2017-01-18 03:18:03 +00:00
|
|
|
// Copyright 2017 clair authors
|
2015-11-13 19:11:28 +00:00
|
|
|
//
|
|
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
// you may not use this file except in compliance with the License.
|
|
|
|
// You may obtain a copy of the License at
|
|
|
|
//
|
|
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
//
|
|
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
// See the License for the specific language governing permissions and
|
|
|
|
// limitations under the License.
|
|
|
|
|
|
|
|
package api
|
|
|
|
|
|
|
|
import (
|
2015-12-15 17:03:42 +00:00
|
|
|
"crypto/tls"
|
|
|
|
"crypto/x509"
|
|
|
|
"io/ioutil"
|
2015-11-13 19:11:28 +00:00
|
|
|
"net"
|
|
|
|
"net/http"
|
|
|
|
"strconv"
|
|
|
|
"time"
|
|
|
|
|
2017-05-04 17:21:25 +00:00
|
|
|
log "github.com/sirupsen/logrus"
|
2015-11-13 19:11:28 +00:00
|
|
|
"github.com/tylerb/graceful"
|
2015-11-24 05:18:11 +00:00
|
|
|
|
2017-06-05 14:37:29 +00:00
|
|
|
"github.com/coreos/clair/api/v2"
|
2017-01-27 01:14:44 +00:00
|
|
|
"github.com/coreos/clair/database"
|
2017-01-18 03:18:03 +00:00
|
|
|
"github.com/coreos/clair/pkg/stopper"
|
2015-11-13 19:11:28 +00:00
|
|
|
)
|
|
|
|
|
2016-01-27 19:07:58 +00:00
|
|
|
const timeoutResponse = `{"Error":{"Message":"Clair failed to respond within the configured timeout window.","Type":"Timeout"}}`
|
2015-11-13 19:11:28 +00:00
|
|
|
|
2017-01-27 01:14:44 +00:00
|
|
|
// Config is the configuration for the API service.
|
|
|
|
type Config struct {
|
2017-06-05 14:37:29 +00:00
|
|
|
GrpcPort int
|
2017-01-27 01:14:44 +00:00
|
|
|
HealthPort int
|
|
|
|
Timeout time.Duration
|
|
|
|
CertFile, KeyFile, CAFile string
|
|
|
|
}
|
|
|
|
|
2017-06-05 14:37:29 +00:00
|
|
|
func RunV2(cfg *Config, store database.Datastore) {
|
|
|
|
tlsConfig, err := tlsClientConfig(cfg.CAFile)
|
|
|
|
if err != nil {
|
|
|
|
log.WithError(err).Fatal("could not initialize client cert authentication")
|
|
|
|
}
|
|
|
|
if tlsConfig != nil {
|
|
|
|
log.Info("main API configured with client certificate authentication")
|
|
|
|
}
|
2017-07-12 21:04:05 +00:00
|
|
|
v2.Run(cfg.GrpcPort, tlsConfig, cfg.CertFile, cfg.KeyFile, store)
|
2015-11-13 19:11:28 +00:00
|
|
|
}
|
|
|
|
|
2017-01-27 01:14:44 +00:00
|
|
|
func RunHealth(cfg *Config, store database.Datastore, st *stopper.Stopper) {
|
2016-02-01 20:42:41 +00:00
|
|
|
defer st.End()
|
|
|
|
|
2015-12-07 21:38:50 +00:00
|
|
|
// Do not run the API service if there is no config.
|
2017-01-27 01:14:44 +00:00
|
|
|
if cfg == nil {
|
2017-05-04 17:21:25 +00:00
|
|
|
log.Info("health API service is disabled.")
|
2015-12-07 21:38:50 +00:00
|
|
|
return
|
|
|
|
}
|
2017-05-04 17:21:25 +00:00
|
|
|
log.WithField("port", cfg.HealthPort).Info("starting health API")
|
2015-11-13 19:11:28 +00:00
|
|
|
|
|
|
|
srv := &graceful.Server{
|
|
|
|
Timeout: 10 * time.Second, // Interrupt health checks when stopping
|
|
|
|
NoSignalHandling: true, // We want to use our own Stopper
|
|
|
|
Server: &http.Server{
|
2017-01-27 01:14:44 +00:00
|
|
|
Addr: ":" + strconv.Itoa(cfg.HealthPort),
|
|
|
|
Handler: http.TimeoutHandler(newHealthHandler(store), cfg.Timeout, timeoutResponse),
|
2015-11-13 19:11:28 +00:00
|
|
|
},
|
|
|
|
}
|
2016-01-27 19:07:58 +00:00
|
|
|
|
2015-11-13 19:11:28 +00:00
|
|
|
listenAndServeWithStopper(srv, st, "", "")
|
2016-01-27 19:07:58 +00:00
|
|
|
|
2015-12-07 21:38:50 +00:00
|
|
|
log.Info("health API stopped")
|
2015-11-13 19:11:28 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// listenAndServeWithStopper wraps graceful.Server's
|
|
|
|
// ListenAndServe/ListenAndServeTLS and adds the ability to interrupt them with
|
2017-01-18 03:18:03 +00:00
|
|
|
// the provided stopper.Stopper.
|
|
|
|
func listenAndServeWithStopper(srv *graceful.Server, st *stopper.Stopper, certFile, keyFile string) {
|
2015-11-13 19:11:28 +00:00
|
|
|
go func() {
|
|
|
|
<-st.Chan()
|
|
|
|
srv.Stop(0)
|
|
|
|
}()
|
|
|
|
|
|
|
|
var err error
|
|
|
|
if certFile != "" && keyFile != "" {
|
|
|
|
log.Info("API: TLS Enabled")
|
|
|
|
err = srv.ListenAndServeTLS(certFile, keyFile)
|
|
|
|
} else {
|
|
|
|
err = srv.ListenAndServe()
|
|
|
|
}
|
|
|
|
|
2016-02-01 23:51:13 +00:00
|
|
|
if err != nil {
|
|
|
|
if opErr, ok := err.(*net.OpError); !ok || (ok && opErr.Op != "accept") {
|
|
|
|
log.Fatal(err)
|
|
|
|
}
|
2015-11-13 19:11:28 +00:00
|
|
|
}
|
|
|
|
}
|
2015-12-15 17:03:42 +00:00
|
|
|
|
|
|
|
// tlsClientConfig initializes a *tls.Config using the given CA. The resulting
|
|
|
|
// *tls.Config is meant to be used to configure an HTTP server to do client
|
|
|
|
// certificate authentication.
|
|
|
|
//
|
|
|
|
// If no CA is given, a nil *tls.Config is returned; no client certificate will
|
2015-12-16 17:01:51 +00:00
|
|
|
// be required and verified. In other words, authentication will be disabled.
|
2015-12-15 17:03:42 +00:00
|
|
|
func tlsClientConfig(caPath string) (*tls.Config, error) {
|
|
|
|
if caPath == "" {
|
|
|
|
return nil, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
caCert, err := ioutil.ReadFile(caPath)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
caCertPool := x509.NewCertPool()
|
|
|
|
caCertPool.AppendCertsFromPEM(caCert)
|
|
|
|
|
|
|
|
tlsConfig := &tls.Config{
|
|
|
|
ClientCAs: caCertPool,
|
|
|
|
ClientAuth: tls.RequireAndVerifyClientCert,
|
|
|
|
}
|
|
|
|
|
|
|
|
return tlsConfig, nil
|
|
|
|
}
|