mirror of
https://github.com/k3s-io/kubernetes.git
synced 2025-08-07 03:03:59 +00:00
Revert "apiserver: improve logging for apf tests in server/filters package"
This reverts commit 8fa3e61399
.
This commit is contained in:
parent
7de63a887f
commit
9fe3b84107
@ -18,7 +18,6 @@ package filters
|
|||||||
|
|
||||||
import (
|
import (
|
||||||
"context"
|
"context"
|
||||||
"errors"
|
|
||||||
"fmt"
|
"fmt"
|
||||||
"net/http"
|
"net/http"
|
||||||
"net/http/httptest"
|
"net/http/httptest"
|
||||||
@ -179,19 +178,11 @@ func newApfHandlerWithFilter(t *testing.T, flowControlFilter utilflowcontrol.Int
|
|||||||
r = r.WithContext(apirequest.WithUser(r.Context(), &user.DefaultInfo{
|
r = r.WithContext(apirequest.WithUser(r.Context(), &user.DefaultInfo{
|
||||||
Groups: []string{user.AllUnauthenticated},
|
Groups: []string{user.AllUnauthenticated},
|
||||||
}))
|
}))
|
||||||
func() {
|
apfHandler.ServeHTTP(w, r)
|
||||||
// the defer ensures that the following assertion is
|
postExecute()
|
||||||
// executed, even if the APF handler panics
|
if want, got := int32(0), atomic.LoadInt32(&atomicReadOnlyExecuting); want != got {
|
||||||
// TODO: all test(s) using this filter must run serially to each other
|
t.Errorf("Wanted %d requests executing, got %d", want, got)
|
||||||
defer func() {
|
}
|
||||||
t.Logf("the APF handler has finished, checking atomicReadOnlyExecuting")
|
|
||||||
if want, got := int32(0), atomic.LoadInt32(&atomicReadOnlyExecuting); want != got {
|
|
||||||
t.Errorf("Wanted %d requests executing, got %d", want, got)
|
|
||||||
}
|
|
||||||
}()
|
|
||||||
apfHandler.ServeHTTP(w, r)
|
|
||||||
postExecute()
|
|
||||||
}()
|
|
||||||
}), requestInfoFactory)
|
}), requestInfoFactory)
|
||||||
|
|
||||||
return handler
|
return handler
|
||||||
@ -355,21 +346,19 @@ func TestApfCancelWaitRequest(t *testing.T) {
|
|||||||
}
|
}
|
||||||
|
|
||||||
type fakeWatchApfFilter struct {
|
type fakeWatchApfFilter struct {
|
||||||
t *testing.T
|
|
||||||
lock sync.Mutex
|
lock sync.Mutex
|
||||||
inflight int
|
inflight int
|
||||||
capacity int
|
capacity int
|
||||||
|
|
||||||
postExecutePanic error
|
postExecutePanic bool
|
||||||
preExecutePanic error
|
preExecutePanic bool
|
||||||
|
|
||||||
utilflowcontrol.WatchTracker
|
utilflowcontrol.WatchTracker
|
||||||
utilflowcontrol.MaxSeatsTracker
|
utilflowcontrol.MaxSeatsTracker
|
||||||
}
|
}
|
||||||
|
|
||||||
func newFakeWatchApfFilter(t *testing.T, capacity int) *fakeWatchApfFilter {
|
func newFakeWatchApfFilter(capacity int) *fakeWatchApfFilter {
|
||||||
return &fakeWatchApfFilter{
|
return &fakeWatchApfFilter{
|
||||||
t: t,
|
|
||||||
capacity: capacity,
|
capacity: capacity,
|
||||||
WatchTracker: utilflowcontrol.NewWatchTracker(),
|
WatchTracker: utilflowcontrol.NewWatchTracker(),
|
||||||
MaxSeatsTracker: utilflowcontrol.NewMaxSeatsTracker(),
|
MaxSeatsTracker: utilflowcontrol.NewMaxSeatsTracker(),
|
||||||
@ -397,23 +386,17 @@ func (f *fakeWatchApfFilter) Handle(ctx context.Context,
|
|||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
func() {
|
if f.preExecutePanic {
|
||||||
defer func() {
|
panic("pre-exec-panic")
|
||||||
f.lock.Lock()
|
}
|
||||||
defer f.lock.Unlock()
|
execFn()
|
||||||
f.inflight--
|
if f.postExecutePanic {
|
||||||
}()
|
panic("post-exec-panic")
|
||||||
|
}
|
||||||
|
|
||||||
if f.preExecutePanic != nil {
|
f.lock.Lock()
|
||||||
f.t.Logf("going to panic (pre-exec) as expected with error: %v, fakeWatchApfFilter: %#v", f.preExecutePanic, f)
|
defer f.lock.Unlock()
|
||||||
panic(f.preExecutePanic)
|
f.inflight--
|
||||||
}
|
|
||||||
execFn()
|
|
||||||
if f.postExecutePanic != nil {
|
|
||||||
f.t.Logf("going to panic (post-exec) as expected with error: %v, fakeWatchApfFilter: %#v", f.postExecutePanic, f)
|
|
||||||
panic(f.postExecutePanic)
|
|
||||||
}
|
|
||||||
}()
|
|
||||||
}
|
}
|
||||||
|
|
||||||
func (f *fakeWatchApfFilter) Run(stopCh <-chan struct{}) error {
|
func (f *fakeWatchApfFilter) Run(stopCh <-chan struct{}) error {
|
||||||
@ -465,7 +448,7 @@ func TestApfExecuteWatchRequestsWithInitializationSignal(t *testing.T) {
|
|||||||
allRunning := sync.WaitGroup{}
|
allRunning := sync.WaitGroup{}
|
||||||
allRunning.Add(2 * concurrentRequests)
|
allRunning.Add(2 * concurrentRequests)
|
||||||
|
|
||||||
fakeFilter := newFakeWatchApfFilter(t, concurrentRequests)
|
fakeFilter := newFakeWatchApfFilter(concurrentRequests)
|
||||||
|
|
||||||
onExecuteFunc := func() {
|
onExecuteFunc := func() {
|
||||||
firstRunning.Done()
|
firstRunning.Done()
|
||||||
@ -511,7 +494,7 @@ func TestApfExecuteWatchRequestsWithInitializationSignal(t *testing.T) {
|
|||||||
}
|
}
|
||||||
|
|
||||||
func TestApfRejectWatchRequestsWithInitializationSignal(t *testing.T) {
|
func TestApfRejectWatchRequestsWithInitializationSignal(t *testing.T) {
|
||||||
fakeFilter := newFakeWatchApfFilter(t, 0)
|
fakeFilter := newFakeWatchApfFilter(0)
|
||||||
|
|
||||||
onExecuteFunc := func() {
|
onExecuteFunc := func() {
|
||||||
t.Errorf("Request unexepectedly executing")
|
t.Errorf("Request unexepectedly executing")
|
||||||
@ -530,7 +513,7 @@ func TestApfWatchPanic(t *testing.T) {
|
|||||||
epmetrics.Register()
|
epmetrics.Register()
|
||||||
fcmetrics.Register()
|
fcmetrics.Register()
|
||||||
|
|
||||||
fakeFilter := newFakeWatchApfFilter(t, 1)
|
fakeFilter := newFakeWatchApfFilter(1)
|
||||||
|
|
||||||
onExecuteFunc := func() {
|
onExecuteFunc := func() {
|
||||||
panic("test panic")
|
panic("test panic")
|
||||||
@ -557,11 +540,11 @@ func TestApfWatchPanic(t *testing.T) {
|
|||||||
func TestApfWatchHandlePanic(t *testing.T) {
|
func TestApfWatchHandlePanic(t *testing.T) {
|
||||||
epmetrics.Register()
|
epmetrics.Register()
|
||||||
fcmetrics.Register()
|
fcmetrics.Register()
|
||||||
preExecutePanicingFilter := newFakeWatchApfFilter(t, 1)
|
preExecutePanicingFilter := newFakeWatchApfFilter(1)
|
||||||
preExecutePanicingFilter.preExecutePanic = http.ErrAbortHandler
|
preExecutePanicingFilter.preExecutePanic = true
|
||||||
|
|
||||||
postExecutePanicingFilter := newFakeWatchApfFilter(t, 1)
|
postExecutePanicingFilter := newFakeWatchApfFilter(1)
|
||||||
postExecutePanicingFilter.postExecutePanic = http.ErrAbortHandler
|
postExecutePanicingFilter.postExecutePanic = true
|
||||||
|
|
||||||
testCases := []struct {
|
testCases := []struct {
|
||||||
name string
|
name string
|
||||||
@ -577,31 +560,18 @@ func TestApfWatchHandlePanic(t *testing.T) {
|
|||||||
},
|
},
|
||||||
}
|
}
|
||||||
|
|
||||||
|
onExecuteFunc := func() {
|
||||||
|
time.Sleep(5 * time.Second)
|
||||||
|
}
|
||||||
|
postExecuteFunc := func() {}
|
||||||
|
|
||||||
for _, test := range testCases {
|
for _, test := range testCases {
|
||||||
t.Run(test.name, func(t *testing.T) {
|
t.Run(test.name, func(t *testing.T) {
|
||||||
onExecuteFunc := func() {
|
|
||||||
time.Sleep(5 * time.Second)
|
|
||||||
|
|
||||||
// this function should not be executed if
|
|
||||||
// pre-execute panic is set
|
|
||||||
if test.filter.preExecutePanic != nil {
|
|
||||||
t.Errorf("did not expect the execute function to be executed")
|
|
||||||
}
|
|
||||||
t.Logf("on-execute function invoked")
|
|
||||||
}
|
|
||||||
|
|
||||||
// we either panic before the execute function, or after,
|
|
||||||
// so the following function should never be executed.
|
|
||||||
postExecuteFunc := func() {
|
|
||||||
t.Errorf("did not expect the post-execute function to be invoked")
|
|
||||||
}
|
|
||||||
|
|
||||||
apfHandler := newApfHandlerWithFilter(t, test.filter, time.Minute/4, onExecuteFunc, postExecuteFunc)
|
apfHandler := newApfHandlerWithFilter(t, test.filter, time.Minute/4, onExecuteFunc, postExecuteFunc)
|
||||||
handler := func(w http.ResponseWriter, r *http.Request) {
|
handler := func(w http.ResponseWriter, r *http.Request) {
|
||||||
defer func() {
|
defer func() {
|
||||||
recovered := recover()
|
if err := recover(); err == nil {
|
||||||
if err, ok := recovered.(error); !ok || !errors.Is(err, http.ErrAbortHandler) {
|
t.Errorf("expected panic, got %v", err)
|
||||||
t.Errorf("expected panic with error: %v, but got: %v", http.ErrAbortHandler, err)
|
|
||||||
}
|
}
|
||||||
}()
|
}()
|
||||||
apfHandler.ServeHTTP(w, r)
|
apfHandler.ServeHTTP(w, r)
|
||||||
|
Loading…
Reference in New Issue
Block a user