mirror of https://github.com/grpc/grpc-go.git
1254 lines
27 KiB
Go
1254 lines
27 KiB
Go
/*
|
|
*
|
|
* Copyright 2018 gRPC authors.
|
|
*
|
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
* you may not use this file except in compliance with the License.
|
|
* You may obtain a copy of the License at
|
|
*
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
*
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
* See the License for the specific language governing permissions and
|
|
* limitations under the License.
|
|
*
|
|
*/
|
|
|
|
package dns
|
|
|
|
import (
|
|
"context"
|
|
"errors"
|
|
"fmt"
|
|
"net"
|
|
"os"
|
|
"reflect"
|
|
"sync"
|
|
"testing"
|
|
"time"
|
|
|
|
"google.golang.org/grpc/internal/leakcheck"
|
|
"google.golang.org/grpc/resolver"
|
|
"google.golang.org/grpc/serviceconfig"
|
|
)
|
|
|
|
func TestMain(m *testing.M) {
|
|
// Set a valid duration for the re-resolution rate only for tests which are
|
|
// actually testing that feature.
|
|
dc := replaceDNSResRate(time.Duration(0))
|
|
defer dc()
|
|
|
|
cleanup := replaceNetFunc(nil)
|
|
code := m.Run()
|
|
cleanup()
|
|
os.Exit(code)
|
|
}
|
|
|
|
const (
|
|
txtBytesLimit = 255
|
|
)
|
|
|
|
type testClientConn struct {
|
|
target string
|
|
m1 sync.Mutex
|
|
addrs []resolver.Address
|
|
a int // how many times NewAddress() has been called
|
|
m2 sync.Mutex
|
|
sc string
|
|
s int
|
|
}
|
|
|
|
func (t *testClientConn) UpdateState(s resolver.State) {
|
|
panic("unused")
|
|
}
|
|
|
|
func (t *testClientConn) NewAddress(addresses []resolver.Address) {
|
|
t.m1.Lock()
|
|
defer t.m1.Unlock()
|
|
t.addrs = addresses
|
|
t.a++
|
|
}
|
|
|
|
func (t *testClientConn) getAddress() ([]resolver.Address, int) {
|
|
t.m1.Lock()
|
|
defer t.m1.Unlock()
|
|
return t.addrs, t.a
|
|
}
|
|
|
|
func (t *testClientConn) NewServiceConfig(serviceConfig string) {
|
|
t.m2.Lock()
|
|
defer t.m2.Unlock()
|
|
t.sc = serviceConfig
|
|
t.s++
|
|
}
|
|
|
|
func (t *testClientConn) getSc() (string, int) {
|
|
t.m2.Lock()
|
|
defer t.m2.Unlock()
|
|
return t.sc, t.s
|
|
}
|
|
|
|
func (t *testClientConn) ParseServiceConfig(string) *serviceconfig.ParseResult {
|
|
panic("not implemented")
|
|
}
|
|
|
|
func (t *testClientConn) ReportError(error) {
|
|
panic("not implemented")
|
|
}
|
|
|
|
type testResolver struct {
|
|
// A write to this channel is made when this resolver receives a resolution
|
|
// request. Tests can rely on reading from this channel to be notified about
|
|
// resolution requests instead of sleeping for a predefined period of time.
|
|
ch chan struct{}
|
|
}
|
|
|
|
func (tr *testResolver) LookupHost(ctx context.Context, host string) ([]string, error) {
|
|
if tr.ch != nil {
|
|
tr.ch <- struct{}{}
|
|
}
|
|
return hostLookup(host)
|
|
}
|
|
|
|
func (*testResolver) LookupSRV(ctx context.Context, service, proto, name string) (string, []*net.SRV, error) {
|
|
return srvLookup(service, proto, name)
|
|
}
|
|
|
|
func (*testResolver) LookupTXT(ctx context.Context, host string) ([]string, error) {
|
|
return txtLookup(host)
|
|
}
|
|
|
|
func replaceNetFunc(ch chan struct{}) func() {
|
|
oldResolver := defaultResolver
|
|
defaultResolver = &testResolver{ch: ch}
|
|
|
|
return func() {
|
|
defaultResolver = oldResolver
|
|
}
|
|
}
|
|
|
|
func replaceDNSResRate(d time.Duration) func() {
|
|
oldMinDNSResRate := minDNSResRate
|
|
minDNSResRate = d
|
|
|
|
return func() {
|
|
minDNSResRate = oldMinDNSResRate
|
|
}
|
|
}
|
|
|
|
var hostLookupTbl = struct {
|
|
sync.Mutex
|
|
tbl map[string][]string
|
|
}{
|
|
tbl: map[string][]string{
|
|
"foo.bar.com": {"1.2.3.4", "5.6.7.8"},
|
|
"ipv4.single.fake": {"1.2.3.4"},
|
|
"srv.ipv4.single.fake": {"2.4.6.8"},
|
|
"ipv4.multi.fake": {"1.2.3.4", "5.6.7.8", "9.10.11.12"},
|
|
"ipv6.single.fake": {"2607:f8b0:400a:801::1001"},
|
|
"ipv6.multi.fake": {"2607:f8b0:400a:801::1001", "2607:f8b0:400a:801::1002", "2607:f8b0:400a:801::1003"},
|
|
},
|
|
}
|
|
|
|
func hostLookup(host string) ([]string, error) {
|
|
hostLookupTbl.Lock()
|
|
defer hostLookupTbl.Unlock()
|
|
if addrs, cnt := hostLookupTbl.tbl[host]; cnt {
|
|
return addrs, nil
|
|
}
|
|
return nil, fmt.Errorf("failed to lookup host:%s resolution in hostLookupTbl", host)
|
|
}
|
|
|
|
var srvLookupTbl = struct {
|
|
sync.Mutex
|
|
tbl map[string][]*net.SRV
|
|
}{
|
|
tbl: map[string][]*net.SRV{
|
|
"_grpclb._tcp.srv.ipv4.single.fake": {&net.SRV{Target: "ipv4.single.fake", Port: 1234}},
|
|
"_grpclb._tcp.srv.ipv4.multi.fake": {&net.SRV{Target: "ipv4.multi.fake", Port: 1234}},
|
|
"_grpclb._tcp.srv.ipv6.single.fake": {&net.SRV{Target: "ipv6.single.fake", Port: 1234}},
|
|
"_grpclb._tcp.srv.ipv6.multi.fake": {&net.SRV{Target: "ipv6.multi.fake", Port: 1234}},
|
|
},
|
|
}
|
|
|
|
func srvLookup(service, proto, name string) (string, []*net.SRV, error) {
|
|
cname := "_" + service + "._" + proto + "." + name
|
|
srvLookupTbl.Lock()
|
|
defer srvLookupTbl.Unlock()
|
|
if srvs, cnt := srvLookupTbl.tbl[cname]; cnt {
|
|
return cname, srvs, nil
|
|
}
|
|
return "", nil, fmt.Errorf("failed to lookup srv record for %s in srvLookupTbl", cname)
|
|
}
|
|
|
|
// div divides a byte slice into a slice of strings, each of which is of maximum
|
|
// 255 bytes length, which is the length limit per TXT record in DNS.
|
|
func div(b []byte) []string {
|
|
var r []string
|
|
for i := 0; i < len(b); i += txtBytesLimit {
|
|
if i+txtBytesLimit > len(b) {
|
|
r = append(r, string(b[i:]))
|
|
} else {
|
|
r = append(r, string(b[i:i+txtBytesLimit]))
|
|
}
|
|
}
|
|
return r
|
|
}
|
|
|
|
// scfs contains an array of service config file string in JSON format.
|
|
// Notes about the scfs contents and usage:
|
|
// scfs contains 4 service config file JSON strings for testing. Inside each
|
|
// service config file, there are multiple choices. scfs[0:3] each contains 5
|
|
// choices, and first 3 choices are nonmatching choices based on canarying rule,
|
|
// while the last two are matched choices. scfs[3] only contains 3 choices, and
|
|
// all of them are nonmatching based on canarying rule. For each of scfs[0:3],
|
|
// the eventually returned service config, which is from the first of the two
|
|
// matched choices, is stored in the corresponding scs element (e.g.
|
|
// scfs[0]->scs[0]). scfs and scs elements are used in pair to test the dns
|
|
// resolver functionality, with scfs as the input and scs used for validation of
|
|
// the output. For scfs[3], it corresponds to empty service config, since there
|
|
// isn't a matched choice.
|
|
var scfs = []string{
|
|
`[
|
|
{
|
|
"clientLanguage": [
|
|
"CPP",
|
|
"JAVA"
|
|
],
|
|
"serviceConfig": {
|
|
"loadBalancingPolicy": "grpclb",
|
|
"methodConfig": [
|
|
{
|
|
"name": [
|
|
{
|
|
"service": "all"
|
|
}
|
|
],
|
|
"timeout": "1s"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
{
|
|
"percentage": 0,
|
|
"serviceConfig": {
|
|
"loadBalancingPolicy": "grpclb",
|
|
"methodConfig": [
|
|
{
|
|
"name": [
|
|
{
|
|
"service": "all"
|
|
}
|
|
],
|
|
"timeout": "1s"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
{
|
|
"clientHostName": [
|
|
"localhost"
|
|
],
|
|
"serviceConfig": {
|
|
"loadBalancingPolicy": "grpclb",
|
|
"methodConfig": [
|
|
{
|
|
"name": [
|
|
{
|
|
"service": "all"
|
|
}
|
|
],
|
|
"timeout": "1s"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
{
|
|
"clientLanguage": [
|
|
"GO"
|
|
],
|
|
"percentage": 100,
|
|
"serviceConfig": {
|
|
"methodConfig": [
|
|
{
|
|
"name": [
|
|
{
|
|
"method": "bar"
|
|
}
|
|
],
|
|
"maxRequestMessageBytes": 1024,
|
|
"maxResponseMessageBytes": 1024
|
|
}
|
|
]
|
|
}
|
|
},
|
|
{
|
|
"serviceConfig": {
|
|
"loadBalancingPolicy": "round_robin",
|
|
"methodConfig": [
|
|
{
|
|
"name": [
|
|
{
|
|
"service": "foo",
|
|
"method": "bar"
|
|
}
|
|
],
|
|
"waitForReady": true
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]`,
|
|
`[
|
|
{
|
|
"clientLanguage": [
|
|
"CPP",
|
|
"JAVA"
|
|
],
|
|
"serviceConfig": {
|
|
"loadBalancingPolicy": "grpclb",
|
|
"methodConfig": [
|
|
{
|
|
"name": [
|
|
{
|
|
"service": "all"
|
|
}
|
|
],
|
|
"timeout": "1s"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
{
|
|
"percentage": 0,
|
|
"serviceConfig": {
|
|
"loadBalancingPolicy": "grpclb",
|
|
"methodConfig": [
|
|
{
|
|
"name": [
|
|
{
|
|
"service": "all"
|
|
}
|
|
],
|
|
"timeout": "1s"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
{
|
|
"clientHostName": [
|
|
"localhost"
|
|
],
|
|
"serviceConfig": {
|
|
"loadBalancingPolicy": "grpclb",
|
|
"methodConfig": [
|
|
{
|
|
"name": [
|
|
{
|
|
"service": "all"
|
|
}
|
|
],
|
|
"timeout": "1s"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
{
|
|
"clientLanguage": [
|
|
"GO"
|
|
],
|
|
"percentage": 100,
|
|
"serviceConfig": {
|
|
"methodConfig": [
|
|
{
|
|
"name": [
|
|
{
|
|
"service": "foo",
|
|
"method": "bar"
|
|
}
|
|
],
|
|
"waitForReady": true,
|
|
"timeout": "1s",
|
|
"maxRequestMessageBytes": 1024,
|
|
"maxResponseMessageBytes": 1024
|
|
}
|
|
]
|
|
}
|
|
},
|
|
{
|
|
"serviceConfig": {
|
|
"loadBalancingPolicy": "round_robin",
|
|
"methodConfig": [
|
|
{
|
|
"name": [
|
|
{
|
|
"service": "foo",
|
|
"method": "bar"
|
|
}
|
|
],
|
|
"waitForReady": true
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]`,
|
|
`[
|
|
{
|
|
"clientLanguage": [
|
|
"CPP",
|
|
"JAVA"
|
|
],
|
|
"serviceConfig": {
|
|
"loadBalancingPolicy": "grpclb",
|
|
"methodConfig": [
|
|
{
|
|
"name": [
|
|
{
|
|
"service": "all"
|
|
}
|
|
],
|
|
"timeout": "1s"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
{
|
|
"percentage": 0,
|
|
"serviceConfig": {
|
|
"loadBalancingPolicy": "grpclb",
|
|
"methodConfig": [
|
|
{
|
|
"name": [
|
|
{
|
|
"service": "all"
|
|
}
|
|
],
|
|
"timeout": "1s"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
{
|
|
"clientHostName": [
|
|
"localhost"
|
|
],
|
|
"serviceConfig": {
|
|
"loadBalancingPolicy": "grpclb",
|
|
"methodConfig": [
|
|
{
|
|
"name": [
|
|
{
|
|
"service": "all"
|
|
}
|
|
],
|
|
"timeout": "1s"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
{
|
|
"clientLanguage": [
|
|
"GO"
|
|
],
|
|
"percentage": 100,
|
|
"serviceConfig": {
|
|
"loadBalancingPolicy": "round_robin",
|
|
"methodConfig": [
|
|
{
|
|
"name": [
|
|
{
|
|
"service": "foo"
|
|
}
|
|
],
|
|
"waitForReady": true,
|
|
"timeout": "1s"
|
|
},
|
|
{
|
|
"name": [
|
|
{
|
|
"service": "bar"
|
|
}
|
|
],
|
|
"waitForReady": false
|
|
}
|
|
]
|
|
}
|
|
},
|
|
{
|
|
"serviceConfig": {
|
|
"loadBalancingPolicy": "round_robin",
|
|
"methodConfig": [
|
|
{
|
|
"name": [
|
|
{
|
|
"service": "foo",
|
|
"method": "bar"
|
|
}
|
|
],
|
|
"waitForReady": true
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]`,
|
|
`[
|
|
{
|
|
"clientLanguage": [
|
|
"CPP",
|
|
"JAVA"
|
|
],
|
|
"serviceConfig": {
|
|
"loadBalancingPolicy": "grpclb",
|
|
"methodConfig": [
|
|
{
|
|
"name": [
|
|
{
|
|
"service": "all"
|
|
}
|
|
],
|
|
"timeout": "1s"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
{
|
|
"percentage": 0,
|
|
"serviceConfig": {
|
|
"loadBalancingPolicy": "grpclb",
|
|
"methodConfig": [
|
|
{
|
|
"name": [
|
|
{
|
|
"service": "all"
|
|
}
|
|
],
|
|
"timeout": "1s"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
{
|
|
"clientHostName": [
|
|
"localhost"
|
|
],
|
|
"serviceConfig": {
|
|
"loadBalancingPolicy": "grpclb",
|
|
"methodConfig": [
|
|
{
|
|
"name": [
|
|
{
|
|
"service": "all"
|
|
}
|
|
],
|
|
"timeout": "1s"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]`,
|
|
}
|
|
|
|
// scs contains an array of service config string in JSON format.
|
|
var scs = []string{
|
|
`{
|
|
"methodConfig": [
|
|
{
|
|
"name": [
|
|
{
|
|
"method": "bar"
|
|
}
|
|
],
|
|
"maxRequestMessageBytes": 1024,
|
|
"maxResponseMessageBytes": 1024
|
|
}
|
|
]
|
|
}`,
|
|
`{
|
|
"methodConfig": [
|
|
{
|
|
"name": [
|
|
{
|
|
"service": "foo",
|
|
"method": "bar"
|
|
}
|
|
],
|
|
"waitForReady": true,
|
|
"timeout": "1s",
|
|
"maxRequestMessageBytes": 1024,
|
|
"maxResponseMessageBytes": 1024
|
|
}
|
|
]
|
|
}`,
|
|
`{
|
|
"loadBalancingPolicy": "round_robin",
|
|
"methodConfig": [
|
|
{
|
|
"name": [
|
|
{
|
|
"service": "foo"
|
|
}
|
|
],
|
|
"waitForReady": true,
|
|
"timeout": "1s"
|
|
},
|
|
{
|
|
"name": [
|
|
{
|
|
"service": "bar"
|
|
}
|
|
],
|
|
"waitForReady": false
|
|
}
|
|
]
|
|
}`,
|
|
}
|
|
|
|
// scLookupTbl is a set, which contains targets that have service config. Target
|
|
// not in this set should not have service config.
|
|
var scLookupTbl = map[string]bool{
|
|
txtPrefix + "foo.bar.com": true,
|
|
txtPrefix + "srv.ipv4.single.fake": true,
|
|
txtPrefix + "srv.ipv4.multi.fake": true,
|
|
txtPrefix + "no.attribute": true,
|
|
}
|
|
|
|
// generateSCF generates a slice of strings (aggregately representing a single
|
|
// service config file) for the input name, which mocks the result from a real
|
|
// DNS TXT record lookup.
|
|
func generateSCF(name string) []string {
|
|
var b []byte
|
|
switch name {
|
|
case "foo.bar.com":
|
|
b = []byte(scfs[0])
|
|
case "srv.ipv4.single.fake":
|
|
b = []byte(scfs[1])
|
|
case "srv.ipv4.multi.fake":
|
|
b = []byte(scfs[2])
|
|
default:
|
|
b = []byte(scfs[3])
|
|
}
|
|
if name == "no.attribute" {
|
|
return div(b)
|
|
}
|
|
return div(append([]byte(txtAttribute), b...))
|
|
}
|
|
|
|
// generateSC returns a service config string in JSON format for the input name.
|
|
func generateSC(name string) string {
|
|
_, cnt := scLookupTbl[name]
|
|
if !cnt || name == "no.attribute" {
|
|
return ""
|
|
}
|
|
switch name {
|
|
case "foo.bar.com":
|
|
return scs[0]
|
|
case "srv.ipv4.single.fake":
|
|
return scs[1]
|
|
case "srv.ipv4.multi.fake":
|
|
return scs[2]
|
|
default:
|
|
return ""
|
|
}
|
|
}
|
|
|
|
var txtLookupTbl = struct {
|
|
sync.Mutex
|
|
tbl map[string][]string
|
|
}{
|
|
tbl: map[string][]string{
|
|
"foo.bar.com": generateSCF("foo.bar.com"),
|
|
"srv.ipv4.single.fake": generateSCF("srv.ipv4.single.fake"),
|
|
"srv.ipv4.multi.fake": generateSCF("srv.ipv4.multi.fake"),
|
|
"srv.ipv6.single.fake": generateSCF("srv.ipv6.single.fake"),
|
|
"srv.ipv6.multi.fake": generateSCF("srv.ipv6.multi.fake"),
|
|
"no.attribute": generateSCF("no.attribute"),
|
|
},
|
|
}
|
|
|
|
func txtLookup(host string) ([]string, error) {
|
|
txtLookupTbl.Lock()
|
|
defer txtLookupTbl.Unlock()
|
|
if scs, cnt := txtLookupTbl.tbl[host]; cnt {
|
|
return scs, nil
|
|
}
|
|
return nil, fmt.Errorf("failed to lookup TXT:%s resolution in txtLookupTbl", host)
|
|
}
|
|
|
|
func TestResolve(t *testing.T) {
|
|
testDNSResolver(t)
|
|
testDNSResolveNow(t)
|
|
testIPResolver(t)
|
|
}
|
|
|
|
func testDNSResolver(t *testing.T) {
|
|
defer leakcheck.Check(t)
|
|
tests := []struct {
|
|
target string
|
|
addrWant []resolver.Address
|
|
scWant string
|
|
}{
|
|
{
|
|
"foo.bar.com",
|
|
[]resolver.Address{{Addr: "1.2.3.4" + colonDefaultPort}, {Addr: "5.6.7.8" + colonDefaultPort}},
|
|
generateSC("foo.bar.com"),
|
|
},
|
|
{
|
|
"foo.bar.com:1234",
|
|
[]resolver.Address{{Addr: "1.2.3.4:1234"}, {Addr: "5.6.7.8:1234"}},
|
|
generateSC("foo.bar.com"),
|
|
},
|
|
{
|
|
"srv.ipv4.single.fake",
|
|
[]resolver.Address{{Addr: "1.2.3.4:1234", Type: resolver.GRPCLB, ServerName: "ipv4.single.fake"}, {Addr: "2.4.6.8" + colonDefaultPort}},
|
|
generateSC("srv.ipv4.single.fake"),
|
|
},
|
|
{
|
|
"srv.ipv4.multi.fake",
|
|
[]resolver.Address{
|
|
{Addr: "1.2.3.4:1234", Type: resolver.GRPCLB, ServerName: "ipv4.multi.fake"},
|
|
{Addr: "5.6.7.8:1234", Type: resolver.GRPCLB, ServerName: "ipv4.multi.fake"},
|
|
{Addr: "9.10.11.12:1234", Type: resolver.GRPCLB, ServerName: "ipv4.multi.fake"},
|
|
},
|
|
generateSC("srv.ipv4.multi.fake"),
|
|
},
|
|
{
|
|
"srv.ipv6.single.fake",
|
|
[]resolver.Address{{Addr: "[2607:f8b0:400a:801::1001]:1234", Type: resolver.GRPCLB, ServerName: "ipv6.single.fake"}},
|
|
generateSC("srv.ipv6.single.fake"),
|
|
},
|
|
{
|
|
"srv.ipv6.multi.fake",
|
|
[]resolver.Address{
|
|
{Addr: "[2607:f8b0:400a:801::1001]:1234", Type: resolver.GRPCLB, ServerName: "ipv6.multi.fake"},
|
|
{Addr: "[2607:f8b0:400a:801::1002]:1234", Type: resolver.GRPCLB, ServerName: "ipv6.multi.fake"},
|
|
{Addr: "[2607:f8b0:400a:801::1003]:1234", Type: resolver.GRPCLB, ServerName: "ipv6.multi.fake"},
|
|
},
|
|
generateSC("srv.ipv6.multi.fake"),
|
|
},
|
|
{
|
|
"no.attribute",
|
|
nil,
|
|
generateSC("no.attribute"),
|
|
},
|
|
}
|
|
|
|
for _, a := range tests {
|
|
b := NewBuilder()
|
|
cc := &testClientConn{target: a.target}
|
|
r, err := b.Build(resolver.Target{Endpoint: a.target}, cc, resolver.BuildOption{})
|
|
if err != nil {
|
|
t.Fatalf("%v\n", err)
|
|
}
|
|
var addrs []resolver.Address
|
|
var cnt int
|
|
for {
|
|
addrs, cnt = cc.getAddress()
|
|
if cnt > 0 {
|
|
break
|
|
}
|
|
time.Sleep(time.Millisecond)
|
|
}
|
|
var sc string
|
|
for {
|
|
sc, cnt = cc.getSc()
|
|
if cnt > 0 {
|
|
break
|
|
}
|
|
time.Sleep(time.Millisecond)
|
|
}
|
|
if !reflect.DeepEqual(a.addrWant, addrs) {
|
|
t.Errorf("Resolved addresses of target: %q = %+v, want %+v\n", a.target, addrs, a.addrWant)
|
|
}
|
|
if !reflect.DeepEqual(a.scWant, sc) {
|
|
t.Errorf("Resolved service config of target: %q = %+v, want %+v\n", a.target, sc, a.scWant)
|
|
}
|
|
r.Close()
|
|
}
|
|
}
|
|
|
|
func mutateTbl(target string) func() {
|
|
hostLookupTbl.Lock()
|
|
oldHostTblEntry := hostLookupTbl.tbl[target]
|
|
hostLookupTbl.tbl[target] = hostLookupTbl.tbl[target][:len(oldHostTblEntry)-1]
|
|
hostLookupTbl.Unlock()
|
|
txtLookupTbl.Lock()
|
|
oldTxtTblEntry := txtLookupTbl.tbl[target]
|
|
txtLookupTbl.tbl[target] = []string{""}
|
|
txtLookupTbl.Unlock()
|
|
|
|
return func() {
|
|
hostLookupTbl.Lock()
|
|
hostLookupTbl.tbl[target] = oldHostTblEntry
|
|
hostLookupTbl.Unlock()
|
|
txtLookupTbl.Lock()
|
|
txtLookupTbl.tbl[target] = oldTxtTblEntry
|
|
txtLookupTbl.Unlock()
|
|
}
|
|
}
|
|
|
|
func testDNSResolveNow(t *testing.T) {
|
|
defer leakcheck.Check(t)
|
|
tests := []struct {
|
|
target string
|
|
addrWant []resolver.Address
|
|
addrNext []resolver.Address
|
|
scWant string
|
|
scNext string
|
|
}{
|
|
{
|
|
"foo.bar.com",
|
|
[]resolver.Address{{Addr: "1.2.3.4" + colonDefaultPort}, {Addr: "5.6.7.8" + colonDefaultPort}},
|
|
[]resolver.Address{{Addr: "1.2.3.4" + colonDefaultPort}},
|
|
generateSC("foo.bar.com"),
|
|
"",
|
|
},
|
|
}
|
|
|
|
for _, a := range tests {
|
|
b := NewBuilder()
|
|
cc := &testClientConn{target: a.target}
|
|
r, err := b.Build(resolver.Target{Endpoint: a.target}, cc, resolver.BuildOption{})
|
|
if err != nil {
|
|
t.Fatalf("%v\n", err)
|
|
}
|
|
var addrs []resolver.Address
|
|
var cnt int
|
|
for {
|
|
addrs, cnt = cc.getAddress()
|
|
if cnt > 0 {
|
|
break
|
|
}
|
|
time.Sleep(time.Millisecond)
|
|
}
|
|
var sc string
|
|
for {
|
|
sc, cnt = cc.getSc()
|
|
if cnt > 0 {
|
|
break
|
|
}
|
|
time.Sleep(time.Millisecond)
|
|
}
|
|
if !reflect.DeepEqual(a.addrWant, addrs) {
|
|
t.Errorf("Resolved addresses of target: %q = %+v, want %+v\n", a.target, addrs, a.addrWant)
|
|
}
|
|
if !reflect.DeepEqual(a.scWant, sc) {
|
|
t.Errorf("Resolved service config of target: %q = %+v, want %+v\n", a.target, sc, a.scWant)
|
|
}
|
|
revertTbl := mutateTbl(a.target)
|
|
r.ResolveNow(resolver.ResolveNowOption{})
|
|
for {
|
|
addrs, cnt = cc.getAddress()
|
|
if cnt == 2 {
|
|
break
|
|
}
|
|
time.Sleep(time.Millisecond)
|
|
}
|
|
for {
|
|
sc, cnt = cc.getSc()
|
|
if cnt == 2 {
|
|
break
|
|
}
|
|
time.Sleep(time.Millisecond)
|
|
}
|
|
if !reflect.DeepEqual(a.addrNext, addrs) {
|
|
t.Errorf("Resolved addresses of target: %q = %+v, want %+v\n", a.target, addrs, a.addrNext)
|
|
}
|
|
if !reflect.DeepEqual(a.scNext, sc) {
|
|
t.Errorf("Resolved service config of target: %q = %+v, want %+v\n", a.target, sc, a.scNext)
|
|
}
|
|
revertTbl()
|
|
r.Close()
|
|
}
|
|
}
|
|
|
|
const colonDefaultPort = ":" + defaultPort
|
|
|
|
func testIPResolver(t *testing.T) {
|
|
defer leakcheck.Check(t)
|
|
tests := []struct {
|
|
target string
|
|
want []resolver.Address
|
|
}{
|
|
{"127.0.0.1", []resolver.Address{{Addr: "127.0.0.1" + colonDefaultPort}}},
|
|
{"127.0.0.1:12345", []resolver.Address{{Addr: "127.0.0.1:12345"}}},
|
|
{"::1", []resolver.Address{{Addr: "[::1]" + colonDefaultPort}}},
|
|
{"[::1]:12345", []resolver.Address{{Addr: "[::1]:12345"}}},
|
|
{"[::1]", []resolver.Address{{Addr: "[::1]:443"}}},
|
|
{"2001:db8:85a3::8a2e:370:7334", []resolver.Address{{Addr: "[2001:db8:85a3::8a2e:370:7334]" + colonDefaultPort}}},
|
|
{"[2001:db8:85a3::8a2e:370:7334]", []resolver.Address{{Addr: "[2001:db8:85a3::8a2e:370:7334]" + colonDefaultPort}}},
|
|
{"[2001:db8:85a3::8a2e:370:7334]:12345", []resolver.Address{{Addr: "[2001:db8:85a3::8a2e:370:7334]:12345"}}},
|
|
{"[2001:db8::1]:http", []resolver.Address{{Addr: "[2001:db8::1]:http"}}},
|
|
// TODO(yuxuanli): zone support?
|
|
}
|
|
|
|
for _, v := range tests {
|
|
b := NewBuilder()
|
|
cc := &testClientConn{target: v.target}
|
|
r, err := b.Build(resolver.Target{Endpoint: v.target}, cc, resolver.BuildOption{})
|
|
if err != nil {
|
|
t.Fatalf("%v\n", err)
|
|
}
|
|
var addrs []resolver.Address
|
|
var cnt int
|
|
for {
|
|
addrs, cnt = cc.getAddress()
|
|
if cnt > 0 {
|
|
break
|
|
}
|
|
time.Sleep(time.Millisecond)
|
|
}
|
|
if !reflect.DeepEqual(v.want, addrs) {
|
|
t.Errorf("Resolved addresses of target: %q = %+v, want %+v\n", v.target, addrs, v.want)
|
|
}
|
|
r.ResolveNow(resolver.ResolveNowOption{})
|
|
for {
|
|
addrs, cnt = cc.getAddress()
|
|
if cnt == 2 {
|
|
break
|
|
}
|
|
time.Sleep(time.Millisecond)
|
|
}
|
|
if !reflect.DeepEqual(v.want, addrs) {
|
|
t.Errorf("Resolved addresses of target: %q = %+v, want %+v\n", v.target, addrs, v.want)
|
|
}
|
|
r.Close()
|
|
}
|
|
}
|
|
|
|
func TestResolveFunc(t *testing.T) {
|
|
defer leakcheck.Check(t)
|
|
tests := []struct {
|
|
addr string
|
|
want error
|
|
}{
|
|
// TODO(yuxuanli): More false cases?
|
|
{"www.google.com", nil},
|
|
{"foo.bar:12345", nil},
|
|
{"127.0.0.1", nil},
|
|
{"::", nil},
|
|
{"127.0.0.1:12345", nil},
|
|
{"[::1]:80", nil},
|
|
{"[2001:db8:a0b:12f0::1]:21", nil},
|
|
{":80", nil},
|
|
{"127.0.0...1:12345", nil},
|
|
{"[fe80::1%lo0]:80", nil},
|
|
{"golang.org:http", nil},
|
|
{"[2001:db8::1]:http", nil},
|
|
{"[2001:db8::1]:", errEndsWithColon},
|
|
{":", errEndsWithColon},
|
|
{"", errMissingAddr},
|
|
{"[2001:db8:a0b:12f0::1", fmt.Errorf("invalid target address [2001:db8:a0b:12f0::1, error info: address [2001:db8:a0b:12f0::1:443: missing ']' in address")},
|
|
}
|
|
|
|
b := NewBuilder()
|
|
for _, v := range tests {
|
|
cc := &testClientConn{target: v.addr}
|
|
r, err := b.Build(resolver.Target{Endpoint: v.addr}, cc, resolver.BuildOption{})
|
|
if err == nil {
|
|
r.Close()
|
|
}
|
|
if !reflect.DeepEqual(err, v.want) {
|
|
t.Errorf("Build(%q, cc, resolver.BuildOption{}) = %v, want %v", v.addr, err, v.want)
|
|
}
|
|
}
|
|
}
|
|
|
|
func TestDisableServiceConfig(t *testing.T) {
|
|
defer leakcheck.Check(t)
|
|
tests := []struct {
|
|
target string
|
|
scWant string
|
|
disableServiceConfig bool
|
|
}{
|
|
{
|
|
"foo.bar.com",
|
|
generateSC("foo.bar.com"),
|
|
false,
|
|
},
|
|
{
|
|
"foo.bar.com",
|
|
"",
|
|
true,
|
|
},
|
|
}
|
|
|
|
for _, a := range tests {
|
|
b := NewBuilder()
|
|
cc := &testClientConn{target: a.target}
|
|
r, err := b.Build(resolver.Target{Endpoint: a.target}, cc, resolver.BuildOption{DisableServiceConfig: a.disableServiceConfig})
|
|
if err != nil {
|
|
t.Fatalf("%v\n", err)
|
|
}
|
|
var cnt int
|
|
var sc string
|
|
for {
|
|
sc, cnt = cc.getSc()
|
|
if cnt > 0 {
|
|
break
|
|
}
|
|
time.Sleep(time.Millisecond)
|
|
}
|
|
if !reflect.DeepEqual(a.scWant, sc) {
|
|
t.Errorf("Resolved service config of target: %q = %+v, want %+v\n", a.target, sc, a.scWant)
|
|
}
|
|
r.Close()
|
|
}
|
|
}
|
|
|
|
func TestDNSResolverRetry(t *testing.T) {
|
|
b := NewBuilder()
|
|
target := "ipv4.single.fake"
|
|
cc := &testClientConn{target: target}
|
|
r, err := b.Build(resolver.Target{Endpoint: target}, cc, resolver.BuildOption{})
|
|
if err != nil {
|
|
t.Fatalf("%v\n", err)
|
|
}
|
|
var addrs []resolver.Address
|
|
for {
|
|
addrs, _ = cc.getAddress()
|
|
if len(addrs) == 1 {
|
|
break
|
|
}
|
|
time.Sleep(time.Millisecond)
|
|
}
|
|
want := []resolver.Address{{Addr: "1.2.3.4" + colonDefaultPort}}
|
|
if !reflect.DeepEqual(want, addrs) {
|
|
t.Errorf("Resolved addresses of target: %q = %+v, want %+v\n", target, addrs, want)
|
|
}
|
|
// mutate the host lookup table so the target has 0 address returned.
|
|
revertTbl := mutateTbl(target)
|
|
// trigger a resolve that will get empty address list
|
|
r.ResolveNow(resolver.ResolveNowOption{})
|
|
for {
|
|
addrs, _ = cc.getAddress()
|
|
if len(addrs) == 0 {
|
|
break
|
|
}
|
|
time.Sleep(time.Millisecond)
|
|
}
|
|
revertTbl()
|
|
// wait for the retry to happen in two seconds.
|
|
timer := time.NewTimer(2 * time.Second)
|
|
for {
|
|
b := false
|
|
select {
|
|
case <-timer.C:
|
|
b = true
|
|
default:
|
|
addrs, _ = cc.getAddress()
|
|
if len(addrs) == 1 {
|
|
b = true
|
|
break
|
|
}
|
|
time.Sleep(time.Millisecond)
|
|
}
|
|
if b {
|
|
break
|
|
}
|
|
}
|
|
if !reflect.DeepEqual(want, addrs) {
|
|
t.Errorf("Resolved addresses of target: %q = %+v, want %+v\n", target, addrs, want)
|
|
}
|
|
r.Close()
|
|
}
|
|
|
|
func TestCustomAuthority(t *testing.T) {
|
|
defer leakcheck.Check(t)
|
|
|
|
tests := []struct {
|
|
authority string
|
|
authorityWant string
|
|
expectError bool
|
|
}{
|
|
{
|
|
"4.3.2.1:" + defaultDNSSvrPort,
|
|
"4.3.2.1:" + defaultDNSSvrPort,
|
|
false,
|
|
},
|
|
{
|
|
"4.3.2.1:123",
|
|
"4.3.2.1:123",
|
|
false,
|
|
},
|
|
{
|
|
"4.3.2.1",
|
|
"4.3.2.1:" + defaultDNSSvrPort,
|
|
false,
|
|
},
|
|
{
|
|
"::1",
|
|
"[::1]:" + defaultDNSSvrPort,
|
|
false,
|
|
},
|
|
{
|
|
"[::1]",
|
|
"[::1]:" + defaultDNSSvrPort,
|
|
false,
|
|
},
|
|
{
|
|
"[::1]:123",
|
|
"[::1]:123",
|
|
false,
|
|
},
|
|
{
|
|
"dnsserver.com",
|
|
"dnsserver.com:" + defaultDNSSvrPort,
|
|
false,
|
|
},
|
|
{
|
|
":123",
|
|
"localhost:123",
|
|
false,
|
|
},
|
|
{
|
|
":",
|
|
"",
|
|
true,
|
|
},
|
|
{
|
|
"[::1]:",
|
|
"",
|
|
true,
|
|
},
|
|
{
|
|
"dnsserver.com:",
|
|
"",
|
|
true,
|
|
},
|
|
}
|
|
oldCustomAuthorityDialler := customAuthorityDialler
|
|
defer func() {
|
|
customAuthorityDialler = oldCustomAuthorityDialler
|
|
}()
|
|
|
|
for _, a := range tests {
|
|
errChan := make(chan error, 1)
|
|
customAuthorityDialler = func(authority string) func(ctx context.Context, network, address string) (net.Conn, error) {
|
|
if authority != a.authorityWant {
|
|
errChan <- fmt.Errorf("wrong custom authority passed to resolver. input: %s expected: %s actual: %s", a.authority, a.authorityWant, authority)
|
|
} else {
|
|
errChan <- nil
|
|
}
|
|
return func(ctx context.Context, network, address string) (net.Conn, error) {
|
|
return nil, errors.New("no need to dial")
|
|
}
|
|
}
|
|
|
|
b := NewBuilder()
|
|
cc := &testClientConn{target: "foo.bar.com"}
|
|
r, err := b.Build(resolver.Target{Endpoint: "foo.bar.com", Authority: a.authority}, cc, resolver.BuildOption{})
|
|
|
|
if err == nil {
|
|
r.Close()
|
|
|
|
err = <-errChan
|
|
if err != nil {
|
|
t.Errorf(err.Error())
|
|
}
|
|
|
|
if a.expectError {
|
|
t.Errorf("custom authority should have caused an error: %s", a.authority)
|
|
}
|
|
} else if !a.expectError {
|
|
t.Errorf("unexpected error using custom authority %s: %s", a.authority, err)
|
|
}
|
|
}
|
|
}
|
|
|
|
// TestRateLimitedResolve exercises the rate limit enforced on re-resolution
|
|
// requests. It sets the re-resolution rate to a small value and repeatedly
|
|
// calls ResolveNow() and ensures only the expected number of resolution
|
|
// requests are made.
|
|
func TestRateLimitedResolve(t *testing.T) {
|
|
defer leakcheck.Check(t)
|
|
|
|
const dnsResRate = 100 * time.Millisecond
|
|
dc := replaceDNSResRate(dnsResRate)
|
|
defer dc()
|
|
|
|
// Create a new testResolver{} for this test because we want the exact count
|
|
// of the number of times the resolver was invoked.
|
|
nc := replaceNetFunc(make(chan struct{}, 1))
|
|
defer nc()
|
|
|
|
target := "foo.bar.com"
|
|
b := NewBuilder()
|
|
cc := &testClientConn{target: target}
|
|
r, err := b.Build(resolver.Target{Endpoint: target}, cc, resolver.BuildOption{})
|
|
if err != nil {
|
|
t.Fatalf("resolver.Build() returned error: %v\n", err)
|
|
}
|
|
defer r.Close()
|
|
|
|
dnsR, ok := r.(*dnsResolver)
|
|
if !ok {
|
|
t.Fatalf("resolver.Build() returned unexpected type: %T\n", dnsR)
|
|
}
|
|
tr, ok := dnsR.resolver.(*testResolver)
|
|
if !ok {
|
|
t.Fatalf("delegate resolver returned unexpected type: %T\n", tr)
|
|
}
|
|
|
|
// Wait for the first resolution request to be done. This happens as part of
|
|
// the first iteration of the for loop in watcher() because we start with a
|
|
// timer of zero duration.
|
|
<-tr.ch
|
|
|
|
// Here we start a couple of goroutines. One repeatedly calls ResolveNow()
|
|
// until asked to stop, and the other waits for two resolution requests to be
|
|
// made to our testResolver and stops the former. We measure the start and
|
|
// end times, and expect the duration elapsed to be in the interval
|
|
// {2*dnsResRate, 3*dnsResRate}
|
|
start := time.Now()
|
|
done := make(chan struct{})
|
|
go func() {
|
|
for {
|
|
select {
|
|
case <-done:
|
|
return
|
|
default:
|
|
r.ResolveNow(resolver.ResolveNowOption{})
|
|
time.Sleep(1 * time.Millisecond)
|
|
}
|
|
}
|
|
}()
|
|
|
|
gotCalls := 0
|
|
const wantCalls = 2
|
|
min, max := wantCalls*dnsResRate, (wantCalls+1)*dnsResRate
|
|
tMax := time.NewTimer(max)
|
|
for gotCalls != wantCalls {
|
|
select {
|
|
case <-tr.ch:
|
|
gotCalls++
|
|
case <-tMax.C:
|
|
t.Fatalf("Timed out waiting for %v calls after %v; got %v", wantCalls, max, gotCalls)
|
|
}
|
|
}
|
|
close(done)
|
|
elapsed := time.Since(start)
|
|
|
|
if gotCalls != wantCalls {
|
|
t.Fatalf("resolve count mismatch for target: %q = %+v, want %+v\n", target, gotCalls, wantCalls)
|
|
}
|
|
if elapsed < min {
|
|
t.Fatalf("elapsed time: %v, wanted it to be between {%v and %v}", elapsed, min, max)
|
|
}
|
|
|
|
wantAddrs := []resolver.Address{{Addr: "1.2.3.4" + colonDefaultPort}, {Addr: "5.6.7.8" + colonDefaultPort}}
|
|
var gotAddrs []resolver.Address
|
|
for {
|
|
var cnt int
|
|
gotAddrs, cnt = cc.getAddress()
|
|
if cnt > 0 {
|
|
break
|
|
}
|
|
time.Sleep(time.Millisecond)
|
|
}
|
|
if !reflect.DeepEqual(gotAddrs, wantAddrs) {
|
|
t.Errorf("Resolved addresses of target: %q = %+v, want %+v\n", target, gotAddrs, wantAddrs)
|
|
}
|
|
}
|