transport_test.go 4.7 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185
  1. // Copyright 2015 The etcd Authors
  2. //
  3. // Licensed under the Apache License, Version 2.0 (the "License");
  4. // you may not use this file except in compliance with the License.
  5. // You may obtain a copy of the License at
  6. //
  7. // http://www.apache.org/licenses/LICENSE-2.0
  8. //
  9. // Unless required by applicable law or agreed to in writing, software
  10. // distributed under the License is distributed on an "AS IS" BASIS,
  11. // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  12. // See the License for the specific language governing permissions and
  13. // limitations under the License.
  14. package rafthttp
  15. import (
  16. "net/http"
  17. "reflect"
  18. "testing"
  19. "time"
  20. "github.com/coreos/etcd/etcdserver/stats"
  21. "github.com/coreos/etcd/pkg/testutil"
  22. "github.com/coreos/etcd/pkg/types"
  23. "github.com/coreos/etcd/raft/raftpb"
  24. "github.com/xiang90/probing"
  25. )
  26. // TestTransportSend tests that transport can send messages using correct
  27. // underlying peer, and drop local or unknown-target messages.
  28. func TestTransportSend(t *testing.T) {
  29. ss := &stats.ServerStats{}
  30. ss.Initialize()
  31. peer1 := newFakePeer()
  32. peer2 := newFakePeer()
  33. tr := &Transport{
  34. ServerStats: ss,
  35. peers: map[types.ID]Peer{types.ID(1): peer1, types.ID(2): peer2},
  36. }
  37. wmsgsIgnored := []raftpb.Message{
  38. // bad local message
  39. {Type: raftpb.MsgBeat},
  40. // bad remote message
  41. {Type: raftpb.MsgProp, To: 3},
  42. }
  43. wmsgsTo1 := []raftpb.Message{
  44. // good message
  45. {Type: raftpb.MsgProp, To: 1},
  46. {Type: raftpb.MsgApp, To: 1},
  47. }
  48. wmsgsTo2 := []raftpb.Message{
  49. // good message
  50. {Type: raftpb.MsgProp, To: 2},
  51. {Type: raftpb.MsgApp, To: 2},
  52. }
  53. tr.Send(wmsgsIgnored)
  54. tr.Send(wmsgsTo1)
  55. tr.Send(wmsgsTo2)
  56. if !reflect.DeepEqual(peer1.msgs, wmsgsTo1) {
  57. t.Errorf("msgs to peer 1 = %+v, want %+v", peer1.msgs, wmsgsTo1)
  58. }
  59. if !reflect.DeepEqual(peer2.msgs, wmsgsTo2) {
  60. t.Errorf("msgs to peer 2 = %+v, want %+v", peer2.msgs, wmsgsTo2)
  61. }
  62. }
  63. func TestTransportCutMend(t *testing.T) {
  64. ss := &stats.ServerStats{}
  65. ss.Initialize()
  66. peer1 := newFakePeer()
  67. peer2 := newFakePeer()
  68. tr := &Transport{
  69. ServerStats: ss,
  70. peers: map[types.ID]Peer{types.ID(1): peer1, types.ID(2): peer2},
  71. }
  72. tr.CutPeer(types.ID(1))
  73. wmsgsTo := []raftpb.Message{
  74. // good message
  75. {Type: raftpb.MsgProp, To: 1},
  76. {Type: raftpb.MsgApp, To: 1},
  77. }
  78. tr.Send(wmsgsTo)
  79. if len(peer1.msgs) > 0 {
  80. t.Fatalf("msgs expected to be ignored, got %+v", peer1.msgs)
  81. }
  82. tr.MendPeer(types.ID(1))
  83. tr.Send(wmsgsTo)
  84. if !reflect.DeepEqual(peer1.msgs, wmsgsTo) {
  85. t.Errorf("msgs to peer 1 = %+v, want %+v", peer1.msgs, wmsgsTo)
  86. }
  87. }
  88. func TestTransportAdd(t *testing.T) {
  89. ls := stats.NewLeaderStats("")
  90. tr := &Transport{
  91. LeaderStats: ls,
  92. streamRt: &roundTripperRecorder{},
  93. peers: make(map[types.ID]Peer),
  94. prober: probing.NewProber(nil),
  95. }
  96. tr.AddPeer(1, []string{"http://localhost:2380"})
  97. if _, ok := ls.Followers["1"]; !ok {
  98. t.Errorf("FollowerStats[1] is nil, want exists")
  99. }
  100. s, ok := tr.peers[types.ID(1)]
  101. if !ok {
  102. tr.Stop()
  103. t.Fatalf("senders[1] is nil, want exists")
  104. }
  105. // duplicate AddPeer is ignored
  106. tr.AddPeer(1, []string{"http://localhost:2380"})
  107. ns := tr.peers[types.ID(1)]
  108. if s != ns {
  109. t.Errorf("sender = %v, want %v", ns, s)
  110. }
  111. tr.Stop()
  112. }
  113. func TestTransportRemove(t *testing.T) {
  114. tr := &Transport{
  115. LeaderStats: stats.NewLeaderStats(""),
  116. streamRt: &roundTripperRecorder{},
  117. peers: make(map[types.ID]Peer),
  118. prober: probing.NewProber(nil),
  119. }
  120. tr.AddPeer(1, []string{"http://localhost:2380"})
  121. tr.RemovePeer(types.ID(1))
  122. defer tr.Stop()
  123. if _, ok := tr.peers[types.ID(1)]; ok {
  124. t.Fatalf("senders[1] exists, want removed")
  125. }
  126. }
  127. func TestTransportUpdate(t *testing.T) {
  128. peer := newFakePeer()
  129. tr := &Transport{
  130. peers: map[types.ID]Peer{types.ID(1): peer},
  131. prober: probing.NewProber(nil),
  132. }
  133. u := "http://localhost:2380"
  134. tr.UpdatePeer(types.ID(1), []string{u})
  135. wurls := types.URLs(testutil.MustNewURLs(t, []string{"http://localhost:2380"}))
  136. if !reflect.DeepEqual(peer.peerURLs, wurls) {
  137. t.Errorf("urls = %+v, want %+v", peer.peerURLs, wurls)
  138. }
  139. }
  140. func TestTransportErrorc(t *testing.T) {
  141. errorc := make(chan error, 1)
  142. tr := &Transport{
  143. Raft: &fakeRaft{},
  144. LeaderStats: stats.NewLeaderStats(""),
  145. ErrorC: errorc,
  146. streamRt: newRespRoundTripper(http.StatusForbidden, nil),
  147. pipelineRt: newRespRoundTripper(http.StatusForbidden, nil),
  148. peers: make(map[types.ID]Peer),
  149. prober: probing.NewProber(nil),
  150. }
  151. tr.AddPeer(1, []string{"http://localhost:2380"})
  152. defer tr.Stop()
  153. select {
  154. case <-errorc:
  155. t.Fatalf("received unexpected from errorc")
  156. case <-time.After(10 * time.Millisecond):
  157. }
  158. tr.peers[1].send(raftpb.Message{})
  159. select {
  160. case <-errorc:
  161. case <-time.After(1 * time.Second):
  162. t.Fatalf("cannot receive error from errorc")
  163. }
  164. }