internal/pkg/api/server.go (124 lines of code) (raw):
// Copyright Elasticsearch B.V. and/or licensed to Elasticsearch B.V. under one
// or more contributor license agreements. Licensed under the Elastic License;
// you may not use this file except in compliance with the Elastic License.
package api
import (
"context"
"crypto/tls"
"errors"
"fmt"
slog "log"
"net"
"net/http"
"github.com/elastic/elastic-agent-libs/transport/tlscommon"
"github.com/elastic/fleet-server/v7/internal/pkg/config"
"github.com/elastic/fleet-server/v7/internal/pkg/logger"
"github.com/rs/zerolog"
)
type server struct {
cfg *config.Server
addr string
handler http.Handler
}
// NewServer creates a new HTTP api for the passed addr.
//
// The server has an http request limit and endpoint specific rate-limits.
// The underlying API structs (such as *CheckinT) may be shared between servers.
func NewServer(addr string, cfg *config.Server, opts ...APIOpt) *server {
a := &apiServer{}
for _, opt := range opts {
opt(a)
}
return &server{
addr: addr,
cfg: cfg,
handler: newRouter(&cfg.Limits, a, a.tracer),
}
}
func (s *server) Run(ctx context.Context) error {
rdto := s.cfg.Timeouts.Read
wrto := s.cfg.Timeouts.Write
idle := s.cfg.Timeouts.Idle
rdhr := s.cfg.Timeouts.ReadHeader
mhbz := s.cfg.Limits.MaxHeaderByteSize
srv := http.Server{
Addr: s.addr,
Handler: s.handler,
ReadTimeout: rdto,
ReadHeaderTimeout: rdhr,
WriteTimeout: wrto,
IdleTimeout: idle,
MaxHeaderBytes: mhbz,
BaseContext: func(net.Listener) context.Context { return ctx },
ErrorLog: errLogger(ctx),
ConnState: getDiagConnFunc(ctx),
}
var listenCfg net.ListenConfig
ln, err := listenCfg.Listen(ctx, "tcp", s.addr)
if err != nil {
return err
}
// Bind the deferred Close() to the stack variable to handle case where 'ln' is wrapped
defer func() {
err := ln.Close()
if err != nil {
zerolog.Ctx(ctx).Warn().Err(err).Msg("server.Run: error while closing listener.")
}
}()
if s.cfg.TLS != nil && s.cfg.TLS.IsEnabled() {
commonTLSCfg, err := tlscommon.LoadTLSServerConfig(s.cfg.TLS)
if err != nil {
return err
}
srv.TLSConfig = commonTLSCfg.BuildServerConfig(s.cfg.Host)
// Must enable http/2 in the configuration explicitly.
// (see https://golang.org/pkg/net/http/#Server.Serve)
srv.TLSConfig.NextProtos = []string{"h2", "http/1.1"}
ln = tls.NewListener(ln, srv.TLSConfig)
} else {
zerolog.Ctx(ctx).Warn().Msg("Exposed over insecure HTTP; enablement of TLS is strongly recommended")
}
// Start the API server on another goroutine and return any non ErrServerClosed errors through a channel.
errCh := make(chan error)
go func(ctx context.Context, errCh chan error, ln net.Listener) {
zerolog.Ctx(ctx).Info().Msgf("Listening on %s", s.addr)
if err := srv.Serve(ln); err != nil && !errors.Is(err, http.ErrServerClosed) {
errCh <- err
}
}(ctx, errCh, ln)
select {
// Listen and return any errors that occur from the server listener
case err := <-errCh:
if !errors.Is(err, context.Canceled) {
return fmt.Errorf("error while serving API listener: %w", err)
}
// Do a clean shutdown if the context is cancelled
case <-ctx.Done():
sCtx, cancel := context.WithTimeout(context.Background(), s.cfg.Timeouts.Drain) // Background context to allow connections to drain when server context is cancelled.
defer cancel()
if err := srv.Shutdown(sCtx); err != nil {
cErr := srv.Close() // force it closed
return errors.Join(fmt.Errorf("error while shutting down api listener: %w", err), cErr)
}
}
return nil
}
func getDiagConnFunc(ctx context.Context) func(c net.Conn, s http.ConnState) {
return func(c net.Conn, s http.ConnState) {
if c == nil {
return
}
zerolog.Ctx(ctx).Trace().
Str("local", c.LocalAddr().String()).
Str("remote", c.RemoteAddr().String()).
Str("state", s.String()).
Msg("connection state change")
switch s {
case http.StateNew:
cntHTTPNew.Inc()
cntHTTPActive.Inc()
case http.StateClosed:
cntHTTPClose.Inc()
cntHTTPActive.Dec()
}
}
}
type stubLogger struct {
log zerolog.Logger
}
func (s *stubLogger) Write(p []byte) (n int, err error) {
s.log.Error().Bytes(logger.ECSMessage, p).Send()
return len(p), nil
}
func errLogger(ctx context.Context) *slog.Logger {
log := zerolog.Ctx(ctx)
stub := &stubLogger{*log}
return slog.New(stub, "", 0)
}