2023-04-10 15:36:59 +00:00
|
|
|
// Copyright (c) HashiCorp, Inc.
|
|
|
|
// SPDX-License-Identifier: MPL-2.0
|
|
|
|
|
2018-01-12 21:58:44 +00:00
|
|
|
package pool
|
2015-06-07 18:50:29 +00:00
|
|
|
|
|
|
|
import (
|
|
|
|
"container/list"
|
|
|
|
"fmt"
|
|
|
|
"io"
|
2018-09-17 21:22:40 +00:00
|
|
|
"log"
|
2015-06-07 18:50:29 +00:00
|
|
|
"net"
|
|
|
|
"net/rpc"
|
|
|
|
"sync"
|
|
|
|
"sync/atomic"
|
|
|
|
"time"
|
|
|
|
|
2018-09-17 21:22:40 +00:00
|
|
|
hclog "github.com/hashicorp/go-hclog"
|
2023-04-17 21:02:05 +00:00
|
|
|
msgpackrpc "github.com/hashicorp/net-rpc-msgpackrpc/v2"
|
2022-04-09 11:22:44 +00:00
|
|
|
"github.com/hashicorp/nomad/helper"
|
2016-10-25 23:05:37 +00:00
|
|
|
"github.com/hashicorp/nomad/helper/tlsutil"
|
2018-01-12 21:58:44 +00:00
|
|
|
"github.com/hashicorp/nomad/nomad/structs"
|
2015-06-07 18:50:29 +00:00
|
|
|
"github.com/hashicorp/yamux"
|
|
|
|
)
|
|
|
|
|
2018-01-12 21:58:44 +00:00
|
|
|
// NewClientCodec returns a new rpc.ClientCodec to be used to make RPC calls.
|
|
|
|
func NewClientCodec(conn io.ReadWriteCloser) rpc.ClientCodec {
|
2020-05-11 18:05:29 +00:00
|
|
|
return msgpackrpc.NewCodecFromHandle(true, true, conn, structs.MsgpackHandle)
|
2018-01-12 21:58:44 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// NewServerCodec returns a new rpc.ServerCodec to be used to handle RPCs.
|
|
|
|
func NewServerCodec(conn io.ReadWriteCloser) rpc.ServerCodec {
|
2020-05-11 18:05:29 +00:00
|
|
|
return msgpackrpc.NewCodecFromHandle(true, true, conn, structs.MsgpackHandle)
|
2018-01-12 21:58:44 +00:00
|
|
|
}
|
|
|
|
|
2015-06-07 18:50:29 +00:00
|
|
|
// streamClient is used to wrap a stream with an RPC client
|
|
|
|
type StreamClient struct {
|
|
|
|
stream net.Conn
|
|
|
|
codec rpc.ClientCodec
|
|
|
|
}
|
|
|
|
|
|
|
|
func (sc *StreamClient) Close() {
|
|
|
|
sc.stream.Close()
|
2020-01-31 20:19:48 +00:00
|
|
|
sc.codec.Close()
|
2015-06-07 18:50:29 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Conn is a pooled connection to a Nomad server
|
|
|
|
type Conn struct {
|
|
|
|
refCount int32
|
|
|
|
shouldClose int32
|
|
|
|
|
|
|
|
addr net.Addr
|
|
|
|
session *yamux.Session
|
2022-08-17 21:57:53 +00:00
|
|
|
lastUsed atomic.Pointer[time.Time]
|
2015-06-07 18:50:29 +00:00
|
|
|
|
|
|
|
pool *ConnPool
|
|
|
|
|
|
|
|
clients *list.List
|
|
|
|
clientLock sync.Mutex
|
|
|
|
}
|
|
|
|
|
2021-06-07 14:22:37 +00:00
|
|
|
// markForUse does all the bookkeeping required to ready a connection for use,
|
|
|
|
// and ensure that active connections don't get reaped.
|
2015-08-15 19:35:18 +00:00
|
|
|
func (c *Conn) markForUse() {
|
2022-08-17 21:57:53 +00:00
|
|
|
now := time.Now()
|
|
|
|
c.lastUsed.Store(&now)
|
2015-08-15 19:35:18 +00:00
|
|
|
atomic.AddInt32(&c.refCount, 1)
|
|
|
|
}
|
|
|
|
|
2021-06-07 14:22:37 +00:00
|
|
|
// releaseUse is the complement of `markForUse`, to free up the reference count
|
|
|
|
func (c *Conn) releaseUse() {
|
|
|
|
refCount := atomic.AddInt32(&c.refCount, -1)
|
|
|
|
if refCount == 0 && atomic.LoadInt32(&c.shouldClose) == 1 {
|
|
|
|
c.Close()
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-06-07 18:50:29 +00:00
|
|
|
func (c *Conn) Close() error {
|
|
|
|
return c.session.Close()
|
|
|
|
}
|
|
|
|
|
|
|
|
// getClient is used to get a cached or new client
|
2020-01-31 20:21:39 +00:00
|
|
|
func (c *Conn) getRPCClient() (*StreamClient, error) {
|
2015-06-07 18:50:29 +00:00
|
|
|
// Check for cached client
|
|
|
|
c.clientLock.Lock()
|
|
|
|
front := c.clients.Front()
|
|
|
|
if front != nil {
|
|
|
|
c.clients.Remove(front)
|
|
|
|
}
|
|
|
|
c.clientLock.Unlock()
|
|
|
|
if front != nil {
|
|
|
|
return front.Value.(*StreamClient), nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// Open a new session
|
|
|
|
stream, err := c.session.Open()
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
2020-01-31 20:21:39 +00:00
|
|
|
if _, err := stream.Write([]byte{byte(RpcNomad)}); err != nil {
|
|
|
|
stream.Close()
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
2015-06-07 18:50:29 +00:00
|
|
|
// Create a client codec
|
2015-11-16 02:27:02 +00:00
|
|
|
codec := NewClientCodec(stream)
|
2015-06-07 18:50:29 +00:00
|
|
|
|
|
|
|
// Return a new stream client
|
|
|
|
sc := &StreamClient{
|
|
|
|
stream: stream,
|
|
|
|
codec: codec,
|
|
|
|
}
|
|
|
|
return sc, nil
|
|
|
|
}
|
|
|
|
|
2018-02-07 02:51:34 +00:00
|
|
|
// returnClient is used when done with a stream
|
2015-06-07 18:50:29 +00:00
|
|
|
// to allow re-use by a future RPC
|
|
|
|
func (c *Conn) returnClient(client *StreamClient) {
|
|
|
|
didSave := false
|
|
|
|
c.clientLock.Lock()
|
|
|
|
if c.clients.Len() < c.pool.maxStreams && atomic.LoadInt32(&c.shouldClose) == 0 {
|
|
|
|
c.clients.PushFront(client)
|
|
|
|
didSave = true
|
2015-11-28 01:24:21 +00:00
|
|
|
|
|
|
|
// If this is a Yamux stream, shrink the internal buffers so that
|
|
|
|
// we can GC the idle memory
|
|
|
|
if ys, ok := client.stream.(*yamux.Stream); ok {
|
|
|
|
ys.Shrink()
|
|
|
|
}
|
2015-06-07 18:50:29 +00:00
|
|
|
}
|
|
|
|
c.clientLock.Unlock()
|
|
|
|
if !didSave {
|
|
|
|
client.Close()
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-06-07 14:22:37 +00:00
|
|
|
func (c *Conn) IsClosed() bool {
|
|
|
|
return c.session.IsClosed()
|
|
|
|
}
|
|
|
|
|
|
|
|
func (c *Conn) AcceptStream() (net.Conn, error) {
|
|
|
|
s, err := c.session.AcceptStream()
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
c.markForUse()
|
|
|
|
return &incomingStream{
|
|
|
|
Stream: s,
|
|
|
|
parent: c,
|
|
|
|
}, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// incomingStream wraps yamux.Stream but frees the underlying yamux.Session
|
|
|
|
// when closed
|
|
|
|
type incomingStream struct {
|
|
|
|
*yamux.Stream
|
|
|
|
|
|
|
|
parent *Conn
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s *incomingStream) Close() error {
|
|
|
|
err := s.Stream.Close()
|
|
|
|
|
|
|
|
// always release parent even if error
|
|
|
|
s.parent.releaseUse()
|
|
|
|
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2015-06-07 18:50:29 +00:00
|
|
|
// ConnPool is used to maintain a connection pool to other
|
|
|
|
// Nomad servers. This is used to reduce the latency of
|
|
|
|
// RPC requests between servers. It is only used to pool
|
|
|
|
// connections in the rpcNomad mode. Raft connections
|
|
|
|
// are pooled separately.
|
|
|
|
type ConnPool struct {
|
|
|
|
sync.Mutex
|
|
|
|
|
2018-09-17 21:22:40 +00:00
|
|
|
// logger is the logger to be used
|
|
|
|
logger *log.Logger
|
2015-06-07 18:50:29 +00:00
|
|
|
|
|
|
|
// The maximum time to keep a connection open
|
|
|
|
maxTime time.Duration
|
|
|
|
|
|
|
|
// The maximum number of open streams to keep
|
|
|
|
maxStreams int
|
|
|
|
|
|
|
|
// Pool maps an address to a open connection
|
|
|
|
pool map[string]*Conn
|
|
|
|
|
2015-08-15 19:35:18 +00:00
|
|
|
// limiter is used to throttle the number of connect attempts
|
|
|
|
// to a given address. The first thread will attempt a connection
|
|
|
|
// and put a channel in here, which all other threads will wait
|
|
|
|
// on to close.
|
|
|
|
limiter map[string]chan struct{}
|
|
|
|
|
2015-06-07 18:50:29 +00:00
|
|
|
// TLS wrapper
|
2016-11-01 18:55:29 +00:00
|
|
|
tlsWrap tlsutil.RegionWrapper
|
2015-06-07 18:50:29 +00:00
|
|
|
|
|
|
|
// Used to indicate the pool is shutdown
|
|
|
|
shutdown bool
|
|
|
|
shutdownCh chan struct{}
|
2018-01-11 01:21:28 +00:00
|
|
|
|
|
|
|
// connListener is used to notify a potential listener of a new connection
|
|
|
|
// being made.
|
2021-06-07 14:22:37 +00:00
|
|
|
connListener chan<- *Conn
|
2015-06-07 18:50:29 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// NewPool is used to make a new connection pool
|
|
|
|
// Maintain at most one connection per host, for up to maxTime.
|
|
|
|
// Set maxTime to 0 to disable reaping. maxStreams is used to control
|
|
|
|
// the number of idle streams allowed.
|
|
|
|
// If TLS settings are provided outgoing connections use TLS.
|
2018-09-17 21:22:40 +00:00
|
|
|
func NewPool(logger hclog.Logger, maxTime time.Duration, maxStreams int, tlsWrap tlsutil.RegionWrapper) *ConnPool {
|
2015-06-07 18:50:29 +00:00
|
|
|
pool := &ConnPool{
|
2018-09-17 21:22:40 +00:00
|
|
|
logger: logger.StandardLogger(&hclog.StandardLoggerOptions{InferLevels: true}),
|
2015-06-07 18:50:29 +00:00
|
|
|
maxTime: maxTime,
|
|
|
|
maxStreams: maxStreams,
|
|
|
|
pool: make(map[string]*Conn),
|
2015-08-15 19:35:18 +00:00
|
|
|
limiter: make(map[string]chan struct{}),
|
2015-06-07 18:50:29 +00:00
|
|
|
tlsWrap: tlsWrap,
|
|
|
|
shutdownCh: make(chan struct{}),
|
|
|
|
}
|
|
|
|
if maxTime > 0 {
|
|
|
|
go pool.reap()
|
|
|
|
}
|
|
|
|
return pool
|
|
|
|
}
|
|
|
|
|
|
|
|
// Shutdown is used to close the connection pool
|
|
|
|
func (p *ConnPool) Shutdown() error {
|
|
|
|
p.Lock()
|
|
|
|
defer p.Unlock()
|
|
|
|
|
|
|
|
for _, conn := range p.pool {
|
|
|
|
conn.Close()
|
|
|
|
}
|
|
|
|
p.pool = make(map[string]*Conn)
|
|
|
|
|
|
|
|
if p.shutdown {
|
|
|
|
return nil
|
|
|
|
}
|
2018-01-11 01:21:28 +00:00
|
|
|
|
|
|
|
if p.connListener != nil {
|
|
|
|
close(p.connListener)
|
|
|
|
p.connListener = nil
|
|
|
|
}
|
|
|
|
|
2015-06-07 18:50:29 +00:00
|
|
|
p.shutdown = true
|
|
|
|
close(p.shutdownCh)
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2017-11-20 15:38:46 +00:00
|
|
|
// ReloadTLS reloads TLS configuration on the fly
|
|
|
|
func (p *ConnPool) ReloadTLS(tlsWrap tlsutil.RegionWrapper) {
|
|
|
|
p.Lock()
|
|
|
|
defer p.Unlock()
|
|
|
|
|
|
|
|
oldPool := p.pool
|
|
|
|
for _, conn := range oldPool {
|
|
|
|
conn.Close()
|
|
|
|
}
|
|
|
|
p.pool = make(map[string]*Conn)
|
|
|
|
p.tlsWrap = tlsWrap
|
|
|
|
}
|
|
|
|
|
2018-01-11 01:21:28 +00:00
|
|
|
// SetConnListener is used to listen to new connections being made. The
|
|
|
|
// channel will be closed when the conn pool is closed or a new listener is set.
|
2021-06-07 14:22:37 +00:00
|
|
|
func (p *ConnPool) SetConnListener(l chan<- *Conn) {
|
2018-01-11 01:21:28 +00:00
|
|
|
p.Lock()
|
|
|
|
defer p.Unlock()
|
|
|
|
|
|
|
|
// Close the old listener
|
|
|
|
if p.connListener != nil {
|
|
|
|
close(p.connListener)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Store the new listener
|
|
|
|
p.connListener = l
|
|
|
|
}
|
|
|
|
|
2015-06-07 18:50:29 +00:00
|
|
|
// Acquire is used to get a connection that is
|
|
|
|
// pooled or to return a new connection
|
2021-12-01 22:36:02 +00:00
|
|
|
func (p *ConnPool) acquire(region string, addr net.Addr) (*Conn, error) {
|
2015-08-15 19:35:18 +00:00
|
|
|
// Check to see if there's a pooled connection available. This is up
|
2016-10-11 19:31:40 +00:00
|
|
|
// here since it should the vastly more common case than the rest
|
2015-08-15 19:35:18 +00:00
|
|
|
// of the code here.
|
|
|
|
p.Lock()
|
|
|
|
c := p.pool[addr.String()]
|
|
|
|
if c != nil {
|
|
|
|
c.markForUse()
|
|
|
|
p.Unlock()
|
|
|
|
return c, nil
|
2015-06-07 18:50:29 +00:00
|
|
|
}
|
|
|
|
|
2015-08-15 19:35:18 +00:00
|
|
|
// If not (while we are still locked), set up the throttling structure
|
|
|
|
// for this address, which will make everyone else wait until our
|
|
|
|
// attempt is done.
|
|
|
|
var wait chan struct{}
|
|
|
|
var ok bool
|
|
|
|
if wait, ok = p.limiter[addr.String()]; !ok {
|
|
|
|
wait = make(chan struct{})
|
|
|
|
p.limiter[addr.String()] = wait
|
|
|
|
}
|
|
|
|
isLeadThread := !ok
|
|
|
|
p.Unlock()
|
|
|
|
|
|
|
|
// If we are the lead thread, make the new connection and then wake
|
|
|
|
// everybody else up to see if we got it.
|
|
|
|
if isLeadThread {
|
2021-12-01 22:36:02 +00:00
|
|
|
c, err := p.getNewConn(region, addr)
|
2015-08-15 19:35:18 +00:00
|
|
|
p.Lock()
|
|
|
|
delete(p.limiter, addr.String())
|
|
|
|
close(wait)
|
|
|
|
if err != nil {
|
|
|
|
p.Unlock()
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
p.pool[addr.String()] = c
|
2018-01-11 01:21:28 +00:00
|
|
|
|
|
|
|
// If there is a connection listener, notify them of the new connection.
|
|
|
|
if p.connListener != nil {
|
|
|
|
select {
|
2021-06-07 14:22:37 +00:00
|
|
|
case p.connListener <- c:
|
2018-01-11 01:21:28 +00:00
|
|
|
default:
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-08-15 19:35:18 +00:00
|
|
|
p.Unlock()
|
|
|
|
return c, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// Otherwise, wait for the lead thread to attempt the connection
|
|
|
|
// and use what's in the pool at that point.
|
|
|
|
select {
|
|
|
|
case <-p.shutdownCh:
|
|
|
|
return nil, fmt.Errorf("rpc error: shutdown")
|
|
|
|
case <-wait:
|
|
|
|
}
|
2015-06-07 18:50:29 +00:00
|
|
|
|
2015-08-15 19:35:18 +00:00
|
|
|
// See if the lead thread was able to get us a connection.
|
2015-06-07 18:50:29 +00:00
|
|
|
p.Lock()
|
2015-08-15 19:35:18 +00:00
|
|
|
if c := p.pool[addr.String()]; c != nil {
|
|
|
|
c.markForUse()
|
|
|
|
p.Unlock()
|
|
|
|
return c, nil
|
2015-06-07 18:50:29 +00:00
|
|
|
}
|
2015-08-15 19:35:18 +00:00
|
|
|
|
2015-06-07 18:50:29 +00:00
|
|
|
p.Unlock()
|
2015-08-15 19:35:18 +00:00
|
|
|
return nil, fmt.Errorf("rpc error: lead thread didn't get connection")
|
2015-06-07 18:50:29 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// getNewConn is used to return a new connection
|
2021-12-01 22:36:02 +00:00
|
|
|
func (p *ConnPool) getNewConn(region string, addr net.Addr) (*Conn, error) {
|
2015-06-07 18:50:29 +00:00
|
|
|
// Try to dial the conn
|
|
|
|
conn, err := net.DialTimeout("tcp", addr.String(), 10*time.Second)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
// Cast to TCPConn
|
|
|
|
if tcp, ok := conn.(*net.TCPConn); ok {
|
|
|
|
tcp.SetKeepAlive(true)
|
|
|
|
tcp.SetNoDelay(true)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Check if TLS is enabled
|
|
|
|
if p.tlsWrap != nil {
|
|
|
|
// Switch the connection into TLS mode
|
2018-01-12 21:58:44 +00:00
|
|
|
if _, err := conn.Write([]byte{byte(RpcTLS)}); err != nil {
|
2015-06-07 18:50:29 +00:00
|
|
|
conn.Close()
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
// Wrap the connection in a TLS client
|
2016-11-01 18:55:29 +00:00
|
|
|
tlsConn, err := p.tlsWrap(region, conn)
|
2015-06-07 18:50:29 +00:00
|
|
|
if err != nil {
|
|
|
|
conn.Close()
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
conn = tlsConn
|
|
|
|
}
|
|
|
|
|
|
|
|
// Write the multiplex byte to set the mode
|
2020-01-31 20:21:39 +00:00
|
|
|
if _, err := conn.Write([]byte{byte(RpcMultiplexV2)}); err != nil {
|
2015-06-07 18:50:29 +00:00
|
|
|
conn.Close()
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
// Setup the logger
|
|
|
|
conf := yamux.DefaultConfig()
|
2018-09-17 21:22:40 +00:00
|
|
|
conf.LogOutput = nil
|
|
|
|
conf.Logger = p.logger
|
2015-06-07 18:50:29 +00:00
|
|
|
|
|
|
|
// Create a multiplexed session
|
|
|
|
session, err := yamux.Client(conn, conf)
|
|
|
|
if err != nil {
|
|
|
|
conn.Close()
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
// Wrap the connection
|
|
|
|
c := &Conn{
|
|
|
|
refCount: 1,
|
|
|
|
addr: addr,
|
|
|
|
session: session,
|
|
|
|
clients: list.New(),
|
2022-08-17 21:57:53 +00:00
|
|
|
lastUsed: atomic.Pointer[time.Time]{},
|
2015-06-07 18:50:29 +00:00
|
|
|
pool: p,
|
|
|
|
}
|
2022-08-17 21:57:53 +00:00
|
|
|
|
|
|
|
now := time.Now()
|
|
|
|
c.lastUsed.Store(&now)
|
2015-08-15 19:35:18 +00:00
|
|
|
return c, nil
|
2015-06-07 18:50:29 +00:00
|
|
|
}
|
|
|
|
|
2018-02-07 02:51:34 +00:00
|
|
|
// clearConn is used to clear any cached connection, potentially in response to
|
|
|
|
// an error
|
2015-06-07 18:50:29 +00:00
|
|
|
func (p *ConnPool) clearConn(conn *Conn) {
|
|
|
|
// Ensure returned streams are closed
|
|
|
|
atomic.StoreInt32(&conn.shouldClose, 1)
|
|
|
|
|
|
|
|
// Clear from the cache
|
|
|
|
p.Lock()
|
|
|
|
if c, ok := p.pool[conn.addr.String()]; ok && c == conn {
|
|
|
|
delete(p.pool, conn.addr.String())
|
|
|
|
}
|
|
|
|
p.Unlock()
|
|
|
|
|
|
|
|
// Close down immediately if idle
|
|
|
|
if refCount := atomic.LoadInt32(&conn.refCount); refCount == 0 {
|
|
|
|
conn.Close()
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-12-01 22:36:02 +00:00
|
|
|
// getClient is used to get a usable client for an address
|
|
|
|
func (p *ConnPool) getRPCClient(region string, addr net.Addr) (*Conn, *StreamClient, error) {
|
2015-06-07 18:50:29 +00:00
|
|
|
retries := 0
|
|
|
|
START:
|
|
|
|
// Try to get a conn first
|
2021-12-01 22:36:02 +00:00
|
|
|
conn, err := p.acquire(region, addr)
|
2015-06-07 18:50:29 +00:00
|
|
|
if err != nil {
|
|
|
|
return nil, nil, fmt.Errorf("failed to get conn: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Get a client
|
2020-01-31 20:21:39 +00:00
|
|
|
client, err := conn.getRPCClient()
|
2015-06-07 18:50:29 +00:00
|
|
|
if err != nil {
|
|
|
|
p.clearConn(conn)
|
2021-06-07 14:22:37 +00:00
|
|
|
conn.releaseUse()
|
2015-06-07 18:50:29 +00:00
|
|
|
|
|
|
|
// Try to redial, possible that the TCP session closed due to timeout
|
|
|
|
if retries == 0 {
|
|
|
|
retries++
|
|
|
|
goto START
|
|
|
|
}
|
|
|
|
return nil, nil, fmt.Errorf("failed to start stream: %v", err)
|
|
|
|
}
|
|
|
|
return conn, client, nil
|
|
|
|
}
|
|
|
|
|
2020-01-31 20:21:39 +00:00
|
|
|
// StreamingRPC is used to make an streaming RPC call. Callers must
|
2020-02-07 00:24:58 +00:00
|
|
|
// close the connection when done.
|
2021-12-01 22:36:02 +00:00
|
|
|
func (p *ConnPool) StreamingRPC(region string, addr net.Addr) (net.Conn, error) {
|
|
|
|
conn, err := p.acquire(region, addr)
|
2020-01-31 20:21:39 +00:00
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("failed to get conn: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
s, err := conn.session.Open()
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("failed to open a streaming connection: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
if _, err := s.Write([]byte{byte(RpcStreaming)}); err != nil {
|
|
|
|
conn.Close()
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
return s, nil
|
|
|
|
}
|
|
|
|
|
2015-06-07 18:50:29 +00:00
|
|
|
// RPC is used to make an RPC call to a remote host
|
2021-12-01 22:36:02 +00:00
|
|
|
func (p *ConnPool) RPC(region string, addr net.Addr, method string, args interface{}, reply interface{}) error {
|
2015-06-07 18:50:29 +00:00
|
|
|
// Get a usable client
|
2021-12-01 22:36:02 +00:00
|
|
|
conn, sc, err := p.getRPCClient(region, addr)
|
2015-06-07 18:50:29 +00:00
|
|
|
if err != nil {
|
2020-08-11 13:13:52 +00:00
|
|
|
return fmt.Errorf("rpc error: %w", err)
|
2015-06-07 18:50:29 +00:00
|
|
|
}
|
2021-06-07 14:22:37 +00:00
|
|
|
defer conn.releaseUse()
|
2015-06-07 18:50:29 +00:00
|
|
|
|
|
|
|
// Make the RPC call
|
|
|
|
err = msgpackrpc.CallWithCodec(sc.codec, method, args, reply)
|
|
|
|
if err != nil {
|
|
|
|
sc.Close()
|
2019-12-13 19:44:02 +00:00
|
|
|
|
2020-01-31 20:19:48 +00:00
|
|
|
// If we read EOF, the session is toast. Clear it and open a
|
|
|
|
// new session next time
|
|
|
|
// See https://github.com/hashicorp/consul/blob/v1.6.3/agent/pool/pool.go#L471-L477
|
2022-04-09 11:22:44 +00:00
|
|
|
if helper.IsErrEOF(err) {
|
2020-01-31 20:19:48 +00:00
|
|
|
p.clearConn(conn)
|
|
|
|
}
|
|
|
|
|
2019-12-13 19:44:02 +00:00
|
|
|
// If the error is an RPC Coded error
|
|
|
|
// return the coded error without wrapping
|
|
|
|
if structs.IsErrRPCCoded(err) {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2019-12-16 18:42:18 +00:00
|
|
|
// TODO wrap with RPCCoded error instead
|
2020-08-11 13:13:52 +00:00
|
|
|
return fmt.Errorf("rpc error: %w", err)
|
2015-06-07 18:50:29 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Done with the connection
|
|
|
|
conn.returnClient(sc)
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// Reap is used to close conns open over maxTime
|
|
|
|
func (p *ConnPool) reap() {
|
|
|
|
for {
|
|
|
|
// Sleep for a while
|
|
|
|
select {
|
|
|
|
case <-p.shutdownCh:
|
|
|
|
return
|
|
|
|
case <-time.After(time.Second):
|
|
|
|
}
|
|
|
|
|
|
|
|
// Reap all old conns
|
|
|
|
p.Lock()
|
|
|
|
var removed []string
|
|
|
|
now := time.Now()
|
|
|
|
for host, conn := range p.pool {
|
|
|
|
// Skip recently used connections
|
2022-08-17 21:57:53 +00:00
|
|
|
if now.Sub(*conn.lastUsed.Load()) < p.maxTime {
|
2015-06-07 18:50:29 +00:00
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
|
|
|
// Skip connections with active streams
|
|
|
|
if atomic.LoadInt32(&conn.refCount) > 0 {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
|
|
|
// Close the conn
|
|
|
|
conn.Close()
|
|
|
|
|
|
|
|
// Remove from pool
|
|
|
|
removed = append(removed, host)
|
|
|
|
}
|
|
|
|
for _, host := range removed {
|
|
|
|
delete(p.pool, host)
|
|
|
|
}
|
|
|
|
p.Unlock()
|
|
|
|
}
|
|
|
|
}
|