2021-04-18 15:41:13 -04:00
|
|
|
// Copyright (c) 2015-2021 MinIO, Inc.
|
|
|
|
//
|
|
|
|
// This file is part of MinIO Object Storage stack
|
|
|
|
//
|
|
|
|
// This program is free software: you can redistribute it and/or modify
|
|
|
|
// it under the terms of the GNU Affero General Public License as published by
|
|
|
|
// the Free Software Foundation, either version 3 of the License, or
|
|
|
|
// (at your option) any later version.
|
|
|
|
//
|
|
|
|
// This program is distributed in the hope that it will be useful
|
|
|
|
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
// GNU Affero General Public License for more details.
|
|
|
|
//
|
|
|
|
// You should have received a copy of the GNU Affero General Public License
|
|
|
|
// along with this program. If not, see <http://www.gnu.org/licenses/>.
|
2018-07-19 18:55:06 -04:00
|
|
|
|
2018-11-19 17:47:03 -05:00
|
|
|
package http
|
2018-07-19 18:55:06 -04:00
|
|
|
|
|
|
|
import (
|
|
|
|
"bytes"
|
2020-08-16 13:25:00 -04:00
|
|
|
"context"
|
2018-07-19 18:55:06 -04:00
|
|
|
"encoding/json"
|
|
|
|
"errors"
|
2020-08-16 13:25:00 -04:00
|
|
|
"fmt"
|
2023-03-21 13:50:40 -04:00
|
|
|
"math"
|
2019-07-03 01:34:32 -04:00
|
|
|
"net/http"
|
2023-02-22 00:19:46 -05:00
|
|
|
"net/url"
|
2019-10-11 21:50:54 -04:00
|
|
|
"strings"
|
2022-02-17 14:11:15 -05:00
|
|
|
"sync"
|
2022-11-10 13:20:21 -05:00
|
|
|
"sync/atomic"
|
2020-08-16 13:25:00 -04:00
|
|
|
"time"
|
2019-02-06 15:07:03 -05:00
|
|
|
|
2021-06-01 17:59:40 -04:00
|
|
|
xhttp "github.com/minio/minio/internal/http"
|
2022-02-24 12:05:33 -05:00
|
|
|
"github.com/minio/minio/internal/logger/target/types"
|
2018-07-19 18:55:06 -04:00
|
|
|
)
|
|
|
|
|
2022-11-10 13:20:21 -05:00
|
|
|
const (
|
|
|
|
// Timeout for the webhook http call
|
|
|
|
webhookCallTimeout = 5 * time.Second
|
|
|
|
|
|
|
|
// maxWorkers is the maximum number of concurrent operations.
|
2023-03-21 13:50:40 -04:00
|
|
|
maxWorkers = 16
|
|
|
|
)
|
|
|
|
|
|
|
|
const (
|
|
|
|
statusOffline = iota
|
|
|
|
statusOnline
|
|
|
|
statusClosed
|
2022-11-10 13:20:21 -05:00
|
|
|
)
|
2021-05-27 12:54:10 -04:00
|
|
|
|
2021-07-13 12:39:13 -04:00
|
|
|
// Config http logger target
|
|
|
|
type Config struct {
|
|
|
|
Enabled bool `json:"enabled"`
|
|
|
|
Name string `json:"name"`
|
|
|
|
UserAgent string `json:"userAgent"`
|
|
|
|
Endpoint string `json:"endpoint"`
|
|
|
|
AuthToken string `json:"authToken"`
|
|
|
|
ClientCert string `json:"clientCert"`
|
|
|
|
ClientKey string `json:"clientKey"`
|
2021-12-20 16:16:53 -05:00
|
|
|
QueueSize int `json:"queueSize"`
|
2023-02-22 00:19:46 -05:00
|
|
|
Proxy string `json:"string"`
|
2021-07-13 12:39:13 -04:00
|
|
|
Transport http.RoundTripper `json:"-"`
|
|
|
|
|
|
|
|
// Custom logger
|
2022-07-27 12:44:59 -04:00
|
|
|
LogOnce func(ctx context.Context, err error, id string, errKind ...interface{}) `json:"-"`
|
2021-07-13 12:39:13 -04:00
|
|
|
}
|
|
|
|
|
2018-11-19 17:47:03 -05:00
|
|
|
// Target implements logger.Target and sends the json
|
2018-07-19 18:55:06 -04:00
|
|
|
// format of a log entry to the configured http endpoint.
|
|
|
|
// An internal buffer of logs is maintained but when the
|
|
|
|
// buffer is full, new logs are just ignored and an error
|
|
|
|
// is returned to the caller.
|
2018-11-19 17:47:03 -05:00
|
|
|
type Target struct {
|
2022-11-10 13:20:21 -05:00
|
|
|
totalMessages int64
|
|
|
|
failedMessages int64
|
2023-03-21 13:50:40 -04:00
|
|
|
status int32
|
2022-11-10 13:20:21 -05:00
|
|
|
|
|
|
|
// Worker control
|
|
|
|
workers int64
|
|
|
|
workerStartMu sync.Mutex
|
|
|
|
lastStarted time.Time
|
|
|
|
|
2023-03-21 13:50:40 -04:00
|
|
|
wg sync.WaitGroup
|
2022-02-17 14:11:15 -05:00
|
|
|
|
2023-03-21 13:50:40 -04:00
|
|
|
// Channel of log entries.
|
|
|
|
// Reading logCh must hold read lock on logChMu (to avoid read race)
|
|
|
|
// Sending a value on logCh must hold read lock on logChMu (to avoid closing)
|
|
|
|
logCh chan interface{}
|
|
|
|
logChMu sync.RWMutex
|
2018-10-12 15:25:59 -04:00
|
|
|
|
2023-03-21 13:50:40 -04:00
|
|
|
// If the first init fails, this starts a goroutine that
|
|
|
|
// will attempt to establish the connection.
|
|
|
|
revive sync.Once
|
2022-11-28 11:03:26 -05:00
|
|
|
|
2021-07-13 12:39:13 -04:00
|
|
|
config Config
|
2022-11-10 13:20:21 -05:00
|
|
|
client *http.Client
|
2018-07-19 18:55:06 -04:00
|
|
|
}
|
|
|
|
|
2020-10-02 19:19:44 -04:00
|
|
|
// Endpoint returns the backend endpoint
|
|
|
|
func (h *Target) Endpoint() string {
|
2021-07-13 12:39:13 -04:00
|
|
|
return h.config.Endpoint
|
2020-10-02 19:19:44 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
func (h *Target) String() string {
|
2021-07-13 12:39:13 -04:00
|
|
|
return h.config.Name
|
2020-10-02 19:19:44 -04:00
|
|
|
}
|
|
|
|
|
2022-11-28 11:03:26 -05:00
|
|
|
// IsOnline returns true if the initialization was successful
|
|
|
|
func (h *Target) IsOnline() bool {
|
2023-03-21 13:50:40 -04:00
|
|
|
return atomic.LoadInt32(&h.status) == statusOnline
|
2022-11-28 11:03:26 -05:00
|
|
|
}
|
|
|
|
|
2022-11-10 13:20:21 -05:00
|
|
|
// Stats returns the target statistics.
|
|
|
|
func (h *Target) Stats() types.TargetStats {
|
2023-03-21 13:50:40 -04:00
|
|
|
h.logChMu.RLock()
|
|
|
|
logCh := h.logCh
|
|
|
|
h.logChMu.RUnlock()
|
|
|
|
stats := types.TargetStats{
|
2022-11-10 13:20:21 -05:00
|
|
|
TotalMessages: atomic.LoadInt64(&h.totalMessages),
|
|
|
|
FailedMessages: atomic.LoadInt64(&h.failedMessages),
|
2023-03-21 13:50:40 -04:00
|
|
|
QueueLength: len(logCh),
|
2022-11-10 13:20:21 -05:00
|
|
|
}
|
2023-03-21 13:50:40 -04:00
|
|
|
|
|
|
|
return stats
|
2022-11-10 13:20:21 -05:00
|
|
|
}
|
|
|
|
|
2021-07-13 12:39:13 -04:00
|
|
|
// Init validate and initialize the http target
|
2023-03-21 13:50:40 -04:00
|
|
|
func (h *Target) Init() (err error) {
|
|
|
|
switch atomic.LoadInt32(&h.status) {
|
|
|
|
case statusOnline:
|
|
|
|
return nil
|
|
|
|
case statusClosed:
|
|
|
|
return errors.New("target is closed")
|
2020-08-16 13:25:00 -04:00
|
|
|
}
|
|
|
|
|
2023-03-21 13:50:40 -04:00
|
|
|
// This will check if we can reach the remote.
|
|
|
|
checkAlive := func() error {
|
|
|
|
ctx, cancel := context.WithTimeout(context.Background(), 2*webhookCallTimeout)
|
|
|
|
defer cancel()
|
2020-08-16 13:25:00 -04:00
|
|
|
|
2023-03-21 13:50:40 -04:00
|
|
|
req, err := http.NewRequestWithContext(ctx, http.MethodPost, h.config.Endpoint, strings.NewReader(`{}`))
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2020-08-16 13:25:00 -04:00
|
|
|
|
2023-03-21 13:50:40 -04:00
|
|
|
req.Header.Set(xhttp.ContentType, "application/json")
|
2020-08-16 13:25:00 -04:00
|
|
|
|
2023-03-21 13:50:40 -04:00
|
|
|
// Set user-agent to indicate MinIO release
|
|
|
|
// version to the configured log endpoint
|
|
|
|
req.Header.Set("User-Agent", h.config.UserAgent)
|
2023-02-22 00:19:46 -05:00
|
|
|
|
2023-03-21 13:50:40 -04:00
|
|
|
if h.config.AuthToken != "" {
|
|
|
|
req.Header.Set("Authorization", h.config.AuthToken)
|
|
|
|
}
|
2020-08-16 13:25:00 -04:00
|
|
|
|
2023-03-21 13:50:40 -04:00
|
|
|
resp, err := h.client.Do(req)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
// Drain any response.
|
|
|
|
xhttp.DrainBody(resp.Body)
|
2020-08-16 13:25:00 -04:00
|
|
|
|
2023-03-21 13:50:40 -04:00
|
|
|
if !acceptedResponseStatusCode(resp.StatusCode) {
|
|
|
|
if resp.StatusCode == http.StatusForbidden {
|
|
|
|
return fmt.Errorf("%s returned '%s', please check if your auth token is correctly set",
|
|
|
|
h.config.Endpoint, resp.Status)
|
|
|
|
}
|
|
|
|
return fmt.Errorf("%s returned '%s', please check your endpoint configuration",
|
2021-07-13 12:39:13 -04:00
|
|
|
h.config.Endpoint, resp.Status)
|
2020-08-16 13:25:00 -04:00
|
|
|
}
|
2023-03-21 13:50:40 -04:00
|
|
|
return nil
|
2020-08-16 13:25:00 -04:00
|
|
|
}
|
|
|
|
|
2023-03-21 13:50:40 -04:00
|
|
|
err = checkAlive()
|
|
|
|
if err != nil {
|
|
|
|
// Start a goroutine that will continue to check if we can reach
|
|
|
|
h.revive.Do(func() {
|
|
|
|
go func() {
|
|
|
|
t := time.NewTicker(time.Second)
|
|
|
|
defer t.Stop()
|
|
|
|
for range t.C {
|
|
|
|
if atomic.LoadInt32(&h.status) != statusOffline {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
if err := checkAlive(); err == nil {
|
|
|
|
// We are online.
|
|
|
|
if atomic.CompareAndSwapInt32(&h.status, statusOffline, statusOnline) {
|
|
|
|
h.workerStartMu.Lock()
|
|
|
|
h.lastStarted = time.Now()
|
|
|
|
h.workerStartMu.Unlock()
|
|
|
|
atomic.AddInt64(&h.workers, 1)
|
|
|
|
go h.startHTTPLogger()
|
|
|
|
}
|
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}()
|
|
|
|
})
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
if atomic.CompareAndSwapInt32(&h.status, statusOffline, statusOnline) {
|
|
|
|
h.workerStartMu.Lock()
|
|
|
|
h.lastStarted = time.Now()
|
|
|
|
h.workerStartMu.Unlock()
|
2023-04-27 13:51:16 -04:00
|
|
|
atomic.AddInt64(&h.workers, 1)
|
2023-03-21 13:50:40 -04:00
|
|
|
go h.startHTTPLogger()
|
|
|
|
}
|
2020-08-16 13:25:00 -04:00
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2021-09-10 17:27:37 -04:00
|
|
|
// Accepted HTTP Status Codes
|
|
|
|
var acceptedStatusCodeMap = map[int]bool{http.StatusOK: true, http.StatusCreated: true, http.StatusAccepted: true, http.StatusNoContent: true}
|
|
|
|
|
|
|
|
func acceptedResponseStatusCode(code int) bool {
|
|
|
|
return acceptedStatusCodeMap[code]
|
|
|
|
}
|
|
|
|
|
2022-02-17 14:11:15 -05:00
|
|
|
func (h *Target) logEntry(entry interface{}) {
|
|
|
|
logJSON, err := json.Marshal(&entry)
|
|
|
|
if err != nil {
|
2022-11-10 13:20:21 -05:00
|
|
|
atomic.AddInt64(&h.failedMessages, 1)
|
2022-02-17 14:11:15 -05:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2023-03-21 13:50:40 -04:00
|
|
|
tries := 0
|
|
|
|
for {
|
|
|
|
if tries > 0 {
|
|
|
|
if tries >= 10 || atomic.LoadInt32(&h.status) == statusClosed {
|
|
|
|
// Don't retry when closing...
|
|
|
|
return
|
|
|
|
}
|
|
|
|
// sleep = (tries+2) ^ 2 milliseconds.
|
|
|
|
sleep := time.Duration(math.Pow(float64(tries+2), 2)) * time.Millisecond
|
|
|
|
if sleep > time.Second {
|
|
|
|
sleep = time.Second
|
|
|
|
}
|
|
|
|
time.Sleep(sleep)
|
|
|
|
}
|
|
|
|
tries++
|
|
|
|
ctx, cancel := context.WithTimeout(context.Background(), webhookCallTimeout)
|
|
|
|
defer cancel()
|
|
|
|
req, err := http.NewRequestWithContext(ctx, http.MethodPost,
|
|
|
|
h.config.Endpoint, bytes.NewReader(logJSON))
|
|
|
|
if err != nil {
|
|
|
|
h.config.LogOnce(ctx, fmt.Errorf("%s returned '%w', please check your endpoint configuration", h.config.Endpoint, err), h.config.Endpoint)
|
|
|
|
atomic.AddInt64(&h.failedMessages, 1)
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
req.Header.Set(xhttp.ContentType, "application/json")
|
|
|
|
req.Header.Set(xhttp.MinIOVersion, xhttp.GlobalMinIOVersion)
|
|
|
|
req.Header.Set(xhttp.MinioDeploymentID, xhttp.GlobalDeploymentID)
|
2022-02-17 14:11:15 -05:00
|
|
|
|
2023-03-21 13:50:40 -04:00
|
|
|
// Set user-agent to indicate MinIO release
|
|
|
|
// version to the configured log endpoint
|
|
|
|
req.Header.Set("User-Agent", h.config.UserAgent)
|
2022-02-17 14:11:15 -05:00
|
|
|
|
2023-03-21 13:50:40 -04:00
|
|
|
if h.config.AuthToken != "" {
|
|
|
|
req.Header.Set("Authorization", h.config.AuthToken)
|
|
|
|
}
|
2022-02-17 14:11:15 -05:00
|
|
|
|
2023-03-21 13:50:40 -04:00
|
|
|
resp, err := h.client.Do(req)
|
|
|
|
if err != nil {
|
|
|
|
atomic.AddInt64(&h.failedMessages, 1)
|
|
|
|
h.config.LogOnce(ctx, fmt.Errorf("%s returned '%w', please check your endpoint configuration", h.config.Endpoint, err), h.config.Endpoint)
|
|
|
|
continue
|
|
|
|
}
|
2022-02-17 14:11:15 -05:00
|
|
|
|
2023-03-21 13:50:40 -04:00
|
|
|
// Drain any response.
|
|
|
|
xhttp.DrainBody(resp.Body)
|
2022-02-17 14:11:15 -05:00
|
|
|
|
2023-03-21 13:50:40 -04:00
|
|
|
if acceptedResponseStatusCode(resp.StatusCode) {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
// Log failure, retry
|
2022-11-10 13:20:21 -05:00
|
|
|
atomic.AddInt64(&h.failedMessages, 1)
|
2022-02-17 14:11:15 -05:00
|
|
|
switch resp.StatusCode {
|
|
|
|
case http.StatusForbidden:
|
|
|
|
h.config.LogOnce(ctx, fmt.Errorf("%s returned '%s', please check if your auth token is correctly set", h.config.Endpoint, resp.Status), h.config.Endpoint)
|
|
|
|
default:
|
|
|
|
h.config.LogOnce(ctx, fmt.Errorf("%s returned '%s', please check your endpoint configuration", h.config.Endpoint, resp.Status), h.config.Endpoint)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-11-19 17:47:03 -05:00
|
|
|
func (h *Target) startHTTPLogger() {
|
2023-03-21 13:50:40 -04:00
|
|
|
h.logChMu.RLock()
|
|
|
|
logCh := h.logCh
|
|
|
|
if logCh != nil {
|
|
|
|
// We are not allowed to add when logCh is nil
|
|
|
|
h.wg.Add(1)
|
|
|
|
defer h.wg.Done()
|
|
|
|
}
|
|
|
|
h.logChMu.RUnlock()
|
|
|
|
|
|
|
|
defer atomic.AddInt64(&h.workers, -1)
|
|
|
|
|
|
|
|
if logCh == nil {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
// Send messages until channel is closed.
|
|
|
|
for entry := range logCh {
|
|
|
|
atomic.AddInt64(&h.totalMessages, 1)
|
|
|
|
h.logEntry(entry)
|
|
|
|
}
|
2018-07-19 18:55:06 -04:00
|
|
|
}
|
|
|
|
|
2018-11-19 17:47:03 -05:00
|
|
|
// New initializes a new logger target which
|
2018-07-19 18:55:06 -04:00
|
|
|
// sends log over http to the specified endpoint
|
2021-07-13 12:39:13 -04:00
|
|
|
func New(config Config) *Target {
|
2020-04-01 23:53:07 -04:00
|
|
|
h := &Target{
|
2021-12-20 16:16:53 -05:00
|
|
|
logCh: make(chan interface{}, config.QueueSize),
|
2021-07-13 12:39:13 -04:00
|
|
|
config: config,
|
2023-03-21 13:50:40 -04:00
|
|
|
status: statusOffline,
|
|
|
|
}
|
|
|
|
|
|
|
|
// If proxy available, set the same
|
|
|
|
if h.config.Proxy != "" {
|
|
|
|
proxyURL, _ := url.Parse(h.config.Proxy)
|
|
|
|
transport := h.config.Transport
|
|
|
|
ctransport := transport.(*http.Transport).Clone()
|
|
|
|
ctransport.Proxy = http.ProxyURL(proxyURL)
|
|
|
|
h.config.Transport = ctransport
|
2020-04-01 23:53:07 -04:00
|
|
|
}
|
2023-03-21 13:50:40 -04:00
|
|
|
h.client = &http.Client{Transport: h.config.Transport}
|
2020-04-01 23:53:07 -04:00
|
|
|
|
|
|
|
return h
|
2018-07-19 18:55:06 -04:00
|
|
|
}
|
|
|
|
|
2018-11-19 17:47:03 -05:00
|
|
|
// Send log message 'e' to http target.
|
2023-03-21 13:50:40 -04:00
|
|
|
// If servers are offline messages are queued until queue is full.
|
|
|
|
// If Cancel has been called the message is ignored.
|
2022-07-05 17:45:49 -04:00
|
|
|
func (h *Target) Send(entry interface{}) error {
|
2023-03-21 13:50:40 -04:00
|
|
|
if atomic.LoadInt32(&h.status) == statusClosed {
|
2022-11-28 11:03:26 -05:00
|
|
|
return nil
|
|
|
|
}
|
2023-03-21 13:50:40 -04:00
|
|
|
h.logChMu.RLock()
|
|
|
|
defer h.logChMu.RUnlock()
|
|
|
|
if h.logCh == nil {
|
|
|
|
// We are closing...
|
2022-02-17 14:11:15 -05:00
|
|
|
return nil
|
|
|
|
}
|
2018-07-19 18:55:06 -04:00
|
|
|
select {
|
|
|
|
case h.logCh <- entry:
|
|
|
|
default:
|
2023-03-21 13:50:40 -04:00
|
|
|
// Drop messages until we are online.
|
|
|
|
if !h.IsOnline() {
|
|
|
|
return errors.New("log buffer full and remote offline")
|
|
|
|
}
|
2022-11-10 13:20:21 -05:00
|
|
|
nWorkers := atomic.LoadInt64(&h.workers)
|
|
|
|
if nWorkers < maxWorkers {
|
|
|
|
// Only have one try to start at the same time.
|
|
|
|
h.workerStartMu.Lock()
|
|
|
|
defer h.workerStartMu.Unlock()
|
|
|
|
// Start one max every second.
|
|
|
|
if time.Since(h.lastStarted) > time.Second {
|
|
|
|
if atomic.CompareAndSwapInt64(&h.workers, nWorkers, nWorkers+1) {
|
|
|
|
// Start another logger.
|
|
|
|
h.lastStarted = time.Now()
|
|
|
|
go h.startHTTPLogger()
|
|
|
|
}
|
|
|
|
}
|
2023-03-21 13:50:40 -04:00
|
|
|
h.logCh <- entry
|
2022-11-10 13:20:21 -05:00
|
|
|
return nil
|
|
|
|
}
|
2018-07-19 18:55:06 -04:00
|
|
|
// log channel is full, do not wait and return
|
|
|
|
// an error immediately to the caller
|
2022-11-10 13:20:21 -05:00
|
|
|
atomic.AddInt64(&h.totalMessages, 1)
|
|
|
|
atomic.AddInt64(&h.failedMessages, 1)
|
2018-07-19 18:55:06 -04:00
|
|
|
return errors.New("log buffer full")
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
2022-02-17 14:11:15 -05:00
|
|
|
|
2023-03-21 13:50:40 -04:00
|
|
|
// Cancel - cancels the target.
|
|
|
|
// All queued messages are flushed and the function returns afterwards.
|
|
|
|
// All messages sent to the target after this function has been called will be dropped.
|
2022-02-17 14:11:15 -05:00
|
|
|
func (h *Target) Cancel() {
|
2023-03-21 13:50:40 -04:00
|
|
|
atomic.StoreInt32(&h.status, statusClosed)
|
|
|
|
|
|
|
|
// Set logch to nil and close it.
|
|
|
|
// This will block all Send operations,
|
|
|
|
// and finish the existing ones.
|
|
|
|
// All future ones will be discarded.
|
|
|
|
h.logChMu.Lock()
|
2022-05-16 19:10:51 -04:00
|
|
|
close(h.logCh)
|
2023-03-21 13:50:40 -04:00
|
|
|
h.logCh = nil
|
|
|
|
h.logChMu.Unlock()
|
|
|
|
|
|
|
|
// Wait for messages to be sent...
|
2022-02-17 14:11:15 -05:00
|
|
|
h.wg.Wait()
|
|
|
|
}
|
2022-02-24 12:05:33 -05:00
|
|
|
|
|
|
|
// Type - returns type of the target
|
|
|
|
func (h *Target) Type() types.TargetType {
|
|
|
|
return types.TargetHTTP
|
|
|
|
}
|