mirror of
https://github.com/k3s-io/kubernetes.git
synced 2025-08-03 09:22:44 +00:00
Merge pull request #28942 from kubernetes/revert-28805-ssh-dial-timeout
Revert "Add a customized ssh dialer that will timeout"
This commit is contained in:
commit
339c6924b2
@ -111,7 +111,7 @@ func makeSSHTunnel(user string, signer ssh.Signer, host string) (*SSHTunnel, err
|
|||||||
|
|
||||||
func (s *SSHTunnel) Open() error {
|
func (s *SSHTunnel) Open() error {
|
||||||
var err error
|
var err error
|
||||||
s.client, err = defaultTimeoutDialer.Dial("tcp", net.JoinHostPort(s.Host, s.SSHPort), s.Config)
|
s.client, err = realTimeoutDialer.Dial("tcp", net.JoinHostPort(s.Host, s.SSHPort), s.Config)
|
||||||
tunnelOpenCounter.Inc()
|
tunnelOpenCounter.Inc()
|
||||||
if err != nil {
|
if err != nil {
|
||||||
tunnelOpenFailCounter.Inc()
|
tunnelOpenFailCounter.Inc()
|
||||||
@ -154,9 +154,21 @@ type sshDialer interface {
|
|||||||
Dial(network, addr string, config *ssh.ClientConfig) (*ssh.Client, error)
|
Dial(network, addr string, config *ssh.ClientConfig) (*ssh.Client, error)
|
||||||
}
|
}
|
||||||
|
|
||||||
// timeoutDialer implements a Dial() method that will timeout. The golang
|
// Real implementation of sshDialer
|
||||||
|
type realSSHDialer struct{}
|
||||||
|
|
||||||
|
var _ sshDialer = &realSSHDialer{}
|
||||||
|
|
||||||
|
func (d *realSSHDialer) Dial(network, addr string, config *ssh.ClientConfig) (*ssh.Client, error) {
|
||||||
|
return ssh.Dial(network, addr, config)
|
||||||
|
}
|
||||||
|
|
||||||
|
// timeoutDialer wraps an sshDialer with a timeout around Dial(). The golang
|
||||||
// ssh library can hang indefinitely inside the Dial() call (see issue #23835).
|
// ssh library can hang indefinitely inside the Dial() call (see issue #23835).
|
||||||
|
// Wrapping all Dial() calls with a conservative timeout provides safety against
|
||||||
|
// getting stuck on that.
|
||||||
type timeoutDialer struct {
|
type timeoutDialer struct {
|
||||||
|
dialer sshDialer
|
||||||
timeout time.Duration
|
timeout time.Duration
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -164,32 +176,30 @@ type timeoutDialer struct {
|
|||||||
// seconds). This timeout is only intended to catch otherwise uncaught hangs.
|
// seconds). This timeout is only intended to catch otherwise uncaught hangs.
|
||||||
const sshDialTimeout = 150 * time.Second
|
const sshDialTimeout = 150 * time.Second
|
||||||
|
|
||||||
var defaultTimeoutDialer sshDialer = &timeoutDialer{sshDialTimeout}
|
var realTimeoutDialer sshDialer = &timeoutDialer{&realSSHDialer{}, sshDialTimeout}
|
||||||
|
|
||||||
func (d *timeoutDialer) Dial(network, addr string, config *ssh.ClientConfig) (*ssh.Client, error) {
|
func (d *timeoutDialer) Dial(network, addr string, config *ssh.ClientConfig) (*ssh.Client, error) {
|
||||||
conn, err := net.Dial(network, addr)
|
var client *ssh.Client
|
||||||
if err != nil {
|
errCh := make(chan error, 1)
|
||||||
return nil, err
|
go func() {
|
||||||
}
|
defer runtime.HandleCrash()
|
||||||
conn.SetDeadline(time.Now().Add(d.timeout))
|
var err error
|
||||||
// set to 0 so that conn will not time out after Dial.
|
client, err = d.dialer.Dial(network, addr, config)
|
||||||
defer func() {
|
errCh <- err
|
||||||
conn.SetDeadline(time.Time{})
|
|
||||||
}()
|
}()
|
||||||
// if conn times out, the NewClientConn will close it, so we will not end up
|
select {
|
||||||
// with hanging goroutines or open file descriptors.
|
case err := <-errCh:
|
||||||
c, chans, reqs, err := ssh.NewClientConn(conn, addr, config)
|
return client, err
|
||||||
if err != nil {
|
case <-time.After(d.timeout):
|
||||||
return nil, err
|
return nil, fmt.Errorf("timed out dialing %s:%s", network, addr)
|
||||||
}
|
}
|
||||||
return ssh.NewClient(c, chans, reqs), nil
|
|
||||||
}
|
}
|
||||||
|
|
||||||
// RunSSHCommand returns the stdout, stderr, and exit code from running cmd on
|
// RunSSHCommand returns the stdout, stderr, and exit code from running cmd on
|
||||||
// host as specific user, along with any SSH-level error.
|
// host as specific user, along with any SSH-level error.
|
||||||
// If user=="", it will default (like SSH) to os.Getenv("USER")
|
// If user=="", it will default (like SSH) to os.Getenv("USER")
|
||||||
func RunSSHCommand(cmd, user, host string, signer ssh.Signer) (string, string, int, error) {
|
func RunSSHCommand(cmd, user, host string, signer ssh.Signer) (string, string, int, error) {
|
||||||
return runSSHCommand(defaultTimeoutDialer, cmd, user, host, signer, true)
|
return runSSHCommand(realTimeoutDialer, cmd, user, host, signer, true)
|
||||||
}
|
}
|
||||||
|
|
||||||
// Internal implementation of runSSHCommand, for testing
|
// Internal implementation of runSSHCommand, for testing
|
||||||
|
@ -329,49 +329,38 @@ func TestSSHUser(t *testing.T) {
|
|||||||
|
|
||||||
}
|
}
|
||||||
|
|
||||||
|
type slowDialer struct {
|
||||||
|
delay time.Duration
|
||||||
|
err error
|
||||||
|
}
|
||||||
|
|
||||||
|
func (s *slowDialer) Dial(network, addr string, config *ssh.ClientConfig) (*ssh.Client, error) {
|
||||||
|
time.Sleep(s.delay)
|
||||||
|
if s.err != nil {
|
||||||
|
return nil, s.err
|
||||||
|
}
|
||||||
|
return &ssh.Client{}, nil
|
||||||
|
}
|
||||||
|
|
||||||
func TestTimeoutDialer(t *testing.T) {
|
func TestTimeoutDialer(t *testing.T) {
|
||||||
testCases := []struct {
|
testCases := []struct {
|
||||||
|
delay time.Duration
|
||||||
timeout time.Duration
|
timeout time.Duration
|
||||||
|
err error
|
||||||
expectedErrString string
|
expectedErrString string
|
||||||
}{
|
}{
|
||||||
// should cause ssh.Dial to timeout.
|
// delay > timeout should cause ssh.Dial to timeout.
|
||||||
{0, "i/o timeout"},
|
{1 * time.Second, 0, nil, "timed out dialing"},
|
||||||
// should succeed
|
// delay < timeout should return the result of the call to the dialer.
|
||||||
{1 * time.Second, ""},
|
{0, 1 * time.Second, nil, ""},
|
||||||
|
{0, 1 * time.Second, fmt.Errorf("test dial error"), "test dial error"},
|
||||||
}
|
}
|
||||||
for _, tc := range testCases {
|
for _, tc := range testCases {
|
||||||
// setup
|
dialer := &timeoutDialer{&slowDialer{tc.delay, tc.err}, tc.timeout}
|
||||||
private, _, err := GenerateKey(2048)
|
_, err := dialer.Dial("tcp", "addr:port", &ssh.ClientConfig{})
|
||||||
if err != nil {
|
|
||||||
t.Errorf("unexpected error: %v", err)
|
|
||||||
t.FailNow()
|
|
||||||
}
|
|
||||||
server, err := runTestSSHServer("foo", "bar")
|
|
||||||
if err != nil {
|
|
||||||
t.Errorf("unexpected error: %v", err)
|
|
||||||
t.FailNow()
|
|
||||||
}
|
|
||||||
privateData := EncodePrivateKey(private)
|
|
||||||
tunnel, err := NewSSHTunnelFromBytes("foo", privateData, server.Host)
|
|
||||||
if err != nil {
|
|
||||||
t.Errorf("unexpected error: %v", err)
|
|
||||||
t.FailNow()
|
|
||||||
}
|
|
||||||
tunnel.SSHPort = server.Port
|
|
||||||
|
|
||||||
// test the dialer
|
|
||||||
dialer := &timeoutDialer{tc.timeout}
|
|
||||||
client, err := dialer.Dial("tcp", net.JoinHostPort(tunnel.Host, tunnel.SSHPort), tunnel.Config)
|
|
||||||
if len(tc.expectedErrString) == 0 && err != nil ||
|
if len(tc.expectedErrString) == 0 && err != nil ||
|
||||||
!strings.Contains(fmt.Sprint(err), tc.expectedErrString) {
|
!strings.Contains(fmt.Sprint(err), tc.expectedErrString) {
|
||||||
t.Errorf("Expected error to contain %q; got %v", tc.expectedErrString, err)
|
t.Errorf("Expected error to contain %q; got %v", tc.expectedErrString, err)
|
||||||
}
|
}
|
||||||
if len(tc.expectedErrString) == 0 {
|
|
||||||
// verify the connection doesn't timeout after the handshake is done.
|
|
||||||
time.Sleep(tc.timeout + 1*time.Second)
|
|
||||||
if _, _, err := client.OpenChannel("direct-tcpip", nil); err != nil {
|
|
||||||
t.Errorf("unexpected error %v", err)
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
Loading…
Reference in New Issue
Block a user