Compare commits
63 Commits
| Author | SHA1 | Date | |
|---|---|---|---|
|
|
27d54a67c5 | ||
|
|
394b6c6b19 | ||
|
|
572a661570 | ||
|
|
ae2c5d1f80 | ||
|
|
0b8223504c | ||
|
|
d10a176e53 | ||
|
|
e8636e09ac | ||
|
|
109e665451 | ||
|
|
33c6293042 | ||
|
|
6c93e2987b | ||
|
|
cfdeef0e2a | ||
|
|
1842453288 | ||
|
|
9fdfd5cb17 | ||
|
|
62d92811ce | ||
|
|
5e0380377f | ||
|
|
669c88abce | ||
|
|
46ce22d8ec | ||
|
|
6e8531123f | ||
|
|
f651a27580 | ||
|
|
900118758f | ||
|
|
2da157319c | ||
|
|
1f0946a0b1 | ||
|
|
1b5234d37c | ||
|
|
b334dcfcea | ||
|
|
f09931b33a | ||
|
|
afd2708b14 | ||
|
|
f35f940d90 | ||
|
|
54942ada28 | ||
|
|
cc1fbdc2b9 | ||
|
|
865440a0b0 | ||
|
|
300d243657 | ||
|
|
5be69cf38d | ||
|
|
1701c6cbe5 | ||
|
|
f1ca7d069c | ||
|
|
0ae522a43e | ||
|
|
3af4030d87 | ||
|
|
cc7ae5835f | ||
|
|
1307c185e0 | ||
|
|
dc016ceccc | ||
|
|
2cd59bd065 | ||
|
|
664b9f425d | ||
|
|
7dc37b1b74 | ||
|
|
6786f6753c | ||
|
|
3744500c5e | ||
|
|
866b1a165a | ||
|
|
f8fab8d501 | ||
|
|
bb07fc7e6e | ||
|
|
7073bea751 | ||
|
|
b3fa7f0507 | ||
|
|
50a90591fc | ||
|
|
204cd377f5 | ||
|
|
988ee495ba | ||
|
|
67a63bc610 | ||
|
|
9c90cf07e9 | ||
|
|
1844d70a58 | ||
|
|
43e698f307 | ||
|
|
eeecbb33bb | ||
|
|
715a703b0a | ||
|
|
a2a3c4f948 | ||
|
|
defd5bdb32 | ||
|
|
908f01df4b | ||
|
|
1a1f4cf14d | ||
|
|
cd90e887fe |
3
.github/FUNDING.yml
vendored
Normal file
3
.github/FUNDING.yml
vendored
Normal file
@@ -0,0 +1,3 @@
|
|||||||
|
# These are supported funding model platforms
|
||||||
|
|
||||||
|
github: [lukaszbudnik]
|
||||||
17
.github/dependabot.yml
vendored
Normal file
17
.github/dependabot.yml
vendored
Normal file
@@ -0,0 +1,17 @@
|
|||||||
|
version: 2
|
||||||
|
updates:
|
||||||
|
# Maintain dependencies for GitHub Actions
|
||||||
|
- package-ecosystem: "github-actions"
|
||||||
|
directory: "/"
|
||||||
|
schedule:
|
||||||
|
interval: "daily"
|
||||||
|
# Maintain dependencies for go lang
|
||||||
|
- package-ecosystem: "gomod"
|
||||||
|
directory: "/"
|
||||||
|
schedule:
|
||||||
|
interval: "daily"
|
||||||
|
# Maintain dependencies for docker
|
||||||
|
- package-ecosystem: "docker"
|
||||||
|
directory: "/"
|
||||||
|
schedule:
|
||||||
|
interval: "daily"
|
||||||
12
.github/workflows/docker-image.yml
vendored
Normal file
12
.github/workflows/docker-image.yml
vendored
Normal file
@@ -0,0 +1,12 @@
|
|||||||
|
name: Docker Image CI
|
||||||
|
|
||||||
|
on: [push, pull_request]
|
||||||
|
|
||||||
|
jobs:
|
||||||
|
build:
|
||||||
|
runs-on: ubuntu-latest
|
||||||
|
|
||||||
|
steps:
|
||||||
|
- uses: actions/checkout@v3.1.0
|
||||||
|
- name: Build the Docker image
|
||||||
|
run: docker build . --file Dockerfile --tag yosoy-local:$(date +%s)
|
||||||
52
.github/workflows/docker-publish.yml
vendored
Normal file
52
.github/workflows/docker-publish.yml
vendored
Normal file
@@ -0,0 +1,52 @@
|
|||||||
|
name: Publish Docker image
|
||||||
|
|
||||||
|
on:
|
||||||
|
push:
|
||||||
|
branches: [main]
|
||||||
|
release:
|
||||||
|
types: [published]
|
||||||
|
|
||||||
|
jobs:
|
||||||
|
push_to_registries:
|
||||||
|
name: Push Docker image to Docker Hub and ghcr.io registries
|
||||||
|
runs-on: ubuntu-latest
|
||||||
|
permissions:
|
||||||
|
packages: write
|
||||||
|
contents: read
|
||||||
|
steps:
|
||||||
|
- name: Check out the repo
|
||||||
|
uses: actions/checkout@v3.1.0
|
||||||
|
|
||||||
|
- name: Log in to Docker Hub
|
||||||
|
uses: docker/login-action@v2
|
||||||
|
with:
|
||||||
|
username: ${{ secrets.DOCKER_HUB_USERNAME }}
|
||||||
|
password: ${{ secrets.DOCKER_HUB_TOKEN }}
|
||||||
|
|
||||||
|
- name: Log in to the Container registry
|
||||||
|
uses: docker/login-action@v2
|
||||||
|
with:
|
||||||
|
registry: ghcr.io
|
||||||
|
username: ${{ github.actor }}
|
||||||
|
password: ${{ secrets.GITHUB_TOKEN }}
|
||||||
|
|
||||||
|
- name: Extract metadata (tags, labels) for Docker
|
||||||
|
id: meta
|
||||||
|
uses: docker/metadata-action@v4
|
||||||
|
with:
|
||||||
|
images: |
|
||||||
|
lukasz/yosoy
|
||||||
|
ghcr.io/${{ github.repository }}
|
||||||
|
tags: |
|
||||||
|
type=edge
|
||||||
|
type=semver,pattern={{version}}
|
||||||
|
type=semver,pattern={{major}}.{{minor}}
|
||||||
|
type=semver,pattern={{major}}
|
||||||
|
|
||||||
|
- name: Build and push Docker images
|
||||||
|
uses: docker/build-push-action@v3
|
||||||
|
with:
|
||||||
|
context: .
|
||||||
|
push: true
|
||||||
|
tags: ${{ steps.meta.outputs.tags }}
|
||||||
|
labels: ${{ steps.meta.outputs.labels }}
|
||||||
20
.github/workflows/go.yml
vendored
Normal file
20
.github/workflows/go.yml
vendored
Normal file
@@ -0,0 +1,20 @@
|
|||||||
|
name: Go
|
||||||
|
|
||||||
|
on: [push, pull_request]
|
||||||
|
|
||||||
|
jobs:
|
||||||
|
build:
|
||||||
|
runs-on: ubuntu-latest
|
||||||
|
steps:
|
||||||
|
- uses: actions/checkout@v3.1.0
|
||||||
|
|
||||||
|
- name: Set up Go
|
||||||
|
uses: actions/setup-go@v3
|
||||||
|
with:
|
||||||
|
go-version: 1.16
|
||||||
|
|
||||||
|
- name: Build
|
||||||
|
run: go build -v ./...
|
||||||
|
|
||||||
|
- name: Test
|
||||||
|
run: go test -v ./...
|
||||||
2
.gitignore
vendored
Normal file
2
.gitignore
vendored
Normal file
@@ -0,0 +1,2 @@
|
|||||||
|
debug.test
|
||||||
|
yosoy
|
||||||
@@ -1,13 +1,12 @@
|
|||||||
FROM golang:1.13.5-alpine3.10 as builder
|
FROM golang:1.17.3-alpine3.13 as builder
|
||||||
|
|
||||||
LABEL maintainer="Łukasz Budnik lukasz.budnik@gmail.com"
|
LABEL maintainer="Łukasz Budnik lukasz.budnik@gmail.com"
|
||||||
|
|
||||||
# build yosoy
|
# build yosoy
|
||||||
RUN apk add git
|
ADD . /go/yosoy
|
||||||
RUN git clone https://github.com/lukaszbudnik/yosoy.git
|
|
||||||
RUN cd /go/yosoy && go build
|
RUN cd /go/yosoy && go build
|
||||||
|
|
||||||
FROM alpine:3.10
|
FROM alpine:3.16.2
|
||||||
COPY --from=builder /go/yosoy/yosoy /bin
|
COPY --from=builder /go/yosoy/yosoy /bin
|
||||||
|
|
||||||
# register entrypoint
|
# register entrypoint
|
||||||
|
|||||||
228
README.md
228
README.md
@@ -1,151 +1,133 @@
|
|||||||
# yosoy
|
# yosoy  
|
||||||
|
|
||||||
yosoy is a HTTP service for stubbing and prototyping distributed applications. It is a service which will introduce itself to the caller and print some useful information about its environment. "Yo soy" in español means "I am".
|
yosoy is a HTTP service for stubbing and prototyping distributed applications. It is a service which will introduce itself to the caller and print some useful information about its environment. "Yo soy" in español means "I am".
|
||||||
|
|
||||||
yosoy is extremely useful when creating a distributed application stub and you need to see a more meaningful responses than a default nginx welcome page.
|
yosoy is extremely useful when creating a distributed application stub and you need to see more meaningful responses than a default nginx welcome page.
|
||||||
|
|
||||||
Typical use cases include:
|
Typical use cases include:
|
||||||
|
|
||||||
* testing HTTP routing & ingress
|
- testing HTTP routing & ingress
|
||||||
* testing HTTP load balancing
|
- testing HTTP load balancing
|
||||||
* testing HTTP caching
|
- testing HTTP caching
|
||||||
* stubbing and prototyping distributed applications
|
- stubbing and prototyping distributed applications
|
||||||
|
|
||||||
yosoy will provide information like:
|
## API
|
||||||
|
|
||||||
* Request URI
|
yosoy responds to all requests with a JSON containing the information about:
|
||||||
* Hostname
|
|
||||||
* Remote IP
|
|
||||||
* How many times it was called
|
|
||||||
* HTTP headers
|
|
||||||
* Env variables if `YOSOY_SHOW_ENVS` is set to `true`, `yes`, `on`, or `1`
|
|
||||||
* Files' contents if `YOSOY_SHOW_FILES` is set to a comma-separated list of (valid) files
|
|
||||||
|
|
||||||
See [Kubernetes example](#kubernetes-example) below.
|
- HTTP request:
|
||||||
|
- Host
|
||||||
|
- Request URI
|
||||||
|
- Method
|
||||||
|
- Scheme
|
||||||
|
- Proto
|
||||||
|
- URL
|
||||||
|
- Remote IP
|
||||||
|
- HTTP headers
|
||||||
|
- HTTP proxy headers
|
||||||
|
- host:
|
||||||
|
- Hostname
|
||||||
|
- How many times it was called
|
||||||
|
- Env variables if `YOSOY_SHOW_ENVS` is set to `true`, `yes`, `on`, or `1`
|
||||||
|
- Files' contents if `YOSOY_SHOW_FILES` is set to a comma-separated list of (valid) files
|
||||||
|
|
||||||
|
Checkout out [Sample JSON response](#sample-json-response) below to see how useful yosoy is when troubleshooting/stubbing/prototyping distributed applications.
|
||||||
|
|
||||||
## Docker image
|
## Docker image
|
||||||
|
|
||||||
The docker image is available on docker hub:
|
The docker image is available on docker hub:
|
||||||
|
|
||||||
|
```sh
|
||||||
|
docker pull lukasz/yosoy
|
||||||
```
|
```
|
||||||
lukasz/yosoy
|
|
||||||
|
and ghcr.io:
|
||||||
|
|
||||||
|
```sh
|
||||||
|
docker pull ghcr.io/lukaszbudnik/yosoy
|
||||||
```
|
```
|
||||||
|
|
||||||
It exposes HTTP service on port 80.
|
It exposes HTTP service on port 80.
|
||||||
|
|
||||||
## Kubernetes example
|
## Kubernetes example
|
||||||
|
|
||||||
Let's take a look at a sample Kubernetes deployment file. It uses both `YOSOY_SHOW_ENVS` and `YOSOY_SHOW_FILES`.
|
There is a sample Kubernetes deployment file in the `test` folder. It uses both `YOSOY_SHOW_ENVS` and `YOSOY_SHOW_FILES`. The deployment uses Kubernetes Downward API to expose labels and annotations as volume files which are then returned by yosoy.
|
||||||
|
|
||||||
> To illustrate `YOSOY_SHOW_FILES` functionality Kubernetes Downward API is used to expose labels and annotations as volume files which are then returned by yosoy.
|
Deploy it to minikube and execute curl to the service a couple of times:
|
||||||
|
|
||||||
```
|
```bash
|
||||||
apiVersion: apps/v1
|
# start minikube
|
||||||
kind: Deployment
|
minikube start
|
||||||
metadata:
|
# deploy test service
|
||||||
name: camarero
|
kubectl apply -f test/deployment.yaml
|
||||||
labels:
|
# tunnel to it and copy the URL as $URL variable
|
||||||
app.kubernetes.io/name: camarero
|
minikube service --url camarero
|
||||||
spec:
|
# simulate some HTTP requests
|
||||||
replicas: 2
|
curl -H "Host: gateway.myapp.com" $URL/camarero/abc
|
||||||
selector:
|
curl -H "Host: gateway.myapp.com" $URL/camarero/abc
|
||||||
matchLabels:
|
curl -H "Host: gateway.myapp.com" $URL/camarero/abc
|
||||||
app.kubernetes.io/name: camarero
|
curl -H "Host: gateway.myapp.com" $URL/camarero/abc
|
||||||
template:
|
|
||||||
metadata:
|
|
||||||
labels:
|
|
||||||
app.kubernetes.io/name: camarero
|
|
||||||
spec:
|
|
||||||
containers:
|
|
||||||
- name: yosoy
|
|
||||||
image: lukasz/yosoy
|
|
||||||
env:
|
|
||||||
- name: YOSOY_SHOW_ENVS
|
|
||||||
value: "true"
|
|
||||||
- name: YOSOY_SHOW_FILES
|
|
||||||
value: "/etc/podinfo/labels,/etc/podinfo/annotations"
|
|
||||||
ports:
|
|
||||||
- containerPort: 80
|
|
||||||
volumeMounts:
|
|
||||||
- name: podinfo
|
|
||||||
mountPath: /etc/podinfo
|
|
||||||
volumes:
|
|
||||||
- name: podinfo
|
|
||||||
downwardAPI:
|
|
||||||
items:
|
|
||||||
- path: "labels"
|
|
||||||
fieldRef:
|
|
||||||
fieldPath: metadata.labels
|
|
||||||
- path: "annotations"
|
|
||||||
fieldRef:
|
|
||||||
fieldPath: metadata.annotations
|
|
||||||
---
|
|
||||||
apiVersion: v1
|
|
||||||
kind: Service
|
|
||||||
metadata:
|
|
||||||
name: camarero
|
|
||||||
labels:
|
|
||||||
app.kubernetes.io/name: camarero
|
|
||||||
spec:
|
|
||||||
type: NodePort
|
|
||||||
selector:
|
|
||||||
app.kubernetes.io/name: camarero
|
|
||||||
ports:
|
|
||||||
- protocol: TCP
|
|
||||||
port: 80
|
|
||||||
```
|
```
|
||||||
|
|
||||||
Deploy above service (with 2 replicas) and execute curl to the service a couple of times:
|
## Sample JSON response
|
||||||
|
|
||||||
```
|
A sample yosoy JSON response to a request made from a single page application (SPA) to a backend API deployed in Kubernetes behind nginx ingress and [haproxy-auth-gateway](https://github.com/lukaszbudnik/haproxy-auth-gateway) looks like this:
|
||||||
kubectl apply -f test-deployment.yaml
|
|
||||||
export NODE_PORT=$(kubectl get services/camarero -o go-template='{{(index .spec.ports 0).nodePort}}')
|
```json
|
||||||
curl $(minikube ip):$NODE_PORT
|
{
|
||||||
curl $(minikube ip):$NODE_PORT
|
"host": "api.localtest.me",
|
||||||
curl $(minikube ip):$NODE_PORT
|
"proto": "HTTP/1.1",
|
||||||
curl $(minikube ip):$NODE_PORT
|
"method": "GET",
|
||||||
```
|
"scheme": "https",
|
||||||
|
"requestUri": "/camarero",
|
||||||
A sample response looks like this:
|
"url": "https:///camarero",
|
||||||
|
"remoteAddr": "192.168.65.3",
|
||||||
```
|
"counter": 1,
|
||||||
Request URI: /
|
"headers": {
|
||||||
Hostname: camarero-859d7c6d6b-kb5s5
|
"Accept": ["*/*"],
|
||||||
Remote IP: 172.18.0.1
|
"Accept-Encoding": ["gzip, deflate, br"],
|
||||||
Called: 2
|
"Accept-Language": ["en-US,en;q=0.9,pl-PL;q=0.8,pl;q=0.7,es;q=0.6"],
|
||||||
|
"Authorization": [
|
||||||
HTTP headers:
|
"Bearer eyJhbGciOiJSUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICJXejFuaDNCWDI4UHMxVEMzSDRoOW52Q1VWRXpjVVBzQms4Z1NmeEp4ZS1JIn0.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.t5y3L4FzGxM0zwI3fskDI8Kemxz_izcvPPKciSEvNHnZWGQK-9AclGNFz_A9cLFSkpc6l6lBmt7WaC0i04c4h1a9G9AOFImmVXPMPDdTXOQ4aah4CvlN6Fy8ShvSHrQA-wMHEELBpIFsKFx2WP3QHiy27ycr3kqQzW4QymyU7J8tM4-qKR_H1_8aiNOrm5fIED-nEP096V2zvWXiGZX7ts6XE2-annhKphCABLdmIiwgDUnhlAz0hdiDrDbIjzr0ldW4AnUkSQxIZY0PnoEnGVuUvkOYvJpFx10gjORMnRgHSEj9Mk5dtyVGHcihZ5TntCL40WoymNxae6K4-FH3Lw"
|
||||||
Accept: */*
|
],
|
||||||
User-Agent: curl/7.64.1
|
"Origin": ["https://lukaszbudnik.github.io"],
|
||||||
|
"Referer": ["https://lukaszbudnik.github.io/"],
|
||||||
Env variables:
|
"Sec-Ch-Ua": [
|
||||||
PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin
|
"\" Not;A Brand\";v=\"99\", \"Google Chrome\";v=\"91\", \"Chromium\";v=\"91\""
|
||||||
HOSTNAME=camarero-859d7c6d6b-kb5s5
|
],
|
||||||
YOSOY_SHOW_ENVS=true
|
"Sec-Ch-Ua-Mobile": ["?0"],
|
||||||
YOSOY_SHOW_FILES=/etc/podinfo/labels,/etc/podinfo/annotations
|
"Sec-Fetch-Dest": ["empty"],
|
||||||
CAMARERO_PORT_80_TCP_PORT=80
|
"Sec-Fetch-Mode": ["cors"],
|
||||||
CAMARERO_PORT_80_TCP_ADDR=10.105.203.131
|
"Sec-Fetch-Site": ["cross-site"],
|
||||||
KUBERNETES_PORT=tcp://10.96.0.1:443
|
"User-Agent": [
|
||||||
KUBERNETES_PORT_443_TCP_PORT=443
|
"Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.4472.114 Safari/537.36"
|
||||||
CAMARERO_SERVICE_HOST=10.105.203.131
|
],
|
||||||
KUBERNETES_PORT_443_TCP_PROTO=tcp
|
"X-Forwarded-For": ["192.168.65.3", "10.1.3.9"],
|
||||||
KUBERNETES_SERVICE_HOST=10.96.0.1
|
"X-Forwarded-Host": ["api.localtest.me"],
|
||||||
KUBERNETES_SERVICE_PORT=443
|
"X-Forwarded-Port": ["443"],
|
||||||
KUBERNETES_SERVICE_PORT_HTTPS=443
|
"X-Forwarded-Proto": ["https"],
|
||||||
KUBERNETES_PORT_443_TCP=tcp://10.96.0.1:443
|
"X-Real-Ip": ["192.168.65.3"],
|
||||||
KUBERNETES_PORT_443_TCP_ADDR=10.96.0.1
|
"X-Request-Id": ["48a77564d88ca8a893610b9458bfd885"],
|
||||||
CAMARERO_PORT=tcp://10.105.203.131:80
|
"X-Scheme": ["https"]
|
||||||
CAMARERO_SERVICE_PORT=80
|
},
|
||||||
CAMARERO_PORT_80_TCP=tcp://10.105.203.131:80
|
"hostname": "camarero-cf7c95ccd-cz5lh",
|
||||||
CAMARERO_PORT_80_TCP_PROTO=tcp
|
"envVariables": [
|
||||||
HOME=/root
|
"PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin",
|
||||||
|
"HOSTNAME=camarero-cf7c95ccd-cz5lh",
|
||||||
File /etc/podinfo/labels:
|
"YOSOY_SHOW_FILES=/etc/podinfo/labels,/etc/podinfo/annotations",
|
||||||
app.kubernetes.io/name="camarero"
|
"YOSOY_SHOW_ENVS=true",
|
||||||
pod-template-hash="859d7c6d6b"
|
"KUBERNETES_SERVICE_PORT=443",
|
||||||
|
"KUBERNETES_PORT_443_TCP=tcp://10.96.0.1:443",
|
||||||
File /etc/podinfo/annotations:
|
"KUBERNETES_PORT=tcp://10.96.0.1:443",
|
||||||
kubernetes.io/config.seen="2020-11-17T07:38:15.374049163Z"
|
"KUBERNETES_PORT_443_TCP_PORT=443",
|
||||||
kubernetes.io/config.source="api"
|
"KUBERNETES_SERVICE_HOST=10.96.0.1",
|
||||||
|
"KUBERNETES_PORT_443_TCP_PROTO=tcp",
|
||||||
|
"KUBERNETES_PORT_443_TCP_ADDR=10.96.0.1",
|
||||||
|
"HOME=/root"
|
||||||
|
],
|
||||||
|
"files": {
|
||||||
|
"/etc/podinfo/annotations": "kubernetes.io/config.seen=\"2021-08-24T15:12:19.555374430Z\"\nkubernetes.io/config.source=\"api\"",
|
||||||
|
"/etc/podinfo/labels": "app.kubernetes.io/component=\"api\"\napp.kubernetes.io/name=\"camarero\"\napp.kubernetes.io/part-of=\"hotel\"\napp.kubernetes.io/version=\"0.0.1\"\npod-template-hash=\"cf7c95ccd\""
|
||||||
|
}
|
||||||
|
}
|
||||||
```
|
```
|
||||||
|
|||||||
9
go.mod
Normal file
9
go.mod
Normal file
@@ -0,0 +1,9 @@
|
|||||||
|
module github.com/lukaszbudnik/yosoy
|
||||||
|
|
||||||
|
go 1.16
|
||||||
|
|
||||||
|
require (
|
||||||
|
github.com/gorilla/handlers v1.5.1
|
||||||
|
github.com/gorilla/mux v1.8.0
|
||||||
|
github.com/stretchr/testify v1.8.0
|
||||||
|
)
|
||||||
21
go.sum
Normal file
21
go.sum
Normal file
@@ -0,0 +1,21 @@
|
|||||||
|
github.com/davecgh/go-spew v1.1.0/go.mod h1:J7Y8YcW2NihsgmVo/mv3lAwl/skON4iLHjSsI+c5H38=
|
||||||
|
github.com/davecgh/go-spew v1.1.1 h1:vj9j/u1bqnvCEfJOwUhtlOARqs3+rkHYY13jYWTU97c=
|
||||||
|
github.com/davecgh/go-spew v1.1.1/go.mod h1:J7Y8YcW2NihsgmVo/mv3lAwl/skON4iLHjSsI+c5H38=
|
||||||
|
github.com/felixge/httpsnoop v1.0.1 h1:lvB5Jl89CsZtGIWuTcDM1E/vkVs49/Ml7JJe07l8SPQ=
|
||||||
|
github.com/felixge/httpsnoop v1.0.1/go.mod h1:m8KPJKqk1gH5J9DgRY2ASl2lWCfGKXixSwevea8zH2U=
|
||||||
|
github.com/gorilla/handlers v1.5.1 h1:9lRY6j8DEeeBT10CvO9hGW0gmky0BprnvDI5vfhUHH4=
|
||||||
|
github.com/gorilla/handlers v1.5.1/go.mod h1:t8XrUpc4KVXb7HGyJ4/cEnwQiaxrX/hz1Zv/4g96P1Q=
|
||||||
|
github.com/gorilla/mux v1.8.0 h1:i40aqfkR1h2SlN9hojwV5ZA91wcXFOvkdNIeFDP5koI=
|
||||||
|
github.com/gorilla/mux v1.8.0/go.mod h1:DVbg23sWSpFRCP0SfiEN6jmj59UnW/n46BH5rLB71So=
|
||||||
|
github.com/pmezard/go-difflib v1.0.0 h1:4DBwDE0NGyQoBHbLQYPwSUPoCMWR5BEzIk/f1lZbAQM=
|
||||||
|
github.com/pmezard/go-difflib v1.0.0/go.mod h1:iKH77koFhYxTK1pcRnkKkqfTogsbg7gZNVY4sRDYZ/4=
|
||||||
|
github.com/stretchr/objx v0.1.0/go.mod h1:HFkY916IF+rwdDfMAkV7OtwuqBVzrE8GR6GFx+wExME=
|
||||||
|
github.com/stretchr/objx v0.4.0/go.mod h1:YvHI0jy2hoMjB+UWwv71VJQ9isScKT/TqJzVSSt89Yw=
|
||||||
|
github.com/stretchr/testify v1.7.1/go.mod h1:6Fq8oRcR53rry900zMqJjRRixrwX3KX962/h/Wwjteg=
|
||||||
|
github.com/stretchr/testify v1.8.0 h1:pSgiaMZlXftHpm5L7V1+rVB+AZJydKsMxsQBIJw4PKk=
|
||||||
|
github.com/stretchr/testify v1.8.0/go.mod h1:yNjHg4UonilssWZ8iaSj1OCr/vHnekPRkoO+kdMU+MU=
|
||||||
|
gopkg.in/check.v1 v0.0.0-20161208181325-20d25e280405 h1:yhCVgyC4o1eVCa2tZl7eS0r+SDo693bJlVdllGtEeKM=
|
||||||
|
gopkg.in/check.v1 v0.0.0-20161208181325-20d25e280405/go.mod h1:Co6ibVJAznAaIkqp8huTwlJQCZ016jof/cbN4VW5Yz0=
|
||||||
|
gopkg.in/yaml.v3 v3.0.0-20200313102051-9f266ea9e77c/go.mod h1:K4uyk7z7BCEPqu6E+C64Yfv1cQ7kz7rIZviUmN+EgEM=
|
||||||
|
gopkg.in/yaml.v3 v3.0.1 h1:fxVm/GzAzEWqLHuvctI91KS9hhNmmWOoWu0XTYJS7CA=
|
||||||
|
gopkg.in/yaml.v3 v3.0.1/go.mod h1:K4uyk7z7BCEPqu6E+C64Yfv1cQ7kz7rIZviUmN+EgEM=
|
||||||
125
server.go
125
server.go
@@ -1,76 +1,111 @@
|
|||||||
package main
|
package main
|
||||||
|
|
||||||
import (
|
import (
|
||||||
"fmt"
|
"encoding/json"
|
||||||
"io/ioutil"
|
"io/ioutil"
|
||||||
|
"log"
|
||||||
"net/http"
|
"net/http"
|
||||||
"os"
|
"os"
|
||||||
"sort"
|
|
||||||
"strings"
|
"strings"
|
||||||
"time"
|
|
||||||
|
"github.com/gorilla/handlers"
|
||||||
|
"github.com/gorilla/mux"
|
||||||
)
|
)
|
||||||
|
|
||||||
|
type response struct {
|
||||||
|
Host string `json:"host"`
|
||||||
|
Proto string `json:"proto"`
|
||||||
|
Method string `json:"method"`
|
||||||
|
Scheme string `json:"scheme"`
|
||||||
|
RequestURI string `json:"requestUri"`
|
||||||
|
URL string `json:"url"`
|
||||||
|
RemoteAddr string `json:"remoteAddr"`
|
||||||
|
Counter int `json:"counter"`
|
||||||
|
Headers map[string][]string `json:"headers"`
|
||||||
|
Hostname string `json:"hostname"`
|
||||||
|
EnvVariables []string `json:"envVariables,omitempty"`
|
||||||
|
Files map[string]string `json:"files,omitempty"`
|
||||||
|
}
|
||||||
|
|
||||||
var counter = 0
|
var counter = 0
|
||||||
var hostname = os.Getenv("HOSTNAME")
|
var hostname = os.Getenv("HOSTNAME")
|
||||||
var showEnvs = os.Getenv("YOSOY_SHOW_ENVS")
|
|
||||||
var showFiles = os.Getenv("YOSOY_SHOW_FILES")
|
func preflight(w http.ResponseWriter, req *http.Request) {
|
||||||
|
w.Header().Set("Access-Control-Allow-Origin", "*")
|
||||||
|
w.Header().Set("Access-Control-Allow-Methods", "*")
|
||||||
|
w.Header().Set("Access-Control-Allow-Headers", "*")
|
||||||
|
w.Header().Set("Access-Control-Allow-Credentials", "true")
|
||||||
|
w.Header().Set("Access-Control-Expose-Headers", "*")
|
||||||
|
w.Header().Set("Access-Control-Max-Age", "600")
|
||||||
|
w.WriteHeader(http.StatusOK)
|
||||||
|
}
|
||||||
|
|
||||||
func handler(w http.ResponseWriter, req *http.Request) {
|
func handler(w http.ResponseWriter, req *http.Request) {
|
||||||
if req.RequestURI == "/favicon.ico" {
|
w.Header().Set("Access-Control-Allow-Origin", "*")
|
||||||
w.WriteHeader(http.StatusNotFound)
|
|
||||||
return
|
showEnvs := os.Getenv("YOSOY_SHOW_ENVS")
|
||||||
}
|
showFiles := os.Getenv("YOSOY_SHOW_FILES")
|
||||||
|
|
||||||
|
response := &response{}
|
||||||
|
|
||||||
remoteAddr := req.RemoteAddr
|
|
||||||
if index := strings.LastIndex(remoteAddr, ":"); index > 0 {
|
|
||||||
remoteAddr = remoteAddr[0:index]
|
|
||||||
}
|
|
||||||
fmt.Printf("[%v] - %v - %v - \"%v %v\"\n", hostname, time.Now().Format(time.RFC3339), remoteAddr, req.Method, req.RequestURI)
|
|
||||||
w.WriteHeader(http.StatusOK)
|
|
||||||
w.Header().Add("Content-Type", "text/plain")
|
|
||||||
fmt.Fprintf(w, "Request URI: %v\n", req.RequestURI)
|
|
||||||
fmt.Fprintf(w, "Hostname: %v\n", hostname)
|
|
||||||
fmt.Fprintf(w, "Remote IP: %v\n", remoteAddr)
|
|
||||||
counter++
|
counter++
|
||||||
fmt.Fprintf(w, "Called: %v\n", counter)
|
response.Counter = counter
|
||||||
fmt.Fprintln(w)
|
|
||||||
fmt.Fprintf(w, "HTTP headers:\n")
|
remoteAddr := remoteAddrWithoutPort(req)
|
||||||
headers := make([]string, 0, len(req.Header))
|
response.RemoteAddr = remoteAddr
|
||||||
for k := range req.Header {
|
|
||||||
headers = append(headers, k)
|
response.RequestURI = req.RequestURI
|
||||||
}
|
response.Host = req.Host
|
||||||
sort.Strings(headers)
|
response.Proto = req.Proto
|
||||||
for _, header := range headers {
|
response.Method = req.Method
|
||||||
headers := req.Header[header]
|
response.Scheme = req.URL.Scheme
|
||||||
for _, h := range headers {
|
response.Headers = req.Header
|
||||||
fmt.Fprintf(w, "%v: %v\n", header, h)
|
response.URL = req.URL.String()
|
||||||
}
|
|
||||||
}
|
response.Hostname = hostname
|
||||||
|
|
||||||
if strings.ToLower(showEnvs) == "true" || strings.ToLower(showEnvs) == "yes" || strings.ToLower(showEnvs) == "on" || showEnvs == "1" {
|
if strings.ToLower(showEnvs) == "true" || strings.ToLower(showEnvs) == "yes" || strings.ToLower(showEnvs) == "on" || showEnvs == "1" {
|
||||||
fmt.Fprintln(w)
|
response.EnvVariables = os.Environ()
|
||||||
fmt.Fprintf(w, "Env variables:\n")
|
|
||||||
for _, e := range os.Environ() {
|
|
||||||
fmt.Fprintln(w, e)
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
if len(showFiles) > 0 {
|
if len(showFiles) > 0 {
|
||||||
|
response.Files = make(map[string]string)
|
||||||
files := strings.Split(showFiles, ",")
|
files := strings.Split(showFiles, ",")
|
||||||
for _, file := range files {
|
for _, file := range files {
|
||||||
bytes, err := ioutil.ReadFile(file)
|
bytes, err := ioutil.ReadFile(file)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
fmt.Printf("[%v] - %v - could not read file %v: %v\n", hostname, time.Now().Format(time.RFC3339), file, err)
|
log.Printf("Could not read file %v: %v\n", file, err)
|
||||||
continue
|
continue
|
||||||
}
|
}
|
||||||
fmt.Fprintln(w)
|
|
||||||
fmt.Fprintf(w, "File %v:\n", file)
|
|
||||||
contents := string(bytes)
|
contents := string(bytes)
|
||||||
fmt.Fprintln(w, contents)
|
response.Files[file] = contents
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
w.Header().Add("Content-Type", "application/json; charset=utf-8")
|
||||||
|
w.WriteHeader(http.StatusOK)
|
||||||
|
json.NewEncoder(w).Encode(response)
|
||||||
|
}
|
||||||
|
|
||||||
|
func remoteAddrWithoutPort(req *http.Request) string {
|
||||||
|
remoteAddr := req.RemoteAddr
|
||||||
|
if index := strings.LastIndex(remoteAddr, ":"); index > 0 {
|
||||||
|
remoteAddr = remoteAddr[0:index]
|
||||||
|
}
|
||||||
|
return remoteAddr
|
||||||
}
|
}
|
||||||
|
|
||||||
func main() {
|
func main() {
|
||||||
fmt.Printf("[%v] - %v - yosoy is up!\n", hostname, time.Now().Format(time.RFC3339))
|
log.Printf("yosoy is up %v\n", hostname)
|
||||||
http.HandleFunc("/", handler)
|
|
||||||
http.ListenAndServe(":80", nil)
|
r := mux.NewRouter()
|
||||||
|
|
||||||
|
r.Handle("/favicon.ico", r.NotFoundHandler)
|
||||||
|
r.PathPrefix("/").HandlerFunc(preflight).Methods(http.MethodOptions)
|
||||||
|
r.PathPrefix("/").HandlerFunc(handler).Methods(http.MethodGet, http.MethodPut, http.MethodPatch, http.MethodPost, http.MethodDelete, http.MethodConnect, http.MethodHead, http.MethodTrace)
|
||||||
|
|
||||||
|
loggingRouter := handlers.CombinedLoggingHandler(os.Stdout, r)
|
||||||
|
proxyRouter := handlers.ProxyHeaders(loggingRouter)
|
||||||
|
recoveryRouter := handlers.RecoveryHandler()(proxyRouter)
|
||||||
|
|
||||||
|
http.ListenAndServe(":80", recoveryRouter)
|
||||||
}
|
}
|
||||||
|
|||||||
47
server_test.go
Normal file
47
server_test.go
Normal file
@@ -0,0 +1,47 @@
|
|||||||
|
package main
|
||||||
|
|
||||||
|
import (
|
||||||
|
"encoding/json"
|
||||||
|
"net/http"
|
||||||
|
"net/http/httptest"
|
||||||
|
"os"
|
||||||
|
"testing"
|
||||||
|
|
||||||
|
"github.com/stretchr/testify/assert"
|
||||||
|
)
|
||||||
|
|
||||||
|
func TestHandler(t *testing.T) {
|
||||||
|
os.Setenv("YOSOY_SHOW_ENVS", "true")
|
||||||
|
os.Setenv("YOSOY_SHOW_FILES", ".gitignore")
|
||||||
|
|
||||||
|
req, err := http.NewRequest("GET", "https://example.org/sample/path?one=jeden&two=dwa", nil)
|
||||||
|
if err != nil {
|
||||||
|
t.Fatal(err)
|
||||||
|
}
|
||||||
|
req.Header.Set("Accept", "*/*")
|
||||||
|
|
||||||
|
rr := httptest.NewRecorder()
|
||||||
|
handler := http.HandlerFunc(handler)
|
||||||
|
|
||||||
|
handler.ServeHTTP(rr, req)
|
||||||
|
|
||||||
|
if status := rr.Code; status != http.StatusOK {
|
||||||
|
t.Errorf("handler returned wrong status code: got %v want %v", status, http.StatusOK)
|
||||||
|
}
|
||||||
|
|
||||||
|
var response response
|
||||||
|
json.Unmarshal(rr.Body.Bytes(), &response)
|
||||||
|
|
||||||
|
// test response
|
||||||
|
assert.Equal(t, 1, response.Counter)
|
||||||
|
assert.Equal(t, "example.org", response.Host)
|
||||||
|
assert.Equal(t, "GET", response.Method)
|
||||||
|
assert.Equal(t, "https", response.Scheme)
|
||||||
|
assert.Equal(t, "HTTP/1.1", response.Proto)
|
||||||
|
assert.Equal(t, "https://example.org/sample/path?one=jeden&two=dwa", response.URL)
|
||||||
|
assert.NotEmpty(t, response.EnvVariables)
|
||||||
|
assert.NotEmpty(t, response.Files[".gitignore"])
|
||||||
|
|
||||||
|
// test cors
|
||||||
|
assert.Contains(t, rr.HeaderMap["Access-Control-Allow-Origin"], "*")
|
||||||
|
}
|
||||||
53
test/deployment.yaml
Normal file
53
test/deployment.yaml
Normal file
@@ -0,0 +1,53 @@
|
|||||||
|
apiVersion: apps/v1
|
||||||
|
kind: Deployment
|
||||||
|
metadata:
|
||||||
|
name: camarero
|
||||||
|
labels:
|
||||||
|
app.kubernetes.io/name: camarero
|
||||||
|
spec:
|
||||||
|
replicas: 2
|
||||||
|
selector:
|
||||||
|
matchLabels:
|
||||||
|
app.kubernetes.io/name: camarero
|
||||||
|
template:
|
||||||
|
metadata:
|
||||||
|
labels:
|
||||||
|
app.kubernetes.io/name: camarero
|
||||||
|
spec:
|
||||||
|
containers:
|
||||||
|
- name: yosoy
|
||||||
|
image: lukasz/yosoy:2.0.3
|
||||||
|
env:
|
||||||
|
- name: YOSOY_SHOW_ENVS
|
||||||
|
value: "true"
|
||||||
|
- name: YOSOY_SHOW_FILES
|
||||||
|
value: "/etc/podinfo/labels,/etc/podinfo/annotations"
|
||||||
|
ports:
|
||||||
|
- containerPort: 80
|
||||||
|
volumeMounts:
|
||||||
|
- name: podinfo
|
||||||
|
mountPath: /etc/podinfo
|
||||||
|
volumes:
|
||||||
|
- name: podinfo
|
||||||
|
downwardAPI:
|
||||||
|
items:
|
||||||
|
- path: "labels"
|
||||||
|
fieldRef:
|
||||||
|
fieldPath: metadata.labels
|
||||||
|
- path: "annotations"
|
||||||
|
fieldRef:
|
||||||
|
fieldPath: metadata.annotations
|
||||||
|
---
|
||||||
|
apiVersion: v1
|
||||||
|
kind: Service
|
||||||
|
metadata:
|
||||||
|
name: camarero
|
||||||
|
labels:
|
||||||
|
app.kubernetes.io/name: camarero
|
||||||
|
spec:
|
||||||
|
type: NodePort
|
||||||
|
selector:
|
||||||
|
app.kubernetes.io/name: camarero
|
||||||
|
ports:
|
||||||
|
- protocol: TCP
|
||||||
|
port: 80
|
||||||
Reference in New Issue
Block a user