2018-11-14 09:18:03 +00:00
|
|
|
package service
|
|
|
|
|
|
|
|
import (
|
|
|
|
"context"
|
2019-08-26 08:30:05 +00:00
|
|
|
"errors"
|
2018-11-14 09:18:03 +00:00
|
|
|
"fmt"
|
2022-09-14 12:42:08 +00:00
|
|
|
"math/rand"
|
2018-11-14 09:18:03 +00:00
|
|
|
"net/http"
|
|
|
|
"net/http/httputil"
|
|
|
|
"net/url"
|
2019-08-26 17:00:04 +00:00
|
|
|
"reflect"
|
2018-11-14 09:18:03 +00:00
|
|
|
"time"
|
|
|
|
|
2019-01-18 14:18:04 +00:00
|
|
|
"github.com/containous/alice"
|
2020-09-16 13:46:04 +00:00
|
|
|
"github.com/traefik/traefik/v2/pkg/config/dynamic"
|
|
|
|
"github.com/traefik/traefik/v2/pkg/config/runtime"
|
|
|
|
"github.com/traefik/traefik/v2/pkg/healthcheck"
|
|
|
|
"github.com/traefik/traefik/v2/pkg/log"
|
|
|
|
"github.com/traefik/traefik/v2/pkg/metrics"
|
|
|
|
"github.com/traefik/traefik/v2/pkg/middlewares/accesslog"
|
|
|
|
"github.com/traefik/traefik/v2/pkg/middlewares/emptybackendhandler"
|
|
|
|
metricsMiddle "github.com/traefik/traefik/v2/pkg/middlewares/metrics"
|
|
|
|
"github.com/traefik/traefik/v2/pkg/middlewares/pipelining"
|
|
|
|
"github.com/traefik/traefik/v2/pkg/safe"
|
|
|
|
"github.com/traefik/traefik/v2/pkg/server/cookie"
|
|
|
|
"github.com/traefik/traefik/v2/pkg/server/provider"
|
2022-03-17 11:02:09 +00:00
|
|
|
"github.com/traefik/traefik/v2/pkg/server/service/loadbalancer/failover"
|
2020-09-16 13:46:04 +00:00
|
|
|
"github.com/traefik/traefik/v2/pkg/server/service/loadbalancer/mirror"
|
|
|
|
"github.com/traefik/traefik/v2/pkg/server/service/loadbalancer/wrr"
|
2022-12-05 10:30:05 +00:00
|
|
|
"github.com/vulcand/oxy/v2/roundrobin"
|
|
|
|
"github.com/vulcand/oxy/v2/roundrobin/stickycookie"
|
2018-11-14 09:18:03 +00:00
|
|
|
)
|
|
|
|
|
|
|
|
const (
|
|
|
|
defaultHealthCheckInterval = 30 * time.Second
|
|
|
|
defaultHealthCheckTimeout = 5 * time.Second
|
|
|
|
|
2024-11-19 13:52:04 +00:00
|
|
|
defaultMaxBodySize int64 = -1
|
|
|
|
)
|
2020-03-05 17:03:08 +00:00
|
|
|
|
2020-09-11 13:40:03 +00:00
|
|
|
// RoundTripperGetter is a roundtripper getter interface.
|
|
|
|
type RoundTripperGetter interface {
|
|
|
|
Get(name string) (http.RoundTripper, error)
|
|
|
|
}
|
|
|
|
|
2024-11-19 13:52:04 +00:00
|
|
|
// ServiceBuilder is a Service builder.
|
|
|
|
type ServiceBuilder interface {
|
|
|
|
BuildHTTP(rootCtx context.Context, serviceName string) (http.Handler, error)
|
|
|
|
}
|
|
|
|
|
2020-05-11 10:06:07 +00:00
|
|
|
// NewManager creates a new Manager.
|
2024-11-19 13:52:04 +00:00
|
|
|
func NewManager(configs map[string]*runtime.ServiceInfo, metricsRegistry metrics.Registry, routinePool *safe.Pool, roundTripperManager RoundTripperGetter, serviceBuilders ...ServiceBuilder) *Manager {
|
2018-11-14 09:18:03 +00:00
|
|
|
return &Manager{
|
2019-08-26 17:00:04 +00:00
|
|
|
routinePool: routinePool,
|
2019-07-18 19:36:05 +00:00
|
|
|
metricsRegistry: metricsRegistry,
|
2018-11-14 09:18:03 +00:00
|
|
|
bufferPool: newBufferPool(),
|
2020-09-11 13:40:03 +00:00
|
|
|
roundTripperManager: roundTripperManager,
|
2024-11-19 13:52:04 +00:00
|
|
|
serviceBuilders: serviceBuilders,
|
2019-11-29 11:40:05 +00:00
|
|
|
balancers: make(map[string]healthcheck.Balancers),
|
2018-11-14 09:18:03 +00:00
|
|
|
configs: configs,
|
2022-09-14 12:42:08 +00:00
|
|
|
rand: rand.New(rand.NewSource(time.Now().UnixNano())),
|
2018-11-14 09:18:03 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-05-11 10:06:07 +00:00
|
|
|
// Manager The service manager.
|
2018-11-14 09:18:03 +00:00
|
|
|
type Manager struct {
|
2019-08-26 17:00:04 +00:00
|
|
|
routinePool *safe.Pool
|
2019-07-18 19:36:05 +00:00
|
|
|
metricsRegistry metrics.Registry
|
2018-11-14 09:18:03 +00:00
|
|
|
bufferPool httputil.BufferPool
|
2020-09-11 13:40:03 +00:00
|
|
|
roundTripperManager RoundTripperGetter
|
2024-11-19 13:52:04 +00:00
|
|
|
serviceBuilders []ServiceBuilder
|
|
|
|
|
2019-11-29 11:40:05 +00:00
|
|
|
// balancers is the map of all Balancers, keyed by service name.
|
|
|
|
// There is one Balancer per service handler, and there is one service handler per reference to a service
|
|
|
|
// (e.g. if 2 routers refer to the same service name, 2 service handlers are created),
|
|
|
|
// which is why there is not just one Balancer per service name.
|
|
|
|
balancers map[string]healthcheck.Balancers
|
|
|
|
configs map[string]*runtime.ServiceInfo
|
2022-09-14 12:42:08 +00:00
|
|
|
rand *rand.Rand // For the initial shuffling of load-balancers.
|
2018-11-14 09:18:03 +00:00
|
|
|
}
|
|
|
|
|
2019-03-14 08:30:04 +00:00
|
|
|
// BuildHTTP Creates a http.Handler for a service configuration.
|
2020-09-01 16:16:04 +00:00
|
|
|
func (m *Manager) BuildHTTP(rootCtx context.Context, serviceName string) (http.Handler, error) {
|
2018-11-14 09:18:03 +00:00
|
|
|
ctx := log.With(rootCtx, log.Str(log.ServiceName, serviceName))
|
|
|
|
|
2020-01-27 09:40:05 +00:00
|
|
|
serviceName = provider.GetQualifiedName(ctx, serviceName)
|
|
|
|
ctx = provider.AddInContext(ctx, serviceName)
|
2019-01-15 13:28:04 +00:00
|
|
|
|
2024-11-19 13:52:04 +00:00
|
|
|
// Must be before we get configs to handle services without config.
|
|
|
|
for _, builder := range m.serviceBuilders {
|
|
|
|
handler, err := builder.BuildHTTP(rootCtx, serviceName)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
if handler != nil {
|
|
|
|
return handler, nil
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-05-16 08:58:06 +00:00
|
|
|
conf, ok := m.configs[serviceName]
|
|
|
|
if !ok {
|
|
|
|
return nil, fmt.Errorf("the service %q does not exist", serviceName)
|
|
|
|
}
|
|
|
|
|
2019-08-26 17:00:04 +00:00
|
|
|
value := reflect.ValueOf(*conf.Service)
|
|
|
|
var count int
|
2024-02-19 14:44:03 +00:00
|
|
|
for i := range value.NumField() {
|
2019-08-26 17:00:04 +00:00
|
|
|
if !value.Field(i).IsNil() {
|
|
|
|
count++
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if count > 1 {
|
2019-09-13 18:00:06 +00:00
|
|
|
err := errors.New("cannot create service: multi-types service not supported, consider declaring two different pieces of service instead")
|
|
|
|
conf.AddError(err, true)
|
|
|
|
return nil, err
|
2019-08-26 08:30:05 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
var lb http.Handler
|
|
|
|
|
|
|
|
switch {
|
|
|
|
case conf.LoadBalancer != nil:
|
|
|
|
var err error
|
2020-09-01 16:16:04 +00:00
|
|
|
lb, err = m.getLoadBalancerServiceHandler(ctx, serviceName, conf.LoadBalancer)
|
2019-08-26 08:30:05 +00:00
|
|
|
if err != nil {
|
|
|
|
conf.AddError(err, true)
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
case conf.Weighted != nil:
|
|
|
|
var err error
|
2020-09-01 16:16:04 +00:00
|
|
|
lb, err = m.getWRRServiceHandler(ctx, serviceName, conf.Weighted)
|
2019-08-26 08:30:05 +00:00
|
|
|
if err != nil {
|
|
|
|
conf.AddError(err, true)
|
|
|
|
return nil, err
|
|
|
|
}
|
2019-08-26 17:00:04 +00:00
|
|
|
case conf.Mirroring != nil:
|
|
|
|
var err error
|
2020-09-01 16:16:04 +00:00
|
|
|
lb, err = m.getMirrorServiceHandler(ctx, conf.Mirroring)
|
2019-08-26 17:00:04 +00:00
|
|
|
if err != nil {
|
|
|
|
conf.AddError(err, true)
|
|
|
|
return nil, err
|
|
|
|
}
|
2022-03-17 11:02:09 +00:00
|
|
|
case conf.Failover != nil:
|
|
|
|
var err error
|
|
|
|
lb, err = m.getFailoverServiceHandler(ctx, serviceName, conf.Failover)
|
|
|
|
if err != nil {
|
|
|
|
conf.AddError(err, true)
|
|
|
|
return nil, err
|
|
|
|
}
|
2019-08-26 08:30:05 +00:00
|
|
|
default:
|
|
|
|
sErr := fmt.Errorf("the service %q does not have any type defined", serviceName)
|
2019-07-15 15:04:04 +00:00
|
|
|
conf.AddError(sErr, true)
|
|
|
|
return nil, sErr
|
2018-11-14 09:18:03 +00:00
|
|
|
}
|
2019-05-16 08:58:06 +00:00
|
|
|
|
2019-08-26 08:30:05 +00:00
|
|
|
return lb, nil
|
|
|
|
}
|
|
|
|
|
2022-03-17 11:02:09 +00:00
|
|
|
func (m *Manager) getFailoverServiceHandler(ctx context.Context, serviceName string, config *dynamic.Failover) (http.Handler, error) {
|
|
|
|
f := failover.New(config.HealthCheck)
|
|
|
|
|
|
|
|
serviceHandler, err := m.BuildHTTP(ctx, config.Service)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
f.SetHandler(serviceHandler)
|
|
|
|
|
|
|
|
updater, ok := serviceHandler.(healthcheck.StatusUpdater)
|
|
|
|
if !ok {
|
|
|
|
return nil, fmt.Errorf("child service %v of %v not a healthcheck.StatusUpdater (%T)", config.Service, serviceName, serviceHandler)
|
|
|
|
}
|
|
|
|
|
|
|
|
if err := updater.RegisterStatusUpdater(func(up bool) {
|
|
|
|
f.SetHandlerStatus(ctx, up)
|
|
|
|
}); err != nil {
|
|
|
|
return nil, fmt.Errorf("cannot register %v as updater for %v: %w", config.Service, serviceName, err)
|
|
|
|
}
|
|
|
|
|
|
|
|
fallbackHandler, err := m.BuildHTTP(ctx, config.Fallback)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
f.SetFallbackHandler(fallbackHandler)
|
|
|
|
|
|
|
|
// Do not report the health of the fallback handler.
|
|
|
|
if config.HealthCheck == nil {
|
|
|
|
return f, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
fallbackUpdater, ok := fallbackHandler.(healthcheck.StatusUpdater)
|
|
|
|
if !ok {
|
|
|
|
return nil, fmt.Errorf("child service %v of %v not a healthcheck.StatusUpdater (%T)", config.Fallback, serviceName, fallbackHandler)
|
|
|
|
}
|
|
|
|
|
|
|
|
if err := fallbackUpdater.RegisterStatusUpdater(func(up bool) {
|
|
|
|
f.SetFallbackHandlerStatus(ctx, up)
|
|
|
|
}); err != nil {
|
|
|
|
return nil, fmt.Errorf("cannot register %v as updater for %v: %w", config.Fallback, serviceName, err)
|
|
|
|
}
|
|
|
|
|
|
|
|
return f, nil
|
|
|
|
}
|
|
|
|
|
2020-09-01 16:16:04 +00:00
|
|
|
func (m *Manager) getMirrorServiceHandler(ctx context.Context, config *dynamic.Mirroring) (http.Handler, error) {
|
|
|
|
serviceHandler, err := m.BuildHTTP(ctx, config.Service)
|
2019-08-26 17:00:04 +00:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
2020-03-05 17:03:08 +00:00
|
|
|
maxBodySize := defaultMaxBodySize
|
|
|
|
if config.MaxBodySize != nil {
|
|
|
|
maxBodySize = *config.MaxBodySize
|
|
|
|
}
|
2021-06-25 19:08:11 +00:00
|
|
|
handler := mirror.New(serviceHandler, m.routinePool, maxBodySize, config.HealthCheck)
|
2019-08-26 17:00:04 +00:00
|
|
|
for _, mirrorConfig := range config.Mirrors {
|
2020-09-01 16:16:04 +00:00
|
|
|
mirrorHandler, err := m.BuildHTTP(ctx, mirrorConfig.Name)
|
2019-08-26 17:00:04 +00:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
err = handler.AddMirror(mirrorHandler, mirrorConfig.Percent)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return handler, nil
|
|
|
|
}
|
|
|
|
|
2020-09-01 16:16:04 +00:00
|
|
|
func (m *Manager) getWRRServiceHandler(ctx context.Context, serviceName string, config *dynamic.WeightedRoundRobin) (http.Handler, error) {
|
2019-08-26 08:30:05 +00:00
|
|
|
// TODO Handle accesslog and metrics with multiple service name
|
|
|
|
if config.Sticky != nil && config.Sticky.Cookie != nil {
|
|
|
|
config.Sticky.Cookie.Name = cookie.GetName(config.Sticky.Cookie.Name, serviceName)
|
2019-05-16 08:58:06 +00:00
|
|
|
}
|
|
|
|
|
2021-06-25 19:08:11 +00:00
|
|
|
balancer := wrr.New(config.Sticky, config.HealthCheck)
|
2022-09-14 12:42:08 +00:00
|
|
|
for _, service := range shuffle(config.Services, m.rand) {
|
2020-09-01 16:16:04 +00:00
|
|
|
serviceHandler, err := m.BuildHTTP(ctx, service.Name)
|
2019-08-26 08:30:05 +00:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
balancer.AddService(service.Name, serviceHandler, service.Weight)
|
2022-03-17 11:02:09 +00:00
|
|
|
|
2021-06-25 19:08:11 +00:00
|
|
|
if config.HealthCheck == nil {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
|
|
|
childName := service.Name
|
|
|
|
updater, ok := serviceHandler.(healthcheck.StatusUpdater)
|
|
|
|
if !ok {
|
|
|
|
return nil, fmt.Errorf("child service %v of %v not a healthcheck.StatusUpdater (%T)", childName, serviceName, serviceHandler)
|
|
|
|
}
|
|
|
|
|
|
|
|
if err := updater.RegisterStatusUpdater(func(up bool) {
|
|
|
|
balancer.SetStatus(ctx, childName, up)
|
|
|
|
}); err != nil {
|
|
|
|
return nil, fmt.Errorf("cannot register %v as updater for %v: %w", childName, serviceName, err)
|
|
|
|
}
|
|
|
|
|
|
|
|
log.FromContext(ctx).Debugf("Child service %v will update parent %v on status change", childName, serviceName)
|
2019-08-26 08:30:05 +00:00
|
|
|
}
|
2021-06-25 19:08:11 +00:00
|
|
|
|
2019-08-26 08:30:05 +00:00
|
|
|
return balancer, nil
|
2018-11-14 09:18:03 +00:00
|
|
|
}
|
|
|
|
|
2020-09-01 16:16:04 +00:00
|
|
|
func (m *Manager) getLoadBalancerServiceHandler(ctx context.Context, serviceName string, service *dynamic.ServersLoadBalancer) (http.Handler, error) {
|
2019-09-30 16:12:04 +00:00
|
|
|
if service.PassHostHeader == nil {
|
|
|
|
defaultPassHostHeader := true
|
|
|
|
service.PassHostHeader = &defaultPassHostHeader
|
|
|
|
}
|
|
|
|
|
2020-09-11 13:40:03 +00:00
|
|
|
if len(service.ServersTransport) > 0 {
|
|
|
|
service.ServersTransport = provider.GetQualifiedName(ctx, service.ServersTransport)
|
|
|
|
}
|
|
|
|
|
|
|
|
roundTripper, err := m.roundTripperManager.Get(service.ServersTransport)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
fwd, err := buildProxy(service.PassHostHeader, service.ResponseForwarding, roundTripper, m.bufferPool)
|
2018-11-14 09:18:03 +00:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
2019-01-18 14:18:04 +00:00
|
|
|
alHandler := func(next http.Handler) (http.Handler, error) {
|
|
|
|
return accesslog.NewFieldHandler(next, accesslog.ServiceName, serviceName, accesslog.AddServiceFields), nil
|
|
|
|
}
|
2019-07-18 19:36:05 +00:00
|
|
|
chain := alice.New()
|
|
|
|
if m.metricsRegistry != nil && m.metricsRegistry.IsSvcEnabled() {
|
|
|
|
chain = chain.Append(metricsMiddle.WrapServiceHandler(ctx, m.metricsRegistry, serviceName))
|
|
|
|
}
|
2018-11-14 09:18:03 +00:00
|
|
|
|
2019-07-18 19:36:05 +00:00
|
|
|
handler, err := chain.Append(alHandler).Then(pipelining.New(ctx, fwd, "pipelining"))
|
2018-11-14 09:18:03 +00:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
2019-01-18 14:18:04 +00:00
|
|
|
balancer, err := m.getLoadBalancer(ctx, serviceName, service, handler)
|
2018-11-14 09:18:03 +00:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
// TODO rename and checks
|
|
|
|
m.balancers[serviceName] = append(m.balancers[serviceName], balancer)
|
|
|
|
|
|
|
|
// Empty (backend with no servers)
|
|
|
|
return emptybackendhandler.New(balancer), nil
|
|
|
|
}
|
|
|
|
|
2021-06-25 19:08:11 +00:00
|
|
|
// LaunchHealthCheck launches the health checks.
|
2018-11-14 09:18:03 +00:00
|
|
|
func (m *Manager) LaunchHealthCheck() {
|
|
|
|
backendConfigs := make(map[string]*healthcheck.BackendConfig)
|
|
|
|
|
|
|
|
for serviceName, balancers := range m.balancers {
|
|
|
|
ctx := log.With(context.Background(), log.Str(log.ServiceName, serviceName))
|
|
|
|
|
|
|
|
service := m.configs[serviceName].LoadBalancer
|
|
|
|
|
|
|
|
// Health Check
|
2021-06-25 19:08:11 +00:00
|
|
|
hcOpts := buildHealthCheckOptions(ctx, balancers, serviceName, service.HealthCheck)
|
|
|
|
if hcOpts == nil {
|
|
|
|
continue
|
2018-11-14 09:18:03 +00:00
|
|
|
}
|
2021-06-25 19:08:11 +00:00
|
|
|
hcOpts.Transport, _ = m.roundTripperManager.Get(service.ServersTransport)
|
|
|
|
log.FromContext(ctx).Debugf("Setting up healthcheck for service %s with %s", serviceName, *hcOpts)
|
2018-11-14 09:18:03 +00:00
|
|
|
|
2021-06-25 19:08:11 +00:00
|
|
|
backendConfigs[serviceName] = healthcheck.NewBackendConfig(*hcOpts, serviceName)
|
2018-11-14 09:18:03 +00:00
|
|
|
}
|
|
|
|
|
2020-09-26 11:30:03 +00:00
|
|
|
healthcheck.GetHealthCheck(m.metricsRegistry).SetBackendsConfiguration(context.Background(), backendConfigs)
|
2018-11-14 09:18:03 +00:00
|
|
|
}
|
|
|
|
|
2021-06-25 19:08:11 +00:00
|
|
|
func buildHealthCheckOptions(ctx context.Context, lb healthcheck.Balancer, backend string, hc *dynamic.ServerHealthCheck) *healthcheck.Options {
|
2022-06-20 13:40:13 +00:00
|
|
|
if hc == nil {
|
2018-11-14 09:18:03 +00:00
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
logger := log.FromContext(ctx)
|
|
|
|
|
2022-06-20 13:40:13 +00:00
|
|
|
if hc.Path == "" {
|
|
|
|
logger.Errorf("Ignoring heath check configuration for '%s': no path provided", backend)
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2018-11-14 09:18:03 +00:00
|
|
|
interval := defaultHealthCheckInterval
|
|
|
|
if hc.Interval != "" {
|
|
|
|
intervalOverride, err := time.ParseDuration(hc.Interval)
|
2019-02-05 16:10:03 +00:00
|
|
|
switch {
|
|
|
|
case err != nil:
|
2018-11-14 09:18:03 +00:00
|
|
|
logger.Errorf("Illegal health check interval for '%s': %s", backend, err)
|
2019-02-05 16:10:03 +00:00
|
|
|
case intervalOverride <= 0:
|
2018-11-14 09:18:03 +00:00
|
|
|
logger.Errorf("Health check interval smaller than zero for service '%s'", backend)
|
2019-02-05 16:10:03 +00:00
|
|
|
default:
|
2018-11-14 09:18:03 +00:00
|
|
|
interval = intervalOverride
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
timeout := defaultHealthCheckTimeout
|
|
|
|
if hc.Timeout != "" {
|
|
|
|
timeoutOverride, err := time.ParseDuration(hc.Timeout)
|
2019-02-05 16:10:03 +00:00
|
|
|
switch {
|
|
|
|
case err != nil:
|
2018-11-14 09:18:03 +00:00
|
|
|
logger.Errorf("Illegal health check timeout for backend '%s': %s", backend, err)
|
2019-02-05 16:10:03 +00:00
|
|
|
case timeoutOverride <= 0:
|
2018-11-14 09:18:03 +00:00
|
|
|
logger.Errorf("Health check timeout smaller than zero for backend '%s', backend", backend)
|
2019-02-05 16:10:03 +00:00
|
|
|
default:
|
2018-11-14 09:18:03 +00:00
|
|
|
timeout = timeoutOverride
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-02-26 16:28:04 +00:00
|
|
|
followRedirects := true
|
|
|
|
if hc.FollowRedirects != nil {
|
|
|
|
followRedirects = *hc.FollowRedirects
|
|
|
|
}
|
|
|
|
|
2018-11-14 09:18:03 +00:00
|
|
|
return &healthcheck.Options{
|
2020-02-26 16:28:04 +00:00
|
|
|
Scheme: hc.Scheme,
|
|
|
|
Path: hc.Path,
|
2022-08-08 13:22:07 +00:00
|
|
|
Method: hc.Method,
|
2020-02-26 16:28:04 +00:00
|
|
|
Port: hc.Port,
|
|
|
|
Interval: interval,
|
|
|
|
Timeout: timeout,
|
|
|
|
LB: lb,
|
|
|
|
Hostname: hc.Hostname,
|
|
|
|
Headers: hc.Headers,
|
|
|
|
FollowRedirects: followRedirects,
|
2018-11-14 09:18:03 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-06-25 19:08:11 +00:00
|
|
|
func (m *Manager) getLoadBalancer(ctx context.Context, serviceName string, service *dynamic.ServersLoadBalancer, fwd http.Handler) (healthcheck.BalancerStatusHandler, error) {
|
2018-11-14 09:18:03 +00:00
|
|
|
logger := log.FromContext(ctx)
|
2019-06-05 20:18:06 +00:00
|
|
|
logger.Debug("Creating load-balancer")
|
|
|
|
|
|
|
|
var options []roundrobin.LBOption
|
2018-11-14 09:18:03 +00:00
|
|
|
|
|
|
|
var cookieName string
|
2019-08-26 08:30:05 +00:00
|
|
|
if service.Sticky != nil && service.Sticky.Cookie != nil {
|
|
|
|
cookieName = cookie.GetName(service.Sticky.Cookie.Name, serviceName)
|
2020-03-23 10:24:05 +00:00
|
|
|
|
|
|
|
opts := roundrobin.CookieOptions{
|
|
|
|
HTTPOnly: service.Sticky.Cookie.HTTPOnly,
|
|
|
|
Secure: service.Sticky.Cookie.Secure,
|
|
|
|
SameSite: convertSameSite(service.Sticky.Cookie.SameSite),
|
|
|
|
}
|
|
|
|
|
2021-04-29 15:56:03 +00:00
|
|
|
// Sticky Cookie Value
|
|
|
|
cv, err := stickycookie.NewFallbackValue(&stickycookie.RawValue{}, &stickycookie.HashValue{})
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
options = append(options, roundrobin.EnableStickySession(roundrobin.NewStickySessionWithOptions(cookieName, opts).SetCookieValue(cv)))
|
2020-03-23 10:24:05 +00:00
|
|
|
|
2019-06-05 20:18:06 +00:00
|
|
|
logger.Debugf("Sticky session cookie name: %v", cookieName)
|
2018-11-14 09:18:03 +00:00
|
|
|
}
|
|
|
|
|
2019-06-05 20:18:06 +00:00
|
|
|
lb, err := roundrobin.New(fwd, options...)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
2018-11-14 09:18:03 +00:00
|
|
|
}
|
|
|
|
|
2021-06-25 19:08:11 +00:00
|
|
|
lbsu := healthcheck.NewLBStatusUpdater(lb, m.configs[serviceName], service.HealthCheck)
|
2019-05-16 08:58:06 +00:00
|
|
|
if err := m.upsertServers(ctx, lbsu, service.Servers); err != nil {
|
2020-05-11 10:06:07 +00:00
|
|
|
return nil, fmt.Errorf("error configuring load balancer for service %s: %w", serviceName, err)
|
2018-11-14 09:18:03 +00:00
|
|
|
}
|
|
|
|
|
2019-09-18 15:56:05 +00:00
|
|
|
return lbsu, nil
|
2018-11-14 09:18:03 +00:00
|
|
|
}
|
|
|
|
|
2019-07-10 07:26:04 +00:00
|
|
|
func (m *Manager) upsertServers(ctx context.Context, lb healthcheck.BalancerHandler, servers []dynamic.Server) error {
|
2018-11-14 09:18:03 +00:00
|
|
|
logger := log.FromContext(ctx)
|
|
|
|
|
2022-09-14 12:42:08 +00:00
|
|
|
for name, srv := range shuffle(servers, m.rand) {
|
2018-11-14 09:18:03 +00:00
|
|
|
u, err := url.Parse(srv.URL)
|
|
|
|
if err != nil {
|
2020-05-11 10:06:07 +00:00
|
|
|
return fmt.Errorf("error parsing server URL %s: %w", srv.URL, err)
|
2018-11-14 09:18:03 +00:00
|
|
|
}
|
|
|
|
|
2019-06-05 20:18:06 +00:00
|
|
|
logger.WithField(log.ServerName, name).Debugf("Creating server %d %s", name, u)
|
2018-11-14 09:18:03 +00:00
|
|
|
|
2019-06-05 20:18:06 +00:00
|
|
|
if err := lb.UpsertServer(u, roundrobin.Weight(1)); err != nil {
|
2020-05-11 10:06:07 +00:00
|
|
|
return fmt.Errorf("error adding server %s to load balancer: %w", srv.URL, err)
|
2018-11-14 09:18:03 +00:00
|
|
|
}
|
|
|
|
|
2022-08-31 06:24:08 +00:00
|
|
|
// TODO Handle Metrics
|
2018-11-14 09:18:03 +00:00
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
2020-03-23 10:24:05 +00:00
|
|
|
|
|
|
|
func convertSameSite(sameSite string) http.SameSite {
|
|
|
|
switch sameSite {
|
|
|
|
case "none":
|
|
|
|
return http.SameSiteNoneMode
|
|
|
|
case "lax":
|
|
|
|
return http.SameSiteLaxMode
|
|
|
|
case "strict":
|
|
|
|
return http.SameSiteStrictMode
|
|
|
|
default:
|
|
|
|
return 0
|
|
|
|
}
|
|
|
|
}
|
2022-09-14 12:42:08 +00:00
|
|
|
|
|
|
|
func shuffle[T any](values []T, r *rand.Rand) []T {
|
|
|
|
shuffled := make([]T, len(values))
|
|
|
|
copy(shuffled, values)
|
|
|
|
r.Shuffle(len(shuffled), func(i, j int) { shuffled[i], shuffled[j] = shuffled[j], shuffled[i] })
|
|
|
|
|
|
|
|
return shuffled
|
|
|
|
}
|