mirror of
https://github.com/etcd-io/etcd.git
synced 2024-09-27 06:25:44 +00:00
138 lines
3.4 KiB
Go
138 lines
3.4 KiB
Go
// Copyright 2022 The etcd Authors
|
|
//
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
// you may not use this file except in compliance with the License.
|
|
// You may obtain a copy of the License at
|
|
//
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
//
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
// See the License for the specific language governing permissions and
|
|
// limitations under the License.
|
|
|
|
package e2e
|
|
|
|
import (
|
|
"context"
|
|
"os"
|
|
"testing"
|
|
|
|
"go.etcd.io/etcd/client/pkg/v3/testutil"
|
|
"go.etcd.io/etcd/tests/v3/framework/config"
|
|
intf "go.etcd.io/etcd/tests/v3/framework/interfaces"
|
|
)
|
|
|
|
type e2eRunner struct{}
|
|
|
|
func NewE2eRunner() intf.TestRunner {
|
|
return &e2eRunner{}
|
|
}
|
|
|
|
func (e e2eRunner) TestMain(m *testing.M) {
|
|
InitFlags()
|
|
v := m.Run()
|
|
if v == 0 && testutil.CheckLeakedGoroutine() {
|
|
os.Exit(1)
|
|
}
|
|
os.Exit(v)
|
|
}
|
|
|
|
func (e e2eRunner) BeforeTest(t testing.TB) {
|
|
BeforeTest(t)
|
|
}
|
|
|
|
func (e e2eRunner) NewCluster(ctx context.Context, t testing.TB, opts ...config.ClusterOption) intf.Cluster {
|
|
cfg := config.NewClusterConfig(opts...)
|
|
e2eConfig := NewConfig(
|
|
WithClusterSize(cfg.ClusterSize),
|
|
WithQuotaBackendBytes(cfg.QuotaBackendBytes),
|
|
WithStrictReconfigCheck(cfg.StrictReconfigCheck),
|
|
WithAuthTokenOpts(cfg.AuthToken),
|
|
WithSnapshotCount(cfg.SnapshotCount),
|
|
)
|
|
|
|
if cfg.ClusterContext != nil {
|
|
e2eClusterCtx := cfg.ClusterContext.(*ClusterContext)
|
|
e2eConfig.Version = e2eClusterCtx.Version
|
|
}
|
|
|
|
switch cfg.ClientTLS {
|
|
case config.NoTLS:
|
|
e2eConfig.Client.ConnectionType = ClientNonTLS
|
|
case config.AutoTLS:
|
|
e2eConfig.Client.AutoTLS = true
|
|
e2eConfig.Client.ConnectionType = ClientTLS
|
|
case config.ManualTLS:
|
|
e2eConfig.Client.AutoTLS = false
|
|
e2eConfig.Client.ConnectionType = ClientTLS
|
|
default:
|
|
t.Fatalf("ClientTLS config %q not supported", cfg.ClientTLS)
|
|
}
|
|
switch cfg.PeerTLS {
|
|
case config.NoTLS:
|
|
e2eConfig.IsPeerTLS = false
|
|
e2eConfig.IsPeerAutoTLS = false
|
|
case config.AutoTLS:
|
|
e2eConfig.IsPeerTLS = true
|
|
e2eConfig.IsPeerAutoTLS = true
|
|
case config.ManualTLS:
|
|
e2eConfig.IsPeerTLS = true
|
|
e2eConfig.IsPeerAutoTLS = false
|
|
default:
|
|
t.Fatalf("PeerTLS config %q not supported", cfg.PeerTLS)
|
|
}
|
|
epc, err := NewEtcdProcessCluster(ctx, t, WithConfig(e2eConfig))
|
|
if err != nil {
|
|
t.Fatalf("could not start etcd integrationCluster: %s", err)
|
|
}
|
|
return &e2eCluster{t, *epc}
|
|
}
|
|
|
|
type e2eCluster struct {
|
|
t testing.TB
|
|
EtcdProcessCluster
|
|
}
|
|
|
|
func (c *e2eCluster) Client(opts ...config.ClientOption) (intf.Client, error) {
|
|
etcdctl, err := NewEtcdctl(c.Cfg.Client, c.EndpointsGRPC(), opts...)
|
|
return e2eClient{etcdctl}, err
|
|
}
|
|
|
|
func (c *e2eCluster) Endpoints() []string {
|
|
return c.EndpointsGRPC()
|
|
}
|
|
|
|
func (c *e2eCluster) Members() (ms []intf.Member) {
|
|
for _, proc := range c.EtcdProcessCluster.Procs {
|
|
ms = append(ms, e2eMember{EtcdProcess: proc, Cfg: c.Cfg})
|
|
}
|
|
return ms
|
|
}
|
|
|
|
type e2eClient struct {
|
|
*EtcdctlV3
|
|
}
|
|
|
|
type e2eMember struct {
|
|
EtcdProcess
|
|
Cfg *EtcdProcessClusterConfig
|
|
}
|
|
|
|
func (m e2eMember) Client() intf.Client {
|
|
etcdctl, err := NewEtcdctl(m.Cfg.Client, m.EndpointsGRPC())
|
|
if err != nil {
|
|
panic(err)
|
|
}
|
|
return e2eClient{etcdctl}
|
|
}
|
|
|
|
func (m e2eMember) Start(ctx context.Context) error {
|
|
return m.EtcdProcess.Start(ctx)
|
|
}
|
|
|
|
func (m e2eMember) Stop() {
|
|
m.EtcdProcess.Stop()
|
|
}
|