1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
#![feature(test)]
extern crate test;
#[macro_use]
extern crate slog_global;
pub mod encryption;
mod kv_generator;
mod logging;
mod macros;
mod runner;
mod security;
use rand::Rng;
use std::env;
use std::sync::atomic::{AtomicU16, Ordering};
pub use crate::encryption::*;
pub use crate::kv_generator::*;
pub use crate::logging::*;
pub use crate::macros::*;
pub use crate::runner::{
clear_failpoints, run_failpoint_tests, run_test_with_hook, run_tests, TestHook,
};
pub use crate::security::*;
pub fn setup_for_ci() {
if env::var("CI").is_ok() {
#[cfg(target_os = "linux")]
{
if env::var("GRPC_POLL_STRATEGY").is_err() {
env::set_var("GRPC_POLL_STRATEGY", "epollex");
}
}
if env::var("LOG_FILE").is_ok() {
logging::init_log_for_test();
}
}
if env::var("PANIC_ABORT").is_ok() {
tikv_util::set_panic_hook(true, "./");
}
tikv_util::check_environment_variables();
if let Err(e) = tikv_util::config::check_max_open_fds(4096) {
panic!(
"To run test, please make sure the maximum number of open file descriptors not \
less than 4096: {:?}",
e
);
}
}
static INITIAL_PORT: AtomicU16 = AtomicU16::new(0);
const MIN_LOCAL_PORT: u16 = 32767;
pub fn alloc_port() -> u16 {
let p = INITIAL_PORT.load(Ordering::Relaxed);
if p == 0 {
let _ = INITIAL_PORT.compare_exchange(
0,
rand::thread_rng().gen_range(10240, MIN_LOCAL_PORT),
Ordering::SeqCst,
Ordering::SeqCst,
);
}
let mut p = INITIAL_PORT.load(Ordering::SeqCst);
loop {
let next = if p >= MIN_LOCAL_PORT { 10240 } else { p + 1 };
match INITIAL_PORT.compare_exchange_weak(p, next, Ordering::SeqCst, Ordering::SeqCst) {
Ok(_) => return next,
Err(e) => p = e,
}
}
}