12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788 |
- /*
- Copyright 2015 The Kubernetes Authors.
- Licensed under the Apache License, Version 2.0 (the "License");
- you may not use this file except in compliance with the License.
- You may obtain a copy of the License at
- http://www.apache.org/licenses/LICENSE-2.0
- Unless required by applicable law or agreed to in writing, software
- distributed under the License is distributed on an "AS IS" BASIS,
- WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
- See the License for the specific language governing permissions and
- limitations under the License.
- */
- package transport
- import (
- "fmt"
- "net"
- "net/http"
- "sync"
- "time"
- utilnet "k8s.io/apimachinery/pkg/util/net"
- )
- // TlsTransportCache caches TLS http.RoundTrippers different configurations. The
- // same RoundTripper will be returned for configs with identical TLS options If
- // the config has no custom TLS options, http.DefaultTransport is returned.
- type tlsTransportCache struct {
- mu sync.Mutex
- transports map[string]*http.Transport
- }
- const idleConnsPerHost = 25
- var tlsCache = &tlsTransportCache{transports: make(map[string]*http.Transport)}
- func (c *tlsTransportCache) get(config *Config) (http.RoundTripper, error) {
- key, err := tlsConfigKey(config)
- if err != nil {
- return nil, err
- }
- // Ensure we only create a single transport for the given TLS options
- c.mu.Lock()
- defer c.mu.Unlock()
- // See if we already have a custom transport for this config
- if t, ok := c.transports[key]; ok {
- return t, nil
- }
- // Get the TLS options for this client config
- tlsConfig, err := TLSConfigFor(config)
- if err != nil {
- return nil, err
- }
- // The options didn't require a custom TLS config
- if tlsConfig == nil {
- return http.DefaultTransport, nil
- }
- // Cache a single transport for these options
- c.transports[key] = utilnet.SetTransportDefaults(&http.Transport{
- Proxy: http.ProxyFromEnvironment,
- TLSHandshakeTimeout: 10 * time.Second,
- TLSClientConfig: tlsConfig,
- MaxIdleConnsPerHost: idleConnsPerHost,
- Dial: (&net.Dialer{
- Timeout: 30 * time.Second,
- KeepAlive: 30 * time.Second,
- }).Dial,
- })
- return c.transports[key], nil
- }
- // tlsConfigKey returns a unique key for tls.Config objects returned from TLSConfigFor
- func tlsConfigKey(c *Config) (string, error) {
- // Make sure ca/key/cert content is loaded
- if err := loadTLSFiles(c); err != nil {
- return "", err
- }
- // Only include the things that actually affect the tls.Config
- return fmt.Sprintf("%v/%x/%x/%x", c.TLS.Insecure, c.TLS.CAData, c.TLS.CertData, c.TLS.KeyData), nil
- }
|