mirror of
https://github.com/alibaba/higress.git
synced 2026-05-10 05:47:26 +08:00
fix: refactored mcp server auto discovery logic and fix some issue (#2382)
Co-authored-by: johnlanni <zty98751@alibaba-inc.com>
This commit is contained in:
@@ -250,6 +250,10 @@ spec:
|
||||
registries:
|
||||
items:
|
||||
properties:
|
||||
allowMcpServers:
|
||||
items:
|
||||
type: string
|
||||
type: array
|
||||
authSecretName:
|
||||
type: string
|
||||
consulDatacenter:
|
||||
@@ -265,12 +269,23 @@ spec:
|
||||
type: string
|
||||
enableMCPServer:
|
||||
type: boolean
|
||||
enableScopeMcpServers:
|
||||
type: boolean
|
||||
mcpServerBaseUrl:
|
||||
type: string
|
||||
mcpServerExportDomains:
|
||||
items:
|
||||
type: string
|
||||
type: array
|
||||
metadata:
|
||||
additionalProperties:
|
||||
properties:
|
||||
innerMap:
|
||||
additionalProperties:
|
||||
type: string
|
||||
type: object
|
||||
type: object
|
||||
type: object
|
||||
nacosAccessKey:
|
||||
type: string
|
||||
nacosAddressServer:
|
||||
|
||||
@@ -111,28 +111,31 @@ type RegistryConfig struct {
|
||||
sizeCache protoimpl.SizeCache
|
||||
unknownFields protoimpl.UnknownFields
|
||||
|
||||
Type string `protobuf:"bytes,1,opt,name=type,proto3" json:"type,omitempty"`
|
||||
Name string `protobuf:"bytes,2,opt,name=name,proto3" json:"name,omitempty"`
|
||||
Domain string `protobuf:"bytes,3,opt,name=domain,proto3" json:"domain,omitempty"`
|
||||
Port uint32 `protobuf:"varint,4,opt,name=port,proto3" json:"port,omitempty"`
|
||||
NacosAddressServer string `protobuf:"bytes,5,opt,name=nacosAddressServer,proto3" json:"nacosAddressServer,omitempty"`
|
||||
NacosAccessKey string `protobuf:"bytes,6,opt,name=nacosAccessKey,proto3" json:"nacosAccessKey,omitempty"`
|
||||
NacosSecretKey string `protobuf:"bytes,7,opt,name=nacosSecretKey,proto3" json:"nacosSecretKey,omitempty"`
|
||||
NacosNamespaceId string `protobuf:"bytes,8,opt,name=nacosNamespaceId,proto3" json:"nacosNamespaceId,omitempty"`
|
||||
NacosNamespace string `protobuf:"bytes,9,opt,name=nacosNamespace,proto3" json:"nacosNamespace,omitempty"`
|
||||
NacosGroups []string `protobuf:"bytes,10,rep,name=nacosGroups,proto3" json:"nacosGroups,omitempty"`
|
||||
NacosRefreshInterval int64 `protobuf:"varint,11,opt,name=nacosRefreshInterval,proto3" json:"nacosRefreshInterval,omitempty"`
|
||||
ConsulNamespace string `protobuf:"bytes,12,opt,name=consulNamespace,proto3" json:"consulNamespace,omitempty"`
|
||||
ZkServicesPath []string `protobuf:"bytes,13,rep,name=zkServicesPath,proto3" json:"zkServicesPath,omitempty"`
|
||||
ConsulDatacenter string `protobuf:"bytes,14,opt,name=consulDatacenter,proto3" json:"consulDatacenter,omitempty"`
|
||||
ConsulServiceTag string `protobuf:"bytes,15,opt,name=consulServiceTag,proto3" json:"consulServiceTag,omitempty"`
|
||||
ConsulRefreshInterval int64 `protobuf:"varint,16,opt,name=consulRefreshInterval,proto3" json:"consulRefreshInterval,omitempty"`
|
||||
AuthSecretName string `protobuf:"bytes,17,opt,name=authSecretName,proto3" json:"authSecretName,omitempty"`
|
||||
Protocol string `protobuf:"bytes,18,opt,name=protocol,proto3" json:"protocol,omitempty"`
|
||||
Sni string `protobuf:"bytes,19,opt,name=sni,proto3" json:"sni,omitempty"`
|
||||
McpServerExportDomains []string `protobuf:"bytes,20,rep,name=mcpServerExportDomains,proto3" json:"mcpServerExportDomains,omitempty"`
|
||||
McpServerBaseUrl string `protobuf:"bytes,21,opt,name=mcpServerBaseUrl,proto3" json:"mcpServerBaseUrl,omitempty"`
|
||||
EnableMCPServer *wrappers.BoolValue `protobuf:"bytes,22,opt,name=enableMCPServer,proto3" json:"enableMCPServer,omitempty"`
|
||||
Type string `protobuf:"bytes,1,opt,name=type,proto3" json:"type,omitempty"`
|
||||
Name string `protobuf:"bytes,2,opt,name=name,proto3" json:"name,omitempty"`
|
||||
Domain string `protobuf:"bytes,3,opt,name=domain,proto3" json:"domain,omitempty"`
|
||||
Port uint32 `protobuf:"varint,4,opt,name=port,proto3" json:"port,omitempty"`
|
||||
NacosAddressServer string `protobuf:"bytes,5,opt,name=nacosAddressServer,proto3" json:"nacosAddressServer,omitempty"`
|
||||
NacosAccessKey string `protobuf:"bytes,6,opt,name=nacosAccessKey,proto3" json:"nacosAccessKey,omitempty"`
|
||||
NacosSecretKey string `protobuf:"bytes,7,opt,name=nacosSecretKey,proto3" json:"nacosSecretKey,omitempty"`
|
||||
NacosNamespaceId string `protobuf:"bytes,8,opt,name=nacosNamespaceId,proto3" json:"nacosNamespaceId,omitempty"`
|
||||
NacosNamespace string `protobuf:"bytes,9,opt,name=nacosNamespace,proto3" json:"nacosNamespace,omitempty"`
|
||||
NacosGroups []string `protobuf:"bytes,10,rep,name=nacosGroups,proto3" json:"nacosGroups,omitempty"`
|
||||
NacosRefreshInterval int64 `protobuf:"varint,11,opt,name=nacosRefreshInterval,proto3" json:"nacosRefreshInterval,omitempty"`
|
||||
ConsulNamespace string `protobuf:"bytes,12,opt,name=consulNamespace,proto3" json:"consulNamespace,omitempty"`
|
||||
ZkServicesPath []string `protobuf:"bytes,13,rep,name=zkServicesPath,proto3" json:"zkServicesPath,omitempty"`
|
||||
ConsulDatacenter string `protobuf:"bytes,14,opt,name=consulDatacenter,proto3" json:"consulDatacenter,omitempty"`
|
||||
ConsulServiceTag string `protobuf:"bytes,15,opt,name=consulServiceTag,proto3" json:"consulServiceTag,omitempty"`
|
||||
ConsulRefreshInterval int64 `protobuf:"varint,16,opt,name=consulRefreshInterval,proto3" json:"consulRefreshInterval,omitempty"`
|
||||
AuthSecretName string `protobuf:"bytes,17,opt,name=authSecretName,proto3" json:"authSecretName,omitempty"`
|
||||
Protocol string `protobuf:"bytes,18,opt,name=protocol,proto3" json:"protocol,omitempty"`
|
||||
Sni string `protobuf:"bytes,19,opt,name=sni,proto3" json:"sni,omitempty"`
|
||||
McpServerExportDomains []string `protobuf:"bytes,20,rep,name=mcpServerExportDomains,proto3" json:"mcpServerExportDomains,omitempty"`
|
||||
McpServerBaseUrl string `protobuf:"bytes,21,opt,name=mcpServerBaseUrl,proto3" json:"mcpServerBaseUrl,omitempty"`
|
||||
EnableMCPServer *wrappers.BoolValue `protobuf:"bytes,22,opt,name=enableMCPServer,proto3" json:"enableMCPServer,omitempty"`
|
||||
EnableScopeMcpServers *wrappers.BoolValue `protobuf:"bytes,23,opt,name=enableScopeMcpServers,proto3" json:"enableScopeMcpServers,omitempty"`
|
||||
AllowMcpServers []string `protobuf:"bytes,24,rep,name=allowMcpServers,proto3" json:"allowMcpServers,omitempty"`
|
||||
Metadata map[string]*InnerMap `protobuf:"bytes,25,rep,name=metadata,proto3" json:"metadata,omitempty" protobuf_key:"bytes,1,opt,name=key,proto3" protobuf_val:"bytes,2,opt,name=value,proto3"`
|
||||
}
|
||||
|
||||
func (x *RegistryConfig) Reset() {
|
||||
@@ -321,6 +324,74 @@ func (x *RegistryConfig) GetEnableMCPServer() *wrappers.BoolValue {
|
||||
return nil
|
||||
}
|
||||
|
||||
func (x *RegistryConfig) GetEnableScopeMcpServers() *wrappers.BoolValue {
|
||||
if x != nil {
|
||||
return x.EnableScopeMcpServers
|
||||
}
|
||||
return nil
|
||||
}
|
||||
|
||||
func (x *RegistryConfig) GetAllowMcpServers() []string {
|
||||
if x != nil {
|
||||
return x.AllowMcpServers
|
||||
}
|
||||
return nil
|
||||
}
|
||||
|
||||
func (x *RegistryConfig) GetMetadata() map[string]*InnerMap {
|
||||
if x != nil {
|
||||
return x.Metadata
|
||||
}
|
||||
return nil
|
||||
}
|
||||
|
||||
type InnerMap struct {
|
||||
state protoimpl.MessageState
|
||||
sizeCache protoimpl.SizeCache
|
||||
unknownFields protoimpl.UnknownFields
|
||||
|
||||
InnerMap map[string]string `protobuf:"bytes,1,rep,name=inner_map,json=innerMap,proto3" json:"inner_map,omitempty" protobuf_key:"bytes,1,opt,name=key,proto3" protobuf_val:"bytes,2,opt,name=value,proto3"`
|
||||
}
|
||||
|
||||
func (x *InnerMap) Reset() {
|
||||
*x = InnerMap{}
|
||||
if protoimpl.UnsafeEnabled {
|
||||
mi := &file_networking_v1_mcp_bridge_proto_msgTypes[2]
|
||||
ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x))
|
||||
ms.StoreMessageInfo(mi)
|
||||
}
|
||||
}
|
||||
|
||||
func (x *InnerMap) String() string {
|
||||
return protoimpl.X.MessageStringOf(x)
|
||||
}
|
||||
|
||||
func (*InnerMap) ProtoMessage() {}
|
||||
|
||||
func (x *InnerMap) ProtoReflect() protoreflect.Message {
|
||||
mi := &file_networking_v1_mcp_bridge_proto_msgTypes[2]
|
||||
if protoimpl.UnsafeEnabled && x != nil {
|
||||
ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x))
|
||||
if ms.LoadMessageInfo() == nil {
|
||||
ms.StoreMessageInfo(mi)
|
||||
}
|
||||
return ms
|
||||
}
|
||||
return mi.MessageOf(x)
|
||||
}
|
||||
|
||||
// Deprecated: Use InnerMap.ProtoReflect.Descriptor instead.
|
||||
func (*InnerMap) Descriptor() ([]byte, []int) {
|
||||
return file_networking_v1_mcp_bridge_proto_rawDescGZIP(), []int{2}
|
||||
}
|
||||
|
||||
func (x *InnerMap) GetInnerMap() map[string]string {
|
||||
if x != nil {
|
||||
return x.InnerMap
|
||||
}
|
||||
return nil
|
||||
}
|
||||
|
||||
var File_networking_v1_mcp_bridge_proto protoreflect.FileDescriptor
|
||||
|
||||
var file_networking_v1_mcp_bridge_proto_rawDesc = []byte{
|
||||
@@ -338,7 +409,7 @@ var file_networking_v1_mcp_bridge_proto_rawDesc = []byte{
|
||||
0x73, 0x18, 0x01, 0x20, 0x03, 0x28, 0x0b, 0x32, 0x25, 0x2e, 0x68, 0x69, 0x67, 0x72, 0x65, 0x73,
|
||||
0x73, 0x2e, 0x6e, 0x65, 0x74, 0x77, 0x6f, 0x72, 0x6b, 0x69, 0x6e, 0x67, 0x2e, 0x76, 0x31, 0x2e,
|
||||
0x52, 0x65, 0x67, 0x69, 0x73, 0x74, 0x72, 0x79, 0x43, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x52, 0x0a,
|
||||
0x72, 0x65, 0x67, 0x69, 0x73, 0x74, 0x72, 0x69, 0x65, 0x73, 0x22, 0xfd, 0x06, 0x0a, 0x0e, 0x52,
|
||||
0x72, 0x65, 0x67, 0x69, 0x73, 0x74, 0x72, 0x69, 0x65, 0x73, 0x22, 0xa8, 0x09, 0x0a, 0x0e, 0x52,
|
||||
0x65, 0x67, 0x69, 0x73, 0x74, 0x72, 0x79, 0x43, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x12, 0x17, 0x0a,
|
||||
0x04, 0x74, 0x79, 0x70, 0x65, 0x18, 0x01, 0x20, 0x01, 0x28, 0x09, 0x42, 0x03, 0xe0, 0x41, 0x02,
|
||||
0x52, 0x04, 0x74, 0x79, 0x70, 0x65, 0x12, 0x12, 0x0a, 0x04, 0x6e, 0x61, 0x6d, 0x65, 0x18, 0x02,
|
||||
@@ -394,11 +465,39 @@ var file_networking_v1_mcp_bridge_proto_rawDesc = []byte{
|
||||
0x50, 0x53, 0x65, 0x72, 0x76, 0x65, 0x72, 0x18, 0x16, 0x20, 0x01, 0x28, 0x0b, 0x32, 0x1a, 0x2e,
|
||||
0x67, 0x6f, 0x6f, 0x67, 0x6c, 0x65, 0x2e, 0x70, 0x72, 0x6f, 0x74, 0x6f, 0x62, 0x75, 0x66, 0x2e,
|
||||
0x42, 0x6f, 0x6f, 0x6c, 0x56, 0x61, 0x6c, 0x75, 0x65, 0x52, 0x0f, 0x65, 0x6e, 0x61, 0x62, 0x6c,
|
||||
0x65, 0x4d, 0x43, 0x50, 0x53, 0x65, 0x72, 0x76, 0x65, 0x72, 0x42, 0x2e, 0x5a, 0x2c, 0x67, 0x69,
|
||||
0x74, 0x68, 0x75, 0x62, 0x2e, 0x63, 0x6f, 0x6d, 0x2f, 0x61, 0x6c, 0x69, 0x62, 0x61, 0x62, 0x61,
|
||||
0x2f, 0x68, 0x69, 0x67, 0x72, 0x65, 0x73, 0x73, 0x2f, 0x61, 0x70, 0x69, 0x2f, 0x6e, 0x65, 0x74,
|
||||
0x77, 0x6f, 0x72, 0x6b, 0x69, 0x6e, 0x67, 0x2f, 0x76, 0x31, 0x62, 0x06, 0x70, 0x72, 0x6f, 0x74,
|
||||
0x6f, 0x33,
|
||||
0x65, 0x4d, 0x43, 0x50, 0x53, 0x65, 0x72, 0x76, 0x65, 0x72, 0x12, 0x50, 0x0a, 0x15, 0x65, 0x6e,
|
||||
0x61, 0x62, 0x6c, 0x65, 0x53, 0x63, 0x6f, 0x70, 0x65, 0x4d, 0x63, 0x70, 0x53, 0x65, 0x72, 0x76,
|
||||
0x65, 0x72, 0x73, 0x18, 0x17, 0x20, 0x01, 0x28, 0x0b, 0x32, 0x1a, 0x2e, 0x67, 0x6f, 0x6f, 0x67,
|
||||
0x6c, 0x65, 0x2e, 0x70, 0x72, 0x6f, 0x74, 0x6f, 0x62, 0x75, 0x66, 0x2e, 0x42, 0x6f, 0x6f, 0x6c,
|
||||
0x56, 0x61, 0x6c, 0x75, 0x65, 0x52, 0x15, 0x65, 0x6e, 0x61, 0x62, 0x6c, 0x65, 0x53, 0x63, 0x6f,
|
||||
0x70, 0x65, 0x4d, 0x63, 0x70, 0x53, 0x65, 0x72, 0x76, 0x65, 0x72, 0x73, 0x12, 0x28, 0x0a, 0x0f,
|
||||
0x61, 0x6c, 0x6c, 0x6f, 0x77, 0x4d, 0x63, 0x70, 0x53, 0x65, 0x72, 0x76, 0x65, 0x72, 0x73, 0x18,
|
||||
0x18, 0x20, 0x03, 0x28, 0x09, 0x52, 0x0f, 0x61, 0x6c, 0x6c, 0x6f, 0x77, 0x4d, 0x63, 0x70, 0x53,
|
||||
0x65, 0x72, 0x76, 0x65, 0x72, 0x73, 0x12, 0x4f, 0x0a, 0x08, 0x6d, 0x65, 0x74, 0x61, 0x64, 0x61,
|
||||
0x74, 0x61, 0x18, 0x19, 0x20, 0x03, 0x28, 0x0b, 0x32, 0x33, 0x2e, 0x68, 0x69, 0x67, 0x72, 0x65,
|
||||
0x73, 0x73, 0x2e, 0x6e, 0x65, 0x74, 0x77, 0x6f, 0x72, 0x6b, 0x69, 0x6e, 0x67, 0x2e, 0x76, 0x31,
|
||||
0x2e, 0x52, 0x65, 0x67, 0x69, 0x73, 0x74, 0x72, 0x79, 0x43, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x2e,
|
||||
0x4d, 0x65, 0x74, 0x61, 0x64, 0x61, 0x74, 0x61, 0x45, 0x6e, 0x74, 0x72, 0x79, 0x52, 0x08, 0x6d,
|
||||
0x65, 0x74, 0x61, 0x64, 0x61, 0x74, 0x61, 0x1a, 0x5c, 0x0a, 0x0d, 0x4d, 0x65, 0x74, 0x61, 0x64,
|
||||
0x61, 0x74, 0x61, 0x45, 0x6e, 0x74, 0x72, 0x79, 0x12, 0x10, 0x0a, 0x03, 0x6b, 0x65, 0x79, 0x18,
|
||||
0x01, 0x20, 0x01, 0x28, 0x09, 0x52, 0x03, 0x6b, 0x65, 0x79, 0x12, 0x35, 0x0a, 0x05, 0x76, 0x61,
|
||||
0x6c, 0x75, 0x65, 0x18, 0x02, 0x20, 0x01, 0x28, 0x0b, 0x32, 0x1f, 0x2e, 0x68, 0x69, 0x67, 0x72,
|
||||
0x65, 0x73, 0x73, 0x2e, 0x6e, 0x65, 0x74, 0x77, 0x6f, 0x72, 0x6b, 0x69, 0x6e, 0x67, 0x2e, 0x76,
|
||||
0x31, 0x2e, 0x49, 0x6e, 0x6e, 0x65, 0x72, 0x4d, 0x61, 0x70, 0x52, 0x05, 0x76, 0x61, 0x6c, 0x75,
|
||||
0x65, 0x3a, 0x02, 0x38, 0x01, 0x22, 0x93, 0x01, 0x0a, 0x08, 0x49, 0x6e, 0x6e, 0x65, 0x72, 0x4d,
|
||||
0x61, 0x70, 0x12, 0x4a, 0x0a, 0x09, 0x69, 0x6e, 0x6e, 0x65, 0x72, 0x5f, 0x6d, 0x61, 0x70, 0x18,
|
||||
0x01, 0x20, 0x03, 0x28, 0x0b, 0x32, 0x2d, 0x2e, 0x68, 0x69, 0x67, 0x72, 0x65, 0x73, 0x73, 0x2e,
|
||||
0x6e, 0x65, 0x74, 0x77, 0x6f, 0x72, 0x6b, 0x69, 0x6e, 0x67, 0x2e, 0x76, 0x31, 0x2e, 0x49, 0x6e,
|
||||
0x6e, 0x65, 0x72, 0x4d, 0x61, 0x70, 0x2e, 0x49, 0x6e, 0x6e, 0x65, 0x72, 0x4d, 0x61, 0x70, 0x45,
|
||||
0x6e, 0x74, 0x72, 0x79, 0x52, 0x08, 0x69, 0x6e, 0x6e, 0x65, 0x72, 0x4d, 0x61, 0x70, 0x1a, 0x3b,
|
||||
0x0a, 0x0d, 0x49, 0x6e, 0x6e, 0x65, 0x72, 0x4d, 0x61, 0x70, 0x45, 0x6e, 0x74, 0x72, 0x79, 0x12,
|
||||
0x10, 0x0a, 0x03, 0x6b, 0x65, 0x79, 0x18, 0x01, 0x20, 0x01, 0x28, 0x09, 0x52, 0x03, 0x6b, 0x65,
|
||||
0x79, 0x12, 0x14, 0x0a, 0x05, 0x76, 0x61, 0x6c, 0x75, 0x65, 0x18, 0x02, 0x20, 0x01, 0x28, 0x09,
|
||||
0x52, 0x05, 0x76, 0x61, 0x6c, 0x75, 0x65, 0x3a, 0x02, 0x38, 0x01, 0x42, 0x2e, 0x5a, 0x2c, 0x67,
|
||||
0x69, 0x74, 0x68, 0x75, 0x62, 0x2e, 0x63, 0x6f, 0x6d, 0x2f, 0x61, 0x6c, 0x69, 0x62, 0x61, 0x62,
|
||||
0x61, 0x2f, 0x68, 0x69, 0x67, 0x72, 0x65, 0x73, 0x73, 0x2f, 0x61, 0x70, 0x69, 0x2f, 0x6e, 0x65,
|
||||
0x74, 0x77, 0x6f, 0x72, 0x6b, 0x69, 0x6e, 0x67, 0x2f, 0x76, 0x31, 0x62, 0x06, 0x70, 0x72, 0x6f,
|
||||
0x74, 0x6f, 0x33,
|
||||
}
|
||||
|
||||
var (
|
||||
@@ -413,20 +512,27 @@ func file_networking_v1_mcp_bridge_proto_rawDescGZIP() []byte {
|
||||
return file_networking_v1_mcp_bridge_proto_rawDescData
|
||||
}
|
||||
|
||||
var file_networking_v1_mcp_bridge_proto_msgTypes = make([]protoimpl.MessageInfo, 2)
|
||||
var file_networking_v1_mcp_bridge_proto_msgTypes = make([]protoimpl.MessageInfo, 5)
|
||||
var file_networking_v1_mcp_bridge_proto_goTypes = []interface{}{
|
||||
(*McpBridge)(nil), // 0: higress.networking.v1.McpBridge
|
||||
(*RegistryConfig)(nil), // 1: higress.networking.v1.RegistryConfig
|
||||
(*wrappers.BoolValue)(nil), // 2: google.protobuf.BoolValue
|
||||
(*InnerMap)(nil), // 2: higress.networking.v1.InnerMap
|
||||
nil, // 3: higress.networking.v1.RegistryConfig.MetadataEntry
|
||||
nil, // 4: higress.networking.v1.InnerMap.InnerMapEntry
|
||||
(*wrappers.BoolValue)(nil), // 5: google.protobuf.BoolValue
|
||||
}
|
||||
var file_networking_v1_mcp_bridge_proto_depIdxs = []int32{
|
||||
1, // 0: higress.networking.v1.McpBridge.registries:type_name -> higress.networking.v1.RegistryConfig
|
||||
2, // 1: higress.networking.v1.RegistryConfig.enableMCPServer:type_name -> google.protobuf.BoolValue
|
||||
2, // [2:2] is the sub-list for method output_type
|
||||
2, // [2:2] is the sub-list for method input_type
|
||||
2, // [2:2] is the sub-list for extension type_name
|
||||
2, // [2:2] is the sub-list for extension extendee
|
||||
0, // [0:2] is the sub-list for field type_name
|
||||
5, // 1: higress.networking.v1.RegistryConfig.enableMCPServer:type_name -> google.protobuf.BoolValue
|
||||
5, // 2: higress.networking.v1.RegistryConfig.enableScopeMcpServers:type_name -> google.protobuf.BoolValue
|
||||
3, // 3: higress.networking.v1.RegistryConfig.metadata:type_name -> higress.networking.v1.RegistryConfig.MetadataEntry
|
||||
4, // 4: higress.networking.v1.InnerMap.inner_map:type_name -> higress.networking.v1.InnerMap.InnerMapEntry
|
||||
2, // 5: higress.networking.v1.RegistryConfig.MetadataEntry.value:type_name -> higress.networking.v1.InnerMap
|
||||
6, // [6:6] is the sub-list for method output_type
|
||||
6, // [6:6] is the sub-list for method input_type
|
||||
6, // [6:6] is the sub-list for extension type_name
|
||||
6, // [6:6] is the sub-list for extension extendee
|
||||
0, // [0:6] is the sub-list for field type_name
|
||||
}
|
||||
|
||||
func init() { file_networking_v1_mcp_bridge_proto_init() }
|
||||
@@ -459,6 +565,18 @@ func file_networking_v1_mcp_bridge_proto_init() {
|
||||
return nil
|
||||
}
|
||||
}
|
||||
file_networking_v1_mcp_bridge_proto_msgTypes[2].Exporter = func(v interface{}, i int) interface{} {
|
||||
switch v := v.(*InnerMap); i {
|
||||
case 0:
|
||||
return &v.state
|
||||
case 1:
|
||||
return &v.sizeCache
|
||||
case 2:
|
||||
return &v.unknownFields
|
||||
default:
|
||||
return nil
|
||||
}
|
||||
}
|
||||
}
|
||||
type x struct{}
|
||||
out := protoimpl.TypeBuilder{
|
||||
@@ -466,7 +584,7 @@ func file_networking_v1_mcp_bridge_proto_init() {
|
||||
GoPackagePath: reflect.TypeOf(x{}).PkgPath(),
|
||||
RawDescriptor: file_networking_v1_mcp_bridge_proto_rawDesc,
|
||||
NumEnums: 0,
|
||||
NumMessages: 2,
|
||||
NumMessages: 5,
|
||||
NumExtensions: 0,
|
||||
NumServices: 0,
|
||||
},
|
||||
|
||||
@@ -71,4 +71,11 @@ message RegistryConfig {
|
||||
repeated string mcpServerExportDomains = 20;
|
||||
string mcpServerBaseUrl = 21;
|
||||
google.protobuf.BoolValue enableMCPServer = 22;
|
||||
google.protobuf.BoolValue enableScopeMcpServers = 23;
|
||||
repeated string allowMcpServers = 24;
|
||||
map<string, InnerMap> metadata = 25;
|
||||
}
|
||||
|
||||
message InnerMap {
|
||||
map<string, string> inner_map = 1;
|
||||
}
|
||||
@@ -46,3 +46,24 @@ func (in *RegistryConfig) DeepCopy() *RegistryConfig {
|
||||
func (in *RegistryConfig) DeepCopyInterface() interface{} {
|
||||
return in.DeepCopy()
|
||||
}
|
||||
|
||||
// DeepCopyInto supports using InnerMap within kubernetes types, where deepcopy-gen is used.
|
||||
func (in *InnerMap) DeepCopyInto(out *InnerMap) {
|
||||
p := proto.Clone(in).(*InnerMap)
|
||||
*out = *p
|
||||
}
|
||||
|
||||
// DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new InnerMap. Required by controller-gen.
|
||||
func (in *InnerMap) DeepCopy() *InnerMap {
|
||||
if in == nil {
|
||||
return nil
|
||||
}
|
||||
out := new(InnerMap)
|
||||
in.DeepCopyInto(out)
|
||||
return out
|
||||
}
|
||||
|
||||
// DeepCopyInterface is an autogenerated deepcopy function, copying the receiver, creating a new InnerMap. Required by controller-gen.
|
||||
func (in *InnerMap) DeepCopyInterface() interface{} {
|
||||
return in.DeepCopy()
|
||||
}
|
||||
|
||||
@@ -28,6 +28,17 @@ func (this *RegistryConfig) UnmarshalJSON(b []byte) error {
|
||||
return McpBridgeUnmarshaler.Unmarshal(bytes.NewReader(b), this)
|
||||
}
|
||||
|
||||
// MarshalJSON is a custom marshaler for InnerMap
|
||||
func (this *InnerMap) MarshalJSON() ([]byte, error) {
|
||||
str, err := McpBridgeMarshaler.MarshalToString(this)
|
||||
return []byte(str), err
|
||||
}
|
||||
|
||||
// UnmarshalJSON is a custom unmarshaler for InnerMap
|
||||
func (this *InnerMap) UnmarshalJSON(b []byte) error {
|
||||
return McpBridgeUnmarshaler.Unmarshal(bytes.NewReader(b), this)
|
||||
}
|
||||
|
||||
var (
|
||||
McpBridgeMarshaler = &jsonpb.Marshaler{}
|
||||
McpBridgeUnmarshaler = &jsonpb.Unmarshaler{AllowUnknownFields: true}
|
||||
|
||||
4
go.mod
4
go.mod
@@ -31,7 +31,7 @@ require (
|
||||
github.com/hudl/fargo v1.4.0
|
||||
github.com/mholt/acmez v1.2.0
|
||||
github.com/nacos-group/nacos-sdk-go v1.0.8
|
||||
github.com/nacos-group/nacos-sdk-go/v2 v2.1.2
|
||||
github.com/nacos-group/nacos-sdk-go/v2 v2.3.2
|
||||
github.com/onsi/gomega v1.27.10
|
||||
github.com/spf13/cobra v1.8.0
|
||||
github.com/spf13/pflag v1.0.5
|
||||
@@ -202,6 +202,7 @@ require (
|
||||
github.com/spaolacci/murmur3 v1.1.0 // indirect
|
||||
github.com/spf13/cast v1.5.1 // indirect
|
||||
github.com/stoewer/go-strcase v1.3.0 // indirect
|
||||
github.com/stretchr/objx v0.5.0 // indirect
|
||||
github.com/tetratelabs/wazero v1.7.3 // indirect
|
||||
github.com/tidwall/match v1.1.1 // indirect
|
||||
github.com/tidwall/pretty v1.2.0 // indirect
|
||||
@@ -274,6 +275,5 @@ replace github.com/caddyserver/certmagic => github.com/2456868764/certmagic v1.0
|
||||
|
||||
replace (
|
||||
github.com/dubbogo/gost => github.com/johnlanni/gost v1.11.23-0.20220713132522-0967a24036c6
|
||||
github.com/nacos-group/nacos-sdk-go/v2 => github.com/luoxiner/nacos-sdk-go/v2 v2.2.9-60
|
||||
golang.org/x/exp => golang.org/x/exp v0.0.0-20230713183714-613f0c0eb8a1
|
||||
)
|
||||
|
||||
4
go.sum
4
go.sum
@@ -1434,8 +1434,6 @@ github.com/liggitt/tabwriter v0.0.0-20181228230101-89fcab3d43de h1:9TO3cAIGXtEhn
|
||||
github.com/liggitt/tabwriter v0.0.0-20181228230101-89fcab3d43de/go.mod h1:zAbeS9B/r2mtpb6U+EI2rYA5OAXxsYw6wTamcNW+zcE=
|
||||
github.com/lightstep/lightstep-tracer-common/golang/gogo v0.0.0-20190605223551-bc2310a04743/go.mod h1:qklhhLq1aX+mtWk9cPHPzaBjWImj5ULL6C7HFJtXQMM=
|
||||
github.com/lightstep/lightstep-tracer-go v0.18.1/go.mod h1:jlF1pusYV4pidLvZ+XD0UBX0ZE6WURAspgAczcDHrL4=
|
||||
github.com/luoxiner/nacos-sdk-go/v2 v2.2.9-60 h1:FA/azfz2nSkMc1XR8LeqhcAiA/2/sOMcyBGYCTUc+Cs=
|
||||
github.com/luoxiner/nacos-sdk-go/v2 v2.2.9-60/go.mod h1:9FKXl6FqOiVmm72i8kADtbeK71egyG9y3uRDBg41tpQ=
|
||||
github.com/lyft/protoc-gen-star v0.6.1/go.mod h1:TGAoBVkt8w7MPG72TrKIu85MIdXwDuzJYeZuUPFPNwA=
|
||||
github.com/lyft/protoc-gen-star/v2 v2.0.1/go.mod h1:RcCdONR2ScXaYnQC5tUzxzlpA3WVYF7/opLeUgcQs/o=
|
||||
github.com/lyft/protoc-gen-star/v2 v2.0.3/go.mod h1:amey7yeodaJhXSbf/TlLvWiqQfLOSpEk//mLlc+axEk=
|
||||
@@ -1525,6 +1523,8 @@ github.com/mwitkow/go-conntrack v0.0.0-20190716064945-2f068394615f/go.mod h1:qRW
|
||||
github.com/mxk/go-flowrate v0.0.0-20140419014527-cca7078d478f/go.mod h1:ZdcZmHo+o7JKHSa8/e818NopupXU1YMK5fe1lsApnBw=
|
||||
github.com/nacos-group/nacos-sdk-go v1.0.8 h1:8pEm05Cdav9sQgJSv5kyvlgfz0SzFUUGI3pWX6SiSnM=
|
||||
github.com/nacos-group/nacos-sdk-go v1.0.8/go.mod h1:hlAPn3UdzlxIlSILAyOXKxjFSvDJ9oLzTJ9hLAK1KzA=
|
||||
github.com/nacos-group/nacos-sdk-go/v2 v2.3.2 h1:9QB2nCJzT5wkTVlxNYl3XL/7+G6p2USMi2gQh/ouQQo=
|
||||
github.com/nacos-group/nacos-sdk-go/v2 v2.3.2/go.mod h1:9FKXl6FqOiVmm72i8kADtbeK71egyG9y3uRDBg41tpQ=
|
||||
github.com/nats-io/jwt v0.3.0/go.mod h1:fRYCDE99xlTsqUzISS1Bi75UBJ6ljOJQOAAu5VglpSg=
|
||||
github.com/nats-io/jwt v0.3.2/go.mod h1:/euKqTS1ZD+zzjYrY7pseZrTtWQSjujC7xjPc8wL6eU=
|
||||
github.com/nats-io/nats-server/v2 v2.1.2/go.mod h1:Afk+wRZqkMQs/p45uXdrVLuab3gwv3Z8C4HTBu8GD/k=
|
||||
|
||||
@@ -802,9 +802,20 @@ func (m *IngressConfig) convertDestinationRule(configs []common.WrapperConfig) [
|
||||
if !exist {
|
||||
destinationRules[serviceName] = destinationRuleWrapper
|
||||
} else if dr.DestinationRule.TrafficPolicy != nil {
|
||||
if dr.DestinationRule.TrafficPolicy.LoadBalancer == nil &&
|
||||
destinationRuleWrapper.DestinationRule.TrafficPolicy.LoadBalancer != nil {
|
||||
dr.DestinationRule.TrafficPolicy.LoadBalancer = destinationRuleWrapper.DestinationRule.TrafficPolicy.LoadBalancer
|
||||
// if the service is referenced by an sse type mcp server, an source ip based consistent hashing policy needs to be configured
|
||||
// consistent hashing policy will be generated by mcp server watcher, then if service do not have LoadBalancer settings, it will be merged
|
||||
if destinationRuleWrapper.DestinationRule.TrafficPolicy != nil && destinationRuleWrapper.DestinationRule.TrafficPolicy.LoadBalancer != nil {
|
||||
if dr.DestinationRule.TrafficPolicy.LoadBalancer == nil {
|
||||
dr.DestinationRule.TrafficPolicy.LoadBalancer = destinationRuleWrapper.DestinationRule.TrafficPolicy.LoadBalancer
|
||||
} else if dr.DestinationRule.TrafficPolicy.LoadBalancer.LbPolicy == nil {
|
||||
dr.DestinationRule.TrafficPolicy.LoadBalancer.LbPolicy = destinationRuleWrapper.DestinationRule.TrafficPolicy.LoadBalancer.LbPolicy
|
||||
}
|
||||
}
|
||||
// if the service is referenced by an https type mcp server, an client side simple mode tls policy needs to be configured
|
||||
// simple mode tls policy will be generated by mcp server watcher, then if service do not have tls settings, it will be merged
|
||||
if dr.DestinationRule.TrafficPolicy.Tls == nil && destinationRuleWrapper.DestinationRule.TrafficPolicy != nil &&
|
||||
destinationRuleWrapper.DestinationRule.TrafficPolicy.Tls != nil {
|
||||
dr.DestinationRule.TrafficPolicy.Tls = destinationRuleWrapper.DestinationRule.TrafficPolicy.Tls
|
||||
}
|
||||
portTrafficPolicy := destinationRuleWrapper.DestinationRule.TrafficPolicy.PortLevelSettings[0]
|
||||
portUpdated := false
|
||||
|
||||
@@ -24,12 +24,9 @@ const (
|
||||
IstioMcpAutoGeneratedHttpRouteName = IstioMcpAutoGeneratedPrefix + "-httproute"
|
||||
IstioMcpAutoGeneratedMcpServerName = IstioMcpAutoGeneratedPrefix + "-mcpserver"
|
||||
|
||||
DefaultMcpToolsGroup = "mcp-tools"
|
||||
DefaultMcpCredentialsGroup = "credentials"
|
||||
DefaultNacosServiceNamespace = "public"
|
||||
|
||||
StdioProtocol = "stdio"
|
||||
HttpProtocol = "http"
|
||||
HttpsProtocol = "https"
|
||||
DubboProtocol = "dubbo"
|
||||
McpSSEProtocol = "mcp-sse"
|
||||
McpStreambleProtocol = "mcp-streamble"
|
||||
@@ -39,19 +36,19 @@ type McpToolArgsType string
|
||||
|
||||
// WasmPluginConfig Struct for mcp tool wasm plugin marshal
|
||||
type WasmPluginConfig struct {
|
||||
Rules []*McpServerRule `json:"_rules_"`
|
||||
Rules []*McpServerRule `json:"_rules_,omitempty"`
|
||||
}
|
||||
|
||||
type McpServerRule struct {
|
||||
MatchRoute []string `json:"_match_route_,omitempty"`
|
||||
Server *ServerConfig `json:"server"`
|
||||
Tools []*McpTool `json:"tools"`
|
||||
Server *ServerConfig `json:"server,omitempty"`
|
||||
Tools []*McpTool `json:"tools,omitempty"`
|
||||
AllowTools []string `json:"allowTools,omitempty"`
|
||||
}
|
||||
|
||||
type ServerConfig struct {
|
||||
Name string `json:"name,omitempty"`
|
||||
Config map[string]interface{} `json:"config,omitempty"`
|
||||
AllowTools []string `json:"allowTools,omitempty"`
|
||||
Name string `json:"name,omitempty"`
|
||||
Config map[string]interface{} `json:"config,omitempty"`
|
||||
}
|
||||
|
||||
type McpTool struct {
|
||||
@@ -144,13 +141,13 @@ type InputSchema struct {
|
||||
}
|
||||
|
||||
type ToolsMeta struct {
|
||||
InvokeContext map[string]string `json:"InvokeContext,omitempty"`
|
||||
Enabled bool `json:"Enabled,omitempty"`
|
||||
Templates map[string]interface{} `json:"Templates,omitempty"`
|
||||
InvokeContext map[string]string `json:"invokeContext,omitempty"`
|
||||
Enabled bool `json:"enabled,omitempty"`
|
||||
Templates map[string]interface{} `json:"templates,omitempty"`
|
||||
}
|
||||
|
||||
type JsonGoTemplate struct {
|
||||
RequestTemplate RequestTemplate `json:"requestTemplate"`
|
||||
ResponseTemplate ResponseTemplate `json:"responseTemplate"`
|
||||
RequestTemplate RequestTemplate `json:"requestTemplate,omitempty"`
|
||||
ResponseTemplate ResponseTemplate `json:"responseTemplate,omitempty"`
|
||||
ArgsPosition map[string]string `json:"argsPosition,omitempty"`
|
||||
}
|
||||
|
||||
546
registry/nacos/mcpserver/client.go
Normal file
546
registry/nacos/mcpserver/client.go
Normal file
@@ -0,0 +1,546 @@
|
||||
// Copyright (c) 2022 Alibaba Group Holding Ltd.
|
||||
//
|
||||
// Licensed under the Apache License, Version 2.0 (the "License");
|
||||
// you may not use this file except in compliance with the License.
|
||||
// You may obtain a copy of the License at
|
||||
//
|
||||
// http://www.apache.org/licenses/LICENSE-2.0
|
||||
//
|
||||
// Unless required by applicable law or agreed to in writing, software
|
||||
// distributed under the License is distributed on an "AS IS" BASIS,
|
||||
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
// See the License for the specific language governing permissions and
|
||||
// limitations under the License.
|
||||
|
||||
package mcpserver
|
||||
|
||||
import (
|
||||
"encoding/json"
|
||||
"fmt"
|
||||
"regexp"
|
||||
"strings"
|
||||
|
||||
"github.com/nacos-group/nacos-sdk-go/v2/clients"
|
||||
"github.com/nacos-group/nacos-sdk-go/v2/clients/config_client"
|
||||
"github.com/nacos-group/nacos-sdk-go/v2/clients/naming_client"
|
||||
"github.com/nacos-group/nacos-sdk-go/v2/common/constant"
|
||||
"github.com/nacos-group/nacos-sdk-go/v2/model"
|
||||
"github.com/nacos-group/nacos-sdk-go/v2/vo"
|
||||
)
|
||||
|
||||
const McpServerVersionGroup = "mcp-server-versions"
|
||||
const McpServerSpecGroup = "mcp-server"
|
||||
const McpToolSpecGroup = "mcp-tools"
|
||||
const SystemConfigIdPrefix = "system-"
|
||||
const CredentialPrefix = "credentials-"
|
||||
const DefaultNacosListConfigMode = "blur"
|
||||
|
||||
const ListMcpServerConfigIdPattern = "*mcp-versions.json"
|
||||
|
||||
const DefaultNacosListConfigPageSize = 50
|
||||
|
||||
type ServerSpecInfo struct {
|
||||
RemoteServerConfig *RemoteServerConfig `json:"remoteServerConfig"`
|
||||
}
|
||||
|
||||
type RemoteServerConfig struct {
|
||||
ServiceRef *ServiceRef `json:"serviceRef"`
|
||||
}
|
||||
|
||||
type ServiceRef struct {
|
||||
ServiceName string `json:"serviceName"`
|
||||
GroupName string `json:"groupName"`
|
||||
NamespaceId string `json:"namespaceId"`
|
||||
}
|
||||
|
||||
type NacosRegistryClient struct {
|
||||
namespaceId string
|
||||
configClient config_client.IConfigClient
|
||||
namingClient naming_client.INamingClient
|
||||
servers map[string]*ServerContext
|
||||
}
|
||||
|
||||
type VersionedMcpServerInfo struct {
|
||||
serverInfo *BasicMcpServerInfo
|
||||
version string
|
||||
}
|
||||
|
||||
type ServerContext struct {
|
||||
id string
|
||||
versionedMcpServerInfo *VersionedMcpServerInfo
|
||||
serverChangeListener McpServerListener
|
||||
configsMap map[string]*ConfigListenerWrap
|
||||
serviceInfo *model.Service
|
||||
namingCallback func(services []model.Instance, err error)
|
||||
}
|
||||
|
||||
type McpServerConfig struct {
|
||||
ServerSpecConfig string
|
||||
ToolsSpecConfig string
|
||||
ServiceInfo *model.Service
|
||||
Credentials map[string]interface{}
|
||||
}
|
||||
|
||||
type ConfigListenerWrap struct {
|
||||
dataId string
|
||||
group string
|
||||
data string
|
||||
listener func(namespace, group, dataId, data string)
|
||||
}
|
||||
|
||||
type BasicMcpServerInfo struct {
|
||||
Name string `json:"name"`
|
||||
Id string `json:"id"`
|
||||
FrontProtocol string `json:"frontProtocol"`
|
||||
Protocol string `json:"protocol"`
|
||||
}
|
||||
|
||||
type VersionsMcpServerInfo struct {
|
||||
BasicMcpServerInfo
|
||||
LatestPublishedVersion string `json:"latestPublishedVersion"`
|
||||
Versions []*VersionDetail `json:"versionDetails"`
|
||||
}
|
||||
|
||||
type VersionDetail struct {
|
||||
Version string `json:"version"`
|
||||
IsLatest bool `json:"is_latest"`
|
||||
}
|
||||
|
||||
type McpServerListener func(info *McpServerConfig)
|
||||
|
||||
func NewMcpRegistryClient(clientConfig *constant.ClientConfig, serverConfig []constant.ServerConfig, namespaceId string) (*NacosRegistryClient, error) {
|
||||
clientParam := vo.NacosClientParam{
|
||||
ClientConfig: clientConfig,
|
||||
ServerConfigs: serverConfig,
|
||||
}
|
||||
configClient, err := clients.NewConfigClient(clientParam)
|
||||
namingClient, err := clients.NewNamingClient(clientParam)
|
||||
|
||||
if err != nil {
|
||||
return nil, err
|
||||
}
|
||||
|
||||
return &NacosRegistryClient{
|
||||
namespaceId: namespaceId,
|
||||
configClient: configClient,
|
||||
namingClient: namingClient,
|
||||
servers: map[string]*ServerContext{},
|
||||
}, nil
|
||||
}
|
||||
|
||||
func (n *NacosRegistryClient) listMcpServerConfigs() ([]model.ConfigItem, error) {
|
||||
currentPageNum := 1
|
||||
result := make([]model.ConfigItem, 0)
|
||||
for {
|
||||
configPage, err := n.configClient.SearchConfig(vo.SearchConfigParam{
|
||||
Search: DefaultNacosListConfigMode,
|
||||
DataId: ListMcpServerConfigIdPattern,
|
||||
Group: McpServerVersionGroup,
|
||||
PageNo: currentPageNum,
|
||||
PageSize: DefaultNacosListConfigPageSize,
|
||||
})
|
||||
|
||||
if err != nil {
|
||||
mcpServerLog.Errorf("List mcp server configs for page size %d, page number %d error %v", currentPageNum, DefaultNacosListConfigPageSize)
|
||||
}
|
||||
|
||||
if configPage == nil {
|
||||
mcpServerLog.Errorf("List mcp server configs for page size %d, page number %d null %v", currentPageNum, DefaultNacosListConfigPageSize)
|
||||
continue
|
||||
}
|
||||
|
||||
result = append(result, configPage.PageItems...)
|
||||
|
||||
if configPage.PageNumber >= configPage.PagesAvailable {
|
||||
break
|
||||
}
|
||||
|
||||
currentPageNum += 1
|
||||
}
|
||||
return result, nil
|
||||
}
|
||||
|
||||
// ListMcpServer List all mcp server from nacos mcp registry /**
|
||||
func (n *NacosRegistryClient) ListMcpServer() ([]BasicMcpServerInfo, error) {
|
||||
configs, err := n.listMcpServerConfigs()
|
||||
|
||||
if err != nil {
|
||||
return nil, err
|
||||
}
|
||||
|
||||
var result []BasicMcpServerInfo
|
||||
for _, config := range configs {
|
||||
mcpServerBasicConfig, err := n.configClient.GetConfig(vo.ConfigParam{
|
||||
Group: McpServerVersionGroup,
|
||||
DataId: config.DataId,
|
||||
})
|
||||
|
||||
if err != nil {
|
||||
mcpServerLog.Errorf("Get mcp server version config (dataId: %s) error, %v", config.DataId, err)
|
||||
continue
|
||||
}
|
||||
|
||||
if mcpServerBasicConfig == "" {
|
||||
mcpServerLog.Infof("get empty mcp server version config (dataId: %s)", config.DataId)
|
||||
continue
|
||||
}
|
||||
|
||||
mcpServer := BasicMcpServerInfo{}
|
||||
err = json.Unmarshal([]byte(mcpServerBasicConfig), &mcpServer)
|
||||
if err != nil {
|
||||
mcpServerLog.Errorf("Parse mcp server version config error %v", err)
|
||||
continue
|
||||
}
|
||||
|
||||
if !isMcpServerShouldBeDiscoveryForGateway(mcpServer) {
|
||||
mcpServerLog.Infof("mcp server %s don't need to be discovered for gateway, skip it", mcpServerBasicConfig)
|
||||
continue
|
||||
}
|
||||
|
||||
result = append(result, mcpServer)
|
||||
}
|
||||
return result, nil
|
||||
}
|
||||
|
||||
func isMcpServerShouldBeDiscoveryForGateway(info BasicMcpServerInfo) bool {
|
||||
return "mcp-sse" == info.FrontProtocol || "mcp-streamable" == info.FrontProtocol
|
||||
}
|
||||
|
||||
// ListenToMcpServer Listen to mcp server config and backend service
|
||||
func (n *NacosRegistryClient) ListenToMcpServer(id string, listener McpServerListener) error {
|
||||
versionConfigId := fmt.Sprintf("%s-mcp-versions.json", id)
|
||||
serverVersionConfig, err := n.configClient.GetConfig(vo.ConfigParam{
|
||||
Group: McpServerVersionGroup,
|
||||
DataId: versionConfigId,
|
||||
})
|
||||
if err != nil {
|
||||
mcpServerLog.Errorf("Get mcp server(id: %s) version config error, %v", id, err)
|
||||
} else {
|
||||
mcpServerLog.Infof("Get mcp server(id: %s) version config success, config is:\n %v", id, serverVersionConfig)
|
||||
}
|
||||
|
||||
versionConfigCallBack := func(namespace string, group string, dataId string, content string) {
|
||||
mcpServerLog.Infof("Call back to mcp server %s", id)
|
||||
info := VersionsMcpServerInfo{}
|
||||
err = json.Unmarshal([]byte(content), &info)
|
||||
if err != nil {
|
||||
mcpServerLog.Errorf("Parse mcp server (id: %s) version config callback error, %v", id, err)
|
||||
return
|
||||
}
|
||||
latestVersion := info.LatestPublishedVersion
|
||||
|
||||
ctx := n.servers[id]
|
||||
if ctx.versionedMcpServerInfo == nil {
|
||||
ctx.versionedMcpServerInfo = &VersionedMcpServerInfo{}
|
||||
}
|
||||
ctx.versionedMcpServerInfo.serverInfo = &info.BasicMcpServerInfo
|
||||
|
||||
// first time the version is empty so it will trigger the change finally.
|
||||
if ctx.versionedMcpServerInfo.version != latestVersion {
|
||||
ctx.versionedMcpServerInfo.version = latestVersion
|
||||
n.onServerVersionChanged(ctx)
|
||||
n.triggerMcpServerChange(id)
|
||||
}
|
||||
}
|
||||
|
||||
n.servers[id] = &ServerContext{
|
||||
id: id,
|
||||
serverChangeListener: listener,
|
||||
configsMap: map[string]*ConfigListenerWrap{
|
||||
McpServerVersionGroup: {
|
||||
dataId: versionConfigId,
|
||||
group: McpServerVersionGroup,
|
||||
listener: versionConfigCallBack,
|
||||
},
|
||||
},
|
||||
}
|
||||
|
||||
// trigger callback manually
|
||||
versionConfigCallBack(n.namespaceId, McpServerVersionGroup, versionConfigId, serverVersionConfig)
|
||||
// Listen after get config to avoid multi-callback on same version
|
||||
err = n.configClient.ListenConfig(vo.ConfigParam{
|
||||
Group: McpServerVersionGroup,
|
||||
DataId: versionConfigId,
|
||||
OnChange: versionConfigCallBack,
|
||||
})
|
||||
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
|
||||
return nil
|
||||
}
|
||||
|
||||
func (n *NacosRegistryClient) onServerVersionChanged(ctx *ServerContext) {
|
||||
id := ctx.versionedMcpServerInfo.serverInfo.Id
|
||||
version := ctx.versionedMcpServerInfo.version
|
||||
configsMap := map[string]string{
|
||||
McpServerSpecGroup: fmt.Sprintf("%s-%s-mcp-server.json", id, version),
|
||||
McpToolSpecGroup: fmt.Sprintf("%s-%s-mcp-tools.json", id, version),
|
||||
}
|
||||
|
||||
for group, dataId := range configsMap {
|
||||
configsKey := fmt.Sprintf(SystemConfigIdPrefix+"%s@@%s", id, group)
|
||||
// Only listen to the last version of the server, so we should exist and cancel it first
|
||||
if data, exist := ctx.configsMap[configsKey]; exist {
|
||||
err := n.cancelListenToConfig(data)
|
||||
if err != nil {
|
||||
mcpServerLog.Errorf("cancel listen to old config %v error %v", dataId, err)
|
||||
}
|
||||
}
|
||||
|
||||
configListenerWrap, err := n.ListenToConfig(ctx, dataId, group)
|
||||
if err != nil {
|
||||
mcpServerLog.Errorf("listen to config %v error %v", dataId, err)
|
||||
continue
|
||||
}
|
||||
ctx.configsMap[configsKey] = configListenerWrap
|
||||
}
|
||||
}
|
||||
|
||||
func (n *NacosRegistryClient) triggerMcpServerChange(id string) {
|
||||
if context, exist := n.servers[id]; exist {
|
||||
if config := mapConfigMapToServerConfig(context); config != nil {
|
||||
context.serverChangeListener(config)
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
func mapConfigMapToServerConfig(ctx *ServerContext) *McpServerConfig {
|
||||
result := &McpServerConfig{
|
||||
Credentials: map[string]interface{}{},
|
||||
}
|
||||
configMaps := ctx.configsMap
|
||||
for key, data := range configMaps {
|
||||
if strings.HasPrefix(key, SystemConfigIdPrefix) {
|
||||
group := strings.Split(key, "@@")[1]
|
||||
if group == McpServerSpecGroup {
|
||||
result.ServerSpecConfig = data.data
|
||||
} else if group == McpToolSpecGroup {
|
||||
result.ToolsSpecConfig = data.data
|
||||
}
|
||||
} else if strings.HasPrefix(key, CredentialPrefix) {
|
||||
credentialId := strings.ReplaceAll(key, CredentialPrefix, "")
|
||||
var credData interface{}
|
||||
if err := json.Unmarshal([]byte(data.data), &credData); err != nil {
|
||||
mcpServerLog.Errorf("parse credential %v error %v", credentialId, err)
|
||||
// keep origin data if data is not an object
|
||||
result.Credentials[credentialId] = data.data
|
||||
} else {
|
||||
result.Credentials[credentialId] = credData
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
result.ServiceInfo = ctx.serviceInfo
|
||||
return result
|
||||
}
|
||||
|
||||
func (n *NacosRegistryClient) replaceTemplateAndExactConfigsItems(ctx *ServerContext, config *ConfigListenerWrap) map[string]*ConfigListenerWrap {
|
||||
result := map[string]*ConfigListenerWrap{}
|
||||
compile := regexp.MustCompile("\\$\\{nacos\\.([a-zA-Z0-9-_:\\\\.]+/[a-zA-Z0-9-_:\\\\.]+)}")
|
||||
allConfigs := compile.FindAllString(config.data, -1)
|
||||
allConfigsMap := map[string]string{}
|
||||
for _, config := range allConfigs {
|
||||
allConfigsMap[config] = config
|
||||
}
|
||||
|
||||
newContent := config.data
|
||||
for _, data := range allConfigsMap {
|
||||
dataIdAndGroup := strings.ReplaceAll(data, "${nacos.", "")
|
||||
dataIdAndGroup = dataIdAndGroup[0 : len(dataIdAndGroup)-1]
|
||||
dataIdAndGroupArray := strings.Split(dataIdAndGroup, "/")
|
||||
dataId := strings.TrimSpace(dataIdAndGroupArray[0])
|
||||
group := strings.TrimSpace(dataIdAndGroupArray[1])
|
||||
configWrap, err := n.ListenToConfig(ctx, dataId, group)
|
||||
if err != nil {
|
||||
mcpServerLog.Errorf("extract configs %v from content error %v", dataId, err)
|
||||
continue
|
||||
}
|
||||
result[CredentialPrefix+configWrap.group+"_"+configWrap.dataId] = configWrap
|
||||
newContent = strings.Replace(newContent, data, ".config.credentials."+group+"_"+dataId, -1)
|
||||
}
|
||||
|
||||
config.data = newContent
|
||||
return result
|
||||
}
|
||||
|
||||
func (n *NacosRegistryClient) resetNacosTemplateConfigs(ctx *ServerContext, config *ConfigListenerWrap) {
|
||||
newCredentials := n.replaceTemplateAndExactConfigsItems(ctx, config)
|
||||
|
||||
// cancel all old config listener
|
||||
for key, wrap := range ctx.configsMap {
|
||||
if strings.HasPrefix(key, CredentialPrefix) {
|
||||
if _, ok := newCredentials[key]; !ok {
|
||||
err := n.cancelListenToConfig(wrap)
|
||||
if err != nil {
|
||||
mcpServerLog.Errorf("cancel listen to old credential listener error %v", err)
|
||||
continue
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
for _, data := range newCredentials {
|
||||
ctx.configsMap[CredentialPrefix+data.group+"_"+data.dataId] = data
|
||||
}
|
||||
}
|
||||
|
||||
func (n *NacosRegistryClient) refreshServiceListenerIfNeeded(ctx *ServerContext, serverConfig string) {
|
||||
var serverInfo ServerSpecInfo
|
||||
err := json.Unmarshal([]byte(serverConfig), &serverInfo)
|
||||
if err != nil {
|
||||
mcpServerLog.Errorf("parse server config error %v", err)
|
||||
return
|
||||
}
|
||||
|
||||
if serverInfo.RemoteServerConfig != nil && serverInfo.RemoteServerConfig.ServiceRef != nil {
|
||||
ref := serverInfo.RemoteServerConfig.ServiceRef
|
||||
if ctx.serviceInfo != nil {
|
||||
if ctx.serviceInfo.Name == ref.ServiceName && ctx.serviceInfo.GroupName == ref.GroupName {
|
||||
return
|
||||
}
|
||||
|
||||
err := n.namingClient.Unsubscribe(&vo.SubscribeParam{
|
||||
GroupName: ctx.serviceInfo.GroupName,
|
||||
ServiceName: ctx.serviceInfo.Name,
|
||||
SubscribeCallback: ctx.namingCallback,
|
||||
})
|
||||
if err != nil {
|
||||
mcpServerLog.Errorf("unsubscribe service error:%v, groupName:%s, serviceName:%s", err, ctx.serviceInfo.GroupName, ctx.serviceInfo.Name)
|
||||
}
|
||||
}
|
||||
|
||||
service, err := n.namingClient.GetService(vo.GetServiceParam{
|
||||
GroupName: ref.GroupName,
|
||||
ServiceName: ref.ServiceName,
|
||||
})
|
||||
|
||||
if err != nil {
|
||||
mcpServerLog.Errorf("get service error:%v, groupName:%s, serviceName:%s", err, ref.GroupName, ref.ServiceName)
|
||||
return
|
||||
}
|
||||
|
||||
ctx.serviceInfo = &service
|
||||
|
||||
if ctx.namingCallback == nil {
|
||||
ctx.namingCallback = func(services []model.Instance, err error) {
|
||||
if ctx.serviceInfo == nil {
|
||||
ctx.serviceInfo = &model.Service{
|
||||
GroupName: ctx.serviceInfo.GroupName,
|
||||
Name: ctx.serviceInfo.Name,
|
||||
}
|
||||
}
|
||||
|
||||
ctx.serviceInfo.Name = ref.ServiceName
|
||||
ctx.serviceInfo.GroupName = ref.GroupName
|
||||
ctx.serviceInfo.Hosts = services
|
||||
n.triggerMcpServerChange(ctx.id)
|
||||
}
|
||||
}
|
||||
|
||||
err = n.namingClient.Subscribe(&vo.SubscribeParam{
|
||||
GroupName: ctx.serviceInfo.GroupName,
|
||||
ServiceName: ctx.serviceInfo.Name,
|
||||
SubscribeCallback: ctx.namingCallback,
|
||||
})
|
||||
if err != nil {
|
||||
mcpServerLog.Errorf("subscribe service error:%v, groupName:%s, serviceName:%s", err, ctx.serviceInfo.GroupName, ctx.serviceInfo.Name)
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
func (n *NacosRegistryClient) ListenToConfig(ctx *ServerContext, dataId string, group string) (*ConfigListenerWrap, error) {
|
||||
wrap := ConfigListenerWrap{
|
||||
dataId: dataId,
|
||||
group: group,
|
||||
}
|
||||
|
||||
configListener := func(namespace, group, dataId, data string) {
|
||||
if group == McpToolSpecGroup {
|
||||
n.resetNacosTemplateConfigs(ctx, &wrap)
|
||||
} else if group == McpServerSpecGroup {
|
||||
n.refreshServiceListenerIfNeeded(ctx, data)
|
||||
}
|
||||
|
||||
if ctx.serverChangeListener != nil && wrap.data != data {
|
||||
wrap.data = data
|
||||
n.triggerMcpServerChange(ctx.versionedMcpServerInfo.serverInfo.Id)
|
||||
}
|
||||
}
|
||||
|
||||
config, err := n.configClient.GetConfig(vo.ConfigParam{
|
||||
DataId: dataId,
|
||||
Group: group,
|
||||
})
|
||||
|
||||
if err != nil {
|
||||
return nil, err
|
||||
}
|
||||
|
||||
wrap.listener = configListener
|
||||
wrap.data = config
|
||||
if group == McpToolSpecGroup {
|
||||
n.resetNacosTemplateConfigs(ctx, &wrap)
|
||||
} else if group == McpServerSpecGroup {
|
||||
n.refreshServiceListenerIfNeeded(ctx, wrap.data)
|
||||
}
|
||||
|
||||
err = n.configClient.ListenConfig(vo.ConfigParam{
|
||||
DataId: dataId,
|
||||
Group: group,
|
||||
OnChange: configListener,
|
||||
})
|
||||
if err != nil {
|
||||
return nil, err
|
||||
}
|
||||
|
||||
return &wrap, nil
|
||||
}
|
||||
|
||||
func (n *NacosRegistryClient) cancelListenToConfig(wrap *ConfigListenerWrap) error {
|
||||
return n.configClient.CancelListenConfig(vo.ConfigParam{
|
||||
DataId: wrap.dataId,
|
||||
Group: wrap.group,
|
||||
OnChange: wrap.listener,
|
||||
})
|
||||
}
|
||||
|
||||
func (n *NacosRegistryClient) CancelListenToServer(id string) error {
|
||||
if server, exist := n.servers[id]; exist && server != nil {
|
||||
defer delete(n.servers, id)
|
||||
|
||||
for _, wrap := range server.configsMap {
|
||||
if wrap != nil {
|
||||
err := n.configClient.CancelListenConfig(vo.ConfigParam{
|
||||
DataId: wrap.dataId,
|
||||
Group: wrap.group,
|
||||
OnChange: wrap.listener,
|
||||
})
|
||||
|
||||
if err != nil {
|
||||
mcpServerLog.Errorf("cancel listen config error:%v, dataId:%s, group:%s", err, wrap.dataId, wrap.group)
|
||||
continue
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
if server.serviceInfo != nil {
|
||||
err := n.namingClient.Unsubscribe(&vo.SubscribeParam{
|
||||
GroupName: server.serviceInfo.GroupName,
|
||||
ServiceName: server.serviceInfo.Name,
|
||||
SubscribeCallback: server.namingCallback,
|
||||
})
|
||||
if err != nil {
|
||||
mcpServerLog.Errorf("unsubscribe service error:%v, groupName:%s, serviceName:%s", err, server.serviceInfo.GroupName, server.serviceInfo.Name)
|
||||
return err
|
||||
}
|
||||
}
|
||||
}
|
||||
return nil
|
||||
}
|
||||
|
||||
func (n *NacosRegistryClient) CloseClient() {
|
||||
n.namingClient.CloseClient()
|
||||
n.configClient.CloseClient()
|
||||
}
|
||||
@@ -1,180 +0,0 @@
|
||||
// Copyright (c) 2022 Alibaba Group Holding Ltd.
|
||||
//
|
||||
// Licensed under the Apache License, Version 2.0 (the "License");
|
||||
// you may not use this file except in compliance with the License.
|
||||
// You may obtain a copy of the License at
|
||||
//
|
||||
// http://www.apache.org/licenses/LICENSE-2.0
|
||||
//
|
||||
// Unless required by applicable law or agreed to in writing, software
|
||||
// distributed under the License is distributed on an "AS IS" BASIS,
|
||||
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
// See the License for the specific language governing permissions and
|
||||
// limitations under the License.
|
||||
|
||||
package mcpserver
|
||||
|
||||
import (
|
||||
"fmt"
|
||||
|
||||
"github.com/nacos-group/nacos-sdk-go/v2/clients/config_client"
|
||||
"github.com/nacos-group/nacos-sdk-go/v2/clients/naming_client"
|
||||
"github.com/nacos-group/nacos-sdk-go/v2/model"
|
||||
"github.com/nacos-group/nacos-sdk-go/v2/vo"
|
||||
)
|
||||
|
||||
type MultiConfigListener struct {
|
||||
configClient config_client.IConfigClient
|
||||
onChange func(map[string]string)
|
||||
configCache map[string]string
|
||||
innerCallback func(string, string, string, string)
|
||||
}
|
||||
|
||||
func NewMultiConfigListener(configClient config_client.IConfigClient, onChange func(map[string]string)) *MultiConfigListener {
|
||||
result := &MultiConfigListener{
|
||||
configClient: configClient,
|
||||
configCache: make(map[string]string),
|
||||
onChange: onChange,
|
||||
}
|
||||
|
||||
result.innerCallback = func(namespace string, group string, dataId string, content string) {
|
||||
result.configCache[group+DefaultJoiner+dataId] = content
|
||||
result.onChange(result.configCache)
|
||||
}
|
||||
|
||||
return result
|
||||
}
|
||||
|
||||
func (l *MultiConfigListener) StartListen(configs []vo.ConfigParam) error {
|
||||
for _, config := range configs {
|
||||
content, err := l.configClient.GetConfig(vo.ConfigParam{
|
||||
DataId: config.DataId,
|
||||
Group: config.Group,
|
||||
})
|
||||
|
||||
if err != nil {
|
||||
return fmt.Errorf("get config %s/%s err: %v", config.Group, config.DataId, err)
|
||||
}
|
||||
l.configCache[config.Group+DefaultJoiner+config.DataId] = content
|
||||
err = l.configClient.ListenConfig(vo.ConfigParam{
|
||||
DataId: config.DataId,
|
||||
Group: config.Group,
|
||||
OnChange: l.innerCallback,
|
||||
})
|
||||
|
||||
if err != nil {
|
||||
return fmt.Errorf("listener to config %s/%s error: %w", config.Group, config.DataId, err)
|
||||
}
|
||||
}
|
||||
|
||||
l.onChange(l.configCache)
|
||||
return nil
|
||||
}
|
||||
|
||||
func (l *MultiConfigListener) Stop() {
|
||||
l.configClient.CloseClient()
|
||||
}
|
||||
|
||||
func (l *MultiConfigListener) CancelListen(configs []vo.ConfigParam) error {
|
||||
for _, config := range configs {
|
||||
if _, ok := l.configCache[config.Group+DefaultJoiner+config.DataId]; ok {
|
||||
err := l.configClient.CancelListenConfig(vo.ConfigParam{
|
||||
DataId: config.DataId,
|
||||
Group: config.Group,
|
||||
})
|
||||
|
||||
if err != nil {
|
||||
return fmt.Errorf("cancel config %s/%s error: %w", config.Group, config.DataId, err)
|
||||
}
|
||||
delete(l.configCache, config.Group+config.DataId)
|
||||
}
|
||||
}
|
||||
return nil
|
||||
}
|
||||
|
||||
type ServiceCache struct {
|
||||
services map[string]*NacosServiceRef
|
||||
client naming_client.INamingClient
|
||||
}
|
||||
|
||||
type NacosServiceRef struct {
|
||||
refs map[string]func([]model.Instance)
|
||||
callback func(services []model.Instance, err error)
|
||||
instances *[]model.Instance
|
||||
}
|
||||
|
||||
func NewServiceCache(client naming_client.INamingClient) *ServiceCache {
|
||||
return &ServiceCache{
|
||||
client: client,
|
||||
services: make(map[string]*NacosServiceRef),
|
||||
}
|
||||
}
|
||||
|
||||
func (c *ServiceCache) AddListener(group string, serviceName string, key string, callback func([]model.Instance)) error {
|
||||
uniqueServiceName := c.makeServiceUniqueName(group, serviceName)
|
||||
if _, ok := c.services[uniqueServiceName]; !ok {
|
||||
instances, err := c.client.SelectAllInstances(vo.SelectAllInstancesParam{
|
||||
GroupName: group,
|
||||
ServiceName: serviceName,
|
||||
})
|
||||
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
|
||||
ref := &NacosServiceRef{
|
||||
refs: map[string]func([]model.Instance){},
|
||||
instances: &instances,
|
||||
}
|
||||
|
||||
ref.callback = func(services []model.Instance, err error) {
|
||||
ref.instances = &services
|
||||
for _, refCallback := range ref.refs {
|
||||
refCallback(*ref.instances)
|
||||
}
|
||||
}
|
||||
|
||||
c.services[uniqueServiceName] = ref
|
||||
|
||||
err = c.client.Subscribe(&vo.SubscribeParam{
|
||||
GroupName: group,
|
||||
ServiceName: serviceName,
|
||||
SubscribeCallback: ref.callback,
|
||||
})
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
}
|
||||
|
||||
ref := c.services[uniqueServiceName]
|
||||
ref.refs[key] = callback
|
||||
callback(*ref.instances)
|
||||
return nil
|
||||
}
|
||||
|
||||
func (c *ServiceCache) RemoveListener(group string, serviceName string, key string) error {
|
||||
if ref, ok := c.services[c.makeServiceUniqueName(group, serviceName)]; ok {
|
||||
delete(ref.refs, key)
|
||||
if len(ref.refs) == 0 {
|
||||
err := c.client.Unsubscribe(&vo.SubscribeParam{
|
||||
GroupName: group,
|
||||
ServiceName: serviceName,
|
||||
SubscribeCallback: ref.callback,
|
||||
})
|
||||
|
||||
delete(c.services, c.makeServiceUniqueName(group, serviceName))
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
}
|
||||
}
|
||||
return nil
|
||||
}
|
||||
|
||||
func (c *ServiceCache) makeServiceUniqueName(group string, serviceName string) string {
|
||||
return fmt.Sprintf("%s-%s", group, serviceName)
|
||||
}
|
||||
|
||||
func (c *ServiceCache) Stop() {
|
||||
c.client.CloseClient()
|
||||
}
|
||||
File diff suppressed because it is too large
Load Diff
585
registry/nacos/mcpserver/watcher_test.go
Normal file
585
registry/nacos/mcpserver/watcher_test.go
Normal file
@@ -0,0 +1,585 @@
|
||||
// Copyright (c) 2022 Alibaba Group Holding Ltd.
|
||||
//
|
||||
// Licensed under the Apache License, Version 2.0 (the "License");
|
||||
// you may not use this file except in compliance with the License.
|
||||
// You may obtain a copy of the License at
|
||||
//
|
||||
// http://www.apache.org/licenses/LICENSE-2.0
|
||||
//
|
||||
// Unless required by applicable law or agreed to in writing, software
|
||||
// distributed under the License is distributed on an "AS IS" BASIS,
|
||||
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
// See the License for the specific language governing permissions and
|
||||
// limitations under the License.
|
||||
|
||||
package mcpserver
|
||||
|
||||
import (
|
||||
"fmt"
|
||||
"reflect"
|
||||
"strings"
|
||||
"sync"
|
||||
"testing"
|
||||
|
||||
apiv1 "github.com/alibaba/higress/api/networking/v1"
|
||||
common2 "github.com/alibaba/higress/pkg/ingress/kube/common"
|
||||
provider "github.com/alibaba/higress/registry"
|
||||
"github.com/alibaba/higress/registry/memory"
|
||||
"github.com/nacos-group/nacos-sdk-go/v2/model"
|
||||
"github.com/stretchr/testify/mock"
|
||||
wrappers "google.golang.org/protobuf/types/known/wrapperspb"
|
||||
"istio.io/api/networking/v1alpha3"
|
||||
"istio.io/istio/pkg/config"
|
||||
"istio.io/istio/pkg/config/constants"
|
||||
"istio.io/istio/pkg/config/schema/gvk"
|
||||
)
|
||||
|
||||
type mockWatcher struct {
|
||||
watcher
|
||||
mock.Mock
|
||||
}
|
||||
|
||||
func newTestWatcher(cache memory.Cache, opts ...WatcherOption) mockWatcher {
|
||||
w := &watcher{
|
||||
watchingConfig: make(map[string]bool),
|
||||
RegistryType: "mcpserver",
|
||||
Status: provider.UnHealthy,
|
||||
cache: cache,
|
||||
mutex: &sync.Mutex{},
|
||||
stop: make(chan struct{}),
|
||||
}
|
||||
|
||||
w.NacosRefreshInterval = int64(DefaultRefreshInterval)
|
||||
|
||||
for _, opt := range opts {
|
||||
opt(w)
|
||||
}
|
||||
|
||||
if w.NacosNamespace == "" {
|
||||
w.NacosNamespace = w.NacosNamespaceId
|
||||
}
|
||||
|
||||
return mockWatcher{watcher: *w, Mock: mock.Mock{}}
|
||||
}
|
||||
|
||||
func testCallback(msc *McpServerConfig) memory.Cache {
|
||||
registryConfig := &apiv1.RegistryConfig{
|
||||
Type: string(provider.Nacos),
|
||||
Name: "mse-nacos-public",
|
||||
Domain: "",
|
||||
Port: 8848,
|
||||
NacosAddressServer: "",
|
||||
NacosAccessKey: "ak",
|
||||
NacosSecretKey: "sk",
|
||||
NacosNamespaceId: "",
|
||||
NacosNamespace: "public",
|
||||
NacosGroups: []string{"dev"},
|
||||
NacosRefreshInterval: 0,
|
||||
EnableMCPServer: wrappers.Bool(true),
|
||||
McpServerExportDomains: []string{"mcp.com"},
|
||||
McpServerBaseUrl: "/mcp-servers/",
|
||||
EnableScopeMcpServers: wrappers.Bool(true),
|
||||
AllowMcpServers: []string{"mcp-server-1", "mcp-server-2"},
|
||||
Metadata: map[string]*apiv1.InnerMap{
|
||||
"routeName": &apiv1.InnerMap{
|
||||
InnerMap: map[string]string{"mcp-server-1": "mcp-route-1", "mcp-server-2": "mcp-route-2"},
|
||||
},
|
||||
},
|
||||
}
|
||||
localCache := memory.NewCache()
|
||||
|
||||
testWatcher := newTestWatcher(localCache,
|
||||
WithType(registryConfig.Type),
|
||||
WithName(registryConfig.Name),
|
||||
WithNacosAddressServer(registryConfig.NacosAddressServer),
|
||||
WithDomain(registryConfig.Domain),
|
||||
WithPort(registryConfig.Port),
|
||||
WithNacosNamespaceId(registryConfig.NacosNamespaceId),
|
||||
WithNacosNamespace(registryConfig.NacosNamespace),
|
||||
WithNacosGroups(registryConfig.NacosGroups),
|
||||
WithNacosAccessKey(registryConfig.NacosAccessKey),
|
||||
WithNacosSecretKey(registryConfig.NacosSecretKey),
|
||||
WithNacosRefreshInterval(registryConfig.NacosRefreshInterval),
|
||||
WithMcpExportDomains(registryConfig.McpServerExportDomains),
|
||||
WithMcpBaseUrl(registryConfig.McpServerBaseUrl),
|
||||
WithEnableMcpServer(registryConfig.EnableMCPServer))
|
||||
testWatcher.AppendServiceUpdateHandler(func() {
|
||||
fmt.Println("testWatcher service update success")
|
||||
})
|
||||
|
||||
callback := testWatcher.mcpServerListener("mock-data-id")
|
||||
callback(msc)
|
||||
return localCache
|
||||
}
|
||||
|
||||
func Test_Watcher(t *testing.T) {
|
||||
dataId := "mock-data-id"
|
||||
|
||||
testCase := []struct {
|
||||
name string
|
||||
msc *McpServerConfig
|
||||
dataId string
|
||||
wantConfig map[string]*config.Config
|
||||
}{
|
||||
{
|
||||
name: "normal case",
|
||||
dataId: dataId,
|
||||
msc: &McpServerConfig{
|
||||
Credentials: map[string]interface{}{
|
||||
"test-server": map[string]string{"data": "value"},
|
||||
},
|
||||
ServiceInfo: &model.Service{
|
||||
Hosts: []model.Instance{
|
||||
{
|
||||
Ip: "127.0.0.1",
|
||||
Port: 8080,
|
||||
Metadata: map[string]string{"protocol": "http"},
|
||||
},
|
||||
},
|
||||
},
|
||||
ServerSpecConfig: `{
|
||||
"name": "explore",
|
||||
"protocol": "http",
|
||||
"description": "explore",
|
||||
"remoteServerConfig": {
|
||||
"serviceRef": {
|
||||
"namespaceId": "public",
|
||||
"groupName": "DEFAULT_GROUP",
|
||||
"serviceName": "explore"
|
||||
},
|
||||
"exportPath": ""
|
||||
},
|
||||
"enabled": true
|
||||
}`,
|
||||
ToolsSpecConfig: `{
|
||||
"tools": [
|
||||
{
|
||||
"name": "explore",
|
||||
"description": "find name from tag",
|
||||
"inputSchema": {
|
||||
"type": "object",
|
||||
"properties": {
|
||||
"tags": {
|
||||
"type": "string",
|
||||
"description": "tag"
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
],
|
||||
"toolsMeta": {
|
||||
"explore": {
|
||||
"enabled": true,
|
||||
"templates": {
|
||||
"json-go-template": {
|
||||
"requestTemplate": {
|
||||
"method": "GET",
|
||||
"url": "/v0/explore",
|
||||
"argsToUrlParam": true
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
}`,
|
||||
},
|
||||
wantConfig: map[string]*config.Config{
|
||||
gvk.ServiceEntry.String(): &config.Config{
|
||||
Meta: config.Meta{
|
||||
GroupVersionKind: gvk.ServiceEntry,
|
||||
Name: fmt.Sprintf("%s-%s", provider.IstioMcpAutoGeneratedSeName, strings.TrimSuffix(dataId, ".json")),
|
||||
},
|
||||
Spec: &v1alpha3.ServiceEntry{
|
||||
Hosts: []string{"explore.DEFAULT-GROUP.public.nacos"},
|
||||
Ports: []*v1alpha3.ServicePort{
|
||||
{
|
||||
Number: 8080,
|
||||
Name: "HTTP",
|
||||
Protocol: "HTTP",
|
||||
},
|
||||
},
|
||||
Location: v1alpha3.ServiceEntry_MESH_INTERNAL,
|
||||
Resolution: v1alpha3.ServiceEntry_STATIC,
|
||||
Endpoints: []*v1alpha3.WorkloadEntry{
|
||||
{
|
||||
Address: "127.0.0.1",
|
||||
Ports: map[string]uint32{
|
||||
"HTTP": 8080,
|
||||
},
|
||||
Labels: map[string]string{
|
||||
"protocol": "http",
|
||||
},
|
||||
},
|
||||
},
|
||||
},
|
||||
},
|
||||
gvk.VirtualService.String(): &config.Config{
|
||||
Meta: config.Meta{
|
||||
GroupVersionKind: gvk.VirtualService,
|
||||
Name: fmt.Sprintf("%s-%s", provider.IstioMcpAutoGeneratedVsName, strings.TrimSuffix(dataId, ".json")),
|
||||
},
|
||||
Spec: &v1alpha3.VirtualService{
|
||||
Gateways: []string{"/" + common2.CleanHost("mcp.com"), common2.CreateConvertedName(constants.IstioIngressGatewayName, common2.CleanHost("mcp.com"))},
|
||||
Hosts: []string{"mcp.com"},
|
||||
Http: []*v1alpha3.HTTPRoute{
|
||||
{
|
||||
Name: fmt.Sprintf("%s-%s", provider.IstioMcpAutoGeneratedHttpRouteName, strings.TrimSuffix(dataId, ".json")),
|
||||
Match: []*v1alpha3.HTTPMatchRequest{
|
||||
{
|
||||
Uri: &v1alpha3.StringMatch{
|
||||
MatchType: &v1alpha3.StringMatch_Exact{
|
||||
Exact: "/mcp-servers/explore",
|
||||
},
|
||||
},
|
||||
},
|
||||
{
|
||||
Uri: &v1alpha3.StringMatch{
|
||||
MatchType: &v1alpha3.StringMatch_Prefix{
|
||||
Prefix: "/mcp-servers/explore/",
|
||||
},
|
||||
},
|
||||
},
|
||||
},
|
||||
Route: []*v1alpha3.HTTPRouteDestination{
|
||||
{
|
||||
Destination: &v1alpha3.Destination{
|
||||
Host: "explore.DEFAULT-GROUP.public.nacos",
|
||||
},
|
||||
},
|
||||
},
|
||||
},
|
||||
},
|
||||
},
|
||||
},
|
||||
},
|
||||
},
|
||||
{
|
||||
name: "sse and dns endpoint case",
|
||||
dataId: dataId,
|
||||
msc: &McpServerConfig{
|
||||
Credentials: map[string]interface{}{
|
||||
"test-server": map[string]string{"data": "value"},
|
||||
},
|
||||
ServiceInfo: &model.Service{
|
||||
Hosts: []model.Instance{
|
||||
{
|
||||
Ip: "example.com",
|
||||
Port: 8080,
|
||||
Metadata: map[string]string{"protocol": "http"},
|
||||
},
|
||||
},
|
||||
},
|
||||
ServerSpecConfig: `{
|
||||
"name": "explore",
|
||||
"protocol": "mcp-sse",
|
||||
"description": "explore",
|
||||
"remoteServerConfig": {
|
||||
"serviceRef": {
|
||||
"namespaceId": "public",
|
||||
"groupName": "DEFAULT_GROUP",
|
||||
"serviceName": "explore"
|
||||
},
|
||||
"exportPath": ""
|
||||
},
|
||||
"enabled": true
|
||||
}`,
|
||||
ToolsSpecConfig: `{
|
||||
"tools": [
|
||||
{
|
||||
"name": "explore",
|
||||
"description": "find name from tag",
|
||||
"inputSchema": {
|
||||
"type": "object",
|
||||
"properties": {
|
||||
"tags": {
|
||||
"type": "string",
|
||||
"description": "tag"
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
],
|
||||
"toolsMeta": {
|
||||
"explore": {
|
||||
"enabled": true,
|
||||
"templates": {
|
||||
"json-go-template": {
|
||||
"requestTemplate": {
|
||||
"method": "GET",
|
||||
"url": "/v0/explore",
|
||||
"argsToUrlParam": true
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
}`,
|
||||
},
|
||||
wantConfig: map[string]*config.Config{
|
||||
gvk.ServiceEntry.String(): &config.Config{
|
||||
Meta: config.Meta{
|
||||
GroupVersionKind: gvk.ServiceEntry,
|
||||
Name: fmt.Sprintf("%s-%s", provider.IstioMcpAutoGeneratedSeName, strings.TrimSuffix(dataId, ".json")),
|
||||
},
|
||||
Spec: &v1alpha3.ServiceEntry{
|
||||
Hosts: []string{"explore.DEFAULT-GROUP.public.nacos"},
|
||||
Ports: []*v1alpha3.ServicePort{
|
||||
{
|
||||
Number: 8080,
|
||||
Name: "HTTP",
|
||||
Protocol: "HTTP",
|
||||
},
|
||||
},
|
||||
Location: v1alpha3.ServiceEntry_MESH_INTERNAL,
|
||||
Resolution: v1alpha3.ServiceEntry_DNS,
|
||||
Endpoints: []*v1alpha3.WorkloadEntry{
|
||||
{
|
||||
Address: "example.com",
|
||||
Ports: map[string]uint32{
|
||||
"HTTP": 8080,
|
||||
},
|
||||
Labels: map[string]string{
|
||||
"protocol": "http",
|
||||
},
|
||||
},
|
||||
},
|
||||
},
|
||||
},
|
||||
gvk.VirtualService.String(): &config.Config{
|
||||
Meta: config.Meta{
|
||||
GroupVersionKind: gvk.VirtualService,
|
||||
Name: fmt.Sprintf("%s-%s", provider.IstioMcpAutoGeneratedVsName, strings.TrimSuffix(dataId, ".json")),
|
||||
},
|
||||
Spec: &v1alpha3.VirtualService{
|
||||
Gateways: []string{"/" + common2.CleanHost("mcp.com"), common2.CreateConvertedName(constants.IstioIngressGatewayName, common2.CleanHost("mcp.com"))},
|
||||
Hosts: []string{"mcp.com"},
|
||||
Http: []*v1alpha3.HTTPRoute{
|
||||
{
|
||||
Name: fmt.Sprintf("%s-%s", provider.IstioMcpAutoGeneratedHttpRouteName, strings.TrimSuffix(dataId, ".json")),
|
||||
Match: []*v1alpha3.HTTPMatchRequest{
|
||||
{
|
||||
Uri: &v1alpha3.StringMatch{
|
||||
MatchType: &v1alpha3.StringMatch_Exact{
|
||||
Exact: "/mcp-servers/explore",
|
||||
},
|
||||
},
|
||||
},
|
||||
{
|
||||
Uri: &v1alpha3.StringMatch{
|
||||
MatchType: &v1alpha3.StringMatch_Prefix{
|
||||
Prefix: "/mcp-servers/explore/",
|
||||
},
|
||||
},
|
||||
},
|
||||
},
|
||||
Route: []*v1alpha3.HTTPRouteDestination{
|
||||
{
|
||||
Destination: &v1alpha3.Destination{
|
||||
Host: "explore.DEFAULT-GROUP.public.nacos",
|
||||
},
|
||||
},
|
||||
},
|
||||
Rewrite: &v1alpha3.HTTPRewrite{
|
||||
Uri: "/",
|
||||
Authority: "example.com",
|
||||
},
|
||||
},
|
||||
},
|
||||
},
|
||||
},
|
||||
gvk.DestinationRule.String(): &config.Config{
|
||||
Meta: config.Meta{
|
||||
GroupVersionKind: gvk.DestinationRule,
|
||||
Name: fmt.Sprintf("%s-%s", provider.IstioMcpAutoGeneratedDrName, strings.TrimSuffix(dataId, ".json")),
|
||||
},
|
||||
Spec: &v1alpha3.DestinationRule{
|
||||
Host: "explore.DEFAULT-GROUP.public.nacos",
|
||||
TrafficPolicy: &v1alpha3.TrafficPolicy{
|
||||
LoadBalancer: &v1alpha3.LoadBalancerSettings{
|
||||
LbPolicy: &v1alpha3.LoadBalancerSettings_ConsistentHash{
|
||||
ConsistentHash: &v1alpha3.LoadBalancerSettings_ConsistentHashLB{
|
||||
HashKey: &v1alpha3.LoadBalancerSettings_ConsistentHashLB_UseSourceIp{
|
||||
UseSourceIp: true,
|
||||
},
|
||||
},
|
||||
},
|
||||
},
|
||||
},
|
||||
},
|
||||
},
|
||||
},
|
||||
},
|
||||
{
|
||||
name: "https and dns case",
|
||||
dataId: dataId,
|
||||
msc: &McpServerConfig{
|
||||
Credentials: map[string]interface{}{
|
||||
"test-server": map[string]string{"data": "value"},
|
||||
},
|
||||
ServiceInfo: &model.Service{
|
||||
Hosts: []model.Instance{
|
||||
{
|
||||
Ip: "example.com",
|
||||
Port: 8080,
|
||||
Metadata: map[string]string{"protocol": "https"},
|
||||
},
|
||||
},
|
||||
},
|
||||
ServerSpecConfig: `{
|
||||
"name": "explore",
|
||||
"protocol": "https",
|
||||
"description": "explore",
|
||||
"remoteServerConfig": {
|
||||
"serviceRef": {
|
||||
"namespaceId": "public",
|
||||
"groupName": "DEFAULT_GROUP",
|
||||
"serviceName": "explore"
|
||||
},
|
||||
"exportPath": ""
|
||||
},
|
||||
"enabled": true
|
||||
}`,
|
||||
ToolsSpecConfig: `{
|
||||
"tools": [
|
||||
{
|
||||
"name": "explore",
|
||||
"description": "find name from tag",
|
||||
"inputSchema": {
|
||||
"type": "object",
|
||||
"properties": {
|
||||
"tags": {
|
||||
"type": "string",
|
||||
"description": "tag"
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
],
|
||||
"toolsMeta": {
|
||||
"explore": {
|
||||
"enabled": true,
|
||||
"templates": {
|
||||
"json-go-template": {
|
||||
"requestTemplate": {
|
||||
"method": "GET",
|
||||
"url": "/v0/explore",
|
||||
"argsToUrlParam": true
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
}`,
|
||||
},
|
||||
wantConfig: map[string]*config.Config{
|
||||
gvk.ServiceEntry.String(): &config.Config{
|
||||
Meta: config.Meta{
|
||||
GroupVersionKind: gvk.ServiceEntry,
|
||||
Name: fmt.Sprintf("%s-%s", provider.IstioMcpAutoGeneratedSeName, strings.TrimSuffix(dataId, ".json")),
|
||||
},
|
||||
Spec: &v1alpha3.ServiceEntry{
|
||||
Hosts: []string{"explore.DEFAULT-GROUP.public.nacos"},
|
||||
Ports: []*v1alpha3.ServicePort{
|
||||
{
|
||||
Number: 8080,
|
||||
Name: "HTTPS",
|
||||
Protocol: "HTTPS",
|
||||
},
|
||||
},
|
||||
Location: v1alpha3.ServiceEntry_MESH_INTERNAL,
|
||||
Resolution: v1alpha3.ServiceEntry_DNS,
|
||||
Endpoints: []*v1alpha3.WorkloadEntry{
|
||||
{
|
||||
Address: "example.com",
|
||||
Ports: map[string]uint32{
|
||||
"HTTPS": 8080,
|
||||
},
|
||||
Labels: map[string]string{
|
||||
"protocol": "https",
|
||||
},
|
||||
},
|
||||
},
|
||||
},
|
||||
},
|
||||
gvk.VirtualService.String(): &config.Config{
|
||||
Meta: config.Meta{
|
||||
GroupVersionKind: gvk.VirtualService,
|
||||
Name: fmt.Sprintf("%s-%s", provider.IstioMcpAutoGeneratedVsName, strings.TrimSuffix(dataId, ".json")),
|
||||
},
|
||||
Spec: &v1alpha3.VirtualService{
|
||||
Gateways: []string{"/" + common2.CleanHost("mcp.com"), common2.CreateConvertedName(constants.IstioIngressGatewayName, common2.CleanHost("mcp.com"))},
|
||||
Hosts: []string{"mcp.com"},
|
||||
Http: []*v1alpha3.HTTPRoute{
|
||||
{
|
||||
Name: fmt.Sprintf("%s-%s", provider.IstioMcpAutoGeneratedHttpRouteName, strings.TrimSuffix(dataId, ".json")),
|
||||
Match: []*v1alpha3.HTTPMatchRequest{
|
||||
{
|
||||
Uri: &v1alpha3.StringMatch{
|
||||
MatchType: &v1alpha3.StringMatch_Exact{
|
||||
Exact: "/mcp-servers/explore",
|
||||
},
|
||||
},
|
||||
},
|
||||
{
|
||||
Uri: &v1alpha3.StringMatch{
|
||||
MatchType: &v1alpha3.StringMatch_Prefix{
|
||||
Prefix: "/mcp-servers/explore/",
|
||||
},
|
||||
},
|
||||
},
|
||||
},
|
||||
Route: []*v1alpha3.HTTPRouteDestination{
|
||||
{
|
||||
Destination: &v1alpha3.Destination{
|
||||
Host: "explore.DEFAULT-GROUP.public.nacos",
|
||||
},
|
||||
},
|
||||
},
|
||||
Rewrite: &v1alpha3.HTTPRewrite{
|
||||
Authority: "example.com",
|
||||
},
|
||||
},
|
||||
},
|
||||
},
|
||||
},
|
||||
gvk.DestinationRule.String(): &config.Config{
|
||||
Meta: config.Meta{
|
||||
GroupVersionKind: gvk.DestinationRule,
|
||||
Name: fmt.Sprintf("%s-%s", provider.IstioMcpAutoGeneratedDrName, strings.TrimSuffix(dataId, ".json")),
|
||||
},
|
||||
Spec: &v1alpha3.DestinationRule{
|
||||
Host: "explore.DEFAULT-GROUP.public.nacos",
|
||||
TrafficPolicy: &v1alpha3.TrafficPolicy{
|
||||
Tls: &v1alpha3.ClientTLSSettings{
|
||||
Mode: v1alpha3.ClientTLSSettings_SIMPLE,
|
||||
},
|
||||
},
|
||||
},
|
||||
},
|
||||
},
|
||||
},
|
||||
}
|
||||
|
||||
for _, tc := range testCase {
|
||||
t.Run(tc.name, func(t *testing.T) {
|
||||
localCache := testCallback(tc.msc)
|
||||
se := localCache.GetAllConfigs(gvk.ServiceEntry)[dataId]
|
||||
wantSe := tc.wantConfig[gvk.ServiceEntry.String()]
|
||||
if !reflect.DeepEqual(se, wantSe) {
|
||||
t.Errorf("se is not equal, want %v\n, got %v", wantSe, se)
|
||||
}
|
||||
|
||||
vs := localCache.GetAllConfigs(gvk.VirtualService)[dataId]
|
||||
wantVs := tc.wantConfig[gvk.VirtualService.String()]
|
||||
if !reflect.DeepEqual(vs, wantVs) {
|
||||
t.Errorf("vs is not equal, want %v\n, got %v", wantVs, vs)
|
||||
}
|
||||
|
||||
dr := localCache.GetAllConfigs(gvk.DestinationRule)[dataId]
|
||||
wantDr := tc.wantConfig[gvk.DestinationRule.String()]
|
||||
if !reflect.DeepEqual(dr, wantDr) {
|
||||
t.Errorf("dr is not equal, want %v\n, got %v", wantDr, dr)
|
||||
}
|
||||
})
|
||||
}
|
||||
}
|
||||
@@ -16,11 +16,14 @@ package v2
|
||||
|
||||
import (
|
||||
"errors"
|
||||
"fmt"
|
||||
"net"
|
||||
"strconv"
|
||||
"strings"
|
||||
"sync"
|
||||
"time"
|
||||
|
||||
"github.com/golang/protobuf/ptypes/wrappers"
|
||||
"github.com/nacos-group/nacos-sdk-go/v2/clients"
|
||||
"github.com/nacos-group/nacos-sdk-go/v2/clients/naming_client"
|
||||
"github.com/nacos-group/nacos-sdk-go/v2/common/constant"
|
||||
@@ -32,9 +35,11 @@ import (
|
||||
|
||||
apiv1 "github.com/alibaba/higress/api/networking/v1"
|
||||
"github.com/alibaba/higress/pkg/common"
|
||||
"github.com/alibaba/higress/registry"
|
||||
provider "github.com/alibaba/higress/registry"
|
||||
"github.com/alibaba/higress/registry/memory"
|
||||
"github.com/alibaba/higress/registry/nacos/address"
|
||||
"github.com/alibaba/higress/registry/nacos/mcpserver"
|
||||
)
|
||||
|
||||
const (
|
||||
@@ -68,6 +73,9 @@ type watcher struct {
|
||||
updateCacheWhenEmpty bool
|
||||
nacosClientConfig *constant.ClientConfig
|
||||
authOption provider.AuthOption
|
||||
namespace string
|
||||
clusterId string
|
||||
mcpWatcher provider.Watcher
|
||||
}
|
||||
|
||||
type WatcherOption func(w *watcher)
|
||||
@@ -88,6 +96,45 @@ func NewWatcher(cache memory.Cache, opts ...WatcherOption) (provider.Watcher, er
|
||||
opt(w)
|
||||
}
|
||||
|
||||
if w.EnableMCPServer != nil && w.EnableMCPServer.GetValue() {
|
||||
if w.Type != string(registry.Nacos3) {
|
||||
log.Errorf("can not create mcpWatcher for nacos 2.x type, required nacos 3.x")
|
||||
} else {
|
||||
mcpWatcher, err := mcpserver.NewWatcher(
|
||||
cache,
|
||||
mcpserver.WithType(w.Type),
|
||||
mcpserver.WithName(w.Name),
|
||||
mcpserver.WithNacosAddressServer(w.NacosAddressServer),
|
||||
mcpserver.WithDomain(w.Domain),
|
||||
mcpserver.WithPort(w.Port),
|
||||
mcpserver.WithNacosNamespaceId(w.NacosNamespaceId),
|
||||
mcpserver.WithNacosNamespace(w.NacosNamespace),
|
||||
mcpserver.WithNacosGroups(w.NacosGroups),
|
||||
mcpserver.WithNacosAccessKey(w.NacosAccessKey),
|
||||
mcpserver.WithNacosSecretKey(w.NacosSecretKey),
|
||||
mcpserver.WithNacosRefreshInterval(w.NacosRefreshInterval),
|
||||
mcpserver.WithMcpExportDomains(w.McpServerExportDomains),
|
||||
mcpserver.WithMcpBaseUrl(w.McpServerBaseUrl),
|
||||
mcpserver.WithEnableMcpServer(w.EnableMCPServer),
|
||||
mcpserver.WithClusterId(w.clusterId),
|
||||
mcpserver.WithNamespace(w.namespace),
|
||||
mcpserver.WithAuthOption(w.authOption),
|
||||
)
|
||||
if err != nil {
|
||||
return nil, fmt.Errorf("can not create mcp server watcher, err:%v", err)
|
||||
}
|
||||
var once sync.Once
|
||||
mcpWatcher.ReadyHandler(func(ready bool) {
|
||||
once.Do(func() {
|
||||
if ready {
|
||||
log.Infof("Registry mcp Watcher is ready, type:%s, name:%s", w.Type, w.Name)
|
||||
}
|
||||
})
|
||||
})
|
||||
w.mcpWatcher = mcpWatcher
|
||||
}
|
||||
}
|
||||
|
||||
if w.NacosNamespace == "" {
|
||||
w.NacosNamespace = w.NacosNamespaceId
|
||||
}
|
||||
@@ -233,15 +280,51 @@ func WithAuthOption(authOption provider.AuthOption) WatcherOption {
|
||||
}
|
||||
}
|
||||
|
||||
func WithMcpExportDomains(exportDomains []string) WatcherOption {
|
||||
return func(w *watcher) {
|
||||
w.McpServerExportDomains = exportDomains
|
||||
}
|
||||
}
|
||||
|
||||
func WithMcpBaseUrl(url string) WatcherOption {
|
||||
return func(w *watcher) {
|
||||
w.McpServerBaseUrl = url
|
||||
}
|
||||
}
|
||||
|
||||
func WithEnableMcpServer(enable *wrappers.BoolValue) WatcherOption {
|
||||
return func(w *watcher) {
|
||||
w.EnableMCPServer = enable
|
||||
}
|
||||
}
|
||||
|
||||
func WithNamespace(ns string) WatcherOption {
|
||||
return func(w *watcher) {
|
||||
w.namespace = ns
|
||||
}
|
||||
}
|
||||
|
||||
func WithClusterId(id string) WatcherOption {
|
||||
return func(w *watcher) {
|
||||
w.clusterId = id
|
||||
}
|
||||
}
|
||||
|
||||
func (w *watcher) Run() {
|
||||
ticker := time.NewTicker(time.Duration(w.NacosRefreshInterval))
|
||||
defer ticker.Stop()
|
||||
w.Status = provider.ProbeWatcherStatus(w.Domain, strconv.FormatUint(uint64(w.Port), 10))
|
||||
if w.mcpWatcher != nil {
|
||||
w.mcpWatcher.AppendServiceUpdateHandler(w.UpdateService)
|
||||
go w.mcpWatcher.Run()
|
||||
}
|
||||
err := w.fetchAllServices()
|
||||
if err != nil {
|
||||
log.Errorf("first fetch services failed, err:%v", err)
|
||||
} else {
|
||||
w.Ready(true)
|
||||
if w.mcpWatcherReady() {
|
||||
w.Ready(true)
|
||||
}
|
||||
}
|
||||
for {
|
||||
select {
|
||||
@@ -250,7 +333,9 @@ func (w *watcher) Run() {
|
||||
if err != nil {
|
||||
log.Errorf("fetch services failed, err:%v", err)
|
||||
} else {
|
||||
w.Ready(true)
|
||||
if w.mcpWatcherReady() {
|
||||
w.Ready(true)
|
||||
}
|
||||
}
|
||||
case <-w.stop:
|
||||
return
|
||||
@@ -258,6 +343,10 @@ func (w *watcher) Run() {
|
||||
}
|
||||
}
|
||||
|
||||
func (w *watcher) mcpWatcherReady() bool {
|
||||
return w.mcpWatcher == nil || w.mcpWatcher.IsReady()
|
||||
}
|
||||
|
||||
func (w *watcher) updateNacosClient() {
|
||||
for {
|
||||
select {
|
||||
@@ -438,6 +527,7 @@ func (w *watcher) getSubscribeCallback(groupName string, serviceName string) fun
|
||||
func (w *watcher) generateServiceEntry(host string, services []model.Instance) *v1alpha3.ServiceEntry {
|
||||
portList := make([]*v1alpha3.ServicePort, 0)
|
||||
endpoints := make([]*v1alpha3.WorkloadEntry, 0)
|
||||
isDnsService := false
|
||||
|
||||
for _, service := range services {
|
||||
protocol := common.HTTP
|
||||
@@ -452,6 +542,9 @@ func (w *watcher) generateServiceEntry(host string, services []model.Instance) *
|
||||
if len(portList) == 0 {
|
||||
portList = append(portList, port)
|
||||
}
|
||||
if !isValidIP(service.Ip) {
|
||||
isDnsService = true
|
||||
}
|
||||
endpoint := &v1alpha3.WorkloadEntry{
|
||||
Address: service.Ip,
|
||||
Ports: map[string]uint32{port.Protocol: port.Number},
|
||||
@@ -460,11 +553,15 @@ func (w *watcher) generateServiceEntry(host string, services []model.Instance) *
|
||||
endpoints = append(endpoints, endpoint)
|
||||
}
|
||||
|
||||
resolution := v1alpha3.ServiceEntry_STATIC
|
||||
if isDnsService {
|
||||
resolution = v1alpha3.ServiceEntry_DNS
|
||||
}
|
||||
se := &v1alpha3.ServiceEntry{
|
||||
Hosts: []string{host},
|
||||
Ports: portList,
|
||||
Location: v1alpha3.ServiceEntry_MESH_INTERNAL,
|
||||
Resolution: v1alpha3.ServiceEntry_STATIC,
|
||||
Resolution: resolution,
|
||||
Endpoints: endpoints,
|
||||
}
|
||||
|
||||
@@ -477,6 +574,9 @@ func (w *watcher) Stop() {
|
||||
if w.addrProvider != nil {
|
||||
w.addrProvider.Stop()
|
||||
}
|
||||
if w.mcpWatcher != nil {
|
||||
w.mcpWatcher.Stop()
|
||||
}
|
||||
for key := range w.WatchingServices {
|
||||
s := strings.Split(key, DefaultJoiner)
|
||||
err := w.unsubscribe(s[0], s[1])
|
||||
@@ -523,3 +623,8 @@ func shouldSubscribe(serviceName string) bool {
|
||||
|
||||
return true
|
||||
}
|
||||
|
||||
func isValidIP(ipStr string) bool {
|
||||
ip := net.ParseIP(ipStr)
|
||||
return ip != nil
|
||||
}
|
||||
|
||||
@@ -36,7 +36,6 @@ import (
|
||||
"github.com/alibaba/higress/registry/eureka"
|
||||
"github.com/alibaba/higress/registry/memory"
|
||||
"github.com/alibaba/higress/registry/nacos"
|
||||
"github.com/alibaba/higress/registry/nacos/mcpserver"
|
||||
nacosv2 "github.com/alibaba/higress/registry/nacos/v2"
|
||||
"github.com/alibaba/higress/registry/zookeeper"
|
||||
)
|
||||
@@ -171,7 +170,7 @@ func (r *Reconciler) generateWatcherFromRegistryConfig(registry *apiv1.RegistryC
|
||||
nacos.WithNacosRefreshInterval(registry.NacosRefreshInterval),
|
||||
nacos.WithAuthOption(authOption),
|
||||
)
|
||||
case string(Nacos2):
|
||||
case string(Nacos2), string(Nacos3):
|
||||
watcher, err = nacosv2.NewWatcher(
|
||||
r.Cache,
|
||||
nacosv2.WithType(registry.Type),
|
||||
@@ -185,44 +184,13 @@ func (r *Reconciler) generateWatcherFromRegistryConfig(registry *apiv1.RegistryC
|
||||
nacosv2.WithNacosNamespace(registry.NacosNamespace),
|
||||
nacosv2.WithNacosGroups(registry.NacosGroups),
|
||||
nacosv2.WithNacosRefreshInterval(registry.NacosRefreshInterval),
|
||||
nacosv2.WithMcpExportDomains(registry.McpServerExportDomains),
|
||||
nacosv2.WithMcpBaseUrl(registry.McpServerBaseUrl),
|
||||
nacosv2.WithEnableMcpServer(registry.EnableMCPServer),
|
||||
nacosv2.WithClusterId(r.clusterId),
|
||||
nacosv2.WithNamespace(r.namespace),
|
||||
nacosv2.WithAuthOption(authOption),
|
||||
)
|
||||
case string(Nacos3):
|
||||
if registry.EnableMCPServer.GetValue() {
|
||||
watcher, err = mcpserver.NewWatcher(
|
||||
r.Cache,
|
||||
mcpserver.WithType(registry.Type),
|
||||
mcpserver.WithName(registry.Name),
|
||||
mcpserver.WithNacosAddressServer(registry.NacosAddressServer),
|
||||
mcpserver.WithDomain(registry.Domain),
|
||||
mcpserver.WithPort(registry.Port),
|
||||
mcpserver.WithNacosAccessKey(registry.NacosAccessKey),
|
||||
mcpserver.WithNacosSecretKey(registry.NacosSecretKey),
|
||||
mcpserver.WithNacosRefreshInterval(registry.NacosRefreshInterval),
|
||||
mcpserver.WithMcpExportDomains(registry.McpServerExportDomains),
|
||||
mcpserver.WithMcpBaseUrl(registry.McpServerBaseUrl),
|
||||
mcpserver.WithEnableMcpServer(registry.EnableMCPServer),
|
||||
mcpserver.WithClusterId(r.clusterId),
|
||||
mcpserver.WithNamespace(r.namespace),
|
||||
mcpserver.WithAuthOption(authOption),
|
||||
)
|
||||
} else {
|
||||
watcher, err = nacosv2.NewWatcher(
|
||||
r.Cache,
|
||||
nacosv2.WithType(registry.Type),
|
||||
nacosv2.WithName(registry.Name),
|
||||
nacosv2.WithNacosAddressServer(registry.NacosAddressServer),
|
||||
nacosv2.WithDomain(registry.Domain),
|
||||
nacosv2.WithPort(registry.Port),
|
||||
nacosv2.WithNacosAccessKey(registry.NacosAccessKey),
|
||||
nacosv2.WithNacosSecretKey(registry.NacosSecretKey),
|
||||
nacosv2.WithNacosNamespaceId(registry.NacosNamespaceId),
|
||||
nacosv2.WithNacosNamespace(registry.NacosNamespace),
|
||||
nacosv2.WithNacosGroups(registry.NacosGroups),
|
||||
nacosv2.WithNacosRefreshInterval(registry.NacosRefreshInterval),
|
||||
nacosv2.WithAuthOption(authOption),
|
||||
)
|
||||
}
|
||||
case string(Zookeeper):
|
||||
watcher, err = zookeeper.NewWatcher(
|
||||
r.Cache,
|
||||
|
||||
Reference in New Issue
Block a user