
In linux platform, the shim server always listens on the socket before the containerd task manager dial it. It is unlikely that containerd task manager should handle reconnect because the shim can't restart. For this case, the containerd task manager should fail fast if there is ENOENT or ECONNREFUSED error. And if the socket file is deleted during cleanup the exited task, it maybe cause that containerd task manager takes long time to reload the dead shim. For that task.v2 manager, the race case is like: ``` TaskService.Delete TaskManager.Delete(runtime/v2/manager.go) shim.delete(runtime/v2/shim.go) shimv2api.Shutdown(runtime/v2/task/shim.pb.go) <- containerd has been killed or restarted somehow bundle.Delete ``` The shimv2api.Shutdown will cause that the shim deletes socket file (containerd-shim-runc-v2 does). But the bundle is still there. During reloading, the containerd will wait for the socket file appears again in 100 seconds. It is not reasonable. The Reconnect should prevent this case by fast fail. Closes: #5648. Fixes: #5597. Signed-off-by: Wei Fu <fuweid89@gmail.com>
178 lines
4.8 KiB
Go
178 lines
4.8 KiB
Go
//go:build !windows
|
|
// +build !windows
|
|
|
|
/*
|
|
Copyright The containerd Authors.
|
|
|
|
Licensed under the Apache License, Version 2.0 (the "License");
|
|
you may not use this file except in compliance with the License.
|
|
You may obtain a copy of the License at
|
|
|
|
http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
Unless required by applicable law or agreed to in writing, software
|
|
distributed under the License is distributed on an "AS IS" BASIS,
|
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
See the License for the specific language governing permissions and
|
|
limitations under the License.
|
|
*/
|
|
|
|
package integration
|
|
|
|
import (
|
|
"context"
|
|
"io/ioutil"
|
|
"net"
|
|
"os"
|
|
"path/filepath"
|
|
"strings"
|
|
"syscall"
|
|
"testing"
|
|
"time"
|
|
|
|
v1shimcli "github.com/containerd/containerd/runtime/v1/shim/client"
|
|
v2shimcli "github.com/containerd/containerd/runtime/v2/shim"
|
|
"github.com/containerd/ttrpc"
|
|
"github.com/pkg/errors"
|
|
)
|
|
|
|
const abstractSocketPrefix = "\x00"
|
|
|
|
// TestFailFastWhenConnectShim is to test that the containerd task manager
|
|
// should not tolerate ENOENT during restarting. In linux, the containerd shim
|
|
// always listens on socket before task manager dial. If there is ENOENT or
|
|
// ECONNREFUSED error, the task manager should clean up because that socket file
|
|
// is gone or shim doesn't listen on the socket anymore.
|
|
func TestFailFastWhenConnectShim(t *testing.T) {
|
|
t.Parallel()
|
|
|
|
t.Run("abstract-unix-socket-v1", testFailFastWhenConnectShim(true, v1shimcli.AnonDialer))
|
|
t.Run("abstract-unix-socket-v2", testFailFastWhenConnectShim(true, v2shimcli.AnonDialer))
|
|
t.Run("normal-unix-socket-v1", testFailFastWhenConnectShim(false, v1shimcli.AnonDialer))
|
|
t.Run("normal-unix-socket-v2", testFailFastWhenConnectShim(false, v2shimcli.AnonDialer))
|
|
}
|
|
|
|
type dialFunc func(address string, timeout time.Duration) (net.Conn, error)
|
|
|
|
func testFailFastWhenConnectShim(abstract bool, dialFn dialFunc) func(*testing.T) {
|
|
return func(t *testing.T) {
|
|
var (
|
|
ctx = context.Background()
|
|
addr, listener, cleanup = newTestListener(t, abstract)
|
|
errCh = make(chan error, 1)
|
|
|
|
checkDialErr = func(addr string, errCh chan error, expected error) {
|
|
go func() {
|
|
_, err := dialFn(addr, 1*time.Hour)
|
|
errCh <- err
|
|
}()
|
|
|
|
select {
|
|
case <-time.After(10 * time.Second):
|
|
t.Fatalf("expected fail fast, but got timeout")
|
|
case err := <-errCh:
|
|
t.Helper()
|
|
if !errors.Is(err, expected) {
|
|
t.Fatalf("expected error %v, but got %v", expected, err)
|
|
}
|
|
}
|
|
}
|
|
)
|
|
defer cleanup()
|
|
defer listener.Close()
|
|
|
|
ttrpcSrv, err := ttrpc.NewServer()
|
|
if err != nil {
|
|
t.Fatalf("failed to new ttrpc server: %v", err)
|
|
}
|
|
go func() {
|
|
ttrpcSrv.Serve(ctx, listener)
|
|
}()
|
|
|
|
// ttrpcSrv starts in other goroutine so that we need to retry AnonDialer
|
|
// here until ttrpcSrv receives the request.
|
|
go func() {
|
|
to := time.After(10 * time.Second)
|
|
|
|
for {
|
|
select {
|
|
case <-to:
|
|
errCh <- errors.New("timeout")
|
|
return
|
|
default:
|
|
}
|
|
|
|
conn, err := dialFn(addr, 1*time.Hour)
|
|
if err != nil {
|
|
if errors.Is(err, syscall.ECONNREFUSED) {
|
|
time.Sleep(10 * time.Millisecond)
|
|
continue
|
|
}
|
|
errCh <- err
|
|
return
|
|
}
|
|
|
|
conn.Close()
|
|
errCh <- nil
|
|
return
|
|
}
|
|
}()
|
|
|
|
// it should be successful
|
|
if err := <-errCh; err != nil {
|
|
t.Fatalf("failed to dial: %v", err)
|
|
}
|
|
|
|
// NOTE(fuweid):
|
|
//
|
|
// UnixListener will unlink that the socket file when call Close.
|
|
// Disable unlink when close to keep the socket file.
|
|
listener.(*net.UnixListener).SetUnlinkOnClose(false)
|
|
|
|
listener.Close()
|
|
ttrpcSrv.Shutdown(ctx)
|
|
|
|
checkDialErr(addr, errCh, syscall.ECONNREFUSED)
|
|
|
|
// remove the socket file
|
|
cleanup()
|
|
|
|
if abstract {
|
|
checkDialErr(addr, errCh, syscall.ECONNREFUSED)
|
|
} else {
|
|
// should not wait for the socket file show up again.
|
|
checkDialErr(addr, errCh, syscall.ENOENT)
|
|
}
|
|
}
|
|
}
|
|
|
|
func newTestListener(t testing.TB, abstract bool) (string, net.Listener, func()) {
|
|
tmpDir, err := ioutil.TempDir("", "shim-ut-XX")
|
|
if err != nil {
|
|
t.Fatalf("failed to create tmp directory: %v", err)
|
|
}
|
|
|
|
// NOTE(fuweid):
|
|
//
|
|
// Before patch https://github.com/containerd/containerd/commit/bd908acabd1a31c8329570b5283e8fdca0b39906,
|
|
// The shim stores the abstract socket file without abstract socket
|
|
// prefix and `unix://`. For the existing shim, if the socket file
|
|
// only contains the path, it will indicate that it is abstract socket.
|
|
// Otherwise, it will be normal socket file formated in `unix:///xyz'.
|
|
addr := filepath.Join(tmpDir, "uds.socket")
|
|
if abstract {
|
|
addr = abstractSocketPrefix + addr
|
|
} else {
|
|
addr = "unix://" + addr
|
|
}
|
|
|
|
listener, err := net.Listen("unix", strings.TrimPrefix(addr, "unix://"))
|
|
if err != nil {
|
|
t.Fatalf("failed to listen on %s: %v", addr, err)
|
|
}
|
|
|
|
return strings.TrimPrefix(addr, abstractSocketPrefix), listener, func() {
|
|
os.RemoveAll(tmpDir)
|
|
}
|
|
}
|