2015-02-22 03:09:46 +01:00
|
|
|
package remote
|
|
|
|
|
|
|
|
import (
|
|
|
|
"bytes"
|
|
|
|
"crypto/md5"
|
2015-06-04 02:23:45 +02:00
|
|
|
"crypto/tls"
|
2015-02-22 03:09:46 +01:00
|
|
|
"encoding/base64"
|
|
|
|
"fmt"
|
|
|
|
"io"
|
|
|
|
"net/http"
|
|
|
|
"net/url"
|
2015-06-04 02:09:02 +02:00
|
|
|
"strconv"
|
2015-02-22 03:09:46 +01:00
|
|
|
)
|
|
|
|
|
|
|
|
func httpFactory(conf map[string]string) (Client, error) {
|
|
|
|
address, ok := conf["address"]
|
|
|
|
if !ok {
|
|
|
|
return nil, fmt.Errorf("missing 'address' configuration")
|
|
|
|
}
|
|
|
|
|
|
|
|
url, err := url.Parse(address)
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("failed to parse HTTP URL: %s", err)
|
|
|
|
}
|
|
|
|
if url.Scheme != "http" && url.Scheme != "https" {
|
|
|
|
return nil, fmt.Errorf("address must be HTTP or HTTPS")
|
|
|
|
}
|
|
|
|
|
2015-06-04 02:09:02 +02:00
|
|
|
skip_cert_verification := false
|
|
|
|
skip_cert_config_string, ok := conf["skip_cert_verification"]
|
|
|
|
if !ok {
|
|
|
|
// config wasn't specified
|
|
|
|
// use the default - check cert validity
|
|
|
|
} else {
|
|
|
|
skip_cert_verification, err = strconv.ParseBool(skip_cert_config_string)
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("skip_cert_verification must be boolean (true/false)")
|
|
|
|
}
|
|
|
|
// skip_cert_verification should now be set to true or false
|
|
|
|
}
|
|
|
|
|
2015-02-22 03:09:46 +01:00
|
|
|
return &HTTPClient{
|
2015-06-04 02:23:45 +02:00
|
|
|
URL: url,
|
2015-06-04 02:09:02 +02:00
|
|
|
skipCertVerify: skip_cert_verification,
|
2015-02-22 03:09:46 +01:00
|
|
|
}, nil
|
|
|
|
}
|
|
|
|
|
2015-06-04 02:09:02 +02:00
|
|
|
// HTTPClient is a remote client that stores data in Consul or HTTP REST.
|
2015-02-22 03:09:46 +01:00
|
|
|
type HTTPClient struct {
|
2015-06-04 02:23:45 +02:00
|
|
|
URL *url.URL
|
2015-06-04 02:09:02 +02:00
|
|
|
skipCertVerify bool
|
2015-02-22 03:09:46 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
func (c *HTTPClient) Get() (*Payload, error) {
|
2015-06-04 02:09:02 +02:00
|
|
|
|
|
|
|
// Build the HTTP client
|
|
|
|
tr := &http.Transport{
|
|
|
|
TLSClientConfig: &tls.Config{InsecureSkipVerify: c.skipCertVerify},
|
|
|
|
}
|
|
|
|
|
|
|
|
client := &http.Client{Transport: tr}
|
|
|
|
|
|
|
|
resp, err := client.Get(c.URL.String())
|
2015-02-22 03:09:46 +01:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
defer resp.Body.Close()
|
|
|
|
|
|
|
|
// Handle the common status codes
|
|
|
|
switch resp.StatusCode {
|
|
|
|
case http.StatusOK:
|
|
|
|
// Handled after
|
|
|
|
case http.StatusNoContent:
|
|
|
|
return nil, nil
|
|
|
|
case http.StatusNotFound:
|
|
|
|
return nil, nil
|
|
|
|
case http.StatusUnauthorized:
|
|
|
|
return nil, fmt.Errorf("HTTP remote state endpoint requires auth")
|
|
|
|
case http.StatusForbidden:
|
|
|
|
return nil, fmt.Errorf("HTTP remote state endpoint invalid auth")
|
|
|
|
case http.StatusInternalServerError:
|
|
|
|
return nil, fmt.Errorf("HTTP remote state internal server error")
|
|
|
|
default:
|
|
|
|
return nil, fmt.Errorf("Unexpected HTTP response code %d", resp.StatusCode)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Read in the body
|
|
|
|
buf := bytes.NewBuffer(nil)
|
|
|
|
if _, err := io.Copy(buf, resp.Body); err != nil {
|
|
|
|
return nil, fmt.Errorf("Failed to read remote state: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Create the payload
|
|
|
|
payload := &Payload{
|
|
|
|
Data: buf.Bytes(),
|
|
|
|
}
|
|
|
|
|
2015-02-23 17:32:55 +01:00
|
|
|
// If there was no data, then return nil
|
|
|
|
if len(payload.Data) == 0 {
|
|
|
|
return nil, nil
|
|
|
|
}
|
|
|
|
|
2015-02-22 03:09:46 +01:00
|
|
|
// Check for the MD5
|
|
|
|
if raw := resp.Header.Get("Content-MD5"); raw != "" {
|
|
|
|
md5, err := base64.StdEncoding.DecodeString(raw)
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf(
|
|
|
|
"Failed to decode Content-MD5 '%s': %s", raw, err)
|
|
|
|
}
|
|
|
|
|
|
|
|
payload.MD5 = md5
|
|
|
|
} else {
|
|
|
|
// Generate the MD5
|
|
|
|
hash := md5.Sum(payload.Data)
|
|
|
|
payload.MD5 = hash[:]
|
|
|
|
}
|
|
|
|
|
|
|
|
return payload, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (c *HTTPClient) Put(data []byte) error {
|
|
|
|
// Copy the target URL
|
|
|
|
base := *c.URL
|
|
|
|
|
|
|
|
// Generate the MD5
|
|
|
|
hash := md5.Sum(data)
|
|
|
|
b64 := base64.StdEncoding.EncodeToString(hash[:])
|
|
|
|
|
|
|
|
/*
|
|
|
|
// Set the force query parameter if needed
|
|
|
|
if force {
|
|
|
|
values := base.Query()
|
|
|
|
values.Set("force", "true")
|
|
|
|
base.RawQuery = values.Encode()
|
|
|
|
}
|
|
|
|
*/
|
|
|
|
|
2015-06-04 02:09:02 +02:00
|
|
|
// Build the HTTP client and request
|
|
|
|
tr := &http.Transport{
|
|
|
|
TLSClientConfig: &tls.Config{InsecureSkipVerify: c.skipCertVerify},
|
|
|
|
}
|
|
|
|
|
|
|
|
client := &http.Client{Transport: tr}
|
|
|
|
|
2015-02-22 03:09:46 +01:00
|
|
|
req, err := http.NewRequest("POST", base.String(), bytes.NewReader(data))
|
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("Failed to make HTTP request: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Prepare the request
|
|
|
|
req.Header.Set("Content-Type", "application/octet-stream")
|
|
|
|
req.Header.Set("Content-MD5", b64)
|
|
|
|
req.ContentLength = int64(len(data))
|
|
|
|
|
|
|
|
// Make the request
|
2015-06-04 02:09:02 +02:00
|
|
|
resp, err := client.Do(req)
|
2015-02-22 03:09:46 +01:00
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("Failed to upload state: %v", err)
|
|
|
|
}
|
|
|
|
defer resp.Body.Close()
|
|
|
|
|
|
|
|
// Handle the error codes
|
|
|
|
switch resp.StatusCode {
|
|
|
|
case http.StatusOK:
|
|
|
|
return nil
|
|
|
|
default:
|
|
|
|
return fmt.Errorf("HTTP error: %d", resp.StatusCode)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func (c *HTTPClient) Delete() error {
|
2015-06-04 02:09:02 +02:00
|
|
|
// Build the HTTP request
|
|
|
|
tr := &http.Transport{
|
|
|
|
TLSClientConfig: &tls.Config{InsecureSkipVerify: c.skipCertVerify},
|
|
|
|
}
|
|
|
|
|
|
|
|
client := &http.Client{Transport: tr}
|
2015-02-22 03:09:46 +01:00
|
|
|
req, err := http.NewRequest("DELETE", c.URL.String(), nil)
|
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("Failed to make HTTP request: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Make the request
|
2015-06-04 02:09:02 +02:00
|
|
|
resp, err := client.Do(req)
|
2015-02-22 03:09:46 +01:00
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("Failed to delete state: %s", err)
|
|
|
|
}
|
|
|
|
defer resp.Body.Close()
|
|
|
|
|
|
|
|
// Handle the error codes
|
|
|
|
switch resp.StatusCode {
|
|
|
|
case http.StatusOK:
|
|
|
|
return nil
|
|
|
|
default:
|
|
|
|
return fmt.Errorf("HTTP error: %d", resp.StatusCode)
|
|
|
|
}
|
|
|
|
}
|