Compare commits
1 commit
master
...
feat/add-g
Author | SHA1 | Date | |
---|---|---|---|
dcda6022b0 |
2 changed files with 244 additions and 2 deletions
2
Makefile
2
Makefile
|
@ -194,8 +194,6 @@ review-install:
|
|||
@mkdir -p $(GIT_HOOK_DIR)/
|
||||
@curl -Lo $(GIT_HOOK_DIR)/commit-msg https://review.frostfs.info/tools/hooks/commit-msg
|
||||
@chmod +x $(GIT_HOOK_DIR)/commit-msg
|
||||
@echo -e '#!/bin/sh\n"$$(git rev-parse --git-path hooks)"/commit-msg "$$1"' >$(GIT_HOOK_DIR)/prepare-commit-msg
|
||||
@chmod +x $(GIT_HOOK_DIR)/prepare-commit-msg
|
||||
|
||||
# Create a PR in Gerrit
|
||||
review: BRANCH ?= master
|
||||
|
|
244
internal/qos/grpc_test.go
Normal file
244
internal/qos/grpc_test.go
Normal file
|
@ -0,0 +1,244 @@
|
|||
package qos
|
||||
|
||||
import (
|
||||
"context"
|
||||
"errors"
|
||||
"fmt"
|
||||
"testing"
|
||||
|
||||
"git.frostfs.info/TrueCloudLab/frostfs-qos/limiting"
|
||||
"git.frostfs.info/TrueCloudLab/frostfs-qos/tagging"
|
||||
apistatus "git.frostfs.info/TrueCloudLab/frostfs-sdk-go/client/status"
|
||||
"github.com/stretchr/testify/require"
|
||||
"google.golang.org/grpc"
|
||||
)
|
||||
|
||||
const (
|
||||
okKey = "ok"
|
||||
)
|
||||
|
||||
var (
|
||||
errTest = errors.New("mock")
|
||||
errResExhausted = new(apistatus.ResourceExhausted)
|
||||
errWrongTag = errors.New("wrong tag")
|
||||
errNoTag = errors.New("failed to get tag from context")
|
||||
releaseFunc func()
|
||||
ctxNoTag = ctxKey("")
|
||||
)
|
||||
|
||||
type ctxKey string
|
||||
|
||||
type mockGRPCServerStream struct {
|
||||
grpc.ServerStream
|
||||
|
||||
ctx context.Context
|
||||
}
|
||||
|
||||
func (m *mockGRPCServerStream) Context() context.Context {
|
||||
return m.ctx
|
||||
}
|
||||
|
||||
type limiter struct{}
|
||||
|
||||
func (l *limiter) Acquire(key string) (limiting.ReleaseFunc, bool) {
|
||||
if key != okKey {
|
||||
return nil, false
|
||||
}
|
||||
return releaseFunc, true
|
||||
}
|
||||
|
||||
func TestUnaryServerInterceptor_MaxActiveRPCLimiter_Fail(t *testing.T) {
|
||||
interceptor := NewMaxActiveRPCLimiterUnaryServerInterceptor(func() limiting.Limiter { return &limiter{} })
|
||||
pCtx := context.WithValue(context.Background(), ctxNoTag, true)
|
||||
called := false
|
||||
handler := func(ctx context.Context, req any) (any, error) {
|
||||
called = true
|
||||
return nil, errTest
|
||||
}
|
||||
// fail: get apistatus.ResourceExhausted
|
||||
_, err := interceptor(pCtx, nil, &grpc.UnaryServerInfo{FullMethod: ""}, handler)
|
||||
require.Error(t, err)
|
||||
require.Equal(t, err.Error(), errResExhausted.Error())
|
||||
require.False(t, called)
|
||||
}
|
||||
|
||||
func TestUnaryServerInterceptor_MaxActiveRPCLimiter_PassCritical(t *testing.T) {
|
||||
interceptor := NewMaxActiveRPCLimiterUnaryServerInterceptor(func() limiting.Limiter { return &limiter{} })
|
||||
ctx := tagging.ContextWithIOTag(context.Background(), IOTagCritical.String())
|
||||
called := false
|
||||
handler := func(ctx context.Context, req any) (any, error) {
|
||||
called = true
|
||||
return nil, errTest
|
||||
}
|
||||
released := false
|
||||
releaseFunc = func() {
|
||||
released = true
|
||||
}
|
||||
_, err := interceptor(ctx, nil, &grpc.UnaryServerInfo{FullMethod: ""}, handler)
|
||||
require.EqualError(t, err, errTest.Error())
|
||||
require.True(t, called)
|
||||
require.False(t, released)
|
||||
}
|
||||
|
||||
func TestUnaryServerInterceptor_MaxActiveRPCLimiter_Pass(t *testing.T) {
|
||||
interceptor := NewMaxActiveRPCLimiterUnaryServerInterceptor(func() limiting.Limiter { return &limiter{} })
|
||||
pCtx := context.WithValue(context.Background(), ctxNoTag, true)
|
||||
called := false
|
||||
handler := func(ctx context.Context, req any) (any, error) {
|
||||
called = true
|
||||
return nil, errTest
|
||||
}
|
||||
released := false
|
||||
releaseFunc = func() {
|
||||
released = true
|
||||
}
|
||||
_, err := interceptor(pCtx, nil, &grpc.UnaryServerInfo{FullMethod: okKey}, handler)
|
||||
require.EqualError(t, err, errTest.Error())
|
||||
require.True(t, called && released)
|
||||
}
|
||||
|
||||
func TestStreamServerInterceptor_MaxActiveRPCLimiter_Fail(t *testing.T) {
|
||||
ctx := context.WithValue(context.Background(), ctxNoTag, true)
|
||||
interceptor := NewMaxActiveRPCLimiterStreamServerInterceptor(func() limiting.Limiter { return &limiter{} })
|
||||
|
||||
called := false
|
||||
handler := func(srv any, stream grpc.ServerStream) error {
|
||||
called = true
|
||||
return errTest
|
||||
}
|
||||
// fail: get apistatus.ResourceExhausted
|
||||
err := interceptor(nil, &mockGRPCServerStream{ctx: ctx}, &grpc.StreamServerInfo{
|
||||
FullMethod: "",
|
||||
}, handler)
|
||||
require.Error(t, err)
|
||||
require.Equal(t, err.Error(), errResExhausted.Error())
|
||||
require.False(t, called)
|
||||
}
|
||||
|
||||
func TestStreamServerInterceptor_MaxActiveRPCLimiter_PassCritical(t *testing.T) {
|
||||
interceptor := NewMaxActiveRPCLimiterStreamServerInterceptor(func() limiting.Limiter { return &limiter{} })
|
||||
ctx := tagging.ContextWithIOTag(context.Background(), IOTagCritical.String())
|
||||
called := false
|
||||
handler := func(srv any, stream grpc.ServerStream) error {
|
||||
called = true
|
||||
return errTest
|
||||
}
|
||||
released := false
|
||||
releaseFunc = func() {
|
||||
released = true
|
||||
}
|
||||
err := interceptor(nil, &mockGRPCServerStream{ctx: ctx}, &grpc.StreamServerInfo{FullMethod: okKey}, handler)
|
||||
require.EqualError(t, err, errTest.Error())
|
||||
require.True(t, called)
|
||||
require.False(t, released)
|
||||
}
|
||||
|
||||
func TestStreamServerInterceptor_MaxActiveRPCLimiter_Pass(t *testing.T) {
|
||||
ctx := context.WithValue(context.Background(), ctxNoTag, true)
|
||||
interceptor := NewMaxActiveRPCLimiterStreamServerInterceptor(func() limiting.Limiter { return &limiter{} })
|
||||
called := false
|
||||
handler := func(srv any, stream grpc.ServerStream) error {
|
||||
called = true
|
||||
return errTest
|
||||
}
|
||||
released := false
|
||||
releaseFunc = func() {
|
||||
released = true
|
||||
}
|
||||
err := interceptor(nil, &mockGRPCServerStream{ctx: ctx}, &grpc.StreamServerInfo{FullMethod: okKey}, handler)
|
||||
require.EqualError(t, err, errTest.Error())
|
||||
require.True(t, called && released)
|
||||
}
|
||||
|
||||
func TestSetCriticalIOTagUnaryServerInterceptor_Pass(t *testing.T) {
|
||||
interceptor := NewSetCriticalIOTagUnaryServerInterceptor()
|
||||
handler := func(ctx context.Context, req any) (any, error) {
|
||||
if tag, ok := tagging.IOTagFromContext(ctx); ok && tag == IOTagCritical.String() {
|
||||
return nil, nil
|
||||
}
|
||||
return nil, errTest
|
||||
}
|
||||
_, err := interceptor(context.Background(), nil, nil, handler)
|
||||
require.NoError(t, err)
|
||||
}
|
||||
|
||||
func TestAdjustOutgoingIOTagUnaryClientInterceptor(t *testing.T) {
|
||||
interceptor := NewAdjustOutgoingIOTagUnaryClientInterceptor()
|
||||
|
||||
// check context with no value
|
||||
called := false
|
||||
invoker := func(ctx context.Context, method string, req, reply any, cc *grpc.ClientConn, opts ...grpc.CallOption) error {
|
||||
called = true
|
||||
if _, ok := tagging.IOTagFromContext(ctx); ok {
|
||||
return fmt.Errorf("%v: expected no IO tags", errWrongTag)
|
||||
}
|
||||
return nil
|
||||
}
|
||||
require.NoError(t, interceptor(context.Background(), "", nil, nil, nil, invoker, nil))
|
||||
require.True(t, called)
|
||||
|
||||
// check context for internal tag
|
||||
targetTag := IOTagInternal.String()
|
||||
invoker = func(ctx context.Context, method string, req, reply any, cc *grpc.ClientConn, opts ...grpc.CallOption) error {
|
||||
raw, ok := tagging.IOTagFromContext(ctx)
|
||||
if !ok {
|
||||
return errNoTag
|
||||
}
|
||||
if raw != targetTag {
|
||||
return errWrongTag
|
||||
}
|
||||
return nil
|
||||
}
|
||||
tags := []IOTag{IOTagBackground, IOTagWritecache, IOTagPolicer}
|
||||
for _, tag := range tags {
|
||||
ctx := tagging.ContextWithIOTag(context.Background(), tag.String())
|
||||
require.NoError(t, interceptor(ctx, "", nil, nil, nil, invoker, nil))
|
||||
}
|
||||
|
||||
// check context for client tag
|
||||
ctx := tagging.ContextWithIOTag(context.Background(), ioTagUnknown.String())
|
||||
targetTag = IOTagClient.String()
|
||||
require.NoError(t, interceptor(ctx, "", nil, nil, nil, invoker, nil))
|
||||
}
|
||||
|
||||
func TestAdjustOutgoingIOTagStreamClientInterceptor(t *testing.T) {
|
||||
interceptor := NewAdjustOutgoingIOTagStreamClientInterceptor()
|
||||
|
||||
// check context with no value
|
||||
called := false
|
||||
streamer := func(ctx context.Context, desc *grpc.StreamDesc, cc *grpc.ClientConn, method string, opts ...grpc.CallOption) (grpc.ClientStream, error) {
|
||||
called = true
|
||||
if _, ok := tagging.IOTagFromContext(ctx); ok {
|
||||
return nil, fmt.Errorf("%v: expected no IO tags", errWrongTag)
|
||||
}
|
||||
return nil, nil
|
||||
}
|
||||
_, err := interceptor(context.Background(), nil, nil, "", streamer, nil)
|
||||
require.True(t, called)
|
||||
require.NoError(t, err)
|
||||
|
||||
// check context for internal tag
|
||||
targetTag := IOTagInternal.String()
|
||||
streamer = func(ctx context.Context, desc *grpc.StreamDesc, cc *grpc.ClientConn, method string, opts ...grpc.CallOption) (grpc.ClientStream, error) {
|
||||
raw, ok := tagging.IOTagFromContext(ctx)
|
||||
if !ok {
|
||||
return nil, errNoTag
|
||||
}
|
||||
if raw != targetTag {
|
||||
return nil, errWrongTag
|
||||
}
|
||||
return nil, nil
|
||||
}
|
||||
tags := []IOTag{IOTagBackground, IOTagWritecache, IOTagPolicer}
|
||||
for _, tag := range tags {
|
||||
ctx := tagging.ContextWithIOTag(context.Background(), tag.String())
|
||||
_, err := interceptor(ctx, nil, nil, "", streamer, nil)
|
||||
require.NoError(t, err)
|
||||
}
|
||||
|
||||
// check context for client tag
|
||||
ctx := tagging.ContextWithIOTag(context.Background(), ioTagUnknown.String())
|
||||
targetTag = IOTagClient.String()
|
||||
_, err = interceptor(ctx, nil, nil, "", streamer, nil)
|
||||
require.NoError(t, err)
|
||||
}
|
Loading…
Add table
Reference in a new issue