299 lines
9.0 KiB
Plaintext
299 lines
9.0 KiB
Plaintext
Here I will write down some specifics of certain parts of the source, these are
|
|
just some of my thoughts and clues and they are probably not too important for
|
|
a wider audience.
|
|
|
|
src/parser.c
|
|
------------------------------------------------------------------------------
|
|
The first thing to run when starting the HAProxy is the flt_ot_parse() function
|
|
which actually parses the filter configuration.
|
|
|
|
In case of correct configuration, the function returns ERR_NONE (or 0), while
|
|
in case of incorrect configuration it returns the combination of ERR_* flags
|
|
(ERR_NONE here does not belong to that bit combination because its value is 0).
|
|
|
|
One of the parameters of the function is <char **err> in which an error message
|
|
can be returned, if it exists. In that case the return value of the function
|
|
should have some of the ERR_* flags set.
|
|
|
|
Let's look at an example of the following filter configuration what the function
|
|
call sequence looks like.
|
|
|
|
Filter configuration line:
|
|
filter opentracing [id <id>] config <file>
|
|
|
|
Function call sequence:
|
|
flt_ot_parse(<err>) {
|
|
/* Initialization of the filter configuration data. */
|
|
flt_ot_conf_init() {
|
|
}
|
|
|
|
/* Setting the filter name. */
|
|
flt_ot_parse_keyword(<err>) {
|
|
flt_ot_parse_strdup(<err>) {
|
|
}
|
|
}
|
|
|
|
/* Setting the filter configuration file name. */
|
|
flt_ot_parse_keyword(<err>) {
|
|
flt_ot_parse_strdup(<err>) {
|
|
}
|
|
}
|
|
|
|
/* Checking the configuration of the filter. */
|
|
flt_ot_parse_cfg(<err>) {
|
|
flt_ot_parse_cfg_tracer() {
|
|
}
|
|
...
|
|
flt_ot_post_parse_cfg_tracer() {
|
|
}
|
|
flt_ot_parse_cfg_group() {
|
|
}
|
|
...
|
|
flt_ot_post_parse_cfg_group() {
|
|
}
|
|
flt_ot_parse_cfg_scope() {
|
|
}
|
|
...
|
|
flt_ot_post_parse_cfg_scope() {
|
|
}
|
|
}
|
|
}
|
|
|
|
Checking the filter configuration is actually much more complicated, only the
|
|
name of the main function flt_ot_parse_cfg() that does it is listed here.
|
|
|
|
All functions that use the <err> parameter should set the error status using
|
|
that pointer. All other functions (actually these are all functions called
|
|
by the flt_ot_parse_cfg() function) should set the error message using the
|
|
ha_warning()/ha_alert() HAProxy functions. Of course, the return value (the
|
|
mentioned combination of ERR_* bits) is set in all these functions and it
|
|
indicates whether the filter configuration is correct or not.
|
|
|
|
|
|
src/group.c
|
|
------------------------------------------------------------------------------
|
|
The OT filter allows the use of groups within which one or more 'ot-scope'
|
|
declarations can be found. These groups can be used using several HAProxy
|
|
rules, more precisely 'http-request', 'http-response', 'tcp-request',
|
|
'tcp-response' and 'http-after-response' rules.
|
|
|
|
Configuration example for the specified rules:
|
|
<rule> ot-group <filter-id> <group-name> [ { if | unless } <condition> ]
|
|
|
|
Parsing each of these rules is performed by the flt_ot_group_parse() function.
|
|
After parsing the configuration, its verification is performed via the
|
|
flt_ot_group_check() function. One parsing function and one configuration
|
|
check function are called for each defined rule.
|
|
|
|
flt_ot_group_parse(<err>) {
|
|
}
|
|
...
|
|
flt_ot_group_check() {
|
|
}
|
|
...
|
|
|
|
|
|
When deinitializing the module, the function flt_ot_group_release() is called
|
|
(which is actually an release_ptr callback function from one of the above
|
|
rules). One callback function is called for each defined rule.
|
|
|
|
flt_ot_group_release() {
|
|
}
|
|
...
|
|
|
|
|
|
src/filter.c
|
|
------------------------------------------------------------------------------
|
|
After parsing and checking the configuration, the flt_ot_check() function is
|
|
called which associates the 'ot-group' and 'ot-scope' definitions with their
|
|
declarations. This procedure concludes the configuration of the OT filter and
|
|
after that its initialization is possible.
|
|
|
|
flt_ops.check = flt_ot_check;
|
|
flt_ot_check() {
|
|
}
|
|
|
|
|
|
The initialization of the OT filter is done via the flt_ot_init() callback
|
|
function. In this function the OpenTracing API library is also initialized.
|
|
It is also possible to initialize for each thread individually, but nothing
|
|
is being done here for now.
|
|
|
|
flt_ops.init = flt_ot_init;
|
|
flt_ot_init() {
|
|
flt_ot_cli_init() {
|
|
}
|
|
/* Initialization of the OpenTracing API. */
|
|
ot_init(<err>) {
|
|
}
|
|
}
|
|
|
|
flt_ops.init_per_thread = flt_ot_init_per_thread;
|
|
flt_ot_init_per_thread() {
|
|
}
|
|
...
|
|
|
|
|
|
After the filter instance is created and attached to the stream, the
|
|
flt_ot_attach() function is called. In this function a new OT runtime
|
|
context is created, and flags are set that define which analyzers are used.
|
|
|
|
flt_ops.attach = flt_ot_attach;
|
|
flt_ot_attach() {
|
|
/* In case OT is disabled, nothing is done on this stream further. */
|
|
flt_ot_runtime_context_init(<err>) {
|
|
flt_ot_pool_alloc() {
|
|
}
|
|
/* Initializing and setting the variable 'sess.ot.uuid'. */
|
|
if (flt_ot_var_register(<err>) != -1) {
|
|
flt_ot_var_set(<err>) {
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
|
|
When a stream is started, this function is called. At the moment, nothing
|
|
is being done in it.
|
|
|
|
flt_ops.stream_start = flt_ot_stream_start;
|
|
flt_ot_stream_start() {
|
|
}
|
|
|
|
|
|
Channel analyzers are called when executing individual filter events.
|
|
For each of the four analyzer functions, the events associated with them
|
|
are listed.
|
|
|
|
Events:
|
|
- 1 'on-client-session-start'
|
|
- 15 'on-server-session-start'
|
|
------------------------------------------------------------------------
|
|
flt_ops.channel_start_analyze = flt_ot_channel_start_analyze;
|
|
flt_ot_channel_start_analyze() {
|
|
flt_ot_event_run() {
|
|
/* Run event. */
|
|
flt_ot_scope_run() {
|
|
/* Processing of all ot-scopes defined for the current event. */
|
|
}
|
|
}
|
|
}
|
|
|
|
|
|
Events:
|
|
- 2 'on-frontend-tcp-request'
|
|
- 4 'on-http-body-request'
|
|
- 5 'on-frontend-http-request'
|
|
- 6 'on-switching-rules-request'
|
|
- 7 'on-backend-tcp-request'
|
|
- 8 'on-backend-http-request'
|
|
- 9 'on-process-server-rules-request'
|
|
- 10 'on-http-process-request'
|
|
- 11 'on-tcp-rdp-cookie-request'
|
|
- 12 'on-process-sticking-rules-request
|
|
- 16 'on-tcp-response'
|
|
- 18 'on-process-store-rules-response'
|
|
- 19 'on-http-response'
|
|
------------------------------------------------------------------------
|
|
flt_ops.channel_pre_analyze = flt_ot_channel_pre_analyze;
|
|
flt_ot_channel_pre_analyze() {
|
|
flt_ot_event_run() {
|
|
/* Run event. */
|
|
flt_ot_scope_run() {
|
|
/* Processing of all ot-scopes defined for the current event. */
|
|
}
|
|
}
|
|
}
|
|
|
|
|
|
Events:
|
|
- 3 'on-http-wait-request'
|
|
- 17 'on-http-wait-response'
|
|
------------------------------------------------------------------------
|
|
flt_ops.channel_post_analyze = flt_ot_channel_post_analyze;
|
|
flt_ot_channel_post_analyze() {
|
|
flt_ot_event_run() {
|
|
/* Run event. */
|
|
flt_ot_scope_run() {
|
|
/* Processing of all ot-scopes defined for the current event. */
|
|
}
|
|
}
|
|
}
|
|
|
|
|
|
Events:
|
|
- 13 'on-client-session-end'
|
|
- 14 'on-server-unavailable'
|
|
- 20 'on-server-session-end'
|
|
------------------------------------------------------------------------
|
|
flt_ops.channel_end_analyze = flt_ot_channel_end_analyze;
|
|
flt_ot_channel_end_analyze() {
|
|
flt_ot_event_run() {
|
|
/* Run event. */
|
|
flt_ot_scope_run() {
|
|
/* Processing of all ot-scopes defined for the current event. */
|
|
}
|
|
}
|
|
|
|
/* In case the backend server does not work, event 'on-server-unavailable'
|
|
is called here before event 'on-client-session-end'. */
|
|
if ('on-server-unavailable') {
|
|
flt_ot_event_run() {
|
|
/* Run event. */
|
|
flt_ot_scope_run() {
|
|
/* Processing of all ot-scopes defined for the current event. */
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
|
|
After the stream has stopped, this function is called. At the moment, nothing
|
|
is being done in it.
|
|
|
|
flt_ops.stream_stop = flt_ot_stream_stop;
|
|
flt_ot_stream_stop() {
|
|
}
|
|
|
|
|
|
Then, before the instance filter is detached from the stream, the following
|
|
function is called. It deallocates the runtime context of the OT filter.
|
|
|
|
flt_ops.detach = flt_ot_detach;
|
|
flt_ot_detach() {
|
|
flt_ot_runtime_context_free() {
|
|
flt_ot_pool_free() {
|
|
}
|
|
}
|
|
}
|
|
|
|
|
|
Module deinitialization begins with deinitialization of individual threads
|
|
(as many threads as configured for the HAProxy process). Because nothing
|
|
special is connected to the process threads, nothing is done in this function.
|
|
|
|
flt_ops.deinit_per_thread = flt_ot_deinit_per_thread;
|
|
flt_ot_deinit_per_thread() {
|
|
}
|
|
...
|
|
|
|
|
|
For this function see the above description related to the src/group.c file.
|
|
|
|
flt_ot_group_release() {
|
|
}
|
|
...
|
|
|
|
|
|
Module deinitialization ends with the flt_ot_deinit() function, in which all
|
|
memory occupied by module operation (and OpenTracing API operation, of course)
|
|
is freed.
|
|
|
|
flt_ops.deinit = flt_ot_deinit;
|
|
flt_ot_deinit() {
|
|
ot_close() {
|
|
}
|
|
flt_ot_conf_free() {
|
|
}
|
|
}
|