grpc-go/call_test.go

293 строки
7.2 KiB
Go
Исходник Обычный вид История

2015-11-18 22:34:37 +03:00
/*
*
2017-06-08 15:42:19 +03:00
* Copyright 2014 gRPC authors.
2015-11-18 22:34:37 +03:00
*
2017-06-08 15:42:19 +03:00
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
2015-11-18 22:34:37 +03:00
*
2017-06-08 15:42:19 +03:00
* http://www.apache.org/licenses/LICENSE-2.0
2015-11-18 22:34:37 +03:00
*
2017-06-08 15:42:19 +03:00
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
2015-11-18 22:34:37 +03:00
*
*/
package grpc
import (
"fmt"
2015-11-18 22:34:37 +03:00
"io"
"math"
"net"
"strconv"
"strings"
2015-11-18 22:34:37 +03:00
"sync"
"testing"
"time"
"golang.org/x/net/context"
"google.golang.org/grpc/codes"
"google.golang.org/grpc/status"
"google.golang.org/grpc/test/leakcheck"
2015-11-18 22:34:37 +03:00
"google.golang.org/grpc/transport"
)
var (
2015-11-18 22:56:15 +03:00
expectedRequest = "ping"
expectedResponse = "pong"
weirdError = "format verbs: %v%s"
2015-11-19 03:22:08 +03:00
sizeLargeErr = 1024 * 1024
canceled = 0
2015-11-18 22:34:37 +03:00
)
type testCodec struct {
}
func (testCodec) Marshal(v interface{}) ([]byte, error) {
2015-11-18 22:56:15 +03:00
return []byte(*(v.(*string))), nil
2015-11-18 22:34:37 +03:00
}
func (testCodec) Unmarshal(data []byte, v interface{}) error {
*(v.(*string)) = string(data)
return nil
}
func (testCodec) String() string {
return "test"
}
type testStreamHandler struct {
port string
t transport.ServerTransport
2015-11-18 22:34:37 +03:00
}
func (h *testStreamHandler) handleStream(t *testing.T, s *transport.Stream) {
p := &parser{r: s}
2015-11-18 22:34:37 +03:00
for {
2016-07-30 02:19:20 +03:00
pf, req, err := p.recvMsg(math.MaxInt32)
2015-11-18 22:34:37 +03:00
if err == io.EOF {
break
}
if err != nil {
return
2015-11-18 22:34:37 +03:00
}
if pf != compressionNone {
t.Errorf("Received the mistaken message format %d, want %d", pf, compressionNone)
return
2015-11-18 22:34:37 +03:00
}
var v string
codec := testCodec{}
if err := codec.Unmarshal(req, &v); err != nil {
t.Errorf("Failed to unmarshal the received message: %v", err)
return
2015-11-18 22:34:37 +03:00
}
if v == "weird error" {
h.t.WriteStatus(s, status.New(codes.Internal, weirdError))
return
}
if v == "canceled" {
canceled++
h.t.WriteStatus(s, status.New(codes.Internal, ""))
return
}
if v == "port" {
h.t.WriteStatus(s, status.New(codes.Internal, h.port))
return
}
2015-11-18 22:56:15 +03:00
if v != expectedRequest {
h.t.WriteStatus(s, status.New(codes.Internal, strings.Repeat("A", sizeLargeErr)))
2015-11-19 03:22:08 +03:00
return
2015-11-18 22:34:37 +03:00
}
}
// send a response back to end the stream.
hdr, data, err := encode(testCodec{}, &expectedResponse, nil, nil, nil)
2015-11-18 22:34:37 +03:00
if err != nil {
t.Errorf("Failed to encode the response: %v", err)
return
2015-11-18 22:34:37 +03:00
}
h.t.Write(s, hdr, data, &transport.Options{})
h.t.WriteStatus(s, status.New(codes.OK, ""))
2015-11-18 22:34:37 +03:00
}
type server struct {
lis net.Listener
port string
addr string
startedErr chan error // sent nil or an error after server starts
mu sync.Mutex
conns map[transport.ServerTransport]bool
}
func newTestServer() *server {
return &server{startedErr: make(chan error, 1)}
2015-11-18 22:34:37 +03:00
}
2016-03-17 02:40:16 +03:00
// start starts server. Other goroutines should block on s.startedErr for further operations.
2015-11-18 22:34:37 +03:00
func (s *server) start(t *testing.T, port int, maxStreams uint32) {
var err error
if port == 0 {
s.lis, err = net.Listen("tcp", "localhost:0")
2015-11-18 22:34:37 +03:00
} else {
s.lis, err = net.Listen("tcp", "localhost:"+strconv.Itoa(port))
2015-11-18 22:34:37 +03:00
}
if err != nil {
s.startedErr <- fmt.Errorf("failed to listen: %v", err)
return
2015-11-18 22:34:37 +03:00
}
s.addr = s.lis.Addr().String()
_, p, err := net.SplitHostPort(s.addr)
2015-11-18 22:34:37 +03:00
if err != nil {
s.startedErr <- fmt.Errorf("failed to parse listener address: %v", err)
return
2015-11-18 22:34:37 +03:00
}
s.port = p
s.conns = make(map[transport.ServerTransport]bool)
s.startedErr <- nil
2015-11-18 22:34:37 +03:00
for {
conn, err := s.lis.Accept()
if err != nil {
return
}
2016-11-04 00:21:24 +03:00
config := &transport.ServerConfig{
MaxStreams: maxStreams,
}
st, err := transport.NewServerTransport("http2", conn, config)
2015-11-18 22:34:37 +03:00
if err != nil {
continue
2015-11-18 22:34:37 +03:00
}
s.mu.Lock()
if s.conns == nil {
s.mu.Unlock()
st.Close()
return
}
s.conns[st] = true
s.mu.Unlock()
h := &testStreamHandler{
port: s.port,
t: st,
}
2015-11-18 22:34:37 +03:00
go st.HandleStreams(func(s *transport.Stream) {
go h.handleStream(t, s)
2016-11-09 05:17:14 +03:00
}, func(ctx context.Context, method string) context.Context {
return ctx
2015-11-18 22:34:37 +03:00
})
}
}
func (s *server) wait(t *testing.T, timeout time.Duration) {
select {
case err := <-s.startedErr:
if err != nil {
t.Fatal(err)
}
2015-11-18 22:34:37 +03:00
case <-time.After(timeout):
t.Fatalf("Timed out after %v waiting for server to be ready", timeout)
}
}
func (s *server) stop() {
s.lis.Close()
s.mu.Lock()
for c := range s.conns {
c.Close()
}
s.conns = nil
s.mu.Unlock()
}
func setUp(t *testing.T, port int, maxStreams uint32) (*server, *ClientConn) {
server := newTestServer()
2015-11-18 22:34:37 +03:00
go server.start(t, port, maxStreams)
server.wait(t, 2*time.Second)
addr := "localhost:" + server.port
cc, err := Dial(addr, WithBlock(), WithInsecure(), WithCodec(testCodec{}))
if err != nil {
t.Fatalf("Failed to create ClientConn: %v", err)
}
return server, cc
}
func TestInvoke(t *testing.T) {
defer leakcheck.Check(t)
2015-11-18 22:34:37 +03:00
server, cc := setUp(t, 0, math.MaxUint32)
var reply string
2015-11-18 22:56:15 +03:00
if err := Invoke(context.Background(), "/foo/bar", &expectedRequest, &reply, cc); err != nil || reply != expectedResponse {
2015-11-18 22:34:37 +03:00
t.Fatalf("grpc.Invoke(_, _, _, _, _) = %v, want <nil>", err)
}
2015-11-19 03:22:08 +03:00
cc.Close()
server.stop()
}
func TestInvokeLargeErr(t *testing.T) {
defer leakcheck.Check(t)
2015-11-19 03:22:08 +03:00
server, cc := setUp(t, 0, math.MaxUint32)
var reply string
req := "hello"
err := Invoke(context.Background(), "/foo/bar", &req, &reply, cc)
if _, ok := status.FromError(err); !ok {
2015-11-19 03:22:08 +03:00
t.Fatalf("grpc.Invoke(_, _, _, _, _) receives non rpc error.")
}
if status.Code(err) != codes.Internal || len(errorDesc(err)) != sizeLargeErr {
2015-11-19 03:22:08 +03:00
t.Fatalf("grpc.Invoke(_, _, _, _, _) = %v, want an error of code %d and desc size %d", err, codes.Internal, sizeLargeErr)
}
cc.Close()
2015-11-18 22:34:37 +03:00
server.stop()
}
// TestInvokeErrorSpecialChars checks that error messages don't get mangled.
func TestInvokeErrorSpecialChars(t *testing.T) {
defer leakcheck.Check(t)
server, cc := setUp(t, 0, math.MaxUint32)
var reply string
req := "weird error"
err := Invoke(context.Background(), "/foo/bar", &req, &reply, cc)
if _, ok := status.FromError(err); !ok {
t.Fatalf("grpc.Invoke(_, _, _, _, _) receives non rpc error.")
}
if got, want := errorDesc(err), weirdError; got != want {
t.Fatalf("grpc.Invoke(_, _, _, _, _) error = %q, want %q", got, want)
}
cc.Close()
server.stop()
}
// TestInvokeCancel checks that an Invoke with a canceled context is not sent.
func TestInvokeCancel(t *testing.T) {
defer leakcheck.Check(t)
server, cc := setUp(t, 0, math.MaxUint32)
var reply string
req := "canceled"
for i := 0; i < 100; i++ {
ctx, cancel := context.WithCancel(context.Background())
cancel()
Invoke(ctx, "/foo/bar", &req, &reply, cc)
}
if canceled != 0 {
t.Fatalf("received %d of 100 canceled requests", canceled)
}
cc.Close()
server.stop()
}
// TestInvokeCancelClosedNonFail checks that a canceled non-failfast RPC
// on a closed client will terminate.
func TestInvokeCancelClosedNonFailFast(t *testing.T) {
defer leakcheck.Check(t)
server, cc := setUp(t, 0, math.MaxUint32)
var reply string
cc.Close()
req := "hello"
ctx, cancel := context.WithCancel(context.Background())
cancel()
if err := Invoke(ctx, "/foo/bar", &req, &reply, cc, FailFast(false)); err == nil {
t.Fatalf("canceled invoke on closed connection should fail")
}
server.stop()
}