-
Notifications
You must be signed in to change notification settings - Fork 248
/
service.go
148 lines (119 loc) · 4.09 KB
/
service.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
/*
* Tencent is pleased to support the open source community by making Blueking Container Service available.
* Copyright (C) 2019 THL A29 Limited, a Tencent company. All rights reserved.
* Licensed under the MIT License (the "License"); you may not use this file except
* in compliance with the License. You may obtain a copy of the License at
* http://opensource.org/licenses/MIT
* Unless required by applicable law or agreed to in writing, software distributed under
* the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND,
* either express or implied. See the License for the specific language governing permissions and
* limitations under the License.
*
*/
package service
import (
"fmt"
"sync"
"github.com/json-iterator/go"
"github.com/Tencent/bk-bcs/bcs-common/common/RegisterDiscover"
glog "github.com/Tencent/bk-bcs/bcs-common/common/blog"
commtypes "github.com/Tencent/bk-bcs/bcs-common/common/types"
"github.com/Tencent/bk-bcs/bcs-mesos/bcs-mesos-watch/types"
)
// HTTPClientConfig is bcs inner service http client config struct.
type HTTPClientConfig struct {
// URL is http whole url.
URL string
// Scheme is http url scheme, http/https.
Scheme string
// CAFile is https root certificate authority file path.
CAFile string
// CertFile is https certificate file path.
CertFile string
// KeyFile is https key file path.
KeyFile string
// Password is certificate authority file password.
Password string
}
// InnerService is bcs inner service for discovery.
type InnerService struct {
name string
mu sync.RWMutex
eventChan <-chan *RegisterDiscover.DiscoverEvent
servers map[string]*HTTPClientConfig
}
// NewInnerService creates a new serviceName InnerService instance for discovery.
func NewInnerService(serviceName string, eventChan <-chan *RegisterDiscover.DiscoverEvent) *InnerService {
svc := &InnerService{
name: serviceName,
eventChan: eventChan,
servers: make(map[string]*HTTPClientConfig),
}
return svc
}
// Watch keeps watching service instance endpoints from ZK.
func (s *InnerService) Watch(cfg *types.CmdConfig) error {
glog.Infof("start to watch service[%s] from ZK", s.name)
for data := range s.eventChan {
glog.Infof("received ZK event, Server: %+v", data.Server)
if data.Err != nil {
glog.Errorf("%s service discover failed, %+v", s.name, data.Err)
continue
}
s.update(data.Server, cfg)
}
return nil
}
// Servers returns current available services instances.
func (s *InnerService) Servers() []*HTTPClientConfig {
s.mu.RLock()
defer s.mu.RUnlock()
cfgs := []*HTTPClientConfig{}
for _, cfg := range s.servers {
cfgs = append(cfgs, cfg)
}
return cfgs
}
func (s *InnerService) update(servers []string, cfg *types.CmdConfig) {
s.mu.Lock()
defer s.mu.Unlock()
if len(servers) == 0 {
glog.Warnf("get non %s service from ZK, no service instance available", s.name)
return
}
currentServers := make(map[string]string)
for _, server := range servers {
serverInfo := commtypes.ServerInfo{}
if err := jsoniter.Unmarshal([]byte(server), &serverInfo); err != nil {
glog.Errorf("json unmarshal %s server info failed, %+v", s.name, err)
continue
}
if len(serverInfo.Scheme) == 0 || len(serverInfo.IP) == 0 || serverInfo.Port == 0 {
glog.Errorf("got invalid %s server info: %s", s.name, server)
continue
}
address := fmt.Sprintf("%s://%s:%d", serverInfo.Scheme, serverInfo.IP, serverInfo.Port)
currentServers[address] = ""
if _, exists := s.servers[address]; !exists {
config := HTTPClientConfig{
URL: address,
Scheme: serverInfo.Scheme,
}
// support https.
if serverInfo.Scheme == "https" {
config.CAFile = cfg.CAFile
config.CertFile = cfg.CertFile
config.KeyFile = cfg.KeyFile
config.Password = cfg.PassWord
}
s.servers[address] = &config
}
}
for address := range s.servers {
if _, exists := currentServers[address]; !exists {
delete(s.servers, address)
glog.Infof("delete %s server old address[%s] synced from ZK", s.name, address)
}
}
glog.Infof("update %s service addresses done, final: %+v", s.name, s.servers)
}