use std::{borrow::Cow, str::FromStr, sync::Arc, time::Duration};
use async_trait::async_trait;
use http::{HeaderName, HeaderValue};
use pingora::{
server::{ListenFds, ShutdownWatch},
services::Service,
};
use pingora_load_balancing::{health_check::TcpHealthCheck, selection::RoundRobin, LoadBalancer};
use tokio::sync::broadcast::Sender;
use tracing::debug;
use crate::{
config::{Config, RouteHeader, RouteMatcher, RoutePathMatcher, RoutePlugin},
stores::{self, routes::RouteStoreContainer},
MsgProxy,
};
pub struct RoutingService {
config: Arc<Config>,
broadcast: Sender<MsgProxy>,
}
impl RoutingService {
pub fn new(config: Arc<Config>, broadcast: Sender<MsgProxy>) -> Self {
Self { config, broadcast }
}
fn add_routes_from_config(&mut self) {
for route in &self.config.routes {
let upstream_backends = route
.upstreams
.iter()
.map(|upstr| format!("{}:{}", upstr.ip, upstr.port))
.collect::<Vec<String>>();
let self_signed_cert_on_failure = route
.ssl_certificate
.as_ref()
.and_then(|v| v.self_signed_on_failure);
add_route_to_router(
&route.host,
&upstream_backends,
route.match_with.clone(),
route.headers.as_ref(),
route.plugins.as_ref(),
self_signed_cert_on_failure.unwrap_or(false),
);
debug!("Added route: {}, {:?}", route.host, route.upstreams);
}
}
async fn watch_for_route_changes(&self) {
let mut receiver = self.broadcast.subscribe();
while let Ok(MsgProxy::NewRoute(route)) = receiver.recv().await {
let mut matcher: Option<RouteMatcher> = None;
let route_clone = route.path_matchers.clone();
if !route.path_matchers.is_empty() {
matcher = Some(RouteMatcher {
path: Some(RoutePathMatcher {
patterns: route_clone.iter().map(|v| Cow::Owned(v.clone())).collect(),
}),
});
}
let route_header = RouteHeader {
add: Some(route.host_headers_add),
remove: Some(route.host_headers_remove),
};
add_route_to_router(
&route.host,
&route.upstreams,
matcher,
Some(&route_header),
Some(&route.plugins),
route.self_signed_certs,
);
tracing::debug!(
"Added route: {}, {:?} self-signed: {}",
route.host,
route.upstreams,
route.self_signed_certs
);
}
}
}
#[async_trait]
impl Service for RoutingService {
async fn start_service(&mut self, _fds: Option<ListenFds>, _shutdown: ShutdownWatch) {
self.add_routes_from_config();
self.watch_for_route_changes().await;
}
fn name(&self) -> &str {
"proxy_service_discovery"
}
fn threads(&self) -> Option<usize> {
Some(1)
}
}
fn has_new_backend(host: &str, upstream_input: &LoadBalancer<RoundRobin>) -> bool {
if let Some(route_container) = stores::get_route_by_key(host) {
let backends = route_container.load_balancer.backends().get_backend();
let new_backends = upstream_input.backends().get_backend();
if backends.len() != new_backends.len() {
return true;
}
!backends.iter().all(|be| new_backends.contains(be))
} else {
false
}
}
fn add_route_to_router(
host: &str,
upstream_input: &[String],
match_with: Option<RouteMatcher>,
headers: Option<&RouteHeader>,
plugins: Option<&Vec<RoutePlugin>>,
should_self_sign_cert_on_failure: bool,
) {
let Ok(mut upstreams) = LoadBalancer::<RoundRobin>::try_from_iter(upstream_input) else {
tracing::info!(
"Could not create upstreams for host: {}, upstreams {:?}",
host,
upstream_input
);
return;
};
if stores::get_route_by_key(host).is_some() && !has_new_backend(host, &upstreams) {
tracing::debug!("skipping update, no routing changes for host: {}", host);
return;
}
let tcp_health_check = TcpHealthCheck::new();
upstreams.set_health_check(tcp_health_check);
upstreams.health_check_frequency = Some(Duration::from_secs(15));
let mut route_store_container = RouteStoreContainer::new(upstreams);
route_store_container.self_signed_certificate = should_self_sign_cert_on_failure;
if let Some(headers) = headers {
if let Some(headers) = headers.add.as_ref() {
route_store_container.host_header_add = headers
.iter()
.map(|v| {
(
HeaderName::from_str(&v.name).unwrap(),
HeaderValue::from_str(&v.value).unwrap(),
)
})
.collect();
}
if let Some(to_remove) = headers.remove.as_ref() {
route_store_container.host_header_remove =
to_remove.iter().map(|v| v.name.to_string()).collect();
}
}
if let Some(plugins) = plugins {
for plugin in plugins {
match plugin.name.as_ref() {
"oauth2" | "request_id" => {
route_store_container
.plugins
.insert(plugin.name.to_string(), plugin.clone());
}
_ => {}
}
}
}
if let Some(match_with) = match_with {
match match_with.path {
Some(path_matcher) if !path_matcher.patterns.is_empty() => {
let pattern = path_matcher.patterns;
route_store_container.path_matcher.with_pattern(&pattern);
}
_ => {}
}
}
stores::insert_route(host.to_string(), route_store_container);
}