|
|
|
@ -13,7 +13,7 @@ use crate::consul;
|
|
|
|
|
|
|
|
|
|
// ---- Extract proxy config from Consul catalog ----
|
|
|
|
|
|
|
|
|
|
#[derive(Debug, Eq, PartialEq, Ord, PartialOrd, Hash)]
|
|
|
|
|
#[derive(Debug, Clone, Eq, PartialEq, Ord, PartialOrd, Hash)]
|
|
|
|
|
pub enum HostDescription {
|
|
|
|
|
Hostname(String),
|
|
|
|
|
Pattern(glob::Pattern),
|
|
|
|
@ -45,12 +45,48 @@ impl std::fmt::Display for HostDescription {
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
#[derive(Debug)]
|
|
|
|
|
pub struct ProxyEntry {
|
|
|
|
|
#[derive(Debug, Clone)]
|
|
|
|
|
pub struct UrlPrefix {
|
|
|
|
|
/// Publicly exposed TLS hostnames for matching this rule
|
|
|
|
|
pub host: HostDescription,
|
|
|
|
|
|
|
|
|
|
/// Path prefix for matching this rule
|
|
|
|
|
pub path_prefix: Option<String>,
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
impl PartialEq for UrlPrefix {
|
|
|
|
|
fn eq(&self, other: &Self) -> bool {
|
|
|
|
|
self.host == other.host && self.path_prefix == other.path_prefix
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
impl Eq for UrlPrefix {}
|
|
|
|
|
|
|
|
|
|
impl UrlPrefix {
|
|
|
|
|
fn new(raw_prefix: &str) -> Option<Self> {
|
|
|
|
|
let (raw_host, path_prefix) = match raw_prefix.find('/') {
|
|
|
|
|
Some(i) => {
|
|
|
|
|
let (host, pp) = raw_prefix.split_at(i);
|
|
|
|
|
(host, Some(pp.to_string()))
|
|
|
|
|
}
|
|
|
|
|
None => (raw_prefix, None),
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
let host = match HostDescription::new(raw_host) {
|
|
|
|
|
Ok(h) => h,
|
|
|
|
|
Err(e) => {
|
|
|
|
|
warn!("Invalid hostname pattern {}: {}", raw_host, e);
|
|
|
|
|
return None;
|
|
|
|
|
}
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
Some(Self { host, path_prefix })
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
#[derive(Debug)]
|
|
|
|
|
pub struct ProxyEntry {
|
|
|
|
|
/// An Url prefix is made of a host and maybe a path prefix
|
|
|
|
|
pub url_prefix: UrlPrefix,
|
|
|
|
|
/// Priority with which this rule is considered (highest first)
|
|
|
|
|
pub priority: u32,
|
|
|
|
|
|
|
|
|
@ -68,6 +104,10 @@ pub struct ProxyEntry {
|
|
|
|
|
/// when matching this rule
|
|
|
|
|
pub add_headers: Vec<(String, String)>,
|
|
|
|
|
|
|
|
|
|
/// Try to match all these redirection before forwarding to the backend
|
|
|
|
|
/// when matching this rule
|
|
|
|
|
pub redirects: Vec<(UrlPrefix, UrlPrefix, u32)>,
|
|
|
|
|
|
|
|
|
|
/// Number of calls in progress, used to deprioritize slow back-ends
|
|
|
|
|
pub calls_in_progress: atomic::AtomicI64,
|
|
|
|
|
/// Time of last call, used for round-robin selection
|
|
|
|
@ -76,8 +116,7 @@ pub struct ProxyEntry {
|
|
|
|
|
|
|
|
|
|
impl PartialEq for ProxyEntry {
|
|
|
|
|
fn eq(&self, other: &Self) -> bool {
|
|
|
|
|
self.host == other.host
|
|
|
|
|
&& self.path_prefix == other.path_prefix
|
|
|
|
|
self.url_prefix == other.url_prefix
|
|
|
|
|
&& self.priority == other.priority
|
|
|
|
|
&& self.service_name == other.service_name
|
|
|
|
|
&& self.target_addr == other.target_addr
|
|
|
|
@ -88,6 +127,58 @@ impl PartialEq for ProxyEntry {
|
|
|
|
|
}
|
|
|
|
|
impl Eq for ProxyEntry {}
|
|
|
|
|
|
|
|
|
|
impl ProxyEntry {
|
|
|
|
|
fn new(
|
|
|
|
|
service_name: String,
|
|
|
|
|
frontend: MatchTag,
|
|
|
|
|
target_addr: SocketAddr,
|
|
|
|
|
middleware: &[ConfigTag],
|
|
|
|
|
flags: ProxyEntryFlags,
|
|
|
|
|
) -> Self {
|
|
|
|
|
let (url_prefix, priority, https_target) = match frontend {
|
|
|
|
|
MatchTag::Http(u, p) => (u, p, false),
|
|
|
|
|
MatchTag::HttpWithTls(u, p) => (u, p, true),
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
let mut add_headers = vec![];
|
|
|
|
|
let mut redirects = vec![];
|
|
|
|
|
for mid in middleware.into_iter() {
|
|
|
|
|
match mid {
|
|
|
|
|
ConfigTag::AddHeader(k, v) => add_headers.push((k.to_string(), v.to_string())),
|
|
|
|
|
ConfigTag::AddRedirect(m, r, c) => redirects.push(((*m).clone(), (*r).clone(), *c)),
|
|
|
|
|
ConfigTag::LocalLb =>
|
|
|
|
|
/* handled in parent fx */
|
|
|
|
|
{
|
|
|
|
|
()
|
|
|
|
|
}
|
|
|
|
|
ConfigTag::GlobalLb =>
|
|
|
|
|
/* handled in parent fx */
|
|
|
|
|
{
|
|
|
|
|
()
|
|
|
|
|
}
|
|
|
|
|
};
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
ProxyEntry {
|
|
|
|
|
// id
|
|
|
|
|
service_name,
|
|
|
|
|
// frontend
|
|
|
|
|
url_prefix,
|
|
|
|
|
priority,
|
|
|
|
|
// backend
|
|
|
|
|
target_addr,
|
|
|
|
|
https_target,
|
|
|
|
|
// middleware
|
|
|
|
|
flags,
|
|
|
|
|
add_headers,
|
|
|
|
|
redirects,
|
|
|
|
|
// internal
|
|
|
|
|
last_call: atomic::AtomicI64::from(0),
|
|
|
|
|
calls_in_progress: atomic::AtomicI64::from(0),
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
#[derive(Debug, Clone, Copy, Eq, PartialEq)]
|
|
|
|
|
pub struct ProxyEntryFlags {
|
|
|
|
|
/// Is the target healthy?
|
|
|
|
@ -115,8 +206,8 @@ impl std::fmt::Display for ProxyEntry {
|
|
|
|
|
write!(
|
|
|
|
|
f,
|
|
|
|
|
"{}{} {}",
|
|
|
|
|
self.host,
|
|
|
|
|
self.path_prefix.as_deref().unwrap_or_default(),
|
|
|
|
|
self.url_prefix.host,
|
|
|
|
|
self.url_prefix.path_prefix.as_deref().unwrap_or_default(),
|
|
|
|
|
self.priority
|
|
|
|
|
)?;
|
|
|
|
|
if !self.flags.healthy {
|
|
|
|
@ -144,62 +235,103 @@ pub struct ProxyConfig {
|
|
|
|
|
pub entries: Vec<ProxyEntry>,
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
fn parse_tricot_tag(
|
|
|
|
|
service_name: String,
|
|
|
|
|
tag: &str,
|
|
|
|
|
target_addr: SocketAddr,
|
|
|
|
|
add_headers: &[(String, String)],
|
|
|
|
|
flags: ProxyEntryFlags,
|
|
|
|
|
) -> Option<ProxyEntry> {
|
|
|
|
|
let splits = tag.split(' ').collect::<Vec<_>>();
|
|
|
|
|
if (splits.len() != 2 && splits.len() != 3)
|
|
|
|
|
|| (splits[0] != "tricot" && splits[0] != "tricot-https")
|
|
|
|
|
{
|
|
|
|
|
return None;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
let (host, path_prefix) = match splits[1].find('/') {
|
|
|
|
|
Some(i) => {
|
|
|
|
|
let (host, pp) = splits[1].split_at(i);
|
|
|
|
|
(host, Some(pp.to_string()))
|
|
|
|
|
}
|
|
|
|
|
None => (splits[1], None),
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
let priority = match splits.len() {
|
|
|
|
|
3 => splits[2].parse().ok()?,
|
|
|
|
|
_ => 100,
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
let host = match HostDescription::new(host) {
|
|
|
|
|
Ok(h) => h,
|
|
|
|
|
Err(e) => {
|
|
|
|
|
warn!("Invalid hostname pattern {}: {}", host, e);
|
|
|
|
|
return None;
|
|
|
|
|
}
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
Some(ProxyEntry {
|
|
|
|
|
service_name,
|
|
|
|
|
target_addr,
|
|
|
|
|
https_target: (splits[0] == "tricot-https"),
|
|
|
|
|
host,
|
|
|
|
|
flags,
|
|
|
|
|
path_prefix,
|
|
|
|
|
priority,
|
|
|
|
|
add_headers: add_headers.to_vec(),
|
|
|
|
|
last_call: atomic::AtomicI64::from(0),
|
|
|
|
|
calls_in_progress: atomic::AtomicI64::from(0),
|
|
|
|
|
})
|
|
|
|
|
#[derive(Debug)]
|
|
|
|
|
enum ParsedTag<'a> {
|
|
|
|
|
Frontend(MatchTag),
|
|
|
|
|
Middleware(ConfigTag<'a>),
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
fn parse_tricot_add_header_tag(tag: &str) -> Option<(String, String)> {
|
|
|
|
|
let splits = tag.splitn(3, ' ').collect::<Vec<_>>();
|
|
|
|
|
if splits.len() == 3 && splits[0] == "tricot-add-header" {
|
|
|
|
|
Some((splits[1].to_string(), splits[2].to_string()))
|
|
|
|
|
} else {
|
|
|
|
|
None
|
|
|
|
|
#[derive(Debug)]
|
|
|
|
|
enum MatchTag {
|
|
|
|
|
/// HTTP backend (plain text)
|
|
|
|
|
Http(UrlPrefix, u32),
|
|
|
|
|
/// HTTPS backend (TLS encrypted)
|
|
|
|
|
HttpWithTls(UrlPrefix, u32),
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
#[derive(Debug)]
|
|
|
|
|
enum ConfigTag<'a> {
|
|
|
|
|
AddHeader(&'a str, &'a str),
|
|
|
|
|
AddRedirect(UrlPrefix, UrlPrefix, u32),
|
|
|
|
|
GlobalLb,
|
|
|
|
|
LocalLb,
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
fn parse_tricot_tags(tag: &str) -> Option<ParsedTag> {
|
|
|
|
|
let splits = tag.splitn(4, ' ').collect::<Vec<_>>();
|
|
|
|
|
let parsed_tag = match splits.as_slice() {
|
|
|
|
|
["tricot", raw_prefix, maybe_priority @ ..] => {
|
|
|
|
|
// priority is set to 100 when value is invalid or missing
|
|
|
|
|
let priority: u32 = maybe_priority
|
|
|
|
|
.iter()
|
|
|
|
|
.next()
|
|
|
|
|
.map_or(Ok(100), |x| x.parse::<u32>())
|
|
|
|
|
.unwrap_or(100);
|
|
|
|
|
UrlPrefix::new(raw_prefix)
|
|
|
|
|
.map(|prefix| ParsedTag::Frontend(MatchTag::Http(prefix, priority)))
|
|
|
|
|
}
|
|
|
|
|
["tricot-https", raw_prefix, maybe_priority @ ..] => {
|
|
|
|
|
// priority is set to 100 when value is invalid or missing
|
|
|
|
|
let priority: u32 = maybe_priority
|
|
|
|
|
.iter()
|
|
|
|
|
.next()
|
|
|
|
|
.map_or(Ok(100), |x| x.parse::<u32>())
|
|
|
|
|
.unwrap_or(100);
|
|
|
|
|
UrlPrefix::new(raw_prefix)
|
|
|
|
|
.map(|prefix| ParsedTag::Frontend(MatchTag::HttpWithTls(prefix, priority)))
|
|
|
|
|
}
|
|
|
|
|
["tricot-add-header", header_key, header_value] => Some(ParsedTag::Middleware(
|
|
|
|
|
ConfigTag::AddHeader(header_key, header_value),
|
|
|
|
|
)),
|
|
|
|
|
["tricot-add-redirect", raw_match, raw_replace, maybe_raw_code @ ..] => {
|
|
|
|
|
let (p_match, p_replace) =
|
|
|
|
|
match (UrlPrefix::new(raw_match), UrlPrefix::new(raw_replace)) {
|
|
|
|
|
(Some(m), Some(r)) => (m, r),
|
|
|
|
|
_ => {
|
|
|
|
|
debug!(
|
|
|
|
|
"tag {} is ignored, one of the url prefix can't be parsed",
|
|
|
|
|
tag
|
|
|
|
|
);
|
|
|
|
|
return None;
|
|
|
|
|
}
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
if matches!(p_replace.host, HostDescription::Pattern(_)) {
|
|
|
|
|
debug!(
|
|
|
|
|
"tag {} ignored as redirect to a glob pattern is not supported",
|
|
|
|
|
tag
|
|
|
|
|
);
|
|
|
|
|
return None;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
let maybe_parsed_code = maybe_raw_code
|
|
|
|
|
.iter()
|
|
|
|
|
.next()
|
|
|
|
|
.map(|c| c.parse::<u32>().ok())
|
|
|
|
|
.flatten();
|
|
|
|
|
let http_code = match maybe_parsed_code {
|
|
|
|
|
Some(301) => 301,
|
|
|
|
|
Some(302) => 302,
|
|
|
|
|
_ => {
|
|
|
|
|
debug!(
|
|
|
|
|
"tag {} has a missing or invalid http code, set it to 302",
|
|
|
|
|
tag
|
|
|
|
|
);
|
|
|
|
|
302
|
|
|
|
|
}
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
Some(ParsedTag::Middleware(ConfigTag::AddRedirect(
|
|
|
|
|
p_match, p_replace, http_code,
|
|
|
|
|
)))
|
|
|
|
|
}
|
|
|
|
|
["tricot-global-lb", ..] => Some(ParsedTag::Middleware(ConfigTag::GlobalLb)),
|
|
|
|
|
["tricot-local-lb", ..] => Some(ParsedTag::Middleware(ConfigTag::LocalLb)),
|
|
|
|
|
_ => None,
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
trace!("tag {} parsed as {:?}", tag, parsed_tag);
|
|
|
|
|
parsed_tag
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
fn parse_consul_service(
|
|
|
|
@ -208,8 +340,6 @@ fn parse_consul_service(
|
|
|
|
|
) -> Vec<ProxyEntry> {
|
|
|
|
|
trace!("Parsing service: {:#?}", s);
|
|
|
|
|
|
|
|
|
|
let mut entries = vec![];
|
|
|
|
|
|
|
|
|
|
let ip_addr = match s.service.address.parse() {
|
|
|
|
|
Ok(ip) => ip,
|
|
|
|
|
_ => match s.node.address.parse() {
|
|
|
|
@ -225,30 +355,47 @@ fn parse_consul_service(
|
|
|
|
|
};
|
|
|
|
|
let addr = SocketAddr::new(ip_addr, s.service.port);
|
|
|
|
|
|
|
|
|
|
if s.service.tags.contains(&"tricot-global-lb".into()) {
|
|
|
|
|
flags.global_lb = true;
|
|
|
|
|
} else if s.service.tags.contains(&"tricot-site-lb".into()) {
|
|
|
|
|
flags.site_lb = true;
|
|
|
|
|
// tag parsing
|
|
|
|
|
let mut collected_middleware = vec![];
|
|
|
|
|
let mut collected_frontends = vec![];
|
|
|
|
|
for tag in s.service.tags.iter() {
|
|
|
|
|
match parse_tricot_tags(tag) {
|
|
|
|
|
Some(ParsedTag::Frontend(x)) => collected_frontends.push(x),
|
|
|
|
|
Some(ParsedTag::Middleware(y)) => collected_middleware.push(y),
|
|
|
|
|
_ => trace!(
|
|
|
|
|
"service {}: tag '{}' could not be parsed",
|
|
|
|
|
s.service.service,
|
|
|
|
|
tag
|
|
|
|
|
),
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
// some legacy processing that would need a refactor later
|
|
|
|
|
for mid in collected_middleware.iter() {
|
|
|
|
|
match mid {
|
|
|
|
|
ConfigTag::AddHeader(_, _) | ConfigTag::AddRedirect(_, _, _) =>
|
|
|
|
|
/* not handled here */
|
|
|
|
|
{
|
|
|
|
|
()
|
|
|
|
|
}
|
|
|
|
|
ConfigTag::GlobalLb => flags.global_lb = true,
|
|
|
|
|
ConfigTag::LocalLb => flags.site_lb = true,
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
let mut add_headers = vec![];
|
|
|
|
|
for tag in s.service.tags.iter() {
|
|
|
|
|
if let Some(pair) = parse_tricot_add_header_tag(tag) {
|
|
|
|
|
add_headers.push(pair);
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
for tag in s.service.tags.iter() {
|
|
|
|
|
if let Some(ent) = parse_tricot_tag(
|
|
|
|
|
// build proxy entries
|
|
|
|
|
let entries = collected_frontends
|
|
|
|
|
.into_iter()
|
|
|
|
|
.map(|frt| {
|
|
|
|
|
ProxyEntry::new(
|
|
|
|
|
s.service.service.clone(),
|
|
|
|
|
tag,
|
|
|
|
|
frt,
|
|
|
|
|
addr,
|
|
|
|
|
&add_headers[..],
|
|
|
|
|
collected_middleware.as_ref(),
|
|
|
|
|
flags,
|
|
|
|
|
) {
|
|
|
|
|
entries.push(ent);
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
)
|
|
|
|
|
})
|
|
|
|
|
.collect::<Vec<_>>();
|
|
|
|
|
|
|
|
|
|
trace!("Result of parsing service:");
|
|
|
|
|
for ent in entries.iter() {
|
|
|
|
@ -347,8 +494,8 @@ impl ProxyConfigMetrics {
|
|
|
|
|
let mut patterns = HashMap::new();
|
|
|
|
|
for ent in rx.borrow().entries.iter() {
|
|
|
|
|
let attrs = (
|
|
|
|
|
ent.host.to_string(),
|
|
|
|
|
ent.path_prefix.clone().unwrap_or_default(),
|
|
|
|
|
ent.url_prefix.host.to_string(),
|
|
|
|
|
ent.url_prefix.path_prefix.clone().unwrap_or_default(),
|
|
|
|
|
ent.service_name.clone(),
|
|
|
|
|
);
|
|
|
|
|
*patterns.entry(attrs).or_default() += 1;
|
|
|
|
|