server.go 7.2 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290
  1. // Copyright 2015 flannel authors
  2. //
  3. // Licensed under the Apache License, Version 2.0 (the "License");
  4. // you may not use this file except in compliance with the License.
  5. // You may obtain a copy of the License at
  6. //
  7. // http://www.apache.org/licenses/LICENSE-2.0
  8. //
  9. // Unless required by applicable law or agreed to in writing, software
  10. // distributed under the License is distributed on an "AS IS" BASIS,
  11. // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  12. // See the License for the specific language governing permissions and
  13. // limitations under the License.
  14. package remote
  15. import (
  16. "crypto/tls"
  17. "encoding/json"
  18. "fmt"
  19. "net"
  20. "net/http"
  21. "net/url"
  22. "regexp"
  23. "strconv"
  24. "github.com/coreos/flannel/Godeps/_workspace/src/github.com/coreos/etcd/pkg/transport"
  25. "github.com/coreos/flannel/Godeps/_workspace/src/github.com/coreos/go-systemd/activation"
  26. "github.com/coreos/flannel/Godeps/_workspace/src/github.com/coreos/go-systemd/daemon"
  27. log "github.com/coreos/flannel/Godeps/_workspace/src/github.com/golang/glog"
  28. "github.com/coreos/flannel/Godeps/_workspace/src/github.com/gorilla/mux"
  29. "github.com/coreos/flannel/Godeps/_workspace/src/golang.org/x/net/context"
  30. "github.com/coreos/flannel/subnet"
  31. )
  32. type handler func(context.Context, subnet.Manager, http.ResponseWriter, *http.Request)
  33. func jsonResponse(w http.ResponseWriter, code int, v interface{}) {
  34. w.Header().Set("Content-Type", "application/json; charset=utf-8")
  35. w.WriteHeader(code)
  36. if err := json.NewEncoder(w).Encode(v); err != nil {
  37. log.Error("Error JSON encoding response: %v", err)
  38. }
  39. }
  40. // GET /{network}/config
  41. func handleGetNetworkConfig(ctx context.Context, sm subnet.Manager, w http.ResponseWriter, r *http.Request) {
  42. defer r.Body.Close()
  43. network := mux.Vars(r)["network"]
  44. if network == "_" {
  45. network = ""
  46. }
  47. c, err := sm.GetNetworkConfig(ctx, network)
  48. if err != nil {
  49. w.WriteHeader(http.StatusInternalServerError)
  50. fmt.Fprint(w, err)
  51. return
  52. }
  53. jsonResponse(w, http.StatusOK, c)
  54. }
  55. // POST /{network}/leases
  56. func handleAcquireLease(ctx context.Context, sm subnet.Manager, w http.ResponseWriter, r *http.Request) {
  57. defer r.Body.Close()
  58. network := mux.Vars(r)["network"]
  59. if network == "_" {
  60. network = ""
  61. }
  62. attrs := subnet.LeaseAttrs{}
  63. if err := json.NewDecoder(r.Body).Decode(&attrs); err != nil {
  64. w.WriteHeader(http.StatusBadRequest)
  65. fmt.Fprint(w, "JSON decoding error: ", err)
  66. return
  67. }
  68. lease, err := sm.AcquireLease(ctx, network, &attrs)
  69. if err != nil {
  70. w.WriteHeader(http.StatusInternalServerError)
  71. fmt.Fprint(w, err)
  72. return
  73. }
  74. jsonResponse(w, http.StatusOK, lease)
  75. }
  76. // PUT /{network}/{lease.network}
  77. func handleRenewLease(ctx context.Context, sm subnet.Manager, w http.ResponseWriter, r *http.Request) {
  78. defer r.Body.Close()
  79. network := mux.Vars(r)["network"]
  80. if network == "_" {
  81. network = ""
  82. }
  83. lease := subnet.Lease{}
  84. if err := json.NewDecoder(r.Body).Decode(&lease); err != nil {
  85. w.WriteHeader(http.StatusBadRequest)
  86. fmt.Fprint(w, "JSON decoding error: ", err)
  87. return
  88. }
  89. if err := sm.RenewLease(ctx, network, &lease); err != nil {
  90. w.WriteHeader(http.StatusInternalServerError)
  91. fmt.Fprint(w, err)
  92. return
  93. }
  94. jsonResponse(w, http.StatusOK, lease)
  95. }
  96. func getCursor(u *url.URL) interface{} {
  97. vals, ok := u.Query()["next"]
  98. if !ok {
  99. return nil
  100. }
  101. return vals[0]
  102. }
  103. // GET /{network}/leases?next=cursor
  104. func handleWatchLeases(ctx context.Context, sm subnet.Manager, w http.ResponseWriter, r *http.Request) {
  105. defer r.Body.Close()
  106. network := mux.Vars(r)["network"]
  107. if network == "_" {
  108. network = ""
  109. }
  110. cursor := getCursor(r.URL)
  111. wr, err := sm.WatchLeases(ctx, network, cursor)
  112. if err != nil {
  113. w.WriteHeader(http.StatusInternalServerError)
  114. fmt.Fprint(w, err)
  115. return
  116. }
  117. switch wr.Cursor.(type) {
  118. case string:
  119. case fmt.Stringer:
  120. wr.Cursor = wr.Cursor.(fmt.Stringer).String()
  121. default:
  122. w.WriteHeader(http.StatusInternalServerError)
  123. fmt.Fprint(w, fmt.Errorf("internal error: watch cursor is of unknown type"))
  124. return
  125. }
  126. jsonResponse(w, http.StatusOK, wr)
  127. }
  128. // GET /?next=cursor watches
  129. // GET / retrieves all networks
  130. func handleNetworks(ctx context.Context, sm subnet.Manager, w http.ResponseWriter, r *http.Request) {
  131. defer r.Body.Close()
  132. cursor := getCursor(r.URL)
  133. wr, err := sm.WatchNetworks(ctx, cursor)
  134. if err != nil {
  135. w.WriteHeader(http.StatusInternalServerError)
  136. fmt.Fprint(w, err)
  137. return
  138. }
  139. switch wr.Cursor.(type) {
  140. case string:
  141. case fmt.Stringer:
  142. wr.Cursor = wr.Cursor.(fmt.Stringer).String()
  143. default:
  144. w.WriteHeader(http.StatusInternalServerError)
  145. fmt.Fprint(w, fmt.Errorf("internal error: watch cursor is of unknown type"))
  146. return
  147. }
  148. jsonResponse(w, http.StatusOK, wr)
  149. }
  150. func bindHandler(h handler, ctx context.Context, sm subnet.Manager) http.HandlerFunc {
  151. return func(resp http.ResponseWriter, req *http.Request) {
  152. h(ctx, sm, resp, req)
  153. }
  154. }
  155. func fdListener(addr string) (net.Listener, error) {
  156. fdOffset := 0
  157. if addr != "" {
  158. fd, err := strconv.Atoi(addr)
  159. if err != nil {
  160. return nil, fmt.Errorf("fd index is not a number")
  161. }
  162. fdOffset = fd - 3
  163. }
  164. listeners, err := activation.Listeners(false)
  165. if err != nil {
  166. return nil, err
  167. }
  168. if fdOffset >= len(listeners) {
  169. return nil, fmt.Errorf("fd %v is out of range (%v)", addr, len(listeners)+3)
  170. }
  171. if listeners[fdOffset] == nil {
  172. return nil, fmt.Errorf("fd %v was not socket activated", addr)
  173. }
  174. return listeners[fdOffset], nil
  175. }
  176. func listener(addr, cafile, certfile, keyfile string) (net.Listener, error) {
  177. rex := regexp.MustCompile("(?:([a-z]+)://)?(.*)")
  178. groups := rex.FindStringSubmatch(addr)
  179. var l net.Listener
  180. var err error
  181. switch {
  182. case groups == nil:
  183. return nil, fmt.Errorf("bad listener address")
  184. case groups[1] == "", groups[1] == "tcp":
  185. if l, err = net.Listen("tcp", groups[2]); err != nil {
  186. return nil, err
  187. }
  188. case groups[1] == "fd":
  189. if l, err = fdListener(groups[2]); err != nil {
  190. return nil, err
  191. }
  192. default:
  193. return nil, fmt.Errorf("bad listener scheme")
  194. }
  195. tlsinfo := transport.TLSInfo{
  196. CAFile: cafile,
  197. CertFile: certfile,
  198. KeyFile: keyfile,
  199. }
  200. if !tlsinfo.Empty() {
  201. cfg, err := tlsinfo.ServerConfig()
  202. if err != nil {
  203. return nil, err
  204. }
  205. l = tls.NewListener(l, cfg)
  206. }
  207. return l, nil
  208. }
  209. func RunServer(ctx context.Context, sm subnet.Manager, listenAddr, cafile, certfile, keyfile string) {
  210. // {network} is always required a the API level but to
  211. // keep backward compat, special "_" network is allowed
  212. // that means "no network"
  213. r := mux.NewRouter()
  214. r.HandleFunc("/v1/{network}/config", bindHandler(handleGetNetworkConfig, ctx, sm)).Methods("GET")
  215. r.HandleFunc("/v1/{network}/leases", bindHandler(handleAcquireLease, ctx, sm)).Methods("POST")
  216. r.HandleFunc("/v1/{network}/leases/{subnet}", bindHandler(handleRenewLease, ctx, sm)).Methods("PUT")
  217. r.HandleFunc("/v1/{network}/leases", bindHandler(handleWatchLeases, ctx, sm)).Methods("GET")
  218. r.HandleFunc("/v1/", bindHandler(handleNetworks, ctx, sm)).Methods("GET")
  219. l, err := listener(listenAddr, cafile, certfile, keyfile)
  220. if err != nil {
  221. log.Errorf("Error listening on %v: %v", listenAddr, err)
  222. return
  223. }
  224. c := make(chan error, 1)
  225. go func() {
  226. c <- http.Serve(l, httpLogger(r))
  227. }()
  228. daemon.SdNotify("READY=1")
  229. select {
  230. case <-ctx.Done():
  231. l.Close()
  232. <-c
  233. case err := <-c:
  234. log.Errorf("Error serving on %v: %v", listenAddr, err)
  235. }
  236. }