mirror of
https://github.com/coredns/coredns.git
synced 2025-11-02 02:03:13 -05:00
288 lines
7.8 KiB
Go
288 lines
7.8 KiB
Go
/*
|
|
*
|
|
* Copyright 2019 gRPC authors.
|
|
*
|
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
* you may not use this file except in compliance with the License.
|
|
* You may obtain a copy of the License at
|
|
*
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
*
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
* See the License for the specific language governing permissions and
|
|
* limitations under the License.
|
|
*/
|
|
|
|
package xds
|
|
|
|
import (
|
|
"errors"
|
|
"fmt"
|
|
"testing"
|
|
"time"
|
|
|
|
xdspb "github.com/envoyproxy/go-control-plane/envoy/api/v2"
|
|
corepb "github.com/envoyproxy/go-control-plane/envoy/api/v2/core"
|
|
"github.com/golang/protobuf/ptypes"
|
|
anypb "github.com/golang/protobuf/ptypes/any"
|
|
"github.com/google/go-cmp/cmp"
|
|
"google.golang.org/grpc/xds/internal/testutils"
|
|
)
|
|
|
|
func TestEDSParseRespProto(t *testing.T) {
|
|
tests := []struct {
|
|
name string
|
|
m *xdspb.ClusterLoadAssignment
|
|
want *EDSUpdate
|
|
wantErr bool
|
|
}{
|
|
{
|
|
name: "missing-priority",
|
|
m: func() *xdspb.ClusterLoadAssignment {
|
|
clab0 := NewClusterLoadAssignmentBuilder("test", nil)
|
|
clab0.AddLocality("locality-1", 1, 0, []string{"addr1:314"}, nil)
|
|
clab0.AddLocality("locality-2", 1, 2, []string{"addr2:159"}, nil)
|
|
return clab0.Build()
|
|
}(),
|
|
want: nil,
|
|
wantErr: true,
|
|
},
|
|
{
|
|
name: "missing-locality-ID",
|
|
m: func() *xdspb.ClusterLoadAssignment {
|
|
clab0 := NewClusterLoadAssignmentBuilder("test", nil)
|
|
clab0.AddLocality("", 1, 0, []string{"addr1:314"}, nil)
|
|
return clab0.Build()
|
|
}(),
|
|
want: nil,
|
|
wantErr: true,
|
|
},
|
|
{
|
|
name: "good",
|
|
m: func() *xdspb.ClusterLoadAssignment {
|
|
clab0 := NewClusterLoadAssignmentBuilder("test", nil)
|
|
clab0.AddLocality("locality-1", 1, 1, []string{"addr1:314"}, &AddLocalityOptions{
|
|
Health: []corepb.HealthStatus{corepb.HealthStatus_UNHEALTHY},
|
|
Weight: []uint32{271},
|
|
})
|
|
clab0.AddLocality("locality-2", 1, 0, []string{"addr2:159"}, &AddLocalityOptions{
|
|
Health: []corepb.HealthStatus{corepb.HealthStatus_DRAINING},
|
|
Weight: []uint32{828},
|
|
})
|
|
return clab0.Build()
|
|
}(),
|
|
want: &EDSUpdate{
|
|
Drops: nil,
|
|
Localities: []Locality{
|
|
{
|
|
Endpoints: []Endpoint{{
|
|
Address: "addr1:314",
|
|
HealthStatus: EndpointHealthStatusUnhealthy,
|
|
Weight: 271,
|
|
}},
|
|
ID: Locality{SubZone: "locality-1"},
|
|
Priority: 1,
|
|
Weight: 1,
|
|
},
|
|
{
|
|
Endpoints: []Endpoint{{
|
|
Address: "addr2:159",
|
|
HealthStatus: EndpointHealthStatusDraining,
|
|
Weight: 828,
|
|
}},
|
|
ID: Locality{SubZone: "locality-2"},
|
|
Priority: 0,
|
|
Weight: 1,
|
|
},
|
|
},
|
|
},
|
|
wantErr: false,
|
|
},
|
|
}
|
|
for _, tt := range tests {
|
|
t.Run(tt.name, func(t *testing.T) {
|
|
got, err := ParseEDSRespProto(tt.m)
|
|
if (err != nil) != tt.wantErr {
|
|
t.Errorf("ParseEDSRespProto() error = %v, wantErr %v", err, tt.wantErr)
|
|
return
|
|
}
|
|
if d := cmp.Diff(got, tt.want); d != "" {
|
|
t.Errorf("ParseEDSRespProto() got = %v, want %v, diff: %v", got, tt.want, d)
|
|
}
|
|
})
|
|
}
|
|
}
|
|
|
|
var (
|
|
badlyMarshaledEDSResponse = &xdspb.DiscoveryResponse{
|
|
Resources: []*anypb.Any{
|
|
{
|
|
TypeUrl: edsURL,
|
|
Value: []byte{1, 2, 3, 4},
|
|
},
|
|
},
|
|
TypeUrl: edsURL,
|
|
}
|
|
badResourceTypeInEDSResponse = &xdspb.DiscoveryResponse{
|
|
Resources: []*anypb.Any{
|
|
{
|
|
TypeUrl: httpConnManagerURL,
|
|
Value: marshaledConnMgr1,
|
|
},
|
|
},
|
|
TypeUrl: edsURL,
|
|
}
|
|
goodEDSResponse1 = &xdspb.DiscoveryResponse{
|
|
Resources: []*anypb.Any{
|
|
func() *anypb.Any {
|
|
clab0 := NewClusterLoadAssignmentBuilder(goodEDSName, nil)
|
|
clab0.AddLocality("locality-1", 1, 1, []string{"addr1:314"}, nil)
|
|
clab0.AddLocality("locality-2", 1, 0, []string{"addr2:159"}, nil)
|
|
a, _ := ptypes.MarshalAny(clab0.Build())
|
|
return a
|
|
}(),
|
|
},
|
|
TypeUrl: edsURL,
|
|
}
|
|
goodEDSResponse2 = &xdspb.DiscoveryResponse{
|
|
Resources: []*anypb.Any{
|
|
func() *anypb.Any {
|
|
clab0 := NewClusterLoadAssignmentBuilder("not-goodEDSName", nil)
|
|
clab0.AddLocality("locality-1", 1, 1, []string{"addr1:314"}, nil)
|
|
clab0.AddLocality("locality-2", 1, 0, []string{"addr2:159"}, nil)
|
|
a, _ := ptypes.MarshalAny(clab0.Build())
|
|
return a
|
|
}(),
|
|
},
|
|
TypeUrl: edsURL,
|
|
}
|
|
)
|
|
|
|
func TestEDSHandleResponse(t *testing.T) {
|
|
fakeServer, cc, cleanup := startServerAndGetCC(t)
|
|
defer cleanup()
|
|
|
|
v2c := newV2Client(cc, goodNodeProto, func(int) time.Duration { return 0 })
|
|
defer v2c.close()
|
|
|
|
tests := []struct {
|
|
name string
|
|
edsResponse *xdspb.DiscoveryResponse
|
|
wantErr bool
|
|
wantUpdate *EDSUpdate
|
|
wantUpdateErr bool
|
|
}{
|
|
// Any in resource is badly marshaled.
|
|
{
|
|
name: "badly-marshaled_response",
|
|
edsResponse: badlyMarshaledEDSResponse,
|
|
wantErr: true,
|
|
wantUpdate: nil,
|
|
wantUpdateErr: false,
|
|
},
|
|
// Response doesn't contain resource with the right type.
|
|
{
|
|
name: "no-config-in-response",
|
|
edsResponse: badResourceTypeInEDSResponse,
|
|
wantErr: true,
|
|
wantUpdate: nil,
|
|
wantUpdateErr: false,
|
|
},
|
|
// Response contains one uninteresting ClusterLoadAssignment.
|
|
{
|
|
name: "one-uninterestring-assignment",
|
|
edsResponse: goodEDSResponse2,
|
|
wantErr: false,
|
|
wantUpdate: nil,
|
|
wantUpdateErr: false,
|
|
},
|
|
// Response contains one good ClusterLoadAssignment.
|
|
{
|
|
name: "one-good-assignment",
|
|
edsResponse: goodEDSResponse1,
|
|
wantErr: false,
|
|
wantUpdate: &EDSUpdate{
|
|
Localities: []Locality{
|
|
{
|
|
Endpoints: []Endpoint{{Address: "addr1:314"}},
|
|
ID: Locality{SubZone: "locality-1"},
|
|
Priority: 1,
|
|
Weight: 1,
|
|
},
|
|
{
|
|
Endpoints: []Endpoint{{Address: "addr2:159"}},
|
|
ID: Locality{SubZone: "locality-2"},
|
|
Priority: 0,
|
|
Weight: 1,
|
|
},
|
|
},
|
|
},
|
|
wantUpdateErr: false,
|
|
},
|
|
}
|
|
for _, test := range tests {
|
|
t.Run(test.name, func(t *testing.T) {
|
|
testWatchHandle(t, &watchHandleTestcase{
|
|
responseToHandle: test.edsResponse,
|
|
wantHandleErr: test.wantErr,
|
|
wantUpdate: test.wantUpdate,
|
|
wantUpdateErr: test.wantUpdateErr,
|
|
|
|
edsWatch: v2c.watchEDS,
|
|
watchReqChan: fakeServer.XDSRequestChan,
|
|
handleXDSResp: v2c.handleEDSResponse,
|
|
})
|
|
})
|
|
}
|
|
}
|
|
|
|
// TestEDSHandleResponseWithoutWatch tests the case where the v2Client
|
|
// receives an EDS response without a registered EDS watcher.
|
|
func TestEDSHandleResponseWithoutWatch(t *testing.T) {
|
|
_, cc, cleanup := startServerAndGetCC(t)
|
|
defer cleanup()
|
|
|
|
v2c := newV2Client(cc, goodNodeProto, func(int) time.Duration { return 0 })
|
|
defer v2c.close()
|
|
|
|
if v2c.handleEDSResponse(goodEDSResponse1) == nil {
|
|
t.Fatal("v2c.handleEDSResponse() succeeded, should have failed")
|
|
}
|
|
}
|
|
|
|
func TestEDSWatchExpiryTimer(t *testing.T) {
|
|
oldWatchExpiryTimeout := defaultWatchExpiryTimeout
|
|
defaultWatchExpiryTimeout = 500 * time.Millisecond
|
|
defer func() {
|
|
defaultWatchExpiryTimeout = oldWatchExpiryTimeout
|
|
}()
|
|
|
|
fakeServer, cc, cleanup := startServerAndGetCC(t)
|
|
defer cleanup()
|
|
|
|
v2c := newV2Client(cc, goodNodeProto, func(int) time.Duration { return 0 })
|
|
defer v2c.close()
|
|
t.Log("Started xds v2Client...")
|
|
|
|
callbackCh := testutils.NewChannel()
|
|
v2c.watchEDS(goodRouteName1, func(u *EDSUpdate, err error) {
|
|
t.Logf("Received callback with edsUpdate {%+v} and error {%v}", u, err)
|
|
if u != nil {
|
|
callbackCh.Send(fmt.Errorf("received EDSUpdate %v in edsCallback, wanted nil", u))
|
|
}
|
|
if err == nil {
|
|
callbackCh.Send(errors.New("received nil error in edsCallback"))
|
|
}
|
|
callbackCh.Send(nil)
|
|
})
|
|
|
|
// Wait till the request makes it to the fakeServer. This ensures that
|
|
// the watch request has been processed by the v2Client.
|
|
if _, err := fakeServer.XDSRequestChan.Receive(); err != nil {
|
|
t.Fatalf("Timeout expired when expecting an CDS request")
|
|
}
|
|
waitForNilErr(t, callbackCh)
|
|
}
|