summaryrefslogtreecommitdiff
path: root/src/daq/s5proxy/src/s5proxy/config.go
blob: 1aa773abea43c818163215e9ee992b189a314504 (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
//
// sfive
//
// sfive - spreadspace streaming statistics suite is a generic
// statistic collection tool for streaming server infrastuctures.
// The system collects and stores meta data like number of views
// and throughput from a number of streaming servers and stores
// it in a global data store.
// The data acquisition is designed to be generic and extensible in
// order to support different streaming software.
// sfive also contains tools and applications to filter and visualize
// live and recorded data.
//
//
// Copyright (C) 2014-2017 Christian Pointner <equinox@spreadspace.org>
//                         Markus Grüneis <gimpf@gimpf.org>
//
// This file is part of sfive.
//
// sfive is free software: you can redistribute it and/or modify
// it under the terms of the GNU General Public License version 3
// as published by the Free Software Foundation.
//
// sfive is distributed in the hope that it will be useful,
// but WITHOUT ANY WARRANTY; without even the implied warranty of
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
// GNU General Public License for more details.
//
// You should have received a copy of the GNU General Public License
// along with sfive. If not, see <http://www.gnu.org/licenses/>.
//

package main

import (
	"encoding/json"
	"errors"
	"fmt"
	"net/http"
	"os"
	"strconv"
	"strings"
	"time"
)

type ProtocolType string

const (
	HTTPAndHTTPS ProtocolType = "http+https"
	HTTPOnly     ProtocolType = "http"
	HTTPSOnly    ProtocolType = "https"
)

func (p ProtocolType) String() string {
	return string(p)
}

func (p *ProtocolType) fromString(str string) (err error) {
	switch strings.ToLower(str) {
	case string(HTTPAndHTTPS):
		fallthrough
	case string(HTTPOnly):
		fallthrough
	case string(HTTPSOnly):
		*p = ProtocolType(strings.ToLower(str))
	default:
		return fmt.Errorf("invalid protocol: '"+str+"', must be one of '%s', '%s' or '%s'", HTTPOnly, HTTPSOnly, HTTPAndHTTPS)
	}
	return
}

func (p ProtocolType) MarshalText() (data []byte, err error) {
	data = []byte(p.String())
	return
}

func (p *ProtocolType) UnmarshalText(data []byte) (err error) {
	return p.fromString(string(data))
}

type RedirectCode int

func (r RedirectCode) String() string {
	return strconv.Itoa(int(r))
}

func (r *RedirectCode) fromString(str string) error {
	code, err := strconv.Atoi(str)
	if err != nil {
		return err
	}
	switch code {
	case 0:
		fallthrough
	case http.StatusMovedPermanently:
		fallthrough
	case http.StatusFound:
		fallthrough
	case http.StatusSeeOther:
		fallthrough
	case http.StatusTemporaryRedirect:
		*r = RedirectCode(code)
		return nil
	}
	return fmt.Errorf("invalid redirect code: '"+str+"', must be one of %d, %d, %d or %d",
		http.StatusMovedPermanently, http.StatusFound, http.StatusSeeOther, http.StatusTemporaryRedirect)
}

func (r RedirectCode) MarshalJSON() (data []byte, err error) {
	data = []byte(r.String())
	return
}

func (r *RedirectCode) UnmarshalJSON(data []byte) (err error) {
	return r.fromString(string(data))
}

type Operation uint

const (
	OpAdd Operation = iota
	OpDel
	OpSet
	OpTime
)

func (o Operation) String() string {
	switch o {
	case OpAdd:
		return "add"
	case OpDel:
		return "del"
	case OpSet:
		return "set"
	case OpTime:
		return "time"
	}
	return "unknown"
}

func (o *Operation) fromString(str string) (err error) {
	switch str {
	case "add":
		*o = OpAdd
	case "del":
		*o = OpDel
	case "set":
		*o = OpSet
	case "time":
		*o = OpTime
	default:
		return errors.New("invalid operation: '" + str + "'")
	}
	return
}

func (o Operation) MarshalText() (data []byte, err error) {
	data = []byte(o.String())
	return
}

func (o *Operation) UnmarshalText(data []byte) (err error) {
	return o.fromString(string(data))
}

type HeaderOperation struct {
	Operation Operation `json:"op"`
	Header    string    `json:"header"`
	Value     string    `json:"value,omitempty"`
}

type Duration int64

func (d *Duration) UnmarshalText(data []byte) error {
	v, err := time.ParseDuration(string(data))
	if err != nil {
		return err
	}
	if v < 1*time.Second {
		return errors.New("duration must be >= 1s")
	}
	*d = Duration(v / time.Millisecond)
	return nil
}

type SFiveConf struct {
	Sock     string   `json:"socket"`
	Hostname string   `json:"hostname"`
	Tags     []string `json:"tags"`
	Duration Duration `json:"duration"`
	Format   string   `json:"format"`
	Stream   []string `json:"stream"`
}

type Config struct {
	ListenAddr     string            `json:"listen"`
	Protocol       ProtocolType      `json:"protocol"`
	Redirect2HTTPS RedirectCode      `json:"redirect2https"`
	ConnectAddr    string            `json:"connect"`
	CertFile       string            `json:"cert"`
	KeyFile        string            `json:"key"`
	RequestHeader  []HeaderOperation `json:"request_header"`
	ResponseHeader []HeaderOperation `json:"response_header"`
	SFive          SFiveConf         `json:"sfive"`
}

func readConfig(configfile string) (conf *Config, err error) {
	s5l.Printf("reading config from: %s", configfile)

	var f *os.File
	if f, err = os.Open(configfile); err != nil {
		return
	}
	defer f.Close()

	conf = &Config{}
	conf.SFive.Duration = 10000
	if err = json.NewDecoder(f).Decode(conf); err != nil {
		return
	}
	if conf.Protocol == HTTPAndHTTPS || conf.Protocol == HTTPSOnly {
		if conf.CertFile == "" || conf.KeyFile == "" {
			return nil, errors.New("HTTPs is enabled but no certificate and/or key file is supplied")
		}
	}

	return
}