2015-01-14 02:31:27 +03:00
|
|
|
package registry
|
|
|
|
|
|
|
|
import (
|
2016-01-16 23:25:18 +03:00
|
|
|
"crypto/tls"
|
2015-01-14 02:31:27 +03:00
|
|
|
"errors"
|
2015-11-16 15:11:03 +03:00
|
|
|
"fmt"
|
|
|
|
"net"
|
2016-01-16 23:25:18 +03:00
|
|
|
"net/http"
|
|
|
|
"runtime"
|
2016-04-09 23:30:31 +03:00
|
|
|
"sync"
|
2016-01-16 23:25:18 +03:00
|
|
|
"time"
|
2015-01-14 02:31:27 +03:00
|
|
|
|
2015-01-19 22:37:28 +03:00
|
|
|
consul "github.com/hashicorp/consul/api"
|
2016-04-09 23:30:31 +03:00
|
|
|
hash "github.com/mitchellh/hashstructure"
|
2015-01-14 02:31:27 +03:00
|
|
|
)
|
|
|
|
|
2015-05-23 22:04:16 +03:00
|
|
|
type consulRegistry struct {
|
2015-02-15 02:00:47 +03:00
|
|
|
Address string
|
|
|
|
Client *consul.Client
|
2015-12-19 21:28:08 +03:00
|
|
|
Options Options
|
2016-04-09 23:30:31 +03:00
|
|
|
|
|
|
|
sync.Mutex
|
|
|
|
register map[string]uint64
|
2015-05-26 00:14:28 +03:00
|
|
|
}
|
|
|
|
|
2016-01-17 02:39:47 +03:00
|
|
|
func newTransport(config *tls.Config) *http.Transport {
|
|
|
|
if config == nil {
|
|
|
|
config = &tls.Config{
|
|
|
|
InsecureSkipVerify: true,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-01-16 23:25:18 +03:00
|
|
|
t := &http.Transport{
|
|
|
|
Proxy: http.ProxyFromEnvironment,
|
|
|
|
Dial: (&net.Dialer{
|
|
|
|
Timeout: 30 * time.Second,
|
|
|
|
KeepAlive: 30 * time.Second,
|
|
|
|
}).Dial,
|
|
|
|
TLSHandshakeTimeout: 10 * time.Second,
|
2016-01-17 02:39:47 +03:00
|
|
|
TLSClientConfig: config,
|
2016-01-16 23:25:18 +03:00
|
|
|
}
|
|
|
|
runtime.SetFinalizer(&t, func(tr **http.Transport) {
|
|
|
|
(*tr).CloseIdleConnections()
|
|
|
|
})
|
|
|
|
return t
|
|
|
|
}
|
|
|
|
|
2016-03-16 01:20:21 +03:00
|
|
|
func newConsulRegistry(opts ...Option) Registry {
|
|
|
|
var options Options
|
2015-12-19 21:28:08 +03:00
|
|
|
for _, o := range opts {
|
2016-03-16 01:20:21 +03:00
|
|
|
o(&options)
|
2015-12-19 21:28:08 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
// use default config
|
2015-05-23 22:04:16 +03:00
|
|
|
config := consul.DefaultConfig()
|
2016-11-18 00:03:54 +03:00
|
|
|
if options.Context != nil {
|
|
|
|
// Use the consul config passed in the options, if available
|
2016-11-18 10:30:50 +03:00
|
|
|
if c, ok := options.Context.Value("consul_config").(*consul.Config); ok {
|
|
|
|
config = c
|
2016-11-18 00:03:54 +03:00
|
|
|
}
|
|
|
|
}
|
2015-12-19 21:28:08 +03:00
|
|
|
|
|
|
|
// check if there are any addrs
|
2016-03-16 01:20:21 +03:00
|
|
|
if len(options.Addrs) > 0 {
|
|
|
|
addr, port, err := net.SplitHostPort(options.Addrs[0])
|
2015-11-16 15:11:03 +03:00
|
|
|
if ae, ok := err.(*net.AddrError); ok && ae.Err == "missing port in address" {
|
|
|
|
port = "8500"
|
2016-03-16 01:20:21 +03:00
|
|
|
addr = options.Addrs[0]
|
2015-11-16 15:11:03 +03:00
|
|
|
config.Address = fmt.Sprintf("%s:%s", addr, port)
|
|
|
|
} else if err == nil {
|
|
|
|
config.Address = fmt.Sprintf("%s:%s", addr, port)
|
|
|
|
}
|
2015-05-23 22:04:16 +03:00
|
|
|
}
|
2015-12-19 21:28:08 +03:00
|
|
|
|
2016-01-16 23:25:18 +03:00
|
|
|
// requires secure connection?
|
2016-03-16 01:20:21 +03:00
|
|
|
if options.Secure || options.TLSConfig != nil {
|
2017-11-20 10:34:52 +03:00
|
|
|
if config.HttpClient == nil {
|
|
|
|
config.HttpClient = new(http.Client)
|
|
|
|
}
|
|
|
|
|
2016-01-16 23:25:18 +03:00
|
|
|
config.Scheme = "https"
|
|
|
|
// We're going to support InsecureSkipVerify
|
2016-03-16 01:20:21 +03:00
|
|
|
config.HttpClient.Transport = newTransport(options.TLSConfig)
|
2016-01-16 23:25:18 +03:00
|
|
|
}
|
|
|
|
|
2015-12-19 21:28:08 +03:00
|
|
|
// create the client
|
2015-10-26 23:23:57 +03:00
|
|
|
client, _ := consul.NewClient(config)
|
2015-05-23 22:04:16 +03:00
|
|
|
|
2017-11-20 10:34:52 +03:00
|
|
|
// set timeout
|
|
|
|
if options.Timeout > 0 {
|
|
|
|
config.HttpClient.Timeout = options.Timeout
|
|
|
|
}
|
|
|
|
|
2015-05-23 22:04:16 +03:00
|
|
|
cr := &consulRegistry{
|
2016-04-09 23:34:45 +03:00
|
|
|
Address: config.Address,
|
|
|
|
Client: client,
|
|
|
|
Options: options,
|
|
|
|
register: make(map[string]uint64),
|
2015-05-23 22:04:16 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
return cr
|
|
|
|
}
|
|
|
|
|
2015-05-26 00:14:28 +03:00
|
|
|
func (c *consulRegistry) Deregister(s *Service) error {
|
|
|
|
if len(s.Nodes) == 0 {
|
2015-01-14 02:31:27 +03:00
|
|
|
return errors.New("Require at least one node")
|
|
|
|
}
|
2016-01-26 23:44:29 +03:00
|
|
|
|
2016-04-09 23:30:31 +03:00
|
|
|
// delete our hash of the service
|
|
|
|
c.Lock()
|
|
|
|
delete(c.register, s.Name)
|
|
|
|
c.Unlock()
|
|
|
|
|
2016-01-26 23:44:29 +03:00
|
|
|
node := s.Nodes[0]
|
2016-01-27 02:32:27 +03:00
|
|
|
return c.Client.Agent().ServiceDeregister(node.Id)
|
2015-01-14 02:31:27 +03:00
|
|
|
}
|
|
|
|
|
2016-01-27 02:32:27 +03:00
|
|
|
func (c *consulRegistry) Register(s *Service, opts ...RegisterOption) error {
|
2015-05-26 00:14:28 +03:00
|
|
|
if len(s.Nodes) == 0 {
|
2015-01-14 02:31:27 +03:00
|
|
|
return errors.New("Require at least one node")
|
|
|
|
}
|
|
|
|
|
2016-01-27 02:32:27 +03:00
|
|
|
var options RegisterOptions
|
|
|
|
for _, o := range opts {
|
|
|
|
o(&options)
|
|
|
|
}
|
|
|
|
|
2016-04-09 23:30:31 +03:00
|
|
|
// create hash of service; uint64
|
|
|
|
h, err := hash.Hash(s, nil)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
// use first node
|
2015-05-26 00:14:28 +03:00
|
|
|
node := s.Nodes[0]
|
|
|
|
|
2016-04-09 23:30:31 +03:00
|
|
|
// get existing hash
|
|
|
|
c.Lock()
|
|
|
|
v, ok := c.register[s.Name]
|
|
|
|
c.Unlock()
|
|
|
|
|
|
|
|
// if it's already registered and matches then just pass the check
|
|
|
|
if ok && v == h {
|
|
|
|
// if the err is nil we're all good, bail out
|
|
|
|
// if not, we don't know what the state is, so full re-register
|
|
|
|
if err := c.Client.Agent().PassTTL("service:"+node.Id, ""); err == nil {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// encode the tags
|
2015-05-27 00:39:48 +03:00
|
|
|
tags := encodeMetadata(node.Metadata)
|
2015-10-11 14:05:20 +03:00
|
|
|
tags = append(tags, encodeEndpoints(s.Endpoints)...)
|
2016-03-29 19:44:46 +03:00
|
|
|
tags = append(tags, encodeVersion(s.Version)...)
|
2015-01-14 02:31:27 +03:00
|
|
|
|
2016-01-27 03:32:16 +03:00
|
|
|
var check *consul.AgentServiceCheck
|
|
|
|
|
2016-04-09 23:30:31 +03:00
|
|
|
// if the TTL is greater than 0 create an associated check
|
2016-01-27 03:32:16 +03:00
|
|
|
if options.TTL > time.Duration(0) {
|
2016-11-25 13:23:37 +03:00
|
|
|
// splay slightly for the watcher?
|
|
|
|
splay := time.Second * 5
|
|
|
|
deregTTL := options.TTL + splay
|
|
|
|
// consul has a minimum timeout on deregistration of 1 minute.
|
|
|
|
if options.TTL < time.Minute {
|
|
|
|
deregTTL = time.Minute + splay
|
|
|
|
}
|
|
|
|
|
2016-01-27 03:32:16 +03:00
|
|
|
check = &consul.AgentServiceCheck{
|
|
|
|
TTL: fmt.Sprintf("%v", options.TTL),
|
2016-11-25 13:23:37 +03:00
|
|
|
DeregisterCriticalServiceAfter: fmt.Sprintf("%v", deregTTL),
|
2016-01-27 03:32:16 +03:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-04-09 23:30:31 +03:00
|
|
|
// register the service
|
2016-01-27 03:15:46 +03:00
|
|
|
if err := c.Client.Agent().ServiceRegister(&consul.AgentServiceRegistration{
|
|
|
|
ID: node.Id,
|
|
|
|
Name: s.Name,
|
|
|
|
Tags: tags,
|
|
|
|
Port: node.Port,
|
2015-05-26 00:14:28 +03:00
|
|
|
Address: node.Address,
|
2016-01-27 03:32:16 +03:00
|
|
|
Check: check,
|
2016-01-27 03:15:46 +03:00
|
|
|
}); err != nil {
|
2016-01-26 23:30:05 +03:00
|
|
|
return err
|
|
|
|
}
|
2015-01-14 02:31:27 +03:00
|
|
|
|
2016-04-09 23:30:31 +03:00
|
|
|
// save our hash of the service
|
|
|
|
c.Lock()
|
|
|
|
c.register[s.Name] = h
|
|
|
|
c.Unlock()
|
|
|
|
|
|
|
|
// if the TTL is 0 we don't mess with the checks
|
2016-01-27 03:32:16 +03:00
|
|
|
if options.TTL == time.Duration(0) {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2016-04-09 23:30:31 +03:00
|
|
|
// pass the healthcheck
|
2016-01-27 03:15:46 +03:00
|
|
|
return c.Client.Agent().PassTTL("service:"+node.Id, "")
|
2015-01-14 02:31:27 +03:00
|
|
|
}
|
|
|
|
|
2015-11-08 04:48:48 +03:00
|
|
|
func (c *consulRegistry) GetService(name string) ([]*Service, error) {
|
2016-08-26 10:36:45 +03:00
|
|
|
rsp, _, err := c.Client.Health().Service(name, "", false, nil)
|
2015-01-14 02:31:27 +03:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
2015-11-08 04:48:48 +03:00
|
|
|
serviceMap := map[string]*Service{}
|
2015-01-14 02:31:27 +03:00
|
|
|
|
|
|
|
for _, s := range rsp {
|
2016-01-27 02:32:27 +03:00
|
|
|
if s.Service.Service != name {
|
2015-01-14 02:31:27 +03:00
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
2016-01-26 23:30:05 +03:00
|
|
|
// version is now a tag
|
2016-01-27 02:32:27 +03:00
|
|
|
version, found := decodeVersion(s.Service.Tags)
|
2016-01-26 23:30:05 +03:00
|
|
|
// service ID is now the node id
|
2016-01-27 02:32:27 +03:00
|
|
|
id := s.Service.ID
|
2016-01-26 23:30:05 +03:00
|
|
|
// key is always the version
|
|
|
|
key := version
|
|
|
|
// address is service address
|
2016-01-27 02:32:27 +03:00
|
|
|
address := s.Service.Address
|
2016-01-26 23:30:05 +03:00
|
|
|
|
2016-04-10 00:19:03 +03:00
|
|
|
// if we can't get the version we bail
|
2016-01-26 23:30:05 +03:00
|
|
|
// use old the old ways
|
|
|
|
if !found {
|
2016-04-10 00:19:03 +03:00
|
|
|
continue
|
2015-11-08 04:48:48 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
svc, ok := serviceMap[key]
|
|
|
|
if !ok {
|
|
|
|
svc = &Service{
|
2016-01-27 02:32:27 +03:00
|
|
|
Endpoints: decodeEndpoints(s.Service.Tags),
|
|
|
|
Name: s.Service.Service,
|
2015-11-08 04:48:48 +03:00
|
|
|
Version: version,
|
|
|
|
}
|
|
|
|
serviceMap[key] = svc
|
|
|
|
}
|
|
|
|
|
2016-08-26 10:36:45 +03:00
|
|
|
var del bool
|
|
|
|
for _, check := range s.Checks {
|
|
|
|
// delete the node if the status is critical
|
|
|
|
if check.Status == "critical" {
|
|
|
|
del = true
|
|
|
|
break
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// if delete then skip the node
|
|
|
|
if del {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
2015-11-08 04:48:48 +03:00
|
|
|
svc.Nodes = append(svc.Nodes, &Node{
|
|
|
|
Id: id,
|
2016-01-26 23:30:05 +03:00
|
|
|
Address: address,
|
2016-01-27 02:32:27 +03:00
|
|
|
Port: s.Service.Port,
|
|
|
|
Metadata: decodeMetadata(s.Service.Tags),
|
2015-01-14 02:31:27 +03:00
|
|
|
})
|
|
|
|
}
|
|
|
|
|
2015-11-08 04:48:48 +03:00
|
|
|
var services []*Service
|
|
|
|
for _, service := range serviceMap {
|
|
|
|
services = append(services, service)
|
|
|
|
}
|
|
|
|
return services, nil
|
2015-01-14 02:31:27 +03:00
|
|
|
}
|
|
|
|
|
2015-05-26 00:14:28 +03:00
|
|
|
func (c *consulRegistry) ListServices() ([]*Service, error) {
|
2015-12-19 21:28:08 +03:00
|
|
|
rsp, _, err := c.Client.Catalog().Services(nil)
|
2015-04-03 01:52:49 +03:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
2015-12-05 04:12:29 +03:00
|
|
|
var services []*Service
|
|
|
|
|
2016-11-18 00:03:54 +03:00
|
|
|
for service := range rsp {
|
2015-05-26 00:14:28 +03:00
|
|
|
services = append(services, &Service{Name: service})
|
2015-04-03 01:52:49 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
return services, nil
|
|
|
|
}
|
|
|
|
|
2015-06-01 20:55:27 +03:00
|
|
|
func (c *consulRegistry) Watch() (Watcher, error) {
|
|
|
|
return newConsulWatcher(c)
|
2015-01-14 02:31:27 +03:00
|
|
|
}
|
2015-12-20 00:56:14 +03:00
|
|
|
|
|
|
|
func (c *consulRegistry) String() string {
|
|
|
|
return "consul"
|
|
|
|
}
|