You are viewing a plain text version of this content. The canonical link for it is here.
Posted to commits@trafficcontrol.apache.org by fr...@apache.org on 2019/06/07 14:16:33 UTC

[trafficcontrol] branch master updated: Add Traffic Ops Golang ats meta config route (#3516)

This is an automated email from the ASF dual-hosted git repository.

friede pushed a commit to branch master
in repository https://gitbox.apache.org/repos/asf/trafficcontrol.git


The following commit(s) were added to refs/heads/master by this push:
     new 5df482c  Add Traffic Ops Golang ats meta config route (#3516)
5df482c is described below

commit 5df482c629faa9e77e38084c08477d01c036b454
Author: Robert Butts <ro...@users.noreply.github.com>
AuthorDate: Fri Jun 7 08:16:28 2019 -0600

    Add Traffic Ops Golang ats meta config route (#3516)
    
    * Add TOGo ats meta config route
    * Fix TO meta config to [] not null for no configs
    * Add TO ats config meta API test
    * Change TO meta.config missing url log warn to err
    * Change TO ats config query to name coalesce fields
    * Change TO ats meta cfg to remove unnecessary if
---
 lib/go-tc/ats.go                                   |  14 +-
 traffic_ops/client/atsconfig.go                    |  15 +
 traffic_ops/testing/api/v14/atsconfig_meta_test.go |  72 +++++
 traffic_ops/traffic_ops_golang/ats/meta.go         | 335 +++++++++++++++++++++
 .../traffic_ops_golang/ats/parentdotconfig.go      |   5 +-
 traffic_ops/traffic_ops_golang/routing/routes.go   |   1 +
 6 files changed, 432 insertions(+), 10 deletions(-)

diff --git a/lib/go-tc/ats.go b/lib/go-tc/ats.go
index 3df463b..106c048 100644
--- a/lib/go-tc/ats.go
+++ b/lib/go-tc/ats.go
@@ -41,13 +41,6 @@ type ATSConfigMetaDataInfo struct {
 	TOURL             string `json:"toUrl"`
 }
 
-type ATSConfigMetaDataConfigFileScope string
-
-const ATSConfigMetaDataConfigFileScopeProfiles = ATSConfigMetaDataConfigFileScope("profiles")
-const ATSConfigMetaDataConfigFileScopeServers = ATSConfigMetaDataConfigFileScope("servers")
-const ATSConfigMetaDataConfigFileScopeCDNs = ATSConfigMetaDataConfigFileScope("cdns")
-const ATSConfigMetaDataConfigFileScopeInvalid = ATSConfigMetaDataConfigFileScope("")
-
 type ATSConfigMetaDataConfigFile struct {
 	FileNameOnDisk string `json:"fnameOnDisk"`
 	Location       string `json:"location"`
@@ -56,6 +49,13 @@ type ATSConfigMetaDataConfigFile struct {
 	Scope          string `json:"scope"`
 }
 
+type ATSConfigMetaDataConfigFileScope string
+
+const ATSConfigMetaDataConfigFileScopeProfiles = ATSConfigMetaDataConfigFileScope("profiles")
+const ATSConfigMetaDataConfigFileScopeServers = ATSConfigMetaDataConfigFileScope("servers")
+const ATSConfigMetaDataConfigFileScopeCDNs = ATSConfigMetaDataConfigFileScope("cdns")
+const ATSConfigMetaDataConfigFileScopeInvalid = ATSConfigMetaDataConfigFileScope("")
+
 func (t ATSConfigMetaDataConfigFileScope) String() string {
 	switch t {
 	case ATSConfigMetaDataConfigFileScopeProfiles:
diff --git a/traffic_ops/client/atsconfig.go b/traffic_ops/client/atsconfig.go
index 6432c23..a22d297 100644
--- a/traffic_ops/client/atsconfig.go
+++ b/traffic_ops/client/atsconfig.go
@@ -86,3 +86,18 @@ func (to *Session) getConfigFile(uri string) (string, ReqInf, error) {
 	bts, err := ioutil.ReadAll(resp.Body)
 	return string(bts), reqInf, err
 }
+
+func (to *Session) GetATSServerConfigList(serverID int) (tc.ATSConfigMetaData, ReqInf, error) {
+	resp, remoteAddr, err := to.request(http.MethodGet, apiBase+"/servers/"+strconv.Itoa(serverID)+"/configfiles/ats", nil)
+	reqInf := ReqInf{CacheHitStatus: CacheHitStatusMiss, RemoteAddr: remoteAddr}
+	if err != nil {
+		return tc.ATSConfigMetaData{}, reqInf, err
+	}
+	defer resp.Body.Close()
+
+	data := tc.ATSConfigMetaData{}
+	if err := json.NewDecoder(resp.Body).Decode(&data); err != nil {
+		return tc.ATSConfigMetaData{}, reqInf, err
+	}
+	return data, reqInf, nil
+}
diff --git a/traffic_ops/testing/api/v14/atsconfig_meta_test.go b/traffic_ops/testing/api/v14/atsconfig_meta_test.go
new file mode 100644
index 0000000..78806f2
--- /dev/null
+++ b/traffic_ops/testing/api/v14/atsconfig_meta_test.go
@@ -0,0 +1,72 @@
+package v14
+
+/*
+
+   Licensed under the Apache License, Version 2.0 (the "License");
+   you may not use this file except in compliance with the License.
+   You may obtain a copy of the License at
+
+   http://www.apache.org/licenses/LICENSE-2.0
+
+   Unless required by applicable law or agreed to in writing, software
+   distributed under the License is distributed on an "AS IS" BASIS,
+   WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+   See the License for the specific language governing permissions and
+   limitations under the License.
+*/
+
+import (
+	"testing"
+
+	"github.com/apache/trafficcontrol/lib/go-tc"
+)
+
+func TestATSConfigMeta(t *testing.T) {
+	WithObjs(t, []TCObj{CDNs, Types, Tenants, Parameters, Profiles, Statuses, Divisions, Regions, PhysLocations, CacheGroups, Servers, DeliveryServices}, func() {
+		GetTestATSConfigMeta(t)
+	})
+}
+
+func GetTestATSConfigMeta(t *testing.T) {
+	if len(testData.Servers) < 1 {
+		t.Fatalf("cannot GET Server: no test data\n")
+	}
+	testServer := testData.Servers[0]
+
+	serverList, _, err := TOSession.GetServerByHostName(testServer.HostName)
+	if err != nil {
+		t.Fatalf("cannot GET Server: %v\n", err)
+	}
+	if len(serverList) < 1 {
+		t.Fatalf("cannot GET Server '" + testServer.HostName + "', returned no servers\n")
+	}
+	server := serverList[0]
+
+	lst, _, err := TOSession.GetATSServerConfigList(server.ID)
+	if err != nil {
+		t.Fatalf("Getting server '" + server.HostName + "' config list: " + err.Error() + "\n")
+	}
+
+	expected := tc.ATSConfigMetaDataConfigFile{
+		FileNameOnDisk: "hdr_rw_mid_anymap-ds.config",
+		Location:       "/remap/config/location/parameter",
+		APIURI:         "/api/1.2/cdns/cdn1/configfiles/ats/hdr_rw_mid_anymap-ds.config",
+		URL:            "",
+		Scope:          "cdns",
+	}
+
+	actual := (*tc.ATSConfigMetaDataConfigFile)(nil)
+	for _, cfg := range lst.ConfigFiles {
+		if cfg.FileNameOnDisk == expected.FileNameOnDisk {
+			actual = &cfg
+			break
+		}
+	}
+	if actual == nil {
+		t.Fatalf("Getting server '"+server.HostName+"' config list: expected: %+v actual: not found\n", expected.FileNameOnDisk)
+	}
+
+	if expected != *actual {
+		t.Fatalf("Getting server '"+server.HostName+"' config list: expected: %+v actual: %+v\n", expected, *actual)
+	}
+}
diff --git a/traffic_ops/traffic_ops_golang/ats/meta.go b/traffic_ops/traffic_ops_golang/ats/meta.go
new file mode 100644
index 0000000..a7eb994
--- /dev/null
+++ b/traffic_ops/traffic_ops_golang/ats/meta.go
@@ -0,0 +1,335 @@
+package ats
+
+/*
+ * Licensed to the Apache Software Foundation (ASF) under one
+ * or more contributor license agreements.  See the NOTICE file
+ * distributed with this work for additional information
+ * regarding copyright ownership.  The ASF licenses this file
+ * to you under the Apache License, Version 2.0 (the
+ * "License"); you may not use this file except in compliance
+ * with the License.  You may obtain a copy of the License at
+ *
+ *   http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing,
+ * software distributed under the License is distributed on an
+ * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
+ * KIND, either express or implied.  See the License for the
+ * specific language governing permissions and limitations
+ * under the License.
+ */
+
+import (
+	"database/sql"
+	"errors"
+	"net/http"
+	"strings"
+
+	"github.com/apache/trafficcontrol/lib/go-log"
+	"github.com/apache/trafficcontrol/lib/go-tc"
+	"github.com/apache/trafficcontrol/traffic_ops/traffic_ops_golang/api"
+)
+
+func GetConfigMetaData(w http.ResponseWriter, r *http.Request) {
+	inf, userErr, sysErr, errCode := api.NewInfo(r, []string{"id"}, []string{"id"})
+	if userErr != nil || sysErr != nil {
+		api.HandleErr(w, r, inf.Tx.Tx, errCode, userErr, sysErr)
+		return
+	}
+	defer inf.Close()
+
+	server, ok, err := getServerInfoByID(inf.Tx.Tx, inf.IntParams["id"])
+	if err != nil {
+		api.HandleErr(w, r, inf.Tx.Tx, http.StatusInternalServerError, nil, errors.New("GetConfigMetaData getting server info: "+err.Error()))
+		return
+	} else if !ok {
+		api.HandleErr(w, r, inf.Tx.Tx, http.StatusNotFound, nil, errors.New("server not found"))
+		return
+	}
+
+	tmParams, err := GetTMParams(inf.Tx.Tx)
+	if err != nil {
+		api.HandleErr(w, r, inf.Tx.Tx, http.StatusInternalServerError, nil, errors.New("GetConfigMetaData getting tm.url parameter: "+err.Error()))
+		return
+	}
+	if tmParams.URL == "" {
+		log.Errorln("ats.GetConfigMetadata: global tm.url parameter missing or empty! Setting empty in meta config!")
+	}
+
+	atsData := tc.ATSConfigMetaData{
+		Info: tc.ATSConfigMetaDataInfo{
+			ProfileID:         int(server.ProfileID),
+			TOReverseProxyURL: tmParams.ReverseProxyURL,
+			TOURL:             tmParams.URL,
+			ServerIPv4:        server.IP,
+			ServerPort:        server.Port,
+			ServerName:        server.HostName,
+			CDNID:             server.CDNID,
+			CDNName:           string(server.CDN),
+			ServerID:          server.ID,
+			ProfileName:       server.ProfileName,
+		},
+		ConfigFiles: []tc.ATSConfigMetaDataConfigFile{},
+	}
+
+	locationParams, err := GetLocationParams(inf.Tx.Tx, int(server.ProfileID))
+	if err != nil {
+		api.HandleErr(w, r, inf.Tx.Tx, http.StatusInternalServerError, nil, errors.New("GetConfigMetaData getting location parameters: "+err.Error()))
+		return
+	}
+
+	if locationParams["remap.config"].Location != "" {
+		configLocation := locationParams["remap.config"].Location
+		uriSignedDSes, err := GetServerURISignedDSes(inf.Tx.Tx, server.HostName, server.Port)
+		if err != nil {
+			api.HandleErr(w, r, inf.Tx.Tx, http.StatusInternalServerError, nil, errors.New("GetConfigMetaData getting server uri-signed dses: "+err.Error()))
+			return
+		}
+		for _, ds := range uriSignedDSes {
+			cfgName := "uri_signing_" + string(ds) + ".config"
+			// If there's already a parameter for it, don't clobber it. The user may wish to override the location.
+			if _, ok := locationParams[cfgName]; !ok {
+				p := locationParams[cfgName]
+				p.FileNameOnDisk = cfgName
+				p.Location = configLocation
+			}
+		}
+	}
+
+	for cfgFile, cfgParams := range locationParams {
+		atsCfg := tc.ATSConfigMetaDataConfigFile{
+			FileNameOnDisk: cfgParams.FileNameOnDisk,
+			Location:       cfgParams.Location,
+		}
+
+		scope, err := getServerScope(inf.Tx.Tx, cfgFile, server.Type)
+		if err != nil {
+			api.HandleErr(w, r, inf.Tx.Tx, http.StatusInternalServerError, nil, errors.New("GetConfigMetaData getting scope: "+err.Error()))
+			return
+		}
+
+		if cfgParams.URL != "" {
+			scope = tc.ATSConfigMetaDataConfigFileScopeCDNs
+			atsCfg.URL = cfgParams.URL
+		} else {
+			scopeID := ""
+			if scope == tc.ATSConfigMetaDataConfigFileScopeCDNs {
+				scopeID = string(server.CDN)
+			} else if scope == tc.ATSConfigMetaDataConfigFileScopeProfiles {
+				scopeID = server.ProfileName
+			} else { // ATSConfigMetaDataConfigFileScopeServers
+				scopeID = server.HostName
+			}
+			atsCfg.APIURI = "/api/1.2/" + string(scope) + "/" + scopeID + "/configfiles/ats/" + cfgFile
+		}
+
+		atsCfg.Scope = string(scope)
+
+		atsData.ConfigFiles = append(atsData.ConfigFiles, atsCfg)
+	}
+
+	api.WriteRespRaw(w, r, atsData)
+}
+
+// GetTMParams returns the global "tm.url" and "tm.rev_proxy.url" parameters, and any error. If either param doesn't exist, an empty string is returned without error.
+func GetTMParams(tx *sql.Tx) (TMParams, error) {
+	rows, err := tx.Query(`SELECT name, value from parameter where config_file = 'global' AND (name = 'tm.url' OR name = 'tm.rev_proxy.url')`)
+	if err != nil {
+		return TMParams{}, errors.New("querying: " + err.Error())
+	}
+	defer rows.Close()
+
+	p := TMParams{}
+	for rows.Next() {
+		name := ""
+		val := ""
+		if err := rows.Scan(&name, &val); err != nil {
+			return TMParams{}, errors.New("scanning: " + err.Error())
+		}
+		if name == "tm.url" {
+			p.URL = val
+		} else if name == "tm.rev_proxy.url" {
+			p.ReverseProxyURL = val
+		} else {
+			return TMParams{}, errors.New("querying got unexpected parameter: " + name + " (value: '" + val + "')") // should never happen
+		}
+	}
+	return p, nil
+}
+
+// GetLocationParams returns a map[configFile]locationParams, and any error. If either param doesn't exist, an empty string is returned without error.
+func GetLocationParams(tx *sql.Tx, profileID int) (map[string]ConfigProfileParams, error) {
+	qry := `
+SELECT
+  p.name,
+  p.config_file,
+  p.value
+FROM
+  parameter p
+  JOIN profile_parameter pp ON pp.parameter = p.id
+WHERE
+  pp.profile = $1
+`
+	rows, err := tx.Query(qry, profileID)
+	if err != nil {
+		return nil, errors.New("querying: " + err.Error())
+	}
+	defer rows.Close()
+
+	params := map[string]ConfigProfileParams{}
+	for rows.Next() {
+		name := ""
+		file := ""
+		val := ""
+		if err := rows.Scan(&name, &file, &val); err != nil {
+			return nil, errors.New("scanning: " + err.Error())
+		}
+		if name == "location" {
+			p := params[file]
+			p.FileNameOnDisk = file
+			p.Location = val
+			params[file] = p
+		} else if name == "URL" {
+			p := params[file]
+			p.URL = val
+			params[file] = p
+		}
+	}
+	return params, nil
+}
+
+// GetServerURISignedDSes returns a list of delivery service names which have the given server assigned and have URI signing enabled, and any error.
+func GetServerURISignedDSes(tx *sql.Tx, serverHostName string, serverPort int) ([]tc.DeliveryServiceName, error) {
+	qry := `
+SELECT
+  ds.xml_id
+FROM
+  deliveryservice ds
+  JOIN deliveryservice_server dss ON ds.id = dss.deliveryservice
+  JOIN server s ON s.id = dss.server
+WHERE
+  s.host_name = $1
+  AND s.tcp_port = $2
+  AND ds.signing_algorithm = 'uri_signing'
+`
+	rows, err := tx.Query(qry, serverHostName, serverPort)
+	if err != nil {
+		return nil, errors.New("querying: " + err.Error())
+	}
+	defer rows.Close()
+
+	dses := []tc.DeliveryServiceName{}
+	for rows.Next() {
+		ds := tc.DeliveryServiceName("")
+		if err := rows.Scan(&ds); err != nil {
+			return nil, errors.New("scanning: " + err.Error())
+		}
+		dses = append(dses, ds)
+	}
+	return dses, nil
+}
+
+func getServerScope(tx *sql.Tx, cfgFile string, serverType string) (tc.ATSConfigMetaDataConfigFileScope, error) {
+	switch {
+	case cfgFile == "cache.config" && tc.CacheTypeFromString(serverType) == tc.CacheTypeMid:
+		return tc.ATSConfigMetaDataConfigFileScopeServers, nil
+	default:
+		return getScope(tx, cfgFile)
+	}
+}
+
+// getScope returns the ATSConfigMetaDataConfigFileScope for the given config file, and potentially the given server. If the config is not a Server scope, i.e. was part of an endpoint which does not include a server name or id, the server may be nil.
+func getScope(tx *sql.Tx, cfgFile string) (tc.ATSConfigMetaDataConfigFileScope, error) {
+	switch {
+	case cfgFile == "ip_allow.config":
+		fallthrough
+	case cfgFile == "parent.config":
+		fallthrough
+	case cfgFile == "hosting.config":
+		fallthrough
+	case cfgFile == "packages":
+		fallthrough
+	case cfgFile == "chkconfig":
+		fallthrough
+	case cfgFile == "remap.config":
+		fallthrough
+	case strings.HasPrefix(cfgFile, "to_ext_") && strings.HasSuffix(cfgFile, ".config"):
+		return tc.ATSConfigMetaDataConfigFileScopeServers, nil
+	case cfgFile == "12M_facts":
+		fallthrough
+	case cfgFile == "50-ats.rules":
+		fallthrough
+	case cfgFile == "astats.config":
+		fallthrough
+	case cfgFile == "cache.config":
+		fallthrough
+	case cfgFile == "drop_qstring.config":
+		fallthrough
+	case cfgFile == "logs_xml.config":
+		fallthrough
+	case cfgFile == "logging.config":
+		fallthrough
+	case cfgFile == "plugin.config":
+		fallthrough
+	case cfgFile == "records.config":
+		fallthrough
+	case cfgFile == "storage.config":
+		fallthrough
+	case cfgFile == "volume.config":
+		fallthrough
+	case cfgFile == "sysctl.conf":
+		fallthrough
+	case strings.HasPrefix(cfgFile, "url_sig_") && strings.HasSuffix(cfgFile, ".config"):
+		fallthrough
+	case strings.HasPrefix(cfgFile, "uri_signing_") && strings.HasSuffix(cfgFile, ".config"):
+		return tc.ATSConfigMetaDataConfigFileScopeProfiles, nil
+
+	case cfgFile == "bg_fetch.config":
+		fallthrough
+	case cfgFile == "regex_revalidate.config":
+		fallthrough
+	case cfgFile == "ssl_multicert.config":
+		fallthrough
+	case strings.HasPrefix(cfgFile, "cacheurl") && strings.HasSuffix(cfgFile, ".config"):
+		fallthrough
+	case strings.HasPrefix(cfgFile, "hdr_rw_") && strings.HasSuffix(cfgFile, ".config"):
+		fallthrough
+	case strings.HasPrefix(cfgFile, "regex_remap_") && strings.HasSuffix(cfgFile, ".config"):
+		fallthrough
+	case strings.HasPrefix(cfgFile, "set_dscp_") && strings.HasSuffix(cfgFile, ".config"):
+		return tc.ATSConfigMetaDataConfigFileScopeCDNs, nil
+	}
+
+	scope, ok, err := GetFirstScopeParameter(tx, cfgFile)
+	if err != nil {
+		return tc.ATSConfigMetaDataConfigFileScopeInvalid, errors.New("getting scope parameter: " + err.Error())
+	}
+	if !ok {
+		scope = string(tc.ATSConfigMetaDataConfigFileScopeServers)
+	}
+	return tc.ATSConfigMetaDataConfigFileScope(scope), nil
+}
+
+type TMParams struct {
+	URL             string
+	ReverseProxyURL string
+}
+
+type ConfigProfileParams struct {
+	FileNameOnDisk string
+	Location       string
+	URL            string
+	APIURI         string
+}
+
+// GetFirstScopeParameter returns the value of the arbitrarily-first parameter with the name 'scope' and the given config file, whether a parameter was found, and any error.
+func GetFirstScopeParameter(tx *sql.Tx, cfgFile string) (string, bool, error) {
+	v := ""
+	if err := tx.QueryRow(`SELECT p.value FROM parameter p WHERE p.config_file = $1 AND p.name = 'scope'`, cfgFile).Scan(&v); err != nil {
+		if err == sql.ErrNoRows {
+			return "", false, nil
+		}
+		return "", false, errors.New("querying first scope parameter: " + err.Error())
+	}
+	return v, true, nil
+}
diff --git a/traffic_ops/traffic_ops_golang/ats/parentdotconfig.go b/traffic_ops/traffic_ops_golang/ats/parentdotconfig.go
index d4bee85..982081d 100644
--- a/traffic_ops/traffic_ops_golang/ats/parentdotconfig.go
+++ b/traffic_ops/traffic_ops_golang/ats/parentdotconfig.go
@@ -438,7 +438,6 @@ func getServerInfoByHost(tx *sql.Tx, host string) (*ServerInfo, bool, error) {
 
 // getServerInfo returns the necessary info about the server, whether the server exists, and any error.
 func getServerInfo(tx *sql.Tx, qry string, qryParams []interface{}) (*ServerInfo, bool, error) {
-	log.Errorf("getServerInfo qq "+qry+" p %++v\n", qryParams)
 	s := ServerInfo{}
 	if err := tx.QueryRow(qry, qryParams...).Scan(&s.CDN, &s.CDNID, &s.ID, &s.HostName, &s.DomainName, &s.IP, &s.ProfileID, &s.ProfileName, &s.Port, &s.Type, &s.CacheGroupID, &s.ParentCacheGroupID, &s.SecondaryParentCacheGroupID, &s.ParentCacheGroupType, &s.SecondaryParentCacheGroupType); err != nil {
 		if err == sql.ErrNoRows {
@@ -463,8 +462,8 @@ SELECT
   s.tcp_port,
   t.name as type,
   s.cachegroup,
-  COALESCE(cg.parent_cachegroup_id, ` + strconv.Itoa(InvalidID) + `),
-  COALESCE(cg.secondary_parent_cachegroup_id, ` + strconv.Itoa(InvalidID) + `),
+  COALESCE(cg.parent_cachegroup_id, ` + strconv.Itoa(InvalidID) + `) as parent_cachegroup_id,
+  COALESCE(cg.secondary_parent_cachegroup_id, ` + strconv.Itoa(InvalidID) + `) as secondary_parent_cachegroup_id,
   COALESCE(parentt.name, '') as parent_cachegroup_type,
   COALESCE(sparentt.name, '') as secondary_parent_cachegroup_type
 FROM
diff --git a/traffic_ops/traffic_ops_golang/routing/routes.go b/traffic_ops/traffic_ops_golang/routing/routes.go
index 0c88232..179bf56 100644
--- a/traffic_ops/traffic_ops_golang/routing/routes.go
+++ b/traffic_ops/traffic_ops_golang/routing/routes.go
@@ -377,6 +377,7 @@ func Routes(d ServerData) ([]Route, []RawRoute, http.Handler, error) {
 		{1.1, http.MethodPut, `snapshot/{cdn}/?$`, crconfig.SnapshotHandler, auth.PrivLevelOperations, Authenticated, nil},
 
 		// ATS config files
+		{1.1, http.MethodGet, `servers/{id}/configfiles/ats/?(\.json)?$`, ats.GetConfigMetaData, auth.PrivLevelOperations, Authenticated, nil},
 		{1.1, http.MethodGet, `cdns/{cdn-name-or-id}/configfiles/ats/regex_revalidate.config/?(\.json)?$`, ats.GetRegexRevalidateDotConfig, auth.PrivLevelOperations, Authenticated, nil},
 		{1.1, http.MethodGet, `cdns/{cdn-name-or-id}/configfiles/ats/hdr_rw_mid_{xml-id}.config/?(\.json)?$`, ats.GetMidHeaderRewriteDotConfig, auth.PrivLevelOperations, Authenticated, nil},
 		{1.1, http.MethodGet, `cdns/{cdn-name-or-id}/configfiles/ats/hdr_rw_{xml-id}.config/?(\.json)?$`, ats.GetEdgeHeaderRewriteDotConfig, auth.PrivLevelOperations, Authenticated, nil},