123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723 |
- // Copyright 2016 CoreOS, Inc.
- //
- // Licensed under the Apache License, Version 2.0 (the "License");
- // you may not use this file except in compliance with the License.
- // You may obtain a copy of the License at
- //
- // http://www.apache.org/licenses/LICENSE-2.0
- //
- // Unless required by applicable law or agreed to in writing, software
- // distributed under the License is distributed on an "AS IS" BASIS,
- // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
- // See the License for the specific language governing permissions and
- // limitations under the License.package recipe
- package integration
- import (
- "fmt"
- "reflect"
- "testing"
- "time"
- "github.com/coreos/etcd/Godeps/_workspace/src/golang.org/x/net/context"
- "github.com/coreos/etcd/Godeps/_workspace/src/google.golang.org/grpc"
- "github.com/coreos/etcd/etcdserver/api/v3rpc"
- "github.com/coreos/etcd/etcdserver/api/v3rpc/rpctypes"
- pb "github.com/coreos/etcd/etcdserver/etcdserverpb"
- "github.com/coreos/etcd/pkg/testutil"
- )
- // TestV3PutOverwrite puts a key with the v3 api to a random cluster member,
- // overwrites it, then checks that the change was applied.
- func TestV3PutOverwrite(t *testing.T) {
- defer testutil.AfterTest(t)
- clus := NewClusterV3(t, &ClusterConfig{Size: 3})
- defer clus.Terminate(t)
- kvc := toGRPC(clus.RandClient()).KV
- key := []byte("foo")
- reqput := &pb.PutRequest{Key: key, Value: []byte("bar")}
- respput, err := kvc.Put(context.TODO(), reqput)
- if err != nil {
- t.Fatalf("couldn't put key (%v)", err)
- }
- // overwrite
- reqput.Value = []byte("baz")
- respput2, err := kvc.Put(context.TODO(), reqput)
- if err != nil {
- t.Fatalf("couldn't put key (%v)", err)
- }
- if respput2.Header.Revision <= respput.Header.Revision {
- t.Fatalf("expected newer revision on overwrite, got %v <= %v",
- respput2.Header.Revision, respput.Header.Revision)
- }
- reqrange := &pb.RangeRequest{Key: key}
- resprange, err := kvc.Range(context.TODO(), reqrange)
- if err != nil {
- t.Fatalf("couldn't get key (%v)", err)
- }
- if len(resprange.Kvs) != 1 {
- t.Fatalf("expected 1 key, got %v", len(resprange.Kvs))
- }
- kv := resprange.Kvs[0]
- if kv.ModRevision <= kv.CreateRevision {
- t.Errorf("expected modRev > createRev, got %d <= %d",
- kv.ModRevision, kv.CreateRevision)
- }
- if !reflect.DeepEqual(reqput.Value, kv.Value) {
- t.Errorf("expected value %v, got %v", reqput.Value, kv.Value)
- }
- }
- func TestV3TxnTooManyOps(t *testing.T) {
- defer testutil.AfterTest(t)
- clus := NewClusterV3(t, &ClusterConfig{Size: 3})
- defer clus.Terminate(t)
- kvc := toGRPC(clus.RandClient()).KV
- // unique keys
- i := new(int)
- keyf := func() []byte {
- *i++
- return []byte(fmt.Sprintf("key-%d", i))
- }
- addCompareOps := func(txn *pb.TxnRequest) {
- txn.Compare = append(txn.Compare,
- &pb.Compare{
- Result: pb.Compare_GREATER,
- Target: pb.Compare_CREATE,
- Key: keyf(),
- })
- }
- addSuccessOps := func(txn *pb.TxnRequest) {
- txn.Success = append(txn.Success,
- &pb.RequestUnion{
- Request: &pb.RequestUnion_RequestPut{
- RequestPut: &pb.PutRequest{
- Key: keyf(),
- Value: []byte("bar"),
- },
- },
- })
- }
- addFailureOps := func(txn *pb.TxnRequest) {
- txn.Failure = append(txn.Failure,
- &pb.RequestUnion{
- Request: &pb.RequestUnion_RequestPut{
- RequestPut: &pb.PutRequest{
- Key: keyf(),
- Value: []byte("bar"),
- },
- },
- })
- }
- tests := []func(txn *pb.TxnRequest){
- addCompareOps,
- addSuccessOps,
- addFailureOps,
- }
- for i, tt := range tests {
- txn := &pb.TxnRequest{}
- for j := 0; j < v3rpc.MaxOpsPerTxn+1; j++ {
- tt(txn)
- }
- _, err := kvc.Txn(context.Background(), txn)
- if err != rpctypes.ErrTooManyOps {
- t.Errorf("#%d: err = %v, want %v", i, err, rpctypes.ErrTooManyOps)
- }
- }
- }
- func TestV3TxnDuplicateKeys(t *testing.T) {
- defer testutil.AfterTest(t)
- clus := NewClusterV3(t, &ClusterConfig{Size: 3})
- defer clus.Terminate(t)
- putreq := &pb.RequestUnion{Request: &pb.RequestUnion_RequestPut{RequestPut: &pb.PutRequest{Key: []byte("abc"), Value: []byte("def")}}}
- delKeyReq := &pb.RequestUnion{Request: &pb.RequestUnion_RequestDeleteRange{
- RequestDeleteRange: &pb.DeleteRangeRequest{
- Key: []byte("abc"),
- },
- },
- }
- delInRangeReq := &pb.RequestUnion{Request: &pb.RequestUnion_RequestDeleteRange{
- RequestDeleteRange: &pb.DeleteRangeRequest{
- Key: []byte("a"), RangeEnd: []byte("b"),
- },
- },
- }
- delOutOfRangeReq := &pb.RequestUnion{Request: &pb.RequestUnion_RequestDeleteRange{
- RequestDeleteRange: &pb.DeleteRangeRequest{
- Key: []byte("abb"), RangeEnd: []byte("abc"),
- },
- },
- }
- kvc := toGRPC(clus.RandClient()).KV
- tests := []struct {
- txnSuccess []*pb.RequestUnion
- werr error
- }{
- {
- txnSuccess: []*pb.RequestUnion{putreq, putreq},
- werr: rpctypes.ErrDuplicateKey,
- },
- {
- txnSuccess: []*pb.RequestUnion{putreq, delKeyReq},
- werr: rpctypes.ErrDuplicateKey,
- },
- {
- txnSuccess: []*pb.RequestUnion{putreq, delInRangeReq},
- werr: rpctypes.ErrDuplicateKey,
- },
- {
- txnSuccess: []*pb.RequestUnion{delKeyReq, delInRangeReq, delKeyReq, delInRangeReq},
- werr: nil,
- },
- {
- txnSuccess: []*pb.RequestUnion{putreq, delOutOfRangeReq},
- werr: nil,
- },
- }
- for i, tt := range tests {
- txn := &pb.TxnRequest{Success: tt.txnSuccess}
- _, err := kvc.Txn(context.Background(), txn)
- if err != tt.werr {
- t.Errorf("#%d: err = %v, want %v", i, err, tt.werr)
- }
- }
- }
- // TestV3PutMissingLease ensures that a Put on a key with a bogus lease fails.
- func TestV3PutMissingLease(t *testing.T) {
- defer testutil.AfterTest(t)
- clus := NewClusterV3(t, &ClusterConfig{Size: 3})
- defer clus.Terminate(t)
- kvc := toGRPC(clus.RandClient()).KV
- key := []byte("foo")
- preq := &pb.PutRequest{Key: key, Lease: 123456}
- tests := []func(){
- // put case
- func() {
- if presp, err := kvc.Put(context.TODO(), preq); err == nil {
- t.Errorf("succeeded put key. req: %v. resp: %v", preq, presp)
- }
- },
- // txn success case
- func() {
- txn := &pb.TxnRequest{}
- txn.Success = append(txn.Success, &pb.RequestUnion{
- Request: &pb.RequestUnion_RequestPut{
- RequestPut: preq}})
- if tresp, err := kvc.Txn(context.TODO(), txn); err == nil {
- t.Errorf("succeeded txn success. req: %v. resp: %v", txn, tresp)
- }
- },
- // txn failure case
- func() {
- txn := &pb.TxnRequest{}
- txn.Failure = append(txn.Failure, &pb.RequestUnion{
- Request: &pb.RequestUnion_RequestPut{
- RequestPut: preq}})
- cmp := &pb.Compare{
- Result: pb.Compare_GREATER,
- Target: pb.Compare_CREATE,
- Key: []byte("bar"),
- }
- txn.Compare = append(txn.Compare, cmp)
- if tresp, err := kvc.Txn(context.TODO(), txn); err == nil {
- t.Errorf("succeeded txn failure. req: %v. resp: %v", txn, tresp)
- }
- },
- // ignore bad lease in failure on success txn
- func() {
- txn := &pb.TxnRequest{}
- rreq := &pb.RangeRequest{Key: []byte("bar")}
- txn.Success = append(txn.Success, &pb.RequestUnion{
- Request: &pb.RequestUnion_RequestRange{
- RequestRange: rreq}})
- txn.Failure = append(txn.Failure, &pb.RequestUnion{
- Request: &pb.RequestUnion_RequestPut{
- RequestPut: preq}})
- if tresp, err := kvc.Txn(context.TODO(), txn); err != nil {
- t.Errorf("failed good txn. req: %v. resp: %v", txn, tresp)
- }
- },
- }
- for i, f := range tests {
- f()
- // key shouldn't have been stored
- rreq := &pb.RangeRequest{Key: key}
- rresp, err := kvc.Range(context.TODO(), rreq)
- if err != nil {
- t.Errorf("#%d. could not rangereq (%v)", i, err)
- } else if len(rresp.Kvs) != 0 {
- t.Errorf("#%d. expected no keys, got %v", i, rresp)
- }
- }
- }
- // TestV3DeleteRange tests various edge cases in the DeleteRange API.
- func TestV3DeleteRange(t *testing.T) {
- defer testutil.AfterTest(t)
- tests := []struct {
- keySet []string
- begin string
- end string
- wantSet [][]byte
- deleted int64
- }{
- // delete middle
- {
- []string{"foo", "foo/abc", "fop"},
- "foo/", "fop",
- [][]byte{[]byte("foo"), []byte("fop")}, 1,
- },
- // no delete
- {
- []string{"foo", "foo/abc", "fop"},
- "foo/", "foo/",
- [][]byte{[]byte("foo"), []byte("foo/abc"), []byte("fop")}, 0,
- },
- // delete first
- {
- []string{"foo", "foo/abc", "fop"},
- "fo", "fop",
- [][]byte{[]byte("fop")}, 2,
- },
- // delete tail
- {
- []string{"foo", "foo/abc", "fop"},
- "foo/", "fos",
- [][]byte{[]byte("foo")}, 2,
- },
- // delete exact
- {
- []string{"foo", "foo/abc", "fop"},
- "foo/abc", "",
- [][]byte{[]byte("foo"), []byte("fop")}, 1,
- },
- // delete none, [x,x)
- {
- []string{"foo"},
- "foo", "foo",
- [][]byte{[]byte("foo")}, 0,
- },
- }
- for i, tt := range tests {
- clus := NewClusterV3(t, &ClusterConfig{Size: 3})
- kvc := toGRPC(clus.RandClient()).KV
- ks := tt.keySet
- for j := range ks {
- reqput := &pb.PutRequest{Key: []byte(ks[j]), Value: []byte{}}
- _, err := kvc.Put(context.TODO(), reqput)
- if err != nil {
- t.Fatalf("couldn't put key (%v)", err)
- }
- }
- dreq := &pb.DeleteRangeRequest{
- Key: []byte(tt.begin),
- RangeEnd: []byte(tt.end)}
- dresp, err := kvc.DeleteRange(context.TODO(), dreq)
- if err != nil {
- t.Fatalf("couldn't delete range on test %d (%v)", i, err)
- }
- if tt.deleted != dresp.Deleted {
- t.Errorf("expected %d on test %v, got %d", tt.deleted, i, dresp.Deleted)
- }
- rreq := &pb.RangeRequest{Key: []byte{0x0}, RangeEnd: []byte{0xff}}
- rresp, err := kvc.Range(context.TODO(), rreq)
- if err != nil {
- t.Errorf("couldn't get range on test %v (%v)", i, err)
- }
- if dresp.Header.Revision != rresp.Header.Revision {
- t.Errorf("expected revision %v, got %v",
- dresp.Header.Revision, rresp.Header.Revision)
- }
- keys := [][]byte{}
- for j := range rresp.Kvs {
- keys = append(keys, rresp.Kvs[j].Key)
- }
- if reflect.DeepEqual(tt.wantSet, keys) == false {
- t.Errorf("expected %v on test %v, got %v", tt.wantSet, i, keys)
- }
- // can't defer because tcp ports will be in use
- clus.Terminate(t)
- }
- }
- // TestV3TxnInvaildRange tests txn
- func TestV3TxnInvaildRange(t *testing.T) {
- defer testutil.AfterTest(t)
- clus := NewClusterV3(t, &ClusterConfig{Size: 3})
- defer clus.Terminate(t)
- kvc := toGRPC(clus.RandClient()).KV
- preq := &pb.PutRequest{Key: []byte("foo"), Value: []byte("bar")}
- for i := 0; i < 3; i++ {
- _, err := kvc.Put(context.Background(), preq)
- if err != nil {
- t.Fatalf("couldn't put key (%v)", err)
- }
- }
- _, err := kvc.Compact(context.Background(), &pb.CompactionRequest{Revision: 2})
- if err != nil {
- t.Fatalf("couldn't compact kv space (%v)", err)
- }
- // future rev
- txn := &pb.TxnRequest{}
- txn.Success = append(txn.Success, &pb.RequestUnion{
- Request: &pb.RequestUnion_RequestPut{
- RequestPut: preq}})
- rreq := &pb.RangeRequest{Key: []byte("foo"), Revision: 100}
- txn.Success = append(txn.Success, &pb.RequestUnion{
- Request: &pb.RequestUnion_RequestRange{
- RequestRange: rreq}})
- if _, err := kvc.Txn(context.TODO(), txn); err != rpctypes.ErrFutureRev {
- t.Errorf("err = %v, want %v", err, rpctypes.ErrFutureRev)
- }
- // compacted rev
- tv, _ := txn.Success[1].Request.(*pb.RequestUnion_RequestRange)
- tv.RequestRange.Revision = 1
- if _, err := kvc.Txn(context.TODO(), txn); err != rpctypes.ErrCompacted {
- t.Errorf("err = %v, want %v", err, rpctypes.ErrCompacted)
- }
- }
- func TestV3TooLargeRequest(t *testing.T) {
- defer testutil.AfterTest(t)
- clus := NewClusterV3(t, &ClusterConfig{Size: 3})
- defer clus.Terminate(t)
- kvc := toGRPC(clus.RandClient()).KV
- // 2MB request value
- largeV := make([]byte, 2*1024*1024)
- preq := &pb.PutRequest{Key: []byte("foo"), Value: largeV}
- _, err := kvc.Put(context.Background(), preq)
- if err != rpctypes.ErrRequestTooLarge {
- t.Errorf("err = %v, want %v", err, rpctypes.ErrRequestTooLarge)
- }
- }
- // TestV3Hash tests hash.
- func TestV3Hash(t *testing.T) {
- defer testutil.AfterTest(t)
- clus := NewClusterV3(t, &ClusterConfig{Size: 3})
- defer clus.Terminate(t)
- kvc := toGRPC(clus.RandClient()).KV
- preq := &pb.PutRequest{Key: []byte("foo"), Value: []byte("bar")}
- for i := 0; i < 3; i++ {
- _, err := kvc.Put(context.Background(), preq)
- if err != nil {
- t.Fatalf("couldn't put key (%v)", err)
- }
- }
- resp, err := kvc.Hash(context.Background(), &pb.HashRequest{})
- if err != nil || resp.Hash == 0 {
- t.Fatalf("couldn't hash (%v, hash %d)", err, resp.Hash)
- }
- }
- func TestV3RangeRequest(t *testing.T) {
- defer testutil.AfterTest(t)
- tests := []struct {
- putKeys []string
- reqs []pb.RangeRequest
- wresps [][]string
- wmores []bool
- }{
- // single key
- {
- []string{"foo", "bar"},
- []pb.RangeRequest{
- // exists
- {Key: []byte("foo")},
- // doesn't exist
- {Key: []byte("baz")},
- },
- [][]string{
- {"foo"},
- {},
- },
- []bool{false, false},
- },
- // multi-key
- {
- []string{"a", "b", "c", "d", "e"},
- []pb.RangeRequest{
- // all in range
- {Key: []byte("a"), RangeEnd: []byte("z")},
- // [b, d)
- {Key: []byte("b"), RangeEnd: []byte("d")},
- // out of range
- {Key: []byte("f"), RangeEnd: []byte("z")},
- // [c,c) = empty
- {Key: []byte("c"), RangeEnd: []byte("c")},
- // [d, b) = empty
- {Key: []byte("d"), RangeEnd: []byte("b")},
- // ["\0", "\0") => all in range
- {Key: []byte{0}, RangeEnd: []byte{0}},
- },
- [][]string{
- {"a", "b", "c", "d", "e"},
- {"b", "c"},
- {},
- {},
- {},
- {"a", "b", "c", "d", "e"},
- },
- []bool{false, false, false, false, false, false},
- },
- // revision
- {
- []string{"a", "b", "c", "d", "e"},
- []pb.RangeRequest{
- {Key: []byte("a"), RangeEnd: []byte("z"), Revision: 0},
- {Key: []byte("a"), RangeEnd: []byte("z"), Revision: 1},
- {Key: []byte("a"), RangeEnd: []byte("z"), Revision: 2},
- {Key: []byte("a"), RangeEnd: []byte("z"), Revision: 3},
- },
- [][]string{
- {"a", "b", "c", "d", "e"},
- {},
- {"a"},
- {"a", "b"},
- },
- []bool{false, false, false, false},
- },
- // limit
- {
- []string{"foo", "bar"},
- []pb.RangeRequest{
- // more
- {Key: []byte("a"), RangeEnd: []byte("z"), Limit: 1},
- // no more
- {Key: []byte("a"), RangeEnd: []byte("z"), Limit: 2},
- },
- [][]string{
- {"bar"},
- {"bar", "foo"},
- },
- []bool{true, false},
- },
- // sort
- {
- []string{"b", "a", "c", "d", "c"},
- []pb.RangeRequest{
- {
- Key: []byte("a"), RangeEnd: []byte("z"),
- Limit: 1,
- SortOrder: pb.RangeRequest_ASCEND,
- SortTarget: pb.RangeRequest_KEY,
- },
- {
- Key: []byte("a"), RangeEnd: []byte("z"),
- Limit: 1,
- SortOrder: pb.RangeRequest_DESCEND,
- SortTarget: pb.RangeRequest_KEY,
- },
- {
- Key: []byte("a"), RangeEnd: []byte("z"),
- Limit: 1,
- SortOrder: pb.RangeRequest_ASCEND,
- SortTarget: pb.RangeRequest_CREATE,
- },
- {
- Key: []byte("a"), RangeEnd: []byte("z"),
- Limit: 1,
- SortOrder: pb.RangeRequest_DESCEND,
- SortTarget: pb.RangeRequest_MOD,
- },
- {
- Key: []byte("z"), RangeEnd: []byte("z"),
- Limit: 1,
- SortOrder: pb.RangeRequest_DESCEND,
- SortTarget: pb.RangeRequest_CREATE,
- },
- },
- [][]string{
- {"a"},
- {"d"},
- {"b"},
- {"c"},
- {},
- },
- []bool{true, true, true, true, false},
- },
- }
- for i, tt := range tests {
- clus := NewClusterV3(t, &ClusterConfig{Size: 3})
- for _, k := range tt.putKeys {
- kvc := toGRPC(clus.RandClient()).KV
- req := &pb.PutRequest{Key: []byte(k), Value: []byte("bar")}
- if _, err := kvc.Put(context.TODO(), req); err != nil {
- t.Fatalf("#%d: couldn't put key (%v)", i, err)
- }
- }
- for j, req := range tt.reqs {
- kvc := toGRPC(clus.RandClient()).KV
- resp, err := kvc.Range(context.TODO(), &req)
- if err != nil {
- t.Errorf("#%d.%d: Range error: %v", i, j, err)
- continue
- }
- if len(resp.Kvs) != len(tt.wresps[j]) {
- t.Errorf("#%d.%d: bad len(resp.Kvs). got = %d, want = %d, ", i, j, len(resp.Kvs), len(tt.wresps[j]))
- continue
- }
- for k, wKey := range tt.wresps[j] {
- respKey := string(resp.Kvs[k].Key)
- if respKey != wKey {
- t.Errorf("#%d.%d: key[%d]. got = %v, want = %v, ", i, j, k, respKey, wKey)
- }
- }
- if resp.More != tt.wmores[j] {
- t.Errorf("#%d.%d: bad more. got = %v, want = %v, ", i, j, resp.More, tt.wmores[j])
- }
- wrev := int64(len(tt.putKeys) + 1)
- if resp.Header.Revision != wrev {
- t.Errorf("#%d.%d: bad header revision. got = %d. want = %d", i, j, resp.Header.Revision, wrev)
- }
- }
- clus.Terminate(t)
- }
- }
- func newClusterV3NoClients(t *testing.T, cfg *ClusterConfig) *ClusterV3 {
- cfg.UseV3 = true
- cfg.UseGRPC = true
- clus := &ClusterV3{cluster: NewClusterByConfig(t, cfg)}
- clus.Launch(t)
- return clus
- }
- // TestTLSGRPCRejectInsecureClient checks that connection is rejected if server is TLS but not client.
- func TestTLSGRPCRejectInsecureClient(t *testing.T) {
- defer testutil.AfterTest(t)
- cfg := ClusterConfig{Size: 3, ClientTLS: &testTLSInfo}
- clus := newClusterV3NoClients(t, &cfg)
- defer clus.Terminate(t)
- // nil out TLS field so client will use an insecure connection
- clus.Members[0].ClientTLSInfo = nil
- client, err := NewClientV3(clus.Members[0])
- if err != nil && err != grpc.ErrClientConnTimeout {
- t.Fatalf("unexpected error (%v)", err)
- } else if client == nil {
- // Ideally, no client would be returned. However, grpc will
- // return a connection without trying to handshake first so
- // the connection appears OK.
- return
- }
- defer client.Close()
- ctx, cancel := context.WithTimeout(context.TODO(), 5*time.Second)
- conn := client.ActiveConnection()
- st, err := conn.State()
- if err != nil {
- t.Fatal(err)
- } else if st != grpc.Ready {
- t.Fatalf("expected Ready, got %v", st)
- }
- // rpc will fail to handshake, triggering a connection state change
- donec := make(chan error, 1)
- go func() {
- reqput := &pb.PutRequest{Key: []byte("foo"), Value: []byte("bar")}
- _, perr := toGRPC(client).KV.Put(ctx, reqput)
- donec <- perr
- }()
- st, err = conn.WaitForStateChange(ctx, st)
- if err != nil {
- t.Fatalf("unexpected error waiting for change (%v)", err)
- } else if st == grpc.Ready {
- t.Fatalf("expected failure state, got %v", st)
- }
- cancel()
- if perr := <-donec; perr == nil {
- t.Fatalf("expected client error on put")
- }
- }
- // TestTLSGRPCRejectSecureClient checks that connection is rejected if client is TLS but not server.
- func TestTLSGRPCRejectSecureClient(t *testing.T) {
- defer testutil.AfterTest(t)
- cfg := ClusterConfig{Size: 3}
- clus := newClusterV3NoClients(t, &cfg)
- defer clus.Terminate(t)
- clus.Members[0].ClientTLSInfo = &testTLSInfo
- client, err := NewClientV3(clus.Members[0])
- if client != nil || err == nil {
- t.Fatalf("expected no client")
- } else if err != grpc.ErrClientConnTimeout {
- t.Fatalf("unexpected error (%v)", err)
- }
- }
- // TestTLSGRPCAcceptSecureAll checks that connection is accepted if both client and server are TLS
- func TestTLSGRPCAcceptSecureAll(t *testing.T) {
- defer testutil.AfterTest(t)
- cfg := ClusterConfig{Size: 3, ClientTLS: &testTLSInfo}
- clus := newClusterV3NoClients(t, &cfg)
- defer clus.Terminate(t)
- client, err := NewClientV3(clus.Members[0])
- if err != nil {
- t.Fatalf("expected tls client (%v)", err)
- }
- defer client.Close()
- reqput := &pb.PutRequest{Key: []byte("foo"), Value: []byte("bar")}
- if _, err := toGRPC(client).KV.Put(context.TODO(), reqput); err != nil {
- t.Fatalf("unexpected error on put over tls (%v)", err)
- }
- }
|