Skip to content

Commit 2280a68

Browse files
committed
Add sorting template helper code to sort haproxy map files so that wildcard
routes don't take precedence over routes that start with a number. Make the template processing follow a particular order (based on file name), so that we can use temporary files to write map data and subsequently sort into the actual config map file. Fixup helper to also sort cert_config but non-grouped to keep existing behavior (backward compatibility). Based on discussions in PR #19076 to fix issue #16724
1 parent 09f841f commit 2280a68

File tree

8 files changed

+489
-17
lines changed

8 files changed

+489
-17
lines changed

images/router/haproxy/Dockerfile

+1-1
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ RUN INSTALL_PKGS="haproxy18" && \
1010
rpm -V $INSTALL_PKGS && \
1111
yum clean all && \
1212
mkdir -p /var/lib/haproxy/router/{certs,cacerts} && \
13-
mkdir -p /var/lib/haproxy/{conf,run,bin,log} && \
13+
mkdir -p /var/lib/haproxy/{conf/.tmp,run,bin,log} && \
1414
touch /var/lib/haproxy/conf/{{os_http_be,os_edge_reencrypt_be,os_tcp_be,os_sni_passthrough,os_route_http_redirect,cert_config,os_wildcard_domain}.map,haproxy.config} && \
1515
setcap 'cap_net_bind_service=ep' /usr/sbin/haproxy && \
1616
chown -R :0 /var/lib/haproxy && \

images/router/haproxy/conf/haproxy-config.template

+53-10
Original file line numberDiff line numberDiff line change
@@ -471,7 +471,7 @@ backend be_tcp:{{$cfgIdx}}
471471
[sub]domain regexps. This map is used to check if
472472
a host matches a [sub]domain with has wildcard support.
473473
*/}}
474-
{{ define "/var/lib/haproxy/conf/os_wildcard_domain.map" -}}
474+
{{ define "/var/lib/haproxy/conf/.tmp/os_wildcard_domain.map" -}}
475475
{{ if isTrue (env "ROUTER_ALLOW_WILDCARD_ROUTES") -}}
476476
{{ range $idx, $cfg := .State -}}
477477
{{ if ne $cfg.Host "" -}}
@@ -480,9 +480,14 @@ backend be_tcp:{{$cfgIdx}}
480480
{{ end -}}
481481
{{ end -}}
482482
{{ end -}}
483-
{{ end -}}{{/* end if router allows wildcard routes */}}
484-
{{ end -}}{{/* end wildcard domain map template */}}
483+
{{ end -}}{{/* end if router allows wildcard routes */ -}}
484+
{{ end -}}{{/* end temporary wildcard domain map template */}}
485485

486+
{{ define "/var/lib/haproxy/conf/os_wildcard_domain.map" -}}
487+
{{ range $idx, $data := sortedMapData "/var/lib/haproxy/conf/.tmp/os_wildcard_domain.map" true -}}
488+
{{ $data }}
489+
{{ end -}}
490+
{{ end -}}{{/* end wildcard domain map template */}}
486491

487492

488493
{{/*
@@ -491,7 +496,7 @@ backend be_tcp:{{$cfgIdx}}
491496
be_edge_http for edge routes with InsecureEdgeTerminationPolicy Allow
492497
be_secure for reencrypt routes with InsecureEdgeTerminationPolicy Allow
493498
*/}}
494-
{{ define "/var/lib/haproxy/conf/os_http_be.map" -}}
499+
{{ define "/var/lib/haproxy/conf/.tmp/os_http_be.map" -}}
495500
{{ range $idx, $cfg := .State -}}
496501
{{ if and (ne $cfg.Host "") (eq $cfg.TLSTermination "") -}}
497502
{{generateRouteRegexp $cfg.Host $cfg.Path $cfg.IsWildcard}} be_http:{{$idx}}
@@ -506,12 +511,19 @@ backend be_tcp:{{$cfgIdx}}
506511
{{ end -}}
507512
{{ end -}}
508513

514+
{{ define "/var/lib/haproxy/conf/os_http_be.map" -}}
515+
{{ range $idx, $data := sortedMapData "/var/lib/haproxy/conf/.tmp/os_http_be.map" true -}}
516+
{{ $data }}
517+
{{ end -}}
518+
{{ end -}}{{/* end http host map template */}}
519+
520+
509521
{{/*
510522
os_edge_reencrypt_be.map : contains a mapping of www.example.com -> <service name>. This map is similar to os_http_be.map but for tls routes.
511523
by attaching prefix: be_edge_http for edge terminated routes
512524
be_secure for reencrypt routes
513525
*/}}
514-
{{ define "/var/lib/haproxy/conf/os_edge_reencrypt_be.map" -}}
526+
{{ define "/var/lib/haproxy/conf/.tmp/os_edge_reencrypt_be.map" -}}
515527
{{ range $idx, $cfg := .State -}}
516528
{{ if and (ne $cfg.Host "") (eq $cfg.TLSTermination "edge") -}}
517529
{{generateRouteRegexp $cfg.Host $cfg.Path $cfg.IsWildcard}} be_edge_http:{{$idx}}
@@ -520,6 +532,12 @@ backend be_tcp:{{$cfgIdx}}
520532
{{generateRouteRegexp $cfg.Host $cfg.Path $cfg.IsWildcard}} be_secure:{{$idx}}
521533
{{ end -}}
522534
{{ end -}}
535+
{{ end -}}{{/* end temporary edge http host map template */}}
536+
537+
{{ define "/var/lib/haproxy/conf/os_edge_reencrypt_be.map" -}}
538+
{{ range $idx, $data := sortedMapData "/var/lib/haproxy/conf/.tmp/os_edge_reencrypt_be.map" true -}}
539+
{{ $data }}
540+
{{ end -}}
523541
{{ end -}}{{/* end edge http host map template */}}
524542

525543

@@ -528,37 +546,56 @@ backend be_tcp:{{$cfgIdx}}
528546
Map is used to redirect insecure traffic to use a secure scheme (https)
529547
if acls match for routes that have the insecure option set to redirect.
530548
*/}}
531-
{{ define "/var/lib/haproxy/conf/os_route_http_redirect.map" -}}
549+
{{ define "/var/lib/haproxy/conf/.tmp/os_route_http_redirect.map" -}}
532550
{{ range $idx, $cfg := .State -}}
533551
{{ if and (ne $cfg.Host "") (eq $cfg.InsecureEdgeTerminationPolicy "Redirect") -}}
534552
{{generateRouteRegexp $cfg.Host $cfg.Path $cfg.IsWildcard}} {{$idx}}
535553
{{ end -}}
536554
{{ end -}}
555+
{{ end -}}{{/* end temporary redirect http host map template */}}
556+
557+
{{ define "/var/lib/haproxy/conf/os_route_http_redirect.map" -}}
558+
{{ range $idx, $data := sortedMapData "/var/lib/haproxy/conf/.tmp/os_route_http_redirect.map" true -}}
559+
{{ $data }}
560+
{{ end -}}
537561
{{ end -}}{{/* end redirect http host map template */}}
538562

539563

540564
{{/*
541565
os_tcp_be.map: contains a mapping of www.example.com -> <service name>. This map is used to discover the correct backend
542566
by attaching a prefix (be_tcp: or be_secure:) by use_backend statements if acls are matched.
543567
*/}}
544-
{{ define "/var/lib/haproxy/conf/os_tcp_be.map" -}}
568+
{{ define "/var/lib/haproxy/conf/.tmp/os_tcp_be.map" -}}
545569
{{ range $idx, $cfg := .State -}}
546570
{{ if and (eq $cfg.Path "") (and (ne $cfg.Host "") (matchValues (print $cfg.TLSTermination) "passthrough" "reencrypt")) -}}
547571
{{generateRouteRegexp $cfg.Host "" $cfg.IsWildcard}} {{$idx}}
548572
{{ end -}}
549573
{{ end -}}
574+
{{ end -}}{{/* end temporary tcp host map template */}}
575+
576+
{{ define "/var/lib/haproxy/conf/os_tcp_be.map" -}}
577+
{{ range $idx, $data := sortedMapData "/var/lib/haproxy/conf/.tmp/os_tcp_be.map" true -}}
578+
{{ $data }}
579+
{{ end -}}
550580
{{ end -}}{{/* end tcp host map template */}}
551581

582+
552583
{{/*
553584
os_sni_passthrough.map: contains a mapping of routes that expect to have an sni header and should be passed
554585
through to the host_be. Driven by the termination type of the ServiceAliasConfigs
555586
*/}}
556-
{{ define "/var/lib/haproxy/conf/os_sni_passthrough.map" -}}
587+
{{ define "/var/lib/haproxy/conf/.tmp/os_sni_passthrough.map" -}}
557588
{{ range $idx, $cfg := .State -}}
558589
{{ if and (eq $cfg.Path "") (eq $cfg.TLSTermination "passthrough") -}}
559590
{{generateRouteRegexp $cfg.Host "" $cfg.IsWildcard}} 1
560591
{{ end -}}
561592
{{ end -}}
593+
{{ end -}}{{/* end temporary sni passthrough map template */}}
594+
595+
{{ define "/var/lib/haproxy/conf/os_sni_passthrough.map" -}}
596+
{{ range $idx, $data := sortedMapData "/var/lib/haproxy/conf/.tmp/os_sni_passthrough.map" true -}}
597+
{{ $data }}
598+
{{ end -}}
562599
{{ end -}}{{/* end sni passthrough map template */}}
563600

564601
{{/*
@@ -569,7 +606,7 @@ backend be_tcp:{{$cfgIdx}}
569606
"<cert>: <domain-set>" is important as this allows us to use
570607
wildcards and/or use a deny set with !<domain> in the future.
571608
*/}}
572-
{{ define "/var/lib/haproxy/conf/cert_config.map" -}}
609+
{{ define "/var/lib/haproxy/conf/.tmp/cert_config.map" -}}
573610
{{ $workingDir := .WorkingDir -}}
574611
{{ range $idx, $cfg := .State -}}
575612
{{ if and (ne $cfg.Host "") (matchValues (print $cfg.TLSTermination) "edge" "reencrypt") -}}
@@ -579,4 +616,10 @@ backend be_tcp:{{$cfgIdx}}
579616
{{ end -}}
580617
{{ end -}}
581618
{{ end -}}
582-
{{ end }}{{/* end cert_config map template */}}
619+
{{ end }}{{/* end temporary cert_config map template */}}
620+
621+
{{ define "/var/lib/haproxy/conf/cert_config.map" -}}
622+
{{ range $idx, $data := sortedMapData "/var/lib/haproxy/conf/.tmp/cert_config.map" false -}}
623+
{{ $data }}
624+
{{ end -}}
625+
{{ end -}}{{/* end cert_config map template */}}

images/router/haproxy/reload-haproxy

-5
Original file line numberDiff line numberDiff line change
@@ -72,11 +72,6 @@ function haproxyHealthCheck() {
7272
retries=20
7373

7474

75-
# sort the path based map files for the haproxy map_beg function
76-
for mapfile in "$haproxy_conf_dir"/*.map; do
77-
sort -r "$mapfile" -o "$mapfile"
78-
done
79-
8075
old_pids=$(ps -A -opid,args | grep haproxy | egrep -v -e 'grep|reload-haproxy' | awk '{print $1}' | tr '\n' ' ')
8176

8277
reload_status=0

pkg/router/template/router.go

+8-1
Original file line numberDiff line numberDiff line change
@@ -9,6 +9,7 @@ import (
99
"os/exec"
1010
"path/filepath"
1111
"reflect"
12+
"sort"
1213
"strings"
1314
"sync"
1415
"text/template"
@@ -400,7 +401,13 @@ func (r *templateRouter) writeConfig() error {
400401

401402
glog.V(4).Infof("Router certificate manager config committed")
402403

403-
for path, template := range r.templates {
404+
pathNames := make([]string, 0)
405+
for k := range r.templates {
406+
pathNames = append(pathNames, k)
407+
}
408+
sort.Strings(pathNames)
409+
for _, path := range pathNames {
410+
template := r.templates[path]
404411
file, err := os.Create(path)
405412
if err != nil {
406413
return fmt.Errorf("error creating config file %s: %v", path, err)

pkg/router/template/template_helper.go

+24
Original file line numberDiff line numberDiff line change
@@ -5,13 +5,16 @@ import (
55
"math/rand"
66
"os"
77
"regexp"
8+
"sort"
89
"strconv"
910
"strings"
1011
"text/template"
1112

1213
"github.com/golang/glog"
1314

1415
routeapi "github.com/openshift/origin/pkg/route/apis/route"
16+
templateutil "github.com/openshift/origin/pkg/router/template/util"
17+
fileutil "github.com/openshift/origin/pkg/util/file"
1518
)
1619

1720
func isTrue(s string) bool {
@@ -170,6 +173,25 @@ func endpointsForAlias(alias ServiceAliasConfig, svc ServiceUnit) []Endpoint {
170173
return endpoints
171174
}
172175

176+
// sortedMapData returns the sorted data in a haproxy map. The returned data is
177+
// in alphabetically reverse order. The sortSubGroups option sorts the
178+
// non-wildcard paths first and adds the sorted wildcard paths at the end.
179+
// Note: The reversed sorting ensures we do a longest path match first.
180+
func sortedMapData(name string, sortSubGroups bool) []string {
181+
lines, err := fileutil.ReadLines(name)
182+
if err != nil {
183+
glog.Errorf("Error reading map file %s: %v", name, err)
184+
return []string{}
185+
}
186+
187+
if sortSubGroups {
188+
return templateutil.SortMapPaths(lines, `^[^\.]*\.`)
189+
}
190+
191+
sort.Sort(sort.Reverse(sort.StringSlice(lines)))
192+
return lines
193+
}
194+
173195
var helperFunctions = template.FuncMap{
174196
"endpointsForAlias": endpointsForAlias, //returns the list of valid endpoints
175197
"processEndpointsForAlias": processEndpointsForAlias, //returns the list of valid endpoints after processing them
@@ -184,4 +206,6 @@ var helperFunctions = template.FuncMap{
184206

185207
"isTrue": isTrue, //determines if a given variable is a true value
186208
"firstMatch": firstMatch, //anchors provided regular expression and evaluates against given strings, returns the first matched string or ""
209+
210+
"sortedMapData": sortedMapData, //returns sorted map contents. The data can optionally be sorted on the non-wildcard and wildcard sub-groups
187211
}

pkg/router/template/template_helper_test.go

+112
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,10 @@
11
package templaterouter
22

33
import (
4+
"fmt"
5+
"io/ioutil"
46
"regexp"
7+
"strings"
58
"testing"
69
)
710

@@ -297,3 +300,112 @@ func TestMatchPattern(t *testing.T) {
297300
}
298301
}
299302
}
303+
304+
func createTempMapFile(prefix string, data []string) (string, error) {
305+
var err error
306+
name := ""
307+
if tempFile, err := ioutil.TempFile("", prefix); err != nil {
308+
return "", fmt.Errorf("unexpected error creating temp file: %v", err)
309+
}
310+
311+
name = tempFile.Name()
312+
if err = tempFile.Close(); err != nil {
313+
return name, fmt.Errorf("unexpected error creating temp file: %v", err)
314+
}
315+
316+
if err := ioutil.WriteFile(name, []byte(strings.Join(data, "\n")), 0664); err != nil {
317+
return name, fmt.Errorf("unexpected error writing temp file %s: %v", name, err)
318+
}
319+
320+
return name, nil
321+
}
322+
323+
func TestSortMapData(t *testing.T) {
324+
testData := []string{
325+
`^api-stg\.127\.0\.0\.1\.nip\.io(:[0-9]+)?(/.*)?$ stg:api-route`,
326+
`^api-prod\.127\.0\.0\.1\.nip\.io(:[0-9]+)?(/.*)?$ prod:api-route`,
327+
`^[^\.]*\.127\.0\.0\.1\.nip\.io(:[0-9]+)?(/.*)?$ prod:wildcard-route`,
328+
`^3dev\.127\.0\.0\.1\.nip\.io(:[0-9]+)?(/.*)?$ dev:api-route`,
329+
`^api-prod\.127\.0\.0\.1\.nip\.io(:[0-9]+)?/x/y/z(/.*)?$ prod:api-path-route`,
330+
`^3app-admin\.127\.0\.0\.1\.nip\.io(:[0-9]+)?(/.*)?$ dev:admin-route`,
331+
`^[^\.]*\.foo\.127\.0\.0\.1\.nip\.io(:[0-9]+)?(/.*)?$ devel2:foo-wildcard-route`,
332+
`^zzz-production\.wildcard\.test(:[0-9]+)?/x/y/z(/.*)?$ test:api-route`,
333+
`^backend-app\.127\.0\.0\.1\.nip\.io(:[0-9]+)?(/.*)?$ prod:backend-route`,
334+
`^[^\.]*\.foo\.wildcard\.test(:[0-9]+)?(/.*)?$ devel2:foo-wildcard-test`,
335+
}
336+
337+
expectedOrder := []string{
338+
"test:api-route",
339+
"prod:backend-route",
340+
"stg:api-route",
341+
"prod:api-path-route",
342+
"prod:api-route",
343+
"dev:api-route",
344+
"dev:admin-route",
345+
"devel2:foo-wildcard-test",
346+
"devel2:foo-wildcard-route",
347+
"prod:wildcard-route",
348+
}
349+
350+
fileName, err := createTempMapFile("sort-map-data-test", testData)
351+
if err != nil {
352+
t.Errorf("TestSortMapData error: %v", err)
353+
}
354+
355+
lines := sortedMapData(fileName, true)
356+
if len(lines) != len(expectedOrder) {
357+
t.Errorf("TestSortMapData sorted data length %d did not match expected length %d",
358+
len(lines), len(expectedOrder))
359+
}
360+
for idx, suffix := range expectedOrder {
361+
if !strings.HasSuffix(lines[idx], suffix) {
362+
t.Errorf("TestSortMapData sorted data %s at index %d did not match expectation %s",
363+
lines[idx], idx, suffix)
364+
}
365+
}
366+
}
367+
368+
func TestSortMapCertConfigData(t *testing.T) {
369+
testData := []string{
370+
`/path/to/certs/stg:api-route.pem stg:api-route`,
371+
`/path/to/certs/prod:api-route.pem prod:api-route`,
372+
`/path/to/certs/prod:wildcard-route.pem prod:wildcard-route`,
373+
`/path/to/certs/dev:api-route.pem dev:api-route`,
374+
`/path/to/certs/prod:api-path-route prod:api-path-route`,
375+
`/path/to/certs/dev:admin-route.pem dev:admin-route`,
376+
`/path/to/certs/devel2:foo-wildcard-route.pem devel2:foo-wildcard-route`,
377+
`/path/to/certs/test:api-route.pem test:api-route`,
378+
`/path/to/certs/prod:backend-route.pem prod:backend-route`,
379+
`/path/to/certs/devel2:foo-wildcard-test.pem devel2:foo-wildcard-test`,
380+
}
381+
382+
expectedOrder := []string{
383+
"test:api-route",
384+
"stg:api-route",
385+
"prod:wildcard-route",
386+
"prod:backend-route",
387+
"prod:api-route",
388+
"prod:api-path-route",
389+
"devel2:foo-wildcard-test",
390+
"devel2:foo-wildcard-route",
391+
"dev:api-route",
392+
"dev:admin-route",
393+
}
394+
395+
fileName, err := createTempMapFile("sort-map-cert-config-test", testData)
396+
if err != nil {
397+
t.Errorf("TestSortMapCertConfigData error: %v", err)
398+
}
399+
400+
lines := sortedMapData(fileName, false)
401+
if len(lines) != len(expectedOrder) {
402+
t.Errorf("TestSortMapCertConfigData sorted data length %d did not match expected length %d",
403+
len(lines), len(expectedOrder))
404+
}
405+
for idx, suffix := range expectedOrder {
406+
if !strings.HasSuffix(lines[idx], suffix) {
407+
t.Errorf("TestSortMapCertConfigData sorted data %s at index %d did not match expectation %s",
408+
lines[idx], idx, suffix)
409+
}
410+
}
411+
}

0 commit comments

Comments
 (0)