You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
kratos/pkg/net/http/blademaster/metadata.go

137 lines
3.7 KiB

package blademaster
import (
"fmt"
"net/http"
"strconv"
"strings"
"time"
"github.com/bilibili/kratos/pkg/conf/env"
"github.com/bilibili/kratos/pkg/log"
criticalityPkg "github.com/bilibili/kratos/pkg/net/criticality"
"github.com/bilibili/kratos/pkg/net/metadata"
"github.com/pkg/errors"
)
const (
// http head
_httpHeaderUser = "x1-bmspy-user"
_httpHeaderColor = "x1-bmspy-color"
_httpHeaderTimeout = "x1-bmspy-timeout"
_httpHeaderMirror = "x1-bmspy-mirror"
_httpHeaderRemoteIP = "x-backend-bm-real-ip"
_httpHeaderRemoteIPPort = "x-backend-bm-real-ipport"
_httpHeaderCriticality = "x-backend-bili-criticality"
)
const (
_httpHeaderMetadata = "x-bili-metadata-"
)
var _outgoingHeader = map[string]string{
metadata.Color: _httpHeaderColor,
metadata.Criticality: _httpHeaderCriticality,
metadata.Mirror: _httpHeaderMirror,
}
func setMetadata(req *http.Request, key string, value interface{}) {
strV, ok := value.(string)
if !ok {
return
}
header := fmt.Sprintf("%s%s", _httpHeaderMetadata, strings.ReplaceAll(key, "_", "-"))
req.Header.Set(header, strV)
}
// mirror return true if x-bmspy-mirror in http header and its value is 1 or true.
func mirror(req *http.Request) bool {
mirrorStr := req.Header.Get(_httpHeaderMirror)
if mirrorStr == "" {
return false
}
val, err := strconv.ParseBool(mirrorStr)
if err != nil {
log.Warn("blademaster: failed to parse mirror: %+v", errors.Wrap(err, mirrorStr))
return false
}
if !val {
log.Warn("blademaster: request mirrorStr value :%s is false", mirrorStr)
}
return val
}
// setCaller set caller into http request.
func setCaller(req *http.Request) {
req.Header.Set(_httpHeaderUser, env.AppID)
}
// caller get caller from http request.
func caller(req *http.Request) string {
return req.Header.Get(_httpHeaderUser)
}
// setColor set color into http request.
func setColor(req *http.Request, color string) {
req.Header.Set(_httpHeaderColor, color)
}
// color get color from http request.
func color(req *http.Request) string {
c := req.Header.Get(_httpHeaderColor)
if c == "" {
c = env.Color
}
return c
}
// setTimeout set timeout into http request.
func setTimeout(req *http.Request, timeout time.Duration) {
td := int64(timeout / time.Millisecond)
req.Header.Set(_httpHeaderTimeout, strconv.FormatInt(td, 10))
}
// timeout get timeout from http request.
func timeout(req *http.Request) time.Duration {
to := req.Header.Get(_httpHeaderTimeout)
timeout, err := strconv.ParseInt(to, 10, 64)
if err == nil && timeout > 20 {
timeout -= 20 // reduce 20ms every time.
}
return time.Duration(timeout) * time.Millisecond
}
// criticality get criticality from http request.
func criticality(req *http.Request) criticalityPkg.Criticality {
raw := req.Header.Get(_httpHeaderCriticality)
return criticalityPkg.Parse(raw)
}
// remoteIP implements a best effort algorithm to return the real client IP, it parses
// x-backend-bm-real-ip or X-Real-IP or X-Forwarded-For in order to work properly with reverse-proxies such us: nginx or haproxy.
// Use X-Forwarded-For before X-Real-Ip as nginx uses X-Real-Ip with the proxy's IP.
func remoteIP(req *http.Request) (remote string) {
if remote = req.Header.Get(_httpHeaderRemoteIP); remote != "" && remote != "null" {
return
}
var xff = req.Header.Get("X-Forwarded-For")
if idx := strings.IndexByte(xff, ','); idx > -1 {
if remote = strings.TrimSpace(xff[:idx]); remote != "" {
return
}
}
if remote = req.Header.Get("X-Real-IP"); remote != "" {
return
}
remote = req.RemoteAddr[:strings.Index(req.RemoteAddr, ":")]
return
}
func remotePort(req *http.Request) (port string) {
if port = req.Header.Get(_httpHeaderRemoteIPPort); port != "" && port != "null" {
return
}
return
}