mirror of
https://github.com/vmware-tanzu/velero.git
synced 2026-02-11 22:31:13 +00:00
* remove explicit Accept-Encoding header For StorageGrid compatibility the Accept-Encoding header should not be set, otherwise StorageGrid compresses the already compressed log files which are only decompressed by the client once Signed-off-by: fvsqr <48791253+fvsqr@users.noreply.github.com> * Removed explicit gzip Accept-Encoding header For StorageGrid compatibility the Accept-Encoding header should not be set, otherwise StorageGrid compresses the already compressed log files which are only decompressed by the client once. Unclear, how this affects Backup endpoints from Azure or GCP Signed-off-by: fvsqr <48791253+fvsqr@users.noreply.github.com> * Create 2712-fvsqr Signed-off-by: fvsqr <48791253+fvsqr@users.noreply.github.com>
180 lines
4.9 KiB
Go
180 lines
4.9 KiB
Go
/*
|
|
Copyright 2017 the Velero contributors.
|
|
|
|
Licensed under the Apache License, Version 2.0 (the "License");
|
|
you may not use this file except in compliance with the License.
|
|
You may obtain a copy of the License at
|
|
|
|
http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
Unless required by applicable law or agreed to in writing, software
|
|
distributed under the License is distributed on an "AS IS" BASIS,
|
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
See the License for the specific language governing permissions and
|
|
limitations under the License.
|
|
*/
|
|
|
|
package downloadrequest
|
|
|
|
import (
|
|
"compress/gzip"
|
|
"context"
|
|
"crypto/tls"
|
|
"crypto/x509"
|
|
"fmt"
|
|
"io"
|
|
"io/ioutil"
|
|
"net/http"
|
|
"net/url"
|
|
"time"
|
|
|
|
"github.com/pkg/errors"
|
|
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
|
"k8s.io/apimachinery/pkg/watch"
|
|
|
|
v1 "github.com/vmware-tanzu/velero/pkg/apis/velero/v1"
|
|
velerov1client "github.com/vmware-tanzu/velero/pkg/generated/clientset/versioned/typed/velero/v1"
|
|
)
|
|
|
|
// ErrNotFound is exported for external packages to check for when a file is
|
|
// not found
|
|
var ErrNotFound = errors.New("file not found")
|
|
|
|
func Stream(client velerov1client.DownloadRequestsGetter, namespace, name string, kind v1.DownloadTargetKind, w io.Writer, timeout time.Duration, insecureSkipTLSVerify bool, caCertFile string) error {
|
|
req := &v1.DownloadRequest{
|
|
ObjectMeta: metav1.ObjectMeta{
|
|
Namespace: namespace,
|
|
Name: fmt.Sprintf("%s-%s", name, time.Now().Format("20060102150405")),
|
|
},
|
|
Spec: v1.DownloadRequestSpec{
|
|
Target: v1.DownloadTarget{
|
|
Kind: kind,
|
|
Name: name,
|
|
},
|
|
},
|
|
}
|
|
|
|
req, err := client.DownloadRequests(namespace).Create(context.TODO(), req, metav1.CreateOptions{})
|
|
if err != nil {
|
|
return errors.WithStack(err)
|
|
}
|
|
defer client.DownloadRequests(namespace).Delete(context.TODO(), req.Name, metav1.DeleteOptions{})
|
|
|
|
listOptions := metav1.ListOptions{
|
|
FieldSelector: "metadata.name=" + req.Name,
|
|
ResourceVersion: req.ResourceVersion,
|
|
}
|
|
watcher, err := client.DownloadRequests(namespace).Watch(context.TODO(), listOptions)
|
|
if err != nil {
|
|
return errors.WithStack(err)
|
|
}
|
|
defer watcher.Stop()
|
|
|
|
expired := time.NewTimer(timeout)
|
|
defer expired.Stop()
|
|
|
|
Loop:
|
|
for {
|
|
select {
|
|
case <-expired.C:
|
|
return errors.New("timed out waiting for download URL")
|
|
case e := <-watcher.ResultChan():
|
|
updated, ok := e.Object.(*v1.DownloadRequest)
|
|
if !ok {
|
|
return errors.Errorf("unexpected type %T", e.Object)
|
|
}
|
|
|
|
switch e.Type {
|
|
case watch.Deleted:
|
|
errors.New("download request was unexpectedly deleted")
|
|
case watch.Modified:
|
|
if updated.Status.DownloadURL != "" {
|
|
req = updated
|
|
break Loop
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
if req.Status.DownloadURL == "" {
|
|
return ErrNotFound
|
|
}
|
|
|
|
var caPool *x509.CertPool
|
|
if len(caCertFile) > 0 {
|
|
caCert, err := ioutil.ReadFile(caCertFile)
|
|
if err != nil {
|
|
return errors.Wrapf(err, "couldn't open cacert")
|
|
}
|
|
// bundle the passed in cert with the system cert pool
|
|
// if it's available, otherwise create a new pool just
|
|
// for this.
|
|
caPool, err = x509.SystemCertPool()
|
|
if err != nil {
|
|
caPool = x509.NewCertPool()
|
|
}
|
|
caPool.AppendCertsFromPEM(caCert)
|
|
}
|
|
|
|
defaultTransport := http.DefaultTransport.(*http.Transport)
|
|
// same settings as the default transport
|
|
// aside from timeout and TLSClientConfig
|
|
httpClient := new(http.Client)
|
|
httpClient.Transport = &http.Transport{
|
|
TLSClientConfig: &tls.Config{
|
|
InsecureSkipVerify: insecureSkipTLSVerify,
|
|
RootCAs: caPool,
|
|
},
|
|
IdleConnTimeout: timeout,
|
|
DialContext: defaultTransport.DialContext,
|
|
ForceAttemptHTTP2: defaultTransport.ForceAttemptHTTP2,
|
|
MaxIdleConns: defaultTransport.MaxIdleConns,
|
|
Proxy: defaultTransport.Proxy,
|
|
TLSHandshakeTimeout: defaultTransport.TLSHandshakeTimeout,
|
|
ExpectContinueTimeout: defaultTransport.ExpectContinueTimeout,
|
|
}
|
|
|
|
httpReq, err := http.NewRequest("GET", req.Status.DownloadURL, nil)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
resp, err := httpClient.Do(httpReq)
|
|
if err != nil {
|
|
if urlErr, ok := err.(*url.Error); ok {
|
|
if _, ok := urlErr.Err.(x509.UnknownAuthorityError); ok {
|
|
return fmt.Errorf(err.Error() + "\n\nThe --insecure-skip-tls-verify flag can also be used to accept any TLS certificate for the download, but it is susceptible to man-in-the-middle attacks.")
|
|
}
|
|
}
|
|
return err
|
|
}
|
|
defer resp.Body.Close()
|
|
|
|
if resp.StatusCode != http.StatusOK {
|
|
body, err := ioutil.ReadAll(resp.Body)
|
|
if err != nil {
|
|
return errors.Wrapf(err, "request failed: unable to decode response body")
|
|
}
|
|
|
|
if resp.StatusCode == http.StatusNotFound {
|
|
return ErrNotFound
|
|
}
|
|
|
|
return errors.Errorf("request failed: %v", string(body))
|
|
}
|
|
|
|
reader := resp.Body
|
|
if kind != v1.DownloadTargetKindBackupContents {
|
|
// need to decompress logs
|
|
gzipReader, err := gzip.NewReader(resp.Body)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
defer gzipReader.Close()
|
|
reader = gzipReader
|
|
}
|
|
|
|
_, err = io.Copy(w, reader)
|
|
return err
|
|
}
|