2019-07-24 07:22:31 +00:00
|
|
|
package loadbalancer
|
|
|
|
|
|
|
|
import (
|
2023-03-31 20:51:27 +00:00
|
|
|
"context"
|
2024-01-02 20:05:36 +00:00
|
|
|
"fmt"
|
2019-07-24 07:22:31 +00:00
|
|
|
"math/rand"
|
2023-03-31 20:51:27 +00:00
|
|
|
"net"
|
2024-01-02 20:05:36 +00:00
|
|
|
"net/url"
|
|
|
|
"os"
|
|
|
|
"strconv"
|
2024-03-19 22:01:36 +00:00
|
|
|
"time"
|
2024-01-02 20:05:36 +00:00
|
|
|
|
|
|
|
"github.com/k3s-io/k3s/pkg/version"
|
|
|
|
http_dialer "github.com/mwitkow/go-http-dialer"
|
2024-01-11 20:26:47 +00:00
|
|
|
"github.com/pkg/errors"
|
|
|
|
"golang.org/x/net/http/httpproxy"
|
2024-01-02 20:05:36 +00:00
|
|
|
"golang.org/x/net/proxy"
|
2023-03-31 20:51:27 +00:00
|
|
|
|
|
|
|
"github.com/sirupsen/logrus"
|
|
|
|
"k8s.io/apimachinery/pkg/util/sets"
|
2024-03-19 22:01:36 +00:00
|
|
|
"k8s.io/apimachinery/pkg/util/wait"
|
2019-07-24 07:22:31 +00:00
|
|
|
)
|
|
|
|
|
2024-01-02 20:05:36 +00:00
|
|
|
var defaultDialer proxy.Dialer = &net.Dialer{}
|
|
|
|
|
2024-01-11 20:26:47 +00:00
|
|
|
// SetHTTPProxy configures a proxy-enabled dialer to be used for all loadbalancer connections,
|
|
|
|
// if the agent has been configured to allow use of a HTTP proxy, and the environment has been configured
|
|
|
|
// to indicate use of a HTTP proxy for the server URL.
|
|
|
|
func SetHTTPProxy(address string) error {
|
2024-01-02 20:05:36 +00:00
|
|
|
// Check if env variable for proxy is set
|
2024-01-11 20:26:47 +00:00
|
|
|
if useProxy, _ := strconv.ParseBool(os.Getenv(version.ProgramUpper + "_AGENT_HTTP_PROXY_ALLOWED")); !useProxy || address == "" {
|
|
|
|
return nil
|
2024-01-02 20:05:36 +00:00
|
|
|
}
|
|
|
|
|
2024-01-11 20:26:47 +00:00
|
|
|
serverURL, err := url.Parse(address)
|
2024-01-02 20:05:36 +00:00
|
|
|
if err != nil {
|
2024-01-11 20:26:47 +00:00
|
|
|
return errors.Wrapf(err, "failed to parse address %s", address)
|
2024-01-02 20:05:36 +00:00
|
|
|
}
|
2024-01-11 20:26:47 +00:00
|
|
|
|
|
|
|
// Call this directly instead of using the cached environment used by http.ProxyFromEnvironment to allow for testing
|
|
|
|
proxyFromEnvironment := httpproxy.FromEnvironment().ProxyFunc()
|
|
|
|
proxyURL, err := proxyFromEnvironment(serverURL)
|
2024-01-02 20:05:36 +00:00
|
|
|
if err != nil {
|
2024-01-11 20:26:47 +00:00
|
|
|
return errors.Wrapf(err, "failed to get proxy for address %s", address)
|
|
|
|
}
|
|
|
|
if proxyURL == nil {
|
|
|
|
logrus.Debug(version.ProgramUpper + "_AGENT_HTTP_PROXY_ALLOWED is true but no proxy is configured for URL " + serverURL.String())
|
|
|
|
return nil
|
2024-01-02 20:05:36 +00:00
|
|
|
}
|
|
|
|
|
2024-01-11 20:26:47 +00:00
|
|
|
dialer, err := proxyDialer(proxyURL)
|
|
|
|
if err != nil {
|
|
|
|
return errors.Wrapf(err, "failed to create proxy dialer for %s", proxyURL)
|
2024-01-02 20:05:36 +00:00
|
|
|
}
|
2024-01-11 20:26:47 +00:00
|
|
|
|
|
|
|
defaultDialer = dialer
|
|
|
|
logrus.Debugf("Using proxy %s for agent connection to %s", proxyURL, serverURL)
|
|
|
|
return nil
|
2024-01-02 20:05:36 +00:00
|
|
|
}
|
2023-03-31 20:51:27 +00:00
|
|
|
|
2019-07-24 07:22:31 +00:00
|
|
|
func (lb *LoadBalancer) setServers(serverAddresses []string) bool {
|
2022-02-16 22:19:58 +00:00
|
|
|
serverAddresses, hasOriginalServer := sortServers(serverAddresses, lb.defaultServerAddress)
|
2019-07-24 07:22:31 +00:00
|
|
|
if len(serverAddresses) == 0 {
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
|
|
|
lb.mutex.Lock()
|
|
|
|
defer lb.mutex.Unlock()
|
|
|
|
|
2023-03-31 20:51:27 +00:00
|
|
|
newAddresses := sets.NewString(serverAddresses...)
|
|
|
|
curAddresses := sets.NewString(lb.ServerAddresses...)
|
|
|
|
if newAddresses.Equal(curAddresses) {
|
2019-07-24 07:22:31 +00:00
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
2023-03-31 20:51:27 +00:00
|
|
|
for addedServer := range newAddresses.Difference(curAddresses) {
|
|
|
|
logrus.Infof("Adding server to load balancer %s: %s", lb.serviceName, addedServer)
|
2024-03-19 22:01:36 +00:00
|
|
|
lb.servers[addedServer] = &server{
|
|
|
|
address: addedServer,
|
|
|
|
connections: make(map[net.Conn]struct{}),
|
|
|
|
healthCheck: func() bool { return true },
|
|
|
|
}
|
2023-03-31 20:51:27 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
for removedServer := range curAddresses.Difference(newAddresses) {
|
|
|
|
server := lb.servers[removedServer]
|
|
|
|
if server != nil {
|
|
|
|
logrus.Infof("Removing server from load balancer %s: %s", lb.serviceName, removedServer)
|
|
|
|
// Defer closing connections until after the new server list has been put into place.
|
|
|
|
// Closing open connections ensures that anything stuck retrying on a stale server is forced
|
|
|
|
// over to a valid endpoint.
|
|
|
|
defer server.closeAll()
|
|
|
|
// Don't delete the default server from the server map, in case we need to fall back to it.
|
|
|
|
if removedServer != lb.defaultServerAddress {
|
|
|
|
delete(lb.servers, removedServer)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-07-24 07:22:31 +00:00
|
|
|
lb.ServerAddresses = serverAddresses
|
|
|
|
lb.randomServers = append([]string{}, lb.ServerAddresses...)
|
|
|
|
rand.Shuffle(len(lb.randomServers), func(i, j int) {
|
|
|
|
lb.randomServers[i], lb.randomServers[j] = lb.randomServers[j], lb.randomServers[i]
|
|
|
|
})
|
|
|
|
if !hasOriginalServer {
|
2022-02-16 22:19:58 +00:00
|
|
|
lb.randomServers = append(lb.randomServers, lb.defaultServerAddress)
|
2019-07-24 07:22:31 +00:00
|
|
|
}
|
|
|
|
lb.currentServerAddress = lb.randomServers[0]
|
|
|
|
lb.nextServerIndex = 1
|
|
|
|
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
|
|
|
|
func (lb *LoadBalancer) nextServer(failedServer string) (string, error) {
|
2024-03-19 22:01:36 +00:00
|
|
|
lb.mutex.RLock()
|
|
|
|
defer lb.mutex.RUnlock()
|
2019-07-24 07:22:31 +00:00
|
|
|
|
|
|
|
if len(lb.randomServers) == 0 {
|
|
|
|
return "", errors.New("No servers in load balancer proxy list")
|
|
|
|
}
|
|
|
|
if len(lb.randomServers) == 1 {
|
|
|
|
return lb.currentServerAddress, nil
|
|
|
|
}
|
|
|
|
if failedServer != lb.currentServerAddress {
|
|
|
|
return lb.currentServerAddress, nil
|
|
|
|
}
|
|
|
|
if lb.nextServerIndex >= len(lb.randomServers) {
|
|
|
|
lb.nextServerIndex = 0
|
|
|
|
}
|
|
|
|
|
|
|
|
lb.currentServerAddress = lb.randomServers[lb.nextServerIndex]
|
|
|
|
lb.nextServerIndex++
|
|
|
|
|
|
|
|
return lb.currentServerAddress, nil
|
|
|
|
}
|
2023-03-31 20:51:27 +00:00
|
|
|
|
2024-01-02 20:05:36 +00:00
|
|
|
// dialContext dials a new connection using the environment's proxy settings, and adds its wrapped connection to the map
|
2023-03-31 20:51:27 +00:00
|
|
|
func (s *server) dialContext(ctx context.Context, network, address string) (net.Conn, error) {
|
2024-01-02 20:05:36 +00:00
|
|
|
conn, err := defaultDialer.Dial(network, address)
|
2023-03-31 20:51:27 +00:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
2024-01-02 20:05:36 +00:00
|
|
|
|
|
|
|
// Wrap the connection and add it to the server's connection map
|
2023-03-31 20:51:27 +00:00
|
|
|
s.mutex.Lock()
|
|
|
|
defer s.mutex.Unlock()
|
|
|
|
|
2024-01-02 20:05:36 +00:00
|
|
|
wrappedConn := &serverConn{server: s, Conn: conn}
|
|
|
|
s.connections[wrappedConn] = struct{}{}
|
|
|
|
return wrappedConn, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// proxyDialer creates a new proxy.Dialer that routes connections through the specified proxy.
|
|
|
|
func proxyDialer(proxyURL *url.URL) (proxy.Dialer, error) {
|
|
|
|
if proxyURL.Scheme == "http" || proxyURL.Scheme == "https" {
|
|
|
|
// Create a new HTTP proxy dialer
|
|
|
|
httpProxyDialer := http_dialer.New(proxyURL)
|
|
|
|
return httpProxyDialer, nil
|
|
|
|
} else if proxyURL.Scheme == "socks5" {
|
|
|
|
// For SOCKS5 proxies, use the proxy package's FromURL
|
|
|
|
return proxy.FromURL(proxyURL, proxy.Direct)
|
|
|
|
}
|
|
|
|
return nil, fmt.Errorf("unsupported proxy scheme: %s", proxyURL.Scheme)
|
2023-03-31 20:51:27 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// closeAll closes all connections to the server, and removes their entries from the map
|
|
|
|
func (s *server) closeAll() {
|
|
|
|
s.mutex.Lock()
|
|
|
|
defer s.mutex.Unlock()
|
|
|
|
|
2024-03-19 22:01:36 +00:00
|
|
|
if l := len(s.connections); l > 0 {
|
|
|
|
logrus.Infof("Closing %d connections to load balancer server %s", len(s.connections), s.address)
|
|
|
|
for conn := range s.connections {
|
|
|
|
// Close the connection in a goroutine so that we don't hold the lock while doing so.
|
|
|
|
go conn.Close()
|
|
|
|
}
|
2023-03-31 20:51:27 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Close removes the connection entry from the server's connection map, and
|
|
|
|
// closes the wrapped connection.
|
|
|
|
func (sc *serverConn) Close() error {
|
|
|
|
sc.server.mutex.Lock()
|
|
|
|
defer sc.server.mutex.Unlock()
|
|
|
|
|
|
|
|
delete(sc.server.connections, sc)
|
|
|
|
return sc.Conn.Close()
|
|
|
|
}
|
2024-03-19 22:01:36 +00:00
|
|
|
|
|
|
|
// SetDefault sets the selected address as the default / fallback address
|
|
|
|
func (lb *LoadBalancer) SetDefault(serverAddress string) {
|
|
|
|
lb.mutex.Lock()
|
|
|
|
defer lb.mutex.Unlock()
|
|
|
|
|
|
|
|
_, hasOriginalServer := sortServers(lb.ServerAddresses, lb.defaultServerAddress)
|
|
|
|
// if the old default server is not currently in use, remove it from the server map
|
|
|
|
if server := lb.servers[lb.defaultServerAddress]; server != nil && !hasOriginalServer {
|
|
|
|
defer server.closeAll()
|
|
|
|
delete(lb.servers, lb.defaultServerAddress)
|
|
|
|
}
|
|
|
|
// if the new default server doesn't have an entry in the map, add one
|
|
|
|
if _, ok := lb.servers[serverAddress]; !ok {
|
|
|
|
lb.servers[serverAddress] = &server{
|
|
|
|
address: serverAddress,
|
|
|
|
healthCheck: func() bool { return true },
|
|
|
|
connections: make(map[net.Conn]struct{}),
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
lb.defaultServerAddress = serverAddress
|
|
|
|
logrus.Infof("Updated load balancer %s default server address -> %s", lb.serviceName, serverAddress)
|
|
|
|
}
|
|
|
|
|
|
|
|
// SetHealthCheck adds a health-check callback to an address, replacing the default no-op function.
|
|
|
|
func (lb *LoadBalancer) SetHealthCheck(address string, healthCheck func() bool) {
|
|
|
|
lb.mutex.Lock()
|
|
|
|
defer lb.mutex.Unlock()
|
|
|
|
|
|
|
|
if server := lb.servers[address]; server != nil {
|
|
|
|
logrus.Debugf("Added health check for load balancer %s: %s", lb.serviceName, address)
|
|
|
|
server.healthCheck = healthCheck
|
|
|
|
} else {
|
|
|
|
logrus.Errorf("Failed to add health check for load balancer %s: no server found for %s", lb.serviceName, address)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// runHealthChecks periodically health-checks all servers. Any servers that fail the health-check will have their
|
|
|
|
// connections closed, to force clients to switch over to a healthy server.
|
|
|
|
func (lb *LoadBalancer) runHealthChecks(ctx context.Context) {
|
2024-05-29 18:17:29 +00:00
|
|
|
previousStatus := map[string]bool{}
|
2024-03-19 22:01:36 +00:00
|
|
|
wait.Until(func() {
|
|
|
|
lb.mutex.RLock()
|
|
|
|
defer lb.mutex.RUnlock()
|
2024-05-29 18:17:29 +00:00
|
|
|
for address, server := range lb.servers {
|
|
|
|
status := server.healthCheck()
|
|
|
|
if status == false && previousStatus[address] == true {
|
|
|
|
// Only close connections when the server transitions from healthy to unhealthy;
|
|
|
|
// we don't want to re-close all the connections every time as we might be ignoring
|
|
|
|
// health checks due to all servers being marked unhealthy.
|
2024-03-19 22:01:36 +00:00
|
|
|
defer server.closeAll()
|
|
|
|
}
|
2024-05-29 18:17:29 +00:00
|
|
|
previousStatus[address] = status
|
2024-03-19 22:01:36 +00:00
|
|
|
}
|
|
|
|
}, time.Second, ctx.Done())
|
|
|
|
logrus.Debugf("Stopped health checking for load balancer %s", lb.serviceName)
|
|
|
|
}
|