mirror of
https://github.com/etcd-io/etcd.git
synced 2024-09-27 06:25:44 +00:00
tests: migrate TestCtlV3LeaseTestTimeToLiveExpired.* to common
This commit is contained in:
parent
b50f10299b
commit
c12e03c8e6
@ -147,3 +147,63 @@ func TestLeaseGrantAndList(t *testing.T) {
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
func TestLeaseGrantTimeToLiveExpired(t *testing.T) {
|
||||
testRunner.BeforeTest(t)
|
||||
|
||||
tcs := []struct {
|
||||
name string
|
||||
config config.ClusterConfig
|
||||
}{
|
||||
{
|
||||
name: "NoTLS",
|
||||
config: config.ClusterConfig{ClusterSize: 1},
|
||||
},
|
||||
{
|
||||
name: "PeerTLS",
|
||||
config: config.ClusterConfig{ClusterSize: 3, PeerTLS: config.ManualTLS},
|
||||
},
|
||||
{
|
||||
name: "PeerAutoTLS",
|
||||
config: config.ClusterConfig{ClusterSize: 3, PeerTLS: config.AutoTLS},
|
||||
},
|
||||
{
|
||||
name: "ClientTLS",
|
||||
config: config.ClusterConfig{ClusterSize: 1, ClientTLS: config.ManualTLS},
|
||||
},
|
||||
{
|
||||
name: "ClientAutoTLS",
|
||||
config: config.ClusterConfig{ClusterSize: 1, ClientTLS: config.AutoTLS},
|
||||
},
|
||||
}
|
||||
for _, tc := range tcs {
|
||||
t.Run(tc.name, func(t *testing.T) {
|
||||
clus := testRunner.NewCluster(t, tc.config)
|
||||
defer clus.Close()
|
||||
cc := clus.Client()
|
||||
|
||||
testutils.ExecuteWithTimeout(t, 10*time.Second, func() {
|
||||
leaseResp, err := cc.Grant(2)
|
||||
require.NoError(t, err)
|
||||
|
||||
err = cc.Put("foo", "bar", config.PutOptions{LeaseID: leaseResp.ID})
|
||||
require.NoError(t, err)
|
||||
|
||||
getResp, err := cc.Get("foo", config.GetOptions{})
|
||||
require.NoError(t, err)
|
||||
require.Equal(t, int64(1), getResp.Count)
|
||||
|
||||
time.Sleep(3 * time.Second)
|
||||
|
||||
ttlResp, err := cc.TimeToLive(leaseResp.ID, config.LeaseOption{})
|
||||
require.NoError(t, err)
|
||||
require.Equal(t, int64(-1), ttlResp.TTL)
|
||||
|
||||
getResp, err = cc.Get("foo", config.GetOptions{})
|
||||
require.NoError(t, err)
|
||||
// Value should expire with the lease
|
||||
require.Equal(t, int64(0), getResp.Count)
|
||||
})
|
||||
})
|
||||
}
|
||||
}
|
||||
|
@ -853,6 +853,28 @@ func authLeaseTestTimeToLiveExpired(cx ctlCtx) {
|
||||
}
|
||||
}
|
||||
|
||||
func leaseTestTimeToLiveExpire(cx ctlCtx, ttl int) error {
|
||||
leaseID, err := ctlV3LeaseGrant(cx, ttl)
|
||||
if err != nil {
|
||||
return fmt.Errorf("ctlV3LeaseGrant error (%v)", err)
|
||||
}
|
||||
|
||||
if err = ctlV3Put(cx, "key", "val", leaseID); err != nil {
|
||||
return fmt.Errorf("ctlV3Put error (%v)", err)
|
||||
}
|
||||
// eliminate false positive
|
||||
time.Sleep(time.Duration(ttl+1) * time.Second)
|
||||
cmdArgs := append(cx.PrefixArgs(), "lease", "timetolive", leaseID)
|
||||
exp := fmt.Sprintf("lease %s already expired", leaseID)
|
||||
if err = e2e.SpawnWithExpectWithEnv(cmdArgs, cx.envMap, exp); err != nil {
|
||||
return fmt.Errorf("lease not properly expired: (%v)", err)
|
||||
}
|
||||
if err := ctlV3Get(cx, []string{"key"}); err != nil {
|
||||
return fmt.Errorf("ctlV3Get error (%v)", err)
|
||||
}
|
||||
return nil
|
||||
}
|
||||
|
||||
func authLeaseTestLeaseGrantLeases(cx ctlCtx) {
|
||||
cx.user, cx.pass = "root", "root"
|
||||
authSetupTestUser(cx)
|
||||
|
@ -19,25 +19,10 @@ import (
|
||||
"strconv"
|
||||
"strings"
|
||||
"testing"
|
||||
"time"
|
||||
|
||||
"go.etcd.io/etcd/tests/v3/framework/e2e"
|
||||
)
|
||||
|
||||
func TestCtlV3LeaseTestTimeToLiveExpired(t *testing.T) { testCtl(t, leaseTestTimeToLiveExpired) }
|
||||
func TestCtlV3LeaseTestTimeToLiveExpiredNoTLS(t *testing.T) {
|
||||
testCtl(t, leaseTestTimeToLiveExpired, withCfg(*e2e.NewConfigNoTLS()))
|
||||
}
|
||||
func TestCtlV3LeaseTestTimeToLiveExpiredClientTLS(t *testing.T) {
|
||||
testCtl(t, leaseTestTimeToLiveExpired, withCfg(*e2e.NewConfigClientTLS()))
|
||||
}
|
||||
func TestCtlV3LeaseTestTimeToLiveExpiredClientAutoTLS(t *testing.T) {
|
||||
testCtl(t, leaseTestTimeToLiveExpired, withCfg(*e2e.NewConfigClientAutoTLS()))
|
||||
}
|
||||
func TestCtlV3LeaseTestTimeToLiveExpiredPeerTLS(t *testing.T) {
|
||||
testCtl(t, leaseTestTimeToLiveExpired, withCfg(*e2e.NewConfigPeerTLS()))
|
||||
}
|
||||
|
||||
func TestCtlV3LeaseKeepAlive(t *testing.T) { testCtl(t, leaseTestKeepAlive) }
|
||||
func TestCtlV3LeaseKeepAliveNoTLS(t *testing.T) {
|
||||
testCtl(t, leaseTestKeepAlive, withCfg(*e2e.NewConfigNoTLS()))
|
||||
@ -80,35 +65,6 @@ func TestCtlV3LeaseRevokePeerTLS(t *testing.T) {
|
||||
testCtl(t, leaseTestRevoked, withCfg(*e2e.NewConfigPeerTLS()))
|
||||
}
|
||||
|
||||
func leaseTestTimeToLiveExpired(cx ctlCtx) {
|
||||
err := leaseTestTimeToLiveExpire(cx, 3)
|
||||
if err != nil {
|
||||
cx.t.Fatalf("leaseTestTimeToLiveExpire: (%v)", err)
|
||||
}
|
||||
}
|
||||
|
||||
func leaseTestTimeToLiveExpire(cx ctlCtx, ttl int) error {
|
||||
leaseID, err := ctlV3LeaseGrant(cx, ttl)
|
||||
if err != nil {
|
||||
return fmt.Errorf("ctlV3LeaseGrant error (%v)", err)
|
||||
}
|
||||
|
||||
if err = ctlV3Put(cx, "key", "val", leaseID); err != nil {
|
||||
return fmt.Errorf("ctlV3Put error (%v)", err)
|
||||
}
|
||||
// eliminate false positive
|
||||
time.Sleep(time.Duration(ttl+1) * time.Second)
|
||||
cmdArgs := append(cx.PrefixArgs(), "lease", "timetolive", leaseID)
|
||||
exp := fmt.Sprintf("lease %s already expired", leaseID)
|
||||
if err = e2e.SpawnWithExpectWithEnv(cmdArgs, cx.envMap, exp); err != nil {
|
||||
return fmt.Errorf("lease not properly expired: (%v)", err)
|
||||
}
|
||||
if err := ctlV3Get(cx, []string{"key"}); err != nil {
|
||||
return fmt.Errorf("ctlV3Get error (%v)", err)
|
||||
}
|
||||
return nil
|
||||
}
|
||||
|
||||
func leaseTestKeepAlive(cx ctlCtx) {
|
||||
// put with TTL 10 seconds and keep-alive
|
||||
leaseID, err := ctlV3LeaseGrant(cx, 10)
|
||||
|
Loading…
x
Reference in New Issue
Block a user