You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
222 lines
7.1 KiB
222 lines
7.1 KiB
// Copyright 2019 HAProxy Technologies
|
|
//
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
// you may not use this file except in compliance with the License.
|
|
// You may obtain a copy of the License at
|
|
//
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
//
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
// See the License for the specific language governing permissions and
|
|
// limitations under the License.
|
|
//
|
|
|
|
package handlers
|
|
|
|
import (
|
|
"bufio"
|
|
"fmt"
|
|
"os"
|
|
"path/filepath"
|
|
"strings"
|
|
|
|
"github.com/go-openapi/runtime"
|
|
"github.com/go-openapi/runtime/middleware"
|
|
client_native "github.com/haproxytech/client-native/v6"
|
|
models "github.com/haproxytech/client-native/v6/models"
|
|
|
|
"github.com/haproxytech/dataplaneapi/haproxy"
|
|
"github.com/haproxytech/dataplaneapi/misc"
|
|
"github.com/haproxytech/dataplaneapi/operations/storage"
|
|
)
|
|
|
|
// StorageCreateStorageMapFileHandlerImpl implementation of the StorageCreateStorageMapFileHandler interface using client-native client
|
|
type StorageCreateStorageMapFileHandlerImpl struct {
|
|
Client client_native.HAProxyClient
|
|
}
|
|
|
|
func (h *StorageCreateStorageMapFileHandlerImpl) Handle(params storage.CreateStorageMapFileParams, principal interface{}) middleware.Responder {
|
|
file, ok := params.FileUpload.(*runtime.File)
|
|
if !ok {
|
|
return storage.NewCreateStorageMapFileBadRequest()
|
|
}
|
|
|
|
st, err := h.Client.MapStorage()
|
|
if err != nil {
|
|
e := misc.HandleError(err)
|
|
return storage.NewCreateStorageMapFileDefault(int(*e.Code)).WithPayload(e)
|
|
}
|
|
|
|
filename, size, err := st.Create(file.Header.Filename, params.FileUpload)
|
|
if err != nil {
|
|
status := misc.GetHTTPStatusFromErr(err)
|
|
return storage.NewCreateStorageMapFileDefault(status).WithPayload(misc.SetError(status, err.Error()))
|
|
}
|
|
|
|
me := &models.Map{
|
|
Description: "managed but not loaded map file (no runtime ID)",
|
|
File: filename,
|
|
StorageName: filepath.Base(filename),
|
|
Size: &size,
|
|
}
|
|
// no reload or force reload since this is just a file upload,
|
|
// haproxy configuration has not been changed
|
|
return storage.NewCreateStorageMapFileCreated().WithPayload(me)
|
|
}
|
|
|
|
// GetMapStorageHandlerImpl implementation of the StorageGetAllStorageMapFilesHandler interface
|
|
type GetAllStorageMapFilesHandlerImpl struct {
|
|
Client client_native.HAProxyClient
|
|
}
|
|
|
|
// Handle executing the request and returning a response
|
|
func (h *GetAllStorageMapFilesHandlerImpl) Handle(params storage.GetAllStorageMapFilesParams, principal interface{}) middleware.Responder {
|
|
st, err := h.Client.MapStorage()
|
|
if err != nil {
|
|
e := misc.HandleError(err)
|
|
return storage.NewCreateStorageMapFileDefault(int(*e.Code)).WithPayload(e)
|
|
}
|
|
|
|
// get filenames for files in storage
|
|
filenames, err := st.GetAll()
|
|
if err != nil {
|
|
e := misc.HandleError(err)
|
|
return storage.NewGetAllStorageMapFilesDefault(int(*e.Code)).WithPayload(e)
|
|
}
|
|
|
|
retMaps := models.Maps{}
|
|
for _, f := range filenames {
|
|
retMaps = append(retMaps, &models.Map{
|
|
Description: "managed map file",
|
|
File: f,
|
|
ID: "",
|
|
StorageName: filepath.Base(f),
|
|
})
|
|
}
|
|
|
|
return &storage.GetAllStorageMapFilesOK{Payload: retMaps}
|
|
}
|
|
|
|
// StorageGetOneStorageMapHandlerImpl implementation of the StorageGetOneStorageMapHandler interface
|
|
type GetOneStorageMapHandlerImpl struct {
|
|
Client client_native.HAProxyClient
|
|
}
|
|
|
|
func (h *GetOneStorageMapHandlerImpl) Handle(params storage.GetOneStorageMapParams, principal interface{}) middleware.Responder {
|
|
st, err := h.Client.MapStorage()
|
|
if err != nil {
|
|
e := misc.HandleError(err)
|
|
return storage.NewGetAllStorageMapFilesDefault(int(*e.Code)).WithPayload(e)
|
|
}
|
|
|
|
filename, _, err := st.Get(params.Name)
|
|
if err != nil {
|
|
e := misc.HandleError(err)
|
|
return storage.NewGetOneStorageMapDefault(int(*e.Code)).WithPayload(e)
|
|
}
|
|
if filename == "" {
|
|
return storage.NewGetOneStorageMapNotFound()
|
|
}
|
|
f, err := os.Open(filename)
|
|
if err != nil {
|
|
e := misc.HandleError(err)
|
|
return storage.NewGetOneStorageMapDefault(int(*e.Code)).WithPayload(e)
|
|
}
|
|
return storage.NewGetOneStorageMapOK().WithPayload(f)
|
|
}
|
|
|
|
// StorageDeleteStorageMapHandlerImpl implementation of the StorageDeleteStorageMapHandler interface
|
|
type StorageDeleteStorageMapHandlerImpl struct {
|
|
Client client_native.HAProxyClient
|
|
}
|
|
|
|
func (h *StorageDeleteStorageMapHandlerImpl) Handle(params storage.DeleteStorageMapParams, principal interface{}) middleware.Responder {
|
|
configuration, err := h.Client.Configuration()
|
|
if err != nil {
|
|
e := misc.HandleError(err)
|
|
return storage.NewCreateStorageMapFileDefault(int(*e.Code)).WithPayload(e)
|
|
}
|
|
|
|
st, err := h.Client.MapStorage()
|
|
if err != nil {
|
|
e := misc.HandleError(err)
|
|
return storage.NewCreateStorageMapFileDefault(int(*e.Code)).WithPayload(e)
|
|
}
|
|
|
|
runningConf := strings.NewReader(configuration.Parser().String())
|
|
|
|
filename, _, err := st.Get(params.Name)
|
|
if err != nil {
|
|
e := misc.HandleError(err)
|
|
return storage.NewDeleteStorageSSLCertificateDefault(int(*e.Code)).WithPayload(e)
|
|
}
|
|
|
|
// this is far from perfect but should provide a basic level of protection
|
|
scanner := bufio.NewScanner(runningConf)
|
|
|
|
lineNr := 0
|
|
|
|
for scanner.Scan() {
|
|
line := strings.TrimSpace(scanner.Text())
|
|
if strings.Contains(line, filename) && !strings.HasPrefix(line, "#") {
|
|
errCode := misc.ErrHTTPConflict
|
|
errMsg := fmt.Sprintf("rejecting attempt to delete file %s referenced in haproxy conf at line %d: %s", filename, lineNr-1, line)
|
|
e := &models.Error{Code: &errCode, Message: &errMsg}
|
|
return storage.NewDeleteStorageSSLCertificateDefault(int(*e.Code)).WithPayload(e)
|
|
}
|
|
lineNr++
|
|
}
|
|
|
|
err = st.Delete(params.Name)
|
|
if err != nil {
|
|
e := misc.HandleError(err)
|
|
return storage.NewDeleteStorageMapDefault(int(*e.Code)).WithPayload(e)
|
|
}
|
|
return storage.NewDeleteStorageMapNoContent()
|
|
}
|
|
|
|
// StorageReplaceStorageMapFileHandlerImpl implementation of the StorageReplaceStorageMapFileHandler interface
|
|
type StorageReplaceStorageMapFileHandlerImpl struct {
|
|
Client client_native.HAProxyClient
|
|
ReloadAgent haproxy.IReloadAgent
|
|
}
|
|
|
|
func (h *StorageReplaceStorageMapFileHandlerImpl) Handle(params storage.ReplaceStorageMapFileParams, principal interface{}) middleware.Responder {
|
|
st, err := h.Client.MapStorage()
|
|
if err != nil {
|
|
e := misc.HandleError(err)
|
|
return storage.NewReplaceStorageMapFileDefault(int(*e.Code)).WithPayload(e)
|
|
}
|
|
|
|
_, err = st.Replace(params.Name, params.Data)
|
|
if err != nil {
|
|
e := misc.HandleError(err)
|
|
return storage.NewReplaceStorageMapFileDefault(int(*e.Code)).WithPayload(e)
|
|
}
|
|
|
|
skipReload := false
|
|
if params.SkipReload != nil {
|
|
skipReload = *params.SkipReload
|
|
}
|
|
forceReload := false
|
|
if params.ForceReload != nil {
|
|
forceReload = *params.ForceReload
|
|
}
|
|
|
|
if skipReload {
|
|
return storage.NewReplaceStorageMapFileNoContent()
|
|
}
|
|
|
|
if forceReload {
|
|
err := h.ReloadAgent.ForceReload()
|
|
if err != nil {
|
|
e := misc.HandleError(err)
|
|
return storage.NewReplaceStorageMapFileDefault(int(*e.Code)).WithPayload(e)
|
|
}
|
|
return storage.NewReplaceStorageMapFileNoContent()
|
|
}
|
|
rID := h.ReloadAgent.Reload()
|
|
return storage.NewReplaceStorageMapFileAccepted().WithReloadID(rID)
|
|
}
|
|
|