package connect import ( "context" "fmt" "math/rand" "sync" "github.com/hashicorp/consul/agent/connect" "github.com/hashicorp/consul/api" ) // Resolver is the interface implemented by a service discovery mechanism to get // the address and identity of an instance to connect to via Connect as a // client. type Resolver interface { // Resolve returns a single service instance to connect to. Implementations // may attempt to ensure the instance returned is currently available. It is // expected that a client will re-dial on a connection failure so making an // effort to return a different service instance each time where available // increases reliability. The context passed can be used to impose timeouts // which may or may not be respected by implementations that make network // calls to resolve the service. The addr returned is a string in any valid // form for passing directly to `net.Dial("tcp", addr)`. The certURI // represents the identity of the service instance. It will be matched against // the TLS certificate URI SAN presented by the server and the connection // rejected if they don't match. Resolve(ctx context.Context) (addr string, certURI connect.CertURI, err error) } // StaticResolver is a statically defined resolver. This can be used to connect // to an known-Connect endpoint without performing service discovery. type StaticResolver struct { // Addr is the network address (including port) of the instance. It must be // the connect-enabled mTLS server and may be a proxy in front of the actual // target service process. It is a string in any valid form for passing // directly to `net.Dial("tcp", addr)`. Addr string // CertURL is the _identity_ we expect the server to present in it's TLS // certificate. It must be an exact URI string match or the connection will be // rejected. CertURI connect.CertURI } // Resolve implements Resolver by returning the static values. func (sr *StaticResolver) Resolve(ctx context.Context) (string, connect.CertURI, error) { return sr.Addr, sr.CertURI, nil } const ( // ConsulResolverTypeService indicates resolving healthy service nodes. ConsulResolverTypeService int = iota // ConsulResolverTypePreparedQuery indicates resolving via prepared query. ConsulResolverTypePreparedQuery ) // ConsulResolver queries Consul for a service instance. type ConsulResolver struct { // Client is the Consul API client to use. Must be non-nil or Resolve will // panic. Client *api.Client // Namespace of the query target. Namespace string // Name of the query target. Name string // Type of the query target. Should be one of the defined ConsulResolverType* // constants. Currently defaults to ConsulResolverTypeService. Type int // Datacenter to resolve in, empty indicates agent's local DC. Datacenter string // trustDomain stores the cluster's trust domain it's populated once on first // Resolve call and blocks all resolutions. trustDomain string trustDomainMu sync.Mutex } // Resolve performs service discovery against the local Consul agent and returns // the address and expected identity of a suitable service instance. func (cr *ConsulResolver) Resolve(ctx context.Context) (string, connect.CertURI, error) { // Fetch trust domain if we've not done that yet err := cr.ensureTrustDomain() if err != nil { return "", nil, err } switch cr.Type { case ConsulResolverTypeService: return cr.resolveService(ctx) case ConsulResolverTypePreparedQuery: // TODO(banks): we need to figure out what API changes are needed for // prepared queries to become connect-aware. How do we signal that we want // connect-enabled endpoints vs the direct ones for the responses? return "", nil, fmt.Errorf("not implemented") default: return "", nil, fmt.Errorf("unknown resolver type") } } func (cr *ConsulResolver) ensureTrustDomain() error { cr.trustDomainMu.Lock() defer cr.trustDomainMu.Unlock() if cr.trustDomain != "" { return nil } roots, _, err := cr.Client.Agent().ConnectCARoots(nil) if err != nil { return fmt.Errorf("failed fetching cluster trust domain: %s", err) } if roots.TrustDomain == "" { return fmt.Errorf("cluster trust domain empty, connect not bootstrapped") } cr.trustDomain = roots.TrustDomain return nil } func (cr *ConsulResolver) resolveService(ctx context.Context) (string, connect.CertURI, error) { health := cr.Client.Health() svcs, _, err := health.Connect(cr.Name, "", true, cr.queryOptions(ctx)) if err != nil { return "", nil, err } if len(svcs) < 1 { return "", nil, fmt.Errorf("no healthy instances found") } // Services are not shuffled by HTTP API, pick one at (pseudo) random. idx := 0 if len(svcs) > 1 { idx = rand.Intn(len(svcs)) } addr := svcs[idx].Service.Address if addr == "" { addr = svcs[idx].Node.Address } port := svcs[idx].Service.Port service := svcs[idx].Service.Service if !svcs[idx].Service.Connect.Native { service = svcs[idx].Service.ProxyDestination } // Generate the expected CertURI certURI := &connect.SpiffeIDService{ Host: cr.trustDomain, Namespace: "default", Datacenter: svcs[idx].Node.Datacenter, Service: service, } return fmt.Sprintf("%s:%d", addr, port), certURI, nil } func (cr *ConsulResolver) queryOptions(ctx context.Context) *api.QueryOptions { q := &api.QueryOptions{ // We may make this configurable one day but we may also implement our own // caching which is even more stale so... AllowStale: true, Datacenter: cr.Datacenter, } return q.WithContext(ctx) }