The C based gRPC (C++, Python, Ruby, Objective-C, PHP, C#) https://grpc.io/
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

660 lines
26 KiB

/*
*
* Copyright 2017 gRPC authors.
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*
*/
#include <grpc/support/port_platform.h>
#include <grpc/grpc.h>
#include <grpc/impl/codegen/grpc_types.h>
#include <grpc/support/alloc.h>
#include <grpc/support/log.h>
#include <grpc/support/string_util.h>
#include <grpc/support/sync.h>
#include <grpc/support/time.h>
#include <string.h>
#include <errno.h>
#include <fcntl.h>
#include <gflags/gflags.h>
#include <gmock/gmock.h>
#include <thread>
#include <vector>
#include "test/cpp/util/subprocess.h"
#include "test/cpp/util/test_config.h"
#include "src/core/ext/filters/client_channel/client_channel.h"
#include "src/core/ext/filters/client_channel/parse_address.h"
#include "src/core/ext/filters/client_channel/resolver.h"
#include "src/core/ext/filters/client_channel/resolver/dns/c_ares/grpc_ares_ev_driver.h"
#include "src/core/ext/filters/client_channel/resolver/dns/c_ares/grpc_ares_wrapper.h"
#include "src/core/ext/filters/client_channel/resolver_registry.h"
#include "src/core/ext/filters/client_channel/server_address.h"
#include "src/core/lib/channel/channel_args.h"
#include "src/core/lib/gpr/string.h"
#include "src/core/lib/gprpp/host_port.h"
#include "src/core/lib/gprpp/orphanable.h"
#include "src/core/lib/iomgr/combiner.h"
#include "src/core/lib/iomgr/executor.h"
#include "src/core/lib/iomgr/iomgr.h"
#include "src/core/lib/iomgr/resolve_address.h"
#include "src/core/lib/iomgr/sockaddr_utils.h"
#include "src/core/lib/iomgr/socket_utils.h"
#include "test/core/util/port.h"
#include "test/core/util/test_config.h"
#include "test/cpp/naming/dns_test_util.h"
// TODO: pull in different headers when enabling this
// test on windows. Also set BAD_SOCKET_RETURN_VAL
// to INVALID_SOCKET on windows.
#ifdef GPR_WINDOWS
#include "src/core/lib/iomgr/sockaddr_windows.h"
#include "src/core/lib/iomgr/socket_windows.h"
#include "src/core/lib/iomgr/tcp_windows.h"
#define BAD_SOCKET_RETURN_VAL INVALID_SOCKET
#else
#include "src/core/lib/iomgr/sockaddr_posix.h"
#define BAD_SOCKET_RETURN_VAL -1
#endif
using grpc::SubProcess;
using std::vector;
using testing::UnorderedElementsAreArray;
// Hack copied from "test/cpp/end2end/server_crash_test_client.cc"!
// In some distros, gflags is in the namespace google, and in some others,
// in gflags. This hack is enabling us to find both.
namespace google {}
namespace gflags {}
using namespace google;
using namespace gflags;
DEFINE_string(target_name, "", "Target name to resolve.");
DEFINE_string(expected_addrs, "",
"List of expected backend or balancer addresses in the form "
"'<ip0:port0>,<is_balancer0>;<ip1:port1>,<is_balancer1>;...'. "
"'is_balancer' should be bool, i.e. true or false.");
DEFINE_string(expected_chosen_service_config, "",
"Expected service config json string that gets chosen (no "
"whitespace). Empty for none.");
DEFINE_string(expected_service_config_error, "",
"Expected service config error. Empty for none.");
DEFINE_string(
local_dns_server_address, "",
"Optional. This address is placed as the uri authority if present.");
DEFINE_string(
enable_srv_queries, "",
"Whether or not to enable SRV queries for the ares resolver instance."
"It would be better if this arg could be bool, but the way that we "
"generate "
"the python script runner doesn't allow us to pass a gflags bool to this "
"binary.");
DEFINE_string(
enable_txt_queries, "",
"Whether or not to enable TXT queries for the ares resolver instance."
"It would be better if this arg could be bool, but the way that we "
"generate "
"the python script runner doesn't allow us to pass a gflags bool to this "
"binary.");
DEFINE_string(
inject_broken_nameserver_list, "",
"Whether or not to configure c-ares to use a broken nameserver list, in "
"which "
"the first nameserver in the list is non-responsive, but the second one "
"works, i.e "
"serves the expected DNS records; using for testing such a real scenario."
"It would be better if this arg could be bool, but the way that we "
"generate "
"the python script runner doesn't allow us to pass a gflags bool to this "
"binary.");
DEFINE_string(expected_lb_policy, "",
"Expected lb policy name that appears in resolver result channel "
"arg. Empty for none.");
namespace {
class GrpcLBAddress final {
public:
GrpcLBAddress(std::string address, bool is_balancer)
: is_balancer(is_balancer), address(std::move(address)) {}
bool operator==(const GrpcLBAddress& other) const {
return this->is_balancer == other.is_balancer &&
this->address == other.address;
}
bool operator!=(const GrpcLBAddress& other) const {
return !(*this == other);
}
bool is_balancer;
std::string address;
};
vector<GrpcLBAddress> ParseExpectedAddrs(std::string expected_addrs) {
std::vector<GrpcLBAddress> out;
while (expected_addrs.size() != 0) {
// get the next <ip>,<port> (v4 or v6)
size_t next_comma = expected_addrs.find(',');
if (next_comma == std::string::npos) {
gpr_log(GPR_ERROR,
"Missing ','. Expected_addrs arg should be a semicolon-separated "
"list of <ip-port>,<bool> pairs. Left-to-be-parsed arg is |%s|",
expected_addrs.c_str());
abort();
}
std::string next_addr = expected_addrs.substr(0, next_comma);
expected_addrs = expected_addrs.substr(next_comma + 1, std::string::npos);
// get the next is_balancer 'bool' associated with this address
size_t next_semicolon = expected_addrs.find(';');
bool is_balancer = false;
gpr_parse_bool_value(expected_addrs.substr(0, next_semicolon).c_str(),
&is_balancer);
out.emplace_back(GrpcLBAddress(next_addr, is_balancer));
if (next_semicolon == std::string::npos) {
break;
}
expected_addrs =
expected_addrs.substr(next_semicolon + 1, std::string::npos);
}
if (out.size() == 0) {
gpr_log(GPR_ERROR,
"expected_addrs arg should be a semicolon-separated list of "
"<ip-port>,<bool> pairs");
abort();
}
return out;
}
gpr_timespec TestDeadline(void) {
return grpc_timeout_seconds_to_deadline(100);
}
struct ArgsStruct {
gpr_event ev;
gpr_atm done_atm;
gpr_mu* mu;
grpc_pollset* pollset;
grpc_pollset_set* pollset_set;
Squashed commit of the following: commit 1547cb209ad4f6899bf10c06c34b814783fd3924 Author: Yash Tibrewal <yashkt@google.com> Date: Fri Oct 18 13:12:55 2019 -0700 Revert some other GRPC_CLOSURE_RUN till other issues are fixed commit 3edeee7ce9a06eec8901dfe01ea45fb6f5505dbc Merge: 22b343e4fb e8f78e7a5d Author: Yash Tibrewal <yashkt@google.com> Date: Fri Oct 18 12:26:26 2019 -0700 Merge branch 'master' into combinernew commit 22b343e4fb823e625646864454fe6ea3f9f371de Author: Yash Tibrewal <yashkt@google.com> Date: Fri Oct 18 12:22:34 2019 -0700 Change some TCP posix closures to GRPC_CLOSURE_RUN commit 19e60dfe8f6426236c618779f569df7dfed51597 Merge: 153bdcbc97 feae38d3ab Author: Yash Tibrewal <yashkt@google.com> Date: Thu Oct 17 11:56:46 2019 -0700 Merge branch 'master' into combinernew commit 153bdcbc974126dfd123b48e9bfb60e89dc3890e Author: Yash Tibrewal <yashkt@google.com> Date: Thu Oct 17 11:41:14 2019 -0700 Proxy fixture fix commit c6da80bcce6fdc9bec62a6144d775382f165ba93 Merge: 6a32264cdf 98abc22f4c Author: Yash Tibrewal <yashkt@google.com> Date: Fri Oct 11 17:05:18 2019 -0700 Merge branch 'master' into combinernew commit 6a32264cdf35c4b833748bdc64efd553435ce87c Author: Yash Tibrewal <yashkt@google.com> Date: Fri Oct 11 17:01:55 2019 -0700 Reviewer comments commit 6bbd3a1c3c6c23ae4401020f1981ac003524aa7d Author: Yash Tibrewal <yashkt@google.com> Date: Thu Oct 10 11:55:43 2019 -0700 Fallback cleanup commit aaa04526a2acf225825e218174f07a845af34546 Author: Yash Tibrewal <yashkt@google.com> Date: Thu Oct 10 11:24:18 2019 -0700 Clean up commit 4266be13d554136af02d50e5f92dd95a914f9839 Author: Yash Tibrewal <yashkt@google.com> Date: Thu Oct 10 11:20:05 2019 -0700 Make sure start_ping is called before finish_ping for bdp and keepalive commit 14107957aa5a17bd0a46b019cffdab41ff60b0f2 Author: Yash Tibrewal <yashkt@google.com> Date: Wed Oct 9 18:56:07 2019 -0700 chttp2 fixes commit 5643aa6cb388a508d45cd9aa6a9b65d06a009c7e Author: Yash Tibrewal <yashkt@google.com> Date: Wed Oct 9 18:25:19 2019 -0700 Remove closure list scheduling from combiners commit c59644943084ca7c2f0b67cc4a4679901454f207 Author: Yash Tibrewal <yashkt@google.com> Date: Wed Oct 9 17:35:54 2019 -0700 ares windows fix commit 9f933903b969d290acd8fb52e57c37d820f16f34 Author: Yash Tibrewal <yashkt@google.com> Date: Wed Oct 9 17:23:11 2019 -0700 More fixes commit 3c3a7d0e9b365b086c2bec9b87c600dae05c4689 Author: Yash Tibrewal <yashkt@google.com> Date: Wed Oct 9 16:08:07 2019 -0700 Fix errors commit 56539cc448a225c4936e712d29cd9a1022320aae Author: Yash Tibrewal <yashkt@google.com> Date: Wed Oct 9 15:22:28 2019 -0700 Everything compiles commit 714ec01e4b61972c32fd1102d9e46da9e91d70fb Author: Yash Tibrewal <yashkt@google.com> Date: Wed Oct 9 13:44:18 2019 -0700 src compiles commit 54dcbd170d08e91b20a83cc0c9e23d01bc1e05a7 Author: Yash Tibrewal <yashkt@google.com> Date: Wed Oct 9 13:16:08 2019 -0700 chttp2_transport changes commit 7a3388b077d92b741679e834f22f4f4731394c66 Author: Yash Tibrewal <yashkt@google.com> Date: Tue Oct 8 18:33:55 2019 -0700 resource quota and lb policy commit 714e4c849fea25b2650b04c05fc9f9116c9659ca Author: Yash Tibrewal <yashkt@google.com> Date: Tue Oct 8 17:23:04 2019 -0700 Further commit 1d17ad7d444a018dd7a0bab3c2351d25502d8a16 Author: Yash Tibrewal <yashkt@google.com> Date: Tue Oct 8 13:34:52 2019 -0700 ares ev driver windows changes commit 3110c062c5e57eb8241db7699c6638cdb68a5a88 Author: Yash Tibrewal <yashkt@google.com> Date: Tue Oct 8 12:47:37 2019 -0700 ares dns changes commit 0e10bc17eac160189c390e54f9c91bbc666ff697 Author: Yash Tibrewal <yashkt@google.com> Date: Tue Oct 8 12:24:45 2019 -0700 Add dns_resolver changes commit 4a71a911e8249dfbcf4a2c1397e3b0691265fe0b Author: Yash Tibrewal <yashkt@google.com> Date: Tue Oct 8 12:08:10 2019 -0700 Add fake_resolver changes commit 8610a64ec9cc3bae10a5816e2a4800e0755bbb71 Author: Yash Tibrewal <yashkt@google.com> Date: Mon Oct 7 19:31:13 2019 -0700 Remaning one from xds_client commit 5f22055d0d3d177b8e3256e371b828abd3b88641 Author: Yash Tibrewal <yashkt@google.com> Date: Mon Oct 7 18:47:28 2019 -0700 One left from xds_client.cc commit 4b1223f8753c103760cf9a15660a6786859a607f Author: Yash Tibrewal <yashkt@google.com> Date: Mon Oct 7 17:17:12 2019 -0700 modifications for xds.cc commit a17bbbd840f56cbc608b463fb04ebabcc8152c01 Author: Yash Tibrewal <yashkt@google.com> Date: Mon Oct 7 13:06:25 2019 -0700 grpclb.cc changes commit 3a33ed4762616397281a7d0e60e07d92439438f3 Merge: 11058748fd 3d363368ca Author: Yash Tibrewal <yashkt@google.com> Date: Mon Oct 7 11:24:11 2019 -0700 Merge branch 'combinernew' of github.com:yashykt/grpc into combinernew commit 3d363368ca0a0779182afeda0eb3279dc951d757 Author: Yash Tibrewal <yashkt@google.com> Date: Mon Oct 7 11:18:00 2019 -0700 New combiner
5 years ago
grpc_core::Combiner* lock;
grpc_channel_args* channel_args;
vector<GrpcLBAddress> expected_addrs;
std::string expected_service_config_string;
std::string expected_service_config_error;
std::string expected_lb_policy;
};
void ArgsInit(ArgsStruct* args) {
gpr_event_init(&args->ev);
args->pollset = (grpc_pollset*)gpr_zalloc(grpc_pollset_size());
grpc_pollset_init(args->pollset, &args->mu);
args->pollset_set = grpc_pollset_set_create();
grpc_pollset_set_add_pollset(args->pollset_set, args->pollset);
args->lock = grpc_combiner_create();
gpr_atm_rel_store(&args->done_atm, 0);
args->channel_args = nullptr;
}
void DoNothing(void* /*arg*/, grpc_error* /*error*/) {}
void ArgsFinish(ArgsStruct* args) {
GPR_ASSERT(gpr_event_wait(&args->ev, TestDeadline()));
grpc_pollset_set_del_pollset(args->pollset_set, args->pollset);
grpc_pollset_set_destroy(args->pollset_set);
grpc_closure DoNothing_cb;
GRPC_CLOSURE_INIT(&DoNothing_cb, DoNothing, nullptr,
grpc_schedule_on_exec_ctx);
grpc_pollset_shutdown(args->pollset, &DoNothing_cb);
// exec_ctx needs to be flushed before calling grpc_pollset_destroy()
grpc_channel_args_destroy(args->channel_args);
grpc_core::ExecCtx::Get()->Flush();
grpc_pollset_destroy(args->pollset);
gpr_free(args->pollset);
GRPC_COMBINER_UNREF(args->lock, nullptr);
}
gpr_timespec NSecondDeadline(int seconds) {
return gpr_time_add(gpr_now(GPR_CLOCK_REALTIME),
gpr_time_from_seconds(seconds, GPR_TIMESPAN));
}
void PollPollsetUntilRequestDone(ArgsStruct* args) {
// Use a 20-second timeout to give room for the tests that involve
// a non-responsive name server (c-ares uses a ~5 second query timeout
// for that server before succeeding with the healthy one).
gpr_timespec deadline = NSecondDeadline(20);
while (true) {
bool done = gpr_atm_acq_load(&args->done_atm) != 0;
if (done) {
break;
}
gpr_timespec time_left =
gpr_time_sub(deadline, gpr_now(GPR_CLOCK_REALTIME));
gpr_log(GPR_DEBUG, "done=%d, time_left=%" PRId64 ".%09d", done,
time_left.tv_sec, time_left.tv_nsec);
GPR_ASSERT(gpr_time_cmp(time_left, gpr_time_0(GPR_TIMESPAN)) >= 0);
grpc_pollset_worker* worker = nullptr;
grpc_core::ExecCtx exec_ctx;
gpr_mu_lock(args->mu);
7 years ago
GRPC_LOG_IF_ERROR("pollset_work",
grpc_pollset_work(args->pollset, &worker,
7 years ago
grpc_timespec_to_millis_round_up(
NSecondDeadline(1))));
gpr_mu_unlock(args->mu);
}
gpr_event_set(&args->ev, (void*)1);
}
void CheckServiceConfigResultLocked(const char* service_config_json,
grpc_error* service_config_error,
ArgsStruct* args) {
if (args->expected_service_config_string != "") {
GPR_ASSERT(service_config_json != nullptr);
EXPECT_EQ(service_config_json, args->expected_service_config_string);
}
if (args->expected_service_config_error == "") {
EXPECT_EQ(service_config_error, GRPC_ERROR_NONE);
} else {
EXPECT_THAT(grpc_error_string(service_config_error),
testing::HasSubstr(args->expected_service_config_error));
}
GRPC_ERROR_UNREF(service_config_error);
}
void CheckLBPolicyResultLocked(const grpc_channel_args* channel_args,
ArgsStruct* args) {
const grpc_arg* lb_policy_arg =
grpc_channel_args_find(channel_args, GRPC_ARG_LB_POLICY_NAME);
if (args->expected_lb_policy != "") {
GPR_ASSERT(lb_policy_arg != nullptr);
GPR_ASSERT(lb_policy_arg->type == GRPC_ARG_STRING);
EXPECT_EQ(lb_policy_arg->value.string, args->expected_lb_policy);
} else {
GPR_ASSERT(lb_policy_arg == nullptr);
}
}
#ifdef GPR_WINDOWS
void OpenAndCloseSocketsStressLoop(int dummy_port, gpr_event* done_ev) {
sockaddr_in6 addr;
memset(&addr, 0, sizeof(addr));
addr.sin6_family = AF_INET6;
addr.sin6_port = htons(dummy_port);
((char*)&addr.sin6_addr)[15] = 1;
for (;;) {
if (gpr_event_get(done_ev)) {
return;
}
std::vector<int> sockets;
for (size_t i = 0; i < 50; i++) {
SOCKET s = WSASocket(AF_INET6, SOCK_STREAM, IPPROTO_TCP, nullptr, 0,
WSA_FLAG_OVERLAPPED);
ASSERT_TRUE(s != BAD_SOCKET_RETURN_VAL)
<< "Failed to create TCP ipv6 socket";
gpr_log(GPR_DEBUG, "Opened socket: %d", s);
char val = 1;
ASSERT_TRUE(setsockopt(s, SOL_SOCKET, SO_REUSEADDR, &val, sizeof(val)) !=
SOCKET_ERROR)
<< "Failed to set socketopt reuseaddr. WSA error: " +
std::to_string(WSAGetLastError());
ASSERT_TRUE(grpc_tcp_set_non_block(s) == GRPC_ERROR_NONE)
<< "Failed to set socket non-blocking";
ASSERT_TRUE(bind(s, (const sockaddr*)&addr, sizeof(addr)) != SOCKET_ERROR)
<< "Failed to bind socket " + std::to_string(s) +
" to [::1]:" + std::to_string(dummy_port) +
". WSA error: " + std::to_string(WSAGetLastError());
ASSERT_TRUE(listen(s, 1) != SOCKET_ERROR)
<< "Failed to listen on socket " + std::to_string(s) +
". WSA error: " + std::to_string(WSAGetLastError());
sockets.push_back(s);
}
// Do a non-blocking accept followed by a close on all of those sockets.
// Do this in a separate loop to try to induce a time window to hit races.
for (size_t i = 0; i < sockets.size(); i++) {
gpr_log(GPR_DEBUG, "non-blocking accept then close on %d", sockets[i]);
ASSERT_TRUE(accept(sockets[i], nullptr, nullptr) == INVALID_SOCKET)
<< "Accept on dummy socket unexpectedly accepted actual connection.";
ASSERT_TRUE(WSAGetLastError() == WSAEWOULDBLOCK)
<< "OpenAndCloseSocketsStressLoop accept on socket " +
std::to_string(sockets[i]) +
" failed in "
"an unexpected way. "
"WSA error: " +
std::to_string(WSAGetLastError()) +
". Socket use-after-close bugs are likely.";
ASSERT_TRUE(closesocket(sockets[i]) != SOCKET_ERROR)
<< "Failed to close socket: " + std::to_string(sockets[i]) +
". WSA error: " + std::to_string(WSAGetLastError());
}
}
return;
}
#else
void OpenAndCloseSocketsStressLoop(int dummy_port, gpr_event* done_ev) {
// The goal of this loop is to catch socket
// "use after close" bugs within the c-ares resolver by acting
// like some separate thread doing I/O.
// It's goal is to try to hit race conditions whereby:
// 1) The c-ares resolver closes a socket.
// 2) This loop opens a socket with (coincidentally) the same handle.
// 3) the c-ares resolver mistakenly uses that same socket without
// realizing that its closed.
// 4) This loop performs an operation on that socket that should
// succeed but instead fails because of what the c-ares
// resolver did in the meantime.
sockaddr_in6 addr;
memset(&addr, 0, sizeof(addr));
addr.sin6_family = AF_INET6;
addr.sin6_port = htons(dummy_port);
((char*)&addr.sin6_addr)[15] = 1;
for (;;) {
if (gpr_event_get(done_ev)) {
return;
}
std::vector<int> sockets;
// First open a bunch of sockets, bind and listen
// '50' is an arbitrary number that, experimentally,
// has a good chance of catching bugs.
for (size_t i = 0; i < 50; i++) {
int s = socket(AF_INET6, SOCK_STREAM, 0);
int val = 1;
ASSERT_TRUE(setsockopt(s, SOL_SOCKET, SO_REUSEPORT, &val, sizeof(val)) ==
0)
<< "Failed to set socketopt reuseport";
ASSERT_TRUE(setsockopt(s, SOL_SOCKET, SO_REUSEADDR, &val, sizeof(val)) ==
0)
<< "Failed to set socket reuseaddr";
ASSERT_TRUE(fcntl(s, F_SETFL, O_NONBLOCK) == 0)
<< "Failed to set socket non-blocking";
ASSERT_TRUE(s != BAD_SOCKET_RETURN_VAL)
<< "Failed to create TCP ipv6 socket";
gpr_log(GPR_DEBUG, "Opened fd: %d", s);
ASSERT_TRUE(bind(s, (const sockaddr*)&addr, sizeof(addr)) == 0)
<< "Failed to bind socket " + std::to_string(s) +
" to [::1]:" + std::to_string(dummy_port) +
". errno: " + std::to_string(errno);
ASSERT_TRUE(listen(s, 1) == 0) << "Failed to listen on socket " +
std::to_string(s) +
". errno: " + std::to_string(errno);
sockets.push_back(s);
}
// Do a non-blocking accept followed by a close on all of those sockets.
// Do this in a separate loop to try to induce a time window to hit races.
for (size_t i = 0; i < sockets.size(); i++) {
gpr_log(GPR_DEBUG, "non-blocking accept then close on %d", sockets[i]);
if (accept(sockets[i], nullptr, nullptr)) {
// If e.g. a "shutdown" was called on this fd from another thread,
// then this accept call should fail with an unexpected error.
ASSERT_TRUE(errno == EAGAIN || errno == EWOULDBLOCK)
<< "OpenAndCloseSocketsStressLoop accept on socket " +
std::to_string(sockets[i]) +
" failed in "
"an unexpected way. "
"errno: " +
std::to_string(errno) +
". Socket use-after-close bugs are likely.";
}
ASSERT_TRUE(close(sockets[i]) == 0)
<< "Failed to close socket: " + std::to_string(sockets[i]) +
". errno: " + std::to_string(errno);
}
}
}
#endif
class ResultHandler : public grpc_core::Resolver::ResultHandler {
public:
static std::unique_ptr<grpc_core::Resolver::ResultHandler> Create(
ArgsStruct* args) {
return std::unique_ptr<grpc_core::Resolver::ResultHandler>(
new ResultHandler(args));
}
explicit ResultHandler(ArgsStruct* args) : args_(args) {}
void ReturnResult(grpc_core::Resolver::Result result) override {
CheckResult(result);
gpr_atm_rel_store(&args_->done_atm, 1);
gpr_mu_lock(args_->mu);
GRPC_LOG_IF_ERROR("pollset_kick",
grpc_pollset_kick(args_->pollset, nullptr));
gpr_mu_unlock(args_->mu);
}
void ReturnError(grpc_error* error) override {
gpr_log(GPR_ERROR, "resolver returned error: %s", grpc_error_string(error));
GPR_ASSERT(false);
}
virtual void CheckResult(const grpc_core::Resolver::Result& /*result*/) {}
protected:
ArgsStruct* args_struct() const { return args_; }
private:
ArgsStruct* args_;
};
class CheckingResultHandler : public ResultHandler {
public:
static std::unique_ptr<grpc_core::Resolver::ResultHandler> Create(
ArgsStruct* args) {
return std::unique_ptr<grpc_core::Resolver::ResultHandler>(
new CheckingResultHandler(args));
}
explicit CheckingResultHandler(ArgsStruct* args) : ResultHandler(args) {}
void CheckResult(const grpc_core::Resolver::Result& result) override {
ArgsStruct* args = args_struct();
gpr_log(GPR_INFO, "num addrs found: %" PRIdPTR ". expected %" PRIdPTR,
result.addresses.size(), args->expected_addrs.size());
GPR_ASSERT(result.addresses.size() == args->expected_addrs.size());
std::vector<GrpcLBAddress> found_lb_addrs;
for (size_t i = 0; i < result.addresses.size(); i++) {
const grpc_core::ServerAddress& addr = result.addresses[i];
char* str;
grpc_sockaddr_to_string(&str, &addr.address(), 1 /* normalize */);
gpr_log(GPR_INFO, "%s", str);
found_lb_addrs.emplace_back(
GrpcLBAddress(std::string(str), addr.IsBalancer()));
gpr_free(str);
}
if (args->expected_addrs.size() != found_lb_addrs.size()) {
gpr_log(GPR_DEBUG,
"found lb addrs size is: %" PRIdPTR
". expected addrs size is %" PRIdPTR,
found_lb_addrs.size(), args->expected_addrs.size());
abort();
}
EXPECT_THAT(args->expected_addrs,
UnorderedElementsAreArray(found_lb_addrs));
const char* service_config_json =
result.service_config == nullptr
? nullptr
: result.service_config->service_config_json();
CheckServiceConfigResultLocked(
service_config_json, GRPC_ERROR_REF(result.service_config_error), args);
if (args->expected_service_config_string == "") {
CheckLBPolicyResultLocked(result.args, args);
}
}
};
int g_fake_non_responsive_dns_server_port = -1;
/* This function will configure any ares_channel created by the c-ares based
* resolver. This is useful to effectively mock /etc/resolv.conf settings
* (and equivalent on Windows), which unit tests don't have write permissions.
*/
void InjectBrokenNameServerList(ares_channel channel) {
struct ares_addr_port_node dns_server_addrs[2];
memset(dns_server_addrs, 0, sizeof(dns_server_addrs));
std::unique_ptr<char> unused_host;
std::unique_ptr<char> local_dns_server_port;
GPR_ASSERT(grpc_core::SplitHostPort(FLAGS_local_dns_server_address.c_str(),
&unused_host, &local_dns_server_port));
gpr_log(GPR_DEBUG,
"Injecting broken nameserver list. Bad server address:|[::1]:%d|. "
"Good server address:%s",
g_fake_non_responsive_dns_server_port,
FLAGS_local_dns_server_address.c_str());
// Put the non-responsive DNS server at the front of c-ares's nameserver list.
dns_server_addrs[0].family = AF_INET6;
((char*)&dns_server_addrs[0].addr.addr6)[15] = 0x1;
dns_server_addrs[0].tcp_port = g_fake_non_responsive_dns_server_port;
dns_server_addrs[0].udp_port = g_fake_non_responsive_dns_server_port;
dns_server_addrs[0].next = &dns_server_addrs[1];
// Put the actual healthy DNS server after the first one. The expectation is
// that the resolver will timeout the query to the non-responsive DNS server
// and will skip over to this healthy DNS server, without causing any DNS
// resolution errors.
dns_server_addrs[1].family = AF_INET;
((char*)&dns_server_addrs[1].addr.addr4)[0] = 0x7f;
((char*)&dns_server_addrs[1].addr.addr4)[3] = 0x1;
dns_server_addrs[1].tcp_port = atoi(local_dns_server_port.get());
dns_server_addrs[1].udp_port = atoi(local_dns_server_port.get());
dns_server_addrs[1].next = nullptr;
GPR_ASSERT(ares_set_servers_ports(channel, dns_server_addrs) == ARES_SUCCESS);
}
void StartResolvingLocked(void* arg, grpc_error* /*unused*/) {
grpc_core::Resolver* r = static_cast<grpc_core::Resolver*>(arg);
r->StartLocked();
}
void RunResolvesRelevantRecordsTest(
std::unique_ptr<grpc_core::Resolver::ResultHandler> (*CreateResultHandler)(
ArgsStruct* args)) {
grpc_core::ExecCtx exec_ctx;
ArgsStruct args;
ArgsInit(&args);
args.expected_addrs = ParseExpectedAddrs(FLAGS_expected_addrs);
args.expected_service_config_string = FLAGS_expected_chosen_service_config;
args.expected_service_config_error = FLAGS_expected_service_config_error;
args.expected_lb_policy = FLAGS_expected_lb_policy;
// maybe build the address with an authority
char* whole_uri = nullptr;
gpr_log(GPR_DEBUG,
"resolver_component_test: --inject_broken_nameserver_list: %s",
FLAGS_inject_broken_nameserver_list.c_str());
std::unique_ptr<grpc::testing::FakeNonResponsiveDNSServer>
fake_non_responsive_dns_server;
if (FLAGS_inject_broken_nameserver_list == "True") {
g_fake_non_responsive_dns_server_port = grpc_pick_unused_port_or_die();
fake_non_responsive_dns_server.reset(
new grpc::testing::FakeNonResponsiveDNSServer(
g_fake_non_responsive_dns_server_port));
grpc_ares_test_only_inject_config = InjectBrokenNameServerList;
GPR_ASSERT(
gpr_asprintf(&whole_uri, "dns:///%s", FLAGS_target_name.c_str()));
} else if (FLAGS_inject_broken_nameserver_list == "False") {
gpr_log(GPR_INFO, "Specifying authority in uris to: %s",
FLAGS_local_dns_server_address.c_str());
GPR_ASSERT(gpr_asprintf(&whole_uri, "dns://%s/%s",
FLAGS_local_dns_server_address.c_str(),
FLAGS_target_name.c_str()));
} else {
gpr_log(GPR_DEBUG, "Invalid value for --inject_broken_nameserver_list.");
abort();
}
gpr_log(GPR_DEBUG, "resolver_component_test: --enable_srv_queries: %s",
FLAGS_enable_srv_queries.c_str());
grpc_channel_args* resolver_args = nullptr;
// By default, SRV queries are disabled, so tests that expect no SRV query
// should avoid setting any channel arg. Test cases that do rely on the SRV
// query must explicitly enable SRV though.
if (FLAGS_enable_srv_queries == "True") {
grpc_arg srv_queries_arg = grpc_channel_arg_integer_create(
const_cast<char*>(GRPC_ARG_DNS_ENABLE_SRV_QUERIES), true);
resolver_args =
grpc_channel_args_copy_and_add(nullptr, &srv_queries_arg, 1);
} else if (FLAGS_enable_srv_queries != "False") {
gpr_log(GPR_DEBUG, "Invalid value for --enable_srv_queries.");
abort();
}
gpr_log(GPR_DEBUG, "resolver_component_test: --enable_txt_queries: %s",
FLAGS_enable_txt_queries.c_str());
// By default, TXT queries are disabled, so tests that expect no TXT query
// should avoid setting any channel arg. Test cases that do rely on the TXT
// query must explicitly enable TXT though.
if (FLAGS_enable_txt_queries == "True") {
// Unlike SRV queries, there isn't a channel arg specific to TXT records.
// Rather, we use the resolver-agnostic "service config" resolution option,
// for which c-ares has its own specific default value, which isn't
// necessarily shared by other resolvers.
grpc_arg txt_queries_arg = grpc_channel_arg_integer_create(
const_cast<char*>(GRPC_ARG_SERVICE_CONFIG_DISABLE_RESOLUTION), false);
grpc_channel_args* tmp_args =
grpc_channel_args_copy_and_add(resolver_args, &txt_queries_arg, 1);
grpc_channel_args_destroy(resolver_args);
resolver_args = tmp_args;
} else if (FLAGS_enable_txt_queries != "False") {
gpr_log(GPR_DEBUG, "Invalid value for --enable_txt_queries.");
abort();
}
// create resolver and resolve
grpc_core::OrphanablePtr<grpc_core::Resolver> resolver =
grpc_core::ResolverRegistry::CreateResolver(whole_uri, resolver_args,
args.pollset_set, args.lock,
CreateResultHandler(&args));
grpc_channel_args_destroy(resolver_args);
gpr_free(whole_uri);
Squashed commit of the following: commit 1547cb209ad4f6899bf10c06c34b814783fd3924 Author: Yash Tibrewal <yashkt@google.com> Date: Fri Oct 18 13:12:55 2019 -0700 Revert some other GRPC_CLOSURE_RUN till other issues are fixed commit 3edeee7ce9a06eec8901dfe01ea45fb6f5505dbc Merge: 22b343e4fb e8f78e7a5d Author: Yash Tibrewal <yashkt@google.com> Date: Fri Oct 18 12:26:26 2019 -0700 Merge branch 'master' into combinernew commit 22b343e4fb823e625646864454fe6ea3f9f371de Author: Yash Tibrewal <yashkt@google.com> Date: Fri Oct 18 12:22:34 2019 -0700 Change some TCP posix closures to GRPC_CLOSURE_RUN commit 19e60dfe8f6426236c618779f569df7dfed51597 Merge: 153bdcbc97 feae38d3ab Author: Yash Tibrewal <yashkt@google.com> Date: Thu Oct 17 11:56:46 2019 -0700 Merge branch 'master' into combinernew commit 153bdcbc974126dfd123b48e9bfb60e89dc3890e Author: Yash Tibrewal <yashkt@google.com> Date: Thu Oct 17 11:41:14 2019 -0700 Proxy fixture fix commit c6da80bcce6fdc9bec62a6144d775382f165ba93 Merge: 6a32264cdf 98abc22f4c Author: Yash Tibrewal <yashkt@google.com> Date: Fri Oct 11 17:05:18 2019 -0700 Merge branch 'master' into combinernew commit 6a32264cdf35c4b833748bdc64efd553435ce87c Author: Yash Tibrewal <yashkt@google.com> Date: Fri Oct 11 17:01:55 2019 -0700 Reviewer comments commit 6bbd3a1c3c6c23ae4401020f1981ac003524aa7d Author: Yash Tibrewal <yashkt@google.com> Date: Thu Oct 10 11:55:43 2019 -0700 Fallback cleanup commit aaa04526a2acf225825e218174f07a845af34546 Author: Yash Tibrewal <yashkt@google.com> Date: Thu Oct 10 11:24:18 2019 -0700 Clean up commit 4266be13d554136af02d50e5f92dd95a914f9839 Author: Yash Tibrewal <yashkt@google.com> Date: Thu Oct 10 11:20:05 2019 -0700 Make sure start_ping is called before finish_ping for bdp and keepalive commit 14107957aa5a17bd0a46b019cffdab41ff60b0f2 Author: Yash Tibrewal <yashkt@google.com> Date: Wed Oct 9 18:56:07 2019 -0700 chttp2 fixes commit 5643aa6cb388a508d45cd9aa6a9b65d06a009c7e Author: Yash Tibrewal <yashkt@google.com> Date: Wed Oct 9 18:25:19 2019 -0700 Remove closure list scheduling from combiners commit c59644943084ca7c2f0b67cc4a4679901454f207 Author: Yash Tibrewal <yashkt@google.com> Date: Wed Oct 9 17:35:54 2019 -0700 ares windows fix commit 9f933903b969d290acd8fb52e57c37d820f16f34 Author: Yash Tibrewal <yashkt@google.com> Date: Wed Oct 9 17:23:11 2019 -0700 More fixes commit 3c3a7d0e9b365b086c2bec9b87c600dae05c4689 Author: Yash Tibrewal <yashkt@google.com> Date: Wed Oct 9 16:08:07 2019 -0700 Fix errors commit 56539cc448a225c4936e712d29cd9a1022320aae Author: Yash Tibrewal <yashkt@google.com> Date: Wed Oct 9 15:22:28 2019 -0700 Everything compiles commit 714ec01e4b61972c32fd1102d9e46da9e91d70fb Author: Yash Tibrewal <yashkt@google.com> Date: Wed Oct 9 13:44:18 2019 -0700 src compiles commit 54dcbd170d08e91b20a83cc0c9e23d01bc1e05a7 Author: Yash Tibrewal <yashkt@google.com> Date: Wed Oct 9 13:16:08 2019 -0700 chttp2_transport changes commit 7a3388b077d92b741679e834f22f4f4731394c66 Author: Yash Tibrewal <yashkt@google.com> Date: Tue Oct 8 18:33:55 2019 -0700 resource quota and lb policy commit 714e4c849fea25b2650b04c05fc9f9116c9659ca Author: Yash Tibrewal <yashkt@google.com> Date: Tue Oct 8 17:23:04 2019 -0700 Further commit 1d17ad7d444a018dd7a0bab3c2351d25502d8a16 Author: Yash Tibrewal <yashkt@google.com> Date: Tue Oct 8 13:34:52 2019 -0700 ares ev driver windows changes commit 3110c062c5e57eb8241db7699c6638cdb68a5a88 Author: Yash Tibrewal <yashkt@google.com> Date: Tue Oct 8 12:47:37 2019 -0700 ares dns changes commit 0e10bc17eac160189c390e54f9c91bbc666ff697 Author: Yash Tibrewal <yashkt@google.com> Date: Tue Oct 8 12:24:45 2019 -0700 Add dns_resolver changes commit 4a71a911e8249dfbcf4a2c1397e3b0691265fe0b Author: Yash Tibrewal <yashkt@google.com> Date: Tue Oct 8 12:08:10 2019 -0700 Add fake_resolver changes commit 8610a64ec9cc3bae10a5816e2a4800e0755bbb71 Author: Yash Tibrewal <yashkt@google.com> Date: Mon Oct 7 19:31:13 2019 -0700 Remaning one from xds_client commit 5f22055d0d3d177b8e3256e371b828abd3b88641 Author: Yash Tibrewal <yashkt@google.com> Date: Mon Oct 7 18:47:28 2019 -0700 One left from xds_client.cc commit 4b1223f8753c103760cf9a15660a6786859a607f Author: Yash Tibrewal <yashkt@google.com> Date: Mon Oct 7 17:17:12 2019 -0700 modifications for xds.cc commit a17bbbd840f56cbc608b463fb04ebabcc8152c01 Author: Yash Tibrewal <yashkt@google.com> Date: Mon Oct 7 13:06:25 2019 -0700 grpclb.cc changes commit 3a33ed4762616397281a7d0e60e07d92439438f3 Merge: 11058748fd 3d363368ca Author: Yash Tibrewal <yashkt@google.com> Date: Mon Oct 7 11:24:11 2019 -0700 Merge branch 'combinernew' of github.com:yashykt/grpc into combinernew commit 3d363368ca0a0779182afeda0eb3279dc951d757 Author: Yash Tibrewal <yashkt@google.com> Date: Mon Oct 7 11:18:00 2019 -0700 New combiner
5 years ago
args.lock->Run(
GRPC_CLOSURE_CREATE(StartResolvingLocked, resolver.get(), nullptr),
GRPC_ERROR_NONE);
grpc_core::ExecCtx::Get()->Flush();
PollPollsetUntilRequestDone(&args);
ArgsFinish(&args);
}
TEST(ResolverComponentTest, TestResolvesRelevantRecords) {
RunResolvesRelevantRecordsTest(CheckingResultHandler::Create);
}
TEST(ResolverComponentTest, TestResolvesRelevantRecordsWithConcurrentFdStress) {
// Start up background stress thread
int dummy_port = grpc_pick_unused_port_or_die();
gpr_event done_ev;
gpr_event_init(&done_ev);
std::thread socket_stress_thread(OpenAndCloseSocketsStressLoop, dummy_port,
&done_ev);
// Run the resolver test
RunResolvesRelevantRecordsTest(ResultHandler::Create);
// Shutdown and join stress thread
gpr_event_set(&done_ev, (void*)1);
socket_stress_thread.join();
}
} // namespace
int main(int argc, char** argv) {
grpc_init();
grpc::testing::TestEnvironment env(argc, argv);
::testing::InitGoogleTest(&argc, argv);
grpc::testing::InitTest(&argc, &argv, true);
if (FLAGS_target_name == "") {
gpr_log(GPR_ERROR, "Missing target_name param.");
abort();
}
auto result = RUN_ALL_TESTS();
grpc_shutdown();
return result;
}