mirror of
https://github.com/etcd-io/etcd.git
synced 2024-09-27 06:25:44 +00:00
Merge pull request #14322 from mitake/watch-auth-err
*: handle auth invalid token and old revision errors in watch
This commit is contained in:
commit
c793f18238
@ -18,6 +18,7 @@ import (
|
|||||||
"context"
|
"context"
|
||||||
"errors"
|
"errors"
|
||||||
"fmt"
|
"fmt"
|
||||||
|
"strings"
|
||||||
"sync"
|
"sync"
|
||||||
"time"
|
"time"
|
||||||
|
|
||||||
@ -580,6 +581,26 @@ func (w *watchGrpcStream) run() {
|
|||||||
|
|
||||||
switch {
|
switch {
|
||||||
case pbresp.Created:
|
case pbresp.Created:
|
||||||
|
cancelReasonError := v3rpc.Error(errors.New(pbresp.CancelReason))
|
||||||
|
if shouldRetryWatch(cancelReasonError) {
|
||||||
|
var newErr error
|
||||||
|
if wc, newErr = w.newWatchClient(); newErr != nil {
|
||||||
|
w.lg.Error("failed to create a new watch client", zap.Error(newErr))
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
if len(w.resuming) != 0 {
|
||||||
|
if ws := w.resuming[0]; ws != nil {
|
||||||
|
if err := wc.Send(ws.initReq.toPB()); err != nil {
|
||||||
|
w.lg.Debug("error when sending request", zap.Error(err))
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
cur = nil
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
|
||||||
// response to head of queue creation
|
// response to head of queue creation
|
||||||
if len(w.resuming) != 0 {
|
if len(w.resuming) != 0 {
|
||||||
if ws := w.resuming[0]; ws != nil {
|
if ws := w.resuming[0]; ws != nil {
|
||||||
@ -688,6 +709,11 @@ func (w *watchGrpcStream) run() {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func shouldRetryWatch(cancelReasonError error) bool {
|
||||||
|
return (strings.Compare(cancelReasonError.Error(), v3rpc.ErrGRPCInvalidAuthToken.Error()) == 0) ||
|
||||||
|
(strings.Compare(cancelReasonError.Error(), v3rpc.ErrGRPCAuthOldRevision.Error()) == 0)
|
||||||
|
}
|
||||||
|
|
||||||
// nextResume chooses the next resuming to register with the grpc stream. Abandoned
|
// nextResume chooses the next resuming to register with the grpc stream. Abandoned
|
||||||
// streams are marked as nil in the queue since the head must wait for its inflight registration.
|
// streams are marked as nil in the queue since the head must wait for its inflight registration.
|
||||||
func (w *watchGrpcStream) nextResume() *watcherStream {
|
func (w *watchGrpcStream) nextResume() *watcherStream {
|
||||||
|
@ -224,16 +224,16 @@ func (ws *watchServer) Watch(stream pb.Watch_WatchServer) (err error) {
|
|||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
|
|
||||||
func (sws *serverWatchStream) isWatchPermitted(wcr *pb.WatchCreateRequest) bool {
|
func (sws *serverWatchStream) isWatchPermitted(wcr *pb.WatchCreateRequest) error {
|
||||||
authInfo, err := sws.ag.AuthInfoFromCtx(sws.gRPCStream.Context())
|
authInfo, err := sws.ag.AuthInfoFromCtx(sws.gRPCStream.Context())
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return false
|
return err
|
||||||
}
|
}
|
||||||
if authInfo == nil {
|
if authInfo == nil {
|
||||||
// if auth is enabled, IsRangePermitted() can cause an error
|
// if auth is enabled, IsRangePermitted() can cause an error
|
||||||
authInfo = &auth.AuthInfo{}
|
authInfo = &auth.AuthInfo{}
|
||||||
}
|
}
|
||||||
return sws.ag.AuthStore().IsRangePermitted(authInfo, wcr.Key, wcr.RangeEnd) == nil
|
return sws.ag.AuthStore().IsRangePermitted(authInfo, wcr.Key, wcr.RangeEnd)
|
||||||
}
|
}
|
||||||
|
|
||||||
func (sws *serverWatchStream) recvLoop() error {
|
func (sws *serverWatchStream) recvLoop() error {
|
||||||
@ -267,13 +267,29 @@ func (sws *serverWatchStream) recvLoop() error {
|
|||||||
creq.RangeEnd = []byte{}
|
creq.RangeEnd = []byte{}
|
||||||
}
|
}
|
||||||
|
|
||||||
if !sws.isWatchPermitted(creq) {
|
err := sws.isWatchPermitted(creq)
|
||||||
|
if err != nil {
|
||||||
|
var cancelReason string
|
||||||
|
switch err {
|
||||||
|
case auth.ErrInvalidAuthToken:
|
||||||
|
cancelReason = rpctypes.ErrGRPCInvalidAuthToken.Error()
|
||||||
|
case auth.ErrAuthOldRevision:
|
||||||
|
cancelReason = rpctypes.ErrGRPCAuthOldRevision.Error()
|
||||||
|
case auth.ErrUserEmpty:
|
||||||
|
cancelReason = rpctypes.ErrGRPCUserEmpty.Error()
|
||||||
|
default:
|
||||||
|
if err != auth.ErrPermissionDenied {
|
||||||
|
sws.lg.Error("unexpected error code", zap.Error(err))
|
||||||
|
}
|
||||||
|
cancelReason = rpctypes.ErrGRPCPermissionDenied.Error()
|
||||||
|
}
|
||||||
|
|
||||||
wr := &pb.WatchResponse{
|
wr := &pb.WatchResponse{
|
||||||
Header: sws.newResponseHeader(sws.watchStream.Rev()),
|
Header: sws.newResponseHeader(sws.watchStream.Rev()),
|
||||||
WatchId: creq.WatchId,
|
WatchId: creq.WatchId,
|
||||||
Canceled: true,
|
Canceled: true,
|
||||||
Created: true,
|
Created: true,
|
||||||
CancelReason: rpctypes.ErrGRPCPermissionDenied.Error(),
|
CancelReason: cancelReason,
|
||||||
}
|
}
|
||||||
|
|
||||||
select {
|
select {
|
||||||
|
@ -139,7 +139,8 @@ type ClusterConfig struct {
|
|||||||
|
|
||||||
DiscoveryURL string
|
DiscoveryURL string
|
||||||
|
|
||||||
AuthToken string
|
AuthToken string
|
||||||
|
AuthTokenTTL uint
|
||||||
|
|
||||||
QuotaBackendBytes int64
|
QuotaBackendBytes int64
|
||||||
|
|
||||||
@ -263,6 +264,7 @@ func (c *Cluster) mustNewMember(t testutil.TB) *Member {
|
|||||||
Name: fmt.Sprintf("m%v", memberNumber),
|
Name: fmt.Sprintf("m%v", memberNumber),
|
||||||
MemberNumber: memberNumber,
|
MemberNumber: memberNumber,
|
||||||
AuthToken: c.Cfg.AuthToken,
|
AuthToken: c.Cfg.AuthToken,
|
||||||
|
AuthTokenTTL: c.Cfg.AuthTokenTTL,
|
||||||
PeerTLS: c.Cfg.PeerTLS,
|
PeerTLS: c.Cfg.PeerTLS,
|
||||||
ClientTLS: c.Cfg.ClientTLS,
|
ClientTLS: c.Cfg.ClientTLS,
|
||||||
QuotaBackendBytes: c.Cfg.QuotaBackendBytes,
|
QuotaBackendBytes: c.Cfg.QuotaBackendBytes,
|
||||||
@ -586,6 +588,7 @@ type MemberConfig struct {
|
|||||||
PeerTLS *transport.TLSInfo
|
PeerTLS *transport.TLSInfo
|
||||||
ClientTLS *transport.TLSInfo
|
ClientTLS *transport.TLSInfo
|
||||||
AuthToken string
|
AuthToken string
|
||||||
|
AuthTokenTTL uint
|
||||||
QuotaBackendBytes int64
|
QuotaBackendBytes int64
|
||||||
MaxTxnOps uint
|
MaxTxnOps uint
|
||||||
MaxRequestBytes uint
|
MaxRequestBytes uint
|
||||||
@ -679,6 +682,9 @@ func MustNewMember(t testutil.TB, mcfg MemberConfig) *Member {
|
|||||||
if mcfg.AuthToken != "" {
|
if mcfg.AuthToken != "" {
|
||||||
m.AuthToken = mcfg.AuthToken
|
m.AuthToken = mcfg.AuthToken
|
||||||
}
|
}
|
||||||
|
if mcfg.AuthTokenTTL != 0 {
|
||||||
|
m.TokenTTL = mcfg.AuthTokenTTL
|
||||||
|
}
|
||||||
|
|
||||||
m.BcryptCost = uint(bcrypt.MinCost) // use min bcrypt cost to speedy up integration testing
|
m.BcryptCost = uint(bcrypt.MinCost) // use min bcrypt cost to speedy up integration testing
|
||||||
|
|
||||||
|
@ -498,3 +498,36 @@ func TestV3AuthRestartMember(t *testing.T) {
|
|||||||
_, err = c2.Put(context.TODO(), "foo", "bar2")
|
_, err = c2.Put(context.TODO(), "foo", "bar2")
|
||||||
testutil.AssertNil(t, err)
|
testutil.AssertNil(t, err)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func TestV3AuthWatchAndTokenExpire(t *testing.T) {
|
||||||
|
integration.BeforeTest(t)
|
||||||
|
clus := integration.NewCluster(t, &integration.ClusterConfig{Size: 1, AuthTokenTTL: 3})
|
||||||
|
defer clus.Terminate(t)
|
||||||
|
|
||||||
|
ctx, cancel := context.WithTimeout(context.TODO(), 10*time.Second)
|
||||||
|
defer cancel()
|
||||||
|
|
||||||
|
authSetupRoot(t, integration.ToGRPC(clus.Client(0)).Auth)
|
||||||
|
|
||||||
|
c, cerr := integration.NewClient(t, clientv3.Config{Endpoints: clus.Client(0).Endpoints(), Username: "root", Password: "123"})
|
||||||
|
if cerr != nil {
|
||||||
|
t.Fatal(cerr)
|
||||||
|
}
|
||||||
|
defer c.Close()
|
||||||
|
|
||||||
|
_, err := c.Put(ctx, "key", "val")
|
||||||
|
if err != nil {
|
||||||
|
t.Fatalf("Unexpected error from Put: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
// The first watch gets a valid auth token through watcher.newWatcherGrpcStream()
|
||||||
|
// We should discard the first one by waiting TTL after the first watch.
|
||||||
|
wChan := c.Watch(ctx, "key", clientv3.WithRev(1))
|
||||||
|
watchResponse := <-wChan
|
||||||
|
|
||||||
|
time.Sleep(5 * time.Second)
|
||||||
|
|
||||||
|
wChan = c.Watch(ctx, "key", clientv3.WithRev(1))
|
||||||
|
watchResponse = <-wChan
|
||||||
|
testutil.AssertNil(t, watchResponse.Err())
|
||||||
|
}
|
||||||
|
Loading…
x
Reference in New Issue
Block a user