2018-03-17 02:53:21 +01:00
|
|
|
package http
|
2015-02-22 03:09:46 +01:00
|
|
|
|
|
|
|
import (
|
|
|
|
"bytes"
|
|
|
|
"crypto/md5"
|
|
|
|
"encoding/base64"
|
2017-08-13 16:39:22 +02:00
|
|
|
"encoding/json"
|
2015-02-22 03:09:46 +01:00
|
|
|
"fmt"
|
|
|
|
"io"
|
2017-08-13 16:39:22 +02:00
|
|
|
"io/ioutil"
|
2015-02-22 03:09:46 +01:00
|
|
|
"net/http"
|
|
|
|
"net/url"
|
2017-08-13 16:39:22 +02:00
|
|
|
|
2019-06-05 22:12:07 +02:00
|
|
|
"github.com/hashicorp/go-retryablehttp"
|
2017-08-13 16:39:22 +02:00
|
|
|
"github.com/hashicorp/terraform/state"
|
2018-03-17 02:53:21 +01:00
|
|
|
"github.com/hashicorp/terraform/state/remote"
|
2015-02-22 03:09:46 +01:00
|
|
|
)
|
|
|
|
|
2018-03-17 02:53:21 +01:00
|
|
|
// httpClient is a remote client that stores data in Consul or HTTP REST.
|
|
|
|
type httpClient struct {
|
2017-08-20 14:59:04 +02:00
|
|
|
// Update & Retrieve
|
|
|
|
URL *url.URL
|
|
|
|
UpdateMethod string
|
2017-08-19 19:31:47 +02:00
|
|
|
|
|
|
|
// Locking
|
|
|
|
LockURL *url.URL
|
|
|
|
LockMethod string
|
|
|
|
UnlockURL *url.URL
|
|
|
|
UnlockMethod string
|
|
|
|
|
|
|
|
// HTTP
|
2019-06-05 22:12:07 +02:00
|
|
|
Client *retryablehttp.Client
|
2017-08-19 19:31:47 +02:00
|
|
|
Username string
|
|
|
|
Password string
|
|
|
|
|
|
|
|
lockID string
|
|
|
|
jsonLockInfo []byte
|
2017-08-13 16:39:22 +02:00
|
|
|
}
|
|
|
|
|
2018-03-17 02:53:21 +01:00
|
|
|
func (c *httpClient) httpRequest(method string, url *url.URL, data *[]byte, what string) (*http.Response, error) {
|
2017-08-19 19:31:47 +02:00
|
|
|
// If we have data we need a reader
|
|
|
|
var reader io.Reader = nil
|
|
|
|
if data != nil {
|
|
|
|
reader = bytes.NewReader(*data)
|
|
|
|
}
|
2017-08-13 16:39:22 +02:00
|
|
|
|
2017-08-19 19:31:47 +02:00
|
|
|
// Create the request
|
2019-06-05 22:12:07 +02:00
|
|
|
req, err := retryablehttp.NewRequest(method, url.String(), reader)
|
2017-08-13 16:39:22 +02:00
|
|
|
if err != nil {
|
2017-08-19 19:31:47 +02:00
|
|
|
return nil, fmt.Errorf("Failed to make %s HTTP request: %s", what, err)
|
2017-08-13 16:39:22 +02:00
|
|
|
}
|
2017-08-19 19:31:47 +02:00
|
|
|
// Setup basic auth
|
2017-08-13 16:39:22 +02:00
|
|
|
if c.Username != "" {
|
|
|
|
req.SetBasicAuth(c.Username, c.Password)
|
|
|
|
}
|
|
|
|
|
2017-08-19 19:31:47 +02:00
|
|
|
// Work with data/body
|
|
|
|
if data != nil {
|
|
|
|
req.Header.Set("Content-Type", "application/json")
|
|
|
|
req.ContentLength = int64(len(*data))
|
|
|
|
|
|
|
|
// Generate the MD5
|
|
|
|
hash := md5.Sum(*data)
|
|
|
|
b64 := base64.StdEncoding.EncodeToString(hash[:])
|
|
|
|
req.Header.Set("Content-MD5", b64)
|
|
|
|
}
|
|
|
|
|
2017-08-13 16:39:22 +02:00
|
|
|
// Make the request
|
|
|
|
resp, err := c.Client.Do(req)
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("Failed to %s: %v", what, err)
|
|
|
|
}
|
|
|
|
|
|
|
|
return resp, nil
|
|
|
|
}
|
|
|
|
|
2018-03-17 02:53:21 +01:00
|
|
|
func (c *httpClient) Lock(info *state.LockInfo) (string, error) {
|
2017-08-19 19:31:47 +02:00
|
|
|
if c.LockURL == nil {
|
2017-08-13 16:39:22 +02:00
|
|
|
return "", nil
|
|
|
|
}
|
|
|
|
c.lockID = ""
|
|
|
|
|
2017-08-19 19:31:47 +02:00
|
|
|
jsonLockInfo := info.Marshal()
|
|
|
|
resp, err := c.httpRequest(c.LockMethod, c.LockURL, &jsonLockInfo, "lock")
|
2017-08-13 16:39:22 +02:00
|
|
|
if err != nil {
|
|
|
|
return "", err
|
|
|
|
}
|
|
|
|
defer resp.Body.Close()
|
|
|
|
|
|
|
|
switch resp.StatusCode {
|
|
|
|
case http.StatusOK:
|
|
|
|
c.lockID = info.ID
|
2017-08-19 19:31:47 +02:00
|
|
|
c.jsonLockInfo = jsonLockInfo
|
2017-08-13 16:39:22 +02:00
|
|
|
return info.ID, nil
|
|
|
|
case http.StatusUnauthorized:
|
|
|
|
return "", fmt.Errorf("HTTP remote state endpoint requires auth")
|
|
|
|
case http.StatusForbidden:
|
|
|
|
return "", fmt.Errorf("HTTP remote state endpoint invalid auth")
|
2017-08-19 20:17:25 +02:00
|
|
|
case http.StatusConflict, http.StatusLocked:
|
2017-08-13 16:39:22 +02:00
|
|
|
defer resp.Body.Close()
|
|
|
|
body, err := ioutil.ReadAll(resp.Body)
|
|
|
|
if err != nil {
|
|
|
|
return "", fmt.Errorf("HTTP remote state already locked, failed to read body")
|
|
|
|
}
|
|
|
|
existing := state.LockInfo{}
|
|
|
|
err = json.Unmarshal(body, &existing)
|
|
|
|
if err != nil {
|
|
|
|
return "", fmt.Errorf("HTTP remote state already locked, failed to unmarshal body")
|
|
|
|
}
|
|
|
|
return "", fmt.Errorf("HTTP remote state already locked: ID=%s", existing.ID)
|
|
|
|
default:
|
|
|
|
return "", fmt.Errorf("Unexpected HTTP response code %d", resp.StatusCode)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-03-17 02:53:21 +01:00
|
|
|
func (c *httpClient) Unlock(id string) error {
|
2017-08-19 19:31:47 +02:00
|
|
|
if c.UnlockURL == nil {
|
2017-08-13 16:39:22 +02:00
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2017-08-19 19:31:47 +02:00
|
|
|
resp, err := c.httpRequest(c.UnlockMethod, c.UnlockURL, &c.jsonLockInfo, "unlock")
|
2017-08-13 16:39:22 +02:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
defer resp.Body.Close()
|
|
|
|
|
|
|
|
switch resp.StatusCode {
|
|
|
|
case http.StatusOK:
|
|
|
|
return nil
|
|
|
|
default:
|
|
|
|
return fmt.Errorf("Unexpected HTTP response code %d", resp.StatusCode)
|
|
|
|
}
|
2015-02-22 03:09:46 +01:00
|
|
|
}
|
|
|
|
|
2018-03-17 02:53:21 +01:00
|
|
|
func (c *httpClient) Get() (*remote.Payload, error) {
|
2017-08-19 19:31:47 +02:00
|
|
|
resp, err := c.httpRequest("GET", c.URL, nil, "get state")
|
2015-02-22 03:09:46 +01:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
defer resp.Body.Close()
|
|
|
|
|
|
|
|
// Handle the common status codes
|
|
|
|
switch resp.StatusCode {
|
|
|
|
case http.StatusOK:
|
|
|
|
// Handled after
|
|
|
|
case http.StatusNoContent:
|
|
|
|
return nil, nil
|
|
|
|
case http.StatusNotFound:
|
|
|
|
return nil, nil
|
|
|
|
case http.StatusUnauthorized:
|
|
|
|
return nil, fmt.Errorf("HTTP remote state endpoint requires auth")
|
|
|
|
case http.StatusForbidden:
|
|
|
|
return nil, fmt.Errorf("HTTP remote state endpoint invalid auth")
|
|
|
|
case http.StatusInternalServerError:
|
|
|
|
return nil, fmt.Errorf("HTTP remote state internal server error")
|
|
|
|
default:
|
|
|
|
return nil, fmt.Errorf("Unexpected HTTP response code %d", resp.StatusCode)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Read in the body
|
|
|
|
buf := bytes.NewBuffer(nil)
|
|
|
|
if _, err := io.Copy(buf, resp.Body); err != nil {
|
|
|
|
return nil, fmt.Errorf("Failed to read remote state: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Create the payload
|
2018-03-17 02:53:21 +01:00
|
|
|
payload := &remote.Payload{
|
2015-02-22 03:09:46 +01:00
|
|
|
Data: buf.Bytes(),
|
|
|
|
}
|
|
|
|
|
2015-02-23 17:32:55 +01:00
|
|
|
// If there was no data, then return nil
|
|
|
|
if len(payload.Data) == 0 {
|
|
|
|
return nil, nil
|
|
|
|
}
|
|
|
|
|
2015-02-22 03:09:46 +01:00
|
|
|
// Check for the MD5
|
|
|
|
if raw := resp.Header.Get("Content-MD5"); raw != "" {
|
|
|
|
md5, err := base64.StdEncoding.DecodeString(raw)
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf(
|
|
|
|
"Failed to decode Content-MD5 '%s': %s", raw, err)
|
|
|
|
}
|
|
|
|
|
|
|
|
payload.MD5 = md5
|
|
|
|
} else {
|
|
|
|
// Generate the MD5
|
|
|
|
hash := md5.Sum(payload.Data)
|
|
|
|
payload.MD5 = hash[:]
|
|
|
|
}
|
|
|
|
|
|
|
|
return payload, nil
|
|
|
|
}
|
|
|
|
|
2018-03-17 02:53:21 +01:00
|
|
|
func (c *httpClient) Put(data []byte) error {
|
2015-02-22 03:09:46 +01:00
|
|
|
// Copy the target URL
|
|
|
|
base := *c.URL
|
|
|
|
|
2017-08-19 19:31:47 +02:00
|
|
|
if c.lockID != "" {
|
2017-08-13 16:39:22 +02:00
|
|
|
query := base.Query()
|
2017-08-13 18:49:08 +02:00
|
|
|
query.Set("ID", c.lockID)
|
2017-08-13 16:39:22 +02:00
|
|
|
base.RawQuery = query.Encode()
|
|
|
|
}
|
2015-02-22 03:09:46 +01:00
|
|
|
|
|
|
|
/*
|
|
|
|
// Set the force query parameter if needed
|
|
|
|
if force {
|
|
|
|
values := base.Query()
|
|
|
|
values.Set("force", "true")
|
|
|
|
base.RawQuery = values.Encode()
|
|
|
|
}
|
|
|
|
*/
|
|
|
|
|
2017-08-19 19:31:47 +02:00
|
|
|
var method string = "POST"
|
2017-08-20 14:59:04 +02:00
|
|
|
if c.UpdateMethod != "" {
|
|
|
|
method = c.UpdateMethod
|
2017-08-19 19:31:47 +02:00
|
|
|
}
|
|
|
|
resp, err := c.httpRequest(method, &base, &data, "upload state")
|
2015-02-22 03:09:46 +01:00
|
|
|
if err != nil {
|
2017-08-13 16:39:22 +02:00
|
|
|
return err
|
2015-02-22 03:09:46 +01:00
|
|
|
}
|
|
|
|
defer resp.Body.Close()
|
|
|
|
|
|
|
|
// Handle the error codes
|
|
|
|
switch resp.StatusCode {
|
2018-01-11 23:09:59 +01:00
|
|
|
case http.StatusOK, http.StatusCreated, http.StatusNoContent:
|
2015-02-22 03:09:46 +01:00
|
|
|
return nil
|
|
|
|
default:
|
|
|
|
return fmt.Errorf("HTTP error: %d", resp.StatusCode)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-03-17 02:53:21 +01:00
|
|
|
func (c *httpClient) Delete() error {
|
2015-02-22 03:09:46 +01:00
|
|
|
// Make the request
|
2017-08-19 19:31:47 +02:00
|
|
|
resp, err := c.httpRequest("DELETE", c.URL, nil, "delete state")
|
2015-02-22 03:09:46 +01:00
|
|
|
if err != nil {
|
2017-08-19 19:31:47 +02:00
|
|
|
return err
|
2015-02-22 03:09:46 +01:00
|
|
|
}
|
|
|
|
defer resp.Body.Close()
|
|
|
|
|
|
|
|
// Handle the error codes
|
|
|
|
switch resp.StatusCode {
|
|
|
|
case http.StatusOK:
|
|
|
|
return nil
|
|
|
|
default:
|
|
|
|
return fmt.Errorf("HTTP error: %d", resp.StatusCode)
|
|
|
|
}
|
|
|
|
}
|