Skip to content

Commit 8e596d4

Browse files
fix ci issues
Signed-off-by: Denis Tingaikin <[email protected]>
1 parent d226573 commit 8e596d4

File tree

3 files changed

+25
-19
lines changed

3 files changed

+25
-19
lines changed

pkg/networkservice/chains/nsmgr/single_test.go

Lines changed: 16 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,7 @@
11
// Copyright (c) 2020-2022 Doc.ai and/or its affiliates.
22
//
3+
// Copyright (c) 2023 Cisco and/or its affiliates.
4+
//
35
// SPDX-License-Identifier: Apache-2.0
46
//
57
// Licensed under the Apache License, Version 2.0 (the "License");
@@ -52,7 +54,6 @@ import (
5254
"github.com/networkservicemesh/sdk/pkg/networkservice/utils/checks/checkrequest"
5355
"github.com/networkservicemesh/sdk/pkg/networkservice/utils/checks/checkresponse"
5456
"github.com/networkservicemesh/sdk/pkg/networkservice/utils/count"
55-
countutils "github.com/networkservicemesh/sdk/pkg/networkservice/utils/count"
5657
"github.com/networkservicemesh/sdk/pkg/networkservice/utils/inject/injecterror"
5758
"github.com/networkservicemesh/sdk/pkg/registry"
5859
registryclient "github.com/networkservicemesh/sdk/pkg/registry/chains/client"
@@ -83,10 +84,10 @@ func Test_AwareNSEs(t *testing.T) {
8384
_, ipNet, err := net.ParseCIDR("172.16.0.96/29")
8485
require.NoError(t, err)
8586

86-
const count = 3
87-
var nseRegs [count]*registryapi.NetworkServiceEndpoint
88-
var nses [count]*sandbox.EndpointEntry
89-
var requests [count]*networkservice.NetworkServiceRequest
87+
const nseCount = 3
88+
var nseRegs [nseCount]*registryapi.NetworkServiceEndpoint
89+
var nses [nseCount]*sandbox.EndpointEntry
90+
var requests [nseCount]*networkservice.NetworkServiceRequest
9091

9192
ns1 := defaultRegistryService("my-ns-1")
9293
ns2 := defaultRegistryService("my-ns-2")
@@ -97,7 +98,7 @@ func Test_AwareNSEs(t *testing.T) {
9798
nsurl2, err := url.Parse(fmt.Sprintf("kernel://%s?%s=%s", ns2.Name, "color", "red"))
9899
require.NoError(t, err)
99100

100-
nsInfo := [count]struct {
101+
nsInfo := [nseCount]struct {
101102
ns *registryapi.NetworkService
102103
labelKey string
103104
labelValue string
@@ -119,7 +120,7 @@ func Test_AwareNSEs(t *testing.T) {
119120
},
120121
}
121122

122-
for i := 0; i < count; i++ {
123+
for i := 0; i < nseCount; i++ {
123124
nseRegs[i] = &registryapi.NetworkServiceEndpoint{
124125
Name: fmt.Sprintf("nse-%s", uuid.New().String()),
125126
NetworkServiceNames: []string{nsInfo[i].ns.Name},
@@ -170,8 +171,8 @@ func Test_AwareNSEs(t *testing.T) {
170171
},
171172
))))
172173

173-
var conns [count]*networkservice.Connection
174-
for i := 0; i < count; i++ {
174+
var conns [nseCount]*networkservice.Connection
175+
for i := 0; i < nseCount; i++ {
175176
conns[i], err = nsc.Request(ctx, requests[i])
176177
require.NoError(t, err)
177178
require.Equal(t, conns[0].NetworkServiceEndpointName, nses[0].Name)
@@ -185,12 +186,12 @@ func Test_AwareNSEs(t *testing.T) {
185186
require.NotEqual(t, srcIP1[0], srcIP3[0])
186187
require.NotEqual(t, srcIP2[0], srcIP3[0])
187188

188-
for i := 0; i < count; i++ {
189+
for i := 0; i < nseCount; i++ {
189190
_, err = nsc.Close(ctx, conns[i])
190191
require.NoError(t, err)
191192
}
192193

193-
for i := 0; i < count; i++ {
194+
for i := 0; i < nseCount; i++ {
194195
_, err = nses[i].Unregister(ctx, nseRegs[i])
195196
require.NoError(t, err)
196197
}
@@ -643,7 +644,7 @@ func Test_RestartDuringRefresh(t *testing.T) {
643644
}
644645
}))
645646

646-
var client = domain.Nodes[0].NewClient(ctx, sandbox.GenerateTestToken, client.WithAdditionalFunctionality(
647+
var nsc = domain.Nodes[0].NewClient(ctx, sandbox.GenerateTestToken, client.WithAdditionalFunctionality(
647648
&countClint,
648649
checkcontext.NewClient(t, func(t *testing.T, ctx context.Context) {
649650
m.Do(func() {
@@ -657,20 +658,19 @@ func Test_RestartDuringRefresh(t *testing.T) {
657658
fwd.Restart()
658659
}
659660
})
660-
661661
}
662662
}),
663663
heal.NewClient(ctx),
664664
))
665665

666-
_, err = client.Request(ctx, &networkservice.NetworkServiceRequest{
666+
_, err = nsc.Request(ctx, &networkservice.NetworkServiceRequest{
667667
Connection: &networkservice.Connection{
668668
Id: uuid.NewString(),
669669
NetworkService: "ns",
670670
},
671671
})
672672
require.NoError(t, err)
673-
_ = <-clientFactory.Request()
673+
<-clientFactory.Request()
674674
require.Equal(t, 2, countServer.Requests())
675675
require.Never(t, func() bool { return countServer.Requests() > 2 }, time.Second/2, time.Second/20)
676676
destroyFwd.Store(true)
@@ -718,7 +718,7 @@ func Test_Timeout(t *testing.T) {
718718
nsReg, err := nsRegistryClient.Register(chainCtx, ns)
719719
require.NoError(t, err)
720720

721-
counter := new(countutils.Server)
721+
counter := new(count.Server)
722722

723723
createAuthorizedEndpoint(chainCtx, t, ns.Name, domain.Nodes[0].NSMgr.URL, counter)
724724

pkg/networkservice/common/heal/options.go

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -41,6 +41,7 @@ type options struct {
4141
// Option - option for heal.NewClient() chain element
4242
type Option func(o *options)
4343

44+
// WithoutRetry disables retry on failed refreshes
4445
func WithoutRetry() Option {
4546
return func(o *options) {
4647
o.retryOnRequestFail = false

pkg/networkservice/common/heal/retry/client.go

Lines changed: 8 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -14,6 +14,7 @@
1414
// See the License for the specific language governing permissions and
1515
// limitations under the License.
1616

17+
// Package retry provies a chain elemen that manages retries for failed requests
1718
package retry
1819

1920
import (
@@ -38,7 +39,7 @@ type retryClient struct {
3839
contextMap genericsync.Map[string, *cancelableContext]
3940
}
4041

41-
// NewClient: returns a new client that retries the request in case the previous attempt failed.
42+
// NewClient returns a new client that retries the request in case the previous attempt failed.
4243
func NewClient(ctx context.Context) networkservice.NetworkServiceClient {
4344
return &retryClient{
4445
chainCtx: ctx,
@@ -59,15 +60,19 @@ func (n *retryClient) Request(ctx context.Context, request *networkservice.Netwo
5960
}
6061
factory.Request(opts...)
6162
} else {
62-
n.contextMap.Delete(request.GetConnection().GetId())
63+
if v, ok := n.contextMap.LoadAndDelete(request.GetConnection().GetId()); ok {
64+
v.cancel()
65+
}
6366
}
6467
return resp, err
6568
}
6669

6770
func (n *retryClient) Close(ctx context.Context, conn *networkservice.Connection, opts ...grpc.CallOption) (*empty.Empty, error) {
6871
resp, err := next.Client(ctx).Close(ctx, conn, opts...)
6972
if err == nil {
70-
n.contextMap.Delete(conn.GetId())
73+
if v, ok := n.contextMap.LoadAndDelete(conn.GetId()); ok {
74+
v.cancel()
75+
}
7176
}
7277
return resp, err
7378
}

0 commit comments

Comments
 (0)