interceptor.go 4.7 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167
  1. // Copyright 2016 CoreOS, Inc.
  2. //
  3. // Licensed under the Apache License, Version 2.0 (the "License");
  4. // you may not use this file except in compliance with the License.
  5. // You may obtain a copy of the License at
  6. //
  7. // http://www.apache.org/licenses/LICENSE-2.0
  8. //
  9. // Unless required by applicable law or agreed to in writing, software
  10. // distributed under the License is distributed on an "AS IS" BASIS,
  11. // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  12. // See the License for the specific language governing permissions and
  13. // limitations under the License.
  14. package v3rpc
  15. import (
  16. "strings"
  17. "sync"
  18. "time"
  19. "github.com/coreos/etcd/etcdserver"
  20. "github.com/coreos/etcd/etcdserver/api/v3rpc/rpctypes"
  21. "github.com/coreos/etcd/pkg/types"
  22. "github.com/coreos/etcd/raft"
  23. "golang.org/x/net/context"
  24. "google.golang.org/grpc"
  25. "google.golang.org/grpc/metadata"
  26. )
  27. const (
  28. maxNoLeaderCnt = 3
  29. )
  30. type streamsMap struct {
  31. mu sync.Mutex
  32. streams map[grpc.ServerStream]struct{}
  33. }
  34. func newUnaryInterceptor(s *etcdserver.EtcdServer) grpc.UnaryServerInterceptor {
  35. return func(ctx context.Context, req interface{}, info *grpc.UnaryServerInfo, handler grpc.UnaryHandler) (resp interface{}, err error) {
  36. md, ok := metadata.FromContext(ctx)
  37. if ok {
  38. if ks := md[rpctypes.MetadataRequireLeaderKey]; len(ks) > 0 && ks[0] == rpctypes.MetadataHasLeader {
  39. if s.Leader() == types.ID(raft.None) {
  40. return nil, rpctypes.ErrGRPCNoLeader
  41. }
  42. }
  43. }
  44. return metricsUnaryInterceptor(ctx, req, info, handler)
  45. }
  46. }
  47. func newStreamInterceptor(s *etcdserver.EtcdServer) grpc.StreamServerInterceptor {
  48. smap := monitorLeader(s)
  49. return func(srv interface{}, ss grpc.ServerStream, info *grpc.StreamServerInfo, handler grpc.StreamHandler) error {
  50. md, ok := metadata.FromContext(ss.Context())
  51. if ok {
  52. if ks := md[rpctypes.MetadataRequireLeaderKey]; len(ks) > 0 && ks[0] == rpctypes.MetadataHasLeader {
  53. if s.Leader() == types.ID(raft.None) {
  54. return rpctypes.ErrGRPCNoLeader
  55. }
  56. cctx, cancel := context.WithCancel(ss.Context())
  57. ss = serverStreamWithCtx{ctx: cctx, cancel: &cancel, ServerStream: ss}
  58. smap.mu.Lock()
  59. smap.streams[ss] = struct{}{}
  60. smap.mu.Unlock()
  61. defer func() {
  62. smap.mu.Lock()
  63. delete(smap.streams, ss)
  64. smap.mu.Unlock()
  65. cancel()
  66. }()
  67. }
  68. }
  69. return metricsStreamInterceptor(srv, ss, info, handler)
  70. }
  71. }
  72. func metricsUnaryInterceptor(ctx context.Context, req interface{}, info *grpc.UnaryServerInfo, handler grpc.UnaryHandler) (resp interface{}, err error) {
  73. service, method := splitMethodName(info.FullMethod)
  74. receivedCounter.WithLabelValues(service, method).Inc()
  75. start := time.Now()
  76. resp, err = handler(ctx, req)
  77. if err != nil {
  78. failedCounter.WithLabelValues(service, method, grpc.Code(err).String()).Inc()
  79. }
  80. handlingDuration.WithLabelValues(service, method).Observe(time.Since(start).Seconds())
  81. return resp, err
  82. }
  83. func metricsStreamInterceptor(srv interface{}, ss grpc.ServerStream, info *grpc.StreamServerInfo, handler grpc.StreamHandler) error {
  84. service, method := splitMethodName(info.FullMethod)
  85. receivedCounter.WithLabelValues(service, method).Inc()
  86. err := handler(srv, ss)
  87. if err != nil {
  88. failedCounter.WithLabelValues(service, method, grpc.Code(err).String()).Inc()
  89. }
  90. return err
  91. }
  92. func splitMethodName(fullMethodName string) (string, string) {
  93. fullMethodName = strings.TrimPrefix(fullMethodName, "/") // remove leading slash
  94. if i := strings.Index(fullMethodName, "/"); i >= 0 {
  95. return fullMethodName[:i], fullMethodName[i+1:]
  96. }
  97. return "unknown", "unknown"
  98. }
  99. type serverStreamWithCtx struct {
  100. grpc.ServerStream
  101. ctx context.Context
  102. cancel *context.CancelFunc
  103. }
  104. func (ssc serverStreamWithCtx) Context() context.Context { return ssc.ctx }
  105. func monitorLeader(s *etcdserver.EtcdServer) *streamsMap {
  106. smap := &streamsMap{
  107. streams: make(map[grpc.ServerStream]struct{}),
  108. }
  109. go func() {
  110. election := time.Duration(s.Cfg.TickMs) * time.Duration(s.Cfg.ElectionTicks) * time.Millisecond
  111. noLeaderCnt := 0
  112. for {
  113. select {
  114. case <-s.StopNotify():
  115. return
  116. case <-time.After(election):
  117. if s.Leader() == types.ID(raft.None) {
  118. noLeaderCnt++
  119. } else {
  120. noLeaderCnt = 0
  121. }
  122. // We are more conservative on canceling existing streams. Reconnecting streams
  123. // cost much more than just rejecting new requests. So we wait until the member
  124. // cannot find a leader for maxNoLeaderCnt election timeouts to cancel existing streams.
  125. if noLeaderCnt >= maxNoLeaderCnt {
  126. smap.mu.Lock()
  127. for ss := range smap.streams {
  128. if ssWithCtx, ok := ss.(serverStreamWithCtx); ok {
  129. (*ssWithCtx.cancel)()
  130. <-ss.Context().Done()
  131. }
  132. }
  133. smap.streams = make(map[grpc.ServerStream]struct{})
  134. smap.mu.Unlock()
  135. }
  136. }
  137. }
  138. }()
  139. return smap
  140. }