server.go 8.8 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354
  1. // Copyright 2015 flannel authors
  2. //
  3. // Licensed under the Apache License, Version 2.0 (the "License");
  4. // you may not use this file except in compliance with the License.
  5. // You may obtain a copy of the License at
  6. //
  7. // http://www.apache.org/licenses/LICENSE-2.0
  8. //
  9. // Unless required by applicable law or agreed to in writing, software
  10. // distributed under the License is distributed on an "AS IS" BASIS,
  11. // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  12. // See the License for the specific language governing permissions and
  13. // limitations under the License.
  14. package remote
  15. import (
  16. "crypto/tls"
  17. "encoding/json"
  18. "fmt"
  19. "net"
  20. "net/http"
  21. "net/url"
  22. "regexp"
  23. "strconv"
  24. "github.com/coreos/flannel/Godeps/_workspace/src/github.com/coreos/etcd/pkg/transport"
  25. "github.com/coreos/flannel/Godeps/_workspace/src/github.com/coreos/go-systemd/activation"
  26. "github.com/coreos/flannel/Godeps/_workspace/src/github.com/coreos/go-systemd/daemon"
  27. log "github.com/coreos/flannel/Godeps/_workspace/src/github.com/golang/glog"
  28. "github.com/coreos/flannel/Godeps/_workspace/src/github.com/gorilla/mux"
  29. "github.com/coreos/flannel/Godeps/_workspace/src/golang.org/x/net/context"
  30. "github.com/coreos/flannel/subnet"
  31. )
  32. type handler func(context.Context, subnet.Manager, http.ResponseWriter, *http.Request)
  33. func jsonResponse(w http.ResponseWriter, code int, v interface{}) {
  34. w.Header().Set("Content-Type", "application/json; charset=utf-8")
  35. w.WriteHeader(code)
  36. if err := json.NewEncoder(w).Encode(v); err != nil {
  37. log.Error("Error JSON encoding response: %v", err)
  38. }
  39. }
  40. // GET /{network}/config
  41. func handleGetNetworkConfig(ctx context.Context, sm subnet.Manager, w http.ResponseWriter, r *http.Request) {
  42. defer r.Body.Close()
  43. network := mux.Vars(r)["network"]
  44. if network == "_" {
  45. network = ""
  46. }
  47. c, err := sm.GetNetworkConfig(ctx, network)
  48. if err != nil {
  49. w.WriteHeader(http.StatusInternalServerError)
  50. fmt.Fprint(w, err)
  51. return
  52. }
  53. jsonResponse(w, http.StatusOK, c)
  54. }
  55. // POST /{network}/leases
  56. func handleAcquireLease(ctx context.Context, sm subnet.Manager, w http.ResponseWriter, r *http.Request) {
  57. defer r.Body.Close()
  58. network := mux.Vars(r)["network"]
  59. if network == "_" {
  60. network = ""
  61. }
  62. attrs := subnet.LeaseAttrs{}
  63. if err := json.NewDecoder(r.Body).Decode(&attrs); err != nil {
  64. w.WriteHeader(http.StatusBadRequest)
  65. fmt.Fprint(w, "JSON decoding error: ", err)
  66. return
  67. }
  68. lease, err := sm.AcquireLease(ctx, network, &attrs)
  69. if err != nil {
  70. w.WriteHeader(http.StatusInternalServerError)
  71. fmt.Fprint(w, err)
  72. return
  73. }
  74. jsonResponse(w, http.StatusOK, lease)
  75. }
  76. // PUT /{network}/{lease.network}
  77. func handleRenewLease(ctx context.Context, sm subnet.Manager, w http.ResponseWriter, r *http.Request) {
  78. defer r.Body.Close()
  79. network := mux.Vars(r)["network"]
  80. if network == "_" {
  81. network = ""
  82. }
  83. lease := subnet.Lease{}
  84. if err := json.NewDecoder(r.Body).Decode(&lease); err != nil {
  85. w.WriteHeader(http.StatusBadRequest)
  86. fmt.Fprint(w, "JSON decoding error: ", err)
  87. return
  88. }
  89. if err := sm.RenewLease(ctx, network, &lease); err != nil {
  90. w.WriteHeader(http.StatusInternalServerError)
  91. fmt.Fprint(w, err)
  92. return
  93. }
  94. jsonResponse(w, http.StatusOK, lease)
  95. }
  96. func handleRevokeLease(ctx context.Context, sm subnet.Manager, w http.ResponseWriter, r *http.Request) {
  97. defer r.Body.Close()
  98. network := mux.Vars(r)["network"]
  99. if network == "_" {
  100. network = ""
  101. }
  102. sn := subnet.ParseSubnetKey(mux.Vars(r)["subnet"])
  103. if sn == nil {
  104. w.WriteHeader(http.StatusBadRequest)
  105. fmt.Fprint(w, "failed to parse subnet")
  106. return
  107. }
  108. if err := sm.RevokeLease(ctx, network, *sn); err != nil {
  109. w.WriteHeader(http.StatusInternalServerError)
  110. fmt.Fprint(w, err)
  111. return
  112. }
  113. w.WriteHeader(http.StatusOK)
  114. }
  115. func getCursor(u *url.URL) interface{} {
  116. vals, ok := u.Query()["next"]
  117. if !ok {
  118. return nil
  119. }
  120. return vals[0]
  121. }
  122. // GET /{network}/leases/subnet?next=cursor
  123. func handleWatchLease(ctx context.Context, sm subnet.Manager, w http.ResponseWriter, r *http.Request) {
  124. defer r.Body.Close()
  125. network := mux.Vars(r)["network"]
  126. if network == "_" {
  127. network = ""
  128. }
  129. sn := subnet.ParseSubnetKey(mux.Vars(r)["subnet"])
  130. if sn == nil {
  131. w.WriteHeader(http.StatusBadRequest)
  132. fmt.Fprint(w, "bad subnet")
  133. return
  134. }
  135. cursor := getCursor(r.URL)
  136. wr, err := sm.WatchLease(ctx, network, *sn, cursor)
  137. if err != nil {
  138. w.WriteHeader(http.StatusInternalServerError)
  139. fmt.Fprint(w, err)
  140. return
  141. }
  142. switch wr.Cursor.(type) {
  143. case string:
  144. case fmt.Stringer:
  145. wr.Cursor = wr.Cursor.(fmt.Stringer).String()
  146. default:
  147. w.WriteHeader(http.StatusInternalServerError)
  148. fmt.Fprint(w, fmt.Errorf("internal error: watch cursor is of unknown type"))
  149. return
  150. }
  151. jsonResponse(w, http.StatusOK, wr)
  152. }
  153. // GET /{network}/leases?next=cursor
  154. func handleWatchLeases(ctx context.Context, sm subnet.Manager, w http.ResponseWriter, r *http.Request) {
  155. defer r.Body.Close()
  156. network := mux.Vars(r)["network"]
  157. if network == "_" {
  158. network = ""
  159. }
  160. cursor := getCursor(r.URL)
  161. wr, err := sm.WatchLeases(ctx, network, cursor)
  162. if err != nil {
  163. w.WriteHeader(http.StatusInternalServerError)
  164. fmt.Fprint(w, err)
  165. return
  166. }
  167. switch wr.Cursor.(type) {
  168. case string:
  169. case fmt.Stringer:
  170. wr.Cursor = wr.Cursor.(fmt.Stringer).String()
  171. default:
  172. w.WriteHeader(http.StatusInternalServerError)
  173. fmt.Fprint(w, fmt.Errorf("internal error: watch cursor is of unknown type"))
  174. return
  175. }
  176. jsonResponse(w, http.StatusOK, wr)
  177. }
  178. // GET /?next=cursor watches
  179. // GET / retrieves all networks
  180. func handleNetworks(ctx context.Context, sm subnet.Manager, w http.ResponseWriter, r *http.Request) {
  181. defer r.Body.Close()
  182. cursor := getCursor(r.URL)
  183. wr, err := sm.WatchNetworks(ctx, cursor)
  184. if err != nil {
  185. w.WriteHeader(http.StatusInternalServerError)
  186. fmt.Fprint(w, err)
  187. return
  188. }
  189. switch wr.Cursor.(type) {
  190. case string:
  191. case fmt.Stringer:
  192. wr.Cursor = wr.Cursor.(fmt.Stringer).String()
  193. default:
  194. w.WriteHeader(http.StatusInternalServerError)
  195. fmt.Fprint(w, fmt.Errorf("internal error: watch cursor is of unknown type"))
  196. return
  197. }
  198. jsonResponse(w, http.StatusOK, wr)
  199. }
  200. func bindHandler(h handler, ctx context.Context, sm subnet.Manager) http.HandlerFunc {
  201. return func(resp http.ResponseWriter, req *http.Request) {
  202. h(ctx, sm, resp, req)
  203. }
  204. }
  205. func fdListener(addr string) (net.Listener, error) {
  206. fdOffset := 0
  207. if addr != "" {
  208. fd, err := strconv.Atoi(addr)
  209. if err != nil {
  210. return nil, fmt.Errorf("fd index is not a number")
  211. }
  212. fdOffset = fd - 3
  213. }
  214. listeners, err := activation.Listeners(false)
  215. if err != nil {
  216. return nil, err
  217. }
  218. if fdOffset >= len(listeners) {
  219. return nil, fmt.Errorf("fd %v is out of range (%v)", addr, len(listeners)+3)
  220. }
  221. if listeners[fdOffset] == nil {
  222. return nil, fmt.Errorf("fd %v was not socket activated", addr)
  223. }
  224. return listeners[fdOffset], nil
  225. }
  226. func listener(addr, cafile, certfile, keyfile string) (net.Listener, error) {
  227. rex := regexp.MustCompile("(?:([a-z]+)://)?(.*)")
  228. groups := rex.FindStringSubmatch(addr)
  229. var l net.Listener
  230. var err error
  231. switch {
  232. case groups == nil:
  233. return nil, fmt.Errorf("bad listener address")
  234. case groups[1] == "", groups[1] == "tcp":
  235. if l, err = net.Listen("tcp", groups[2]); err != nil {
  236. return nil, err
  237. }
  238. case groups[1] == "fd":
  239. if l, err = fdListener(groups[2]); err != nil {
  240. return nil, err
  241. }
  242. default:
  243. return nil, fmt.Errorf("bad listener scheme")
  244. }
  245. tlsinfo := transport.TLSInfo{
  246. CAFile: cafile,
  247. CertFile: certfile,
  248. KeyFile: keyfile,
  249. }
  250. if !tlsinfo.Empty() {
  251. cfg, err := tlsinfo.ServerConfig()
  252. if err != nil {
  253. return nil, err
  254. }
  255. l = tls.NewListener(l, cfg)
  256. }
  257. return l, nil
  258. }
  259. func RunServer(ctx context.Context, sm subnet.Manager, listenAddr, cafile, certfile, keyfile string) {
  260. // {network} is always required a the API level but to
  261. // keep backward compat, special "_" network is allowed
  262. // that means "no network"
  263. r := mux.NewRouter()
  264. r.HandleFunc("/v1/{network}/config", bindHandler(handleGetNetworkConfig, ctx, sm)).Methods("GET")
  265. r.HandleFunc("/v1/{network}/leases", bindHandler(handleAcquireLease, ctx, sm)).Methods("POST")
  266. r.HandleFunc("/v1/{network}/leases/{subnet}", bindHandler(handleWatchLease, ctx, sm)).Methods("GET")
  267. r.HandleFunc("/v1/{network}/leases/{subnet}", bindHandler(handleRenewLease, ctx, sm)).Methods("PUT")
  268. r.HandleFunc("/v1/{network}/leases/{subnet}", bindHandler(handleRevokeLease, ctx, sm)).Methods("DELETE")
  269. r.HandleFunc("/v1/{network}/leases", bindHandler(handleWatchLeases, ctx, sm)).Methods("GET")
  270. r.HandleFunc("/v1/", bindHandler(handleNetworks, ctx, sm)).Methods("GET")
  271. l, err := listener(listenAddr, cafile, certfile, keyfile)
  272. if err != nil {
  273. log.Errorf("Error listening on %v: %v", listenAddr, err)
  274. return
  275. }
  276. c := make(chan error, 1)
  277. go func() {
  278. c <- http.Serve(l, httpLogger(r))
  279. }()
  280. daemon.SdNotify("READY=1")
  281. select {
  282. case <-ctx.Done():
  283. l.Close()
  284. <-c
  285. case err := <-c:
  286. log.Errorf("Error serving on %v: %v", listenAddr, err)
  287. }
  288. }