Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

cleanup: replace dial with newclient #7967

Merged
merged 71 commits into from
Feb 28, 2025
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
71 commits
Select commit Hold shift + click to select a range
7ddbe46
replace dial with newclient
janardhankrishna-sai Dec 23, 2024
71dacb1
replace dial with newclient
janardhankrishna-sai Dec 25, 2024
88c3f0f
updating error msg and replacing dial with newclient
janardhankrishna-sai Dec 26, 2024
ceb1204
updating error mdg
janardhankrishna-sai Dec 26, 2024
6be3cf0
revert TestFederation_UnknownAuthorityInDialTarget
janardhankrishna-sai Dec 26, 2024
f6cb17c
updating fatal msg
janardhankrishna-sai Dec 27, 2024
9f02ddd
replace dial with newclient
janardhankrishna-sai Dec 30, 2024
7fa6e5e
updating error msg
janardhankrishna-sai Dec 30, 2024
0486355
Merge branch 'master' of https://github.com/janardhanvissa/grpc-go
janardhankrishna-sai Jan 1, 2025
aec4527
updating error msg
janardhankrishna-sai Jan 1, 2025
8ea1edd
updating test
janardhankrishna-sai Jan 1, 2025
c7e8c3e
updating fatal msg
janardhankrishna-sai Jan 1, 2025
baec474
updating newclient target
janardhankrishna-sai Jan 5, 2025
36deff4
updating newclient target
janardhankrishna-sai Jan 5, 2025
c58db07
updating fatal msg
janardhankrishna-sai Jan 5, 2025
973d28a
updating fatal msg
janardhankrishna-sai Jan 5, 2025
c07189f
updating fatal msg
janardhankrishna-sai Jan 5, 2025
1fc9c6b
error msg updating
janardhankrishna-sai Jan 7, 2025
d520f73
updating fatal msg
janardhankrishna-sai Jan 7, 2025
53fa9cd
Merge branch 'grpc:master' into master
janardhanvissa Jan 8, 2025
506fd98
updating newclient err msg
janardhankrishna-sai Jan 9, 2025
f1ec518
Revert "updating newclient err msg"
janardhankrishna-sai Jan 9, 2025
fd2860b
Revert "Merge branch 'master' of https://github.com/janardhanvissa/gr…
janardhankrishna-sai Jan 9, 2025
56c4730
Reapply "Merge branch 'master' of https://github.com/janardhanvissa/g…
janardhankrishna-sai Jan 9, 2025
5c6eb74
Reapply "updating newclient err msg"
janardhankrishna-sai Jan 9, 2025
bf780fe
Revert "updating newclient err msg"
janardhankrishna-sai Jan 9, 2025
74ea67a
Reapply "Merge branch 'master' of https://github.com/janardhanvissa/g…
janardhankrishna-sai Jan 9, 2025
e7e95ce
Reapply "updating newclient err msg"
janardhankrishna-sai Jan 9, 2025
e24f0a5
addressing review comments and reapply reverted changes
janardhankrishna-sai Jan 12, 2025
aa049d9
addressing review comments and reapply reverted changes
janardhankrishna-sai Jan 12, 2025
4435b8a
Merge branch 'grpc:master' into master
janardhanvissa Jan 13, 2025
6c69f73
Merge branch 'master' of https://github.com/janardhanvissa/grpc-go in…
janardhankrishna-sai Jan 13, 2025
986e4e0
adding comment
janardhankrishna-sai Jan 21, 2025
12936a7
removing explicit client connection on setupAndDial
janardhankrishna-sai Jan 21, 2025
aa1434b
updating explicit client connection
janardhankrishna-sai Jan 21, 2025
0db5faa
updating explicit client connection
janardhankrishna-sai Jan 21, 2025
dad978a
updating explicit client connection
janardhankrishna-sai Jan 21, 2025
894eee7
replace dial with newclient
janardhankrishna-sai Jan 22, 2025
8b8496e
updating fatal msg
janardhankrishna-sai Jan 22, 2025
b6f32f3
reverting test update
janardhankrishna-sai Jan 22, 2025
658b745
reverting test update
janardhankrishna-sai Jan 22, 2025
f1102b3
Revert "reverting test update"
janardhankrishna-sai Jan 23, 2025
6a83587
replace dial with newclient
janardhankrishna-sai Jan 23, 2025
81c4724
renaming test from dial to newclient
janardhankrishna-sai Jan 23, 2025
a6630a7
updating resolver state
janardhankrishna-sai Jan 23, 2025
54fc7e8
replace dial with newclient
janardhankrishna-sai Jan 24, 2025
ba3a12c
Merge branch 'replace-dial-with-newclient' of https://github.com/jana…
janardhankrishna-sai Jan 24, 2025
0c6c9e2
removing empty line
janardhankrishna-sai Jan 24, 2025
e253082
updating newclient target
janardhankrishna-sai Jan 24, 2025
e373c09
addressing review comments
janardhankrishna-sai Feb 13, 2025
0e30408
reverting merge conflict file
janardhankrishna-sai Feb 13, 2025
7951441
explicit cc.Connect() call
janardhankrishna-sai Feb 13, 2025
99da62a
adding dummy rpc call to force connection
janardhankrishna-sai Feb 13, 2025
782a8dc
replace dialContext with newclient
janardhankrishna-sai Feb 14, 2025
d887717
Revert "adding dummy rpc call to force connection"
janardhankrishna-sai Feb 14, 2025
f2810ff
revert TestGracefulStop changes due to conflict
janardhankrishna-sai Feb 14, 2025
24a9eae
addressing review comments
janardhankrishna-sai Feb 15, 2025
56a387c
replace dialcontext with newclient
janardhankrishna-sai Feb 17, 2025
05be920
Merge branch 'master' into replace-dial-with-newclient
janardhanvissa Feb 17, 2025
fdf8a11
Update comments
janardhanvissa Feb 17, 2025
80d499f
Update comment
janardhanvissa Feb 17, 2025
2358d64
addressing review comments
janardhankrishna-sai Feb 18, 2025
57fe1bc
revert fatal msg
janardhankrishna-sai Feb 20, 2025
9dc0cfd
updating error msg and moving cc.Connect() inside helper func
janardhankrishna-sai Feb 20, 2025
7837056
removing explicit cc.Connect() call
janardhankrishna-sai Feb 21, 2025
5662c89
addressing review comments
janardhankrishna-sai Feb 25, 2025
6c41a7e
updating fatal msg
janardhankrishna-sai Feb 25, 2025
e813c71
updating fatal msg
janardhankrishna-sai Feb 25, 2025
093e7e4
updating error msg from NewClient() to grpc.NewClient()
janardhankrishna-sai Feb 27, 2025
cfcb91f
updating error msg from NewClient() to grpc.NewClient()
janardhankrishna-sai Feb 27, 2025
b55f656
updating error msg
janardhankrishna-sai Feb 27, 2025
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
5 changes: 3 additions & 2 deletions balancer_wrapper_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -70,10 +70,11 @@ func (s) TestBalancer_StateListenerBeforeConnect(t *testing.T) {
stub.Register(t.Name(), bf)
svcCfg := fmt.Sprintf(`{ "loadBalancingConfig": [{%q: {}}] }`, t.Name())

cc, err := Dial("fake", WithTransportCredentials(insecure.NewCredentials()), WithDefaultServiceConfig(svcCfg))
cc, err := NewClient("passthrough:///test.server", WithTransportCredentials(insecure.NewCredentials()), WithDefaultServiceConfig(svcCfg))
if err != nil {
t.Fatal("Error dialing:", err)
t.Fatalf("grpc.NewClient() failed: %v", err)
}
cc.Connect()
started.Fire()

// Wait for the LB policy to call NewSubConn and cc.Close.
Expand Down
135 changes: 71 additions & 64 deletions clientconn_test.go

Large diffs are not rendered by default.

2 changes: 1 addition & 1 deletion examples/features/customloadbalancer/client/main.go
Original file line number Diff line number Diff line change
Expand Up @@ -61,7 +61,7 @@ func main() {

cc, err := grpc.NewClient(mr.Scheme()+":///", grpc.WithResolvers(mr), grpc.WithTransportCredentials(insecure.NewCredentials()))
if err != nil {
log.Fatalf("Failed to dial: %v", err)
log.Fatalf("grpc.NewClient() failed: %v", err)
}
defer cc.Close()
ctx, cancel := context.WithTimeout(context.Background(), time.Second*10)
Expand Down
5 changes: 3 additions & 2 deletions resolver_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -120,13 +120,14 @@ func (s) TestResolverAddressesToEndpoints(t *testing.T) {
a2 := attributes.New("a", "b")
r.InitialState(resolver.State{Addresses: []resolver.Address{{Addr: "addr1", BalancerAttributes: a1}, {Addr: "addr2", BalancerAttributes: a2}}})

cc, err := Dial(r.Scheme()+":///",
cc, err := NewClient(r.Scheme()+":///",
WithTransportCredentials(insecure.NewCredentials()),
WithResolvers(r),
WithDefaultServiceConfig(fmt.Sprintf(`{"loadBalancingConfig": [{"%s":{}}]}`, balancerName)))
if err != nil {
t.Fatalf("Unexpected error dialing: %v", err)
t.Fatalf("grpc.NewClient() failed: %v", err)
}
cc.Connect()
defer cc.Close()

select {
Expand Down
18 changes: 9 additions & 9 deletions test/clientconn_state_transition_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -236,7 +236,7 @@ func (s) TestStateTransitions_ReadyToConnecting(t *testing.T) {
conn.Close()
}()

client, err := grpc.Dial(lis.Addr().String(),
client, err := grpc.NewClient(lis.Addr().String(),
grpc.WithTransportCredentials(insecure.NewCredentials()),
grpc.WithDefaultServiceConfig(fmt.Sprintf(`{"loadBalancingConfig": [{"%s":{}}]}`, stateRecordingBalancerName)))
if err != nil {
Expand All @@ -247,7 +247,7 @@ func (s) TestStateTransitions_ReadyToConnecting(t *testing.T) {
ctx, cancel := context.WithTimeout(context.Background(), defaultTestTimeout)
defer cancel()
go testutils.StayConnected(ctx, client)

testutils.AwaitNotState(ctx, t, client, connectivity.Idle)
stateNotifications := testBalancerBuilder.nextStateNotifier()

want := []connectivity.State{
Expand Down Expand Up @@ -324,7 +324,7 @@ func (s) TestStateTransitions_TriesAllAddrsBeforeTransientFailure(t *testing.T)
{Addr: lis1.Addr().String()},
{Addr: lis2.Addr().String()},
}})
client, err := grpc.Dial("whatever:///this-gets-overwritten",
client, err := grpc.NewClient("whatever:///this-gets-overwritten",
grpc.WithTransportCredentials(insecure.NewCredentials()),
grpc.WithDefaultServiceConfig(fmt.Sprintf(`{"loadBalancingConfig": [{"%s":{}}]}`, stateRecordingBalancerName)),
grpc.WithConnectParams(grpc.ConnectParams{
Expand All @@ -339,7 +339,7 @@ func (s) TestStateTransitions_TriesAllAddrsBeforeTransientFailure(t *testing.T)
t.Fatal(err)
}
defer client.Close()

client.Connect()
stateNotifications := testBalancerBuilder.nextStateNotifier()
want := []connectivity.State{
connectivity.Connecting,
Expand Down Expand Up @@ -427,15 +427,15 @@ func (s) TestStateTransitions_MultipleAddrsEntersReady(t *testing.T) {
{Addr: lis1.Addr().String()},
{Addr: lis2.Addr().String()},
}})
client, err := grpc.Dial("whatever:///this-gets-overwritten",
client, err := grpc.NewClient("whatever:///this-gets-overwritten",
grpc.WithTransportCredentials(insecure.NewCredentials()),
grpc.WithDefaultServiceConfig(fmt.Sprintf(`{"loadBalancingConfig": [{"%s":{}}]}`, stateRecordingBalancerName)),
grpc.WithResolvers(rb))
if err != nil {
t.Fatal(err)
}
defer client.Close()

client.Connect()
ctx, cancel := context.WithTimeout(context.Background(), defaultTestTimeout)
defer cancel()
go testutils.StayConnected(ctx, client)
Expand Down Expand Up @@ -571,15 +571,15 @@ func (s) TestConnectivityStateSubscriber(t *testing.T) {
// Create the ClientConn.
const testResName = "any"
rb := manual.NewBuilderWithScheme(testResName)
cc, err := grpc.Dial(testResName+":///",
cc, err := grpc.NewClient(testResName+":///",
grpc.WithResolvers(rb),
grpc.WithDefaultServiceConfig(fmt.Sprintf(`{"loadBalancingConfig": [{"%s":{}}]}`, testBalName)),
grpc.WithTransportCredentials(insecure.NewCredentials()),
)
if err != nil {
t.Fatalf("Unexpected error from grpc.Dial: %v", err)
t.Fatalf("grpc.NewClient() failed: %v", err)
}

cc.Connect()
// Subscribe to state updates. Use a buffer size of 1 to allow the
// Shutdown state to go into the channel when Close()ing.
connCh := make(chan connectivity.State, 1)
Expand Down
11 changes: 4 additions & 7 deletions test/goaway_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -591,17 +591,14 @@ func (s) TestGoAwayThenClose(t *testing.T) {
{Addr: lis1.Addr().String()},
{Addr: lis2.Addr().String()},
}})
cc, err := grpc.DialContext(ctx, r.Scheme()+":///", grpc.WithResolvers(r), grpc.WithTransportCredentials(insecure.NewCredentials()))
cc, err := grpc.NewClient(r.Scheme()+":///", grpc.WithResolvers(r), grpc.WithTransportCredentials(insecure.NewCredentials()))
if err != nil {
t.Fatalf("Error creating client: %v", err)
}
defer cc.Close()

client := testgrpc.NewTestServiceClient(cc)

t.Log("Waiting for the ClientConn to enter READY state.")
testutils.AwaitState(ctx, t, cc, connectivity.Ready)

// We make a streaming RPC and do an one-message-round-trip to make sure
// it's created on connection 1.
//
Expand Down Expand Up @@ -674,12 +671,12 @@ func (s) TestGoAwayStreamIDSmallerThanCreatedStreams(t *testing.T) {
ctCh.Send(ct)
}()

cc, err := grpc.Dial(lis.Addr().String(), grpc.WithTransportCredentials(insecure.NewCredentials()))
cc, err := grpc.NewClient(lis.Addr().String(), grpc.WithTransportCredentials(insecure.NewCredentials()))
if err != nil {
t.Fatalf("error dialing: %v", err)
t.Fatalf("grpc.NewClient(%q) = %v", lis.Addr().String(), err)
}
defer cc.Close()

cc.Connect()
ctx, cancel := context.WithTimeout(context.Background(), defaultTestTimeout)
defer cancel()

Expand Down
10 changes: 4 additions & 6 deletions test/gracefulstop_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -138,21 +138,19 @@ func (s) TestGracefulStop(t *testing.T) {

<-dlis.closeCalled // Block until GracefulStop calls dlis.Close()

// Dial the server. This will cause a connection to be accepted. This will
// also unblock the Close method .
ctx, dialCancel := context.WithTimeout(context.Background(), defaultTestTimeout)
defer dialCancel()
dialer := func(ctx context.Context, _ string) (net.Conn, error) { return dlis.Dial(ctx) }
cc, err := grpc.DialContext(ctx, "", grpc.WithTransportCredentials(insecure.NewCredentials()), grpc.WithContextDialer(dialer))
cc, err := grpc.NewClient("passthrough:///", grpc.WithTransportCredentials(insecure.NewCredentials()), grpc.WithContextDialer(dialer))
if err != nil {
t.Fatalf("grpc.DialContext(_, %q, _) = %v", lis.Addr().String(), err)
t.Fatalf("grpc.NewClient(%q) = %v", lis.Addr().String(), err)
}
client := testgrpc.NewTestServiceClient(cc)
defer cc.Close()

// 4. Make an RPC.
// The server would send a GOAWAY first, but we are delaying the server's
// writes for now until the client writes more than the preface.
// This will cause a connection to be accepted. This will
// also unblock the Close method.
ctx, cancel := context.WithTimeout(context.Background(), defaultTestTimeout)
if _, err = client.FullDuplexCall(ctx); err == nil || status.Code(err) != codes.Unavailable {
t.Fatalf("FullDuplexCall= _, %v; want _, <status code Unavailable>", err)
Expand Down
2 changes: 1 addition & 1 deletion test/retry_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -635,7 +635,7 @@ func (s) TestRetryStats(t *testing.T) {
}
}]}`)))
if err != nil {
t.Fatalf("failed to dial due to err: %v", err)
t.Fatalf("grpc.NewClient(%q) = %v", lis.Addr().String(), err)
}
defer cc.Close()

Expand Down
8 changes: 4 additions & 4 deletions test/xds/xds_client_federation_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -138,7 +138,7 @@ func (s) TestClientSideFederation(t *testing.T) {
// Create a ClientConn and make a successful RPC.
cc, err := grpc.NewClient(fmt.Sprintf("xds:///%s", serviceName), grpc.WithTransportCredentials(insecure.NewCredentials()), grpc.WithResolvers(resolver))
if err != nil {
t.Fatalf("failed to dial local test server: %v", err)
t.Fatalf("grpc.NewClient() failed: %v", err)
}
defer cc.Close()

Expand Down Expand Up @@ -234,7 +234,7 @@ func (s) TestClientSideFederationWithOnlyXDSTPStyleLDS(t *testing.T) {
// Create a ClientConn and make a successful RPC.
cc, err := grpc.NewClient(fmt.Sprintf("xds:///%s", serviceName), grpc.WithTransportCredentials(insecure.NewCredentials()), grpc.WithResolvers(resolver))
if err != nil {
t.Fatalf("failed to dial local test server: %v", err)
t.Fatalf("grpc.NewClient() failed: %v", err)
}
defer cc.Close()

Expand Down Expand Up @@ -278,7 +278,7 @@ func (s) TestFederation_UnknownAuthorityInDialTarget(t *testing.T) {
target := fmt.Sprintf("xds:///%s", serviceName)
cc, err := grpc.NewClient(target, grpc.WithTransportCredentials(insecure.NewCredentials()), grpc.WithResolvers(xdsResolver))
if err != nil {
t.Fatalf("Dialing target %q: %v", target, err)
t.Fatalf("grpc.NewClient() failed %q: %v", target, err)
}
defer cc.Close()
t.Log("Created ClientConn to test service")
Expand Down Expand Up @@ -327,7 +327,7 @@ func (s) TestFederation_UnknownAuthorityInReceivedResponse(t *testing.T) {
target := fmt.Sprintf("xds:///%s", serviceName)
cc, err := grpc.NewClient(target, grpc.WithTransportCredentials(insecure.NewCredentials()), grpc.WithResolvers(xdsResolver))
if err != nil {
t.Fatalf("Dialing target %q: %v", target, err)
t.Fatalf("grpc.NewClient() failed %q: %v", target, err)
}
defer cc.Close()
t.Log("Created ClientConn to test service")
Expand Down
6 changes: 3 additions & 3 deletions test/xds/xds_security_config_nack_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -191,9 +191,9 @@ func (s) TestUnmarshalListener_WithUpdateValidatorFunc(t *testing.T) {
}

// Create a ClientConn with the xds scheme and make an RPC.
cc, err := grpc.DialContext(ctx, fmt.Sprintf("xds:///%s", serviceName), grpc.WithTransportCredentials(creds), grpc.WithResolvers(xdsResolver))
cc, err := grpc.NewClient(fmt.Sprintf("xds:///%s", serviceName), grpc.WithTransportCredentials(creds), grpc.WithResolvers(xdsResolver))
if err != nil {
t.Fatalf("failed to dial local test server: %v", err)
t.Fatalf("grpc.NewClient() failed: %v", err)
}
defer cc.Close()

Expand Down Expand Up @@ -359,7 +359,7 @@ func (s) TestUnmarshalCluster_WithUpdateValidatorFunc(t *testing.T) {

cc, err := grpc.NewClient(fmt.Sprintf("xds:///%s", serviceName), grpc.WithTransportCredentials(insecure.NewCredentials()), grpc.WithResolvers(xdsResolver))
if err != nil {
t.Fatalf("failed to dial local test server: %v", err)
t.Fatalf("grpc.NewClient() failed: %v", err)
}
defer cc.Close()

Expand Down
12 changes: 6 additions & 6 deletions test/xds/xds_server_rbac_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -245,9 +245,9 @@ func (s) TestServerSideXDS_RouteConfiguration(t *testing.T) {
t.Fatal(err)
}

cc, err := grpc.DialContext(ctx, fmt.Sprintf("xds:///%s", serviceName), grpc.WithTransportCredentials(insecure.NewCredentials()), grpc.WithResolvers(xdsResolver))
cc, err := grpc.NewClient(fmt.Sprintf("xds:///%s", serviceName), grpc.WithTransportCredentials(insecure.NewCredentials()), grpc.WithResolvers(xdsResolver))
if err != nil {
t.Fatalf("failed to dial local test server: %v", err)
t.Fatalf("grpc.NewClient() failed: %v", err)
}
defer cc.Close()

Expand Down Expand Up @@ -678,9 +678,9 @@ func (s) TestRBACHTTPFilter(t *testing.T) {
t.Fatal(err)
}

cc, err := grpc.DialContext(ctx, fmt.Sprintf("xds:///%s", serviceName), grpc.WithTransportCredentials(insecure.NewCredentials()), grpc.WithResolvers(xdsResolver))
cc, err := grpc.NewClient(fmt.Sprintf("xds:///%s", serviceName), grpc.WithTransportCredentials(insecure.NewCredentials()), grpc.WithResolvers(xdsResolver))
if err != nil {
t.Fatalf("failed to dial local test server: %v", err)
t.Fatalf("grpc.NewClient() failed: %v", err)
}
defer cc.Close()

Expand Down Expand Up @@ -860,9 +860,9 @@ func (s) TestRBACToggledOn_WithBadRouteConfiguration(t *testing.T) {
t.Fatal(err)
}

cc, err := grpc.DialContext(ctx, fmt.Sprintf("xds:///%s", serviceName), grpc.WithTransportCredentials(insecure.NewCredentials()), grpc.WithResolvers(xdsResolver))
cc, err := grpc.NewClient(fmt.Sprintf("xds:///%s", serviceName), grpc.WithTransportCredentials(insecure.NewCredentials()), grpc.WithResolvers(xdsResolver))
if err != nil {
t.Fatalf("failed to dial local test server: %v", err)
t.Fatalf("grpc.NewClient() failed: %v", err)
}
defer cc.Close()

Expand Down
20 changes: 12 additions & 8 deletions test/xds/xds_server_serving_mode_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -26,6 +26,7 @@ import (
"time"

"google.golang.org/grpc"
"google.golang.org/grpc/codes"
"google.golang.org/grpc/connectivity"
"google.golang.org/grpc/credentials"
"google.golang.org/grpc/credentials/insecure"
Expand All @@ -34,6 +35,7 @@ import (
"google.golang.org/grpc/internal/testutils"
"google.golang.org/grpc/internal/testutils/xds/e2e"
"google.golang.org/grpc/internal/testutils/xds/e2e/setup"
"google.golang.org/grpc/status"
"google.golang.org/grpc/xds"

v3listenerpb "github.com/envoyproxy/go-control-plane/envoy/config/listener/v3"
Expand Down Expand Up @@ -247,15 +249,15 @@ func (s) TestServerSideXDS_ServingModeChanges(t *testing.T) {
// Create a ClientConn to the first listener and make a successful RPCs.
cc1, err := grpc.NewClient(lis1.Addr().String(), grpc.WithTransportCredentials(insecure.NewCredentials()))
if err != nil {
t.Fatalf("failed to dial local test server: %v", err)
t.Fatalf("grpc.NewClient() failed: %v", err)
}
defer cc1.Close()
waitForSuccessfulRPC(ctx, t, cc1)

// Create a ClientConn to the second listener and make a successful RPCs.
cc2, err := grpc.NewClient(lis2.Addr().String(), grpc.WithTransportCredentials(insecure.NewCredentials()))
if err != nil {
t.Fatalf("failed to dial local test server: %v", err)
t.Fatalf("grpc.NewClient() failed: %v", err)
}
defer cc2.Close()
waitForSuccessfulRPC(ctx, t, cc2)
Expand Down Expand Up @@ -309,12 +311,14 @@ func (s) TestServerSideXDS_ServingModeChanges(t *testing.T) {
waitForFailedRPC(ctx, t, cc1)
waitForFailedRPC(ctx, t, cc2)

// Make sure new connection attempts to "not-serving" servers fail. We use a
// short timeout since we expect this to fail.
sCtx, sCancel := context.WithTimeout(ctx, defaultTestShortTimeout)
defer sCancel()
if _, err := grpc.DialContext(sCtx, lis1.Addr().String(), grpc.WithBlock(), grpc.WithTransportCredentials(insecure.NewCredentials())); err == nil {
t.Fatal("successfully created clientConn to a server in \"not-serving\" state")
// Make sure new connection attempts to "not-serving" servers fail.
if cc1, err = grpc.NewClient(lis1.Addr().String(), grpc.WithTransportCredentials(insecure.NewCredentials())); err != nil {
t.Fatal("Failed to create clientConn to a server in \"not-serving\" state")
}
defer cc1.Close()

if _, err := testgrpc.NewTestServiceClient(cc1).FullDuplexCall(ctx); status.Code(err) != codes.Unavailable {
t.Fatalf("FullDuplexCall failed with status code: %v, want: Unavailable", status.Code(err))
}

// Update the management server with both listener resources.
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -167,10 +167,11 @@ func setupForSecurityTests(t *testing.T, bootstrapContents []byte, clientCreds,
r.InitialState(state)

// Create a ClientConn with the specified transport credentials.
cc, err := grpc.Dial(r.Scheme()+":///test.service", grpc.WithTransportCredentials(clientCreds), grpc.WithResolvers(r))
cc, err := grpc.NewClient(r.Scheme()+":///test.service", grpc.WithTransportCredentials(clientCreds), grpc.WithResolvers(r))
if err != nil {
t.Fatalf("Failed to dial local test server: %v", err)
t.Fatalf("grpc.NewClient() failed: %v", err)
}
cc.Connect()
t.Cleanup(func() { cc.Close() })

// Start a test service backend with the specified transport credentials.
Expand Down Expand Up @@ -563,7 +564,7 @@ func (s) TestSecurityConfigUpdate_BadToGood(t *testing.T) {
ctx, cancel := context.WithTimeout(context.Background(), defaultTestTimeout)
defer cancel()
if err := mgmtServer.Update(ctx, resources); err != nil {
t.Fatal(err)
t.Fatalf("Failed to update management server with initial resources: %v", err)
}

testutils.AwaitState(ctx, t, cc, connectivity.TransientFailure)
Expand All @@ -578,7 +579,7 @@ func (s) TestSecurityConfigUpdate_BadToGood(t *testing.T) {
SkipValidation: true,
}
if err := mgmtServer.Update(ctx, resources); err != nil {
t.Fatal(err)
t.Fatalf("Failed to update management server with valid resources: %v", err)
}

// Verify that a successful RPC can be made over a secure connection.
Expand Down
Loading