package consul import ( "github.com/hashicorp/consul/consul/structs" "github.com/hashicorp/serf/serf" ) // Internal endpoint is used to query the miscellaneous info that // does not necessarily fit into the other systems. It is also // used to hold undocumented APIs that users should not rely on. type Internal struct { srv *Server } // ChecksInState is used to get all the checks in a given state func (m *Internal) NodeInfo(args *structs.NodeSpecificRequest, reply *structs.IndexedNodeDump) error { if done, err := m.srv.forward("Internal.NodeInfo", args, args, reply); done { return err } // Get the state specific checks state := m.srv.fsm.State() return m.srv.blockingRPC(&args.QueryOptions, &reply.QueryMeta, state.QueryTables("NodeInfo"), func() error { reply.Index, reply.Dump = state.NodeInfo(args.Node) return nil }) } // ChecksInState is used to get all the checks in a given state func (m *Internal) NodeDump(args *structs.DCSpecificRequest, reply *structs.IndexedNodeDump) error { if done, err := m.srv.forward("Internal.NodeDump", args, args, reply); done { return err } // Get the state specific checks state := m.srv.fsm.State() return m.srv.blockingRPC(&args.QueryOptions, &reply.QueryMeta, state.QueryTables("NodeDump"), func() error { reply.Index, reply.Dump = state.NodeDump() return nil }) } // EventFire is a bit of an odd endpoint, but it allows for a cross-DC RPC // call to fire an event. The primary use case is to enable user events being // triggered in a remote DC. func (m *Internal) EventFire(args *structs.EventFireRequest, reply *structs.EventFireResponse) error { if done, err := m.srv.forward("Internal.EventFire", args, args, reply); done { return err } // Set the query meta data m.srv.setQueryMeta(&reply.QueryMeta) // Fire the event return m.srv.UserEvent(args.Name, args.Payload) } // KeyringOperation will query the WAN and LAN gossip keyrings of all nodes, // adding results into a collective response as we go. It can describe requests // for all keyring-related operations. func (m *Internal) KeyringOperation( args *structs.KeyringRequest, reply *structs.KeyringResponses) error { m.executeKeyringOp(args, reply, false) if !args.Forwarded { m.executeKeyringOp(args, reply, true) args.Forwarded = true return m.srv.globalRPC("Internal.KeyringOperation", args, reply) } return nil } // executeKeyringOp executes the appropriate keyring-related function based on // the type of keyring operation in the request. It takes the KeyManager as an // argument, so it can handle any operation for either LAN or WAN pools. func (m *Internal) executeKeyringOp( args *structs.KeyringRequest, reply *structs.KeyringResponses, wan bool) { var serfResp *serf.KeyResponse var err error dc := m.srv.config.Datacenter var mgr *serf.KeyManager if wan { mgr = m.srv.KeyManagerWAN() } else { mgr = m.srv.KeyManagerLAN() } switch args.Operation { case structs.KeyringList: serfResp, err = mgr.ListKeys() case structs.KeyringInstall: serfResp, err = mgr.InstallKey(args.Key) case structs.KeyringUse: serfResp, err = mgr.UseKey(args.Key) case structs.KeyringRemove: serfResp, err = mgr.RemoveKey(args.Key) } errStr := "" if err != nil { errStr = err.Error() } reply.Responses = append(reply.Responses, &structs.KeyringResponse{ WAN: wan, Datacenter: dc, Messages: serfResp.Messages, Keys: serfResp.Keys, NumNodes: serfResp.NumNodes, Error: errStr, }) }