Files
tidb/ddl/util/syncer_test.go

223 lines
6.6 KiB
Go

// Copyright 2019 PingCAP, Inc.
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
package util_test
import (
"context"
"fmt"
"runtime"
"testing"
"time"
"github.com/pingcap/errors"
. "github.com/pingcap/tidb/ddl"
. "github.com/pingcap/tidb/ddl/util"
"github.com/pingcap/tidb/infoschema"
"github.com/pingcap/tidb/owner"
"github.com/pingcap/tidb/parser/terror"
"github.com/pingcap/tidb/store/mockstore"
"github.com/pingcap/tidb/util"
"github.com/stretchr/testify/require"
"go.etcd.io/etcd/clientv3"
"go.etcd.io/etcd/etcdserver"
"go.etcd.io/etcd/integration"
"go.etcd.io/etcd/mvcc/mvccpb"
"google.golang.org/grpc/codes"
"google.golang.org/grpc/status"
)
const minInterval = 10 * time.Nanosecond // It's used to test timeout.
const testLease = 5 * time.Millisecond
func TestSyncerSimple(t *testing.T) {
if runtime.GOOS == "windows" {
t.Skip("integration.NewClusterV3 will create file contains a colon which is not allowed on Windows")
}
origin := CheckVersFirstWaitTime
CheckVersFirstWaitTime = 0
defer func() {
CheckVersFirstWaitTime = origin
}()
store, err := mockstore.NewMockStore()
require.NoError(t, err)
defer func() { require.NoError(t, store.Close()) }()
cluster := integration.NewClusterV3(t, &integration.ClusterConfig{Size: 1})
defer cluster.Terminate(t)
cli := cluster.RandClient()
ctx, cancel := context.WithCancel(context.Background())
defer cancel()
ic := infoschema.NewCache(2)
ic.Insert(infoschema.MockInfoSchemaWithSchemaVer(nil, 0), 0)
d := NewDDL(
ctx,
WithEtcdClient(cli),
WithStore(store),
WithLease(testLease),
WithInfoCache(ic),
)
require.NoError(t, d.Start(nil))
defer func() {
require.NoError(t, d.Stop())
}()
// for init function
require.NoError(t, d.SchemaSyncer().Init(ctx))
resp, err := cli.Get(ctx, DDLAllSchemaVersions, clientv3.WithPrefix())
require.NoError(t, err)
key := DDLAllSchemaVersions + "/" + d.OwnerManager().ID()
checkRespKV(t, 1, key, InitialVersion, resp.Kvs...)
// for MustGetGlobalVersion function
globalVer, err := d.SchemaSyncer().MustGetGlobalVersion(ctx)
require.NoError(t, err)
require.Equal(t, InitialVersion, fmt.Sprintf("%d", globalVer))
childCtx, cancel := context.WithTimeout(ctx, minInterval)
defer cancel()
_, err = d.SchemaSyncer().MustGetGlobalVersion(childCtx)
require.True(t, isTimeoutError(err))
ic2 := infoschema.NewCache(2)
ic2.Insert(infoschema.MockInfoSchemaWithSchemaVer(nil, 0), 0)
d1 := NewDDL(
ctx,
WithEtcdClient(cli),
WithStore(store),
WithLease(testLease),
WithInfoCache(ic2),
)
require.NoError(t, d1.Start(nil))
defer func() {
require.NoError(t, d1.Stop())
}()
require.NoError(t, d1.SchemaSyncer().Init(ctx))
// for watchCh
var wg util.WaitGroupWrapper
currentVer := int64(123)
var checkErr string
wg.Run(func() {
select {
case resp := <-d.SchemaSyncer().GlobalVersionCh():
if len(resp.Events) < 1 {
checkErr = "get chan events count less than 1"
return
}
checkRespKV(t, 1, DDLGlobalSchemaVersion, fmt.Sprintf("%v", currentVer), resp.Events[0].Kv)
case <-time.After(3 * time.Second):
checkErr = "get update version failed"
return
}
})
// for update latestSchemaVersion
require.NoError(t, d.SchemaSyncer().OwnerUpdateGlobalVersion(ctx, currentVer))
wg.Wait()
require.Equal(t, "", checkErr)
// for CheckAllVersions
childCtx, cancel = context.WithTimeout(ctx, 200*time.Millisecond)
require.Error(t, d.SchemaSyncer().OwnerCheckAllVersions(childCtx, currentVer))
cancel()
// for UpdateSelfVersion
require.NoError(t, d.SchemaSyncer().UpdateSelfVersion(context.Background(), currentVer))
require.NoError(t, d1.SchemaSyncer().UpdateSelfVersion(context.Background(), currentVer))
childCtx, cancel = context.WithTimeout(ctx, minInterval)
defer cancel()
err = d1.SchemaSyncer().UpdateSelfVersion(childCtx, currentVer)
require.True(t, isTimeoutError(err))
// for CheckAllVersions
require.NoError(t, d.SchemaSyncer().OwnerCheckAllVersions(context.Background(), currentVer-1))
require.NoError(t, d.SchemaSyncer().OwnerCheckAllVersions(context.Background(), currentVer))
childCtx, cancel = context.WithTimeout(ctx, minInterval)
defer cancel()
err = d.SchemaSyncer().OwnerCheckAllVersions(childCtx, currentVer)
require.True(t, isTimeoutError(err))
// for StartCleanWork
ttl := 10
// Make sure NeededCleanTTL > ttl, then we definitely clean the ttl.
NeededCleanTTL = int64(11)
ttlKey := "session_ttl_key"
ttlVal := "session_ttl_val"
session, err := owner.NewSession(ctx, "", cli, owner.NewSessionDefaultRetryCnt, ttl)
require.NoError(t, err)
require.NoError(t, PutKVToEtcd(context.Background(), cli, 5, ttlKey, ttlVal, clientv3.WithLease(session.Lease())))
// Make sure the ttlKey is existing in etcd.
resp, err = cli.Get(ctx, ttlKey)
require.NoError(t, err)
checkRespKV(t, 1, ttlKey, ttlVal, resp.Kvs...)
d.SchemaSyncer().NotifyCleanExpiredPaths()
// Make sure the clean worker is done.
notifiedCnt := 1
for i := 0; i < 100; i++ {
isNotified := d.SchemaSyncer().NotifyCleanExpiredPaths()
if isNotified {
notifiedCnt++
}
// notifyCleanExpiredPathsCh's length is 1,
// so when notifiedCnt is 3, we can make sure the clean worker is done at least once.
if notifiedCnt == 3 {
break
}
time.Sleep(20 * time.Millisecond)
}
require.Equal(t, 3, notifiedCnt)
// Make sure the ttlKey is removed in etcd.
resp, err = cli.Get(ctx, ttlKey)
require.NoError(t, err)
checkRespKV(t, 0, ttlKey, "", resp.Kvs...)
// for Close
resp, err = cli.Get(context.Background(), key)
require.NoError(t, err)
currVer := fmt.Sprintf("%v", currentVer)
checkRespKV(t, 1, key, currVer, resp.Kvs...)
d.SchemaSyncer().Close()
resp, err = cli.Get(context.Background(), key)
require.NoError(t, err)
require.Len(t, resp.Kvs, 0)
}
func isTimeoutError(err error) bool {
return terror.ErrorEqual(err, context.DeadlineExceeded) ||
status.Code(errors.Cause(err)) == codes.DeadlineExceeded ||
terror.ErrorEqual(err, etcdserver.ErrTimeout)
}
func checkRespKV(t *testing.T, kvCount int, key, val string, kvs ...*mvccpb.KeyValue) {
require.Len(t, kvs, kvCount)
if kvCount == 0 {
return
}
kv := kvs[0]
require.Equal(t, key, string(kv.Key))
require.Equal(t, val, string(kv.Value))
}