X-Git-Url: https://git.arvados.org/arvados.git/blobdiff_plain/8051c3a14d40f0d410e4ddf54d89a084475d807e..f672f727fe79bf6642a2daab641a1ef5c84648df:/services/ws/router.go diff --git a/services/ws/router.go b/services/ws/router.go index 77744974d3..14dc63ec37 100644 --- a/services/ws/router.go +++ b/services/ws/router.go @@ -1,3 +1,7 @@ +// Copyright (C) The Arvados Authors. All rights reserved. +// +// SPDX-License-Identifier: AGPL-3.0 + package main import ( @@ -9,8 +13,10 @@ import ( "sync/atomic" "time" + "git.curoverse.com/arvados.git/sdk/go/arvados" "git.curoverse.com/arvados.git/sdk/go/ctxlog" - "github.com/Sirupsen/logrus" + "git.curoverse.com/arvados.git/sdk/go/health" + "github.com/sirupsen/logrus" "golang.org/x/net/websocket" ) @@ -22,7 +28,8 @@ type wsConn interface { } type router struct { - Config *wsConfig + client arvados.Client + cluster *arvados.Cluster eventSource eventSource newPermChecker func() permChecker @@ -47,8 +54,8 @@ type debugStatuser interface { func (rtr *router) setup() { rtr.handler = &handler{ - PingTimeout: rtr.Config.PingTimeout.Duration(), - QueueSize: rtr.Config.ClientEventQueue, + PingTimeout: time.Duration(rtr.cluster.API.SendTimeout), + QueueSize: rtr.cluster.API.WebsocketClientEventQueue, } rtr.mux = http.NewServeMux() rtr.mux.Handle("/websocket", rtr.makeServer(newSessionV0)) @@ -56,10 +63,18 @@ func (rtr *router) setup() { rtr.mux.Handle("/debug.json", rtr.jsonHandler(rtr.DebugStatus)) rtr.mux.Handle("/status.json", rtr.jsonHandler(rtr.Status)) - health := http.NewServeMux() - rtr.mux.Handle("/_health/", rtr.mgmtAuth(health)) - health.Handle("/_health/ping", rtr.jsonHandler(rtr.HealthFunc(func() error { return nil }))) - health.Handle("/_health/db", rtr.jsonHandler(rtr.HealthFunc(rtr.eventSource.DBHealth))) + rtr.mux.Handle("/_health/", &health.Handler{ + Token: rtr.cluster.ManagementToken, + Prefix: "/_health/", + Routes: health.Routes{ + "db": rtr.eventSource.DBHealth, + }, + Log: func(r *http.Request, err error) { + if err != nil { + logger(r.Context()).WithError(err).Error("error") + } + }, + }) } func (rtr *router) makeServer(newSession sessionFactory) *websocket.Server { @@ -74,7 +89,7 @@ func (rtr *router) makeServer(newSession sessionFactory) *websocket.Server { stats := rtr.handler.Handle(ws, rtr.eventSource, func(ws wsConn, sendq chan<- interface{}) (session, error) { - return newSession(ws, sendq, rtr.eventSource.DB(), rtr.newPermChecker(), &rtr.Config.Client) + return newSession(ws, sendq, rtr.eventSource.DB(), rtr.newPermChecker(), &rtr.client) }) log.WithFields(logrus.Fields{ @@ -107,24 +122,10 @@ func (rtr *router) DebugStatus() interface{} { return s } -var pingResponseOK = map[string]string{"health": "OK"} - -func (rtr *router) HealthFunc(f func() error) func() interface{} { - return func() interface{} { - err := f() - if err == nil { - return pingResponseOK - } - return map[string]string{ - "health": "ERROR", - "error": err.Error(), - } - } -} - func (rtr *router) Status() interface{} { return map[string]interface{}{ "Clients": atomic.LoadInt64(&rtr.status.ReqsActive), + "Version": version, } } @@ -145,20 +146,6 @@ func (rtr *router) ServeHTTP(resp http.ResponseWriter, req *http.Request) { rtr.mux.ServeHTTP(resp, req) } -func (rtr *router) mgmtAuth(h http.Handler) http.Handler { - return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) { - if rtr.Config.ManagementToken == "" { - http.Error(w, "disabled", http.StatusNotFound) - } else if ah := r.Header.Get("Authorization"); ah == "" { - http.Error(w, "authorization required", http.StatusUnauthorized) - } else if ah != "Bearer "+rtr.Config.ManagementToken { - http.Error(w, "authorization error", http.StatusForbidden) - } else { - h.ServeHTTP(w, r) - } - }) -} - func (rtr *router) jsonHandler(fn func() interface{}) http.Handler { return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) { logger := logger(r.Context())