X-Git-Url: https://git.arvados.org/arvados.git/blobdiff_plain/8595030d0314e6f88a245e66f90cce0a306b6867..098a6b73cd5b7ad391ed30e95b825817d22aec24:/services/ws/router.go diff --git a/services/ws/router.go b/services/ws/router.go index 3f9800f04c..b3403dabd0 100644 --- a/services/ws/router.go +++ b/services/ws/router.go @@ -1,7 +1,10 @@ -package main +// Copyright (C) The Arvados Authors. All rights reserved. +// +// SPDX-License-Identifier: AGPL-3.0 + +package ws import ( - "database/sql" "encoding/json" "io" "net/http" @@ -10,7 +13,11 @@ import ( "sync/atomic" "time" - "github.com/Sirupsen/logrus" + "git.arvados.org/arvados.git/lib/cmd" + "git.arvados.org/arvados.git/sdk/go/arvados" + "git.arvados.org/arvados.git/sdk/go/ctxlog" + "git.arvados.org/arvados.git/sdk/go/health" + "github.com/sirupsen/logrus" "golang.org/x/net/websocket" ) @@ -22,13 +29,15 @@ type wsConn interface { } type router struct { - Config *Config + client *arvados.Client + cluster *arvados.Cluster eventSource eventSource newPermChecker func() permChecker handler *handler mux *http.ServeMux setupOnce sync.Once + done chan struct{} lastReqID int64 lastReqMtx sync.Mutex @@ -41,22 +50,33 @@ type routerDebugStatus struct { ReqsActive int64 } -type DebugStatuser interface { +type debugStatuser interface { DebugStatus() interface{} } -type sessionFactory func(wsConn, chan<- interface{}, *sql.DB, permChecker) (session, error) - func (rtr *router) setup() { rtr.handler = &handler{ - PingTimeout: rtr.Config.PingTimeout.Duration(), - QueueSize: rtr.Config.ClientEventQueue, + PingTimeout: time.Duration(rtr.cluster.API.SendTimeout), + QueueSize: rtr.cluster.API.WebsocketClientEventQueue, } rtr.mux = http.NewServeMux() - rtr.mux.Handle("/websocket", rtr.makeServer(NewSessionV0)) - rtr.mux.Handle("/arvados/v1/events.ws", rtr.makeServer(NewSessionV1)) - rtr.mux.HandleFunc("/debug.json", jsonHandler(rtr.DebugStatus)) - rtr.mux.HandleFunc("/status.json", jsonHandler(rtr.Status)) + rtr.mux.Handle("/websocket", rtr.makeServer(newSessionV0)) + rtr.mux.Handle("/arvados/v1/events.ws", rtr.makeServer(newSessionV1)) + rtr.mux.Handle("/debug.json", rtr.jsonHandler(rtr.DebugStatus)) + rtr.mux.Handle("/status.json", rtr.jsonHandler(rtr.Status)) + + rtr.mux.Handle("/_health/", &health.Handler{ + Token: rtr.cluster.ManagementToken, + Prefix: "/_health/", + Routes: health.Routes{ + "db": rtr.eventSource.DBHealth, + }, + Log: func(r *http.Request, err error) { + if err != nil { + ctxlog.FromContext(r.Context()).WithError(err).Error("error") + } + }, + }) } func (rtr *router) makeServer(newSession sessionFactory) *websocket.Server { @@ -66,17 +86,17 @@ func (rtr *router) makeServer(newSession sessionFactory) *websocket.Server { }, Handler: websocket.Handler(func(ws *websocket.Conn) { t0 := time.Now() - log := logger(ws.Request().Context()) - log.Info("connected") + logger := ctxlog.FromContext(ws.Request().Context()) + logger.Info("connected") - stats := rtr.handler.Handle(ws, rtr.eventSource, + stats := rtr.handler.Handle(ws, logger, rtr.eventSource, func(ws wsConn, sendq chan<- interface{}) (session, error) { - return newSession(ws, sendq, rtr.eventSource.DB(), rtr.newPermChecker()) + return newSession(ws, sendq, rtr.eventSource.DB(), rtr.newPermChecker(), rtr.client) }) - log.WithFields(logrus.Fields{ - "Elapsed": time.Now().Sub(t0).Seconds(), - "Stats": stats, + logger.WithFields(logrus.Fields{ + "elapsed": time.Now().Sub(t0).Seconds(), + "stats": stats, }).Info("disconnect") ws.Close() }), @@ -98,7 +118,7 @@ func (rtr *router) DebugStatus() interface{} { "HTTP": rtr.status, "Outgoing": rtr.handler.DebugStatus(), } - if es, ok := rtr.eventSource.(DebugStatuser); ok { + if es, ok := rtr.eventSource.(debugStatuser); ok { s["EventSource"] = es.DebugStatus() } return s @@ -107,6 +127,7 @@ func (rtr *router) DebugStatus() interface{} { func (rtr *router) Status() interface{} { return map[string]interface{}{ "Clients": atomic.LoadInt64(&rtr.status.ReqsActive), + "Version": cmd.Version.String(), } } @@ -116,26 +137,36 @@ func (rtr *router) ServeHTTP(resp http.ResponseWriter, req *http.Request) { atomic.AddInt64(&rtr.status.ReqsActive, 1) defer atomic.AddInt64(&rtr.status.ReqsActive, -1) - logger := logger(req.Context()). + logger := ctxlog.FromContext(req.Context()). WithField("RequestID", rtr.newReqID()) - ctx := contextWithLogger(req.Context(), logger) + ctx := ctxlog.Context(req.Context(), logger) req = req.WithContext(ctx) logger.WithFields(logrus.Fields{ - "RemoteAddr": req.RemoteAddr, - "X-Forwarded-For": req.Header.Get("X-Forwarded-For"), + "remoteAddr": req.RemoteAddr, + "reqForwardedFor": req.Header.Get("X-Forwarded-For"), }).Info("accept request") rtr.mux.ServeHTTP(resp, req) } -func jsonHandler(fn func() interface{}) http.HandlerFunc { - return func(resp http.ResponseWriter, req *http.Request) { - logger := logger(req.Context()) - enc := json.NewEncoder(resp) +func (rtr *router) jsonHandler(fn func() interface{}) http.Handler { + return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) { + logger := ctxlog.FromContext(r.Context()) + w.Header().Set("Content-Type", "application/json") + enc := json.NewEncoder(w) err := enc.Encode(fn()) if err != nil { msg := "encode failed" logger.WithError(err).Error(msg) - http.Error(resp, msg, http.StatusInternalServerError) + http.Error(w, msg, http.StatusInternalServerError) } - } + }) +} + +func (rtr *router) CheckHealth() error { + rtr.setupOnce.Do(rtr.setup) + return rtr.eventSource.DBHealth() +} + +func (rtr *router) Done() <-chan struct{} { + return rtr.done }