2023-03-28 18:39:22 +00:00
|
|
|
// Copyright (c) HashiCorp, Inc.
|
|
|
|
// SPDX-License-Identifier: MPL-2.0
|
|
|
|
|
2014-04-23 19:57:06 +00:00
|
|
|
package agent
|
|
|
|
|
2014-04-28 21:52:30 +00:00
|
|
|
import (
|
Use fmt.Fprint/Fprintf/Fprintln
Used the following rewrite rules:
gofmt -w -r 'resp.Write([]byte(fmt.Sprintf(a, b, c, d))) -> fmt.Fprintf(resp, a, b, c, d)' *.go
gofmt -w -r 'resp.Write([]byte(fmt.Sprintf(a, b, c))) -> fmt.Fprintf(resp, a, b, c)' *.go
gofmt -w -r 'resp.Write([]byte(fmt.Sprintf(a, b))) -> fmt.Fprintf(resp, a, b)' *.go
gofmt -w -r 'resp.Write([]byte(fmt.Sprintf(a))) -> fmt.Fprint(resp, a)' *.go
gofmt -w -r 'resp.Write([]byte(a + "\n")) -> fmt.Fprintln(resp, a)' *.go
gofmt -w -r 'resp.Write([]byte(a)) -> fmt.Fprint(resp, a)' *.go
2017-04-20 14:07:42 +00:00
|
|
|
"fmt"
|
2014-04-28 21:52:30 +00:00
|
|
|
"net/http"
|
2020-09-24 10:13:14 +00:00
|
|
|
"net/http/httputil"
|
|
|
|
"net/url"
|
|
|
|
"path"
|
2014-04-28 22:52:37 +00:00
|
|
|
"sort"
|
2014-04-28 21:52:30 +00:00
|
|
|
"strings"
|
2015-02-11 21:35:46 +00:00
|
|
|
|
2021-07-30 18:55:35 +00:00
|
|
|
"github.com/hashicorp/go-hclog"
|
2023-07-12 19:34:39 +00:00
|
|
|
"github.com/hashicorp/serf/serf"
|
2021-07-30 18:55:35 +00:00
|
|
|
|
2020-11-04 18:50:03 +00:00
|
|
|
"github.com/hashicorp/consul/acl"
|
2020-06-22 19:14:12 +00:00
|
|
|
"github.com/hashicorp/consul/agent/config"
|
2023-07-12 19:34:39 +00:00
|
|
|
"github.com/hashicorp/consul/agent/consul"
|
|
|
|
"github.com/hashicorp/consul/agent/metadata"
|
2017-07-06 10:34:00 +00:00
|
|
|
"github.com/hashicorp/consul/agent/structs"
|
2017-04-19 23:00:11 +00:00
|
|
|
"github.com/hashicorp/consul/api"
|
2020-09-24 10:13:14 +00:00
|
|
|
"github.com/hashicorp/consul/logging"
|
2014-04-28 21:52:30 +00:00
|
|
|
)
|
|
|
|
|
2020-09-30 14:23:19 +00:00
|
|
|
// ServiceSummary is used to summarize a service
|
|
|
|
type ServiceSummary struct {
|
2021-04-13 16:12:13 +00:00
|
|
|
Kind structs.ServiceKind `json:",omitempty"`
|
|
|
|
Name string
|
|
|
|
Datacenter string
|
|
|
|
Tags []string
|
|
|
|
Nodes []string
|
|
|
|
ExternalSources []string
|
|
|
|
externalSourceSet map[string]struct{} // internal to track uniqueness
|
|
|
|
checks map[string]*structs.HealthCheck
|
|
|
|
InstanceCount int
|
|
|
|
ChecksPassing int
|
|
|
|
ChecksWarning int
|
|
|
|
ChecksCritical int
|
|
|
|
GatewayConfig GatewayConfig
|
|
|
|
TransparentProxy bool
|
|
|
|
transparentProxySet bool
|
2022-02-16 21:51:54 +00:00
|
|
|
ConnectNative bool
|
2020-09-30 14:23:19 +00:00
|
|
|
|
2022-06-24 22:17:35 +00:00
|
|
|
PeerName string `json:",omitempty"`
|
|
|
|
|
2022-04-05 21:10:06 +00:00
|
|
|
acl.EnterpriseMeta
|
2020-09-30 14:23:19 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
func (s *ServiceSummary) LessThan(other *ServiceSummary) bool {
|
|
|
|
if s.EnterpriseMeta.LessThan(&other.EnterpriseMeta) {
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
return s.Name < other.Name
|
|
|
|
}
|
|
|
|
|
2020-10-08 00:35:34 +00:00
|
|
|
type GatewayConfig struct {
|
|
|
|
AssociatedServiceCount int `json:",omitempty"`
|
|
|
|
Addresses []string `json:",omitempty"`
|
|
|
|
|
|
|
|
// internal to track uniqueness
|
|
|
|
addressesSet map[string]struct{}
|
|
|
|
}
|
|
|
|
|
2020-09-30 14:23:19 +00:00
|
|
|
type ServiceListingSummary struct {
|
|
|
|
ServiceSummary
|
|
|
|
|
|
|
|
ConnectedWithProxy bool
|
|
|
|
ConnectedWithGateway bool
|
|
|
|
}
|
|
|
|
|
2020-10-08 00:35:34 +00:00
|
|
|
type ServiceTopologySummary struct {
|
|
|
|
ServiceSummary
|
2020-09-30 14:23:19 +00:00
|
|
|
|
2021-04-13 16:12:13 +00:00
|
|
|
Source string
|
2020-10-08 00:35:34 +00:00
|
|
|
Intention structs.IntentionDecisionSummary
|
2020-05-11 17:35:17 +00:00
|
|
|
}
|
|
|
|
|
2020-09-30 14:23:19 +00:00
|
|
|
type ServiceTopology struct {
|
2021-04-13 16:12:13 +00:00
|
|
|
Protocol string
|
|
|
|
TransparentProxy bool
|
|
|
|
Upstreams []*ServiceTopologySummary
|
|
|
|
Downstreams []*ServiceTopologySummary
|
|
|
|
FilteredByACLs bool
|
2014-04-28 22:52:37 +00:00
|
|
|
}
|
|
|
|
|
2014-04-28 21:52:30 +00:00
|
|
|
// UINodes is used to list the nodes in a given datacenter. We return a
|
2014-04-28 22:09:46 +00:00
|
|
|
// NodeDump which provides overview information for all the nodes
|
2020-09-04 18:42:15 +00:00
|
|
|
func (s *HTTPHandlers) UINodes(resp http.ResponseWriter, req *http.Request) (interface{}, error) {
|
2015-02-11 21:35:46 +00:00
|
|
|
// Parse arguments
|
|
|
|
args := structs.DCSpecificRequest{}
|
|
|
|
if done := s.parse(resp, req, &args.Datacenter, &args.QueryOptions); done {
|
|
|
|
return nil, nil
|
|
|
|
}
|
2019-12-10 02:26:41 +00:00
|
|
|
|
|
|
|
if err := s.parseEntMeta(req, &args.EnterpriseMeta); err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
2019-04-16 16:00:15 +00:00
|
|
|
s.parseFilter(req, &args.Filter)
|
2014-04-28 21:52:30 +00:00
|
|
|
|
2015-02-11 21:35:46 +00:00
|
|
|
// Make the RPC request
|
|
|
|
var out structs.IndexedNodeDump
|
|
|
|
defer setMeta(resp, &out.QueryMeta)
|
|
|
|
RPC:
|
2022-12-14 15:24:22 +00:00
|
|
|
if err := s.agent.RPC(req.Context(), "Internal.NodeDump", &args, &out); err != nil {
|
2015-02-11 21:35:46 +00:00
|
|
|
// Retry the request allowing stale data if no leader
|
|
|
|
if strings.Contains(err.Error(), structs.ErrNoLeader.Error()) && !args.AllowStale {
|
|
|
|
args.AllowStale = true
|
|
|
|
goto RPC
|
|
|
|
}
|
2014-04-28 21:52:30 +00:00
|
|
|
return nil, err
|
|
|
|
}
|
2015-11-15 05:05:37 +00:00
|
|
|
|
2023-07-12 19:34:39 +00:00
|
|
|
// Get version info for all serf members into a map of key-address,value-version.
|
|
|
|
// This logic of calling 'AgentMembersMapAddrVer()' and inserting version info in this func
|
|
|
|
// can be discarded in future releases ( may be after 3 or 4 minor releases),
|
|
|
|
// when all the nodes are registered with consul-version in nodemeta.
|
|
|
|
var err error
|
|
|
|
mapAddrVer, err := AgentMembersMapAddrVer(s, req)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
2015-11-15 05:05:37 +00:00
|
|
|
// Use empty list instead of nil
|
2023-07-12 19:34:39 +00:00
|
|
|
// Also check if consul-version exists in Meta, else add it
|
2015-11-15 05:05:37 +00:00
|
|
|
for _, info := range out.Dump {
|
|
|
|
if info.Services == nil {
|
|
|
|
info.Services = make([]*structs.NodeService, 0)
|
|
|
|
}
|
|
|
|
if info.Checks == nil {
|
|
|
|
info.Checks = make([]*structs.HealthCheck, 0)
|
|
|
|
}
|
2023-07-12 19:34:39 +00:00
|
|
|
// Check if Node Meta - 'consul-version' already exists by virtue of adding
|
|
|
|
// 'consul-version' during node registration itself.
|
|
|
|
// If not, get it from mapAddrVer.
|
|
|
|
if _, ok := info.Meta[structs.MetaConsulVersion]; !ok {
|
|
|
|
if _, okver := mapAddrVer[info.Address]; okver {
|
|
|
|
if info.Meta == nil {
|
|
|
|
info.Meta = make(map[string]string)
|
|
|
|
}
|
|
|
|
info.Meta[structs.MetaConsulVersion] = mapAddrVer[info.Address]
|
|
|
|
}
|
|
|
|
}
|
2015-11-15 05:05:37 +00:00
|
|
|
}
|
|
|
|
if out.Dump == nil {
|
|
|
|
out.Dump = make(structs.NodeDump, 0)
|
|
|
|
}
|
2022-06-24 22:17:35 +00:00
|
|
|
|
|
|
|
// Use empty list instead of nil
|
2023-07-12 19:34:39 +00:00
|
|
|
// Also check if consul-version exists in Meta, else add it
|
2022-06-24 22:17:35 +00:00
|
|
|
for _, info := range out.ImportedDump {
|
|
|
|
if info.Services == nil {
|
|
|
|
info.Services = make([]*structs.NodeService, 0)
|
|
|
|
}
|
|
|
|
if info.Checks == nil {
|
|
|
|
info.Checks = make([]*structs.HealthCheck, 0)
|
|
|
|
}
|
2023-07-12 19:34:39 +00:00
|
|
|
// Check if Node Meta - 'consul-version' already exists by virtue of adding
|
|
|
|
// 'consul-version' during node registration itself.
|
|
|
|
// If not, get it from mapAddrVer.
|
|
|
|
if _, ok := info.Meta[structs.MetaConsulVersion]; !ok {
|
|
|
|
if _, okver := mapAddrVer[info.Address]; okver {
|
|
|
|
if info.Meta == nil {
|
|
|
|
info.Meta = make(map[string]string)
|
|
|
|
}
|
|
|
|
info.Meta[structs.MetaConsulVersion] = mapAddrVer[info.Address]
|
|
|
|
}
|
|
|
|
}
|
2022-06-24 22:17:35 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
return append(out.Dump, out.ImportedDump...), nil
|
2014-04-28 21:52:30 +00:00
|
|
|
}
|
|
|
|
|
2023-07-12 19:34:39 +00:00
|
|
|
// AgentMembersMapAddrVer is used to get version info from all serf members into a
|
|
|
|
// map of key-address,value-version.
|
|
|
|
func AgentMembersMapAddrVer(s *HTTPHandlers, req *http.Request) (map[string]string, error) {
|
|
|
|
var members []serf.Member
|
|
|
|
|
|
|
|
//Get WAN Members
|
|
|
|
wanMembers := s.agent.WANMembers()
|
|
|
|
|
|
|
|
//Get LAN Members
|
|
|
|
//Get the request partition and default to that of the agent.
|
|
|
|
entMeta := s.agent.AgentEnterpriseMeta()
|
|
|
|
if err := s.parseEntMetaPartition(req, entMeta); err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
filter := consul.LANMemberFilter{
|
|
|
|
Partition: entMeta.PartitionOrDefault(),
|
|
|
|
}
|
add a conditional around setting LANFilter.AllSegments to make sure it is valid (#18139)
### Description
This is to correct a code problem because this assumes all segments, but
when you get to Enterprise, you can be in partition that is not the
default partition, in which case specifying all segments does not
validate and fails. This is to correct the setting of this filter with
`AllSegments` to `true` to only occur when in the the `default`
partition.
### Testing & Reproduction steps
<!--
* In the case of bugs, describe how to replicate
* If any manual tests were done, document the steps and the conditions
to replicate
* Call out any important/ relevant unit tests, e2e tests or integration
tests you have added or are adding
-->
### Links
<!--
Include any links here that might be helpful for people reviewing your
PR (Tickets, GH issues, API docs, external benchmarks, tools docs, etc).
If there are none, feel free to delete this section.
Please be mindful not to leak any customer or confidential information.
HashiCorp employees may want to use our internal URL shortener to
obfuscate links.
-->
### PR Checklist
* [ ] updated test coverage
* [ ] external facing docs updated
* [ ] appropriate backport labels added
* [ ] not a security concern
2023-07-14 20:53:44 +00:00
|
|
|
if acl.IsDefaultPartition(filter.Partition) {
|
|
|
|
filter.AllSegments = true
|
|
|
|
}
|
|
|
|
|
2023-07-12 19:34:39 +00:00
|
|
|
lanMembers, err := s.agent.delegate.LANMembers(filter)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
//aggregate members
|
|
|
|
members = append(wanMembers, lanMembers...)
|
|
|
|
|
|
|
|
//create a map with key as IPv4 address and value as consul-version
|
|
|
|
mapAddrVer := make(map[string]string, len(members))
|
|
|
|
for i := range members {
|
|
|
|
buildVersion, err := metadata.Build(&members[i])
|
|
|
|
if err == nil {
|
|
|
|
mapAddrVer[members[i].Addr.String()] = buildVersion.String()
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return mapAddrVer, nil
|
|
|
|
}
|
|
|
|
|
2014-04-28 22:09:46 +00:00
|
|
|
// UINodeInfo is used to get info on a single node in a given datacenter. We return a
|
|
|
|
// NodeInfo which provides overview information for the node
|
2020-09-04 18:42:15 +00:00
|
|
|
func (s *HTTPHandlers) UINodeInfo(resp http.ResponseWriter, req *http.Request) (interface{}, error) {
|
2015-02-11 21:35:46 +00:00
|
|
|
// Parse arguments
|
|
|
|
args := structs.NodeSpecificRequest{}
|
|
|
|
if done := s.parse(resp, req, &args.Datacenter, &args.QueryOptions); done {
|
|
|
|
return nil, nil
|
|
|
|
}
|
2014-04-28 22:09:46 +00:00
|
|
|
|
2019-12-10 02:26:41 +00:00
|
|
|
if err := s.parseEntMeta(req, &args.EnterpriseMeta); err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
2014-04-28 22:09:46 +00:00
|
|
|
// Verify we have some DC, or use the default
|
2022-06-01 17:17:14 +00:00
|
|
|
args.Node = strings.TrimPrefix(req.URL.Path, "/v1/internal/ui/node/")
|
2015-02-11 21:35:46 +00:00
|
|
|
if args.Node == "" {
|
2022-04-29 17:42:49 +00:00
|
|
|
return nil, HTTPError{StatusCode: http.StatusBadRequest, Reason: "Missing node name"}
|
2014-04-28 22:09:46 +00:00
|
|
|
}
|
|
|
|
|
2022-06-24 22:17:35 +00:00
|
|
|
if peer := req.URL.Query().Get("peer"); peer != "" {
|
|
|
|
args.PeerName = peer
|
|
|
|
}
|
|
|
|
|
2015-02-11 21:35:46 +00:00
|
|
|
// Make the RPC request
|
|
|
|
var out structs.IndexedNodeDump
|
|
|
|
defer setMeta(resp, &out.QueryMeta)
|
|
|
|
RPC:
|
2022-12-14 15:24:22 +00:00
|
|
|
if err := s.agent.RPC(req.Context(), "Internal.NodeInfo", &args, &out); err != nil {
|
2015-02-11 21:35:46 +00:00
|
|
|
// Retry the request allowing stale data if no leader
|
|
|
|
if strings.Contains(err.Error(), structs.ErrNoLeader.Error()) && !args.AllowStale {
|
|
|
|
args.AllowStale = true
|
|
|
|
goto RPC
|
|
|
|
}
|
2014-04-28 22:09:46 +00:00
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
2023-07-12 19:34:39 +00:00
|
|
|
// Get version info for all serf members into a map of key-address,value-version.
|
|
|
|
// This logic of calling 'AgentMembersMapAddrVer()' and inserting version info in this func
|
|
|
|
// can be discarded in future releases ( may be after 3 or 4 minor releases),
|
|
|
|
// when all the nodes are registered with consul-version in nodemeta.
|
|
|
|
var err error
|
|
|
|
mapAddrVer, err := AgentMembersMapAddrVer(s, req)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
2014-04-28 22:09:46 +00:00
|
|
|
// Return only the first entry
|
2015-02-11 21:35:46 +00:00
|
|
|
if len(out.Dump) > 0 {
|
2015-11-15 05:05:37 +00:00
|
|
|
info := out.Dump[0]
|
|
|
|
if info.Services == nil {
|
|
|
|
info.Services = make([]*structs.NodeService, 0)
|
|
|
|
}
|
|
|
|
if info.Checks == nil {
|
|
|
|
info.Checks = make([]*structs.HealthCheck, 0)
|
|
|
|
}
|
2023-07-12 19:34:39 +00:00
|
|
|
// Check if Node Meta - 'consul-version' already exists by virtue of adding
|
|
|
|
// 'consul-version' during node registration itself.
|
|
|
|
// If not, get it from mapAddrVer.
|
|
|
|
if _, ok := info.Meta[structs.MetaConsulVersion]; !ok {
|
|
|
|
if _, okver := mapAddrVer[info.Address]; okver {
|
|
|
|
if info.Meta == nil {
|
|
|
|
info.Meta = make(map[string]string)
|
|
|
|
}
|
|
|
|
info.Meta[structs.MetaConsulVersion] = mapAddrVer[info.Address]
|
|
|
|
}
|
|
|
|
}
|
2015-11-15 05:05:37 +00:00
|
|
|
return info, nil
|
2014-04-28 22:09:46 +00:00
|
|
|
}
|
2017-07-10 16:40:00 +00:00
|
|
|
|
2017-07-11 14:13:29 +00:00
|
|
|
resp.WriteHeader(http.StatusNotFound)
|
2014-04-28 22:09:46 +00:00
|
|
|
return nil, nil
|
|
|
|
}
|
|
|
|
|
2022-03-22 23:58:41 +00:00
|
|
|
// UICatalogOverview is used to get a high-level overview of the health of nodes, services,
|
|
|
|
// and checks in the datacenter.
|
|
|
|
func (s *HTTPHandlers) UICatalogOverview(resp http.ResponseWriter, req *http.Request) (interface{}, error) {
|
|
|
|
// Parse arguments
|
|
|
|
args := structs.DCSpecificRequest{}
|
|
|
|
if done := s.parse(resp, req, &args.Datacenter, &args.QueryOptions); done {
|
|
|
|
return nil, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// Make the RPC request
|
|
|
|
var out structs.CatalogSummary
|
2022-12-14 15:24:22 +00:00
|
|
|
if err := s.agent.RPC(req.Context(), "Internal.CatalogOverview", &args, &out); err != nil {
|
2022-03-22 23:58:41 +00:00
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
return out, nil
|
|
|
|
}
|
|
|
|
|
2014-04-28 22:52:37 +00:00
|
|
|
// UIServices is used to list the services in a given datacenter. We return a
|
|
|
|
// ServiceSummary which provides overview information for the service
|
2020-09-04 18:42:15 +00:00
|
|
|
func (s *HTTPHandlers) UIServices(resp http.ResponseWriter, req *http.Request) (interface{}, error) {
|
2015-02-11 21:35:46 +00:00
|
|
|
// Parse arguments
|
2019-06-20 19:04:39 +00:00
|
|
|
args := structs.ServiceDumpRequest{}
|
2015-02-11 21:35:46 +00:00
|
|
|
if done := s.parse(resp, req, &args.Datacenter, &args.QueryOptions); done {
|
|
|
|
return nil, nil
|
|
|
|
}
|
2022-09-01 14:32:59 +00:00
|
|
|
if peer := req.URL.Query().Get("peer"); peer != "" {
|
|
|
|
args.PeerName = peer
|
|
|
|
}
|
2019-12-10 02:26:41 +00:00
|
|
|
if err := s.parseEntMeta(req, &args.EnterpriseMeta); err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
2019-04-16 16:00:15 +00:00
|
|
|
s.parseFilter(req, &args.Filter)
|
|
|
|
|
2015-02-11 21:35:46 +00:00
|
|
|
// Make the RPC request
|
2020-07-30 16:21:11 +00:00
|
|
|
var out structs.IndexedNodesWithGateways
|
2015-02-11 21:35:46 +00:00
|
|
|
defer setMeta(resp, &out.QueryMeta)
|
|
|
|
RPC:
|
2022-12-14 15:24:22 +00:00
|
|
|
if err := s.agent.RPC(req.Context(), "Internal.ServiceDump", &args, &out); err != nil {
|
2015-02-11 21:35:46 +00:00
|
|
|
// Retry the request allowing stale data if no leader
|
|
|
|
if strings.Contains(err.Error(), structs.ErrNoLeader.Error()) && !args.AllowStale {
|
|
|
|
args.AllowStale = true
|
|
|
|
goto RPC
|
|
|
|
}
|
2014-04-28 22:52:37 +00:00
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
2020-09-30 14:23:19 +00:00
|
|
|
// Store the names of the gateways associated with each service
|
|
|
|
var (
|
2022-06-24 22:17:35 +00:00
|
|
|
serviceGateways = make(map[structs.PeeredServiceName][]structs.PeeredServiceName)
|
|
|
|
numLinkedServices = make(map[structs.PeeredServiceName]int)
|
2020-09-30 14:23:19 +00:00
|
|
|
)
|
|
|
|
for _, gs := range out.Gateways {
|
2022-06-24 22:17:35 +00:00
|
|
|
psn := structs.PeeredServiceName{Peer: structs.DefaultPeerKeyword, ServiceName: gs.Service}
|
|
|
|
gpsn := structs.PeeredServiceName{Peer: structs.DefaultPeerKeyword, ServiceName: gs.Gateway}
|
|
|
|
serviceGateways[psn] = append(serviceGateways[psn], gpsn)
|
|
|
|
numLinkedServices[gpsn] += 1
|
2020-09-30 14:23:19 +00:00
|
|
|
}
|
|
|
|
|
2022-06-24 22:17:35 +00:00
|
|
|
summaries, hasProxy := summarizeServices(append(out.Nodes, out.ImportedNodes...).ToServiceDump(), nil, "")
|
2020-09-30 14:23:19 +00:00
|
|
|
sorted := prepSummaryOutput(summaries, false)
|
|
|
|
|
2020-12-15 16:52:00 +00:00
|
|
|
// Ensure at least a zero length slice
|
|
|
|
result := make([]*ServiceListingSummary, 0)
|
2020-09-30 14:23:19 +00:00
|
|
|
for _, svc := range sorted {
|
|
|
|
sum := ServiceListingSummary{ServiceSummary: *svc}
|
|
|
|
|
|
|
|
sn := structs.NewServiceName(svc.Name, &svc.EnterpriseMeta)
|
2022-06-24 22:17:35 +00:00
|
|
|
psn := structs.PeeredServiceName{Peer: svc.PeerName, ServiceName: sn}
|
|
|
|
if hasProxy[psn] {
|
2020-09-30 14:23:19 +00:00
|
|
|
sum.ConnectedWithProxy = true
|
|
|
|
}
|
|
|
|
|
|
|
|
// Verify that at least one of the gateways linked by config entry has an instance registered in the catalog
|
2022-06-24 22:17:35 +00:00
|
|
|
for _, gw := range serviceGateways[psn] {
|
2020-09-30 14:23:19 +00:00
|
|
|
if s := summaries[gw]; s != nil && sum.InstanceCount > 0 {
|
|
|
|
sum.ConnectedWithGateway = true
|
|
|
|
}
|
|
|
|
}
|
2022-06-24 22:17:35 +00:00
|
|
|
sum.GatewayConfig.AssociatedServiceCount = numLinkedServices[psn]
|
2020-09-30 14:23:19 +00:00
|
|
|
|
|
|
|
result = append(result, &sum)
|
|
|
|
}
|
|
|
|
return result, nil
|
2014-04-28 22:52:37 +00:00
|
|
|
}
|
|
|
|
|
2020-05-11 17:35:17 +00:00
|
|
|
// UIGatewayServices is used to query all the nodes for services associated with a gateway along with their gateway config
|
2020-09-04 18:42:15 +00:00
|
|
|
func (s *HTTPHandlers) UIGatewayServicesNodes(resp http.ResponseWriter, req *http.Request) (interface{}, error) {
|
2020-05-11 17:35:17 +00:00
|
|
|
// Parse arguments
|
|
|
|
args := structs.ServiceSpecificRequest{}
|
|
|
|
if err := s.parseEntMetaNoWildcard(req, &args.EnterpriseMeta); err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
if done := s.parse(resp, req, &args.Datacenter, &args.QueryOptions); done {
|
|
|
|
return nil, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// Pull out the service name
|
2022-06-01 17:17:14 +00:00
|
|
|
args.ServiceName = strings.TrimPrefix(req.URL.Path, "/v1/internal/ui/gateway-services-nodes/")
|
2020-05-11 17:35:17 +00:00
|
|
|
if args.ServiceName == "" {
|
2022-04-29 17:42:49 +00:00
|
|
|
return nil, HTTPError{StatusCode: http.StatusBadRequest, Reason: "Missing gateway name"}
|
2020-05-11 17:35:17 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Make the RPC request
|
|
|
|
var out structs.IndexedServiceDump
|
|
|
|
defer setMeta(resp, &out.QueryMeta)
|
|
|
|
RPC:
|
2022-12-14 15:24:22 +00:00
|
|
|
if err := s.agent.RPC(req.Context(), "Internal.GatewayServiceDump", &args, &out); err != nil {
|
2020-05-11 17:35:17 +00:00
|
|
|
// Retry the request allowing stale data if no leader
|
|
|
|
if strings.Contains(err.Error(), structs.ErrNoLeader.Error()) && !args.AllowStale {
|
|
|
|
args.AllowStale = true
|
|
|
|
goto RPC
|
|
|
|
}
|
|
|
|
return nil, err
|
|
|
|
}
|
2020-06-22 19:14:12 +00:00
|
|
|
|
2020-09-30 14:23:19 +00:00
|
|
|
summaries, _ := summarizeServices(out.Dump, s.agent.config, args.Datacenter)
|
2021-01-20 16:59:02 +00:00
|
|
|
|
|
|
|
prepped := prepSummaryOutput(summaries, false)
|
|
|
|
if prepped == nil {
|
|
|
|
prepped = make([]*ServiceSummary, 0)
|
|
|
|
}
|
|
|
|
return prepped, nil
|
2020-05-11 17:35:17 +00:00
|
|
|
}
|
|
|
|
|
2020-10-02 00:10:49 +00:00
|
|
|
// UIServiceTopology returns the list of upstreams and downstreams for a Connect enabled service.
|
2020-10-02 16:05:27 +00:00
|
|
|
// - Downstreams are services that list the given service as an upstream
|
|
|
|
// - Upstreams are the upstreams defined in the given service's proxy registrations
|
2020-09-30 14:23:19 +00:00
|
|
|
func (s *HTTPHandlers) UIServiceTopology(resp http.ResponseWriter, req *http.Request) (interface{}, error) {
|
|
|
|
// Parse arguments
|
|
|
|
args := structs.ServiceSpecificRequest{}
|
|
|
|
if done := s.parse(resp, req, &args.Datacenter, &args.QueryOptions); done {
|
|
|
|
return nil, nil
|
|
|
|
}
|
|
|
|
if err := s.parseEntMeta(req, &args.EnterpriseMeta); err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
2020-07-29 15:10:06 +00:00
|
|
|
|
2022-06-01 17:17:14 +00:00
|
|
|
args.ServiceName = strings.TrimPrefix(req.URL.Path, "/v1/internal/ui/service-topology/")
|
2020-09-30 14:23:19 +00:00
|
|
|
if args.ServiceName == "" {
|
2022-04-29 17:42:49 +00:00
|
|
|
return nil, HTTPError{StatusCode: http.StatusBadRequest, Reason: "Missing service name"}
|
2020-09-30 14:23:19 +00:00
|
|
|
}
|
|
|
|
|
2020-10-08 23:31:54 +00:00
|
|
|
kind, ok := req.URL.Query()["kind"]
|
|
|
|
if !ok {
|
2022-04-29 17:42:49 +00:00
|
|
|
return nil, HTTPError{StatusCode: http.StatusBadRequest, Reason: "Missing service kind"}
|
2020-10-08 23:31:54 +00:00
|
|
|
}
|
|
|
|
args.ServiceKind = structs.ServiceKind(kind[0])
|
|
|
|
|
|
|
|
switch args.ServiceKind {
|
|
|
|
case structs.ServiceKindTypical, structs.ServiceKindIngressGateway:
|
|
|
|
// allowed
|
|
|
|
default:
|
2022-04-29 17:42:49 +00:00
|
|
|
return nil, HTTPError{StatusCode: http.StatusBadRequest, Reason: fmt.Sprintf("Unsupported service kind %q", args.ServiceKind)}
|
2020-10-08 23:31:54 +00:00
|
|
|
}
|
|
|
|
|
2020-09-30 14:23:19 +00:00
|
|
|
// Make the RPC request
|
|
|
|
var out structs.IndexedServiceTopology
|
|
|
|
defer setMeta(resp, &out.QueryMeta)
|
|
|
|
RPC:
|
2022-12-14 15:24:22 +00:00
|
|
|
if err := s.agent.RPC(req.Context(), "Internal.ServiceTopology", &args, &out); err != nil {
|
2020-09-30 14:23:19 +00:00
|
|
|
// Retry the request allowing stale data if no leader
|
|
|
|
if strings.Contains(err.Error(), structs.ErrNoLeader.Error()) && !args.AllowStale {
|
|
|
|
args.AllowStale = true
|
|
|
|
goto RPC
|
|
|
|
}
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
upstreams, _ := summarizeServices(out.ServiceTopology.Upstreams.ToServiceDump(), nil, "")
|
|
|
|
downstreams, _ := summarizeServices(out.ServiceTopology.Downstreams.ToServiceDump(), nil, "")
|
|
|
|
|
2020-10-08 00:35:34 +00:00
|
|
|
var (
|
2020-10-23 16:45:41 +00:00
|
|
|
upstreamResp = make([]*ServiceTopologySummary, 0)
|
|
|
|
downstreamResp = make([]*ServiceTopologySummary, 0)
|
2020-10-08 00:35:34 +00:00
|
|
|
)
|
|
|
|
|
|
|
|
// Sort and attach intention data for upstreams and downstreams
|
|
|
|
sortedUpstreams := prepSummaryOutput(upstreams, true)
|
|
|
|
for _, svc := range sortedUpstreams {
|
|
|
|
sn := structs.NewServiceName(svc.Name, &svc.EnterpriseMeta)
|
|
|
|
sum := ServiceTopologySummary{
|
|
|
|
ServiceSummary: *svc,
|
|
|
|
Intention: out.ServiceTopology.UpstreamDecisions[sn.String()],
|
2021-04-13 16:12:13 +00:00
|
|
|
Source: out.ServiceTopology.UpstreamSources[sn.String()],
|
2020-10-08 00:35:34 +00:00
|
|
|
}
|
|
|
|
upstreamResp = append(upstreamResp, &sum)
|
|
|
|
}
|
2021-08-25 19:20:32 +00:00
|
|
|
for k, v := range out.ServiceTopology.UpstreamSources {
|
|
|
|
if v == structs.TopologySourceRoutingConfig {
|
|
|
|
sn := structs.ServiceNameFromString(k)
|
|
|
|
sum := ServiceTopologySummary{
|
|
|
|
ServiceSummary: ServiceSummary{
|
|
|
|
Datacenter: args.Datacenter,
|
|
|
|
Name: sn.Name,
|
|
|
|
EnterpriseMeta: sn.EnterpriseMeta,
|
|
|
|
},
|
|
|
|
Intention: out.ServiceTopology.UpstreamDecisions[sn.String()],
|
|
|
|
Source: out.ServiceTopology.UpstreamSources[sn.String()],
|
|
|
|
}
|
|
|
|
upstreamResp = append(upstreamResp, &sum)
|
|
|
|
}
|
|
|
|
}
|
2020-10-08 00:35:34 +00:00
|
|
|
|
|
|
|
sortedDownstreams := prepSummaryOutput(downstreams, true)
|
|
|
|
for _, svc := range sortedDownstreams {
|
|
|
|
sn := structs.NewServiceName(svc.Name, &svc.EnterpriseMeta)
|
|
|
|
sum := ServiceTopologySummary{
|
|
|
|
ServiceSummary: *svc,
|
|
|
|
Intention: out.ServiceTopology.DownstreamDecisions[sn.String()],
|
2021-04-13 16:12:13 +00:00
|
|
|
Source: out.ServiceTopology.DownstreamSources[sn.String()],
|
2020-10-08 00:35:34 +00:00
|
|
|
}
|
|
|
|
downstreamResp = append(downstreamResp, &sum)
|
|
|
|
}
|
|
|
|
|
|
|
|
topo := ServiceTopology{
|
2021-04-13 16:12:13 +00:00
|
|
|
TransparentProxy: out.ServiceTopology.TransparentProxy,
|
|
|
|
Protocol: out.ServiceTopology.MetricsProtocol,
|
|
|
|
Upstreams: upstreamResp,
|
|
|
|
Downstreams: downstreamResp,
|
|
|
|
FilteredByACLs: out.FilteredByACLs,
|
2020-09-30 14:23:19 +00:00
|
|
|
}
|
2020-10-08 00:35:34 +00:00
|
|
|
return topo, nil
|
2020-09-30 14:23:19 +00:00
|
|
|
}
|
|
|
|
|
2022-06-24 22:17:35 +00:00
|
|
|
func summarizeServices(dump structs.ServiceDump, cfg *config.RuntimeConfig, dc string) (map[structs.PeeredServiceName]*ServiceSummary, map[structs.PeeredServiceName]bool) {
|
2020-09-30 14:23:19 +00:00
|
|
|
var (
|
2022-06-24 22:17:35 +00:00
|
|
|
summary = make(map[structs.PeeredServiceName]*ServiceSummary)
|
|
|
|
hasProxy = make(map[structs.PeeredServiceName]bool)
|
2020-09-30 14:23:19 +00:00
|
|
|
)
|
2020-07-29 15:10:06 +00:00
|
|
|
|
2022-06-24 22:17:35 +00:00
|
|
|
getService := func(psn structs.PeeredServiceName) *ServiceSummary {
|
|
|
|
serv, ok := summary[psn]
|
2014-04-28 22:52:37 +00:00
|
|
|
if !ok {
|
2019-12-10 02:26:41 +00:00
|
|
|
serv = &ServiceSummary{
|
2022-06-24 22:17:35 +00:00
|
|
|
Name: psn.ServiceName.Name,
|
|
|
|
EnterpriseMeta: psn.ServiceName.EnterpriseMeta,
|
2020-03-09 15:56:19 +00:00
|
|
|
// the other code will increment this unconditionally so we
|
|
|
|
// shouldn't initialize it to 1
|
|
|
|
InstanceCount: 0,
|
2022-06-24 22:17:35 +00:00
|
|
|
PeerName: psn.Peer,
|
2019-12-10 02:26:41 +00:00
|
|
|
}
|
2022-06-24 22:17:35 +00:00
|
|
|
summary[psn] = serv
|
2014-04-28 22:52:37 +00:00
|
|
|
}
|
|
|
|
return serv
|
|
|
|
}
|
|
|
|
|
2019-04-16 16:00:15 +00:00
|
|
|
for _, csn := range dump {
|
2022-06-24 22:17:35 +00:00
|
|
|
var peerName string
|
|
|
|
// all entities will have the same peer name so it is safe to use the node's peer name
|
|
|
|
if csn.Node == nil {
|
|
|
|
// this can happen for gateway dumps that call this summarize func
|
|
|
|
peerName = structs.DefaultPeerKeyword
|
|
|
|
} else {
|
|
|
|
peerName = csn.Node.PeerName
|
|
|
|
}
|
|
|
|
|
2020-09-30 14:23:19 +00:00
|
|
|
if cfg != nil && csn.GatewayService != nil {
|
2020-06-22 19:14:12 +00:00
|
|
|
gwsvc := csn.GatewayService
|
2022-06-24 22:17:35 +00:00
|
|
|
|
|
|
|
psn := structs.PeeredServiceName{Peer: peerName, ServiceName: gwsvc.Service}
|
|
|
|
sum := getService(psn)
|
2020-09-29 14:59:18 +00:00
|
|
|
modifySummaryForGatewayService(cfg, dc, sum, gwsvc)
|
2020-05-11 17:35:17 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Will happen in cases where we only have the GatewayServices mapping
|
|
|
|
if csn.Service == nil {
|
|
|
|
continue
|
|
|
|
}
|
2022-06-24 22:17:35 +00:00
|
|
|
|
2020-09-30 14:23:19 +00:00
|
|
|
sn := structs.NewServiceName(csn.Service.Service, &csn.Service.EnterpriseMeta)
|
2022-06-24 22:17:35 +00:00
|
|
|
psn := structs.PeeredServiceName{Peer: peerName, ServiceName: sn}
|
|
|
|
sum := getService(psn)
|
2020-05-11 17:35:17 +00:00
|
|
|
|
2019-04-16 16:00:15 +00:00
|
|
|
svc := csn.Service
|
|
|
|
sum.Nodes = append(sum.Nodes, csn.Node.Node)
|
|
|
|
sum.Kind = svc.Kind
|
2020-09-30 14:23:19 +00:00
|
|
|
sum.Datacenter = csn.Node.Datacenter
|
2020-03-09 15:56:19 +00:00
|
|
|
sum.InstanceCount += 1
|
2022-02-16 21:51:54 +00:00
|
|
|
sum.ConnectNative = svc.Connect.Native
|
2020-03-27 14:57:46 +00:00
|
|
|
if svc.Kind == structs.ServiceKindConnectProxy {
|
2020-09-30 14:23:19 +00:00
|
|
|
sn := structs.NewServiceName(svc.Proxy.DestinationServiceName, &svc.EnterpriseMeta)
|
2022-06-24 22:17:35 +00:00
|
|
|
psn := structs.PeeredServiceName{Peer: peerName, ServiceName: sn}
|
|
|
|
hasProxy[psn] = true
|
2020-09-30 14:23:19 +00:00
|
|
|
|
2022-06-24 22:17:35 +00:00
|
|
|
destination := getService(psn)
|
2020-09-30 14:23:19 +00:00
|
|
|
for _, check := range csn.Checks {
|
|
|
|
cid := structs.NewCheckID(check.CheckID, &check.EnterpriseMeta)
|
|
|
|
uid := structs.UniqueID(csn.Node.Node, cid.String())
|
|
|
|
if destination.checks == nil {
|
|
|
|
destination.checks = make(map[string]*structs.HealthCheck)
|
|
|
|
}
|
|
|
|
destination.checks[uid] = check
|
|
|
|
}
|
2021-04-13 16:12:13 +00:00
|
|
|
|
|
|
|
// Only consider the target service to be transparent when all its proxy instances are in that mode.
|
|
|
|
// This is done because the flag is used to display warnings about proxies needing to enable
|
|
|
|
// transparent proxy mode. If ANY instance isn't in the right mode then the warming applies.
|
|
|
|
if svc.Proxy.Mode == structs.ProxyModeTransparent && !destination.transparentProxySet {
|
|
|
|
destination.TransparentProxy = true
|
|
|
|
}
|
|
|
|
if svc.Proxy.Mode != structs.ProxyModeTransparent {
|
|
|
|
destination.TransparentProxy = false
|
|
|
|
}
|
|
|
|
destination.transparentProxySet = true
|
2020-03-27 14:57:46 +00:00
|
|
|
}
|
2019-04-16 16:00:15 +00:00
|
|
|
for _, tag := range svc.Tags {
|
|
|
|
found := false
|
|
|
|
for _, existing := range sum.Tags {
|
|
|
|
if existing == tag {
|
|
|
|
found = true
|
|
|
|
break
|
2018-09-06 19:19:05 +00:00
|
|
|
}
|
|
|
|
}
|
2019-04-16 16:00:15 +00:00
|
|
|
if !found {
|
|
|
|
sum.Tags = append(sum.Tags, tag)
|
|
|
|
}
|
2014-04-28 22:52:37 +00:00
|
|
|
}
|
2019-04-16 16:00:15 +00:00
|
|
|
|
|
|
|
// If there is an external source, add it to the list of external
|
|
|
|
// sources. We only want to add unique sources so there is extra
|
|
|
|
// accounting here with an unexported field to maintain the set
|
|
|
|
// of sources.
|
2020-10-08 00:35:34 +00:00
|
|
|
if len(svc.Meta) > 0 && svc.Meta[structs.MetaExternalSource] != "" {
|
|
|
|
source := svc.Meta[structs.MetaExternalSource]
|
2019-04-16 16:00:15 +00:00
|
|
|
if sum.externalSourceSet == nil {
|
|
|
|
sum.externalSourceSet = make(map[string]struct{})
|
2014-04-28 22:52:37 +00:00
|
|
|
}
|
2019-04-16 16:00:15 +00:00
|
|
|
if _, ok := sum.externalSourceSet[source]; !ok {
|
|
|
|
sum.externalSourceSet[source] = struct{}{}
|
|
|
|
sum.ExternalSources = append(sum.ExternalSources, source)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
for _, check := range csn.Checks {
|
2020-09-30 14:23:19 +00:00
|
|
|
cid := structs.NewCheckID(check.CheckID, &check.EnterpriseMeta)
|
|
|
|
uid := structs.UniqueID(csn.Node.Node, cid.String())
|
|
|
|
if sum.checks == nil {
|
|
|
|
sum.checks = make(map[string]*structs.HealthCheck)
|
|
|
|
}
|
|
|
|
sum.checks[uid] = check
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return summary, hasProxy
|
|
|
|
}
|
|
|
|
|
2022-06-24 22:17:35 +00:00
|
|
|
func prepSummaryOutput(summaries map[structs.PeeredServiceName]*ServiceSummary, excludeSidecars bool) []*ServiceSummary {
|
2020-09-30 14:23:19 +00:00
|
|
|
var resp []*ServiceSummary
|
2021-01-20 16:59:02 +00:00
|
|
|
// Ensure at least a zero length slice
|
|
|
|
resp = make([]*ServiceSummary, 0)
|
2020-09-30 14:23:19 +00:00
|
|
|
|
|
|
|
// Collect and sort resp for display
|
|
|
|
for _, sum := range summaries {
|
|
|
|
sort.Strings(sum.Nodes)
|
|
|
|
sort.Strings(sum.Tags)
|
|
|
|
|
|
|
|
for _, chk := range sum.checks {
|
|
|
|
switch chk.Status {
|
2019-04-16 16:00:15 +00:00
|
|
|
case api.HealthPassing:
|
|
|
|
sum.ChecksPassing++
|
|
|
|
case api.HealthWarning:
|
|
|
|
sum.ChecksWarning++
|
|
|
|
case api.HealthCritical:
|
|
|
|
sum.ChecksCritical++
|
2014-04-28 22:52:37 +00:00
|
|
|
}
|
|
|
|
}
|
2020-10-08 15:47:09 +00:00
|
|
|
if excludeSidecars && sum.Kind != structs.ServiceKindTypical && sum.Kind != structs.ServiceKindIngressGateway {
|
2020-09-30 14:23:19 +00:00
|
|
|
continue
|
2020-07-29 15:10:06 +00:00
|
|
|
}
|
2020-09-30 14:23:19 +00:00
|
|
|
resp = append(resp, sum)
|
2014-04-28 22:52:37 +00:00
|
|
|
}
|
2020-09-30 14:23:19 +00:00
|
|
|
sort.Slice(resp, func(i, j int) bool {
|
|
|
|
return resp[i].LessThan(resp[j])
|
|
|
|
})
|
|
|
|
return resp
|
2014-04-28 22:52:37 +00:00
|
|
|
}
|
2020-06-22 19:14:12 +00:00
|
|
|
|
|
|
|
func modifySummaryForGatewayService(
|
|
|
|
cfg *config.RuntimeConfig,
|
2020-09-22 18:34:09 +00:00
|
|
|
datacenter string,
|
2020-06-22 19:14:12 +00:00
|
|
|
sum *ServiceSummary,
|
|
|
|
gwsvc *structs.GatewayService,
|
|
|
|
) {
|
|
|
|
var dnsAddresses []string
|
|
|
|
for _, domain := range []string{cfg.DNSDomain, cfg.DNSAltDomain} {
|
|
|
|
// If the domain is empty, do not use it to construct a valid DNS
|
|
|
|
// address
|
|
|
|
if domain == "" {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
dnsAddresses = append(dnsAddresses, serviceIngressDNSName(
|
|
|
|
gwsvc.Service.Name,
|
2020-09-22 18:34:09 +00:00
|
|
|
datacenter,
|
2020-06-22 19:14:12 +00:00
|
|
|
domain,
|
|
|
|
&gwsvc.Service.EnterpriseMeta,
|
|
|
|
))
|
|
|
|
}
|
|
|
|
|
|
|
|
for _, addr := range gwsvc.Addresses(dnsAddresses) {
|
|
|
|
// check for duplicates, a service will have a ServiceInfo struct for
|
|
|
|
// every instance that is registered.
|
|
|
|
if _, ok := sum.GatewayConfig.addressesSet[addr]; !ok {
|
|
|
|
if sum.GatewayConfig.addressesSet == nil {
|
|
|
|
sum.GatewayConfig.addressesSet = make(map[string]struct{})
|
|
|
|
}
|
|
|
|
sum.GatewayConfig.addressesSet[addr] = struct{}{}
|
|
|
|
sum.GatewayConfig.Addresses = append(
|
|
|
|
sum.GatewayConfig.Addresses, addr,
|
|
|
|
)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2020-08-11 23:20:41 +00:00
|
|
|
|
|
|
|
// GET /v1/internal/ui/gateway-intentions/:gateway
|
2020-09-04 18:42:15 +00:00
|
|
|
func (s *HTTPHandlers) UIGatewayIntentions(resp http.ResponseWriter, req *http.Request) (interface{}, error) {
|
2020-08-11 23:20:41 +00:00
|
|
|
var args structs.IntentionQueryRequest
|
|
|
|
if done := s.parse(resp, req, &args.Datacenter, &args.QueryOptions); done {
|
|
|
|
return nil, nil
|
|
|
|
}
|
|
|
|
|
2022-04-05 21:10:06 +00:00
|
|
|
var entMeta acl.EnterpriseMeta
|
2020-08-11 23:20:41 +00:00
|
|
|
if err := s.parseEntMetaNoWildcard(req, &entMeta); err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
// Pull out the service name
|
2022-06-01 17:17:14 +00:00
|
|
|
name := strings.TrimPrefix(req.URL.Path, "/v1/internal/ui/gateway-intentions/")
|
2020-08-11 23:20:41 +00:00
|
|
|
if name == "" {
|
2022-04-29 17:42:49 +00:00
|
|
|
return nil, HTTPError{StatusCode: http.StatusBadRequest, Reason: "Missing gateway name"}
|
2020-08-11 23:20:41 +00:00
|
|
|
}
|
|
|
|
args.Match = &structs.IntentionQueryMatch{
|
|
|
|
Type: structs.IntentionMatchDestination,
|
|
|
|
Entries: []structs.IntentionMatchEntry{
|
|
|
|
{
|
|
|
|
Namespace: entMeta.NamespaceOrEmpty(),
|
2021-09-16 19:31:19 +00:00
|
|
|
Partition: entMeta.PartitionOrDefault(),
|
2020-08-11 23:20:41 +00:00
|
|
|
Name: name,
|
|
|
|
},
|
|
|
|
},
|
|
|
|
}
|
|
|
|
|
|
|
|
var reply structs.IndexedIntentions
|
|
|
|
|
|
|
|
defer setMeta(resp, &reply.QueryMeta)
|
2022-12-14 15:24:22 +00:00
|
|
|
if err := s.agent.RPC(req.Context(), "Internal.GatewayIntentions", args, &reply); err != nil {
|
2020-08-11 23:20:41 +00:00
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
return reply.Intentions, nil
|
|
|
|
}
|
2020-09-24 10:13:14 +00:00
|
|
|
|
|
|
|
// UIMetricsProxy handles the /v1/internal/ui/metrics-proxy/ endpoint which, if
|
|
|
|
// configured, provides a simple read-only HTTP proxy to a single metrics
|
|
|
|
// backend to expose it to the UI.
|
|
|
|
func (s *HTTPHandlers) UIMetricsProxy(resp http.ResponseWriter, req *http.Request) (interface{}, error) {
|
|
|
|
// Check the UI was enabled at agent startup (note this is not reloadable
|
|
|
|
// currently).
|
|
|
|
if !s.IsUIEnabled() {
|
2022-04-29 17:42:49 +00:00
|
|
|
return nil, HTTPError{StatusCode: http.StatusNotFound, Reason: "UI is not enabled"}
|
2020-09-24 10:13:14 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Load reloadable proxy config
|
|
|
|
cfg, ok := s.metricsProxyCfg.Load().(config.UIMetricsProxy)
|
|
|
|
if !ok || cfg.BaseURL == "" {
|
|
|
|
// Proxy not configured
|
2022-04-29 17:42:49 +00:00
|
|
|
return nil, HTTPError{StatusCode: http.StatusNotFound, Reason: "Metrics proxy is not enabled"}
|
2020-09-24 10:13:14 +00:00
|
|
|
}
|
|
|
|
|
2020-11-04 18:50:03 +00:00
|
|
|
// Fetch the ACL token, if provided, but ONLY from headers since other
|
|
|
|
// metrics proxies might use a ?token query string parameter for something.
|
|
|
|
var token string
|
|
|
|
s.parseTokenFromHeaders(req, &token)
|
|
|
|
|
|
|
|
// Clear the token from the headers so we don't end up proxying it.
|
|
|
|
s.clearTokenFromHeaders(req)
|
|
|
|
|
2022-04-05 21:10:06 +00:00
|
|
|
var entMeta acl.EnterpriseMeta
|
2021-09-03 12:37:23 +00:00
|
|
|
if err := s.parseEntMetaPartition(req, &entMeta); err != nil {
|
2021-08-19 20:09:42 +00:00
|
|
|
return nil, err
|
|
|
|
}
|
2021-04-14 16:39:35 +00:00
|
|
|
authz, err := s.agent.delegate.ResolveTokenAndDefaultMeta(token, &entMeta, nil)
|
2020-11-04 18:50:03 +00:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
2021-07-30 18:55:35 +00:00
|
|
|
// This endpoint requires wildcard read on all services and all nodes.
|
|
|
|
//
|
|
|
|
// In enterprise it requires this _in all namespaces_ too.
|
2021-08-25 18:43:11 +00:00
|
|
|
//
|
2021-12-10 23:58:17 +00:00
|
|
|
// In enterprise it requires this _in all namespaces and partitions_ too.
|
2021-07-30 18:55:35 +00:00
|
|
|
var authzContext acl.AuthorizerContext
|
2021-12-10 23:58:17 +00:00
|
|
|
wildcardEntMeta := structs.WildcardEnterpriseMetaInPartition(structs.WildcardSpecifier)
|
|
|
|
wildcardEntMeta.FillAuthzContext(&authzContext)
|
2020-11-04 18:50:03 +00:00
|
|
|
|
2022-03-11 02:48:27 +00:00
|
|
|
if err := authz.ToAllowAuthorizer().NodeReadAllAllowed(&authzContext); err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
if err := authz.ToAllowAuthorizer().ServiceReadAllAllowed(&authzContext); err != nil {
|
|
|
|
return nil, err
|
2020-11-04 18:50:03 +00:00
|
|
|
}
|
|
|
|
|
2020-09-24 10:13:14 +00:00
|
|
|
log := s.agent.logger.Named(logging.UIMetricsProxy)
|
|
|
|
|
|
|
|
// Construct the new URL from the path and the base path. Note we do this here
|
|
|
|
// not in the Director function below because we can handle any errors cleanly
|
|
|
|
// here.
|
|
|
|
|
|
|
|
// Replace prefix in the path
|
2022-06-01 17:17:14 +00:00
|
|
|
subPath := strings.TrimPrefix(req.URL.Path, "/v1/internal/ui/metrics-proxy")
|
2020-09-24 10:13:14 +00:00
|
|
|
|
|
|
|
// Append that to the BaseURL (which might contain a path prefix component)
|
|
|
|
newURL := cfg.BaseURL + subPath
|
|
|
|
|
|
|
|
// Parse it into a new URL
|
|
|
|
u, err := url.Parse(newURL)
|
|
|
|
if err != nil {
|
|
|
|
log.Error("couldn't parse target URL", "base_url", cfg.BaseURL, "path", subPath)
|
2022-04-29 17:42:49 +00:00
|
|
|
return nil, HTTPError{StatusCode: http.StatusBadRequest, Reason: "Invalid path."}
|
2020-09-24 10:13:14 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Clean the new URL path to prevent path traversal attacks and remove any
|
|
|
|
// double slashes etc.
|
|
|
|
u.Path = path.Clean(u.Path)
|
|
|
|
|
2020-10-30 21:49:54 +00:00
|
|
|
if len(cfg.PathAllowlist) > 0 {
|
|
|
|
// This could be done better with a map, but for the prometheus default
|
|
|
|
// integration this list has two items in it, so the straight iteration
|
|
|
|
// isn't awful.
|
|
|
|
denied := true
|
|
|
|
for _, allowedPath := range cfg.PathAllowlist {
|
|
|
|
if u.Path == allowedPath {
|
|
|
|
denied = false
|
|
|
|
break
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if denied {
|
|
|
|
log.Error("target URL path is not allowed",
|
|
|
|
"base_url", cfg.BaseURL,
|
|
|
|
"path", subPath,
|
|
|
|
"target_url", u.String(),
|
|
|
|
"path_allowlist", cfg.PathAllowlist,
|
|
|
|
)
|
|
|
|
resp.WriteHeader(http.StatusForbidden)
|
|
|
|
return nil, nil
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-10-09 11:25:17 +00:00
|
|
|
// Pass through query params
|
|
|
|
u.RawQuery = req.URL.RawQuery
|
|
|
|
|
2020-09-24 10:13:14 +00:00
|
|
|
// Validate that the full BaseURL is still a prefix - if there was a path
|
|
|
|
// prefix on the BaseURL but an attacker tried to circumvent it with path
|
|
|
|
// traversal then the Clean above would have resolve the /../ components back
|
|
|
|
// to the actual path which means part of the prefix will now be missing.
|
|
|
|
//
|
|
|
|
// Note that in practice this is not currently possible since any /../ in the
|
|
|
|
// path would have already been resolved by the API server mux and so not even
|
|
|
|
// hit this handler. Any /../ that are far enough into the path to hit this
|
|
|
|
// handler, can't backtrack far enough to eat into the BaseURL either. But we
|
|
|
|
// leave this in anyway in case something changes in the future.
|
|
|
|
if !strings.HasPrefix(u.String(), cfg.BaseURL) {
|
|
|
|
log.Error("target URL escaped from base path",
|
|
|
|
"base_url", cfg.BaseURL,
|
|
|
|
"path", subPath,
|
|
|
|
"target_url", u.String(),
|
|
|
|
)
|
2022-04-29 17:42:49 +00:00
|
|
|
return nil, HTTPError{StatusCode: http.StatusBadRequest, Reason: "Invalid path."}
|
2020-09-24 10:13:14 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Add any configured headers
|
|
|
|
for _, h := range cfg.AddHeaders {
|
2022-05-13 18:05:22 +00:00
|
|
|
if strings.ToLower(h.Name) == "host" {
|
|
|
|
req.Host = h.Value
|
|
|
|
} else {
|
|
|
|
req.Header.Set(h.Name, h.Value)
|
|
|
|
}
|
2020-09-24 10:13:14 +00:00
|
|
|
}
|
|
|
|
|
2020-10-09 11:25:17 +00:00
|
|
|
log.Debug("proxying request", "to", u.String())
|
|
|
|
|
2020-09-24 10:13:14 +00:00
|
|
|
proxy := httputil.ReverseProxy{
|
|
|
|
Director: func(r *http.Request) {
|
|
|
|
r.URL = u
|
|
|
|
},
|
2022-09-08 15:02:05 +00:00
|
|
|
Transport: s.proxyTransport,
|
2020-09-24 10:13:14 +00:00
|
|
|
ErrorLog: log.StandardLogger(&hclog.StandardLoggerOptions{
|
|
|
|
InferLevels: true,
|
|
|
|
}),
|
|
|
|
}
|
|
|
|
|
|
|
|
proxy.ServeHTTP(resp, req)
|
|
|
|
return nil, nil
|
|
|
|
}
|
2022-09-22 21:37:58 +00:00
|
|
|
|
|
|
|
// UIExportedServices is used to list the exported services to a given peer. We return a
|
|
|
|
// barebones ServiceListingSummary which only contains the name and enterprise meta of a service.
|
|
|
|
// Currently, the request and response mirror UIServices but the API may change in the future.
|
|
|
|
func (s *HTTPHandlers) UIExportedServices(resp http.ResponseWriter, req *http.Request) (interface{}, error) {
|
|
|
|
// Parse arguments
|
|
|
|
args := structs.ServiceDumpRequest{}
|
|
|
|
if done := s.parse(resp, req, &args.Datacenter, &args.QueryOptions); done {
|
|
|
|
return nil, nil
|
|
|
|
}
|
|
|
|
if peer := req.URL.Query().Get("peer"); peer != "" {
|
|
|
|
args.PeerName = peer
|
|
|
|
}
|
|
|
|
if err := s.parseEntMeta(req, &args.EnterpriseMeta); err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
// Make the RPC request
|
|
|
|
var out structs.IndexedServiceList
|
|
|
|
defer setMeta(resp, &out.QueryMeta)
|
|
|
|
RPC:
|
2022-12-14 15:24:22 +00:00
|
|
|
if err := s.agent.RPC(req.Context(), "Internal.ExportedServicesForPeer", &args, &out); err != nil {
|
2022-09-22 21:37:58 +00:00
|
|
|
// Retry the request allowing stale data if no leader
|
|
|
|
if strings.Contains(err.Error(), structs.ErrNoLeader.Error()) && !args.AllowStale {
|
|
|
|
args.AllowStale = true
|
|
|
|
goto RPC
|
|
|
|
}
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
// Ensure at least a zero length slice
|
|
|
|
result := make([]*ServiceListingSummary, 0)
|
|
|
|
for _, svc := range out.Services {
|
|
|
|
// We synthesize a minimal summary for the frontend.
|
|
|
|
// The shape of the data may change in the future but
|
|
|
|
// currently only the service name is required.
|
|
|
|
sum := ServiceListingSummary{
|
|
|
|
ServiceSummary: ServiceSummary{
|
|
|
|
Name: svc.Name,
|
|
|
|
EnterpriseMeta: svc.EnterpriseMeta,
|
|
|
|
Datacenter: args.Datacenter,
|
|
|
|
},
|
|
|
|
}
|
|
|
|
result = append(result, &sum)
|
|
|
|
}
|
|
|
|
return result, nil
|
|
|
|
}
|