2015-08-24 00:50:33 +00:00
|
|
|
package agent
|
|
|
|
|
|
|
|
import (
|
2016-05-18 01:05:00 +00:00
|
|
|
"bytes"
|
2016-10-24 05:22:00 +00:00
|
|
|
"crypto/tls"
|
2015-09-06 00:06:05 +00:00
|
|
|
"encoding/json"
|
2015-08-24 00:50:33 +00:00
|
|
|
"fmt"
|
|
|
|
"log"
|
|
|
|
"net"
|
|
|
|
"net/http"
|
|
|
|
"net/http/pprof"
|
2017-09-19 14:47:10 +00:00
|
|
|
"os"
|
2015-09-06 00:06:05 +00:00
|
|
|
"strconv"
|
|
|
|
"time"
|
|
|
|
|
2016-05-24 17:26:53 +00:00
|
|
|
"github.com/NYTimes/gziphandler"
|
2017-09-19 14:47:10 +00:00
|
|
|
"github.com/elazarl/go-bindata-assetfs"
|
2016-10-25 23:05:37 +00:00
|
|
|
"github.com/hashicorp/nomad/helper/tlsutil"
|
2015-09-06 00:06:05 +00:00
|
|
|
"github.com/hashicorp/nomad/nomad/structs"
|
2017-10-19 00:32:36 +00:00
|
|
|
"github.com/rs/cors"
|
2016-05-18 01:05:00 +00:00
|
|
|
"github.com/ugorji/go/codec"
|
2015-08-24 00:50:33 +00:00
|
|
|
)
|
|
|
|
|
2015-09-06 01:00:30 +00:00
|
|
|
const (
|
|
|
|
// ErrInvalidMethod is used if the HTTP method is not supported
|
|
|
|
ErrInvalidMethod = "Invalid method"
|
2015-09-14 22:33:08 +00:00
|
|
|
|
|
|
|
// scadaHTTPAddr is the address associated with the
|
|
|
|
// HTTPServer. When populating an ACL token for a request,
|
|
|
|
// this is checked to switch between the ACLToken and
|
|
|
|
// AtlasACLToken
|
|
|
|
scadaHTTPAddr = "SCADA"
|
2017-09-19 14:47:10 +00:00
|
|
|
|
|
|
|
// ErrEntOnly is the error returned if accessing an enterprise only
|
|
|
|
// endpoint
|
|
|
|
ErrEntOnly = "Nomad Enterprise only endpoint"
|
|
|
|
)
|
|
|
|
|
|
|
|
var (
|
|
|
|
// Set to false by stub_asset if the ui build tag isn't enabled
|
|
|
|
uiEnabled = true
|
|
|
|
|
|
|
|
// Overridden if the ui build tag isn't enabled
|
|
|
|
stubHTML = ""
|
2017-10-19 00:32:36 +00:00
|
|
|
|
|
|
|
// allowCORS sets permissive CORS headers for a handler
|
|
|
|
allowCORS = cors.New(cors.Options{
|
|
|
|
AllowedOrigins: []string{"*"},
|
|
|
|
AllowedMethods: []string{"HEAD", "GET"},
|
|
|
|
AllowedHeaders: []string{"*"},
|
|
|
|
})
|
2015-09-06 01:00:30 +00:00
|
|
|
)
|
|
|
|
|
2015-08-24 00:50:33 +00:00
|
|
|
// HTTPServer is used to wrap an Agent and expose it over an HTTP interface
|
|
|
|
type HTTPServer struct {
|
|
|
|
agent *Agent
|
|
|
|
mux *http.ServeMux
|
|
|
|
listener net.Listener
|
|
|
|
logger *log.Logger
|
2017-07-20 05:14:36 +00:00
|
|
|
Addr string
|
2015-08-24 00:50:33 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// NewHTTPServer starts new HTTP server over the agent
|
2017-04-10 12:15:40 +00:00
|
|
|
func NewHTTPServer(agent *Agent, config *Config) (*HTTPServer, error) {
|
2015-08-24 00:50:33 +00:00
|
|
|
// Start the listener
|
2016-11-09 19:37:41 +00:00
|
|
|
lnAddr, err := net.ResolveTCPAddr("tcp", config.normalizedAddrs.HTTP)
|
2016-09-02 23:23:45 +00:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
ln, err := config.Listener("tcp", lnAddr.IP.String(), lnAddr.Port)
|
2015-08-24 00:50:33 +00:00
|
|
|
if err != nil {
|
2015-09-11 00:48:02 +00:00
|
|
|
return nil, fmt.Errorf("failed to start HTTP listener: %v", err)
|
2015-08-24 00:50:33 +00:00
|
|
|
}
|
|
|
|
|
2016-10-25 00:07:44 +00:00
|
|
|
// If TLS is enabled, wrap the listener with a TLS listener
|
2016-10-24 20:46:22 +00:00
|
|
|
if config.TLSConfig.EnableHTTP {
|
2016-10-24 05:22:00 +00:00
|
|
|
tlsConf := &tlsutil.Config{
|
2017-04-28 09:45:09 +00:00
|
|
|
VerifyIncoming: config.TLSConfig.VerifyHTTPSClient,
|
2016-10-24 05:22:00 +00:00
|
|
|
VerifyOutgoing: true,
|
2016-10-24 20:46:22 +00:00
|
|
|
VerifyServerHostname: config.TLSConfig.VerifyServerHostname,
|
|
|
|
CAFile: config.TLSConfig.CAFile,
|
|
|
|
CertFile: config.TLSConfig.CertFile,
|
|
|
|
KeyFile: config.TLSConfig.KeyFile,
|
2016-10-24 05:22:00 +00:00
|
|
|
}
|
|
|
|
tlsConfig, err := tlsConf.IncomingTLSConfig()
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
ln = tls.NewListener(tcpKeepAliveListener{ln.(*net.TCPListener)}, tlsConfig)
|
|
|
|
}
|
|
|
|
|
2015-08-24 00:50:33 +00:00
|
|
|
// Create the mux
|
|
|
|
mux := http.NewServeMux()
|
|
|
|
|
|
|
|
// Create the server
|
|
|
|
srv := &HTTPServer{
|
|
|
|
agent: agent,
|
|
|
|
mux: mux,
|
|
|
|
listener: ln,
|
2016-07-19 17:04:57 +00:00
|
|
|
logger: agent.logger,
|
2017-07-20 05:14:36 +00:00
|
|
|
Addr: ln.Addr().String(),
|
2015-08-24 00:50:33 +00:00
|
|
|
}
|
|
|
|
srv.registerHandlers(config.EnableDebug)
|
|
|
|
|
2017-09-08 18:50:07 +00:00
|
|
|
// Handle requests with gzip compression
|
2017-09-19 14:14:23 +00:00
|
|
|
gzip, err := gziphandler.GzipHandlerWithOpts(gziphandler.MinSize(0))
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
go http.Serve(ln, gzip(mux))
|
2017-09-08 18:50:07 +00:00
|
|
|
|
2015-08-24 00:50:33 +00:00
|
|
|
return srv, nil
|
|
|
|
}
|
|
|
|
|
2015-09-14 22:33:08 +00:00
|
|
|
// newScadaHttp creates a new HTTP server wrapping the SCADA
|
|
|
|
// listener such that HTTP calls can be sent from the brokers.
|
|
|
|
func newScadaHttp(agent *Agent, list net.Listener) *HTTPServer {
|
|
|
|
// Create the mux
|
|
|
|
mux := http.NewServeMux()
|
|
|
|
|
|
|
|
// Create the server
|
|
|
|
srv := &HTTPServer{
|
|
|
|
agent: agent,
|
|
|
|
mux: mux,
|
|
|
|
listener: list,
|
|
|
|
logger: agent.logger,
|
2017-07-20 05:14:36 +00:00
|
|
|
Addr: scadaHTTPAddr,
|
2015-09-14 22:33:08 +00:00
|
|
|
}
|
|
|
|
srv.registerHandlers(false) // Never allow debug for SCADA
|
|
|
|
|
2017-09-08 18:50:07 +00:00
|
|
|
// Handle requests with gzip compression
|
2016-05-24 17:26:53 +00:00
|
|
|
go http.Serve(list, gziphandler.GzipHandler(mux))
|
2017-09-08 18:50:07 +00:00
|
|
|
|
2015-09-14 22:33:08 +00:00
|
|
|
return srv
|
|
|
|
}
|
|
|
|
|
2016-10-24 05:22:00 +00:00
|
|
|
// tcpKeepAliveListener sets TCP keep-alive timeouts on accepted
|
|
|
|
// connections. It's used by NewHttpServer so
|
|
|
|
// dead TCP connections eventually go away.
|
|
|
|
type tcpKeepAliveListener struct {
|
|
|
|
*net.TCPListener
|
|
|
|
}
|
|
|
|
|
|
|
|
func (ln tcpKeepAliveListener) Accept() (c net.Conn, err error) {
|
|
|
|
tc, err := ln.AcceptTCP()
|
|
|
|
if err != nil {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
tc.SetKeepAlive(true)
|
|
|
|
tc.SetKeepAlivePeriod(30 * time.Second)
|
|
|
|
return tc, nil
|
|
|
|
}
|
|
|
|
|
2015-08-24 00:50:33 +00:00
|
|
|
// Shutdown is used to shutdown the HTTP server
|
|
|
|
func (s *HTTPServer) Shutdown() {
|
|
|
|
if s != nil {
|
|
|
|
s.logger.Printf("[DEBUG] http: Shutting down http server")
|
|
|
|
s.listener.Close()
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// registerHandlers is used to attach our handlers to the mux
|
|
|
|
func (s *HTTPServer) registerHandlers(enableDebug bool) {
|
2015-09-06 01:00:30 +00:00
|
|
|
s.mux.HandleFunc("/v1/jobs", s.wrap(s.JobsRequest))
|
2015-09-06 00:06:05 +00:00
|
|
|
s.mux.HandleFunc("/v1/job/", s.wrap(s.JobSpecificRequest))
|
|
|
|
|
2015-09-06 21:18:11 +00:00
|
|
|
s.mux.HandleFunc("/v1/nodes", s.wrap(s.NodesRequest))
|
|
|
|
s.mux.HandleFunc("/v1/node/", s.wrap(s.NodeSpecificRequest))
|
|
|
|
|
2015-09-06 22:37:21 +00:00
|
|
|
s.mux.HandleFunc("/v1/allocations", s.wrap(s.AllocsRequest))
|
|
|
|
s.mux.HandleFunc("/v1/allocation/", s.wrap(s.AllocSpecificRequest))
|
|
|
|
|
2015-09-06 23:02:53 +00:00
|
|
|
s.mux.HandleFunc("/v1/evaluations", s.wrap(s.EvalsRequest))
|
|
|
|
s.mux.HandleFunc("/v1/evaluation/", s.wrap(s.EvalSpecificRequest))
|
|
|
|
|
2017-06-29 21:50:47 +00:00
|
|
|
s.mux.HandleFunc("/v1/deployments", s.wrap(s.DeploymentsRequest))
|
|
|
|
s.mux.HandleFunc("/v1/deployment/", s.wrap(s.DeploymentSpecificRequest))
|
|
|
|
|
2017-08-08 06:02:03 +00:00
|
|
|
s.mux.HandleFunc("/v1/acl/policies", s.wrap(s.ACLPoliciesRequest))
|
|
|
|
s.mux.HandleFunc("/v1/acl/policy/", s.wrap(s.ACLPolicySpecificRequest))
|
|
|
|
|
2017-08-21 01:31:22 +00:00
|
|
|
s.mux.HandleFunc("/v1/acl/bootstrap", s.wrap(s.ACLTokenBootstrap))
|
2017-08-12 23:08:00 +00:00
|
|
|
s.mux.HandleFunc("/v1/acl/tokens", s.wrap(s.ACLTokensRequest))
|
|
|
|
s.mux.HandleFunc("/v1/acl/token", s.wrap(s.ACLTokenSpecificRequest))
|
2017-08-24 02:54:58 +00:00
|
|
|
s.mux.HandleFunc("/v1/acl/token/", s.wrap(s.ACLTokenSpecificRequest))
|
2017-08-12 23:08:00 +00:00
|
|
|
|
2016-03-07 19:26:54 +00:00
|
|
|
s.mux.HandleFunc("/v1/client/fs/", s.wrap(s.FsRequest))
|
2016-12-12 06:33:12 +00:00
|
|
|
s.mux.HandleFunc("/v1/client/gc", s.wrap(s.ClientGCRequest))
|
2017-10-19 00:32:36 +00:00
|
|
|
s.mux.Handle("/v1/client/stats", wrapCORS(s.wrap(s.ClientStatsRequest)))
|
|
|
|
s.mux.Handle("/v1/client/allocation/", wrapCORS(s.wrap(s.ClientAllocRequest)))
|
2016-01-12 23:03:53 +00:00
|
|
|
|
2015-09-07 02:08:05 +00:00
|
|
|
s.mux.HandleFunc("/v1/agent/self", s.wrap(s.AgentSelfRequest))
|
|
|
|
s.mux.HandleFunc("/v1/agent/join", s.wrap(s.AgentJoinRequest))
|
|
|
|
s.mux.HandleFunc("/v1/agent/members", s.wrap(s.AgentMembersRequest))
|
|
|
|
s.mux.HandleFunc("/v1/agent/force-leave", s.wrap(s.AgentForceLeaveRequest))
|
2015-09-25 03:39:03 +00:00
|
|
|
s.mux.HandleFunc("/v1/agent/servers", s.wrap(s.AgentServersRequest))
|
2016-10-17 17:48:04 +00:00
|
|
|
s.mux.HandleFunc("/v1/agent/keyring/", s.wrap(s.KeyringOperationRequest))
|
2017-10-13 22:37:44 +00:00
|
|
|
s.mux.HandleFunc("/v1/agent/health", s.wrap(s.HealthRequest))
|
2015-09-07 02:08:05 +00:00
|
|
|
|
2017-09-04 03:50:05 +00:00
|
|
|
s.mux.HandleFunc("/v1/metrics", s.wrap(s.MetricsRequest))
|
|
|
|
|
2017-02-06 19:48:28 +00:00
|
|
|
s.mux.HandleFunc("/v1/validate/job", s.wrap(s.ValidateJobRequest))
|
|
|
|
|
2015-11-24 06:22:48 +00:00
|
|
|
s.mux.HandleFunc("/v1/regions", s.wrap(s.RegionListRequest))
|
2015-11-24 05:47:11 +00:00
|
|
|
|
2015-09-07 01:39:03 +00:00
|
|
|
s.mux.HandleFunc("/v1/status/leader", s.wrap(s.StatusLeaderRequest))
|
|
|
|
s.mux.HandleFunc("/v1/status/peers", s.wrap(s.StatusPeersRequest))
|
2017-02-10 01:58:20 +00:00
|
|
|
|
2017-08-14 17:35:13 +00:00
|
|
|
s.mux.HandleFunc("/v1/search", s.wrap(s.SearchRequest))
|
|
|
|
|
2017-02-10 01:58:20 +00:00
|
|
|
s.mux.HandleFunc("/v1/operator/", s.wrap(s.OperatorRequest))
|
2015-09-07 01:39:03 +00:00
|
|
|
|
2016-02-20 23:50:41 +00:00
|
|
|
s.mux.HandleFunc("/v1/system/gc", s.wrap(s.GarbageCollectRequest))
|
2016-08-04 01:08:37 +00:00
|
|
|
s.mux.HandleFunc("/v1/system/reconcile/summaries", s.wrap(s.ReconcileJobSummaries))
|
2016-02-20 23:50:41 +00:00
|
|
|
|
2017-09-19 14:47:10 +00:00
|
|
|
if uiEnabled {
|
|
|
|
s.mux.Handle("/ui/", http.StripPrefix("/ui/", handleUI(http.FileServer(&UIAssetWrapper{FileSystem: assetFS()}))))
|
|
|
|
} else {
|
|
|
|
// Write the stubHTML
|
|
|
|
s.mux.HandleFunc("/ui/", func(w http.ResponseWriter, r *http.Request) {
|
|
|
|
w.Write([]byte(stubHTML))
|
|
|
|
})
|
|
|
|
}
|
|
|
|
s.mux.Handle("/", handleRootRedirect())
|
|
|
|
|
2015-08-24 00:50:33 +00:00
|
|
|
if enableDebug {
|
|
|
|
s.mux.HandleFunc("/debug/pprof/", pprof.Index)
|
|
|
|
s.mux.HandleFunc("/debug/pprof/cmdline", pprof.Cmdline)
|
|
|
|
s.mux.HandleFunc("/debug/pprof/profile", pprof.Profile)
|
|
|
|
s.mux.HandleFunc("/debug/pprof/symbol", pprof.Symbol)
|
2017-05-01 18:09:08 +00:00
|
|
|
s.mux.HandleFunc("/debug/pprof/trace", pprof.Trace)
|
2015-08-24 00:50:33 +00:00
|
|
|
}
|
2017-09-07 23:56:15 +00:00
|
|
|
|
|
|
|
// Register enterprise endpoints.
|
|
|
|
s.registerEnterpriseHandlers()
|
2015-08-24 00:50:33 +00:00
|
|
|
}
|
2015-09-06 00:06:05 +00:00
|
|
|
|
|
|
|
// HTTPCodedError is used to provide the HTTP error code
|
|
|
|
type HTTPCodedError interface {
|
|
|
|
error
|
|
|
|
Code() int
|
|
|
|
}
|
|
|
|
|
2017-09-19 14:47:10 +00:00
|
|
|
type UIAssetWrapper struct {
|
|
|
|
FileSystem *assetfs.AssetFS
|
|
|
|
}
|
|
|
|
|
|
|
|
func (fs *UIAssetWrapper) Open(name string) (http.File, error) {
|
|
|
|
if file, err := fs.FileSystem.Open(name); err == nil {
|
|
|
|
return file, nil
|
|
|
|
} else {
|
|
|
|
// serve index.html instead of 404ing
|
|
|
|
if err == os.ErrNotExist {
|
|
|
|
return fs.FileSystem.Open("index.html")
|
|
|
|
}
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-09-06 00:06:05 +00:00
|
|
|
func CodedError(c int, s string) HTTPCodedError {
|
|
|
|
return &codedError{s, c}
|
|
|
|
}
|
|
|
|
|
|
|
|
type codedError struct {
|
|
|
|
s string
|
|
|
|
code int
|
|
|
|
}
|
|
|
|
|
|
|
|
func (e *codedError) Error() string {
|
|
|
|
return e.s
|
|
|
|
}
|
|
|
|
|
|
|
|
func (e *codedError) Code() int {
|
|
|
|
return e.code
|
|
|
|
}
|
|
|
|
|
2017-09-19 14:47:10 +00:00
|
|
|
func handleUI(h http.Handler) http.Handler {
|
|
|
|
return http.HandlerFunc(func(w http.ResponseWriter, req *http.Request) {
|
|
|
|
header := w.Header()
|
|
|
|
header.Add("Content-Security-Policy", "default-src 'none'; connect-src 'self'; img-src 'self' data:; script-src 'self'; style-src 'self' 'unsafe-inline'; form-action 'none'; frame-ancestors 'none'")
|
|
|
|
h.ServeHTTP(w, req)
|
|
|
|
return
|
|
|
|
})
|
|
|
|
}
|
|
|
|
|
|
|
|
func handleRootRedirect() http.Handler {
|
|
|
|
return http.HandlerFunc(func(w http.ResponseWriter, req *http.Request) {
|
|
|
|
http.Redirect(w, req, "/ui/", 307)
|
|
|
|
return
|
|
|
|
})
|
|
|
|
}
|
|
|
|
|
2015-09-06 00:06:05 +00:00
|
|
|
// wrap is used to wrap functions to make them more convenient
|
|
|
|
func (s *HTTPServer) wrap(handler func(resp http.ResponseWriter, req *http.Request) (interface{}, error)) func(resp http.ResponseWriter, req *http.Request) {
|
|
|
|
f := func(resp http.ResponseWriter, req *http.Request) {
|
2016-01-22 18:52:20 +00:00
|
|
|
setHeaders(resp, s.agent.config.HTTPAPIResponseHeaders)
|
2015-09-06 00:06:05 +00:00
|
|
|
// Invoke the handler
|
|
|
|
reqURL := req.URL.String()
|
|
|
|
start := time.Now()
|
|
|
|
defer func() {
|
|
|
|
s.logger.Printf("[DEBUG] http: Request %v (%v)", reqURL, time.Now().Sub(start))
|
|
|
|
}()
|
|
|
|
obj, err := handler(resp, req)
|
|
|
|
|
|
|
|
// Check for an error
|
|
|
|
HAS_ERR:
|
|
|
|
if err != nil {
|
|
|
|
s.logger.Printf("[ERR] http: Request %v, error: %v", reqURL, err)
|
|
|
|
code := 500
|
|
|
|
if http, ok := err.(HTTPCodedError); ok {
|
|
|
|
code = http.Code()
|
2017-10-12 22:39:05 +00:00
|
|
|
} else {
|
|
|
|
switch err.Error() {
|
|
|
|
case structs.ErrPermissionDenied.Error(), structs.ErrTokenNotFound.Error():
|
|
|
|
code = 403
|
|
|
|
}
|
2015-09-06 00:06:05 +00:00
|
|
|
}
|
2017-10-12 22:39:05 +00:00
|
|
|
|
2015-09-06 00:06:05 +00:00
|
|
|
resp.WriteHeader(code)
|
|
|
|
resp.Write([]byte(err.Error()))
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
prettyPrint := false
|
2016-05-11 22:46:08 +00:00
|
|
|
if v, ok := req.URL.Query()["pretty"]; ok {
|
|
|
|
if len(v) > 0 && (len(v[0]) == 0 || v[0] != "0") {
|
|
|
|
prettyPrint = true
|
|
|
|
}
|
2015-09-06 00:06:05 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Write out the JSON object
|
|
|
|
if obj != nil {
|
2016-05-18 01:05:00 +00:00
|
|
|
var buf bytes.Buffer
|
2015-09-06 00:06:05 +00:00
|
|
|
if prettyPrint {
|
2017-04-28 20:18:04 +00:00
|
|
|
enc := codec.NewEncoder(&buf, structs.JsonHandlePretty)
|
2016-05-18 01:05:00 +00:00
|
|
|
err = enc.Encode(obj)
|
2016-05-10 22:46:20 +00:00
|
|
|
if err == nil {
|
2016-05-18 01:05:00 +00:00
|
|
|
buf.Write([]byte("\n"))
|
2016-05-10 22:46:20 +00:00
|
|
|
}
|
2015-09-06 00:06:05 +00:00
|
|
|
} else {
|
2017-04-28 20:18:04 +00:00
|
|
|
enc := codec.NewEncoder(&buf, structs.JsonHandle)
|
2016-05-18 01:05:00 +00:00
|
|
|
err = enc.Encode(obj)
|
2015-09-06 00:06:05 +00:00
|
|
|
}
|
|
|
|
if err != nil {
|
|
|
|
goto HAS_ERR
|
|
|
|
}
|
|
|
|
resp.Header().Set("Content-Type", "application/json")
|
2016-05-18 01:05:00 +00:00
|
|
|
resp.Write(buf.Bytes())
|
2015-09-06 00:06:05 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
return f
|
|
|
|
}
|
|
|
|
|
|
|
|
// decodeBody is used to decode a JSON request body
|
2015-09-23 03:01:57 +00:00
|
|
|
func decodeBody(req *http.Request, out interface{}) error {
|
2015-09-06 00:06:05 +00:00
|
|
|
dec := json.NewDecoder(req.Body)
|
2015-09-23 03:01:57 +00:00
|
|
|
return dec.Decode(&out)
|
2015-09-06 00:06:05 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// setIndex is used to set the index response header
|
|
|
|
func setIndex(resp http.ResponseWriter, index uint64) {
|
|
|
|
resp.Header().Set("X-Nomad-Index", strconv.FormatUint(index, 10))
|
|
|
|
}
|
|
|
|
|
|
|
|
// setKnownLeader is used to set the known leader header
|
|
|
|
func setKnownLeader(resp http.ResponseWriter, known bool) {
|
|
|
|
s := "true"
|
|
|
|
if !known {
|
|
|
|
s = "false"
|
|
|
|
}
|
|
|
|
resp.Header().Set("X-Nomad-KnownLeader", s)
|
|
|
|
}
|
|
|
|
|
|
|
|
// setLastContact is used to set the last contact header
|
|
|
|
func setLastContact(resp http.ResponseWriter, last time.Duration) {
|
|
|
|
lastMsec := uint64(last / time.Millisecond)
|
|
|
|
resp.Header().Set("X-Nomad-LastContact", strconv.FormatUint(lastMsec, 10))
|
|
|
|
}
|
|
|
|
|
|
|
|
// setMeta is used to set the query response meta data
|
|
|
|
func setMeta(resp http.ResponseWriter, m *structs.QueryMeta) {
|
|
|
|
setIndex(resp, m.Index)
|
|
|
|
setLastContact(resp, m.LastContact)
|
|
|
|
setKnownLeader(resp, m.KnownLeader)
|
|
|
|
}
|
|
|
|
|
2016-01-22 18:52:20 +00:00
|
|
|
// setHeaders is used to set canonical response header fields
|
|
|
|
func setHeaders(resp http.ResponseWriter, headers map[string]string) {
|
|
|
|
for field, value := range headers {
|
|
|
|
resp.Header().Set(http.CanonicalHeaderKey(field), value)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-09-06 00:06:05 +00:00
|
|
|
// parseWait is used to parse the ?wait and ?index query params
|
|
|
|
// Returns true on error
|
|
|
|
func parseWait(resp http.ResponseWriter, req *http.Request, b *structs.QueryOptions) bool {
|
|
|
|
query := req.URL.Query()
|
|
|
|
if wait := query.Get("wait"); wait != "" {
|
|
|
|
dur, err := time.ParseDuration(wait)
|
|
|
|
if err != nil {
|
|
|
|
resp.WriteHeader(400)
|
|
|
|
resp.Write([]byte("Invalid wait time"))
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
b.MaxQueryTime = dur
|
|
|
|
}
|
|
|
|
if idx := query.Get("index"); idx != "" {
|
|
|
|
index, err := strconv.ParseUint(idx, 10, 64)
|
|
|
|
if err != nil {
|
|
|
|
resp.WriteHeader(400)
|
|
|
|
resp.Write([]byte("Invalid index"))
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
b.MinQueryIndex = index
|
|
|
|
}
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
|
|
|
// parseConsistency is used to parse the ?stale query params.
|
|
|
|
func parseConsistency(req *http.Request, b *structs.QueryOptions) {
|
|
|
|
query := req.URL.Query()
|
|
|
|
if _, ok := query["stale"]; ok {
|
|
|
|
b.AllowStale = true
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-12-22 22:44:33 +00:00
|
|
|
// parsePrefix is used to parse the ?prefix query param
|
|
|
|
func parsePrefix(req *http.Request, b *structs.QueryOptions) {
|
|
|
|
query := req.URL.Query()
|
|
|
|
if prefix := query.Get("prefix"); prefix != "" {
|
|
|
|
b.Prefix = prefix
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-09-06 00:06:05 +00:00
|
|
|
// parseRegion is used to parse the ?region query param
|
|
|
|
func (s *HTTPServer) parseRegion(req *http.Request, r *string) {
|
|
|
|
if other := req.URL.Query().Get("region"); other != "" {
|
|
|
|
*r = other
|
|
|
|
} else if *r == "" {
|
|
|
|
*r = s.agent.config.Region
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2017-09-07 23:56:15 +00:00
|
|
|
// parseNamespace is used to parse the ?namespace parameter
|
|
|
|
func parseNamespace(req *http.Request, n *string) {
|
|
|
|
if other := req.URL.Query().Get("namespace"); other != "" {
|
|
|
|
*n = other
|
|
|
|
} else if *n == "" {
|
|
|
|
*n = structs.DefaultNamespace
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2017-08-21 03:13:05 +00:00
|
|
|
// parseToken is used to parse the X-Nomad-Token param
|
|
|
|
func (s *HTTPServer) parseToken(req *http.Request, token *string) {
|
|
|
|
if other := req.Header.Get("X-Nomad-Token"); other != "" {
|
|
|
|
*token = other
|
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-09-06 00:06:05 +00:00
|
|
|
// parse is a convenience method for endpoints that need to parse multiple flags
|
|
|
|
func (s *HTTPServer) parse(resp http.ResponseWriter, req *http.Request, r *string, b *structs.QueryOptions) bool {
|
|
|
|
s.parseRegion(req, r)
|
2017-10-12 22:16:33 +00:00
|
|
|
s.parseToken(req, &b.AuthToken)
|
2015-09-06 00:06:05 +00:00
|
|
|
parseConsistency(req, b)
|
2015-12-22 22:44:33 +00:00
|
|
|
parsePrefix(req, b)
|
2017-09-07 23:56:15 +00:00
|
|
|
parseNamespace(req, &b.Namespace)
|
2015-09-06 00:06:05 +00:00
|
|
|
return parseWait(resp, req, b)
|
|
|
|
}
|
2017-09-07 23:56:15 +00:00
|
|
|
|
|
|
|
// parseWriteRequest is a convience method for endpoints that need to parse a
|
|
|
|
// write request.
|
|
|
|
func (s *HTTPServer) parseWriteRequest(req *http.Request, w *structs.WriteRequest) {
|
|
|
|
parseNamespace(req, &w.Namespace)
|
2017-10-12 22:16:33 +00:00
|
|
|
s.parseToken(req, &w.AuthToken)
|
2017-09-07 23:56:15 +00:00
|
|
|
s.parseRegion(req, &w.Region)
|
|
|
|
}
|
2017-10-19 00:32:36 +00:00
|
|
|
|
|
|
|
// wrapCORS wraps a HandlerFunc in allowCORS and returns a http.Handler
|
|
|
|
func wrapCORS(f func(http.ResponseWriter, *http.Request)) http.Handler {
|
|
|
|
return allowCORS.Handler(http.HandlerFunc(f))
|
|
|
|
}
|