2016-03-23 07:50:41 +00:00
|
|
|
package consul
|
|
|
|
|
|
|
|
import (
|
|
|
|
"crypto/tls"
|
|
|
|
"fmt"
|
|
|
|
"log"
|
|
|
|
"net/http"
|
2016-03-23 17:43:35 +00:00
|
|
|
"net/url"
|
|
|
|
"reflect"
|
2016-03-23 07:50:41 +00:00
|
|
|
"strings"
|
2016-03-24 01:03:02 +00:00
|
|
|
"sync"
|
2016-03-23 07:50:41 +00:00
|
|
|
"time"
|
|
|
|
|
|
|
|
consul "github.com/hashicorp/consul/api"
|
2016-03-23 17:43:35 +00:00
|
|
|
"github.com/hashicorp/go-multierror"
|
2016-03-23 07:50:41 +00:00
|
|
|
|
|
|
|
"github.com/hashicorp/nomad/nomad/structs"
|
|
|
|
)
|
|
|
|
|
2016-03-23 21:34:43 +00:00
|
|
|
// ConsulService allows syncing of services and checks with Consul
|
2016-03-23 07:50:41 +00:00
|
|
|
type ConsulService struct {
|
|
|
|
client *consul.Client
|
|
|
|
|
2016-03-24 00:35:29 +00:00
|
|
|
task *structs.Task
|
|
|
|
allocID string
|
2016-03-23 07:50:41 +00:00
|
|
|
|
|
|
|
services map[string]*consul.AgentService
|
2016-03-23 17:43:35 +00:00
|
|
|
checks map[string]*structs.ServiceCheck
|
2016-03-23 07:50:41 +00:00
|
|
|
|
2016-03-24 01:03:02 +00:00
|
|
|
logger *log.Logger
|
|
|
|
|
|
|
|
shutdownCh chan struct{}
|
|
|
|
shutdown bool
|
|
|
|
shutdownLock sync.Mutex
|
2016-03-23 07:50:41 +00:00
|
|
|
}
|
|
|
|
|
2016-03-23 21:34:43 +00:00
|
|
|
// ConsulConfig is the configuration used to create a new ConsulService client
|
2016-03-23 07:50:41 +00:00
|
|
|
type ConsulConfig struct {
|
|
|
|
Addr string
|
|
|
|
Token string
|
|
|
|
Auth string
|
|
|
|
EnableSSL bool
|
|
|
|
VerifySSL bool
|
|
|
|
}
|
|
|
|
|
|
|
|
const (
|
2016-03-23 21:34:43 +00:00
|
|
|
// The periodic time interval for syncing services and checks with Consul
|
2016-03-23 07:50:41 +00:00
|
|
|
syncInterval = 5 * time.Second
|
|
|
|
)
|
|
|
|
|
2016-03-23 21:34:43 +00:00
|
|
|
// NewConsulService returns a new ConsulService
|
2016-03-24 00:35:29 +00:00
|
|
|
func NewConsulService(config *ConsulConfig, logger *log.Logger, allocID string) (*ConsulService, error) {
|
2016-03-23 07:50:41 +00:00
|
|
|
var err error
|
|
|
|
var c *consul.Client
|
|
|
|
cfg := consul.DefaultConfig()
|
|
|
|
if config.Addr != "" {
|
|
|
|
cfg.Address = config.Addr
|
|
|
|
}
|
|
|
|
if config.Token != "" {
|
|
|
|
cfg.Token = config.Token
|
|
|
|
}
|
|
|
|
if config.Auth != "" {
|
|
|
|
var username, password string
|
|
|
|
if strings.Contains(config.Auth, ":") {
|
|
|
|
split := strings.SplitN(config.Auth, ":", 2)
|
|
|
|
username = split[0]
|
|
|
|
password = split[1]
|
|
|
|
} else {
|
|
|
|
username = config.Auth
|
|
|
|
}
|
|
|
|
|
|
|
|
cfg.HttpAuth = &consul.HttpBasicAuth{
|
|
|
|
Username: username,
|
|
|
|
Password: password,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if config.EnableSSL {
|
|
|
|
cfg.Scheme = "https"
|
|
|
|
}
|
|
|
|
if config.EnableSSL && !config.VerifySSL {
|
|
|
|
cfg.HttpClient.Transport = &http.Transport{
|
|
|
|
TLSClientConfig: &tls.Config{
|
|
|
|
InsecureSkipVerify: true,
|
|
|
|
},
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if c, err = consul.NewClient(cfg); err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
consulService := ConsulService{
|
2016-03-23 18:31:04 +00:00
|
|
|
client: c,
|
|
|
|
logger: logger,
|
|
|
|
services: make(map[string]*consul.AgentService),
|
|
|
|
checks: make(map[string]*structs.ServiceCheck),
|
2016-03-23 07:50:41 +00:00
|
|
|
|
|
|
|
shutdownCh: make(chan struct{}),
|
|
|
|
}
|
|
|
|
return &consulService, nil
|
|
|
|
}
|
|
|
|
|
2016-03-23 21:34:43 +00:00
|
|
|
// SyncTask sync the services and task with consul
|
2016-03-23 17:43:35 +00:00
|
|
|
func (c *ConsulService) SyncTask(task *structs.Task) error {
|
|
|
|
var mErr multierror.Error
|
2016-03-23 07:50:41 +00:00
|
|
|
c.task = task
|
2016-03-23 18:31:04 +00:00
|
|
|
services := make(map[string]*consul.AgentService)
|
|
|
|
checks := make(map[string]*structs.ServiceCheck)
|
2016-03-23 17:43:35 +00:00
|
|
|
|
|
|
|
// Register Services and Checks that we don't know about or has changed
|
|
|
|
for _, service := range task.Services {
|
|
|
|
srv, err := c.createService(service)
|
|
|
|
if err != nil {
|
|
|
|
mErr.Errors = append(mErr.Errors, err)
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
trackedService, ok := c.services[srv.ID]
|
|
|
|
if (ok && !reflect.DeepEqual(trackedService, srv)) || !ok {
|
2016-03-23 21:23:32 +00:00
|
|
|
if err := c.registerService(srv); err != nil {
|
|
|
|
mErr.Errors = append(mErr.Errors, err)
|
|
|
|
}
|
2016-03-23 17:43:35 +00:00
|
|
|
}
|
|
|
|
c.services[srv.ID] = srv
|
|
|
|
services[srv.ID] = srv
|
|
|
|
|
|
|
|
for _, chk := range service.Checks {
|
2016-03-24 00:12:53 +00:00
|
|
|
checkID := chk.Hash(srv.ID)
|
|
|
|
if _, ok := c.checks[checkID]; !ok {
|
2016-03-23 21:23:32 +00:00
|
|
|
if err := c.registerCheck(chk, srv); err != nil {
|
|
|
|
mErr.Errors = append(mErr.Errors, err)
|
|
|
|
}
|
2016-03-23 17:43:35 +00:00
|
|
|
}
|
2016-03-24 00:12:53 +00:00
|
|
|
c.checks[checkID] = chk
|
|
|
|
checks[checkID] = chk
|
2016-03-23 17:43:35 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Remove services that are not present anymore
|
|
|
|
for _, service := range c.services {
|
|
|
|
if _, ok := services[service.ID]; !ok {
|
2016-03-23 21:23:32 +00:00
|
|
|
if err := c.deregisterService(service.ID); err != nil {
|
|
|
|
mErr.Errors = append(mErr.Errors, err)
|
|
|
|
}
|
2016-03-23 17:43:35 +00:00
|
|
|
delete(c.services, service.ID)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Remove the checks that are not present anymore
|
2016-03-24 00:12:53 +00:00
|
|
|
for checkID, _ := range c.checks {
|
|
|
|
if _, ok := checks[checkID]; !ok {
|
|
|
|
if err := c.deregisterCheck(checkID); err != nil {
|
2016-03-23 21:23:32 +00:00
|
|
|
mErr.Errors = append(mErr.Errors, err)
|
|
|
|
}
|
2016-03-24 00:12:53 +00:00
|
|
|
delete(c.checks, checkID)
|
2016-03-23 17:43:35 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
return mErr.ErrorOrNil()
|
2016-03-23 07:50:41 +00:00
|
|
|
}
|
|
|
|
|
2016-03-23 21:34:43 +00:00
|
|
|
// Shutdown de-registers the services and checks and shuts down periodic syncing
|
2016-03-23 19:19:19 +00:00
|
|
|
func (c *ConsulService) Shutdown() error {
|
2016-03-23 17:43:35 +00:00
|
|
|
var mErr multierror.Error
|
2016-03-24 01:03:02 +00:00
|
|
|
|
|
|
|
c.shutdownLock.Lock()
|
|
|
|
if !c.shutdown {
|
|
|
|
close(c.shutdownCh)
|
|
|
|
c.shutdown = true
|
2016-03-23 21:23:32 +00:00
|
|
|
}
|
2016-03-24 01:03:02 +00:00
|
|
|
c.shutdownLock.Unlock()
|
2016-03-23 17:43:35 +00:00
|
|
|
for _, service := range c.services {
|
|
|
|
if err := c.client.Agent().ServiceDeregister(service.ID); err != nil {
|
|
|
|
mErr.Errors = append(mErr.Errors, err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return mErr.ErrorOrNil()
|
2016-03-23 07:50:41 +00:00
|
|
|
}
|
|
|
|
|
2016-03-23 22:28:55 +00:00
|
|
|
func (c *ConsulService) RemoveServices(tasks []*structs.Task) error {
|
|
|
|
var mErr multierror.Error
|
|
|
|
var services map[string]struct{}
|
|
|
|
for _, task := range tasks {
|
|
|
|
for _, service := range task.Services {
|
2016-03-24 00:35:29 +00:00
|
|
|
services[service.ID(c.allocID, c.task.Name)] = struct{}{}
|
2016-03-23 22:28:55 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
cServices, err := c.client.Agent().Services()
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
cServices = c.filterConsulServices(cServices)
|
|
|
|
|
|
|
|
for _, service := range cServices {
|
|
|
|
if _, validService := services[service.ID]; !validService {
|
|
|
|
if err := c.deregisterService(service.ID); err != nil {
|
|
|
|
mErr.Errors = append(mErr.Errors, err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return mErr.ErrorOrNil()
|
|
|
|
}
|
|
|
|
|
2016-03-23 21:34:43 +00:00
|
|
|
// registerCheck registers a check definition with Consul
|
2016-03-23 17:43:35 +00:00
|
|
|
func (c *ConsulService) registerCheck(check *structs.ServiceCheck, service *consul.AgentService) error {
|
|
|
|
chkReg := consul.AgentCheckRegistration{
|
2016-03-24 00:12:53 +00:00
|
|
|
ID: check.Hash(service.ID),
|
2016-03-23 17:43:35 +00:00
|
|
|
Name: check.Name,
|
|
|
|
ServiceID: service.ID,
|
|
|
|
}
|
|
|
|
chkReg.Timeout = check.Timeout.String()
|
2016-03-23 21:23:32 +00:00
|
|
|
chkReg.Interval = check.Interval.String()
|
2016-03-23 17:43:35 +00:00
|
|
|
switch check.Type {
|
|
|
|
case structs.ServiceCheckHTTP:
|
|
|
|
if check.Protocol == "" {
|
|
|
|
check.Protocol = "http"
|
|
|
|
}
|
|
|
|
url := url.URL{
|
|
|
|
Scheme: check.Protocol,
|
|
|
|
Host: fmt.Sprintf("%s:%d", service.Address, service.Port),
|
|
|
|
Path: check.Path,
|
|
|
|
}
|
|
|
|
chkReg.HTTP = url.String()
|
|
|
|
case structs.ServiceCheckTCP:
|
|
|
|
chkReg.TCP = fmt.Sprintf("%s:%d", service.Address, service.Port)
|
|
|
|
case structs.ServiceCheckScript:
|
|
|
|
chkReg.TTL = check.Interval.String()
|
|
|
|
}
|
|
|
|
return c.client.Agent().CheckRegister(&chkReg)
|
2016-03-23 07:50:41 +00:00
|
|
|
}
|
|
|
|
|
2016-03-23 17:43:35 +00:00
|
|
|
// createService creates a Consul AgentService from a Nomad Service
|
2016-03-23 07:50:41 +00:00
|
|
|
func (c *ConsulService) createService(service *structs.Service) (*consul.AgentService, error) {
|
|
|
|
host, port := c.task.FindHostAndPortFor(service.PortLabel)
|
|
|
|
if host == "" {
|
|
|
|
return nil, fmt.Errorf("host for the service %q couldn't be found", service.Name)
|
|
|
|
}
|
|
|
|
|
|
|
|
if port == 0 {
|
|
|
|
return nil, fmt.Errorf("port for the service %q couldn't be found", service.Name)
|
|
|
|
}
|
|
|
|
srv := consul.AgentService{
|
2016-03-24 00:35:29 +00:00
|
|
|
ID: service.ID(c.allocID, c.task.Name),
|
2016-03-23 07:50:41 +00:00
|
|
|
Service: service.Name,
|
|
|
|
Tags: service.Tags,
|
|
|
|
Address: host,
|
|
|
|
Port: port,
|
|
|
|
}
|
|
|
|
return &srv, nil
|
|
|
|
}
|
|
|
|
|
2016-03-23 17:43:35 +00:00
|
|
|
// registerService registers a service with Consul
|
|
|
|
func (c *ConsulService) registerService(service *consul.AgentService) error {
|
|
|
|
srvReg := consul.AgentServiceRegistration{
|
|
|
|
ID: service.ID,
|
|
|
|
Name: service.Service,
|
|
|
|
Tags: service.Tags,
|
|
|
|
Port: service.Port,
|
|
|
|
Address: service.Address,
|
|
|
|
}
|
|
|
|
return c.client.Agent().ServiceRegister(&srvReg)
|
|
|
|
}
|
|
|
|
|
|
|
|
// deregisterService de-registers a service with the given ID from consul
|
|
|
|
func (c *ConsulService) deregisterService(ID string) error {
|
|
|
|
return c.client.Agent().ServiceDeregister(ID)
|
|
|
|
}
|
|
|
|
|
2016-03-23 21:34:43 +00:00
|
|
|
// deregisterCheck de-registers a check with a given ID from Consul.
|
2016-03-23 17:43:35 +00:00
|
|
|
func (c *ConsulService) deregisterCheck(ID string) error {
|
|
|
|
return c.client.Agent().CheckDeregister(ID)
|
|
|
|
}
|
|
|
|
|
2016-03-23 21:34:43 +00:00
|
|
|
// SyncWithConsul triggers periodic syncing of services and checks with Consul
|
2016-03-23 18:31:04 +00:00
|
|
|
func (c *ConsulService) SyncWithConsul() {
|
2016-03-23 07:50:41 +00:00
|
|
|
sync := time.After(syncInterval)
|
|
|
|
for {
|
|
|
|
select {
|
|
|
|
case <-sync:
|
2016-03-23 18:31:04 +00:00
|
|
|
if err := c.performSync(); err != nil {
|
2016-03-23 07:50:41 +00:00
|
|
|
c.logger.Printf("[DEBUG] consul: error in syncing task %q: %v", c.task.Name, err)
|
|
|
|
}
|
|
|
|
sync = time.After(syncInterval)
|
|
|
|
case <-c.shutdownCh:
|
|
|
|
c.logger.Printf("[INFO] consul: shutting down sync for task %q", c.task.Name)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-03-23 21:34:43 +00:00
|
|
|
// performSync sync the services and checks we are tracking with Consul.
|
2016-03-23 18:31:04 +00:00
|
|
|
func (c *ConsulService) performSync() error {
|
|
|
|
var mErr multierror.Error
|
2016-03-23 17:43:35 +00:00
|
|
|
cServices, err := c.client.Agent().Services()
|
|
|
|
if err != nil {
|
2016-03-23 18:31:04 +00:00
|
|
|
return err
|
2016-03-23 17:43:35 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
cChecks, err := c.client.Agent().Checks()
|
|
|
|
if err != nil {
|
2016-03-23 18:31:04 +00:00
|
|
|
return err
|
2016-03-23 17:43:35 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Add services and checks that consul doesn't have but we do
|
|
|
|
for serviceID, service := range c.services {
|
|
|
|
if _, ok := cServices[serviceID]; !ok {
|
2016-03-23 18:31:04 +00:00
|
|
|
if err := c.registerService(service); err != nil {
|
|
|
|
mErr.Errors = append(mErr.Errors, err)
|
|
|
|
}
|
2016-03-23 17:43:35 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
for checkID, check := range c.checks {
|
|
|
|
if chk, ok := cChecks[checkID]; !ok {
|
2016-03-23 18:31:04 +00:00
|
|
|
if err := c.registerCheck(check, c.services[chk.ServiceID]); err != nil {
|
|
|
|
mErr.Errors = append(mErr.Errors, err)
|
|
|
|
}
|
2016-03-23 17:43:35 +00:00
|
|
|
}
|
|
|
|
}
|
2016-03-23 18:31:04 +00:00
|
|
|
|
|
|
|
return mErr.ErrorOrNil()
|
2016-03-23 17:43:35 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// filterConsulServices prunes out all the service whose ids are not prefixed
|
|
|
|
// with nomad-
|
|
|
|
func (c *ConsulService) filterConsulServices(srvcs map[string]*consul.AgentService) map[string]*consul.AgentService {
|
|
|
|
nomadServices := make(map[string]*consul.AgentService)
|
|
|
|
for _, srv := range srvcs {
|
|
|
|
if strings.HasPrefix(srv.ID, structs.NomadConsulPrefix) {
|
|
|
|
nomadServices[srv.ID] = srv
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return nomadServices
|
|
|
|
}
|
|
|
|
|
|
|
|
// filterConsulChecks prunes out all the consul checks which do not have
|
|
|
|
// services with id prefixed with noamd-
|
|
|
|
func (c *ConsulService) filterConsulChecks(chks map[string]*consul.AgentCheck) map[string]*consul.AgentCheck {
|
|
|
|
nomadChecks := make(map[string]*consul.AgentCheck)
|
|
|
|
for _, chk := range chks {
|
|
|
|
if strings.HasPrefix(chk.ServiceID, structs.NomadConsulPrefix) {
|
|
|
|
nomadChecks[chk.CheckID] = chk
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return nomadChecks
|
2016-03-23 07:50:41 +00:00
|
|
|
}
|
2016-03-23 22:36:46 +00:00
|
|
|
|
|
|
|
func (c *ConsulService) consulPresent() bool {
|
|
|
|
_, err := c.client.Agent().Self()
|
|
|
|
return err == nil
|
|
|
|
}
|