mirror of
https://gitee.com/milvus-io/milvus.git
synced 2025-12-07 01:28:27 +08:00
issue: #43897, #44123 pr: #45224 also pick pr: #45216,#45154,#45033,#45145,#45092,#45058,#45029 enhance: Close channel replicator more gracefully (#45029) issue: https://github.com/milvus-io/milvus/issues/44123 enhance: Show create time for import job (#45058) issue: https://github.com/milvus-io/milvus/issues/45056 fix: wal state may be unconsistent after recovering from crash (#45092) issue: #45088, #45086 - Message on control channel should trigger the checkpoint update. - LastConfrimedMessageID should be recovered from the minimum of checkpoint or the LastConfirmedMessageID of uncommitted txn. - Add more log info for wal debugging. fix: make ack of broadcaster cannot canceled by client (#45145) issue: #45141 - make ack of broadcaster cannot canceled by rpc. - make clone for assignment snapshot of wal balancer. - add server id for GetReplicateCheckpoint to avoid failure. enhance: support collection and index with WAL-based DDL framework (#45033) issue: #43897 - Part of collection/index related DDL is implemented by WAL-based DDL framework now. - Support following message type in wal, CreateCollection, DropCollection, CreatePartition, DropPartition, CreateIndex, AlterIndex, DropIndex. - Part of collection/index related DDL can be synced by new CDC now. - Refactor some UT for collection/index DDL. - Add Tombstone scheduler to manage the tombstone GC for collection or partition meta. - Move the vchannel allocation into streaming pchannel manager. enhance: support load/release collection/partition with WAL-based DDL framework (#45154) issue: #43897 - Load/Release collection/partition is implemented by WAL-based DDL framework now. - Support AlterLoadConfig/DropLoadConfig in wal now. - Load/Release operation can be synced by new CDC now. - Refactor some UT for load/release DDL. enhance: Don't start cdc by default (#45216) issue: https://github.com/milvus-io/milvus/issues/44123 fix: unrecoverable when replicate from old (#45224) issue: #44962 --------- Signed-off-by: bigsheeper <yihao.dai@zilliz.com> Signed-off-by: chyezh <chyezh@outlook.com> Co-authored-by: yihao.dai <yihao.dai@zilliz.com>
185 lines
6.1 KiB
Go
185 lines
6.1 KiB
Go
// Licensed to the LF AI & Data foundation under one
|
|
// or more contributor license agreements. See the NOTICE file
|
|
// distributed with this work for additional information
|
|
// regarding copyright ownership. The ASF licenses this file
|
|
// to you under the Apache License, Version 2.0 (the
|
|
// "License"); you may not use this file except in compliance
|
|
// with the License. You may obtain a copy of the License at
|
|
//
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
//
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
// See the License for the specific language governing permissions and
|
|
// limitations under the License.
|
|
|
|
package rootcoord
|
|
|
|
import (
|
|
"context"
|
|
"testing"
|
|
|
|
"github.com/stretchr/testify/require"
|
|
|
|
"github.com/milvus-io/milvus-proto/go-api/v2/milvuspb"
|
|
"github.com/milvus-io/milvus/pkg/v2/proto/internalpb"
|
|
"github.com/milvus-io/milvus/pkg/v2/util/merr"
|
|
)
|
|
|
|
func TestDDLCallbacksRBACPrivilege(t *testing.T) {
|
|
core := initStreamingSystemAndCore(t)
|
|
|
|
// Create a new role.
|
|
targetRoleName := "newRole"
|
|
status, err := core.CreateRole(context.Background(), &milvuspb.CreateRoleRequest{
|
|
Entity: &milvuspb.RoleEntity{
|
|
Name: targetRoleName,
|
|
},
|
|
})
|
|
require.NoError(t, merr.CheckRPCCall(status, err))
|
|
targetUserName := "newUser"
|
|
status, err = core.CreateCredential(context.Background(), &internalpb.CredentialInfo{
|
|
Username: targetUserName,
|
|
EncryptedPassword: "123456",
|
|
})
|
|
require.NoError(t, merr.CheckRPCCall(status, err))
|
|
|
|
// Drop not existed privilege should return error.
|
|
status, err = core.OperatePrivilege(context.Background(), &milvuspb.OperatePrivilegeRequest{
|
|
Type: milvuspb.OperatePrivilegeType_Revoke,
|
|
Entity: &milvuspb.GrantEntity{
|
|
Role: &milvuspb.RoleEntity{
|
|
Name: targetRoleName,
|
|
},
|
|
Grantor: &milvuspb.GrantorEntity{
|
|
Privilege: &milvuspb.PrivilegeEntity{
|
|
Name: "not existed",
|
|
},
|
|
},
|
|
},
|
|
})
|
|
require.Error(t, merr.CheckRPCCall(status, err))
|
|
|
|
entity := &milvuspb.GrantEntity{
|
|
Role: &milvuspb.RoleEntity{
|
|
Name: targetRoleName,
|
|
},
|
|
Object: &milvuspb.ObjectEntity{
|
|
Name: "Global",
|
|
},
|
|
ObjectName: "*",
|
|
Grantor: &milvuspb.GrantorEntity{
|
|
Privilege: &milvuspb.PrivilegeEntity{
|
|
Name: "DescribeCollection",
|
|
},
|
|
User: &milvuspb.UserEntity{
|
|
Name: targetUserName,
|
|
},
|
|
},
|
|
}
|
|
|
|
// Grant and revoke with v2 version
|
|
status, err = core.OperatePrivilege(context.Background(), &milvuspb.OperatePrivilegeRequest{
|
|
Type: milvuspb.OperatePrivilegeType_Grant,
|
|
Entity: entity,
|
|
Version: "v2",
|
|
})
|
|
require.NoError(t, merr.CheckRPCCall(status, err))
|
|
|
|
selectGrantResp, err := core.SelectGrant(context.Background(), &milvuspb.SelectGrantRequest{
|
|
Entity: entity,
|
|
})
|
|
require.NoError(t, merr.CheckRPCCall(selectGrantResp, err))
|
|
require.Equal(t, 1, len(selectGrantResp.Entities))
|
|
|
|
status, err = core.OperatePrivilege(context.Background(), &milvuspb.OperatePrivilegeRequest{
|
|
Type: milvuspb.OperatePrivilegeType_Revoke,
|
|
Entity: entity,
|
|
Version: "v2",
|
|
})
|
|
require.NoError(t, merr.CheckRPCCall(status, err))
|
|
|
|
selectGrantResp, err = core.SelectGrant(context.Background(), &milvuspb.SelectGrantRequest{
|
|
Entity: entity,
|
|
})
|
|
require.NoError(t, merr.CheckRPCCall(selectGrantResp, err))
|
|
require.Equal(t, 0, len(selectGrantResp.Entities))
|
|
|
|
// Grant and revoke with v1 version
|
|
status, err = core.OperatePrivilege(context.Background(), &milvuspb.OperatePrivilegeRequest{
|
|
Type: milvuspb.OperatePrivilegeType_Grant,
|
|
Entity: entity,
|
|
Version: "v1",
|
|
})
|
|
require.NoError(t, merr.CheckRPCCall(status, err))
|
|
|
|
selectGrantResp, err = core.SelectGrant(context.Background(), &milvuspb.SelectGrantRequest{
|
|
Entity: entity,
|
|
})
|
|
require.NoError(t, merr.CheckRPCCall(selectGrantResp, err))
|
|
require.Equal(t, 1, len(selectGrantResp.Entities))
|
|
|
|
status, err = core.OperatePrivilege(context.Background(), &milvuspb.OperatePrivilegeRequest{
|
|
Type: milvuspb.OperatePrivilegeType_Revoke,
|
|
Entity: entity,
|
|
Version: "v1",
|
|
})
|
|
require.NoError(t, merr.CheckRPCCall(status, err))
|
|
|
|
selectGrantResp, err = core.SelectGrant(context.Background(), &milvuspb.SelectGrantRequest{
|
|
Entity: entity,
|
|
})
|
|
require.NoError(t, merr.CheckRPCCall(selectGrantResp, err))
|
|
require.Equal(t, 0, len(selectGrantResp.Entities))
|
|
|
|
// Grant and try drop role should return error
|
|
status, err = core.OperatePrivilege(context.Background(), &milvuspb.OperatePrivilegeRequest{
|
|
Type: milvuspb.OperatePrivilegeType_Grant,
|
|
Entity: entity,
|
|
Version: "v1",
|
|
})
|
|
require.NoError(t, merr.CheckRPCCall(status, err))
|
|
|
|
status, err = core.DropRole(context.Background(), &milvuspb.DropRoleRequest{
|
|
RoleName: targetRoleName,
|
|
})
|
|
require.Error(t, merr.CheckRPCCall(status, err))
|
|
}
|
|
|
|
func TestDDLCallbacksRBACPrivilegeGroup(t *testing.T) {
|
|
core := initStreamingSystemAndCore(t)
|
|
|
|
groupName := "group1"
|
|
status, err := core.CreatePrivilegeGroup(context.Background(), &milvuspb.CreatePrivilegeGroupRequest{
|
|
GroupName: groupName,
|
|
})
|
|
require.NoError(t, merr.CheckRPCCall(status, err))
|
|
|
|
status, err = core.OperatePrivilegeGroup(context.Background(), &milvuspb.OperatePrivilegeGroupRequest{
|
|
GroupName: groupName,
|
|
Type: milvuspb.OperatePrivilegeGroupType_RemovePrivilegesFromGroup,
|
|
Privileges: []*milvuspb.PrivilegeEntity{{Name: "Query"}},
|
|
})
|
|
require.NoError(t, merr.CheckRPCCall(status, err))
|
|
|
|
status, err = core.OperatePrivilegeGroup(context.Background(), &milvuspb.OperatePrivilegeGroupRequest{
|
|
GroupName: groupName,
|
|
Type: milvuspb.OperatePrivilegeGroupType_AddPrivilegesToGroup,
|
|
Privileges: []*milvuspb.PrivilegeEntity{{Name: "Query"}},
|
|
})
|
|
require.NoError(t, merr.CheckRPCCall(status, err))
|
|
|
|
status, err = core.OperatePrivilegeGroup(context.Background(), &milvuspb.OperatePrivilegeGroupRequest{
|
|
GroupName: groupName,
|
|
Type: milvuspb.OperatePrivilegeGroupType_RemovePrivilegesFromGroup,
|
|
Privileges: []*milvuspb.PrivilegeEntity{{Name: "Query"}},
|
|
})
|
|
require.NoError(t, merr.CheckRPCCall(status, err))
|
|
|
|
status, err = core.DropPrivilegeGroup(context.Background(), &milvuspb.DropPrivilegeGroupRequest{
|
|
GroupName: groupName,
|
|
})
|
|
require.NoError(t, merr.CheckRPCCall(status, err))
|
|
}
|