mirror of https://github.com/helm/helm
You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
695 lines
19 KiB
695 lines
19 KiB
/*
|
|
Copyright 2015 The Kubernetes Authors All rights reserved.
|
|
|
|
Licensed under the Apache License, Version 2.0 (the "License");
|
|
you may not use this file except in compliance with the License.
|
|
You may obtain a copy of the License at
|
|
|
|
http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
Unless required by applicable law or agreed to in writing, software
|
|
distributed under the License is distributed on an "AS IS" BASIS,
|
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
See the License for the specific language governing permissions and
|
|
limitations under the License.
|
|
*/
|
|
|
|
package main
|
|
|
|
import (
|
|
"encoding/json"
|
|
"errors"
|
|
"fmt"
|
|
"io"
|
|
"io/ioutil"
|
|
"log"
|
|
"net"
|
|
"net/http"
|
|
"net/url"
|
|
"os"
|
|
"regexp"
|
|
"strings"
|
|
|
|
"github.com/ghodss/yaml"
|
|
"github.com/gorilla/mux"
|
|
"github.com/kubernetes/helm/cmd/manager/manager"
|
|
"github.com/kubernetes/helm/cmd/manager/repository"
|
|
"github.com/kubernetes/helm/cmd/manager/repository/persistent"
|
|
"github.com/kubernetes/helm/cmd/manager/repository/transient"
|
|
"github.com/kubernetes/helm/cmd/manager/router"
|
|
"github.com/kubernetes/helm/pkg/common"
|
|
"github.com/kubernetes/helm/pkg/httputil"
|
|
"github.com/kubernetes/helm/pkg/registry"
|
|
"github.com/kubernetes/helm/pkg/util"
|
|
)
|
|
|
|
// Deprecated. Use Context.Manager instead.
|
|
var backend manager.Manager
|
|
|
|
// Route defines a routing table entry to be registered with gorilla/mux.
|
|
//
|
|
// Route is deprecated. Use router.Routes instead.
|
|
type Route struct {
|
|
Name string
|
|
Path string
|
|
Methods string
|
|
HandlerFunc http.HandlerFunc
|
|
Type string
|
|
}
|
|
|
|
func registerDeploymentRoutes(c *router.Context, h *router.Handler) {
|
|
h.Add("GET /healthz", healthz)
|
|
h.Add("GET /deployments", listDeploymentsHandlerFunc)
|
|
h.Add("GET /deployments/*", getDeploymentHandlerFunc)
|
|
h.Add("POST /deployments", createDeploymentHandlerFunc)
|
|
h.Add("DELETE /deployments/*", deleteDeploymentHandlerFunc)
|
|
h.Add("PUT /deployments/*", putDeploymentHandlerFunc)
|
|
h.Add("GET /deployments/*/manifests", listManifestsHandlerFunc)
|
|
h.Add("GET /deployments/*/manifests/*", getManifestHandlerFunc)
|
|
h.Add("POST /expand", expandHandlerFunc)
|
|
h.Add("GET /types", listTypesHandlerFunc)
|
|
h.Add("GET /types/*/instances", listTypeInstancesHandlerFunc)
|
|
h.Add("GET /types/*/registry", getRegistryForTypeHandlerFunc)
|
|
h.Add("GET /types/*/metadata", getMetadataForTypeHandlerFunc)
|
|
h.Add("GET /registries", listRegistriesHandlerFunc)
|
|
h.Add("GET /registries/*", getRegistryHandlerFunc)
|
|
h.Add("POST /registries/*", createRegistryHandlerFunc)
|
|
h.Add("GET /registries/*/types", listRegistryTypesHandlerFunc)
|
|
h.Add("GET /registries/*/types/*", getDownloadURLsHandlerFunc)
|
|
h.Add("GET /registries/*/download", getFileHandlerFunc)
|
|
h.Add("POST /credentials/*", createCredentialHandlerFunc)
|
|
h.Add("GET /credentials/*", getCredentialHandlerFunc)
|
|
}
|
|
|
|
func healthz(w http.ResponseWriter, r *http.Request, c *router.Context) error {
|
|
log.Println("manager: healthz checkpoint")
|
|
// TODO: This should check the availability of the repository, and fail if it
|
|
// cannot connect.
|
|
fmt.Fprintln(w, "OK")
|
|
return nil
|
|
}
|
|
|
|
func setupDependencies(c *router.Context) error {
|
|
var credentialProvider common.CredentialProvider
|
|
if c.Config.CredentialFile != "" {
|
|
if c.Config.CredentialSecrets {
|
|
return errors.New("Both credentialFile and credentialSecrets are set")
|
|
}
|
|
var err error
|
|
credentialProvider, err = registry.NewFilebasedCredentialProvider(c.Config.CredentialFile)
|
|
if err != nil {
|
|
return fmt.Errorf("cannot create credential provider %s: %s", c.Config.CredentialFile, err)
|
|
}
|
|
} else if *credentialSecrets {
|
|
credentialProvider = registry.NewSecretsCredentialProvider()
|
|
} else {
|
|
credentialProvider = registry.NewInmemCredentialProvider()
|
|
}
|
|
c.CredentialProvider = credentialProvider
|
|
c.Manager = newManager(c)
|
|
|
|
// FIXME: As soon as we can, we need to get rid of this.
|
|
backend = c.Manager
|
|
return nil
|
|
}
|
|
|
|
const expanderPort = "8080"
|
|
const deployerPort = "8080"
|
|
|
|
func newManager(c *router.Context) manager.Manager {
|
|
cfg := c.Config
|
|
service := registry.NewInmemRegistryService()
|
|
registryProvider := registry.NewDefaultRegistryProvider(c.CredentialProvider, service)
|
|
resolver := manager.NewTypeResolver(registryProvider, util.DefaultHTTPClient())
|
|
expander := manager.NewExpander(getServiceURL(cfg.ExpanderURL, cfg.ExpanderName, expanderPort), resolver)
|
|
deployer := manager.NewDeployer(getServiceURL(cfg.DeployerURL, cfg.DeployerName, deployerPort))
|
|
address := strings.TrimPrefix(getServiceURL(cfg.MongoAddress, cfg.MongoName, cfg.MongoPort), "http://")
|
|
repository := createRepository(address)
|
|
return manager.NewManager(expander, deployer, repository, registryProvider, service, c.CredentialProvider)
|
|
}
|
|
|
|
func createRepository(address string) repository.Repository {
|
|
r, err := persistent.NewRepository(address)
|
|
if err != nil {
|
|
r = transient.NewRepository()
|
|
}
|
|
|
|
return r
|
|
}
|
|
|
|
func getServiceURL(serviceURL, serviceName, servicePort string) string {
|
|
if serviceURL == "" {
|
|
serviceURL = makeEnvVariableURL(serviceName)
|
|
if serviceURL == "" {
|
|
addrs, err := net.LookupHost(serviceName)
|
|
if err != nil || len(addrs) < 1 {
|
|
log.Fatalf("cannot resolve service:%v. environment:%v\n", serviceName, os.Environ())
|
|
}
|
|
|
|
serviceURL = fmt.Sprintf("http://%s:%s", addrs[0], servicePort)
|
|
}
|
|
}
|
|
|
|
return serviceURL
|
|
}
|
|
|
|
// makeEnvVariableURL takes a service name and returns the value of the
|
|
// environment variable that identifies its URL, if it exists, or the empty
|
|
// string, if it doesn't.
|
|
func makeEnvVariableURL(str string) string {
|
|
prefix := makeEnvVariableName(str)
|
|
url := os.Getenv(prefix + "_PORT")
|
|
return strings.Replace(url, "tcp", "http", 1)
|
|
}
|
|
|
|
// makeEnvVariableName is copied from the Kubernetes source,
|
|
// which is referenced by the documentation for service environment variables.
|
|
func makeEnvVariableName(str string) string {
|
|
// TODO: If we simplify to "all names are DNS1123Subdomains" this
|
|
// will need two tweaks:
|
|
// 1) Handle leading digits
|
|
// 2) Handle dots
|
|
return strings.ToUpper(strings.Replace(str, "-", "_", -1))
|
|
}
|
|
|
|
func listDeploymentsHandlerFunc(w http.ResponseWriter, r *http.Request, c *router.Context) error {
|
|
handler := "manager: list deployments"
|
|
util.LogHandlerEntry(handler, r)
|
|
l, err := backend.ListDeployments()
|
|
if err != nil {
|
|
util.LogAndReturnError(handler, http.StatusInternalServerError, err, w)
|
|
return nil
|
|
}
|
|
var names []string
|
|
for _, d := range l {
|
|
names = append(names, d.Name)
|
|
}
|
|
|
|
util.LogHandlerExitWithJSON(handler, w, names, http.StatusOK)
|
|
return nil
|
|
}
|
|
|
|
func getDeploymentHandlerFunc(w http.ResponseWriter, r *http.Request, c *router.Context) error {
|
|
handler := "manager: get deployment"
|
|
util.LogHandlerEntry(handler, r)
|
|
name, err := pos(w, r, 2)
|
|
if err != nil {
|
|
return nil
|
|
}
|
|
|
|
d, err := backend.GetDeployment(name)
|
|
if err != nil {
|
|
util.LogAndReturnError(handler, http.StatusBadRequest, err, w)
|
|
return nil
|
|
}
|
|
|
|
util.LogHandlerExitWithJSON(handler, w, d, http.StatusOK)
|
|
return nil
|
|
}
|
|
|
|
func createDeploymentHandlerFunc(w http.ResponseWriter, r *http.Request, c *router.Context) error {
|
|
handler := "manager: create deployment"
|
|
util.LogHandlerEntry(handler, r)
|
|
defer r.Body.Close()
|
|
t := getTemplate(w, r, handler)
|
|
if t != nil {
|
|
d, err := backend.CreateDeployment(t)
|
|
if err != nil {
|
|
httputil.BadRequest(w, r, err)
|
|
return nil
|
|
}
|
|
|
|
util.LogHandlerExitWithJSON(handler, w, d, http.StatusCreated)
|
|
}
|
|
return nil
|
|
}
|
|
|
|
func deleteDeploymentHandlerFunc(w http.ResponseWriter, r *http.Request, c *router.Context) error {
|
|
handler := "manager: delete deployment"
|
|
util.LogHandlerEntry(handler, r)
|
|
defer r.Body.Close()
|
|
name, err := pos(w, r, 2)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
d, err := c.Manager.DeleteDeployment(name, true)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
util.LogHandlerExitWithJSON(handler, w, d, http.StatusOK)
|
|
return nil
|
|
}
|
|
|
|
func putDeploymentHandlerFunc(w http.ResponseWriter, r *http.Request, c *router.Context) error {
|
|
handler := "manager: update deployment"
|
|
util.LogHandlerEntry(handler, r)
|
|
defer r.Body.Close()
|
|
name, err := pos(w, r, 2)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
t := getTemplate(w, r, handler)
|
|
if t != nil {
|
|
d, err := backend.PutDeployment(name, t)
|
|
if err != nil {
|
|
httputil.BadRequest(w, r, err)
|
|
return nil
|
|
}
|
|
|
|
util.LogHandlerExitWithJSON(handler, w, d, http.StatusCreated)
|
|
}
|
|
return nil
|
|
}
|
|
|
|
// pos gets a path item by position.
|
|
//
|
|
// For example. the path "/foo/bar" has three positions: "" at 0, "foo" at
|
|
// 1, and "bar" at 2.
|
|
//
|
|
// For verb/path combos, position 0 will be the verb: "GET /foo/bar" will have
|
|
// "GET " at position 0.
|
|
func pos(w http.ResponseWriter, r *http.Request, i int) (string, error) {
|
|
parts := strings.Split(r.URL.Path, "/")
|
|
if len(parts) < i-1 {
|
|
return "", fmt.Errorf("No index for %d", i)
|
|
}
|
|
return parts[i], nil
|
|
}
|
|
|
|
func getPathVariable(w http.ResponseWriter, r *http.Request, variable, handler string) (string, error) {
|
|
vars := mux.Vars(r)
|
|
escaped, ok := vars[variable]
|
|
if !ok {
|
|
e := fmt.Errorf("%s name not found in URL", variable)
|
|
util.LogAndReturnError(handler, http.StatusBadRequest, e, w)
|
|
return "", e
|
|
}
|
|
|
|
unescaped, err := url.QueryUnescape(escaped)
|
|
if err != nil {
|
|
e := fmt.Errorf("cannot decode name (%v)", variable)
|
|
util.LogAndReturnError(handler, http.StatusBadRequest, e, w)
|
|
return "", e
|
|
}
|
|
|
|
return unescaped, nil
|
|
}
|
|
|
|
func getTemplate(w http.ResponseWriter, r *http.Request, handler string) *common.Template {
|
|
util.LogHandlerEntry(handler, r)
|
|
j, err := getJSONFromRequest(w, r, handler)
|
|
|
|
if err != nil {
|
|
return nil
|
|
}
|
|
|
|
t := &common.Template{}
|
|
if err := json.Unmarshal(j, t); err != nil {
|
|
e := fmt.Errorf("%v\n%v", err, string(j))
|
|
util.LogAndReturnError(handler, http.StatusBadRequest, e, w)
|
|
return nil
|
|
}
|
|
|
|
return t
|
|
}
|
|
|
|
func listManifestsHandlerFunc(w http.ResponseWriter, r *http.Request, c *router.Context) error {
|
|
handler := "manager: list manifests"
|
|
util.LogHandlerEntry(handler, r)
|
|
deploymentName, err := pos(w, r, 2)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
m, err := backend.ListManifests(deploymentName)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
var manifestNames []string
|
|
for _, manifest := range m {
|
|
manifestNames = append(manifestNames, manifest.Name)
|
|
}
|
|
|
|
util.LogHandlerExitWithJSON(handler, w, manifestNames, http.StatusOK)
|
|
return nil
|
|
}
|
|
|
|
func getManifestHandlerFunc(w http.ResponseWriter, r *http.Request, c *router.Context) error {
|
|
handler := "manager: get manifest"
|
|
util.LogHandlerEntry(handler, r)
|
|
deploymentName, err := pos(w, r, 2)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
manifestName, err := pos(w, r, 4)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
m, err := backend.GetManifest(deploymentName, manifestName)
|
|
if err != nil {
|
|
httputil.BadRequest(w, r, err)
|
|
return nil
|
|
}
|
|
|
|
util.LogHandlerExitWithJSON(handler, w, m, http.StatusOK)
|
|
return nil
|
|
}
|
|
|
|
func expandHandlerFunc(w http.ResponseWriter, r *http.Request, c *router.Context) error {
|
|
handler := "manager: expand config"
|
|
util.LogHandlerEntry(handler, r)
|
|
defer r.Body.Close()
|
|
t := getTemplate(w, r, handler)
|
|
if t != nil {
|
|
c, err := backend.Expand(t)
|
|
if err != nil {
|
|
httputil.BadRequest(w, r, err)
|
|
return nil
|
|
}
|
|
|
|
util.LogHandlerExitWithJSON(handler, w, c, http.StatusCreated)
|
|
}
|
|
return nil
|
|
}
|
|
|
|
// Putting Type handlers here for now because deployments.go
|
|
// currently owns its own Manager backend and doesn't like to share.
|
|
func listTypesHandlerFunc(w http.ResponseWriter, r *http.Request, c *router.Context) error {
|
|
handler := "manager: list types"
|
|
util.LogHandlerEntry(handler, r)
|
|
types, err := backend.ListTypes()
|
|
if err != nil {
|
|
httputil.BadRequest(w, r, err)
|
|
return nil
|
|
}
|
|
|
|
util.LogHandlerExitWithJSON(handler, w, types, http.StatusOK)
|
|
return nil
|
|
}
|
|
|
|
func listTypeInstancesHandlerFunc(w http.ResponseWriter, r *http.Request, c *router.Context) error {
|
|
handler := "manager: list instances"
|
|
util.LogHandlerEntry(handler, r)
|
|
typeName, err := pos(w, r, 2)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
instances, err := backend.ListInstances(typeName)
|
|
if err != nil {
|
|
httputil.BadRequest(w, r, err)
|
|
return nil
|
|
}
|
|
|
|
util.LogHandlerExitWithJSON(handler, w, instances, http.StatusOK)
|
|
return nil
|
|
}
|
|
|
|
func getRegistryForTypeHandlerFunc(w http.ResponseWriter, r *http.Request, c *router.Context) error {
|
|
handler := "manager: get type registry"
|
|
util.LogHandlerEntry(handler, r)
|
|
typeName, err := pos(w, r, 2)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
registry, err := backend.GetRegistryForType(typeName)
|
|
if err != nil {
|
|
httputil.BadRequest(w, r, err)
|
|
return nil
|
|
}
|
|
|
|
util.LogHandlerExitWithJSON(handler, w, registry, http.StatusOK)
|
|
return nil
|
|
}
|
|
|
|
func getMetadataForTypeHandlerFunc(w http.ResponseWriter, r *http.Request, c *router.Context) error {
|
|
handler := "manager: get type metadata"
|
|
util.LogHandlerEntry(handler, r)
|
|
typeName, err := pos(w, r, 2)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
metadata, err := backend.GetMetadataForType(typeName)
|
|
if err != nil {
|
|
httputil.BadRequest(w, r, err)
|
|
return nil
|
|
}
|
|
|
|
util.LogHandlerExitWithJSON(handler, w, metadata, http.StatusOK)
|
|
return nil
|
|
}
|
|
|
|
// Putting Registry handlers here for now because deployments.go
|
|
// currently owns its own Manager backend and doesn't like to share.
|
|
func listRegistriesHandlerFunc(w http.ResponseWriter, r *http.Request, c *router.Context) error {
|
|
handler := "manager: list registries"
|
|
util.LogHandlerEntry(handler, r)
|
|
registries, err := backend.ListRegistries()
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
util.LogHandlerExitWithJSON(handler, w, registries, http.StatusOK)
|
|
return nil
|
|
}
|
|
|
|
func getRegistryHandlerFunc(w http.ResponseWriter, r *http.Request, c *router.Context) error {
|
|
handler := "manager: get registry"
|
|
util.LogHandlerEntry(handler, r)
|
|
registryName, err := pos(w, r, 2)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
cr, err := backend.GetRegistry(registryName)
|
|
if err != nil {
|
|
httputil.BadRequest(w, r, err)
|
|
return nil
|
|
}
|
|
|
|
util.LogHandlerExitWithJSON(handler, w, cr, http.StatusOK)
|
|
return nil
|
|
}
|
|
|
|
func getRegistry(w http.ResponseWriter, r *http.Request, handler string) *common.Registry {
|
|
util.LogHandlerEntry(handler, r)
|
|
j, err := getJSONFromRequest(w, r, handler)
|
|
if err != nil {
|
|
return nil
|
|
}
|
|
|
|
t := &common.Registry{}
|
|
if err := json.Unmarshal(j, t); err != nil {
|
|
e := fmt.Errorf("%v\n%v", err, string(j))
|
|
util.LogAndReturnError(handler, http.StatusBadRequest, e, w)
|
|
return nil
|
|
}
|
|
|
|
return t
|
|
}
|
|
|
|
func createRegistryHandlerFunc(w http.ResponseWriter, r *http.Request, c *router.Context) error {
|
|
handler := "manager: create registry"
|
|
util.LogHandlerEntry(handler, r)
|
|
defer r.Body.Close()
|
|
registryName, err := pos(w, r, 2)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
reg := getRegistry(w, r, handler)
|
|
if reg.Name != registryName {
|
|
e := fmt.Errorf("Registry name does not match %s != %s", reg.Name, registryName)
|
|
httputil.BadRequest(w, r, e)
|
|
return nil
|
|
}
|
|
if reg != nil {
|
|
err = backend.CreateRegistry(reg)
|
|
if err != nil {
|
|
httputil.BadRequest(w, r, err)
|
|
return nil
|
|
}
|
|
}
|
|
|
|
util.LogHandlerExitWithJSON(handler, w, reg, http.StatusOK)
|
|
return nil
|
|
}
|
|
|
|
func listRegistryTypesHandlerFunc(w http.ResponseWriter, r *http.Request, c *router.Context) error {
|
|
handler := "manager: list registry types"
|
|
util.LogHandlerEntry(handler, r)
|
|
registryName, err := pos(w, r, 2)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
values, err := url.ParseQuery(r.URL.RawQuery)
|
|
if err != nil {
|
|
httputil.BadRequest(w, r, err)
|
|
return nil
|
|
}
|
|
|
|
var regex *regexp.Regexp
|
|
regexString := values.Get("regex")
|
|
if regexString != "" {
|
|
regex, err = regexp.Compile(regexString)
|
|
if err != nil {
|
|
httputil.BadRequest(w, r, err)
|
|
return nil
|
|
}
|
|
}
|
|
|
|
registryTypes, err := backend.ListRegistryTypes(registryName, regex)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
util.LogHandlerExitWithJSON(handler, w, registryTypes, http.StatusOK)
|
|
return nil
|
|
}
|
|
|
|
func getDownloadURLsHandlerFunc(w http.ResponseWriter, r *http.Request, c *router.Context) error {
|
|
handler := "manager: get download URLs"
|
|
util.LogHandlerEntry(handler, r)
|
|
registryName, err := pos(w, r, 2)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
typeName, err := pos(w, r, 4)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
tt, err := registry.ParseType(typeName)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
cr, err := backend.GetDownloadURLs(registryName, tt)
|
|
if err != nil {
|
|
httputil.BadRequest(w, r, err)
|
|
return nil
|
|
}
|
|
|
|
urls := []string{}
|
|
for _, u := range cr {
|
|
urls = append(urls, u.String())
|
|
}
|
|
util.LogHandlerExitWithJSON(handler, w, urls, http.StatusOK)
|
|
return nil
|
|
}
|
|
|
|
func getFileHandlerFunc(w http.ResponseWriter, r *http.Request, c *router.Context) error {
|
|
handler := "manager: get file"
|
|
util.LogHandlerEntry(handler, r)
|
|
registryName, err := pos(w, r, 2)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
file := r.FormValue("file")
|
|
if file == "" {
|
|
return err
|
|
}
|
|
|
|
b, err := backend.GetFile(registryName, file)
|
|
if err != nil {
|
|
httputil.BadRequest(w, r, err)
|
|
return nil
|
|
}
|
|
|
|
util.LogHandlerExitWithJSON(handler, w, b, http.StatusOK)
|
|
return nil
|
|
}
|
|
|
|
func getCredential(w http.ResponseWriter, r *http.Request, handler string) *common.RegistryCredential {
|
|
util.LogHandlerEntry(handler, r)
|
|
j, err := getJSONFromRequest(w, r, handler)
|
|
if err != nil {
|
|
return nil
|
|
}
|
|
|
|
t := &common.RegistryCredential{}
|
|
if err := json.Unmarshal(j, t); err != nil {
|
|
e := fmt.Errorf("%v\n%v", err, string(j))
|
|
util.LogAndReturnError(handler, http.StatusBadRequest, e, w)
|
|
return nil
|
|
}
|
|
|
|
return t
|
|
}
|
|
|
|
func createCredentialHandlerFunc(w http.ResponseWriter, r *http.Request, c *router.Context) error {
|
|
handler := "manager: create credential"
|
|
util.LogHandlerEntry(handler, r)
|
|
defer r.Body.Close()
|
|
credentialName, err := pos(w, r, 2)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
cr := getCredential(w, r, handler)
|
|
if cr != nil {
|
|
err = backend.CreateCredential(credentialName, cr)
|
|
if err != nil {
|
|
httputil.BadRequest(w, r, err)
|
|
return nil
|
|
}
|
|
}
|
|
|
|
util.LogHandlerExitWithJSON(handler, w, c, http.StatusOK)
|
|
return nil
|
|
}
|
|
|
|
func getCredentialHandlerFunc(w http.ResponseWriter, r *http.Request, c *router.Context) error {
|
|
handler := "manager: get credential"
|
|
util.LogHandlerEntry(handler, r)
|
|
credentialName, err := pos(w, r, 2)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
cr, err := backend.GetCredential(credentialName)
|
|
if err != nil {
|
|
httputil.BadRequest(w, r, err)
|
|
return nil
|
|
}
|
|
|
|
util.LogHandlerExitWithJSON(handler, w, cr, http.StatusOK)
|
|
return nil
|
|
}
|
|
|
|
func getJSONFromRequest(w http.ResponseWriter, r *http.Request, handler string) ([]byte, error) {
|
|
util.LogHandlerEntry(handler, r)
|
|
b := io.LimitReader(r.Body, *maxLength*1024)
|
|
y, err := ioutil.ReadAll(b)
|
|
if err != nil {
|
|
util.LogAndReturnError(handler, http.StatusBadRequest, err, w)
|
|
return []byte{}, err
|
|
}
|
|
|
|
// Reject the input if it exceeded the length limit,
|
|
// since we may not have read all of it into the buffer.
|
|
if _, err = b.Read(make([]byte, 0, 1)); err != io.EOF {
|
|
e := fmt.Errorf("template exceeds maximum length of %d KB", *maxLength)
|
|
util.LogAndReturnError(handler, http.StatusBadRequest, e, w)
|
|
return []byte{}, err
|
|
}
|
|
|
|
if err := r.Body.Close(); err != nil {
|
|
util.LogAndReturnError(handler, http.StatusInternalServerError, err, w)
|
|
return []byte{}, err
|
|
}
|
|
|
|
return yaml.YAMLToJSON(y)
|
|
}
|