/* * * Copyright 2019 gRPC authors. * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. * */ package v2 import ( "testing" "time" v2xdspb "github.com/envoyproxy/go-control-plane/envoy/api/v2" anypb "github.com/golang/protobuf/ptypes/any" "github.com/google/go-cmp/cmp/cmpopts" "google.golang.org/grpc/internal/testutils" "google.golang.org/grpc/xds/internal" xtestutils "google.golang.org/grpc/xds/internal/testutils" "google.golang.org/grpc/xds/internal/version" "google.golang.org/grpc/xds/internal/xdsclient" ) var ( badlyMarshaledEDSResponse = &v2xdspb.DiscoveryResponse{ Resources: []*anypb.Any{ { TypeUrl: version.V2EndpointsURL, Value: []byte{1, 2, 3, 4}, }, }, TypeUrl: version.V2EndpointsURL, } badResourceTypeInEDSResponse = &v2xdspb.DiscoveryResponse{ Resources: []*anypb.Any{marshaledConnMgr1}, TypeUrl: version.V2EndpointsURL, } marshaledGoodCLA1 = func() *anypb.Any { clab0 := xtestutils.NewClusterLoadAssignmentBuilder(goodEDSName, nil) clab0.AddLocality("locality-1", 1, 1, []string{"addr1:314"}, nil) clab0.AddLocality("locality-2", 1, 0, []string{"addr2:159"}, nil) return testutils.MarshalAny(clab0.Build()) }() goodEDSResponse1 = &v2xdspb.DiscoveryResponse{ Resources: []*anypb.Any{ marshaledGoodCLA1, }, TypeUrl: version.V2EndpointsURL, } marshaledGoodCLA2 = func() *anypb.Any { clab0 := xtestutils.NewClusterLoadAssignmentBuilder("not-goodEDSName", nil) clab0.AddLocality("locality-1", 1, 0, []string{"addr1:314"}, nil) return testutils.MarshalAny(clab0.Build()) }() goodEDSResponse2 = &v2xdspb.DiscoveryResponse{ Resources: []*anypb.Any{ marshaledGoodCLA2, }, TypeUrl: version.V2EndpointsURL, } ) func (s) TestEDSHandleResponse(t *testing.T) { tests := []struct { name string edsResponse *v2xdspb.DiscoveryResponse wantErr bool wantUpdate map[string]xdsclient.EndpointsUpdateErrTuple wantUpdateMD xdsclient.UpdateMetadata wantUpdateErr bool }{ // Any in resource is badly marshaled. { name: "badly-marshaled_response", edsResponse: badlyMarshaledEDSResponse, wantErr: true, wantUpdate: nil, wantUpdateMD: xdsclient.UpdateMetadata{ Status: xdsclient.ServiceStatusNACKed, ErrState: &xdsclient.UpdateErrorMetadata{ Err: cmpopts.AnyError, }, }, wantUpdateErr: false, }, // Response doesn't contain resource with the right type. { name: "no-config-in-response", edsResponse: badResourceTypeInEDSResponse, wantErr: true, wantUpdate: nil, wantUpdateMD: xdsclient.UpdateMetadata{ Status: xdsclient.ServiceStatusNACKed, ErrState: &xdsclient.UpdateErrorMetadata{ Err: cmpopts.AnyError, }, }, wantUpdateErr: false, }, // Response contains one uninteresting ClusterLoadAssignment. { name: "one-uninterestring-assignment", edsResponse: goodEDSResponse2, wantErr: false, wantUpdate: map[string]xdsclient.EndpointsUpdateErrTuple{ "not-goodEDSName": {Update: xdsclient.EndpointsUpdate{ Localities: []xdsclient.Locality{ { Endpoints: []xdsclient.Endpoint{{Address: "addr1:314"}}, ID: internal.LocalityID{SubZone: "locality-1"}, Priority: 0, Weight: 1, }, }, Raw: marshaledGoodCLA2, }}, }, wantUpdateMD: xdsclient.UpdateMetadata{ Status: xdsclient.ServiceStatusACKed, }, wantUpdateErr: false, }, // Response contains one good ClusterLoadAssignment. { name: "one-good-assignment", edsResponse: goodEDSResponse1, wantErr: false, wantUpdate: map[string]xdsclient.EndpointsUpdateErrTuple{ goodEDSName: {Update: xdsclient.EndpointsUpdate{ Localities: []xdsclient.Locality{ { Endpoints: []xdsclient.Endpoint{{Address: "addr1:314"}}, ID: internal.LocalityID{SubZone: "locality-1"}, Priority: 1, Weight: 1, }, { Endpoints: []xdsclient.Endpoint{{Address: "addr2:159"}}, ID: internal.LocalityID{SubZone: "locality-2"}, Priority: 0, Weight: 1, }, }, Raw: marshaledGoodCLA1, }}, }, wantUpdateMD: xdsclient.UpdateMetadata{ Status: xdsclient.ServiceStatusACKed, }, wantUpdateErr: false, }, } for _, test := range tests { t.Run(test.name, func(t *testing.T) { testWatchHandle(t, &watchHandleTestcase{ rType: xdsclient.EndpointsResource, resourceName: goodEDSName, responseToHandle: test.edsResponse, wantHandleErr: test.wantErr, wantUpdate: test.wantUpdate, wantUpdateMD: test.wantUpdateMD, wantUpdateErr: test.wantUpdateErr, }) }) } } // TestEDSHandleResponseWithoutWatch tests the case where the v2Client // receives an EDS response without a registered EDS watcher. func (s) TestEDSHandleResponseWithoutWatch(t *testing.T) { _, cc, cleanup := startServerAndGetCC(t) defer cleanup() v2c, err := newV2Client(&testUpdateReceiver{ f: func(xdsclient.ResourceType, map[string]interface{}, xdsclient.UpdateMetadata) {}, }, cc, goodNodeProto, func(int) time.Duration { return 0 }, nil) if err != nil { t.Fatal(err) } defer v2c.Close() if v2c.handleEDSResponse(badResourceTypeInEDSResponse) == nil { t.Fatal("v2c.handleEDSResponse() succeeded, should have failed") } if v2c.handleEDSResponse(goodEDSResponse1) != nil { t.Fatal("v2c.handleEDSResponse() succeeded, should have failed") } }