2014-04-23 19:57:06 +00:00
|
|
|
package agent
|
|
|
|
|
2014-04-28 21:52:30 +00:00
|
|
|
import (
|
Use fmt.Fprint/Fprintf/Fprintln
Used the following rewrite rules:
gofmt -w -r 'resp.Write([]byte(fmt.Sprintf(a, b, c, d))) -> fmt.Fprintf(resp, a, b, c, d)' *.go
gofmt -w -r 'resp.Write([]byte(fmt.Sprintf(a, b, c))) -> fmt.Fprintf(resp, a, b, c)' *.go
gofmt -w -r 'resp.Write([]byte(fmt.Sprintf(a, b))) -> fmt.Fprintf(resp, a, b)' *.go
gofmt -w -r 'resp.Write([]byte(fmt.Sprintf(a))) -> fmt.Fprint(resp, a)' *.go
gofmt -w -r 'resp.Write([]byte(a + "\n")) -> fmt.Fprintln(resp, a)' *.go
gofmt -w -r 'resp.Write([]byte(a)) -> fmt.Fprint(resp, a)' *.go
2017-04-20 14:07:42 +00:00
|
|
|
"fmt"
|
2014-04-28 21:52:30 +00:00
|
|
|
"net/http"
|
2020-09-24 10:13:14 +00:00
|
|
|
"net/http/httputil"
|
|
|
|
"net/url"
|
|
|
|
"path"
|
2014-04-28 22:52:37 +00:00
|
|
|
"sort"
|
2014-04-28 21:52:30 +00:00
|
|
|
"strings"
|
2015-02-11 21:35:46 +00:00
|
|
|
|
2021-07-30 18:55:35 +00:00
|
|
|
"github.com/hashicorp/go-hclog"
|
|
|
|
|
2020-11-04 18:50:03 +00:00
|
|
|
"github.com/hashicorp/consul/acl"
|
2020-06-22 19:14:12 +00:00
|
|
|
"github.com/hashicorp/consul/agent/config"
|
2017-07-06 10:34:00 +00:00
|
|
|
"github.com/hashicorp/consul/agent/structs"
|
2017-04-19 23:00:11 +00:00
|
|
|
"github.com/hashicorp/consul/api"
|
2020-09-24 10:13:14 +00:00
|
|
|
"github.com/hashicorp/consul/logging"
|
2014-04-28 21:52:30 +00:00
|
|
|
)
|
|
|
|
|
2020-09-30 14:23:19 +00:00
|
|
|
// ServiceSummary is used to summarize a service
|
|
|
|
type ServiceSummary struct {
|
2021-04-13 16:12:13 +00:00
|
|
|
Kind structs.ServiceKind `json:",omitempty"`
|
|
|
|
Name string
|
|
|
|
Datacenter string
|
|
|
|
Tags []string
|
|
|
|
Nodes []string
|
|
|
|
ExternalSources []string
|
|
|
|
externalSourceSet map[string]struct{} // internal to track uniqueness
|
|
|
|
checks map[string]*structs.HealthCheck
|
|
|
|
InstanceCount int
|
|
|
|
ChecksPassing int
|
|
|
|
ChecksWarning int
|
|
|
|
ChecksCritical int
|
|
|
|
GatewayConfig GatewayConfig
|
|
|
|
TransparentProxy bool
|
|
|
|
transparentProxySet bool
|
2022-02-16 21:51:54 +00:00
|
|
|
ConnectNative bool
|
2020-09-30 14:23:19 +00:00
|
|
|
|
|
|
|
structs.EnterpriseMeta
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s *ServiceSummary) LessThan(other *ServiceSummary) bool {
|
|
|
|
if s.EnterpriseMeta.LessThan(&other.EnterpriseMeta) {
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
return s.Name < other.Name
|
|
|
|
}
|
|
|
|
|
2020-10-08 00:35:34 +00:00
|
|
|
type GatewayConfig struct {
|
|
|
|
AssociatedServiceCount int `json:",omitempty"`
|
|
|
|
Addresses []string `json:",omitempty"`
|
|
|
|
|
|
|
|
// internal to track uniqueness
|
|
|
|
addressesSet map[string]struct{}
|
|
|
|
}
|
|
|
|
|
2020-09-30 14:23:19 +00:00
|
|
|
type ServiceListingSummary struct {
|
|
|
|
ServiceSummary
|
|
|
|
|
|
|
|
ConnectedWithProxy bool
|
|
|
|
ConnectedWithGateway bool
|
|
|
|
}
|
|
|
|
|
2020-10-08 00:35:34 +00:00
|
|
|
type ServiceTopologySummary struct {
|
|
|
|
ServiceSummary
|
2020-09-30 14:23:19 +00:00
|
|
|
|
2021-04-13 16:12:13 +00:00
|
|
|
Source string
|
2020-10-08 00:35:34 +00:00
|
|
|
Intention structs.IntentionDecisionSummary
|
2020-05-11 17:35:17 +00:00
|
|
|
}
|
|
|
|
|
2020-09-30 14:23:19 +00:00
|
|
|
type ServiceTopology struct {
|
2021-04-13 16:12:13 +00:00
|
|
|
Protocol string
|
|
|
|
TransparentProxy bool
|
|
|
|
Upstreams []*ServiceTopologySummary
|
|
|
|
Downstreams []*ServiceTopologySummary
|
|
|
|
FilteredByACLs bool
|
2014-04-28 22:52:37 +00:00
|
|
|
}
|
|
|
|
|
2014-04-28 21:52:30 +00:00
|
|
|
// UINodes is used to list the nodes in a given datacenter. We return a
|
2014-04-28 22:09:46 +00:00
|
|
|
// NodeDump which provides overview information for all the nodes
|
2020-09-04 18:42:15 +00:00
|
|
|
func (s *HTTPHandlers) UINodes(resp http.ResponseWriter, req *http.Request) (interface{}, error) {
|
2015-02-11 21:35:46 +00:00
|
|
|
// Parse arguments
|
|
|
|
args := structs.DCSpecificRequest{}
|
|
|
|
if done := s.parse(resp, req, &args.Datacenter, &args.QueryOptions); done {
|
|
|
|
return nil, nil
|
|
|
|
}
|
2019-12-10 02:26:41 +00:00
|
|
|
|
|
|
|
if err := s.parseEntMeta(req, &args.EnterpriseMeta); err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
2019-04-16 16:00:15 +00:00
|
|
|
s.parseFilter(req, &args.Filter)
|
2014-04-28 21:52:30 +00:00
|
|
|
|
2015-02-11 21:35:46 +00:00
|
|
|
// Make the RPC request
|
|
|
|
var out structs.IndexedNodeDump
|
|
|
|
defer setMeta(resp, &out.QueryMeta)
|
|
|
|
RPC:
|
|
|
|
if err := s.agent.RPC("Internal.NodeDump", &args, &out); err != nil {
|
|
|
|
// Retry the request allowing stale data if no leader
|
|
|
|
if strings.Contains(err.Error(), structs.ErrNoLeader.Error()) && !args.AllowStale {
|
|
|
|
args.AllowStale = true
|
|
|
|
goto RPC
|
|
|
|
}
|
2014-04-28 21:52:30 +00:00
|
|
|
return nil, err
|
|
|
|
}
|
2015-11-15 05:05:37 +00:00
|
|
|
|
|
|
|
// Use empty list instead of nil
|
|
|
|
for _, info := range out.Dump {
|
|
|
|
if info.Services == nil {
|
|
|
|
info.Services = make([]*structs.NodeService, 0)
|
|
|
|
}
|
|
|
|
if info.Checks == nil {
|
|
|
|
info.Checks = make([]*structs.HealthCheck, 0)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if out.Dump == nil {
|
|
|
|
out.Dump = make(structs.NodeDump, 0)
|
|
|
|
}
|
2015-02-11 21:35:46 +00:00
|
|
|
return out.Dump, nil
|
2014-04-28 21:52:30 +00:00
|
|
|
}
|
|
|
|
|
2014-04-28 22:09:46 +00:00
|
|
|
// UINodeInfo is used to get info on a single node in a given datacenter. We return a
|
|
|
|
// NodeInfo which provides overview information for the node
|
2020-09-04 18:42:15 +00:00
|
|
|
func (s *HTTPHandlers) UINodeInfo(resp http.ResponseWriter, req *http.Request) (interface{}, error) {
|
2015-02-11 21:35:46 +00:00
|
|
|
// Parse arguments
|
|
|
|
args := structs.NodeSpecificRequest{}
|
|
|
|
if done := s.parse(resp, req, &args.Datacenter, &args.QueryOptions); done {
|
|
|
|
return nil, nil
|
|
|
|
}
|
2014-04-28 22:09:46 +00:00
|
|
|
|
2019-12-10 02:26:41 +00:00
|
|
|
if err := s.parseEntMeta(req, &args.EnterpriseMeta); err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
2014-04-28 22:09:46 +00:00
|
|
|
// Verify we have some DC, or use the default
|
2022-01-28 20:01:47 +00:00
|
|
|
var err error
|
|
|
|
args.Node, err = getPathSuffixUnescaped(req.URL.Path, "/v1/internal/ui/node/")
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
2015-02-11 21:35:46 +00:00
|
|
|
if args.Node == "" {
|
2022-01-31 16:17:35 +00:00
|
|
|
return nil, BadRequestError{Reason: "Missing node name"}
|
2014-04-28 22:09:46 +00:00
|
|
|
}
|
|
|
|
|
2015-02-11 21:35:46 +00:00
|
|
|
// Make the RPC request
|
|
|
|
var out structs.IndexedNodeDump
|
|
|
|
defer setMeta(resp, &out.QueryMeta)
|
|
|
|
RPC:
|
|
|
|
if err := s.agent.RPC("Internal.NodeInfo", &args, &out); err != nil {
|
|
|
|
// Retry the request allowing stale data if no leader
|
|
|
|
if strings.Contains(err.Error(), structs.ErrNoLeader.Error()) && !args.AllowStale {
|
|
|
|
args.AllowStale = true
|
|
|
|
goto RPC
|
|
|
|
}
|
2014-04-28 22:09:46 +00:00
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
// Return only the first entry
|
2015-02-11 21:35:46 +00:00
|
|
|
if len(out.Dump) > 0 {
|
2015-11-15 05:05:37 +00:00
|
|
|
info := out.Dump[0]
|
|
|
|
if info.Services == nil {
|
|
|
|
info.Services = make([]*structs.NodeService, 0)
|
|
|
|
}
|
|
|
|
if info.Checks == nil {
|
|
|
|
info.Checks = make([]*structs.HealthCheck, 0)
|
|
|
|
}
|
|
|
|
return info, nil
|
2014-04-28 22:09:46 +00:00
|
|
|
}
|
2017-07-10 16:40:00 +00:00
|
|
|
|
2017-07-11 14:13:29 +00:00
|
|
|
resp.WriteHeader(http.StatusNotFound)
|
2014-04-28 22:09:46 +00:00
|
|
|
return nil, nil
|
|
|
|
}
|
|
|
|
|
2022-03-22 23:58:41 +00:00
|
|
|
// UICatalogOverview is used to get a high-level overview of the health of nodes, services,
|
|
|
|
// and checks in the datacenter.
|
|
|
|
func (s *HTTPHandlers) UICatalogOverview(resp http.ResponseWriter, req *http.Request) (interface{}, error) {
|
|
|
|
// Parse arguments
|
|
|
|
args := structs.DCSpecificRequest{}
|
|
|
|
if done := s.parse(resp, req, &args.Datacenter, &args.QueryOptions); done {
|
|
|
|
return nil, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// Make the RPC request
|
|
|
|
var out structs.CatalogSummary
|
|
|
|
if err := s.agent.RPC("Internal.CatalogOverview", &args, &out); err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
return out, nil
|
|
|
|
}
|
|
|
|
|
2014-04-28 22:52:37 +00:00
|
|
|
// UIServices is used to list the services in a given datacenter. We return a
|
|
|
|
// ServiceSummary which provides overview information for the service
|
2020-09-04 18:42:15 +00:00
|
|
|
func (s *HTTPHandlers) UIServices(resp http.ResponseWriter, req *http.Request) (interface{}, error) {
|
2015-02-11 21:35:46 +00:00
|
|
|
// Parse arguments
|
2019-06-20 19:04:39 +00:00
|
|
|
args := structs.ServiceDumpRequest{}
|
2015-02-11 21:35:46 +00:00
|
|
|
if done := s.parse(resp, req, &args.Datacenter, &args.QueryOptions); done {
|
|
|
|
return nil, nil
|
|
|
|
}
|
2014-04-28 22:52:37 +00:00
|
|
|
|
2019-12-10 02:26:41 +00:00
|
|
|
if err := s.parseEntMeta(req, &args.EnterpriseMeta); err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
2019-04-16 16:00:15 +00:00
|
|
|
s.parseFilter(req, &args.Filter)
|
|
|
|
|
2015-02-11 21:35:46 +00:00
|
|
|
// Make the RPC request
|
2020-07-30 16:21:11 +00:00
|
|
|
var out structs.IndexedNodesWithGateways
|
2015-02-11 21:35:46 +00:00
|
|
|
defer setMeta(resp, &out.QueryMeta)
|
|
|
|
RPC:
|
2019-04-16 16:00:15 +00:00
|
|
|
if err := s.agent.RPC("Internal.ServiceDump", &args, &out); err != nil {
|
2015-02-11 21:35:46 +00:00
|
|
|
// Retry the request allowing stale data if no leader
|
|
|
|
if strings.Contains(err.Error(), structs.ErrNoLeader.Error()) && !args.AllowStale {
|
|
|
|
args.AllowStale = true
|
|
|
|
goto RPC
|
|
|
|
}
|
2014-04-28 22:52:37 +00:00
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
2020-09-30 14:23:19 +00:00
|
|
|
// Store the names of the gateways associated with each service
|
|
|
|
var (
|
|
|
|
serviceGateways = make(map[structs.ServiceName][]structs.ServiceName)
|
|
|
|
numLinkedServices = make(map[structs.ServiceName]int)
|
|
|
|
)
|
|
|
|
for _, gs := range out.Gateways {
|
|
|
|
serviceGateways[gs.Service] = append(serviceGateways[gs.Service], gs.Gateway)
|
|
|
|
numLinkedServices[gs.Gateway] += 1
|
|
|
|
}
|
|
|
|
|
|
|
|
summaries, hasProxy := summarizeServices(out.Nodes.ToServiceDump(), nil, "")
|
|
|
|
sorted := prepSummaryOutput(summaries, false)
|
|
|
|
|
2020-12-15 16:52:00 +00:00
|
|
|
// Ensure at least a zero length slice
|
|
|
|
result := make([]*ServiceListingSummary, 0)
|
2020-09-30 14:23:19 +00:00
|
|
|
for _, svc := range sorted {
|
|
|
|
sum := ServiceListingSummary{ServiceSummary: *svc}
|
|
|
|
|
|
|
|
sn := structs.NewServiceName(svc.Name, &svc.EnterpriseMeta)
|
|
|
|
if hasProxy[sn] {
|
|
|
|
sum.ConnectedWithProxy = true
|
|
|
|
}
|
|
|
|
|
|
|
|
// Verify that at least one of the gateways linked by config entry has an instance registered in the catalog
|
|
|
|
for _, gw := range serviceGateways[sn] {
|
|
|
|
if s := summaries[gw]; s != nil && sum.InstanceCount > 0 {
|
|
|
|
sum.ConnectedWithGateway = true
|
|
|
|
}
|
|
|
|
}
|
|
|
|
sum.GatewayConfig.AssociatedServiceCount = numLinkedServices[sn]
|
|
|
|
|
|
|
|
result = append(result, &sum)
|
|
|
|
}
|
|
|
|
return result, nil
|
2014-04-28 22:52:37 +00:00
|
|
|
}
|
|
|
|
|
2020-05-11 17:35:17 +00:00
|
|
|
// UIGatewayServices is used to query all the nodes for services associated with a gateway along with their gateway config
|
2020-09-04 18:42:15 +00:00
|
|
|
func (s *HTTPHandlers) UIGatewayServicesNodes(resp http.ResponseWriter, req *http.Request) (interface{}, error) {
|
2020-05-11 17:35:17 +00:00
|
|
|
// Parse arguments
|
|
|
|
args := structs.ServiceSpecificRequest{}
|
|
|
|
if err := s.parseEntMetaNoWildcard(req, &args.EnterpriseMeta); err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
if done := s.parse(resp, req, &args.Datacenter, &args.QueryOptions); done {
|
|
|
|
return nil, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// Pull out the service name
|
2022-01-28 20:01:47 +00:00
|
|
|
var err error
|
|
|
|
args.ServiceName, err = getPathSuffixUnescaped(req.URL.Path, "/v1/internal/ui/gateway-services-nodes/")
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
2020-05-11 17:35:17 +00:00
|
|
|
if args.ServiceName == "" {
|
2022-01-31 16:17:35 +00:00
|
|
|
return nil, BadRequestError{Reason: "Missing gateway name"}
|
2020-05-11 17:35:17 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Make the RPC request
|
|
|
|
var out structs.IndexedServiceDump
|
|
|
|
defer setMeta(resp, &out.QueryMeta)
|
|
|
|
RPC:
|
|
|
|
if err := s.agent.RPC("Internal.GatewayServiceDump", &args, &out); err != nil {
|
|
|
|
// Retry the request allowing stale data if no leader
|
|
|
|
if strings.Contains(err.Error(), structs.ErrNoLeader.Error()) && !args.AllowStale {
|
|
|
|
args.AllowStale = true
|
|
|
|
goto RPC
|
|
|
|
}
|
|
|
|
return nil, err
|
|
|
|
}
|
2020-06-22 19:14:12 +00:00
|
|
|
|
2020-09-30 14:23:19 +00:00
|
|
|
summaries, _ := summarizeServices(out.Dump, s.agent.config, args.Datacenter)
|
2021-01-20 16:59:02 +00:00
|
|
|
|
|
|
|
prepped := prepSummaryOutput(summaries, false)
|
|
|
|
if prepped == nil {
|
|
|
|
prepped = make([]*ServiceSummary, 0)
|
|
|
|
}
|
|
|
|
return prepped, nil
|
2020-05-11 17:35:17 +00:00
|
|
|
}
|
|
|
|
|
2020-10-02 00:10:49 +00:00
|
|
|
// UIServiceTopology returns the list of upstreams and downstreams for a Connect enabled service.
|
2020-10-02 16:05:27 +00:00
|
|
|
// - Downstreams are services that list the given service as an upstream
|
|
|
|
// - Upstreams are the upstreams defined in the given service's proxy registrations
|
2020-09-30 14:23:19 +00:00
|
|
|
func (s *HTTPHandlers) UIServiceTopology(resp http.ResponseWriter, req *http.Request) (interface{}, error) {
|
|
|
|
// Parse arguments
|
|
|
|
args := structs.ServiceSpecificRequest{}
|
|
|
|
if done := s.parse(resp, req, &args.Datacenter, &args.QueryOptions); done {
|
|
|
|
return nil, nil
|
|
|
|
}
|
|
|
|
if err := s.parseEntMeta(req, &args.EnterpriseMeta); err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
2020-07-29 15:10:06 +00:00
|
|
|
|
2022-01-28 20:01:47 +00:00
|
|
|
var err error
|
|
|
|
args.ServiceName, err = getPathSuffixUnescaped(req.URL.Path, "/v1/internal/ui/service-topology/")
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
2020-09-30 14:23:19 +00:00
|
|
|
if args.ServiceName == "" {
|
2022-01-31 16:17:35 +00:00
|
|
|
return nil, BadRequestError{Reason: "Missing service name"}
|
2020-09-30 14:23:19 +00:00
|
|
|
}
|
|
|
|
|
2020-10-08 23:31:54 +00:00
|
|
|
kind, ok := req.URL.Query()["kind"]
|
|
|
|
if !ok {
|
2022-01-31 16:17:35 +00:00
|
|
|
return nil, BadRequestError{Reason: "Missing service kind"}
|
2020-10-08 23:31:54 +00:00
|
|
|
}
|
|
|
|
args.ServiceKind = structs.ServiceKind(kind[0])
|
|
|
|
|
|
|
|
switch args.ServiceKind {
|
|
|
|
case structs.ServiceKindTypical, structs.ServiceKindIngressGateway:
|
|
|
|
// allowed
|
|
|
|
default:
|
2022-01-31 16:17:35 +00:00
|
|
|
return nil, BadRequestError{Reason: fmt.Sprintf("Unsupported service kind %q", args.ServiceKind)}
|
2020-10-08 23:31:54 +00:00
|
|
|
}
|
|
|
|
|
2020-09-30 14:23:19 +00:00
|
|
|
// Make the RPC request
|
|
|
|
var out structs.IndexedServiceTopology
|
|
|
|
defer setMeta(resp, &out.QueryMeta)
|
|
|
|
RPC:
|
|
|
|
if err := s.agent.RPC("Internal.ServiceTopology", &args, &out); err != nil {
|
|
|
|
// Retry the request allowing stale data if no leader
|
|
|
|
if strings.Contains(err.Error(), structs.ErrNoLeader.Error()) && !args.AllowStale {
|
|
|
|
args.AllowStale = true
|
|
|
|
goto RPC
|
|
|
|
}
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
upstreams, _ := summarizeServices(out.ServiceTopology.Upstreams.ToServiceDump(), nil, "")
|
|
|
|
downstreams, _ := summarizeServices(out.ServiceTopology.Downstreams.ToServiceDump(), nil, "")
|
|
|
|
|
2020-10-08 00:35:34 +00:00
|
|
|
var (
|
2020-10-23 16:45:41 +00:00
|
|
|
upstreamResp = make([]*ServiceTopologySummary, 0)
|
|
|
|
downstreamResp = make([]*ServiceTopologySummary, 0)
|
2020-10-08 00:35:34 +00:00
|
|
|
)
|
|
|
|
|
|
|
|
// Sort and attach intention data for upstreams and downstreams
|
|
|
|
sortedUpstreams := prepSummaryOutput(upstreams, true)
|
|
|
|
for _, svc := range sortedUpstreams {
|
|
|
|
sn := structs.NewServiceName(svc.Name, &svc.EnterpriseMeta)
|
|
|
|
sum := ServiceTopologySummary{
|
|
|
|
ServiceSummary: *svc,
|
|
|
|
Intention: out.ServiceTopology.UpstreamDecisions[sn.String()],
|
2021-04-13 16:12:13 +00:00
|
|
|
Source: out.ServiceTopology.UpstreamSources[sn.String()],
|
2020-10-08 00:35:34 +00:00
|
|
|
}
|
|
|
|
upstreamResp = append(upstreamResp, &sum)
|
|
|
|
}
|
2021-08-25 19:20:32 +00:00
|
|
|
for k, v := range out.ServiceTopology.UpstreamSources {
|
|
|
|
if v == structs.TopologySourceRoutingConfig {
|
|
|
|
sn := structs.ServiceNameFromString(k)
|
|
|
|
sum := ServiceTopologySummary{
|
|
|
|
ServiceSummary: ServiceSummary{
|
|
|
|
Datacenter: args.Datacenter,
|
|
|
|
Name: sn.Name,
|
|
|
|
EnterpriseMeta: sn.EnterpriseMeta,
|
|
|
|
},
|
|
|
|
Intention: out.ServiceTopology.UpstreamDecisions[sn.String()],
|
|
|
|
Source: out.ServiceTopology.UpstreamSources[sn.String()],
|
|
|
|
}
|
|
|
|
upstreamResp = append(upstreamResp, &sum)
|
|
|
|
}
|
|
|
|
}
|
2020-10-08 00:35:34 +00:00
|
|
|
|
|
|
|
sortedDownstreams := prepSummaryOutput(downstreams, true)
|
|
|
|
for _, svc := range sortedDownstreams {
|
|
|
|
sn := structs.NewServiceName(svc.Name, &svc.EnterpriseMeta)
|
|
|
|
sum := ServiceTopologySummary{
|
|
|
|
ServiceSummary: *svc,
|
|
|
|
Intention: out.ServiceTopology.DownstreamDecisions[sn.String()],
|
2021-04-13 16:12:13 +00:00
|
|
|
Source: out.ServiceTopology.DownstreamSources[sn.String()],
|
2020-10-08 00:35:34 +00:00
|
|
|
}
|
|
|
|
downstreamResp = append(downstreamResp, &sum)
|
|
|
|
}
|
|
|
|
|
|
|
|
topo := ServiceTopology{
|
2021-04-13 16:12:13 +00:00
|
|
|
TransparentProxy: out.ServiceTopology.TransparentProxy,
|
|
|
|
Protocol: out.ServiceTopology.MetricsProtocol,
|
|
|
|
Upstreams: upstreamResp,
|
|
|
|
Downstreams: downstreamResp,
|
|
|
|
FilteredByACLs: out.FilteredByACLs,
|
2020-09-30 14:23:19 +00:00
|
|
|
}
|
2020-10-08 00:35:34 +00:00
|
|
|
return topo, nil
|
2020-09-30 14:23:19 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
func summarizeServices(dump structs.ServiceDump, cfg *config.RuntimeConfig, dc string) (map[structs.ServiceName]*ServiceSummary, map[structs.ServiceName]bool) {
|
|
|
|
var (
|
|
|
|
summary = make(map[structs.ServiceName]*ServiceSummary)
|
|
|
|
hasProxy = make(map[structs.ServiceName]bool)
|
|
|
|
)
|
2020-07-29 15:10:06 +00:00
|
|
|
|
2020-07-30 16:21:11 +00:00
|
|
|
getService := func(service structs.ServiceName) *ServiceSummary {
|
2014-04-28 22:52:37 +00:00
|
|
|
serv, ok := summary[service]
|
|
|
|
if !ok {
|
2019-12-10 02:26:41 +00:00
|
|
|
serv = &ServiceSummary{
|
2020-07-30 16:21:11 +00:00
|
|
|
Name: service.Name,
|
2019-12-10 02:26:41 +00:00
|
|
|
EnterpriseMeta: service.EnterpriseMeta,
|
2020-03-09 15:56:19 +00:00
|
|
|
// the other code will increment this unconditionally so we
|
|
|
|
// shouldn't initialize it to 1
|
|
|
|
InstanceCount: 0,
|
2019-12-10 02:26:41 +00:00
|
|
|
}
|
2014-04-28 22:52:37 +00:00
|
|
|
summary[service] = serv
|
|
|
|
}
|
|
|
|
return serv
|
|
|
|
}
|
|
|
|
|
2019-04-16 16:00:15 +00:00
|
|
|
for _, csn := range dump {
|
2020-09-30 14:23:19 +00:00
|
|
|
if cfg != nil && csn.GatewayService != nil {
|
2020-06-22 19:14:12 +00:00
|
|
|
gwsvc := csn.GatewayService
|
2020-07-30 16:21:11 +00:00
|
|
|
sum := getService(gwsvc.Service)
|
2020-09-29 14:59:18 +00:00
|
|
|
modifySummaryForGatewayService(cfg, dc, sum, gwsvc)
|
2020-05-11 17:35:17 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Will happen in cases where we only have the GatewayServices mapping
|
|
|
|
if csn.Service == nil {
|
|
|
|
continue
|
|
|
|
}
|
2020-09-30 14:23:19 +00:00
|
|
|
sn := structs.NewServiceName(csn.Service.Service, &csn.Service.EnterpriseMeta)
|
|
|
|
sum := getService(sn)
|
2020-05-11 17:35:17 +00:00
|
|
|
|
2019-04-16 16:00:15 +00:00
|
|
|
svc := csn.Service
|
|
|
|
sum.Nodes = append(sum.Nodes, csn.Node.Node)
|
|
|
|
sum.Kind = svc.Kind
|
2020-09-30 14:23:19 +00:00
|
|
|
sum.Datacenter = csn.Node.Datacenter
|
2020-03-09 15:56:19 +00:00
|
|
|
sum.InstanceCount += 1
|
2022-02-16 21:51:54 +00:00
|
|
|
sum.ConnectNative = svc.Connect.Native
|
2020-03-27 14:57:46 +00:00
|
|
|
if svc.Kind == structs.ServiceKindConnectProxy {
|
2020-09-30 14:23:19 +00:00
|
|
|
sn := structs.NewServiceName(svc.Proxy.DestinationServiceName, &svc.EnterpriseMeta)
|
|
|
|
hasProxy[sn] = true
|
|
|
|
|
|
|
|
destination := getService(sn)
|
|
|
|
for _, check := range csn.Checks {
|
|
|
|
cid := structs.NewCheckID(check.CheckID, &check.EnterpriseMeta)
|
|
|
|
uid := structs.UniqueID(csn.Node.Node, cid.String())
|
|
|
|
if destination.checks == nil {
|
|
|
|
destination.checks = make(map[string]*structs.HealthCheck)
|
|
|
|
}
|
|
|
|
destination.checks[uid] = check
|
|
|
|
}
|
2021-04-13 16:12:13 +00:00
|
|
|
|
|
|
|
// Only consider the target service to be transparent when all its proxy instances are in that mode.
|
|
|
|
// This is done because the flag is used to display warnings about proxies needing to enable
|
|
|
|
// transparent proxy mode. If ANY instance isn't in the right mode then the warming applies.
|
|
|
|
if svc.Proxy.Mode == structs.ProxyModeTransparent && !destination.transparentProxySet {
|
|
|
|
destination.TransparentProxy = true
|
|
|
|
}
|
|
|
|
if svc.Proxy.Mode != structs.ProxyModeTransparent {
|
|
|
|
destination.TransparentProxy = false
|
|
|
|
}
|
|
|
|
destination.transparentProxySet = true
|
2020-03-27 14:57:46 +00:00
|
|
|
}
|
2019-04-16 16:00:15 +00:00
|
|
|
for _, tag := range svc.Tags {
|
|
|
|
found := false
|
|
|
|
for _, existing := range sum.Tags {
|
|
|
|
if existing == tag {
|
|
|
|
found = true
|
|
|
|
break
|
2018-09-06 19:19:05 +00:00
|
|
|
}
|
|
|
|
}
|
2019-04-16 16:00:15 +00:00
|
|
|
if !found {
|
|
|
|
sum.Tags = append(sum.Tags, tag)
|
|
|
|
}
|
2014-04-28 22:52:37 +00:00
|
|
|
}
|
2019-04-16 16:00:15 +00:00
|
|
|
|
|
|
|
// If there is an external source, add it to the list of external
|
|
|
|
// sources. We only want to add unique sources so there is extra
|
|
|
|
// accounting here with an unexported field to maintain the set
|
|
|
|
// of sources.
|
2020-10-08 00:35:34 +00:00
|
|
|
if len(svc.Meta) > 0 && svc.Meta[structs.MetaExternalSource] != "" {
|
|
|
|
source := svc.Meta[structs.MetaExternalSource]
|
2019-04-16 16:00:15 +00:00
|
|
|
if sum.externalSourceSet == nil {
|
|
|
|
sum.externalSourceSet = make(map[string]struct{})
|
2014-04-28 22:52:37 +00:00
|
|
|
}
|
2019-04-16 16:00:15 +00:00
|
|
|
if _, ok := sum.externalSourceSet[source]; !ok {
|
|
|
|
sum.externalSourceSet[source] = struct{}{}
|
|
|
|
sum.ExternalSources = append(sum.ExternalSources, source)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
for _, check := range csn.Checks {
|
2020-09-30 14:23:19 +00:00
|
|
|
cid := structs.NewCheckID(check.CheckID, &check.EnterpriseMeta)
|
|
|
|
uid := structs.UniqueID(csn.Node.Node, cid.String())
|
|
|
|
if sum.checks == nil {
|
|
|
|
sum.checks = make(map[string]*structs.HealthCheck)
|
|
|
|
}
|
|
|
|
sum.checks[uid] = check
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return summary, hasProxy
|
|
|
|
}
|
|
|
|
|
|
|
|
func prepSummaryOutput(summaries map[structs.ServiceName]*ServiceSummary, excludeSidecars bool) []*ServiceSummary {
|
|
|
|
var resp []*ServiceSummary
|
2021-01-20 16:59:02 +00:00
|
|
|
// Ensure at least a zero length slice
|
|
|
|
resp = make([]*ServiceSummary, 0)
|
2020-09-30 14:23:19 +00:00
|
|
|
|
|
|
|
// Collect and sort resp for display
|
|
|
|
for _, sum := range summaries {
|
|
|
|
sort.Strings(sum.Nodes)
|
|
|
|
sort.Strings(sum.Tags)
|
|
|
|
|
|
|
|
for _, chk := range sum.checks {
|
|
|
|
switch chk.Status {
|
2019-04-16 16:00:15 +00:00
|
|
|
case api.HealthPassing:
|
|
|
|
sum.ChecksPassing++
|
|
|
|
case api.HealthWarning:
|
|
|
|
sum.ChecksWarning++
|
|
|
|
case api.HealthCritical:
|
|
|
|
sum.ChecksCritical++
|
2014-04-28 22:52:37 +00:00
|
|
|
}
|
|
|
|
}
|
2020-10-08 15:47:09 +00:00
|
|
|
if excludeSidecars && sum.Kind != structs.ServiceKindTypical && sum.Kind != structs.ServiceKindIngressGateway {
|
2020-09-30 14:23:19 +00:00
|
|
|
continue
|
2020-07-29 15:10:06 +00:00
|
|
|
}
|
2020-09-30 14:23:19 +00:00
|
|
|
resp = append(resp, sum)
|
2014-04-28 22:52:37 +00:00
|
|
|
}
|
2020-09-30 14:23:19 +00:00
|
|
|
sort.Slice(resp, func(i, j int) bool {
|
|
|
|
return resp[i].LessThan(resp[j])
|
|
|
|
})
|
|
|
|
return resp
|
2014-04-28 22:52:37 +00:00
|
|
|
}
|
2020-06-22 19:14:12 +00:00
|
|
|
|
|
|
|
func modifySummaryForGatewayService(
|
|
|
|
cfg *config.RuntimeConfig,
|
2020-09-22 18:34:09 +00:00
|
|
|
datacenter string,
|
2020-06-22 19:14:12 +00:00
|
|
|
sum *ServiceSummary,
|
|
|
|
gwsvc *structs.GatewayService,
|
|
|
|
) {
|
|
|
|
var dnsAddresses []string
|
|
|
|
for _, domain := range []string{cfg.DNSDomain, cfg.DNSAltDomain} {
|
|
|
|
// If the domain is empty, do not use it to construct a valid DNS
|
|
|
|
// address
|
|
|
|
if domain == "" {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
dnsAddresses = append(dnsAddresses, serviceIngressDNSName(
|
|
|
|
gwsvc.Service.Name,
|
2020-09-22 18:34:09 +00:00
|
|
|
datacenter,
|
2020-06-22 19:14:12 +00:00
|
|
|
domain,
|
|
|
|
&gwsvc.Service.EnterpriseMeta,
|
|
|
|
))
|
|
|
|
}
|
|
|
|
|
|
|
|
for _, addr := range gwsvc.Addresses(dnsAddresses) {
|
|
|
|
// check for duplicates, a service will have a ServiceInfo struct for
|
|
|
|
// every instance that is registered.
|
|
|
|
if _, ok := sum.GatewayConfig.addressesSet[addr]; !ok {
|
|
|
|
if sum.GatewayConfig.addressesSet == nil {
|
|
|
|
sum.GatewayConfig.addressesSet = make(map[string]struct{})
|
|
|
|
}
|
|
|
|
sum.GatewayConfig.addressesSet[addr] = struct{}{}
|
|
|
|
sum.GatewayConfig.Addresses = append(
|
|
|
|
sum.GatewayConfig.Addresses, addr,
|
|
|
|
)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2020-08-11 23:20:41 +00:00
|
|
|
|
|
|
|
// GET /v1/internal/ui/gateway-intentions/:gateway
|
2020-09-04 18:42:15 +00:00
|
|
|
func (s *HTTPHandlers) UIGatewayIntentions(resp http.ResponseWriter, req *http.Request) (interface{}, error) {
|
2020-08-11 23:20:41 +00:00
|
|
|
var args structs.IntentionQueryRequest
|
|
|
|
if done := s.parse(resp, req, &args.Datacenter, &args.QueryOptions); done {
|
|
|
|
return nil, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
var entMeta structs.EnterpriseMeta
|
|
|
|
if err := s.parseEntMetaNoWildcard(req, &entMeta); err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
// Pull out the service name
|
2022-01-28 20:01:47 +00:00
|
|
|
var err error
|
|
|
|
name, err := getPathSuffixUnescaped(req.URL.Path, "/v1/internal/ui/gateway-intentions/")
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
2020-08-11 23:20:41 +00:00
|
|
|
if name == "" {
|
2022-01-31 16:17:35 +00:00
|
|
|
return nil, BadRequestError{Reason: "Missing gateway name"}
|
2020-08-11 23:20:41 +00:00
|
|
|
}
|
|
|
|
args.Match = &structs.IntentionQueryMatch{
|
|
|
|
Type: structs.IntentionMatchDestination,
|
|
|
|
Entries: []structs.IntentionMatchEntry{
|
|
|
|
{
|
|
|
|
Namespace: entMeta.NamespaceOrEmpty(),
|
2021-09-16 19:31:19 +00:00
|
|
|
Partition: entMeta.PartitionOrDefault(),
|
2020-08-11 23:20:41 +00:00
|
|
|
Name: name,
|
|
|
|
},
|
|
|
|
},
|
|
|
|
}
|
|
|
|
|
|
|
|
var reply structs.IndexedIntentions
|
|
|
|
|
|
|
|
defer setMeta(resp, &reply.QueryMeta)
|
|
|
|
if err := s.agent.RPC("Internal.GatewayIntentions", args, &reply); err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
return reply.Intentions, nil
|
|
|
|
}
|
2020-09-24 10:13:14 +00:00
|
|
|
|
|
|
|
// UIMetricsProxy handles the /v1/internal/ui/metrics-proxy/ endpoint which, if
|
|
|
|
// configured, provides a simple read-only HTTP proxy to a single metrics
|
|
|
|
// backend to expose it to the UI.
|
|
|
|
func (s *HTTPHandlers) UIMetricsProxy(resp http.ResponseWriter, req *http.Request) (interface{}, error) {
|
|
|
|
// Check the UI was enabled at agent startup (note this is not reloadable
|
|
|
|
// currently).
|
|
|
|
if !s.IsUIEnabled() {
|
|
|
|
return nil, NotFoundError{Reason: "UI is not enabled"}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Load reloadable proxy config
|
|
|
|
cfg, ok := s.metricsProxyCfg.Load().(config.UIMetricsProxy)
|
|
|
|
if !ok || cfg.BaseURL == "" {
|
|
|
|
// Proxy not configured
|
|
|
|
return nil, NotFoundError{Reason: "Metrics proxy is not enabled"}
|
|
|
|
}
|
|
|
|
|
2020-11-04 18:50:03 +00:00
|
|
|
// Fetch the ACL token, if provided, but ONLY from headers since other
|
|
|
|
// metrics proxies might use a ?token query string parameter for something.
|
|
|
|
var token string
|
|
|
|
s.parseTokenFromHeaders(req, &token)
|
|
|
|
|
|
|
|
// Clear the token from the headers so we don't end up proxying it.
|
|
|
|
s.clearTokenFromHeaders(req)
|
|
|
|
|
|
|
|
var entMeta structs.EnterpriseMeta
|
2021-09-03 12:37:23 +00:00
|
|
|
if err := s.parseEntMetaPartition(req, &entMeta); err != nil {
|
2021-08-19 20:09:42 +00:00
|
|
|
return nil, err
|
|
|
|
}
|
2021-04-14 16:39:35 +00:00
|
|
|
authz, err := s.agent.delegate.ResolveTokenAndDefaultMeta(token, &entMeta, nil)
|
2020-11-04 18:50:03 +00:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
2021-07-30 18:55:35 +00:00
|
|
|
// This endpoint requires wildcard read on all services and all nodes.
|
|
|
|
//
|
|
|
|
// In enterprise it requires this _in all namespaces_ too.
|
2021-08-25 18:43:11 +00:00
|
|
|
//
|
2021-12-10 23:58:17 +00:00
|
|
|
// In enterprise it requires this _in all namespaces and partitions_ too.
|
2021-07-30 18:55:35 +00:00
|
|
|
var authzContext acl.AuthorizerContext
|
2021-12-10 23:58:17 +00:00
|
|
|
wildcardEntMeta := structs.WildcardEnterpriseMetaInPartition(structs.WildcardSpecifier)
|
|
|
|
wildcardEntMeta.FillAuthzContext(&authzContext)
|
2020-11-04 18:50:03 +00:00
|
|
|
|
2022-03-11 02:48:27 +00:00
|
|
|
if err := authz.ToAllowAuthorizer().NodeReadAllAllowed(&authzContext); err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
if err := authz.ToAllowAuthorizer().ServiceReadAllAllowed(&authzContext); err != nil {
|
|
|
|
return nil, err
|
2020-11-04 18:50:03 +00:00
|
|
|
}
|
|
|
|
|
2020-09-24 10:13:14 +00:00
|
|
|
log := s.agent.logger.Named(logging.UIMetricsProxy)
|
|
|
|
|
|
|
|
// Construct the new URL from the path and the base path. Note we do this here
|
|
|
|
// not in the Director function below because we can handle any errors cleanly
|
|
|
|
// here.
|
|
|
|
|
|
|
|
// Replace prefix in the path
|
2022-01-28 20:01:47 +00:00
|
|
|
subPath, err := getPathSuffixUnescaped(req.URL.Path, "/v1/internal/ui/metrics-proxy")
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
2020-09-24 10:13:14 +00:00
|
|
|
|
|
|
|
// Append that to the BaseURL (which might contain a path prefix component)
|
|
|
|
newURL := cfg.BaseURL + subPath
|
|
|
|
|
|
|
|
// Parse it into a new URL
|
|
|
|
u, err := url.Parse(newURL)
|
|
|
|
if err != nil {
|
|
|
|
log.Error("couldn't parse target URL", "base_url", cfg.BaseURL, "path", subPath)
|
|
|
|
return nil, BadRequestError{Reason: "Invalid path."}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Clean the new URL path to prevent path traversal attacks and remove any
|
|
|
|
// double slashes etc.
|
|
|
|
u.Path = path.Clean(u.Path)
|
|
|
|
|
2020-10-30 21:49:54 +00:00
|
|
|
if len(cfg.PathAllowlist) > 0 {
|
|
|
|
// This could be done better with a map, but for the prometheus default
|
|
|
|
// integration this list has two items in it, so the straight iteration
|
|
|
|
// isn't awful.
|
|
|
|
denied := true
|
|
|
|
for _, allowedPath := range cfg.PathAllowlist {
|
|
|
|
if u.Path == allowedPath {
|
|
|
|
denied = false
|
|
|
|
break
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if denied {
|
|
|
|
log.Error("target URL path is not allowed",
|
|
|
|
"base_url", cfg.BaseURL,
|
|
|
|
"path", subPath,
|
|
|
|
"target_url", u.String(),
|
|
|
|
"path_allowlist", cfg.PathAllowlist,
|
|
|
|
)
|
|
|
|
resp.WriteHeader(http.StatusForbidden)
|
|
|
|
return nil, nil
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-10-09 11:25:17 +00:00
|
|
|
// Pass through query params
|
|
|
|
u.RawQuery = req.URL.RawQuery
|
|
|
|
|
2020-09-24 10:13:14 +00:00
|
|
|
// Validate that the full BaseURL is still a prefix - if there was a path
|
|
|
|
// prefix on the BaseURL but an attacker tried to circumvent it with path
|
|
|
|
// traversal then the Clean above would have resolve the /../ components back
|
|
|
|
// to the actual path which means part of the prefix will now be missing.
|
|
|
|
//
|
|
|
|
// Note that in practice this is not currently possible since any /../ in the
|
|
|
|
// path would have already been resolved by the API server mux and so not even
|
|
|
|
// hit this handler. Any /../ that are far enough into the path to hit this
|
|
|
|
// handler, can't backtrack far enough to eat into the BaseURL either. But we
|
|
|
|
// leave this in anyway in case something changes in the future.
|
|
|
|
if !strings.HasPrefix(u.String(), cfg.BaseURL) {
|
|
|
|
log.Error("target URL escaped from base path",
|
|
|
|
"base_url", cfg.BaseURL,
|
|
|
|
"path", subPath,
|
|
|
|
"target_url", u.String(),
|
|
|
|
)
|
|
|
|
return nil, BadRequestError{Reason: "Invalid path."}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Add any configured headers
|
|
|
|
for _, h := range cfg.AddHeaders {
|
|
|
|
req.Header.Set(h.Name, h.Value)
|
|
|
|
}
|
|
|
|
|
2020-10-09 11:25:17 +00:00
|
|
|
log.Debug("proxying request", "to", u.String())
|
|
|
|
|
2020-09-24 10:13:14 +00:00
|
|
|
proxy := httputil.ReverseProxy{
|
|
|
|
Director: func(r *http.Request) {
|
|
|
|
r.URL = u
|
|
|
|
},
|
|
|
|
ErrorLog: log.StandardLogger(&hclog.StandardLoggerOptions{
|
|
|
|
InferLevels: true,
|
|
|
|
}),
|
|
|
|
}
|
|
|
|
|
|
|
|
proxy.ServeHTTP(resp, req)
|
|
|
|
return nil, nil
|
|
|
|
}
|