You are viewing a plain text version of this content. The canonical link for it is here.
Posted to commits@trafficcontrol.apache.org by mi...@apache.org on 2018/07/12 01:51:45 UTC
[trafficcontrol] branch master updated: Add TO Go
cdns/name/dnsseckeys/delete
This is an automated email from the ASF dual-hosted git repository.
mitchell852 pushed a commit to branch master
in repository https://gitbox.apache.org/repos/asf/trafficcontrol.git
The following commit(s) were added to refs/heads/master by this push:
new 78222fe Add TO Go cdns/name/dnsseckeys/delete
78222fe is described below
commit 78222fe805cd6659b21880c6ce5e0818c6623a75
Author: Robert Butts <ro...@apache.org>
AuthorDate: Mon Jun 4 16:01:17 2018 -0600
Add TO Go cdns/name/dnsseckeys/delete
---
traffic_ops/traffic_ops_golang/cdn/dnssec.go | 36 ++++++++++++++++++++++++++--
traffic_ops/traffic_ops_golang/routes.go | 1 +
2 files changed, 35 insertions(+), 2 deletions(-)
diff --git a/traffic_ops/traffic_ops_golang/cdn/dnssec.go b/traffic_ops/traffic_ops_golang/cdn/dnssec.go
index 0f2b385..d65992e 100644
--- a/traffic_ops/traffic_ops_golang/cdn/dnssec.go
+++ b/traffic_ops/traffic_ops_golang/cdn/dnssec.go
@@ -34,6 +34,9 @@ import (
"github.com/apache/trafficcontrol/traffic_ops/traffic_ops_golang/riaksvc"
)
+const CDNDNSSECKeyType = "dnssec"
+const DNSSECStatusExisting = "existing"
+
func CreateDNSSECKeys(w http.ResponseWriter, r *http.Request) {
inf, userErr, sysErr, errCode := api.NewInfo(r, nil, nil)
if userErr != nil || sysErr != nil {
@@ -41,6 +44,7 @@ func CreateDNSSECKeys(w http.ResponseWriter, r *http.Request) {
return
}
defer inf.Close()
+
req := tc.CDNDNSSECGenerateReq{}
if err := api.Parse(r.Body, inf.Tx.Tx, &req); err != nil {
api.HandleErr(w, r, http.StatusBadRequest, errors.New("parsing request: "+err.Error()), nil)
@@ -58,8 +62,6 @@ func CreateDNSSECKeys(w http.ResponseWriter, r *http.Request) {
api.WriteResp(w, r, "Successfully created dnssec keys for "+cdnName)
}
-const DNSSECStatusExisting = "existing"
-
func generateStoreDNSSECKeys(
tx *sql.Tx,
cfg *config.Config,
@@ -177,3 +179,33 @@ WHERE cdn.name = $1
}
return dses, cdnDomain, nil
}
+
+func DeleteDNSSECKeys(w http.ResponseWriter, r *http.Request) {
+ inf, userErr, sysErr, errCode := api.NewInfo(r, []string{"name"}, nil)
+ if userErr != nil || sysErr != nil {
+ api.HandleErr(w, r, errCode, userErr, sysErr)
+ return
+ }
+ defer inf.Close()
+
+ key := inf.Params["name"]
+
+ riakCluster, err := riaksvc.GetRiakClusterTx(inf.Tx.Tx, inf.Config.RiakAuthOptions)
+ if err != nil {
+ api.HandleErr(w, r, http.StatusInternalServerError, nil, errors.New("getting riak cluster: "+err.Error()))
+ return
+ }
+ if err := riakCluster.Start(); err != nil {
+ api.HandleErr(w, r, http.StatusInternalServerError, nil, errors.New("starting riak cluster: "+err.Error()))
+ return
+ }
+ defer riaksvc.StopCluster(riakCluster)
+
+ if err := riaksvc.DeleteObject(key, CDNDNSSECKeyType, riakCluster); err != nil {
+ api.HandleErr(w, r, http.StatusInternalServerError, nil, errors.New("deleting cdn dnssec keys: "+err.Error()))
+ return
+ }
+ *inf.CommitTx = true
+ api.CreateChangeLogRawTx(api.ApiChange, "Deleted DNSSEC keys for CDN "+key, inf.User, inf.Tx.Tx)
+ api.WriteResp(w, r, "Successfully deleted "+CDNDNSSECKeyType+" for "+key)
+}
diff --git a/traffic_ops/traffic_ops_golang/routes.go b/traffic_ops/traffic_ops_golang/routes.go
index ffffdaa..baab83a 100644
--- a/traffic_ops/traffic_ops_golang/routes.go
+++ b/traffic_ops/traffic_ops_golang/routes.go
@@ -128,6 +128,7 @@ func Routes(d ServerData) ([]Route, []RawRoute, http.Handler, error) {
//CDN: queue updates
{1.1, http.MethodPost, `cdns/{id}/queue_update$`, cdn.Queue(d.DB.DB), auth.PrivLevelOperations, Authenticated, nil},
{1.1, http.MethodPost, `cdns/dnsseckeys/generate(\.json)?$`, cdn.CreateDNSSECKeys, auth.PrivLevelAdmin, Authenticated, nil},
+ {1.1, http.MethodGet, `cdns/name/{name}/dnsseckeys/delete/?(\.json)?$`, cdn.DeleteDNSSECKeys, auth.PrivLevelAdmin, Authenticated, nil},
//CDN: Monitoring: Traffic Monitor
{1.1, http.MethodGet, `cdns/{name}/configs/monitoring(\.json)?$`, monitoringHandler(d.DB), auth.PrivLevelReadOnly, Authenticated, nil},