mirror of
https://github.com/empayre/fleet.git
synced 2024-11-06 17:05:18 +00:00
adf87140a7
- Add the server_url_prefix flag for configuring this functionality - Add prefix handling to the server routes - Refactor JS to use appropriate paths from modules - Use JS template to get URL prefix into JS environment - Update webpack config to support prefixing Thanks to securityonion.net for sponsoring the development of this feature. Closes #1661
132 lines
2.9 KiB
Go
132 lines
2.9 KiB
Go
package service
|
|
|
|
import (
|
|
"bytes"
|
|
"crypto/tls"
|
|
"crypto/x509"
|
|
"encoding/json"
|
|
"fmt"
|
|
"io/ioutil"
|
|
"net/http"
|
|
"net/url"
|
|
"strings"
|
|
|
|
"github.com/pkg/errors"
|
|
)
|
|
|
|
type Client struct {
|
|
addr string
|
|
baseURL *url.URL
|
|
urlPrefix string
|
|
token string
|
|
http *http.Client
|
|
insecureSkipVerify bool
|
|
}
|
|
|
|
func NewClient(addr string, insecureSkipVerify bool, rootCA, urlPrefix string) (*Client, error) {
|
|
if !strings.HasPrefix(addr, "https://") {
|
|
return nil, errors.New("Address must start with https://")
|
|
}
|
|
|
|
baseURL, err := url.Parse(addr)
|
|
if err != nil {
|
|
return nil, errors.Wrap(err, "parsing URL")
|
|
}
|
|
|
|
rootCAPool, err := x509.SystemCertPool()
|
|
if err != nil {
|
|
return nil, errors.Wrap(err, "loading system cert pool")
|
|
}
|
|
|
|
if rootCA != "" {
|
|
// set up empty cert pool
|
|
rootCAPool = x509.NewCertPool()
|
|
|
|
// read in the root cert file specified in the context
|
|
certs, err := ioutil.ReadFile(rootCA)
|
|
if err != nil {
|
|
return nil, errors.Wrap(err, "reading root CA")
|
|
}
|
|
|
|
// add certs to new cert pool
|
|
if ok := rootCAPool.AppendCertsFromPEM(certs); !ok {
|
|
return nil, errors.Wrap(err, "adding root CA")
|
|
}
|
|
}
|
|
|
|
httpClient := &http.Client{
|
|
Transport: &http.Transport{
|
|
TLSClientConfig: &tls.Config{
|
|
InsecureSkipVerify: insecureSkipVerify,
|
|
RootCAs: rootCAPool,
|
|
},
|
|
},
|
|
}
|
|
|
|
return &Client{
|
|
addr: addr,
|
|
baseURL: baseURL,
|
|
http: httpClient,
|
|
insecureSkipVerify: insecureSkipVerify,
|
|
urlPrefix: urlPrefix,
|
|
}, nil
|
|
}
|
|
|
|
func (c *Client) doWithHeaders(verb, path string, params interface{}, headers map[string]string) (*http.Response, error) {
|
|
var bodyBytes []byte
|
|
var err error
|
|
if params != nil {
|
|
bodyBytes, err = json.Marshal(params)
|
|
if err != nil {
|
|
return nil, errors.Wrap(err, "marshaling json")
|
|
}
|
|
}
|
|
|
|
request, err := http.NewRequest(
|
|
verb,
|
|
c.url(path).String(),
|
|
bytes.NewBuffer(bodyBytes),
|
|
)
|
|
if err != nil {
|
|
return nil, errors.Wrap(err, "creating request object")
|
|
}
|
|
for k, v := range headers {
|
|
request.Header.Set(k, v)
|
|
}
|
|
|
|
return c.http.Do(request)
|
|
}
|
|
|
|
func (c *Client) Do(verb, path string, params interface{}) (*http.Response, error) {
|
|
headers := map[string]string{
|
|
"Content-type": "application/json",
|
|
"Accept": "application/json",
|
|
}
|
|
|
|
return c.doWithHeaders(verb, path, params, headers)
|
|
}
|
|
|
|
func (c *Client) AuthenticatedDo(verb, path string, params interface{}) (*http.Response, error) {
|
|
if c.token == "" {
|
|
return nil, errors.New("authentication token is empty")
|
|
}
|
|
|
|
headers := map[string]string{
|
|
"Content-Type": "application/json",
|
|
"Accept": "application/json",
|
|
"Authorization": fmt.Sprintf("Bearer %s", c.token),
|
|
}
|
|
|
|
return c.doWithHeaders(verb, path, params, headers)
|
|
}
|
|
|
|
func (c *Client) SetToken(t string) {
|
|
c.token = t
|
|
}
|
|
|
|
func (c *Client) url(path string) *url.URL {
|
|
u := *c.baseURL
|
|
u.Path = c.urlPrefix + path
|
|
return &u
|
|
}
|