This is an automated email from the ASF dual-hosted git repository.

zrhoffman pushed a commit to branch master
in repository https://gitbox.apache.org/repos/asf/trafficcontrol.git


The following commit(s) were added to refs/heads/master by this push:
     new 08d037fc62 Fix status code and alerts when querying delivery service 
with no SSL keys (#7640)
08d037fc62 is described below

commit 08d037fc62248cc2a61f2f4ffb407c46aca3a1a9
Author: Srijeet Chatterjee <[email protected]>
AuthorDate: Tue Jul 11 15:43:04 2023 -0600

    Fix status code and alerts when querying delivery service with no SSL keys 
(#7640)
---
 CHANGELOG.md                                       |  1 +
 .../testing/api/v5/deliveryservices_keys_test.go   | 24 ++++++++++++++++++++
 .../traffic_ops_golang/deliveryservice/keys.go     | 26 ++++++++++++++++++----
 .../traffic_ops_golang/deliveryservice/sslkeys.go  |  4 +++-
 .../trafficvault/backends/postgres/postgres.go     |  2 +-
 5 files changed, 51 insertions(+), 6 deletions(-)

diff --git a/CHANGELOG.md b/CHANGELOG.md
index faa26aeb8a..3da5a61a84 100644
--- a/CHANGELOG.md
+++ b/CHANGELOG.md
@@ -65,6 +65,7 @@ The format is based on [Keep a 
Changelog](http://keepachangelog.com/en/1.0.0/).
 - [#7621](https://github.com/apache/trafficcontrol/pull/7621) *Traffic Ops* 
Use ID token for OAuth authentication, not Access Token
 
 ### Fixed
+- [#4393](https://github.com/apache/trafficcontrol/issues/4393) *Traffic Ops* 
Fixed the error code and alert structure when TO is queried for a delivery 
service with no ssl keys.
 - [#7623] (https://github.com/apache/trafficcontrol/pull/7623) *Traffic Ops* 
Removed TryIfModifiedSinceQuery from servicecategories.go and reused from ims.go
 - [#7608](https://github.com/apache/trafficcontrol/pull/7608) *Traffic 
Monitor* Use stats_over_http(plugin.system_stats.timestamp_ms) timestamp field 
to calculate bandwidth for TM's caches.
 - [#6318](https://github.com/apache/trafficcontrol/issues/6318) *Docs* 
Included docs for POST, PUT, DELETE (v3,v4,v5) for statuses and statuses{id}
diff --git a/traffic_ops/testing/api/v5/deliveryservices_keys_test.go 
b/traffic_ops/testing/api/v5/deliveryservices_keys_test.go
index 54b0775d5b..7044ded2db 100644
--- a/traffic_ops/testing/api/v5/deliveryservices_keys_test.go
+++ b/traffic_ops/testing/api/v5/deliveryservices_keys_test.go
@@ -14,6 +14,7 @@ package v5
 
 import (
        "encoding/json"
+       "net/http"
        "strconv"
        "strings"
        "testing"
@@ -41,6 +42,7 @@ func TestDeliveryServicesKeys(t *testing.T) {
                t.Run("Delete URI Signing keys for a Delivery Service", 
DeleteTestDeliveryServicesURISigningKeys)
                t.Run("Delete old CDN SSL keys", DeleteCDNOldSSLKeys)
                t.Run("Create and retrieve SSL keys for a Delivery Service", 
DeliveryServiceSSLKeys)
+               t.Run("Retrieve SSL keys for a Delivery Service without keys", 
DeliveryServiceNoSSLKeys)
        })
 }
 
@@ -234,6 +236,28 @@ func DeleteCDNOldSSLKeys(t *testing.T) {
        assert.RequireEqual(t, len(newCdnKeys), 1, "Expected 1 ssl keys for CDN 
%v, got %d instead", cdn.Name, len(newCdnKeys))
 }
 
+func DeliveryServiceNoSSLKeys(t *testing.T) {
+       cdn := createBlankCDN("testDSWithNoSSLKeysCDN", t)
+
+       opts := client.NewRequestOptions()
+       opts.QueryParameters.Set("name", "HTTP")
+       types, _, err := TOSession.GetTypes(opts)
+       assert.RequireNoError(t, err, "Unable to get Types: %v - alerts: %+v", 
err, types.Alerts)
+       assert.RequireGreaterOrEqual(t, len(types.Response), 1, "Expected at 
least one type")
+
+       customDS := getCustomDS(cdn.ID, types.Response[0].ID, "dsNoSSLKeys", 
"routingName", "https://test.com";, "dsNoSSLKeys")
+       customDS.Protocol = util.Ptr(0)
+       resp, _, err := TOSession.CreateDeliveryService(customDS, 
client.RequestOptions{})
+       assert.RequireNoError(t, err, "Unexpected error creating a Delivery 
Service: %v - alerts: %+v", err, resp.Alerts)
+
+       ds := resp.Response
+       assert.RequireNotNil(t, ds.XMLID, "Traffic Ops returned a 
representation for a Delivery Service with null or undefined XMLID")
+
+       _, reqInf, err := TOSession.GetDeliveryServiceSSLKeys(ds.XMLID, 
client.NewRequestOptions())
+       assert.RequireNotNil(t, err, "expected error getting ssl keys, but got 
nothing")
+       assert.RequireEqual(t, reqInf.StatusCode, http.StatusNotFound)
+}
+
 func DeliveryServiceSSLKeys(t *testing.T) {
        cdn := createBlankCDN("sslkeytransfer", t)
 
diff --git a/traffic_ops/traffic_ops_golang/deliveryservice/keys.go 
b/traffic_ops/traffic_ops_golang/deliveryservice/keys.go
index 2017fa78ce..ad4b8682f9 100644
--- a/traffic_ops/traffic_ops_golang/deliveryservice/keys.go
+++ b/traffic_ops/traffic_ops_golang/deliveryservice/keys.go
@@ -187,12 +187,27 @@ func GetSSLKeysByXMLID(w http.ResponseWriter, r 
*http.Request) {
                return
        }
 
+       var userError error
+       sc := http.StatusInternalServerError
+       logAlert := true
        keyObjV4, err := getSslKeys(inf, r.Context())
        if err != nil {
-               userErr := api.LogErr(r, http.StatusInternalServerError, nil, 
err)
-               alerts.AddNewAlert(tc.ErrorLevel, userErr.Error())
-               api.WriteAlerts(w, r, http.StatusInternalServerError, alerts)
-               return
+               if err == sql.ErrNoRows {
+                       if inf.Version.GreaterThanOrEqualTo(&api.Version{Major: 
5, Minor: 0}) {
+                               sc = http.StatusNotFound
+                               userError = api.LogErr(r, sc, errors.New("no 
ssl keys for XML ID "+xmlID), nil)
+                       } else {
+                               // For versions lesser than 5.0, don't log an 
alert if the error is ErrNoRows. This is for backward compatibility reasons.
+                               logAlert = false
+                       }
+               } else {
+                       userError = api.LogErr(r, sc, nil, err)
+               }
+               if logAlert {
+                       alerts.AddNewAlert(tc.ErrorLevel, userError.Error())
+                       api.WriteAlerts(w, r, sc, alerts)
+                       return
+               }
        }
 
        var keyObj interface{}
@@ -216,6 +231,9 @@ func getSslKeys(inf *api.APIInfo, ctx context.Context) 
(tc.DeliveryServiceSSLKey
 
        keyObjFromTv, ok, err := inf.Vault.GetDeliveryServiceSSLKeys(xmlID, 
version, inf.Tx.Tx, ctx)
        if err != nil {
+               if err == sql.ErrNoRows {
+                       return tc.DeliveryServiceSSLKeysV4{}, err
+               }
                return tc.DeliveryServiceSSLKeysV4{}, errors.New("getting ssl 
keys: " + err.Error())
        }
        keyObj := tc.DeliveryServiceSSLKeysV4{}
diff --git a/traffic_ops/traffic_ops_golang/deliveryservice/sslkeys.go 
b/traffic_ops/traffic_ops_golang/deliveryservice/sslkeys.go
index f3a133c066..38402e9cf0 100644
--- a/traffic_ops/traffic_ops_golang/deliveryservice/sslkeys.go
+++ b/traffic_ops/traffic_ops_golang/deliveryservice/sslkeys.go
@@ -122,7 +122,9 @@ func GeneratePlaceholderSelfSignedCert(ds 
tc.DeliveryServiceV5, inf *api.APIInfo
        tv := inf.Vault
        _, ok, err := tv.GetDeliveryServiceSSLKeys(ds.XMLID, "", tx, context)
        if err != nil {
-               return fmt.Errorf("getting latest ssl keys for XMLID '%s': %w", 
ds.XMLID, err), http.StatusInternalServerError
+               if err != sql.ErrNoRows {
+                       return fmt.Errorf("getting latest ssl keys for XMLID 
'%s': %w", ds.XMLID, err), http.StatusInternalServerError
+               }
        }
        if ok {
                return nil, http.StatusOK
diff --git 
a/traffic_ops/traffic_ops_golang/trafficvault/backends/postgres/postgres.go 
b/traffic_ops/traffic_ops_golang/trafficvault/backends/postgres/postgres.go
index b1bdc1b394..1499882d30 100644
--- a/traffic_ops/traffic_ops_golang/trafficvault/backends/postgres/postgres.go
+++ b/traffic_ops/traffic_ops_golang/trafficvault/backends/postgres/postgres.go
@@ -138,7 +138,7 @@ func (p *Postgres) GetDeliveryServiceSSLKeys(xmlID string, 
version string, tx *s
        err = tvTx.QueryRow(query, xmlID, version).Scan(&encryptedSslKeys)
        if err != nil {
                if err == sql.ErrNoRows {
-                       return tc.DeliveryServiceSSLKeysV15{}, false, nil
+                       return tc.DeliveryServiceSSLKeysV15{}, false, err
                }
                e := checkErrWithContext("Traffic Vault PostgreSQL: executing 
SELECT SSL Keys query", err, ctx.Err())
                return tc.DeliveryServiceSSLKeysV15{}, false, e

Reply via email to