| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149115011511152115311541155115611571158115911601161116211631164116511661167116811691170117111721173117411751176117711781179118011811182118311841185118611871188118911901191119211931194119511961197119811991200120112021203120412051206120712081209121012111212121312141215121612171218121912201221122212231224122512261227122812291230123112321233123412351236123712381239124012411242124312441245124612471248124912501251125212531254125512561257125812591260126112621263126412651266126712681269127012711272127312741275127612771278127912801281128212831284128512861287128812891290129112921293129412951296129712981299130013011302130313041305130613071308130913101311131213131314131513161317131813191320132113221323132413251326132713281329133013311332133313341335133613371338133913401341134213431344134513461347134813491350135113521353135413551356135713581359136013611362136313641365136613671368136913701371137213731374137513761377137813791380138113821383138413851386138713881389139013911392139313941395139613971398139914001401140214031404140514061407140814091410141114121413141414151416141714181419142014211422142314241425142614271428142914301431143214331434143514361437143814391440144114421443144414451446144714481449145014511452145314541455145614571458145914601461146214631464146514661467146814691470147114721473147414751476147714781479148014811482148314841485148614871488148914901491149214931494149514961497149814991500150115021503150415051506150715081509151015111512151315141515151615171518151915201521152215231524152515261527152815291530153115321533153415351536153715381539154015411542154315441545154615471548154915501551155215531554155515561557155815591560156115621563156415651566156715681569157015711572157315741575157615771578157915801581158215831584158515861587158815891590159115921593159415951596159715981599160016011602160316041605160616071608160916101611161216131614161516161617161816191620162116221623162416251626162716281629163016311632163316341635163616371638163916401641164216431644164516461647164816491650165116521653165416551656165716581659166016611662166316641665166616671668166916701671167216731674167516761677167816791680168116821683168416851686168716881689169016911692169316941695169616971698169917001701170217031704170517061707170817091710171117121713171417151716171717181719172017211722172317241725172617271728172917301731173217331734173517361737173817391740174117421743174417451746174717481749175017511752175317541755175617571758175917601761176217631764176517661767176817691770177117721773177417751776177717781779178017811782178317841785178617871788178917901791179217931794179517961797179817991800180118021803180418051806180718081809181018111812181318141815181618171818181918201821182218231824182518261827182818291830183118321833183418351836183718381839184018411842184318441845184618471848184918501851185218531854185518561857185818591860186118621863186418651866186718681869187018711872187318741875187618771878187918801881188218831884188518861887188818891890189118921893189418951896189718981899190019011902190319041905190619071908190919101911191219131914191519161917191819191920192119221923192419251926192719281929193019311932193319341935193619371938193919401941194219431944194519461947194819491950195119521953195419551956195719581959196019611962196319641965196619671968196919701971197219731974197519761977197819791980198119821983198419851986198719881989199019911992199319941995199619971998199920002001200220032004200520062007200820092010201120122013201420152016201720182019202020212022202320242025202620272028202920302031203220332034203520362037203820392040204120422043204420452046204720482049205020512052205320542055205620572058205920602061206220632064206520662067206820692070207120722073207420752076207720782079208020812082208320842085208620872088208920902091209220932094209520962097209820992100210121022103210421052106210721082109211021112112211321142115211621172118211921202121212221232124212521262127212821292130213121322133213421352136213721382139214021412142214321442145214621472148214921502151215221532154215521562157215821592160216121622163216421652166216721682169217021712172217321742175217621772178217921802181218221832184218521862187218821892190219121922193219421952196219721982199220022012202220322042205220622072208220922102211221222132214221522162217221822192220222122222223222422252226222722282229223022312232223322342235223622372238223922402241224222432244224522462247224822492250225122522253225422552256225722582259226022612262226322642265226622672268226922702271227222732274227522762277227822792280228122822283228422852286228722882289229022912292229322942295229622972298229923002301230223032304230523062307230823092310231123122313231423152316231723182319232023212322232323242325232623272328232923302331233223332334233523362337233823392340234123422343234423452346234723482349235023512352235323542355235623572358235923602361236223632364236523662367236823692370237123722373237423752376237723782379238023812382238323842385238623872388238923902391239223932394239523962397239823992400240124022403240424052406240724082409241024112412241324142415241624172418241924202421242224232424242524262427242824292430243124322433243424352436243724382439244024412442244324442445244624472448244924502451245224532454245524562457245824592460246124622463246424652466246724682469247024712472247324742475247624772478247924802481248224832484248524862487248824892490249124922493249424952496249724982499250025012502250325042505250625072508250925102511251225132514251525162517251825192520252125222523252425252526252725282529253025312532253325342535253625372538253925402541254225432544254525462547254825492550255125522553255425552556255725582559256025612562256325642565256625672568256925702571257225732574257525762577257825792580258125822583258425852586258725882589259025912592259325942595259625972598259926002601260226032604260526062607260826092610261126122613261426152616261726182619262026212622262326242625262626272628262926302631263226332634263526362637263826392640264126422643264426452646264726482649265026512652265326542655265626572658265926602661266226632664266526662667266826692670267126722673267426752676267726782679268026812682268326842685268626872688268926902691269226932694269526962697269826992700270127022703270427052706270727082709271027112712271327142715271627172718271927202721272227232724272527262727272827292730273127322733273427352736273727382739274027412742274327442745274627472748274927502751275227532754275527562757275827592760276127622763276427652766276727682769277027712772277327742775277627772778277927802781278227832784278527862787278827892790279127922793279427952796279727982799280028012802280328042805280628072808280928102811281228132814281528162817281828192820282128222823282428252826282728282829283028312832283328342835283628372838283928402841284228432844284528462847284828492850285128522853285428552856285728582859286028612862286328642865286628672868286928702871287228732874287528762877287828792880288128822883288428852886288728882889289028912892289328942895289628972898289929002901290229032904290529062907290829092910291129122913291429152916291729182919292029212922292329242925292629272928292929302931293229332934293529362937293829392940294129422943294429452946294729482949295029512952295329542955295629572958295929602961296229632964296529662967296829692970297129722973297429752976297729782979298029812982298329842985298629872988298929902991299229932994299529962997299829993000300130023003300430053006300730083009301030113012301330143015301630173018301930203021302230233024302530263027302830293030303130323033303430353036303730383039304030413042304330443045304630473048304930503051305230533054305530563057305830593060306130623063306430653066306730683069307030713072307330743075307630773078307930803081308230833084308530863087308830893090309130923093309430953096309730983099310031013102310331043105310631073108310931103111311231133114311531163117311831193120312131223123312431253126312731283129313031313132313331343135313631373138313931403141314231433144314531463147314831493150315131523153315431553156315731583159316031613162316331643165316631673168316931703171317231733174317531763177317831793180318131823183318431853186318731883189319031913192319331943195319631973198319932003201320232033204320532063207320832093210321132123213321432153216321732183219322032213222322332243225322632273228322932303231323232333234323532363237323832393240324132423243324432453246324732483249325032513252325332543255325632573258325932603261326232633264326532663267326832693270327132723273327432753276327732783279328032813282328332843285328632873288328932903291329232933294329532963297329832993300330133023303330433053306330733083309331033113312331333143315331633173318331933203321332233233324332533263327332833293330333133323333333433353336333733383339334033413342334333443345334633473348334933503351335233533354335533563357335833593360336133623363336433653366336733683369337033713372337333743375337633773378337933803381338233833384338533863387338833893390339133923393339433953396339733983399340034013402340334043405340634073408340934103411341234133414341534163417341834193420342134223423342434253426342734283429343034313432343334343435343634373438343934403441344234433444344534463447344834493450345134523453345434553456345734583459346034613462346334643465346634673468346934703471347234733474347534763477347834793480348134823483348434853486348734883489349034913492349334943495349634973498349935003501350235033504350535063507350835093510351135123513351435153516351735183519352035213522352335243525352635273528352935303531353235333534353535363537353835393540354135423543354435453546354735483549355035513552355335543555355635573558355935603561356235633564356535663567356835693570357135723573357435753576357735783579358035813582358335843585358635873588358935903591359235933594359535963597359835993600360136023603360436053606360736083609361036113612361336143615361636173618361936203621362236233624362536263627362836293630363136323633363436353636363736383639364036413642364336443645364636473648364936503651365236533654365536563657365836593660366136623663366436653666366736683669367036713672367336743675367636773678367936803681368236833684368536863687368836893690369136923693369436953696369736983699370037013702370337043705370637073708370937103711371237133714371537163717371837193720372137223723372437253726372737283729373037313732373337343735373637373738373937403741374237433744374537463747374837493750375137523753375437553756375737583759376037613762376337643765376637673768376937703771377237733774377537763777377837793780378137823783378437853786378737883789379037913792379337943795379637973798379938003801380238033804380538063807380838093810381138123813381438153816381738183819382038213822382338243825382638273828382938303831383238333834383538363837383838393840384138423843384438453846384738483849385038513852385338543855385638573858385938603861386238633864386538663867386838693870387138723873387438753876387738783879388038813882388338843885388638873888388938903891389238933894389538963897389838993900390139023903390439053906390739083909391039113912391339143915391639173918391939203921392239233924392539263927392839293930393139323933393439353936393739383939394039413942394339443945394639473948394939503951395239533954395539563957395839593960396139623963396439653966396739683969397039713972397339743975397639773978397939803981398239833984398539863987398839893990399139923993399439953996399739983999400040014002400340044005400640074008400940104011401240134014401540164017401840194020402140224023402440254026402740284029403040314032403340344035403640374038403940404041404240434044404540464047404840494050405140524053405440554056405740584059406040614062406340644065406640674068406940704071407240734074407540764077407840794080408140824083408440854086408740884089409040914092409340944095409640974098409941004101410241034104410541064107410841094110411141124113411441154116411741184119412041214122412341244125412641274128412941304131413241334134413541364137413841394140414141424143414441454146414741484149415041514152415341544155415641574158415941604161416241634164416541664167416841694170417141724173417441754176417741784179418041814182418341844185418641874188418941904191419241934194419541964197419841994200420142024203420442054206420742084209421042114212421342144215421642174218421942204221422242234224422542264227422842294230423142324233423442354236423742384239424042414242424342444245424642474248424942504251425242534254425542564257425842594260426142624263426442654266426742684269427042714272427342744275427642774278427942804281428242834284428542864287428842894290429142924293429442954296429742984299430043014302430343044305430643074308430943104311431243134314431543164317431843194320432143224323432443254326432743284329433043314332433343344335433643374338433943404341434243434344434543464347434843494350435143524353435443554356435743584359436043614362436343644365436643674368436943704371437243734374437543764377437843794380438143824383438443854386438743884389439043914392439343944395439643974398439944004401440244034404440544064407440844094410441144124413441444154416441744184419442044214422442344244425442644274428442944304431443244334434443544364437443844394440444144424443444444454446444744484449445044514452445344544455445644574458445944604461446244634464446544664467446844694470447144724473447444754476447744784479448044814482448344844485448644874488448944904491449244934494449544964497449844994500450145024503450445054506450745084509451045114512451345144515451645174518451945204521452245234524452545264527452845294530453145324533453445354536453745384539454045414542454345444545454645474548454945504551455245534554455545564557455845594560456145624563456445654566456745684569457045714572457345744575457645774578457945804581458245834584458545864587458845894590459145924593459445954596459745984599460046014602460346044605460646074608460946104611461246134614461546164617461846194620462146224623462446254626462746284629463046314632463346344635463646374638463946404641464246434644464546464647464846494650465146524653465446554656465746584659466046614662466346644665466646674668466946704671467246734674467546764677467846794680468146824683468446854686468746884689469046914692469346944695469646974698469947004701470247034704470547064707470847094710471147124713471447154716471747184719472047214722472347244725472647274728472947304731473247334734473547364737473847394740474147424743474447454746474747484749475047514752475347544755475647574758475947604761476247634764476547664767476847694770477147724773477447754776477747784779478047814782478347844785478647874788478947904791479247934794479547964797479847994800480148024803480448054806480748084809481048114812481348144815481648174818481948204821482248234824482548264827482848294830483148324833483448354836483748384839484048414842484348444845484648474848484948504851485248534854485548564857485848594860486148624863486448654866486748684869487048714872487348744875487648774878487948804881488248834884488548864887488848894890489148924893489448954896489748984899490049014902490349044905490649074908490949104911491249134914491549164917491849194920492149224923492449254926492749284929493049314932493349344935493649374938493949404941494249434944494549464947494849494950495149524953495449554956495749584959496049614962496349644965496649674968496949704971497249734974497549764977497849794980498149824983498449854986498749884989499049914992499349944995499649974998499950005001500250035004500550065007500850095010501150125013501450155016501750185019502050215022502350245025502650275028502950305031503250335034503550365037503850395040504150425043504450455046504750485049505050515052505350545055505650575058505950605061506250635064506550665067506850695070507150725073507450755076507750785079508050815082508350845085508650875088508950905091509250935094509550965097509850995100510151025103510451055106510751085109511051115112511351145115511651175118511951205121512251235124512551265127512851295130513151325133513451355136513751385139514051415142514351445145514651475148514951505151515251535154515551565157515851595160516151625163516451655166516751685169517051715172517351745175517651775178517951805181518251835184518551865187518851895190519151925193519451955196519751985199520052015202520352045205520652075208520952105211521252135214521552165217521852195220522152225223522452255226522752285229523052315232523352345235523652375238523952405241524252435244524552465247524852495250525152525253525452555256525752585259526052615262526352645265526652675268526952705271527252735274527552765277527852795280528152825283528452855286528752885289529052915292529352945295529652975298529953005301530253035304530553065307530853095310531153125313531453155316531753185319532053215322532353245325532653275328532953305331533253335334533553365337533853395340534153425343534453455346534753485349535053515352535353545355535653575358535953605361536253635364536553665367536853695370537153725373537453755376537753785379538053815382538353845385538653875388538953905391539253935394539553965397539853995400540154025403540454055406540754085409541054115412541354145415541654175418541954205421542254235424542554265427542854295430543154325433543454355436543754385439544054415442544354445445544654475448544954505451545254535454545554565457545854595460546154625463546454655466546754685469547054715472547354745475547654775478547954805481548254835484548554865487548854895490549154925493549454955496549754985499550055015502550355045505550655075508550955105511551255135514551555165517551855195520552155225523552455255526552755285529553055315532553355345535553655375538553955405541554255435544554555465547554855495550555155525553555455555556555755585559556055615562556355645565556655675568556955705571557255735574557555765577557855795580558155825583558455855586558755885589559055915592559355945595559655975598559956005601560256035604560556065607560856095610561156125613561456155616561756185619562056215622562356245625562656275628562956305631563256335634563556365637563856395640564156425643564456455646564756485649565056515652565356545655565656575658565956605661566256635664566556665667566856695670567156725673567456755676567756785679568056815682568356845685568656875688568956905691569256935694569556965697569856995700570157025703570457055706570757085709571057115712571357145715571657175718571957205721572257235724572557265727572857295730573157325733573457355736573757385739574057415742574357445745574657475748574957505751575257535754575557565757575857595760576157625763576457655766576757685769577057715772577357745775577657775778577957805781578257835784578557865787578857895790579157925793579457955796579757985799580058015802580358045805580658075808580958105811581258135814581558165817581858195820582158225823582458255826582758285829583058315832583358345835583658375838583958405841584258435844584558465847584858495850585158525853585458555856585758585859586058615862586358645865586658675868586958705871587258735874587558765877587858795880588158825883588458855886588758885889589058915892589358945895589658975898589959005901590259035904590559065907590859095910591159125913591459155916591759185919592059215922592359245925592659275928592959305931593259335934593559365937593859395940594159425943594459455946594759485949595059515952595359545955595659575958595959605961596259635964596559665967596859695970597159725973597459755976597759785979598059815982598359845985598659875988598959905991599259935994599559965997599859996000600160026003600460056006600760086009601060116012601360146015601660176018601960206021602260236024602560266027602860296030603160326033603460356036603760386039604060416042604360446045604660476048604960506051605260536054605560566057605860596060606160626063606460656066606760686069607060716072607360746075607660776078607960806081608260836084608560866087608860896090609160926093609460956096609760986099610061016102610361046105610661076108610961106111611261136114611561166117611861196120612161226123612461256126612761286129613061316132613361346135613661376138613961406141614261436144614561466147614861496150615161526153615461556156615761586159616061616162616361646165616661676168616961706171617261736174617561766177617861796180618161826183618461856186618761886189619061916192619361946195619661976198619962006201620262036204620562066207620862096210621162126213621462156216621762186219622062216222622362246225622662276228622962306231623262336234623562366237623862396240624162426243624462456246624762486249625062516252625362546255625662576258625962606261626262636264626562666267626862696270627162726273627462756276627762786279628062816282628362846285628662876288628962906291629262936294629562966297629862996300630163026303630463056306630763086309631063116312631363146315631663176318631963206321632263236324632563266327632863296330633163326333633463356336633763386339634063416342634363446345634663476348634963506351635263536354635563566357635863596360636163626363636463656366636763686369637063716372637363746375637663776378637963806381638263836384638563866387638863896390639163926393639463956396639763986399640064016402640364046405640664076408640964106411641264136414641564166417641864196420642164226423642464256426642764286429643064316432643364346435643664376438643964406441644264436444644564466447644864496450645164526453645464556456645764586459646064616462646364646465646664676468646964706471647264736474647564766477647864796480648164826483648464856486648764886489649064916492649364946495649664976498649965006501650265036504650565066507650865096510651165126513651465156516651765186519652065216522652365246525652665276528652965306531653265336534653565366537653865396540654165426543654465456546654765486549655065516552655365546555655665576558655965606561656265636564656565666567656865696570657165726573657465756576657765786579658065816582658365846585658665876588658965906591659265936594659565966597659865996600660166026603660466056606660766086609661066116612661366146615661666176618661966206621662266236624662566266627662866296630663166326633663466356636663766386639664066416642664366446645664666476648664966506651665266536654665566566657665866596660666166626663666466656666666766686669667066716672667366746675667666776678667966806681668266836684668566866687668866896690669166926693669466956696669766986699670067016702670367046705670667076708670967106711671267136714671567166717671867196720672167226723672467256726672767286729673067316732673367346735673667376738673967406741674267436744674567466747674867496750675167526753675467556756675767586759676067616762676367646765676667676768676967706771677267736774677567766777677867796780678167826783678467856786678767886789679067916792679367946795679667976798679968006801680268036804680568066807680868096810681168126813681468156816681768186819682068216822682368246825682668276828682968306831683268336834683568366837683868396840684168426843684468456846684768486849685068516852685368546855685668576858685968606861686268636864686568666867686868696870687168726873687468756876687768786879688068816882688368846885688668876888688968906891689268936894689568966897689868996900690169026903690469056906690769086909691069116912691369146915691669176918691969206921692269236924692569266927692869296930693169326933693469356936693769386939694069416942694369446945694669476948694969506951695269536954695569566957695869596960696169626963696469656966696769686969697069716972697369746975697669776978697969806981698269836984698569866987698869896990699169926993699469956996699769986999700070017002700370047005700670077008700970107011701270137014701570167017701870197020702170227023702470257026702770287029703070317032703370347035703670377038703970407041704270437044704570467047704870497050705170527053705470557056705770587059706070617062706370647065706670677068706970707071707270737074707570767077707870797080708170827083708470857086708770887089709070917092709370947095709670977098709971007101710271037104710571067107710871097110711171127113711471157116711771187119712071217122712371247125712671277128712971307131713271337134713571367137713871397140714171427143714471457146714771487149715071517152715371547155715671577158715971607161716271637164716571667167716871697170717171727173717471757176717771787179718071817182718371847185718671877188718971907191719271937194719571967197719871997200720172027203720472057206720772087209721072117212721372147215721672177218721972207221722272237224722572267227722872297230723172327233723472357236723772387239724072417242724372447245724672477248724972507251725272537254725572567257725872597260726172627263726472657266726772687269727072717272727372747275727672777278727972807281728272837284728572867287728872897290729172927293729472957296729772987299730073017302730373047305730673077308730973107311731273137314731573167317731873197320732173227323732473257326732773287329733073317332733373347335733673377338733973407341734273437344734573467347734873497350735173527353735473557356735773587359736073617362736373647365736673677368736973707371737273737374737573767377737873797380738173827383738473857386738773887389739073917392739373947395739673977398739974007401740274037404740574067407740874097410741174127413741474157416741774187419742074217422742374247425742674277428742974307431743274337434743574367437743874397440744174427443744474457446744774487449745074517452745374547455745674577458745974607461746274637464746574667467746874697470747174727473747474757476747774787479748074817482748374847485748674877488748974907491749274937494749574967497749874997500750175027503750475057506750775087509751075117512751375147515751675177518751975207521752275237524752575267527752875297530753175327533753475357536753775387539754075417542754375447545754675477548754975507551755275537554755575567557755875597560756175627563756475657566756775687569757075717572757375747575757675777578757975807581758275837584758575867587758875897590759175927593759475957596759775987599760076017602760376047605760676077608760976107611761276137614761576167617761876197620762176227623762476257626762776287629763076317632763376347635763676377638763976407641764276437644764576467647764876497650765176527653765476557656765776587659766076617662766376647665766676677668766976707671767276737674767576767677767876797680768176827683768476857686768776887689769076917692769376947695769676977698769977007701770277037704770577067707770877097710771177127713771477157716771777187719772077217722772377247725772677277728772977307731773277337734773577367737773877397740774177427743774477457746774777487749775077517752775377547755775677577758775977607761776277637764776577667767776877697770777177727773777477757776777777787779778077817782778377847785778677877788778977907791779277937794779577967797779877997800780178027803780478057806780778087809781078117812781378147815781678177818781978207821782278237824782578267827782878297830783178327833783478357836783778387839784078417842784378447845784678477848784978507851785278537854785578567857785878597860786178627863786478657866786778687869787078717872787378747875787678777878787978807881788278837884788578867887788878897890789178927893789478957896789778987899790079017902790379047905790679077908790979107911791279137914791579167917791879197920792179227923792479257926792779287929793079317932793379347935793679377938793979407941794279437944794579467947794879497950795179527953795479557956795779587959796079617962796379647965796679677968796979707971797279737974797579767977797879797980798179827983798479857986798779887989799079917992799379947995799679977998799980008001800280038004800580068007800880098010801180128013801480158016801780188019802080218022802380248025802680278028802980308031803280338034803580368037803880398040804180428043804480458046804780488049805080518052805380548055805680578058805980608061806280638064806580668067806880698070807180728073807480758076807780788079808080818082808380848085808680878088808980908091809280938094809580968097809880998100810181028103810481058106810781088109811081118112811381148115811681178118811981208121812281238124812581268127812881298130813181328133813481358136813781388139814081418142814381448145814681478148814981508151815281538154815581568157815881598160816181628163816481658166816781688169817081718172817381748175817681778178817981808181818281838184818581868187818881898190819181928193819481958196819781988199820082018202820382048205820682078208820982108211821282138214821582168217821882198220822182228223822482258226822782288229823082318232823382348235823682378238823982408241824282438244824582468247824882498250825182528253825482558256825782588259826082618262826382648265826682678268826982708271827282738274827582768277827882798280828182828283828482858286828782888289829082918292829382948295829682978298829983008301830283038304830583068307830883098310831183128313831483158316831783188319832083218322832383248325832683278328832983308331833283338334833583368337833883398340834183428343834483458346834783488349835083518352835383548355835683578358835983608361836283638364836583668367836883698370837183728373837483758376837783788379838083818382838383848385838683878388838983908391839283938394839583968397839883998400840184028403840484058406840784088409841084118412841384148415841684178418841984208421842284238424842584268427842884298430843184328433843484358436843784388439844084418442844384448445844684478448844984508451845284538454845584568457845884598460846184628463846484658466846784688469847084718472847384748475847684778478847984808481848284838484848584868487848884898490849184928493849484958496849784988499850085018502850385048505850685078508850985108511851285138514851585168517851885198520852185228523852485258526852785288529853085318532853385348535853685378538853985408541854285438544854585468547854885498550855185528553855485558556855785588559856085618562856385648565856685678568856985708571857285738574857585768577857885798580858185828583858485858586858785888589859085918592859385948595859685978598859986008601860286038604860586068607860886098610861186128613861486158616861786188619862086218622862386248625862686278628862986308631863286338634863586368637863886398640864186428643864486458646864786488649865086518652865386548655865686578658865986608661866286638664866586668667866886698670867186728673867486758676867786788679868086818682868386848685868686878688868986908691869286938694869586968697869886998700870187028703870487058706870787088709871087118712871387148715871687178718871987208721872287238724872587268727872887298730873187328733873487358736873787388739874087418742874387448745874687478748874987508751875287538754875587568757875887598760876187628763876487658766876787688769877087718772877387748775877687778778877987808781878287838784878587868787878887898790879187928793879487958796879787988799880088018802880388048805880688078808880988108811881288138814881588168817881888198820882188228823882488258826882788288829883088318832883388348835883688378838883988408841884288438844884588468847884888498850885188528853885488558856885788588859886088618862886388648865886688678868886988708871887288738874887588768877887888798880888188828883888488858886888788888889889088918892889388948895889688978898889989008901890289038904890589068907890889098910891189128913891489158916891789188919892089218922892389248925892689278928892989308931893289338934893589368937893889398940894189428943894489458946894789488949895089518952895389548955895689578958895989608961896289638964896589668967896889698970897189728973897489758976897789788979898089818982898389848985898689878988898989908991899289938994899589968997899889999000900190029003900490059006900790089009901090119012901390149015901690179018901990209021902290239024902590269027902890299030903190329033903490359036903790389039904090419042904390449045904690479048904990509051905290539054905590569057905890599060906190629063906490659066906790689069907090719072907390749075907690779078907990809081908290839084908590869087908890899090909190929093909490959096909790989099910091019102910391049105910691079108910991109111911291139114911591169117911891199120912191229123912491259126912791289129913091319132913391349135913691379138913991409141914291439144914591469147914891499150915191529153915491559156915791589159916091619162916391649165916691679168916991709171917291739174917591769177917891799180918191829183918491859186918791889189919091919192919391949195919691979198919992009201920292039204920592069207920892099210921192129213921492159216921792189219922092219222922392249225922692279228922992309231923292339234923592369237923892399240924192429243924492459246924792489249925092519252925392549255925692579258925992609261926292639264926592669267926892699270927192729273927492759276927792789279928092819282928392849285928692879288928992909291929292939294929592969297929892999300930193029303930493059306930793089309931093119312931393149315931693179318931993209321932293239324932593269327932893299330933193329333933493359336933793389339934093419342934393449345934693479348934993509351935293539354935593569357935893599360936193629363936493659366936793689369937093719372937393749375937693779378937993809381938293839384938593869387938893899390939193929393939493959396939793989399940094019402940394049405940694079408940994109411941294139414941594169417941894199420942194229423942494259426942794289429943094319432943394349435943694379438943994409441944294439444944594469447944894499450945194529453945494559456945794589459946094619462946394649465946694679468946994709471947294739474947594769477947894799480948194829483948494859486948794889489949094919492949394949495949694979498949995009501950295039504950595069507950895099510951195129513951495159516951795189519952095219522952395249525952695279528952995309531953295339534953595369537953895399540954195429543954495459546954795489549955095519552955395549555955695579558955995609561956295639564956595669567956895699570957195729573957495759576957795789579958095819582958395849585958695879588958995909591959295939594959595969597959895999600960196029603960496059606960796089609961096119612961396149615961696179618961996209621962296239624962596269627962896299630963196329633963496359636963796389639964096419642964396449645964696479648964996509651965296539654965596569657965896599660966196629663966496659666966796689669967096719672967396749675967696779678967996809681968296839684968596869687968896899690969196929693969496959696969796989699970097019702970397049705970697079708970997109711971297139714971597169717971897199720972197229723972497259726972797289729973097319732973397349735973697379738973997409741974297439744974597469747974897499750975197529753975497559756975797589759976097619762976397649765976697679768976997709771977297739774977597769777977897799780978197829783978497859786978797889789979097919792979397949795979697979798979998009801980298039804980598069807980898099810981198129813981498159816981798189819982098219822982398249825982698279828982998309831983298339834983598369837983898399840984198429843984498459846984798489849985098519852985398549855985698579858985998609861986298639864986598669867986898699870987198729873987498759876987798789879988098819882988398849885988698879888988998909891989298939894989598969897989898999900990199029903990499059906990799089909991099119912991399149915991699179918991999209921992299239924992599269927992899299930993199329933993499359936993799389939994099419942994399449945994699479948994999509951995299539954995599569957995899599960996199629963996499659966996799689969997099719972997399749975997699779978997999809981998299839984998599869987998899899990999199929993999499959996999799989999100001000110002100031000410005100061000710008100091001010011100121001310014100151001610017100181001910020100211002210023100241002510026100271002810029100301003110032100331003410035100361003710038100391004010041100421004310044100451004610047100481004910050100511005210053100541005510056100571005810059100601006110062100631006410065100661006710068100691007010071100721007310074100751007610077100781007910080100811008210083100841008510086100871008810089100901009110092100931009410095100961009710098100991010010101101021010310104101051010610107101081010910110101111011210113101141011510116101171011810119101201012110122101231012410125101261012710128101291013010131101321013310134101351013610137101381013910140101411014210143101441014510146101471014810149101501015110152101531015410155101561015710158101591016010161101621016310164101651016610167101681016910170101711017210173101741017510176101771017810179101801018110182101831018410185101861018710188101891019010191101921019310194101951019610197101981019910200102011020210203102041020510206102071020810209102101021110212102131021410215102161021710218102191022010221102221022310224102251022610227102281022910230102311023210233102341023510236102371023810239102401024110242102431024410245102461024710248102491025010251102521025310254102551025610257102581025910260102611026210263102641026510266102671026810269102701027110272102731027410275102761027710278102791028010281102821028310284102851028610287102881028910290102911029210293102941029510296102971029810299103001030110302103031030410305103061030710308103091031010311103121031310314103151031610317103181031910320103211032210323103241032510326103271032810329103301033110332103331033410335103361033710338103391034010341103421034310344103451034610347103481034910350103511035210353103541035510356103571035810359103601036110362103631036410365103661036710368103691037010371103721037310374103751037610377103781037910380103811038210383103841038510386103871038810389103901039110392103931039410395103961039710398103991040010401104021040310404104051040610407104081040910410104111041210413104141041510416104171041810419104201042110422104231042410425104261042710428104291043010431104321043310434104351043610437104381043910440104411044210443104441044510446104471044810449104501045110452104531045410455104561045710458104591046010461104621046310464104651046610467104681046910470104711047210473104741047510476104771047810479104801048110482104831048410485104861048710488104891049010491104921049310494104951049610497104981049910500105011050210503105041050510506105071050810509105101051110512105131051410515105161051710518105191052010521105221052310524105251052610527105281052910530105311053210533105341053510536105371053810539105401054110542105431054410545105461054710548105491055010551105521055310554105551055610557105581055910560105611056210563105641056510566105671056810569105701057110572105731057410575105761057710578105791058010581105821058310584105851058610587105881058910590105911059210593105941059510596105971059810599106001060110602106031060410605106061060710608106091061010611106121061310614106151061610617106181061910620106211062210623106241062510626106271062810629106301063110632106331063410635106361063710638106391064010641106421064310644106451064610647106481064910650106511065210653106541065510656106571065810659106601066110662106631066410665106661066710668106691067010671106721067310674106751067610677106781067910680106811068210683106841068510686106871068810689106901069110692106931069410695106961069710698106991070010701107021070310704107051070610707107081070910710107111071210713107141071510716107171071810719107201072110722107231072410725107261072710728107291073010731107321073310734107351073610737107381073910740107411074210743107441074510746107471074810749107501075110752107531075410755107561075710758107591076010761107621076310764107651076610767107681076910770107711077210773107741077510776107771077810779107801078110782107831078410785107861078710788107891079010791107921079310794107951079610797107981079910800108011080210803108041080510806108071080810809108101081110812108131081410815108161081710818108191082010821108221082310824108251082610827108281082910830108311083210833108341083510836108371083810839108401084110842108431084410845108461084710848108491085010851108521085310854108551085610857108581085910860108611086210863108641086510866108671086810869108701087110872108731087410875108761087710878108791088010881108821088310884108851088610887108881088910890108911089210893108941089510896108971089810899109001090110902109031090410905109061090710908109091091010911109121091310914109151091610917109181091910920109211092210923109241092510926109271092810929109301093110932109331093410935109361093710938109391094010941109421094310944109451094610947109481094910950109511095210953109541095510956109571095810959109601096110962109631096410965109661096710968109691097010971109721097310974109751097610977109781097910980109811098210983109841098510986 | /* * * Copyright 2017 gRPC authors. * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * *     http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. * */#include <deque>#include <memory>#include <mutex>#include <numeric>#include <set>#include <sstream>#include <string>#include <thread>#include <vector>#include <gmock/gmock.h>#include <gtest/gtest.h>#include "absl/functional/bind_front.h"#include "absl/memory/memory.h"#include "absl/strings/str_cat.h"#include "absl/strings/str_join.h"#include "absl/types/optional.h"#include <grpc/grpc.h>#include <grpc/grpc_security.h>#include <grpc/support/alloc.h>#include <grpc/support/log.h>#include <grpc/support/time.h>#include <grpcpp/channel.h>#include <grpcpp/client_context.h>#include <grpcpp/create_channel.h>#include <grpcpp/security/tls_certificate_provider.h>#include <grpcpp/server.h>#include <grpcpp/server_builder.h>#include <grpcpp/xds_server_builder.h>#include "src/core/ext/filters/client_channel/backup_poller.h"#include "src/core/ext/filters/client_channel/lb_policy/xds/xds_channel_args.h"#include "src/core/ext/filters/client_channel/resolver/fake/fake_resolver.h"#include "src/core/ext/filters/client_channel/server_address.h"#include "src/core/ext/xds/certificate_provider_registry.h"#include "src/core/ext/xds/xds_api.h"#include "src/core/ext/xds/xds_channel_args.h"#include "src/core/ext/xds/xds_client.h"#include "src/core/lib/channel/channel_args.h"#include "src/core/lib/gpr/env.h"#include "src/core/lib/gpr/string.h"#include "src/core/lib/gpr/time_precise.h"#include "src/core/lib/gpr/tmpfile.h"#include "src/core/lib/gprpp/ref_counted_ptr.h"#include "src/core/lib/gprpp/sync.h"#include "src/core/lib/gprpp/time_util.h"#include "src/core/lib/iomgr/load_file.h"#include "src/core/lib/iomgr/parse_address.h"#include "src/core/lib/iomgr/sockaddr.h"#include "src/core/lib/security/credentials/fake/fake_credentials.h"#include "src/cpp/client/secure_credentials.h"#include "src/cpp/server/csds/csds.h"#include "src/cpp/server/secure_server_credentials.h"#include "src/proto/grpc/testing/echo.grpc.pb.h"#include "src/proto/grpc/testing/xds/ads_for_test.grpc.pb.h"#include "src/proto/grpc/testing/xds/cds_for_test.grpc.pb.h"#include "src/proto/grpc/testing/xds/eds_for_test.grpc.pb.h"#include "src/proto/grpc/testing/xds/lds_rds_for_test.grpc.pb.h"#include "src/proto/grpc/testing/xds/lrs_for_test.grpc.pb.h"#include "src/proto/grpc/testing/xds/v3/ads.grpc.pb.h"#include "src/proto/grpc/testing/xds/v3/aggregate_cluster.grpc.pb.h"#include "src/proto/grpc/testing/xds/v3/cluster.grpc.pb.h"#include "src/proto/grpc/testing/xds/v3/csds.grpc.pb.h"#include "src/proto/grpc/testing/xds/v3/discovery.grpc.pb.h"#include "src/proto/grpc/testing/xds/v3/endpoint.grpc.pb.h"#include "src/proto/grpc/testing/xds/v3/fault.grpc.pb.h"#include "src/proto/grpc/testing/xds/v3/http_connection_manager.grpc.pb.h"#include "src/proto/grpc/testing/xds/v3/listener.grpc.pb.h"#include "src/proto/grpc/testing/xds/v3/lrs.grpc.pb.h"#include "src/proto/grpc/testing/xds/v3/route.grpc.pb.h"#include "src/proto/grpc/testing/xds/v3/router.grpc.pb.h"#include "src/proto/grpc/testing/xds/v3/tls.grpc.pb.h"#include "test/core/util/port.h"#include "test/core/util/resolve_localhost_ip46.h"#include "test/core/util/test_config.h"#include "test/cpp/end2end/test_service_impl.h"namespace grpc {namespace testing {namespace {using std::chrono::system_clock;using ::envoy::admin::v3::ClientResourceStatus;using ::envoy::config::cluster::v3::CircuitBreakers;using ::envoy::config::cluster::v3::Cluster;using ::envoy::config::cluster::v3::CustomClusterType;using ::envoy::config::cluster::v3::RoutingPriority;using ::envoy::config::endpoint::v3::ClusterLoadAssignment;using ::envoy::config::endpoint::v3::HealthStatus;using ::envoy::config::listener::v3::Listener;using ::envoy::config::route::v3::RouteConfiguration;using ::envoy::extensions::clusters::aggregate::v3::ClusterConfig;using ::envoy::extensions::filters::http::fault::v3::HTTPFault;using ::envoy::extensions::filters::network::http_connection_manager::v3::    HttpConnectionManager;using ::envoy::extensions::filters::network::http_connection_manager::v3::    HttpFilter;using ::envoy::extensions::transport_sockets::tls::v3::DownstreamTlsContext;using ::envoy::extensions::transport_sockets::tls::v3::UpstreamTlsContext;using ::envoy::type::matcher::v3::StringMatcher;using ::envoy::type::v3::FractionalPercent;constexpr char kLdsTypeUrl[] =    "type.googleapis.com/envoy.config.listener.v3.Listener";constexpr char kRdsTypeUrl[] =    "type.googleapis.com/envoy.config.route.v3.RouteConfiguration";constexpr char kCdsTypeUrl[] =    "type.googleapis.com/envoy.config.cluster.v3.Cluster";constexpr char kEdsTypeUrl[] =    "type.googleapis.com/envoy.config.endpoint.v3.ClusterLoadAssignment";constexpr char kLdsV2TypeUrl[] = "type.googleapis.com/envoy.api.v2.Listener";constexpr char kRdsV2TypeUrl[] =    "type.googleapis.com/envoy.api.v2.RouteConfiguration";constexpr char kCdsV2TypeUrl[] = "type.googleapis.com/envoy.api.v2.Cluster";constexpr char kEdsV2TypeUrl[] =    "type.googleapis.com/envoy.api.v2.ClusterLoadAssignment";constexpr char kDefaultLocalityRegion[] = "xds_default_locality_region";constexpr char kDefaultLocalityZone[] = "xds_default_locality_zone";constexpr char kLbDropType[] = "lb";constexpr char kThrottleDropType[] = "throttle";constexpr char kServerName[] = "server.example.com";constexpr char kDefaultRouteConfigurationName[] = "route_config_name";constexpr char kDefaultClusterName[] = "cluster_name";constexpr char kDefaultEdsServiceName[] = "eds_service_name";constexpr int kDefaultLocalityWeight = 3;constexpr int kDefaultLocalityPriority = 0;constexpr char kRequestMessage[] = "Live long and prosper.";constexpr char kDefaultServiceConfig[] =    "{\n"    "  \"loadBalancingConfig\":[\n"    "    { \"does_not_exist\":{} },\n"    "    { \"xds_cluster_resolver_experimental\":{\n"    "      \"discoveryMechanisms\": [\n"    "      { \"clusterName\": \"server.example.com\",\n"    "        \"type\": \"EDS\",\n"    "        \"lrsLoadReportingServerName\": \"\"\n"    "      } ]\n"    "    } }\n"    "  ]\n"    "}";constexpr char kDefaultServiceConfigWithoutLoadReporting[] =    "{\n"    "  \"loadBalancingConfig\":[\n"    "    { \"does_not_exist\":{} },\n"    "    { \"xds_cluster_resolver_experimental\":{\n"    "      \"discoveryMechanisms\": [\n"    "      { \"clusterName\": \"server.example.com\",\n"    "        \"type\": \"EDS\"\n"    "      } ]\n"    "    } }\n"    "  ]\n"    "}";constexpr char kBootstrapFileV3[] =    "{\n"    "  \"xds_servers\": [\n"    "    {\n"    "      \"server_uri\": \"fake:///xds_server\",\n"    "      \"channel_creds\": [\n"    "        {\n"    "          \"type\": \"fake\"\n"    "        }\n"    "      ],\n"    "      \"server_features\": [\"xds_v3\"]\n"    "    }\n"    "  ],\n"    "  \"node\": {\n"    "    \"id\": \"xds_end2end_test\",\n"    "    \"cluster\": \"test\",\n"    "    \"metadata\": {\n"    "      \"foo\": \"bar\"\n"    "    },\n"    "    \"locality\": {\n"    "      \"region\": \"corp\",\n"    "      \"zone\": \"svl\",\n"    "      \"sub_zone\": \"mp3\"\n"    "    }\n"    "  },\n"    "  \"server_listener_resource_name_template\": "    "\"grpc/server?xds.resource.listening_address=%s\",\n"    "  \"certificate_providers\": {\n"    "    \"fake_plugin1\": {\n"    "      \"plugin_name\": \"fake1\"\n"    "    },\n"    "    \"fake_plugin2\": {\n"    "      \"plugin_name\": \"fake2\"\n"    "    },\n"    "    \"file_plugin\": {\n"    "      \"plugin_name\": \"file_watcher\",\n"    "      \"config\": {\n"    "        \"certificate_file\": \"src/core/tsi/test_creds/client.pem\",\n"    "        \"private_key_file\": \"src/core/tsi/test_creds/client.key\",\n"    "        \"ca_certificate_file\": \"src/core/tsi/test_creds/ca.pem\"\n"    "      }"    "    }\n"    "  }\n"    "}\n";constexpr char kBootstrapFileV2[] =    "{\n"    "  \"xds_servers\": [\n"    "    {\n"    "      \"server_uri\": \"fake:///xds_server\",\n"    "      \"channel_creds\": [\n"    "        {\n"    "          \"type\": \"fake\"\n"    "        }\n"    "      ]\n"    "    }\n"    "  ],\n"    "  \"node\": {\n"    "    \"id\": \"xds_end2end_test\",\n"    "    \"cluster\": \"test\",\n"    "    \"metadata\": {\n"    "      \"foo\": \"bar\"\n"    "    },\n"    "    \"locality\": {\n"    "      \"region\": \"corp\",\n"    "      \"zone\": \"svl\",\n"    "      \"sub_zone\": \"mp3\"\n"    "    }\n"    "  }\n"    "}\n";constexpr char kCaCertPath[] = "src/core/tsi/test_creds/ca.pem";constexpr char kServerCertPath[] = "src/core/tsi/test_creds/server1.pem";constexpr char kServerKeyPath[] = "src/core/tsi/test_creds/server1.key";constexpr char kClientCertPath[] = "src/core/tsi/test_creds/client.pem";constexpr char kClientKeyPath[] = "src/core/tsi/test_creds/client.key";constexpr char kBadClientCertPath[] = "src/core/tsi/test_creds/badclient.pem";constexpr char kBadClientKeyPath[] = "src/core/tsi/test_creds/badclient.key";char* g_bootstrap_file_v3;char* g_bootstrap_file_v2;void WriteBootstrapFiles() {  char* bootstrap_file;  FILE* out = gpr_tmpfile("xds_bootstrap_v3", &bootstrap_file);  fputs(kBootstrapFileV3, out);  fclose(out);  g_bootstrap_file_v3 = bootstrap_file;  out = gpr_tmpfile("xds_bootstrap_v2", &bootstrap_file);  fputs(kBootstrapFileV2, out);  fclose(out);  g_bootstrap_file_v2 = bootstrap_file;}template <typename ServiceType>class CountedService : public ServiceType { public:  size_t request_count() {    grpc_core::MutexLock lock(&mu_);    return request_count_;  }  size_t response_count() {    grpc_core::MutexLock lock(&mu_);    return response_count_;  }  void IncreaseResponseCount() {    grpc_core::MutexLock lock(&mu_);    ++response_count_;  }  void IncreaseRequestCount() {    grpc_core::MutexLock lock(&mu_);    ++request_count_;  }  void ResetCounters() {    grpc_core::MutexLock lock(&mu_);    request_count_ = 0;    response_count_ = 0;  } private:  grpc_core::Mutex mu_;  size_t request_count_ = 0;  size_t response_count_ = 0;};template <typename RpcService>class BackendServiceImpl    : public CountedService<TestMultipleServiceImpl<RpcService>> { public:  BackendServiceImpl() {}  Status Echo(ServerContext* context, const EchoRequest* request,              EchoResponse* response) override {    auto peer_identity = context->auth_context()->GetPeerIdentity();    CountedService<TestMultipleServiceImpl<RpcService>>::IncreaseRequestCount();    const auto status =        TestMultipleServiceImpl<RpcService>::Echo(context, request, response);    CountedService<        TestMultipleServiceImpl<RpcService>>::IncreaseResponseCount();    {      grpc_core::MutexLock lock(&mu_);      clients_.insert(context->peer());      last_peer_identity_.clear();      for (const auto& entry : peer_identity) {        last_peer_identity_.emplace_back(entry.data(), entry.size());      }    }    return status;  }  Status Echo1(ServerContext* context, const EchoRequest* request,               EchoResponse* response) override {    return Echo(context, request, response);  }  Status Echo2(ServerContext* context, const EchoRequest* request,               EchoResponse* response) override {    return Echo(context, request, response);  }  void Start() {}  void Shutdown() {}  std::set<std::string> clients() {    grpc_core::MutexLock lock(&mu_);    return clients_;  }  const std::vector<std::string>& last_peer_identity() {    grpc_core::MutexLock lock(&mu_);    return last_peer_identity_;  } private:  grpc_core::Mutex mu_;  std::set<std::string> clients_;  std::vector<std::string> last_peer_identity_;};class ClientStats { public:  struct LocalityStats {    LocalityStats() {}    // Converts from proto message class.    template <class UpstreamLocalityStats>    explicit LocalityStats(const UpstreamLocalityStats& upstream_locality_stats)        : total_successful_requests(              upstream_locality_stats.total_successful_requests()),          total_requests_in_progress(              upstream_locality_stats.total_requests_in_progress()),          total_error_requests(upstream_locality_stats.total_error_requests()),          total_issued_requests(              upstream_locality_stats.total_issued_requests()) {}    LocalityStats& operator+=(const LocalityStats& other) {      total_successful_requests += other.total_successful_requests;      total_requests_in_progress += other.total_requests_in_progress;      total_error_requests += other.total_error_requests;      total_issued_requests += other.total_issued_requests;      return *this;    }    uint64_t total_successful_requests = 0;    uint64_t total_requests_in_progress = 0;    uint64_t total_error_requests = 0;    uint64_t total_issued_requests = 0;  };  ClientStats() {}  // Converts from proto message class.  template <class ClusterStats>  explicit ClientStats(const ClusterStats& cluster_stats)      : cluster_name_(cluster_stats.cluster_name()),        total_dropped_requests_(cluster_stats.total_dropped_requests()) {    for (const auto& input_locality_stats :         cluster_stats.upstream_locality_stats()) {      locality_stats_.emplace(input_locality_stats.locality().sub_zone(),                              LocalityStats(input_locality_stats));    }    for (const auto& input_dropped_requests :         cluster_stats.dropped_requests()) {      dropped_requests_.emplace(input_dropped_requests.category(),                                input_dropped_requests.dropped_count());    }  }  const std::string& cluster_name() const { return cluster_name_; }  const std::map<std::string, LocalityStats>& locality_stats() const {    return locality_stats_;  }  uint64_t total_successful_requests() const {    uint64_t sum = 0;    for (auto& p : locality_stats_) {      sum += p.second.total_successful_requests;    }    return sum;  }  uint64_t total_requests_in_progress() const {    uint64_t sum = 0;    for (auto& p : locality_stats_) {      sum += p.second.total_requests_in_progress;    }    return sum;  }  uint64_t total_error_requests() const {    uint64_t sum = 0;    for (auto& p : locality_stats_) {      sum += p.second.total_error_requests;    }    return sum;  }  uint64_t total_issued_requests() const {    uint64_t sum = 0;    for (auto& p : locality_stats_) {      sum += p.second.total_issued_requests;    }    return sum;  }  uint64_t total_dropped_requests() const { return total_dropped_requests_; }  uint64_t dropped_requests(const std::string& category) const {    auto iter = dropped_requests_.find(category);    GPR_ASSERT(iter != dropped_requests_.end());    return iter->second;  }  ClientStats& operator+=(const ClientStats& other) {    for (const auto& p : other.locality_stats_) {      locality_stats_[p.first] += p.second;    }    total_dropped_requests_ += other.total_dropped_requests_;    for (const auto& p : other.dropped_requests_) {      dropped_requests_[p.first] += p.second;    }    return *this;  } private:  std::string cluster_name_;  std::map<std::string, LocalityStats> locality_stats_;  uint64_t total_dropped_requests_ = 0;  std::map<std::string, uint64_t> dropped_requests_;};class AdsServiceImpl : public std::enable_shared_from_this<AdsServiceImpl> { public:  struct ResponseState {    enum State { NOT_SENT, SENT, ACKED, NACKED };    State state = NOT_SENT;    std::string error_message;  };  struct EdsResourceArgs {    struct Locality {      Locality(std::string sub_zone, std::vector<int> ports,               int lb_weight = kDefaultLocalityWeight,               int priority = kDefaultLocalityPriority,               std::vector<HealthStatus> health_statuses = {})          : sub_zone(std::move(sub_zone)),            ports(std::move(ports)),            lb_weight(lb_weight),            priority(priority),            health_statuses(std::move(health_statuses)) {}      const std::string sub_zone;      std::vector<int> ports;      int lb_weight;      int priority;      std::vector<HealthStatus> health_statuses;    };    EdsResourceArgs() = default;    explicit EdsResourceArgs(std::vector<Locality> locality_list)        : locality_list(std::move(locality_list)) {}    std::vector<Locality> locality_list;    std::map<std::string, uint32_t> drop_categories;    FractionalPercent::DenominatorType drop_denominator =        FractionalPercent::MILLION;  };  AdsServiceImpl()      : v2_rpc_service_(this, /*is_v2=*/true),        v3_rpc_service_(this, /*is_v2=*/false) {}  bool seen_v2_client() const { return seen_v2_client_; }  bool seen_v3_client() const { return seen_v3_client_; }  ::envoy::service::discovery::v2::AggregatedDiscoveryService::Service*  v2_rpc_service() {    return &v2_rpc_service_;  }  ::envoy::service::discovery::v3::AggregatedDiscoveryService::Service*  v3_rpc_service() {    return &v3_rpc_service_;  }  ResponseState lds_response_state() {    grpc_core::MutexLock lock(&ads_mu_);    return resource_type_response_state_[kLdsTypeUrl];  }  ResponseState rds_response_state() {    grpc_core::MutexLock lock(&ads_mu_);    return resource_type_response_state_[kRdsTypeUrl];  }  ResponseState cds_response_state() {    grpc_core::MutexLock lock(&ads_mu_);    return resource_type_response_state_[kCdsTypeUrl];  }  ResponseState eds_response_state() {    grpc_core::MutexLock lock(&ads_mu_);    return resource_type_response_state_[kEdsTypeUrl];  }  void SetResourceIgnore(const std::string& type_url) {    grpc_core::MutexLock lock(&ads_mu_);    resource_types_to_ignore_.emplace(type_url);  }  void SetResourceMinVersion(const std::string& type_url, int version) {    grpc_core::MutexLock lock(&ads_mu_);    resource_type_min_versions_[type_url] = version;  }  void UnsetResource(const std::string& type_url, const std::string& name) {    grpc_core::MutexLock lock(&ads_mu_);    ResourceTypeState& resource_type_state = resource_map_[type_url];    ++resource_type_state.resource_type_version;    ResourceState& resource_state = resource_type_state.resource_name_map[name];    resource_state.resource_type_version =        resource_type_state.resource_type_version;    resource_state.resource.reset();    gpr_log(GPR_INFO,            "ADS[%p]: Unsetting %s resource %s; resource_type_version now %u",            this, type_url.c_str(), name.c_str(),            resource_type_state.resource_type_version);    for (SubscriptionState* subscription : resource_state.subscriptions) {      subscription->update_queue->emplace_back(type_url, name);    }  }  void SetResource(google::protobuf::Any resource, const std::string& type_url,                   const std::string& name) {    grpc_core::MutexLock lock(&ads_mu_);    ResourceTypeState& resource_type_state = resource_map_[type_url];    ++resource_type_state.resource_type_version;    ResourceState& resource_state = resource_type_state.resource_name_map[name];    resource_state.resource_type_version =        resource_type_state.resource_type_version;    resource_state.resource = std::move(resource);    gpr_log(GPR_INFO,            "ADS[%p]: Updating %s resource %s; resource_type_version now %u",            this, type_url.c_str(), name.c_str(),            resource_type_state.resource_type_version);    for (SubscriptionState* subscription : resource_state.subscriptions) {      subscription->update_queue->emplace_back(type_url, name);    }  }  void SetLdsResource(const Listener& listener) {    google::protobuf::Any resource;    resource.PackFrom(listener);    SetResource(std::move(resource), kLdsTypeUrl, listener.name());  }  void SetRdsResource(const RouteConfiguration& route) {    google::protobuf::Any resource;    resource.PackFrom(route);    SetResource(std::move(resource), kRdsTypeUrl, route.name());  }  void SetCdsResource(const Cluster& cluster) {    google::protobuf::Any resource;    resource.PackFrom(cluster);    SetResource(std::move(resource), kCdsTypeUrl, cluster.name());  }  void SetEdsResource(const ClusterLoadAssignment& assignment) {    google::protobuf::Any resource;    resource.PackFrom(assignment);    SetResource(std::move(resource), kEdsTypeUrl, assignment.cluster_name());  }  void Start() {    grpc_core::MutexLock lock(&ads_mu_);    ads_done_ = false;  }  void Shutdown() {    {      grpc_core::MutexLock lock(&ads_mu_);      NotifyDoneWithAdsCallLocked();      resource_type_response_state_.clear();    }    gpr_log(GPR_INFO, "ADS[%p]: shut down", this);  }  void NotifyDoneWithAdsCall() {    grpc_core::MutexLock lock(&ads_mu_);    NotifyDoneWithAdsCallLocked();  }  void NotifyDoneWithAdsCallLocked() {    if (!ads_done_) {      ads_done_ = true;      ads_cond_.SignalAll();    }  }  std::set<std::string> clients() {    grpc_core::MutexLock lock(&clients_mu_);    return clients_;  } private:  // A queue of resource type/name pairs that have changed since the client  // subscribed to them.  using UpdateQueue = std::deque<      std::pair<std::string /* type url */, std::string /* resource name */>>;  // A struct representing a client's subscription to a particular resource.  struct SubscriptionState {    // The queue upon which to place updates when the resource is updated.    UpdateQueue* update_queue;  };  // A struct representing the a client's subscription to all the resources.  using SubscriptionNameMap =      std::map<std::string /* resource_name */, SubscriptionState>;  using SubscriptionMap =      std::map<std::string /* type_url */, SubscriptionNameMap>;  // Sent state for a given resource type.  struct SentState {    int nonce = 0;    int resource_type_version = 0;  };  // A struct representing the current state for an individual resource.  struct ResourceState {    // The resource itself, if present.    absl::optional<google::protobuf::Any> resource;    // The resource type version that this resource was last updated in.    int resource_type_version = 0;    // A list of subscriptions to this resource.    std::set<SubscriptionState*> subscriptions;  };  // The current state for all individual resources of a given type.  using ResourceNameMap =      std::map<std::string /* resource_name */, ResourceState>;  struct ResourceTypeState {    int resource_type_version = 0;    ResourceNameMap resource_name_map;  };  using ResourceMap = std::map<std::string /* type_url */, ResourceTypeState>;  template <class RpcApi, class DiscoveryRequest, class DiscoveryResponse>  class RpcService : public RpcApi::Service {   public:    using Stream = ServerReaderWriter<DiscoveryResponse, DiscoveryRequest>;    RpcService(AdsServiceImpl* parent, bool is_v2)        : parent_(parent), is_v2_(is_v2) {}    Status StreamAggregatedResources(ServerContext* context,                                     Stream* stream) override {      gpr_log(GPR_INFO, "ADS[%p]: StreamAggregatedResources starts", this);      parent_->AddClient(context->peer());      if (is_v2_) {        parent_->seen_v2_client_ = true;      } else {        parent_->seen_v3_client_ = true;      }      // Take a reference of the AdsServiceImpl object, which will go      // out of scope when this request handler returns.  This ensures      // that the parent won't be destroyed until this stream is complete.      std::shared_ptr<AdsServiceImpl> ads_service_impl =          parent_->shared_from_this();      // Resources (type/name pairs) that have changed since the client      // subscribed to them.      UpdateQueue update_queue;      // Resources that the client will be subscribed to keyed by resource type      // url.      SubscriptionMap subscription_map;      // Sent state for each resource type.      std::map<std::string /*type_url*/, SentState> sent_state_map;      // Spawn a thread to read requests from the stream.      // Requests will be delivered to this thread in a queue.      std::deque<DiscoveryRequest> requests;      bool stream_closed = false;      std::thread reader(std::bind(&RpcService::BlockingRead, this, stream,                                   &requests, &stream_closed));      // Main loop to process requests and updates.      while (true) {        // Boolean to keep track if the loop received any work to do: a        // request or an update; regardless whether a response was actually        // sent out.        bool did_work = false;        // Look for new requests and and decide what to handle.        absl::optional<DiscoveryResponse> response;        {          grpc_core::MutexLock lock(&parent_->ads_mu_);          // If the stream has been closed or our parent is being shut          // down, stop immediately.          if (stream_closed || parent_->ads_done_) break;          // Otherwise, see if there's a request to read from the queue.          if (!requests.empty()) {            DiscoveryRequest request = std::move(requests.front());            requests.pop_front();            did_work = true;            gpr_log(GPR_INFO,                    "ADS[%p]: Received request for type %s with content %s",                    this, request.type_url().c_str(),                    request.DebugString().c_str());            const std::string v3_resource_type =                TypeUrlToV3(request.type_url());            SentState& sent_state = sent_state_map[v3_resource_type];            // Process request.            ProcessRequest(request, v3_resource_type, &update_queue,                           &subscription_map, &sent_state, &response);          }        }        if (response.has_value()) {          gpr_log(GPR_INFO, "ADS[%p]: Sending response: %s", this,                  response->DebugString().c_str());          stream->Write(response.value());        }        response.reset();        // Look for updates and decide what to handle.        {          grpc_core::MutexLock lock(&parent_->ads_mu_);          if (!update_queue.empty()) {            const std::string resource_type =                std::move(update_queue.front().first);            const std::string resource_name =                std::move(update_queue.front().second);            update_queue.pop_front();            did_work = true;            SentState& sent_state = sent_state_map[resource_type];            ProcessUpdate(resource_type, resource_name, &subscription_map,                          &sent_state, &response);          }        }        if (response.has_value()) {          gpr_log(GPR_INFO, "ADS[%p]: Sending update response: %s", this,                  response->DebugString().c_str());          stream->Write(response.value());        }        // If we didn't find anything to do, delay before the next loop        // iteration; otherwise, check whether we should exit and then        // immediately continue.        gpr_timespec deadline =            grpc_timeout_milliseconds_to_deadline(did_work ? 0 : 10);        {          grpc_core::MutexLock lock(&parent_->ads_mu_);          if (!grpc_core::WaitUntilWithDeadline(                  &parent_->ads_cond_, &parent_->ads_mu_,                  [this] { return parent_->ads_done_; },                  grpc_core::ToAbslTime(deadline))) {            break;          }        }      }      // Done with main loop.  Clean up before returning.      // Join reader thread.      reader.join();      // Clean up any subscriptions that were still active when the call      // finished.      {        grpc_core::MutexLock lock(&parent_->ads_mu_);        for (auto& p : subscription_map) {          const std::string& type_url = p.first;          SubscriptionNameMap& subscription_name_map = p.second;          for (auto& q : subscription_name_map) {            const std::string& resource_name = q.first;            SubscriptionState& subscription_state = q.second;            ResourceNameMap& resource_name_map =                parent_->resource_map_[type_url].resource_name_map;            ResourceState& resource_state = resource_name_map[resource_name];            resource_state.subscriptions.erase(&subscription_state);          }        }      }      gpr_log(GPR_INFO, "ADS[%p]: StreamAggregatedResources done", this);      parent_->RemoveClient(context->peer());      return Status::OK;    }   private:    // Processes a response read from the client.    // Populates response if needed.    void ProcessRequest(const DiscoveryRequest& request,                        const std::string& v3_resource_type,                        UpdateQueue* update_queue,                        SubscriptionMap* subscription_map,                        SentState* sent_state,                        absl::optional<DiscoveryResponse>* response) {      // Check the nonce sent by the client, if any.      // (This will be absent on the first request on a stream.)      if (request.response_nonce().empty()) {        int client_resource_type_version = 0;        if (!request.version_info().empty()) {          GPR_ASSERT(absl::SimpleAtoi(request.version_info(),                                      &client_resource_type_version));        }        EXPECT_GE(client_resource_type_version,                  parent_->resource_type_min_versions_[v3_resource_type])            << "resource_type: " << v3_resource_type;      } else {        int client_nonce;        GPR_ASSERT(absl::SimpleAtoi(request.response_nonce(), &client_nonce));        // Ignore requests with stale nonces.        if (client_nonce < sent_state->nonce) return;        // Check for ACK or NACK.        auto it = parent_->resource_type_response_state_.find(v3_resource_type);        if (it != parent_->resource_type_response_state_.end()) {          if (!request.has_error_detail()) {            it->second.state = ResponseState::ACKED;            it->second.error_message.clear();            gpr_log(GPR_INFO,                    "ADS[%p]: client ACKed resource_type=%s version=%s", this,                    request.type_url().c_str(), request.version_info().c_str());          } else {            it->second.state = ResponseState::NACKED;            EXPECT_EQ(request.error_detail().code(),                      GRPC_STATUS_INVALID_ARGUMENT);            it->second.error_message = request.error_detail().message();            gpr_log(GPR_INFO,                    "ADS[%p]: client NACKed resource_type=%s version=%s: %s",                    this, request.type_url().c_str(),                    request.version_info().c_str(),                    it->second.error_message.c_str());          }        }      }      // Ignore resource types as requested by tests.      if (parent_->resource_types_to_ignore_.find(v3_resource_type) !=          parent_->resource_types_to_ignore_.end()) {        return;      }      // Look at all the resource names in the request.      auto& subscription_name_map = (*subscription_map)[v3_resource_type];      auto& resource_type_state = parent_->resource_map_[v3_resource_type];      auto& resource_name_map = resource_type_state.resource_name_map;      std::set<std::string> resources_in_current_request;      std::set<std::string> resources_added_to_response;      for (const std::string& resource_name : request.resource_names()) {        resources_in_current_request.emplace(resource_name);        auto& subscription_state = subscription_name_map[resource_name];        auto& resource_state = resource_name_map[resource_name];        // Subscribe if needed.        // Send the resource in the response if either (a) this is        // a new subscription or (b) there is an updated version of        // this resource to send.        if (parent_->MaybeSubscribe(v3_resource_type, resource_name,                                    &subscription_state, &resource_state,                                    update_queue) ||            ClientNeedsResourceUpdate(resource_type_state, resource_state,                                      sent_state->resource_type_version)) {          gpr_log(GPR_INFO, "ADS[%p]: Sending update for type=%s name=%s", this,                  request.type_url().c_str(), resource_name.c_str());          resources_added_to_response.emplace(resource_name);          if (!response->has_value()) response->emplace();          if (resource_state.resource.has_value()) {            auto* resource = (*response)->add_resources();            resource->CopyFrom(resource_state.resource.value());            if (is_v2_) {              resource->set_type_url(request.type_url());            }          }        } else {          gpr_log(GPR_INFO,                  "ADS[%p]: client does not need update for type=%s name=%s",                  this, request.type_url().c_str(), resource_name.c_str());        }      }      // Process unsubscriptions for any resource no longer      // present in the request's resource list.      parent_->ProcessUnsubscriptions(          v3_resource_type, resources_in_current_request,          &subscription_name_map, &resource_name_map);      // Construct response if needed.      if (!resources_added_to_response.empty()) {        CompleteBuildingDiscoveryResponse(            v3_resource_type, request.type_url(),            resource_type_state.resource_type_version, subscription_name_map,            resources_added_to_response, sent_state, &response->value());      }    }    // Processes a resource update from the test.    // Populates response if needed.    void ProcessUpdate(const std::string& resource_type,                       const std::string& resource_name,                       SubscriptionMap* subscription_map, SentState* sent_state,                       absl::optional<DiscoveryResponse>* response) {      const std::string v2_resource_type = TypeUrlToV2(resource_type);      gpr_log(GPR_INFO, "ADS[%p]: Received update for type=%s name=%s", this,              resource_type.c_str(), resource_name.c_str());      auto& subscription_name_map = (*subscription_map)[resource_type];      auto& resource_type_state = parent_->resource_map_[resource_type];      auto& resource_name_map = resource_type_state.resource_name_map;      auto it = subscription_name_map.find(resource_name);      if (it != subscription_name_map.end()) {        ResourceState& resource_state = resource_name_map[resource_name];        if (ClientNeedsResourceUpdate(resource_type_state, resource_state,                                      sent_state->resource_type_version)) {          gpr_log(GPR_INFO, "ADS[%p]: Sending update for type=%s name=%s", this,                  resource_type.c_str(), resource_name.c_str());          response->emplace();          if (resource_state.resource.has_value()) {            auto* resource = (*response)->add_resources();            resource->CopyFrom(resource_state.resource.value());            if (is_v2_) {              resource->set_type_url(v2_resource_type);            }          }          CompleteBuildingDiscoveryResponse(              resource_type, v2_resource_type,              resource_type_state.resource_type_version, subscription_name_map,              {resource_name}, sent_state, &response->value());        }      }    }    // Starting a thread to do blocking read on the stream until cancel.    void BlockingRead(Stream* stream, std::deque<DiscoveryRequest>* requests,                      bool* stream_closed) {      DiscoveryRequest request;      bool seen_first_request = false;      while (stream->Read(&request)) {        if (!seen_first_request) {          EXPECT_TRUE(request.has_node());          ASSERT_FALSE(request.node().client_features().empty());          EXPECT_EQ(request.node().client_features(0),                    "envoy.lb.does_not_support_overprovisioning");          CheckBuildVersion(request);          seen_first_request = true;        }        {          grpc_core::MutexLock lock(&parent_->ads_mu_);          requests->emplace_back(std::move(request));        }      }      gpr_log(GPR_INFO, "ADS[%p]: Null read, stream closed", this);      grpc_core::MutexLock lock(&parent_->ads_mu_);      *stream_closed = true;    }    // Completing the building a DiscoveryResponse by adding common information    // for all resources and by adding all subscribed resources for LDS and CDS.    void CompleteBuildingDiscoveryResponse(        const std::string& resource_type, const std::string& v2_resource_type,        const int version, const SubscriptionNameMap& subscription_name_map,        const std::set<std::string>& resources_added_to_response,        SentState* sent_state, DiscoveryResponse* response) {      auto& response_state =          parent_->resource_type_response_state_[resource_type];      if (response_state.state == ResponseState::NOT_SENT) {        response_state.state = ResponseState::SENT;      }      response->set_type_url(is_v2_ ? v2_resource_type : resource_type);      response->set_version_info(std::to_string(version));      response->set_nonce(std::to_string(++sent_state->nonce));      if (resource_type == kLdsTypeUrl || resource_type == kCdsTypeUrl) {        // For LDS and CDS we must send back all subscribed resources        // (even the unchanged ones)        for (const auto& p : subscription_name_map) {          const std::string& resource_name = p.first;          if (resources_added_to_response.find(resource_name) ==              resources_added_to_response.end()) {            ResourceNameMap& resource_name_map =                parent_->resource_map_[resource_type].resource_name_map;            const ResourceState& resource_state =                resource_name_map[resource_name];            if (resource_state.resource.has_value()) {              auto* resource = response->add_resources();              resource->CopyFrom(resource_state.resource.value());              if (is_v2_) {                resource->set_type_url(v2_resource_type);              }            }          }        }      }      sent_state->resource_type_version = version;    }    static std::string TypeUrlToV2(const std::string& resource_type) {      if (resource_type == kLdsTypeUrl) return kLdsV2TypeUrl;      if (resource_type == kRdsTypeUrl) return kRdsV2TypeUrl;      if (resource_type == kCdsTypeUrl) return kCdsV2TypeUrl;      if (resource_type == kEdsTypeUrl) return kEdsV2TypeUrl;      return resource_type;    }    static std::string TypeUrlToV3(const std::string& resource_type) {      if (resource_type == kLdsV2TypeUrl) return kLdsTypeUrl;      if (resource_type == kRdsV2TypeUrl) return kRdsTypeUrl;      if (resource_type == kCdsV2TypeUrl) return kCdsTypeUrl;      if (resource_type == kEdsV2TypeUrl) return kEdsTypeUrl;      return resource_type;    }    static void CheckBuildVersion(        const ::envoy::api::v2::DiscoveryRequest& request) {      EXPECT_FALSE(request.node().build_version().empty());    }    static void CheckBuildVersion(        const ::envoy::service::discovery::v3::DiscoveryRequest& /*request*/) {}    AdsServiceImpl* parent_;    const bool is_v2_;  };  // Checks whether the client needs to receive a newer version of  // the resource.  static bool ClientNeedsResourceUpdate(      const ResourceTypeState& resource_type_state,      const ResourceState& resource_state, int client_resource_type_version) {    return client_resource_type_version <               resource_type_state.resource_type_version &&           resource_state.resource_type_version <=               resource_type_state.resource_type_version;  }  // Subscribes to a resource if not already subscribed:  // 1. Sets the update_queue field in subscription_state.  // 2. Adds subscription_state to resource_state->subscriptions.  bool MaybeSubscribe(const std::string& resource_type,                      const std::string& resource_name,                      SubscriptionState* subscription_state,                      ResourceState* resource_state,                      UpdateQueue* update_queue) {    // The update_queue will be null if we were not previously subscribed.    if (subscription_state->update_queue != nullptr) return false;    subscription_state->update_queue = update_queue;    resource_state->subscriptions.emplace(subscription_state);    gpr_log(GPR_INFO, "ADS[%p]: subscribe to resource type %s name %s state %p",            this, resource_type.c_str(), resource_name.c_str(),            &subscription_state);    return true;  }  // Removes subscriptions for resources no longer present in the  // current request.  void ProcessUnsubscriptions(      const std::string& resource_type,      const std::set<std::string>& resources_in_current_request,      SubscriptionNameMap* subscription_name_map,      ResourceNameMap* resource_name_map) {    for (auto it = subscription_name_map->begin();         it != subscription_name_map->end();) {      const std::string& resource_name = it->first;      SubscriptionState& subscription_state = it->second;      if (resources_in_current_request.find(resource_name) !=          resources_in_current_request.end()) {        ++it;        continue;      }      gpr_log(GPR_INFO, "ADS[%p]: Unsubscribe to type=%s name=%s state=%p",              this, resource_type.c_str(), resource_name.c_str(),              &subscription_state);      auto resource_it = resource_name_map->find(resource_name);      GPR_ASSERT(resource_it != resource_name_map->end());      auto& resource_state = resource_it->second;      resource_state.subscriptions.erase(&subscription_state);      if (resource_state.subscriptions.empty() &&          !resource_state.resource.has_value()) {        resource_name_map->erase(resource_it);      }      it = subscription_name_map->erase(it);    }  }  void AddClient(const std::string& client) {    grpc_core::MutexLock lock(&clients_mu_);    clients_.insert(client);  }  void RemoveClient(const std::string& client) {    grpc_core::MutexLock lock(&clients_mu_);    clients_.erase(client);  }  RpcService<::envoy::service::discovery::v2::AggregatedDiscoveryService,             ::envoy::api::v2::DiscoveryRequest,             ::envoy::api::v2::DiscoveryResponse>      v2_rpc_service_;  RpcService<::envoy::service::discovery::v3::AggregatedDiscoveryService,             ::envoy::service::discovery::v3::DiscoveryRequest,             ::envoy::service::discovery::v3::DiscoveryResponse>      v3_rpc_service_;  std::atomic_bool seen_v2_client_{false};  std::atomic_bool seen_v3_client_{false};  grpc_core::CondVar ads_cond_;  // Protect the members below.  grpc_core::Mutex ads_mu_;  bool ads_done_ = false;  std::map<std::string /* type_url */, ResponseState>      resource_type_response_state_;  std::set<std::string /*resource_type*/> resource_types_to_ignore_;  std::map<std::string /*resource_type*/, int> resource_type_min_versions_;  // An instance data member containing the current state of all resources.  // Note that an entry will exist whenever either of the following is true:  // - The resource exists (i.e., has been created by SetResource() and has not  //   yet been destroyed by UnsetResource()).  // - There is at least one subscription for the resource.  ResourceMap resource_map_;  grpc_core::Mutex clients_mu_;  std::set<std::string> clients_;};class LrsServiceImpl : public std::enable_shared_from_this<LrsServiceImpl> { public:  explicit LrsServiceImpl(int client_load_reporting_interval_seconds)      : v2_rpc_service_(this),        v3_rpc_service_(this),        client_load_reporting_interval_seconds_(            client_load_reporting_interval_seconds),        cluster_names_({kDefaultClusterName}) {}  ::envoy::service::load_stats::v2::LoadReportingService::Service*  v2_rpc_service() {    return &v2_rpc_service_;  }  ::envoy::service::load_stats::v3::LoadReportingService::Service*  v3_rpc_service() {    return &v3_rpc_service_;  }  size_t request_count() {    return v2_rpc_service_.request_count() + v3_rpc_service_.request_count();  }  size_t response_count() {    return v2_rpc_service_.response_count() + v3_rpc_service_.response_count();  }  // Must be called before the LRS call is started.  void set_send_all_clusters(bool send_all_clusters) {    send_all_clusters_ = send_all_clusters;  }  void set_cluster_names(const std::set<std::string>& cluster_names) {    cluster_names_ = cluster_names;  }  void Start() {    lrs_done_ = false;    result_queue_.clear();  }  void Shutdown() {    {      grpc_core::MutexLock lock(&lrs_mu_);      NotifyDoneWithLrsCallLocked();    }    gpr_log(GPR_INFO, "LRS[%p]: shut down", this);  }  std::vector<ClientStats> WaitForLoadReport() {    grpc_core::MutexLock lock(&load_report_mu_);    grpc_core::CondVar cv;    if (result_queue_.empty()) {      load_report_cond_ = &cv;      grpc_core::WaitUntil(load_report_cond_, &load_report_mu_,                           [this] { return !result_queue_.empty(); });      load_report_cond_ = nullptr;    }    std::vector<ClientStats> result = std::move(result_queue_.front());    result_queue_.pop_front();    return result;  }  void NotifyDoneWithLrsCall() {    grpc_core::MutexLock lock(&lrs_mu_);    NotifyDoneWithLrsCallLocked();  } private:  template <class RpcApi, class LoadStatsRequest, class LoadStatsResponse>  class RpcService : public CountedService<typename RpcApi::Service> {   public:    using Stream = ServerReaderWriter<LoadStatsResponse, LoadStatsRequest>;    explicit RpcService(LrsServiceImpl* parent) : parent_(parent) {}    Status StreamLoadStats(ServerContext* /*context*/,                           Stream* stream) override {      gpr_log(GPR_INFO, "LRS[%p]: StreamLoadStats starts", this);      EXPECT_GT(parent_->client_load_reporting_interval_seconds_, 0);      // Take a reference of the LrsServiceImpl object, reference will go      // out of scope after this method exits.      std::shared_ptr<LrsServiceImpl> lrs_service_impl =          parent_->shared_from_this();      // Read initial request.      LoadStatsRequest request;      if (stream->Read(&request)) {        CountedService<typename RpcApi::Service>::IncreaseRequestCount();        // Verify client features.        EXPECT_THAT(            request.node().client_features(),            ::testing::Contains("envoy.lrs.supports_send_all_clusters"));        // Send initial response.        LoadStatsResponse response;        if (parent_->send_all_clusters_) {          response.set_send_all_clusters(true);        } else {          for (const std::string& cluster_name : parent_->cluster_names_) {            response.add_clusters(cluster_name);          }        }        response.mutable_load_reporting_interval()->set_seconds(            parent_->client_load_reporting_interval_seconds_);        stream->Write(response);        CountedService<typename RpcApi::Service>::IncreaseResponseCount();        // Wait for report.        request.Clear();        while (stream->Read(&request)) {          gpr_log(GPR_INFO, "LRS[%p]: received client load report message: %s",                  this, request.DebugString().c_str());          std::vector<ClientStats> stats;          for (const auto& cluster_stats : request.cluster_stats()) {            stats.emplace_back(cluster_stats);          }          grpc_core::MutexLock lock(&parent_->load_report_mu_);          parent_->result_queue_.emplace_back(std::move(stats));          if (parent_->load_report_cond_ != nullptr) {            parent_->load_report_cond_->Signal();          }        }        // Wait until notified done.        grpc_core::MutexLock lock(&parent_->lrs_mu_);        grpc_core::WaitUntil(&parent_->lrs_cv_, &parent_->lrs_mu_,                             [this] { return parent_->lrs_done_; });      }      gpr_log(GPR_INFO, "LRS[%p]: StreamLoadStats done", this);      return Status::OK;    }   private:    LrsServiceImpl* parent_;  };  void NotifyDoneWithLrsCallLocked() {    if (!lrs_done_) {      lrs_done_ = true;      lrs_cv_.SignalAll();    }  }  RpcService<::envoy::service::load_stats::v2::LoadReportingService,             ::envoy::service::load_stats::v2::LoadStatsRequest,             ::envoy::service::load_stats::v2::LoadStatsResponse>      v2_rpc_service_;  RpcService<::envoy::service::load_stats::v3::LoadReportingService,             ::envoy::service::load_stats::v3::LoadStatsRequest,             ::envoy::service::load_stats::v3::LoadStatsResponse>      v3_rpc_service_;  const int client_load_reporting_interval_seconds_;  bool send_all_clusters_ = false;  std::set<std::string> cluster_names_;  grpc_core::CondVar lrs_cv_;  grpc_core::Mutex lrs_mu_;  // Protects lrs_done_.  bool lrs_done_ = false;  grpc_core::Mutex load_report_mu_;  // Protects the members below.  grpc_core::CondVar* load_report_cond_ = nullptr;  std::deque<std::vector<ClientStats>> result_queue_;};class TestType { public:  enum FilterConfigSetup {    // Set the fault injection filter directly from LDS    kHTTPConnectionManagerOriginal,    // Enable the fault injection filter in LDS, but override the filter config    // in route.    kRouteOverride,  };  TestType& set_use_fake_resolver() {    use_fake_resolver_ = true;    return *this;  }  TestType& set_enable_load_reporting() {    enable_load_reporting_ = true;    return *this;  }  TestType& set_enable_rds_testing() {    enable_rds_testing_ = true;    return *this;  }  TestType& set_use_v2() {    use_v2_ = true;    return *this;  }  TestType& set_use_xds_credentials() {    use_xds_credentials_ = true;    return *this;  }  TestType& set_use_csds_streaming() {    use_csds_streaming_ = true;    return *this;  }  TestType& set_filter_config_setup(const FilterConfigSetup& setup) {    filter_config_setup_ = setup;    return *this;  }  bool use_fake_resolver() const { return use_fake_resolver_; }  bool enable_load_reporting() const { return enable_load_reporting_; }  bool enable_rds_testing() const { return enable_rds_testing_; }  bool use_v2() const { return use_v2_; }  bool use_xds_credentials() const { return use_xds_credentials_; }  bool use_csds_streaming() const { return use_csds_streaming_; }  const FilterConfigSetup& filter_config_setup() const {    return filter_config_setup_;  }  std::string AsString() const {    std::string retval = (use_fake_resolver_ ? "FakeResolver" : "XdsResolver");    retval += (use_v2_ ? "V2" : "V3");    if (enable_load_reporting_) retval += "WithLoadReporting";    if (enable_rds_testing_) retval += "Rds";    if (use_xds_credentials_) retval += "XdsCreds";    if (use_csds_streaming_) retval += "CsdsStreaming";    if (filter_config_setup_ == kRouteOverride) {      retval += "FilterPerRouteOverride";    }    return retval;  } private:  bool use_fake_resolver_ = false;  bool enable_load_reporting_ = false;  bool enable_rds_testing_ = false;  bool use_v2_ = false;  bool use_xds_credentials_ = false;  bool use_csds_streaming_ = false;  FilterConfigSetup filter_config_setup_ = kHTTPConnectionManagerOriginal;};std::string ReadFile(const char* file_path) {  grpc_slice slice;  GPR_ASSERT(      GRPC_LOG_IF_ERROR("load_file", grpc_load_file(file_path, 0, &slice)));  std::string file_contents(grpc_core::StringViewFromSlice(slice));  grpc_slice_unref(slice);  return file_contents;}grpc_core::PemKeyCertPairList ReadTlsIdentityPair(const char* key_path,                                                  const char* cert_path) {  return grpc_core::PemKeyCertPairList{      grpc_core::PemKeyCertPair(ReadFile(key_path), ReadFile(cert_path))};}// Based on StaticDataCertificateProvider, but provides alternate certificates// if the certificate name is not empty.class FakeCertificateProvider final : public grpc_tls_certificate_provider { public:  struct CertData {    std::string root_certificate;    grpc_core::PemKeyCertPairList identity_key_cert_pairs;  };  using CertDataMap = std::map<std::string /*cert_name */, CertData>;  explicit FakeCertificateProvider(CertDataMap cert_data_map)      : distributor_(            grpc_core::MakeRefCounted<grpc_tls_certificate_distributor>()),        cert_data_map_(std::move(cert_data_map)) {    distributor_->SetWatchStatusCallback([this](std::string cert_name,                                                bool root_being_watched,                                                bool identity_being_watched) {      if (!root_being_watched && !identity_being_watched) return;      auto it = cert_data_map_.find(cert_name);      if (it == cert_data_map_.end()) {        grpc_error* error = GRPC_ERROR_CREATE_FROM_COPIED_STRING(            absl::StrCat("No certificates available for cert_name \"",                         cert_name, "\"")                .c_str());        distributor_->SetErrorForCert(cert_name, GRPC_ERROR_REF(error),                                      GRPC_ERROR_REF(error));        GRPC_ERROR_UNREF(error);      } else {        absl::optional<std::string> root_certificate;        absl::optional<grpc_core::PemKeyCertPairList> pem_key_cert_pairs;        if (root_being_watched) {          root_certificate = it->second.root_certificate;        }        if (identity_being_watched) {          pem_key_cert_pairs = it->second.identity_key_cert_pairs;        }        distributor_->SetKeyMaterials(cert_name, std::move(root_certificate),                                      std::move(pem_key_cert_pairs));      }    });  }  ~FakeCertificateProvider() override {    distributor_->SetWatchStatusCallback(nullptr);  }  grpc_core::RefCountedPtr<grpc_tls_certificate_distributor> distributor()      const override {    return distributor_;  } private:  grpc_core::RefCountedPtr<grpc_tls_certificate_distributor> distributor_;  CertDataMap cert_data_map_;};class FakeCertificateProviderFactory    : public grpc_core::CertificateProviderFactory { public:  class Config : public grpc_core::CertificateProviderFactory::Config {   public:    explicit Config(const char* name) : name_(name) {}    const char* name() const override { return name_; }    std::string ToString() const override { return "{}"; }   private:    const char* name_;  };  FakeCertificateProviderFactory(      const char* name, FakeCertificateProvider::CertDataMap** cert_data_map)      : name_(name), cert_data_map_(cert_data_map) {    GPR_ASSERT(cert_data_map != nullptr);  }  const char* name() const override { return name_; }  grpc_core::RefCountedPtr<grpc_core::CertificateProviderFactory::Config>  CreateCertificateProviderConfig(const grpc_core::Json& /*config_json*/,                                  grpc_error** /*error*/) override {    return grpc_core::MakeRefCounted<Config>(name_);  }  grpc_core::RefCountedPtr<grpc_tls_certificate_provider>  CreateCertificateProvider(      grpc_core::RefCountedPtr<grpc_core::CertificateProviderFactory::Config>      /*config*/) override {    if (*cert_data_map_ == nullptr) return nullptr;    return grpc_core::MakeRefCounted<FakeCertificateProvider>(**cert_data_map_);  } private:  const char* name_;  FakeCertificateProvider::CertDataMap** cert_data_map_;};// Global variables for each provider.FakeCertificateProvider::CertDataMap* g_fake1_cert_data_map = nullptr;FakeCertificateProvider::CertDataMap* g_fake2_cert_data_map = nullptr;int ServerAuthCheckSchedule(void* /* config_user_data */,                            grpc_tls_server_authorization_check_arg* arg) {  arg->success = 1;  arg->status = GRPC_STATUS_OK;  return 0; /* synchronous check */}std::shared_ptr<ChannelCredentials> CreateTlsFallbackCredentials() {  // TODO(yashykt): Switch to using C++ API once b/173823806 is fixed.  grpc_tls_credentials_options* options = grpc_tls_credentials_options_create();  grpc_tls_credentials_options_set_server_verification_option(      options, GRPC_TLS_SKIP_HOSTNAME_VERIFICATION);  grpc_tls_credentials_options_set_certificate_provider(      options,      grpc_core::MakeRefCounted<grpc_core::StaticDataCertificateProvider>(          ReadFile(kCaCertPath),          ReadTlsIdentityPair(kServerKeyPath, kServerCertPath))          .get());  grpc_tls_credentials_options_watch_root_certs(options);  grpc_tls_credentials_options_watch_identity_key_cert_pairs(options);  grpc_tls_server_authorization_check_config* check_config =      grpc_tls_server_authorization_check_config_create(          nullptr, ServerAuthCheckSchedule, nullptr, nullptr);  grpc_tls_credentials_options_set_server_authorization_check_config(      options, check_config);  auto channel_creds = std::make_shared<SecureChannelCredentials>(      grpc_tls_credentials_create(options));  grpc_tls_server_authorization_check_config_release(check_config);  return channel_creds;}// A No-op HTTP filter used for verifying parsing logic.class NoOpHttpFilter : public grpc_core::XdsHttpFilterImpl { public:  NoOpHttpFilter(std::string name, bool supported_on_clients,                 bool supported_on_servers)      : name_(std::move(name)),        supported_on_clients_(supported_on_clients),        supported_on_servers_(supported_on_servers) {}  void PopulateSymtab(upb_symtab* /* symtab */) const override {}  absl::StatusOr<grpc_core::XdsHttpFilterImpl::FilterConfig>  GenerateFilterConfig(upb_strview /* serialized_filter_config */,                       upb_arena* /* arena */) const override {    return grpc_core::XdsHttpFilterImpl::FilterConfig{name_, grpc_core::Json()};  }  absl::StatusOr<grpc_core::XdsHttpFilterImpl::FilterConfig>  GenerateFilterConfigOverride(upb_strview /*serialized_filter_config*/,                               upb_arena* /*arena*/) const override {    return grpc_core::XdsHttpFilterImpl::FilterConfig{name_, grpc_core::Json()};  }  const grpc_channel_filter* channel_filter() const override { return nullptr; }  absl::StatusOr<grpc_core::XdsHttpFilterImpl::ServiceConfigJsonEntry>  GenerateServiceConfig(      const FilterConfig& /*hcm_filter_config*/,      const FilterConfig* /*filter_config_override*/) const override {    return grpc_core::XdsHttpFilterImpl::ServiceConfigJsonEntry{name_, ""};  }  bool IsSupportedOnClients() const override { return supported_on_clients_; }  bool IsSupportedOnServers() const override { return supported_on_servers_; } private:  const std::string name_;  const bool supported_on_clients_;  const bool supported_on_servers_;};namespace {void* response_generator_arg_copy(void* p) {  auto* generator = static_cast<grpc_core::FakeResolverResponseGenerator*>(p);  generator->Ref().release();  return p;}void response_generator_arg_destroy(void* p) {  auto* generator = static_cast<grpc_core::FakeResolverResponseGenerator*>(p);  generator->Unref();}int response_generator_cmp(void* a, void* b) { return GPR_ICMP(a, b); }const grpc_arg_pointer_vtable    kLogicalDnsClusterResolverResponseGeneratorVtable = {        response_generator_arg_copy, response_generator_arg_destroy,        response_generator_cmp};// There is slight difference between time fetched by GPR and by C++ system// clock API. It's unclear if they are using the same syscall, but we do know// GPR round the number at millisecond-level. This creates a 1ms difference,// which could cause flake.grpc_millis NowFromCycleCounter() {  gpr_cycle_counter now = gpr_get_cycle_counter();  return grpc_cycle_counter_to_millis_round_up(now);}}  // namespaceclass XdsEnd2endTest : public ::testing::TestWithParam<TestType> { protected:  // TODO(roth): We currently set the number of backends and number of  // balancers on a per-test-suite basis, not a per-test-case basis.  // However, not every individual test case in a given test suite uses  // the same number of backends or balancers, so we wind up having to  // set the numbers for the test suite to the max number needed by any  // one test case in that test suite.  This results in starting more  // servers (and using more ports) than we actually need.  When we have  // time, change each test to directly start the number of backends and  // balancers that it needs, so that we aren't wasting resources.  XdsEnd2endTest(size_t num_backends, size_t num_balancers,                 int client_load_reporting_interval_seconds = 100,                 bool use_xds_enabled_server = false,                 bool bootstrap_contents_from_env_var = false)      : num_backends_(num_backends),        num_balancers_(num_balancers),        client_load_reporting_interval_seconds_(            client_load_reporting_interval_seconds),        use_xds_enabled_server_(use_xds_enabled_server),        bootstrap_contents_from_env_var_(bootstrap_contents_from_env_var) {}  void SetUp() override {    if (bootstrap_contents_from_env_var_) {      gpr_setenv("GRPC_XDS_BOOTSTRAP_CONFIG",                 GetParam().use_v2() ? kBootstrapFileV2 : kBootstrapFileV3);    } else {      gpr_setenv("GRPC_XDS_BOOTSTRAP", GetParam().use_v2()                                           ? g_bootstrap_file_v2                                           : g_bootstrap_file_v3);    }    bool localhost_resolves_to_ipv4 = false;    bool localhost_resolves_to_ipv6 = false;    grpc_core::LocalhostResolves(&localhost_resolves_to_ipv4,                                 &localhost_resolves_to_ipv6);    ipv6_only_ = !localhost_resolves_to_ipv4 && localhost_resolves_to_ipv6;    // Initialize default xDS resources.    // Construct LDS resource.    default_listener_.set_name(kServerName);    HttpConnectionManager http_connection_manager;    if (!GetParam().use_v2()) {      auto* filter = http_connection_manager.add_http_filters();      filter->set_name("router");      filter->mutable_typed_config()->PackFrom(          envoy::extensions::filters::http::router::v3::Router());    }    default_listener_.mutable_api_listener()->mutable_api_listener()->PackFrom(        http_connection_manager);    // Construct RDS resource.    default_route_config_.set_name(kDefaultRouteConfigurationName);    auto* virtual_host = default_route_config_.add_virtual_hosts();    virtual_host->add_domains("*");    auto* route = virtual_host->add_routes();    route->mutable_match()->set_prefix("");    route->mutable_route()->set_cluster(kDefaultClusterName);    // Construct CDS resource.    default_cluster_.set_name(kDefaultClusterName);    default_cluster_.set_type(Cluster::EDS);    auto* eds_config = default_cluster_.mutable_eds_cluster_config();    eds_config->mutable_eds_config()->mutable_ads();    eds_config->set_service_name(kDefaultEdsServiceName);    default_cluster_.set_lb_policy(Cluster::ROUND_ROBIN);    if (GetParam().enable_load_reporting()) {      default_cluster_.mutable_lrs_server()->mutable_self();    }    // Start the load balancers.    for (size_t i = 0; i < num_balancers_; ++i) {      balancers_.emplace_back(          new BalancerServerThread(GetParam().enable_load_reporting()                                       ? client_load_reporting_interval_seconds_                                       : 0));      balancers_.back()->Start();      // Initialize resources.      SetListenerAndRouteConfiguration(i, default_listener_,                                       default_route_config_);      balancers_.back()->ads_service()->SetCdsResource(default_cluster_);    }    // Initialize XdsClient state.    response_generator_ =        grpc_core::MakeRefCounted<grpc_core::FakeResolverResponseGenerator>();    // Inject xDS channel response generator.    lb_channel_response_generator_ =        grpc_core::MakeRefCounted<grpc_core::FakeResolverResponseGenerator>();    xds_channel_args_to_add_.emplace_back(        grpc_core::FakeResolverResponseGenerator::MakeChannelArg(            lb_channel_response_generator_.get()));    // Inject xDS logical cluster resolver response generator.    logical_dns_cluster_resolver_response_generator_ =        grpc_core::MakeRefCounted<grpc_core::FakeResolverResponseGenerator>();    if (xds_resource_does_not_exist_timeout_ms_ > 0) {      xds_channel_args_to_add_.emplace_back(grpc_channel_arg_integer_create(          const_cast<char*>(GRPC_ARG_XDS_RESOURCE_DOES_NOT_EXIST_TIMEOUT_MS),          xds_resource_does_not_exist_timeout_ms_));    }    xds_channel_args_.num_args = xds_channel_args_to_add_.size();    xds_channel_args_.args = xds_channel_args_to_add_.data();    grpc_core::internal::SetXdsChannelArgsForTest(&xds_channel_args_);    // Make sure each test creates a new XdsClient instance rather than    // reusing the one from the previous test.  This avoids spurious failures    // caused when a load reporting test runs after a non-load reporting test    // and the XdsClient is still talking to the old LRS server, which fails    // because it's not expecting the client to connect.  It also    // ensures that each test can independently set the global channel    // args for the xDS channel.    grpc_core::internal::UnsetGlobalXdsClientForTest();    // Start the backends.    for (size_t i = 0; i < num_backends_; ++i) {      backends_.emplace_back(new BackendServerThread(use_xds_enabled_server_));      backends_.back()->Start();    }    // Create channel and stub.    ResetStub();  }  const char* DefaultEdsServiceName() const {    return GetParam().use_fake_resolver() ? kServerName                                          : kDefaultEdsServiceName;  }  void TearDown() override {    ShutdownAllBackends();    for (auto& balancer : balancers_) balancer->Shutdown();    // Clear global xDS channel args, since they will go out of scope    // when this test object is destroyed.    grpc_core::internal::SetXdsChannelArgsForTest(nullptr);    gpr_unsetenv("GRPC_XDS_BOOTSTRAP");    gpr_unsetenv("GRPC_XDS_BOOTSTRAP_CONFIG");  }  void StartAllBackends() {    for (auto& backend : backends_) backend->Start();  }  void StartBackend(size_t index) { backends_[index]->Start(); }  void ShutdownAllBackends() {    for (auto& backend : backends_) backend->Shutdown();  }  void ShutdownBackend(size_t index) { backends_[index]->Shutdown(); }  void ResetStub(int failover_timeout = 0) {    channel_ = CreateChannel(failover_timeout);    stub_ = grpc::testing::EchoTestService::NewStub(channel_);    stub1_ = grpc::testing::EchoTest1Service::NewStub(channel_);    stub2_ = grpc::testing::EchoTest2Service::NewStub(channel_);  }  std::shared_ptr<Channel> CreateChannel(      int failover_timeout = 0, const char* server_name = kServerName,      grpc_core::FakeResolverResponseGenerator* response_generator = nullptr) {    ChannelArguments args;    if (failover_timeout > 0) {      args.SetInt(GRPC_ARG_PRIORITY_FAILOVER_TIMEOUT_MS, failover_timeout);    }    // If the parent channel is using the fake resolver, we inject the    // response generator here.    if (GetParam().use_fake_resolver()) {      if (response_generator == nullptr) {        response_generator = response_generator_.get();      }      args.SetPointer(GRPC_ARG_FAKE_RESOLVER_RESPONSE_GENERATOR,                      response_generator);    }    args.SetPointerWithVtable(        GRPC_ARG_XDS_LOGICAL_DNS_CLUSTER_FAKE_RESOLVER_RESPONSE_GENERATOR,        logical_dns_cluster_resolver_response_generator_.get(),        &kLogicalDnsClusterResolverResponseGeneratorVtable);    std::string uri = absl::StrCat(        GetParam().use_fake_resolver() ? "fake" : "xds", ":///", server_name);    std::shared_ptr<ChannelCredentials> channel_creds =        GetParam().use_xds_credentials()            ? experimental::XdsCredentials(CreateTlsFallbackCredentials())            : std::make_shared<SecureChannelCredentials>(                  grpc_fake_transport_security_credentials_create());    return ::grpc::CreateCustomChannel(uri, channel_creds, args);  }  enum RpcService {    SERVICE_ECHO,    SERVICE_ECHO1,    SERVICE_ECHO2,  };  enum RpcMethod {    METHOD_ECHO,    METHOD_ECHO1,    METHOD_ECHO2,  };  struct RpcOptions {    RpcService service = SERVICE_ECHO;    RpcMethod method = METHOD_ECHO;    int timeout_ms = 1000;    bool wait_for_ready = false;    bool server_fail = false;    std::vector<std::pair<std::string, std::string>> metadata;    int client_cancel_after_us = 0;    bool skip_cancelled_check = false;    RpcOptions() {}    RpcOptions& set_rpc_service(RpcService rpc_service) {      service = rpc_service;      return *this;    }    RpcOptions& set_rpc_method(RpcMethod rpc_method) {      method = rpc_method;      return *this;    }    RpcOptions& set_timeout_ms(int rpc_timeout_ms) {      timeout_ms = rpc_timeout_ms;      return *this;    }    RpcOptions& set_wait_for_ready(bool rpc_wait_for_ready) {      wait_for_ready = rpc_wait_for_ready;      return *this;    }    RpcOptions& set_server_fail(bool rpc_server_fail) {      server_fail = rpc_server_fail;      return *this;    }    RpcOptions& set_skip_cancelled_check(bool rpc_skip_cancelled_check) {      skip_cancelled_check = rpc_skip_cancelled_check;      return *this;    }    RpcOptions& set_metadata(        std::vector<std::pair<std::string, std::string>> rpc_metadata) {      metadata = std::move(rpc_metadata);      return *this;    }    RpcOptions& set_client_cancel_after_us(int rpc_client_cancel_after_us) {      client_cancel_after_us = rpc_client_cancel_after_us;      return *this;    }    // Populates context and request.    void SetupRpc(ClientContext* context, EchoRequest* request) const {      for (const auto& item : metadata) {        context->AddMetadata(item.first, item.second);      }      if (timeout_ms != 0) {        context->set_deadline(            grpc_timeout_milliseconds_to_deadline(timeout_ms));      }      if (wait_for_ready) context->set_wait_for_ready(true);      request->set_message(kRequestMessage);      if (server_fail) {        request->mutable_param()->mutable_expected_error()->set_code(            GRPC_STATUS_FAILED_PRECONDITION);      }      if (client_cancel_after_us != 0) {        request->mutable_param()->set_client_cancel_after_us(            client_cancel_after_us);      }      if (skip_cancelled_check) {        request->mutable_param()->set_skip_cancelled_check(true);      }    }  };  template <typename Stub>  Status SendRpcMethod(Stub* stub, const RpcOptions& rpc_options,                       ClientContext* context, EchoRequest& request,                       EchoResponse* response) {    switch (rpc_options.method) {      case METHOD_ECHO:        return (*stub)->Echo(context, request, response);      case METHOD_ECHO1:        return (*stub)->Echo1(context, request, response);      case METHOD_ECHO2:        return (*stub)->Echo2(context, request, response);    }    GPR_UNREACHABLE_CODE();  }  void ResetBackendCounters(size_t start_index = 0, size_t stop_index = 0) {    if (stop_index == 0) stop_index = backends_.size();    for (size_t i = start_index; i < stop_index; ++i) {      backends_[i]->backend_service()->ResetCounters();      backends_[i]->backend_service1()->ResetCounters();      backends_[i]->backend_service2()->ResetCounters();    }  }  bool SeenAllBackends(size_t start_index = 0, size_t stop_index = 0,                       const RpcOptions& rpc_options = RpcOptions()) {    if (stop_index == 0) stop_index = backends_.size();    for (size_t i = start_index; i < stop_index; ++i) {      switch (rpc_options.service) {        case SERVICE_ECHO:          if (backends_[i]->backend_service()->request_count() == 0) {            return false;          }          break;        case SERVICE_ECHO1:          if (backends_[i]->backend_service1()->request_count() == 0) {            return false;          }          break;        case SERVICE_ECHO2:          if (backends_[i]->backend_service2()->request_count() == 0) {            return false;          }          break;      }    }    return true;  }  void SendRpcAndCount(int* num_total, int* num_ok, int* num_failure,                       int* num_drops,                       const RpcOptions& rpc_options = RpcOptions(),                       const char* drop_error_message =                           "Call dropped by load balancing policy") {    const Status status = SendRpc(rpc_options);    if (status.ok()) {      ++*num_ok;    } else {      if (status.error_message() == drop_error_message) {        ++*num_drops;      } else {        ++*num_failure;      }    }    ++*num_total;  }  std::tuple<int, int, int> WaitForAllBackends(      size_t start_index = 0, size_t stop_index = 0, bool reset_counters = true,      const RpcOptions& rpc_options = RpcOptions(),      bool allow_failures = false) {    int num_ok = 0;    int num_failure = 0;    int num_drops = 0;    int num_total = 0;    while (!SeenAllBackends(start_index, stop_index, rpc_options)) {      SendRpcAndCount(&num_total, &num_ok, &num_failure, &num_drops,                      rpc_options);    }    if (reset_counters) ResetBackendCounters();    gpr_log(GPR_INFO,            "Performed %d warm up requests against the backends. "            "%d succeeded, %d failed, %d dropped.",            num_total, num_ok, num_failure, num_drops);    if (!allow_failures) EXPECT_EQ(num_failure, 0);    return std::make_tuple(num_ok, num_failure, num_drops);  }  void WaitForBackend(size_t backend_idx, bool reset_counters = true,                      bool require_success = false) {    gpr_log(GPR_INFO, "========= WAITING FOR BACKEND %lu ==========",            static_cast<unsigned long>(backend_idx));    do {      Status status = SendRpc();      if (require_success) {        EXPECT_TRUE(status.ok()) << "code=" << status.error_code()                                 << " message=" << status.error_message();      }    } while (backends_[backend_idx]->backend_service()->request_count() == 0);    if (reset_counters) ResetBackendCounters();    gpr_log(GPR_INFO, "========= BACKEND %lu READY ==========",            static_cast<unsigned long>(backend_idx));  }  grpc_core::ServerAddressList CreateAddressListFromPortList(      const std::vector<int>& ports) {    grpc_core::ServerAddressList addresses;    for (int port : ports) {      absl::StatusOr<grpc_core::URI> lb_uri = grpc_core::URI::Parse(          absl::StrCat(ipv6_only_ ? "ipv6:[::1]:" : "ipv4:127.0.0.1:", port));      GPR_ASSERT(lb_uri.ok());      grpc_resolved_address address;      GPR_ASSERT(grpc_parse_uri(*lb_uri, &address));      addresses.emplace_back(address.addr, address.len, nullptr);    }    return addresses;  }  void SetNextResolution(      const std::vector<int>& ports,      grpc_core::FakeResolverResponseGenerator* response_generator = nullptr) {    if (!GetParam().use_fake_resolver()) return;  // Not used with xds resolver.    grpc_core::ExecCtx exec_ctx;    grpc_core::Resolver::Result result;    result.addresses = CreateAddressListFromPortList(ports);    grpc_error* error = GRPC_ERROR_NONE;    const char* service_config_json =        GetParam().enable_load_reporting()            ? kDefaultServiceConfig            : kDefaultServiceConfigWithoutLoadReporting;    result.service_config =        grpc_core::ServiceConfig::Create(nullptr, service_config_json, &error);    ASSERT_EQ(error, GRPC_ERROR_NONE) << grpc_error_string(error);    ASSERT_NE(result.service_config.get(), nullptr);    if (response_generator == nullptr) {      response_generator = response_generator_.get();    }    response_generator->SetResponse(std::move(result));  }  void SetNextResolutionForLbChannelAllBalancers(      const char* service_config_json = nullptr,      const char* expected_targets = nullptr) {    std::vector<int> ports;    for (size_t i = 0; i < balancers_.size(); ++i) {      ports.emplace_back(balancers_[i]->port());    }    SetNextResolutionForLbChannel(ports, service_config_json, expected_targets);  }  void SetNextResolutionForLbChannel(const std::vector<int>& ports,                                     const char* service_config_json = nullptr,                                     const char* expected_targets = nullptr) {    grpc_core::ExecCtx exec_ctx;    grpc_core::Resolver::Result result;    result.addresses = CreateAddressListFromPortList(ports);    if (service_config_json != nullptr) {      grpc_error* error = GRPC_ERROR_NONE;      result.service_config = grpc_core::ServiceConfig::Create(          nullptr, service_config_json, &error);      ASSERT_NE(result.service_config.get(), nullptr);      ASSERT_EQ(error, GRPC_ERROR_NONE) << grpc_error_string(error);    }    if (expected_targets != nullptr) {      grpc_arg expected_targets_arg = grpc_channel_arg_string_create(          const_cast<char*>(GRPC_ARG_FAKE_SECURITY_EXPECTED_TARGETS),          const_cast<char*>(expected_targets));      result.args =          grpc_channel_args_copy_and_add(nullptr, &expected_targets_arg, 1);    }    lb_channel_response_generator_->SetResponse(std::move(result));  }  void SetNextReresolutionResponse(const std::vector<int>& ports) {    grpc_core::ExecCtx exec_ctx;    grpc_core::Resolver::Result result;    result.addresses = CreateAddressListFromPortList(ports);    response_generator_->SetReresolutionResponse(std::move(result));  }  std::vector<int> GetBackendPorts(size_t start_index = 0,                                   size_t stop_index = 0) const {    if (stop_index == 0) stop_index = backends_.size();    std::vector<int> backend_ports;    for (size_t i = start_index; i < stop_index; ++i) {      backend_ports.push_back(backends_[i]->port());    }    return backend_ports;  }  Status SendRpc(const RpcOptions& rpc_options = RpcOptions(),                 EchoResponse* response = nullptr) {    const bool local_response = (response == nullptr);    if (local_response) response = new EchoResponse;    ClientContext context;    EchoRequest request;    rpc_options.SetupRpc(&context, &request);    Status status;    switch (rpc_options.service) {      case SERVICE_ECHO:        status =            SendRpcMethod(&stub_, rpc_options, &context, request, response);        break;      case SERVICE_ECHO1:        status =            SendRpcMethod(&stub1_, rpc_options, &context, request, response);        break;      case SERVICE_ECHO2:        status =            SendRpcMethod(&stub2_, rpc_options, &context, request, response);        break;    }    if (local_response) delete response;    return status;  }  void CheckRpcSendOk(const size_t times = 1,                      const RpcOptions& rpc_options = RpcOptions()) {    for (size_t i = 0; i < times; ++i) {      EchoResponse response;      const Status status = SendRpc(rpc_options, &response);      EXPECT_TRUE(status.ok()) << "code=" << status.error_code()                               << " message=" << status.error_message();      EXPECT_EQ(response.message(), kRequestMessage);    }  }  void CheckRpcSendFailure(      const size_t times = 1, const RpcOptions& rpc_options = RpcOptions(),      const StatusCode expected_error_code = StatusCode::OK) {    for (size_t i = 0; i < times; ++i) {      const Status status = SendRpc(rpc_options);      EXPECT_FALSE(status.ok());      if (expected_error_code != StatusCode::OK) {        EXPECT_EQ(expected_error_code, status.error_code());      }    }  }  static Listener BuildListener(const RouteConfiguration& route_config) {    HttpConnectionManager http_connection_manager;    *(http_connection_manager.mutable_route_config()) = route_config;    auto* filter = http_connection_manager.add_http_filters();    filter->set_name("router");    filter->mutable_typed_config()->PackFrom(        envoy::extensions::filters::http::router::v3::Router());    Listener listener;    listener.set_name(kServerName);    listener.mutable_api_listener()->mutable_api_listener()->PackFrom(        http_connection_manager);    return listener;  }  ClusterLoadAssignment BuildEdsResource(      const AdsServiceImpl::EdsResourceArgs& args,      const char* eds_service_name = kDefaultEdsServiceName) {    ClusterLoadAssignment assignment;    assignment.set_cluster_name(eds_service_name);    for (const auto& locality : args.locality_list) {      auto* endpoints = assignment.add_endpoints();      endpoints->mutable_load_balancing_weight()->set_value(locality.lb_weight);      endpoints->set_priority(locality.priority);      endpoints->mutable_locality()->set_region(kDefaultLocalityRegion);      endpoints->mutable_locality()->set_zone(kDefaultLocalityZone);      endpoints->mutable_locality()->set_sub_zone(locality.sub_zone);      for (size_t i = 0; i < locality.ports.size(); ++i) {        const int& port = locality.ports[i];        auto* lb_endpoints = endpoints->add_lb_endpoints();        if (locality.health_statuses.size() > i &&            locality.health_statuses[i] != HealthStatus::UNKNOWN) {          lb_endpoints->set_health_status(locality.health_statuses[i]);        }        auto* endpoint = lb_endpoints->mutable_endpoint();        auto* address = endpoint->mutable_address();        auto* socket_address = address->mutable_socket_address();        socket_address->set_address(ipv6_only_ ? "::1" : "127.0.0.1");        socket_address->set_port_value(port);      }    }    if (!args.drop_categories.empty()) {      auto* policy = assignment.mutable_policy();      for (const auto& p : args.drop_categories) {        const std::string& name = p.first;        const uint32_t parts_per_million = p.second;        auto* drop_overload = policy->add_drop_overloads();        drop_overload->set_category(name);        auto* drop_percentage = drop_overload->mutable_drop_percentage();        drop_percentage->set_numerator(parts_per_million);        drop_percentage->set_denominator(args.drop_denominator);      }    }    return assignment;  }  void SetListenerAndRouteConfiguration(      int idx, Listener listener, const RouteConfiguration& route_config) {    auto* api_listener =        listener.mutable_api_listener()->mutable_api_listener();    HttpConnectionManager http_connection_manager;    api_listener->UnpackTo(&http_connection_manager);    if (GetParam().enable_rds_testing()) {      auto* rds = http_connection_manager.mutable_rds();      rds->set_route_config_name(kDefaultRouteConfigurationName);      rds->mutable_config_source()->mutable_ads();      balancers_[idx]->ads_service()->SetRdsResource(route_config);    } else {      *http_connection_manager.mutable_route_config() = route_config;    }    api_listener->PackFrom(http_connection_manager);    balancers_[idx]->ads_service()->SetLdsResource(listener);  }  void SetRouteConfiguration(int idx, const RouteConfiguration& route_config) {    if (GetParam().enable_rds_testing()) {      balancers_[idx]->ads_service()->SetRdsResource(route_config);    } else {      balancers_[idx]->ads_service()->SetLdsResource(          BuildListener(route_config));    }  }  AdsServiceImpl::ResponseState RouteConfigurationResponseState(int idx) const {    AdsServiceImpl* ads_service = balancers_[idx]->ads_service();    if (GetParam().enable_rds_testing()) {      return ads_service->rds_response_state();    }    return ads_service->lds_response_state();  } public:  // This method could benefit test subclasses; to make it accessible  // via bind with a qualified name, it needs to be public.  void SetEdsResourceWithDelay(size_t i,                               const ClusterLoadAssignment& assignment,                               int delay_ms) {    GPR_ASSERT(delay_ms > 0);    gpr_sleep_until(grpc_timeout_milliseconds_to_deadline(delay_ms));    balancers_[i]->ads_service()->SetEdsResource(assignment);  } protected:  class XdsServingStatusNotifier      : public grpc::experimental::XdsServerServingStatusNotifierInterface {   public:    void OnServingStatusChange(std::string uri, grpc::Status status) override {      grpc_core::MutexLock lock(&mu_);      status_map[uri] = status;      cond_.Signal();    }    void WaitOnServingStatusChange(std::string uri,                                   grpc::StatusCode expected_status) {      grpc_core::MutexLock lock(&mu_);      std::map<std::string, grpc::Status>::iterator it;      while ((it = status_map.find(uri)) == status_map.end() ||             it->second.error_code() != expected_status) {        cond_.Wait(&mu_);      }    }   private:    grpc_core::Mutex mu_;    grpc_core::CondVar cond_;    std::map<std::string, grpc::Status> status_map;  };  class ServerThread {   public:    explicit ServerThread(bool use_xds_enabled_server = false)        : port_(grpc_pick_unused_port_or_die()),          use_xds_enabled_server_(use_xds_enabled_server) {}    virtual ~ServerThread(){};    void Start() {      gpr_log(GPR_INFO, "starting %s server on port %d", Type(), port_);      GPR_ASSERT(!running_);      running_ = true;      StartAllServices();      grpc_core::Mutex mu;      // We need to acquire the lock here in order to prevent the notify_one      // by ServerThread::Serve from firing before the wait below is hit.      grpc_core::MutexLock lock(&mu);      grpc_core::CondVar cond;      thread_ = absl::make_unique<std::thread>(          std::bind(&ServerThread::Serve, this, &mu, &cond));      cond.Wait(&mu);      gpr_log(GPR_INFO, "%s server startup complete", Type());    }    void Serve(grpc_core::Mutex* mu, grpc_core::CondVar* cond) {      // We need to acquire the lock here in order to prevent the notify_one      // below from firing before its corresponding wait is executed.      grpc_core::MutexLock lock(mu);      std::ostringstream server_address;      server_address << "localhost:" << port_;      if (use_xds_enabled_server_) {        experimental::XdsServerBuilder builder;        builder.set_status_notifier(¬ifier_);        builder.AddListeningPort(server_address.str(), Credentials());        RegisterAllServices(&builder);        server_ = builder.BuildAndStart();      } else {        ServerBuilder builder;        builder.AddListeningPort(server_address.str(), Credentials());        RegisterAllServices(&builder);        server_ = builder.BuildAndStart();      }      cond->Signal();    }    void Shutdown() {      if (!running_) return;      gpr_log(GPR_INFO, "%s about to shutdown", Type());      ShutdownAllServices();      server_->Shutdown(grpc_timeout_milliseconds_to_deadline(0));      thread_->join();      gpr_log(GPR_INFO, "%s shutdown completed", Type());      running_ = false;    }    virtual std::shared_ptr<ServerCredentials> Credentials() {      return std::make_shared<SecureServerCredentials>(          grpc_fake_transport_security_server_credentials_create());    }    int port() const { return port_; }    bool use_xds_enabled_server() const { return use_xds_enabled_server_; }    XdsServingStatusNotifier* notifier() { return ¬ifier_; }   private:    virtual void RegisterAllServices(ServerBuilder* builder) = 0;    virtual void StartAllServices() = 0;    virtual void ShutdownAllServices() = 0;    virtual const char* Type() = 0;    const int port_;    std::unique_ptr<Server> server_;    XdsServingStatusNotifier notifier_;    std::unique_ptr<std::thread> thread_;    bool running_ = false;    const bool use_xds_enabled_server_;  };  class BackendServerThread : public ServerThread {   public:    explicit BackendServerThread(bool use_xds_enabled_server)        : ServerThread(use_xds_enabled_server) {}    BackendServiceImpl<::grpc::testing::EchoTestService::Service>*    backend_service() {      return &backend_service_;    }    BackendServiceImpl<::grpc::testing::EchoTest1Service::Service>*    backend_service1() {      return &backend_service1_;    }    BackendServiceImpl<::grpc::testing::EchoTest2Service::Service>*    backend_service2() {      return &backend_service2_;    }    std::shared_ptr<ServerCredentials> Credentials() override {      if (GetParam().use_xds_credentials()) {        if (use_xds_enabled_server()) {          // We are testing server's use of XdsServerCredentials          return experimental::XdsServerCredentials(              InsecureServerCredentials());        } else {          // We are testing client's use of XdsCredentials          std::string root_cert = ReadFile(kCaCertPath);          std::string identity_cert = ReadFile(kServerCertPath);          std::string private_key = ReadFile(kServerKeyPath);          std::vector<experimental::IdentityKeyCertPair>              identity_key_cert_pairs = {{private_key, identity_cert}};          auto certificate_provider = std::make_shared<              grpc::experimental::StaticDataCertificateProvider>(              root_cert, identity_key_cert_pairs);          grpc::experimental::TlsServerCredentialsOptions options(              certificate_provider);          options.watch_root_certs();          options.watch_identity_key_cert_pairs();          options.set_cert_request_type(              GRPC_SSL_REQUEST_CLIENT_CERTIFICATE_AND_VERIFY);          return grpc::experimental::TlsServerCredentials(options);        }      }      return ServerThread::Credentials();    }   private:    void RegisterAllServices(ServerBuilder* builder) override {      builder->RegisterService(&backend_service_);      builder->RegisterService(&backend_service1_);      builder->RegisterService(&backend_service2_);    }    void StartAllServices() override {      backend_service_.Start();      backend_service1_.Start();      backend_service2_.Start();    }    void ShutdownAllServices() override {      backend_service_.Shutdown();      backend_service1_.Shutdown();      backend_service2_.Shutdown();    }    const char* Type() override { return "Backend"; }    BackendServiceImpl<::grpc::testing::EchoTestService::Service>        backend_service_;    BackendServiceImpl<::grpc::testing::EchoTest1Service::Service>        backend_service1_;    BackendServiceImpl<::grpc::testing::EchoTest2Service::Service>        backend_service2_;  };  class BalancerServerThread : public ServerThread {   public:    explicit BalancerServerThread(int client_load_reporting_interval = 0)        : ads_service_(new AdsServiceImpl()),          lrs_service_(new LrsServiceImpl(client_load_reporting_interval)) {}    AdsServiceImpl* ads_service() { return ads_service_.get(); }    LrsServiceImpl* lrs_service() { return lrs_service_.get(); }   private:    void RegisterAllServices(ServerBuilder* builder) override {      builder->RegisterService(ads_service_->v2_rpc_service());      builder->RegisterService(ads_service_->v3_rpc_service());      builder->RegisterService(lrs_service_->v2_rpc_service());      builder->RegisterService(lrs_service_->v3_rpc_service());    }    void StartAllServices() override {      ads_service_->Start();      lrs_service_->Start();    }    void ShutdownAllServices() override {      ads_service_->Shutdown();      lrs_service_->Shutdown();    }    const char* Type() override { return "Balancer"; }    std::shared_ptr<AdsServiceImpl> ads_service_;    std::shared_ptr<LrsServiceImpl> lrs_service_;  };  class AdminServerThread : public ServerThread {   private:    void RegisterAllServices(ServerBuilder* builder) override {      builder->RegisterService(&csds_service_);    }    void StartAllServices() override {}    void ShutdownAllServices() override {}    const char* Type() override { return "Admin"; }    grpc::xds::experimental::ClientStatusDiscoveryService csds_service_;  };  class LongRunningRpc {   public:    void StartRpc(grpc::testing::EchoTestService::Stub* stub,                  const RpcOptions& rpc_options =                      RpcOptions().set_client_cancel_after_us(1 * 1000 *                                                              1000)) {      sender_thread_ = std::thread([this, stub, rpc_options]() {        EchoRequest request;        EchoResponse response;        rpc_options.SetupRpc(&context_, &request);        status_ = stub->Echo(&context_, request, &response);      });    }    void CancelRpc() {      context_.TryCancel();      if (sender_thread_.joinable()) sender_thread_.join();    }    Status GetStatus() {      if (sender_thread_.joinable()) sender_thread_.join();      return status_;    }   private:    std::thread sender_thread_;    ClientContext context_;    Status status_;  };  const size_t num_backends_;  const size_t num_balancers_;  const int client_load_reporting_interval_seconds_;  bool ipv6_only_ = false;  std::shared_ptr<Channel> channel_;  std::unique_ptr<grpc::testing::EchoTestService::Stub> stub_;  std::unique_ptr<grpc::testing::EchoTest1Service::Stub> stub1_;  std::unique_ptr<grpc::testing::EchoTest2Service::Stub> stub2_;  std::vector<std::unique_ptr<BackendServerThread>> backends_;  std::vector<std::unique_ptr<BalancerServerThread>> balancers_;  grpc_core::RefCountedPtr<grpc_core::FakeResolverResponseGenerator>      response_generator_;  grpc_core::RefCountedPtr<grpc_core::FakeResolverResponseGenerator>      lb_channel_response_generator_;  grpc_core::RefCountedPtr<grpc_core::FakeResolverResponseGenerator>      logical_dns_cluster_resolver_response_generator_;  int xds_resource_does_not_exist_timeout_ms_ = 0;  absl::InlinedVector<grpc_arg, 2> xds_channel_args_to_add_;  grpc_channel_args xds_channel_args_;  Listener default_listener_;  RouteConfiguration default_route_config_;  Cluster default_cluster_;  bool use_xds_enabled_server_;  bool bootstrap_contents_from_env_var_;};class BasicTest : public XdsEnd2endTest { public:  BasicTest() : XdsEnd2endTest(4, 1) {}};// Tests that the balancer sends the correct response to the client, and the// client sends RPCs to the backends using the default child policy.TEST_P(BasicTest, Vanilla) {  SetNextResolution({});  SetNextResolutionForLbChannelAllBalancers();  const size_t kNumRpcsPerAddress = 100;  AdsServiceImpl::EdsResourceArgs args({      {"locality0", GetBackendPorts()},  });  balancers_[0]->ads_service()->SetEdsResource(      BuildEdsResource(args, DefaultEdsServiceName()));  // Make sure that trying to connect works without a call.  channel_->GetState(true /* try_to_connect */);  // We need to wait for all backends to come online.  WaitForAllBackends();  // Send kNumRpcsPerAddress RPCs per server.  CheckRpcSendOk(kNumRpcsPerAddress * num_backends_);  // Each backend should have gotten 100 requests.  for (size_t i = 0; i < backends_.size(); ++i) {    EXPECT_EQ(kNumRpcsPerAddress,              backends_[i]->backend_service()->request_count());  }  // Check LB policy name for the channel.  EXPECT_EQ(      (GetParam().use_fake_resolver() ? "xds_cluster_resolver_experimental"                                      : "xds_cluster_manager_experimental"),      channel_->GetLoadBalancingPolicyName());}TEST_P(BasicTest, IgnoresUnhealthyEndpoints) {  SetNextResolution({});  SetNextResolutionForLbChannelAllBalancers();  const size_t kNumRpcsPerAddress = 100;  AdsServiceImpl::EdsResourceArgs args({      {"locality0",       GetBackendPorts(),       kDefaultLocalityWeight,       kDefaultLocalityPriority,       {HealthStatus::DRAINING}},  });  balancers_[0]->ads_service()->SetEdsResource(      BuildEdsResource(args, DefaultEdsServiceName()));  // Make sure that trying to connect works without a call.  channel_->GetState(true /* try_to_connect */);  // We need to wait for all backends to come online.  WaitForAllBackends(/*start_index=*/1);  // Send kNumRpcsPerAddress RPCs per server.  CheckRpcSendOk(kNumRpcsPerAddress * (num_backends_ - 1));  // Each backend should have gotten 100 requests.  for (size_t i = 1; i < backends_.size(); ++i) {    EXPECT_EQ(kNumRpcsPerAddress,              backends_[i]->backend_service()->request_count());  }}// Tests that subchannel sharing works when the same backend is listed multiple// times.TEST_P(BasicTest, SameBackendListedMultipleTimes) {  SetNextResolution({});  SetNextResolutionForLbChannelAllBalancers();  // Same backend listed twice.  std::vector<int> ports(2, backends_[0]->port());  AdsServiceImpl::EdsResourceArgs args({      {"locality0", ports},  });  const size_t kNumRpcsPerAddress = 10;  balancers_[0]->ads_service()->SetEdsResource(      BuildEdsResource(args, DefaultEdsServiceName()));  // We need to wait for the backend to come online.  WaitForBackend(0);  // Send kNumRpcsPerAddress RPCs per server.  CheckRpcSendOk(kNumRpcsPerAddress * ports.size());  // Backend should have gotten 20 requests.  EXPECT_EQ(kNumRpcsPerAddress * ports.size(),            backends_[0]->backend_service()->request_count());  // And they should have come from a single client port, because of  // subchannel sharing.  EXPECT_EQ(1UL, backends_[0]->backend_service()->clients().size());}// Tests that RPCs will be blocked until a non-empty serverlist is received.TEST_P(BasicTest, InitiallyEmptyServerlist) {  SetNextResolution({});  SetNextResolutionForLbChannelAllBalancers();  const int kServerlistDelayMs = 500 * grpc_test_slowdown_factor();  const int kCallDeadlineMs = kServerlistDelayMs * 2;  // First response is an empty serverlist, sent right away.  AdsServiceImpl::EdsResourceArgs::Locality empty_locality("locality0", {});  AdsServiceImpl::EdsResourceArgs args({      empty_locality,  });  balancers_[0]->ads_service()->SetEdsResource(      BuildEdsResource(args, DefaultEdsServiceName()));  // Send non-empty serverlist only after kServerlistDelayMs.  args = AdsServiceImpl::EdsResourceArgs({      {"locality0", GetBackendPorts()},  });  std::thread delayed_resource_setter(std::bind(      &BasicTest::SetEdsResourceWithDelay, this, 0,      BuildEdsResource(args, DefaultEdsServiceName()), kServerlistDelayMs));  const auto t0 = system_clock::now();  // Client will block: LB will initially send empty serverlist.  CheckRpcSendOk(      1, RpcOptions().set_timeout_ms(kCallDeadlineMs).set_wait_for_ready(true));  const auto ellapsed_ms =      std::chrono::duration_cast<std::chrono::milliseconds>(          system_clock::now() - t0);  // but eventually, the LB sends a serverlist update that allows the call to  // proceed. The call delay must be larger than the delay in sending the  // populated serverlist but under the call's deadline (which is enforced by  // the call's deadline).  EXPECT_GT(ellapsed_ms.count(), kServerlistDelayMs);  delayed_resource_setter.join();}// Tests that RPCs will fail with UNAVAILABLE instead of DEADLINE_EXCEEDED if// all the servers are unreachable.TEST_P(BasicTest, AllServersUnreachableFailFast) {  SetNextResolution({});  SetNextResolutionForLbChannelAllBalancers();  const size_t kNumUnreachableServers = 5;  std::vector<int> ports;  for (size_t i = 0; i < kNumUnreachableServers; ++i) {    ports.push_back(grpc_pick_unused_port_or_die());  }  AdsServiceImpl::EdsResourceArgs args({      {"locality0", ports},  });  balancers_[0]->ads_service()->SetEdsResource(      BuildEdsResource(args, DefaultEdsServiceName()));  const Status status = SendRpc();  // The error shouldn't be DEADLINE_EXCEEDED.  EXPECT_EQ(StatusCode::UNAVAILABLE, status.error_code());}// Tests that RPCs fail when the backends are down, and will succeed again after// the backends are restarted.TEST_P(BasicTest, BackendsRestart) {  SetNextResolution({});  SetNextResolutionForLbChannelAllBalancers();  AdsServiceImpl::EdsResourceArgs args({      {"locality0", GetBackendPorts()},  });  balancers_[0]->ads_service()->SetEdsResource(      BuildEdsResource(args, DefaultEdsServiceName()));  WaitForAllBackends();  // Stop backends.  RPCs should fail.  ShutdownAllBackends();  // Sending multiple failed requests instead of just one to ensure that the  // client notices that all backends are down before we restart them. If we  // didn't do this, then a single RPC could fail here due to the race condition  // between the LB pick and the GOAWAY from the chosen backend being shut down,  // which would not actually prove that the client noticed that all of the  // backends are down. Then, when we send another request below (which we  // expect to succeed), if the callbacks happen in the wrong order, the same  // race condition could happen again due to the client not yet having noticed  // that the backends were all down.  CheckRpcSendFailure(num_backends_);  // Restart all backends.  RPCs should start succeeding again.  StartAllBackends();  CheckRpcSendOk(1, RpcOptions().set_timeout_ms(2000).set_wait_for_ready(true));}TEST_P(BasicTest, IgnoresDuplicateUpdates) {  const size_t kNumRpcsPerAddress = 100;  SetNextResolution({});  SetNextResolutionForLbChannelAllBalancers();  AdsServiceImpl::EdsResourceArgs args({      {"locality0", GetBackendPorts()},  });  balancers_[0]->ads_service()->SetEdsResource(      BuildEdsResource(args, DefaultEdsServiceName()));  // Wait for all backends to come online.  WaitForAllBackends();  // Send kNumRpcsPerAddress RPCs per server, but send an EDS update in  // between.  If the update is not ignored, this will cause the  // round_robin policy to see an update, which will randomly reset its  // position in the address list.  for (size_t i = 0; i < kNumRpcsPerAddress; ++i) {    CheckRpcSendOk(2);    balancers_[0]->ads_service()->SetEdsResource(        BuildEdsResource(args, DefaultEdsServiceName()));    CheckRpcSendOk(2);  }  // Each backend should have gotten the right number of requests.  for (size_t i = 1; i < backends_.size(); ++i) {    EXPECT_EQ(kNumRpcsPerAddress,              backends_[i]->backend_service()->request_count());  }}using XdsResolverOnlyTest = BasicTest;TEST_P(XdsResolverOnlyTest, ResourceTypeVersionPersistsAcrossStreamRestarts) {  SetNextResolution({});  SetNextResolutionForLbChannelAllBalancers();  AdsServiceImpl::EdsResourceArgs args({      {"locality0", GetBackendPorts(0, 1)},  });  balancers_[0]->ads_service()->SetEdsResource(BuildEdsResource(args));  // Wait for backends to come online.  WaitForAllBackends(0, 1);  // Stop balancer.  balancers_[0]->Shutdown();  // Tell balancer to require minimum version 1 for all resource types.  balancers_[0]->ads_service()->SetResourceMinVersion(kLdsTypeUrl, 1);  balancers_[0]->ads_service()->SetResourceMinVersion(kRdsTypeUrl, 1);  balancers_[0]->ads_service()->SetResourceMinVersion(kCdsTypeUrl, 1);  balancers_[0]->ads_service()->SetResourceMinVersion(kEdsTypeUrl, 1);  // Update backend, just so we can be sure that the client has  // reconnected to the balancer.  AdsServiceImpl::EdsResourceArgs args2({      {"locality0", GetBackendPorts(1, 2)},  });  balancers_[0]->ads_service()->SetEdsResource(BuildEdsResource(args2));  // Restart balancer.  balancers_[0]->Start();  // Make sure client has reconnected.  WaitForAllBackends(1, 2);}// Tests switching over from one cluster to another.TEST_P(XdsResolverOnlyTest, ChangeClusters) {  const char* kNewClusterName = "new_cluster_name";  const char* kNewEdsServiceName = "new_eds_service_name";  SetNextResolution({});  SetNextResolutionForLbChannelAllBalancers();  AdsServiceImpl::EdsResourceArgs args({      {"locality0", GetBackendPorts(0, 2)},  });  balancers_[0]->ads_service()->SetEdsResource(BuildEdsResource(args));  // We need to wait for all backends to come online.  WaitForAllBackends(0, 2);  // Populate new EDS resource.  AdsServiceImpl::EdsResourceArgs args2({      {"locality0", GetBackendPorts(2, 4)},  });  balancers_[0]->ads_service()->SetEdsResource(      BuildEdsResource(args2, kNewEdsServiceName));  // Populate new CDS resource.  Cluster new_cluster = default_cluster_;  new_cluster.set_name(kNewClusterName);  new_cluster.mutable_eds_cluster_config()->set_service_name(      kNewEdsServiceName);  balancers_[0]->ads_service()->SetCdsResource(new_cluster);  // Change RDS resource to point to new cluster.  RouteConfiguration new_route_config = default_route_config_;  new_route_config.mutable_virtual_hosts(0)      ->mutable_routes(0)      ->mutable_route()      ->set_cluster(kNewClusterName);  SetListenerAndRouteConfiguration(0, default_listener_, new_route_config);  // Wait for all new backends to be used.  std::tuple<int, int, int> counts = WaitForAllBackends(2, 4);  // Make sure no RPCs failed in the transition.  EXPECT_EQ(0, std::get<1>(counts));}// Tests that we go into TRANSIENT_FAILURE if the Cluster disappears.TEST_P(XdsResolverOnlyTest, ClusterRemoved) {  SetNextResolution({});  SetNextResolutionForLbChannelAllBalancers();  AdsServiceImpl::EdsResourceArgs args({      {"locality0", GetBackendPorts()},  });  balancers_[0]->ads_service()->SetEdsResource(BuildEdsResource(args));  // We need to wait for all backends to come online.  WaitForAllBackends();  // Unset CDS resource.  balancers_[0]->ads_service()->UnsetResource(kCdsTypeUrl, kDefaultClusterName);  // Wait for RPCs to start failing.  do {  } while (SendRpc(RpcOptions(), nullptr).ok());  // Make sure RPCs are still failing.  CheckRpcSendFailure(1000);  // Make sure we ACK'ed the update.  EXPECT_EQ(balancers_[0]->ads_service()->cds_response_state().state,            AdsServiceImpl::ResponseState::ACKED);}// Tests that we restart all xDS requests when we reestablish the ADS call.TEST_P(XdsResolverOnlyTest, RestartsRequestsUponReconnection) {  // Manually configure use of RDS.  auto listener = default_listener_;  HttpConnectionManager http_connection_manager;  listener.mutable_api_listener()->mutable_api_listener()->UnpackTo(      &http_connection_manager);  auto* rds = http_connection_manager.mutable_rds();  rds->set_route_config_name(kDefaultRouteConfigurationName);  rds->mutable_config_source()->mutable_ads();  listener.mutable_api_listener()->mutable_api_listener()->PackFrom(      http_connection_manager);  balancers_[0]->ads_service()->SetLdsResource(listener);  balancers_[0]->ads_service()->SetRdsResource(default_route_config_);  const char* kNewClusterName = "new_cluster_name";  const char* kNewEdsServiceName = "new_eds_service_name";  SetNextResolution({});  SetNextResolutionForLbChannelAllBalancers();  AdsServiceImpl::EdsResourceArgs args({      {"locality0", GetBackendPorts(0, 2)},  });  balancers_[0]->ads_service()->SetEdsResource(BuildEdsResource(args));  // We need to wait for all backends to come online.  WaitForAllBackends(0, 2);  // Now shut down and restart the balancer.  When the client  // reconnects, it should automatically restart the requests for all  // resource types.  balancers_[0]->Shutdown();  balancers_[0]->Start();  // Make sure things are still working.  CheckRpcSendOk(100);  // Populate new EDS resource.  AdsServiceImpl::EdsResourceArgs args2({      {"locality0", GetBackendPorts(2, 4)},  });  balancers_[0]->ads_service()->SetEdsResource(      BuildEdsResource(args2, kNewEdsServiceName));  // Populate new CDS resource.  Cluster new_cluster = default_cluster_;  new_cluster.set_name(kNewClusterName);  new_cluster.mutable_eds_cluster_config()->set_service_name(      kNewEdsServiceName);  balancers_[0]->ads_service()->SetCdsResource(new_cluster);  // Change RDS resource to point to new cluster.  RouteConfiguration new_route_config = default_route_config_;  new_route_config.mutable_virtual_hosts(0)      ->mutable_routes(0)      ->mutable_route()      ->set_cluster(kNewClusterName);  balancers_[0]->ads_service()->SetRdsResource(new_route_config);  // Wait for all new backends to be used.  std::tuple<int, int, int> counts = WaitForAllBackends(2, 4);  // Make sure no RPCs failed in the transition.  EXPECT_EQ(0, std::get<1>(counts));}TEST_P(XdsResolverOnlyTest, DefaultRouteSpecifiesSlashPrefix) {  RouteConfiguration route_config = default_route_config_;  route_config.mutable_virtual_hosts(0)      ->mutable_routes(0)      ->mutable_match()      ->set_prefix("/");  SetListenerAndRouteConfiguration(0, default_listener_, route_config);  SetNextResolution({});  SetNextResolutionForLbChannelAllBalancers();  AdsServiceImpl::EdsResourceArgs args({      {"locality0", GetBackendPorts()},  });  balancers_[0]->ads_service()->SetEdsResource(BuildEdsResource(args));  // We need to wait for all backends to come online.  WaitForAllBackends();}TEST_P(XdsResolverOnlyTest, CircuitBreaking) {  gpr_setenv("GRPC_XDS_EXPERIMENTAL_CIRCUIT_BREAKING", "true");  constexpr size_t kMaxConcurrentRequests = 10;  SetNextResolution({});  SetNextResolutionForLbChannelAllBalancers();  // Populate new EDS resources.  AdsServiceImpl::EdsResourceArgs args({      {"locality0", GetBackendPorts(0, 1)},  });  balancers_[0]->ads_service()->SetEdsResource(BuildEdsResource(args));  // Update CDS resource to set max concurrent request.  CircuitBreakers circuit_breaks;  Cluster cluster = default_cluster_;  auto* threshold = cluster.mutable_circuit_breakers()->add_thresholds();  threshold->set_priority(RoutingPriority::DEFAULT);  threshold->mutable_max_requests()->set_value(kMaxConcurrentRequests);  balancers_[0]->ads_service()->SetCdsResource(cluster);  // Send exactly max_concurrent_requests long RPCs.  LongRunningRpc rpcs[kMaxConcurrentRequests];  for (size_t i = 0; i < kMaxConcurrentRequests; ++i) {    rpcs[i].StartRpc(stub_.get());  }  // Wait for all RPCs to be in flight.  while (backends_[0]->backend_service()->RpcsWaitingForClientCancel() <         kMaxConcurrentRequests) {    gpr_sleep_until(gpr_time_add(gpr_now(GPR_CLOCK_REALTIME),                                 gpr_time_from_micros(1 * 1000, GPR_TIMESPAN)));  }  // Sending a RPC now should fail, the error message should tell us  // we hit the max concurrent requests limit and got dropped.  Status status = SendRpc();  EXPECT_FALSE(status.ok());  EXPECT_EQ(status.error_message(), "Call dropped by load balancing policy");  // Cancel one RPC to allow another one through  rpcs[0].CancelRpc();  status = SendRpc();  EXPECT_TRUE(status.ok());  for (size_t i = 1; i < kMaxConcurrentRequests; ++i) {    rpcs[i].CancelRpc();  }  // Make sure RPCs go to the correct backend:  EXPECT_EQ(kMaxConcurrentRequests + 1,            backends_[0]->backend_service()->request_count());  gpr_unsetenv("GRPC_XDS_EXPERIMENTAL_CIRCUIT_BREAKING");}TEST_P(XdsResolverOnlyTest, CircuitBreakingMultipleChannelsShareCallCounter) {  gpr_setenv("GRPC_XDS_EXPERIMENTAL_CIRCUIT_BREAKING", "true");  constexpr size_t kMaxConcurrentRequests = 10;  // Populate new EDS resources.  AdsServiceImpl::EdsResourceArgs args({      {"locality0", GetBackendPorts(0, 1)},  });  balancers_[0]->ads_service()->SetEdsResource(BuildEdsResource(args));  // Update CDS resource to set max concurrent request.  CircuitBreakers circuit_breaks;  Cluster cluster = default_cluster_;  auto* threshold = cluster.mutable_circuit_breakers()->add_thresholds();  threshold->set_priority(RoutingPriority::DEFAULT);  threshold->mutable_max_requests()->set_value(kMaxConcurrentRequests);  balancers_[0]->ads_service()->SetCdsResource(cluster);  // Create second channel.  auto response_generator2 =      grpc_core::MakeRefCounted<grpc_core::FakeResolverResponseGenerator>();  auto channel2 = CreateChannel(      /*failover_timeout=*/0, /*server_name=*/kServerName,      response_generator2.get());  auto stub2 = grpc::testing::EchoTestService::NewStub(channel2);  // Set resolution results for both channels and for the xDS channel.  SetNextResolution({});  SetNextResolution({}, response_generator2.get());  SetNextResolutionForLbChannelAllBalancers();  // Send exactly max_concurrent_requests long RPCs, alternating between  // the two channels.  LongRunningRpc rpcs[kMaxConcurrentRequests];  for (size_t i = 0; i < kMaxConcurrentRequests; ++i) {    rpcs[i].StartRpc(i % 2 == 0 ? stub_.get() : stub2.get());  }  // Wait for all RPCs to be in flight.  while (backends_[0]->backend_service()->RpcsWaitingForClientCancel() <         kMaxConcurrentRequests) {    gpr_sleep_until(gpr_time_add(gpr_now(GPR_CLOCK_REALTIME),                                 gpr_time_from_micros(1 * 1000, GPR_TIMESPAN)));  }  // Sending a RPC now should fail, the error message should tell us  // we hit the max concurrent requests limit and got dropped.  Status status = SendRpc();  EXPECT_FALSE(status.ok());  EXPECT_EQ(status.error_message(), "Call dropped by load balancing policy");  // Cancel one RPC to allow another one through  rpcs[0].CancelRpc();  status = SendRpc();  EXPECT_TRUE(status.ok());  for (size_t i = 1; i < kMaxConcurrentRequests; ++i) {    rpcs[i].CancelRpc();  }  // Make sure RPCs go to the correct backend:  EXPECT_EQ(kMaxConcurrentRequests + 1,            backends_[0]->backend_service()->request_count());  gpr_unsetenv("GRPC_XDS_EXPERIMENTAL_CIRCUIT_BREAKING");}TEST_P(XdsResolverOnlyTest, CircuitBreakingDisabled) {  constexpr size_t kMaxConcurrentRequests = 10;  SetNextResolution({});  SetNextResolutionForLbChannelAllBalancers();  // Populate new EDS resources.  AdsServiceImpl::EdsResourceArgs args({      {"locality0", GetBackendPorts(0, 1)},  });  balancers_[0]->ads_service()->SetEdsResource(BuildEdsResource(args));  // Update CDS resource to set max concurrent request.  CircuitBreakers circuit_breaks;  Cluster cluster = default_cluster_;  auto* threshold = cluster.mutable_circuit_breakers()->add_thresholds();  threshold->set_priority(RoutingPriority::DEFAULT);  threshold->mutable_max_requests()->set_value(kMaxConcurrentRequests);  balancers_[0]->ads_service()->SetCdsResource(cluster);  // Send exactly max_concurrent_requests long RPCs.  LongRunningRpc rpcs[kMaxConcurrentRequests];  for (size_t i = 0; i < kMaxConcurrentRequests; ++i) {    rpcs[i].StartRpc(stub_.get());  }  // Wait for all RPCs to be in flight.  while (backends_[0]->backend_service()->RpcsWaitingForClientCancel() <         kMaxConcurrentRequests) {    gpr_sleep_until(gpr_time_add(gpr_now(GPR_CLOCK_REALTIME),                                 gpr_time_from_micros(1 * 1000, GPR_TIMESPAN)));  }  // Sending a RPC now should not fail as circuit breaking is disabled.  Status status = SendRpc();  EXPECT_TRUE(status.ok());  for (size_t i = 0; i < kMaxConcurrentRequests; ++i) {    rpcs[i].CancelRpc();  }  // Make sure RPCs go to the correct backend:  EXPECT_EQ(kMaxConcurrentRequests + 1,            backends_[0]->backend_service()->request_count());}TEST_P(XdsResolverOnlyTest, MultipleChannelsShareXdsClient) {  const char* kNewServerName = "new-server.example.com";  Listener listener = default_listener_;  listener.set_name(kNewServerName);  SetListenerAndRouteConfiguration(0, listener, default_route_config_);  SetNextResolution({});  SetNextResolutionForLbChannelAllBalancers();  AdsServiceImpl::EdsResourceArgs args({      {"locality0", GetBackendPorts()},  });  balancers_[0]->ads_service()->SetEdsResource(BuildEdsResource(args));  WaitForAllBackends();  // Create second channel and tell it to connect to kNewServerName.  auto channel2 = CreateChannel(/*failover_timeout=*/0, kNewServerName);  channel2->GetState(/*try_to_connect=*/true);  ASSERT_TRUE(      channel2->WaitForConnected(grpc_timeout_milliseconds_to_deadline(100)));  // Make sure there's only one client connected.  EXPECT_EQ(1UL, balancers_[0]->ads_service()->clients().size());}class XdsResolverLoadReportingOnlyTest : public XdsEnd2endTest { public:  XdsResolverLoadReportingOnlyTest() : XdsEnd2endTest(4, 1, 3) {}};// Tests load reporting when switching over from one cluster to another.TEST_P(XdsResolverLoadReportingOnlyTest, ChangeClusters) {  const char* kNewClusterName = "new_cluster_name";  const char* kNewEdsServiceName = "new_eds_service_name";  balancers_[0]->lrs_service()->set_cluster_names(      {kDefaultClusterName, kNewClusterName});  SetNextResolution({});  SetNextResolutionForLbChannelAllBalancers();  // cluster kDefaultClusterName -> locality0 -> backends 0 and 1  AdsServiceImpl::EdsResourceArgs args({      {"locality0", GetBackendPorts(0, 2)},  });  balancers_[0]->ads_service()->SetEdsResource(BuildEdsResource(args));  // cluster kNewClusterName -> locality1 -> backends 2 and 3  AdsServiceImpl::EdsResourceArgs args2({      {"locality1", GetBackendPorts(2, 4)},  });  balancers_[0]->ads_service()->SetEdsResource(      BuildEdsResource(args2, kNewEdsServiceName));  // CDS resource for kNewClusterName.  Cluster new_cluster = default_cluster_;  new_cluster.set_name(kNewClusterName);  new_cluster.mutable_eds_cluster_config()->set_service_name(      kNewEdsServiceName);  balancers_[0]->ads_service()->SetCdsResource(new_cluster);  // Wait for all backends to come online.  int num_ok = 0;  int num_failure = 0;  int num_drops = 0;  std::tie(num_ok, num_failure, num_drops) = WaitForAllBackends(0, 2);  // The load report received at the balancer should be correct.  std::vector<ClientStats> load_report =      balancers_[0]->lrs_service()->WaitForLoadReport();  EXPECT_THAT(      load_report,      ::testing::ElementsAre(::testing::AllOf(          ::testing::Property(&ClientStats::cluster_name, kDefaultClusterName),          ::testing::Property(              &ClientStats::locality_stats,              ::testing::ElementsAre(::testing::Pair(                  "locality0",                  ::testing::AllOf(                      ::testing::Field(&ClientStats::LocalityStats::                                           total_successful_requests,                                       num_ok),                      ::testing::Field(&ClientStats::LocalityStats::                                           total_requests_in_progress,                                       0UL),                      ::testing::Field(                          &ClientStats::LocalityStats::total_error_requests,                          num_failure),                      ::testing::Field(                          &ClientStats::LocalityStats::total_issued_requests,                          num_failure + num_ok))))),          ::testing::Property(&ClientStats::total_dropped_requests,                              num_drops))));  // Change RDS resource to point to new cluster.  RouteConfiguration new_route_config = default_route_config_;  new_route_config.mutable_virtual_hosts(0)      ->mutable_routes(0)      ->mutable_route()      ->set_cluster(kNewClusterName);  SetListenerAndRouteConfiguration(0, default_listener_, new_route_config);  // Wait for all new backends to be used.  std::tie(num_ok, num_failure, num_drops) = WaitForAllBackends(2, 4);  // The load report received at the balancer should be correct.  load_report = balancers_[0]->lrs_service()->WaitForLoadReport();  EXPECT_THAT(      load_report,      ::testing::ElementsAre(          ::testing::AllOf(              ::testing::Property(&ClientStats::cluster_name,                                  kDefaultClusterName),              ::testing::Property(                  &ClientStats::locality_stats,                  ::testing::ElementsAre(::testing::Pair(                      "locality0",                      ::testing::AllOf(                          ::testing::Field(&ClientStats::LocalityStats::                                               total_successful_requests,                                           ::testing::Lt(num_ok)),                          ::testing::Field(&ClientStats::LocalityStats::                                               total_requests_in_progress,                                           0UL),                          ::testing::Field(                              &ClientStats::LocalityStats::total_error_requests,                              ::testing::Le(num_failure)),                          ::testing::Field(                              &ClientStats::LocalityStats::                                  total_issued_requests,                              ::testing::Le(num_failure + num_ok)))))),              ::testing::Property(&ClientStats::total_dropped_requests,                                  num_drops)),          ::testing::AllOf(              ::testing::Property(&ClientStats::cluster_name, kNewClusterName),              ::testing::Property(                  &ClientStats::locality_stats,                  ::testing::ElementsAre(::testing::Pair(                      "locality1",                      ::testing::AllOf(                          ::testing::Field(&ClientStats::LocalityStats::                                               total_successful_requests,                                           ::testing::Le(num_ok)),                          ::testing::Field(&ClientStats::LocalityStats::                                               total_requests_in_progress,                                           0UL),                          ::testing::Field(                              &ClientStats::LocalityStats::total_error_requests,                              ::testing::Le(num_failure)),                          ::testing::Field(                              &ClientStats::LocalityStats::                                  total_issued_requests,                              ::testing::Le(num_failure + num_ok)))))),              ::testing::Property(&ClientStats::total_dropped_requests,                                  num_drops))));  int total_ok = 0;  int total_failure = 0;  for (const ClientStats& client_stats : load_report) {    total_ok += client_stats.total_successful_requests();    total_failure += client_stats.total_error_requests();  }  EXPECT_EQ(total_ok, num_ok);  EXPECT_EQ(total_failure, num_failure);  // The LRS service got a single request, and sent a single response.  EXPECT_EQ(1U, balancers_[0]->lrs_service()->request_count());  EXPECT_EQ(1U, balancers_[0]->lrs_service()->response_count());}using SecureNamingTest = BasicTest;// Tests that secure naming check passes if target name is expected.TEST_P(SecureNamingTest, TargetNameIsExpected) {  SetNextResolution({});  SetNextResolutionForLbChannel({balancers_[0]->port()}, nullptr, "xds_server");  AdsServiceImpl::EdsResourceArgs args({      {"locality0", GetBackendPorts()},  });  balancers_[0]->ads_service()->SetEdsResource(      BuildEdsResource(args, DefaultEdsServiceName()));  CheckRpcSendOk();}// Tests that secure naming check fails if target name is unexpected.TEST_P(SecureNamingTest, TargetNameIsUnexpected) {  ::testing::FLAGS_gtest_death_test_style = "threadsafe";  SetNextResolution({});  SetNextResolutionForLbChannel({balancers_[0]->port()}, nullptr,                                "incorrect_server_name");  AdsServiceImpl::EdsResourceArgs args({      {"locality0", GetBackendPorts()},  });  balancers_[0]->ads_service()->SetEdsResource(      BuildEdsResource(args, DefaultEdsServiceName()));  // Make sure that we blow up (via abort() from the security connector) when  // the name from the balancer doesn't match expectations.  ASSERT_DEATH_IF_SUPPORTED({ CheckRpcSendOk(); }, "");}using LdsTest = BasicTest;// Tests that LDS client should send a NACK if there is no API listener in the// Listener in the LDS response.TEST_P(LdsTest, NoApiListener) {  auto listener = default_listener_;  listener.clear_api_listener();  balancers_[0]->ads_service()->SetLdsResource(listener);  SetNextResolution({});  SetNextResolutionForLbChannelAllBalancers();  CheckRpcSendFailure();  const auto response_state =      balancers_[0]->ads_service()->lds_response_state();  EXPECT_EQ(response_state.state, AdsServiceImpl::ResponseState::NACKED);  EXPECT_THAT(      response_state.error_message,      ::testing::HasSubstr("Listener has neither address nor ApiListener"));}// Tests that LDS client should send a NACK if the route_specifier in the// http_connection_manager is neither inlined route_config nor RDS.TEST_P(LdsTest, WrongRouteSpecifier) {  auto listener = default_listener_;  HttpConnectionManager http_connection_manager;  listener.mutable_api_listener()->mutable_api_listener()->UnpackTo(      &http_connection_manager);  http_connection_manager.mutable_scoped_routes();  listener.mutable_api_listener()->mutable_api_listener()->PackFrom(      http_connection_manager);  balancers_[0]->ads_service()->SetLdsResource(listener);  SetNextResolution({});  SetNextResolutionForLbChannelAllBalancers();  CheckRpcSendFailure();  const auto response_state =      balancers_[0]->ads_service()->lds_response_state();  EXPECT_EQ(response_state.state, AdsServiceImpl::ResponseState::NACKED);  EXPECT_THAT(      response_state.error_message,      ::testing::HasSubstr(          "HttpConnectionManager neither has inlined route_config nor RDS."));}// Tests that LDS client should send a NACK if the rds message in the// http_connection_manager is missing the config_source field.TEST_P(LdsTest, RdsMissingConfigSource) {  auto listener = default_listener_;  HttpConnectionManager http_connection_manager;  listener.mutable_api_listener()->mutable_api_listener()->UnpackTo(      &http_connection_manager);  http_connection_manager.mutable_rds()->set_route_config_name(      kDefaultRouteConfigurationName);  listener.mutable_api_listener()->mutable_api_listener()->PackFrom(      http_connection_manager);  balancers_[0]->ads_service()->SetLdsResource(listener);  SetNextResolution({});  SetNextResolutionForLbChannelAllBalancers();  CheckRpcSendFailure();  const auto response_state =      balancers_[0]->ads_service()->lds_response_state();  EXPECT_EQ(response_state.state, AdsServiceImpl::ResponseState::NACKED);  EXPECT_THAT(response_state.error_message,              ::testing::HasSubstr(                  "HttpConnectionManager missing config_source for RDS."));}// Tests that LDS client should send a NACK if the rds message in the// http_connection_manager has a config_source field that does not specify ADS.TEST_P(LdsTest, RdsConfigSourceDoesNotSpecifyAds) {  auto listener = default_listener_;  HttpConnectionManager http_connection_manager;  listener.mutable_api_listener()->mutable_api_listener()->UnpackTo(      &http_connection_manager);  auto* rds = http_connection_manager.mutable_rds();  rds->set_route_config_name(kDefaultRouteConfigurationName);  rds->mutable_config_source()->mutable_self();  listener.mutable_api_listener()->mutable_api_listener()->PackFrom(      http_connection_manager);  balancers_[0]->ads_service()->SetLdsResource(listener);  SetNextResolution({});  SetNextResolutionForLbChannelAllBalancers();  CheckRpcSendFailure();  const auto response_state =      balancers_[0]->ads_service()->lds_response_state();  EXPECT_EQ(response_state.state, AdsServiceImpl::ResponseState::NACKED);  EXPECT_THAT(      response_state.error_message,      ::testing::HasSubstr(          "HttpConnectionManager ConfigSource for RDS does not specify ADS."));}// Tests that the NACK for multiple bad LDS resources includes both errors.TEST_P(LdsTest, MultipleBadResources) {  constexpr char kServerName2[] = "server.other.com";  auto listener = default_listener_;  listener.clear_api_listener();  balancers_[0]->ads_service()->SetLdsResource(listener);  listener.set_name(kServerName2);  balancers_[0]->ads_service()->SetLdsResource(listener);  SetNextResolutionForLbChannelAllBalancers();  CheckRpcSendFailure();  // Need to create a second channel to subscribe to a second LDS resource.  auto channel2 = CreateChannel(0, kServerName2);  auto stub2 = grpc::testing::EchoTestService::NewStub(channel2);  ClientContext context;  EchoRequest request;  request.set_message(kRequestMessage);  EchoResponse response;  grpc::Status status = stub2->Echo(&context, request, &response);  EXPECT_FALSE(status.ok());  const auto response_state =      balancers_[0]->ads_service()->lds_response_state();  EXPECT_EQ(response_state.state, AdsServiceImpl::ResponseState::NACKED);  EXPECT_THAT(      response_state.error_message,      ::testing::AllOf(          ::testing::HasSubstr(absl::StrCat(              kServerName, ": Listener has neither address nor ApiListener")),          ::testing::HasSubstr(              absl::StrCat(kServerName2,                           ": Listener has neither address nor ApiListener"))));}// TODO(roth): Remove this test when we remove the// GRPC_XDS_EXPERIMENTAL_FAULT_INJECTION environment variable guard.TEST_P(LdsTest, HttpFiltersEnabled) {  gpr_setenv("GRPC_XDS_EXPERIMENTAL_FAULT_INJECTION", "true");  SetNextResolutionForLbChannelAllBalancers();  AdsServiceImpl::EdsResourceArgs args({      {"locality0", GetBackendPorts()},  });  balancers_[0]->ads_service()->SetEdsResource(      BuildEdsResource(args, DefaultEdsServiceName()));  WaitForAllBackends();  gpr_unsetenv("GRPC_XDS_EXPERIMENTAL_FAULT_INJECTION");}// Tests that we ignore filters after the router filter.TEST_P(LdsTest, IgnoresHttpFiltersAfterRouterFilter) {  gpr_setenv("GRPC_XDS_EXPERIMENTAL_FAULT_INJECTION", "true");  SetNextResolutionForLbChannelAllBalancers();  auto listener = default_listener_;  HttpConnectionManager http_connection_manager;  listener.mutable_api_listener()->mutable_api_listener()->UnpackTo(      &http_connection_manager);  auto* filter = http_connection_manager.add_http_filters();  filter->set_name("unknown");  filter->mutable_typed_config()->set_type_url(      "grpc.testing.client_only_http_filter");  listener.mutable_api_listener()->mutable_api_listener()->PackFrom(      http_connection_manager);  SetListenerAndRouteConfiguration(0, listener, default_route_config_);  AdsServiceImpl::EdsResourceArgs args({      {"locality0", GetBackendPorts()},  });  balancers_[0]->ads_service()->SetEdsResource(      BuildEdsResource(args, DefaultEdsServiceName()));  WaitForAllBackends();  gpr_unsetenv("GRPC_XDS_EXPERIMENTAL_FAULT_INJECTION");}// Test that we fail RPCs if there is no router filter.TEST_P(LdsTest, FailRpcsIfNoHttpRouterFilter) {  gpr_setenv("GRPC_XDS_EXPERIMENTAL_FAULT_INJECTION", "true");  SetNextResolutionForLbChannelAllBalancers();  auto listener = default_listener_;  HttpConnectionManager http_connection_manager;  listener.mutable_api_listener()->mutable_api_listener()->UnpackTo(      &http_connection_manager);  http_connection_manager.clear_http_filters();  listener.mutable_api_listener()->mutable_api_listener()->PackFrom(      http_connection_manager);  SetListenerAndRouteConfiguration(0, listener, default_route_config_);  AdsServiceImpl::EdsResourceArgs args({      {"locality0", GetBackendPorts()},  });  balancers_[0]->ads_service()->SetEdsResource(      BuildEdsResource(args, DefaultEdsServiceName()));  Status status = SendRpc();  EXPECT_EQ(status.error_code(), StatusCode::UNAVAILABLE);  EXPECT_EQ(status.error_message(), "no xDS HTTP router filter configured");  // Wait until xDS server sees ACK.  while (balancers_[0]->ads_service()->lds_response_state().state ==         AdsServiceImpl::ResponseState::SENT) {    CheckRpcSendFailure();  }  const auto response_state =      balancers_[0]->ads_service()->lds_response_state();  EXPECT_EQ(response_state.state, AdsServiceImpl::ResponseState::ACKED);  gpr_unsetenv("GRPC_XDS_EXPERIMENTAL_FAULT_INJECTION");}// Test that we NACK empty filter names.TEST_P(LdsTest, RejectsEmptyHttpFilterName) {  gpr_setenv("GRPC_XDS_EXPERIMENTAL_FAULT_INJECTION", "true");  auto listener = default_listener_;  HttpConnectionManager http_connection_manager;  listener.mutable_api_listener()->mutable_api_listener()->UnpackTo(      &http_connection_manager);  auto* filter = http_connection_manager.add_http_filters();  filter->mutable_typed_config()->PackFrom(Listener());  listener.mutable_api_listener()->mutable_api_listener()->PackFrom(      http_connection_manager);  SetListenerAndRouteConfiguration(0, listener, default_route_config_);  SetNextResolution({});  SetNextResolutionForLbChannelAllBalancers();  // Wait until xDS server sees NACK.  do {    CheckRpcSendFailure();  } while (balancers_[0]->ads_service()->lds_response_state().state ==           AdsServiceImpl::ResponseState::SENT);  const auto response_state =      balancers_[0]->ads_service()->lds_response_state();  EXPECT_EQ(response_state.state, AdsServiceImpl::ResponseState::NACKED);  EXPECT_THAT(response_state.error_message,              ::testing::HasSubstr("empty filter name at index 1"));  gpr_unsetenv("GRPC_XDS_EXPERIMENTAL_FAULT_INJECTION");}// Test that we NACK duplicate HTTP filter names.TEST_P(LdsTest, RejectsDuplicateHttpFilterName) {  gpr_setenv("GRPC_XDS_EXPERIMENTAL_FAULT_INJECTION", "true");  auto listener = default_listener_;  HttpConnectionManager http_connection_manager;  listener.mutable_api_listener()->mutable_api_listener()->UnpackTo(      &http_connection_manager);  *http_connection_manager.add_http_filters() =      http_connection_manager.http_filters(0);  listener.mutable_api_listener()->mutable_api_listener()->PackFrom(      http_connection_manager);  SetListenerAndRouteConfiguration(0, listener, default_route_config_);  SetNextResolution({});  SetNextResolutionForLbChannelAllBalancers();  // Wait until xDS server sees NACK.  do {    CheckRpcSendFailure();  } while (balancers_[0]->ads_service()->lds_response_state().state ==           AdsServiceImpl::ResponseState::SENT);  const auto response_state =      balancers_[0]->ads_service()->lds_response_state();  EXPECT_EQ(response_state.state, AdsServiceImpl::ResponseState::NACKED);  EXPECT_THAT(response_state.error_message,              ::testing::HasSubstr("duplicate HTTP filter name: router"));  gpr_unsetenv("GRPC_XDS_EXPERIMENTAL_FAULT_INJECTION");}// Test that we NACK unknown filter types.TEST_P(LdsTest, RejectsUnknownHttpFilterType) {  gpr_setenv("GRPC_XDS_EXPERIMENTAL_FAULT_INJECTION", "true");  auto listener = default_listener_;  HttpConnectionManager http_connection_manager;  listener.mutable_api_listener()->mutable_api_listener()->UnpackTo(      &http_connection_manager);  auto* filter = http_connection_manager.add_http_filters();  filter->set_name("unknown");  filter->mutable_typed_config()->PackFrom(Listener());  listener.mutable_api_listener()->mutable_api_listener()->PackFrom(      http_connection_manager);  SetListenerAndRouteConfiguration(0, listener, default_route_config_);  SetNextResolution({});  SetNextResolutionForLbChannelAllBalancers();  // Wait until xDS server sees NACK.  do {    CheckRpcSendFailure();  } while (balancers_[0]->ads_service()->lds_response_state().state ==           AdsServiceImpl::ResponseState::SENT);  const auto response_state =      balancers_[0]->ads_service()->lds_response_state();  EXPECT_EQ(response_state.state, AdsServiceImpl::ResponseState::NACKED);  EXPECT_THAT(response_state.error_message,              ::testing::HasSubstr("no filter registered for config type "                                   "envoy.config.listener.v3.Listener"));  gpr_unsetenv("GRPC_XDS_EXPERIMENTAL_FAULT_INJECTION");}// Test that we ignore optional unknown filter types.TEST_P(LdsTest, IgnoresOptionalUnknownHttpFilterType) {  gpr_setenv("GRPC_XDS_EXPERIMENTAL_FAULT_INJECTION", "true");  auto listener = default_listener_;  HttpConnectionManager http_connection_manager;  listener.mutable_api_listener()->mutable_api_listener()->UnpackTo(      &http_connection_manager);  auto* filter = http_connection_manager.add_http_filters();  filter->set_name("unknown");  filter->mutable_typed_config()->PackFrom(Listener());  filter->set_is_optional(true);  listener.mutable_api_listener()->mutable_api_listener()->PackFrom(      http_connection_manager);  SetListenerAndRouteConfiguration(0, listener, default_route_config_);  AdsServiceImpl::EdsResourceArgs args({      {"locality0", GetBackendPorts()},  });  balancers_[0]->ads_service()->SetEdsResource(      BuildEdsResource(args, DefaultEdsServiceName()));  SetNextResolutionForLbChannelAllBalancers();  WaitForAllBackends();  EXPECT_EQ(balancers_[0]->ads_service()->lds_response_state().state,            AdsServiceImpl::ResponseState::ACKED);  gpr_unsetenv("GRPC_XDS_EXPERIMENTAL_FAULT_INJECTION");}// Test that we NACK filters without configs.TEST_P(LdsTest, RejectsHttpFilterWithoutConfig) {  gpr_setenv("GRPC_XDS_EXPERIMENTAL_FAULT_INJECTION", "true");  auto listener = default_listener_;  HttpConnectionManager http_connection_manager;  listener.mutable_api_listener()->mutable_api_listener()->UnpackTo(      &http_connection_manager);  auto* filter = http_connection_manager.add_http_filters();  filter->set_name("unknown");  listener.mutable_api_listener()->mutable_api_listener()->PackFrom(      http_connection_manager);  SetListenerAndRouteConfiguration(0, listener, default_route_config_);  SetNextResolution({});  SetNextResolutionForLbChannelAllBalancers();  // Wait until xDS server sees NACK.  do {    CheckRpcSendFailure();  } while (balancers_[0]->ads_service()->lds_response_state().state ==           AdsServiceImpl::ResponseState::SENT);  const auto response_state =      balancers_[0]->ads_service()->lds_response_state();  EXPECT_EQ(response_state.state, AdsServiceImpl::ResponseState::NACKED);  EXPECT_THAT(response_state.error_message,              ::testing::HasSubstr(                  "no filter config specified for filter name unknown"));  gpr_unsetenv("GRPC_XDS_EXPERIMENTAL_FAULT_INJECTION");}// Test that we ignore optional filters without configs.TEST_P(LdsTest, IgnoresOptionalHttpFilterWithoutConfig) {  gpr_setenv("GRPC_XDS_EXPERIMENTAL_FAULT_INJECTION", "true");  auto listener = default_listener_;  HttpConnectionManager http_connection_manager;  listener.mutable_api_listener()->mutable_api_listener()->UnpackTo(      &http_connection_manager);  auto* filter = http_connection_manager.add_http_filters();  filter->set_name("unknown");  filter->set_is_optional(true);  listener.mutable_api_listener()->mutable_api_listener()->PackFrom(      http_connection_manager);  SetListenerAndRouteConfiguration(0, listener, default_route_config_);  AdsServiceImpl::EdsResourceArgs args({      {"locality0", GetBackendPorts()},  });  balancers_[0]->ads_service()->SetEdsResource(      BuildEdsResource(args, DefaultEdsServiceName()));  SetNextResolutionForLbChannelAllBalancers();  WaitForAllBackends();  EXPECT_EQ(balancers_[0]->ads_service()->lds_response_state().state,            AdsServiceImpl::ResponseState::ACKED);  gpr_unsetenv("GRPC_XDS_EXPERIMENTAL_FAULT_INJECTION");}// Test that we NACK unparseable filter configs.TEST_P(LdsTest, RejectsUnparseableHttpFilterType) {  gpr_setenv("GRPC_XDS_EXPERIMENTAL_FAULT_INJECTION", "true");  auto listener = default_listener_;  HttpConnectionManager http_connection_manager;  listener.mutable_api_listener()->mutable_api_listener()->UnpackTo(      &http_connection_manager);  auto* filter = http_connection_manager.add_http_filters();  filter->set_name("unknown");  filter->mutable_typed_config()->PackFrom(listener);  filter->mutable_typed_config()->set_type_url(      "type.googleapis.com/envoy.extensions.filters.http.router.v3.Router");  listener.mutable_api_listener()->mutable_api_listener()->PackFrom(      http_connection_manager);  SetListenerAndRouteConfiguration(0, listener, default_route_config_);  SetNextResolution({});  SetNextResolutionForLbChannelAllBalancers();  // Wait until xDS server sees NACK.  do {    CheckRpcSendFailure();  } while (balancers_[0]->ads_service()->lds_response_state().state ==           AdsServiceImpl::ResponseState::SENT);  const auto response_state =      balancers_[0]->ads_service()->lds_response_state();  EXPECT_EQ(response_state.state, AdsServiceImpl::ResponseState::NACKED);  EXPECT_THAT(      response_state.error_message,      ::testing::HasSubstr(          "filter config for type "          "envoy.extensions.filters.http.router.v3.Router failed to parse"));  gpr_unsetenv("GRPC_XDS_EXPERIMENTAL_FAULT_INJECTION");}// Test that we NACK HTTP filters unsupported on client-side.TEST_P(LdsTest, RejectsHttpFiltersNotSupportedOnClients) {  gpr_setenv("GRPC_XDS_EXPERIMENTAL_FAULT_INJECTION", "true");  auto listener = default_listener_;  HttpConnectionManager http_connection_manager;  listener.mutable_api_listener()->mutable_api_listener()->UnpackTo(      &http_connection_manager);  auto* filter = http_connection_manager.add_http_filters();  filter->set_name("grpc.testing.server_only_http_filter");  filter->mutable_typed_config()->set_type_url(      "grpc.testing.server_only_http_filter");  listener.mutable_api_listener()->mutable_api_listener()->PackFrom(      http_connection_manager);  SetListenerAndRouteConfiguration(0, listener, default_route_config_);  SetNextResolution({});  SetNextResolutionForLbChannelAllBalancers();  // Wait until xDS server sees NACK.  do {    CheckRpcSendFailure();  } while (balancers_[0]->ads_service()->lds_response_state().state ==           AdsServiceImpl::ResponseState::SENT);  const auto response_state =      balancers_[0]->ads_service()->lds_response_state();  EXPECT_EQ(response_state.state, AdsServiceImpl::ResponseState::NACKED);  EXPECT_THAT(      response_state.error_message,      ::testing::HasSubstr("Filter grpc.testing.server_only_http_filter is not "                           "supported on clients"));  gpr_unsetenv("GRPC_XDS_EXPERIMENTAL_FAULT_INJECTION");}// Test that we ignore optional HTTP filters unsupported on client-side.TEST_P(LdsTest, IgnoresOptionalHttpFiltersNotSupportedOnClients) {  gpr_setenv("GRPC_XDS_EXPERIMENTAL_FAULT_INJECTION", "true");  auto listener = default_listener_;  HttpConnectionManager http_connection_manager;  listener.mutable_api_listener()->mutable_api_listener()->UnpackTo(      &http_connection_manager);  auto* filter = http_connection_manager.add_http_filters();  filter->set_name("grpc.testing.server_only_http_filter");  filter->mutable_typed_config()->set_type_url(      "grpc.testing.server_only_http_filter");  filter->set_is_optional(true);  listener.mutable_api_listener()->mutable_api_listener()->PackFrom(      http_connection_manager);  SetListenerAndRouteConfiguration(0, listener, default_route_config_);  AdsServiceImpl::EdsResourceArgs args({      {"locality0", GetBackendPorts(0, 1)},  });  balancers_[0]->ads_service()->SetEdsResource(      BuildEdsResource(args, DefaultEdsServiceName()));  SetNextResolution({});  SetNextResolutionForLbChannelAllBalancers();  WaitForBackend(0);  EXPECT_EQ(balancers_[0]->ads_service()->lds_response_state().state,            AdsServiceImpl::ResponseState::ACKED);  gpr_unsetenv("GRPC_XDS_EXPERIMENTAL_FAULT_INJECTION");}using LdsV2Test = LdsTest;// Tests that we ignore the HTTP filter list in v2.// TODO(roth): The test framework is not set up to allow us to test// the server sending v2 resources when the client requests v3, so this// just tests a pure v2 setup.  When we have time, fix this.TEST_P(LdsV2Test, IgnoresHttpFilters) {  gpr_setenv("GRPC_XDS_EXPERIMENTAL_FAULT_INJECTION", "true");  auto listener = default_listener_;  HttpConnectionManager http_connection_manager;  listener.mutable_api_listener()->mutable_api_listener()->UnpackTo(      &http_connection_manager);  auto* filter = http_connection_manager.add_http_filters();  filter->set_name("unknown");  filter->mutable_typed_config()->PackFrom(Listener());  listener.mutable_api_listener()->mutable_api_listener()->PackFrom(      http_connection_manager);  SetListenerAndRouteConfiguration(0, listener, default_route_config_);  AdsServiceImpl::EdsResourceArgs args({      {"locality0", GetBackendPorts(0, 1)},  });  balancers_[0]->ads_service()->SetEdsResource(      BuildEdsResource(args, DefaultEdsServiceName()));  SetNextResolutionForLbChannelAllBalancers();  CheckRpcSendOk();  gpr_unsetenv("GRPC_XDS_EXPERIMENTAL_FAULT_INJECTION");}using LdsRdsTest = BasicTest;// Tests that LDS client should send an ACK upon correct LDS response (with// inlined RDS result).TEST_P(LdsRdsTest, Vanilla) {  SetNextResolution({});  SetNextResolutionForLbChannelAllBalancers();  (void)SendRpc();  EXPECT_EQ(RouteConfigurationResponseState(0).state,            AdsServiceImpl::ResponseState::ACKED);  // Make sure we actually used the RPC service for the right version of xDS.  EXPECT_EQ(balancers_[0]->ads_service()->seen_v2_client(),            GetParam().use_v2());  EXPECT_NE(balancers_[0]->ads_service()->seen_v3_client(),            GetParam().use_v2());}// Tests that we go into TRANSIENT_FAILURE if the Listener is removed.TEST_P(LdsRdsTest, ListenerRemoved) {  SetNextResolution({});  SetNextResolutionForLbChannelAllBalancers();  AdsServiceImpl::EdsResourceArgs args({      {"locality0", GetBackendPorts()},  });  balancers_[0]->ads_service()->SetEdsResource(BuildEdsResource(args));  // We need to wait for all backends to come online.  WaitForAllBackends();  // Unset LDS resource.  balancers_[0]->ads_service()->UnsetResource(kLdsTypeUrl, kServerName);  // Wait for RPCs to start failing.  do {  } while (SendRpc(RpcOptions(), nullptr).ok());  // Make sure RPCs are still failing.  CheckRpcSendFailure(1000);  // Make sure we ACK'ed the update.  EXPECT_EQ(balancers_[0]->ads_service()->lds_response_state().state,            AdsServiceImpl::ResponseState::ACKED);}// Tests that LDS client ACKs but fails if matching domain can't be found in// the LDS response.TEST_P(LdsRdsTest, NoMatchedDomain) {  RouteConfiguration route_config = default_route_config_;  route_config.mutable_virtual_hosts(0)->clear_domains();  route_config.mutable_virtual_hosts(0)->add_domains("unmatched_domain");  SetRouteConfiguration(0, route_config);  SetNextResolution({});  SetNextResolutionForLbChannelAllBalancers();  CheckRpcSendFailure();  // Do a bit of polling, to allow the ACK to get to the ADS server.  channel_->WaitForConnected(grpc_timeout_milliseconds_to_deadline(100));  const auto response_state = RouteConfigurationResponseState(0);  EXPECT_EQ(response_state.state, AdsServiceImpl::ResponseState::ACKED);}// Tests that LDS client should choose the virtual host with matching domain if// multiple virtual hosts exist in the LDS response.TEST_P(LdsRdsTest, ChooseMatchedDomain) {  RouteConfiguration route_config = default_route_config_;  *(route_config.add_virtual_hosts()) = route_config.virtual_hosts(0);  route_config.mutable_virtual_hosts(0)->clear_domains();  route_config.mutable_virtual_hosts(0)->add_domains("unmatched_domain");  SetRouteConfiguration(0, route_config);  SetNextResolution({});  SetNextResolutionForLbChannelAllBalancers();  (void)SendRpc();  EXPECT_EQ(RouteConfigurationResponseState(0).state,            AdsServiceImpl::ResponseState::ACKED);}// Tests that LDS client should choose the last route in the virtual host if// multiple routes exist in the LDS response.TEST_P(LdsRdsTest, ChooseLastRoute) {  RouteConfiguration route_config = default_route_config_;  *(route_config.mutable_virtual_hosts(0)->add_routes()) =      route_config.virtual_hosts(0).routes(0);  route_config.mutable_virtual_hosts(0)      ->mutable_routes(0)      ->mutable_route()      ->mutable_cluster_header();  SetRouteConfiguration(0, route_config);  SetNextResolution({});  SetNextResolutionForLbChannelAllBalancers();  (void)SendRpc();  EXPECT_EQ(RouteConfigurationResponseState(0).state,            AdsServiceImpl::ResponseState::ACKED);}// Tests that LDS client should ignore route which has query_parameters.TEST_P(LdsRdsTest, RouteMatchHasQueryParameters) {  RouteConfiguration route_config = default_route_config_;  auto* route1 = route_config.mutable_virtual_hosts(0)->mutable_routes(0);  route1->mutable_match()->set_prefix("/grpc.testing.EchoTest1Service/");  route1->mutable_match()->add_query_parameters();  SetRouteConfiguration(0, route_config);  SetNextResolution({});  SetNextResolutionForLbChannelAllBalancers();  CheckRpcSendFailure();  const auto response_state = RouteConfigurationResponseState(0);  EXPECT_EQ(response_state.state, AdsServiceImpl::ResponseState::NACKED);  EXPECT_THAT(response_state.error_message,              ::testing::HasSubstr("No valid routes specified."));}// Tests that LDS client should send a ACK if route match has a prefix// that is either empty or a single slashTEST_P(LdsRdsTest, RouteMatchHasValidPrefixEmptyOrSingleSlash) {  RouteConfiguration route_config = default_route_config_;  auto* route1 = route_config.mutable_virtual_hosts(0)->mutable_routes(0);  route1->mutable_match()->set_prefix("");  auto* default_route = route_config.mutable_virtual_hosts(0)->add_routes();  default_route->mutable_match()->set_prefix("/");  default_route->mutable_route()->set_cluster(kDefaultClusterName);  SetRouteConfiguration(0, route_config);  SetNextResolution({});  SetNextResolutionForLbChannelAllBalancers();  (void)SendRpc();  const auto response_state = RouteConfigurationResponseState(0);  EXPECT_EQ(response_state.state, AdsServiceImpl::ResponseState::ACKED);}// Tests that LDS client should ignore route which has a path// prefix string does not start with "/".TEST_P(LdsRdsTest, RouteMatchHasInvalidPrefixNoLeadingSlash) {  RouteConfiguration route_config = default_route_config_;  auto* route1 = route_config.mutable_virtual_hosts(0)->mutable_routes(0);  route1->mutable_match()->set_prefix("grpc.testing.EchoTest1Service/");  SetRouteConfiguration(0, route_config);  SetNextResolution({});  SetNextResolutionForLbChannelAllBalancers();  CheckRpcSendFailure();  const auto response_state = RouteConfigurationResponseState(0);  EXPECT_EQ(response_state.state, AdsServiceImpl::ResponseState::NACKED);  EXPECT_THAT(response_state.error_message,              ::testing::HasSubstr("No valid routes specified."));}// Tests that LDS client should ignore route which has a prefix// string with more than 2 slashes.TEST_P(LdsRdsTest, RouteMatchHasInvalidPrefixExtraContent) {  RouteConfiguration route_config = default_route_config_;  auto* route1 = route_config.mutable_virtual_hosts(0)->mutable_routes(0);  route1->mutable_match()->set_prefix("/grpc.testing.EchoTest1Service/Echo1/");  SetRouteConfiguration(0, route_config);  SetNextResolution({});  SetNextResolutionForLbChannelAllBalancers();  CheckRpcSendFailure();  const auto response_state = RouteConfigurationResponseState(0);  EXPECT_EQ(response_state.state, AdsServiceImpl::ResponseState::NACKED);  EXPECT_THAT(response_state.error_message,              ::testing::HasSubstr("No valid routes specified."));}// Tests that LDS client should ignore route which has a prefix// string "//".TEST_P(LdsRdsTest, RouteMatchHasInvalidPrefixDoubleSlash) {  RouteConfiguration route_config = default_route_config_;  auto* route1 = route_config.mutable_virtual_hosts(0)->mutable_routes(0);  route1->mutable_match()->set_prefix("//");  SetRouteConfiguration(0, route_config);  SetNextResolution({});  SetNextResolutionForLbChannelAllBalancers();  CheckRpcSendFailure();  const auto response_state = RouteConfigurationResponseState(0);  EXPECT_EQ(response_state.state, AdsServiceImpl::ResponseState::NACKED);  EXPECT_THAT(response_state.error_message,              ::testing::HasSubstr("No valid routes specified."));}// Tests that LDS client should ignore route which has path// but it's empty.TEST_P(LdsRdsTest, RouteMatchHasInvalidPathEmptyPath) {  RouteConfiguration route_config = default_route_config_;  auto* route1 = route_config.mutable_virtual_hosts(0)->mutable_routes(0);  route1->mutable_match()->set_path("");  SetRouteConfiguration(0, route_config);  SetNextResolution({});  SetNextResolutionForLbChannelAllBalancers();  CheckRpcSendFailure();  const auto response_state = RouteConfigurationResponseState(0);  EXPECT_EQ(response_state.state, AdsServiceImpl::ResponseState::NACKED);  EXPECT_THAT(response_state.error_message,              ::testing::HasSubstr("No valid routes specified."));}// Tests that LDS client should ignore route which has path// string does not start with "/".TEST_P(LdsRdsTest, RouteMatchHasInvalidPathNoLeadingSlash) {  RouteConfiguration route_config = default_route_config_;  auto* route1 = route_config.mutable_virtual_hosts(0)->mutable_routes(0);  route1->mutable_match()->set_path("grpc.testing.EchoTest1Service/Echo1");  SetRouteConfiguration(0, route_config);  SetNextResolution({});  SetNextResolutionForLbChannelAllBalancers();  CheckRpcSendFailure();  const auto response_state = RouteConfigurationResponseState(0);  EXPECT_EQ(response_state.state, AdsServiceImpl::ResponseState::NACKED);  EXPECT_THAT(response_state.error_message,              ::testing::HasSubstr("No valid routes specified."));}// Tests that LDS client should ignore route which has path// string that has too many slashes; for example, ends with "/".TEST_P(LdsRdsTest, RouteMatchHasInvalidPathTooManySlashes) {  RouteConfiguration route_config = default_route_config_;  auto* route1 = route_config.mutable_virtual_hosts(0)->mutable_routes(0);  route1->mutable_match()->set_path("/grpc.testing.EchoTest1Service/Echo1/");  SetRouteConfiguration(0, route_config);  SetNextResolution({});  SetNextResolutionForLbChannelAllBalancers();  CheckRpcSendFailure();  const auto response_state = RouteConfigurationResponseState(0);  EXPECT_EQ(response_state.state, AdsServiceImpl::ResponseState::NACKED);  EXPECT_THAT(response_state.error_message,              ::testing::HasSubstr("No valid routes specified."));}// Tests that LDS client should ignore route which has path// string that has only 1 slash: missing "/" between service and method.TEST_P(LdsRdsTest, RouteMatchHasInvalidPathOnlyOneSlash) {  RouteConfiguration route_config = default_route_config_;  auto* route1 = route_config.mutable_virtual_hosts(0)->mutable_routes(0);  route1->mutable_match()->set_path("/grpc.testing.EchoTest1Service.Echo1");  SetRouteConfiguration(0, route_config);  SetNextResolution({});  SetNextResolutionForLbChannelAllBalancers();  CheckRpcSendFailure();  const auto response_state = RouteConfigurationResponseState(0);  EXPECT_EQ(response_state.state, AdsServiceImpl::ResponseState::NACKED);  EXPECT_THAT(response_state.error_message,              ::testing::HasSubstr("No valid routes specified."));}// Tests that LDS client should ignore route which has path// string that is missing service.TEST_P(LdsRdsTest, RouteMatchHasInvalidPathMissingService) {  RouteConfiguration route_config = default_route_config_;  auto* route1 = route_config.mutable_virtual_hosts(0)->mutable_routes(0);  route1->mutable_match()->set_path("//Echo1");  SetRouteConfiguration(0, route_config);  SetNextResolution({});  SetNextResolutionForLbChannelAllBalancers();  CheckRpcSendFailure();  const auto response_state = RouteConfigurationResponseState(0);  EXPECT_EQ(response_state.state, AdsServiceImpl::ResponseState::NACKED);  EXPECT_THAT(response_state.error_message,              ::testing::HasSubstr("No valid routes specified."));}// Tests that LDS client should ignore route which has path// string that is missing method.TEST_P(LdsRdsTest, RouteMatchHasInvalidPathMissingMethod) {  RouteConfiguration route_config = default_route_config_;  auto* route1 = route_config.mutable_virtual_hosts(0)->mutable_routes(0);  route1->mutable_match()->set_path("/grpc.testing.EchoTest1Service/");  SetRouteConfiguration(0, route_config);  SetNextResolution({});  SetNextResolutionForLbChannelAllBalancers();  CheckRpcSendFailure();  const auto response_state = RouteConfigurationResponseState(0);  EXPECT_EQ(response_state.state, AdsServiceImpl::ResponseState::NACKED);  EXPECT_THAT(response_state.error_message,              ::testing::HasSubstr("No valid routes specified."));}// Test that LDS client should reject route which has invalid path regex.TEST_P(LdsRdsTest, RouteMatchHasInvalidPathRegex) {  const char* kNewCluster1Name = "new_cluster_1";  RouteConfiguration route_config = default_route_config_;  auto* route1 = route_config.mutable_virtual_hosts(0)->mutable_routes(0);  route1->mutable_match()->mutable_safe_regex()->set_regex("a[z-a]");  route1->mutable_route()->set_cluster(kNewCluster1Name);  SetRouteConfiguration(0, route_config);  SetNextResolution({});  SetNextResolutionForLbChannelAllBalancers();  CheckRpcSendFailure();  const auto response_state = RouteConfigurationResponseState(0);  EXPECT_EQ(response_state.state, AdsServiceImpl::ResponseState::NACKED);  EXPECT_THAT(response_state.error_message,              ::testing::HasSubstr(                  "path matcher: Invalid regex string specified in matcher."));}// Tests that LDS client should send a NACK if route has an action other than// RouteAction in the LDS response.TEST_P(LdsRdsTest, RouteHasNoRouteAction) {  RouteConfiguration route_config = default_route_config_;  route_config.mutable_virtual_hosts(0)->mutable_routes(0)->mutable_redirect();  SetRouteConfiguration(0, route_config);  SetNextResolution({});  SetNextResolutionForLbChannelAllBalancers();  CheckRpcSendFailure();  const auto response_state = RouteConfigurationResponseState(0);  EXPECT_EQ(response_state.state, AdsServiceImpl::ResponseState::NACKED);  EXPECT_THAT(response_state.error_message,              ::testing::HasSubstr("No RouteAction found in route."));}TEST_P(LdsRdsTest, RouteActionClusterHasEmptyClusterName) {  RouteConfiguration route_config = default_route_config_;  auto* route1 = route_config.mutable_virtual_hosts(0)->mutable_routes(0);  route1->mutable_match()->set_prefix("/grpc.testing.EchoTest1Service/");  route1->mutable_route()->set_cluster("");  auto* default_route = route_config.mutable_virtual_hosts(0)->add_routes();  default_route->mutable_match()->set_prefix("");  default_route->mutable_route()->set_cluster(kDefaultClusterName);  SetRouteConfiguration(0, route_config);  SetNextResolution({});  SetNextResolutionForLbChannelAllBalancers();  CheckRpcSendFailure();  const auto response_state = RouteConfigurationResponseState(0);  EXPECT_EQ(response_state.state, AdsServiceImpl::ResponseState::NACKED);  EXPECT_THAT(      response_state.error_message,      ::testing::HasSubstr("RouteAction cluster contains empty cluster name."));}TEST_P(LdsRdsTest, RouteActionWeightedTargetHasIncorrectTotalWeightSet) {  const size_t kWeight75 = 75;  const char* kNewCluster1Name = "new_cluster_1";  RouteConfiguration route_config = default_route_config_;  auto* route1 = route_config.mutable_virtual_hosts(0)->mutable_routes(0);  route1->mutable_match()->set_prefix("/grpc.testing.EchoTest1Service/");  auto* weighted_cluster1 =      route1->mutable_route()->mutable_weighted_clusters()->add_clusters();  weighted_cluster1->set_name(kNewCluster1Name);  weighted_cluster1->mutable_weight()->set_value(kWeight75);  route1->mutable_route()      ->mutable_weighted_clusters()      ->mutable_total_weight()      ->set_value(kWeight75 + 1);  auto* default_route = route_config.mutable_virtual_hosts(0)->add_routes();  default_route->mutable_match()->set_prefix("");  default_route->mutable_route()->set_cluster(kDefaultClusterName);  SetRouteConfiguration(0, route_config);  SetNextResolution({});  SetNextResolutionForLbChannelAllBalancers();  CheckRpcSendFailure();  const auto response_state = RouteConfigurationResponseState(0);  EXPECT_EQ(response_state.state, AdsServiceImpl::ResponseState::NACKED);  EXPECT_THAT(response_state.error_message,              ::testing::HasSubstr(                  "RouteAction weighted_cluster has incorrect total weight"));}TEST_P(LdsRdsTest, RouteActionWeightedClusterHasZeroTotalWeight) {  const char* kNewCluster1Name = "new_cluster_1";  RouteConfiguration route_config = default_route_config_;  auto* route1 = route_config.mutable_virtual_hosts(0)->mutable_routes(0);  route1->mutable_match()->set_prefix("/grpc.testing.EchoTest1Service/");  auto* weighted_cluster1 =      route1->mutable_route()->mutable_weighted_clusters()->add_clusters();  weighted_cluster1->set_name(kNewCluster1Name);  weighted_cluster1->mutable_weight()->set_value(0);  route1->mutable_route()      ->mutable_weighted_clusters()      ->mutable_total_weight()      ->set_value(0);  auto* default_route = route_config.mutable_virtual_hosts(0)->add_routes();  default_route->mutable_match()->set_prefix("");  default_route->mutable_route()->set_cluster(kDefaultClusterName);  SetRouteConfiguration(0, route_config);  SetNextResolution({});  SetNextResolutionForLbChannelAllBalancers();  CheckRpcSendFailure();  const auto response_state = RouteConfigurationResponseState(0);  EXPECT_EQ(response_state.state, AdsServiceImpl::ResponseState::NACKED);  EXPECT_THAT(      response_state.error_message,      ::testing::HasSubstr(          "RouteAction weighted_cluster has no valid clusters specified."));}TEST_P(LdsRdsTest, RouteActionWeightedTargetClusterHasEmptyClusterName) {  const size_t kWeight75 = 75;  RouteConfiguration route_config = default_route_config_;  auto* route1 = route_config.mutable_virtual_hosts(0)->mutable_routes(0);  route1->mutable_match()->set_prefix("/grpc.testing.EchoTest1Service/");  auto* weighted_cluster1 =      route1->mutable_route()->mutable_weighted_clusters()->add_clusters();  weighted_cluster1->set_name("");  weighted_cluster1->mutable_weight()->set_value(kWeight75);  route1->mutable_route()      ->mutable_weighted_clusters()      ->mutable_total_weight()      ->set_value(kWeight75);  auto* default_route = route_config.mutable_virtual_hosts(0)->add_routes();  default_route->mutable_match()->set_prefix("");  default_route->mutable_route()->set_cluster(kDefaultClusterName);  SetRouteConfiguration(0, route_config);  SetNextResolution({});  SetNextResolutionForLbChannelAllBalancers();  CheckRpcSendFailure();  const auto response_state = RouteConfigurationResponseState(0);  EXPECT_EQ(response_state.state, AdsServiceImpl::ResponseState::NACKED);  EXPECT_THAT(      response_state.error_message,      ::testing::HasSubstr(          "RouteAction weighted_cluster cluster contains empty cluster name."));}TEST_P(LdsRdsTest, RouteActionWeightedTargetClusterHasNoWeight) {  const size_t kWeight75 = 75;  const char* kNewCluster1Name = "new_cluster_1";  RouteConfiguration route_config = default_route_config_;  auto* route1 = route_config.mutable_virtual_hosts(0)->mutable_routes(0);  route1->mutable_match()->set_prefix("/grpc.testing.EchoTest1Service/");  auto* weighted_cluster1 =      route1->mutable_route()->mutable_weighted_clusters()->add_clusters();  weighted_cluster1->set_name(kNewCluster1Name);  route1->mutable_route()      ->mutable_weighted_clusters()      ->mutable_total_weight()      ->set_value(kWeight75);  auto* default_route = route_config.mutable_virtual_hosts(0)->add_routes();  default_route->mutable_match()->set_prefix("");  default_route->mutable_route()->set_cluster(kDefaultClusterName);  SetRouteConfiguration(0, route_config);  SetNextResolution({});  SetNextResolutionForLbChannelAllBalancers();  CheckRpcSendFailure();  const auto response_state = RouteConfigurationResponseState(0);  EXPECT_EQ(response_state.state, AdsServiceImpl::ResponseState::NACKED);  EXPECT_THAT(response_state.error_message,              ::testing::HasSubstr(                  "RouteAction weighted_cluster cluster missing weight"));}TEST_P(LdsRdsTest, RouteHeaderMatchInvalidRegex) {  const char* kNewCluster1Name = "new_cluster_1";  RouteConfiguration route_config = default_route_config_;  auto* route1 = route_config.mutable_virtual_hosts(0)->mutable_routes(0);  route1->mutable_match()->set_prefix("/grpc.testing.EchoTest1Service/");  auto* header_matcher1 = route1->mutable_match()->add_headers();  header_matcher1->set_name("header1");  header_matcher1->mutable_safe_regex_match()->set_regex("a[z-a]");  route1->mutable_route()->set_cluster(kNewCluster1Name);  SetRouteConfiguration(0, route_config);  SetNextResolution({});  SetNextResolutionForLbChannelAllBalancers();  CheckRpcSendFailure();  const auto response_state = RouteConfigurationResponseState(0);  EXPECT_EQ(response_state.state, AdsServiceImpl::ResponseState::NACKED);  EXPECT_THAT(      response_state.error_message,      ::testing::HasSubstr(          "header matcher: Invalid regex string specified in matcher."));}TEST_P(LdsRdsTest, RouteHeaderMatchInvalidRange) {  const char* kNewCluster1Name = "new_cluster_1";  RouteConfiguration route_config = default_route_config_;  auto* route1 = route_config.mutable_virtual_hosts(0)->mutable_routes(0);  route1->mutable_match()->set_prefix("/grpc.testing.EchoTest1Service/");  auto* header_matcher1 = route1->mutable_match()->add_headers();  header_matcher1->set_name("header1");  header_matcher1->mutable_range_match()->set_start(1001);  header_matcher1->mutable_range_match()->set_end(1000);  route1->mutable_route()->set_cluster(kNewCluster1Name);  SetRouteConfiguration(0, route_config);  SetNextResolution({});  SetNextResolutionForLbChannelAllBalancers();  CheckRpcSendFailure();  const auto response_state = RouteConfigurationResponseState(0);  EXPECT_EQ(response_state.state, AdsServiceImpl::ResponseState::NACKED);  EXPECT_THAT(      response_state.error_message,      ::testing::HasSubstr(          "header matcher: Invalid range specifier specified: end cannot be "          "smaller than start."));}// Tests that LDS client should choose the default route (with no matching// specified) after unable to find a match with previous routes.TEST_P(LdsRdsTest, XdsRoutingPathMatching) {  const char* kNewCluster1Name = "new_cluster_1";  const char* kNewEdsService1Name = "new_eds_service_name_1";  const char* kNewCluster2Name = "new_cluster_2";  const char* kNewEdsService2Name = "new_eds_service_name_2";  const size_t kNumEcho1Rpcs = 10;  const size_t kNumEcho2Rpcs = 20;  const size_t kNumEchoRpcs = 30;  SetNextResolution({});  SetNextResolutionForLbChannelAllBalancers();  // Populate new EDS resources.  AdsServiceImpl::EdsResourceArgs args({      {"locality0", GetBackendPorts(0, 2)},  });  AdsServiceImpl::EdsResourceArgs args1({      {"locality0", GetBackendPorts(2, 3)},  });  AdsServiceImpl::EdsResourceArgs args2({      {"locality0", GetBackendPorts(3, 4)},  });  balancers_[0]->ads_service()->SetEdsResource(BuildEdsResource(args));  balancers_[0]->ads_service()->SetEdsResource(      BuildEdsResource(args1, kNewEdsService1Name));  balancers_[0]->ads_service()->SetEdsResource(      BuildEdsResource(args2, kNewEdsService2Name));  // Populate new CDS resources.  Cluster new_cluster1 = default_cluster_;  new_cluster1.set_name(kNewCluster1Name);  new_cluster1.mutable_eds_cluster_config()->set_service_name(      kNewEdsService1Name);  balancers_[0]->ads_service()->SetCdsResource(new_cluster1);  Cluster new_cluster2 = default_cluster_;  new_cluster2.set_name(kNewCluster2Name);  new_cluster2.mutable_eds_cluster_config()->set_service_name(      kNewEdsService2Name);  balancers_[0]->ads_service()->SetCdsResource(new_cluster2);  // Populating Route Configurations for LDS.  RouteConfiguration new_route_config = default_route_config_;  auto* route1 = new_route_config.mutable_virtual_hosts(0)->mutable_routes(0);  route1->mutable_match()->set_path("/grpc.testing.EchoTest1Service/Echo1");  route1->mutable_route()->set_cluster(kNewCluster1Name);  auto* route2 = new_route_config.mutable_virtual_hosts(0)->add_routes();  route2->mutable_match()->set_path("/grpc.testing.EchoTest2Service/Echo2");  route2->mutable_route()->set_cluster(kNewCluster2Name);  auto* route3 = new_route_config.mutable_virtual_hosts(0)->add_routes();  route3->mutable_match()->set_path("/grpc.testing.EchoTest3Service/Echo3");  route3->mutable_route()->set_cluster(kDefaultClusterName);  auto* default_route = new_route_config.mutable_virtual_hosts(0)->add_routes();  default_route->mutable_match()->set_prefix("");  default_route->mutable_route()->set_cluster(kDefaultClusterName);  SetRouteConfiguration(0, new_route_config);  WaitForAllBackends(0, 2);  CheckRpcSendOk(kNumEchoRpcs, RpcOptions().set_wait_for_ready(true));  CheckRpcSendOk(kNumEcho1Rpcs, RpcOptions()                                    .set_rpc_service(SERVICE_ECHO1)                                    .set_rpc_method(METHOD_ECHO1)                                    .set_wait_for_ready(true));  CheckRpcSendOk(kNumEcho2Rpcs, RpcOptions()                                    .set_rpc_service(SERVICE_ECHO2)                                    .set_rpc_method(METHOD_ECHO2)                                    .set_wait_for_ready(true));  // Make sure RPCs all go to the correct backend.  for (size_t i = 0; i < 2; ++i) {    EXPECT_EQ(kNumEchoRpcs / 2,              backends_[i]->backend_service()->request_count());    EXPECT_EQ(0, backends_[i]->backend_service1()->request_count());    EXPECT_EQ(0, backends_[i]->backend_service2()->request_count());  }  EXPECT_EQ(0, backends_[2]->backend_service()->request_count());  EXPECT_EQ(kNumEcho1Rpcs, backends_[2]->backend_service1()->request_count());  EXPECT_EQ(0, backends_[2]->backend_service2()->request_count());  EXPECT_EQ(0, backends_[3]->backend_service()->request_count());  EXPECT_EQ(0, backends_[3]->backend_service1()->request_count());  EXPECT_EQ(kNumEcho2Rpcs, backends_[3]->backend_service2()->request_count());}TEST_P(LdsRdsTest, XdsRoutingPathMatchingCaseInsensitive) {  const char* kNewCluster1Name = "new_cluster_1";  const char* kNewEdsService1Name = "new_eds_service_name_1";  const char* kNewCluster2Name = "new_cluster_2";  const char* kNewEdsService2Name = "new_eds_service_name_2";  const size_t kNumEcho1Rpcs = 10;  const size_t kNumEchoRpcs = 30;  SetNextResolution({});  SetNextResolutionForLbChannelAllBalancers();  // Populate new EDS resources.  AdsServiceImpl::EdsResourceArgs args({      {"locality0", GetBackendPorts(0, 1)},  });  AdsServiceImpl::EdsResourceArgs args1({      {"locality0", GetBackendPorts(1, 2)},  });  AdsServiceImpl::EdsResourceArgs args2({      {"locality0", GetBackendPorts(2, 3)},  });  balancers_[0]->ads_service()->SetEdsResource(BuildEdsResource(args));  balancers_[0]->ads_service()->SetEdsResource(      BuildEdsResource(args1, kNewEdsService1Name));  balancers_[0]->ads_service()->SetEdsResource(      BuildEdsResource(args2, kNewEdsService2Name));  // Populate new CDS resources.  Cluster new_cluster1 = default_cluster_;  new_cluster1.set_name(kNewCluster1Name);  new_cluster1.mutable_eds_cluster_config()->set_service_name(      kNewEdsService1Name);  balancers_[0]->ads_service()->SetCdsResource(new_cluster1);  Cluster new_cluster2 = default_cluster_;  new_cluster2.set_name(kNewCluster2Name);  new_cluster2.mutable_eds_cluster_config()->set_service_name(      kNewEdsService2Name);  balancers_[0]->ads_service()->SetCdsResource(new_cluster2);  // Populating Route Configurations for LDS.  RouteConfiguration new_route_config = default_route_config_;  // First route will not match, since it's case-sensitive.  // Second route will match with same path.  auto* route1 = new_route_config.mutable_virtual_hosts(0)->mutable_routes(0);  route1->mutable_match()->set_path("/GrPc.TeStInG.EcHoTeSt1SErViCe/EcHo1");  route1->mutable_route()->set_cluster(kNewCluster1Name);  auto* route2 = new_route_config.mutable_virtual_hosts(0)->add_routes();  route2->mutable_match()->set_path("/GrPc.TeStInG.EcHoTeSt1SErViCe/EcHo1");  route2->mutable_match()->mutable_case_sensitive()->set_value(false);  route2->mutable_route()->set_cluster(kNewCluster2Name);  auto* default_route = new_route_config.mutable_virtual_hosts(0)->add_routes();  default_route->mutable_match()->set_prefix("");  default_route->mutable_route()->set_cluster(kDefaultClusterName);  SetRouteConfiguration(0, new_route_config);  CheckRpcSendOk(kNumEchoRpcs, RpcOptions().set_wait_for_ready(true));  CheckRpcSendOk(kNumEcho1Rpcs, RpcOptions()                                    .set_rpc_service(SERVICE_ECHO1)                                    .set_rpc_method(METHOD_ECHO1)                                    .set_wait_for_ready(true));  // Make sure RPCs all go to the correct backend.  EXPECT_EQ(kNumEchoRpcs, backends_[0]->backend_service()->request_count());  EXPECT_EQ(0, backends_[0]->backend_service1()->request_count());  EXPECT_EQ(0, backends_[1]->backend_service()->request_count());  EXPECT_EQ(0, backends_[1]->backend_service1()->request_count());  EXPECT_EQ(0, backends_[2]->backend_service()->request_count());  EXPECT_EQ(kNumEcho1Rpcs, backends_[2]->backend_service1()->request_count());}TEST_P(LdsRdsTest, XdsRoutingPrefixMatching) {  const char* kNewCluster1Name = "new_cluster_1";  const char* kNewEdsService1Name = "new_eds_service_name_1";  const char* kNewCluster2Name = "new_cluster_2";  const char* kNewEdsService2Name = "new_eds_service_name_2";  const size_t kNumEcho1Rpcs = 10;  const size_t kNumEcho2Rpcs = 20;  const size_t kNumEchoRpcs = 30;  SetNextResolution({});  SetNextResolutionForLbChannelAllBalancers();  // Populate new EDS resources.  AdsServiceImpl::EdsResourceArgs args({      {"locality0", GetBackendPorts(0, 2)},  });  AdsServiceImpl::EdsResourceArgs args1({      {"locality0", GetBackendPorts(2, 3)},  });  AdsServiceImpl::EdsResourceArgs args2({      {"locality0", GetBackendPorts(3, 4)},  });  balancers_[0]->ads_service()->SetEdsResource(BuildEdsResource(args));  balancers_[0]->ads_service()->SetEdsResource(      BuildEdsResource(args1, kNewEdsService1Name));  balancers_[0]->ads_service()->SetEdsResource(      BuildEdsResource(args2, kNewEdsService2Name));  // Populate new CDS resources.  Cluster new_cluster1 = default_cluster_;  new_cluster1.set_name(kNewCluster1Name);  new_cluster1.mutable_eds_cluster_config()->set_service_name(      kNewEdsService1Name);  balancers_[0]->ads_service()->SetCdsResource(new_cluster1);  Cluster new_cluster2 = default_cluster_;  new_cluster2.set_name(kNewCluster2Name);  new_cluster2.mutable_eds_cluster_config()->set_service_name(      kNewEdsService2Name);  balancers_[0]->ads_service()->SetCdsResource(new_cluster2);  // Populating Route Configurations for LDS.  RouteConfiguration new_route_config = default_route_config_;  auto* route1 = new_route_config.mutable_virtual_hosts(0)->mutable_routes(0);  route1->mutable_match()->set_prefix("/grpc.testing.EchoTest1Service/");  route1->mutable_route()->set_cluster(kNewCluster1Name);  auto* route2 = new_route_config.mutable_virtual_hosts(0)->add_routes();  route2->mutable_match()->set_prefix("/grpc.testing.EchoTest2Service/");  route2->mutable_route()->set_cluster(kNewCluster2Name);  auto* default_route = new_route_config.mutable_virtual_hosts(0)->add_routes();  default_route->mutable_match()->set_prefix("");  default_route->mutable_route()->set_cluster(kDefaultClusterName);  SetRouteConfiguration(0, new_route_config);  WaitForAllBackends(0, 2);  CheckRpcSendOk(kNumEchoRpcs, RpcOptions().set_wait_for_ready(true));  CheckRpcSendOk(      kNumEcho1Rpcs,      RpcOptions().set_rpc_service(SERVICE_ECHO1).set_wait_for_ready(true));  CheckRpcSendOk(      kNumEcho2Rpcs,      RpcOptions().set_rpc_service(SERVICE_ECHO2).set_wait_for_ready(true));  // Make sure RPCs all go to the correct backend.  for (size_t i = 0; i < 2; ++i) {    EXPECT_EQ(kNumEchoRpcs / 2,              backends_[i]->backend_service()->request_count());    EXPECT_EQ(0, backends_[i]->backend_service1()->request_count());    EXPECT_EQ(0, backends_[i]->backend_service2()->request_count());  }  EXPECT_EQ(0, backends_[2]->backend_service()->request_count());  EXPECT_EQ(kNumEcho1Rpcs, backends_[2]->backend_service1()->request_count());  EXPECT_EQ(0, backends_[2]->backend_service2()->request_count());  EXPECT_EQ(0, backends_[3]->backend_service()->request_count());  EXPECT_EQ(0, backends_[3]->backend_service1()->request_count());  EXPECT_EQ(kNumEcho2Rpcs, backends_[3]->backend_service2()->request_count());}TEST_P(LdsRdsTest, XdsRoutingPrefixMatchingCaseInsensitive) {  const char* kNewCluster1Name = "new_cluster_1";  const char* kNewEdsService1Name = "new_eds_service_name_1";  const char* kNewCluster2Name = "new_cluster_2";  const char* kNewEdsService2Name = "new_eds_service_name_2";  const size_t kNumEcho1Rpcs = 10;  const size_t kNumEchoRpcs = 30;  SetNextResolution({});  SetNextResolutionForLbChannelAllBalancers();  // Populate new EDS resources.  AdsServiceImpl::EdsResourceArgs args({      {"locality0", GetBackendPorts(0, 1)},  });  AdsServiceImpl::EdsResourceArgs args1({      {"locality0", GetBackendPorts(1, 2)},  });  AdsServiceImpl::EdsResourceArgs args2({      {"locality0", GetBackendPorts(2, 3)},  });  balancers_[0]->ads_service()->SetEdsResource(BuildEdsResource(args));  balancers_[0]->ads_service()->SetEdsResource(      BuildEdsResource(args1, kNewEdsService1Name));  balancers_[0]->ads_service()->SetEdsResource(      BuildEdsResource(args2, kNewEdsService2Name));  // Populate new CDS resources.  Cluster new_cluster1 = default_cluster_;  new_cluster1.set_name(kNewCluster1Name);  new_cluster1.mutable_eds_cluster_config()->set_service_name(      kNewEdsService1Name);  balancers_[0]->ads_service()->SetCdsResource(new_cluster1);  Cluster new_cluster2 = default_cluster_;  new_cluster2.set_name(kNewCluster2Name);  new_cluster2.mutable_eds_cluster_config()->set_service_name(      kNewEdsService2Name);  balancers_[0]->ads_service()->SetCdsResource(new_cluster2);  // Populating Route Configurations for LDS.  RouteConfiguration new_route_config = default_route_config_;  // First route will not match, since it's case-sensitive.  // Second route will match with same path.  auto* route1 = new_route_config.mutable_virtual_hosts(0)->mutable_routes(0);  route1->mutable_match()->set_prefix("/GrPc.TeStInG.EcHoTeSt1SErViCe");  route1->mutable_route()->set_cluster(kNewCluster1Name);  auto* route2 = new_route_config.mutable_virtual_hosts(0)->add_routes();  route2->mutable_match()->set_prefix("/GrPc.TeStInG.EcHoTeSt1SErViCe");  route2->mutable_match()->mutable_case_sensitive()->set_value(false);  route2->mutable_route()->set_cluster(kNewCluster2Name);  auto* default_route = new_route_config.mutable_virtual_hosts(0)->add_routes();  default_route->mutable_match()->set_prefix("");  default_route->mutable_route()->set_cluster(kDefaultClusterName);  SetRouteConfiguration(0, new_route_config);  CheckRpcSendOk(kNumEchoRpcs, RpcOptions().set_wait_for_ready(true));  CheckRpcSendOk(kNumEcho1Rpcs, RpcOptions()                                    .set_rpc_service(SERVICE_ECHO1)                                    .set_rpc_method(METHOD_ECHO1)                                    .set_wait_for_ready(true));  // Make sure RPCs all go to the correct backend.  EXPECT_EQ(kNumEchoRpcs, backends_[0]->backend_service()->request_count());  EXPECT_EQ(0, backends_[0]->backend_service1()->request_count());  EXPECT_EQ(0, backends_[1]->backend_service()->request_count());  EXPECT_EQ(0, backends_[1]->backend_service1()->request_count());  EXPECT_EQ(0, backends_[2]->backend_service()->request_count());  EXPECT_EQ(kNumEcho1Rpcs, backends_[2]->backend_service1()->request_count());}TEST_P(LdsRdsTest, XdsRoutingPathRegexMatching) {  const char* kNewCluster1Name = "new_cluster_1";  const char* kNewEdsService1Name = "new_eds_service_name_1";  const char* kNewCluster2Name = "new_cluster_2";  const char* kNewEdsService2Name = "new_eds_service_name_2";  const size_t kNumEcho1Rpcs = 10;  const size_t kNumEcho2Rpcs = 20;  const size_t kNumEchoRpcs = 30;  SetNextResolution({});  SetNextResolutionForLbChannelAllBalancers();  // Populate new EDS resources.  AdsServiceImpl::EdsResourceArgs args({      {"locality0", GetBackendPorts(0, 2)},  });  AdsServiceImpl::EdsResourceArgs args1({      {"locality0", GetBackendPorts(2, 3)},  });  AdsServiceImpl::EdsResourceArgs args2({      {"locality0", GetBackendPorts(3, 4)},  });  balancers_[0]->ads_service()->SetEdsResource(BuildEdsResource(args));  balancers_[0]->ads_service()->SetEdsResource(      BuildEdsResource(args1, kNewEdsService1Name));  balancers_[0]->ads_service()->SetEdsResource(      BuildEdsResource(args2, kNewEdsService2Name));  // Populate new CDS resources.  Cluster new_cluster1 = default_cluster_;  new_cluster1.set_name(kNewCluster1Name);  new_cluster1.mutable_eds_cluster_config()->set_service_name(      kNewEdsService1Name);  balancers_[0]->ads_service()->SetCdsResource(new_cluster1);  Cluster new_cluster2 = default_cluster_;  new_cluster2.set_name(kNewCluster2Name);  new_cluster2.mutable_eds_cluster_config()->set_service_name(      kNewEdsService2Name);  balancers_[0]->ads_service()->SetCdsResource(new_cluster2);  // Populating Route Configurations for LDS.  RouteConfiguration new_route_config = default_route_config_;  auto* route1 = new_route_config.mutable_virtual_hosts(0)->mutable_routes(0);  // Will match "/grpc.testing.EchoTest1Service/"  route1->mutable_match()->mutable_safe_regex()->set_regex(".*1.*");  route1->mutable_route()->set_cluster(kNewCluster1Name);  auto* route2 = new_route_config.mutable_virtual_hosts(0)->add_routes();  // Will match "/grpc.testing.EchoTest2Service/"  route2->mutable_match()->mutable_safe_regex()->set_regex(".*2.*");  route2->mutable_route()->set_cluster(kNewCluster2Name);  auto* default_route = new_route_config.mutable_virtual_hosts(0)->add_routes();  default_route->mutable_match()->set_prefix("");  default_route->mutable_route()->set_cluster(kDefaultClusterName);  SetRouteConfiguration(0, new_route_config);  WaitForAllBackends(0, 2);  CheckRpcSendOk(kNumEchoRpcs, RpcOptions().set_wait_for_ready(true));  CheckRpcSendOk(      kNumEcho1Rpcs,      RpcOptions().set_rpc_service(SERVICE_ECHO1).set_wait_for_ready(true));  CheckRpcSendOk(      kNumEcho2Rpcs,      RpcOptions().set_rpc_service(SERVICE_ECHO2).set_wait_for_ready(true));  // Make sure RPCs all go to the correct backend.  for (size_t i = 0; i < 2; ++i) {    EXPECT_EQ(kNumEchoRpcs / 2,              backends_[i]->backend_service()->request_count());    EXPECT_EQ(0, backends_[i]->backend_service1()->request_count());    EXPECT_EQ(0, backends_[i]->backend_service2()->request_count());  }  EXPECT_EQ(0, backends_[2]->backend_service()->request_count());  EXPECT_EQ(kNumEcho1Rpcs, backends_[2]->backend_service1()->request_count());  EXPECT_EQ(0, backends_[2]->backend_service2()->request_count());  EXPECT_EQ(0, backends_[3]->backend_service()->request_count());  EXPECT_EQ(0, backends_[3]->backend_service1()->request_count());  EXPECT_EQ(kNumEcho2Rpcs, backends_[3]->backend_service2()->request_count());}TEST_P(LdsRdsTest, XdsRoutingPathRegexMatchingCaseInsensitive) {  const char* kNewCluster1Name = "new_cluster_1";  const char* kNewEdsService1Name = "new_eds_service_name_1";  const char* kNewCluster2Name = "new_cluster_2";  const char* kNewEdsService2Name = "new_eds_service_name_2";  const size_t kNumEcho1Rpcs = 10;  const size_t kNumEchoRpcs = 30;  SetNextResolution({});  SetNextResolutionForLbChannelAllBalancers();  // Populate new EDS resources.  AdsServiceImpl::EdsResourceArgs args({      {"locality0", GetBackendPorts(0, 1)},  });  AdsServiceImpl::EdsResourceArgs args1({      {"locality0", GetBackendPorts(1, 2)},  });  AdsServiceImpl::EdsResourceArgs args2({      {"locality0", GetBackendPorts(2, 3)},  });  balancers_[0]->ads_service()->SetEdsResource(BuildEdsResource(args));  balancers_[0]->ads_service()->SetEdsResource(      BuildEdsResource(args1, kNewEdsService1Name));  balancers_[0]->ads_service()->SetEdsResource(      BuildEdsResource(args2, kNewEdsService2Name));  // Populate new CDS resources.  Cluster new_cluster1 = default_cluster_;  new_cluster1.set_name(kNewCluster1Name);  new_cluster1.mutable_eds_cluster_config()->set_service_name(      kNewEdsService1Name);  balancers_[0]->ads_service()->SetCdsResource(new_cluster1);  Cluster new_cluster2 = default_cluster_;  new_cluster2.set_name(kNewCluster2Name);  new_cluster2.mutable_eds_cluster_config()->set_service_name(      kNewEdsService2Name);  balancers_[0]->ads_service()->SetCdsResource(new_cluster2);  // Populating Route Configurations for LDS.  RouteConfiguration new_route_config = default_route_config_;  // First route will not match, since it's case-sensitive.  // Second route will match with same path.  auto* route1 = new_route_config.mutable_virtual_hosts(0)->mutable_routes(0);  route1->mutable_match()->mutable_safe_regex()->set_regex(      ".*EcHoTeSt1SErViCe.*");  route1->mutable_route()->set_cluster(kNewCluster1Name);  auto* route2 = new_route_config.mutable_virtual_hosts(0)->add_routes();  route2->mutable_match()->mutable_safe_regex()->set_regex(      ".*EcHoTeSt1SErViCe.*");  route2->mutable_match()->mutable_case_sensitive()->set_value(false);  route2->mutable_route()->set_cluster(kNewCluster2Name);  auto* default_route = new_route_config.mutable_virtual_hosts(0)->add_routes();  default_route->mutable_match()->set_prefix("");  default_route->mutable_route()->set_cluster(kDefaultClusterName);  SetRouteConfiguration(0, new_route_config);  CheckRpcSendOk(kNumEchoRpcs, RpcOptions().set_wait_for_ready(true));  CheckRpcSendOk(kNumEcho1Rpcs, RpcOptions()                                    .set_rpc_service(SERVICE_ECHO1)                                    .set_rpc_method(METHOD_ECHO1)                                    .set_wait_for_ready(true));  // Make sure RPCs all go to the correct backend.  EXPECT_EQ(kNumEchoRpcs, backends_[0]->backend_service()->request_count());  EXPECT_EQ(0, backends_[0]->backend_service1()->request_count());  EXPECT_EQ(0, backends_[1]->backend_service()->request_count());  EXPECT_EQ(0, backends_[1]->backend_service1()->request_count());  EXPECT_EQ(0, backends_[2]->backend_service()->request_count());  EXPECT_EQ(kNumEcho1Rpcs, backends_[2]->backend_service1()->request_count());}TEST_P(LdsRdsTest, XdsRoutingWeightedCluster) {  const char* kNewCluster1Name = "new_cluster_1";  const char* kNewEdsService1Name = "new_eds_service_name_1";  const char* kNewCluster2Name = "new_cluster_2";  const char* kNewEdsService2Name = "new_eds_service_name_2";  const char* kNotUsedClusterName = "not_used_cluster";  const size_t kNumEcho1Rpcs = 1000;  const size_t kNumEchoRpcs = 10;  const size_t kWeight75 = 75;  const size_t kWeight25 = 25;  SetNextResolution({});  SetNextResolutionForLbChannelAllBalancers();  // Populate new EDS resources.  AdsServiceImpl::EdsResourceArgs args({      {"locality0", GetBackendPorts(0, 1)},  });  AdsServiceImpl::EdsResourceArgs args1({      {"locality0", GetBackendPorts(1, 2)},  });  AdsServiceImpl::EdsResourceArgs args2({      {"locality0", GetBackendPorts(2, 3)},  });  balancers_[0]->ads_service()->SetEdsResource(BuildEdsResource(args));  balancers_[0]->ads_service()->SetEdsResource(      BuildEdsResource(args1, kNewEdsService1Name));  balancers_[0]->ads_service()->SetEdsResource(      BuildEdsResource(args2, kNewEdsService2Name));  // Populate new CDS resources.  Cluster new_cluster1 = default_cluster_;  new_cluster1.set_name(kNewCluster1Name);  new_cluster1.mutable_eds_cluster_config()->set_service_name(      kNewEdsService1Name);  balancers_[0]->ads_service()->SetCdsResource(new_cluster1);  Cluster new_cluster2 = default_cluster_;  new_cluster2.set_name(kNewCluster2Name);  new_cluster2.mutable_eds_cluster_config()->set_service_name(      kNewEdsService2Name);  balancers_[0]->ads_service()->SetCdsResource(new_cluster2);  // Populating Route Configurations for LDS.  RouteConfiguration new_route_config = default_route_config_;  auto* route1 = new_route_config.mutable_virtual_hosts(0)->mutable_routes(0);  route1->mutable_match()->set_prefix("/grpc.testing.EchoTest1Service/");  auto* weighted_cluster1 =      route1->mutable_route()->mutable_weighted_clusters()->add_clusters();  weighted_cluster1->set_name(kNewCluster1Name);  weighted_cluster1->mutable_weight()->set_value(kWeight75);  auto* weighted_cluster2 =      route1->mutable_route()->mutable_weighted_clusters()->add_clusters();  weighted_cluster2->set_name(kNewCluster2Name);  weighted_cluster2->mutable_weight()->set_value(kWeight25);  // Cluster with weight 0 will not be used.  auto* weighted_cluster3 =      route1->mutable_route()->mutable_weighted_clusters()->add_clusters();  weighted_cluster3->set_name(kNotUsedClusterName);  weighted_cluster3->mutable_weight()->set_value(0);  route1->mutable_route()      ->mutable_weighted_clusters()      ->mutable_total_weight()      ->set_value(kWeight75 + kWeight25);  auto* default_route = new_route_config.mutable_virtual_hosts(0)->add_routes();  default_route->mutable_match()->set_prefix("");  default_route->mutable_route()->set_cluster(kDefaultClusterName);  SetRouteConfiguration(0, new_route_config);  WaitForAllBackends(0, 1);  WaitForAllBackends(1, 3, true, RpcOptions().set_rpc_service(SERVICE_ECHO1));  CheckRpcSendOk(kNumEchoRpcs);  CheckRpcSendOk(kNumEcho1Rpcs, RpcOptions().set_rpc_service(SERVICE_ECHO1));  // Make sure RPCs all go to the correct backend.  EXPECT_EQ(kNumEchoRpcs, backends_[0]->backend_service()->request_count());  EXPECT_EQ(0, backends_[0]->backend_service1()->request_count());  EXPECT_EQ(0, backends_[1]->backend_service()->request_count());  const int weight_75_request_count =      backends_[1]->backend_service1()->request_count();  EXPECT_EQ(0, backends_[2]->backend_service()->request_count());  const int weight_25_request_count =      backends_[2]->backend_service1()->request_count();  const double kErrorTolerance = 0.2;  EXPECT_THAT(      weight_75_request_count,      ::testing::AllOf(::testing::Ge(static_cast<double>(kNumEcho1Rpcs) *                                     kWeight75 / 100 * (1 - kErrorTolerance)),                       ::testing::Le(static_cast<double>(kNumEcho1Rpcs) *                                     kWeight75 / 100 * (1 + kErrorTolerance))));  // TODO(@donnadionne): Reduce tolerance: increased the tolerance to keep the  // test from flaking while debugging potential root cause.  const double kErrorToleranceSmallLoad = 0.3;  gpr_log(GPR_INFO, "target_75 received %d rpcs and target_25 received %d rpcs",          weight_75_request_count, weight_25_request_count);  EXPECT_THAT(weight_25_request_count,              ::testing::AllOf(                  ::testing::Ge(static_cast<double>(kNumEcho1Rpcs) * kWeight25 /                                100 * (1 - kErrorToleranceSmallLoad)),                  ::testing::Le(static_cast<double>(kNumEcho1Rpcs) * kWeight25 /                                100 * (1 + kErrorToleranceSmallLoad))));}TEST_P(LdsRdsTest, RouteActionWeightedTargetDefaultRoute) {  const char* kNewCluster1Name = "new_cluster_1";  const char* kNewEdsService1Name = "new_eds_service_name_1";  const char* kNewCluster2Name = "new_cluster_2";  const char* kNewEdsService2Name = "new_eds_service_name_2";  const size_t kNumEchoRpcs = 1000;  const size_t kWeight75 = 75;  const size_t kWeight25 = 25;  SetNextResolution({});  SetNextResolutionForLbChannelAllBalancers();  // Populate new EDS resources.  AdsServiceImpl::EdsResourceArgs args({      {"locality0", GetBackendPorts(0, 1)},  });  AdsServiceImpl::EdsResourceArgs args1({      {"locality0", GetBackendPorts(1, 2)},  });  AdsServiceImpl::EdsResourceArgs args2({      {"locality0", GetBackendPorts(2, 3)},  });  balancers_[0]->ads_service()->SetEdsResource(BuildEdsResource(args));  balancers_[0]->ads_service()->SetEdsResource(      BuildEdsResource(args1, kNewEdsService1Name));  balancers_[0]->ads_service()->SetEdsResource(      BuildEdsResource(args2, kNewEdsService2Name));  // Populate new CDS resources.  Cluster new_cluster1 = default_cluster_;  new_cluster1.set_name(kNewCluster1Name);  new_cluster1.mutable_eds_cluster_config()->set_service_name(      kNewEdsService1Name);  balancers_[0]->ads_service()->SetCdsResource(new_cluster1);  Cluster new_cluster2 = default_cluster_;  new_cluster2.set_name(kNewCluster2Name);  new_cluster2.mutable_eds_cluster_config()->set_service_name(      kNewEdsService2Name);  balancers_[0]->ads_service()->SetCdsResource(new_cluster2);  // Populating Route Configurations for LDS.  RouteConfiguration new_route_config = default_route_config_;  auto* route1 = new_route_config.mutable_virtual_hosts(0)->mutable_routes(0);  route1->mutable_match()->set_prefix("");  auto* weighted_cluster1 =      route1->mutable_route()->mutable_weighted_clusters()->add_clusters();  weighted_cluster1->set_name(kNewCluster1Name);  weighted_cluster1->mutable_weight()->set_value(kWeight75);  auto* weighted_cluster2 =      route1->mutable_route()->mutable_weighted_clusters()->add_clusters();  weighted_cluster2->set_name(kNewCluster2Name);  weighted_cluster2->mutable_weight()->set_value(kWeight25);  route1->mutable_route()      ->mutable_weighted_clusters()      ->mutable_total_weight()      ->set_value(kWeight75 + kWeight25);  SetRouteConfiguration(0, new_route_config);  WaitForAllBackends(1, 3);  CheckRpcSendOk(kNumEchoRpcs);  // Make sure RPCs all go to the correct backend.  EXPECT_EQ(0, backends_[0]->backend_service()->request_count());  const int weight_75_request_count =      backends_[1]->backend_service()->request_count();  const int weight_25_request_count =      backends_[2]->backend_service()->request_count();  const double kErrorTolerance = 0.2;  EXPECT_THAT(      weight_75_request_count,      ::testing::AllOf(::testing::Ge(static_cast<double>(kNumEchoRpcs) *                                     kWeight75 / 100 * (1 - kErrorTolerance)),                       ::testing::Le(static_cast<double>(kNumEchoRpcs) *                                     kWeight75 / 100 * (1 + kErrorTolerance))));  // TODO(@donnadionne): Reduce tolerance: increased the tolerance to keep the  // test from flaking while debugging potential root cause.  const double kErrorToleranceSmallLoad = 0.3;  gpr_log(GPR_INFO, "target_75 received %d rpcs and target_25 received %d rpcs",          weight_75_request_count, weight_25_request_count);  EXPECT_THAT(weight_25_request_count,              ::testing::AllOf(                  ::testing::Ge(static_cast<double>(kNumEchoRpcs) * kWeight25 /                                100 * (1 - kErrorToleranceSmallLoad)),                  ::testing::Le(static_cast<double>(kNumEchoRpcs) * kWeight25 /                                100 * (1 + kErrorToleranceSmallLoad))));}TEST_P(LdsRdsTest, XdsRoutingWeightedClusterUpdateWeights) {  const char* kNewCluster1Name = "new_cluster_1";  const char* kNewEdsService1Name = "new_eds_service_name_1";  const char* kNewCluster2Name = "new_cluster_2";  const char* kNewEdsService2Name = "new_eds_service_name_2";  const char* kNewCluster3Name = "new_cluster_3";  const char* kNewEdsService3Name = "new_eds_service_name_3";  const size_t kNumEcho1Rpcs = 1000;  const size_t kNumEchoRpcs = 10;  const size_t kWeight75 = 75;  const size_t kWeight25 = 25;  const size_t kWeight50 = 50;  SetNextResolution({});  SetNextResolutionForLbChannelAllBalancers();  // Populate new EDS resources.  AdsServiceImpl::EdsResourceArgs args({      {"locality0", GetBackendPorts(0, 1)},  });  AdsServiceImpl::EdsResourceArgs args1({      {"locality0", GetBackendPorts(1, 2)},  });  AdsServiceImpl::EdsResourceArgs args2({      {"locality0", GetBackendPorts(2, 3)},  });  AdsServiceImpl::EdsResourceArgs args3({      {"locality0", GetBackendPorts(3, 4)},  });  balancers_[0]->ads_service()->SetEdsResource(BuildEdsResource(args));  balancers_[0]->ads_service()->SetEdsResource(      BuildEdsResource(args1, kNewEdsService1Name));  balancers_[0]->ads_service()->SetEdsResource(      BuildEdsResource(args2, kNewEdsService2Name));  balancers_[0]->ads_service()->SetEdsResource(      BuildEdsResource(args3, kNewEdsService3Name));  // Populate new CDS resources.  Cluster new_cluster1 = default_cluster_;  new_cluster1.set_name(kNewCluster1Name);  new_cluster1.mutable_eds_cluster_config()->set_service_name(      kNewEdsService1Name);  balancers_[0]->ads_service()->SetCdsResource(new_cluster1);  Cluster new_cluster2 = default_cluster_;  new_cluster2.set_name(kNewCluster2Name);  new_cluster2.mutable_eds_cluster_config()->set_service_name(      kNewEdsService2Name);  balancers_[0]->ads_service()->SetCdsResource(new_cluster2);  Cluster new_cluster3 = default_cluster_;  new_cluster3.set_name(kNewCluster3Name);  new_cluster3.mutable_eds_cluster_config()->set_service_name(      kNewEdsService3Name);  balancers_[0]->ads_service()->SetCdsResource(new_cluster3);  // Populating Route Configurations.  RouteConfiguration new_route_config = default_route_config_;  auto* route1 = new_route_config.mutable_virtual_hosts(0)->mutable_routes(0);  route1->mutable_match()->set_prefix("/grpc.testing.EchoTest1Service/");  auto* weighted_cluster1 =      route1->mutable_route()->mutable_weighted_clusters()->add_clusters();  weighted_cluster1->set_name(kNewCluster1Name);  weighted_cluster1->mutable_weight()->set_value(kWeight75);  auto* weighted_cluster2 =      route1->mutable_route()->mutable_weighted_clusters()->add_clusters();  weighted_cluster2->set_name(kNewCluster2Name);  weighted_cluster2->mutable_weight()->set_value(kWeight25);  route1->mutable_route()      ->mutable_weighted_clusters()      ->mutable_total_weight()      ->set_value(kWeight75 + kWeight25);  auto* default_route = new_route_config.mutable_virtual_hosts(0)->add_routes();  default_route->mutable_match()->set_prefix("");  default_route->mutable_route()->set_cluster(kDefaultClusterName);  SetRouteConfiguration(0, new_route_config);  WaitForAllBackends(0, 1);  WaitForAllBackends(1, 3, true, RpcOptions().set_rpc_service(SERVICE_ECHO1));  CheckRpcSendOk(kNumEchoRpcs);  CheckRpcSendOk(kNumEcho1Rpcs, RpcOptions().set_rpc_service(SERVICE_ECHO1));  // Make sure RPCs all go to the correct backend.  EXPECT_EQ(kNumEchoRpcs, backends_[0]->backend_service()->request_count());  EXPECT_EQ(0, backends_[0]->backend_service1()->request_count());  EXPECT_EQ(0, backends_[1]->backend_service()->request_count());  const int weight_75_request_count =      backends_[1]->backend_service1()->request_count();  EXPECT_EQ(0, backends_[1]->backend_service2()->request_count());  EXPECT_EQ(0, backends_[2]->backend_service()->request_count());  const int weight_25_request_count =      backends_[2]->backend_service1()->request_count();  EXPECT_EQ(0, backends_[3]->backend_service()->request_count());  EXPECT_EQ(0, backends_[3]->backend_service1()->request_count());  const double kErrorTolerance = 0.2;  EXPECT_THAT(      weight_75_request_count,      ::testing::AllOf(::testing::Ge(static_cast<double>(kNumEcho1Rpcs) *                                     kWeight75 / 100 * (1 - kErrorTolerance)),                       ::testing::Le(static_cast<double>(kNumEcho1Rpcs) *                                     kWeight75 / 100 * (1 + kErrorTolerance))));  // TODO(@donnadionne): Reduce tolerance: increased the tolerance to keep the  // test from flaking while debugging potential root cause.  const double kErrorToleranceSmallLoad = 0.3;  gpr_log(GPR_INFO, "target_75 received %d rpcs and target_25 received %d rpcs",          weight_75_request_count, weight_25_request_count);  EXPECT_THAT(weight_25_request_count,              ::testing::AllOf(                  ::testing::Ge(static_cast<double>(kNumEcho1Rpcs) * kWeight25 /                                100 * (1 - kErrorToleranceSmallLoad)),                  ::testing::Le(static_cast<double>(kNumEcho1Rpcs) * kWeight25 /                                100 * (1 + kErrorToleranceSmallLoad))));  // Change Route Configurations: same clusters different weights.  weighted_cluster1->mutable_weight()->set_value(kWeight50);  weighted_cluster2->mutable_weight()->set_value(kWeight50);  // Change default route to a new cluster to help to identify when new polices  // are seen by the client.  default_route->mutable_route()->set_cluster(kNewCluster3Name);  SetRouteConfiguration(0, new_route_config);  ResetBackendCounters();  WaitForAllBackends(3, 4);  CheckRpcSendOk(kNumEchoRpcs);  CheckRpcSendOk(kNumEcho1Rpcs, RpcOptions().set_rpc_service(SERVICE_ECHO1));  // Make sure RPCs all go to the correct backend.  EXPECT_EQ(0, backends_[0]->backend_service()->request_count());  EXPECT_EQ(0, backends_[0]->backend_service1()->request_count());  EXPECT_EQ(0, backends_[1]->backend_service()->request_count());  const int weight_50_request_count_1 =      backends_[1]->backend_service1()->request_count();  EXPECT_EQ(0, backends_[2]->backend_service()->request_count());  const int weight_50_request_count_2 =      backends_[2]->backend_service1()->request_count();  EXPECT_EQ(kNumEchoRpcs, backends_[3]->backend_service()->request_count());  EXPECT_EQ(0, backends_[3]->backend_service1()->request_count());  EXPECT_THAT(      weight_50_request_count_1,      ::testing::AllOf(::testing::Ge(static_cast<double>(kNumEcho1Rpcs) *                                     kWeight50 / 100 * (1 - kErrorTolerance)),                       ::testing::Le(static_cast<double>(kNumEcho1Rpcs) *                                     kWeight50 / 100 * (1 + kErrorTolerance))));  EXPECT_THAT(      weight_50_request_count_2,      ::testing::AllOf(::testing::Ge(static_cast<double>(kNumEcho1Rpcs) *                                     kWeight50 / 100 * (1 - kErrorTolerance)),                       ::testing::Le(static_cast<double>(kNumEcho1Rpcs) *                                     kWeight50 / 100 * (1 + kErrorTolerance))));}TEST_P(LdsRdsTest, XdsRoutingWeightedClusterUpdateClusters) {  const char* kNewCluster1Name = "new_cluster_1";  const char* kNewEdsService1Name = "new_eds_service_name_1";  const char* kNewCluster2Name = "new_cluster_2";  const char* kNewEdsService2Name = "new_eds_service_name_2";  const char* kNewCluster3Name = "new_cluster_3";  const char* kNewEdsService3Name = "new_eds_service_name_3";  const size_t kNumEcho1Rpcs = 1000;  const size_t kNumEchoRpcs = 10;  const size_t kWeight75 = 75;  const size_t kWeight25 = 25;  const size_t kWeight50 = 50;  SetNextResolution({});  SetNextResolutionForLbChannelAllBalancers();  // Populate new EDS resources.  AdsServiceImpl::EdsResourceArgs args({      {"locality0", GetBackendPorts(0, 1)},  });  AdsServiceImpl::EdsResourceArgs args1({      {"locality0", GetBackendPorts(1, 2)},  });  AdsServiceImpl::EdsResourceArgs args2({      {"locality0", GetBackendPorts(2, 3)},  });  AdsServiceImpl::EdsResourceArgs args3({      {"locality0", GetBackendPorts(3, 4)},  });  balancers_[0]->ads_service()->SetEdsResource(BuildEdsResource(args));  balancers_[0]->ads_service()->SetEdsResource(      BuildEdsResource(args1, kNewEdsService1Name));  balancers_[0]->ads_service()->SetEdsResource(      BuildEdsResource(args2, kNewEdsService2Name));  balancers_[0]->ads_service()->SetEdsResource(      BuildEdsResource(args3, kNewEdsService3Name));  // Populate new CDS resources.  Cluster new_cluster1 = default_cluster_;  new_cluster1.set_name(kNewCluster1Name);  new_cluster1.mutable_eds_cluster_config()->set_service_name(      kNewEdsService1Name);  balancers_[0]->ads_service()->SetCdsResource(new_cluster1);  Cluster new_cluster2 = default_cluster_;  new_cluster2.set_name(kNewCluster2Name);  new_cluster2.mutable_eds_cluster_config()->set_service_name(      kNewEdsService2Name);  balancers_[0]->ads_service()->SetCdsResource(new_cluster2);  Cluster new_cluster3 = default_cluster_;  new_cluster3.set_name(kNewCluster3Name);  new_cluster3.mutable_eds_cluster_config()->set_service_name(      kNewEdsService3Name);  balancers_[0]->ads_service()->SetCdsResource(new_cluster3);  // Populating Route Configurations.  RouteConfiguration new_route_config = default_route_config_;  auto* route1 = new_route_config.mutable_virtual_hosts(0)->mutable_routes(0);  route1->mutable_match()->set_prefix("/grpc.testing.EchoTest1Service/");  auto* weighted_cluster1 =      route1->mutable_route()->mutable_weighted_clusters()->add_clusters();  weighted_cluster1->set_name(kNewCluster1Name);  weighted_cluster1->mutable_weight()->set_value(kWeight75);  auto* weighted_cluster2 =      route1->mutable_route()->mutable_weighted_clusters()->add_clusters();  weighted_cluster2->set_name(kDefaultClusterName);  weighted_cluster2->mutable_weight()->set_value(kWeight25);  route1->mutable_route()      ->mutable_weighted_clusters()      ->mutable_total_weight()      ->set_value(kWeight75 + kWeight25);  auto* default_route = new_route_config.mutable_virtual_hosts(0)->add_routes();  default_route->mutable_match()->set_prefix("");  default_route->mutable_route()->set_cluster(kDefaultClusterName);  SetRouteConfiguration(0, new_route_config);  WaitForAllBackends(0, 1);  WaitForAllBackends(1, 2, true, RpcOptions().set_rpc_service(SERVICE_ECHO1));  CheckRpcSendOk(kNumEchoRpcs);  CheckRpcSendOk(kNumEcho1Rpcs, RpcOptions().set_rpc_service(SERVICE_ECHO1));  // Make sure RPCs all go to the correct backend.  EXPECT_EQ(kNumEchoRpcs, backends_[0]->backend_service()->request_count());  int weight_25_request_count =      backends_[0]->backend_service1()->request_count();  EXPECT_EQ(0, backends_[1]->backend_service()->request_count());  int weight_75_request_count =      backends_[1]->backend_service1()->request_count();  EXPECT_EQ(0, backends_[2]->backend_service()->request_count());  EXPECT_EQ(0, backends_[2]->backend_service1()->request_count());  EXPECT_EQ(0, backends_[3]->backend_service()->request_count());  EXPECT_EQ(0, backends_[3]->backend_service1()->request_count());  const double kErrorTolerance = 0.2;  EXPECT_THAT(      weight_75_request_count,      ::testing::AllOf(::testing::Ge(static_cast<double>(kNumEcho1Rpcs) *                                     kWeight75 / 100 * (1 - kErrorTolerance)),                       ::testing::Le(static_cast<double>(kNumEcho1Rpcs) *                                     kWeight75 / 100 * (1 + kErrorTolerance))));  // TODO(@donnadionne): Reduce tolerance: increased the tolerance to keep the  // test from flaking while debugging potential root cause.  const double kErrorToleranceSmallLoad = 0.3;  gpr_log(GPR_INFO, "target_75 received %d rpcs and target_25 received %d rpcs",          weight_75_request_count, weight_25_request_count);  EXPECT_THAT(weight_25_request_count,              ::testing::AllOf(                  ::testing::Ge(static_cast<double>(kNumEcho1Rpcs) * kWeight25 /                                100 * (1 - kErrorToleranceSmallLoad)),                  ::testing::Le(static_cast<double>(kNumEcho1Rpcs) * kWeight25 /                                100 * (1 + kErrorToleranceSmallLoad))));  // Change Route Configurations: new set of clusters with different weights.  weighted_cluster1->mutable_weight()->set_value(kWeight50);  weighted_cluster2->set_name(kNewCluster2Name);  weighted_cluster2->mutable_weight()->set_value(kWeight50);  SetRouteConfiguration(0, new_route_config);  ResetBackendCounters();  WaitForAllBackends(2, 3, true, RpcOptions().set_rpc_service(SERVICE_ECHO1));  CheckRpcSendOk(kNumEchoRpcs);  CheckRpcSendOk(kNumEcho1Rpcs, RpcOptions().set_rpc_service(SERVICE_ECHO1));  // Make sure RPCs all go to the correct backend.  EXPECT_EQ(kNumEchoRpcs, backends_[0]->backend_service()->request_count());  EXPECT_EQ(0, backends_[0]->backend_service1()->request_count());  EXPECT_EQ(0, backends_[1]->backend_service()->request_count());  const int weight_50_request_count_1 =      backends_[1]->backend_service1()->request_count();  EXPECT_EQ(0, backends_[2]->backend_service()->request_count());  const int weight_50_request_count_2 =      backends_[2]->backend_service1()->request_count();  EXPECT_EQ(0, backends_[3]->backend_service()->request_count());  EXPECT_EQ(0, backends_[3]->backend_service1()->request_count());  EXPECT_THAT(      weight_50_request_count_1,      ::testing::AllOf(::testing::Ge(static_cast<double>(kNumEcho1Rpcs) *                                     kWeight50 / 100 * (1 - kErrorTolerance)),                       ::testing::Le(static_cast<double>(kNumEcho1Rpcs) *                                     kWeight50 / 100 * (1 + kErrorTolerance))));  EXPECT_THAT(      weight_50_request_count_2,      ::testing::AllOf(::testing::Ge(static_cast<double>(kNumEcho1Rpcs) *                                     kWeight50 / 100 * (1 - kErrorTolerance)),                       ::testing::Le(static_cast<double>(kNumEcho1Rpcs) *                                     kWeight50 / 100 * (1 + kErrorTolerance))));  // Change Route Configurations.  weighted_cluster1->mutable_weight()->set_value(kWeight75);  weighted_cluster2->set_name(kNewCluster3Name);  weighted_cluster2->mutable_weight()->set_value(kWeight25);  SetRouteConfiguration(0, new_route_config);  ResetBackendCounters();  WaitForAllBackends(3, 4, true, RpcOptions().set_rpc_service(SERVICE_ECHO1));  CheckRpcSendOk(kNumEchoRpcs);  CheckRpcSendOk(kNumEcho1Rpcs, RpcOptions().set_rpc_service(SERVICE_ECHO1));  // Make sure RPCs all go to the correct backend.  EXPECT_EQ(kNumEchoRpcs, backends_[0]->backend_service()->request_count());  EXPECT_EQ(0, backends_[0]->backend_service1()->request_count());  EXPECT_EQ(0, backends_[1]->backend_service()->request_count());  weight_75_request_count = backends_[1]->backend_service1()->request_count();  EXPECT_EQ(0, backends_[2]->backend_service()->request_count());  EXPECT_EQ(0, backends_[2]->backend_service1()->request_count());  EXPECT_EQ(0, backends_[3]->backend_service()->request_count());  weight_25_request_count = backends_[3]->backend_service1()->request_count();  EXPECT_THAT(      weight_75_request_count,      ::testing::AllOf(::testing::Ge(static_cast<double>(kNumEcho1Rpcs) *                                     kWeight75 / 100 * (1 - kErrorTolerance)),                       ::testing::Le(static_cast<double>(kNumEcho1Rpcs) *                                     kWeight75 / 100 * (1 + kErrorTolerance))));  // TODO(@donnadionne): Reduce tolerance: increased the tolerance to keep the  // test from flaking while debugging potential root cause.  gpr_log(GPR_INFO, "target_75 received %d rpcs and target_25 received %d rpcs",          weight_75_request_count, weight_25_request_count);  EXPECT_THAT(weight_25_request_count,              ::testing::AllOf(                  ::testing::Ge(static_cast<double>(kNumEcho1Rpcs) * kWeight25 /                                100 * (1 - kErrorToleranceSmallLoad)),                  ::testing::Le(static_cast<double>(kNumEcho1Rpcs) * kWeight25 /                                100 * (1 + kErrorToleranceSmallLoad))));}TEST_P(LdsRdsTest, XdsRoutingClusterUpdateClusters) {  const char* kNewClusterName = "new_cluster";  const char* kNewEdsServiceName = "new_eds_service_name";  const size_t kNumEchoRpcs = 5;  SetNextResolution({});  SetNextResolutionForLbChannelAllBalancers();  // Populate new EDS resources.  AdsServiceImpl::EdsResourceArgs args({      {"locality0", GetBackendPorts(0, 1)},  });  AdsServiceImpl::EdsResourceArgs args1({      {"locality0", GetBackendPorts(1, 2)},  });  balancers_[0]->ads_service()->SetEdsResource(BuildEdsResource(args));  balancers_[0]->ads_service()->SetEdsResource(      BuildEdsResource(args1, kNewEdsServiceName));  // Populate new CDS resources.  Cluster new_cluster = default_cluster_;  new_cluster.set_name(kNewClusterName);  new_cluster.mutable_eds_cluster_config()->set_service_name(      kNewEdsServiceName);  balancers_[0]->ads_service()->SetCdsResource(new_cluster);  // Send Route Configuration.  RouteConfiguration new_route_config = default_route_config_;  SetRouteConfiguration(0, new_route_config);  WaitForAllBackends(0, 1);  CheckRpcSendOk(kNumEchoRpcs);  // Make sure RPCs all go to the correct backend.  EXPECT_EQ(kNumEchoRpcs, backends_[0]->backend_service()->request_count());  // Change Route Configurations: new default cluster.  auto* default_route =      new_route_config.mutable_virtual_hosts(0)->mutable_routes(0);  default_route->mutable_route()->set_cluster(kNewClusterName);  SetRouteConfiguration(0, new_route_config);  WaitForAllBackends(1, 2);  CheckRpcSendOk(kNumEchoRpcs);  // Make sure RPCs all go to the correct backend.  EXPECT_EQ(kNumEchoRpcs, backends_[1]->backend_service()->request_count());}TEST_P(LdsRdsTest, XdsRoutingClusterUpdateClustersWithPickingDelays) {  const char* kNewClusterName = "new_cluster";  const char* kNewEdsServiceName = "new_eds_service_name";  SetNextResolution({});  SetNextResolutionForLbChannelAllBalancers();  // Populate new EDS resources.  AdsServiceImpl::EdsResourceArgs args({      {"locality0", GetBackendPorts(0, 1)},  });  AdsServiceImpl::EdsResourceArgs args1({      {"locality0", GetBackendPorts(1, 2)},  });  balancers_[0]->ads_service()->SetEdsResource(BuildEdsResource(args));  balancers_[0]->ads_service()->SetEdsResource(      BuildEdsResource(args1, kNewEdsServiceName));  // Populate new CDS resources.  Cluster new_cluster = default_cluster_;  new_cluster.set_name(kNewClusterName);  new_cluster.mutable_eds_cluster_config()->set_service_name(      kNewEdsServiceName);  balancers_[0]->ads_service()->SetCdsResource(new_cluster);  // Bring down the current backend: 0, this will delay route picking time,  // resulting in un-committed RPCs.  ShutdownBackend(0);  // Send a RouteConfiguration with a default route that points to  // backend 0.  RouteConfiguration new_route_config = default_route_config_;  SetRouteConfiguration(0, new_route_config);  // Send exactly one RPC with no deadline and with wait_for_ready=true.  // This RPC will not complete until after backend 0 is started.  std::thread sending_rpc([this]() {    CheckRpcSendOk(1, RpcOptions().set_wait_for_ready(true).set_timeout_ms(0));  });  // Send a non-wait_for_ready RPC which should fail, this will tell us  // that the client has received the update and attempted to connect.  const Status status = SendRpc(RpcOptions().set_timeout_ms(0));  EXPECT_FALSE(status.ok());  // Send a update RouteConfiguration to use backend 1.  auto* default_route =      new_route_config.mutable_virtual_hosts(0)->mutable_routes(0);  default_route->mutable_route()->set_cluster(kNewClusterName);  SetRouteConfiguration(0, new_route_config);  // Wait for RPCs to go to the new backend: 1, this ensures that the client has  // processed the update.  WaitForAllBackends(1, 2, false, RpcOptions(), true);  // Bring up the previous backend: 0, this will allow the delayed RPC to  // finally call on_call_committed upon completion.  StartBackend(0);  sending_rpc.join();  // Make sure RPCs go to the correct backend:  EXPECT_EQ(1, backends_[0]->backend_service()->request_count());  EXPECT_EQ(1, backends_[1]->backend_service()->request_count());}TEST_P(LdsRdsTest, XdsRoutingApplyXdsTimeout) {  gpr_setenv("GRPC_XDS_EXPERIMENTAL_ENABLE_TIMEOUT", "true");  const int64_t kTimeoutMillis = 500;  const int64_t kTimeoutNano = kTimeoutMillis * 1000000;  const int64_t kTimeoutGrpcTimeoutHeaderMaxSecond = 1;  const int64_t kTimeoutMaxStreamDurationSecond = 2;  const int64_t kTimeoutHttpMaxStreamDurationSecond = 3;  const int64_t kTimeoutApplicationSecond = 4;  const char* kNewCluster1Name = "new_cluster_1";  const char* kNewEdsService1Name = "new_eds_service_name_1";  const char* kNewCluster2Name = "new_cluster_2";  const char* kNewEdsService2Name = "new_eds_service_name_2";  const char* kNewCluster3Name = "new_cluster_3";  const char* kNewEdsService3Name = "new_eds_service_name_3";  SetNextResolution({});  SetNextResolutionForLbChannelAllBalancers();  // Populate new EDS resources.  AdsServiceImpl::EdsResourceArgs args({      {"locality0", {grpc_pick_unused_port_or_die()}},  });  AdsServiceImpl::EdsResourceArgs args1({      {"locality0", {grpc_pick_unused_port_or_die()}},  });  AdsServiceImpl::EdsResourceArgs args2({      {"locality0", {grpc_pick_unused_port_or_die()}},  });  AdsServiceImpl::EdsResourceArgs args3({      {"locality0", {grpc_pick_unused_port_or_die()}},  });  balancers_[0]->ads_service()->SetEdsResource(BuildEdsResource(args));  balancers_[0]->ads_service()->SetEdsResource(      BuildEdsResource(args1, kNewEdsService1Name));  balancers_[0]->ads_service()->SetEdsResource(      BuildEdsResource(args2, kNewEdsService2Name));  balancers_[0]->ads_service()->SetEdsResource(      BuildEdsResource(args3, kNewEdsService3Name));  // Populate new CDS resources.  Cluster new_cluster1 = default_cluster_;  new_cluster1.set_name(kNewCluster1Name);  new_cluster1.mutable_eds_cluster_config()->set_service_name(      kNewEdsService1Name);  balancers_[0]->ads_service()->SetCdsResource(new_cluster1);  Cluster new_cluster2 = default_cluster_;  new_cluster2.set_name(kNewCluster2Name);  new_cluster2.mutable_eds_cluster_config()->set_service_name(      kNewEdsService2Name);  balancers_[0]->ads_service()->SetCdsResource(new_cluster2);  Cluster new_cluster3 = default_cluster_;  new_cluster3.set_name(kNewCluster3Name);  new_cluster3.mutable_eds_cluster_config()->set_service_name(      kNewEdsService3Name);  balancers_[0]->ads_service()->SetCdsResource(new_cluster3);  // Construct listener.  auto listener = default_listener_;  HttpConnectionManager http_connection_manager;  listener.mutable_api_listener()->mutable_api_listener()->UnpackTo(      &http_connection_manager);  // Set up HTTP max_stream_duration of 3.5 seconds  auto* duration =      http_connection_manager.mutable_common_http_protocol_options()          ->mutable_max_stream_duration();  duration->set_seconds(kTimeoutHttpMaxStreamDurationSecond);  duration->set_nanos(kTimeoutNano);  listener.mutable_api_listener()->mutable_api_listener()->PackFrom(      http_connection_manager);  // Construct route config.  RouteConfiguration new_route_config = default_route_config_;  // route 1: Set max_stream_duration of 2.5 seconds, Set  // grpc_timeout_header_max of 1.5  auto* route1 = new_route_config.mutable_virtual_hosts(0)->mutable_routes(0);  route1->mutable_match()->set_path("/grpc.testing.EchoTest1Service/Echo1");  route1->mutable_route()->set_cluster(kNewCluster1Name);  auto* max_stream_duration =      route1->mutable_route()->mutable_max_stream_duration();  duration = max_stream_duration->mutable_max_stream_duration();  duration->set_seconds(kTimeoutMaxStreamDurationSecond);  duration->set_nanos(kTimeoutNano);  duration = max_stream_duration->mutable_grpc_timeout_header_max();  duration->set_seconds(kTimeoutGrpcTimeoutHeaderMaxSecond);  duration->set_nanos(kTimeoutNano);  // route 2: Set max_stream_duration of 2.5 seconds  auto* route2 = new_route_config.mutable_virtual_hosts(0)->add_routes();  route2->mutable_match()->set_path("/grpc.testing.EchoTest2Service/Echo2");  route2->mutable_route()->set_cluster(kNewCluster2Name);  max_stream_duration = route2->mutable_route()->mutable_max_stream_duration();  duration = max_stream_duration->mutable_max_stream_duration();  duration->set_seconds(kTimeoutMaxStreamDurationSecond);  duration->set_nanos(kTimeoutNano);  // route 3: No timeout values in route configuration  auto* route3 = new_route_config.mutable_virtual_hosts(0)->add_routes();  route3->mutable_match()->set_path("/grpc.testing.EchoTestService/Echo");  route3->mutable_route()->set_cluster(kNewCluster3Name);  // Set listener and route config.  SetListenerAndRouteConfiguration(0, std::move(listener), new_route_config);  // Test grpc_timeout_header_max of 1.5 seconds applied  grpc_millis t0 = NowFromCycleCounter();  grpc_millis t1 =      t0 + kTimeoutGrpcTimeoutHeaderMaxSecond * 1000 + kTimeoutMillis;  grpc_millis t2 = t0 + kTimeoutMaxStreamDurationSecond * 1000 + kTimeoutMillis;  CheckRpcSendFailure(1,                      RpcOptions()                          .set_rpc_service(SERVICE_ECHO1)                          .set_rpc_method(METHOD_ECHO1)                          .set_wait_for_ready(true)                          .set_timeout_ms(kTimeoutApplicationSecond * 1000),                      StatusCode::DEADLINE_EXCEEDED);  t0 = NowFromCycleCounter();  EXPECT_GE(t0, t1);  EXPECT_LT(t0, t2);  // Test max_stream_duration of 2.5 seconds applied  t0 = NowFromCycleCounter();  t1 = t0 + kTimeoutMaxStreamDurationSecond * 1000 + kTimeoutMillis;  t2 = t0 + kTimeoutHttpMaxStreamDurationSecond * 1000 + kTimeoutMillis;  CheckRpcSendFailure(1,                      RpcOptions()                          .set_rpc_service(SERVICE_ECHO2)                          .set_rpc_method(METHOD_ECHO2)                          .set_wait_for_ready(true)                          .set_timeout_ms(kTimeoutApplicationSecond * 1000),                      StatusCode::DEADLINE_EXCEEDED);  t0 = NowFromCycleCounter();  EXPECT_GE(t0, t1);  EXPECT_LT(t0, t2);  // Test http_stream_duration of 3.5 seconds applied  t0 = NowFromCycleCounter();  t1 = t0 + kTimeoutHttpMaxStreamDurationSecond * 1000 + kTimeoutMillis;  t2 = t0 + kTimeoutApplicationSecond * 1000 + kTimeoutMillis;  CheckRpcSendFailure(1,                      RpcOptions().set_wait_for_ready(true).set_timeout_ms(                          kTimeoutApplicationSecond * 1000),                      StatusCode::DEADLINE_EXCEEDED);  t0 = NowFromCycleCounter();  EXPECT_GE(t0, t1);  EXPECT_LT(t0, t2);  gpr_unsetenv("GRPC_XDS_EXPERIMENTAL_ENABLE_TIMEOUT");}TEST_P(LdsRdsTest, XdsRoutingXdsTimeoutDisabled) {  const int64_t kTimeoutMillis = 500;  const int64_t kTimeoutNano = kTimeoutMillis * 1000000;  const int64_t kTimeoutGrpcTimeoutHeaderMaxSecond = 1;  const int64_t kTimeoutApplicationSecond = 4;  SetNextResolution({});  SetNextResolutionForLbChannelAllBalancers();  // Populate new EDS resources.  AdsServiceImpl::EdsResourceArgs args({      {"locality0", {grpc_pick_unused_port_or_die()}},  });  balancers_[0]->ads_service()->SetEdsResource(BuildEdsResource(args));  RouteConfiguration new_route_config = default_route_config_;  // route 1: Set grpc_timeout_header_max of 1.5  auto* route1 = new_route_config.mutable_virtual_hosts(0)->mutable_routes(0);  auto* max_stream_duration =      route1->mutable_route()->mutable_max_stream_duration();  auto* duration = max_stream_duration->mutable_grpc_timeout_header_max();  duration->set_seconds(kTimeoutGrpcTimeoutHeaderMaxSecond);  duration->set_nanos(kTimeoutNano);  SetRouteConfiguration(0, new_route_config);  // Test grpc_timeout_header_max of 1.5 seconds is not applied  gpr_timespec t0 = gpr_now(GPR_CLOCK_MONOTONIC);  gpr_timespec est_timeout_time = gpr_time_add(      t0, gpr_time_from_millis(              kTimeoutGrpcTimeoutHeaderMaxSecond * 1000 + kTimeoutMillis,              GPR_TIMESPAN));  CheckRpcSendFailure(1,                      RpcOptions()                          .set_rpc_service(SERVICE_ECHO1)                          .set_rpc_method(METHOD_ECHO1)                          .set_wait_for_ready(true)                          .set_timeout_ms(kTimeoutApplicationSecond * 1000),                      StatusCode::DEADLINE_EXCEEDED);  gpr_timespec timeout_time = gpr_now(GPR_CLOCK_MONOTONIC);  EXPECT_GT(gpr_time_cmp(timeout_time, est_timeout_time), 0);}TEST_P(LdsRdsTest, XdsRoutingHttpTimeoutDisabled) {  const int64_t kTimeoutMillis = 500;  const int64_t kTimeoutNano = kTimeoutMillis * 1000000;  const int64_t kTimeoutHttpMaxStreamDurationSecond = 3;  const int64_t kTimeoutApplicationSecond = 4;  SetNextResolution({});  SetNextResolutionForLbChannelAllBalancers();  // Populate new EDS resources.  AdsServiceImpl::EdsResourceArgs args({      {"locality0", {grpc_pick_unused_port_or_die()}},  });  // Construct listener.  auto listener = default_listener_;  HttpConnectionManager http_connection_manager;  listener.mutable_api_listener()->mutable_api_listener()->UnpackTo(      &http_connection_manager);  // Set up HTTP max_stream_duration of 3.5 seconds  auto* duration =      http_connection_manager.mutable_common_http_protocol_options()          ->mutable_max_stream_duration();  duration->set_seconds(kTimeoutHttpMaxStreamDurationSecond);  duration->set_nanos(kTimeoutNano);  listener.mutable_api_listener()->mutable_api_listener()->PackFrom(      http_connection_manager);  SetListenerAndRouteConfiguration(0, std::move(listener),                                   default_route_config_);  // Test http_stream_duration of 3.5 seconds is not applied  auto t0 = gpr_now(GPR_CLOCK_MONOTONIC);  auto est_timeout_time = gpr_time_add(      t0, gpr_time_from_millis(              kTimeoutHttpMaxStreamDurationSecond * 1000 + kTimeoutMillis,              GPR_TIMESPAN));  CheckRpcSendFailure(1,                      RpcOptions().set_wait_for_ready(true).set_timeout_ms(                          kTimeoutApplicationSecond * 1000),                      StatusCode::DEADLINE_EXCEEDED);  auto timeout_time = gpr_now(GPR_CLOCK_MONOTONIC);  EXPECT_GT(gpr_time_cmp(timeout_time, est_timeout_time), 0);}TEST_P(LdsRdsTest, XdsRoutingApplyApplicationTimeoutWhenXdsTimeoutExplicit0) {  gpr_setenv("GRPC_XDS_EXPERIMENTAL_ENABLE_TIMEOUT", "true");  const int64_t kTimeoutNano = 500000000;  const int64_t kTimeoutMaxStreamDurationSecond = 2;  const int64_t kTimeoutHttpMaxStreamDurationSecond = 3;  const int64_t kTimeoutApplicationSecond = 4;  const char* kNewCluster1Name = "new_cluster_1";  const char* kNewEdsService1Name = "new_eds_service_name_1";  const char* kNewCluster2Name = "new_cluster_2";  const char* kNewEdsService2Name = "new_eds_service_name_2";  SetNextResolution({});  SetNextResolutionForLbChannelAllBalancers();  // Populate new EDS resources.  AdsServiceImpl::EdsResourceArgs args({      {"locality0", {grpc_pick_unused_port_or_die()}},  });  AdsServiceImpl::EdsResourceArgs args1({      {"locality0", {grpc_pick_unused_port_or_die()}},  });  AdsServiceImpl::EdsResourceArgs args2({      {"locality0", {grpc_pick_unused_port_or_die()}},  });  balancers_[0]->ads_service()->SetEdsResource(BuildEdsResource(args));  balancers_[0]->ads_service()->SetEdsResource(      BuildEdsResource(args1, kNewEdsService1Name));  balancers_[0]->ads_service()->SetEdsResource(      BuildEdsResource(args2, kNewEdsService2Name));  // Populate new CDS resources.  Cluster new_cluster1 = default_cluster_;  new_cluster1.set_name(kNewCluster1Name);  new_cluster1.mutable_eds_cluster_config()->set_service_name(      kNewEdsService1Name);  balancers_[0]->ads_service()->SetCdsResource(new_cluster1);  Cluster new_cluster2 = default_cluster_;  new_cluster2.set_name(kNewCluster2Name);  new_cluster2.mutable_eds_cluster_config()->set_service_name(      kNewEdsService2Name);  balancers_[0]->ads_service()->SetCdsResource(new_cluster2);  // Construct listener.  auto listener = default_listener_;  HttpConnectionManager http_connection_manager;  listener.mutable_api_listener()->mutable_api_listener()->UnpackTo(      &http_connection_manager);  // Set up HTTP max_stream_duration of 3.5 seconds  auto* duration =      http_connection_manager.mutable_common_http_protocol_options()          ->mutable_max_stream_duration();  duration->set_seconds(kTimeoutHttpMaxStreamDurationSecond);  duration->set_nanos(kTimeoutNano);  listener.mutable_api_listener()->mutable_api_listener()->PackFrom(      http_connection_manager);  // Construct route config.  RouteConfiguration new_route_config = default_route_config_;  // route 1: Set max_stream_duration of 2.5 seconds, Set  // grpc_timeout_header_max of 0  auto* route1 = new_route_config.mutable_virtual_hosts(0)->mutable_routes(0);  route1->mutable_match()->set_path("/grpc.testing.EchoTest1Service/Echo1");  route1->mutable_route()->set_cluster(kNewCluster1Name);  auto* max_stream_duration =      route1->mutable_route()->mutable_max_stream_duration();  duration = max_stream_duration->mutable_max_stream_duration();  duration->set_seconds(kTimeoutMaxStreamDurationSecond);  duration->set_nanos(kTimeoutNano);  duration = max_stream_duration->mutable_grpc_timeout_header_max();  duration->set_seconds(0);  duration->set_nanos(0);  // route 2: Set max_stream_duration to 0  auto* route2 = new_route_config.mutable_virtual_hosts(0)->add_routes();  route2->mutable_match()->set_path("/grpc.testing.EchoTest2Service/Echo2");  route2->mutable_route()->set_cluster(kNewCluster2Name);  max_stream_duration = route2->mutable_route()->mutable_max_stream_duration();  duration = max_stream_duration->mutable_max_stream_duration();  duration->set_seconds(0);  duration->set_nanos(0);  // Set listener and route config.  SetListenerAndRouteConfiguration(0, std::move(listener), new_route_config);  // Test application timeout is applied for route 1  auto t0 = system_clock::now();  CheckRpcSendFailure(1,                      RpcOptions()                          .set_rpc_service(SERVICE_ECHO1)                          .set_rpc_method(METHOD_ECHO1)                          .set_wait_for_ready(true)                          .set_timeout_ms(kTimeoutApplicationSecond * 1000),                      StatusCode::DEADLINE_EXCEEDED);  auto ellapsed_nano_seconds =      std::chrono::duration_cast<std::chrono::nanoseconds>(system_clock::now() -                                                           t0);  EXPECT_GT(ellapsed_nano_seconds.count(),            kTimeoutApplicationSecond * 1000000000);  // Test application timeout is applied for route 2  t0 = system_clock::now();  CheckRpcSendFailure(1,                      RpcOptions()                          .set_rpc_service(SERVICE_ECHO2)                          .set_rpc_method(METHOD_ECHO2)                          .set_wait_for_ready(true)                          .set_timeout_ms(kTimeoutApplicationSecond * 1000),                      StatusCode::DEADLINE_EXCEEDED);  ellapsed_nano_seconds = std::chrono::duration_cast<std::chrono::nanoseconds>(      system_clock::now() - t0);  EXPECT_GT(ellapsed_nano_seconds.count(),            kTimeoutApplicationSecond * 1000000000);  gpr_unsetenv("GRPC_XDS_EXPERIMENTAL_ENABLE_TIMEOUT");}TEST_P(LdsRdsTest, XdsRoutingApplyApplicationTimeoutWhenHttpTimeoutExplicit0) {  gpr_setenv("GRPC_XDS_EXPERIMENTAL_ENABLE_TIMEOUT", "true");  const int64_t kTimeoutApplicationSecond = 4;  SetNextResolution({});  SetNextResolutionForLbChannelAllBalancers();  // Populate new EDS resources.  AdsServiceImpl::EdsResourceArgs args({      {"locality0", {grpc_pick_unused_port_or_die()}},  });  balancers_[0]->ads_service()->SetEdsResource(BuildEdsResource(args));  auto listener = default_listener_;  HttpConnectionManager http_connection_manager;  listener.mutable_api_listener()->mutable_api_listener()->UnpackTo(      &http_connection_manager);  // Set up HTTP max_stream_duration to be explicit 0  auto* duration =      http_connection_manager.mutable_common_http_protocol_options()          ->mutable_max_stream_duration();  duration->set_seconds(0);  duration->set_nanos(0);  listener.mutable_api_listener()->mutable_api_listener()->PackFrom(      http_connection_manager);  // Set listener and route config.  SetListenerAndRouteConfiguration(0, std::move(listener),                                   default_route_config_);  // Test application timeout is applied for route 1  auto t0 = system_clock::now();  CheckRpcSendFailure(1,                      RpcOptions().set_wait_for_ready(true).set_timeout_ms(                          kTimeoutApplicationSecond * 1000),                      StatusCode::DEADLINE_EXCEEDED);  auto ellapsed_nano_seconds =      std::chrono::duration_cast<std::chrono::nanoseconds>(system_clock::now() -                                                           t0);  EXPECT_GT(ellapsed_nano_seconds.count(),            kTimeoutApplicationSecond * 1000000000);  gpr_unsetenv("GRPC_XDS_EXPERIMENTAL_ENABLE_TIMEOUT");}// Test to ensure application-specified deadline won't be affected when// the xDS config does not specify a timeout.TEST_P(LdsRdsTest, XdsRoutingWithOnlyApplicationTimeout) {  gpr_setenv("GRPC_XDS_EXPERIMENTAL_ENABLE_TIMEOUT", "true");  const int64_t kTimeoutApplicationSecond = 4;  SetNextResolution({});  SetNextResolutionForLbChannelAllBalancers();  // Populate new EDS resources.  AdsServiceImpl::EdsResourceArgs args({      {"locality0", {grpc_pick_unused_port_or_die()}},  });  balancers_[0]->ads_service()->SetEdsResource(BuildEdsResource(args));  auto t0 = system_clock::now();  CheckRpcSendFailure(1,                      RpcOptions().set_wait_for_ready(true).set_timeout_ms(                          kTimeoutApplicationSecond * 1000),                      StatusCode::DEADLINE_EXCEEDED);  auto ellapsed_nano_seconds =      std::chrono::duration_cast<std::chrono::nanoseconds>(system_clock::now() -                                                           t0);  EXPECT_GT(ellapsed_nano_seconds.count(),            kTimeoutApplicationSecond * 1000000000);  gpr_unsetenv("GRPC_XDS_EXPERIMENTAL_ENABLE_TIMEOUT");}TEST_P(LdsRdsTest, XdsRoutingHeadersMatching) {  const char* kNewClusterName = "new_cluster";  const char* kNewEdsServiceName = "new_eds_service_name";  const size_t kNumEcho1Rpcs = 100;  const size_t kNumEchoRpcs = 5;  SetNextResolution({});  SetNextResolutionForLbChannelAllBalancers();  // Populate new EDS resources.  AdsServiceImpl::EdsResourceArgs args({      {"locality0", GetBackendPorts(0, 1)},  });  AdsServiceImpl::EdsResourceArgs args1({      {"locality0", GetBackendPorts(1, 2)},  });  balancers_[0]->ads_service()->SetEdsResource(BuildEdsResource(args));  balancers_[0]->ads_service()->SetEdsResource(      BuildEdsResource(args1, kNewEdsServiceName));  // Populate new CDS resources.  Cluster new_cluster = default_cluster_;  new_cluster.set_name(kNewClusterName);  new_cluster.mutable_eds_cluster_config()->set_service_name(      kNewEdsServiceName);  balancers_[0]->ads_service()->SetCdsResource(new_cluster);  // Populating Route Configurations for LDS.  RouteConfiguration route_config = default_route_config_;  auto* route1 = route_config.mutable_virtual_hosts(0)->mutable_routes(0);  route1->mutable_match()->set_prefix("/grpc.testing.EchoTest1Service/");  auto* header_matcher1 = route1->mutable_match()->add_headers();  header_matcher1->set_name("header1");  header_matcher1->set_exact_match("POST,PUT,GET");  auto* header_matcher2 = route1->mutable_match()->add_headers();  header_matcher2->set_name("header2");  header_matcher2->mutable_safe_regex_match()->set_regex("[a-z]*");  auto* header_matcher3 = route1->mutable_match()->add_headers();  header_matcher3->set_name("header3");  header_matcher3->mutable_range_match()->set_start(1);  header_matcher3->mutable_range_match()->set_end(1000);  auto* header_matcher4 = route1->mutable_match()->add_headers();  header_matcher4->set_name("header4");  header_matcher4->set_present_match(false);  auto* header_matcher5 = route1->mutable_match()->add_headers();  header_matcher5->set_name("header5");  header_matcher5->set_present_match(true);  auto* header_matcher6 = route1->mutable_match()->add_headers();  header_matcher6->set_name("header6");  header_matcher6->set_prefix_match("/grpc");  auto* header_matcher7 = route1->mutable_match()->add_headers();  header_matcher7->set_name("header7");  header_matcher7->set_suffix_match(".cc");  header_matcher7->set_invert_match(true);  route1->mutable_route()->set_cluster(kNewClusterName);  auto* default_route = route_config.mutable_virtual_hosts(0)->add_routes();  default_route->mutable_match()->set_prefix("");  default_route->mutable_route()->set_cluster(kDefaultClusterName);  SetRouteConfiguration(0, route_config);  std::vector<std::pair<std::string, std::string>> metadata = {      {"header1", "POST"},      {"header2", "blah"},      {"header3", "1"},      {"header5", "anything"},      {"header6", "/grpc.testing.EchoTest1Service/"},      {"header1", "PUT"},      {"header7", "grpc.java"},      {"header1", "GET"},  };  const auto header_match_rpc_options = RpcOptions()                                            .set_rpc_service(SERVICE_ECHO1)                                            .set_rpc_method(METHOD_ECHO1)                                            .set_metadata(std::move(metadata));  // Make sure all backends are up.  WaitForAllBackends(0, 1);  WaitForAllBackends(1, 2, true, header_match_rpc_options);  // Send RPCs.  CheckRpcSendOk(kNumEchoRpcs);  CheckRpcSendOk(kNumEcho1Rpcs, header_match_rpc_options);  EXPECT_EQ(kNumEchoRpcs, backends_[0]->backend_service()->request_count());  EXPECT_EQ(0, backends_[0]->backend_service1()->request_count());  EXPECT_EQ(0, backends_[0]->backend_service2()->request_count());  EXPECT_EQ(0, backends_[1]->backend_service()->request_count());  EXPECT_EQ(kNumEcho1Rpcs, backends_[1]->backend_service1()->request_count());  EXPECT_EQ(0, backends_[1]->backend_service2()->request_count());  const auto response_state = RouteConfigurationResponseState(0);  EXPECT_EQ(response_state.state, AdsServiceImpl::ResponseState::ACKED);}TEST_P(LdsRdsTest, XdsRoutingHeadersMatchingSpecialHeaderContentType) {  const char* kNewClusterName = "new_cluster";  const char* kNewEdsServiceName = "new_eds_service_name";  const size_t kNumEchoRpcs = 100;  SetNextResolution({});  SetNextResolutionForLbChannelAllBalancers();  // Populate new EDS resources.  AdsServiceImpl::EdsResourceArgs args({      {"locality0", GetBackendPorts(0, 1)},  });  AdsServiceImpl::EdsResourceArgs args1({      {"locality0", GetBackendPorts(1, 2)},  });  balancers_[0]->ads_service()->SetEdsResource(BuildEdsResource(args));  balancers_[0]->ads_service()->SetEdsResource(      BuildEdsResource(args1, kNewEdsServiceName));  // Populate new CDS resources.  Cluster new_cluster = default_cluster_;  new_cluster.set_name(kNewClusterName);  new_cluster.mutable_eds_cluster_config()->set_service_name(      kNewEdsServiceName);  balancers_[0]->ads_service()->SetCdsResource(new_cluster);  // Populating Route Configurations for LDS.  RouteConfiguration route_config = default_route_config_;  auto* route1 = route_config.mutable_virtual_hosts(0)->mutable_routes(0);  route1->mutable_match()->set_prefix("");  auto* header_matcher1 = route1->mutable_match()->add_headers();  header_matcher1->set_name("content-type");  header_matcher1->set_exact_match("notapplication/grpc");  route1->mutable_route()->set_cluster(kNewClusterName);  auto* default_route = route_config.mutable_virtual_hosts(0)->add_routes();  default_route->mutable_match()->set_prefix("");  auto* header_matcher2 = default_route->mutable_match()->add_headers();  header_matcher2->set_name("content-type");  header_matcher2->set_exact_match("application/grpc");  default_route->mutable_route()->set_cluster(kDefaultClusterName);  SetRouteConfiguration(0, route_config);  // Make sure the backend is up.  WaitForAllBackends(0, 1);  // Send RPCs.  CheckRpcSendOk(kNumEchoRpcs);  EXPECT_EQ(kNumEchoRpcs, backends_[0]->backend_service()->request_count());  EXPECT_EQ(0, backends_[1]->backend_service()->request_count());  const auto response_state = RouteConfigurationResponseState(0);  EXPECT_EQ(response_state.state, AdsServiceImpl::ResponseState::ACKED);}TEST_P(LdsRdsTest, XdsRoutingHeadersMatchingSpecialCasesToIgnore) {  const char* kNewCluster1Name = "new_cluster_1";  const char* kNewEdsService1Name = "new_eds_service_name_1";  const size_t kNumEchoRpcs = 100;  SetNextResolution({});  SetNextResolutionForLbChannelAllBalancers();  // Populate new EDS resources.  AdsServiceImpl::EdsResourceArgs args({      {"locality0", GetBackendPorts(0, 1)},  });  AdsServiceImpl::EdsResourceArgs args1({      {"locality0", GetBackendPorts(1, 2)},  });  balancers_[0]->ads_service()->SetEdsResource(BuildEdsResource(args));  balancers_[0]->ads_service()->SetEdsResource(      BuildEdsResource(args1, kNewEdsService1Name));  // Populate new CDS resources.  Cluster new_cluster1 = default_cluster_;  new_cluster1.set_name(kNewCluster1Name);  new_cluster1.mutable_eds_cluster_config()->set_service_name(      kNewEdsService1Name);  balancers_[0]->ads_service()->SetCdsResource(new_cluster1);  // Populating Route Configurations for LDS.  RouteConfiguration route_config = default_route_config_;  auto* route1 = route_config.mutable_virtual_hosts(0)->mutable_routes(0);  route1->mutable_match()->set_prefix("");  auto* header_matcher1 = route1->mutable_match()->add_headers();  header_matcher1->set_name("grpc-foo-bin");  header_matcher1->set_present_match(true);  route1->mutable_route()->set_cluster(kNewCluster1Name);  auto* default_route = route_config.mutable_virtual_hosts(0)->add_routes();  default_route->mutable_match()->set_prefix("");  default_route->mutable_route()->set_cluster(kDefaultClusterName);  SetRouteConfiguration(0, route_config);  // Send headers which will mismatch each route  std::vector<std::pair<std::string, std::string>> metadata = {      {"grpc-foo-bin", "grpc-foo-bin"},  };  WaitForAllBackends(0, 1);  CheckRpcSendOk(kNumEchoRpcs, RpcOptions().set_metadata(metadata));  // Verify that only the default backend got RPCs since all previous routes  // were mismatched.  EXPECT_EQ(kNumEchoRpcs, backends_[0]->backend_service()->request_count());  EXPECT_EQ(0, backends_[1]->backend_service()->request_count());  const auto response_state = RouteConfigurationResponseState(0);  EXPECT_EQ(response_state.state, AdsServiceImpl::ResponseState::ACKED);}TEST_P(LdsRdsTest, XdsRoutingRuntimeFractionMatching) {  const char* kNewClusterName = "new_cluster";  const char* kNewEdsServiceName = "new_eds_service_name";  const size_t kNumRpcs = 1000;  SetNextResolution({});  SetNextResolutionForLbChannelAllBalancers();  // Populate new EDS resources.  AdsServiceImpl::EdsResourceArgs args({      {"locality0", GetBackendPorts(0, 1)},  });  AdsServiceImpl::EdsResourceArgs args1({      {"locality0", GetBackendPorts(1, 2)},  });  balancers_[0]->ads_service()->SetEdsResource(BuildEdsResource(args));  balancers_[0]->ads_service()->SetEdsResource(      BuildEdsResource(args1, kNewEdsServiceName));  // Populate new CDS resources.  Cluster new_cluster = default_cluster_;  new_cluster.set_name(kNewClusterName);  new_cluster.mutable_eds_cluster_config()->set_service_name(      kNewEdsServiceName);  balancers_[0]->ads_service()->SetCdsResource(new_cluster);  // Populating Route Configurations for LDS.  RouteConfiguration route_config = default_route_config_;  auto* route1 = route_config.mutable_virtual_hosts(0)->mutable_routes(0);  route1->mutable_match()      ->mutable_runtime_fraction()      ->mutable_default_value()      ->set_numerator(25);  route1->mutable_route()->set_cluster(kNewClusterName);  auto* default_route = route_config.mutable_virtual_hosts(0)->add_routes();  default_route->mutable_match()->set_prefix("");  default_route->mutable_route()->set_cluster(kDefaultClusterName);  SetRouteConfiguration(0, route_config);  WaitForAllBackends(0, 2);  CheckRpcSendOk(kNumRpcs);  const int default_backend_count =      backends_[0]->backend_service()->request_count();  const int matched_backend_count =      backends_[1]->backend_service()->request_count();  const double kErrorTolerance = 0.2;  EXPECT_THAT(      default_backend_count,      ::testing::AllOf(::testing::Ge(static_cast<double>(kNumRpcs) * 75 / 100 *                                     (1 - kErrorTolerance)),                       ::testing::Le(static_cast<double>(kNumRpcs) * 75 / 100 *                                     (1 + kErrorTolerance))));  EXPECT_THAT(      matched_backend_count,      ::testing::AllOf(::testing::Ge(static_cast<double>(kNumRpcs) * 25 / 100 *                                     (1 - kErrorTolerance)),                       ::testing::Le(static_cast<double>(kNumRpcs) * 25 / 100 *                                     (1 + kErrorTolerance))));  const auto response_state = RouteConfigurationResponseState(0);  EXPECT_EQ(response_state.state, AdsServiceImpl::ResponseState::ACKED);}TEST_P(LdsRdsTest, XdsRoutingHeadersMatchingUnmatchCases) {  const char* kNewCluster1Name = "new_cluster_1";  const char* kNewEdsService1Name = "new_eds_service_name_1";  const char* kNewCluster2Name = "new_cluster_2";  const char* kNewEdsService2Name = "new_eds_service_name_2";  const char* kNewCluster3Name = "new_cluster_3";  const char* kNewEdsService3Name = "new_eds_service_name_3";  const size_t kNumEcho1Rpcs = 100;  const size_t kNumEchoRpcs = 5;  SetNextResolution({});  SetNextResolutionForLbChannelAllBalancers();  // Populate new EDS resources.  AdsServiceImpl::EdsResourceArgs args({      {"locality0", GetBackendPorts(0, 1)},  });  AdsServiceImpl::EdsResourceArgs args1({      {"locality0", GetBackendPorts(1, 2)},  });  AdsServiceImpl::EdsResourceArgs args2({      {"locality0", GetBackendPorts(2, 3)},  });  AdsServiceImpl::EdsResourceArgs args3({      {"locality0", GetBackendPorts(3, 4)},  });  balancers_[0]->ads_service()->SetEdsResource(BuildEdsResource(args));  balancers_[0]->ads_service()->SetEdsResource(      BuildEdsResource(args1, kNewEdsService1Name));  balancers_[0]->ads_service()->SetEdsResource(      BuildEdsResource(args2, kNewEdsService2Name));  balancers_[0]->ads_service()->SetEdsResource(      BuildEdsResource(args3, kNewEdsService3Name));  // Populate new CDS resources.  Cluster new_cluster1 = default_cluster_;  new_cluster1.set_name(kNewCluster1Name);  new_cluster1.mutable_eds_cluster_config()->set_service_name(      kNewEdsService1Name);  balancers_[0]->ads_service()->SetCdsResource(new_cluster1);  Cluster new_cluster2 = default_cluster_;  new_cluster2.set_name(kNewCluster2Name);  new_cluster2.mutable_eds_cluster_config()->set_service_name(      kNewEdsService2Name);  balancers_[0]->ads_service()->SetCdsResource(new_cluster2);  Cluster new_cluster3 = default_cluster_;  new_cluster3.set_name(kNewCluster3Name);  new_cluster3.mutable_eds_cluster_config()->set_service_name(      kNewEdsService3Name);  balancers_[0]->ads_service()->SetCdsResource(new_cluster3);  // Populating Route Configurations for LDS.  RouteConfiguration route_config = default_route_config_;  auto* route1 = route_config.mutable_virtual_hosts(0)->mutable_routes(0);  route1->mutable_match()->set_prefix("/grpc.testing.EchoTest1Service/");  auto* header_matcher1 = route1->mutable_match()->add_headers();  header_matcher1->set_name("header1");  header_matcher1->set_exact_match("POST");  route1->mutable_route()->set_cluster(kNewCluster1Name);  auto route2 = route_config.mutable_virtual_hosts(0)->add_routes();  route2->mutable_match()->set_prefix("/grpc.testing.EchoTest1Service/");  auto* header_matcher2 = route2->mutable_match()->add_headers();  header_matcher2->set_name("header2");  header_matcher2->mutable_range_match()->set_start(1);  header_matcher2->mutable_range_match()->set_end(1000);  route2->mutable_route()->set_cluster(kNewCluster2Name);  auto route3 = route_config.mutable_virtual_hosts(0)->add_routes();  route3->mutable_match()->set_prefix("/grpc.testing.EchoTest1Service/");  auto* header_matcher3 = route3->mutable_match()->add_headers();  header_matcher3->set_name("header3");  header_matcher3->mutable_safe_regex_match()->set_regex("[a-z]*");  route3->mutable_route()->set_cluster(kNewCluster3Name);  auto* default_route = route_config.mutable_virtual_hosts(0)->add_routes();  default_route->mutable_match()->set_prefix("");  default_route->mutable_route()->set_cluster(kDefaultClusterName);  SetRouteConfiguration(0, route_config);  // Send headers which will mismatch each route  std::vector<std::pair<std::string, std::string>> metadata = {      {"header1", "POST"},      {"header2", "1000"},      {"header3", "123"},      {"header1", "GET"},  };  WaitForAllBackends(0, 1);  CheckRpcSendOk(kNumEchoRpcs, RpcOptions().set_metadata(metadata));  CheckRpcSendOk(kNumEcho1Rpcs, RpcOptions()                                    .set_rpc_service(SERVICE_ECHO1)                                    .set_rpc_method(METHOD_ECHO1)                                    .set_metadata(metadata));  // Verify that only the default backend got RPCs since all previous routes  // were mismatched.  for (size_t i = 1; i < 4; ++i) {    EXPECT_EQ(0, backends_[i]->backend_service()->request_count());    EXPECT_EQ(0, backends_[i]->backend_service1()->request_count());    EXPECT_EQ(0, backends_[i]->backend_service2()->request_count());  }  EXPECT_EQ(kNumEchoRpcs, backends_[0]->backend_service()->request_count());  EXPECT_EQ(kNumEcho1Rpcs, backends_[0]->backend_service1()->request_count());  EXPECT_EQ(0, backends_[0]->backend_service2()->request_count());  const auto response_state = RouteConfigurationResponseState(0);  EXPECT_EQ(response_state.state, AdsServiceImpl::ResponseState::ACKED);}TEST_P(LdsRdsTest, XdsRoutingChangeRoutesWithoutChangingClusters) {  const char* kNewClusterName = "new_cluster";  const char* kNewEdsServiceName = "new_eds_service_name";  SetNextResolution({});  SetNextResolutionForLbChannelAllBalancers();  // Populate new EDS resources.  AdsServiceImpl::EdsResourceArgs args({      {"locality0", GetBackendPorts(0, 1)},  });  AdsServiceImpl::EdsResourceArgs args1({      {"locality0", GetBackendPorts(1, 2)},  });  balancers_[0]->ads_service()->SetEdsResource(BuildEdsResource(args));  balancers_[0]->ads_service()->SetEdsResource(      BuildEdsResource(args1, kNewEdsServiceName));  // Populate new CDS resources.  Cluster new_cluster = default_cluster_;  new_cluster.set_name(kNewClusterName);  new_cluster.mutable_eds_cluster_config()->set_service_name(      kNewEdsServiceName);  balancers_[0]->ads_service()->SetCdsResource(new_cluster);  // Populating Route Configurations for LDS.  RouteConfiguration route_config = default_route_config_;  auto* route1 = route_config.mutable_virtual_hosts(0)->mutable_routes(0);  route1->mutable_match()->set_prefix("/grpc.testing.EchoTest1Service/");  route1->mutable_route()->set_cluster(kNewClusterName);  auto* default_route = route_config.mutable_virtual_hosts(0)->add_routes();  default_route->mutable_match()->set_prefix("");  default_route->mutable_route()->set_cluster(kDefaultClusterName);  SetRouteConfiguration(0, route_config);  // Make sure all backends are up and that requests for each RPC  // service go to the right backends.  WaitForAllBackends(0, 1, false);  WaitForAllBackends(1, 2, false, RpcOptions().set_rpc_service(SERVICE_ECHO1));  WaitForAllBackends(0, 1, false, RpcOptions().set_rpc_service(SERVICE_ECHO2));  // Requests for services Echo and Echo2 should have gone to backend 0.  EXPECT_EQ(1, backends_[0]->backend_service()->request_count());  EXPECT_EQ(0, backends_[0]->backend_service1()->request_count());  EXPECT_EQ(1, backends_[0]->backend_service2()->request_count());  // Requests for service Echo1 should have gone to backend 1.  EXPECT_EQ(0, backends_[1]->backend_service()->request_count());  EXPECT_EQ(1, backends_[1]->backend_service1()->request_count());  EXPECT_EQ(0, backends_[1]->backend_service2()->request_count());  // Now send an update that changes the first route to match a  // different RPC service, and wait for the client to make the change.  route1->mutable_match()->set_prefix("/grpc.testing.EchoTest2Service/");  SetRouteConfiguration(0, route_config);  WaitForAllBackends(1, 2, true, RpcOptions().set_rpc_service(SERVICE_ECHO2));  // Now repeat the earlier test, making sure all traffic goes to the  // right place.  WaitForAllBackends(0, 1, false);  WaitForAllBackends(0, 1, false, RpcOptions().set_rpc_service(SERVICE_ECHO1));  WaitForAllBackends(1, 2, false, RpcOptions().set_rpc_service(SERVICE_ECHO2));  // Requests for services Echo and Echo1 should have gone to backend 0.  EXPECT_EQ(1, backends_[0]->backend_service()->request_count());  EXPECT_EQ(1, backends_[0]->backend_service1()->request_count());  EXPECT_EQ(0, backends_[0]->backend_service2()->request_count());  // Requests for service Echo2 should have gone to backend 1.  EXPECT_EQ(0, backends_[1]->backend_service()->request_count());  EXPECT_EQ(0, backends_[1]->backend_service1()->request_count());  EXPECT_EQ(1, backends_[1]->backend_service2()->request_count());}// Test that we NACK unknown filter types in VirtualHost.TEST_P(LdsRdsTest, RejectsUnknownHttpFilterTypeInVirtualHost) {  if (GetParam().use_v2()) return;  // Filters supported in v3 only.  gpr_setenv("GRPC_XDS_EXPERIMENTAL_FAULT_INJECTION", "true");  RouteConfiguration route_config = default_route_config_;  auto* per_filter_config =      route_config.mutable_virtual_hosts(0)->mutable_typed_per_filter_config();  (*per_filter_config)["unknown"].PackFrom(Listener());  SetListenerAndRouteConfiguration(0, default_listener_, route_config);  SetNextResolution({});  SetNextResolutionForLbChannelAllBalancers();  // Wait until xDS server sees NACK.  do {    CheckRpcSendFailure();  } while (RouteConfigurationResponseState(0).state ==           AdsServiceImpl::ResponseState::SENT);  const auto response_state = RouteConfigurationResponseState(0);  EXPECT_EQ(response_state.state, AdsServiceImpl::ResponseState::NACKED);  EXPECT_THAT(response_state.error_message,              ::testing::HasSubstr("no filter registered for config type "                                   "envoy.config.listener.v3.Listener"));  gpr_unsetenv("GRPC_XDS_EXPERIMENTAL_FAULT_INJECTION");}// Test that we ignore optional unknown filter types in VirtualHost.TEST_P(LdsRdsTest, IgnoresOptionalUnknownHttpFilterTypeInVirtualHost) {  if (GetParam().use_v2()) return;  // Filters supported in v3 only.  gpr_setenv("GRPC_XDS_EXPERIMENTAL_FAULT_INJECTION", "true");  RouteConfiguration route_config = default_route_config_;  auto* per_filter_config =      route_config.mutable_virtual_hosts(0)->mutable_typed_per_filter_config();  ::envoy::config::route::v3::FilterConfig filter_config;  filter_config.mutable_config()->PackFrom(Listener());  filter_config.set_is_optional(true);  (*per_filter_config)["unknown"].PackFrom(filter_config);  SetListenerAndRouteConfiguration(0, default_listener_, route_config);  AdsServiceImpl::EdsResourceArgs args({      {"locality0", GetBackendPorts()},  });  balancers_[0]->ads_service()->SetEdsResource(      BuildEdsResource(args, DefaultEdsServiceName()));  SetNextResolution({});  SetNextResolutionForLbChannelAllBalancers();  WaitForAllBackends();  EXPECT_EQ(RouteConfigurationResponseState(0).state,            AdsServiceImpl::ResponseState::ACKED);  gpr_unsetenv("GRPC_XDS_EXPERIMENTAL_FAULT_INJECTION");}// Test that we NACK filters without configs in VirtualHost.TEST_P(LdsRdsTest, RejectsHttpFilterWithoutConfigInVirtualHost) {  if (GetParam().use_v2()) return;  // Filters supported in v3 only.  gpr_setenv("GRPC_XDS_EXPERIMENTAL_FAULT_INJECTION", "true");  RouteConfiguration route_config = default_route_config_;  auto* per_filter_config =      route_config.mutable_virtual_hosts(0)->mutable_typed_per_filter_config();  (*per_filter_config)["unknown"];  SetListenerAndRouteConfiguration(0, default_listener_, route_config);  SetNextResolution({});  SetNextResolutionForLbChannelAllBalancers();  // Wait until xDS server sees NACK.  do {    CheckRpcSendFailure();  } while (RouteConfigurationResponseState(0).state ==           AdsServiceImpl::ResponseState::SENT);  const auto response_state = RouteConfigurationResponseState(0);  EXPECT_EQ(response_state.state, AdsServiceImpl::ResponseState::NACKED);  EXPECT_THAT(response_state.error_message,              ::testing::HasSubstr(                  "no filter config specified for filter name unknown"));  gpr_unsetenv("GRPC_XDS_EXPERIMENTAL_FAULT_INJECTION");}// Test that we NACK filters without configs in FilterConfig in VirtualHost.TEST_P(LdsRdsTest, RejectsHttpFilterWithoutConfigInFilterConfigInVirtualHost) {  if (GetParam().use_v2()) return;  // Filters supported in v3 only.  gpr_setenv("GRPC_XDS_EXPERIMENTAL_FAULT_INJECTION", "true");  RouteConfiguration route_config = default_route_config_;  auto* per_filter_config =      route_config.mutable_virtual_hosts(0)->mutable_typed_per_filter_config();  (*per_filter_config)["unknown"].PackFrom(      ::envoy::config::route::v3::FilterConfig());  SetListenerAndRouteConfiguration(0, default_listener_, route_config);  SetNextResolution({});  SetNextResolutionForLbChannelAllBalancers();  // Wait until xDS server sees NACK.  do {    CheckRpcSendFailure();  } while (RouteConfigurationResponseState(0).state ==           AdsServiceImpl::ResponseState::SENT);  const auto response_state = RouteConfigurationResponseState(0);  EXPECT_EQ(response_state.state, AdsServiceImpl::ResponseState::NACKED);  EXPECT_THAT(response_state.error_message,              ::testing::HasSubstr(                  "no filter config specified for filter name unknown"));  gpr_unsetenv("GRPC_XDS_EXPERIMENTAL_FAULT_INJECTION");}// Test that we ignore optional filters without configs in VirtualHost.TEST_P(LdsRdsTest, IgnoresOptionalHttpFilterWithoutConfigInVirtualHost) {  if (GetParam().use_v2()) return;  // Filters supported in v3 only.  gpr_setenv("GRPC_XDS_EXPERIMENTAL_FAULT_INJECTION", "true");  RouteConfiguration route_config = default_route_config_;  auto* per_filter_config =      route_config.mutable_virtual_hosts(0)->mutable_typed_per_filter_config();  ::envoy::config::route::v3::FilterConfig filter_config;  filter_config.set_is_optional(true);  (*per_filter_config)["unknown"].PackFrom(filter_config);  SetListenerAndRouteConfiguration(0, default_listener_, route_config);  AdsServiceImpl::EdsResourceArgs args({      {"locality0", GetBackendPorts()},  });  balancers_[0]->ads_service()->SetEdsResource(      BuildEdsResource(args, DefaultEdsServiceName()));  SetNextResolution({});  SetNextResolutionForLbChannelAllBalancers();  WaitForAllBackends();  EXPECT_EQ(RouteConfigurationResponseState(0).state,            AdsServiceImpl::ResponseState::ACKED);  gpr_unsetenv("GRPC_XDS_EXPERIMENTAL_FAULT_INJECTION");}// Test that we NACK unparseable filter types in VirtualHost.TEST_P(LdsRdsTest, RejectsUnparseableHttpFilterTypeInVirtualHost) {  if (GetParam().use_v2()) return;  // Filters supported in v3 only.  gpr_setenv("GRPC_XDS_EXPERIMENTAL_FAULT_INJECTION", "true");  RouteConfiguration route_config = default_route_config_;  auto* per_filter_config =      route_config.mutable_virtual_hosts(0)->mutable_typed_per_filter_config();  (*per_filter_config)["unknown"].PackFrom(      envoy::extensions::filters::http::router::v3::Router());  SetListenerAndRouteConfiguration(0, default_listener_, route_config);  SetNextResolution({});  SetNextResolutionForLbChannelAllBalancers();  // Wait until xDS server sees NACK.  do {    CheckRpcSendFailure();  } while (RouteConfigurationResponseState(0).state ==           AdsServiceImpl::ResponseState::SENT);  const auto response_state = RouteConfigurationResponseState(0);  EXPECT_EQ(response_state.state, AdsServiceImpl::ResponseState::NACKED);  EXPECT_THAT(      response_state.error_message,      ::testing::HasSubstr("router filter does not support config override"));  gpr_unsetenv("GRPC_XDS_EXPERIMENTAL_FAULT_INJECTION");}// Test that we NACK unknown filter types in Route.TEST_P(LdsRdsTest, RejectsUnknownHttpFilterTypeInRoute) {  if (GetParam().use_v2()) return;  // Filters supported in v3 only.  gpr_setenv("GRPC_XDS_EXPERIMENTAL_FAULT_INJECTION", "true");  RouteConfiguration route_config = default_route_config_;  auto* per_filter_config = route_config.mutable_virtual_hosts(0)                                ->mutable_routes(0)                                ->mutable_typed_per_filter_config();  (*per_filter_config)["unknown"].PackFrom(Listener());  SetListenerAndRouteConfiguration(0, default_listener_, route_config);  SetNextResolution({});  SetNextResolutionForLbChannelAllBalancers();  // Wait until xDS server sees NACK.  do {    CheckRpcSendFailure();  } while (RouteConfigurationResponseState(0).state ==           AdsServiceImpl::ResponseState::SENT);  const auto response_state = RouteConfigurationResponseState(0);  EXPECT_EQ(response_state.state, AdsServiceImpl::ResponseState::NACKED);  EXPECT_THAT(response_state.error_message,              ::testing::HasSubstr("no filter registered for config type "                                   "envoy.config.listener.v3.Listener"));  gpr_unsetenv("GRPC_XDS_EXPERIMENTAL_FAULT_INJECTION");}// Test that we ignore optional unknown filter types in Route.TEST_P(LdsRdsTest, IgnoresOptionalUnknownHttpFilterTypeInRoute) {  if (GetParam().use_v2()) return;  // Filters supported in v3 only.  gpr_setenv("GRPC_XDS_EXPERIMENTAL_FAULT_INJECTION", "true");  RouteConfiguration route_config = default_route_config_;  auto* per_filter_config = route_config.mutable_virtual_hosts(0)                                ->mutable_routes(0)                                ->mutable_typed_per_filter_config();  ::envoy::config::route::v3::FilterConfig filter_config;  filter_config.mutable_config()->PackFrom(Listener());  filter_config.set_is_optional(true);  (*per_filter_config)["unknown"].PackFrom(filter_config);  SetListenerAndRouteConfiguration(0, default_listener_, route_config);  AdsServiceImpl::EdsResourceArgs args({      {"locality0", GetBackendPorts()},  });  balancers_[0]->ads_service()->SetEdsResource(      BuildEdsResource(args, DefaultEdsServiceName()));  SetNextResolution({});  SetNextResolutionForLbChannelAllBalancers();  WaitForAllBackends();  EXPECT_EQ(RouteConfigurationResponseState(0).state,            AdsServiceImpl::ResponseState::ACKED);  gpr_unsetenv("GRPC_XDS_EXPERIMENTAL_FAULT_INJECTION");}// Test that we NACK filters without configs in Route.TEST_P(LdsRdsTest, RejectsHttpFilterWithoutConfigInRoute) {  if (GetParam().use_v2()) return;  // Filters supported in v3 only.  gpr_setenv("GRPC_XDS_EXPERIMENTAL_FAULT_INJECTION", "true");  RouteConfiguration route_config = default_route_config_;  auto* per_filter_config = route_config.mutable_virtual_hosts(0)                                ->mutable_routes(0)                                ->mutable_typed_per_filter_config();  (*per_filter_config)["unknown"];  SetListenerAndRouteConfiguration(0, default_listener_, route_config);  SetNextResolution({});  SetNextResolutionForLbChannelAllBalancers();  // Wait until xDS server sees NACK.  do {    CheckRpcSendFailure();  } while (RouteConfigurationResponseState(0).state ==           AdsServiceImpl::ResponseState::SENT);  const auto response_state = RouteConfigurationResponseState(0);  EXPECT_EQ(response_state.state, AdsServiceImpl::ResponseState::NACKED);  EXPECT_THAT(response_state.error_message,              ::testing::HasSubstr(                  "no filter config specified for filter name unknown"));  gpr_unsetenv("GRPC_XDS_EXPERIMENTAL_FAULT_INJECTION");}// Test that we NACK filters without configs in FilterConfig in Route.TEST_P(LdsRdsTest, RejectsHttpFilterWithoutConfigInFilterConfigInRoute) {  if (GetParam().use_v2()) return;  // Filters supported in v3 only.  gpr_setenv("GRPC_XDS_EXPERIMENTAL_FAULT_INJECTION", "true");  RouteConfiguration route_config = default_route_config_;  auto* per_filter_config = route_config.mutable_virtual_hosts(0)                                ->mutable_routes(0)                                ->mutable_typed_per_filter_config();  (*per_filter_config)["unknown"].PackFrom(      ::envoy::config::route::v3::FilterConfig());  SetListenerAndRouteConfiguration(0, default_listener_, route_config);  SetNextResolution({});  SetNextResolutionForLbChannelAllBalancers();  // Wait until xDS server sees NACK.  do {    CheckRpcSendFailure();  } while (RouteConfigurationResponseState(0).state ==           AdsServiceImpl::ResponseState::SENT);  const auto response_state = RouteConfigurationResponseState(0);  EXPECT_EQ(response_state.state, AdsServiceImpl::ResponseState::NACKED);  EXPECT_THAT(response_state.error_message,              ::testing::HasSubstr(                  "no filter config specified for filter name unknown"));  gpr_unsetenv("GRPC_XDS_EXPERIMENTAL_FAULT_INJECTION");}// Test that we ignore optional filters without configs in Route.TEST_P(LdsRdsTest, IgnoresOptionalHttpFilterWithoutConfigInRoute) {  if (GetParam().use_v2()) return;  // Filters supported in v3 only.  gpr_setenv("GRPC_XDS_EXPERIMENTAL_FAULT_INJECTION", "true");  RouteConfiguration route_config = default_route_config_;  auto* per_filter_config = route_config.mutable_virtual_hosts(0)                                ->mutable_routes(0)                                ->mutable_typed_per_filter_config();  ::envoy::config::route::v3::FilterConfig filter_config;  filter_config.set_is_optional(true);  (*per_filter_config)["unknown"].PackFrom(filter_config);  SetListenerAndRouteConfiguration(0, default_listener_, route_config);  AdsServiceImpl::EdsResourceArgs args({      {"locality0", GetBackendPorts()},  });  balancers_[0]->ads_service()->SetEdsResource(      BuildEdsResource(args, DefaultEdsServiceName()));  SetNextResolution({});  SetNextResolutionForLbChannelAllBalancers();  WaitForAllBackends();  EXPECT_EQ(RouteConfigurationResponseState(0).state,            AdsServiceImpl::ResponseState::ACKED);  gpr_unsetenv("GRPC_XDS_EXPERIMENTAL_FAULT_INJECTION");}// Test that we NACK unparseable filter types in Route.TEST_P(LdsRdsTest, RejectsUnparseableHttpFilterTypeInRoute) {  if (GetParam().use_v2()) return;  // Filters supported in v3 only.  gpr_setenv("GRPC_XDS_EXPERIMENTAL_FAULT_INJECTION", "true");  RouteConfiguration route_config = default_route_config_;  auto* per_filter_config = route_config.mutable_virtual_hosts(0)                                ->mutable_routes(0)                                ->mutable_typed_per_filter_config();  (*per_filter_config)["unknown"].PackFrom(      envoy::extensions::filters::http::router::v3::Router());  SetListenerAndRouteConfiguration(0, default_listener_, route_config);  SetNextResolution({});  SetNextResolutionForLbChannelAllBalancers();  // Wait until xDS server sees NACK.  do {    CheckRpcSendFailure();  } while (RouteConfigurationResponseState(0).state ==           AdsServiceImpl::ResponseState::SENT);  const auto response_state = RouteConfigurationResponseState(0);  EXPECT_EQ(response_state.state, AdsServiceImpl::ResponseState::NACKED);  EXPECT_THAT(      response_state.error_message,      ::testing::HasSubstr("router filter does not support config override"));  gpr_unsetenv("GRPC_XDS_EXPERIMENTAL_FAULT_INJECTION");}// Test that we NACK unknown filter types in ClusterWeight.TEST_P(LdsRdsTest, RejectsUnknownHttpFilterTypeInClusterWeight) {  if (GetParam().use_v2()) return;  // Filters supported in v3 only.  gpr_setenv("GRPC_XDS_EXPERIMENTAL_FAULT_INJECTION", "true");  RouteConfiguration route_config = default_route_config_;  auto* cluster_weight = route_config.mutable_virtual_hosts(0)                             ->mutable_routes(0)                             ->mutable_route()                             ->mutable_weighted_clusters()                             ->add_clusters();  cluster_weight->set_name(kDefaultClusterName);  cluster_weight->mutable_weight()->set_value(100);  auto* per_filter_config = cluster_weight->mutable_typed_per_filter_config();  (*per_filter_config)["unknown"].PackFrom(Listener());  SetListenerAndRouteConfiguration(0, default_listener_, route_config);  SetNextResolution({});  SetNextResolutionForLbChannelAllBalancers();  // Wait until xDS server sees NACK.  do {    CheckRpcSendFailure();  } while (RouteConfigurationResponseState(0).state ==           AdsServiceImpl::ResponseState::SENT);  const auto response_state = RouteConfigurationResponseState(0);  EXPECT_EQ(response_state.state, AdsServiceImpl::ResponseState::NACKED);  EXPECT_THAT(response_state.error_message,              ::testing::HasSubstr("no filter registered for config type "                                   "envoy.config.listener.v3.Listener"));  gpr_unsetenv("GRPC_XDS_EXPERIMENTAL_FAULT_INJECTION");}// Test that we ignore optional unknown filter types in ClusterWeight.TEST_P(LdsRdsTest, IgnoresOptionalUnknownHttpFilterTypeInClusterWeight) {  if (GetParam().use_v2()) return;  // Filters supported in v3 only.  gpr_setenv("GRPC_XDS_EXPERIMENTAL_FAULT_INJECTION", "true");  RouteConfiguration route_config = default_route_config_;  auto* cluster_weight = route_config.mutable_virtual_hosts(0)                             ->mutable_routes(0)                             ->mutable_route()                             ->mutable_weighted_clusters()                             ->add_clusters();  cluster_weight->set_name(kDefaultClusterName);  cluster_weight->mutable_weight()->set_value(100);  auto* per_filter_config = cluster_weight->mutable_typed_per_filter_config();  ::envoy::config::route::v3::FilterConfig filter_config;  filter_config.mutable_config()->PackFrom(Listener());  filter_config.set_is_optional(true);  (*per_filter_config)["unknown"].PackFrom(filter_config);  SetListenerAndRouteConfiguration(0, default_listener_, route_config);  AdsServiceImpl::EdsResourceArgs args({      {"locality0", GetBackendPorts()},  });  balancers_[0]->ads_service()->SetEdsResource(      BuildEdsResource(args, DefaultEdsServiceName()));  SetNextResolution({});  SetNextResolutionForLbChannelAllBalancers();  WaitForAllBackends();  EXPECT_EQ(RouteConfigurationResponseState(0).state,            AdsServiceImpl::ResponseState::ACKED);  gpr_unsetenv("GRPC_XDS_EXPERIMENTAL_FAULT_INJECTION");}// Test that we NACK filters without configs in ClusterWeight.TEST_P(LdsRdsTest, RejectsHttpFilterWithoutConfigInClusterWeight) {  if (GetParam().use_v2()) return;  // Filters supported in v3 only.  gpr_setenv("GRPC_XDS_EXPERIMENTAL_FAULT_INJECTION", "true");  RouteConfiguration route_config = default_route_config_;  auto* cluster_weight = route_config.mutable_virtual_hosts(0)                             ->mutable_routes(0)                             ->mutable_route()                             ->mutable_weighted_clusters()                             ->add_clusters();  cluster_weight->set_name(kDefaultClusterName);  cluster_weight->mutable_weight()->set_value(100);  auto* per_filter_config = cluster_weight->mutable_typed_per_filter_config();  (*per_filter_config)["unknown"];  SetListenerAndRouteConfiguration(0, default_listener_, route_config);  SetNextResolution({});  SetNextResolutionForLbChannelAllBalancers();  // Wait until xDS server sees NACK.  do {    CheckRpcSendFailure();  } while (RouteConfigurationResponseState(0).state ==           AdsServiceImpl::ResponseState::SENT);  const auto response_state = RouteConfigurationResponseState(0);  EXPECT_EQ(response_state.state, AdsServiceImpl::ResponseState::NACKED);  EXPECT_THAT(response_state.error_message,              ::testing::HasSubstr(                  "no filter config specified for filter name unknown"));  gpr_unsetenv("GRPC_XDS_EXPERIMENTAL_FAULT_INJECTION");}// Test that we NACK filters without configs in FilterConfig in ClusterWeight.TEST_P(LdsRdsTest,       RejectsHttpFilterWithoutConfigInFilterConfigInClusterWeight) {  if (GetParam().use_v2()) return;  // Filters supported in v3 only.  gpr_setenv("GRPC_XDS_EXPERIMENTAL_FAULT_INJECTION", "true");  RouteConfiguration route_config = default_route_config_;  auto* cluster_weight = route_config.mutable_virtual_hosts(0)                             ->mutable_routes(0)                             ->mutable_route()                             ->mutable_weighted_clusters()                             ->add_clusters();  cluster_weight->set_name(kDefaultClusterName);  cluster_weight->mutable_weight()->set_value(100);  auto* per_filter_config = cluster_weight->mutable_typed_per_filter_config();  (*per_filter_config)["unknown"].PackFrom(      ::envoy::config::route::v3::FilterConfig());  SetListenerAndRouteConfiguration(0, default_listener_, route_config);  SetNextResolution({});  SetNextResolutionForLbChannelAllBalancers();  // Wait until xDS server sees NACK.  do {    CheckRpcSendFailure();  } while (RouteConfigurationResponseState(0).state ==           AdsServiceImpl::ResponseState::SENT);  const auto response_state = RouteConfigurationResponseState(0);  EXPECT_EQ(response_state.state, AdsServiceImpl::ResponseState::NACKED);  EXPECT_THAT(response_state.error_message,              ::testing::HasSubstr(                  "no filter config specified for filter name unknown"));  gpr_unsetenv("GRPC_XDS_EXPERIMENTAL_FAULT_INJECTION");}// Test that we ignore optional filters without configs in ClusterWeight.TEST_P(LdsRdsTest, IgnoresOptionalHttpFilterWithoutConfigInClusterWeight) {  if (GetParam().use_v2()) return;  // Filters supported in v3 only.  gpr_setenv("GRPC_XDS_EXPERIMENTAL_FAULT_INJECTION", "true");  RouteConfiguration route_config = default_route_config_;  auto* cluster_weight = route_config.mutable_virtual_hosts(0)                             ->mutable_routes(0)                             ->mutable_route()                             ->mutable_weighted_clusters()                             ->add_clusters();  cluster_weight->set_name(kDefaultClusterName);  cluster_weight->mutable_weight()->set_value(100);  auto* per_filter_config = cluster_weight->mutable_typed_per_filter_config();  ::envoy::config::route::v3::FilterConfig filter_config;  filter_config.set_is_optional(true);  (*per_filter_config)["unknown"].PackFrom(filter_config);  SetListenerAndRouteConfiguration(0, default_listener_, route_config);  AdsServiceImpl::EdsResourceArgs args({      {"locality0", GetBackendPorts()},  });  balancers_[0]->ads_service()->SetEdsResource(      BuildEdsResource(args, DefaultEdsServiceName()));  SetNextResolution({});  SetNextResolutionForLbChannelAllBalancers();  WaitForAllBackends();  EXPECT_EQ(RouteConfigurationResponseState(0).state,            AdsServiceImpl::ResponseState::ACKED);  gpr_unsetenv("GRPC_XDS_EXPERIMENTAL_FAULT_INJECTION");}// Test that we NACK unparseable filter types in ClusterWeight.TEST_P(LdsRdsTest, RejectsUnparseableHttpFilterTypeInClusterWeight) {  if (GetParam().use_v2()) return;  // Filters supported in v3 only.  gpr_setenv("GRPC_XDS_EXPERIMENTAL_FAULT_INJECTION", "true");  RouteConfiguration route_config = default_route_config_;  auto* cluster_weight = route_config.mutable_virtual_hosts(0)                             ->mutable_routes(0)                             ->mutable_route()                             ->mutable_weighted_clusters()                             ->add_clusters();  cluster_weight->set_name(kDefaultClusterName);  cluster_weight->mutable_weight()->set_value(100);  auto* per_filter_config = cluster_weight->mutable_typed_per_filter_config();  (*per_filter_config)["unknown"].PackFrom(      envoy::extensions::filters::http::router::v3::Router());  SetListenerAndRouteConfiguration(0, default_listener_, route_config);  SetNextResolution({});  SetNextResolutionForLbChannelAllBalancers();  // Wait until xDS server sees NACK.  do {    CheckRpcSendFailure();  } while (RouteConfigurationResponseState(0).state ==           AdsServiceImpl::ResponseState::SENT);  const auto response_state = RouteConfigurationResponseState(0);  EXPECT_EQ(response_state.state, AdsServiceImpl::ResponseState::NACKED);  EXPECT_THAT(      response_state.error_message,      ::testing::HasSubstr("router filter does not support config override"));  gpr_unsetenv("GRPC_XDS_EXPERIMENTAL_FAULT_INJECTION");}using CdsTest = BasicTest;// Tests that CDS client should send an ACK upon correct CDS response.TEST_P(CdsTest, Vanilla) {  SetNextResolution({});  SetNextResolutionForLbChannelAllBalancers();  (void)SendRpc();  EXPECT_EQ(balancers_[0]->ads_service()->cds_response_state().state,            AdsServiceImpl::ResponseState::ACKED);}TEST_P(CdsTest, LogicalDNSClusterType) {  gpr_setenv("GRPC_XDS_EXPERIMENTAL_ENABLE_AGGREGATE_AND_LOGICAL_DNS_CLUSTER",             "true");  SetNextResolution({});  SetNextResolutionForLbChannelAllBalancers();  // Create Logical DNS Cluster  auto cluster = default_cluster_;  cluster.set_type(Cluster::LOGICAL_DNS);  balancers_[0]->ads_service()->SetCdsResource(cluster);  // Set Logical DNS result  {    grpc_core::ExecCtx exec_ctx;    grpc_core::Resolver::Result result;    result.addresses = CreateAddressListFromPortList(GetBackendPorts(1, 2));    logical_dns_cluster_resolver_response_generator_->SetResponse(        std::move(result));  }  // Wait for traffic to go to backend 1.  WaitForBackend(1);  gpr_unsetenv(      "GRPC_XDS_EXPERIMENTAL_ENABLE_AGGREGATE_AND_LOGICAL_DNS_CLUSTER");}TEST_P(CdsTest, AggregateClusterType) {  gpr_setenv("GRPC_XDS_EXPERIMENTAL_ENABLE_AGGREGATE_AND_LOGICAL_DNS_CLUSTER",             "true");  const char* kNewCluster1Name = "new_cluster_1";  const char* kNewEdsService1Name = "new_eds_service_name_1";  const char* kNewCluster2Name = "new_cluster_2";  const char* kNewEdsService2Name = "new_eds_service_name_2";  SetNextResolution({});  SetNextResolutionForLbChannelAllBalancers();  // Populate new EDS resources.  AdsServiceImpl::EdsResourceArgs args1({      {"locality0", GetBackendPorts(1, 2)},  });  AdsServiceImpl::EdsResourceArgs args2({      {"locality0", GetBackendPorts(2, 3)},  });  balancers_[0]->ads_service()->SetEdsResource(      BuildEdsResource(args1, kNewEdsService1Name));  balancers_[0]->ads_service()->SetEdsResource(      BuildEdsResource(args2, kNewEdsService2Name));  // Populate new CDS resources.  Cluster new_cluster1 = default_cluster_;  new_cluster1.set_name(kNewCluster1Name);  new_cluster1.mutable_eds_cluster_config()->set_service_name(      kNewEdsService1Name);  balancers_[0]->ads_service()->SetCdsResource(new_cluster1);  Cluster new_cluster2 = default_cluster_;  new_cluster2.set_name(kNewCluster2Name);  new_cluster2.mutable_eds_cluster_config()->set_service_name(      kNewEdsService2Name);  balancers_[0]->ads_service()->SetCdsResource(new_cluster2);  // Create Aggregate Cluster  auto cluster = default_cluster_;  CustomClusterType* custom_cluster = cluster.mutable_cluster_type();  custom_cluster->set_name("envoy.clusters.aggregate");  ClusterConfig cluster_config;  cluster_config.add_clusters(kNewCluster1Name);  cluster_config.add_clusters(kNewCluster2Name);  custom_cluster->mutable_typed_config()->PackFrom(cluster_config);  balancers_[0]->ads_service()->SetCdsResource(cluster);  // Wait for traffic to go to backend 1.  WaitForBackend(1);  // Shutdown backend 1 and wait for all traffic to go to backend 2.  ShutdownBackend(1);  WaitForBackend(2);  EXPECT_EQ(balancers_[0]->ads_service()->cds_response_state().state,            AdsServiceImpl::ResponseState::ACKED);  // Bring backend 1 back and ensure all traffic go back to it.  StartBackend(1);  WaitForBackend(1);  gpr_unsetenv(      "GRPC_XDS_EXPERIMENTAL_ENABLE_AGGREGATE_AND_LOGICAL_DNS_CLUSTER");}TEST_P(CdsTest, AggregateClusterEdsToLogicalDns) {  gpr_setenv("GRPC_XDS_EXPERIMENTAL_ENABLE_AGGREGATE_AND_LOGICAL_DNS_CLUSTER",             "true");  SetNextResolution({});  SetNextResolutionForLbChannelAllBalancers();  const char* kNewCluster1Name = "new_cluster_1";  const char* kNewEdsService1Name = "new_eds_service_name_1";  const char* kLogicalDNSClusterName = "logical_dns_cluster";  // Populate new EDS resources.  AdsServiceImpl::EdsResourceArgs args1({      {"locality0", GetBackendPorts(1, 2)},  });  balancers_[0]->ads_service()->SetEdsResource(      BuildEdsResource(args1, kNewEdsService1Name));  // Populate new CDS resources.  Cluster new_cluster1 = default_cluster_;  new_cluster1.set_name(kNewCluster1Name);  new_cluster1.mutable_eds_cluster_config()->set_service_name(      kNewEdsService1Name);  balancers_[0]->ads_service()->SetCdsResource(new_cluster1);  // Create Logical DNS Cluster  auto logical_dns_cluster = default_cluster_;  logical_dns_cluster.set_name(kLogicalDNSClusterName);  logical_dns_cluster.set_type(Cluster::LOGICAL_DNS);  balancers_[0]->ads_service()->SetCdsResource(logical_dns_cluster);  // Create Aggregate Cluster  auto cluster = default_cluster_;  CustomClusterType* custom_cluster = cluster.mutable_cluster_type();  custom_cluster->set_name("envoy.clusters.aggregate");  ClusterConfig cluster_config;  cluster_config.add_clusters(kNewCluster1Name);  cluster_config.add_clusters(kLogicalDNSClusterName);  custom_cluster->mutable_typed_config()->PackFrom(cluster_config);  balancers_[0]->ads_service()->SetCdsResource(cluster);  // Set Logical DNS result  {    grpc_core::ExecCtx exec_ctx;    grpc_core::Resolver::Result result;    result.addresses = CreateAddressListFromPortList(GetBackendPorts(2, 3));    logical_dns_cluster_resolver_response_generator_->SetResponse(        std::move(result));  }  // Wait for traffic to go to backend 1.  WaitForBackend(1);  // Shutdown backend 1 and wait for all traffic to go to backend 2.  ShutdownBackend(1);  WaitForBackend(2);  EXPECT_EQ(balancers_[0]->ads_service()->cds_response_state().state,            AdsServiceImpl::ResponseState::ACKED);  // Bring backend 1 back and ensure all traffic go back to it.  StartBackend(1);  WaitForBackend(1);  gpr_unsetenv(      "GRPC_XDS_EXPERIMENTAL_ENABLE_AGGREGATE_AND_LOGICAL_DNS_CLUSTER");}TEST_P(CdsTest, AggregateClusterLogicalDnsToEds) {  gpr_setenv("GRPC_XDS_EXPERIMENTAL_ENABLE_AGGREGATE_AND_LOGICAL_DNS_CLUSTER",             "true");  SetNextResolution({});  SetNextResolutionForLbChannelAllBalancers();  const char* kNewCluster2Name = "new_cluster_2";  const char* kNewEdsService2Name = "new_eds_service_name_2";  const char* kLogicalDNSClusterName = "logical_dns_cluster";  // Populate new EDS resources.  AdsServiceImpl::EdsResourceArgs args2({      {"locality0", GetBackendPorts(2, 3)},  });  balancers_[0]->ads_service()->SetEdsResource(      BuildEdsResource(args2, kNewEdsService2Name));  // Populate new CDS resources.  Cluster new_cluster2 = default_cluster_;  new_cluster2.set_name(kNewCluster2Name);  new_cluster2.mutable_eds_cluster_config()->set_service_name(      kNewEdsService2Name);  balancers_[0]->ads_service()->SetCdsResource(new_cluster2);  // Create Logical DNS Cluster  auto logical_dns_cluster = default_cluster_;  logical_dns_cluster.set_name(kLogicalDNSClusterName);  logical_dns_cluster.set_type(Cluster::LOGICAL_DNS);  balancers_[0]->ads_service()->SetCdsResource(logical_dns_cluster);  // Create Aggregate Cluster  auto cluster = default_cluster_;  CustomClusterType* custom_cluster = cluster.mutable_cluster_type();  custom_cluster->set_name("envoy.clusters.aggregate");  ClusterConfig cluster_config;  cluster_config.add_clusters(kLogicalDNSClusterName);  cluster_config.add_clusters(kNewCluster2Name);  custom_cluster->mutable_typed_config()->PackFrom(cluster_config);  balancers_[0]->ads_service()->SetCdsResource(cluster);  // Set Logical DNS result  {    grpc_core::ExecCtx exec_ctx;    grpc_core::Resolver::Result result;    result.addresses = CreateAddressListFromPortList(GetBackendPorts(1, 2));    logical_dns_cluster_resolver_response_generator_->SetResponse(        std::move(result));  }  // Wait for traffic to go to backend 1.  WaitForBackend(1);  // Shutdown backend 1 and wait for all traffic to go to backend 2.  ShutdownBackend(1);  WaitForBackend(2);  EXPECT_EQ(balancers_[0]->ads_service()->cds_response_state().state,            AdsServiceImpl::ResponseState::ACKED);  // Bring backend 1 back and ensure all traffic go back to it.  StartBackend(1);  WaitForBackend(1);  gpr_unsetenv(      "GRPC_XDS_EXPERIMENTAL_ENABLE_AGGREGATE_AND_LOGICAL_DNS_CLUSTER");}// Test that CDS client should send a NACK if cluster type is Logical DNS but// the feature is not yet supported.TEST_P(CdsTest, LogicalDNSClusterTypeDisabled) {  auto cluster = default_cluster_;  cluster.set_type(Cluster::LOGICAL_DNS);  balancers_[0]->ads_service()->SetCdsResource(cluster);  SetNextResolution({});  SetNextResolutionForLbChannelAllBalancers();  CheckRpcSendFailure();  const auto response_state =      balancers_[0]->ads_service()->cds_response_state();  EXPECT_EQ(response_state.state, AdsServiceImpl::ResponseState::NACKED);  EXPECT_THAT(response_state.error_message,              ::testing::HasSubstr("DiscoveryType is not valid."));}// Test that CDS client should send a NACK if cluster type is AGGREGATE but// the feature is not yet supported.TEST_P(CdsTest, AggregateClusterTypeDisabled) {  auto cluster = default_cluster_;  CustomClusterType* custom_cluster = cluster.mutable_cluster_type();  custom_cluster->set_name("envoy.clusters.aggregate");  ClusterConfig cluster_config;  cluster_config.add_clusters("cluster1");  cluster_config.add_clusters("cluster2");  custom_cluster->mutable_typed_config()->PackFrom(cluster_config);  cluster.set_type(Cluster::LOGICAL_DNS);  balancers_[0]->ads_service()->SetCdsResource(cluster);  SetNextResolution({});  SetNextResolutionForLbChannelAllBalancers();  CheckRpcSendFailure();  const auto response_state =      balancers_[0]->ads_service()->cds_response_state();  EXPECT_EQ(response_state.state, AdsServiceImpl::ResponseState::NACKED);  EXPECT_THAT(response_state.error_message,              ::testing::HasSubstr("DiscoveryType is not valid."));}// Tests that CDS client should send a NACK if the cluster type in CDS response// is unsupported.TEST_P(CdsTest, UnsupportedClusterType) {  auto cluster = default_cluster_;  cluster.set_type(Cluster::STATIC);  balancers_[0]->ads_service()->SetCdsResource(cluster);  SetNextResolution({});  SetNextResolutionForLbChannelAllBalancers();  CheckRpcSendFailure();  const auto response_state =      balancers_[0]->ads_service()->cds_response_state();  EXPECT_EQ(response_state.state, AdsServiceImpl::ResponseState::NACKED);  EXPECT_THAT(response_state.error_message,              ::testing::HasSubstr("DiscoveryType is not valid."));}// Tests that the NACK for multiple bad resources includes both errors.TEST_P(CdsTest, MultipleBadResources) {  constexpr char kClusterName2[] = "cluster_name_2";  // Use unsupported type for default cluster.  auto cluster = default_cluster_;  cluster.set_type(Cluster::STATIC);  balancers_[0]->ads_service()->SetCdsResource(cluster);  // Add second cluster with the same error.  cluster.set_name(kClusterName2);  balancers_[0]->ads_service()->SetCdsResource(cluster);  // Change RouteConfig to point to both clusters.  RouteConfiguration route_config = default_route_config_;  auto* route = route_config.mutable_virtual_hosts(0)->add_routes();  route->mutable_match()->set_prefix("");  route->mutable_route()->set_cluster(kClusterName2);  SetRouteConfiguration(0, route_config);  // Send RPC.  SetNextResolution({});  SetNextResolutionForLbChannelAllBalancers();  CheckRpcSendFailure();  const auto response_state =      balancers_[0]->ads_service()->cds_response_state();  EXPECT_EQ(response_state.state, AdsServiceImpl::ResponseState::NACKED);  EXPECT_THAT(response_state.error_message,              ::testing::AllOf(                  ::testing::HasSubstr(absl::StrCat(                      kDefaultClusterName, ": DiscoveryType is not valid.")),                  ::testing::HasSubstr(absl::StrCat(                      kClusterName2, ": DiscoveryType is not valid."))));}// Tests that CDS client should send a NACK if the eds_config in CDS response is// other than ADS.TEST_P(CdsTest, WrongEdsConfig) {  auto cluster = default_cluster_;  cluster.mutable_eds_cluster_config()->mutable_eds_config()->mutable_self();  balancers_[0]->ads_service()->SetCdsResource(cluster);  SetNextResolution({});  SetNextResolutionForLbChannelAllBalancers();  CheckRpcSendFailure();  const auto response_state =      balancers_[0]->ads_service()->cds_response_state();  EXPECT_EQ(response_state.state, AdsServiceImpl::ResponseState::NACKED);  EXPECT_THAT(response_state.error_message,              ::testing::HasSubstr("EDS ConfigSource is not ADS."));}// Tests that CDS client should send a NACK if the lb_policy in CDS response is// other than ROUND_ROBIN.TEST_P(CdsTest, WrongLbPolicy) {  auto cluster = default_cluster_;  cluster.set_lb_policy(Cluster::LEAST_REQUEST);  balancers_[0]->ads_service()->SetCdsResource(cluster);  SetNextResolution({});  SetNextResolutionForLbChannelAllBalancers();  CheckRpcSendFailure();  const auto response_state =      balancers_[0]->ads_service()->cds_response_state();  EXPECT_EQ(response_state.state, AdsServiceImpl::ResponseState::NACKED);  EXPECT_THAT(response_state.error_message,              ::testing::HasSubstr("LB policy is not supported."));}// Tests that CDS client should send a NACK if the lrs_server in CDS response is// other than SELF.TEST_P(CdsTest, WrongLrsServer) {  auto cluster = default_cluster_;  cluster.mutable_lrs_server()->mutable_ads();  balancers_[0]->ads_service()->SetCdsResource(cluster);  SetNextResolution({});  SetNextResolutionForLbChannelAllBalancers();  CheckRpcSendFailure();  const auto response_state =      balancers_[0]->ads_service()->cds_response_state();  EXPECT_EQ(response_state.state, AdsServiceImpl::ResponseState::NACKED);  EXPECT_THAT(response_state.error_message,              ::testing::HasSubstr("LRS ConfigSource is not self."));}class XdsSecurityTest : public BasicTest { protected:  static void SetUpTestCase() {    gpr_setenv("GRPC_XDS_EXPERIMENTAL_SECURITY_SUPPORT", "true");    BasicTest::SetUpTestCase();  }  static void TearDownTestCase() {    BasicTest::TearDownTestCase();    gpr_unsetenv("GRPC_XDS_EXPERIMENTAL_SECURITY_SUPPORT");  }  void SetUp() override {    BasicTest::SetUp();    root_cert_ = ReadFile(kCaCertPath);    bad_root_cert_ = ReadFile(kBadClientCertPath);    identity_pair_ = ReadTlsIdentityPair(kClientKeyPath, kClientCertPath);    // TODO(yashykt): Use different client certs here instead of reusing server    // certs after https://github.com/grpc/grpc/pull/24876 is merged    fallback_identity_pair_ =        ReadTlsIdentityPair(kServerKeyPath, kServerCertPath);    bad_identity_pair_ =        ReadTlsIdentityPair(kBadClientKeyPath, kBadClientCertPath);    server_san_exact_.set_exact("*.test.google.fr");    server_san_prefix_.set_prefix("waterzooi.test.google");    server_san_suffix_.set_suffix("google.fr");    server_san_contains_.set_contains("google");    server_san_regex_.mutable_safe_regex()->mutable_google_re2();    server_san_regex_.mutable_safe_regex()->set_regex(        "(foo|waterzooi).test.google.(fr|be)");    bad_san_1_.set_exact("192.168.1.4");    bad_san_2_.set_exact("foo.test.google.in");    authenticated_identity_ = {"testclient"};    fallback_authenticated_identity_ = {"*.test.google.fr",                                        "waterzooi.test.google.be",                                        "*.test.youtube.com", "192.168.1.3"};    AdsServiceImpl::EdsResourceArgs args({        {"locality0", GetBackendPorts(0, 1)},    });    balancers_[0]->ads_service()->SetEdsResource(        BuildEdsResource(args, DefaultEdsServiceName()));    SetNextResolutionForLbChannelAllBalancers();  }  void TearDown() override {    g_fake1_cert_data_map = nullptr;    g_fake2_cert_data_map = nullptr;    BasicTest::TearDown();  }  // Sends CDS updates with the new security configuration and verifies that  // after propagation, this new configuration is used for connections. If \a  // identity_instance_name and \a root_instance_name are both empty,  // connections are expected to use fallback credentials.  void UpdateAndVerifyXdsSecurityConfiguration(      absl::string_view root_instance_name,      absl::string_view root_certificate_name,      absl::string_view identity_instance_name,      absl::string_view identity_certificate_name,      const std::vector<StringMatcher>& san_matchers,      const std::vector<std::string>& expected_authenticated_identity,      bool test_expects_failure = false) {    auto cluster = default_cluster_;    if (!identity_instance_name.empty() || !root_instance_name.empty()) {      auto* transport_socket = cluster.mutable_transport_socket();      transport_socket->set_name("envoy.transport_sockets.tls");      UpstreamTlsContext upstream_tls_context;      if (!identity_instance_name.empty()) {        upstream_tls_context.mutable_common_tls_context()            ->mutable_tls_certificate_certificate_provider_instance()            ->set_instance_name(std::string(identity_instance_name));        upstream_tls_context.mutable_common_tls_context()            ->mutable_tls_certificate_certificate_provider_instance()            ->set_certificate_name(std::string(identity_certificate_name));      }      if (!root_instance_name.empty()) {        upstream_tls_context.mutable_common_tls_context()            ->mutable_combined_validation_context()            ->mutable_validation_context_certificate_provider_instance()            ->set_instance_name(std::string(root_instance_name));        upstream_tls_context.mutable_common_tls_context()            ->mutable_combined_validation_context()            ->mutable_validation_context_certificate_provider_instance()            ->set_certificate_name(std::string(root_certificate_name));      }      if (!san_matchers.empty()) {        auto* validation_context =            upstream_tls_context.mutable_common_tls_context()                ->mutable_combined_validation_context()                ->mutable_default_validation_context();        for (const auto& san_matcher : san_matchers) {          *validation_context->add_match_subject_alt_names() = san_matcher;        }      }      transport_socket->mutable_typed_config()->PackFrom(upstream_tls_context);    }    balancers_[0]->ads_service()->SetCdsResource(cluster);    // The updates might take time to have an effect, so use a retry loop.    constexpr int kRetryCount = 100;    int num_tries = 0;    for (; num_tries < kRetryCount; num_tries++) {      // Give some time for the updates to propagate.      gpr_sleep_until(grpc_timeout_milliseconds_to_deadline(100));      if (test_expects_failure) {        // Restart the servers to force a reconnection so that previously        // connected subchannels are not used for the RPC.        ShutdownBackend(0);        StartBackend(0);        if (SendRpc().ok()) {          gpr_log(GPR_ERROR, "RPC succeeded. Failure expected. Trying again.");          continue;        }      } else {        WaitForBackend(0);        Status status = SendRpc();        if (!status.ok()) {          gpr_log(GPR_ERROR, "RPC failed. code=%d message=%s Trying again.",                  status.error_code(), status.error_message().c_str());          continue;        }        if (backends_[0]->backend_service()->last_peer_identity() !=            expected_authenticated_identity) {          gpr_log(              GPR_ERROR,              "Expected client identity does not match. (actual) %s vs "              "(expected) %s Trying again.",              absl::StrJoin(                  backends_[0]->backend_service()->last_peer_identity(), ",")                  .c_str(),              absl::StrJoin(expected_authenticated_identity, ",").c_str());          continue;        }      }      break;    }    EXPECT_LT(num_tries, kRetryCount);  }  std::string root_cert_;  std::string bad_root_cert_;  grpc_core::PemKeyCertPairList identity_pair_;  grpc_core::PemKeyCertPairList fallback_identity_pair_;  grpc_core::PemKeyCertPairList bad_identity_pair_;  StringMatcher server_san_exact_;  StringMatcher server_san_prefix_;  StringMatcher server_san_suffix_;  StringMatcher server_san_contains_;  StringMatcher server_san_regex_;  StringMatcher bad_san_1_;  StringMatcher bad_san_2_;  std::vector<std::string> authenticated_identity_;  std::vector<std::string> fallback_authenticated_identity_;};TEST_P(XdsSecurityTest,       TLSConfigurationWithoutValidationContextCertificateProviderInstance) {  auto cluster = default_cluster_;  auto* transport_socket = cluster.mutable_transport_socket();  transport_socket->set_name("envoy.transport_sockets.tls");  balancers_[0]->ads_service()->SetCdsResource(cluster);  CheckRpcSendFailure();  const auto response_state =      balancers_[0]->ads_service()->cds_response_state();  EXPECT_EQ(response_state.state, AdsServiceImpl::ResponseState::NACKED);  EXPECT_THAT(response_state.error_message,              ::testing::HasSubstr(                  "TLS configuration provided but no "                  "validation_context_certificate_provider_instance found."));}TEST_P(    XdsSecurityTest,    MatchSubjectAltNamesProvidedWithoutValidationContextCertificateProviderInstance) {  auto cluster = default_cluster_;  auto* transport_socket = cluster.mutable_transport_socket();  transport_socket->set_name("envoy.transport_sockets.tls");  UpstreamTlsContext upstream_tls_context;  auto* validation_context = upstream_tls_context.mutable_common_tls_context()                                 ->mutable_combined_validation_context()                                 ->mutable_default_validation_context();  *validation_context->add_match_subject_alt_names() = server_san_exact_;  transport_socket->mutable_typed_config()->PackFrom(upstream_tls_context);  balancers_[0]->ads_service()->SetCdsResource(cluster);  CheckRpcSendFailure();  const auto response_state =      balancers_[0]->ads_service()->cds_response_state();  EXPECT_EQ(response_state.state, AdsServiceImpl::ResponseState::NACKED);  EXPECT_THAT(response_state.error_message,              ::testing::HasSubstr(                  "TLS configuration provided but no "                  "validation_context_certificate_provider_instance found."));}TEST_P(    XdsSecurityTest,    TlsCertificateCertificateProviderInstanceWithoutValidationContextCertificateProviderInstance) {  auto cluster = default_cluster_;  auto* transport_socket = cluster.mutable_transport_socket();  transport_socket->set_name("envoy.transport_sockets.tls");  UpstreamTlsContext upstream_tls_context;  upstream_tls_context.mutable_common_tls_context()      ->mutable_tls_certificate_certificate_provider_instance()      ->set_instance_name(std::string("instance_name"));  transport_socket->mutable_typed_config()->PackFrom(upstream_tls_context);  balancers_[0]->ads_service()->SetCdsResource(cluster);  CheckRpcSendFailure();  const auto response_state =      balancers_[0]->ads_service()->cds_response_state();  EXPECT_EQ(response_state.state, AdsServiceImpl::ResponseState::NACKED);  EXPECT_THAT(response_state.error_message,              ::testing::HasSubstr(                  "TLS configuration provided but no "                  "validation_context_certificate_provider_instance found."));}TEST_P(XdsSecurityTest, RegexSanMatcherDoesNotAllowIgnoreCase) {  auto cluster = default_cluster_;  auto* transport_socket = cluster.mutable_transport_socket();  transport_socket->set_name("envoy.transport_sockets.tls");  UpstreamTlsContext upstream_tls_context;  upstream_tls_context.mutable_common_tls_context()      ->mutable_combined_validation_context()      ->mutable_validation_context_certificate_provider_instance()      ->set_instance_name(std::string("fake_plugin1"));  auto* validation_context = upstream_tls_context.mutable_common_tls_context()                                 ->mutable_combined_validation_context()                                 ->mutable_default_validation_context();  StringMatcher matcher;  matcher.mutable_safe_regex()->mutable_google_re2();  matcher.mutable_safe_regex()->set_regex(      "(foo|waterzooi).test.google.(fr|be)");  matcher.set_ignore_case(true);  *validation_context->add_match_subject_alt_names() = matcher;  transport_socket->mutable_typed_config()->PackFrom(upstream_tls_context);  balancers_[0]->ads_service()->SetCdsResource(cluster);  CheckRpcSendFailure();  const auto response_state =      balancers_[0]->ads_service()->cds_response_state();  EXPECT_EQ(response_state.state, AdsServiceImpl::ResponseState::NACKED);  EXPECT_THAT(response_state.error_message,              ::testing::HasSubstr(                  "StringMatcher: ignore_case has no effect for SAFE_REGEX."));}TEST_P(XdsSecurityTest, UnknownRootCertificateProvider) {  auto cluster = default_cluster_;  auto* transport_socket = cluster.mutable_transport_socket();  transport_socket->set_name("envoy.transport_sockets.tls");  UpstreamTlsContext upstream_tls_context;  upstream_tls_context.mutable_common_tls_context()      ->mutable_combined_validation_context()      ->mutable_validation_context_certificate_provider_instance()      ->set_instance_name("unknown");  transport_socket->mutable_typed_config()->PackFrom(upstream_tls_context);  balancers_[0]->ads_service()->SetCdsResource(cluster);  CheckRpcSendFailure(1, RpcOptions(), StatusCode::UNAVAILABLE);}TEST_P(XdsSecurityTest, UnknownIdentityCertificateProvider) {  FakeCertificateProvider::CertDataMap fake1_cert_map = {      {"", {root_cert_, identity_pair_}}};  g_fake1_cert_data_map = &fake1_cert_map;  auto cluster = default_cluster_;  auto* transport_socket = cluster.mutable_transport_socket();  transport_socket->set_name("envoy.transport_sockets.tls");  UpstreamTlsContext upstream_tls_context;  upstream_tls_context.mutable_common_tls_context()      ->mutable_tls_certificate_certificate_provider_instance()      ->set_instance_name("unknown");  upstream_tls_context.mutable_common_tls_context()      ->mutable_combined_validation_context()      ->mutable_validation_context_certificate_provider_instance()      ->set_instance_name("fake_plugin1");  transport_socket->mutable_typed_config()->PackFrom(upstream_tls_context);  balancers_[0]->ads_service()->SetCdsResource(cluster);  CheckRpcSendFailure(1, RpcOptions(), StatusCode::UNAVAILABLE);  g_fake1_cert_data_map = nullptr;}TEST_P(XdsSecurityTest, TestMtlsConfigurationWithNoSanMatchers) {  FakeCertificateProvider::CertDataMap fake1_cert_map = {      {"", {root_cert_, identity_pair_}}};  g_fake1_cert_data_map = &fake1_cert_map;  UpdateAndVerifyXdsSecurityConfiguration("fake_plugin1", "", "fake_plugin1",                                          "", {}, authenticated_identity_);  g_fake1_cert_data_map = nullptr;}TEST_P(XdsSecurityTest, TestMtlsConfigurationWithExactSanMatcher) {  FakeCertificateProvider::CertDataMap fake1_cert_map = {      {"", {root_cert_, identity_pair_}}};  g_fake1_cert_data_map = &fake1_cert_map;  UpdateAndVerifyXdsSecurityConfiguration("fake_plugin1", "", "fake_plugin1",                                          "", {server_san_exact_},                                          authenticated_identity_);  g_fake1_cert_data_map = nullptr;}TEST_P(XdsSecurityTest, TestMtlsConfigurationWithPrefixSanMatcher) {  FakeCertificateProvider::CertDataMap fake1_cert_map = {      {"", {root_cert_, identity_pair_}}};  g_fake1_cert_data_map = &fake1_cert_map;  UpdateAndVerifyXdsSecurityConfiguration("fake_plugin1", "", "fake_plugin1",                                          "", {server_san_prefix_},                                          authenticated_identity_);  g_fake1_cert_data_map = nullptr;}TEST_P(XdsSecurityTest, TestMtlsConfigurationWithSuffixSanMatcher) {  FakeCertificateProvider::CertDataMap fake1_cert_map = {      {"", {root_cert_, identity_pair_}}};  g_fake1_cert_data_map = &fake1_cert_map;  UpdateAndVerifyXdsSecurityConfiguration("fake_plugin1", "", "fake_plugin1",                                          "", {server_san_suffix_},                                          authenticated_identity_);  g_fake1_cert_data_map = nullptr;}TEST_P(XdsSecurityTest, TestMtlsConfigurationWithContainsSanMatcher) {  FakeCertificateProvider::CertDataMap fake1_cert_map = {      {"", {root_cert_, identity_pair_}}};  g_fake1_cert_data_map = &fake1_cert_map;  UpdateAndVerifyXdsSecurityConfiguration("fake_plugin1", "", "fake_plugin1",                                          "", {server_san_contains_},                                          authenticated_identity_);  g_fake1_cert_data_map = nullptr;}TEST_P(XdsSecurityTest, TestMtlsConfigurationWithRegexSanMatcher) {  FakeCertificateProvider::CertDataMap fake1_cert_map = {      {"", {root_cert_, identity_pair_}}};  g_fake1_cert_data_map = &fake1_cert_map;  UpdateAndVerifyXdsSecurityConfiguration("fake_plugin1", "", "fake_plugin1",                                          "", {server_san_regex_},                                          authenticated_identity_);  g_fake1_cert_data_map = nullptr;}TEST_P(XdsSecurityTest, TestMtlsConfigurationWithSanMatchersUpdate) {  FakeCertificateProvider::CertDataMap fake1_cert_map = {      {"", {root_cert_, identity_pair_}}};  g_fake1_cert_data_map = &fake1_cert_map;  UpdateAndVerifyXdsSecurityConfiguration(      "fake_plugin1", "", "fake_plugin1", "",      {server_san_exact_, server_san_prefix_}, authenticated_identity_);  UpdateAndVerifyXdsSecurityConfiguration("fake_plugin1", "", "fake_plugin1",                                          "", {bad_san_1_, bad_san_2_}, {},                                          true /* failure */);  UpdateAndVerifyXdsSecurityConfiguration(      "fake_plugin1", "", "fake_plugin1", "",      {server_san_prefix_, server_san_regex_}, authenticated_identity_);  g_fake1_cert_data_map = nullptr;}TEST_P(XdsSecurityTest, TestMtlsConfigurationWithRootPluginUpdate) {  FakeCertificateProvider::CertDataMap fake1_cert_map = {      {"", {root_cert_, identity_pair_}}};  g_fake1_cert_data_map = &fake1_cert_map;  FakeCertificateProvider::CertDataMap fake2_cert_map = {      {"", {bad_root_cert_, bad_identity_pair_}}};  g_fake2_cert_data_map = &fake2_cert_map;  UpdateAndVerifyXdsSecurityConfiguration("fake_plugin1", "", "fake_plugin1",                                          "", {server_san_exact_},                                          authenticated_identity_);  UpdateAndVerifyXdsSecurityConfiguration("fake_plugin2" /* bad root */, "",                                          "fake_plugin1", "", {}, {},                                          true /* failure */);  UpdateAndVerifyXdsSecurityConfiguration("fake_plugin1", "", "fake_plugin1",                                          "", {server_san_exact_},                                          authenticated_identity_);  g_fake1_cert_data_map = nullptr;  g_fake2_cert_data_map = nullptr;}TEST_P(XdsSecurityTest, TestMtlsConfigurationWithIdentityPluginUpdate) {  FakeCertificateProvider::CertDataMap fake1_cert_map = {      {"", {root_cert_, identity_pair_}}};  g_fake1_cert_data_map = &fake1_cert_map;  FakeCertificateProvider::CertDataMap fake2_cert_map = {      {"", {root_cert_, fallback_identity_pair_}}};  g_fake2_cert_data_map = &fake2_cert_map;  UpdateAndVerifyXdsSecurityConfiguration("fake_plugin1", "", "fake_plugin1",                                          "", {server_san_exact_},                                          authenticated_identity_);  UpdateAndVerifyXdsSecurityConfiguration("fake_plugin1", "", "fake_plugin2",                                          "", {server_san_exact_},                                          fallback_authenticated_identity_);  g_fake1_cert_data_map = nullptr;  g_fake2_cert_data_map = nullptr;}TEST_P(XdsSecurityTest, TestMtlsConfigurationWithBothPluginsUpdated) {  FakeCertificateProvider::CertDataMap fake1_cert_map = {      {"", {root_cert_, identity_pair_}}};  g_fake1_cert_data_map = &fake1_cert_map;  FakeCertificateProvider::CertDataMap fake2_cert_map = {      {"", {bad_root_cert_, bad_identity_pair_}},      {"good", {root_cert_, fallback_identity_pair_}}};  g_fake2_cert_data_map = &fake2_cert_map;  UpdateAndVerifyXdsSecurityConfiguration("fake_plugin2", "", "fake_plugin2",                                          "", {}, {}, true /* failure */);  UpdateAndVerifyXdsSecurityConfiguration("fake_plugin1", "", "fake_plugin1",                                          "", {server_san_prefix_},                                          authenticated_identity_);  UpdateAndVerifyXdsSecurityConfiguration(      "fake_plugin2", "good", "fake_plugin2", "good", {server_san_prefix_},      fallback_authenticated_identity_);  g_fake1_cert_data_map = nullptr;  g_fake2_cert_data_map = nullptr;}TEST_P(XdsSecurityTest, TestMtlsConfigurationWithRootCertificateNameUpdate) {  FakeCertificateProvider::CertDataMap fake1_cert_map = {      {"", {root_cert_, identity_pair_}},      {"bad", {bad_root_cert_, bad_identity_pair_}}};  g_fake1_cert_data_map = &fake1_cert_map;  UpdateAndVerifyXdsSecurityConfiguration("fake_plugin1", "", "fake_plugin1",                                          "", {server_san_regex_},                                          authenticated_identity_);  UpdateAndVerifyXdsSecurityConfiguration("fake_plugin1", "bad", "fake_plugin1",                                          "", {server_san_regex_}, {},                                          true /* failure */);  g_fake1_cert_data_map = nullptr;}TEST_P(XdsSecurityTest,       TestMtlsConfigurationWithIdentityCertificateNameUpdate) {  FakeCertificateProvider::CertDataMap fake1_cert_map = {      {"", {root_cert_, identity_pair_}},      {"bad", {bad_root_cert_, bad_identity_pair_}}};  g_fake1_cert_data_map = &fake1_cert_map;  UpdateAndVerifyXdsSecurityConfiguration("fake_plugin1", "", "fake_plugin1",                                          "", {server_san_exact_},                                          authenticated_identity_);  UpdateAndVerifyXdsSecurityConfiguration("fake_plugin1", "", "fake_plugin1",                                          "bad", {server_san_exact_}, {},                                          true /* failure */);  g_fake1_cert_data_map = nullptr;}TEST_P(XdsSecurityTest,       TestMtlsConfigurationWithIdentityCertificateNameUpdateGoodCerts) {  FakeCertificateProvider::CertDataMap fake1_cert_map = {      {"", {root_cert_, identity_pair_}},      {"good", {root_cert_, fallback_identity_pair_}}};  g_fake1_cert_data_map = &fake1_cert_map;  UpdateAndVerifyXdsSecurityConfiguration("fake_plugin1", "", "fake_plugin1",                                          "", {server_san_exact_},                                          authenticated_identity_);  UpdateAndVerifyXdsSecurityConfiguration("fake_plugin1", "", "fake_plugin1",                                          "good", {server_san_exact_},                                          fallback_authenticated_identity_);  g_fake1_cert_data_map = nullptr;}TEST_P(XdsSecurityTest, TestMtlsConfigurationWithBothCertificateNamesUpdated) {  FakeCertificateProvider::CertDataMap fake1_cert_map = {      {"", {root_cert_, identity_pair_}},      {"bad", {bad_root_cert_, bad_identity_pair_}}};  g_fake1_cert_data_map = &fake1_cert_map;  UpdateAndVerifyXdsSecurityConfiguration("fake_plugin1", "bad", "fake_plugin1",                                          "bad", {server_san_prefix_}, {},                                          true /* failure */);  UpdateAndVerifyXdsSecurityConfiguration("fake_plugin1", "", "fake_plugin1",                                          "", {server_san_prefix_},                                          authenticated_identity_);  g_fake1_cert_data_map = nullptr;}TEST_P(XdsSecurityTest, TestTlsConfigurationWithNoSanMatchers) {  FakeCertificateProvider::CertDataMap fake1_cert_map = {      {"", {root_cert_, identity_pair_}}};  g_fake1_cert_data_map = &fake1_cert_map;  UpdateAndVerifyXdsSecurityConfiguration("fake_plugin1", "", "", "", {},                                          {} /* unauthenticated */);  g_fake1_cert_data_map = nullptr;}TEST_P(XdsSecurityTest, TestTlsConfigurationWithSanMatchers) {  FakeCertificateProvider::CertDataMap fake1_cert_map = {      {"", {root_cert_, identity_pair_}}};  g_fake1_cert_data_map = &fake1_cert_map;  UpdateAndVerifyXdsSecurityConfiguration(      "fake_plugin1", "", "", "",      {server_san_exact_, server_san_prefix_, server_san_regex_},      {} /* unauthenticated */);  g_fake1_cert_data_map = nullptr;}TEST_P(XdsSecurityTest, TestTlsConfigurationWithSanMatchersUpdate) {  FakeCertificateProvider::CertDataMap fake1_cert_map = {      {"", {root_cert_, identity_pair_}}};  g_fake1_cert_data_map = &fake1_cert_map;  UpdateAndVerifyXdsSecurityConfiguration(      "fake_plugin1", "", "", "", {server_san_exact_, server_san_prefix_},      {} /* unauthenticated */);  UpdateAndVerifyXdsSecurityConfiguration(      "fake_plugin1", "", "", "", {bad_san_1_, bad_san_2_},      {} /* unauthenticated */, true /* failure */);  UpdateAndVerifyXdsSecurityConfiguration(      "fake_plugin1", "", "", "", {server_san_prefix_, server_san_regex_},      {} /* unauthenticated */);  g_fake1_cert_data_map = nullptr;}TEST_P(XdsSecurityTest, TestTlsConfigurationWithRootCertificateNameUpdate) {  FakeCertificateProvider::CertDataMap fake1_cert_map = {      {"", {root_cert_, identity_pair_}},      {"bad", {bad_root_cert_, bad_identity_pair_}}};  g_fake1_cert_data_map = &fake1_cert_map;  UpdateAndVerifyXdsSecurityConfiguration("fake_plugin1", "", "", "",                                          {server_san_exact_},                                          {} /* unauthenticated */);  UpdateAndVerifyXdsSecurityConfiguration("fake_plugin1", "bad", "", "",                                          {server_san_exact_}, {},                                          true /* failure */);  g_fake1_cert_data_map = nullptr;}TEST_P(XdsSecurityTest, TestTlsConfigurationWithRootPluginUpdate) {  FakeCertificateProvider::CertDataMap fake1_cert_map = {      {"", {root_cert_, identity_pair_}}};  g_fake1_cert_data_map = &fake1_cert_map;  FakeCertificateProvider::CertDataMap fake2_cert_map = {      {"", {bad_root_cert_, bad_identity_pair_}}};  g_fake2_cert_data_map = &fake2_cert_map;  UpdateAndVerifyXdsSecurityConfiguration("fake_plugin1", "", "", "",                                          {server_san_exact_},                                          {} /* unauthenticated */);  UpdateAndVerifyXdsSecurityConfiguration(      "fake_plugin2", "", "", "", {server_san_exact_}, {}, true /* failure */);  g_fake1_cert_data_map = nullptr;  g_fake2_cert_data_map = nullptr;}TEST_P(XdsSecurityTest, TestFallbackConfiguration) {  UpdateAndVerifyXdsSecurityConfiguration("", "", "", "", {},                                          fallback_authenticated_identity_);  g_fake1_cert_data_map = nullptr;}TEST_P(XdsSecurityTest, TestMtlsToTls) {  FakeCertificateProvider::CertDataMap fake1_cert_map = {      {"", {root_cert_, identity_pair_}}};  g_fake1_cert_data_map = &fake1_cert_map;  UpdateAndVerifyXdsSecurityConfiguration("fake_plugin1", "", "fake_plugin1",                                          "", {server_san_exact_},                                          authenticated_identity_);  UpdateAndVerifyXdsSecurityConfiguration("fake_plugin1", "", "", "",                                          {server_san_exact_},                                          {} /* unauthenticated */);  g_fake1_cert_data_map = nullptr;}TEST_P(XdsSecurityTest, TestMtlsToFallback) {  FakeCertificateProvider::CertDataMap fake1_cert_map = {      {"", {root_cert_, identity_pair_}}};  g_fake1_cert_data_map = &fake1_cert_map;  UpdateAndVerifyXdsSecurityConfiguration("fake_plugin1", "", "fake_plugin1",                                          "", {server_san_exact_},                                          authenticated_identity_);  UpdateAndVerifyXdsSecurityConfiguration("", "", "", "", {},                                          fallback_authenticated_identity_);  g_fake1_cert_data_map = nullptr;}TEST_P(XdsSecurityTest, TestTlsToMtls) {  FakeCertificateProvider::CertDataMap fake1_cert_map = {      {"", {root_cert_, identity_pair_}}};  g_fake1_cert_data_map = &fake1_cert_map;  UpdateAndVerifyXdsSecurityConfiguration("fake_plugin1", "", "", "",                                          {server_san_exact_},                                          {} /* unauthenticated */);  UpdateAndVerifyXdsSecurityConfiguration("fake_plugin1", "", "fake_plugin1",                                          "", {server_san_exact_},                                          authenticated_identity_);  g_fake1_cert_data_map = nullptr;}TEST_P(XdsSecurityTest, TestTlsToFallback) {  FakeCertificateProvider::CertDataMap fake1_cert_map = {      {"", {root_cert_, identity_pair_}}};  g_fake1_cert_data_map = &fake1_cert_map;  UpdateAndVerifyXdsSecurityConfiguration("fake_plugin1", "", "", "",                                          {server_san_exact_},                                          {} /* unauthenticated */);  UpdateAndVerifyXdsSecurityConfiguration("", "", "", "", {},                                          fallback_authenticated_identity_);  g_fake1_cert_data_map = nullptr;}TEST_P(XdsSecurityTest, TestFallbackToMtls) {  FakeCertificateProvider::CertDataMap fake1_cert_map = {      {"", {root_cert_, identity_pair_}}};  g_fake1_cert_data_map = &fake1_cert_map;  UpdateAndVerifyXdsSecurityConfiguration("", "", "", "", {},                                          fallback_authenticated_identity_);  UpdateAndVerifyXdsSecurityConfiguration("fake_plugin1", "", "fake_plugin1",                                          "", {server_san_exact_},                                          authenticated_identity_);  g_fake1_cert_data_map = nullptr;}TEST_P(XdsSecurityTest, TestFallbackToTls) {  FakeCertificateProvider::CertDataMap fake1_cert_map = {      {"", {root_cert_, identity_pair_}}};  g_fake1_cert_data_map = &fake1_cert_map;  UpdateAndVerifyXdsSecurityConfiguration("", "", "", "", {},                                          fallback_authenticated_identity_);  UpdateAndVerifyXdsSecurityConfiguration("fake_plugin1", "", "", "",                                          {server_san_exact_},                                          {} /* unauthenticated */);  g_fake1_cert_data_map = nullptr;}TEST_P(XdsSecurityTest, TestFileWatcherCertificateProvider) {  UpdateAndVerifyXdsSecurityConfiguration("file_plugin", "", "file_plugin", "",                                          {server_san_exact_},                                          authenticated_identity_);}class XdsEnabledServerTest : public XdsEnd2endTest { protected:  XdsEnabledServerTest()      : XdsEnd2endTest(1, 1, 100, true /* use_xds_enabled_server */) {}  void SetUp() override {    XdsEnd2endTest::SetUp();    AdsServiceImpl::EdsResourceArgs args({        {"locality0", GetBackendPorts(0, 1)},    });    balancers_[0]->ads_service()->SetEdsResource(        BuildEdsResource(args, DefaultEdsServiceName()));    SetNextResolution({});    SetNextResolutionForLbChannelAllBalancers();  }};TEST_P(XdsEnabledServerTest, Basic) {  Listener listener;  listener.set_name(      absl::StrCat("grpc/server?xds.resource.listening_address=",                   ipv6_only_ ? "[::1]:" : "127.0.0.1:", backends_[0]->port()));  listener.mutable_address()->mutable_socket_address()->set_address(      ipv6_only_ ? "::1" : "127.0.0.1");  listener.mutable_address()->mutable_socket_address()->set_port_value(      backends_[0]->port());  listener.add_filter_chains()->add_filters()->mutable_typed_config()->PackFrom(      HttpConnectionManager());  balancers_[0]->ads_service()->SetLdsResource(listener);  WaitForBackend(0);}TEST_P(XdsEnabledServerTest, BadLdsUpdateNoApiListenerNorAddress) {  Listener listener;  listener.set_name(      absl::StrCat("grpc/server?xds.resource.listening_address=",                   ipv6_only_ ? "[::1]:" : "127.0.0.1:", backends_[0]->port()));  listener.add_filter_chains()->add_filters()->mutable_typed_config()->PackFrom(      HttpConnectionManager());  balancers_[0]->ads_service()->SetLdsResource(listener);  do {    CheckRpcSendFailure();  } while (balancers_[0]->ads_service()->lds_response_state().state ==           AdsServiceImpl::ResponseState::SENT);  const auto response_state =      balancers_[0]->ads_service()->lds_response_state();  EXPECT_EQ(response_state.state, AdsServiceImpl::ResponseState::NACKED);  EXPECT_THAT(      response_state.error_message,      ::testing::HasSubstr("Listener has neither address nor ApiListener"));}TEST_P(XdsEnabledServerTest, BadLdsUpdateBothApiListenerAndAddress) {  Listener listener;  listener.set_name(      absl::StrCat("grpc/server?xds.resource.listening_address=",                   ipv6_only_ ? "[::1]:" : "127.0.0.1:", backends_[0]->port()));  balancers_[0]->ads_service()->SetLdsResource(listener);  listener.mutable_address()->mutable_socket_address()->set_address(      ipv6_only_ ? "::1" : "127.0.0.1");  listener.mutable_address()->mutable_socket_address()->set_port_value(      backends_[0]->port());  auto* filter_chain = listener.add_filter_chains();  filter_chain->add_filters()->mutable_typed_config()->PackFrom(      HttpConnectionManager());  listener.mutable_api_listener();  balancers_[0]->ads_service()->SetLdsResource(listener);  do {    CheckRpcSendFailure();  } while (balancers_[0]->ads_service()->lds_response_state().state ==           AdsServiceImpl::ResponseState::SENT);  const auto response_state =      balancers_[0]->ads_service()->lds_response_state();  EXPECT_EQ(response_state.state, AdsServiceImpl::ResponseState::NACKED);  EXPECT_THAT(      response_state.error_message,      ::testing::HasSubstr("Listener has both address and ApiListener"));}TEST_P(XdsEnabledServerTest, UnsupportedL4Filter) {  Listener listener;  listener.set_name(      absl::StrCat("grpc/server?xds.resource.listening_address=",                   ipv6_only_ ? "[::1]:" : "127.0.0.1:", backends_[0]->port()));  balancers_[0]->ads_service()->SetLdsResource(listener);  listener.mutable_address()->mutable_socket_address()->set_address(      ipv6_only_ ? "::1" : "127.0.0.1");  listener.mutable_address()->mutable_socket_address()->set_port_value(      backends_[0]->port());  listener.add_filter_chains()->add_filters()->mutable_typed_config()->PackFrom(default_listener_ /* any proto object other than HttpConnectionManager */);  balancers_[0]->ads_service()->SetLdsResource(listener);  do {    CheckRpcSendFailure();  } while (balancers_[0]->ads_service()->lds_response_state().state ==           AdsServiceImpl::ResponseState::SENT);  const auto response_state =      balancers_[0]->ads_service()->lds_response_state();  EXPECT_EQ(response_state.state, AdsServiceImpl::ResponseState::NACKED);  EXPECT_THAT(response_state.error_message,              ::testing::HasSubstr("Unsupported filter type"));}TEST_P(XdsEnabledServerTest, UnsupportedHttpFilter) {  // Set env var to enable filters parsing.  gpr_setenv("GRPC_XDS_EXPERIMENTAL_FAULT_INJECTION", "true");  Listener listener;  listener.set_name(      absl::StrCat("grpc/server?xds.resource.listening_address=",                   ipv6_only_ ? "[::1]:" : "127.0.0.1:", backends_[0]->port()));  listener.mutable_address()->mutable_socket_address()->set_address(      ipv6_only_ ? "::1" : "127.0.0.1");  listener.mutable_address()->mutable_socket_address()->set_port_value(      backends_[0]->port());  HttpConnectionManager http_connection_manager;  auto* http_filter = http_connection_manager.add_http_filters();  http_filter->set_name("grpc.testing.unsupported_http_filter");  http_filter->mutable_typed_config()->set_type_url(      "grpc.testing.unsupported_http_filter");  listener.add_filter_chains()->add_filters()->mutable_typed_config()->PackFrom(      http_connection_manager);  balancers_[0]->ads_service()->SetLdsResource(listener);  listener.set_name(      absl::StrCat("grpc/server?xds.resource.listening_address=[::1]:",                   backends_[0]->port()));  balancers_[0]->ads_service()->SetLdsResource(listener);  do {    CheckRpcSendFailure();  } while (balancers_[0]->ads_service()->lds_response_state().state ==           AdsServiceImpl::ResponseState::SENT);  const auto response_state =      balancers_[0]->ads_service()->lds_response_state();  EXPECT_EQ(response_state.state, AdsServiceImpl::ResponseState::NACKED);  EXPECT_THAT(response_state.error_message,              ::testing::HasSubstr("no filter registered for config type "                                   "grpc.testing.unsupported_http_filter"));  gpr_unsetenv("GRPC_XDS_EXPERIMENTAL_FAULT_INJECTION");}TEST_P(XdsEnabledServerTest, HttpFilterNotSupportedOnServer) {  // Set env var to enable filters parsing.  gpr_setenv("GRPC_XDS_EXPERIMENTAL_FAULT_INJECTION", "true");  Listener listener;  listener.set_name(      absl::StrCat("grpc/server?xds.resource.listening_address=",                   ipv6_only_ ? "[::1]:" : "127.0.0.1:", backends_[0]->port()));  listener.mutable_address()->mutable_socket_address()->set_address(      ipv6_only_ ? "::1" : "127.0.0.1");  listener.mutable_address()->mutable_socket_address()->set_port_value(      backends_[0]->port());  HttpConnectionManager http_connection_manager;  auto* http_filter = http_connection_manager.add_http_filters();  http_filter->set_name("grpc.testing.client_only_http_filter");  http_filter->mutable_typed_config()->set_type_url(      "grpc.testing.client_only_http_filter");  listener.add_filter_chains()->add_filters()->mutable_typed_config()->PackFrom(      http_connection_manager);  balancers_[0]->ads_service()->SetLdsResource(listener);  listener.set_name(      absl::StrCat("grpc/server?xds.resource.listening_address=[::1]:",                   backends_[0]->port()));  balancers_[0]->ads_service()->SetLdsResource(listener);  do {    CheckRpcSendFailure();  } while (balancers_[0]->ads_service()->lds_response_state().state ==           AdsServiceImpl::ResponseState::SENT);  const auto response_state =      balancers_[0]->ads_service()->lds_response_state();  EXPECT_EQ(response_state.state, AdsServiceImpl::ResponseState::NACKED);  EXPECT_THAT(      response_state.error_message,      ::testing::HasSubstr("Filter grpc.testing.client_only_http_filter is not "                           "supported on servers"));  gpr_unsetenv("GRPC_XDS_EXPERIMENTAL_FAULT_INJECTION");}TEST_P(XdsEnabledServerTest,       HttpFilterNotSupportedOnServerIgnoredWhenOptional) {  // Set env var to enable filters parsing.  gpr_setenv("GRPC_XDS_EXPERIMENTAL_FAULT_INJECTION", "true");  Listener listener;  listener.set_name(      absl::StrCat("grpc/server?xds.resource.listening_address=",                   ipv6_only_ ? "[::1]:" : "127.0.0.1:", backends_[0]->port()));  listener.mutable_address()->mutable_socket_address()->set_address(      ipv6_only_ ? "::1" : "127.0.0.1");  listener.mutable_address()->mutable_socket_address()->set_port_value(      backends_[0]->port());  HttpConnectionManager http_connection_manager;  auto* http_filter = http_connection_manager.add_http_filters();  http_filter->set_name("grpc.testing.client_only_http_filter");  http_filter->mutable_typed_config()->set_type_url(      "grpc.testing.client_only_http_filter");  http_filter->set_is_optional(true);  listener.add_filter_chains()->add_filters()->mutable_typed_config()->PackFrom(      http_connection_manager);  balancers_[0]->ads_service()->SetLdsResource(listener);  listener.set_name(      absl::StrCat("grpc/server?xds.resource.listening_address=[::1]:",                   backends_[0]->port()));  balancers_[0]->ads_service()->SetLdsResource(listener);  WaitForBackend(0);  const auto response_state =      balancers_[0]->ads_service()->lds_response_state();  EXPECT_EQ(response_state.state, AdsServiceImpl::ResponseState::ACKED);  gpr_unsetenv("GRPC_XDS_EXPERIMENTAL_FAULT_INJECTION");}// Verify that a mismatch of listening address results in "not serving" status.TEST_P(XdsEnabledServerTest, ListenerAddressMismatch) {  Listener listener;  listener.set_name(      absl::StrCat("grpc/server?xds.resource.listening_address=",                   ipv6_only_ ? "[::1]:" : "127.0.0.1:", backends_[0]->port()));  listener.mutable_address()->mutable_socket_address()->set_address(      ipv6_only_ ? "::1" : "127.0.0.1");  listener.mutable_address()->mutable_socket_address()->set_port_value(      backends_[0]->port());  listener.add_filter_chains()->add_filters()->mutable_typed_config()->PackFrom(      HttpConnectionManager());  balancers_[0]->ads_service()->SetLdsResource(listener);  WaitForBackend(0);  // Set a different listening address in the LDS update  listener.mutable_address()->mutable_socket_address()->set_address(      "192.168.1.1");  balancers_[0]->ads_service()->SetLdsResource(listener);  backends_[0]->notifier()->WaitOnServingStatusChange(      absl::StrCat(ipv6_only_ ? "[::1]:" : "127.0.0.1:", backends_[0]->port()),      grpc::StatusCode::FAILED_PRECONDITION);}TEST_P(XdsEnabledServerTest, UseOriginalDstNotSupported) {  Listener listener;  listener.set_name(      absl::StrCat("grpc/server?xds.resource.listening_address=",                   ipv6_only_ ? "[::1]:" : "127.0.0.1:", backends_[0]->port()));  balancers_[0]->ads_service()->SetLdsResource(listener);  listener.mutable_address()->mutable_socket_address()->set_address(      ipv6_only_ ? "::1" : "127.0.0.1");  listener.mutable_address()->mutable_socket_address()->set_port_value(      backends_[0]->port());  listener.add_filter_chains()->add_filters()->mutable_typed_config()->PackFrom(      HttpConnectionManager());  listener.mutable_use_original_dst()->set_value(true);  balancers_[0]->ads_service()->SetLdsResource(listener);  do {    CheckRpcSendFailure();  } while (balancers_[0]->ads_service()->lds_response_state().state ==           AdsServiceImpl::ResponseState::SENT);  const auto response_state =      balancers_[0]->ads_service()->lds_response_state();  EXPECT_EQ(response_state.state, AdsServiceImpl::ResponseState::NACKED);  EXPECT_THAT(      response_state.error_message,      ::testing::HasSubstr("Field \'use_original_dst\' is not supported."));}class XdsServerSecurityTest : public XdsEnd2endTest { protected:  XdsServerSecurityTest()      : XdsEnd2endTest(1, 1, 100, true /* use_xds_enabled_server */) {}  static void SetUpTestCase() {    gpr_setenv("GRPC_XDS_EXPERIMENTAL_SECURITY_SUPPORT", "true");    XdsEnd2endTest::SetUpTestCase();  }  static void TearDownTestCase() {    XdsEnd2endTest::TearDownTestCase();    gpr_unsetenv("GRPC_XDS_EXPERIMENTAL_SECURITY_SUPPORT");  }  void SetUp() override {    XdsEnd2endTest::SetUp();    root_cert_ = ReadFile(kCaCertPath);    bad_root_cert_ = ReadFile(kBadClientCertPath);    identity_pair_ = ReadTlsIdentityPair(kServerKeyPath, kServerCertPath);    bad_identity_pair_ =        ReadTlsIdentityPair(kBadClientKeyPath, kBadClientCertPath);    identity_pair_2_ = ReadTlsIdentityPair(kClientKeyPath, kClientCertPath);    server_authenticated_identity_ = {"*.test.google.fr",                                      "waterzooi.test.google.be",                                      "*.test.youtube.com", "192.168.1.3"};    server_authenticated_identity_2_ = {"testclient"};    client_authenticated_identity_ = {"*.test.google.fr",                                      "waterzooi.test.google.be",                                      "*.test.youtube.com", "192.168.1.3"};    AdsServiceImpl::EdsResourceArgs args({        {"locality0", GetBackendPorts(0, 1)},    });    balancers_[0]->ads_service()->SetEdsResource(        BuildEdsResource(args, DefaultEdsServiceName()));    SetNextResolution({});    SetNextResolutionForLbChannelAllBalancers();  }  void TearDown() override {    g_fake1_cert_data_map = nullptr;    g_fake2_cert_data_map = nullptr;    XdsEnd2endTest::TearDown();  }  void SetLdsUpdate(absl::string_view root_instance_name,                    absl::string_view root_certificate_name,                    absl::string_view identity_instance_name,                    absl::string_view identity_certificate_name,                    bool require_client_certificates) {    Listener listener;    listener.set_name(        absl::StrCat("grpc/server?xds.resource.listening_address=127.0.0.1:",                     backends_[0]->port()));    listener.mutable_address()->mutable_socket_address()->set_address(        "127.0.0.1");    listener.mutable_address()->mutable_socket_address()->set_port_value(        backends_[0]->port());    auto* filter_chain = listener.add_filter_chains();    filter_chain->add_filters()->mutable_typed_config()->PackFrom(        HttpConnectionManager());    if (!identity_instance_name.empty()) {      auto* transport_socket = filter_chain->mutable_transport_socket();      transport_socket->set_name("envoy.transport_sockets.tls");      DownstreamTlsContext downstream_tls_context;      downstream_tls_context.mutable_common_tls_context()          ->mutable_tls_certificate_certificate_provider_instance()          ->set_instance_name(std::string(identity_instance_name));      downstream_tls_context.mutable_common_tls_context()          ->mutable_tls_certificate_certificate_provider_instance()          ->set_certificate_name(std::string(identity_certificate_name));      if (!root_instance_name.empty()) {        downstream_tls_context.mutable_common_tls_context()            ->mutable_combined_validation_context()            ->mutable_validation_context_certificate_provider_instance()            ->set_instance_name(std::string(root_instance_name));        downstream_tls_context.mutable_common_tls_context()            ->mutable_combined_validation_context()            ->mutable_validation_context_certificate_provider_instance()            ->set_certificate_name(std::string(root_certificate_name));        downstream_tls_context.mutable_require_client_certificate()->set_value(            require_client_certificates);      }      transport_socket->mutable_typed_config()->PackFrom(          downstream_tls_context);    }    balancers_[0]->ads_service()->SetLdsResource(listener);    listener.set_name(        absl::StrCat("grpc/server?xds.resource.listening_address=[::1]:",                     backends_[0]->port()));    listener.mutable_address()->mutable_socket_address()->set_address("[::1]");    balancers_[0]->ads_service()->SetLdsResource(listener);  }  std::shared_ptr<grpc::Channel> CreateMtlsChannel() {    ChannelArguments args;    // Override target name for host name check    args.SetString(GRPC_SSL_TARGET_NAME_OVERRIDE_ARG,                   ipv6_only_ ? "::1" : "127.0.0.1");    args.SetInt(GRPC_ARG_USE_LOCAL_SUBCHANNEL_POOL, 1);    std::string uri = absl::StrCat(        ipv6_only_ ? "ipv6:[::1]:" : "ipv4:127.0.0.1:", backends_[0]->port());    // TODO(yashykt): Switch to using C++ API once b/173823806 is fixed.    grpc_tls_credentials_options* options =        grpc_tls_credentials_options_create();    grpc_tls_credentials_options_set_server_verification_option(        options, GRPC_TLS_SKIP_HOSTNAME_VERIFICATION);    grpc_tls_credentials_options_set_certificate_provider(        options,        grpc_core::MakeRefCounted<grpc_core::StaticDataCertificateProvider>(            ReadFile(kCaCertPath),            ReadTlsIdentityPair(kServerKeyPath, kServerCertPath))            .get());    grpc_tls_credentials_options_watch_root_certs(options);    grpc_tls_credentials_options_watch_identity_key_cert_pairs(options);    grpc_tls_server_authorization_check_config* check_config =        grpc_tls_server_authorization_check_config_create(            nullptr, ServerAuthCheckSchedule, nullptr, nullptr);    grpc_tls_credentials_options_set_server_authorization_check_config(        options, check_config);    auto channel_creds = std::make_shared<SecureChannelCredentials>(        grpc_tls_credentials_create(options));    grpc_tls_server_authorization_check_config_release(check_config);    return CreateCustomChannel(uri, channel_creds, args);  }  std::shared_ptr<grpc::Channel> CreateTlsChannel() {    ChannelArguments args;    // Override target name for host name check    args.SetString(GRPC_SSL_TARGET_NAME_OVERRIDE_ARG,                   ipv6_only_ ? "::1" : "127.0.0.1");    args.SetInt(GRPC_ARG_USE_LOCAL_SUBCHANNEL_POOL, 1);    std::string uri = absl::StrCat(        ipv6_only_ ? "ipv6:[::1]:" : "ipv4:127.0.0.1:", backends_[0]->port());    // TODO(yashykt): Switch to using C++ API once b/173823806 is fixed.    grpc_tls_credentials_options* options =        grpc_tls_credentials_options_create();    grpc_tls_credentials_options_set_server_verification_option(        options, GRPC_TLS_SKIP_HOSTNAME_VERIFICATION);    grpc_tls_credentials_options_set_certificate_provider(        options,        grpc_core::MakeRefCounted<grpc_core::StaticDataCertificateProvider>(            ReadFile(kCaCertPath),            ReadTlsIdentityPair(kServerKeyPath, kServerCertPath))            .get());    grpc_tls_credentials_options_watch_root_certs(options);    grpc_tls_server_authorization_check_config* check_config =        grpc_tls_server_authorization_check_config_create(            nullptr, ServerAuthCheckSchedule, nullptr, nullptr);    grpc_tls_credentials_options_set_server_authorization_check_config(        options, check_config);    auto channel_creds = std::make_shared<SecureChannelCredentials>(        grpc_tls_credentials_create(options));    grpc_tls_server_authorization_check_config_release(check_config);    return CreateCustomChannel(uri, channel_creds, args);  }  std::shared_ptr<grpc::Channel> CreateInsecureChannel() {    ChannelArguments args;    // Override target name for host name check    args.SetString(GRPC_SSL_TARGET_NAME_OVERRIDE_ARG,                   ipv6_only_ ? "::1" : "127.0.0.1");    args.SetInt(GRPC_ARG_USE_LOCAL_SUBCHANNEL_POOL, 1);    std::string uri = absl::StrCat(        ipv6_only_ ? "ipv6:[::1]:" : "ipv4:127.0.0.1:", backends_[0]->port());    return CreateCustomChannel(uri, InsecureChannelCredentials(), args);  }  void SendRpc(std::function<std::shared_ptr<grpc::Channel>()> channel_creator,               std::vector<std::string> expected_server_identity,               std::vector<std::string> expected_client_identity,               bool test_expects_failure = false) {    gpr_log(GPR_INFO, "Sending RPC");    int num_tries = 0;    constexpr int kRetryCount = 10;    for (; num_tries < kRetryCount; num_tries++) {      auto channel = channel_creator();      auto stub = grpc::testing::EchoTestService::NewStub(channel);      ClientContext context;      context.set_wait_for_ready(true);      context.set_deadline(grpc_timeout_milliseconds_to_deadline(2000));      EchoRequest request;      request.set_message(kRequestMessage);      EchoResponse response;      Status status = stub->Echo(&context, request, &response);      if (test_expects_failure) {        if (status.ok()) {          gpr_log(GPR_ERROR, "RPC succeeded. Failure expected. Trying again.");          continue;        }      } else {        if (!status.ok()) {          gpr_log(GPR_ERROR, "RPC failed. code=%d message=%s Trying again.",                  status.error_code(), status.error_message().c_str());          continue;        }        EXPECT_EQ(response.message(), kRequestMessage);        std::vector<std::string> peer_identity;        for (const auto& entry : context.auth_context()->GetPeerIdentity()) {          peer_identity.emplace_back(              std::string(entry.data(), entry.size()).c_str());        }        if (peer_identity != expected_server_identity) {          gpr_log(GPR_ERROR,                  "Expected server identity does not match. (actual) %s vs "                  "(expected) %s Trying again.",                  absl::StrJoin(peer_identity, ",").c_str(),                  absl::StrJoin(expected_server_identity, ",").c_str());          continue;        }        if (backends_[0]->backend_service()->last_peer_identity() !=            expected_client_identity) {          gpr_log(              GPR_ERROR,              "Expected client identity does not match. (actual) %s vs "              "(expected) %s Trying again.",              absl::StrJoin(                  backends_[0]->backend_service()->last_peer_identity(), ",")                  .c_str(),              absl::StrJoin(expected_client_identity, ",").c_str());          continue;        }      }      break;    }    EXPECT_LT(num_tries, kRetryCount);  }  std::string root_cert_;  std::string bad_root_cert_;  grpc_core::PemKeyCertPairList identity_pair_;  grpc_core::PemKeyCertPairList bad_identity_pair_;  grpc_core::PemKeyCertPairList identity_pair_2_;  std::vector<std::string> server_authenticated_identity_;  std::vector<std::string> server_authenticated_identity_2_;  std::vector<std::string> client_authenticated_identity_;};TEST_P(XdsServerSecurityTest, TlsConfigurationWithoutRootProviderInstance) {  Listener listener;  listener.set_name(      absl::StrCat("grpc/server?xds.resource.listening_address=",                   ipv6_only_ ? "[::1]:" : "127.0.0.1:", backends_[0]->port()));  balancers_[0]->ads_service()->SetLdsResource(listener);  auto* socket_address = listener.mutable_address()->mutable_socket_address();  socket_address->set_address(ipv6_only_ ? "::1" : "127.0.0.1");  socket_address->set_port_value(backends_[0]->port());  auto* filter_chain = listener.add_filter_chains();  filter_chain->add_filters()->mutable_typed_config()->PackFrom(      HttpConnectionManager());  auto* transport_socket = filter_chain->mutable_transport_socket();  transport_socket->set_name("envoy.transport_sockets.tls");  DownstreamTlsContext downstream_tls_context;  transport_socket->mutable_typed_config()->PackFrom(downstream_tls_context);  balancers_[0]->ads_service()->SetLdsResource(listener);  CheckRpcSendFailure(1, RpcOptions().set_wait_for_ready(true));  const auto response_state =      balancers_[0]->ads_service()->lds_response_state();  EXPECT_EQ(response_state.state, AdsServiceImpl::ResponseState::NACKED);  EXPECT_THAT(response_state.error_message,              ::testing::HasSubstr(                  "TLS configuration provided but no "                  "tls_certificate_certificate_provider_instance found."));}TEST_P(XdsServerSecurityTest, UnknownIdentityCertificateProvider) {  SetLdsUpdate("", "", "unknown", "", false);  SendRpc([this]() { return CreateTlsChannel(); }, {}, {},          true /* test_expects_failure */);}TEST_P(XdsServerSecurityTest, UnknownRootCertificateProvider) {  FakeCertificateProvider::CertDataMap fake1_cert_map = {      {"", {root_cert_, identity_pair_}}};  SetLdsUpdate("unknown", "", "fake_plugin1", "", false);  SendRpc([this]() { return CreateTlsChannel(); }, {}, {},          true /* test_expects_failure */);}TEST_P(XdsServerSecurityTest, TestMtls) {  FakeCertificateProvider::CertDataMap fake1_cert_map = {      {"", {root_cert_, identity_pair_}}};  g_fake1_cert_data_map = &fake1_cert_map;  SetLdsUpdate("fake_plugin1", "", "fake_plugin1", "", true);  SendRpc([this]() { return CreateMtlsChannel(); },          server_authenticated_identity_, client_authenticated_identity_);}TEST_P(XdsServerSecurityTest, TestMtlsWithRootPluginUpdate) {  FakeCertificateProvider::CertDataMap fake1_cert_map = {      {"", {root_cert_, identity_pair_}}};  g_fake1_cert_data_map = &fake1_cert_map;  FakeCertificateProvider::CertDataMap fake2_cert_map = {      {"", {bad_root_cert_, bad_identity_pair_}}};  g_fake2_cert_data_map = &fake2_cert_map;  SetLdsUpdate("fake_plugin1", "", "fake_plugin1", "", true);  SendRpc([this]() { return CreateMtlsChannel(); },          server_authenticated_identity_, client_authenticated_identity_);  SetLdsUpdate("fake_plugin2", "", "fake_plugin1", "", true);  SendRpc([this]() { return CreateMtlsChannel(); }, {}, {},          true /* test_expects_failure */);}TEST_P(XdsServerSecurityTest, TestMtlsWithIdentityPluginUpdate) {  FakeCertificateProvider::CertDataMap fake1_cert_map = {      {"", {root_cert_, identity_pair_}}};  g_fake1_cert_data_map = &fake1_cert_map;  FakeCertificateProvider::CertDataMap fake2_cert_map = {      {"", {root_cert_, identity_pair_2_}}};  g_fake2_cert_data_map = &fake2_cert_map;  SetLdsUpdate("fake_plugin1", "", "fake_plugin1", "", true);  SendRpc([this]() { return CreateMtlsChannel(); },          server_authenticated_identity_, client_authenticated_identity_);  SetLdsUpdate("fake_plugin1", "", "fake_plugin2", "", true);  SendRpc([this]() { return CreateMtlsChannel(); },          server_authenticated_identity_2_, client_authenticated_identity_);}TEST_P(XdsServerSecurityTest, TestMtlsWithBothPluginsUpdated) {  FakeCertificateProvider::CertDataMap fake1_cert_map = {      {"", {root_cert_, identity_pair_}}};  g_fake1_cert_data_map = &fake1_cert_map;  FakeCertificateProvider::CertDataMap fake2_cert_map = {      {"good", {root_cert_, identity_pair_2_}},      {"", {bad_root_cert_, bad_identity_pair_}}};  g_fake2_cert_data_map = &fake2_cert_map;  SetLdsUpdate("fake_plugin2", "", "fake_plugin2", "", true);  SendRpc([this]() { return CreateMtlsChannel(); }, {}, {},          true /* test_expects_failure */);  SetLdsUpdate("fake_plugin1", "", "fake_plugin1", "", true);  SendRpc([this]() { return CreateMtlsChannel(); },          server_authenticated_identity_, client_authenticated_identity_);  SetLdsUpdate("fake_plugin2", "good", "fake_plugin2", "good", true);  SendRpc([this]() { return CreateMtlsChannel(); },          server_authenticated_identity_2_, client_authenticated_identity_);}TEST_P(XdsServerSecurityTest, TestMtlsWithRootCertificateNameUpdate) {  FakeCertificateProvider::CertDataMap fake1_cert_map = {      {"", {root_cert_, identity_pair_}},      {"bad", {bad_root_cert_, bad_identity_pair_}}};  g_fake1_cert_data_map = &fake1_cert_map;  SetLdsUpdate("fake_plugin1", "", "fake_plugin1", "", true);  SendRpc([this]() { return CreateMtlsChannel(); },          server_authenticated_identity_, client_authenticated_identity_);  SetLdsUpdate("fake_plugin1", "bad", "fake_plugin1", "", true);  SendRpc([this]() { return CreateMtlsChannel(); }, {}, {},          true /* test_expects_failure */);}TEST_P(XdsServerSecurityTest, TestMtlsWithIdentityCertificateNameUpdate) {  FakeCertificateProvider::CertDataMap fake1_cert_map = {      {"", {root_cert_, identity_pair_}},      {"good", {root_cert_, identity_pair_2_}}};  g_fake1_cert_data_map = &fake1_cert_map;  SetLdsUpdate("fake_plugin1", "", "fake_plugin1", "", true);  SendRpc([this]() { return CreateMtlsChannel(); },          server_authenticated_identity_, client_authenticated_identity_);  SetLdsUpdate("fake_plugin1", "", "fake_plugin1", "good", true);  SendRpc([this]() { return CreateMtlsChannel(); },          server_authenticated_identity_2_, client_authenticated_identity_);}TEST_P(XdsServerSecurityTest, TestMtlsWithBothCertificateNamesUpdated) {  FakeCertificateProvider::CertDataMap fake1_cert_map = {      {"", {root_cert_, identity_pair_}},      {"good", {root_cert_, identity_pair_2_}}};  g_fake1_cert_data_map = &fake1_cert_map;  SetLdsUpdate("fake_plugin1", "", "fake_plugin1", "", true);  SendRpc([this]() { return CreateMtlsChannel(); },          server_authenticated_identity_, client_authenticated_identity_);  SetLdsUpdate("fake_plugin1", "good", "fake_plugin1", "good", true);  SendRpc([this]() { return CreateMtlsChannel(); },          server_authenticated_identity_2_, client_authenticated_identity_);}TEST_P(XdsServerSecurityTest, TestMtlsNotRequiringButProvidingClientCerts) {  FakeCertificateProvider::CertDataMap fake1_cert_map = {      {"", {root_cert_, identity_pair_}}};  g_fake1_cert_data_map = &fake1_cert_map;  SetLdsUpdate("fake_plugin1", "", "fake_plugin1", "", false);  SendRpc([this]() { return CreateMtlsChannel(); },          server_authenticated_identity_, client_authenticated_identity_);}TEST_P(XdsServerSecurityTest, TestMtlsNotRequiringAndNotProvidingClientCerts) {  FakeCertificateProvider::CertDataMap fake1_cert_map = {      {"", {root_cert_, identity_pair_}}};  g_fake1_cert_data_map = &fake1_cert_map;  SetLdsUpdate("fake_plugin1", "", "fake_plugin1", "", false);  SendRpc([this]() { return CreateTlsChannel(); },          server_authenticated_identity_, {});}TEST_P(XdsServerSecurityTest, TestTls) {  FakeCertificateProvider::CertDataMap fake1_cert_map = {      {"", {root_cert_, identity_pair_}}};  g_fake1_cert_data_map = &fake1_cert_map;  SetLdsUpdate("", "", "fake_plugin1", "", false);  SendRpc([this]() { return CreateTlsChannel(); },          server_authenticated_identity_, {});}TEST_P(XdsServerSecurityTest, TestTlsWithIdentityPluginUpdate) {  FakeCertificateProvider::CertDataMap fake1_cert_map = {      {"", {root_cert_, identity_pair_}}};  g_fake1_cert_data_map = &fake1_cert_map;  FakeCertificateProvider::CertDataMap fake2_cert_map = {      {"", {root_cert_, identity_pair_2_}}};  g_fake2_cert_data_map = &fake2_cert_map;  SetLdsUpdate("", "", "fake_plugin1", "", false);  SendRpc([this]() { return CreateTlsChannel(); },          server_authenticated_identity_, {});  SetLdsUpdate("", "", "fake_plugin2", "", false);  SendRpc([this]() { return CreateTlsChannel(); },          server_authenticated_identity_2_, {});}TEST_P(XdsServerSecurityTest, TestTlsWithIdentityCertificateNameUpdate) {  FakeCertificateProvider::CertDataMap fake1_cert_map = {      {"", {root_cert_, identity_pair_}},      {"good", {root_cert_, identity_pair_2_}}};  g_fake1_cert_data_map = &fake1_cert_map;  SetLdsUpdate("", "", "fake_plugin1", "", false);  SendRpc([this]() { return CreateTlsChannel(); },          server_authenticated_identity_, {});  SetLdsUpdate("", "", "fake_plugin1", "good", false);  SendRpc([this]() { return CreateTlsChannel(); },          server_authenticated_identity_2_, {});}TEST_P(XdsServerSecurityTest, TestFallback) {  FakeCertificateProvider::CertDataMap fake1_cert_map = {      {"", {root_cert_, identity_pair_}}};  g_fake1_cert_data_map = &fake1_cert_map;  SetLdsUpdate("", "", "", "", false);  SendRpc([this]() { return CreateInsecureChannel(); }, {}, {});}TEST_P(XdsServerSecurityTest, TestMtlsToTls) {  FakeCertificateProvider::CertDataMap fake1_cert_map = {      {"", {root_cert_, identity_pair_}}};  g_fake1_cert_data_map = &fake1_cert_map;  SetLdsUpdate("fake_plugin1", "", "fake_plugin1", "", true);  SendRpc([this]() { return CreateTlsChannel(); }, {}, {},          true /* test_expects_failure */);  SetLdsUpdate("", "", "fake_plugin1", "", false);  SendRpc([this]() { return CreateTlsChannel(); },          server_authenticated_identity_, {});}TEST_P(XdsServerSecurityTest, TestTlsToMtls) {  FakeCertificateProvider::CertDataMap fake1_cert_map = {      {"", {root_cert_, identity_pair_}}};  g_fake1_cert_data_map = &fake1_cert_map;  SetLdsUpdate("", "", "fake_plugin1", "", false);  SendRpc([this]() { return CreateTlsChannel(); },          server_authenticated_identity_, {});  SetLdsUpdate("fake_plugin1", "", "fake_plugin1", "", true);  SendRpc([this]() { return CreateTlsChannel(); }, {}, {},          true /* test_expects_failure */);}TEST_P(XdsServerSecurityTest, TestMtlsToFallback) {  FakeCertificateProvider::CertDataMap fake1_cert_map = {      {"", {root_cert_, identity_pair_}}};  g_fake1_cert_data_map = &fake1_cert_map;  SetLdsUpdate("fake_plugin1", "", "fake_plugin1", "", false);  SendRpc([this]() { return CreateMtlsChannel(); },          server_authenticated_identity_, client_authenticated_identity_);  SetLdsUpdate("", "", "", "", false);  SendRpc([this]() { return CreateInsecureChannel(); }, {}, {});}TEST_P(XdsServerSecurityTest, TestFallbackToMtls) {  FakeCertificateProvider::CertDataMap fake1_cert_map = {      {"", {root_cert_, identity_pair_}}};  g_fake1_cert_data_map = &fake1_cert_map;  SetLdsUpdate("", "", "", "", false);  SendRpc([this]() { return CreateInsecureChannel(); }, {}, {});  SetLdsUpdate("fake_plugin1", "", "fake_plugin1", "", true);  SendRpc([this]() { return CreateMtlsChannel(); },          server_authenticated_identity_, client_authenticated_identity_);}TEST_P(XdsServerSecurityTest, TestTlsToFallback) {  FakeCertificateProvider::CertDataMap fake1_cert_map = {      {"", {root_cert_, identity_pair_}}};  g_fake1_cert_data_map = &fake1_cert_map;  SetLdsUpdate("", "", "fake_plugin1", "", false);  SendRpc([this]() { return CreateTlsChannel(); },          server_authenticated_identity_, {});  SetLdsUpdate("", "", "", "", false);  SendRpc([this]() { return CreateInsecureChannel(); }, {}, {});}TEST_P(XdsServerSecurityTest, TestFallbackToTls) {  FakeCertificateProvider::CertDataMap fake1_cert_map = {      {"", {root_cert_, identity_pair_}}};  g_fake1_cert_data_map = &fake1_cert_map;  SetLdsUpdate("", "", "", "", false);  SendRpc([this]() { return CreateInsecureChannel(); }, {}, {});  SetLdsUpdate("", "", "fake_plugin1", "", false);  SendRpc([this]() { return CreateTlsChannel(); },          server_authenticated_identity_, {});}class XdsEnabledServerStatusNotificationTest : public XdsServerSecurityTest { protected:  void SetValidLdsUpdate() { SetLdsUpdate("", "", "", "", false); }  void SetInvalidLdsUpdate() {    Listener listener;    listener.set_name(absl::StrCat(        "grpc/server?xds.resource.listening_address=",        ipv6_only_ ? "[::1]:" : "127.0.0.1:", backends_[0]->port()));    auto* socket_address = listener.mutable_address()->mutable_socket_address();    socket_address->set_address(ipv6_only_ ? "::1" : "127.0.0.1");    socket_address->set_port_value(backends_[0]->port());    auto* filter_chain = listener.add_filter_chains();    filter_chain->add_filters()->mutable_typed_config()->PackFrom(        HttpConnectionManager());    auto* transport_socket = filter_chain->mutable_transport_socket();    transport_socket->set_name("envoy.transport_sockets.tls");    DownstreamTlsContext downstream_tls_context;    downstream_tls_context.mutable_common_tls_context()        ->mutable_tls_certificate_certificate_provider_instance()        ->set_instance_name("unknown");    transport_socket->mutable_typed_config()->PackFrom(downstream_tls_context);    balancers_[0]->ads_service()->SetLdsResource(listener);  }  void UnsetLdsUpdate() {    balancers_[0]->ads_service()->UnsetResource(        kLdsTypeUrl, absl::StrCat("grpc/server?xds.resource.listening_address=",                                  ipv6_only_ ? "[::1]:" : "127.0.0.1:",                                  backends_[0]->port()));  }};TEST_P(XdsEnabledServerStatusNotificationTest, ServingStatus) {  SetValidLdsUpdate();  backends_[0]->notifier()->WaitOnServingStatusChange(      absl::StrCat(ipv6_only_ ? "[::1]:" : "127.0.0.1:", backends_[0]->port()),      grpc::StatusCode::OK);  SendRpc([this]() { return CreateInsecureChannel(); }, {}, {});}TEST_P(XdsEnabledServerStatusNotificationTest, NotServingStatus) {  SetInvalidLdsUpdate();  backends_[0]->notifier()->WaitOnServingStatusChange(      absl::StrCat(ipv6_only_ ? "[::1]:" : "127.0.0.1:", backends_[0]->port()),      grpc::StatusCode::UNAVAILABLE);  SendRpc([this]() { return CreateInsecureChannel(); }, {}, {},          true /* test_expects_failure */);}TEST_P(XdsEnabledServerStatusNotificationTest, ErrorUpdateWhenAlreadyServing) {  SetValidLdsUpdate();  backends_[0]->notifier()->WaitOnServingStatusChange(      absl::StrCat(ipv6_only_ ? "[::1]:" : "127.0.0.1:", backends_[0]->port()),      grpc::StatusCode::OK);  SendRpc([this]() { return CreateInsecureChannel(); }, {}, {});  // Invalid update does not lead to a change in the serving status.  SetInvalidLdsUpdate();  do {    SendRpc([this]() { return CreateInsecureChannel(); }, {}, {});  } while (balancers_[0]->ads_service()->lds_response_state().state ==           AdsServiceImpl::ResponseState::SENT);  backends_[0]->notifier()->WaitOnServingStatusChange(      absl::StrCat(ipv6_only_ ? "[::1]:" : "127.0.0.1:", backends_[0]->port()),      grpc::StatusCode::OK);  SendRpc([this]() { return CreateInsecureChannel(); }, {}, {});}TEST_P(XdsEnabledServerStatusNotificationTest,       NotServingStatusToServingStatusTransition) {  SetInvalidLdsUpdate();  backends_[0]->notifier()->WaitOnServingStatusChange(      absl::StrCat(ipv6_only_ ? "[::1]:" : "127.0.0.1:", backends_[0]->port()),      grpc::StatusCode::UNAVAILABLE);  SendRpc([this]() { return CreateInsecureChannel(); }, {}, {},          true /* test_expects_failure */);  // Send a valid LDS update to change to serving status  SetValidLdsUpdate();  backends_[0]->notifier()->WaitOnServingStatusChange(      absl::StrCat(ipv6_only_ ? "[::1]:" : "127.0.0.1:", backends_[0]->port()),      grpc::StatusCode::OK);  SendRpc([this]() { return CreateInsecureChannel(); }, {}, {});}// This test verifies that the resource getting deleted when already serving// results in future connections being dropped.TEST_P(XdsEnabledServerStatusNotificationTest,       ServingStatusToNonServingStatusTransition) {  SetValidLdsUpdate();  backends_[0]->notifier()->WaitOnServingStatusChange(      absl::StrCat(ipv6_only_ ? "[::1]:" : "127.0.0.1:", backends_[0]->port()),      grpc::StatusCode::OK);  SendRpc([this]() { return CreateInsecureChannel(); }, {}, {});  // Deleting the resource should result in a non-serving status.  UnsetLdsUpdate();  backends_[0]->notifier()->WaitOnServingStatusChange(      absl::StrCat(ipv6_only_ ? "[::1]:" : "127.0.0.1:", backends_[0]->port()),      grpc::StatusCode::NOT_FOUND);  SendRpc([this]() { return CreateInsecureChannel(); }, {}, {},          true /* test_expects_failure */);}TEST_P(XdsEnabledServerStatusNotificationTest, RepeatedServingStatusChanges) {  for (int i = 0; i < 5; i++) {    // Send a valid LDS update to get the server to start listening    SetValidLdsUpdate();    backends_[0]->notifier()->WaitOnServingStatusChange(        absl::StrCat(ipv6_only_ ? "[::1]:" : "127.0.0.1:",                     backends_[0]->port()),        grpc::StatusCode::OK);    SendRpc([this]() { return CreateInsecureChannel(); }, {}, {});    // Deleting the resource will make the server start rejecting connections    UnsetLdsUpdate();    backends_[0]->notifier()->WaitOnServingStatusChange(        absl::StrCat(ipv6_only_ ? "[::1]:" : "127.0.0.1:",                     backends_[0]->port()),        grpc::StatusCode::NOT_FOUND);    SendRpc([this]() { return CreateInsecureChannel(); }, {}, {},            true /* test_expects_failure */);  }}TEST_P(XdsEnabledServerStatusNotificationTest, ExistingRpcsOnResourceDeletion) {  // Send a valid LDS update to get the server to start listening  SetValidLdsUpdate();  backends_[0]->notifier()->WaitOnServingStatusChange(      absl::StrCat(ipv6_only_ ? "[::1]:" : "127.0.0.1:", backends_[0]->port()),      grpc::StatusCode::OK);  constexpr int kNumChannels = 10;  struct StreamingRpc {    std::shared_ptr<Channel> channel;    std::unique_ptr<grpc::testing::EchoTestService::Stub> stub;    ClientContext context;    std::unique_ptr<ClientWriter<EchoRequest>> writer;  } streaming_rpcs[kNumChannels];  EchoRequest request;  EchoResponse response;  request.set_message("Hello");  for (int i = 0; i < kNumChannels; i++) {    streaming_rpcs[i].channel = CreateInsecureChannel();    streaming_rpcs[i].stub =        grpc::testing::EchoTestService::NewStub(streaming_rpcs[i].channel);    streaming_rpcs[i].context.set_wait_for_ready(true);    streaming_rpcs[i].writer = streaming_rpcs[i].stub->RequestStream(        &streaming_rpcs[i].context, &response);    EXPECT_TRUE(streaming_rpcs[i].writer->Write(request));  }  // Deleting the resource will make the server start rejecting connections  UnsetLdsUpdate();  backends_[0]->notifier()->WaitOnServingStatusChange(      absl::StrCat(ipv6_only_ ? "[::1]:" : "127.0.0.1:", backends_[0]->port()),      grpc::StatusCode::NOT_FOUND);  SendRpc([this]() { return CreateInsecureChannel(); }, {}, {},          true /* test_expects_failure */);  for (int i = 0; i < kNumChannels; i++) {    EXPECT_TRUE(streaming_rpcs[i].writer->Write(request));    EXPECT_TRUE(streaming_rpcs[i].writer->WritesDone());    EXPECT_TRUE(streaming_rpcs[i].writer->Finish().ok());    // New RPCs on the existing channels should fail.    ClientContext new_context;    new_context.set_deadline(grpc_timeout_milliseconds_to_deadline(1000));    EXPECT_FALSE(        streaming_rpcs[i].stub->Echo(&new_context, request, &response).ok());  }}using EdsTest = BasicTest;// Tests that EDS client should send a NACK if the EDS update contains// sparse priorities.TEST_P(EdsTest, NacksSparsePriorityList) {  SetNextResolution({});  SetNextResolutionForLbChannelAllBalancers();  AdsServiceImpl::EdsResourceArgs args({      {"locality0", GetBackendPorts(), kDefaultLocalityWeight, 1},  });  balancers_[0]->ads_service()->SetEdsResource(BuildEdsResource(args));  CheckRpcSendFailure();  const auto response_state =      balancers_[0]->ads_service()->eds_response_state();  EXPECT_EQ(response_state.state, AdsServiceImpl::ResponseState::NACKED);  EXPECT_THAT(response_state.error_message,              ::testing::HasSubstr("sparse priority list"));}// In most of our tests, we use different names for different resource// types, to make sure that there are no cut-and-paste errors in the code// that cause us to look at data for the wrong resource type.  So we add// this test to make sure that the EDS resource name defaults to the// cluster name if not specified in the CDS resource.TEST_P(EdsTest, EdsServiceNameDefaultsToClusterName) {  AdsServiceImpl::EdsResourceArgs args({      {"locality0", GetBackendPorts()},  });  balancers_[0]->ads_service()->SetEdsResource(      BuildEdsResource(args, kDefaultClusterName));  Cluster cluster = default_cluster_;  cluster.mutable_eds_cluster_config()->clear_service_name();  balancers_[0]->ads_service()->SetCdsResource(cluster);  SetNextResolution({});  SetNextResolutionForLbChannelAllBalancers();  CheckRpcSendOk();}class TimeoutTest : public BasicTest { protected:  void SetUp() override {    xds_resource_does_not_exist_timeout_ms_ = 500;    BasicTest::SetUp();  }};// Tests that LDS client times out when no response received.TEST_P(TimeoutTest, Lds) {  balancers_[0]->ads_service()->SetResourceIgnore(kLdsTypeUrl);  SetNextResolution({});  SetNextResolutionForLbChannelAllBalancers();  CheckRpcSendFailure();}TEST_P(TimeoutTest, Rds) {  balancers_[0]->ads_service()->SetResourceIgnore(kRdsTypeUrl);  SetNextResolution({});  SetNextResolutionForLbChannelAllBalancers();  CheckRpcSendFailure();}// Tests that CDS client times out when no response received.TEST_P(TimeoutTest, Cds) {  balancers_[0]->ads_service()->SetResourceIgnore(kCdsTypeUrl);  SetNextResolution({});  SetNextResolutionForLbChannelAllBalancers();  CheckRpcSendFailure();}TEST_P(TimeoutTest, Eds) {  balancers_[0]->ads_service()->SetResourceIgnore(kEdsTypeUrl);  SetNextResolution({});  SetNextResolutionForLbChannelAllBalancers();  CheckRpcSendFailure();}using LocalityMapTest = BasicTest;// Tests that the localities in a locality map are picked according to their// weights.TEST_P(LocalityMapTest, WeightedRoundRobin) {  SetNextResolution({});  SetNextResolutionForLbChannelAllBalancers();  const size_t kNumRpcs = 5000;  const int kLocalityWeight0 = 2;  const int kLocalityWeight1 = 8;  const int kTotalLocalityWeight = kLocalityWeight0 + kLocalityWeight1;  const double kLocalityWeightRate0 =      static_cast<double>(kLocalityWeight0) / kTotalLocalityWeight;  const double kLocalityWeightRate1 =      static_cast<double>(kLocalityWeight1) / kTotalLocalityWeight;  // ADS response contains 2 localities, each of which contains 1 backend.  AdsServiceImpl::EdsResourceArgs args({      {"locality0", GetBackendPorts(0, 1), kLocalityWeight0},      {"locality1", GetBackendPorts(1, 2), kLocalityWeight1},  });  balancers_[0]->ads_service()->SetEdsResource(      BuildEdsResource(args, DefaultEdsServiceName()));  // Wait for both backends to be ready.  WaitForAllBackends(0, 2);  // Send kNumRpcs RPCs.  CheckRpcSendOk(kNumRpcs);  // The locality picking rates should be roughly equal to the expectation.  const double locality_picked_rate_0 =      static_cast<double>(backends_[0]->backend_service()->request_count()) /      kNumRpcs;  const double locality_picked_rate_1 =      static_cast<double>(backends_[1]->backend_service()->request_count()) /      kNumRpcs;  const double kErrorTolerance = 0.2;  EXPECT_THAT(locality_picked_rate_0,              ::testing::AllOf(                  ::testing::Ge(kLocalityWeightRate0 * (1 - kErrorTolerance)),                  ::testing::Le(kLocalityWeightRate0 * (1 + kErrorTolerance))));  EXPECT_THAT(locality_picked_rate_1,              ::testing::AllOf(                  ::testing::Ge(kLocalityWeightRate1 * (1 - kErrorTolerance)),                  ::testing::Le(kLocalityWeightRate1 * (1 + kErrorTolerance))));}// Tests that we correctly handle a locality containing no endpoints.TEST_P(LocalityMapTest, LocalityContainingNoEndpoints) {  SetNextResolution({});  SetNextResolutionForLbChannelAllBalancers();  const size_t kNumRpcs = 5000;  // EDS response contains 2 localities, one with no endpoints.  AdsServiceImpl::EdsResourceArgs args({      {"locality0", GetBackendPorts()},      {"locality1", {}},  });  balancers_[0]->ads_service()->SetEdsResource(      BuildEdsResource(args, DefaultEdsServiceName()));  // Wait for both backends to be ready.  WaitForAllBackends();  // Send kNumRpcs RPCs.  CheckRpcSendOk(kNumRpcs);  // All traffic should go to the reachable locality.  EXPECT_EQ(backends_[0]->backend_service()->request_count(),            kNumRpcs / backends_.size());  EXPECT_EQ(backends_[1]->backend_service()->request_count(),            kNumRpcs / backends_.size());  EXPECT_EQ(backends_[2]->backend_service()->request_count(),            kNumRpcs / backends_.size());  EXPECT_EQ(backends_[3]->backend_service()->request_count(),            kNumRpcs / backends_.size());}// EDS update with no localities.TEST_P(LocalityMapTest, NoLocalities) {  SetNextResolution({});  SetNextResolutionForLbChannelAllBalancers();  balancers_[0]->ads_service()->SetEdsResource(      BuildEdsResource({}, DefaultEdsServiceName()));  Status status = SendRpc();  EXPECT_FALSE(status.ok());  EXPECT_EQ(status.error_code(), StatusCode::UNAVAILABLE);}// Tests that the locality map can work properly even when it contains a large// number of localities.TEST_P(LocalityMapTest, StressTest) {  SetNextResolution({});  SetNextResolutionForLbChannelAllBalancers();  const size_t kNumLocalities = 100;  // The first ADS response contains kNumLocalities localities, each of which  // contains backend 0.  AdsServiceImpl::EdsResourceArgs args;  for (size_t i = 0; i < kNumLocalities; ++i) {    std::string name = absl::StrCat("locality", i);    AdsServiceImpl::EdsResourceArgs::Locality locality(name,                                                       {backends_[0]->port()});    args.locality_list.emplace_back(std::move(locality));  }  balancers_[0]->ads_service()->SetEdsResource(      BuildEdsResource(args, DefaultEdsServiceName()));  // The second ADS response contains 1 locality, which contains backend 1.  args = AdsServiceImpl::EdsResourceArgs({      {"locality0", GetBackendPorts(1, 2)},  });  std::thread delayed_resource_setter(      std::bind(&BasicTest::SetEdsResourceWithDelay, this, 0,                BuildEdsResource(args, DefaultEdsServiceName()), 60 * 1000));  // Wait until backend 0 is ready, before which kNumLocalities localities are  // received and handled by the xds policy.  WaitForBackend(0, /*reset_counters=*/false);  EXPECT_EQ(0U, backends_[1]->backend_service()->request_count());  // Wait until backend 1 is ready, before which kNumLocalities localities are  // removed by the xds policy.  WaitForBackend(1);  delayed_resource_setter.join();}// Tests that the localities in a locality map are picked correctly after update// (addition, modification, deletion).TEST_P(LocalityMapTest, UpdateMap) {  SetNextResolution({});  SetNextResolutionForLbChannelAllBalancers();  const size_t kNumRpcs = 3000;  // The locality weight for the first 3 localities.  const std::vector<int> kLocalityWeights0 = {2, 3, 4};  const double kTotalLocalityWeight0 =      std::accumulate(kLocalityWeights0.begin(), kLocalityWeights0.end(), 0);  std::vector<double> locality_weight_rate_0;  locality_weight_rate_0.reserve(kLocalityWeights0.size());  for (int weight : kLocalityWeights0) {    locality_weight_rate_0.push_back(weight / kTotalLocalityWeight0);  }  // Delete the first locality, keep the second locality, change the third  // locality's weight from 4 to 2, and add a new locality with weight 6.  const std::vector<int> kLocalityWeights1 = {3, 2, 6};  const double kTotalLocalityWeight1 =      std::accumulate(kLocalityWeights1.begin(), kLocalityWeights1.end(), 0);  std::vector<double> locality_weight_rate_1 = {      0 /* placeholder for locality 0 */};  for (int weight : kLocalityWeights1) {    locality_weight_rate_1.push_back(weight / kTotalLocalityWeight1);  }  AdsServiceImpl::EdsResourceArgs args({      {"locality0", GetBackendPorts(0, 1), 2},      {"locality1", GetBackendPorts(1, 2), 3},      {"locality2", GetBackendPorts(2, 3), 4},  });  balancers_[0]->ads_service()->SetEdsResource(      BuildEdsResource(args, DefaultEdsServiceName()));  // Wait for the first 3 backends to be ready.  WaitForAllBackends(0, 3);  gpr_log(GPR_INFO, "========= BEFORE FIRST BATCH ==========");  // Send kNumRpcs RPCs.  CheckRpcSendOk(kNumRpcs);  gpr_log(GPR_INFO, "========= DONE WITH FIRST BATCH ==========");  // The picking rates of the first 3 backends should be roughly equal to the  // expectation.  std::vector<double> locality_picked_rates;  for (size_t i = 0; i < 3; ++i) {    locality_picked_rates.push_back(        static_cast<double>(backends_[i]->backend_service()->request_count()) /        kNumRpcs);  }  const double kErrorTolerance = 0.2;  for (size_t i = 0; i < 3; ++i) {    gpr_log(GPR_INFO, "Locality %" PRIuPTR " rate %f", i,            locality_picked_rates[i]);    EXPECT_THAT(        locality_picked_rates[i],        ::testing::AllOf(            ::testing::Ge(locality_weight_rate_0[i] * (1 - kErrorTolerance)),            ::testing::Le(locality_weight_rate_0[i] * (1 + kErrorTolerance))));  }  args = AdsServiceImpl::EdsResourceArgs({      {"locality1", GetBackendPorts(1, 2), 3},      {"locality2", GetBackendPorts(2, 3), 2},      {"locality3", GetBackendPorts(3, 4), 6},  });  balancers_[0]->ads_service()->SetEdsResource(      BuildEdsResource(args, DefaultEdsServiceName()));  // Backend 3 hasn't received any request.  EXPECT_EQ(0U, backends_[3]->backend_service()->request_count());  // Wait until the locality update has been processed, as signaled by backend 3  // receiving a request.  WaitForAllBackends(3, 4);  gpr_log(GPR_INFO, "========= BEFORE SECOND BATCH ==========");  // Send kNumRpcs RPCs.  CheckRpcSendOk(kNumRpcs);  gpr_log(GPR_INFO, "========= DONE WITH SECOND BATCH ==========");  // Backend 0 no longer receives any request.  EXPECT_EQ(0U, backends_[0]->backend_service()->request_count());  // The picking rates of the last 3 backends should be roughly equal to the  // expectation.  locality_picked_rates = {0 /* placeholder for backend 0 */};  for (size_t i = 1; i < 4; ++i) {    locality_picked_rates.push_back(        static_cast<double>(backends_[i]->backend_service()->request_count()) /        kNumRpcs);  }  for (size_t i = 1; i < 4; ++i) {    gpr_log(GPR_INFO, "Locality %" PRIuPTR " rate %f", i,            locality_picked_rates[i]);    EXPECT_THAT(        locality_picked_rates[i],        ::testing::AllOf(            ::testing::Ge(locality_weight_rate_1[i] * (1 - kErrorTolerance)),            ::testing::Le(locality_weight_rate_1[i] * (1 + kErrorTolerance))));  }}// Tests that we don't fail RPCs when replacing all of the localities in// a given priority.TEST_P(LocalityMapTest, ReplaceAllLocalitiesInPriority) {  SetNextResolution({});  SetNextResolutionForLbChannelAllBalancers();  AdsServiceImpl::EdsResourceArgs args({      {"locality0", GetBackendPorts(0, 1)},  });  balancers_[0]->ads_service()->SetEdsResource(      BuildEdsResource(args, DefaultEdsServiceName()));  args = AdsServiceImpl::EdsResourceArgs({      {"locality1", GetBackendPorts(1, 2)},  });  std::thread delayed_resource_setter(      std::bind(&BasicTest::SetEdsResourceWithDelay, this, 0,                BuildEdsResource(args, DefaultEdsServiceName()), 5000));  // Wait for the first backend to be ready.  WaitForBackend(0);  // Keep sending RPCs until we switch over to backend 1, which tells us  // that we received the update.  No RPCs should fail during this  // transition.  WaitForBackend(1, /*reset_counters=*/true, /*require_success=*/true);  delayed_resource_setter.join();}class FailoverTest : public BasicTest { public:  void SetUp() override {    BasicTest::SetUp();    ResetStub(500);  }};// Localities with the highest priority are used when multiple priority exist.TEST_P(FailoverTest, ChooseHighestPriority) {  SetNextResolution({});  SetNextResolutionForLbChannelAllBalancers();  AdsServiceImpl::EdsResourceArgs args({      {"locality0", GetBackendPorts(0, 1), kDefaultLocalityWeight, 1},      {"locality1", GetBackendPorts(1, 2), kDefaultLocalityWeight, 2},      {"locality2", GetBackendPorts(2, 3), kDefaultLocalityWeight, 3},      {"locality3", GetBackendPorts(3, 4), kDefaultLocalityWeight, 0},  });  balancers_[0]->ads_service()->SetEdsResource(      BuildEdsResource(args, DefaultEdsServiceName()));  WaitForBackend(3, false);  for (size_t i = 0; i < 3; ++i) {    EXPECT_EQ(0U, backends_[i]->backend_service()->request_count());  }}// Does not choose priority with no endpoints.TEST_P(FailoverTest, DoesNotUsePriorityWithNoEndpoints) {  SetNextResolution({});  SetNextResolutionForLbChannelAllBalancers();  AdsServiceImpl::EdsResourceArgs args({      {"locality0", GetBackendPorts(0, 1), kDefaultLocalityWeight, 1},      {"locality1", GetBackendPorts(1, 2), kDefaultLocalityWeight, 2},      {"locality2", GetBackendPorts(2, 3), kDefaultLocalityWeight, 3},      {"locality3", {}, kDefaultLocalityWeight, 0},  });  balancers_[0]->ads_service()->SetEdsResource(      BuildEdsResource(args, DefaultEdsServiceName()));  WaitForBackend(0, false);  for (size_t i = 1; i < 3; ++i) {    EXPECT_EQ(0U, backends_[i]->backend_service()->request_count());  }}// Does not choose locality with no endpoints.TEST_P(FailoverTest, DoesNotUseLocalityWithNoEndpoints) {  SetNextResolution({});  SetNextResolutionForLbChannelAllBalancers();  AdsServiceImpl::EdsResourceArgs args({      {"locality0", {}, kDefaultLocalityWeight, 0},      {"locality1", GetBackendPorts(), kDefaultLocalityWeight, 0},  });  balancers_[0]->ads_service()->SetEdsResource(      BuildEdsResource(args, DefaultEdsServiceName()));  // Wait for all backends to be used.  std::tuple<int, int, int> counts = WaitForAllBackends();  // Make sure no RPCs failed in the transition.  EXPECT_EQ(0, std::get<1>(counts));}// If the higher priority localities are not reachable, failover to the highest// priority among the rest.TEST_P(FailoverTest, Failover) {  SetNextResolution({});  SetNextResolutionForLbChannelAllBalancers();  AdsServiceImpl::EdsResourceArgs args({      {"locality0", GetBackendPorts(0, 1), kDefaultLocalityWeight, 1},      {"locality1", GetBackendPorts(1, 2), kDefaultLocalityWeight, 2},      {"locality2", GetBackendPorts(2, 3), kDefaultLocalityWeight, 3},      {"locality3", GetBackendPorts(3, 4), kDefaultLocalityWeight, 0},  });  ShutdownBackend(3);  ShutdownBackend(0);  balancers_[0]->ads_service()->SetEdsResource(      BuildEdsResource(args, DefaultEdsServiceName()));  WaitForBackend(1, false);  for (size_t i = 0; i < 4; ++i) {    if (i == 1) continue;    EXPECT_EQ(0U, backends_[i]->backend_service()->request_count());  }}// If a locality with higher priority than the current one becomes ready,// switch to it.TEST_P(FailoverTest, SwitchBackToHigherPriority) {  SetNextResolution({});  SetNextResolutionForLbChannelAllBalancers();  const size_t kNumRpcs = 100;  AdsServiceImpl::EdsResourceArgs args({      {"locality0", GetBackendPorts(0, 1), kDefaultLocalityWeight, 1},      {"locality1", GetBackendPorts(1, 2), kDefaultLocalityWeight, 2},      {"locality2", GetBackendPorts(2, 3), kDefaultLocalityWeight, 3},      {"locality3", GetBackendPorts(3, 4), kDefaultLocalityWeight, 0},  });  balancers_[0]->ads_service()->SetEdsResource(      BuildEdsResource(args, DefaultEdsServiceName()));  WaitForBackend(3);  ShutdownBackend(3);  ShutdownBackend(0);  WaitForBackend(1, false);  for (size_t i = 0; i < 4; ++i) {    if (i == 1) continue;    EXPECT_EQ(0U, backends_[i]->backend_service()->request_count());  }  StartBackend(0);  WaitForBackend(0);  CheckRpcSendOk(kNumRpcs);  EXPECT_EQ(kNumRpcs, backends_[0]->backend_service()->request_count());}// The first update only contains unavailable priorities. The second update// contains available priorities.TEST_P(FailoverTest, UpdateInitialUnavailable) {  SetNextResolution({});  SetNextResolutionForLbChannelAllBalancers();  AdsServiceImpl::EdsResourceArgs args({      {"locality0", GetBackendPorts(0, 1), kDefaultLocalityWeight, 0},      {"locality1", GetBackendPorts(1, 2), kDefaultLocalityWeight, 1},  });  balancers_[0]->ads_service()->SetEdsResource(      BuildEdsResource(args, DefaultEdsServiceName()));  args = AdsServiceImpl::EdsResourceArgs({      {"locality0", GetBackendPorts(0, 1), kDefaultLocalityWeight, 0},      {"locality1", GetBackendPorts(1, 2), kDefaultLocalityWeight, 1},      {"locality2", GetBackendPorts(2, 3), kDefaultLocalityWeight, 2},      {"locality3", GetBackendPorts(3, 4), kDefaultLocalityWeight, 3},  });  ShutdownBackend(0);  ShutdownBackend(1);  std::thread delayed_resource_setter(      std::bind(&BasicTest::SetEdsResourceWithDelay, this, 0,                BuildEdsResource(args, DefaultEdsServiceName()), 1000));  gpr_timespec deadline = gpr_time_add(gpr_now(GPR_CLOCK_REALTIME),                                       gpr_time_from_millis(500, GPR_TIMESPAN));  // Send 0.5 second worth of RPCs.  do {    CheckRpcSendFailure();  } while (gpr_time_cmp(gpr_now(GPR_CLOCK_REALTIME), deadline) < 0);  WaitForBackend(2, false);  for (size_t i = 0; i < 4; ++i) {    if (i == 2) continue;    EXPECT_EQ(0U, backends_[i]->backend_service()->request_count());  }  delayed_resource_setter.join();}// Tests that after the localities' priorities are updated, we still choose the// highest READY priority with the updated localities.TEST_P(FailoverTest, UpdatePriority) {  SetNextResolution({});  SetNextResolutionForLbChannelAllBalancers();  const size_t kNumRpcs = 100;  AdsServiceImpl::EdsResourceArgs args({      {"locality0", GetBackendPorts(0, 1), kDefaultLocalityWeight, 1},      {"locality1", GetBackendPorts(1, 2), kDefaultLocalityWeight, 2},      {"locality2", GetBackendPorts(2, 3), kDefaultLocalityWeight, 3},      {"locality3", GetBackendPorts(3, 4), kDefaultLocalityWeight, 0},  });  balancers_[0]->ads_service()->SetEdsResource(      BuildEdsResource(args, DefaultEdsServiceName()));  args = AdsServiceImpl::EdsResourceArgs({      {"locality0", GetBackendPorts(0, 1), kDefaultLocalityWeight, 2},      {"locality1", GetBackendPorts(1, 2), kDefaultLocalityWeight, 0},      {"locality2", GetBackendPorts(2, 3), kDefaultLocalityWeight, 1},      {"locality3", GetBackendPorts(3, 4), kDefaultLocalityWeight, 3},  });  std::thread delayed_resource_setter(      std::bind(&BasicTest::SetEdsResourceWithDelay, this, 0,                BuildEdsResource(args, DefaultEdsServiceName()), 1000));  WaitForBackend(3, false);  for (size_t i = 0; i < 3; ++i) {    EXPECT_EQ(0U, backends_[i]->backend_service()->request_count());  }  WaitForBackend(1);  CheckRpcSendOk(kNumRpcs);  EXPECT_EQ(kNumRpcs, backends_[1]->backend_service()->request_count());  delayed_resource_setter.join();}// Moves all localities in the current priority to a higher priority.TEST_P(FailoverTest, MoveAllLocalitiesInCurrentPriorityToHigherPriority) {  SetNextResolution({});  SetNextResolutionForLbChannelAllBalancers();  // First update:  // - Priority 0 is locality 0, containing backend 0, which is down.  // - Priority 1 is locality 1, containing backends 1 and 2, which are up.  ShutdownBackend(0);  AdsServiceImpl::EdsResourceArgs args({      {"locality0", GetBackendPorts(0, 1), kDefaultLocalityWeight, 0},      {"locality1", GetBackendPorts(1, 3), kDefaultLocalityWeight, 1},  });  balancers_[0]->ads_service()->SetEdsResource(      BuildEdsResource(args, DefaultEdsServiceName()));  // Second update:  // - Priority 0 contains both localities 0 and 1.  // - Priority 1 is not present.  // - We add backend 3 to locality 1, just so we have a way to know  //   when the update has been seen by the client.  args = AdsServiceImpl::EdsResourceArgs({      {"locality0", GetBackendPorts(0, 1), kDefaultLocalityWeight, 0},      {"locality1", GetBackendPorts(1, 4), kDefaultLocalityWeight, 0},  });  std::thread delayed_resource_setter(      std::bind(&BasicTest::SetEdsResourceWithDelay, this, 0,                BuildEdsResource(args, DefaultEdsServiceName()), 1000));  // When we get the first update, all backends in priority 0 are down,  // so we will create priority 1.  Backends 1 and 2 should have traffic,  // but backend 3 should not.  WaitForAllBackends(1, 3, false);  EXPECT_EQ(0UL, backends_[3]->backend_service()->request_count());  // When backend 3 gets traffic, we know the second update has been seen.  WaitForBackend(3);  // The ADS service of balancer 0 got at least 1 response.  EXPECT_GT(balancers_[0]->ads_service()->eds_response_state().state,            AdsServiceImpl::ResponseState::NOT_SENT);  delayed_resource_setter.join();}using DropTest = BasicTest;// Tests that RPCs are dropped according to the drop config.TEST_P(DropTest, Vanilla) {  SetNextResolution({});  SetNextResolutionForLbChannelAllBalancers();  const size_t kNumRpcs = 5000;  const uint32_t kDropPerMillionForLb = 100000;  const uint32_t kDropPerMillionForThrottle = 200000;  const double kDropRateForLb = kDropPerMillionForLb / 1000000.0;  const double kDropRateForThrottle = kDropPerMillionForThrottle / 1000000.0;  const double KDropRateForLbAndThrottle =      kDropRateForLb + (1 - kDropRateForLb) * kDropRateForThrottle;  // The ADS response contains two drop categories.  AdsServiceImpl::EdsResourceArgs args({      {"locality0", GetBackendPorts()},  });  args.drop_categories = {{kLbDropType, kDropPerMillionForLb},                          {kThrottleDropType, kDropPerMillionForThrottle}};  balancers_[0]->ads_service()->SetEdsResource(      BuildEdsResource(args, DefaultEdsServiceName()));  WaitForAllBackends();  // Send kNumRpcs RPCs and count the drops.  size_t num_drops = 0;  for (size_t i = 0; i < kNumRpcs; ++i) {    EchoResponse response;    const Status status = SendRpc(RpcOptions(), &response);    if (!status.ok() &&        status.error_message() == "Call dropped by load balancing policy") {      ++num_drops;    } else {      EXPECT_TRUE(status.ok()) << "code=" << status.error_code()                               << " message=" << status.error_message();      EXPECT_EQ(response.message(), kRequestMessage);    }  }  // The drop rate should be roughly equal to the expectation.  const double seen_drop_rate = static_cast<double>(num_drops) / kNumRpcs;  const double kErrorTolerance = 0.2;  EXPECT_THAT(      seen_drop_rate,      ::testing::AllOf(          ::testing::Ge(KDropRateForLbAndThrottle * (1 - kErrorTolerance)),          ::testing::Le(KDropRateForLbAndThrottle * (1 + kErrorTolerance))));}// Tests that drop config is converted correctly from per hundred.TEST_P(DropTest, DropPerHundred) {  SetNextResolution({});  SetNextResolutionForLbChannelAllBalancers();  const size_t kNumRpcs = 5000;  const uint32_t kDropPerHundredForLb = 10;  const double kDropRateForLb = kDropPerHundredForLb / 100.0;  // The ADS response contains one drop category.  AdsServiceImpl::EdsResourceArgs args({      {"locality0", GetBackendPorts()},  });  args.drop_categories = {{kLbDropType, kDropPerHundredForLb}};  args.drop_denominator = FractionalPercent::HUNDRED;  balancers_[0]->ads_service()->SetEdsResource(      BuildEdsResource(args, DefaultEdsServiceName()));  WaitForAllBackends();  // Send kNumRpcs RPCs and count the drops.  size_t num_drops = 0;  for (size_t i = 0; i < kNumRpcs; ++i) {    EchoResponse response;    const Status status = SendRpc(RpcOptions(), &response);    if (!status.ok() &&        status.error_message() == "Call dropped by load balancing policy") {      ++num_drops;    } else {      EXPECT_TRUE(status.ok()) << "code=" << status.error_code()                               << " message=" << status.error_message();      EXPECT_EQ(response.message(), kRequestMessage);    }  }  // The drop rate should be roughly equal to the expectation.  const double seen_drop_rate = static_cast<double>(num_drops) / kNumRpcs;  const double kErrorTolerance = 0.2;  EXPECT_THAT(      seen_drop_rate,      ::testing::AllOf(::testing::Ge(kDropRateForLb * (1 - kErrorTolerance)),                       ::testing::Le(kDropRateForLb * (1 + kErrorTolerance))));}// Tests that drop config is converted correctly from per ten thousand.TEST_P(DropTest, DropPerTenThousand) {  SetNextResolution({});  SetNextResolutionForLbChannelAllBalancers();  const size_t kNumRpcs = 5000;  const uint32_t kDropPerTenThousandForLb = 1000;  const double kDropRateForLb = kDropPerTenThousandForLb / 10000.0;  // The ADS response contains one drop category.  AdsServiceImpl::EdsResourceArgs args({      {"locality0", GetBackendPorts()},  });  args.drop_categories = {{kLbDropType, kDropPerTenThousandForLb}};  args.drop_denominator = FractionalPercent::TEN_THOUSAND;  balancers_[0]->ads_service()->SetEdsResource(      BuildEdsResource(args, DefaultEdsServiceName()));  WaitForAllBackends();  // Send kNumRpcs RPCs and count the drops.  size_t num_drops = 0;  for (size_t i = 0; i < kNumRpcs; ++i) {    EchoResponse response;    const Status status = SendRpc(RpcOptions(), &response);    if (!status.ok() &&        status.error_message() == "Call dropped by load balancing policy") {      ++num_drops;    } else {      EXPECT_TRUE(status.ok()) << "code=" << status.error_code()                               << " message=" << status.error_message();      EXPECT_EQ(response.message(), kRequestMessage);    }  }  // The drop rate should be roughly equal to the expectation.  const double seen_drop_rate = static_cast<double>(num_drops) / kNumRpcs;  const double kErrorTolerance = 0.2;  EXPECT_THAT(      seen_drop_rate,      ::testing::AllOf(::testing::Ge(kDropRateForLb * (1 - kErrorTolerance)),                       ::testing::Le(kDropRateForLb * (1 + kErrorTolerance))));}// Tests that drop is working correctly after update.TEST_P(DropTest, Update) {  SetNextResolution({});  SetNextResolutionForLbChannelAllBalancers();  const size_t kNumRpcs = 3000;  const uint32_t kDropPerMillionForLb = 100000;  const uint32_t kDropPerMillionForThrottle = 200000;  const double kDropRateForLb = kDropPerMillionForLb / 1000000.0;  const double kDropRateForThrottle = kDropPerMillionForThrottle / 1000000.0;  const double KDropRateForLbAndThrottle =      kDropRateForLb + (1 - kDropRateForLb) * kDropRateForThrottle;  // The first ADS response contains one drop category.  AdsServiceImpl::EdsResourceArgs args({      {"locality0", GetBackendPorts()},  });  args.drop_categories = {{kLbDropType, kDropPerMillionForLb}};  balancers_[0]->ads_service()->SetEdsResource(      BuildEdsResource(args, DefaultEdsServiceName()));  WaitForAllBackends();  // Send kNumRpcs RPCs and count the drops.  size_t num_drops = 0;  gpr_log(GPR_INFO, "========= BEFORE FIRST BATCH ==========");  for (size_t i = 0; i < kNumRpcs; ++i) {    EchoResponse response;    const Status status = SendRpc(RpcOptions(), &response);    if (!status.ok() &&        status.error_message() == "Call dropped by load balancing policy") {      ++num_drops;    } else {      EXPECT_TRUE(status.ok()) << "code=" << status.error_code()                               << " message=" << status.error_message();      EXPECT_EQ(response.message(), kRequestMessage);    }  }  gpr_log(GPR_INFO, "========= DONE WITH FIRST BATCH ==========");  // The drop rate should be roughly equal to the expectation.  double seen_drop_rate = static_cast<double>(num_drops) / kNumRpcs;  gpr_log(GPR_INFO, "First batch drop rate %f", seen_drop_rate);  const double kErrorTolerance = 0.3;  EXPECT_THAT(      seen_drop_rate,      ::testing::AllOf(::testing::Ge(kDropRateForLb * (1 - kErrorTolerance)),                       ::testing::Le(kDropRateForLb * (1 + kErrorTolerance))));  // The second ADS response contains two drop categories, send an update EDS  // response.  args.drop_categories = {{kLbDropType, kDropPerMillionForLb},                          {kThrottleDropType, kDropPerMillionForThrottle}};  balancers_[0]->ads_service()->SetEdsResource(      BuildEdsResource(args, DefaultEdsServiceName()));  // Wait until the drop rate increases to the middle of the two configs, which  // implies that the update has been in effect.  const double kDropRateThreshold =      (kDropRateForLb + KDropRateForLbAndThrottle) / 2;  size_t num_rpcs = kNumRpcs;  while (seen_drop_rate < kDropRateThreshold) {    EchoResponse response;    const Status status = SendRpc(RpcOptions(), &response);    ++num_rpcs;    if (!status.ok() &&        status.error_message() == "Call dropped by load balancing policy") {      ++num_drops;    } else {      EXPECT_TRUE(status.ok()) << "code=" << status.error_code()                               << " message=" << status.error_message();      EXPECT_EQ(response.message(), kRequestMessage);    }    seen_drop_rate = static_cast<double>(num_drops) / num_rpcs;  }  // Send kNumRpcs RPCs and count the drops.  num_drops = 0;  gpr_log(GPR_INFO, "========= BEFORE SECOND BATCH ==========");  for (size_t i = 0; i < kNumRpcs; ++i) {    EchoResponse response;    const Status status = SendRpc(RpcOptions(), &response);    if (!status.ok() &&        status.error_message() == "Call dropped by load balancing policy") {      ++num_drops;    } else {      EXPECT_TRUE(status.ok()) << "code=" << status.error_code()                               << " message=" << status.error_message();      EXPECT_EQ(response.message(), kRequestMessage);    }  }  gpr_log(GPR_INFO, "========= DONE WITH SECOND BATCH ==========");  // The new drop rate should be roughly equal to the expectation.  seen_drop_rate = static_cast<double>(num_drops) / kNumRpcs;  gpr_log(GPR_INFO, "Second batch drop rate %f", seen_drop_rate);  EXPECT_THAT(      seen_drop_rate,      ::testing::AllOf(          ::testing::Ge(KDropRateForLbAndThrottle * (1 - kErrorTolerance)),          ::testing::Le(KDropRateForLbAndThrottle * (1 + kErrorTolerance))));}// Tests that all the RPCs are dropped if any drop category drops 100%.TEST_P(DropTest, DropAll) {  SetNextResolution({});  SetNextResolutionForLbChannelAllBalancers();  const size_t kNumRpcs = 1000;  const uint32_t kDropPerMillionForLb = 100000;  const uint32_t kDropPerMillionForThrottle = 1000000;  // The ADS response contains two drop categories.  AdsServiceImpl::EdsResourceArgs args;  args.drop_categories = {{kLbDropType, kDropPerMillionForLb},                          {kThrottleDropType, kDropPerMillionForThrottle}};  balancers_[0]->ads_service()->SetEdsResource(      BuildEdsResource(args, DefaultEdsServiceName()));  // Send kNumRpcs RPCs and all of them are dropped.  for (size_t i = 0; i < kNumRpcs; ++i) {    EchoResponse response;    const Status status = SendRpc(RpcOptions(), &response);    EXPECT_EQ(status.error_code(), StatusCode::UNAVAILABLE);    EXPECT_EQ(status.error_message(), "Call dropped by load balancing policy");  }}class BalancerUpdateTest : public XdsEnd2endTest { public:  BalancerUpdateTest() : XdsEnd2endTest(4, 3) {}};// Tests that the old LB call is still used after the balancer address update as// long as that call is still alive.TEST_P(BalancerUpdateTest, UpdateBalancersButKeepUsingOriginalBalancer) {  SetNextResolution({});  SetNextResolutionForLbChannelAllBalancers();  AdsServiceImpl::EdsResourceArgs args({      {"locality0", {backends_[0]->port()}},  });  balancers_[0]->ads_service()->SetEdsResource(      BuildEdsResource(args, DefaultEdsServiceName()));  args = AdsServiceImpl::EdsResourceArgs({      {"locality0", {backends_[1]->port()}},  });  balancers_[1]->ads_service()->SetEdsResource(      BuildEdsResource(args, DefaultEdsServiceName()));  // Wait until the first backend is ready.  WaitForBackend(0);  // Send 10 requests.  gpr_log(GPR_INFO, "========= BEFORE FIRST BATCH ==========");  CheckRpcSendOk(10);  gpr_log(GPR_INFO, "========= DONE WITH FIRST BATCH ==========");  // All 10 requests should have gone to the first backend.  EXPECT_EQ(10U, backends_[0]->backend_service()->request_count());  // The ADS service of balancer 0 sent at least 1 response.  EXPECT_GT(balancers_[0]->ads_service()->eds_response_state().state,            AdsServiceImpl::ResponseState::NOT_SENT);  EXPECT_EQ(balancers_[1]->ads_service()->eds_response_state().state,            AdsServiceImpl::ResponseState::NOT_SENT)      << "Error Message:"      << balancers_[1]->ads_service()->eds_response_state().error_message;  EXPECT_EQ(balancers_[2]->ads_service()->eds_response_state().state,            AdsServiceImpl::ResponseState::NOT_SENT)      << "Error Message:"      << balancers_[2]->ads_service()->eds_response_state().error_message;  gpr_log(GPR_INFO, "========= ABOUT TO UPDATE 1 ==========");  SetNextResolutionForLbChannel({balancers_[1]->port()});  gpr_log(GPR_INFO, "========= UPDATE 1 DONE ==========");  EXPECT_EQ(0U, backends_[1]->backend_service()->request_count());  gpr_timespec deadline = gpr_time_add(      gpr_now(GPR_CLOCK_REALTIME), gpr_time_from_millis(10000, GPR_TIMESPAN));  // Send 10 seconds worth of RPCs  do {    CheckRpcSendOk();  } while (gpr_time_cmp(gpr_now(GPR_CLOCK_REALTIME), deadline) < 0);  // The current LB call is still working, so xds continued using it to the  // first balancer, which doesn't assign the second backend.  EXPECT_EQ(0U, backends_[1]->backend_service()->request_count());  // The ADS service of balancer 0 sent at least 1 response.  EXPECT_GT(balancers_[0]->ads_service()->eds_response_state().state,            AdsServiceImpl::ResponseState::NOT_SENT);  EXPECT_EQ(balancers_[1]->ads_service()->eds_response_state().state,            AdsServiceImpl::ResponseState::NOT_SENT)      << "Error Message:"      << balancers_[1]->ads_service()->eds_response_state().error_message;  EXPECT_EQ(balancers_[2]->ads_service()->eds_response_state().state,            AdsServiceImpl::ResponseState::NOT_SENT)      << "Error Message:"      << balancers_[2]->ads_service()->eds_response_state().error_message;}// Tests that the old LB call is still used after multiple balancer address// updates as long as that call is still alive. Send an update with the same set// of LBs as the one in SetUp() in order to verify that the LB channel inside// xds keeps the initial connection (which by definition is also present in the// update).TEST_P(BalancerUpdateTest, Repeated) {  SetNextResolution({});  SetNextResolutionForLbChannelAllBalancers();  AdsServiceImpl::EdsResourceArgs args({      {"locality0", {backends_[0]->port()}},  });  balancers_[0]->ads_service()->SetEdsResource(      BuildEdsResource(args, DefaultEdsServiceName()));  args = AdsServiceImpl::EdsResourceArgs({      {"locality0", {backends_[1]->port()}},  });  balancers_[1]->ads_service()->SetEdsResource(      BuildEdsResource(args, DefaultEdsServiceName()));  // Wait until the first backend is ready.  WaitForBackend(0);  // Send 10 requests.  gpr_log(GPR_INFO, "========= BEFORE FIRST BATCH ==========");  CheckRpcSendOk(10);  gpr_log(GPR_INFO, "========= DONE WITH FIRST BATCH ==========");  // All 10 requests should have gone to the first backend.  EXPECT_EQ(10U, backends_[0]->backend_service()->request_count());  // The ADS service of balancer 0 sent at least 1 response.  EXPECT_GT(balancers_[0]->ads_service()->eds_response_state().state,            AdsServiceImpl::ResponseState::NOT_SENT);  EXPECT_EQ(balancers_[1]->ads_service()->eds_response_state().state,            AdsServiceImpl::ResponseState::NOT_SENT)      << "Error Message:"      << balancers_[1]->ads_service()->eds_response_state().error_message;  EXPECT_EQ(balancers_[2]->ads_service()->eds_response_state().state,            AdsServiceImpl::ResponseState::NOT_SENT)      << "Error Message:"      << balancers_[2]->ads_service()->eds_response_state().error_message;  std::vector<int> ports;  ports.emplace_back(balancers_[0]->port());  ports.emplace_back(balancers_[1]->port());  ports.emplace_back(balancers_[2]->port());  gpr_log(GPR_INFO, "========= ABOUT TO UPDATE 1 ==========");  SetNextResolutionForLbChannel(ports);  gpr_log(GPR_INFO, "========= UPDATE 1 DONE ==========");  EXPECT_EQ(0U, backends_[1]->backend_service()->request_count());  gpr_timespec deadline = gpr_time_add(      gpr_now(GPR_CLOCK_REALTIME), gpr_time_from_millis(10000, GPR_TIMESPAN));  // Send 10 seconds worth of RPCs  do {    CheckRpcSendOk();  } while (gpr_time_cmp(gpr_now(GPR_CLOCK_REALTIME), deadline) < 0);  // xds continued using the original LB call to the first balancer, which  // doesn't assign the second backend.  EXPECT_EQ(0U, backends_[1]->backend_service()->request_count());  ports.clear();  ports.emplace_back(balancers_[0]->port());  ports.emplace_back(balancers_[1]->port());  gpr_log(GPR_INFO, "========= ABOUT TO UPDATE 2 ==========");  SetNextResolutionForLbChannel(ports);  gpr_log(GPR_INFO, "========= UPDATE 2 DONE ==========");  EXPECT_EQ(0U, backends_[1]->backend_service()->request_count());  deadline = gpr_time_add(gpr_now(GPR_CLOCK_REALTIME),                          gpr_time_from_millis(10000, GPR_TIMESPAN));  // Send 10 seconds worth of RPCs  do {    CheckRpcSendOk();  } while (gpr_time_cmp(gpr_now(GPR_CLOCK_REALTIME), deadline) < 0);  // xds continued using the original LB call to the first balancer, which  // doesn't assign the second backend.  EXPECT_EQ(0U, backends_[1]->backend_service()->request_count());}// Tests that if the balancer is down, the RPCs will still be sent to the// backends according to the last balancer response, until a new balancer is// reachable.TEST_P(BalancerUpdateTest, DeadUpdate) {  SetNextResolution({});  SetNextResolutionForLbChannel({balancers_[0]->port()});  AdsServiceImpl::EdsResourceArgs args({      {"locality0", {backends_[0]->port()}},  });  balancers_[0]->ads_service()->SetEdsResource(      BuildEdsResource(args, DefaultEdsServiceName()));  args = AdsServiceImpl::EdsResourceArgs({      {"locality0", {backends_[1]->port()}},  });  balancers_[1]->ads_service()->SetEdsResource(      BuildEdsResource(args, DefaultEdsServiceName()));  // Start servers and send 10 RPCs per server.  gpr_log(GPR_INFO, "========= BEFORE FIRST BATCH ==========");  CheckRpcSendOk(10);  gpr_log(GPR_INFO, "========= DONE WITH FIRST BATCH ==========");  // All 10 requests should have gone to the first backend.  EXPECT_EQ(10U, backends_[0]->backend_service()->request_count());  // The ADS service of balancer 0 sent at least 1 response.  EXPECT_GT(balancers_[0]->ads_service()->eds_response_state().state,            AdsServiceImpl::ResponseState::NOT_SENT);  EXPECT_EQ(balancers_[1]->ads_service()->eds_response_state().state,            AdsServiceImpl::ResponseState::NOT_SENT)      << "Error Message:"      << balancers_[1]->ads_service()->eds_response_state().error_message;  EXPECT_EQ(balancers_[2]->ads_service()->eds_response_state().state,            AdsServiceImpl::ResponseState::NOT_SENT)      << "Error Message:"      << balancers_[2]->ads_service()->eds_response_state().error_message;  // Kill balancer 0  gpr_log(GPR_INFO, "********** ABOUT TO KILL BALANCER 0 *************");  balancers_[0]->Shutdown();  gpr_log(GPR_INFO, "********** KILLED BALANCER 0 *************");  // This is serviced by the existing child policy.  gpr_log(GPR_INFO, "========= BEFORE SECOND BATCH ==========");  CheckRpcSendOk(10);  gpr_log(GPR_INFO, "========= DONE WITH SECOND BATCH ==========");  // All 10 requests should again have gone to the first backend.  EXPECT_EQ(20U, backends_[0]->backend_service()->request_count());  EXPECT_EQ(0U, backends_[1]->backend_service()->request_count());  // The ADS service of no balancers sent anything  EXPECT_EQ(balancers_[0]->ads_service()->eds_response_state().state,            AdsServiceImpl::ResponseState::NOT_SENT)      << "Error Message:"      << balancers_[0]->ads_service()->eds_response_state().error_message;  EXPECT_EQ(balancers_[1]->ads_service()->eds_response_state().state,            AdsServiceImpl::ResponseState::NOT_SENT)      << "Error Message:"      << balancers_[1]->ads_service()->eds_response_state().error_message;  EXPECT_EQ(balancers_[2]->ads_service()->eds_response_state().state,            AdsServiceImpl::ResponseState::NOT_SENT)      << "Error Message:"      << balancers_[2]->ads_service()->eds_response_state().error_message;  gpr_log(GPR_INFO, "========= ABOUT TO UPDATE 1 ==========");  SetNextResolutionForLbChannel({balancers_[1]->port()});  gpr_log(GPR_INFO, "========= UPDATE 1 DONE ==========");  // Wait until update has been processed, as signaled by the second backend  // receiving a request. In the meantime, the client continues to be serviced  // (by the first backend) without interruption.  EXPECT_EQ(0U, backends_[1]->backend_service()->request_count());  WaitForBackend(1);  // This is serviced by the updated RR policy  backends_[1]->backend_service()->ResetCounters();  gpr_log(GPR_INFO, "========= BEFORE THIRD BATCH ==========");  CheckRpcSendOk(10);  gpr_log(GPR_INFO, "========= DONE WITH THIRD BATCH ==========");  // All 10 requests should have gone to the second backend.  EXPECT_EQ(10U, backends_[1]->backend_service()->request_count());  // The ADS service of balancer 1 sent at least 1 response.  EXPECT_EQ(balancers_[0]->ads_service()->eds_response_state().state,            AdsServiceImpl::ResponseState::NOT_SENT)      << "Error Message:"      << balancers_[0]->ads_service()->eds_response_state().error_message;  EXPECT_GT(balancers_[1]->ads_service()->eds_response_state().state,            AdsServiceImpl::ResponseState::NOT_SENT);  EXPECT_EQ(balancers_[2]->ads_service()->eds_response_state().state,            AdsServiceImpl::ResponseState::NOT_SENT)      << "Error Message:"      << balancers_[2]->ads_service()->eds_response_state().error_message;}class ClientLoadReportingTest : public XdsEnd2endTest { public:  ClientLoadReportingTest() : XdsEnd2endTest(4, 1, 3) {}};// Tests that the load report received at the balancer is correct.TEST_P(ClientLoadReportingTest, Vanilla) {  if (GetParam().use_fake_resolver()) {    balancers_[0]->lrs_service()->set_cluster_names({kServerName});  }  SetNextResolution({});  SetNextResolutionForLbChannel({balancers_[0]->port()});  const size_t kNumRpcsPerAddress = 10;  const size_t kNumFailuresPerAddress = 3;  // TODO(juanlishen): Partition the backends after multiple localities is  // tested.  AdsServiceImpl::EdsResourceArgs args({      {"locality0", GetBackendPorts()},  });  balancers_[0]->ads_service()->SetEdsResource(      BuildEdsResource(args, DefaultEdsServiceName()));  // Wait until all backends are ready.  int num_ok = 0;  int num_failure = 0;  int num_drops = 0;  std::tie(num_ok, num_failure, num_drops) = WaitForAllBackends();  // Send kNumRpcsPerAddress RPCs per server.  CheckRpcSendOk(kNumRpcsPerAddress * num_backends_);  CheckRpcSendFailure(kNumFailuresPerAddress * num_backends_,                      RpcOptions().set_server_fail(true));  // Check that each backend got the right number of requests.  for (size_t i = 0; i < backends_.size(); ++i) {    EXPECT_EQ(kNumRpcsPerAddress + kNumFailuresPerAddress,              backends_[i]->backend_service()->request_count());  }  // The load report received at the balancer should be correct.  std::vector<ClientStats> load_report =      balancers_[0]->lrs_service()->WaitForLoadReport();  ASSERT_EQ(load_report.size(), 1UL);  ClientStats& client_stats = load_report.front();  EXPECT_EQ(kNumRpcsPerAddress * num_backends_ + num_ok,            client_stats.total_successful_requests());  EXPECT_EQ(0U, client_stats.total_requests_in_progress());  EXPECT_EQ((kNumRpcsPerAddress + kNumFailuresPerAddress) * num_backends_ +                num_ok + num_failure,            client_stats.total_issued_requests());  EXPECT_EQ(kNumFailuresPerAddress * num_backends_ + num_failure,            client_stats.total_error_requests());  EXPECT_EQ(0U, client_stats.total_dropped_requests());  // The LRS service got a single request, and sent a single response.  EXPECT_EQ(1U, balancers_[0]->lrs_service()->request_count());  EXPECT_EQ(1U, balancers_[0]->lrs_service()->response_count());}// Tests send_all_clusters.TEST_P(ClientLoadReportingTest, SendAllClusters) {  balancers_[0]->lrs_service()->set_send_all_clusters(true);  SetNextResolution({});  SetNextResolutionForLbChannel({balancers_[0]->port()});  const size_t kNumRpcsPerAddress = 10;  const size_t kNumFailuresPerAddress = 3;  // TODO(juanlishen): Partition the backends after multiple localities is  // tested.  AdsServiceImpl::EdsResourceArgs args({      {"locality0", GetBackendPorts()},  });  balancers_[0]->ads_service()->SetEdsResource(      BuildEdsResource(args, DefaultEdsServiceName()));  // Wait until all backends are ready.  int num_ok = 0;  int num_failure = 0;  int num_drops = 0;  std::tie(num_ok, num_failure, num_drops) = WaitForAllBackends();  // Send kNumRpcsPerAddress RPCs per server.  CheckRpcSendOk(kNumRpcsPerAddress * num_backends_);  CheckRpcSendFailure(kNumFailuresPerAddress * num_backends_,                      RpcOptions().set_server_fail(true));  // Check that each backend got the right number of requests.  for (size_t i = 0; i < backends_.size(); ++i) {    EXPECT_EQ(kNumRpcsPerAddress + kNumFailuresPerAddress,              backends_[i]->backend_service()->request_count());  }  // The load report received at the balancer should be correct.  std::vector<ClientStats> load_report =      balancers_[0]->lrs_service()->WaitForLoadReport();  ASSERT_EQ(load_report.size(), 1UL);  ClientStats& client_stats = load_report.front();  EXPECT_EQ(kNumRpcsPerAddress * num_backends_ + num_ok,            client_stats.total_successful_requests());  EXPECT_EQ(0U, client_stats.total_requests_in_progress());  EXPECT_EQ((kNumRpcsPerAddress + kNumFailuresPerAddress) * num_backends_ +                num_ok + num_failure,            client_stats.total_issued_requests());  EXPECT_EQ(kNumFailuresPerAddress * num_backends_ + num_failure,            client_stats.total_error_requests());  EXPECT_EQ(0U, client_stats.total_dropped_requests());  // The LRS service got a single request, and sent a single response.  EXPECT_EQ(1U, balancers_[0]->lrs_service()->request_count());  EXPECT_EQ(1U, balancers_[0]->lrs_service()->response_count());}// Tests that we don't include stats for clusters that are not requested// by the LRS server.TEST_P(ClientLoadReportingTest, HonorsClustersRequestedByLrsServer) {  balancers_[0]->lrs_service()->set_cluster_names({"bogus"});  SetNextResolution({});  SetNextResolutionForLbChannel({balancers_[0]->port()});  const size_t kNumRpcsPerAddress = 100;  AdsServiceImpl::EdsResourceArgs args({      {"locality0", GetBackendPorts()},  });  balancers_[0]->ads_service()->SetEdsResource(      BuildEdsResource(args, DefaultEdsServiceName()));  // Wait until all backends are ready.  int num_ok = 0;  int num_failure = 0;  int num_drops = 0;  std::tie(num_ok, num_failure, num_drops) = WaitForAllBackends();  // Send kNumRpcsPerAddress RPCs per server.  CheckRpcSendOk(kNumRpcsPerAddress * num_backends_);  // Each backend should have gotten 100 requests.  for (size_t i = 0; i < backends_.size(); ++i) {    EXPECT_EQ(kNumRpcsPerAddress,              backends_[i]->backend_service()->request_count());  }  // The LRS service got a single request, and sent a single response.  EXPECT_EQ(1U, balancers_[0]->lrs_service()->request_count());  EXPECT_EQ(1U, balancers_[0]->lrs_service()->response_count());  // The load report received at the balancer should be correct.  std::vector<ClientStats> load_report =      balancers_[0]->lrs_service()->WaitForLoadReport();  ASSERT_EQ(load_report.size(), 0UL);}// Tests that if the balancer restarts, the client load report contains the// stats before and after the restart correctly.TEST_P(ClientLoadReportingTest, BalancerRestart) {  if (GetParam().use_fake_resolver()) {    balancers_[0]->lrs_service()->set_cluster_names({kServerName});  }  SetNextResolution({});  SetNextResolutionForLbChannel({balancers_[0]->port()});  const size_t kNumBackendsFirstPass = backends_.size() / 2;  const size_t kNumBackendsSecondPass =      backends_.size() - kNumBackendsFirstPass;  AdsServiceImpl::EdsResourceArgs args({      {"locality0", GetBackendPorts(0, kNumBackendsFirstPass)},  });  balancers_[0]->ads_service()->SetEdsResource(      BuildEdsResource(args, DefaultEdsServiceName()));  // Wait until all backends returned by the balancer are ready.  int num_ok = 0;  int num_failure = 0;  int num_drops = 0;  std::tie(num_ok, num_failure, num_drops) =      WaitForAllBackends(/* start_index */ 0,                         /* stop_index */ kNumBackendsFirstPass);  std::vector<ClientStats> load_report =      balancers_[0]->lrs_service()->WaitForLoadReport();  ASSERT_EQ(load_report.size(), 1UL);  ClientStats client_stats = std::move(load_report.front());  EXPECT_EQ(static_cast<size_t>(num_ok),            client_stats.total_successful_requests());  EXPECT_EQ(0U, client_stats.total_requests_in_progress());  EXPECT_EQ(0U, client_stats.total_error_requests());  EXPECT_EQ(0U, client_stats.total_dropped_requests());  // Shut down the balancer.  balancers_[0]->Shutdown();  // We should continue using the last EDS response we received from the  // balancer before it was shut down.  // Note: We need to use WaitForAllBackends() here instead of just  // CheckRpcSendOk(kNumBackendsFirstPass), because when the balancer  // shuts down, the XdsClient will generate an error to the  // ServiceConfigWatcher, which will cause the xds resolver to send a  // no-op update to the LB policy.  When this update gets down to the  // round_robin child policy for the locality, it will generate a new  // subchannel list, which resets the start index randomly.  So we need  // to be a little more permissive here to avoid spurious failures.  ResetBackendCounters();  int num_started = std::get<0>(WaitForAllBackends(      /* start_index */ 0, /* stop_index */ kNumBackendsFirstPass));  // Now restart the balancer, this time pointing to the new backends.  balancers_[0]->Start();  args = AdsServiceImpl::EdsResourceArgs({      {"locality0", GetBackendPorts(kNumBackendsFirstPass)},  });  balancers_[0]->ads_service()->SetEdsResource(      BuildEdsResource(args, DefaultEdsServiceName()));  // Wait for queries to start going to one of the new backends.  // This tells us that we're now using the new serverlist.  std::tie(num_ok, num_failure, num_drops) =      WaitForAllBackends(/* start_index */ kNumBackendsFirstPass);  num_started += num_ok + num_failure + num_drops;  // Send one RPC per backend.  CheckRpcSendOk(kNumBackendsSecondPass);  num_started += kNumBackendsSecondPass;  // Check client stats.  load_report = balancers_[0]->lrs_service()->WaitForLoadReport();  ASSERT_EQ(load_report.size(), 1UL);  client_stats = std::move(load_report.front());  EXPECT_EQ(num_started, client_stats.total_successful_requests());  EXPECT_EQ(0U, client_stats.total_requests_in_progress());  EXPECT_EQ(0U, client_stats.total_error_requests());  EXPECT_EQ(0U, client_stats.total_dropped_requests());}class ClientLoadReportingWithDropTest : public XdsEnd2endTest { public:  ClientLoadReportingWithDropTest() : XdsEnd2endTest(4, 1, 20) {}};// Tests that the drop stats are correctly reported by client load reporting.TEST_P(ClientLoadReportingWithDropTest, Vanilla) {  if (GetParam().use_fake_resolver()) {    balancers_[0]->lrs_service()->set_cluster_names({kServerName});  }  SetNextResolution({});  SetNextResolutionForLbChannelAllBalancers();  const size_t kNumRpcs = 3000;  const uint32_t kDropPerMillionForLb = 100000;  const uint32_t kDropPerMillionForThrottle = 200000;  const double kDropRateForLb = kDropPerMillionForLb / 1000000.0;  const double kDropRateForThrottle = kDropPerMillionForThrottle / 1000000.0;  const double KDropRateForLbAndThrottle =      kDropRateForLb + (1 - kDropRateForLb) * kDropRateForThrottle;  // The ADS response contains two drop categories.  AdsServiceImpl::EdsResourceArgs args({      {"locality0", GetBackendPorts()},  });  args.drop_categories = {{kLbDropType, kDropPerMillionForLb},                          {kThrottleDropType, kDropPerMillionForThrottle}};  balancers_[0]->ads_service()->SetEdsResource(      BuildEdsResource(args, DefaultEdsServiceName()));  int num_ok = 0;  int num_failure = 0;  int num_drops = 0;  std::tie(num_ok, num_failure, num_drops) = WaitForAllBackends();  const size_t num_warmup = num_ok + num_failure + num_drops;  // Send kNumRpcs RPCs and count the drops.  for (size_t i = 0; i < kNumRpcs; ++i) {    EchoResponse response;    const Status status = SendRpc(RpcOptions(), &response);    if (!status.ok() &&        status.error_message() == "Call dropped by load balancing policy") {      ++num_drops;    } else {      EXPECT_TRUE(status.ok()) << "code=" << status.error_code()                               << " message=" << status.error_message();      EXPECT_EQ(response.message(), kRequestMessage);    }  }  // The drop rate should be roughly equal to the expectation.  const double seen_drop_rate = static_cast<double>(num_drops) / kNumRpcs;  const double kErrorTolerance = 0.2;  EXPECT_THAT(      seen_drop_rate,      ::testing::AllOf(          ::testing::Ge(KDropRateForLbAndThrottle * (1 - kErrorTolerance)),          ::testing::Le(KDropRateForLbAndThrottle * (1 + kErrorTolerance))));  // Check client stats.  const size_t total_rpc = num_warmup + kNumRpcs;  ClientStats client_stats;  do {    std::vector<ClientStats> load_reports =        balancers_[0]->lrs_service()->WaitForLoadReport();    for (const auto& load_report : load_reports) {      client_stats += load_report;    }  } while (client_stats.total_issued_requests() +               client_stats.total_dropped_requests() <           total_rpc);  EXPECT_EQ(num_drops, client_stats.total_dropped_requests());  EXPECT_THAT(      client_stats.dropped_requests(kLbDropType),      ::testing::AllOf(          ::testing::Ge(total_rpc * kDropRateForLb * (1 - kErrorTolerance)),          ::testing::Le(total_rpc * kDropRateForLb * (1 + kErrorTolerance))));  EXPECT_THAT(client_stats.dropped_requests(kThrottleDropType),              ::testing::AllOf(                  ::testing::Ge(total_rpc * (1 - kDropRateForLb) *                                kDropRateForThrottle * (1 - kErrorTolerance)),                  ::testing::Le(total_rpc * (1 - kDropRateForLb) *                                kDropRateForThrottle * (1 + kErrorTolerance))));}class FaultInjectionTest : public XdsEnd2endTest { public:  FaultInjectionTest() : XdsEnd2endTest(1, 1) {}  // Builds a Listener with Fault Injection filter config. If the http_fault is  // nullptr, then assign an empty filter config. This filter config is required  // to enable the fault injection features.  static Listener BuildListenerWithFaultInjection(      const HTTPFault& http_fault = HTTPFault()) {    HttpConnectionManager http_connection_manager;    Listener listener;    listener.set_name(kServerName);    HttpFilter* fault_filter = http_connection_manager.add_http_filters();    fault_filter->set_name("envoy.fault");    fault_filter->mutable_typed_config()->PackFrom(http_fault);    HttpFilter* router_filter = http_connection_manager.add_http_filters();    router_filter->set_name("router");    router_filter->mutable_typed_config()->PackFrom(        envoy::extensions::filters::http::router::v3::Router());    listener.mutable_api_listener()->mutable_api_listener()->PackFrom(        http_connection_manager);    return listener;  }  RouteConfiguration BuildRouteConfigurationWithFaultInjection(      const HTTPFault& http_fault) {    // Package as Any    google::protobuf::Any filter_config;    filter_config.PackFrom(http_fault);    // Plug into the RouteConfiguration    RouteConfiguration new_route_config = default_route_config_;    auto* config_map = new_route_config.mutable_virtual_hosts(0)                           ->mutable_routes(0)                           ->mutable_typed_per_filter_config();    (*config_map)["envoy.fault"] = std::move(filter_config);    return new_route_config;  }  void SetFilterConfig(HTTPFault& http_fault) {    switch (GetParam().filter_config_setup()) {      case TestType::FilterConfigSetup::kRouteOverride: {        Listener listener = BuildListenerWithFaultInjection();        RouteConfiguration route =            BuildRouteConfigurationWithFaultInjection(http_fault);        SetListenerAndRouteConfiguration(0, listener, route);        break;      }      case TestType::FilterConfigSetup::kHTTPConnectionManagerOriginal: {        Listener listener = BuildListenerWithFaultInjection(http_fault);        SetListenerAndRouteConfiguration(0, listener, default_route_config_);      }    };  }};// Test to ensure the most basic fault injection config works.TEST_P(FaultInjectionTest, XdsFaultInjectionAlwaysAbort) {  gpr_setenv("GRPC_XDS_EXPERIMENTAL_FAULT_INJECTION", "true");  const uint32_t kAbortPercentagePerHundred = 100;  SetNextResolution({});  SetNextResolutionForLbChannelAllBalancers();  // Construct the fault injection filter config  HTTPFault http_fault;  auto* abort_percentage = http_fault.mutable_abort()->mutable_percentage();  abort_percentage->set_numerator(kAbortPercentagePerHundred);  abort_percentage->set_denominator(FractionalPercent::HUNDRED);  http_fault.mutable_abort()->set_grpc_status(      static_cast<uint32_t>(StatusCode::ABORTED));  // Config fault injection via different setup  SetFilterConfig(http_fault);  // Fire several RPCs, and expect all of them to be aborted.  CheckRpcSendFailure(5, RpcOptions().set_wait_for_ready(true),                      StatusCode::ABORTED);  gpr_unsetenv("GRPC_XDS_EXPERIMENTAL_FAULT_INJECTION");}// Without the env, the fault injection won't be enabled.TEST_P(FaultInjectionTest, XdsFaultInjectionWithoutEnv) {  const uint32_t kAbortPercentagePerHundred = 100;  SetNextResolution({});  SetNextResolutionForLbChannelAllBalancers();  // Create an EDS resource  AdsServiceImpl::EdsResourceArgs args({      {"locality0", GetBackendPorts()},  });  balancers_[0]->ads_service()->SetEdsResource(      BuildEdsResource(args, DefaultEdsServiceName()));  // Construct the fault injection filter config  HTTPFault http_fault;  auto* abort_percentage = http_fault.mutable_abort()->mutable_percentage();  abort_percentage->set_numerator(kAbortPercentagePerHundred);  abort_percentage->set_denominator(FractionalPercent::HUNDRED);  http_fault.mutable_abort()->set_grpc_status(      static_cast<uint32_t>(StatusCode::ABORTED));  // Config fault injection via different setup  SetFilterConfig(http_fault);  // Fire several RPCs, and expect all of them to pass.  CheckRpcSendOk(5, RpcOptions().set_wait_for_ready(true));}// Without the listener config, the fault injection won't be enabled.TEST_P(FaultInjectionTest, XdsFaultInjectionWithoutListenerFilter) {  gpr_setenv("GRPC_XDS_EXPERIMENTAL_FAULT_INJECTION", "true");  const uint32_t kAbortPercentagePerHundred = 100;  SetNextResolution({});  SetNextResolutionForLbChannelAllBalancers();  // Create an EDS resource  AdsServiceImpl::EdsResourceArgs args({      {"locality0", GetBackendPorts()},  });  balancers_[0]->ads_service()->SetEdsResource(      BuildEdsResource(args, DefaultEdsServiceName()));  // Construct the fault injection filter config  HTTPFault http_fault;  auto* abort_percentage = http_fault.mutable_abort()->mutable_percentage();  abort_percentage->set_numerator(kAbortPercentagePerHundred);  abort_percentage->set_denominator(FractionalPercent::HUNDRED);  http_fault.mutable_abort()->set_grpc_status(      static_cast<uint32_t>(StatusCode::ABORTED));  // Turn on fault injection  RouteConfiguration route =      BuildRouteConfigurationWithFaultInjection(http_fault);  SetListenerAndRouteConfiguration(0, default_listener_, route);  // Fire several RPCs, and expect all of them to be pass.  CheckRpcSendOk(5, RpcOptions().set_wait_for_ready(true));  gpr_unsetenv("GRPC_XDS_EXPERIMENTAL_FAULT_INJECTION");}TEST_P(FaultInjectionTest, XdsFaultInjectionPercentageAbort) {  gpr_setenv("GRPC_XDS_EXPERIMENTAL_FAULT_INJECTION", "true");  const size_t kNumRpcs = 100;  const uint32_t kAbortPercentagePerHundred = 50;  const double kAbortRate = kAbortPercentagePerHundred / 100.0;  const double kErrorTolerance = 0.2;  SetNextResolution({});  SetNextResolutionForLbChannelAllBalancers();  // Create an EDS resource  AdsServiceImpl::EdsResourceArgs args({      {"locality0", GetBackendPorts()},  });  balancers_[0]->ads_service()->SetEdsResource(      BuildEdsResource(args, DefaultEdsServiceName()));  // Construct the fault injection filter config  HTTPFault http_fault;  auto* abort_percentage = http_fault.mutable_abort()->mutable_percentage();  abort_percentage->set_numerator(kAbortPercentagePerHundred);  abort_percentage->set_denominator(FractionalPercent::HUNDRED);  http_fault.mutable_abort()->set_grpc_status(      static_cast<uint32_t>(StatusCode::ABORTED));  // Config fault injection via different setup  SetFilterConfig(http_fault);  // Send kNumRpcs RPCs and count the aborts.  int num_total = 0, num_ok = 0, num_failure = 0, num_aborted = 0;  for (size_t i = 0; i < kNumRpcs; ++i) {    SendRpcAndCount(&num_total, &num_ok, &num_failure, &num_aborted,                    RpcOptions(), "Fault injected");  }  EXPECT_EQ(kNumRpcs, num_total);  EXPECT_EQ(0, num_failure);  // The abort rate should be roughly equal to the expectation.  const double seen_abort_rate = static_cast<double>(num_aborted) / kNumRpcs;  EXPECT_THAT(seen_abort_rate,              ::testing::AllOf(::testing::Ge(kAbortRate - kErrorTolerance),                               ::testing::Le(kAbortRate + kErrorTolerance)));  gpr_unsetenv("GRPC_XDS_EXPERIMENTAL_FAULT_INJECTION");}TEST_P(FaultInjectionTest, XdsFaultInjectionPercentageAbortViaHeaders) {  gpr_setenv("GRPC_XDS_EXPERIMENTAL_FAULT_INJECTION", "true");  const size_t kNumRpcs = 100;  const uint32_t kAbortPercentageCap = 100;  const uint32_t kAbortPercentage = 50;  const double kAbortRate = kAbortPercentage / 100.0;  const double kErrorTolerance = 0.2;  SetNextResolution({});  SetNextResolutionForLbChannelAllBalancers();  // Create an EDS resource  AdsServiceImpl::EdsResourceArgs args({      {"locality0", GetBackendPorts()},  });  balancers_[0]->ads_service()->SetEdsResource(      BuildEdsResource(args, DefaultEdsServiceName()));  // Construct the fault injection filter config  HTTPFault http_fault;  http_fault.mutable_abort()->mutable_header_abort();  http_fault.mutable_abort()->mutable_percentage()->set_numerator(      kAbortPercentageCap);  // Config fault injection via different setup  SetFilterConfig(http_fault);  // Send kNumRpcs RPCs and count the aborts.  std::vector<std::pair<std::string, std::string>> metadata = {      {"x-envoy-fault-abort-grpc-request", "10"},      {"x-envoy-fault-abort-percentage", std::to_string(kAbortPercentage)},  };  int num_total = 0, num_ok = 0, num_failure = 0, num_aborted = 0;  RpcOptions options = RpcOptions().set_metadata(metadata);  for (size_t i = 0; i < kNumRpcs; ++i) {    SendRpcAndCount(&num_total, &num_ok, &num_failure, &num_aborted, options,                    "Fault injected");  }  EXPECT_EQ(kNumRpcs, num_total);  EXPECT_EQ(0, num_failure);  // The abort rate should be roughly equal to the expectation.  const double seen_abort_rate = static_cast<double>(num_aborted) / kNumRpcs;  EXPECT_THAT(seen_abort_rate,              ::testing::AllOf(::testing::Ge(kAbortRate - kErrorTolerance),                               ::testing::Le(kAbortRate + kErrorTolerance)));  gpr_unsetenv("GRPC_XDS_EXPERIMENTAL_FAULT_INJECTION");}// TODO(lidiz) reduce the error tolerance to a lower level without dramatically// increase the duration of fault injection tests.TEST_P(FaultInjectionTest, XdsFaultInjectionPercentageDelay) {  gpr_setenv("GRPC_XDS_EXPERIMENTAL_FAULT_INJECTION", "true");  const size_t kNumRpcs = 100;  const uint32_t kFixedDelaySeconds = 100;  const uint32_t kRpcTimeoutMilliseconds = 10;  // 10 ms  const uint32_t kDelayPercentagePerHundred = 95;  const double kDelayRate = kDelayPercentagePerHundred / 100.0;  const double kErrorTolerance = 0.2;  SetNextResolution({});  SetNextResolutionForLbChannelAllBalancers();  // Create an EDS resource  AdsServiceImpl::EdsResourceArgs args({      {"locality0", GetBackendPorts()},  });  balancers_[0]->ads_service()->SetEdsResource(      BuildEdsResource(args, DefaultEdsServiceName()));  // Construct the fault injection filter config  HTTPFault http_fault;  auto* delay_percentage = http_fault.mutable_delay()->mutable_percentage();  delay_percentage->set_numerator(kDelayPercentagePerHundred);  delay_percentage->set_denominator(FractionalPercent::HUNDRED);  auto* fixed_delay = http_fault.mutable_delay()->mutable_fixed_delay();  fixed_delay->set_seconds(kFixedDelaySeconds);  // Config fault injection via different setup  SetFilterConfig(http_fault);  // Send kNumRpcs RPCs and count the delays.  int num_total = 0, num_ok = 0, num_delayed = 0, num_dropped = 0;  RpcOptions options = RpcOptions()                           .set_timeout_ms(kRpcTimeoutMilliseconds)                           .set_skip_cancelled_check(true);  for (size_t i = 0; i < kNumRpcs; ++i) {    SendRpcAndCount(&num_total, &num_ok, &num_delayed, &num_dropped, options);  }  EXPECT_EQ(kNumRpcs, num_total);  EXPECT_EQ(0, num_dropped);  // The delay rate should be roughly equal to the expectation.  const double seen_delay_rate = static_cast<double>(num_delayed) / kNumRpcs;  EXPECT_THAT(seen_delay_rate,              ::testing::AllOf(::testing::Ge(kDelayRate - kErrorTolerance),                               ::testing::Le(kDelayRate + kErrorTolerance)));  gpr_unsetenv("GRPC_XDS_EXPERIMENTAL_FAULT_INJECTION");}TEST_P(FaultInjectionTest, XdsFaultInjectionPercentageDelayViaHeaders) {  gpr_setenv("GRPC_XDS_EXPERIMENTAL_FAULT_INJECTION", "true");  const size_t kNumRpcs = 100;  const uint32_t kFixedDelayMilliseconds = 100000;  // 100 seconds  const uint32_t kRpcTimeoutMilliseconds = 10;      // 10 ms  const uint32_t kDelayPercentageCap = 100;  const uint32_t kDelayPercentage = 50;  const double kDelayRate = kDelayPercentage / 100.0;  const double kErrorTolerance = 0.2;  SetNextResolution({});  SetNextResolutionForLbChannelAllBalancers();  // Create an EDS resource  AdsServiceImpl::EdsResourceArgs args({      {"locality0", GetBackendPorts()},  });  balancers_[0]->ads_service()->SetEdsResource(      BuildEdsResource(args, DefaultEdsServiceName()));  // Construct the fault injection filter config  HTTPFault http_fault;  http_fault.mutable_delay()->mutable_header_delay();  http_fault.mutable_delay()->mutable_percentage()->set_numerator(      kDelayPercentageCap);  // Config fault injection via different setup  SetFilterConfig(http_fault);  // Send kNumRpcs RPCs and count the delays.  std::vector<std::pair<std::string, std::string>> metadata = {      {"x-envoy-fault-delay-request", std::to_string(kFixedDelayMilliseconds)},      {"x-envoy-fault-delay-request-percentage",       std::to_string(kDelayPercentage)},  };  int num_total = 0, num_ok = 0, num_delayed = 0, num_dropped = 0;  RpcOptions options = RpcOptions()                           .set_metadata(metadata)                           .set_timeout_ms(kRpcTimeoutMilliseconds)                           .set_skip_cancelled_check(true);  for (size_t i = 0; i < kNumRpcs; ++i) {    SendRpcAndCount(&num_total, &num_ok, &num_delayed, &num_dropped, options);  }  // The delay rate should be roughly equal to the expectation.  const double seen_delay_rate = static_cast<double>(num_delayed) / kNumRpcs;  EXPECT_THAT(seen_delay_rate,              ::testing::AllOf(::testing::Ge(kDelayRate - kErrorTolerance),                               ::testing::Le(kDelayRate + kErrorTolerance)));  gpr_unsetenv("GRPC_XDS_EXPERIMENTAL_FAULT_INJECTION");}TEST_P(FaultInjectionTest, XdsFaultInjectionAlwaysDelayPercentageAbort) {  gpr_setenv("GRPC_XDS_EXPERIMENTAL_FAULT_INJECTION", "true");  const size_t kNumRpcs = 100;  const uint32_t kAbortPercentagePerHundred = 50;  const double kAbortRate = kAbortPercentagePerHundred / 100.0;  const uint32_t kFixedDelayNanos = 10 * 1000 * 1000;  // 10 ms  const double kErrorTolerance = 0.2;  SetNextResolution({});  SetNextResolutionForLbChannelAllBalancers();  // Create an EDS resource  AdsServiceImpl::EdsResourceArgs args({      {"locality0", GetBackendPorts()},  });  balancers_[0]->ads_service()->SetEdsResource(      BuildEdsResource(args, DefaultEdsServiceName()));  // Construct the fault injection filter config  HTTPFault http_fault;  auto* abort_percentage = http_fault.mutable_abort()->mutable_percentage();  abort_percentage->set_numerator(kAbortPercentagePerHundred);  abort_percentage->set_denominator(FractionalPercent::HUNDRED);  http_fault.mutable_abort()->set_grpc_status(      static_cast<uint32_t>(StatusCode::ABORTED));  auto* delay_percentage = http_fault.mutable_delay()->mutable_percentage();  delay_percentage->set_numerator(1000000);  // Always inject DELAY!  delay_percentage->set_denominator(FractionalPercent::MILLION);  auto* fixed_delay = http_fault.mutable_delay()->mutable_fixed_delay();  fixed_delay->set_nanos(kFixedDelayNanos);  // Config fault injection via different setup  SetFilterConfig(http_fault);  // Send kNumRpcs RPCs and count the aborts.  int num_total = 0, num_ok = 0, num_failure = 0, num_aborted = 0;  for (size_t i = 0; i < kNumRpcs; ++i) {    grpc_millis t0 = NowFromCycleCounter();    SendRpcAndCount(&num_total, &num_ok, &num_failure, &num_aborted,                    RpcOptions(), "Fault injected");    grpc_millis t1 = NowFromCycleCounter();    EXPECT_GE(t1, t0 + kFixedDelayNanos / 1000 / 1000);  }  EXPECT_EQ(kNumRpcs, num_total);  EXPECT_EQ(0, num_failure);  // The abort rate should be roughly equal to the expectation.  const double seen_abort_rate = static_cast<double>(num_aborted) / kNumRpcs;  EXPECT_THAT(seen_abort_rate,              ::testing::AllOf(::testing::Ge(kAbortRate - kErrorTolerance),                               ::testing::Le(kAbortRate + kErrorTolerance)));  gpr_unsetenv("GRPC_XDS_EXPERIMENTAL_FAULT_INJECTION");}// This test and the above test apply different denominators to delay and abort.// This ensures that we are using the right denominator for each injected fault// in our code.TEST_P(FaultInjectionTest,       XdsFaultInjectionAlwaysDelayPercentageAbortSwitchDenominator) {  gpr_setenv("GRPC_XDS_EXPERIMENTAL_FAULT_INJECTION", "true");  const size_t kNumRpcs = 100;  const uint32_t kAbortPercentagePerMillion = 500000;  const double kAbortRate = kAbortPercentagePerMillion / 1000000.0;  const uint32_t kFixedDelayNanos = 10 * 1000 * 1000;  // 10 ms  const double kErrorTolerance = 0.2;  SetNextResolution({});  SetNextResolutionForLbChannelAllBalancers();  // Create an EDS resource  AdsServiceImpl::EdsResourceArgs args({      {"locality0", GetBackendPorts()},  });  balancers_[0]->ads_service()->SetEdsResource(      BuildEdsResource(args, DefaultEdsServiceName()));  // Construct the fault injection filter config  HTTPFault http_fault;  auto* abort_percentage = http_fault.mutable_abort()->mutable_percentage();  abort_percentage->set_numerator(kAbortPercentagePerMillion);  abort_percentage->set_denominator(FractionalPercent::MILLION);  http_fault.mutable_abort()->set_grpc_status(      static_cast<uint32_t>(StatusCode::ABORTED));  auto* delay_percentage = http_fault.mutable_delay()->mutable_percentage();  delay_percentage->set_numerator(100);  // Always inject DELAY!  delay_percentage->set_denominator(FractionalPercent::HUNDRED);  auto* fixed_delay = http_fault.mutable_delay()->mutable_fixed_delay();  fixed_delay->set_nanos(kFixedDelayNanos);  // Config fault injection via different setup  SetFilterConfig(http_fault);  // Send kNumRpcs RPCs and count the aborts.  int num_total = 0, num_ok = 0, num_failure = 0, num_aborted = 0;  for (size_t i = 0; i < kNumRpcs; ++i) {    grpc_millis t0 = NowFromCycleCounter();    SendRpcAndCount(&num_total, &num_ok, &num_failure, &num_aborted,                    RpcOptions(), "Fault injected");    grpc_millis t1 = NowFromCycleCounter();    EXPECT_GE(t1, t0 + kFixedDelayNanos / 1000 / 1000);  }  EXPECT_EQ(kNumRpcs, num_total);  EXPECT_EQ(0, num_failure);  // The abort rate should be roughly equal to the expectation.  const double seen_abort_rate = static_cast<double>(num_aborted) / kNumRpcs;  EXPECT_THAT(seen_abort_rate,              ::testing::AllOf(::testing::Ge(kAbortRate - kErrorTolerance),                               ::testing::Le(kAbortRate + kErrorTolerance)));  gpr_unsetenv("GRPC_XDS_EXPERIMENTAL_FAULT_INJECTION");}TEST_P(FaultInjectionTest, XdsFaultInjectionMaxFault) {  gpr_setenv("GRPC_XDS_EXPERIMENTAL_FAULT_INJECTION", "true");  const uint32_t kMaxFault = 10;  const uint32_t kNumRpcs = 30;  // kNumRpcs should be bigger than kMaxFault  const uint32_t kRpcTimeoutMs = 2000;     // 2 seconds  const uint32_t kLongDelaySeconds = 100;  // 100 seconds  const uint32_t kAlwaysDelayPercentage = 100;  SetNextResolution({});  SetNextResolutionForLbChannelAllBalancers();  // Create an EDS resource  AdsServiceImpl::EdsResourceArgs args({      {"locality0", GetBackendPorts()},  });  balancers_[0]->ads_service()->SetEdsResource(      BuildEdsResource(args, DefaultEdsServiceName()));  // Construct the fault injection filter config  HTTPFault http_fault;  auto* delay_percentage = http_fault.mutable_delay()->mutable_percentage();  delay_percentage->set_numerator(      kAlwaysDelayPercentage);  // Always inject DELAY!  delay_percentage->set_denominator(FractionalPercent::HUNDRED);  auto* fixed_delay = http_fault.mutable_delay()->mutable_fixed_delay();  fixed_delay->set_seconds(kLongDelaySeconds);  http_fault.mutable_max_active_faults()->set_value(kMaxFault);  // Config fault injection via different setup  SetFilterConfig(http_fault);  // Sends a batch of long running RPCs with long timeout to consume all  // active faults quota.  int num_ok = 0, num_delayed = 0;  LongRunningRpc rpcs[kNumRpcs];  RpcOptions rpc_options = RpcOptions().set_timeout_ms(kRpcTimeoutMs);  for (size_t i = 0; i < kNumRpcs; ++i) {    rpcs[i].StartRpc(stub_.get(), rpc_options);  }  for (size_t i = 0; i < kNumRpcs; ++i) {    Status status = rpcs[i].GetStatus();    if (status.ok()) {      ++num_ok;    } else {      EXPECT_EQ(StatusCode::DEADLINE_EXCEEDED, status.error_code());      ++num_delayed;    }  }  // Only kMaxFault number of RPC should be fault injected..  EXPECT_EQ(kMaxFault, num_delayed);  // Other RPCs should be ok.  EXPECT_EQ(kNumRpcs - kMaxFault, num_ok);  gpr_unsetenv("GRPC_XDS_EXPERIMENTAL_FAULT_INJECTION");}class BootstrapContentsFromEnvVarTest : public XdsEnd2endTest { public:  BootstrapContentsFromEnvVarTest() : XdsEnd2endTest(4, 1, 100, false, true) {}};TEST_P(BootstrapContentsFromEnvVarTest, Vanilla) {  SetNextResolution({});  SetNextResolutionForLbChannelAllBalancers();  AdsServiceImpl::EdsResourceArgs args({      {"locality0", GetBackendPorts()},  });  balancers_[0]->ads_service()->SetEdsResource(      BuildEdsResource(args, DefaultEdsServiceName()));  WaitForAllBackends();}class ClientStatusDiscoveryServiceTest : public XdsEnd2endTest { public:  ClientStatusDiscoveryServiceTest() : XdsEnd2endTest(1, 1) {}  void SetUp() override {    XdsEnd2endTest::SetUp();    admin_server_thread_ = absl::make_unique<AdminServerThread>();    admin_server_thread_->Start();    std::string admin_server_address = absl::StrCat(        ipv6_only_ ? "[::1]:" : "127.0.0.1:", admin_server_thread_->port());    admin_channel_ = grpc::CreateChannel(        admin_server_address,        std::make_shared<SecureChannelCredentials>(            grpc_fake_transport_security_credentials_create()));    csds_stub_ =        envoy::service::status::v3::ClientStatusDiscoveryService::NewStub(            admin_channel_);    if (GetParam().use_csds_streaming()) {      stream_ = csds_stub_->StreamClientStatus(&stream_context_);    }  }  void TearDown() override {    if (stream_ != nullptr) {      EXPECT_TRUE(stream_->WritesDone());      Status status = stream_->Finish();      EXPECT_TRUE(status.ok()) << "code=" << status.error_code()                               << " message=" << status.error_message();    }    admin_server_thread_->Shutdown();    XdsEnd2endTest::TearDown();  }  envoy::service::status::v3::ClientStatusResponse FetchCsdsResponse() {    envoy::service::status::v3::ClientStatusResponse response;    if (!GetParam().use_csds_streaming()) {      // Fetch through unary pulls      ClientContext context;      Status status = csds_stub_->FetchClientStatus(          &context, envoy::service::status::v3::ClientStatusRequest(),          &response);      EXPECT_TRUE(status.ok()) << "code=" << status.error_code()                               << " message=" << status.error_message();    } else {      // Fetch through streaming pulls      EXPECT_TRUE(          stream_->Write(envoy::service::status::v3::ClientStatusRequest()));      EXPECT_TRUE(stream_->Read(&response));    }    return response;  } private:  std::unique_ptr<AdminServerThread> admin_server_thread_;  std::shared_ptr<Channel> admin_channel_;  std::unique_ptr<      envoy::service::status::v3::ClientStatusDiscoveryService::Stub>      csds_stub_;  ClientContext stream_context_;  std::unique_ptr<      ClientReaderWriter<envoy::service::status::v3::ClientStatusRequest,                         envoy::service::status::v3::ClientStatusResponse>>      stream_;};MATCHER_P4(EqNode, id, user_agent_name, user_agent_version, client_features,           "equals Node") {  bool ok = true;  ok &= ::testing::ExplainMatchResult(id, arg.id(), result_listener);  ok &= ::testing::ExplainMatchResult(user_agent_name, arg.user_agent_name(),                                      result_listener);  ok &= ::testing::ExplainMatchResult(      user_agent_version, arg.user_agent_version(), result_listener);  ok &= ::testing::ExplainMatchResult(client_features, arg.client_features(),                                      result_listener);  return ok;}MATCHER_P2(EqListenersConfigDump, version_info, dynamic_listeners,           "equals ListenerConfigDump") {  bool ok = true;  ok &= ::testing::ExplainMatchResult(::testing::ElementsAre(),                                      arg.static_listeners(), result_listener);  ok &= ::testing::ExplainMatchResult(version_info, arg.version_info(),                                      result_listener);  ok &= ::testing::ExplainMatchResult(dynamic_listeners,                                      arg.dynamic_listeners(), result_listener);  return ok;}MATCHER_P2(EqDynamicListenerState, version_info, listener,           "equals DynamicListenerState") {  bool ok = true;  ok &= ::testing::ExplainMatchResult(version_info, arg.version_info(),                                      result_listener);  ok &=      ::testing::ExplainMatchResult(listener, arg.listener(), result_listener);  return ok;}MATCHER_P2(EqListener, name, api_listener, "equals Listener") {  bool ok = true;  ok &= ::testing::ExplainMatchResult(name, arg.name(), result_listener);  ok &= ::testing::ExplainMatchResult(      api_listener, arg.api_listener().api_listener(), result_listener);  return ok;}MATCHER_P(EqHttpConnectionManagerNotRds, route_config,          "equals HttpConnectionManager") {  bool ok = true;  ok &= ::testing::ExplainMatchResult(route_config, arg.route_config(),                                      result_listener);  return ok;}MATCHER_P(EqRouteConfigurationName, name, "equals RouteConfiguration") {  bool ok = true;  ok &= ::testing::ExplainMatchResult(name, arg.name(), result_listener);  return ok;}MATCHER_P2(EqRouteConfiguration, name, cluster_name,           "equals RouteConfiguration") {  bool ok = true;  ok &= ::testing::ExplainMatchResult(name, arg.name(), result_listener);  ok &= ::testing::ExplainMatchResult(      ::testing::ElementsAre(::testing::Property(          &envoy::config::route::v3::VirtualHost::routes,          ::testing::ElementsAre(::testing::Property(              &envoy::config::route::v3::Route::route,              ::testing::Property(                  &envoy::config::route::v3::RouteAction::cluster,                  cluster_name))))),      arg.virtual_hosts(), result_listener);  return ok;}MATCHER_P(EqRoutesConfigDump, dynamic_route_configs,          "equals RoutesConfigDump") {  bool ok = true;  ok &= ::testing::ExplainMatchResult(      ::testing::ElementsAre(), arg.static_route_configs(), result_listener);  ok &= ::testing::ExplainMatchResult(      dynamic_route_configs, arg.dynamic_route_configs(), result_listener);  return ok;}MATCHER_P2(EqClustersConfigDump, version_info, dynamic_active_clusters,           "equals ClustersConfigDump") {  bool ok = true;  ok &= ::testing::ExplainMatchResult(::testing::ElementsAre(),                                      arg.static_clusters(), result_listener);  ok &= ::testing::ExplainMatchResult(::testing::ElementsAre(),                                      arg.dynamic_warming_clusters(),                                      result_listener);  ok &= ::testing::ExplainMatchResult(version_info, arg.version_info(),                                      result_listener);  ok &= ::testing::ExplainMatchResult(      dynamic_active_clusters, arg.dynamic_active_clusters(), result_listener);  return ok;}MATCHER_P(EqCluster, name, "equals Cluster") {  bool ok = true;  ok &= ::testing::ExplainMatchResult(name, arg.name(), result_listener);  return ok;}MATCHER_P(EqEndpointsConfigDump, dynamic_endpoint_configs,          "equals EndpointsConfigDump") {  bool ok = true;  ok &= ::testing::ExplainMatchResult(dynamic_endpoint_configs,                                      arg.dynamic_endpoint_configs(),                                      result_listener);  return ok;}MATCHER_P(EqEndpoint, port, "equals Endpoint") {  bool ok = true;  ok &= ::testing::ExplainMatchResult(      port, arg.address().socket_address().port_value(), result_listener);  return ok;}MATCHER_P2(EqLocalityLbEndpoints, port, weight, "equals LocalityLbEndpoints") {  bool ok = true;  ok &= ::testing::ExplainMatchResult(      ::testing::ElementsAre(::testing::Property(          &envoy::config::endpoint::v3::LbEndpoint::endpoint,          EqEndpoint(port))),      arg.lb_endpoints(), result_listener);  ok &= ::testing::ExplainMatchResult(      weight, arg.load_balancing_weight().value(), result_listener);  return ok;}MATCHER_P(EqClusterLoadAssignmentName, cluster_name,          "equals ClusterLoadAssignment") {  bool ok = true;  ok &= ::testing::ExplainMatchResult(cluster_name, arg.cluster_name(),                                      result_listener);  return ok;}MATCHER_P3(EqClusterLoadAssignment, cluster_name, port, weight,           "equals ClusterLoadAssignment") {  bool ok = true;  ok &= ::testing::ExplainMatchResult(cluster_name, arg.cluster_name(),                                      result_listener);  ok &= ::testing::ExplainMatchResult(      ::testing::ElementsAre(EqLocalityLbEndpoints(port, weight)),      arg.endpoints(), result_listener);  return ok;}MATCHER_P2(EqUpdateFailureState, details, version_info,           "equals UpdateFailureState") {  bool ok = true;  ok &= ::testing::ExplainMatchResult(details, arg.details(), result_listener);  ok &= ::testing::ExplainMatchResult(version_info, arg.version_info(),                                      result_listener);  return ok;}MATCHER_P(UnpackListener, matcher, "is a Listener") {  Listener config;  if (!::testing::ExplainMatchResult(true, arg.UnpackTo(&config),                                     result_listener)) {    return false;  }  return ::testing::ExplainMatchResult(matcher, config, result_listener);}MATCHER_P(UnpackRouteConfiguration, matcher, "is a RouteConfiguration") {  RouteConfiguration config;  if (!::testing::ExplainMatchResult(true, arg.UnpackTo(&config),                                     result_listener)) {    return false;  }  return ::testing::ExplainMatchResult(matcher, config, result_listener);}MATCHER_P(UnpackHttpConnectionManager, matcher, "is a HttpConnectionManager") {  HttpConnectionManager config;  if (!::testing::ExplainMatchResult(true, arg.UnpackTo(&config),                                     result_listener)) {    return false;  }  return ::testing::ExplainMatchResult(matcher, config, result_listener);}MATCHER_P(UnpackCluster, matcher, "is a Cluster") {  Cluster config;  if (!::testing::ExplainMatchResult(true, arg.UnpackTo(&config),                                     result_listener)) {    return false;  }  return ::testing::ExplainMatchResult(matcher, config, result_listener);}MATCHER_P(UnpackClusterLoadAssignment, matcher, "is a ClusterLoadAssignment") {  ClusterLoadAssignment config;  if (!::testing::ExplainMatchResult(true, arg.UnpackTo(&config),                                     result_listener)) {    return false;  }  return ::testing::ExplainMatchResult(matcher, config, result_listener);}MATCHER_P5(EqDynamicListener, name, version_info, client_status,           api_listener_matcher, error_state, "equals DynamicListener") {  bool ok = true;  ok &= ::testing::ExplainMatchResult(false, arg.has_warming_state(),                                      result_listener);  ok &= ::testing::ExplainMatchResult(false, arg.has_draining_state(),                                      result_listener);  ok &= ::testing::ExplainMatchResult(name, arg.name(), result_listener);  ok &= ::testing::ExplainMatchResult(client_status, arg.client_status(),                                      result_listener);  if (client_status == ClientResourceStatus::ACKED ||      client_status == ClientResourceStatus::NACKED) {    ok &= ::testing::ExplainMatchResult(        EqDynamicListenerState(version_info, UnpackListener(EqListener(                                                 name, api_listener_matcher))),        arg.active_state(), result_listener);  }  ok &= ::testing::ExplainMatchResult(error_state, arg.error_state(),                                      result_listener);  return ok;}MATCHER_P5(EqDynamicRouteConfig, name, version_info, client_status,           cluster_name, error_state, "equals DynamicRouteConfig") {  bool ok = true;  ok &= ::testing::ExplainMatchResult(version_info, arg.version_info(),                                      result_listener);  if (client_status == ClientResourceStatus::REQUESTED ||      client_status == ClientResourceStatus::DOES_NOT_EXIST) {    ok &= ::testing::ExplainMatchResult(        UnpackRouteConfiguration(EqRouteConfigurationName(name)),        arg.route_config(), result_listener);  } else {    ok &= ::testing::ExplainMatchResult(        UnpackRouteConfiguration(EqRouteConfiguration(name, cluster_name)),        arg.route_config(), result_listener);  }  ok &= ::testing::ExplainMatchResult(error_state, arg.error_state(),                                      result_listener);  ok &= ::testing::ExplainMatchResult(client_status, arg.client_status(),                                      result_listener);  return ok;}MATCHER_P4(EqDynamicCluster, name, version_info, client_status, error_state,           "equals DynamicCluster") {  bool ok = true;  ok &= ::testing::ExplainMatchResult(UnpackCluster(EqCluster(name)),                                      arg.cluster(), result_listener);  ok &= ::testing::ExplainMatchResult(version_info, arg.version_info(),                                      result_listener);  ok &= ::testing::ExplainMatchResult(client_status, arg.client_status(),                                      result_listener);  ok &= ::testing::ExplainMatchResult(error_state, arg.error_state(),                                      result_listener);  return ok;}MATCHER_P6(EqDynamicEndpointConfig, name, version_info, client_status, port,           weight, error_state, "equals DynamicEndpointConfig") {  bool ok = true;  if (client_status == ClientResourceStatus::REQUESTED ||      client_status == ClientResourceStatus::DOES_NOT_EXIST) {    ok &= ::testing::ExplainMatchResult(        UnpackClusterLoadAssignment(EqClusterLoadAssignmentName(name)),        arg.endpoint_config(), result_listener);  } else {    ok &= ::testing::ExplainMatchResult(        UnpackClusterLoadAssignment(            EqClusterLoadAssignment(name, port, weight)),        arg.endpoint_config(), result_listener);  }  ok &= ::testing::ExplainMatchResult(version_info, arg.version_info(),                                      result_listener);  ok &= ::testing::ExplainMatchResult(client_status, arg.client_status(),                                      result_listener);  ok &= ::testing::ExplainMatchResult(error_state, arg.error_state(),                                      result_listener);  return ok;}MATCHER(IsRdsEnabledHCM, "is a RDS enabled HttpConnectionManager") {  return ::testing::ExplainMatchResult(      UnpackHttpConnectionManager(          ::testing::Property(&HttpConnectionManager::has_rds, true)),      arg, result_listener);}MATCHER_P2(EqNoRdsHCM, route_configuration_name, cluster_name,           "equals RDS disabled HttpConnectionManager") {  return ::testing::ExplainMatchResult(      UnpackHttpConnectionManager(EqHttpConnectionManagerNotRds(          EqRouteConfiguration(route_configuration_name, cluster_name))),      arg, result_listener);}TEST_P(ClientStatusDiscoveryServiceTest, XdsConfigDumpVanilla) {  const size_t kNumRpcs = 5;  SetNextResolution({});  SetNextResolutionForLbChannelAllBalancers();  AdsServiceImpl::EdsResourceArgs args({      {"locality0", {backends_[0]->port()}},  });  balancers_[0]->ads_service()->SetEdsResource(      BuildEdsResource(args, DefaultEdsServiceName()));  // Send several RPCs to ensure the xDS setup works  CheckRpcSendOk(kNumRpcs);  // Fetches the client config  auto csds_response = FetchCsdsResponse();  gpr_log(GPR_INFO, "xDS config dump: %s", csds_response.DebugString().c_str());  EXPECT_EQ(1, csds_response.config_size());  const auto& client_config = csds_response.config(0);  // Validate the Node information  EXPECT_THAT(client_config.node(),              EqNode("xds_end2end_test", ::testing::HasSubstr("C-core"),                     ::testing::HasSubstr(grpc_version_string()),                     ::testing::ElementsAre(                         "envoy.lb.does_not_support_overprovisioning")));  // Prepare matches for RDS on or off  ::testing::Matcher<google::protobuf::Any> api_listener_matcher;  ::testing::Matcher<envoy::admin::v3::RoutesConfigDump>      route_config_dump_matcher;  if (GetParam().enable_rds_testing()) {    api_listener_matcher = IsRdsEnabledHCM();    route_config_dump_matcher =        EqRoutesConfigDump(::testing::ElementsAre(EqDynamicRouteConfig(            kDefaultRouteConfigurationName, "1", ClientResourceStatus::ACKED,            kDefaultClusterName, ::testing::_)));  } else {    api_listener_matcher =        EqNoRdsHCM(kDefaultRouteConfigurationName, kDefaultClusterName);    route_config_dump_matcher = EqRoutesConfigDump(::testing::ElementsAre());  }  // Validate the dumped xDS configs  EXPECT_THAT(      client_config.xds_config(),      ::testing::UnorderedElementsAre(          ::testing::Property(              &envoy::service::status::v3::PerXdsConfig::listener_config,              EqListenersConfigDump(                  "1", ::testing::ElementsAre(EqDynamicListener(                           kServerName, "1", ClientResourceStatus::ACKED,                           api_listener_matcher, ::testing::_)))),          ::testing::Property(              &envoy::service::status::v3::PerXdsConfig::route_config,              route_config_dump_matcher),          ::testing::Property(              &envoy::service::status::v3::PerXdsConfig::cluster_config,              EqClustersConfigDump(                  "1", ::testing::ElementsAre(EqDynamicCluster(                           kDefaultClusterName, "1",                           ClientResourceStatus::ACKED, ::testing::_)))),          ::testing::Property(              &envoy::service::status::v3::PerXdsConfig::endpoint_config,              EqEndpointsConfigDump(                  ::testing::ElementsAre(EqDynamicEndpointConfig(                      kDefaultEdsServiceName, "1", ClientResourceStatus::ACKED,                      backends_[0]->port(), kDefaultLocalityWeight,                      ::testing::_))))));}TEST_P(ClientStatusDiscoveryServiceTest, XdsConfigDumpEmpty) {  // The CSDS service should not fail if XdsClient is not initialized or there  // is no working xDS configs.  FetchCsdsResponse();}TEST_P(ClientStatusDiscoveryServiceTest, XdsConfigDumpListenerError) {  int kFetchConfigRetries = 3;  int kFetchIntervalMilliseconds = 200;  SetNextResolution({});  SetNextResolutionForLbChannelAllBalancers();  AdsServiceImpl::EdsResourceArgs args({      {"locality0", {backends_[0]->port()}},  });  balancers_[0]->ads_service()->SetEdsResource(      BuildEdsResource(args, DefaultEdsServiceName()));  // Ensure the xDS resolver has working configs.  CheckRpcSendOk();  // Bad Listener should be rejected.  Listener listener;  listener.set_name(kServerName);  balancers_[0]->ads_service()->SetLdsResource(listener);  // The old xDS configs should still be effective.  CheckRpcSendOk();  ::testing::Matcher<google::protobuf::Any> api_listener_matcher;  if (GetParam().enable_rds_testing()) {    api_listener_matcher = IsRdsEnabledHCM();  } else {    api_listener_matcher =        EqNoRdsHCM(kDefaultRouteConfigurationName, kDefaultClusterName);  }  for (int o = 0; o < kFetchConfigRetries; o++) {    auto csds_response = FetchCsdsResponse();    // Check if error state is propagated    bool ok = ::testing::Value(        csds_response.config(0).xds_config(),        ::testing::Contains(::testing::Property(            &envoy::service::status::v3::PerXdsConfig::listener_config,            EqListenersConfigDump(                "1",                ::testing::ElementsAre(EqDynamicListener(                    kServerName, "1", ClientResourceStatus::NACKED,                    api_listener_matcher,                    EqUpdateFailureState(                        ::testing::HasSubstr(                            "Listener has neither address nor ApiListener"),                        "2")))))));    if (ok) return;  // TEST PASSED!    gpr_sleep_until(        grpc_timeout_milliseconds_to_deadline(kFetchIntervalMilliseconds));  }  FAIL() << "error_state not seen in CSDS responses";}TEST_P(ClientStatusDiscoveryServiceTest, XdsConfigDumpRouteError) {  int kFetchConfigRetries = 3;  int kFetchIntervalMilliseconds = 200;  SetNextResolution({});  SetNextResolutionForLbChannelAllBalancers();  AdsServiceImpl::EdsResourceArgs args({      {"locality0", {backends_[0]->port()}},  });  balancers_[0]->ads_service()->SetEdsResource(      BuildEdsResource(args, DefaultEdsServiceName()));  // Ensure the xDS resolver has working configs.  CheckRpcSendOk();  // Bad route config will be rejected.  RouteConfiguration route_config;  route_config.set_name(kDefaultRouteConfigurationName);  route_config.add_virtual_hosts();  SetRouteConfiguration(0, route_config);  // The old xDS configs should still be effective.  SetNextResolution({});  SetNextResolutionForLbChannelAllBalancers();  CheckRpcSendOk();  for (int o = 0; o < kFetchConfigRetries; o++) {    auto csds_response = FetchCsdsResponse();    bool ok = false;    if (GetParam().enable_rds_testing()) {      ok = ::testing::Value(          csds_response.config(0).xds_config(),          ::testing::Contains(::testing::Property(              &envoy::service::status::v3::PerXdsConfig::route_config,              EqRoutesConfigDump(::testing::ElementsAre(EqDynamicRouteConfig(                  kDefaultRouteConfigurationName, "1",                  ClientResourceStatus::NACKED, kDefaultClusterName,                  EqUpdateFailureState(                      ::testing::HasSubstr("VirtualHost has no domains"),                      "2")))))));    } else {      ok = ::testing::Value(          csds_response.config(0).xds_config(),          ::testing::Contains(::testing::Property(              &envoy::service::status::v3::PerXdsConfig::listener_config,              EqListenersConfigDump(                  "1",                  ::testing::ElementsAre(EqDynamicListener(                      kServerName, "1", ClientResourceStatus::NACKED,                      EqNoRdsHCM(kDefaultRouteConfigurationName,                                 kDefaultClusterName),                      EqUpdateFailureState(                          ::testing::HasSubstr("VirtualHost has no domains"),                          "2")))))));    }    if (ok) return;  // TEST PASSED!    gpr_sleep_until(        grpc_timeout_milliseconds_to_deadline(kFetchIntervalMilliseconds));  }  FAIL() << "error_state not seen in CSDS responses";}TEST_P(ClientStatusDiscoveryServiceTest, XdsConfigDumpClusterError) {  int kFetchConfigRetries = 3;  int kFetchIntervalMilliseconds = 200;  SetNextResolution({});  SetNextResolutionForLbChannelAllBalancers();  AdsServiceImpl::EdsResourceArgs args({      {"locality0", {backends_[0]->port()}},  });  balancers_[0]->ads_service()->SetEdsResource(      BuildEdsResource(args, DefaultEdsServiceName()));  // Ensure the xDS resolver has working configs.  CheckRpcSendOk();  // Listener without any route, will be rejected.  Cluster cluster;  cluster.set_name(kDefaultClusterName);  balancers_[0]->ads_service()->SetCdsResource(cluster);  // The old xDS configs should still be effective.  SetNextResolution({});  SetNextResolutionForLbChannelAllBalancers();  CheckRpcSendOk();  for (int o = 0; o < kFetchConfigRetries; o++) {    auto csds_response = FetchCsdsResponse();    // Check if error state is propagated    bool ok = ::testing::Value(        csds_response.config(0).xds_config(),        ::testing::Contains(::testing::Property(            &envoy::service::status::v3::PerXdsConfig::cluster_config,            EqClustersConfigDump(                "1", ::testing::ElementsAre(EqDynamicCluster(                         kDefaultClusterName, "1", ClientResourceStatus::NACKED,                         EqUpdateFailureState(                             ::testing::HasSubstr("DiscoveryType not found"),                             "2")))))));    if (ok) return;  // TEST PASSED!    gpr_sleep_until(        grpc_timeout_milliseconds_to_deadline(kFetchIntervalMilliseconds));  }  FAIL() << "error_state not seen in CSDS responses";}TEST_P(ClientStatusDiscoveryServiceTest, XdsConfigDumpEndpointError) {  int kFetchConfigRetries = 3;  int kFetchIntervalMilliseconds = 200;  SetNextResolution({});  SetNextResolutionForLbChannelAllBalancers();  AdsServiceImpl::EdsResourceArgs args({      {"locality0", {backends_[0]->port()}},  });  balancers_[0]->ads_service()->SetEdsResource(      BuildEdsResource(args, DefaultEdsServiceName()));  // Ensure the xDS resolver has working configs.  CheckRpcSendOk();  // Bad endpoint config will be rejected.  ClusterLoadAssignment cluster_load_assignment;  cluster_load_assignment.set_cluster_name(kDefaultEdsServiceName);  auto* endpoints = cluster_load_assignment.add_endpoints();  endpoints->mutable_load_balancing_weight()->set_value(1);  auto* endpoint = endpoints->add_lb_endpoints()->mutable_endpoint();  endpoint->mutable_address()->mutable_socket_address()->set_port_value(1 << 1);  balancers_[0]->ads_service()->SetEdsResource(cluster_load_assignment);  // The old xDS configs should still be effective.  SetNextResolution({});  SetNextResolutionForLbChannelAllBalancers();  CheckRpcSendOk();  for (int o = 0; o < kFetchConfigRetries; o++) {    auto csds_response = FetchCsdsResponse();    // Check if error state is propagated    bool ok = ::testing::Value(        csds_response.config(0).xds_config(),        ::testing::Contains(::testing::Property(            &envoy::service::status::v3::PerXdsConfig::endpoint_config,            EqEndpointsConfigDump(                ::testing::ElementsAre(EqDynamicEndpointConfig(                    kDefaultEdsServiceName, "1", ClientResourceStatus::NACKED,                    backends_[0]->port(), kDefaultLocalityWeight,                    EqUpdateFailureState(::testing::HasSubstr("Empty locality"),                                         "2")))))));    if (ok) return;  // TEST PASSED!    gpr_sleep_until(        grpc_timeout_milliseconds_to_deadline(kFetchIntervalMilliseconds));  }  FAIL() << "error_state not seen in CSDS responses";}TEST_P(ClientStatusDiscoveryServiceTest, XdsConfigDumpListenerRequested) {  int kTimeoutMillisecond = 1000;  balancers_[0]->ads_service()->UnsetResource(kLdsTypeUrl, kServerName);  CheckRpcSendFailure(1, RpcOptions().set_timeout_ms(kTimeoutMillisecond),                      grpc::DEADLINE_EXCEEDED);  auto csds_response = FetchCsdsResponse();  EXPECT_THAT(csds_response.config(0).xds_config(),              ::testing::Contains(::testing::Property(                  &envoy::service::status::v3::PerXdsConfig::listener_config,                  EqListenersConfigDump(                      ::testing::_, ::testing::ElementsAre(EqDynamicListener(                                        kServerName, ::testing::_,                                        ClientResourceStatus::REQUESTED,                                        ::testing::_, ::testing::_))))));}TEST_P(ClientStatusDiscoveryServiceTest, XdsConfigDumpClusterRequested) {  int kTimeoutMillisecond = 1000;  std::string kClusterName1 = "cluster-1";  std::string kClusterName2 = "cluster-2";  SetNextResolution({});  SetNextResolutionForLbChannelAllBalancers();  // Create a route config requesting two non-existing clusters  RouteConfiguration route_config;  route_config.set_name(kDefaultRouteConfigurationName);  auto* vh = route_config.add_virtual_hosts();  // The VirtualHost must match the domain name, otherwise will cause resolver  // transient failure.  vh->add_domains("*");  auto* routes1 = vh->add_routes();  routes1->mutable_match()->set_prefix("");  routes1->mutable_route()->set_cluster(kClusterName1);  auto* routes2 = vh->add_routes();  routes2->mutable_match()->set_prefix("");  routes2->mutable_route()->set_cluster(kClusterName2);  SetRouteConfiguration(0, route_config);  // Try to get the configs plumb through  CheckRpcSendFailure(1, RpcOptions().set_timeout_ms(kTimeoutMillisecond),                      grpc::DEADLINE_EXCEEDED);  auto csds_response = FetchCsdsResponse();  EXPECT_THAT(csds_response.config(0).xds_config(),              ::testing::Contains(::testing::Property(                  &envoy::service::status::v3::PerXdsConfig::cluster_config,                  EqClustersConfigDump(                      ::testing::_,                      ::testing::UnorderedElementsAre(                          EqDynamicCluster(kClusterName1, ::testing::_,                                           ClientResourceStatus::REQUESTED,                                           ::testing::_),                          EqDynamicCluster(kClusterName2, ::testing::_,                                           ClientResourceStatus::REQUESTED,                                           ::testing::_))))));}class CsdsShortAdsTimeoutTest : public ClientStatusDiscoveryServiceTest {  void SetUp() override {    // Shorten the ADS subscription timeout to speed up the test run.    xds_resource_does_not_exist_timeout_ms_ = 500;    ClientStatusDiscoveryServiceTest::SetUp();  }};TEST_P(CsdsShortAdsTimeoutTest, XdsConfigDumpListenerDoesNotExist) {  int kTimeoutMillisecond = 1000000;  // 1000s wait for the transient failure.  balancers_[0]->ads_service()->UnsetResource(kLdsTypeUrl, kServerName);  CheckRpcSendFailure(1, RpcOptions().set_timeout_ms(kTimeoutMillisecond),                      grpc::UNAVAILABLE);  auto csds_response = FetchCsdsResponse();  EXPECT_THAT(csds_response.config(0).xds_config(),              ::testing::Contains(::testing::Property(                  &envoy::service::status::v3::PerXdsConfig::listener_config,                  EqListenersConfigDump(                      ::testing::_, ::testing::ElementsAre(EqDynamicListener(                                        kServerName, ::testing::_,                                        ClientResourceStatus::DOES_NOT_EXIST,                                        ::testing::_, ::testing::_))))));}TEST_P(CsdsShortAdsTimeoutTest, XdsConfigDumpRouteConfigDoesNotExist) {  if (!GetParam().enable_rds_testing()) return;  int kTimeoutMillisecond = 1000000;  // 1000s wait for the transient failure.  SetNextResolution({});  SetNextResolutionForLbChannelAllBalancers();  balancers_[0]->ads_service()->UnsetResource(kRdsTypeUrl,                                              kDefaultRouteConfigurationName);  CheckRpcSendFailure(1, RpcOptions().set_timeout_ms(kTimeoutMillisecond),                      grpc::UNAVAILABLE);  auto csds_response = FetchCsdsResponse();  EXPECT_THAT(      csds_response.config(0).xds_config(),      ::testing::Contains(::testing::Property(          &envoy::service::status::v3::PerXdsConfig::route_config,          EqRoutesConfigDump(::testing::ElementsAre(              EqDynamicRouteConfig(kDefaultRouteConfigurationName, ::testing::_,                                   ClientResourceStatus::DOES_NOT_EXIST,                                   ::testing::_, ::testing::_))))));}TEST_P(CsdsShortAdsTimeoutTest, XdsConfigDumpClusterDoesNotExist) {  int kTimeoutMillisecond = 1000000;  // 1000s wait for the transient failure.  SetNextResolution({});  SetNextResolutionForLbChannelAllBalancers();  balancers_[0]->ads_service()->UnsetResource(kCdsTypeUrl, kDefaultClusterName);  CheckRpcSendFailure(1, RpcOptions().set_timeout_ms(kTimeoutMillisecond),                      grpc::UNAVAILABLE);  auto csds_response = FetchCsdsResponse();  EXPECT_THAT(csds_response.config(0).xds_config(),              ::testing::Contains(::testing::Property(                  &envoy::service::status::v3::PerXdsConfig::cluster_config,                  EqClustersConfigDump(::testing::_,                                       ::testing::ElementsAre(EqDynamicCluster(                                           kDefaultClusterName, ::testing::_,                                           ClientResourceStatus::DOES_NOT_EXIST,                                           ::testing::_))))));}TEST_P(CsdsShortAdsTimeoutTest, XdsConfigDumpEndpointDoesNotExist) {  int kTimeoutMillisecond = 1000000;  // 1000s wait for the transient failure.  SetNextResolution({});  SetNextResolutionForLbChannelAllBalancers();  balancers_[0]->ads_service()->UnsetResource(kEdsTypeUrl,                                              kDefaultEdsServiceName);  CheckRpcSendFailure(1, RpcOptions().set_timeout_ms(kTimeoutMillisecond),                      grpc::UNAVAILABLE);  auto csds_response = FetchCsdsResponse();  EXPECT_THAT(      csds_response.config(0).xds_config(),      ::testing::Contains(::testing::Property(          &envoy::service::status::v3::PerXdsConfig::endpoint_config,          EqEndpointsConfigDump(::testing::ElementsAre(EqDynamicEndpointConfig(              kDefaultEdsServiceName, ::testing::_,              ClientResourceStatus::DOES_NOT_EXIST, ::testing::_, ::testing::_,              ::testing::_))))));}std::string TestTypeName(const ::testing::TestParamInfo<TestType>& info) {  return info.param.AsString();}// Run with all combinations of xds/fake resolver and enabling load reporting.INSTANTIATE_TEST_SUITE_P(    XdsTest, BasicTest,    ::testing::Values(        TestType(), TestType().set_enable_load_reporting(),        TestType().set_use_fake_resolver(),        TestType().set_use_fake_resolver().set_enable_load_reporting()),    &TestTypeName);// Run with both fake resolver and xds resolver.// Don't run with load reporting or v2 or RDS, since they are irrelevant to// the tests.INSTANTIATE_TEST_SUITE_P(XdsTest, SecureNamingTest,                         ::testing::Values(TestType(),                                           TestType().set_use_fake_resolver()),                         &TestTypeName);// LDS depends on XdsResolver.INSTANTIATE_TEST_SUITE_P(XdsTest, LdsTest, ::testing::Values(TestType()),                         &TestTypeName);INSTANTIATE_TEST_SUITE_P(XdsTest, LdsV2Test,                         ::testing::Values(TestType().set_use_v2()),                         &TestTypeName);// LDS/RDS commmon tests depend on XdsResolver.INSTANTIATE_TEST_SUITE_P(    XdsTest, LdsRdsTest,    ::testing::Values(TestType(), TestType().set_enable_rds_testing(),                      // Also test with xDS v2.                      TestType().set_enable_rds_testing().set_use_v2()),    &TestTypeName);// CDS depends on XdsResolver.INSTANTIATE_TEST_SUITE_P(    XdsTest, CdsTest,    ::testing::Values(TestType(), TestType().set_enable_load_reporting()),    &TestTypeName);// CDS depends on XdsResolver.// Security depends on v3.// Not enabling load reporting or RDS, since those are irrelevant to these// tests.INSTANTIATE_TEST_SUITE_P(    XdsTest, XdsSecurityTest,    ::testing::Values(TestType().set_use_xds_credentials()), &TestTypeName);// We are only testing the server here.INSTANTIATE_TEST_SUITE_P(XdsTest, XdsEnabledServerTest,                         ::testing::Values(TestType()), &TestTypeName);// We are only testing the server here.INSTANTIATE_TEST_SUITE_P(XdsTest, XdsServerSecurityTest,                         ::testing::Values(TestType()                                               .set_use_fake_resolver()                                               .set_use_xds_credentials()),                         &TestTypeName);// We are only testing the server here.INSTANTIATE_TEST_SUITE_P(XdsTest, XdsEnabledServerStatusNotificationTest,                         ::testing::Values(TestType()                                               .set_use_fake_resolver()                                               .set_use_xds_credentials()),                         &TestTypeName);// EDS could be tested with or without XdsResolver, but the tests would// be the same either way, so we test it only with XdsResolver.INSTANTIATE_TEST_SUITE_P(    XdsTest, EdsTest,    ::testing::Values(TestType(), TestType().set_enable_load_reporting()),    &TestTypeName);// Test initial resource timeouts for each resource type.// Do this only for XdsResolver with RDS enabled, so that we can test// all resource types.// Run with V3 only, since the functionality is no different in V2.INSTANTIATE_TEST_SUITE_P(XdsTest, TimeoutTest,                         ::testing::Values(TestType().set_enable_rds_testing()),                         &TestTypeName);// XdsResolverOnlyTest depends on XdsResolver.INSTANTIATE_TEST_SUITE_P(    XdsTest, XdsResolverOnlyTest,    ::testing::Values(TestType(), TestType().set_enable_load_reporting()),    &TestTypeName);// XdsResolverLoadReprtingOnlyTest depends on XdsResolver and load reporting.INSTANTIATE_TEST_SUITE_P(    XdsTest, XdsResolverLoadReportingOnlyTest,    ::testing::Values(TestType().set_enable_load_reporting()), &TestTypeName);INSTANTIATE_TEST_SUITE_P(    XdsTest, LocalityMapTest,    ::testing::Values(        TestType(), TestType().set_enable_load_reporting(),        TestType().set_use_fake_resolver(),        TestType().set_use_fake_resolver().set_enable_load_reporting()),    &TestTypeName);INSTANTIATE_TEST_SUITE_P(    XdsTest, FailoverTest,    ::testing::Values(        TestType(), TestType().set_enable_load_reporting(),        TestType().set_use_fake_resolver(),        TestType().set_use_fake_resolver().set_enable_load_reporting()),    &TestTypeName);INSTANTIATE_TEST_SUITE_P(    XdsTest, DropTest,    ::testing::Values(        TestType(), TestType().set_enable_load_reporting(),        TestType().set_use_fake_resolver(),        TestType().set_use_fake_resolver().set_enable_load_reporting()),    &TestTypeName);INSTANTIATE_TEST_SUITE_P(    XdsTest, BalancerUpdateTest,    ::testing::Values(        TestType().set_use_fake_resolver(),        TestType().set_use_fake_resolver().set_enable_load_reporting(),        TestType().set_enable_load_reporting()),    &TestTypeName);// Load reporting tests are not run with load reporting disabled.INSTANTIATE_TEST_SUITE_P(    XdsTest, ClientLoadReportingTest,    ::testing::Values(        TestType().set_enable_load_reporting(),        TestType().set_enable_load_reporting().set_use_fake_resolver()),    &TestTypeName);// Load reporting tests are not run with load reporting disabled.INSTANTIATE_TEST_SUITE_P(    XdsTest, ClientLoadReportingWithDropTest,    ::testing::Values(        TestType().set_enable_load_reporting(),        TestType().set_enable_load_reporting().set_use_fake_resolver()),    &TestTypeName);INSTANTIATE_TEST_SUITE_P(    XdsTest, FaultInjectionTest,    ::testing::Values(        TestType(), TestType().set_enable_rds_testing(),        TestType().set_filter_config_setup(            TestType::FilterConfigSetup::kRouteOverride),        TestType().set_enable_rds_testing().set_filter_config_setup(            TestType::FilterConfigSetup::kRouteOverride)),    &TestTypeName);INSTANTIATE_TEST_SUITE_P(XdsTest, BootstrapContentsFromEnvVarTest,                         ::testing::Values(TestType()), &TestTypeName);// Run CSDS tests with RDS enabled and disabled.INSTANTIATE_TEST_SUITE_P(    XdsTest, ClientStatusDiscoveryServiceTest,    ::testing::Values(        TestType(), TestType().set_enable_rds_testing(),        TestType().set_use_csds_streaming(),        TestType().set_enable_rds_testing().set_use_csds_streaming()),    &TestTypeName);INSTANTIATE_TEST_SUITE_P(    XdsTest, CsdsShortAdsTimeoutTest,    ::testing::Values(        TestType(), TestType().set_enable_rds_testing(),        TestType().set_use_csds_streaming(),        TestType().set_enable_rds_testing().set_use_csds_streaming()),    &TestTypeName);}  // namespace}  // namespace testing}  // namespace grpcint main(int argc, char** argv) {  grpc::testing::TestEnvironment env(argc, argv);  ::testing::InitGoogleTest(&argc, argv);  grpc::testing::WriteBootstrapFiles();  // Make the backup poller poll very frequently in order to pick up  // updates from all the subchannels's FDs.  GPR_GLOBAL_CONFIG_SET(grpc_client_channel_backup_poll_interval_ms, 1);#if TARGET_OS_IPHONE  // Workaround Apple CFStream bug  gpr_setenv("grpc_cfstream", "0");#endif  grpc_core::CertificateProviderRegistry::RegisterCertificateProviderFactory(      absl::make_unique<grpc::testing::FakeCertificateProviderFactory>(          "fake1", &grpc::testing::g_fake1_cert_data_map));  grpc_core::CertificateProviderRegistry::RegisterCertificateProviderFactory(      absl::make_unique<grpc::testing::FakeCertificateProviderFactory>(          "fake2", &grpc::testing::g_fake2_cert_data_map));  grpc_init();  grpc_core::XdsHttpFilterRegistry::RegisterFilter(      absl::make_unique<grpc::testing::NoOpHttpFilter>(          "grpc.testing.client_only_http_filter", true, false),      {"grpc.testing.client_only_http_filter"});  grpc_core::XdsHttpFilterRegistry::RegisterFilter(      absl::make_unique<grpc::testing::NoOpHttpFilter>(          "grpc.testing.server_only_http_filter", false, true),      {"grpc.testing.server_only_http_filter"});  const auto result = RUN_ALL_TESTS();  grpc_shutdown();  return result;}
 |