mirror of
https://gitee.com/milvus-io/milvus.git
synced 2026-01-07 19:31:51 +08:00
### **User description** AddProxyClients now removes clients not in the new snapshot before adding new ones. This ensures proper cleanup when ProxyWatcher re-watche etcd. issue: https://github.com/milvus-io/milvus/issues/46397 pr: https://github.com/milvus-io/milvus/pull/46398 ___ ### **PR Type** Bug fix ___ ### **Description** - Rename `AddProxyClients` to `SetProxyClients` for clearer semantics - Implement stale client cleanup before adding new proxy clients - Remove proxy clients not present in new etcd snapshot - Update all callers in querycoord and rootcoord servers - Regenerate mock files with mockery v2.53.3 ___ ### Diagram Walkthrough ```mermaid flowchart LR A["ProxyWatcher detects<br/>etcd change"] -->|calls| B["SetProxyClients<br/>with new snapshot"] B -->|removes| C["Stale clients<br/>not in snapshot"] C -->|closes| D["Cleanup resources"] B -->|adds| E["New proxy clients<br/>from snapshot"] ``` <details><summary><h3>File Walkthrough</h3></summary> <table><thead><tr><th></th><th align="left">Relevant files</th></tr></thead><tbody><tr><td><strong>Bug fix</strong></td><td><details><summary>3 files</summary><table> <tr> <td><strong>proxy_client_manager.go</strong><dd><code>Rename AddProxyClients to SetProxyClients with cleanup</code> </dd></td> <td><a href="https://github.com/milvus-io/milvus/pull/46491/files#diff-1a13e14654661bffe70ce626777d527871fcae62361a5fc18b7dca93e66afe1e">+22/-2</a> </td> </tr> <tr> <td><strong>server.go</strong><dd><code>Update ProxyWatcher to use SetProxyClients</code> </dd></td> <td><a href="https://github.com/milvus-io/milvus/pull/46491/files#diff-87d7712e6df027656ba9d433fb77b702c185486130879be54204da2b8f092230">+1/-1</a> </td> </tr> <tr> <td><strong>root_coord.go</strong><dd><code>Update ProxyWatcher initialization to SetProxyClients</code> </dd></td> <td><a href="https://github.com/milvus-io/milvus/pull/46491/files#diff-8fab0705c4ddb5f98e5955d3c3013fa795c87237a8525e189c3296d98dcce47f">+2/-2</a> </td> </tr> </table></details></td></tr><tr><td><strong>Tests</strong></td><td><details><summary>1 files</summary><table> <tr> <td><strong>proxy_client_manager_test.go</strong><dd><code>Update test for SetProxyClients stale removal</code> </dd></td> <td><a href="https://github.com/milvus-io/milvus/pull/46491/files#diff-fb82a84e67ec187c1bfbdc4335c18b504b2f4392758d859e54115684ea8a526d">+26/-10</a> </td> </tr> </table></details></td></tr><tr><td><strong>Miscellaneous</strong></td><td><details><summary>7 files</summary><table> <tr> <td><strong>mock_proxy_client_manager.go</strong><dd><code>Regenerate mock with SetProxyClients method</code> </dd></td> <td><a href="https://github.com/milvus-io/milvus/pull/46491/files#diff-8cc3cfe21d2694f58ebe7f2d44e12c467d9e83ac9edb37bcb6c7262e7b2ca09d">+78/-38</a> </td> </tr> <tr> <td><strong>mock_proxy_watcher.go</strong><dd><code>Regenerate mock with mockery v2.53.3</code> </dd></td> <td><a href="https://github.com/milvus-io/milvus/pull/46491/files#diff-0c22e89cbee68c397abee52e797166fbac754b439eb1304baf53dd207e8f11d2">+9/-5</a> </td> </tr> <tr> <td><strong>mock_global_id_allocator.go</strong><dd><code>Regenerate mock with mockery v2.53.3</code> </dd></td> <td><a href="https://github.com/milvus-io/milvus/pull/46491/files#diff-1822c38f0a6c4225134bee554bf518d0b9184040ea5bb3d9e926515ae80655c8">+15/-3</a> </td> </tr> <tr> <td><strong>mock_grpc_client.go</strong><dd><code>Regenerate mock with mockery v2.53.3</code> </dd></td> <td><a href="https://github.com/milvus-io/milvus/pull/46491/files#diff-6137f17eb7eef693d72c6181f519f7b1a87669a00f5268cbd7c3399567451e64">+33/-13</a> </td> </tr> <tr> <td><strong>allocator.go</strong><dd><code>Regenerate mock with mockery v2.53.3</code> </dd></td> <td><a href="https://github.com/milvus-io/milvus/pull/46491/files#diff-e2482bb9748ad163ba57c65251355035f45c140f12214cd96cc5da88376fcc39">+26/-6</a> </td> </tr> <tr> <td><strong>mock_factory.go</strong><dd><code>Regenerate mock with mockery v2.53.3</code> </dd></td> <td><a href="https://github.com/milvus-io/milvus/pull/46491/files#diff-bc91a5fcdc0bd52eaaaf805d15985fe578debbb2576eb0c97d08e0573d0132e6">+18/-2</a> </td> </tr> <tr> <td><strong>mock_session.go</strong><dd><code>Regenerate mock with mockery v2.53.3</code> </dd></td> <td><a href="https://github.com/milvus-io/milvus/pull/46491/files#diff-850f08ed9571fd6f3f84bd846fa29dab2d52be7c8f9d9b358fc667c6970a90e6">+79/-19</a> </td> </tr> </table></details></td></tr></tbody></table> </details> ___ Signed-off-by: bigsheeper <yihao.dai@zilliz.com>
481 lines
17 KiB
Go
481 lines
17 KiB
Go
// Licensed to the LF AI & Data foundation under one
|
|
// or more contributor license agreements. See the NOTICE file
|
|
// distributed with this work for additional information
|
|
// regarding copyright ownership. The ASF licenses this file
|
|
// to you under the Apache License, Version 2.0 (the
|
|
// "License"); you may not use this file except in compliance
|
|
// with the License. You may obtain a copy of the License at
|
|
//
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
//
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
// See the License for the specific language governing permissions and
|
|
// limitations under the License.
|
|
|
|
package proxyutil
|
|
|
|
import (
|
|
"context"
|
|
"sync"
|
|
"testing"
|
|
|
|
"github.com/cockroachdb/errors"
|
|
"github.com/stretchr/testify/assert"
|
|
"github.com/stretchr/testify/mock"
|
|
|
|
"github.com/milvus-io/milvus-proto/go-api/v2/commonpb"
|
|
milvuspb "github.com/milvus-io/milvus-proto/go-api/v2/milvuspb"
|
|
"github.com/milvus-io/milvus/internal/mocks"
|
|
"github.com/milvus-io/milvus/internal/types"
|
|
"github.com/milvus-io/milvus/internal/util/sessionutil"
|
|
"github.com/milvus-io/milvus/pkg/v2/proto/proxypb"
|
|
"github.com/milvus-io/milvus/pkg/v2/util/merr"
|
|
"github.com/milvus-io/milvus/pkg/v2/util/paramtable"
|
|
)
|
|
|
|
type UniqueID = int64
|
|
|
|
var (
|
|
Params = paramtable.Get()
|
|
TestProxyID = int64(1)
|
|
)
|
|
|
|
type proxyMock struct {
|
|
types.ProxyClient
|
|
collArray []string
|
|
collIDs []UniqueID
|
|
mutex sync.Mutex
|
|
|
|
returnError bool
|
|
returnGrpcError bool
|
|
}
|
|
|
|
func (p *proxyMock) Stop() error {
|
|
return nil
|
|
}
|
|
|
|
func (p *proxyMock) InvalidateCollectionMetaCache(ctx context.Context, request *proxypb.InvalidateCollMetaCacheRequest) (*commonpb.Status, error) {
|
|
p.mutex.Lock()
|
|
defer p.mutex.Unlock()
|
|
if p.returnError {
|
|
return &commonpb.Status{
|
|
ErrorCode: commonpb.ErrorCode_UnexpectedError,
|
|
}, nil
|
|
}
|
|
if p.returnGrpcError {
|
|
return nil, errors.New("grpc error")
|
|
}
|
|
p.collArray = append(p.collArray, request.CollectionName)
|
|
p.collIDs = append(p.collIDs, request.CollectionID)
|
|
return merr.Success(), nil
|
|
}
|
|
|
|
func (p *proxyMock) GetCollArray() []string {
|
|
p.mutex.Lock()
|
|
defer p.mutex.Unlock()
|
|
ret := make([]string, 0, len(p.collArray))
|
|
ret = append(ret, p.collArray...)
|
|
return ret
|
|
}
|
|
|
|
func (p *proxyMock) GetCollIDs() []UniqueID {
|
|
p.mutex.Lock()
|
|
defer p.mutex.Unlock()
|
|
ret := p.collIDs
|
|
return ret
|
|
}
|
|
|
|
func (p *proxyMock) InvalidateCredentialCache(ctx context.Context, request *proxypb.InvalidateCredCacheRequest) (*commonpb.Status, error) {
|
|
if p.returnError {
|
|
return &commonpb.Status{
|
|
ErrorCode: commonpb.ErrorCode_UnexpectedError,
|
|
}, nil
|
|
}
|
|
if p.returnGrpcError {
|
|
return nil, errors.New("grpc error")
|
|
}
|
|
return merr.Success(), nil
|
|
}
|
|
|
|
func (p *proxyMock) RefreshPolicyInfoCache(ctx context.Context, req *proxypb.RefreshPolicyInfoCacheRequest) (*commonpb.Status, error) {
|
|
return merr.Success(), nil
|
|
}
|
|
|
|
func TestProxyClientManager_SetProxyClients(t *testing.T) {
|
|
p1 := mocks.NewMockProxyClient(t)
|
|
p1.EXPECT().Close().Return(nil).Once()
|
|
p2 := mocks.NewMockProxyClient(t)
|
|
p3 := mocks.NewMockProxyClient(t)
|
|
|
|
proxyCreator := func(ctx context.Context, addr string, nodeID int64) (types.ProxyClient, error) {
|
|
return p3, nil
|
|
}
|
|
pcm := NewProxyClientManager(proxyCreator)
|
|
|
|
// Initial state: proxy 1, 2
|
|
pcm.proxyClient.Insert(1, p1)
|
|
pcm.proxyClient.Insert(2, p2)
|
|
assert.Equal(t, 2, pcm.GetProxyCount())
|
|
|
|
// New snapshot: proxy 2, 3
|
|
sessions := []*sessionutil.Session{
|
|
{SessionRaw: sessionutil.SessionRaw{ServerID: 2, Address: "addr2"}},
|
|
{SessionRaw: sessionutil.SessionRaw{ServerID: 4, Address: "addr4"}},
|
|
}
|
|
pcm.SetProxyClients(sessions)
|
|
|
|
// Verify: proxy 1 removed, proxy 2 kept, proxy 3 added
|
|
_, ok := pcm.proxyClient.Get(1)
|
|
assert.False(t, ok, "stale proxy 1 should be removed")
|
|
_, ok = pcm.proxyClient.Get(2)
|
|
assert.True(t, ok, "proxy 2 should still exist")
|
|
_, ok = pcm.proxyClient.Get(4)
|
|
assert.True(t, ok, "proxy 4 should be added")
|
|
|
|
assert.Equal(t, 2, pcm.GetProxyCount())
|
|
}
|
|
|
|
func TestProxyClientManager_AddProxyClient(t *testing.T) {
|
|
proxyCreator := func(ctx context.Context, addr string, nodeID int64) (types.ProxyClient, error) {
|
|
return nil, errors.New("failed")
|
|
}
|
|
|
|
pcm := NewProxyClientManager(proxyCreator)
|
|
|
|
session := &sessionutil.Session{
|
|
SessionRaw: sessionutil.SessionRaw{
|
|
ServerID: 100,
|
|
Address: "localhost",
|
|
},
|
|
}
|
|
|
|
pcm.AddProxyClient(session)
|
|
}
|
|
|
|
func TestProxyClientManager_InvalidateCollectionMetaCache(t *testing.T) {
|
|
t.Run("empty proxy list", func(t *testing.T) {
|
|
ctx := context.Background()
|
|
pcm := NewProxyClientManager(DefaultProxyCreator)
|
|
err := pcm.InvalidateCollectionMetaCache(ctx, &proxypb.InvalidateCollMetaCacheRequest{})
|
|
assert.NoError(t, err)
|
|
})
|
|
|
|
t.Run("mock rpc error", func(t *testing.T) {
|
|
ctx := context.Background()
|
|
p1 := mocks.NewMockProxyClient(t)
|
|
p1.EXPECT().InvalidateCollectionMetaCache(mock.Anything, mock.Anything).Return(merr.Success(), errors.New("error mock InvalidateCollectionMetaCache"))
|
|
pcm := NewProxyClientManager(DefaultProxyCreator)
|
|
pcm.proxyClient.Insert(TestProxyID, p1)
|
|
err := pcm.InvalidateCollectionMetaCache(ctx, &proxypb.InvalidateCollMetaCacheRequest{})
|
|
assert.Error(t, err)
|
|
})
|
|
|
|
t.Run("mock error code", func(t *testing.T) {
|
|
ctx := context.Background()
|
|
p1 := mocks.NewMockProxyClient(t)
|
|
p1.EXPECT().InvalidateCollectionMetaCache(mock.Anything, mock.Anything).Return(merr.Status(errors.New("mock error")), nil)
|
|
pcm := NewProxyClientManager(DefaultProxyCreator)
|
|
pcm.proxyClient.Insert(TestProxyID, p1)
|
|
err := pcm.InvalidateCollectionMetaCache(ctx, &proxypb.InvalidateCollMetaCacheRequest{})
|
|
assert.Error(t, err)
|
|
})
|
|
|
|
t.Run("mock proxy service down", func(t *testing.T) {
|
|
ctx := context.Background()
|
|
p1 := mocks.NewMockProxyClient(t)
|
|
p1.EXPECT().InvalidateCollectionMetaCache(mock.Anything, mock.Anything).Return(nil, merr.ErrNodeNotFound)
|
|
pcm := NewProxyClientManager(DefaultProxyCreator)
|
|
pcm.proxyClient.Insert(TestProxyID, p1)
|
|
err := pcm.InvalidateCollectionMetaCache(ctx, &proxypb.InvalidateCollMetaCacheRequest{})
|
|
assert.NoError(t, err)
|
|
})
|
|
|
|
t.Run("normal case", func(t *testing.T) {
|
|
ctx := context.Background()
|
|
p1 := mocks.NewMockProxyClient(t)
|
|
p1.EXPECT().InvalidateCollectionMetaCache(mock.Anything, mock.Anything).Return(merr.Success(), nil)
|
|
pcm := NewProxyClientManager(DefaultProxyCreator)
|
|
pcm.proxyClient.Insert(TestProxyID, p1)
|
|
err := pcm.InvalidateCollectionMetaCache(ctx, &proxypb.InvalidateCollMetaCacheRequest{})
|
|
assert.NoError(t, err)
|
|
})
|
|
}
|
|
|
|
func TestProxyClientManager_InvalidateCredentialCache(t *testing.T) {
|
|
t.Run("empty proxy list", func(t *testing.T) {
|
|
ctx := context.Background()
|
|
pcm := NewProxyClientManager(DefaultProxyCreator)
|
|
err := pcm.InvalidateCredentialCache(ctx, &proxypb.InvalidateCredCacheRequest{})
|
|
assert.NoError(t, err)
|
|
})
|
|
|
|
t.Run("mock rpc error", func(t *testing.T) {
|
|
ctx := context.Background()
|
|
p1 := mocks.NewMockProxyClient(t)
|
|
p1.EXPECT().InvalidateCredentialCache(mock.Anything, mock.Anything).Return(merr.Success(), errors.New("error mock InvalidateCredentialCache"))
|
|
pcm := NewProxyClientManager(DefaultProxyCreator)
|
|
pcm.proxyClient.Insert(TestProxyID, p1)
|
|
err := pcm.InvalidateCredentialCache(ctx, &proxypb.InvalidateCredCacheRequest{})
|
|
assert.Error(t, err)
|
|
})
|
|
|
|
t.Run("mock error code", func(t *testing.T) {
|
|
ctx := context.Background()
|
|
p1 := mocks.NewMockProxyClient(t)
|
|
mockErr := errors.New("mock error")
|
|
p1.EXPECT().InvalidateCredentialCache(mock.Anything, mock.Anything).Return(merr.Status(mockErr), nil)
|
|
pcm := NewProxyClientManager(DefaultProxyCreator)
|
|
pcm.proxyClient.Insert(TestProxyID, p1)
|
|
err := pcm.InvalidateCredentialCache(ctx, &proxypb.InvalidateCredCacheRequest{})
|
|
assert.Error(t, err)
|
|
})
|
|
|
|
t.Run("normal case", func(t *testing.T) {
|
|
ctx := context.Background()
|
|
p1 := mocks.NewMockProxyClient(t)
|
|
p1.EXPECT().InvalidateCredentialCache(mock.Anything, mock.Anything).Return(merr.Success(), nil)
|
|
pcm := NewProxyClientManager(DefaultProxyCreator)
|
|
pcm.proxyClient.Insert(TestProxyID, p1)
|
|
err := pcm.InvalidateCredentialCache(ctx, &proxypb.InvalidateCredCacheRequest{})
|
|
assert.NoError(t, err)
|
|
})
|
|
}
|
|
|
|
func TestProxyClientManager_UpdateCredentialCache(t *testing.T) {
|
|
TestProxyID := int64(1001)
|
|
t.Run("empty proxy list", func(t *testing.T) {
|
|
ctx := context.Background()
|
|
pcm := NewProxyClientManager(DefaultProxyCreator)
|
|
|
|
err := pcm.UpdateCredentialCache(ctx, &proxypb.UpdateCredCacheRequest{})
|
|
assert.NoError(t, err)
|
|
})
|
|
|
|
t.Run("mock rpc error", func(t *testing.T) {
|
|
ctx := context.Background()
|
|
p1 := mocks.NewMockProxyClient(t)
|
|
p1.EXPECT().UpdateCredentialCache(mock.Anything, mock.Anything).Return(merr.Success(), errors.New("error mock InvalidateCredentialCache"))
|
|
pcm := NewProxyClientManager(DefaultProxyCreator)
|
|
pcm.proxyClient.Insert(TestProxyID, p1)
|
|
err := pcm.UpdateCredentialCache(ctx, &proxypb.UpdateCredCacheRequest{})
|
|
assert.Error(t, err)
|
|
})
|
|
|
|
t.Run("mock error code", func(t *testing.T) {
|
|
ctx := context.Background()
|
|
p1 := mocks.NewMockProxyClient(t)
|
|
mockErr := errors.New("mock error")
|
|
p1.EXPECT().UpdateCredentialCache(mock.Anything, mock.Anything).Return(merr.Status(mockErr), nil)
|
|
pcm := NewProxyClientManager(DefaultProxyCreator)
|
|
pcm.proxyClient.Insert(TestProxyID, p1)
|
|
err := pcm.UpdateCredentialCache(ctx, &proxypb.UpdateCredCacheRequest{})
|
|
assert.Error(t, err)
|
|
})
|
|
|
|
t.Run("normal case", func(t *testing.T) {
|
|
ctx := context.Background()
|
|
p1 := mocks.NewMockProxyClient(t)
|
|
p1.EXPECT().UpdateCredentialCache(mock.Anything, mock.Anything).Return(merr.Success(), nil)
|
|
pcm := NewProxyClientManager(DefaultProxyCreator)
|
|
pcm.proxyClient.Insert(TestProxyID, p1)
|
|
err := pcm.UpdateCredentialCache(ctx, &proxypb.UpdateCredCacheRequest{})
|
|
assert.NoError(t, err)
|
|
})
|
|
}
|
|
|
|
func TestProxyClientManager_RefreshPolicyInfoCache(t *testing.T) {
|
|
t.Run("empty proxy list", func(t *testing.T) {
|
|
ctx := context.Background()
|
|
pcm := NewProxyClientManager(DefaultProxyCreator)
|
|
|
|
err := pcm.RefreshPolicyInfoCache(ctx, &proxypb.RefreshPolicyInfoCacheRequest{})
|
|
assert.NoError(t, err)
|
|
})
|
|
|
|
t.Run("mock rpc error", func(t *testing.T) {
|
|
ctx := context.Background()
|
|
p1 := mocks.NewMockProxyClient(t)
|
|
p1.EXPECT().RefreshPolicyInfoCache(mock.Anything, mock.Anything).Return(merr.Success(), errors.New("error mock RefreshPolicyInfoCache"))
|
|
|
|
pcm := NewProxyClientManager(DefaultProxyCreator)
|
|
pcm.proxyClient.Insert(TestProxyID, p1)
|
|
err := pcm.RefreshPolicyInfoCache(ctx, &proxypb.RefreshPolicyInfoCacheRequest{})
|
|
assert.Error(t, err)
|
|
})
|
|
|
|
t.Run("mock error code", func(t *testing.T) {
|
|
ctx := context.Background()
|
|
p1 := mocks.NewMockProxyClient(t)
|
|
p1.EXPECT().RefreshPolicyInfoCache(mock.Anything, mock.Anything).Return(merr.Status(errors.New("mock error")), nil)
|
|
|
|
pcm := NewProxyClientManager(DefaultProxyCreator)
|
|
pcm.proxyClient.Insert(TestProxyID, p1)
|
|
err := pcm.RefreshPolicyInfoCache(ctx, &proxypb.RefreshPolicyInfoCacheRequest{})
|
|
assert.Error(t, err)
|
|
})
|
|
|
|
t.Run("normal case", func(t *testing.T) {
|
|
ctx := context.Background()
|
|
p1 := mocks.NewMockProxyClient(t)
|
|
|
|
p1.EXPECT().RefreshPolicyInfoCache(mock.Anything, mock.Anything).Return(merr.Success(), nil)
|
|
pcm := NewProxyClientManager(DefaultProxyCreator)
|
|
pcm.proxyClient.Insert(TestProxyID, p1)
|
|
err := pcm.RefreshPolicyInfoCache(ctx, &proxypb.RefreshPolicyInfoCacheRequest{})
|
|
assert.NoError(t, err)
|
|
})
|
|
}
|
|
|
|
func TestProxyClientManager_TestGetProxyCount(t *testing.T) {
|
|
p1 := mocks.NewMockProxyClient(t)
|
|
pcm := NewProxyClientManager(DefaultProxyCreator)
|
|
pcm.proxyClient.Insert(TestProxyID, p1)
|
|
|
|
assert.Equal(t, pcm.GetProxyCount(), 1)
|
|
}
|
|
|
|
func TestProxyClientManager_GetProxyMetrics(t *testing.T) {
|
|
TestProxyID := int64(1001)
|
|
t.Run("empty proxy list", func(t *testing.T) {
|
|
ctx := context.Background()
|
|
pcm := NewProxyClientManager(DefaultProxyCreator)
|
|
_, err := pcm.GetProxyMetrics(ctx)
|
|
assert.NoError(t, err)
|
|
})
|
|
|
|
t.Run("mock rpc error", func(t *testing.T) {
|
|
ctx := context.Background()
|
|
p1 := mocks.NewMockProxyClient(t)
|
|
p1.EXPECT().GetProxyMetrics(mock.Anything, mock.Anything).Return(nil, errors.New("error mock InvalidateCredentialCache"))
|
|
pcm := NewProxyClientManager(DefaultProxyCreator)
|
|
pcm.proxyClient.Insert(TestProxyID, p1)
|
|
_, err := pcm.GetProxyMetrics(ctx)
|
|
assert.Error(t, err)
|
|
})
|
|
|
|
t.Run("mock error code", func(t *testing.T) {
|
|
ctx := context.Background()
|
|
p1 := mocks.NewMockProxyClient(t)
|
|
mockErr := errors.New("mock error")
|
|
p1.EXPECT().GetProxyMetrics(mock.Anything, mock.Anything).Return(&milvuspb.GetMetricsResponse{Status: merr.Status(mockErr)}, nil)
|
|
pcm := NewProxyClientManager(DefaultProxyCreator)
|
|
pcm.proxyClient.Insert(TestProxyID, p1)
|
|
_, err := pcm.GetProxyMetrics(ctx)
|
|
assert.Error(t, err)
|
|
})
|
|
|
|
t.Run("normal case", func(t *testing.T) {
|
|
ctx := context.Background()
|
|
p1 := mocks.NewMockProxyClient(t)
|
|
p1.EXPECT().GetProxyMetrics(mock.Anything, mock.Anything).Return(&milvuspb.GetMetricsResponse{Status: merr.Success()}, nil)
|
|
pcm := NewProxyClientManager(DefaultProxyCreator)
|
|
pcm.proxyClient.Insert(TestProxyID, p1)
|
|
_, err := pcm.GetProxyMetrics(ctx)
|
|
assert.NoError(t, err)
|
|
})
|
|
}
|
|
|
|
func TestProxyClientManager_SetRates(t *testing.T) {
|
|
TestProxyID := int64(1001)
|
|
t.Run("empty proxy list", func(t *testing.T) {
|
|
ctx := context.Background()
|
|
pcm := NewProxyClientManager(DefaultProxyCreator)
|
|
err := pcm.SetRates(ctx, &proxypb.SetRatesRequest{})
|
|
assert.NoError(t, err)
|
|
})
|
|
|
|
t.Run("mock rpc error", func(t *testing.T) {
|
|
ctx := context.Background()
|
|
p1 := mocks.NewMockProxyClient(t)
|
|
p1.EXPECT().SetRates(mock.Anything, mock.Anything).Return(nil, errors.New("error mock InvalidateCredentialCache"))
|
|
pcm := NewProxyClientManager(DefaultProxyCreator)
|
|
pcm.proxyClient.Insert(TestProxyID, p1)
|
|
err := pcm.SetRates(ctx, &proxypb.SetRatesRequest{})
|
|
assert.Error(t, err)
|
|
})
|
|
|
|
t.Run("mock error code", func(t *testing.T) {
|
|
ctx := context.Background()
|
|
p1 := mocks.NewMockProxyClient(t)
|
|
mockErr := errors.New("mock error")
|
|
p1.EXPECT().SetRates(mock.Anything, mock.Anything).Return(merr.Status(mockErr), nil)
|
|
pcm := NewProxyClientManager(DefaultProxyCreator)
|
|
pcm.proxyClient.Insert(TestProxyID, p1)
|
|
err := pcm.SetRates(ctx, &proxypb.SetRatesRequest{})
|
|
assert.Error(t, err)
|
|
})
|
|
|
|
t.Run("normal case", func(t *testing.T) {
|
|
ctx := context.Background()
|
|
p1 := mocks.NewMockProxyClient(t)
|
|
p1.EXPECT().SetRates(mock.Anything, mock.Anything).Return(merr.Success(), nil)
|
|
pcm := NewProxyClientManager(DefaultProxyCreator)
|
|
pcm.proxyClient.Insert(TestProxyID, p1)
|
|
err := pcm.SetRates(ctx, &proxypb.SetRatesRequest{})
|
|
assert.NoError(t, err)
|
|
})
|
|
}
|
|
|
|
func TestProxyClientManager_GetComponentStates(t *testing.T) {
|
|
TestProxyID := int64(1001)
|
|
t.Run("empty proxy list", func(t *testing.T) {
|
|
ctx := context.Background()
|
|
pcm := NewProxyClientManager(DefaultProxyCreator)
|
|
_, err := pcm.GetComponentStates(ctx)
|
|
assert.NoError(t, err)
|
|
})
|
|
|
|
t.Run("mock rpc error", func(t *testing.T) {
|
|
ctx := context.Background()
|
|
p1 := mocks.NewMockProxyClient(t)
|
|
p1.EXPECT().GetComponentStates(mock.Anything, mock.Anything).Return(nil, errors.New("error mock InvalidateCredentialCache"))
|
|
pcm := NewProxyClientManager(DefaultProxyCreator)
|
|
pcm.proxyClient.Insert(TestProxyID, p1)
|
|
_, err := pcm.GetComponentStates(ctx)
|
|
assert.Error(t, err)
|
|
})
|
|
|
|
t.Run("normal case", func(t *testing.T) {
|
|
ctx := context.Background()
|
|
p1 := mocks.NewMockProxyClient(t)
|
|
p1.EXPECT().GetComponentStates(mock.Anything, mock.Anything).Return(&milvuspb.ComponentStates{Status: merr.Success()}, nil)
|
|
pcm := NewProxyClientManager(DefaultProxyCreator)
|
|
pcm.proxyClient.Insert(TestProxyID, p1)
|
|
_, err := pcm.GetComponentStates(ctx)
|
|
assert.NoError(t, err)
|
|
})
|
|
}
|
|
|
|
func TestProxyClientManager_InvalidateShardLeaderCache(t *testing.T) {
|
|
TestProxyID := int64(1001)
|
|
t.Run("empty proxy list", func(t *testing.T) {
|
|
ctx := context.Background()
|
|
pcm := NewProxyClientManager(DefaultProxyCreator)
|
|
|
|
err := pcm.InvalidateShardLeaderCache(ctx, &proxypb.InvalidateShardLeaderCacheRequest{})
|
|
assert.NoError(t, err)
|
|
})
|
|
|
|
t.Run("mock rpc error", func(t *testing.T) {
|
|
ctx := context.Background()
|
|
p1 := mocks.NewMockProxyClient(t)
|
|
p1.EXPECT().InvalidateShardLeaderCache(mock.Anything, mock.Anything).Return(nil, errors.New("error mock InvalidateCredentialCache"))
|
|
pcm := NewProxyClientManager(DefaultProxyCreator)
|
|
pcm.proxyClient.Insert(TestProxyID, p1)
|
|
err := pcm.InvalidateShardLeaderCache(ctx, &proxypb.InvalidateShardLeaderCacheRequest{})
|
|
assert.Error(t, err)
|
|
})
|
|
|
|
t.Run("normal case", func(t *testing.T) {
|
|
ctx := context.Background()
|
|
p1 := mocks.NewMockProxyClient(t)
|
|
p1.EXPECT().InvalidateShardLeaderCache(mock.Anything, mock.Anything).Return(merr.Success(), nil)
|
|
pcm := NewProxyClientManager(DefaultProxyCreator)
|
|
pcm.proxyClient.Insert(TestProxyID, p1)
|
|
err := pcm.InvalidateShardLeaderCache(ctx, &proxypb.InvalidateShardLeaderCacheRequest{})
|
|
assert.NoError(t, err)
|
|
})
|
|
}
|