339 lines
7.6 KiB
Go
339 lines
7.6 KiB
Go
package remote
|
|
|
|
import (
|
|
"bytes"
|
|
"crypto/md5"
|
|
"crypto/tls"
|
|
"encoding/base64"
|
|
"encoding/json"
|
|
"fmt"
|
|
"io"
|
|
"io/ioutil"
|
|
"net/http"
|
|
"net/url"
|
|
"strconv"
|
|
|
|
"github.com/hashicorp/terraform/state"
|
|
)
|
|
|
|
func httpFactory(conf map[string]string) (Client, error) {
|
|
address, ok := conf["address"]
|
|
if !ok {
|
|
return nil, fmt.Errorf("missing 'address' configuration")
|
|
}
|
|
|
|
updateURL, err := url.Parse(address)
|
|
if err != nil {
|
|
return nil, fmt.Errorf("failed to parse address URL: %s", err)
|
|
}
|
|
if updateURL.Scheme != "http" && updateURL.Scheme != "https" {
|
|
return nil, fmt.Errorf("address must be HTTP or HTTPS")
|
|
}
|
|
updateMethod, ok := conf["update_method"]
|
|
if !ok {
|
|
updateMethod = "POST"
|
|
}
|
|
|
|
var lockURL *url.URL
|
|
if lockAddress, ok := conf["lock_address"]; ok {
|
|
var err error
|
|
lockURL, err = url.Parse(lockAddress)
|
|
if err != nil {
|
|
return nil, fmt.Errorf("failed to parse lockAddress URL: %s", err)
|
|
}
|
|
if lockURL.Scheme != "http" && lockURL.Scheme != "https" {
|
|
return nil, fmt.Errorf("lockAddress must be HTTP or HTTPS")
|
|
}
|
|
} else {
|
|
lockURL = nil
|
|
}
|
|
lockMethod, ok := conf["lock_method"]
|
|
if !ok {
|
|
lockMethod = "LOCK"
|
|
}
|
|
|
|
var unlockURL *url.URL
|
|
if unlockAddress, ok := conf["unlock_address"]; ok {
|
|
var err error
|
|
unlockURL, err = url.Parse(unlockAddress)
|
|
if err != nil {
|
|
return nil, fmt.Errorf("failed to parse unlockAddress URL: %s", err)
|
|
}
|
|
if unlockURL.Scheme != "http" && unlockURL.Scheme != "https" {
|
|
return nil, fmt.Errorf("unlockAddress must be HTTP or HTTPS")
|
|
}
|
|
} else {
|
|
unlockURL = nil
|
|
}
|
|
unlockMethod, ok := conf["unlock_method"]
|
|
if !ok {
|
|
unlockMethod = "UNLOCK"
|
|
}
|
|
|
|
client := &http.Client{}
|
|
if skipRaw, ok := conf["skip_cert_verification"]; ok {
|
|
skip, err := strconv.ParseBool(skipRaw)
|
|
if err != nil {
|
|
return nil, fmt.Errorf("skip_cert_verification must be boolean")
|
|
}
|
|
if skip {
|
|
// Replace the client with one that ignores TLS verification
|
|
client = &http.Client{
|
|
Transport: &http.Transport{
|
|
TLSClientConfig: &tls.Config{
|
|
InsecureSkipVerify: true,
|
|
},
|
|
},
|
|
}
|
|
}
|
|
}
|
|
|
|
ret := &HTTPClient{
|
|
URL: updateURL,
|
|
UpdateMethod: updateMethod,
|
|
|
|
LockURL: lockURL,
|
|
LockMethod: lockMethod,
|
|
UnlockURL: unlockURL,
|
|
UnlockMethod: unlockMethod,
|
|
|
|
Username: conf["username"],
|
|
Password: conf["password"],
|
|
|
|
// accessible only for testing use
|
|
Client: client,
|
|
}
|
|
|
|
return ret, nil
|
|
}
|
|
|
|
// HTTPClient is a remote client that stores data in Consul or HTTP REST.
|
|
type HTTPClient struct {
|
|
// Update & Retrieve
|
|
URL *url.URL
|
|
UpdateMethod string
|
|
|
|
// Locking
|
|
LockURL *url.URL
|
|
LockMethod string
|
|
UnlockURL *url.URL
|
|
UnlockMethod string
|
|
|
|
// HTTP
|
|
Client *http.Client
|
|
Username string
|
|
Password string
|
|
|
|
lockID string
|
|
jsonLockInfo []byte
|
|
}
|
|
|
|
func (c *HTTPClient) httpRequest(method string, url *url.URL, data *[]byte, what string) (*http.Response, error) {
|
|
// If we have data we need a reader
|
|
var reader io.Reader = nil
|
|
if data != nil {
|
|
reader = bytes.NewReader(*data)
|
|
}
|
|
|
|
// Create the request
|
|
req, err := http.NewRequest(method, url.String(), reader)
|
|
if err != nil {
|
|
return nil, fmt.Errorf("Failed to make %s HTTP request: %s", what, err)
|
|
}
|
|
// Setup basic auth
|
|
if c.Username != "" {
|
|
req.SetBasicAuth(c.Username, c.Password)
|
|
}
|
|
|
|
// Work with data/body
|
|
if data != nil {
|
|
req.Header.Set("Content-Type", "application/json")
|
|
req.ContentLength = int64(len(*data))
|
|
|
|
// Generate the MD5
|
|
hash := md5.Sum(*data)
|
|
b64 := base64.StdEncoding.EncodeToString(hash[:])
|
|
req.Header.Set("Content-MD5", b64)
|
|
}
|
|
|
|
// Make the request
|
|
resp, err := c.Client.Do(req)
|
|
if err != nil {
|
|
return nil, fmt.Errorf("Failed to %s: %v", what, err)
|
|
}
|
|
|
|
return resp, nil
|
|
}
|
|
|
|
func (c *HTTPClient) Lock(info *state.LockInfo) (string, error) {
|
|
if c.LockURL == nil {
|
|
return "", nil
|
|
}
|
|
c.lockID = ""
|
|
|
|
jsonLockInfo := info.Marshal()
|
|
resp, err := c.httpRequest(c.LockMethod, c.LockURL, &jsonLockInfo, "lock")
|
|
if err != nil {
|
|
return "", err
|
|
}
|
|
defer resp.Body.Close()
|
|
|
|
switch resp.StatusCode {
|
|
case http.StatusOK:
|
|
c.lockID = info.ID
|
|
c.jsonLockInfo = jsonLockInfo
|
|
return info.ID, nil
|
|
case http.StatusUnauthorized:
|
|
return "", fmt.Errorf("HTTP remote state endpoint requires auth")
|
|
case http.StatusForbidden:
|
|
return "", fmt.Errorf("HTTP remote state endpoint invalid auth")
|
|
case http.StatusConflict, http.StatusLocked:
|
|
defer resp.Body.Close()
|
|
body, err := ioutil.ReadAll(resp.Body)
|
|
if err != nil {
|
|
return "", fmt.Errorf("HTTP remote state already locked, failed to read body")
|
|
}
|
|
existing := state.LockInfo{}
|
|
err = json.Unmarshal(body, &existing)
|
|
if err != nil {
|
|
return "", fmt.Errorf("HTTP remote state already locked, failed to unmarshal body")
|
|
}
|
|
return "", fmt.Errorf("HTTP remote state already locked: ID=%s", existing.ID)
|
|
default:
|
|
return "", fmt.Errorf("Unexpected HTTP response code %d", resp.StatusCode)
|
|
}
|
|
}
|
|
|
|
func (c *HTTPClient) Unlock(id string) error {
|
|
if c.UnlockURL == nil {
|
|
return nil
|
|
}
|
|
|
|
resp, err := c.httpRequest(c.UnlockMethod, c.UnlockURL, &c.jsonLockInfo, "unlock")
|
|
if err != nil {
|
|
return err
|
|
}
|
|
defer resp.Body.Close()
|
|
|
|
switch resp.StatusCode {
|
|
case http.StatusOK:
|
|
return nil
|
|
default:
|
|
return fmt.Errorf("Unexpected HTTP response code %d", resp.StatusCode)
|
|
}
|
|
}
|
|
|
|
func (c *HTTPClient) Get() (*Payload, error) {
|
|
resp, err := c.httpRequest("GET", c.URL, nil, "get state")
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
defer resp.Body.Close()
|
|
|
|
// Handle the common status codes
|
|
switch resp.StatusCode {
|
|
case http.StatusOK:
|
|
// Handled after
|
|
case http.StatusNoContent:
|
|
return nil, nil
|
|
case http.StatusNotFound:
|
|
return nil, nil
|
|
case http.StatusUnauthorized:
|
|
return nil, fmt.Errorf("HTTP remote state endpoint requires auth")
|
|
case http.StatusForbidden:
|
|
return nil, fmt.Errorf("HTTP remote state endpoint invalid auth")
|
|
case http.StatusInternalServerError:
|
|
return nil, fmt.Errorf("HTTP remote state internal server error")
|
|
default:
|
|
return nil, fmt.Errorf("Unexpected HTTP response code %d", resp.StatusCode)
|
|
}
|
|
|
|
// Read in the body
|
|
buf := bytes.NewBuffer(nil)
|
|
if _, err := io.Copy(buf, resp.Body); err != nil {
|
|
return nil, fmt.Errorf("Failed to read remote state: %s", err)
|
|
}
|
|
|
|
// Create the payload
|
|
payload := &Payload{
|
|
Data: buf.Bytes(),
|
|
}
|
|
|
|
// If there was no data, then return nil
|
|
if len(payload.Data) == 0 {
|
|
return nil, nil
|
|
}
|
|
|
|
// Check for the MD5
|
|
if raw := resp.Header.Get("Content-MD5"); raw != "" {
|
|
md5, err := base64.StdEncoding.DecodeString(raw)
|
|
if err != nil {
|
|
return nil, fmt.Errorf(
|
|
"Failed to decode Content-MD5 '%s': %s", raw, err)
|
|
}
|
|
|
|
payload.MD5 = md5
|
|
} else {
|
|
// Generate the MD5
|
|
hash := md5.Sum(payload.Data)
|
|
payload.MD5 = hash[:]
|
|
}
|
|
|
|
return payload, nil
|
|
}
|
|
|
|
func (c *HTTPClient) Put(data []byte) error {
|
|
// Copy the target URL
|
|
base := *c.URL
|
|
|
|
if c.lockID != "" {
|
|
query := base.Query()
|
|
query.Set("ID", c.lockID)
|
|
base.RawQuery = query.Encode()
|
|
}
|
|
|
|
/*
|
|
// Set the force query parameter if needed
|
|
if force {
|
|
values := base.Query()
|
|
values.Set("force", "true")
|
|
base.RawQuery = values.Encode()
|
|
}
|
|
*/
|
|
|
|
var method string = "POST"
|
|
if c.UpdateMethod != "" {
|
|
method = c.UpdateMethod
|
|
}
|
|
resp, err := c.httpRequest(method, &base, &data, "upload state")
|
|
if err != nil {
|
|
return err
|
|
}
|
|
defer resp.Body.Close()
|
|
|
|
// Handle the error codes
|
|
switch resp.StatusCode {
|
|
case http.StatusOK:
|
|
return nil
|
|
default:
|
|
return fmt.Errorf("HTTP error: %d", resp.StatusCode)
|
|
}
|
|
}
|
|
|
|
func (c *HTTPClient) Delete() error {
|
|
// Make the request
|
|
resp, err := c.httpRequest("DELETE", c.URL, nil, "delete state")
|
|
if err != nil {
|
|
return err
|
|
}
|
|
defer resp.Body.Close()
|
|
|
|
// Handle the error codes
|
|
switch resp.StatusCode {
|
|
case http.StatusOK:
|
|
return nil
|
|
default:
|
|
return fmt.Errorf("HTTP error: %d", resp.StatusCode)
|
|
}
|
|
}
|