lib/go-atscfg/remapdotconfig.go (903 lines of code) (raw):
package atscfg
/*
* Licensed to the Apache Software Foundation (ASF) under one
* or more contributor license agreements. See the NOTICE file
* distributed with this work for additional information
* regarding copyright ownership. The ASF licenses this file
* to you under the Apache License, Version 2.0 (the
* "License"); you may not use this file except in compliance
* with the License. You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing,
* software distributed under the License is distributed on an
* "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
* KIND, either express or implied. See the License for the
* specific language governing permissions and limitations
* under the License.
*/
import (
"bytes"
"errors"
"path/filepath"
"sort"
"strconv"
"strings"
"github.com/apache/trafficcontrol/v8/lib/go-log"
"github.com/apache/trafficcontrol/v8/lib/go-tc"
"github.com/apache/trafficcontrol/v8/lib/go-util"
"github.com/cbroglie/mustache"
)
// RemapConfigDropQstringConfigFile is the configuration file for the
// `drop_qstring` plugin used in remap.config files.
const RemapConfigDropQstringConfigFile = `drop_qstring.config`
// ContentTypeRemapDotConfig is the MIME type of the contents of a remap.config
// ATS configuration file.
const ContentTypeRemapDotConfig = ContentTypeTextASCII
// LineCommentRemapDotConfig is the string used to signal the beginning of a
// line comment in the grammar of a remap.config ATS configuration file.
const LineCommentRemapDotConfig = LineCommentHash
// RemapConfigRangeDirective is a special string which, if found in a Delivery
// Service's Raw Remap Text, will be replaced by t3c during configuration
// generation with the parts of a remap.config file line that are necessary to
// implement said Delivery Service's declared Range Request Handling.
const RemapConfigRangeDirective = `__RANGE_DIRECTIVE__`
// RemapConfigCachekeyDirective is a special string which, if found in a
// Delivery Service's Raw Remap Text, will be replaced by t3c during
// configuration generation with the parts of a remap.config file line that call
// the 'cachekey.so' ATS plugin.
const RemapConfigCachekeyDirective = `__CACHEKEY_DIRECTIVE__`
// RemapConfigRegexRemapDirective is a special string which, if found in a
// Delivery Service's Raw Remap Text, will be replaced by t3c during
// configuration generation with the parts of a remap.config file line that call
// the 'regex_remap.so' ATS plugin.
const RemapConfigRegexRemapDirective = `__REGEX_REMAP_DIRECTIVE__`
const RemapConfigTemplateFirst = `template.first`
const RemapConfigTemplateInner = `template.inner`
const RemapConfigTemplateLast = `template.last`
const DefaultFirstRemapConfigTemplateString = `map {{{Source}}} {{{Destination}}} {{{Strategy}}} {{{Dscp}}} {{{HeaderRewrite}}} {{{DropQstring}}} {{{Signing}}} {{{RegexRemap}}} {{{Cachekey}}} {{{RangeRequests}}} {{{Pacing}}} {{{RawText}}}`
const DefaultLastRemapConfigTemplateString = `map {{{Source}}} {{{Destination}}} {{{Strategy}}} {{{HeaderRewrite}}} {{{Cachekey}}} {{{RangeRequests}}} {{{RawText}}}`
const DefaultInnerRemapConfigTemplateString = DefaultLastRemapConfigTemplateString
const selfHealParam = `no_self_healing`
type LineTemplates map[string]*mustache.Template
var RemapLineTemplates = LineTemplates{}
// This parses but also maintains a cache of parsed templates
func (lts *LineTemplates) parse(templateString string) (*mustache.Template, error) {
if tmpl, ok := RemapLineTemplates[templateString]; ok {
return tmpl, nil
}
tmpl, err := mustache.ParseString(templateString)
if err != nil {
RemapLineTemplates[templateString] = tmpl
tmpl = nil
}
return tmpl, err
}
// RemapTags contains the mustache template fillers.
type RemapTags struct {
Source string
Destination string
Strategy string
Dscp string
HeaderRewrite string
DropQstring string
Signing string
RegexRemap string
Cachekey string
Pacing string
RangeRequests string
RawText string
}
func (rs *RemapTags) AnyMidOptionsSet() bool {
return rs.Strategy != "" ||
rs.HeaderRewrite != "" ||
rs.Cachekey != "" ||
rs.RangeRequests != ""
}
// RemapDotConfigOpts contains settings to configure generation options.
type RemapDotConfigOpts struct {
// VerboseComments is whether to add informative comments to the generated file, about what was generated and why.
// Note this does not include the header comment, which is configured separately with HdrComment.
// These comments are human-readable and not guaranteed to be consistent between versions. Automating anything based on them is strongly discouraged.
VerboseComments bool
// HdrComment is the header comment to include at the beginning of the file.
// This should be the text desired, without comment syntax (like # or //). The file's comment syntax will be added.
// To omit the header comment, pass the empty string.
HdrComment string
// UseStrategies is whether to use strategies.yaml rather than parent.config.
UseStrategies bool
// UseCoreStrategies is whether to use the ATS core strategies, rather than the parent_select plugin.
// This has no effect if UseStrategies is false.
UseStrategiesCore bool
// ATSMajorVersion is the integral major version of Apache Traffic server,
// used to generate the proper config for the proper version.
//
// If omitted or 0, the major version will be read from the Server's Profile Parameter config file 'package' name 'trafficserver'. If no such Parameter exists, the ATS version will default to 5.
// This was the old Traffic Control behavior, before the version was specifiable externally.
//
ATSMajorVersion uint
}
// MakeRemapDotConfig constructs a remap.config ATS configuration file.
func MakeRemapDotConfig(
server *Server,
servers []Server,
unfilteredDSes []DeliveryService,
dss []DeliveryServiceServer,
dsRegexArr []tc.DeliveryServiceRegexes,
serverParams []tc.ParameterV5,
cdn *tc.CDNV5,
remapConfigParams []tc.ParameterV5, // includes cachekey.config
topologies []tc.TopologyV5,
cacheGroupArr []tc.CacheGroupNullableV5,
serverCapabilities map[int]map[ServerCapability]struct{},
dsRequiredCapabilities map[int]map[ServerCapability]struct{},
configDir string,
opt *RemapDotConfigOpts,
) (Cfg, error) {
if opt == nil {
opt = &RemapDotConfigOpts{}
}
warnings := []string{}
if !opt.UseStrategies && opt.UseStrategiesCore {
warnings = append(warnings, "opt.UseStrategies was false, but opt.UseStrategiesCore was set, which has no effect! Not using strategies, per opt.UseStrategies.")
}
if server.HostName == "" {
return Cfg{}, makeErr(warnings, "server HostName missing")
} else if server.ID == 0 {
return Cfg{}, makeErr(warnings, "server ID missing")
} else if server.CacheGroup == "" {
return Cfg{}, makeErr(warnings, "server Cachegroup missing")
} else if server.DomainName == "" {
return Cfg{}, makeErr(warnings, "server DomainName missing")
}
cdnDomain := cdn.DomainName
dsRegexes := MakeDSRegexMap(dsRegexArr)
// Returned DSes are guaranteed to have a non-nil XMLID, Type, DSCP, ID, and Active.
dses, dsWarns := remapFilterDSes(server, dss, unfilteredDSes)
warnings = append(warnings, dsWarns...)
dsProfilesConfigParams, paramWarns, err := makeDSProfilesConfigParams(server, dses, remapConfigParams)
warnings = append(warnings, paramWarns...)
if err != nil {
warnings = append(warnings, "making Delivery Service Cache Key Params, cache key will be missing! : "+err.Error())
}
atsMajorVersion := getATSMajorVersion(opt.ATSMajorVersion, serverParams, &warnings)
serverPackageParamData, paramWarns := makeServerPackageParamData(server, serverParams)
warnings = append(warnings, paramWarns...)
cacheGroups, err := makeCGMap(cacheGroupArr)
if err != nil {
return Cfg{}, makeErr(warnings, "making remap.config, config will be malformed! : "+err.Error())
}
nameTopologies := makeTopologyNameMap(topologies)
anyCastPartners := GetAnyCastPartners(server, servers)
hdr := makeHdrComment(opt.HdrComment)
txt := ""
typeWarns := []string{}
if tc.CacheTypeFromString(server.Type) == tc.CacheTypeMid {
txt, typeWarns, err = getServerConfigRemapDotConfigForMid(atsMajorVersion, dsProfilesConfigParams, dses, dsRegexes, hdr, server, nameTopologies, cacheGroups, serverCapabilities, dsRequiredCapabilities, configDir, opt)
} else {
txt, typeWarns, err = getServerConfigRemapDotConfigForEdge(dsProfilesConfigParams, serverPackageParamData, dses, dsRegexes, atsMajorVersion, hdr, server, anyCastPartners, nameTopologies, cacheGroups, serverCapabilities, dsRequiredCapabilities, cdnDomain, configDir, opt)
}
warnings = append(warnings, typeWarns...)
if err != nil {
return Cfg{}, makeErr(warnings, err.Error()) // the GetFor funcs include error context
}
return Cfg{
Text: txt,
ContentType: ContentTypeRemapDotConfig,
LineComment: LineCommentRemapDotConfig,
Warnings: warnings,
}, nil
}
// This sticks the DS parameters in a map.
// remap.config parameters use "<plugin>.pparam" key
// cachekey.config parameters retain the 'cachekey.config' key.
func classifyConfigParams(configParams []tc.ParameterV5) (map[string][]tc.ParameterV5, bool) {
configParamMap := map[string][]tc.ParameterV5{}
selfHeal := true
for _, param := range configParams {
key := param.ConfigFile
if "remap.config" == key {
key = param.Name
if param.Value == selfHealParam {
selfHeal = false
continue
}
}
configParamMap[key] = append(configParamMap[key], param)
}
return configParamMap, selfHeal
}
// For general <plugin>.pparam parameters.
func paramsStringFor(parameters []tc.ParameterV5, warnings *[]string) (paramsString string) {
uniquemap := map[string]int{}
for _, param := range parameters {
if strings.TrimSpace(param.Value) == "" {
continue
}
paramsString += " @pparam=" + param.Value
// Try to extract argument
index := strings.IndexAny(param.Value, "= ")
arg := ""
if 0 < index {
arg = param.Value[:index]
} else {
arg = param.Value
}
// Warn on detection, but don't correct
if _, exists := uniquemap[arg]; !exists {
uniquemap[arg] = 1
} else {
*warnings = append(*warnings, "Multiple repeated arguments '"+arg+"'")
}
}
return
}
// for parameters that use 'cachekey.config' as their key.
func paramsStringOldFor(parameters []tc.ParameterV5, warnings *[]string) (paramsString string) {
// check for duplicate parameters
uniquemap := map[string]int{}
paramKeyVals := []keyVal{}
for _, param := range parameters {
key := param.Name
val := param.Value
if _, exists := uniquemap[key]; !exists {
uniquemap[key] = 1
paramKeyVals = append(paramKeyVals, keyVal{Key: key, Val: val})
} else {
uniquemap[key]++
*warnings = append(*warnings, "got multiple parameters for name '"+key+"' - ignoring '"+val+"'")
}
}
sort.Sort(keyVals(paramKeyVals))
for _, keyVal := range paramKeyVals {
paramsString += " @pparam=--" + keyVal.Key + "=" + keyVal.Val
}
return
}
// Handles special case for cachekey.
func cachekeyArgsFor(configParamsMap map[string][]tc.ParameterV5, warnings *[]string) (argsString string) {
hasCachekey := false
if params, ok := configParamsMap["cachekey.pparam"]; ok {
argsString += paramsStringFor(params, warnings)
hasCachekey = true
}
// Add on the cachekey.config
if params, ok := configParamsMap["cachekey.config"]; ok {
if hasCachekey {
*warnings = append(*warnings, "Both new cachekey.pparam and old cachekey.config parameters assigned")
}
argsString += paramsStringOldFor(params, warnings)
}
return
}
// lastPrePostRemapLinesFor Returns any pre or post raw remap lines.
func lastPrePostRemapLinesFor(dsConfigParamsMap map[string][]tc.ParameterV5, dsid string) ([]string, []string) {
preRemapLines := []string{}
postRemapLines := []string{}
// Any raw pre pend
if params, ok := dsConfigParamsMap["LastRawRemapPre"]; ok {
for _, param := range params {
preRemapLines = append(preRemapLines, param.Value+" # Raw: "+dsid+"\n")
}
}
// Any raw post pend
if params, ok := dsConfigParamsMap["LastRawRemapPost"]; ok {
for _, param := range params {
postRemapLines = append(postRemapLines, param.Value+" # Raw: "+dsid+"\n")
}
}
return preRemapLines, postRemapLines
}
// getServerConfigRemapDotConfigForMid returns the remap lines, any warnings, and any error.
func getServerConfigRemapDotConfigForMid(
atsMajorVersion uint,
profilesConfigParams map[int][]tc.ParameterV5,
dses []DeliveryService,
dsRegexes map[tc.DeliveryServiceName][]tc.DeliveryServiceRegex,
header string,
server *Server,
nameTopologies map[TopologyName]tc.TopologyV5,
cacheGroups map[tc.CacheGroupName]tc.CacheGroupNullableV5,
serverCapabilities map[int]map[ServerCapability]struct{},
dsRequiredCapabilities map[int]map[ServerCapability]struct{},
configDir string,
opts *RemapDotConfigOpts,
) (string, []string, error) {
warnings := []string{}
midRemaps := map[string]string{}
preRemapLines := []string{}
postRemapLines := []string{}
for _, ds := range dses {
if !hasRequiredCapabilities(serverCapabilities[server.ID], dsRequiredCapabilities[*ds.ID]) {
continue
}
topology, hasTopology := nameTopologies[TopologyName(*ds.Topology)]
if *ds.Topology != "" && hasTopology {
topoIncludesServer, err := topologyIncludesServerNullable(topology, server)
if err != nil {
return "", warnings, errors.New("getting Topology Server inclusion: " + err.Error())
}
if !topoIncludesServer {
continue
}
}
if ds.Type != nil && !tc.DSType(*ds.Type).UsesMidCache() && (!hasTopology || *ds.Topology == "") {
continue // Live local delivery services skip mids (except Topologies ignore DS types)
}
if ds.OrgServerFQDN == nil || *ds.OrgServerFQDN == "" {
warnings = append(warnings, "ds '"+ds.XMLID+"' has no origin fqdn, skipping!") // TODO confirm - Perl uses without checking!
continue
}
remapFrom := strings.Replace(*ds.OrgServerFQDN, `https://`, `http://`, -1)
if midRemaps[remapFrom] != "" {
continue // skip remap rules from extra HOST_REGEXP entries
}
//remapTags := NewRemapTags()
remapTags := RemapTags{}
// template fill for moustache
remapTags.Source = remapFrom
strategy := strategyDirective(getStrategyName(ds.XMLID), configDir, opts)
if strategy != "" {
remapTags.Strategy = strategy
}
if *ds.Topology != "" {
topoTxt, err := makeDSTopologyHeaderRewriteTxt(ds, tc.CacheGroupName(server.CacheGroup), topology, cacheGroups)
if err != nil {
return "", warnings, err
}
remapTags.HeaderRewrite = topoTxt
} else if (ds.MidHeaderRewrite != nil && *ds.MidHeaderRewrite != "") || (ds.MaxOriginConnections != nil && *ds.MaxOriginConnections > 0) || (ds.ServiceCategory != nil && *ds.ServiceCategory != "") {
remapTags.HeaderRewrite = `@plugin=header_rewrite.so @pparam=` + midHeaderRewriteConfigFileName(ds.XMLID)
}
// Logic for handling cachekey params
cachekeyArgs := ``
// qstring ignore
if ds.QStringIgnore != nil && *ds.QStringIgnore == tc.QueryStringIgnoreIgnoreInCacheKeyAndPassUp {
cachekeyArgs = getQStringIgnoreRemap(atsMajorVersion)
}
selfHeal := true
dsConfigParamsMap := map[string][]tc.ParameterV5{}
if nil != ds.ProfileID {
dsConfigParamsMap, selfHeal = classifyConfigParams(profilesConfigParams[*ds.ProfileID])
}
if len(dsConfigParamsMap) > 0 {
cachekeyArgs += cachekeyArgsFor(dsConfigParamsMap, &warnings)
}
if cachekeyArgs != "" {
remapTags.Cachekey = `@plugin=cachekey.so` + cachekeyArgs
}
if ds.RangeRequestHandling != nil && (*ds.RangeRequestHandling == tc.RangeRequestHandlingCacheRangeRequest || *ds.RangeRequestHandling == tc.RangeRequestHandlingSlice) {
crrParam := paramsStringFor(dsConfigParamsMap["cache_range_requests.pparam"], &warnings)
remapTags.RangeRequests = `@plugin=cache_range_requests.so` + crrParam
if *ds.RangeRequestHandling == tc.RangeRequestHandlingSlice && !strings.Contains(crrParam, "--consider-ims") && selfHeal {
remapTags.RangeRequests += ` @pparam=--consider-ims`
}
}
isLastCache, err := serverIsLastCacheForDS(server, &ds, nameTopologies, cacheGroups)
if err != nil {
return "", warnings, errors.New("determining if cache is the last tier: " + err.Error())
}
mapTo := *ds.OrgServerFQDN
// if this remap is going to a parent, use http not https.
// cache-to-cache communication inside the CDN is always http (though that's likely to change in the future)
if !isLastCache {
mapTo = strings.Replace(mapTo, `https://`, `http://`, -1)
}
remapTags.Destination = mapTo
// look for override template
defaultParamName := RemapConfigTemplateLast
if !isLastCache {
defaultParamName = RemapConfigTemplateInner
}
tmplparams, tmplok := dsConfigParamsMap[defaultParamName]
// check for fallthrough condition or override template
if remapTags.AnyMidOptionsSet() || tmplok {
// Check for ds parameter template override
var template *mustache.Template
if tmplok {
if 0 < len(tmplparams) {
templateString := tmplparams[0].Value
template, err = RemapLineTemplates.parse(templateString)
if err != nil {
warnings = append(warnings, "Error decoding override "+defaultParamName+" "+templateString+" for DS "+ds.XMLID+", falling back!")
}
}
}
// fall back to default remap config line template
if template == nil {
templateString := DefaultLastRemapConfigTemplateString
if !isLastCache {
templateString = DefaultInnerRemapConfigTemplateString
}
template, err = RemapLineTemplates.parse(templateString)
if err != nil {
return "", warnings, errors.New("unable to load default template string: " + templateString + " " + err.Error())
}
}
// Expand the moustache
var linebuf bytes.Buffer
err := template.FRender(&linebuf, remapTags)
if err != nil {
return "", warnings, errors.New("Error filling mustache template: " + err.Error())
}
//midRemaps[remapFrom] = removeDeleteMes(linebuf.String())
midRemaps[remapFrom] = linebuf.String()
}
// Any raw pre or post pend
dsPreRemaps, dsPostRemaps := lastPrePostRemapLinesFor(dsConfigParamsMap, ds.XMLID)
// Add to pre/post remap lines if this is last tier
if len(dsPreRemaps) > 0 || len(dsPostRemaps) > 0 {
if isLastCache {
preRemapLines = append(preRemapLines, dsPreRemaps...)
postRemapLines = append(postRemapLines, dsPostRemaps...)
}
}
}
textLines := []string{}
for _, remapLine := range midRemaps {
textLines = append(textLines, remapLine+"\n")
}
sort.Strings(preRemapLines)
sort.Strings(textLines)
sort.Strings(postRemapLines)
// Prepend any pre remap lines
remapLinesAll := append(preRemapLines, textLines...)
// Append on any post raw remap lines
remapLinesAll = append(remapLinesAll, postRemapLines...)
text := header + strings.Join(remapLinesAll, "")
return text, warnings, nil
}
// getServerConfigRemapDotConfigForEdge returns the remap lines, any warnings, and any error.
func getServerConfigRemapDotConfigForEdge(
profilesRemapConfigParams map[int][]tc.ParameterV5,
serverPackageParamData map[string]string, // map[paramName]paramVal for this server, config file 'package'
dses []DeliveryService,
dsRegexes map[tc.DeliveryServiceName][]tc.DeliveryServiceRegex,
atsMajorVersion uint,
header string,
server *Server,
anyCastPartners map[string][]string,
nameTopologies map[TopologyName]tc.TopologyV5,
cacheGroups map[tc.CacheGroupName]tc.CacheGroupNullableV5,
serverCapabilities map[int]map[ServerCapability]struct{},
dsRequiredCapabilities map[int]map[ServerCapability]struct{},
cdnDomain string,
configDir string,
opts *RemapDotConfigOpts,
) (string, []string, error) {
warnings := []string{}
textLines := []string{}
preRemapLines := []string{}
postRemapLines := []string{}
for _, ds := range dses {
if !hasRequiredCapabilities(serverCapabilities[server.ID], dsRequiredCapabilities[*ds.ID]) {
continue
}
topology, hasTopology := nameTopologies[TopologyName(*ds.Topology)]
if *ds.Topology != "" && hasTopology {
topoIncludesServer, err := topologyIncludesServerNullable(topology, server)
if err != nil {
return "", warnings, errors.New("getting topology server inclusion: " + err.Error())
}
if !topoIncludesServer {
continue
}
}
remapText := ""
if tc.DSType(*ds.Type) == tc.DSTypeAnyMap {
if ds.RemapText == nil {
warnings = append(warnings, "ds '"+ds.XMLID+"' is ANY_MAP, but has no remap text - skipping")
continue
}
remapText = *ds.RemapText + "\n"
textLines = append(textLines, remapText)
continue
}
requestFQDNs, err := GetDSRequestFQDNs(&ds, dsRegexes[tc.DeliveryServiceName(ds.XMLID)], server, anyCastPartners, cdnDomain)
if err != nil {
warnings = append(warnings, "error getting ds '"+ds.XMLID+"' request fqdns, skipping! Error: "+err.Error())
continue
}
for _, requestFQDN := range requestFQDNs {
remapLines, err := makeEdgeDSDataRemapLines(ds, requestFQDN, server, cdnDomain)
if err != nil {
warnings = append(warnings, "DS '"+ds.XMLID+"' - skipping! : "+err.Error())
continue
}
for _, line := range remapLines {
profileremapConfigParams := []tc.ParameterV5{}
if ds.ProfileID != nil {
profileremapConfigParams = profilesRemapConfigParams[*ds.ProfileID]
}
dsLines, remapWarns, err := buildEdgeRemapLine(atsMajorVersion, server, serverPackageParamData, remapText, ds, line.From, line.To, profileremapConfigParams, cacheGroups, nameTopologies, configDir, opts)
warnings = append(warnings, remapWarns...)
remapText += dsLines.Text
// Add to pre/post remap lines if this is last tier
if len(dsLines.Pre) > 0 || len(dsLines.Post) > 0 {
preRemapLines = append(preRemapLines, dsLines.Pre...)
postRemapLines = append(postRemapLines, dsLines.Post...)
}
if err != nil {
return "", warnings, err
}
remapText += ` # ds '` + ds.XMLID + `' topology '`
if hasTopology {
remapText += topology.Name
}
remapText += `'` + "\n"
}
}
textLines = append(textLines, remapText)
}
sort.Strings(preRemapLines)
sort.Strings(textLines)
sort.Strings(postRemapLines)
remapLinesAll := append(preRemapLines, textLines...)
remapLinesAll = append(remapLinesAll, postRemapLines...)
text := header
text += strings.Join(remapLinesAll, "")
return text, warnings, nil
}
// RemapLines represents the contents of a remap.config Apache Traffic Server
// configuration file for a given Delivery Service.
type RemapLines struct {
// Pre contains lines to appear before the "main" text of a Delivery
// Service's remap.config content.
Pre []string
// Text contains the "main" text of a Delivery Service's remap.config
// content.
Text string
// Post contains lines to appear after the "main" text of a Delivery
// Service's remap.config content.
Post []string
}
// buildEdgeRemapLine builds the remap line for the given server and delivery service.
// The cacheKeyConfigParams map may be nil, if this ds profile had no cache key config params.
// Returns the remap line, any warnings, and any error.
func buildEdgeRemapLine(
atsMajorVersion uint,
server *Server,
pData map[string]string,
text string,
ds DeliveryService,
mapFrom string,
mapTo string,
remapConfigParams []tc.ParameterV5,
cacheGroups map[tc.CacheGroupName]tc.CacheGroupNullableV5,
nameTopologies map[TopologyName]tc.TopologyV5,
configDir string,
opts *RemapDotConfigOpts,
) (RemapLines, []string, error) {
warnings := []string{}
remapLines := RemapLines{}
// ds = 'remap' in perl
mapFrom = strings.Replace(mapFrom, `__http__`, server.HostName, -1)
isLastCache, err := serverIsLastCacheForDS(server, &ds, nameTopologies, cacheGroups)
if err != nil {
return remapLines, warnings, errors.New("determining if cache is the last tier: " + err.Error())
}
// if this remap is going to a parent, use http not https.
// cache-to-cache communication inside the CDN is always http (though that's likely to change in the future)
if !isLastCache {
mapTo = strings.Replace(mapTo, `https://`, `http://`, -1)
}
// template fill for moustache
//remapTags := NewRemapTags()
remapTags := RemapTags{}
remapTags.Source = mapFrom
remapTags.Destination = mapTo
strategy := strategyDirective(getStrategyName(ds.XMLID), configDir, opts)
if strategy != "" {
remapTags.Strategy = strategy
}
if _, hasDSCPRemap := pData["dscp_remap"]; hasDSCPRemap {
remapTags.Dscp = `@plugin=dscp_remap.so @pparam=` + strconv.Itoa(ds.DSCP)
} else {
remapTags.Dscp = `@plugin=header_rewrite.so @pparam=dscp/set_dscp_` + strconv.Itoa(ds.DSCP) + ".config"
}
if *ds.Topology != "" {
topoTxt, err := makeDSTopologyHeaderRewriteTxt(ds, tc.CacheGroupName(server.CacheGroup), nameTopologies[TopologyName(*ds.Topology)], cacheGroups)
if err != nil {
return remapLines, warnings, err
}
remapTags.HeaderRewrite = topoTxt
} else if (ds.EdgeHeaderRewrite != nil && *ds.EdgeHeaderRewrite != "") || (ds.ServiceCategory != nil && *ds.ServiceCategory != "") || (ds.MaxOriginConnections != nil && *ds.MaxOriginConnections != 0) {
remapTags.HeaderRewrite = `@plugin=header_rewrite.so @pparam=` + edgeHeaderRewriteConfigFileName(ds.XMLID)
}
dsConfigParamsMap, selfHeal := classifyConfigParams(remapConfigParams)
if ds.SigningAlgorithm != nil && *ds.SigningAlgorithm != "" {
if *ds.SigningAlgorithm == tc.SigningAlgorithmURLSig {
remapTags.Signing = `@plugin=url_sig.so @pparam=url_sig_` + ds.XMLID + ".config" +
paramsStringFor(dsConfigParamsMap["url_sig.pparam"], &warnings)
} else if *ds.SigningAlgorithm == tc.SigningAlgorithmURISigning {
remapTags.Signing = `@plugin=uri_signing.so @pparam=uri_signing_` + ds.XMLID + ".config" +
paramsStringFor(dsConfigParamsMap["uri_signing.pparam"], &warnings)
}
}
// Raw remap text, this allows the directive hacks
rawRemapText := ""
if ds.RemapText != nil {
rawRemapText = *ds.RemapText
}
// Form the cachekey args string, qstring ignore, then
// remap.config then cachekey.config
cachekeyTxt := ""
cachekeyArgs := ""
if ds.QStringIgnore != nil {
if *ds.QStringIgnore == tc.QueryStringIgnoreDropAtEdge {
remapTags.DropQstring = `@plugin=regex_remap.so @pparam=` + RemapConfigDropQstringConfigFile
} else if *ds.QStringIgnore == tc.QueryStringIgnoreIgnoreInCacheKeyAndPassUp {
cachekeyArgs = getQStringIgnoreRemap(atsMajorVersion)
}
}
if len(dsConfigParamsMap) > 0 {
cachekeyArgs += cachekeyArgsFor(dsConfigParamsMap, &warnings)
}
if cachekeyArgs != "" {
cachekeyTxt = `@plugin=cachekey.so` + cachekeyArgs
}
// Hack for moving the cachekey directive into the raw remap text
if strings.Contains(rawRemapText, RemapConfigCachekeyDirective) {
rawRemapText = strings.Replace(rawRemapText, RemapConfigCachekeyDirective, cachekeyTxt, 1)
} else if cachekeyTxt != "" {
remapTags.Cachekey = cachekeyTxt
}
regexRemapTxt := ""
// Note: should use full path here?
if ds.RegexRemap != nil && *ds.RegexRemap != "" {
regexRemapTxt = `@plugin=regex_remap.so @pparam=regex_remap_` + ds.XMLID + ".config"
}
// Hack for moving the regex_remap directive into the raw remap text
if strings.Contains(rawRemapText, RemapConfigRegexRemapDirective) {
rawRemapText = strings.Replace(rawRemapText, RemapConfigRegexRemapDirective, regexRemapTxt, 1)
} else if regexRemapTxt != "" {
remapTags.RegexRemap = regexRemapTxt
}
rangeReqTxt := ""
if ds.RangeRequestHandling != nil {
crr := false
if *ds.RangeRequestHandling == tc.RangeRequestHandlingBackgroundFetch {
rangeReqTxt = `@plugin=background_fetch.so @pparam=--config=bg_fetch.config` +
paramsStringFor(dsConfigParamsMap["background_fetch.pparam"], &warnings)
} else if *ds.RangeRequestHandling == tc.RangeRequestHandlingSlice && ds.RangeSliceBlockSize != nil {
rangeReqTxt = `@plugin=slice.so @pparam=--blockbytes=` + strconv.Itoa(*ds.RangeSliceBlockSize) +
paramsStringFor(dsConfigParamsMap["slice.pparam"], &warnings)
rangeReqTxt += ` `
crr = true
} else if *ds.RangeRequestHandling == tc.RangeRequestHandlingCacheRangeRequest {
crr = true
}
if crr {
rangeReqTxt += `@plugin=cache_range_requests.so ` + paramsStringFor(dsConfigParamsMap["cache_range_requests.pparam"], &warnings)
if *ds.RangeRequestHandling == tc.RangeRequestHandlingSlice && !strings.Contains(rangeReqTxt, "--consider-ims") && selfHeal {
rangeReqTxt += ` @pparam=--consider-ims`
}
}
}
// Hack for moving the range directive into the raw remap text
if strings.Contains(rawRemapText, RemapConfigRangeDirective) {
rawRemapText = strings.Replace(rawRemapText, RemapConfigRangeDirective, rangeReqTxt, 1)
} else if rangeReqTxt != "" {
remapTags.RangeRequests = rangeReqTxt
}
if rawRemapText != "" {
remapTags.RawText = rawRemapText
}
if ds.FQPacingRate != nil && *ds.FQPacingRate > 0 {
remapTags.Pacing = `@plugin=fq_pacing.so @pparam=--rate=` + strconv.Itoa(*ds.FQPacingRate)
}
// Check for ds parameter template override
var template *mustache.Template
if params, ok := dsConfigParamsMap[RemapConfigTemplateFirst]; ok {
if 0 < len(params) {
templateString := params[0].Value
template, err = RemapLineTemplates.parse(templateString)
if err != nil {
warnings = append(warnings, "Error decoding override "+RemapConfigTemplateFirst+" "+templateString+" for DS "+ds.XMLID+", falling back!")
}
}
}
// fall back to default remap config line template
if template == nil {
template, err = RemapLineTemplates.parse(DefaultFirstRemapConfigTemplateString)
if err != nil {
return remapLines, warnings, errors.New("unable to load default template string: " + DefaultFirstRemapConfigTemplateString + " " + err.Error())
}
}
// Expand the moustache
var linebytes bytes.Buffer
err = template.FRender(&linebytes, remapTags)
if err != nil {
return remapLines, warnings, errors.New("Error filling edge remap template: " + err.Error())
}
//remapLines.Text = removeDeleteMes(linebytes.String())
remapLines.Text = linebytes.String()
// Any raw pre or post pend lines?
if isLastCache {
remapLines.Pre, remapLines.Post = lastPrePostRemapLinesFor(dsConfigParamsMap, ds.XMLID)
}
return remapLines, warnings, nil
}
func strategyDirective(strategyName string, configDir string, opt *RemapDotConfigOpts) string {
if !opt.UseStrategies {
return ""
}
if !opt.UseStrategiesCore {
return `@plugin=parent_select.so @pparam=` + filepath.Join(configDir, "strategies.yaml") + ` @pparam=` + strategyName
}
return `@strategy=` + strategyName
}
// makeDSTopologyHeaderRewriteTxt returns the appropriate header rewrite remap line text for the given DS on the given server, and any error.
// May be empty, if the DS has no header rewrite for the server's position in the topology.
func makeDSTopologyHeaderRewriteTxt(ds DeliveryService, cg tc.CacheGroupName, topology tc.TopologyV5, cacheGroups map[tc.CacheGroupName]tc.CacheGroupNullableV5) (string, error) {
placement, err := getTopologyPlacement(cg, topology, cacheGroups, &ds)
if err != nil {
return "", errors.New("getting topology placement: " + err.Error())
}
txt := ""
const pluginTxt = `@plugin=header_rewrite.so @pparam=`
if placement.IsFirstCacheTier && ((ds.FirstHeaderRewrite != nil && *ds.FirstHeaderRewrite != "") || (ds.ServiceCategory != nil && *ds.ServiceCategory != "")) {
txt += pluginTxt + FirstHeaderRewriteConfigFileName(ds.XMLID) + ` `
}
if placement.IsInnerCacheTier && ((ds.InnerHeaderRewrite != nil && *ds.InnerHeaderRewrite != "") || (ds.ServiceCategory != nil && *ds.ServiceCategory != "")) {
txt += pluginTxt + InnerHeaderRewriteConfigFileName(ds.XMLID) + ` `
}
if placement.IsLastCacheTier && ((ds.LastHeaderRewrite != nil && *ds.LastHeaderRewrite != "") || (ds.ServiceCategory != nil && *ds.ServiceCategory != "") || (ds.MaxOriginConnections != nil && *ds.MaxOriginConnections != 0)) {
txt += pluginTxt + LastHeaderRewriteConfigFileName(ds.XMLID) + ` `
}
return txt, nil
}
type remapLine struct {
From string
To string
}
// makeEdgeDSDataRemapLines returns the remap lines for the given server and delivery service.
// Returns nil, if the given server and ds have no remap lines, i.e. the DS match is not a host regex, or has no origin FQDN.
func makeEdgeDSDataRemapLines(
ds DeliveryService,
requestFQDN string,
// dsRegex tc.DeliveryServiceRegex,
server *Server,
cdnDomain string,
) ([]remapLine, error) {
if ds.Protocol == nil {
return nil, errors.New("ds had nil protocol")
}
remapLines := []remapLine{}
mapTo := *ds.OrgServerFQDN + "/"
portStr := ""
if !tc.DSType(*ds.Type).IsDNS() && server.TCPPort != nil && *server.TCPPort > 0 && *server.TCPPort != 80 {
portStr = ":" + strconv.Itoa(*server.TCPPort)
}
httpsPortStr := ""
if !tc.DSType(*ds.Type).IsDNS() && server.HTTPSPort != nil && *server.HTTPSPort > 0 && *server.HTTPSPort != 443 {
httpsPortStr = ":" + strconv.Itoa(*server.HTTPSPort)
}
mapFromHTTP := "http://" + requestFQDN + portStr + "/"
mapFromHTTPS := "https://" + requestFQDN + httpsPortStr + "/"
if *ds.Protocol == tc.DSProtocolHTTP || *ds.Protocol == tc.DSProtocolHTTPAndHTTPS {
remapLines = append(remapLines, remapLine{From: mapFromHTTP, To: mapTo})
}
if *ds.Protocol == tc.DSProtocolHTTPS || *ds.Protocol == tc.DSProtocolHTTPToHTTPS || *ds.Protocol == tc.DSProtocolHTTPAndHTTPS {
remapLines = append(remapLines, remapLine{From: mapFromHTTPS, To: mapTo})
}
return remapLines, nil
}
func edgeHeaderRewriteConfigFileName(dsName string) string {
return "hdr_rw_" + dsName + ".config"
}
func midHeaderRewriteConfigFileName(dsName string) string {
return "hdr_rw_mid_" + dsName + ".config"
}
// getQStringIgnoreRemap returns the remap, whether cachekey was added.
func getQStringIgnoreRemap(atsMajorVersion uint) string {
if atsMajorVersion < 7 {
log.Errorf("Unsupport version of ats found %v", atsMajorVersion)
return ""
}
return ` @pparam=--separator= @pparam=--remove-all-params=true @pparam=--remove-path=true @pparam=--capture-prefix-uri=/^([^?]*)/$1/`
}
// makeServerPackageParamData returns a map[paramName]paramVal for this server, config file 'package'.
// Returns the param data, and any warnings.
func makeServerPackageParamData(server *Server, serverParams []tc.ParameterV5) (map[string]string, []string) {
warnings := []string{}
serverPackageParamData := map[string]string{}
for _, param := range serverParams {
if param.ConfigFile != "package" { // TODO put in const
continue
}
if param.Name == "location" { // TODO put in const
continue
}
paramName := param.Name
// some files have multiple lines with the same key... handle that with param id.
if _, ok := serverPackageParamData[param.Name]; ok {
paramName += "__" + strconv.Itoa(param.ID)
}
paramValue := param.Value
if paramValue == "STRING __HOSTNAME__" {
paramValue = server.HostName + "." + server.DomainName // TODO strings.Replace to replace all anywhere, instead of just an exact match?
}
if val, ok := serverPackageParamData[paramName]; ok {
if val < paramValue {
warnings = append(warnings, "got multiple parameters for server package name '"+paramName+"' - ignoring '"+paramValue+"'")
continue
} else {
warnings = append(warnings, "got multiple parameters for server package name '"+paramName+"' - ignoring '"+val+"'")
}
}
serverPackageParamData[paramName] = paramValue
}
return serverPackageParamData, warnings
}
// remapFilterDSes filters Delivery Services to be used to generate remap.config for the given server.
// Returned DSes are guaranteed to have a non-nil XMLID, Type, DSCP, ID, Active, and Topology.
// If a DS has a nil Topology, OrgServerFQDN, FirstHeaderRewrite, InnerHeaderRewrite, or LastHeaderRewrite, "" is assigned.
// Returns the filtered delivery services, and any warnings.
func remapFilterDSes(server *Server, dss []DeliveryServiceServer, dses []DeliveryService) ([]DeliveryService, []string) {
warnings := []string{}
isMid := strings.HasPrefix(server.Type, string(tc.CacheTypeMid))
serverIDs := map[int]struct{}{}
if !isMid {
// mids use all servers, so pass empty=all. Edges only use this current server
serverIDs[server.ID] = struct{}{}
}
dsIDs := map[int]struct{}{}
for _, ds := range dses {
if ds.ID == nil {
// TODO log error?
continue
}
dsIDs[*ds.ID] = struct{}{}
}
dsServers := filterDSS(dss, dsIDs, serverIDs)
dssMap := map[int]map[int]struct{}{} // set of map[dsID][serverID]
for _, dss := range dsServers {
if dssMap[dss.DeliveryService] == nil {
dssMap[dss.DeliveryService] = map[int]struct{}{}
}
dssMap[dss.DeliveryService][dss.Server] = struct{}{}
}
useInactive := false
if !isMid {
// mids get inactive DSes, edges don't. This is how it's always behaved, not necessarily how it should.
useInactive = true
}
filteredDSes := []DeliveryService{}
for _, ds := range dses {
if ds.Topology == nil {
ds.Topology = util.StrPtr("")
}
if ds.OrgServerFQDN == nil {
ds.OrgServerFQDN = util.StrPtr("")
}
if ds.FirstHeaderRewrite == nil {
ds.FirstHeaderRewrite = util.StrPtr("")
}
if ds.InnerHeaderRewrite == nil {
ds.InnerHeaderRewrite = util.StrPtr("")
}
if ds.LastHeaderRewrite == nil {
ds.LastHeaderRewrite = util.StrPtr("")
}
if ds.XMLID == "" {
warnings = append(warnings, "got Delivery Service with nil XMLID, skipping!")
continue
} else if ds.Type == nil {
warnings = append(warnings, "got Delivery Service '"+ds.XMLID+"' with nil Type, skipping!")
continue
} else if ds.ID == nil {
warnings = append(warnings, "got Delivery Service '"+ds.XMLID+"' with nil ID, skipping!")
continue
} else if ds.Active == "" {
warnings = append(warnings, "got Delivery Service '"+ds.XMLID+"' with nil Active, skipping!")
continue
} else if _, ok := dssMap[*ds.ID]; !ok && *ds.Topology == "" {
continue // normal, not an error, this DS just isn't assigned to our Cache
} else if !useInactive && ds.Active != tc.DSActiveStateActive {
continue // normal, not an error, DS just isn't active and we aren't including inactive DSes
}
filteredDSes = append(filteredDSes, ds)
}
return filteredDSes, warnings
}
// makeDSProfilesConfigParams returns a map[ProfileID][ParamName]ParamValue for the cache key params for each profile.
// Returns the params, any warnings, and any error.
func makeDSProfilesConfigParams(server *Server, dses []DeliveryService, remapConfigParams []tc.ParameterV5) (map[int][]tc.ParameterV5, []string, error) {
warnings := []string{}
dsConfigParamsWithProfiles, err := tcParamsToParamsWithProfiles(remapConfigParams)
if err != nil {
return nil, warnings, errors.New("decoding cache key parameter profiles: " + err.Error())
}
configParamsWithProfilesMap := parameterWithProfilesToMap(dsConfigParamsWithProfiles)
dsProfileNamesToIDs := map[string]int{}
for _, ds := range dses {
if ds.ProfileID == nil || ds.ProfileName == nil {
continue // TODO log
}
dsProfileNamesToIDs[*ds.ProfileName] = *ds.ProfileID
}
dsProfilesConfigParams := map[int][]tc.ParameterV5{}
for _, param := range configParamsWithProfilesMap {
for dsProfileName, dsProfileID := range dsProfileNamesToIDs {
if _, ok := param.ProfileNames[dsProfileName]; ok {
if _, ok := dsProfilesConfigParams[dsProfileID]; !ok {
dsProfilesConfigParams[dsProfileID] = []tc.ParameterV5{}
}
dsProfilesConfigParams[dsProfileID] = append(dsProfilesConfigParams[dsProfileID], param.ParameterV5)
}
}
}
return dsProfilesConfigParams, warnings, nil
}
type deliveryServiceRegexesSortByTypeThenSetNum []tc.DeliveryServiceRegex
func (r deliveryServiceRegexesSortByTypeThenSetNum) Len() int { return len(r) }
func (r deliveryServiceRegexesSortByTypeThenSetNum) Less(i, j int) bool {
if rc := strings.Compare(r[i].Type, r[j].Type); rc != 0 {
return rc < 0
}
return r[i].SetNumber < r[j].SetNumber
}
func (r deliveryServiceRegexesSortByTypeThenSetNum) Swap(i, j int) { r[i], r[j] = r[j], r[i] }
func MakeDSRegexMap(regexes []tc.DeliveryServiceRegexes) map[tc.DeliveryServiceName][]tc.DeliveryServiceRegex {
dsRegexMap := map[tc.DeliveryServiceName][]tc.DeliveryServiceRegex{}
for _, dsRegex := range regexes {
sort.Sort(deliveryServiceRegexesSortByTypeThenSetNum(dsRegex.Regexes))
dsRegexMap[tc.DeliveryServiceName(dsRegex.DSName)] = dsRegex.Regexes
}
return dsRegexMap
}
func GetAnyCastPartners(server *Server, servers []Server) map[string][]string {
anyCastIPs := make(map[string][]string)
for _, int := range server.Interfaces {
if int.Name == "lo" {
for _, addr := range int.IPAddresses {
anyCastIPs[addr.Address] = []string{}
}
}
}
for _, srv := range servers {
if server.HostName == srv.HostName {
continue
}
for _, int := range srv.Interfaces {
if int.Name == "lo" {
for _, address := range int.IPAddresses {
if _, ok := anyCastIPs[address.Address]; ok && address.ServiceAddress {
anyCastIPs[address.Address] = append(anyCastIPs[address.Address], srv.HostName)
}
}
}
}
}
return anyCastIPs
}
type keyVal struct {
Key string
Val string
}
type keyVals []keyVal
func (ks keyVals) Len() int { return len(ks) }
func (ks keyVals) Swap(i, j int) { ks[i], ks[j] = ks[j], ks[i] }
func (ks keyVals) Less(i, j int) bool {
if ks[i].Key != ks[j].Key {
return ks[i].Key < ks[j].Key
}
return ks[i].Val < ks[j].Val
}
// GetDSRequestFQDNs returns the FQDNs that clients will request from the edge.
func GetDSRequestFQDNs(ds *DeliveryService, regexes []tc.DeliveryServiceRegex, server *Server, anyCastPartners map[string][]string, cdnDomain string) ([]string, error) {
if server.HostName == "" {
return nil, errors.New("server missing hostname")
}
fqdns := []string{}
seenFQDNs := map[string]struct{}{}
for _, dsRegex := range regexes {
if tc.DSMatchType(dsRegex.Type) != tc.DSMatchTypeHostRegex || ds.OrgServerFQDN == nil || *ds.OrgServerFQDN == "" {
continue
}
if dsRegex.Pattern == "" {
return nil, errors.New("ds missing regex pattern")
}
if ds.Protocol == nil {
return nil, errors.New("ds missing protocol")
}
if cdnDomain == "" {
return nil, errors.New("ds missing domain")
}
hostRegex := dsRegex.Pattern
fqdn, err := makeFQDN(hostRegex, ds, server.HostName, cdnDomain)
if err != nil {
return nil, err
}
fqdns = append(fqdns, fqdn)
if tc.DSType(*ds.Type).IsHTTP() && strings.HasSuffix(hostRegex, `.*`) {
for _, ip := range anyCastPartners {
for _, hn := range ip {
fqdn, err := makeFQDN(hostRegex, ds, hn, cdnDomain)
if err != nil {
return nil, err
}
if _, ok := seenFQDNs[fqdn]; ok {
continue
}
seenFQDNs[fqdn] = struct{}{}
fqdns = append(fqdns, fqdn)
}
}
}
}
return fqdns, nil
}
func makeFQDN(hostRegex string, ds *DeliveryService, server string, cdnDomain string) (string, error) {
fqdn := hostRegex
if strings.HasSuffix(hostRegex, `.*`) {
re := hostRegex
re = strings.Replace(re, `\`, ``, -1)
re = strings.Replace(re, `.*`, ``, -1)
hName := server
if ds.Type != nil && tc.DSType(*ds.Type).IsDNS() {
if ds.RoutingName == "" {
return "", errors.New("ds is dns, but missing routing name")
}
hName = ds.RoutingName
}
fqdn = hName + re + cdnDomain
}
return fqdn, nil
}
func serverIsLastCacheForDS(server *Server, ds *DeliveryService, topologies map[TopologyName]tc.TopologyV5, cacheGroups map[tc.CacheGroupName]tc.CacheGroupNullableV5) (bool, error) {
if ds.Topology != nil && strings.TrimSpace(*ds.Topology) != "" {
if server.CacheGroup == "" {
return false, errors.New("Server has no CacheGroup")
}
topology, ok := topologies[TopologyName(*ds.Topology)]
if !ok {
return false, errors.New("DS topology '" + *ds.Topology + "' not found in topologies")
}
topoPlacement, err := getTopologyPlacement(tc.CacheGroupName(server.CacheGroup), topology, cacheGroups, ds)
if err != nil {
return false, errors.New("getting topology placement: " + err.Error())
}
return topoPlacement.IsLastCacheTier, nil
}
return noTopologyServerIsLastCacheForDS(server, ds, cacheGroups), nil
}
// noTopologyServerIsLastCacheForDS returns whether the server is the last tier for the DS, if the DS has no Topology.
// This helper MUST NOT be called if the DS has a Topology. It does not check.
func noTopologyServerIsLastCacheForDS(server *Server, ds *DeliveryService, cgs map[tc.CacheGroupName]tc.CacheGroupNullableV5) bool {
if strings.HasPrefix(server.Type, tc.MidTypePrefix) {
return true // if the type is "MID" it's always the last cache for non-topologies
}
if !tc.DSType(*ds.Type).UsesMidCache() {
return true // if this DS type never uses mids (for pre-topology type-parentage), it's the last cache
}
// pre-topology parentage is based on Cachegroups
if server.CacheGroup == "" {
// if the server has no CG (which TO shouldn't allow), it can't possibly have parents.
return true
}
cg, ok := cgs[tc.CacheGroupName(server.CacheGroup)]
if !ok {
// if the server's CG doesn't exist (which TO shouldn't allow), it can't possibly have parents.
return true
}
if cg.ParentName == nil || *cg.ParentName == "" {
// if the server's CG has no parents, it's going direct to the origin
return true
}
parentCG, ok := cgs[tc.CacheGroupName(*cg.ParentName)]
if !ok {
// if the server's parent CG doesn't exist (which TO shouldn't allow), it can't possibly have parents.
return true
}
if parentCG.Type == nil {
// if the server's parent CG has no type (which TO shouldn't allow), then it must not be a cache, so this server is the last cache tier
return true
}
if *parentCG.Type != tc.CacheGroupEdgeTypeName && *parentCG.Type != tc.CacheGroupMidTypeName {
// if the server's parent CG isn't a cache, then this server is the last cache tier.
return true
}
// at this point, this server's CG has a cache parent,
// so this server isn't the last cache tier
return false
}