mirror of
				https://github.com/coredns/coredns.git
				synced 2025-10-31 10:13:14 -04:00 
			
		
		
		
	
		
			
				
	
	
		
			288 lines
		
	
	
		
			7.8 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			288 lines
		
	
	
		
			7.8 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
| /*
 | |
|  *
 | |
|  * Copyright 2019 gRPC authors.
 | |
|  *
 | |
|  * Licensed under the Apache License, Version 2.0 (the "License");
 | |
|  * you may not use this file except in compliance with the License.
 | |
|  * You may obtain a copy of the License at
 | |
|  *
 | |
|  *     http://www.apache.org/licenses/LICENSE-2.0
 | |
|  *
 | |
|  * Unless required by applicable law or agreed to in writing, software
 | |
|  * distributed under the License is distributed on an "AS IS" BASIS,
 | |
|  * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 | |
|  * See the License for the specific language governing permissions and
 | |
|  * limitations under the License.
 | |
|  */
 | |
| 
 | |
| package xds
 | |
| 
 | |
| import (
 | |
| 	"errors"
 | |
| 	"fmt"
 | |
| 	"testing"
 | |
| 	"time"
 | |
| 
 | |
| 	xdspb "github.com/envoyproxy/go-control-plane/envoy/api/v2"
 | |
| 	corepb "github.com/envoyproxy/go-control-plane/envoy/api/v2/core"
 | |
| 	"github.com/golang/protobuf/ptypes"
 | |
| 	anypb "github.com/golang/protobuf/ptypes/any"
 | |
| 	"github.com/google/go-cmp/cmp"
 | |
| 	"google.golang.org/grpc/xds/internal/testutils"
 | |
| )
 | |
| 
 | |
| func TestEDSParseRespProto(t *testing.T) {
 | |
| 	tests := []struct {
 | |
| 		name    string
 | |
| 		m       *xdspb.ClusterLoadAssignment
 | |
| 		want    *EDSUpdate
 | |
| 		wantErr bool
 | |
| 	}{
 | |
| 		{
 | |
| 			name: "missing-priority",
 | |
| 			m: func() *xdspb.ClusterLoadAssignment {
 | |
| 				clab0 := NewClusterLoadAssignmentBuilder("test", nil)
 | |
| 				clab0.AddLocality("locality-1", 1, 0, []string{"addr1:314"}, nil)
 | |
| 				clab0.AddLocality("locality-2", 1, 2, []string{"addr2:159"}, nil)
 | |
| 				return clab0.Build()
 | |
| 			}(),
 | |
| 			want:    nil,
 | |
| 			wantErr: true,
 | |
| 		},
 | |
| 		{
 | |
| 			name: "missing-locality-ID",
 | |
| 			m: func() *xdspb.ClusterLoadAssignment {
 | |
| 				clab0 := NewClusterLoadAssignmentBuilder("test", nil)
 | |
| 				clab0.AddLocality("", 1, 0, []string{"addr1:314"}, nil)
 | |
| 				return clab0.Build()
 | |
| 			}(),
 | |
| 			want:    nil,
 | |
| 			wantErr: true,
 | |
| 		},
 | |
| 		{
 | |
| 			name: "good",
 | |
| 			m: func() *xdspb.ClusterLoadAssignment {
 | |
| 				clab0 := NewClusterLoadAssignmentBuilder("test", nil)
 | |
| 				clab0.AddLocality("locality-1", 1, 1, []string{"addr1:314"}, &AddLocalityOptions{
 | |
| 					Health: []corepb.HealthStatus{corepb.HealthStatus_UNHEALTHY},
 | |
| 					Weight: []uint32{271},
 | |
| 				})
 | |
| 				clab0.AddLocality("locality-2", 1, 0, []string{"addr2:159"}, &AddLocalityOptions{
 | |
| 					Health: []corepb.HealthStatus{corepb.HealthStatus_DRAINING},
 | |
| 					Weight: []uint32{828},
 | |
| 				})
 | |
| 				return clab0.Build()
 | |
| 			}(),
 | |
| 			want: &EDSUpdate{
 | |
| 				Drops: nil,
 | |
| 				Localities: []Locality{
 | |
| 					{
 | |
| 						Endpoints: []Endpoint{{
 | |
| 							Address:      "addr1:314",
 | |
| 							HealthStatus: EndpointHealthStatusUnhealthy,
 | |
| 							Weight:       271,
 | |
| 						}},
 | |
| 						ID:       Locality{SubZone: "locality-1"},
 | |
| 						Priority: 1,
 | |
| 						Weight:   1,
 | |
| 					},
 | |
| 					{
 | |
| 						Endpoints: []Endpoint{{
 | |
| 							Address:      "addr2:159",
 | |
| 							HealthStatus: EndpointHealthStatusDraining,
 | |
| 							Weight:       828,
 | |
| 						}},
 | |
| 						ID:       Locality{SubZone: "locality-2"},
 | |
| 						Priority: 0,
 | |
| 						Weight:   1,
 | |
| 					},
 | |
| 				},
 | |
| 			},
 | |
| 			wantErr: false,
 | |
| 		},
 | |
| 	}
 | |
| 	for _, tt := range tests {
 | |
| 		t.Run(tt.name, func(t *testing.T) {
 | |
| 			got, err := ParseEDSRespProto(tt.m)
 | |
| 			if (err != nil) != tt.wantErr {
 | |
| 				t.Errorf("ParseEDSRespProto() error = %v, wantErr %v", err, tt.wantErr)
 | |
| 				return
 | |
| 			}
 | |
| 			if d := cmp.Diff(got, tt.want); d != "" {
 | |
| 				t.Errorf("ParseEDSRespProto() got = %v, want %v, diff: %v", got, tt.want, d)
 | |
| 			}
 | |
| 		})
 | |
| 	}
 | |
| }
 | |
| 
 | |
| var (
 | |
| 	badlyMarshaledEDSResponse = &xdspb.DiscoveryResponse{
 | |
| 		Resources: []*anypb.Any{
 | |
| 			{
 | |
| 				TypeUrl: edsURL,
 | |
| 				Value:   []byte{1, 2, 3, 4},
 | |
| 			},
 | |
| 		},
 | |
| 		TypeUrl: edsURL,
 | |
| 	}
 | |
| 	badResourceTypeInEDSResponse = &xdspb.DiscoveryResponse{
 | |
| 		Resources: []*anypb.Any{
 | |
| 			{
 | |
| 				TypeUrl: httpConnManagerURL,
 | |
| 				Value:   marshaledConnMgr1,
 | |
| 			},
 | |
| 		},
 | |
| 		TypeUrl: edsURL,
 | |
| 	}
 | |
| 	goodEDSResponse1 = &xdspb.DiscoveryResponse{
 | |
| 		Resources: []*anypb.Any{
 | |
| 			func() *anypb.Any {
 | |
| 				clab0 := NewClusterLoadAssignmentBuilder(goodEDSName, nil)
 | |
| 				clab0.AddLocality("locality-1", 1, 1, []string{"addr1:314"}, nil)
 | |
| 				clab0.AddLocality("locality-2", 1, 0, []string{"addr2:159"}, nil)
 | |
| 				a, _ := ptypes.MarshalAny(clab0.Build())
 | |
| 				return a
 | |
| 			}(),
 | |
| 		},
 | |
| 		TypeUrl: edsURL,
 | |
| 	}
 | |
| 	goodEDSResponse2 = &xdspb.DiscoveryResponse{
 | |
| 		Resources: []*anypb.Any{
 | |
| 			func() *anypb.Any {
 | |
| 				clab0 := NewClusterLoadAssignmentBuilder("not-goodEDSName", nil)
 | |
| 				clab0.AddLocality("locality-1", 1, 1, []string{"addr1:314"}, nil)
 | |
| 				clab0.AddLocality("locality-2", 1, 0, []string{"addr2:159"}, nil)
 | |
| 				a, _ := ptypes.MarshalAny(clab0.Build())
 | |
| 				return a
 | |
| 			}(),
 | |
| 		},
 | |
| 		TypeUrl: edsURL,
 | |
| 	}
 | |
| )
 | |
| 
 | |
| func TestEDSHandleResponse(t *testing.T) {
 | |
| 	fakeServer, cc, cleanup := startServerAndGetCC(t)
 | |
| 	defer cleanup()
 | |
| 
 | |
| 	v2c := newV2Client(cc, goodNodeProto, func(int) time.Duration { return 0 })
 | |
| 	defer v2c.close()
 | |
| 
 | |
| 	tests := []struct {
 | |
| 		name          string
 | |
| 		edsResponse   *xdspb.DiscoveryResponse
 | |
| 		wantErr       bool
 | |
| 		wantUpdate    *EDSUpdate
 | |
| 		wantUpdateErr bool
 | |
| 	}{
 | |
| 		// Any in resource is badly marshaled.
 | |
| 		{
 | |
| 			name:          "badly-marshaled_response",
 | |
| 			edsResponse:   badlyMarshaledEDSResponse,
 | |
| 			wantErr:       true,
 | |
| 			wantUpdate:    nil,
 | |
| 			wantUpdateErr: false,
 | |
| 		},
 | |
| 		// Response doesn't contain resource with the right type.
 | |
| 		{
 | |
| 			name:          "no-config-in-response",
 | |
| 			edsResponse:   badResourceTypeInEDSResponse,
 | |
| 			wantErr:       true,
 | |
| 			wantUpdate:    nil,
 | |
| 			wantUpdateErr: false,
 | |
| 		},
 | |
| 		// Response contains one uninteresting ClusterLoadAssignment.
 | |
| 		{
 | |
| 			name:          "one-uninterestring-assignment",
 | |
| 			edsResponse:   goodEDSResponse2,
 | |
| 			wantErr:       false,
 | |
| 			wantUpdate:    nil,
 | |
| 			wantUpdateErr: false,
 | |
| 		},
 | |
| 		// Response contains one good ClusterLoadAssignment.
 | |
| 		{
 | |
| 			name:        "one-good-assignment",
 | |
| 			edsResponse: goodEDSResponse1,
 | |
| 			wantErr:     false,
 | |
| 			wantUpdate: &EDSUpdate{
 | |
| 				Localities: []Locality{
 | |
| 					{
 | |
| 						Endpoints: []Endpoint{{Address: "addr1:314"}},
 | |
| 						ID:        Locality{SubZone: "locality-1"},
 | |
| 						Priority:  1,
 | |
| 						Weight:    1,
 | |
| 					},
 | |
| 					{
 | |
| 						Endpoints: []Endpoint{{Address: "addr2:159"}},
 | |
| 						ID:        Locality{SubZone: "locality-2"},
 | |
| 						Priority:  0,
 | |
| 						Weight:    1,
 | |
| 					},
 | |
| 				},
 | |
| 			},
 | |
| 			wantUpdateErr: false,
 | |
| 		},
 | |
| 	}
 | |
| 	for _, test := range tests {
 | |
| 		t.Run(test.name, func(t *testing.T) {
 | |
| 			testWatchHandle(t, &watchHandleTestcase{
 | |
| 				responseToHandle: test.edsResponse,
 | |
| 				wantHandleErr:    test.wantErr,
 | |
| 				wantUpdate:       test.wantUpdate,
 | |
| 				wantUpdateErr:    test.wantUpdateErr,
 | |
| 
 | |
| 				edsWatch:      v2c.watchEDS,
 | |
| 				watchReqChan:  fakeServer.XDSRequestChan,
 | |
| 				handleXDSResp: v2c.handleEDSResponse,
 | |
| 			})
 | |
| 		})
 | |
| 	}
 | |
| }
 | |
| 
 | |
| // TestEDSHandleResponseWithoutWatch tests the case where the v2Client
 | |
| // receives an EDS response without a registered EDS watcher.
 | |
| func TestEDSHandleResponseWithoutWatch(t *testing.T) {
 | |
| 	_, cc, cleanup := startServerAndGetCC(t)
 | |
| 	defer cleanup()
 | |
| 
 | |
| 	v2c := newV2Client(cc, goodNodeProto, func(int) time.Duration { return 0 })
 | |
| 	defer v2c.close()
 | |
| 
 | |
| 	if v2c.handleEDSResponse(goodEDSResponse1) == nil {
 | |
| 		t.Fatal("v2c.handleEDSResponse() succeeded, should have failed")
 | |
| 	}
 | |
| }
 | |
| 
 | |
| func TestEDSWatchExpiryTimer(t *testing.T) {
 | |
| 	oldWatchExpiryTimeout := defaultWatchExpiryTimeout
 | |
| 	defaultWatchExpiryTimeout = 500 * time.Millisecond
 | |
| 	defer func() {
 | |
| 		defaultWatchExpiryTimeout = oldWatchExpiryTimeout
 | |
| 	}()
 | |
| 
 | |
| 	fakeServer, cc, cleanup := startServerAndGetCC(t)
 | |
| 	defer cleanup()
 | |
| 
 | |
| 	v2c := newV2Client(cc, goodNodeProto, func(int) time.Duration { return 0 })
 | |
| 	defer v2c.close()
 | |
| 	t.Log("Started xds v2Client...")
 | |
| 
 | |
| 	callbackCh := testutils.NewChannel()
 | |
| 	v2c.watchEDS(goodRouteName1, func(u *EDSUpdate, err error) {
 | |
| 		t.Logf("Received callback with edsUpdate {%+v} and error {%v}", u, err)
 | |
| 		if u != nil {
 | |
| 			callbackCh.Send(fmt.Errorf("received EDSUpdate %v in edsCallback, wanted nil", u))
 | |
| 		}
 | |
| 		if err == nil {
 | |
| 			callbackCh.Send(errors.New("received nil error in edsCallback"))
 | |
| 		}
 | |
| 		callbackCh.Send(nil)
 | |
| 	})
 | |
| 
 | |
| 	// Wait till the request makes it to the fakeServer. This ensures that
 | |
| 	// the watch request has been processed by the v2Client.
 | |
| 	if _, err := fakeServer.XDSRequestChan.Receive(); err != nil {
 | |
| 		t.Fatalf("Timeout expired when expecting an CDS request")
 | |
| 	}
 | |
| 	waitForNilErr(t, callbackCh)
 | |
| }
 |