Skip to content

Commit

Permalink
Add unit test for the added property "perConnectionBufferLimitBytes"
Browse files Browse the repository at this point in the history
  • Loading branch information
RusJaI committed Nov 20, 2023
1 parent 958a1cd commit 4c08686
Showing 1 changed file with 6 additions and 2 deletions.
8 changes: 6 additions & 2 deletions adapter/internal/oasparser/envoyconf/listener_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -45,7 +45,9 @@ func TestCreateListenerWithRds(t *testing.T) {
"Address mismatch for secured Listener.")
assert.NotEmpty(t, securedListener.FilterChains, "Filter chain for listener should not be null.")
assert.NotNil(t, securedListener.FilterChains[0].GetTransportSocket(),
"Transport Socket should not be null for secured listener")
"Transport Socket should not be null for secured listener")
assert.Equal(t, 1048576, securedListener.PerConnectionBufferLimitBytes,
"Buffered payload limit mismatch for secured Listener.")

nonSecuredListener := listeners[1]
if nonSecuredListener.Validate() != nil {
Expand All @@ -57,7 +59,9 @@ func TestCreateListenerWithRds(t *testing.T) {
"Address mismatch for non-secured Listener.")
assert.NotEmpty(t, nonSecuredListener.FilterChains, "Filter chain for listener should not be null.")
assert.Nil(t, nonSecuredListener.FilterChains[0].GetTransportSocket(),
"Transport Socket should be null for non-secured listener")
"Transport Socket should be null for non-secured listener")
assert.Equal(t, 1048576, nonSecuredListener.PerConnectionBufferLimitBytes,
"Buffered payload limit mismatch for non-secured Listener.")
}

func TestCreateVirtualHost(t *testing.T) {
Expand Down

0 comments on commit 4c08686

Please sign in to comment.