Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

net/http: TestTransportKeepAlives failures #56419

Open
gopherbot opened this issue Oct 25, 2022 · 2 comments
Open

net/http: TestTransportKeepAlives failures #56419

gopherbot opened this issue Oct 25, 2022 · 2 comments
Labels
NeedsInvestigation Someone must examine and confirm this is a valid issue and not a duplicate of an existing one.
Milestone

Comments

@gopherbot
Copy link

gopherbot commented Oct 25, 2022

#!watchflakes
post <- pkg == "net/http" && test == "TestTransportKeepAlives"

Issue created automatically to collect these failures.

Example (log):

2022/10/23 09:58:41 http: TLS handshake error from 127.0.0.1:59308: EOF
2022/10/23 09:58:41 http: TLS handshake error from 127.0.0.1:59304: EOF
2022/10/23 09:58:41 http: TLS handshake error from 127.0.0.1:59307: read tcp 127.0.0.1:59309->127.0.0.1:59307: read: connection reset by peer
2022/10/23 09:58:41 http: TLS handshake error from 127.0.0.1:59303: read tcp 127.0.0.1:59309->127.0.0.1:59303: read: connection reset by peer
2022/10/23 09:58:41 http: TLS handshake error from 127.0.0.1:59300: EOF
--- FAIL: TestTransportKeepAlives (0.00s)
    --- FAIL: TestTransportKeepAlives/h1 (0.08s)
        transport_test.go:191: error in disableKeepAlive=false. unexpected bodiesDiffer=true; body1="127.0.0.1:59146, *net.TCPConn 0x4000310b80"; body2="127.0.0.1:59143, *net.TCPConn 0x4000010820"
2022/10/23 09:58:47 http: TLS handshake error from 127.0.0.1:59139: write tcp 127.0.0.1:59140->127.0.0.1:59139: i/o timeout
2022/10/23 09:58:47 http: TLS handshake error from 127.0.0.1:59136: write tcp 127.0.0.1:59137->127.0.0.1:59136: i/o timeout
2022/10/23 09:58:47 http: TLS handshake error from 127.0.0.1:59130: write tcp 127.0.0.1:59131->127.0.0.1:59130: i/o timeout
2022/10/23 09:58:55 http: TLS handshake error from 127.0.0.1:58892: EOF
2022/10/23 09:58:55 http: TLS handshake error from 127.0.0.1:58885: EOF
2022/10/23 09:58:58 http: TLS handshake error from 127.0.0.1:58859: read tcp 127.0.0.1:58862->127.0.0.1:58859: use of closed network connection
2022/10/23 09:58:58 http: TLS handshake error from 127.0.0.1:58857: read tcp 127.0.0.1:58862->127.0.0.1:58857: use of closed network connection
2022/10/23 09:58:58 http: TLS handshake error from 127.0.0.1:58855: read tcp 127.0.0.1:58862->127.0.0.1:58855: use of closed network connection
2022/10/23 09:58:58 http: TLS handshake error from 127.0.0.1:58852: read tcp 127.0.0.1:58862->127.0.0.1:58852: use of closed network connection
2022/10/23 09:58:58 http: TLS handshake error from 127.0.0.1:58858: write tcp 127.0.0.1:58862->127.0.0.1:58858: use of closed network connection
2022/10/23 09:58:58 http: TLS handshake error from 127.0.0.1:58853: write tcp 127.0.0.1:58862->127.0.0.1:58853: use of closed network connection
2022/10/23 09:58:58 http: TLS handshake error from 127.0.0.1:58839: read tcp 127.0.0.1:58843->127.0.0.1:58839: use of closed network connection
2022/10/23 09:58:58 http: TLS handshake error from 127.0.0.1:58838: read tcp 127.0.0.1:58843->127.0.0.1:58838: use of closed network connection
2022/10/23 09:58:58 http: TLS handshake error from 127.0.0.1:58835: read tcp 127.0.0.1:58843->127.0.0.1:58835: use of closed network connection
2022/10/23 09:58:58 http: TLS handshake error from 127.0.0.1:58836: read tcp 127.0.0.1:58843->127.0.0.1:58836: use of closed network connection
2022/10/23 09:58:58 http: TLS handshake error from 127.0.0.1:58834: read tcp 127.0.0.1:58843->127.0.0.1:58834: use of closed network connection
2022/10/23 09:58:58 http: TLS handshake error from 127.0.0.1:58837: write tcp 127.0.0.1:58843->127.0.0.1:58837: use of closed network connection
2022/10/23 09:59:00 http2: server: error reading preface from client 127.0.0.1:58725: bogus greeting "CONNECT golang.fake.tld:"
2022/10/23 09:59:00 http2: server: error reading preface from client 127.0.0.1:58723: bogus greeting "CONNECT golang.fake.tld:"

watchflakes

@gopherbot gopherbot added the NeedsInvestigation Someone must examine and confirm this is a valid issue and not a duplicate of an existing one. label Oct 25, 2022
@gopherbot
Copy link
Author

gopherbot commented Oct 25, 2022

Found new dashboard test flakes for:

#!watchflakes
post <- pkg == "net/http" && test == "TestTransportKeepAlives"
2022-10-18 20:53 netbsd-arm64-bsiegert go@a8e4b8c2 net/http.TestTransportKeepAlives (log)
2022/10/23 09:58:41 http: TLS handshake error from 127.0.0.1:59308: EOF
2022/10/23 09:58:41 http: TLS handshake error from 127.0.0.1:59304: EOF
2022/10/23 09:58:41 http: TLS handshake error from 127.0.0.1:59307: read tcp 127.0.0.1:59309->127.0.0.1:59307: read: connection reset by peer
2022/10/23 09:58:41 http: TLS handshake error from 127.0.0.1:59303: read tcp 127.0.0.1:59309->127.0.0.1:59303: read: connection reset by peer
2022/10/23 09:58:41 http: TLS handshake error from 127.0.0.1:59300: EOF
--- FAIL: TestTransportKeepAlives (0.00s)
    --- FAIL: TestTransportKeepAlives/h1 (0.08s)
        transport_test.go:191: error in disableKeepAlive=false. unexpected bodiesDiffer=true; body1="127.0.0.1:59146, *net.TCPConn 0x4000310b80"; body2="127.0.0.1:59143, *net.TCPConn 0x4000010820"
2022/10/23 09:58:47 http: TLS handshake error from 127.0.0.1:59139: write tcp 127.0.0.1:59140->127.0.0.1:59139: i/o timeout
2022/10/23 09:58:47 http: TLS handshake error from 127.0.0.1:59136: write tcp 127.0.0.1:59137->127.0.0.1:59136: i/o timeout
2022/10/23 09:58:47 http: TLS handshake error from 127.0.0.1:59130: write tcp 127.0.0.1:59131->127.0.0.1:59130: i/o timeout
2022/10/23 09:58:55 http: TLS handshake error from 127.0.0.1:58892: EOF
2022/10/23 09:58:55 http: TLS handshake error from 127.0.0.1:58885: EOF
2022/10/23 09:58:58 http: TLS handshake error from 127.0.0.1:58859: read tcp 127.0.0.1:58862->127.0.0.1:58859: use of closed network connection
2022/10/23 09:58:58 http: TLS handshake error from 127.0.0.1:58857: read tcp 127.0.0.1:58862->127.0.0.1:58857: use of closed network connection
2022/10/23 09:58:58 http: TLS handshake error from 127.0.0.1:58855: read tcp 127.0.0.1:58862->127.0.0.1:58855: use of closed network connection
2022/10/23 09:58:58 http: TLS handshake error from 127.0.0.1:58852: read tcp 127.0.0.1:58862->127.0.0.1:58852: use of closed network connection
2022/10/23 09:58:58 http: TLS handshake error from 127.0.0.1:58858: write tcp 127.0.0.1:58862->127.0.0.1:58858: use of closed network connection
2022/10/23 09:58:58 http: TLS handshake error from 127.0.0.1:58853: write tcp 127.0.0.1:58862->127.0.0.1:58853: use of closed network connection
2022/10/23 09:58:58 http: TLS handshake error from 127.0.0.1:58839: read tcp 127.0.0.1:58843->127.0.0.1:58839: use of closed network connection
2022/10/23 09:58:58 http: TLS handshake error from 127.0.0.1:58838: read tcp 127.0.0.1:58843->127.0.0.1:58838: use of closed network connection
2022/10/23 09:58:58 http: TLS handshake error from 127.0.0.1:58835: read tcp 127.0.0.1:58843->127.0.0.1:58835: use of closed network connection
2022/10/23 09:58:58 http: TLS handshake error from 127.0.0.1:58836: read tcp 127.0.0.1:58843->127.0.0.1:58836: use of closed network connection
2022/10/23 09:58:58 http: TLS handshake error from 127.0.0.1:58834: read tcp 127.0.0.1:58843->127.0.0.1:58834: use of closed network connection
2022/10/23 09:58:58 http: TLS handshake error from 127.0.0.1:58837: write tcp 127.0.0.1:58843->127.0.0.1:58837: use of closed network connection
2022/10/23 09:59:00 http2: server: error reading preface from client 127.0.0.1:58725: bogus greeting "CONNECT golang.fake.tld:"
2022/10/23 09:59:00 http2: server: error reading preface from client 127.0.0.1:58723: bogus greeting "CONNECT golang.fake.tld:"

watchflakes

@bcmills
Copy link
Member

bcmills commented Oct 25, 2022

This looks like the same failure mode reported on solaris-amd64-oraclerel in #35159. (Keeping this issue instead because it already has a watchflakes pattern configured.)

Since there are no common elements between netbsd/arm64 and solaris/amd64, this looks to me like a platform-independent net/http bug (attn @neild).

@bcmills bcmills added this to the Backlog milestone Oct 25, 2022
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
NeedsInvestigation Someone must examine and confirm this is a valid issue and not a duplicate of an existing one.
Projects
Status: No status
Development

No branches or pull requests

2 participants