2019-08-26 17:00:04 +00:00
|
|
|
package mirror
|
|
|
|
|
|
|
|
import (
|
2019-08-29 08:28:05 +00:00
|
|
|
"bufio"
|
2020-03-05 17:03:08 +00:00
|
|
|
"bytes"
|
2019-08-26 17:00:04 +00:00
|
|
|
"context"
|
|
|
|
"errors"
|
2020-03-05 17:03:08 +00:00
|
|
|
"fmt"
|
|
|
|
"io"
|
|
|
|
"io/ioutil"
|
2019-08-29 08:28:05 +00:00
|
|
|
"net"
|
2019-08-26 17:00:04 +00:00
|
|
|
"net/http"
|
|
|
|
"sync"
|
|
|
|
|
2020-09-16 13:46:04 +00:00
|
|
|
"github.com/traefik/traefik/v2/pkg/log"
|
|
|
|
"github.com/traefik/traefik/v2/pkg/middlewares/accesslog"
|
|
|
|
"github.com/traefik/traefik/v2/pkg/safe"
|
2019-08-26 17:00:04 +00:00
|
|
|
)
|
|
|
|
|
|
|
|
// Mirroring is an http.Handler that can mirror requests.
|
|
|
|
type Mirroring struct {
|
|
|
|
handler http.Handler
|
|
|
|
mirrorHandlers []*mirrorHandler
|
|
|
|
rw http.ResponseWriter
|
|
|
|
routinePool *safe.Pool
|
|
|
|
|
2020-03-05 17:03:08 +00:00
|
|
|
maxBodySize int64
|
|
|
|
|
2019-08-26 17:00:04 +00:00
|
|
|
lock sync.RWMutex
|
|
|
|
total uint64
|
|
|
|
}
|
|
|
|
|
|
|
|
// New returns a new instance of *Mirroring.
|
2020-03-05 17:03:08 +00:00
|
|
|
func New(handler http.Handler, pool *safe.Pool, maxBodySize int64) *Mirroring {
|
2019-08-26 17:00:04 +00:00
|
|
|
return &Mirroring{
|
|
|
|
routinePool: pool,
|
|
|
|
handler: handler,
|
2020-03-05 17:03:08 +00:00
|
|
|
rw: blackHoleResponseWriter{},
|
|
|
|
maxBodySize: maxBodySize,
|
2019-08-26 17:00:04 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func (m *Mirroring) inc() uint64 {
|
|
|
|
m.lock.Lock()
|
|
|
|
defer m.lock.Unlock()
|
|
|
|
m.total++
|
|
|
|
return m.total
|
|
|
|
}
|
|
|
|
|
|
|
|
type mirrorHandler struct {
|
|
|
|
http.Handler
|
|
|
|
percent int
|
|
|
|
|
|
|
|
lock sync.RWMutex
|
|
|
|
count uint64
|
|
|
|
}
|
|
|
|
|
2020-03-05 17:03:08 +00:00
|
|
|
func (m *Mirroring) getActiveMirrors() []http.Handler {
|
|
|
|
total := m.inc()
|
|
|
|
|
|
|
|
var mirrors []http.Handler
|
|
|
|
for _, handler := range m.mirrorHandlers {
|
|
|
|
handler.lock.Lock()
|
|
|
|
if handler.count*100 < total*uint64(handler.percent) {
|
|
|
|
handler.count++
|
|
|
|
handler.lock.Unlock()
|
|
|
|
mirrors = append(mirrors, handler)
|
|
|
|
} else {
|
|
|
|
handler.lock.Unlock()
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return mirrors
|
|
|
|
}
|
|
|
|
|
2019-08-26 17:00:04 +00:00
|
|
|
func (m *Mirroring) ServeHTTP(rw http.ResponseWriter, req *http.Request) {
|
2020-03-05 17:03:08 +00:00
|
|
|
mirrors := m.getActiveMirrors()
|
|
|
|
if len(mirrors) == 0 {
|
|
|
|
m.handler.ServeHTTP(rw, req)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
logger := log.FromContext(req.Context())
|
|
|
|
rr, bytesRead, err := newReusableRequest(req, m.maxBodySize)
|
2020-11-06 08:26:03 +00:00
|
|
|
if err != nil && !errors.Is(err, errBodyTooLarge) {
|
2020-03-05 17:03:08 +00:00
|
|
|
http.Error(rw, http.StatusText(http.StatusInternalServerError)+
|
|
|
|
fmt.Sprintf("error creating reusable request: %v", err), http.StatusInternalServerError)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2020-11-06 08:26:03 +00:00
|
|
|
if errors.Is(err, errBodyTooLarge) {
|
2020-03-05 17:03:08 +00:00
|
|
|
req.Body = ioutil.NopCloser(io.MultiReader(bytes.NewReader(bytesRead), req.Body))
|
|
|
|
m.handler.ServeHTTP(rw, req)
|
|
|
|
logger.Debugf("no mirroring, request body larger than allowed size")
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
m.handler.ServeHTTP(rw, rr.clone(req.Context()))
|
2019-08-26 17:00:04 +00:00
|
|
|
|
|
|
|
select {
|
|
|
|
case <-req.Context().Done():
|
|
|
|
// No mirroring if request has been canceled during main handler ServeHTTP
|
2020-03-05 17:03:08 +00:00
|
|
|
logger.Warn("no mirroring, request has been canceled during main handler ServeHTTP")
|
2019-08-26 17:00:04 +00:00
|
|
|
return
|
|
|
|
default:
|
|
|
|
}
|
|
|
|
|
|
|
|
m.routinePool.GoCtx(func(_ context.Context) {
|
2020-03-05 17:03:08 +00:00
|
|
|
for _, handler := range mirrors {
|
|
|
|
// prepare request, update body from buffer
|
|
|
|
r := rr.clone(req.Context())
|
|
|
|
|
|
|
|
// In ServeHTTP, we rely on the presence of the accessLog datatable found in the request's context
|
|
|
|
// to know whether we should mutate said datatable (and contribute some fields to the log).
|
|
|
|
// In this instance, we do not want the mirrors mutating (i.e. changing the service name in)
|
|
|
|
// the logs related to the mirrored server.
|
|
|
|
// Especially since it would result in unguarded concurrent reads/writes on the datatable.
|
|
|
|
// Therefore, we reset any potential datatable key in the new context that we pass around.
|
|
|
|
ctx := context.WithValue(r.Context(), accesslog.DataTableKey, nil)
|
|
|
|
|
|
|
|
// When a request served by m.handler is successful, req.Context will be canceled,
|
|
|
|
// which would trigger a cancellation of the ongoing mirrored requests.
|
|
|
|
// Therefore, we give a new, non-cancellable context to each of the mirrored calls,
|
|
|
|
// so they can terminate by themselves.
|
|
|
|
handler.ServeHTTP(m.rw, r.WithContext(contextStopPropagation{ctx}))
|
2019-08-26 17:00:04 +00:00
|
|
|
}
|
|
|
|
})
|
|
|
|
}
|
|
|
|
|
|
|
|
// AddMirror adds an httpHandler to mirror to.
|
|
|
|
func (m *Mirroring) AddMirror(handler http.Handler, percent int) error {
|
2019-08-29 08:28:05 +00:00
|
|
|
if percent < 0 || percent > 100 {
|
2019-08-26 17:00:04 +00:00
|
|
|
return errors.New("percent must be between 0 and 100")
|
|
|
|
}
|
|
|
|
m.mirrorHandlers = append(m.mirrorHandlers, &mirrorHandler{Handler: handler, percent: percent})
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2020-03-05 17:03:08 +00:00
|
|
|
type blackHoleResponseWriter struct{}
|
2019-08-26 17:00:04 +00:00
|
|
|
|
2020-03-05 17:03:08 +00:00
|
|
|
func (b blackHoleResponseWriter) Flush() {}
|
2019-08-29 08:28:05 +00:00
|
|
|
|
2020-03-05 17:03:08 +00:00
|
|
|
func (b blackHoleResponseWriter) Hijack() (net.Conn, *bufio.ReadWriter, error) {
|
|
|
|
return nil, nil, errors.New("connection on blackHoleResponseWriter cannot be hijacked")
|
2019-08-29 08:28:05 +00:00
|
|
|
}
|
|
|
|
|
2020-03-05 17:03:08 +00:00
|
|
|
func (b blackHoleResponseWriter) Header() http.Header {
|
2019-08-26 17:00:04 +00:00
|
|
|
return http.Header{}
|
|
|
|
}
|
|
|
|
|
2020-03-05 17:03:08 +00:00
|
|
|
func (b blackHoleResponseWriter) Write(bytes []byte) (int, error) {
|
2019-08-26 17:00:04 +00:00
|
|
|
return len(bytes), nil
|
|
|
|
}
|
|
|
|
|
2020-03-05 17:03:08 +00:00
|
|
|
func (b blackHoleResponseWriter) WriteHeader(statusCode int) {}
|
2019-08-26 17:00:04 +00:00
|
|
|
|
|
|
|
type contextStopPropagation struct {
|
|
|
|
context.Context
|
|
|
|
}
|
|
|
|
|
|
|
|
func (c contextStopPropagation) Done() <-chan struct{} {
|
|
|
|
return make(chan struct{})
|
|
|
|
}
|
2020-03-05 17:03:08 +00:00
|
|
|
|
|
|
|
// reusableRequest keeps in memory the body of the given request,
|
|
|
|
// so that the request can be fully cloned by each mirror.
|
|
|
|
type reusableRequest struct {
|
|
|
|
req *http.Request
|
|
|
|
body []byte
|
|
|
|
}
|
|
|
|
|
|
|
|
var errBodyTooLarge = errors.New("request body too large")
|
|
|
|
|
|
|
|
// if the returned error is errBodyTooLarge, newReusableRequest also returns the
|
|
|
|
// bytes that were already consumed from the request's body.
|
|
|
|
func newReusableRequest(req *http.Request, maxBodySize int64) (*reusableRequest, []byte, error) {
|
|
|
|
if req == nil {
|
|
|
|
return nil, nil, errors.New("nil input request")
|
|
|
|
}
|
|
|
|
if req.Body == nil {
|
|
|
|
return &reusableRequest{req: req}, nil, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// unbounded body size
|
|
|
|
if maxBodySize < 0 {
|
|
|
|
body, err := ioutil.ReadAll(req.Body)
|
|
|
|
if err != nil {
|
|
|
|
return nil, nil, err
|
|
|
|
}
|
|
|
|
return &reusableRequest{
|
|
|
|
req: req,
|
|
|
|
body: body,
|
|
|
|
}, nil, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// we purposefully try to read _more_ than maxBodySize to detect whether
|
|
|
|
// the request body is larger than what we allow for the mirrors.
|
|
|
|
body := make([]byte, maxBodySize+1)
|
|
|
|
n, err := io.ReadFull(req.Body, body)
|
2020-11-06 08:26:03 +00:00
|
|
|
if err != nil && !errors.Is(err, io.ErrUnexpectedEOF) {
|
2020-03-05 17:03:08 +00:00
|
|
|
return nil, nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
// we got an ErrUnexpectedEOF, which means there was less than maxBodySize data to read,
|
|
|
|
// which permits us sending also to all the mirrors later.
|
2020-11-06 08:26:03 +00:00
|
|
|
if errors.Is(err, io.ErrUnexpectedEOF) {
|
2020-03-05 17:03:08 +00:00
|
|
|
return &reusableRequest{
|
|
|
|
req: req,
|
|
|
|
body: body[:n],
|
|
|
|
}, nil, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// err == nil , which means data size > maxBodySize
|
|
|
|
return nil, body[:n], errBodyTooLarge
|
|
|
|
}
|
|
|
|
|
|
|
|
func (rr reusableRequest) clone(ctx context.Context) *http.Request {
|
|
|
|
req := rr.req.Clone(ctx)
|
|
|
|
|
|
|
|
if rr.body != nil {
|
|
|
|
req.Body = ioutil.NopCloser(bytes.NewReader(rr.body))
|
|
|
|
}
|
|
|
|
|
|
|
|
return req
|
|
|
|
}
|