Merge pull request #15610 from serathius/robustness-fix-blackhole
Robustness fix blackholestorage-doc
commit
a1bd154cb4
|
@ -478,6 +478,9 @@ func (cfg *EtcdProcessClusterConfig) EtcdServerProcessConfig(tb testing.TB, i in
|
|||
peerAdvertiseUrl := url.URL{Scheme: cfg.PeerScheme(), Host: fmt.Sprintf("localhost:%d", peerPort)}
|
||||
var proxyCfg *proxy.ServerConfig
|
||||
if cfg.PeerProxy {
|
||||
if !cfg.IsPeerTLS {
|
||||
panic("Can't use peer proxy without peer TLS as it can result in malformed packets")
|
||||
}
|
||||
peerAdvertiseUrl.Host = fmt.Sprintf("localhost:%d", peer2Port)
|
||||
proxyCfg = &proxy.ServerConfig{
|
||||
Logger: zap.NewNop(),
|
||||
|
|
|
@ -66,9 +66,8 @@ var (
|
|||
CompactBeforeSetFinishedCompactPanic, CompactAfterSetFinishedCompactPanic,
|
||||
CompactBeforeCommitBatchPanic, CompactAfterCommitBatchPanic,
|
||||
RaftBeforeLeaderSendPanic,
|
||||
BlackholePeerNetwork,
|
||||
DelayPeerNetwork,
|
||||
// TODO(https://github.com/etcd-io/etcd/issues/15595): Re-enable after issue is fixed
|
||||
//BlackholePeerNetwork,
|
||||
}
|
||||
RandomOneNodeClusterFailpoint Failpoint = randomFailpoint{oneNodeClusterFailpoints}
|
||||
RaftBeforeFollowerSendPanic Failpoint = goPanicFailpoint{"raftBeforeFollowerSend", nil, Follower}
|
||||
|
@ -79,9 +78,8 @@ var (
|
|||
RaftBeforeSaveSnapPanic Failpoint = goPanicFailpoint{"raftBeforeSaveSnap", triggerBlackholeUntilSnapshot, Follower}
|
||||
RaftAfterSaveSnapPanic Failpoint = goPanicFailpoint{"raftAfterSaveSnap", triggerBlackholeUntilSnapshot, Follower}
|
||||
RandomSnapshotFailpoint Failpoint = randomFailpoint{[]Failpoint{
|
||||
// TODO(https://github.com/etcd-io/etcd/issues/15595): Re-enable after issue is fixed
|
||||
//RaftBeforeApplySnapPanic, RaftAfterApplySnapPanic, RaftAfterWALReleasePanic, RaftBeforeSaveSnapPanic, RaftAfterSaveSnapPanic,
|
||||
//BlackholeUntilSnapshot,
|
||||
RaftBeforeApplySnapPanic, RaftAfterApplySnapPanic, RaftAfterWALReleasePanic, RaftBeforeSaveSnapPanic, RaftAfterSaveSnapPanic,
|
||||
BlackholeUntilSnapshot,
|
||||
}}
|
||||
)
|
||||
|
||||
|
|
|
@ -103,6 +103,7 @@ func TestRobustness(t *testing.T) {
|
|||
failpoint: RandomMultiNodeClusterFailpoint,
|
||||
traffic: &traffic,
|
||||
config: *e2e.NewConfig(
|
||||
e2e.WithIsPeerTLS(true),
|
||||
e2e.WithSnapshotCount(100),
|
||||
e2e.WithPeerProxy(true),
|
||||
e2e.WithGoFailEnabled(true),
|
||||
|
@ -136,18 +137,18 @@ func TestRobustness(t *testing.T) {
|
|||
e2e.WithSnapshotCount(100),
|
||||
),
|
||||
},
|
||||
// TODO(https://github.com/etcd-io/etcd/issues/15595): Re-enable after issue is fixed
|
||||
//{
|
||||
// name: "Snapshot",
|
||||
// failpoint: RandomSnapshotFailpoint,
|
||||
// traffic: &HighTraffic,
|
||||
// config: *e2e.NewConfig(
|
||||
// e2e.WithGoFailEnabled(true),
|
||||
// e2e.WithSnapshotCount(100),
|
||||
// e2e.WithSnapshotCatchUpEntries(100),
|
||||
// e2e.WithPeerProxy(true),
|
||||
// ),
|
||||
//},
|
||||
{
|
||||
name: "Snapshot",
|
||||
failpoint: RandomSnapshotFailpoint,
|
||||
traffic: &HighTraffic,
|
||||
config: *e2e.NewConfig(
|
||||
e2e.WithGoFailEnabled(true),
|
||||
e2e.WithSnapshotCount(100),
|
||||
e2e.WithSnapshotCatchUpEntries(100),
|
||||
e2e.WithPeerProxy(true),
|
||||
e2e.WithIsPeerTLS(true),
|
||||
),
|
||||
},
|
||||
}...)
|
||||
for _, scenario := range scenarios {
|
||||
if scenario.traffic == nil {
|
||||
|
|
Loading…
Reference in New Issue