Skip to content

Commit b5be0fa

Browse files
Merge pull request #19219 from ramr/sort-map
Template helper code to sort map files
2 parents 6eddd32 + 1cfd4fd commit b5be0fa

File tree

8 files changed

+489
-17
lines changed

8 files changed

+489
-17
lines changed

images/router/haproxy/Dockerfile

+1-1
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ RUN INSTALL_PKGS="haproxy18" && \
1010
rpm -V $INSTALL_PKGS && \
1111
yum clean all && \
1212
mkdir -p /var/lib/haproxy/router/{certs,cacerts} && \
13-
mkdir -p /var/lib/haproxy/{conf,run,bin,log} && \
13+
mkdir -p /var/lib/haproxy/{conf/.tmp,run,bin,log} && \
1414
touch /var/lib/haproxy/conf/{{os_http_be,os_edge_reencrypt_be,os_tcp_be,os_sni_passthrough,os_route_http_redirect,cert_config,os_wildcard_domain}.map,haproxy.config} && \
1515
setcap 'cap_net_bind_service=ep' /usr/sbin/haproxy && \
1616
chown -R :0 /var/lib/haproxy && \

images/router/haproxy/conf/haproxy-config.template

+53-10
Original file line numberDiff line numberDiff line change
@@ -471,7 +471,7 @@ backend be_tcp:{{$cfgIdx}}
471471
[sub]domain regexps. This map is used to check if
472472
a host matches a [sub]domain with has wildcard support.
473473
*/}}
474-
{{ define "/var/lib/haproxy/conf/os_wildcard_domain.map" -}}
474+
{{ define "/var/lib/haproxy/conf/.tmp/os_wildcard_domain.map" -}}
475475
{{ if isTrue (env "ROUTER_ALLOW_WILDCARD_ROUTES") -}}
476476
{{ range $idx, $cfg := .State -}}
477477
{{ if ne $cfg.Host "" -}}
@@ -480,9 +480,14 @@ backend be_tcp:{{$cfgIdx}}
480480
{{ end -}}
481481
{{ end -}}
482482
{{ end -}}
483-
{{ end -}}{{/* end if router allows wildcard routes */}}
484-
{{ end -}}{{/* end wildcard domain map template */}}
483+
{{ end -}}{{/* end if router allows wildcard routes */ -}}
484+
{{ end -}}{{/* end temporary wildcard domain map template */}}
485485

486+
{{ define "/var/lib/haproxy/conf/os_wildcard_domain.map" -}}
487+
{{ range $idx, $data := sortedMapData "/var/lib/haproxy/conf/.tmp/os_wildcard_domain.map" true -}}
488+
{{ $data }}
489+
{{ end -}}
490+
{{ end -}}{{/* end wildcard domain map template */}}
486491

487492

488493
{{/*
@@ -491,7 +496,7 @@ backend be_tcp:{{$cfgIdx}}
491496
be_edge_http for edge routes with InsecureEdgeTerminationPolicy Allow
492497
be_secure for reencrypt routes with InsecureEdgeTerminationPolicy Allow
493498
*/}}
494-
{{ define "/var/lib/haproxy/conf/os_http_be.map" -}}
499+
{{ define "/var/lib/haproxy/conf/.tmp/os_http_be.map" -}}
495500
{{ range $idx, $cfg := .State -}}
496501
{{ if and (ne $cfg.Host "") (eq $cfg.TLSTermination "") -}}
497502
{{generateRouteRegexp $cfg.Host $cfg.Path $cfg.IsWildcard}} be_http:{{$idx}}
@@ -506,12 +511,19 @@ backend be_tcp:{{$cfgIdx}}
506511
{{ end -}}
507512
{{ end -}}
508513

514+
{{ define "/var/lib/haproxy/conf/os_http_be.map" -}}
515+
{{ range $idx, $data := sortedMapData "/var/lib/haproxy/conf/.tmp/os_http_be.map" true -}}
516+
{{ $data }}
517+
{{ end -}}
518+
{{ end -}}{{/* end http host map template */}}
519+
520+
509521
{{/*
510522
os_edge_reencrypt_be.map : contains a mapping of www.example.com -> <service name>. This map is similar to os_http_be.map but for tls routes.
511523
by attaching prefix: be_edge_http for edge terminated routes
512524
be_secure for reencrypt routes
513525
*/}}
514-
{{ define "/var/lib/haproxy/conf/os_edge_reencrypt_be.map" -}}
526+
{{ define "/var/lib/haproxy/conf/.tmp/os_edge_reencrypt_be.map" -}}
515527
{{ range $idx, $cfg := .State -}}
516528
{{ if and (ne $cfg.Host "") (eq $cfg.TLSTermination "edge") -}}
517529
{{generateRouteRegexp $cfg.Host $cfg.Path $cfg.IsWildcard}} be_edge_http:{{$idx}}
@@ -520,6 +532,12 @@ backend be_tcp:{{$cfgIdx}}
520532
{{generateRouteRegexp $cfg.Host $cfg.Path $cfg.IsWildcard}} be_secure:{{$idx}}
521533
{{ end -}}
522534
{{ end -}}
535+
{{ end -}}{{/* end temporary edge http host map template */}}
536+
537+
{{ define "/var/lib/haproxy/conf/os_edge_reencrypt_be.map" -}}
538+
{{ range $idx, $data := sortedMapData "/var/lib/haproxy/conf/.tmp/os_edge_reencrypt_be.map" true -}}
539+
{{ $data }}
540+
{{ end -}}
523541
{{ end -}}{{/* end edge http host map template */}}
524542

525543

@@ -528,37 +546,56 @@ backend be_tcp:{{$cfgIdx}}
528546
Map is used to redirect insecure traffic to use a secure scheme (https)
529547
if acls match for routes that have the insecure option set to redirect.
530548
*/}}
531-
{{ define "/var/lib/haproxy/conf/os_route_http_redirect.map" -}}
549+
{{ define "/var/lib/haproxy/conf/.tmp/os_route_http_redirect.map" -}}
532550
{{ range $idx, $cfg := .State -}}
533551
{{ if and (ne $cfg.Host "") (eq $cfg.InsecureEdgeTerminationPolicy "Redirect") -}}
534552
{{generateRouteRegexp $cfg.Host $cfg.Path $cfg.IsWildcard}} {{$idx}}
535553
{{ end -}}
536554
{{ end -}}
555+
{{ end -}}{{/* end temporary redirect http host map template */}}
556+
557+
{{ define "/var/lib/haproxy/conf/os_route_http_redirect.map" -}}
558+
{{ range $idx, $data := sortedMapData "/var/lib/haproxy/conf/.tmp/os_route_http_redirect.map" true -}}
559+
{{ $data }}
560+
{{ end -}}
537561
{{ end -}}{{/* end redirect http host map template */}}
538562

539563

540564
{{/*
541565
os_tcp_be.map: contains a mapping of www.example.com -> <service name>. This map is used to discover the correct backend
542566
by attaching a prefix (be_tcp: or be_secure:) by use_backend statements if acls are matched.
543567
*/}}
544-
{{ define "/var/lib/haproxy/conf/os_tcp_be.map" -}}
568+
{{ define "/var/lib/haproxy/conf/.tmp/os_tcp_be.map" -}}
545569
{{ range $idx, $cfg := .State -}}
546570
{{ if and (eq $cfg.Path "") (and (ne $cfg.Host "") (matchValues (print $cfg.TLSTermination) "passthrough" "reencrypt")) -}}
547571
{{generateRouteRegexp $cfg.Host "" $cfg.IsWildcard}} {{$idx}}
548572
{{ end -}}
549573
{{ end -}}
574+
{{ end -}}{{/* end temporary tcp host map template */}}
575+
576+
{{ define "/var/lib/haproxy/conf/os_tcp_be.map" -}}
577+
{{ range $idx, $data := sortedMapData "/var/lib/haproxy/conf/.tmp/os_tcp_be.map" true -}}
578+
{{ $data }}
579+
{{ end -}}
550580
{{ end -}}{{/* end tcp host map template */}}
551581

582+
552583
{{/*
553584
os_sni_passthrough.map: contains a mapping of routes that expect to have an sni header and should be passed
554585
through to the host_be. Driven by the termination type of the ServiceAliasConfigs
555586
*/}}
556-
{{ define "/var/lib/haproxy/conf/os_sni_passthrough.map" -}}
587+
{{ define "/var/lib/haproxy/conf/.tmp/os_sni_passthrough.map" -}}
557588
{{ range $idx, $cfg := .State -}}
558589
{{ if and (eq $cfg.Path "") (eq $cfg.TLSTermination "passthrough") -}}
559590
{{generateRouteRegexp $cfg.Host "" $cfg.IsWildcard}} 1
560591
{{ end -}}
561592
{{ end -}}
593+
{{ end -}}{{/* end temporary sni passthrough map template */}}
594+
595+
{{ define "/var/lib/haproxy/conf/os_sni_passthrough.map" -}}
596+
{{ range $idx, $data := sortedMapData "/var/lib/haproxy/conf/.tmp/os_sni_passthrough.map" true -}}
597+
{{ $data }}
598+
{{ end -}}
562599
{{ end -}}{{/* end sni passthrough map template */}}
563600

564601
{{/*
@@ -569,7 +606,7 @@ backend be_tcp:{{$cfgIdx}}
569606
"<cert>: <domain-set>" is important as this allows us to use
570607
wildcards and/or use a deny set with !<domain> in the future.
571608
*/}}
572-
{{ define "/var/lib/haproxy/conf/cert_config.map" -}}
609+
{{ define "/var/lib/haproxy/conf/.tmp/cert_config.map" -}}
573610
{{ $workingDir := .WorkingDir -}}
574611
{{ range $idx, $cfg := .State -}}
575612
{{ if and (ne $cfg.Host "") (matchValues (print $cfg.TLSTermination) "edge" "reencrypt") -}}
@@ -579,4 +616,10 @@ backend be_tcp:{{$cfgIdx}}
579616
{{ end -}}
580617
{{ end -}}
581618
{{ end -}}
582-
{{ end }}{{/* end cert_config map template */}}
619+
{{ end }}{{/* end temporary cert_config map template */}}
620+
621+
{{ define "/var/lib/haproxy/conf/cert_config.map" -}}
622+
{{ range $idx, $data := sortedMapData "/var/lib/haproxy/conf/.tmp/cert_config.map" false -}}
623+
{{ $data }}
624+
{{ end -}}
625+
{{ end -}}{{/* end cert_config map template */}}

images/router/haproxy/reload-haproxy

-5
Original file line numberDiff line numberDiff line change
@@ -72,11 +72,6 @@ function haproxyHealthCheck() {
7272
retries=20
7373

7474

75-
# sort the path based map files for the haproxy map_beg function
76-
for mapfile in "$haproxy_conf_dir"/*.map; do
77-
sort -r "$mapfile" -o "$mapfile"
78-
done
79-
8075
old_pids=$(ps -A -opid,args | grep haproxy | egrep -v -e 'grep|reload-haproxy' | awk '{print $1}' | tr '\n' ' ')
8176

8277
reload_status=0

pkg/router/template/router.go

+8-1
Original file line numberDiff line numberDiff line change
@@ -9,6 +9,7 @@ import (
99
"os/exec"
1010
"path/filepath"
1111
"reflect"
12+
"sort"
1213
"strings"
1314
"sync"
1415
"text/template"
@@ -400,7 +401,13 @@ func (r *templateRouter) writeConfig() error {
400401

401402
glog.V(4).Infof("Router certificate manager config committed")
402403

403-
for path, template := range r.templates {
404+
pathNames := make([]string, 0)
405+
for k := range r.templates {
406+
pathNames = append(pathNames, k)
407+
}
408+
sort.Strings(pathNames)
409+
for _, path := range pathNames {
410+
template := r.templates[path]
404411
file, err := os.Create(path)
405412
if err != nil {
406413
return fmt.Errorf("error creating config file %s: %v", path, err)

pkg/router/template/template_helper.go

+24
Original file line numberDiff line numberDiff line change
@@ -5,13 +5,16 @@ import (
55
"math/rand"
66
"os"
77
"regexp"
8+
"sort"
89
"strconv"
910
"strings"
1011
"text/template"
1112

1213
"github.com/golang/glog"
1314

1415
routeapi "github.com/openshift/origin/pkg/route/apis/route"
16+
templateutil "github.com/openshift/origin/pkg/router/template/util"
17+
fileutil "github.com/openshift/origin/pkg/util/file"
1518
)
1619

1720
func isTrue(s string) bool {
@@ -170,6 +173,25 @@ func endpointsForAlias(alias ServiceAliasConfig, svc ServiceUnit) []Endpoint {
170173
return endpoints
171174
}
172175

176+
// sortedMapData returns the sorted data in a haproxy map. The returned data is
177+
// in alphabetically reverse order. The sortSubGroups option sorts the
178+
// non-wildcard paths first and adds the sorted wildcard paths at the end.
179+
// Note: The reversed sorting ensures we do a longest path match first.
180+
func sortedMapData(name string, sortSubGroups bool) []string {
181+
lines, err := fileutil.ReadLines(name)
182+
if err != nil {
183+
glog.Errorf("Error reading map file %s: %v", name, err)
184+
return []string{}
185+
}
186+
187+
if sortSubGroups {
188+
return templateutil.SortMapPaths(lines, `^[^\.]*\.`)
189+
}
190+
191+
sort.Sort(sort.Reverse(sort.StringSlice(lines)))
192+
return lines
193+
}
194+
173195
var helperFunctions = template.FuncMap{
174196
"endpointsForAlias": endpointsForAlias, //returns the list of valid endpoints
175197
"processEndpointsForAlias": processEndpointsForAlias, //returns the list of valid endpoints after processing them
@@ -184,4 +206,6 @@ var helperFunctions = template.FuncMap{
184206

185207
"isTrue": isTrue, //determines if a given variable is a true value
186208
"firstMatch": firstMatch, //anchors provided regular expression and evaluates against given strings, returns the first matched string or ""
209+
210+
"sortedMapData": sortedMapData, //returns sorted map contents. The data can optionally be sorted on the non-wildcard and wildcard sub-groups
187211
}

pkg/router/template/template_helper_test.go

+112
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,10 @@
11
package templaterouter
22

33
import (
4+
"fmt"
5+
"io/ioutil"
46
"regexp"
7+
"strings"
58
"testing"
69
)
710

@@ -297,3 +300,112 @@ func TestMatchPattern(t *testing.T) {
297300
}
298301
}
299302
}
303+
304+
func createTempMapFile(prefix string, data []string) (string, error) {
305+
name := ""
306+
tempFile, err := ioutil.TempFile("", prefix)
307+
if err != nil {
308+
return "", fmt.Errorf("unexpected error creating temp file: %v", err)
309+
}
310+
311+
name = tempFile.Name()
312+
if err = tempFile.Close(); err != nil {
313+
return name, fmt.Errorf("unexpected error creating temp file: %v", err)
314+
}
315+
316+
if err := ioutil.WriteFile(name, []byte(strings.Join(data, "\n")), 0664); err != nil {
317+
return name, fmt.Errorf("unexpected error writing temp file %s: %v", name, err)
318+
}
319+
320+
return name, nil
321+
}
322+
323+
func TestSortMapData(t *testing.T) {
324+
testData := []string{
325+
`^api-stg\.127\.0\.0\.1\.nip\.io(:[0-9]+)?(/.*)?$ stg:api-route`,
326+
`^api-prod\.127\.0\.0\.1\.nip\.io(:[0-9]+)?(/.*)?$ prod:api-route`,
327+
`^[^\.]*\.127\.0\.0\.1\.nip\.io(:[0-9]+)?(/.*)?$ prod:wildcard-route`,
328+
`^3dev\.127\.0\.0\.1\.nip\.io(:[0-9]+)?(/.*)?$ dev:api-route`,
329+
`^api-prod\.127\.0\.0\.1\.nip\.io(:[0-9]+)?/x/y/z(/.*)?$ prod:api-path-route`,
330+
`^3app-admin\.127\.0\.0\.1\.nip\.io(:[0-9]+)?(/.*)?$ dev:admin-route`,
331+
`^[^\.]*\.foo\.127\.0\.0\.1\.nip\.io(:[0-9]+)?(/.*)?$ devel2:foo-wildcard-route`,
332+
`^zzz-production\.wildcard\.test(:[0-9]+)?/x/y/z(/.*)?$ test:api-route`,
333+
`^backend-app\.127\.0\.0\.1\.nip\.io(:[0-9]+)?(/.*)?$ prod:backend-route`,
334+
`^[^\.]*\.foo\.wildcard\.test(:[0-9]+)?(/.*)?$ devel2:foo-wildcard-test`,
335+
}
336+
337+
expectedOrder := []string{
338+
"test:api-route",
339+
"prod:backend-route",
340+
"stg:api-route",
341+
"prod:api-path-route",
342+
"prod:api-route",
343+
"dev:api-route",
344+
"dev:admin-route",
345+
"devel2:foo-wildcard-test",
346+
"devel2:foo-wildcard-route",
347+
"prod:wildcard-route",
348+
}
349+
350+
fileName, err := createTempMapFile("sort-map-data-test", testData)
351+
if err != nil {
352+
t.Errorf("TestSortMapData error: %v", err)
353+
}
354+
355+
lines := sortedMapData(fileName, true)
356+
if len(lines) != len(expectedOrder) {
357+
t.Errorf("TestSortMapData sorted data length %d did not match expected length %d",
358+
len(lines), len(expectedOrder))
359+
}
360+
for idx, suffix := range expectedOrder {
361+
if !strings.HasSuffix(lines[idx], suffix) {
362+
t.Errorf("TestSortMapData sorted data %s at index %d did not match expectation %s",
363+
lines[idx], idx, suffix)
364+
}
365+
}
366+
}
367+
368+
func TestSortMapCertConfigData(t *testing.T) {
369+
testData := []string{
370+
`/path/to/certs/stg:api-route.pem stg:api-route`,
371+
`/path/to/certs/prod:api-route.pem prod:api-route`,
372+
`/path/to/certs/prod:wildcard-route.pem prod:wildcard-route`,
373+
`/path/to/certs/dev:api-route.pem dev:api-route`,
374+
`/path/to/certs/prod:api-path-route prod:api-path-route`,
375+
`/path/to/certs/dev:admin-route.pem dev:admin-route`,
376+
`/path/to/certs/devel2:foo-wildcard-route.pem devel2:foo-wildcard-route`,
377+
`/path/to/certs/test:api-route.pem test:api-route`,
378+
`/path/to/certs/prod:backend-route.pem prod:backend-route`,
379+
`/path/to/certs/devel2:foo-wildcard-test.pem devel2:foo-wildcard-test`,
380+
}
381+
382+
expectedOrder := []string{
383+
"test:api-route",
384+
"stg:api-route",
385+
"prod:wildcard-route",
386+
"prod:backend-route",
387+
"prod:api-route",
388+
"prod:api-path-route",
389+
"devel2:foo-wildcard-test",
390+
"devel2:foo-wildcard-route",
391+
"dev:api-route",
392+
"dev:admin-route",
393+
}
394+
395+
fileName, err := createTempMapFile("sort-map-cert-config-test", testData)
396+
if err != nil {
397+
t.Errorf("TestSortMapCertConfigData error: %v", err)
398+
}
399+
400+
lines := sortedMapData(fileName, false)
401+
if len(lines) != len(expectedOrder) {
402+
t.Errorf("TestSortMapCertConfigData sorted data length %d did not match expected length %d",
403+
len(lines), len(expectedOrder))
404+
}
405+
for idx, suffix := range expectedOrder {
406+
if !strings.HasSuffix(lines[idx], suffix) {
407+
t.Errorf("TestSortMapCertConfigData sorted data %s at index %d did not match expectation %s",
408+
lines[idx], idx, suffix)
409+
}
410+
}
411+
}

0 commit comments

Comments
 (0)