clair/api/v1/routes.go

431 lines
17 KiB
Go
Raw Normal View History

2016-01-27 19:07:58 +00:00
// Copyright 2015 clair authors
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
package v1
import (
2016-02-09 18:43:57 +00:00
"compress/gzip"
2016-01-27 19:07:58 +00:00
"encoding/json"
"io"
"net/http"
2016-02-02 00:10:10 +00:00
"strconv"
2016-02-09 18:43:57 +00:00
"strings"
2016-01-27 19:07:58 +00:00
"github.com/julienschmidt/httprouter"
"github.com/prometheus/client_golang/prometheus"
"github.com/coreos/clair/api/context"
2016-02-01 19:51:52 +00:00
"github.com/coreos/clair/database"
2016-02-09 23:16:14 +00:00
"github.com/coreos/clair/utils"
2016-01-27 19:07:58 +00:00
cerrors "github.com/coreos/clair/utils/errors"
"github.com/coreos/clair/worker"
)
const (
// These are the route identifiers for prometheus.
postLayerRoute = "v1/postLayer"
getLayerRoute = "v1/getLayer"
deleteLayerRoute = "v1/deleteLayer"
getNamespacesRoute = "v1/getNamespaces"
postVulnerabilityRoute = "v1/postVulnerability"
getVulnerabilityRoute = "v1/getVulnerability"
putVulnerabilityRoute = "v1/putVulnerability"
deleteVulnerabilityRoute = "v1/deleteVulnerability"
getFixesRoute = "v1/getFixes"
putFixRoute = "v1/putFix"
deleteFixRoute = "v1/deleteFix"
getNotificationRoute = "v1/getNotification"
deleteNotificationRoute = "v1/deleteNotification"
getMetricsRoute = "v1/getMetrics"
// maxBodySize restricts client request bodies to 1MiB.
maxBodySize int64 = 1048576
// statusUnprocessableEntity represents the 422 (Unprocessable Entity) status code, which means
// the server understands the content type of the request entity
// (hence a 415(Unsupported Media Type) status code is inappropriate), and the syntax of the
// request entity is correct (thus a 400 (Bad Request) status code is inappropriate) but was
// unable to process the contained instructions.
statusUnprocessableEntity = 422
)
2016-01-27 19:07:58 +00:00
func decodeJSON(r *http.Request, v interface{}) error {
defer r.Body.Close()
return json.NewDecoder(io.LimitReader(r.Body, maxBodySize)).Decode(v)
}
2016-02-09 18:43:57 +00:00
func writeResponse(w http.ResponseWriter, r *http.Request, status int, resp interface{}) {
// Headers must be written before the response.
header := w.Header()
header.Set("Content-Type", "application/json;charset=utf-8")
header.Set("Server", "clair")
2016-02-09 18:43:57 +00:00
// Gzip the response if the client supports it.
var writer io.Writer = w
if strings.Contains(r.Header.Get("Accept-Encoding"), "gzip") {
2016-02-12 22:25:11 +00:00
gzipWriter := gzip.NewWriter(w)
defer gzipWriter.Close()
writer = gzipWriter
2016-02-09 18:43:57 +00:00
header.Set("Content-Encoding", "gzip")
}
// Write the response.
w.WriteHeader(status)
2016-02-09 18:43:57 +00:00
err := json.NewEncoder(writer).Encode(resp)
2016-01-27 19:07:58 +00:00
if err != nil {
switch err.(type) {
case *json.MarshalerError, *json.UnsupportedTypeError, *json.UnsupportedValueError:
panic("v1: failed to marshal response: " + err.Error())
default:
log.Warningf("failed to write response: %s", err.Error())
}
2016-01-27 19:07:58 +00:00
}
}
func postLayer(w http.ResponseWriter, r *http.Request, p httprouter.Params, ctx *context.RouteContext) (string, int) {
2016-01-29 20:19:23 +00:00
request := LayerEnvelope{}
2016-01-27 19:07:58 +00:00
err := decodeJSON(r, &request)
if err != nil {
2016-02-09 18:43:57 +00:00
writeResponse(w, r, http.StatusBadRequest, LayerEnvelope{Error: &Error{err.Error()}})
return postLayerRoute, http.StatusBadRequest
2016-01-27 19:07:58 +00:00
}
2016-02-01 19:51:52 +00:00
if request.Layer == nil {
2016-02-09 18:43:57 +00:00
writeResponse(w, r, http.StatusBadRequest, LayerEnvelope{Error: &Error{"failed to provide layer"}})
return postLayerRoute, http.StatusBadRequest
2016-02-01 19:51:52 +00:00
}
2016-01-27 19:07:58 +00:00
err = worker.Process(ctx.Store, request.Layer.Name, request.Layer.ParentName, request.Layer.Path, request.Layer.Format)
if err != nil {
if err == utils.ErrCouldNotExtract ||
err == utils.ErrExtractedFileTooBig ||
err == worker.ErrUnsupported {
writeResponse(w, r, statusUnprocessableEntity, LayerEnvelope{Error: &Error{err.Error()}})
return postLayerRoute, statusUnprocessableEntity
}
if _, badreq := err.(*cerrors.ErrBadRequest); badreq {
2016-02-09 18:43:57 +00:00
writeResponse(w, r, http.StatusBadRequest, LayerEnvelope{Error: &Error{err.Error()}})
return postLayerRoute, http.StatusBadRequest
2016-01-27 19:07:58 +00:00
}
2016-02-09 18:43:57 +00:00
writeResponse(w, r, http.StatusInternalServerError, LayerEnvelope{Error: &Error{err.Error()}})
return postLayerRoute, http.StatusInternalServerError
2016-01-27 19:07:58 +00:00
}
2016-02-09 18:43:57 +00:00
writeResponse(w, r, http.StatusCreated, LayerEnvelope{Layer: &Layer{
2016-02-05 23:28:00 +00:00
Name: request.Layer.Name,
ParentName: request.Layer.ParentName,
Path: request.Layer.Path,
Format: request.Layer.Format,
IndexedByVersion: worker.Version,
}})
return postLayerRoute, http.StatusCreated
2016-01-27 19:07:58 +00:00
}
func getLayer(w http.ResponseWriter, r *http.Request, p httprouter.Params, ctx *context.RouteContext) (string, int) {
2016-01-29 20:19:23 +00:00
_, withFeatures := r.URL.Query()["features"]
_, withVulnerabilities := r.URL.Query()["vulnerabilities"]
2016-01-29 19:14:12 +00:00
dbLayer, err := ctx.Store.FindLayer(p.ByName("layerName"), withFeatures, withVulnerabilities)
if err == cerrors.ErrNotFound {
2016-02-09 18:43:57 +00:00
writeResponse(w, r, http.StatusNotFound, LayerEnvelope{Error: &Error{err.Error()}})
return getLayerRoute, http.StatusNotFound
2016-01-29 19:14:12 +00:00
} else if err != nil {
2016-02-09 18:43:57 +00:00
writeResponse(w, r, http.StatusInternalServerError, LayerEnvelope{Error: &Error{err.Error()}})
return getLayerRoute, http.StatusInternalServerError
2016-01-29 19:14:12 +00:00
}
layer := LayerFromDatabaseModel(dbLayer, withFeatures, withVulnerabilities)
2016-01-29 19:14:12 +00:00
2016-02-09 18:43:57 +00:00
writeResponse(w, r, http.StatusOK, LayerEnvelope{Layer: &layer})
return getLayerRoute, http.StatusOK
2016-01-27 19:07:58 +00:00
}
2016-01-29 19:14:12 +00:00
func deleteLayer(w http.ResponseWriter, r *http.Request, p httprouter.Params, ctx *context.RouteContext) (string, int) {
2016-01-29 21:07:35 +00:00
err := ctx.Store.DeleteLayer(p.ByName("layerName"))
if err == cerrors.ErrNotFound {
2016-02-09 18:43:57 +00:00
writeResponse(w, r, http.StatusNotFound, LayerEnvelope{Error: &Error{err.Error()}})
return deleteLayerRoute, http.StatusNotFound
2016-01-29 21:07:35 +00:00
} else if err != nil {
2016-02-09 18:43:57 +00:00
writeResponse(w, r, http.StatusInternalServerError, LayerEnvelope{Error: &Error{err.Error()}})
return deleteLayerRoute, http.StatusInternalServerError
2016-01-29 21:07:35 +00:00
}
w.WriteHeader(http.StatusOK)
return deleteLayerRoute, http.StatusOK
2016-01-27 19:07:58 +00:00
}
func getNamespaces(w http.ResponseWriter, r *http.Request, p httprouter.Params, ctx *context.RouteContext) (string, int) {
2016-01-29 21:43:17 +00:00
dbNamespaces, err := ctx.Store.ListNamespaces()
if err != nil {
2016-02-09 18:43:57 +00:00
writeResponse(w, r, http.StatusInternalServerError, NamespaceEnvelope{Error: &Error{err.Error()}})
return getNamespacesRoute, http.StatusInternalServerError
2016-01-29 21:43:17 +00:00
}
var namespaces []string
for _, dbNamespace := range dbNamespaces {
namespaces = append(namespaces, dbNamespace.Name)
}
2016-02-09 18:43:57 +00:00
writeResponse(w, r, http.StatusOK, NamespaceEnvelope{Namespaces: &namespaces})
return getNamespacesRoute, http.StatusOK
2016-01-27 19:07:58 +00:00
}
func postVulnerability(w http.ResponseWriter, r *http.Request, p httprouter.Params, ctx *context.RouteContext) (string, int) {
2016-02-01 19:51:52 +00:00
request := VulnerabilityEnvelope{}
err := decodeJSON(r, &request)
if err != nil {
2016-02-09 18:43:57 +00:00
writeResponse(w, r, http.StatusBadRequest, VulnerabilityEnvelope{Error: &Error{err.Error()}})
return postVulnerabilityRoute, http.StatusBadRequest
2016-02-01 19:51:52 +00:00
}
if request.Vulnerability == nil {
2016-02-09 18:43:57 +00:00
writeResponse(w, r, http.StatusBadRequest, VulnerabilityEnvelope{Error: &Error{"failed to provide vulnerability"}})
return postVulnerabilityRoute, http.StatusBadRequest
2016-02-01 19:51:52 +00:00
}
vuln, err := request.Vulnerability.DatabaseModel()
if err != nil {
2016-02-09 18:43:57 +00:00
writeResponse(w, r, http.StatusBadRequest, VulnerabilityEnvelope{Error: &Error{err.Error()}})
return postVulnerabilityRoute, http.StatusBadRequest
2016-02-01 19:51:52 +00:00
}
err = ctx.Store.InsertVulnerabilities([]database.Vulnerability{vuln}, true)
2016-02-01 19:51:52 +00:00
if err != nil {
switch err.(type) {
case *cerrors.ErrBadRequest:
writeResponse(w, r, http.StatusBadRequest, VulnerabilityEnvelope{Error: &Error{err.Error()}})
return postVulnerabilityRoute, http.StatusBadRequest
default:
writeResponse(w, r, http.StatusInternalServerError, VulnerabilityEnvelope{Error: &Error{err.Error()}})
return postVulnerabilityRoute, http.StatusInternalServerError
}
2016-02-01 19:51:52 +00:00
}
writeResponse(w, r, http.StatusCreated, VulnerabilityEnvelope{Vulnerability: request.Vulnerability})
return postVulnerabilityRoute, http.StatusCreated
2016-01-27 19:07:58 +00:00
}
2016-02-01 19:51:52 +00:00
func getVulnerability(w http.ResponseWriter, r *http.Request, p httprouter.Params, ctx *context.RouteContext) (string, int) {
_, withFixedIn := r.URL.Query()["fixedIn"]
dbVuln, err := ctx.Store.FindVulnerability(p.ByName("namespaceName"), p.ByName("vulnerabilityName"))
if err == cerrors.ErrNotFound {
2016-02-09 18:43:57 +00:00
writeResponse(w, r, http.StatusNotFound, VulnerabilityEnvelope{Error: &Error{err.Error()}})
return getVulnerabilityRoute, http.StatusNotFound
} else if err != nil {
2016-02-09 18:43:57 +00:00
writeResponse(w, r, http.StatusInternalServerError, VulnerabilityEnvelope{Error: &Error{err.Error()}})
return getVulnerabilityRoute, http.StatusInternalServerError
}
vuln := VulnerabilityFromDatabaseModel(dbVuln, withFixedIn)
2016-02-09 18:43:57 +00:00
writeResponse(w, r, http.StatusOK, VulnerabilityEnvelope{Vulnerability: &vuln})
return getVulnerabilityRoute, http.StatusOK
2016-01-27 19:07:58 +00:00
}
2016-02-01 21:04:58 +00:00
func putVulnerability(w http.ResponseWriter, r *http.Request, p httprouter.Params, ctx *context.RouteContext) (string, int) {
2016-02-01 22:56:54 +00:00
request := VulnerabilityEnvelope{}
err := decodeJSON(r, &request)
if err != nil {
2016-02-09 18:43:57 +00:00
writeResponse(w, r, http.StatusBadRequest, VulnerabilityEnvelope{Error: &Error{err.Error()}})
return putVulnerabilityRoute, http.StatusBadRequest
2016-02-01 22:56:54 +00:00
}
if request.Vulnerability == nil {
2016-02-09 18:43:57 +00:00
writeResponse(w, r, http.StatusBadRequest, VulnerabilityEnvelope{Error: &Error{"failed to provide vulnerability"}})
return putVulnerabilityRoute, http.StatusBadRequest
2016-02-01 22:56:54 +00:00
}
if len(request.Vulnerability.FixedIn) != 0 {
2016-02-09 18:43:57 +00:00
writeResponse(w, r, http.StatusBadRequest, VulnerabilityEnvelope{Error: &Error{"Vulnerability.FixedIn must be empty"}})
return putVulnerabilityRoute, http.StatusBadRequest
2016-02-01 22:56:54 +00:00
}
vuln, err := request.Vulnerability.DatabaseModel()
if err != nil {
2016-02-09 18:43:57 +00:00
writeResponse(w, r, http.StatusBadRequest, VulnerabilityEnvelope{Error: &Error{err.Error()}})
return putVulnerabilityRoute, http.StatusBadRequest
2016-02-01 22:56:54 +00:00
}
vuln.Namespace.Name = p.ByName("namespaceName")
vuln.Name = p.ByName("vulnerabilityName")
err = ctx.Store.InsertVulnerabilities([]database.Vulnerability{vuln}, true)
2016-02-01 22:56:54 +00:00
if err != nil {
switch err.(type) {
case *cerrors.ErrBadRequest:
writeResponse(w, r, http.StatusBadRequest, VulnerabilityEnvelope{Error: &Error{err.Error()}})
return putVulnerabilityRoute, http.StatusBadRequest
default:
writeResponse(w, r, http.StatusInternalServerError, VulnerabilityEnvelope{Error: &Error{err.Error()}})
return putVulnerabilityRoute, http.StatusInternalServerError
}
2016-02-01 22:56:54 +00:00
}
writeResponse(w, r, http.StatusOK, VulnerabilityEnvelope{Vulnerability: request.Vulnerability})
return putVulnerabilityRoute, http.StatusOK
2016-01-27 19:07:58 +00:00
}
2016-02-01 21:04:58 +00:00
func deleteVulnerability(w http.ResponseWriter, r *http.Request, p httprouter.Params, ctx *context.RouteContext) (string, int) {
2016-02-01 21:04:58 +00:00
err := ctx.Store.DeleteVulnerability(p.ByName("namespaceName"), p.ByName("vulnerabilityName"))
if err == cerrors.ErrNotFound {
2016-02-09 18:43:57 +00:00
writeResponse(w, r, http.StatusNotFound, VulnerabilityEnvelope{Error: &Error{err.Error()}})
return deleteVulnerabilityRoute, http.StatusNotFound
2016-02-01 21:04:58 +00:00
} else if err != nil {
2016-02-09 18:43:57 +00:00
writeResponse(w, r, http.StatusInternalServerError, VulnerabilityEnvelope{Error: &Error{err.Error()}})
return deleteVulnerabilityRoute, http.StatusInternalServerError
2016-02-01 21:04:58 +00:00
}
w.WriteHeader(http.StatusOK)
return deleteVulnerabilityRoute, http.StatusOK
2016-01-27 19:07:58 +00:00
}
func getFixes(w http.ResponseWriter, r *http.Request, p httprouter.Params, ctx *context.RouteContext) (string, int) {
2016-02-04 19:02:31 +00:00
dbVuln, err := ctx.Store.FindVulnerability(p.ByName("namespaceName"), p.ByName("vulnerabilityName"))
if err == cerrors.ErrNotFound {
2016-02-09 18:43:57 +00:00
writeResponse(w, r, http.StatusNotFound, FeatureEnvelope{Error: &Error{err.Error()}})
return getFixesRoute, http.StatusNotFound
2016-02-04 19:02:31 +00:00
} else if err != nil {
2016-02-09 18:43:57 +00:00
writeResponse(w, r, http.StatusInternalServerError, FeatureEnvelope{Error: &Error{err.Error()}})
return getFixesRoute, http.StatusInternalServerError
2016-02-04 19:02:31 +00:00
}
vuln := VulnerabilityFromDatabaseModel(dbVuln, true)
2016-02-09 18:43:57 +00:00
writeResponse(w, r, http.StatusOK, FeatureEnvelope{Features: &vuln.FixedIn})
return getFixesRoute, http.StatusOK
2016-01-27 19:07:58 +00:00
}
2016-02-04 19:02:31 +00:00
func putFix(w http.ResponseWriter, r *http.Request, p httprouter.Params, ctx *context.RouteContext) (string, int) {
2016-02-04 19:02:31 +00:00
request := FeatureEnvelope{}
err := decodeJSON(r, &request)
if err != nil {
2016-02-09 18:43:57 +00:00
writeResponse(w, r, http.StatusBadRequest, FeatureEnvelope{Error: &Error{err.Error()}})
return putFixRoute, http.StatusBadRequest
2016-02-04 19:02:31 +00:00
}
if request.Feature == nil {
2016-02-09 18:43:57 +00:00
writeResponse(w, r, http.StatusBadRequest, FeatureEnvelope{Error: &Error{"failed to provide feature"}})
return putFixRoute, http.StatusBadRequest
2016-02-04 19:02:31 +00:00
}
if request.Feature.Name != p.ByName("fixName") {
2016-02-09 18:43:57 +00:00
writeResponse(w, r, http.StatusBadRequest, FeatureEnvelope{Error: &Error{"feature name in URL and JSON do not match"}})
return putFixRoute, http.StatusBadRequest
2016-02-04 19:02:31 +00:00
}
dbFix, err := request.Feature.DatabaseModel()
if err != nil {
2016-02-09 18:43:57 +00:00
writeResponse(w, r, http.StatusBadRequest, FeatureEnvelope{Error: &Error{err.Error()}})
return putFixRoute, http.StatusBadRequest
2016-02-04 19:02:31 +00:00
}
err = ctx.Store.InsertVulnerabilityFixes(p.ByName("vulnerabilityNamespace"), p.ByName("vulnerabilityName"), []database.FeatureVersion{dbFix})
if err != nil {
switch err.(type) {
case *cerrors.ErrBadRequest:
writeResponse(w, r, http.StatusBadRequest, FeatureEnvelope{Error: &Error{err.Error()}})
return putFixRoute, http.StatusBadRequest
default:
if err == cerrors.ErrNotFound {
writeResponse(w, r, http.StatusNotFound, FeatureEnvelope{Error: &Error{err.Error()}})
return putFixRoute, http.StatusNotFound
}
writeResponse(w, r, http.StatusInternalServerError, FeatureEnvelope{Error: &Error{err.Error()}})
return putFixRoute, http.StatusInternalServerError
}
2016-02-04 19:02:31 +00:00
}
writeResponse(w, r, http.StatusOK, FeatureEnvelope{Feature: request.Feature})
2016-02-23 21:28:01 +00:00
return putFixRoute, http.StatusOK
2016-01-27 19:07:58 +00:00
}
2016-02-04 19:02:31 +00:00
func deleteFix(w http.ResponseWriter, r *http.Request, p httprouter.Params, ctx *context.RouteContext) (string, int) {
2016-02-04 19:02:31 +00:00
err := ctx.Store.DeleteVulnerabilityFix(p.ByName("vulnerabilityNamespace"), p.ByName("vulnerabilityName"), p.ByName("fixName"))
if err == cerrors.ErrNotFound {
2016-02-09 18:43:57 +00:00
writeResponse(w, r, http.StatusNotFound, FeatureEnvelope{Error: &Error{err.Error()}})
return deleteFixRoute, http.StatusNotFound
2016-02-04 19:02:31 +00:00
} else if err != nil {
2016-02-09 18:43:57 +00:00
writeResponse(w, r, http.StatusInternalServerError, FeatureEnvelope{Error: &Error{err.Error()}})
return deleteFixRoute, http.StatusInternalServerError
2016-02-04 19:02:31 +00:00
}
w.WriteHeader(http.StatusOK)
return deleteFixRoute, http.StatusOK
2016-01-27 19:07:58 +00:00
}
func getNotification(w http.ResponseWriter, r *http.Request, p httprouter.Params, ctx *context.RouteContext) (string, int) {
2016-02-02 00:10:10 +00:00
query := r.URL.Query()
limitStrs, limitExists := query["limit"]
if !limitExists {
2016-02-09 18:43:57 +00:00
writeResponse(w, r, http.StatusBadRequest, NotificationEnvelope{Error: &Error{"must provide limit query parameter"}})
return getNotificationRoute, http.StatusBadRequest
2016-02-02 00:10:10 +00:00
}
limit, err := strconv.Atoi(limitStrs[0])
if err != nil {
2016-02-09 18:43:57 +00:00
writeResponse(w, r, http.StatusBadRequest, NotificationEnvelope{Error: &Error{"invalid limit format: " + err.Error()}})
return getNotificationRoute, http.StatusBadRequest
2016-02-02 00:10:10 +00:00
}
var pageToken string
2016-02-02 00:10:10 +00:00
page := database.VulnerabilityNotificationFirstPage
pageStrs, pageExists := query["page"]
if pageExists {
page, err = tokenToPageNumber(pageStrs[0], ctx.Config.PaginationKey)
2016-02-02 00:10:10 +00:00
if err != nil {
2016-02-09 18:43:57 +00:00
writeResponse(w, r, http.StatusBadRequest, NotificationEnvelope{Error: &Error{"invalid page format: " + err.Error()}})
return getNotificationRoute, http.StatusBadRequest
2016-02-02 00:10:10 +00:00
}
pageToken = pageStrs[0]
} else {
pageToken = pageNumberToToken(page, ctx.Config.PaginationKey)
2016-02-02 00:10:10 +00:00
}
dbNotification, nextPage, err := ctx.Store.GetNotification(p.ByName("notificationName"), limit, page)
2016-02-05 03:11:49 +00:00
if err == cerrors.ErrNotFound {
2016-02-09 18:43:57 +00:00
writeResponse(w, r, http.StatusNotFound, NotificationEnvelope{Error: &Error{err.Error()}})
2016-02-05 03:11:49 +00:00
return deleteNotificationRoute, http.StatusNotFound
} else if err != nil {
2016-02-09 18:43:57 +00:00
writeResponse(w, r, http.StatusInternalServerError, NotificationEnvelope{Error: &Error{err.Error()}})
return getNotificationRoute, http.StatusInternalServerError
2016-02-02 00:10:10 +00:00
}
notification := NotificationFromDatabaseModel(dbNotification, limit, pageToken, nextPage, ctx.Config.PaginationKey)
2016-02-02 00:10:10 +00:00
2016-02-09 18:43:57 +00:00
writeResponse(w, r, http.StatusOK, NotificationEnvelope{Notification: &notification})
return getNotificationRoute, http.StatusOK
2016-01-27 19:07:58 +00:00
}
2016-02-02 00:10:10 +00:00
func deleteNotification(w http.ResponseWriter, r *http.Request, p httprouter.Params, ctx *context.RouteContext) (string, int) {
2016-02-02 00:26:30 +00:00
err := ctx.Store.DeleteNotification(p.ByName("notificationName"))
if err == cerrors.ErrNotFound {
2016-02-09 18:43:57 +00:00
writeResponse(w, r, http.StatusNotFound, NotificationEnvelope{Error: &Error{err.Error()}})
return deleteNotificationRoute, http.StatusNotFound
2016-02-02 00:26:30 +00:00
} else if err != nil {
2016-02-09 18:43:57 +00:00
writeResponse(w, r, http.StatusInternalServerError, NotificationEnvelope{Error: &Error{err.Error()}})
return deleteNotificationRoute, http.StatusInternalServerError
2016-02-02 00:26:30 +00:00
}
w.WriteHeader(http.StatusOK)
return deleteNotificationRoute, http.StatusOK
2016-01-27 19:07:58 +00:00
}
func getMetrics(w http.ResponseWriter, r *http.Request, p httprouter.Params, ctx *context.RouteContext) (string, int) {
2016-01-27 19:07:58 +00:00
prometheus.Handler().ServeHTTP(w, r)
return getMetricsRoute, 0
2016-01-27 19:07:58 +00:00
}