server.go 4.5 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172
  1. package controller
  2. import (
  3. "encoding/json"
  4. "net/http"
  5. "strings"
  6. "github.com/gorilla/mux"
  7. "github.com/gravitl/netmaker/database"
  8. "github.com/gravitl/netmaker/logic"
  9. "github.com/gravitl/netmaker/models"
  10. "github.com/gravitl/netmaker/mq"
  11. "github.com/gravitl/netmaker/servercfg"
  12. )
  13. func serverHandlers(r *mux.Router) {
  14. // r.HandleFunc("/api/server/addnetwork/{network}", securityCheckServer(true, http.HandlerFunc(addNetwork))).Methods(http.MethodPost)
  15. r.HandleFunc("/api/server/health", http.HandlerFunc(func(resp http.ResponseWriter, req *http.Request) {
  16. resp.WriteHeader(http.StatusOK)
  17. resp.Write([]byte("Server is up and running!!"))
  18. }))
  19. r.HandleFunc("/api/server/getconfig", allowUsers(http.HandlerFunc(getConfig))).Methods(http.MethodGet)
  20. r.HandleFunc("/api/server/getserverinfo", Authorize(true, false, "node", http.HandlerFunc(getServerInfo))).Methods(http.MethodGet)
  21. r.HandleFunc("/api/server/status", http.HandlerFunc(getStatus)).Methods(http.MethodGet)
  22. r.HandleFunc("/api/server/usage", Authorize(true, false, "user", http.HandlerFunc(getUsage))).Methods(http.MethodGet)
  23. }
  24. func getUsage(w http.ResponseWriter, r *http.Request) {
  25. type usage struct {
  26. Hosts int `json:"hosts"`
  27. Clients int `json:"clients"`
  28. Networks int `json:"networks"`
  29. Users int `json:"users"`
  30. Ingresses int `json:"ingresses"`
  31. Egresses int `json:"egresses"`
  32. }
  33. var serverUsage usage
  34. hosts, err := logic.GetAllHosts()
  35. if err == nil {
  36. serverUsage.Hosts = len(hosts)
  37. }
  38. clients, err := logic.GetAllExtClients()
  39. if err == nil {
  40. serverUsage.Clients = len(clients)
  41. }
  42. users, err := logic.GetUsers()
  43. if err == nil {
  44. serverUsage.Users = len(users)
  45. }
  46. networks, err := logic.GetNetworks()
  47. if err == nil {
  48. serverUsage.Networks = len(networks)
  49. }
  50. ingresses, err := logic.GetAllIngresses()
  51. if err == nil {
  52. serverUsage.Ingresses = len(ingresses)
  53. }
  54. egresses, err := logic.GetAllEgresses()
  55. if err == nil {
  56. serverUsage.Egresses = len(egresses)
  57. }
  58. w.Header().Set("Content-Type", "application/json")
  59. json.NewEncoder(w).Encode(models.SuccessResponse{
  60. Code: http.StatusOK,
  61. Response: serverUsage,
  62. })
  63. }
  64. // swagger:route GET /api/server/status server getStatus
  65. //
  66. // Get the server configuration.
  67. //
  68. // Schemes: https
  69. //
  70. // Security:
  71. // oauth
  72. //
  73. // Responses:
  74. // 200: serverConfigResponse
  75. func getStatus(w http.ResponseWriter, r *http.Request) {
  76. type status struct {
  77. DB bool `json:"db_connected"`
  78. Broker bool `json:"broker_connected"`
  79. LicenseError string `json:"license_error"`
  80. }
  81. licenseErr := ""
  82. if servercfg.ErrLicenseValidation != nil {
  83. licenseErr = servercfg.ErrLicenseValidation.Error()
  84. }
  85. currentServerStatus := status{
  86. DB: database.IsConnected(),
  87. Broker: mq.IsConnected(),
  88. LicenseError: licenseErr,
  89. }
  90. w.Header().Set("Content-Type", "application/json")
  91. json.NewEncoder(w).Encode(&currentServerStatus)
  92. }
  93. // allowUsers - allow all authenticated (valid) users - only used by getConfig, may be able to remove during refactor
  94. func allowUsers(next http.Handler) http.HandlerFunc {
  95. return func(w http.ResponseWriter, r *http.Request) {
  96. var errorResponse = models.ErrorResponse{
  97. Code: http.StatusUnauthorized, Message: logic.Unauthorized_Msg,
  98. }
  99. bearerToken := r.Header.Get("Authorization")
  100. var tokenSplit = strings.Split(bearerToken, " ")
  101. var authToken = ""
  102. if len(tokenSplit) < 2 {
  103. logic.ReturnErrorResponse(w, r, errorResponse)
  104. return
  105. } else {
  106. authToken = tokenSplit[1]
  107. }
  108. user, _, _, err := logic.VerifyUserToken(authToken)
  109. if err != nil || user == "" {
  110. logic.ReturnErrorResponse(w, r, errorResponse)
  111. return
  112. }
  113. next.ServeHTTP(w, r)
  114. }
  115. }
  116. // swagger:route GET /api/server/getserverinfo server getServerInfo
  117. //
  118. // Get the server configuration.
  119. //
  120. // Schemes: https
  121. //
  122. // Security:
  123. // oauth
  124. //
  125. // Responses:
  126. // 200: serverConfigResponse
  127. func getServerInfo(w http.ResponseWriter, r *http.Request) {
  128. // Set header
  129. w.Header().Set("Content-Type", "application/json")
  130. // get params
  131. json.NewEncoder(w).Encode(servercfg.GetServerInfo())
  132. //w.WriteHeader(http.StatusOK)
  133. }
  134. // swagger:route GET /api/server/getconfig server getConfig
  135. //
  136. // Get the server configuration.
  137. //
  138. // Schemes: https
  139. //
  140. // Security:
  141. // oauth
  142. //
  143. // Responses:
  144. // 200: serverConfigResponse
  145. func getConfig(w http.ResponseWriter, r *http.Request) {
  146. // Set header
  147. w.Header().Set("Content-Type", "application/json")
  148. // get params
  149. scfg := servercfg.GetServerConfig()
  150. scfg.IsPro = "no"
  151. if servercfg.IsPro {
  152. scfg.IsPro = "yes"
  153. }
  154. json.NewEncoder(w).Encode(scfg)
  155. //w.WriteHeader(http.StatusOK)
  156. }