b54c956c5e
Co-authored-by: Julien Salleyron <julien@containo.us>
316 lines
10 KiB
Go
316 lines
10 KiB
Go
package server
|
|
|
|
import (
|
|
"context"
|
|
"crypto/tls"
|
|
"encoding/json"
|
|
"fmt"
|
|
"net/http"
|
|
"reflect"
|
|
"time"
|
|
|
|
"github.com/containous/alice"
|
|
"github.com/containous/mux"
|
|
"github.com/containous/traefik/config"
|
|
"github.com/containous/traefik/log"
|
|
"github.com/containous/traefik/middlewares/accesslog"
|
|
"github.com/containous/traefik/middlewares/requestdecorator"
|
|
"github.com/containous/traefik/middlewares/tracing"
|
|
"github.com/containous/traefik/responsemodifiers"
|
|
"github.com/containous/traefik/server/middleware"
|
|
"github.com/containous/traefik/server/router"
|
|
"github.com/containous/traefik/server/service"
|
|
traefiktls "github.com/containous/traefik/tls"
|
|
"github.com/eapache/channels"
|
|
"github.com/sirupsen/logrus"
|
|
)
|
|
|
|
// loadConfiguration manages dynamically routers, middlewares, servers and TLS configurations
|
|
func (s *Server) loadConfiguration(configMsg config.Message) {
|
|
logger := log.FromContext(log.With(context.Background(), log.Str(log.ProviderName, configMsg.ProviderName)))
|
|
|
|
currentConfigurations := s.currentConfigurations.Get().(config.Configurations)
|
|
|
|
// Copy configurations to new map so we don't change current if LoadConfig fails
|
|
newConfigurations := make(config.Configurations)
|
|
for k, v := range currentConfigurations {
|
|
newConfigurations[k] = v
|
|
}
|
|
newConfigurations[configMsg.ProviderName] = configMsg.Configuration
|
|
|
|
s.metricsRegistry.ConfigReloadsCounter().Add(1)
|
|
|
|
handlers, certificates := s.loadConfig(newConfigurations)
|
|
|
|
s.metricsRegistry.LastConfigReloadSuccessGauge().Set(float64(time.Now().Unix()))
|
|
|
|
for entryPointName, handler := range handlers {
|
|
s.entryPoints[entryPointName].switcher.UpdateHandler(handler)
|
|
}
|
|
|
|
for entryPointName, entryPoint := range s.entryPoints {
|
|
eLogger := logger.WithField(log.EntryPointName, entryPointName)
|
|
if entryPoint.Certs == nil {
|
|
if len(certificates[entryPointName]) > 0 {
|
|
eLogger.Debugf("Cannot configure certificates for the non-TLS %s entryPoint.", entryPointName)
|
|
}
|
|
} else {
|
|
entryPoint.Certs.DynamicCerts.Set(certificates[entryPointName])
|
|
entryPoint.Certs.ResetCache()
|
|
}
|
|
eLogger.Infof("Server configuration reloaded on %s", s.entryPoints[entryPointName].httpServer.Addr)
|
|
}
|
|
|
|
s.currentConfigurations.Set(newConfigurations)
|
|
|
|
for _, listener := range s.configurationListeners {
|
|
listener(*configMsg.Configuration)
|
|
}
|
|
|
|
s.postLoadConfiguration()
|
|
}
|
|
|
|
// loadConfig returns a new gorilla.mux Route from the specified global configuration and the dynamic
|
|
// provider configurations.
|
|
func (s *Server) loadConfig(configurations config.Configurations) (map[string]http.Handler, map[string]map[string]*tls.Certificate) {
|
|
|
|
ctx := context.TODO()
|
|
|
|
conf := mergeConfiguration(configurations)
|
|
handlers := s.applyConfiguration(ctx, conf)
|
|
|
|
// Get new certificates list sorted per entry points
|
|
// Update certificates
|
|
entryPointsCertificates := s.loadHTTPSConfiguration(configurations)
|
|
|
|
return handlers, entryPointsCertificates
|
|
}
|
|
|
|
func (s *Server) applyConfiguration(ctx context.Context, configuration config.Configuration) map[string]http.Handler {
|
|
var entryPoints []string
|
|
for entryPointName := range s.entryPoints {
|
|
entryPoints = append(entryPoints, entryPointName)
|
|
}
|
|
|
|
serviceManager := service.NewManager(configuration.Services, s.defaultRoundTripper)
|
|
middlewaresBuilder := middleware.NewBuilder(configuration.Middlewares, serviceManager)
|
|
responseModifierFactory := responsemodifiers.NewBuilder(configuration.Middlewares)
|
|
|
|
routerManager := router.NewManager(configuration.Routers, serviceManager, middlewaresBuilder, responseModifierFactory)
|
|
|
|
handlers := routerManager.BuildHandlers(ctx, entryPoints)
|
|
|
|
routerHandlers := make(map[string]http.Handler)
|
|
|
|
for _, entryPointName := range entryPoints {
|
|
internalMuxRouter := mux.NewRouter().
|
|
SkipClean(true)
|
|
|
|
ctx = log.With(ctx, log.Str(log.EntryPointName, entryPointName))
|
|
|
|
factory := s.entryPoints[entryPointName].RouteAppenderFactory
|
|
if factory != nil {
|
|
// FIXME remove currentConfigurations
|
|
appender := factory.NewAppender(ctx, middlewaresBuilder, &s.currentConfigurations)
|
|
appender.Append(internalMuxRouter)
|
|
}
|
|
|
|
if h, ok := handlers[entryPointName]; ok {
|
|
internalMuxRouter.NotFoundHandler = h
|
|
} else {
|
|
internalMuxRouter.NotFoundHandler = buildDefaultHTTPRouter()
|
|
}
|
|
|
|
routerHandlers[entryPointName] = internalMuxRouter
|
|
|
|
chain := alice.New()
|
|
|
|
if s.accessLoggerMiddleware != nil {
|
|
chain = chain.Append(accesslog.WrapHandler(s.accessLoggerMiddleware))
|
|
}
|
|
|
|
if s.tracer != nil {
|
|
chain = chain.Append(tracing.WrapEntryPointHandler(ctx, s.tracer, entryPointName))
|
|
}
|
|
|
|
chain = chain.Append(requestdecorator.WrapHandler(s.requestDecorator))
|
|
|
|
handler, err := chain.Then(internalMuxRouter.NotFoundHandler)
|
|
if err != nil {
|
|
log.FromContext(ctx).Error(err)
|
|
continue
|
|
}
|
|
internalMuxRouter.NotFoundHandler = handler
|
|
}
|
|
|
|
return routerHandlers
|
|
}
|
|
|
|
func (s *Server) preLoadConfiguration(configMsg config.Message) {
|
|
s.defaultConfigurationValues(configMsg.Configuration)
|
|
currentConfigurations := s.currentConfigurations.Get().(config.Configurations)
|
|
|
|
logger := log.WithoutContext().WithField(log.ProviderName, configMsg.ProviderName)
|
|
if log.GetLevel() == logrus.DebugLevel {
|
|
jsonConf, _ := json.Marshal(configMsg.Configuration)
|
|
logger.Debugf("Configuration received from provider %s: %s", configMsg.ProviderName, string(jsonConf))
|
|
}
|
|
|
|
if configMsg.Configuration == nil || configMsg.Configuration.Routers == nil && configMsg.Configuration.Services == nil && configMsg.Configuration.Middlewares == nil && configMsg.Configuration.TLS == nil {
|
|
logger.Infof("Skipping empty Configuration for provider %s", configMsg.ProviderName)
|
|
return
|
|
}
|
|
|
|
if reflect.DeepEqual(currentConfigurations[configMsg.ProviderName], configMsg.Configuration) {
|
|
logger.Infof("Skipping same configuration for provider %s", configMsg.ProviderName)
|
|
return
|
|
}
|
|
|
|
providerConfigUpdateCh, ok := s.providerConfigUpdateMap[configMsg.ProviderName]
|
|
if !ok {
|
|
providerConfigUpdateCh = make(chan config.Message)
|
|
s.providerConfigUpdateMap[configMsg.ProviderName] = providerConfigUpdateCh
|
|
s.routinesPool.Go(func(stop chan bool) {
|
|
s.throttleProviderConfigReload(s.providersThrottleDuration, s.configurationValidatedChan, providerConfigUpdateCh, stop)
|
|
})
|
|
}
|
|
|
|
providerConfigUpdateCh <- configMsg
|
|
}
|
|
|
|
func (s *Server) defaultConfigurationValues(configuration *config.Configuration) {
|
|
// FIXME create a config hook
|
|
}
|
|
|
|
func (s *Server) listenConfigurations(stop chan bool) {
|
|
for {
|
|
select {
|
|
case <-stop:
|
|
return
|
|
case configMsg, ok := <-s.configurationValidatedChan:
|
|
if !ok || configMsg.Configuration == nil {
|
|
return
|
|
}
|
|
s.loadConfiguration(configMsg)
|
|
}
|
|
}
|
|
}
|
|
|
|
// throttleProviderConfigReload throttles the configuration reload speed for a single provider.
|
|
// It will immediately publish a new configuration and then only publish the next configuration after the throttle duration.
|
|
// Note that in the case it receives N new configs in the timeframe of the throttle duration after publishing,
|
|
// it will publish the last of the newly received configurations.
|
|
func (s *Server) throttleProviderConfigReload(throttle time.Duration, publish chan<- config.Message, in <-chan config.Message, stop chan bool) {
|
|
ring := channels.NewRingChannel(1)
|
|
defer ring.Close()
|
|
|
|
s.routinesPool.Go(func(stop chan bool) {
|
|
for {
|
|
select {
|
|
case <-stop:
|
|
return
|
|
case nextConfig := <-ring.Out():
|
|
if config, ok := nextConfig.(config.Message); ok {
|
|
publish <- config
|
|
time.Sleep(throttle)
|
|
}
|
|
}
|
|
}
|
|
})
|
|
|
|
for {
|
|
select {
|
|
case <-stop:
|
|
return
|
|
case nextConfig := <-in:
|
|
ring.In() <- nextConfig
|
|
}
|
|
}
|
|
}
|
|
|
|
func (s *Server) postLoadConfiguration() {
|
|
// FIXME metrics
|
|
// if s.metricsRegistry.IsEnabled() {
|
|
// activeConfig := s.currentConfigurations.Get().(config.Configurations)
|
|
// metrics.OnConfigurationUpdate(activeConfig)
|
|
// }
|
|
|
|
// FIXME acme
|
|
// if s.staticConfiguration.ACME == nil || s.leadership == nil || !s.leadership.IsLeader() {
|
|
// return
|
|
// }
|
|
//
|
|
// if s.staticConfiguration.ACME.OnHostRule {
|
|
// currentConfigurations := s.currentConfigurations.Get().(config.Configurations)
|
|
// for _, config := range currentConfigurations {
|
|
// for _, frontend := range config.Frontends {
|
|
//
|
|
// // check if one of the frontend entrypoints is configured with TLS
|
|
// // and is configured with ACME
|
|
// acmeEnabled := false
|
|
// for _, entryPoint := range frontend.EntryPoints {
|
|
// if s.staticConfiguration.ACME.EntryPoint == entryPoint && s.entryPoints[entryPoint].Configuration.TLS != nil {
|
|
// acmeEnabled = true
|
|
// break
|
|
// }
|
|
// }
|
|
//
|
|
// if acmeEnabled {
|
|
// for _, route := range frontend.Routes {
|
|
// rls := rules.Rules{}
|
|
// domains, err := rls.ParseDomains(route.Rule)
|
|
// if err != nil {
|
|
// log.Errorf("Error parsing domains: %v", err)
|
|
// } else if len(domains) == 0 {
|
|
// log.Debugf("No domain parsed in rule %q", route.Rule)
|
|
// } else {
|
|
// s.staticConfiguration.ACME.LoadCertificateForDomains(domains)
|
|
// }
|
|
// }
|
|
// }
|
|
// }
|
|
// }
|
|
// }
|
|
}
|
|
|
|
// loadHTTPSConfiguration add/delete HTTPS certificate managed dynamically
|
|
func (s *Server) loadHTTPSConfiguration(configurations config.Configurations) map[string]map[string]*tls.Certificate {
|
|
var entryPoints []string
|
|
for entryPointName := range s.entryPoints {
|
|
entryPoints = append(entryPoints, entryPointName)
|
|
}
|
|
|
|
newEPCertificates := make(map[string]map[string]*tls.Certificate)
|
|
// Get all certificates
|
|
for _, config := range configurations {
|
|
if config.TLS != nil && len(config.TLS) > 0 {
|
|
traefiktls.SortTLSPerEntryPoints(config.TLS, newEPCertificates, entryPoints)
|
|
}
|
|
}
|
|
return newEPCertificates
|
|
}
|
|
|
|
func buildDefaultHTTPRouter() *mux.Router {
|
|
rt := mux.NewRouter()
|
|
rt.NotFoundHandler = http.HandlerFunc(http.NotFound)
|
|
rt.SkipClean(true)
|
|
return rt
|
|
}
|
|
|
|
func buildDefaultCertificate(defaultCertificate *traefiktls.Certificate) (*tls.Certificate, error) {
|
|
certFile, err := defaultCertificate.CertFile.Read()
|
|
if err != nil {
|
|
return nil, fmt.Errorf("failed to get cert file content: %v", err)
|
|
}
|
|
|
|
keyFile, err := defaultCertificate.KeyFile.Read()
|
|
if err != nil {
|
|
return nil, fmt.Errorf("failed to get key file content: %v", err)
|
|
}
|
|
|
|
cert, err := tls.X509KeyPair(certFile, keyFile)
|
|
if err != nil {
|
|
return nil, fmt.Errorf("failed to load X509 key pair: %v", err)
|
|
}
|
|
return &cert, nil
|
|
}
|