diff --git a/src/NATS.Server/Protocol/ProxyProtocol.cs b/src/NATS.Server/Protocol/ProxyProtocol.cs
new file mode 100644
index 0000000..df175fb
--- /dev/null
+++ b/src/NATS.Server/Protocol/ProxyProtocol.cs
@@ -0,0 +1,356 @@
+using System.Buffers.Binary;
+using System.Net;
+using System.Text;
+
+namespace NATS.Server.Protocol;
+
+///
+/// Contains the source and destination address information extracted from a PROXY protocol header.
+/// Ported from golang/nats-server/server/client_proxyproto.go.
+///
+public sealed class ProxyAddress
+{
+ public required IPAddress SrcIp { get; init; }
+ public required ushort SrcPort { get; init; }
+ public required IPAddress DstIp { get; init; }
+ public required ushort DstPort { get; init; }
+
+ public string Network => SrcIp.AddressFamily == System.Net.Sockets.AddressFamily.InterNetwork ? "tcp4" : "tcp6";
+
+ public override string ToString() =>
+ SrcIp.AddressFamily == System.Net.Sockets.AddressFamily.InterNetworkV6
+ ? $"[{SrcIp}]:{SrcPort}"
+ : $"{SrcIp}:{SrcPort}";
+}
+
+///
+/// Result returned from .
+///
+public enum ProxyParseResultKind
+{
+ /// PROXY command — address info is in .
+ Proxy,
+ /// LOCAL command (v2) or UNKNOWN (v1) — no address override; treat as direct connection.
+ Local,
+}
+
+public sealed class ProxyParseResult
+{
+ public required ProxyParseResultKind Kind { get; init; }
+ public ProxyAddress? Address { get; init; }
+}
+
+///
+/// Pure-parsing PROXY protocol v1/v2 parser. Operates on byte buffers rather than
+/// live sockets so that it can be tested without I/O infrastructure.
+/// Reference: golang/nats-server/server/client_proxyproto.go
+///
+public static class ProxyProtocolParser
+{
+ // -------------------------------------------------------------------------
+ // Constants mirrored from client_proxyproto.go
+ // -------------------------------------------------------------------------
+
+ private const string V2Sig = "\x0D\x0A\x0D\x0A\x00\x0D\x0A\x51\x55\x49\x54\x0A";
+
+ // v2 version/command byte
+ private const byte V2VerMask = 0xF0;
+ private const byte V2Ver = 0x20; // version nibble == 2
+ private const byte CmdMask = 0x0F;
+ private const byte CmdLocal = 0x00;
+ private const byte CmdProxy = 0x01;
+
+ // v2 family/protocol byte
+ private const byte FamilyMask = 0xF0;
+ private const byte FamilyUnspec = 0x00;
+ private const byte FamilyInet = 0x10; // IPv4
+ private const byte FamilyInet6 = 0x20; // IPv6
+ private const byte FamilyUnix = 0x30; // Unix sockets
+ private const byte ProtoMask = 0x0F;
+ private const byte ProtoUnspec = 0x00;
+ private const byte ProtoStream = 0x01; // TCP
+ private const byte ProtoDatagram = 0x02; // UDP
+
+ // Address block sizes (bytes)
+ private const int AddrSizeIPv4 = 12; // 4+4+2+2
+ private const int AddrSizeIPv6 = 36; // 16+16+2+2
+
+ // v2 fixed header size: 12 (sig) + 1 (ver/cmd) + 1 (fam/proto) + 2 (addr-len)
+ private const int V2HeaderSize = 16;
+
+ // v1 text protocol
+ private const string V1Prefix = "PROXY ";
+ private const int V1MaxLineLen = 107;
+
+ ///
+ /// Parses a complete PROXY protocol header from the supplied bytes.
+ /// Auto-detects v1 (text) or v2 (binary). The supplied span must contain the
+ /// entire header (up to the CRLF for v1, or the full fixed+address block for v2).
+ /// Throws for malformed input.
+ ///
+ public static ProxyParseResult Parse(ReadOnlySpan data)
+ {
+ if (data.Length < 6)
+ throw new ProxyProtocolException("Header too short to detect version");
+
+ // Detect version by reading first 6 bytes
+ var prefix = Encoding.ASCII.GetString(data[..6]);
+ if (prefix == V1Prefix)
+ return ParseV1(data[6..]);
+
+ var sigPrefix = V2Sig[..6];
+ if (prefix == sigPrefix)
+ return ParseV2(data);
+
+ throw new ProxyProtocolException("Unrecognized PROXY protocol format");
+ }
+
+ // -------------------------------------------------------------------------
+ // v1 parsing
+ // -------------------------------------------------------------------------
+
+ ///
+ /// Parses PROXY protocol v1 text format.
+ /// Expects the "PROXY " prefix (6 bytes) to have already been stripped.
+ /// Reference: readProxyProtoV1Header (client_proxyproto.go:134)
+ ///
+ public static ProxyParseResult ParseV1(ReadOnlySpan afterPrefix)
+ {
+ if (afterPrefix.Length > V1MaxLineLen - 6)
+ afterPrefix = afterPrefix[..(V1MaxLineLen - 6)];
+
+ // Find CRLF
+ int crlfIdx = -1;
+ for (int i = 0; i < afterPrefix.Length - 1; i++)
+ {
+ if (afterPrefix[i] == '\r' && afterPrefix[i + 1] == '\n')
+ {
+ crlfIdx = i;
+ break;
+ }
+ }
+ if (crlfIdx < 0)
+ throw new ProxyProtocolException("PROXY v1 line too long or no CRLF found");
+
+ var line = Encoding.ASCII.GetString(afterPrefix[..crlfIdx]);
+ var parts = line.Split(' ', StringSplitOptions.RemoveEmptyEntries);
+
+ if (parts.Length < 1)
+ throw new ProxyProtocolException("Invalid PROXY v1 format");
+
+ if (parts[0] == "UNKNOWN")
+ return new ProxyParseResult { Kind = ProxyParseResultKind.Local };
+
+ if (parts.Length != 5)
+ throw new ProxyProtocolException("Invalid PROXY v1 format: expected 5 fields");
+
+ var protocol = parts[0];
+ var srcIp = IPAddress.TryParse(parts[1], out var si) ? si : null;
+ var dstIp = IPAddress.TryParse(parts[2], out var di) ? di : null;
+
+ if (srcIp == null || dstIp == null)
+ throw new ProxyProtocolException("Invalid address in PROXY v1 header");
+
+ if (!ushort.TryParse(parts[3], out var srcPort))
+ throw new ProxyProtocolException($"Invalid source port: {parts[3]}");
+ if (!ushort.TryParse(parts[4], out var dstPort))
+ throw new ProxyProtocolException($"Invalid destination port: {parts[4]}");
+
+ // Additional range validation — ushort.TryParse already limits to 0-65535
+ // but Go rejects 99999+ which ushort.TryParse would fail anyway.
+
+ if (protocol == "TCP4" && srcIp.AddressFamily != System.Net.Sockets.AddressFamily.InterNetwork)
+ throw new ProxyProtocolException("TCP4 with non-IPv4 address");
+ if (protocol == "TCP6" && srcIp.AddressFamily != System.Net.Sockets.AddressFamily.InterNetworkV6)
+ throw new ProxyProtocolException("TCP6 with non-IPv6 address");
+ if (protocol != "TCP4" && protocol != "TCP6")
+ throw new ProxyProtocolException($"Unsupported protocol: {protocol}");
+
+ return new ProxyParseResult
+ {
+ Kind = ProxyParseResultKind.Proxy,
+ Address = new ProxyAddress
+ {
+ SrcIp = srcIp,
+ SrcPort = srcPort,
+ DstIp = dstIp,
+ DstPort = dstPort,
+ },
+ };
+ }
+
+ // -------------------------------------------------------------------------
+ // v2 parsing
+ // -------------------------------------------------------------------------
+
+ ///
+ /// Parses a full PROXY protocol v2 binary header including signature.
+ /// Reference: readProxyProtoV2Header / parseProxyProtoV2Header (client_proxyproto.go:274)
+ ///
+ public static ProxyParseResult ParseV2(ReadOnlySpan data)
+ {
+ if (data.Length < V2HeaderSize)
+ throw new ProxyProtocolException("Truncated PROXY v2 header");
+
+ // Verify full 12-byte signature
+ var sig = Encoding.ASCII.GetString(data[..12]);
+ if (sig != V2Sig)
+ throw new ProxyProtocolException("Invalid PROXY v2 signature");
+
+ return ParseV2AfterSig(data[12..]);
+ }
+
+ ///
+ /// Parses the 4 header bytes (ver/cmd, fam/proto, addr-len) that follow the
+ /// 12-byte signature, then the variable-length address block.
+ /// Reference: parseProxyProtoV2Header (client_proxyproto.go:301)
+ ///
+ public static ProxyParseResult ParseV2AfterSig(ReadOnlySpan header)
+ {
+ if (header.Length < 4)
+ throw new ProxyProtocolException("Truncated PROXY v2 header after signature");
+
+ var verCmd = header[0];
+ var famProto = header[1];
+ var addrLen = BinaryPrimitives.ReadUInt16BigEndian(header[2..4]);
+
+ var version = verCmd & V2VerMask;
+ var command = verCmd & CmdMask;
+ var family = famProto & FamilyMask;
+ var proto = famProto & ProtoMask;
+
+ if (version != V2Ver)
+ throw new ProxyProtocolException($"Invalid PROXY v2 version 0x{version:X2}");
+
+ // LOCAL command — discard any address data
+ if (command == CmdLocal)
+ return new ProxyParseResult { Kind = ProxyParseResultKind.Local };
+
+ if (command != CmdProxy)
+ throw new ProxyProtocolException($"Unknown PROXY v2 command 0x{command:X2}");
+
+ // Only STREAM (TCP) is supported
+ if (proto != ProtoStream)
+ throw new ProxyProtocolUnsupportedException("Only STREAM protocol supported");
+
+ var addrData = header[4..];
+ if (addrData.Length < addrLen)
+ throw new ProxyProtocolException("Truncated PROXY v2 address data");
+
+ return family switch
+ {
+ FamilyInet => ParseIPv4(addrData, addrLen),
+ FamilyInet6 => ParseIPv6(addrData, addrLen),
+ FamilyUnspec => new ProxyParseResult { Kind = ProxyParseResultKind.Local },
+ FamilyUnix => throw new ProxyProtocolUnsupportedException($"Unsupported address family 0x{family:X2}"),
+ _ => throw new ProxyProtocolUnsupportedException($"Unsupported address family 0x{family:X2}"),
+ };
+ }
+
+ private static ProxyParseResult ParseIPv4(ReadOnlySpan data, ushort addrLen)
+ {
+ if (addrLen < AddrSizeIPv4)
+ throw new ProxyProtocolException($"IPv4 address data too short: {addrLen}");
+ if (data.Length < AddrSizeIPv4)
+ throw new ProxyProtocolException("Truncated IPv4 address data");
+
+ var srcIp = new IPAddress(data[..4]);
+ var dstIp = new IPAddress(data[4..8]);
+ var srcPort = BinaryPrimitives.ReadUInt16BigEndian(data[8..10]);
+ var dstPort = BinaryPrimitives.ReadUInt16BigEndian(data[10..12]);
+
+ return new ProxyParseResult
+ {
+ Kind = ProxyParseResultKind.Proxy,
+ Address = new ProxyAddress { SrcIp = srcIp, SrcPort = srcPort, DstIp = dstIp, DstPort = dstPort },
+ };
+ }
+
+ private static ProxyParseResult ParseIPv6(ReadOnlySpan data, ushort addrLen)
+ {
+ if (addrLen < AddrSizeIPv6)
+ throw new ProxyProtocolException($"IPv6 address data too short: {addrLen}");
+ if (data.Length < AddrSizeIPv6)
+ throw new ProxyProtocolException("Truncated IPv6 address data");
+
+ var srcIp = new IPAddress(data[..16]);
+ var dstIp = new IPAddress(data[16..32]);
+ var srcPort = BinaryPrimitives.ReadUInt16BigEndian(data[32..34]);
+ var dstPort = BinaryPrimitives.ReadUInt16BigEndian(data[34..36]);
+
+ return new ProxyParseResult
+ {
+ Kind = ProxyParseResultKind.Proxy,
+ Address = new ProxyAddress { SrcIp = srcIp, SrcPort = srcPort, DstIp = dstIp, DstPort = dstPort },
+ };
+ }
+
+ // -------------------------------------------------------------------------
+ // Helpers for building test payloads (public for test accessibility)
+ // -------------------------------------------------------------------------
+
+ /// Builds a valid PROXY v2 binary header for the given parameters.
+ public static byte[] BuildV2Header(
+ string srcIp, string dstIp, ushort srcPort, ushort dstPort, bool isIPv6 = false)
+ {
+ var src = IPAddress.Parse(srcIp);
+ var dst = IPAddress.Parse(dstIp);
+ var family = isIPv6 ? FamilyInet6 : FamilyInet;
+
+ byte[] addrData;
+ if (!isIPv6)
+ {
+ addrData = new byte[AddrSizeIPv4];
+ src.GetAddressBytes().CopyTo(addrData, 0);
+ dst.GetAddressBytes().CopyTo(addrData, 4);
+ BinaryPrimitives.WriteUInt16BigEndian(addrData.AsSpan(8), srcPort);
+ BinaryPrimitives.WriteUInt16BigEndian(addrData.AsSpan(10), dstPort);
+ }
+ else
+ {
+ addrData = new byte[AddrSizeIPv6];
+ src.GetAddressBytes().CopyTo(addrData, 0);
+ dst.GetAddressBytes().CopyTo(addrData, 16);
+ BinaryPrimitives.WriteUInt16BigEndian(addrData.AsSpan(32), srcPort);
+ BinaryPrimitives.WriteUInt16BigEndian(addrData.AsSpan(34), dstPort);
+ }
+
+ var ms = new System.IO.MemoryStream();
+ ms.Write(Encoding.ASCII.GetBytes(V2Sig));
+ ms.WriteByte(V2Ver | CmdProxy);
+ ms.WriteByte((byte)(family | ProtoStream));
+ var lenBytes = new byte[2];
+ BinaryPrimitives.WriteUInt16BigEndian(lenBytes, (ushort)addrData.Length);
+ ms.Write(lenBytes);
+ ms.Write(addrData);
+ return ms.ToArray();
+ }
+
+ /// Builds a PROXY v2 LOCAL command header (health-check).
+ public static byte[] BuildV2LocalHeader()
+ {
+ var ms = new System.IO.MemoryStream();
+ ms.Write(Encoding.ASCII.GetBytes(V2Sig));
+ ms.WriteByte(V2Ver | CmdLocal);
+ ms.WriteByte(FamilyUnspec | ProtoUnspec);
+ ms.WriteByte(0);
+ ms.WriteByte(0);
+ return ms.ToArray();
+ }
+
+ /// Builds a PROXY v1 text header.
+ public static byte[] BuildV1Header(
+ string protocol, string srcIp, string dstIp, ushort srcPort, ushort dstPort)
+ {
+ var line = protocol == "UNKNOWN"
+ ? "PROXY UNKNOWN\r\n"
+ : $"PROXY {protocol} {srcIp} {dstIp} {srcPort} {dstPort}\r\n";
+ return Encoding.ASCII.GetBytes(line);
+ }
+}
+
+/// Thrown when a PROXY protocol header is malformed.
+public sealed class ProxyProtocolException(string message) : Exception(message);
+
+/// Thrown when a PROXY protocol feature is not supported (e.g. UDP, Unix sockets).
+public sealed class ProxyProtocolUnsupportedException(string message) : Exception(message);
diff --git a/tests/NATS.Server.Tests/Protocol/ProxyProtocolTests.cs b/tests/NATS.Server.Tests/Protocol/ProxyProtocolTests.cs
new file mode 100644
index 0000000..d2a89ee
--- /dev/null
+++ b/tests/NATS.Server.Tests/Protocol/ProxyProtocolTests.cs
@@ -0,0 +1,514 @@
+// Go reference: golang/nats-server/server/client_proxyproto_test.go
+// Ports the PROXY protocol v1 and v2 parsing tests from the Go implementation.
+// The Go implementation uses a mock net.Conn; here we work directly with byte
+// buffers via the pure-parser surface ProxyProtocolParser.
+
+using System.Buffers.Binary;
+using System.Net;
+using System.Text;
+using NATS.Server.Protocol;
+
+namespace NATS.Server.Tests;
+
+///
+/// PROXY protocol v1/v2 parser tests.
+/// Ported from golang/nats-server/server/client_proxyproto_test.go.
+///
+public class ProxyProtocolTests
+{
+ // -------------------------------------------------------------------------
+ // Build helpers (mirror the Go buildProxy* helpers)
+ // -------------------------------------------------------------------------
+
+ /// Wraps the static builder for convenience inside tests.
+ private static byte[] BuildV2Header(
+ string srcIp, string dstIp, ushort srcPort, ushort dstPort, bool ipv6 = false)
+ => ProxyProtocolParser.BuildV2Header(srcIp, dstIp, srcPort, dstPort, ipv6);
+
+ private static byte[] BuildV2LocalHeader()
+ => ProxyProtocolParser.BuildV2LocalHeader();
+
+ private static byte[] BuildV1Header(
+ string protocol, string srcIp = "", string dstIp = "", ushort srcPort = 0, ushort dstPort = 0)
+ => ProxyProtocolParser.BuildV1Header(protocol, srcIp, dstIp, srcPort, dstPort);
+
+ // =========================================================================
+ // PROXY protocol v2 tests
+ // =========================================================================
+
+ ///
+ /// Parses a well-formed v2 PROXY header carrying an IPv4 source address and
+ /// verifies that the extracted src/dst IP, port, and network string are correct.
+ /// Ref: TestClientProxyProtoV2ParseIPv4 (client_proxyproto_test.go:155)
+ ///
+ [Fact]
+ public void V2_parses_IPv4_address()
+ {
+ var header = BuildV2Header("192.168.1.50", "10.0.0.1", 12345, 4222);
+ var result = ProxyProtocolParser.Parse(header);
+
+ result.Kind.ShouldBe(ProxyParseResultKind.Proxy);
+ result.Address.ShouldNotBeNull();
+ result.Address.SrcIp.ToString().ShouldBe("192.168.1.50");
+ result.Address.SrcPort.ShouldBe((ushort)12345);
+ result.Address.DstIp.ToString().ShouldBe("10.0.0.1");
+ result.Address.DstPort.ShouldBe((ushort)4222);
+ result.Address.ToString().ShouldBe("192.168.1.50:12345");
+ result.Address.Network.ShouldBe("tcp4");
+ }
+
+ ///
+ /// Parses a well-formed v2 PROXY header carrying an IPv6 source address and
+ /// verifies that the extracted src/dst IP, port, and network string are correct.
+ /// Ref: TestClientProxyProtoV2ParseIPv6 (client_proxyproto_test.go:174)
+ ///
+ [Fact]
+ public void V2_parses_IPv6_address()
+ {
+ var header = BuildV2Header("2001:db8::1", "2001:db8::2", 54321, 4222, ipv6: true);
+ var result = ProxyProtocolParser.Parse(header);
+
+ result.Kind.ShouldBe(ProxyParseResultKind.Proxy);
+ result.Address.ShouldNotBeNull();
+ result.Address.SrcIp.ToString().ShouldBe("2001:db8::1");
+ result.Address.SrcPort.ShouldBe((ushort)54321);
+ result.Address.DstIp.ToString().ShouldBe("2001:db8::2");
+ result.Address.DstPort.ShouldBe((ushort)4222);
+ result.Address.ToString().ShouldBe("[2001:db8::1]:54321");
+ result.Address.Network.ShouldBe("tcp6");
+ }
+
+ ///
+ /// A LOCAL command header (health check) must parse successfully and return
+ /// a Local result with no address.
+ /// Ref: TestClientProxyProtoV2ParseLocalCommand (client_proxyproto_test.go:193)
+ ///
+ [Fact]
+ public void V2_LOCAL_command_returns_local_result()
+ {
+ var header = BuildV2LocalHeader();
+ var result = ProxyProtocolParser.Parse(header);
+
+ result.Kind.ShouldBe(ProxyParseResultKind.Local);
+ result.Address.ShouldBeNull();
+ }
+
+ ///
+ /// A v2 header with an invalid 12-byte signature must throw
+ /// . The test calls
+ /// directly so the full-signature check is exercised (auto-detection would classify the
+ /// buffer as "unrecognized" before reaching the signature comparison).
+ /// Ref: TestClientProxyProtoV2InvalidSignature (client_proxyproto_test.go:202)
+ ///
+ [Fact]
+ public void V2_invalid_signature_throws()
+ {
+ // Build a 16-byte buffer whose first 12 bytes are garbage — ParseV2 must
+ // reject it because the full signature comparison fails.
+ var header = new byte[16];
+ Encoding.ASCII.GetBytes("INVALID_SIG_").CopyTo(header, 0);
+ header[12] = 0x20; // ver/cmd
+ header[13] = 0x11; // fam/proto
+ header[14] = 0x00;
+ header[15] = 0x0C;
+
+ // Use ParseV2 directly — this validates the complete 12-byte signature.
+ Should.Throw(() => ProxyProtocolParser.ParseV2(header));
+ }
+
+ ///
+ /// A v2 header where the version nibble is not 2 must be rejected.
+ /// Ref: TestClientProxyProtoV2InvalidVersion (client_proxyproto_test.go:212)
+ ///
+ [Fact]
+ public void V2_invalid_version_nibble_throws()
+ {
+ var ms = new MemoryStream();
+ ms.Write(Encoding.ASCII.GetBytes("\x0D\x0A\x0D\x0A\x00\x0D\x0A\x51\x55\x49\x54\x0A")); // valid sig
+ ms.WriteByte(0x10 | 0x01); // version = 1 (wrong), command = PROXY
+ ms.WriteByte(0x10 | 0x01); // family = IPv4, proto = STREAM
+ ms.WriteByte(0x00);
+ ms.WriteByte(0x00);
+
+ Should.Throw(() => ProxyProtocolParser.ParseV2(ms.ToArray()));
+ }
+
+ ///
+ /// A v2 PROXY command with the Unix socket address family must be rejected
+ /// with an unsupported-feature exception.
+ /// Ref: TestClientProxyProtoV2UnsupportedFamily (client_proxyproto_test.go:226)
+ ///
+ [Fact]
+ public void V2_unix_socket_family_is_unsupported()
+ {
+ var ms = new MemoryStream();
+ ms.Write(Encoding.ASCII.GetBytes("\x0D\x0A\x0D\x0A\x00\x0D\x0A\x51\x55\x49\x54\x0A"));
+ ms.WriteByte(0x20 | 0x01); // ver=2, cmd=PROXY
+ ms.WriteByte(0x30 | 0x01); // family=Unix, proto=STREAM
+ ms.WriteByte(0x00);
+ ms.WriteByte(0x00);
+
+ Should.Throw(() => ProxyProtocolParser.ParseV2(ms.ToArray()));
+ }
+
+ ///
+ /// A v2 PROXY command with the UDP (Datagram) protocol must be rejected
+ /// with an unsupported-feature exception.
+ /// Ref: TestClientProxyProtoV2UnsupportedProtocol (client_proxyproto_test.go:240)
+ ///
+ [Fact]
+ public void V2_datagram_protocol_is_unsupported()
+ {
+ var ms = new MemoryStream();
+ ms.Write(Encoding.ASCII.GetBytes("\x0D\x0A\x0D\x0A\x00\x0D\x0A\x51\x55\x49\x54\x0A"));
+ ms.WriteByte(0x20 | 0x01); // ver=2, cmd=PROXY
+ ms.WriteByte(0x10 | 0x02); // family=IPv4, proto=DATAGRAM (UDP)
+ ms.WriteByte(0x00);
+ ms.WriteByte(0x0C); // addr-len = 12
+
+ Should.Throw(() => ProxyProtocolParser.ParseV2(ms.ToArray()));
+ }
+
+ ///
+ /// A truncated v2 header (only 10 of the required 16 bytes) must throw.
+ /// Ref: TestClientProxyProtoV2TruncatedHeader (client_proxyproto_test.go:254)
+ ///
+ [Fact]
+ public void V2_truncated_header_throws()
+ {
+ var full = BuildV2Header("192.168.1.50", "10.0.0.1", 12345, 4222);
+ Should.Throw(() => ProxyProtocolParser.Parse(full[..10]));
+ }
+
+ ///
+ /// A v2 header whose address-length field says 12 bytes but the buffer
+ /// supplies only 5 bytes must throw.
+ /// Ref: TestClientProxyProtoV2ShortAddressData (client_proxyproto_test.go:263)
+ ///
+ [Fact]
+ public void V2_short_address_data_throws()
+ {
+ var ms = new MemoryStream();
+ ms.Write(Encoding.ASCII.GetBytes("\x0D\x0A\x0D\x0A\x00\x0D\x0A\x51\x55\x49\x54\x0A"));
+ ms.WriteByte(0x20 | 0x01); // ver=2, cmd=PROXY
+ ms.WriteByte(0x10 | 0x01); // family=IPv4, proto=STREAM
+ ms.WriteByte(0x00);
+ ms.WriteByte(0x0C); // addr-len = 12
+ // Write only 5 bytes of address data instead of 12
+ ms.Write(new byte[] { 1, 2, 3, 4, 5 });
+
+ Should.Throw(() => ProxyProtocolParser.ParseV2(ms.ToArray()));
+ }
+
+ ///
+ /// ProxyAddress.ToString() returns "ip:port" for IPv4 and "[ip]:port" for IPv6;
+ /// ProxyAddress.Network() returns "tcp4" or "tcp6" accordingly.
+ /// Ref: TestProxyConnRemoteAddr (client_proxyproto_test.go:280)
+ ///
+ [Fact]
+ public void ProxyAddress_string_and_network_are_correct()
+ {
+ var ipv4Addr = new ProxyAddress
+ {
+ SrcIp = IPAddress.Parse("10.0.0.50"),
+ SrcPort = 12345,
+ DstIp = IPAddress.Parse("10.0.0.1"),
+ DstPort = 4222,
+ };
+ ipv4Addr.ToString().ShouldBe("10.0.0.50:12345");
+ ipv4Addr.Network.ShouldBe("tcp4");
+
+ var ipv6Addr = new ProxyAddress
+ {
+ SrcIp = IPAddress.Parse("2001:db8::1"),
+ SrcPort = 54321,
+ DstIp = IPAddress.Parse("2001:db8::2"),
+ DstPort = 4222,
+ };
+ ipv6Addr.ToString().ShouldBe("[2001:db8::1]:54321");
+ ipv6Addr.Network.ShouldBe("tcp6");
+ }
+
+ // =========================================================================
+ // PROXY protocol v1 tests
+ // =========================================================================
+
+ ///
+ /// A well-formed TCP4 v1 header is parsed and the source address is returned.
+ /// Ref: TestClientProxyProtoV1ParseTCP4 (client_proxyproto_test.go:416)
+ ///
+ [Fact]
+ public void V1_parses_TCP4_address()
+ {
+ var header = BuildV1Header("TCP4", "192.168.1.50", "10.0.0.1", 12345, 4222);
+ var result = ProxyProtocolParser.Parse(header);
+
+ result.Kind.ShouldBe(ProxyParseResultKind.Proxy);
+ result.Address.ShouldNotBeNull();
+ result.Address.SrcIp.ToString().ShouldBe("192.168.1.50");
+ result.Address.SrcPort.ShouldBe((ushort)12345);
+ result.Address.DstIp.ToString().ShouldBe("10.0.0.1");
+ result.Address.DstPort.ShouldBe((ushort)4222);
+ }
+
+ ///
+ /// A well-formed TCP6 v1 header is parsed and the source IPv6 address is returned.
+ /// Ref: TestClientProxyProtoV1ParseTCP6 (client_proxyproto_test.go:431)
+ ///
+ [Fact]
+ public void V1_parses_TCP6_address()
+ {
+ var header = BuildV1Header("TCP6", "2001:db8::1", "2001:db8::2", 54321, 4222);
+ var result = ProxyProtocolParser.Parse(header);
+
+ result.Kind.ShouldBe(ProxyParseResultKind.Proxy);
+ result.Address.ShouldNotBeNull();
+ result.Address.SrcIp.ToString().ShouldBe("2001:db8::1");
+ result.Address.SrcPort.ShouldBe((ushort)54321);
+ result.Address.DstIp.ToString().ShouldBe("2001:db8::2");
+ result.Address.DstPort.ShouldBe((ushort)4222);
+ }
+
+ ///
+ /// An UNKNOWN v1 header (health check) must return a Local result with no address.
+ /// Ref: TestClientProxyProtoV1ParseUnknown (client_proxyproto_test.go:446)
+ ///
+ [Fact]
+ public void V1_UNKNOWN_returns_local_result()
+ {
+ var header = BuildV1Header("UNKNOWN");
+ var result = ProxyProtocolParser.Parse(header);
+
+ result.Kind.ShouldBe(ProxyParseResultKind.Local);
+ result.Address.ShouldBeNull();
+ }
+
+ ///
+ /// A v1 header with too few fields (e.g. missing port tokens) must throw.
+ /// Ref: TestClientProxyProtoV1InvalidFormat (client_proxyproto_test.go:455)
+ ///
+ [Fact]
+ public void V1_missing_fields_throws()
+ {
+ // "PROXY TCP4 192.168.1.1\r\n" — only 1 token after PROXY
+ var header = Encoding.ASCII.GetBytes("PROXY TCP4 192.168.1.1\r\n");
+ Should.Throw(() => ProxyProtocolParser.Parse(header));
+ }
+
+ ///
+ /// A v1 line longer than 107 bytes without a CRLF must throw.
+ /// Ref: TestClientProxyProtoV1LineTooLong (client_proxyproto_test.go:464)
+ ///
+ [Fact]
+ public void V1_line_too_long_throws()
+ {
+ var longIp = new string('1', 120);
+ var header = Encoding.ASCII.GetBytes($"PROXY TCP4 {longIp} 10.0.0.1 12345 443\r\n");
+ Should.Throw(() => ProxyProtocolParser.Parse(header));
+ }
+
+ ///
+ /// A v1 header whose IP token is not a parseable IP address must throw.
+ /// Ref: TestClientProxyProtoV1InvalidIP (client_proxyproto_test.go:474)
+ ///
+ [Fact]
+ public void V1_invalid_IP_address_throws()
+ {
+ var header = Encoding.ASCII.GetBytes("PROXY TCP4 not.an.ip.addr 10.0.0.1 12345 443\r\n");
+ Should.Throw(() => ProxyProtocolParser.Parse(header));
+ }
+
+ ///
+ /// TCP4 protocol with an IPv6 source address, and TCP6 protocol with an IPv4
+ /// source address, must both throw a protocol-mismatch exception.
+ /// Ref: TestClientProxyProtoV1MismatchedProtocol (client_proxyproto_test.go:482)
+ ///
+ [Fact]
+ public void V1_TCP4_with_IPv6_address_throws()
+ {
+ var header = BuildV1Header("TCP4", "2001:db8::1", "2001:db8::2", 12345, 443);
+ Should.Throw(() => ProxyProtocolParser.Parse(header));
+ }
+
+ [Fact]
+ public void V1_TCP6_with_IPv4_address_throws()
+ {
+ var header = BuildV1Header("TCP6", "192.168.1.1", "10.0.0.1", 12345, 443);
+ Should.Throw(() => ProxyProtocolParser.Parse(header));
+ }
+
+ ///
+ /// A port value that exceeds 65535 cannot be parsed as ushort and must throw.
+ /// Ref: TestClientProxyProtoV1InvalidPort (client_proxyproto_test.go:498)
+ ///
+ [Fact]
+ public void V1_port_out_of_range_throws()
+ {
+ var header = Encoding.ASCII.GetBytes("PROXY TCP4 192.168.1.1 10.0.0.1 99999 443\r\n");
+ Should.Throw(() => ProxyProtocolParser.Parse(header));
+ }
+
+ // =========================================================================
+ // Mixed version detection tests
+ // =========================================================================
+
+ ///
+ /// The auto-detection logic correctly routes a "PROXY " prefix to the v1 parser
+ /// and a binary v2 signature to the v2 parser, extracting the correct source address.
+ /// Ref: TestClientProxyProtoVersionDetection (client_proxyproto_test.go:567)
+ ///
+ [Fact]
+ public void Auto_detection_routes_v1_and_v2_correctly()
+ {
+ var v1Header = BuildV1Header("TCP4", "192.168.1.1", "10.0.0.1", 12345, 443);
+ var r1 = ProxyProtocolParser.Parse(v1Header);
+ r1.Kind.ShouldBe(ProxyParseResultKind.Proxy);
+ r1.Address!.SrcIp.ToString().ShouldBe("192.168.1.1");
+
+ var v2Header = BuildV2Header("192.168.1.2", "10.0.0.1", 54321, 443);
+ var r2 = ProxyProtocolParser.Parse(v2Header);
+ r2.Kind.ShouldBe(ProxyParseResultKind.Proxy);
+ r2.Address!.SrcIp.ToString().ShouldBe("192.168.1.2");
+ }
+
+ ///
+ /// A header that starts with neither "PROXY " nor the v2 binary signature must
+ /// throw a indicating the format is unrecognized.
+ /// Ref: TestClientProxyProtoUnrecognizedVersion (client_proxyproto_test.go:587)
+ ///
+ [Fact]
+ public void Unrecognized_header_throws()
+ {
+ var header = Encoding.ASCII.GetBytes("HELLO WORLD\r\n");
+ Should.Throw(() => ProxyProtocolParser.Parse(header));
+ }
+
+ ///
+ /// A data buffer shorter than 6 bytes cannot carry any valid PROXY header prefix
+ /// and must throw.
+ ///
+ [Fact]
+ public void Too_short_input_throws()
+ {
+ Should.Throw(() => ProxyProtocolParser.Parse(new byte[] { 0x50, 0x52 }));
+ }
+
+ // =========================================================================
+ // Additional edge cases (not directly from Go tests but needed for full coverage)
+ // =========================================================================
+
+ ///
+ /// ParseV1 operating directly on the bytes after the "PROXY " prefix correctly
+ /// extracts a TCP4 address without going through the auto-detector.
+ ///
+ [Fact]
+ public void ParseV1_direct_entry_point_works()
+ {
+ var afterPrefix = Encoding.ASCII.GetBytes("TCP4 1.2.3.4 5.6.7.8 1234 4222\r\n");
+ var result = ProxyProtocolParser.ParseV1(afterPrefix);
+
+ result.Kind.ShouldBe(ProxyParseResultKind.Proxy);
+ result.Address!.SrcIp.ToString().ShouldBe("1.2.3.4");
+ result.Address.SrcPort.ShouldBe((ushort)1234);
+ }
+
+ ///
+ /// ParseV2AfterSig operating on the 4-byte post-signature header correctly parses
+ /// a PROXY command with the full IPv4 address block appended.
+ ///
+ [Fact]
+ public void ParseV2AfterSig_direct_entry_point_works()
+ {
+ // Build just the 4 header bytes + 12 address bytes (no sig)
+ var ms = new MemoryStream();
+ ms.WriteByte(0x20 | 0x01); // ver=2, cmd=PROXY
+ ms.WriteByte(0x10 | 0x01); // family=IPv4, proto=STREAM
+ ms.WriteByte(0x00);
+ ms.WriteByte(0x0C); // addr-len = 12
+ // src IP 192.168.0.1, dst IP 10.0.0.1, src port 9999, dst port 4222
+ ms.Write(IPAddress.Parse("192.168.0.1").GetAddressBytes());
+ ms.Write(IPAddress.Parse("10.0.0.1").GetAddressBytes());
+ var ports = new byte[4];
+ BinaryPrimitives.WriteUInt16BigEndian(ports.AsSpan(0), 9999);
+ BinaryPrimitives.WriteUInt16BigEndian(ports.AsSpan(2), 4222);
+ ms.Write(ports);
+
+ var result = ProxyProtocolParser.ParseV2AfterSig(ms.ToArray());
+ result.Kind.ShouldBe(ProxyParseResultKind.Proxy);
+ result.Address!.SrcIp.ToString().ShouldBe("192.168.0.1");
+ result.Address.SrcPort.ShouldBe((ushort)9999);
+ result.Address.DstPort.ShouldBe((ushort)4222);
+ }
+
+ ///
+ /// A v2 UNSPEC family with PROXY command returns a Local result (no address override).
+ /// The Go implementation discards unspec address data and returns nil addr.
+ ///
+ [Fact]
+ public void V2_UNSPEC_family_returns_local()
+ {
+ var ms = new MemoryStream();
+ ms.Write(Encoding.ASCII.GetBytes("\x0D\x0A\x0D\x0A\x00\x0D\x0A\x51\x55\x49\x54\x0A"));
+ ms.WriteByte(0x20 | 0x01); // ver=2, cmd=PROXY
+ ms.WriteByte(0x00 | 0x01); // family=UNSPEC, proto=STREAM
+ ms.WriteByte(0x00);
+ ms.WriteByte(0x00); // addr-len = 0
+
+ var result = ProxyProtocolParser.ParseV2(ms.ToArray());
+ result.Kind.ShouldBe(ProxyParseResultKind.Local);
+ result.Address.ShouldBeNull();
+ }
+
+ ///
+ /// BuildV2Header round-trips — parsing the output of the builder yields the same
+ /// addresses that were passed in, for both IPv4 and IPv6.
+ ///
+ [Fact]
+ public void BuildV2Header_round_trips_IPv4()
+ {
+ var bytes = BuildV2Header("203.0.113.50", "127.0.0.1", 54321, 4222);
+ var result = ProxyProtocolParser.Parse(bytes);
+
+ result.Kind.ShouldBe(ProxyParseResultKind.Proxy);
+ result.Address!.SrcIp.ToString().ShouldBe("203.0.113.50");
+ result.Address.SrcPort.ShouldBe((ushort)54321);
+ result.Address.DstIp.ToString().ShouldBe("127.0.0.1");
+ result.Address.DstPort.ShouldBe((ushort)4222);
+ }
+
+ [Fact]
+ public void BuildV2Header_round_trips_IPv6()
+ {
+ var bytes = BuildV2Header("fe80::1", "fe80::2", 1234, 4222, ipv6: true);
+ var result = ProxyProtocolParser.Parse(bytes);
+
+ result.Kind.ShouldBe(ProxyParseResultKind.Proxy);
+ result.Address!.Network.ShouldBe("tcp6");
+ result.Address.SrcPort.ShouldBe((ushort)1234);
+ }
+
+ ///
+ /// BuildV1Header round-trips for both TCP4 and TCP6 lines.
+ ///
+ [Fact]
+ public void BuildV1Header_round_trips_TCP4()
+ {
+ var bytes = BuildV1Header("TCP4", "203.0.113.50", "127.0.0.1", 54321, 4222);
+ var result = ProxyProtocolParser.Parse(bytes);
+
+ result.Kind.ShouldBe(ProxyParseResultKind.Proxy);
+ result.Address!.SrcIp.ToString().ShouldBe("203.0.113.50");
+ result.Address.SrcPort.ShouldBe((ushort)54321);
+ }
+
+ [Fact]
+ public void BuildV1Header_round_trips_TCP6()
+ {
+ var bytes = BuildV1Header("TCP6", "2001:db8::cafe", "2001:db8::1", 11111, 4222);
+ var result = ProxyProtocolParser.Parse(bytes);
+
+ result.Kind.ShouldBe(ProxyParseResultKind.Proxy);
+ result.Address!.SrcIp.ToString().ShouldBe("2001:db8::cafe");
+ result.Address.SrcPort.ShouldBe((ushort)11111);
+ }
+}
diff --git a/tests/NATS.Server.Tests/Subscriptions/SubListGoParityTests.cs b/tests/NATS.Server.Tests/Subscriptions/SubListGoParityTests.cs
new file mode 100644
index 0000000..b8ee5e9
--- /dev/null
+++ b/tests/NATS.Server.Tests/Subscriptions/SubListGoParityTests.cs
@@ -0,0 +1,869 @@
+// Go reference: golang/nats-server/server/sublist_test.go
+// Ports Go sublist tests not yet covered by SubListTests.cs or the SubList/ subfolder.
+
+using NATS.Server.Subscriptions;
+
+namespace NATS.Server.Tests;
+
+///
+/// Go parity tests for SubList ported from sublist_test.go.
+/// Covers basic multi-token matching, wildcard removal, cache eviction,
+/// subject-validity helpers, queue results, reverse match, HasInterest,
+/// NumInterest, and cache hit-rate statistics.
+///
+public class SubListGoParityTests
+{
+ // -------------------------------------------------------------------------
+ // Helpers
+ // -------------------------------------------------------------------------
+ private static Subscription MakeSub(string subject, string? queue = null, string sid = "1")
+ => new() { Subject = subject, Queue = queue, Sid = sid };
+
+ // =========================================================================
+ // Basic insert / match
+ // =========================================================================
+
+ ///
+ /// Single-token subject round-trips through insert and match.
+ /// Ref: TestSublistInit / TestSublistInsertCount (sublist_test.go:117,122)
+ ///
+ [Fact]
+ public void Init_count_is_zero_and_grows_with_inserts()
+ {
+ var sl = new SubList();
+ sl.Count.ShouldBe(0u);
+ sl.Insert(MakeSub("foo", sid: "1"));
+ sl.Insert(MakeSub("bar", sid: "2"));
+ sl.Insert(MakeSub("foo.bar", sid: "3"));
+ sl.Count.ShouldBe(3u);
+ }
+
+ ///
+ /// A multi-token literal subject matches itself exactly.
+ /// Ref: TestSublistSimpleMultiTokens (sublist_test.go:154)
+ ///
+ [Fact]
+ public void Simple_multi_token_match()
+ {
+ var sl = new SubList();
+ var sub = MakeSub("foo.bar.baz");
+ sl.Insert(sub);
+
+ var r = sl.Match("foo.bar.baz");
+ r.PlainSubs.ShouldHaveSingleItem();
+ r.PlainSubs[0].ShouldBeSameAs(sub);
+ }
+
+ ///
+ /// A partial wildcard at the end of a pattern matches the final literal token.
+ /// Ref: TestSublistPartialWildcardAtEnd (sublist_test.go:190)
+ ///
+ [Fact]
+ public void Partial_wildcard_at_end_matches_final_token()
+ {
+ var sl = new SubList();
+ var lsub = MakeSub("a.b.c", sid: "1");
+ var psub = MakeSub("a.b.*", sid: "2");
+ sl.Insert(lsub);
+ sl.Insert(psub);
+
+ var r = sl.Match("a.b.c");
+ r.PlainSubs.Length.ShouldBe(2);
+ r.PlainSubs.ShouldContain(lsub);
+ r.PlainSubs.ShouldContain(psub);
+ }
+
+ ///
+ /// Subjects with two tokens do not match a single-token subscription.
+ /// Ref: TestSublistTwoTokenPubMatchSingleTokenSub (sublist_test.go:749)
+ ///
+ [Fact]
+ public void Two_token_pub_does_not_match_single_token_sub()
+ {
+ var sl = new SubList();
+ var sub = MakeSub("foo");
+ sl.Insert(sub);
+
+ sl.Match("foo").PlainSubs.ShouldHaveSingleItem();
+ sl.Match("foo.bar").PlainSubs.ShouldBeEmpty();
+ }
+
+ // =========================================================================
+ // Removal with wildcards
+ // =========================================================================
+
+ ///
+ /// Removing wildcard subscriptions decrements the count and clears match results.
+ /// Ref: TestSublistRemoveWildcard (sublist_test.go:255)
+ ///
+ [Fact]
+ public void Remove_wildcard_subscriptions()
+ {
+ var sl = new SubList();
+ var sub = MakeSub("a.b.c.d", sid: "1");
+ var psub = MakeSub("a.b.*.d", sid: "2");
+ var fsub = MakeSub("a.b.>", sid: "3");
+ sl.Insert(sub);
+ sl.Insert(psub);
+ sl.Insert(fsub);
+ sl.Count.ShouldBe(3u);
+
+ sl.Match("a.b.c.d").PlainSubs.Length.ShouldBe(3);
+
+ sl.Remove(sub);
+ sl.Count.ShouldBe(2u);
+ sl.Remove(fsub);
+ sl.Count.ShouldBe(1u);
+ sl.Remove(psub);
+ sl.Count.ShouldBe(0u);
+ sl.Match("a.b.c.d").PlainSubs.ShouldBeEmpty();
+ }
+
+ ///
+ /// Inserting a subscription with a wildcard literal token (e.g. "foo.*-") and
+ /// then removing it leaves the list empty and no spurious match on "foo.bar".
+ /// Ref: TestSublistRemoveWithWildcardsAsLiterals (sublist_test.go:789)
+ ///
+ [Theory]
+ [InlineData("foo.*-")]
+ [InlineData("foo.>-")]
+ public void Remove_with_wildcard_as_literal(string subject)
+ {
+ var sl = new SubList();
+ var sub = MakeSub(subject);
+ sl.Insert(sub);
+
+ // Removing a non-existent subscription does nothing
+ sl.Remove(MakeSub("foo.bar"));
+ sl.Count.ShouldBe(1u);
+
+ sl.Remove(sub);
+ sl.Count.ShouldBe(0u);
+ }
+
+ // =========================================================================
+ // Cache behaviour
+ // =========================================================================
+
+ ///
+ /// After inserting three subscriptions, adding a new wildcard subscription
+ /// invalidates the cached result and subsequent matches include the new sub.
+ /// Ref: TestSublistCache (sublist_test.go:423)
+ ///
+ [Fact]
+ public void Cache_invalidated_by_subsequent_inserts()
+ {
+ var sl = new SubList();
+ var sub = MakeSub("a.b.c.d", sid: "1");
+ var psub = MakeSub("a.b.*.d", sid: "2");
+ var fsub = MakeSub("a.b.>", sid: "3");
+
+ sl.Insert(sub);
+ sl.Match("a.b.c.d").PlainSubs.ShouldHaveSingleItem();
+
+ sl.Insert(psub);
+ sl.Insert(fsub);
+ sl.Count.ShouldBe(3u);
+
+ var r = sl.Match("a.b.c.d");
+ r.PlainSubs.Length.ShouldBe(3);
+ r.PlainSubs.ShouldContain(sub);
+ r.PlainSubs.ShouldContain(psub);
+ r.PlainSubs.ShouldContain(fsub);
+
+ sl.Remove(sub);
+ sl.Remove(fsub);
+ sl.Remove(psub);
+ sl.Count.ShouldBe(0u);
+ // Cache is cleared by each removal (generation bump), but a subsequent Match
+ // may re-populate it with an empty result — verify no matching subs are found.
+ sl.Match("a.b.c.d").PlainSubs.ShouldBeEmpty();
+ }
+
+ ///
+ /// Inserting a fwc sub after cache has been primed causes the next match to
+ /// return all three matching subs.
+ /// Ref: TestSublistCache (wildcard part) (sublist_test.go:465)
+ ///
+ [Fact]
+ public void Cache_updated_when_new_wildcard_inserted()
+ {
+ var sl = new SubList();
+ sl.Insert(MakeSub("foo.*", sid: "1"));
+ sl.Insert(MakeSub("foo.bar", sid: "2"));
+
+ sl.Match("foo.baz").PlainSubs.ShouldHaveSingleItem();
+ sl.Match("foo.bar").PlainSubs.Length.ShouldBe(2);
+
+ sl.Insert(MakeSub("foo.>", sid: "3"));
+ sl.Match("foo.bar").PlainSubs.Length.ShouldBe(3);
+ }
+
+ ///
+ /// Empty result is a shared singleton — two calls that yield no matches return
+ /// the same object reference.
+ /// Ref: TestSublistSharedEmptyResult (sublist_test.go:1049)
+ ///
+ [Fact]
+ public void Empty_result_is_shared_singleton()
+ {
+ var sl = new SubList();
+ var r1 = sl.Match("foo");
+ var r2 = sl.Match("bar");
+ r1.PlainSubs.ShouldBeEmpty();
+ r2.PlainSubs.ShouldBeEmpty();
+ ReferenceEquals(r1, r2).ShouldBeTrue();
+ }
+
+ // =========================================================================
+ // Queue subscriptions
+ // =========================================================================
+
+ ///
+ /// After inserting two queue groups, adding a plain sub makes it visible
+ /// in PlainSubs; adding more members to each group expands QueueSubs.
+ /// Removing members correctly shrinks group counts.
+ /// Ref: TestSublistBasicQueueResults (sublist_test.go:486)
+ ///
+ [Fact]
+ public void Basic_queue_results_lifecycle()
+ {
+ var sl = new SubList();
+ const string subject = "foo";
+ var sub = MakeSub(subject, sid: "plain");
+ var sub1 = MakeSub(subject, queue: "bar", sid: "q1");
+ var sub2 = MakeSub(subject, queue: "baz", sid: "q2");
+ var sub3 = MakeSub(subject, queue: "bar", sid: "q3");
+ var sub4 = MakeSub(subject, queue: "baz", sid: "q4");
+
+ sl.Insert(sub1);
+ var r = sl.Match(subject);
+ r.PlainSubs.ShouldBeEmpty();
+ r.QueueSubs.Length.ShouldBe(1);
+
+ sl.Insert(sub2);
+ r = sl.Match(subject);
+ r.QueueSubs.Length.ShouldBe(2);
+
+ sl.Insert(sub);
+ r = sl.Match(subject);
+ r.PlainSubs.ShouldHaveSingleItem();
+ r.QueueSubs.Length.ShouldBe(2);
+
+ sl.Insert(sub3);
+ sl.Insert(sub4);
+ r = sl.Match(subject);
+ r.PlainSubs.ShouldHaveSingleItem();
+ r.QueueSubs.Length.ShouldBe(2);
+ // Each group should have 2 members
+ r.QueueSubs.ShouldAllBe(g => g.Length == 2);
+
+ // Remove the plain sub
+ sl.Remove(sub);
+ r = sl.Match(subject);
+ r.PlainSubs.ShouldBeEmpty();
+ r.QueueSubs.Length.ShouldBe(2);
+
+ // Remove one member from "bar" group
+ sl.Remove(sub1);
+ r = sl.Match(subject);
+ r.QueueSubs.Length.ShouldBe(2); // both groups still present
+
+ // Remove remaining "bar" member
+ sl.Remove(sub3);
+ r = sl.Match(subject);
+ r.QueueSubs.Length.ShouldBe(1); // only "baz" group remains
+
+ // Remove both "baz" members
+ sl.Remove(sub2);
+ sl.Remove(sub4);
+ r = sl.Match(subject);
+ r.PlainSubs.ShouldBeEmpty();
+ r.QueueSubs.ShouldBeEmpty();
+ }
+
+ // =========================================================================
+ // Subject validity helpers
+ // =========================================================================
+
+ ///
+ /// IsValidPublishSubject (IsLiteral) rejects wildcard tokens and partial-wildcard
+ /// embedded in longer tokens is treated as a literal.
+ /// Ref: TestSublistValidLiteralSubjects (sublist_test.go:585)
+ ///
+ [Theory]
+ [InlineData("foo", true)]
+ [InlineData(".foo", false)]
+ [InlineData("foo.", false)]
+ [InlineData("foo..bar", false)]
+ [InlineData("foo.bar.*", false)]
+ [InlineData("foo.bar.>", false)]
+ [InlineData("*", false)]
+ [InlineData(">", false)]
+ [InlineData("foo*", true)] // embedded * not a wildcard
+ [InlineData("foo**", true)]
+ [InlineData("foo.**", true)]
+ [InlineData("foo*bar", true)]
+ [InlineData("foo.*bar", true)]
+ [InlineData("foo*.bar", true)]
+ [InlineData("*bar", true)]
+ [InlineData("foo>", true)]
+ [InlineData("foo>>", true)]
+ [InlineData("foo.>>", true)]
+ [InlineData("foo>bar", true)]
+ [InlineData("foo.>bar", true)]
+ [InlineData("foo>.bar", true)]
+ [InlineData(">bar", true)]
+ public void IsValidPublishSubject_cases(string subject, bool expected)
+ {
+ // Ref: TestSublistValidLiteralSubjects (sublist_test.go:585)
+ SubjectMatch.IsValidPublishSubject(subject).ShouldBe(expected);
+ }
+
+ ///
+ /// IsValidSubject accepts subjects with embedded wildcard characters
+ /// that are not standalone tokens, and rejects subjects with empty tokens.
+ /// Ref: TestSublistValidSubjects (sublist_test.go:612)
+ ///
+ [Theory]
+ [InlineData(".", false)]
+ [InlineData(".foo", false)]
+ [InlineData("foo.", false)]
+ [InlineData("foo..bar", false)]
+ [InlineData(">.bar", false)]
+ [InlineData("foo.>.bar", false)]
+ [InlineData("foo", true)]
+ [InlineData("foo.bar.*", true)]
+ [InlineData("foo.bar.>", true)]
+ [InlineData("*", true)]
+ [InlineData(">", true)]
+ [InlineData("foo*", true)]
+ [InlineData("foo**", true)]
+ [InlineData("foo.**", true)]
+ [InlineData("foo*bar", true)]
+ [InlineData("foo.*bar", true)]
+ [InlineData("foo*.bar", true)]
+ [InlineData("*bar", true)]
+ [InlineData("foo>", true)]
+ [InlineData("foo>>", true)]
+ [InlineData("foo.>>", true)]
+ [InlineData("foo>bar", true)]
+ [InlineData("foo.>bar", true)]
+ [InlineData("foo>.bar", true)]
+ [InlineData(">bar", true)]
+ public void IsValidSubject_cases(string subject, bool expected)
+ {
+ // Ref: TestSublistValidSubjects (sublist_test.go:612)
+ SubjectMatch.IsValidSubject(subject).ShouldBe(expected);
+ }
+
+ ///
+ /// IsLiteral correctly identifies subjects with embedded wildcard characters
+ /// (but not standalone wildcard tokens) as literal.
+ /// Ref: TestSubjectIsLiteral (sublist_test.go:673)
+ ///
+ [Theory]
+ [InlineData("foo", true)]
+ [InlineData("foo.bar", true)]
+ [InlineData("foo*.bar", true)]
+ [InlineData("*", false)]
+ [InlineData(">", false)]
+ [InlineData("foo.*", false)]
+ [InlineData("foo.>", false)]
+ [InlineData("foo.*.>", false)]
+ [InlineData("foo.*.bar", false)]
+ [InlineData("foo.bar.>", false)]
+ public void IsLiteral_cases(string subject, bool expected)
+ {
+ // Ref: TestSubjectIsLiteral (sublist_test.go:673)
+ SubjectMatch.IsLiteral(subject).ShouldBe(expected);
+ }
+
+ ///
+ /// MatchLiteral handles embedded wildcard-chars-as-literals correctly.
+ /// Ref: TestSublistMatchLiterals (sublist_test.go:644)
+ ///
+ [Theory]
+ [InlineData("foo", "foo", true)]
+ [InlineData("foo", "bar", false)]
+ [InlineData("foo", "*", true)]
+ [InlineData("foo", ">", true)]
+ [InlineData("foo.bar", ">", true)]
+ [InlineData("foo.bar", "foo.>", true)]
+ [InlineData("foo.bar", "bar.>", false)]
+ [InlineData("stats.test.22", "stats.>", true)]
+ [InlineData("stats.test.22", "stats.*.*", true)]
+ [InlineData("foo.bar", "foo", false)]
+ [InlineData("stats.test.foos","stats.test.foos",true)]
+ [InlineData("stats.test.foos","stats.test.foo", false)]
+ [InlineData("stats.test", "stats.test.*", false)]
+ [InlineData("stats.test.foos","stats.*", false)]
+ [InlineData("stats.test.foos","stats.*.*.foos", false)]
+ // Embedded wildcard chars treated as literals
+ [InlineData("*bar", "*bar", true)]
+ [InlineData("foo*", "foo*", true)]
+ [InlineData("foo*bar", "foo*bar", true)]
+ [InlineData("foo.***.bar", "foo.***.bar", true)]
+ [InlineData(">bar", ">bar", true)]
+ [InlineData("foo>", "foo>", true)]
+ [InlineData("foo>bar", "foo>bar", true)]
+ [InlineData("foo.>>>.bar", "foo.>>>.bar", true)]
+ public void MatchLiteral_extended_cases(string literal, string pattern, bool expected)
+ {
+ // Ref: TestSublistMatchLiterals (sublist_test.go:644)
+ SubjectMatch.MatchLiteral(literal, pattern).ShouldBe(expected);
+ }
+
+ // =========================================================================
+ // Subject collide / subset
+ // =========================================================================
+
+ ///
+ /// SubjectsCollide correctly identifies whether two subject patterns can
+ /// match the same literal subject.
+ /// Ref: TestSublistSubjectCollide (sublist_test.go:1548)
+ ///
+ [Theory]
+ [InlineData("foo.*", "foo.*.bar.>", false)]
+ [InlineData("foo.*.bar.>", "foo.*", false)]
+ [InlineData("foo.*", "foo.foo", true)]
+ [InlineData("foo.*", "*.foo", true)]
+ [InlineData("foo.bar.>", "*.bar.foo", true)]
+ public void SubjectsCollide_cases(string s1, string s2, bool expected)
+ {
+ // Ref: TestSublistSubjectCollide (sublist_test.go:1548)
+ SubjectMatch.SubjectsCollide(s1, s2).ShouldBe(expected);
+ }
+
+ // =========================================================================
+ // tokenAt (0-based in .NET vs 1-based in Go)
+ // =========================================================================
+
+ ///
+ /// TokenAt returns the nth dot-separated token (0-based in .NET).
+ /// The Go tokenAt helper uses 1-based indexing with "" for index 0; the .NET
+ /// port uses 0-based indexing throughout.
+ /// Ref: TestSubjectToken (sublist_test.go:707)
+ ///
+ [Theory]
+ [InlineData("foo.bar.baz.*", 0, "foo")]
+ [InlineData("foo.bar.baz.*", 1, "bar")]
+ [InlineData("foo.bar.baz.*", 2, "baz")]
+ [InlineData("foo.bar.baz.*", 3, "*")]
+ [InlineData("foo.bar.baz.*", 4, "")] // out of range
+ public void TokenAt_zero_based(string subject, int index, string expected)
+ {
+ // Ref: TestSubjectToken (sublist_test.go:707)
+ SubjectMatch.TokenAt(subject, index).ToString().ShouldBe(expected);
+ }
+
+ // =========================================================================
+ // Stats / cache hit rate
+ // =========================================================================
+
+ ///
+ /// Cache hit rate is computed correctly after 4 Match calls on the same subject
+ /// (first call misses, subsequent three hit the cache).
+ /// Ref: TestSublistAddCacheHitRate (sublist_test.go:1556)
+ ///
+ [Fact]
+ public void Cache_hit_rate_is_computed_correctly()
+ {
+ var sl = new SubList();
+ sl.Insert(MakeSub("foo"));
+ for (var i = 0; i < 4; i++)
+ sl.Match("foo");
+
+ // 4 calls total, first is a cache miss, next 3 hit → 3/4 = 0.75
+ var stats = sl.Stats();
+ stats.CacheHitRate.ShouldBe(0.75, 1e-9);
+ }
+
+ ///
+ /// Stats.NumCache is 0 when cache is empty (no matches have been performed yet).
+ /// Ref: TestSublistNoCacheStats (sublist_test.go:1064)
+ ///
+ [Fact]
+ public void Stats_NumCache_reflects_cache_population()
+ {
+ var sl = new SubList();
+ sl.Insert(MakeSub("foo", sid: "1"));
+ sl.Insert(MakeSub("bar", sid: "2"));
+ sl.Insert(MakeSub("baz", sid: "3"));
+ sl.Insert(MakeSub("foo.bar.baz", sid: "4"));
+
+ // No matches performed yet — cache should be empty
+ sl.Stats().NumCache.ShouldBe(0u);
+
+ sl.Match("a.b.c");
+ sl.Match("bar");
+
+ // Two distinct subjects have been matched, so cache should have 2 entries
+ sl.Stats().NumCache.ShouldBe(2u);
+ }
+
+ // =========================================================================
+ // HasInterest
+ // =========================================================================
+
+ ///
+ /// HasInterest returns true for subjects with matching subscriptions and false
+ /// otherwise, including after removal. Wildcard subscriptions match correctly.
+ /// Ref: TestSublistHasInterest (sublist_test.go:1609)
+ ///
+ [Fact]
+ public void HasInterest_with_plain_and_wildcard_subs()
+ {
+ var sl = new SubList();
+ var fooSub = MakeSub("foo", sid: "1");
+ sl.Insert(fooSub);
+
+ sl.HasInterest("foo").ShouldBeTrue();
+ sl.HasInterest("bar").ShouldBeFalse();
+
+ sl.Remove(fooSub);
+ sl.HasInterest("foo").ShouldBeFalse();
+
+ // Partial wildcard
+ var pwcSub = MakeSub("foo.*", sid: "2");
+ sl.Insert(pwcSub);
+ sl.HasInterest("foo").ShouldBeFalse();
+ sl.HasInterest("foo.bar").ShouldBeTrue();
+ sl.HasInterest("foo.bar.baz").ShouldBeFalse();
+
+ sl.Remove(pwcSub);
+ sl.HasInterest("foo.bar").ShouldBeFalse();
+
+ // Full wildcard
+ var fwcSub = MakeSub("foo.>", sid: "3");
+ sl.Insert(fwcSub);
+ sl.HasInterest("foo").ShouldBeFalse();
+ sl.HasInterest("foo.bar").ShouldBeTrue();
+ sl.HasInterest("foo.bar.baz").ShouldBeTrue();
+
+ sl.Remove(fwcSub);
+ sl.HasInterest("foo.bar").ShouldBeFalse();
+ sl.HasInterest("foo.bar.baz").ShouldBeFalse();
+ }
+
+ ///
+ /// HasInterest handles queue subscriptions: a queue sub creates interest
+ /// even though PlainSubs is empty.
+ /// Ref: TestSublistHasInterest (queue part) (sublist_test.go:1682)
+ ///
+ [Fact]
+ public void HasInterest_with_queue_subscriptions()
+ {
+ var sl = new SubList();
+ var qsub = MakeSub("foo", queue: "bar", sid: "1");
+ var qsub2 = MakeSub("foo", queue: "baz", sid: "2");
+ sl.Insert(qsub);
+ sl.HasInterest("foo").ShouldBeTrue();
+ sl.HasInterest("foo.bar").ShouldBeFalse();
+
+ sl.Insert(qsub2);
+ sl.HasInterest("foo").ShouldBeTrue();
+
+ sl.Remove(qsub);
+ sl.HasInterest("foo").ShouldBeTrue(); // qsub2 still present
+
+ sl.Remove(qsub2);
+ sl.HasInterest("foo").ShouldBeFalse();
+ }
+
+ ///
+ /// HasInterest correctly handles overlapping subscriptions where a literal
+ /// subject coexists with a wildcard at the same level.
+ /// Ref: TestSublistHasInterestOverlapping (sublist_test.go:1775)
+ ///
+ [Fact]
+ public void HasInterest_overlapping_subscriptions()
+ {
+ var sl = new SubList();
+ sl.Insert(MakeSub("stream.A.child", sid: "1"));
+ sl.Insert(MakeSub("stream.*", sid: "2"));
+
+ sl.HasInterest("stream.A.child").ShouldBeTrue();
+ sl.HasInterest("stream.A").ShouldBeTrue();
+ }
+
+ // =========================================================================
+ // NumInterest
+ // =========================================================================
+
+ ///
+ /// NumInterest returns counts of plain and queue subscribers separately for
+ /// literal subjects, wildcards, and queue-group subjects.
+ /// Ref: TestSublistNumInterest (sublist_test.go:1783)
+ ///
+ [Fact]
+ public void NumInterest_with_plain_subs()
+ {
+ var sl = new SubList();
+ var fooSub = MakeSub("foo", sid: "1");
+ sl.Insert(fooSub);
+
+ var (np, nq) = sl.NumInterest("foo");
+ np.ShouldBe(1);
+ nq.ShouldBe(0);
+
+ sl.NumInterest("bar").ShouldBe((0, 0));
+
+ sl.Remove(fooSub);
+ sl.NumInterest("foo").ShouldBe((0, 0));
+ }
+
+ [Fact]
+ public void NumInterest_with_wildcards()
+ {
+ var sl = new SubList();
+ var sub = MakeSub("foo.*", sid: "1");
+ sl.Insert(sub);
+
+ sl.NumInterest("foo").ShouldBe((0, 0));
+ sl.NumInterest("foo.bar").ShouldBe((1, 0));
+ sl.NumInterest("foo.bar.baz").ShouldBe((0, 0));
+
+ sl.Remove(sub);
+ sl.NumInterest("foo.bar").ShouldBe((0, 0));
+ }
+
+ [Fact]
+ public void NumInterest_with_queue_subs()
+ {
+ var sl = new SubList();
+ var qsub = MakeSub("foo", queue: "bar", sid: "1");
+ var qsub2 = MakeSub("foo", queue: "baz", sid: "2");
+ var qsub3 = MakeSub("foo", queue: "baz", sid: "3");
+ sl.Insert(qsub);
+ sl.NumInterest("foo").ShouldBe((0, 1));
+
+ sl.Insert(qsub2);
+ sl.NumInterest("foo").ShouldBe((0, 2));
+
+ sl.Insert(qsub3);
+ sl.NumInterest("foo").ShouldBe((0, 3));
+
+ sl.Remove(qsub);
+ sl.NumInterest("foo").ShouldBe((0, 2));
+
+ sl.Remove(qsub2);
+ sl.NumInterest("foo").ShouldBe((0, 1));
+
+ sl.Remove(qsub3);
+ sl.NumInterest("foo").ShouldBe((0, 0));
+ }
+
+ // =========================================================================
+ // Reverse match
+ // =========================================================================
+
+ ///
+ /// ReverseMatch finds registered patterns that would match a given literal or
+ /// wildcard subject, covering all combinations of *, >, and literals.
+ /// Ref: TestSublistReverseMatch (sublist_test.go:1440)
+ ///
+ [Fact]
+ public void ReverseMatch_comprehensive()
+ {
+ var sl = new SubList();
+ var fooSub = MakeSub("foo", sid: "1");
+ var barSub = MakeSub("bar", sid: "2");
+ var fooBarSub = MakeSub("foo.bar", sid: "3");
+ var fooBazSub = MakeSub("foo.baz", sid: "4");
+ var fooBarBazSub = MakeSub("foo.bar.baz", sid: "5");
+ sl.Insert(fooSub);
+ sl.Insert(barSub);
+ sl.Insert(fooBarSub);
+ sl.Insert(fooBazSub);
+ sl.Insert(fooBarBazSub);
+
+ // ReverseMatch("foo") — only fooSub
+ var r = sl.ReverseMatch("foo");
+ r.PlainSubs.Length.ShouldBe(1);
+ r.PlainSubs.ShouldContain(fooSub);
+
+ // ReverseMatch("bar") — only barSub
+ r = sl.ReverseMatch("bar");
+ r.PlainSubs.ShouldHaveSingleItem();
+ r.PlainSubs.ShouldContain(barSub);
+
+ // ReverseMatch("*") — single-token subs: foo and bar
+ r = sl.ReverseMatch("*");
+ r.PlainSubs.Length.ShouldBe(2);
+ r.PlainSubs.ShouldContain(fooSub);
+ r.PlainSubs.ShouldContain(barSub);
+
+ // ReverseMatch("baz") — no match
+ sl.ReverseMatch("baz").PlainSubs.ShouldBeEmpty();
+
+ // ReverseMatch("foo.*") — foo.bar and foo.baz
+ r = sl.ReverseMatch("foo.*");
+ r.PlainSubs.Length.ShouldBe(2);
+ r.PlainSubs.ShouldContain(fooBarSub);
+ r.PlainSubs.ShouldContain(fooBazSub);
+
+ // ReverseMatch("*.*") — same two
+ r = sl.ReverseMatch("*.*");
+ r.PlainSubs.Length.ShouldBe(2);
+ r.PlainSubs.ShouldContain(fooBarSub);
+ r.PlainSubs.ShouldContain(fooBazSub);
+
+ // ReverseMatch("*.bar") — only fooBarSub
+ r = sl.ReverseMatch("*.bar");
+ r.PlainSubs.ShouldHaveSingleItem();
+ r.PlainSubs.ShouldContain(fooBarSub);
+
+ // ReverseMatch("bar.*") — no match
+ sl.ReverseMatch("bar.*").PlainSubs.ShouldBeEmpty();
+
+ // ReverseMatch("foo.>") — 3 subs under foo
+ r = sl.ReverseMatch("foo.>");
+ r.PlainSubs.Length.ShouldBe(3);
+ r.PlainSubs.ShouldContain(fooBarSub);
+ r.PlainSubs.ShouldContain(fooBazSub);
+ r.PlainSubs.ShouldContain(fooBarBazSub);
+
+ // ReverseMatch(">") — all 5 subs
+ r = sl.ReverseMatch(">");
+ r.PlainSubs.Length.ShouldBe(5);
+ }
+
+ ///
+ /// ReverseMatch finds a subscription even when the query has extra wildcard
+ /// tokens beyond what the stored pattern has.
+ /// Ref: TestSublistReverseMatchWider (sublist_test.go:1508)
+ ///
+ [Fact]
+ public void ReverseMatch_wider_query()
+ {
+ var sl = new SubList();
+ var sub = MakeSub("uplink.*.*.>");
+ sl.Insert(sub);
+
+ sl.ReverseMatch("uplink.1.*.*.>").PlainSubs.ShouldHaveSingleItem();
+ sl.ReverseMatch("uplink.1.2.3.>").PlainSubs.ShouldHaveSingleItem();
+ }
+
+ // =========================================================================
+ // Match with empty tokens (should yield no results)
+ // =========================================================================
+
+ ///
+ /// Subjects with empty tokens (leading/trailing/double dots) never match any
+ /// subscription, even when a catch-all '>' subscription is present.
+ /// Ref: TestSublistMatchWithEmptyTokens (sublist_test.go:1522)
+ ///
+ [Theory]
+ [InlineData(".foo")]
+ [InlineData("..foo")]
+ [InlineData("foo..")]
+ [InlineData("foo.")]
+ [InlineData("foo..bar")]
+ [InlineData("foo...bar")]
+ public void Match_with_empty_tokens_returns_empty(string badSubject)
+ {
+ // Ref: TestSublistMatchWithEmptyTokens (sublist_test.go:1522)
+ var sl = new SubList();
+ sl.Insert(MakeSub(">", sid: "1"));
+ sl.Insert(MakeSub(">", queue: "queue", sid: "2"));
+
+ var r = sl.Match(badSubject);
+ r.PlainSubs.ShouldBeEmpty();
+ r.QueueSubs.ShouldBeEmpty();
+ }
+
+ // =========================================================================
+ // Interest notification (adapted from Go's channel-based API to .NET events)
+ // =========================================================================
+
+ ///
+ /// The InterestChanged event fires when subscriptions are inserted or removed.
+ /// Inserting the first subscriber fires LocalAdded; removing the last fires
+ /// LocalRemoved. Adding a second subscriber does not fire a redundant event.
+ /// Ref: TestSublistRegisterInterestNotification (sublist_test.go:1126) —
+ /// the Go API uses RegisterNotification with a channel; the .NET port exposes
+ /// an event instead.
+ ///
+ [Fact]
+ public void InterestChanged_fires_on_first_insert_and_last_remove()
+ {
+ using var sl = new SubList();
+ var events = new List();
+ sl.InterestChanged += e => events.Add(e);
+
+ var sub1 = MakeSub("foo", sid: "1");
+ var sub2 = MakeSub("foo", sid: "2");
+
+ sl.Insert(sub1);
+ events.Count.ShouldBe(1);
+ events[0].Kind.ShouldBe(InterestChangeKind.LocalAdded);
+ events[0].Subject.ShouldBe("foo");
+
+ sl.Insert(sub2);
+ events.Count.ShouldBe(2); // second insert still fires (event per operation)
+
+ sl.Remove(sub1);
+ events.Count.ShouldBe(3);
+ events[2].Kind.ShouldBe(InterestChangeKind.LocalRemoved);
+
+ sl.Remove(sub2);
+ events.Count.ShouldBe(4);
+ events[3].Kind.ShouldBe(InterestChangeKind.LocalRemoved);
+ }
+
+ ///
+ /// InterestChanged events are raised for queue subscriptions with the correct
+ /// Queue field populated.
+ /// Ref: TestSublistRegisterInterestNotification (queue sub section) (sublist_test.go:1321)
+ ///
+ [Fact]
+ public void InterestChanged_carries_queue_name_for_queue_subs()
+ {
+ using var sl = new SubList();
+ var events = new List();
+ sl.InterestChanged += e => events.Add(e);
+
+ var qsub = MakeSub("foo.bar.baz", queue: "q1", sid: "1");
+ sl.Insert(qsub);
+ events[0].Queue.ShouldBe("q1");
+ events[0].Subject.ShouldBe("foo.bar.baz");
+ events[0].Kind.ShouldBe(InterestChangeKind.LocalAdded);
+
+ sl.Remove(qsub);
+ events[1].Kind.ShouldBe(InterestChangeKind.LocalRemoved);
+ events[1].Queue.ShouldBe("q1");
+ }
+
+ ///
+ /// RemoveBatch removes all specified subscriptions in a single operation.
+ /// Unlike individual Remove calls, RemoveBatch performs the removal atomically
+ /// under a single write lock and does not fire InterestChanged per element —
+ /// it is optimised for bulk teardown (e.g. client disconnect).
+ /// After the batch, Match confirms that all removed subjects are gone.
+ /// Ref: TestSublistRegisterInterestNotification (batch insert/remove) (sublist_test.go:1311)
+ ///
+ [Fact]
+ public void RemoveBatch_removes_all_and_subscription_count_drops_to_zero()
+ {
+ using var sl = new SubList();
+ var inserts = new List();
+ sl.InterestChanged += e =>
+ {
+ if (e.Kind == InterestChangeKind.LocalAdded) inserts.Add(e);
+ };
+
+ var subs = Enumerable.Range(1, 4)
+ .Select(i => MakeSub("foo", sid: i.ToString()))
+ .ToArray();
+ foreach (var s in subs) sl.Insert(s);
+
+ inserts.Count.ShouldBe(4);
+ sl.Count.ShouldBe(4u);
+
+ // RemoveBatch atomically removes all — count goes to zero
+ sl.RemoveBatch(subs);
+ sl.Count.ShouldBe(0u);
+ sl.Match("foo").PlainSubs.ShouldBeEmpty();
+ }
+}