diff options
author | Eric Multanen <eric.w.multanen@intel.com> | 2020-04-23 12:46:35 -0700 |
---|---|---|
committer | Eric Multanen <eric.w.multanen@intel.com> | 2020-04-30 16:55:52 -0700 |
commit | ea7b430a700a12cbde9e78acb3a993ad4257b12c (patch) | |
tree | 6345485d6440b3600a191360659df9036f0b5a09 /src/orchestrator/pkg/infra | |
parent | 4100bfb764c40e2a788d28691b0f891e2ae86b74 (diff) |
Add gRPC framework to orchestrator
Adds proto and generated go files for a healtcheck,
contextupdate and installapp rpc services. Adds framework
for orchestrator as an rpc client to connect
to configured controllers.
Issue-ID: MULTICLOUD-1019
Signed-off-by: Eric Multanen <eric.w.multanen@intel.com>
Change-Id: Ie66865789fe2146258c91e168cfb8d5933905814
Diffstat (limited to 'src/orchestrator/pkg/infra')
-rw-r--r-- | src/orchestrator/pkg/infra/config/config.go | 62 | ||||
-rwxr-xr-x | src/orchestrator/pkg/infra/rpc/rpc.go | 199 |
2 files changed, 235 insertions, 26 deletions
diff --git a/src/orchestrator/pkg/infra/config/config.go b/src/orchestrator/pkg/infra/config/config.go index df9cec92..fca8bfbd 100644 --- a/src/orchestrator/pkg/infra/config/config.go +++ b/src/orchestrator/pkg/infra/config/config.go @@ -26,19 +26,24 @@ import ( // Configuration loads up all the values that are used to configure // backend implementations type Configuration struct { - CAFile string `json:"ca-file"` - ServerCert string `json:"server-cert"` - ServerKey string `json:"server-key"` - Password string `json:"password"` - DatabaseIP string `json:"database-ip"` - DatabaseType string `json:"database-type"` - PluginDir string `json:"plugin-dir"` - EtcdIP string `json:"etcd-ip"` - EtcdCert string `json:"etcd-cert"` - EtcdKey string `json:"etcd-key"` - EtcdCAFile string `json:"etcd-ca-file"` - ServicePort string `json:"service-port"` - KubernetesLabelName string `json:"kubernetes-label-name"` + CAFile string `json:"ca-file"` + ServerCert string `json:"server-cert"` + ServerKey string `json:"server-key"` + Password string `json:"password"` + DatabaseIP string `json:"database-ip"` + DatabaseType string `json:"database-type"` + PluginDir string `json:"plugin-dir"` + EtcdIP string `json:"etcd-ip"` + EtcdCert string `json:"etcd-cert"` + EtcdKey string `json:"etcd-key"` + EtcdCAFile string `json:"etcd-ca-file"` + GrpcServerCert string `json:"grpc-server-cert"` + GrpcServerKey string `json:"grpc-server-key"` + GrpcCAFile string `json:"grpc-ca-file"` + GrpcEnableTLS string `json:"grpc-enable-tls"` + GrpcServerNameOverride string `json:"grpc-server-name-override"` + ServicePort string `json:"service-port"` + KubernetesLabelName string `json:"kubernetes-label-name"` } // Config is the structure that stores the configuration @@ -75,19 +80,24 @@ func defaultConfiguration() *Configuration { } return &Configuration{ - CAFile: "ca.cert", - ServerCert: "server.cert", - ServerKey: "server.key", - Password: "", - DatabaseIP: "127.0.0.1", - DatabaseType: "mongo", - PluginDir: cwd, - EtcdIP: "127.0.0.1", - EtcdCert: "", - EtcdKey: "", - EtcdCAFile: "", - ServicePort: "9015", - KubernetesLabelName: "orchestrator.io/rb-instance-id", + CAFile: "ca.cert", + ServerCert: "server.cert", + ServerKey: "server.key", + Password: "", + DatabaseIP: "127.0.0.1", + DatabaseType: "mongo", + PluginDir: cwd, + EtcdIP: "127.0.0.1", + EtcdCert: "", + EtcdKey: "", + EtcdCAFile: "", + GrpcServerCert: "", + GrpcServerKey: "", + GrpcCAFile: "", + GrpcEnableTLS: "disable", + GrpcServerNameOverride: "", + ServicePort: "9015", + KubernetesLabelName: "orchestrator.io/rb-instance-id", } } diff --git a/src/orchestrator/pkg/infra/rpc/rpc.go b/src/orchestrator/pkg/infra/rpc/rpc.go new file mode 100755 index 00000000..a9c97bff --- /dev/null +++ b/src/orchestrator/pkg/infra/rpc/rpc.go @@ -0,0 +1,199 @@ +/* +Copyright 2020 Intel Corporation. +Licensed under the Apache License, Version 2.0 (the "License"); +you may not use this file except in compliance with the License. +You may obtain a copy of the License at + http://www.apache.org/licenses/LICENSE-2.0 +Unless required by applicable law or agreed to in writing, software +distributed under the License is distributed on an "AS IS" BASIS, +WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +See the License for the specific language governing permissions and +limitations under the License. +*/ + +package rpc + +import ( + "context" + "strconv" + "strings" + "sync" + "time" + + "github.com/onap/multicloud-k8s/src/orchestrator/pkg/infra/config" + log "github.com/onap/multicloud-k8s/src/orchestrator/pkg/infra/logutils" + pkgerrors "github.com/pkg/errors" + "google.golang.org/grpc" + "google.golang.org/grpc/connectivity" + "google.golang.org/grpc/credentials" + "google.golang.org/grpc/testdata" +) + +type ContextUpdateRequest interface { +} + +type ContextUpdateResponse interface { +} + +type InstallAppRequest interface { +} + +type InstallAppResponse interface { +} + +type rpcInfo struct { + conn *grpc.ClientConn + host string + port int +} + +var mutex = &sync.Mutex{} +var rpcConnections = make(map[string]rpcInfo) + +// GetRpcConn is used by RPC client code which needs the connection for a +// given controller for doing RPC calls with that controller. +func GetRpcConn(name string) *grpc.ClientConn { + mutex.Lock() + defer mutex.Unlock() + if val, ok := rpcConnections[name]; ok { + if val.conn.GetState() == connectivity.TransientFailure { + val.conn.ResetConnectBackoff() + ctx, cancel := context.WithTimeout(context.Background(), 10*time.Millisecond) + if !val.conn.WaitForStateChange(ctx, connectivity.TransientFailure) { + log.Warn("Error re-establishing RPC connection", log.Fields{ + "Server": name, + "Host": val.host, + "Port": val.port, + }) + } + cancel() + } + return val.conn + } + return nil +} + +func UpdateRpcConn(name, host string, port int) { + mutex.Lock() + defer mutex.Unlock() + if val, ok := rpcConnections[name]; ok { + // close connection if mismatch in update vs cached connect info + if val.host != host || val.port != port { + log.Info("Closing RPC connection due to mismatch", log.Fields{ + "Server": name, + "Old Host": val.host, + "Old Port": val.port, + "New Host": host, + "New Port": port, + }) + err := val.conn.Close() + if err != nil { + log.Warn("Error closing RPC connection", log.Fields{ + "Server": name, + "Host": val.host, + "Port": val.port, + "Error": err, + }) + } + } else { + if val.conn.GetState() == connectivity.TransientFailure { + val.conn.ResetConnectBackoff() + } + return + } + } + // connect and update rpcConnection list - for new or modified connection + conn, err := createClientConn(host, port) + if err != nil { + log.Warn("Failed to create RPC Client connection", log.Fields{ + "Error": err, + }) + delete(rpcConnections, name) + } else { + log.Info("Added RPC Client connection", log.Fields{ + "Controller": name, + }) + rpcConnections[name] = rpcInfo{ + conn: conn, + host: host, + port: port, + } + } +} + +// CloseAllRpcConn closes all connections +func CloseAllRpcConn() { + mutex.Lock() + for k, v := range rpcConnections { + err := v.conn.Close() + if err != nil { + log.Warn("Error closing RPC connection", log.Fields{ + "Server": k, + "Host": v.host, + "Port": v.port, + "Error": err, + }) + } + } + mutex.Unlock() +} + +// RemoveRpcConn closes the connection and removes from map +func RemoveRpcConn(name string) { + mutex.Lock() + if val, ok := rpcConnections[name]; ok { + err := val.conn.Close() + if err != nil { + log.Warn("Error closing RPC connection", log.Fields{ + "Server": name, + "Host": val.host, + "Port": val.port, + "Error": err, + }) + } + delete(rpcConnections, name) + } + mutex.Unlock() +} + +// createConn creates the Rpc Client Connection +func createClientConn(Host string, Port int) (*grpc.ClientConn, error) { + var err error + var tls bool + var opts []grpc.DialOption + + serverAddr := Host + ":" + strconv.Itoa(Port) + serverNameOverride := config.GetConfiguration().GrpcServerNameOverride + + if strings.Contains(config.GetConfiguration().GrpcEnableTLS, "enable") { + tls = true + } else { + tls = false + } + + caFile := config.GetConfiguration().GrpcCAFile + + if tls { + if caFile == "" { + caFile = testdata.Path("ca.pem") + } + creds, err := credentials.NewClientTLSFromFile(caFile, serverNameOverride) + if err != nil { + log.Error("Failed to create TLS credentials", log.Fields{ + "Error": err, + "Host": Host, + "Port": Port, + }) + } + opts = append(opts, grpc.WithTransportCredentials(creds)) + } else { + opts = append(opts, grpc.WithInsecure()) + } + + conn, err := grpc.Dial(serverAddr, opts...) + if err != nil { + pkgerrors.Wrap(err, "Grpc Client Initialization failed with error") + } + + return conn, err +} |