From f59240e1636571ea45bd4ea25159f93211caf426 Mon Sep 17 00:00:00 2001 From: Nicolas Ruflin Date: Mon, 10 Apr 2017 11:00:17 +0200 Subject: [PATCH] Adding support for custom http headers and TLS for metricbeat modules (#3945) (#3949) (cherry picked from commit 3f1c7c07323107f930f0a90b25199429dbe46eef) --- CHANGELOG.asciidoc | 1 + metricbeat/helper/http.go | 63 ++++++++++++++++++++++++++++++++++++--- 2 files changed, 60 insertions(+), 4 deletions(-) diff --git a/CHANGELOG.asciidoc b/CHANGELOG.asciidoc index c1aed1838925..d14d29480ec7 100644 --- a/CHANGELOG.asciidoc +++ b/CHANGELOG.asciidoc @@ -168,6 +168,7 @@ https://github.com/elastic/beats/compare/v5.2.2...v5.3.0[View commits] - The Docker, Kafka, and Prometheus modules are now Beta, instead of experimental. {pull}3525[3525] - The HAProxy module is now GA, instead of experimental. {pull}3525[3525] - Add the ability to collect the environment variables from system processes. {pull}3337[3337] +- Adding support for custom http headers and TLS for metricbeat modules {pull}3945[3945] ==== Deprecated diff --git a/metricbeat/helper/http.go b/metricbeat/helper/http.go index f3eb49d5d372..cc397c5b73f4 100644 --- a/metricbeat/helper/http.go +++ b/metricbeat/helper/http.go @@ -5,9 +5,13 @@ import ( "bytes" "encoding/json" "fmt" + "io" "io/ioutil" "net/http" + "time" + "github.com/elastic/beats/libbeat/outputs" + "github.com/elastic/beats/libbeat/outputs/transport" "github.com/elastic/beats/metricbeat/mb" ) @@ -15,14 +19,50 @@ type HTTP struct { base mb.BaseMetricSet client *http.Client // HTTP client that is reused across requests. headers map[string]string + method string + body []byte } // NewHTTP creates new http helper func NewHTTP(base mb.BaseMetricSet) *HTTP { + config := struct { + TLS *outputs.TLSConfig `config:"ssl"` + Timeout time.Duration `config:"timeout"` + Headers map[string]string `config:"headers"` + }{} + if err := base.Module().UnpackConfig(&config); err != nil { + return nil + } + + if config.Headers == nil { + config.Headers = map[string]string{} + } + + tlsConfig, err := outputs.LoadTLSConfig(config.TLS) + if err != nil { + return nil + } + + var dialer, tlsDialer transport.Dialer + + dialer = transport.NetDialer(config.Timeout) + tlsDialer, err = transport.TLSDialer(dialer, tlsConfig, config.Timeout) + if err != nil { + return nil + } + return &HTTP{ - base: base, - client: &http.Client{Timeout: base.Module().Config().Timeout}, - headers: map[string]string{}, + base: base, + client: &http.Client{ + Transport: &http.Transport{ + Dial: dialer.Dial, + DialTLS: tlsDialer.Dial, + }, + Timeout: config.Timeout, + }, + headers: config.Headers, + method: "GET", + body: nil, } } @@ -30,7 +70,14 @@ func NewHTTP(base mb.BaseMetricSet) *HTTP { // It's important that resp.Body has to be closed if this method is used. Before using this method // check if one of the other Fetch* methods could be used as they ensure that the Body is properly closed. func (h *HTTP) FetchResponse() (*http.Response, error) { - req, err := http.NewRequest("GET", h.base.HostData().SanitizedURI, nil) + + // Create a fresh reader every time + var reader io.Reader + if h.body != nil { + reader = bytes.NewReader(h.body) + } + + req, err := http.NewRequest(h.method, h.base.HostData().SanitizedURI, reader) if h.base.HostData().User != "" || h.base.HostData().Password != "" { req.SetBasicAuth(h.base.HostData().User, h.base.HostData().Password) } @@ -51,6 +98,14 @@ func (h *HTTP) SetHeader(key, value string) { h.headers[key] = value } +func (h *HTTP) SetMethod(method string) { + h.method = method +} + +func (h *HTTP) SetBody(body []byte) { + h.body = body +} + // FetchContent makes an HTTP request to the configured url and returns the body content. func (h *HTTP) FetchContent() ([]byte, error) { resp, err := h.FetchResponse()