2019-03-14 19:27:31 -04:00
/ *
2019-04-09 14:39:42 -04:00
* MinIO Cloud Storage , ( C ) 2019 MinIO , Inc .
2019-03-14 19:27:31 -04:00
*
* Licensed under the Apache License , Version 2.0 ( the "License" ) ;
* you may not use this file except in compliance with the License .
* You may obtain a copy of the License at
*
* http : //www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing , software
* distributed under the License is distributed on an "AS IS" BASIS ,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND , either express or implied .
* See the License for the specific language governing permissions and
* limitations under the License .
* /
package cmd
import (
"context"
"encoding/gob"
"errors"
"fmt"
2019-08-18 22:56:32 -04:00
"io"
"io/ioutil"
2019-03-14 19:27:31 -04:00
"net/http"
2019-06-06 20:46:22 -04:00
"strconv"
2019-03-14 19:27:31 -04:00
"strings"
"time"
"github.com/gorilla/mux"
"github.com/minio/minio/cmd/logger"
"github.com/minio/minio/pkg/event"
2019-07-19 16:20:33 -04:00
"github.com/minio/minio/pkg/lifecycle"
2019-09-03 14:10:48 -04:00
"github.com/minio/minio/pkg/madmin"
2019-03-14 19:27:31 -04:00
xnet "github.com/minio/minio/pkg/net"
"github.com/minio/minio/pkg/policy"
2019-06-08 18:54:41 -04:00
trace "github.com/minio/minio/pkg/trace"
2019-03-14 19:27:31 -04:00
)
// To abstract a node over network.
type peerRESTServer struct {
}
func getServerInfo ( ) ( * ServerInfoData , error ) {
if globalBootTime . IsZero ( ) {
return nil , errServerNotInitialized
}
objLayer := newObjectLayerFn ( )
if objLayer == nil {
return nil , errServerNotInitialized
}
// Server info data.
return & ServerInfoData {
StorageInfo : objLayer . StorageInfo ( context . Background ( ) ) ,
ConnStats : globalConnStats . toServerConnStats ( ) ,
HTTPStats : globalHTTPStats . toServerHTTPStats ( ) ,
Properties : ServerProperties {
2019-03-25 14:55:28 -04:00
Uptime : UTCNow ( ) . Sub ( globalBootTime ) ,
Version : Version ,
CommitID : CommitID ,
DeploymentID : globalDeploymentID ,
SQSARN : globalNotificationSys . GetARNList ( ) ,
Region : globalServerConfig . GetRegion ( ) ,
2019-03-14 19:27:31 -04:00
} ,
} , nil
}
2019-08-18 22:56:32 -04:00
// NetReadPerfInfoHandler - returns network read performance information.
func ( s * peerRESTServer ) NetReadPerfInfoHandler ( w http . ResponseWriter , r * http . Request ) {
if ! s . IsValid ( w , r ) {
s . writeErrorResponse ( w , errors . New ( "Invalid request" ) )
return
}
params := mux . Vars ( r )
sizeStr , found := params [ peerRESTNetPerfSize ]
if ! found {
s . writeErrorResponse ( w , errors . New ( "size is missing" ) )
return
}
size , err := strconv . ParseInt ( sizeStr , 10 , 64 )
if err != nil || size < 0 {
s . writeErrorResponse ( w , errInvalidArgument )
return
}
start := time . Now ( )
n , err := io . CopyN ( ioutil . Discard , r . Body , size )
end := time . Now ( )
if err != nil {
s . writeErrorResponse ( w , err )
return
}
if n != size {
s . writeErrorResponse ( w , fmt . Errorf ( "short read; expected: %v, got: %v" , size , n ) )
return
}
addr := r . Host
if globalIsDistXL {
addr = GetLocalPeer ( globalEndpoints )
}
info := ServerNetReadPerfInfo {
Addr : addr ,
ReadPerf : end . Sub ( start ) ,
}
ctx := newContext ( r , w , "NetReadPerfInfo" )
logger . LogIf ( ctx , gob . NewEncoder ( w ) . Encode ( info ) )
w . ( http . Flusher ) . Flush ( )
}
// CollectNetPerfInfoHandler - returns network performance information collected from other peers.
func ( s * peerRESTServer ) CollectNetPerfInfoHandler ( w http . ResponseWriter , r * http . Request ) {
if ! s . IsValid ( w , r ) {
s . writeErrorResponse ( w , errors . New ( "Invalid request" ) )
return
}
params := mux . Vars ( r )
sizeStr , found := params [ peerRESTNetPerfSize ]
if ! found {
s . writeErrorResponse ( w , errors . New ( "size is missing" ) )
return
}
size , err := strconv . ParseInt ( sizeStr , 10 , 64 )
if err != nil || size < 0 {
s . writeErrorResponse ( w , errInvalidArgument )
return
}
info := globalNotificationSys . NetReadPerfInfo ( size )
ctx := newContext ( r , w , "CollectNetPerfInfo" )
logger . LogIf ( ctx , gob . NewEncoder ( w ) . Encode ( info ) )
w . ( http . Flusher ) . Flush ( )
}
2019-03-14 19:27:31 -04:00
// GetLocksHandler - returns list of older lock from the server.
func ( s * peerRESTServer ) GetLocksHandler ( w http . ResponseWriter , r * http . Request ) {
if ! s . IsValid ( w , r ) {
s . writeErrorResponse ( w , errors . New ( "Invalid request" ) )
return
}
ctx := newContext ( r , w , "GetLocks" )
locks := globalLockServer . ll . DupLockMap ( )
logger . LogIf ( ctx , gob . NewEncoder ( w ) . Encode ( locks ) )
w . ( http . Flusher ) . Flush ( )
}
2019-06-06 20:46:22 -04:00
// DeletePolicyHandler - deletes a policy on the server.
func ( s * peerRESTServer ) DeletePolicyHandler ( w http . ResponseWriter , r * http . Request ) {
if ! s . IsValid ( w , r ) {
s . writeErrorResponse ( w , errors . New ( "Invalid request" ) )
return
}
objAPI := newObjectLayerFn ( )
if objAPI == nil {
s . writeErrorResponse ( w , errServerNotInitialized )
return
}
vars := mux . Vars ( r )
policyName := vars [ peerRESTPolicy ]
if policyName == "" {
s . writeErrorResponse ( w , errors . New ( "policyName is missing" ) )
return
}
if err := globalIAMSys . DeletePolicy ( policyName ) ; err != nil {
s . writeErrorResponse ( w , err )
return
}
w . ( http . Flusher ) . Flush ( )
}
// LoadPolicyHandler - reloads a policy on the server.
func ( s * peerRESTServer ) LoadPolicyHandler ( w http . ResponseWriter , r * http . Request ) {
if ! s . IsValid ( w , r ) {
s . writeErrorResponse ( w , errors . New ( "Invalid request" ) )
return
}
objAPI := newObjectLayerFn ( )
if objAPI == nil {
s . writeErrorResponse ( w , errServerNotInitialized )
return
}
vars := mux . Vars ( r )
policyName := vars [ peerRESTPolicy ]
if policyName == "" {
s . writeErrorResponse ( w , errors . New ( "policyName is missing" ) )
return
}
if err := globalIAMSys . LoadPolicy ( objAPI , policyName ) ; err != nil {
s . writeErrorResponse ( w , err )
return
}
w . ( http . Flusher ) . Flush ( )
}
2019-08-13 16:41:06 -04:00
// LoadPolicyMappingHandler - reloads a policy mapping on the server.
func ( s * peerRESTServer ) LoadPolicyMappingHandler ( w http . ResponseWriter , r * http . Request ) {
if ! s . IsValid ( w , r ) {
s . writeErrorResponse ( w , errors . New ( "Invalid request" ) )
return
}
objAPI := newObjectLayerFn ( )
if objAPI == nil {
s . writeErrorResponse ( w , errServerNotInitialized )
return
}
vars := mux . Vars ( r )
userOrGroup := vars [ peerRESTUserOrGroup ]
if userOrGroup == "" {
s . writeErrorResponse ( w , errors . New ( "user-or-group is missing" ) )
return
}
_ , isGroup := vars [ peerRESTIsGroup ]
if err := globalIAMSys . LoadPolicyMapping ( objAPI , userOrGroup , isGroup ) ; err != nil {
s . writeErrorResponse ( w , err )
return
}
w . ( http . Flusher ) . Flush ( )
}
2019-06-06 20:46:22 -04:00
// DeleteUserHandler - deletes a user on the server.
func ( s * peerRESTServer ) DeleteUserHandler ( w http . ResponseWriter , r * http . Request ) {
if ! s . IsValid ( w , r ) {
s . writeErrorResponse ( w , errors . New ( "Invalid request" ) )
return
}
objAPI := newObjectLayerFn ( )
if objAPI == nil {
s . writeErrorResponse ( w , errServerNotInitialized )
return
}
vars := mux . Vars ( r )
accessKey := vars [ peerRESTUser ]
if accessKey == "" {
s . writeErrorResponse ( w , errors . New ( "username is missing" ) )
return
}
if err := globalIAMSys . DeleteUser ( accessKey ) ; err != nil {
s . writeErrorResponse ( w , err )
return
}
w . ( http . Flusher ) . Flush ( )
}
// LoadUserHandler - reloads a user on the server.
func ( s * peerRESTServer ) LoadUserHandler ( w http . ResponseWriter , r * http . Request ) {
if ! s . IsValid ( w , r ) {
s . writeErrorResponse ( w , errors . New ( "Invalid request" ) )
return
}
objAPI := newObjectLayerFn ( )
if objAPI == nil {
s . writeErrorResponse ( w , errServerNotInitialized )
return
}
vars := mux . Vars ( r )
accessKey := vars [ peerRESTUser ]
if accessKey == "" {
s . writeErrorResponse ( w , errors . New ( "username is missing" ) )
return
}
temp , err := strconv . ParseBool ( vars [ peerRESTUserTemp ] )
if err != nil {
s . writeErrorResponse ( w , err )
return
}
if err = globalIAMSys . LoadUser ( objAPI , accessKey , temp ) ; err != nil {
s . writeErrorResponse ( w , err )
return
}
w . ( http . Flusher ) . Flush ( )
}
// LoadUsersHandler - reloads all users and canned policies.
2019-03-14 19:27:31 -04:00
func ( s * peerRESTServer ) LoadUsersHandler ( w http . ResponseWriter , r * http . Request ) {
if ! s . IsValid ( w , r ) {
s . writeErrorResponse ( w , errors . New ( "Invalid request" ) )
return
}
2019-08-08 18:10:04 -04:00
err := globalIAMSys . Load ( )
2019-03-14 19:27:31 -04:00
if err != nil {
s . writeErrorResponse ( w , err )
return
}
w . ( http . Flusher ) . Flush ( )
}
2019-08-02 17:25:00 -04:00
// LoadGroupHandler - reloads group along with members list.
func ( s * peerRESTServer ) LoadGroupHandler ( w http . ResponseWriter , r * http . Request ) {
if ! s . IsValid ( w , r ) {
s . writeErrorResponse ( w , errors . New ( "Invalid request" ) )
return
}
objAPI := newObjectLayerFn ( )
if objAPI == nil {
s . writeErrorResponse ( w , errServerNotInitialized )
return
}
vars := mux . Vars ( r )
group := vars [ peerRESTGroup ]
err := globalIAMSys . LoadGroup ( objAPI , group )
if err != nil {
s . writeErrorResponse ( w , err )
return
}
w . ( http . Flusher ) . Flush ( )
}
2019-03-14 19:27:31 -04:00
// StartProfilingHandler - Issues the start profiling command.
func ( s * peerRESTServer ) StartProfilingHandler ( w http . ResponseWriter , r * http . Request ) {
if ! s . IsValid ( w , r ) {
s . writeErrorResponse ( w , errors . New ( "Invalid request" ) )
return
}
vars := mux . Vars ( r )
profiler := vars [ peerRESTProfiler ]
if profiler == "" {
s . writeErrorResponse ( w , errors . New ( "profiler name is missing" ) )
return
}
if globalProfiler != nil {
globalProfiler . Stop ( )
}
var err error
globalProfiler , err = startProfiler ( profiler , "" )
if err != nil {
s . writeErrorResponse ( w , err )
return
}
w . ( http . Flusher ) . Flush ( )
}
// ServerInfoHandler - returns server info.
func ( s * peerRESTServer ) ServerInfoHandler ( w http . ResponseWriter , r * http . Request ) {
if ! s . IsValid ( w , r ) {
s . writeErrorResponse ( w , errors . New ( "Invalid request" ) )
return
}
ctx := newContext ( r , w , "ServerInfo" )
info , err := getServerInfo ( )
if err != nil {
s . writeErrorResponse ( w , err )
return
}
defer w . ( http . Flusher ) . Flush ( )
logger . LogIf ( ctx , gob . NewEncoder ( w ) . Encode ( info ) )
}
// DownloadProflingDataHandler - returns proflied data.
func ( s * peerRESTServer ) DownloadProflingDataHandler ( w http . ResponseWriter , r * http . Request ) {
if ! s . IsValid ( w , r ) {
s . writeErrorResponse ( w , errors . New ( "Invalid request" ) )
return
}
ctx := newContext ( r , w , "DownloadProfiling" )
profileData , err := getProfileData ( )
if err != nil {
s . writeErrorResponse ( w , err )
return
}
defer w . ( http . Flusher ) . Flush ( )
logger . LogIf ( ctx , gob . NewEncoder ( w ) . Encode ( profileData ) )
}
// CPULoadInfoHandler - returns CPU Load info.
func ( s * peerRESTServer ) CPULoadInfoHandler ( w http . ResponseWriter , r * http . Request ) {
if ! s . IsValid ( w , r ) {
s . writeErrorResponse ( w , errors . New ( "Invalid request" ) )
return
}
ctx := newContext ( r , w , "CPULoadInfo" )
2019-09-12 14:06:12 -04:00
info := getLocalCPULoad ( globalEndpoints , r )
2019-03-14 19:27:31 -04:00
defer w . ( http . Flusher ) . Flush ( )
logger . LogIf ( ctx , gob . NewEncoder ( w ) . Encode ( info ) )
}
// DrivePerfInfoHandler - returns Drive Performance info.
func ( s * peerRESTServer ) DrivePerfInfoHandler ( w http . ResponseWriter , r * http . Request ) {
if ! s . IsValid ( w , r ) {
s . writeErrorResponse ( w , errors . New ( "Invalid request" ) )
return
}
2019-09-12 17:52:30 -04:00
params := mux . Vars ( r )
sizeStr , found := params [ peerRESTDrivePerfSize ]
if ! found {
s . writeErrorResponse ( w , errors . New ( "size is missing" ) )
return
}
size , err := strconv . ParseInt ( sizeStr , 10 , 64 )
if err != nil || size < 0 {
s . writeErrorResponse ( w , errInvalidArgument )
return
}
2019-03-14 19:27:31 -04:00
ctx := newContext ( r , w , "DrivePerfInfo" )
2019-09-12 17:52:30 -04:00
info := getLocalDrivesPerf ( globalEndpoints , size , r )
2019-03-14 19:27:31 -04:00
defer w . ( http . Flusher ) . Flush ( )
logger . LogIf ( ctx , gob . NewEncoder ( w ) . Encode ( info ) )
}
// MemUsageInfoHandler - returns Memory Usage info.
func ( s * peerRESTServer ) MemUsageInfoHandler ( w http . ResponseWriter , r * http . Request ) {
if ! s . IsValid ( w , r ) {
s . writeErrorResponse ( w , errors . New ( "Invalid request" ) )
return
}
ctx := newContext ( r , w , "MemUsageInfo" )
2019-09-12 14:06:12 -04:00
info := getLocalMemUsage ( globalEndpoints , r )
2019-03-14 19:27:31 -04:00
defer w . ( http . Flusher ) . Flush ( )
logger . LogIf ( ctx , gob . NewEncoder ( w ) . Encode ( info ) )
}
// DeleteBucketHandler - Delete notification and policies related to the bucket.
func ( s * peerRESTServer ) DeleteBucketHandler ( w http . ResponseWriter , r * http . Request ) {
if ! s . IsValid ( w , r ) {
s . writeErrorResponse ( w , errors . New ( "Invalid request" ) )
return
}
vars := mux . Vars ( r )
bucketName := vars [ peerRESTBucket ]
if bucketName == "" {
s . writeErrorResponse ( w , errors . New ( "Bucket name is missing" ) )
return
}
globalNotificationSys . RemoveNotification ( bucketName )
globalPolicySys . Remove ( bucketName )
w . ( http . Flusher ) . Flush ( )
}
// ReloadFormatHandler - Reload Format.
func ( s * peerRESTServer ) ReloadFormatHandler ( w http . ResponseWriter , r * http . Request ) {
if ! s . IsValid ( w , r ) {
s . writeErrorResponse ( w , errors . New ( "Invalid request" ) )
return
}
vars := mux . Vars ( r )
dryRunString := vars [ peerRESTDryRun ]
if dryRunString == "" {
s . writeErrorResponse ( w , errors . New ( "dry run parameter is missing" ) )
return
}
var dryRun bool
switch strings . ToLower ( dryRunString ) {
case "true" :
dryRun = true
case "false" :
dryRun = false
default :
s . writeErrorResponse ( w , errInvalidArgument )
return
}
objAPI := newObjectLayerFn ( )
if objAPI == nil {
s . writeErrorResponse ( w , errServerNotInitialized )
return
}
err := objAPI . ReloadFormat ( context . Background ( ) , dryRun )
if err != nil {
s . writeErrorResponse ( w , err )
return
}
w . ( http . Flusher ) . Flush ( )
}
// RemoveBucketPolicyHandler - Remove bucket policy.
func ( s * peerRESTServer ) RemoveBucketPolicyHandler ( w http . ResponseWriter , r * http . Request ) {
if ! s . IsValid ( w , r ) {
s . writeErrorResponse ( w , errors . New ( "Invalid request" ) )
return
}
vars := mux . Vars ( r )
bucketName := vars [ peerRESTBucket ]
if bucketName == "" {
s . writeErrorResponse ( w , errors . New ( "Bucket name is missing" ) )
return
}
globalPolicySys . Remove ( bucketName )
w . ( http . Flusher ) . Flush ( )
}
// SetBucketPolicyHandler - Set bucket policy.
func ( s * peerRESTServer ) SetBucketPolicyHandler ( w http . ResponseWriter , r * http . Request ) {
if ! s . IsValid ( w , r ) {
s . writeErrorResponse ( w , errors . New ( "Invalid request" ) )
return
}
vars := mux . Vars ( r )
bucketName := vars [ peerRESTBucket ]
if bucketName == "" {
s . writeErrorResponse ( w , errors . New ( "Bucket name is missing" ) )
return
}
var policyData policy . Policy
if r . ContentLength < 0 {
s . writeErrorResponse ( w , errInvalidArgument )
return
}
err := gob . NewDecoder ( r . Body ) . Decode ( & policyData )
if err != nil {
s . writeErrorResponse ( w , err )
return
}
globalPolicySys . Set ( bucketName , policyData )
w . ( http . Flusher ) . Flush ( )
}
2019-07-19 16:20:33 -04:00
// RemoveBucketLifecycleHandler - Remove bucket lifecycle.
func ( s * peerRESTServer ) RemoveBucketLifecycleHandler ( w http . ResponseWriter , r * http . Request ) {
if ! s . IsValid ( w , r ) {
s . writeErrorResponse ( w , errors . New ( "Invalid request" ) )
return
}
vars := mux . Vars ( r )
bucketName := vars [ peerRESTBucket ]
if bucketName == "" {
s . writeErrorResponse ( w , errors . New ( "Bucket name is missing" ) )
return
}
globalLifecycleSys . Remove ( bucketName )
w . ( http . Flusher ) . Flush ( )
}
// SetBucketLifecycleHandler - Set bucket lifecycle.
func ( s * peerRESTServer ) SetBucketLifecycleHandler ( w http . ResponseWriter , r * http . Request ) {
vars := mux . Vars ( r )
bucketName := vars [ peerRESTBucket ]
if bucketName == "" {
s . writeErrorResponse ( w , errors . New ( "Bucket name is missing" ) )
return
}
var lifecycleData lifecycle . Lifecycle
if r . ContentLength < 0 {
s . writeErrorResponse ( w , errInvalidArgument )
return
}
err := gob . NewDecoder ( r . Body ) . Decode ( & lifecycleData )
if err != nil {
s . writeErrorResponse ( w , err )
return
}
globalLifecycleSys . Set ( bucketName , lifecycleData )
w . ( http . Flusher ) . Flush ( )
}
2019-03-14 19:27:31 -04:00
type remoteTargetExistsResp struct {
Exists bool
}
// TargetExistsHandler - Check if Target exists.
func ( s * peerRESTServer ) TargetExistsHandler ( w http . ResponseWriter , r * http . Request ) {
ctx := newContext ( r , w , "TargetExists" )
if ! s . IsValid ( w , r ) {
s . writeErrorResponse ( w , errors . New ( "Invalid request" ) )
return
}
vars := mux . Vars ( r )
bucketName := vars [ peerRESTBucket ]
if bucketName == "" {
s . writeErrorResponse ( w , errors . New ( "Bucket name is missing" ) )
return
}
var targetID event . TargetID
if r . ContentLength <= 0 {
s . writeErrorResponse ( w , errInvalidArgument )
return
}
err := gob . NewDecoder ( r . Body ) . Decode ( & targetID )
if err != nil {
s . writeErrorResponse ( w , err )
return
}
var targetExists remoteTargetExistsResp
targetExists . Exists = globalNotificationSys . RemoteTargetExist ( bucketName , targetID )
defer w . ( http . Flusher ) . Flush ( )
logger . LogIf ( ctx , gob . NewEncoder ( w ) . Encode ( & targetExists ) )
}
type sendEventRequest struct {
Event event . Event
TargetID event . TargetID
}
type sendEventResp struct {
Success bool
}
// SendEventHandler - Send Event.
func ( s * peerRESTServer ) SendEventHandler ( w http . ResponseWriter , r * http . Request ) {
if ! s . IsValid ( w , r ) {
s . writeErrorResponse ( w , errors . New ( "Invalid request" ) )
return
}
ctx := newContext ( r , w , "SendEvent" )
vars := mux . Vars ( r )
bucketName := vars [ peerRESTBucket ]
if bucketName == "" {
s . writeErrorResponse ( w , errors . New ( "Bucket name is missing" ) )
return
}
var eventReq sendEventRequest
if r . ContentLength <= 0 {
s . writeErrorResponse ( w , errInvalidArgument )
return
}
err := gob . NewDecoder ( r . Body ) . Decode ( & eventReq )
if err != nil {
s . writeErrorResponse ( w , err )
return
}
var eventResp sendEventResp
eventResp . Success = true
errs := globalNotificationSys . send ( bucketName , eventReq . Event , eventReq . TargetID )
for i := range errs {
reqInfo := ( & logger . ReqInfo { } ) . AppendTags ( "Event" , eventReq . Event . EventName . String ( ) )
reqInfo . AppendTags ( "targetName" , eventReq . TargetID . Name )
ctx := logger . SetReqInfo ( context . Background ( ) , reqInfo )
logger . LogIf ( ctx , errs [ i ] . Err )
eventResp . Success = false
s . writeErrorResponse ( w , errs [ i ] . Err )
return
}
logger . LogIf ( ctx , gob . NewEncoder ( w ) . Encode ( & eventResp ) )
w . ( http . Flusher ) . Flush ( )
}
// PutBucketNotificationHandler - Set bucket policy.
func ( s * peerRESTServer ) PutBucketNotificationHandler ( w http . ResponseWriter , r * http . Request ) {
if ! s . IsValid ( w , r ) {
s . writeErrorResponse ( w , errors . New ( "Invalid request" ) )
return
}
vars := mux . Vars ( r )
bucketName := vars [ peerRESTBucket ]
if bucketName == "" {
s . writeErrorResponse ( w , errors . New ( "Bucket name is missing" ) )
return
}
var rulesMap event . RulesMap
if r . ContentLength < 0 {
s . writeErrorResponse ( w , errInvalidArgument )
return
}
err := gob . NewDecoder ( r . Body ) . Decode ( & rulesMap )
if err != nil {
s . writeErrorResponse ( w , err )
return
}
globalNotificationSys . AddRulesMap ( bucketName , rulesMap )
w . ( http . Flusher ) . Flush ( )
}
type listenBucketNotificationReq struct {
EventNames [ ] event . Name ` json:"eventNames" `
Pattern string ` json:"pattern" `
TargetID event . TargetID ` json:"targetId" `
Addr xnet . Host ` json:"addr" `
}
// ListenBucketNotificationHandler - Listen bucket notification handler.
func ( s * peerRESTServer ) ListenBucketNotificationHandler ( w http . ResponseWriter , r * http . Request ) {
if ! s . IsValid ( w , r ) {
s . writeErrorResponse ( w , errors . New ( "Invalid request" ) )
return
}
vars := mux . Vars ( r )
bucketName := vars [ peerRESTBucket ]
if bucketName == "" {
s . writeErrorResponse ( w , errors . New ( "Bucket name is missing" ) )
return
}
var args listenBucketNotificationReq
if r . ContentLength <= 0 {
s . writeErrorResponse ( w , errInvalidArgument )
return
}
err := gob . NewDecoder ( r . Body ) . Decode ( & args )
if err != nil {
s . writeErrorResponse ( w , err )
return
}
restClient , err := newPeerRESTClient ( & args . Addr )
if err != nil {
s . writeErrorResponse ( w , fmt . Errorf ( "unable to find PeerRESTClient for provided address %v. This happens only if remote and this minio run with different set of endpoints" , args . Addr ) )
return
}
target := NewPeerRESTClientTarget ( bucketName , args . TargetID , restClient )
rulesMap := event . NewRulesMap ( args . EventNames , args . Pattern , target . ID ( ) )
if err := globalNotificationSys . AddRemoteTarget ( bucketName , target , rulesMap ) ; err != nil {
reqInfo := & logger . ReqInfo { BucketName : target . bucketName }
reqInfo . AppendTags ( "target" , target . id . Name )
ctx := logger . SetReqInfo ( context . Background ( ) , reqInfo )
logger . LogIf ( ctx , err )
s . writeErrorResponse ( w , err )
return
}
w . ( http . Flusher ) . Flush ( )
}
2019-08-28 18:04:43 -04:00
// ServerUpdateHandler - updates the current server.
func ( s * peerRESTServer ) ServerUpdateHandler ( w http . ResponseWriter , r * http . Request ) {
if ! s . IsValid ( w , r ) {
s . writeErrorResponse ( w , errors . New ( "Invalid request" ) )
return
}
vars := mux . Vars ( r )
updateURL := vars [ peerRESTUpdateURL ]
sha256Hex := vars [ peerRESTSha256Hex ]
var latestReleaseTime time . Time
var err error
if latestRelease := vars [ peerRESTLatestRelease ] ; latestRelease != "" {
latestReleaseTime , err = time . Parse ( latestRelease , time . RFC3339 )
if err != nil {
s . writeErrorResponse ( w , err )
return
}
}
us , err := updateServer ( updateURL , sha256Hex , latestReleaseTime )
if err != nil {
s . writeErrorResponse ( w , err )
return
}
if us . CurrentVersion != us . UpdatedVersion {
globalServiceSignalCh <- serviceRestart
}
}
2019-03-14 19:27:31 -04:00
var errUnsupportedSignal = fmt . Errorf ( "unsupported signal: only restart and stop signals are supported" )
// SignalServiceHandler - signal service handler.
func ( s * peerRESTServer ) SignalServiceHandler ( w http . ResponseWriter , r * http . Request ) {
if ! s . IsValid ( w , r ) {
s . writeErrorResponse ( w , errors . New ( "Invalid request" ) )
return
}
vars := mux . Vars ( r )
signalString := vars [ peerRESTSignal ]
if signalString == "" {
s . writeErrorResponse ( w , errors . New ( "signal name is missing" ) )
return
}
2019-08-27 14:37:47 -04:00
si , err := strconv . Atoi ( signalString )
if err != nil {
s . writeErrorResponse ( w , err )
return
}
signal := serviceSignal ( si )
2019-03-14 19:27:31 -04:00
defer w . ( http . Flusher ) . Flush ( )
2019-08-28 18:04:43 -04:00
switch signal {
case serviceRestart :
globalServiceSignalCh <- signal
case serviceStop :
2019-03-14 19:27:31 -04:00
globalServiceSignalCh <- signal
default :
s . writeErrorResponse ( w , errUnsupportedSignal )
return
}
}
2019-06-08 18:54:41 -04:00
// TraceHandler sends http trace messages back to peer rest client
func ( s * peerRESTServer ) TraceHandler ( w http . ResponseWriter , r * http . Request ) {
if ! s . IsValid ( w , r ) {
s . writeErrorResponse ( w , errors . New ( "Invalid request" ) )
return
}
trcAll := r . URL . Query ( ) . Get ( peerRESTTraceAll ) == "true"
2019-07-19 20:38:26 -04:00
trcErr := r . URL . Query ( ) . Get ( peerRESTTraceErr ) == "true"
2019-06-08 18:54:41 -04:00
w . WriteHeader ( http . StatusOK )
w . ( http . Flusher ) . Flush ( )
2019-06-27 01:41:12 -04:00
doneCh := make ( chan struct { } )
defer close ( doneCh )
// Trace Publisher uses nonblocking publish and hence does not wait for slow subscribers.
// Use buffered channel to take care of burst sends or slow w.Write()
ch := make ( chan interface { } , 2000 )
2019-07-31 14:08:39 -04:00
globalHTTPTrace . Subscribe ( ch , doneCh , func ( entry interface { } ) bool {
return mustTrace ( entry , trcAll , trcErr )
} )
keepAliveTicker := time . NewTicker ( 500 * time . Millisecond )
defer keepAliveTicker . Stop ( )
2019-06-27 01:41:12 -04:00
enc := gob . NewEncoder ( w )
2019-06-08 18:54:41 -04:00
for {
select {
case entry := <- ch :
2019-06-27 01:41:12 -04:00
if err := enc . Encode ( entry ) ; err != nil {
2019-06-08 18:54:41 -04:00
return
}
w . ( http . Flusher ) . Flush ( )
2019-07-31 14:08:39 -04:00
case <- keepAliveTicker . C :
if err := enc . Encode ( & trace . Info { } ) ; err != nil {
return
}
w . ( http . Flusher ) . Flush ( )
2019-06-08 18:54:41 -04:00
}
}
}
2019-06-25 19:42:24 -04:00
func ( s * peerRESTServer ) BackgroundHealStatusHandler ( w http . ResponseWriter , r * http . Request ) {
if ! s . IsValid ( w , r ) {
s . writeErrorResponse ( w , errors . New ( "invalid request" ) )
return
}
ctx := newContext ( r , w , "BackgroundHealStatus" )
state := getLocalBackgroundHealStatus ( )
defer w . ( http . Flusher ) . Flush ( )
logger . LogIf ( ctx , gob . NewEncoder ( w ) . Encode ( state ) )
}
2019-08-09 13:02:41 -04:00
func ( s * peerRESTServer ) BackgroundOpsStatusHandler ( w http . ResponseWriter , r * http . Request ) {
if ! s . IsValid ( w , r ) {
s . writeErrorResponse ( w , errors . New ( "invalid request" ) )
return
}
ctx := newContext ( r , w , "BackgroundOpsStatus" )
state := BgOpsStatus {
LifecycleOps : getLocalBgLifecycleOpsStatus ( ) ,
}
defer w . ( http . Flusher ) . Flush ( )
logger . LogIf ( ctx , gob . NewEncoder ( w ) . Encode ( state ) )
}
2019-09-03 14:10:48 -04:00
// ConsoleLogHandler sends console logs of this node back to peer rest client
func ( s * peerRESTServer ) ConsoleLogHandler ( w http . ResponseWriter , r * http . Request ) {
if ! s . IsValid ( w , r ) {
s . writeErrorResponse ( w , errors . New ( "Invalid request" ) )
return
}
w . Header ( ) . Set ( "Connection" , "close" )
w . WriteHeader ( http . StatusOK )
w . ( http . Flusher ) . Flush ( )
doneCh := make ( chan struct { } )
defer close ( doneCh )
ch := make ( chan interface { } , 2000 )
globalConsoleSys . Subscribe ( ch , doneCh , "" , 0 , nil )
enc := gob . NewEncoder ( w )
for {
select {
case entry := <- ch :
log := entry . ( madmin . LogInfo )
if err := enc . Encode ( log ) ; err != nil {
return
}
w . ( http . Flusher ) . Flush ( )
case <- r . Context ( ) . Done ( ) :
return
}
}
}
2019-03-14 19:27:31 -04:00
func ( s * peerRESTServer ) writeErrorResponse ( w http . ResponseWriter , err error ) {
w . WriteHeader ( http . StatusForbidden )
w . Write ( [ ] byte ( err . Error ( ) ) )
}
// IsValid - To authenticate and verify the time difference.
func ( s * peerRESTServer ) IsValid ( w http . ResponseWriter , r * http . Request ) bool {
if err := storageServerRequestValidate ( r ) ; err != nil {
s . writeErrorResponse ( w , err )
return false
}
return true
}
// registerPeerRESTHandlers - register peer rest router.
func registerPeerRESTHandlers ( router * mux . Router ) {
server := & peerRESTServer { }
subrouter := router . PathPrefix ( peerRESTPath ) . Subrouter ( )
2019-08-30 22:57:53 -04:00
subrouter . Methods ( http . MethodPost ) . Path ( SlashSeparator + peerRESTMethodNetReadPerfInfo ) . HandlerFunc ( httpTraceHdrs ( server . NetReadPerfInfoHandler ) ) . Queries ( restQueries ( peerRESTNetPerfSize ) ... )
subrouter . Methods ( http . MethodPost ) . Path ( SlashSeparator + peerRESTMethodCollectNetPerfInfo ) . HandlerFunc ( httpTraceHdrs ( server . CollectNetPerfInfoHandler ) ) . Queries ( restQueries ( peerRESTNetPerfSize ) ... )
2019-08-06 15:08:58 -04:00
subrouter . Methods ( http . MethodPost ) . Path ( SlashSeparator + peerRESTMethodGetLocks ) . HandlerFunc ( httpTraceHdrs ( server . GetLocksHandler ) )
subrouter . Methods ( http . MethodPost ) . Path ( SlashSeparator + peerRESTMethodServerInfo ) . HandlerFunc ( httpTraceHdrs ( server . ServerInfoHandler ) )
subrouter . Methods ( http . MethodPost ) . Path ( SlashSeparator + peerRESTMethodCPULoadInfo ) . HandlerFunc ( httpTraceHdrs ( server . CPULoadInfoHandler ) )
subrouter . Methods ( http . MethodPost ) . Path ( SlashSeparator + peerRESTMethodMemUsageInfo ) . HandlerFunc ( httpTraceHdrs ( server . MemUsageInfoHandler ) )
2019-09-12 17:52:30 -04:00
subrouter . Methods ( http . MethodPost ) . Path ( SlashSeparator + peerRESTMethodDrivePerfInfo ) . HandlerFunc ( httpTraceHdrs ( server . DrivePerfInfoHandler ) ) . Queries ( restQueries ( peerRESTDrivePerfSize ) ... )
2019-08-06 15:08:58 -04:00
subrouter . Methods ( http . MethodPost ) . Path ( SlashSeparator + peerRESTMethodDeleteBucket ) . HandlerFunc ( httpTraceHdrs ( server . DeleteBucketHandler ) ) . Queries ( restQueries ( peerRESTBucket ) ... )
subrouter . Methods ( http . MethodPost ) . Path ( SlashSeparator + peerRESTMethodSignalService ) . HandlerFunc ( httpTraceHdrs ( server . SignalServiceHandler ) ) . Queries ( restQueries ( peerRESTSignal ) ... )
2019-08-28 18:04:43 -04:00
subrouter . Methods ( http . MethodPost ) . Path ( SlashSeparator + peerRESTMethodServerUpdate ) . HandlerFunc ( httpTraceHdrs ( server . ServerUpdateHandler ) ) . Queries ( restQueries ( peerRESTUpdateURL , peerRESTSha256Hex , peerRESTLatestRelease ) ... )
2019-08-06 15:08:58 -04:00
subrouter . Methods ( http . MethodPost ) . Path ( SlashSeparator + peerRESTMethodBucketPolicyRemove ) . HandlerFunc ( httpTraceAll ( server . RemoveBucketPolicyHandler ) ) . Queries ( restQueries ( peerRESTBucket ) ... )
subrouter . Methods ( http . MethodPost ) . Path ( SlashSeparator + peerRESTMethodBucketPolicySet ) . HandlerFunc ( httpTraceHdrs ( server . SetBucketPolicyHandler ) ) . Queries ( restQueries ( peerRESTBucket ) ... )
2019-08-28 21:37:43 -04:00
subrouter . Methods ( http . MethodPost ) . Path ( SlashSeparator + peerRESTMethodDeletePolicy ) . HandlerFunc ( httpTraceAll ( server . DeletePolicyHandler ) ) . Queries ( restQueries ( peerRESTPolicy ) ... )
2019-08-06 15:08:58 -04:00
subrouter . Methods ( http . MethodPost ) . Path ( SlashSeparator + peerRESTMethodLoadPolicy ) . HandlerFunc ( httpTraceAll ( server . LoadPolicyHandler ) ) . Queries ( restQueries ( peerRESTPolicy ) ... )
2019-08-13 16:41:06 -04:00
subrouter . Methods ( http . MethodPost ) . Path ( SlashSeparator + peerRESTMethodLoadPolicyMapping ) . HandlerFunc ( httpTraceAll ( server . LoadPolicyMappingHandler ) ) . Queries ( restQueries ( peerRESTUserOrGroup ) ... )
2019-08-06 15:08:58 -04:00
subrouter . Methods ( http . MethodPost ) . Path ( SlashSeparator + peerRESTMethodDeleteUser ) . HandlerFunc ( httpTraceAll ( server . LoadUserHandler ) ) . Queries ( restQueries ( peerRESTUser ) ... )
subrouter . Methods ( http . MethodPost ) . Path ( SlashSeparator + peerRESTMethodLoadUser ) . HandlerFunc ( httpTraceAll ( server . LoadUserHandler ) ) . Queries ( restQueries ( peerRESTUser , peerRESTUserTemp ) ... )
subrouter . Methods ( http . MethodPost ) . Path ( SlashSeparator + peerRESTMethodLoadUsers ) . HandlerFunc ( httpTraceAll ( server . LoadUsersHandler ) )
subrouter . Methods ( http . MethodPost ) . Path ( SlashSeparator + peerRESTMethodLoadGroup ) . HandlerFunc ( httpTraceAll ( server . LoadGroupHandler ) ) . Queries ( restQueries ( peerRESTGroup ) ... )
subrouter . Methods ( http . MethodPost ) . Path ( SlashSeparator + peerRESTMethodStartProfiling ) . HandlerFunc ( httpTraceAll ( server . StartProfilingHandler ) ) . Queries ( restQueries ( peerRESTProfiler ) ... )
subrouter . Methods ( http . MethodPost ) . Path ( SlashSeparator + peerRESTMethodDownloadProfilingData ) . HandlerFunc ( httpTraceHdrs ( server . DownloadProflingDataHandler ) )
subrouter . Methods ( http . MethodPost ) . Path ( SlashSeparator + peerRESTMethodTargetExists ) . HandlerFunc ( httpTraceHdrs ( server . TargetExistsHandler ) ) . Queries ( restQueries ( peerRESTBucket ) ... )
subrouter . Methods ( http . MethodPost ) . Path ( SlashSeparator + peerRESTMethodSendEvent ) . HandlerFunc ( httpTraceHdrs ( server . SendEventHandler ) ) . Queries ( restQueries ( peerRESTBucket ) ... )
subrouter . Methods ( http . MethodPost ) . Path ( SlashSeparator + peerRESTMethodBucketNotificationPut ) . HandlerFunc ( httpTraceHdrs ( server . PutBucketNotificationHandler ) ) . Queries ( restQueries ( peerRESTBucket ) ... )
subrouter . Methods ( http . MethodPost ) . Path ( SlashSeparator + peerRESTMethodBucketNotificationListen ) . HandlerFunc ( httpTraceHdrs ( server . ListenBucketNotificationHandler ) ) . Queries ( restQueries ( peerRESTBucket ) ... )
subrouter . Methods ( http . MethodPost ) . Path ( SlashSeparator + peerRESTMethodReloadFormat ) . HandlerFunc ( httpTraceHdrs ( server . ReloadFormatHandler ) ) . Queries ( restQueries ( peerRESTDryRun ) ... )
subrouter . Methods ( http . MethodPost ) . Path ( SlashSeparator + peerRESTMethodBucketLifecycleSet ) . HandlerFunc ( httpTraceHdrs ( server . SetBucketLifecycleHandler ) ) . Queries ( restQueries ( peerRESTBucket ) ... )
subrouter . Methods ( http . MethodPost ) . Path ( SlashSeparator + peerRESTMethodBucketLifecycleRemove ) . HandlerFunc ( httpTraceHdrs ( server . RemoveBucketLifecycleHandler ) ) . Queries ( restQueries ( peerRESTBucket ) ... )
2019-08-09 13:02:41 -04:00
subrouter . Methods ( http . MethodPost ) . Path ( SlashSeparator + peerRESTMethodBackgroundOpsStatus ) . HandlerFunc ( server . BackgroundOpsStatusHandler )
2019-08-06 15:08:58 -04:00
subrouter . Methods ( http . MethodPost ) . Path ( SlashSeparator + peerRESTMethodTrace ) . HandlerFunc ( server . TraceHandler )
subrouter . Methods ( http . MethodPost ) . Path ( SlashSeparator + peerRESTMethodBackgroundHealStatus ) . HandlerFunc ( server . BackgroundHealStatusHandler )
2019-09-03 14:10:48 -04:00
subrouter . Methods ( http . MethodPost ) . Path ( SlashSeparator + peerRESTMethodLog ) . HandlerFunc ( server . ConsoleLogHandler )
2019-06-08 18:54:41 -04:00
2019-03-14 19:27:31 -04:00
router . NotFoundHandler = http . HandlerFunc ( httpTraceAll ( notFoundHandler ) )
}