vector/sources/util/http/
prelude.rs1use std::{collections::HashMap, convert::Infallible, fmt, net::SocketAddr, time::Duration};
2
3use bytes::Bytes;
4use futures::{FutureExt, TryFutureExt};
5use hyper::{Server, service::make_service_fn};
6use tokio::net::TcpStream;
7use tower::ServiceBuilder;
8use tracing::Span;
9use vector_lib::{
10 EstimatedJsonEncodedSizeOf,
11 config::SourceAcknowledgementsConfig,
12 event::{BatchNotifier, BatchStatus, BatchStatusReceiver, Event},
13};
14use warp::{
15 Filter,
16 filters::{
17 BoxedFilter,
18 path::{FullPath, Tail},
19 },
20 http::{HeaderMap, StatusCode},
21 reject::Rejection,
22};
23
24use super::encoding::decompress_body;
25use crate::{
26 SourceSender,
27 common::http::{ErrorMessage, server_auth::HttpServerAuthConfig},
28 config::SourceContext,
29 http::{KeepaliveConfig, MaxConnectionAgeLayer, build_http_trace_layer},
30 internal_events::{
31 HttpBadRequest, HttpBytesReceived, HttpEventsReceived, HttpInternalError, StreamClosedError,
32 },
33 sources::util::http::HttpMethod,
34 tls::{MaybeTlsIncomingStream, MaybeTlsSettings, TlsEnableableConfig},
35};
36
37pub trait HttpSource: Clone + Send + Sync + 'static {
38 fn enrich_events(
42 &self,
43 _events: &mut [Event],
44 _request_path: &str,
45 _headers_config: &HeaderMap,
46 _query_parameters: &HashMap<String, String>,
47 _source_ip: Option<&SocketAddr>,
48 ) {
49 }
50
51 fn build_events(
52 &self,
53 body: Bytes,
54 header_map: &HeaderMap,
55 query_parameters: &HashMap<String, String>,
56 path: &str,
57 ) -> Result<Vec<Event>, ErrorMessage>;
58
59 fn decode(&self, encoding_header: Option<&str>, body: Bytes) -> Result<Bytes, ErrorMessage> {
60 decompress_body(encoding_header, body)
61 }
62
63 #[allow(clippy::too_many_arguments)]
64 fn run(
65 self,
66 address: SocketAddr,
67 path: &str,
68 method: HttpMethod,
69 response_code: StatusCode,
70 strict_path: bool,
71 tls: Option<&TlsEnableableConfig>,
72 auth: Option<&HttpServerAuthConfig>,
73 cx: SourceContext,
74 acknowledgements: SourceAcknowledgementsConfig,
75 keepalive_settings: KeepaliveConfig,
76 ) -> crate::Result<crate::sources::Source> {
77 let tls = MaybeTlsSettings::from_config(tls, true)?;
78 let protocol = tls.http_protocol_name();
79 let auth_matcher = auth
80 .map(|a| a.build(&cx.enrichment_tables, &cx.metrics_storage))
81 .transpose()?;
82 let path = path.to_owned();
83 let acknowledgements = cx.do_acknowledgements(acknowledgements);
84 let enable_source_ip = self.enable_source_ip();
85
86 Ok(Box::pin(async move {
87 let mut filter: BoxedFilter<()> = match method {
88 HttpMethod::Head => warp::head().boxed(),
89 HttpMethod::Get => warp::get().boxed(),
90 HttpMethod::Put => warp::put().boxed(),
91 HttpMethod::Post => warp::post().boxed(),
92 HttpMethod::Patch => warp::patch().boxed(),
93 HttpMethod::Delete => warp::delete().boxed(),
94 HttpMethod::Options => warp::options().boxed(),
95 };
96
97 #[allow(clippy::unnecessary_to_owned)]
99 for s in path.split('/').filter(|&x| !x.is_empty()) {
100 filter = filter.and(warp::path(s.to_string())).boxed()
101 }
102 let svc = filter
103 .and(warp::path::tail())
104 .and_then(move |tail: Tail| async move {
105 if !strict_path || tail.as_str().is_empty() {
106 Ok(())
107 } else {
108 emit!(HttpInternalError {
109 message: "Path not found."
110 });
111 Err(warp::reject::custom(ErrorMessage::new(
112 StatusCode::NOT_FOUND,
113 "Not found".to_string(),
114 )))
115 }
116 })
117 .untuple_one()
118 .and(warp::path::full())
119 .and(warp::header::optional::<String>("content-encoding"))
120 .and(warp::header::headers_cloned())
121 .and(warp::body::bytes())
122 .and(warp::query::<HashMap<String, String>>())
123 .and(warp::filters::ext::optional())
124 .and_then(
125 move |path: FullPath,
126 encoding_header: Option<String>,
127 headers: HeaderMap,
128 body: Bytes,
129 query_parameters: HashMap<String, String>,
130 addr: Option<PeerAddr>| {
131 debug!(message = "Handling HTTP request.", headers = ?headers);
132 let http_path = path.as_str();
133 let events = auth_matcher
134 .as_ref()
135 .map_or(Ok(()), |a| {
136 a.handle_auth(
137 addr.as_ref().map(|a| a.0).as_ref(),
138 &headers,
139 path.as_str(),
140 )
141 })
142 .and_then(|()| self.decode(encoding_header.as_deref(), body))
143 .and_then(|body| {
144 emit!(HttpBytesReceived {
145 byte_size: body.len(),
146 http_path,
147 protocol,
148 });
149 self.build_events(body, &headers, &query_parameters, path.as_str())
150 })
151 .map(|mut events| {
152 emit!(HttpEventsReceived {
153 count: events.len(),
154 byte_size: events.estimated_json_encoded_size_of(),
155 http_path,
156 protocol,
157 });
158
159 self.enrich_events(
160 &mut events,
161 path.as_str(),
162 &headers,
163 &query_parameters,
164 addr.and_then(|a| enable_source_ip.then_some(a))
165 .map(|PeerAddr(inner_addr)| inner_addr)
166 .as_ref(),
167 );
168
169 events
170 });
171
172 handle_request(events, acknowledgements, response_code, cx.out.clone())
173 },
174 );
175
176 let ping = warp::get().and(warp::path("ping")).map(|| "pong");
177 let routes = svc.or(ping).recover(|r: Rejection| async move {
178 if let Some(e_msg) = r.find::<ErrorMessage>() {
179 let json = warp::reply::json(e_msg);
180 Ok(warp::reply::with_status(json, e_msg.status_code()))
181 } else {
182 emit!(HttpInternalError {
184 message: &format!("Internal error: {r:?}")
185 });
186 Err(r)
187 }
188 });
189
190 let span = Span::current();
191 let make_svc = make_service_fn(move |conn: &MaybeTlsIncomingStream<TcpStream>| {
192 let remote_addr = conn.peer_addr();
193 let svc = ServiceBuilder::new()
194 .layer(build_http_trace_layer(span.clone()))
195 .option_layer(keepalive_settings.max_connection_age_secs.map(|secs| {
196 MaxConnectionAgeLayer::new(
197 Duration::from_secs(secs),
198 keepalive_settings.max_connection_age_jitter_factor,
199 remote_addr,
200 )
201 }))
202 .map_request(move |mut request: hyper::Request<_>| {
203 request.extensions_mut().insert(PeerAddr::new(remote_addr));
204
205 request
206 })
207 .service(warp::service(routes.clone()));
208 futures_util::future::ok::<_, Infallible>(svc)
209 });
210
211 info!(message = "Building HTTP server.", address = %address);
212
213 let listener = tls.bind(&address).await.map_err(|err| {
214 error!("An error occurred: {:?}.", err);
215 })?;
216
217 Server::builder(hyper::server::accept::from_stream(listener.accept_stream()))
218 .serve(make_svc)
219 .with_graceful_shutdown(cx.shutdown.map(|_| ()))
220 .await
221 .map_err(|err| {
222 error!("An error occurred: {:?}.", err);
223 })?;
224
225 Ok(())
226 }))
227 }
228
229 fn enable_source_ip(&self) -> bool {
230 false
231 }
232}
233
234#[derive(Clone)]
235#[repr(transparent)]
236struct PeerAddr(SocketAddr);
237
238impl PeerAddr {
239 const fn new(addr: SocketAddr) -> Self {
240 Self(addr)
241 }
242}
243
244struct RejectShuttingDown;
245
246impl fmt::Debug for RejectShuttingDown {
247 fn fmt(&self, f: &mut fmt::Formatter<'_>) -> fmt::Result {
248 f.write_str("shutting down")
249 }
250}
251
252impl warp::reject::Reject for RejectShuttingDown {}
253
254async fn handle_request(
255 events: Result<Vec<Event>, ErrorMessage>,
256 acknowledgements: bool,
257 response_code: StatusCode,
258 mut out: SourceSender,
259) -> Result<impl warp::Reply, Rejection> {
260 match events {
261 Ok(mut events) => {
262 let receiver = BatchNotifier::maybe_apply_to(acknowledgements, &mut events);
263
264 let count = events.len();
265 out.send_batch(events)
266 .map_err(|_| {
267 emit!(StreamClosedError { count });
270 warp::reject::custom(RejectShuttingDown)
271 })
272 .and_then(|_| handle_batch_status(response_code, receiver))
273 .await
274 }
275 Err(error) => {
276 emit!(HttpBadRequest::new(error.code(), error.message()));
277 Err(warp::reject::custom(error))
278 }
279 }
280}
281
282async fn handle_batch_status(
283 success_response_code: StatusCode,
284 receiver: Option<BatchStatusReceiver>,
285) -> Result<impl warp::Reply, Rejection> {
286 match receiver {
287 None => Ok(success_response_code),
288 Some(receiver) => match receiver.await {
289 BatchStatus::Delivered => Ok(success_response_code),
290 BatchStatus::Errored => Err(warp::reject::custom(ErrorMessage::new(
291 StatusCode::INTERNAL_SERVER_ERROR,
292 "Error delivering contents to sink".into(),
293 ))),
294 BatchStatus::Rejected => Err(warp::reject::custom(ErrorMessage::new(
295 StatusCode::BAD_REQUEST,
296 "Contents failed to deliver to sink".into(),
297 ))),
298 },
299 }
300}