func listRouters(w http.ResponseWriter, r *http.Request, t auth.Token) error { routers, err := router.List() if err != nil { return err } w.Header().Set("Content-Type", "application/json") return json.NewEncoder(w).Encode(routers) }
func listRouters(w http.ResponseWriter, r *http.Request, t auth.Token) error { allowed := permission.Check(t, permission.PermPlanCreate) if !allowed { return permission.ErrUnauthorized } routers, err := router.List() if err != nil { return err } w.Header().Set("Content-Type", "application/json") return json.NewEncoder(w).Encode(routers) }
// RunServer starts tsuru API server. The dry parameter indicates whether the // server should run in dry mode, not starting the HTTP listener (for testing // purposes). func RunServer(dry bool) http.Handler { log.Init() connString, err := config.GetString("database:url") if err != nil { connString = db.DefaultDatabaseURL } dbName, err := config.GetString("database:name") if err != nil { dbName = db.DefaultDatabaseName } fmt.Printf("Using mongodb database %q from the server %q.\n", dbName, connString) m := &delayedRouter{} for _, handler := range tsuruHandlerList { m.Add(handler.method, handler.path, handler.h) } if disableIndex, _ := config.GetBool("disable-index-page"); !disableIndex { m.Add("Get", "/", Handler(index)) } m.Add("Get", "/info", Handler(info)) m.Add("Get", "/services/instances", authorizationRequiredHandler(serviceInstances)) m.Add("Get", "/services/instances/{name}", authorizationRequiredHandler(serviceInstance)) m.Add("Delete", "/services/instances/{name}", authorizationRequiredHandler(removeServiceInstance)) m.Add("Post", "/services/instances", authorizationRequiredHandler(createServiceInstance)) m.Add("Put", "/services/instances/{instance}/{app}", authorizationRequiredHandler(bindServiceInstance)) m.Add("Delete", "/services/instances/{instance}/{app}", authorizationRequiredHandler(unbindServiceInstance)) m.Add("Get", "/services/instances/{instance}/status", authorizationRequiredHandler(serviceInstanceStatus)) m.Add("Put", "/services/instances/permission/{instance}/{team}", authorizationRequiredHandler(serviceInstanceGrantTeam)) m.Add("Delete", "/services/instances/permission/{instance}/{team}", authorizationRequiredHandler(serviceInstanceRevokeTeam)) m.AddAll("/services/proxy/{instance}", authorizationRequiredHandler(serviceInstanceProxy)) m.AddAll("/services/proxy/service/{service}", authorizationRequiredHandler(serviceProxy)) m.Add("Get", "/services", authorizationRequiredHandler(serviceList)) m.Add("Post", "/services", authorizationRequiredHandler(serviceCreate)) m.Add("Put", "/services", authorizationRequiredHandler(serviceUpdate)) m.Add("Delete", "/services/{name}", authorizationRequiredHandler(serviceDelete)) m.Add("Get", "/services/{name}", authorizationRequiredHandler(serviceInfo)) m.Add("Get", "/services/{name}/plans", authorizationRequiredHandler(servicePlans)) m.Add("Get", "/services/{name}/doc", authorizationRequiredHandler(serviceDoc)) m.Add("Put", "/services/{name}/doc", authorizationRequiredHandler(serviceAddDoc)) m.Add("Put", "/services/{service}/team/{team}", authorizationRequiredHandler(grantServiceAccess)) m.Add("Delete", "/services/{service}/team/{team}", authorizationRequiredHandler(revokeServiceAccess)) m.Add("Delete", "/apps/{app}", authorizationRequiredHandler(appDelete)) m.Add("Get", "/apps/{app}", authorizationRequiredHandler(appInfo)) m.Add("Post", "/apps/{app}/cname", authorizationRequiredHandler(setCName)) m.Add("Delete", "/apps/{app}/cname", authorizationRequiredHandler(unsetCName)) m.Add("Post", "/apps/{app}/plan", authorizationRequiredHandler(changePlan)) runHandler := authorizationRequiredHandler(runCommand) m.Add("Post", "/apps/{app}/run", runHandler) m.Add("Post", "/apps/{app}/restart", authorizationRequiredHandler(restart)) m.Add("Post", "/apps/{app}/start", authorizationRequiredHandler(start)) m.Add("Post", "/apps/{app}/stop", authorizationRequiredHandler(stop)) m.Add("Get", "/apps/{appname}/quota", AdminRequiredHandler(getAppQuota)) m.Add("Post", "/apps/{appname}/quota", AdminRequiredHandler(changeAppQuota)) m.Add("Get", "/apps/{app}/env", authorizationRequiredHandler(getEnv)) m.Add("Post", "/apps/{app}/env", authorizationRequiredHandler(setEnv)) m.Add("Delete", "/apps/{app}/env", authorizationRequiredHandler(unsetEnv)) m.Add("Get", "/apps", authorizationRequiredHandler(appList)) m.Add("Post", "/apps", authorizationRequiredHandler(createApp)) m.Add("Post", "/apps/{app}/team-owner", authorizationRequiredHandler(setTeamOwner)) forceDeleteLockHandler := AdminRequiredHandler(forceDeleteLock) m.Add("Delete", "/apps/{app}/lock", forceDeleteLockHandler) m.Add("Put", "/apps/{app}/units", authorizationRequiredHandler(addUnits)) m.Add("Delete", "/apps/{app}/units", authorizationRequiredHandler(removeUnits)) registerUnitHandler := authorizationRequiredHandler(registerUnit) m.Add("Post", "/apps/{app}/units/register", registerUnitHandler) setUnitStatusHandler := authorizationRequiredHandler(setUnitStatus) m.Add("Post", "/apps/{app}/units/{unit}", setUnitStatusHandler) m.Add("Put", "/apps/{app}/teams/{team}", authorizationRequiredHandler(grantAppAccess)) m.Add("Delete", "/apps/{app}/teams/{team}", authorizationRequiredHandler(revokeAppAccess)) m.Add("Get", "/apps/{app}/log", authorizationRequiredHandler(appLog)) logPostHandler := authorizationRequiredHandler(addLog) m.Add("Post", "/apps/{app}/log", logPostHandler) m.Add("Post", "/apps/{appname}/deploy/rollback", authorizationRequiredHandler(deployRollback)) m.Add("Post", "/apps/{app}/pool", authorizationRequiredHandler(appChangePool)) m.Add("Get", "/apps/{app}/metric/envs", authorizationRequiredHandler(appMetricEnvs)) m.Add("Post", "/apps/{app}/routes", AdminRequiredHandler(appRebuildRoutes)) m.Add("Post", "/units/status", authorizationRequiredHandler(setUnitsStatus)) m.Add("Get", "/deploys", authorizationRequiredHandler(deploysList)) m.Add("Get", "/deploys/{deploy}", authorizationRequiredHandler(deployInfo)) m.Add("Get", "/platforms", authorizationRequiredHandler(platformList)) m.Add("Post", "/platforms", AdminRequiredHandler(platformAdd)) m.Add("Put", "/platforms/{name}", AdminRequiredHandler(platformUpdate)) m.Add("Delete", "/platforms/{name}", AdminRequiredHandler(platformRemove)) // These handlers don't use {app} on purpose. Using :app means that only // the token generate for the given app is valid, but these handlers // use a token generated for Gandalf. m.Add("Get", "/apps/{appname}/available", authorizationRequiredHandler(appIsAvailable)) m.Add("Post", "/apps/{appname}/repository/clone", authorizationRequiredHandler(deploy)) m.Add("Post", "/apps/{appname}/deploy", authorizationRequiredHandler(deploy)) // Shell also doesn't use {app} on purpose. Middlewares don't play well // with websocket. m.Add("Get", "/apps/{appname}/shell", websocket.Handler(remoteShellHandler)) m.Add("Get", "/users", AdminRequiredHandler(listUsers)) m.Add("Post", "/users", Handler(createUser)) m.Add("Get", "/users/info", authorizationRequiredHandler(userInfo)) m.Add("Get", "/auth/scheme", Handler(authScheme)) m.Add("Post", "/auth/login", Handler(login)) m.Add("Post", "/users/{email}/password", Handler(resetPassword)) m.Add("Post", "/users/{email}/tokens", Handler(login)) m.Add("Get", "/users/{email}/quota", AdminRequiredHandler(getUserQuota)) m.Add("Post", "/users/{email}/quota", AdminRequiredHandler(changeUserQuota)) m.Add("Delete", "/users/tokens", authorizationRequiredHandler(logout)) m.Add("Put", "/users/password", authorizationRequiredHandler(changePassword)) m.Add("Delete", "/users", authorizationRequiredHandler(removeUser)) m.Add("Get", "/users/keys", authorizationRequiredHandler(listKeys)) m.Add("Post", "/users/keys", authorizationRequiredHandler(addKeyToUser)) m.Add("Delete", "/users/keys", authorizationRequiredHandler(removeKeyFromUser)) m.Add("Get", "/users/api-key", authorizationRequiredHandler(showAPIToken)) m.Add("Post", "/users/api-key", authorizationRequiredHandler(regenerateAPIToken)) m.Add("Delete", "/logs", AdminRequiredHandler(logRemove)) m.Add("Get", "/logs", websocket.Handler(addLogs)) m.Add("Get", "/teams", authorizationRequiredHandler(teamList)) m.Add("Post", "/teams", authorizationRequiredHandler(createTeam)) m.Add("Get", "/teams/{name}", authorizationRequiredHandler(getTeam)) m.Add("Delete", "/teams/{name}", authorizationRequiredHandler(removeTeam)) m.Add("Put", "/teams/{team}/{user}", authorizationRequiredHandler(addUserToTeam)) m.Add("Delete", "/teams/{team}/{user}", authorizationRequiredHandler(removeUserFromTeam)) m.Add("Put", "/swap", authorizationRequiredHandler(swap)) m.Add("Get", "/healthcheck/", http.HandlerFunc(healthcheck)) m.Add("Get", "/iaas/machines", AdminRequiredHandler(machinesList)) m.Add("Delete", "/iaas/machines/{machine_id}", AdminRequiredHandler(machineDestroy)) m.Add("Get", "/iaas/templates", AdminRequiredHandler(templatesList)) m.Add("Post", "/iaas/templates", AdminRequiredHandler(templateCreate)) m.Add("Put", "/iaas/templates/{template_name}", AdminRequiredHandler(templateUpdate)) m.Add("Delete", "/iaas/templates/{template_name}", AdminRequiredHandler(templateDestroy)) m.Add("Get", "/plans", authorizationRequiredHandler(listPlans)) m.Add("Post", "/plans", AdminRequiredHandler(addPlan)) m.Add("Delete", "/plans/{planname}", AdminRequiredHandler(removePlan)) m.Add("Get", "/plans/routers", AdminRequiredHandler(listRouters)) m.Add("Get", "/debug/goroutines", AdminRequiredHandler(dumpGoroutines)) m.Add("Get", "/pools", authorizationRequiredHandler(listPoolsToUser)) m.Add("Get", "/pool", AdminRequiredHandler(listPoolHandler)) m.Add("Post", "/pool", AdminRequiredHandler(addPoolHandler)) m.Add("Delete", "/pool", AdminRequiredHandler(removePoolHandler)) m.Add("Post", "/pool/{name}", AdminRequiredHandler(poolUpdateHandler)) m.Add("Post", "/pool/{name}/team", AdminRequiredHandler(addTeamToPoolHandler)) m.Add("Delete", "/pool/{name}/team", AdminRequiredHandler(removeTeamToPoolHandler)) m.Add("Get", "/debug/pprof/", AdminRequiredHandler(indexHandler)) m.Add("Get", "/debug/pprof/cmdline", AdminRequiredHandler(cmdlineHandler)) m.Add("Get", "/debug/pprof/profile", AdminRequiredHandler(profileHandler)) m.Add("Get", "/debug/pprof/symbol", AdminRequiredHandler(symbolHandler)) m.Add("Get", "/debug/pprof/heap", AdminRequiredHandler(indexHandler)) m.Add("Get", "/debug/pprof/goroutine", AdminRequiredHandler(indexHandler)) m.Add("Get", "/debug/pprof/threadcreate", AdminRequiredHandler(indexHandler)) m.Add("Get", "/debug/pprof/block", AdminRequiredHandler(indexHandler)) n := negroni.New() n.Use(negroni.NewRecovery()) n.Use(newLoggerMiddleware()) n.UseHandler(m) n.Use(negroni.HandlerFunc(contextClearerMiddleware)) n.Use(negroni.HandlerFunc(flushingWriterMiddleware)) n.Use(negroni.HandlerFunc(errorHandlingMiddleware)) n.Use(negroni.HandlerFunc(setVersionHeadersMiddleware)) n.Use(negroni.HandlerFunc(authTokenMiddleware)) n.Use(&appLockMiddleware{excludedHandlers: []http.Handler{ logPostHandler, runHandler, forceDeleteLockHandler, registerUnitHandler, setUnitStatusHandler, }}) n.UseHandler(http.HandlerFunc(runDelayedHandler)) if !dry { var startupMessage string routers, err := router.List() if err != nil { fatal(err) } for _, routerDesc := range routers { var r router.Router r, err = router.Get(routerDesc.Name) if err != nil { fatal(err) } fmt.Printf("Registered router %q", routerDesc.Name) if messageRouter, ok := r.(router.MessageRouter); ok { startupMessage, err = messageRouter.StartupMessage() if err == nil && startupMessage != "" { fmt.Printf(": %s", startupMessage) } } fmt.Println() } defaultRouter, _ := config.GetString("docker:router") fmt.Printf("Default router is %q.\n", defaultRouter) repoManager, err := config.GetString("repo-manager") if err != nil { repoManager = "gandalf" fmt.Println("Warning: configuration didn't declare a repository manager, using default manager.") } fmt.Printf("Using %q repository manager.\n", repoManager) provisioner, err := getProvisioner() if err != nil { fmt.Println("Warning: configuration didn't declare a provisioner, using default provisioner.") } app.Provisioner, err = provision.Get(provisioner) if err != nil { fatal(err) } fmt.Printf("Using %q provisioner.\n", provisioner) if initializableProvisioner, ok := app.Provisioner.(provision.InitializableProvisioner); ok { err = initializableProvisioner.Initialize() if err != nil { fatal(err) } } if messageProvisioner, ok := app.Provisioner.(provision.MessageProvisioner); ok { startupMessage, err = messageProvisioner.StartupMessage() if err == nil && startupMessage != "" { fmt.Print(startupMessage) } } scheme, err := getAuthScheme() if err != nil { fmt.Printf("Warning: configuration didn't declare auth:scheme, using default scheme.\n") } app.AuthScheme, err = auth.GetScheme(scheme) if err != nil { fatal(err) } fmt.Printf("Using %q auth scheme.\n", scheme) fmt.Println("Checking components status:") results := hc.Check() for _, result := range results { if result.Status != hc.HealthCheckOK { fmt.Printf(" WARNING: %q is not working: %s\n", result.Name, result.Status) } } fmt.Println(" Components checked.") listen, err := config.GetString("listen") if err != nil { fatal(err) } shutdownChan := make(chan bool) shutdownTimeout, _ := config.GetInt("shutdown-timeout") if shutdownTimeout == 0 { shutdownTimeout = 10 * 60 } idleTracker := newIdleTracker() shutdown.Register(idleTracker) shutdown.Register(&logTracker) readTimeout, _ := config.GetInt("server:read-timeout") writeTimeout, _ := config.GetInt("server:write-timeout") srv := &graceful.Server{ Timeout: time.Duration(shutdownTimeout) * time.Second, Server: &http.Server{ ReadTimeout: time.Duration(readTimeout) * time.Second, WriteTimeout: time.Duration(writeTimeout) * time.Second, Addr: listen, Handler: n, }, ConnState: func(conn net.Conn, state http.ConnState) { idleTracker.trackConn(conn, state) }, ShutdownInitiated: func() { fmt.Println("tsuru is shutting down, waiting for pending connections to finish.") handlers := shutdown.All() wg := sync.WaitGroup{} for _, h := range handlers { wg.Add(1) go func(h shutdown.Shutdownable) { defer wg.Done() fmt.Printf("running shutdown handler for %v...\n", h) h.Shutdown() fmt.Printf("running shutdown handler for %v. DONE.\n", h) }(h) } wg.Wait() close(shutdownChan) }, } tls, _ := config.GetBool("use-tls") if tls { var ( certFile string keyFile string ) certFile, err = config.GetString("tls:cert-file") if err != nil { fatal(err) } keyFile, err = config.GetString("tls:key-file") if err != nil { fatal(err) } fmt.Printf("tsuru HTTP/TLS server listening at %s...\n", listen) err = srv.ListenAndServeTLS(certFile, keyFile) } else { fmt.Printf("tsuru HTTP server listening at %s...\n", listen) err = srv.ListenAndServe() } if err != nil { fmt.Printf("Listening stopped: %s\n", err) } <-shutdownChan } return n }
func startServer(handler http.Handler) { shutdownChan := make(chan bool) shutdownTimeout, _ := config.GetInt("shutdown-timeout") if shutdownTimeout == 0 { shutdownTimeout = 10 * 60 } idleTracker := newIdleTracker() shutdown.Register(idleTracker) shutdown.Register(&logTracker) readTimeout, _ := config.GetInt("server:read-timeout") writeTimeout, _ := config.GetInt("server:write-timeout") listen, err := config.GetString("listen") if err != nil { fatal(err) } srv := &graceful.Server{ Timeout: time.Duration(shutdownTimeout) * time.Second, Server: &http.Server{ ReadTimeout: time.Duration(readTimeout) * time.Second, WriteTimeout: time.Duration(writeTimeout) * time.Second, Addr: listen, Handler: handler, }, ConnState: func(conn net.Conn, state http.ConnState) { idleTracker.trackConn(conn, state) }, NoSignalHandling: true, ShutdownInitiated: func() { fmt.Println("tsuru is shutting down, waiting for pending connections to finish.") handlers := shutdown.All() wg := sync.WaitGroup{} for _, h := range handlers { wg.Add(1) go func(h shutdown.Shutdownable) { defer wg.Done() fmt.Printf("running shutdown handler for %v...\n", h) h.Shutdown() fmt.Printf("running shutdown handler for %v. DONE.\n", h) }(h) } wg.Wait() close(shutdownChan) }, } sigChan := make(chan os.Signal, 1) signal.Notify(sigChan, syscall.SIGINT, syscall.SIGTERM) go func() { <-sigChan srv.Stop(srv.Timeout) }() var startupMessage string routers, err := router.List() if err != nil { fatal(err) } for _, routerDesc := range routers { var r router.Router r, err = router.Get(routerDesc.Name) if err != nil { fatal(err) } fmt.Printf("Registered router %q", routerDesc.Name) if messageRouter, ok := r.(router.MessageRouter); ok { startupMessage, err = messageRouter.StartupMessage() if err == nil && startupMessage != "" { fmt.Printf(": %s", startupMessage) } } fmt.Println() } defaultRouter, _ := config.GetString("docker:router") fmt.Printf("Default router is %q.\n", defaultRouter) repoManager, err := config.GetString("repo-manager") if err != nil { repoManager = "gandalf" fmt.Println("Warning: configuration didn't declare a repository manager, using default manager.") } fmt.Printf("Using %q repository manager.\n", repoManager) err = rebuild.RegisterTask(appFinder) if err != nil { fatal(err) } scheme, err := getAuthScheme() if err != nil { fmt.Printf("Warning: configuration didn't declare auth:scheme, using default scheme.\n") } app.AuthScheme, err = auth.GetScheme(scheme) if err != nil { fatal(err) } fmt.Printf("Using %q auth scheme.\n", scheme) err = provision.InitializeAll() if err != nil { fatal(err) } _, err = healer.Initialize() if err != nil { fatal(err) } fmt.Println("Checking components status:") results := hc.Check() for _, result := range results { if result.Status != hc.HealthCheckOK { fmt.Printf(" WARNING: %q is not working: %s\n", result.Name, result.Status) } } fmt.Println(" Components checked.") tls, _ := config.GetBool("use-tls") if tls { var ( certFile string keyFile string ) certFile, err = config.GetString("tls:cert-file") if err != nil { fatal(err) } keyFile, err = config.GetString("tls:key-file") if err != nil { fatal(err) } fmt.Printf("tsuru HTTP/TLS server listening at %s...\n", listen) err = srv.ListenAndServeTLS(certFile, keyFile) } else { fmt.Printf("tsuru HTTP server listening at %s...\n", listen) err = srv.ListenAndServe() } if err != nil { fmt.Printf("Listening stopped: %s\n", err) if errOp, ok := err.(*net.OpError); ok { if errOp.Op == "listen" { os.Exit(1) } } } <-shutdownChan }