mirror of
				https://gitea.com/Lydanne/buildx.git
				synced 2025-11-04 10:03:42 +08:00 
			
		
		
		
	
		
			
				
	
	
		
			136 lines
		
	
	
		
			4.1 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			136 lines
		
	
	
		
			4.1 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
package session
 | 
						|
 | 
						|
import (
 | 
						|
	"context"
 | 
						|
	"math"
 | 
						|
	"net"
 | 
						|
	"sync/atomic"
 | 
						|
	"time"
 | 
						|
 | 
						|
	grpc_middleware "github.com/grpc-ecosystem/go-grpc-middleware"
 | 
						|
	"github.com/moby/buildkit/util/bklog"
 | 
						|
	"github.com/moby/buildkit/util/grpcerrors"
 | 
						|
	"github.com/pkg/errors"
 | 
						|
	"github.com/sirupsen/logrus"
 | 
						|
	"go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc"
 | 
						|
	"go.opentelemetry.io/otel/trace"
 | 
						|
	"golang.org/x/net/http2"
 | 
						|
	"google.golang.org/grpc"
 | 
						|
	"google.golang.org/grpc/credentials/insecure"
 | 
						|
	"google.golang.org/grpc/health/grpc_health_v1"
 | 
						|
)
 | 
						|
 | 
						|
func serve(ctx context.Context, grpcServer *grpc.Server, conn net.Conn) {
 | 
						|
	go func() {
 | 
						|
		<-ctx.Done()
 | 
						|
		conn.Close()
 | 
						|
	}()
 | 
						|
	bklog.G(ctx).Debugf("serving grpc connection")
 | 
						|
	(&http2.Server{}).ServeConn(conn, &http2.ServeConnOpts{Handler: grpcServer})
 | 
						|
}
 | 
						|
 | 
						|
func grpcClientConn(ctx context.Context, conn net.Conn) (context.Context, *grpc.ClientConn, error) {
 | 
						|
	var unary []grpc.UnaryClientInterceptor
 | 
						|
	var stream []grpc.StreamClientInterceptor
 | 
						|
 | 
						|
	var dialCount int64
 | 
						|
	dialer := grpc.WithContextDialer(func(ctx context.Context, addr string) (net.Conn, error) {
 | 
						|
		if c := atomic.AddInt64(&dialCount, 1); c > 1 {
 | 
						|
			return nil, errors.Errorf("only one connection allowed")
 | 
						|
		}
 | 
						|
		return conn, nil
 | 
						|
	})
 | 
						|
 | 
						|
	dialOpts := []grpc.DialOption{
 | 
						|
		dialer,
 | 
						|
		grpc.WithTransportCredentials(insecure.NewCredentials()),
 | 
						|
	}
 | 
						|
 | 
						|
	if span := trace.SpanFromContext(ctx); span.SpanContext().IsValid() {
 | 
						|
		unary = append(unary, filterClient(otelgrpc.UnaryClientInterceptor(otelgrpc.WithTracerProvider(span.TracerProvider()), otelgrpc.WithPropagators(propagators))))
 | 
						|
		stream = append(stream, otelgrpc.StreamClientInterceptor(otelgrpc.WithTracerProvider(span.TracerProvider()), otelgrpc.WithPropagators(propagators)))
 | 
						|
	}
 | 
						|
 | 
						|
	unary = append(unary, grpcerrors.UnaryClientInterceptor)
 | 
						|
	stream = append(stream, grpcerrors.StreamClientInterceptor)
 | 
						|
 | 
						|
	if len(unary) == 1 {
 | 
						|
		dialOpts = append(dialOpts, grpc.WithUnaryInterceptor(unary[0]))
 | 
						|
	} else if len(unary) > 1 {
 | 
						|
		dialOpts = append(dialOpts, grpc.WithUnaryInterceptor(grpc_middleware.ChainUnaryClient(unary...)))
 | 
						|
	}
 | 
						|
 | 
						|
	if len(stream) == 1 {
 | 
						|
		dialOpts = append(dialOpts, grpc.WithStreamInterceptor(stream[0]))
 | 
						|
	} else if len(stream) > 1 {
 | 
						|
		dialOpts = append(dialOpts, grpc.WithStreamInterceptor(grpc_middleware.ChainStreamClient(stream...)))
 | 
						|
	}
 | 
						|
 | 
						|
	cc, err := grpc.DialContext(ctx, "localhost", dialOpts...)
 | 
						|
	if err != nil {
 | 
						|
		return nil, nil, errors.Wrap(err, "failed to create grpc client")
 | 
						|
	}
 | 
						|
 | 
						|
	ctx, cancel := context.WithCancel(ctx)
 | 
						|
	go monitorHealth(ctx, cc, cancel)
 | 
						|
 | 
						|
	return ctx, cc, nil
 | 
						|
}
 | 
						|
 | 
						|
func monitorHealth(ctx context.Context, cc *grpc.ClientConn, cancelConn func()) {
 | 
						|
	defer cancelConn()
 | 
						|
	defer cc.Close()
 | 
						|
 | 
						|
	ticker := time.NewTicker(5 * time.Second)
 | 
						|
	defer ticker.Stop()
 | 
						|
	healthClient := grpc_health_v1.NewHealthClient(cc)
 | 
						|
 | 
						|
	failedBefore := false
 | 
						|
	consecutiveSuccessful := 0
 | 
						|
	defaultHealthcheckDuration := 30 * time.Second
 | 
						|
	lastHealthcheckDuration := time.Duration(0)
 | 
						|
 | 
						|
	for {
 | 
						|
		select {
 | 
						|
		case <-ctx.Done():
 | 
						|
			return
 | 
						|
		case <-ticker.C:
 | 
						|
			// This healthcheck can erroneously fail in some instances, such as receiving lots of data in a low-bandwidth scenario or too many concurrent builds.
 | 
						|
			// So, this healthcheck is purposely long, and can tolerate some failures on purpose.
 | 
						|
 | 
						|
			healthcheckStart := time.Now()
 | 
						|
 | 
						|
			timeout := time.Duration(math.Max(float64(defaultHealthcheckDuration), float64(lastHealthcheckDuration)*1.5))
 | 
						|
			ctx, cancel := context.WithTimeout(ctx, timeout)
 | 
						|
			_, err := healthClient.Check(ctx, &grpc_health_v1.HealthCheckRequest{})
 | 
						|
			cancel()
 | 
						|
 | 
						|
			lastHealthcheckDuration = time.Since(healthcheckStart)
 | 
						|
			logFields := logrus.Fields{
 | 
						|
				"timeout":        timeout,
 | 
						|
				"actualDuration": lastHealthcheckDuration,
 | 
						|
			}
 | 
						|
 | 
						|
			if err != nil {
 | 
						|
				if failedBefore {
 | 
						|
					bklog.G(ctx).Error("healthcheck failed fatally")
 | 
						|
					return
 | 
						|
				}
 | 
						|
 | 
						|
				failedBefore = true
 | 
						|
				consecutiveSuccessful = 0
 | 
						|
				bklog.G(ctx).WithFields(logFields).Warn("healthcheck failed")
 | 
						|
			} else {
 | 
						|
				consecutiveSuccessful++
 | 
						|
 | 
						|
				if consecutiveSuccessful >= 5 && failedBefore {
 | 
						|
					failedBefore = false
 | 
						|
					bklog.G(ctx).WithFields(logFields).Debug("reset healthcheck failure")
 | 
						|
				}
 | 
						|
			}
 | 
						|
 | 
						|
			bklog.G(ctx).WithFields(logFields).Debug("healthcheck completed")
 | 
						|
		}
 | 
						|
	}
 | 
						|
}
 |