github.com/prestonp/nomad@v0.10.4/command/agent/agent_endpoint.go (about) 1 package agent 2 3 import ( 4 "bytes" 5 "context" 6 "encoding/json" 7 "fmt" 8 "io" 9 "net" 10 "net/http" 11 "sort" 12 "strconv" 13 "strings" 14 15 "github.com/docker/docker/pkg/ioutils" 16 log "github.com/hashicorp/go-hclog" 17 "github.com/hashicorp/nomad/acl" 18 cstructs "github.com/hashicorp/nomad/client/structs" 19 "github.com/hashicorp/nomad/command/agent/pprof" 20 "github.com/hashicorp/nomad/nomad/structs" 21 "github.com/hashicorp/serf/serf" 22 "github.com/mitchellh/copystructure" 23 "github.com/ugorji/go/codec" 24 ) 25 26 type Member struct { 27 Name string 28 Addr net.IP 29 Port uint16 30 Tags map[string]string 31 Status string 32 ProtocolMin uint8 33 ProtocolMax uint8 34 ProtocolCur uint8 35 DelegateMin uint8 36 DelegateMax uint8 37 DelegateCur uint8 38 } 39 40 func nomadMember(m serf.Member) Member { 41 return Member{ 42 Name: m.Name, 43 Addr: m.Addr, 44 Port: m.Port, 45 Tags: m.Tags, 46 Status: m.Status.String(), 47 ProtocolMin: m.ProtocolMin, 48 ProtocolMax: m.ProtocolMax, 49 ProtocolCur: m.ProtocolCur, 50 DelegateMin: m.DelegateMin, 51 DelegateMax: m.DelegateMax, 52 DelegateCur: m.DelegateCur, 53 } 54 } 55 56 func (s *HTTPServer) AgentSelfRequest(resp http.ResponseWriter, req *http.Request) (interface{}, error) { 57 if req.Method != "GET" { 58 return nil, CodedError(405, ErrInvalidMethod) 59 } 60 61 var secret string 62 s.parseToken(req, &secret) 63 64 var aclObj *acl.ACL 65 var err error 66 67 // Get the member as a server 68 var member serf.Member 69 if srv := s.agent.Server(); srv != nil { 70 member = srv.LocalMember() 71 aclObj, err = srv.ResolveToken(secret) 72 } else { 73 // Not a Server; use the Client for token resolution 74 aclObj, err = s.agent.Client().ResolveToken(secret) 75 } 76 77 if err != nil { 78 return nil, err 79 } 80 81 // Check agent read permissions 82 if aclObj != nil && !aclObj.AllowAgentRead() { 83 return nil, structs.ErrPermissionDenied 84 } 85 86 self := agentSelf{ 87 Member: nomadMember(member), 88 Stats: s.agent.Stats(), 89 } 90 if ac, err := copystructure.Copy(s.agent.config); err != nil { 91 return nil, CodedError(500, err.Error()) 92 } else { 93 self.Config = ac.(*Config) 94 } 95 96 if self.Config != nil && self.Config.Vault != nil && self.Config.Vault.Token != "" { 97 self.Config.Vault.Token = "<redacted>" 98 } 99 100 if self.Config != nil && self.Config.ACL != nil && self.Config.ACL.ReplicationToken != "" { 101 self.Config.ACL.ReplicationToken = "<redacted>" 102 } 103 104 if self.Config != nil && self.Config.Consul != nil && self.Config.Consul.Token != "" { 105 self.Config.Consul.Token = "<redacted>" 106 } 107 108 if self.Config != nil && self.Config.Telemetry != nil && self.Config.Telemetry.CirconusAPIToken != "" { 109 self.Config.Telemetry.CirconusAPIToken = "<redacted>" 110 } 111 112 return self, nil 113 } 114 115 func (s *HTTPServer) AgentJoinRequest(resp http.ResponseWriter, req *http.Request) (interface{}, error) { 116 if req.Method != "PUT" && req.Method != "POST" { 117 return nil, CodedError(405, ErrInvalidMethod) 118 } 119 srv := s.agent.Server() 120 if srv == nil { 121 return nil, CodedError(501, ErrInvalidMethod) 122 } 123 124 // Get the join addresses 125 query := req.URL.Query() 126 addrs := query["address"] 127 if len(addrs) == 0 { 128 return nil, CodedError(400, "missing address to join") 129 } 130 131 // Attempt the join 132 num, err := srv.Join(addrs) 133 var errStr string 134 if err != nil { 135 errStr = err.Error() 136 } 137 return joinResult{num, errStr}, nil 138 } 139 140 func (s *HTTPServer) AgentMembersRequest(resp http.ResponseWriter, req *http.Request) (interface{}, error) { 141 if req.Method != "GET" { 142 return nil, CodedError(405, ErrInvalidMethod) 143 } 144 145 args := &structs.GenericRequest{} 146 if s.parse(resp, req, &args.Region, &args.QueryOptions) { 147 return nil, nil 148 } 149 150 var out structs.ServerMembersResponse 151 if err := s.agent.RPC("Status.Members", args, &out); err != nil { 152 return nil, err 153 } 154 155 return out, nil 156 } 157 158 func (s *HTTPServer) AgentMonitor(resp http.ResponseWriter, req *http.Request) (interface{}, error) { 159 // Get the provided loglevel. 160 logLevel := req.URL.Query().Get("log_level") 161 if logLevel == "" { 162 logLevel = "INFO" 163 } 164 165 if log.LevelFromString(logLevel) == log.NoLevel { 166 return nil, CodedError(400, fmt.Sprintf("Unknown log level: %s", logLevel)) 167 } 168 169 logJSON := false 170 logJSONStr := req.URL.Query().Get("log_json") 171 if logJSONStr != "" { 172 parsed, err := strconv.ParseBool(logJSONStr) 173 if err != nil { 174 return nil, CodedError(400, fmt.Sprintf("Unknown option for log json: %v", err)) 175 } 176 logJSON = parsed 177 } 178 179 plainText := false 180 plainTextStr := req.URL.Query().Get("plain") 181 if plainTextStr != "" { 182 parsed, err := strconv.ParseBool(plainTextStr) 183 if err != nil { 184 return nil, CodedError(400, fmt.Sprintf("Unknown option for plain: %v", err)) 185 } 186 plainText = parsed 187 } 188 189 nodeID := req.URL.Query().Get("node_id") 190 // Build the request and parse the ACL token 191 args := cstructs.MonitorRequest{ 192 NodeID: nodeID, 193 ServerID: req.URL.Query().Get("server_id"), 194 LogLevel: logLevel, 195 LogJSON: logJSON, 196 PlainText: plainText, 197 } 198 199 // if node and server were requested return error 200 if args.NodeID != "" && args.ServerID != "" { 201 return nil, CodedError(400, "Cannot target node and server simultaneously") 202 } 203 204 s.parse(resp, req, &args.QueryOptions.Region, &args.QueryOptions) 205 206 // Make the RPC 207 var handler structs.StreamingRpcHandler 208 var handlerErr error 209 if nodeID != "" { 210 // Determine the handler to use 211 useLocalClient, useClientRPC, useServerRPC := s.rpcHandlerForNode(nodeID) 212 if useLocalClient { 213 handler, handlerErr = s.agent.Client().StreamingRpcHandler("Agent.Monitor") 214 } else if useClientRPC { 215 handler, handlerErr = s.agent.Client().RemoteStreamingRpcHandler("Agent.Monitor") 216 } else if useServerRPC { 217 handler, handlerErr = s.agent.Server().StreamingRpcHandler("Agent.Monitor") 218 } else { 219 handlerErr = CodedError(400, "No local Node and node_id not provided") 220 } 221 // No node id monitor current server/client 222 } else if srv := s.agent.Server(); srv != nil { 223 handler, handlerErr = srv.StreamingRpcHandler("Agent.Monitor") 224 } else { 225 handler, handlerErr = s.agent.Client().StreamingRpcHandler("Agent.Monitor") 226 } 227 228 if handlerErr != nil { 229 return nil, CodedError(500, handlerErr.Error()) 230 } 231 httpPipe, handlerPipe := net.Pipe() 232 decoder := codec.NewDecoder(httpPipe, structs.MsgpackHandle) 233 encoder := codec.NewEncoder(httpPipe, structs.MsgpackHandle) 234 235 ctx, cancel := context.WithCancel(req.Context()) 236 go func() { 237 <-ctx.Done() 238 httpPipe.Close() 239 }() 240 241 // Create an output that gets flushed on every write 242 output := ioutils.NewWriteFlusher(resp) 243 244 // create an error channel to handle errors 245 errCh := make(chan HTTPCodedError, 2) 246 247 // stream response 248 go func() { 249 defer cancel() 250 251 // Send the request 252 if err := encoder.Encode(args); err != nil { 253 errCh <- CodedError(500, err.Error()) 254 return 255 } 256 257 for { 258 select { 259 case <-ctx.Done(): 260 errCh <- nil 261 return 262 default: 263 } 264 265 var res cstructs.StreamErrWrapper 266 if err := decoder.Decode(&res); err != nil { 267 errCh <- CodedError(500, err.Error()) 268 return 269 } 270 decoder.Reset(httpPipe) 271 272 if err := res.Error; err != nil { 273 if err.Code != nil { 274 errCh <- CodedError(int(*err.Code), err.Error()) 275 return 276 } 277 } 278 279 if _, err := io.Copy(output, bytes.NewReader(res.Payload)); err != nil { 280 errCh <- CodedError(500, err.Error()) 281 return 282 } 283 } 284 }() 285 286 handler(handlerPipe) 287 cancel() 288 codedErr := <-errCh 289 290 if codedErr != nil && 291 (codedErr == io.EOF || 292 strings.Contains(codedErr.Error(), "closed") || 293 strings.Contains(codedErr.Error(), "EOF")) { 294 codedErr = nil 295 } 296 return nil, codedErr 297 } 298 299 func (s *HTTPServer) AgentForceLeaveRequest(resp http.ResponseWriter, req *http.Request) (interface{}, error) { 300 if req.Method != "PUT" && req.Method != "POST" { 301 return nil, CodedError(405, ErrInvalidMethod) 302 } 303 srv := s.agent.Server() 304 if srv == nil { 305 return nil, CodedError(501, ErrInvalidMethod) 306 } 307 308 var secret string 309 s.parseToken(req, &secret) 310 311 // Check agent write permissions 312 if aclObj, err := s.agent.Server().ResolveToken(secret); err != nil { 313 return nil, err 314 } else if aclObj != nil && !aclObj.AllowAgentWrite() { 315 return nil, structs.ErrPermissionDenied 316 } 317 318 // Get the node to eject 319 node := req.URL.Query().Get("node") 320 if node == "" { 321 return nil, CodedError(400, "missing node to force leave") 322 } 323 324 // Attempt remove 325 err := srv.RemoveFailedNode(node) 326 return nil, err 327 } 328 329 func (s *HTTPServer) AgentPprofRequest(resp http.ResponseWriter, req *http.Request) ([]byte, error) { 330 path := strings.TrimPrefix(req.URL.Path, "/v1/agent/pprof/") 331 switch path { 332 case "": 333 // no root index route 334 return nil, CodedError(404, ErrInvalidMethod) 335 case "cmdline": 336 return s.agentPprof(pprof.CmdReq, resp, req) 337 case "profile": 338 return s.agentPprof(pprof.CPUReq, resp, req) 339 case "trace": 340 return s.agentPprof(pprof.TraceReq, resp, req) 341 default: 342 // Add profile to request 343 values := req.URL.Query() 344 values.Add("profile", path) 345 req.URL.RawQuery = values.Encode() 346 347 // generic pprof profile request 348 return s.agentPprof(pprof.LookupReq, resp, req) 349 } 350 } 351 352 func (s *HTTPServer) agentPprof(reqType pprof.ReqType, resp http.ResponseWriter, req *http.Request) ([]byte, error) { 353 354 // Parse query param int values 355 // Errors are dropped here and default to their zero values. 356 // This is to mimick the functionality that net/pprof implements. 357 seconds, _ := strconv.Atoi(req.URL.Query().Get("seconds")) 358 debug, _ := strconv.Atoi(req.URL.Query().Get("debug")) 359 gc, _ := strconv.Atoi(req.URL.Query().Get("gc")) 360 361 // default to 1 second 362 if seconds == 0 { 363 seconds = 1 364 } 365 366 // Create the request 367 args := &structs.AgentPprofRequest{ 368 NodeID: req.URL.Query().Get("node_id"), 369 Profile: req.URL.Query().Get("profile"), 370 ServerID: req.URL.Query().Get("server_id"), 371 Debug: debug, 372 GC: gc, 373 ReqType: reqType, 374 Seconds: seconds, 375 } 376 377 // if node and server were requested return error 378 if args.NodeID != "" && args.ServerID != "" { 379 return nil, CodedError(400, "Cannot target node and server simultaneously") 380 } 381 382 s.parse(resp, req, &args.QueryOptions.Region, &args.QueryOptions) 383 384 var reply structs.AgentPprofResponse 385 var rpcErr error 386 if args.NodeID != "" { 387 // Make the RPC 388 localClient, remoteClient, localServer := s.rpcHandlerForNode(args.NodeID) 389 if localClient { 390 rpcErr = s.agent.Client().ClientRPC("Agent.Profile", &args, &reply) 391 } else if remoteClient { 392 rpcErr = s.agent.Client().RPC("Agent.Profile", &args, &reply) 393 } else if localServer { 394 rpcErr = s.agent.Server().RPC("Agent.Profile", &args, &reply) 395 } 396 // No node id, profile current server/client 397 } else if srv := s.agent.Server(); srv != nil { 398 rpcErr = srv.RPC("Agent.Profile", &args, &reply) 399 } else { 400 rpcErr = s.agent.Client().RPC("Agent.Profile", &args, &reply) 401 } 402 403 if rpcErr != nil { 404 return nil, rpcErr 405 } 406 407 // Set headers from profile request 408 for k, v := range reply.HTTPHeaders { 409 resp.Header().Set(k, v) 410 } 411 412 return reply.Payload, nil 413 } 414 415 // AgentServersRequest is used to query the list of servers used by the Nomad 416 // Client for RPCs. This endpoint can also be used to update the list of 417 // servers for a given agent. 418 func (s *HTTPServer) AgentServersRequest(resp http.ResponseWriter, req *http.Request) (interface{}, error) { 419 switch req.Method { 420 case "PUT", "POST": 421 return s.updateServers(resp, req) 422 case "GET": 423 return s.listServers(resp, req) 424 default: 425 return nil, CodedError(405, ErrInvalidMethod) 426 } 427 } 428 429 func (s *HTTPServer) listServers(resp http.ResponseWriter, req *http.Request) (interface{}, error) { 430 client := s.agent.Client() 431 if client == nil { 432 return nil, CodedError(501, ErrInvalidMethod) 433 } 434 435 var secret string 436 s.parseToken(req, &secret) 437 438 // Check agent read permissions 439 if aclObj, err := s.agent.Client().ResolveToken(secret); err != nil { 440 return nil, err 441 } else if aclObj != nil && !aclObj.AllowAgentRead() { 442 return nil, structs.ErrPermissionDenied 443 } 444 445 peers := s.agent.client.GetServers() 446 sort.Strings(peers) 447 return peers, nil 448 } 449 450 func (s *HTTPServer) updateServers(resp http.ResponseWriter, req *http.Request) (interface{}, error) { 451 client := s.agent.Client() 452 if client == nil { 453 return nil, CodedError(501, ErrInvalidMethod) 454 } 455 456 // Get the servers from the request 457 servers := req.URL.Query()["address"] 458 if len(servers) == 0 { 459 return nil, CodedError(400, "missing server address") 460 } 461 462 var secret string 463 s.parseToken(req, &secret) 464 465 // Check agent write permissions 466 if aclObj, err := s.agent.Client().ResolveToken(secret); err != nil { 467 return nil, err 468 } else if aclObj != nil && !aclObj.AllowAgentWrite() { 469 return nil, structs.ErrPermissionDenied 470 } 471 472 // Set the servers list into the client 473 s.agent.logger.Trace("adding servers to the client's primary server list", "servers", servers, "path", "/v1/agent/servers", "method", "PUT") 474 if _, err := client.SetServers(servers); err != nil { 475 s.agent.logger.Error("failed adding servers to client's server list", "servers", servers, "error", err, "path", "/v1/agent/servers", "method", "PUT") 476 //TODO is this the right error to return? 477 return nil, CodedError(400, err.Error()) 478 } 479 return nil, nil 480 } 481 482 // KeyringOperationRequest allows an operator to install/delete/use keys 483 func (s *HTTPServer) KeyringOperationRequest(resp http.ResponseWriter, req *http.Request) (interface{}, error) { 484 srv := s.agent.Server() 485 if srv == nil { 486 return nil, CodedError(501, ErrInvalidMethod) 487 } 488 489 var secret string 490 s.parseToken(req, &secret) 491 492 // Check agent write permissions 493 if aclObj, err := srv.ResolveToken(secret); err != nil { 494 return nil, err 495 } else if aclObj != nil && !aclObj.AllowAgentWrite() { 496 return nil, structs.ErrPermissionDenied 497 } 498 499 kmgr := srv.KeyManager() 500 var sresp *serf.KeyResponse 501 var err error 502 503 // Get the key from the req body 504 var args structs.KeyringRequest 505 506 //Get the op 507 op := strings.TrimPrefix(req.URL.Path, "/v1/agent/keyring/") 508 509 switch op { 510 case "list": 511 sresp, err = kmgr.ListKeys() 512 case "install": 513 if err := decodeBody(req, &args); err != nil { 514 return nil, CodedError(500, err.Error()) 515 } 516 sresp, err = kmgr.InstallKey(args.Key) 517 case "use": 518 if err := decodeBody(req, &args); err != nil { 519 return nil, CodedError(500, err.Error()) 520 } 521 sresp, err = kmgr.UseKey(args.Key) 522 case "remove": 523 if err := decodeBody(req, &args); err != nil { 524 return nil, CodedError(500, err.Error()) 525 } 526 sresp, err = kmgr.RemoveKey(args.Key) 527 default: 528 return nil, CodedError(404, "resource not found") 529 } 530 531 if err != nil { 532 return nil, err 533 } 534 kresp := structs.KeyringResponse{ 535 Messages: sresp.Messages, 536 Keys: sresp.Keys, 537 NumNodes: sresp.NumNodes, 538 } 539 return kresp, nil 540 } 541 542 type agentSelf struct { 543 Config *Config `json:"config"` 544 Member Member `json:"member,omitempty"` 545 Stats map[string]map[string]string `json:"stats"` 546 } 547 548 type joinResult struct { 549 NumJoined int `json:"num_joined"` 550 Error string `json:"error"` 551 } 552 553 func (s *HTTPServer) HealthRequest(resp http.ResponseWriter, req *http.Request) (interface{}, error) { 554 if req.Method != "GET" { 555 return nil, CodedError(405, ErrInvalidMethod) 556 } 557 558 var args structs.GenericRequest 559 if s.parse(resp, req, &args.Region, &args.QueryOptions) { 560 return nil, nil 561 } 562 563 health := healthResponse{} 564 getClient := true 565 getServer := true 566 567 // See if we're checking a specific agent type and default to failing 568 if healthType, ok := req.URL.Query()["type"]; ok { 569 getClient = false 570 getServer = false 571 for _, ht := range healthType { 572 switch ht { 573 case "client": 574 getClient = true 575 health.Client = &healthResponseAgent{ 576 Ok: false, 577 Message: "client not enabled", 578 } 579 case "server": 580 getServer = true 581 health.Server = &healthResponseAgent{ 582 Ok: false, 583 Message: "server not enabled", 584 } 585 } 586 } 587 } 588 589 // If we should check the client and it exists assume it's healthy 590 if client := s.agent.Client(); getClient && client != nil { 591 if len(client.GetServers()) == 0 { 592 health.Client = &healthResponseAgent{ 593 Ok: false, 594 Message: "no known servers", 595 } 596 } else { 597 health.Client = &healthResponseAgent{ 598 Ok: true, 599 Message: "ok", 600 } 601 } 602 } 603 604 // If we should check the server and it exists, see if there's a leader 605 if server := s.agent.Server(); getServer && server != nil { 606 health.Server = &healthResponseAgent{ 607 Ok: true, 608 Message: "ok", 609 } 610 611 leader := "" 612 if err := s.agent.RPC("Status.Leader", &args, &leader); err != nil { 613 health.Server.Ok = false 614 health.Server.Message = err.Error() 615 } else if leader == "" { 616 health.Server.Ok = false 617 health.Server.Message = "no leader" 618 } 619 } 620 621 if health.ok() { 622 return &health, nil 623 } 624 625 jsonResp, err := json.Marshal(&health) 626 if err != nil { 627 return nil, err 628 } 629 return nil, CodedError(500, string(jsonResp)) 630 } 631 632 type healthResponse struct { 633 Client *healthResponseAgent `json:"client,omitempty"` 634 Server *healthResponseAgent `json:"server,omitempty"` 635 } 636 637 // ok returns true as long as neither Client nor Server have Ok=false. 638 func (h healthResponse) ok() bool { 639 if h.Client != nil && !h.Client.Ok { 640 return false 641 } 642 if h.Server != nil && !h.Server.Ok { 643 return false 644 } 645 return true 646 } 647 648 type healthResponseAgent struct { 649 Ok bool `json:"ok"` 650 Message string `json:"message,omitempty"` 651 }