2016-11-10 22:56:29 +00:00
|
|
|
/*
|
|
|
|
Copyright 2015 The Kubernetes Authors.
|
|
|
|
|
|
|
|
Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
you may not use this file except in compliance with the License.
|
|
|
|
You may obtain a copy of the License at
|
|
|
|
|
|
|
|
http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
|
|
|
|
Unless required by applicable law or agreed to in writing, software
|
|
|
|
distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
See the License for the specific language governing permissions and
|
|
|
|
limitations under the License.
|
|
|
|
*/
|
|
|
|
|
|
|
|
package controller
|
|
|
|
|
|
|
|
import (
|
2018-06-14 00:55:07 +00:00
|
|
|
"os"
|
|
|
|
"os/exec"
|
2018-03-22 16:03:04 +00:00
|
|
|
"syscall"
|
|
|
|
|
2019-02-09 21:53:31 +00:00
|
|
|
"k8s.io/apimachinery/pkg/util/intstr"
|
|
|
|
|
2018-09-18 18:05:32 +00:00
|
|
|
"fmt"
|
|
|
|
|
2018-12-05 16:27:55 +00:00
|
|
|
"k8s.io/klog"
|
2017-09-17 18:42:31 +00:00
|
|
|
|
2017-08-23 05:00:42 +00:00
|
|
|
api "k8s.io/api/core/v1"
|
2017-11-06 22:34:30 +00:00
|
|
|
"k8s.io/kubernetes/pkg/util/sysctl"
|
2017-08-23 05:00:42 +00:00
|
|
|
|
2017-11-07 22:02:12 +00:00
|
|
|
"k8s.io/ingress-nginx/internal/ingress"
|
2016-11-10 22:56:29 +00:00
|
|
|
)
|
|
|
|
|
|
|
|
// newUpstream creates an upstream without servers.
|
2016-11-11 23:43:35 +00:00
|
|
|
func newUpstream(name string) *ingress.Backend {
|
|
|
|
return &ingress.Backend{
|
2016-11-16 18:24:26 +00:00
|
|
|
Name: name,
|
2016-11-11 23:43:35 +00:00
|
|
|
Endpoints: []ingress.Endpoint{},
|
2017-08-23 05:00:42 +00:00
|
|
|
Service: &api.Service{},
|
2017-06-16 00:43:17 +00:00
|
|
|
SessionAffinity: ingress.SessionAffinityConfig{
|
|
|
|
CookieSessionAffinity: ingress.CookieSessionAffinity{
|
|
|
|
Locations: make(map[string][]string),
|
|
|
|
},
|
|
|
|
},
|
2016-11-10 22:56:29 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-09-18 18:05:32 +00:00
|
|
|
// upstreamName returns a formatted upstream name based on namespace, service, and port
|
|
|
|
func upstreamName(namespace string, service string, port intstr.IntOrString) string {
|
|
|
|
return fmt.Sprintf("%v-%v-%v", namespace, service, port.String())
|
|
|
|
}
|
|
|
|
|
2018-06-13 18:15:45 +00:00
|
|
|
// sysctlSomaxconn returns the maximum number of connections that can be queued
|
|
|
|
// for acceptance (value of net.core.somaxconn)
|
2017-11-06 22:34:30 +00:00
|
|
|
// http://nginx.org/en/docs/http/ngx_http_core_module.html#listen
|
|
|
|
func sysctlSomaxconn() int {
|
|
|
|
maxConns, err := sysctl.New().GetSysctl("net/core/somaxconn")
|
|
|
|
if err != nil || maxConns < 512 {
|
2018-12-05 16:27:55 +00:00
|
|
|
klog.V(3).Infof("net.core.somaxconn=%v (using system default)", maxConns)
|
2017-11-06 22:34:30 +00:00
|
|
|
return 511
|
|
|
|
}
|
|
|
|
|
|
|
|
return maxConns
|
|
|
|
}
|
|
|
|
|
2019-01-15 20:34:17 +00:00
|
|
|
// rlimitMaxNumFiles returns hard limit for RLIMIT_NOFILE
|
|
|
|
func rlimitMaxNumFiles() int {
|
2018-03-22 16:03:04 +00:00
|
|
|
var rLimit syscall.Rlimit
|
|
|
|
err := syscall.Getrlimit(syscall.RLIMIT_NOFILE, &rLimit)
|
2017-11-06 22:34:30 +00:00
|
|
|
if err != nil {
|
2018-12-05 16:27:55 +00:00
|
|
|
klog.Errorf("Error reading system maximum number of open file descriptors (RLIMIT_NOFILE): %v", err)
|
2017-11-06 22:34:30 +00:00
|
|
|
return 0
|
|
|
|
}
|
2018-12-05 16:27:55 +00:00
|
|
|
klog.V(2).Infof("rlimit.max=%v", rLimit.Max)
|
2018-03-22 16:03:04 +00:00
|
|
|
return int(rLimit.Max)
|
2017-11-06 22:34:30 +00:00
|
|
|
}
|
2018-06-14 00:55:07 +00:00
|
|
|
|
|
|
|
const (
|
|
|
|
defBinary = "/usr/sbin/nginx"
|
|
|
|
cfgPath = "/etc/nginx/nginx.conf"
|
|
|
|
)
|
|
|
|
|
2018-08-31 00:32:06 +00:00
|
|
|
var valgrind = []string{
|
|
|
|
"valgrind",
|
|
|
|
"--tool=memcheck",
|
|
|
|
"--leak-check=full",
|
|
|
|
"--show-leak-kinds=all",
|
|
|
|
"--leak-check=yes",
|
|
|
|
}
|
|
|
|
|
2018-06-14 00:55:07 +00:00
|
|
|
func nginxExecCommand(args ...string) *exec.Cmd {
|
|
|
|
ngx := os.Getenv("NGINX_BINARY")
|
|
|
|
if ngx == "" {
|
|
|
|
ngx = defBinary
|
|
|
|
}
|
|
|
|
|
2018-08-31 00:32:06 +00:00
|
|
|
cmdArgs := []string{"--deep"}
|
|
|
|
|
|
|
|
if os.Getenv("RUN_WITH_VALGRIND") == "true" {
|
|
|
|
cmdArgs = append(cmdArgs, valgrind...)
|
|
|
|
}
|
|
|
|
|
|
|
|
cmdArgs = append(cmdArgs, ngx, "-c", cfgPath)
|
2018-06-14 00:55:07 +00:00
|
|
|
cmdArgs = append(cmdArgs, args...)
|
2018-08-31 00:32:06 +00:00
|
|
|
|
2018-08-03 13:50:53 +00:00
|
|
|
return exec.Command("authbind", cmdArgs...)
|
2018-06-14 00:55:07 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
func nginxTestCommand(cfg string) *exec.Cmd {
|
2019-02-09 21:53:31 +00:00
|
|
|
return exec.Command(defBinary, "-c", cfg, "-t")
|
2018-06-14 00:55:07 +00:00
|
|
|
}
|