1
0
mirror of https://github.com/TwiN/gatus.git synced 2026-02-07 17:34:16 +00:00

Initial implementation

This commit is contained in:
tiwood
2022-03-07 21:55:40 +01:00
parent 6932edc6d0
commit 7f2f3a603a
5 changed files with 176 additions and 0 deletions

View File

@@ -2,9 +2,11 @@ package core
import (
"bytes"
"context"
"crypto/x509"
"encoding/json"
"errors"
"fmt"
"io"
"net"
"net/http"
@@ -15,7 +17,10 @@ import (
"github.com/TwiN/gatus/v3/alerting/alert"
"github.com/TwiN/gatus/v3/client"
"github.com/TwiN/gatus/v3/core/ui"
"github.com/TwiN/gatus/v3/security"
"github.com/TwiN/gatus/v3/util"
"golang.org/x/oauth2"
"golang.org/x/oauth2/clientcredentials"
)
const (
@@ -44,6 +49,9 @@ var (
// ErrEndpointWithInvalidNameOrGroup is the error with which Gatus will panic if an endpoint has an invalid character where it shouldn't
ErrEndpointWithInvalidNameOrGroup = errors.New("endpoint name and group must not have \" or \\")
// ErrEndpointWithInvalidOIDCConfig is the error with which Gatus will panic if OIDC parameters are missing
ErrEndpointWithInvalidOIDCConfig = errors.New("issuer url, client id, client secret and scopes are required properties for endpoint oidc configuration")
)
// Endpoint is the configuration of a monitored
@@ -90,6 +98,9 @@ type Endpoint struct {
// UIConfig is the configuration for the UI
UIConfig *ui.Config `yaml:"ui,omitempty"`
// OIDCConfig is the configuration for obtaining an OIDC token for the endpoint
OIDCConfig *security.EndpointOIDCConfig `yaml:"oidc,omitempty"`
// NumberOfFailuresInARow is the number of unsuccessful evaluations in a row
NumberOfFailuresInARow int `yaml:"-"`
@@ -105,6 +116,11 @@ func (endpoint Endpoint) IsEnabled() bool {
return *endpoint.Enabled
}
// HasOIDCConfig return whether the endpoint has a OIDC configuration or not
func (endpoint Endpoint) HasOIDCConfig() bool {
return endpoint.OIDCConfig != nil
}
// ValidateAndSetDefaults validates the endpoint's configuration and sets the default value of fields that have one
func (endpoint *Endpoint) ValidateAndSetDefaults() error {
// Set default values
@@ -154,6 +170,9 @@ func (endpoint *Endpoint) ValidateAndSetDefaults() error {
if endpoint.DNS != nil {
return endpoint.DNS.validateAndSetDefault()
}
if endpoint.HasOIDCConfig() && !endpoint.OIDCConfig.IsValid() {
return ErrEndpointWithInvalidOIDCConfig
}
// Make sure that the request can be created
_, err := http.NewRequest(endpoint.Method, endpoint.URL, bytes.NewBuffer([]byte(endpoint.Body)))
if err != nil {
@@ -200,6 +219,17 @@ func (endpoint *Endpoint) EvaluateHealth() *Result {
return result
}
func (endpoint *Endpoint) getToken() (*oauth2.Token, error) {
c := clientcredentials.Config{
ClientID: endpoint.OIDCConfig.ClientID,
ClientSecret: endpoint.OIDCConfig.ClientSecret,
Scopes: endpoint.OIDCConfig.Scopes,
TokenURL: endpoint.OIDCConfig.IssuerURL,
}
token, err := c.Token(context.Background())
return token, err
}
func (endpoint *Endpoint) getIP(result *Result) {
if endpoint.DNS != nil {
result.Hostname = strings.TrimSuffix(endpoint.URL, ":53")
@@ -231,6 +261,15 @@ func (endpoint *Endpoint) call(result *Result) {
isTypeTLS := strings.HasPrefix(endpoint.URL, "tls://")
isTypeHTTP := !isTypeDNS && !isTypeTCP && !isTypeICMP && !isTypeSTARTTLS && !isTypeTLS
if isTypeHTTP {
if endpoint.HasOIDCConfig() {
token, err := endpoint.getToken()
if err != nil {
result.AddError(err.Error())
return
}
authHeader := fmt.Sprintf("Bearer %s", token.AccessToken)
endpoint.Headers["Authorization"] = authHeader
}
request = endpoint.buildHTTPRequest()
}
startTime := time.Now()

View File

@@ -65,6 +65,9 @@ func TestEndpoint_ValidateAndSetDefaults(t *testing.T) {
if endpoint.Alerts[0].FailureThreshold != 3 {
t.Error("Endpoint alert should've defaulted to a failure threshold of 3")
}
if endpoint.HasOIDCConfig() {
t.Error("Endpoint OIDC config should've defaulted to 'nil'")
}
}
func TestEndpoint_ValidateAndSetDefaultsWithClientConfig(t *testing.T) {