mirror of
https://github.com/rcourtman/Pulse.git
synced 2026-02-18 00:17:39 +01:00
Implements Phase 1-2 of multi-tenancy support using a directory-per-tenant strategy that preserves existing file-based persistence. Key changes: - Add MultiTenantPersistence manager for org-scoped config routing - Add TenantMiddleware for X-Pulse-Org-ID header extraction and context propagation - Add MultiTenantMonitor for per-tenant monitor lifecycle management - Refactor handlers (ConfigHandlers, AlertHandlers, AIHandlers, etc.) to be context-aware with getConfig(ctx)/getMonitor(ctx) helpers - Add Organization model for future tenant metadata - Update server and router to wire multi-tenant components All handlers maintain backward compatibility via legacy field fallbacks for single-tenant deployments using the "default" org.
179 lines
5.4 KiB
Go
179 lines
5.4 KiB
Go
package api
|
|
|
|
import (
|
|
"context"
|
|
"encoding/json"
|
|
"net/http"
|
|
"net/url"
|
|
"strings"
|
|
|
|
"github.com/rcourtman/pulse-go-rewrite/internal/config"
|
|
"github.com/rs/zerolog/log"
|
|
)
|
|
|
|
// HostMetadataHandler handles host metadata operations
|
|
type HostMetadataHandler struct {
|
|
mtPersistence *config.MultiTenantPersistence
|
|
}
|
|
|
|
// NewHostMetadataHandler creates a new host metadata handler
|
|
func NewHostMetadataHandler(mtPersistence *config.MultiTenantPersistence) *HostMetadataHandler {
|
|
return &HostMetadataHandler{
|
|
mtPersistence: mtPersistence,
|
|
}
|
|
}
|
|
|
|
func (h *HostMetadataHandler) getStore(ctx context.Context) *config.HostMetadataStore {
|
|
orgID := "default"
|
|
if ctx != nil {
|
|
if id := GetOrgID(ctx); id != "" {
|
|
orgID = id
|
|
}
|
|
}
|
|
p, _ := h.mtPersistence.GetPersistence(orgID)
|
|
return p.GetHostMetadataStore()
|
|
}
|
|
|
|
// Store returns the underlying metadata store for default tenant
|
|
func (h *HostMetadataHandler) Store() *config.HostMetadataStore {
|
|
return h.getStore(context.Background())
|
|
}
|
|
|
|
// HandleGetMetadata retrieves metadata for a specific host or all hosts
|
|
func (h *HostMetadataHandler) HandleGetMetadata(w http.ResponseWriter, r *http.Request) {
|
|
if r.Method != http.MethodGet {
|
|
http.Error(w, "Method not allowed", http.StatusMethodNotAllowed)
|
|
return
|
|
}
|
|
|
|
// Check if requesting specific host
|
|
path := r.URL.Path
|
|
// Handle both /api/hosts/metadata and /api/hosts/metadata/
|
|
if path == "/api/hosts/metadata" || path == "/api/hosts/metadata/" {
|
|
// Get all metadata
|
|
w.Header().Set("Content-Type", "application/json")
|
|
store := h.getStore(r.Context())
|
|
allMeta := store.GetAll()
|
|
if allMeta == nil {
|
|
// Return empty object instead of null
|
|
json.NewEncoder(w).Encode(make(map[string]*config.HostMetadata))
|
|
} else {
|
|
json.NewEncoder(w).Encode(allMeta)
|
|
}
|
|
return
|
|
}
|
|
|
|
// Get specific host ID from path
|
|
hostID := strings.TrimPrefix(path, "/api/hosts/metadata/")
|
|
|
|
w.Header().Set("Content-Type", "application/json")
|
|
|
|
if hostID != "" {
|
|
// Get specific host metadata
|
|
store := h.getStore(r.Context())
|
|
meta := store.Get(hostID)
|
|
if meta == nil {
|
|
// Return empty metadata instead of 404
|
|
json.NewEncoder(w).Encode(&config.HostMetadata{ID: hostID})
|
|
} else {
|
|
json.NewEncoder(w).Encode(meta)
|
|
}
|
|
} else {
|
|
// This shouldn't happen with current routing, but handle it anyway
|
|
http.Error(w, "Invalid request path", http.StatusBadRequest)
|
|
}
|
|
}
|
|
|
|
// HandleUpdateMetadata updates metadata for a host
|
|
func (h *HostMetadataHandler) HandleUpdateMetadata(w http.ResponseWriter, r *http.Request) {
|
|
if r.Method != http.MethodPut && r.Method != http.MethodPost {
|
|
http.Error(w, "Method not allowed", http.StatusMethodNotAllowed)
|
|
return
|
|
}
|
|
|
|
hostID := strings.TrimPrefix(r.URL.Path, "/api/hosts/metadata/")
|
|
if hostID == "" || hostID == "metadata" {
|
|
http.Error(w, "Host ID required", http.StatusBadRequest)
|
|
return
|
|
}
|
|
|
|
// Limit request body to 16KB to prevent memory exhaustion
|
|
r.Body = http.MaxBytesReader(w, r.Body, 16*1024)
|
|
|
|
var meta config.HostMetadata
|
|
if err := json.NewDecoder(r.Body).Decode(&meta); err != nil {
|
|
http.Error(w, "Invalid request body", http.StatusBadRequest)
|
|
return
|
|
}
|
|
|
|
// Validate URL if provided
|
|
if meta.CustomURL != "" {
|
|
// Parse and validate the URL
|
|
parsedURL, err := url.Parse(meta.CustomURL)
|
|
if err != nil {
|
|
http.Error(w, "Invalid URL format: "+err.Error(), http.StatusBadRequest)
|
|
return
|
|
}
|
|
|
|
// Check scheme
|
|
if parsedURL.Scheme != "http" && parsedURL.Scheme != "https" {
|
|
http.Error(w, "URL must use http:// or https:// scheme", http.StatusBadRequest)
|
|
return
|
|
}
|
|
|
|
// Check host is present and valid
|
|
if parsedURL.Host == "" {
|
|
http.Error(w, "Invalid URL: missing host/domain (e.g., use https://192.168.1.100:8006 or https://myhost.local)", http.StatusBadRequest)
|
|
return
|
|
}
|
|
|
|
// Check for incomplete URLs like "https://host."
|
|
if strings.HasSuffix(parsedURL.Host, ".") && !strings.Contains(parsedURL.Host, "..") {
|
|
http.Error(w, "Incomplete URL: '"+meta.CustomURL+"' - please enter a complete domain or IP address", http.StatusBadRequest)
|
|
return
|
|
}
|
|
}
|
|
store := h.getStore(r.Context())
|
|
if err := store.Set(hostID, &meta); err != nil {
|
|
log.Error().Err(err).Str("hostID", hostID).Msg("Failed to save host metadata")
|
|
// Provide more specific error message
|
|
errMsg := "Failed to save metadata"
|
|
if strings.Contains(err.Error(), "permission") {
|
|
errMsg = "Permission denied - check file permissions"
|
|
} else if strings.Contains(err.Error(), "no space") {
|
|
errMsg = "Disk full - cannot save metadata"
|
|
}
|
|
http.Error(w, errMsg, http.StatusInternalServerError)
|
|
return
|
|
}
|
|
|
|
log.Info().Str("hostID", hostID).Str("url", meta.CustomURL).Msg("Updated host metadata")
|
|
|
|
w.Header().Set("Content-Type", "application/json")
|
|
json.NewEncoder(w).Encode(&meta)
|
|
}
|
|
|
|
// HandleDeleteMetadata removes metadata for a host
|
|
func (h *HostMetadataHandler) HandleDeleteMetadata(w http.ResponseWriter, r *http.Request) {
|
|
if r.Method != http.MethodDelete {
|
|
http.Error(w, "Method not allowed", http.StatusMethodNotAllowed)
|
|
return
|
|
}
|
|
|
|
hostID := strings.TrimPrefix(r.URL.Path, "/api/hosts/metadata/")
|
|
if hostID == "" || hostID == "metadata" {
|
|
http.Error(w, "Host ID required", http.StatusBadRequest)
|
|
return
|
|
}
|
|
store := h.getStore(r.Context())
|
|
if err := store.Delete(hostID); err != nil {
|
|
log.Error().Err(err).Str("hostID", hostID).Msg("Failed to delete host metadata")
|
|
http.Error(w, "Failed to delete metadata", http.StatusInternalServerError)
|
|
return
|
|
}
|
|
|
|
log.Info().Str("hostID", hostID).Msg("Deleted host metadata")
|
|
|
|
w.WriteHeader(http.StatusNoContent)
|
|
}
|