1 // Copyright (C) The Arvados Authors. All rights reserved.
3 // SPDX-License-Identifier: Apache-2.0
17 "git.arvados.org/arvados.git/sdk/go/arvados"
18 "git.arvados.org/arvados.git/sdk/go/auth"
21 const defaultTimeout = arvados.Duration(2 * time.Second)
23 // Aggregator implements http.Handler. It handles "GET /_health/all"
24 // by checking the health of all configured services on the cluster
25 // and responding 200 if everything is healthy.
26 type Aggregator struct {
28 httpClient *http.Client
29 timeout arvados.Duration
31 Cluster *arvados.Cluster
33 // If non-nil, Log is called after handling each request.
34 Log func(*http.Request, error)
37 func (agg *Aggregator) setup() {
38 agg.httpClient = http.DefaultClient
40 // this is always the case, except in the test suite
41 agg.timeout = defaultTimeout
45 func (agg *Aggregator) CheckHealth() error {
49 func (agg *Aggregator) Done() <-chan struct{} {
53 func (agg *Aggregator) ServeHTTP(resp http.ResponseWriter, req *http.Request) {
54 agg.setupOnce.Do(agg.setup)
55 sendErr := func(statusCode int, err error) {
56 resp.WriteHeader(statusCode)
57 json.NewEncoder(resp).Encode(map[string]string{"error": err.Error()})
63 resp.Header().Set("Content-Type", "application/json")
65 if !agg.checkAuth(req) {
66 sendErr(http.StatusUnauthorized, errUnauthorized)
69 if req.URL.Path == "/_health/all" {
70 json.NewEncoder(resp).Encode(agg.ClusterHealth())
71 } else if req.URL.Path == "/_health/ping" {
72 resp.Write(healthyBody)
74 sendErr(http.StatusNotFound, errNotFound)
82 type ClusterHealthResponse struct {
83 // "OK" if all needed services are OK, otherwise "ERROR".
84 Health string `json:"health"`
86 // An entry for each known health check of each known instance
87 // of each needed component: "instance of service S on node N
88 // reports health-check C is OK."
89 Checks map[string]CheckResult `json:"checks"`
91 // An entry for each service type: "service S is OK." This
92 // exposes problems that can't be expressed in Checks, like
93 // "service S is needed, but isn't configured to run
95 Services map[arvados.ServiceName]ServiceHealth `json:"services"`
98 type CheckResult struct {
99 Health string `json:"health"`
100 Error string `json:"error,omitempty"`
101 HTTPStatusCode int `json:",omitempty"`
102 HTTPStatusText string `json:",omitempty"`
103 Response map[string]interface{} `json:"response"`
104 ResponseTime json.Number `json:"responseTime"`
107 type ServiceHealth struct {
108 Health string `json:"health"`
112 func (agg *Aggregator) ClusterHealth() ClusterHealthResponse {
113 agg.setupOnce.Do(agg.setup)
114 resp := ClusterHealthResponse{
116 Checks: make(map[string]CheckResult),
117 Services: make(map[arvados.ServiceName]ServiceHealth),
121 wg := sync.WaitGroup{}
122 for svcName, svc := range agg.Cluster.Services.Map() {
123 // Ensure svc is listed in resp.Services.
125 if _, ok := resp.Services[svcName]; !ok {
126 resp.Services[svcName] = ServiceHealth{Health: "ERROR"}
130 for addr := range svc.InternalURLs {
132 go func(svcName arvados.ServiceName, addr arvados.URL) {
134 var result CheckResult
135 pingURL, err := agg.pingURL(addr)
137 result = CheckResult{
142 result = agg.ping(pingURL)
147 resp.Checks[fmt.Sprintf("%s+%s", svcName, pingURL)] = result
148 if result.Health == "OK" {
149 h := resp.Services[svcName]
152 resp.Services[svcName] = h
154 resp.Health = "ERROR"
161 // Report ERROR if a needed service didn't fail any checks
162 // merely because it isn't configured to run anywhere.
163 for _, sh := range resp.Services {
164 if sh.Health != "OK" {
165 resp.Health = "ERROR"
172 func (agg *Aggregator) pingURL(svcURL arvados.URL) (*url.URL, error) {
173 base := url.URL(svcURL)
174 return base.Parse("/_health/ping")
177 func (agg *Aggregator) ping(target *url.URL) (result CheckResult) {
182 result.ResponseTime = json.Number(fmt.Sprintf("%.6f", time.Since(t0).Seconds()))
184 result.Health, result.Error = "ERROR", err.Error()
190 req, err := http.NewRequest("GET", target.String(), nil)
194 req.Header.Set("Authorization", "Bearer "+agg.Cluster.ManagementToken)
196 // Avoid workbench1's redirect-http-to-https feature
197 req.Header.Set("X-Forwarded-Proto", "https")
199 ctx, cancel := context.WithTimeout(req.Context(), time.Duration(agg.timeout))
201 req = req.WithContext(ctx)
202 resp, err := agg.httpClient.Do(req)
206 result.HTTPStatusCode = resp.StatusCode
207 result.HTTPStatusText = resp.Status
208 err = json.NewDecoder(resp.Body).Decode(&result.Response)
210 err = fmt.Errorf("cannot decode response: %s", err)
211 } else if resp.StatusCode != http.StatusOK {
212 err = fmt.Errorf("HTTP %d %s", resp.StatusCode, resp.Status)
213 } else if h, _ := result.Response["health"].(string); h != "OK" {
214 if e, ok := result.Response["error"].(string); ok && e != "" {
217 err = fmt.Errorf("health=%q in ping response", h)
223 func (agg *Aggregator) checkAuth(req *http.Request) bool {
224 creds := auth.CredentialsFromRequest(req)
225 for _, token := range creds.Tokens {
226 if token != "" && token == agg.Cluster.ManagementToken {