server.go 11 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447
  1. // Copyright 2015 flannel authors
  2. //
  3. // Licensed under the Apache License, Version 2.0 (the "License");
  4. // you may not use this file except in compliance with the License.
  5. // You may obtain a copy of the License at
  6. //
  7. // http://www.apache.org/licenses/LICENSE-2.0
  8. //
  9. // Unless required by applicable law or agreed to in writing, software
  10. // distributed under the License is distributed on an "AS IS" BASIS,
  11. // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  12. // See the License for the specific language governing permissions and
  13. // limitations under the License.
  14. package remote
  15. import (
  16. "crypto/tls"
  17. "encoding/json"
  18. "fmt"
  19. "net"
  20. "net/http"
  21. "net/url"
  22. "regexp"
  23. "strconv"
  24. "github.com/coreos/etcd/pkg/transport"
  25. "github.com/coreos/go-systemd/activation"
  26. "github.com/coreos/go-systemd/daemon"
  27. log "github.com/golang/glog"
  28. "github.com/gorilla/mux"
  29. "golang.org/x/net/context"
  30. "github.com/coreos/flannel/subnet"
  31. )
  32. type handler func(context.Context, subnet.Manager, http.ResponseWriter, *http.Request)
  33. func jsonResponse(w http.ResponseWriter, code int, v interface{}) {
  34. w.Header().Set("Content-Type", "application/json; charset=utf-8")
  35. w.WriteHeader(code)
  36. if err := json.NewEncoder(w).Encode(v); err != nil {
  37. log.Error("Error JSON encoding response: %v", err)
  38. }
  39. }
  40. // GET /{network}/config
  41. func handleGetNetworkConfig(ctx context.Context, sm subnet.Manager, w http.ResponseWriter, r *http.Request) {
  42. network := mux.Vars(r)["network"]
  43. if network == "_" {
  44. network = ""
  45. }
  46. c, err := sm.GetNetworkConfig(ctx, network)
  47. if err != nil {
  48. w.WriteHeader(http.StatusInternalServerError)
  49. fmt.Fprint(w, err)
  50. return
  51. }
  52. jsonResponse(w, http.StatusOK, c)
  53. }
  54. func handleAcquireLease(ctx context.Context, sm subnet.Manager, w http.ResponseWriter, r *http.Request) {
  55. network := mux.Vars(r)["network"]
  56. if network == "_" {
  57. network = ""
  58. }
  59. attrs := subnet.LeaseAttrs{}
  60. if err := json.NewDecoder(r.Body).Decode(&attrs); err != nil {
  61. w.WriteHeader(http.StatusBadRequest)
  62. fmt.Fprint(w, "JSON decoding error: ", err)
  63. return
  64. }
  65. lease, err := sm.AcquireLease(ctx, network, &attrs)
  66. if err != nil {
  67. w.WriteHeader(http.StatusInternalServerError)
  68. fmt.Fprint(w, err)
  69. return
  70. }
  71. jsonResponse(w, http.StatusOK, lease)
  72. }
  73. // PUT /{network}/{lease.network}
  74. func handleRenewLease(ctx context.Context, sm subnet.Manager, w http.ResponseWriter, r *http.Request) {
  75. network := mux.Vars(r)["network"]
  76. if network == "_" {
  77. network = ""
  78. }
  79. lease := subnet.Lease{}
  80. if err := json.NewDecoder(r.Body).Decode(&lease); err != nil {
  81. w.WriteHeader(http.StatusBadRequest)
  82. fmt.Fprint(w, "JSON decoding error: ", err)
  83. return
  84. }
  85. if err := sm.RenewLease(ctx, network, &lease); err != nil {
  86. w.WriteHeader(http.StatusInternalServerError)
  87. fmt.Fprint(w, err)
  88. return
  89. }
  90. jsonResponse(w, http.StatusOK, lease)
  91. }
  92. func handleRevokeLease(ctx context.Context, sm subnet.Manager, w http.ResponseWriter, r *http.Request) {
  93. network := mux.Vars(r)["network"]
  94. if network == "_" {
  95. network = ""
  96. }
  97. sn := subnet.ParseSubnetKey(mux.Vars(r)["subnet"])
  98. if sn == nil {
  99. w.WriteHeader(http.StatusBadRequest)
  100. fmt.Fprint(w, "failed to parse subnet")
  101. return
  102. }
  103. if err := sm.RevokeLease(ctx, network, *sn); err != nil {
  104. w.WriteHeader(http.StatusInternalServerError)
  105. fmt.Fprint(w, err)
  106. return
  107. }
  108. }
  109. func handleGetBackendData(ctx context.Context, sm subnet.Manager, w http.ResponseWriter, r *http.Request) {
  110. defer r.Body.Close()
  111. network := mux.Vars(r)["network"]
  112. if network == "_" {
  113. network = ""
  114. }
  115. p, err := sm.GetBackendData(ctx, network)
  116. if err != nil {
  117. w.WriteHeader(http.StatusInternalServerError)
  118. fmt.Fprint(w, err)
  119. return
  120. }
  121. jsonResponse(w, http.StatusOK, p)
  122. }
  123. func handleCreateBackendData(ctx context.Context, sm subnet.Manager, w http.ResponseWriter, r *http.Request) {
  124. defer r.Body.Close()
  125. network := mux.Vars(r)["network"]
  126. if network == "_" {
  127. network = ""
  128. }
  129. data := ""
  130. if err := json.NewDecoder(r.Body).Decode(&data); err != nil {
  131. w.WriteHeader(http.StatusBadRequest)
  132. fmt.Fprint(w, "JSON decoding error: ", err)
  133. return
  134. }
  135. if err := sm.CreateBackendData(ctx, network, data); err != nil {
  136. w.WriteHeader(http.StatusInternalServerError)
  137. fmt.Fprint(w, err)
  138. return
  139. }
  140. w.WriteHeader(http.StatusOK)
  141. }
  142. func getCursor(u *url.URL) interface{} {
  143. vals, ok := u.Query()["next"]
  144. if !ok {
  145. return nil
  146. }
  147. return vals[0]
  148. }
  149. // GET /{network}/leases/subnet?next=cursor
  150. func handleWatchLease(ctx context.Context, sm subnet.Manager, w http.ResponseWriter, r *http.Request) {
  151. network := mux.Vars(r)["network"]
  152. if network == "_" {
  153. network = ""
  154. }
  155. sn := subnet.ParseSubnetKey(mux.Vars(r)["subnet"])
  156. if sn == nil {
  157. w.WriteHeader(http.StatusBadRequest)
  158. fmt.Fprint(w, "bad subnet")
  159. return
  160. }
  161. cursor := getCursor(r.URL)
  162. wr, err := sm.WatchLease(ctx, network, *sn, cursor)
  163. if err != nil {
  164. w.WriteHeader(http.StatusInternalServerError)
  165. fmt.Fprint(w, err)
  166. return
  167. }
  168. switch wr.Cursor.(type) {
  169. case string:
  170. case fmt.Stringer:
  171. wr.Cursor = wr.Cursor.(fmt.Stringer).String()
  172. default:
  173. w.WriteHeader(http.StatusInternalServerError)
  174. fmt.Fprint(w, fmt.Errorf("internal error: watch cursor is of unknown type"))
  175. return
  176. }
  177. jsonResponse(w, http.StatusOK, wr)
  178. }
  179. // GET /{network}/leases?next=cursor
  180. func handleWatchLeases(ctx context.Context, sm subnet.Manager, w http.ResponseWriter, r *http.Request) {
  181. network := mux.Vars(r)["network"]
  182. if network == "_" {
  183. network = ""
  184. }
  185. cursor := getCursor(r.URL)
  186. wr, err := sm.WatchLeases(ctx, network, cursor)
  187. if err != nil {
  188. w.WriteHeader(http.StatusInternalServerError)
  189. fmt.Fprint(w, err)
  190. return
  191. }
  192. switch wr.Cursor.(type) {
  193. case string:
  194. case fmt.Stringer:
  195. wr.Cursor = wr.Cursor.(fmt.Stringer).String()
  196. default:
  197. w.WriteHeader(http.StatusInternalServerError)
  198. fmt.Fprint(w, fmt.Errorf("internal error: watch cursor is of unknown type"))
  199. return
  200. }
  201. jsonResponse(w, http.StatusOK, wr)
  202. }
  203. // GET /?next=cursor watches
  204. // GET / retrieves all networks
  205. func handleNetworks(ctx context.Context, sm subnet.Manager, w http.ResponseWriter, r *http.Request) {
  206. cursor := getCursor(r.URL)
  207. wr, err := sm.WatchNetworks(ctx, cursor)
  208. if err != nil {
  209. w.WriteHeader(http.StatusInternalServerError)
  210. fmt.Fprint(w, err)
  211. return
  212. }
  213. switch wr.Cursor.(type) {
  214. case string:
  215. case fmt.Stringer:
  216. wr.Cursor = wr.Cursor.(fmt.Stringer).String()
  217. default:
  218. w.WriteHeader(http.StatusInternalServerError)
  219. fmt.Fprint(w, fmt.Errorf("internal error: watch cursor is of unknown type"))
  220. return
  221. }
  222. jsonResponse(w, http.StatusOK, wr)
  223. }
  224. // POST /{network}/reservations
  225. func handleAddReservation(ctx context.Context, sm subnet.Manager, w http.ResponseWriter, r *http.Request) {
  226. network := mux.Vars(r)["network"]
  227. if network == "_" {
  228. network = ""
  229. }
  230. rsv := &subnet.Reservation{}
  231. if err := json.NewDecoder(r.Body).Decode(rsv); err != nil {
  232. w.WriteHeader(http.StatusBadRequest)
  233. fmt.Fprint(w, "JSON decoding error: ", err)
  234. return
  235. }
  236. if err := sm.AddReservation(ctx, network, rsv); err != nil {
  237. w.WriteHeader(http.StatusInternalServerError)
  238. fmt.Fprint(w, fmt.Errorf("internal error: %v", err))
  239. return
  240. }
  241. }
  242. // DELETE /{network}/reservations/{subnet}
  243. func handleRemoveReservation(ctx context.Context, sm subnet.Manager, w http.ResponseWriter, r *http.Request) {
  244. network := mux.Vars(r)["network"]
  245. if network == "_" {
  246. network = ""
  247. }
  248. sn := subnet.ParseSubnetKey(mux.Vars(r)["subnet"])
  249. if sn == nil {
  250. w.WriteHeader(http.StatusBadRequest)
  251. fmt.Fprint(w, "bad subnet")
  252. return
  253. }
  254. if err := sm.RemoveReservation(ctx, network, *sn); err != nil {
  255. w.WriteHeader(http.StatusInternalServerError)
  256. fmt.Fprint(w, err)
  257. return
  258. }
  259. w.WriteHeader(http.StatusOK)
  260. }
  261. // GET /{network}/reservations
  262. func handleListReservations(ctx context.Context, sm subnet.Manager, w http.ResponseWriter, r *http.Request) {
  263. network := mux.Vars(r)["network"]
  264. if network == "_" {
  265. network = ""
  266. }
  267. leases, err := sm.ListReservations(ctx, network)
  268. if err != nil {
  269. w.WriteHeader(http.StatusInternalServerError)
  270. fmt.Fprint(w, err)
  271. return
  272. }
  273. jsonResponse(w, http.StatusOK, leases)
  274. }
  275. func bindHandler(h handler, ctx context.Context, sm subnet.Manager) http.HandlerFunc {
  276. return func(resp http.ResponseWriter, req *http.Request) {
  277. h(ctx, sm, resp, req)
  278. }
  279. }
  280. func fdListener(addr string) (net.Listener, error) {
  281. fdOffset := 0
  282. if addr != "" {
  283. fd, err := strconv.Atoi(addr)
  284. if err != nil {
  285. return nil, fmt.Errorf("fd index is not a number")
  286. }
  287. fdOffset = fd - 3
  288. }
  289. listeners, err := activation.Listeners(false)
  290. if err != nil {
  291. return nil, err
  292. }
  293. if fdOffset >= len(listeners) {
  294. return nil, fmt.Errorf("fd %v is out of range (%v)", addr, len(listeners)+3)
  295. }
  296. if listeners[fdOffset] == nil {
  297. return nil, fmt.Errorf("fd %v was not socket activated", addr)
  298. }
  299. return listeners[fdOffset], nil
  300. }
  301. func listener(addr, cafile, certfile, keyfile string) (net.Listener, error) {
  302. rex := regexp.MustCompile("(?:([a-z]+)://)?(.*)")
  303. groups := rex.FindStringSubmatch(addr)
  304. var l net.Listener
  305. var err error
  306. switch {
  307. case groups == nil:
  308. return nil, fmt.Errorf("bad listener address")
  309. case groups[1] == "", groups[1] == "tcp":
  310. if l, err = net.Listen("tcp", groups[2]); err != nil {
  311. return nil, err
  312. }
  313. case groups[1] == "fd":
  314. if l, err = fdListener(groups[2]); err != nil {
  315. return nil, err
  316. }
  317. default:
  318. return nil, fmt.Errorf("bad listener scheme")
  319. }
  320. tlsinfo := transport.TLSInfo{
  321. CAFile: cafile,
  322. CertFile: certfile,
  323. KeyFile: keyfile,
  324. }
  325. if !tlsinfo.Empty() {
  326. cfg, err := tlsinfo.ServerConfig()
  327. if err != nil {
  328. return nil, err
  329. }
  330. l = tls.NewListener(l, cfg)
  331. }
  332. return l, nil
  333. }
  334. func RunServer(ctx context.Context, sm subnet.Manager, listenAddr, cafile, certfile, keyfile string) {
  335. // {network} is always required a the API level but to
  336. // keep backward compat, special "_" network is allowed
  337. // that means "no network"
  338. r := mux.NewRouter()
  339. r.HandleFunc("/v1/{network}/config", bindHandler(handleGetNetworkConfig, ctx, sm)).Methods("GET")
  340. r.HandleFunc("/v1/{network}/leases", bindHandler(handleAcquireLease, ctx, sm)).Methods("POST")
  341. r.HandleFunc("/v1/{network}/leases/{subnet}", bindHandler(handleWatchLease, ctx, sm)).Methods("GET")
  342. r.HandleFunc("/v1/{network}/leases/{subnet}", bindHandler(handleRenewLease, ctx, sm)).Methods("PUT")
  343. r.HandleFunc("/v1/{network}/leases/{subnet}", bindHandler(handleRevokeLease, ctx, sm)).Methods("DELETE")
  344. r.HandleFunc("/v1/{network}/leases", bindHandler(handleWatchLeases, ctx, sm)).Methods("GET")
  345. r.HandleFunc("/v1/", bindHandler(handleNetworks, ctx, sm)).Methods("GET")
  346. r.HandleFunc("/v1/{network}/backend-data", bindHandler(handleGetBackendData, ctx, sm)).Methods("GET")
  347. r.HandleFunc("/v1/{network}/backend-data", bindHandler(handleCreateBackendData, ctx, sm)).Methods("POST")
  348. r.HandleFunc("/v1/{network}/reservations", bindHandler(handleListReservations, ctx, sm)).Methods("GET")
  349. r.HandleFunc("/v1/{network}/reservations", bindHandler(handleAddReservation, ctx, sm)).Methods("POST")
  350. r.HandleFunc("/v1/{network}/reservations/{subnet}", bindHandler(handleRemoveReservation, ctx, sm)).Methods("DELETE")
  351. l, err := listener(listenAddr, cafile, certfile, keyfile)
  352. if err != nil {
  353. log.Errorf("Error listening on %v: %v", listenAddr, err)
  354. return
  355. }
  356. c := make(chan error, 1)
  357. go func() {
  358. c <- http.Serve(l, httpLogger(r))
  359. }()
  360. daemon.SdNotify("READY=1")
  361. select {
  362. case <-ctx.Done():
  363. l.Close()
  364. <-c
  365. case err := <-c:
  366. log.Errorf("Error serving on %v: %v", listenAddr, err)
  367. }
  368. }