fleet/server/service/client.go
Zachary Wasserman adf87140a7
Add ability to prefix Fleet URLs (#2112)
- Add the server_url_prefix flag for configuring this functionality
- Add prefix handling to the server routes
- Refactor JS to use appropriate paths from modules
- Use JS template to get URL prefix into JS environment
- Update webpack config to support prefixing

Thanks to securityonion.net for sponsoring the development of this feature.

Closes #1661
2019-10-16 16:40:45 -07:00

132 lines
2.9 KiB
Go

package service
import (
"bytes"
"crypto/tls"
"crypto/x509"
"encoding/json"
"fmt"
"io/ioutil"
"net/http"
"net/url"
"strings"
"github.com/pkg/errors"
)
type Client struct {
addr string
baseURL *url.URL
urlPrefix string
token string
http *http.Client
insecureSkipVerify bool
}
func NewClient(addr string, insecureSkipVerify bool, rootCA, urlPrefix string) (*Client, error) {
if !strings.HasPrefix(addr, "https://") {
return nil, errors.New("Address must start with https://")
}
baseURL, err := url.Parse(addr)
if err != nil {
return nil, errors.Wrap(err, "parsing URL")
}
rootCAPool, err := x509.SystemCertPool()
if err != nil {
return nil, errors.Wrap(err, "loading system cert pool")
}
if rootCA != "" {
// set up empty cert pool
rootCAPool = x509.NewCertPool()
// read in the root cert file specified in the context
certs, err := ioutil.ReadFile(rootCA)
if err != nil {
return nil, errors.Wrap(err, "reading root CA")
}
// add certs to new cert pool
if ok := rootCAPool.AppendCertsFromPEM(certs); !ok {
return nil, errors.Wrap(err, "adding root CA")
}
}
httpClient := &http.Client{
Transport: &http.Transport{
TLSClientConfig: &tls.Config{
InsecureSkipVerify: insecureSkipVerify,
RootCAs: rootCAPool,
},
},
}
return &Client{
addr: addr,
baseURL: baseURL,
http: httpClient,
insecureSkipVerify: insecureSkipVerify,
urlPrefix: urlPrefix,
}, nil
}
func (c *Client) doWithHeaders(verb, path string, params interface{}, headers map[string]string) (*http.Response, error) {
var bodyBytes []byte
var err error
if params != nil {
bodyBytes, err = json.Marshal(params)
if err != nil {
return nil, errors.Wrap(err, "marshaling json")
}
}
request, err := http.NewRequest(
verb,
c.url(path).String(),
bytes.NewBuffer(bodyBytes),
)
if err != nil {
return nil, errors.Wrap(err, "creating request object")
}
for k, v := range headers {
request.Header.Set(k, v)
}
return c.http.Do(request)
}
func (c *Client) Do(verb, path string, params interface{}) (*http.Response, error) {
headers := map[string]string{
"Content-type": "application/json",
"Accept": "application/json",
}
return c.doWithHeaders(verb, path, params, headers)
}
func (c *Client) AuthenticatedDo(verb, path string, params interface{}) (*http.Response, error) {
if c.token == "" {
return nil, errors.New("authentication token is empty")
}
headers := map[string]string{
"Content-Type": "application/json",
"Accept": "application/json",
"Authorization": fmt.Sprintf("Bearer %s", c.token),
}
return c.doWithHeaders(verb, path, params, headers)
}
func (c *Client) SetToken(t string) {
c.token = t
}
func (c *Client) url(path string) *url.URL {
u := *c.baseURL
u.Path = c.urlPrefix + path
return &u
}