| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659 | /* * * Copyright 2017 gRPC authors. * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * *     http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. * */#include <grpc/support/port_platform.h>#include <grpc/grpc.h>#include <grpc/impl/codegen/grpc_types.h>#include <grpc/support/alloc.h>#include <grpc/support/log.h>#include <grpc/support/string_util.h>#include <grpc/support/sync.h>#include <grpc/support/time.h>#include <string.h>#include <errno.h>#include <fcntl.h>#include <gflags/gflags.h>#include <gmock/gmock.h>#include <thread>#include <vector>#include "test/cpp/util/subprocess.h"#include "test/cpp/util/test_config.h"#include "src/core/ext/filters/client_channel/client_channel.h"#include "src/core/ext/filters/client_channel/parse_address.h"#include "src/core/ext/filters/client_channel/resolver.h"#include "src/core/ext/filters/client_channel/resolver/dns/c_ares/grpc_ares_ev_driver.h"#include "src/core/ext/filters/client_channel/resolver/dns/c_ares/grpc_ares_wrapper.h"#include "src/core/ext/filters/client_channel/resolver_registry.h"#include "src/core/ext/filters/client_channel/server_address.h"#include "src/core/lib/channel/channel_args.h"#include "src/core/lib/gpr/string.h"#include "src/core/lib/gprpp/host_port.h"#include "src/core/lib/gprpp/orphanable.h"#include "src/core/lib/iomgr/combiner.h"#include "src/core/lib/iomgr/executor.h"#include "src/core/lib/iomgr/iomgr.h"#include "src/core/lib/iomgr/resolve_address.h"#include "src/core/lib/iomgr/sockaddr_utils.h"#include "src/core/lib/iomgr/socket_utils.h"#include "test/core/util/port.h"#include "test/core/util/test_config.h"#include "test/cpp/naming/dns_test_util.h"// TODO: pull in different headers when enabling this// test on windows. Also set BAD_SOCKET_RETURN_VAL// to INVALID_SOCKET on windows.#ifdef GPR_WINDOWS#include "src/core/lib/iomgr/sockaddr_windows.h"#include "src/core/lib/iomgr/socket_windows.h"#include "src/core/lib/iomgr/tcp_windows.h"#define BAD_SOCKET_RETURN_VAL INVALID_SOCKET#else#include "src/core/lib/iomgr/sockaddr_posix.h"#define BAD_SOCKET_RETURN_VAL -1#endifusing grpc::SubProcess;using std::vector;using testing::UnorderedElementsAreArray;// Hack copied from "test/cpp/end2end/server_crash_test_client.cc"!// In some distros, gflags is in the namespace google, and in some others,// in gflags. This hack is enabling us to find both.namespace google {}namespace gflags {}using namespace google;using namespace gflags;DEFINE_string(target_name, "", "Target name to resolve.");DEFINE_string(expected_addrs, "",              "List of expected backend or balancer addresses in the form "              "'<ip0:port0>,<is_balancer0>;<ip1:port1>,<is_balancer1>;...'. "              "'is_balancer' should be bool, i.e. true or false.");DEFINE_string(expected_chosen_service_config, "",              "Expected service config json string that gets chosen (no "              "whitespace). Empty for none.");DEFINE_string(expected_service_config_error, "",              "Expected service config error. Empty for none.");DEFINE_string(    local_dns_server_address, "",    "Optional. This address is placed as the uri authority if present.");DEFINE_string(    enable_srv_queries, "",    "Whether or not to enable SRV queries for the ares resolver instance."    "It would be better if this arg could be bool, but the way that we "    "generate "    "the python script runner doesn't allow us to pass a gflags bool to this "    "binary.");DEFINE_string(    enable_txt_queries, "",    "Whether or not to enable TXT queries for the ares resolver instance."    "It would be better if this arg could be bool, but the way that we "    "generate "    "the python script runner doesn't allow us to pass a gflags bool to this "    "binary.");DEFINE_string(    inject_broken_nameserver_list, "",    "Whether or not to configure c-ares to use a broken nameserver list, in "    "which "    "the first nameserver in the list is non-responsive, but the second one "    "works, i.e "    "serves the expected DNS records; using for testing such a real scenario."    "It would be better if this arg could be bool, but the way that we "    "generate "    "the python script runner doesn't allow us to pass a gflags bool to this "    "binary.");DEFINE_string(expected_lb_policy, "",              "Expected lb policy name that appears in resolver result channel "              "arg. Empty for none.");namespace {class GrpcLBAddress final { public:  GrpcLBAddress(std::string address, bool is_balancer)      : is_balancer(is_balancer), address(std::move(address)) {}  bool operator==(const GrpcLBAddress& other) const {    return this->is_balancer == other.is_balancer &&           this->address == other.address;  }  bool operator!=(const GrpcLBAddress& other) const {    return !(*this == other);  }  bool is_balancer;  std::string address;};vector<GrpcLBAddress> ParseExpectedAddrs(std::string expected_addrs) {  std::vector<GrpcLBAddress> out;  while (expected_addrs.size() != 0) {    // get the next <ip>,<port> (v4 or v6)    size_t next_comma = expected_addrs.find(',');    if (next_comma == std::string::npos) {      gpr_log(GPR_ERROR,              "Missing ','. Expected_addrs arg should be a semicolon-separated "              "list of <ip-port>,<bool> pairs. Left-to-be-parsed arg is |%s|",              expected_addrs.c_str());      abort();    }    std::string next_addr = expected_addrs.substr(0, next_comma);    expected_addrs = expected_addrs.substr(next_comma + 1, std::string::npos);    // get the next is_balancer 'bool' associated with this address    size_t next_semicolon = expected_addrs.find(';');    bool is_balancer = false;    gpr_parse_bool_value(expected_addrs.substr(0, next_semicolon).c_str(),                         &is_balancer);    out.emplace_back(GrpcLBAddress(next_addr, is_balancer));    if (next_semicolon == std::string::npos) {      break;    }    expected_addrs =        expected_addrs.substr(next_semicolon + 1, std::string::npos);  }  if (out.size() == 0) {    gpr_log(GPR_ERROR,            "expected_addrs arg should be a semicolon-separated list of "            "<ip-port>,<bool> pairs");    abort();  }  return out;}gpr_timespec TestDeadline(void) {  return grpc_timeout_seconds_to_deadline(100);}struct ArgsStruct {  gpr_event ev;  gpr_atm done_atm;  gpr_mu* mu;  grpc_pollset* pollset;  grpc_pollset_set* pollset_set;  grpc_combiner* lock;  grpc_channel_args* channel_args;  vector<GrpcLBAddress> expected_addrs;  std::string expected_service_config_string;  std::string expected_service_config_error;  std::string expected_lb_policy;};void ArgsInit(ArgsStruct* args) {  gpr_event_init(&args->ev);  args->pollset = (grpc_pollset*)gpr_zalloc(grpc_pollset_size());  grpc_pollset_init(args->pollset, &args->mu);  args->pollset_set = grpc_pollset_set_create();  grpc_pollset_set_add_pollset(args->pollset_set, args->pollset);  args->lock = grpc_combiner_create();  gpr_atm_rel_store(&args->done_atm, 0);  args->channel_args = nullptr;}void DoNothing(void* arg, grpc_error* error) {}void ArgsFinish(ArgsStruct* args) {  GPR_ASSERT(gpr_event_wait(&args->ev, TestDeadline()));  grpc_pollset_set_del_pollset(args->pollset_set, args->pollset);  grpc_pollset_set_destroy(args->pollset_set);  grpc_closure DoNothing_cb;  GRPC_CLOSURE_INIT(&DoNothing_cb, DoNothing, nullptr,                    grpc_schedule_on_exec_ctx);  grpc_pollset_shutdown(args->pollset, &DoNothing_cb);  // exec_ctx needs to be flushed before calling grpc_pollset_destroy()  grpc_channel_args_destroy(args->channel_args);  grpc_core::ExecCtx::Get()->Flush();  grpc_pollset_destroy(args->pollset);  gpr_free(args->pollset);  GRPC_COMBINER_UNREF(args->lock, nullptr);}gpr_timespec NSecondDeadline(int seconds) {  return gpr_time_add(gpr_now(GPR_CLOCK_REALTIME),                      gpr_time_from_seconds(seconds, GPR_TIMESPAN));}void PollPollsetUntilRequestDone(ArgsStruct* args) {  // Use a 20-second timeout to give room for the tests that involve  // a non-responsive name server (c-ares uses a ~5 second query timeout  // for that server before succeeding with the healthy one).  gpr_timespec deadline = NSecondDeadline(20);  while (true) {    bool done = gpr_atm_acq_load(&args->done_atm) != 0;    if (done) {      break;    }    gpr_timespec time_left =        gpr_time_sub(deadline, gpr_now(GPR_CLOCK_REALTIME));    gpr_log(GPR_DEBUG, "done=%d, time_left=%" PRId64 ".%09d", done,            time_left.tv_sec, time_left.tv_nsec);    GPR_ASSERT(gpr_time_cmp(time_left, gpr_time_0(GPR_TIMESPAN)) >= 0);    grpc_pollset_worker* worker = nullptr;    grpc_core::ExecCtx exec_ctx;    gpr_mu_lock(args->mu);    GRPC_LOG_IF_ERROR("pollset_work",                      grpc_pollset_work(args->pollset, &worker,                                        grpc_timespec_to_millis_round_up(                                            NSecondDeadline(1))));    gpr_mu_unlock(args->mu);  }  gpr_event_set(&args->ev, (void*)1);}void CheckServiceConfigResultLocked(const char* service_config_json,                                    grpc_error* service_config_error,                                    ArgsStruct* args) {  if (args->expected_service_config_string != "") {    GPR_ASSERT(service_config_json != nullptr);    EXPECT_EQ(service_config_json, args->expected_service_config_string);  }  if (args->expected_service_config_error == "") {    EXPECT_EQ(service_config_error, GRPC_ERROR_NONE);  } else {    EXPECT_THAT(grpc_error_string(service_config_error),                testing::HasSubstr(args->expected_service_config_error));  }  GRPC_ERROR_UNREF(service_config_error);}void CheckLBPolicyResultLocked(const grpc_channel_args* channel_args,                               ArgsStruct* args) {  const grpc_arg* lb_policy_arg =      grpc_channel_args_find(channel_args, GRPC_ARG_LB_POLICY_NAME);  if (args->expected_lb_policy != "") {    GPR_ASSERT(lb_policy_arg != nullptr);    GPR_ASSERT(lb_policy_arg->type == GRPC_ARG_STRING);    EXPECT_EQ(lb_policy_arg->value.string, args->expected_lb_policy);  } else {    GPR_ASSERT(lb_policy_arg == nullptr);  }}#ifdef GPR_WINDOWSvoid OpenAndCloseSocketsStressLoop(int dummy_port, gpr_event* done_ev) {  sockaddr_in6 addr;  memset(&addr, 0, sizeof(addr));  addr.sin6_family = AF_INET6;  addr.sin6_port = htons(dummy_port);  ((char*)&addr.sin6_addr)[15] = 1;  for (;;) {    if (gpr_event_get(done_ev)) {      return;    }    std::vector<int> sockets;    for (size_t i = 0; i < 50; i++) {      SOCKET s = WSASocket(AF_INET6, SOCK_STREAM, IPPROTO_TCP, nullptr, 0,                           WSA_FLAG_OVERLAPPED);      ASSERT_TRUE(s != BAD_SOCKET_RETURN_VAL)          << "Failed to create TCP ipv6 socket";      gpr_log(GPR_DEBUG, "Opened socket: %d", s);      char val = 1;      ASSERT_TRUE(setsockopt(s, SOL_SOCKET, SO_REUSEADDR, &val, sizeof(val)) !=                  SOCKET_ERROR)          << "Failed to set socketopt reuseaddr. WSA error: " +                 std::to_string(WSAGetLastError());      ASSERT_TRUE(grpc_tcp_set_non_block(s) == GRPC_ERROR_NONE)          << "Failed to set socket non-blocking";      ASSERT_TRUE(bind(s, (const sockaddr*)&addr, sizeof(addr)) != SOCKET_ERROR)          << "Failed to bind socket " + std::to_string(s) +                 " to [::1]:" + std::to_string(dummy_port) +                 ". WSA error: " + std::to_string(WSAGetLastError());      ASSERT_TRUE(listen(s, 1) != SOCKET_ERROR)          << "Failed to listen on socket " + std::to_string(s) +                 ". WSA error: " + std::to_string(WSAGetLastError());      sockets.push_back(s);    }    // Do a non-blocking accept followed by a close on all of those sockets.    // Do this in a separate loop to try to induce a time window to hit races.    for (size_t i = 0; i < sockets.size(); i++) {      gpr_log(GPR_DEBUG, "non-blocking accept then close on %d", sockets[i]);      ASSERT_TRUE(accept(sockets[i], nullptr, nullptr) == INVALID_SOCKET)          << "Accept on dummy socket unexpectedly accepted actual connection.";      ASSERT_TRUE(WSAGetLastError() == WSAEWOULDBLOCK)          << "OpenAndCloseSocketsStressLoop accept on socket " +                 std::to_string(sockets[i]) +                 " failed in "                 "an unexpected way. "                 "WSA error: " +                 std::to_string(WSAGetLastError()) +                 ". Socket use-after-close bugs are likely.";      ASSERT_TRUE(closesocket(sockets[i]) != SOCKET_ERROR)          << "Failed to close socket: " + std::to_string(sockets[i]) +                 ". WSA error: " + std::to_string(WSAGetLastError());    }  }  return;}#elsevoid OpenAndCloseSocketsStressLoop(int dummy_port, gpr_event* done_ev) {  // The goal of this loop is to catch socket  // "use after close" bugs within the c-ares resolver by acting  // like some separate thread doing I/O.  // It's goal is to try to hit race conditions whereby:  //    1) The c-ares resolver closes a socket.  //    2) This loop opens a socket with (coincidentally) the same handle.  //    3) the c-ares resolver mistakenly uses that same socket without  //       realizing that its closed.  //    4) This loop performs an operation on that socket that should  //       succeed but instead fails because of what the c-ares  //       resolver did in the meantime.  sockaddr_in6 addr;  memset(&addr, 0, sizeof(addr));  addr.sin6_family = AF_INET6;  addr.sin6_port = htons(dummy_port);  ((char*)&addr.sin6_addr)[15] = 1;  for (;;) {    if (gpr_event_get(done_ev)) {      return;    }    std::vector<int> sockets;    // First open a bunch of sockets, bind and listen    // '50' is an arbitrary number that, experimentally,    // has a good chance of catching bugs.    for (size_t i = 0; i < 50; i++) {      int s = socket(AF_INET6, SOCK_STREAM, 0);      int val = 1;      ASSERT_TRUE(setsockopt(s, SOL_SOCKET, SO_REUSEPORT, &val, sizeof(val)) ==                  0)          << "Failed to set socketopt reuseport";      ASSERT_TRUE(setsockopt(s, SOL_SOCKET, SO_REUSEADDR, &val, sizeof(val)) ==                  0)          << "Failed to set socket reuseaddr";      ASSERT_TRUE(fcntl(s, F_SETFL, O_NONBLOCK) == 0)          << "Failed to set socket non-blocking";      ASSERT_TRUE(s != BAD_SOCKET_RETURN_VAL)          << "Failed to create TCP ipv6 socket";      gpr_log(GPR_DEBUG, "Opened fd: %d", s);      ASSERT_TRUE(bind(s, (const sockaddr*)&addr, sizeof(addr)) == 0)          << "Failed to bind socket " + std::to_string(s) +                 " to [::1]:" + std::to_string(dummy_port) +                 ". errno: " + std::to_string(errno);      ASSERT_TRUE(listen(s, 1) == 0) << "Failed to listen on socket " +                                            std::to_string(s) +                                            ". errno: " + std::to_string(errno);      sockets.push_back(s);    }    // Do a non-blocking accept followed by a close on all of those sockets.    // Do this in a separate loop to try to induce a time window to hit races.    for (size_t i = 0; i < sockets.size(); i++) {      gpr_log(GPR_DEBUG, "non-blocking accept then close on %d", sockets[i]);      if (accept(sockets[i], nullptr, nullptr)) {        // If e.g. a "shutdown" was called on this fd from another thread,        // then this accept call should fail with an unexpected error.        ASSERT_TRUE(errno == EAGAIN || errno == EWOULDBLOCK)            << "OpenAndCloseSocketsStressLoop accept on socket " +                   std::to_string(sockets[i]) +                   " failed in "                   "an unexpected way. "                   "errno: " +                   std::to_string(errno) +                   ". Socket use-after-close bugs are likely.";      }      ASSERT_TRUE(close(sockets[i]) == 0)          << "Failed to close socket: " + std::to_string(sockets[i]) +                 ". errno: " + std::to_string(errno);    }  }}#endifclass ResultHandler : public grpc_core::Resolver::ResultHandler { public:  static grpc_core::UniquePtr<grpc_core::Resolver::ResultHandler> Create(      ArgsStruct* args) {    return grpc_core::UniquePtr<grpc_core::Resolver::ResultHandler>(        grpc_core::New<ResultHandler>(args));  }  explicit ResultHandler(ArgsStruct* args) : args_(args) {}  void ReturnResult(grpc_core::Resolver::Result result) override {    CheckResult(result);    gpr_atm_rel_store(&args_->done_atm, 1);    gpr_mu_lock(args_->mu);    GRPC_LOG_IF_ERROR("pollset_kick",                      grpc_pollset_kick(args_->pollset, nullptr));    gpr_mu_unlock(args_->mu);  }  void ReturnError(grpc_error* error) override {    gpr_log(GPR_ERROR, "resolver returned error: %s", grpc_error_string(error));    GPR_ASSERT(false);  }  virtual void CheckResult(const grpc_core::Resolver::Result& result) {} protected:  ArgsStruct* args_struct() const { return args_; } private:  ArgsStruct* args_;};class CheckingResultHandler : public ResultHandler { public:  static grpc_core::UniquePtr<grpc_core::Resolver::ResultHandler> Create(      ArgsStruct* args) {    return grpc_core::UniquePtr<grpc_core::Resolver::ResultHandler>(        grpc_core::New<CheckingResultHandler>(args));  }  explicit CheckingResultHandler(ArgsStruct* args) : ResultHandler(args) {}  void CheckResult(const grpc_core::Resolver::Result& result) override {    ArgsStruct* args = args_struct();    gpr_log(GPR_INFO, "num addrs found: %" PRIdPTR ". expected %" PRIdPTR,            result.addresses.size(), args->expected_addrs.size());    GPR_ASSERT(result.addresses.size() == args->expected_addrs.size());    std::vector<GrpcLBAddress> found_lb_addrs;    for (size_t i = 0; i < result.addresses.size(); i++) {      const grpc_core::ServerAddress& addr = result.addresses[i];      char* str;      grpc_sockaddr_to_string(&str, &addr.address(), 1 /* normalize */);      gpr_log(GPR_INFO, "%s", str);      found_lb_addrs.emplace_back(          GrpcLBAddress(std::string(str), addr.IsBalancer()));      gpr_free(str);    }    if (args->expected_addrs.size() != found_lb_addrs.size()) {      gpr_log(GPR_DEBUG,              "found lb addrs size is: %" PRIdPTR              ". expected addrs size is %" PRIdPTR,              found_lb_addrs.size(), args->expected_addrs.size());      abort();    }    EXPECT_THAT(args->expected_addrs,                UnorderedElementsAreArray(found_lb_addrs));    const char* service_config_json =        result.service_config == nullptr            ? nullptr            : result.service_config->service_config_json();    CheckServiceConfigResultLocked(        service_config_json, GRPC_ERROR_REF(result.service_config_error), args);    if (args->expected_service_config_string == "") {      CheckLBPolicyResultLocked(result.args, args);    }  }};int g_fake_non_responsive_dns_server_port = -1;/* This function will configure any ares_channel created by the c-ares based * resolver. This is useful to effectively mock /etc/resolv.conf settings * (and equivalent on Windows), which unit tests don't have write permissions. */void InjectBrokenNameServerList(ares_channel channel) {  struct ares_addr_port_node dns_server_addrs[2];  memset(dns_server_addrs, 0, sizeof(dns_server_addrs));  grpc_core::UniquePtr<char> unused_host;  grpc_core::UniquePtr<char> local_dns_server_port;  GPR_ASSERT(grpc_core::SplitHostPort(FLAGS_local_dns_server_address.c_str(),                                      &unused_host, &local_dns_server_port));  gpr_log(GPR_DEBUG,          "Injecting broken nameserver list. Bad server address:|[::1]:%d|. "          "Good server address:%s",          g_fake_non_responsive_dns_server_port,          FLAGS_local_dns_server_address.c_str());  // Put the non-responsive DNS server at the front of c-ares's nameserver list.  dns_server_addrs[0].family = AF_INET6;  ((char*)&dns_server_addrs[0].addr.addr6)[15] = 0x1;  dns_server_addrs[0].tcp_port = g_fake_non_responsive_dns_server_port;  dns_server_addrs[0].udp_port = g_fake_non_responsive_dns_server_port;  dns_server_addrs[0].next = &dns_server_addrs[1];  // Put the actual healthy DNS server after the first one. The expectation is  // that the resolver will timeout the query to the non-responsive DNS server  // and will skip over to this healthy DNS server, without causing any DNS  // resolution errors.  dns_server_addrs[1].family = AF_INET;  ((char*)&dns_server_addrs[1].addr.addr4)[0] = 0x7f;  ((char*)&dns_server_addrs[1].addr.addr4)[3] = 0x1;  dns_server_addrs[1].tcp_port = atoi(local_dns_server_port.get());  dns_server_addrs[1].udp_port = atoi(local_dns_server_port.get());  dns_server_addrs[1].next = nullptr;  GPR_ASSERT(ares_set_servers_ports(channel, dns_server_addrs) == ARES_SUCCESS);}void StartResolvingLocked(void* arg, grpc_error* unused) {  grpc_core::Resolver* r = static_cast<grpc_core::Resolver*>(arg);  r->StartLocked();}void RunResolvesRelevantRecordsTest(    grpc_core::UniquePtr<grpc_core::Resolver::ResultHandler> (        *CreateResultHandler)(ArgsStruct* args)) {  grpc_core::ExecCtx exec_ctx;  ArgsStruct args;  ArgsInit(&args);  args.expected_addrs = ParseExpectedAddrs(FLAGS_expected_addrs);  args.expected_service_config_string = FLAGS_expected_chosen_service_config;  args.expected_service_config_error = FLAGS_expected_service_config_error;  args.expected_lb_policy = FLAGS_expected_lb_policy;  // maybe build the address with an authority  char* whole_uri = nullptr;  gpr_log(GPR_DEBUG,          "resolver_component_test: --inject_broken_nameserver_list: %s",          FLAGS_inject_broken_nameserver_list.c_str());  grpc_core::UniquePtr<grpc::testing::FakeNonResponsiveDNSServer>      fake_non_responsive_dns_server;  if (FLAGS_inject_broken_nameserver_list == "True") {    g_fake_non_responsive_dns_server_port = grpc_pick_unused_port_or_die();    fake_non_responsive_dns_server.reset(        grpc_core::New<grpc::testing::FakeNonResponsiveDNSServer>(            g_fake_non_responsive_dns_server_port));    grpc_ares_test_only_inject_config = InjectBrokenNameServerList;    GPR_ASSERT(        gpr_asprintf(&whole_uri, "dns:///%s", FLAGS_target_name.c_str()));  } else if (FLAGS_inject_broken_nameserver_list == "False") {    gpr_log(GPR_INFO, "Specifying authority in uris to: %s",            FLAGS_local_dns_server_address.c_str());    GPR_ASSERT(gpr_asprintf(&whole_uri, "dns://%s/%s",                            FLAGS_local_dns_server_address.c_str(),                            FLAGS_target_name.c_str()));  } else {    gpr_log(GPR_DEBUG, "Invalid value for --inject_broken_nameserver_list.");    abort();  }  gpr_log(GPR_DEBUG, "resolver_component_test: --enable_srv_queries: %s",          FLAGS_enable_srv_queries.c_str());  grpc_channel_args* resolver_args = nullptr;  // By default, SRV queries are disabled, so tests that expect no SRV query  // should avoid setting any channel arg. Test cases that do rely on the SRV  // query must explicitly enable SRV though.  if (FLAGS_enable_srv_queries == "True") {    grpc_arg srv_queries_arg = grpc_channel_arg_integer_create(        const_cast<char*>(GRPC_ARG_DNS_ENABLE_SRV_QUERIES), true);    resolver_args =        grpc_channel_args_copy_and_add(nullptr, &srv_queries_arg, 1);  } else if (FLAGS_enable_srv_queries != "False") {    gpr_log(GPR_DEBUG, "Invalid value for --enable_srv_queries.");    abort();  }  gpr_log(GPR_DEBUG, "resolver_component_test: --enable_txt_queries: %s",          FLAGS_enable_txt_queries.c_str());  // By default, TXT queries are disabled, so tests that expect no TXT query  // should avoid setting any channel arg. Test cases that do rely on the TXT  // query must explicitly enable TXT though.  if (FLAGS_enable_txt_queries == "True") {    // Unlike SRV queries, there isn't a channel arg specific to TXT records.    // Rather, we use the resolver-agnostic "service config" resolution option,    // for which c-ares has its own specific default value, which isn't    // necessarily shared by other resolvers.    grpc_arg txt_queries_arg = grpc_channel_arg_integer_create(        const_cast<char*>(GRPC_ARG_SERVICE_CONFIG_DISABLE_RESOLUTION), false);    grpc_channel_args* tmp_args =        grpc_channel_args_copy_and_add(resolver_args, &txt_queries_arg, 1);    grpc_channel_args_destroy(resolver_args);    resolver_args = tmp_args;  } else if (FLAGS_enable_txt_queries != "False") {    gpr_log(GPR_DEBUG, "Invalid value for --enable_txt_queries.");    abort();  }  // create resolver and resolve  grpc_core::OrphanablePtr<grpc_core::Resolver> resolver =      grpc_core::ResolverRegistry::CreateResolver(whole_uri, resolver_args,                                                  args.pollset_set, args.lock,                                                  CreateResultHandler(&args));  grpc_channel_args_destroy(resolver_args);  gpr_free(whole_uri);  GRPC_CLOSURE_SCHED(GRPC_CLOSURE_CREATE(StartResolvingLocked, resolver.get(),                                         grpc_combiner_scheduler(args.lock)),                     GRPC_ERROR_NONE);  grpc_core::ExecCtx::Get()->Flush();  PollPollsetUntilRequestDone(&args);  ArgsFinish(&args);}TEST(ResolverComponentTest, TestResolvesRelevantRecords) {  RunResolvesRelevantRecordsTest(CheckingResultHandler::Create);}TEST(ResolverComponentTest, TestResolvesRelevantRecordsWithConcurrentFdStress) {  // Start up background stress thread  int dummy_port = grpc_pick_unused_port_or_die();  gpr_event done_ev;  gpr_event_init(&done_ev);  std::thread socket_stress_thread(OpenAndCloseSocketsStressLoop, dummy_port,                                   &done_ev);  // Run the resolver test  RunResolvesRelevantRecordsTest(ResultHandler::Create);  // Shutdown and join stress thread  gpr_event_set(&done_ev, (void*)1);  socket_stress_thread.join();}}  // namespaceint main(int argc, char** argv) {  grpc_init();  grpc::testing::TestEnvironment env(argc, argv);  ::testing::InitGoogleTest(&argc, argv);  grpc::testing::InitTest(&argc, &argv, true);  if (FLAGS_target_name == "") {    gpr_log(GPR_ERROR, "Missing target_name param.");    abort();  }  auto result = RUN_ALL_TESTS();  grpc_shutdown();  return result;}
 |