feat(tvix/castore/src/channel): move from_url tests
These gRPC PathInfoService tests were actually not too useful in here, what we're mostly testing is the channel construction, so move it to there. Change-Id: Ic8c07558a1b28b46f863d5c39bcaa3a79cea007a Reviewed-on: https://cl.tvl.fyi/c/depot/+/10024 Reviewed-by: Connor Brewster <cbrewster@hey.com> Tested-by: BuildkiteCI
This commit is contained in:
parent
9aef3cfc89
commit
362117fbf5
2 changed files with 61 additions and 73 deletions
|
@ -66,3 +66,63 @@ impl From<tonic::transport::Error> for Error {
|
||||||
Self::TransportError(value)
|
Self::TransportError(value)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
#[cfg(test)]
|
||||||
|
mod tests {
|
||||||
|
use super::from_url;
|
||||||
|
|
||||||
|
/// This uses the correct scheme for a unix socket.
|
||||||
|
/// The fact that /path/to/somewhere doesn't exist yet is no problem, because we connect lazily.
|
||||||
|
#[tokio::test]
|
||||||
|
async fn test_valid_unix_path() {
|
||||||
|
let url = url::Url::parse("grpc+unix:///path/to/somewhere").expect("must parse");
|
||||||
|
|
||||||
|
assert!(from_url(&url).is_ok())
|
||||||
|
}
|
||||||
|
|
||||||
|
/// This uses the correct scheme for a unix socket,
|
||||||
|
/// but sets a host, which is unsupported.
|
||||||
|
#[tokio::test]
|
||||||
|
async fn test_invalid_unix_path_with_domain() {
|
||||||
|
let url =
|
||||||
|
url::Url::parse("grpc+unix://host.example/path/to/somewhere").expect("must parse");
|
||||||
|
|
||||||
|
assert!(from_url(&url).is_err())
|
||||||
|
}
|
||||||
|
|
||||||
|
/// This uses the wrong scheme
|
||||||
|
#[test]
|
||||||
|
fn test_invalid_scheme() {
|
||||||
|
let url = url::Url::parse("http://foo.example/test").expect("must parse");
|
||||||
|
|
||||||
|
assert!(from_url(&url).is_err());
|
||||||
|
}
|
||||||
|
|
||||||
|
/// This uses the correct scheme for a HTTP server.
|
||||||
|
/// The fact that nothing is listening there is no problem, because we connect lazily.
|
||||||
|
#[tokio::test]
|
||||||
|
async fn test_valid_http() {
|
||||||
|
let url = url::Url::parse("grpc+http://localhost").expect("must parse");
|
||||||
|
|
||||||
|
assert!(from_url(&url).is_ok());
|
||||||
|
}
|
||||||
|
|
||||||
|
/// This uses the correct scheme for a HTTPS server.
|
||||||
|
/// The fact that nothing is listening there is no problem, because we connect lazily.
|
||||||
|
#[tokio::test]
|
||||||
|
async fn test_valid_https() {
|
||||||
|
let url = url::Url::parse("grpc+https://localhost").expect("must parse");
|
||||||
|
|
||||||
|
assert!(from_url(&url).is_ok());
|
||||||
|
}
|
||||||
|
|
||||||
|
/// This uses the correct scheme, but also specifies
|
||||||
|
/// an additional path, which is not supported for gRPC.
|
||||||
|
/// The fact that nothing is listening there is no problem, because we connect lazily.
|
||||||
|
#[tokio::test]
|
||||||
|
async fn test_invalid_http_with_path() {
|
||||||
|
let url = url::Url::parse("grpc+https://localhost/some-path").expect("must parse");
|
||||||
|
|
||||||
|
assert!(from_url(&url).is_err());
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
|
@ -144,6 +144,7 @@ mod tests {
|
||||||
use tokio_stream::wrappers::UnixListenerStream;
|
use tokio_stream::wrappers::UnixListenerStream;
|
||||||
|
|
||||||
use crate::pathinfoservice::MemoryPathInfoService;
|
use crate::pathinfoservice::MemoryPathInfoService;
|
||||||
|
use crate::proto::path_info_service_client::PathInfoServiceClient;
|
||||||
use crate::proto::GRPCPathInfoServiceWrapper;
|
use crate::proto::GRPCPathInfoServiceWrapper;
|
||||||
use crate::tests::fixtures;
|
use crate::tests::fixtures;
|
||||||
use crate::tests::utils::gen_blob_service;
|
use crate::tests::utils::gen_blob_service;
|
||||||
|
@ -152,79 +153,6 @@ mod tests {
|
||||||
use super::GRPCPathInfoService;
|
use super::GRPCPathInfoService;
|
||||||
use super::PathInfoService;
|
use super::PathInfoService;
|
||||||
|
|
||||||
/// This uses the wrong scheme
|
|
||||||
#[test]
|
|
||||||
fn test_invalid_scheme() {
|
|
||||||
let url = url::Url::parse("http://foo.example/test").expect("must parse");
|
|
||||||
|
|
||||||
assert!(
|
|
||||||
GRPCPathInfoService::from_url(&url, gen_blob_service(), gen_directory_service())
|
|
||||||
.is_err()
|
|
||||||
);
|
|
||||||
}
|
|
||||||
|
|
||||||
/// This uses the correct scheme for a unix socket.
|
|
||||||
/// The fact that /path/to/somewhere doesn't exist yet is no problem, because we connect lazily.
|
|
||||||
#[tokio::test]
|
|
||||||
async fn test_valid_unix_path() {
|
|
||||||
let url = url::Url::parse("grpc+unix:///path/to/somewhere").expect("must parse");
|
|
||||||
|
|
||||||
assert!(
|
|
||||||
GRPCPathInfoService::from_url(&url, gen_blob_service(), gen_directory_service())
|
|
||||||
.is_ok()
|
|
||||||
);
|
|
||||||
}
|
|
||||||
|
|
||||||
/// This uses the correct scheme for a unix socket,
|
|
||||||
/// but sets a host, which is unsupported.
|
|
||||||
#[tokio::test]
|
|
||||||
async fn test_invalid_unix_path_with_domain() {
|
|
||||||
let url =
|
|
||||||
url::Url::parse("grpc+unix://host.example/path/to/somewhere").expect("must parse");
|
|
||||||
|
|
||||||
assert!(
|
|
||||||
GRPCPathInfoService::from_url(&url, gen_blob_service(), gen_directory_service())
|
|
||||||
.is_err()
|
|
||||||
);
|
|
||||||
}
|
|
||||||
|
|
||||||
/// This uses the correct scheme for a HTTP server.
|
|
||||||
/// The fact that nothing is listening there is no problem, because we connect lazily.
|
|
||||||
#[tokio::test]
|
|
||||||
async fn test_valid_http() {
|
|
||||||
let url = url::Url::parse("grpc+http://localhost").expect("must parse");
|
|
||||||
|
|
||||||
assert!(
|
|
||||||
GRPCPathInfoService::from_url(&url, gen_blob_service(), gen_directory_service())
|
|
||||||
.is_ok()
|
|
||||||
);
|
|
||||||
}
|
|
||||||
|
|
||||||
/// This uses the correct scheme for a HTTPS server.
|
|
||||||
/// The fact that nothing is listening there is no problem, because we connect lazily.
|
|
||||||
#[tokio::test]
|
|
||||||
async fn test_valid_https() {
|
|
||||||
let url = url::Url::parse("grpc+https://localhost").expect("must parse");
|
|
||||||
|
|
||||||
assert!(
|
|
||||||
GRPCPathInfoService::from_url(&url, gen_blob_service(), gen_directory_service())
|
|
||||||
.is_ok()
|
|
||||||
);
|
|
||||||
}
|
|
||||||
|
|
||||||
/// This uses the correct scheme, but also specifies
|
|
||||||
/// an additional path, which is not supported for gRPC.
|
|
||||||
/// The fact that nothing is listening there is no problem, because we connect lazily.
|
|
||||||
#[tokio::test]
|
|
||||||
async fn test_invalid_http_with_path() {
|
|
||||||
let url = url::Url::parse("grpc+https://localhost/some-path").expect("must parse");
|
|
||||||
|
|
||||||
assert!(
|
|
||||||
GRPCPathInfoService::from_url(&url, gen_blob_service(), gen_directory_service())
|
|
||||||
.is_err()
|
|
||||||
);
|
|
||||||
}
|
|
||||||
|
|
||||||
/// This ensures connecting via gRPC works as expected.
|
/// This ensures connecting via gRPC works as expected.
|
||||||
#[tokio::test]
|
#[tokio::test]
|
||||||
async fn test_valid_unix_path_ping_pong() {
|
async fn test_valid_unix_path_ping_pong() {
|
||||||
|
|
Loading…
Reference in a new issue