mirror of
https://github.com/alibaba/higress.git
synced 2026-03-10 19:51:00 +08:00
192 lines
6.3 KiB
Go
192 lines
6.3 KiB
Go
// Copyright Istio Authors
|
|
//
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
// you may not use this file except in compliance with the License.
|
|
// You may obtain a copy of the License at
|
|
//
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
//
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
// See the License for the specific language governing permissions and
|
|
// limitations under the License.
|
|
|
|
package istio
|
|
|
|
import (
|
|
"context"
|
|
"fmt"
|
|
"sort"
|
|
"strings"
|
|
|
|
networking "istio.io/api/networking/v1alpha3"
|
|
"istio.io/istio/pilot/pkg/model"
|
|
serviceRegistryKube "istio.io/istio/pilot/pkg/serviceregistry/kube"
|
|
"istio.io/istio/pkg/cluster"
|
|
"istio.io/istio/pkg/config/schema/gvk"
|
|
"istio.io/istio/pkg/kube"
|
|
"istio.io/istio/pkg/util/sets"
|
|
corev1 "k8s.io/api/core/v1"
|
|
kerrors "k8s.io/apimachinery/pkg/api/errors"
|
|
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
|
)
|
|
|
|
// GatewayContext contains a minimal subset of push context functionality to be exposed to GatewayAPIControllers
|
|
type GatewayContext struct {
|
|
ps *model.PushContext
|
|
// Start - Updated by Higress
|
|
client kube.Client
|
|
domainSuffix string
|
|
clusterID cluster.ID
|
|
// End - Updated by Higress
|
|
}
|
|
|
|
// Start - Updated by Higress
|
|
|
|
func NewGatewayContext(ps *model.PushContext, client kube.Client, domainSuffix string, clusterID cluster.ID) GatewayContext {
|
|
return GatewayContext{ps, client, domainSuffix, clusterID}
|
|
}
|
|
|
|
// ResolveGatewayInstances attempts to resolve all instances that a gateway will be exposed on.
|
|
// Note: this function considers *all* instances of the service; its possible those instances will not actually be properly functioning
|
|
// gateways, so this is not 100% accurate, but sufficient to expose intent to users.
|
|
// The actual configuration generation is done on a per-workload basis and will get the exact set of matched instances for that workload.
|
|
// Four sets are exposed:
|
|
// * Internal addresses (eg istio-ingressgateway.istio-system.svc.cluster.local:80).
|
|
// * External addresses (eg 1.2.3.4), this comes from LoadBalancer services. There may be multiple in some cases (especially multi cluster).
|
|
// * Pending addresses (eg istio-ingressgateway.istio-system.svc), are LoadBalancer-type services with pending external addresses.
|
|
// * Warnings for references that could not be resolved. These are intended to be user facing.
|
|
func (gc GatewayContext) ResolveGatewayInstances(
|
|
namespace string,
|
|
gwsvcs []string,
|
|
servers []*networking.Server,
|
|
) (internal, external, pending, warns []string) {
|
|
ports := map[int]struct{}{}
|
|
for _, s := range servers {
|
|
ports[int(s.Port.Number)] = struct{}{}
|
|
}
|
|
foundInternal := sets.New[string]()
|
|
foundExternal := sets.New[string]()
|
|
foundPending := sets.New[string]()
|
|
warnings := []string{}
|
|
|
|
// Cache endpoints to reduce redundant queries
|
|
endpointsCache := make(map[string]*corev1.Endpoints)
|
|
|
|
for _, g := range gwsvcs {
|
|
svc := gc.GetService(g, namespace, gvk.Service.Kind)
|
|
if svc == nil {
|
|
warnings = append(warnings, fmt.Sprintf("hostname %q not found", g))
|
|
continue
|
|
}
|
|
|
|
for port := range ports {
|
|
exists := checkServicePortExists(svc, port)
|
|
if exists {
|
|
foundInternal.Insert(fmt.Sprintf("%s:%d", g, port))
|
|
if svc.Attributes.ClusterExternalAddresses.Len() > 0 {
|
|
// Fetch external IPs from all clusters
|
|
svc.Attributes.ClusterExternalAddresses.ForEach(func(c cluster.ID, externalIPs []string) {
|
|
foundExternal.InsertAll(externalIPs...)
|
|
})
|
|
} else if corev1.ServiceType(svc.Attributes.Type) == corev1.ServiceTypeLoadBalancer {
|
|
if !foundPending.Contains(g) {
|
|
warnings = append(warnings, fmt.Sprintf("address pending for hostname %q", g))
|
|
foundPending.Insert(g)
|
|
}
|
|
}
|
|
} else {
|
|
endpoints, ok := endpointsCache[g]
|
|
if !ok {
|
|
endpoints = gc.GetEndpoints(g, namespace)
|
|
endpointsCache[g] = endpoints
|
|
}
|
|
|
|
if endpoints == nil {
|
|
warnings = append(warnings, fmt.Sprintf("no instances found for hostname %q", g))
|
|
} else {
|
|
hintWorkloadPort := false
|
|
for _, subset := range endpoints.Subsets {
|
|
for _, subSetPort := range subset.Ports {
|
|
if subSetPort.Port == int32(port) {
|
|
hintWorkloadPort = true
|
|
break
|
|
}
|
|
}
|
|
if hintWorkloadPort {
|
|
break
|
|
}
|
|
}
|
|
if hintWorkloadPort {
|
|
warnings = append(warnings, fmt.Sprintf(
|
|
"port %d not found for hostname %q (hint: the service port should be specified, not the workload port", port, g))
|
|
} else {
|
|
warnings = append(warnings, fmt.Sprintf("port %d not found for hostname %q", port, g))
|
|
}
|
|
}
|
|
}
|
|
}
|
|
}
|
|
sort.Strings(warnings)
|
|
return sets.SortedList(foundInternal), sets.SortedList(foundExternal), sets.SortedList(foundPending), warnings
|
|
}
|
|
|
|
func (gc GatewayContext) GetService(hostname, namespace, kind string) *model.Service {
|
|
// Currently only supports type Kubernetes Service
|
|
if kind != gvk.Service.Kind {
|
|
log.Warnf("Unsupported kind: expected 'Service', but got '%s'", kind)
|
|
return nil
|
|
}
|
|
serviceName := extractServiceName(hostname)
|
|
|
|
svc, err := gc.client.Kube().CoreV1().Services(namespace).Get(context.TODO(), serviceName, metav1.GetOptions{})
|
|
if err != nil {
|
|
if kerrors.IsNotFound(err) {
|
|
return nil
|
|
}
|
|
log.Errorf("failed to get service (serviceName: %s, namespace: %s): %v", serviceName, namespace, err)
|
|
return nil
|
|
}
|
|
|
|
return serviceRegistryKube.ConvertService(*svc, gc.domainSuffix, gc.clusterID)
|
|
}
|
|
|
|
func (gc GatewayContext) GetEndpoints(hostname, namespace string) *corev1.Endpoints {
|
|
serviceName := extractServiceName(hostname)
|
|
|
|
endpoints, err := gc.client.Kube().CoreV1().Endpoints(namespace).Get(context.TODO(), serviceName, metav1.GetOptions{})
|
|
|
|
if err != nil {
|
|
if kerrors.IsNotFound(err) {
|
|
return nil
|
|
}
|
|
log.Errorf("failed to get endpoints (serviceName: %s, namespace: %s): %v", serviceName, namespace, err)
|
|
return nil
|
|
}
|
|
|
|
return endpoints
|
|
}
|
|
|
|
func checkServicePortExists(svc *model.Service, port int) bool {
|
|
if svc == nil {
|
|
return false
|
|
}
|
|
for _, svcPort := range svc.Ports {
|
|
if port == svcPort.Port {
|
|
return true
|
|
}
|
|
}
|
|
return false
|
|
}
|
|
|
|
func extractServiceName(hostName string) string {
|
|
parts := strings.Split(hostName, ".")
|
|
if len(parts) >= 4 {
|
|
return parts[0]
|
|
}
|
|
return ""
|
|
}
|
|
|
|
// End - Updated by Higress
|