2023-03-28 19:12:30 +00:00
|
|
|
// Copyright (c) HashiCorp, Inc.
|
2023-08-11 13:12:13 +00:00
|
|
|
// SPDX-License-Identifier: BUSL-1.1
|
2023-03-28 19:12:30 +00:00
|
|
|
|
2020-06-05 21:54:29 +00:00
|
|
|
package expose
|
|
|
|
|
|
|
|
import (
|
|
|
|
"flag"
|
|
|
|
"fmt"
|
|
|
|
"strings"
|
|
|
|
|
2021-11-12 21:45:32 +00:00
|
|
|
"github.com/mitchellh/cli"
|
|
|
|
|
2020-06-05 21:54:29 +00:00
|
|
|
"github.com/hashicorp/consul/agent"
|
|
|
|
"github.com/hashicorp/consul/api"
|
|
|
|
"github.com/hashicorp/consul/command/flags"
|
2020-10-06 18:24:05 +00:00
|
|
|
"github.com/hashicorp/consul/command/intention"
|
2020-06-05 21:54:29 +00:00
|
|
|
)
|
|
|
|
|
|
|
|
func New(ui cli.Ui) *cmd {
|
|
|
|
c := &cmd{UI: ui}
|
|
|
|
c.init()
|
|
|
|
return c
|
|
|
|
}
|
|
|
|
|
|
|
|
type cmd struct {
|
|
|
|
UI cli.Ui
|
|
|
|
flags *flag.FlagSet
|
|
|
|
http *flags.HTTPFlags
|
|
|
|
help string
|
|
|
|
|
|
|
|
// flags
|
|
|
|
ingressGateway string
|
|
|
|
service string
|
|
|
|
port int
|
|
|
|
protocol string
|
2020-06-08 23:59:47 +00:00
|
|
|
hosts flags.AppendSliceValue
|
2020-06-05 21:54:29 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
func (c *cmd) init() {
|
|
|
|
c.flags = flag.NewFlagSet("", flag.ContinueOnError)
|
|
|
|
c.flags.StringVar(&c.ingressGateway, "ingress-gateway", "",
|
2021-11-12 21:45:32 +00:00
|
|
|
"(Required) The name of the ingress gateway service to use. Namespace and partition "+
|
|
|
|
"can optionally be specified as a prefix via the 'partition/namespace/service' format.")
|
2020-06-05 21:54:29 +00:00
|
|
|
|
|
|
|
c.flags.StringVar(&c.service, "service", "",
|
2021-11-12 21:45:32 +00:00
|
|
|
"(Required) The name of destination service to expose. Namespace and partition "+
|
|
|
|
"can optionally be specified as a prefix via the 'partition/namespace/service' format.")
|
2020-06-05 21:54:29 +00:00
|
|
|
|
2020-06-08 23:44:20 +00:00
|
|
|
c.flags.IntVar(&c.port, "port", 0,
|
2020-06-05 22:47:03 +00:00
|
|
|
"(Required) The listener port to use for the service on the Ingress gateway.")
|
2020-06-05 21:54:29 +00:00
|
|
|
|
|
|
|
c.flags.StringVar(&c.protocol, "protocol", "tcp",
|
2020-06-05 22:47:03 +00:00
|
|
|
"The protocol for the service. Defaults to 'tcp'.")
|
2020-06-05 21:54:29 +00:00
|
|
|
|
2020-06-08 23:59:47 +00:00
|
|
|
c.flags.Var(&c.hosts, "host", "Additional DNS hostname to use for routing to this service."+
|
|
|
|
"Can be specified multiple times.")
|
|
|
|
|
2020-06-05 21:54:29 +00:00
|
|
|
c.http = &flags.HTTPFlags{}
|
|
|
|
flags.Merge(c.flags, c.http.ClientFlags())
|
|
|
|
flags.Merge(c.flags, c.http.ServerFlags())
|
|
|
|
c.help = flags.Usage(help, c.flags)
|
|
|
|
}
|
|
|
|
|
|
|
|
func (c *cmd) Run(args []string) int {
|
|
|
|
if err := c.flags.Parse(args); err != nil {
|
|
|
|
if err == flag.ErrHelp {
|
|
|
|
return 0
|
|
|
|
}
|
|
|
|
c.UI.Error(fmt.Sprintf("Failed to parse args: %v", err))
|
|
|
|
return 1
|
|
|
|
}
|
|
|
|
|
|
|
|
// Set up a client.
|
|
|
|
client, err := c.http.APIClient()
|
|
|
|
if err != nil {
|
|
|
|
c.UI.Error(fmt.Sprintf("Error initializing client: %s", err))
|
|
|
|
return 1
|
|
|
|
}
|
|
|
|
|
|
|
|
// Check for any missing or invalid flag values.
|
|
|
|
if c.service == "" {
|
|
|
|
c.UI.Error("A service name must be given via the -service flag.")
|
|
|
|
return 1
|
|
|
|
}
|
2021-11-12 21:45:32 +00:00
|
|
|
svc, svcNS, svcPart, err := intention.ParseIntentionTarget(c.service)
|
2020-06-05 21:54:29 +00:00
|
|
|
if err != nil {
|
|
|
|
c.UI.Error(fmt.Sprintf("Invalid service name: %s", err))
|
|
|
|
return 1
|
|
|
|
}
|
|
|
|
|
|
|
|
if c.ingressGateway == "" {
|
|
|
|
c.UI.Error("An ingress gateway service must be given via the -ingress-gateway flag.")
|
|
|
|
return 1
|
|
|
|
}
|
2021-11-12 21:45:32 +00:00
|
|
|
gateway, gatewayNS, gatewayPart, err := intention.ParseIntentionTarget(c.ingressGateway)
|
2020-06-05 21:54:29 +00:00
|
|
|
if err != nil {
|
|
|
|
c.UI.Error(fmt.Sprintf("Invalid ingress gateway name: %s", err))
|
|
|
|
return 1
|
|
|
|
}
|
|
|
|
|
2020-06-08 23:44:20 +00:00
|
|
|
if c.port == 0 {
|
2020-06-05 21:54:29 +00:00
|
|
|
c.UI.Error("A port must be provided via the -port flag.")
|
|
|
|
return 1
|
|
|
|
}
|
|
|
|
|
|
|
|
// First get the config entry for the ingress gateway, if it exists. Don't error if it's a 404 as that
|
|
|
|
// just means we'll need to create a new config entry.
|
2021-11-12 21:45:32 +00:00
|
|
|
conf, _, err := client.ConfigEntries().Get(
|
|
|
|
api.IngressGateway, gateway, &api.QueryOptions{Partition: gatewayPart, Namespace: gatewayNS},
|
|
|
|
)
|
2020-06-05 21:54:29 +00:00
|
|
|
if err != nil && !strings.Contains(err.Error(), agent.ConfigEntryNotFoundErr) {
|
|
|
|
c.UI.Error(fmt.Sprintf("Error fetching existing ingress gateway configuration: %s", err))
|
|
|
|
return 1
|
|
|
|
}
|
|
|
|
if conf == nil {
|
|
|
|
conf = &api.IngressGatewayConfigEntry{
|
|
|
|
Kind: api.IngressGateway,
|
|
|
|
Name: gateway,
|
2021-11-12 21:45:32 +00:00
|
|
|
Namespace: gatewayNS,
|
|
|
|
Partition: gatewayPart,
|
2020-06-05 21:54:29 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Make sure the flags don't conflict with existing config.
|
|
|
|
ingressConf, ok := conf.(*api.IngressGatewayConfigEntry)
|
|
|
|
if !ok {
|
|
|
|
// This should never happen
|
|
|
|
c.UI.Error(fmt.Sprintf("Config entry is an invalid type: %T", conf))
|
|
|
|
return 1
|
|
|
|
}
|
|
|
|
|
|
|
|
listenerIdx := -1
|
2020-06-09 18:09:53 +00:00
|
|
|
serviceIdx := -1
|
|
|
|
newService := api.IngressService{
|
|
|
|
Name: svc,
|
2021-11-12 21:45:32 +00:00
|
|
|
Namespace: svcNS,
|
|
|
|
Partition: svcPart,
|
2020-06-09 18:09:53 +00:00
|
|
|
Hosts: c.hosts,
|
|
|
|
}
|
2020-06-05 21:54:29 +00:00
|
|
|
for i, listener := range ingressConf.Listeners {
|
2020-06-09 18:09:53 +00:00
|
|
|
// Find the listener for the specified port, if one exists.
|
|
|
|
if listener.Port != c.port {
|
|
|
|
continue
|
2020-06-05 21:54:29 +00:00
|
|
|
}
|
|
|
|
|
2020-06-09 18:09:53 +00:00
|
|
|
// Make sure the given protocol matches the existing one.
|
|
|
|
listenerIdx = i
|
|
|
|
if listener.Protocol != c.protocol {
|
|
|
|
c.UI.Error(fmt.Sprintf("Listener on port %d already configured with conflicting protocol %q", listener.Port, listener.Protocol))
|
|
|
|
return 1
|
|
|
|
}
|
|
|
|
|
|
|
|
// Make sure the service isn't already exposed in this gateway
|
|
|
|
for j, service := range listener.Services {
|
2021-11-12 21:45:32 +00:00
|
|
|
if service.Name == svc && entMetaMatch(service.Namespace, service.Partition, svcNS, svcPart) {
|
2020-06-09 18:09:53 +00:00
|
|
|
serviceIdx = j
|
|
|
|
c.UI.Output(fmt.Sprintf("Updating service definition for %q on listener with port %d", c.service, listener.Port))
|
|
|
|
break
|
2020-06-05 21:54:29 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Add a service to the existing listener for the port if one exists, or make a new listener.
|
|
|
|
if listenerIdx >= 0 {
|
2020-06-09 18:09:53 +00:00
|
|
|
if serviceIdx >= 0 {
|
|
|
|
ingressConf.Listeners[listenerIdx].Services[serviceIdx] = newService
|
|
|
|
} else {
|
|
|
|
ingressConf.Listeners[listenerIdx].Services = append(ingressConf.Listeners[listenerIdx].Services, newService)
|
|
|
|
}
|
2020-06-05 21:54:29 +00:00
|
|
|
} else {
|
|
|
|
ingressConf.Listeners = append(ingressConf.Listeners, api.IngressListener{
|
|
|
|
Port: c.port,
|
|
|
|
Protocol: c.protocol,
|
2020-06-09 18:09:53 +00:00
|
|
|
Services: []api.IngressService{newService},
|
2020-06-05 21:54:29 +00:00
|
|
|
})
|
|
|
|
}
|
|
|
|
|
|
|
|
// Write the updated config entry using a check-and-set, so it fails if the entry
|
|
|
|
// has been changed since we looked it up.
|
2021-11-12 21:45:32 +00:00
|
|
|
succeeded, _, err := client.ConfigEntries().CAS(ingressConf, ingressConf.GetModifyIndex(), &api.WriteOptions{Partition: gatewayPart, Namespace: gatewayNS})
|
2020-06-09 18:09:53 +00:00
|
|
|
if err != nil {
|
|
|
|
c.UI.Error(fmt.Sprintf("Error writing ingress config entry: %v", err))
|
|
|
|
return 1
|
|
|
|
}
|
|
|
|
if !succeeded {
|
|
|
|
c.UI.Error("Ingress config entry was changed while attempting to update, please try again.")
|
|
|
|
return 1
|
2020-06-05 21:54:29 +00:00
|
|
|
}
|
2020-06-09 18:09:53 +00:00
|
|
|
c.UI.Output(fmt.Sprintf("Successfully updated config entry for ingress service %q", gateway))
|
2020-06-05 21:54:29 +00:00
|
|
|
|
|
|
|
// Check for an existing intention.
|
2020-06-26 21:59:15 +00:00
|
|
|
existing, _, err := client.Connect().IntentionGetExact(c.ingressGateway, c.service, nil)
|
2020-06-05 21:54:29 +00:00
|
|
|
if err != nil {
|
|
|
|
c.UI.Error(fmt.Sprintf("Error looking up existing intention: %s", err))
|
|
|
|
return 1
|
|
|
|
}
|
|
|
|
if existing != nil && existing.Action == api.IntentionActionAllow {
|
2020-06-08 23:44:20 +00:00
|
|
|
c.UI.Output(fmt.Sprintf("Intention already exists for %q -> %q", c.ingressGateway, c.service))
|
2020-06-05 21:54:29 +00:00
|
|
|
return 0
|
|
|
|
}
|
|
|
|
|
|
|
|
// Add the intention between the gateway service and the destination.
|
|
|
|
ixn := &api.Intention{
|
2021-11-12 21:45:32 +00:00
|
|
|
SourceName: gateway,
|
|
|
|
SourceNS: gatewayNS,
|
|
|
|
SourcePartition: gatewayPart,
|
|
|
|
DestinationName: svc,
|
|
|
|
DestinationNS: svcNS,
|
|
|
|
DestinationPartition: svcPart,
|
|
|
|
SourceType: api.IntentionSourceConsul,
|
|
|
|
Action: api.IntentionActionAllow,
|
2020-06-05 21:54:29 +00:00
|
|
|
}
|
2020-10-06 18:24:05 +00:00
|
|
|
if _, err = client.Connect().IntentionUpsert(ixn, nil); err != nil {
|
|
|
|
c.UI.Error(fmt.Sprintf("Error upserting intention: %s", err))
|
|
|
|
return 1
|
2020-06-05 21:54:29 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
c.UI.Output(fmt.Sprintf("Successfully set up intention for %q -> %q", c.ingressGateway, c.service))
|
|
|
|
return 0
|
|
|
|
}
|
|
|
|
|
2021-11-12 21:45:32 +00:00
|
|
|
func entMetaMatch(nsA, partitionA, nsB, partitionB string) bool {
|
|
|
|
if nsA == "" {
|
|
|
|
nsA = api.IntentionDefaultNamespace
|
|
|
|
}
|
|
|
|
if partitionA == "" {
|
|
|
|
partitionA = api.PartitionDefaultName
|
|
|
|
}
|
|
|
|
if nsB == "" {
|
|
|
|
nsB = api.IntentionDefaultNamespace
|
2020-06-09 22:13:19 +00:00
|
|
|
}
|
2021-11-12 21:45:32 +00:00
|
|
|
if partitionB == "" {
|
|
|
|
partitionB = api.PartitionDefaultName
|
2020-06-09 22:13:19 +00:00
|
|
|
}
|
|
|
|
|
2021-11-12 21:45:32 +00:00
|
|
|
return strings.EqualFold(partitionA, partitionB) && strings.EqualFold(nsA, nsB)
|
2020-06-09 22:13:19 +00:00
|
|
|
}
|
|
|
|
|
2020-06-05 21:54:29 +00:00
|
|
|
func (c *cmd) Synopsis() string {
|
|
|
|
return synopsis
|
|
|
|
}
|
|
|
|
|
|
|
|
func (c *cmd) Help() string {
|
|
|
|
return c.help
|
|
|
|
}
|
|
|
|
|
|
|
|
const synopsis = "Expose a Connect-enabled service through an Ingress gateway"
|
|
|
|
const help = `
|
|
|
|
Usage: consul connect expose [options]
|
|
|
|
|
|
|
|
Exposes a Connect-enabled service through the given ingress gateway, using the
|
|
|
|
given protocol and port.
|
|
|
|
`
|