mirror of
https://github.com/prometheus/prometheus.git
synced 2024-12-30 07:59:40 -08:00
159 lines
4.6 KiB
Go
159 lines
4.6 KiB
Go
// Copyright 2013 The Prometheus Authors
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
// you may not use this file except in compliance with the License.
|
|
// You may obtain a copy of the License at
|
|
//
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
//
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
// See the License for the specific language governing permissions and
|
|
// limitations under the License.
|
|
|
|
package httputil
|
|
|
|
import (
|
|
"crypto/tls"
|
|
"crypto/x509"
|
|
"fmt"
|
|
"io/ioutil"
|
|
"net"
|
|
"net/http"
|
|
"net/url"
|
|
"time"
|
|
)
|
|
|
|
// NewClient returns a http.Client using the specified http.RoundTripper.
|
|
func NewClient(rt http.RoundTripper) *http.Client {
|
|
return &http.Client{Transport: rt}
|
|
}
|
|
|
|
// NewDeadlineClient returns a new http.Client which will time out long running
|
|
// requests.
|
|
func NewDeadlineClient(timeout time.Duration, proxyURL *url.URL) *http.Client {
|
|
return NewClient(NewDeadlineRoundTripper(timeout, proxyURL))
|
|
}
|
|
|
|
// NewDeadlineRoundTripper returns a new http.RoundTripper which will time out
|
|
// long running requests.
|
|
func NewDeadlineRoundTripper(timeout time.Duration, proxyURL *url.URL) http.RoundTripper {
|
|
return &http.Transport{
|
|
// Set proxy (if null, then becomes a direct connection)
|
|
Proxy: http.ProxyURL(proxyURL),
|
|
// We need to disable keepalive, because we set a deadline on the
|
|
// underlying connection.
|
|
DisableKeepAlives: true,
|
|
Dial: func(netw, addr string) (c net.Conn, err error) {
|
|
start := time.Now()
|
|
|
|
c, err = net.DialTimeout(netw, addr, timeout)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
if err = c.SetDeadline(start.Add(timeout)); err != nil {
|
|
c.Close()
|
|
return nil, err
|
|
}
|
|
|
|
return c, nil
|
|
},
|
|
}
|
|
}
|
|
|
|
type bearerAuthRoundTripper struct {
|
|
bearerToken string
|
|
rt http.RoundTripper
|
|
}
|
|
|
|
// NewBearerAuthRoundTripper adds the provided bearer token to a request unless the authorization
|
|
// header has already been set.
|
|
func NewBearerAuthRoundTripper(bearer string, rt http.RoundTripper) http.RoundTripper {
|
|
return &bearerAuthRoundTripper{bearer, rt}
|
|
}
|
|
|
|
func (rt *bearerAuthRoundTripper) RoundTrip(req *http.Request) (*http.Response, error) {
|
|
if len(req.Header.Get("Authorization")) == 0 {
|
|
req = cloneRequest(req)
|
|
req.Header.Set("Authorization", "Bearer "+rt.bearerToken)
|
|
}
|
|
|
|
return rt.rt.RoundTrip(req)
|
|
}
|
|
|
|
type basicAuthRoundTripper struct {
|
|
username string
|
|
password string
|
|
rt http.RoundTripper
|
|
}
|
|
|
|
// NewBasicAuthRoundTripper will apply a BASIC auth authorization header to a request unless it has
|
|
// already been set.
|
|
func NewBasicAuthRoundTripper(username, password string, rt http.RoundTripper) http.RoundTripper {
|
|
return &basicAuthRoundTripper{username, password, rt}
|
|
}
|
|
|
|
func (rt *basicAuthRoundTripper) RoundTrip(req *http.Request) (*http.Response, error) {
|
|
if len(req.Header.Get("Authorization")) != 0 {
|
|
return rt.rt.RoundTrip(req)
|
|
}
|
|
req = cloneRequest(req)
|
|
req.SetBasicAuth(rt.username, rt.password)
|
|
return rt.rt.RoundTrip(req)
|
|
}
|
|
|
|
// cloneRequest returns a clone of the provided *http.Request.
|
|
// The clone is a shallow copy of the struct and its Header map.
|
|
func cloneRequest(r *http.Request) *http.Request {
|
|
// Shallow copy of the struct.
|
|
r2 := new(http.Request)
|
|
*r2 = *r
|
|
// Deep copy of the Header.
|
|
r2.Header = make(http.Header)
|
|
for k, s := range r.Header {
|
|
r2.Header[k] = s
|
|
}
|
|
return r2
|
|
}
|
|
|
|
type TLSOptions struct {
|
|
InsecureSkipVerify bool
|
|
CAFile string
|
|
CertFile string
|
|
KeyFile string
|
|
ServerName string
|
|
}
|
|
|
|
func NewTLSConfig(opts TLSOptions) (*tls.Config, error) {
|
|
tlsConfig := &tls.Config{InsecureSkipVerify: opts.InsecureSkipVerify}
|
|
|
|
// If a CA cert is provided then let's read it in so we can validate the
|
|
// scrape target's certificate properly.
|
|
if len(opts.CAFile) > 0 {
|
|
caCertPool := x509.NewCertPool()
|
|
// Load CA cert.
|
|
caCert, err := ioutil.ReadFile(opts.CAFile)
|
|
if err != nil {
|
|
return nil, fmt.Errorf("unable to use specified CA cert %s: %s", opts.CAFile, err)
|
|
}
|
|
caCertPool.AppendCertsFromPEM(caCert)
|
|
tlsConfig.RootCAs = caCertPool
|
|
}
|
|
|
|
if len(opts.ServerName) > 0 {
|
|
tlsConfig.ServerName = opts.ServerName
|
|
}
|
|
// If a client cert & key is provided then configure TLS config accordingly.
|
|
if len(opts.CertFile) > 0 && len(opts.KeyFile) > 0 {
|
|
cert, err := tls.LoadX509KeyPair(opts.CertFile, opts.KeyFile)
|
|
if err != nil {
|
|
return nil, fmt.Errorf("unable to use specified client cert (%s) & key (%s): %s", opts.CertFile, opts.KeyFile, err)
|
|
}
|
|
tlsConfig.Certificates = []tls.Certificate{cert}
|
|
}
|
|
tlsConfig.BuildNameToCertificate()
|
|
|
|
return tlsConfig, nil
|
|
}
|