package agent import ( "bytes" "fmt" "io" "net/http" "strconv" "strings" "time" "github.com/hashicorp/consul/acl" "github.com/hashicorp/consul/agent/structs" ) // EventFire is used to fire a new event func (s *HTTPServer) EventFire(resp http.ResponseWriter, req *http.Request) (interface{}, error) { // Get the datacenter var dc string s.parseDC(req, &dc) event := &UserEvent{} event.Name = strings.TrimPrefix(req.URL.Path, "/v1/event/fire/") if event.Name == "" { resp.WriteHeader(http.StatusBadRequest) fmt.Fprint(resp, "Missing name") return nil, nil } // Get the ACL token var token string s.parseToken(req, &token) // Get the filters if filt := req.URL.Query().Get("node"); filt != "" { event.NodeFilter = filt } if filt := req.URL.Query().Get("service"); filt != "" { event.ServiceFilter = filt } if filt := req.URL.Query().Get("tag"); filt != "" { event.TagFilter = filt } // Get the payload if req.ContentLength > 0 { var buf bytes.Buffer if _, err := io.Copy(&buf, req.Body); err != nil { return nil, err } event.Payload = buf.Bytes() } // Try to fire the event if err := s.agent.UserEvent(dc, token, event); err != nil { if acl.IsErrPermissionDenied(err) { resp.WriteHeader(http.StatusForbidden) fmt.Fprint(resp, acl.ErrPermissionDenied.Error()) return nil, nil } resp.WriteHeader(http.StatusInternalServerError) return nil, err } // Return the event return event, nil } // EventList is used to retrieve the recent list of events func (s *HTTPServer) EventList(resp http.ResponseWriter, req *http.Request) (interface{}, error) { // Parse the query options, since we simulate a blocking query var b structs.QueryOptions if parseWait(resp, req, &b) { return nil, nil } // Fetch the ACL token, if any. var token string s.parseToken(req, &token) authz, err := s.agent.delegate.ResolveTokenAndDefaultMeta(token, nil, nil) if err != nil { return nil, err } // Look for a name filter var nameFilter string if filt := req.URL.Query().Get("name"); filt != "" { nameFilter = filt } // Lots of this logic is borrowed from consul/rpc.go:blockingQuery // However we cannot use that directly since this code has some // slight semantics differences... var timeout <-chan time.Time var notifyCh chan struct{} // Fast path non-blocking if b.MinQueryIndex == 0 { goto RUN_QUERY } // Restrict the max query time if b.MaxQueryTime > maxQueryTime { b.MaxQueryTime = maxQueryTime } // Ensure a time limit is set if we have an index if b.MinQueryIndex > 0 && b.MaxQueryTime == 0 { b.MaxQueryTime = maxQueryTime } // Setup a query timeout if b.MaxQueryTime > 0 { timeout = time.After(b.MaxQueryTime) } // Setup a notification channel for changes SETUP_NOTIFY: if b.MinQueryIndex > 0 { notifyCh = make(chan struct{}, 1) s.agent.eventNotify.Wait(notifyCh) defer s.agent.eventNotify.Clear(notifyCh) } RUN_QUERY: // Get the recent events events := s.agent.UserEvents() // Filter the events using the ACL, if present if authz != nil { for i := 0; i < len(events); i++ { name := events[i].Name if authz.EventRead(name, nil) == acl.Allow { continue } s.agent.logger.Debug("dropping event from result due to ACLs", "event", name) events = append(events[:i], events[i+1:]...) i-- } } // Filter the events if requested if nameFilter != "" { for i := 0; i < len(events); i++ { if events[i].Name != nameFilter { events = append(events[:i], events[i+1:]...) i-- } } } // Determine the index var index uint64 if len(events) == 0 { // Return a non-zero index to prevent a hot query loop. This // can be caused by a watch for example when there is no matching // events. index = 1 } else { last := events[len(events)-1] index = uuidToUint64(last.ID) } setIndex(resp, index) // Check for exact match on the query value. Because // the index value is not monotonic, we just ensure it is // not an exact match. if index > 0 && index == b.MinQueryIndex { select { case <-notifyCh: goto SETUP_NOTIFY case <-timeout: } } return events, nil } // uuidToUint64 is a bit of a hack to generate a 64bit Consul index. // In effect, we take our random UUID, convert it to a 128 bit number, // then XOR the high-order and low-order 64bit's together to get the // output. This lets us generate an index which can be used to simulate // the blocking behavior of other catalog endpoints. func uuidToUint64(uuid string) uint64 { lower := uuid[0:8] + uuid[9:13] + uuid[14:18] upper := uuid[19:23] + uuid[24:36] lowVal, err := strconv.ParseUint(lower, 16, 64) if err != nil { panic("Failed to convert " + lower) } highVal, err := strconv.ParseUint(upper, 16, 64) if err != nil { panic("Failed to convert " + upper) } return lowVal ^ highVal }