Skip to content

Commit

Permalink
e2e: add basic release migration tests
Browse files Browse the repository at this point in the history
  • Loading branch information
gyuho committed Jul 9, 2016
1 parent 1e4ce6b commit 255aa7f
Show file tree
Hide file tree
Showing 3 changed files with 131 additions and 8 deletions.
4 changes: 2 additions & 2 deletions e2e/ctl_v3_migrate_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -52,7 +52,7 @@ func TestCtlV3Migrate(t *testing.T) {
for i := range epc.procs {
dataDirs[i] = epc.procs[i].cfg.dataDirPath
}
if err := epc.Stop(); err != nil {
if err := epc.StopAll(); err != nil {
t.Fatalf("error closing etcd processes (%v)", err)
}

Expand All @@ -74,7 +74,7 @@ func TestCtlV3Migrate(t *testing.T) {
for i := range epc.procs {
epc.procs[i].cfg.keepDataDir = true
}
if err := epc.Restart(); err != nil {
if err := epc.RestartAll(); err != nil {
t.Fatal(err)
}

Expand Down
73 changes: 73 additions & 0 deletions e2e/etcd_release_migrate_test.go
Original file line number Diff line number Diff line change
@@ -0,0 +1,73 @@
// Copyright 2016 The etcd Authors
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.

package e2e

import (
"os"
"testing"
"time"

"github.com/coreos/etcd/pkg/testutil"
)

// TestReleaseMigrate ensures that changes to master branch does not affect the
// migration from latest etcd releases.
func TestReleaseMigrate(t *testing.T) {
releaseBinaryPath := os.Getenv("RELEASE_BINARY")
if releaseBinaryPath == "" {
t.Skip("skipping release migration tests (release binary not provided)")
}

defer testutil.AfterTest(t)

copiedCfg := configNoTLS
copiedCfg.execPath = releaseBinaryPath
epc, err := newEtcdProcessCluster(&copiedCfg)
if err != nil {
t.Fatalf("could not start etcd process cluster (%v)", err)
}
defer func() {
if errC := epc.Close(); errC != nil {
t.Fatalf("error closing etcd processes (%v)", errC)
}
}()

os.Setenv("ETCDCTL_API", "3")
defer os.Unsetenv("ETCDCTL_API")
cx := ctlCtx{
t: t,
cfg: configNoTLS,
dialTimeout: 7 * time.Second,
quorum: true,
epc: epc,
}
if err := ctlV3Put(cx, "foo", "bar", ""); err != nil {
cx.t.Fatalf("ctlV3Put error (%v)", err)
}

for i := range epc.backends() {
if err := epc.Stop(i); err != nil {
t.Fatalf("error closing etcd process (%v)", err)
}
epc.procs[i].cfg.execPath = "../bin/etcd"
epc.procs[i].cfg.keepDataDir = true
if err := epc.Restart(i); err != nil {
t.Fatalf("error restarting etcd process (%v)", err)
}
if err := ctlV3Get(cx, []string{"foo"}, []kv{{"foo", "bar"}}...); err != nil {
cx.t.Fatalf("ctlV3Get error (%v)", err)
}
}
}
62 changes: 56 additions & 6 deletions e2e/etcd_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -42,61 +42,71 @@ const (

var (
configNoTLS = etcdProcessClusterConfig{
execPath: "../bin/etcd",
clusterSize: 3,
proxySize: 0,
initialToken: "new",
}
configAutoTLS = etcdProcessClusterConfig{
execPath: "../bin/etcd",
clusterSize: 3,
isPeerTLS: true,
isPeerAutoTLS: true,
initialToken: "new",
}
configTLS = etcdProcessClusterConfig{
execPath: "../bin/etcd",
clusterSize: 3,
proxySize: 0,
clientTLS: clientTLS,
isPeerTLS: true,
initialToken: "new",
}
configClientTLS = etcdProcessClusterConfig{
execPath: "../bin/etcd",
clusterSize: 3,
proxySize: 0,
clientTLS: clientTLS,
initialToken: "new",
}
configClientBoth = etcdProcessClusterConfig{
execPath: "../bin/etcd",
clusterSize: 1,
proxySize: 0,
clientTLS: clientTLSAndNonTLS,
initialToken: "new",
}
configClientAutoTLS = etcdProcessClusterConfig{
execPath: "../bin/etcd",
clusterSize: 1,
proxySize: 0,
isClientAutoTLS: true,
clientTLS: clientTLS,
initialToken: "new",
}
configPeerTLS = etcdProcessClusterConfig{
execPath: "../bin/etcd",
clusterSize: 3,
proxySize: 0,
isPeerTLS: true,
initialToken: "new",
}
configWithProxy = etcdProcessClusterConfig{
execPath: "../bin/etcd",
clusterSize: 3,
proxySize: 1,
initialToken: "new",
}
configWithProxyTLS = etcdProcessClusterConfig{
execPath: "../bin/etcd",
clusterSize: 3,
proxySize: 1,
clientTLS: clientTLS,
isPeerTLS: true,
initialToken: "new",
}
configWithProxyPeerTLS = etcdProcessClusterConfig{
execPath: "../bin/etcd",
clusterSize: 3,
proxySize: 1,
isPeerTLS: true,
Expand All @@ -122,7 +132,8 @@ type etcdProcess struct {
}

type etcdProcessConfig struct {
args []string
execPath string
args []string

dataDirPath string
keepDataDir bool
Expand All @@ -137,6 +148,7 @@ type etcdProcessConfig struct {
}

type etcdProcessClusterConfig struct {
execPath string
dataDirPath string
keepDataDir bool

Expand Down Expand Up @@ -175,7 +187,7 @@ func newEtcdProcessCluster(cfg *etcdProcessClusterConfig) (*etcdProcessCluster,
}

func newEtcdProcess(cfg *etcdProcessConfig) (*etcdProcess, error) {
if !fileutil.Exist("../bin/etcd") {
if !fileutil.Exist(cfg.execPath) {
return nil, fmt.Errorf("could not find etcd binary")
}

Expand All @@ -185,7 +197,7 @@ func newEtcdProcess(cfg *etcdProcessConfig) (*etcdProcess, error) {
}
}

child, err := spawnCmd(append([]string{"../bin/etcd"}, cfg.args...))
child, err := spawnCmd(append([]string{cfg.execPath}, cfg.args...))
if err != nil {
return nil, err
}
Expand Down Expand Up @@ -256,6 +268,7 @@ func (cfg *etcdProcessClusterConfig) etcdProcessConfigs() []*etcdProcessConfig {

args = append(args, cfg.tlsArgs()...)
etcdCfgs[i] = &etcdProcessConfig{
execPath: cfg.execPath,
args: args,
dataDirPath: dataDirPath,
keepDataDir: cfg.keepDataDir,
Expand All @@ -281,6 +294,7 @@ func (cfg *etcdProcessClusterConfig) etcdProcessConfigs() []*etcdProcessConfig {
}
args = append(args, cfg.tlsArgs()...)
etcdCfgs[cfg.clusterSize+i] = &etcdProcessConfig{
execPath: cfg.execPath,
args: args,
dataDirPath: dataDirPath,
keepDataDir: cfg.keepDataDir,
Expand Down Expand Up @@ -351,7 +365,7 @@ func (epc *etcdProcessCluster) Start() (err error) {
return nil
}

func (epc *etcdProcessCluster) Restart() error {
func (epc *etcdProcessCluster) RestartAll() error {
for i := range epc.procs {
proc, err := newEtcdProcess(epc.procs[i].cfg)
if err != nil {
Expand All @@ -363,7 +377,29 @@ func (epc *etcdProcessCluster) Restart() error {
return epc.Start()
}

func (epc *etcdProcessCluster) Stop() (err error) {
func (epc *etcdProcessCluster) Restart(i int) error {
proc, err := newEtcdProcess(epc.procs[i].cfg)
if err != nil {
epc.Close()
return err
}
epc.procs[i] = proc

readyStr := "enabled capabilities for version"
if epc.procs[i].cfg.isProxy {
readyStr = "httpproxy: endpoints found"
}

if _, err = epc.procs[i].proc.Expect(readyStr); err != nil {
epc.Close()
return err
}
close(epc.procs[i].donec)

return nil
}

func (epc *etcdProcessCluster) StopAll() (err error) {
for _, p := range epc.procs {
if p == nil {
continue
Expand All @@ -380,8 +416,22 @@ func (epc *etcdProcessCluster) Stop() (err error) {
return err
}

func (epc *etcdProcessCluster) Stop(i int) error {
p := epc.procs[i]
if p == nil {
return nil
}

if err := p.proc.Stop(); err != nil {
return err
}

<-p.donec
return nil
}

func (epc *etcdProcessCluster) Close() error {
err := epc.Stop()
err := epc.StopAll()
for _, p := range epc.procs {
os.RemoveAll(p.cfg.dataDirPath)
}
Expand Down

0 comments on commit 255aa7f

Please sign in to comment.