@@ -32,6 +32,7 @@ import (
32
32
"time"
33
33
34
34
"go.temporal.io/server/common/clock"
35
+ "go.temporal.io/server/common/persistence/visibility/store/standard/cassandra"
35
36
"go.temporal.io/server/common/resourcetest"
36
37
37
38
"google.golang.org/grpc/health"
@@ -553,7 +554,7 @@ func (s *adminHandlerSuite) Test_AddSearchAttributes() {
553
554
554
555
mockSdkClient := mocksdk .NewMockClient (s .controller )
555
556
s .mockResource .SDKClientFactory .EXPECT ().GetSystemClient ().Return (mockSdkClient ).AnyTimes ()
556
- s .mockVisibilityMgr .EXPECT ().GetName ( ).Return (elasticsearch . PersistenceName ).AnyTimes ()
557
+ s .mockVisibilityMgr .EXPECT ().HasStoreName ( elasticsearch . PersistenceName ).Return (true ).AnyTimes ()
557
558
558
559
// Start workflow failed.
559
560
mockSdkClient .EXPECT ().ExecuteWorkflow (gomock .Any (), gomock .Any (), "temporal-sys-add-search-attributes-workflow" , gomock .Any ()).Return (nil , errors .New ("start failed" ))
@@ -606,7 +607,7 @@ func (s *adminHandlerSuite) Test_GetSearchAttributes_EmptyIndexName() {
606
607
s .mockNamespaceCache .EXPECT ().GetNamespace (s .namespace ).Return (s .namespaceEntry , nil ).AnyTimes ()
607
608
608
609
// Elasticsearch is not configured
609
- s .mockVisibilityMgr .EXPECT ().GetName ( ).Return (elasticsearch . PersistenceName ).AnyTimes ()
610
+ s .mockVisibilityMgr .EXPECT ().HasStoreName ( elasticsearch . PersistenceName ).Return (true ).AnyTimes ()
610
611
s .mockVisibilityMgr .EXPECT ().GetIndexName ().Return ("" ).AnyTimes ()
611
612
mockSdkClient .EXPECT ().DescribeWorkflowExecution (gomock .Any (), "temporal-sys-add-search-attributes-workflow" , "" ).Return (
612
613
& workflowservice.DescribeWorkflowExecutionResponse {}, nil )
@@ -626,7 +627,7 @@ func (s *adminHandlerSuite) Test_GetSearchAttributes_NonEmptyIndexName() {
626
627
s .mockResource .SDKClientFactory .EXPECT ().GetSystemClient ().Return (mockSdkClient ).AnyTimes ()
627
628
628
629
// Configure Elasticsearch: add advanced visibility store config with index name.
629
- s .mockVisibilityMgr .EXPECT ().GetName ( ).Return (elasticsearch . PersistenceName ).AnyTimes ()
630
+ s .mockVisibilityMgr .EXPECT ().HasStoreName ( elasticsearch . PersistenceName ).Return (true ).AnyTimes ()
630
631
s .mockVisibilityMgr .EXPECT ().GetIndexName ().Return ("random-index-name" ).AnyTimes ()
631
632
632
633
mockSdkClient .EXPECT ().DescribeWorkflowExecution (gomock .Any (), "temporal-sys-add-search-attributes-workflow" , "" ).Return (
@@ -685,7 +686,7 @@ func (s *adminHandlerSuite) Test_RemoveSearchAttributes_EmptyIndexName() {
685
686
}
686
687
687
688
// Elasticsearch is not configured
688
- s .mockVisibilityMgr .EXPECT ().GetName ( ).Return (elasticsearch . PersistenceName ).AnyTimes ()
689
+ s .mockVisibilityMgr .EXPECT ().HasStoreName ( elasticsearch . PersistenceName ).Return (true ).AnyTimes ()
689
690
s .mockVisibilityMgr .EXPECT ().GetIndexName ().Return ("" ).AnyTimes ()
690
691
s .mockResource .SearchAttributesProvider .EXPECT ().GetSearchAttributes ("" , true ).Return (searchattribute .TestNameTypeMap , nil ).AnyTimes ()
691
692
testCases2 := []test {
@@ -748,7 +749,7 @@ func (s *adminHandlerSuite) Test_RemoveSearchAttributes_NonEmptyIndexName() {
748
749
}
749
750
750
751
// Configure Elasticsearch: add advanced visibility store config with index name.
751
- s .mockVisibilityMgr .EXPECT ().GetName ( ).Return (elasticsearch . PersistenceName ).AnyTimes ()
752
+ s .mockVisibilityMgr .EXPECT ().HasStoreName ( elasticsearch . PersistenceName ).Return (true ).AnyTimes ()
752
753
s .mockVisibilityMgr .EXPECT ().GetIndexName ().Return ("random-index-name" ).AnyTimes ()
753
754
s .mockResource .SearchAttributesProvider .EXPECT ().GetSearchAttributes ("random-index-name" , true ).Return (searchattribute .TestNameTypeMap , nil ).AnyTimes ()
754
755
for _ , testCase := range testCases {
@@ -1162,7 +1163,7 @@ func (s *adminHandlerSuite) Test_DescribeCluster_CurrentCluster_Success() {
1162
1163
s .mockResource .WorkerServiceResolver .EXPECT ().Members ().Return ([]* membership.HostInfo {})
1163
1164
s .mockResource .WorkerServiceResolver .EXPECT ().MemberCount ().Return (0 )
1164
1165
s .mockResource .ExecutionMgr .EXPECT ().GetName ().Return ("" )
1165
- s .mockVisibilityMgr .EXPECT ().GetName ().Return ("" )
1166
+ s .mockVisibilityMgr .EXPECT ().GetStoreNames ().Return ([] string { elasticsearch . PersistenceName } )
1166
1167
s .mockClusterMetadataManager .EXPECT ().GetClusterMetadata (gomock .Any (), & persistence.GetClusterMetadataRequest {ClusterName : clusterName }).Return (
1167
1168
& persistence.GetClusterMetadataResponse {
1168
1169
ClusterMetadata : persistencespb.ClusterMetadata {
@@ -1201,7 +1202,7 @@ func (s *adminHandlerSuite) Test_DescribeCluster_NonCurrentCluster_Success() {
1201
1202
s .mockResource .WorkerServiceResolver .EXPECT ().Members ().Return ([]* membership.HostInfo {})
1202
1203
s .mockResource .WorkerServiceResolver .EXPECT ().MemberCount ().Return (0 )
1203
1204
s .mockResource .ExecutionMgr .EXPECT ().GetName ().Return ("" )
1204
- s .mockVisibilityMgr .EXPECT ().GetName ().Return ("" )
1205
+ s .mockVisibilityMgr .EXPECT ().GetStoreNames ().Return ([] string { elasticsearch . PersistenceName } )
1205
1206
s .mockClusterMetadataManager .EXPECT ().GetClusterMetadata (gomock .Any (), & persistence.GetClusterMetadataRequest {ClusterName : clusterName }).Return (
1206
1207
& persistence.GetClusterMetadataResponse {
1207
1208
ClusterMetadata : persistencespb.ClusterMetadata {
@@ -1257,7 +1258,7 @@ func (s *adminHandlerSuite) TestDeleteWorkflowExecution_DeleteCurrentExecution()
1257
1258
}
1258
1259
1259
1260
s .mockNamespaceCache .EXPECT ().GetNamespaceID (s .namespace ).Return (s .namespaceID , nil ).AnyTimes ()
1260
- s .mockVisibilityMgr .EXPECT ().GetName ( ).Return ("elasticsearch" ). AnyTimes ( )
1261
+ s .mockVisibilityMgr .EXPECT ().HasStoreName ( cassandra . CassandraPersistenceName ).Return (false )
1261
1262
1262
1263
s .mockExecutionMgr .EXPECT ().GetCurrentExecution (gomock .Any (), gomock .Any ()).Return (nil , errors .New ("some random error" ))
1263
1264
resp , err := s .handler .DeleteWorkflowExecution (context .Background (), request )
@@ -1332,7 +1333,7 @@ func (s *adminHandlerSuite) TestDeleteWorkflowExecution_LoadMutableStateFailed()
1332
1333
}
1333
1334
1334
1335
s .mockNamespaceCache .EXPECT ().GetNamespaceID (s .namespace ).Return (s .namespaceID , nil ).AnyTimes ()
1335
- s .mockVisibilityMgr .EXPECT ().GetName ( ).Return ("elasticsearch" ). AnyTimes ( )
1336
+ s .mockVisibilityMgr .EXPECT ().HasStoreName ( cassandra . CassandraPersistenceName ).Return (false )
1336
1337
1337
1338
s .mockExecutionMgr .EXPECT ().GetWorkflowExecution (gomock .Any (), gomock .Any ()).Return (nil , errors .New ("some random error" ))
1338
1339
s .mockHistoryClient .EXPECT ().DeleteWorkflowVisibilityRecord (gomock .Any (), gomock .Any ()).Return (& historyservice.DeleteWorkflowVisibilityRecordResponse {}, nil )
@@ -1355,7 +1356,7 @@ func (s *adminHandlerSuite) TestDeleteWorkflowExecution_CassandraVisibilityBacke
1355
1356
}
1356
1357
1357
1358
s .mockNamespaceCache .EXPECT ().GetNamespaceID (s .namespace ).Return (s .namespaceID , nil ).AnyTimes ()
1358
- s .mockVisibilityMgr .EXPECT ().GetName ( ).Return ("elasticsearch,cassandra" ).AnyTimes ()
1359
+ s .mockVisibilityMgr .EXPECT ().HasStoreName ( cassandra . CassandraPersistenceName ).Return (true ).AnyTimes ()
1359
1360
1360
1361
// test delete open records
1361
1362
branchToken := []byte ("branchToken" )
0 commit comments