2017-07-06 10:40:54 +00:00
|
|
|
package router
|
2017-03-14 01:54:34 +00:00
|
|
|
|
|
|
|
import (
|
|
|
|
"fmt"
|
|
|
|
"log"
|
2017-03-14 05:56:24 +00:00
|
|
|
"sort"
|
2017-03-14 01:54:34 +00:00
|
|
|
"sync"
|
|
|
|
|
pkg refactor
command/agent/* -> agent/*
command/consul/* -> agent/consul/*
command/agent/command{,_test}.go -> command/agent{,_test}.go
command/base/command.go -> command/base.go
command/base/* -> command/*
commands.go -> command/commands.go
The script which did the refactor is:
(
cd $GOPATH/src/github.com/hashicorp/consul
git mv command/agent/command.go command/agent.go
git mv command/agent/command_test.go command/agent_test.go
git mv command/agent/flag_slice_value{,_test}.go command/
git mv command/agent .
git mv command/base/command.go command/base.go
git mv command/base/config_util{,_test}.go command/
git mv commands.go command/
git mv consul agent
rmdir command/base/
gsed -i -e 's|package agent|package command|' command/agent{,_test}.go
gsed -i -e 's|package agent|package command|' command/flag_slice_value{,_test}.go
gsed -i -e 's|package base|package command|' command/base.go command/config_util{,_test}.go
gsed -i -e 's|package main|package command|' command/commands.go
gsed -i -e 's|base.Command|BaseCommand|' command/commands.go
gsed -i -e 's|agent.Command|AgentCommand|' command/commands.go
gsed -i -e 's|\tCommand:|\tBaseCommand:|' command/commands.go
gsed -i -e 's|base\.||' command/commands.go
gsed -i -e 's|command\.||' command/commands.go
gsed -i -e 's|command|c|' main.go
gsed -i -e 's|range Commands|range command.Commands|' main.go
gsed -i -e 's|Commands: Commands|Commands: command.Commands|' main.go
gsed -i -e 's|base\.BoolValue|BoolValue|' command/operator_autopilot_set.go
gsed -i -e 's|base\.DurationValue|DurationValue|' command/operator_autopilot_set.go
gsed -i -e 's|base\.StringValue|StringValue|' command/operator_autopilot_set.go
gsed -i -e 's|base\.UintValue|UintValue|' command/operator_autopilot_set.go
gsed -i -e 's|\bCommand\b|BaseCommand|' command/base.go
gsed -i -e 's|BaseCommand Options|Command Options|' command/base.go
gsed -i -e 's|base.Command|BaseCommand|' command/*.go
gsed -i -e 's|c\.Command|c.BaseCommand|g' command/*.go
gsed -i -e 's|\tCommand:|\tBaseCommand:|' command/*_test.go
gsed -i -e 's|base\.||' command/*_test.go
gsed -i -e 's|\bCommand\b|AgentCommand|' command/agent{,_test}.go
gsed -i -e 's|cmd.AgentCommand|cmd.BaseCommand|' command/agent.go
gsed -i -e 's|cli.AgentCommand = new(Command)|cli.Command = new(AgentCommand)|' command/agent_test.go
gsed -i -e 's|exec.AgentCommand|exec.Command|' command/agent_test.go
gsed -i -e 's|exec.BaseCommand|exec.Command|' command/agent_test.go
gsed -i -e 's|NewTestAgent|agent.NewTestAgent|' command/agent_test.go
gsed -i -e 's|= TestConfig|= agent.TestConfig|' command/agent_test.go
gsed -i -e 's|: RetryJoin|: agent.RetryJoin|' command/agent_test.go
gsed -i -e 's|\.\./\.\./|../|' command/config_util_test.go
gsed -i -e 's|\bverifyUniqueListeners|VerifyUniqueListeners|' agent/config{,_test}.go command/agent.go
gsed -i -e 's|\bserfLANKeyring\b|SerfLANKeyring|g' agent/{agent,keyring,testagent}.go command/agent.go
gsed -i -e 's|\bserfWANKeyring\b|SerfWANKeyring|g' agent/{agent,keyring,testagent}.go command/agent.go
gsed -i -e 's|\bNewAgent\b|agent.New|g' command/agent{,_test}.go
gsed -i -e 's|\bNewAgent|New|' agent/{acl_test,agent,testagent}.go
gsed -i -e 's|\bAgent\b|agent.&|g' command/agent{,_test}.go
gsed -i -e 's|\bBool\b|agent.&|g' command/agent{,_test}.go
gsed -i -e 's|\bConfig\b|agent.&|g' command/agent{,_test}.go
gsed -i -e 's|\bDefaultConfig\b|agent.&|g' command/agent{,_test}.go
gsed -i -e 's|\bDevConfig\b|agent.&|g' command/agent{,_test}.go
gsed -i -e 's|\bMergeConfig\b|agent.&|g' command/agent{,_test}.go
gsed -i -e 's|\bReadConfigPaths\b|agent.&|g' command/agent{,_test}.go
gsed -i -e 's|\bParseMetaPair\b|agent.&|g' command/agent{,_test}.go
gsed -i -e 's|\bSerfLANKeyring\b|agent.&|g' command/agent{,_test}.go
gsed -i -e 's|\bSerfWANKeyring\b|agent.&|g' command/agent{,_test}.go
gsed -i -e 's|circonus\.agent|circonus|g' command/agent{,_test}.go
gsed -i -e 's|logger\.agent|logger|g' command/agent{,_test}.go
gsed -i -e 's|metrics\.agent|metrics|g' command/agent{,_test}.go
gsed -i -e 's|// agent.Agent|// agent|' command/agent{,_test}.go
gsed -i -e 's|a\.agent\.Config|a.Config|' command/agent{,_test}.go
gsed -i -e 's|agent\.AppendSliceValue|AppendSliceValue|' command/{configtest,validate}.go
gsed -i -e 's|consul/consul|agent/consul|' GNUmakefile
gsed -i -e 's|\.\./test|../../test|' agent/consul/server_test.go
# fix imports
f=$(grep -rl 'github.com/hashicorp/consul/command/agent' * | grep '\.go')
gsed -i -e 's|github.com/hashicorp/consul/command/agent|github.com/hashicorp/consul/agent|' $f
goimports -w $f
f=$(grep -rl 'github.com/hashicorp/consul/consul' * | grep '\.go')
gsed -i -e 's|github.com/hashicorp/consul/consul|github.com/hashicorp/consul/agent/consul|' $f
goimports -w $f
goimports -w command/*.go main.go
)
2017-06-09 22:28:28 +00:00
|
|
|
"github.com/hashicorp/consul/agent/consul/agent"
|
2017-07-06 10:34:00 +00:00
|
|
|
"github.com/hashicorp/consul/agent/structs"
|
2017-03-14 05:56:24 +00:00
|
|
|
"github.com/hashicorp/consul/lib"
|
2017-03-14 01:54:34 +00:00
|
|
|
"github.com/hashicorp/consul/types"
|
|
|
|
"github.com/hashicorp/serf/coordinate"
|
|
|
|
"github.com/hashicorp/serf/serf"
|
|
|
|
)
|
|
|
|
|
2017-03-14 23:39:00 +00:00
|
|
|
// Router keeps track of a set of network areas and their associated Serf
|
|
|
|
// membership of Consul servers. It then indexes this by datacenter to provide
|
|
|
|
// healthy routes to servers by datacenter.
|
2017-03-14 01:54:34 +00:00
|
|
|
type Router struct {
|
2017-03-14 23:39:00 +00:00
|
|
|
// logger is used for diagnostic output.
|
2017-03-14 01:54:34 +00:00
|
|
|
logger *log.Logger
|
|
|
|
|
2017-03-14 23:39:00 +00:00
|
|
|
// localDatacenter has the name of the router's home datacenter. This is
|
|
|
|
// used to short-circuit RTT calculations for local servers.
|
2017-03-14 05:56:24 +00:00
|
|
|
localDatacenter string
|
2017-03-14 23:39:00 +00:00
|
|
|
|
|
|
|
// areas maps area IDs to structures holding information about that
|
|
|
|
// area.
|
|
|
|
areas map[types.AreaID]*areaInfo
|
|
|
|
|
|
|
|
// managers is an index from datacenter names to a list of server
|
|
|
|
// managers for that datacenter. This is used to quickly lookup routes.
|
|
|
|
managers map[string][]*Manager
|
2017-03-14 01:54:34 +00:00
|
|
|
|
2017-03-15 15:08:37 +00:00
|
|
|
// routeFn is a hook to actually do the routing.
|
|
|
|
routeFn func(datacenter string) (*Manager, *agent.Server, bool)
|
|
|
|
|
2017-06-02 23:33:48 +00:00
|
|
|
// isShutdown prevents adding new routes to a router after it is shut
|
|
|
|
// down.
|
|
|
|
isShutdown bool
|
|
|
|
|
2017-03-14 01:54:34 +00:00
|
|
|
// This top-level lock covers all the internal state.
|
|
|
|
sync.RWMutex
|
|
|
|
}
|
|
|
|
|
|
|
|
// RouterSerfCluster is an interface wrapper around Serf in order to make this
|
|
|
|
// easier to unit test.
|
|
|
|
type RouterSerfCluster interface {
|
|
|
|
NumNodes() int
|
|
|
|
Members() []serf.Member
|
|
|
|
GetCoordinate() (*coordinate.Coordinate, error)
|
2017-03-14 23:39:00 +00:00
|
|
|
GetCachedCoordinate(name string) (*coordinate.Coordinate, bool)
|
2017-03-14 01:54:34 +00:00
|
|
|
}
|
|
|
|
|
2017-03-14 23:39:00 +00:00
|
|
|
// managerInfo holds a server manager for a datacenter along with its associated
|
|
|
|
// shutdown channel.
|
2017-03-14 01:54:34 +00:00
|
|
|
type managerInfo struct {
|
2017-03-14 23:39:00 +00:00
|
|
|
// manager is notified about servers for this datacenter.
|
|
|
|
manager *Manager
|
|
|
|
|
|
|
|
// shutdownCh is only given to this manager so we can shut it down when
|
|
|
|
// all servers for this datacenter are gone.
|
2017-03-14 01:54:34 +00:00
|
|
|
shutdownCh chan struct{}
|
|
|
|
}
|
|
|
|
|
2017-03-14 23:39:00 +00:00
|
|
|
// areaInfo holds information about a given network area.
|
2017-03-14 01:54:34 +00:00
|
|
|
type areaInfo struct {
|
2017-03-14 23:39:00 +00:00
|
|
|
// cluster is the Serf instance for this network area.
|
|
|
|
cluster RouterSerfCluster
|
|
|
|
|
|
|
|
// pinger is used to ping servers in this network area when trying to
|
|
|
|
// find a new, healthy server to talk to.
|
|
|
|
pinger Pinger
|
|
|
|
|
|
|
|
// managers maps datacenter names to managers for that datacenter in
|
|
|
|
// this area.
|
2017-03-14 01:54:34 +00:00
|
|
|
managers map[string]*managerInfo
|
2017-07-15 00:31:52 +00:00
|
|
|
|
|
|
|
// useTLS specifies whether to use TLS to communicate for this network area.
|
|
|
|
useTLS bool
|
2017-03-14 01:54:34 +00:00
|
|
|
}
|
|
|
|
|
2017-06-02 23:33:48 +00:00
|
|
|
// NewRouter returns a new Router with the given configuration.
|
|
|
|
func NewRouter(logger *log.Logger, localDatacenter string) *Router {
|
2017-03-14 01:54:34 +00:00
|
|
|
router := &Router{
|
2017-03-14 05:56:24 +00:00
|
|
|
logger: logger,
|
|
|
|
localDatacenter: localDatacenter,
|
|
|
|
areas: make(map[types.AreaID]*areaInfo),
|
|
|
|
managers: make(map[string][]*Manager),
|
2017-03-14 01:54:34 +00:00
|
|
|
}
|
|
|
|
|
2017-03-15 15:08:37 +00:00
|
|
|
// Hook the direct route lookup by default.
|
|
|
|
router.routeFn = router.findDirectRoute
|
|
|
|
|
2017-06-02 23:33:48 +00:00
|
|
|
return router
|
|
|
|
}
|
|
|
|
|
|
|
|
// Shutdown removes all areas from the router, which stops all their respective
|
|
|
|
// managers. No new areas can be added after the router is shut down.
|
|
|
|
func (r *Router) Shutdown() {
|
|
|
|
r.Lock()
|
|
|
|
defer r.Unlock()
|
2017-03-14 01:54:34 +00:00
|
|
|
|
2017-06-02 23:33:48 +00:00
|
|
|
for areaID, area := range r.areas {
|
|
|
|
for datacenter, info := range area.managers {
|
|
|
|
r.removeManagerFromIndex(datacenter, info.manager)
|
|
|
|
close(info.shutdownCh)
|
2017-03-14 01:54:34 +00:00
|
|
|
}
|
|
|
|
|
2017-06-02 23:33:48 +00:00
|
|
|
delete(r.areas, areaID)
|
|
|
|
}
|
2017-03-14 01:54:34 +00:00
|
|
|
|
2017-06-02 23:33:48 +00:00
|
|
|
r.isShutdown = true
|
2017-03-14 01:54:34 +00:00
|
|
|
}
|
|
|
|
|
2017-03-14 23:39:00 +00:00
|
|
|
// AddArea registers a new network area with the router.
|
2017-07-15 00:31:52 +00:00
|
|
|
func (r *Router) AddArea(areaID types.AreaID, cluster RouterSerfCluster, pinger Pinger, useTLS bool) error {
|
2017-03-14 01:54:34 +00:00
|
|
|
r.Lock()
|
|
|
|
defer r.Unlock()
|
|
|
|
|
2017-06-02 23:33:48 +00:00
|
|
|
if r.isShutdown {
|
|
|
|
return fmt.Errorf("cannot add area, router is shut down")
|
|
|
|
}
|
|
|
|
|
2017-03-14 01:54:34 +00:00
|
|
|
if _, ok := r.areas[areaID]; ok {
|
|
|
|
return fmt.Errorf("area ID %q already exists", areaID)
|
|
|
|
}
|
|
|
|
|
2017-03-14 23:39:00 +00:00
|
|
|
area := &areaInfo{
|
2017-03-14 01:54:34 +00:00
|
|
|
cluster: cluster,
|
|
|
|
pinger: pinger,
|
|
|
|
managers: make(map[string]*managerInfo),
|
2017-07-15 00:31:52 +00:00
|
|
|
useTLS: useTLS,
|
2017-03-14 01:54:34 +00:00
|
|
|
}
|
2017-03-14 23:39:00 +00:00
|
|
|
r.areas[areaID] = area
|
|
|
|
|
|
|
|
// Do an initial populate of the manager so that we don't have to wait
|
|
|
|
// for events to fire. This lets us attempt to use all the known servers
|
|
|
|
// initially, and then will quickly detect that they are failed if we
|
|
|
|
// can't reach them.
|
|
|
|
for _, m := range cluster.Members() {
|
|
|
|
ok, parts := agent.IsConsulServer(m)
|
|
|
|
if !ok {
|
|
|
|
r.logger.Printf("[WARN]: consul: Non-server %q in server-only area %q",
|
|
|
|
m.Name, areaID)
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
|
|
|
if err := r.addServer(area, parts); err != nil {
|
|
|
|
return fmt.Errorf("failed to add server %q to area %q: %v", m.Name, areaID, err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2017-03-14 01:54:34 +00:00
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// removeManagerFromIndex does cleanup to take a manager out of the index of
|
|
|
|
// datacenters. This assumes the lock is already held for writing, and will
|
|
|
|
// panic if the given manager isn't found.
|
|
|
|
func (r *Router) removeManagerFromIndex(datacenter string, manager *Manager) {
|
|
|
|
managers := r.managers[datacenter]
|
|
|
|
for i := 0; i < len(managers); i++ {
|
|
|
|
if managers[i] == manager {
|
|
|
|
r.managers[datacenter] = append(managers[:i], managers[i+1:]...)
|
2017-03-14 23:39:00 +00:00
|
|
|
if len(r.managers[datacenter]) == 0 {
|
|
|
|
delete(r.managers, datacenter)
|
|
|
|
}
|
2017-03-14 01:54:34 +00:00
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
|
|
|
panic("managers index out of sync")
|
|
|
|
}
|
|
|
|
|
2017-07-15 00:31:52 +00:00
|
|
|
// Returns whether TLS is enabled for the given area ID
|
|
|
|
func (r *Router) TLSEnabled(areaID types.AreaID) (bool, error) {
|
|
|
|
r.RLock()
|
|
|
|
defer r.RUnlock()
|
|
|
|
|
|
|
|
area, ok := r.areas[areaID]
|
|
|
|
if !ok {
|
|
|
|
return false, fmt.Errorf("area ID %q does not exist", areaID)
|
|
|
|
}
|
|
|
|
|
|
|
|
return area.useTLS, nil
|
|
|
|
}
|
|
|
|
|
2017-03-14 23:39:00 +00:00
|
|
|
// RemoveArea removes an existing network area from the router.
|
2017-03-14 01:54:34 +00:00
|
|
|
func (r *Router) RemoveArea(areaID types.AreaID) error {
|
|
|
|
r.Lock()
|
|
|
|
defer r.Unlock()
|
|
|
|
|
|
|
|
area, ok := r.areas[areaID]
|
|
|
|
if !ok {
|
|
|
|
return fmt.Errorf("area ID %q does not exist", areaID)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Remove all of this area's managers from the index and shut them down.
|
|
|
|
for datacenter, info := range area.managers {
|
|
|
|
r.removeManagerFromIndex(datacenter, info.manager)
|
|
|
|
close(info.shutdownCh)
|
|
|
|
}
|
|
|
|
|
|
|
|
delete(r.areas, areaID)
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2017-03-14 23:39:00 +00:00
|
|
|
// addServer does the work of AddServer once the write lock is held.
|
|
|
|
func (r *Router) addServer(area *areaInfo, s *agent.Server) error {
|
2017-03-14 01:54:34 +00:00
|
|
|
// Make the manager on the fly if this is the first we've seen of it,
|
|
|
|
// and add it to the index.
|
|
|
|
info, ok := area.managers[s.Datacenter]
|
|
|
|
if !ok {
|
|
|
|
shutdownCh := make(chan struct{})
|
|
|
|
manager := New(r.logger, shutdownCh, area.cluster, area.pinger)
|
|
|
|
info = &managerInfo{
|
|
|
|
manager: manager,
|
|
|
|
shutdownCh: shutdownCh,
|
|
|
|
}
|
2017-03-14 23:39:00 +00:00
|
|
|
area.managers[s.Datacenter] = info
|
2017-03-14 01:54:34 +00:00
|
|
|
|
|
|
|
managers := r.managers[s.Datacenter]
|
|
|
|
r.managers[s.Datacenter] = append(managers, manager)
|
2017-03-15 00:47:37 +00:00
|
|
|
go manager.Start()
|
2017-03-14 01:54:34 +00:00
|
|
|
}
|
|
|
|
|
2017-07-15 00:31:52 +00:00
|
|
|
// If TLS is enabled for the area, set it on the server so the manager
|
|
|
|
// knows to use TLS when pinging it.
|
|
|
|
if area.useTLS {
|
|
|
|
s.UseTLS = true
|
|
|
|
}
|
|
|
|
|
2017-03-14 01:54:34 +00:00
|
|
|
info.manager.AddServer(s)
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2017-03-14 23:39:00 +00:00
|
|
|
// AddServer should be called whenever a new server joins an area. This is
|
|
|
|
// typically hooked into the Serf event handler area for this area.
|
|
|
|
func (r *Router) AddServer(areaID types.AreaID, s *agent.Server) error {
|
|
|
|
r.Lock()
|
|
|
|
defer r.Unlock()
|
|
|
|
|
|
|
|
area, ok := r.areas[areaID]
|
|
|
|
if !ok {
|
|
|
|
return fmt.Errorf("area ID %q does not exist", areaID)
|
|
|
|
}
|
|
|
|
return r.addServer(area, s)
|
|
|
|
}
|
|
|
|
|
|
|
|
// RemoveServer should be called whenever a server is removed from an area. This
|
|
|
|
// is typically hooked into the Serf event handler area for this area.
|
2017-03-14 01:54:34 +00:00
|
|
|
func (r *Router) RemoveServer(areaID types.AreaID, s *agent.Server) error {
|
|
|
|
r.Lock()
|
|
|
|
defer r.Unlock()
|
|
|
|
|
|
|
|
area, ok := r.areas[areaID]
|
|
|
|
if !ok {
|
|
|
|
return fmt.Errorf("area ID %q does not exist", areaID)
|
|
|
|
}
|
|
|
|
|
|
|
|
// If the manager has already been removed we just quietly exit. This
|
|
|
|
// can get called by Serf events, so the timing isn't totally
|
|
|
|
// deterministic.
|
|
|
|
info, ok := area.managers[s.Datacenter]
|
|
|
|
if !ok {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
info.manager.RemoveServer(s)
|
|
|
|
|
|
|
|
// If this manager is empty then remove it so we don't accumulate cruft
|
|
|
|
// and waste time during request routing.
|
|
|
|
if num := info.manager.NumServers(); num == 0 {
|
|
|
|
r.removeManagerFromIndex(s.Datacenter, info.manager)
|
|
|
|
close(info.shutdownCh)
|
|
|
|
delete(area.managers, s.Datacenter)
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2017-03-14 23:39:00 +00:00
|
|
|
// FailServer should be called whenever a server is failed in an area. This
|
|
|
|
// is typically hooked into the Serf event handler area for this area. We will
|
|
|
|
// immediately shift traffic away from this server, but it will remain in the
|
|
|
|
// list of servers.
|
2017-03-14 01:54:34 +00:00
|
|
|
func (r *Router) FailServer(areaID types.AreaID, s *agent.Server) error {
|
|
|
|
r.RLock()
|
|
|
|
defer r.RUnlock()
|
|
|
|
|
|
|
|
area, ok := r.areas[areaID]
|
|
|
|
if !ok {
|
|
|
|
return fmt.Errorf("area ID %q does not exist", areaID)
|
|
|
|
}
|
|
|
|
|
|
|
|
// If the manager has already been removed we just quietly exit. This
|
|
|
|
// can get called by Serf events, so the timing isn't totally
|
|
|
|
// deterministic.
|
|
|
|
info, ok := area.managers[s.Datacenter]
|
|
|
|
if !ok {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
info.manager.NotifyFailedServer(s)
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2017-03-14 23:39:00 +00:00
|
|
|
// FindRoute returns a healthy server with a route to the given datacenter. The
|
|
|
|
// Boolean return parameter will indicate if a server was available. In some
|
|
|
|
// cases this may return a best-effort unhealthy server that can be used for a
|
|
|
|
// connection attempt. If any problem occurs with the given server, the caller
|
|
|
|
// should feed that back to the manager associated with the server, which is
|
|
|
|
// also returned, by calling NofifyFailedServer().
|
|
|
|
func (r *Router) FindRoute(datacenter string) (*Manager, *agent.Server, bool) {
|
2017-03-15 15:08:37 +00:00
|
|
|
return r.routeFn(datacenter)
|
|
|
|
}
|
|
|
|
|
|
|
|
// findDirectRoute looks for a route to the given datacenter if it's directly
|
|
|
|
// adjacent to the server.
|
|
|
|
func (r *Router) findDirectRoute(datacenter string) (*Manager, *agent.Server, bool) {
|
2017-03-14 23:39:00 +00:00
|
|
|
r.RLock()
|
|
|
|
defer r.RUnlock()
|
|
|
|
|
|
|
|
// Get the list of managers for this datacenter. This will usually just
|
|
|
|
// have one entry, but it's possible to have a user-defined area + WAN.
|
|
|
|
managers, ok := r.managers[datacenter]
|
|
|
|
if !ok {
|
|
|
|
return nil, nil, false
|
|
|
|
}
|
|
|
|
|
|
|
|
// Try each manager until we get a server.
|
|
|
|
for _, manager := range managers {
|
2017-03-15 00:47:37 +00:00
|
|
|
if manager.IsOffline() {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
2017-03-14 23:39:00 +00:00
|
|
|
if s := manager.FindServer(); s != nil {
|
|
|
|
return manager, s, true
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Didn't find a route (even via an unhealthy server).
|
|
|
|
return nil, nil, false
|
|
|
|
}
|
|
|
|
|
|
|
|
// GetDatacenters returns a list of datacenters known to the router, sorted by
|
|
|
|
// name.
|
2017-03-14 01:54:34 +00:00
|
|
|
func (r *Router) GetDatacenters() []string {
|
|
|
|
r.RLock()
|
|
|
|
defer r.RUnlock()
|
|
|
|
|
|
|
|
dcs := make([]string, 0, len(r.managers))
|
2017-04-20 18:42:22 +00:00
|
|
|
for dc := range r.managers {
|
2017-03-14 01:54:34 +00:00
|
|
|
dcs = append(dcs, dc)
|
|
|
|
}
|
2017-03-14 05:56:24 +00:00
|
|
|
|
|
|
|
sort.Strings(dcs)
|
2017-03-14 01:54:34 +00:00
|
|
|
return dcs
|
|
|
|
}
|
|
|
|
|
2017-03-14 05:56:24 +00:00
|
|
|
// datacenterSorter takes a list of DC names and a parallel vector of distances
|
|
|
|
// and implements sort.Interface, keeping both structures coherent and sorting
|
|
|
|
// by distance.
|
|
|
|
type datacenterSorter struct {
|
|
|
|
Names []string
|
|
|
|
Vec []float64
|
|
|
|
}
|
|
|
|
|
|
|
|
// See sort.Interface.
|
|
|
|
func (n *datacenterSorter) Len() int {
|
|
|
|
return len(n.Names)
|
|
|
|
}
|
|
|
|
|
|
|
|
// See sort.Interface.
|
|
|
|
func (n *datacenterSorter) Swap(i, j int) {
|
|
|
|
n.Names[i], n.Names[j] = n.Names[j], n.Names[i]
|
|
|
|
n.Vec[i], n.Vec[j] = n.Vec[j], n.Vec[i]
|
|
|
|
}
|
|
|
|
|
|
|
|
// See sort.Interface.
|
|
|
|
func (n *datacenterSorter) Less(i, j int) bool {
|
|
|
|
return n.Vec[i] < n.Vec[j]
|
|
|
|
}
|
|
|
|
|
2017-03-14 23:39:00 +00:00
|
|
|
// GetDatacentersByDeistance returns a list of datacenters known to the router,
|
|
|
|
// sorted by median RTT from this server to the servers in each datacenter. If
|
|
|
|
// there are multiple areas that reach a given datacenter, this will use the
|
|
|
|
// lowest RTT for the sort.
|
2017-03-14 05:56:24 +00:00
|
|
|
func (r *Router) GetDatacentersByDistance() ([]string, error) {
|
|
|
|
r.RLock()
|
|
|
|
defer r.RUnlock()
|
|
|
|
|
2017-03-14 06:29:58 +00:00
|
|
|
// Go through each area and aggregate the median RTT from the current
|
|
|
|
// server to the other servers in each datacenter.
|
2017-03-14 05:56:24 +00:00
|
|
|
dcs := make(map[string]float64)
|
|
|
|
for areaID, info := range r.areas {
|
|
|
|
index := make(map[string][]float64)
|
|
|
|
coord, err := info.cluster.GetCoordinate()
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
for _, m := range info.cluster.Members() {
|
|
|
|
ok, parts := agent.IsConsulServer(m)
|
|
|
|
if !ok {
|
|
|
|
r.logger.Printf("[WARN]: consul: Non-server %q in server-only area %q",
|
|
|
|
m.Name, areaID)
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
|
|
|
existing := index[parts.Datacenter]
|
|
|
|
if parts.Datacenter == r.localDatacenter {
|
|
|
|
// Everything in the local datacenter looks like zero RTT.
|
|
|
|
index[parts.Datacenter] = append(existing, 0.0)
|
|
|
|
} else {
|
|
|
|
// It's OK to get a nil coordinate back, ComputeDistance
|
|
|
|
// will put the RTT at positive infinity.
|
|
|
|
other, _ := info.cluster.GetCachedCoordinate(parts.Name)
|
|
|
|
rtt := lib.ComputeDistance(coord, other)
|
|
|
|
index[parts.Datacenter] = append(existing, rtt)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Compute the median RTT between this server and the servers
|
|
|
|
// in each datacenter. We accumulate the lowest RTT to each DC
|
|
|
|
// in the master map, since a given DC might appear in multiple
|
|
|
|
// areas.
|
|
|
|
for dc, rtts := range index {
|
2017-03-14 06:29:58 +00:00
|
|
|
sort.Float64s(rtts)
|
|
|
|
rtt := rtts[len(rtts)/2]
|
2017-03-14 05:56:24 +00:00
|
|
|
|
|
|
|
current, ok := dcs[dc]
|
|
|
|
if !ok || (ok && rtt < current) {
|
|
|
|
dcs[dc] = rtt
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// First sort by DC name, since we do a stable sort later.
|
|
|
|
names := make([]string, 0, len(dcs))
|
2017-04-20 18:42:22 +00:00
|
|
|
for dc := range dcs {
|
2017-03-14 05:56:24 +00:00
|
|
|
names = append(names, dc)
|
|
|
|
}
|
|
|
|
sort.Strings(names)
|
|
|
|
|
|
|
|
// Then stable sort by median RTT.
|
2017-03-14 06:29:58 +00:00
|
|
|
rtts := make([]float64, 0, len(dcs))
|
2017-03-14 05:56:24 +00:00
|
|
|
for _, dc := range names {
|
2017-03-14 06:29:58 +00:00
|
|
|
rtts = append(rtts, dcs[dc])
|
2017-03-14 05:56:24 +00:00
|
|
|
}
|
2017-03-14 06:29:58 +00:00
|
|
|
sort.Stable(&datacenterSorter{names, rtts})
|
2017-03-14 05:56:24 +00:00
|
|
|
return names, nil
|
|
|
|
}
|
|
|
|
|
2017-03-14 23:39:00 +00:00
|
|
|
// GetDatacenterMaps returns a structure with the raw network coordinates of
|
|
|
|
// each known server, organized by datacenter and network area.
|
2017-03-14 01:54:34 +00:00
|
|
|
func (r *Router) GetDatacenterMaps() ([]structs.DatacenterMap, error) {
|
|
|
|
r.RLock()
|
|
|
|
defer r.RUnlock()
|
|
|
|
|
|
|
|
var maps []structs.DatacenterMap
|
|
|
|
for areaID, info := range r.areas {
|
|
|
|
index := make(map[string]structs.Coordinates)
|
|
|
|
for _, m := range info.cluster.Members() {
|
|
|
|
ok, parts := agent.IsConsulServer(m)
|
|
|
|
if !ok {
|
|
|
|
r.logger.Printf("[WARN]: consul: Non-server %q in server-only area %q",
|
|
|
|
m.Name, areaID)
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
|
|
|
coord, ok := info.cluster.GetCachedCoordinate(parts.Name)
|
|
|
|
if ok {
|
|
|
|
entry := &structs.Coordinate{
|
|
|
|
Node: parts.Name,
|
|
|
|
Coord: coord,
|
|
|
|
}
|
|
|
|
existing := index[parts.Datacenter]
|
|
|
|
index[parts.Datacenter] = append(existing, entry)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
for dc, coords := range index {
|
|
|
|
entry := structs.DatacenterMap{
|
|
|
|
Datacenter: dc,
|
|
|
|
AreaID: areaID,
|
|
|
|
Coordinates: coords,
|
|
|
|
}
|
|
|
|
maps = append(maps, entry)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return maps, nil
|
|
|
|
}
|
2017-08-02 21:44:40 +00:00
|
|
|
|
2017-08-03 16:39:50 +00:00
|
|
|
func (r *Router) FindServerAddrs(datacenter string) (map[string]string, error) {
|
2017-08-02 21:44:40 +00:00
|
|
|
r.RLock()
|
|
|
|
defer r.RUnlock()
|
|
|
|
|
|
|
|
// Get the list of managers for this datacenter. This will usually just
|
|
|
|
// have one entry, but it's possible to have a user-defined area + WAN.
|
|
|
|
managers, ok := r.managers[datacenter]
|
|
|
|
if !ok {
|
|
|
|
return nil, fmt.Errorf("datacenter %v not found", datacenter)
|
|
|
|
}
|
|
|
|
|
2017-08-03 16:39:50 +00:00
|
|
|
ret := make(map[string]string)
|
2017-08-02 21:44:40 +00:00
|
|
|
for _, manager := range managers {
|
|
|
|
if manager.IsOffline() {
|
|
|
|
continue
|
|
|
|
}
|
2017-08-03 16:39:50 +00:00
|
|
|
for name, addr := range manager.GetServerAddrs() {
|
|
|
|
ret[name] = addr
|
|
|
|
}
|
2017-08-02 21:44:40 +00:00
|
|
|
}
|
|
|
|
return ret, nil
|
|
|
|
}
|