grpc-go/transport/transport_test.go

595 строки
17 KiB
Go
Исходник Обычный вид История

2015-02-06 04:14:05 +03:00
/*
*
* Copyright 2014, Google Inc.
* All rights reserved.
*
* Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that the following conditions are
* met:
*
* * Redistributions of source code must retain the above copyright
* notice, this list of conditions and the following disclaimer.
* * Redistributions in binary form must reproduce the above
* copyright notice, this list of conditions and the following disclaimer
* in the documentation and/or other materials provided with the
* distribution.
* * Neither the name of Google Inc. nor the names of its
* contributors may be used to endorse or promote products derived from
* this software without specific prior written permission.
*
* THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
* "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
* LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
* A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
* OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
* SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
* LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
* DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
* THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
* (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
* OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
*
*/
package transport
import (
"bytes"
"io"
"math"
"net"
"reflect"
"strconv"
"sync"
"testing"
"time"
"golang.org/x/net/context"
"golang.org/x/net/http2"
"google.golang.org/grpc/codes"
2015-02-06 04:14:05 +03:00
)
type server struct {
lis net.Listener
port string
// channel to signal server is ready to serve.
readyChan chan bool
mu sync.Mutex
conns map[ServerTransport]bool
}
var (
expectedRequest = []byte("ping")
expectedResponse = []byte("pong")
expectedRequestLarge = make([]byte, initialWindowSize*2)
expectedResponseLarge = make([]byte, initialWindowSize*2)
)
type testStreamHandler struct {
t ServerTransport
}
type hType int
const (
normal hType = iota
suspended
misbehaved
)
func (h *testStreamHandler) handleStream(t *testing.T, s *Stream) {
2015-02-06 04:14:05 +03:00
req := expectedRequest
resp := expectedResponse
if s.Method() == "foo.Large" {
req = expectedRequestLarge
resp = expectedResponseLarge
}
p := make([]byte, len(req))
_, err := io.ReadFull(s, p)
if err != nil || !bytes.Equal(p, req) {
if err == ErrConnClosing {
return
}
t.Fatalf("handleStream got error: %v, want <nil>; result: %v, want %v", err, p, req)
2015-02-06 04:14:05 +03:00
}
// send a response back to the client.
h.t.Write(s, resp, &Options{})
// send the trailer to end the stream.
h.t.WriteStatus(s, codes.OK, "")
}
// handleStreamSuspension blocks until s.ctx is canceled.
func (h *testStreamHandler) handleStreamSuspension(s *Stream) {
<-s.ctx.Done()
}
func (h *testStreamHandler) handleStreamMisbehave(t *testing.T, s *Stream) {
conn, ok := s.ServerTransport().(*http2Server)
if !ok {
t.Fatalf("Failed to convert %v to *http2Server", s.ServerTransport())
}
size := 1
if s.Method() == "foo.MaxFrame" {
size = http2MaxFrameLen
}
2015-04-04 02:27:08 +03:00
// Drain the client side stream flow control window.
var sent int
for sent <= initialWindowSize {
<-conn.writableChan
2015-04-04 02:34:18 +03:00
if err := conn.framer.writeData(true, s.id, false, make([]byte, size)); err != nil {
conn.writableChan <- 0
break
}
conn.writableChan <- 0
2015-04-04 02:27:08 +03:00
sent += size
}
}
2015-03-22 23:57:37 +03:00
// start starts server. Other goroutines should block on s.readyChan for futher operations.
func (s *server) start(t *testing.T, port int, maxStreams uint32, ht hType) {
2015-02-06 04:14:05 +03:00
var err error
if port == 0 {
s.lis, err = net.Listen("tcp", ":0")
} else {
s.lis, err = net.Listen("tcp", ":"+strconv.Itoa(port))
}
if err != nil {
t.Fatalf("failed to listen: %v", err)
2015-02-06 04:14:05 +03:00
}
_, p, err := net.SplitHostPort(s.lis.Addr().String())
if err != nil {
t.Fatalf("failed to parse listener address: %v", err)
2015-02-06 04:14:05 +03:00
}
s.port = p
2015-03-22 23:57:37 +03:00
s.conns = make(map[ServerTransport]bool)
2015-02-06 04:14:05 +03:00
if s.readyChan != nil {
close(s.readyChan)
}
for {
conn, err := s.lis.Accept()
if err != nil {
return
}
2015-10-02 03:24:39 +03:00
transport, err := NewServerTransport("http2", conn, maxStreams, nil, false)
2015-02-06 04:14:05 +03:00
if err != nil {
return
}
s.mu.Lock()
if s.conns == nil {
s.mu.Unlock()
transport.Close()
2015-02-06 04:14:05 +03:00
return
}
s.conns[transport] = true
2015-02-06 04:14:05 +03:00
s.mu.Unlock()
h := &testStreamHandler{transport}
switch ht {
case suspended:
go transport.HandleStreams(h.handleStreamSuspension)
case misbehaved:
go transport.HandleStreams(func(s *Stream) {
h.handleStreamMisbehave(t, s)
})
default:
go transport.HandleStreams(func(s *Stream) {
h.handleStream(t, s)
})
2015-02-06 04:14:05 +03:00
}
}
}
2015-03-22 23:57:37 +03:00
func (s *server) wait(t *testing.T, timeout time.Duration) {
2015-02-06 04:14:05 +03:00
select {
case <-s.readyChan:
case <-time.After(timeout):
t.Fatalf("Timed out after %v waiting for server to be ready", timeout)
}
}
2015-03-22 23:57:37 +03:00
func (s *server) stop() {
2015-02-06 04:14:05 +03:00
s.lis.Close()
s.mu.Lock()
for c := range s.conns {
c.Close()
}
2015-03-22 23:57:37 +03:00
s.conns = nil
2015-02-06 04:14:05 +03:00
s.mu.Unlock()
}
2015-05-13 03:59:20 +03:00
func setUp(t *testing.T, port int, maxStreams uint32, ht hType) (*server, ClientTransport) {
2015-02-06 04:14:05 +03:00
server := &server{readyChan: make(chan bool)}
go server.start(t, port, maxStreams, ht)
2015-03-22 23:57:37 +03:00
server.wait(t, 2*time.Second)
2015-02-06 04:14:05 +03:00
addr := "localhost:" + server.port
var (
ct ClientTransport
connErr error
)
2015-05-13 03:59:20 +03:00
ct, connErr = NewClientTransport(addr, &ConnectOptions{})
2015-02-06 04:14:05 +03:00
if connErr != nil {
t.Fatalf("failed to create transport: %v", connErr)
}
return server, ct
}
func TestClientSendAndReceive(t *testing.T) {
2015-05-13 03:59:20 +03:00
server, ct := setUp(t, 0, math.MaxUint32, normal)
2015-02-06 04:14:05 +03:00
callHdr := &CallHdr{
Host: "localhost",
Method: "foo.Small",
}
s1, err1 := ct.NewStream(context.Background(), callHdr)
if err1 != nil {
t.Fatalf("failed to open stream: %v", err1)
}
if s1.id != 1 {
t.Fatalf("wrong stream id: %d", s1.id)
}
s2, err2 := ct.NewStream(context.Background(), callHdr)
if err2 != nil {
t.Fatalf("failed to open stream: %v", err2)
}
if s2.id != 3 {
t.Fatalf("wrong stream id: %d", s2.id)
}
opts := Options{
Last: true,
Delay: false,
}
if err := ct.Write(s1, expectedRequest, &opts); err != nil {
t.Fatalf("failed to send data: %v", err)
}
p := make([]byte, len(expectedResponse))
_, recvErr := io.ReadFull(s1, p)
if recvErr != nil || !bytes.Equal(p, expectedResponse) {
t.Fatalf("Error: %v, want <nil>; Result: %v, want %v", recvErr, p, expectedResponse)
}
_, recvErr = io.ReadFull(s1, p)
if recvErr != io.EOF {
t.Fatalf("Error: %v; want <EOF>", recvErr)
}
2015-03-13 10:16:18 +03:00
ct.Close()
2015-03-22 23:57:37 +03:00
server.stop()
2015-02-06 04:14:05 +03:00
}
func TestClientErrorNotify(t *testing.T) {
2015-05-13 03:59:20 +03:00
server, ct := setUp(t, 0, math.MaxUint32, normal)
2015-03-22 23:57:37 +03:00
go server.stop()
2015-02-06 04:14:05 +03:00
// ct.reader should detect the error and activate ct.Error().
<-ct.Error()
2015-03-13 10:16:18 +03:00
ct.Close()
2015-02-06 04:14:05 +03:00
}
func performOneRPC(ct ClientTransport) {
callHdr := &CallHdr{
Host: "localhost",
Method: "foo.Small",
}
s, err := ct.NewStream(context.Background(), callHdr)
if err != nil {
return
}
opts := Options{
Last: true,
Delay: false,
}
if err := ct.Write(s, expectedRequest, &opts); err == nil {
time.Sleep(5 * time.Millisecond)
// The following s.Recv()'s could error out because the
// underlying transport is gone.
//
// Read response
p := make([]byte, len(expectedResponse))
io.ReadFull(s, p)
// Read io.EOF
io.ReadFull(s, p)
}
}
func TestClientMix(t *testing.T) {
2015-05-13 03:59:20 +03:00
s, ct := setUp(t, 0, math.MaxUint32, normal)
2015-02-06 04:14:05 +03:00
go func(s *server) {
time.Sleep(5 * time.Second)
2015-03-22 23:57:37 +03:00
s.stop()
2015-02-06 04:14:05 +03:00
}(s)
go func(ct ClientTransport) {
2015-02-06 04:14:05 +03:00
<-ct.Error()
2015-03-13 10:16:18 +03:00
ct.Close()
2015-02-06 04:14:05 +03:00
}(ct)
for i := 0; i < 1000; i++ {
time.Sleep(10 * time.Millisecond)
go performOneRPC(ct)
}
}
func TestLargeMessage(t *testing.T) {
2015-05-13 03:59:20 +03:00
server, ct := setUp(t, 0, math.MaxUint32, normal)
2015-02-06 04:14:05 +03:00
callHdr := &CallHdr{
Host: "localhost",
Method: "foo.Large",
}
var wg sync.WaitGroup
for i := 0; i < 2; i++ {
wg.Add(1)
go func() {
defer wg.Done()
2015-02-06 04:14:05 +03:00
s, err := ct.NewStream(context.Background(), callHdr)
if err != nil {
t.Errorf("failed to open stream: %v", err)
2015-02-06 04:14:05 +03:00
}
if err := ct.Write(s, expectedRequestLarge, &Options{Last: true, Delay: false}); err != nil {
t.Errorf("failed to send data: %v", err)
2015-02-06 04:14:05 +03:00
}
p := make([]byte, len(expectedResponseLarge))
_, recvErr := io.ReadFull(s, p)
if recvErr != nil || !bytes.Equal(p, expectedResponseLarge) {
t.Errorf("Error: %v, want <nil>; Result len: %d, want len %d", recvErr, len(p), len(expectedResponseLarge))
2015-02-06 04:14:05 +03:00
}
_, recvErr = io.ReadFull(s, p)
if recvErr != io.EOF {
t.Errorf("Error: %v; want <EOF>", recvErr)
2015-02-06 04:14:05 +03:00
}
}()
}
wg.Wait()
2015-03-13 10:16:18 +03:00
ct.Close()
2015-03-22 23:57:37 +03:00
server.stop()
2015-02-06 04:14:05 +03:00
}
func TestLargeMessageSuspension(t *testing.T) {
2015-05-13 03:59:20 +03:00
server, ct := setUp(t, 0, math.MaxUint32, suspended)
2015-02-06 04:14:05 +03:00
callHdr := &CallHdr{
Host: "localhost",
Method: "foo.Large",
}
// Set a long enough timeout for writing a large message out.
ctx, _ := context.WithTimeout(context.Background(), time.Second)
s, err := ct.NewStream(ctx, callHdr)
if err != nil {
t.Fatalf("failed to open stream: %v", err)
}
// Write should not be done successfully due to flow control.
err = ct.Write(s, expectedRequestLarge, &Options{Last: true, Delay: false})
expectedErr := StreamErrorf(codes.DeadlineExceeded, "%v", context.DeadlineExceeded)
if err == nil || err != expectedErr {
t.Fatalf("Write got %v, want %v", err, expectedErr)
}
2015-03-13 10:16:18 +03:00
ct.Close()
2015-03-22 23:57:37 +03:00
server.stop()
2015-02-06 04:14:05 +03:00
}
2015-07-29 20:51:07 +03:00
func TestMaxStreams(t *testing.T) {
server, ct := setUp(t, 0, 1, suspended)
callHdr := &CallHdr{
Host: "localhost",
Method: "foo.Large",
}
// Have a pending stream which takes all streams quota.
s, err := ct.NewStream(context.Background(), callHdr)
if err != nil {
2015-07-29 21:40:08 +03:00
t.Fatalf("Failed to open stream: %v", err)
2015-07-29 20:51:07 +03:00
}
cc, ok := ct.(*http2Client)
if !ok {
t.Fatalf("Failed to convert %v to *http2Client", ct)
}
done := make(chan struct{})
ch := make(chan int)
go func() {
for {
select {
case <-time.After(5 * time.Millisecond):
ch <- 0
case <-time.After(5 * time.Second):
close(done)
return
}
}
}()
for {
select {
case <-ch:
case <-done:
t.Fatalf("Client has not received the max stream setting in 5 seconds.")
}
cc.mu.Lock()
// cc.streamsQuota should be initialized once receiving the 1st setting frame from
// the server.
if cc.streamsQuota != nil {
cc.mu.Unlock()
select {
case <-cc.streamsQuota.acquire():
t.Fatalf("streamsQuota.acquire() becomes readable mistakenly.")
default:
if cc.streamsQuota.quota != 0 {
t.Fatalf("streamsQuota.quota got non-zero quota mistakenly.")
}
}
break
}
cc.mu.Unlock()
}
// Close the pending stream so that the streams quota becomes available for the next new stream.
ct.CloseStream(s, nil)
2015-07-29 21:15:58 +03:00
select {
2015-07-29 21:41:19 +03:00
case i := <-cc.streamsQuota.acquire():
2015-07-29 21:15:58 +03:00
if i != 1 {
t.Fatalf("streamsQuota.acquire() got %d quota, want 1.", i)
2015-07-29 20:51:07 +03:00
}
2015-07-29 21:15:58 +03:00
cc.streamsQuota.add(i)
default:
t.Fatalf("streamsQuota.acquire() is not readable.")
2015-07-29 20:51:07 +03:00
}
if _, err := ct.NewStream(context.Background(), callHdr); err != nil {
2015-07-29 21:40:08 +03:00
t.Fatalf("Failed to open stream: %v", err)
2015-07-29 20:51:07 +03:00
}
ct.Close()
server.stop()
}
func TestServerWithMisbehavedClient(t *testing.T) {
2015-05-13 03:59:20 +03:00
server, ct := setUp(t, 0, math.MaxUint32, suspended)
callHdr := &CallHdr{
Host: "localhost",
Method: "foo",
}
var sc *http2Server
2015-04-04 03:53:58 +03:00
// Wait until the server transport is setup.
for {
server.mu.Lock()
2015-04-04 04:04:23 +03:00
if len(server.conns) == 0 {
2015-04-04 03:53:58 +03:00
server.mu.Unlock()
2015-04-04 04:04:23 +03:00
time.Sleep(time.Millisecond)
continue
}
for k := range server.conns {
2015-04-04 04:04:23 +03:00
var ok bool
sc, ok = k.(*http2Server)
if !ok {
t.Fatalf("Failed to convert %v to *http2Server", k)
}
}
2015-04-04 03:53:58 +03:00
server.mu.Unlock()
2015-04-04 04:04:23 +03:00
break
}
cc, ok := ct.(*http2Client)
if !ok {
t.Fatalf("Failed to convert %v to *http2Client", ct)
}
// Test server behavior for violation of stream flow control window size restriction.
s, err := ct.NewStream(context.Background(), callHdr)
if err != nil {
t.Fatalf("Failed to open stream: %v", err)
}
var sent int
// Drain the stream flow control window
<-cc.writableChan
if err = cc.framer.writeData(true, s.id, false, make([]byte, http2MaxFrameLen)); err != nil {
2015-04-18 01:37:08 +03:00
t.Fatalf("Failed to write data: %v", err)
}
cc.writableChan <- 0
2015-04-04 02:46:27 +03:00
sent += http2MaxFrameLen
2015-04-04 03:53:58 +03:00
// Wait until the server creates the corresponding stream and receive some data.
2015-04-04 02:46:27 +03:00
var ss *Stream
for {
time.Sleep(time.Millisecond)
sc.mu.Lock()
2015-04-04 03:53:58 +03:00
if len(sc.activeStreams) == 0 {
sc.mu.Unlock()
2015-04-04 03:53:58 +03:00
continue
}
2015-04-04 03:53:58 +03:00
ss = sc.activeStreams[s.id]
sc.mu.Unlock()
2015-04-04 03:53:58 +03:00
ss.fc.mu.Lock()
if ss.fc.pendingData > 0 {
ss.fc.mu.Unlock()
break
}
ss.fc.mu.Unlock()
}
if ss.fc.pendingData != http2MaxFrameLen || ss.fc.pendingUpdate != 0 || sc.fc.pendingData != http2MaxFrameLen || sc.fc.pendingUpdate != 0 {
t.Fatalf("Server mistakenly updates inbound flow control params: got %d, %d, %d, %d; want %d, %d, %d, %d", ss.fc.pendingData, ss.fc.pendingUpdate, sc.fc.pendingData, sc.fc.pendingUpdate, http2MaxFrameLen, 0, http2MaxFrameLen, 0)
}
// Keep sending until the server inbound window is drained for that stream.
for sent <= initialWindowSize {
<-cc.writableChan
2015-04-13 00:45:59 +03:00
if err = cc.framer.writeData(true, s.id, false, make([]byte, 1)); err != nil {
2015-04-18 01:37:08 +03:00
t.Fatalf("Failed to write data: %v", err)
}
cc.writableChan <- 0
sent++
}
// Server sent a resetStream for s already.
code := http2RSTErrConvTab[http2.ErrCodeFlowControl]
if _, err := io.ReadFull(s, make([]byte, 1)); err != io.EOF || s.statusCode != code {
t.Fatalf("%v got err %v with statusCode %d, want err <EOF> with statusCode %d", s, err, s.statusCode, code)
}
2015-04-13 00:45:59 +03:00
if ss.fc.pendingData != 0 || ss.fc.pendingUpdate != 0 || sc.fc.pendingData != 0 || sc.fc.pendingUpdate != initialWindowSize {
t.Fatalf("Server mistakenly resets inbound flow control params: got %d, %d, %d, %d; want 0, 0, 0, %d", ss.fc.pendingData, ss.fc.pendingUpdate, sc.fc.pendingData, sc.fc.pendingUpdate, initialWindowSize)
}
ct.CloseStream(s, nil)
// Test server behavior for violation of connection flow control window size restriction.
//
// Keep creating new streams until the connection window is drained on the server and
// the server tears down the connection.
for {
s, err := ct.NewStream(context.Background(), callHdr)
if err != nil {
// The server tears down the connection.
break
}
2015-04-13 00:45:59 +03:00
<-cc.writableChan
cc.framer.writeData(true, s.id, true, make([]byte, http2MaxFrameLen))
cc.writableChan <- 0
}
ct.Close()
server.stop()
}
func TestClientWithMisbehavedServer(t *testing.T) {
2015-05-13 03:59:20 +03:00
server, ct := setUp(t, 0, math.MaxUint32, misbehaved)
callHdr := &CallHdr{
Host: "localhost",
Method: "foo",
}
conn, ok := ct.(*http2Client)
if !ok {
t.Fatalf("Failed to convert %v to *http2Client", ct)
}
// Test the logic for the violation of stream flow control window size restriction.
s, err := ct.NewStream(context.Background(), callHdr)
if err != nil {
t.Fatalf("Failed to open stream: %v", err)
}
if err := ct.Write(s, expectedRequest, &Options{Last: true, Delay: false}); err != nil {
t.Fatalf("Failed to write: %v", err)
}
// Read without window update.
for {
p := make([]byte, http2MaxFrameLen)
if _, err = s.dec.Read(p); err != nil {
break
}
}
if s.fc.pendingData != initialWindowSize || s.fc.pendingUpdate != 0 || conn.fc.pendingData != initialWindowSize || conn.fc.pendingUpdate != 0 {
t.Fatalf("Client mistakenly updates inbound flow control params: got %d, %d, %d, %d; want %d, %d, %d, %d", s.fc.pendingData, s.fc.pendingUpdate, conn.fc.pendingData, conn.fc.pendingUpdate, initialWindowSize, 0, initialWindowSize, 0)
}
2015-04-04 02:46:27 +03:00
if err != io.EOF || s.statusCode != codes.Internal {
t.Fatalf("Got err %v and the status code %d, want <EOF> and the code %d", err, s.statusCode, codes.Internal)
}
conn.CloseStream(s, err)
2015-04-13 00:45:59 +03:00
if s.fc.pendingData != 0 || s.fc.pendingUpdate != 0 || conn.fc.pendingData != 0 || conn.fc.pendingUpdate != initialWindowSize {
t.Fatalf("Client mistakenly resets inbound flow control params: got %d, %d, %d, %d; want 0, 0, 0, %d", s.fc.pendingData, s.fc.pendingUpdate, conn.fc.pendingData, conn.fc.pendingUpdate, initialWindowSize)
}
// Test the logic for the violation of the connection flow control window size restriction.
//
// Generate enough streams to drain the connection window.
callHdr = &CallHdr{
Host: "localhost",
Method: "foo.MaxFrame",
}
for i := 0; i < int(initialConnWindowSize/initialWindowSize+10); i++ {
s, err := ct.NewStream(context.Background(), callHdr)
if err != nil {
2015-05-29 21:16:24 +03:00
break
}
if err := ct.Write(s, expectedRequest, &Options{Last: true, Delay: false}); err != nil {
break
}
}
// http2Client.errChan is closed due to connection flow control window size violation.
<-conn.Error()
ct.Close()
server.stop()
}
2015-02-06 04:14:05 +03:00
func TestStreamContext(t *testing.T) {
expectedStream := Stream{}
ctx := newContextWithStream(context.Background(), &expectedStream)
s, ok := StreamFromContext(ctx)
if !ok || !reflect.DeepEqual(expectedStream, *s) {
t.Fatalf("GetStreamFromContext(%v) = %v, %t, want: %v, true", ctx, *s, ok, expectedStream)
}
}