123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242 |
- // Copyright 2016 The etcd Authors
- //
- // Licensed under the Apache License, Version 2.0 (the "License");
- // you may not use this file except in compliance with the License.
- // You may obtain a copy of the License at
- //
- // http://www.apache.org/licenses/LICENSE-2.0
- //
- // Unless required by applicable law or agreed to in writing, software
- // distributed under the License is distributed on an "AS IS" BASIS,
- // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
- // See the License for the specific language governing permissions and
- // limitations under the License.
- package tcpproxy
- import (
- "fmt"
- "io"
- "math/rand"
- "net"
- "sync"
- "time"
- "github.com/coreos/pkg/capnslog"
- "go.uber.org/zap"
- )
- var plog = capnslog.NewPackageLogger("go.etcd.io/etcd", "proxy/tcpproxy")
- type remote struct {
- mu sync.Mutex
- srv *net.SRV
- addr string
- inactive bool
- }
- func (r *remote) inactivate() {
- r.mu.Lock()
- defer r.mu.Unlock()
- r.inactive = true
- }
- func (r *remote) tryReactivate() error {
- conn, err := net.Dial("tcp", r.addr)
- if err != nil {
- return err
- }
- conn.Close()
- r.mu.Lock()
- defer r.mu.Unlock()
- r.inactive = false
- return nil
- }
- func (r *remote) isActive() bool {
- r.mu.Lock()
- defer r.mu.Unlock()
- return !r.inactive
- }
- type TCPProxy struct {
- Logger *zap.Logger
- Listener net.Listener
- Endpoints []*net.SRV
- MonitorInterval time.Duration
- donec chan struct{}
- mu sync.Mutex // guards the following fields
- remotes []*remote
- pickCount int // for round robin
- }
- func (tp *TCPProxy) Run() error {
- tp.donec = make(chan struct{})
- if tp.MonitorInterval == 0 {
- tp.MonitorInterval = 5 * time.Minute
- }
- for _, srv := range tp.Endpoints {
- addr := fmt.Sprintf("%s:%d", srv.Target, srv.Port)
- tp.remotes = append(tp.remotes, &remote{srv: srv, addr: addr})
- }
- eps := []string{}
- for _, ep := range tp.Endpoints {
- eps = append(eps, fmt.Sprintf("%s:%d", ep.Target, ep.Port))
- }
- if tp.Logger != nil {
- tp.Logger.Info("ready to proxy client requests", zap.Strings("endpoints", eps))
- } else {
- plog.Printf("ready to proxy client requests to %+v", eps)
- }
- go tp.runMonitor()
- for {
- in, err := tp.Listener.Accept()
- if err != nil {
- return err
- }
- go tp.serve(in)
- }
- }
- func (tp *TCPProxy) pick() *remote {
- var weighted []*remote
- var unweighted []*remote
- bestPr := uint16(65535)
- w := 0
- // find best priority class
- for _, r := range tp.remotes {
- switch {
- case !r.isActive():
- case r.srv.Priority < bestPr:
- bestPr = r.srv.Priority
- w = 0
- weighted = nil
- unweighted = []*remote{r}
- fallthrough
- case r.srv.Priority == bestPr:
- if r.srv.Weight > 0 {
- weighted = append(weighted, r)
- w += int(r.srv.Weight)
- } else {
- unweighted = append(unweighted, r)
- }
- }
- }
- if weighted != nil {
- if len(unweighted) > 0 && rand.Intn(100) == 1 {
- // In the presence of records containing weights greater
- // than 0, records with weight 0 should have a very small
- // chance of being selected.
- r := unweighted[tp.pickCount%len(unweighted)]
- tp.pickCount++
- return r
- }
- // choose a uniform random number between 0 and the sum computed
- // (inclusive), and select the RR whose running sum value is the
- // first in the selected order
- choose := rand.Intn(w)
- for i := 0; i < len(weighted); i++ {
- choose -= int(weighted[i].srv.Weight)
- if choose <= 0 {
- return weighted[i]
- }
- }
- }
- if unweighted != nil {
- for i := 0; i < len(tp.remotes); i++ {
- picked := tp.remotes[tp.pickCount%len(tp.remotes)]
- tp.pickCount++
- if picked.isActive() {
- return picked
- }
- }
- }
- return nil
- }
- func (tp *TCPProxy) serve(in net.Conn) {
- var (
- err error
- out net.Conn
- )
- for {
- tp.mu.Lock()
- remote := tp.pick()
- tp.mu.Unlock()
- if remote == nil {
- break
- }
- // TODO: add timeout
- out, err = net.Dial("tcp", remote.addr)
- if err == nil {
- break
- }
- remote.inactivate()
- if tp.Logger != nil {
- tp.Logger.Warn("deactivated endpoint", zap.String("address", remote.addr), zap.Duration("interval", tp.MonitorInterval), zap.Error(err))
- } else {
- plog.Warningf("deactivated endpoint [%s] due to %v for %v", remote.addr, err, tp.MonitorInterval)
- }
- }
- if out == nil {
- in.Close()
- return
- }
- go func() {
- io.Copy(in, out)
- in.Close()
- out.Close()
- }()
- io.Copy(out, in)
- out.Close()
- in.Close()
- }
- func (tp *TCPProxy) runMonitor() {
- for {
- select {
- case <-time.After(tp.MonitorInterval):
- tp.mu.Lock()
- for _, rem := range tp.remotes {
- if rem.isActive() {
- continue
- }
- go func(r *remote) {
- if err := r.tryReactivate(); err != nil {
- if tp.Logger != nil {
- tp.Logger.Warn("failed to activate endpoint (stay inactive for another interval)", zap.String("address", r.addr), zap.Duration("interval", tp.MonitorInterval), zap.Error(err))
- } else {
- plog.Warningf("failed to activate endpoint [%s] due to %v (stay inactive for another %v)", r.addr, err, tp.MonitorInterval)
- }
- } else {
- if tp.Logger != nil {
- tp.Logger.Info("activated", zap.String("address", r.addr))
- } else {
- plog.Printf("activated %s", r.addr)
- }
- }
- }(rem)
- }
- tp.mu.Unlock()
- case <-tp.donec:
- return
- }
- }
- }
- func (tp *TCPProxy) Stop() {
- // graceful shutdown?
- // shutdown current connections?
- tp.Listener.Close()
- close(tp.donec)
- }
|