/
admin_util.go
245 lines (211 loc) · 6.75 KB
/
admin_util.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
// Copyright 2018 Istio Authors
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
package envoy
import (
"bytes"
"fmt"
"io"
"net/http"
"time"
"github.com/envoyproxy/go-control-plane/envoy/admin/v2alpha"
routeapi "github.com/envoyproxy/go-control-plane/envoy/api/v2/route"
"github.com/gogo/protobuf/jsonpb"
"github.com/gogo/protobuf/types"
"istio.io/istio/istioctl/pkg/util/configdump"
)
// HealthCheckState represents a health checking state returned from /server_info
type HealthCheckState string
const (
// HealthCheckLive indicates Envoy is live and ready to serve requests
HealthCheckLive HealthCheckState = "LIVE"
// HealthCheckDraining indicates Envoy is not currently capable of serving requests
HealthCheckDraining HealthCheckState = "DRAINING"
)
const (
healthCheckTimeout = 10 * time.Second
healthCheckInterval = 100 * time.Millisecond
)
var (
nilServerInfo = ServerInfo{}
)
// ServerInfo is the result of a request to /server_info
type ServerInfo struct {
ProcessName string
CompiledSHABuildType string
HealthCheckState HealthCheckState
CurrentHotRestartEpochUptime time.Duration
TotalUptime time.Duration
CurrentHotRestartEpoch int
}
// GetServerInfo returns a structure representing a call to /server_info
func GetServerInfo(adminPort int) (ServerInfo, error) {
buffer, err := doEnvoyGet("server_info", adminPort)
if err != nil {
return nilServerInfo, err
}
msg := &envoy_admin_v2alpha.ServerInfo{}
if err := jsonpb.Unmarshal(buffer, msg); err != nil {
return nilServerInfo, err
}
currentHotRestartEpochUptime, err := types.DurationFromProto(msg.UptimeCurrentEpoch)
if err != nil {
return nilServerInfo, err
}
totalUptime, err := types.DurationFromProto(msg.UptimeAllEpochs)
if err != nil {
return nilServerInfo, err
}
currentEpoch := 0
if msg.CommandLineOptions != nil {
currentEpoch = int(msg.CommandLineOptions.RestartEpoch)
}
return ServerInfo{
ProcessName: "envoy",
CompiledSHABuildType: msg.Version,
HealthCheckState: HealthCheckState(msg.State.String()),
CurrentHotRestartEpochUptime: currentHotRestartEpochUptime,
TotalUptime: totalUptime,
CurrentHotRestartEpoch: currentEpoch,
}, nil
}
// WaitForHealthCheckLive polls the server info for Envoy and waits for it to transition to "live".
func WaitForHealthCheckLive(adminPort int) error {
endTime := time.Now().Add(healthCheckTimeout)
for {
//var info ServerInfo
//info, err := GetServerInfo(adminPort)
//if err == nil {
// if info.HealthCheckState == HealthCheckLive {
// // It's running, we can return now.
// return nil
// }
//}
// FIXME get mosn stats
_, err := doEnvoyGet("stats", adminPort)
if err == nil {
return nil
}
// Stop trying after the timeout
if time.Now().After(endTime) {
err = fmt.Errorf("failed to start envoy after %ds. Error: %v", healthCheckTimeout/time.Second, err)
return err
}
// Sleep a short before retry.
time.Sleep(healthCheckInterval)
}
}
// GetConfigDumpStr polls Envoy admin port for the config dump and returns the response as a string.
func GetConfigDumpStr(adminPort int) (string, error) {
buffer, err := doEnvoyGet("config_dump", adminPort)
if err != nil {
return "", err
}
return buffer.String(), nil
}
// GetConfigDump polls Envoy admin port for the config dump and returns the response.
func GetConfigDump(adminPort int) (*envoy_admin_v2alpha.ConfigDump, error) {
// FIXME mosn's path is 'api/v1/config_dump'
buffer, err := doEnvoyGet("api/v1/config_dump", adminPort)
if err != nil {
return nil, err
}
msg := &envoy_admin_v2alpha.ConfigDump{}
if err := jsonpb.Unmarshal(buffer, msg); err != nil {
return nil, err
}
return msg, nil
}
func doEnvoyGet(path string, adminPort int) (*bytes.Buffer, error) {
requestURL := fmt.Sprintf("http://127.0.0.1:%d/%s", adminPort, path)
buffer, err := doHTTPGet(requestURL)
if err != nil {
return nil, err
}
return buffer, nil
}
// IsClusterPresent inspects the given Envoy config dump, looking for the given cluster
func IsClusterPresent(cfg *envoy_admin_v2alpha.ConfigDump, clusterName string) bool {
wrapper := configdump.Wrapper{ConfigDump: cfg}
clusters, err := wrapper.GetClusterConfigDump()
if err != nil {
return false
}
for _, c := range clusters.DynamicActiveClusters {
if c.Cluster == nil {
continue
}
if c.Cluster.Name == clusterName || (c.Cluster.EdsClusterConfig != nil && c.Cluster.EdsClusterConfig.ServiceName == clusterName) {
return true
}
}
return false
}
// IsOutboundListenerPresent inspects the given Envoy config dump, looking for the given listener.
func IsOutboundListenerPresent(cfg *envoy_admin_v2alpha.ConfigDump, listenerName string) bool {
wrapper := configdump.Wrapper{ConfigDump: cfg}
listeners, err := wrapper.GetListenerConfigDump()
if err != nil {
return false
}
for _, l := range listeners.DynamicActiveListeners {
if l.Listener != nil && l.Listener.Name == listenerName {
return true
}
}
return false
}
// IsOutboundRoutePresent inspects the given Envoy config dump, looking for an outbound route which targets the given cluster.
func IsOutboundRoutePresent(cfg *envoy_admin_v2alpha.ConfigDump, clusterName string) bool {
wrapper := configdump.Wrapper{ConfigDump: cfg}
routes, err := wrapper.GetRouteConfigDump()
if err != nil {
return false
}
// Look for a route that targets the given outbound cluster.
for _, r := range routes.DynamicRouteConfigs {
if r.RouteConfig != nil {
for _, vh := range r.RouteConfig.VirtualHosts {
for _, route := range vh.Routes {
actionRoute, ok := route.Action.(*routeapi.Route_Route)
if !ok {
continue
}
cluster, ok := actionRoute.Route.ClusterSpecifier.(*routeapi.RouteAction_Cluster)
if !ok {
continue
}
if cluster.Cluster == clusterName {
return true
}
}
}
}
}
return false
}
func doHTTPGet(requestURL string) (*bytes.Buffer, error) {
response, err := http.Get(requestURL)
if err != nil {
return nil, err
}
defer response.Body.Close()
if response.StatusCode != 200 {
return nil, fmt.Errorf("unexpected status %d", response.StatusCode)
}
var b bytes.Buffer
if _, err := io.Copy(&b, response.Body); err != nil {
return nil, err
}
return &b, nil
}