mirror of https://github.com/hashicorp/consul
You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
257 lines
7.0 KiB
257 lines
7.0 KiB
package agent |
|
|
|
import ( |
|
"fmt" |
|
"net/http" |
|
"strings" |
|
"time" |
|
|
|
"github.com/hashicorp/consul/agent/structs" |
|
"github.com/hashicorp/consul/types" |
|
) |
|
|
|
const ( |
|
// lockDelayMinThreshold is used to convert a numeric lock |
|
// delay value from nanoseconds to seconds if it is below this |
|
// threshold. Users often send a value like 5, which they assume |
|
// is seconds, but because Go uses nanosecond granularity, ends |
|
// up being very small. If we see a value below this threshold, |
|
// we multiply by time.Second |
|
lockDelayMinThreshold = 1000 |
|
) |
|
|
|
// sessionCreateResponse is used to wrap the session ID |
|
type sessionCreateResponse struct { |
|
ID string |
|
} |
|
|
|
// SessionCreate is used to create a new session |
|
func (s *HTTPServer) SessionCreate(resp http.ResponseWriter, req *http.Request) (interface{}, error) { |
|
// Default the session to our node + serf check + release session |
|
// invalidate behavior. |
|
args := structs.SessionRequest{ |
|
Op: structs.SessionCreate, |
|
Session: structs.Session{ |
|
Node: s.agent.config.NodeName, |
|
Checks: []types.CheckID{structs.SerfCheckID}, |
|
LockDelay: 15 * time.Second, |
|
Behavior: structs.SessionKeysRelease, |
|
TTL: "", |
|
}, |
|
} |
|
s.parseDC(req, &args.Datacenter) |
|
s.parseToken(req, &args.Token) |
|
|
|
// Handle optional request body |
|
if req.ContentLength > 0 { |
|
fixup := func(raw interface{}) error { |
|
if err := FixupLockDelay(raw); err != nil { |
|
return err |
|
} |
|
if err := FixupChecks(raw, &args.Session); err != nil { |
|
return err |
|
} |
|
return nil |
|
} |
|
if err := decodeBody(req, &args.Session, fixup); err != nil { |
|
resp.WriteHeader(http.StatusBadRequest) |
|
fmt.Fprintf(resp, "Request decode failed: %v", err) |
|
return nil, nil |
|
} |
|
} |
|
|
|
// Create the session, get the ID |
|
var out string |
|
if err := s.agent.RPC("Session.Apply", &args, &out); err != nil { |
|
return nil, err |
|
} |
|
|
|
// Format the response as a JSON object |
|
return sessionCreateResponse{out}, nil |
|
} |
|
|
|
// FixupLockDelay is used to handle parsing the JSON body to session/create |
|
// and properly parsing out the lock delay duration value. |
|
func FixupLockDelay(raw interface{}) error { |
|
rawMap, ok := raw.(map[string]interface{}) |
|
if !ok { |
|
return nil |
|
} |
|
var key string |
|
for k := range rawMap { |
|
if strings.ToLower(k) == "lockdelay" { |
|
key = k |
|
break |
|
} |
|
} |
|
if key != "" { |
|
val := rawMap[key] |
|
// Convert a string value into an integer |
|
if vStr, ok := val.(string); ok { |
|
dur, err := time.ParseDuration(vStr) |
|
if err != nil { |
|
return err |
|
} |
|
if dur < lockDelayMinThreshold { |
|
dur = dur * time.Second |
|
} |
|
rawMap[key] = dur |
|
} |
|
// Convert low value integers into seconds |
|
if vNum, ok := val.(float64); ok { |
|
dur := time.Duration(vNum) |
|
if dur < lockDelayMinThreshold { |
|
dur = dur * time.Second |
|
} |
|
rawMap[key] = dur |
|
} |
|
} |
|
return nil |
|
} |
|
|
|
// FixupChecks is used to handle parsing the JSON body to default-add the Serf |
|
// health check if they didn't specify any checks, but to allow an empty list |
|
// to take out the Serf health check. This behavior broke when mapstructure was |
|
// updated after 0.9.3, likely because we have a type wrapper around the string. |
|
func FixupChecks(raw interface{}, s *structs.Session) error { |
|
rawMap, ok := raw.(map[string]interface{}) |
|
if !ok { |
|
return nil |
|
} |
|
for k := range rawMap { |
|
if strings.ToLower(k) == "checks" { |
|
// If they supplied a checks key in the JSON, then |
|
// remove the default entries and respect whatever they |
|
// specified. |
|
s.Checks = nil |
|
return nil |
|
} |
|
} |
|
return nil |
|
} |
|
|
|
// SessionDestroy is used to destroy an existing session |
|
func (s *HTTPServer) SessionDestroy(resp http.ResponseWriter, req *http.Request) (interface{}, error) { |
|
args := structs.SessionRequest{ |
|
Op: structs.SessionDestroy, |
|
} |
|
s.parseDC(req, &args.Datacenter) |
|
s.parseToken(req, &args.Token) |
|
|
|
// Pull out the session id |
|
args.Session.ID = strings.TrimPrefix(req.URL.Path, "/v1/session/destroy/") |
|
if args.Session.ID == "" { |
|
resp.WriteHeader(http.StatusBadRequest) |
|
fmt.Fprint(resp, "Missing session") |
|
return nil, nil |
|
} |
|
|
|
var out string |
|
if err := s.agent.RPC("Session.Apply", &args, &out); err != nil { |
|
return nil, err |
|
} |
|
return true, nil |
|
} |
|
|
|
// SessionRenew is used to renew the TTL on an existing TTL session |
|
func (s *HTTPServer) SessionRenew(resp http.ResponseWriter, req *http.Request) (interface{}, error) { |
|
args := structs.SessionSpecificRequest{} |
|
if done := s.parse(resp, req, &args.Datacenter, &args.QueryOptions); done { |
|
return nil, nil |
|
} |
|
|
|
// Pull out the session id |
|
args.Session = strings.TrimPrefix(req.URL.Path, "/v1/session/renew/") |
|
if args.Session == "" { |
|
resp.WriteHeader(http.StatusBadRequest) |
|
fmt.Fprint(resp, "Missing session") |
|
return nil, nil |
|
} |
|
|
|
var out structs.IndexedSessions |
|
if err := s.agent.RPC("Session.Renew", &args, &out); err != nil { |
|
return nil, err |
|
} else if out.Sessions == nil { |
|
resp.WriteHeader(http.StatusNotFound) |
|
fmt.Fprintf(resp, "Session id '%s' not found", args.Session) |
|
return nil, nil |
|
} |
|
|
|
return out.Sessions, nil |
|
} |
|
|
|
// SessionGet is used to get info for a particular session |
|
func (s *HTTPServer) SessionGet(resp http.ResponseWriter, req *http.Request) (interface{}, error) { |
|
args := structs.SessionSpecificRequest{} |
|
if done := s.parse(resp, req, &args.Datacenter, &args.QueryOptions); done { |
|
return nil, nil |
|
} |
|
|
|
// Pull out the session id |
|
args.Session = strings.TrimPrefix(req.URL.Path, "/v1/session/info/") |
|
if args.Session == "" { |
|
resp.WriteHeader(http.StatusBadRequest) |
|
fmt.Fprint(resp, "Missing session") |
|
return nil, nil |
|
} |
|
|
|
var out structs.IndexedSessions |
|
defer setMeta(resp, &out.QueryMeta) |
|
if err := s.agent.RPC("Session.Get", &args, &out); err != nil { |
|
return nil, err |
|
} |
|
|
|
// Use empty list instead of nil |
|
if out.Sessions == nil { |
|
out.Sessions = make(structs.Sessions, 0) |
|
} |
|
return out.Sessions, nil |
|
} |
|
|
|
// SessionList is used to list all the sessions |
|
func (s *HTTPServer) SessionList(resp http.ResponseWriter, req *http.Request) (interface{}, error) { |
|
args := structs.DCSpecificRequest{} |
|
if done := s.parse(resp, req, &args.Datacenter, &args.QueryOptions); done { |
|
return nil, nil |
|
} |
|
|
|
var out structs.IndexedSessions |
|
defer setMeta(resp, &out.QueryMeta) |
|
if err := s.agent.RPC("Session.List", &args, &out); err != nil { |
|
return nil, err |
|
} |
|
|
|
// Use empty list instead of nil |
|
if out.Sessions == nil { |
|
out.Sessions = make(structs.Sessions, 0) |
|
} |
|
return out.Sessions, nil |
|
} |
|
|
|
// SessionsForNode returns all the nodes belonging to a node |
|
func (s *HTTPServer) SessionsForNode(resp http.ResponseWriter, req *http.Request) (interface{}, error) { |
|
args := structs.NodeSpecificRequest{} |
|
if done := s.parse(resp, req, &args.Datacenter, &args.QueryOptions); done { |
|
return nil, nil |
|
} |
|
|
|
// Pull out the node name |
|
args.Node = strings.TrimPrefix(req.URL.Path, "/v1/session/node/") |
|
if args.Node == "" { |
|
resp.WriteHeader(http.StatusBadRequest) |
|
fmt.Fprint(resp, "Missing node name") |
|
return nil, nil |
|
} |
|
|
|
var out structs.IndexedSessions |
|
defer setMeta(resp, &out.QueryMeta) |
|
if err := s.agent.RPC("Session.NodeSessions", &args, &out); err != nil { |
|
return nil, err |
|
} |
|
|
|
// Use empty list instead of nil |
|
if out.Sessions == nil { |
|
out.Sessions = make(structs.Sessions, 0) |
|
} |
|
return out.Sessions, nil |
|
}
|
|
|