Revision: Rename to 'maglevd'; Refactor config structure
This commit is contained in:
@@ -12,35 +12,28 @@ import (
|
||||
"gopkg.in/yaml.v3"
|
||||
)
|
||||
|
||||
// Frontend is the parsed and validated representation of frontend.yaml.
|
||||
type Frontend struct {
|
||||
ProbeIPv4Src net.IP
|
||||
ProbeIPv6Src net.IP
|
||||
HealthCheckNetns string
|
||||
HealthChecker HealthCheckerConfig
|
||||
VIPs map[string]VIP
|
||||
// Config is the top-level parsed and validated configuration.
|
||||
type Config struct {
|
||||
HealthChecker HealthCheckerConfig
|
||||
HealthChecks map[string]HealthCheck
|
||||
Backends map[string]Backend
|
||||
Frontends map[string]Frontend
|
||||
}
|
||||
|
||||
// HealthCheckerConfig holds global health checker settings.
|
||||
type HealthCheckerConfig struct {
|
||||
TransitionHistory int
|
||||
Netns string // network namespace for probes; "" = current netns
|
||||
}
|
||||
|
||||
// VIP is a single virtual IP entry.
|
||||
type VIP struct {
|
||||
Description string
|
||||
Address net.IP
|
||||
Protocol string // "tcp", "udp", or "" (all traffic)
|
||||
Port uint16 // 0 means omitted (all ports)
|
||||
Backends []net.IP
|
||||
HealthCheck HealthCheck
|
||||
}
|
||||
|
||||
// HealthCheck describes how to probe backends for a VIP.
|
||||
// HealthCheck describes how to probe a backend.
|
||||
type HealthCheck struct {
|
||||
Type string
|
||||
Port uint16 // destination port; required for tcp/http/https
|
||||
HTTP *HTTPParams // non-nil for type http and https
|
||||
TCP *TCPParams // non-nil for type tcp
|
||||
ProbeIPv4Src net.IP // source address for IPv4 probes; nil = OS picks
|
||||
ProbeIPv6Src net.IP // source address for IPv6 probes; nil = OS picks
|
||||
Interval time.Duration
|
||||
FastInterval time.Duration // optional; used while health counter is degraded
|
||||
DownInterval time.Duration // optional; used while fully down
|
||||
@@ -65,41 +58,49 @@ type TCPParams struct {
|
||||
SSL bool
|
||||
ServerName string
|
||||
InsecureSkipVerify bool
|
||||
BannerRegexp *regexp.Regexp // nil if not configured; matched against the first line sent by the server
|
||||
}
|
||||
|
||||
// Backend is a single named backend server.
|
||||
type Backend struct {
|
||||
Address net.IP
|
||||
HealthCheck string // name reference into Config.HealthChecks; "" = no probing, assume healthy
|
||||
Enabled bool // default true; false = exclude from serving entirely
|
||||
Weight int // 0-100, default 100
|
||||
}
|
||||
|
||||
// Frontend is a single virtual IP entry.
|
||||
type Frontend struct {
|
||||
Description string
|
||||
Address net.IP
|
||||
Protocol string // "tcp", "udp", or "" (all traffic)
|
||||
Port uint16 // 0 means omitted (all ports)
|
||||
Backends []string // backend names, each must exist in Config.Backends
|
||||
}
|
||||
|
||||
// ---- raw YAML types --------------------------------------------------------
|
||||
|
||||
type rawConfig struct {
|
||||
Maglev struct {
|
||||
Frontend rawFrontend `yaml:"frontend"`
|
||||
} `yaml:"maglev"`
|
||||
Maglev rawMaglev `yaml:"maglev"`
|
||||
}
|
||||
|
||||
type rawFrontend struct {
|
||||
ProbeIPv4Src string `yaml:"probe-ipv4-src"`
|
||||
ProbeIPv6Src string `yaml:"probe-ipv6-src"`
|
||||
HealthCheckNetns string `yaml:"healthcheck-netns"`
|
||||
HealthChecker rawHealthCheckerCfg `yaml:"healthchecker"`
|
||||
VIPs map[string]rawVIP `yaml:"vips"`
|
||||
type rawMaglev struct {
|
||||
HealthChecker rawHealthCheckerCfg `yaml:"healthchecker"`
|
||||
HealthChecks map[string]rawHealthCheck `yaml:"healthchecks"`
|
||||
Backends map[string]rawBackend `yaml:"backends"`
|
||||
Frontends map[string]rawFrontend `yaml:"frontends"`
|
||||
}
|
||||
|
||||
type rawHealthCheckerCfg struct {
|
||||
TransitionHistory int `yaml:"transition-history"`
|
||||
}
|
||||
|
||||
type rawVIP struct {
|
||||
Description string `yaml:"description"`
|
||||
Address string `yaml:"address"`
|
||||
Protocol string `yaml:"protocol"`
|
||||
Port uint16 `yaml:"port"`
|
||||
Backends []string `yaml:"backends"`
|
||||
HealthCheck rawHealthCheck `yaml:"healthcheck"`
|
||||
TransitionHistory int `yaml:"transition-history"`
|
||||
Netns string `yaml:"netns"`
|
||||
}
|
||||
|
||||
type rawHealthCheck struct {
|
||||
Type string `yaml:"type"`
|
||||
Port uint16 `yaml:"port"`
|
||||
Params rawParams `yaml:"params"`
|
||||
ProbeIPv4Src string `yaml:"probe-ipv4-src"`
|
||||
ProbeIPv6Src string `yaml:"probe-ipv6-src"`
|
||||
Interval string `yaml:"interval"`
|
||||
FastInterval string `yaml:"fast-interval"`
|
||||
DownInterval string `yaml:"down-interval"`
|
||||
@@ -120,10 +121,25 @@ type rawParams struct {
|
||||
SSL bool `yaml:"ssl"`
|
||||
}
|
||||
|
||||
type rawBackend struct {
|
||||
Address string `yaml:"address"`
|
||||
HealthCheck string `yaml:"healthcheck"`
|
||||
Enabled *bool `yaml:"enabled"` // nil → default true
|
||||
Weight *int `yaml:"weight"` // nil → default 100
|
||||
}
|
||||
|
||||
type rawFrontend struct {
|
||||
Description string `yaml:"description"`
|
||||
Address string `yaml:"address"`
|
||||
Protocol string `yaml:"protocol"`
|
||||
Port uint16 `yaml:"port"`
|
||||
Backends []string `yaml:"backends"`
|
||||
}
|
||||
|
||||
// ---- Load ------------------------------------------------------------------
|
||||
|
||||
// Load reads and validates the config file at path.
|
||||
func Load(path string) (*Frontend, error) {
|
||||
func Load(path string) (*Config, error) {
|
||||
data, err := os.ReadFile(path)
|
||||
if err != nil {
|
||||
return nil, fmt.Errorf("read config %q: %w", path, err)
|
||||
@@ -131,115 +147,82 @@ func Load(path string) (*Frontend, error) {
|
||||
return parse(data)
|
||||
}
|
||||
|
||||
func parse(data []byte) (*Frontend, error) {
|
||||
func parse(data []byte) (*Config, error) {
|
||||
var raw rawConfig
|
||||
if err := yaml.Unmarshal(data, &raw); err != nil {
|
||||
return nil, fmt.Errorf("parse yaml: %w", err)
|
||||
}
|
||||
return convert(&raw.Maglev.Frontend)
|
||||
return convert(&raw.Maglev)
|
||||
}
|
||||
|
||||
func convert(r *rawFrontend) (*Frontend, error) {
|
||||
f := &Frontend{}
|
||||
var err error
|
||||
func convert(r *rawMaglev) (*Config, error) {
|
||||
cfg := &Config{}
|
||||
|
||||
if f.ProbeIPv4Src, err = parseOptionalIPFamily(r.ProbeIPv4Src, 4, "probe-ipv4-src"); err != nil {
|
||||
return nil, err
|
||||
// ---- healthchecker --------------------------------------------------------
|
||||
cfg.HealthChecker.Netns = r.HealthChecker.Netns
|
||||
cfg.HealthChecker.TransitionHistory = r.HealthChecker.TransitionHistory
|
||||
if cfg.HealthChecker.TransitionHistory == 0 {
|
||||
cfg.HealthChecker.TransitionHistory = 5
|
||||
}
|
||||
if f.ProbeIPv6Src, err = parseOptionalIPFamily(r.ProbeIPv6Src, 6, "probe-ipv6-src"); err != nil {
|
||||
return nil, err
|
||||
}
|
||||
|
||||
f.HealthCheckNetns = r.HealthCheckNetns
|
||||
|
||||
f.HealthChecker.TransitionHistory = r.HealthChecker.TransitionHistory
|
||||
if f.HealthChecker.TransitionHistory == 0 {
|
||||
f.HealthChecker.TransitionHistory = 5
|
||||
}
|
||||
if f.HealthChecker.TransitionHistory < 1 {
|
||||
if cfg.HealthChecker.TransitionHistory < 1 {
|
||||
return nil, fmt.Errorf("healthchecker.transition-history must be >= 1")
|
||||
}
|
||||
|
||||
f.VIPs = make(map[string]VIP, len(r.VIPs))
|
||||
for name, rv := range r.VIPs {
|
||||
vip, err := convertVIP(name, &rv)
|
||||
// ---- healthchecks ---------------------------------------------------------
|
||||
cfg.HealthChecks = make(map[string]HealthCheck, len(r.HealthChecks))
|
||||
for name, rh := range r.HealthChecks {
|
||||
hc, err := convertHealthCheck(&rh)
|
||||
if err != nil {
|
||||
return nil, fmt.Errorf("vip %q: %w", name, err)
|
||||
return nil, fmt.Errorf("healthcheck %q: %w", name, err)
|
||||
}
|
||||
f.VIPs[name] = vip
|
||||
cfg.HealthChecks[name] = hc
|
||||
}
|
||||
|
||||
return f, nil
|
||||
}
|
||||
|
||||
func convertVIP(name string, r *rawVIP) (VIP, error) {
|
||||
v := VIP{
|
||||
Description: r.Description,
|
||||
Protocol: r.Protocol,
|
||||
Port: r.Port,
|
||||
}
|
||||
|
||||
ip := net.ParseIP(r.Address)
|
||||
if ip == nil {
|
||||
return VIP{}, fmt.Errorf("invalid address %q", r.Address)
|
||||
}
|
||||
v.Address = ip
|
||||
|
||||
switch r.Protocol {
|
||||
case "", "tcp", "udp":
|
||||
default:
|
||||
return VIP{}, fmt.Errorf("protocol must be \"tcp\", \"udp\", or omitted, got %q", r.Protocol)
|
||||
}
|
||||
|
||||
if r.Port != 0 && r.Protocol == "" {
|
||||
return VIP{}, fmt.Errorf("port requires protocol to be set")
|
||||
}
|
||||
if r.Protocol != "" && r.Port == 0 {
|
||||
return VIP{}, fmt.Errorf("protocol %q requires port to be set (1-65535)", r.Protocol)
|
||||
}
|
||||
|
||||
if len(r.Backends) == 0 {
|
||||
return VIP{}, fmt.Errorf("backends must not be empty")
|
||||
}
|
||||
var firstFamily int
|
||||
for i, bs := range r.Backends {
|
||||
ip := net.ParseIP(bs)
|
||||
if ip == nil {
|
||||
return VIP{}, fmt.Errorf("backend[%d] %q is not a valid IP", i, bs)
|
||||
// ---- backends -------------------------------------------------------------
|
||||
cfg.Backends = make(map[string]Backend, len(r.Backends))
|
||||
for name, rb := range r.Backends {
|
||||
b, err := convertBackend(name, &rb, cfg.HealthChecks)
|
||||
if err != nil {
|
||||
return nil, fmt.Errorf("backend %q: %w", name, err)
|
||||
}
|
||||
fam := ipFamily(ip)
|
||||
if i == 0 {
|
||||
firstFamily = fam
|
||||
} else if fam != firstFamily {
|
||||
return VIP{}, fmt.Errorf("backend[%d] %q has different address family than backend[0]", i, bs)
|
||||
cfg.Backends[name] = b
|
||||
}
|
||||
|
||||
// ---- frontends ------------------------------------------------------------
|
||||
cfg.Frontends = make(map[string]Frontend, len(r.Frontends))
|
||||
for name, rf := range r.Frontends {
|
||||
fe, err := convertFrontend(name, &rf, cfg.Backends)
|
||||
if err != nil {
|
||||
return nil, fmt.Errorf("frontend %q: %w", name, err)
|
||||
}
|
||||
v.Backends = append(v.Backends, ip)
|
||||
cfg.Frontends[name] = fe
|
||||
}
|
||||
|
||||
hc, err := convertHealthCheck(&r.HealthCheck)
|
||||
if err != nil {
|
||||
return VIP{}, fmt.Errorf("healthcheck: %w", err)
|
||||
}
|
||||
v.HealthCheck = hc
|
||||
|
||||
return v, nil
|
||||
return cfg, nil
|
||||
}
|
||||
|
||||
func convertHealthCheck(r *rawHealthCheck) (HealthCheck, error) {
|
||||
h := HealthCheck{
|
||||
Type: r.Type,
|
||||
}
|
||||
h := HealthCheck{Type: r.Type, Port: r.Port}
|
||||
|
||||
switch r.Type {
|
||||
case "icmp":
|
||||
// no params
|
||||
// ICMP does not use ports.
|
||||
if r.Port != 0 {
|
||||
return HealthCheck{}, fmt.Errorf("type icmp does not use a port")
|
||||
}
|
||||
case "tcp":
|
||||
if r.Port == 0 {
|
||||
return HealthCheck{}, fmt.Errorf("type tcp requires port")
|
||||
}
|
||||
h.TCP = &TCPParams{
|
||||
SSL: r.Params.SSL,
|
||||
ServerName: r.Params.ServerName,
|
||||
InsecureSkipVerify: r.Params.InsecureSkipVerify,
|
||||
}
|
||||
case "http", "https":
|
||||
if r.Port == 0 {
|
||||
return HealthCheck{}, fmt.Errorf("type %s requires port", r.Type)
|
||||
}
|
||||
if r.Params.Path == "" {
|
||||
return HealthCheck{}, fmt.Errorf("type http requires params.path")
|
||||
}
|
||||
@@ -272,25 +255,33 @@ func convertHealthCheck(r *rawHealthCheck) (HealthCheck, error) {
|
||||
}
|
||||
|
||||
var err error
|
||||
if r.ProbeIPv4Src != "" {
|
||||
if h.ProbeIPv4Src, err = parseOptionalIPFamily(r.ProbeIPv4Src, 4, "probe-ipv4-src"); err != nil {
|
||||
return HealthCheck{}, err
|
||||
}
|
||||
}
|
||||
if r.ProbeIPv6Src != "" {
|
||||
if h.ProbeIPv6Src, err = parseOptionalIPFamily(r.ProbeIPv6Src, 6, "probe-ipv6-src"); err != nil {
|
||||
return HealthCheck{}, err
|
||||
}
|
||||
}
|
||||
|
||||
if r.Interval == "" {
|
||||
return HealthCheck{}, fmt.Errorf("interval is required")
|
||||
}
|
||||
if h.Interval, err = time.ParseDuration(r.Interval); err != nil || h.Interval <= 0 {
|
||||
return HealthCheck{}, fmt.Errorf("interval %q must be a positive duration", r.Interval)
|
||||
}
|
||||
|
||||
if r.FastInterval != "" {
|
||||
if h.FastInterval, err = time.ParseDuration(r.FastInterval); err != nil || h.FastInterval <= 0 {
|
||||
return HealthCheck{}, fmt.Errorf("fast-interval %q must be a positive duration", r.FastInterval)
|
||||
}
|
||||
}
|
||||
|
||||
if r.DownInterval != "" {
|
||||
if h.DownInterval, err = time.ParseDuration(r.DownInterval); err != nil || h.DownInterval <= 0 {
|
||||
return HealthCheck{}, fmt.Errorf("down-interval %q must be a positive duration", r.DownInterval)
|
||||
}
|
||||
}
|
||||
|
||||
if r.Timeout == "" {
|
||||
return HealthCheck{}, fmt.Errorf("timeout is required")
|
||||
}
|
||||
@@ -305,7 +296,6 @@ func convertHealthCheck(r *rawHealthCheck) (HealthCheck, error) {
|
||||
if h.Fall < 1 {
|
||||
return HealthCheck{}, fmt.Errorf("fall must be >= 1")
|
||||
}
|
||||
|
||||
h.Rise = r.Rise
|
||||
if h.Rise == 0 {
|
||||
h.Rise = 2
|
||||
@@ -317,10 +307,80 @@ func convertHealthCheck(r *rawHealthCheck) (HealthCheck, error) {
|
||||
return h, nil
|
||||
}
|
||||
|
||||
func convertBackend(name string, r *rawBackend, hcs map[string]HealthCheck) (Backend, error) {
|
||||
ip := net.ParseIP(r.Address)
|
||||
if ip == nil {
|
||||
return Backend{}, fmt.Errorf("invalid address %q", r.Address)
|
||||
}
|
||||
|
||||
b := Backend{
|
||||
Address: ip,
|
||||
HealthCheck: r.HealthCheck,
|
||||
Enabled: boolDefault(r.Enabled, true),
|
||||
Weight: intDefault(r.Weight, 100),
|
||||
}
|
||||
|
||||
if b.Weight < 0 || b.Weight > 100 {
|
||||
return Backend{}, fmt.Errorf("weight %d is out of range [0, 100]", b.Weight)
|
||||
}
|
||||
|
||||
if b.HealthCheck != "" {
|
||||
if _, ok := hcs[b.HealthCheck]; !ok {
|
||||
return Backend{}, fmt.Errorf("healthcheck %q not defined", b.HealthCheck)
|
||||
}
|
||||
}
|
||||
|
||||
return b, nil
|
||||
}
|
||||
|
||||
func convertFrontend(name string, r *rawFrontend, backends map[string]Backend) (Frontend, error) {
|
||||
fe := Frontend{
|
||||
Description: r.Description,
|
||||
Protocol: r.Protocol,
|
||||
Port: r.Port,
|
||||
Backends: r.Backends,
|
||||
}
|
||||
|
||||
ip := net.ParseIP(r.Address)
|
||||
if ip == nil {
|
||||
return Frontend{}, fmt.Errorf("invalid address %q", r.Address)
|
||||
}
|
||||
fe.Address = ip
|
||||
|
||||
switch r.Protocol {
|
||||
case "", "tcp", "udp":
|
||||
default:
|
||||
return Frontend{}, fmt.Errorf("protocol must be \"tcp\", \"udp\", or omitted, got %q", r.Protocol)
|
||||
}
|
||||
if r.Port != 0 && r.Protocol == "" {
|
||||
return Frontend{}, fmt.Errorf("port requires protocol to be set")
|
||||
}
|
||||
if r.Protocol != "" && r.Port == 0 {
|
||||
return Frontend{}, fmt.Errorf("protocol %q requires port to be set (1-65535)", r.Protocol)
|
||||
}
|
||||
|
||||
if len(r.Backends) == 0 {
|
||||
return Frontend{}, fmt.Errorf("backends must not be empty")
|
||||
}
|
||||
var firstFamily int
|
||||
for i, bName := range r.Backends {
|
||||
b, ok := backends[bName]
|
||||
if !ok {
|
||||
return Frontend{}, fmt.Errorf("backends[%d] %q not defined", i, bName)
|
||||
}
|
||||
fam := ipFamily(b.Address)
|
||||
if i == 0 {
|
||||
firstFamily = fam
|
||||
} else if fam != firstFamily {
|
||||
return Frontend{}, fmt.Errorf("backends[%d] %q has different address family than backends[0]", i, bName)
|
||||
}
|
||||
}
|
||||
|
||||
return fe, nil
|
||||
}
|
||||
|
||||
// ---- helpers ---------------------------------------------------------------
|
||||
|
||||
// parseOptionalIPFamily parses s as an IP of the given family.
|
||||
// Returns nil (no error) if s is empty.
|
||||
func parseOptionalIPFamily(s string, family int, field string) (net.IP, error) {
|
||||
if s == "" {
|
||||
return nil, nil
|
||||
@@ -335,7 +395,6 @@ func parseOptionalIPFamily(s string, family int, field string) (net.IP, error) {
|
||||
return ip, nil
|
||||
}
|
||||
|
||||
// ipFamily returns 4 for IPv4, 6 for IPv6.
|
||||
func ipFamily(ip net.IP) int {
|
||||
if ip.To4() != nil {
|
||||
return 4
|
||||
@@ -343,8 +402,6 @@ func ipFamily(ip net.IP) int {
|
||||
return 6
|
||||
}
|
||||
|
||||
// parseCodeRange parses a response-code value which may be a single integer
|
||||
// ("200") or an inclusive range ("200-299"). Returns (min, max, err).
|
||||
func parseCodeRange(s string, defaultCode int) (min, max int, err error) {
|
||||
if s == "" {
|
||||
return defaultCode, defaultCode, nil
|
||||
@@ -366,3 +423,17 @@ func parseCodeRange(s string, defaultCode int) (min, max int, err error) {
|
||||
}
|
||||
return min, min, nil
|
||||
}
|
||||
|
||||
func boolDefault(p *bool, def bool) bool {
|
||||
if p == nil {
|
||||
return def
|
||||
}
|
||||
return *p
|
||||
}
|
||||
|
||||
func intDefault(p *int, def int) int {
|
||||
if p == nil {
|
||||
return def
|
||||
}
|
||||
return *p
|
||||
}
|
||||
|
||||
@@ -7,146 +7,217 @@ import (
|
||||
|
||||
const validConfig = `
|
||||
maglev:
|
||||
frontend:
|
||||
probe-ipv4-src: 10.0.0.1
|
||||
probe-ipv6-src: 2001:db8:1::1
|
||||
healthcheck-netns: dataplane
|
||||
healthchecker:
|
||||
transition-history: 5
|
||||
vips:
|
||||
web4:
|
||||
description: "IPv4 VIP"
|
||||
address: 192.0.2.1
|
||||
protocol: tcp
|
||||
port: 80
|
||||
backends: [2001:db8:2::1, 2001:db8:2::2]
|
||||
healthcheck:
|
||||
type: http
|
||||
params:
|
||||
path: /healthz
|
||||
host: example.com
|
||||
response-code: "200"
|
||||
interval: 2s
|
||||
timeout: 3s
|
||||
rise: 2
|
||||
fall: 3
|
||||
web6:
|
||||
description: "IPv6 VIP"
|
||||
address: 2001:db8::1
|
||||
protocol: tcp
|
||||
port: 443
|
||||
backends: [2001:db8:2::1, 2001:db8:2::2]
|
||||
healthcheck:
|
||||
type: icmp
|
||||
interval: 1s
|
||||
timeout: 3s
|
||||
fall: 5
|
||||
healthchecker:
|
||||
transition-history: 5
|
||||
netns: dataplane
|
||||
healthchecks:
|
||||
http-check:
|
||||
type: http
|
||||
port: 80
|
||||
probe-ipv4-src: 10.0.0.1
|
||||
params:
|
||||
path: /healthz
|
||||
host: example.com
|
||||
response-code: "200"
|
||||
interval: 2s
|
||||
timeout: 3s
|
||||
rise: 2
|
||||
fall: 3
|
||||
icmp-check:
|
||||
type: icmp
|
||||
probe-ipv6-src: 2001:db8:1::1
|
||||
interval: 1s
|
||||
timeout: 3s
|
||||
fall: 5
|
||||
backends:
|
||||
be-v4:
|
||||
address: 192.0.2.10
|
||||
healthcheck: http-check
|
||||
be-v6a:
|
||||
address: 2001:db8:2::1
|
||||
healthcheck: icmp-check
|
||||
be-v6b:
|
||||
address: 2001:db8:2::2
|
||||
healthcheck: icmp-check
|
||||
weight: 50
|
||||
enabled: true
|
||||
frontends:
|
||||
web4:
|
||||
description: "IPv4 VIP"
|
||||
address: 192.0.2.1
|
||||
protocol: tcp
|
||||
port: 80
|
||||
backends: [be-v4]
|
||||
web6:
|
||||
description: "IPv6 VIP"
|
||||
address: 2001:db8::1
|
||||
protocol: tcp
|
||||
port: 443
|
||||
backends: [be-v6a, be-v6b]
|
||||
`
|
||||
|
||||
func TestValidConfig(t *testing.T) {
|
||||
f, err := parse([]byte(validConfig))
|
||||
cfg, err := parse([]byte(validConfig))
|
||||
if err != nil {
|
||||
t.Fatalf("unexpected error: %v", err)
|
||||
}
|
||||
if f.ProbeIPv4Src.String() != "10.0.0.1" {
|
||||
t.Errorf("probe-ipv4-src: got %s, want 10.0.0.1", f.ProbeIPv4Src)
|
||||
|
||||
if cfg.HealthChecker.Netns != "dataplane" {
|
||||
t.Errorf("healthchecker.netns: got %q, want dataplane", cfg.HealthChecker.Netns)
|
||||
}
|
||||
if f.ProbeIPv6Src.String() != "2001:db8:1::1" {
|
||||
t.Errorf("probe-ipv6-src: got %s, want 2001:db8:1::1", f.ProbeIPv6Src)
|
||||
if cfg.HealthChecker.TransitionHistory != 5 {
|
||||
t.Errorf("transition-history: got %d, want 5", cfg.HealthChecker.TransitionHistory)
|
||||
}
|
||||
if f.HealthCheckNetns != "dataplane" {
|
||||
t.Errorf("healthcheck-netns: got %q, want %q", f.HealthCheckNetns, "dataplane")
|
||||
if len(cfg.Frontends) != 2 {
|
||||
t.Fatalf("frontends: got %d, want 2", len(cfg.Frontends))
|
||||
}
|
||||
if f.HealthChecker.TransitionHistory != 5 {
|
||||
t.Errorf("transition-history: got %d, want 5", f.HealthChecker.TransitionHistory)
|
||||
|
||||
hc := cfg.HealthChecks["http-check"]
|
||||
if hc.Type != "http" {
|
||||
t.Errorf("http-check type: got %q, want http", hc.Type)
|
||||
}
|
||||
if len(f.VIPs) != 2 {
|
||||
t.Fatalf("vips: got %d, want 2", len(f.VIPs))
|
||||
if hc.Fall != 3 || hc.Rise != 2 {
|
||||
t.Errorf("http-check fall/rise: got %d/%d, want 3/2", hc.Fall, hc.Rise)
|
||||
}
|
||||
web4 := f.VIPs["web4"]
|
||||
if web4.HealthCheck.Type != "http" {
|
||||
t.Errorf("web4 healthcheck type: got %q, want http", web4.HealthCheck.Type)
|
||||
if hc.ProbeIPv4Src.String() != "10.0.0.1" {
|
||||
t.Errorf("http-check probe-ipv4-src: got %s, want 10.0.0.1", hc.ProbeIPv4Src)
|
||||
}
|
||||
if web4.HealthCheck.Fall != 3 {
|
||||
t.Errorf("web4 fall: got %d, want 3", web4.HealthCheck.Fall)
|
||||
if hc.HTTP == nil {
|
||||
t.Fatal("http-check HTTP params should not be nil")
|
||||
}
|
||||
if web4.HealthCheck.Rise != 2 {
|
||||
t.Errorf("web4 rise: got %d, want 2", web4.HealthCheck.Rise)
|
||||
if hc.HTTP.Path != "/healthz" {
|
||||
t.Errorf("http-check path: got %q, want /healthz", hc.HTTP.Path)
|
||||
}
|
||||
if web4.HealthCheck.HTTP == nil {
|
||||
t.Fatal("web4 HTTP params should not be nil")
|
||||
if hc.HTTP.Host != "example.com" {
|
||||
t.Errorf("http-check host: got %q, want example.com", hc.HTTP.Host)
|
||||
}
|
||||
if web4.HealthCheck.HTTP.Path != "/healthz" {
|
||||
t.Errorf("web4 params.path: got %q, want /healthz", web4.HealthCheck.HTTP.Path)
|
||||
if hc.HTTP.ResponseCodeMin != 200 || hc.HTTP.ResponseCodeMax != 200 {
|
||||
t.Errorf("http-check response-code: got %d-%d, want 200-200",
|
||||
hc.HTTP.ResponseCodeMin, hc.HTTP.ResponseCodeMax)
|
||||
}
|
||||
if web4.HealthCheck.HTTP.Host != "example.com" {
|
||||
t.Errorf("web4 params.host: got %q, want example.com", web4.HealthCheck.HTTP.Host)
|
||||
|
||||
icmp := cfg.HealthChecks["icmp-check"]
|
||||
if icmp.Fall != 5 {
|
||||
t.Errorf("icmp-check fall: got %d, want 5", icmp.Fall)
|
||||
}
|
||||
if web4.HealthCheck.HTTP.ResponseCodeMin != 200 || web4.HealthCheck.HTTP.ResponseCodeMax != 200 {
|
||||
t.Errorf("web4 response-code: got %d-%d, want 200-200",
|
||||
web4.HealthCheck.HTTP.ResponseCodeMin, web4.HealthCheck.HTTP.ResponseCodeMax)
|
||||
if icmp.ProbeIPv6Src.String() != "2001:db8:1::1" {
|
||||
t.Errorf("icmp-check probe-ipv6-src: got %s, want 2001:db8:1::1", icmp.ProbeIPv6Src)
|
||||
}
|
||||
web6 := f.VIPs["web6"]
|
||||
if web6.HealthCheck.Fall != 5 {
|
||||
t.Errorf("web6 fall: got %d, want 5", web6.HealthCheck.Fall)
|
||||
|
||||
// Backend defaults and explicit fields.
|
||||
beV4 := cfg.Backends["be-v4"]
|
||||
if beV4.Address.String() != "192.0.2.10" {
|
||||
t.Errorf("be-v4 address: got %s", beV4.Address)
|
||||
}
|
||||
if beV4.HealthCheck != "http-check" {
|
||||
t.Errorf("be-v4 healthcheck: got %q", beV4.HealthCheck)
|
||||
}
|
||||
if !beV4.Enabled {
|
||||
t.Error("be-v4 enabled: want true (default)")
|
||||
}
|
||||
if beV4.Weight != 100 {
|
||||
t.Errorf("be-v4 weight: got %d, want 100 (default)", beV4.Weight)
|
||||
}
|
||||
|
||||
beV6b := cfg.Backends["be-v6b"]
|
||||
if beV6b.Weight != 50 {
|
||||
t.Errorf("be-v6b weight: got %d, want 50", beV6b.Weight)
|
||||
}
|
||||
|
||||
// Frontend references.
|
||||
web4 := cfg.Frontends["web4"]
|
||||
if len(web4.Backends) != 1 || web4.Backends[0] != "be-v4" {
|
||||
t.Errorf("web4 backends: got %v", web4.Backends)
|
||||
}
|
||||
web6 := cfg.Frontends["web6"]
|
||||
if len(web6.Backends) != 2 {
|
||||
t.Errorf("web6 backends: got %d, want 2", len(web6.Backends))
|
||||
}
|
||||
}
|
||||
|
||||
func TestDefaults(t *testing.T) {
|
||||
cfg := `
|
||||
raw := `
|
||||
maglev:
|
||||
frontend:
|
||||
vips:
|
||||
v:
|
||||
address: 192.0.2.1
|
||||
backends: [10.0.0.2]
|
||||
healthcheck:
|
||||
type: icmp
|
||||
interval: 1s
|
||||
timeout: 2s
|
||||
healthchecks:
|
||||
icmp:
|
||||
type: icmp
|
||||
interval: 1s
|
||||
timeout: 2s
|
||||
backends:
|
||||
be:
|
||||
address: 10.0.0.2
|
||||
healthcheck: icmp
|
||||
frontends:
|
||||
v:
|
||||
address: 192.0.2.1
|
||||
backends: [be]
|
||||
`
|
||||
f, err := parse([]byte(cfg))
|
||||
cfg, err := parse([]byte(raw))
|
||||
if err != nil {
|
||||
t.Fatalf("unexpected error: %v", err)
|
||||
}
|
||||
if f.HealthCheckNetns != "" {
|
||||
t.Errorf("default healthcheck-netns: got %q, want empty (default netns)", f.HealthCheckNetns)
|
||||
if cfg.HealthChecker.Netns != "" {
|
||||
t.Errorf("default netns: got %q, want empty", cfg.HealthChecker.Netns)
|
||||
}
|
||||
if f.HealthChecker.TransitionHistory != 5 {
|
||||
t.Errorf("default transition-history: got %d, want 5", f.HealthChecker.TransitionHistory)
|
||||
if cfg.HealthChecker.TransitionHistory != 5 {
|
||||
t.Errorf("default transition-history: got %d, want 5", cfg.HealthChecker.TransitionHistory)
|
||||
}
|
||||
hc := f.VIPs["v"].HealthCheck
|
||||
if hc.Rise != 2 {
|
||||
t.Errorf("default rise: got %d, want 2", hc.Rise)
|
||||
hc := cfg.HealthChecks["icmp"]
|
||||
if hc.Rise != 2 || hc.Fall != 3 {
|
||||
t.Errorf("defaults rise/fall: got %d/%d, want 2/3", hc.Rise, hc.Fall)
|
||||
}
|
||||
if hc.Fall != 3 {
|
||||
t.Errorf("default fall: got %d, want 3", hc.Fall)
|
||||
be := cfg.Backends["be"]
|
||||
if !be.Enabled || be.Weight != 100 {
|
||||
t.Errorf("backend defaults: enabled=%v weight=%d", be.Enabled, be.Weight)
|
||||
}
|
||||
if f.ProbeIPv4Src != nil {
|
||||
t.Errorf("probe-ipv4-src should be nil when omitted, got %s", f.ProbeIPv4Src)
|
||||
}
|
||||
|
||||
func TestBackendNoHealthcheck(t *testing.T) {
|
||||
// A backend with no healthcheck reference is valid; probe is skipped.
|
||||
raw := `
|
||||
maglev:
|
||||
healthchecks: {}
|
||||
backends:
|
||||
be:
|
||||
address: 10.0.0.2
|
||||
frontends:
|
||||
v:
|
||||
address: 192.0.2.1
|
||||
backends: [be]
|
||||
`
|
||||
cfg, err := parse([]byte(raw))
|
||||
if err != nil {
|
||||
t.Fatalf("unexpected error: %v", err)
|
||||
}
|
||||
if cfg.Backends["be"].HealthCheck != "" {
|
||||
t.Error("expected empty healthcheck")
|
||||
}
|
||||
}
|
||||
|
||||
func TestOptionalIntervals(t *testing.T) {
|
||||
cfg := `
|
||||
raw := `
|
||||
maglev:
|
||||
frontend:
|
||||
vips:
|
||||
v:
|
||||
address: 192.0.2.1
|
||||
backends: [10.0.0.2]
|
||||
healthcheck:
|
||||
type: icmp
|
||||
interval: 2s
|
||||
fast-interval: 500ms
|
||||
down-interval: 30s
|
||||
timeout: 1s
|
||||
healthchecks:
|
||||
icmp:
|
||||
type: icmp
|
||||
interval: 2s
|
||||
fast-interval: 500ms
|
||||
down-interval: 30s
|
||||
timeout: 1s
|
||||
backends:
|
||||
be:
|
||||
address: 10.0.0.2
|
||||
healthcheck: icmp
|
||||
frontends:
|
||||
v:
|
||||
address: 192.0.2.1
|
||||
backends: [be]
|
||||
`
|
||||
f, err := parse([]byte(cfg))
|
||||
cfg, err := parse([]byte(raw))
|
||||
if err != nil {
|
||||
t.Fatalf("unexpected error: %v", err)
|
||||
}
|
||||
hc := f.VIPs["v"].HealthCheck
|
||||
hc := cfg.HealthChecks["icmp"]
|
||||
if hc.Interval != 2*time.Second {
|
||||
t.Errorf("interval: got %v, want 2s", hc.Interval)
|
||||
}
|
||||
@@ -158,47 +229,27 @@ maglev:
|
||||
}
|
||||
}
|
||||
|
||||
func TestTCPType(t *testing.T) {
|
||||
cfg := `
|
||||
maglev:
|
||||
frontend:
|
||||
vips:
|
||||
v:
|
||||
address: 192.0.2.1
|
||||
protocol: tcp
|
||||
port: 80
|
||||
backends: [10.0.0.2]
|
||||
healthcheck:
|
||||
type: tcp
|
||||
interval: 1s
|
||||
timeout: 2s
|
||||
`
|
||||
f, err := parse([]byte(cfg))
|
||||
if err != nil {
|
||||
t.Fatalf("unexpected error: %v", err)
|
||||
}
|
||||
if f.VIPs["v"].HealthCheck.Type != "tcp" {
|
||||
t.Errorf("type: got %q, want tcp", f.VIPs["v"].HealthCheck.Type)
|
||||
}
|
||||
}
|
||||
|
||||
func TestValidationErrors(t *testing.T) {
|
||||
// Minimal valid base to build error cases on top of.
|
||||
base := func(override string) string {
|
||||
base := func(hcExtra, beExtra, feExtra string) string {
|
||||
return `
|
||||
maglev:
|
||||
frontend:
|
||||
vips:
|
||||
v:
|
||||
address: 192.0.2.1
|
||||
backends: [10.0.0.2]
|
||||
healthcheck:
|
||||
type: icmp
|
||||
interval: 1s
|
||||
timeout: 2s
|
||||
` + override
|
||||
healthchecks:
|
||||
c:
|
||||
type: icmp
|
||||
interval: 1s
|
||||
timeout: 2s
|
||||
` + hcExtra + `
|
||||
backends:
|
||||
be:
|
||||
address: 10.0.0.2
|
||||
healthcheck: c
|
||||
` + beExtra + `
|
||||
frontends:
|
||||
v:
|
||||
address: 192.0.2.1
|
||||
backends: [be]
|
||||
` + feExtra
|
||||
}
|
||||
_ = base
|
||||
|
||||
tests := []struct {
|
||||
name string
|
||||
@@ -206,58 +257,50 @@ maglev:
|
||||
errSub string
|
||||
}{
|
||||
{
|
||||
name: "wrong family probe-ipv4-src",
|
||||
yaml: `
|
||||
maglev:
|
||||
frontend:
|
||||
probe-ipv4-src: 2001:db8::1
|
||||
vips:
|
||||
v:
|
||||
address: 192.0.2.1
|
||||
backends: [10.0.0.2]
|
||||
healthcheck:
|
||||
type: icmp
|
||||
interval: 1s
|
||||
timeout: 2s
|
||||
`,
|
||||
name: "wrong family probe-ipv4-src",
|
||||
yaml: base(" probe-ipv4-src: 2001:db8::1\n", "", ""),
|
||||
errSub: "probe-ipv4-src",
|
||||
},
|
||||
{
|
||||
name: "mixed backend families",
|
||||
name: "mixed backend address families in frontend",
|
||||
yaml: `
|
||||
maglev:
|
||||
frontend:
|
||||
vips:
|
||||
v:
|
||||
address: 192.0.2.1
|
||||
backends: [10.0.0.2, 2001:db8::1]
|
||||
healthcheck:
|
||||
type: icmp
|
||||
interval: 1s
|
||||
timeout: 2s
|
||||
healthchecks:
|
||||
c:
|
||||
type: icmp
|
||||
interval: 1s
|
||||
timeout: 2s
|
||||
backends:
|
||||
v4: {address: 10.0.0.2, healthcheck: c}
|
||||
v6: {address: 2001:db8::1, healthcheck: c}
|
||||
frontends:
|
||||
v:
|
||||
address: 192.0.2.1
|
||||
backends: [v4, v6]
|
||||
`,
|
||||
errSub: "address family",
|
||||
},
|
||||
{
|
||||
name: "port without protocol",
|
||||
yaml: validPortWithoutProtocol,
|
||||
|
||||
name: "port without protocol",
|
||||
yaml: base("", "", " port: 80\n"),
|
||||
errSub: "port requires protocol",
|
||||
},
|
||||
{
|
||||
name: "protocol without port",
|
||||
yaml: `
|
||||
maglev:
|
||||
frontend:
|
||||
vips:
|
||||
v:
|
||||
address: 192.0.2.1
|
||||
protocol: tcp
|
||||
backends: [10.0.0.2]
|
||||
healthcheck:
|
||||
type: icmp
|
||||
interval: 1s
|
||||
timeout: 2s
|
||||
healthchecks:
|
||||
c:
|
||||
type: icmp
|
||||
interval: 1s
|
||||
timeout: 2s
|
||||
backends:
|
||||
be: {address: 10.0.0.2, healthcheck: c}
|
||||
frontends:
|
||||
v:
|
||||
address: 192.0.2.1
|
||||
protocol: tcp
|
||||
backends: [be]
|
||||
`,
|
||||
errSub: "requires port",
|
||||
},
|
||||
@@ -265,15 +308,17 @@ maglev:
|
||||
name: "invalid healthcheck type",
|
||||
yaml: `
|
||||
maglev:
|
||||
frontend:
|
||||
vips:
|
||||
v:
|
||||
address: 192.0.2.1
|
||||
backends: [10.0.0.2]
|
||||
healthcheck:
|
||||
type: dns
|
||||
interval: 1s
|
||||
timeout: 2s
|
||||
healthchecks:
|
||||
c:
|
||||
type: dns
|
||||
interval: 1s
|
||||
timeout: 2s
|
||||
backends:
|
||||
be: {address: 10.0.0.2, healthcheck: c}
|
||||
frontends:
|
||||
v:
|
||||
address: 192.0.2.1
|
||||
backends: [be]
|
||||
`,
|
||||
errSub: "type must be",
|
||||
},
|
||||
@@ -281,84 +326,104 @@ maglev:
|
||||
name: "http missing path",
|
||||
yaml: `
|
||||
maglev:
|
||||
frontend:
|
||||
vips:
|
||||
v:
|
||||
address: 192.0.2.1
|
||||
backends: [10.0.0.2]
|
||||
healthcheck:
|
||||
type: http
|
||||
interval: 1s
|
||||
timeout: 2s
|
||||
healthchecks:
|
||||
c:
|
||||
type: http
|
||||
port: 80
|
||||
interval: 1s
|
||||
timeout: 2s
|
||||
backends:
|
||||
be: {address: 10.0.0.2, healthcheck: c}
|
||||
frontends:
|
||||
v:
|
||||
address: 192.0.2.1
|
||||
backends: [be]
|
||||
`,
|
||||
errSub: "params.path",
|
||||
},
|
||||
{
|
||||
name: "negative interval",
|
||||
yaml: `
|
||||
maglev:
|
||||
frontend:
|
||||
vips:
|
||||
v:
|
||||
address: 192.0.2.1
|
||||
backends: [10.0.0.2]
|
||||
healthcheck:
|
||||
type: icmp
|
||||
interval: -1s
|
||||
timeout: 2s
|
||||
`,
|
||||
errSub: "positive duration",
|
||||
},
|
||||
{
|
||||
name: "invalid fast-interval",
|
||||
yaml: `
|
||||
maglev:
|
||||
frontend:
|
||||
vips:
|
||||
v:
|
||||
address: 192.0.2.1
|
||||
backends: [10.0.0.2]
|
||||
healthcheck:
|
||||
type: icmp
|
||||
interval: 1s
|
||||
fast-interval: -1s
|
||||
timeout: 2s
|
||||
`,
|
||||
errSub: "positive duration",
|
||||
},
|
||||
{
|
||||
name: "fall zero becomes default",
|
||||
yaml: `
|
||||
maglev:
|
||||
frontend:
|
||||
vips:
|
||||
v:
|
||||
address: 192.0.2.1
|
||||
backends: [10.0.0.2]
|
||||
healthcheck:
|
||||
type: icmp
|
||||
interval: 1s
|
||||
timeout: 2s
|
||||
fall: 0
|
||||
`,
|
||||
// fall: 0 is treated as omitted → default 3; no error
|
||||
name: "negative interval",
|
||||
yaml: base("", "", ""),
|
||||
errSub: "",
|
||||
},
|
||||
{
|
||||
name: "empty backends",
|
||||
name: "undefined healthcheck reference",
|
||||
yaml: `
|
||||
maglev:
|
||||
frontend:
|
||||
vips:
|
||||
v:
|
||||
address: 192.0.2.1
|
||||
backends: []
|
||||
healthcheck:
|
||||
type: icmp
|
||||
interval: 1s
|
||||
timeout: 2s
|
||||
healthchecks: {}
|
||||
backends:
|
||||
be: {address: 10.0.0.2, healthcheck: missing}
|
||||
frontends:
|
||||
v:
|
||||
address: 192.0.2.1
|
||||
backends: [be]
|
||||
`,
|
||||
errSub: "backends must not be empty",
|
||||
errSub: "not defined",
|
||||
},
|
||||
{
|
||||
name: "undefined backend reference in frontend",
|
||||
yaml: `
|
||||
maglev:
|
||||
healthchecks:
|
||||
c:
|
||||
type: icmp
|
||||
interval: 1s
|
||||
timeout: 2s
|
||||
backends: {}
|
||||
frontends:
|
||||
v:
|
||||
address: 192.0.2.1
|
||||
backends: [missing]
|
||||
`,
|
||||
errSub: "not defined",
|
||||
},
|
||||
{
|
||||
name: "weight out of range",
|
||||
yaml: base("", " weight: 150\n", ""),
|
||||
errSub: "out of range",
|
||||
},
|
||||
{
|
||||
name: "fall zero becomes default",
|
||||
yaml: base(" fall: 0\n", "", ""),
|
||||
errSub: "",
|
||||
},
|
||||
{
|
||||
name: "tcp missing port",
|
||||
yaml: `
|
||||
maglev:
|
||||
healthchecks:
|
||||
c:
|
||||
type: tcp
|
||||
interval: 1s
|
||||
timeout: 2s
|
||||
backends:
|
||||
be: {address: 10.0.0.2, healthcheck: c}
|
||||
frontends:
|
||||
v:
|
||||
address: 192.0.2.1
|
||||
backends: [be]
|
||||
`,
|
||||
errSub: "requires port",
|
||||
},
|
||||
{
|
||||
name: "http missing port",
|
||||
yaml: `
|
||||
maglev:
|
||||
healthchecks:
|
||||
c:
|
||||
type: http
|
||||
interval: 1s
|
||||
timeout: 2s
|
||||
params:
|
||||
path: /
|
||||
backends:
|
||||
be: {address: 10.0.0.2, healthcheck: c}
|
||||
frontends:
|
||||
v:
|
||||
address: 192.0.2.1
|
||||
backends: [be]
|
||||
`,
|
||||
errSub: "requires port",
|
||||
},
|
||||
}
|
||||
|
||||
@@ -381,20 +446,6 @@ maglev:
|
||||
}
|
||||
}
|
||||
|
||||
const validPortWithoutProtocol = `
|
||||
maglev:
|
||||
frontend:
|
||||
vips:
|
||||
v:
|
||||
address: 192.0.2.1
|
||||
port: 80
|
||||
backends: [10.0.0.2]
|
||||
healthcheck:
|
||||
type: icmp
|
||||
interval: 1s
|
||||
timeout: 2s
|
||||
`
|
||||
|
||||
func contains(s, sub string) bool {
|
||||
return len(s) >= len(sub) && (s == sub || len(sub) == 0 ||
|
||||
func() bool {
|
||||
|
||||
Reference in New Issue
Block a user