mirror of
https://github.com/etcd-io/etcd.git
synced 2024-09-27 06:25:44 +00:00
contrib/recipes: add election and double barrier recipes
these recipes rely on leases so they weren't included in the last batch
This commit is contained in:
parent
163812246f
commit
6f0cc54541
@ -23,8 +23,9 @@ import (
|
|||||||
)
|
)
|
||||||
|
|
||||||
var (
|
var (
|
||||||
ErrKeyExists = errors.New("key already exists")
|
ErrKeyExists = errors.New("key already exists")
|
||||||
ErrWaitMismatch = errors.New("unexpected wait result")
|
ErrWaitMismatch = errors.New("unexpected wait result")
|
||||||
|
ErrTooManyClients = errors.New("too many clients")
|
||||||
)
|
)
|
||||||
|
|
||||||
// deleteRevKey deletes a key by revision, returning false if key is missing
|
// deleteRevKey deletes a key by revision, returning false if key is missing
|
||||||
|
126
contrib/recipes/double_barrier.go
Normal file
126
contrib/recipes/double_barrier.go
Normal file
@ -0,0 +1,126 @@
|
|||||||
|
// Copyright 2016 CoreOS, Inc.
|
||||||
|
//
|
||||||
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
// you may not use this file except in compliance with the License.
|
||||||
|
// You may obtain a copy of the License at
|
||||||
|
//
|
||||||
|
// http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
//
|
||||||
|
// Unless required by applicable law or agreed to in writing, software
|
||||||
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
// See the License for the specific language governing permissions and
|
||||||
|
// limitations under the License.
|
||||||
|
|
||||||
|
package recipe
|
||||||
|
|
||||||
|
import (
|
||||||
|
"github.com/coreos/etcd/Godeps/_workspace/src/golang.org/x/net/context"
|
||||||
|
"github.com/coreos/etcd/clientv3"
|
||||||
|
pb "github.com/coreos/etcd/etcdserver/etcdserverpb"
|
||||||
|
"github.com/coreos/etcd/storage/storagepb"
|
||||||
|
)
|
||||||
|
|
||||||
|
// DoubleBarrier blocks processes on Enter until an expected count enters, then
|
||||||
|
// blocks again on Leave until all processes have left.
|
||||||
|
type DoubleBarrier struct {
|
||||||
|
client *clientv3.Client
|
||||||
|
key string // key for the collective barrier
|
||||||
|
count int
|
||||||
|
myKey *EphemeralKV // current key for this process on the barrier
|
||||||
|
}
|
||||||
|
|
||||||
|
func NewDoubleBarrier(client *clientv3.Client, key string, count int) *DoubleBarrier {
|
||||||
|
return &DoubleBarrier{client, key, count, nil}
|
||||||
|
}
|
||||||
|
|
||||||
|
// Enter waits for "count" processes to enter the barrier then returns
|
||||||
|
func (b *DoubleBarrier) Enter() error {
|
||||||
|
ek, err := NewUniqueEphemeralKey(b.client, b.key+"/waiters")
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
b.myKey = ek
|
||||||
|
|
||||||
|
resp, err := NewRange(b.client, b.key+"/waiters").Prefix()
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
if len(resp.Kvs) > b.count {
|
||||||
|
return ErrTooManyClients
|
||||||
|
}
|
||||||
|
|
||||||
|
if len(resp.Kvs) == b.count {
|
||||||
|
// unblock waiters
|
||||||
|
_, err = putEmptyKey(b.client.KV, b.key+"/ready")
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
_, err = WaitEvents(
|
||||||
|
b.client,
|
||||||
|
b.key+"/ready",
|
||||||
|
resp.Header.Revision,
|
||||||
|
[]storagepb.Event_EventType{storagepb.PUT})
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
// Leave waits for "count" processes to leave the barrier then returns
|
||||||
|
func (b *DoubleBarrier) Leave() error {
|
||||||
|
resp, err := NewRange(b.client, b.key+"/waiters").Prefix()
|
||||||
|
if len(resp.Kvs) == 0 {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
lowest, highest := resp.Kvs[0], resp.Kvs[0]
|
||||||
|
for _, k := range resp.Kvs {
|
||||||
|
if k.ModRevision < lowest.ModRevision {
|
||||||
|
lowest = k
|
||||||
|
}
|
||||||
|
if k.ModRevision > highest.ModRevision {
|
||||||
|
highest = k
|
||||||
|
}
|
||||||
|
}
|
||||||
|
isLowest := string(lowest.Key) == b.myKey.Key()
|
||||||
|
|
||||||
|
if len(resp.Kvs) == 1 {
|
||||||
|
// this is the only node in the barrier; finish up
|
||||||
|
req := &pb.DeleteRangeRequest{Key: []byte(b.key + "/ready")}
|
||||||
|
if _, err = b.client.KV.DeleteRange(context.TODO(), req); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
return b.myKey.Delete()
|
||||||
|
}
|
||||||
|
|
||||||
|
// this ensures that if a process fails, the ephemeral lease will be
|
||||||
|
// revoked, its barrier key is removed, and the barrier can resume
|
||||||
|
|
||||||
|
// lowest process in node => wait on highest process
|
||||||
|
if isLowest {
|
||||||
|
_, err = WaitEvents(
|
||||||
|
b.client,
|
||||||
|
string(highest.Key),
|
||||||
|
resp.Header.Revision,
|
||||||
|
[]storagepb.Event_EventType{storagepb.DELETE})
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
return b.Leave()
|
||||||
|
}
|
||||||
|
|
||||||
|
// delete self and wait on lowest process
|
||||||
|
if err := b.myKey.Delete(); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
key := string(lowest.Key)
|
||||||
|
_, err = WaitEvents(
|
||||||
|
b.client,
|
||||||
|
key,
|
||||||
|
resp.Header.Revision,
|
||||||
|
[]storagepb.Event_EventType{storagepb.DELETE})
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
return b.Leave()
|
||||||
|
}
|
108
contrib/recipes/election.go
Normal file
108
contrib/recipes/election.go
Normal file
@ -0,0 +1,108 @@
|
|||||||
|
// Copyright 2016 CoreOS, Inc.
|
||||||
|
//
|
||||||
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
// you may not use this file except in compliance with the License.
|
||||||
|
// You may obtain a copy of the License at
|
||||||
|
//
|
||||||
|
// http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
//
|
||||||
|
// Unless required by applicable law or agreed to in writing, software
|
||||||
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
// See the License for the specific language governing permissions and
|
||||||
|
// limitations under the License.
|
||||||
|
package recipe
|
||||||
|
|
||||||
|
import (
|
||||||
|
"github.com/coreos/etcd/clientv3"
|
||||||
|
"github.com/coreos/etcd/etcdserver"
|
||||||
|
"github.com/coreos/etcd/storage/storagepb"
|
||||||
|
)
|
||||||
|
|
||||||
|
type Election struct {
|
||||||
|
client *clientv3.Client
|
||||||
|
keyPrefix string
|
||||||
|
leaderKey *EphemeralKV
|
||||||
|
}
|
||||||
|
|
||||||
|
// NewElection returns a new election on a given key prefix.
|
||||||
|
func NewElection(client *clientv3.Client, keyPrefix string) *Election {
|
||||||
|
return &Election{client, keyPrefix, nil}
|
||||||
|
}
|
||||||
|
|
||||||
|
// Volunteer puts a value as elegible for the election. It blocks until
|
||||||
|
// it is elected or an error occurs (cannot withdraw candidacy)
|
||||||
|
func (e *Election) Volunteer(val string) error {
|
||||||
|
if e.leaderKey != nil {
|
||||||
|
return e.leaderKey.Put(val)
|
||||||
|
}
|
||||||
|
myKey, err := NewUniqueEphemeralKV(e.client, e.keyPrefix, val)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
if err = e.waitLeadership(myKey); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
e.leaderKey = myKey
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// Resign lets a leader start a new election.
|
||||||
|
func (e *Election) Resign() (err error) {
|
||||||
|
if e.leaderKey != nil {
|
||||||
|
err = e.leaderKey.Delete()
|
||||||
|
e.leaderKey = nil
|
||||||
|
}
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
// Leader returns the leader value for the current election.
|
||||||
|
func (e *Election) Leader() (string, error) {
|
||||||
|
resp, err := NewRange(e.client, e.keyPrefix).FirstCreate()
|
||||||
|
if err != nil {
|
||||||
|
return "", err
|
||||||
|
} else if len(resp.Kvs) == 0 {
|
||||||
|
// no leader currently elected
|
||||||
|
return "", etcdserver.ErrNoLeader
|
||||||
|
}
|
||||||
|
return string(resp.Kvs[0].Value), nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// Wait waits for a leader to be elected, returning the leader value.
|
||||||
|
func (e *Election) Wait() (string, error) {
|
||||||
|
resp, err := NewRange(e.client, e.keyPrefix).FirstCreate()
|
||||||
|
if err != nil {
|
||||||
|
return "", err
|
||||||
|
} else if len(resp.Kvs) != 0 {
|
||||||
|
// leader already exists
|
||||||
|
return string(resp.Kvs[0].Value), nil
|
||||||
|
}
|
||||||
|
_, err = WaitPrefixEvents(
|
||||||
|
e.client,
|
||||||
|
e.keyPrefix,
|
||||||
|
resp.Header.Revision,
|
||||||
|
[]storagepb.Event_EventType{storagepb.PUT})
|
||||||
|
if err != nil {
|
||||||
|
return "", err
|
||||||
|
}
|
||||||
|
return e.Wait()
|
||||||
|
}
|
||||||
|
|
||||||
|
func (e *Election) waitLeadership(tryKey *EphemeralKV) error {
|
||||||
|
resp, err := NewRangeRev(
|
||||||
|
e.client,
|
||||||
|
e.keyPrefix,
|
||||||
|
tryKey.Revision()-1).LastCreate()
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
} else if len(resp.Kvs) == 0 {
|
||||||
|
// nothing before tryKey => have leadership
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
_, err = WaitEvents(
|
||||||
|
e.client,
|
||||||
|
string(resp.Kvs[0].Key),
|
||||||
|
tryKey.Revision(),
|
||||||
|
[]storagepb.Event_EventType{storagepb.DELETE})
|
||||||
|
return err
|
||||||
|
}
|
@ -197,3 +197,36 @@ func (rk *RemoteKV) Put(val string) error {
|
|||||||
_, err := rk.client.KV.Put(context.TODO(), req)
|
_, err := rk.client.KV.Put(context.TODO(), req)
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// EphemeralKV is a new key associated with a session lease
|
||||||
|
type EphemeralKV struct{ RemoteKV }
|
||||||
|
|
||||||
|
// NewEphemeralKV creates a new key/value pair associated with a session lease
|
||||||
|
func NewEphemeralKV(client *clientv3.Client, key, val string) (*EphemeralKV, error) {
|
||||||
|
leaseID, err := SessionLease(client)
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
k, err := NewKV(client, key, val, leaseID)
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
return &EphemeralKV{*k}, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// NewEphemeralKey creates a new unique valueless key associated with a session lease
|
||||||
|
func NewUniqueEphemeralKey(client *clientv3.Client, prefix string) (*EphemeralKV, error) {
|
||||||
|
return NewUniqueEphemeralKV(client, prefix, "")
|
||||||
|
}
|
||||||
|
|
||||||
|
// NewEphemeralKV creates a new unique key/value pair associated with a session lease
|
||||||
|
func NewUniqueEphemeralKV(client *clientv3.Client, prefix, val string) (ek *EphemeralKV, err error) {
|
||||||
|
for {
|
||||||
|
newKey := fmt.Sprintf("%s/%v", prefix, time.Now().UnixNano())
|
||||||
|
ek, err = NewEphemeralKV(client, newKey, val)
|
||||||
|
if err == nil || err != ErrKeyExists {
|
||||||
|
break
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return ek, err
|
||||||
|
}
|
||||||
|
129
contrib/recipes/lease.go
Normal file
129
contrib/recipes/lease.go
Normal file
@ -0,0 +1,129 @@
|
|||||||
|
// Copyright 2016 CoreOS, Inc.
|
||||||
|
//
|
||||||
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
// you may not use this file except in compliance with the License.
|
||||||
|
// You may obtain a copy of the License at
|
||||||
|
//
|
||||||
|
// http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
//
|
||||||
|
// Unless required by applicable law or agreed to in writing, software
|
||||||
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
// See the License for the specific language governing permissions and
|
||||||
|
// limitations under the License.
|
||||||
|
package recipe
|
||||||
|
|
||||||
|
import (
|
||||||
|
"sync"
|
||||||
|
"time"
|
||||||
|
|
||||||
|
"github.com/coreos/etcd/Godeps/_workspace/src/golang.org/x/net/context"
|
||||||
|
"github.com/coreos/etcd/clientv3"
|
||||||
|
pb "github.com/coreos/etcd/etcdserver/etcdserverpb"
|
||||||
|
"github.com/coreos/etcd/lease"
|
||||||
|
)
|
||||||
|
|
||||||
|
// only keep one ephemeral lease per clientection
|
||||||
|
var clientLeases clientLeaseMgr = clientLeaseMgr{leases: make(map[*clientv3.Client]*leaseKeepAlive)}
|
||||||
|
|
||||||
|
type clientLeaseMgr struct {
|
||||||
|
leases map[*clientv3.Client]*leaseKeepAlive
|
||||||
|
mu sync.Mutex
|
||||||
|
}
|
||||||
|
|
||||||
|
type leaseKeepAlive struct {
|
||||||
|
id lease.LeaseID
|
||||||
|
donec chan struct{}
|
||||||
|
}
|
||||||
|
|
||||||
|
func SessionLease(client *clientv3.Client) (lease.LeaseID, error) {
|
||||||
|
return clientLeases.sessionLease(client, 120)
|
||||||
|
}
|
||||||
|
|
||||||
|
func SessionLeaseTTL(client *clientv3.Client, ttl int64) (lease.LeaseID, error) {
|
||||||
|
return clientLeases.sessionLease(client, ttl)
|
||||||
|
}
|
||||||
|
|
||||||
|
// StopSessionLease ends the refresh for the session lease. This is useful
|
||||||
|
// in case the state of the client clientection is indeterminate (revoke
|
||||||
|
// would fail) or if transferring lease ownership.
|
||||||
|
func StopSessionLease(client *clientv3.Client) {
|
||||||
|
clientLeases.mu.Lock()
|
||||||
|
lka, ok := clientLeases.leases[client]
|
||||||
|
if ok {
|
||||||
|
delete(clientLeases.leases, client)
|
||||||
|
}
|
||||||
|
clientLeases.mu.Unlock()
|
||||||
|
if lka != nil {
|
||||||
|
lka.donec <- struct{}{}
|
||||||
|
<-lka.donec
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// RevokeSessionLease revokes the session lease.
|
||||||
|
func RevokeSessionLease(client *clientv3.Client) (err error) {
|
||||||
|
clientLeases.mu.Lock()
|
||||||
|
lka := clientLeases.leases[client]
|
||||||
|
clientLeases.mu.Unlock()
|
||||||
|
StopSessionLease(client)
|
||||||
|
if lka != nil {
|
||||||
|
req := &pb.LeaseRevokeRequest{ID: int64(lka.id)}
|
||||||
|
_, err = client.Lease.LeaseRevoke(context.TODO(), req)
|
||||||
|
}
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
func (clm *clientLeaseMgr) sessionLease(client *clientv3.Client, ttl int64) (lease.LeaseID, error) {
|
||||||
|
clm.mu.Lock()
|
||||||
|
defer clm.mu.Unlock()
|
||||||
|
if lka, ok := clm.leases[client]; ok {
|
||||||
|
return lka.id, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
resp, err := client.Lease.LeaseCreate(context.TODO(), &pb.LeaseCreateRequest{TTL: ttl})
|
||||||
|
if err != nil {
|
||||||
|
return lease.NoLease, err
|
||||||
|
}
|
||||||
|
id := lease.LeaseID(resp.ID)
|
||||||
|
|
||||||
|
ctx, cancel := context.WithCancel(context.Background())
|
||||||
|
keepAlive, err := client.Lease.LeaseKeepAlive(ctx)
|
||||||
|
if err != nil || keepAlive == nil {
|
||||||
|
return lease.NoLease, err
|
||||||
|
}
|
||||||
|
|
||||||
|
lka := &leaseKeepAlive{id: id, donec: make(chan struct{})}
|
||||||
|
clm.leases[client] = lka
|
||||||
|
|
||||||
|
// keep the lease alive until clientection error
|
||||||
|
go func() {
|
||||||
|
defer func() {
|
||||||
|
keepAlive.CloseSend()
|
||||||
|
clm.mu.Lock()
|
||||||
|
delete(clm.leases, client)
|
||||||
|
clm.mu.Unlock()
|
||||||
|
cancel()
|
||||||
|
close(lka.donec)
|
||||||
|
}()
|
||||||
|
|
||||||
|
ttl := resp.TTL
|
||||||
|
for {
|
||||||
|
lreq := &pb.LeaseKeepAliveRequest{ID: int64(id)}
|
||||||
|
select {
|
||||||
|
case <-lka.donec:
|
||||||
|
return
|
||||||
|
case <-time.After(time.Duration(ttl/2) * time.Second):
|
||||||
|
}
|
||||||
|
if err := keepAlive.Send(lreq); err != nil {
|
||||||
|
break
|
||||||
|
}
|
||||||
|
resp, err := keepAlive.Recv()
|
||||||
|
if err != nil {
|
||||||
|
break
|
||||||
|
}
|
||||||
|
ttl = resp.TTL
|
||||||
|
}
|
||||||
|
}()
|
||||||
|
|
||||||
|
return id, nil
|
||||||
|
}
|
129
integration/v3_double_barrier_test.go
Normal file
129
integration/v3_double_barrier_test.go
Normal file
@ -0,0 +1,129 @@
|
|||||||
|
// Copyright 2016 CoreOS, Inc.
|
||||||
|
//
|
||||||
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
// you may not use this file except in compliance with the License.
|
||||||
|
// You may obtain a copy of the License at
|
||||||
|
//
|
||||||
|
// http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
//
|
||||||
|
// Unless required by applicable law or agreed to in writing, software
|
||||||
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
// See the License for the specific language governing permissions and
|
||||||
|
// limitations under the License.
|
||||||
|
package integration
|
||||||
|
|
||||||
|
import (
|
||||||
|
"testing"
|
||||||
|
"time"
|
||||||
|
|
||||||
|
"github.com/coreos/etcd/contrib/recipes"
|
||||||
|
)
|
||||||
|
|
||||||
|
func TestDoubleBarrier(t *testing.T) {
|
||||||
|
clus := newClusterV3(t, &clusterConfig{size: 3})
|
||||||
|
defer clus.Terminate(t)
|
||||||
|
defer closeSessionLease(clus)
|
||||||
|
|
||||||
|
waiters := 10
|
||||||
|
|
||||||
|
b := recipe.NewDoubleBarrier(clus.RandClient(), "test-barrier", waiters)
|
||||||
|
donec := make(chan struct{})
|
||||||
|
for i := 0; i < waiters-1; i++ {
|
||||||
|
go func() {
|
||||||
|
b := recipe.NewDoubleBarrier(clus.RandClient(), "test-barrier", waiters)
|
||||||
|
if err := b.Enter(); err != nil {
|
||||||
|
t.Fatalf("could not enter on barrier (%v)", err)
|
||||||
|
}
|
||||||
|
donec <- struct{}{}
|
||||||
|
if err := b.Leave(); err != nil {
|
||||||
|
t.Fatalf("could not leave on barrier (%v)", err)
|
||||||
|
}
|
||||||
|
donec <- struct{}{}
|
||||||
|
}()
|
||||||
|
}
|
||||||
|
|
||||||
|
time.Sleep(10 * time.Millisecond)
|
||||||
|
select {
|
||||||
|
case <-donec:
|
||||||
|
t.Fatalf("barrier did not enter-wait")
|
||||||
|
default:
|
||||||
|
}
|
||||||
|
|
||||||
|
if err := b.Enter(); err != nil {
|
||||||
|
t.Fatalf("could not enter last barrier (%v)", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
timerC := time.After(time.Duration(waiters*100) * time.Millisecond)
|
||||||
|
for i := 0; i < waiters-1; i++ {
|
||||||
|
select {
|
||||||
|
case <-timerC:
|
||||||
|
t.Fatalf("barrier enter timed out")
|
||||||
|
case <-donec:
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
time.Sleep(10 * time.Millisecond)
|
||||||
|
select {
|
||||||
|
case <-donec:
|
||||||
|
t.Fatalf("barrier did not leave-wait")
|
||||||
|
default:
|
||||||
|
}
|
||||||
|
|
||||||
|
b.Leave()
|
||||||
|
timerC = time.After(time.Duration(waiters*100) * time.Millisecond)
|
||||||
|
for i := 0; i < waiters-1; i++ {
|
||||||
|
select {
|
||||||
|
case <-timerC:
|
||||||
|
t.Fatalf("barrier leave timed out")
|
||||||
|
case <-donec:
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestDoubleBarrierFailover(t *testing.T) {
|
||||||
|
clus := newClusterV3(t, &clusterConfig{size: 3})
|
||||||
|
defer clus.Terminate(t)
|
||||||
|
defer closeSessionLease(clus)
|
||||||
|
|
||||||
|
waiters := 10
|
||||||
|
donec := make(chan struct{})
|
||||||
|
|
||||||
|
// sacrificial barrier holder; lease will be revoked
|
||||||
|
go func() {
|
||||||
|
b := recipe.NewDoubleBarrier(clus.clients[0], "test-barrier", waiters)
|
||||||
|
if err := b.Enter(); err != nil {
|
||||||
|
t.Fatalf("could not enter on barrier (%v)", err)
|
||||||
|
}
|
||||||
|
donec <- struct{}{}
|
||||||
|
}()
|
||||||
|
|
||||||
|
for i := 0; i < waiters-1; i++ {
|
||||||
|
go func() {
|
||||||
|
b := recipe.NewDoubleBarrier(clus.clients[1], "test-barrier", waiters)
|
||||||
|
if err := b.Enter(); err != nil {
|
||||||
|
t.Fatalf("could not enter on barrier (%v)", err)
|
||||||
|
}
|
||||||
|
donec <- struct{}{}
|
||||||
|
b.Leave()
|
||||||
|
donec <- struct{}{}
|
||||||
|
}()
|
||||||
|
}
|
||||||
|
|
||||||
|
// wait for barrier enter to unblock
|
||||||
|
for i := 0; i < waiters; i++ {
|
||||||
|
<-donec
|
||||||
|
}
|
||||||
|
// kill lease, expect Leave unblock
|
||||||
|
recipe.RevokeSessionLease(clus.clients[0])
|
||||||
|
// join on rest of waiters
|
||||||
|
for i := 0; i < waiters-1; i++ {
|
||||||
|
<-donec
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func closeSessionLease(clus *clusterV3) {
|
||||||
|
for _, client := range clus.clients {
|
||||||
|
recipe.StopSessionLease(client)
|
||||||
|
}
|
||||||
|
}
|
135
integration/v3_election_test.go
Normal file
135
integration/v3_election_test.go
Normal file
@ -0,0 +1,135 @@
|
|||||||
|
// Copyright 2016 CoreOS, Inc.
|
||||||
|
//
|
||||||
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
// you may not use this file except in compliance with the License.
|
||||||
|
// You may obtain a copy of the License at
|
||||||
|
//
|
||||||
|
// http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
//
|
||||||
|
// Unless required by applicable law or agreed to in writing, software
|
||||||
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
// See the License for the specific language governing permissions and
|
||||||
|
// limitations under the License.
|
||||||
|
package integration
|
||||||
|
|
||||||
|
import (
|
||||||
|
"fmt"
|
||||||
|
"testing"
|
||||||
|
"time"
|
||||||
|
|
||||||
|
"github.com/coreos/etcd/contrib/recipes"
|
||||||
|
)
|
||||||
|
|
||||||
|
// TestElectionWait tests if followers can correcty wait for elections.
|
||||||
|
func TestElectionWait(t *testing.T) {
|
||||||
|
clus := newClusterV3(t, &clusterConfig{size: 3})
|
||||||
|
defer clus.Terminate(t)
|
||||||
|
defer closeSessionLease(clus)
|
||||||
|
|
||||||
|
leaders := 3
|
||||||
|
followers := 3
|
||||||
|
|
||||||
|
electedc := make(chan string)
|
||||||
|
nextc := []chan struct{}{}
|
||||||
|
|
||||||
|
// wait for all elections
|
||||||
|
donec := make(chan struct{})
|
||||||
|
for i := 0; i < followers; i++ {
|
||||||
|
nextc = append(nextc, make(chan struct{}))
|
||||||
|
go func(ch chan struct{}) {
|
||||||
|
for j := 0; j < leaders; j++ {
|
||||||
|
b := recipe.NewElection(clus.RandClient(), "test-election")
|
||||||
|
s, err := b.Wait()
|
||||||
|
if err != nil {
|
||||||
|
t.Fatalf("could not wait for election (%v)", err)
|
||||||
|
}
|
||||||
|
electedc <- s
|
||||||
|
// wait for next election round
|
||||||
|
<-ch
|
||||||
|
}
|
||||||
|
donec <- struct{}{}
|
||||||
|
}(nextc[i])
|
||||||
|
}
|
||||||
|
|
||||||
|
// elect some leaders
|
||||||
|
for i := 0; i < leaders; i++ {
|
||||||
|
go func() {
|
||||||
|
e := recipe.NewElection(clus.RandClient(), "test-election")
|
||||||
|
ev := fmt.Sprintf("electval-%v", time.Now().UnixNano())
|
||||||
|
if err := e.Volunteer(ev); err != nil {
|
||||||
|
t.Fatalf("failed volunteer (%v)", err)
|
||||||
|
}
|
||||||
|
// wait for followers to accept leadership
|
||||||
|
for j := 0; j < followers; j++ {
|
||||||
|
s := <-electedc
|
||||||
|
if s != ev {
|
||||||
|
t.Errorf("wrong election value got %s, wanted %s", s, ev)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
// let next leader take over
|
||||||
|
if err := e.Resign(); err != nil {
|
||||||
|
t.Fatalf("failed resign (%v)", err)
|
||||||
|
}
|
||||||
|
// tell followers to start listening for next leader
|
||||||
|
for j := 0; j < followers; j++ {
|
||||||
|
nextc[j] <- struct{}{}
|
||||||
|
}
|
||||||
|
}()
|
||||||
|
}
|
||||||
|
|
||||||
|
// wait on followers
|
||||||
|
for i := 0; i < followers; i++ {
|
||||||
|
<-donec
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// TestElectionFailover tests that an election will
|
||||||
|
func TestElectionFailover(t *testing.T) {
|
||||||
|
clus := newClusterV3(t, &clusterConfig{size: 3})
|
||||||
|
defer clus.Terminate(t)
|
||||||
|
defer closeSessionLease(clus)
|
||||||
|
|
||||||
|
// first leader (elected)
|
||||||
|
e := recipe.NewElection(clus.clients[0], "test-election")
|
||||||
|
if err := e.Volunteer("foo"); err != nil {
|
||||||
|
t.Fatalf("failed volunteer (%v)", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
// check first leader
|
||||||
|
s, err := e.Wait()
|
||||||
|
if err != nil {
|
||||||
|
t.Fatalf("could not wait for first election (%v)", err)
|
||||||
|
}
|
||||||
|
if s != "foo" {
|
||||||
|
t.Fatalf("wrong election result. got %s, wanted foo", s)
|
||||||
|
}
|
||||||
|
|
||||||
|
// next leader
|
||||||
|
electedc := make(chan struct{})
|
||||||
|
go func() {
|
||||||
|
e := recipe.NewElection(clus.clients[1], "test-election")
|
||||||
|
if err := e.Volunteer("bar"); err != nil {
|
||||||
|
t.Fatal(err)
|
||||||
|
}
|
||||||
|
electedc <- struct{}{}
|
||||||
|
}()
|
||||||
|
|
||||||
|
// invoke leader failover
|
||||||
|
if err := recipe.RevokeSessionLease(clus.clients[0]); err != nil {
|
||||||
|
t.Fatal(err)
|
||||||
|
}
|
||||||
|
|
||||||
|
// check new leader
|
||||||
|
e = recipe.NewElection(clus.clients[2], "test-election")
|
||||||
|
s, err = e.Wait()
|
||||||
|
if err != nil {
|
||||||
|
t.Fatalf("could not wait for second election (%v)", err)
|
||||||
|
}
|
||||||
|
if s != "bar" {
|
||||||
|
t.Fatalf("wrong election result. got %s, wanted bar", s)
|
||||||
|
}
|
||||||
|
|
||||||
|
// leader must ack election (otherwise, Volunteer may see closed conn)
|
||||||
|
<-electedc
|
||||||
|
}
|
Loading…
x
Reference in New Issue
Block a user