Marek Siarkowicz 0cbd56e8b6 tests: Cleanup endpoints
Signed-off-by: Marek Siarkowicz <siarkowicz@google.com>
2023-04-03 12:18:54 +02:00

138 lines
3.4 KiB
Go

// Copyright 2022 The etcd Authors
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
package e2e
import (
"context"
"os"
"testing"
"go.etcd.io/etcd/client/pkg/v3/testutil"
"go.etcd.io/etcd/tests/v3/framework/config"
intf "go.etcd.io/etcd/tests/v3/framework/interfaces"
)
type e2eRunner struct{}
func NewE2eRunner() intf.TestRunner {
return &e2eRunner{}
}
func (e e2eRunner) TestMain(m *testing.M) {
InitFlags()
v := m.Run()
if v == 0 && testutil.CheckLeakedGoroutine() {
os.Exit(1)
}
os.Exit(v)
}
func (e e2eRunner) BeforeTest(t testing.TB) {
BeforeTest(t)
}
func (e e2eRunner) NewCluster(ctx context.Context, t testing.TB, opts ...config.ClusterOption) intf.Cluster {
cfg := config.NewClusterConfig(opts...)
e2eConfig := NewConfig(
WithClusterSize(cfg.ClusterSize),
WithQuotaBackendBytes(cfg.QuotaBackendBytes),
WithStrictReconfigCheck(cfg.StrictReconfigCheck),
WithAuthTokenOpts(cfg.AuthToken),
WithSnapshotCount(cfg.SnapshotCount),
)
if cfg.ClusterContext != nil {
e2eClusterCtx := cfg.ClusterContext.(*ClusterContext)
e2eConfig.Version = e2eClusterCtx.Version
}
switch cfg.ClientTLS {
case config.NoTLS:
e2eConfig.Client.ConnectionType = ClientNonTLS
case config.AutoTLS:
e2eConfig.Client.AutoTLS = true
e2eConfig.Client.ConnectionType = ClientTLS
case config.ManualTLS:
e2eConfig.Client.AutoTLS = false
e2eConfig.Client.ConnectionType = ClientTLS
default:
t.Fatalf("ClientTLS config %q not supported", cfg.ClientTLS)
}
switch cfg.PeerTLS {
case config.NoTLS:
e2eConfig.IsPeerTLS = false
e2eConfig.IsPeerAutoTLS = false
case config.AutoTLS:
e2eConfig.IsPeerTLS = true
e2eConfig.IsPeerAutoTLS = true
case config.ManualTLS:
e2eConfig.IsPeerTLS = true
e2eConfig.IsPeerAutoTLS = false
default:
t.Fatalf("PeerTLS config %q not supported", cfg.PeerTLS)
}
epc, err := NewEtcdProcessCluster(ctx, t, WithConfig(e2eConfig))
if err != nil {
t.Fatalf("could not start etcd integrationCluster: %s", err)
}
return &e2eCluster{t, *epc}
}
type e2eCluster struct {
t testing.TB
EtcdProcessCluster
}
func (c *e2eCluster) Client(opts ...config.ClientOption) (intf.Client, error) {
etcdctl, err := NewEtcdctl(c.Cfg.Client, c.EndpointsGRPC(), opts...)
return e2eClient{etcdctl}, err
}
func (c *e2eCluster) Endpoints() []string {
return c.EndpointsGRPC()
}
func (c *e2eCluster) Members() (ms []intf.Member) {
for _, proc := range c.EtcdProcessCluster.Procs {
ms = append(ms, e2eMember{EtcdProcess: proc, Cfg: c.Cfg})
}
return ms
}
type e2eClient struct {
*EtcdctlV3
}
type e2eMember struct {
EtcdProcess
Cfg *EtcdProcessClusterConfig
}
func (m e2eMember) Client() intf.Client {
etcdctl, err := NewEtcdctl(m.Cfg.Client, m.EndpointsGRPC())
if err != nil {
panic(err)
}
return e2eClient{etcdctl}
}
func (m e2eMember) Start(ctx context.Context) error {
return m.EtcdProcess.Start(ctx)
}
func (m e2eMember) Stop() {
m.EtcdProcess.Stop()
}