Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
10 changes: 6 additions & 4 deletions source/common/network/utility.cc
Original file line number Diff line number Diff line change
Expand Up @@ -346,12 +346,14 @@ Address::InstanceConstSharedPtr Utility::getIpv6LoopbackAddress() {
new Address::Ipv6Instance("::1", 0, nullptr));
}

Address::InstanceConstSharedPtr Utility::getIpv4AnyAddress(uint32_t port) {
CONSTRUCT_ON_FIRST_USE(Address::InstanceConstSharedPtr, new Address::Ipv4Instance(port));
Address::InstanceConstSharedPtr Utility::getIpv4AnyAddress() {
CONSTRUCT_ON_FIRST_USE(Address::InstanceConstSharedPtr,
new Address::Ipv4Instance(static_cast<uint32_t>(0)));
}

Address::InstanceConstSharedPtr Utility::getIpv6AnyAddress(uint32_t port) {
CONSTRUCT_ON_FIRST_USE(Address::InstanceConstSharedPtr, new Address::Ipv6Instance(port));
Address::InstanceConstSharedPtr Utility::getIpv6AnyAddress() {
CONSTRUCT_ON_FIRST_USE(Address::InstanceConstSharedPtr,
new Address::Ipv6Instance(static_cast<uint32_t>(0)));
}

const std::string& Utility::getIpv4CidrCatchAllAddress() {
Expand Down
6 changes: 2 additions & 4 deletions source/common/network/utility.h
Original file line number Diff line number Diff line change
Expand Up @@ -246,20 +246,18 @@ class Utility {
static Address::InstanceConstSharedPtr getIpv6LoopbackAddress();

/**
* @param port to be included in address, the default is 0.
* @return Address::InstanceConstSharedPtr an address that represents the IPv4 wildcard address
* (i.e. "0.0.0.0"). Used during binding to indicate that incoming connections to any
* local IPv4 address are to be accepted.
*/
static Address::InstanceConstSharedPtr getIpv4AnyAddress(uint32_t port = 0);
static Address::InstanceConstSharedPtr getIpv4AnyAddress();

/**
* @param port to be included in address, the default is 0.
* @return Address::InstanceConstSharedPtr an address that represents the IPv6 wildcard address
* (i.e. "::"). Used during binding to indicate that incoming connections to any local
* IPv6 address are to be accepted.
*/
static Address::InstanceConstSharedPtr getIpv6AnyAddress(uint32_t port = 0);
static Address::InstanceConstSharedPtr getIpv6AnyAddress();

/**
* @return the IPv4 CIDR catch-all address (0.0.0.0/0).
Expand Down
20 changes: 13 additions & 7 deletions source/server/connection_handler_impl.cc
Original file line number Diff line number Diff line change
Expand Up @@ -7,6 +7,7 @@

#include "source/common/common/logger.h"
#include "source/common/event/deferred_task.h"
#include "source/common/network/address_impl.h"
#include "source/common/network/utility.h"
#include "source/common/runtime/runtime_features.h"
#include "source/server/active_internal_listener.h"
Expand Down Expand Up @@ -231,7 +232,8 @@ ConnectionHandlerImpl::getBalancedHandlerByTag(uint64_t listener_tag) {
auto active_listener = findActiveListenerByTag(listener_tag);
if (active_listener.has_value()) {
ASSERT(absl::holds_alternative<std::reference_wrapper<ActiveTcpListener>>(
active_listener->get().typed_listener_));
active_listener->get().typed_listener_) &&
active_listener->get().listener_->listener() != nullptr);
return Network::BalancedConnectionHandlerOptRef(
active_listener->get().tcpListener().value().get());
}
Expand All @@ -240,10 +242,14 @@ ConnectionHandlerImpl::getBalancedHandlerByTag(uint64_t listener_tag) {

Network::BalancedConnectionHandlerOptRef
ConnectionHandlerImpl::getBalancedHandlerByAddress(const Network::Address::Instance& address) {
// Only Ip address can be restored to original address and redirect.
ASSERT(address.type() == Network::Address::Type::Ip);

// We do not return stopped listeners.
// If there is exact address match, return the corresponding listener.
if (auto listener_it = tcp_listener_map_by_address_.find(address.asStringView());
listener_it != tcp_listener_map_by_address_.end()) {
listener_it != tcp_listener_map_by_address_.end() &&
listener_it->second->listener_->listener() != nullptr) {
return Network::BalancedConnectionHandlerOptRef(
listener_it->second->tcpListener().value().get());
}
Expand All @@ -254,13 +260,13 @@ ConnectionHandlerImpl::getBalancedHandlerByAddress(const Network::Address::Insta
// TODO(wattli): consolidate with previous search for more efficiency.
if (Runtime::runtimeFeatureEnabled(
"envoy.reloadable_features.listener_wildcard_match_ip_family")) {
std::string addr_str =
address.ip()->version() == Network::Address::IpVersion::v4
? Network::Utility::getIpv4AnyAddress(address.ip()->port())->asString()
: Network::Utility::getIpv6AnyAddress(address.ip()->port())->asString();
std::string addr_str = address.ip()->version() == Network::Address::IpVersion::v4
? Network::Address::Ipv4Instance(address.ip()->port()).asString()
: Network::Address::Ipv6Instance(address.ip()->port()).asString();

auto iter = tcp_listener_map_by_address_.find(addr_str);
if (iter != tcp_listener_map_by_address_.end()) {
if (iter != tcp_listener_map_by_address_.end() &&
iter->second->listener_->listener() != nullptr) {
details = *iter->second;
}
} else {
Expand Down
222 changes: 217 additions & 5 deletions test/server/connection_handler_test.cc
Original file line number Diff line number Diff line change
Expand Up @@ -766,11 +766,11 @@ TEST_F(ConnectionHandlerTest, NormalRedirect) {

// When update a listener, the old listener will be stopped and the new listener will
// be added into ConnectionHandler before remove the old listener from ConnectionHandler.
// This test ensure ConnectionHandler can query the correct Listener when balanced the connection
// This test ensure ConnectionHandler can query the correct Listener when redirect the connection
// through `getBalancedHandlerByAddress`
TEST_F(ConnectionHandlerTest, MatchLatestListener) {
Network::TcpListenerCallbacks* listener_callbacks;
// The Listener1 will accept the new connection first then balanced to other listener.
// The Listener1 will accept the new connection first then redirect to other listener.
auto listener1 = new NiceMock<Network::MockListener>();
TestListener* test_listener1 =
addListener(1, true, true, "test_listener1", listener1, &listener_callbacks);
Expand All @@ -779,17 +779,27 @@ TEST_F(ConnectionHandlerTest, MatchLatestListener) {
handler_->addListener(absl::nullopt, *test_listener1);

// Listener2 will be replaced by Listener3.
auto listener2_overridden_filter_chain_manager =
std::make_shared<NiceMock<Network::MockFilterChainManager>>();
auto listener2 = new NiceMock<Network::MockListener>();
TestListener* test_listener2 = addListener(2, false, false, "test_listener2", listener2);
TestListener* test_listener2 =
addListener(2, false, false, "test_listener2", listener2, nullptr, nullptr, nullptr,
Network::Socket::Type::Stream, std::chrono::milliseconds(15000), false,
listener2_overridden_filter_chain_manager);
Network::Address::InstanceConstSharedPtr listener2_address(
new Network::Address::Ipv4Instance("127.0.0.1", 10002));
EXPECT_CALL(test_listener2->socket_factory_, localAddress())
.WillRepeatedly(ReturnRef(listener2_address));
handler_->addListener(absl::nullopt, *test_listener2);

// Listener3 will replace the listener2.
auto listener3_overridden_filter_chain_manager =
std::make_shared<NiceMock<Network::MockFilterChainManager>>();
auto listener3 = new NiceMock<Network::MockListener>();
TestListener* test_listener3 = addListener(3, false, false, "test_listener3", listener3);
TestListener* test_listener3 =
addListener(3, false, false, "test_listener3", listener3, nullptr, nullptr, nullptr,
Network::Socket::Type::Stream, std::chrono::milliseconds(15000), false,
listener3_overridden_filter_chain_manager);
Network::Address::InstanceConstSharedPtr listener3_address(
new Network::Address::Ipv4Instance("127.0.0.1", 10002));
EXPECT_CALL(test_listener3->socket_factory_, localAddress())
Expand Down Expand Up @@ -823,7 +833,12 @@ TEST_F(ConnectionHandlerTest, MatchLatestListener) {
cb.socket().connectionInfoProvider().restoreLocalAddress(alt_address);
return Network::FilterStatus::Continue;
}));
EXPECT_CALL(manager_, findFilterChain(_)).WillOnce(Return(filter_chain_.get()));
// Ensure the request is going to the listener3.
EXPECT_CALL(*listener3_overridden_filter_chain_manager, findFilterChain(_))
.WillOnce(Return(filter_chain_.get()));
// Ensure the request isn't going to the listener1 and listener2.
EXPECT_CALL(manager_, findFilterChain(_)).Times(0);
EXPECT_CALL(*listener2_overridden_filter_chain_manager, findFilterChain(_)).Times(0);

auto* connection = new NiceMock<Network::MockServerConnection>();
EXPECT_CALL(dispatcher_, createServerConnection_()).WillOnce(Return(connection));
Expand All @@ -836,6 +851,203 @@ TEST_F(ConnectionHandlerTest, MatchLatestListener) {
EXPECT_CALL(*access_log_, log(_, _, _, _));
}

TEST_F(ConnectionHandlerTest, EnsureNotMatchStoppedListener) {
Network::TcpListenerCallbacks* listener_callbacks;
// The Listener1 will accept the new connection first then redirect to other listener.
auto listener1 = new NiceMock<Network::MockListener>();
TestListener* test_listener1 =
addListener(1, true, true, "test_listener1", listener1, &listener_callbacks);
EXPECT_CALL(test_listener1->socket_factory_, localAddress())
.WillRepeatedly(ReturnRef(local_address_));
handler_->addListener(absl::nullopt, *test_listener1);

auto listener2_overridden_filter_chain_manager =
std::make_shared<NiceMock<Network::MockFilterChainManager>>();
auto listener2 = new NiceMock<Network::MockListener>();
TestListener* test_listener2 =
addListener(2, false, false, "test_listener2", listener2, nullptr, nullptr, nullptr,
Network::Socket::Type::Stream, std::chrono::milliseconds(15000), false,
listener2_overridden_filter_chain_manager);
Network::Address::InstanceConstSharedPtr listener2_address(
new Network::Address::Ipv4Instance("127.0.0.1", 10002));
EXPECT_CALL(test_listener2->socket_factory_, localAddress())
.WillRepeatedly(ReturnRef(listener2_address));
handler_->addListener(absl::nullopt, *test_listener2);

// Stop the listener2.
EXPECT_CALL(*listener2, onDestroy());
handler_->stopListeners(2);

Network::MockListenerFilter* test_filter = new Network::MockListenerFilter();
EXPECT_CALL(*test_filter, destroy_());
Network::MockConnectionSocket* accepted_socket = new NiceMock<Network::MockConnectionSocket>();
bool redirected = false;
EXPECT_CALL(factory_, createListenerFilterChain(_))
.WillRepeatedly(Invoke([&](Network::ListenerFilterManager& manager) -> bool {
// Insert the Mock filter.
if (!redirected) {
manager.addAcceptFilter(listener_filter_matcher_,
Network::ListenerFilterPtr{test_filter});
redirected = true;
}
return true;
}));
// This is the address of listener2.
Network::Address::InstanceConstSharedPtr alt_address(
new Network::Address::Ipv4Instance("127.0.0.1", 10002, nullptr));
EXPECT_CALL(*test_filter, onAccept(_))
.WillOnce(Invoke([&](Network::ListenerFilterCallbacks& cb) -> Network::FilterStatus {
cb.socket().connectionInfoProvider().restoreLocalAddress(alt_address);
return Network::FilterStatus::Continue;
}));
// Ensure the request isn't going to the listener2.
EXPECT_CALL(*listener2_overridden_filter_chain_manager, findFilterChain(_)).Times(0);
// Ensure the request is going to the listener1.
EXPECT_CALL(manager_, findFilterChain(_)).WillOnce(Return(filter_chain_.get()));

auto* connection = new NiceMock<Network::MockServerConnection>();
EXPECT_CALL(dispatcher_, createServerConnection_()).WillOnce(Return(connection));
EXPECT_CALL(factory_, createNetworkFilterChain(_, _)).WillOnce(Return(true));
listener_callbacks->onAccept(Network::ConnectionSocketPtr{accepted_socket});
EXPECT_EQ(1UL, handler_->numConnections());

EXPECT_CALL(*listener1, onDestroy());
EXPECT_CALL(*access_log_, log(_, _, _, _));
}

TEST_F(ConnectionHandlerTest, EnsureNotMatchStoppedAnyAddressListener) {
Network::TcpListenerCallbacks* listener_callbacks;
// The Listener1 will accept the new connection first then redirect to other listener.
auto listener1 = new NiceMock<Network::MockListener>();
TestListener* test_listener1 =
addListener(1, true, true, "test_listener1", listener1, &listener_callbacks);
EXPECT_CALL(test_listener1->socket_factory_, localAddress())
.WillRepeatedly(ReturnRef(local_address_));
handler_->addListener(absl::nullopt, *test_listener1);

auto listener2_overridden_filter_chain_manager =
std::make_shared<NiceMock<Network::MockFilterChainManager>>();
auto listener2 = new NiceMock<Network::MockListener>();
TestListener* test_listener2 =
addListener(2, false, false, "test_listener2", listener2, nullptr, nullptr, nullptr,
Network::Socket::Type::Stream, std::chrono::milliseconds(15000), false,
listener2_overridden_filter_chain_manager);
Network::Address::InstanceConstSharedPtr listener2_address(
new Network::Address::Ipv4Instance("0.0.0.0", 10002));
EXPECT_CALL(test_listener2->socket_factory_, localAddress())
.WillRepeatedly(ReturnRef(listener2_address));
handler_->addListener(absl::nullopt, *test_listener2);

// Stop the listener2.
EXPECT_CALL(*listener2, onDestroy());
handler_->stopListeners(2);

Network::MockListenerFilter* test_filter = new Network::MockListenerFilter();
EXPECT_CALL(*test_filter, destroy_());
Network::MockConnectionSocket* accepted_socket = new NiceMock<Network::MockConnectionSocket>();
bool redirected = false;
EXPECT_CALL(factory_, createListenerFilterChain(_))
.WillRepeatedly(Invoke([&](Network::ListenerFilterManager& manager) -> bool {
// Insert the Mock filter.
if (!redirected) {
manager.addAcceptFilter(listener_filter_matcher_,
Network::ListenerFilterPtr{test_filter});
redirected = true;
}
return true;
}));
// This is the address of listener2.
Network::Address::InstanceConstSharedPtr alt_address(
new Network::Address::Ipv4Instance("127.0.0.1", 10002, nullptr));
EXPECT_CALL(*test_filter, onAccept(_))
.WillOnce(Invoke([&](Network::ListenerFilterCallbacks& cb) -> Network::FilterStatus {
cb.socket().connectionInfoProvider().restoreLocalAddress(alt_address);
return Network::FilterStatus::Continue;
}));
// Ensure the request isn't going to the listener2.
EXPECT_CALL(*listener2_overridden_filter_chain_manager, findFilterChain(_)).Times(0);
// Ensure the request is going to the listener1.
EXPECT_CALL(manager_, findFilterChain(_)).WillOnce(Return(filter_chain_.get()));

auto* connection = new NiceMock<Network::MockServerConnection>();
EXPECT_CALL(dispatcher_, createServerConnection_()).WillOnce(Return(connection));
EXPECT_CALL(factory_, createNetworkFilterChain(_, _)).WillOnce(Return(true));
listener_callbacks->onAccept(Network::ConnectionSocketPtr{accepted_socket});
EXPECT_EQ(1UL, handler_->numConnections());

EXPECT_CALL(*listener1, onDestroy());
EXPECT_CALL(*access_log_, log(_, _, _, _));
}

TEST_F(ConnectionHandlerTest, EnsureNotMatchStoppedAnyAddressListenerOnOldBehavior) {
auto scoped_runtime = std::make_unique<TestScopedRuntime>();

Runtime::LoaderSingleton::getExisting()->mergeValues(
{{"envoy.reloadable_features.listener_wildcard_match_ip_family", "false"}});

Network::TcpListenerCallbacks* listener_callbacks;
// The Listener1 will accept the new connection first then redirect to other listener.
auto listener1 = new NiceMock<Network::MockListener>();
TestListener* test_listener1 =
addListener(1, true, true, "test_listener1", listener1, &listener_callbacks);
EXPECT_CALL(test_listener1->socket_factory_, localAddress())
.WillRepeatedly(ReturnRef(local_address_));
handler_->addListener(absl::nullopt, *test_listener1);

auto listener2_overridden_filter_chain_manager =
std::make_shared<NiceMock<Network::MockFilterChainManager>>();
auto listener2 = new NiceMock<Network::MockListener>();
TestListener* test_listener2 =
addListener(2, false, false, "test_listener2", listener2, nullptr, nullptr, nullptr,
Network::Socket::Type::Stream, std::chrono::milliseconds(15000), false,
listener2_overridden_filter_chain_manager);
Network::Address::InstanceConstSharedPtr listener2_address(
new Network::Address::Ipv4Instance("0.0.0.0", 10002));
EXPECT_CALL(test_listener2->socket_factory_, localAddress())
.WillRepeatedly(ReturnRef(listener2_address));
handler_->addListener(absl::nullopt, *test_listener2);

// Stop the listener2.
EXPECT_CALL(*listener2, onDestroy());
handler_->stopListeners(2);

Network::MockListenerFilter* test_filter = new Network::MockListenerFilter();
EXPECT_CALL(*test_filter, destroy_());
Network::MockConnectionSocket* accepted_socket = new NiceMock<Network::MockConnectionSocket>();
bool redirected = false;
EXPECT_CALL(factory_, createListenerFilterChain(_))
.WillRepeatedly(Invoke([&](Network::ListenerFilterManager& manager) -> bool {
// Insert the Mock filter.
if (!redirected) {
manager.addAcceptFilter(listener_filter_matcher_,
Network::ListenerFilterPtr{test_filter});
redirected = true;
}
return true;
}));
// This is the address of listener2.
Network::Address::InstanceConstSharedPtr alt_address(
new Network::Address::Ipv4Instance("127.0.0.1", 10002, nullptr));
EXPECT_CALL(*test_filter, onAccept(_))
.WillOnce(Invoke([&](Network::ListenerFilterCallbacks& cb) -> Network::FilterStatus {
cb.socket().connectionInfoProvider().restoreLocalAddress(alt_address);
return Network::FilterStatus::Continue;
}));
// Ensure the request isn't going to the listener2.
EXPECT_CALL(*listener2_overridden_filter_chain_manager, findFilterChain(_)).Times(0);
// Ensure the request is going to the listener1.
EXPECT_CALL(manager_, findFilterChain(_)).WillOnce(Return(filter_chain_.get()));

auto* connection = new NiceMock<Network::MockServerConnection>();
EXPECT_CALL(dispatcher_, createServerConnection_()).WillOnce(Return(connection));
EXPECT_CALL(factory_, createNetworkFilterChain(_, _)).WillOnce(Return(true));
listener_callbacks->onAccept(Network::ConnectionSocketPtr{accepted_socket});
EXPECT_EQ(1UL, handler_->numConnections());

EXPECT_CALL(*listener1, onDestroy());
EXPECT_CALL(*access_log_, log(_, _, _, _));
}

TEST_F(ConnectionHandlerTest, FallbackToWildcardListener) {
Network::TcpListenerCallbacks* listener_callbacks1;
auto listener1 = new NiceMock<Network::MockListener>();
Expand Down