@@ -37,7 +37,7 @@ func TestV3AuthEmptyUserGet(t *testing.T) {
37
37
clus := integration .NewCluster (t , & integration.ClusterConfig {Size : 1 })
38
38
defer clus .Terminate (t )
39
39
40
- ctx , cancel := context .WithTimeout (context . TODO (), 30 * time .Second )
40
+ ctx , cancel := context .WithTimeout (t . Context (), 30 * time .Second )
41
41
defer cancel ()
42
42
43
43
api := integration .ToGRPC (clus .Client (0 ))
@@ -57,7 +57,7 @@ func TestV3AuthEmptyUserPut(t *testing.T) {
57
57
})
58
58
defer clus .Terminate (t )
59
59
60
- ctx , cancel := context .WithTimeout (context . TODO (), 30 * time .Second )
60
+ ctx , cancel := context .WithTimeout (t . Context (), 30 * time .Second )
61
61
defer cancel ()
62
62
63
63
api := integration .ToGRPC (clus .Client (0 ))
@@ -85,7 +85,7 @@ func TestV3AuthTokenWithDisable(t *testing.T) {
85
85
require .NoError (t , cerr )
86
86
defer c .Close ()
87
87
88
- rctx , cancel := context .WithCancel (context . TODO ())
88
+ rctx , cancel := context .WithCancel (t . Context ())
89
89
donec := make (chan struct {})
90
90
go func () {
91
91
defer close (donec )
@@ -95,7 +95,7 @@ func TestV3AuthTokenWithDisable(t *testing.T) {
95
95
}()
96
96
97
97
time .Sleep (10 * time .Millisecond )
98
- _ , err := c .AuthDisable (context . TODO ())
98
+ _ , err := c .AuthDisable (t . Context ())
99
99
require .NoError (t , err )
100
100
time .Sleep (10 * time .Millisecond )
101
101
@@ -110,13 +110,13 @@ func TestV3AuthRevision(t *testing.T) {
110
110
111
111
api := integration .ToGRPC (clus .Client (0 ))
112
112
113
- ctx , cancel := context .WithTimeout (context . Background (), 5 * time .Second )
113
+ ctx , cancel := context .WithTimeout (t . Context (), 5 * time .Second )
114
114
presp , perr := api .KV .Put (ctx , & pb.PutRequest {Key : []byte ("foo" ), Value : []byte ("bar" )})
115
115
cancel ()
116
116
require .NoError (t , perr )
117
117
rev := presp .Header .Revision
118
118
119
- ctx , cancel = context .WithTimeout (context . Background (), 5 * time .Second )
119
+ ctx , cancel = context .WithTimeout (t . Context (), 5 * time .Second )
120
120
aresp , aerr := api .Auth .UserAdd (ctx , & pb.AuthUserAddRequest {Name : "root" , Password : "123" , Options : & authpb.UserAddOptions {NoPassword : false }})
121
121
cancel ()
122
122
require .NoError (t , aerr )
@@ -152,18 +152,18 @@ func testV3AuthWithLeaseRevokeWithRoot(t *testing.T, ccfg integration.ClusterCon
152
152
require .NoError (t , cerr )
153
153
defer rootc .Close ()
154
154
155
- leaseResp , err := rootc .Grant (context . TODO (), 2 )
155
+ leaseResp , err := rootc .Grant (t . Context (), 2 )
156
156
require .NoError (t , err )
157
157
leaseID := leaseResp .ID
158
158
159
- _ , err = rootc .Put (context . TODO (), "foo" , "bar" , clientv3 .WithLease (leaseID ))
159
+ _ , err = rootc .Put (t . Context (), "foo" , "bar" , clientv3 .WithLease (leaseID ))
160
160
require .NoError (t , err )
161
161
162
162
// wait for lease expire
163
163
time .Sleep (3 * time .Second )
164
164
165
165
tresp , terr := rootc .TimeToLive (
166
- context . TODO (),
166
+ t . Context (),
167
167
leaseID ,
168
168
clientv3 .WithAttachedKeys (),
169
169
)
@@ -208,17 +208,17 @@ func TestV3AuthWithLeaseRevoke(t *testing.T) {
208
208
require .NoError (t , cerr )
209
209
defer rootc .Close ()
210
210
211
- leaseResp , err := rootc .Grant (context . TODO (), 90 )
211
+ leaseResp , err := rootc .Grant (t . Context (), 90 )
212
212
require .NoError (t , err )
213
213
leaseID := leaseResp .ID
214
214
// permission of k3 isn't granted to user1
215
- _ , err = rootc .Put (context . TODO (), "k3" , "val" , clientv3 .WithLease (leaseID ))
215
+ _ , err = rootc .Put (t . Context (), "k3" , "val" , clientv3 .WithLease (leaseID ))
216
216
require .NoError (t , err )
217
217
218
218
userc , cerr := integration .NewClient (t , clientv3.Config {Endpoints : clus .Client (0 ).Endpoints (), Username : "user1" , Password : "user1-123" })
219
219
require .NoError (t , cerr )
220
220
defer userc .Close ()
221
- _ , err = userc .Revoke (context . TODO (), leaseID )
221
+ _ , err = userc .Revoke (t . Context (), leaseID )
222
222
if err == nil {
223
223
t .Fatal ("revoking from user1 should be failed with permission denied" )
224
224
}
@@ -257,36 +257,36 @@ func TestV3AuthWithLeaseAttach(t *testing.T) {
257
257
require .NoError (t , cerr )
258
258
defer user2c .Close ()
259
259
260
- leaseResp , err := user1c .Grant (context . TODO (), 90 )
260
+ leaseResp , err := user1c .Grant (t . Context (), 90 )
261
261
require .NoError (t , err )
262
262
leaseID := leaseResp .ID
263
263
// permission of k2 is also granted to user2
264
- _ , err = user1c .Put (context . TODO (), "k2" , "val" , clientv3 .WithLease (leaseID ))
264
+ _ , err = user1c .Put (t . Context (), "k2" , "val" , clientv3 .WithLease (leaseID ))
265
265
require .NoError (t , err )
266
266
267
- _ , err = user2c .Revoke (context . TODO (), leaseID )
267
+ _ , err = user2c .Revoke (t . Context (), leaseID )
268
268
require .NoError (t , err )
269
269
270
- leaseResp , err = user1c .Grant (context . TODO (), 90 )
270
+ leaseResp , err = user1c .Grant (t . Context (), 90 )
271
271
require .NoError (t , err )
272
272
leaseID = leaseResp .ID
273
273
// permission of k1 isn't granted to user2
274
- _ , err = user1c .Put (context . TODO (), "k1" , "val" , clientv3 .WithLease (leaseID ))
274
+ _ , err = user1c .Put (t . Context (), "k1" , "val" , clientv3 .WithLease (leaseID ))
275
275
require .NoError (t , err )
276
276
277
- _ , err = user2c .Revoke (context . TODO (), leaseID )
277
+ _ , err = user2c .Revoke (t . Context (), leaseID )
278
278
if err == nil {
279
279
t .Fatal ("revoking from user2 should be failed with permission denied" )
280
280
}
281
281
}
282
282
283
283
func authSetupUsers (t * testing.T , auth pb.AuthClient , users []user ) {
284
284
for _ , user := range users {
285
- _ , err := auth .UserAdd (context . TODO (), & pb.AuthUserAddRequest {Name : user .name , Password : user .password , Options : & authpb.UserAddOptions {NoPassword : false }})
285
+ _ , err := auth .UserAdd (t . Context (), & pb.AuthUserAddRequest {Name : user .name , Password : user .password , Options : & authpb.UserAddOptions {NoPassword : false }})
286
286
require .NoError (t , err )
287
- _ , err = auth .RoleAdd (context . TODO (), & pb.AuthRoleAddRequest {Name : user .role })
287
+ _ , err = auth .RoleAdd (t . Context (), & pb.AuthRoleAddRequest {Name : user .role })
288
288
require .NoError (t , err )
289
- _ , err = auth .UserGrantRole (context . TODO (), & pb.AuthUserGrantRoleRequest {User : user .name , Role : user .role })
289
+ _ , err = auth .UserGrantRole (t . Context (), & pb.AuthUserGrantRoleRequest {User : user .name , Role : user .role })
290
290
require .NoError (t , err )
291
291
292
292
if len (user .key ) == 0 {
@@ -298,7 +298,7 @@ func authSetupUsers(t *testing.T, auth pb.AuthClient, users []user) {
298
298
Key : []byte (user .key ),
299
299
RangeEnd : []byte (user .end ),
300
300
}
301
- _ , err = auth .RoleGrantPermission (context . TODO (), & pb.AuthRoleGrantPermissionRequest {Name : user .role , Perm : perm })
301
+ _ , err = auth .RoleGrantPermission (t . Context (), & pb.AuthRoleGrantPermissionRequest {Name : user .role , Perm : perm })
302
302
require .NoError (t , err )
303
303
}
304
304
}
@@ -313,7 +313,7 @@ func authSetupRoot(t *testing.T, auth pb.AuthClient) {
313
313
},
314
314
}
315
315
authSetupUsers (t , auth , root )
316
- _ , err := auth .AuthEnable (context . TODO (), & pb.AuthEnableRequest {})
316
+ _ , err := auth .AuthEnable (t . Context (), & pb.AuthEnableRequest {})
317
317
require .NoError (t , err )
318
318
}
319
319
@@ -326,12 +326,12 @@ func TestV3AuthNonAuthorizedRPCs(t *testing.T) {
326
326
327
327
key := "foo"
328
328
val := "bar"
329
- _ , err := nonAuthedKV .Put (context . TODO (), key , val )
329
+ _ , err := nonAuthedKV .Put (t . Context (), key , val )
330
330
require .NoErrorf (t , err , "couldn't put key (%v)" , err )
331
331
332
332
authSetupRoot (t , integration .ToGRPC (clus .Client (0 )).Auth )
333
333
334
- respput , err := nonAuthedKV .Put (context . TODO (), key , val )
334
+ respput , err := nonAuthedKV .Put (t . Context (), key , val )
335
335
require .Truef (t , eqErrGRPC (err , rpctypes .ErrGRPCUserEmpty ), "could put key (%v), it should cause an error of permission denied" , respput )
336
336
}
337
337
@@ -355,13 +355,13 @@ func TestV3AuthOldRevConcurrent(t *testing.T) {
355
355
f := func (i int ) {
356
356
defer wg .Done ()
357
357
role , user := fmt .Sprintf ("test-role-%d" , i ), fmt .Sprintf ("test-user-%d" , i )
358
- _ , err := c .RoleAdd (context . TODO (), role )
358
+ _ , err := c .RoleAdd (t . Context (), role )
359
359
require .NoError (t , err )
360
- _ , err = c .RoleGrantPermission (context . TODO (), role , "\x00 " , clientv3 .GetPrefixRangeEnd ("" ), clientv3 .PermissionType (clientv3 .PermReadWrite ))
360
+ _ , err = c .RoleGrantPermission (t . Context (), role , "\x00 " , clientv3 .GetPrefixRangeEnd ("" ), clientv3 .PermissionType (clientv3 .PermReadWrite ))
361
361
require .NoError (t , err )
362
- _ , err = c .UserAdd (context . TODO (), user , "123" )
362
+ _ , err = c .UserAdd (t . Context (), user , "123" )
363
363
require .NoError (t , err )
364
- _ , err = c .Put (context . TODO (), "a" , "b" )
364
+ _ , err = c .Put (t . Context (), "a" , "b" )
365
365
assert .NoError (t , err )
366
366
}
367
367
// needs concurrency to trigger
@@ -378,7 +378,7 @@ func TestV3AuthWatchErrorAndWatchId0(t *testing.T) {
378
378
clus := integration .NewCluster (t , & integration.ClusterConfig {Size : 1 })
379
379
defer clus .Terminate (t )
380
380
381
- ctx , cancel := context .WithTimeout (context . TODO (), 10 * time .Second )
381
+ ctx , cancel := context .WithTimeout (t . Context (), 10 * time .Second )
382
382
defer cancel ()
383
383
384
384
users := []user {
0 commit comments