123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404 |
- // Copyright 2015 flannel authors
- //
- // Licensed under the Apache License, Version 2.0 (the "License");
- // you may not use this file except in compliance with the License.
- // You may obtain a copy of the License at
- //
- // http://www.apache.org/licenses/LICENSE-2.0
- //
- // Unless required by applicable law or agreed to in writing, software
- // distributed under the License is distributed on an "AS IS" BASIS,
- // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
- // See the License for the specific language governing permissions and
- // limitations under the License.
- package remote
- import (
- "crypto/tls"
- "encoding/json"
- "fmt"
- "net"
- "net/http"
- "net/url"
- "regexp"
- "strconv"
- "github.com/coreos/flannel/Godeps/_workspace/src/github.com/coreos/etcd/pkg/transport"
- "github.com/coreos/flannel/Godeps/_workspace/src/github.com/coreos/go-systemd/activation"
- "github.com/coreos/flannel/Godeps/_workspace/src/github.com/coreos/go-systemd/daemon"
- log "github.com/coreos/flannel/Godeps/_workspace/src/github.com/golang/glog"
- "github.com/coreos/flannel/Godeps/_workspace/src/github.com/gorilla/mux"
- "github.com/coreos/flannel/Godeps/_workspace/src/golang.org/x/net/context"
- "github.com/coreos/flannel/subnet"
- )
- type handler func(context.Context, subnet.Manager, http.ResponseWriter, *http.Request)
- func jsonResponse(w http.ResponseWriter, code int, v interface{}) {
- w.Header().Set("Content-Type", "application/json; charset=utf-8")
- w.WriteHeader(code)
- if err := json.NewEncoder(w).Encode(v); err != nil {
- log.Error("Error JSON encoding response: %v", err)
- }
- }
- // GET /{network}/config
- func handleGetNetworkConfig(ctx context.Context, sm subnet.Manager, w http.ResponseWriter, r *http.Request) {
- network := mux.Vars(r)["network"]
- if network == "_" {
- network = ""
- }
- c, err := sm.GetNetworkConfig(ctx, network)
- if err != nil {
- w.WriteHeader(http.StatusInternalServerError)
- fmt.Fprint(w, err)
- return
- }
- jsonResponse(w, http.StatusOK, c)
- }
- // POST /{network}/leases
- func handleAcquireLease(ctx context.Context, sm subnet.Manager, w http.ResponseWriter, r *http.Request) {
- network := mux.Vars(r)["network"]
- if network == "_" {
- network = ""
- }
- attrs := subnet.LeaseAttrs{}
- if err := json.NewDecoder(r.Body).Decode(&attrs); err != nil {
- w.WriteHeader(http.StatusBadRequest)
- fmt.Fprint(w, "JSON decoding error: ", err)
- return
- }
- lease, err := sm.AcquireLease(ctx, network, &attrs)
- if err != nil {
- w.WriteHeader(http.StatusInternalServerError)
- fmt.Fprint(w, err)
- return
- }
- jsonResponse(w, http.StatusOK, lease)
- }
- // PUT /{network}/{lease.network}
- func handleRenewLease(ctx context.Context, sm subnet.Manager, w http.ResponseWriter, r *http.Request) {
- network := mux.Vars(r)["network"]
- if network == "_" {
- network = ""
- }
- lease := subnet.Lease{}
- if err := json.NewDecoder(r.Body).Decode(&lease); err != nil {
- w.WriteHeader(http.StatusBadRequest)
- fmt.Fprint(w, "JSON decoding error: ", err)
- return
- }
- if err := sm.RenewLease(ctx, network, &lease); err != nil {
- w.WriteHeader(http.StatusInternalServerError)
- fmt.Fprint(w, err)
- return
- }
- jsonResponse(w, http.StatusOK, lease)
- }
- func handleRevokeLease(ctx context.Context, sm subnet.Manager, w http.ResponseWriter, r *http.Request) {
- network := mux.Vars(r)["network"]
- if network == "_" {
- network = ""
- }
- sn := subnet.ParseSubnetKey(mux.Vars(r)["subnet"])
- if sn == nil {
- w.WriteHeader(http.StatusBadRequest)
- fmt.Fprint(w, "failed to parse subnet")
- return
- }
- if err := sm.RevokeLease(ctx, network, *sn); err != nil {
- w.WriteHeader(http.StatusInternalServerError)
- fmt.Fprint(w, err)
- return
- }
- }
- func getCursor(u *url.URL) interface{} {
- vals, ok := u.Query()["next"]
- if !ok {
- return nil
- }
- return vals[0]
- }
- // GET /{network}/leases/subnet?next=cursor
- func handleWatchLease(ctx context.Context, sm subnet.Manager, w http.ResponseWriter, r *http.Request) {
- network := mux.Vars(r)["network"]
- if network == "_" {
- network = ""
- }
- sn := subnet.ParseSubnetKey(mux.Vars(r)["subnet"])
- if sn == nil {
- w.WriteHeader(http.StatusBadRequest)
- fmt.Fprint(w, "bad subnet")
- return
- }
- cursor := getCursor(r.URL)
- wr, err := sm.WatchLease(ctx, network, *sn, cursor)
- if err != nil {
- w.WriteHeader(http.StatusInternalServerError)
- fmt.Fprint(w, err)
- return
- }
- switch wr.Cursor.(type) {
- case string:
- case fmt.Stringer:
- wr.Cursor = wr.Cursor.(fmt.Stringer).String()
- default:
- w.WriteHeader(http.StatusInternalServerError)
- fmt.Fprint(w, fmt.Errorf("internal error: watch cursor is of unknown type"))
- return
- }
- jsonResponse(w, http.StatusOK, wr)
- }
- // GET /{network}/leases?next=cursor
- func handleWatchLeases(ctx context.Context, sm subnet.Manager, w http.ResponseWriter, r *http.Request) {
- network := mux.Vars(r)["network"]
- if network == "_" {
- network = ""
- }
- cursor := getCursor(r.URL)
- wr, err := sm.WatchLeases(ctx, network, cursor)
- if err != nil {
- w.WriteHeader(http.StatusInternalServerError)
- fmt.Fprint(w, err)
- return
- }
- switch wr.Cursor.(type) {
- case string:
- case fmt.Stringer:
- wr.Cursor = wr.Cursor.(fmt.Stringer).String()
- default:
- w.WriteHeader(http.StatusInternalServerError)
- fmt.Fprint(w, fmt.Errorf("internal error: watch cursor is of unknown type"))
- return
- }
- jsonResponse(w, http.StatusOK, wr)
- }
- // GET /?next=cursor watches
- // GET / retrieves all networks
- func handleNetworks(ctx context.Context, sm subnet.Manager, w http.ResponseWriter, r *http.Request) {
- cursor := getCursor(r.URL)
- wr, err := sm.WatchNetworks(ctx, cursor)
- if err != nil {
- w.WriteHeader(http.StatusInternalServerError)
- fmt.Fprint(w, err)
- return
- }
- switch wr.Cursor.(type) {
- case string:
- case fmt.Stringer:
- wr.Cursor = wr.Cursor.(fmt.Stringer).String()
- default:
- w.WriteHeader(http.StatusInternalServerError)
- fmt.Fprint(w, fmt.Errorf("internal error: watch cursor is of unknown type"))
- return
- }
- jsonResponse(w, http.StatusOK, wr)
- }
- // POST /{network}/reservations
- func handleAddReservation(ctx context.Context, sm subnet.Manager, w http.ResponseWriter, r *http.Request) {
- network := mux.Vars(r)["network"]
- if network == "_" {
- network = ""
- }
- rsv := &subnet.Reservation{}
- if err := json.NewDecoder(r.Body).Decode(rsv); err != nil {
- w.WriteHeader(http.StatusBadRequest)
- fmt.Fprint(w, "JSON decoding error: ", err)
- return
- }
- if err := sm.AddReservation(ctx, network, rsv); err != nil {
- w.WriteHeader(http.StatusInternalServerError)
- fmt.Fprint(w, fmt.Errorf("internal error: %v", err))
- return
- }
- }
- // DELETE /{network}/reservations/{subnet}
- func handleRemoveReservation(ctx context.Context, sm subnet.Manager, w http.ResponseWriter, r *http.Request) {
- network := mux.Vars(r)["network"]
- if network == "_" {
- network = ""
- }
- sn := subnet.ParseSubnetKey(mux.Vars(r)["subnet"])
- if sn == nil {
- w.WriteHeader(http.StatusBadRequest)
- fmt.Fprint(w, "bad subnet")
- return
- }
- if err := sm.RemoveReservation(ctx, network, *sn); err != nil {
- w.WriteHeader(http.StatusInternalServerError)
- fmt.Fprint(w, err)
- return
- }
- w.WriteHeader(http.StatusOK)
- }
- // GET /{network}/reservations
- func handleListReservations(ctx context.Context, sm subnet.Manager, w http.ResponseWriter, r *http.Request) {
- network := mux.Vars(r)["network"]
- if network == "_" {
- network = ""
- }
- leases, err := sm.ListReservations(ctx, network)
- if err != nil {
- w.WriteHeader(http.StatusInternalServerError)
- fmt.Fprint(w, err)
- return
- }
- jsonResponse(w, http.StatusOK, leases)
- }
- func bindHandler(h handler, ctx context.Context, sm subnet.Manager) http.HandlerFunc {
- return func(resp http.ResponseWriter, req *http.Request) {
- h(ctx, sm, resp, req)
- }
- }
- func fdListener(addr string) (net.Listener, error) {
- fdOffset := 0
- if addr != "" {
- fd, err := strconv.Atoi(addr)
- if err != nil {
- return nil, fmt.Errorf("fd index is not a number")
- }
- fdOffset = fd - 3
- }
- listeners, err := activation.Listeners(false)
- if err != nil {
- return nil, err
- }
- if fdOffset >= len(listeners) {
- return nil, fmt.Errorf("fd %v is out of range (%v)", addr, len(listeners)+3)
- }
- if listeners[fdOffset] == nil {
- return nil, fmt.Errorf("fd %v was not socket activated", addr)
- }
- return listeners[fdOffset], nil
- }
- func listener(addr, cafile, certfile, keyfile string) (net.Listener, error) {
- rex := regexp.MustCompile("(?:([a-z]+)://)?(.*)")
- groups := rex.FindStringSubmatch(addr)
- var l net.Listener
- var err error
- switch {
- case groups == nil:
- return nil, fmt.Errorf("bad listener address")
- case groups[1] == "", groups[1] == "tcp":
- if l, err = net.Listen("tcp", groups[2]); err != nil {
- return nil, err
- }
- case groups[1] == "fd":
- if l, err = fdListener(groups[2]); err != nil {
- return nil, err
- }
- default:
- return nil, fmt.Errorf("bad listener scheme")
- }
- tlsinfo := transport.TLSInfo{
- CAFile: cafile,
- CertFile: certfile,
- KeyFile: keyfile,
- }
- if !tlsinfo.Empty() {
- cfg, err := tlsinfo.ServerConfig()
- if err != nil {
- return nil, err
- }
- l = tls.NewListener(l, cfg)
- }
- return l, nil
- }
- func RunServer(ctx context.Context, sm subnet.Manager, listenAddr, cafile, certfile, keyfile string) {
- // {network} is always required a the API level but to
- // keep backward compat, special "_" network is allowed
- // that means "no network"
- r := mux.NewRouter()
- r.HandleFunc("/v1/{network}/config", bindHandler(handleGetNetworkConfig, ctx, sm)).Methods("GET")
- r.HandleFunc("/v1/{network}/leases", bindHandler(handleAcquireLease, ctx, sm)).Methods("POST")
- r.HandleFunc("/v1/{network}/leases/{subnet}", bindHandler(handleWatchLease, ctx, sm)).Methods("GET")
- r.HandleFunc("/v1/{network}/leases/{subnet}", bindHandler(handleRenewLease, ctx, sm)).Methods("PUT")
- r.HandleFunc("/v1/{network}/leases/{subnet}", bindHandler(handleRevokeLease, ctx, sm)).Methods("DELETE")
- r.HandleFunc("/v1/{network}/leases", bindHandler(handleWatchLeases, ctx, sm)).Methods("GET")
- r.HandleFunc("/v1/", bindHandler(handleNetworks, ctx, sm)).Methods("GET")
- r.HandleFunc("/v1/{network}/reservations", bindHandler(handleListReservations, ctx, sm)).Methods("GET")
- r.HandleFunc("/v1/{network}/reservations", bindHandler(handleAddReservation, ctx, sm)).Methods("POST")
- r.HandleFunc("/v1/{network}/reservations/{subnet}", bindHandler(handleRemoveReservation, ctx, sm)).Methods("DELETE")
- l, err := listener(listenAddr, cafile, certfile, keyfile)
- if err != nil {
- log.Errorf("Error listening on %v: %v", listenAddr, err)
- return
- }
- c := make(chan error, 1)
- go func() {
- c <- http.Serve(l, httpLogger(r))
- }()
- daemon.SdNotify("READY=1")
- select {
- case <-ctx.Done():
- l.Close()
- <-c
- case err := <-c:
- log.Errorf("Error serving on %v: %v", listenAddr, err)
- }
- }
|