Copilot commented on code in PR #746: URL: https://github.com/apache/dubbo-go-pixiu/pull/746#discussion_r2312394785
########## pkg/adapter/llmregistry/registry/registry.go: ########## @@ -0,0 +1,56 @@ +/* + * Licensed to the Apache Software Foundation (ASF) under one or more + * contributor license agreements. See the NOTICE file distributed with + * this work for additional information regarding copyright ownership. + * The ASF licenses this file to You under the Apache License, Version 2.0 + * (the "License"); you may not use this file except in compliance with + * the License. You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +package registry + +import ( + "github.com/pkg/errors" +) + +import ( + "github.com/apache/dubbo-go-pixiu/pkg/adapter/llmregistry/common" + "github.com/apache/dubbo-go-pixiu/pkg/model" +) + +// A map to store registry creation functions by protocol name. +var registryMap = make(map[string]func(model.Registry, common.RegistryEventListener) (Registry, error), 8) + +// Registry interface defines the basic features of a service registry. +type Registry interface { + // Subscribe starts monitoring the target registry for service changes. + Subscribe() error + // Unsubscribe stops monitoring the target registry. + Unsubscribe() error +} + +// SetRegistry registers a factory function for creating a new registry client. +func SetRegistry(name string, newRegFunc func(model.Registry, common.RegistryEventListener) (Registry, error)) { + registryMap[name] = newRegFunc +} + +// GetRegistry creates and returns a new registry client based on the configuration. +// It panics if the registry client cannot be initialized. +func GetRegistry(regConfig model.Registry, listener common.RegistryEventListener) (Registry, error) { + if newRegFunc, ok := registryMap[regConfig.Protocol]; ok { + reg, err := newRegFunc(regConfig, listener) + if err != nil { + panic("Initialize Registry " + regConfig.Protocol + " failed due to: " + err.Error()) Review Comment: Using panic in library code is problematic as it can crash the entire application unexpectedly. The function should return the error instead of panicking, allowing callers to handle it appropriately. ```suggestion return nil, errors.New("Initialize Registry " + regConfig.Protocol + " failed due to: " + err.Error()) ``` ########## pkg/adapter/llmregistry/registry/nacos/listener_test.go: ########## @@ -0,0 +1,270 @@ +package nacos + +import ( + "errors" + "sync" + "testing" + "time" +) + +import ( + "github.com/nacos-group/nacos-sdk-go/clients/naming_client" + nacosModel "github.com/nacos-group/nacos-sdk-go/model" + "github.com/nacos-group/nacos-sdk-go/vo" + + "github.com/stretchr/testify/assert" +) + +import ( + "github.com/apache/dubbo-go-pixiu/pkg/model" +) + +type mockNacosClient struct { + naming_client.INamingClient + + mu sync.Mutex + servicesToReturn nacosModel.ServiceList + servicesToReturnErr error + subscribeCallback func(services []nacosModel.SubscribeService, err error) + subscribedServices map[string]bool + unsubscribedServices map[string]bool +} + +func newMockNacosClient() *mockNacosClient { + return &mockNacosClient{ + subscribedServices: make(map[string]bool), + unsubscribedServices: make(map[string]bool), + } +} + +func (m *mockNacosClient) GetAllServicesInfo(param vo.GetAllServiceInfoParam) (nacosModel.ServiceList, error) { + m.mu.Lock() + defer m.mu.Unlock() + return m.servicesToReturn, m.servicesToReturnErr +} + +func (m *mockNacosClient) Subscribe(param *vo.SubscribeParam) error { + m.mu.Lock() + defer m.mu.Unlock() + m.subscribedServices[param.ServiceName] = true + m.subscribeCallback = param.SubscribeCallback + return nil +} + +func (m *mockNacosClient) Unsubscribe(param *vo.SubscribeParam) error { + m.mu.Lock() + defer m.mu.Unlock() + m.unsubscribedServices[param.ServiceName] = true + return nil +} + +type mockAdapterListener struct { + mu sync.Mutex + addedEndpoints map[string]*model.Endpoint + removedEndpoints map[string]*model.Endpoint +} + +func newMockAdapterListener() *mockAdapterListener { + return &mockAdapterListener{ + addedEndpoints: make(map[string]*model.Endpoint), + removedEndpoints: make(map[string]*model.Endpoint), + } +} + +func (m *mockAdapterListener) OnAddEndpoint(endpoint *model.Endpoint) error { + m.mu.Lock() + defer m.mu.Unlock() + m.addedEndpoints[endpoint.ID] = endpoint + return nil +} + +func (m *mockAdapterListener) OnRemoveEndpoint(endpoint *model.Endpoint) error { + m.mu.Lock() + defer m.mu.Unlock() + m.removedEndpoints[endpoint.ID] = endpoint + return nil +} + +func (m *mockAdapterListener) reset() { + m.mu.Lock() + defer m.mu.Unlock() + m.addedEndpoints = make(map[string]*model.Endpoint) + m.removedEndpoints = make(map[string]*model.Endpoint) +} + +func testSetup() (*listener, *mockNacosClient, *mockAdapterListener) { + client := newMockNacosClient() + adapterListener := newMockAdapterListener() + regConf := &model.Registry{Group: "test_group", Namespace: "test_namespace"} + nacosListener := newNacosListener(client, regConf, adapterListener) + return nacosListener, client, adapterListener +} + +func TestGenerateEndpoint(t *testing.T) { + t.Run("Full valid metadata", func(t *testing.T) { + instance := nacosModel.Instance{ + Metadata: map[string]string{ + "id": "ep-123", + "name": "my-llm", + "ip": "127.0.0.1", + "port": "8080", + "llm-meta.provider": "openai", + "llm-meta.retry_policy.name": "ExponentialBackoff", + "llm-meta.fallback": "true", + }, + } + + endpoint := generateEndpoint(instance) + assert.NotNil(t, endpoint) + assert.Equal(t, "ep-123", endpoint.ID) + assert.Equal(t, "my-llm", endpoint.Name) + assert.Equal(t, "127.0.0.1", endpoint.Address.Address) + assert.Equal(t, 8080, endpoint.Address.Port) + assert.Equal(t, "openai", endpoint.LLMMeta.Provider) + assert.Equal(t, model.RetryerExponentialBackoff, endpoint.LLMMeta.RetryPolicy.Name) + assert.True(t, endpoint.LLMMeta.Fallback) + }) + + t.Run("Nil metadata", func(t *testing.T) { + instance := nacosModel.Instance{Metadata: nil} + endpoint := generateEndpoint(instance) + assert.Nil(t, endpoint) + }) + + t.Run("Invalid port", func(t *testing.T) { + instance := nacosModel.Instance{Metadata: map[string]string{"port": "not-a-number"}} + endpoint := generateEndpoint(instance) + assert.NotNil(t, endpoint) + assert.Equal(t, 0, endpoint.Address.Port) + }) +} + +func TestDiscoverAndSubscribe(t *testing.T) { + l, client, _ := testSetup() + + t.Run("Discover and subscribe to a new service", func(t *testing.T) { + // CHANGE THIS LINE: + client.servicesToReturn = nacosModel.ServiceList{Doms: []string{"service-A"}} // Was nacosModel.Service + l.discoverAndSubscribe() + + assert.True(t, client.subscribedServices["service-A"], "Should subscribe to service-A") + _, loaded := l.subscribedServices.Load("service-A") + assert.True(t, loaded, "service-A should be in the subscribedServices map") + }) + + t.Run("Unsubscribe from a removed service", func(t *testing.T) { + // Ensure service-A is already subscribed for the test setup + l.subscribedServices.Store("service-A", true) + // CHANGE THIS LINE: + client.servicesToReturn = nacosModel.ServiceList{Doms: []string{}} // Nacos now returns an empty list + + l.discoverAndSubscribe() + + assert.True(t, client.unsubscribedServices["service-A"], "Should unsubscribe from service-A") + _, loaded := l.subscribedServices.Load("service-A") + assert.False(t, loaded, "service-A should be removed from subscribedServices map") + }) + + t.Run("Handle Nacos API error", func(t *testing.T) { + client.subscribedServices = make(map[string]bool) + l.subscribedServices.Store("stale-service", true) + + client.servicesToReturnErr = errors.New("Nacos unavailable") + l.discoverAndSubscribe() + + _, loaded := l.subscribedServices.Load("stale-service") + assert.True(t, loaded, "Should not change subscriptions on API error") + assert.Empty(t, client.subscribedServices, "Should not attempt to subscribe on API error") + }) +} + +func TestServiceCallback(t *testing.T) { + l, client, adapterListener := testSetup() + + _ = client.Subscribe(&vo.SubscribeParam{ + ServiceName: "service-A", + SubscribeCallback: l.serviceCallback, + }) + + instance1 := nacosModel.SubscribeService{ + InstanceId: "ep-1", ServiceName: "service-A", Enable: true, Healthy: true, + Metadata: map[string]string{"id": "ep-1", "name": "inst-1"}, + } + instance2 := nacosModel.SubscribeService{ + InstanceId: "ep-2", ServiceName: "service-A", Enable: true, Healthy: true, + Metadata: map[string]string{"id": "ep-2", "name": "inst-2"}, + } + + t.Run("Initial instance registration", func(t *testing.T) { + adapterListener.reset() + client.subscribeCallback([]nacosModel.SubscribeService{instance1, instance2}, nil) + + assert.Len(t, adapterListener.addedEndpoints, 2, "Should add 2 endpoints") + assert.Contains(t, adapterListener.addedEndpoints, "ep-1") + assert.Contains(t, adapterListener.addedEndpoints, "ep-2") + assert.Empty(t, adapterListener.removedEndpoints, "Should not remove any endpoints") + }) + + t.Run("One instance is removed", func(t *testing.T) { + adapterListener.reset() + client.subscribeCallback([]nacosModel.SubscribeService{instance1}, nil) + + assert.Empty(t, adapterListener.addedEndpoints, "Should not add any new endpoints") + assert.Len(t, adapterListener.removedEndpoints, 1, "Should remove 1 endpoint") + assert.Contains(t, adapterListener.removedEndpoints, "ep-2") + }) + + t.Run("One instance is updated", func(t *testing.T) { + adapterListener.reset() + updatedInstance1 := instance1 + updatedInstance1.Metadata = map[string]string{"id": "ep-1", "name": "inst-1-updated"} // 元数据变化 Review Comment: Comment contains Chinese characters. Comments should be in English for consistency with the rest of the codebase. ########## pkg/adapter/llmregistry/registry/nacos/listener_test.go: ########## @@ -0,0 +1,270 @@ +package nacos + +import ( + "errors" + "sync" + "testing" + "time" +) + +import ( + "github.com/nacos-group/nacos-sdk-go/clients/naming_client" + nacosModel "github.com/nacos-group/nacos-sdk-go/model" + "github.com/nacos-group/nacos-sdk-go/vo" + + "github.com/stretchr/testify/assert" +) + +import ( + "github.com/apache/dubbo-go-pixiu/pkg/model" +) + +type mockNacosClient struct { + naming_client.INamingClient + + mu sync.Mutex + servicesToReturn nacosModel.ServiceList + servicesToReturnErr error + subscribeCallback func(services []nacosModel.SubscribeService, err error) + subscribedServices map[string]bool + unsubscribedServices map[string]bool +} + +func newMockNacosClient() *mockNacosClient { + return &mockNacosClient{ + subscribedServices: make(map[string]bool), + unsubscribedServices: make(map[string]bool), + } +} + +func (m *mockNacosClient) GetAllServicesInfo(param vo.GetAllServiceInfoParam) (nacosModel.ServiceList, error) { + m.mu.Lock() + defer m.mu.Unlock() + return m.servicesToReturn, m.servicesToReturnErr +} + +func (m *mockNacosClient) Subscribe(param *vo.SubscribeParam) error { + m.mu.Lock() + defer m.mu.Unlock() + m.subscribedServices[param.ServiceName] = true + m.subscribeCallback = param.SubscribeCallback + return nil +} + +func (m *mockNacosClient) Unsubscribe(param *vo.SubscribeParam) error { + m.mu.Lock() + defer m.mu.Unlock() + m.unsubscribedServices[param.ServiceName] = true + return nil +} + +type mockAdapterListener struct { + mu sync.Mutex + addedEndpoints map[string]*model.Endpoint + removedEndpoints map[string]*model.Endpoint +} + +func newMockAdapterListener() *mockAdapterListener { + return &mockAdapterListener{ + addedEndpoints: make(map[string]*model.Endpoint), + removedEndpoints: make(map[string]*model.Endpoint), + } +} + +func (m *mockAdapterListener) OnAddEndpoint(endpoint *model.Endpoint) error { + m.mu.Lock() + defer m.mu.Unlock() + m.addedEndpoints[endpoint.ID] = endpoint + return nil +} + +func (m *mockAdapterListener) OnRemoveEndpoint(endpoint *model.Endpoint) error { + m.mu.Lock() + defer m.mu.Unlock() + m.removedEndpoints[endpoint.ID] = endpoint + return nil +} + +func (m *mockAdapterListener) reset() { + m.mu.Lock() + defer m.mu.Unlock() + m.addedEndpoints = make(map[string]*model.Endpoint) + m.removedEndpoints = make(map[string]*model.Endpoint) +} + +func testSetup() (*listener, *mockNacosClient, *mockAdapterListener) { + client := newMockNacosClient() + adapterListener := newMockAdapterListener() + regConf := &model.Registry{Group: "test_group", Namespace: "test_namespace"} + nacosListener := newNacosListener(client, regConf, adapterListener) + return nacosListener, client, adapterListener +} + +func TestGenerateEndpoint(t *testing.T) { + t.Run("Full valid metadata", func(t *testing.T) { + instance := nacosModel.Instance{ + Metadata: map[string]string{ + "id": "ep-123", + "name": "my-llm", + "ip": "127.0.0.1", + "port": "8080", + "llm-meta.provider": "openai", + "llm-meta.retry_policy.name": "ExponentialBackoff", + "llm-meta.fallback": "true", + }, + } + + endpoint := generateEndpoint(instance) + assert.NotNil(t, endpoint) + assert.Equal(t, "ep-123", endpoint.ID) + assert.Equal(t, "my-llm", endpoint.Name) + assert.Equal(t, "127.0.0.1", endpoint.Address.Address) + assert.Equal(t, 8080, endpoint.Address.Port) + assert.Equal(t, "openai", endpoint.LLMMeta.Provider) + assert.Equal(t, model.RetryerExponentialBackoff, endpoint.LLMMeta.RetryPolicy.Name) + assert.True(t, endpoint.LLMMeta.Fallback) + }) + + t.Run("Nil metadata", func(t *testing.T) { + instance := nacosModel.Instance{Metadata: nil} + endpoint := generateEndpoint(instance) + assert.Nil(t, endpoint) + }) + + t.Run("Invalid port", func(t *testing.T) { + instance := nacosModel.Instance{Metadata: map[string]string{"port": "not-a-number"}} + endpoint := generateEndpoint(instance) + assert.NotNil(t, endpoint) + assert.Equal(t, 0, endpoint.Address.Port) + }) +} + +func TestDiscoverAndSubscribe(t *testing.T) { + l, client, _ := testSetup() + + t.Run("Discover and subscribe to a new service", func(t *testing.T) { + // CHANGE THIS LINE: + client.servicesToReturn = nacosModel.ServiceList{Doms: []string{"service-A"}} // Was nacosModel.Service + l.discoverAndSubscribe() + + assert.True(t, client.subscribedServices["service-A"], "Should subscribe to service-A") + _, loaded := l.subscribedServices.Load("service-A") + assert.True(t, loaded, "service-A should be in the subscribedServices map") + }) + + t.Run("Unsubscribe from a removed service", func(t *testing.T) { + // Ensure service-A is already subscribed for the test setup + l.subscribedServices.Store("service-A", true) + // CHANGE THIS LINE: + client.servicesToReturn = nacosModel.ServiceList{Doms: []string{}} // Nacos now returns an empty list + + l.discoverAndSubscribe() + + assert.True(t, client.unsubscribedServices["service-A"], "Should unsubscribe from service-A") + _, loaded := l.subscribedServices.Load("service-A") + assert.False(t, loaded, "service-A should be removed from subscribedServices map") + }) + + t.Run("Handle Nacos API error", func(t *testing.T) { + client.subscribedServices = make(map[string]bool) + l.subscribedServices.Store("stale-service", true) + + client.servicesToReturnErr = errors.New("Nacos unavailable") + l.discoverAndSubscribe() + + _, loaded := l.subscribedServices.Load("stale-service") + assert.True(t, loaded, "Should not change subscriptions on API error") + assert.Empty(t, client.subscribedServices, "Should not attempt to subscribe on API error") + }) +} + +func TestServiceCallback(t *testing.T) { + l, client, adapterListener := testSetup() + + _ = client.Subscribe(&vo.SubscribeParam{ + ServiceName: "service-A", + SubscribeCallback: l.serviceCallback, + }) + + instance1 := nacosModel.SubscribeService{ + InstanceId: "ep-1", ServiceName: "service-A", Enable: true, Healthy: true, + Metadata: map[string]string{"id": "ep-1", "name": "inst-1"}, + } + instance2 := nacosModel.SubscribeService{ + InstanceId: "ep-2", ServiceName: "service-A", Enable: true, Healthy: true, + Metadata: map[string]string{"id": "ep-2", "name": "inst-2"}, + } + + t.Run("Initial instance registration", func(t *testing.T) { + adapterListener.reset() + client.subscribeCallback([]nacosModel.SubscribeService{instance1, instance2}, nil) + + assert.Len(t, adapterListener.addedEndpoints, 2, "Should add 2 endpoints") + assert.Contains(t, adapterListener.addedEndpoints, "ep-1") + assert.Contains(t, adapterListener.addedEndpoints, "ep-2") + assert.Empty(t, adapterListener.removedEndpoints, "Should not remove any endpoints") + }) + + t.Run("One instance is removed", func(t *testing.T) { + adapterListener.reset() + client.subscribeCallback([]nacosModel.SubscribeService{instance1}, nil) + + assert.Empty(t, adapterListener.addedEndpoints, "Should not add any new endpoints") + assert.Len(t, adapterListener.removedEndpoints, 1, "Should remove 1 endpoint") + assert.Contains(t, adapterListener.removedEndpoints, "ep-2") + }) + + t.Run("One instance is updated", func(t *testing.T) { + adapterListener.reset() + updatedInstance1 := instance1 + updatedInstance1.Metadata = map[string]string{"id": "ep-1", "name": "inst-1-updated"} // 元数据变化 + + client.subscribeCallback([]nacosModel.SubscribeService{updatedInstance1}, nil) + + assert.Len(t, adapterListener.addedEndpoints, 1, "Should fire an add/update event for 1 endpoint") + assert.Contains(t, adapterListener.addedEndpoints, "ep-1") + assert.Equal(t, "inst-1-updated", adapterListener.addedEndpoints["ep-1"].Name) + assert.Empty(t, adapterListener.removedEndpoints, "Should not remove any endpoints") + }) + + t.Run("Filter unhealthy or disabled instances", func(t *testing.T) { + adapterListener.reset() + unhealthyInstance := instance1 + unhealthyInstance.Healthy = false + disabledInstance := instance2 + disabledInstance.Enable = false + + client.subscribeCallback([]nacosModel.SubscribeService{unhealthyInstance, disabledInstance}, nil) + + assert.Empty(t, adapterListener.addedEndpoints, "Should not add unhealthy/disabled endpoints") + // 因为这些实例之前被认为是活跃的,现在它们消失了(被过滤掉了),所以会触发删除 + assert.Len(t, adapterListener.removedEndpoints, 1, "Should remove the previously active endpoints") + }) + + t.Run("No changes in instances", func(t *testing.T) { + // 首先,用 instance1 设置缓存 + client.subscribeCallback([]nacosModel.SubscribeService{instance1}, nil) + + adapterListener.reset() // 重置监听器状态 + + // 再次用完全相同的数据调用 + client.subscribeCallback([]nacosModel.SubscribeService{instance1}, nil) Review Comment: Comments contain Chinese characters. Comments should be in English for consistency with the rest of the codebase. ########## pkg/adapter/llmregistry/registry/base/baseregistry.go: ########## @@ -0,0 +1,117 @@ +/* + * Licensed to the Apache Software Foundation (ASF) under one or more + * contributor license agreements. See the NOTICE file distributed with + * this work for additional information regarding copyright ownership. + * The ASF licenses this file to You under the Apache License, Version 2.0 + * (the "License"); you may not use this file except in compliance with + * the License. You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +package baseregistry + +import ( + "sync" +) + +import ( + "github.com/apache/dubbo-go-pixiu/pkg/adapter/llmregistry/common" + "github.com/apache/dubbo-go-pixiu/pkg/adapter/llmregistry/registry" +) + +type FacadeRegistry interface { + // DoSubscribe subscribes the registry cluster to monitor the changes. + DoSubscribe() error + // DoUnsubscribe unsubscribes the registry cluster. + DoUnsubscribe() error +} + +type SvcListeners struct { + // listeners use url.ServiceKey as the index. + listeners map[string]registry.Listener + listenerLock sync.Mutex +} + +// GetListener returns existing listener or nil +func (s *SvcListeners) GetListener(id string) registry.Listener { + s.listenerLock.Lock() + defer s.listenerLock.Unlock() + listener, ok := s.listeners[id] + if !ok { + return nil + } + return listener +} + +// SetListener set the listener to the registry +func (s *SvcListeners) SetListener(id string, listener registry.Listener) { + s.listenerLock.Lock() + defer s.listenerLock.Unlock() + s.listeners[id] = listener +} + +// RemoveListener removes the listener of the registry +func (s *SvcListeners) RemoveListener(id string) { + s.listenerLock.Lock() + defer s.listenerLock.Unlock() + delete(s.listeners, id) +} + +func (s *SvcListeners) GetAllListener() map[string]registry.Listener { + s.listenerLock.Lock() + defer s.listenerLock.Unlock() + return s.listeners Review Comment: This method returns a direct reference to the internal map, which can lead to race conditions if callers modify the returned map concurrently. Consider returning a copy of the map instead. ```suggestion copied := make(map[string]registry.Listener, len(s.listeners)) for k, v := range s.listeners { copied[k] = v } return copied ``` ########## pkg/adapter/llmregistry/registry/nacos/listener_test.go: ########## @@ -0,0 +1,270 @@ +package nacos + +import ( + "errors" + "sync" + "testing" + "time" +) + +import ( + "github.com/nacos-group/nacos-sdk-go/clients/naming_client" + nacosModel "github.com/nacos-group/nacos-sdk-go/model" + "github.com/nacos-group/nacos-sdk-go/vo" + + "github.com/stretchr/testify/assert" +) + +import ( + "github.com/apache/dubbo-go-pixiu/pkg/model" +) + +type mockNacosClient struct { + naming_client.INamingClient + + mu sync.Mutex + servicesToReturn nacosModel.ServiceList + servicesToReturnErr error + subscribeCallback func(services []nacosModel.SubscribeService, err error) + subscribedServices map[string]bool + unsubscribedServices map[string]bool +} + +func newMockNacosClient() *mockNacosClient { + return &mockNacosClient{ + subscribedServices: make(map[string]bool), + unsubscribedServices: make(map[string]bool), + } +} + +func (m *mockNacosClient) GetAllServicesInfo(param vo.GetAllServiceInfoParam) (nacosModel.ServiceList, error) { + m.mu.Lock() + defer m.mu.Unlock() + return m.servicesToReturn, m.servicesToReturnErr +} + +func (m *mockNacosClient) Subscribe(param *vo.SubscribeParam) error { + m.mu.Lock() + defer m.mu.Unlock() + m.subscribedServices[param.ServiceName] = true + m.subscribeCallback = param.SubscribeCallback + return nil +} + +func (m *mockNacosClient) Unsubscribe(param *vo.SubscribeParam) error { + m.mu.Lock() + defer m.mu.Unlock() + m.unsubscribedServices[param.ServiceName] = true + return nil +} + +type mockAdapterListener struct { + mu sync.Mutex + addedEndpoints map[string]*model.Endpoint + removedEndpoints map[string]*model.Endpoint +} + +func newMockAdapterListener() *mockAdapterListener { + return &mockAdapterListener{ + addedEndpoints: make(map[string]*model.Endpoint), + removedEndpoints: make(map[string]*model.Endpoint), + } +} + +func (m *mockAdapterListener) OnAddEndpoint(endpoint *model.Endpoint) error { + m.mu.Lock() + defer m.mu.Unlock() + m.addedEndpoints[endpoint.ID] = endpoint + return nil +} + +func (m *mockAdapterListener) OnRemoveEndpoint(endpoint *model.Endpoint) error { + m.mu.Lock() + defer m.mu.Unlock() + m.removedEndpoints[endpoint.ID] = endpoint + return nil +} + +func (m *mockAdapterListener) reset() { + m.mu.Lock() + defer m.mu.Unlock() + m.addedEndpoints = make(map[string]*model.Endpoint) + m.removedEndpoints = make(map[string]*model.Endpoint) +} + +func testSetup() (*listener, *mockNacosClient, *mockAdapterListener) { + client := newMockNacosClient() + adapterListener := newMockAdapterListener() + regConf := &model.Registry{Group: "test_group", Namespace: "test_namespace"} + nacosListener := newNacosListener(client, regConf, adapterListener) + return nacosListener, client, adapterListener +} + +func TestGenerateEndpoint(t *testing.T) { + t.Run("Full valid metadata", func(t *testing.T) { + instance := nacosModel.Instance{ + Metadata: map[string]string{ + "id": "ep-123", + "name": "my-llm", + "ip": "127.0.0.1", + "port": "8080", + "llm-meta.provider": "openai", + "llm-meta.retry_policy.name": "ExponentialBackoff", + "llm-meta.fallback": "true", + }, + } + + endpoint := generateEndpoint(instance) + assert.NotNil(t, endpoint) + assert.Equal(t, "ep-123", endpoint.ID) + assert.Equal(t, "my-llm", endpoint.Name) + assert.Equal(t, "127.0.0.1", endpoint.Address.Address) + assert.Equal(t, 8080, endpoint.Address.Port) + assert.Equal(t, "openai", endpoint.LLMMeta.Provider) + assert.Equal(t, model.RetryerExponentialBackoff, endpoint.LLMMeta.RetryPolicy.Name) + assert.True(t, endpoint.LLMMeta.Fallback) + }) + + t.Run("Nil metadata", func(t *testing.T) { + instance := nacosModel.Instance{Metadata: nil} + endpoint := generateEndpoint(instance) + assert.Nil(t, endpoint) + }) + + t.Run("Invalid port", func(t *testing.T) { + instance := nacosModel.Instance{Metadata: map[string]string{"port": "not-a-number"}} + endpoint := generateEndpoint(instance) + assert.NotNil(t, endpoint) + assert.Equal(t, 0, endpoint.Address.Port) + }) +} + +func TestDiscoverAndSubscribe(t *testing.T) { + l, client, _ := testSetup() + + t.Run("Discover and subscribe to a new service", func(t *testing.T) { + // CHANGE THIS LINE: + client.servicesToReturn = nacosModel.ServiceList{Doms: []string{"service-A"}} // Was nacosModel.Service + l.discoverAndSubscribe() + + assert.True(t, client.subscribedServices["service-A"], "Should subscribe to service-A") + _, loaded := l.subscribedServices.Load("service-A") + assert.True(t, loaded, "service-A should be in the subscribedServices map") + }) + + t.Run("Unsubscribe from a removed service", func(t *testing.T) { + // Ensure service-A is already subscribed for the test setup + l.subscribedServices.Store("service-A", true) + // CHANGE THIS LINE: + client.servicesToReturn = nacosModel.ServiceList{Doms: []string{}} // Nacos now returns an empty list + + l.discoverAndSubscribe() + + assert.True(t, client.unsubscribedServices["service-A"], "Should unsubscribe from service-A") + _, loaded := l.subscribedServices.Load("service-A") + assert.False(t, loaded, "service-A should be removed from subscribedServices map") + }) + + t.Run("Handle Nacos API error", func(t *testing.T) { + client.subscribedServices = make(map[string]bool) + l.subscribedServices.Store("stale-service", true) + + client.servicesToReturnErr = errors.New("Nacos unavailable") + l.discoverAndSubscribe() + + _, loaded := l.subscribedServices.Load("stale-service") + assert.True(t, loaded, "Should not change subscriptions on API error") + assert.Empty(t, client.subscribedServices, "Should not attempt to subscribe on API error") + }) +} + +func TestServiceCallback(t *testing.T) { + l, client, adapterListener := testSetup() + + _ = client.Subscribe(&vo.SubscribeParam{ + ServiceName: "service-A", + SubscribeCallback: l.serviceCallback, + }) + + instance1 := nacosModel.SubscribeService{ + InstanceId: "ep-1", ServiceName: "service-A", Enable: true, Healthy: true, + Metadata: map[string]string{"id": "ep-1", "name": "inst-1"}, + } + instance2 := nacosModel.SubscribeService{ + InstanceId: "ep-2", ServiceName: "service-A", Enable: true, Healthy: true, + Metadata: map[string]string{"id": "ep-2", "name": "inst-2"}, + } + + t.Run("Initial instance registration", func(t *testing.T) { + adapterListener.reset() + client.subscribeCallback([]nacosModel.SubscribeService{instance1, instance2}, nil) + + assert.Len(t, adapterListener.addedEndpoints, 2, "Should add 2 endpoints") + assert.Contains(t, adapterListener.addedEndpoints, "ep-1") + assert.Contains(t, adapterListener.addedEndpoints, "ep-2") + assert.Empty(t, adapterListener.removedEndpoints, "Should not remove any endpoints") + }) + + t.Run("One instance is removed", func(t *testing.T) { + adapterListener.reset() + client.subscribeCallback([]nacosModel.SubscribeService{instance1}, nil) + + assert.Empty(t, adapterListener.addedEndpoints, "Should not add any new endpoints") + assert.Len(t, adapterListener.removedEndpoints, 1, "Should remove 1 endpoint") + assert.Contains(t, adapterListener.removedEndpoints, "ep-2") + }) + + t.Run("One instance is updated", func(t *testing.T) { + adapterListener.reset() + updatedInstance1 := instance1 + updatedInstance1.Metadata = map[string]string{"id": "ep-1", "name": "inst-1-updated"} // 元数据变化 + + client.subscribeCallback([]nacosModel.SubscribeService{updatedInstance1}, nil) + + assert.Len(t, adapterListener.addedEndpoints, 1, "Should fire an add/update event for 1 endpoint") + assert.Contains(t, adapterListener.addedEndpoints, "ep-1") + assert.Equal(t, "inst-1-updated", adapterListener.addedEndpoints["ep-1"].Name) + assert.Empty(t, adapterListener.removedEndpoints, "Should not remove any endpoints") + }) + + t.Run("Filter unhealthy or disabled instances", func(t *testing.T) { + adapterListener.reset() + unhealthyInstance := instance1 + unhealthyInstance.Healthy = false + disabledInstance := instance2 + disabledInstance.Enable = false + + client.subscribeCallback([]nacosModel.SubscribeService{unhealthyInstance, disabledInstance}, nil) + + assert.Empty(t, adapterListener.addedEndpoints, "Should not add unhealthy/disabled endpoints") + // 因为这些实例之前被认为是活跃的,现在它们消失了(被过滤掉了),所以会触发删除 + assert.Len(t, adapterListener.removedEndpoints, 1, "Should remove the previously active endpoints") Review Comment: Comment contains Chinese characters. Comments should be in English for consistency with the rest of the codebase. ########## pkg/adapter/llmregistry/registry/nacos/listener_test.go: ########## @@ -0,0 +1,270 @@ +package nacos + +import ( + "errors" + "sync" + "testing" + "time" +) + +import ( + "github.com/nacos-group/nacos-sdk-go/clients/naming_client" + nacosModel "github.com/nacos-group/nacos-sdk-go/model" + "github.com/nacos-group/nacos-sdk-go/vo" + + "github.com/stretchr/testify/assert" +) + +import ( + "github.com/apache/dubbo-go-pixiu/pkg/model" +) + +type mockNacosClient struct { + naming_client.INamingClient + + mu sync.Mutex + servicesToReturn nacosModel.ServiceList + servicesToReturnErr error + subscribeCallback func(services []nacosModel.SubscribeService, err error) + subscribedServices map[string]bool + unsubscribedServices map[string]bool +} + +func newMockNacosClient() *mockNacosClient { + return &mockNacosClient{ + subscribedServices: make(map[string]bool), + unsubscribedServices: make(map[string]bool), + } +} + +func (m *mockNacosClient) GetAllServicesInfo(param vo.GetAllServiceInfoParam) (nacosModel.ServiceList, error) { + m.mu.Lock() + defer m.mu.Unlock() + return m.servicesToReturn, m.servicesToReturnErr +} + +func (m *mockNacosClient) Subscribe(param *vo.SubscribeParam) error { + m.mu.Lock() + defer m.mu.Unlock() + m.subscribedServices[param.ServiceName] = true + m.subscribeCallback = param.SubscribeCallback + return nil +} + +func (m *mockNacosClient) Unsubscribe(param *vo.SubscribeParam) error { + m.mu.Lock() + defer m.mu.Unlock() + m.unsubscribedServices[param.ServiceName] = true + return nil +} + +type mockAdapterListener struct { + mu sync.Mutex + addedEndpoints map[string]*model.Endpoint + removedEndpoints map[string]*model.Endpoint +} + +func newMockAdapterListener() *mockAdapterListener { + return &mockAdapterListener{ + addedEndpoints: make(map[string]*model.Endpoint), + removedEndpoints: make(map[string]*model.Endpoint), + } +} + +func (m *mockAdapterListener) OnAddEndpoint(endpoint *model.Endpoint) error { + m.mu.Lock() + defer m.mu.Unlock() + m.addedEndpoints[endpoint.ID] = endpoint + return nil +} + +func (m *mockAdapterListener) OnRemoveEndpoint(endpoint *model.Endpoint) error { + m.mu.Lock() + defer m.mu.Unlock() + m.removedEndpoints[endpoint.ID] = endpoint + return nil +} + +func (m *mockAdapterListener) reset() { + m.mu.Lock() + defer m.mu.Unlock() + m.addedEndpoints = make(map[string]*model.Endpoint) + m.removedEndpoints = make(map[string]*model.Endpoint) +} + +func testSetup() (*listener, *mockNacosClient, *mockAdapterListener) { + client := newMockNacosClient() + adapterListener := newMockAdapterListener() + regConf := &model.Registry{Group: "test_group", Namespace: "test_namespace"} + nacosListener := newNacosListener(client, regConf, adapterListener) + return nacosListener, client, adapterListener +} + +func TestGenerateEndpoint(t *testing.T) { + t.Run("Full valid metadata", func(t *testing.T) { + instance := nacosModel.Instance{ + Metadata: map[string]string{ + "id": "ep-123", + "name": "my-llm", + "ip": "127.0.0.1", + "port": "8080", + "llm-meta.provider": "openai", + "llm-meta.retry_policy.name": "ExponentialBackoff", + "llm-meta.fallback": "true", + }, + } + + endpoint := generateEndpoint(instance) + assert.NotNil(t, endpoint) + assert.Equal(t, "ep-123", endpoint.ID) + assert.Equal(t, "my-llm", endpoint.Name) + assert.Equal(t, "127.0.0.1", endpoint.Address.Address) + assert.Equal(t, 8080, endpoint.Address.Port) + assert.Equal(t, "openai", endpoint.LLMMeta.Provider) + assert.Equal(t, model.RetryerExponentialBackoff, endpoint.LLMMeta.RetryPolicy.Name) + assert.True(t, endpoint.LLMMeta.Fallback) + }) + + t.Run("Nil metadata", func(t *testing.T) { + instance := nacosModel.Instance{Metadata: nil} + endpoint := generateEndpoint(instance) + assert.Nil(t, endpoint) + }) + + t.Run("Invalid port", func(t *testing.T) { + instance := nacosModel.Instance{Metadata: map[string]string{"port": "not-a-number"}} + endpoint := generateEndpoint(instance) + assert.NotNil(t, endpoint) + assert.Equal(t, 0, endpoint.Address.Port) + }) +} + +func TestDiscoverAndSubscribe(t *testing.T) { + l, client, _ := testSetup() + + t.Run("Discover and subscribe to a new service", func(t *testing.T) { + // CHANGE THIS LINE: + client.servicesToReturn = nacosModel.ServiceList{Doms: []string{"service-A"}} // Was nacosModel.Service + l.discoverAndSubscribe() + + assert.True(t, client.subscribedServices["service-A"], "Should subscribe to service-A") + _, loaded := l.subscribedServices.Load("service-A") + assert.True(t, loaded, "service-A should be in the subscribedServices map") + }) + + t.Run("Unsubscribe from a removed service", func(t *testing.T) { + // Ensure service-A is already subscribed for the test setup + l.subscribedServices.Store("service-A", true) + // CHANGE THIS LINE: + client.servicesToReturn = nacosModel.ServiceList{Doms: []string{}} // Nacos now returns an empty list + + l.discoverAndSubscribe() + + assert.True(t, client.unsubscribedServices["service-A"], "Should unsubscribe from service-A") + _, loaded := l.subscribedServices.Load("service-A") + assert.False(t, loaded, "service-A should be removed from subscribedServices map") + }) + + t.Run("Handle Nacos API error", func(t *testing.T) { + client.subscribedServices = make(map[string]bool) + l.subscribedServices.Store("stale-service", true) + + client.servicesToReturnErr = errors.New("Nacos unavailable") + l.discoverAndSubscribe() + + _, loaded := l.subscribedServices.Load("stale-service") + assert.True(t, loaded, "Should not change subscriptions on API error") + assert.Empty(t, client.subscribedServices, "Should not attempt to subscribe on API error") + }) +} + +func TestServiceCallback(t *testing.T) { + l, client, adapterListener := testSetup() + + _ = client.Subscribe(&vo.SubscribeParam{ + ServiceName: "service-A", + SubscribeCallback: l.serviceCallback, + }) + + instance1 := nacosModel.SubscribeService{ + InstanceId: "ep-1", ServiceName: "service-A", Enable: true, Healthy: true, + Metadata: map[string]string{"id": "ep-1", "name": "inst-1"}, + } + instance2 := nacosModel.SubscribeService{ + InstanceId: "ep-2", ServiceName: "service-A", Enable: true, Healthy: true, + Metadata: map[string]string{"id": "ep-2", "name": "inst-2"}, + } + + t.Run("Initial instance registration", func(t *testing.T) { + adapterListener.reset() + client.subscribeCallback([]nacosModel.SubscribeService{instance1, instance2}, nil) + + assert.Len(t, adapterListener.addedEndpoints, 2, "Should add 2 endpoints") + assert.Contains(t, adapterListener.addedEndpoints, "ep-1") + assert.Contains(t, adapterListener.addedEndpoints, "ep-2") + assert.Empty(t, adapterListener.removedEndpoints, "Should not remove any endpoints") + }) + + t.Run("One instance is removed", func(t *testing.T) { + adapterListener.reset() + client.subscribeCallback([]nacosModel.SubscribeService{instance1}, nil) + + assert.Empty(t, adapterListener.addedEndpoints, "Should not add any new endpoints") + assert.Len(t, adapterListener.removedEndpoints, 1, "Should remove 1 endpoint") + assert.Contains(t, adapterListener.removedEndpoints, "ep-2") + }) + + t.Run("One instance is updated", func(t *testing.T) { + adapterListener.reset() + updatedInstance1 := instance1 + updatedInstance1.Metadata = map[string]string{"id": "ep-1", "name": "inst-1-updated"} // 元数据变化 + + client.subscribeCallback([]nacosModel.SubscribeService{updatedInstance1}, nil) + + assert.Len(t, adapterListener.addedEndpoints, 1, "Should fire an add/update event for 1 endpoint") + assert.Contains(t, adapterListener.addedEndpoints, "ep-1") + assert.Equal(t, "inst-1-updated", adapterListener.addedEndpoints["ep-1"].Name) + assert.Empty(t, adapterListener.removedEndpoints, "Should not remove any endpoints") + }) + + t.Run("Filter unhealthy or disabled instances", func(t *testing.T) { + adapterListener.reset() + unhealthyInstance := instance1 + unhealthyInstance.Healthy = false + disabledInstance := instance2 + disabledInstance.Enable = false + + client.subscribeCallback([]nacosModel.SubscribeService{unhealthyInstance, disabledInstance}, nil) + + assert.Empty(t, adapterListener.addedEndpoints, "Should not add unhealthy/disabled endpoints") + // 因为这些实例之前被认为是活跃的,现在它们消失了(被过滤掉了),所以会触发删除 + assert.Len(t, adapterListener.removedEndpoints, 1, "Should remove the previously active endpoints") + }) + + t.Run("No changes in instances", func(t *testing.T) { + // 首先,用 instance1 设置缓存 + client.subscribeCallback([]nacosModel.SubscribeService{instance1}, nil) + + adapterListener.reset() // 重置监听器状态 + + // 再次用完全相同的数据调用 + client.subscribeCallback([]nacosModel.SubscribeService{instance1}, nil) + + assert.Empty(t, adapterListener.addedEndpoints, "Should not trigger add for unchanged instance") + assert.Empty(t, adapterListener.removedEndpoints, "Should not trigger remove for unchanged instance") + }) +} + +func TestLifecycle(t *testing.T) { + l, _, _ := testSetup() + + l.WatchAndHandle() + + // 等待一小段时间,确保至少一个 ticker 周期已经过去 + time.Sleep(100 * time.Millisecond) + + // 测试 Close 是否能正常工作且不阻塞 Review Comment: Comments contain Chinese characters. Comments should be in English for consistency with the rest of the codebase. ```suggestion // Test whether Close works correctly and does not block ``` -- This is an automated message from the Apache Git Service. To respond to the message, please log on to GitHub and use the URL above to go to the specific comment. To unsubscribe, e-mail: notifications-unsubscr...@dubbo.apache.org For queries about this service, please contact Infrastructure at: us...@infra.apache.org --------------------------------------------------------------------- To unsubscribe, e-mail: notifications-unsubscr...@dubbo.apache.org For additional commands, e-mail: notifications-h...@dubbo.apache.org