| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180 |
- package server
- import (
- "fmt"
- "encoding/json"
- "net/http"
- "net/url"
- "strings"
- etcdErr "github.com/coreos/etcd/error"
- "github.com/coreos/etcd/log"
- "github.com/coreos/etcd/server/v1"
- "github.com/coreos/etcd/store"
- "github.com/coreos/go-raft"
- "github.com/gorilla/mux"
- )
- // This is the default implementation of the Server interface.
- type Server struct {
- http.Server
- raftServer *raft.Server
- registry *Registry
- store *store.Store
- name string
- url string
- tlsConf *TLSConfig
- tlsInfo *TLSInfo
- corsOrigins map[string]bool
- }
- // Creates a new Server.
- func New(name string, urlStr string, listenHost string, tlsConf *TLSConfig, tlsInfo *TLSInfo, raftServer *raft.Server, registry *Registry, store *store.Store) *Server {
- s := &Server{
- Server: http.Server{
- Handler: mux.NewRouter(),
- TLSConfig: &tlsConf.Server,
- Addr: listenHost,
- },
- store: store,
- registry: registry,
- url: urlStr,
- tlsConf: tlsConf,
- tlsInfo: tlsInfo,
- raftServer: raftServer,
- }
- // Install the routes for each version of the API.
- s.installV1()
- return s
- }
- // The current Raft committed index.
- func (s *Server) CommitIndex() uint64 {
- return s.raftServer.CommitIndex()
- }
- // The current Raft term.
- func (s *Server) Term() uint64 {
- return s.raftServer.Term()
- }
- // The server URL.
- func (s *Server) URL() string {
- return s.url
- }
- // Returns a reference to the Store.
- func (s *Server) Store() *store.Store {
- return s.store
- }
- func (s *Server) installV1() {
- s.handleFuncV1("/v1/keys/{key:.*}", v1.GetKeyHandler).Methods("GET")
- s.handleFuncV1("/v1/keys/{key:.*}", v1.SetKeyHandler).Methods("POST", "PUT")
- s.handleFuncV1("/v1/keys/{key:.*}", v1.DeleteKeyHandler).Methods("DELETE")
- s.handleFuncV1("/v1/watch/{key:.*}", v1.WatchKeyHandler).Methods("GET", "POST")
- }
- // Adds a v1 server handler to the router.
- func (s *Server) handleFuncV1(path string, f func(http.ResponseWriter, *http.Request, v1.Server) error) *mux.Route {
- return s.handleFunc(path, func(w http.ResponseWriter, req *http.Request, s *Server) error {
- return f(w, req, s)
- })
- }
- // Adds a server handler to the router.
- func (s *Server) handleFunc(path string, f func(http.ResponseWriter, *http.Request, *Server) error) *mux.Route {
- r := s.Handler.(*mux.Router)
- // Wrap the standard HandleFunc interface to pass in the server reference.
- return r.HandleFunc(path, func(w http.ResponseWriter, req *http.Request) {
- // Log request.
- log.Debugf("[recv] %s %s [%s]", req.Method, s.url, req.URL.Path, req.RemoteAddr)
- // Write CORS header.
- if s.OriginAllowed("*") {
- w.Header().Add("Access-Control-Allow-Origin", "*")
- } else if origin := req.Header.Get("Origin"); s.OriginAllowed(origin) {
- w.Header().Add("Access-Control-Allow-Origin", origin)
- }
- // Execute handler function and return error if necessary.
- if err := f(w, req, s); err != nil {
- if etcdErr, ok := err.(*etcdErr.Error); ok {
- log.Debug("Return error: ", (*etcdErr).Error())
- etcdErr.Write(w)
- } else {
- http.Error(w, err.Error(), http.StatusInternalServerError)
- }
- }
- })
- }
- // Start to listen and response etcd client command
- func (s *Server) ListenAndServe() {
- log.Infof("etcd server [name %s, listen on %s, advertised url %s]", s.name, s.Server.Addr, s.url)
- if s.tlsConf.Scheme == "http" {
- log.Fatal(s.Server.ListenAndServe())
- } else {
- log.Fatal(s.Server.ListenAndServeTLS(s.tlsInfo.CertFile, s.tlsInfo.KeyFile))
- }
- }
- func (s *Server) Dispatch(c raft.Command, w http.ResponseWriter, req *http.Request) error {
- if s.raftServer.State() == raft.Leader {
- event, err := s.raftServer.Do(c)
- if err != nil {
- return err
- }
- if event == nil {
- return etcdErr.NewError(300, "Empty result from raft", store.UndefIndex, store.UndefTerm)
- }
- response := event.(*store.Event).Response()
- b, _ := json.Marshal(response)
- w.WriteHeader(http.StatusOK)
- w.Write(b)
- return nil
- } else {
- leader := s.raftServer.Leader()
- // No leader available.
- if leader == "" {
- return etcdErr.NewError(300, "", store.UndefIndex, store.UndefTerm)
- }
- url, _ := s.registry.PeerURL(leader)
- redirect(url, w, req)
- return nil
- }
- }
- // Sets a comma-delimited list of origins that are allowed.
- func (s *Server) AllowOrigins(origins string) error {
- // Construct a lookup of all origins.
- m := make(map[string]bool)
- for _, v := range strings.Split(origins, ",") {
- if v != "*" {
- if _, err := url.Parse(v); err != nil {
- return fmt.Errorf("Invalid CORS origin: %s", err)
- }
- }
- m[v] = true
- }
- s.corsOrigins = m
- return nil
- }
- // Determines whether the server will allow a given CORS origin.
- func (s *Server) OriginAllowed(origin string) bool {
- return s.corsOrigins["*"] || s.corsOrigins[origin]
- }
|