diff --git a/extra/dist/tarantoolctl b/extra/dist/tarantoolctl index 0011525a0c02788d581887d80fc58f36fad962ac..0fd78576b89c76808a4f17c446e34634bc173fae 100755 --- a/extra/dist/tarantoolctl +++ b/extra/dist/tarantoolctl @@ -103,6 +103,8 @@ local socket = require 'socket' local ffi = require 'ffi' local os = require 'os' local fiber = require 'fiber' +local digest = require 'digest' +local urilib = require 'uri' ffi.cdef[[ int kill(int pid, int sig); ]] @@ -291,6 +293,21 @@ local function mkdir(dirname) end end +local function read_file(filename) + local file = fio.open(filename, {'O_RDONLY'}) + local buf = {} + local i = 1 + + while true do + buf[i] = file:read(1024) + if buf[i] == '' then + break + end + i = i + 1 + end + return table.concat(buf) +end + function mk_default_dirs(cfg) -- create pid_dir pid_dir = fio.dirname(cfg.pid_file) @@ -495,17 +512,35 @@ elseif cmd == 'status' then print(instance_name .. ' is running (pid:' .. default_cfg.pid_file .. ')') os.exit(0) elseif cmd == 'reload' then - if arg[1] == nil then + local filename = arg[1] + if filename == nil then log.error("Usage: tarantoolctl reload instance_name file.lua") os.exit(1) end - if fio.stat(arg[1]) == nil then + if fio.stat(filename) == nil then if errno() == errno.ENOENT then - print(arg[1] .. ': file not found') + print(filename .. ': file not found') os.exit(1) end end - dofile(arg[1]) + content = digest.base64_encode(read_file(filename)) + + if fio.stat(console_sock) == nil then + log.warn("pid file exists, but the control socket (%s) doesn't", + console_sock) + os.exit(2) + end + + local u = urilib.parse(console_sock) + local remote = require('net.box'):new(u.host, u.service, + { user = u.login, password = u.password }) + local code = string.format( + 'loadstring(require("digest").base64_decode([[%s]]))()', + content + ) + remote:console(code) + + os.exit(0) else log.error("Unknown command '%s'", cmd) os.exit(-1) diff --git a/src/box/box.cc b/src/box/box.cc index d151548230abd90ea208bcd90a7333794f5c90aa..fb83de3f3bb0c4da41aa466f17bc86dc9db40989 100644 --- a/src/box/box.cc +++ b/src/box/box.cc @@ -456,14 +456,14 @@ box_init(void) /* Initialize a new replica */ engine_begin_join(); replica_bootstrap(recovery); - int64_t checkpoint_id = vclock_signature(&recovery->vclock); + int64_t checkpoint_id = vclock_sum(&recovery->vclock); engine_checkpoint(checkpoint_id); } else { /* Initialize the first server of a new cluster */ recovery_bootstrap(recovery); box_set_cluster_uuid(); box_set_server_uuid(); - int64_t checkpoint_id = vclock_signature(&recovery->vclock); + int64_t checkpoint_id = vclock_sum(&recovery->vclock); engine_checkpoint(checkpoint_id); } fiber_gc(); @@ -518,7 +518,7 @@ int box_snapshot() { /* create snapshot file */ - int64_t checkpoint_id = vclock_signature(&recovery->vclock); + int64_t checkpoint_id = vclock_sum(&recovery->vclock); return engine_checkpoint(checkpoint_id); } diff --git a/src/box/errcode.h b/src/box/errcode.h index fc4966ca936779b8a32110ce807c0279afd75dc1..68f770db0715b47ceec4e50ba4909223b34a2bd3 100644 --- a/src/box/errcode.h +++ b/src/box/errcode.h @@ -149,6 +149,7 @@ struct errcode_record { /* 95 */_(ER_UPDATE_INTEGER_OVERFLOW, 2, "Integer overflow when performing '%c' operation on field %u") \ /* 96 */_(ER_GUEST_USER_PASSWORD, 2, "Setting password for guest user has no effect") \ /* 97 */_(ER_TRANSACTION_CONFLICT, 2, "Transaction has been aborted by conflict") \ + /* 98 */_(ER_UNSUPPORTED_ROLE_PRIV, 2, "Unsupported role privilege '%s'") \ /* * !IMPORTANT! Please follow instructions at start of the file diff --git a/src/box/lua/schema.lua b/src/box/lua/schema.lua index d083db824187029bfa35ab08bf712a90af8f75d2..73da4e7e312d1bca6872a2c86015a3a05f8d2000 100644 --- a/src/box/lua/schema.lua +++ b/src/box/lua/schema.lua @@ -891,6 +891,14 @@ local function privilege_resolve(privilege) return numeric end +local function checked_privilege(privilege, object_type) + local priv_hex = privilege_resolve(privilege) + if object_type == 'role' and priv_hex ~= 4 then + box.error(box.error.UNSUPPORTED_ROLE_PRIV, privilege) + end + return priv_hex +end + local function privilege_name(privilege) local names = {} if bit.band(privilege, 1) ~= 0 then @@ -1092,13 +1100,10 @@ local function grant(uid, name, privilege, object_type, -- named 'execute' object_type = 'role' object_name = privilege - end - -- sanitize privilege type for role object type - if object_type == 'role' then privilege = 'execute' end + local privilege_hex = checked_privilege(privilege, object_type) - privilege_hex = privilege_resolve(privilege) local oid = object_resolve(object_type, object_name) if options == nil then options = {} @@ -1142,10 +1147,10 @@ local function revoke(uid, name, privilege, object_type, object_name, options) if object_name == nil and object_type == nil then object_type = 'role' object_name = privilege - -- revoke everything possible from role, - -- to prevent stupid mistakes with privilege name - privilege = 'read,write,execute' + privilege = 'execute' end + local privilege_hex = checked_privilege(privilege, object_type) + if options == nil then options = {} end @@ -1166,16 +1171,15 @@ local function revoke(uid, name, privilege, object_type, object_name, options) object_type, object_name) end end - privilege = privilege_resolve(privilege) local old_privilege = tuple[5] local grantor = tuple[1] -- sic: -- a user may revoke more than he/she granted -- (erroneous user input) -- - privilege = bit.band(old_privilege, bit.bnot(privilege)) - if privilege ~= 0 then - _priv:replace{grantor, uid, object_type, oid, privilege} + privilege_hex = bit.band(old_privilege, bit.bnot(privilege_hex)) + if privilege_hex ~= 0 then + _priv:replace{grantor, uid, object_type, oid, privilege_hex} else _priv:delete{uid, object_type, oid} end diff --git a/src/box/memtx_engine.cc b/src/box/memtx_engine.cc index bd905a1ee0e5f00ea96509a5175af850e4e6ee68..8647dadd432dec12f366249e0c13b2e262705215 100644 --- a/src/box/memtx_engine.cc +++ b/src/box/memtx_engine.cc @@ -267,7 +267,7 @@ recover_snap(struct recovery_state *r) */ if (res == NULL) tnt_raise(ClientError, ER_MISSING_SNAPSHOT); - int64_t signature = vclock_signature(res); + int64_t signature = vclock_sum(res); struct xlog *snap = xlog_open(&r->snap_dir, signature); auto guard = make_scoped_guard([=]{ diff --git a/src/box/recovery.cc b/src/box/recovery.cc index 1333f19d681c5ca397b4523dd790be6bafcfc39f..95c2bcaf1c062c22ef43a72fecab7e596219c564 100644 --- a/src/box/recovery.cc +++ b/src/box/recovery.cc @@ -169,7 +169,6 @@ recovery_new(const char *snap_dirname, const char *wal_dirname, r->apply_row = apply_row; r->apply_row_param = apply_row_param; - r->signature = -1; r->snap_io_rate_limit = UINT64_MAX; xdir_create(&r->snap_dir, snap_dirname, SNAP, &r->server_uuid); @@ -221,6 +220,14 @@ recovery_setup_panic(struct recovery_state *r, bool on_snap_error, static inline void recovery_close_log(struct recovery_state *r) { + if (r->current_wal == NULL) + return; + if (r->current_wal->eof_read) { + say_info("done `%s'", r->current_wal->filename); + } else { + say_warn("file `%s` wasn't correctly closed", + r->current_wal->filename); + } xlog_close(r->current_wal); r->current_wal = NULL; } @@ -263,13 +270,12 @@ recovery_apply_row(struct recovery_state *r, struct xrow_header *row) r->apply_row(r, r->apply_row_param, row); } -#define LOG_EOF 0 - /** - * @retval 0 OK, read full xlog. - * @retval 1 OK, read some but not all rows, or no EOF marker + * Read all rows in a file starting from the last position. + * Advance the position. If end of file is reached, + * set l.eof_read. */ -int +void recover_xlog(struct recovery_state *r, struct xlog *l) { struct xlog_cursor i; @@ -281,6 +287,12 @@ recover_xlog(struct recovery_state *r, struct xlog *l) }); struct xrow_header row; + /* + * xlog_cursor_next() returns 1 when + * it can not read more rows. This doesn't mean + * the file is fully read: it's fully read only + * when EOF marker has been read, see i.eof_read + */ while (xlog_cursor_next(&i, &row) == 0) { try { recovery_apply_row(r, &row); @@ -301,15 +313,6 @@ recover_xlog(struct recovery_state *r, struct xlog *l) panic("snapshot `%s' has no EOF marker", l->filename); } - /* - * xlog_cursor_next() returns 1 when - * it can not read more rows. This doesn't mean - * the file is fully read: it's fully read only - * when EOF marker has been read. This is - * why eof_read is used here to indicate the - * end of log. - */ - return !i.eof_read; } void @@ -331,7 +334,8 @@ recovery_bootstrap(struct recovery_state *r) recover_xlog(r, snap); } -/** Find out if there are new .xlog files since the current +/** + * Find out if there are new .xlog files since the current * LSN, and read them all up. * * This function will not close r->current_wal if @@ -342,75 +346,65 @@ recover_remaining_wals(struct recovery_state *r) { xdir_scan(&r->wal_dir); - struct vclock *last_vclock = vclockset_last(&r->wal_dir.index); - int64_t last_signature = last_vclock != NULL ? - vclock_signature(last_vclock) : -1; + struct vclock *last = vclockset_last(&r->wal_dir.index); + if (last == NULL) { + assert(r->current_wal == NULL); + /** Nothing to do. */ + return; + } + assert(vclockset_next(&r->wal_dir.index, last) == NULL); + /* If the caller already opened WAL for us, recover from it first */ - struct vclock *current_vclock; + struct vclock *clock; if (r->current_wal != NULL) { - current_vclock = &r->current_wal->vclock; - goto recover_current_wal; + clock = vclockset_match(&r->wal_dir.index, + &r->current_wal->vclock); + if (clock != NULL && + vclock_compare(clock, &r->current_wal->vclock) == 0) + goto recover_current_wal; + /* + * The current WAL has disappeared under our feet - + * assume anything can happen in production and go + * on. + */ + assert(false); } - while (1) { - current_vclock = - vclockset_match(&r->wal_dir.index, &r->vclock, - r->wal_dir.panic_if_error); - if (current_vclock == NULL) - break; /* No more WALs */ - - if (vclock_signature(current_vclock) <= r->signature) { - if (r->signature == last_signature) - break; - say_error("missing xlog between %020lld and %020lld", - (long long) vclock_signature(current_vclock), - (long long) last_signature); - if (r->wal_dir.panic_if_error) - break; + for (clock = vclockset_match(&r->wal_dir.index, &r->vclock); + clock != NULL; + clock = vclockset_next(&r->wal_dir.index, clock)) { - /* Ignore missing WALs */ - say_warn("ignoring missing WALs"); - current_vclock = vclockset_next(&r->wal_dir.index, - current_vclock); - assert(current_vclock != NULL); - } - assert(r->current_wal == NULL); - try { - r->current_wal = xlog_open(&r->wal_dir, - vclock_signature(current_vclock)); - } catch (XlogError *e) { + if (vclock_compare(clock, &r->vclock) > 0) { + /** + * The best clock we could find is + * greater or is incomparable with the + * current state of recovery. + */ + XlogGapError *e = + tnt_error(XlogGapError, &r->vclock, clock); + + if (r->wal_dir.panic_if_error) + throw e; e->log(); - break; + /* Ignore missing WALs */ + say_warn("ignoring a gap in LSN"); } + recovery_close_log(r); + + r->current_wal = xlog_open(&r->wal_dir, vclock_sum(clock)); + say_info("recover from `%s'", r->current_wal->filename); recover_current_wal: - r->signature = vclock_signature(current_vclock); - int result = recover_xlog(r, r->current_wal); - - if (result == LOG_EOF) { - say_info("done `%s'", r->current_wal->filename); - recovery_close_log(r); - /* goto find_next_wal; */ - } else if (r->signature == last_signature) { - /* last file is not finished */ - break; - } else { - say_warn("WAL `%s` wasn't correctly closed", - r->current_wal->filename); - recovery_close_log(r); - } - } - - /* - * It's not a fatal error when last WAL is empty, but if - * we lose some logs it is a fatal error. - */ - if (last_signature > r->signature) { - tnt_raise(XlogError, - "not all WALs have been successfully read"); + if (r->current_wal->eof_read == false) + recover_xlog(r, r->current_wal); + /** + * Keep the last log open to remember recovery + * position. This speeds up recovery in local hot + * standby mode, since we don't have to re-open + * and re-scan the last log in recovery_finalize(). + */ } - region_free(&fiber()->gc); } @@ -422,15 +416,11 @@ recovery_finalize(struct recovery_state *r, enum wal_mode wal_mode, recover_remaining_wals(r); - if (r->current_wal != NULL) { - say_warn("WAL `%s' wasn't correctly closed", - r->current_wal->filename); - recovery_close_log(r); - } + recovery_close_log(r); if (vclockset_last(&r->wal_dir.index) != NULL && - vclock_signature(&r->vclock) == - vclock_signature(vclockset_last(&r->wal_dir.index))) { + vclock_sum(&r->vclock) == + vclock_sum(vclockset_last(&r->wal_dir.index))) { /** * The last log file had zero rows -> bump * LSN so that we don't stumble over this @@ -957,8 +947,10 @@ wal_writer_thread(void *worker_args) ev_async_send(writer->txn_loop, &writer->write_event); } (void) tt_pthread_mutex_unlock(&writer->mutex); - if (r->current_wal != NULL) - recovery_close_log(r); + if (r->current_wal != NULL) { + xlog_close(r->current_wal); + r->current_wal = NULL; + } return NULL; } @@ -975,7 +967,7 @@ wal_write(struct recovery_state *r, struct xrow_header *row) */ fill_lsn(r, row); if (r->wal_mode == WAL_NONE) - return vclock_signature(&r->vclock); + return vclock_sum(&r->vclock); ERROR_INJECT_RETURN(ERRINJ_WAL_IO); @@ -1011,7 +1003,7 @@ wal_write(struct recovery_state *r, struct xrow_header *row) fiber_set_cancellable(cancellable); if (req->res == -1) return -1; - return vclock_signature(&r->vclock); + return vclock_sum(&r->vclock); } /* }}} */ @@ -1023,7 +1015,7 @@ recovery_last_checkpoint(struct recovery_state *r) { /* recover last snapshot lsn */ struct vclock *vclock = vclockset_last(&r->snap_dir.index); - return vclock ? vclock_signature(vclock) : -1; + return vclock ? vclock_sum(vclock) : -1; } /* }}} */ diff --git a/src/box/recovery.h b/src/box/recovery.h index 93c5c2eb7e942d83b1960260965d0c7a89e7792e..9aae1746b39b3d230102869f77f8fdc222936587 100644 --- a/src/box/recovery.h +++ b/src/box/recovery.h @@ -85,8 +85,6 @@ struct recovery_state { struct xlog *current_wal; struct xdir snap_dir; struct xdir wal_dir; - /** Used to find missing xlog files */ - int64_t signature; struct wal_writer *writer; /** * This is used in local hot standby or replication @@ -132,7 +130,7 @@ recovery_has_data(struct recovery_state *r) vclockset_first(&r->wal_dir.index) != NULL; } void recovery_bootstrap(struct recovery_state *r); -int +void recover_xlog(struct recovery_state *r, struct xlog *l); void recovery_follow_local(struct recovery_state *r, const char *name, diff --git a/src/box/sophia_engine.cc b/src/box/sophia_engine.cc index dac9e99ab48a9157b26a40e954f92c52801926d8..6bccf5578505147d0a1a289b0d11bbf6cd50bbe1 100644 --- a/src/box/sophia_engine.cc +++ b/src/box/sophia_engine.cc @@ -165,7 +165,7 @@ SophiaEngine::join(Relay *relay) struct vclock *res = vclockset_last(&relay->r->snap_dir.index); if (res == NULL) tnt_raise(ClientError, ER_MISSING_SNAPSHOT); - int64_t signt = vclock_signature(res); + int64_t signt = vclock_sum(res); /* get snapshot object */ char id[128]; diff --git a/src/box/vclock.c b/src/box/vclock.c index 2d0cfbe08e7e82b853754eec307a67fe2eff9c83..49d62e0d532086e3588cb82a4e0b8a2e8a858212 100644 --- a/src/box/vclock.c +++ b/src/box/vclock.c @@ -181,7 +181,7 @@ vclock_from_string(struct vclock *vclock, const char *str) goto error; end: if (*p == '\0') { - vclock->signature = vclock_sum(vclock); + vclock->signature = vclock_calc_sum(vclock); return 0; } else if (isblank(*p)) { ++p; diff --git a/src/box/vclock.h b/src/box/vclock.h index 6c1eb35f8b5d648b7d4f5f0451ccd5ebd8f046e2..e0cbe1952b93b588afca81195d6fcfd1967da40b 100644 --- a/src/box/vclock.h +++ b/src/box/vclock.h @@ -131,7 +131,7 @@ vclock_size(const struct vclock *vclock) } static inline int64_t -vclock_sum(const struct vclock *vclock) +vclock_calc_sum(const struct vclock *vclock) { int64_t sum = 0; struct vclock_iterator it; @@ -142,7 +142,7 @@ vclock_sum(const struct vclock *vclock) } static inline int64_t -vclock_signature(const struct vclock *vclock) +vclock_sum(const struct vclock *vclock) { return vclock->signature; } @@ -229,17 +229,16 @@ rb_proto(, vclockset_, vclockset_t, struct vclock); * @return a vclock that <= than \a key */ static inline struct vclock * -vclockset_match(vclockset_t *set, struct vclock *key, - bool panic_if_error) +vclockset_match(vclockset_t *set, struct vclock *key) { struct vclock *match = vclockset_psearch(set, key); /** * vclockset comparator returns 0 for - * incomparable keys. So the match doesn't have to be + * incomparable keys, rendering them equal. + * So the match, even when found, is not necessarily * strictly preceding the search key, it may be - * incomparable. If this is the case, unwind until - * we get to a key which is strictly below the search - * pattern. + * incomparable. If this is the case, unwind until we get + * to a key which is strictly below the search pattern. */ while (match != NULL) { if (vclock_compare(match, key) <= 0) @@ -249,10 +248,10 @@ vclockset_match(vclockset_t *set, struct vclock *key, } /* * There is no xlog which is strictly less than the search - * pattern. Return the fist successor log - it is either + * pattern. Return the first log - it is either * strictly greater, or incomparable with the key. */ - return panic_if_error ? NULL: vclockset_first(set); + return vclockset_first(set); } #if defined(__cplusplus) @@ -293,7 +292,7 @@ vclock_del_server(struct vclock *vclock, uint32_t server_id) assert(vclock_has(vclock, server_id)); vclock->lsn[server_id] = 0; vclock->map &= ~(1 << server_id); - vclock->signature = vclock_sum(vclock); + vclock->signature = vclock_calc_sum(vclock); } #endif /* defined(__cplusplus) */ diff --git a/src/box/xlog.cc b/src/box/xlog.cc index dbe5cc6418d653a7858b4b50bd080f370d400371..2b804114267371b48184f0eb7aaf7379d4dfced4 100644 --- a/src/box/xlog.cc +++ b/src/box/xlog.cc @@ -64,6 +64,21 @@ XlogError::XlogError(const char *file, unsigned line, va_end(ap); } +XlogGapError::XlogGapError(const char *file, unsigned line, + const struct vclock *from, + const struct vclock *to) + :XlogError(file, line, "") +{ + char *s_from = vclock_to_string(from); + char *s_to = vclock_to_string(to); + snprintf(m_errmsg, sizeof(m_errmsg), + "Missing .xlog file between LSN %lld %s and %lld %s", + (long long) vclock_sum(from), s_from ? s_from : "", + (long long) vclock_sum(to), s_to ? s_to : ""); + free(s_from); + free(s_to); +} + /* {{{ struct xdir */ void @@ -290,7 +305,7 @@ xdir_scan(struct xdir *dir) struct vclock *vclock = vclockset_first(&dir->index); int i = 0; while (i < s_count || vclock != NULL) { - int64_t s_old = vclock ? vclock_signature(vclock) : LLONG_MAX; + int64_t s_old = vclock ? vclock_sum(vclock) : LLONG_MAX; int64_t s_new = i < s_count ? signatures[i] : LLONG_MAX; if (s_old < s_new) { /** Remove a deleted file from the index */ @@ -465,6 +480,7 @@ xlog_cursor_close(struct xlog_cursor *i) { struct xlog *l = i->log; l->rows += i->row_count; + l->eof_read = i->eof_read; /* * Since we don't close the xlog * we must rewind it to the last known @@ -764,7 +780,7 @@ xlog_read_meta(struct xlog *l, int64_t signature) * the sum of vector clock coordinates must be the same * as the name of the file. */ - int64_t signature_check = vclock_signature(&l->vclock); + int64_t signature_check = vclock_sum(&l->vclock); if (signature_check != signature) { tnt_raise(XlogError, "%s: signature check failed", l->filename); @@ -796,6 +812,7 @@ xlog_open_stream(struct xdir *dir, int64_t signature, FILE *file, const char *fi l->mode = LOG_READ; l->dir = dir; l->is_inprogress = false; + l->eof_read = false; vclock_create(&l->vclock); xlog_read_meta(l, signature); @@ -847,7 +864,7 @@ xlog_create(struct xdir *dir, const struct vclock *vclock) FILE *f = NULL; struct xlog *l = NULL; - int64_t signature = vclock_signature(vclock); + int64_t signature = vclock_sum(vclock); assert(signature >= 0); assert(!tt_uuid_is_nil(dir->server_uuid)); @@ -884,6 +901,8 @@ xlog_create(struct xdir *dir, const struct vclock *vclock) l->mode = LOG_WRITE; l->dir = dir; l->is_inprogress = true; + /* Makes no sense, but well. */ + l->eof_read = false; vclock_copy(&l->vclock, vclock); setvbuf(l->f, NULL, _IONBF, 0); if (xlog_write_meta(l) != 0) diff --git a/src/box/xlog.h b/src/box/xlog.h index 56b7a5200fdedaaf8b35bf260981e67a53a945ae..8ddea5574212dbf01c4c3799d007188ec1d1ae15 100644 --- a/src/box/xlog.h +++ b/src/box/xlog.h @@ -45,6 +45,13 @@ struct XlogError: public Exception const char *format, ...); }; +struct XlogGapError: public XlogError +{ + XlogGapError(const char *file, unsigned line, + const struct vclock *from, + const struct vclock *to); +}; + /* {{{ log dir */ /** @@ -182,6 +189,8 @@ struct xlog { char filename[PATH_MAX + 1]; /** Whether this file has .inprogress suffix. */ bool is_inprogress; + /** True if eof has been read when reading the log. */ + bool eof_read; /** * Text file header: server uuid. We read * only logs with our own uuid, to avoid situations diff --git a/src/fiber.cc b/src/fiber.cc index 22c0d12d68924e04711f68779f76e23f46363eb1..f83ce7ac1ab36240c74e100ed2b950be0eb4edaf 100644 --- a/src/fiber.cc +++ b/src/fiber.cc @@ -410,7 +410,12 @@ fiber_loop(void *data __attribute__((unused))) fiber_name(fiber)); say_info("fiber `%s': exiting", fiber_name(fiber)); } catch (Exception *e) { - e->log(); + /* + * For joinable fibers, it's the business + * of the caller to deal with the error. + */ + if (! (fiber->flags & FIBER_IS_JOINABLE)) + e->log(); } catch (...) { /* This can only happen in case of a server bug. */ say_error("fiber `%s': unknown exception", diff --git a/test/box/misc.result b/test/box/misc.result index e9478633bcce95481d2546de82437c0f11a995f3..a1d7c595988c68d674142099c8f743f89793c585 100644 --- a/test/box/misc.result +++ b/test/box/misc.result @@ -253,10 +253,11 @@ t; - 'box.error.CROSS_ENGINE_TRANSACTION : 81' - 'box.error.MODIFY_INDEX : 14' - 'box.error.TUPLE_FOUND : 3' + - 'box.error.FIELD_TYPE : 23' - 'box.error.PASSWORD_MISMATCH : 47' - 'box.error.TRANSACTION_CONFLICT : 97' - 'box.error.NO_SUCH_ENGINE : 57' - - 'box.error.FIELD_TYPE : 23' + - 'box.error.UNSUPPORTED_ROLE_PRIV : 98' - 'box.error.ACCESS_DENIED : 42' - 'box.error.UPDATE_INTEGER_OVERFLOW : 95' - 'box.error.LAST_DROP : 15' diff --git a/test/box/role.result b/test/box/role.result index fb57098b0d9bf9d1bdccdf307a9a2cc5879ea95b..22ca8e0e2f3b891356707024bde6f4d452f949d1 100644 --- a/test/box/role.result +++ b/test/box/role.result @@ -67,11 +67,11 @@ box.schema.user.grant('tester', 'execute', 'role', 'tester') -- test granting a non-execute grant on a role - error box.schema.user.grant('tester', 'write', 'role', 'iddqd') --- -- error: User 'tester' already has role 'iddqd' +- error: Unsupported role privilege 'write' ... box.schema.user.grant('tester', 'read', 'role', 'iddqd') --- -- error: User 'tester' already has role 'iddqd' +- error: Unsupported role privilege 'read' ... -- test granting role to a role box.schema.role.grant('iddqd', 'execute', 'role', 'iddqd') @@ -869,3 +869,30 @@ box.schema.role.drop('role', 'role') box.schema.user.drop('test', { if_exists = true}) --- ... +-- gh-663: inconsistent roles grant/revoke +box.schema.role.create('X1') +--- +... +box.schema.role.create('X2') +--- +... +box.schema.role.info('X1') +--- +- [] +... +box.schema.role.grant('X1','read','role','X2') +--- +- error: Unsupported role privilege 'read' +... +box.schema.role.info('X1') +--- +- [] +... +box.schema.role.revoke('X1','read','role','X2') +--- +- error: Unsupported role privilege 'read' +... +box.schema.role.info('X1') +--- +- [] +... diff --git a/test/box/role.test.lua b/test/box/role.test.lua index d157ab0545096d4df581e0ffcc72396875909f45..86cc146c8923d00f4b4b86b35c4160ad97afa0a1 100644 --- a/test/box/role.test.lua +++ b/test/box/role.test.lua @@ -343,3 +343,12 @@ box.schema.user.drop('test', { if_not_exists = true}) box.schema.role.create('role', 'role') box.schema.role.drop('role', 'role') box.schema.user.drop('test', { if_exists = true}) + +-- gh-663: inconsistent roles grant/revoke +box.schema.role.create('X1') +box.schema.role.create('X2') +box.schema.role.info('X1') +box.schema.role.grant('X1','read','role','X2') +box.schema.role.info('X1') +box.schema.role.revoke('X1','read','role','X2') +box.schema.role.info('X1') diff --git a/test/unit/fiber.result b/test/unit/fiber.result index 66e6d3e914e846b7c4dbd64c856fd4d3add22e5f..e0a1605f8c6ac393cc9920b3fc771cc0d60c74d0 100644 --- a/test/unit/fiber.result +++ b/test/unit/fiber.result @@ -1,7 +1,5 @@ (null): fiber `cancel' has been cancelled (null): fiber `cancel': exiting -(null): SystemError Failed to allocate 42 bytes in allocator for exception: Cannot allocate memory -(null): SystemError Failed to allocate 42 bytes in allocator for exception: Cannot allocate memory *** fiber_join_test *** # exception propagated # cancel dead has started diff --git a/test/unit/vclock.cc b/test/unit/vclock.cc index a73d6abb374346046d276b98ae7376a8338a17b2..913f5dcbd0e0cf264995d6a6472229ba812e97db 100644 --- a/test/unit/vclock.cc +++ b/test/unit/vclock.cc @@ -156,9 +156,9 @@ test_isearch() int64_t queries[][NODE_N + 1] = { /* not found (lsns are too old) */ - { 0, 0, 0, 0, /* => */ INT64_MAX}, - { 1, 0, 0, 0, /* => */ INT64_MAX}, - { 5, 0, 0, 0, /* => */ INT64_MAX}, + { 0, 0, 0, 0, /* => */ 10}, + { 1, 0, 0, 0, /* => */ 10}, + { 5, 0, 0, 0, /* => */ 10}, /* =10.xlog (left bound) */ { 10, 0, 0, 0, /* => */ 10}, @@ -230,8 +230,8 @@ test_isearch() } int64_t check = *(query + NODE_N); - struct vclock *res = vclockset_match(&set, &vclock, true); - int64_t value = res != NULL ? vclock_signature(res) : INT64_MAX; + struct vclock *res = vclockset_match(&set, &vclock); + int64_t value = res != NULL ? vclock_sum(res) : INT64_MAX; is(value, check, "query #%d", q + 1); } diff --git a/test/xlog/errinj.result b/test/xlog/errinj.result index 84ac4d54f193a8bb938094d464364181621f28ab..28e4ad5f4364976286e46e8fb1d779761f8c9dfc 100644 --- a/test/xlog/errinj.result +++ b/test/xlog/errinj.result @@ -34,6 +34,7 @@ box.space._schema:delete{"key"} --- - ['key'] ... +-- list all the logs require('fio').glob("*.xlog") --- - - 00000000000000000000.xlog diff --git a/test/xlog/errinj.test.lua b/test/xlog/errinj.test.lua index 81e17ec91b0f5cdac9b71d1b34b732e3a8aed69b..8666ae3207e76d72616f37963d81661f612c217a 100644 --- a/test/xlog/errinj.test.lua +++ b/test/xlog/errinj.test.lua @@ -19,6 +19,7 @@ box.space._schema:insert{"key"} --# start server dont_panic box.space._schema:get{"key"} box.space._schema:delete{"key"} +-- list all the logs require('fio').glob("*.xlog") --# stop server dont_panic --# cleanup server dont_panic diff --git a/test/xlog/lsn_gap.result b/test/xlog/lsn_gap.result index 69d1de749e3474a4c68a5a5a9844d6dc6c305d9d..685fc1efa85aa2d0b44b3f778daf06eca18d799c 100644 --- a/test/xlog/lsn_gap.result +++ b/test/xlog/lsn_gap.result @@ -20,9 +20,9 @@ box.space.test:insert{4, 'fourth tuple'} --- - [4, 'fourth tuple'] ... -check log line for 'ignoring missing WAL' +check log line for 'ignoring a gap in LSN' -'ignoring missing WAL' exists in server log +'ignoring a gap in LSN' exists in server log box.space.test:select{} --- diff --git a/test/xlog/lsn_gap.test.py b/test/xlog/lsn_gap.test.py index 3409ba3c0bb96ec3c3089bec0f6534c3a2976b5a..4ba266446820e1163ab4feddcbe2668bc6c12fc1 100644 --- a/test/xlog/lsn_gap.test.py +++ b/test/xlog/lsn_gap.test.py @@ -26,7 +26,7 @@ server.stop() os.unlink(wal) server.start() -line="ignoring missing WAL" +line="ignoring a gap in LSN" print "check log line for '%s'" % line print if server.logfile_pos.seek_once(line) >= 0: diff --git a/test/xlog/missing.result b/test/xlog/missing.result index 546519abd8b1f5224a945c83808d7942219acad6..c52f75c68d739c0643757f1ff535464777c33eda 100644 --- a/test/xlog/missing.result +++ b/test/xlog/missing.result @@ -28,9 +28,9 @@ box.space.test:delete{3} --- - [3, 'third tuple'] ... -check log line for 'ignoring missing WAL' +check log line for 'ignoring a gap in LSN' -'ignoring missing WAL' exists in server log +'ignoring a gap in LSN' exists in server log box.space.test:select{} --- diff --git a/test/xlog/missing.test.py b/test/xlog/missing.test.py index 2b47f510c31dbb762d35efb5d932fa23165a84dc..50c97df4cf1cbe806fd6f7a7877f2c5e74580613 100644 --- a/test/xlog/missing.test.py +++ b/test/xlog/missing.test.py @@ -32,7 +32,7 @@ os.unlink(wal) # tarantool doesn't issue an LSN for deletes which delete nothing # this may lead to infinite recursion at start server.start() -line="ignoring missing WAL" +line="ignoring a gap in LSN" print "check log line for '%s'" % line print if server.logfile_pos.seek_once(line) >= 0: diff --git a/test/xlog/panic.lua b/test/xlog/panic.lua new file mode 100644 index 0000000000000000000000000000000000000000..7b47126940b94d90ca4590ca88fbb83add48ccd8 --- /dev/null +++ b/test/xlog/panic.lua @@ -0,0 +1,12 @@ +#!/usr/bin/env tarantool +os = require('os') + +box.cfg{ + listen = os.getenv("LISTEN"), + slab_alloc_arena = 0.1, + pid_file = "tarantool.pid", + panic_on_wal_error = true, + rows_per_wal = 10 +} + +require('console').listen(os.getenv('ADMIN')) diff --git a/test/xlog/panic_on_lsn_gap.result b/test/xlog/panic_on_lsn_gap.result new file mode 100644 index 0000000000000000000000000000000000000000..aacd7086a9fac96987376db34b6cecb4b277aa46 --- /dev/null +++ b/test/xlog/panic_on_lsn_gap.result @@ -0,0 +1,249 @@ +-- +-- we actually need to know what xlogs the server creates, +-- so start from a clean state +-- +-- +-- Check how the server is able to find the next +-- xlog if there are failed writes (lsn gaps). +-- +--# create server panic with script='xlog/panic.lua' +--# start server panic +--# set connection panic +box.info.vclock +--- +- - 0 +... +s = box.space._schema +--- +... +-- we need to have at least one record in the +-- xlog otherwise the server believes that there +-- is an lsn gap during recovery. +-- +s:replace{"key", 'test 1'} +--- +- ['key', 'test 1'] +... +box.info.vclock +--- +- - 1 +... +box.error.injection.set("ERRINJ_WAL_WRITE", true) +--- +- ok +... +t = {} +--- +... +-- +-- Try to insert rows, so that it's time to +-- switch WALs. No switch will happen though, +-- since no writes were made. +-- +--# setopt delimiter ';' +for i=1,box.cfg.rows_per_wal do + status, msg = pcall(s.replace, s, {"key"}) + table.insert(t, msg) +end; +--- +... +--# setopt delimiter '' +t +--- +- - Failed to write to disk + - Failed to write to disk + - Failed to write to disk + - Failed to write to disk + - Failed to write to disk + - Failed to write to disk + - Failed to write to disk + - Failed to write to disk + - Failed to write to disk + - Failed to write to disk +... +-- +-- Before restart: oops, our LSN is 11, +-- even though we didn't insert anything. +-- +box.info.vclock +--- +- - 11 +... +require('fio').glob("*.xlog") +--- +- - 00000000000000000000.xlog +... +--# stop server panic +--# start server panic +-- +-- after restart: our LSN is the LSN of the +-- last *written* row, all the failed +-- rows are gone from lsn counter. +-- +box.info.vclock +--- +- - 1 +... +box.space._schema:select{'key'} +--- +- - ['key', 'test 1'] +... +box.error.injection.set("ERRINJ_WAL_WRITE", true) +--- +- ok +... +t = {} +--- +... +s = box.space._schema +--- +... +-- +-- now do the same +-- +--# setopt delimiter ';' +for i=1,box.cfg.rows_per_wal do + status, msg = pcall(s.replace, s, {"key"}) + table.insert(t, msg) +end; +--- +... +--# setopt delimiter '' +t +--- +- - Failed to write to disk + - Failed to write to disk + - Failed to write to disk + - Failed to write to disk + - Failed to write to disk + - Failed to write to disk + - Failed to write to disk + - Failed to write to disk + - Failed to write to disk + - Failed to write to disk +... +box.info.vclock +--- +- - 11 +... +box.error.injection.set("ERRINJ_WAL_WRITE", false) +--- +- ok +... +-- +-- Write a good row after a series of failed +-- rows. There is a gap in LSN, correct, +-- but it's *inside* a single WAL, so doesn't +-- affect WAL search in recover_remaining_wals() +-- +s:replace{'key', 'test 2'} +--- +- ['key', 'test 2'] +... +-- +-- notice that vclock before and after +-- server stop is the same -- because it's +-- recorded in the last row +-- +box.info.vclock +--- +- - 12 +... +--# stop server panic +--# start server panic +box.info.vclock +--- +- - 12 +... +box.space._schema:select{'key'} +--- +- - ['key', 'test 2'] +... +-- list all the logs +require('fio').glob("*.xlog") +--- +- - 00000000000000000000.xlog + - 00000000000000000001.xlog +... +-- now insert 10 rows - so that the next +-- row will need to switch the WAL +--# setopt delimiter ';' +for i=1,box.cfg.rows_per_wal do + box.space._schema:replace{"key", 'test 3'} +end; +--- +... +--# setopt delimiter '' +-- the next insert should switch xlog, but aha - it fails +-- a new xlog file is created but has 0 rows +require('fio').glob("*.xlog") +--- +- - 00000000000000000000.xlog + - 00000000000000000001.xlog + - 00000000000000000012.xlog +... +box.error.injection.set("ERRINJ_WAL_WRITE", true) +--- +- ok +... +box.space._schema:replace{"key", 'test 3'} +--- +- error: Failed to write to disk +... +box.info.vclock +--- +- - 23 +... +require('fio').glob("*.xlog") +--- +- - 00000000000000000000.xlog + - 00000000000000000001.xlog + - 00000000000000000012.xlog + - 00000000000000000022.xlog +... +-- and the next one (just to be sure +box.space._schema:replace{"key", 'test 3'} +--- +- error: Failed to write to disk +... +box.info.vclock +--- +- - 24 +... +require('fio').glob("*.xlog") +--- +- - 00000000000000000000.xlog + - 00000000000000000001.xlog + - 00000000000000000012.xlog + - 00000000000000000022.xlog +... +box.error.injection.set("ERRINJ_WAL_WRITE", false) +--- +- ok +... +-- then a success +box.space._schema:replace{"key", 'test 4'} +--- +- ['key', 'test 4'] +... +box.info.vclock +--- +- - 25 +... +require('fio').glob("*.xlog") +--- +- - 00000000000000000000.xlog + - 00000000000000000001.xlog + - 00000000000000000012.xlog + - 00000000000000000022.xlog +... +-- restart is ok +--# stop server panic +--# start server panic +box.space._schema:select{'key'} +--- +- - ['key', 'test 4'] +... +--# stop server panic +--# cleanup server panic +--# set connection default diff --git a/test/xlog/panic_on_lsn_gap.test.lua b/test/xlog/panic_on_lsn_gap.test.lua new file mode 100644 index 0000000000000000000000000000000000000000..bf40d0834650ffb2f09aa0296e4e4cf1b17d37e1 --- /dev/null +++ b/test/xlog/panic_on_lsn_gap.test.lua @@ -0,0 +1,112 @@ +-- +-- we actually need to know what xlogs the server creates, +-- so start from a clean state +-- +-- +-- Check how the server is able to find the next +-- xlog if there are failed writes (lsn gaps). +-- +--# create server panic with script='xlog/panic.lua' +--# start server panic +--# set connection panic +box.info.vclock +s = box.space._schema +-- we need to have at least one record in the +-- xlog otherwise the server believes that there +-- is an lsn gap during recovery. +-- +s:replace{"key", 'test 1'} +box.info.vclock +box.error.injection.set("ERRINJ_WAL_WRITE", true) +t = {} +-- +-- Try to insert rows, so that it's time to +-- switch WALs. No switch will happen though, +-- since no writes were made. +-- +--# setopt delimiter ';' +for i=1,box.cfg.rows_per_wal do + status, msg = pcall(s.replace, s, {"key"}) + table.insert(t, msg) +end; +--# setopt delimiter '' +t +-- +-- Before restart: oops, our LSN is 11, +-- even though we didn't insert anything. +-- +box.info.vclock +require('fio').glob("*.xlog") +--# stop server panic +--# start server panic +-- +-- after restart: our LSN is the LSN of the +-- last *written* row, all the failed +-- rows are gone from lsn counter. +-- +box.info.vclock +box.space._schema:select{'key'} +box.error.injection.set("ERRINJ_WAL_WRITE", true) +t = {} +s = box.space._schema +-- +-- now do the same +-- +--# setopt delimiter ';' +for i=1,box.cfg.rows_per_wal do + status, msg = pcall(s.replace, s, {"key"}) + table.insert(t, msg) +end; +--# setopt delimiter '' +t +box.info.vclock +box.error.injection.set("ERRINJ_WAL_WRITE", false) +-- +-- Write a good row after a series of failed +-- rows. There is a gap in LSN, correct, +-- but it's *inside* a single WAL, so doesn't +-- affect WAL search in recover_remaining_wals() +-- +s:replace{'key', 'test 2'} +-- +-- notice that vclock before and after +-- server stop is the same -- because it's +-- recorded in the last row +-- +box.info.vclock +--# stop server panic +--# start server panic +box.info.vclock +box.space._schema:select{'key'} +-- list all the logs +require('fio').glob("*.xlog") +-- now insert 10 rows - so that the next +-- row will need to switch the WAL +--# setopt delimiter ';' +for i=1,box.cfg.rows_per_wal do + box.space._schema:replace{"key", 'test 3'} +end; +--# setopt delimiter '' +-- the next insert should switch xlog, but aha - it fails +-- a new xlog file is created but has 0 rows +require('fio').glob("*.xlog") +box.error.injection.set("ERRINJ_WAL_WRITE", true) +box.space._schema:replace{"key", 'test 3'} +box.info.vclock +require('fio').glob("*.xlog") +-- and the next one (just to be sure +box.space._schema:replace{"key", 'test 3'} +box.info.vclock +require('fio').glob("*.xlog") +box.error.injection.set("ERRINJ_WAL_WRITE", false) +-- then a success +box.space._schema:replace{"key", 'test 4'} +box.info.vclock +require('fio').glob("*.xlog") +-- restart is ok +--# stop server panic +--# start server panic +box.space._schema:select{'key'} +--# stop server panic +--# cleanup server panic +--# set connection default diff --git a/test/xlog/panic_on_wal_error.result b/test/xlog/panic_on_wal_error.result index fe3b84ab47310bbb8f6505eae230e3dc9622b041..a54e6c6587b9cdad81c3e3b26a1964de57c51182 100644 --- a/test/xlog/panic_on_wal_error.result +++ b/test/xlog/panic_on_wal_error.result @@ -1,4 +1,21 @@ -- preparatory stuff +fio = require('fio') +--- +... +glob = fio.pathjoin(box.cfg.wal_dir, '*.xlog') +--- +... +for _, file in pairs(fio.glob(glob)) do fio.unlink(file) end +--- +... +glob = fio.pathjoin(box.cfg.wal_dir, '*.snap') +--- +... +for _, file in pairs(fio.glob(glob)) do fio.unlink(file) end +--- +... +--# stop server default +--# start server default box.schema.user.grant('guest', 'replication') --- ... @@ -116,7 +133,7 @@ box.info.replication.status ... box.info.replication.message --- -- not all WALs have been successfully read +- 'Missing .xlog file between LSN 6 {1: 6, 2: 0} and 8 {1: 8, 2: 0}' ... box.space.test:select{} --- @@ -126,6 +143,7 @@ box.space.test:select{} -- --# set connection default --# stop server replica +--# cleanup server replica -- -- cleanup box.space.test:drop() diff --git a/test/xlog/panic_on_wal_error.test.lua b/test/xlog/panic_on_wal_error.test.lua index c2a4ab28c429162596f50dba3e9d1b869e4c4f8b..243c06465eefd556886fbc109f2b29dbfadf4ea4 100644 --- a/test/xlog/panic_on_wal_error.test.lua +++ b/test/xlog/panic_on_wal_error.test.lua @@ -1,4 +1,11 @@ -- preparatory stuff +fio = require('fio') +glob = fio.pathjoin(box.cfg.wal_dir, '*.xlog') +for _, file in pairs(fio.glob(glob)) do fio.unlink(file) end +glob = fio.pathjoin(box.cfg.wal_dir, '*.snap') +for _, file in pairs(fio.glob(glob)) do fio.unlink(file) end +--# stop server default +--# start server default box.schema.user.grant('guest', 'replication') _ = box.schema.space.create('test') _ = box.space.test:create_index('pk') @@ -67,6 +74,7 @@ box.space.test:select{} -- --# set connection default --# stop server replica +--# cleanup server replica -- -- cleanup box.space.test:drop() diff --git a/test/xlog/suite.ini b/test/xlog/suite.ini index f49b38ac4e8410b373b606f995e79f7fdceb7f28..e76c7fc0f0cc4135446f886e68070237a14f4a16 100644 --- a/test/xlog/suite.ini +++ b/test/xlog/suite.ini @@ -4,6 +4,6 @@ description = tarantool write ahead log tests script = xlog.lua disabled = valgrind_disabled = -release_disabled = errinj.test.lua +release_disabled = errinj.test.lua, panic_on_lsn_gap.test.lua lua_libs = use_unix_sockets = True diff --git a/test/xlog/xlog.lua b/test/xlog/xlog.lua index 2041feb7c85ce43556df8351f065df579c9fcdf3..3bd8968c20ce6457143be36e51d0231302846692 100644 --- a/test/xlog/xlog.lua +++ b/test/xlog/xlog.lua @@ -6,7 +6,7 @@ box.cfg{ slab_alloc_arena = 0.1, pid_file = "tarantool.pid", panic_on_wal_error = false, - rows_per_wal = 50 + rows_per_wal = 10 } require('console').listen(os.getenv('ADMIN'))