diff options
author | Matthew Holt <[email protected]> | 2019-10-09 19:10:00 -0600 |
---|---|---|
committer | Matthew Holt <[email protected]> | 2019-10-09 19:10:00 -0600 |
commit | 03306e646e3ee421f582ef69a2158724bcf2614b (patch) | |
tree | d955df462138e538916474754dbbed979b855b10 | |
parent | 53dd600b4de0c2b169f1eb4450a0f02950912524 (diff) | |
download | caddy-03306e646e3ee421f582ef69a2158724bcf2614b.tar.gz caddy-03306e646e3ee421f582ef69a2158724bcf2614b.zip |
admin: /config and /id endpoints
This integrates a feature that was previously reserved for enterprise
users, according to https://github.com/caddyserver/caddy/issues/2786.
The /config and /id endpoints make granular config changes possible as
well as the exporting of the current configuration.
The /load endpoint has been modified to wrap the /config handler so that
the currently-running config can always be available for export. The
difference is that /load allows configs of varying formats and converts
them using config adapters. The adapted config is then processed with
/config as JSON. The /config and /id endpoints accept only JSON.
-rw-r--r-- | admin.go | 20 | ||||
-rw-r--r-- | caddyconfig/configadapters.go | 8 | ||||
-rw-r--r-- | dynamicconfig.go | 358 | ||||
-rw-r--r-- | dynamicconfig_test.go | 123 |
4 files changed, 493 insertions, 16 deletions
@@ -87,7 +87,7 @@ func StartAdmin(initialConfigJSON []byte) error { return fmt.Errorf("parsing admin listener address: %v", err) } if len(listenAddrs) != 1 { - return fmt.Errorf("admin endpoint must have exactly one listener; cannot listen on %v", listenAddrs) + return fmt.Errorf("admin endpoint must have exactly one address; cannot listen on %v", listenAddrs) } ln, err := net.Listen(netw, listenAddrs[0]) if err != nil { @@ -120,7 +120,7 @@ func StartAdmin(initialConfigJSON []byte) error { ReadTimeout: 5 * time.Second, ReadHeaderTimeout: 5 * time.Second, IdleTimeout: 5 * time.Second, - MaxHeaderBytes: 1024 * 256, + MaxHeaderBytes: 1024 * 64, } go cfgEndptSrv.Serve(ln) @@ -169,14 +169,11 @@ type AdminRoute struct { } func handleLoadConfig(w http.ResponseWriter, r *http.Request) { - r.Close = true if r.Method != http.MethodPost { http.Error(w, http.StatusText(http.StatusMethodNotAllowed), http.StatusMethodNotAllowed) return } - var payload io.Reader = r.Body - // if the config is formatted other than Caddy's native // JSON, we need to adapt it before loading it if ctHeader := r.Header.Get("Content-Type"); ctHeader != "" { @@ -215,16 +212,15 @@ func handleLoadConfig(w http.ResponseWriter, r *http.Request) { } w.Write(respBody) } - payload = bytes.NewReader(result) + // replace original request body with adapted JSON + r.Body.Close() + r.Body = ioutil.NopCloser(bytes.NewReader(result)) } } - err := Load(payload) - if err != nil { - log.Printf("[ADMIN][ERROR] loading config: %v", err) - http.Error(w, err.Error(), http.StatusBadRequest) - return - } + // pass this off to the /config/ endpoint + r.URL.Path = "/" + rawConfigKey + "/" + handleConfig(w, r) } func handleStop(w http.ResponseWriter, r *http.Request) { diff --git a/caddyconfig/configadapters.go b/caddyconfig/configadapters.go index 1a0801fb5..071221f2d 100644 --- a/caddyconfig/configadapters.go +++ b/caddyconfig/configadapters.go @@ -27,10 +27,10 @@ type Adapter interface { // Warning represents a warning or notice related to conversion. type Warning struct { - File string - Line int - Directive string - Message string + File string `json:"file,omitempty"` + Line int `json:"line,omitempty"` + Directive string `json:"directive,omitempty"` + Message string `json:"message,omitempty"` } // JSON encodes val as JSON, returning it as a json.RawMessage. Any diff --git a/dynamicconfig.go b/dynamicconfig.go new file mode 100644 index 000000000..0e44376fc --- /dev/null +++ b/dynamicconfig.go @@ -0,0 +1,358 @@ +// Copyright 2015 Matthew Holt and The Caddy Authors +// +// Licensed under the Apache License, Version 2.0 (the "License"); +// you may not use this file except in compliance with the License. +// You may obtain a copy of the License at +// +// http://www.apache.org/licenses/LICENSE-2.0 +// +// Unless required by applicable law or agreed to in writing, software +// distributed under the License is distributed on an "AS IS" BASIS, +// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +// See the License for the specific language governing permissions and +// limitations under the License. + +package caddy + +import ( + "bytes" + "encoding/json" + "fmt" + "log" + "net/http" + "path" + "strconv" + "strings" + "sync" +) + +func init() { + RegisterModule(router{}) +} + +type router []AdminRoute + +// CaddyModule returns the Caddy module information. +func (router) CaddyModule() ModuleInfo { + return ModuleInfo{ + Name: "admin.routers.dynamic_config", + New: func() Module { + return router{ + { + Pattern: "/" + rawConfigKey + "/", + Handler: http.HandlerFunc(handleConfig), + }, + { + Pattern: "/id/", + Handler: http.HandlerFunc(handleConfigID), + }, + } + }, + } +} + +func (r router) Routes() []AdminRoute { return r } + +// handleConfig handles config changes or exports according to r. +// This function is safe for concurrent use. +func handleConfig(w http.ResponseWriter, r *http.Request) { + rawCfgMu.Lock() + defer rawCfgMu.Unlock() + unsyncedHandleConfig(w, r) +} + +// handleConfigID accesses the config through a user-assigned ID +// that is mapped to its full/expanded path in the JSON structure. +// It is the same as handleConfig except it replaces the ID in +// the request path with the full, expanded URL path. +// This function is safe for concurrent use. +func handleConfigID(w http.ResponseWriter, r *http.Request) { + parts := strings.Split(r.URL.Path, "/") + if len(parts) < 3 || parts[2] == "" { + http.Error(w, "request path is missing object ID", http.StatusBadRequest) + return + } + id := parts[2] + + rawCfgMu.Lock() + defer rawCfgMu.Unlock() + + // map the ID to the expanded path + expanded, ok := rawCfgIndex[id] + if !ok { + http.Error(w, "unknown object ID: "+id, http.StatusBadRequest) + return + } + + // piece the full URL path back together + parts = append([]string{expanded}, parts[3:]...) + r.URL.Path = path.Join(parts...) + + unsyncedHandleConfig(w, r) +} + +// configIndex recurisvely searches ptr for object fields named "@id" +// and maps that ID value to the full configPath in the index. +// This function is NOT safe for concurrent access; use rawCfgMu. +func configIndex(ptr interface{}, configPath string, index map[string]string) error { + switch val := ptr.(type) { + case map[string]interface{}: + for k, v := range val { + if k == "@id" { + switch idVal := v.(type) { + case string: + index[idVal] = configPath + case float64: // all JSON numbers decode as float64 + index[fmt.Sprintf("%v", idVal)] = configPath + default: + return fmt.Errorf("%s: @id field must be a string or number", configPath) + } + delete(val, "@id") // field is no longer needed, and will break config if not removed + continue + } + // traverse this object property recursively + err := configIndex(val[k], path.Join(configPath, k), index) + if err != nil { + return err + } + } + case []interface{}: + // traverse each element of the array recursively + for i := range val { + err := configIndex(val[i], path.Join(configPath, strconv.Itoa(i)), index) + if err != nil { + return err + } + } + } + + return nil +} + +// unsycnedHandleConfig handles config accesses without a lock +// on rawCfgMu. This is NOT safe for concurrent use, so be sure +// to acquire a lock on rawCfgMu before calling this. +func unsyncedHandleConfig(w http.ResponseWriter, r *http.Request) { + switch r.Method { + case http.MethodGet, http.MethodPost, http.MethodPut, http.MethodPatch, http.MethodDelete: + default: + http.Error(w, http.StatusText(http.StatusMethodNotAllowed), http.StatusMethodNotAllowed) + return + } + + // perform the mutation with our decoded representation + // (the map), which may change pointers deep within it + err := mutateConfig(w, r) + if err != nil { + http.Error(w, "mutating config: "+err.Error(), http.StatusBadRequest) + return + } + + if r.Method != http.MethodGet { + // find any IDs in this config and index them + idx := make(map[string]string) + err = configIndex(rawCfg[rawConfigKey], "/config", idx) + if err != nil { + http.Error(w, "indexing config: "+err.Error(), http.StatusInternalServerError) + return + } + + // the mutation is complete, so encode the entire config as JSON + newCfg, err := json.Marshal(rawCfg[rawConfigKey]) + if err != nil { + http.Error(w, "encoding new config: "+err.Error(), http.StatusBadRequest) + return + } + + // if nothing changed, no need to do a whole reload unless the client forces it + if r.Header.Get("Cache-Control") != "must-revalidate" && bytes.Equal(rawCfgJSON, newCfg) { + log.Printf("[ADMIN][INFO] Config is unchanged") + return + } + + // load this new config; if it fails, we need to revert to + // our old representation of caddy's actual config + err = Load(bytes.NewReader(newCfg)) + if err != nil { + // restore old config state to keep it consistent + // with what caddy is still running; we need to + // unmarshal it again because it's likely that + // pointers deep in our rawCfg map were modified + var oldCfg interface{} + err2 := json.Unmarshal(rawCfgJSON, &oldCfg) + if err2 != nil { + err = fmt.Errorf("%v; additionally, restoring old config: %v", err, err2) + } + rawCfg[rawConfigKey] = oldCfg + + // report error + log.Printf("[ADMIN][ERROR] loading config: %v", err) + http.Error(w, err.Error(), http.StatusBadRequest) + return + } + + // success, so update our stored copy of the encoded + // config to keep it consistent with what caddy is now + // running (storing an encoded copy is not strictly + // necessary, but avoids an extra json.Marshal for + // each config change) + rawCfgJSON = newCfg + rawCfgIndex = idx + } +} + +// mutateConfig changes the rawCfg according to r. It is NOT +// safe for concurrent use; use rawCfgMu. If the request's +// method is GET, the config will not be changed. +func mutateConfig(w http.ResponseWriter, r *http.Request) error { + var err error + var val interface{} + + // if there is a request body, make sure we recognize its content-type and decode it + if r.Method != http.MethodGet && r.Method != http.MethodDelete { + if ct := r.Header.Get("Content-Type"); !strings.Contains(ct, "/json") { + return fmt.Errorf("unacceptable content-type: %v; 'application/json' required", ct) + } + err = json.NewDecoder(r.Body).Decode(&val) + if err != nil { + return fmt.Errorf("decoding request body: %v", err) + } + } + + buf := new(bytes.Buffer) + enc := json.NewEncoder(buf) + + cleanPath := strings.Trim(r.URL.Path, "/") + if cleanPath == "" { + return fmt.Errorf("no traversable path") + } + + parts := strings.Split(cleanPath, "/") + if len(parts) == 0 { + return fmt.Errorf("path missing") + } + + var ptr interface{} = rawCfg + +traverseLoop: + for i, part := range parts { + switch v := ptr.(type) { + case map[string]interface{}: + // if the next part enters a slice, and the slice is our destination, + // handle it specially (because appending to the slice copies the slice + // header, which does not replace the original one like we want) + if arr, ok := v[part].([]interface{}); ok && i == len(parts)-2 { + var idx int + if r.Method != http.MethodPost { + idxStr := parts[len(parts)-1] + idx, err = strconv.Atoi(idxStr) + if err != nil { + return fmt.Errorf("[%s] invalid array index '%s': %v", + r.URL.Path, idxStr, err) + } + if idx < 0 || idx >= len(arr) { + return fmt.Errorf("[%s] array index out of bounds: %s", r.URL.Path, idxStr) + } + } + + switch r.Method { + case http.MethodGet: + err = enc.Encode(arr[idx]) + if err != nil { + return fmt.Errorf("encoding config: %v", err) + } + case http.MethodPost: + v[part] = append(arr, val) + case http.MethodPut: + // avoid creation of new slice and a second copy (see + // https://github.com/golang/go/wiki/SliceTricks#insert) + arr = append(arr, nil) + copy(arr[idx+1:], arr[idx:]) + arr[idx] = val + v[part] = arr + case http.MethodPatch: + arr[idx] = val + case http.MethodDelete: + v[part] = append(arr[:idx], arr[idx+1:]...) + default: + return fmt.Errorf("unrecognized method %s", r.Method) + } + break traverseLoop + } + + if i == len(parts)-1 { + switch r.Method { + case http.MethodGet: + err = enc.Encode(v[part]) + if err != nil { + return fmt.Errorf("encoding config: %v", err) + } + case http.MethodPost: + if arr, ok := v[part].([]interface{}); ok { + // if the part is an existing list, POST appends to it + // TODO: Do we ever reach this point, since we handle arrays + // separately above? + v[part] = append(arr, val) + } else { + // otherwise, it simply sets the value + v[part] = val + } + case http.MethodPut: + if _, ok := v[part]; ok { + return fmt.Errorf("[%s] key already exists: %s", r.URL.Path, part) + } + v[part] = val + case http.MethodPatch: + if _, ok := v[part]; !ok { + return fmt.Errorf("[%s] key does not exist: %s", r.URL.Path, part) + } + v[part] = val + case http.MethodDelete: + delete(v, part) + default: + return fmt.Errorf("unrecognized method %s", r.Method) + } + } else { + ptr = v[part] + } + + case []interface{}: + partInt, err := strconv.Atoi(part) + if err != nil { + return fmt.Errorf("[/%s] invalid array index '%s': %v", + strings.Join(parts[:i+1], "/"), part, err) + } + if partInt < 0 || partInt >= len(v) { + return fmt.Errorf("[/%s] array index out of bounds: %s", + strings.Join(parts[:i+1], "/"), part) + } + ptr = v[partInt] + + default: + return fmt.Errorf("invalid path: %s", parts[:i+1]) + } + } + + if r.Method == http.MethodGet { + w.Header().Set("Content-Type", "application/json") + w.Write(buf.Bytes()) + } + + return nil +} + +var ( + // rawCfg is the current, generic-decoded configuration; + // we initialize it as a map with one field ("config") + // to maintain parity with the API endpoint and to avoid + // the special case of having to access/mutate the variable + // directly without traversing into it + rawCfg = map[string]interface{}{ + rawConfigKey: nil, + } + rawCfgJSON []byte // keeping the encoded form avoids an extra Marshal on changes + rawCfgIndex map[string]string // map of user-assigned ID to expanded path + rawCfgMu sync.Mutex // protects rawCfg, rawCfgJSON, and rawCfgIndex +) + +const rawConfigKey = "config" diff --git a/dynamicconfig_test.go b/dynamicconfig_test.go new file mode 100644 index 000000000..372c7563d --- /dev/null +++ b/dynamicconfig_test.go @@ -0,0 +1,123 @@ +// Copyright 2015 Matthew Holt and The Caddy Authors +// +// Licensed under the Apache License, Version 2.0 (the "License"); +// you may not use this file except in compliance with the License. +// You may obtain a copy of the License at +// +// http://www.apache.org/licenses/LICENSE-2.0 +// +// Unless required by applicable law or agreed to in writing, software +// distributed under the License is distributed on an "AS IS" BASIS, +// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +// See the License for the specific language governing permissions and +// limitations under the License. + +package caddy + +import ( + "encoding/json" + "net/http" + "net/http/httptest" + "reflect" + "strings" + "testing" +) + +func TestMutateConfig(t *testing.T) { + // each test is performed in sequence, so + // each change builds on the previous ones; + // the config is not reset between tests + for i, tc := range []struct { + method string + path string // rawConfigKey will be prepended + payload string + expect string // JSON representation of what the whole config is expected to be after the request + shouldErr bool + }{ + { + method: "POST", + path: "", + payload: `{"foo": "bar", "list": ["a", "b", "c"]}`, // starting value + expect: `{"foo": "bar", "list": ["a", "b", "c"]}`, + }, + { + method: "POST", + path: "/foo", + payload: `"jet"`, + expect: `{"foo": "jet", "list": ["a", "b", "c"]}`, + }, + { + method: "POST", + path: "/bar", + payload: `{"aa": "bb", "qq": "zz"}`, + expect: `{"foo": "jet", "bar": {"aa": "bb", "qq": "zz"}, "list": ["a", "b", "c"]}`, + }, + { + method: "DELETE", + path: "/bar/qq", + expect: `{"foo": "jet", "bar": {"aa": "bb"}, "list": ["a", "b", "c"]}`, + }, + { + method: "POST", + path: "/list", + payload: `"e"`, + expect: `{"foo": "jet", "bar": {"aa": "bb"}, "list": ["a", "b", "c", "e"]}`, + }, + { + method: "PUT", + path: "/list/3", + payload: `"d"`, + expect: `{"foo": "jet", "bar": {"aa": "bb"}, "list": ["a", "b", "c", "d", "e"]}`, + }, + { + method: "DELETE", + path: "/list/3", + expect: `{"foo": "jet", "bar": {"aa": "bb"}, "list": ["a", "b", "c", "e"]}`, + }, + { + method: "PATCH", + path: "/list/3", + payload: `"d"`, + expect: `{"foo": "jet", "bar": {"aa": "bb"}, "list": ["a", "b", "c", "d"]}`, + }, + } { + req, err := http.NewRequest(tc.method, rawConfigKey+tc.path, strings.NewReader(tc.payload)) + if err != nil { + t.Fatalf("Test %d: making test request: %v", i, err) + } + req.Header.Set("Content-Type", "application/json") + + w := httptest.NewRecorder() + + err = mutateConfig(w, req) + + if tc.shouldErr && err == nil { + t.Fatalf("Test %d: Expected error return value, but got: %v", i, err) + } + if !tc.shouldErr && err != nil { + t.Fatalf("Test %d: Should not have had error return value, but got: %v", i, err) + } + + if tc.shouldErr && w.Code == http.StatusOK { + t.Fatalf("Test %d: Expected error, but got HTTP %d: %s", + i, w.Code, w.Body.String()) + } + if !tc.shouldErr && w.Code != http.StatusOK { + t.Fatalf("Test %d: Should not have errored, but got HTTP %d: %s", + i, w.Code, w.Body.String()) + } + + // decode the expected config so we can do a convenient DeepEqual + var expectedDecoded interface{} + err = json.Unmarshal([]byte(tc.expect), &expectedDecoded) + if err != nil { + t.Fatalf("Test %d: Unmarshaling expected config: %v", i, err) + } + + // make sure the resulting config is as we expect it + if !reflect.DeepEqual(rawCfg[rawConfigKey], expectedDecoded) { + t.Fatalf("Test %d:\nExpected:\n\t%#v\nActual:\n\t%#v", + i, expectedDecoded, rawCfg[rawConfigKey]) + } + } +} |