summaryrefslogtreecommitdiffstats
path: root/src/orchestrator/pkg/infra
diff options
context:
space:
mode:
authorEric Multanen <eric.w.multanen@intel.com>2020-04-23 12:46:35 -0700
committerEric Multanen <eric.w.multanen@intel.com>2020-04-30 16:55:52 -0700
commitea7b430a700a12cbde9e78acb3a993ad4257b12c (patch)
tree6345485d6440b3600a191360659df9036f0b5a09 /src/orchestrator/pkg/infra
parent4100bfb764c40e2a788d28691b0f891e2ae86b74 (diff)
Add gRPC framework to orchestrator
Adds proto and generated go files for a healtcheck, contextupdate and installapp rpc services. Adds framework for orchestrator as an rpc client to connect to configured controllers. Issue-ID: MULTICLOUD-1019 Signed-off-by: Eric Multanen <eric.w.multanen@intel.com> Change-Id: Ie66865789fe2146258c91e168cfb8d5933905814
Diffstat (limited to 'src/orchestrator/pkg/infra')
-rw-r--r--src/orchestrator/pkg/infra/config/config.go62
-rwxr-xr-xsrc/orchestrator/pkg/infra/rpc/rpc.go199
2 files changed, 235 insertions, 26 deletions
diff --git a/src/orchestrator/pkg/infra/config/config.go b/src/orchestrator/pkg/infra/config/config.go
index df9cec92..fca8bfbd 100644
--- a/src/orchestrator/pkg/infra/config/config.go
+++ b/src/orchestrator/pkg/infra/config/config.go
@@ -26,19 +26,24 @@ import (
// Configuration loads up all the values that are used to configure
// backend implementations
type Configuration struct {
- CAFile string `json:"ca-file"`
- ServerCert string `json:"server-cert"`
- ServerKey string `json:"server-key"`
- Password string `json:"password"`
- DatabaseIP string `json:"database-ip"`
- DatabaseType string `json:"database-type"`
- PluginDir string `json:"plugin-dir"`
- EtcdIP string `json:"etcd-ip"`
- EtcdCert string `json:"etcd-cert"`
- EtcdKey string `json:"etcd-key"`
- EtcdCAFile string `json:"etcd-ca-file"`
- ServicePort string `json:"service-port"`
- KubernetesLabelName string `json:"kubernetes-label-name"`
+ CAFile string `json:"ca-file"`
+ ServerCert string `json:"server-cert"`
+ ServerKey string `json:"server-key"`
+ Password string `json:"password"`
+ DatabaseIP string `json:"database-ip"`
+ DatabaseType string `json:"database-type"`
+ PluginDir string `json:"plugin-dir"`
+ EtcdIP string `json:"etcd-ip"`
+ EtcdCert string `json:"etcd-cert"`
+ EtcdKey string `json:"etcd-key"`
+ EtcdCAFile string `json:"etcd-ca-file"`
+ GrpcServerCert string `json:"grpc-server-cert"`
+ GrpcServerKey string `json:"grpc-server-key"`
+ GrpcCAFile string `json:"grpc-ca-file"`
+ GrpcEnableTLS string `json:"grpc-enable-tls"`
+ GrpcServerNameOverride string `json:"grpc-server-name-override"`
+ ServicePort string `json:"service-port"`
+ KubernetesLabelName string `json:"kubernetes-label-name"`
}
// Config is the structure that stores the configuration
@@ -75,19 +80,24 @@ func defaultConfiguration() *Configuration {
}
return &Configuration{
- CAFile: "ca.cert",
- ServerCert: "server.cert",
- ServerKey: "server.key",
- Password: "",
- DatabaseIP: "127.0.0.1",
- DatabaseType: "mongo",
- PluginDir: cwd,
- EtcdIP: "127.0.0.1",
- EtcdCert: "",
- EtcdKey: "",
- EtcdCAFile: "",
- ServicePort: "9015",
- KubernetesLabelName: "orchestrator.io/rb-instance-id",
+ CAFile: "ca.cert",
+ ServerCert: "server.cert",
+ ServerKey: "server.key",
+ Password: "",
+ DatabaseIP: "127.0.0.1",
+ DatabaseType: "mongo",
+ PluginDir: cwd,
+ EtcdIP: "127.0.0.1",
+ EtcdCert: "",
+ EtcdKey: "",
+ EtcdCAFile: "",
+ GrpcServerCert: "",
+ GrpcServerKey: "",
+ GrpcCAFile: "",
+ GrpcEnableTLS: "disable",
+ GrpcServerNameOverride: "",
+ ServicePort: "9015",
+ KubernetesLabelName: "orchestrator.io/rb-instance-id",
}
}
diff --git a/src/orchestrator/pkg/infra/rpc/rpc.go b/src/orchestrator/pkg/infra/rpc/rpc.go
new file mode 100755
index 00000000..a9c97bff
--- /dev/null
+++ b/src/orchestrator/pkg/infra/rpc/rpc.go
@@ -0,0 +1,199 @@
+/*
+Copyright 2020 Intel Corporation.
+Licensed under the Apache License, Version 2.0 (the "License");
+you may not use this file except in compliance with the License.
+You may obtain a copy of the License at
+ http://www.apache.org/licenses/LICENSE-2.0
+Unless required by applicable law or agreed to in writing, software
+distributed under the License is distributed on an "AS IS" BASIS,
+WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+See the License for the specific language governing permissions and
+limitations under the License.
+*/
+
+package rpc
+
+import (
+ "context"
+ "strconv"
+ "strings"
+ "sync"
+ "time"
+
+ "github.com/onap/multicloud-k8s/src/orchestrator/pkg/infra/config"
+ log "github.com/onap/multicloud-k8s/src/orchestrator/pkg/infra/logutils"
+ pkgerrors "github.com/pkg/errors"
+ "google.golang.org/grpc"
+ "google.golang.org/grpc/connectivity"
+ "google.golang.org/grpc/credentials"
+ "google.golang.org/grpc/testdata"
+)
+
+type ContextUpdateRequest interface {
+}
+
+type ContextUpdateResponse interface {
+}
+
+type InstallAppRequest interface {
+}
+
+type InstallAppResponse interface {
+}
+
+type rpcInfo struct {
+ conn *grpc.ClientConn
+ host string
+ port int
+}
+
+var mutex = &sync.Mutex{}
+var rpcConnections = make(map[string]rpcInfo)
+
+// GetRpcConn is used by RPC client code which needs the connection for a
+// given controller for doing RPC calls with that controller.
+func GetRpcConn(name string) *grpc.ClientConn {
+ mutex.Lock()
+ defer mutex.Unlock()
+ if val, ok := rpcConnections[name]; ok {
+ if val.conn.GetState() == connectivity.TransientFailure {
+ val.conn.ResetConnectBackoff()
+ ctx, cancel := context.WithTimeout(context.Background(), 10*time.Millisecond)
+ if !val.conn.WaitForStateChange(ctx, connectivity.TransientFailure) {
+ log.Warn("Error re-establishing RPC connection", log.Fields{
+ "Server": name,
+ "Host": val.host,
+ "Port": val.port,
+ })
+ }
+ cancel()
+ }
+ return val.conn
+ }
+ return nil
+}
+
+func UpdateRpcConn(name, host string, port int) {
+ mutex.Lock()
+ defer mutex.Unlock()
+ if val, ok := rpcConnections[name]; ok {
+ // close connection if mismatch in update vs cached connect info
+ if val.host != host || val.port != port {
+ log.Info("Closing RPC connection due to mismatch", log.Fields{
+ "Server": name,
+ "Old Host": val.host,
+ "Old Port": val.port,
+ "New Host": host,
+ "New Port": port,
+ })
+ err := val.conn.Close()
+ if err != nil {
+ log.Warn("Error closing RPC connection", log.Fields{
+ "Server": name,
+ "Host": val.host,
+ "Port": val.port,
+ "Error": err,
+ })
+ }
+ } else {
+ if val.conn.GetState() == connectivity.TransientFailure {
+ val.conn.ResetConnectBackoff()
+ }
+ return
+ }
+ }
+ // connect and update rpcConnection list - for new or modified connection
+ conn, err := createClientConn(host, port)
+ if err != nil {
+ log.Warn("Failed to create RPC Client connection", log.Fields{
+ "Error": err,
+ })
+ delete(rpcConnections, name)
+ } else {
+ log.Info("Added RPC Client connection", log.Fields{
+ "Controller": name,
+ })
+ rpcConnections[name] = rpcInfo{
+ conn: conn,
+ host: host,
+ port: port,
+ }
+ }
+}
+
+// CloseAllRpcConn closes all connections
+func CloseAllRpcConn() {
+ mutex.Lock()
+ for k, v := range rpcConnections {
+ err := v.conn.Close()
+ if err != nil {
+ log.Warn("Error closing RPC connection", log.Fields{
+ "Server": k,
+ "Host": v.host,
+ "Port": v.port,
+ "Error": err,
+ })
+ }
+ }
+ mutex.Unlock()
+}
+
+// RemoveRpcConn closes the connection and removes from map
+func RemoveRpcConn(name string) {
+ mutex.Lock()
+ if val, ok := rpcConnections[name]; ok {
+ err := val.conn.Close()
+ if err != nil {
+ log.Warn("Error closing RPC connection", log.Fields{
+ "Server": name,
+ "Host": val.host,
+ "Port": val.port,
+ "Error": err,
+ })
+ }
+ delete(rpcConnections, name)
+ }
+ mutex.Unlock()
+}
+
+// createConn creates the Rpc Client Connection
+func createClientConn(Host string, Port int) (*grpc.ClientConn, error) {
+ var err error
+ var tls bool
+ var opts []grpc.DialOption
+
+ serverAddr := Host + ":" + strconv.Itoa(Port)
+ serverNameOverride := config.GetConfiguration().GrpcServerNameOverride
+
+ if strings.Contains(config.GetConfiguration().GrpcEnableTLS, "enable") {
+ tls = true
+ } else {
+ tls = false
+ }
+
+ caFile := config.GetConfiguration().GrpcCAFile
+
+ if tls {
+ if caFile == "" {
+ caFile = testdata.Path("ca.pem")
+ }
+ creds, err := credentials.NewClientTLSFromFile(caFile, serverNameOverride)
+ if err != nil {
+ log.Error("Failed to create TLS credentials", log.Fields{
+ "Error": err,
+ "Host": Host,
+ "Port": Port,
+ })
+ }
+ opts = append(opts, grpc.WithTransportCredentials(creds))
+ } else {
+ opts = append(opts, grpc.WithInsecure())
+ }
+
+ conn, err := grpc.Dial(serverAddr, opts...)
+ if err != nil {
+ pkgerrors.Wrap(err, "Grpc Client Initialization failed with error")
+ }
+
+ return conn, err
+}