forked from couchbase/gocbcore
-
Notifications
You must be signed in to change notification settings - Fork 0
/
config.go
478 lines (444 loc) · 15 KB
/
config.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
package gocbcore
import (
"encoding/json"
"fmt"
"net"
"strings"
)
// A Node is a computer in a cluster running the couchbase software.
type cfgNode struct {
ClusterCompatibility int `json:"clusterCompatibility"`
ClusterMembership string `json:"clusterMembership"`
CouchAPIBase string `json:"couchApiBase"`
Hostname string `json:"hostname"`
InterestingStats map[string]float64 `json:"interestingStats,omitempty"`
MCDMemoryAllocated float64 `json:"mcdMemoryAllocated"`
MCDMemoryReserved float64 `json:"mcdMemoryReserved"`
MemoryFree float64 `json:"memoryFree"`
MemoryTotal float64 `json:"memoryTotal"`
OS string `json:"os"`
Ports map[string]int `json:"ports"`
Status string `json:"status"`
Uptime int `json:"uptime,string"`
Version string `json:"version"`
ThisNode bool `json:"thisNode,omitempty"`
}
type cfgNodeServices struct {
Kv uint16 `json:"kv"`
Capi uint16 `json:"capi"`
Mgmt uint16 `json:"mgmt"`
N1ql uint16 `json:"n1ql"`
Fts uint16 `json:"fts"`
Cbas uint16 `json:"cbas"`
Eventing uint16 `json:"eventingAdminPort"`
GSI uint16 `json:"indexHttp"`
Backup uint16 `json:"backupAPI"`
KvSsl uint16 `json:"kvSSL"`
CapiSsl uint16 `json:"capiSSL"`
MgmtSsl uint16 `json:"mgmtSSL"`
N1qlSsl uint16 `json:"n1qlSSL"`
FtsSsl uint16 `json:"ftsSSL"`
CbasSsl uint16 `json:"cbasSSL"`
EventingSsl uint16 `json:"eventingSSL"`
GSISsl uint16 `json:"indexHttps"`
BackupSsl uint16 `json:"backupAPIHTTPS"`
}
type cfgNodeAltAddress struct {
Ports *cfgNodeServices `json:"ports,omitempty"`
Hostname string `json:"hostname"`
}
type cfgNodeExt struct {
Services cfgNodeServices `json:"services"`
Hostname string `json:"hostname"`
ThisNode bool `json:"thisNode"`
AltAddresses map[string]cfgNodeAltAddress `json:"alternateAddresses"`
}
// VBucketServerMap is the a mapping of vbuckets to nodes.
type cfgVBucketServerMap struct {
HashAlgorithm string `json:"hashAlgorithm"`
NumReplicas int `json:"numReplicas"`
ServerList []string `json:"serverList"`
VBucketMap [][]int `json:"vBucketMap"`
}
// Bucket is the primary entry point for most data operations.
type cfgBucket struct {
Rev int64 `json:"rev"`
RevEpoch int64 `json:"revEpoch"`
SourceHostname string
Capabilities []string `json:"bucketCapabilities"`
CapabilitiesVersion string `json:"bucketCapabilitiesVer"`
Name string `json:"name"`
NodeLocator string `json:"nodeLocator"`
URI string `json:"uri"`
StreamingURI string `json:"streamingUri"`
UUID string `json:"uuid"`
DDocs struct {
URI string `json:"uri"`
} `json:"ddocs,omitempty"`
// These are used for JSON IO, but isn't used for processing
// since it needs to be swapped out safely.
VBucketServerMap cfgVBucketServerMap `json:"vBucketServerMap"`
Nodes []cfgNode `json:"nodes"`
NodesExt []cfgNodeExt `json:"nodesExt,omitempty"`
ClusterCapabilitiesVer []int `json:"clusterCapabilitiesVer,omitempty"`
ClusterCapabilities map[string][]string `json:"clusterCapabilities,omitempty"`
}
// BuildRouteConfig builds a new route config from this config.
// overwriteSeedNode indicates that we should set the hostname for a node to the cfg.SourceHostname when the config has
// been sourced from that node.
func (cfg *cfgBucket) BuildRouteConfig(useSsl bool, networkType string, firstConnect bool, overwriteSeedNode bool) *routeConfig {
var (
kvServerList = routeEndpoints{}
capiEpList = routeEndpoints{}
mgmtEpList = routeEndpoints{}
n1qlEpList = routeEndpoints{}
ftsEpList = routeEndpoints{}
cbasEpList = routeEndpoints{}
eventingEpList = routeEndpoints{}
gsiEpList = routeEndpoints{}
backupEpList = routeEndpoints{}
bktType bucketType
)
switch cfg.NodeLocator {
case "ketama":
bktType = bktTypeMemcached
case "vbucket":
bktType = bktTypeCouchbase
default:
if cfg.UUID == "" {
bktType = bktTypeNone
} else {
logDebugf("Invalid nodeLocator %s", cfg.NodeLocator)
bktType = bktTypeInvalid
}
}
if cfg.NodesExt != nil {
lenNodes := len(cfg.Nodes)
for i, node := range cfg.NodesExt {
hostname := node.Hostname
ports := node.Services
if networkType != "default" {
if altAddr, ok := node.AltAddresses[networkType]; ok {
hostname = altAddr.Hostname
if altAddr.Ports != nil {
ports = *altAddr.Ports
}
} else {
if !firstConnect {
logDebugf("Invalid config network type %s", networkType)
}
continue
}
}
isSeedNode := node.ThisNode || len(node.Hostname) == 0
if isSeedNode && overwriteSeedNode {
logSchedf("Seed node detected and set to overwrite, setting hostname to %s", cfg.SourceHostname)
hostname = cfg.SourceHostname
} else {
hostname = getHostname(hostname, cfg.SourceHostname)
}
endpoints := endpointsFromPorts(ports, hostname, isSeedNode)
if endpoints.kvServer.Address != "" {
if bktType > bktTypeInvalid && i >= lenNodes {
logDebugf("KV node present in nodesext but not in nodes for %s", endpoints.kvServer.Address)
} else {
kvServerList.NonSSLEndpoints = append(kvServerList.NonSSLEndpoints, endpoints.kvServer)
}
}
if endpoints.capiEp.Address != "" {
capiEpList.NonSSLEndpoints = append(capiEpList.NonSSLEndpoints, endpoints.capiEp)
}
if endpoints.mgmtEp.Address != "" {
mgmtEpList.NonSSLEndpoints = append(mgmtEpList.NonSSLEndpoints, endpoints.mgmtEp)
}
if endpoints.n1qlEp.Address != "" {
n1qlEpList.NonSSLEndpoints = append(n1qlEpList.NonSSLEndpoints, endpoints.n1qlEp)
}
if endpoints.ftsEp.Address != "" {
ftsEpList.NonSSLEndpoints = append(ftsEpList.NonSSLEndpoints, endpoints.ftsEp)
}
if endpoints.cbasEp.Address != "" {
cbasEpList.NonSSLEndpoints = append(cbasEpList.NonSSLEndpoints, endpoints.cbasEp)
}
if endpoints.eventingEp.Address != "" {
eventingEpList.NonSSLEndpoints = append(eventingEpList.NonSSLEndpoints, endpoints.eventingEp)
}
if endpoints.gsiEp.Address != "" {
gsiEpList.NonSSLEndpoints = append(gsiEpList.NonSSLEndpoints, endpoints.gsiEp)
}
if endpoints.backupEp.Address != "" {
backupEpList.NonSSLEndpoints = append(backupEpList.NonSSLEndpoints, endpoints.backupEp)
}
if endpoints.kvServerSSL.Address != "" {
if bktType > bktTypeInvalid && i >= lenNodes {
logDebugf("KV node present in nodesext but not in nodes for %s", endpoints.kvServerSSL)
} else {
kvServerList.SSLEndpoints = append(kvServerList.SSLEndpoints, endpoints.kvServerSSL)
}
}
if endpoints.capiEpSSL.Address != "" {
capiEpList.SSLEndpoints = append(capiEpList.SSLEndpoints, endpoints.capiEpSSL)
}
if endpoints.mgmtEpSSL.Address != "" {
mgmtEpList.SSLEndpoints = append(mgmtEpList.SSLEndpoints, endpoints.mgmtEpSSL)
}
if endpoints.n1qlEpSSL.Address != "" {
n1qlEpList.SSLEndpoints = append(n1qlEpList.SSLEndpoints, endpoints.n1qlEpSSL)
}
if endpoints.ftsEpSSL.Address != "" {
ftsEpList.SSLEndpoints = append(ftsEpList.SSLEndpoints, endpoints.ftsEpSSL)
}
if endpoints.cbasEpSSL.Address != "" {
cbasEpList.SSLEndpoints = append(cbasEpList.SSLEndpoints, endpoints.cbasEpSSL)
}
if endpoints.eventingEpSSL.Address != "" {
eventingEpList.SSLEndpoints = append(eventingEpList.SSLEndpoints, endpoints.eventingEpSSL)
}
if endpoints.gsiEpSSL.Address != "" {
gsiEpList.SSLEndpoints = append(gsiEpList.SSLEndpoints, endpoints.gsiEpSSL)
}
if endpoints.backupEpSSL.Address != "" {
backupEpList.SSLEndpoints = append(backupEpList.SSLEndpoints, endpoints.backupEpSSL)
}
}
} else {
if useSsl {
logErrorf("Received config without nodesExt while SSL is enabled. Generating invalid config.")
return &routeConfig{}
}
if bktType == bktTypeCouchbase {
for _, s := range cfg.VBucketServerMap.ServerList {
kvServerList.NonSSLEndpoints = append(kvServerList.NonSSLEndpoints, routeEndpoint{
Address: s,
})
}
}
for _, node := range cfg.Nodes {
if node.CouchAPIBase != "" {
// Slice off the UUID as Go's HTTP client cannot handle being passed URL-Encoded path values.
capiEp := strings.SplitN(node.CouchAPIBase, "%2B", 2)[0]
capiEpList.NonSSLEndpoints = append(capiEpList.NonSSLEndpoints, routeEndpoint{
Address: capiEp,
})
}
if node.Hostname != "" {
mgmtEpList.NonSSLEndpoints = append(mgmtEpList.NonSSLEndpoints, routeEndpoint{
Address: fmt.Sprintf("http://%s", node.Hostname),
})
}
if bktType == bktTypeMemcached {
// Get the data port. No VBucketServerMap.
host, err := hostFromHostPort(node.Hostname)
if err != nil {
logErrorf("Encountered invalid memcached host/port string. Ignoring node.")
continue
}
curKvHost := fmt.Sprintf("%s:%d", host, node.Ports["direct"])
kvServerList.NonSSLEndpoints = append(kvServerList.NonSSLEndpoints, routeEndpoint{
Address: curKvHost,
})
}
}
}
rc := &routeConfig{
revID: cfg.Rev,
revEpoch: cfg.RevEpoch,
uuid: cfg.UUID,
name: cfg.Name,
kvServerList: kvServerList,
capiEpList: capiEpList,
mgmtEpList: mgmtEpList,
n1qlEpList: n1qlEpList,
ftsEpList: ftsEpList,
cbasEpList: cbasEpList,
eventingEpList: eventingEpList,
gsiEpList: gsiEpList,
backupEpList: backupEpList,
bktType: bktType,
clusterCapabilities: cfg.ClusterCapabilities,
clusterCapabilitiesVer: cfg.ClusterCapabilitiesVer,
bucketCapabilities: cfg.Capabilities,
bucketCapabilitiesVer: cfg.CapabilitiesVersion,
}
if bktType == bktTypeCouchbase {
vbMap := cfg.VBucketServerMap.VBucketMap
numReplicas := cfg.VBucketServerMap.NumReplicas
rc.vbMap = newVbucketMap(vbMap, numReplicas)
} else if bktType == bktTypeMemcached {
var endpoints []routeEndpoint
if useSsl {
endpoints = kvServerList.SSLEndpoints
} else {
endpoints = kvServerList.NonSSLEndpoints
}
rc.ketamaMap = newKetamaContinuum(endpoints)
}
return rc
}
type serverEps struct {
kvServerSSL routeEndpoint
capiEpSSL routeEndpoint
mgmtEpSSL routeEndpoint
n1qlEpSSL routeEndpoint
ftsEpSSL routeEndpoint
cbasEpSSL routeEndpoint
eventingEpSSL routeEndpoint
gsiEpSSL routeEndpoint
backupEpSSL routeEndpoint
kvServer routeEndpoint
capiEp routeEndpoint
mgmtEp routeEndpoint
n1qlEp routeEndpoint
ftsEp routeEndpoint
cbasEp routeEndpoint
eventingEp routeEndpoint
gsiEp routeEndpoint
backupEp routeEndpoint
}
func getHostname(hostname, sourceHostname string) string {
// Hostname blank means to use the same one as was connected to
if hostname == "" {
// Note that the SourceHostname will already be IPv6 wrapped
hostname = sourceHostname
} else {
// We need to detect an IPv6 address here and wrap it in the appropriate
// [] block to indicate its IPv6 for the rest of the system.
if strings.Contains(hostname, ":") {
hostname = "[" + hostname + "]"
}
}
return hostname
}
func endpointsFromPorts(ports cfgNodeServices, hostname string, isSeedNode bool) *serverEps {
lists := &serverEps{}
if ports.KvSsl > 0 {
lists.kvServerSSL = routeEndpoint{
Address: fmt.Sprintf("couchbases://%s:%d", hostname, ports.KvSsl),
IsSeedNode: isSeedNode,
}
}
if ports.CapiSsl > 0 {
lists.capiEpSSL = routeEndpoint{
Address: fmt.Sprintf("https://%s:%d", hostname, ports.CapiSsl),
IsSeedNode: isSeedNode,
}
}
if ports.MgmtSsl > 0 {
lists.mgmtEpSSL = routeEndpoint{
Address: fmt.Sprintf("https://%s:%d", hostname, ports.MgmtSsl),
IsSeedNode: isSeedNode,
}
}
if ports.N1qlSsl > 0 {
lists.n1qlEpSSL = routeEndpoint{
Address: fmt.Sprintf("https://%s:%d", hostname, ports.N1qlSsl),
IsSeedNode: isSeedNode,
}
}
if ports.FtsSsl > 0 {
lists.ftsEpSSL = routeEndpoint{
Address: fmt.Sprintf("https://%s:%d", hostname, ports.FtsSsl),
IsSeedNode: isSeedNode,
}
}
if ports.CbasSsl > 0 {
lists.cbasEpSSL = routeEndpoint{
Address: fmt.Sprintf("https://%s:%d", hostname, ports.CbasSsl),
IsSeedNode: isSeedNode,
}
}
if ports.EventingSsl > 0 {
lists.eventingEpSSL = routeEndpoint{
Address: fmt.Sprintf("https://%s:%d", hostname, ports.EventingSsl),
IsSeedNode: isSeedNode,
}
}
if ports.GSISsl > 0 {
lists.gsiEpSSL = routeEndpoint{
Address: fmt.Sprintf("https://%s:%d", hostname, ports.GSISsl),
IsSeedNode: isSeedNode,
}
}
if ports.BackupSsl > 0 {
lists.backupEpSSL = routeEndpoint{
Address: fmt.Sprintf("https://%s:%d", hostname, ports.BackupSsl),
IsSeedNode: isSeedNode,
}
}
if ports.Kv > 0 {
lists.kvServer = routeEndpoint{
Address: fmt.Sprintf("couchbase://%s:%d", hostname, ports.Kv),
IsSeedNode: isSeedNode,
}
}
if ports.Capi > 0 {
lists.capiEp = routeEndpoint{
Address: fmt.Sprintf("http://%s:%d", hostname, ports.Capi),
IsSeedNode: isSeedNode,
}
}
if ports.Mgmt > 0 {
lists.mgmtEp = routeEndpoint{
Address: fmt.Sprintf("http://%s:%d", hostname, ports.Mgmt),
IsSeedNode: isSeedNode,
}
}
if ports.N1ql > 0 {
lists.n1qlEp = routeEndpoint{
Address: fmt.Sprintf("http://%s:%d", hostname, ports.N1ql),
IsSeedNode: isSeedNode,
}
}
if ports.Fts > 0 {
lists.ftsEp = routeEndpoint{
Address: fmt.Sprintf("http://%s:%d", hostname, ports.Fts),
IsSeedNode: isSeedNode,
}
}
if ports.Cbas > 0 {
lists.cbasEp = routeEndpoint{
Address: fmt.Sprintf("http://%s:%d", hostname, ports.Cbas),
IsSeedNode: isSeedNode,
}
}
if ports.Eventing > 0 {
lists.eventingEp = routeEndpoint{
Address: fmt.Sprintf("http://%s:%d", hostname, ports.Eventing),
IsSeedNode: isSeedNode,
}
}
if ports.GSI > 0 {
lists.gsiEp = routeEndpoint{
Address: fmt.Sprintf("http://%s:%d", hostname, ports.GSI),
IsSeedNode: isSeedNode,
}
}
if ports.Backup > 0 {
lists.backupEp = routeEndpoint{
Address: fmt.Sprintf("http://%s:%d", hostname, ports.Backup),
IsSeedNode: isSeedNode,
}
}
return lists
}
func hostFromHostPort(hostport string) (string, error) {
host, _, err := net.SplitHostPort(hostport)
if err != nil {
return "", err
}
// If this is an IPv6 address, we need to rewrap it in []
if strings.Contains(host, ":") {
return "[" + host + "]", nil
}
return host, nil
}
func parseConfig(config []byte, srcHost string) (*cfgBucket, error) {
configStr := strings.Replace(string(config), "$HOST", srcHost, -1)
bk := new(cfgBucket)
err := json.Unmarshal([]byte(configStr), bk)
if err != nil {
return nil, err
}
bk.SourceHostname = srcHost
return bk, nil
}