7e43e5615e
Co-authored-by: Florian Apolloner <apollo13@users.noreply.github.com>
302 lines
7.6 KiB
Go
302 lines
7.6 KiB
Go
package consulcatalog
|
|
|
|
import (
|
|
"context"
|
|
"errors"
|
|
"fmt"
|
|
"net"
|
|
|
|
"github.com/hashicorp/consul/api"
|
|
"github.com/traefik/traefik/v2/pkg/config/dynamic"
|
|
"github.com/traefik/traefik/v2/pkg/config/label"
|
|
"github.com/traefik/traefik/v2/pkg/log"
|
|
"github.com/traefik/traefik/v2/pkg/provider"
|
|
"github.com/traefik/traefik/v2/pkg/provider/constraints"
|
|
)
|
|
|
|
func (p *Provider) buildConfiguration(ctx context.Context, items []itemData, certInfo *connectCert) *dynamic.Configuration {
|
|
configurations := make(map[string]*dynamic.Configuration)
|
|
|
|
for _, item := range items {
|
|
svcName := provider.Normalize(item.Node + "-" + item.Name + "-" + item.ID)
|
|
ctxSvc := log.With(ctx, log.Str(log.ServiceName, svcName))
|
|
|
|
if !p.keepContainer(ctxSvc, item) {
|
|
continue
|
|
}
|
|
|
|
logger := log.FromContext(ctxSvc)
|
|
|
|
confFromLabel, err := label.DecodeConfiguration(item.Labels)
|
|
if err != nil {
|
|
logger.Error(err)
|
|
continue
|
|
}
|
|
|
|
var tcpOrUDP bool
|
|
if len(confFromLabel.TCP.Routers) > 0 || len(confFromLabel.TCP.Services) > 0 {
|
|
tcpOrUDP = true
|
|
|
|
err := p.buildTCPServiceConfiguration(ctxSvc, item, confFromLabel.TCP)
|
|
if err != nil {
|
|
logger.Error(err)
|
|
continue
|
|
}
|
|
|
|
provider.BuildTCPRouterConfiguration(ctxSvc, confFromLabel.TCP)
|
|
}
|
|
|
|
if len(confFromLabel.UDP.Routers) > 0 || len(confFromLabel.UDP.Services) > 0 {
|
|
tcpOrUDP = true
|
|
|
|
err := p.buildUDPServiceConfiguration(ctxSvc, item, confFromLabel.UDP)
|
|
if err != nil {
|
|
logger.Error(err)
|
|
continue
|
|
}
|
|
provider.BuildUDPRouterConfiguration(ctxSvc, confFromLabel.UDP)
|
|
}
|
|
|
|
if tcpOrUDP && len(confFromLabel.HTTP.Routers) == 0 &&
|
|
len(confFromLabel.HTTP.Middlewares) == 0 &&
|
|
len(confFromLabel.HTTP.Services) == 0 {
|
|
configurations[svcName] = confFromLabel
|
|
continue
|
|
}
|
|
|
|
if item.ExtraConf.ConsulCatalog.Connect {
|
|
if confFromLabel.HTTP.ServersTransports == nil {
|
|
confFromLabel.HTTP.ServersTransports = make(map[string]*dynamic.ServersTransport)
|
|
}
|
|
|
|
serversTransportKey := itemServersTransportKey(item)
|
|
if confFromLabel.HTTP.ServersTransports[serversTransportKey] == nil {
|
|
confFromLabel.HTTP.ServersTransports[serversTransportKey] = certInfo.serversTransport(item)
|
|
}
|
|
}
|
|
|
|
err = p.buildServiceConfiguration(ctxSvc, item, confFromLabel.HTTP)
|
|
if err != nil {
|
|
logger.Error(err)
|
|
continue
|
|
}
|
|
|
|
model := struct {
|
|
Name string
|
|
Labels map[string]string
|
|
}{
|
|
Name: item.Name,
|
|
Labels: item.Labels,
|
|
}
|
|
|
|
provider.BuildRouterConfiguration(ctx, confFromLabel.HTTP, provider.Normalize(item.Name), p.defaultRuleTpl, model)
|
|
|
|
configurations[svcName] = confFromLabel
|
|
}
|
|
|
|
return provider.Merge(ctx, configurations)
|
|
}
|
|
|
|
func (p *Provider) keepContainer(ctx context.Context, item itemData) bool {
|
|
logger := log.FromContext(ctx)
|
|
|
|
if !item.ExtraConf.Enable {
|
|
logger.Debug("Filtering disabled item")
|
|
return false
|
|
}
|
|
|
|
if !p.ConnectAware && item.ExtraConf.ConsulCatalog.Connect {
|
|
logger.Debugf("Filtering out Connect aware item, Connect support is not enabled")
|
|
return false
|
|
}
|
|
|
|
matches, err := constraints.MatchTags(item.Tags, p.Constraints)
|
|
if err != nil {
|
|
logger.Errorf("Error matching constraint expressions: %v", err)
|
|
return false
|
|
}
|
|
if !matches {
|
|
logger.Debugf("Container pruned by constraint expressions: %q", p.Constraints)
|
|
return false
|
|
}
|
|
|
|
if item.Status != api.HealthPassing && item.Status != api.HealthWarning {
|
|
logger.Debug("Filtering unhealthy or starting item")
|
|
return false
|
|
}
|
|
|
|
return true
|
|
}
|
|
|
|
func (p *Provider) buildTCPServiceConfiguration(ctx context.Context, item itemData, configuration *dynamic.TCPConfiguration) error {
|
|
if len(configuration.Services) == 0 {
|
|
configuration.Services = make(map[string]*dynamic.TCPService)
|
|
|
|
lb := &dynamic.TCPServersLoadBalancer{}
|
|
lb.SetDefaults()
|
|
|
|
configuration.Services[provider.Normalize(item.Name)] = &dynamic.TCPService{
|
|
LoadBalancer: lb,
|
|
}
|
|
}
|
|
|
|
for name, service := range configuration.Services {
|
|
ctxSvc := log.With(ctx, log.Str(log.ServiceName, name))
|
|
err := p.addServerTCP(ctxSvc, item, service.LoadBalancer)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
func (p *Provider) buildUDPServiceConfiguration(ctx context.Context, item itemData, configuration *dynamic.UDPConfiguration) error {
|
|
if len(configuration.Services) == 0 {
|
|
configuration.Services = make(map[string]*dynamic.UDPService)
|
|
|
|
lb := &dynamic.UDPServersLoadBalancer{}
|
|
|
|
configuration.Services[provider.Normalize(item.Name)] = &dynamic.UDPService{
|
|
LoadBalancer: lb,
|
|
}
|
|
}
|
|
|
|
for name, service := range configuration.Services {
|
|
ctxSvc := log.With(ctx, log.Str(log.ServiceName, name))
|
|
err := p.addServerUDP(ctxSvc, item, service.LoadBalancer)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
func (p *Provider) buildServiceConfiguration(ctx context.Context, item itemData, configuration *dynamic.HTTPConfiguration) error {
|
|
if len(configuration.Services) == 0 {
|
|
configuration.Services = make(map[string]*dynamic.Service)
|
|
|
|
lb := &dynamic.ServersLoadBalancer{}
|
|
lb.SetDefaults()
|
|
|
|
configuration.Services[provider.Normalize(item.Name)] = &dynamic.Service{
|
|
LoadBalancer: lb,
|
|
}
|
|
}
|
|
|
|
for name, service := range configuration.Services {
|
|
ctxSvc := log.With(ctx, log.Str(log.ServiceName, name))
|
|
err := p.addServer(ctxSvc, item, service.LoadBalancer)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
func (p *Provider) addServerTCP(ctx context.Context, item itemData, loadBalancer *dynamic.TCPServersLoadBalancer) error {
|
|
if loadBalancer == nil {
|
|
return errors.New("load-balancer is not defined")
|
|
}
|
|
|
|
var port string
|
|
if len(loadBalancer.Servers) > 0 {
|
|
port = loadBalancer.Servers[0].Port
|
|
}
|
|
|
|
if len(loadBalancer.Servers) == 0 {
|
|
loadBalancer.Servers = []dynamic.TCPServer{{}}
|
|
}
|
|
|
|
if item.Port != "" && port == "" {
|
|
port = item.Port
|
|
}
|
|
loadBalancer.Servers[0].Port = ""
|
|
|
|
if port == "" {
|
|
return errors.New("port is missing")
|
|
}
|
|
|
|
if item.Address == "" {
|
|
return errors.New("address is missing")
|
|
}
|
|
|
|
loadBalancer.Servers[0].Address = net.JoinHostPort(item.Address, port)
|
|
return nil
|
|
}
|
|
|
|
func (p *Provider) addServerUDP(ctx context.Context, item itemData, loadBalancer *dynamic.UDPServersLoadBalancer) error {
|
|
if loadBalancer == nil {
|
|
return errors.New("load-balancer is not defined")
|
|
}
|
|
|
|
if len(loadBalancer.Servers) == 0 {
|
|
loadBalancer.Servers = []dynamic.UDPServer{{}}
|
|
}
|
|
|
|
var port string
|
|
if item.Port != "" {
|
|
port = item.Port
|
|
loadBalancer.Servers[0].Port = ""
|
|
}
|
|
|
|
if port == "" {
|
|
return errors.New("port is missing")
|
|
}
|
|
|
|
if item.Address == "" {
|
|
return errors.New("address is missing")
|
|
}
|
|
|
|
loadBalancer.Servers[0].Address = net.JoinHostPort(item.Address, port)
|
|
return nil
|
|
}
|
|
|
|
func (p *Provider) addServer(ctx context.Context, item itemData, loadBalancer *dynamic.ServersLoadBalancer) error {
|
|
if loadBalancer == nil {
|
|
return errors.New("load-balancer is not defined")
|
|
}
|
|
|
|
var port string
|
|
if len(loadBalancer.Servers) > 0 {
|
|
port = loadBalancer.Servers[0].Port
|
|
}
|
|
|
|
if len(loadBalancer.Servers) == 0 {
|
|
server := dynamic.Server{}
|
|
server.SetDefaults()
|
|
|
|
loadBalancer.Servers = []dynamic.Server{server}
|
|
}
|
|
|
|
if item.Port != "" && port == "" {
|
|
port = item.Port
|
|
}
|
|
loadBalancer.Servers[0].Port = ""
|
|
|
|
if port == "" {
|
|
return errors.New("port is missing")
|
|
}
|
|
|
|
if item.Address == "" {
|
|
return errors.New("address is missing")
|
|
}
|
|
|
|
scheme := loadBalancer.Servers[0].Scheme
|
|
loadBalancer.Servers[0].Scheme = ""
|
|
|
|
if item.ExtraConf.ConsulCatalog.Connect {
|
|
loadBalancer.ServersTransport = itemServersTransportKey(item)
|
|
scheme = "https"
|
|
}
|
|
|
|
loadBalancer.Servers[0].URL = fmt.Sprintf("%s://%s", scheme, net.JoinHostPort(item.Address, port))
|
|
|
|
return nil
|
|
}
|
|
|
|
func itemServersTransportKey(item itemData) string {
|
|
return provider.Normalize("tls-" + item.Namespace + "-" + item.Datacenter + "-" + item.Name)
|
|
}
|