2023-03-28 18:39:22 +00:00
|
|
|
// Copyright (c) HashiCorp, Inc.
|
2023-08-11 13:12:13 +00:00
|
|
|
// SPDX-License-Identifier: BUSL-1.1
|
2023-03-28 18:39:22 +00:00
|
|
|
|
2013-12-23 19:38:51 +00:00
|
|
|
package agent
|
|
|
|
|
|
|
|
import (
|
|
|
|
"encoding/json"
|
2014-11-18 16:03:36 +00:00
|
|
|
"fmt"
|
2018-06-05 18:09:45 +00:00
|
|
|
"io"
|
2017-09-25 18:40:42 +00:00
|
|
|
"net"
|
2013-12-23 19:38:51 +00:00
|
|
|
"net/http"
|
2014-03-20 00:50:57 +00:00
|
|
|
"net/http/pprof"
|
2022-12-14 15:24:22 +00:00
|
|
|
"net/netip"
|
2015-04-14 00:31:53 +00:00
|
|
|
"net/url"
|
2019-01-25 01:28:52 +00:00
|
|
|
"reflect"
|
2017-07-15 07:07:08 +00:00
|
|
|
"regexp"
|
2014-02-05 22:36:13 +00:00
|
|
|
"strconv"
|
2014-08-22 19:59:47 +00:00
|
|
|
"strings"
|
2020-09-24 10:13:14 +00:00
|
|
|
"sync/atomic"
|
2013-12-23 22:26:34 +00:00
|
|
|
"time"
|
2014-08-22 19:59:47 +00:00
|
|
|
|
2018-04-13 16:57:25 +00:00
|
|
|
"github.com/NYTimes/gziphandler"
|
2019-11-25 17:07:04 +00:00
|
|
|
"github.com/armon/go-metrics"
|
2020-11-13 02:12:12 +00:00
|
|
|
"github.com/armon/go-metrics/prometheus"
|
2020-10-04 17:54:56 +00:00
|
|
|
"github.com/hashicorp/go-cleanhttp"
|
|
|
|
"github.com/mitchellh/mapstructure"
|
|
|
|
"github.com/pkg/errors"
|
2022-10-20 23:10:03 +00:00
|
|
|
"google.golang.org/grpc/codes"
|
|
|
|
"google.golang.org/grpc/status"
|
2020-10-04 17:54:56 +00:00
|
|
|
|
2017-08-23 14:52:48 +00:00
|
|
|
"github.com/hashicorp/consul/acl"
|
2018-06-15 12:13:54 +00:00
|
|
|
"github.com/hashicorp/consul/agent/cache"
|
2020-09-23 11:37:33 +00:00
|
|
|
"github.com/hashicorp/consul/agent/config"
|
2019-01-22 17:19:36 +00:00
|
|
|
"github.com/hashicorp/consul/agent/consul"
|
2023-01-09 10:20:05 +00:00
|
|
|
"github.com/hashicorp/consul/agent/consul/rate"
|
2017-07-06 10:34:00 +00:00
|
|
|
"github.com/hashicorp/consul/agent/structs"
|
2020-09-23 11:37:33 +00:00
|
|
|
"github.com/hashicorp/consul/agent/uiserver"
|
2019-01-25 01:28:52 +00:00
|
|
|
"github.com/hashicorp/consul/api"
|
2023-08-04 18:27:48 +00:00
|
|
|
resourcehttp "github.com/hashicorp/consul/internal/resource/http"
|
2019-12-06 16:14:56 +00:00
|
|
|
"github.com/hashicorp/consul/lib"
|
2020-01-28 23:50:41 +00:00
|
|
|
"github.com/hashicorp/consul/logging"
|
2023-02-17 21:14:46 +00:00
|
|
|
"github.com/hashicorp/consul/proto/private/pbcommon"
|
2013-12-23 19:38:51 +00:00
|
|
|
)
|
|
|
|
|
2020-11-13 02:12:12 +00:00
|
|
|
var HTTPSummaries = []prometheus.SummaryDefinition{
|
|
|
|
{
|
2020-11-13 21:18:04 +00:00
|
|
|
Name: []string{"api", "http"},
|
2020-11-14 00:26:08 +00:00
|
|
|
Help: "Samples how long it takes to service the given HTTP request for the given verb and path.",
|
2020-11-13 02:12:12 +00:00
|
|
|
},
|
|
|
|
}
|
|
|
|
|
2017-09-26 06:11:19 +00:00
|
|
|
// MethodNotAllowedError should be returned by a handler when the HTTP method is not allowed.
|
|
|
|
type MethodNotAllowedError struct {
|
|
|
|
Method string
|
|
|
|
Allow []string
|
|
|
|
}
|
|
|
|
|
|
|
|
func (e MethodNotAllowedError) Error() string {
|
|
|
|
return fmt.Sprintf("method %s not allowed", e.Method)
|
|
|
|
}
|
|
|
|
|
2019-01-07 14:39:23 +00:00
|
|
|
// CodeWithPayloadError allow returning non HTTP 200
|
|
|
|
// Error codes while not returning PlainText payload
|
|
|
|
type CodeWithPayloadError struct {
|
|
|
|
Reason string
|
|
|
|
StatusCode int
|
|
|
|
ContentType string
|
|
|
|
}
|
|
|
|
|
|
|
|
func (e CodeWithPayloadError) Error() string {
|
|
|
|
return e.Reason
|
|
|
|
}
|
|
|
|
|
2022-04-29 17:42:49 +00:00
|
|
|
// HTTPError is returned by the handler when a specific http error
|
|
|
|
// code is needed alongside a plain text response.
|
|
|
|
type HTTPError struct {
|
|
|
|
StatusCode int
|
|
|
|
Reason string
|
2019-01-10 14:27:26 +00:00
|
|
|
}
|
|
|
|
|
2022-04-29 17:42:49 +00:00
|
|
|
func (h HTTPError) Error() string {
|
|
|
|
return h.Reason
|
2019-01-10 14:27:26 +00:00
|
|
|
}
|
|
|
|
|
2020-09-23 11:37:33 +00:00
|
|
|
// HTTPHandlers provides an HTTP api for an agent.
|
2020-09-04 18:42:15 +00:00
|
|
|
type HTTPHandlers struct {
|
2020-09-23 11:37:33 +00:00
|
|
|
agent *Agent
|
|
|
|
denylist *Denylist
|
|
|
|
configReloaders []ConfigReloader
|
|
|
|
h http.Handler
|
2020-09-24 10:13:14 +00:00
|
|
|
metricsProxyCfg atomic.Value
|
2022-09-08 15:02:05 +00:00
|
|
|
|
|
|
|
// proxyTransport is used by UIMetricsProxy to keep
|
|
|
|
// a managed pool of connections.
|
|
|
|
proxyTransport http.RoundTripper
|
ui: modify content path (#5950)
* Add ui-content-path flag
* tests complete, regex validator on string, index.html updated
* cleaning up debugging stuff
* ui: Enable ember environment configuration to be set via the go binary at runtime (#5934)
* ui: Only inject {{.ContentPath}} if we are makeing a prod build...
...otherwise we just use the current rootURL
This gets injected into a <base /> node which solves the assets path
problem but not the ember problem
* ui: Pull out the <base href=""> value and inject it into ember env
See previous commit:
The <base href=""> value is 'sometimes' injected from go at index
serve time. We pass this value down to ember by overwriting the ember
config that is injected via a <meta> tag. This has to be done before
ember bootup.
Sometimes (during testing and development, basically not production)
this is injected with the already existing value, in which case this
essentially changes nothing.
The code here is slightly abstracted away from our specific usage to
make it easier for anyone else to use, and also make sure we can cope
with using this same method to pass variables down from the CLI through
to ember in the future.
* ui: We can't use <base /> move everything to javascript (#5941)
Unfortuantely we can't seem to be able to use <base> and rootURL
together as URL paths will get doubled up (`ui/ui/`).
This moves all the things that we need to interpolate with .ContentPath
to the `startup` javascript so we can conditionally print out
`{{.ContentPath}}` in lots of places (now we can't use base)
* fixed when we serve index.html
* ui: For writing a ContentPath, we also need to cope with testing... (#5945)
...and potentially more environments
Testing has more additional things in a separate index.html in `tests/`
This make the entire thing a little saner and uses just javascriopt
template literals instead of a pseudo handbrake synatx for our
templating of these files.
Intead of just templating the entire file this way, we still only
template `{{content-for 'head'}}` and `{{content-for 'body'}}`
in this way to ensure we support other plugins/addons
* build: Loosen up the regex for retrieving the CONSUL_VERSION (#5946)
* build: Loosen up the regex for retrieving the CONSUL_VERSION
1. Previously the `sed` replacement was searching for the CONSUL_VERSION
comment at the start of a line, it no longer does this to allow for
indentation.
2. Both `grep` and `sed` where looking for the omment at the end of the
line. We've removed this restriction here. We don't need to remove it
right now, but if we ever put the comment followed by something here the
searching would break.
3. Added `xargs` for trimming the resulting version string. We aren't
using this already in the rest of the scripts, but we are pretty sure
this is available on most systems.
* ui: Fix erroneous variable, and also force an ember cache clean on build
1. We referenced a variable incorrectly here, this fixes that.
2. We also made sure that every `make` target clears ember's `tmp` cache
to ensure that its not using any caches that have since been edited
everytime we call a `make` target.
* added docs, fixed encoding
* fixed go fmt
* Update agent/config/config.go
Co-Authored-By: R.B. Boyer <public@richardboyer.net>
* Completed Suggestions
* run gofmt on http.go
* fix testsanitize
* fix fullconfig/hcl by setting correct 'want'
* ran gofmt on agent/config/runtime_test.go
* Update website/source/docs/agent/options.html.md
Co-Authored-By: Hans Hasselberg <me@hans.io>
* Update website/source/docs/agent/options.html.md
Co-Authored-By: kaitlincarter-hc <43049322+kaitlincarter-hc@users.noreply.github.com>
* remove contentpath from redirectFS struct
2019-06-26 16:43:30 +00:00
|
|
|
}
|
|
|
|
|
2017-11-29 00:06:26 +00:00
|
|
|
// endpoint is a Consul-specific HTTP handler that takes the usual arguments in
|
|
|
|
// but returns a response object and error, both of which are handled in a
|
|
|
|
// common manner by Consul's HTTP server.
|
|
|
|
type endpoint func(resp http.ResponseWriter, req *http.Request) (interface{}, error)
|
|
|
|
|
|
|
|
// unboundEndpoint is an endpoint method on a server.
|
2020-09-04 18:42:15 +00:00
|
|
|
type unboundEndpoint func(s *HTTPHandlers, resp http.ResponseWriter, req *http.Request) (interface{}, error)
|
2017-11-29 00:06:26 +00:00
|
|
|
|
|
|
|
// endpoints is a map from URL pattern to unbound endpoint.
|
|
|
|
var endpoints map[string]unboundEndpoint
|
|
|
|
|
2018-02-12 05:28:20 +00:00
|
|
|
// allowedMethods is a map from endpoint prefix to supported HTTP methods.
|
2018-02-18 01:46:11 +00:00
|
|
|
// An empty slice means an endpoint handles OPTIONS requests and MethodNotFound errors itself.
|
2019-10-24 18:38:09 +00:00
|
|
|
var allowedMethods map[string][]string = make(map[string][]string)
|
2018-02-12 05:28:20 +00:00
|
|
|
|
2017-11-29 00:06:26 +00:00
|
|
|
// registerEndpoint registers a new endpoint, which should be done at package
|
|
|
|
// init() time.
|
2018-02-12 05:28:20 +00:00
|
|
|
func registerEndpoint(pattern string, methods []string, fn unboundEndpoint) {
|
2017-11-29 00:06:26 +00:00
|
|
|
if endpoints == nil {
|
|
|
|
endpoints = make(map[string]unboundEndpoint)
|
|
|
|
}
|
2018-02-12 05:28:20 +00:00
|
|
|
if endpoints[pattern] != nil || allowedMethods[pattern] != nil {
|
2017-11-29 00:06:26 +00:00
|
|
|
panic(fmt.Errorf("Pattern %q is already registered", pattern))
|
|
|
|
}
|
2018-04-03 20:33:13 +00:00
|
|
|
|
2017-11-29 00:06:26 +00:00
|
|
|
endpoints[pattern] = fn
|
2018-02-12 05:28:20 +00:00
|
|
|
allowedMethods[pattern] = methods
|
2017-11-29 00:06:26 +00:00
|
|
|
}
|
|
|
|
|
2017-12-20 23:47:53 +00:00
|
|
|
// wrappedMux hangs on to the underlying mux for unit tests.
|
|
|
|
type wrappedMux struct {
|
|
|
|
mux *http.ServeMux
|
|
|
|
handler http.Handler
|
|
|
|
}
|
|
|
|
|
|
|
|
// ServeHTTP implements the http.Handler interface.
|
|
|
|
func (w *wrappedMux) ServeHTTP(resp http.ResponseWriter, req *http.Request) {
|
|
|
|
w.handler.ServeHTTP(resp, req)
|
|
|
|
}
|
|
|
|
|
2020-09-23 11:37:33 +00:00
|
|
|
// ReloadConfig updates any internal state when the config is changed at
|
|
|
|
// runtime.
|
|
|
|
func (s *HTTPHandlers) ReloadConfig(newCfg *config.RuntimeConfig) error {
|
|
|
|
for _, r := range s.configReloaders {
|
|
|
|
if err := r(newCfg); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// handler is used to initialize the Handler. In agent code we only ever call
|
|
|
|
// this once during agent initialization so it was always intended as a single
|
|
|
|
// pass init method. However many test rely on it as a cheaper way to get a
|
|
|
|
// handler to call ServeHTTP against and end up calling it multiple times on a
|
|
|
|
// single agent instance. Until this method had to manage state that might be
|
|
|
|
// affected by a reload or otherwise vary over time that was not problematic
|
|
|
|
// although it was wasteful to redo all this setup work multiple times in one
|
|
|
|
// test.
|
|
|
|
//
|
|
|
|
// Now uiserver and possibly other components need to handle reloadable state
|
|
|
|
// having test randomly clobber the state with the original config again for
|
|
|
|
// each call gets confusing fast. So handler will memoize it's response - it's
|
|
|
|
// allowed to call it multiple times on the same agent, but it will only do the
|
|
|
|
// work the first time and return the same handler on subsequent calls.
|
|
|
|
//
|
|
|
|
// The `enableDebug` argument used in the first call will be effective and a
|
|
|
|
// later change will not do anything. The same goes for the initial config. For
|
|
|
|
// example if config is reloaded with UI enabled but it was not originally, the
|
|
|
|
// http.Handler returned will still have it disabled.
|
|
|
|
//
|
|
|
|
// The first call must not be concurrent with any other call. Subsequent calls
|
|
|
|
// may be concurrent with HTTP requests since no state is modified.
|
2023-06-30 03:00:29 +00:00
|
|
|
func (s *HTTPHandlers) handler() http.Handler {
|
2020-09-23 11:37:33 +00:00
|
|
|
// Memoize multiple calls.
|
|
|
|
if s.h != nil {
|
|
|
|
return s.h
|
|
|
|
}
|
|
|
|
|
2017-05-19 09:53:41 +00:00
|
|
|
mux := http.NewServeMux()
|
|
|
|
|
|
|
|
// handleFuncMetrics takes the given pattern and handler and wraps to produce
|
|
|
|
// metrics based on the pattern and request.
|
|
|
|
handleFuncMetrics := func(pattern string, handler http.HandlerFunc) {
|
2022-06-29 16:46:37 +00:00
|
|
|
// Transform the pattern to a valid label by replacing the '/' by '_'.
|
2020-07-09 08:31:27 +00:00
|
|
|
// Omit the leading slash.
|
|
|
|
// Distinguish thing like /v1/query from /v1/query/<query_id> by having
|
|
|
|
// an extra underscore.
|
|
|
|
path_label := strings.Replace(pattern[1:], "/", "_", -1)
|
2016-08-09 22:41:15 +00:00
|
|
|
|
2020-07-09 08:31:27 +00:00
|
|
|
// Register the wrapper.
|
2017-05-19 09:53:41 +00:00
|
|
|
wrapper := func(resp http.ResponseWriter, req *http.Request) {
|
|
|
|
start := time.Now()
|
|
|
|
handler(resp, req)
|
2020-07-10 09:27:22 +00:00
|
|
|
|
2020-07-09 08:31:27 +00:00
|
|
|
labels := []metrics.Label{{Name: "method", Value: req.Method}, {Name: "path", Value: path_label}}
|
2020-07-10 09:27:22 +00:00
|
|
|
metrics.MeasureSinceWithLabels([]string{"api", "http"}, start, labels)
|
2017-05-19 09:53:41 +00:00
|
|
|
}
|
2018-04-03 20:33:13 +00:00
|
|
|
|
2020-06-08 08:10:08 +00:00
|
|
|
var gzipHandler http.Handler
|
|
|
|
minSize := gziphandler.DefaultMinSize
|
2021-06-14 22:37:05 +00:00
|
|
|
if pattern == "/v1/agent/monitor" || pattern == "/v1/agent/metrics/stream" {
|
2020-06-08 08:10:08 +00:00
|
|
|
minSize = 0
|
|
|
|
}
|
|
|
|
gzipWrapper, err := gziphandler.GzipHandlerWithOpts(gziphandler.MinSize(minSize))
|
|
|
|
if err == nil {
|
|
|
|
gzipHandler = gzipWrapper(http.HandlerFunc(wrapper))
|
|
|
|
} else {
|
|
|
|
gzipHandler = gziphandler.GzipHandler(http.HandlerFunc(wrapper))
|
|
|
|
}
|
2018-04-03 20:33:13 +00:00
|
|
|
mux.Handle(pattern, gzipHandler)
|
2016-08-09 22:41:15 +00:00
|
|
|
}
|
|
|
|
|
2018-10-17 20:20:35 +00:00
|
|
|
// handlePProf takes the given pattern and pprof handler
|
|
|
|
// and wraps it to add authorization and metrics
|
|
|
|
handlePProf := func(pattern string, handler http.HandlerFunc) {
|
2023-06-30 03:00:29 +00:00
|
|
|
|
2018-10-17 20:20:35 +00:00
|
|
|
wrapper := func(resp http.ResponseWriter, req *http.Request) {
|
2023-06-30 03:00:29 +00:00
|
|
|
|
|
|
|
// If enableDebug register wrapped pprof handlers
|
|
|
|
if !s.agent.enableDebug.Load() && s.checkACLDisabled() {
|
|
|
|
resp.WriteHeader(http.StatusNotFound)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2018-10-17 20:20:35 +00:00
|
|
|
var token string
|
|
|
|
s.parseToken(req, &token)
|
|
|
|
|
2021-08-04 21:51:19 +00:00
|
|
|
authz, err := s.agent.delegate.ResolveTokenAndDefaultMeta(token, nil, nil)
|
2018-10-17 20:20:35 +00:00
|
|
|
if err != nil {
|
|
|
|
resp.WriteHeader(http.StatusForbidden)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
// If the token provided does not have the necessary permissions,
|
|
|
|
// write a forbidden response
|
2021-08-20 22:11:01 +00:00
|
|
|
// TODO(partitions): should this be possible in a partition?
|
2022-03-11 21:45:51 +00:00
|
|
|
// TODO(acl-error-enhancements): We should return error details somehow here.
|
2021-08-04 21:51:19 +00:00
|
|
|
if authz.OperatorRead(nil) != acl.Allow {
|
2018-10-17 20:20:35 +00:00
|
|
|
resp.WriteHeader(http.StatusForbidden)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
// Call the pprof handler
|
|
|
|
handler(resp, req)
|
|
|
|
}
|
|
|
|
|
|
|
|
handleFuncMetrics(pattern, http.HandlerFunc(wrapper))
|
|
|
|
}
|
2017-05-19 09:53:41 +00:00
|
|
|
mux.HandleFunc("/", s.Index)
|
2017-11-29 00:06:26 +00:00
|
|
|
for pattern, fn := range endpoints {
|
|
|
|
thisFn := fn
|
2019-07-20 13:37:19 +00:00
|
|
|
methods := allowedMethods[pattern]
|
2017-11-29 00:06:26 +00:00
|
|
|
bound := func(resp http.ResponseWriter, req *http.Request) (interface{}, error) {
|
|
|
|
return thisFn(s, resp, req)
|
|
|
|
}
|
2018-02-12 05:28:20 +00:00
|
|
|
handleFuncMetrics(pattern, s.wrap(bound, methods))
|
2017-11-29 00:06:26 +00:00
|
|
|
}
|
2018-10-17 20:20:35 +00:00
|
|
|
|
2023-06-30 03:00:29 +00:00
|
|
|
handlePProf("/debug/pprof/", pprof.Index)
|
|
|
|
handlePProf("/debug/pprof/cmdline", pprof.Cmdline)
|
|
|
|
handlePProf("/debug/pprof/profile", pprof.Profile)
|
|
|
|
handlePProf("/debug/pprof/symbol", pprof.Symbol)
|
|
|
|
handlePProf("/debug/pprof/trace", pprof.Trace)
|
2014-04-23 19:57:06 +00:00
|
|
|
|
2023-08-04 18:27:48 +00:00
|
|
|
mux.Handle("/api/",
|
|
|
|
http.StripPrefix("/api",
|
|
|
|
resourcehttp.NewHandler(
|
|
|
|
s.agent.delegate.ResourceServiceClient(),
|
|
|
|
s.agent.baseDeps.Registry,
|
|
|
|
s.parseToken,
|
|
|
|
s.agent.logger.Named(logging.HTTP),
|
|
|
|
),
|
|
|
|
),
|
|
|
|
)
|
|
|
|
|
UI V2 (#4086)
* Move settings to use the same service/route API as the rest of the app
* Put some ideas down for unit testing on adapters
* Favour `Model` over `Entity`
* Move away from using `reopen` to using Mixins
* Amend messages, comment/document some usage
* Make sure the returns are consistent in normalizePayload, also
Add some todo's in to remind me to think consider this further at a
later date. For example, is normalizePayload to be a hook or an
overridable method
* Start stripping back the HTML to semantics
* Use a variable rather than chaining
* Remove unused helpers
* Start picking through the new designs, start with listing pages
* First draft HTML for every page
* Making progress on the CSS
* Keep plugging away at the catalog css
* Looking at scrolling
* Wire up filtering
* Sort out filter counting, more or less done a few outstanding
* Start knocking the forms into shape
* Add in codemirror
* Keep moving forwards with the form like layouts
* Start looking at ACL editing page, add footer in
* Pull the filters back in, look at an autoresizer for scroll views
* First draft toggles
* 2nd draft healthcheck icons
* Tweak node healthcheck icons
* Looking at healthcheck detail icons
* Tweak the filter-bar and add selections to the in content tabs
* Add ACL create, pill-like acl type highlight
* Tweaking the main nav some more
* Working on the filter-bar and freetext-filter
* Masonry layout
* Stick with `checks` instead of healthy/unhealthy
* Fix up the filter numbers/counts
* Use the thead for a measure
* First draft tomography back in
* First draft DC dropdown
* Add a temporary create buttong to kv's
* Move KV and ACL to use a create page
* Move tags
* Run through old tests
* Injectable server
* Start adding test attributes
* Add some page objects
* More test attributes and pages
* Acl filter objects
* Add a page.. page object
* Clickable items in lists
* Add rest/spread babel plugin, remove mirage for now
* Add fix for ember-collection
* Keep track of acl filters
* ember-cli-page-object
* ember-test-selectors
* ui: update version of ui compile deps
* Update static assets
* Centralize radiogroup helper
* Rejig KV's and begin to clean it up
* Work around lack of Tags for the moment..
* Some little css tweaks and start to remove possibles
* Working on the dc page and incidentals
1. Sort the datacenter-picker list
2. Add a selected state to the datacenter-picker
3. Make dc an {Name: dc}
4. Add an env helper to get to 'env vars' from within templates
* Click outside stuff for the datacenter-picker, is-active on nav
* Make sure the dropdown CTA can be active
* Bump ember add pluralize helper
* Little try at sass based custom queries
* Rejig tablular collection so it deals with resizing, actions
1. WIP: start building actions dropdowns
2. Move tabular collection to deal with resizing to rule out differences
* First draft actions dropdowns
* Add ports, selectable IP's
* Flash messages, plus general cleanup/consistency
1. Add ember-cli-flash for flash messages
2. Move everything to get() instead of item.get
3. Spotted a few things that weren't consistent
* DOn't go lower than zero
* First draft vertical menu
* Missed a get, tweak dropmenu tick
* Big cleanup
1. this.get(), this.set() > get(), set()
2. assign > {...{}, ...{}}
3. Seperator > separator
* WIP: settings
* Moved things into a ui-v2 folder
* Decide on a way to do the settings page whilst maintaining the url + dc's
* Start some error pages
* Remove base64 polyfill
* Tie in settings, fix atob bug, tweak layout css
* Centralize confirmations into a component
* Allow switching between the old and new UI with the CONSUL_UI_BETA env var
Currently all the assets are packaged into a single AssetFS and a prefix is configured to switch between the two.
* Attempt at some updates to integrate the v2 ui build into the main infrastructure
* Add redirect to index.html for unknown paths
* Allow redictor to /index.html for new ui when using -ui-dir
* Take ACLs to the correct place on save
* First pass breadcrumbs
* Remove datacenter selector on the index page
* Tweak overall layout
* Make buttons 'resets'
* Tweak last DC stuff
* Validations plus kv keyname viewing tweaks
* Pull sessions back in
* Tweak the env vars to be more reusable
* Move isAnon to the view
* No items and disabled acl css
* ACL and KV details
1. Unauthorized page
2. Make sure the ACL is always selected when it needs it
3. Check record deletion with a changeset
* Few more acl tweaks/corrections
* Add no items view to node > services
* Tags for node > services
* Make sure we have tags
* Fix up the labels on the tomography graph
* Add node link (agent) to kv sessions
* Duplicate up `create` for KV 'root creation'
* Safety check for health checks
* Fix up the grids
* Truncate td a's, fix kv columns
* Watch for spaces in KV id's
* Move actions to their own mixins for now at least
* Link reset to settings incase I want to type it in
* Tweak error page
* Cleanup healthcheck icons in service listing
* Centralize errors and make getting back easier
* Nice numbers
* Compact buttons
* Some incidental css cleanups
* Use 'Key / Value' for root
* Tweak tomography layout
* Fix single healthcheck unhealthy resource
* Get loading screen ready
* Fix healthy healthcheck tick
* Everything in header starts white
* First draft loader
* Refactor the entire backend to use proper unique keys, plus..
1. Make unique keys form dc + slug (uid)
2. Fun with errors...
* Tweak header colors
* Add noopener noreferrer to external links
* Add supers to setupController
* Implement cloning, using ember-data...
* Move the more expensive down the switch order
* First draft empty record cleanup..
* Add the cusomt store test
* Temporarily use the htmlSafe prototype to remove the console warning
* Encode hashes in urls
* Go back to using title for errors for now
* Start removing unused bulma
* Lint
* WIP: Start looking at failing tests
* Remove single redirect test
* Finish off error message styling
* Add full ember-data cache invalidation to avoid stale data...
* Add uncolorable warning icons
* More info icon
* Rearrange single service, plus tag printing
* Logo
* No quotes
* Add a simple startup logo
* Tweak healthcheck statuses
* Fix border-color for healthchecks
* Tweak node tabs
* Catch 401 ACL errors and rethrow with the provided error message
* Remove old acl unauth and error routes
* Missed a super
* Make 'All' refer to number of checks, not services
* Remove ember-resizer, add autoprefixer
* Don't show tomography if its not worth it, viewify it more also
* Little model cleanup
* Chevrons
* Find a way to reliably set the class of html from the view
* Consistent html
* Make sure session id's are visible as long as possible
* Fix single service check count
* Add filters and searchs to the query string
* Don't remember the selected tab
* Change text
* Eror tweaking
* Use chevrons on all breadcrumbs even in kv's
* Clean up a file
* Tweak some messaging
* Makesure the footer overlays whats in the page
* Tweak KV errors
* Move json toggle over to the right
* feedback-dialog along with copy buttons
* Better confirmation dialogs
* Add git sha comment
* Same title as old UI
* Allow defaults
* Make sure value is a string
* WIP: Scrolling dropdowns/confirmations
* Add to kv's
* Remove set
* First pass trace
* Better table rows
* Pull over the hashi code editor styles
* Editor tweaks
* Responsive tabs
* Add number formatting to tomography
* Review whats left todo
* Lint
* Add a coordinate ember data triplet
* Bump in a v2.0.0
* Update old tests
* Get coverage working again
* Make sure query keys are also encoded
* Don't test console.error
* Unit test some more utils
* Tweak the size of the tabular collections
* Clean up gitignore
* Fix copy button rollovers
* Get healthcheck 'icon icons' onto the text baseline
* Tweak healthcheck padding and alignment
* Make sure commas kick in in rtt, probably never get to that
* Improve vertical menu
* Tweak dropdown active state to not have a bg
* Tweak paddings
* Search entire string not just 'startsWith'
* Button states
* Most buttons have 1px border
* More button tweaks
* You can only view kv folders
* CSS cleanup reduction
* Form input states and little cleanup
* More CSS reduction
* Sort checks by importance
* Fix click outside on datacenter picker
* Make sure table th's also auto calculate properly
* Make sure `json` isn't remembered in KV editing
* Fix recursive deletion in KV's
* Centralize size
* Catch updateRecord
* Don't double envode
* model > item consistency
* Action loading and ACL tweaks
* Add settings dependencies to acl tests
* Better loading
* utf-8 base64 encode/decode
* Don't hang off a prototype for htmlSafe
* Missing base64 files...
* Get atob/btoa polyfill right
* Shadowy rollovers
* Disabled button styling for primaries
* autofocuses only onload for now
* Fix footer centering
* Beginning of 'notices'
* Remove the isLocked disabling as we are letting you do what the API does
* Don't forget the documentation link for sessions
* Updates are more likely
* Use exported constant
* Dont export redirectFS and a few other PR updates
* Remove the old bootstrap config which was used for the old UI skin
* Use curlies for multiple properties
2018-05-10 18:52:53 +00:00
|
|
|
if s.IsUIEnabled() {
|
2020-09-23 11:37:33 +00:00
|
|
|
// Note that we _don't_ support reloading ui_config.{enabled, content_dir,
|
|
|
|
// content_path} since this only runs at initial startup.
|
2020-10-09 13:32:39 +00:00
|
|
|
uiHandler := uiserver.NewHandler(
|
|
|
|
s.agent.config,
|
|
|
|
s.agent.logger.Named(logging.HTTP),
|
2021-03-24 18:43:42 +00:00
|
|
|
s.uiTemplateDataTransform,
|
2020-10-09 13:32:39 +00:00
|
|
|
)
|
2020-09-23 11:37:33 +00:00
|
|
|
s.configReloaders = append(s.configReloaders, uiHandler.ReloadConfig)
|
2020-03-03 13:18:35 +00:00
|
|
|
|
2020-09-23 11:37:33 +00:00
|
|
|
// Wrap it to add the headers specified by the http_config.response_headers
|
|
|
|
// user config
|
|
|
|
uiHandlerWithHeaders := serveHandlerWithHeaders(
|
|
|
|
uiHandler,
|
2020-03-03 13:18:35 +00:00
|
|
|
s.agent.config.HTTPResponseHeaders,
|
|
|
|
)
|
2021-03-24 18:43:42 +00:00
|
|
|
mux.Handle("/robots.txt", uiHandlerWithHeaders)
|
2020-03-03 13:18:35 +00:00
|
|
|
mux.Handle(
|
2020-09-23 11:37:33 +00:00
|
|
|
s.agent.config.UIConfig.ContentPath,
|
2020-03-03 13:18:35 +00:00
|
|
|
http.StripPrefix(
|
2020-09-23 11:37:33 +00:00
|
|
|
s.agent.config.UIConfig.ContentPath,
|
|
|
|
uiHandlerWithHeaders,
|
2020-03-03 13:18:35 +00:00
|
|
|
),
|
|
|
|
)
|
2015-02-11 21:25:04 +00:00
|
|
|
}
|
2020-09-24 10:13:14 +00:00
|
|
|
// Initialize (reloadable) metrics proxy config
|
|
|
|
s.metricsProxyCfg.Store(s.agent.config.UIConfig.MetricsProxy)
|
|
|
|
s.configReloaders = append(s.configReloaders, func(cfg *config.RuntimeConfig) error {
|
|
|
|
s.metricsProxyCfg.Store(cfg.UIConfig.MetricsProxy)
|
|
|
|
return nil
|
|
|
|
})
|
2017-12-20 23:47:53 +00:00
|
|
|
|
|
|
|
// Wrap the whole mux with a handler that bans URLs with non-printable
|
2018-07-26 12:53:39 +00:00
|
|
|
// characters, unless disabled explicitly to deal with old keys that fail this
|
|
|
|
// check.
|
|
|
|
h := cleanhttp.PrintablePathCheckHandler(mux, nil)
|
|
|
|
if s.agent.config.DisableHTTPUnprintableCharFilter {
|
|
|
|
h = mux
|
|
|
|
}
|
2022-12-14 15:24:22 +00:00
|
|
|
|
2020-05-13 22:47:05 +00:00
|
|
|
h = s.enterpriseHandler(h)
|
2022-12-14 15:24:22 +00:00
|
|
|
h = withRemoteAddrHandler(h)
|
2020-09-23 11:37:33 +00:00
|
|
|
s.h = &wrappedMux{
|
2017-12-20 23:47:53 +00:00
|
|
|
mux: mux,
|
2018-07-26 12:53:39 +00:00
|
|
|
handler: h,
|
2017-12-20 23:47:53 +00:00
|
|
|
}
|
2020-09-23 11:37:33 +00:00
|
|
|
return s.h
|
2019-12-13 19:50:07 +00:00
|
|
|
}
|
|
|
|
|
2022-12-14 15:24:22 +00:00
|
|
|
// Injects remote addr into the request's context
|
|
|
|
func withRemoteAddrHandler(next http.Handler) http.Handler {
|
|
|
|
return http.HandlerFunc(func(resp http.ResponseWriter, req *http.Request) {
|
|
|
|
addrPort, err := netip.ParseAddrPort(req.RemoteAddr)
|
|
|
|
if err == nil {
|
|
|
|
remoteAddr := net.TCPAddrFromAddrPort(addrPort)
|
|
|
|
ctx := consul.ContextWithRemoteAddr(req.Context(), remoteAddr)
|
|
|
|
req = req.WithContext(ctx)
|
|
|
|
}
|
|
|
|
next.ServeHTTP(resp, req)
|
|
|
|
})
|
|
|
|
}
|
|
|
|
|
2017-12-22 04:30:29 +00:00
|
|
|
// nodeName returns the node name of the agent
|
2020-09-04 18:42:15 +00:00
|
|
|
func (s *HTTPHandlers) nodeName() string {
|
2017-12-22 04:30:29 +00:00
|
|
|
return s.agent.config.NodeName
|
|
|
|
}
|
|
|
|
|
2017-07-15 07:07:08 +00:00
|
|
|
// aclEndpointRE is used to find old ACL endpoints that take tokens in the URL
|
|
|
|
// so that we can redact them. The ACL endpoints that take the token in the URL
|
|
|
|
// are all of the form /v1/acl/<verb>/<token>, and can optionally include query
|
|
|
|
// parameters which are indicated by a question mark. We capture the part before
|
|
|
|
// the token, the token, and any query parameters after, and then reassemble as
|
|
|
|
// $1<hidden>$3 (the token in $2 isn't used), which will give:
|
|
|
|
//
|
|
|
|
// /v1/acl/clone/foo -> /v1/acl/clone/<hidden>
|
|
|
|
// /v1/acl/clone/foo?token=bar -> /v1/acl/clone/<hidden>?token=<hidden>
|
|
|
|
//
|
|
|
|
// The query parameter in the example above is obfuscated like any other, after
|
|
|
|
// this regular expression is applied, so the regular expression substitution
|
|
|
|
// results in:
|
|
|
|
//
|
2022-10-21 19:58:06 +00:00
|
|
|
// /v1/acl/clone/foo?token=bar -> /v1/acl/clone/<hidden>?token=bar
|
|
|
|
// ^---- $1 ----^^- $2 -^^-- $3 --^
|
2017-07-15 07:07:08 +00:00
|
|
|
//
|
|
|
|
// And then the loop that looks for parameters called "token" does the last
|
|
|
|
// step to get to the final redacted form.
|
|
|
|
var (
|
2018-10-19 16:04:07 +00:00
|
|
|
aclEndpointRE = regexp.MustCompile("^(/v1/acl/(create|update|destroy|info|clone|list)/)([^?]+)([?]?.*)$")
|
2017-07-15 07:07:08 +00:00
|
|
|
)
|
|
|
|
|
2013-12-23 19:38:51 +00:00
|
|
|
// wrap is used to wrap functions to make them more convenient
|
2020-09-04 18:42:15 +00:00
|
|
|
func (s *HTTPHandlers) wrap(handler endpoint, methods []string) http.HandlerFunc {
|
2020-01-28 23:50:41 +00:00
|
|
|
httpLogger := s.agent.logger.Named(logging.HTTP)
|
2017-05-11 17:37:47 +00:00
|
|
|
return func(resp http.ResponseWriter, req *http.Request) {
|
2017-09-25 18:40:42 +00:00
|
|
|
setHeaders(resp, s.agent.config.HTTPResponseHeaders)
|
|
|
|
setTranslateAddr(resp, s.agent.config.TranslateWANAddrs)
|
2021-08-06 22:59:05 +00:00
|
|
|
setACLDefaultPolicy(resp, s.agent.config.ACLResolverSettings.ACLDefaultPolicy)
|
2014-12-28 04:53:19 +00:00
|
|
|
|
2015-04-12 18:17:31 +00:00
|
|
|
// Obfuscate any tokens from appearing in the logs
|
2015-04-14 00:31:53 +00:00
|
|
|
formVals, err := url.ParseQuery(req.URL.RawQuery)
|
|
|
|
if err != nil {
|
2020-01-28 23:50:41 +00:00
|
|
|
httpLogger.Error("Failed to decode query",
|
|
|
|
"from", req.RemoteAddr,
|
|
|
|
"error", err,
|
|
|
|
)
|
2017-08-23 19:19:11 +00:00
|
|
|
resp.WriteHeader(http.StatusInternalServerError)
|
2015-04-14 00:31:53 +00:00
|
|
|
return
|
|
|
|
}
|
2015-04-12 18:17:31 +00:00
|
|
|
logURL := req.URL.String()
|
2015-04-14 00:31:53 +00:00
|
|
|
if tokens, ok := formVals["token"]; ok {
|
2015-04-12 18:17:31 +00:00
|
|
|
for _, token := range tokens {
|
2015-06-12 07:09:51 +00:00
|
|
|
if token == "" {
|
|
|
|
logURL += "<hidden>"
|
|
|
|
continue
|
|
|
|
}
|
2015-04-12 18:17:31 +00:00
|
|
|
logURL = strings.Replace(logURL, token, "<hidden>", -1)
|
|
|
|
}
|
2023-01-24 16:21:41 +00:00
|
|
|
httpLogger.Warn("This request used the token query parameter "+
|
|
|
|
"which is deprecated and will be removed in Consul 1.17",
|
|
|
|
"logUrl", logURL)
|
2015-04-12 18:17:31 +00:00
|
|
|
}
|
2018-10-19 16:04:07 +00:00
|
|
|
logURL = aclEndpointRE.ReplaceAllString(logURL, "$1<hidden>$4")
|
2015-04-12 18:17:31 +00:00
|
|
|
|
2023-10-11 15:44:03 +00:00
|
|
|
rejectCatalogV1Endpoint := false
|
|
|
|
if s.agent.baseDeps.UseV2Resources() {
|
|
|
|
rejectCatalogV1Endpoint = isV1CatalogRequest(logURL)
|
|
|
|
}
|
|
|
|
|
2020-05-29 18:19:16 +00:00
|
|
|
if s.denylist.Block(req.URL.Path) {
|
2017-07-10 20:51:25 +00:00
|
|
|
errMsg := "Endpoint is blocked by agent configuration"
|
2020-01-28 23:50:41 +00:00
|
|
|
httpLogger.Error("Request error",
|
|
|
|
"method", req.Method,
|
|
|
|
"url", logURL,
|
|
|
|
"from", req.RemoteAddr,
|
|
|
|
"error", errMsg,
|
|
|
|
)
|
2017-07-10 20:51:25 +00:00
|
|
|
resp.WriteHeader(http.StatusForbidden)
|
|
|
|
fmt.Fprint(resp, errMsg)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2019-01-10 14:27:26 +00:00
|
|
|
isForbidden := func(err error) bool {
|
|
|
|
if acl.IsErrPermissionDenied(err) || acl.IsErrNotFound(err) {
|
|
|
|
return true
|
|
|
|
}
|
2022-10-20 23:10:03 +00:00
|
|
|
if e, ok := status.FromError(err); ok && e.Code() == codes.PermissionDenied {
|
|
|
|
return true
|
|
|
|
}
|
2022-04-29 17:42:49 +00:00
|
|
|
return false
|
2019-01-10 14:27:26 +00:00
|
|
|
}
|
|
|
|
|
2023-01-09 10:20:05 +00:00
|
|
|
isTooManyRequests := func(err error) bool {
|
|
|
|
if err == nil {
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
|
|
|
// Client-side RPC limits.
|
|
|
|
if structs.IsErrRPCRateExceeded(err) {
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
|
|
|
|
// Connect CA rate limiter.
|
|
|
|
if err.Error() == consul.ErrRateLimited.Error() {
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
|
|
|
|
// gRPC server rate limit interceptor.
|
|
|
|
if status.Code(err) == codes.ResourceExhausted {
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
|
|
|
|
// net/rpc server rate limit interceptor.
|
|
|
|
return strings.Contains(err.Error(), rate.ErrRetryElsewhere.Error())
|
|
|
|
}
|
|
|
|
|
|
|
|
isServiceUnavailable := func(err error) bool {
|
|
|
|
if err == nil {
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
|
|
|
// gRPC server rate limit interceptor.
|
|
|
|
if status.Code(err) == codes.Unavailable {
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
|
|
|
|
// net/rpc server rate limit interceptor.
|
|
|
|
return strings.Contains(err.Error(), rate.ErrRetryLater.Error())
|
|
|
|
}
|
|
|
|
|
2023-10-11 15:44:03 +00:00
|
|
|
isUsingV2CatalogExperiment := func(err error) bool {
|
|
|
|
if err == nil {
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
|
|
|
return structs.IsErrUsingV2CatalogExperiment(err)
|
|
|
|
}
|
|
|
|
|
2017-09-26 06:11:19 +00:00
|
|
|
isMethodNotAllowed := func(err error) bool {
|
|
|
|
_, ok := err.(MethodNotAllowedError)
|
|
|
|
return ok
|
|
|
|
}
|
|
|
|
|
2018-02-12 05:28:20 +00:00
|
|
|
addAllowHeader := func(methods []string) {
|
|
|
|
resp.Header().Add("Allow", strings.Join(methods, ","))
|
|
|
|
}
|
|
|
|
|
2022-04-29 17:42:49 +00:00
|
|
|
isHTTPError := func(err error) bool {
|
|
|
|
_, ok := err.(HTTPError)
|
|
|
|
return ok
|
|
|
|
}
|
|
|
|
|
2017-05-11 17:37:47 +00:00
|
|
|
handleErr := func(err error) {
|
2021-07-27 21:06:59 +00:00
|
|
|
if req.Context().Err() != nil {
|
|
|
|
httpLogger.Info("Request cancelled",
|
|
|
|
"method", req.Method,
|
|
|
|
"url", logURL,
|
|
|
|
"from", req.RemoteAddr,
|
|
|
|
"error", err)
|
|
|
|
} else {
|
|
|
|
httpLogger.Error("Request error",
|
|
|
|
"method", req.Method,
|
|
|
|
"url", logURL,
|
|
|
|
"from", req.RemoteAddr,
|
|
|
|
"error", err)
|
|
|
|
}
|
|
|
|
|
2023-01-09 10:20:05 +00:00
|
|
|
// If the error came from gRPC, unpack it to get the real message.
|
|
|
|
msg := err.Error()
|
|
|
|
if s, ok := status.FromError(err); ok {
|
|
|
|
msg = s.Message()
|
|
|
|
}
|
|
|
|
|
2023-10-11 15:44:03 +00:00
|
|
|
if isUsingV2CatalogExperiment(err) && !isHTTPError(err) {
|
|
|
|
err = newRejectV1RequestWhenV2EnabledError()
|
|
|
|
}
|
|
|
|
|
2017-08-23 14:52:48 +00:00
|
|
|
switch {
|
2019-01-10 14:27:26 +00:00
|
|
|
case isForbidden(err):
|
2020-05-13 22:47:05 +00:00
|
|
|
resp.WriteHeader(http.StatusForbidden)
|
2023-01-09 10:20:05 +00:00
|
|
|
case isTooManyRequests(err):
|
2020-05-13 22:47:05 +00:00
|
|
|
resp.WriteHeader(http.StatusTooManyRequests)
|
2023-01-09 10:20:05 +00:00
|
|
|
case isServiceUnavailable(err):
|
|
|
|
resp.WriteHeader(http.StatusServiceUnavailable)
|
2017-09-26 06:11:19 +00:00
|
|
|
case isMethodNotAllowed(err):
|
|
|
|
// RFC2616 states that for 405 Method Not Allowed the response
|
|
|
|
// MUST include an Allow header containing the list of valid
|
|
|
|
// methods for the requested resource.
|
|
|
|
// https://www.w3.org/Protocols/rfc2616/rfc2616-sec10.html
|
2018-02-12 05:28:20 +00:00
|
|
|
addAllowHeader(err.(MethodNotAllowedError).Allow)
|
2020-05-13 22:47:05 +00:00
|
|
|
resp.WriteHeader(http.StatusMethodNotAllowed) // 405
|
2022-04-29 17:42:49 +00:00
|
|
|
case isHTTPError(err):
|
|
|
|
err := err.(HTTPError)
|
|
|
|
code := http.StatusInternalServerError
|
|
|
|
if err.StatusCode != 0 {
|
|
|
|
code = err.StatusCode
|
|
|
|
}
|
2023-01-09 10:20:05 +00:00
|
|
|
if msg == "" {
|
|
|
|
msg = "An unexpected error occurred"
|
2022-04-29 17:42:49 +00:00
|
|
|
}
|
|
|
|
resp.WriteHeader(code)
|
2017-08-23 14:52:48 +00:00
|
|
|
default:
|
2020-05-13 22:47:05 +00:00
|
|
|
resp.WriteHeader(http.StatusInternalServerError)
|
2017-05-11 17:37:47 +00:00
|
|
|
}
|
2023-01-09 10:20:05 +00:00
|
|
|
|
|
|
|
fmt.Fprint(resp, msg)
|
2017-05-11 17:37:47 +00:00
|
|
|
}
|
|
|
|
|
2013-12-23 22:26:34 +00:00
|
|
|
start := time.Now()
|
|
|
|
defer func() {
|
2020-01-28 23:50:41 +00:00
|
|
|
httpLogger.Debug("Request finished",
|
|
|
|
"method", req.Method,
|
|
|
|
"url", logURL,
|
|
|
|
"from", req.RemoteAddr,
|
|
|
|
"latency", time.Since(start).String(),
|
|
|
|
)
|
2013-12-23 22:26:34 +00:00
|
|
|
}()
|
2018-02-12 05:28:20 +00:00
|
|
|
|
|
|
|
var obj interface{}
|
|
|
|
|
2018-02-18 01:33:21 +00:00
|
|
|
// if this endpoint has declared methods, respond appropriately to OPTIONS requests. Otherwise let the endpoint handle that.
|
|
|
|
if req.Method == "OPTIONS" && len(methods) > 0 {
|
2018-02-12 05:28:20 +00:00
|
|
|
addAllowHeader(append([]string{"OPTIONS"}, methods...))
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2018-02-18 01:33:21 +00:00
|
|
|
// if this endpoint has declared methods, check the request method. Otherwise let the endpoint handle that.
|
|
|
|
methodFound := len(methods) == 0
|
2018-02-12 05:28:20 +00:00
|
|
|
for _, method := range methods {
|
|
|
|
if method == req.Method {
|
|
|
|
methodFound = true
|
|
|
|
break
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if !methodFound {
|
|
|
|
err = MethodNotAllowedError{req.Method, append([]string{"OPTIONS"}, methods...)}
|
|
|
|
} else {
|
2019-01-10 14:27:26 +00:00
|
|
|
err = s.checkWriteAccess(req)
|
|
|
|
|
2021-12-13 17:02:58 +00:00
|
|
|
// Give the user a hint that they might be doing something wrong if they issue a GET request
|
|
|
|
// with a non-empty body (e.g., parameters placed in body rather than query string).
|
|
|
|
if req.Method == http.MethodGet {
|
|
|
|
if req.ContentLength > 0 {
|
|
|
|
httpLogger.Warn("GET request has a non-empty body that will be ignored; "+
|
|
|
|
"check whether parameters meant for the query string were accidentally placed in the body",
|
|
|
|
"url", logURL,
|
|
|
|
"from", req.RemoteAddr)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-01-10 14:27:26 +00:00
|
|
|
if err == nil {
|
|
|
|
// Invoke the handler
|
2023-10-11 15:44:03 +00:00
|
|
|
if rejectCatalogV1Endpoint {
|
|
|
|
obj = nil
|
|
|
|
err = s.rejectV1RequestWhenV2Enabled()
|
|
|
|
} else {
|
|
|
|
obj, err = handler(resp, req)
|
|
|
|
}
|
2019-01-10 14:27:26 +00:00
|
|
|
}
|
2018-02-12 05:28:20 +00:00
|
|
|
}
|
2019-01-07 14:39:23 +00:00
|
|
|
contentType := "application/json"
|
|
|
|
httpCode := http.StatusOK
|
2013-12-23 19:38:51 +00:00
|
|
|
if err != nil {
|
2019-01-07 14:39:23 +00:00
|
|
|
if errPayload, ok := err.(CodeWithPayloadError); ok {
|
|
|
|
httpCode = errPayload.StatusCode
|
|
|
|
if errPayload.ContentType != "" {
|
|
|
|
contentType = errPayload.ContentType
|
|
|
|
}
|
|
|
|
if errPayload.Reason != "" {
|
|
|
|
resp.Header().Add("X-Consul-Reason", errPayload.Reason)
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
handleErr(err)
|
|
|
|
return
|
|
|
|
}
|
2017-05-11 17:37:47 +00:00
|
|
|
}
|
|
|
|
if obj == nil {
|
2013-12-23 19:38:51 +00:00
|
|
|
return
|
|
|
|
}
|
2019-01-07 14:39:23 +00:00
|
|
|
var buf []byte
|
|
|
|
if contentType == "application/json" {
|
|
|
|
buf, err = s.marshalJSON(req, obj)
|
|
|
|
if err != nil {
|
|
|
|
handleErr(err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
if strings.HasPrefix(contentType, "text/") {
|
|
|
|
if val, ok := obj.(string); ok {
|
|
|
|
buf = []byte(val)
|
|
|
|
}
|
|
|
|
}
|
2013-12-23 19:38:51 +00:00
|
|
|
}
|
2019-01-07 14:39:23 +00:00
|
|
|
resp.Header().Set("Content-Type", contentType)
|
|
|
|
resp.WriteHeader(httpCode)
|
2017-05-11 17:37:47 +00:00
|
|
|
resp.Write(buf)
|
2013-12-23 19:38:51 +00:00
|
|
|
}
|
|
|
|
}
|
2013-12-24 00:20:51 +00:00
|
|
|
|
2023-10-11 15:44:03 +00:00
|
|
|
func isV1CatalogRequest(logURL string) bool {
|
|
|
|
switch {
|
|
|
|
case strings.HasPrefix(logURL, "/v1/catalog/"),
|
|
|
|
strings.HasPrefix(logURL, "/v1/health/"),
|
|
|
|
strings.HasPrefix(logURL, "/v1/config/"):
|
|
|
|
return true
|
|
|
|
|
|
|
|
case strings.HasPrefix(logURL, "/v1/agent/token/"),
|
|
|
|
logURL == "/v1/agent/self",
|
|
|
|
logURL == "/v1/agent/host",
|
|
|
|
logURL == "/v1/agent/version",
|
|
|
|
logURL == "/v1/agent/reload",
|
|
|
|
logURL == "/v1/agent/monitor",
|
|
|
|
logURL == "/v1/agent/metrics",
|
|
|
|
logURL == "/v1/agent/metrics/stream",
|
|
|
|
logURL == "/v1/agent/members",
|
|
|
|
strings.HasPrefix(logURL, "/v1/agent/join/"),
|
|
|
|
logURL == "/v1/agent/leave",
|
|
|
|
strings.HasPrefix(logURL, "/v1/agent/force-leave/"),
|
|
|
|
logURL == "/v1/agent/connect/authorize",
|
|
|
|
logURL == "/v1/agent/connect/ca/roots",
|
|
|
|
strings.HasPrefix(logURL, "/v1/agent/connect/ca/leaf/"):
|
|
|
|
return false
|
|
|
|
|
|
|
|
case strings.HasPrefix(logURL, "/v1/agent/"):
|
|
|
|
return true
|
|
|
|
|
|
|
|
case logURL == "/v1/internal/acl/authorize",
|
|
|
|
logURL == "/v1/internal/service-virtual-ip",
|
|
|
|
logURL == "/v1/internal/ui/oidc-auth-methods",
|
|
|
|
strings.HasPrefix(logURL, "/v1/internal/ui/metrics-proxy/"):
|
|
|
|
return false
|
|
|
|
|
|
|
|
case strings.HasPrefix(logURL, "/v1/internal/"):
|
|
|
|
return true
|
|
|
|
default:
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-05-07 00:50:58 +00:00
|
|
|
// marshalJSON marshals the object into JSON, respecting the user's pretty-ness
|
|
|
|
// configuration.
|
2020-09-04 18:42:15 +00:00
|
|
|
func (s *HTTPHandlers) marshalJSON(req *http.Request, obj interface{}) ([]byte, error) {
|
2016-11-18 06:31:19 +00:00
|
|
|
if _, ok := req.URL.Query()["pretty"]; ok || s.agent.config.DevMode {
|
2016-05-07 00:50:58 +00:00
|
|
|
buf, err := json.MarshalIndent(obj, "", " ")
|
2016-05-10 21:37:05 +00:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
2023-08-05 02:45:24 +00:00
|
|
|
if ok {
|
|
|
|
buf = append(buf, "\n"...)
|
|
|
|
}
|
2016-05-10 21:37:05 +00:00
|
|
|
return buf, nil
|
2016-05-07 00:50:58 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
buf, err := json.Marshal(obj)
|
2016-05-10 21:37:05 +00:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
2020-06-24 12:29:21 +00:00
|
|
|
return buf, nil
|
2016-05-07 00:50:58 +00:00
|
|
|
}
|
|
|
|
|
2016-02-13 00:11:32 +00:00
|
|
|
// Returns true if the UI is enabled.
|
2020-09-04 18:42:15 +00:00
|
|
|
func (s *HTTPHandlers) IsUIEnabled() bool {
|
2020-09-23 11:37:33 +00:00
|
|
|
// Note that we _don't_ support reloading ui_config.{enabled,content_dir}
|
|
|
|
// since this only runs at initial startup.
|
|
|
|
return s.agent.config.UIConfig.Dir != "" || s.agent.config.UIConfig.Enabled
|
2016-02-13 00:11:32 +00:00
|
|
|
}
|
|
|
|
|
2013-12-25 01:09:51 +00:00
|
|
|
// Renders a simple index page
|
2020-09-04 18:42:15 +00:00
|
|
|
func (s *HTTPHandlers) Index(resp http.ResponseWriter, req *http.Request) {
|
2020-09-23 11:37:33 +00:00
|
|
|
// Send special headers too since this endpoint isn't wrapped with something
|
|
|
|
// that sends them.
|
|
|
|
setHeaders(resp, s.agent.config.HTTPResponseHeaders)
|
|
|
|
|
2014-04-27 19:10:38 +00:00
|
|
|
// Check if this is a non-index path
|
|
|
|
if req.URL.Path != "/" {
|
2017-08-23 19:19:11 +00:00
|
|
|
resp.WriteHeader(http.StatusNotFound)
|
2021-12-13 16:26:35 +00:00
|
|
|
|
|
|
|
if strings.Contains(req.URL.Path, "/v1/") {
|
|
|
|
fmt.Fprintln(resp, "Invalid URL path: not a recognized HTTP API endpoint")
|
|
|
|
} else {
|
|
|
|
fmt.Fprintln(resp, "Invalid URL path: if attempting to use the HTTP API, ensure the path starts with '/v1/'")
|
|
|
|
}
|
2014-04-27 19:10:38 +00:00
|
|
|
return
|
2013-12-25 01:09:51 +00:00
|
|
|
}
|
2014-04-27 19:10:38 +00:00
|
|
|
|
2016-02-13 00:11:32 +00:00
|
|
|
// Give them something helpful if there's no UI so they at least know
|
|
|
|
// what this server is.
|
|
|
|
if !s.IsUIEnabled() {
|
2021-12-13 16:29:54 +00:00
|
|
|
fmt.Fprint(resp, "Consul Agent: UI disabled. To enable, set ui_config.enabled=true in the agent configuration and restart.")
|
2014-04-27 19:10:38 +00:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
// Redirect to the UI endpoint
|
2020-09-23 11:37:33 +00:00
|
|
|
http.Redirect(
|
|
|
|
resp,
|
|
|
|
req,
|
|
|
|
s.agent.config.UIConfig.ContentPath,
|
|
|
|
http.StatusMovedPermanently,
|
|
|
|
) // 301
|
2013-12-25 01:09:51 +00:00
|
|
|
}
|
|
|
|
|
2019-10-29 18:13:36 +00:00
|
|
|
func decodeBody(body io.Reader, out interface{}) error {
|
2019-12-06 16:14:56 +00:00
|
|
|
return lib.DecodeJSON(body, out)
|
2019-10-29 18:13:36 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// decodeBodyDeprecated is deprecated, please ues decodeBody above.
|
|
|
|
// decodeBodyDeprecated is used to decode a JSON request body
|
|
|
|
func decodeBodyDeprecated(req *http.Request, out interface{}, cb func(interface{}) error) error {
|
2018-06-05 18:09:45 +00:00
|
|
|
// This generally only happens in tests since real HTTP requests set
|
|
|
|
// a non-nil body with no content. We guard against it anyways to prevent
|
|
|
|
// a panic. The EOF response is the same behavior as an empty reader.
|
|
|
|
if req.Body == nil {
|
|
|
|
return io.EOF
|
|
|
|
}
|
|
|
|
|
2014-04-21 22:02:36 +00:00
|
|
|
var raw interface{}
|
2013-12-24 00:20:51 +00:00
|
|
|
dec := json.NewDecoder(req.Body)
|
2014-04-21 22:02:36 +00:00
|
|
|
if err := dec.Decode(&raw); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
// Invoke the callback prior to decode
|
|
|
|
if cb != nil {
|
|
|
|
if err := cb(raw); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
}
|
2018-12-12 17:14:02 +00:00
|
|
|
|
|
|
|
decodeConf := &mapstructure.DecoderConfig{
|
2019-01-25 01:28:52 +00:00
|
|
|
DecodeHook: mapstructure.ComposeDecodeHookFunc(
|
|
|
|
mapstructure.StringToTimeDurationHookFunc(),
|
2020-10-06 18:24:05 +00:00
|
|
|
mapstructure.StringToTimeHookFunc(time.RFC3339),
|
2019-01-25 01:28:52 +00:00
|
|
|
stringToReadableDurationFunc(),
|
|
|
|
),
|
|
|
|
Result: &out,
|
2018-12-12 17:14:02 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
decoder, err := mapstructure.NewDecoder(decodeConf)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
return decoder.Decode(raw)
|
2013-12-24 00:20:51 +00:00
|
|
|
}
|
2014-02-05 22:36:13 +00:00
|
|
|
|
2019-01-25 01:28:52 +00:00
|
|
|
// stringToReadableDurationFunc is a mapstructure hook for decoding a string
|
|
|
|
// into an api.ReadableDuration for backwards compatibility.
|
|
|
|
func stringToReadableDurationFunc() mapstructure.DecodeHookFunc {
|
|
|
|
return func(
|
|
|
|
f reflect.Type,
|
|
|
|
t reflect.Type,
|
|
|
|
data interface{}) (interface{}, error) {
|
|
|
|
var v api.ReadableDuration
|
|
|
|
if t != reflect.TypeOf(v) {
|
|
|
|
return data, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
switch {
|
|
|
|
case f.Kind() == reflect.String:
|
|
|
|
if dur, err := time.ParseDuration(data.(string)); err != nil {
|
|
|
|
return nil, err
|
|
|
|
} else {
|
|
|
|
v = api.ReadableDuration(dur)
|
|
|
|
}
|
|
|
|
return v, nil
|
|
|
|
default:
|
|
|
|
return data, nil
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-08-16 18:31:41 +00:00
|
|
|
// setTranslateAddr is used to set the address translation header. This is only
|
|
|
|
// present if the feature is active.
|
|
|
|
func setTranslateAddr(resp http.ResponseWriter, active bool) {
|
|
|
|
if active {
|
|
|
|
resp.Header().Set("X-Consul-Translate-Addresses", "true")
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2014-02-05 22:36:13 +00:00
|
|
|
// setIndex is used to set the index response header
|
|
|
|
func setIndex(resp http.ResponseWriter, index uint64) {
|
2018-06-08 21:27:05 +00:00
|
|
|
// If we ever return X-Consul-Index of 0 blocking clients will go into a busy
|
|
|
|
// loop and hammer us since ?index=0 will never block. It's always safe to
|
|
|
|
// return index=1 since the very first Raft write is always an internal one
|
|
|
|
// writing the raft config for the cluster so no user-facing blocking query
|
|
|
|
// will ever legitimately have an X-Consul-Index of 1.
|
|
|
|
if index == 0 {
|
|
|
|
index = 1
|
|
|
|
}
|
2014-10-14 00:53:54 +00:00
|
|
|
resp.Header().Set("X-Consul-Index", strconv.FormatUint(index, 10))
|
2014-02-05 22:36:13 +00:00
|
|
|
}
|
|
|
|
|
2014-04-21 19:40:11 +00:00
|
|
|
// setKnownLeader is used to set the known leader header
|
|
|
|
func setKnownLeader(resp http.ResponseWriter, known bool) {
|
|
|
|
s := "true"
|
|
|
|
if !known {
|
|
|
|
s = "false"
|
|
|
|
}
|
2014-10-14 00:53:54 +00:00
|
|
|
resp.Header().Set("X-Consul-KnownLeader", s)
|
2014-04-21 19:40:11 +00:00
|
|
|
}
|
|
|
|
|
2018-03-30 15:14:44 +00:00
|
|
|
func setConsistency(resp http.ResponseWriter, consistency string) {
|
|
|
|
if consistency != "" {
|
|
|
|
resp.Header().Set("X-Consul-Effective-Consistency", consistency)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-11-12 16:38:32 +00:00
|
|
|
func setACLDefaultPolicy(resp http.ResponseWriter, aclDefaultPolicy string) {
|
|
|
|
if aclDefaultPolicy != "" {
|
|
|
|
resp.Header().Set("X-Consul-Default-ACL-Policy", aclDefaultPolicy)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2014-04-21 19:40:11 +00:00
|
|
|
// setLastContact is used to set the last contact header
|
|
|
|
func setLastContact(resp http.ResponseWriter, last time.Duration) {
|
2017-06-01 11:53:27 +00:00
|
|
|
if last < 0 {
|
|
|
|
last = 0
|
|
|
|
}
|
2014-04-21 19:40:11 +00:00
|
|
|
lastMsec := uint64(last / time.Millisecond)
|
2014-10-14 00:53:54 +00:00
|
|
|
resp.Header().Set("X-Consul-LastContact", strconv.FormatUint(lastMsec, 10))
|
2014-04-21 19:40:11 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// setMeta is used to set the query response meta data
|
2022-03-25 13:30:30 +00:00
|
|
|
func setMeta(resp http.ResponseWriter, m *structs.QueryMeta) error {
|
2022-03-16 16:12:29 +00:00
|
|
|
lastContact, err := m.GetLastContact()
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
setLastContact(resp, lastContact)
|
2019-09-26 13:55:02 +00:00
|
|
|
setIndex(resp, m.GetIndex())
|
|
|
|
setKnownLeader(resp, m.GetKnownLeader())
|
|
|
|
setConsistency(resp, m.GetConsistencyLevel())
|
2021-06-28 20:25:49 +00:00
|
|
|
setQueryBackend(resp, m.GetBackend())
|
2021-12-03 17:11:26 +00:00
|
|
|
setResultsFilteredByACLs(resp, m.GetResultsFilteredByACLs())
|
2022-03-16 16:12:29 +00:00
|
|
|
return nil
|
2021-06-28 20:25:49 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
func setQueryBackend(resp http.ResponseWriter, backend structs.QueryBackend) {
|
|
|
|
if b := backend.String(); b != "" {
|
|
|
|
resp.Header().Set("X-Consul-Query-Backend", b)
|
|
|
|
}
|
2014-04-21 19:40:11 +00:00
|
|
|
}
|
|
|
|
|
2018-06-15 12:13:54 +00:00
|
|
|
// setCacheMeta sets http response headers to indicate cache status.
|
|
|
|
func setCacheMeta(resp http.ResponseWriter, m *cache.ResultMeta) {
|
2018-10-03 19:37:53 +00:00
|
|
|
if m == nil {
|
|
|
|
return
|
|
|
|
}
|
2018-06-15 12:13:54 +00:00
|
|
|
str := "MISS"
|
2018-10-03 19:37:53 +00:00
|
|
|
if m.Hit {
|
2018-06-15 12:13:54 +00:00
|
|
|
str = "HIT"
|
|
|
|
}
|
|
|
|
resp.Header().Set("X-Cache", str)
|
2018-09-06 10:34:28 +00:00
|
|
|
if m.Hit {
|
|
|
|
resp.Header().Set("Age", fmt.Sprintf("%.0f", m.Age.Seconds()))
|
|
|
|
}
|
2018-06-15 12:13:54 +00:00
|
|
|
}
|
|
|
|
|
2021-12-03 17:11:26 +00:00
|
|
|
// setResultsFilteredByACLs sets an HTTP response header to indicate that the
|
|
|
|
// query results were filtered by enforcing ACLs. If the given filtered value
|
|
|
|
// is false the header will be omitted, as its ambiguous whether the results
|
|
|
|
// were not filtered or whether the endpoint doesn't yet support this header.
|
|
|
|
func setResultsFilteredByACLs(resp http.ResponseWriter, filtered bool) {
|
|
|
|
if filtered {
|
|
|
|
resp.Header().Set("X-Consul-Results-Filtered-By-ACLs", "true")
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2014-12-28 04:53:19 +00:00
|
|
|
// setHeaders is used to set canonical response header fields
|
|
|
|
func setHeaders(resp http.ResponseWriter, headers map[string]string) {
|
|
|
|
for field, value := range headers {
|
|
|
|
resp.Header().Set(http.CanonicalHeaderKey(field), value)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-03-03 13:18:35 +00:00
|
|
|
// serveHandlerWithHeaders is used to serve a http.Handler with the specified headers
|
|
|
|
func serveHandlerWithHeaders(h http.Handler, headers map[string]string) http.HandlerFunc {
|
|
|
|
return func(resp http.ResponseWriter, req *http.Request) {
|
|
|
|
setHeaders(resp, headers)
|
|
|
|
h.ServeHTTP(resp, req)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2014-02-05 22:36:13 +00:00
|
|
|
// parseWait is used to parse the ?wait and ?index query params
|
|
|
|
// Returns true on error
|
2022-03-28 17:56:44 +00:00
|
|
|
func parseWait(resp http.ResponseWriter, req *http.Request, b QueryOptionsCompat) bool {
|
2014-02-05 22:36:13 +00:00
|
|
|
query := req.URL.Query()
|
|
|
|
if wait := query.Get("wait"); wait != "" {
|
|
|
|
dur, err := time.ParseDuration(wait)
|
|
|
|
if err != nil {
|
2017-08-23 19:19:11 +00:00
|
|
|
resp.WriteHeader(http.StatusBadRequest)
|
Use fmt.Fprint/Fprintf/Fprintln
Used the following rewrite rules:
gofmt -w -r 'resp.Write([]byte(fmt.Sprintf(a, b, c, d))) -> fmt.Fprintf(resp, a, b, c, d)' *.go
gofmt -w -r 'resp.Write([]byte(fmt.Sprintf(a, b, c))) -> fmt.Fprintf(resp, a, b, c)' *.go
gofmt -w -r 'resp.Write([]byte(fmt.Sprintf(a, b))) -> fmt.Fprintf(resp, a, b)' *.go
gofmt -w -r 'resp.Write([]byte(fmt.Sprintf(a))) -> fmt.Fprint(resp, a)' *.go
gofmt -w -r 'resp.Write([]byte(a + "\n")) -> fmt.Fprintln(resp, a)' *.go
gofmt -w -r 'resp.Write([]byte(a)) -> fmt.Fprint(resp, a)' *.go
2017-04-20 14:07:42 +00:00
|
|
|
fmt.Fprint(resp, "Invalid wait time")
|
2014-02-05 22:36:13 +00:00
|
|
|
return true
|
|
|
|
}
|
2019-09-26 13:55:02 +00:00
|
|
|
b.SetMaxQueryTime(dur)
|
2014-02-05 22:36:13 +00:00
|
|
|
}
|
|
|
|
if idx := query.Get("index"); idx != "" {
|
|
|
|
index, err := strconv.ParseUint(idx, 10, 64)
|
|
|
|
if err != nil {
|
2017-08-23 19:19:11 +00:00
|
|
|
resp.WriteHeader(http.StatusBadRequest)
|
Use fmt.Fprint/Fprintf/Fprintln
Used the following rewrite rules:
gofmt -w -r 'resp.Write([]byte(fmt.Sprintf(a, b, c, d))) -> fmt.Fprintf(resp, a, b, c, d)' *.go
gofmt -w -r 'resp.Write([]byte(fmt.Sprintf(a, b, c))) -> fmt.Fprintf(resp, a, b, c)' *.go
gofmt -w -r 'resp.Write([]byte(fmt.Sprintf(a, b))) -> fmt.Fprintf(resp, a, b)' *.go
gofmt -w -r 'resp.Write([]byte(fmt.Sprintf(a))) -> fmt.Fprint(resp, a)' *.go
gofmt -w -r 'resp.Write([]byte(a + "\n")) -> fmt.Fprintln(resp, a)' *.go
gofmt -w -r 'resp.Write([]byte(a)) -> fmt.Fprint(resp, a)' *.go
2017-04-20 14:07:42 +00:00
|
|
|
fmt.Fprint(resp, "Invalid index")
|
2014-02-05 22:36:13 +00:00
|
|
|
return true
|
|
|
|
}
|
2019-09-26 13:55:02 +00:00
|
|
|
b.SetMinQueryIndex(index)
|
2014-02-05 22:36:13 +00:00
|
|
|
}
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
2018-09-06 10:34:28 +00:00
|
|
|
// parseCacheControl parses the CacheControl HTTP header value. So far we only
|
|
|
|
// support maxage directive.
|
2022-03-28 17:56:44 +00:00
|
|
|
func parseCacheControl(resp http.ResponseWriter, req *http.Request, b QueryOptionsCompat) bool {
|
2018-09-06 10:34:28 +00:00
|
|
|
raw := strings.ToLower(req.Header.Get("Cache-Control"))
|
|
|
|
|
|
|
|
if raw == "" {
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
|
|
|
// Didn't want to import a full parser for this. While quoted strings are
|
|
|
|
// allowed in some directives, max-age does not allow them per
|
|
|
|
// https://tools.ietf.org/html/rfc7234#section-5.2.2.8 so we assume all
|
|
|
|
// well-behaved clients use the exact token form of max-age=<delta-seconds>
|
|
|
|
// where delta-seconds is a non-negative decimal integer.
|
|
|
|
directives := strings.Split(raw, ",")
|
|
|
|
|
|
|
|
parseDurationOrFail := func(raw string) (time.Duration, bool) {
|
|
|
|
i, err := strconv.Atoi(raw)
|
|
|
|
if err != nil {
|
|
|
|
resp.WriteHeader(http.StatusBadRequest)
|
|
|
|
fmt.Fprint(resp, "Invalid Cache-Control header.")
|
|
|
|
return 0, true
|
|
|
|
}
|
|
|
|
return time.Duration(i) * time.Second, false
|
|
|
|
}
|
|
|
|
|
|
|
|
for _, d := range directives {
|
|
|
|
d = strings.ToLower(strings.TrimSpace(d))
|
|
|
|
|
|
|
|
if d == "must-revalidate" {
|
2019-09-26 13:55:02 +00:00
|
|
|
b.SetMustRevalidate(true)
|
2018-09-06 10:34:28 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
if strings.HasPrefix(d, "max-age=") {
|
|
|
|
d, failed := parseDurationOrFail(d[8:])
|
|
|
|
if failed {
|
|
|
|
return true
|
|
|
|
}
|
2019-09-26 13:55:02 +00:00
|
|
|
b.SetMaxAge(d)
|
2018-09-06 10:34:28 +00:00
|
|
|
if d == 0 {
|
|
|
|
// max-age=0 specifically means that we need to consider the cache stale
|
|
|
|
// immediately however MaxAge = 0 is indistinguishable from the default
|
|
|
|
// where MaxAge is unset.
|
2019-09-26 13:55:02 +00:00
|
|
|
b.SetMustRevalidate(true)
|
2018-09-06 10:34:28 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
if strings.HasPrefix(d, "stale-if-error=") {
|
|
|
|
d, failed := parseDurationOrFail(d[15:])
|
|
|
|
if failed {
|
|
|
|
return true
|
|
|
|
}
|
2019-09-26 13:55:02 +00:00
|
|
|
b.SetStaleIfError(d)
|
2018-09-06 10:34:28 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
2022-02-28 18:26:16 +00:00
|
|
|
// parseConsistency is used to parse the ?stale, ?consistent, and ?leader query params.
|
2014-04-21 19:26:12 +00:00
|
|
|
// Returns true on error
|
2022-03-28 17:56:44 +00:00
|
|
|
func (s *HTTPHandlers) parseConsistency(resp http.ResponseWriter, req *http.Request, b QueryOptionsCompat) bool {
|
2014-04-21 19:26:12 +00:00
|
|
|
query := req.URL.Query()
|
2018-03-30 15:14:44 +00:00
|
|
|
defaults := true
|
2017-06-16 08:55:53 +00:00
|
|
|
if _, ok := query["stale"]; ok {
|
2019-09-26 13:55:02 +00:00
|
|
|
b.SetAllowStale(true)
|
2018-03-30 15:14:44 +00:00
|
|
|
defaults = false
|
2017-06-16 08:55:53 +00:00
|
|
|
}
|
2017-06-27 05:04:55 +00:00
|
|
|
if _, ok := query["consistent"]; ok {
|
2019-09-26 13:55:02 +00:00
|
|
|
b.SetRequireConsistent(true)
|
2018-03-30 15:14:44 +00:00
|
|
|
defaults = false
|
|
|
|
}
|
|
|
|
if _, ok := query["leader"]; ok {
|
2022-02-28 18:26:16 +00:00
|
|
|
// The leader query param forces use of the "default" consistency mode.
|
|
|
|
// This allows the "default" consistency mode to be used even the consistency mode is
|
|
|
|
// default to "stale" through use of the discovery_max_stale agent config option.
|
2018-03-30 15:14:44 +00:00
|
|
|
defaults = false
|
|
|
|
}
|
2020-10-04 17:54:56 +00:00
|
|
|
if _, ok := query["cached"]; ok && s.agent.config.HTTPUseCache {
|
2019-09-26 13:55:02 +00:00
|
|
|
b.SetUseCache(true)
|
2018-09-06 10:34:28 +00:00
|
|
|
defaults = false
|
|
|
|
}
|
2018-03-30 15:14:44 +00:00
|
|
|
if maxStale := query.Get("max_stale"); maxStale != "" {
|
|
|
|
dur, err := time.ParseDuration(maxStale)
|
|
|
|
if err != nil {
|
|
|
|
resp.WriteHeader(http.StatusBadRequest)
|
|
|
|
fmt.Fprintf(resp, "Invalid max_stale value %q", maxStale)
|
|
|
|
return true
|
|
|
|
}
|
2019-09-26 13:55:02 +00:00
|
|
|
b.SetMaxStaleDuration(dur)
|
2018-03-30 15:14:44 +00:00
|
|
|
if dur.Nanoseconds() > 0 {
|
2019-09-26 13:55:02 +00:00
|
|
|
b.SetAllowStale(true)
|
2018-03-30 15:14:44 +00:00
|
|
|
defaults = false
|
|
|
|
}
|
|
|
|
}
|
|
|
|
// No specific Consistency has been specified by caller
|
|
|
|
if defaults {
|
|
|
|
path := req.URL.Path
|
|
|
|
if strings.HasPrefix(path, "/v1/catalog") || strings.HasPrefix(path, "/v1/health") {
|
|
|
|
if s.agent.config.DiscoveryMaxStale.Nanoseconds() > 0 {
|
2019-09-26 13:55:02 +00:00
|
|
|
b.SetMaxStaleDuration(s.agent.config.DiscoveryMaxStale)
|
|
|
|
b.SetAllowStale(true)
|
2018-03-30 15:14:44 +00:00
|
|
|
}
|
|
|
|
}
|
2017-06-27 05:04:55 +00:00
|
|
|
}
|
2019-09-26 13:55:02 +00:00
|
|
|
if b.GetAllowStale() && b.GetRequireConsistent() {
|
2017-08-23 19:19:11 +00:00
|
|
|
resp.WriteHeader(http.StatusBadRequest)
|
Use fmt.Fprint/Fprintf/Fprintln
Used the following rewrite rules:
gofmt -w -r 'resp.Write([]byte(fmt.Sprintf(a, b, c, d))) -> fmt.Fprintf(resp, a, b, c, d)' *.go
gofmt -w -r 'resp.Write([]byte(fmt.Sprintf(a, b, c))) -> fmt.Fprintf(resp, a, b, c)' *.go
gofmt -w -r 'resp.Write([]byte(fmt.Sprintf(a, b))) -> fmt.Fprintf(resp, a, b)' *.go
gofmt -w -r 'resp.Write([]byte(fmt.Sprintf(a))) -> fmt.Fprint(resp, a)' *.go
gofmt -w -r 'resp.Write([]byte(a + "\n")) -> fmt.Fprintln(resp, a)' *.go
gofmt -w -r 'resp.Write([]byte(a)) -> fmt.Fprint(resp, a)' *.go
2017-04-20 14:07:42 +00:00
|
|
|
fmt.Fprint(resp, "Cannot specify ?stale with ?consistent, conflicting semantics.")
|
2014-04-21 19:26:12 +00:00
|
|
|
return true
|
|
|
|
}
|
2019-09-26 13:55:02 +00:00
|
|
|
if b.GetUseCache() && b.GetRequireConsistent() {
|
2018-09-06 10:34:28 +00:00
|
|
|
resp.WriteHeader(http.StatusBadRequest)
|
|
|
|
fmt.Fprint(resp, "Cannot specify ?cached with ?consistent, conflicting semantics.")
|
|
|
|
return true
|
|
|
|
}
|
2014-04-21 19:26:12 +00:00
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
2021-07-22 18:58:08 +00:00
|
|
|
// parseConsistencyReadRequest is used to parse the ?consistent query param.
|
2022-03-25 13:30:30 +00:00
|
|
|
func parseConsistencyReadRequest(resp http.ResponseWriter, req *http.Request, b *pbcommon.ReadRequest) {
|
2021-07-22 18:58:08 +00:00
|
|
|
query := req.URL.Query()
|
|
|
|
if _, ok := query["consistent"]; ok {
|
|
|
|
b.RequireConsistent = true
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
Accept ap, datacenter, and namespace query params (#17525)
This commit only contains the OSS PR (datacenter query param support).
A separate enterprise PR adds support for ap and namespace query params.
Resources in Consul can exists within scopes such as datacenters, cluster
peers, admin partitions, and namespaces. You can refer to those resources from
interfaces such as the CLI, HTTP API, DNS, and configuration files.
Some scope levels have consistent naming: cluster peers are always referred to
as "peer".
Other scope levels use a short-hand in DNS lookups...
- "ns" for namespace
- "ap" for admin partition
- "dc" for datacenter
...But use long-hand in CLI commands:
- "namespace" for namespace
- "partition" for admin partition
- and "datacenter"
However, HTTP API query parameters do not follow a consistent pattern,
supporting short-hand for some scopes but long-hand for others:
- "ns" for namespace
- "partition" for admin partition
- and "dc" for datacenter.
This inconsistency is confusing, especially for users who have been exposed to
providing scope names through another interface such as CLI or DNS queries.
This commit improves UX by consistently supporting both short-hand and
long-hand forms of the namespace, partition, and datacenter scopes in HTTP API
query parameters.
2023-05-31 15:50:24 +00:00
|
|
|
// parseDC is used to parse the datacenter from the query params.
|
|
|
|
// ?datacenter has precedence over ?dc.
|
2020-09-04 18:42:15 +00:00
|
|
|
func (s *HTTPHandlers) parseDC(req *http.Request, dc *string) {
|
Accept ap, datacenter, and namespace query params (#17525)
This commit only contains the OSS PR (datacenter query param support).
A separate enterprise PR adds support for ap and namespace query params.
Resources in Consul can exists within scopes such as datacenters, cluster
peers, admin partitions, and namespaces. You can refer to those resources from
interfaces such as the CLI, HTTP API, DNS, and configuration files.
Some scope levels have consistent naming: cluster peers are always referred to
as "peer".
Other scope levels use a short-hand in DNS lookups...
- "ns" for namespace
- "ap" for admin partition
- "dc" for datacenter
...But use long-hand in CLI commands:
- "namespace" for namespace
- "partition" for admin partition
- and "datacenter"
However, HTTP API query parameters do not follow a consistent pattern,
supporting short-hand for some scopes but long-hand for others:
- "ns" for namespace
- "partition" for admin partition
- and "dc" for datacenter.
This inconsistency is confusing, especially for users who have been exposed to
providing scope names through another interface such as CLI or DNS queries.
This commit improves UX by consistently supporting both short-hand and
long-hand forms of the namespace, partition, and datacenter scopes in HTTP API
query parameters.
2023-05-31 15:50:24 +00:00
|
|
|
if other := req.URL.Query().Get("datacenter"); other != "" {
|
|
|
|
*dc = other
|
|
|
|
} else if other = req.URL.Query().Get("dc"); other != "" {
|
2014-02-05 22:36:13 +00:00
|
|
|
*dc = other
|
|
|
|
} else if *dc == "" {
|
|
|
|
*dc = s.agent.config.Datacenter
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-08-17 20:18:42 +00:00
|
|
|
// parseTokenInternal is used to parse the ?token query param or the X-Consul-Token header or
|
2020-04-16 22:07:52 +00:00
|
|
|
// Authorization Bearer token (RFC6750).
|
2020-09-04 18:42:15 +00:00
|
|
|
func (s *HTTPHandlers) parseTokenInternal(req *http.Request, token *string) {
|
2014-08-12 18:35:22 +00:00
|
|
|
if other := req.URL.Query().Get("token"); other != "" {
|
2020-11-04 18:50:03 +00:00
|
|
|
*token = other
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
if ok := s.parseTokenFromHeaders(req, token); ok {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
*token = ""
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s *HTTPHandlers) parseTokenFromHeaders(req *http.Request, token *string) bool {
|
|
|
|
if other := req.Header.Get("X-Consul-Token"); other != "" {
|
|
|
|
*token = other
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
|
|
|
|
if other := req.Header.Get("Authorization"); other != "" {
|
2018-08-17 20:18:42 +00:00
|
|
|
// HTTP Authorization headers are in the format: <Scheme>[SPACE]<Value>
|
|
|
|
// Ref. https://tools.ietf.org/html/rfc7236#section-3
|
|
|
|
parts := strings.Split(other, " ")
|
|
|
|
|
|
|
|
// Authorization Header is invalid if containing 1 or 0 parts, e.g.:
|
|
|
|
// "" || "<Scheme><Value>" || "<Scheme>" || "<Value>"
|
|
|
|
if len(parts) > 1 {
|
|
|
|
scheme := parts[0]
|
|
|
|
// Everything after "<Scheme>" is "<Value>", trimmed
|
|
|
|
value := strings.TrimSpace(strings.Join(parts[1:], " "))
|
|
|
|
|
|
|
|
// <Scheme> must be "Bearer"
|
2019-11-01 13:56:41 +00:00
|
|
|
if strings.ToLower(scheme) == "bearer" {
|
2020-04-16 22:07:52 +00:00
|
|
|
// Since Bearer tokens shouldn't contain spaces (rfc6750#section-2.1)
|
2018-08-17 20:18:42 +00:00
|
|
|
// "value" is tokenized, only the first item is used
|
2020-11-04 18:50:03 +00:00
|
|
|
*token = strings.TrimSpace(strings.Split(value, " ")[0])
|
|
|
|
return true
|
2018-08-17 20:18:42 +00:00
|
|
|
}
|
|
|
|
}
|
2014-08-12 18:35:22 +00:00
|
|
|
}
|
2015-02-06 22:10:01 +00:00
|
|
|
|
2020-11-04 18:50:03 +00:00
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s *HTTPHandlers) clearTokenFromHeaders(req *http.Request) {
|
|
|
|
req.Header.Del("X-Consul-Token")
|
|
|
|
req.Header.Del("Authorization")
|
2020-04-16 22:07:52 +00:00
|
|
|
}
|
|
|
|
|
2020-04-17 20:35:24 +00:00
|
|
|
// parseTokenWithDefault passes through to parseTokenInternal and optionally resolves proxy tokens to real ACL tokens.
|
2020-04-16 22:07:52 +00:00
|
|
|
// If the token is invalid or not specified it will populate the token with the agents UserToken (acl_token in the
|
|
|
|
// consul configuration)
|
2020-09-04 18:42:15 +00:00
|
|
|
func (s *HTTPHandlers) parseTokenWithDefault(req *http.Request, token *string) {
|
2020-04-16 22:07:52 +00:00
|
|
|
s.parseTokenInternal(req, token) // parseTokenInternal modifies *token
|
|
|
|
if token != nil && *token == "" {
|
|
|
|
*token = s.agent.tokens.UserToken()
|
2015-10-19 13:59:24 +00:00
|
|
|
return
|
|
|
|
}
|
2020-04-16 22:07:52 +00:00
|
|
|
return
|
2014-08-12 18:35:22 +00:00
|
|
|
}
|
|
|
|
|
2018-08-17 20:18:42 +00:00
|
|
|
// parseToken is used to parse the ?token query param or the X-Consul-Token header or
|
2020-04-16 22:07:52 +00:00
|
|
|
// Authorization Bearer token header (RFC6750). This function is used widely in Consul's endpoints
|
2020-09-04 18:42:15 +00:00
|
|
|
func (s *HTTPHandlers) parseToken(req *http.Request, token *string) {
|
2020-04-17 20:35:24 +00:00
|
|
|
s.parseTokenWithDefault(req, token)
|
2018-07-30 13:11:51 +00:00
|
|
|
}
|
|
|
|
|
2023-10-11 15:44:03 +00:00
|
|
|
func (s *HTTPHandlers) rejectV1RequestWhenV2Enabled() error {
|
|
|
|
if s.agent.baseDeps.UseV2Resources() {
|
|
|
|
return newRejectV1RequestWhenV2EnabledError()
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func newRejectV1RequestWhenV2EnabledError() error {
|
|
|
|
return HTTPError{
|
|
|
|
StatusCode: http.StatusBadRequest,
|
|
|
|
Reason: structs.ErrUsingV2CatalogExperiment.Error(),
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-04-12 14:40:46 +00:00
|
|
|
func sourceAddrFromRequest(req *http.Request) string {
|
|
|
|
xff := req.Header.Get("X-Forwarded-For")
|
|
|
|
forwardHosts := strings.Split(xff, ",")
|
|
|
|
if len(forwardHosts) > 0 {
|
|
|
|
forwardIp := net.ParseIP(strings.TrimSpace(forwardHosts[0]))
|
|
|
|
if forwardIp != nil {
|
|
|
|
return forwardIp.String()
|
|
|
|
}
|
|
|
|
}
|
2018-04-13 16:57:25 +00:00
|
|
|
|
2018-04-10 18:50:50 +00:00
|
|
|
host, _, err := net.SplitHostPort(req.RemoteAddr)
|
|
|
|
if err != nil {
|
2018-04-12 14:40:46 +00:00
|
|
|
return ""
|
2018-04-10 18:50:50 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
ip := net.ParseIP(host)
|
2018-04-10 19:35:54 +00:00
|
|
|
if ip != nil {
|
2018-04-12 14:40:46 +00:00
|
|
|
return ip.String()
|
2018-04-10 19:35:54 +00:00
|
|
|
} else {
|
2018-04-12 14:40:46 +00:00
|
|
|
return ""
|
2018-04-10 18:50:50 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-06-30 21:25:40 +00:00
|
|
|
// parseSource is used to parse the ?near=<node> query parameter, used for
|
|
|
|
// sorting by RTT based on a source node. We set the source's DC to the target
|
|
|
|
// DC in the request, if given, or else the agent's DC.
|
2020-09-04 18:42:15 +00:00
|
|
|
func (s *HTTPHandlers) parseSource(req *http.Request, source *structs.QuerySource) {
|
2015-06-30 21:25:40 +00:00
|
|
|
s.parseDC(req, &source.Datacenter)
|
2018-04-12 14:40:46 +00:00
|
|
|
source.Ip = sourceAddrFromRequest(req)
|
2015-06-30 21:25:40 +00:00
|
|
|
if node := req.URL.Query().Get("near"); node != "" {
|
2015-07-28 17:39:37 +00:00
|
|
|
if node == "_agent" {
|
2015-07-24 21:30:53 +00:00
|
|
|
source.Node = s.agent.config.NodeName
|
|
|
|
} else {
|
|
|
|
source.Node = node
|
|
|
|
}
|
2021-08-19 20:09:42 +00:00
|
|
|
source.NodePartition = s.agent.config.PartitionOrEmpty()
|
2015-06-30 21:25:40 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
peering: initial sync (#12842)
- Add endpoints related to peering: read, list, generate token, initiate peering
- Update node/service/check table indexing to account for peers
- Foundational changes for pushing service updates to a peer
- Plumb peer name through Health.ServiceNodes path
see: ENT-1765, ENT-1280, ENT-1283, ENT-1283, ENT-1756, ENT-1739, ENT-1750, ENT-1679,
ENT-1709, ENT-1704, ENT-1690, ENT-1689, ENT-1702, ENT-1701, ENT-1683, ENT-1663,
ENT-1650, ENT-1678, ENT-1628, ENT-1658, ENT-1640, ENT-1637, ENT-1597, ENT-1634,
ENT-1613, ENT-1616, ENT-1617, ENT-1591, ENT-1588, ENT-1596, ENT-1572, ENT-1555
Co-authored-by: R.B. Boyer <rb@hashicorp.com>
Co-authored-by: freddygv <freddy@hashicorp.com>
Co-authored-by: Chris S. Kim <ckim@hashicorp.com>
Co-authored-by: Evan Culver <eculver@hashicorp.com>
Co-authored-by: Nitya Dhanushkodi <nitya@hashicorp.com>
2022-04-21 22:34:40 +00:00
|
|
|
func (s *HTTPHandlers) parsePeerName(req *http.Request, args *structs.ServiceSpecificRequest) {
|
|
|
|
if peer := req.URL.Query().Get("peer"); peer != "" {
|
|
|
|
args.PeerName = peer
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2017-01-09 19:21:49 +00:00
|
|
|
// parseMetaFilter is used to parse the ?node-meta=key:value query parameter, used for
|
|
|
|
// filtering results to nodes with the given metadata key/value
|
2020-09-04 18:42:15 +00:00
|
|
|
func (s *HTTPHandlers) parseMetaFilter(req *http.Request) map[string]string {
|
2017-01-11 19:41:12 +00:00
|
|
|
if filterList, ok := req.URL.Query()["node-meta"]; ok {
|
|
|
|
filters := make(map[string]string)
|
|
|
|
for _, filter := range filterList {
|
2020-04-22 16:33:46 +00:00
|
|
|
key, value := parseMetaPair(filter)
|
2017-01-11 21:07:11 +00:00
|
|
|
filters[key] = value
|
2017-01-09 19:21:49 +00:00
|
|
|
}
|
2017-01-11 19:41:12 +00:00
|
|
|
return filters
|
2017-01-09 19:21:49 +00:00
|
|
|
}
|
2017-01-11 19:41:12 +00:00
|
|
|
return nil
|
2017-01-09 19:21:49 +00:00
|
|
|
}
|
|
|
|
|
2020-04-22 16:33:46 +00:00
|
|
|
func parseMetaPair(raw string) (string, string) {
|
|
|
|
pair := strings.SplitN(raw, ":", 2)
|
|
|
|
if len(pair) == 2 {
|
|
|
|
return pair[0], pair[1]
|
|
|
|
}
|
|
|
|
return pair[0], ""
|
|
|
|
}
|
|
|
|
|
2020-10-04 17:54:56 +00:00
|
|
|
// parse is a convenience method for endpoints that need to use both parseWait
|
|
|
|
// and parseDC.
|
2022-03-28 17:56:44 +00:00
|
|
|
func (s *HTTPHandlers) parse(resp http.ResponseWriter, req *http.Request, dc *string, b QueryOptionsCompat) bool {
|
2014-02-05 22:36:13 +00:00
|
|
|
s.parseDC(req, dc)
|
2019-09-26 13:55:02 +00:00
|
|
|
var token string
|
2020-04-17 20:35:24 +00:00
|
|
|
s.parseTokenWithDefault(req, &token)
|
2019-09-26 13:55:02 +00:00
|
|
|
b.SetToken(token)
|
|
|
|
var filter string
|
|
|
|
s.parseFilter(req, &filter)
|
|
|
|
b.SetFilter(filter)
|
2018-03-30 15:14:44 +00:00
|
|
|
if s.parseConsistency(resp, req, b) {
|
2014-04-21 19:26:12 +00:00
|
|
|
return true
|
|
|
|
}
|
2018-09-06 10:34:28 +00:00
|
|
|
if parseCacheControl(resp, req, b) {
|
|
|
|
return true
|
|
|
|
}
|
2014-02-05 22:36:13 +00:00
|
|
|
return parseWait(resp, req, b)
|
|
|
|
}
|
2018-07-30 13:11:51 +00:00
|
|
|
|
2020-09-04 18:42:15 +00:00
|
|
|
func (s *HTTPHandlers) checkWriteAccess(req *http.Request) error {
|
2019-01-10 14:27:26 +00:00
|
|
|
if req.Method == http.MethodGet || req.Method == http.MethodHead || req.Method == http.MethodOptions {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
allowed := s.agent.config.AllowWriteHTTPFrom
|
|
|
|
if len(allowed) == 0 {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
ipStr, _, err := net.SplitHostPort(req.RemoteAddr)
|
|
|
|
if err != nil {
|
|
|
|
return errors.Wrap(err, "unable to parse remote addr")
|
|
|
|
}
|
|
|
|
|
|
|
|
ip := net.ParseIP(ipStr)
|
|
|
|
|
|
|
|
for _, n := range allowed {
|
|
|
|
if n.Contains(ip) {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2022-04-29 17:42:49 +00:00
|
|
|
return HTTPError{StatusCode: http.StatusForbidden, Reason: "Access is restricted"}
|
2019-01-10 14:27:26 +00:00
|
|
|
}
|
2019-04-16 16:00:15 +00:00
|
|
|
|
2020-09-04 18:42:15 +00:00
|
|
|
func (s *HTTPHandlers) parseFilter(req *http.Request, filter *string) {
|
2019-04-16 16:00:15 +00:00
|
|
|
if other := req.URL.Query().Get("filter"); other != "" {
|
|
|
|
*filter = other
|
|
|
|
}
|
|
|
|
}
|
2021-10-15 19:05:58 +00:00
|
|
|
|
2022-03-28 17:56:44 +00:00
|
|
|
func setMetaProtobuf(resp http.ResponseWriter, queryMeta *pbcommon.QueryMeta) {
|
|
|
|
qm := new(structs.QueryMeta)
|
|
|
|
pbcommon.QueryMetaToStructs(queryMeta, qm)
|
|
|
|
setMeta(resp, qm)
|
|
|
|
}
|
|
|
|
|
|
|
|
type QueryOptionsCompat interface {
|
|
|
|
GetAllowStale() bool
|
|
|
|
SetAllowStale(bool)
|
|
|
|
|
|
|
|
GetRequireConsistent() bool
|
|
|
|
SetRequireConsistent(bool)
|
|
|
|
|
|
|
|
GetUseCache() bool
|
|
|
|
SetUseCache(bool)
|
|
|
|
|
|
|
|
SetFilter(string)
|
|
|
|
SetToken(string)
|
|
|
|
|
|
|
|
SetMustRevalidate(bool)
|
|
|
|
SetMaxAge(time.Duration)
|
|
|
|
SetMaxStaleDuration(time.Duration)
|
|
|
|
SetStaleIfError(time.Duration)
|
|
|
|
|
|
|
|
SetMaxQueryTime(time.Duration)
|
|
|
|
SetMinQueryIndex(uint64)
|
|
|
|
}
|