/
manifold.go
199 lines (179 loc) · 5.48 KB
/
manifold.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
// Copyright 2018 Canonical Ltd.
// Licensed under the AGPLv3, see LICENCE file for details.
package httpserver
import (
"crypto/tls"
"time"
"github.com/juju/clock"
"github.com/juju/errors"
"github.com/juju/loggo"
"github.com/juju/pubsub/v2"
"github.com/juju/worker/v3"
"github.com/juju/worker/v3/dependency"
"github.com/prometheus/client_golang/prometheus"
"github.com/juju/juju/apiserver/apiserverhttp"
"github.com/juju/juju/controller"
"github.com/juju/juju/pki"
pkitls "github.com/juju/juju/pki/tls"
"github.com/juju/juju/state"
"github.com/juju/juju/worker/common"
workerstate "github.com/juju/juju/worker/state"
)
type Logger interface {
Debugf(string, ...interface{})
Errorf(string, ...interface{})
Infof(string, ...interface{})
Logf(loggo.Level, string, ...interface{})
Warningf(string, ...interface{})
}
// ManifoldConfig holds the information necessary to run an HTTP server
// in a dependency.Engine.
type ManifoldConfig struct {
AuthorityName string
HubName string
MuxName string
StateName string
// We don't use these in the worker, but we want to prevent the
// httpserver from starting until they're running so that all of
// their handlers are registered.
APIServerName string
AgentName string
Clock clock.Clock
MuxShutdownWait time.Duration
LogDir string
PrometheusRegisterer prometheus.Registerer
Logger Logger
GetControllerConfig func(*state.State) (controller.Config, error)
NewTLSConfig func(*state.State, SNIGetterFunc, Logger) (*tls.Config, error)
NewWorker func(Config) (worker.Worker, error)
}
// Validate validates the manifold configuration.
func (config ManifoldConfig) Validate() error {
if config.AuthorityName == "" {
return errors.NotValidf("empty AuthorityName")
}
if config.HubName == "" {
return errors.NotValidf("empty HubName")
}
if config.StateName == "" {
return errors.NotValidf("empty StateName")
}
if config.MuxName == "" {
return errors.NotValidf("empty MuxName")
}
if config.APIServerName == "" {
return errors.NotValidf("empty APIServerName")
}
if config.AgentName == "" {
return errors.NotValidf("empty AgentName")
}
if config.Clock == nil {
return errors.NotValidf("nil Clock")
}
if config.PrometheusRegisterer == nil {
return errors.NotValidf("nil PrometheusRegisterer")
}
if config.GetControllerConfig == nil {
return errors.NotValidf("nil GetControllerConfig")
}
if config.Logger == nil {
return errors.NotValidf("nil logger")
}
if config.NewTLSConfig == nil {
return errors.NotValidf("nil NewTLSConfig")
}
if config.NewWorker == nil {
return errors.NotValidf("nil NewWorker")
}
if config.MuxShutdownWait < 1*time.Minute {
return errors.NotValidf("MuxShutdownWait %v", config.MuxShutdownWait)
}
if config.LogDir == "" {
return errors.NotValidf("empty LogDir")
}
return nil
}
// Manifold returns a dependency.Manifold that will run an HTTP server
// worker. The manifold outputs an *apiserverhttp.Mux, for other workers
// to register handlers against.
func Manifold(config ManifoldConfig) dependency.Manifold {
return dependency.Manifold{
Inputs: []string{
config.AuthorityName,
config.HubName,
config.StateName,
config.MuxName,
config.APIServerName,
},
Start: config.start,
}
}
// start is a method on ManifoldConfig because it's more readable than a closure.
func (config ManifoldConfig) start(context dependency.Context) (_ worker.Worker, err error) {
if err := config.Validate(); err != nil {
return nil, errors.Trace(err)
}
var authority pki.Authority
if err := context.Get(config.AuthorityName, &authority); err != nil {
return nil, errors.Trace(err)
}
var hub *pubsub.StructuredHub
if err := context.Get(config.HubName, &hub); err != nil {
return nil, errors.Trace(err)
}
var mux *apiserverhttp.Mux
if err := context.Get(config.MuxName, &mux); err != nil {
return nil, errors.Trace(err)
}
// We don't actually need anything from these workers, but we
// shouldn't start until they're available.
if err := context.Get(config.APIServerName, nil); err != nil {
return nil, errors.Trace(err)
}
var stTracker workerstate.StateTracker
if err := context.Get(config.StateName, &stTracker); err != nil {
return nil, errors.Trace(err)
}
statePool, err := stTracker.Use()
if err != nil {
return nil, errors.Trace(err)
}
defer func() {
if err != nil {
_ = stTracker.Done()
}
}()
systemState, err := statePool.SystemState()
if err != nil {
return nil, errors.Trace(err)
}
tlsConfig, err := config.NewTLSConfig(
systemState,
pkitls.AuthoritySNITLSGetter(authority, config.Logger),
config.Logger)
if err != nil {
return nil, errors.Trace(err)
}
controllerConfig, err := config.GetControllerConfig(systemState)
if err != nil {
return nil, errors.Annotate(err, "unable to get controller config")
}
w, err := config.NewWorker(Config{
AgentName: config.AgentName,
Clock: config.Clock,
PrometheusRegisterer: config.PrometheusRegisterer,
Hub: hub,
TLSConfig: tlsConfig,
Mux: mux,
MuxShutdownWait: config.MuxShutdownWait,
LogDir: config.LogDir,
Logger: config.Logger,
APIPort: controllerConfig.APIPort(),
APIPortOpenDelay: controllerConfig.APIPortOpenDelay(),
ControllerAPIPort: controllerConfig.ControllerAPIPort(),
})
if err != nil {
return nil, errors.Trace(err)
}
return common.NewCleanupWorker(w, func() { _ = stTracker.Done() }), nil
}