server.go 10 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404
  1. // Copyright 2015 flannel authors
  2. //
  3. // Licensed under the Apache License, Version 2.0 (the "License");
  4. // you may not use this file except in compliance with the License.
  5. // You may obtain a copy of the License at
  6. //
  7. // http://www.apache.org/licenses/LICENSE-2.0
  8. //
  9. // Unless required by applicable law or agreed to in writing, software
  10. // distributed under the License is distributed on an "AS IS" BASIS,
  11. // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  12. // See the License for the specific language governing permissions and
  13. // limitations under the License.
  14. package remote
  15. import (
  16. "crypto/tls"
  17. "encoding/json"
  18. "fmt"
  19. "net"
  20. "net/http"
  21. "net/url"
  22. "regexp"
  23. "strconv"
  24. "github.com/coreos/flannel/Godeps/_workspace/src/github.com/coreos/etcd/pkg/transport"
  25. "github.com/coreos/flannel/Godeps/_workspace/src/github.com/coreos/go-systemd/activation"
  26. "github.com/coreos/flannel/Godeps/_workspace/src/github.com/coreos/go-systemd/daemon"
  27. log "github.com/coreos/flannel/Godeps/_workspace/src/github.com/golang/glog"
  28. "github.com/coreos/flannel/Godeps/_workspace/src/github.com/gorilla/mux"
  29. "github.com/coreos/flannel/Godeps/_workspace/src/golang.org/x/net/context"
  30. "github.com/coreos/flannel/subnet"
  31. )
  32. type handler func(context.Context, subnet.Manager, http.ResponseWriter, *http.Request)
  33. func jsonResponse(w http.ResponseWriter, code int, v interface{}) {
  34. w.Header().Set("Content-Type", "application/json; charset=utf-8")
  35. w.WriteHeader(code)
  36. if err := json.NewEncoder(w).Encode(v); err != nil {
  37. log.Error("Error JSON encoding response: %v", err)
  38. }
  39. }
  40. // GET /{network}/config
  41. func handleGetNetworkConfig(ctx context.Context, sm subnet.Manager, w http.ResponseWriter, r *http.Request) {
  42. network := mux.Vars(r)["network"]
  43. if network == "_" {
  44. network = ""
  45. }
  46. c, err := sm.GetNetworkConfig(ctx, network)
  47. if err != nil {
  48. w.WriteHeader(http.StatusInternalServerError)
  49. fmt.Fprint(w, err)
  50. return
  51. }
  52. jsonResponse(w, http.StatusOK, c)
  53. }
  54. // POST /{network}/leases
  55. func handleAcquireLease(ctx context.Context, sm subnet.Manager, w http.ResponseWriter, r *http.Request) {
  56. network := mux.Vars(r)["network"]
  57. if network == "_" {
  58. network = ""
  59. }
  60. attrs := subnet.LeaseAttrs{}
  61. if err := json.NewDecoder(r.Body).Decode(&attrs); err != nil {
  62. w.WriteHeader(http.StatusBadRequest)
  63. fmt.Fprint(w, "JSON decoding error: ", err)
  64. return
  65. }
  66. lease, err := sm.AcquireLease(ctx, network, &attrs)
  67. if err != nil {
  68. w.WriteHeader(http.StatusInternalServerError)
  69. fmt.Fprint(w, err)
  70. return
  71. }
  72. jsonResponse(w, http.StatusOK, lease)
  73. }
  74. // PUT /{network}/{lease.network}
  75. func handleRenewLease(ctx context.Context, sm subnet.Manager, w http.ResponseWriter, r *http.Request) {
  76. network := mux.Vars(r)["network"]
  77. if network == "_" {
  78. network = ""
  79. }
  80. lease := subnet.Lease{}
  81. if err := json.NewDecoder(r.Body).Decode(&lease); err != nil {
  82. w.WriteHeader(http.StatusBadRequest)
  83. fmt.Fprint(w, "JSON decoding error: ", err)
  84. return
  85. }
  86. if err := sm.RenewLease(ctx, network, &lease); err != nil {
  87. w.WriteHeader(http.StatusInternalServerError)
  88. fmt.Fprint(w, err)
  89. return
  90. }
  91. jsonResponse(w, http.StatusOK, lease)
  92. }
  93. func handleRevokeLease(ctx context.Context, sm subnet.Manager, w http.ResponseWriter, r *http.Request) {
  94. network := mux.Vars(r)["network"]
  95. if network == "_" {
  96. network = ""
  97. }
  98. sn := subnet.ParseSubnetKey(mux.Vars(r)["subnet"])
  99. if sn == nil {
  100. w.WriteHeader(http.StatusBadRequest)
  101. fmt.Fprint(w, "failed to parse subnet")
  102. return
  103. }
  104. if err := sm.RevokeLease(ctx, network, *sn); err != nil {
  105. w.WriteHeader(http.StatusInternalServerError)
  106. fmt.Fprint(w, err)
  107. return
  108. }
  109. }
  110. func getCursor(u *url.URL) interface{} {
  111. vals, ok := u.Query()["next"]
  112. if !ok {
  113. return nil
  114. }
  115. return vals[0]
  116. }
  117. // GET /{network}/leases/subnet?next=cursor
  118. func handleWatchLease(ctx context.Context, sm subnet.Manager, w http.ResponseWriter, r *http.Request) {
  119. network := mux.Vars(r)["network"]
  120. if network == "_" {
  121. network = ""
  122. }
  123. sn := subnet.ParseSubnetKey(mux.Vars(r)["subnet"])
  124. if sn == nil {
  125. w.WriteHeader(http.StatusBadRequest)
  126. fmt.Fprint(w, "bad subnet")
  127. return
  128. }
  129. cursor := getCursor(r.URL)
  130. wr, err := sm.WatchLease(ctx, network, *sn, cursor)
  131. if err != nil {
  132. w.WriteHeader(http.StatusInternalServerError)
  133. fmt.Fprint(w, err)
  134. return
  135. }
  136. switch wr.Cursor.(type) {
  137. case string:
  138. case fmt.Stringer:
  139. wr.Cursor = wr.Cursor.(fmt.Stringer).String()
  140. default:
  141. w.WriteHeader(http.StatusInternalServerError)
  142. fmt.Fprint(w, fmt.Errorf("internal error: watch cursor is of unknown type"))
  143. return
  144. }
  145. jsonResponse(w, http.StatusOK, wr)
  146. }
  147. // GET /{network}/leases?next=cursor
  148. func handleWatchLeases(ctx context.Context, sm subnet.Manager, w http.ResponseWriter, r *http.Request) {
  149. network := mux.Vars(r)["network"]
  150. if network == "_" {
  151. network = ""
  152. }
  153. cursor := getCursor(r.URL)
  154. wr, err := sm.WatchLeases(ctx, network, cursor)
  155. if err != nil {
  156. w.WriteHeader(http.StatusInternalServerError)
  157. fmt.Fprint(w, err)
  158. return
  159. }
  160. switch wr.Cursor.(type) {
  161. case string:
  162. case fmt.Stringer:
  163. wr.Cursor = wr.Cursor.(fmt.Stringer).String()
  164. default:
  165. w.WriteHeader(http.StatusInternalServerError)
  166. fmt.Fprint(w, fmt.Errorf("internal error: watch cursor is of unknown type"))
  167. return
  168. }
  169. jsonResponse(w, http.StatusOK, wr)
  170. }
  171. // GET /?next=cursor watches
  172. // GET / retrieves all networks
  173. func handleNetworks(ctx context.Context, sm subnet.Manager, w http.ResponseWriter, r *http.Request) {
  174. cursor := getCursor(r.URL)
  175. wr, err := sm.WatchNetworks(ctx, cursor)
  176. if err != nil {
  177. w.WriteHeader(http.StatusInternalServerError)
  178. fmt.Fprint(w, err)
  179. return
  180. }
  181. switch wr.Cursor.(type) {
  182. case string:
  183. case fmt.Stringer:
  184. wr.Cursor = wr.Cursor.(fmt.Stringer).String()
  185. default:
  186. w.WriteHeader(http.StatusInternalServerError)
  187. fmt.Fprint(w, fmt.Errorf("internal error: watch cursor is of unknown type"))
  188. return
  189. }
  190. jsonResponse(w, http.StatusOK, wr)
  191. }
  192. // POST /{network}/reservations
  193. func handleAddReservation(ctx context.Context, sm subnet.Manager, w http.ResponseWriter, r *http.Request) {
  194. network := mux.Vars(r)["network"]
  195. if network == "_" {
  196. network = ""
  197. }
  198. rsv := &subnet.Reservation{}
  199. if err := json.NewDecoder(r.Body).Decode(rsv); err != nil {
  200. w.WriteHeader(http.StatusBadRequest)
  201. fmt.Fprint(w, "JSON decoding error: ", err)
  202. return
  203. }
  204. if err := sm.AddReservation(ctx, network, rsv); err != nil {
  205. w.WriteHeader(http.StatusInternalServerError)
  206. fmt.Fprint(w, fmt.Errorf("internal error: %v", err))
  207. return
  208. }
  209. }
  210. // DELETE /{network}/reservations/{subnet}
  211. func handleRemoveReservation(ctx context.Context, sm subnet.Manager, w http.ResponseWriter, r *http.Request) {
  212. network := mux.Vars(r)["network"]
  213. if network == "_" {
  214. network = ""
  215. }
  216. sn := subnet.ParseSubnetKey(mux.Vars(r)["subnet"])
  217. if sn == nil {
  218. w.WriteHeader(http.StatusBadRequest)
  219. fmt.Fprint(w, "bad subnet")
  220. return
  221. }
  222. if err := sm.RemoveReservation(ctx, network, *sn); err != nil {
  223. w.WriteHeader(http.StatusInternalServerError)
  224. fmt.Fprint(w, err)
  225. return
  226. }
  227. w.WriteHeader(http.StatusOK)
  228. }
  229. // GET /{network}/reservations
  230. func handleListReservations(ctx context.Context, sm subnet.Manager, w http.ResponseWriter, r *http.Request) {
  231. network := mux.Vars(r)["network"]
  232. if network == "_" {
  233. network = ""
  234. }
  235. leases, err := sm.ListReservations(ctx, network)
  236. if err != nil {
  237. w.WriteHeader(http.StatusInternalServerError)
  238. fmt.Fprint(w, err)
  239. return
  240. }
  241. jsonResponse(w, http.StatusOK, leases)
  242. }
  243. func bindHandler(h handler, ctx context.Context, sm subnet.Manager) http.HandlerFunc {
  244. return func(resp http.ResponseWriter, req *http.Request) {
  245. h(ctx, sm, resp, req)
  246. }
  247. }
  248. func fdListener(addr string) (net.Listener, error) {
  249. fdOffset := 0
  250. if addr != "" {
  251. fd, err := strconv.Atoi(addr)
  252. if err != nil {
  253. return nil, fmt.Errorf("fd index is not a number")
  254. }
  255. fdOffset = fd - 3
  256. }
  257. listeners, err := activation.Listeners(false)
  258. if err != nil {
  259. return nil, err
  260. }
  261. if fdOffset >= len(listeners) {
  262. return nil, fmt.Errorf("fd %v is out of range (%v)", addr, len(listeners)+3)
  263. }
  264. if listeners[fdOffset] == nil {
  265. return nil, fmt.Errorf("fd %v was not socket activated", addr)
  266. }
  267. return listeners[fdOffset], nil
  268. }
  269. func listener(addr, cafile, certfile, keyfile string) (net.Listener, error) {
  270. rex := regexp.MustCompile("(?:([a-z]+)://)?(.*)")
  271. groups := rex.FindStringSubmatch(addr)
  272. var l net.Listener
  273. var err error
  274. switch {
  275. case groups == nil:
  276. return nil, fmt.Errorf("bad listener address")
  277. case groups[1] == "", groups[1] == "tcp":
  278. if l, err = net.Listen("tcp", groups[2]); err != nil {
  279. return nil, err
  280. }
  281. case groups[1] == "fd":
  282. if l, err = fdListener(groups[2]); err != nil {
  283. return nil, err
  284. }
  285. default:
  286. return nil, fmt.Errorf("bad listener scheme")
  287. }
  288. tlsinfo := transport.TLSInfo{
  289. CAFile: cafile,
  290. CertFile: certfile,
  291. KeyFile: keyfile,
  292. }
  293. if !tlsinfo.Empty() {
  294. cfg, err := tlsinfo.ServerConfig()
  295. if err != nil {
  296. return nil, err
  297. }
  298. l = tls.NewListener(l, cfg)
  299. }
  300. return l, nil
  301. }
  302. func RunServer(ctx context.Context, sm subnet.Manager, listenAddr, cafile, certfile, keyfile string) {
  303. // {network} is always required a the API level but to
  304. // keep backward compat, special "_" network is allowed
  305. // that means "no network"
  306. r := mux.NewRouter()
  307. r.HandleFunc("/v1/{network}/config", bindHandler(handleGetNetworkConfig, ctx, sm)).Methods("GET")
  308. r.HandleFunc("/v1/{network}/leases", bindHandler(handleAcquireLease, ctx, sm)).Methods("POST")
  309. r.HandleFunc("/v1/{network}/leases/{subnet}", bindHandler(handleWatchLease, ctx, sm)).Methods("GET")
  310. r.HandleFunc("/v1/{network}/leases/{subnet}", bindHandler(handleRenewLease, ctx, sm)).Methods("PUT")
  311. r.HandleFunc("/v1/{network}/leases/{subnet}", bindHandler(handleRevokeLease, ctx, sm)).Methods("DELETE")
  312. r.HandleFunc("/v1/{network}/leases", bindHandler(handleWatchLeases, ctx, sm)).Methods("GET")
  313. r.HandleFunc("/v1/", bindHandler(handleNetworks, ctx, sm)).Methods("GET")
  314. r.HandleFunc("/v1/{network}/reservations", bindHandler(handleListReservations, ctx, sm)).Methods("GET")
  315. r.HandleFunc("/v1/{network}/reservations", bindHandler(handleAddReservation, ctx, sm)).Methods("POST")
  316. r.HandleFunc("/v1/{network}/reservations/{subnet}", bindHandler(handleRemoveReservation, ctx, sm)).Methods("DELETE")
  317. l, err := listener(listenAddr, cafile, certfile, keyfile)
  318. if err != nil {
  319. log.Errorf("Error listening on %v: %v", listenAddr, err)
  320. return
  321. }
  322. c := make(chan error, 1)
  323. go func() {
  324. c <- http.Serve(l, httpLogger(r))
  325. }()
  326. daemon.SdNotify("READY=1")
  327. select {
  328. case <-ctx.Done():
  329. l.Close()
  330. <-c
  331. case err := <-c:
  332. log.Errorf("Error serving on %v: %v", listenAddr, err)
  333. }
  334. }