Copilot commented on code in PR #746:
URL: https://github.com/apache/dubbo-go-pixiu/pull/746#discussion_r2312394785


##########
pkg/adapter/llmregistry/registry/registry.go:
##########
@@ -0,0 +1,56 @@
+/*
+ * Licensed to the Apache Software Foundation (ASF) under one or more
+ * contributor license agreements.  See the NOTICE file distributed with
+ * this work for additional information regarding copyright ownership.
+ * The ASF licenses this file to You under the Apache License, Version 2.0
+ * (the "License"); you may not use this file except in compliance with
+ * the License.  You may obtain a copy of the License at
+ *
+ *     http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+
+package registry
+
+import (
+       "github.com/pkg/errors"
+)
+
+import (
+       "github.com/apache/dubbo-go-pixiu/pkg/adapter/llmregistry/common"
+       "github.com/apache/dubbo-go-pixiu/pkg/model"
+)
+
+// A map to store registry creation functions by protocol name.
+var registryMap = make(map[string]func(model.Registry, 
common.RegistryEventListener) (Registry, error), 8)
+
+// Registry interface defines the basic features of a service registry.
+type Registry interface {
+       // Subscribe starts monitoring the target registry for service changes.
+       Subscribe() error
+       // Unsubscribe stops monitoring the target registry.
+       Unsubscribe() error
+}
+
+// SetRegistry registers a factory function for creating a new registry client.
+func SetRegistry(name string, newRegFunc func(model.Registry, 
common.RegistryEventListener) (Registry, error)) {
+       registryMap[name] = newRegFunc
+}
+
+// GetRegistry creates and returns a new registry client based on the 
configuration.
+// It panics if the registry client cannot be initialized.
+func GetRegistry(regConfig model.Registry, listener 
common.RegistryEventListener) (Registry, error) {
+       if newRegFunc, ok := registryMap[regConfig.Protocol]; ok {
+               reg, err := newRegFunc(regConfig, listener)
+               if err != nil {
+                       panic("Initialize Registry " + regConfig.Protocol + " 
failed due to: " + err.Error())

Review Comment:
   Using panic in library code is problematic as it can crash the entire 
application unexpectedly. The function should return the error instead of 
panicking, allowing callers to handle it appropriately.
   ```suggestion
                        return nil, errors.New("Initialize Registry " + 
regConfig.Protocol + " failed due to: " + err.Error())
   ```



##########
pkg/adapter/llmregistry/registry/nacos/listener_test.go:
##########
@@ -0,0 +1,270 @@
+package nacos
+
+import (
+       "errors"
+       "sync"
+       "testing"
+       "time"
+)
+
+import (
+       "github.com/nacos-group/nacos-sdk-go/clients/naming_client"
+       nacosModel "github.com/nacos-group/nacos-sdk-go/model"
+       "github.com/nacos-group/nacos-sdk-go/vo"
+
+       "github.com/stretchr/testify/assert"
+)
+
+import (
+       "github.com/apache/dubbo-go-pixiu/pkg/model"
+)
+
+type mockNacosClient struct {
+       naming_client.INamingClient
+
+       mu                   sync.Mutex
+       servicesToReturn     nacosModel.ServiceList
+       servicesToReturnErr  error
+       subscribeCallback    func(services []nacosModel.SubscribeService, err 
error)
+       subscribedServices   map[string]bool
+       unsubscribedServices map[string]bool
+}
+
+func newMockNacosClient() *mockNacosClient {
+       return &mockNacosClient{
+               subscribedServices:   make(map[string]bool),
+               unsubscribedServices: make(map[string]bool),
+       }
+}
+
+func (m *mockNacosClient) GetAllServicesInfo(param vo.GetAllServiceInfoParam) 
(nacosModel.ServiceList, error) {
+       m.mu.Lock()
+       defer m.mu.Unlock()
+       return m.servicesToReturn, m.servicesToReturnErr
+}
+
+func (m *mockNacosClient) Subscribe(param *vo.SubscribeParam) error {
+       m.mu.Lock()
+       defer m.mu.Unlock()
+       m.subscribedServices[param.ServiceName] = true
+       m.subscribeCallback = param.SubscribeCallback
+       return nil
+}
+
+func (m *mockNacosClient) Unsubscribe(param *vo.SubscribeParam) error {
+       m.mu.Lock()
+       defer m.mu.Unlock()
+       m.unsubscribedServices[param.ServiceName] = true
+       return nil
+}
+
+type mockAdapterListener struct {
+       mu               sync.Mutex
+       addedEndpoints   map[string]*model.Endpoint
+       removedEndpoints map[string]*model.Endpoint
+}
+
+func newMockAdapterListener() *mockAdapterListener {
+       return &mockAdapterListener{
+               addedEndpoints:   make(map[string]*model.Endpoint),
+               removedEndpoints: make(map[string]*model.Endpoint),
+       }
+}
+
+func (m *mockAdapterListener) OnAddEndpoint(endpoint *model.Endpoint) error {
+       m.mu.Lock()
+       defer m.mu.Unlock()
+       m.addedEndpoints[endpoint.ID] = endpoint
+       return nil
+}
+
+func (m *mockAdapterListener) OnRemoveEndpoint(endpoint *model.Endpoint) error 
{
+       m.mu.Lock()
+       defer m.mu.Unlock()
+       m.removedEndpoints[endpoint.ID] = endpoint
+       return nil
+}
+
+func (m *mockAdapterListener) reset() {
+       m.mu.Lock()
+       defer m.mu.Unlock()
+       m.addedEndpoints = make(map[string]*model.Endpoint)
+       m.removedEndpoints = make(map[string]*model.Endpoint)
+}
+
+func testSetup() (*listener, *mockNacosClient, *mockAdapterListener) {
+       client := newMockNacosClient()
+       adapterListener := newMockAdapterListener()
+       regConf := &model.Registry{Group: "test_group", Namespace: 
"test_namespace"}
+       nacosListener := newNacosListener(client, regConf, adapterListener)
+       return nacosListener, client, adapterListener
+}
+
+func TestGenerateEndpoint(t *testing.T) {
+       t.Run("Full valid metadata", func(t *testing.T) {
+               instance := nacosModel.Instance{
+                       Metadata: map[string]string{
+                               "id":                         "ep-123",
+                               "name":                       "my-llm",
+                               "ip":                         "127.0.0.1",
+                               "port":                       "8080",
+                               "llm-meta.provider":          "openai",
+                               "llm-meta.retry_policy.name": 
"ExponentialBackoff",
+                               "llm-meta.fallback":          "true",
+                       },
+               }
+
+               endpoint := generateEndpoint(instance)
+               assert.NotNil(t, endpoint)
+               assert.Equal(t, "ep-123", endpoint.ID)
+               assert.Equal(t, "my-llm", endpoint.Name)
+               assert.Equal(t, "127.0.0.1", endpoint.Address.Address)
+               assert.Equal(t, 8080, endpoint.Address.Port)
+               assert.Equal(t, "openai", endpoint.LLMMeta.Provider)
+               assert.Equal(t, model.RetryerExponentialBackoff, 
endpoint.LLMMeta.RetryPolicy.Name)
+               assert.True(t, endpoint.LLMMeta.Fallback)
+       })
+
+       t.Run("Nil metadata", func(t *testing.T) {
+               instance := nacosModel.Instance{Metadata: nil}
+               endpoint := generateEndpoint(instance)
+               assert.Nil(t, endpoint)
+       })
+
+       t.Run("Invalid port", func(t *testing.T) {
+               instance := nacosModel.Instance{Metadata: 
map[string]string{"port": "not-a-number"}}
+               endpoint := generateEndpoint(instance)
+               assert.NotNil(t, endpoint)
+               assert.Equal(t, 0, endpoint.Address.Port)
+       })
+}
+
+func TestDiscoverAndSubscribe(t *testing.T) {
+       l, client, _ := testSetup()
+
+       t.Run("Discover and subscribe to a new service", func(t *testing.T) {
+               // CHANGE THIS LINE:
+               client.servicesToReturn = nacosModel.ServiceList{Doms: 
[]string{"service-A"}} // Was nacosModel.Service
+               l.discoverAndSubscribe()
+
+               assert.True(t, client.subscribedServices["service-A"], "Should 
subscribe to service-A")
+               _, loaded := l.subscribedServices.Load("service-A")
+               assert.True(t, loaded, "service-A should be in the 
subscribedServices map")
+       })
+
+       t.Run("Unsubscribe from a removed service", func(t *testing.T) {
+               // Ensure service-A is already subscribed for the test setup
+               l.subscribedServices.Store("service-A", true)
+               // CHANGE THIS LINE:
+               client.servicesToReturn = nacosModel.ServiceList{Doms: 
[]string{}} // Nacos now returns an empty list
+
+               l.discoverAndSubscribe()
+
+               assert.True(t, client.unsubscribedServices["service-A"], 
"Should unsubscribe from service-A")
+               _, loaded := l.subscribedServices.Load("service-A")
+               assert.False(t, loaded, "service-A should be removed from 
subscribedServices map")
+       })
+
+       t.Run("Handle Nacos API error", func(t *testing.T) {
+               client.subscribedServices = make(map[string]bool)
+               l.subscribedServices.Store("stale-service", true)
+
+               client.servicesToReturnErr = errors.New("Nacos unavailable")
+               l.discoverAndSubscribe()
+
+               _, loaded := l.subscribedServices.Load("stale-service")
+               assert.True(t, loaded, "Should not change subscriptions on API 
error")
+               assert.Empty(t, client.subscribedServices, "Should not attempt 
to subscribe on API error")
+       })
+}
+
+func TestServiceCallback(t *testing.T) {
+       l, client, adapterListener := testSetup()
+
+       _ = client.Subscribe(&vo.SubscribeParam{
+               ServiceName:       "service-A",
+               SubscribeCallback: l.serviceCallback,
+       })
+
+       instance1 := nacosModel.SubscribeService{
+               InstanceId: "ep-1", ServiceName: "service-A", Enable: true, 
Healthy: true,
+               Metadata: map[string]string{"id": "ep-1", "name": "inst-1"},
+       }
+       instance2 := nacosModel.SubscribeService{
+               InstanceId: "ep-2", ServiceName: "service-A", Enable: true, 
Healthy: true,
+               Metadata: map[string]string{"id": "ep-2", "name": "inst-2"},
+       }
+
+       t.Run("Initial instance registration", func(t *testing.T) {
+               adapterListener.reset()
+               
client.subscribeCallback([]nacosModel.SubscribeService{instance1, instance2}, 
nil)
+
+               assert.Len(t, adapterListener.addedEndpoints, 2, "Should add 2 
endpoints")
+               assert.Contains(t, adapterListener.addedEndpoints, "ep-1")
+               assert.Contains(t, adapterListener.addedEndpoints, "ep-2")
+               assert.Empty(t, adapterListener.removedEndpoints, "Should not 
remove any endpoints")
+       })
+
+       t.Run("One instance is removed", func(t *testing.T) {
+               adapterListener.reset()
+               
client.subscribeCallback([]nacosModel.SubscribeService{instance1}, nil)
+
+               assert.Empty(t, adapterListener.addedEndpoints, "Should not add 
any new endpoints")
+               assert.Len(t, adapterListener.removedEndpoints, 1, "Should 
remove 1 endpoint")
+               assert.Contains(t, adapterListener.removedEndpoints, "ep-2")
+       })
+
+       t.Run("One instance is updated", func(t *testing.T) {
+               adapterListener.reset()
+               updatedInstance1 := instance1
+               updatedInstance1.Metadata = map[string]string{"id": "ep-1", 
"name": "inst-1-updated"} // 元数据变化

Review Comment:
   Comment contains Chinese characters. Comments should be in English for 
consistency with the rest of the codebase.



##########
pkg/adapter/llmregistry/registry/nacos/listener_test.go:
##########
@@ -0,0 +1,270 @@
+package nacos
+
+import (
+       "errors"
+       "sync"
+       "testing"
+       "time"
+)
+
+import (
+       "github.com/nacos-group/nacos-sdk-go/clients/naming_client"
+       nacosModel "github.com/nacos-group/nacos-sdk-go/model"
+       "github.com/nacos-group/nacos-sdk-go/vo"
+
+       "github.com/stretchr/testify/assert"
+)
+
+import (
+       "github.com/apache/dubbo-go-pixiu/pkg/model"
+)
+
+type mockNacosClient struct {
+       naming_client.INamingClient
+
+       mu                   sync.Mutex
+       servicesToReturn     nacosModel.ServiceList
+       servicesToReturnErr  error
+       subscribeCallback    func(services []nacosModel.SubscribeService, err 
error)
+       subscribedServices   map[string]bool
+       unsubscribedServices map[string]bool
+}
+
+func newMockNacosClient() *mockNacosClient {
+       return &mockNacosClient{
+               subscribedServices:   make(map[string]bool),
+               unsubscribedServices: make(map[string]bool),
+       }
+}
+
+func (m *mockNacosClient) GetAllServicesInfo(param vo.GetAllServiceInfoParam) 
(nacosModel.ServiceList, error) {
+       m.mu.Lock()
+       defer m.mu.Unlock()
+       return m.servicesToReturn, m.servicesToReturnErr
+}
+
+func (m *mockNacosClient) Subscribe(param *vo.SubscribeParam) error {
+       m.mu.Lock()
+       defer m.mu.Unlock()
+       m.subscribedServices[param.ServiceName] = true
+       m.subscribeCallback = param.SubscribeCallback
+       return nil
+}
+
+func (m *mockNacosClient) Unsubscribe(param *vo.SubscribeParam) error {
+       m.mu.Lock()
+       defer m.mu.Unlock()
+       m.unsubscribedServices[param.ServiceName] = true
+       return nil
+}
+
+type mockAdapterListener struct {
+       mu               sync.Mutex
+       addedEndpoints   map[string]*model.Endpoint
+       removedEndpoints map[string]*model.Endpoint
+}
+
+func newMockAdapterListener() *mockAdapterListener {
+       return &mockAdapterListener{
+               addedEndpoints:   make(map[string]*model.Endpoint),
+               removedEndpoints: make(map[string]*model.Endpoint),
+       }
+}
+
+func (m *mockAdapterListener) OnAddEndpoint(endpoint *model.Endpoint) error {
+       m.mu.Lock()
+       defer m.mu.Unlock()
+       m.addedEndpoints[endpoint.ID] = endpoint
+       return nil
+}
+
+func (m *mockAdapterListener) OnRemoveEndpoint(endpoint *model.Endpoint) error 
{
+       m.mu.Lock()
+       defer m.mu.Unlock()
+       m.removedEndpoints[endpoint.ID] = endpoint
+       return nil
+}
+
+func (m *mockAdapterListener) reset() {
+       m.mu.Lock()
+       defer m.mu.Unlock()
+       m.addedEndpoints = make(map[string]*model.Endpoint)
+       m.removedEndpoints = make(map[string]*model.Endpoint)
+}
+
+func testSetup() (*listener, *mockNacosClient, *mockAdapterListener) {
+       client := newMockNacosClient()
+       adapterListener := newMockAdapterListener()
+       regConf := &model.Registry{Group: "test_group", Namespace: 
"test_namespace"}
+       nacosListener := newNacosListener(client, regConf, adapterListener)
+       return nacosListener, client, adapterListener
+}
+
+func TestGenerateEndpoint(t *testing.T) {
+       t.Run("Full valid metadata", func(t *testing.T) {
+               instance := nacosModel.Instance{
+                       Metadata: map[string]string{
+                               "id":                         "ep-123",
+                               "name":                       "my-llm",
+                               "ip":                         "127.0.0.1",
+                               "port":                       "8080",
+                               "llm-meta.provider":          "openai",
+                               "llm-meta.retry_policy.name": 
"ExponentialBackoff",
+                               "llm-meta.fallback":          "true",
+                       },
+               }
+
+               endpoint := generateEndpoint(instance)
+               assert.NotNil(t, endpoint)
+               assert.Equal(t, "ep-123", endpoint.ID)
+               assert.Equal(t, "my-llm", endpoint.Name)
+               assert.Equal(t, "127.0.0.1", endpoint.Address.Address)
+               assert.Equal(t, 8080, endpoint.Address.Port)
+               assert.Equal(t, "openai", endpoint.LLMMeta.Provider)
+               assert.Equal(t, model.RetryerExponentialBackoff, 
endpoint.LLMMeta.RetryPolicy.Name)
+               assert.True(t, endpoint.LLMMeta.Fallback)
+       })
+
+       t.Run("Nil metadata", func(t *testing.T) {
+               instance := nacosModel.Instance{Metadata: nil}
+               endpoint := generateEndpoint(instance)
+               assert.Nil(t, endpoint)
+       })
+
+       t.Run("Invalid port", func(t *testing.T) {
+               instance := nacosModel.Instance{Metadata: 
map[string]string{"port": "not-a-number"}}
+               endpoint := generateEndpoint(instance)
+               assert.NotNil(t, endpoint)
+               assert.Equal(t, 0, endpoint.Address.Port)
+       })
+}
+
+func TestDiscoverAndSubscribe(t *testing.T) {
+       l, client, _ := testSetup()
+
+       t.Run("Discover and subscribe to a new service", func(t *testing.T) {
+               // CHANGE THIS LINE:
+               client.servicesToReturn = nacosModel.ServiceList{Doms: 
[]string{"service-A"}} // Was nacosModel.Service
+               l.discoverAndSubscribe()
+
+               assert.True(t, client.subscribedServices["service-A"], "Should 
subscribe to service-A")
+               _, loaded := l.subscribedServices.Load("service-A")
+               assert.True(t, loaded, "service-A should be in the 
subscribedServices map")
+       })
+
+       t.Run("Unsubscribe from a removed service", func(t *testing.T) {
+               // Ensure service-A is already subscribed for the test setup
+               l.subscribedServices.Store("service-A", true)
+               // CHANGE THIS LINE:
+               client.servicesToReturn = nacosModel.ServiceList{Doms: 
[]string{}} // Nacos now returns an empty list
+
+               l.discoverAndSubscribe()
+
+               assert.True(t, client.unsubscribedServices["service-A"], 
"Should unsubscribe from service-A")
+               _, loaded := l.subscribedServices.Load("service-A")
+               assert.False(t, loaded, "service-A should be removed from 
subscribedServices map")
+       })
+
+       t.Run("Handle Nacos API error", func(t *testing.T) {
+               client.subscribedServices = make(map[string]bool)
+               l.subscribedServices.Store("stale-service", true)
+
+               client.servicesToReturnErr = errors.New("Nacos unavailable")
+               l.discoverAndSubscribe()
+
+               _, loaded := l.subscribedServices.Load("stale-service")
+               assert.True(t, loaded, "Should not change subscriptions on API 
error")
+               assert.Empty(t, client.subscribedServices, "Should not attempt 
to subscribe on API error")
+       })
+}
+
+func TestServiceCallback(t *testing.T) {
+       l, client, adapterListener := testSetup()
+
+       _ = client.Subscribe(&vo.SubscribeParam{
+               ServiceName:       "service-A",
+               SubscribeCallback: l.serviceCallback,
+       })
+
+       instance1 := nacosModel.SubscribeService{
+               InstanceId: "ep-1", ServiceName: "service-A", Enable: true, 
Healthy: true,
+               Metadata: map[string]string{"id": "ep-1", "name": "inst-1"},
+       }
+       instance2 := nacosModel.SubscribeService{
+               InstanceId: "ep-2", ServiceName: "service-A", Enable: true, 
Healthy: true,
+               Metadata: map[string]string{"id": "ep-2", "name": "inst-2"},
+       }
+
+       t.Run("Initial instance registration", func(t *testing.T) {
+               adapterListener.reset()
+               
client.subscribeCallback([]nacosModel.SubscribeService{instance1, instance2}, 
nil)
+
+               assert.Len(t, adapterListener.addedEndpoints, 2, "Should add 2 
endpoints")
+               assert.Contains(t, adapterListener.addedEndpoints, "ep-1")
+               assert.Contains(t, adapterListener.addedEndpoints, "ep-2")
+               assert.Empty(t, adapterListener.removedEndpoints, "Should not 
remove any endpoints")
+       })
+
+       t.Run("One instance is removed", func(t *testing.T) {
+               adapterListener.reset()
+               
client.subscribeCallback([]nacosModel.SubscribeService{instance1}, nil)
+
+               assert.Empty(t, adapterListener.addedEndpoints, "Should not add 
any new endpoints")
+               assert.Len(t, adapterListener.removedEndpoints, 1, "Should 
remove 1 endpoint")
+               assert.Contains(t, adapterListener.removedEndpoints, "ep-2")
+       })
+
+       t.Run("One instance is updated", func(t *testing.T) {
+               adapterListener.reset()
+               updatedInstance1 := instance1
+               updatedInstance1.Metadata = map[string]string{"id": "ep-1", 
"name": "inst-1-updated"} // 元数据变化
+
+               
client.subscribeCallback([]nacosModel.SubscribeService{updatedInstance1}, nil)
+
+               assert.Len(t, adapterListener.addedEndpoints, 1, "Should fire 
an add/update event for 1 endpoint")
+               assert.Contains(t, adapterListener.addedEndpoints, "ep-1")
+               assert.Equal(t, "inst-1-updated", 
adapterListener.addedEndpoints["ep-1"].Name)
+               assert.Empty(t, adapterListener.removedEndpoints, "Should not 
remove any endpoints")
+       })
+
+       t.Run("Filter unhealthy or disabled instances", func(t *testing.T) {
+               adapterListener.reset()
+               unhealthyInstance := instance1
+               unhealthyInstance.Healthy = false
+               disabledInstance := instance2
+               disabledInstance.Enable = false
+
+               
client.subscribeCallback([]nacosModel.SubscribeService{unhealthyInstance, 
disabledInstance}, nil)
+
+               assert.Empty(t, adapterListener.addedEndpoints, "Should not add 
unhealthy/disabled endpoints")
+               // 因为这些实例之前被认为是活跃的,现在它们消失了(被过滤掉了),所以会触发删除
+               assert.Len(t, adapterListener.removedEndpoints, 1, "Should 
remove the previously active endpoints")
+       })
+
+       t.Run("No changes in instances", func(t *testing.T) {
+               // 首先,用 instance1 设置缓存
+               
client.subscribeCallback([]nacosModel.SubscribeService{instance1}, nil)
+
+               adapterListener.reset() // 重置监听器状态
+
+               // 再次用完全相同的数据调用
+               
client.subscribeCallback([]nacosModel.SubscribeService{instance1}, nil)

Review Comment:
   Comments contain Chinese characters. Comments should be in English for 
consistency with the rest of the codebase.



##########
pkg/adapter/llmregistry/registry/base/baseregistry.go:
##########
@@ -0,0 +1,117 @@
+/*
+ * Licensed to the Apache Software Foundation (ASF) under one or more
+ * contributor license agreements.  See the NOTICE file distributed with
+ * this work for additional information regarding copyright ownership.
+ * The ASF licenses this file to You under the Apache License, Version 2.0
+ * (the "License"); you may not use this file except in compliance with
+ * the License.  You may obtain a copy of the License at
+ *
+ *     http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+
+package baseregistry
+
+import (
+       "sync"
+)
+
+import (
+       "github.com/apache/dubbo-go-pixiu/pkg/adapter/llmregistry/common"
+       "github.com/apache/dubbo-go-pixiu/pkg/adapter/llmregistry/registry"
+)
+
+type FacadeRegistry interface {
+       // DoSubscribe subscribes the registry cluster to monitor the changes.
+       DoSubscribe() error
+       // DoUnsubscribe unsubscribes the registry cluster.
+       DoUnsubscribe() error
+}
+
+type SvcListeners struct {
+       // listeners use url.ServiceKey as the index.
+       listeners    map[string]registry.Listener
+       listenerLock sync.Mutex
+}
+
+// GetListener returns existing listener or nil
+func (s *SvcListeners) GetListener(id string) registry.Listener {
+       s.listenerLock.Lock()
+       defer s.listenerLock.Unlock()
+       listener, ok := s.listeners[id]
+       if !ok {
+               return nil
+       }
+       return listener
+}
+
+// SetListener set the listener to the registry
+func (s *SvcListeners) SetListener(id string, listener registry.Listener) {
+       s.listenerLock.Lock()
+       defer s.listenerLock.Unlock()
+       s.listeners[id] = listener
+}
+
+// RemoveListener removes the listener of the registry
+func (s *SvcListeners) RemoveListener(id string) {
+       s.listenerLock.Lock()
+       defer s.listenerLock.Unlock()
+       delete(s.listeners, id)
+}
+
+func (s *SvcListeners) GetAllListener() map[string]registry.Listener {
+       s.listenerLock.Lock()
+       defer s.listenerLock.Unlock()
+       return s.listeners

Review Comment:
   This method returns a direct reference to the internal map, which can lead 
to race conditions if callers modify the returned map concurrently. Consider 
returning a copy of the map instead.
   ```suggestion
        copied := make(map[string]registry.Listener, len(s.listeners))
        for k, v := range s.listeners {
                copied[k] = v
        }
        return copied
   ```



##########
pkg/adapter/llmregistry/registry/nacos/listener_test.go:
##########
@@ -0,0 +1,270 @@
+package nacos
+
+import (
+       "errors"
+       "sync"
+       "testing"
+       "time"
+)
+
+import (
+       "github.com/nacos-group/nacos-sdk-go/clients/naming_client"
+       nacosModel "github.com/nacos-group/nacos-sdk-go/model"
+       "github.com/nacos-group/nacos-sdk-go/vo"
+
+       "github.com/stretchr/testify/assert"
+)
+
+import (
+       "github.com/apache/dubbo-go-pixiu/pkg/model"
+)
+
+type mockNacosClient struct {
+       naming_client.INamingClient
+
+       mu                   sync.Mutex
+       servicesToReturn     nacosModel.ServiceList
+       servicesToReturnErr  error
+       subscribeCallback    func(services []nacosModel.SubscribeService, err 
error)
+       subscribedServices   map[string]bool
+       unsubscribedServices map[string]bool
+}
+
+func newMockNacosClient() *mockNacosClient {
+       return &mockNacosClient{
+               subscribedServices:   make(map[string]bool),
+               unsubscribedServices: make(map[string]bool),
+       }
+}
+
+func (m *mockNacosClient) GetAllServicesInfo(param vo.GetAllServiceInfoParam) 
(nacosModel.ServiceList, error) {
+       m.mu.Lock()
+       defer m.mu.Unlock()
+       return m.servicesToReturn, m.servicesToReturnErr
+}
+
+func (m *mockNacosClient) Subscribe(param *vo.SubscribeParam) error {
+       m.mu.Lock()
+       defer m.mu.Unlock()
+       m.subscribedServices[param.ServiceName] = true
+       m.subscribeCallback = param.SubscribeCallback
+       return nil
+}
+
+func (m *mockNacosClient) Unsubscribe(param *vo.SubscribeParam) error {
+       m.mu.Lock()
+       defer m.mu.Unlock()
+       m.unsubscribedServices[param.ServiceName] = true
+       return nil
+}
+
+type mockAdapterListener struct {
+       mu               sync.Mutex
+       addedEndpoints   map[string]*model.Endpoint
+       removedEndpoints map[string]*model.Endpoint
+}
+
+func newMockAdapterListener() *mockAdapterListener {
+       return &mockAdapterListener{
+               addedEndpoints:   make(map[string]*model.Endpoint),
+               removedEndpoints: make(map[string]*model.Endpoint),
+       }
+}
+
+func (m *mockAdapterListener) OnAddEndpoint(endpoint *model.Endpoint) error {
+       m.mu.Lock()
+       defer m.mu.Unlock()
+       m.addedEndpoints[endpoint.ID] = endpoint
+       return nil
+}
+
+func (m *mockAdapterListener) OnRemoveEndpoint(endpoint *model.Endpoint) error 
{
+       m.mu.Lock()
+       defer m.mu.Unlock()
+       m.removedEndpoints[endpoint.ID] = endpoint
+       return nil
+}
+
+func (m *mockAdapterListener) reset() {
+       m.mu.Lock()
+       defer m.mu.Unlock()
+       m.addedEndpoints = make(map[string]*model.Endpoint)
+       m.removedEndpoints = make(map[string]*model.Endpoint)
+}
+
+func testSetup() (*listener, *mockNacosClient, *mockAdapterListener) {
+       client := newMockNacosClient()
+       adapterListener := newMockAdapterListener()
+       regConf := &model.Registry{Group: "test_group", Namespace: 
"test_namespace"}
+       nacosListener := newNacosListener(client, regConf, adapterListener)
+       return nacosListener, client, adapterListener
+}
+
+func TestGenerateEndpoint(t *testing.T) {
+       t.Run("Full valid metadata", func(t *testing.T) {
+               instance := nacosModel.Instance{
+                       Metadata: map[string]string{
+                               "id":                         "ep-123",
+                               "name":                       "my-llm",
+                               "ip":                         "127.0.0.1",
+                               "port":                       "8080",
+                               "llm-meta.provider":          "openai",
+                               "llm-meta.retry_policy.name": 
"ExponentialBackoff",
+                               "llm-meta.fallback":          "true",
+                       },
+               }
+
+               endpoint := generateEndpoint(instance)
+               assert.NotNil(t, endpoint)
+               assert.Equal(t, "ep-123", endpoint.ID)
+               assert.Equal(t, "my-llm", endpoint.Name)
+               assert.Equal(t, "127.0.0.1", endpoint.Address.Address)
+               assert.Equal(t, 8080, endpoint.Address.Port)
+               assert.Equal(t, "openai", endpoint.LLMMeta.Provider)
+               assert.Equal(t, model.RetryerExponentialBackoff, 
endpoint.LLMMeta.RetryPolicy.Name)
+               assert.True(t, endpoint.LLMMeta.Fallback)
+       })
+
+       t.Run("Nil metadata", func(t *testing.T) {
+               instance := nacosModel.Instance{Metadata: nil}
+               endpoint := generateEndpoint(instance)
+               assert.Nil(t, endpoint)
+       })
+
+       t.Run("Invalid port", func(t *testing.T) {
+               instance := nacosModel.Instance{Metadata: 
map[string]string{"port": "not-a-number"}}
+               endpoint := generateEndpoint(instance)
+               assert.NotNil(t, endpoint)
+               assert.Equal(t, 0, endpoint.Address.Port)
+       })
+}
+
+func TestDiscoverAndSubscribe(t *testing.T) {
+       l, client, _ := testSetup()
+
+       t.Run("Discover and subscribe to a new service", func(t *testing.T) {
+               // CHANGE THIS LINE:
+               client.servicesToReturn = nacosModel.ServiceList{Doms: 
[]string{"service-A"}} // Was nacosModel.Service
+               l.discoverAndSubscribe()
+
+               assert.True(t, client.subscribedServices["service-A"], "Should 
subscribe to service-A")
+               _, loaded := l.subscribedServices.Load("service-A")
+               assert.True(t, loaded, "service-A should be in the 
subscribedServices map")
+       })
+
+       t.Run("Unsubscribe from a removed service", func(t *testing.T) {
+               // Ensure service-A is already subscribed for the test setup
+               l.subscribedServices.Store("service-A", true)
+               // CHANGE THIS LINE:
+               client.servicesToReturn = nacosModel.ServiceList{Doms: 
[]string{}} // Nacos now returns an empty list
+
+               l.discoverAndSubscribe()
+
+               assert.True(t, client.unsubscribedServices["service-A"], 
"Should unsubscribe from service-A")
+               _, loaded := l.subscribedServices.Load("service-A")
+               assert.False(t, loaded, "service-A should be removed from 
subscribedServices map")
+       })
+
+       t.Run("Handle Nacos API error", func(t *testing.T) {
+               client.subscribedServices = make(map[string]bool)
+               l.subscribedServices.Store("stale-service", true)
+
+               client.servicesToReturnErr = errors.New("Nacos unavailable")
+               l.discoverAndSubscribe()
+
+               _, loaded := l.subscribedServices.Load("stale-service")
+               assert.True(t, loaded, "Should not change subscriptions on API 
error")
+               assert.Empty(t, client.subscribedServices, "Should not attempt 
to subscribe on API error")
+       })
+}
+
+func TestServiceCallback(t *testing.T) {
+       l, client, adapterListener := testSetup()
+
+       _ = client.Subscribe(&vo.SubscribeParam{
+               ServiceName:       "service-A",
+               SubscribeCallback: l.serviceCallback,
+       })
+
+       instance1 := nacosModel.SubscribeService{
+               InstanceId: "ep-1", ServiceName: "service-A", Enable: true, 
Healthy: true,
+               Metadata: map[string]string{"id": "ep-1", "name": "inst-1"},
+       }
+       instance2 := nacosModel.SubscribeService{
+               InstanceId: "ep-2", ServiceName: "service-A", Enable: true, 
Healthy: true,
+               Metadata: map[string]string{"id": "ep-2", "name": "inst-2"},
+       }
+
+       t.Run("Initial instance registration", func(t *testing.T) {
+               adapterListener.reset()
+               
client.subscribeCallback([]nacosModel.SubscribeService{instance1, instance2}, 
nil)
+
+               assert.Len(t, adapterListener.addedEndpoints, 2, "Should add 2 
endpoints")
+               assert.Contains(t, adapterListener.addedEndpoints, "ep-1")
+               assert.Contains(t, adapterListener.addedEndpoints, "ep-2")
+               assert.Empty(t, adapterListener.removedEndpoints, "Should not 
remove any endpoints")
+       })
+
+       t.Run("One instance is removed", func(t *testing.T) {
+               adapterListener.reset()
+               
client.subscribeCallback([]nacosModel.SubscribeService{instance1}, nil)
+
+               assert.Empty(t, adapterListener.addedEndpoints, "Should not add 
any new endpoints")
+               assert.Len(t, adapterListener.removedEndpoints, 1, "Should 
remove 1 endpoint")
+               assert.Contains(t, adapterListener.removedEndpoints, "ep-2")
+       })
+
+       t.Run("One instance is updated", func(t *testing.T) {
+               adapterListener.reset()
+               updatedInstance1 := instance1
+               updatedInstance1.Metadata = map[string]string{"id": "ep-1", 
"name": "inst-1-updated"} // 元数据变化
+
+               
client.subscribeCallback([]nacosModel.SubscribeService{updatedInstance1}, nil)
+
+               assert.Len(t, adapterListener.addedEndpoints, 1, "Should fire 
an add/update event for 1 endpoint")
+               assert.Contains(t, adapterListener.addedEndpoints, "ep-1")
+               assert.Equal(t, "inst-1-updated", 
adapterListener.addedEndpoints["ep-1"].Name)
+               assert.Empty(t, adapterListener.removedEndpoints, "Should not 
remove any endpoints")
+       })
+
+       t.Run("Filter unhealthy or disabled instances", func(t *testing.T) {
+               adapterListener.reset()
+               unhealthyInstance := instance1
+               unhealthyInstance.Healthy = false
+               disabledInstance := instance2
+               disabledInstance.Enable = false
+
+               
client.subscribeCallback([]nacosModel.SubscribeService{unhealthyInstance, 
disabledInstance}, nil)
+
+               assert.Empty(t, adapterListener.addedEndpoints, "Should not add 
unhealthy/disabled endpoints")
+               // 因为这些实例之前被认为是活跃的,现在它们消失了(被过滤掉了),所以会触发删除
+               assert.Len(t, adapterListener.removedEndpoints, 1, "Should 
remove the previously active endpoints")

Review Comment:
   Comment contains Chinese characters. Comments should be in English for 
consistency with the rest of the codebase.



##########
pkg/adapter/llmregistry/registry/nacos/listener_test.go:
##########
@@ -0,0 +1,270 @@
+package nacos
+
+import (
+       "errors"
+       "sync"
+       "testing"
+       "time"
+)
+
+import (
+       "github.com/nacos-group/nacos-sdk-go/clients/naming_client"
+       nacosModel "github.com/nacos-group/nacos-sdk-go/model"
+       "github.com/nacos-group/nacos-sdk-go/vo"
+
+       "github.com/stretchr/testify/assert"
+)
+
+import (
+       "github.com/apache/dubbo-go-pixiu/pkg/model"
+)
+
+type mockNacosClient struct {
+       naming_client.INamingClient
+
+       mu                   sync.Mutex
+       servicesToReturn     nacosModel.ServiceList
+       servicesToReturnErr  error
+       subscribeCallback    func(services []nacosModel.SubscribeService, err 
error)
+       subscribedServices   map[string]bool
+       unsubscribedServices map[string]bool
+}
+
+func newMockNacosClient() *mockNacosClient {
+       return &mockNacosClient{
+               subscribedServices:   make(map[string]bool),
+               unsubscribedServices: make(map[string]bool),
+       }
+}
+
+func (m *mockNacosClient) GetAllServicesInfo(param vo.GetAllServiceInfoParam) 
(nacosModel.ServiceList, error) {
+       m.mu.Lock()
+       defer m.mu.Unlock()
+       return m.servicesToReturn, m.servicesToReturnErr
+}
+
+func (m *mockNacosClient) Subscribe(param *vo.SubscribeParam) error {
+       m.mu.Lock()
+       defer m.mu.Unlock()
+       m.subscribedServices[param.ServiceName] = true
+       m.subscribeCallback = param.SubscribeCallback
+       return nil
+}
+
+func (m *mockNacosClient) Unsubscribe(param *vo.SubscribeParam) error {
+       m.mu.Lock()
+       defer m.mu.Unlock()
+       m.unsubscribedServices[param.ServiceName] = true
+       return nil
+}
+
+type mockAdapterListener struct {
+       mu               sync.Mutex
+       addedEndpoints   map[string]*model.Endpoint
+       removedEndpoints map[string]*model.Endpoint
+}
+
+func newMockAdapterListener() *mockAdapterListener {
+       return &mockAdapterListener{
+               addedEndpoints:   make(map[string]*model.Endpoint),
+               removedEndpoints: make(map[string]*model.Endpoint),
+       }
+}
+
+func (m *mockAdapterListener) OnAddEndpoint(endpoint *model.Endpoint) error {
+       m.mu.Lock()
+       defer m.mu.Unlock()
+       m.addedEndpoints[endpoint.ID] = endpoint
+       return nil
+}
+
+func (m *mockAdapterListener) OnRemoveEndpoint(endpoint *model.Endpoint) error 
{
+       m.mu.Lock()
+       defer m.mu.Unlock()
+       m.removedEndpoints[endpoint.ID] = endpoint
+       return nil
+}
+
+func (m *mockAdapterListener) reset() {
+       m.mu.Lock()
+       defer m.mu.Unlock()
+       m.addedEndpoints = make(map[string]*model.Endpoint)
+       m.removedEndpoints = make(map[string]*model.Endpoint)
+}
+
+func testSetup() (*listener, *mockNacosClient, *mockAdapterListener) {
+       client := newMockNacosClient()
+       adapterListener := newMockAdapterListener()
+       regConf := &model.Registry{Group: "test_group", Namespace: 
"test_namespace"}
+       nacosListener := newNacosListener(client, regConf, adapterListener)
+       return nacosListener, client, adapterListener
+}
+
+func TestGenerateEndpoint(t *testing.T) {
+       t.Run("Full valid metadata", func(t *testing.T) {
+               instance := nacosModel.Instance{
+                       Metadata: map[string]string{
+                               "id":                         "ep-123",
+                               "name":                       "my-llm",
+                               "ip":                         "127.0.0.1",
+                               "port":                       "8080",
+                               "llm-meta.provider":          "openai",
+                               "llm-meta.retry_policy.name": 
"ExponentialBackoff",
+                               "llm-meta.fallback":          "true",
+                       },
+               }
+
+               endpoint := generateEndpoint(instance)
+               assert.NotNil(t, endpoint)
+               assert.Equal(t, "ep-123", endpoint.ID)
+               assert.Equal(t, "my-llm", endpoint.Name)
+               assert.Equal(t, "127.0.0.1", endpoint.Address.Address)
+               assert.Equal(t, 8080, endpoint.Address.Port)
+               assert.Equal(t, "openai", endpoint.LLMMeta.Provider)
+               assert.Equal(t, model.RetryerExponentialBackoff, 
endpoint.LLMMeta.RetryPolicy.Name)
+               assert.True(t, endpoint.LLMMeta.Fallback)
+       })
+
+       t.Run("Nil metadata", func(t *testing.T) {
+               instance := nacosModel.Instance{Metadata: nil}
+               endpoint := generateEndpoint(instance)
+               assert.Nil(t, endpoint)
+       })
+
+       t.Run("Invalid port", func(t *testing.T) {
+               instance := nacosModel.Instance{Metadata: 
map[string]string{"port": "not-a-number"}}
+               endpoint := generateEndpoint(instance)
+               assert.NotNil(t, endpoint)
+               assert.Equal(t, 0, endpoint.Address.Port)
+       })
+}
+
+func TestDiscoverAndSubscribe(t *testing.T) {
+       l, client, _ := testSetup()
+
+       t.Run("Discover and subscribe to a new service", func(t *testing.T) {
+               // CHANGE THIS LINE:
+               client.servicesToReturn = nacosModel.ServiceList{Doms: 
[]string{"service-A"}} // Was nacosModel.Service
+               l.discoverAndSubscribe()
+
+               assert.True(t, client.subscribedServices["service-A"], "Should 
subscribe to service-A")
+               _, loaded := l.subscribedServices.Load("service-A")
+               assert.True(t, loaded, "service-A should be in the 
subscribedServices map")
+       })
+
+       t.Run("Unsubscribe from a removed service", func(t *testing.T) {
+               // Ensure service-A is already subscribed for the test setup
+               l.subscribedServices.Store("service-A", true)
+               // CHANGE THIS LINE:
+               client.servicesToReturn = nacosModel.ServiceList{Doms: 
[]string{}} // Nacos now returns an empty list
+
+               l.discoverAndSubscribe()
+
+               assert.True(t, client.unsubscribedServices["service-A"], 
"Should unsubscribe from service-A")
+               _, loaded := l.subscribedServices.Load("service-A")
+               assert.False(t, loaded, "service-A should be removed from 
subscribedServices map")
+       })
+
+       t.Run("Handle Nacos API error", func(t *testing.T) {
+               client.subscribedServices = make(map[string]bool)
+               l.subscribedServices.Store("stale-service", true)
+
+               client.servicesToReturnErr = errors.New("Nacos unavailable")
+               l.discoverAndSubscribe()
+
+               _, loaded := l.subscribedServices.Load("stale-service")
+               assert.True(t, loaded, "Should not change subscriptions on API 
error")
+               assert.Empty(t, client.subscribedServices, "Should not attempt 
to subscribe on API error")
+       })
+}
+
+func TestServiceCallback(t *testing.T) {
+       l, client, adapterListener := testSetup()
+
+       _ = client.Subscribe(&vo.SubscribeParam{
+               ServiceName:       "service-A",
+               SubscribeCallback: l.serviceCallback,
+       })
+
+       instance1 := nacosModel.SubscribeService{
+               InstanceId: "ep-1", ServiceName: "service-A", Enable: true, 
Healthy: true,
+               Metadata: map[string]string{"id": "ep-1", "name": "inst-1"},
+       }
+       instance2 := nacosModel.SubscribeService{
+               InstanceId: "ep-2", ServiceName: "service-A", Enable: true, 
Healthy: true,
+               Metadata: map[string]string{"id": "ep-2", "name": "inst-2"},
+       }
+
+       t.Run("Initial instance registration", func(t *testing.T) {
+               adapterListener.reset()
+               
client.subscribeCallback([]nacosModel.SubscribeService{instance1, instance2}, 
nil)
+
+               assert.Len(t, adapterListener.addedEndpoints, 2, "Should add 2 
endpoints")
+               assert.Contains(t, adapterListener.addedEndpoints, "ep-1")
+               assert.Contains(t, adapterListener.addedEndpoints, "ep-2")
+               assert.Empty(t, adapterListener.removedEndpoints, "Should not 
remove any endpoints")
+       })
+
+       t.Run("One instance is removed", func(t *testing.T) {
+               adapterListener.reset()
+               
client.subscribeCallback([]nacosModel.SubscribeService{instance1}, nil)
+
+               assert.Empty(t, adapterListener.addedEndpoints, "Should not add 
any new endpoints")
+               assert.Len(t, adapterListener.removedEndpoints, 1, "Should 
remove 1 endpoint")
+               assert.Contains(t, adapterListener.removedEndpoints, "ep-2")
+       })
+
+       t.Run("One instance is updated", func(t *testing.T) {
+               adapterListener.reset()
+               updatedInstance1 := instance1
+               updatedInstance1.Metadata = map[string]string{"id": "ep-1", 
"name": "inst-1-updated"} // 元数据变化
+
+               
client.subscribeCallback([]nacosModel.SubscribeService{updatedInstance1}, nil)
+
+               assert.Len(t, adapterListener.addedEndpoints, 1, "Should fire 
an add/update event for 1 endpoint")
+               assert.Contains(t, adapterListener.addedEndpoints, "ep-1")
+               assert.Equal(t, "inst-1-updated", 
adapterListener.addedEndpoints["ep-1"].Name)
+               assert.Empty(t, adapterListener.removedEndpoints, "Should not 
remove any endpoints")
+       })
+
+       t.Run("Filter unhealthy or disabled instances", func(t *testing.T) {
+               adapterListener.reset()
+               unhealthyInstance := instance1
+               unhealthyInstance.Healthy = false
+               disabledInstance := instance2
+               disabledInstance.Enable = false
+
+               
client.subscribeCallback([]nacosModel.SubscribeService{unhealthyInstance, 
disabledInstance}, nil)
+
+               assert.Empty(t, adapterListener.addedEndpoints, "Should not add 
unhealthy/disabled endpoints")
+               // 因为这些实例之前被认为是活跃的,现在它们消失了(被过滤掉了),所以会触发删除
+               assert.Len(t, adapterListener.removedEndpoints, 1, "Should 
remove the previously active endpoints")
+       })
+
+       t.Run("No changes in instances", func(t *testing.T) {
+               // 首先,用 instance1 设置缓存
+               
client.subscribeCallback([]nacosModel.SubscribeService{instance1}, nil)
+
+               adapterListener.reset() // 重置监听器状态
+
+               // 再次用完全相同的数据调用
+               
client.subscribeCallback([]nacosModel.SubscribeService{instance1}, nil)
+
+               assert.Empty(t, adapterListener.addedEndpoints, "Should not 
trigger add for unchanged instance")
+               assert.Empty(t, adapterListener.removedEndpoints, "Should not 
trigger remove for unchanged instance")
+       })
+}
+
+func TestLifecycle(t *testing.T) {
+       l, _, _ := testSetup()
+
+       l.WatchAndHandle()
+
+       // 等待一小段时间,确保至少一个 ticker 周期已经过去
+       time.Sleep(100 * time.Millisecond)
+
+       // 测试 Close 是否能正常工作且不阻塞

Review Comment:
   Comments contain Chinese characters. Comments should be in English for 
consistency with the rest of the codebase.
   ```suggestion
        // Test whether Close works correctly and does not block
   ```



-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: notifications-unsubscr...@dubbo.apache.org

For queries about this service, please contact Infrastructure at:
us...@infra.apache.org


---------------------------------------------------------------------
To unsubscribe, e-mail: notifications-unsubscr...@dubbo.apache.org
For additional commands, e-mail: notifications-h...@dubbo.apache.org


Reply via email to