2023-08-11 13:12:13 +00:00
// Copyright (c) HashiCorp, Inc.
// SPDX-License-Identifier: BUSL-1.1
2023-07-17 22:15:22 +00:00
package topology
import (
crand "crypto/rand"
"encoding/hex"
"errors"
"fmt"
"reflect"
"regexp"
"sort"
"github.com/google/go-cmp/cmp"
2023-11-02 19:53:41 +00:00
pbauth "github.com/hashicorp/consul/proto-public/pbauth/v2beta1"
pbcatalog "github.com/hashicorp/consul/proto-public/pbcatalog/v2beta1"
pbmesh "github.com/hashicorp/consul/proto-public/pbmesh/v2beta1"
"github.com/hashicorp/consul/proto-public/pbresource"
2023-07-17 22:15:22 +00:00
"github.com/hashicorp/go-hclog"
2023-11-02 19:53:41 +00:00
"golang.org/x/exp/maps"
"github.com/hashicorp/consul/testing/deployer/util"
2023-07-17 22:15:22 +00:00
)
2023-11-02 19:53:41 +00:00
const DockerPrefix = "cslc" // ConSuLCluster
2023-07-17 22:15:22 +00:00
func Compile ( logger hclog . Logger , raw * Config ) ( * Topology , error ) {
return compile ( logger , raw , nil )
}
func Recompile ( logger hclog . Logger , raw * Config , prev * Topology ) ( * Topology , error ) {
if prev == nil {
return nil , errors . New ( "missing previous topology" )
}
return compile ( logger , raw , prev )
}
func compile ( logger hclog . Logger , raw * Config , prev * Topology ) ( * Topology , error ) {
var id string
if prev == nil {
var err error
id , err = newTopologyID ( )
if err != nil {
return nil , err
}
} else {
id = prev . ID
}
images := DefaultImages ( ) . OverrideWith ( raw . Images )
if images . Consul != "" {
return nil , fmt . Errorf ( "topology.images.consul cannot be set at this level" )
}
if len ( raw . Networks ) == 0 {
return nil , fmt . Errorf ( "topology.networks is empty" )
}
networks := make ( map [ string ] * Network )
for _ , net := range raw . Networks {
if net . DockerName != "" {
return nil , fmt . Errorf ( "network %q should not specify DockerName" , net . Name )
}
if ! IsValidLabel ( net . Name ) {
return nil , fmt . Errorf ( "network name is not valid: %s" , net . Name )
}
if _ , exists := networks [ net . Name ] ; exists {
return nil , fmt . Errorf ( "cannot have two networks with the same name %q" , net . Name )
}
switch net . Type {
case "" :
net . Type = "lan"
case "wan" , "lan" :
default :
return nil , fmt . Errorf ( "network %q has unknown type %q" , net . Name , net . Type )
}
networks [ net . Name ] = net
net . DockerName = DockerPrefix + "-" + net . Name + "-" + id
}
if len ( raw . Clusters ) == 0 {
return nil , fmt . Errorf ( "topology.clusters is empty" )
}
var (
clusters = make ( map [ string ] * Cluster )
nextIndex int // use a global index so any shared networks work properly with assignments
)
foundPeerNames := make ( map [ string ] map [ string ] struct { } )
for _ , c := range raw . Clusters {
if c . Name == "" {
return nil , fmt . Errorf ( "cluster has no name" )
}
foundPeerNames [ c . Name ] = make ( map [ string ] struct { } )
if ! IsValidLabel ( c . Name ) {
return nil , fmt . Errorf ( "cluster name is not valid: %s" , c . Name )
}
if _ , exists := clusters [ c . Name ] ; exists {
return nil , fmt . Errorf ( "cannot have two clusters with the same name %q; use unique names and override the Datacenter field if that's what you want" , c . Name )
}
if c . Datacenter == "" {
c . Datacenter = c . Name
} else {
if ! IsValidLabel ( c . Datacenter ) {
return nil , fmt . Errorf ( "datacenter name is not valid: %s" , c . Datacenter )
}
}
clusters [ c . Name ] = c
if c . NetworkName == "" {
c . NetworkName = c . Name
}
c . Images = images . OverrideWith ( c . Images ) . ChooseConsul ( c . Enterprise )
if _ , ok := networks [ c . NetworkName ] ; ! ok {
return nil , fmt . Errorf ( "cluster %q uses network name %q that does not exist" , c . Name , c . NetworkName )
}
if len ( c . Nodes ) == 0 {
return nil , fmt . Errorf ( "cluster %q has no nodes" , c . Name )
}
2023-11-02 19:53:41 +00:00
if len ( c . Services ) == 0 { // always initialize this regardless of v2-ness, because we might late-enable it below
c . Services = make ( map [ ServiceID ] * pbcatalog . Service )
}
var implicitV2Services bool
if len ( c . Services ) > 0 {
c . EnableV2 = true
for name , svc := range c . Services {
if svc . Workloads != nil {
return nil , fmt . Errorf ( "the workloads field for v2 service %q is not user settable" , name )
}
}
} else {
implicitV2Services = true
}
2023-07-17 22:15:22 +00:00
if c . TLSVolumeName != "" {
return nil , fmt . Errorf ( "user cannot specify the TLSVolumeName field" )
}
tenancies := make ( map [ string ] map [ string ] struct { } )
addTenancy := func ( partition , namespace string ) {
partition = PartitionOrDefault ( partition )
namespace = NamespaceOrDefault ( namespace )
m , ok := tenancies [ partition ]
if ! ok {
m = make ( map [ string ] struct { } )
tenancies [ partition ] = m
}
m [ namespace ] = struct { } { }
}
for _ , ap := range c . Partitions {
addTenancy ( ap . Name , "default" )
for _ , ns := range ap . Namespaces {
addTenancy ( ap . Name , ns )
}
}
for _ , ce := range c . InitialConfigEntries {
addTenancy ( ce . GetPartition ( ) , ce . GetNamespace ( ) )
}
2023-11-02 19:53:41 +00:00
if len ( c . InitialResources ) > 0 {
c . EnableV2 = true
}
for _ , res := range c . InitialResources {
if res . Id . Tenancy == nil {
res . Id . Tenancy = & pbresource . Tenancy { }
}
switch res . Id . Tenancy . PeerName {
case "" , "local" :
default :
return nil , fmt . Errorf ( "resources cannot target non-local peers" )
}
res . Id . Tenancy . Partition = PartitionOrDefault ( res . Id . Tenancy . Partition )
res . Id . Tenancy . Namespace = NamespaceOrDefault ( res . Id . Tenancy . Namespace )
switch {
case util . EqualType ( pbauth . ComputedTrafficPermissionsType , res . Id . GetType ( ) ) ,
util . EqualType ( pbauth . WorkloadIdentityType , res . Id . GetType ( ) ) :
fallthrough
case util . EqualType ( pbmesh . ComputedRoutesType , res . Id . GetType ( ) ) ,
util . EqualType ( pbmesh . ProxyStateTemplateType , res . Id . GetType ( ) ) :
fallthrough
case util . EqualType ( pbcatalog . HealthChecksType , res . Id . GetType ( ) ) ,
util . EqualType ( pbcatalog . HealthStatusType , res . Id . GetType ( ) ) ,
util . EqualType ( pbcatalog . NodeType , res . Id . GetType ( ) ) ,
util . EqualType ( pbcatalog . ServiceEndpointsType , res . Id . GetType ( ) ) ,
util . EqualType ( pbcatalog . WorkloadType , res . Id . GetType ( ) ) :
return nil , fmt . Errorf ( "you should not create a resource of type %q this way" , util . TypeToString ( res . Id . Type ) )
}
addTenancy ( res . Id . Tenancy . Partition , res . Id . Tenancy . Namespace )
}
2023-07-17 22:15:22 +00:00
seenNodes := make ( map [ NodeID ] struct { } )
for _ , n := range c . Nodes {
if n . Name == "" {
return nil , fmt . Errorf ( "cluster %q node has no name" , c . Name )
}
if ! IsValidLabel ( n . Name ) {
return nil , fmt . Errorf ( "node name is not valid: %s" , n . Name )
}
switch n . Kind {
case NodeKindServer , NodeKindClient , NodeKindDataplane :
default :
return nil , fmt . Errorf ( "cluster %q node %q has invalid kind: %s" , c . Name , n . Name , n . Kind )
}
2023-11-02 19:53:41 +00:00
if n . Version == NodeVersionUnknown {
n . Version = NodeVersionV1
}
switch n . Version {
case NodeVersionV1 :
case NodeVersionV2 :
if n . Kind == NodeKindClient {
return nil , fmt . Errorf ( "v2 does not support client agents at this time" )
}
c . EnableV2 = true
default :
return nil , fmt . Errorf ( "cluster %q node %q has invalid version: %s" , c . Name , n . Name , n . Version )
}
2023-07-17 22:15:22 +00:00
n . Partition = PartitionOrDefault ( n . Partition )
if ! IsValidLabel ( n . Partition ) {
return nil , fmt . Errorf ( "node partition is not valid: %s" , n . Partition )
}
addTenancy ( n . Partition , "default" )
if _ , exists := seenNodes [ n . ID ( ) ] ; exists {
return nil , fmt . Errorf ( "cannot have two nodes in the same cluster %q with the same name %q" , c . Name , n . ID ( ) )
}
seenNodes [ n . ID ( ) ] = struct { } { }
if len ( n . usedPorts ) != 0 {
return nil , fmt . Errorf ( "user cannot specify the usedPorts field" )
}
n . usedPorts = make ( map [ int ] int )
exposePort := func ( v int ) bool {
if _ , ok := n . usedPorts [ v ] ; ok {
return false
}
n . usedPorts [ v ] = 0
return true
}
if n . IsAgent ( ) {
// TODO: the ux here is awful; we should be able to examine the topology to guess properly
exposePort ( 8500 )
if n . IsServer ( ) {
exposePort ( 8503 )
} else {
exposePort ( 8502 )
}
}
if n . Index != 0 {
return nil , fmt . Errorf ( "user cannot specify the node index" )
}
n . Index = nextIndex
nextIndex ++
n . Images = c . Images . OverrideWith ( n . Images ) . ChooseNode ( n . Kind )
n . Cluster = c . Name
n . Datacenter = c . Datacenter
n . dockerName = DockerPrefix + "-" + n . Name + "-" + id
if len ( n . Addresses ) == 0 {
n . Addresses = append ( n . Addresses , & Address { Network : c . NetworkName } )
}
var (
numPublic int
numLocal int
)
for _ , addr := range n . Addresses {
if addr . Network == "" {
return nil , fmt . Errorf ( "cluster %q node %q has invalid address" , c . Name , n . Name )
}
if addr . Type != "" {
return nil , fmt . Errorf ( "user cannot specify the address type directly" )
}
net , ok := networks [ addr . Network ]
if ! ok {
return nil , fmt . Errorf ( "cluster %q node %q uses network name %q that does not exist" , c . Name , n . Name , addr . Network )
}
if net . IsPublic ( ) {
numPublic ++
} else if net . IsLocal ( ) {
numLocal ++
}
addr . Type = net . Type
addr . DockerNetworkName = net . DockerName
}
if numLocal == 0 {
return nil , fmt . Errorf ( "cluster %q node %q has no local addresses" , c . Name , n . Name )
}
if numPublic > 1 {
return nil , fmt . Errorf ( "cluster %q node %q has more than one public address" , c . Name , n . Name )
}
2023-11-02 21:49:15 +00:00
if n . IsDataplane ( ) && len ( n . Services ) > 1 {
// Our use of consul-dataplane here is supposed to mimic that
// of consul-k8s, which ultimately has one IP per Service, so
// we introduce the same limitation here.
return nil , fmt . Errorf ( "cluster %q node %q uses dataplane, but has more than one service" , c . Name , n . Name )
}
2023-07-17 22:15:22 +00:00
seenServices := make ( map [ ServiceID ] struct { } )
for _ , svc := range n . Services {
if n . IsAgent ( ) {
// Default to that of the enclosing node.
svc . ID . Partition = n . Partition
}
svc . ID . Normalize ( )
// Denormalize
svc . Node = n
2023-11-02 19:53:41 +00:00
svc . NodeVersion = n . Version
if n . IsV2 ( ) {
svc . Workload = svc . ID . Name + "-" + n . PodName ( )
}
2023-07-17 22:15:22 +00:00
if ! IsValidLabel ( svc . ID . Partition ) {
return nil , fmt . Errorf ( "service partition is not valid: %s" , svc . ID . Partition )
}
if ! IsValidLabel ( svc . ID . Namespace ) {
return nil , fmt . Errorf ( "service namespace is not valid: %s" , svc . ID . Namespace )
}
if ! IsValidLabel ( svc . ID . Name ) {
return nil , fmt . Errorf ( "service name is not valid: %s" , svc . ID . Name )
}
2023-10-03 15:06:50 +00:00
if svc . ID . Partition != n . Partition {
return nil , fmt . Errorf ( "service %s on node %s has mismatched partitions: %s != %s" ,
svc . ID . Name , n . Name , svc . ID . Partition , n . Partition )
}
2023-07-17 22:15:22 +00:00
addTenancy ( svc . ID . Partition , svc . ID . Namespace )
if _ , exists := seenServices [ svc . ID ] ; exists {
return nil , fmt . Errorf ( "cannot have two services on the same node %q in the same cluster %q with the same name %q" , n . ID ( ) , c . Name , svc . ID )
}
seenServices [ svc . ID ] = struct { } { }
if ! svc . DisableServiceMesh && n . IsDataplane ( ) {
if svc . EnvoyPublicListenerPort <= 0 {
if _ , ok := n . usedPorts [ 20000 ] ; ! ok {
// For convenience the FIRST service on a node can get 20000 for free.
svc . EnvoyPublicListenerPort = 20000
} else {
return nil , fmt . Errorf ( "envoy public listener port is required" )
}
}
}
// add all of the service ports
for _ , port := range svc . ports ( ) {
if ok := exposePort ( port ) ; ! ok {
return nil , fmt . Errorf ( "port used more than once on cluster %q node %q: %d" , c . Name , n . ID ( ) , port )
}
}
// TODO(rb): re-expose?
// switch svc.Protocol {
// case "":
// svc.Protocol = "tcp"
// fallthrough
// case "tcp":
// if svc.CheckHTTP != "" {
// return nil, fmt.Errorf("cannot set CheckHTTP for tcp service")
// }
// case "http":
// if svc.CheckTCP != "" {
// return nil, fmt.Errorf("cannot set CheckTCP for tcp service")
// }
// default:
// return nil, fmt.Errorf("service has invalid protocol: %s", svc.Protocol)
// }
2023-11-02 21:49:15 +00:00
defaultUpstream := func ( u * Upstream ) error {
2023-07-17 22:15:22 +00:00
// Default to that of the enclosing service.
if u . Peer == "" {
if u . ID . Partition == "" {
u . ID . Partition = svc . ID . Partition
}
if u . ID . Namespace == "" {
u . ID . Namespace = svc . ID . Namespace
}
} else {
if u . ID . Partition != "" {
u . ID . Partition = "" // irrelevant here; we'll set it to the value of the OTHER side for plumbing purposes in tests
}
u . ID . Namespace = NamespaceOrDefault ( u . ID . Namespace )
foundPeerNames [ c . Name ] [ u . Peer ] = struct { } { }
}
addTenancy ( u . ID . Partition , u . ID . Namespace )
2023-11-02 19:53:41 +00:00
2023-11-02 21:49:15 +00:00
if u . Implied {
if u . PortName == "" {
return fmt . Errorf ( "implicit upstreams must use port names in v2" )
}
} else {
if u . LocalAddress == "" {
// v1 defaults to 127.0.0.1 but v2 does not. Safe to do this generally though.
u . LocalAddress = "127.0.0.1"
}
if u . PortName != "" && n . IsV1 ( ) {
return fmt . Errorf ( "explicit upstreams cannot use port names in v1" )
}
if u . PortName == "" && n . IsV2 ( ) {
// Assume this is a v1->v2 conversion and name it.
u . PortName = "legacy"
}
2023-11-02 19:53:41 +00:00
}
2023-11-02 21:49:15 +00:00
return nil
}
for _ , u := range svc . Upstreams {
if err := defaultUpstream ( u ) ; err != nil {
return nil , err
2023-11-02 19:53:41 +00:00
}
2023-11-02 21:49:15 +00:00
}
if n . IsV2 ( ) {
for _ , u := range svc . ImpliedUpstreams {
u . Implied = true
if err := defaultUpstream ( u ) ; err != nil {
return nil , err
}
}
} else {
if len ( svc . ImpliedUpstreams ) > 0 {
return nil , fmt . Errorf ( "v1 does not support implied upstreams yet" )
2023-11-02 19:53:41 +00:00
}
2023-07-17 22:15:22 +00:00
}
if err := svc . Validate ( ) ; err != nil {
return nil , fmt . Errorf ( "cluster %q node %q service %q is not valid: %w" , c . Name , n . Name , svc . ID . String ( ) , err )
}
2023-11-02 19:53:41 +00:00
2023-11-02 21:49:15 +00:00
if svc . EnableTransparentProxy && ! n . IsDataplane ( ) {
return nil , fmt . Errorf ( "cannot enable tproxy on a non-dataplane node" )
}
2023-11-02 19:53:41 +00:00
if n . IsV2 ( ) {
if implicitV2Services {
svc . V2Services = [ ] string { svc . ID . Name }
var svcPorts [ ] * pbcatalog . ServicePort
2023-11-02 21:49:15 +00:00
for name , cfg := range svc . Ports {
2023-11-02 19:53:41 +00:00
svcPorts = append ( svcPorts , & pbcatalog . ServicePort {
TargetPort : name ,
2023-11-02 21:49:15 +00:00
Protocol : cfg . ActualProtocol ,
2023-11-02 19:53:41 +00:00
} )
}
v2svc := & pbcatalog . Service {
2023-11-02 21:49:15 +00:00
Workloads : & pbcatalog . WorkloadSelector { } ,
Ports : svcPorts ,
2023-11-02 19:53:41 +00:00
}
2023-11-02 21:49:15 +00:00
prev , ok := c . Services [ svc . ID ]
if ! ok {
c . Services [ svc . ID ] = v2svc
prev = v2svc
}
if prev . Workloads == nil {
prev . Workloads = & pbcatalog . WorkloadSelector { }
}
prev . Workloads . Names = append ( prev . Workloads . Names , svc . Workload )
2023-11-02 19:53:41 +00:00
} else {
for _ , name := range svc . V2Services {
v2ID := NewServiceID ( name , svc . ID . Namespace , svc . ID . Partition )
v2svc , ok := c . Services [ v2ID ]
if ! ok {
return nil , fmt . Errorf ( "cluster %q node %q service %q has a v2 service reference that does not exist %q" ,
c . Name , n . Name , svc . ID . String ( ) , name )
}
if v2svc . Workloads == nil {
v2svc . Workloads = & pbcatalog . WorkloadSelector { }
}
v2svc . Workloads . Names = append ( v2svc . Workloads . Names , svc . Workload )
}
}
2023-11-02 21:49:15 +00:00
if svc . WorkloadIdentity == "" {
svc . WorkloadIdentity = svc . ID . Name
2023-11-02 19:53:41 +00:00
}
} else {
if len ( svc . V2Services ) > 0 {
return nil , fmt . Errorf ( "cannot specify v2 services for v1" )
}
2023-11-02 21:49:15 +00:00
if svc . WorkloadIdentity != "" {
2023-11-02 19:53:41 +00:00
return nil , fmt . Errorf ( "cannot specify workload identities for v1" )
}
}
2023-07-17 22:15:22 +00:00
}
}
2023-11-02 21:49:15 +00:00
if err := assignVirtualIPs ( c ) ; err != nil {
return nil , err
}
if c . EnableV2 {
// Populate the VirtualPort field on all implied upstreams.
for _ , n := range c . Nodes {
for _ , svc := range n . Services {
for _ , u := range svc . ImpliedUpstreams {
res , ok := c . Services [ u . ID ]
if ok {
for _ , sp := range res . Ports {
if sp . Protocol == pbcatalog . Protocol_PROTOCOL_MESH {
continue
}
if sp . TargetPort == u . PortName {
u . VirtualPort = sp . VirtualPort
}
}
}
}
}
}
}
2023-07-17 22:15:22 +00:00
// Explode this into the explicit list based on stray references made.
c . Partitions = nil
for ap , nsMap := range tenancies {
p := & Partition {
Name : ap ,
}
for ns := range nsMap {
p . Namespaces = append ( p . Namespaces , ns )
}
sort . Strings ( p . Namespaces )
c . Partitions = append ( c . Partitions , p )
}
sort . Slice ( c . Partitions , func ( i , j int ) bool {
return c . Partitions [ i ] . Name < c . Partitions [ j ] . Name
} )
if ! c . Enterprise {
expect := [ ] * Partition { { Name : "default" , Namespaces : [ ] string { "default" } } }
if ! reflect . DeepEqual ( c . Partitions , expect ) {
2023-08-22 14:46:03 +00:00
return nil , fmt . Errorf ( "cluster %q references non-default partitions or namespaces but is CE" , c . Name )
2023-07-17 22:15:22 +00:00
}
}
}
clusteredPeerings := make ( map [ string ] map [ string ] * PeerCluster ) // local-cluster -> local-peer -> info
addPeerMapEntry := func ( pc PeerCluster ) {
pm , ok := clusteredPeerings [ pc . Name ]
if ! ok {
pm = make ( map [ string ] * PeerCluster )
clusteredPeerings [ pc . Name ] = pm
}
pm [ pc . PeerName ] = & pc
}
for _ , p := range raw . Peerings {
dialingCluster , ok := clusters [ p . Dialing . Name ]
if ! ok {
return nil , fmt . Errorf ( "peering references a dialing cluster that does not exist: %s" , p . Dialing . Name )
}
acceptingCluster , ok := clusters [ p . Accepting . Name ]
if ! ok {
return nil , fmt . Errorf ( "peering references an accepting cluster that does not exist: %s" , p . Accepting . Name )
}
if p . Dialing . Name == p . Accepting . Name {
return nil , fmt . Errorf ( "self peerings are not allowed: %s" , p . Dialing . Name )
}
p . Dialing . Partition = PartitionOrDefault ( p . Dialing . Partition )
p . Accepting . Partition = PartitionOrDefault ( p . Accepting . Partition )
if dialingCluster . Enterprise {
if ! dialingCluster . hasPartition ( p . Dialing . Partition ) {
return nil , fmt . Errorf ( "dialing side of peering cannot reference a partition that does not exist: %s" , p . Dialing . Partition )
}
} else {
if p . Dialing . Partition != "default" {
2023-08-22 14:46:03 +00:00
return nil , fmt . Errorf ( "dialing side of peering cannot reference a partition when CE" )
2023-07-17 22:15:22 +00:00
}
}
if acceptingCluster . Enterprise {
if ! acceptingCluster . hasPartition ( p . Accepting . Partition ) {
return nil , fmt . Errorf ( "accepting side of peering cannot reference a partition that does not exist: %s" , p . Accepting . Partition )
}
} else {
if p . Accepting . Partition != "default" {
2023-08-22 14:46:03 +00:00
return nil , fmt . Errorf ( "accepting side of peering cannot reference a partition when CE" )
2023-07-17 22:15:22 +00:00
}
}
if p . Dialing . PeerName == "" {
p . Dialing . PeerName = "peer-" + p . Accepting . Name + "-" + p . Accepting . Partition
}
if p . Accepting . PeerName == "" {
p . Accepting . PeerName = "peer-" + p . Dialing . Name + "-" + p . Dialing . Partition
}
{ // Ensure the link fields do not have recursive links.
p . Dialing . Link = nil
p . Accepting . Link = nil
// Copy the un-linked data before setting the link
pa := p . Accepting
pd := p . Dialing
p . Accepting . Link = & pd
p . Dialing . Link = & pa
}
addPeerMapEntry ( p . Accepting )
addPeerMapEntry ( p . Dialing )
delete ( foundPeerNames [ p . Accepting . Name ] , p . Accepting . PeerName )
delete ( foundPeerNames [ p . Dialing . Name ] , p . Dialing . PeerName )
}
for cluster , peers := range foundPeerNames {
if len ( peers ) > 0 {
var pretty [ ] string
for name := range peers {
pretty = append ( pretty , name )
}
sort . Strings ( pretty )
return nil , fmt . Errorf ( "cluster[%s] found topology references to peerings that do not exist: %v" , cluster , pretty )
}
}
// after we decoded the peering stuff, we can fill in some computed data in the upstreams
for _ , c := range clusters {
c . Peerings = clusteredPeerings [ c . Name ]
for _ , n := range c . Nodes {
for _ , svc := range n . Services {
for _ , u := range svc . Upstreams {
if u . Peer == "" {
u . Cluster = c . Name
u . Peering = nil
continue
}
remotePeer , ok := c . Peerings [ u . Peer ]
if ! ok {
return nil , fmt . Errorf ( "not possible" )
}
u . Cluster = remotePeer . Link . Name
u . Peering = remotePeer . Link
// this helps in generating fortio assertions; otherwise field is ignored
u . ID . Partition = remotePeer . Link . Partition
}
2023-11-02 21:49:15 +00:00
for _ , u := range svc . ImpliedUpstreams {
if u . Peer == "" {
u . Cluster = c . Name
u . Peering = nil
continue
}
remotePeer , ok := c . Peerings [ u . Peer ]
if ! ok {
return nil , fmt . Errorf ( "not possible" )
}
u . Cluster = remotePeer . Link . Name
u . Peering = remotePeer . Link
// this helps in generating fortio assertions; otherwise field is ignored
u . ID . Partition = remotePeer . Link . Partition
}
2023-07-17 22:15:22 +00:00
}
}
}
t := & Topology {
ID : id ,
Networks : networks ,
Clusters : clusters ,
Images : images ,
Peerings : raw . Peerings ,
}
if prev != nil {
// networks cannot change
if ! sameKeys ( prev . Networks , t . Networks ) {
return nil , fmt . Errorf ( "cannot create or destroy networks" )
}
for _ , newNetwork := range t . Networks {
oldNetwork := prev . Networks [ newNetwork . Name ]
// Carryover
newNetwork . inheritFromExisting ( oldNetwork )
if err := isSame ( oldNetwork , newNetwork ) ; err != nil {
return nil , fmt . Errorf ( "networks cannot change: %w" , err )
}
}
// cannot add or remove an entire cluster
if ! sameKeys ( prev . Clusters , t . Clusters ) {
return nil , fmt . Errorf ( "cannot create or destroy clusters" )
}
for _ , newCluster := range t . Clusters {
oldCluster := prev . Clusters [ newCluster . Name ]
// Carryover
newCluster . inheritFromExisting ( oldCluster )
if newCluster . Name != oldCluster . Name ||
newCluster . NetworkName != oldCluster . NetworkName ||
newCluster . Datacenter != oldCluster . Datacenter ||
newCluster . Enterprise != oldCluster . Enterprise {
return nil , fmt . Errorf ( "cannot edit some cluster fields for %q" , newCluster . Name )
}
// WARN on presence of some things.
if len ( newCluster . InitialConfigEntries ) > 0 {
logger . Warn ( "initial config entries were provided, but are skipped on recompile" )
}
2023-11-02 19:53:41 +00:00
if len ( newCluster . InitialResources ) > 0 {
logger . Warn ( "initial resources were provided, but are skipped on recompile" )
}
2023-07-17 22:15:22 +00:00
// Check NODES
if err := inheritAndValidateNodes ( oldCluster . Nodes , newCluster . Nodes ) ; err != nil {
return nil , fmt . Errorf ( "some immutable aspects of nodes were changed in cluster %q: %w" , newCluster . Name , err )
}
}
}
return t , nil
}
2023-11-02 21:49:15 +00:00
func assignVirtualIPs ( c * Cluster ) error {
lastVIPIndex := 1
for _ , svcData := range c . Services {
lastVIPIndex ++
if lastVIPIndex > 250 {
return fmt . Errorf ( "too many ips using this approach to VIPs" )
}
svcData . VirtualIps = [ ] string {
fmt . Sprintf ( "10.244.0.%d" , lastVIPIndex ) ,
}
// populate virtual ports where we forgot them
var (
usedPorts = make ( map [ uint32 ] struct { } )
next = uint32 ( 8080 )
)
for _ , sp := range svcData . Ports {
if sp . Protocol == pbcatalog . Protocol_PROTOCOL_MESH {
continue
}
if sp . VirtualPort > 0 {
usedPorts [ sp . VirtualPort ] = struct { } { }
}
}
for _ , sp := range svcData . Ports {
if sp . Protocol == pbcatalog . Protocol_PROTOCOL_MESH {
continue
}
if sp . VirtualPort > 0 {
continue
}
RETRY :
attempt := next
next ++
_ , used := usedPorts [ attempt ]
if used {
goto RETRY
}
usedPorts [ attempt ] = struct { } { }
sp . VirtualPort = attempt
}
}
return nil
}
2023-07-17 22:15:22 +00:00
const permutedWarning = "use the disabled node kind if you want to ignore a node"
func inheritAndValidateNodes (
prev , curr [ ] * Node ,
) error {
nodeMap := mapifyNodes ( curr )
for prevIdx , node := range prev {
currNode , ok := nodeMap [ node . ID ( ) ]
if ! ok {
return fmt . Errorf ( "node %q has vanished; " + permutedWarning , node . ID ( ) )
}
// Ensure it hasn't been permuted.
if currNode . Pos != prevIdx {
return fmt . Errorf (
"node %q has been shuffled %d -> %d; " + permutedWarning ,
node . ID ( ) ,
prevIdx ,
currNode . Pos ,
)
}
if currNode . Node . Kind != node . Kind ||
2023-11-02 19:53:41 +00:00
currNode . Node . Version != node . Version ||
2023-07-17 22:15:22 +00:00
currNode . Node . Partition != node . Partition ||
currNode . Node . Name != node . Name ||
currNode . Node . Index != node . Index ||
len ( currNode . Node . Addresses ) != len ( node . Addresses ) ||
! sameKeys ( currNode . Node . usedPorts , node . usedPorts ) {
return fmt . Errorf ( "cannot edit some node fields for %q" , node . ID ( ) )
}
currNode . Node . inheritFromExisting ( node )
for i := 0 ; i < len ( currNode . Node . Addresses ) ; i ++ {
prevAddr := node . Addresses [ i ]
currAddr := currNode . Node . Addresses [ i ]
if prevAddr . Network != currAddr . Network {
return fmt . Errorf ( "addresses were shuffled for node %q" , node . ID ( ) )
}
if prevAddr . Type != currAddr . Type {
return fmt . Errorf ( "cannot edit some address fields for %q" , node . ID ( ) )
}
currAddr . inheritFromExisting ( prevAddr )
}
svcMap := mapifyServices ( currNode . Node . Services )
for _ , svc := range node . Services {
currSvc , ok := svcMap [ svc . ID ]
if ! ok {
continue // service has vanished, this is ok
}
// don't care about index permutation
if currSvc . ID != svc . ID ||
currSvc . Port != svc . Port ||
2023-11-02 19:53:41 +00:00
! maps . Equal ( currSvc . Ports , svc . Ports ) ||
2023-07-17 22:15:22 +00:00
currSvc . EnvoyAdminPort != svc . EnvoyAdminPort ||
currSvc . EnvoyPublicListenerPort != svc . EnvoyPublicListenerPort ||
isSame ( currSvc . Command , svc . Command ) != nil ||
isSame ( currSvc . Env , svc . Env ) != nil {
return fmt . Errorf ( "cannot edit some address fields for %q" , svc . ID )
}
currSvc . inheritFromExisting ( svc )
}
}
return nil
}
func newTopologyID ( ) ( string , error ) {
const n = 16
id := make ( [ ] byte , n )
if _ , err := crand . Read ( id [ : ] ) ; err != nil {
return "" , err
}
return hex . EncodeToString ( id ) [ : n ] , nil
}
// matches valid DNS labels according to RFC 1123, should be at most 63
// characters according to the RFC
var validLabel = regexp . MustCompile ( ` ^[a-zA-Z0-9]([a-zA-Z0-9\-] { 0,61}[a-zA-Z0-9])?$ ` )
// IsValidLabel returns true if the string given is a valid DNS label (RFC 1123).
// Note: the only difference between RFC 1035 and RFC 1123 labels is that in
// RFC 1123 labels can begin with a number.
func IsValidLabel ( name string ) bool {
return validLabel . MatchString ( name )
}
// ValidateLabel is similar to IsValidLabel except it returns an error
// instead of false when name is not a valid DNS label. The error will contain
// reference to what constitutes a valid DNS label.
func ValidateLabel ( name string ) error {
if ! IsValidLabel ( name ) {
return errors . New ( "a valid DNS label must consist of lower case alphanumeric characters or '-', and must start and end with an alphanumeric character" )
}
return nil
}
func isSame ( x , y any ) error {
diff := cmp . Diff ( x , y )
if diff != "" {
return fmt . Errorf ( "values are not equal\n--- expected\n+++ actual\n%v" , diff )
}
return nil
}
func sameKeys [ K comparable , V any ] ( x , y map [ K ] V ) bool {
if len ( x ) != len ( y ) {
return false
}
for kx := range x {
if _ , ok := y [ kx ] ; ! ok {
return false
}
}
return true
}
func mapifyNodes ( nodes [ ] * Node ) map [ NodeID ] nodeWithPosition {
m := make ( map [ NodeID ] nodeWithPosition )
for i , node := range nodes {
m [ node . ID ( ) ] = nodeWithPosition {
Pos : i ,
Node : node ,
}
}
return m
}
type nodeWithPosition struct {
Pos int
Node * Node
}
func mapifyServices ( services [ ] * Service ) map [ ServiceID ] * Service {
m := make ( map [ ServiceID ] * Service )
for _ , svc := range services {
m [ svc . ID ] = svc
}
return m
}