Refactor
This commit is contained in:
parent
97a3210eee
commit
a3cd8c06a8
@ -1,61 +0,0 @@
|
|||||||
package Vault
|
|
||||||
|
|
||||||
import (
|
|
||||||
"fmt"
|
|
||||||
"os"
|
|
||||||
vault "github.com/hashicorp/vault/api"
|
|
||||||
auth "github.com/hashicorp/vault/api/auth/approle"
|
|
||||||
)
|
|
||||||
|
|
||||||
// getVarnishList retrieve the list of varnish servers to send PURGE to.
|
|
||||||
// It uses the AppRole authentication method.
|
|
||||||
func getVarnishList() (string, error) {
|
|
||||||
config := vault.DefaultConfig() // modify for more granular configuration
|
|
||||||
|
|
||||||
client, err := vault.NewClient(config)
|
|
||||||
if err != nil {
|
|
||||||
return "", fmt.Errorf("unable to initialize Vault client: %w", err)
|
|
||||||
}
|
|
||||||
|
|
||||||
// Get roleID and secretID from ENV vars
|
|
||||||
roleID := os.Getenv("APPROLE_ROLE_ID")
|
|
||||||
if roleID == "" {
|
|
||||||
return "", fmt.Errorf("no role ID was provided in APPROLE_ROLE_ID env var")
|
|
||||||
}
|
|
||||||
secretID := os.Getenv("APPROLE_SECRET_ID")
|
|
||||||
if secretID == "" {
|
|
||||||
return "", fmt.Errorf("no secret ID was provided in APPROLE_SECRET_ID env var")
|
|
||||||
}
|
|
||||||
|
|
||||||
appRoleAuth, err := auth.NewAppRoleAuth(
|
|
||||||
roleID,
|
|
||||||
secretID,
|
|
||||||
auth.WithWrappingToken(), // Only required if the secret ID is response-wrapped.
|
|
||||||
)
|
|
||||||
if err != nil {
|
|
||||||
return "", fmt.Errorf("unable to initialize AppRole auth method: %w", err)
|
|
||||||
}
|
|
||||||
|
|
||||||
authInfo, err := client.Auth().Login(context.Background(), appRoleAuth)
|
|
||||||
if err != nil {
|
|
||||||
return "", fmt.Errorf("unable to login to AppRole auth method: %w", err)
|
|
||||||
}
|
|
||||||
if authInfo == nil {
|
|
||||||
return "", fmt.Errorf("no auth info was returned after login")
|
|
||||||
}
|
|
||||||
|
|
||||||
// get secret from the default mount path for KV v2 in dev mode, "secret"
|
|
||||||
secret, err := client.KVv2("app").Get(context.Background(), "http-broadcaster/stg/varnish_list")
|
|
||||||
if err != nil {
|
|
||||||
return "", fmt.Errorf("unable to read secret: %w", err)
|
|
||||||
}
|
|
||||||
|
|
||||||
// data map can contain more than one key-value pair,
|
|
||||||
// in this case we're just grabbing one of them
|
|
||||||
value, ok := secret.Data["list"].(string)
|
|
||||||
if !ok {
|
|
||||||
return "", fmt.Errorf("value type assertion failed: %T %#v", secret.Data["list"], secret.Data["list"])
|
|
||||||
}
|
|
||||||
|
|
||||||
return value, nil
|
|
||||||
}
|
|
||||||
77
main.go
77
main.go
@ -1,77 +0,0 @@
|
|||||||
package main
|
|
||||||
|
|
||||||
import (
|
|
||||||
"fmt"
|
|
||||||
"io"
|
|
||||||
"log"
|
|
||||||
"net/http"
|
|
||||||
"os"
|
|
||||||
"strings"
|
|
||||||
)
|
|
||||||
|
|
||||||
const (
|
|
||||||
// MethodPurge declaration for Varnish.
|
|
||||||
MethodPurge = "PURGE"
|
|
||||||
)
|
|
||||||
|
|
||||||
var (
|
|
||||||
varnishList = MakeVarnishList()
|
|
||||||
status = "200 Purged"
|
|
||||||
)
|
|
||||||
|
|
||||||
// MakeVarnishList reads the list of varnish servers from a file on disk.
|
|
||||||
func MakeVarnishList() []string {
|
|
||||||
Data, err := os.ReadFile("./varnish")
|
|
||||||
if err != nil {
|
|
||||||
log.Fatal(err)
|
|
||||||
}
|
|
||||||
sliceData := strings.Split(string(Data), ",")
|
|
||||||
return sliceData
|
|
||||||
}
|
|
||||||
|
|
||||||
// PurgeHandler handles PURGE request to broadcast it to all varnish instances.
|
|
||||||
func PurgeHandler(w http.ResponseWriter, r *http.Request) {
|
|
||||||
url := r.URL.String()
|
|
||||||
status := SendToVarnish(url)
|
|
||||||
if status != "200 Purged" {
|
|
||||||
w.WriteHeader(405)
|
|
||||||
}
|
|
||||||
io.WriteString(w, status)
|
|
||||||
}
|
|
||||||
|
|
||||||
// SendToVarnish send to all varnish servers define in varnishList the PURGE request.
|
|
||||||
func SendToVarnish(url string) string {
|
|
||||||
status = "200 Purged"
|
|
||||||
// Take url to ban as argument.
|
|
||||||
// Loop over the list of Varnish servers and send PURGE request to each.
|
|
||||||
for i := 0; i < len(varnishList); i++ {
|
|
||||||
//status = "200 Purged"
|
|
||||||
client := &http.Client{}
|
|
||||||
domain := strings.Trim(varnishList[i], "\r\n")
|
|
||||||
req, err := http.NewRequest(MethodPurge, domain + url, nil)
|
|
||||||
if err != nil {
|
|
||||||
log.Fatal("NewRequest: %s", err)
|
|
||||||
}
|
|
||||||
resp, err := client.Do(req)
|
|
||||||
if err != nil {
|
|
||||||
log.Fatal("Client.do: %s", err)
|
|
||||||
}
|
|
||||||
//fmt.Printf("Resp: %v\n", resp)
|
|
||||||
if resp.StatusCode != 200 {
|
|
||||||
status = "405 Not Allowed"
|
|
||||||
}
|
|
||||||
fmt.Println("Purge URL" + " " + domain + url + " : " + status)
|
|
||||||
}
|
|
||||||
return status
|
|
||||||
}
|
|
||||||
|
|
||||||
// HealthHandler handles healthcheck requests and return 200.
|
|
||||||
func HealthHandler(w http.ResponseWriter, r *http.Request) {
|
|
||||||
io.WriteString(w, "OK")
|
|
||||||
}
|
|
||||||
|
|
||||||
func main() {
|
|
||||||
http.HandleFunc("/", PurgeHandler)
|
|
||||||
http.HandleFunc("/healthcheck", HealthHandler)
|
|
||||||
log.Fatal(http.ListenAndServe(":6081",nil))
|
|
||||||
}
|
|
||||||
Loading…
x
Reference in New Issue
Block a user