server.go 4.6 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173
  1. package controller
  2. import (
  3. "encoding/json"
  4. "net/http"
  5. "strings"
  6. "github.com/gorilla/mux"
  7. "github.com/gravitl/netmaker/database"
  8. "github.com/gravitl/netmaker/logic"
  9. "github.com/gravitl/netmaker/models"
  10. "github.com/gravitl/netmaker/mq"
  11. "github.com/gravitl/netmaker/servercfg"
  12. )
  13. func serverHandlers(r *mux.Router) {
  14. // r.HandleFunc("/api/server/addnetwork/{network}", securityCheckServer(true, http.HandlerFunc(addNetwork))).Methods(http.MethodPost)
  15. r.HandleFunc("/api/server/health", http.HandlerFunc(func(resp http.ResponseWriter, req *http.Request) {
  16. resp.WriteHeader(http.StatusOK)
  17. resp.Write([]byte("Server is up and running!!"))
  18. }))
  19. r.HandleFunc("/api/server/getconfig", allowUsers(http.HandlerFunc(getConfig))).Methods(http.MethodGet)
  20. r.HandleFunc("/api/server/getserverinfo", Authorize(true, false, "node", http.HandlerFunc(getServerInfo))).Methods(http.MethodGet)
  21. r.HandleFunc("/api/server/status", http.HandlerFunc(getStatus)).Methods(http.MethodGet)
  22. r.HandleFunc("/api/server/usage", Authorize(true, false, "user", http.HandlerFunc(getUsage))).Methods(http.MethodGet)
  23. }
  24. // TODO move to EE package? there is a function and a type there for that already
  25. func getUsage(w http.ResponseWriter, r *http.Request) {
  26. type usage struct {
  27. Hosts int `json:"hosts"`
  28. Clients int `json:"clients"`
  29. Networks int `json:"networks"`
  30. Users int `json:"users"`
  31. Ingresses int `json:"ingresses"`
  32. Egresses int `json:"egresses"`
  33. }
  34. var serverUsage usage
  35. hosts, err := logic.GetAllHosts()
  36. if err == nil {
  37. serverUsage.Hosts = len(hosts)
  38. }
  39. clients, err := logic.GetAllExtClients()
  40. if err == nil {
  41. serverUsage.Clients = len(clients)
  42. }
  43. users, err := logic.GetUsers()
  44. if err == nil {
  45. serverUsage.Users = len(users)
  46. }
  47. networks, err := logic.GetNetworks()
  48. if err == nil {
  49. serverUsage.Networks = len(networks)
  50. }
  51. ingresses, err := logic.GetAllIngresses()
  52. if err == nil {
  53. serverUsage.Ingresses = len(ingresses)
  54. }
  55. egresses, err := logic.GetAllEgresses()
  56. if err == nil {
  57. serverUsage.Egresses = len(egresses)
  58. }
  59. w.Header().Set("Content-Type", "application/json")
  60. json.NewEncoder(w).Encode(models.SuccessResponse{
  61. Code: http.StatusOK,
  62. Response: serverUsage,
  63. })
  64. }
  65. // swagger:route GET /api/server/status server getStatus
  66. //
  67. // Get the server configuration.
  68. //
  69. // Schemes: https
  70. //
  71. // Security:
  72. // oauth
  73. //
  74. // Responses:
  75. // 200: serverConfigResponse
  76. func getStatus(w http.ResponseWriter, r *http.Request) {
  77. type status struct {
  78. DB bool `json:"db_connected"`
  79. Broker bool `json:"broker_connected"`
  80. LicenseError string `json:"license_error"`
  81. }
  82. licenseErr := ""
  83. if servercfg.ErrLicenseValidation != nil {
  84. licenseErr = servercfg.ErrLicenseValidation.Error()
  85. }
  86. currentServerStatus := status{
  87. DB: database.IsConnected(),
  88. Broker: mq.IsConnected(),
  89. LicenseError: licenseErr,
  90. }
  91. w.Header().Set("Content-Type", "application/json")
  92. json.NewEncoder(w).Encode(&currentServerStatus)
  93. }
  94. // allowUsers - allow all authenticated (valid) users - only used by getConfig, may be able to remove during refactor
  95. func allowUsers(next http.Handler) http.HandlerFunc {
  96. return func(w http.ResponseWriter, r *http.Request) {
  97. var errorResponse = models.ErrorResponse{
  98. Code: http.StatusUnauthorized, Message: logic.Unauthorized_Msg,
  99. }
  100. bearerToken := r.Header.Get("Authorization")
  101. var tokenSplit = strings.Split(bearerToken, " ")
  102. var authToken = ""
  103. if len(tokenSplit) < 2 {
  104. logic.ReturnErrorResponse(w, r, errorResponse)
  105. return
  106. } else {
  107. authToken = tokenSplit[1]
  108. }
  109. user, _, _, err := logic.VerifyUserToken(authToken)
  110. if err != nil || user == "" {
  111. logic.ReturnErrorResponse(w, r, errorResponse)
  112. return
  113. }
  114. next.ServeHTTP(w, r)
  115. }
  116. }
  117. // swagger:route GET /api/server/getserverinfo server getServerInfo
  118. //
  119. // Get the server configuration.
  120. //
  121. // Schemes: https
  122. //
  123. // Security:
  124. // oauth
  125. //
  126. // Responses:
  127. // 200: serverConfigResponse
  128. func getServerInfo(w http.ResponseWriter, r *http.Request) {
  129. // Set header
  130. w.Header().Set("Content-Type", "application/json")
  131. // get params
  132. json.NewEncoder(w).Encode(servercfg.GetServerInfo())
  133. //w.WriteHeader(http.StatusOK)
  134. }
  135. // swagger:route GET /api/server/getconfig server getConfig
  136. //
  137. // Get the server configuration.
  138. //
  139. // Schemes: https
  140. //
  141. // Security:
  142. // oauth
  143. //
  144. // Responses:
  145. // 200: serverConfigResponse
  146. func getConfig(w http.ResponseWriter, r *http.Request) {
  147. // Set header
  148. w.Header().Set("Content-Type", "application/json")
  149. // get params
  150. scfg := servercfg.GetServerConfig()
  151. scfg.IsEE = "no"
  152. if servercfg.Is_EE {
  153. scfg.IsEE = "yes"
  154. }
  155. json.NewEncoder(w).Encode(scfg)
  156. //w.WriteHeader(http.StatusOK)
  157. }