-
Notifications
You must be signed in to change notification settings - Fork 4.6k
delegatingresolver: add default port to addresses #8613
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: master
Are you sure you want to change the base?
Changes from 4 commits
4186a66
2156251
07add50
abc1773
0702e0c
2f50b78
aee0066
3d93bc1
80a3e98
c19e88d
82076ed
File filter
Filter by extension
Conversations
Jump to
Diff view
Diff view
There are no files selected for viewing
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -22,6 +22,7 @@ package delegatingresolver | |
|
||
import ( | ||
"fmt" | ||
"net" | ||
"net/http" | ||
"net/url" | ||
"sync" | ||
|
@@ -40,6 +41,8 @@ var ( | |
HTTPSProxyFromEnvironment = http.ProxyFromEnvironment | ||
) | ||
|
||
const defaultPort = "443" | ||
|
||
// delegatingResolver manages both target URI and proxy address resolution by | ||
// delegating these tasks to separate child resolvers. Essentially, it acts as | ||
// an intermediary between the gRPC ClientConn and the child resolvers. | ||
|
@@ -131,9 +134,13 @@ func New(target resolver.Target, cc resolver.ClientConn, opts resolver.BuildOpti | |
// resolution should be handled by the proxy, not the client. Therefore, we | ||
// bypass the target resolver and store the unresolved target address. | ||
if target.URL.Scheme == "dns" && !targetResolutionEnabled { | ||
add, err := maybeAddDefaultPort(target.Endpoint(), defaultPort) | ||
if err != nil { | ||
return nil, fmt.Errorf("delegating_resolver: invalid target address %s: %v", target.Endpoint(), err) | ||
} | ||
r.targetResolverState = &resolver.State{ | ||
Addresses: []resolver.Address{{Addr: target.Endpoint()}}, | ||
Endpoints: []resolver.Endpoint{{Addresses: []resolver.Address{{Addr: target.Endpoint()}}}}, | ||
Addresses: []resolver.Address{{Addr: add}}, | ||
Endpoints: []resolver.Endpoint{{Addresses: []resolver.Address{{Addr: add}}}}, | ||
} | ||
r.updateTargetResolverState(*r.targetResolverState) | ||
return r, nil | ||
|
@@ -202,6 +209,31 @@ func needsProxyResolver(state *resolver.State) bool { | |
return false | ||
} | ||
|
||
func maybeAddDefaultPort(target, defaultPort string) (string, error) { | ||
if target == "" { | ||
return "", fmt.Errorf("missing address") | ||
} | ||
if host, port, err := net.SplitHostPort(target); err == nil { | ||
if port == "" { | ||
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. Based on the documentation of
Please correct me if I'm wrong. There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more.
|
||
// If the port field is empty (target ends with colon), e.g. "[::1]:", | ||
// this is an error. | ||
Comment on lines
+235
to
+236
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. Optional: I think it would be better to group these inline comments into a docstring for the function. That way, one can just read that docstring and get to know what the function is doing instead of reading it one piece at a time. There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. Done. |
||
return "", fmt.Errorf("missing port after port-separator colon") | ||
} | ||
// target has port, i.e ipv4-host:port, [ipv6-host]:port, host-name:port | ||
if host == "" { | ||
// Keep consistent with net.Dial(): If the host is empty, as in ":80", | ||
// the local system is assumed. | ||
host = "localhost" | ||
} | ||
return fmt.Sprintf("%s:%s", host, port), nil | ||
eshitachandwani marked this conversation as resolved.
Outdated
Show resolved
Hide resolved
|
||
} | ||
if host, port, err := net.SplitHostPort(target + ":" + defaultPort); err == nil { | ||
// target doesn't have port | ||
return fmt.Sprintf("%s:%s", host, port), nil | ||
} | ||
return "", fmt.Errorf("invalid target address %v", target) | ||
} | ||
|
||
func skipProxy(address resolver.Address) bool { | ||
// Avoid proxy when network is not tcp. | ||
networkType, ok := networktype.Get(address) | ||
|
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -253,48 +253,69 @@ func (s) TestDelegatingResolverwithDNSAndProxyWithTargetResolution(t *testing.T) | |
// of the proxy address. | ||
func (s) TestDelegatingResolverwithDNSAndProxyWithNoTargetResolution(t *testing.T) { | ||
const ( | ||
targetTestAddr = "test.com" | ||
envProxyAddr = "proxytest.com" | ||
resolvedProxyTestAddr1 = "11.11.11.11:7687" | ||
) | ||
overrideTestHTTPSProxy(t, envProxyAddr) | ||
|
||
targetResolver := manual.NewBuilderWithScheme("dns") | ||
target := targetResolver.Scheme() + ":///" + targetTestAddr | ||
// Set up a manual DNS resolver to control the proxy address resolution. | ||
proxyResolver, proxyResolverBuilt := setupDNS(t) | ||
|
||
tcc, stateCh, _ := createTestResolverClientConn(t) | ||
if _, err := delegatingresolver.New(resolver.Target{URL: *testutils.MustParseURL(target)}, tcc, resolver.BuildOptions{}, targetResolver, false); err != nil { | ||
t.Fatalf("Failed to create delegating resolver: %v", err) | ||
tests := []struct { | ||
name string | ||
target string | ||
wantConnectAddress string | ||
}{ | ||
{ | ||
name: "no port in target", | ||
|
||
target: "test.com", | ||
wantConnectAddress: "test.com:443", | ||
}, | ||
{ | ||
name: "port specified in target", | ||
target: "test.com:8080", | ||
wantConnectAddress: "test.com:8080", | ||
}, | ||
} | ||
|
||
ctx, cancel := context.WithTimeout(context.Background(), defaultTestTimeout) | ||
defer cancel() | ||
for _, test := range tests { | ||
t.Run(test.name, func(t *testing.T) { | ||
overrideTestHTTPSProxy(t, envProxyAddr) | ||
|
||
// Wait for the proxy resolver to be built before calling UpdateState. | ||
mustBuildResolver(ctx, t, proxyResolverBuilt) | ||
proxyResolver.UpdateState(resolver.State{ | ||
Addresses: []resolver.Address{ | ||
{Addr: resolvedProxyTestAddr1}, | ||
}, | ||
}) | ||
targetResolver := manual.NewBuilderWithScheme("dns") | ||
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. Don't you have to unregister the original |
||
target := targetResolver.Scheme() + ":///" + test.target | ||
// Set up a manual DNS resolver to control the proxy address resolution. | ||
proxyResolver, proxyResolverBuilt := setupDNS(t) | ||
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. Oh I see that this helper does re-register the original There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. This is what we had earlier too..in the tests. |
||
|
||
wantState := resolver.State{ | ||
Addresses: []resolver.Address{proxyAddressWithTargetAttribute(resolvedProxyTestAddr1, targetTestAddr)}, | ||
Endpoints: []resolver.Endpoint{{Addresses: []resolver.Address{proxyAddressWithTargetAttribute(resolvedProxyTestAddr1, targetTestAddr)}}}, | ||
} | ||
tcc, stateCh, _ := createTestResolverClientConn(t) | ||
if _, err := delegatingresolver.New(resolver.Target{URL: *testutils.MustParseURL(target)}, tcc, resolver.BuildOptions{}, targetResolver, false); err != nil { | ||
t.Fatalf("Failed to create delegating resolver: %v", err) | ||
} | ||
|
||
var gotState resolver.State | ||
select { | ||
case gotState = <-stateCh: | ||
case <-ctx.Done(): | ||
t.Fatal("Context timed out when waiting for a state update from the delegating resolver") | ||
} | ||
ctx, cancel := context.WithTimeout(context.Background(), defaultTestTimeout) | ||
defer cancel() | ||
|
||
if diff := cmp.Diff(gotState, wantState); diff != "" { | ||
t.Fatalf("Unexpected state from delegating resolver. Diff (-got +want):\n%v", diff) | ||
// Wait for the proxy resolver to be built before calling UpdateState. | ||
mustBuildResolver(ctx, t, proxyResolverBuilt) | ||
proxyResolver.UpdateState(resolver.State{ | ||
Addresses: []resolver.Address{ | ||
{Addr: resolvedProxyTestAddr1}, | ||
}, | ||
}) | ||
|
||
wantState := resolver.State{ | ||
Addresses: []resolver.Address{proxyAddressWithTargetAttribute(resolvedProxyTestAddr1, test.wantConnectAddress)}, | ||
Endpoints: []resolver.Endpoint{{Addresses: []resolver.Address{proxyAddressWithTargetAttribute(resolvedProxyTestAddr1, test.wantConnectAddress)}}}, | ||
} | ||
|
||
var gotState resolver.State | ||
select { | ||
case gotState = <-stateCh: | ||
case <-ctx.Done(): | ||
t.Fatal("Context timed out when waiting for a state update from the delegating resolver") | ||
} | ||
|
||
if diff := cmp.Diff(gotState, wantState); diff != "" { | ||
t.Fatalf("Unexpected state from delegating resolver. Diff (-got +want):\n%v", diff) | ||
} | ||
}) | ||
} | ||
|
||
} | ||
|
||
// Tests the scenario where a proxy is configured, and the target URI scheme is | ||
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Is this even possible since we already parse the target URI specified by the user in clientconn.go before we get here?
Ideally, it would be nicer to avoid checking conditions that are not possible, since it would simplify the code.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I dont see an explicit check for missing target in the clientconn.go and this is similar to the check we already have in dns.