2013-12-23 19:38:51 +00:00
|
|
|
package agent
|
|
|
|
|
|
|
|
import (
|
2014-11-14 19:39:19 +00:00
|
|
|
"crypto/tls"
|
2013-12-23 19:38:51 +00:00
|
|
|
"encoding/json"
|
2014-11-18 16:03:36 +00:00
|
|
|
"fmt"
|
2013-12-23 19:38:51 +00:00
|
|
|
"io"
|
|
|
|
"log"
|
|
|
|
"net"
|
|
|
|
"net/http"
|
2014-03-20 00:50:57 +00:00
|
|
|
"net/http/pprof"
|
2015-04-14 00:31:53 +00:00
|
|
|
"net/url"
|
2015-01-08 16:38:09 +00:00
|
|
|
"os"
|
2014-02-05 22:36:13 +00:00
|
|
|
"strconv"
|
2014-08-22 19:59:47 +00:00
|
|
|
"strings"
|
2013-12-23 22:26:34 +00:00
|
|
|
"time"
|
2014-08-22 19:59:47 +00:00
|
|
|
|
2016-08-09 22:41:15 +00:00
|
|
|
"github.com/armon/go-metrics"
|
2014-08-22 19:59:47 +00:00
|
|
|
"github.com/hashicorp/consul/consul/structs"
|
2014-11-18 16:03:36 +00:00
|
|
|
"github.com/hashicorp/consul/tlsutil"
|
2014-08-22 19:59:47 +00:00
|
|
|
"github.com/mitchellh/mapstructure"
|
2013-12-23 19:38:51 +00:00
|
|
|
)
|
|
|
|
|
2015-02-06 22:10:01 +00:00
|
|
|
var (
|
|
|
|
// scadaHTTPAddr is the address associated with the
|
|
|
|
// HTTPServer. When populating an ACL token for a request,
|
|
|
|
// this is checked to switch between the ACLToken and
|
|
|
|
// AtlasACLToken
|
|
|
|
scadaHTTPAddr = "SCADA"
|
|
|
|
)
|
|
|
|
|
2013-12-23 19:38:51 +00:00
|
|
|
// HTTPServer is used to wrap an Agent and expose various API's
|
|
|
|
// in a RESTful manner
|
|
|
|
type HTTPServer struct {
|
|
|
|
agent *Agent
|
|
|
|
mux *http.ServeMux
|
|
|
|
listener net.Listener
|
|
|
|
logger *log.Logger
|
2014-04-23 19:40:59 +00:00
|
|
|
uiDir string
|
2014-11-14 19:39:19 +00:00
|
|
|
addr string
|
2013-12-23 19:38:51 +00:00
|
|
|
}
|
|
|
|
|
2014-11-14 19:39:19 +00:00
|
|
|
// NewHTTPServers starts new HTTP servers to provide an interface to
|
2013-12-23 19:38:51 +00:00
|
|
|
// the agent.
|
2015-08-25 23:40:55 +00:00
|
|
|
func NewHTTPServers(agent *Agent, config *Config, logOutput io.Writer) ([]*HTTPServer, error) {
|
2016-09-17 08:46:13 +00:00
|
|
|
if logOutput == nil {
|
|
|
|
return nil, fmt.Errorf("Please provide a valid logOutput(io.Writer)")
|
|
|
|
}
|
|
|
|
|
2014-11-14 19:39:19 +00:00
|
|
|
var servers []*HTTPServer
|
2013-12-23 19:38:51 +00:00
|
|
|
|
2014-11-14 19:39:19 +00:00
|
|
|
if config.Ports.HTTPS > 0 {
|
2015-02-06 01:54:22 +00:00
|
|
|
httpAddr, err := config.ClientListener(config.Addresses.HTTPS, config.Ports.HTTPS)
|
2014-11-14 19:39:19 +00:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
2014-11-18 16:03:36 +00:00
|
|
|
tlsConf := &tlsutil.Config{
|
|
|
|
VerifyIncoming: config.VerifyIncoming,
|
|
|
|
VerifyOutgoing: config.VerifyOutgoing,
|
|
|
|
CAFile: config.CAFile,
|
|
|
|
CertFile: config.CertFile,
|
|
|
|
KeyFile: config.KeyFile,
|
|
|
|
NodeName: config.NodeName,
|
2017-02-01 20:52:04 +00:00
|
|
|
ServerName: config.ServerName,
|
|
|
|
TLSMinVersion: config.TLSMinVersion,
|
|
|
|
}
|
2014-11-18 16:03:36 +00:00
|
|
|
|
2015-02-06 01:54:22 +00:00
|
|
|
tlsConfig, err := tlsConf.IncomingTLSConfig()
|
2014-11-14 19:39:19 +00:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
2015-01-08 16:38:09 +00:00
|
|
|
ln, err := net.Listen(httpAddr.Network(), httpAddr.String())
|
2014-11-14 19:39:19 +00:00
|
|
|
if err != nil {
|
2015-01-08 16:38:09 +00:00
|
|
|
return nil, fmt.Errorf("Failed to get Listen on %s: %v", httpAddr.String(), err)
|
2014-11-14 19:39:19 +00:00
|
|
|
}
|
|
|
|
|
2015-02-06 01:54:22 +00:00
|
|
|
list := tls.NewListener(tcpKeepAliveListener{ln.(*net.TCPListener)}, tlsConfig)
|
2014-11-14 19:39:19 +00:00
|
|
|
|
|
|
|
// Create the mux
|
|
|
|
mux := http.NewServeMux()
|
|
|
|
|
|
|
|
// Create the server
|
|
|
|
srv := &HTTPServer{
|
|
|
|
agent: agent,
|
|
|
|
mux: mux,
|
|
|
|
listener: list,
|
|
|
|
logger: log.New(logOutput, "", log.LstdFlags),
|
|
|
|
uiDir: config.UiDir,
|
|
|
|
addr: httpAddr.String(),
|
|
|
|
}
|
|
|
|
srv.registerHandlers(config.EnableDebug)
|
|
|
|
|
|
|
|
// Start the server
|
|
|
|
go http.Serve(list, mux)
|
2014-11-19 19:51:25 +00:00
|
|
|
servers = append(servers, srv)
|
2013-12-23 19:38:51 +00:00
|
|
|
}
|
|
|
|
|
2014-11-14 19:39:19 +00:00
|
|
|
if config.Ports.HTTP > 0 {
|
2015-02-06 01:54:22 +00:00
|
|
|
httpAddr, err := config.ClientListener(config.Addresses.HTTP, config.Ports.HTTP)
|
2014-11-14 19:39:19 +00:00
|
|
|
if err != nil {
|
2014-11-18 16:03:36 +00:00
|
|
|
return nil, fmt.Errorf("Failed to get ClientListener address:port: %v", err)
|
2014-11-14 19:39:19 +00:00
|
|
|
}
|
|
|
|
|
2015-01-16 20:39:15 +00:00
|
|
|
// Error if we are trying to bind a domain socket to an existing path
|
2015-01-20 21:44:27 +00:00
|
|
|
socketPath, isSocket := unixSocketAddr(config.Addresses.HTTP)
|
|
|
|
if isSocket {
|
|
|
|
if _, err := os.Stat(socketPath); !os.IsNotExist(err) {
|
|
|
|
agent.logger.Printf("[WARN] agent: Replacing socket %q", socketPath)
|
|
|
|
}
|
|
|
|
if err := os.Remove(socketPath); err != nil && !os.IsNotExist(err) {
|
|
|
|
return nil, fmt.Errorf("error removing socket file: %s", err)
|
2015-01-16 01:24:15 +00:00
|
|
|
}
|
2015-01-08 16:38:09 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
ln, err := net.Listen(httpAddr.Network(), httpAddr.String())
|
2014-11-14 19:39:19 +00:00
|
|
|
if err != nil {
|
2014-11-18 16:03:36 +00:00
|
|
|
return nil, fmt.Errorf("Failed to get Listen on %s: %v", httpAddr.String(), err)
|
2014-11-14 19:39:19 +00:00
|
|
|
}
|
|
|
|
|
2015-02-06 01:54:22 +00:00
|
|
|
var list net.Listener
|
2015-01-20 21:44:27 +00:00
|
|
|
if isSocket {
|
2015-01-24 01:57:04 +00:00
|
|
|
// Set up ownership/permission bits on the socket file
|
2015-01-20 21:44:27 +00:00
|
|
|
if err := setFilePermissions(socketPath, config.UnixSockets); err != nil {
|
|
|
|
return nil, fmt.Errorf("Failed setting up HTTP socket: %s", err)
|
|
|
|
}
|
2015-01-24 01:57:04 +00:00
|
|
|
list = ln
|
|
|
|
} else {
|
|
|
|
list = tcpKeepAliveListener{ln.(*net.TCPListener)}
|
2015-01-20 21:44:27 +00:00
|
|
|
}
|
|
|
|
|
2014-11-14 19:39:19 +00:00
|
|
|
// Create the mux
|
|
|
|
mux := http.NewServeMux()
|
|
|
|
|
|
|
|
// Create the server
|
|
|
|
srv := &HTTPServer{
|
|
|
|
agent: agent,
|
|
|
|
mux: mux,
|
|
|
|
listener: list,
|
|
|
|
logger: log.New(logOutput, "", log.LstdFlags),
|
|
|
|
uiDir: config.UiDir,
|
|
|
|
addr: httpAddr.String(),
|
|
|
|
}
|
|
|
|
srv.registerHandlers(config.EnableDebug)
|
|
|
|
|
|
|
|
// Start the server
|
|
|
|
go http.Serve(list, mux)
|
2014-11-19 19:51:25 +00:00
|
|
|
servers = append(servers, srv)
|
2013-12-23 19:38:51 +00:00
|
|
|
}
|
|
|
|
|
2015-08-25 23:40:55 +00:00
|
|
|
return servers, nil
|
|
|
|
}
|
2015-02-05 02:17:45 +00:00
|
|
|
|
2015-08-26 00:19:11 +00:00
|
|
|
// newScadaHttp creates a new HTTP server wrapping the SCADA
|
|
|
|
// listener such that HTTP calls can be sent from the brokers.
|
2015-08-25 23:40:55 +00:00
|
|
|
func newScadaHttp(agent *Agent, list net.Listener) *HTTPServer {
|
|
|
|
// Create the mux
|
|
|
|
mux := http.NewServeMux()
|
|
|
|
|
|
|
|
// Create the server
|
|
|
|
srv := &HTTPServer{
|
|
|
|
agent: agent,
|
|
|
|
mux: mux,
|
|
|
|
listener: list,
|
|
|
|
logger: agent.logger,
|
|
|
|
addr: scadaHTTPAddr,
|
2015-02-05 02:17:45 +00:00
|
|
|
}
|
2015-08-25 23:40:55 +00:00
|
|
|
srv.registerHandlers(false) // Never allow debug for SCADA
|
2015-02-05 02:17:45 +00:00
|
|
|
|
2015-08-25 23:40:55 +00:00
|
|
|
// Start the server
|
|
|
|
go http.Serve(list, mux)
|
|
|
|
return srv
|
2014-11-14 19:39:19 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// tcpKeepAliveListener sets TCP keep-alive timeouts on accepted
|
|
|
|
// connections. It's used by NewHttpServer so
|
|
|
|
// dead TCP connections eventually go away.
|
|
|
|
type tcpKeepAliveListener struct {
|
|
|
|
*net.TCPListener
|
|
|
|
}
|
|
|
|
|
|
|
|
func (ln tcpKeepAliveListener) Accept() (c net.Conn, err error) {
|
|
|
|
tc, err := ln.AcceptTCP()
|
|
|
|
if err != nil {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
tc.SetKeepAlive(true)
|
2014-11-18 22:56:48 +00:00
|
|
|
tc.SetKeepAlivePeriod(30 * time.Second)
|
2014-11-14 19:39:19 +00:00
|
|
|
return tc, nil
|
2013-12-23 19:38:51 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Shutdown is used to shutdown the HTTP server
|
|
|
|
func (s *HTTPServer) Shutdown() {
|
2014-11-14 19:39:19 +00:00
|
|
|
if s != nil {
|
2015-02-06 01:29:55 +00:00
|
|
|
s.logger.Printf("[DEBUG] http: Shutting down http server (%v)", s.addr)
|
2014-11-14 19:39:19 +00:00
|
|
|
s.listener.Close()
|
|
|
|
}
|
2013-12-23 19:38:51 +00:00
|
|
|
}
|
|
|
|
|
2016-08-09 22:41:15 +00:00
|
|
|
// handleFuncMetrics takes the given pattern and handler and wraps to produce
|
|
|
|
// metrics based on the pattern and request.
|
|
|
|
func (s *HTTPServer) handleFuncMetrics(pattern string, handler func(http.ResponseWriter, *http.Request)) {
|
|
|
|
// Get the parts of the pattern. We omit any initial empty for the
|
|
|
|
// leading slash, and put an underscore as a "thing" placeholder if we
|
|
|
|
// see a trailing slash, which means the part after is parsed. This lets
|
|
|
|
// us distinguish from things like /v1/query and /v1/query/<query id>.
|
|
|
|
var parts []string
|
|
|
|
for i, part := range strings.Split(pattern, "/") {
|
|
|
|
if part == "" {
|
|
|
|
if i == 0 {
|
|
|
|
continue
|
|
|
|
} else {
|
|
|
|
part = "_"
|
|
|
|
}
|
|
|
|
}
|
|
|
|
parts = append(parts, part)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Register the wrapper, which will close over the expensive-to-compute
|
|
|
|
// parts from above.
|
|
|
|
wrapper := func(resp http.ResponseWriter, req *http.Request) {
|
|
|
|
start := time.Now()
|
|
|
|
handler(resp, req)
|
|
|
|
|
|
|
|
key := append([]string{"consul", "http", req.Method}, parts...)
|
|
|
|
metrics.MeasureSince(key, start)
|
|
|
|
}
|
|
|
|
s.mux.HandleFunc(pattern, wrapper)
|
|
|
|
}
|
|
|
|
|
2013-12-23 19:38:51 +00:00
|
|
|
// registerHandlers is used to attach our handlers to the mux
|
2014-03-20 00:50:57 +00:00
|
|
|
func (s *HTTPServer) registerHandlers(enableDebug bool) {
|
2013-12-25 01:09:51 +00:00
|
|
|
s.mux.HandleFunc("/", s.Index)
|
|
|
|
|
2016-10-26 02:20:24 +00:00
|
|
|
// API V1.
|
|
|
|
if s.agent.config.ACLDatacenter != "" {
|
|
|
|
s.handleFuncMetrics("/v1/acl/create", s.wrap(s.ACLCreate))
|
|
|
|
s.handleFuncMetrics("/v1/acl/update", s.wrap(s.ACLUpdate))
|
|
|
|
s.handleFuncMetrics("/v1/acl/destroy/", s.wrap(s.ACLDestroy))
|
|
|
|
s.handleFuncMetrics("/v1/acl/info/", s.wrap(s.ACLGet))
|
|
|
|
s.handleFuncMetrics("/v1/acl/clone/", s.wrap(s.ACLClone))
|
|
|
|
s.handleFuncMetrics("/v1/acl/list", s.wrap(s.ACLList))
|
|
|
|
s.handleFuncMetrics("/v1/acl/replication", s.wrap(s.ACLReplicationStatus))
|
2015-07-30 18:23:09 +00:00
|
|
|
} else {
|
2016-12-14 07:21:14 +00:00
|
|
|
s.handleFuncMetrics("/v1/acl/create", s.wrap(ACLDisabled))
|
|
|
|
s.handleFuncMetrics("/v1/acl/update", s.wrap(ACLDisabled))
|
|
|
|
s.handleFuncMetrics("/v1/acl/destroy/", s.wrap(ACLDisabled))
|
|
|
|
s.handleFuncMetrics("/v1/acl/info/", s.wrap(ACLDisabled))
|
|
|
|
s.handleFuncMetrics("/v1/acl/clone/", s.wrap(ACLDisabled))
|
|
|
|
s.handleFuncMetrics("/v1/acl/list", s.wrap(ACLDisabled))
|
|
|
|
s.handleFuncMetrics("/v1/acl/replication", s.wrap(ACLDisabled))
|
2015-07-29 23:33:25 +00:00
|
|
|
}
|
2016-08-09 22:41:15 +00:00
|
|
|
s.handleFuncMetrics("/v1/agent/self", s.wrap(s.AgentSelf))
|
|
|
|
s.handleFuncMetrics("/v1/agent/maintenance", s.wrap(s.AgentNodeMaintenance))
|
2016-11-30 18:29:42 +00:00
|
|
|
s.handleFuncMetrics("/v1/agent/reload", s.wrap(s.AgentReload))
|
2016-11-16 21:45:26 +00:00
|
|
|
s.handleFuncMetrics("/v1/agent/monitor", s.wrap(s.AgentMonitor))
|
2016-08-09 22:41:15 +00:00
|
|
|
s.handleFuncMetrics("/v1/agent/services", s.wrap(s.AgentServices))
|
|
|
|
s.handleFuncMetrics("/v1/agent/checks", s.wrap(s.AgentChecks))
|
|
|
|
s.handleFuncMetrics("/v1/agent/members", s.wrap(s.AgentMembers))
|
|
|
|
s.handleFuncMetrics("/v1/agent/join/", s.wrap(s.AgentJoin))
|
2016-11-30 18:29:42 +00:00
|
|
|
s.handleFuncMetrics("/v1/agent/leave", s.wrap(s.AgentLeave))
|
2016-08-09 22:41:15 +00:00
|
|
|
s.handleFuncMetrics("/v1/agent/force-leave/", s.wrap(s.AgentForceLeave))
|
|
|
|
s.handleFuncMetrics("/v1/agent/check/register", s.wrap(s.AgentRegisterCheck))
|
|
|
|
s.handleFuncMetrics("/v1/agent/check/deregister/", s.wrap(s.AgentDeregisterCheck))
|
|
|
|
s.handleFuncMetrics("/v1/agent/check/pass/", s.wrap(s.AgentCheckPass))
|
|
|
|
s.handleFuncMetrics("/v1/agent/check/warn/", s.wrap(s.AgentCheckWarn))
|
|
|
|
s.handleFuncMetrics("/v1/agent/check/fail/", s.wrap(s.AgentCheckFail))
|
|
|
|
s.handleFuncMetrics("/v1/agent/check/update/", s.wrap(s.AgentCheckUpdate))
|
|
|
|
s.handleFuncMetrics("/v1/agent/service/register", s.wrap(s.AgentRegisterService))
|
|
|
|
s.handleFuncMetrics("/v1/agent/service/deregister/", s.wrap(s.AgentDeregisterService))
|
|
|
|
s.handleFuncMetrics("/v1/agent/service/maintenance/", s.wrap(s.AgentServiceMaintenance))
|
2016-10-26 02:20:24 +00:00
|
|
|
s.handleFuncMetrics("/v1/catalog/register", s.wrap(s.CatalogRegister))
|
|
|
|
s.handleFuncMetrics("/v1/catalog/deregister", s.wrap(s.CatalogDeregister))
|
|
|
|
s.handleFuncMetrics("/v1/catalog/datacenters", s.wrap(s.CatalogDatacenters))
|
|
|
|
s.handleFuncMetrics("/v1/catalog/nodes", s.wrap(s.CatalogNodes))
|
|
|
|
s.handleFuncMetrics("/v1/catalog/services", s.wrap(s.CatalogServices))
|
|
|
|
s.handleFuncMetrics("/v1/catalog/service/", s.wrap(s.CatalogServiceNodes))
|
|
|
|
s.handleFuncMetrics("/v1/catalog/node/", s.wrap(s.CatalogNodeServices))
|
|
|
|
if !s.agent.config.DisableCoordinates {
|
|
|
|
s.handleFuncMetrics("/v1/coordinate/datacenters", s.wrap(s.CoordinateDatacenters))
|
|
|
|
s.handleFuncMetrics("/v1/coordinate/nodes", s.wrap(s.CoordinateNodes))
|
|
|
|
} else {
|
|
|
|
s.handleFuncMetrics("/v1/coordinate/datacenters", s.wrap(coordinateDisabled))
|
|
|
|
s.handleFuncMetrics("/v1/coordinate/nodes", s.wrap(coordinateDisabled))
|
|
|
|
}
|
2016-08-09 22:41:15 +00:00
|
|
|
s.handleFuncMetrics("/v1/event/fire/", s.wrap(s.EventFire))
|
|
|
|
s.handleFuncMetrics("/v1/event/list", s.wrap(s.EventList))
|
2016-10-26 02:20:24 +00:00
|
|
|
s.handleFuncMetrics("/v1/health/node/", s.wrap(s.HealthNodeChecks))
|
|
|
|
s.handleFuncMetrics("/v1/health/checks/", s.wrap(s.HealthServiceChecks))
|
|
|
|
s.handleFuncMetrics("/v1/health/state/", s.wrap(s.HealthChecksInState))
|
|
|
|
s.handleFuncMetrics("/v1/health/service/", s.wrap(s.HealthServiceNodes))
|
|
|
|
s.handleFuncMetrics("/v1/internal/ui/nodes", s.wrap(s.UINodes))
|
|
|
|
s.handleFuncMetrics("/v1/internal/ui/node/", s.wrap(s.UINodeInfo))
|
|
|
|
s.handleFuncMetrics("/v1/internal/ui/services", s.wrap(s.UIServices))
|
2016-08-09 22:41:15 +00:00
|
|
|
s.handleFuncMetrics("/v1/kv/", s.wrap(s.KVSEndpoint))
|
2016-10-26 02:20:24 +00:00
|
|
|
s.handleFuncMetrics("/v1/operator/raft/configuration", s.wrap(s.OperatorRaftConfiguration))
|
|
|
|
s.handleFuncMetrics("/v1/operator/raft/peer", s.wrap(s.OperatorRaftPeer))
|
2016-11-22 23:24:40 +00:00
|
|
|
s.handleFuncMetrics("/v1/operator/keyring", s.wrap(s.OperatorKeyringEndpoint))
|
2017-02-24 04:32:13 +00:00
|
|
|
s.handleFuncMetrics("/v1/operator/autopilot/configuration", s.wrap(s.OperatorAutopilotConfiguration))
|
2016-10-26 02:20:24 +00:00
|
|
|
s.handleFuncMetrics("/v1/query", s.wrap(s.PreparedQueryGeneral))
|
|
|
|
s.handleFuncMetrics("/v1/query/", s.wrap(s.PreparedQuerySpecific))
|
2016-08-09 22:41:15 +00:00
|
|
|
s.handleFuncMetrics("/v1/session/create", s.wrap(s.SessionCreate))
|
|
|
|
s.handleFuncMetrics("/v1/session/destroy/", s.wrap(s.SessionDestroy))
|
|
|
|
s.handleFuncMetrics("/v1/session/renew/", s.wrap(s.SessionRenew))
|
|
|
|
s.handleFuncMetrics("/v1/session/info/", s.wrap(s.SessionGet))
|
|
|
|
s.handleFuncMetrics("/v1/session/node/", s.wrap(s.SessionsForNode))
|
|
|
|
s.handleFuncMetrics("/v1/session/list", s.wrap(s.SessionList))
|
2016-10-26 02:20:24 +00:00
|
|
|
s.handleFuncMetrics("/v1/status/leader", s.wrap(s.StatusLeader))
|
|
|
|
s.handleFuncMetrics("/v1/status/peers", s.wrap(s.StatusPeers))
|
|
|
|
s.handleFuncMetrics("/v1/snapshot", s.wrap(s.Snapshot))
|
2016-08-09 22:41:15 +00:00
|
|
|
s.handleFuncMetrics("/v1/txn", s.wrap(s.Txn))
|
2016-05-11 04:41:47 +00:00
|
|
|
|
2016-10-26 02:20:24 +00:00
|
|
|
// Debug endpoints.
|
2014-03-20 00:50:57 +00:00
|
|
|
if enableDebug {
|
2016-08-09 22:41:15 +00:00
|
|
|
s.handleFuncMetrics("/debug/pprof/", pprof.Index)
|
|
|
|
s.handleFuncMetrics("/debug/pprof/cmdline", pprof.Cmdline)
|
|
|
|
s.handleFuncMetrics("/debug/pprof/profile", pprof.Profile)
|
|
|
|
s.handleFuncMetrics("/debug/pprof/symbol", pprof.Symbol)
|
2014-03-20 00:50:57 +00:00
|
|
|
}
|
2014-04-23 19:57:06 +00:00
|
|
|
|
2015-11-30 19:24:08 +00:00
|
|
|
// Use the custom UI dir if provided.
|
2014-04-23 19:57:06 +00:00
|
|
|
if s.uiDir != "" {
|
2014-04-24 18:10:23 +00:00
|
|
|
s.mux.Handle("/ui/", http.StripPrefix("/ui/", http.FileServer(http.Dir(s.uiDir))))
|
2015-12-22 17:30:19 +00:00
|
|
|
} else if s.agent.config.EnableUi {
|
2015-11-30 19:24:08 +00:00
|
|
|
s.mux.Handle("/ui/", http.StripPrefix("/ui/", http.FileServer(assetFS())))
|
2015-02-11 21:25:04 +00:00
|
|
|
}
|
2014-04-28 21:52:30 +00:00
|
|
|
|
2013-12-23 19:38:51 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// wrap is used to wrap functions to make them more convenient
|
2013-12-24 00:20:51 +00:00
|
|
|
func (s *HTTPServer) wrap(handler func(resp http.ResponseWriter, req *http.Request) (interface{}, error)) func(resp http.ResponseWriter, req *http.Request) {
|
2013-12-23 19:38:51 +00:00
|
|
|
f := func(resp http.ResponseWriter, req *http.Request) {
|
2014-12-28 04:53:19 +00:00
|
|
|
setHeaders(resp, s.agent.config.HTTPAPIResponseHeaders)
|
2016-08-16 18:31:41 +00:00
|
|
|
setTranslateAddr(resp, s.agent.config.TranslateWanAddrs)
|
2014-12-28 04:53:19 +00:00
|
|
|
|
2015-04-12 18:17:31 +00:00
|
|
|
// Obfuscate any tokens from appearing in the logs
|
2015-04-14 00:31:53 +00:00
|
|
|
formVals, err := url.ParseQuery(req.URL.RawQuery)
|
|
|
|
if err != nil {
|
2016-01-05 16:49:40 +00:00
|
|
|
s.logger.Printf("[ERR] http: Failed to decode query: %s from=%s", err, req.RemoteAddr)
|
2016-02-05 22:06:42 +00:00
|
|
|
resp.WriteHeader(http.StatusInternalServerError) // 500
|
2015-04-14 00:31:53 +00:00
|
|
|
return
|
|
|
|
}
|
2015-04-12 18:17:31 +00:00
|
|
|
logURL := req.URL.String()
|
2015-04-14 00:31:53 +00:00
|
|
|
if tokens, ok := formVals["token"]; ok {
|
2015-04-12 18:17:31 +00:00
|
|
|
for _, token := range tokens {
|
2015-06-12 07:09:51 +00:00
|
|
|
if token == "" {
|
|
|
|
logURL += "<hidden>"
|
|
|
|
continue
|
|
|
|
}
|
2015-04-12 18:17:31 +00:00
|
|
|
logURL = strings.Replace(logURL, token, "<hidden>", -1)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-11-12 06:54:55 +00:00
|
|
|
// TODO (slackpad) We may want to consider redacting prepared
|
|
|
|
// query names/IDs here since they are proxies for tokens. But,
|
|
|
|
// knowing one only gives you read access to service listings
|
|
|
|
// which is pretty trivial, so it's probably not worth the code
|
|
|
|
// complexity and overhead of filtering them out. You can't
|
|
|
|
// recover the token it's a proxy for with just the query info;
|
|
|
|
// you'd need the actual token (or a management token) to read
|
|
|
|
// that back.
|
|
|
|
|
2013-12-23 19:38:51 +00:00
|
|
|
// Invoke the handler
|
2013-12-23 22:26:34 +00:00
|
|
|
start := time.Now()
|
|
|
|
defer func() {
|
2016-01-05 16:49:40 +00:00
|
|
|
s.logger.Printf("[DEBUG] http: Request %s %v (%v) from=%s", req.Method, logURL, time.Now().Sub(start), req.RemoteAddr)
|
2013-12-23 22:26:34 +00:00
|
|
|
}()
|
2013-12-24 00:20:51 +00:00
|
|
|
obj, err := handler(resp, req)
|
2013-12-23 19:38:51 +00:00
|
|
|
|
|
|
|
// Check for an error
|
|
|
|
HAS_ERR:
|
|
|
|
if err != nil {
|
2016-01-05 16:49:40 +00:00
|
|
|
s.logger.Printf("[ERR] http: Request %s %v, error: %v from=%s", req.Method, logURL, err, req.RemoteAddr)
|
2016-02-05 22:06:42 +00:00
|
|
|
code := http.StatusInternalServerError // 500
|
2014-08-22 19:59:47 +00:00
|
|
|
errMsg := err.Error()
|
|
|
|
if strings.Contains(errMsg, "Permission denied") || strings.Contains(errMsg, "ACL not found") {
|
2016-02-05 22:06:42 +00:00
|
|
|
code = http.StatusForbidden // 403
|
2014-08-22 19:59:47 +00:00
|
|
|
}
|
2016-08-16 18:31:41 +00:00
|
|
|
|
2014-08-22 19:59:47 +00:00
|
|
|
resp.WriteHeader(code)
|
2013-12-23 19:38:51 +00:00
|
|
|
resp.Write([]byte(err.Error()))
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2013-12-24 00:20:51 +00:00
|
|
|
if obj != nil {
|
2014-08-01 20:11:51 +00:00
|
|
|
var buf []byte
|
2016-05-07 00:50:58 +00:00
|
|
|
buf, err = s.marshalJSON(req, obj)
|
2014-08-01 20:11:51 +00:00
|
|
|
if err != nil {
|
2013-12-24 00:20:51 +00:00
|
|
|
goto HAS_ERR
|
|
|
|
}
|
2016-05-07 00:50:58 +00:00
|
|
|
|
2014-04-17 18:38:14 +00:00
|
|
|
resp.Header().Set("Content-Type", "application/json")
|
2014-08-01 20:11:51 +00:00
|
|
|
resp.Write(buf)
|
2013-12-23 19:38:51 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
return f
|
|
|
|
}
|
2013-12-24 00:20:51 +00:00
|
|
|
|
2016-05-07 00:50:58 +00:00
|
|
|
// marshalJSON marshals the object into JSON, respecting the user's pretty-ness
|
|
|
|
// configuration.
|
|
|
|
func (s *HTTPServer) marshalJSON(req *http.Request, obj interface{}) ([]byte, error) {
|
2016-11-18 06:31:19 +00:00
|
|
|
if _, ok := req.URL.Query()["pretty"]; ok || s.agent.config.DevMode {
|
2016-05-07 00:50:58 +00:00
|
|
|
buf, err := json.MarshalIndent(obj, "", " ")
|
2016-05-10 21:37:05 +00:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
buf = append(buf, "\n"...)
|
|
|
|
return buf, nil
|
2016-05-07 00:50:58 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
buf, err := json.Marshal(obj)
|
2016-05-10 21:37:05 +00:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
2016-05-07 00:50:58 +00:00
|
|
|
return buf, err
|
|
|
|
}
|
|
|
|
|
2016-02-13 00:11:32 +00:00
|
|
|
// Returns true if the UI is enabled.
|
|
|
|
func (s *HTTPServer) IsUIEnabled() bool {
|
|
|
|
return s.uiDir != "" || s.agent.config.EnableUi
|
|
|
|
}
|
|
|
|
|
2013-12-25 01:09:51 +00:00
|
|
|
// Renders a simple index page
|
|
|
|
func (s *HTTPServer) Index(resp http.ResponseWriter, req *http.Request) {
|
2014-04-27 19:10:38 +00:00
|
|
|
// Check if this is a non-index path
|
|
|
|
if req.URL.Path != "/" {
|
2016-02-05 22:06:42 +00:00
|
|
|
resp.WriteHeader(http.StatusNotFound) // 404
|
2014-04-27 19:10:38 +00:00
|
|
|
return
|
2013-12-25 01:09:51 +00:00
|
|
|
}
|
2014-04-27 19:10:38 +00:00
|
|
|
|
2016-02-13 00:11:32 +00:00
|
|
|
// Give them something helpful if there's no UI so they at least know
|
|
|
|
// what this server is.
|
|
|
|
if !s.IsUIEnabled() {
|
2014-04-27 19:10:38 +00:00
|
|
|
resp.Write([]byte("Consul Agent"))
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
// Redirect to the UI endpoint
|
2016-02-05 22:06:42 +00:00
|
|
|
http.Redirect(resp, req, "/ui/", http.StatusMovedPermanently) // 301
|
2013-12-25 01:09:51 +00:00
|
|
|
}
|
|
|
|
|
2013-12-24 00:20:51 +00:00
|
|
|
// decodeBody is used to decode a JSON request body
|
2014-04-21 22:02:36 +00:00
|
|
|
func decodeBody(req *http.Request, out interface{}, cb func(interface{}) error) error {
|
|
|
|
var raw interface{}
|
2013-12-24 00:20:51 +00:00
|
|
|
dec := json.NewDecoder(req.Body)
|
2014-04-21 22:02:36 +00:00
|
|
|
if err := dec.Decode(&raw); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
// Invoke the callback prior to decode
|
|
|
|
if cb != nil {
|
|
|
|
if err := cb(raw); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return mapstructure.Decode(raw, out)
|
2013-12-24 00:20:51 +00:00
|
|
|
}
|
2014-02-05 22:36:13 +00:00
|
|
|
|
2016-08-16 18:31:41 +00:00
|
|
|
// setTranslateAddr is used to set the address translation header. This is only
|
|
|
|
// present if the feature is active.
|
|
|
|
func setTranslateAddr(resp http.ResponseWriter, active bool) {
|
|
|
|
if active {
|
|
|
|
resp.Header().Set("X-Consul-Translate-Addresses", "true")
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2014-02-05 22:36:13 +00:00
|
|
|
// setIndex is used to set the index response header
|
|
|
|
func setIndex(resp http.ResponseWriter, index uint64) {
|
2014-10-14 00:53:54 +00:00
|
|
|
resp.Header().Set("X-Consul-Index", strconv.FormatUint(index, 10))
|
2014-02-05 22:36:13 +00:00
|
|
|
}
|
|
|
|
|
2014-04-21 19:40:11 +00:00
|
|
|
// setKnownLeader is used to set the known leader header
|
|
|
|
func setKnownLeader(resp http.ResponseWriter, known bool) {
|
|
|
|
s := "true"
|
|
|
|
if !known {
|
|
|
|
s = "false"
|
|
|
|
}
|
2014-10-14 00:53:54 +00:00
|
|
|
resp.Header().Set("X-Consul-KnownLeader", s)
|
2014-04-21 19:40:11 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// setLastContact is used to set the last contact header
|
|
|
|
func setLastContact(resp http.ResponseWriter, last time.Duration) {
|
|
|
|
lastMsec := uint64(last / time.Millisecond)
|
2014-10-14 00:53:54 +00:00
|
|
|
resp.Header().Set("X-Consul-LastContact", strconv.FormatUint(lastMsec, 10))
|
2014-04-21 19:40:11 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// setMeta is used to set the query response meta data
|
|
|
|
func setMeta(resp http.ResponseWriter, m *structs.QueryMeta) {
|
|
|
|
setIndex(resp, m.Index)
|
|
|
|
setLastContact(resp, m.LastContact)
|
|
|
|
setKnownLeader(resp, m.KnownLeader)
|
|
|
|
}
|
|
|
|
|
2014-12-28 04:53:19 +00:00
|
|
|
// setHeaders is used to set canonical response header fields
|
|
|
|
func setHeaders(resp http.ResponseWriter, headers map[string]string) {
|
|
|
|
for field, value := range headers {
|
|
|
|
resp.Header().Set(http.CanonicalHeaderKey(field), value)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2014-02-05 22:36:13 +00:00
|
|
|
// parseWait is used to parse the ?wait and ?index query params
|
|
|
|
// Returns true on error
|
2014-04-21 19:26:12 +00:00
|
|
|
func parseWait(resp http.ResponseWriter, req *http.Request, b *structs.QueryOptions) bool {
|
2014-02-05 22:36:13 +00:00
|
|
|
query := req.URL.Query()
|
|
|
|
if wait := query.Get("wait"); wait != "" {
|
|
|
|
dur, err := time.ParseDuration(wait)
|
|
|
|
if err != nil {
|
2016-02-05 22:06:42 +00:00
|
|
|
resp.WriteHeader(http.StatusBadRequest) // 400
|
2014-02-05 22:36:13 +00:00
|
|
|
resp.Write([]byte("Invalid wait time"))
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
b.MaxQueryTime = dur
|
|
|
|
}
|
|
|
|
if idx := query.Get("index"); idx != "" {
|
|
|
|
index, err := strconv.ParseUint(idx, 10, 64)
|
|
|
|
if err != nil {
|
2016-02-05 22:06:42 +00:00
|
|
|
resp.WriteHeader(http.StatusBadRequest) // 400
|
2014-02-05 22:36:13 +00:00
|
|
|
resp.Write([]byte("Invalid index"))
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
b.MinQueryIndex = index
|
|
|
|
}
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
2014-04-21 19:26:12 +00:00
|
|
|
// parseConsistency is used to parse the ?stale and ?consistent query params.
|
|
|
|
// Returns true on error
|
|
|
|
func parseConsistency(resp http.ResponseWriter, req *http.Request, b *structs.QueryOptions) bool {
|
|
|
|
query := req.URL.Query()
|
|
|
|
if _, ok := query["stale"]; ok {
|
|
|
|
b.AllowStale = true
|
|
|
|
}
|
|
|
|
if _, ok := query["consistent"]; ok {
|
|
|
|
b.RequireConsistent = true
|
|
|
|
}
|
|
|
|
if b.AllowStale && b.RequireConsistent {
|
2016-02-05 22:06:42 +00:00
|
|
|
resp.WriteHeader(http.StatusBadRequest) // 400
|
2014-04-21 19:26:12 +00:00
|
|
|
resp.Write([]byte("Cannot specify ?stale with ?consistent, conflicting semantics."))
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
2014-02-05 22:36:13 +00:00
|
|
|
// parseDC is used to parse the ?dc query param
|
|
|
|
func (s *HTTPServer) parseDC(req *http.Request, dc *string) {
|
|
|
|
if other := req.URL.Query().Get("dc"); other != "" {
|
|
|
|
*dc = other
|
|
|
|
} else if *dc == "" {
|
|
|
|
*dc = s.agent.config.Datacenter
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-10-19 13:59:24 +00:00
|
|
|
// parseToken is used to parse the ?token query param or the X-Consul-Token header
|
2014-08-12 18:35:22 +00:00
|
|
|
func (s *HTTPServer) parseToken(req *http.Request, token *string) {
|
|
|
|
if other := req.URL.Query().Get("token"); other != "" {
|
|
|
|
*token = other
|
2015-02-06 22:10:01 +00:00
|
|
|
return
|
2014-08-12 18:35:22 +00:00
|
|
|
}
|
2015-02-06 22:10:01 +00:00
|
|
|
|
2015-10-19 13:59:24 +00:00
|
|
|
if other := req.Header.Get("X-Consul-Token"); other != "" {
|
|
|
|
*token = other
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2015-02-06 22:10:01 +00:00
|
|
|
// Set the AtlasACLToken if SCADA
|
|
|
|
if s.addr == scadaHTTPAddr && s.agent.config.AtlasACLToken != "" {
|
|
|
|
*token = s.agent.config.AtlasACLToken
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
// Set the default ACLToken
|
|
|
|
*token = s.agent.config.ACLToken
|
2014-08-12 18:35:22 +00:00
|
|
|
}
|
|
|
|
|
2015-06-30 21:25:40 +00:00
|
|
|
// parseSource is used to parse the ?near=<node> query parameter, used for
|
|
|
|
// sorting by RTT based on a source node. We set the source's DC to the target
|
|
|
|
// DC in the request, if given, or else the agent's DC.
|
|
|
|
func (s *HTTPServer) parseSource(req *http.Request, source *structs.QuerySource) {
|
|
|
|
s.parseDC(req, &source.Datacenter)
|
|
|
|
if node := req.URL.Query().Get("near"); node != "" {
|
2015-07-28 17:39:37 +00:00
|
|
|
if node == "_agent" {
|
2015-07-24 21:30:53 +00:00
|
|
|
source.Node = s.agent.config.NodeName
|
|
|
|
} else {
|
|
|
|
source.Node = node
|
|
|
|
}
|
2015-06-30 21:25:40 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2017-01-09 19:21:49 +00:00
|
|
|
// parseMetaFilter is used to parse the ?node-meta=key:value query parameter, used for
|
|
|
|
// filtering results to nodes with the given metadata key/value
|
2017-01-11 19:41:12 +00:00
|
|
|
func (s *HTTPServer) parseMetaFilter(req *http.Request) map[string]string {
|
|
|
|
if filterList, ok := req.URL.Query()["node-meta"]; ok {
|
|
|
|
filters := make(map[string]string)
|
|
|
|
for _, filter := range filterList {
|
2017-01-11 21:07:11 +00:00
|
|
|
key, value := parseMetaPair(filter)
|
|
|
|
filters[key] = value
|
2017-01-09 19:21:49 +00:00
|
|
|
}
|
2017-01-11 19:41:12 +00:00
|
|
|
return filters
|
2017-01-09 19:21:49 +00:00
|
|
|
}
|
2017-01-11 19:41:12 +00:00
|
|
|
return nil
|
2017-01-09 19:21:49 +00:00
|
|
|
}
|
|
|
|
|
2014-02-05 22:36:13 +00:00
|
|
|
// parse is a convenience method for endpoints that need
|
|
|
|
// to use both parseWait and parseDC.
|
2014-04-21 19:26:12 +00:00
|
|
|
func (s *HTTPServer) parse(resp http.ResponseWriter, req *http.Request, dc *string, b *structs.QueryOptions) bool {
|
2014-02-05 22:36:13 +00:00
|
|
|
s.parseDC(req, dc)
|
2014-08-12 18:35:22 +00:00
|
|
|
s.parseToken(req, &b.Token)
|
2014-04-21 19:26:12 +00:00
|
|
|
if parseConsistency(resp, req, b) {
|
|
|
|
return true
|
|
|
|
}
|
2014-02-05 22:36:13 +00:00
|
|
|
return parseWait(resp, req, b)
|
|
|
|
}
|