mirror of
https://github.com/etcd-io/etcd.git
synced 2024-09-27 06:25:44 +00:00
Merge pull request #14574 from veshij/main
etcdserver: call refreshRangePermCache on Recover() in AuthStore.
This commit is contained in:
commit
1570dc9c43
@ -131,6 +131,8 @@ func (as *authStore) refreshRangePermCache(tx AuthReadTx) {
|
|||||||
as.rangePermCacheMu.Lock()
|
as.rangePermCacheMu.Lock()
|
||||||
defer as.rangePermCacheMu.Unlock()
|
defer as.rangePermCacheMu.Unlock()
|
||||||
|
|
||||||
|
as.lg.Debug("Refreshing rangePermCache")
|
||||||
|
|
||||||
as.rangePermCache = make(map[string]*unifiedRangePermissions)
|
as.rangePermCache = make(map[string]*unifiedRangePermissions)
|
||||||
|
|
||||||
users := tx.UnsafeGetAllUsers()
|
users := tx.UnsafeGetAllUsers()
|
||||||
|
@ -386,6 +386,7 @@ func (as *authStore) Recover(be AuthBackend) {
|
|||||||
|
|
||||||
enabled := tx.UnsafeReadAuthEnabled()
|
enabled := tx.UnsafeReadAuthEnabled()
|
||||||
as.setRevision(tx.UnsafeReadAuthRevision())
|
as.setRevision(tx.UnsafeReadAuthRevision())
|
||||||
|
as.refreshRangePermCache(tx)
|
||||||
|
|
||||||
tx.Unlock()
|
tx.Unlock()
|
||||||
|
|
||||||
|
125
tests/e2e/ctl_v3_auth_cluster_test.go
Normal file
125
tests/e2e/ctl_v3_auth_cluster_test.go
Normal file
@ -0,0 +1,125 @@
|
|||||||
|
// Copyright 2022 The etcd Authors
|
||||||
|
//
|
||||||
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
// you may not use this file except in compliance with the License.
|
||||||
|
// You may obtain a copy of the License at
|
||||||
|
//
|
||||||
|
// http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
//
|
||||||
|
// Unless required by applicable law or agreed to in writing, software
|
||||||
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
// See the License for the specific language governing permissions and
|
||||||
|
// limitations under the License.
|
||||||
|
|
||||||
|
package e2e
|
||||||
|
|
||||||
|
import (
|
||||||
|
"context"
|
||||||
|
"fmt"
|
||||||
|
"testing"
|
||||||
|
"time"
|
||||||
|
|
||||||
|
"github.com/stretchr/testify/assert"
|
||||||
|
|
||||||
|
clientv3 "go.etcd.io/etcd/client/v3"
|
||||||
|
"go.etcd.io/etcd/tests/v3/framework/config"
|
||||||
|
"go.etcd.io/etcd/tests/v3/framework/e2e"
|
||||||
|
)
|
||||||
|
|
||||||
|
func TestAuthCluster(t *testing.T) {
|
||||||
|
e2e.BeforeTest(t)
|
||||||
|
cfg := &e2e.EtcdProcessClusterConfig{
|
||||||
|
ClusterSize: 1,
|
||||||
|
InitialToken: "new",
|
||||||
|
SnapshotCount: 2,
|
||||||
|
}
|
||||||
|
ctx, cancel := context.WithCancel(context.Background())
|
||||||
|
defer cancel()
|
||||||
|
|
||||||
|
epc, err := e2e.NewEtcdProcessCluster(ctx, t, cfg)
|
||||||
|
if err != nil {
|
||||||
|
t.Fatalf("could not start etcd process cluster (%v)", err)
|
||||||
|
}
|
||||||
|
defer func() {
|
||||||
|
if err := epc.Close(); err != nil {
|
||||||
|
t.Fatalf("could not close test cluster (%v)", err)
|
||||||
|
}
|
||||||
|
}()
|
||||||
|
|
||||||
|
epcClient := epc.Client()
|
||||||
|
createUsers(ctx, t, epcClient)
|
||||||
|
|
||||||
|
if err := epcClient.AuthEnable(ctx); err != nil {
|
||||||
|
t.Fatalf("could not enable Auth: (%v)", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
testUserClientOpts := e2e.WithAuth("test", "testPassword")
|
||||||
|
rootUserClientOpts := e2e.WithAuth("root", "rootPassword")
|
||||||
|
|
||||||
|
// write more than SnapshotCount keys to single leader to make sure snapshot is created
|
||||||
|
for i := 0; i <= 10; i++ {
|
||||||
|
if err := epc.Client(testUserClientOpts).Put(ctx, fmt.Sprintf("/test/%d", i), "test", config.PutOptions{}); err != nil {
|
||||||
|
t.Fatalf("failed to Put (%v)", err)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// start second process
|
||||||
|
if err := epc.StartNewProc(ctx, t, rootUserClientOpts); err != nil {
|
||||||
|
t.Fatalf("could not start second etcd process (%v)", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
// make sure writes to both endpoints are successful
|
||||||
|
endpoints := epc.EndpointsV3()
|
||||||
|
assert.Equal(t, len(endpoints), 2)
|
||||||
|
for _, endpoint := range epc.EndpointsV3() {
|
||||||
|
if err := epc.Client(testUserClientOpts, e2e.WithEndpoints([]string{endpoint})).Put(ctx, "/test/key", endpoint, config.PutOptions{}); err != nil {
|
||||||
|
t.Fatalf("failed to write to Put to %q (%v)", endpoint, err)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// verify all nodes have exact same revision and hash
|
||||||
|
assert.Eventually(t, func() bool {
|
||||||
|
hashKvs, err := epc.Client(rootUserClientOpts).HashKV(ctx, 0)
|
||||||
|
if err != nil {
|
||||||
|
t.Logf("failed to get HashKV: %v", err)
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
if len(hashKvs) != 2 {
|
||||||
|
t.Logf("not exactly 2 hashkv responses returned: %d", len(hashKvs))
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
if hashKvs[0].Header.Revision != hashKvs[1].Header.Revision {
|
||||||
|
t.Logf("The two members' revision (%d, %d) are not equal", hashKvs[0].Header.Revision, hashKvs[1].Header.Revision)
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
assert.Equal(t, hashKvs[0].Hash, hashKvs[1].Hash)
|
||||||
|
return true
|
||||||
|
}, time.Second*5, time.Millisecond*100)
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
|
func createUsers(ctx context.Context, t *testing.T, client *e2e.EtcdctlV3) {
|
||||||
|
if _, err := client.UserAdd(ctx, "root", "rootPassword", config.UserAddOptions{}); err != nil {
|
||||||
|
t.Fatalf("could not add root user (%v)", err)
|
||||||
|
}
|
||||||
|
if _, err := client.RoleAdd(ctx, "root"); err != nil {
|
||||||
|
t.Fatalf("could not create 'root' role (%v)", err)
|
||||||
|
}
|
||||||
|
if _, err := client.UserGrantRole(ctx, "root", "root"); err != nil {
|
||||||
|
t.Fatalf("could not grant root role to root user (%v)", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
if _, err := client.RoleAdd(ctx, "test"); err != nil {
|
||||||
|
t.Fatalf("could not create 'test' role (%v)", err)
|
||||||
|
}
|
||||||
|
if _, err := client.RoleGrantPermission(ctx, "test", "/test/", "/test0", clientv3.PermissionType(clientv3.PermReadWrite)); err != nil {
|
||||||
|
t.Fatalf("could not RoleGrantPermission (%v)", err)
|
||||||
|
}
|
||||||
|
if _, err := client.UserAdd(ctx, "test", "testPassword", config.UserAddOptions{}); err != nil {
|
||||||
|
t.Fatalf("could not add user test (%v)", err)
|
||||||
|
}
|
||||||
|
if _, err := client.UserGrantRole(ctx, "test", "test"); err != nil {
|
||||||
|
t.Fatalf("could not grant test role user (%v)", err)
|
||||||
|
}
|
||||||
|
}
|
@ -30,6 +30,7 @@ import (
|
|||||||
"go.etcd.io/etcd/api/v3/etcdserverpb"
|
"go.etcd.io/etcd/api/v3/etcdserverpb"
|
||||||
"go.etcd.io/etcd/api/v3/v3rpc/rpctypes"
|
"go.etcd.io/etcd/api/v3/v3rpc/rpctypes"
|
||||||
"go.etcd.io/etcd/server/v3/etcdserver"
|
"go.etcd.io/etcd/server/v3/etcdserver"
|
||||||
|
"go.etcd.io/etcd/tests/v3/framework/config"
|
||||||
)
|
)
|
||||||
|
|
||||||
const EtcdProcessBasePort = 20000
|
const EtcdProcessBasePort = 20000
|
||||||
@ -473,7 +474,7 @@ func (epc *EtcdProcessCluster) Endpoints(f func(ep EtcdProcess) []string) (ret [
|
|||||||
return ret
|
return ret
|
||||||
}
|
}
|
||||||
|
|
||||||
func (epc *EtcdProcessCluster) CloseProc(ctx context.Context, finder func(EtcdProcess) bool) error {
|
func (epc *EtcdProcessCluster) CloseProc(ctx context.Context, finder func(EtcdProcess) bool, opts ...config.ClientOption) error {
|
||||||
procIndex := -1
|
procIndex := -1
|
||||||
for i := range epc.Procs {
|
for i := range epc.Procs {
|
||||||
if finder(epc.Procs[i]) {
|
if finder(epc.Procs[i]) {
|
||||||
@ -495,7 +496,7 @@ func (epc *EtcdProcessCluster) CloseProc(ctx context.Context, finder func(EtcdPr
|
|||||||
|
|
||||||
// First remove member from the cluster
|
// First remove member from the cluster
|
||||||
|
|
||||||
memberCtl := epc.Client()
|
memberCtl := epc.Client(opts...)
|
||||||
memberList, err := memberCtl.MemberList(ctx)
|
memberList, err := memberCtl.MemberList(ctx)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return fmt.Errorf("failed to get member list: %w", err)
|
return fmt.Errorf("failed to get member list: %w", err)
|
||||||
@ -522,7 +523,7 @@ func (epc *EtcdProcessCluster) CloseProc(ctx context.Context, finder func(EtcdPr
|
|||||||
return proc.Close()
|
return proc.Close()
|
||||||
}
|
}
|
||||||
|
|
||||||
func (epc *EtcdProcessCluster) StartNewProc(ctx context.Context, tb testing.TB) error {
|
func (epc *EtcdProcessCluster) StartNewProc(ctx context.Context, tb testing.TB, opts ...config.ClientOption) error {
|
||||||
serverCfg := epc.Cfg.EtcdServerProcessConfig(tb, epc.nextSeq)
|
serverCfg := epc.Cfg.EtcdServerProcessConfig(tb, epc.nextSeq)
|
||||||
epc.nextSeq++
|
epc.nextSeq++
|
||||||
|
|
||||||
@ -536,7 +537,7 @@ func (epc *EtcdProcessCluster) StartNewProc(ctx context.Context, tb testing.TB)
|
|||||||
epc.Cfg.SetInitialOrDiscovery(serverCfg, initialCluster, "existing")
|
epc.Cfg.SetInitialOrDiscovery(serverCfg, initialCluster, "existing")
|
||||||
|
|
||||||
// First add new member to cluster
|
// First add new member to cluster
|
||||||
memberCtl := epc.Client()
|
memberCtl := epc.Client(opts...)
|
||||||
_, err := memberCtl.MemberAdd(ctx, serverCfg.Name, []string{serverCfg.Purl.String()})
|
_, err := memberCtl.MemberAdd(ctx, serverCfg.Name, []string{serverCfg.Purl.String()})
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return fmt.Errorf("failed to add new member: %w", err)
|
return fmt.Errorf("failed to add new member: %w", err)
|
||||||
@ -612,8 +613,8 @@ func (epc *EtcdProcessCluster) Stop() (err error) {
|
|||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
|
|
||||||
func (epc *EtcdProcessCluster) Client() *EtcdctlV3 {
|
func (epc *EtcdProcessCluster) Client(opts ...config.ClientOption) *EtcdctlV3 {
|
||||||
etcdctl, err := NewEtcdctl(epc.Cfg, epc.EndpointsV3())
|
etcdctl, err := NewEtcdctl(epc.Cfg, epc.EndpointsV3(), opts...)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
panic(err)
|
panic(err)
|
||||||
}
|
}
|
||||||
|
@ -72,6 +72,13 @@ func WithAuth(userName, password string) config.ClientOption {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func WithEndpoints(endpoints []string) config.ClientOption {
|
||||||
|
return func(c any) {
|
||||||
|
ctl := c.(*EtcdctlV3)
|
||||||
|
ctl.endpoints = endpoints
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
func (ctl *EtcdctlV3) DowngradeEnable(ctx context.Context, version string) error {
|
func (ctl *EtcdctlV3) DowngradeEnable(ctx context.Context, version string) error {
|
||||||
_, err := SpawnWithExpectLines(ctx, ctl.cmdArgs("downgrade", "enable", version), nil, "Downgrade enable success")
|
_, err := SpawnWithExpectLines(ctx, ctl.cmdArgs("downgrade", "enable", version), nil, "Downgrade enable success")
|
||||||
return err
|
return err
|
||||||
|
Loading…
x
Reference in New Issue
Block a user