|
| 1 | +//go:build integration2 |
| 2 | + |
| 3 | +/* |
| 4 | + * SPDX-FileCopyrightText: © 2017-2025 Istari Digital, Inc. |
| 5 | + * SPDX-License-Identifier: Apache-2.0 |
| 6 | + */ |
| 7 | + |
| 8 | +package main |
| 9 | + |
| 10 | +import ( |
| 11 | + "strconv" |
| 12 | + "strings" |
| 13 | + "testing" |
| 14 | + "time" |
| 15 | + |
| 16 | + "github.com/dgraph-io/dgo/v250/protos/api" |
| 17 | + "github.com/dgraph-io/dgraph/v25/dgraphtest" |
| 18 | + "github.com/dgraph-io/dgraph/v25/protos/pb" |
| 19 | + "github.com/stretchr/testify/require" |
| 20 | + "google.golang.org/protobuf/encoding/protojson" |
| 21 | +) |
| 22 | + |
| 23 | +func TestUniqueMultipleGroups(t *testing.T) { |
| 24 | + conf := dgraphtest.NewClusterConfig().WithNumAlphas(2).WithNumZeros(1).WithReplicas(1) |
| 25 | + c, err := dgraphtest.NewLocalCluster(conf) |
| 26 | + require.NoError(t, err) |
| 27 | + defer func() { c.Cleanup(t.Failed()) }() |
| 28 | + require.NoError(t, c.Start()) |
| 29 | + |
| 30 | + httpClient, err := c.HTTPClient() |
| 31 | + require.NoError(t, err) |
| 32 | + |
| 33 | + dg, cleanup, err := c.Client() |
| 34 | + require.NoError(t, err) |
| 35 | + defer cleanup() |
| 36 | + |
| 37 | + require.NoError(t, dg.DropAll()) |
| 38 | + |
| 39 | + // Setup schema |
| 40 | + schema := ` |
| 41 | + name: string @index(exact) . |
| 42 | + email_group_1: string @unique @index(exact) . |
| 43 | + email_group_2: string @unique @index(exact) . |
| 44 | + ` |
| 45 | + require.NoError(t, dg.SetupSchema(schema)) |
| 46 | + time.Sleep(2 * time.Second) |
| 47 | + |
| 48 | + // Get the cluster state to find which alphas belong to which groups |
| 49 | + var state pb.MembershipState |
| 50 | + |
| 51 | + getStateAndFindGroups := func() (uint32, uint32) { |
| 52 | + healthResp, err := httpClient.GetAlphaState() |
| 53 | + require.NoError(t, err) |
| 54 | + require.NoError(t, protojson.Unmarshal(healthResp, &state)) |
| 55 | + t.Logf("Retrieved cluster state with %d groups", len(state.Groups)) |
| 56 | + var e1, e2 uint32 |
| 57 | + for groupID, group := range state.Groups { |
| 58 | + for predName := range group.Tablets { |
| 59 | + |
| 60 | + if predName == "email_group_1" || predName == "0-email_group_1" { |
| 61 | + t.Logf("predName: %s", predName) |
| 62 | + t.Logf("groupID: %d", groupID) |
| 63 | + e1 = groupID |
| 64 | + } |
| 65 | + if predName == "email_group_2" || predName == "0-email_group_2" { |
| 66 | + t.Logf("predName: %s", predName) |
| 67 | + t.Logf("groupID: %d", groupID) |
| 68 | + e2 = groupID |
| 69 | + } |
| 70 | + } |
| 71 | + } |
| 72 | + return e1, e2 |
| 73 | + } |
| 74 | + |
| 75 | + email1GroupID, email2GroupID := getStateAndFindGroups() |
| 76 | + require.NotZero(t, email1GroupID, "email_group_1 predicate should be assigned to a group") |
| 77 | + require.NotZero(t, email2GroupID, "email_group_2 predicate should be assigned to a group") |
| 78 | + |
| 79 | + // If both predicates are in the same group, move one to a different group |
| 80 | + if email1GroupID == email2GroupID { |
| 81 | + var targetGroupID uint32 |
| 82 | + for gid := range state.Groups { |
| 83 | + if gid != email1GroupID && gid > 0 { |
| 84 | + targetGroupID = gid |
| 85 | + break |
| 86 | + } |
| 87 | + } |
| 88 | + require.NotZero(t, targetGroupID, "need at least two groups to move predicate") |
| 89 | + err = httpClient.MoveTablet("email_group_1", targetGroupID) |
| 90 | + if err != nil { |
| 91 | + require.Contains(t, err.Error(), "already being served by group") |
| 92 | + } |
| 93 | + t.Logf("Moved email_group_1 predicate to group %d (was in same group as email_group_2)", targetGroupID) |
| 94 | + time.Sleep(2 * time.Second) |
| 95 | + email1GroupID, email2GroupID = getStateAndFindGroups() |
| 96 | + } |
| 97 | + |
| 98 | + require.NotEqual(t, email1GroupID, email2GroupID, "email_group_1 and email_group_2 should be in different groups") |
| 99 | + |
| 100 | + t.Logf("email_group_1 is in group %d, email_group_2 is in group %d", email1GroupID, email2GroupID) |
| 101 | + |
| 102 | + // Helper to find an alpha index in a given group |
| 103 | + findAlphaInGroup := func(gid uint32) int { |
| 104 | + if group, ok := state.Groups[gid]; ok { |
| 105 | + for _, member := range group.Members { |
| 106 | + addr := member.Addr |
| 107 | + if strings.HasPrefix(addr, "alpha") { |
| 108 | + alphaNumStr := strings.TrimPrefix(addr, "alpha") |
| 109 | + alphaNumStr = strings.Split(alphaNumStr, ":")[0] |
| 110 | + alphaNum, err := strconv.Atoi(alphaNumStr) |
| 111 | + if err == nil && alphaNum >= 0 { |
| 112 | + return alphaNum |
| 113 | + } |
| 114 | + } |
| 115 | + } |
| 116 | + } |
| 117 | + return -1 |
| 118 | + } |
| 119 | + alphaForEmailGroup1 := findAlphaInGroup(email1GroupID) |
| 120 | + alphaForEmailGroup2 := findAlphaInGroup(email2GroupID) |
| 121 | + require.GreaterOrEqual(t, alphaForEmailGroup1, 0, "should find an alpha serving email_group_1") |
| 122 | + require.GreaterOrEqual(t, alphaForEmailGroup2, 0, "should find an alpha serving email_group_2") |
| 123 | + |
| 124 | + // Insert initial values for both predicates using default client |
| 125 | + _, err = dg.Mutate(&api.Mutation{ |
| 126 | + SetNquads: []byte(`<0x100> <name> "User One" . |
| 127 | + <0x100> <email_group_1> "[email protected]" . |
| 128 | + <0x100> <email_group_2> "[email protected]" .`), |
| 129 | + CommitNow: true, |
| 130 | + }) |
| 131 | + require.NoError(t, err) |
| 132 | + |
| 133 | + // Try to insert duplicate into email1 from an alpha that does NOT serve email1 (i.e. from email2's group) |
| 134 | + dgNotEmail1, cleanup1, err := c.AlphaClient(alphaForEmailGroup2) |
| 135 | + require.NoError(t, err) |
| 136 | + defer cleanup1() |
| 137 | + rdfDupEmail1 := `<0x200> <name> "User Two" . |
| 138 | + <0x200> <email_group_1> "[email protected]" .` |
| 139 | + _, err = dgNotEmail1.Mutate(&api.Mutation{ |
| 140 | + SetNquads: []byte(rdfDupEmail1), |
| 141 | + CommitNow: true, |
| 142 | + }) |
| 143 | + require.Error(t, err) |
| 144 | + require.ErrorContains(t, err, "could not insert duplicate value") |
| 145 | + |
| 146 | + // Try to insert duplicate into email2 from an alpha that does NOT serve email2 (i.e. from email1's group) |
| 147 | + dgNotEmail2, cleanup2, err := c.AlphaClient(alphaForEmailGroup1) |
| 148 | + require.NoError(t, err) |
| 149 | + defer cleanup2() |
| 150 | + rdfDupEmail2 := `<0x300> <name> "User Three" . |
| 151 | + <0x300> <email_group_2> "[email protected]" .` |
| 152 | + _, err = dgNotEmail2.Mutate(&api.Mutation{ |
| 153 | + SetNquads: []byte(rdfDupEmail2), |
| 154 | + CommitNow: true, |
| 155 | + }) |
| 156 | + require.Error(t, err) |
| 157 | + require.ErrorContains(t, err, "could not insert duplicate value") |
| 158 | +} |
0 commit comments