apply.go 29 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028
  1. // Copyright 2016 The etcd Authors
  2. //
  3. // Licensed under the Apache License, Version 2.0 (the "License");
  4. // you may not use this file except in compliance with the License.
  5. // You may obtain a copy of the License at
  6. //
  7. // http://www.apache.org/licenses/LICENSE-2.0
  8. //
  9. // Unless required by applicable law or agreed to in writing, software
  10. // distributed under the License is distributed on an "AS IS" BASIS,
  11. // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  12. // See the License for the specific language governing permissions and
  13. // limitations under the License.
  14. package etcdserver
  15. import (
  16. "bytes"
  17. "context"
  18. "fmt"
  19. "sort"
  20. "time"
  21. "go.etcd.io/etcd/auth"
  22. pb "go.etcd.io/etcd/etcdserver/etcdserverpb"
  23. "go.etcd.io/etcd/lease"
  24. "go.etcd.io/etcd/mvcc"
  25. "go.etcd.io/etcd/mvcc/mvccpb"
  26. "go.etcd.io/etcd/pkg/traceutil"
  27. "go.etcd.io/etcd/pkg/types"
  28. "github.com/gogo/protobuf/proto"
  29. "go.uber.org/zap"
  30. )
  31. const (
  32. warnApplyDuration = 100 * time.Millisecond
  33. )
  34. type applyResult struct {
  35. resp proto.Message
  36. err error
  37. // physc signals the physical effect of the request has completed in addition
  38. // to being logically reflected by the node. Currently only used for
  39. // Compaction requests.
  40. physc <-chan struct{}
  41. }
  42. // applierV3 is the interface for processing V3 raft messages
  43. type applierV3 interface {
  44. Apply(r *pb.InternalRaftRequest) *applyResult
  45. Put(txn mvcc.TxnWrite, p *pb.PutRequest) (*pb.PutResponse, error)
  46. Range(ctx context.Context, txn mvcc.TxnRead, r *pb.RangeRequest) (*pb.RangeResponse, error)
  47. DeleteRange(txn mvcc.TxnWrite, dr *pb.DeleteRangeRequest) (*pb.DeleteRangeResponse, error)
  48. Txn(rt *pb.TxnRequest) (*pb.TxnResponse, error)
  49. Compaction(compaction *pb.CompactionRequest) (*pb.CompactionResponse, <-chan struct{}, error)
  50. LeaseGrant(lc *pb.LeaseGrantRequest) (*pb.LeaseGrantResponse, error)
  51. LeaseRevoke(lc *pb.LeaseRevokeRequest) (*pb.LeaseRevokeResponse, error)
  52. LeaseCheckpoint(lc *pb.LeaseCheckpointRequest) (*pb.LeaseCheckpointResponse, error)
  53. Alarm(*pb.AlarmRequest) (*pb.AlarmResponse, error)
  54. Authenticate(r *pb.InternalAuthenticateRequest) (*pb.AuthenticateResponse, error)
  55. AuthEnable() (*pb.AuthEnableResponse, error)
  56. AuthDisable() (*pb.AuthDisableResponse, error)
  57. UserAdd(ua *pb.AuthUserAddRequest) (*pb.AuthUserAddResponse, error)
  58. UserDelete(ua *pb.AuthUserDeleteRequest) (*pb.AuthUserDeleteResponse, error)
  59. UserChangePassword(ua *pb.AuthUserChangePasswordRequest) (*pb.AuthUserChangePasswordResponse, error)
  60. UserGrantRole(ua *pb.AuthUserGrantRoleRequest) (*pb.AuthUserGrantRoleResponse, error)
  61. UserGet(ua *pb.AuthUserGetRequest) (*pb.AuthUserGetResponse, error)
  62. UserRevokeRole(ua *pb.AuthUserRevokeRoleRequest) (*pb.AuthUserRevokeRoleResponse, error)
  63. RoleAdd(ua *pb.AuthRoleAddRequest) (*pb.AuthRoleAddResponse, error)
  64. RoleGrantPermission(ua *pb.AuthRoleGrantPermissionRequest) (*pb.AuthRoleGrantPermissionResponse, error)
  65. RoleGet(ua *pb.AuthRoleGetRequest) (*pb.AuthRoleGetResponse, error)
  66. RoleRevokePermission(ua *pb.AuthRoleRevokePermissionRequest) (*pb.AuthRoleRevokePermissionResponse, error)
  67. RoleDelete(ua *pb.AuthRoleDeleteRequest) (*pb.AuthRoleDeleteResponse, error)
  68. UserList(ua *pb.AuthUserListRequest) (*pb.AuthUserListResponse, error)
  69. RoleList(ua *pb.AuthRoleListRequest) (*pb.AuthRoleListResponse, error)
  70. }
  71. type checkReqFunc func(mvcc.ReadView, *pb.RequestOp) error
  72. type applierV3backend struct {
  73. s *EtcdServer
  74. checkPut checkReqFunc
  75. checkRange checkReqFunc
  76. }
  77. func (s *EtcdServer) newApplierV3Backend() applierV3 {
  78. base := &applierV3backend{s: s}
  79. base.checkPut = func(rv mvcc.ReadView, req *pb.RequestOp) error {
  80. return base.checkRequestPut(rv, req)
  81. }
  82. base.checkRange = func(rv mvcc.ReadView, req *pb.RequestOp) error {
  83. return base.checkRequestRange(rv, req)
  84. }
  85. return base
  86. }
  87. func (s *EtcdServer) newApplierV3() applierV3 {
  88. return newAuthApplierV3(
  89. s.AuthStore(),
  90. newQuotaApplierV3(s, s.newApplierV3Backend()),
  91. s.lessor,
  92. )
  93. }
  94. func (a *applierV3backend) Apply(r *pb.InternalRaftRequest) *applyResult {
  95. ar := &applyResult{}
  96. defer func(start time.Time) {
  97. warnOfExpensiveRequest(a.s.getLogger(), start, &pb.InternalRaftStringer{Request: r}, ar.resp, ar.err)
  98. }(time.Now())
  99. // call into a.s.applyV3.F instead of a.F so upper appliers can check individual calls
  100. switch {
  101. case r.Range != nil:
  102. ar.resp, ar.err = a.s.applyV3.Range(context.TODO(), nil, r.Range)
  103. case r.Put != nil:
  104. ar.resp, ar.err = a.s.applyV3.Put(nil, r.Put)
  105. case r.DeleteRange != nil:
  106. ar.resp, ar.err = a.s.applyV3.DeleteRange(nil, r.DeleteRange)
  107. case r.Txn != nil:
  108. ar.resp, ar.err = a.s.applyV3.Txn(r.Txn)
  109. case r.Compaction != nil:
  110. ar.resp, ar.physc, ar.err = a.s.applyV3.Compaction(r.Compaction)
  111. case r.LeaseGrant != nil:
  112. ar.resp, ar.err = a.s.applyV3.LeaseGrant(r.LeaseGrant)
  113. case r.LeaseRevoke != nil:
  114. ar.resp, ar.err = a.s.applyV3.LeaseRevoke(r.LeaseRevoke)
  115. case r.LeaseCheckpoint != nil:
  116. ar.resp, ar.err = a.s.applyV3.LeaseCheckpoint(r.LeaseCheckpoint)
  117. case r.Alarm != nil:
  118. ar.resp, ar.err = a.s.applyV3.Alarm(r.Alarm)
  119. case r.Authenticate != nil:
  120. ar.resp, ar.err = a.s.applyV3.Authenticate(r.Authenticate)
  121. case r.AuthEnable != nil:
  122. ar.resp, ar.err = a.s.applyV3.AuthEnable()
  123. case r.AuthDisable != nil:
  124. ar.resp, ar.err = a.s.applyV3.AuthDisable()
  125. case r.AuthUserAdd != nil:
  126. ar.resp, ar.err = a.s.applyV3.UserAdd(r.AuthUserAdd)
  127. case r.AuthUserDelete != nil:
  128. ar.resp, ar.err = a.s.applyV3.UserDelete(r.AuthUserDelete)
  129. case r.AuthUserChangePassword != nil:
  130. ar.resp, ar.err = a.s.applyV3.UserChangePassword(r.AuthUserChangePassword)
  131. case r.AuthUserGrantRole != nil:
  132. ar.resp, ar.err = a.s.applyV3.UserGrantRole(r.AuthUserGrantRole)
  133. case r.AuthUserGet != nil:
  134. ar.resp, ar.err = a.s.applyV3.UserGet(r.AuthUserGet)
  135. case r.AuthUserRevokeRole != nil:
  136. ar.resp, ar.err = a.s.applyV3.UserRevokeRole(r.AuthUserRevokeRole)
  137. case r.AuthRoleAdd != nil:
  138. ar.resp, ar.err = a.s.applyV3.RoleAdd(r.AuthRoleAdd)
  139. case r.AuthRoleGrantPermission != nil:
  140. ar.resp, ar.err = a.s.applyV3.RoleGrantPermission(r.AuthRoleGrantPermission)
  141. case r.AuthRoleGet != nil:
  142. ar.resp, ar.err = a.s.applyV3.RoleGet(r.AuthRoleGet)
  143. case r.AuthRoleRevokePermission != nil:
  144. ar.resp, ar.err = a.s.applyV3.RoleRevokePermission(r.AuthRoleRevokePermission)
  145. case r.AuthRoleDelete != nil:
  146. ar.resp, ar.err = a.s.applyV3.RoleDelete(r.AuthRoleDelete)
  147. case r.AuthUserList != nil:
  148. ar.resp, ar.err = a.s.applyV3.UserList(r.AuthUserList)
  149. case r.AuthRoleList != nil:
  150. ar.resp, ar.err = a.s.applyV3.RoleList(r.AuthRoleList)
  151. default:
  152. panic("not implemented")
  153. }
  154. return ar
  155. }
  156. func (a *applierV3backend) Put(txn mvcc.TxnWrite, p *pb.PutRequest) (resp *pb.PutResponse, err error) {
  157. resp = &pb.PutResponse{}
  158. resp.Header = &pb.ResponseHeader{}
  159. val, leaseID := p.Value, lease.LeaseID(p.Lease)
  160. if txn == nil {
  161. if leaseID != lease.NoLease {
  162. if l := a.s.lessor.Lookup(leaseID); l == nil {
  163. return nil, lease.ErrLeaseNotFound
  164. }
  165. }
  166. txn = a.s.KV().Write()
  167. defer txn.End()
  168. }
  169. var rr *mvcc.RangeResult
  170. if p.IgnoreValue || p.IgnoreLease || p.PrevKv {
  171. rr, err = txn.Range(p.Key, nil, mvcc.RangeOptions{})
  172. if err != nil {
  173. return nil, err
  174. }
  175. }
  176. if p.IgnoreValue || p.IgnoreLease {
  177. if rr == nil || len(rr.KVs) == 0 {
  178. // ignore_{lease,value} flag expects previous key-value pair
  179. return nil, ErrKeyNotFound
  180. }
  181. }
  182. if p.IgnoreValue {
  183. val = rr.KVs[0].Value
  184. }
  185. if p.IgnoreLease {
  186. leaseID = lease.LeaseID(rr.KVs[0].Lease)
  187. }
  188. if p.PrevKv {
  189. if rr != nil && len(rr.KVs) != 0 {
  190. resp.PrevKv = &rr.KVs[0]
  191. }
  192. }
  193. resp.Header.Revision = txn.Put(p.Key, val, leaseID)
  194. return resp, nil
  195. }
  196. func (a *applierV3backend) DeleteRange(txn mvcc.TxnWrite, dr *pb.DeleteRangeRequest) (*pb.DeleteRangeResponse, error) {
  197. resp := &pb.DeleteRangeResponse{}
  198. resp.Header = &pb.ResponseHeader{}
  199. end := mkGteRange(dr.RangeEnd)
  200. if txn == nil {
  201. txn = a.s.kv.Write()
  202. defer txn.End()
  203. }
  204. if dr.PrevKv {
  205. rr, err := txn.Range(dr.Key, end, mvcc.RangeOptions{})
  206. if err != nil {
  207. return nil, err
  208. }
  209. if rr != nil {
  210. resp.PrevKvs = make([]*mvccpb.KeyValue, len(rr.KVs))
  211. for i := range rr.KVs {
  212. resp.PrevKvs[i] = &rr.KVs[i]
  213. }
  214. }
  215. }
  216. resp.Deleted, resp.Header.Revision = txn.DeleteRange(dr.Key, end)
  217. return resp, nil
  218. }
  219. func (a *applierV3backend) Range(ctx context.Context, txn mvcc.TxnRead, r *pb.RangeRequest) (*pb.RangeResponse, error) {
  220. trace, ok := ctx.Value("trace").(*traceutil.Trace)
  221. if !ok || trace == nil {
  222. trace = traceutil.New("Apply Range")
  223. ctx = context.WithValue(ctx, "trace", trace)
  224. }
  225. resp := &pb.RangeResponse{}
  226. resp.Header = &pb.ResponseHeader{}
  227. if txn == nil {
  228. txn = a.s.kv.Read(trace)
  229. defer txn.End()
  230. }
  231. limit := r.Limit
  232. if r.SortOrder != pb.RangeRequest_NONE ||
  233. r.MinModRevision != 0 || r.MaxModRevision != 0 ||
  234. r.MinCreateRevision != 0 || r.MaxCreateRevision != 0 {
  235. // fetch everything; sort and truncate afterwards
  236. limit = 0
  237. }
  238. if limit > 0 {
  239. // fetch one extra for 'more' flag
  240. limit = limit + 1
  241. }
  242. ro := mvcc.RangeOptions{
  243. Limit: limit,
  244. Rev: r.Revision,
  245. Count: r.CountOnly,
  246. }
  247. rr, err := txn.Range(r.Key, mkGteRange(r.RangeEnd), ro)
  248. if err != nil {
  249. return nil, err
  250. }
  251. if r.MaxModRevision != 0 {
  252. f := func(kv *mvccpb.KeyValue) bool { return kv.ModRevision > r.MaxModRevision }
  253. pruneKVs(rr, f)
  254. }
  255. if r.MinModRevision != 0 {
  256. f := func(kv *mvccpb.KeyValue) bool { return kv.ModRevision < r.MinModRevision }
  257. pruneKVs(rr, f)
  258. }
  259. if r.MaxCreateRevision != 0 {
  260. f := func(kv *mvccpb.KeyValue) bool { return kv.CreateRevision > r.MaxCreateRevision }
  261. pruneKVs(rr, f)
  262. }
  263. if r.MinCreateRevision != 0 {
  264. f := func(kv *mvccpb.KeyValue) bool { return kv.CreateRevision < r.MinCreateRevision }
  265. pruneKVs(rr, f)
  266. }
  267. sortOrder := r.SortOrder
  268. if r.SortTarget != pb.RangeRequest_KEY && sortOrder == pb.RangeRequest_NONE {
  269. // Since current mvcc.Range implementation returns results
  270. // sorted by keys in lexiographically ascending order,
  271. // sort ASCEND by default only when target is not 'KEY'
  272. sortOrder = pb.RangeRequest_ASCEND
  273. }
  274. if sortOrder != pb.RangeRequest_NONE {
  275. var sorter sort.Interface
  276. switch {
  277. case r.SortTarget == pb.RangeRequest_KEY:
  278. sorter = &kvSortByKey{&kvSort{rr.KVs}}
  279. case r.SortTarget == pb.RangeRequest_VERSION:
  280. sorter = &kvSortByVersion{&kvSort{rr.KVs}}
  281. case r.SortTarget == pb.RangeRequest_CREATE:
  282. sorter = &kvSortByCreate{&kvSort{rr.KVs}}
  283. case r.SortTarget == pb.RangeRequest_MOD:
  284. sorter = &kvSortByMod{&kvSort{rr.KVs}}
  285. case r.SortTarget == pb.RangeRequest_VALUE:
  286. sorter = &kvSortByValue{&kvSort{rr.KVs}}
  287. }
  288. switch {
  289. case sortOrder == pb.RangeRequest_ASCEND:
  290. sort.Sort(sorter)
  291. case sortOrder == pb.RangeRequest_DESCEND:
  292. sort.Sort(sort.Reverse(sorter))
  293. }
  294. }
  295. if r.Limit > 0 && len(rr.KVs) > int(r.Limit) {
  296. rr.KVs = rr.KVs[:r.Limit]
  297. resp.More = true
  298. }
  299. trace.Step("Filter and sort the key-value pairs.")
  300. resp.Header.Revision = rr.Rev
  301. resp.Count = int64(rr.Count)
  302. resp.Kvs = make([]*mvccpb.KeyValue, len(rr.KVs))
  303. for i := range rr.KVs {
  304. if r.KeysOnly {
  305. rr.KVs[i].Value = nil
  306. }
  307. resp.Kvs[i] = &rr.KVs[i]
  308. }
  309. trace.Step("Assemble the response.")
  310. return resp, nil
  311. }
  312. func (a *applierV3backend) Txn(rt *pb.TxnRequest) (*pb.TxnResponse, error) {
  313. isWrite := !isTxnReadonly(rt)
  314. trace := traceutil.New("ReadOnlyTxn")
  315. txn := mvcc.NewReadOnlyTxnWrite(a.s.KV().Read(trace))
  316. txnPath := compareToPath(txn, rt)
  317. if isWrite {
  318. if _, err := checkRequests(txn, rt, txnPath, a.checkPut); err != nil {
  319. txn.End()
  320. return nil, err
  321. }
  322. }
  323. if _, err := checkRequests(txn, rt, txnPath, a.checkRange); err != nil {
  324. txn.End()
  325. return nil, err
  326. }
  327. txnResp, _ := newTxnResp(rt, txnPath)
  328. // When executing mutable txn ops, etcd must hold the txn lock so
  329. // readers do not see any intermediate results. Since writes are
  330. // serialized on the raft loop, the revision in the read view will
  331. // be the revision of the write txn.
  332. if isWrite {
  333. txn.End()
  334. txn = a.s.KV().Write()
  335. }
  336. a.applyTxn(txn, rt, txnPath, txnResp)
  337. rev := txn.Rev()
  338. if len(txn.Changes()) != 0 {
  339. rev++
  340. }
  341. txn.End()
  342. txnResp.Header.Revision = rev
  343. return txnResp, nil
  344. }
  345. // newTxnResp allocates a txn response for a txn request given a path.
  346. func newTxnResp(rt *pb.TxnRequest, txnPath []bool) (txnResp *pb.TxnResponse, txnCount int) {
  347. reqs := rt.Success
  348. if !txnPath[0] {
  349. reqs = rt.Failure
  350. }
  351. resps := make([]*pb.ResponseOp, len(reqs))
  352. txnResp = &pb.TxnResponse{
  353. Responses: resps,
  354. Succeeded: txnPath[0],
  355. Header: &pb.ResponseHeader{},
  356. }
  357. for i, req := range reqs {
  358. switch tv := req.Request.(type) {
  359. case *pb.RequestOp_RequestRange:
  360. resps[i] = &pb.ResponseOp{Response: &pb.ResponseOp_ResponseRange{}}
  361. case *pb.RequestOp_RequestPut:
  362. resps[i] = &pb.ResponseOp{Response: &pb.ResponseOp_ResponsePut{}}
  363. case *pb.RequestOp_RequestDeleteRange:
  364. resps[i] = &pb.ResponseOp{Response: &pb.ResponseOp_ResponseDeleteRange{}}
  365. case *pb.RequestOp_RequestTxn:
  366. resp, txns := newTxnResp(tv.RequestTxn, txnPath[1:])
  367. resps[i] = &pb.ResponseOp{Response: &pb.ResponseOp_ResponseTxn{ResponseTxn: resp}}
  368. txnPath = txnPath[1+txns:]
  369. txnCount += txns + 1
  370. default:
  371. }
  372. }
  373. return txnResp, txnCount
  374. }
  375. func compareToPath(rv mvcc.ReadView, rt *pb.TxnRequest) []bool {
  376. txnPath := make([]bool, 1)
  377. ops := rt.Success
  378. if txnPath[0] = applyCompares(rv, rt.Compare); !txnPath[0] {
  379. ops = rt.Failure
  380. }
  381. for _, op := range ops {
  382. tv, ok := op.Request.(*pb.RequestOp_RequestTxn)
  383. if !ok || tv.RequestTxn == nil {
  384. continue
  385. }
  386. txnPath = append(txnPath, compareToPath(rv, tv.RequestTxn)...)
  387. }
  388. return txnPath
  389. }
  390. func applyCompares(rv mvcc.ReadView, cmps []*pb.Compare) bool {
  391. for _, c := range cmps {
  392. if !applyCompare(rv, c) {
  393. return false
  394. }
  395. }
  396. return true
  397. }
  398. // applyCompare applies the compare request.
  399. // If the comparison succeeds, it returns true. Otherwise, returns false.
  400. func applyCompare(rv mvcc.ReadView, c *pb.Compare) bool {
  401. // TODO: possible optimizations
  402. // * chunk reads for large ranges to conserve memory
  403. // * rewrite rules for common patterns:
  404. // ex. "[a, b) createrev > 0" => "limit 1 /\ kvs > 0"
  405. // * caching
  406. rr, err := rv.Range(c.Key, mkGteRange(c.RangeEnd), mvcc.RangeOptions{})
  407. if err != nil {
  408. return false
  409. }
  410. if len(rr.KVs) == 0 {
  411. if c.Target == pb.Compare_VALUE {
  412. // Always fail if comparing a value on a key/keys that doesn't exist;
  413. // nil == empty string in grpc; no way to represent missing value
  414. return false
  415. }
  416. return compareKV(c, mvccpb.KeyValue{})
  417. }
  418. for _, kv := range rr.KVs {
  419. if !compareKV(c, kv) {
  420. return false
  421. }
  422. }
  423. return true
  424. }
  425. func compareKV(c *pb.Compare, ckv mvccpb.KeyValue) bool {
  426. var result int
  427. rev := int64(0)
  428. switch c.Target {
  429. case pb.Compare_VALUE:
  430. v := []byte{}
  431. if tv, _ := c.TargetUnion.(*pb.Compare_Value); tv != nil {
  432. v = tv.Value
  433. }
  434. result = bytes.Compare(ckv.Value, v)
  435. case pb.Compare_CREATE:
  436. if tv, _ := c.TargetUnion.(*pb.Compare_CreateRevision); tv != nil {
  437. rev = tv.CreateRevision
  438. }
  439. result = compareInt64(ckv.CreateRevision, rev)
  440. case pb.Compare_MOD:
  441. if tv, _ := c.TargetUnion.(*pb.Compare_ModRevision); tv != nil {
  442. rev = tv.ModRevision
  443. }
  444. result = compareInt64(ckv.ModRevision, rev)
  445. case pb.Compare_VERSION:
  446. if tv, _ := c.TargetUnion.(*pb.Compare_Version); tv != nil {
  447. rev = tv.Version
  448. }
  449. result = compareInt64(ckv.Version, rev)
  450. case pb.Compare_LEASE:
  451. if tv, _ := c.TargetUnion.(*pb.Compare_Lease); tv != nil {
  452. rev = tv.Lease
  453. }
  454. result = compareInt64(ckv.Lease, rev)
  455. }
  456. switch c.Result {
  457. case pb.Compare_EQUAL:
  458. return result == 0
  459. case pb.Compare_NOT_EQUAL:
  460. return result != 0
  461. case pb.Compare_GREATER:
  462. return result > 0
  463. case pb.Compare_LESS:
  464. return result < 0
  465. }
  466. return true
  467. }
  468. func (a *applierV3backend) applyTxn(txn mvcc.TxnWrite, rt *pb.TxnRequest, txnPath []bool, tresp *pb.TxnResponse) (txns int) {
  469. reqs := rt.Success
  470. if !txnPath[0] {
  471. reqs = rt.Failure
  472. }
  473. lg := a.s.getLogger()
  474. for i, req := range reqs {
  475. respi := tresp.Responses[i].Response
  476. switch tv := req.Request.(type) {
  477. case *pb.RequestOp_RequestRange:
  478. resp, err := a.Range(context.TODO(), txn, tv.RequestRange)
  479. if err != nil {
  480. if lg != nil {
  481. lg.Panic("unexpected error during txn", zap.Error(err))
  482. } else {
  483. plog.Panicf("unexpected error during txn: %v", err)
  484. }
  485. }
  486. respi.(*pb.ResponseOp_ResponseRange).ResponseRange = resp
  487. case *pb.RequestOp_RequestPut:
  488. resp, err := a.Put(txn, tv.RequestPut)
  489. if err != nil {
  490. if lg != nil {
  491. lg.Panic("unexpected error during txn", zap.Error(err))
  492. } else {
  493. plog.Panicf("unexpected error during txn: %v", err)
  494. }
  495. }
  496. respi.(*pb.ResponseOp_ResponsePut).ResponsePut = resp
  497. case *pb.RequestOp_RequestDeleteRange:
  498. resp, err := a.DeleteRange(txn, tv.RequestDeleteRange)
  499. if err != nil {
  500. if lg != nil {
  501. lg.Panic("unexpected error during txn", zap.Error(err))
  502. } else {
  503. plog.Panicf("unexpected error during txn: %v", err)
  504. }
  505. }
  506. respi.(*pb.ResponseOp_ResponseDeleteRange).ResponseDeleteRange = resp
  507. case *pb.RequestOp_RequestTxn:
  508. resp := respi.(*pb.ResponseOp_ResponseTxn).ResponseTxn
  509. applyTxns := a.applyTxn(txn, tv.RequestTxn, txnPath[1:], resp)
  510. txns += applyTxns + 1
  511. txnPath = txnPath[applyTxns+1:]
  512. default:
  513. // empty union
  514. }
  515. }
  516. return txns
  517. }
  518. func (a *applierV3backend) Compaction(compaction *pb.CompactionRequest) (*pb.CompactionResponse, <-chan struct{}, error) {
  519. resp := &pb.CompactionResponse{}
  520. resp.Header = &pb.ResponseHeader{}
  521. ch, err := a.s.KV().Compact(compaction.Revision)
  522. if err != nil {
  523. return nil, ch, err
  524. }
  525. // get the current revision. which key to get is not important.
  526. rr, _ := a.s.KV().Range([]byte("compaction"), nil, mvcc.RangeOptions{})
  527. resp.Header.Revision = rr.Rev
  528. return resp, ch, err
  529. }
  530. func (a *applierV3backend) LeaseGrant(lc *pb.LeaseGrantRequest) (*pb.LeaseGrantResponse, error) {
  531. l, err := a.s.lessor.Grant(lease.LeaseID(lc.ID), lc.TTL)
  532. resp := &pb.LeaseGrantResponse{}
  533. if err == nil {
  534. resp.ID = int64(l.ID)
  535. resp.TTL = l.TTL()
  536. resp.Header = newHeader(a.s)
  537. }
  538. return resp, err
  539. }
  540. func (a *applierV3backend) LeaseRevoke(lc *pb.LeaseRevokeRequest) (*pb.LeaseRevokeResponse, error) {
  541. err := a.s.lessor.Revoke(lease.LeaseID(lc.ID))
  542. return &pb.LeaseRevokeResponse{Header: newHeader(a.s)}, err
  543. }
  544. func (a *applierV3backend) LeaseCheckpoint(lc *pb.LeaseCheckpointRequest) (*pb.LeaseCheckpointResponse, error) {
  545. for _, c := range lc.Checkpoints {
  546. err := a.s.lessor.Checkpoint(lease.LeaseID(c.ID), c.Remaining_TTL)
  547. if err != nil {
  548. return &pb.LeaseCheckpointResponse{Header: newHeader(a.s)}, err
  549. }
  550. }
  551. return &pb.LeaseCheckpointResponse{Header: newHeader(a.s)}, nil
  552. }
  553. func (a *applierV3backend) Alarm(ar *pb.AlarmRequest) (*pb.AlarmResponse, error) {
  554. resp := &pb.AlarmResponse{}
  555. oldCount := len(a.s.alarmStore.Get(ar.Alarm))
  556. lg := a.s.getLogger()
  557. switch ar.Action {
  558. case pb.AlarmRequest_GET:
  559. resp.Alarms = a.s.alarmStore.Get(ar.Alarm)
  560. case pb.AlarmRequest_ACTIVATE:
  561. m := a.s.alarmStore.Activate(types.ID(ar.MemberID), ar.Alarm)
  562. if m == nil {
  563. break
  564. }
  565. resp.Alarms = append(resp.Alarms, m)
  566. activated := oldCount == 0 && len(a.s.alarmStore.Get(m.Alarm)) == 1
  567. if !activated {
  568. break
  569. }
  570. if lg != nil {
  571. lg.Warn("alarm raised", zap.String("alarm", m.Alarm.String()), zap.String("from", types.ID(m.MemberID).String()))
  572. } else {
  573. plog.Warningf("alarm %v raised by peer %s", m.Alarm, types.ID(m.MemberID))
  574. }
  575. switch m.Alarm {
  576. case pb.AlarmType_CORRUPT:
  577. a.s.applyV3 = newApplierV3Corrupt(a)
  578. case pb.AlarmType_NOSPACE:
  579. a.s.applyV3 = newApplierV3Capped(a)
  580. default:
  581. if lg != nil {
  582. lg.Warn("unimplemented alarm activation", zap.String("alarm", fmt.Sprintf("%+v", m)))
  583. } else {
  584. plog.Errorf("unimplemented alarm activation (%+v)", m)
  585. }
  586. }
  587. case pb.AlarmRequest_DEACTIVATE:
  588. m := a.s.alarmStore.Deactivate(types.ID(ar.MemberID), ar.Alarm)
  589. if m == nil {
  590. break
  591. }
  592. resp.Alarms = append(resp.Alarms, m)
  593. deactivated := oldCount > 0 && len(a.s.alarmStore.Get(ar.Alarm)) == 0
  594. if !deactivated {
  595. break
  596. }
  597. switch m.Alarm {
  598. case pb.AlarmType_NOSPACE, pb.AlarmType_CORRUPT:
  599. // TODO: check kv hash before deactivating CORRUPT?
  600. if lg != nil {
  601. lg.Warn("alarm disarmed", zap.String("alarm", m.Alarm.String()), zap.String("from", types.ID(m.MemberID).String()))
  602. } else {
  603. plog.Infof("alarm disarmed %+v", ar)
  604. }
  605. a.s.applyV3 = a.s.newApplierV3()
  606. default:
  607. if lg != nil {
  608. lg.Warn("unimplemented alarm deactivation", zap.String("alarm", fmt.Sprintf("%+v", m)))
  609. } else {
  610. plog.Errorf("unimplemented alarm deactivation (%+v)", m)
  611. }
  612. }
  613. default:
  614. return nil, nil
  615. }
  616. return resp, nil
  617. }
  618. type applierV3Capped struct {
  619. applierV3
  620. q backendQuota
  621. }
  622. // newApplierV3Capped creates an applyV3 that will reject Puts and transactions
  623. // with Puts so that the number of keys in the store is capped.
  624. func newApplierV3Capped(base applierV3) applierV3 { return &applierV3Capped{applierV3: base} }
  625. func (a *applierV3Capped) Put(txn mvcc.TxnWrite, p *pb.PutRequest) (*pb.PutResponse, error) {
  626. return nil, ErrNoSpace
  627. }
  628. func (a *applierV3Capped) Txn(r *pb.TxnRequest) (*pb.TxnResponse, error) {
  629. if a.q.Cost(r) > 0 {
  630. return nil, ErrNoSpace
  631. }
  632. return a.applierV3.Txn(r)
  633. }
  634. func (a *applierV3Capped) LeaseGrant(lc *pb.LeaseGrantRequest) (*pb.LeaseGrantResponse, error) {
  635. return nil, ErrNoSpace
  636. }
  637. func (a *applierV3backend) AuthEnable() (*pb.AuthEnableResponse, error) {
  638. err := a.s.AuthStore().AuthEnable()
  639. if err != nil {
  640. return nil, err
  641. }
  642. return &pb.AuthEnableResponse{Header: newHeader(a.s)}, nil
  643. }
  644. func (a *applierV3backend) AuthDisable() (*pb.AuthDisableResponse, error) {
  645. a.s.AuthStore().AuthDisable()
  646. return &pb.AuthDisableResponse{Header: newHeader(a.s)}, nil
  647. }
  648. func (a *applierV3backend) Authenticate(r *pb.InternalAuthenticateRequest) (*pb.AuthenticateResponse, error) {
  649. ctx := context.WithValue(context.WithValue(a.s.ctx, auth.AuthenticateParamIndex{}, a.s.consistIndex.ConsistentIndex()), auth.AuthenticateParamSimpleTokenPrefix{}, r.SimpleToken)
  650. resp, err := a.s.AuthStore().Authenticate(ctx, r.Name, r.Password)
  651. if resp != nil {
  652. resp.Header = newHeader(a.s)
  653. }
  654. return resp, err
  655. }
  656. func (a *applierV3backend) UserAdd(r *pb.AuthUserAddRequest) (*pb.AuthUserAddResponse, error) {
  657. resp, err := a.s.AuthStore().UserAdd(r)
  658. if resp != nil {
  659. resp.Header = newHeader(a.s)
  660. }
  661. return resp, err
  662. }
  663. func (a *applierV3backend) UserDelete(r *pb.AuthUserDeleteRequest) (*pb.AuthUserDeleteResponse, error) {
  664. resp, err := a.s.AuthStore().UserDelete(r)
  665. if resp != nil {
  666. resp.Header = newHeader(a.s)
  667. }
  668. return resp, err
  669. }
  670. func (a *applierV3backend) UserChangePassword(r *pb.AuthUserChangePasswordRequest) (*pb.AuthUserChangePasswordResponse, error) {
  671. resp, err := a.s.AuthStore().UserChangePassword(r)
  672. if resp != nil {
  673. resp.Header = newHeader(a.s)
  674. }
  675. return resp, err
  676. }
  677. func (a *applierV3backend) UserGrantRole(r *pb.AuthUserGrantRoleRequest) (*pb.AuthUserGrantRoleResponse, error) {
  678. resp, err := a.s.AuthStore().UserGrantRole(r)
  679. if resp != nil {
  680. resp.Header = newHeader(a.s)
  681. }
  682. return resp, err
  683. }
  684. func (a *applierV3backend) UserGet(r *pb.AuthUserGetRequest) (*pb.AuthUserGetResponse, error) {
  685. resp, err := a.s.AuthStore().UserGet(r)
  686. if resp != nil {
  687. resp.Header = newHeader(a.s)
  688. }
  689. return resp, err
  690. }
  691. func (a *applierV3backend) UserRevokeRole(r *pb.AuthUserRevokeRoleRequest) (*pb.AuthUserRevokeRoleResponse, error) {
  692. resp, err := a.s.AuthStore().UserRevokeRole(r)
  693. if resp != nil {
  694. resp.Header = newHeader(a.s)
  695. }
  696. return resp, err
  697. }
  698. func (a *applierV3backend) RoleAdd(r *pb.AuthRoleAddRequest) (*pb.AuthRoleAddResponse, error) {
  699. resp, err := a.s.AuthStore().RoleAdd(r)
  700. if resp != nil {
  701. resp.Header = newHeader(a.s)
  702. }
  703. return resp, err
  704. }
  705. func (a *applierV3backend) RoleGrantPermission(r *pb.AuthRoleGrantPermissionRequest) (*pb.AuthRoleGrantPermissionResponse, error) {
  706. resp, err := a.s.AuthStore().RoleGrantPermission(r)
  707. if resp != nil {
  708. resp.Header = newHeader(a.s)
  709. }
  710. return resp, err
  711. }
  712. func (a *applierV3backend) RoleGet(r *pb.AuthRoleGetRequest) (*pb.AuthRoleGetResponse, error) {
  713. resp, err := a.s.AuthStore().RoleGet(r)
  714. if resp != nil {
  715. resp.Header = newHeader(a.s)
  716. }
  717. return resp, err
  718. }
  719. func (a *applierV3backend) RoleRevokePermission(r *pb.AuthRoleRevokePermissionRequest) (*pb.AuthRoleRevokePermissionResponse, error) {
  720. resp, err := a.s.AuthStore().RoleRevokePermission(r)
  721. if resp != nil {
  722. resp.Header = newHeader(a.s)
  723. }
  724. return resp, err
  725. }
  726. func (a *applierV3backend) RoleDelete(r *pb.AuthRoleDeleteRequest) (*pb.AuthRoleDeleteResponse, error) {
  727. resp, err := a.s.AuthStore().RoleDelete(r)
  728. if resp != nil {
  729. resp.Header = newHeader(a.s)
  730. }
  731. return resp, err
  732. }
  733. func (a *applierV3backend) UserList(r *pb.AuthUserListRequest) (*pb.AuthUserListResponse, error) {
  734. resp, err := a.s.AuthStore().UserList(r)
  735. if resp != nil {
  736. resp.Header = newHeader(a.s)
  737. }
  738. return resp, err
  739. }
  740. func (a *applierV3backend) RoleList(r *pb.AuthRoleListRequest) (*pb.AuthRoleListResponse, error) {
  741. resp, err := a.s.AuthStore().RoleList(r)
  742. if resp != nil {
  743. resp.Header = newHeader(a.s)
  744. }
  745. return resp, err
  746. }
  747. type quotaApplierV3 struct {
  748. applierV3
  749. q Quota
  750. }
  751. func newQuotaApplierV3(s *EtcdServer, app applierV3) applierV3 {
  752. return &quotaApplierV3{app, NewBackendQuota(s, "v3-applier")}
  753. }
  754. func (a *quotaApplierV3) Put(txn mvcc.TxnWrite, p *pb.PutRequest) (*pb.PutResponse, error) {
  755. ok := a.q.Available(p)
  756. resp, err := a.applierV3.Put(txn, p)
  757. if err == nil && !ok {
  758. err = ErrNoSpace
  759. }
  760. return resp, err
  761. }
  762. func (a *quotaApplierV3) Txn(rt *pb.TxnRequest) (*pb.TxnResponse, error) {
  763. ok := a.q.Available(rt)
  764. resp, err := a.applierV3.Txn(rt)
  765. if err == nil && !ok {
  766. err = ErrNoSpace
  767. }
  768. return resp, err
  769. }
  770. func (a *quotaApplierV3) LeaseGrant(lc *pb.LeaseGrantRequest) (*pb.LeaseGrantResponse, error) {
  771. ok := a.q.Available(lc)
  772. resp, err := a.applierV3.LeaseGrant(lc)
  773. if err == nil && !ok {
  774. err = ErrNoSpace
  775. }
  776. return resp, err
  777. }
  778. type kvSort struct{ kvs []mvccpb.KeyValue }
  779. func (s *kvSort) Swap(i, j int) {
  780. t := s.kvs[i]
  781. s.kvs[i] = s.kvs[j]
  782. s.kvs[j] = t
  783. }
  784. func (s *kvSort) Len() int { return len(s.kvs) }
  785. type kvSortByKey struct{ *kvSort }
  786. func (s *kvSortByKey) Less(i, j int) bool {
  787. return bytes.Compare(s.kvs[i].Key, s.kvs[j].Key) < 0
  788. }
  789. type kvSortByVersion struct{ *kvSort }
  790. func (s *kvSortByVersion) Less(i, j int) bool {
  791. return (s.kvs[i].Version - s.kvs[j].Version) < 0
  792. }
  793. type kvSortByCreate struct{ *kvSort }
  794. func (s *kvSortByCreate) Less(i, j int) bool {
  795. return (s.kvs[i].CreateRevision - s.kvs[j].CreateRevision) < 0
  796. }
  797. type kvSortByMod struct{ *kvSort }
  798. func (s *kvSortByMod) Less(i, j int) bool {
  799. return (s.kvs[i].ModRevision - s.kvs[j].ModRevision) < 0
  800. }
  801. type kvSortByValue struct{ *kvSort }
  802. func (s *kvSortByValue) Less(i, j int) bool {
  803. return bytes.Compare(s.kvs[i].Value, s.kvs[j].Value) < 0
  804. }
  805. func checkRequests(rv mvcc.ReadView, rt *pb.TxnRequest, txnPath []bool, f checkReqFunc) (int, error) {
  806. txnCount := 0
  807. reqs := rt.Success
  808. if !txnPath[0] {
  809. reqs = rt.Failure
  810. }
  811. for _, req := range reqs {
  812. if tv, ok := req.Request.(*pb.RequestOp_RequestTxn); ok && tv.RequestTxn != nil {
  813. txns, err := checkRequests(rv, tv.RequestTxn, txnPath[1:], f)
  814. if err != nil {
  815. return 0, err
  816. }
  817. txnCount += txns + 1
  818. txnPath = txnPath[txns+1:]
  819. continue
  820. }
  821. if err := f(rv, req); err != nil {
  822. return 0, err
  823. }
  824. }
  825. return txnCount, nil
  826. }
  827. func (a *applierV3backend) checkRequestPut(rv mvcc.ReadView, reqOp *pb.RequestOp) error {
  828. tv, ok := reqOp.Request.(*pb.RequestOp_RequestPut)
  829. if !ok || tv.RequestPut == nil {
  830. return nil
  831. }
  832. req := tv.RequestPut
  833. if req.IgnoreValue || req.IgnoreLease {
  834. // expects previous key-value, error if not exist
  835. rr, err := rv.Range(req.Key, nil, mvcc.RangeOptions{})
  836. if err != nil {
  837. return err
  838. }
  839. if rr == nil || len(rr.KVs) == 0 {
  840. return ErrKeyNotFound
  841. }
  842. }
  843. if lease.LeaseID(req.Lease) != lease.NoLease {
  844. if l := a.s.lessor.Lookup(lease.LeaseID(req.Lease)); l == nil {
  845. return lease.ErrLeaseNotFound
  846. }
  847. }
  848. return nil
  849. }
  850. func (a *applierV3backend) checkRequestRange(rv mvcc.ReadView, reqOp *pb.RequestOp) error {
  851. tv, ok := reqOp.Request.(*pb.RequestOp_RequestRange)
  852. if !ok || tv.RequestRange == nil {
  853. return nil
  854. }
  855. req := tv.RequestRange
  856. switch {
  857. case req.Revision == 0:
  858. return nil
  859. case req.Revision > rv.Rev():
  860. return mvcc.ErrFutureRev
  861. case req.Revision < rv.FirstRev():
  862. return mvcc.ErrCompacted
  863. }
  864. return nil
  865. }
  866. func compareInt64(a, b int64) int {
  867. switch {
  868. case a < b:
  869. return -1
  870. case a > b:
  871. return 1
  872. default:
  873. return 0
  874. }
  875. }
  876. // mkGteRange determines if the range end is a >= range. This works around grpc
  877. // sending empty byte strings as nil; >= is encoded in the range end as '\0'.
  878. // If it is a GTE range, then []byte{} is returned to indicate the empty byte
  879. // string (vs nil being no byte string).
  880. func mkGteRange(rangeEnd []byte) []byte {
  881. if len(rangeEnd) == 1 && rangeEnd[0] == 0 {
  882. return []byte{}
  883. }
  884. return rangeEnd
  885. }
  886. func noSideEffect(r *pb.InternalRaftRequest) bool {
  887. return r.Range != nil || r.AuthUserGet != nil || r.AuthRoleGet != nil
  888. }
  889. func removeNeedlessRangeReqs(txn *pb.TxnRequest) {
  890. f := func(ops []*pb.RequestOp) []*pb.RequestOp {
  891. j := 0
  892. for i := 0; i < len(ops); i++ {
  893. if _, ok := ops[i].Request.(*pb.RequestOp_RequestRange); ok {
  894. continue
  895. }
  896. ops[j] = ops[i]
  897. j++
  898. }
  899. return ops[:j]
  900. }
  901. txn.Success = f(txn.Success)
  902. txn.Failure = f(txn.Failure)
  903. }
  904. func pruneKVs(rr *mvcc.RangeResult, isPrunable func(*mvccpb.KeyValue) bool) {
  905. j := 0
  906. for i := range rr.KVs {
  907. rr.KVs[j] = rr.KVs[i]
  908. if !isPrunable(&rr.KVs[i]) {
  909. j++
  910. }
  911. }
  912. rr.KVs = rr.KVs[:j]
  913. }
  914. func newHeader(s *EtcdServer) *pb.ResponseHeader {
  915. return &pb.ResponseHeader{
  916. ClusterId: uint64(s.Cluster().ID()),
  917. MemberId: uint64(s.ID()),
  918. Revision: s.KV().Rev(),
  919. RaftTerm: s.Term(),
  920. }
  921. }