server.go 7.1 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287
  1. // Copyright 2015 CoreOS, Inc.
  2. //
  3. // Licensed under the Apache License, Version 2.0 (the "License");
  4. // you may not use this file except in compliance with the License.
  5. // You may obtain a copy of the License at
  6. //
  7. // http://www.apache.org/licenses/LICENSE-2.0
  8. //
  9. // Unless required by applicable law or agreed to in writing, software
  10. // distributed under the License is distributed on an "AS IS" BASIS,
  11. // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  12. // See the License for the specific language governing permissions and
  13. // limitations under the License.
  14. package remote
  15. import (
  16. "crypto/tls"
  17. "encoding/json"
  18. "fmt"
  19. "net"
  20. "net/http"
  21. "net/url"
  22. "regexp"
  23. "strconv"
  24. "github.com/coreos/flannel/Godeps/_workspace/src/github.com/coreos/etcd/pkg/transport"
  25. "github.com/coreos/flannel/Godeps/_workspace/src/github.com/coreos/go-systemd/activation"
  26. log "github.com/coreos/flannel/Godeps/_workspace/src/github.com/golang/glog"
  27. "github.com/coreos/flannel/Godeps/_workspace/src/github.com/gorilla/mux"
  28. "github.com/coreos/flannel/Godeps/_workspace/src/golang.org/x/net/context"
  29. "github.com/coreos/flannel/subnet"
  30. )
  31. type handler func(context.Context, subnet.Manager, http.ResponseWriter, *http.Request)
  32. func jsonResponse(w http.ResponseWriter, code int, v interface{}) {
  33. w.Header().Set("Content-Type", "application/json; charset=utf-8")
  34. w.WriteHeader(code)
  35. if err := json.NewEncoder(w).Encode(v); err != nil {
  36. log.Error("Error JSON encoding response: %v", err)
  37. }
  38. }
  39. // GET /{network}/config
  40. func handleGetNetworkConfig(ctx context.Context, sm subnet.Manager, w http.ResponseWriter, r *http.Request) {
  41. defer r.Body.Close()
  42. network := mux.Vars(r)["network"]
  43. if network == "_" {
  44. network = ""
  45. }
  46. c, err := sm.GetNetworkConfig(ctx, network)
  47. if err != nil {
  48. w.WriteHeader(http.StatusInternalServerError)
  49. fmt.Fprint(w, err)
  50. return
  51. }
  52. jsonResponse(w, http.StatusOK, c)
  53. }
  54. // POST /{network}/leases
  55. func handleAcquireLease(ctx context.Context, sm subnet.Manager, w http.ResponseWriter, r *http.Request) {
  56. defer r.Body.Close()
  57. network := mux.Vars(r)["network"]
  58. if network == "_" {
  59. network = ""
  60. }
  61. attrs := subnet.LeaseAttrs{}
  62. if err := json.NewDecoder(r.Body).Decode(&attrs); err != nil {
  63. w.WriteHeader(http.StatusBadRequest)
  64. fmt.Fprint(w, "JSON decoding error: ", err)
  65. return
  66. }
  67. lease, err := sm.AcquireLease(ctx, network, &attrs)
  68. if err != nil {
  69. w.WriteHeader(http.StatusInternalServerError)
  70. fmt.Fprint(w, err)
  71. return
  72. }
  73. jsonResponse(w, http.StatusOK, lease)
  74. }
  75. // PUT /{network}/{lease.network}
  76. func handleRenewLease(ctx context.Context, sm subnet.Manager, w http.ResponseWriter, r *http.Request) {
  77. defer r.Body.Close()
  78. network := mux.Vars(r)["network"]
  79. if network == "_" {
  80. network = ""
  81. }
  82. lease := subnet.Lease{}
  83. if err := json.NewDecoder(r.Body).Decode(&lease); err != nil {
  84. w.WriteHeader(http.StatusBadRequest)
  85. fmt.Fprint(w, "JSON decoding error: ", err)
  86. return
  87. }
  88. if err := sm.RenewLease(ctx, network, &lease); err != nil {
  89. w.WriteHeader(http.StatusInternalServerError)
  90. fmt.Fprint(w, err)
  91. return
  92. }
  93. jsonResponse(w, http.StatusOK, lease)
  94. }
  95. func getCursor(u *url.URL) interface{} {
  96. vals, ok := u.Query()["next"]
  97. if !ok {
  98. return nil
  99. }
  100. return vals[0]
  101. }
  102. // GET /{network}/leases?next=cursor
  103. func handleWatchLeases(ctx context.Context, sm subnet.Manager, w http.ResponseWriter, r *http.Request) {
  104. defer r.Body.Close()
  105. network := mux.Vars(r)["network"]
  106. if network == "_" {
  107. network = ""
  108. }
  109. cursor := getCursor(r.URL)
  110. wr, err := sm.WatchLeases(ctx, network, cursor)
  111. if err != nil {
  112. w.WriteHeader(http.StatusInternalServerError)
  113. fmt.Fprint(w, err)
  114. return
  115. }
  116. switch wr.Cursor.(type) {
  117. case string:
  118. case fmt.Stringer:
  119. wr.Cursor = wr.Cursor.(fmt.Stringer).String()
  120. default:
  121. w.WriteHeader(http.StatusInternalServerError)
  122. fmt.Fprint(w, fmt.Errorf("internal error: watch cursor is of unknown type"))
  123. return
  124. }
  125. jsonResponse(w, http.StatusOK, wr)
  126. }
  127. // GET /?next=cursor watches
  128. // GET / retrieves all networks
  129. func handleNetworks(ctx context.Context, sm subnet.Manager, w http.ResponseWriter, r *http.Request) {
  130. defer r.Body.Close()
  131. cursor := getCursor(r.URL)
  132. wr, err := sm.WatchNetworks(ctx, cursor)
  133. if err != nil {
  134. w.WriteHeader(http.StatusInternalServerError)
  135. fmt.Fprint(w, err)
  136. return
  137. }
  138. switch wr.Cursor.(type) {
  139. case string:
  140. case fmt.Stringer:
  141. wr.Cursor = wr.Cursor.(fmt.Stringer).String()
  142. default:
  143. w.WriteHeader(http.StatusInternalServerError)
  144. fmt.Fprint(w, fmt.Errorf("internal error: watch cursor is of unknown type"))
  145. return
  146. }
  147. jsonResponse(w, http.StatusOK, wr)
  148. }
  149. func bindHandler(h handler, ctx context.Context, sm subnet.Manager) http.HandlerFunc {
  150. return func(resp http.ResponseWriter, req *http.Request) {
  151. h(ctx, sm, resp, req)
  152. }
  153. }
  154. func fdListener(addr string) (net.Listener, error) {
  155. fdOffset := 0
  156. if addr != "" {
  157. fd, err := strconv.Atoi(addr)
  158. if err != nil {
  159. return nil, fmt.Errorf("fd index is not a number")
  160. }
  161. fdOffset = fd - 3
  162. }
  163. listeners, err := activation.Listeners(false)
  164. if err != nil {
  165. return nil, err
  166. }
  167. if fdOffset >= len(listeners) {
  168. return nil, fmt.Errorf("fd %v is out of range (%v)", addr, len(listeners)+3)
  169. }
  170. if listeners[fdOffset] == nil {
  171. return nil, fmt.Errorf("fd %v was not socket activated", addr)
  172. }
  173. return listeners[fdOffset], nil
  174. }
  175. func listener(addr, cafile, certfile, keyfile string) (net.Listener, error) {
  176. rex := regexp.MustCompile("(?:([a-z]+)://)?(.*)")
  177. groups := rex.FindStringSubmatch(addr)
  178. var l net.Listener
  179. var err error
  180. switch {
  181. case groups == nil:
  182. return nil, fmt.Errorf("bad listener address")
  183. case groups[1] == "", groups[1] == "tcp":
  184. if l, err = net.Listen("tcp", groups[2]); err != nil {
  185. return nil, err
  186. }
  187. case groups[1] == "fd":
  188. if l, err = fdListener(groups[2]); err != nil {
  189. return nil, err
  190. }
  191. default:
  192. return nil, fmt.Errorf("bad listener scheme")
  193. }
  194. tlsinfo := transport.TLSInfo{
  195. CAFile: cafile,
  196. CertFile: certfile,
  197. KeyFile: keyfile,
  198. }
  199. if !tlsinfo.Empty() {
  200. cfg, err := tlsinfo.ServerConfig()
  201. if err != nil {
  202. return nil, err
  203. }
  204. l = tls.NewListener(l, cfg)
  205. }
  206. return l, nil
  207. }
  208. func RunServer(ctx context.Context, sm subnet.Manager, listenAddr, cafile, certfile, keyfile string) {
  209. // {network} is always required a the API level but to
  210. // keep backward compat, special "_" network is allowed
  211. // that means "no network"
  212. r := mux.NewRouter()
  213. r.HandleFunc("/v1/{network}/config", bindHandler(handleGetNetworkConfig, ctx, sm)).Methods("GET")
  214. r.HandleFunc("/v1/{network}/leases", bindHandler(handleAcquireLease, ctx, sm)).Methods("POST")
  215. r.HandleFunc("/v1/{network}/leases/{subnet}", bindHandler(handleRenewLease, ctx, sm)).Methods("PUT")
  216. r.HandleFunc("/v1/{network}/leases", bindHandler(handleWatchLeases, ctx, sm)).Methods("GET")
  217. r.HandleFunc("/v1/", bindHandler(handleNetworks, ctx, sm)).Methods("GET")
  218. l, err := listener(listenAddr, cafile, certfile, keyfile)
  219. if err != nil {
  220. log.Errorf("Error listening on %v: %v", listenAddr, err)
  221. return
  222. }
  223. c := make(chan error, 1)
  224. go func() {
  225. c <- http.Serve(l, httpLogger(r))
  226. }()
  227. select {
  228. case <-ctx.Done():
  229. l.Close()
  230. <-c
  231. case err := <-c:
  232. log.Errorf("Error serving on %v: %v", listenAddr, err)
  233. }
  234. }