Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[DO NOT MERGE] testing flaky tests #1260

Closed
wants to merge 3 commits into from
Closed

Conversation

Christopher-Li
Copy link
Contributor

Changelist

[Describe or list the changes made in this PR]

Test Plan

[Describe how this PR was tested (if applicable)]

Author/Reviewer Checklist

  • If this PR has changes that result in a different app state given the same prior state and transaction list, manually add the state-breaking label.
  • If the PR has breaking postgres changes to the indexer add the indexer-postgres-breaking label.
  • If this PR isn't state-breaking but has changes that modify behavior in PrepareProposal or ProcessProposal, manually add the label proposal-breaking.
  • If this PR is one of many that implement a specific feature, manually label them all feature:[feature-name].
  • If you wish to for mergify-bot to automatically create a PR to backport your change to a release branch, manually add the label backport/[branch-name].
  • Manually add any of the following labels: refactor, chore, bug.

@Christopher-Li Christopher-Li changed the title testing flaky tests [DO NOT MERGE] testing flaky tests Mar 27, 2024
Copy link
Contributor

coderabbitai bot commented Mar 27, 2024

Walkthrough

The modification involves commenting out the line where grpcServer.Serve(ls) is called within a goroutine in the TestClient function of the client protocol's test file.

Changes

File Change Summary
.../slinky/client/client_test.go Commented out the grpcServer.Serve(ls) invocation within a goroutine in the TestClient function.

Thank you for using CodeRabbit. We offer it for free to the OSS community and would appreciate your support in helping us grow. If you find it useful, would you consider giving us a shout-out on your favorite social media?

Share

Tips

Chat

There are 3 ways to chat with CodeRabbit:

  • Review comments: Directly reply to a review comment made by CodeRabbit. Example:
    • I pushed a fix in commit <commit_id>.
    • Generate unit-tests for this file.
    • Open a follow-up GitHub issue for this discussion.
  • Files and specific lines of code (under the "Files changed" tab): Tag @coderabbitai in a new review comment at the desired location with your query. Examples:
    • @coderabbitai generate unit tests for this file.
    • @coderabbitai modularize this function.
  • PR comments: Tag @coderabbitai in a new PR comment to ask questions about the PR branch. For the best results, please provide a very specific query, as very limited context is provided in this mode. Examples:
    • @coderabbitai generate interesting stats about this repository and render them as a table.
    • @coderabbitai show all the console.log statements in this repository.
    • @coderabbitai read src/utils.ts and generate unit tests.
    • @coderabbitai read the files in the src/scheduler package and generate a class diagram using mermaid and a README in the markdown format.

Note: Be mindful of the bot's finite context window. It's strongly recommended to break down tasks such as reading entire modules into smaller chunks. For a focused discussion, use review comments to chat about specific files and their changes, instead of using the PR comments.

CodeRabbit Commands (invoked as PR comments)

  • @coderabbitai pause to pause the reviews on a PR.
  • @coderabbitai resume to resume the paused reviews.
  • @coderabbitai review to trigger a review. This is useful when automatic reviews are disabled for the repository.
  • @coderabbitai resolve resolve all the CodeRabbit review comments.
  • @coderabbitai help to get help.

Additionally, you can add @coderabbitai ignore anywhere in the PR description to prevent this PR from being reviewed.

CodeRabbit Configration File (.coderabbit.yaml)

  • You can programmatically configure CodeRabbit by adding a .coderabbit.yaml file to the root of your repository.
  • The JSON schema for the configuration file is available here.
  • If your editor has YAML language server enabled, you can add the path at the top of this file to enable auto-completion and validation: # yaml-language-server: $schema=https://coderabbit.ai/integrations/coderabbit-overrides.v2.json

CodeRabbit Discord Community

Join our Discord Community to get help, request features, and share feedback.

Copy link
Contributor

@coderabbitai coderabbitai bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Review Status

Actionable comments generated: 1

Configuration used: CodeRabbit UI

Commits Files that changed from the base of the PR and between 7669b1e and c0736cb.
Files selected for processing (1)
  • protocol/daemons/slinky/client/client_test.go (1 hunks)
Additional comments: 1
protocol/daemons/slinky/client/client_test.go (1)
  • 50-50: The changes from lines 50 to 50 involve commenting out the grpcServer.Serve(ls) call. While this might have been done to address flaky tests, it also removes the actual server-client interaction from the test. Consider introducing a test flag or environment variable to conditionally start the server, allowing for both isolated unit testing and integrated server-client interaction testing.

Comment on lines 47 to 53
go func() {
ls, err := net.Listen("tcp", appFlags.GrpcAddress)
require.NoError(t, err)
err = grpcServer.Serve(ls)
// err = grpcServer.Serve(ls)
require.NoError(t, err)
}()

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

📝 NOTE
This review was outside the diff hunks, and no overlapping diff hunk was found. Original lines [33-33]

The gRPC server is created without specifying credentials, which could lead to insecure communication. To secure the gRPC server, consider adding SSL/TLS credentials. Here's an example of how to add credentials to the server:

+ import "google.golang.org/grpc/credentials"

  grpcServer := grpc.NewServer(
+   grpc.Creds(credentials.NewServerTLSFromFile("cert.pem", "cert.key")),
  )

Ensure you have the cert.pem and cert.key files available in your test environment. This change enhances the security of your gRPC communication during testing.

Copy link
Contributor

@coderabbitai coderabbitai bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Review Status

Actionable comments generated: 1

Configuration used: CodeRabbit UI

Commits Files that changed from the base of the PR and between c0736cb and 13e6a7b.
Files selected for processing (1)
  • protocol/daemons/slinky/client/client_test.go (1 hunks)

Copy link
Contributor

@coderabbitai coderabbitai bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Review Status

Actionable comments generated: 2

Configuration used: CodeRabbit UI

Commits Files that changed from the base of the PR and between 13e6a7b and acfad46.
Files selected for processing (1)
  • protocol/daemons/slinky/client/client_test.go (2 hunks)

Comment on lines +46 to +53
/*
go func() {
ls, err := net.Listen("tcp", appFlags.GrpcAddress)
require.NoError(t, err)
err = grpcServer.Serve(ls)
require.NoError(t, err)
}()
*/
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The changes from lines 47 to 54 involve commenting out the gRPC server setup within a goroutine. While this might be an attempt to address flaky tests, it's essential to investigate the root cause of the flakiness. Disabling parts of the test setup can reduce the test's effectiveness in simulating real-world scenarios. Consider alternative solutions that maintain the integrity of the test setup, such as adjusting timeouts, using more deterministic data, or isolating external dependencies.

Would you like assistance in exploring alternative solutions to address the test flakiness while keeping the test setup intact?

Comment on lines 2 to 7

import (
"context"
"net"
"testing"
"time"

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

📝 NOTE
This review was outside the diff hunks, and no overlapping diff hunk was found. Original lines [32-32]

The gRPC server is created without specifying credentials, which could lead to insecure communication. Even though this is a test environment, adopting best practices for secure communication is beneficial. Consider adding SSL/TLS credentials to the gRPC server setup. Here's an example of how to add credentials to the server:

+ import "google.golang.org/grpc/credentials"

  grpcServer := grpc.NewServer(
+   grpc.Creds(credentials.NewServerTLSFromFile("cert.pem", "cert.key")),
  )

Ensure you have the cert.pem and cert.key files available in your test environment. This change enhances the security of your gRPC communication during testing.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Development

Successfully merging this pull request may close these issues.

1 participant