mirror of https://github.com/grpc/grpc-go.git
				
				
				
			
		
			
				
	
	
		
			292 lines
		
	
	
		
			11 KiB
		
	
	
	
		
			Go
		
	
	
	
			
		
		
	
	
			292 lines
		
	
	
		
			11 KiB
		
	
	
	
		
			Go
		
	
	
	
| /*
 | |
|  *
 | |
|  * Copyright 2020 gRPC authors.
 | |
|  *
 | |
|  * Licensed under the Apache License, Version 2.0 (the "License");
 | |
|  * you may not use this file except in compliance with the License.
 | |
|  * You may obtain a copy of the License at
 | |
|  *
 | |
|  *     http://www.apache.org/licenses/LICENSE-2.0
 | |
|  *
 | |
|  * Unless required by applicable law or agreed to in writing, software
 | |
|  * distributed under the License is distributed on an "AS IS" BASIS,
 | |
|  * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 | |
|  * See the License for the specific language governing permissions and
 | |
|  * limitations under the License.
 | |
|  *
 | |
|  */
 | |
| 
 | |
| package resolver
 | |
| 
 | |
| import (
 | |
| 	"context"
 | |
| 	"fmt"
 | |
| 	"testing"
 | |
| 
 | |
| 	"github.com/google/go-cmp/cmp"
 | |
| 	"github.com/google/go-cmp/cmp/cmpopts"
 | |
| 	"google.golang.org/grpc/internal/testutils"
 | |
| 	xdsclient "google.golang.org/grpc/xds/internal/client"
 | |
| 	"google.golang.org/grpc/xds/internal/testutils/fakeclient"
 | |
| 	"google.golang.org/protobuf/proto"
 | |
| )
 | |
| 
 | |
| func (s) TestMatchTypeForDomain(t *testing.T) {
 | |
| 	tests := []struct {
 | |
| 		d    string
 | |
| 		want domainMatchType
 | |
| 	}{
 | |
| 		{d: "", want: domainMatchTypeInvalid},
 | |
| 		{d: "*", want: domainMatchTypeUniversal},
 | |
| 		{d: "bar.*", want: domainMatchTypePrefix},
 | |
| 		{d: "*.abc.com", want: domainMatchTypeSuffix},
 | |
| 		{d: "foo.bar.com", want: domainMatchTypeExact},
 | |
| 		{d: "foo.*.com", want: domainMatchTypeInvalid},
 | |
| 	}
 | |
| 	for _, tt := range tests {
 | |
| 		if got := matchTypeForDomain(tt.d); got != tt.want {
 | |
| 			t.Errorf("matchTypeForDomain(%q) = %v, want %v", tt.d, got, tt.want)
 | |
| 		}
 | |
| 	}
 | |
| }
 | |
| 
 | |
| func (s) TestMatch(t *testing.T) {
 | |
| 	tests := []struct {
 | |
| 		name        string
 | |
| 		domain      string
 | |
| 		host        string
 | |
| 		wantTyp     domainMatchType
 | |
| 		wantMatched bool
 | |
| 	}{
 | |
| 		{name: "invalid-empty", domain: "", host: "", wantTyp: domainMatchTypeInvalid, wantMatched: false},
 | |
| 		{name: "invalid", domain: "a.*.b", host: "", wantTyp: domainMatchTypeInvalid, wantMatched: false},
 | |
| 		{name: "universal", domain: "*", host: "abc.com", wantTyp: domainMatchTypeUniversal, wantMatched: true},
 | |
| 		{name: "prefix-match", domain: "abc.*", host: "abc.123", wantTyp: domainMatchTypePrefix, wantMatched: true},
 | |
| 		{name: "prefix-no-match", domain: "abc.*", host: "abcd.123", wantTyp: domainMatchTypePrefix, wantMatched: false},
 | |
| 		{name: "suffix-match", domain: "*.123", host: "abc.123", wantTyp: domainMatchTypeSuffix, wantMatched: true},
 | |
| 		{name: "suffix-no-match", domain: "*.123", host: "abc.1234", wantTyp: domainMatchTypeSuffix, wantMatched: false},
 | |
| 		{name: "exact-match", domain: "foo.bar", host: "foo.bar", wantTyp: domainMatchTypeExact, wantMatched: true},
 | |
| 		{name: "exact-no-match", domain: "foo.bar.com", host: "foo.bar", wantTyp: domainMatchTypeExact, wantMatched: false},
 | |
| 	}
 | |
| 	for _, tt := range tests {
 | |
| 		t.Run(tt.name, func(t *testing.T) {
 | |
| 			if gotTyp, gotMatched := match(tt.domain, tt.host); gotTyp != tt.wantTyp || gotMatched != tt.wantMatched {
 | |
| 				t.Errorf("match() = %v, %v, want %v, %v", gotTyp, gotMatched, tt.wantTyp, tt.wantMatched)
 | |
| 			}
 | |
| 		})
 | |
| 	}
 | |
| }
 | |
| 
 | |
| func (s) TestFindBestMatchingVirtualHost(t *testing.T) {
 | |
| 	var (
 | |
| 		oneExactMatch = &xdsclient.VirtualHost{
 | |
| 			Domains: []string{"foo.bar.com"},
 | |
| 		}
 | |
| 		oneSuffixMatch = &xdsclient.VirtualHost{
 | |
| 			Domains: []string{"*.bar.com"},
 | |
| 		}
 | |
| 		onePrefixMatch = &xdsclient.VirtualHost{
 | |
| 			Domains: []string{"foo.bar.*"},
 | |
| 		}
 | |
| 		oneUniversalMatch = &xdsclient.VirtualHost{
 | |
| 			Domains: []string{"*"},
 | |
| 		}
 | |
| 		longExactMatch = &xdsclient.VirtualHost{
 | |
| 			Domains: []string{"v2.foo.bar.com"},
 | |
| 		}
 | |
| 		multipleMatch = &xdsclient.VirtualHost{
 | |
| 			Domains: []string{"pi.foo.bar.com", "314.*", "*.159"},
 | |
| 		}
 | |
| 		vhs = []*xdsclient.VirtualHost{oneExactMatch, oneSuffixMatch, onePrefixMatch, oneUniversalMatch, longExactMatch, multipleMatch}
 | |
| 	)
 | |
| 
 | |
| 	tests := []struct {
 | |
| 		name   string
 | |
| 		host   string
 | |
| 		vHosts []*xdsclient.VirtualHost
 | |
| 		want   *xdsclient.VirtualHost
 | |
| 	}{
 | |
| 		{name: "exact-match", host: "foo.bar.com", vHosts: vhs, want: oneExactMatch},
 | |
| 		{name: "suffix-match", host: "123.bar.com", vHosts: vhs, want: oneSuffixMatch},
 | |
| 		{name: "prefix-match", host: "foo.bar.org", vHosts: vhs, want: onePrefixMatch},
 | |
| 		{name: "universal-match", host: "abc.123", vHosts: vhs, want: oneUniversalMatch},
 | |
| 		{name: "long-exact-match", host: "v2.foo.bar.com", vHosts: vhs, want: longExactMatch},
 | |
| 		// Matches suffix "*.bar.com" and exact "pi.foo.bar.com". Takes exact.
 | |
| 		{name: "multiple-match-exact", host: "pi.foo.bar.com", vHosts: vhs, want: multipleMatch},
 | |
| 		// Matches suffix "*.159" and prefix "foo.bar.*". Takes suffix.
 | |
| 		{name: "multiple-match-suffix", host: "foo.bar.159", vHosts: vhs, want: multipleMatch},
 | |
| 		// Matches suffix "*.bar.com" and prefix "314.*". Takes suffix.
 | |
| 		{name: "multiple-match-prefix", host: "314.bar.com", vHosts: vhs, want: oneSuffixMatch},
 | |
| 	}
 | |
| 	for _, tt := range tests {
 | |
| 		t.Run(tt.name, func(t *testing.T) {
 | |
| 			if got := findBestMatchingVirtualHost(tt.host, tt.vHosts); !cmp.Equal(got, tt.want, cmp.Comparer(proto.Equal)) {
 | |
| 				t.Errorf("findBestMatchingxdsclient.VirtualHost() = %v, want %v", got, tt.want)
 | |
| 			}
 | |
| 		})
 | |
| 	}
 | |
| }
 | |
| 
 | |
| type serviceUpdateErr struct {
 | |
| 	u   serviceUpdate
 | |
| 	err error
 | |
| }
 | |
| 
 | |
| func verifyServiceUpdate(ctx context.Context, updateCh *testutils.Channel, wantUpdate serviceUpdate) error {
 | |
| 	u, err := updateCh.Receive(ctx)
 | |
| 	if err != nil {
 | |
| 		return fmt.Errorf("timeout when waiting for service update: %v", err)
 | |
| 	}
 | |
| 	gotUpdate := u.(serviceUpdateErr)
 | |
| 	if gotUpdate.err != nil || !cmp.Equal(gotUpdate.u, wantUpdate, cmpopts.EquateEmpty()) {
 | |
| 		return fmt.Errorf("unexpected service update: (%v, %v), want: (%v, nil),  diff (-want +got):\n%s", gotUpdate.u, gotUpdate.err, wantUpdate, cmp.Diff(gotUpdate.u, wantUpdate, cmpopts.EquateEmpty()))
 | |
| 	}
 | |
| 	return nil
 | |
| }
 | |
| 
 | |
| // TestServiceWatch covers the cases:
 | |
| // - an update is received after a watch()
 | |
| // - an update with routes received
 | |
| func (s) TestServiceWatch(t *testing.T) {
 | |
| 	serviceUpdateCh := testutils.NewChannel()
 | |
| 	xdsC := fakeclient.NewClient()
 | |
| 	cancelWatch := watchService(xdsC, targetStr, func(update serviceUpdate, err error) {
 | |
| 		serviceUpdateCh.Send(serviceUpdateErr{u: update, err: err})
 | |
| 	}, nil)
 | |
| 	defer cancelWatch()
 | |
| 
 | |
| 	ctx, cancel := context.WithTimeout(context.Background(), defaultTestTimeout)
 | |
| 	defer cancel()
 | |
| 	waitForWatchListener(ctx, t, xdsC, targetStr)
 | |
| 	xdsC.InvokeWatchListenerCallback(xdsclient.ListenerUpdate{RouteConfigName: routeStr}, nil)
 | |
| 	waitForWatchRouteConfig(ctx, t, xdsC, routeStr)
 | |
| 
 | |
| 	wantUpdate := serviceUpdate{Routes: []*xdsclient.Route{{Prefix: newStringP(""), Action: map[string]uint32{cluster: 1}}}}
 | |
| 	xdsC.InvokeWatchRouteConfigCallback(xdsclient.RouteConfigUpdate{
 | |
| 		VirtualHosts: []*xdsclient.VirtualHost{
 | |
| 			{
 | |
| 				Domains: []string{targetStr},
 | |
| 				Routes:  []*xdsclient.Route{{Prefix: newStringP(""), Action: map[string]uint32{cluster: 1}}},
 | |
| 			},
 | |
| 		},
 | |
| 	}, nil)
 | |
| 	if err := verifyServiceUpdate(ctx, serviceUpdateCh, wantUpdate); err != nil {
 | |
| 		t.Fatal(err)
 | |
| 	}
 | |
| 
 | |
| 	wantUpdate2 := serviceUpdate{
 | |
| 		Routes: []*xdsclient.Route{{
 | |
| 			Path:   newStringP(""),
 | |
| 			Action: map[string]uint32{cluster: 1},
 | |
| 		}},
 | |
| 	}
 | |
| 	xdsC.InvokeWatchRouteConfigCallback(xdsclient.RouteConfigUpdate{
 | |
| 		VirtualHosts: []*xdsclient.VirtualHost{
 | |
| 			{
 | |
| 				Domains: []string{targetStr},
 | |
| 				Routes:  []*xdsclient.Route{{Path: newStringP(""), Action: map[string]uint32{cluster: 1}}},
 | |
| 			},
 | |
| 			{
 | |
| 				// Another virtual host, with different domains.
 | |
| 				Domains: []string{"random"},
 | |
| 				Routes:  []*xdsclient.Route{{Prefix: newStringP(""), Action: map[string]uint32{cluster: 1}}},
 | |
| 			},
 | |
| 		},
 | |
| 	}, nil)
 | |
| 	if err := verifyServiceUpdate(ctx, serviceUpdateCh, wantUpdate2); err != nil {
 | |
| 		t.Fatal(err)
 | |
| 	}
 | |
| }
 | |
| 
 | |
| // TestServiceWatchLDSUpdate covers the case that after first LDS and first RDS
 | |
| // response, the second LDS response trigger an new RDS watch, and an update of
 | |
| // the old RDS watch doesn't trigger update to service callback.
 | |
| func (s) TestServiceWatchLDSUpdate(t *testing.T) {
 | |
| 	serviceUpdateCh := testutils.NewChannel()
 | |
| 	xdsC := fakeclient.NewClient()
 | |
| 	cancelWatch := watchService(xdsC, targetStr, func(update serviceUpdate, err error) {
 | |
| 		serviceUpdateCh.Send(serviceUpdateErr{u: update, err: err})
 | |
| 	}, nil)
 | |
| 	defer cancelWatch()
 | |
| 
 | |
| 	ctx, cancel := context.WithTimeout(context.Background(), defaultTestTimeout)
 | |
| 	defer cancel()
 | |
| 	waitForWatchListener(ctx, t, xdsC, targetStr)
 | |
| 	xdsC.InvokeWatchListenerCallback(xdsclient.ListenerUpdate{RouteConfigName: routeStr}, nil)
 | |
| 	waitForWatchRouteConfig(ctx, t, xdsC, routeStr)
 | |
| 
 | |
| 	wantUpdate := serviceUpdate{Routes: []*xdsclient.Route{{Prefix: newStringP(""), Action: map[string]uint32{cluster: 1}}}}
 | |
| 	xdsC.InvokeWatchRouteConfigCallback(xdsclient.RouteConfigUpdate{
 | |
| 		VirtualHosts: []*xdsclient.VirtualHost{
 | |
| 			{
 | |
| 				Domains: []string{targetStr},
 | |
| 				Routes:  []*xdsclient.Route{{Prefix: newStringP(""), Action: map[string]uint32{cluster: 1}}},
 | |
| 			},
 | |
| 		},
 | |
| 	}, nil)
 | |
| 	if err := verifyServiceUpdate(ctx, serviceUpdateCh, wantUpdate); err != nil {
 | |
| 		t.Fatal(err)
 | |
| 	}
 | |
| 
 | |
| 	// Another LDS update with a different RDS_name.
 | |
| 	xdsC.InvokeWatchListenerCallback(xdsclient.ListenerUpdate{RouteConfigName: routeStr + "2"}, nil)
 | |
| 	if err := xdsC.WaitForCancelRouteConfigWatch(ctx); err != nil {
 | |
| 		t.Fatalf("wait for cancel route watch failed: %v, want nil", err)
 | |
| 	}
 | |
| 	waitForWatchRouteConfig(ctx, t, xdsC, routeStr+"2")
 | |
| 
 | |
| 	// RDS update for the new name.
 | |
| 	wantUpdate2 := serviceUpdate{Routes: []*xdsclient.Route{{Prefix: newStringP(""), Action: map[string]uint32{cluster + "2": 1}}}}
 | |
| 	xdsC.InvokeWatchRouteConfigCallback(xdsclient.RouteConfigUpdate{
 | |
| 		VirtualHosts: []*xdsclient.VirtualHost{
 | |
| 			{
 | |
| 				Domains: []string{targetStr},
 | |
| 				Routes:  []*xdsclient.Route{{Prefix: newStringP(""), Action: map[string]uint32{cluster + "2": 1}}},
 | |
| 			},
 | |
| 		},
 | |
| 	}, nil)
 | |
| 	if err := verifyServiceUpdate(ctx, serviceUpdateCh, wantUpdate2); err != nil {
 | |
| 		t.Fatal(err)
 | |
| 	}
 | |
| }
 | |
| 
 | |
| // TestServiceNotCancelRDSOnSameLDSUpdate covers the case that if the second LDS
 | |
| // update contains the same RDS name as the previous, the RDS watch isn't
 | |
| // canceled and restarted.
 | |
| func (s) TestServiceNotCancelRDSOnSameLDSUpdate(t *testing.T) {
 | |
| 	serviceUpdateCh := testutils.NewChannel()
 | |
| 	xdsC := fakeclient.NewClient()
 | |
| 	cancelWatch := watchService(xdsC, targetStr, func(update serviceUpdate, err error) {
 | |
| 		serviceUpdateCh.Send(serviceUpdateErr{u: update, err: err})
 | |
| 	}, nil)
 | |
| 	defer cancelWatch()
 | |
| 
 | |
| 	ctx, cancel := context.WithTimeout(context.Background(), defaultTestTimeout)
 | |
| 	defer cancel()
 | |
| 	waitForWatchListener(ctx, t, xdsC, targetStr)
 | |
| 	xdsC.InvokeWatchListenerCallback(xdsclient.ListenerUpdate{RouteConfigName: routeStr}, nil)
 | |
| 	waitForWatchRouteConfig(ctx, t, xdsC, routeStr)
 | |
| 
 | |
| 	wantUpdate := serviceUpdate{Routes: []*xdsclient.Route{{Prefix: newStringP(""), Action: map[string]uint32{cluster: 1}}}}
 | |
| 	xdsC.InvokeWatchRouteConfigCallback(xdsclient.RouteConfigUpdate{
 | |
| 		VirtualHosts: []*xdsclient.VirtualHost{
 | |
| 			{
 | |
| 				Domains: []string{targetStr},
 | |
| 				Routes:  []*xdsclient.Route{{Prefix: newStringP(""), Action: map[string]uint32{cluster: 1}}},
 | |
| 			},
 | |
| 		},
 | |
| 	}, nil)
 | |
| 
 | |
| 	if err := verifyServiceUpdate(ctx, serviceUpdateCh, wantUpdate); err != nil {
 | |
| 		t.Fatal(err)
 | |
| 	}
 | |
| 
 | |
| 	// Another LDS update with a the same RDS_name.
 | |
| 	xdsC.InvokeWatchListenerCallback(xdsclient.ListenerUpdate{RouteConfigName: routeStr}, nil)
 | |
| 	sCtx, sCancel := context.WithTimeout(ctx, defaultTestShortTimeout)
 | |
| 	defer sCancel()
 | |
| 	if err := xdsC.WaitForCancelRouteConfigWatch(sCtx); err != context.DeadlineExceeded {
 | |
| 		t.Fatalf("wait for cancel route watch failed: %v, want nil", err)
 | |
| 	}
 | |
| }
 |