// Run is the function that starts the collector. The dryMode parameter // indicates whether the collector should loop forever or not. // // It assumes the configuration has already been defined (from a config file or // memory). func Run(dryMode bool) { log.Init() connString, err := config.GetString("database:url") if err != nil { connString = db.DefaultDatabaseURL } dbName, err := config.GetString("database:name") if err != nil { dbName = db.DefaultDatabaseName } fmt.Printf("Using the database %q from the server %q.\n\n", dbName, connString) if !dryMode { provisioner, err := config.GetString("provisioner") if err != nil { fmt.Println("Warning: configuration didn't declare a provisioner, using default provisioner.") provisioner = "juju" } app.Provisioner, err = provision.Get(provisioner) if err != nil { fatal(err) } fmt.Printf("Using %q provisioner.\n\n", provisioner) timer, err := config.GetInt("collector:ticker-time") if err != nil { timer = 60 } ticker := time.Tick(time.Duration(timer) * time.Second) fmt.Println("tsuru collector agent started...") collect(ticker) } }
// RunAdminServer starts tsuru administrative api func RunAdminServer(dry bool) { log.Init() connString, err := config.GetString("database:url") if err != nil { connString = db.DefaultDatabaseURL } dbName, err := config.GetString("database:name") if err != nil { dbName = db.DefaultDatabaseName } fmt.Printf("Using the database %q from the server %q.\n\n", dbName, connString) if !dry { provisioner, err := getProvisioner() if err != nil { fmt.Printf("Warning: configuration didn't declare a provisioner, using default provisioner.\n") } app.Provisioner, err = provision.Get(provisioner) if err != nil { fatal(err) } fmt.Printf("Using %q provisioner.\n\n", provisioner) listen, err := config.GetString("admin-listen") if err != nil { fatal(err) } listener, err := net.Listen("tcp", listen) if err != nil { fatal(err) } fmt.Printf("tsuru HTTP server listening at %s...\n", listen) http.Handle("/", m) fatal(http.Serve(listener, nil)) } }
func Run(flags map[string]interface{}) { configFile := loadConfig(flags) log.Init() dry, ok := flags["dry"].(bool) if !ok { dry = false } connString, err := config.GetString("database:url") if err != nil { fatal(err) } dbName, err := config.GetString("database:name") if err != nil { fatal(err) } fmt.Printf("Using the database %q from the server %q.\n\n", dbName, connString) if !dry { provisioner, err := config.GetString("provisioner") if err != nil { fmt.Printf("Warning: %q didn't declare a provisioner, using default provisioner.\n", configFile) provisioner = "juju" } app.Provisioner, err = provision.Get(provisioner) if err != nil { fatal(err) } fmt.Printf("Using %q provisioner.\n\n", provisioner) ticker := time.Tick(time.Minute) fmt.Println("tsuru collector agent started...") collect(ticker) } }
func main() { var ( configFile string dry bool ) logger, err := syslog.NewLogger(syslog.LOG_INFO, stdlog.LstdFlags) if err != nil { stdlog.Fatal(err) } log.SetLogger(logger) flag.StringVar(&configFile, "config", "/etc/tsuru/tsuru.conf", "tsuru config file") flag.BoolVar(&dry, "dry", false, "dry-run: does not start the agent (for testing purposes)") flag.Parse() err = config.ReadConfigFile(configFile) if err != nil { fatal(err) } connString, err := config.GetString("database:url") if err != nil { fatal(err) } dbName, err := config.GetString("database:name") if err != nil { fatal(err) } db.Session, err = db.Open(connString, dbName) if err != nil { fatal(err) } defer db.Session.Close() fmt.Printf("Connected to MongoDB server at %s.\n", connString) fmt.Printf("Using the database %q.\n\n", dbName) if !dry { provisioner, err := config.GetString("provisioner") if err != nil { fmt.Printf("Warning: %q didn't declare a provisioner, using default provisioner.\n", configFile) provisioner = "juju" } app.Provisioner, err = provision.Get(provisioner) if err != nil { fatal(err) } fmt.Printf("Using %q provisioner.\n\n", provisioner) qServer, err := config.GetString("queue-server") if err != nil { fatal(err) } fmt.Printf("Connected to queue server at %s.\n", qServer) go handleMessages() ticker := time.Tick(time.Minute) fmt.Println("tsuru collector agent started...") jujuCollect(ticker) } }
func Run(flags map[string]interface{}) { logger, err := syslog.NewLogger(syslog.LOG_INFO, stdlog.LstdFlags) if err != nil { stdlog.Fatal(err) } log.SetLogger(logger) configFile, ok := flags["config"].(string) if !ok { configFile = "/etc/tsuru/tsuru.conf" } dry, ok := flags["dry"].(bool) if !ok { dry = false } err = config.ReadAndWatchConfigFile(configFile) if err != nil { fatal(err) } connString, err := config.GetString("database:url") if err != nil { fatal(err) } dbName, err := config.GetString("database:name") if err != nil { fatal(err) } fmt.Printf("Using the database %q from the server %q.\n\n", dbName, connString) if !dry { provisioner, err := config.GetString("provisioner") if err != nil { fmt.Printf("Warning: %q didn't declare a provisioner, using default provisioner.\n", configFile) provisioner = "juju" } app.Provisioner, err = provision.Get(provisioner) if err != nil { fatal(err) } fmt.Printf("Using %q provisioner.\n\n", provisioner) ticker := time.Tick(time.Minute) fmt.Println("tsuru collector agent started...") collect(ticker) } }
func main() { logger, err := syslog.NewLogger(syslog.LOG_INFO, stdlog.LstdFlags) if err != nil { stdlog.Fatal(err) } log.SetLogger(logger) configFile := flag.String("config", "/etc/tsuru/tsuru.conf", "tsuru config file") dry := flag.Bool("dry", false, "dry-run: does not start the server (for testing purpose)") flag.Parse() err = config.ReadAndWatchConfigFile(*configFile) if err != nil { fatal(err) } connString, err := config.GetString("database:url") if err != nil { fatal(err) } dbName, err := config.GetString("database:name") if err != nil { fatal(err) } fmt.Printf("Using the database %q from the server %q.\n\n", dbName, connString) m := pat.New() m.Get("/services/instances", AuthorizationRequiredHandler(ServicesInstancesHandler)) m.Post("/services/instances", AuthorizationRequiredHandler(CreateInstanceHandler)) m.Put("/services/instances/:instance/:app", AuthorizationRequiredHandler(BindHandler)) m.Del("/services/instances/:instance/:app", AuthorizationRequiredHandler(UnbindHandler)) m.Del("/services/c/instances/:name", AuthorizationRequiredHandler(RemoveServiceInstanceHandler)) m.Get("/services/instances/:instance/status", AuthorizationRequiredHandler(ServiceInstanceStatusHandler)) m.Get("/services", AuthorizationRequiredHandler(ServicesHandler)) m.Post("/services", AuthorizationRequiredHandler(CreateHandler)) m.Put("/services", AuthorizationRequiredHandler(UpdateHandler)) m.Del("/services/:name", AuthorizationRequiredHandler(DeleteHandler)) m.Get("/services/:name", AuthorizationRequiredHandler(ServiceInfoHandler)) m.Get("/services/c/:name/doc", AuthorizationRequiredHandler(Doc)) m.Get("/services/:name/doc", AuthorizationRequiredHandler(GetDocHandler)) m.Put("/services/:name/doc", AuthorizationRequiredHandler(AddDocHandler)) m.Put("/services/:service/:team", AuthorizationRequiredHandler(GrantServiceAccessToTeamHandler)) m.Del("/services/:service/:team", AuthorizationRequiredHandler(RevokeServiceAccessFromTeamHandler)) m.Del("/apps/:name", AuthorizationRequiredHandler(appDelete)) m.Get("/apps/:name/repository/clone", Handler(CloneRepositoryHandler)) m.Get("/apps/:name/avaliable", Handler(AppIsAvailableHandler)) m.Get("/apps/:name", AuthorizationRequiredHandler(AppInfo)) m.Post("/apps/:name", AuthorizationRequiredHandler(setCName)) m.Post("/apps/:name/run", AuthorizationRequiredHandler(RunCommand)) m.Get("/apps/:name/restart", AuthorizationRequiredHandler(RestartHandler)) m.Get("/apps/:name/env", AuthorizationRequiredHandler(GetEnv)) m.Post("/apps/:name/env", AuthorizationRequiredHandler(SetEnv)) m.Del("/apps/:name/env", AuthorizationRequiredHandler(UnsetEnv)) m.Get("/apps", AuthorizationRequiredHandler(AppList)) m.Post("/apps", AuthorizationRequiredHandler(CreateAppHandler)) m.Put("/apps/:name/units", AuthorizationRequiredHandler(AddUnitsHandler)) m.Del("/apps/:name/units", AuthorizationRequiredHandler(RemoveUnitsHandler)) m.Put("/apps/:app/:team", AuthorizationRequiredHandler(GrantAccessToTeamHandler)) m.Del("/apps/:app/:team", AuthorizationRequiredHandler(RevokeAccessFromTeamHandler)) m.Get("/apps/:name/log", AuthorizationRequiredHandler(appLog)) m.Post("/apps/:name/log", Handler(AddLogHandler)) m.Post("/users", Handler(CreateUser)) m.Post("/users/:email/tokens", Handler(Login)) m.Put("/users/password", AuthorizationRequiredHandler(ChangePassword)) m.Del("/users", AuthorizationRequiredHandler(RemoveUser)) m.Post("/users/keys", AuthorizationRequiredHandler(AddKeyToUser)) m.Del("/users/keys", AuthorizationRequiredHandler(RemoveKeyFromUser)) m.Get("/teams", AuthorizationRequiredHandler(ListTeams)) m.Post("/teams", AuthorizationRequiredHandler(CreateTeam)) m.Del("/teams/:name", AuthorizationRequiredHandler(RemoveTeam)) m.Put("/teams/:team/:user", AuthorizationRequiredHandler(AddUserToTeam)) m.Del("/teams/:team/:user", AuthorizationRequiredHandler(RemoveUserFromTeam)) m.Get("/healers", Handler(healers)) m.Get("/healers/:healer", Handler(healer)) if !*dry { provisioner, err := config.GetString("provisioner") if err != nil { fmt.Printf("Warning: %q didn't declare a provisioner, using default provisioner.\n", configFile) provisioner = "juju" } app.Provisioner, err = provision.Get(provisioner) if err != nil { fatal(err) } fmt.Printf("Using %q provisioner.\n\n", provisioner) listen, err := config.GetString("listen") if err != nil { fatal(err) } tls, _ := config.GetBool("use-tls") if tls { certFile, err := config.GetString("tls-cert-file") if err != nil { fatal(err) } keyFile, err := config.GetString("tls-key-file") if err != nil { fatal(err) } fmt.Printf("tsuru HTTP/TLS server listening at %s...\n", listen) fatal(http.ListenAndServeTLS(listen, certFile, keyFile, m)) } else { fmt.Printf("tsuru HTTP server listening at %s...\n", listen) fatal(http.ListenAndServe(listen, m)) } } }
func (s *S) TestShouldBeRegistered(c *C) { p, err := provision.Get("juju") c.Assert(err, IsNil) c.Assert(p, FitsTypeOf, &JujuProvisioner{}) }
func (s *S) TestShouldBeRegistered(c *gocheck.C) { p, err := provision.Get("docker") c.Assert(err, gocheck.IsNil) c.Assert(p, gocheck.FitsTypeOf, &dockerProvisioner{}) }
// RunServer starts Tsuru API server. The dry parameter indicates whether the // server should run in dry mode, not starting the HTTP listener (for testing // purposes). func RunServer(dry bool) { log.Init() connString, err := config.GetString("database:url") if err != nil { fatal(err) } dbName, err := config.GetString("database:name") if err != nil { fatal(err) } fmt.Printf("Using the database %q from the server %q.\n\n", dbName, connString) m := pat.New() m.Get("/schema/app", authorizationRequiredHandler(appSchema)) m.Get("/schema/service", authorizationRequiredHandler(serviceSchema)) m.Get("/schema/services", authorizationRequiredHandler(servicesSchema)) m.Get("/quota/:owner", authorizationRequiredHandler(quotaByOwner)) m.Get("/services/instances", authorizationRequiredHandler(serviceInstances)) m.Get("/services/instances/:name", authorizationRequiredHandler(serviceInstance)) m.Del("/services/instances/:name", authorizationRequiredHandler(removeServiceInstance)) m.Post("/services/instances", authorizationRequiredHandler(createServiceInstance)) m.Put("/services/instances/:instance/:app", authorizationRequiredHandler(bindServiceInstance)) m.Del("/services/instances/:instance/:app", authorizationRequiredHandler(unbindServiceInstance)) m.Get("/services/instances/:instance/status", authorizationRequiredHandler(serviceInstanceStatus)) m.Get("/services", authorizationRequiredHandler(serviceList)) m.Post("/services", authorizationRequiredHandler(serviceCreate)) m.Put("/services", authorizationRequiredHandler(serviceUpdate)) m.Del("/services/:name", authorizationRequiredHandler(serviceDelete)) m.Get("/services/:name", authorizationRequiredHandler(serviceInfo)) m.Get("/services/:name/doc", authorizationRequiredHandler(serviceDoc)) m.Put("/services/:name/doc", authorizationRequiredHandler(serviceAddDoc)) m.Put("/services/:service/:team", authorizationRequiredHandler(grantServiceAccess)) m.Del("/services/:service/:team", authorizationRequiredHandler(revokeServiceAccess)) m.Del("/apps/:app", authorizationRequiredHandler(appDelete)) m.Get("/apps/:app", authorizationRequiredHandler(appInfo)) m.Post("/apps/:app/cname", authorizationRequiredHandler(setCName)) m.Del("/apps/:app/cname", authorizationRequiredHandler(unsetCName)) m.Post("/apps/:app/run", authorizationRequiredHandler(runCommand)) m.Get("/apps/:app/restart", authorizationRequiredHandler(restart)) m.Get("/apps/:app/env", authorizationRequiredHandler(getEnv)) m.Post("/apps/:app/env", authorizationRequiredHandler(setEnv)) m.Del("/apps/:app/env", authorizationRequiredHandler(unsetEnv)) m.Get("/apps", authorizationRequiredHandler(appList)) m.Post("/apps", authorizationRequiredHandler(createApp)) m.Put("/apps/:app/units", authorizationRequiredHandler(addUnits)) m.Del("/apps/:app/units", authorizationRequiredHandler(removeUnits)) m.Put("/apps/:app/:team", authorizationRequiredHandler(grantAppAccess)) m.Del("/apps/:app/:team", authorizationRequiredHandler(revokeAppAccess)) m.Get("/apps/:app/log", authorizationRequiredHandler(appLog)) m.Post("/apps/:app/log", authorizationRequiredHandler(addLog)) m.Get("/platforms", authorizationRequiredHandler(platformList)) // These handlers don't use :app on purpose. Using :app means that only // the token generate for the given app is valid, but these handlers // use a token generated for Gandalf. m.Get("/apps/:appname/available", authorizationRequiredHandler(appIsAvailable)) m.Post("/apps/:appname/repository/clone", authorizationRequiredHandler(cloneRepository)) if registrationEnabled, _ := config.GetBool("auth:user-registration"); registrationEnabled { m.Post("/users", handler(createUser)) } m.Post("/users/:email/password", handler(resetPassword)) m.Post("/users/:email/tokens", handler(login)) m.Del("/users/tokens", authorizationRequiredHandler(logout)) m.Put("/users/password", authorizationRequiredHandler(changePassword)) m.Del("/users", authorizationRequiredHandler(removeUser)) m.Get("/users/:email/keys", authorizationRequiredHandler(listKeys)) m.Post("/users/keys", authorizationRequiredHandler(addKeyToUser)) m.Del("/users/keys", authorizationRequiredHandler(removeKeyFromUser)) m.Post("/tokens", adminRequiredHandler(generateAppToken)) m.Del("/logs", adminRequiredHandler(logRemove)) m.Get("/teams", authorizationRequiredHandler(teamList)) m.Post("/teams", authorizationRequiredHandler(createTeam)) m.Get("/teams/:name", authorizationRequiredHandler(getTeam)) m.Del("/teams/:name", authorizationRequiredHandler(removeTeam)) m.Put("/teams/:team/:user", authorizationRequiredHandler(addUserToTeam)) m.Del("/teams/:team/:user", authorizationRequiredHandler(removeUserFromTeam)) m.Get("/healers", authorizationRequiredHandler(healers)) m.Get("/healers/:healer", authorizationRequiredHandler(healer)) m.Put("/swap", authorizationRequiredHandler(swap)) if !dry { provisioner, err := getProvisioner() if err != nil { fmt.Printf("Warning: configuration didn't declare a provisioner, using default provisioner.\n") } app.Provisioner, err = provision.Get(provisioner) if err != nil { fatal(err) } fmt.Printf("Using %q provisioner.\n\n", provisioner) listen, err := config.GetString("listen") if err != nil { fatal(err) } tls, _ := config.GetBool("use-tls") if tls { certFile, err := config.GetString("tls:cert-file") if err != nil { fatal(err) } keyFile, err := config.GetString("tls:key-file") if err != nil { fatal(err) } fmt.Printf("tsuru HTTP/TLS server listening at %s...\n", listen) fatal(http.ListenAndServeTLS(listen, certFile, keyFile, m)) } else { listener, err := net.Listen("tcp", listen) if err != nil { fatal(err) } fmt.Printf("tsuru HTTP server listening at %s...\n", listen) http.Handle("/", m) fatal(http.Serve(listener, nil)) } } }
func main() { logger, err := syslog.NewLogger(syslog.LOG_INFO, stdlog.LstdFlags) if err != nil { stdlog.Fatal(err) } log.SetLogger(logger) configFile := flag.String("config", "/etc/tsuru/tsuru.conf", "tsuru config file") dry := flag.Bool("dry", false, "dry-run: does not start the server (for testing purpose)") flag.Parse() err = config.ReadConfigFile(*configFile) if err != nil { fatal(err) } connString, err := config.GetString("database:url") if err != nil { fatal(err) } dbName, err := config.GetString("database:name") if err != nil { fatal(err) } db.Session, err = db.Open(connString, dbName) if err != nil { fatal(err) } defer db.Session.Close() fmt.Printf("Connected to MongoDB server at %s.\n", connString) fmt.Printf("Using the database %q.\n\n", dbName) m := pat.New() m.Get("/services/instances", AuthorizationRequiredHandler(consumption.ServicesInstancesHandler)) m.Post("/services/instances", AuthorizationRequiredHandler(consumption.CreateInstanceHandler)) m.Put("/services/instances/:instance/:app", AuthorizationRequiredHandler(api.BindHandler)) m.Del("/services/instances/:instance/:app", AuthorizationRequiredHandler(api.UnbindHandler)) m.Del("/services/c/instances/:name", AuthorizationRequiredHandler(consumption.RemoveServiceInstanceHandler)) m.Get("/services/instances/:instance/status", AuthorizationRequiredHandler(consumption.ServiceInstanceStatusHandler)) m.Get("/services", AuthorizationRequiredHandler(service_provision.ServicesHandler)) m.Post("/services", AuthorizationRequiredHandler(service_provision.CreateHandler)) m.Put("/services", AuthorizationRequiredHandler(service_provision.UpdateHandler)) m.Del("/services/:name", AuthorizationRequiredHandler(service_provision.DeleteHandler)) m.Get("/services/:name", AuthorizationRequiredHandler(consumption.ServiceInfoHandler)) m.Get("/services/c/:name/doc", AuthorizationRequiredHandler(consumption.Doc)) m.Get("/services/:name/doc", AuthorizationRequiredHandler(service_provision.GetDocHandler)) m.Put("/services/:name/doc", AuthorizationRequiredHandler(service_provision.AddDocHandler)) m.Put("/services/:service/:team", AuthorizationRequiredHandler(service_provision.GrantAccessToTeamHandler)) m.Del("/services/:service/:team", AuthorizationRequiredHandler(service_provision.RevokeAccessFromTeamHandler)) m.Del("/apps/:name", AuthorizationRequiredHandler(api.AppDelete)) m.Get("/apps/:name/repository/clone", Handler(api.CloneRepositoryHandler)) m.Get("/apps/:name/avaliable", Handler(api.AppIsAvaliableHandler)) m.Get("/apps/:name", AuthorizationRequiredHandler(api.AppInfo)) m.Post("/apps/:name/run", AuthorizationRequiredHandler(api.RunCommand)) m.Get("/apps/:name/restart", AuthorizationRequiredHandler(api.RestartHandler)) m.Get("/apps/:name/env", AuthorizationRequiredHandler(api.GetEnv)) m.Post("/apps/:name/env", AuthorizationRequiredHandler(api.SetEnv)) m.Del("/apps/:name/env", AuthorizationRequiredHandler(api.UnsetEnv)) m.Get("/apps", AuthorizationRequiredHandler(api.AppList)) m.Post("/apps", AuthorizationRequiredHandler(api.CreateAppHandler)) m.Put("/apps/:name/units", AuthorizationRequiredHandler(api.AddUnitsHandler)) m.Put("/apps/:app/:team", AuthorizationRequiredHandler(api.GrantAccessToTeamHandler)) m.Del("/apps/:app/:team", AuthorizationRequiredHandler(api.RevokeAccessFromTeamHandler)) m.Get("/apps/:name/log", AuthorizationRequiredHandler(api.AppLog)) m.Post("/apps/:name/log", Handler(api.AddLogHandler)) m.Post("/users", Handler(auth.CreateUser)) m.Post("/users/:email/tokens", Handler(auth.Login)) m.Put("/users/password", AuthorizationRequiredHandler(auth.ChangePassword)) m.Del("/users", AuthorizationRequiredHandler(auth.RemoveUser)) m.Post("/users/keys", AuthorizationRequiredHandler(auth.AddKeyToUser)) m.Del("/users/keys", AuthorizationRequiredHandler(auth.RemoveKeyFromUser)) m.Get("/teams", AuthorizationRequiredHandler(auth.ListTeams)) m.Post("/teams", AuthorizationRequiredHandler(auth.CreateTeam)) m.Del("/teams/:name", AuthorizationRequiredHandler(auth.RemoveTeam)) m.Put("/teams/:team/:user", AuthorizationRequiredHandler(auth.AddUserToTeam)) m.Del("/teams/:team/:user", AuthorizationRequiredHandler(auth.RemoveUserFromTeam)) if !*dry { provisioner, err := config.GetString("provisioner") if err != nil { fmt.Printf("Warning: %q didn't declare a provisioner, using default provisioner.\n", configFile) provisioner = "juju" } app.Provisioner, err = provision.Get(provisioner) if err != nil { fatal(err) } fmt.Printf("Using %q provisioner.\n\n", provisioner) listen, err := config.GetString("listen") if err != nil { fatal(err) } fmt.Printf("tsuru HTTP server listening at %s...\n", listen) fatal(http.ListenAndServe(listen, m)) } }
func RunServer(flags map[string]interface{}) { logger, err := syslog.NewLogger(syslog.LOG_INFO, stdlog.LstdFlags) if err != nil { stdlog.Fatal(err) } log.SetLogger(logger) configFile, ok := flags["config"].(string) if !ok { configFile = "/etc/tsuru/tsuru.conf" } dry, ok := flags["dry"].(bool) if !ok { dry = false } err = config.ReadAndWatchConfigFile(configFile) if err != nil { fatal(err) } connString, err := config.GetString("database:url") if err != nil { fatal(err) } dbName, err := config.GetString("database:name") if err != nil { fatal(err) } fmt.Printf("Using the database %q from the server %q.\n\n", dbName, connString) m := pat.New() m.Get("/schema/app", authorizationRequiredHandler(appSchema)) m.Get("/services/instances", authorizationRequiredHandler(serviceInstances)) m.Post("/services/instances", authorizationRequiredHandler(createServiceInstance)) m.Put("/services/instances/:instance/:app", authorizationRequiredHandler(bindServiceInstance)) m.Del("/services/instances/:instance/:app", authorizationRequiredHandler(unbindServiceInstance)) m.Del("/services/c/instances/:name", authorizationRequiredHandler(removeServiceInstance)) m.Get("/services/instances/:instance/status", authorizationRequiredHandler(serviceInstanceStatus)) m.Get("/services", authorizationRequiredHandler(serviceList)) m.Post("/services", authorizationRequiredHandler(serviceCreate)) m.Put("/services", authorizationRequiredHandler(serviceUpdate)) m.Del("/services/:name", authorizationRequiredHandler(serviceDelete)) m.Get("/services/:name", authorizationRequiredHandler(serviceInfo)) m.Get("/services/:name/doc", authorizationRequiredHandler(serviceDoc)) m.Put("/services/:name/doc", authorizationRequiredHandler(serviceAddDoc)) m.Put("/services/:service/:team", authorizationRequiredHandler(grantServiceAccess)) m.Del("/services/:service/:team", authorizationRequiredHandler(revokeServiceAccess)) m.Del("/apps/:app", authorizationRequiredHandler(appDelete)) m.Get("/apps/:app", authorizationRequiredHandler(appInfo)) m.Post("/apps/:app", authorizationRequiredHandler(setCName)) m.Post("/apps/:app/run", authorizationRequiredHandler(runCommand)) m.Get("/apps/:app/restart", authorizationRequiredHandler(restart)) m.Get("/apps/:app/env", authorizationRequiredHandler(getEnv)) m.Post("/apps/:app/env", authorizationRequiredHandler(setEnv)) m.Del("/apps/:app/env", authorizationRequiredHandler(unsetEnv)) m.Get("/apps", authorizationRequiredHandler(appList)) m.Post("/apps", authorizationRequiredHandler(createApp)) m.Put("/apps/:app/units", authorizationRequiredHandler(addUnits)) m.Del("/apps/:app/units", authorizationRequiredHandler(removeUnits)) m.Put("/apps/:app/:team", authorizationRequiredHandler(grantAppAccess)) m.Del("/apps/:app/:team", authorizationRequiredHandler(revokeAppAccess)) m.Get("/apps/:app/log", authorizationRequiredHandler(appLog)) m.Post("/apps/:app/log", authorizationRequiredHandler(addLog)) m.Get("/platforms", authorizationRequiredHandler(platformList)) // These handlers don't use :app on purpose. Using :app means that only // the token generate for the given app is valid, but these handlers // use a token generated for Gandalf. m.Get("/apps/:appname/available", authorizationRequiredHandler(appIsAvailable)) m.Get("/apps/:appname/repository/clone", authorizationRequiredHandler(cloneRepository)) if registrationEnabled, _ := config.GetBool("auth:user-registration"); registrationEnabled { m.Post("/users", handler(createUser)) } m.Post("/users/:email/password", handler(resetPassword)) m.Post("/users/:email/tokens", handler(login)) m.Del("/users/tokens", authorizationRequiredHandler(logout)) m.Put("/users/password", authorizationRequiredHandler(changePassword)) m.Del("/users", authorizationRequiredHandler(removeUser)) m.Post("/users/keys", authorizationRequiredHandler(addKeyToUser)) m.Del("/users/keys", authorizationRequiredHandler(removeKeyFromUser)) m.Post("/tokens", adminRequiredHandler(generateAppToken)) m.Get("/teams", authorizationRequiredHandler(teamList)) m.Post("/teams", authorizationRequiredHandler(createTeam)) m.Del("/teams/:name", authorizationRequiredHandler(removeTeam)) m.Put("/teams/:team/:user", authorizationRequiredHandler(addUserToTeam)) m.Del("/teams/:team/:user", authorizationRequiredHandler(removeUserFromTeam)) m.Get("/healers", authorizationRequiredHandler(healers)) m.Get("/healers/:healer", authorizationRequiredHandler(healer)) if !dry { provisioner, err := config.GetString("provisioner") if err != nil { fmt.Printf("Warning: %q didn't declare a provisioner, using default provisioner.\n", configFile) provisioner = "juju" } app.Provisioner, err = provision.Get(provisioner) if err != nil { fatal(err) } fmt.Printf("Using %q provisioner.\n\n", provisioner) listen, err := config.GetString("listen") if err != nil { fatal(err) } tls, _ := config.GetBool("use-tls") if tls { certFile, err := config.GetString("tls-cert-file") if err != nil { fatal(err) } keyFile, err := config.GetString("tls-key-file") if err != nil { fatal(err) } fmt.Printf("tsuru HTTP/TLS server listening at %s...\n", listen) fatal(http.ListenAndServeTLS(listen, certFile, keyFile, m)) } else { listener, err := net.Listen("tcp", listen) if err != nil { fatal(err) } fmt.Printf("tsuru HTTP server listening at %s...\n", listen) http.Handle("/", m) fatal(http.Serve(listener, nil)) } } }