Merge pull request #1517 from hashicorp/f-api-pooling

Adds client and transport pooling in the API so we don't leak connections.
This commit is contained in:
James Phillips 2015-12-17 07:56:03 -08:00
commit 3c7945eb13
2 changed files with 54 additions and 21 deletions

View File

@ -13,6 +13,7 @@ import (
"os" "os"
"strconv" "strconv"
"strings" "strings"
"sync"
"time" "time"
"github.com/hashicorp/go-cleanhttp" "github.com/hashicorp/go-cleanhttp"
@ -122,12 +123,28 @@ type Config struct {
Token string Token string
} }
// defaultHttpClient is a shared client instance that is used to prevent apps
// that create multiple clients from opening multiple connections, which would
// leak file descriptors.
var defaultHttpClient = cleanhttp.DefaultClient()
// defaultInsecureTransport is a shared transport that will get injected into
// the defaultHttpClient if the CONSUL_HTTP_SSL_VERIFY environment variable is
// set to true.
var defaultInsecureTransport = func() *http.Transport {
trans := cleanhttp.DefaultTransport()
trans.TLSClientConfig = &tls.Config{
InsecureSkipVerify: true,
}
return trans
}()
// DefaultConfig returns a default configuration for the client // DefaultConfig returns a default configuration for the client
func DefaultConfig() *Config { func DefaultConfig() *Config {
config := &Config{ config := &Config{
Address: "127.0.0.1:8500", Address: "127.0.0.1:8500",
Scheme: "http", Scheme: "http",
HttpClient: cleanhttp.DefaultClient(), HttpClient: defaultHttpClient,
} }
if addr := os.Getenv("CONSUL_HTTP_ADDR"); addr != "" { if addr := os.Getenv("CONSUL_HTTP_ADDR"); addr != "" {
@ -172,11 +189,7 @@ func DefaultConfig() *Config {
} }
if !doVerify { if !doVerify {
config.HttpClient.Transport = &http.Transport{ config.HttpClient.Transport = defaultInsecureTransport
TLSClientConfig: &tls.Config{
InsecureSkipVerify: true,
},
}
} }
} }
@ -188,6 +201,15 @@ type Client struct {
config Config config Config
} }
// unixClients contains a set of shared UNIX socket clients, indexed by address.
// These shared instances are used to prevent apps that create multiple clients
// from opening multiple connections, which would leak file descriptors.
var unixClients = make(map[string]*http.Client)
// unixClientsLock serializes access to the unixClients map, since most users
// would expect NewClient to be thread-safe.
var unixClientsLock sync.Mutex
// NewClient returns a new client // NewClient returns a new client
func NewClient(config *Config) (*Client, error) { func NewClient(config *Config) (*Client, error) {
// bootstrap the config // bootstrap the config
@ -206,14 +228,22 @@ func NewClient(config *Config) (*Client, error) {
} }
if parts := strings.SplitN(config.Address, "unix://", 2); len(parts) == 2 { if parts := strings.SplitN(config.Address, "unix://", 2); len(parts) == 2 {
trans := cleanhttp.DefaultTransport()
trans.Dial = func(_, _ string) (net.Conn, error) {
return net.Dial("unix", parts[1])
}
config.HttpClient = &http.Client{
Transport: trans,
}
config.Address = parts[1] config.Address = parts[1]
unixClientsLock.Lock()
if client, ok := unixClients[config.Address]; ok {
config.HttpClient = client
} else {
trans := cleanhttp.DefaultTransport()
trans.Dial = func(_, _ string) (net.Conn, error) {
return net.Dial("unix", config.Address)
}
config.HttpClient = &http.Client{
Transport: trans,
}
unixClients[config.Address] = config.HttpClient
}
unixClientsLock.Unlock()
} }
client := &Client{ client := &Client{

View File

@ -244,13 +244,16 @@ func TestAPI_UnixSocket(t *testing.T) {
}) })
defer s.Stop() defer s.Stop()
agent := c.Agent() // Run a few iterations to test the path where we use the pooled
// connection.
info, err := agent.Self() for i := 0; i < 3; i++ {
if err != nil { agent := c.Agent()
t.Fatalf("err: %s", err) info, err := agent.Self()
} if err != nil {
if info["Config"]["NodeName"] == "" { t.Fatalf("err: %s", err)
t.Fatalf("bad: %v", info) }
if info["Config"]["NodeName"] == "" {
t.Fatalf("bad: %v", info)
}
} }
} }