Support looking up environment remotely (#10215)
adds a feature where we can fetch the MinIO command-line remotely, this is primarily meant to add some stateless nature to the MinIO deployment in k8s environments, MinIO operator would run a webhook service endpoint which can be used to fetch any environment value in a generalized approach.master
parent
adcaa6f9de
commit
77509ce391
@ -0,0 +1,167 @@ |
|||||||
|
/* |
||||||
|
* MinIO Cloud Storage, (C) 2020 MinIO, Inc. |
||||||
|
* |
||||||
|
* Licensed under the Apache License, Version 2.0 (the "License"); |
||||||
|
* you may not use this file except in compliance with the License. |
||||||
|
* You may obtain a copy of the License at |
||||||
|
* |
||||||
|
* http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
* |
||||||
|
* Unless required by applicable law or agreed to in writing, software |
||||||
|
* distributed under the License is distributed on an "AS IS" BASIS, |
||||||
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
||||||
|
* See the License for the specific language governing permissions and |
||||||
|
* limitations under the License. |
||||||
|
* |
||||||
|
*/ |
||||||
|
|
||||||
|
package env |
||||||
|
|
||||||
|
import ( |
||||||
|
"context" |
||||||
|
"crypto/tls" |
||||||
|
"crypto/x509" |
||||||
|
"errors" |
||||||
|
"fmt" |
||||||
|
"io/ioutil" |
||||||
|
"net" |
||||||
|
"net/http" |
||||||
|
"net/url" |
||||||
|
"os" |
||||||
|
"regexp" |
||||||
|
"time" |
||||||
|
) |
||||||
|
|
||||||
|
const ( |
||||||
|
webEnvScheme = "env" |
||||||
|
webEnvSchemeSecure = "env+tls" |
||||||
|
) |
||||||
|
|
||||||
|
var ( |
||||||
|
globalRootCAs *x509.CertPool |
||||||
|
) |
||||||
|
|
||||||
|
// RegisterGlobalCAs register the global root CAs
|
||||||
|
func RegisterGlobalCAs(CAs *x509.CertPool) { |
||||||
|
globalRootCAs = CAs |
||||||
|
} |
||||||
|
|
||||||
|
func isValidEnvScheme(scheme string) bool { |
||||||
|
switch scheme { |
||||||
|
case webEnvScheme: |
||||||
|
fallthrough |
||||||
|
case webEnvSchemeSecure: |
||||||
|
return true |
||||||
|
} |
||||||
|
return false |
||||||
|
} |
||||||
|
|
||||||
|
var ( |
||||||
|
hostKeys = regexp.MustCompile("^(https?://)(.*?):(.*?)@(.*?)$") |
||||||
|
) |
||||||
|
|
||||||
|
func fetchEnvHTTP(envKey string, u *url.URL) (string, error) { |
||||||
|
switch u.Scheme { |
||||||
|
case webEnvScheme: |
||||||
|
u.Scheme = "http" |
||||||
|
case webEnvSchemeSecure: |
||||||
|
u.Scheme = "https" |
||||||
|
} |
||||||
|
|
||||||
|
ctx, cancel := context.WithTimeout(context.Background(), 3*time.Second) |
||||||
|
defer cancel() |
||||||
|
|
||||||
|
var ( |
||||||
|
username, password string |
||||||
|
) |
||||||
|
|
||||||
|
envURL := u.String() |
||||||
|
if hostKeys.MatchString(envURL) { |
||||||
|
parts := hostKeys.FindStringSubmatch(envURL) |
||||||
|
if len(parts) != 5 { |
||||||
|
return "", errors.New("invalid arguments") |
||||||
|
} |
||||||
|
username = parts[2] |
||||||
|
password = parts[3] |
||||||
|
envURL = fmt.Sprintf("%s%s", parts[1], parts[4]) |
||||||
|
} |
||||||
|
|
||||||
|
if username == "" && password == "" && u.User != nil { |
||||||
|
username = u.User.Username() |
||||||
|
password, _ = u.User.Password() |
||||||
|
} |
||||||
|
|
||||||
|
req, err := http.NewRequestWithContext(ctx, http.MethodGet, envURL+"?key="+envKey, nil) |
||||||
|
if err != nil { |
||||||
|
return "", err |
||||||
|
} |
||||||
|
|
||||||
|
if username != "" && password != "" { |
||||||
|
req.SetBasicAuth(username, password) |
||||||
|
} |
||||||
|
|
||||||
|
clnt := &http.Client{ |
||||||
|
Transport: &http.Transport{ |
||||||
|
Proxy: http.ProxyFromEnvironment, |
||||||
|
DialContext: (&net.Dialer{ |
||||||
|
Timeout: 3 * time.Second, |
||||||
|
KeepAlive: 5 * time.Second, |
||||||
|
}).DialContext, |
||||||
|
ResponseHeaderTimeout: 3 * time.Second, |
||||||
|
TLSHandshakeTimeout: 3 * time.Second, |
||||||
|
ExpectContinueTimeout: 3 * time.Second, |
||||||
|
TLSClientConfig: &tls.Config{ |
||||||
|
RootCAs: globalRootCAs, |
||||||
|
}, |
||||||
|
// Go net/http automatically unzip if content-type is
|
||||||
|
// gzip disable this feature, as we are always interested
|
||||||
|
// in raw stream.
|
||||||
|
DisableCompression: true, |
||||||
|
}, |
||||||
|
} |
||||||
|
|
||||||
|
resp, err := clnt.Do(req) |
||||||
|
if err != nil { |
||||||
|
return "", err |
||||||
|
} |
||||||
|
|
||||||
|
envValueBytes, err := ioutil.ReadAll(resp.Body) |
||||||
|
if err != nil { |
||||||
|
return "", err |
||||||
|
} |
||||||
|
|
||||||
|
return string(envValueBytes), nil |
||||||
|
} |
||||||
|
|
||||||
|
// Environ returns a copy of strings representing the
|
||||||
|
// environment, in the form "key=value".
|
||||||
|
func Environ() []string { |
||||||
|
return os.Environ() |
||||||
|
} |
||||||
|
|
||||||
|
// LookupEnv retrieves the value of the environment variable
|
||||||
|
// named by the key. If the variable is present in the
|
||||||
|
// environment the value (which may be empty) is returned
|
||||||
|
// and the boolean is true. Otherwise the returned value
|
||||||
|
// will be empty and the boolean will be false.
|
||||||
|
//
|
||||||
|
// Additionally if the input is env://username:password@remote:port/
|
||||||
|
// to fetch ENV values for the env value from a remote server.
|
||||||
|
func LookupEnv(key string) (string, bool) { |
||||||
|
v, ok := os.LookupEnv(key) |
||||||
|
if ok { |
||||||
|
u, err := url.Parse(v) |
||||||
|
if err != nil { |
||||||
|
return "", false |
||||||
|
} |
||||||
|
if !isValidEnvScheme(u.Scheme) { |
||||||
|
return v, true |
||||||
|
} |
||||||
|
v, err = fetchEnvHTTP(key, u) |
||||||
|
if err != nil { |
||||||
|
return "", false |
||||||
|
} |
||||||
|
return v, true |
||||||
|
} |
||||||
|
return "", false |
||||||
|
} |
Loading…
Reference in new issue