• Home
  • Line#
  • Scopes#
  • Navigate#
  • Raw
  • Download
1 /*
2  *
3  * Copyright 2017 gRPC authors.
4  *
5  * Licensed under the Apache License, Version 2.0 (the "License");
6  * you may not use this file except in compliance with the License.
7  * You may obtain a copy of the License at
8  *
9  *     http://www.apache.org/licenses/LICENSE-2.0
10  *
11  * Unless required by applicable law or agreed to in writing, software
12  * distributed under the License is distributed on an "AS IS" BASIS,
13  * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
14  * See the License for the specific language governing permissions and
15  * limitations under the License.
16  *
17  */
18 
19 #include <grpc/support/port_platform.h>
20 
21 #include <string>
22 #include <thread>
23 #include <vector>
24 
25 #include <errno.h>
26 #include <fcntl.h>
27 #include <string.h>
28 
29 #include <gflags/gflags.h>
30 #include <gmock/gmock.h>
31 
32 #include "absl/strings/str_cat.h"
33 #include "absl/strings/str_format.h"
34 
35 #include <grpc/grpc.h>
36 #include <grpc/impl/codegen/grpc_types.h>
37 #include <grpc/support/alloc.h>
38 #include <grpc/support/log.h>
39 #include <grpc/support/sync.h>
40 #include <grpc/support/time.h>
41 
42 #include "test/cpp/util/subprocess.h"
43 #include "test/cpp/util/test_config.h"
44 
45 #include "src/core/ext/filters/client_channel/client_channel.h"
46 #include "src/core/ext/filters/client_channel/lb_policy/grpclb/grpclb_balancer_addresses.h"
47 #include "src/core/ext/filters/client_channel/parse_address.h"
48 #include "src/core/ext/filters/client_channel/resolver.h"
49 #include "src/core/ext/filters/client_channel/resolver/dns/c_ares/grpc_ares_ev_driver.h"
50 #include "src/core/ext/filters/client_channel/resolver/dns/c_ares/grpc_ares_wrapper.h"
51 #include "src/core/ext/filters/client_channel/resolver_registry.h"
52 #include "src/core/ext/filters/client_channel/server_address.h"
53 #include "src/core/lib/channel/channel_args.h"
54 #include "src/core/lib/gpr/string.h"
55 #include "src/core/lib/gprpp/host_port.h"
56 #include "src/core/lib/gprpp/orphanable.h"
57 #include "src/core/lib/iomgr/executor.h"
58 #include "src/core/lib/iomgr/iomgr.h"
59 #include "src/core/lib/iomgr/resolve_address.h"
60 #include "src/core/lib/iomgr/sockaddr_utils.h"
61 #include "src/core/lib/iomgr/socket_utils.h"
62 #include "src/core/lib/iomgr/work_serializer.h"
63 #include "test/core/util/port.h"
64 #include "test/core/util/test_config.h"
65 
66 #include "test/cpp/naming/dns_test_util.h"
67 
68 // TODO: pull in different headers when enabling this
69 // test on windows. Also set BAD_SOCKET_RETURN_VAL
70 // to INVALID_SOCKET on windows.
71 #ifdef GPR_WINDOWS
72 #include "src/core/lib/iomgr/sockaddr_windows.h"
73 #include "src/core/lib/iomgr/socket_windows.h"
74 #include "src/core/lib/iomgr/tcp_windows.h"
75 #define BAD_SOCKET_RETURN_VAL INVALID_SOCKET
76 #else
77 #include "src/core/lib/iomgr/sockaddr_posix.h"
78 #define BAD_SOCKET_RETURN_VAL -1
79 #endif
80 
81 using grpc::SubProcess;
82 using std::vector;
83 using testing::UnorderedElementsAreArray;
84 
85 // Hack copied from "test/cpp/end2end/server_crash_test_client.cc"!
86 // In some distros, gflags is in the namespace google, and in some others,
87 // in gflags. This hack is enabling us to find both.
88 namespace google {}
89 namespace gflags {}
90 using namespace google;
91 using namespace gflags;
92 
93 DEFINE_string(target_name, "", "Target name to resolve.");
94 DEFINE_string(do_ordered_address_comparison, "",
95               "Whether or not to compare resolved addresses to expected "
96               "addresses using an ordered comparison. This is useful for "
97               "testing certain behaviors that involve sorting of resolved "
98               "addresses. Note it would be better if this argument was a "
99               "bool flag, but it's a string for ease of invocation from "
100               "the generated python test runner.");
101 DEFINE_string(expected_addrs, "",
102               "List of expected backend or balancer addresses in the form "
103               "'<ip0:port0>,<is_balancer0>;<ip1:port1>,<is_balancer1>;...'. "
104               "'is_balancer' should be bool, i.e. true or false.");
105 DEFINE_string(expected_chosen_service_config, "",
106               "Expected service config json string that gets chosen (no "
107               "whitespace). Empty for none.");
108 DEFINE_string(expected_service_config_error, "",
109               "Expected service config error. Empty for none.");
110 DEFINE_string(
111     local_dns_server_address, "",
112     "Optional. This address is placed as the uri authority if present.");
113 DEFINE_string(
114     enable_srv_queries, "",
115     "Whether or not to enable SRV queries for the ares resolver instance."
116     "It would be better if this arg could be bool, but the way that we "
117     "generate "
118     "the python script runner doesn't allow us to pass a gflags bool to this "
119     "binary.");
120 DEFINE_string(
121     enable_txt_queries, "",
122     "Whether or not to enable TXT queries for the ares resolver instance."
123     "It would be better if this arg could be bool, but the way that we "
124     "generate "
125     "the python script runner doesn't allow us to pass a gflags bool to this "
126     "binary.");
127 DEFINE_string(
128     inject_broken_nameserver_list, "",
129     "Whether or not to configure c-ares to use a broken nameserver list, in "
130     "which "
131     "the first nameserver in the list is non-responsive, but the second one "
132     "works, i.e "
133     "serves the expected DNS records; using for testing such a real scenario."
134     "It would be better if this arg could be bool, but the way that we "
135     "generate "
136     "the python script runner doesn't allow us to pass a gflags bool to this "
137     "binary.");
138 DEFINE_string(expected_lb_policy, "",
139               "Expected lb policy name that appears in resolver result channel "
140               "arg. Empty for none.");
141 
142 namespace {
143 
144 class GrpcLBAddress final {
145  public:
GrpcLBAddress(std::string address,bool is_balancer)146   GrpcLBAddress(std::string address, bool is_balancer)
147       : is_balancer(is_balancer), address(std::move(address)) {}
148 
operator ==(const GrpcLBAddress & other) const149   bool operator==(const GrpcLBAddress& other) const {
150     return this->is_balancer == other.is_balancer &&
151            this->address == other.address;
152   }
153 
operator !=(const GrpcLBAddress & other) const154   bool operator!=(const GrpcLBAddress& other) const {
155     return !(*this == other);
156   }
157 
158   bool is_balancer;
159   std::string address;
160 };
161 
ParseExpectedAddrs(std::string expected_addrs)162 vector<GrpcLBAddress> ParseExpectedAddrs(std::string expected_addrs) {
163   std::vector<GrpcLBAddress> out;
164   while (expected_addrs.size() != 0) {
165     // get the next <ip>,<port> (v4 or v6)
166     size_t next_comma = expected_addrs.find(',');
167     if (next_comma == std::string::npos) {
168       gpr_log(GPR_ERROR,
169               "Missing ','. Expected_addrs arg should be a semicolon-separated "
170               "list of <ip-port>,<bool> pairs. Left-to-be-parsed arg is |%s|",
171               expected_addrs.c_str());
172       abort();
173     }
174     std::string next_addr = expected_addrs.substr(0, next_comma);
175     expected_addrs = expected_addrs.substr(next_comma + 1, std::string::npos);
176     // get the next is_balancer 'bool' associated with this address
177     size_t next_semicolon = expected_addrs.find(';');
178     bool is_balancer = false;
179     gpr_parse_bool_value(expected_addrs.substr(0, next_semicolon).c_str(),
180                          &is_balancer);
181     out.emplace_back(GrpcLBAddress(next_addr, is_balancer));
182     if (next_semicolon == std::string::npos) {
183       break;
184     }
185     expected_addrs =
186         expected_addrs.substr(next_semicolon + 1, std::string::npos);
187   }
188   if (out.size() == 0) {
189     gpr_log(GPR_ERROR,
190             "expected_addrs arg should be a semicolon-separated list of "
191             "<ip-port>,<bool> pairs");
192     abort();
193   }
194   return out;
195 }
196 
TestDeadline(void)197 gpr_timespec TestDeadline(void) {
198   return grpc_timeout_seconds_to_deadline(100);
199 }
200 
201 struct ArgsStruct {
202   gpr_event ev;
203   gpr_atm done_atm;
204   gpr_mu* mu;
205   grpc_pollset* pollset;
206   grpc_pollset_set* pollset_set;
207   std::shared_ptr<grpc_core::WorkSerializer> lock;
208   grpc_channel_args* channel_args;
209   vector<GrpcLBAddress> expected_addrs;
210   std::string expected_service_config_string;
211   std::string expected_service_config_error;
212   std::string expected_lb_policy;
213 };
214 
ArgsInit(ArgsStruct * args)215 void ArgsInit(ArgsStruct* args) {
216   gpr_event_init(&args->ev);
217   args->pollset = (grpc_pollset*)gpr_zalloc(grpc_pollset_size());
218   grpc_pollset_init(args->pollset, &args->mu);
219   args->pollset_set = grpc_pollset_set_create();
220   grpc_pollset_set_add_pollset(args->pollset_set, args->pollset);
221   args->lock = std::make_shared<grpc_core::WorkSerializer>();
222   gpr_atm_rel_store(&args->done_atm, 0);
223   args->channel_args = nullptr;
224 }
225 
DoNothing(void *,grpc_error *)226 void DoNothing(void* /*arg*/, grpc_error* /*error*/) {}
227 
ArgsFinish(ArgsStruct * args)228 void ArgsFinish(ArgsStruct* args) {
229   GPR_ASSERT(gpr_event_wait(&args->ev, TestDeadline()));
230   grpc_pollset_set_del_pollset(args->pollset_set, args->pollset);
231   grpc_pollset_set_destroy(args->pollset_set);
232   grpc_closure DoNothing_cb;
233   GRPC_CLOSURE_INIT(&DoNothing_cb, DoNothing, nullptr,
234                     grpc_schedule_on_exec_ctx);
235   grpc_pollset_shutdown(args->pollset, &DoNothing_cb);
236   // exec_ctx needs to be flushed before calling grpc_pollset_destroy()
237   grpc_channel_args_destroy(args->channel_args);
238   grpc_core::ExecCtx::Get()->Flush();
239   grpc_pollset_destroy(args->pollset);
240   gpr_free(args->pollset);
241 }
242 
NSecondDeadline(int seconds)243 gpr_timespec NSecondDeadline(int seconds) {
244   return gpr_time_add(gpr_now(GPR_CLOCK_REALTIME),
245                       gpr_time_from_seconds(seconds, GPR_TIMESPAN));
246 }
247 
PollPollsetUntilRequestDone(ArgsStruct * args)248 void PollPollsetUntilRequestDone(ArgsStruct* args) {
249   // Use a 20-second timeout to give room for the tests that involve
250   // a non-responsive name server (c-ares uses a ~5 second query timeout
251   // for that server before succeeding with the healthy one).
252   gpr_timespec deadline = NSecondDeadline(20);
253   while (true) {
254     bool done = gpr_atm_acq_load(&args->done_atm) != 0;
255     if (done) {
256       break;
257     }
258     gpr_timespec time_left =
259         gpr_time_sub(deadline, gpr_now(GPR_CLOCK_REALTIME));
260     gpr_log(GPR_DEBUG, "done=%d, time_left=%" PRId64 ".%09d", done,
261             time_left.tv_sec, time_left.tv_nsec);
262     GPR_ASSERT(gpr_time_cmp(time_left, gpr_time_0(GPR_TIMESPAN)) >= 0);
263     grpc_pollset_worker* worker = nullptr;
264     grpc_core::ExecCtx exec_ctx;
265     gpr_mu_lock(args->mu);
266     GRPC_LOG_IF_ERROR("pollset_work",
267                       grpc_pollset_work(args->pollset, &worker,
268                                         grpc_timespec_to_millis_round_up(
269                                             NSecondDeadline(1))));
270     gpr_mu_unlock(args->mu);
271   }
272   gpr_event_set(&args->ev, (void*)1);
273 }
274 
CheckServiceConfigResultLocked(const char * service_config_json,grpc_error * service_config_error,ArgsStruct * args)275 void CheckServiceConfigResultLocked(const char* service_config_json,
276                                     grpc_error* service_config_error,
277                                     ArgsStruct* args) {
278   if (args->expected_service_config_string != "") {
279     GPR_ASSERT(service_config_json != nullptr);
280     EXPECT_EQ(service_config_json, args->expected_service_config_string);
281   }
282   if (args->expected_service_config_error == "") {
283     EXPECT_EQ(service_config_error, GRPC_ERROR_NONE);
284   } else {
285     EXPECT_THAT(grpc_error_string(service_config_error),
286                 testing::HasSubstr(args->expected_service_config_error));
287   }
288   GRPC_ERROR_UNREF(service_config_error);
289 }
290 
CheckLBPolicyResultLocked(const grpc_channel_args * channel_args,ArgsStruct * args)291 void CheckLBPolicyResultLocked(const grpc_channel_args* channel_args,
292                                ArgsStruct* args) {
293   const grpc_arg* lb_policy_arg =
294       grpc_channel_args_find(channel_args, GRPC_ARG_LB_POLICY_NAME);
295   if (args->expected_lb_policy != "") {
296     GPR_ASSERT(lb_policy_arg != nullptr);
297     GPR_ASSERT(lb_policy_arg->type == GRPC_ARG_STRING);
298     EXPECT_EQ(lb_policy_arg->value.string, args->expected_lb_policy);
299   } else {
300     GPR_ASSERT(lb_policy_arg == nullptr);
301   }
302 }
303 
304 #ifdef GPR_WINDOWS
OpenAndCloseSocketsStressLoop(int dummy_port,gpr_event * done_ev)305 void OpenAndCloseSocketsStressLoop(int dummy_port, gpr_event* done_ev) {
306   sockaddr_in6 addr;
307   memset(&addr, 0, sizeof(addr));
308   addr.sin6_family = AF_INET6;
309   addr.sin6_port = htons(dummy_port);
310   ((char*)&addr.sin6_addr)[15] = 1;
311   for (;;) {
312     if (gpr_event_get(done_ev)) {
313       return;
314     }
315     std::vector<int> sockets;
316     for (size_t i = 0; i < 50; i++) {
317       SOCKET s = WSASocket(AF_INET6, SOCK_STREAM, IPPROTO_TCP, nullptr, 0,
318                            WSA_FLAG_OVERLAPPED);
319       ASSERT_TRUE(s != BAD_SOCKET_RETURN_VAL)
320           << "Failed to create TCP ipv6 socket";
321       gpr_log(GPR_DEBUG, "Opened socket: %d", s);
322       char val = 1;
323       ASSERT_TRUE(setsockopt(s, SOL_SOCKET, SO_REUSEADDR, &val, sizeof(val)) !=
324                   SOCKET_ERROR)
325           << "Failed to set socketopt reuseaddr. WSA error: " +
326                  std::to_string(WSAGetLastError());
327       ASSERT_TRUE(grpc_tcp_set_non_block(s) == GRPC_ERROR_NONE)
328           << "Failed to set socket non-blocking";
329       ASSERT_TRUE(bind(s, (const sockaddr*)&addr, sizeof(addr)) != SOCKET_ERROR)
330           << "Failed to bind socket " + std::to_string(s) +
331                  " to [::1]:" + std::to_string(dummy_port) +
332                  ". WSA error: " + std::to_string(WSAGetLastError());
333       ASSERT_TRUE(listen(s, 1) != SOCKET_ERROR)
334           << "Failed to listen on socket " + std::to_string(s) +
335                  ". WSA error: " + std::to_string(WSAGetLastError());
336       sockets.push_back(s);
337     }
338     // Do a non-blocking accept followed by a close on all of those sockets.
339     // Do this in a separate loop to try to induce a time window to hit races.
340     for (size_t i = 0; i < sockets.size(); i++) {
341       gpr_log(GPR_DEBUG, "non-blocking accept then close on %d", sockets[i]);
342       ASSERT_TRUE(accept(sockets[i], nullptr, nullptr) == INVALID_SOCKET)
343           << "Accept on dummy socket unexpectedly accepted actual connection.";
344       ASSERT_TRUE(WSAGetLastError() == WSAEWOULDBLOCK)
345           << "OpenAndCloseSocketsStressLoop accept on socket " +
346                  std::to_string(sockets[i]) +
347                  " failed in "
348                  "an unexpected way. "
349                  "WSA error: " +
350                  std::to_string(WSAGetLastError()) +
351                  ". Socket use-after-close bugs are likely.";
352       ASSERT_TRUE(closesocket(sockets[i]) != SOCKET_ERROR)
353           << "Failed to close socket: " + std::to_string(sockets[i]) +
354                  ". WSA error: " + std::to_string(WSAGetLastError());
355     }
356   }
357   return;
358 }
359 #else
OpenAndCloseSocketsStressLoop(int dummy_port,gpr_event * done_ev)360 void OpenAndCloseSocketsStressLoop(int dummy_port, gpr_event* done_ev) {
361   // The goal of this loop is to catch socket
362   // "use after close" bugs within the c-ares resolver by acting
363   // like some separate thread doing I/O.
364   // It's goal is to try to hit race conditions whereby:
365   //    1) The c-ares resolver closes a socket.
366   //    2) This loop opens a socket with (coincidentally) the same handle.
367   //    3) the c-ares resolver mistakenly uses that same socket without
368   //       realizing that its closed.
369   //    4) This loop performs an operation on that socket that should
370   //       succeed but instead fails because of what the c-ares
371   //       resolver did in the meantime.
372   sockaddr_in6 addr;
373   memset(&addr, 0, sizeof(addr));
374   addr.sin6_family = AF_INET6;
375   addr.sin6_port = htons(dummy_port);
376   ((char*)&addr.sin6_addr)[15] = 1;
377   for (;;) {
378     if (gpr_event_get(done_ev)) {
379       return;
380     }
381     std::vector<int> sockets;
382     // First open a bunch of sockets, bind and listen
383     // '50' is an arbitrary number that, experimentally,
384     // has a good chance of catching bugs.
385     for (size_t i = 0; i < 50; i++) {
386       int s = socket(AF_INET6, SOCK_STREAM, 0);
387       int val = 1;
388       ASSERT_TRUE(setsockopt(s, SOL_SOCKET, SO_REUSEPORT, &val, sizeof(val)) ==
389                   0)
390           << "Failed to set socketopt reuseport";
391       ASSERT_TRUE(setsockopt(s, SOL_SOCKET, SO_REUSEADDR, &val, sizeof(val)) ==
392                   0)
393           << "Failed to set socket reuseaddr";
394       ASSERT_TRUE(fcntl(s, F_SETFL, O_NONBLOCK) == 0)
395           << "Failed to set socket non-blocking";
396       ASSERT_TRUE(s != BAD_SOCKET_RETURN_VAL)
397           << "Failed to create TCP ipv6 socket";
398       gpr_log(GPR_DEBUG, "Opened fd: %d", s);
399       ASSERT_TRUE(bind(s, (const sockaddr*)&addr, sizeof(addr)) == 0)
400           << "Failed to bind socket " + std::to_string(s) +
401                  " to [::1]:" + std::to_string(dummy_port) +
402                  ". errno: " + std::to_string(errno);
403       ASSERT_TRUE(listen(s, 1) == 0) << "Failed to listen on socket " +
404                                             std::to_string(s) +
405                                             ". errno: " + std::to_string(errno);
406       sockets.push_back(s);
407     }
408     // Do a non-blocking accept followed by a close on all of those sockets.
409     // Do this in a separate loop to try to induce a time window to hit races.
410     for (size_t i = 0; i < sockets.size(); i++) {
411       gpr_log(GPR_DEBUG, "non-blocking accept then close on %d", sockets[i]);
412       if (accept(sockets[i], nullptr, nullptr)) {
413         // If e.g. a "shutdown" was called on this fd from another thread,
414         // then this accept call should fail with an unexpected error.
415         ASSERT_TRUE(errno == EAGAIN || errno == EWOULDBLOCK)
416             << "OpenAndCloseSocketsStressLoop accept on socket " +
417                    std::to_string(sockets[i]) +
418                    " failed in "
419                    "an unexpected way. "
420                    "errno: " +
421                    std::to_string(errno) +
422                    ". Socket use-after-close bugs are likely.";
423       }
424       ASSERT_TRUE(close(sockets[i]) == 0)
425           << "Failed to close socket: " + std::to_string(sockets[i]) +
426                  ". errno: " + std::to_string(errno);
427     }
428   }
429 }
430 #endif
431 
432 class ResultHandler : public grpc_core::Resolver::ResultHandler {
433  public:
Create(ArgsStruct * args)434   static std::unique_ptr<grpc_core::Resolver::ResultHandler> Create(
435       ArgsStruct* args) {
436     return std::unique_ptr<grpc_core::Resolver::ResultHandler>(
437         new ResultHandler(args));
438   }
439 
ResultHandler(ArgsStruct * args)440   explicit ResultHandler(ArgsStruct* args) : args_(args) {}
441 
ReturnResult(grpc_core::Resolver::Result result)442   void ReturnResult(grpc_core::Resolver::Result result) override {
443     CheckResult(result);
444     gpr_atm_rel_store(&args_->done_atm, 1);
445     gpr_mu_lock(args_->mu);
446     GRPC_LOG_IF_ERROR("pollset_kick",
447                       grpc_pollset_kick(args_->pollset, nullptr));
448     gpr_mu_unlock(args_->mu);
449   }
450 
ReturnError(grpc_error * error)451   void ReturnError(grpc_error* error) override {
452     gpr_log(GPR_ERROR, "resolver returned error: %s", grpc_error_string(error));
453     GPR_ASSERT(false);
454   }
455 
CheckResult(const grpc_core::Resolver::Result &)456   virtual void CheckResult(const grpc_core::Resolver::Result& /*result*/) {}
457 
458  protected:
args_struct() const459   ArgsStruct* args_struct() const { return args_; }
460 
461  private:
462   ArgsStruct* args_;
463 };
464 
465 class CheckingResultHandler : public ResultHandler {
466  public:
Create(ArgsStruct * args)467   static std::unique_ptr<grpc_core::Resolver::ResultHandler> Create(
468       ArgsStruct* args) {
469     return std::unique_ptr<grpc_core::Resolver::ResultHandler>(
470         new CheckingResultHandler(args));
471   }
472 
CheckingResultHandler(ArgsStruct * args)473   explicit CheckingResultHandler(ArgsStruct* args) : ResultHandler(args) {}
474 
CheckResult(const grpc_core::Resolver::Result & result)475   void CheckResult(const grpc_core::Resolver::Result& result) override {
476     ArgsStruct* args = args_struct();
477     std::vector<GrpcLBAddress> found_lb_addrs;
478     AddActualAddresses(result.addresses, /*is_balancer=*/false,
479                        &found_lb_addrs);
480     const grpc_core::ServerAddressList* balancer_addresses =
481         grpc_core::FindGrpclbBalancerAddressesInChannelArgs(*result.args);
482     if (balancer_addresses != nullptr) {
483       AddActualAddresses(*balancer_addresses, /*is_balancer=*/true,
484                          &found_lb_addrs);
485     }
486     gpr_log(GPR_INFO,
487             "found %" PRIdPTR " backend addresses and %" PRIdPTR
488             " balancer addresses",
489             result.addresses.size(),
490             balancer_addresses == nullptr ? 0L : balancer_addresses->size());
491     if (args->expected_addrs.size() != found_lb_addrs.size()) {
492       gpr_log(GPR_DEBUG,
493               "found lb addrs size is: %" PRIdPTR
494               ". expected addrs size is %" PRIdPTR,
495               found_lb_addrs.size(), args->expected_addrs.size());
496       abort();
497     }
498     if (FLAGS_do_ordered_address_comparison == "True") {
499       EXPECT_EQ(args->expected_addrs, found_lb_addrs);
500     } else if (FLAGS_do_ordered_address_comparison == "False") {
501       EXPECT_THAT(args->expected_addrs,
502                   UnorderedElementsAreArray(found_lb_addrs));
503     } else {
504       gpr_log(GPR_ERROR,
505               "Invalid for setting for --do_ordered_address_comparison. "
506               "Have %s, want True or False",
507               FLAGS_do_ordered_address_comparison.c_str());
508       GPR_ASSERT(0);
509     }
510     const char* service_config_json =
511         result.service_config == nullptr
512             ? nullptr
513             : result.service_config->json_string().c_str();
514     CheckServiceConfigResultLocked(
515         service_config_json, GRPC_ERROR_REF(result.service_config_error), args);
516     if (args->expected_service_config_string == "") {
517       CheckLBPolicyResultLocked(result.args, args);
518     }
519   }
520 
521  private:
AddActualAddresses(const grpc_core::ServerAddressList & addresses,bool is_balancer,std::vector<GrpcLBAddress> * out)522   static void AddActualAddresses(const grpc_core::ServerAddressList& addresses,
523                                  bool is_balancer,
524                                  std::vector<GrpcLBAddress>* out) {
525     for (size_t i = 0; i < addresses.size(); i++) {
526       const grpc_core::ServerAddress& addr = addresses[i];
527       std::string str =
528           grpc_sockaddr_to_string(&addr.address(), true /* normalize */);
529       gpr_log(GPR_INFO, "%s", str.c_str());
530       out->emplace_back(GrpcLBAddress(std::move(str), is_balancer));
531     }
532   }
533 };
534 
535 int g_fake_non_responsive_dns_server_port = -1;
536 
537 /* This function will configure any ares_channel created by the c-ares based
538  * resolver. This is useful to effectively mock /etc/resolv.conf settings
539  * (and equivalent on Windows), which unit tests don't have write permissions.
540  */
InjectBrokenNameServerList(ares_channel channel)541 void InjectBrokenNameServerList(ares_channel channel) {
542   struct ares_addr_port_node dns_server_addrs[2];
543   memset(dns_server_addrs, 0, sizeof(dns_server_addrs));
544   std::string unused_host;
545   std::string local_dns_server_port;
546   GPR_ASSERT(grpc_core::SplitHostPort(FLAGS_local_dns_server_address.c_str(),
547                                       &unused_host, &local_dns_server_port));
548   gpr_log(GPR_DEBUG,
549           "Injecting broken nameserver list. Bad server address:|[::1]:%d|. "
550           "Good server address:%s",
551           g_fake_non_responsive_dns_server_port,
552           FLAGS_local_dns_server_address.c_str());
553   // Put the non-responsive DNS server at the front of c-ares's nameserver list.
554   dns_server_addrs[0].family = AF_INET6;
555   ((char*)&dns_server_addrs[0].addr.addr6)[15] = 0x1;
556   dns_server_addrs[0].tcp_port = g_fake_non_responsive_dns_server_port;
557   dns_server_addrs[0].udp_port = g_fake_non_responsive_dns_server_port;
558   dns_server_addrs[0].next = &dns_server_addrs[1];
559   // Put the actual healthy DNS server after the first one. The expectation is
560   // that the resolver will timeout the query to the non-responsive DNS server
561   // and will skip over to this healthy DNS server, without causing any DNS
562   // resolution errors.
563   dns_server_addrs[1].family = AF_INET;
564   ((char*)&dns_server_addrs[1].addr.addr4)[0] = 0x7f;
565   ((char*)&dns_server_addrs[1].addr.addr4)[3] = 0x1;
566   dns_server_addrs[1].tcp_port = atoi(local_dns_server_port.c_str());
567   dns_server_addrs[1].udp_port = atoi(local_dns_server_port.c_str());
568   dns_server_addrs[1].next = nullptr;
569   GPR_ASSERT(ares_set_servers_ports(channel, dns_server_addrs) == ARES_SUCCESS);
570 }
571 
StartResolvingLocked(grpc_core::Resolver * r)572 void StartResolvingLocked(grpc_core::Resolver* r) { r->StartLocked(); }
573 
RunResolvesRelevantRecordsTest(std::unique_ptr<grpc_core::Resolver::ResultHandler> (* CreateResultHandler)(ArgsStruct * args))574 void RunResolvesRelevantRecordsTest(
575     std::unique_ptr<grpc_core::Resolver::ResultHandler> (*CreateResultHandler)(
576         ArgsStruct* args)) {
577   grpc_core::ExecCtx exec_ctx;
578   ArgsStruct args;
579   ArgsInit(&args);
580   args.expected_addrs = ParseExpectedAddrs(FLAGS_expected_addrs);
581   args.expected_service_config_string = FLAGS_expected_chosen_service_config;
582   args.expected_service_config_error = FLAGS_expected_service_config_error;
583   args.expected_lb_policy = FLAGS_expected_lb_policy;
584   // maybe build the address with an authority
585   std::string whole_uri;
586   gpr_log(GPR_DEBUG,
587           "resolver_component_test: --inject_broken_nameserver_list: %s",
588           FLAGS_inject_broken_nameserver_list.c_str());
589   std::unique_ptr<grpc::testing::FakeNonResponsiveDNSServer>
590       fake_non_responsive_dns_server;
591   if (FLAGS_inject_broken_nameserver_list == "True") {
592     g_fake_non_responsive_dns_server_port = grpc_pick_unused_port_or_die();
593     fake_non_responsive_dns_server.reset(
594         new grpc::testing::FakeNonResponsiveDNSServer(
595             g_fake_non_responsive_dns_server_port));
596     grpc_ares_test_only_inject_config = InjectBrokenNameServerList;
597     whole_uri = absl::StrCat("dns:///", FLAGS_target_name);
598   } else if (FLAGS_inject_broken_nameserver_list == "False") {
599     gpr_log(GPR_INFO, "Specifying authority in uris to: %s",
600             FLAGS_local_dns_server_address.c_str());
601     whole_uri = absl::StrFormat("dns://%s/%s", FLAGS_local_dns_server_address,
602                                 FLAGS_target_name);
603   } else {
604     gpr_log(GPR_DEBUG, "Invalid value for --inject_broken_nameserver_list.");
605     abort();
606   }
607   gpr_log(GPR_DEBUG, "resolver_component_test: --enable_srv_queries: %s",
608           FLAGS_enable_srv_queries.c_str());
609   grpc_channel_args* resolver_args = nullptr;
610   // By default, SRV queries are disabled, so tests that expect no SRV query
611   // should avoid setting any channel arg. Test cases that do rely on the SRV
612   // query must explicitly enable SRV though.
613   if (FLAGS_enable_srv_queries == "True") {
614     grpc_arg srv_queries_arg = grpc_channel_arg_integer_create(
615         const_cast<char*>(GRPC_ARG_DNS_ENABLE_SRV_QUERIES), true);
616     resolver_args =
617         grpc_channel_args_copy_and_add(nullptr, &srv_queries_arg, 1);
618   } else if (FLAGS_enable_srv_queries != "False") {
619     gpr_log(GPR_DEBUG, "Invalid value for --enable_srv_queries.");
620     abort();
621   }
622   gpr_log(GPR_DEBUG, "resolver_component_test: --enable_txt_queries: %s",
623           FLAGS_enable_txt_queries.c_str());
624   // By default, TXT queries are disabled, so tests that expect no TXT query
625   // should avoid setting any channel arg. Test cases that do rely on the TXT
626   // query must explicitly enable TXT though.
627   if (FLAGS_enable_txt_queries == "True") {
628     // Unlike SRV queries, there isn't a channel arg specific to TXT records.
629     // Rather, we use the resolver-agnostic "service config" resolution option,
630     // for which c-ares has its own specific default value, which isn't
631     // necessarily shared by other resolvers.
632     grpc_arg txt_queries_arg = grpc_channel_arg_integer_create(
633         const_cast<char*>(GRPC_ARG_SERVICE_CONFIG_DISABLE_RESOLUTION), false);
634     grpc_channel_args* tmp_args =
635         grpc_channel_args_copy_and_add(resolver_args, &txt_queries_arg, 1);
636     grpc_channel_args_destroy(resolver_args);
637     resolver_args = tmp_args;
638   } else if (FLAGS_enable_txt_queries != "False") {
639     gpr_log(GPR_DEBUG, "Invalid value for --enable_txt_queries.");
640     abort();
641   }
642   // create resolver and resolve
643   grpc_core::OrphanablePtr<grpc_core::Resolver> resolver =
644       grpc_core::ResolverRegistry::CreateResolver(
645           whole_uri.c_str(), resolver_args, args.pollset_set, args.lock,
646           CreateResultHandler(&args));
647   grpc_channel_args_destroy(resolver_args);
648   auto* resolver_ptr = resolver.get();
649   args.lock->Run([resolver_ptr]() { StartResolvingLocked(resolver_ptr); },
650                  DEBUG_LOCATION);
651   grpc_core::ExecCtx::Get()->Flush();
652   PollPollsetUntilRequestDone(&args);
653   ArgsFinish(&args);
654 }
655 
TEST(ResolverComponentTest,TestResolvesRelevantRecords)656 TEST(ResolverComponentTest, TestResolvesRelevantRecords) {
657   RunResolvesRelevantRecordsTest(CheckingResultHandler::Create);
658 }
659 
TEST(ResolverComponentTest,TestResolvesRelevantRecordsWithConcurrentFdStress)660 TEST(ResolverComponentTest, TestResolvesRelevantRecordsWithConcurrentFdStress) {
661   // Start up background stress thread
662   int dummy_port = grpc_pick_unused_port_or_die();
663   gpr_event done_ev;
664   gpr_event_init(&done_ev);
665   std::thread socket_stress_thread(OpenAndCloseSocketsStressLoop, dummy_port,
666                                    &done_ev);
667   // Run the resolver test
668   RunResolvesRelevantRecordsTest(ResultHandler::Create);
669   // Shutdown and join stress thread
670   gpr_event_set(&done_ev, (void*)1);
671   socket_stress_thread.join();
672 }
673 
674 }  // namespace
675 
main(int argc,char ** argv)676 int main(int argc, char** argv) {
677   grpc_init();
678   grpc::testing::TestEnvironment env(argc, argv);
679   ::testing::InitGoogleTest(&argc, argv);
680   grpc::testing::InitTest(&argc, &argv, true);
681   if (FLAGS_target_name == "") {
682     gpr_log(GPR_ERROR, "Missing target_name param.");
683     abort();
684   }
685   auto result = RUN_ALL_TESTS();
686   grpc_shutdown();
687   return result;
688 }
689