-
Notifications
You must be signed in to change notification settings - Fork 4.4k
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
- Loading branch information
Showing
6 changed files
with
214 additions
and
45 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,142 @@ | ||
//go:build !386 | ||
// +build !386 | ||
|
||
/* | ||
* | ||
* Copyright 2021 gRPC authors. | ||
* | ||
* Licensed under the Apache License, Version 2.0 (the "License"); | ||
* you may not use this file except in compliance with the License. | ||
* You may obtain a copy of the License at | ||
* | ||
* http://www.apache.org/licenses/LICENSE-2.0 | ||
* | ||
* Unless required by applicable law or agreed to in writing, software | ||
* distributed under the License is distributed on an "AS IS" BASIS, | ||
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. | ||
* See the License for the specific language governing permissions and | ||
* limitations under the License. | ||
*/ | ||
|
||
package xds_test | ||
|
||
import ( | ||
"context" | ||
"fmt" | ||
"testing" | ||
|
||
v3clusterpb "github.com/envoyproxy/go-control-plane/envoy/config/cluster/v3" | ||
v3endpointpb "github.com/envoyproxy/go-control-plane/envoy/config/endpoint/v3" | ||
v3listenerpb "github.com/envoyproxy/go-control-plane/envoy/config/listener/v3" | ||
v3routepb "github.com/envoyproxy/go-control-plane/envoy/config/route/v3" | ||
"github.com/google/uuid" | ||
"google.golang.org/grpc" | ||
"google.golang.org/grpc/credentials/insecure" | ||
"google.golang.org/grpc/internal/envconfig" | ||
xdsinternal "google.golang.org/grpc/internal/xds" | ||
testpb "google.golang.org/grpc/test/grpc_testing" | ||
"google.golang.org/grpc/xds" | ||
"google.golang.org/grpc/xds/internal/testutils" | ||
"google.golang.org/grpc/xds/internal/testutils/e2e" | ||
"google.golang.org/grpc/xds/internal/xdsclient/xdsresource" | ||
) | ||
|
||
// TestClientSideFederation tests that federation is supported. | ||
// | ||
// In this test, some xDS responses contain resource names in another authority | ||
// (in the new resource name style): | ||
// - LDS: old style, no authority (default authority) | ||
// - RDS: new style, in a different authority | ||
// - CDS: old style, no authority (default authority) | ||
// - EDS: new style, in a different authority | ||
func (s) TestClientSideFederation(t *testing.T) { | ||
oldXDSFederation := envconfig.XDSFederation | ||
envconfig.XDSFederation = true | ||
defer func() { envconfig.XDSFederation = oldXDSFederation }() | ||
|
||
// Start a management server as the default authority. | ||
serverDefaultAuth, err := e2e.StartManagementServer() | ||
if err != nil { | ||
t.Fatalf("Failed to spin up the xDS management server: %v", err) | ||
} | ||
t.Cleanup(serverDefaultAuth.Stop) | ||
|
||
// Start another management server as the other authority. | ||
const nonDefaultAuth = "non-default-auth" | ||
serverAnotherAuth, err := e2e.StartManagementServer() | ||
if err != nil { | ||
t.Fatalf("Failed to spin up the xDS management server: %v", err) | ||
} | ||
t.Cleanup(serverAnotherAuth.Stop) | ||
|
||
// Create a bootstrap file in a temporary directory. | ||
nodeID := uuid.New().String() | ||
bootstrapContents, err := xdsinternal.BootstrapContents(xdsinternal.BootstrapOptions{ | ||
Version: xdsinternal.TransportV3, | ||
NodeID: nodeID, | ||
ServerURI: serverDefaultAuth.Address, | ||
ServerListenerResourceNameTemplate: e2e.ServerListenerResourceNameTemplate, | ||
// Specify the address of the non-default authority. | ||
Authorities: map[string]string{nonDefaultAuth: serverAnotherAuth.Address}, | ||
}) | ||
if err != nil { | ||
t.Fatalf("Failed to create bootstrap file: %v", err) | ||
} | ||
|
||
resolver, err := xds.NewXDSResolverWithConfigForTesting(bootstrapContents) | ||
if err != nil { | ||
t.Fatalf("Failed to create xDS resolver for testing: %v", err) | ||
} | ||
port, cleanup := clientSetup(t, &testService{}) | ||
defer cleanup() | ||
|
||
const serviceName = "my-service-client-side-xds" | ||
// LDS is old style name. | ||
ldsName := serviceName | ||
// RDS is new style, with the non default authority. | ||
rdsName := testutils.BuildResourceName(xdsresource.RouteConfigResource, nonDefaultAuth, "route-"+serviceName, nil) | ||
// CDS is old style name. | ||
cdsName := "cluster-" + serviceName | ||
// EDS is new style, with the non default authority. | ||
edsName := testutils.BuildResourceName(xdsresource.EndpointsResource, nonDefaultAuth, "endpoints-"+serviceName, nil) | ||
|
||
// Split resources, put LDS/CDS in the default authority, and put RDS/EDS in | ||
// the other authority. | ||
resourcesDefault := e2e.UpdateOptions{ | ||
NodeID: nodeID, | ||
// This has only LDS and CDS. | ||
Listeners: []*v3listenerpb.Listener{e2e.DefaultClientListener(ldsName, rdsName)}, | ||
Clusters: []*v3clusterpb.Cluster{e2e.DefaultCluster(cdsName, edsName, e2e.SecurityLevelNone)}, | ||
SkipValidation: true, | ||
} | ||
resourcesAnother := e2e.UpdateOptions{ | ||
NodeID: nodeID, | ||
// This has only RDS and EDS. | ||
Routes: []*v3routepb.RouteConfiguration{e2e.DefaultRouteConfig(rdsName, ldsName, cdsName)}, | ||
Endpoints: []*v3endpointpb.ClusterLoadAssignment{e2e.DefaultEndpoint(edsName, "localhost", []uint32{port})}, | ||
SkipValidation: true, | ||
} | ||
|
||
ctx, cancel := context.WithTimeout(context.Background(), defaultTestTimeout) | ||
defer cancel() | ||
// This has only LDS and CDS. | ||
if err := serverDefaultAuth.Update(ctx, resourcesDefault); err != nil { | ||
t.Fatal(err) | ||
} | ||
// This has only RDS and EDS. | ||
if err := serverAnotherAuth.Update(ctx, resourcesAnother); err != nil { | ||
t.Fatal(err) | ||
} | ||
|
||
// Create a ClientConn and make a successful RPC. | ||
cc, err := grpc.Dial(fmt.Sprintf("xds:///%s", serviceName), grpc.WithTransportCredentials(insecure.NewCredentials()), grpc.WithResolvers(resolver)) | ||
if err != nil { | ||
t.Fatalf("failed to dial local test server: %v", err) | ||
} | ||
defer cc.Close() | ||
|
||
client := testpb.NewTestServiceClient(cc) | ||
if _, err := client.EmptyCall(ctx, &testpb.Empty{}, grpc.WaitForReady(true)); err != nil { | ||
t.Fatalf("rpc EmptyCall() failed: %v", err) | ||
} | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Oops, something went wrong.