequest{Key: key, Value: smallbuf}); err == nil {
  577. t.Fatalf("past-quota instance should reject put")
  578. }
  579. // large quota machine should reject put
  580. if _, err := kvc1.Put(context.TODO(), &pb.PutRequest{Key: key, Value: smallbuf}); err == nil {
  581. t.Fatalf("past-quota instance should reject put")
  582. }
  583. // reset large quota node to ensure alarm persisted
  584. clus.Members[1].Stop(t)
  585. clus.Members[1].Restart(t)
  586. clus.waitLeader(t, clus.Members)
  587. if _, err := kvc1.Put(context.TODO(), &pb.PutRequest{Key: key, Value: smallbuf}); err == nil {
  588. t.Fatalf("alarmed instance should reject put after reset")
  589. }
  590. }
  591. // TestV3AlarmDeactivate ensures that space alarms can be deactivated so puts go through.
  592. func TestV3AlarmDeactivate(t *testing.T) {
  593. clus := NewClusterV3(t, &ClusterConfig{Size: 3})
  594. defer clus.Terminate(t)
  595. kvc := toGRPC(clus.RandClient()).KV
  596. mt := toGRPC(clus.RandClient()).Maintenance
  597. alarmReq := &pb.AlarmRequest{
  598. MemberID: 123,
  599. Action: pb.AlarmRequest_ACTIVATE,
  600. Alarm: pb.AlarmType_NOSPACE,
  601. }
  602. if _, err := mt.Alarm(context.TODO(), alarmReq); err != nil {
  603. t.Fatal(err)
  604. }
  605. key := []byte("abc")
  606. smallbuf := make([]byte, 512)
  607. _, err := kvc.Put(context.TODO(), &pb.PutRequest{Key: key, Value: smallbuf})
  608. if err == nil && err != rpctypes.ErrGRPCNoSpace {
  609. t.Fatalf("put got %v, expected %v", err, rpctypes.ErrGRPCNoSpace)
  610. }
  611. alarmReq.Action = pb.AlarmRequest_DEACTIVATE
  612. if _, err = mt.Alarm(context.TODO(), alarmReq); err != nil {
  613. t.Fatal(err)
  614. }
  615. if _, err = kvc.Put(context.TODO(), &pb.PutRequest{Key: key, Value: smallbuf}); err != nil {
  616. t.Fatal(err)
  617. }
  618. }
  619. func TestV3RangeRequest(t *testing.T) {
  620. defer testutil.AfterTest(t)
  621. tests := []struct {
  622. putKeys []string
  623. reqs []pb.RangeRequest
  624. wresps [][]string
  625. wmores []bool
  626. }{
  627. // single key
  628. {
  629. []string{"foo", "bar"},
  630. []pb.RangeRequest{
  631. // exists
  632. {Key: []byte("foo")},
  633. // doesn't exist
  634. {Key: []byte("baz")},
  635. },
  636. [][]string{
  637. {"foo"},
  638. {},
  639. },
  640. []bool{false, false},
  641. },
  642. // multi-key
  643. {
  644. []string{"a", "b", "c", "d", "e"},
  645. []pb.RangeRequest{
  646. // all in range
  647. {Key: []byte("a"), RangeEnd: []byte("z")},
  648. // [b, d)
  649. {Key: []byte("b"), RangeEnd: []byte("d")},
  650. // out of range
  651. {Key: []byte("f"), RangeEnd: []byte("z")},
  652. // [c,c) = empty
  653. {Key: []byte("c"), RangeEnd: []byte("c")},
  654. // [d, b) = empty
  655. {Key: []byte("d"), RangeEnd: []byte("b")},
  656. // ["\0", "\0") => all in range
  657. {Key: []byte{0}, RangeEnd: []byte{0}},
  658. },
  659. [][]string{
  660. {"a", "b", "c", "d", "e"},
  661. {"b", "c"},
  662. {},
  663. {},
  664. {},
  665. {"a", "b", "c", "d", "e"},
  666. },
  667. []bool{false, false, false, false, false, false},
  668. },
  669. // revision
  670. {
  671. []string{"a", "b", "c", "d", "e"},
  672. []pb.RangeRequest{
  673. {Key: []byte("a"), RangeEnd: []byte("z"), Revision: 0},
  674. {Key: []byte("a"), RangeEnd: []byte("z"), Revision: 1},
  675. {Key: []byte("a"), RangeEnd: []byte("z"), Revision: 2},
  676. {Key: []byte("a"), RangeEnd: []byte("z"), Revision: 3},
  677. },
  678. [][]string{
  679. {"a", "b", "c", "d", "e"},
  680. {},
  681. {"a"},
  682. {"a", "b"},
  683. },
  684. []bool{false, false, false, false},
  685. },
  686. // limit
  687. {
  688. []string{"foo", "bar"},
  689. []pb.RangeRequest{
  690. // more
  691. {Key: []byte("a"), RangeEnd: []byte("z"), Limit: 1},
  692. // no more
  693. {Key: []byte("a"), RangeEnd: []byte("z"), Limit: 2},
  694. },
  695. [][]string{
  696. {"bar"},
  697. {"bar", "foo"},
  698. },
  699. []bool{true, false},
  700. },
  701. // sort
  702. {
  703. []string{"b", "a", "c", "d", "c"},
  704. []pb.RangeRequest{
  705. {
  706. Key: []byte("a"), RangeEnd: []byte("z"),
  707. Limit: 1,
  708. SortOrder: pb.RangeRequest_ASCEND,
  709. SortTarget: pb.RangeRequest_KEY,
  710. },
  711. {
  712. Key: []byte("a"), RangeEnd: []byte("z"),
  713. Limit: 1,
  714. SortOrder: pb.RangeRequest_DESCEND,
  715. SortTarget: pb.RangeRequest_KEY,
  716. },
  717. {
  718. Key: []byte("a"), RangeEnd: []byte("z"),
  719. Limit: 1,
  720. SortOrder: pb.RangeRequest_ASCEND,
  721. SortTarget: pb.RangeRequest_CREATE,
  722. },
  723. {
  724. Key: []byte("a"), RangeEnd: []byte("z"),
  725. Limit: 1,
  726. SortOrder: pb.RangeRequest_DESCEND,
  727. SortTarget: pb.RangeRequest_MOD,
  728. },
  729. {
  730. Key: []byte("z"), RangeEnd: []byte("z"),
  731. Limit: 1,
  732. SortOrder: pb.RangeRequest_DESCEND,
  733. SortTarget: pb.RangeRequest_CREATE,
  734. },
  735. },
  736. [][]string{
  737. {"a"},
  738. {"d"},
  739. {"b"},
  740. {"c"},
  741. {},
  742. },
  743. []bool{true, true, true, true, false},
  744. },
  745. }
  746. for i, tt := range tests {
  747. clus := NewClusterV3(t, &ClusterConfig{Size: 3})
  748. for _, k := range tt.putKeys {
  749. kvc := toGRPC(clus.RandClient()).KV
  750. req := &pb.PutRequest{Key: []byte(k), Value: []byte("bar")}
  751. if _, err := kvc.Put(context.TODO(), req); err != nil {
  752. t.Fatalf("#%d: couldn't put key (%v)", i, err)
  753. }
  754. }
  755. for j, req := range tt.reqs {
  756. kvc := toGRPC(clus.RandClient()).KV
  757. resp, err := kvc.Range(context.TODO(), &req)
  758. if err != nil {
  759. t.Errorf("#%d.%d: Range error: %v", i, j, err)
  760. continue
  761. }
  762. if len(resp.Kvs) != len(tt.wresps[j]) {
  763. t.Errorf("#%d.%d: bad len(resp.Kvs). got = %d, want = %d, ", i, j, len(resp.Kvs), len(tt.wresps[j]))
  764. continue
  765. }
  766. for k, wKey := range tt.wresps[j] {
  767. respKey := string(resp.Kvs[k].Key)
  768. if respKey != wKey {
  769. t.Errorf("#%d.%d: key[%d]. got = %v, want = %v, ", i, j, k, respKey, wKey)
  770. }
  771. }
  772. if resp.More != tt.wmores[j] {
  773. t.Errorf("#%d.%d: bad more. got = %v, want = %v, ", i, j, resp.More, tt.wmores[j])
  774. }
  775. wrev := int64(len(tt.putKeys) + 1)
  776. if resp.Header.Revision != wrev {
  777. t.Errorf("#%d.%d: bad header revision. got = %d. want = %d", i, j, resp.Header.Revision, wrev)
  778. }
  779. }
  780. clus.Terminate(t)
  781. }
  782. }
  783. func newClusterV3NoClients(t *testing.T, cfg *ClusterConfig) *ClusterV3 {
  784. cfg.UseGRPC = true
  785. clus := &ClusterV3{cluster: NewClusterByConfig(t, cfg)}
  786. clus.Launch(t)
  787. return clus
  788. }
  789. // TestTLSGRPCRejectInsecureClient checks that connection is rejected if server is TLS but not client.
  790. func TestTLSGRPCRejectInsecureClient(t *testing.T) {
  791. defer testutil.AfterTest(t)
  792. cfg := ClusterConfig{Size: 3, ClientTLS: &testTLSInfo}
  793. clus := newClusterV3NoClients(t, &cfg)
  794. defer clus.Terminate(t)
  795. // nil out TLS field so client will use an insecure connection
  796. clus.Members[0].ClientTLSInfo = nil
  797. client, err := NewClientV3(clus.Members[0])
  798. if err != nil && err != grpc.ErrClientConnTimeout {
  799. t.Fatalf("unexpected error (%v)", err)
  800. } else if client == nil {
  801. // Ideally, no client would be returned. However, grpc will
  802. // return a connection without trying to handshake first so
  803. // the connection appears OK.
  804. return
  805. }
  806. defer client.Close()
  807. ctx, cancel := context.WithTimeout(context.TODO(), 5*time.Second)
  808. conn := client.ActiveConnection()
  809. st, err := conn.State()
  810. if err != nil {
  811. t.Fatal(err)
  812. } else if st != grpc.Ready {
  813. t.Fatalf("expected Ready, got %v", st)
  814. }
  815. // rpc will fail to handshake, triggering a connection state change
  816. donec := make(chan error, 1)
  817. go func() {
  818. reqput := &pb.PutRequest{Key: []byte("foo"), Value: []byte("bar")}
  819. _, perr := toGRPC(client).KV.Put(ctx, reqput)
  820. donec <- perr
  821. }()
  822. st, err = conn.WaitForStateChange(ctx, st)
  823. if err != nil {
  824. t.Fatalf("unexpected error waiting for change (%v)", err)
  825. } else if st == grpc.Ready {
  826. t.Fatalf("expected failure state, got %v", st)
  827. }
  828. cancel()
  829. if perr := <-donec; perr == nil {
  830. t.Fatalf("expected client error on put")
  831. }
  832. }
  833. // TestTLSGRPCRejectSecureClient checks that connection is rejected if client is TLS but not server.
  834. func TestTLSGRPCRejectSecureClient(t *testing.T) {
  835. defer testutil.AfterTest(t)
  836. cfg := ClusterConfig{Size: 3}
  837. clus := newClusterV3NoClients(t, &cfg)
  838. defer clus.Terminate(t)
  839. clus.Members[0].ClientTLSInfo = &testTLSInfo
  840. client, err := NewClientV3(clus.Members[0])
  841. if client != nil || err == nil {
  842. t.Fatalf("expected no client")
  843. } else if err != grpc.ErrClientConnTimeout {
  844. t.Fatalf("unexpected error (%v)", err)
  845. }
  846. }
  847. // TestTLSGRPCAcceptSecureAll checks that connection is accepted if both client and server are TLS
  848. func TestTLSGRPCAcceptSecureAll(t *testing.T) {
  849. defer testutil.AfterTest(t)
  850. cfg := ClusterConfig{Size: 3, ClientTLS: &testTLSInfo}
  851. clus := newClusterV3NoClients(t, &cfg)
  852. defer clus.Terminate(t)
  853. client, err := NewClientV3(clus.Members[0])
  854. if err != nil {
  855. t.Fatalf("expected tls client (%v)", err)
  856. }
  857. defer client.Close()
  858. reqput := &pb.PutRequest{Key: []byte("foo"), Value: []byte("bar")}
  859. if _, err := toGRPC(client).KV.Put(context.TODO(), reqput); err != nil {
  860. t.Fatalf("unexpected error on put over tls (%v)", err)
  861. }
  862. }