2020-07-15 14:56:03 +00:00
|
|
|
package http
|
|
|
|
|
|
|
|
import (
|
|
|
|
"context"
|
|
|
|
"fmt"
|
|
|
|
"hash/fnv"
|
2021-03-04 19:08:03 +00:00
|
|
|
"io"
|
2020-07-15 14:56:03 +00:00
|
|
|
"net/http"
|
|
|
|
"time"
|
|
|
|
|
|
|
|
"github.com/cenkalti/backoff/v4"
|
2020-08-17 16:04:03 +00:00
|
|
|
"github.com/traefik/paerser/file"
|
|
|
|
ptypes "github.com/traefik/paerser/types"
|
2020-09-16 13:46:04 +00:00
|
|
|
"github.com/traefik/traefik/v2/pkg/config/dynamic"
|
|
|
|
"github.com/traefik/traefik/v2/pkg/job"
|
|
|
|
"github.com/traefik/traefik/v2/pkg/log"
|
|
|
|
"github.com/traefik/traefik/v2/pkg/provider"
|
|
|
|
"github.com/traefik/traefik/v2/pkg/safe"
|
|
|
|
"github.com/traefik/traefik/v2/pkg/tls"
|
|
|
|
"github.com/traefik/traefik/v2/pkg/types"
|
2020-07-15 14:56:03 +00:00
|
|
|
)
|
|
|
|
|
|
|
|
var _ provider.Provider = (*Provider)(nil)
|
|
|
|
|
|
|
|
// Provider is a provider.Provider implementation that queries an HTTP(s) endpoint for a configuration.
|
|
|
|
type Provider struct {
|
2020-10-30 11:44:05 +00:00
|
|
|
Endpoint string `description:"Load configuration from this endpoint." json:"endpoint" toml:"endpoint" yaml:"endpoint"`
|
|
|
|
PollInterval ptypes.Duration `description:"Polling interval for endpoint." json:"pollInterval,omitempty" toml:"pollInterval,omitempty" yaml:"pollInterval,omitempty" export:"true"`
|
|
|
|
PollTimeout ptypes.Duration `description:"Polling timeout for endpoint." json:"pollTimeout,omitempty" toml:"pollTimeout,omitempty" yaml:"pollTimeout,omitempty" export:"true"`
|
2020-07-15 14:56:03 +00:00
|
|
|
TLS *types.ClientTLS `description:"Enable TLS support." json:"tls,omitempty" toml:"tls,omitempty" yaml:"tls,omitempty" export:"true"`
|
|
|
|
httpClient *http.Client
|
|
|
|
lastConfigurationHash uint64
|
|
|
|
}
|
|
|
|
|
|
|
|
// SetDefaults sets the default values.
|
|
|
|
func (p *Provider) SetDefaults() {
|
2020-08-17 16:04:03 +00:00
|
|
|
p.PollInterval = ptypes.Duration(5 * time.Second)
|
|
|
|
p.PollTimeout = ptypes.Duration(5 * time.Second)
|
2020-07-15 14:56:03 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Init the provider.
|
|
|
|
func (p *Provider) Init() error {
|
|
|
|
if p.Endpoint == "" {
|
|
|
|
return fmt.Errorf("non-empty endpoint is required")
|
|
|
|
}
|
|
|
|
|
|
|
|
if p.PollInterval <= 0 {
|
|
|
|
return fmt.Errorf("poll interval must be greater than 0")
|
|
|
|
}
|
|
|
|
|
|
|
|
p.httpClient = &http.Client{
|
|
|
|
Timeout: time.Duration(p.PollTimeout),
|
|
|
|
}
|
|
|
|
|
|
|
|
if p.TLS != nil {
|
|
|
|
tlsConfig, err := p.TLS.CreateTLSConfig(context.Background())
|
|
|
|
if err != nil {
|
2021-10-26 08:54:11 +00:00
|
|
|
return fmt.Errorf("unable to create client TLS configuration: %w", err)
|
2020-07-15 14:56:03 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
p.httpClient.Transport = &http.Transport{
|
|
|
|
TLSClientConfig: tlsConfig,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// Provide allows the provider to provide configurations to traefik using the given configuration channel.
|
|
|
|
func (p *Provider) Provide(configurationChan chan<- dynamic.Message, pool *safe.Pool) error {
|
|
|
|
pool.GoCtx(func(routineCtx context.Context) {
|
|
|
|
ctxLog := log.With(routineCtx, log.Str(log.ProviderName, "http"))
|
|
|
|
logger := log.FromContext(ctxLog)
|
|
|
|
|
|
|
|
operation := func() error {
|
2022-06-24 10:34:08 +00:00
|
|
|
if err := p.updateConfiguration(configurationChan); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2020-07-15 14:56:03 +00:00
|
|
|
ticker := time.NewTicker(time.Duration(p.PollInterval))
|
|
|
|
defer ticker.Stop()
|
|
|
|
|
|
|
|
for {
|
|
|
|
select {
|
|
|
|
case <-ticker.C:
|
2022-06-24 10:34:08 +00:00
|
|
|
if err := p.updateConfiguration(configurationChan); err != nil {
|
|
|
|
return err
|
2020-07-15 14:56:03 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
case <-routineCtx.Done():
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
notify := func(err error, time time.Duration) {
|
|
|
|
logger.Errorf("Provider connection error %+v, retrying in %s", err, time)
|
|
|
|
}
|
|
|
|
err := backoff.RetryNotify(safe.OperationWithRecover(operation), backoff.WithContext(job.NewBackOff(backoff.NewExponentialBackOff()), ctxLog), notify)
|
|
|
|
if err != nil {
|
|
|
|
logger.Errorf("Cannot connect to server endpoint %+v", err)
|
|
|
|
}
|
|
|
|
})
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2022-06-24 10:34:08 +00:00
|
|
|
func (p *Provider) updateConfiguration(configurationChan chan<- dynamic.Message) error {
|
|
|
|
configData, err := p.fetchConfigurationData()
|
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("cannot fetch configuration data: %w", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
fnvHasher := fnv.New64()
|
|
|
|
|
|
|
|
if _, err = fnvHasher.Write(configData); err != nil {
|
|
|
|
return fmt.Errorf("cannot hash configuration data: %w", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
hash := fnvHasher.Sum64()
|
|
|
|
if hash == p.lastConfigurationHash {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
p.lastConfigurationHash = hash
|
|
|
|
|
|
|
|
configuration, err := decodeConfiguration(configData)
|
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("cannot decode configuration data: %w", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
configurationChan <- dynamic.Message{
|
|
|
|
ProviderName: "http",
|
|
|
|
Configuration: configuration,
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2020-07-15 14:56:03 +00:00
|
|
|
// fetchConfigurationData fetches the configuration data from the configured endpoint.
|
|
|
|
func (p *Provider) fetchConfigurationData() ([]byte, error) {
|
|
|
|
res, err := p.httpClient.Get(p.Endpoint)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
defer res.Body.Close()
|
|
|
|
|
|
|
|
if res.StatusCode != http.StatusOK {
|
|
|
|
return nil, fmt.Errorf("received non-ok response code: %d", res.StatusCode)
|
|
|
|
}
|
|
|
|
|
2021-03-04 19:08:03 +00:00
|
|
|
return io.ReadAll(res.Body)
|
2020-07-15 14:56:03 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// decodeConfiguration decodes and returns the dynamic configuration from the given data.
|
|
|
|
func decodeConfiguration(data []byte) (*dynamic.Configuration, error) {
|
|
|
|
configuration := &dynamic.Configuration{
|
|
|
|
HTTP: &dynamic.HTTPConfiguration{
|
2020-09-11 13:40:03 +00:00
|
|
|
Routers: make(map[string]*dynamic.Router),
|
|
|
|
Middlewares: make(map[string]*dynamic.Middleware),
|
|
|
|
Services: make(map[string]*dynamic.Service),
|
|
|
|
ServersTransports: make(map[string]*dynamic.ServersTransport),
|
2020-07-15 14:56:03 +00:00
|
|
|
},
|
|
|
|
TCP: &dynamic.TCPConfiguration{
|
|
|
|
Routers: make(map[string]*dynamic.TCPRouter),
|
|
|
|
Services: make(map[string]*dynamic.TCPService),
|
|
|
|
},
|
|
|
|
TLS: &dynamic.TLSConfiguration{
|
|
|
|
Stores: make(map[string]tls.Store),
|
|
|
|
Options: make(map[string]tls.Options),
|
|
|
|
},
|
|
|
|
UDP: &dynamic.UDPConfiguration{
|
|
|
|
Routers: make(map[string]*dynamic.UDPRouter),
|
|
|
|
Services: make(map[string]*dynamic.UDPService),
|
|
|
|
},
|
|
|
|
}
|
|
|
|
|
|
|
|
err := file.DecodeContent(string(data), ".yaml", configuration)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
return configuration, nil
|
|
|
|
}
|