2024-01-10 16:19:20 +00:00
|
|
|
// Copyright (c) HashiCorp, Inc.
|
|
|
|
// SPDX-License-Identifier: BUSL-1.1
|
|
|
|
|
|
|
|
package discovery
|
|
|
|
|
|
|
|
import (
|
2024-02-02 23:29:38 +00:00
|
|
|
"context"
|
|
|
|
"fmt"
|
2024-02-06 16:12:04 +00:00
|
|
|
"math/rand"
|
2024-01-10 16:19:20 +00:00
|
|
|
"net"
|
2024-02-02 23:29:38 +00:00
|
|
|
"strings"
|
2024-01-10 16:19:20 +00:00
|
|
|
"sync/atomic"
|
|
|
|
|
2024-02-09 22:41:40 +00:00
|
|
|
"golang.org/x/exp/slices"
|
2024-02-02 23:29:38 +00:00
|
|
|
"google.golang.org/grpc/codes"
|
|
|
|
"google.golang.org/grpc/metadata"
|
|
|
|
"google.golang.org/grpc/status"
|
2024-02-06 16:12:04 +00:00
|
|
|
"google.golang.org/protobuf/proto"
|
2024-02-02 23:29:38 +00:00
|
|
|
|
|
|
|
"github.com/hashicorp/go-hclog"
|
|
|
|
|
2024-01-10 16:19:20 +00:00
|
|
|
"github.com/hashicorp/consul/agent/config"
|
2024-02-02 23:29:38 +00:00
|
|
|
"github.com/hashicorp/consul/internal/resource"
|
|
|
|
pbcatalog "github.com/hashicorp/consul/proto-public/pbcatalog/v2beta1"
|
|
|
|
"github.com/hashicorp/consul/proto-public/pbresource"
|
2024-01-10 16:19:20 +00:00
|
|
|
)
|
|
|
|
|
2024-03-01 12:42:42 +00:00
|
|
|
// V2DataFetcherDynamicConfig is used to store the dynamic configuration of the V2 data fetcher.
|
|
|
|
type V2DataFetcherDynamicConfig struct {
|
|
|
|
OnlyPassing bool
|
2024-01-10 16:19:20 +00:00
|
|
|
}
|
|
|
|
|
2024-01-17 23:46:18 +00:00
|
|
|
// V2DataFetcher is used to fetch data from the V2 catalog.
|
2024-01-10 16:19:20 +00:00
|
|
|
type V2DataFetcher struct {
|
2024-02-02 23:29:38 +00:00
|
|
|
client pbresource.ResourceServiceClient
|
|
|
|
logger hclog.Logger
|
|
|
|
|
|
|
|
// Requests inherit the partition of the agent unless otherwise specified.
|
|
|
|
defaultPartition string
|
|
|
|
|
2024-01-10 16:19:20 +00:00
|
|
|
dynamicConfig atomic.Value
|
|
|
|
}
|
|
|
|
|
2024-01-17 23:46:18 +00:00
|
|
|
// NewV2DataFetcher creates a new V2 data fetcher.
|
2024-02-02 23:29:38 +00:00
|
|
|
func NewV2DataFetcher(config *config.RuntimeConfig, client pbresource.ResourceServiceClient, logger hclog.Logger) *V2DataFetcher {
|
|
|
|
f := &V2DataFetcher{
|
|
|
|
client: client,
|
|
|
|
logger: logger,
|
|
|
|
defaultPartition: config.PartitionOrDefault(),
|
|
|
|
}
|
2024-01-10 16:19:20 +00:00
|
|
|
f.LoadConfig(config)
|
|
|
|
return f
|
|
|
|
}
|
|
|
|
|
2024-01-17 23:46:18 +00:00
|
|
|
// LoadConfig loads the configuration for the V2 data fetcher.
|
2024-01-10 16:19:20 +00:00
|
|
|
func (f *V2DataFetcher) LoadConfig(config *config.RuntimeConfig) {
|
2024-03-01 12:42:42 +00:00
|
|
|
dynamicConfig := &V2DataFetcherDynamicConfig{
|
|
|
|
OnlyPassing: config.DNSOnlyPassing,
|
2024-01-10 16:19:20 +00:00
|
|
|
}
|
|
|
|
f.dynamicConfig.Store(dynamicConfig)
|
|
|
|
}
|
|
|
|
|
2024-03-01 12:42:42 +00:00
|
|
|
// GetConfig loads the configuration for the V2 data fetcher.
|
|
|
|
func (f *V2DataFetcher) GetConfig() *V2DataFetcherDynamicConfig {
|
|
|
|
return f.dynamicConfig.Load().(*V2DataFetcherDynamicConfig)
|
|
|
|
}
|
|
|
|
|
2024-01-17 23:46:18 +00:00
|
|
|
// FetchNodes fetches A/AAAA/CNAME
|
2024-01-10 16:19:20 +00:00
|
|
|
func (f *V2DataFetcher) FetchNodes(ctx Context, req *QueryPayload) ([]*Result, error) {
|
2024-02-12 19:25:45 +00:00
|
|
|
// TODO (v2-dns): NET-6623 - Implement FetchNodes
|
|
|
|
// Make sure that we validate that namespace is not provided here
|
|
|
|
return nil, fmt.Errorf("not implemented")
|
2024-01-10 16:19:20 +00:00
|
|
|
}
|
|
|
|
|
2024-01-17 23:46:18 +00:00
|
|
|
// FetchEndpoints fetches records for A/AAAA/CNAME or SRV requests for services
|
2024-02-06 16:12:04 +00:00
|
|
|
func (f *V2DataFetcher) FetchEndpoints(reqContext Context, req *QueryPayload, lookupType LookupType) ([]*Result, error) {
|
|
|
|
if lookupType != LookupTypeService {
|
|
|
|
return nil, ErrNotSupported
|
|
|
|
}
|
|
|
|
|
2024-03-01 12:42:42 +00:00
|
|
|
configCtx := f.dynamicConfig.Load().(*V2DataFetcherDynamicConfig)
|
2024-02-06 16:12:04 +00:00
|
|
|
|
|
|
|
serviceEndpoints := pbcatalog.ServiceEndpoints{}
|
2024-02-09 22:41:40 +00:00
|
|
|
serviceEndpointsResource, err := f.fetchResource(reqContext, *req, pbcatalog.ServiceEndpointsType, &serviceEndpoints)
|
2024-02-06 16:12:04 +00:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
2024-02-09 22:41:40 +00:00
|
|
|
f.logger.Trace("shuffling endpoints", "name", req.Name, "endpoints", len(serviceEndpoints.Endpoints))
|
|
|
|
|
2024-02-06 16:12:04 +00:00
|
|
|
// Shuffle the endpoints slice
|
|
|
|
shuffleFunc := func(i, j int) {
|
|
|
|
serviceEndpoints.Endpoints[i], serviceEndpoints.Endpoints[j] = serviceEndpoints.Endpoints[j], serviceEndpoints.Endpoints[i]
|
|
|
|
}
|
|
|
|
rand.Shuffle(len(serviceEndpoints.Endpoints), shuffleFunc)
|
|
|
|
|
|
|
|
// Convert the service endpoints to results up to the limit
|
|
|
|
limit := req.Limit
|
|
|
|
if len(serviceEndpoints.Endpoints) < limit || limit == 0 {
|
|
|
|
limit = len(serviceEndpoints.Endpoints)
|
|
|
|
}
|
|
|
|
|
|
|
|
results := make([]*Result, 0, limit)
|
2024-02-09 22:41:40 +00:00
|
|
|
for _, endpoint := range serviceEndpoints.Endpoints[:limit] {
|
|
|
|
|
|
|
|
// First we check the endpoint first to make sure that the requested port is matched from the service.
|
|
|
|
// We error here because we expect all endpoints to have the same ports as the service.
|
|
|
|
ports := getResultPorts(req, endpoint.Ports) //assuming the logic changed in getResultPorts
|
|
|
|
if len(ports) == 0 {
|
|
|
|
f.logger.Debug("could not find matching port in endpoint", "name", req.Name, "port", req.PortName)
|
|
|
|
return nil, ErrNotFound
|
|
|
|
}
|
2024-02-06 16:12:04 +00:00
|
|
|
|
|
|
|
address, err := f.addressFromWorkloadAddresses(endpoint.Addresses, req.Name)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
weight, ok := getEndpointWeight(endpoint, configCtx)
|
|
|
|
if !ok {
|
2024-02-09 22:41:40 +00:00
|
|
|
f.logger.Debug("endpoint filtered out because of health status", "name", req.Name, "endpoint", endpoint.GetTargetRef().GetName())
|
2024-02-06 16:12:04 +00:00
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
|
|
|
result := &Result{
|
|
|
|
Node: &Location{
|
|
|
|
Address: address,
|
|
|
|
Name: endpoint.GetTargetRef().GetName(),
|
|
|
|
},
|
2024-02-09 22:41:40 +00:00
|
|
|
Type: ResultTypeWorkload,
|
2024-02-06 16:12:04 +00:00
|
|
|
Tenancy: ResultTenancy{
|
2024-02-09 22:41:40 +00:00
|
|
|
Namespace: serviceEndpointsResource.GetId().GetTenancy().GetNamespace(),
|
|
|
|
Partition: serviceEndpointsResource.GetId().GetTenancy().GetPartition(),
|
2024-02-06 16:12:04 +00:00
|
|
|
},
|
2024-02-09 16:26:02 +00:00
|
|
|
DNS: DNSConfig{
|
|
|
|
Weight: weight,
|
|
|
|
},
|
2024-02-09 22:41:40 +00:00
|
|
|
Ports: ports,
|
2024-02-06 16:12:04 +00:00
|
|
|
}
|
|
|
|
results = append(results, result)
|
|
|
|
}
|
|
|
|
return results, nil
|
2024-01-10 16:19:20 +00:00
|
|
|
}
|
|
|
|
|
2024-01-17 23:46:18 +00:00
|
|
|
// FetchVirtualIP fetches A/AAAA records for virtual IPs
|
2024-01-10 16:19:20 +00:00
|
|
|
func (f *V2DataFetcher) FetchVirtualIP(ctx Context, req *QueryPayload) (*Result, error) {
|
2024-02-12 19:25:45 +00:00
|
|
|
// TODO (v2-dns): NET-6624 - Implement FetchVirtualIP
|
|
|
|
return nil, fmt.Errorf("not implemented")
|
2024-01-10 16:19:20 +00:00
|
|
|
}
|
|
|
|
|
2024-01-17 23:46:18 +00:00
|
|
|
// FetchRecordsByIp is used for PTR requests to look up a service/node from an IP.
|
2024-01-10 16:19:20 +00:00
|
|
|
func (f *V2DataFetcher) FetchRecordsByIp(ctx Context, ip net.IP) ([]*Result, error) {
|
2024-02-12 19:25:45 +00:00
|
|
|
// TODO (v2-dns): NET-6795 - Implement FetchRecordsByIp
|
|
|
|
// Validate non-nil IP
|
|
|
|
return nil, fmt.Errorf("not implemented")
|
2024-01-10 16:19:20 +00:00
|
|
|
}
|
|
|
|
|
2024-01-17 23:46:18 +00:00
|
|
|
// FetchWorkload is used to fetch a single workload from the V2 catalog.
|
|
|
|
// V2-only.
|
2024-02-02 23:29:38 +00:00
|
|
|
func (f *V2DataFetcher) FetchWorkload(reqContext Context, req *QueryPayload) (*Result, error) {
|
2024-02-06 16:12:04 +00:00
|
|
|
workload := pbcatalog.Workload{}
|
|
|
|
resourceObj, err := f.fetchResource(reqContext, *req, pbcatalog.WorkloadType, &workload)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
2024-02-02 23:29:38 +00:00
|
|
|
}
|
|
|
|
|
2024-02-09 22:41:40 +00:00
|
|
|
// First we check the endpoint first to make sure that the requested port is matched from the service.
|
|
|
|
// We error here because we expect all endpoints to have the same ports as the service.
|
|
|
|
ports := getResultPorts(req, workload.Ports) //assuming the logic changed in getResultPorts
|
|
|
|
if ports == nil || len(ports) == 0 {
|
|
|
|
f.logger.Debug("could not find matching port in endpoint", "name", req.Name, "port", req.PortName)
|
|
|
|
return nil, ErrNotFound
|
|
|
|
}
|
|
|
|
|
2024-02-06 16:12:04 +00:00
|
|
|
address, err := f.addressFromWorkloadAddresses(workload.Addresses, req.Name)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
2024-02-02 23:29:38 +00:00
|
|
|
}
|
|
|
|
|
2024-02-06 16:12:04 +00:00
|
|
|
tenancy := resourceObj.GetId().GetTenancy()
|
2024-02-02 23:29:38 +00:00
|
|
|
result := &Result{
|
2024-02-03 03:23:52 +00:00
|
|
|
Node: &Location{
|
|
|
|
Address: address,
|
2024-02-06 16:12:04 +00:00
|
|
|
Name: resourceObj.GetId().GetName(),
|
2024-02-03 03:23:52 +00:00
|
|
|
},
|
|
|
|
Type: ResultTypeWorkload,
|
2024-02-02 23:29:38 +00:00
|
|
|
Tenancy: ResultTenancy{
|
|
|
|
Namespace: tenancy.GetNamespace(),
|
|
|
|
Partition: tenancy.GetPartition(),
|
|
|
|
},
|
2024-02-09 22:41:40 +00:00
|
|
|
Ports: ports,
|
2024-02-02 23:29:38 +00:00
|
|
|
}
|
|
|
|
|
2024-02-09 22:41:40 +00:00
|
|
|
return result, nil
|
2024-01-10 16:19:20 +00:00
|
|
|
}
|
|
|
|
|
2024-01-17 23:46:18 +00:00
|
|
|
// FetchPreparedQuery is used to fetch a prepared query from the V2 catalog.
|
|
|
|
// Deprecated in V2.
|
2024-01-10 16:19:20 +00:00
|
|
|
func (f *V2DataFetcher) FetchPreparedQuery(ctx Context, req *QueryPayload) ([]*Result, error) {
|
2024-01-29 16:40:10 +00:00
|
|
|
return nil, ErrNotSupported
|
2024-01-10 16:19:20 +00:00
|
|
|
}
|
2024-02-02 23:29:38 +00:00
|
|
|
|
|
|
|
func (f *V2DataFetcher) NormalizeRequest(req *QueryPayload) {
|
|
|
|
// If we do not have an explicit partition in the request, we use the agent's
|
|
|
|
if req.Tenancy.Partition == "" {
|
|
|
|
req.Tenancy.Partition = f.defaultPartition
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// ValidateRequest throws an error is any of the deprecated V1 input fields are used in a QueryByName for this data fetcher.
|
|
|
|
func (f *V2DataFetcher) ValidateRequest(_ Context, req *QueryPayload) error {
|
|
|
|
if req.Tag != "" {
|
|
|
|
return ErrNotSupported
|
|
|
|
}
|
2024-02-03 03:23:52 +00:00
|
|
|
if req.SourceIP != nil {
|
2024-02-02 23:29:38 +00:00
|
|
|
return ErrNotSupported
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2024-02-06 16:12:04 +00:00
|
|
|
// fetchResource is used to read a single resource from the V2 catalog and cast into a concrete type.
|
|
|
|
func (f *V2DataFetcher) fetchResource(reqContext Context, req QueryPayload, kind *pbresource.Type, payload proto.Message) (*pbresource.Resource, error) {
|
|
|
|
// Query the resource service for the ServiceEndpoints by name and tenancy
|
|
|
|
resourceReq := pbresource.ReadRequest{
|
|
|
|
Id: &pbresource.ID{
|
|
|
|
Name: req.Name,
|
|
|
|
Type: kind,
|
|
|
|
Tenancy: queryTenancyToResourceTenancy(req.Tenancy),
|
|
|
|
},
|
|
|
|
}
|
|
|
|
|
2024-02-14 17:40:38 +00:00
|
|
|
f.logger.Trace("fetching "+kind.String(), "name", req.Name)
|
2024-02-06 16:12:04 +00:00
|
|
|
resourceCtx := metadata.AppendToOutgoingContext(context.Background(), "x-consul-token", reqContext.Token)
|
|
|
|
|
|
|
|
// If the service is not found, return nil and an error equivalent to NXDOMAIN
|
|
|
|
response, err := f.client.Read(resourceCtx, &resourceReq)
|
|
|
|
switch {
|
|
|
|
case grpcNotFoundErr(err):
|
|
|
|
f.logger.Debug(kind.String()+" not found", "name", req.Name)
|
|
|
|
return nil, ErrNotFound
|
|
|
|
case err != nil:
|
|
|
|
f.logger.Error("error fetching "+kind.String(), "name", req.Name)
|
|
|
|
return nil, fmt.Errorf("error fetching %s: %w", kind.String(), err)
|
|
|
|
// default: fallthrough
|
|
|
|
}
|
|
|
|
|
|
|
|
data := response.GetResource().GetData()
|
|
|
|
if err := data.UnmarshalTo(payload); err != nil {
|
|
|
|
f.logger.Error("error unmarshalling "+kind.String(), "name", req.Name)
|
|
|
|
return nil, fmt.Errorf("error unmarshalling %s: %w", kind.String(), err)
|
|
|
|
}
|
|
|
|
return response.GetResource(), nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// addressFromWorkloadAddresses returns one address from the workload addresses.
|
|
|
|
func (f *V2DataFetcher) addressFromWorkloadAddresses(addresses []*pbcatalog.WorkloadAddress, name string) (string, error) {
|
|
|
|
// TODO: (v2-dns): we will need to intelligently return the right workload address based on either the translate
|
|
|
|
// address setting or the locality of the requester. Workloads must have at least one.
|
|
|
|
// We also need to make sure that we filter out unix sockets here.
|
|
|
|
address := addresses[0].GetHost()
|
|
|
|
if strings.HasPrefix(address, "unix://") {
|
|
|
|
f.logger.Error("unix sockets are currently unsupported in workload results", "name", name)
|
|
|
|
return "", ErrNotFound
|
|
|
|
}
|
|
|
|
return address, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// getEndpointWeight returns the weight of the endpoint and a boolean indicating if the endpoint should be included
|
|
|
|
// based on it's health status.
|
2024-03-01 12:42:42 +00:00
|
|
|
func getEndpointWeight(endpoint *pbcatalog.Endpoint, configCtx *V2DataFetcherDynamicConfig) (uint32, bool) {
|
2024-02-06 16:12:04 +00:00
|
|
|
health := endpoint.GetHealthStatus().Enum()
|
|
|
|
if health == nil {
|
|
|
|
return 0, false
|
|
|
|
}
|
|
|
|
|
|
|
|
// Filter based on health status and agent config
|
|
|
|
// This is also a good opportunity to see if SRV weights are set
|
|
|
|
var weight uint32
|
|
|
|
switch *health {
|
|
|
|
case pbcatalog.Health_HEALTH_PASSING:
|
|
|
|
weight = endpoint.GetDns().GetWeights().GetPassing()
|
|
|
|
case pbcatalog.Health_HEALTH_CRITICAL:
|
|
|
|
return 0, false // always filtered out
|
|
|
|
case pbcatalog.Health_HEALTH_WARNING:
|
2024-03-01 12:42:42 +00:00
|
|
|
if configCtx.OnlyPassing {
|
2024-02-06 16:12:04 +00:00
|
|
|
return 0, false // filtered out
|
|
|
|
}
|
|
|
|
weight = endpoint.GetDns().GetWeights().GetWarning()
|
|
|
|
default:
|
|
|
|
// Everything else can be filtered out
|
|
|
|
return 0, false
|
|
|
|
}
|
|
|
|
|
|
|
|
// Important! double-check the weight in the case DNS weights are not set
|
|
|
|
if weight == 0 {
|
|
|
|
weight = 1
|
|
|
|
}
|
|
|
|
return weight, true
|
|
|
|
}
|
|
|
|
|
2024-02-09 22:41:40 +00:00
|
|
|
// getResultPorts conditionally returns ports from a map based on a query. The results are sorted by name.
|
|
|
|
func getResultPorts(req *QueryPayload, workloadPorts map[string]*pbcatalog.WorkloadPort) []Port {
|
|
|
|
if len(workloadPorts) == 0 {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
var ports []Port
|
|
|
|
if req.PortName != "" {
|
|
|
|
// Make sure the workload implements that port name.
|
|
|
|
if _, ok := workloadPorts[req.PortName]; !ok {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
// In the case that the query asked for a specific port, we only return that port.
|
|
|
|
ports = []Port{
|
|
|
|
{
|
|
|
|
Name: req.PortName,
|
|
|
|
Number: workloadPorts[req.PortName].Port,
|
|
|
|
},
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
// If the client didn't specify a particular port, return all the workload ports.
|
|
|
|
for name, port := range workloadPorts {
|
|
|
|
ports = append(ports, Port{
|
|
|
|
Name: name,
|
|
|
|
Number: port.Port,
|
|
|
|
})
|
|
|
|
}
|
|
|
|
// Stable Sort
|
|
|
|
slices.SortStableFunc(ports, func(i, j Port) int {
|
|
|
|
if i.Name < j.Name {
|
|
|
|
return -1
|
|
|
|
} else if i.Name > j.Name {
|
|
|
|
return 1
|
|
|
|
}
|
|
|
|
return 0
|
|
|
|
})
|
|
|
|
}
|
|
|
|
return ports
|
|
|
|
}
|
|
|
|
|
2024-02-06 16:12:04 +00:00
|
|
|
// queryTenancyToResourceTenancy converts a QueryTenancy to a pbresource.Tenancy.
|
2024-02-02 23:29:38 +00:00
|
|
|
func queryTenancyToResourceTenancy(qTenancy QueryTenancy) *pbresource.Tenancy {
|
|
|
|
rTenancy := resource.DefaultNamespacedTenancy()
|
|
|
|
|
|
|
|
// If the request has any tenancy specified, it overrides the defaults.
|
|
|
|
if qTenancy.Namespace != "" {
|
|
|
|
rTenancy.Namespace = qTenancy.Namespace
|
|
|
|
}
|
|
|
|
// In the case of partition, we have the agent's partition as the fallback.
|
2024-04-22 18:30:43 +00:00
|
|
|
// That is handled in NormalizeRequest.
|
2024-02-02 23:29:38 +00:00
|
|
|
if qTenancy.Partition != "" {
|
|
|
|
rTenancy.Partition = qTenancy.Partition
|
|
|
|
}
|
|
|
|
|
|
|
|
return rTenancy
|
|
|
|
}
|
|
|
|
|
|
|
|
// grpcNotFoundErr returns true if the error is a gRPC status error with a code of NotFound.
|
|
|
|
func grpcNotFoundErr(err error) bool {
|
|
|
|
if err == nil {
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
s, ok := status.FromError(err)
|
|
|
|
return ok && s.Code() == codes.NotFound
|
|
|
|
}
|