Rainbond/api/controller/gateway.go

433 lines
12 KiB
Go

// RAINBOND, Application Management Platform
// Copyright (C) 2014-2017 Goodrain Co., Ltd.
// This program is free software: you can redistribute it and/or modify
// it under the terms of the GNU General Public License as published by
// the Free Software Foundation, either version 3 of the License, or
// (at your option) any later version. For any non-GPL usage of Rainbond,
// one or multiple Commercial Licenses authorized by Goodrain Co., Ltd.
// must be obtained first.
// This program is distributed in the hope that it will be useful,
// but WITHOUT ANY WARRANTY; without even the implied warranty of
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
// GNU General Public License for more details.
// You should have received a copy of the GNU General Public License
// along with this program. If not, see <http://www.gnu.org/licenses/>.
package controller
import (
"fmt"
"net/http"
"net/url"
"strings"
"github.com/Sirupsen/logrus"
"github.com/jinzhu/gorm"
k8svalidation "k8s.io/apimachinery/pkg/util/validation"
"github.com/goodrain/rainbond/api/handler"
"github.com/goodrain/rainbond/api/middleware"
api_model "github.com/goodrain/rainbond/api/model"
"github.com/goodrain/rainbond/cmd/api/option"
"github.com/goodrain/rainbond/mq/client"
"github.com/goodrain/rainbond/util"
httputil "github.com/goodrain/rainbond/util/http"
)
// GatewayStruct -
type GatewayStruct struct {
MQClient client.MQClient
cfg *option.Config
}
// HTTPRule is used to add, update or delete http rule which enables
// external traffic to access applications through the gateway
func (g *GatewayStruct) HTTPRule(w http.ResponseWriter, r *http.Request) {
switch r.Method {
case "POST":
g.addHTTPRule(w, r)
case "PUT":
g.updateHTTPRule(w, r)
case "DELETE":
g.deleteHTTPRule(w, r)
}
}
func validateDomain(domain string) []string {
if strings.TrimSpace(domain) == "" {
return nil
}
var errs []string
if strings.Contains(domain, "*") {
errs = k8svalidation.IsWildcardDNS1123Subdomain(domain)
} else {
errs = k8svalidation.IsDNS1123Subdomain(domain)
}
return errs
}
func (g *GatewayStruct) addHTTPRule(w http.ResponseWriter, r *http.Request) {
var req api_model.AddHTTPRuleStruct
ok := httputil.ValidatorRequestStructAndErrorResponse(r, w, &req, nil)
if !ok {
return
}
// verify request
values := url.Values{}
if req.ContainerPort == 0 {
values["container_port"] = []string{"The container_port field is required"}
}
if strings.Replace(req.CertificateID, " ", "", -1) != "" {
if req.Certificate == "" {
values["certificate"] = []string{"The certificate field is required"}
}
if req.PrivateKey == "" {
values["private_key"] = []string{"The private_key field is required"}
}
}
errs := validateDomain(req.Domain)
if errs != nil && len(errs) > 0 {
logrus.Debugf("Invalid domain: %s", strings.Join(errs, ";"))
values["domain"] = []string{"The domain field is invalid"}
}
if len(values) != 0 {
httputil.ReturnValidationError(r, w, values)
return
}
h := handler.GetGatewayHandler()
sid, err := h.AddHTTPRule(&req)
if err != nil {
httputil.ReturnError(r, w, 500, fmt.Sprintf("Unexpected error occorred while adding http rule: %v", err))
return
}
if err := handler.GetGatewayHandler().SendTask(map[string]interface{}{
"service_id": sid,
"action": "add-http-rule",
}); err != nil {
logrus.Errorf("send runtime message about gateway failure %s", err.Error())
}
httputil.ReturnSuccess(r, w, "success")
}
func (g *GatewayStruct) updateHTTPRule(w http.ResponseWriter, r *http.Request) {
var req api_model.UpdateHTTPRuleStruct
ok := httputil.ValidatorRequestStructAndErrorResponse(r, w, &req, nil)
if !ok {
return
}
// verify request
values := url.Values{}
if strings.Replace(req.CertificateID, " ", "", -1) != "" {
if req.Certificate == "" {
values["certificate"] = []string{"The certificate field is required"}
}
if req.PrivateKey == "" {
values["private_key"] = []string{"The private_key field is required"}
}
}
if len(req.RuleExtensions) > 0 {
for _, re := range req.RuleExtensions {
if re.Key == "" {
values["key"] = []string{"The key field is required"}
break
}
if re.Value == "" {
values["value"] = []string{"The value field is required"}
break
}
}
}
errs := validateDomain(req.Domain)
if errs != nil && len(errs) > 0 {
logrus.Debugf("Invalid domain: %s", strings.Join(errs, ";"))
values["domain"] = []string{"The domain field is invalid"}
}
if len(values) != 0 {
httputil.ReturnValidationError(r, w, values)
return
}
h := handler.GetGatewayHandler()
sid, err := h.UpdateHTTPRule(&req)
if err != nil {
httputil.ReturnError(r, w, 500, fmt.Sprintf("Unexpected error occorred while "+
"updating http rule: %v", err))
return
}
if err := handler.GetGatewayHandler().SendTask(map[string]interface{}{
"service_id": sid,
"action": "update-http-rule",
}); err != nil {
logrus.Errorf("send runtime message about gateway failure %s", err.Error())
}
httputil.ReturnSuccess(r, w, "success")
}
func (g *GatewayStruct) deleteHTTPRule(w http.ResponseWriter, r *http.Request) {
var req api_model.DeleteHTTPRuleStruct
ok := httputil.ValidatorRequestStructAndErrorResponse(r, w, &req, nil)
if !ok {
return
}
h := handler.GetGatewayHandler()
serviceID, err := h.DeleteHTTPRule(&req)
if err != nil {
httputil.ReturnError(r, w, 500, fmt.Sprintf("Unexpected error occorred while delete http rule: %v", err))
return
}
if err := handler.GetGatewayHandler().SendTask(map[string]interface{}{
"service_id": serviceID,
"action": "delete-http-rule",
}); err != nil {
logrus.Errorf("send runtime message about gateway failure %s", err.Error())
}
httputil.ReturnSuccess(r, w, "success")
}
// TCPRule is used to add, update or delete tcp rule which enables
// external traffic to access applications through the gateway
func (g *GatewayStruct) TCPRule(w http.ResponseWriter, r *http.Request) {
switch r.Method {
case "POST":
g.AddTCPRule(w, r)
case "PUT":
g.updateTCPRule(w, r)
case "DELETE":
g.deleteTCPRule(w, r)
}
}
// AddTCPRule adds a tcp rule
func (g *GatewayStruct) AddTCPRule(w http.ResponseWriter, r *http.Request) {
var req api_model.AddTCPRuleStruct
ok := httputil.ValidatorRequestStructAndErrorResponse(r, w, &req, nil)
if !ok {
return
}
h := handler.GetGatewayHandler()
// verify request
values := url.Values{}
if req.ContainerPort == 0 {
values["container_port"] = []string{"The container_port field is required"}
}
if req.Port == 0 {
values["port"] = []string{"The port field is required"}
} else if req.Port <= g.cfg.MinExtPort {
values["port"] = []string{fmt.Sprintf("The port field should be greater than %d", g.cfg.MinExtPort)}
} else {
// check if the port exists
if h.TCPIPPortExists(req.IP, req.Port) {
values["port"] = []string{fmt.Sprintf("The ip %s port(%v) already exists", req.IP, req.Port)}
}
}
if len(req.RuleExtensions) > 0 {
for _, re := range req.RuleExtensions {
if re.Key == "" {
values["key"] = []string{"The key field is required"}
break
}
if re.Value == "" {
values["value"] = []string{"The value field is required"}
break
}
}
}
if len(values) != 0 {
httputil.ReturnValidationError(r, w, values)
return
}
sid, err := h.AddTCPRule(&req)
if err != nil {
httputil.ReturnError(r, w, 500, fmt.Sprintf("Unexpected error occorred while "+
"adding tcp rule: %v", err))
return
}
if err := handler.GetGatewayHandler().SendTask(map[string]interface{}{
"service_id": sid,
"action": "add-tcp-rule",
}); err != nil {
logrus.Errorf("send runtime message about gateway failure %s", err.Error())
}
httputil.ReturnSuccess(r, w, "success")
}
func (g *GatewayStruct) updateTCPRule(w http.ResponseWriter, r *http.Request) {
var req api_model.UpdateTCPRuleStruct
ok := httputil.ValidatorRequestStructAndErrorResponse(r, w, &req, nil)
if !ok {
return
}
h := handler.GetGatewayHandler()
// verify reqeust
values := url.Values{}
if req.Port != 0 && req.Port <= g.cfg.MinExtPort {
values["port"] = []string{fmt.Sprintf("The port field should be greater than %d", g.cfg.MinExtPort)}
}
if len(req.RuleExtensions) > 0 {
for _, re := range req.RuleExtensions {
if re.Key == "" {
values["key"] = []string{"The key field is required"}
break
}
if re.Value == "" {
values["value"] = []string{"The value field is required"}
break
}
}
}
if len(values) != 0 {
httputil.ReturnValidationError(r, w, values)
return
}
sid, err := h.UpdateTCPRule(&req, g.cfg.MinExtPort)
if err != nil {
httputil.ReturnError(r, w, 500, fmt.Sprintf("Unexpected error occorred while "+
"updating tcp rule: %v", err))
return
}
if err := handler.GetGatewayHandler().SendTask(map[string]interface{}{
"service_id": sid,
"action": "update-tcp-rule",
}); err != nil {
logrus.Errorf("send runtime message about gateway failure %s", err.Error())
}
httputil.ReturnSuccess(r, w, "success")
}
func (g *GatewayStruct) deleteTCPRule(w http.ResponseWriter, r *http.Request) {
var req api_model.DeleteTCPRuleStruct
ok := httputil.ValidatorRequestStructAndErrorResponse(r, w, &req, nil)
if !ok {
return
}
h := handler.GetGatewayHandler()
sid, err := h.DeleteTCPRule(&req)
if err != nil {
httputil.ReturnError(r, w, 500, fmt.Sprintf("Unexpected error occorred while "+
"deleting tcp rule: %v", err))
return
}
if err := handler.GetGatewayHandler().SendTask(map[string]interface{}{
"service_id": sid,
"action": "delete-tcp-rule",
}); err != nil {
logrus.Errorf("send runtime message about gateway failure %s", err.Error())
}
httputil.ReturnSuccess(r, w, "success")
}
// GetAvailablePort returns a available port
func (g *GatewayStruct) GetAvailablePort(w http.ResponseWriter, r *http.Request) {
h := handler.GetGatewayHandler()
res, err := h.GetAvailablePort("0.0.0.0")
if err != nil {
httputil.ReturnError(r, w, 500, fmt.Sprintf("Unexpected error occorred while "+
"getting available port: %v", err))
return
}
httputil.ReturnSuccess(r, w, res)
}
// RuleConfig is used to add, update or delete rule config.
func (g *GatewayStruct) RuleConfig(w http.ResponseWriter, r *http.Request) {
var req api_model.RuleConfigReq
ok := httputil.ValidatorRequestStructAndErrorResponse(r, w, &req, nil)
if !ok {
return
}
if err := handler.GetGatewayHandler().RuleConfig(&req); err != nil {
httputil.ReturnError(r, w, 500, fmt.Sprintf("Rule id: %s; error update rule config: %v", req.RuleID, err))
return
}
sid := r.Context().Value(middleware.ContextKey("service_id")).(string)
eventID := r.Context().Value(middleware.ContextKey("event_id")).(string)
if err := handler.GetGatewayHandler().SendTask(map[string]interface{}{
"service_id": sid,
"action": "update-rule-config",
"event_id": eventID,
}); err != nil {
logrus.Errorf("send runtime message about gateway failure %s", err.Error())
httputil.ReturnError(r, w, 500, "update rule config error: "+err.Error())
return
}
httputil.ReturnSuccess(r, w, "success")
}
// Certificate -
func (g *GatewayStruct) Certificate(w http.ResponseWriter, r *http.Request) {
switch r.Method {
case "PUT":
g.updCertificate(w, r)
}
}
//updCertificate updates certificate and refresh http rules based on certificate id
func (g *GatewayStruct) updCertificate(w http.ResponseWriter, r *http.Request) {
var req api_model.UpdCertificateReq
ok := httputil.ValidatorRequestStructAndErrorResponse(r, w, &req, nil)
if !ok {
return
}
if err := handler.GetGatewayHandler().UpdCertificate(&req); err != nil {
logrus.Errorf("update certificate: %v", err)
if err == gorm.ErrRecordNotFound {
httputil.ReturnError(r, w, 404, err.Error())
return
}
httputil.ReturnError(r, w, 500, err.Error())
return
}
// list related http rules
rules, err := handler.GetGatewayHandler().ListHTTPRulesByCertID(req.CertificateID)
if err != nil {
msg := "certificate id: %s; list http rules: %v"
logrus.Errorf(msg, req.CertificateID, err)
httputil.ReturnError(r, w, 500, fmt.Sprintf(msg, req.CertificateID, err))
return
}
for _, rule := range rules {
eventID := util.NewUUID()
if err := handler.GetGatewayHandler().SendTask(map[string]interface{}{
"service_id": rule.ServiceID,
"action": "update-rule-config",
"event_id": eventID,
}); err != nil {
logrus.Warningf("send runtime message about gateway failure %v", err)
}
}
httputil.ReturnSuccess(r, w, nil)
}
//GetGatewayIPs get gateway ips
func GetGatewayIPs(w http.ResponseWriter, r *http.Request) {
ips := handler.GetGatewayHandler().GetGatewayIPs()
httputil.ReturnSuccess(r, w, ips)
}