apply.go 24 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884
  1. // Copyright 2016 The etcd Authors
  2. //
  3. // Licensed under the Apache License, Version 2.0 (the "License");
  4. // you may not use this file except in compliance with the License.
  5. // You may obtain a copy of the License at
  6. //
  7. // http://www.apache.org/licenses/LICENSE-2.0
  8. //
  9. // Unless required by applicable law or agreed to in writing, software
  10. // distributed under the License is distributed on an "AS IS" BASIS,
  11. // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  12. // See the License for the specific language governing permissions and
  13. // limitations under the License.
  14. package etcdserver
  15. import (
  16. "bytes"
  17. "sort"
  18. "time"
  19. pb "github.com/coreos/etcd/etcdserver/etcdserverpb"
  20. "github.com/coreos/etcd/lease"
  21. "github.com/coreos/etcd/mvcc"
  22. "github.com/coreos/etcd/mvcc/mvccpb"
  23. "github.com/coreos/etcd/pkg/types"
  24. "github.com/gogo/protobuf/proto"
  25. "golang.org/x/net/context"
  26. )
  27. const (
  28. warnApplyDuration = 100 * time.Millisecond
  29. )
  30. type applyResult struct {
  31. resp proto.Message
  32. err error
  33. // physc signals the physical effect of the request has completed in addition
  34. // to being logically reflected by the node. Currently only used for
  35. // Compaction requests.
  36. physc <-chan struct{}
  37. }
  38. // applierV3 is the interface for processing V3 raft messages
  39. type applierV3 interface {
  40. Apply(r *pb.InternalRaftRequest) *applyResult
  41. Put(txn mvcc.TxnWrite, p *pb.PutRequest) (*pb.PutResponse, error)
  42. Range(txn mvcc.TxnRead, r *pb.RangeRequest) (*pb.RangeResponse, error)
  43. DeleteRange(txn mvcc.TxnWrite, dr *pb.DeleteRangeRequest) (*pb.DeleteRangeResponse, error)
  44. Txn(rt *pb.TxnRequest) (*pb.TxnResponse, error)
  45. Compaction(compaction *pb.CompactionRequest) (*pb.CompactionResponse, <-chan struct{}, error)
  46. LeaseGrant(lc *pb.LeaseGrantRequest) (*pb.LeaseGrantResponse, error)
  47. LeaseRevoke(lc *pb.LeaseRevokeRequest) (*pb.LeaseRevokeResponse, error)
  48. Alarm(*pb.AlarmRequest) (*pb.AlarmResponse, error)
  49. Authenticate(r *pb.InternalAuthenticateRequest) (*pb.AuthenticateResponse, error)
  50. AuthEnable() (*pb.AuthEnableResponse, error)
  51. AuthDisable() (*pb.AuthDisableResponse, error)
  52. UserAdd(ua *pb.AuthUserAddRequest) (*pb.AuthUserAddResponse, error)
  53. UserDelete(ua *pb.AuthUserDeleteRequest) (*pb.AuthUserDeleteResponse, error)
  54. UserChangePassword(ua *pb.AuthUserChangePasswordRequest) (*pb.AuthUserChangePasswordResponse, error)
  55. UserGrantRole(ua *pb.AuthUserGrantRoleRequest) (*pb.AuthUserGrantRoleResponse, error)
  56. UserGet(ua *pb.AuthUserGetRequest) (*pb.AuthUserGetResponse, error)
  57. UserRevokeRole(ua *pb.AuthUserRevokeRoleRequest) (*pb.AuthUserRevokeRoleResponse, error)
  58. RoleAdd(ua *pb.AuthRoleAddRequest) (*pb.AuthRoleAddResponse, error)
  59. RoleGrantPermission(ua *pb.AuthRoleGrantPermissionRequest) (*pb.AuthRoleGrantPermissionResponse, error)
  60. RoleGet(ua *pb.AuthRoleGetRequest) (*pb.AuthRoleGetResponse, error)
  61. RoleRevokePermission(ua *pb.AuthRoleRevokePermissionRequest) (*pb.AuthRoleRevokePermissionResponse, error)
  62. RoleDelete(ua *pb.AuthRoleDeleteRequest) (*pb.AuthRoleDeleteResponse, error)
  63. UserList(ua *pb.AuthUserListRequest) (*pb.AuthUserListResponse, error)
  64. RoleList(ua *pb.AuthRoleListRequest) (*pb.AuthRoleListResponse, error)
  65. }
  66. type applierV3backend struct {
  67. s *EtcdServer
  68. }
  69. func (s *EtcdServer) newApplierV3() applierV3 {
  70. return newAuthApplierV3(
  71. s.AuthStore(),
  72. newQuotaApplierV3(s, &applierV3backend{s}),
  73. s.lessor,
  74. )
  75. }
  76. func (a *applierV3backend) Apply(r *pb.InternalRaftRequest) *applyResult {
  77. ar := &applyResult{}
  78. // call into a.s.applyV3.F instead of a.F so upper appliers can check individual calls
  79. switch {
  80. case r.Range != nil:
  81. ar.resp, ar.err = a.s.applyV3.Range(nil, r.Range)
  82. case r.Put != nil:
  83. ar.resp, ar.err = a.s.applyV3.Put(nil, r.Put)
  84. case r.DeleteRange != nil:
  85. ar.resp, ar.err = a.s.applyV3.DeleteRange(nil, r.DeleteRange)
  86. case r.Txn != nil:
  87. ar.resp, ar.err = a.s.applyV3.Txn(r.Txn)
  88. case r.Compaction != nil:
  89. ar.resp, ar.physc, ar.err = a.s.applyV3.Compaction(r.Compaction)
  90. case r.LeaseGrant != nil:
  91. ar.resp, ar.err = a.s.applyV3.LeaseGrant(r.LeaseGrant)
  92. case r.LeaseRevoke != nil:
  93. ar.resp, ar.err = a.s.applyV3.LeaseRevoke(r.LeaseRevoke)
  94. case r.Alarm != nil:
  95. ar.resp, ar.err = a.s.applyV3.Alarm(r.Alarm)
  96. case r.Authenticate != nil:
  97. ar.resp, ar.err = a.s.applyV3.Authenticate(r.Authenticate)
  98. case r.AuthEnable != nil:
  99. ar.resp, ar.err = a.s.applyV3.AuthEnable()
  100. case r.AuthDisable != nil:
  101. ar.resp, ar.err = a.s.applyV3.AuthDisable()
  102. case r.AuthUserAdd != nil:
  103. ar.resp, ar.err = a.s.applyV3.UserAdd(r.AuthUserAdd)
  104. case r.AuthUserDelete != nil:
  105. ar.resp, ar.err = a.s.applyV3.UserDelete(r.AuthUserDelete)
  106. case r.AuthUserChangePassword != nil:
  107. ar.resp, ar.err = a.s.applyV3.UserChangePassword(r.AuthUserChangePassword)
  108. case r.AuthUserGrantRole != nil:
  109. ar.resp, ar.err = a.s.applyV3.UserGrantRole(r.AuthUserGrantRole)
  110. case r.AuthUserGet != nil:
  111. ar.resp, ar.err = a.s.applyV3.UserGet(r.AuthUserGet)
  112. case r.AuthUserRevokeRole != nil:
  113. ar.resp, ar.err = a.s.applyV3.UserRevokeRole(r.AuthUserRevokeRole)
  114. case r.AuthRoleAdd != nil:
  115. ar.resp, ar.err = a.s.applyV3.RoleAdd(r.AuthRoleAdd)
  116. case r.AuthRoleGrantPermission != nil:
  117. ar.resp, ar.err = a.s.applyV3.RoleGrantPermission(r.AuthRoleGrantPermission)
  118. case r.AuthRoleGet != nil:
  119. ar.resp, ar.err = a.s.applyV3.RoleGet(r.AuthRoleGet)
  120. case r.AuthRoleRevokePermission != nil:
  121. ar.resp, ar.err = a.s.applyV3.RoleRevokePermission(r.AuthRoleRevokePermission)
  122. case r.AuthRoleDelete != nil:
  123. ar.resp, ar.err = a.s.applyV3.RoleDelete(r.AuthRoleDelete)
  124. case r.AuthUserList != nil:
  125. ar.resp, ar.err = a.s.applyV3.UserList(r.AuthUserList)
  126. case r.AuthRoleList != nil:
  127. ar.resp, ar.err = a.s.applyV3.RoleList(r.AuthRoleList)
  128. default:
  129. panic("not implemented")
  130. }
  131. return ar
  132. }
  133. func (a *applierV3backend) Put(txn mvcc.TxnWrite, p *pb.PutRequest) (resp *pb.PutResponse, err error) {
  134. resp = &pb.PutResponse{}
  135. resp.Header = &pb.ResponseHeader{}
  136. val, leaseID := p.Value, lease.LeaseID(p.Lease)
  137. if txn == nil {
  138. if leaseID != lease.NoLease {
  139. if l := a.s.lessor.Lookup(leaseID); l == nil {
  140. return nil, lease.ErrLeaseNotFound
  141. }
  142. }
  143. txn = a.s.KV().Write()
  144. defer txn.End()
  145. }
  146. var rr *mvcc.RangeResult
  147. if p.IgnoreValue || p.IgnoreLease || p.PrevKv {
  148. rr, err = txn.Range(p.Key, nil, mvcc.RangeOptions{})
  149. if err != nil {
  150. return nil, err
  151. }
  152. }
  153. if p.IgnoreValue || p.IgnoreLease {
  154. if rr == nil || len(rr.KVs) == 0 {
  155. // ignore_{lease,value} flag expects previous key-value pair
  156. return nil, ErrKeyNotFound
  157. }
  158. }
  159. if p.IgnoreValue {
  160. val = rr.KVs[0].Value
  161. }
  162. if p.IgnoreLease {
  163. leaseID = lease.LeaseID(rr.KVs[0].Lease)
  164. }
  165. if p.PrevKv {
  166. if rr != nil && len(rr.KVs) != 0 {
  167. resp.PrevKv = &rr.KVs[0]
  168. }
  169. }
  170. resp.Header.Revision = txn.Put(p.Key, val, leaseID)
  171. return resp, nil
  172. }
  173. func (a *applierV3backend) DeleteRange(txn mvcc.TxnWrite, dr *pb.DeleteRangeRequest) (*pb.DeleteRangeResponse, error) {
  174. resp := &pb.DeleteRangeResponse{}
  175. resp.Header = &pb.ResponseHeader{}
  176. end := mkGteRange(dr.RangeEnd)
  177. if txn == nil {
  178. txn = a.s.kv.Write()
  179. defer txn.End()
  180. }
  181. if dr.PrevKv {
  182. rr, err := txn.Range(dr.Key, end, mvcc.RangeOptions{})
  183. if err != nil {
  184. return nil, err
  185. }
  186. if rr != nil {
  187. for i := range rr.KVs {
  188. resp.PrevKvs = append(resp.PrevKvs, &rr.KVs[i])
  189. }
  190. }
  191. }
  192. resp.Deleted, resp.Header.Revision = txn.DeleteRange(dr.Key, end)
  193. return resp, nil
  194. }
  195. func (a *applierV3backend) Range(txn mvcc.TxnRead, r *pb.RangeRequest) (*pb.RangeResponse, error) {
  196. resp := &pb.RangeResponse{}
  197. resp.Header = &pb.ResponseHeader{}
  198. if txn == nil {
  199. txn = a.s.kv.Read()
  200. defer txn.End()
  201. }
  202. limit := r.Limit
  203. if r.SortOrder != pb.RangeRequest_NONE ||
  204. r.MinModRevision != 0 || r.MaxModRevision != 0 ||
  205. r.MinCreateRevision != 0 || r.MaxCreateRevision != 0 {
  206. // fetch everything; sort and truncate afterwards
  207. limit = 0
  208. }
  209. if limit > 0 {
  210. // fetch one extra for 'more' flag
  211. limit = limit + 1
  212. }
  213. ro := mvcc.RangeOptions{
  214. Limit: limit,
  215. Rev: r.Revision,
  216. Count: r.CountOnly,
  217. }
  218. rr, err := txn.Range(r.Key, mkGteRange(r.RangeEnd), ro)
  219. if err != nil {
  220. return nil, err
  221. }
  222. if r.MaxModRevision != 0 {
  223. f := func(kv *mvccpb.KeyValue) bool { return kv.ModRevision > r.MaxModRevision }
  224. pruneKVs(rr, f)
  225. }
  226. if r.MinModRevision != 0 {
  227. f := func(kv *mvccpb.KeyValue) bool { return kv.ModRevision < r.MinModRevision }
  228. pruneKVs(rr, f)
  229. }
  230. if r.MaxCreateRevision != 0 {
  231. f := func(kv *mvccpb.KeyValue) bool { return kv.CreateRevision > r.MaxCreateRevision }
  232. pruneKVs(rr, f)
  233. }
  234. if r.MinCreateRevision != 0 {
  235. f := func(kv *mvccpb.KeyValue) bool { return kv.CreateRevision < r.MinCreateRevision }
  236. pruneKVs(rr, f)
  237. }
  238. sortOrder := r.SortOrder
  239. if r.SortTarget != pb.RangeRequest_KEY && sortOrder == pb.RangeRequest_NONE {
  240. // Since current mvcc.Range implementation returns results
  241. // sorted by keys in lexiographically ascending order,
  242. // sort ASCEND by default only when target is not 'KEY'
  243. sortOrder = pb.RangeRequest_ASCEND
  244. }
  245. if sortOrder != pb.RangeRequest_NONE {
  246. var sorter sort.Interface
  247. switch {
  248. case r.SortTarget == pb.RangeRequest_KEY:
  249. sorter = &kvSortByKey{&kvSort{rr.KVs}}
  250. case r.SortTarget == pb.RangeRequest_VERSION:
  251. sorter = &kvSortByVersion{&kvSort{rr.KVs}}
  252. case r.SortTarget == pb.RangeRequest_CREATE:
  253. sorter = &kvSortByCreate{&kvSort{rr.KVs}}
  254. case r.SortTarget == pb.RangeRequest_MOD:
  255. sorter = &kvSortByMod{&kvSort{rr.KVs}}
  256. case r.SortTarget == pb.RangeRequest_VALUE:
  257. sorter = &kvSortByValue{&kvSort{rr.KVs}}
  258. }
  259. switch {
  260. case sortOrder == pb.RangeRequest_ASCEND:
  261. sort.Sort(sorter)
  262. case sortOrder == pb.RangeRequest_DESCEND:
  263. sort.Sort(sort.Reverse(sorter))
  264. }
  265. }
  266. if r.Limit > 0 && len(rr.KVs) > int(r.Limit) {
  267. rr.KVs = rr.KVs[:r.Limit]
  268. resp.More = true
  269. }
  270. resp.Header.Revision = rr.Rev
  271. resp.Count = int64(rr.Count)
  272. for i := range rr.KVs {
  273. if r.KeysOnly {
  274. rr.KVs[i].Value = nil
  275. }
  276. resp.Kvs = append(resp.Kvs, &rr.KVs[i])
  277. }
  278. return resp, nil
  279. }
  280. func (a *applierV3backend) Txn(rt *pb.TxnRequest) (*pb.TxnResponse, error) {
  281. isWrite := !isTxnReadonly(rt)
  282. txn := mvcc.NewReadOnlyTxnWrite(a.s.KV().Read())
  283. reqs, ok := a.compareToOps(txn, rt)
  284. if isWrite {
  285. if err := a.checkRequestPut(txn, reqs); err != nil {
  286. txn.End()
  287. return nil, err
  288. }
  289. }
  290. if err := checkRequestRange(txn, reqs); err != nil {
  291. txn.End()
  292. return nil, err
  293. }
  294. resps := make([]*pb.ResponseOp, len(reqs))
  295. txnResp := &pb.TxnResponse{
  296. Responses: resps,
  297. Succeeded: ok,
  298. Header: &pb.ResponseHeader{},
  299. }
  300. // When executing mutable txn ops, etcd must hold the txn lock so
  301. // readers do not see any intermediate results. Since writes are
  302. // serialized on the raft loop, the revision in the read view will
  303. // be the revision of the write txn.
  304. if isWrite {
  305. txn.End()
  306. txn = a.s.KV().Write()
  307. }
  308. for i := range reqs {
  309. resps[i] = a.applyUnion(txn, reqs[i])
  310. }
  311. rev := txn.Rev()
  312. if len(txn.Changes()) != 0 {
  313. rev++
  314. }
  315. txn.End()
  316. txnResp.Header.Revision = rev
  317. return txnResp, nil
  318. }
  319. func (a *applierV3backend) compareToOps(rv mvcc.ReadView, rt *pb.TxnRequest) ([]*pb.RequestOp, bool) {
  320. for _, c := range rt.Compare {
  321. if !applyCompare(rv, c) {
  322. return rt.Failure, false
  323. }
  324. }
  325. return rt.Success, true
  326. }
  327. // applyCompare applies the compare request.
  328. // If the comparison succeeds, it returns true. Otherwise, returns false.
  329. func applyCompare(rv mvcc.ReadView, c *pb.Compare) bool {
  330. // TOOD: possible optimizations
  331. // * chunk reads for large ranges to conserve memory
  332. // * rewrite rules for common patterns:
  333. // ex. "[a, b) createrev > 0" => "limit 1 /\ kvs > 0"
  334. // * caching
  335. rr, err := rv.Range(c.Key, mkGteRange(c.RangeEnd), mvcc.RangeOptions{})
  336. if err != nil {
  337. return false
  338. }
  339. if len(rr.KVs) == 0 {
  340. if c.Target == pb.Compare_VALUE {
  341. // Always fail if comparing a value on a key/keys that doesn't exist;
  342. // nil == empty string in grpc; no way to represent missing value
  343. return false
  344. }
  345. return compareKV(c, mvccpb.KeyValue{})
  346. }
  347. for _, kv := range rr.KVs {
  348. if !compareKV(c, kv) {
  349. return false
  350. }
  351. }
  352. return true
  353. }
  354. func compareKV(c *pb.Compare, ckv mvccpb.KeyValue) bool {
  355. var result int
  356. rev := int64(0)
  357. switch c.Target {
  358. case pb.Compare_VALUE:
  359. v := []byte{}
  360. if tv, _ := c.TargetUnion.(*pb.Compare_Value); tv != nil {
  361. v = tv.Value
  362. }
  363. result = bytes.Compare(ckv.Value, v)
  364. case pb.Compare_CREATE:
  365. if tv, _ := c.TargetUnion.(*pb.Compare_CreateRevision); tv != nil {
  366. rev = tv.CreateRevision
  367. }
  368. result = compareInt64(ckv.CreateRevision, rev)
  369. case pb.Compare_MOD:
  370. if tv, _ := c.TargetUnion.(*pb.Compare_ModRevision); tv != nil {
  371. rev = tv.ModRevision
  372. }
  373. result = compareInt64(ckv.ModRevision, rev)
  374. case pb.Compare_VERSION:
  375. if tv, _ := c.TargetUnion.(*pb.Compare_Version); tv != nil {
  376. rev = tv.Version
  377. }
  378. result = compareInt64(ckv.Version, rev)
  379. }
  380. switch c.Result {
  381. case pb.Compare_EQUAL:
  382. return result == 0
  383. case pb.Compare_NOT_EQUAL:
  384. return result != 0
  385. case pb.Compare_GREATER:
  386. return result > 0
  387. case pb.Compare_LESS:
  388. return result < 0
  389. }
  390. return true
  391. }
  392. func (a *applierV3backend) applyUnion(txn mvcc.TxnWrite, union *pb.RequestOp) *pb.ResponseOp {
  393. switch tv := union.Request.(type) {
  394. case *pb.RequestOp_RequestRange:
  395. if tv.RequestRange != nil {
  396. resp, err := a.Range(txn, tv.RequestRange)
  397. if err != nil {
  398. plog.Panicf("unexpected error during txn: %v", err)
  399. }
  400. return &pb.ResponseOp{Response: &pb.ResponseOp_ResponseRange{ResponseRange: resp}}
  401. }
  402. case *pb.RequestOp_RequestPut:
  403. if tv.RequestPut != nil {
  404. resp, err := a.Put(txn, tv.RequestPut)
  405. if err != nil {
  406. plog.Panicf("unexpected error during txn: %v", err)
  407. }
  408. return &pb.ResponseOp{Response: &pb.ResponseOp_ResponsePut{ResponsePut: resp}}
  409. }
  410. case *pb.RequestOp_RequestDeleteRange:
  411. if tv.RequestDeleteRange != nil {
  412. resp, err := a.DeleteRange(txn, tv.RequestDeleteRange)
  413. if err != nil {
  414. plog.Panicf("unexpected error during txn: %v", err)
  415. }
  416. return &pb.ResponseOp{Response: &pb.ResponseOp_ResponseDeleteRange{ResponseDeleteRange: resp}}
  417. }
  418. default:
  419. // empty union
  420. return nil
  421. }
  422. return nil
  423. }
  424. func (a *applierV3backend) Compaction(compaction *pb.CompactionRequest) (*pb.CompactionResponse, <-chan struct{}, error) {
  425. resp := &pb.CompactionResponse{}
  426. resp.Header = &pb.ResponseHeader{}
  427. ch, err := a.s.KV().Compact(compaction.Revision)
  428. if err != nil {
  429. return nil, ch, err
  430. }
  431. // get the current revision. which key to get is not important.
  432. rr, _ := a.s.KV().Range([]byte("compaction"), nil, mvcc.RangeOptions{})
  433. resp.Header.Revision = rr.Rev
  434. return resp, ch, err
  435. }
  436. func (a *applierV3backend) LeaseGrant(lc *pb.LeaseGrantRequest) (*pb.LeaseGrantResponse, error) {
  437. l, err := a.s.lessor.Grant(lease.LeaseID(lc.ID), lc.TTL)
  438. resp := &pb.LeaseGrantResponse{}
  439. if err == nil {
  440. resp.ID = int64(l.ID)
  441. resp.TTL = l.TTL()
  442. resp.Header = newHeader(a.s)
  443. }
  444. return resp, err
  445. }
  446. func (a *applierV3backend) LeaseRevoke(lc *pb.LeaseRevokeRequest) (*pb.LeaseRevokeResponse, error) {
  447. err := a.s.lessor.Revoke(lease.LeaseID(lc.ID))
  448. return &pb.LeaseRevokeResponse{Header: newHeader(a.s)}, err
  449. }
  450. func (a *applierV3backend) Alarm(ar *pb.AlarmRequest) (*pb.AlarmResponse, error) {
  451. resp := &pb.AlarmResponse{}
  452. oldCount := len(a.s.alarmStore.Get(ar.Alarm))
  453. switch ar.Action {
  454. case pb.AlarmRequest_GET:
  455. resp.Alarms = a.s.alarmStore.Get(ar.Alarm)
  456. case pb.AlarmRequest_ACTIVATE:
  457. m := a.s.alarmStore.Activate(types.ID(ar.MemberID), ar.Alarm)
  458. if m == nil {
  459. break
  460. }
  461. resp.Alarms = append(resp.Alarms, m)
  462. activated := oldCount == 0 && len(a.s.alarmStore.Get(m.Alarm)) == 1
  463. if !activated {
  464. break
  465. }
  466. switch m.Alarm {
  467. case pb.AlarmType_NOSPACE:
  468. plog.Warningf("alarm raised %+v", m)
  469. a.s.applyV3 = newApplierV3Capped(a)
  470. default:
  471. plog.Errorf("unimplemented alarm activation (%+v)", m)
  472. }
  473. case pb.AlarmRequest_DEACTIVATE:
  474. m := a.s.alarmStore.Deactivate(types.ID(ar.MemberID), ar.Alarm)
  475. if m == nil {
  476. break
  477. }
  478. resp.Alarms = append(resp.Alarms, m)
  479. deactivated := oldCount > 0 && len(a.s.alarmStore.Get(ar.Alarm)) == 0
  480. if !deactivated {
  481. break
  482. }
  483. switch m.Alarm {
  484. case pb.AlarmType_NOSPACE:
  485. plog.Infof("alarm disarmed %+v", ar)
  486. a.s.applyV3 = a.s.newApplierV3()
  487. default:
  488. plog.Errorf("unimplemented alarm deactivation (%+v)", m)
  489. }
  490. default:
  491. return nil, nil
  492. }
  493. return resp, nil
  494. }
  495. type applierV3Capped struct {
  496. applierV3
  497. q backendQuota
  498. }
  499. // newApplierV3Capped creates an applyV3 that will reject Puts and transactions
  500. // with Puts so that the number of keys in the store is capped.
  501. func newApplierV3Capped(base applierV3) applierV3 { return &applierV3Capped{applierV3: base} }
  502. func (a *applierV3Capped) Put(txn mvcc.TxnWrite, p *pb.PutRequest) (*pb.PutResponse, error) {
  503. return nil, ErrNoSpace
  504. }
  505. func (a *applierV3Capped) Txn(r *pb.TxnRequest) (*pb.TxnResponse, error) {
  506. if a.q.Cost(r) > 0 {
  507. return nil, ErrNoSpace
  508. }
  509. return a.applierV3.Txn(r)
  510. }
  511. func (a *applierV3Capped) LeaseGrant(lc *pb.LeaseGrantRequest) (*pb.LeaseGrantResponse, error) {
  512. return nil, ErrNoSpace
  513. }
  514. func (a *applierV3backend) AuthEnable() (*pb.AuthEnableResponse, error) {
  515. err := a.s.AuthStore().AuthEnable()
  516. if err != nil {
  517. return nil, err
  518. }
  519. return &pb.AuthEnableResponse{Header: newHeader(a.s)}, nil
  520. }
  521. func (a *applierV3backend) AuthDisable() (*pb.AuthDisableResponse, error) {
  522. a.s.AuthStore().AuthDisable()
  523. return &pb.AuthDisableResponse{Header: newHeader(a.s)}, nil
  524. }
  525. func (a *applierV3backend) Authenticate(r *pb.InternalAuthenticateRequest) (*pb.AuthenticateResponse, error) {
  526. ctx := context.WithValue(context.WithValue(a.s.ctx, "index", a.s.consistIndex.ConsistentIndex()), "simpleToken", r.SimpleToken)
  527. resp, err := a.s.AuthStore().Authenticate(ctx, r.Name, r.Password)
  528. if resp != nil {
  529. resp.Header = newHeader(a.s)
  530. }
  531. return resp, err
  532. }
  533. func (a *applierV3backend) UserAdd(r *pb.AuthUserAddRequest) (*pb.AuthUserAddResponse, error) {
  534. resp, err := a.s.AuthStore().UserAdd(r)
  535. if resp != nil {
  536. resp.Header = newHeader(a.s)
  537. }
  538. return resp, err
  539. }
  540. func (a *applierV3backend) UserDelete(r *pb.AuthUserDeleteRequest) (*pb.AuthUserDeleteResponse, error) {
  541. resp, err := a.s.AuthStore().UserDelete(r)
  542. if resp != nil {
  543. resp.Header = newHeader(a.s)
  544. }
  545. return resp, err
  546. }
  547. func (a *applierV3backend) UserChangePassword(r *pb.AuthUserChangePasswordRequest) (*pb.AuthUserChangePasswordResponse, error) {
  548. resp, err := a.s.AuthStore().UserChangePassword(r)
  549. if resp != nil {
  550. resp.Header = newHeader(a.s)
  551. }
  552. return resp, err
  553. }
  554. func (a *applierV3backend) UserGrantRole(r *pb.AuthUserGrantRoleRequest) (*pb.AuthUserGrantRoleResponse, error) {
  555. resp, err := a.s.AuthStore().UserGrantRole(r)
  556. if resp != nil {
  557. resp.Header = newHeader(a.s)
  558. }
  559. return resp, err
  560. }
  561. func (a *applierV3backend) UserGet(r *pb.AuthUserGetRequest) (*pb.AuthUserGetResponse, error) {
  562. resp, err := a.s.AuthStore().UserGet(r)
  563. if resp != nil {
  564. resp.Header = newHeader(a.s)
  565. }
  566. return resp, err
  567. }
  568. func (a *applierV3backend) UserRevokeRole(r *pb.AuthUserRevokeRoleRequest) (*pb.AuthUserRevokeRoleResponse, error) {
  569. resp, err := a.s.AuthStore().UserRevokeRole(r)
  570. if resp != nil {
  571. resp.Header = newHeader(a.s)
  572. }
  573. return resp, err
  574. }
  575. func (a *applierV3backend) RoleAdd(r *pb.AuthRoleAddRequest) (*pb.AuthRoleAddResponse, error) {
  576. resp, err := a.s.AuthStore().RoleAdd(r)
  577. if resp != nil {
  578. resp.Header = newHeader(a.s)
  579. }
  580. return resp, err
  581. }
  582. func (a *applierV3backend) RoleGrantPermission(r *pb.AuthRoleGrantPermissionRequest) (*pb.AuthRoleGrantPermissionResponse, error) {
  583. resp, err := a.s.AuthStore().RoleGrantPermission(r)
  584. if resp != nil {
  585. resp.Header = newHeader(a.s)
  586. }
  587. return resp, err
  588. }
  589. func (a *applierV3backend) RoleGet(r *pb.AuthRoleGetRequest) (*pb.AuthRoleGetResponse, error) {
  590. resp, err := a.s.AuthStore().RoleGet(r)
  591. if resp != nil {
  592. resp.Header = newHeader(a.s)
  593. }
  594. return resp, err
  595. }
  596. func (a *applierV3backend) RoleRevokePermission(r *pb.AuthRoleRevokePermissionRequest) (*pb.AuthRoleRevokePermissionResponse, error) {
  597. resp, err := a.s.AuthStore().RoleRevokePermission(r)
  598. if resp != nil {
  599. resp.Header = newHeader(a.s)
  600. }
  601. return resp, err
  602. }
  603. func (a *applierV3backend) RoleDelete(r *pb.AuthRoleDeleteRequest) (*pb.AuthRoleDeleteResponse, error) {
  604. resp, err := a.s.AuthStore().RoleDelete(r)
  605. if resp != nil {
  606. resp.Header = newHeader(a.s)
  607. }
  608. return resp, err
  609. }
  610. func (a *applierV3backend) UserList(r *pb.AuthUserListRequest) (*pb.AuthUserListResponse, error) {
  611. resp, err := a.s.AuthStore().UserList(r)
  612. if resp != nil {
  613. resp.Header = newHeader(a.s)
  614. }
  615. return resp, err
  616. }
  617. func (a *applierV3backend) RoleList(r *pb.AuthRoleListRequest) (*pb.AuthRoleListResponse, error) {
  618. resp, err := a.s.AuthStore().RoleList(r)
  619. if resp != nil {
  620. resp.Header = newHeader(a.s)
  621. }
  622. return resp, err
  623. }
  624. type quotaApplierV3 struct {
  625. applierV3
  626. q Quota
  627. }
  628. func newQuotaApplierV3(s *EtcdServer, app applierV3) applierV3 {
  629. return &quotaApplierV3{app, NewBackendQuota(s)}
  630. }
  631. func (a *quotaApplierV3) Put(txn mvcc.TxnWrite, p *pb.PutRequest) (*pb.PutResponse, error) {
  632. ok := a.q.Available(p)
  633. resp, err := a.applierV3.Put(txn, p)
  634. if err == nil && !ok {
  635. err = ErrNoSpace
  636. }
  637. return resp, err
  638. }
  639. func (a *quotaApplierV3) Txn(rt *pb.TxnRequest) (*pb.TxnResponse, error) {
  640. ok := a.q.Available(rt)
  641. resp, err := a.applierV3.Txn(rt)
  642. if err == nil && !ok {
  643. err = ErrNoSpace
  644. }
  645. return resp, err
  646. }
  647. func (a *quotaApplierV3) LeaseGrant(lc *pb.LeaseGrantRequest) (*pb.LeaseGrantResponse, error) {
  648. ok := a.q.Available(lc)
  649. resp, err := a.applierV3.LeaseGrant(lc)
  650. if err == nil && !ok {
  651. err = ErrNoSpace
  652. }
  653. return resp, err
  654. }
  655. type kvSort struct{ kvs []mvccpb.KeyValue }
  656. func (s *kvSort) Swap(i, j int) {
  657. t := s.kvs[i]
  658. s.kvs[i] = s.kvs[j]
  659. s.kvs[j] = t
  660. }
  661. func (s *kvSort) Len() int { return len(s.kvs) }
  662. type kvSortByKey struct{ *kvSort }
  663. func (s *kvSortByKey) Less(i, j int) bool {
  664. return bytes.Compare(s.kvs[i].Key, s.kvs[j].Key) < 0
  665. }
  666. type kvSortByVersion struct{ *kvSort }
  667. func (s *kvSortByVersion) Less(i, j int) bool {
  668. return (s.kvs[i].Version - s.kvs[j].Version) < 0
  669. }
  670. type kvSortByCreate struct{ *kvSort }
  671. func (s *kvSortByCreate) Less(i, j int) bool {
  672. return (s.kvs[i].CreateRevision - s.kvs[j].CreateRevision) < 0
  673. }
  674. type kvSortByMod struct{ *kvSort }
  675. func (s *kvSortByMod) Less(i, j int) bool {
  676. return (s.kvs[i].ModRevision - s.kvs[j].ModRevision) < 0
  677. }
  678. type kvSortByValue struct{ *kvSort }
  679. func (s *kvSortByValue) Less(i, j int) bool {
  680. return bytes.Compare(s.kvs[i].Value, s.kvs[j].Value) < 0
  681. }
  682. func (a *applierV3backend) checkRequestPut(rv mvcc.ReadView, reqs []*pb.RequestOp) error {
  683. for _, requ := range reqs {
  684. tv, ok := requ.Request.(*pb.RequestOp_RequestPut)
  685. if !ok {
  686. continue
  687. }
  688. preq := tv.RequestPut
  689. if preq == nil {
  690. continue
  691. }
  692. if preq.IgnoreValue || preq.IgnoreLease {
  693. // expects previous key-value, error if not exist
  694. rr, err := rv.Range(preq.Key, nil, mvcc.RangeOptions{})
  695. if err != nil {
  696. return err
  697. }
  698. if rr == nil || len(rr.KVs) == 0 {
  699. return ErrKeyNotFound
  700. }
  701. }
  702. if lease.LeaseID(preq.Lease) == lease.NoLease {
  703. continue
  704. }
  705. if l := a.s.lessor.Lookup(lease.LeaseID(preq.Lease)); l == nil {
  706. return lease.ErrLeaseNotFound
  707. }
  708. }
  709. return nil
  710. }
  711. func checkRequestRange(rv mvcc.ReadView, reqs []*pb.RequestOp) error {
  712. for _, requ := range reqs {
  713. tv, ok := requ.Request.(*pb.RequestOp_RequestRange)
  714. if !ok {
  715. continue
  716. }
  717. greq := tv.RequestRange
  718. if greq == nil || greq.Revision == 0 {
  719. continue
  720. }
  721. if greq.Revision > rv.Rev() {
  722. return mvcc.ErrFutureRev
  723. }
  724. if greq.Revision < rv.FirstRev() {
  725. return mvcc.ErrCompacted
  726. }
  727. }
  728. return nil
  729. }
  730. func compareInt64(a, b int64) int {
  731. switch {
  732. case a < b:
  733. return -1
  734. case a > b:
  735. return 1
  736. default:
  737. return 0
  738. }
  739. }
  740. // mkGteRange determines if the range end is a >= range. This works around grpc
  741. // sending empty byte strings as nil; >= is encoded in the range end as '\0'.
  742. // If it is a GTE range, then []byte{} is returned to indicate the empty byte
  743. // string (vs nil being no byte string).
  744. func mkGteRange(rangeEnd []byte) []byte {
  745. if len(rangeEnd) == 1 && rangeEnd[0] == 0 {
  746. return []byte{}
  747. }
  748. return rangeEnd
  749. }
  750. func noSideEffect(r *pb.InternalRaftRequest) bool {
  751. return r.Range != nil || r.AuthUserGet != nil || r.AuthRoleGet != nil
  752. }
  753. func removeNeedlessRangeReqs(txn *pb.TxnRequest) {
  754. f := func(ops []*pb.RequestOp) []*pb.RequestOp {
  755. j := 0
  756. for i := 0; i < len(ops); i++ {
  757. if _, ok := ops[i].Request.(*pb.RequestOp_RequestRange); ok {
  758. continue
  759. }
  760. ops[j] = ops[i]
  761. j++
  762. }
  763. return ops[:j]
  764. }
  765. txn.Success = f(txn.Success)
  766. txn.Failure = f(txn.Failure)
  767. }
  768. func pruneKVs(rr *mvcc.RangeResult, isPrunable func(*mvccpb.KeyValue) bool) {
  769. j := 0
  770. for i := range rr.KVs {
  771. rr.KVs[j] = rr.KVs[i]
  772. if !isPrunable(&rr.KVs[i]) {
  773. j++
  774. }
  775. }
  776. rr.KVs = rr.KVs[:j]
  777. }
  778. func newHeader(s *EtcdServer) *pb.ResponseHeader {
  779. return &pb.ResponseHeader{
  780. ClusterId: uint64(s.Cluster().ID()),
  781. MemberId: uint64(s.ID()),
  782. Revision: s.KV().Rev(),
  783. RaftTerm: s.Term(),
  784. }
  785. }