forked from envoyproxy/envoy
-
Notifications
You must be signed in to change notification settings - Fork 2
/
base_integration_test.h
603 lines (519 loc) · 27.8 KB
/
base_integration_test.h
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
#pragma once
#include <cstdint>
#include <functional>
#include <string>
#include <vector>
#include "envoy/config/endpoint/v3/endpoint_components.pb.h"
#include "envoy/server/process_context.h"
#include "envoy/service/discovery/v3/discovery.pb.h"
#include "source/common/tls/context_manager_impl.h"
#include "test/common/grpc/grpc_client_integration.h"
#include "test/config/utility.h"
#include "test/integration/autonomous_upstream.h"
#include "test/integration/fake_upstream.h"
#include "test/integration/integration_tcp_client.h"
#include "test/integration/server.h"
#include "test/integration/utility.h"
#include "test/mocks/buffer/mocks.h"
#include "test/mocks/server/transport_socket_factory_context.h"
#include "test/test_common/environment.h"
#include "test/test_common/test_time.h"
#include "test/test_common/utility.h"
#include "absl/strings/str_format.h"
#include "absl/types/optional.h"
#if defined(ENVOY_CONFIG_COVERAGE)
#define DISABLE_UNDER_COVERAGE return
#else
#define DISABLE_UNDER_COVERAGE \
do { \
} while (0)
#endif
#ifndef ENVOY_ADMIN_FUNCTIONALITY
#define DISABLE_IF_ADMIN_DISABLED return
#else
#define DISABLE_IF_ADMIN_DISABLED \
do { \
} while (0)
#endif
namespace Envoy {
struct ApiFilesystemConfig {
std::string bootstrap_path_;
std::string cds_path_;
std::string eds_path_;
std::string lds_path_;
std::string rds_path_;
};
/**
* Test fixture for all integration tests.
*/
class BaseIntegrationTest : protected Logger::Loggable<Logger::Id::testing> {
public:
using InstanceConstSharedPtrFn = std::function<Network::Address::InstanceConstSharedPtr(int)>;
static const InstanceConstSharedPtrFn defaultAddressFunction(Network::Address::IpVersion version);
BaseIntegrationTest(const InstanceConstSharedPtrFn& upstream_address_fn,
Network::Address::IpVersion version,
const envoy::config::bootstrap::v3::Bootstrap& bootstrap);
// Creates a test fixture with an upstream bound to INADDR_ANY on an unspecified port using the
// provided IP |version|.
BaseIntegrationTest(Network::Address::IpVersion version,
const std::string& config = ConfigHelper::httpProxyConfig());
// Creates a test fixture with a specified |upstream_address| function that provides the IP and
// port to use.
BaseIntegrationTest(const InstanceConstSharedPtrFn& upstream_address_fn,
Network::Address::IpVersion version,
const std::string& config = ConfigHelper::httpProxyConfig());
virtual ~BaseIntegrationTest() = default;
// Initialize the basic proto configuration, create fake upstreams, and start Envoy.
virtual void initialize();
// Set up the fake upstream connections. This is called by initialize() and
// is virtual to allow subclass overrides.
virtual void createUpstreams();
// Create a single upstream, based on the supplied config.
void createUpstream(Network::Address::InstanceConstSharedPtr endpoint,
FakeUpstreamConfig& config);
// Finalize the config and spin up an Envoy instance.
virtual void createEnvoy();
// Sets upstream_protocol_ and alters the upstream protocol in the config_helper_
void setUpstreamProtocol(Http::CodecType protocol);
// Sets fake_upstreams_count_
void setUpstreamCount(uint32_t count) { fake_upstreams_count_ = count; }
// Skip validation that ensures that all upstream ports are referenced by the
// configuration generated in ConfigHelper::finalize.
void skipPortUsageValidation() { config_helper_.skipPortUsageValidation(); }
// Make test more deterministic by using a fixed RNG value.
void setDeterministicValue(uint64_t value = 0) { deterministic_value_ = value; }
// Get socket option for a specific listener's socket.
bool getSocketOption(const std::string& listener_name, int level, int optname, void* optval,
socklen_t* optlen, int address_index = 0);
Http::CodecType upstreamProtocol() const { return upstream_config_.upstream_protocol_; }
absl::optional<uint64_t> waitForNextRawUpstreamConnection(
const std::vector<uint64_t>& upstream_indices, FakeRawConnectionPtr& fake_upstream_connection,
std::chrono::milliseconds connection_wait_timeout = TestUtility::DefaultTimeout);
IntegrationTcpClientPtr
makeTcpConnection(uint32_t port,
const Network::ConnectionSocket::OptionsSharedPtr& options = nullptr,
Network::Address::InstanceConstSharedPtr source_address =
Network::Address::InstanceConstSharedPtr(),
absl::string_view destination_address = "");
// Test-wide port map.
void registerPort(const std::string& key, uint32_t port);
uint32_t lookupPort(const std::string& key);
// Set the endpoint's socket address to point at upstream at given index.
void setUpstreamAddress(uint32_t upstream_index,
envoy::config::endpoint::v3::LbEndpoint& endpoint) const;
Network::ClientConnectionPtr makeClientConnection(uint32_t port);
virtual Network::ClientConnectionPtr
makeClientConnectionWithOptions(uint32_t port,
const Network::ConnectionSocket::OptionsSharedPtr& options);
void registerTestServerPorts(const std::vector<std::string>& port_names) {
registerTestServerPorts(port_names, test_server_);
}
void registerTestServerPorts(const std::vector<std::string>& port_names,
IntegrationTestServerPtr& test_server);
void createGeneratedApiTestServer(const std::string& bootstrap_path,
const std::vector<std::string>& port_names,
Server::FieldValidationConfig validator_config,
bool allow_lds_rejection);
void createApiTestServer(const ApiFilesystemConfig& api_filesystem_config,
const std::vector<std::string>& port_names,
Server::FieldValidationConfig validator_config,
bool allow_lds_rejection);
void createGeneratedApiTestServer(const std::string& bootstrap_path,
const std::vector<std::string>& port_names,
Server::FieldValidationConfig validator_config,
bool allow_lds_rejection,
IntegrationTestServerPtr& test_server);
Event::TestTimeSystem& timeSystem() { return time_system_; }
Stats::IsolatedStoreImpl stats_store_;
Stats::Scope& stats_scope_{*stats_store_.rootScope()};
Api::ApiPtr api_;
Api::ApiPtr api_for_server_stat_store_;
MockBufferFactory* mock_buffer_factory_; // Will point to the dispatcher's factory.
// Enable the listener access log
void useListenerAccessLog(absl::string_view format = "");
// Returns all log entries after the nth access log entry, defaulting to log entry 0.
// By default will trigger an expect failure if more than one entry is returned.
// If client_connection is provided, flush pending acks to enable deferred logging.
std::string waitForAccessLog(const std::string& filename, uint32_t entry = 0,
bool allow_excess_entries = false,
Network::ClientConnection* client_connection = nullptr);
std::string listener_access_log_name_;
// Last node received on an xDS stream from the server.
envoy::config::core::v3::Node last_node_;
// Functions for testing reloadable config (xDS)
virtual void createXdsUpstream();
void createXdsConnection();
void cleanUpXdsConnection();
// See if a port can be successfully bound within the given timeout.
ABSL_MUST_USE_RESULT AssertionResult waitForPortAvailable(
uint32_t port, std::chrono::milliseconds timeout = TestUtility::DefaultTimeout);
// Helpers for setting up expectations and making the internal gears turn for xDS request/response
// sending/receiving to/from the (imaginary) xDS server. You should almost always use
// compareDiscoveryRequest() and sendDiscoveryResponse(), but the SotW/delta-specific versions are
// available if you're writing a SotW/delta-specific test.
AssertionResult compareDiscoveryRequest(
const std::string& expected_type_url, const std::string& expected_version,
const std::vector<std::string>& expected_resource_names,
const std::vector<std::string>& expected_resource_names_added,
const std::vector<std::string>& expected_resource_names_removed, bool expect_node = false,
const Protobuf::int32 expected_error_code = Grpc::Status::WellKnownGrpcStatus::Ok,
const std::string& expected_error_message = "", FakeStream* stream = nullptr,
OptRef<const absl::flat_hash_map<std::string, std::string>> initial_resource_versions =
absl::nullopt);
template <class T>
void
sendDiscoveryResponse(const std::string& type_url, const std::vector<T>& state_of_the_world,
const std::vector<T>& added_or_updated,
const std::vector<std::string>& removed, const std::string& version,
const absl::flat_hash_map<std::string, ProtobufWkt::Any>& metadata = {},
FakeStream* stream = nullptr) {
if (sotw_or_delta_ == Grpc::SotwOrDelta::Sotw ||
sotw_or_delta_ == Grpc::SotwOrDelta::UnifiedSotw) {
sendSotwDiscoveryResponse(type_url, state_of_the_world, version, stream, metadata);
} else {
sendDeltaDiscoveryResponse(type_url, added_or_updated, removed, version, stream, {},
metadata);
}
}
AssertionResult compareDeltaDiscoveryRequest(
const std::string& expected_type_url,
const std::vector<std::string>& expected_resource_subscriptions,
const std::vector<std::string>& expected_resource_unsubscriptions,
const Protobuf::int32 expected_error_code = Grpc::Status::WellKnownGrpcStatus::Ok,
const std::string& expected_error_message = "", bool expect_node = true) {
return compareDeltaDiscoveryRequest(expected_type_url, expected_resource_subscriptions,
expected_resource_unsubscriptions, xds_stream_.get(),
expected_error_code, expected_error_message, expect_node);
}
AssertionResult compareDeltaDiscoveryRequest(
const std::string& expected_type_url,
const std::vector<std::string>& expected_resource_subscriptions,
const std::vector<std::string>& expected_resource_unsubscriptions, FakeStream* stream,
const Protobuf::int32 expected_error_code = Grpc::Status::WellKnownGrpcStatus::Ok,
const std::string& expected_error_message = "", bool expect_node = true,
OptRef<const absl::flat_hash_map<std::string, std::string>> initial_resource_versions =
absl::nullopt);
AssertionResult compareSotwDiscoveryRequest(
const std::string& expected_type_url, const std::string& expected_version,
const std::vector<std::string>& expected_resource_names, bool expect_node = false,
const Protobuf::int32 expected_error_code = Grpc::Status::WellKnownGrpcStatus::Ok,
const std::string& expected_error_message = "", FakeStream* stream = nullptr);
template <class T>
void sendSotwDiscoveryResponse(const std::string& type_url, const std::vector<T>& messages,
const std::string& version, FakeStream* stream = nullptr) {
sendSotwDiscoveryResponse(type_url, messages, version, stream, {});
}
template <class T>
void
sendSotwDiscoveryResponse(const std::string& type_url, const std::vector<T>& messages,
const std::string& version, FakeStream* stream,
const absl::flat_hash_map<std::string, ProtobufWkt::Any>& metadata) {
if (stream == nullptr) {
stream = xds_stream_.get();
}
envoy::service::discovery::v3::DiscoveryResponse discovery_response;
discovery_response.set_version_info(version);
discovery_response.set_type_url(type_url);
for (const auto& message : messages) {
if (!metadata.empty()) {
envoy::service::discovery::v3::Resource resource;
resource.mutable_resource()->PackFrom(message);
resource.set_name(intResourceName(message));
resource.set_version(version);
for (const auto& kvp : metadata) {
auto* map = resource.mutable_metadata()->mutable_typed_filter_metadata();
(*map)[std::string(kvp.first)] = kvp.second;
}
discovery_response.add_resources()->PackFrom(resource);
} else {
discovery_response.add_resources()->PackFrom(message);
}
}
static int next_nonce_counter = 0;
discovery_response.set_nonce(absl::StrCat("nonce", next_nonce_counter++));
stream->sendGrpcMessage(discovery_response);
}
template <class T>
void
sendDeltaDiscoveryResponse(const std::string& type_url, const std::vector<T>& added_or_updated,
const std::vector<std::string>& removed, const std::string& version) {
sendDeltaDiscoveryResponse(type_url, added_or_updated, removed, version, xds_stream_.get(), {},
{});
}
template <class T>
void
sendDeltaDiscoveryResponse(const std::string& type_url, const std::vector<T>& added_or_updated,
const std::vector<std::string>& removed, const std::string& version,
FakeStream* stream, const std::vector<std::string>& aliases = {}) {
sendDeltaDiscoveryResponse(type_url, added_or_updated, removed, version, stream, aliases, {});
}
template <class T>
void
sendDeltaDiscoveryResponse(const std::string& type_url, const std::vector<T>& added_or_updated,
const std::vector<std::string>& removed, const std::string& version,
const absl::flat_hash_map<std::string, ProtobufWkt::Any>& metadata) {
sendDeltaDiscoveryResponse(type_url, added_or_updated, removed, version, xds_stream_, {},
metadata);
}
template <class T>
void
sendDeltaDiscoveryResponse(const std::string& type_url, const std::vector<T>& added_or_updated,
const std::vector<std::string>& removed, const std::string& version,
FakeStream* stream, const std::vector<std::string>& aliases,
const absl::flat_hash_map<std::string, ProtobufWkt::Any>& metadata) {
auto response = createDeltaDiscoveryResponse<T>(type_url, added_or_updated, removed, version,
aliases, metadata);
if (stream == nullptr) {
stream = xds_stream_.get();
}
stream->sendGrpcMessage(response);
}
// Sends a DeltaDiscoveryResponse with a given list of added resources.
// Note that the resources are expected to be of the same type, and match type_url.
void sendExplicitResourcesDeltaDiscoveryResponse(
const std::string& type_url,
const std::vector<envoy::service::discovery::v3::Resource>& added_or_updated,
const std::vector<std::string>& removed) {
xds_stream_->sendGrpcMessage(
createExplicitResourcesDeltaDiscoveryResponse(type_url, added_or_updated, removed));
}
envoy::service::discovery::v3::DeltaDiscoveryResponse
createExplicitResourcesDeltaDiscoveryResponse(
const std::string& type_url,
const std::vector<envoy::service::discovery::v3::Resource>& added_or_updated,
const std::vector<std::string>& removed);
template <class T>
envoy::service::discovery::v3::DeltaDiscoveryResponse
createDeltaDiscoveryResponse(const std::string& type_url, const std::vector<T>& added_or_updated,
const std::vector<std::string>& removed, const std::string& version,
const std::vector<std::string>& aliases,
const absl::flat_hash_map<std::string, ProtobufWkt::Any>& metadata) {
std::vector<envoy::service::discovery::v3::Resource> resources;
for (const auto& message : added_or_updated) {
envoy::service::discovery::v3::Resource resource;
resource.mutable_resource()->PackFrom(message);
resource.set_name(intResourceName(message));
resource.set_version(version);
for (const auto& alias : aliases) {
resource.add_aliases(alias);
}
for (const auto& kvp : metadata) {
auto* map = resource.mutable_metadata()->mutable_typed_filter_metadata();
(*map)[std::string(kvp.first)] = kvp.second;
}
resources.emplace_back(resource);
}
return createExplicitResourcesDeltaDiscoveryResponse(type_url, resources, removed);
}
private:
template <class T> std::string intResourceName(const T& m) {
// gcc doesn't allow inline template function to be specialized, using a constexpr if to
// workaround.
if constexpr (std::is_same_v<T, envoy::config::endpoint::v3::ClusterLoadAssignment>) {
return m.cluster_name();
} else {
return m.name();
}
}
Event::GlobalTimeSystem time_system_;
public:
Event::DispatcherPtr dispatcher_;
/**
* Open a connection to Envoy, send a series of bytes, and return the
* response. This function will continue reading response bytes until Envoy
* closes the connection (as a part of error handling) or (if configured true)
* the complete headers are read.
*
* @param port the port to connect to.
* @param raw_http the data to send.
* @param response the response data will be sent here.
* @param disconnect_after_headers_complete if the connection should be terminated once "\r\n\r\n"
* has been read.
* @param transport_socket the transport socket of the created client connection.
**/
void sendRawHttpAndWaitForResponse(int port, const char* raw_http, std::string* response,
bool disconnect_after_headers_complete = false,
Network::TransportSocketPtr transport_socket = nullptr);
/**
* Helper to create ConnectionDriver.
*
* @param port the port to connect to.
* @param initial_data the data to send.
* @param data_callback the callback on the received data.
**/
std::unique_ptr<RawConnectionDriver> createConnectionDriver(
uint32_t port, const std::string& initial_data,
std::function<void(Network::ClientConnection&, const Buffer::Instance&)>&& data_callback,
Network::TransportSocketPtr transport_socket = nullptr) {
Buffer::OwnedImpl buffer(initial_data);
return std::make_unique<RawConnectionDriver>(port, buffer, data_callback, version_,
*dispatcher_, std::move(transport_socket));
}
/**
* Helper to create ConnectionDriver.
*
* @param port the port to connect to.
* @param write_request_cb callback used to send data.
* @param data_callback the callback on the received data.
* @param transport_socket transport socket to use for the client connection
**/
std::unique_ptr<RawConnectionDriver> createConnectionDriver(
uint32_t port, RawConnectionDriver::DoWriteCallback write_request_cb,
std::function<void(Network::ClientConnection&, const Buffer::Instance&)>&& data_callback,
Network::TransportSocketPtr transport_socket = nullptr) {
return std::make_unique<RawConnectionDriver>(port, write_request_cb, data_callback, version_,
*dispatcher_, std::move(transport_socket));
}
FakeUpstreamConfig configWithType(Http::CodecType type) const {
FakeUpstreamConfig config = upstream_config_;
config.upstream_protocol_ = type;
if (type != Http::CodecType::HTTP3) {
config.udp_fake_upstream_ = absl::nullopt;
}
return config;
}
FakeUpstream& addFakeUpstream(Http::CodecType type) {
auto config = configWithType(type);
fake_upstreams_.emplace_back(std::make_unique<FakeUpstream>(0, version_, config));
return *fake_upstreams_.back();
}
// Adds a fake upstream to the integration test setup. If `autonomous_upstream` is true, then a
// AutonomousUpstream instance will be created instead of a FakeUpstream instance. If
// `autonomous_upstream` is true, then `autonomous_allow_incomplete_streams` determines whether
// an end-of-stream is required on connections between the Envoy and the fake upstream. If
// `autonomous_upstream` is false, then `autonomous_allow_incomplete_streams` is ignored.
FakeUpstream&
addFakeUpstream(Network::DownstreamTransportSocketFactoryPtr&& transport_socket_factory,
Http::CodecType type, bool autonomous_upstream,
bool autonomous_allow_incomplete_streams = false) {
auto config = configWithType(type);
if (autonomous_upstream) {
fake_upstreams_.emplace_back(
std::make_unique<AutonomousUpstream>(std::move(transport_socket_factory), 0, version_,
config, autonomous_allow_incomplete_streams));
} else {
fake_upstreams_.emplace_back(
std::make_unique<FakeUpstream>(std::move(transport_socket_factory), 0, version_, config));
}
return *fake_upstreams_.back();
}
void setDrainTime(std::chrono::seconds drain_time) { drain_time_ = drain_time; }
protected:
static std::string finalizeConfigWithPorts(ConfigHelper& helper, std::vector<uint32_t>& ports,
bool use_lds);
void setUdpFakeUpstream(absl::optional<FakeUpstreamConfig::UdpConfig> config) {
upstream_config_.udp_fake_upstream_ = config;
}
bool initialized() const { return initialized_; }
// Right now half-close is set globally, not separately for upstream and
// downstream.
void enableHalfClose(bool value) { upstream_config_.enable_half_close_ = value; }
bool enableHalfClose() { return upstream_config_.enable_half_close_; }
FakeUpstreamConfig& upstreamConfig() { return upstream_config_; }
void setMaxRequestHeadersKb(uint32_t value) { upstream_config_.max_request_headers_kb_ = value; }
void setMaxRequestHeadersCount(uint32_t value) {
upstream_config_.max_request_headers_count_ = value;
}
void setServerBufferFactory(Buffer::WatermarkFactorySharedPtr proxy_buffer_factory) {
ASSERT(!test_server_, "Proxy buffer factory must be set before test server creation");
proxy_buffer_factory_ = proxy_buffer_factory;
}
void mergeOptions(envoy::config::core::v3::Http2ProtocolOptions& options) {
upstream_config_.http2_options_.MergeFrom(options);
}
void mergeOptions(envoy::config::listener::v3::QuicProtocolOptions& options) {
upstream_config_.quic_options_.MergeFrom(options);
}
void checkForMissingTagExtractionRules();
// Sets the timeout to wait for listeners to be created before invoking
// registerTestServerPorts(), as that needs to know about the bound listener ports.
// Needs to be called before invoking createEnvoy() (invoked during initialize()).
void setListenersBoundTimeout(const std::chrono::milliseconds& duration) {
listeners_bound_timeout_ms_ = duration;
}
std::unique_ptr<Stats::Store> upstream_stats_store_;
// Make sure the test server will be torn down after any fake client.
// The test server owns the runtime, which is often accessed by client and
// fake upstream codecs and must outlast them.
IntegrationTestServerPtr test_server_;
// The IpVersion (IPv4, IPv6) to use.
Network::Address::IpVersion version_;
// IP Address to use when binding sockets on upstreams.
InstanceConstSharedPtrFn upstream_address_fn_;
// The config for envoy start-up.
ConfigHelper config_helper_;
// The ProcessObject to use when constructing the envoy server.
ProcessObjectOptRef process_object_{absl::nullopt};
// Steps that should be done before the envoy server starting.
std::function<void(IntegrationTestServer&)> on_server_ready_function_;
// Steps that should be done in parallel with the envoy server starting. E.g., xDS
// pre-init, control plane synchronization needed for server start.
std::function<void()> on_server_init_function_;
// A map of keys to port names. Generally the names are pulled from the v2 listener name
// but if a listener is created via ADS, it will be from whatever key is used with registerPort.
TestEnvironment::PortMap port_map_;
// The DrainStrategy that dictates the behaviour of
// DrainManagerImpl::drainClose().
Server::DrainStrategy drain_strategy_{Server::DrainStrategy::Gradual};
// Member variables for xDS testing.
FakeUpstream* xds_upstream_{};
FakeHttpConnectionPtr xds_connection_;
FakeStreamPtr xds_stream_;
bool create_xds_upstream_{false};
bool tls_xds_upstream_{false};
bool use_lds_{true}; // Use the integration framework's LDS set up.
bool upstream_tls_{false};
Network::DownstreamTransportSocketFactoryPtr
createUpstreamTlsContext(const FakeUpstreamConfig& upstream_config);
testing::NiceMock<ThreadLocal::MockInstance> thread_local_;
testing::NiceMock<Server::Configuration::MockTransportSocketFactoryContext> factory_context_;
testing::NiceMock<Server::Configuration::MockServerFactoryContext> server_factory_context_;
Extensions::TransportSockets::Tls::ContextManagerImpl context_manager_{server_factory_context_};
// The fake upstreams_ are created using the context_manager, so make sure
// they are destroyed before it is.
std::vector<std::unique_ptr<FakeUpstream>> fake_upstreams_;
Grpc::SotwOrDelta sotw_or_delta_{Grpc::SotwOrDelta::Sotw};
spdlog::level::level_enum default_log_level_;
// Timeout to wait for listeners to be created before invoking
// registerTestServerPorts(), as that needs to know about the bound listener ports.
// Using 2x default timeout to cover for slow TLS implementations (no inline asm) on slow
// computers (e.g., Raspberry Pi) that sometimes time out on TLS listeners, or when
// the number of listeners in a test is large.
std::chrono::milliseconds listeners_bound_timeout_ms_{2 * TestUtility::DefaultTimeout};
// Target number of upstreams.
uint32_t fake_upstreams_count_{1};
// The duration of the drain manager graceful drain period.
std::chrono::seconds drain_time_{1};
// The number of worker threads that the test server uses.
uint32_t concurrency_{1};
// If true, use AutonomousUpstream for fake upstreams.
bool autonomous_upstream_{false};
// If true, allow incomplete streams in AutonomousUpstream
// This does nothing if autonomous_upstream_ is false
bool autonomous_allow_incomplete_streams_{false};
// If this member is not empty, the test will use a fixed RNG value specified
// by it.
absl::optional<uint64_t> deterministic_value_{};
// Set true when your test will itself take care of ensuring listeners are up, and registering
// them in the port_map_.
bool defer_listener_finalization_{false};
// By default the test server will use custom stats to notify on increment.
// This override exists for tests measuring stats memory.
bool use_real_stats_{};
// If true, skip checking stats for missing tag-extraction rules.
bool skip_tag_extraction_rule_check_{true};
// By default, node metadata (node name, cluster name, locality) for the test server gets set to
// hard-coded values in the OptionsImpl ("node_name", "cluster_name", etc.). Set to true if your
// test specifies the node metadata in the Bootstrap configuration and that's what you want to use
// for node info in Envoy.
bool use_bootstrap_node_metadata_{false};
private:
// Configuration for the fake upstream.
FakeUpstreamConfig upstream_config_{time_system_};
// True if initialize() has been called.
bool initialized_{};
// Optional factory that the proxy-under-test should use to create watermark buffers. If nullptr,
// the proxy uses the default watermark buffer factory to create buffers.
Buffer::WatermarkFactorySharedPtr proxy_buffer_factory_;
};
} // namespace Envoy