2021-04-18 15:41:13 -04:00
|
|
|
// Copyright (c) 2015-2021 MinIO, Inc.
|
|
|
|
//
|
|
|
|
// This file is part of MinIO Object Storage stack
|
|
|
|
//
|
|
|
|
// This program is free software: you can redistribute it and/or modify
|
|
|
|
// it under the terms of the GNU Affero General Public License as published by
|
|
|
|
// the Free Software Foundation, either version 3 of the License, or
|
|
|
|
// (at your option) any later version.
|
|
|
|
//
|
|
|
|
// This program is distributed in the hope that it will be useful
|
|
|
|
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
// GNU Affero General Public License for more details.
|
|
|
|
//
|
|
|
|
// You should have received a copy of the GNU Affero General Public License
|
|
|
|
// along with this program. If not, see <http://www.gnu.org/licenses/>.
|
2016-12-16 01:26:15 -05:00
|
|
|
|
|
|
|
package cmd
|
|
|
|
|
|
|
|
import (
|
2018-04-05 18:04:40 -04:00
|
|
|
"context"
|
2019-09-04 16:19:44 -04:00
|
|
|
"crypto/subtle"
|
2020-02-01 20:45:29 -05:00
|
|
|
"crypto/tls"
|
2016-12-16 01:26:15 -05:00
|
|
|
"encoding/json"
|
2020-05-19 16:53:54 -04:00
|
|
|
"errors"
|
2019-08-27 14:37:47 -04:00
|
|
|
"fmt"
|
2018-01-11 02:06:36 -05:00
|
|
|
"io"
|
2021-04-05 19:07:53 -04:00
|
|
|
"math/rand"
|
2016-12-16 01:26:15 -05:00
|
|
|
"net/http"
|
2019-08-28 18:04:43 -04:00
|
|
|
"net/url"
|
2018-09-18 19:46:35 -04:00
|
|
|
"os"
|
2019-08-28 18:04:43 -04:00
|
|
|
"path"
|
|
|
|
"runtime"
|
2019-01-24 10:22:14 -05:00
|
|
|
"sort"
|
2018-09-06 11:03:18 -04:00
|
|
|
"strconv"
|
|
|
|
"strings"
|
2017-01-04 02:39:22 -05:00
|
|
|
"time"
|
2017-10-31 14:54:32 -04:00
|
|
|
|
2018-01-22 17:54:55 -05:00
|
|
|
"github.com/gorilla/mux"
|
2021-05-10 21:15:11 -04:00
|
|
|
"github.com/minio/kes"
|
2021-05-06 11:52:02 -04:00
|
|
|
"github.com/minio/madmin-go"
|
2021-06-01 17:59:40 -04:00
|
|
|
"github.com/minio/minio/internal/auth"
|
|
|
|
"github.com/minio/minio/internal/config"
|
|
|
|
"github.com/minio/minio/internal/dsync"
|
|
|
|
"github.com/minio/minio/internal/handlers"
|
|
|
|
xhttp "github.com/minio/minio/internal/http"
|
|
|
|
"github.com/minio/minio/internal/kms"
|
|
|
|
"github.com/minio/minio/internal/logger"
|
|
|
|
"github.com/minio/minio/internal/logger/message/log"
|
|
|
|
xnet "github.com/minio/minio/internal/net"
|
2021-05-30 00:16:42 -04:00
|
|
|
iampolicy "github.com/minio/pkg/iam/policy"
|
2016-12-16 01:26:15 -05:00
|
|
|
)
|
|
|
|
|
|
|
|
const (
|
2018-10-09 17:00:01 -04:00
|
|
|
maxEConfigJSONSize = 262272
|
2016-12-16 01:26:15 -05:00
|
|
|
)
|
|
|
|
|
2017-03-16 03:15:06 -04:00
|
|
|
// Only valid query params for mgmt admin APIs.
|
2017-01-17 13:02:58 -05:00
|
|
|
const (
|
2020-09-24 11:40:21 -04:00
|
|
|
mgmtBucket = "bucket"
|
|
|
|
mgmtPrefix = "prefix"
|
|
|
|
mgmtClientToken = "clientToken"
|
|
|
|
mgmtForceStart = "forceStart"
|
|
|
|
mgmtForceStop = "forceStop"
|
2017-01-17 13:02:58 -05:00
|
|
|
)
|
|
|
|
|
2021-04-08 12:51:11 -04:00
|
|
|
func updateServer(u *url.URL, sha256Sum []byte, lrTime time.Time, releaseInfo string, mode string) (us madmin.ServerUpdateStatus, err error) {
|
|
|
|
if err = doUpdate(u, lrTime, sha256Sum, releaseInfo, mode); err != nil {
|
2019-08-27 14:37:47 -04:00
|
|
|
return us, err
|
2018-01-22 17:54:55 -05:00
|
|
|
}
|
2020-07-23 11:03:31 -04:00
|
|
|
|
2019-08-27 14:37:47 -04:00
|
|
|
us.CurrentVersion = Version
|
2020-07-23 11:03:31 -04:00
|
|
|
us.UpdatedVersion = lrTime.Format(minioReleaseTagTimeLayout)
|
2019-08-27 14:37:47 -04:00
|
|
|
return us, nil
|
2017-01-23 11:56:06 -05:00
|
|
|
}
|
|
|
|
|
2020-04-07 22:30:59 -04:00
|
|
|
// ServerUpdateHandler - POST /minio/admin/v3/update?updateURL={updateURL}
|
2016-12-20 21:49:48 -05:00
|
|
|
// ----------
|
2019-08-28 18:04:43 -04:00
|
|
|
// updates all minio servers and restarts them gracefully.
|
|
|
|
func (a adminAPIHandlers) ServerUpdateHandler(w http.ResponseWriter, r *http.Request) {
|
|
|
|
ctx := newContext(r, w, "ServerUpdate")
|
2018-11-12 14:07:43 -05:00
|
|
|
|
2021-01-26 16:21:51 -05:00
|
|
|
defer logger.AuditLog(ctx, w, r, mustGetClaimsFromToken(r))
|
2020-05-11 13:34:08 -04:00
|
|
|
|
2019-11-19 05:03:18 -05:00
|
|
|
objectAPI, _ := validateAdminReq(ctx, w, r, iampolicy.ServerUpdateAdminAction)
|
2019-02-12 04:25:52 -05:00
|
|
|
if objectAPI == nil {
|
2016-12-16 01:26:15 -05:00
|
|
|
return
|
|
|
|
}
|
2017-01-23 11:56:06 -05:00
|
|
|
|
2019-08-28 18:04:43 -04:00
|
|
|
if globalInplaceUpdateDisabled {
|
2020-10-25 01:39:44 -04:00
|
|
|
// if MINIO_UPDATE=off - inplace update is disabled, mostly in containers.
|
2019-08-28 18:04:43 -04:00
|
|
|
writeErrorResponseJSON(ctx, w, errorCodes.ToAPIErr(ErrMethodNotAllowed), r.URL)
|
2019-08-27 14:37:47 -04:00
|
|
|
return
|
2018-01-22 17:54:55 -05:00
|
|
|
}
|
2017-01-23 11:56:06 -05:00
|
|
|
|
2019-08-28 18:04:43 -04:00
|
|
|
vars := mux.Vars(r)
|
2020-07-23 11:03:31 -04:00
|
|
|
updateURL := vars["updateURL"]
|
2019-08-28 18:04:43 -04:00
|
|
|
mode := getMinioMode()
|
2020-07-23 11:03:31 -04:00
|
|
|
if updateURL == "" {
|
|
|
|
updateURL = minioReleaseInfoURL
|
|
|
|
if runtime.GOOS == globalWindowsOSName {
|
|
|
|
updateURL = minioReleaseWindowsInfoURL
|
2019-08-27 14:37:47 -04:00
|
|
|
}
|
2020-07-23 11:03:31 -04:00
|
|
|
}
|
2017-02-08 03:13:02 -05:00
|
|
|
|
2020-07-23 11:03:31 -04:00
|
|
|
u, err := url.Parse(updateURL)
|
|
|
|
if err != nil {
|
|
|
|
writeErrorResponseJSON(ctx, w, toAdminAPIErr(ctx, err), r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
content, err := downloadReleaseURL(u, updateTimeout, mode)
|
|
|
|
if err != nil {
|
|
|
|
writeErrorResponseJSON(ctx, w, toAdminAPIErr(ctx, err), r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2021-04-08 12:51:11 -04:00
|
|
|
sha256Sum, lrTime, releaseInfo, err := parseReleaseData(content)
|
2020-07-23 11:03:31 -04:00
|
|
|
if err != nil {
|
|
|
|
writeErrorResponseJSON(ctx, w, toAdminAPIErr(ctx, err), r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2021-04-08 12:51:11 -04:00
|
|
|
u.Path = path.Dir(u.Path) + SlashSeparator + releaseInfo
|
2020-07-23 11:03:31 -04:00
|
|
|
crTime, err := GetCurrentReleaseTime()
|
|
|
|
if err != nil {
|
|
|
|
writeErrorResponseJSON(ctx, w, toAdminAPIErr(ctx, err), r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2020-11-12 17:18:59 -05:00
|
|
|
if lrTime.Sub(crTime) <= 0 {
|
2020-07-23 11:03:31 -04:00
|
|
|
updateStatus := madmin.ServerUpdateStatus{
|
|
|
|
CurrentVersion: Version,
|
|
|
|
UpdatedVersion: Version,
|
2019-08-27 14:37:47 -04:00
|
|
|
}
|
2017-01-23 11:56:06 -05:00
|
|
|
|
2020-07-23 11:03:31 -04:00
|
|
|
// Marshal API response
|
|
|
|
jsonBytes, err := json.Marshal(updateStatus)
|
2019-08-27 14:37:47 -04:00
|
|
|
if err != nil {
|
|
|
|
writeErrorResponseJSON(ctx, w, toAdminAPIErr(ctx, err), r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2020-07-23 11:03:31 -04:00
|
|
|
writeSuccessResponseJSON(w, jsonBytes)
|
|
|
|
return
|
2019-08-28 18:04:43 -04:00
|
|
|
}
|
2019-08-27 14:37:47 -04:00
|
|
|
|
2021-04-08 12:51:11 -04:00
|
|
|
for _, nerr := range globalNotificationSys.ServerUpdate(ctx, u, sha256Sum, lrTime, releaseInfo) {
|
2019-08-28 18:04:43 -04:00
|
|
|
if nerr.Err != nil {
|
|
|
|
logger.GetReqInfo(ctx).SetTags("peerAddress", nerr.Host.String())
|
|
|
|
logger.LogIf(ctx, nerr.Err)
|
2020-07-23 11:03:31 -04:00
|
|
|
err = fmt.Errorf("Server update failed, please do not restart the servers yet: failed with %w", nerr.Err)
|
|
|
|
writeErrorResponseJSON(ctx, w, toAdminAPIErr(ctx, err), r.URL)
|
|
|
|
return
|
2019-08-27 14:37:47 -04:00
|
|
|
}
|
2019-08-28 18:04:43 -04:00
|
|
|
}
|
|
|
|
|
2021-04-08 12:51:11 -04:00
|
|
|
updateStatus, err := updateServer(u, sha256Sum, lrTime, releaseInfo, mode)
|
2019-08-28 18:04:43 -04:00
|
|
|
if err != nil {
|
2020-07-23 11:03:31 -04:00
|
|
|
err = fmt.Errorf("Server update failed, please do not restart the servers yet: failed with %w", err)
|
2019-08-28 18:04:43 -04:00
|
|
|
writeErrorResponseJSON(ctx, w, toAdminAPIErr(ctx, err), r.URL)
|
2016-12-20 21:05:25 -05:00
|
|
|
return
|
2016-12-16 01:26:15 -05:00
|
|
|
}
|
2019-01-14 01:44:20 -05:00
|
|
|
|
2019-08-28 18:04:43 -04:00
|
|
|
// Marshal API response
|
|
|
|
jsonBytes, err := json.Marshal(updateStatus)
|
|
|
|
if err != nil {
|
|
|
|
writeErrorResponseJSON(ctx, w, toAdminAPIErr(ctx, err), r.URL)
|
|
|
|
return
|
|
|
|
}
|
2016-12-16 01:26:15 -05:00
|
|
|
|
2019-08-28 18:04:43 -04:00
|
|
|
writeSuccessResponseJSON(w, jsonBytes)
|
2018-11-12 14:07:43 -05:00
|
|
|
|
2020-07-23 11:03:31 -04:00
|
|
|
// Notify all other MinIO peers signal service.
|
|
|
|
for _, nerr := range globalNotificationSys.SignalService(serviceRestart) {
|
|
|
|
if nerr.Err != nil {
|
|
|
|
logger.GetReqInfo(ctx).SetTags("peerAddress", nerr.Host.String())
|
|
|
|
logger.LogIf(ctx, nerr.Err)
|
|
|
|
}
|
2019-08-28 18:04:43 -04:00
|
|
|
}
|
2020-07-23 11:03:31 -04:00
|
|
|
|
|
|
|
globalServiceSignalCh <- serviceRestart
|
2019-08-28 18:04:43 -04:00
|
|
|
}
|
2017-01-17 17:25:59 -05:00
|
|
|
|
2020-05-11 13:34:08 -04:00
|
|
|
// ServiceHandler - POST /minio/admin/v3/service?action={action}
|
2019-08-28 18:04:43 -04:00
|
|
|
// ----------
|
|
|
|
// restarts/stops minio server gracefully. In a distributed setup,
|
2020-05-11 13:34:08 -04:00
|
|
|
func (a adminAPIHandlers) ServiceHandler(w http.ResponseWriter, r *http.Request) {
|
|
|
|
ctx := newContext(r, w, "Service")
|
|
|
|
|
2021-01-26 16:21:51 -05:00
|
|
|
defer logger.AuditLog(ctx, w, r, mustGetClaimsFromToken(r))
|
2017-01-17 17:25:59 -05:00
|
|
|
|
2019-08-28 18:04:43 -04:00
|
|
|
vars := mux.Vars(r)
|
|
|
|
action := vars["action"]
|
|
|
|
|
|
|
|
var serviceSig serviceSignal
|
|
|
|
switch madmin.ServiceAction(action) {
|
|
|
|
case madmin.ServiceActionRestart:
|
|
|
|
serviceSig = serviceRestart
|
|
|
|
case madmin.ServiceActionStop:
|
|
|
|
serviceSig = serviceStop
|
|
|
|
default:
|
2019-10-11 21:50:54 -04:00
|
|
|
logger.LogIf(ctx, fmt.Errorf("Unrecognized service action %s requested", action), logger.Application)
|
2019-08-28 18:04:43 -04:00
|
|
|
writeErrorResponseJSON(ctx, w, errorCodes.ToAPIErr(ErrMalformedPOSTRequest), r.URL)
|
2017-01-17 17:25:59 -05:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2020-05-11 13:34:08 -04:00
|
|
|
var objectAPI ObjectLayer
|
2020-12-04 12:32:35 -05:00
|
|
|
switch serviceSig {
|
|
|
|
case serviceRestart:
|
2020-05-11 13:34:08 -04:00
|
|
|
objectAPI, _ = validateAdminReq(ctx, w, r, iampolicy.ServiceRestartAdminAction)
|
2020-12-04 12:32:35 -05:00
|
|
|
case serviceStop:
|
2020-05-11 13:34:08 -04:00
|
|
|
objectAPI, _ = validateAdminReq(ctx, w, r, iampolicy.ServiceStopAdminAction)
|
|
|
|
}
|
|
|
|
if objectAPI == nil {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2019-04-09 14:39:42 -04:00
|
|
|
// Notify all other MinIO peers signal service.
|
2019-01-14 01:44:20 -05:00
|
|
|
for _, nerr := range globalNotificationSys.SignalService(serviceSig) {
|
|
|
|
if nerr.Err != nil {
|
|
|
|
logger.GetReqInfo(ctx).SetTags("peerAddress", nerr.Host.String())
|
|
|
|
logger.LogIf(ctx, nerr.Err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-08-27 14:37:47 -04:00
|
|
|
// Reply to the client before restarting, stopping MinIO server.
|
|
|
|
writeSuccessResponseHeadersOnly(w)
|
|
|
|
|
2019-01-14 01:44:20 -05:00
|
|
|
globalServiceSignalCh <- serviceSig
|
2017-01-17 17:25:59 -05:00
|
|
|
}
|
|
|
|
|
2017-02-15 13:45:45 -05:00
|
|
|
// ServerProperties holds some server information such as, version, region
|
|
|
|
// uptime, etc..
|
|
|
|
type ServerProperties struct {
|
2019-12-11 20:56:02 -05:00
|
|
|
Uptime int64 `json:"uptime"`
|
|
|
|
Version string `json:"version"`
|
|
|
|
CommitID string `json:"commitID"`
|
|
|
|
DeploymentID string `json:"deploymentID"`
|
|
|
|
Region string `json:"region"`
|
|
|
|
SQSARN []string `json:"sqsARN"`
|
2017-02-15 13:45:45 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
// ServerConnStats holds transferred bytes from/to the server
|
|
|
|
type ServerConnStats struct {
|
|
|
|
TotalInputBytes uint64 `json:"transferred"`
|
|
|
|
TotalOutputBytes uint64 `json:"received"`
|
|
|
|
Throughput uint64 `json:"throughput,omitempty"`
|
2019-10-23 00:01:14 -04:00
|
|
|
S3InputBytes uint64 `json:"transferredS3"`
|
|
|
|
S3OutputBytes uint64 `json:"receivedS3"`
|
2017-02-15 13:45:45 -05:00
|
|
|
}
|
|
|
|
|
2019-10-23 00:01:14 -04:00
|
|
|
// ServerHTTPAPIStats holds total number of HTTP operations from/to the server,
|
2017-04-07 02:08:33 -04:00
|
|
|
// including the average duration the call was spent.
|
2019-10-23 00:01:14 -04:00
|
|
|
type ServerHTTPAPIStats struct {
|
|
|
|
APIStats map[string]int `json:"apiStats"`
|
2017-04-07 02:08:33 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
// ServerHTTPStats holds all type of http operations performed to/from the server
|
|
|
|
// including their average execution time.
|
|
|
|
type ServerHTTPStats struct {
|
2021-03-31 02:19:36 -04:00
|
|
|
S3RequestsInQueue int32 `json:"s3RequestsInQueue"`
|
|
|
|
CurrentS3Requests ServerHTTPAPIStats `json:"currentS3Requests"`
|
|
|
|
TotalS3Requests ServerHTTPAPIStats `json:"totalS3Requests"`
|
|
|
|
TotalS3Errors ServerHTTPAPIStats `json:"totalS3Errors"`
|
|
|
|
TotalS3Canceled ServerHTTPAPIStats `json:"totalS3Canceled"`
|
|
|
|
TotalS3RejectedAuth uint64 `json:"totalS3RejectedAuth"`
|
|
|
|
TotalS3RejectedTime uint64 `json:"totalS3RejectedTime"`
|
|
|
|
TotalS3RejectedHeader uint64 `json:"totalS3RejectedHeader"`
|
|
|
|
TotalS3RejectedInvalid uint64 `json:"totalS3RejectedInvalid"`
|
2017-04-07 02:08:33 -04:00
|
|
|
}
|
|
|
|
|
2020-04-07 22:30:59 -04:00
|
|
|
// StorageInfoHandler - GET /minio/admin/v3/storageinfo
|
2019-10-23 00:01:14 -04:00
|
|
|
// ----------
|
|
|
|
// Get server information
|
|
|
|
func (a adminAPIHandlers) StorageInfoHandler(w http.ResponseWriter, r *http.Request) {
|
|
|
|
ctx := newContext(r, w, "StorageInfo")
|
2020-05-11 13:34:08 -04:00
|
|
|
|
2021-01-26 16:21:51 -05:00
|
|
|
defer logger.AuditLog(ctx, w, r, mustGetClaimsFromToken(r))
|
2020-05-11 13:34:08 -04:00
|
|
|
|
2020-01-26 21:47:52 -05:00
|
|
|
objectAPI, _ := validateAdminReq(ctx, w, r, iampolicy.StorageInfoAdminAction)
|
2019-10-23 00:01:14 -04:00
|
|
|
if objectAPI == nil {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2020-05-28 16:03:04 -04:00
|
|
|
// ignores any errors here.
|
2021-01-04 12:42:09 -05:00
|
|
|
storageInfo, _ := objectAPI.StorageInfo(ctx)
|
2019-10-23 00:01:14 -04:00
|
|
|
|
2020-09-28 22:39:32 -04:00
|
|
|
// Collect any disk healing.
|
2021-03-04 17:36:23 -05:00
|
|
|
healing, _ := getAggregatedBackgroundHealState(ctx, nil)
|
2020-09-28 22:39:32 -04:00
|
|
|
healDisks := make(map[string]struct{}, len(healing.HealDisks))
|
|
|
|
for _, disk := range healing.HealDisks {
|
|
|
|
healDisks[disk] = struct{}{}
|
|
|
|
}
|
|
|
|
|
|
|
|
// find all disks which belong to each respective endpoints
|
|
|
|
for i, disk := range storageInfo.Disks {
|
|
|
|
if _, ok := healDisks[disk.Endpoint]; ok {
|
|
|
|
storageInfo.Disks[i].Healing = true
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-10-23 00:01:14 -04:00
|
|
|
// Marshal API response
|
|
|
|
jsonBytes, err := json.Marshal(storageInfo)
|
|
|
|
if err != nil {
|
|
|
|
writeErrorResponseJSON(ctx, w, toAdminAPIErr(ctx, err), r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
// Reply with storage information (across nodes in a
|
|
|
|
// distributed setup) as json.
|
|
|
|
writeSuccessResponseJSON(w, jsonBytes)
|
|
|
|
|
|
|
|
}
|
|
|
|
|
2020-04-07 22:30:59 -04:00
|
|
|
// DataUsageInfoHandler - GET /minio/admin/v3/datausage
|
2019-12-12 09:02:37 -05:00
|
|
|
// ----------
|
|
|
|
// Get server/cluster data usage info
|
|
|
|
func (a adminAPIHandlers) DataUsageInfoHandler(w http.ResponseWriter, r *http.Request) {
|
|
|
|
ctx := newContext(r, w, "DataUsageInfo")
|
2020-05-11 13:34:08 -04:00
|
|
|
|
2021-01-26 16:21:51 -05:00
|
|
|
defer logger.AuditLog(ctx, w, r, mustGetClaimsFromToken(r))
|
2020-05-11 13:34:08 -04:00
|
|
|
|
2020-01-26 21:47:52 -05:00
|
|
|
objectAPI, _ := validateAdminReq(ctx, w, r, iampolicy.DataUsageInfoAdminAction)
|
2019-12-12 09:02:37 -05:00
|
|
|
if objectAPI == nil {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
dataUsageInfo, err := loadDataUsageFromBackend(ctx, objectAPI)
|
|
|
|
if err != nil {
|
2020-01-21 17:07:49 -05:00
|
|
|
writeErrorResponseJSON(ctx, w, toAdminAPIErr(ctx, err), r.URL)
|
2019-12-12 09:02:37 -05:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
dataUsageInfoJSON, err := json.Marshal(dataUsageInfo)
|
|
|
|
if err != nil {
|
2020-01-21 17:07:49 -05:00
|
|
|
writeErrorResponseJSON(ctx, w, toAdminAPIErr(ctx, err), r.URL)
|
2019-12-12 09:02:37 -05:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
writeSuccessResponseJSON(w, dataUsageInfoJSON)
|
|
|
|
}
|
|
|
|
|
2020-10-24 16:23:16 -04:00
|
|
|
func lriToLockEntry(l lockRequesterInfo, resource, server string) *madmin.LockEntry {
|
2019-11-13 15:17:45 -05:00
|
|
|
entry := &madmin.LockEntry{
|
|
|
|
Timestamp: l.Timestamp,
|
|
|
|
Resource: resource,
|
|
|
|
ServerList: []string{server},
|
|
|
|
Source: l.Source,
|
2020-09-25 22:21:52 -04:00
|
|
|
Owner: l.Owner,
|
2019-11-13 15:17:45 -05:00
|
|
|
ID: l.UID,
|
2020-10-24 16:23:16 -04:00
|
|
|
Quorum: l.Quorum,
|
2019-11-13 15:17:45 -05:00
|
|
|
}
|
2019-01-24 10:22:14 -05:00
|
|
|
if l.Writer {
|
2020-06-20 09:33:01 -04:00
|
|
|
entry.Type = "WRITE"
|
2019-01-24 10:22:14 -05:00
|
|
|
} else {
|
2020-06-20 09:33:01 -04:00
|
|
|
entry.Type = "READ"
|
2019-01-24 10:22:14 -05:00
|
|
|
}
|
|
|
|
return entry
|
|
|
|
}
|
|
|
|
|
2020-10-24 16:23:16 -04:00
|
|
|
func topLockEntries(peerLocks []*PeerLocks, stale bool) madmin.LockEntries {
|
2019-01-24 10:22:14 -05:00
|
|
|
entryMap := make(map[string]*madmin.LockEntry)
|
|
|
|
for _, peerLock := range peerLocks {
|
|
|
|
if peerLock == nil {
|
|
|
|
continue
|
|
|
|
}
|
2020-12-10 10:28:37 -05:00
|
|
|
for k, v := range peerLock.Locks {
|
|
|
|
for _, lockReqInfo := range v {
|
|
|
|
if val, ok := entryMap[lockReqInfo.UID]; ok {
|
|
|
|
val.ServerList = append(val.ServerList, peerLock.Addr)
|
|
|
|
} else {
|
|
|
|
entryMap[lockReqInfo.UID] = lriToLockEntry(lockReqInfo, k, peerLock.Addr)
|
2019-01-24 10:22:14 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2020-09-25 22:21:52 -04:00
|
|
|
var lockEntries madmin.LockEntries
|
2019-01-24 10:22:14 -05:00
|
|
|
for _, v := range entryMap {
|
2020-09-25 22:21:52 -04:00
|
|
|
if stale {
|
|
|
|
lockEntries = append(lockEntries, *v)
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
if len(v.ServerList) >= v.Quorum {
|
|
|
|
lockEntries = append(lockEntries, *v)
|
|
|
|
}
|
2019-01-24 10:22:14 -05:00
|
|
|
}
|
|
|
|
sort.Sort(lockEntries)
|
|
|
|
return lockEntries
|
|
|
|
}
|
|
|
|
|
|
|
|
// PeerLocks holds server information result of one node
|
|
|
|
type PeerLocks struct {
|
|
|
|
Addr string
|
2020-12-10 10:28:37 -05:00
|
|
|
Locks map[string][]lockRequesterInfo
|
2019-01-24 10:22:14 -05:00
|
|
|
}
|
|
|
|
|
2021-01-25 13:01:27 -05:00
|
|
|
// ForceUnlockHandler force unlocks requested resource
|
|
|
|
func (a adminAPIHandlers) ForceUnlockHandler(w http.ResponseWriter, r *http.Request) {
|
|
|
|
ctx := newContext(r, w, "ForceUnlock")
|
|
|
|
|
2021-01-26 16:21:51 -05:00
|
|
|
defer logger.AuditLog(ctx, w, r, mustGetClaimsFromToken(r))
|
2021-01-25 13:01:27 -05:00
|
|
|
|
|
|
|
objectAPI, _ := validateAdminReq(ctx, w, r, iampolicy.ForceUnlockAdminAction)
|
|
|
|
if objectAPI == nil {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
z, ok := objectAPI.(*erasureServerPools)
|
|
|
|
if !ok {
|
|
|
|
writeErrorResponseJSON(ctx, w, errorCodes.ToAPIErr(ErrNotImplemented), r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
vars := mux.Vars(r)
|
|
|
|
|
|
|
|
var args dsync.LockArgs
|
|
|
|
lockersMap := make(map[string]dsync.NetLocker)
|
|
|
|
for _, path := range strings.Split(vars["paths"], ",") {
|
|
|
|
if path == "" {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
args.Resources = append(args.Resources, path)
|
|
|
|
lockers, _ := z.serverPools[0].getHashedSet(path).getLockers()
|
|
|
|
for _, locker := range lockers {
|
|
|
|
if locker != nil {
|
|
|
|
lockersMap[locker.String()] = locker
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
for _, locker := range lockersMap {
|
|
|
|
locker.ForceUnlock(ctx, args)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-01-24 10:22:14 -05:00
|
|
|
// TopLocksHandler Get list of locks in use
|
|
|
|
func (a adminAPIHandlers) TopLocksHandler(w http.ResponseWriter, r *http.Request) {
|
|
|
|
ctx := newContext(r, w, "TopLocks")
|
|
|
|
|
2021-01-26 16:21:51 -05:00
|
|
|
defer logger.AuditLog(ctx, w, r, mustGetClaimsFromToken(r))
|
2020-05-11 13:34:08 -04:00
|
|
|
|
2020-01-26 21:47:52 -05:00
|
|
|
objectAPI, _ := validateAdminReq(ctx, w, r, iampolicy.TopLocksAdminAction)
|
2019-02-12 04:25:52 -05:00
|
|
|
if objectAPI == nil {
|
2019-01-24 10:22:14 -05:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2020-06-20 09:33:01 -04:00
|
|
|
count := 10 // by default list only top 10 entries
|
|
|
|
if countStr := r.URL.Query().Get("count"); countStr != "" {
|
|
|
|
var err error
|
|
|
|
count, err = strconv.Atoi(countStr)
|
|
|
|
if err != nil {
|
|
|
|
writeErrorResponseJSON(ctx, w, toAdminAPIErr(ctx, err), r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
2020-09-25 22:21:52 -04:00
|
|
|
stale := r.URL.Query().Get("stale") == "true" // list also stale locks
|
2020-06-20 09:33:01 -04:00
|
|
|
|
2020-09-25 22:21:52 -04:00
|
|
|
peerLocks := globalNotificationSys.GetLocks(ctx, r)
|
2020-06-20 09:33:01 -04:00
|
|
|
|
2020-10-24 16:23:16 -04:00
|
|
|
topLocks := topLockEntries(peerLocks, stale)
|
2020-10-08 15:32:32 -04:00
|
|
|
|
|
|
|
// Marshal API response upto requested count.
|
|
|
|
if len(topLocks) > count && count > 0 {
|
|
|
|
topLocks = topLocks[:count]
|
|
|
|
}
|
2019-01-24 10:22:14 -05:00
|
|
|
|
|
|
|
jsonBytes, err := json.Marshal(topLocks)
|
|
|
|
if err != nil {
|
2019-02-13 19:07:21 -05:00
|
|
|
writeErrorResponseJSON(ctx, w, toAdminAPIErr(ctx, err), r.URL)
|
2019-01-24 10:22:14 -05:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
// Reply with storage information (across nodes in a
|
|
|
|
// distributed setup) as json.
|
|
|
|
writeSuccessResponseJSON(w, jsonBytes)
|
|
|
|
}
|
|
|
|
|
2018-09-18 19:46:35 -04:00
|
|
|
// StartProfilingResult contains the status of the starting
|
|
|
|
// profiling action in a given server
|
|
|
|
type StartProfilingResult struct {
|
|
|
|
NodeName string `json:"nodeName"`
|
|
|
|
Success bool `json:"success"`
|
|
|
|
Error string `json:"error"`
|
|
|
|
}
|
|
|
|
|
2020-04-07 22:30:59 -04:00
|
|
|
// StartProfilingHandler - POST /minio/admin/v3/profiling/start?profilerType={profilerType}
|
2018-09-18 19:46:35 -04:00
|
|
|
// ----------
|
2018-09-27 00:02:05 -04:00
|
|
|
// Enable server profiling
|
2018-09-18 19:46:35 -04:00
|
|
|
func (a adminAPIHandlers) StartProfilingHandler(w http.ResponseWriter, r *http.Request) {
|
2018-11-12 14:07:43 -05:00
|
|
|
ctx := newContext(r, w, "StartProfiling")
|
|
|
|
|
2021-01-26 16:21:51 -05:00
|
|
|
defer logger.AuditLog(ctx, w, r, mustGetClaimsFromToken(r))
|
2020-05-11 13:34:08 -04:00
|
|
|
|
2020-12-18 14:51:15 -05:00
|
|
|
// Validate request signature.
|
|
|
|
_, adminAPIErr := checkAdminRequestAuth(ctx, r, iampolicy.ProfilingAdminAction, "")
|
|
|
|
if adminAPIErr != ErrNone {
|
|
|
|
writeErrorResponseJSON(ctx, w, errorCodes.ToAPIErr(adminAPIErr), r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
if globalNotificationSys == nil {
|
|
|
|
writeErrorResponseJSON(ctx, w, errorCodes.ToAPIErr(ErrServerNotInitialized), r.URL)
|
2018-09-18 19:46:35 -04:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
vars := mux.Vars(r)
|
2020-01-10 20:19:58 -05:00
|
|
|
profiles := strings.Split(vars["profilerType"], ",")
|
2021-03-26 14:37:58 -04:00
|
|
|
thisAddr, err := xnet.ParseHost(globalLocalNodeName)
|
2019-01-14 01:44:20 -05:00
|
|
|
if err != nil {
|
2019-02-13 19:07:21 -05:00
|
|
|
writeErrorResponseJSON(ctx, w, toAdminAPIErr(ctx, err), r.URL)
|
2019-01-14 01:44:20 -05:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2020-01-10 20:19:58 -05:00
|
|
|
globalProfilerMu.Lock()
|
|
|
|
defer globalProfilerMu.Unlock()
|
2019-01-14 01:44:20 -05:00
|
|
|
|
2020-01-10 20:19:58 -05:00
|
|
|
if globalProfiler == nil {
|
|
|
|
globalProfiler = make(map[string]minioProfiler, 10)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Stop profiler of all types if already running
|
|
|
|
for k, v := range globalProfiler {
|
|
|
|
for _, p := range profiles {
|
|
|
|
if p == k {
|
|
|
|
v.Stop()
|
|
|
|
delete(globalProfiler, k)
|
|
|
|
}
|
2019-01-14 01:44:20 -05:00
|
|
|
}
|
2020-01-10 20:19:58 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
// Start profiling on remote servers.
|
|
|
|
var hostErrs []NotificationPeerErr
|
|
|
|
for _, profiler := range profiles {
|
|
|
|
hostErrs = append(hostErrs, globalNotificationSys.StartProfiling(profiler)...)
|
|
|
|
|
|
|
|
// Start profiling locally as well.
|
|
|
|
prof, err := startProfiler(profiler)
|
2019-01-14 01:44:20 -05:00
|
|
|
if err != nil {
|
|
|
|
hostErrs = append(hostErrs, NotificationPeerErr{
|
|
|
|
Host: *thisAddr,
|
|
|
|
Err: err,
|
|
|
|
})
|
|
|
|
} else {
|
2020-01-10 20:19:58 -05:00
|
|
|
globalProfiler[profiler] = prof
|
2019-01-14 01:44:20 -05:00
|
|
|
hostErrs = append(hostErrs, NotificationPeerErr{
|
|
|
|
Host: *thisAddr,
|
|
|
|
})
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
var startProfilingResult []StartProfilingResult
|
|
|
|
|
|
|
|
for _, nerr := range hostErrs {
|
|
|
|
result := StartProfilingResult{NodeName: nerr.Host.String()}
|
|
|
|
if nerr.Err != nil {
|
|
|
|
result.Error = nerr.Err.Error()
|
|
|
|
} else {
|
2018-09-18 19:46:35 -04:00
|
|
|
result.Success = true
|
2019-01-14 01:44:20 -05:00
|
|
|
}
|
|
|
|
startProfilingResult = append(startProfilingResult, result)
|
2018-09-18 19:46:35 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
// Create JSON result and send it to the client
|
|
|
|
startProfilingResultInBytes, err := json.Marshal(startProfilingResult)
|
|
|
|
if err != nil {
|
2019-02-13 19:07:21 -05:00
|
|
|
writeErrorResponseJSON(ctx, w, toAdminAPIErr(ctx, err), r.URL)
|
2018-09-18 19:46:35 -04:00
|
|
|
return
|
|
|
|
}
|
2019-01-14 01:44:20 -05:00
|
|
|
|
2020-01-10 20:19:58 -05:00
|
|
|
writeSuccessResponseJSON(w, startProfilingResultInBytes)
|
2018-09-18 19:46:35 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
// dummyFileInfo represents a dummy representation of a profile data file
|
|
|
|
// present only in memory, it helps to generate the zip stream.
|
|
|
|
type dummyFileInfo struct {
|
|
|
|
name string
|
|
|
|
size int64
|
|
|
|
mode os.FileMode
|
|
|
|
modTime time.Time
|
|
|
|
isDir bool
|
|
|
|
sys interface{}
|
|
|
|
}
|
|
|
|
|
|
|
|
func (f dummyFileInfo) Name() string { return f.name }
|
|
|
|
func (f dummyFileInfo) Size() int64 { return f.size }
|
|
|
|
func (f dummyFileInfo) Mode() os.FileMode { return f.mode }
|
|
|
|
func (f dummyFileInfo) ModTime() time.Time { return f.modTime }
|
|
|
|
func (f dummyFileInfo) IsDir() bool { return f.isDir }
|
|
|
|
func (f dummyFileInfo) Sys() interface{} { return f.sys }
|
|
|
|
|
2020-04-07 22:30:59 -04:00
|
|
|
// DownloadProfilingHandler - POST /minio/admin/v3/profiling/download
|
2018-09-18 19:46:35 -04:00
|
|
|
// ----------
|
|
|
|
// Download profiling information of all nodes in a zip format
|
|
|
|
func (a adminAPIHandlers) DownloadProfilingHandler(w http.ResponseWriter, r *http.Request) {
|
2018-11-12 14:07:43 -05:00
|
|
|
ctx := newContext(r, w, "DownloadProfiling")
|
|
|
|
|
2021-01-26 16:21:51 -05:00
|
|
|
defer logger.AuditLog(ctx, w, r, mustGetClaimsFromToken(r))
|
2020-05-11 13:34:08 -04:00
|
|
|
|
2020-12-18 14:51:15 -05:00
|
|
|
// Validate request signature.
|
|
|
|
_, adminAPIErr := checkAdminRequestAuth(ctx, r, iampolicy.ProfilingAdminAction, "")
|
|
|
|
if adminAPIErr != ErrNone {
|
|
|
|
writeErrorResponseJSON(ctx, w, errorCodes.ToAPIErr(adminAPIErr), r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
if globalNotificationSys == nil {
|
|
|
|
writeErrorResponseJSON(ctx, w, errorCodes.ToAPIErr(ErrServerNotInitialized), r.URL)
|
2018-09-18 19:46:35 -04:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2019-01-14 01:44:20 -05:00
|
|
|
if !globalNotificationSys.DownloadProfilingData(ctx, w) {
|
2019-02-13 19:07:21 -05:00
|
|
|
writeErrorResponseJSON(ctx, w, errorCodes.ToAPIErr(ErrAdminProfilerNotEnabled), r.URL)
|
2018-09-27 13:34:37 -04:00
|
|
|
return
|
|
|
|
}
|
2018-09-18 19:46:35 -04:00
|
|
|
}
|
|
|
|
|
2019-08-29 16:53:27 -04:00
|
|
|
type healInitParams struct {
|
|
|
|
bucket, objPrefix string
|
|
|
|
hs madmin.HealOpts
|
|
|
|
clientToken string
|
|
|
|
forceStart, forceStop bool
|
|
|
|
}
|
2017-01-17 13:02:58 -05:00
|
|
|
|
2019-08-29 16:53:27 -04:00
|
|
|
// extractHealInitParams - Validates params for heal init API.
|
|
|
|
func extractHealInitParams(vars map[string]string, qParms url.Values, r io.Reader) (hip healInitParams, err APIErrorCode) {
|
2020-09-24 11:40:21 -04:00
|
|
|
hip.bucket = vars[mgmtBucket]
|
|
|
|
hip.objPrefix = vars[mgmtPrefix]
|
2017-01-17 13:02:58 -05:00
|
|
|
|
2019-08-29 16:53:27 -04:00
|
|
|
if hip.bucket == "" {
|
|
|
|
if hip.objPrefix != "" {
|
2018-01-22 17:54:55 -05:00
|
|
|
// Bucket is required if object-prefix is given
|
|
|
|
err = ErrHealMissingBucket
|
|
|
|
return
|
2017-03-16 03:15:06 -04:00
|
|
|
}
|
2019-08-29 16:53:27 -04:00
|
|
|
} else if isReservedOrInvalidBucket(hip.bucket, false) {
|
2018-01-22 17:54:55 -05:00
|
|
|
err = ErrInvalidBucketName
|
2017-01-17 13:02:58 -05:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2018-01-22 17:54:55 -05:00
|
|
|
// empty prefix is valid.
|
2019-08-29 16:53:27 -04:00
|
|
|
if !IsValidObjectPrefix(hip.objPrefix) {
|
2018-01-22 17:54:55 -05:00
|
|
|
err = ErrInvalidObjectName
|
2018-01-11 13:21:41 -05:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2020-09-24 11:40:21 -04:00
|
|
|
if len(qParms[mgmtClientToken]) > 0 {
|
|
|
|
hip.clientToken = qParms[mgmtClientToken][0]
|
2017-01-17 13:02:58 -05:00
|
|
|
}
|
2020-09-24 11:40:21 -04:00
|
|
|
if _, ok := qParms[mgmtForceStart]; ok {
|
2019-08-29 16:53:27 -04:00
|
|
|
hip.forceStart = true
|
2017-01-17 13:02:58 -05:00
|
|
|
}
|
2020-09-24 11:40:21 -04:00
|
|
|
if _, ok := qParms[mgmtForceStop]; ok {
|
2019-08-29 16:53:27 -04:00
|
|
|
hip.forceStop = true
|
2018-11-04 22:24:16 -05:00
|
|
|
}
|
2019-08-29 16:53:27 -04:00
|
|
|
|
|
|
|
// Invalid request conditions:
|
|
|
|
//
|
|
|
|
// Cannot have both forceStart and forceStop in the same
|
|
|
|
// request; If clientToken is provided, request can only be
|
|
|
|
// to continue receiving logs, so it cannot be start or
|
|
|
|
// stop;
|
|
|
|
if (hip.forceStart && hip.forceStop) ||
|
|
|
|
(hip.clientToken != "" && (hip.forceStart || hip.forceStop)) {
|
|
|
|
err = ErrInvalidRequest
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2018-01-22 17:54:55 -05:00
|
|
|
// ignore body if clientToken is provided
|
2019-08-29 16:53:27 -04:00
|
|
|
if hip.clientToken == "" {
|
|
|
|
jerr := json.NewDecoder(r).Decode(&hip.hs)
|
2018-01-22 17:54:55 -05:00
|
|
|
if jerr != nil {
|
2020-04-09 12:30:02 -04:00
|
|
|
logger.LogIf(GlobalContext, jerr, logger.Application)
|
2018-01-22 17:54:55 -05:00
|
|
|
err = ErrRequestBodyParse
|
|
|
|
return
|
|
|
|
}
|
2017-04-14 13:28:35 -04:00
|
|
|
}
|
|
|
|
|
2018-01-22 17:54:55 -05:00
|
|
|
err = ErrNone
|
|
|
|
return
|
2017-03-31 20:55:15 -04:00
|
|
|
}
|
|
|
|
|
2020-04-07 22:30:59 -04:00
|
|
|
// HealHandler - POST /minio/admin/v3/heal/
|
2018-01-22 17:54:55 -05:00
|
|
|
// -----------
|
|
|
|
// Start heal processing and return heal status items.
|
|
|
|
//
|
|
|
|
// On a successful heal sequence start, a unique client token is
|
|
|
|
// returned. Subsequent requests to this endpoint providing the client
|
|
|
|
// token will receive heal status records from the running heal
|
|
|
|
// sequence.
|
|
|
|
//
|
|
|
|
// If no client token is provided, and a heal sequence is in progress
|
|
|
|
// an error is returned with information about the running heal
|
|
|
|
// sequence. However, if the force-start flag is provided, the server
|
|
|
|
// aborts the running heal sequence and starts a new one.
|
|
|
|
func (a adminAPIHandlers) HealHandler(w http.ResponseWriter, r *http.Request) {
|
2018-07-20 21:46:32 -04:00
|
|
|
ctx := newContext(r, w, "Heal")
|
2018-03-14 15:01:47 -04:00
|
|
|
|
2021-01-26 16:21:51 -05:00
|
|
|
defer logger.AuditLog(ctx, w, r, mustGetClaimsFromToken(r))
|
2020-05-11 13:34:08 -04:00
|
|
|
|
2019-11-19 05:03:18 -05:00
|
|
|
objectAPI, _ := validateAdminReq(ctx, w, r, iampolicy.HealAdminAction)
|
2019-02-12 04:25:52 -05:00
|
|
|
if objectAPI == nil {
|
2017-01-17 13:02:58 -05:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2018-01-11 13:21:41 -05:00
|
|
|
// Check if this setup has an erasure coded backend.
|
2020-06-12 23:04:01 -04:00
|
|
|
if !globalIsErasure {
|
2019-02-13 19:07:21 -05:00
|
|
|
writeErrorResponseJSON(ctx, w, errorCodes.ToAPIErr(ErrHealNotImplemented), r.URL)
|
2017-01-24 11:11:05 -05:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2019-08-29 16:53:27 -04:00
|
|
|
hip, errCode := extractHealInitParams(mux.Vars(r), r.URL.Query(), r.Body)
|
2019-02-12 04:25:52 -05:00
|
|
|
if errCode != ErrNone {
|
2019-02-13 19:07:21 -05:00
|
|
|
writeErrorResponseJSON(ctx, w, errorCodes.ToAPIErr(errCode), r.URL)
|
2017-01-23 03:32:55 -05:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2020-07-03 22:27:13 -04:00
|
|
|
// Analyze the heal token and route the request accordingly
|
|
|
|
token, success := proxyRequestByToken(ctx, w, r, hip.clientToken)
|
|
|
|
if success {
|
|
|
|
return
|
2020-07-03 14:53:03 -04:00
|
|
|
}
|
2020-07-03 22:27:13 -04:00
|
|
|
hip.clientToken = token
|
|
|
|
// if request was not successful, try this server locally if token
|
|
|
|
// is not found the call will fail anyways. if token is empty
|
|
|
|
// try this server to generate a new token.
|
2020-07-03 14:53:03 -04:00
|
|
|
|
2018-01-22 17:54:55 -05:00
|
|
|
type healResp struct {
|
|
|
|
respBytes []byte
|
2019-02-12 04:25:52 -05:00
|
|
|
apiErr APIError
|
2018-01-22 17:54:55 -05:00
|
|
|
errBody string
|
|
|
|
}
|
|
|
|
|
|
|
|
// Define a closure to start sending whitespace to client
|
|
|
|
// after 10s unless a response item comes in
|
2020-05-04 01:35:40 -04:00
|
|
|
keepConnLive := func(w http.ResponseWriter, r *http.Request, respCh chan healResp) {
|
2018-01-22 17:54:55 -05:00
|
|
|
ticker := time.NewTicker(time.Second * 10)
|
2018-05-04 13:43:20 -04:00
|
|
|
defer ticker.Stop()
|
2018-01-22 17:54:55 -05:00
|
|
|
started := false
|
|
|
|
forLoop:
|
|
|
|
for {
|
|
|
|
select {
|
2020-05-04 01:35:40 -04:00
|
|
|
case <-r.Context().Done():
|
|
|
|
return
|
2018-01-22 17:54:55 -05:00
|
|
|
case <-ticker.C:
|
|
|
|
if !started {
|
|
|
|
// Start writing response to client
|
|
|
|
started = true
|
|
|
|
setCommonHeaders(w)
|
2020-07-30 22:45:12 -04:00
|
|
|
setEventStreamHeaders(w)
|
2018-01-22 17:54:55 -05:00
|
|
|
// Set 200 OK status
|
|
|
|
w.WriteHeader(200)
|
|
|
|
}
|
|
|
|
// Send whitespace and keep connection open
|
2019-07-11 16:19:25 -04:00
|
|
|
w.Write([]byte(" "))
|
2018-01-22 17:54:55 -05:00
|
|
|
w.(http.Flusher).Flush()
|
|
|
|
case hr := <-respCh:
|
2019-02-12 04:25:52 -05:00
|
|
|
switch hr.apiErr {
|
|
|
|
case noError:
|
2018-11-04 22:24:16 -05:00
|
|
|
if started {
|
|
|
|
w.Write(hr.respBytes)
|
|
|
|
w.(http.Flusher).Flush()
|
|
|
|
} else {
|
|
|
|
writeSuccessResponseJSON(w, hr.respBytes)
|
|
|
|
}
|
2018-01-22 17:54:55 -05:00
|
|
|
default:
|
2018-11-04 22:24:16 -05:00
|
|
|
var errorRespJSON []byte
|
|
|
|
if hr.errBody == "" {
|
2019-02-13 19:07:21 -05:00
|
|
|
errorRespJSON = encodeResponseJSON(getAPIErrorResponse(ctx, hr.apiErr,
|
2019-07-03 01:34:32 -04:00
|
|
|
r.URL.Path, w.Header().Get(xhttp.AmzRequestID),
|
2019-07-01 15:22:01 -04:00
|
|
|
globalDeploymentID))
|
2018-11-04 22:24:16 -05:00
|
|
|
} else {
|
|
|
|
errorRespJSON = encodeResponseJSON(APIErrorResponse{
|
2019-02-12 04:25:52 -05:00
|
|
|
Code: hr.apiErr.Code,
|
2018-11-04 22:24:16 -05:00
|
|
|
Message: hr.errBody,
|
|
|
|
Resource: r.URL.Path,
|
2019-07-03 01:34:32 -04:00
|
|
|
RequestID: w.Header().Get(xhttp.AmzRequestID),
|
2019-07-01 15:22:01 -04:00
|
|
|
HostID: globalDeploymentID,
|
2018-11-04 22:24:16 -05:00
|
|
|
})
|
|
|
|
}
|
|
|
|
if !started {
|
|
|
|
setCommonHeaders(w)
|
2019-07-03 01:34:32 -04:00
|
|
|
w.Header().Set(xhttp.ContentType, string(mimeJSON))
|
2019-02-12 04:25:52 -05:00
|
|
|
w.WriteHeader(hr.apiErr.HTTPStatusCode)
|
2018-11-04 22:24:16 -05:00
|
|
|
}
|
|
|
|
w.Write(errorRespJSON)
|
|
|
|
w.(http.Flusher).Flush()
|
2018-01-22 17:54:55 -05:00
|
|
|
}
|
|
|
|
break forLoop
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-08-29 16:53:27 -04:00
|
|
|
healPath := pathJoin(hip.bucket, hip.objPrefix)
|
|
|
|
if hip.clientToken == "" && !hip.forceStart && !hip.forceStop {
|
2018-11-04 22:24:16 -05:00
|
|
|
nh, exists := globalAllHealState.getHealSequence(healPath)
|
|
|
|
if exists && !nh.hasEnded() && len(nh.currentStatus.Items) > 0 {
|
2020-07-03 22:27:13 -04:00
|
|
|
clientToken := nh.clientToken
|
|
|
|
if globalIsDistErasure {
|
|
|
|
clientToken = fmt.Sprintf("%s@%d", nh.clientToken, GetProxyEndpointLocalIndex(globalProxyEndpoints))
|
|
|
|
}
|
2018-11-04 22:24:16 -05:00
|
|
|
b, err := json.Marshal(madmin.HealStartSuccess{
|
2020-07-03 22:27:13 -04:00
|
|
|
ClientToken: clientToken,
|
2018-11-04 22:24:16 -05:00
|
|
|
ClientAddress: nh.clientAddress,
|
|
|
|
StartTime: nh.startTime,
|
|
|
|
})
|
|
|
|
if err != nil {
|
2019-02-13 19:07:21 -05:00
|
|
|
writeErrorResponseJSON(ctx, w, toAdminAPIErr(ctx, err), r.URL)
|
2018-11-04 22:24:16 -05:00
|
|
|
return
|
|
|
|
}
|
|
|
|
// Client token not specified but a heal sequence exists on a path,
|
|
|
|
// Send the token back to client.
|
|
|
|
writeSuccessResponseJSON(w, b)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
2018-01-22 17:54:55 -05:00
|
|
|
|
2019-08-29 16:53:27 -04:00
|
|
|
if hip.clientToken != "" && !hip.forceStart && !hip.forceStop {
|
2018-01-22 17:54:55 -05:00
|
|
|
// Since clientToken is given, fetch heal status from running
|
|
|
|
// heal sequence.
|
|
|
|
respBytes, errCode := globalAllHealState.PopHealStatusJSON(
|
2019-08-29 16:53:27 -04:00
|
|
|
healPath, hip.clientToken)
|
2018-01-22 17:54:55 -05:00
|
|
|
if errCode != ErrNone {
|
2019-02-13 19:07:21 -05:00
|
|
|
writeErrorResponseJSON(ctx, w, errorCodes.ToAPIErr(errCode), r.URL)
|
2018-01-22 17:54:55 -05:00
|
|
|
} else {
|
|
|
|
writeSuccessResponseJSON(w, respBytes)
|
|
|
|
}
|
2018-11-04 22:24:16 -05:00
|
|
|
return
|
2017-01-23 03:32:55 -05:00
|
|
|
}
|
2018-11-04 22:24:16 -05:00
|
|
|
|
|
|
|
respCh := make(chan healResp)
|
|
|
|
switch {
|
2019-08-29 16:53:27 -04:00
|
|
|
case hip.forceStop:
|
2018-11-04 22:24:16 -05:00
|
|
|
go func() {
|
2019-02-12 04:25:52 -05:00
|
|
|
respBytes, apiErr := globalAllHealState.stopHealSequence(healPath)
|
|
|
|
hr := healResp{respBytes: respBytes, apiErr: apiErr}
|
2018-11-04 22:24:16 -05:00
|
|
|
respCh <- hr
|
|
|
|
}()
|
2019-08-29 16:53:27 -04:00
|
|
|
case hip.clientToken == "":
|
2020-06-29 16:07:26 -04:00
|
|
|
nh := newHealSequence(GlobalContext, hip.bucket, hip.objPrefix, handlers.GetSourceIP(r), hip.hs, hip.forceStart)
|
2018-11-04 22:24:16 -05:00
|
|
|
go func() {
|
2020-11-10 12:02:06 -05:00
|
|
|
respBytes, apiErr, errMsg := globalAllHealState.LaunchNewHealSequence(nh, objectAPI)
|
2019-02-12 04:25:52 -05:00
|
|
|
hr := healResp{respBytes, apiErr, errMsg}
|
2018-11-04 22:24:16 -05:00
|
|
|
respCh <- hr
|
|
|
|
}()
|
|
|
|
}
|
|
|
|
|
|
|
|
// Due to the force-starting functionality, the Launch
|
|
|
|
// call above can take a long time - to keep the
|
|
|
|
// connection alive, we start sending whitespace
|
2020-05-04 01:35:40 -04:00
|
|
|
keepConnLive(w, r, respCh)
|
2017-01-23 03:32:55 -05:00
|
|
|
}
|
2017-02-20 15:58:50 -05:00
|
|
|
|
2021-03-04 17:36:23 -05:00
|
|
|
// getAggregatedBackgroundHealState returns the heal state of disks.
|
|
|
|
// If no ObjectLayer is provided no set status is returned.
|
|
|
|
func getAggregatedBackgroundHealState(ctx context.Context, o ObjectLayer) (madmin.BgHealState, error) {
|
|
|
|
// Get local heal status first
|
|
|
|
bgHealStates, ok := getBackgroundHealStatus(ctx, o)
|
2020-08-07 22:43:06 -04:00
|
|
|
if !ok {
|
2021-03-04 17:36:23 -05:00
|
|
|
return bgHealStates, errServerNotInitialized
|
2020-08-07 22:43:06 -04:00
|
|
|
}
|
|
|
|
|
2020-06-12 23:04:01 -04:00
|
|
|
if globalIsDistErasure {
|
2019-06-25 19:42:24 -04:00
|
|
|
// Get heal status from other peers
|
2020-08-07 16:22:53 -04:00
|
|
|
peersHealStates, nerrs := globalNotificationSys.BackgroundHealStatus()
|
2020-09-03 01:54:56 -04:00
|
|
|
var errCount int
|
2020-08-07 16:22:53 -04:00
|
|
|
for _, nerr := range nerrs {
|
|
|
|
if nerr.Err != nil {
|
|
|
|
logger.LogIf(ctx, nerr.Err)
|
2020-09-03 01:54:56 -04:00
|
|
|
errCount++
|
2020-08-07 16:22:53 -04:00
|
|
|
}
|
|
|
|
}
|
2020-09-03 01:54:56 -04:00
|
|
|
if errCount == len(nerrs) {
|
|
|
|
return madmin.BgHealState{}, fmt.Errorf("all remote servers failed to report heal status, cluster is unhealthy")
|
|
|
|
}
|
2021-03-04 17:36:23 -05:00
|
|
|
bgHealStates.Merge(peersHealStates...)
|
2019-06-25 19:42:24 -04:00
|
|
|
}
|
|
|
|
|
2021-03-04 17:36:23 -05:00
|
|
|
return bgHealStates, nil
|
2020-08-07 16:22:53 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
func (a adminAPIHandlers) BackgroundHealStatusHandler(w http.ResponseWriter, r *http.Request) {
|
|
|
|
ctx := newContext(r, w, "HealBackgroundStatus")
|
|
|
|
|
2021-01-26 16:21:51 -05:00
|
|
|
defer logger.AuditLog(ctx, w, r, mustGetClaimsFromToken(r))
|
2020-08-07 16:22:53 -04:00
|
|
|
|
|
|
|
objectAPI, _ := validateAdminReq(ctx, w, r, iampolicy.HealAdminAction)
|
|
|
|
if objectAPI == nil {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
// Check if this setup has an erasure coded backend.
|
|
|
|
if !globalIsErasure {
|
|
|
|
writeErrorResponseJSON(ctx, w, errorCodes.ToAPIErr(ErrHealNotImplemented), r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2021-03-04 17:36:23 -05:00
|
|
|
aggregateHealStateResult, err := getAggregatedBackgroundHealState(r.Context(), objectAPI)
|
2020-09-03 01:54:56 -04:00
|
|
|
if err != nil {
|
|
|
|
writeErrorResponseJSON(ctx, w, toAdminAPIErr(ctx, err), r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2020-08-07 16:22:53 -04:00
|
|
|
if err := json.NewEncoder(w).Encode(aggregateHealStateResult); err != nil {
|
2019-06-25 19:42:24 -04:00
|
|
|
writeErrorResponseJSON(ctx, w, toAdminAPIErr(ctx, err), r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
w.(http.Flusher).Flush()
|
|
|
|
}
|
|
|
|
|
2019-11-19 05:03:18 -05:00
|
|
|
func validateAdminReq(ctx context.Context, w http.ResponseWriter, r *http.Request, action iampolicy.AdminAction) (ObjectLayer, auth.Credentials) {
|
|
|
|
var cred auth.Credentials
|
|
|
|
var adminAPIErr APIErrorCode
|
2018-09-06 11:03:18 -04:00
|
|
|
// Get current object layer instance.
|
2020-10-09 12:59:52 -04:00
|
|
|
objectAPI := newObjectLayerFn()
|
2019-11-09 12:27:23 -05:00
|
|
|
if objectAPI == nil || globalNotificationSys == nil {
|
2019-02-13 19:07:21 -05:00
|
|
|
writeErrorResponseJSON(ctx, w, errorCodes.ToAPIErr(ErrServerNotInitialized), r.URL)
|
2019-11-19 05:03:18 -05:00
|
|
|
return nil, cred
|
2018-09-06 11:03:18 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
// Validate request signature.
|
2020-12-18 14:51:15 -05:00
|
|
|
cred, adminAPIErr = checkAdminRequestAuth(ctx, r, action, "")
|
2018-09-06 11:03:18 -04:00
|
|
|
if adminAPIErr != ErrNone {
|
2019-02-13 19:07:21 -05:00
|
|
|
writeErrorResponseJSON(ctx, w, errorCodes.ToAPIErr(adminAPIErr), r.URL)
|
2019-11-19 05:03:18 -05:00
|
|
|
return nil, cred
|
2019-02-12 04:25:52 -05:00
|
|
|
}
|
|
|
|
|
2019-11-19 05:03:18 -05:00
|
|
|
return objectAPI, cred
|
2019-02-12 04:25:52 -05:00
|
|
|
}
|
|
|
|
|
2019-08-27 14:37:47 -04:00
|
|
|
// AdminError - is a generic error for all admin APIs.
|
|
|
|
type AdminError struct {
|
|
|
|
Code string
|
|
|
|
Message string
|
|
|
|
StatusCode int
|
|
|
|
}
|
|
|
|
|
|
|
|
func (ae AdminError) Error() string {
|
|
|
|
return ae.Message
|
|
|
|
}
|
|
|
|
|
|
|
|
// Admin API errors
|
|
|
|
const (
|
|
|
|
AdminUpdateUnexpectedFailure = "XMinioAdminUpdateUnexpectedFailure"
|
|
|
|
AdminUpdateURLNotReachable = "XMinioAdminUpdateURLNotReachable"
|
|
|
|
AdminUpdateApplyFailure = "XMinioAdminUpdateApplyFailure"
|
|
|
|
)
|
|
|
|
|
2020-06-12 23:04:01 -04:00
|
|
|
// toAdminAPIErrCode - converts errErasureWriteQuorum error to admin API
|
2017-02-27 14:40:27 -05:00
|
|
|
// specific error.
|
2018-11-12 14:07:43 -05:00
|
|
|
func toAdminAPIErrCode(ctx context.Context, err error) APIErrorCode {
|
2017-02-27 14:40:27 -05:00
|
|
|
switch err {
|
2020-06-12 23:04:01 -04:00
|
|
|
case errErasureWriteQuorum:
|
2017-02-27 14:40:27 -05:00
|
|
|
return ErrAdminConfigNoQuorum
|
2018-08-06 13:26:40 -04:00
|
|
|
default:
|
2018-11-12 14:07:43 -05:00
|
|
|
return toAPIErrorCode(ctx, err)
|
2017-02-27 14:40:27 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-02-12 04:25:52 -05:00
|
|
|
func toAdminAPIErr(ctx context.Context, err error) APIError {
|
2019-08-27 14:37:47 -04:00
|
|
|
if err == nil {
|
|
|
|
return noError
|
|
|
|
}
|
2019-10-30 03:04:39 -04:00
|
|
|
|
|
|
|
var apiErr APIError
|
|
|
|
switch e := err.(type) {
|
2020-01-03 14:28:52 -05:00
|
|
|
case iampolicy.Error:
|
|
|
|
apiErr = APIError{
|
|
|
|
Code: "XMinioMalformedIAMPolicy",
|
|
|
|
Description: e.Error(),
|
|
|
|
HTTPStatusCode: http.StatusBadRequest,
|
|
|
|
}
|
2019-10-30 03:04:39 -04:00
|
|
|
case config.Error:
|
|
|
|
apiErr = APIError{
|
|
|
|
Code: "XMinioConfigError",
|
|
|
|
Description: e.Error(),
|
|
|
|
HTTPStatusCode: http.StatusBadRequest,
|
2019-08-27 14:37:47 -04:00
|
|
|
}
|
2019-10-30 03:04:39 -04:00
|
|
|
case AdminError:
|
|
|
|
apiErr = APIError{
|
|
|
|
Code: e.Code,
|
|
|
|
Description: e.Message,
|
|
|
|
HTTPStatusCode: e.StatusCode,
|
|
|
|
}
|
|
|
|
default:
|
2020-06-11 17:11:30 -04:00
|
|
|
switch {
|
|
|
|
case errors.Is(err, errConfigNotFound):
|
2019-11-09 12:27:23 -05:00
|
|
|
apiErr = APIError{
|
|
|
|
Code: "XMinioConfigError",
|
|
|
|
Description: err.Error(),
|
|
|
|
HTTPStatusCode: http.StatusNotFound,
|
|
|
|
}
|
2020-06-11 17:11:30 -04:00
|
|
|
case errors.Is(err, errIAMActionNotAllowed):
|
|
|
|
apiErr = APIError{
|
|
|
|
Code: "XMinioIAMActionNotAllowed",
|
|
|
|
Description: err.Error(),
|
|
|
|
HTTPStatusCode: http.StatusForbidden,
|
|
|
|
}
|
|
|
|
case errors.Is(err, errIAMNotInitialized):
|
|
|
|
apiErr = APIError{
|
|
|
|
Code: "XMinioIAMNotInitialized",
|
|
|
|
Description: err.Error(),
|
|
|
|
HTTPStatusCode: http.StatusServiceUnavailable,
|
|
|
|
}
|
2021-05-10 21:15:11 -04:00
|
|
|
case errors.Is(err, kes.ErrKeyExists):
|
2020-07-08 21:50:43 -04:00
|
|
|
apiErr = APIError{
|
|
|
|
Code: "XMinioKMSKeyExists",
|
|
|
|
Description: err.Error(),
|
|
|
|
HTTPStatusCode: http.StatusConflict,
|
|
|
|
}
|
2021-04-19 13:30:42 -04:00
|
|
|
|
|
|
|
// Tier admin API errors
|
|
|
|
case errors.Is(err, madmin.ErrTierNameEmpty):
|
|
|
|
apiErr = APIError{
|
|
|
|
Code: "XMinioAdminTierNameEmpty",
|
|
|
|
Description: err.Error(),
|
|
|
|
HTTPStatusCode: http.StatusBadRequest,
|
|
|
|
}
|
|
|
|
case errors.Is(err, madmin.ErrTierInvalidConfig):
|
|
|
|
apiErr = APIError{
|
|
|
|
Code: "XMinioAdminTierInvalidConfig",
|
|
|
|
Description: err.Error(),
|
|
|
|
HTTPStatusCode: http.StatusBadRequest,
|
|
|
|
}
|
|
|
|
case errors.Is(err, madmin.ErrTierInvalidConfigVersion):
|
|
|
|
apiErr = APIError{
|
|
|
|
Code: "XMinioAdminTierInvalidConfigVersion",
|
|
|
|
Description: err.Error(),
|
|
|
|
HTTPStatusCode: http.StatusBadRequest,
|
|
|
|
}
|
|
|
|
case errors.Is(err, madmin.ErrTierTypeUnsupported):
|
|
|
|
apiErr = APIError{
|
|
|
|
Code: "XMinioAdminTierTypeUnsupported",
|
|
|
|
Description: err.Error(),
|
|
|
|
HTTPStatusCode: http.StatusBadRequest,
|
|
|
|
}
|
|
|
|
case errors.Is(err, errTierBackendInUse):
|
|
|
|
apiErr = APIError{
|
|
|
|
Code: "XMinioAdminTierBackendInUse",
|
|
|
|
Description: err.Error(),
|
|
|
|
HTTPStatusCode: http.StatusConflict,
|
|
|
|
}
|
|
|
|
case errors.Is(err, errTierInsufficientCreds):
|
|
|
|
apiErr = APIError{
|
|
|
|
Code: "XMinioAdminTierInsufficientCreds",
|
|
|
|
Description: err.Error(),
|
|
|
|
HTTPStatusCode: http.StatusBadRequest,
|
|
|
|
}
|
|
|
|
case errIsTierPermError(err):
|
|
|
|
apiErr = APIError{
|
|
|
|
Code: "XMinioAdminTierInsufficientPermissions",
|
|
|
|
Description: err.Error(),
|
|
|
|
HTTPStatusCode: http.StatusBadRequest,
|
|
|
|
}
|
2020-06-11 17:11:30 -04:00
|
|
|
default:
|
2020-04-14 14:28:56 -04:00
|
|
|
apiErr = errorCodes.ToAPIErrWithErr(toAdminAPIErrCode(ctx, err), err)
|
2018-12-18 17:39:21 -05:00
|
|
|
}
|
|
|
|
}
|
2019-11-09 12:27:23 -05:00
|
|
|
return apiErr
|
2018-10-09 17:00:01 -04:00
|
|
|
}
|
|
|
|
|
2021-05-06 11:52:02 -04:00
|
|
|
// Returns true if the madmin.TraceInfo should be traced,
|
2019-07-31 14:08:39 -04:00
|
|
|
// false if certain conditions are not met.
|
2021-05-06 11:52:02 -04:00
|
|
|
// - input entry is not of the type *madmin.TraceInfo*
|
2019-07-31 14:08:39 -04:00
|
|
|
// - errOnly entries are to be traced, not status code 2xx, 3xx.
|
2021-05-06 11:52:02 -04:00
|
|
|
// - madmin.TraceInfo type is asked by opts
|
2021-03-27 02:24:07 -04:00
|
|
|
func mustTrace(entry interface{}, opts madmin.ServiceTraceOpts) (shouldTrace bool) {
|
2021-05-06 11:52:02 -04:00
|
|
|
trcInfo, ok := entry.(madmin.TraceInfo)
|
2019-07-31 14:08:39 -04:00
|
|
|
if !ok {
|
|
|
|
return false
|
|
|
|
}
|
2020-11-21 01:52:17 -05:00
|
|
|
|
2021-03-27 02:24:07 -04:00
|
|
|
// Override shouldTrace decision with errOnly filtering
|
|
|
|
defer func() {
|
|
|
|
if shouldTrace && opts.OnlyErrors {
|
|
|
|
shouldTrace = trcInfo.RespInfo.StatusCode >= http.StatusBadRequest
|
2020-11-21 01:52:17 -05:00
|
|
|
}
|
2021-03-27 02:24:07 -04:00
|
|
|
}()
|
|
|
|
|
|
|
|
if opts.Threshold > 0 {
|
|
|
|
var latency time.Duration
|
|
|
|
switch trcInfo.TraceType {
|
2021-05-06 11:52:02 -04:00
|
|
|
case madmin.TraceOS:
|
2021-03-27 02:24:07 -04:00
|
|
|
latency = trcInfo.OSStats.Duration
|
2021-05-06 11:52:02 -04:00
|
|
|
case madmin.TraceStorage:
|
2021-03-27 02:24:07 -04:00
|
|
|
latency = trcInfo.StorageStats.Duration
|
2021-05-06 11:52:02 -04:00
|
|
|
case madmin.TraceHTTP:
|
2021-03-27 02:24:07 -04:00
|
|
|
latency = trcInfo.CallStats.Latency
|
|
|
|
}
|
|
|
|
if latency < opts.Threshold {
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-05-06 11:52:02 -04:00
|
|
|
if opts.Internal && trcInfo.TraceType == madmin.TraceHTTP && HasPrefix(trcInfo.ReqInfo.Path, minioReservedBucketPath+SlashSeparator) {
|
2021-03-27 02:24:07 -04:00
|
|
|
return true
|
|
|
|
}
|
|
|
|
|
2021-05-06 11:52:02 -04:00
|
|
|
if opts.S3 && trcInfo.TraceType == madmin.TraceHTTP && !HasPrefix(trcInfo.ReqInfo.Path, minioReservedBucketPath+SlashSeparator) {
|
2021-03-27 02:24:07 -04:00
|
|
|
return true
|
|
|
|
}
|
|
|
|
|
2021-05-06 11:52:02 -04:00
|
|
|
if opts.Storage && trcInfo.TraceType == madmin.TraceStorage {
|
2020-11-21 01:52:17 -05:00
|
|
|
return true
|
|
|
|
}
|
|
|
|
|
2021-05-06 11:52:02 -04:00
|
|
|
return opts.OS && trcInfo.TraceType == madmin.TraceOS
|
2021-03-27 02:24:07 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
func extractTraceOptions(r *http.Request) (opts madmin.ServiceTraceOpts, err error) {
|
|
|
|
q := r.URL.Query()
|
|
|
|
|
|
|
|
opts.OnlyErrors = q.Get("err") == "true"
|
|
|
|
opts.S3 = q.Get("s3") == "true"
|
|
|
|
opts.Internal = q.Get("internal") == "true"
|
|
|
|
opts.Storage = q.Get("storage") == "true"
|
|
|
|
opts.OS = q.Get("os") == "true"
|
|
|
|
|
|
|
|
// Support deprecated 'all' query
|
|
|
|
if q.Get("all") == "true" {
|
|
|
|
opts.S3 = true
|
|
|
|
opts.Internal = true
|
|
|
|
opts.Storage = true
|
|
|
|
opts.OS = true
|
|
|
|
}
|
|
|
|
|
|
|
|
if t := q.Get("threshold"); t != "" {
|
|
|
|
d, err := time.ParseDuration(t)
|
|
|
|
if err != nil {
|
|
|
|
return opts, err
|
|
|
|
}
|
|
|
|
opts.Threshold = d
|
2019-07-31 14:08:39 -04:00
|
|
|
}
|
2021-03-27 02:24:07 -04:00
|
|
|
return
|
2019-07-31 14:08:39 -04:00
|
|
|
}
|
|
|
|
|
2020-04-07 22:30:59 -04:00
|
|
|
// TraceHandler - POST /minio/admin/v3/trace
|
2019-06-08 18:54:41 -04:00
|
|
|
// ----------
|
|
|
|
// The handler sends http trace to the connected HTTP client.
|
|
|
|
func (a adminAPIHandlers) TraceHandler(w http.ResponseWriter, r *http.Request) {
|
|
|
|
ctx := newContext(r, w, "HTTPTrace")
|
2020-05-11 13:34:08 -04:00
|
|
|
|
2019-06-21 19:47:51 -04:00
|
|
|
// Validate request signature.
|
2020-12-18 14:51:15 -05:00
|
|
|
_, adminAPIErr := checkAdminRequestAuth(ctx, r, iampolicy.TraceAdminAction, "")
|
2019-06-21 19:47:51 -04:00
|
|
|
if adminAPIErr != ErrNone {
|
|
|
|
writeErrorResponseJSON(ctx, w, errorCodes.ToAPIErr(adminAPIErr), r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2021-03-27 02:24:07 -04:00
|
|
|
traceOpts, err := extractTraceOptions(r)
|
|
|
|
if err != nil {
|
|
|
|
writeErrorResponseJSON(ctx, w, errorCodes.ToAPIErr(ErrInvalidRequest), r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2020-07-30 22:45:12 -04:00
|
|
|
setEventStreamHeaders(w)
|
2019-06-08 18:54:41 -04:00
|
|
|
|
2019-06-27 01:41:12 -04:00
|
|
|
// Trace Publisher and peer-trace-client uses nonblocking send and hence does not wait for slow receivers.
|
|
|
|
// Use buffered channel to take care of burst sends or slow w.Write()
|
|
|
|
traceCh := make(chan interface{}, 4000)
|
|
|
|
|
2020-10-28 12:18:35 -04:00
|
|
|
peers, _ := newPeerRestClients(globalEndpoints)
|
2019-07-31 14:08:39 -04:00
|
|
|
|
2021-03-27 02:24:07 -04:00
|
|
|
globalTrace.Subscribe(traceCh, ctx.Done(), func(entry interface{}) bool {
|
|
|
|
return mustTrace(entry, traceOpts)
|
2019-07-31 14:08:39 -04:00
|
|
|
})
|
2019-06-27 01:41:12 -04:00
|
|
|
|
|
|
|
for _, peer := range peers {
|
2019-11-09 12:27:23 -05:00
|
|
|
if peer == nil {
|
|
|
|
continue
|
|
|
|
}
|
2021-03-27 02:24:07 -04:00
|
|
|
peer.Trace(traceCh, ctx.Done(), traceOpts)
|
2019-06-27 01:41:12 -04:00
|
|
|
}
|
|
|
|
|
2019-07-31 14:08:39 -04:00
|
|
|
keepAliveTicker := time.NewTicker(500 * time.Millisecond)
|
|
|
|
defer keepAliveTicker.Stop()
|
|
|
|
|
2019-06-27 01:41:12 -04:00
|
|
|
enc := json.NewEncoder(w)
|
2019-06-08 18:54:41 -04:00
|
|
|
for {
|
|
|
|
select {
|
|
|
|
case entry := <-traceCh:
|
2019-06-27 01:41:12 -04:00
|
|
|
if err := enc.Encode(entry); err != nil {
|
2019-06-08 18:54:41 -04:00
|
|
|
return
|
|
|
|
}
|
|
|
|
w.(http.Flusher).Flush()
|
2019-07-31 14:08:39 -04:00
|
|
|
case <-keepAliveTicker.C:
|
|
|
|
if _, err := w.Write([]byte(" ")); err != nil {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
w.(http.Flusher).Flush()
|
2020-04-16 13:56:18 -04:00
|
|
|
case <-ctx.Done():
|
2019-06-08 18:54:41 -04:00
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2019-09-03 14:10:48 -04:00
|
|
|
|
|
|
|
// The handler sends console logs to the connected HTTP client.
|
|
|
|
func (a adminAPIHandlers) ConsoleLogHandler(w http.ResponseWriter, r *http.Request) {
|
|
|
|
ctx := newContext(r, w, "ConsoleLog")
|
|
|
|
|
2021-01-26 16:21:51 -05:00
|
|
|
defer logger.AuditLog(ctx, w, r, mustGetClaimsFromToken(r))
|
2020-05-11 13:34:08 -04:00
|
|
|
|
2020-01-26 21:47:52 -05:00
|
|
|
objectAPI, _ := validateAdminReq(ctx, w, r, iampolicy.ConsoleLogAdminAction)
|
2019-09-03 14:10:48 -04:00
|
|
|
if objectAPI == nil {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
node := r.URL.Query().Get("node")
|
|
|
|
// limit buffered console entries if client requested it.
|
|
|
|
limitStr := r.URL.Query().Get("limit")
|
|
|
|
limitLines, err := strconv.Atoi(limitStr)
|
|
|
|
if err != nil {
|
|
|
|
limitLines = 10
|
|
|
|
}
|
2019-10-11 21:50:54 -04:00
|
|
|
|
|
|
|
logKind := r.URL.Query().Get("logType")
|
|
|
|
if logKind == "" {
|
|
|
|
logKind = string(logger.All)
|
|
|
|
}
|
|
|
|
logKind = strings.ToUpper(logKind)
|
|
|
|
|
2019-09-03 14:10:48 -04:00
|
|
|
// Avoid reusing tcp connection if read timeout is hit
|
|
|
|
// This is needed to make r.Context().Done() work as
|
|
|
|
// expected in case of read timeout
|
2020-09-01 19:58:13 -04:00
|
|
|
w.Header().Set("Connection", "close")
|
2020-07-30 22:45:12 -04:00
|
|
|
|
|
|
|
setEventStreamHeaders(w)
|
2019-09-03 14:10:48 -04:00
|
|
|
|
|
|
|
logCh := make(chan interface{}, 4000)
|
|
|
|
|
2020-10-28 12:18:35 -04:00
|
|
|
peers, _ := newPeerRestClients(globalEndpoints)
|
2019-09-03 14:10:48 -04:00
|
|
|
|
2020-04-16 13:56:18 -04:00
|
|
|
globalConsoleSys.Subscribe(logCh, ctx.Done(), node, limitLines, logKind, nil)
|
2019-09-03 14:10:48 -04:00
|
|
|
|
|
|
|
for _, peer := range peers {
|
2019-11-09 12:27:23 -05:00
|
|
|
if peer == nil {
|
|
|
|
continue
|
|
|
|
}
|
2019-09-05 18:51:27 -04:00
|
|
|
if node == "" || strings.EqualFold(peer.host.Name, node) {
|
2020-04-16 13:56:18 -04:00
|
|
|
peer.ConsoleLog(logCh, ctx.Done())
|
2019-09-03 14:10:48 -04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
enc := json.NewEncoder(w)
|
|
|
|
|
|
|
|
keepAliveTicker := time.NewTicker(500 * time.Millisecond)
|
|
|
|
defer keepAliveTicker.Stop()
|
|
|
|
|
|
|
|
for {
|
|
|
|
select {
|
|
|
|
case entry := <-logCh:
|
2020-03-20 18:13:41 -04:00
|
|
|
log, ok := entry.(log.Info)
|
|
|
|
if ok && log.SendLog(node, logKind) {
|
2019-09-03 14:10:48 -04:00
|
|
|
if err := enc.Encode(log); err != nil {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
w.(http.Flusher).Flush()
|
|
|
|
}
|
|
|
|
case <-keepAliveTicker.C:
|
|
|
|
if _, err := w.Write([]byte(" ")); err != nil {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
w.(http.Flusher).Flush()
|
2020-04-16 13:56:18 -04:00
|
|
|
case <-ctx.Done():
|
2019-09-03 14:10:48 -04:00
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2019-09-04 16:19:44 -04:00
|
|
|
|
2020-07-08 21:50:43 -04:00
|
|
|
// KMSCreateKeyHandler - POST /minio/admin/v3/kms/key/create?key-id=<master-key-id>
|
|
|
|
func (a adminAPIHandlers) KMSCreateKeyHandler(w http.ResponseWriter, r *http.Request) {
|
|
|
|
ctx := newContext(r, w, "KMSCreateKey")
|
2021-01-26 16:21:51 -05:00
|
|
|
defer logger.AuditLog(ctx, w, r, mustGetClaimsFromToken(r))
|
2020-07-08 21:50:43 -04:00
|
|
|
|
|
|
|
objectAPI, _ := validateAdminReq(ctx, w, r, iampolicy.KMSCreateKeyAdminAction)
|
|
|
|
if objectAPI == nil {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
if GlobalKMS == nil {
|
|
|
|
writeErrorResponseJSON(ctx, w, errorCodes.ToAPIErr(ErrKMSNotConfigured), r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
if err := GlobalKMS.CreateKey(r.URL.Query().Get("key-id")); err != nil {
|
|
|
|
writeErrorResponseJSON(ctx, w, toAdminAPIErr(ctx, err), r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
writeSuccessResponseHeadersOnly(w)
|
|
|
|
}
|
|
|
|
|
2021-06-11 18:04:26 -04:00
|
|
|
// KMSKeyStatusHandler - GET /minio/admin/v3/kms/status
|
|
|
|
func (a adminAPIHandlers) KMSStatusHandler(w http.ResponseWriter, r *http.Request) {
|
|
|
|
ctx := newContext(r, w, "KMSStatus")
|
|
|
|
defer logger.AuditLog(ctx, w, r, mustGetClaimsFromToken(r))
|
|
|
|
|
|
|
|
objectAPI, _ := validateAdminReq(ctx, w, r, iampolicy.KMSKeyStatusAdminAction)
|
|
|
|
if objectAPI == nil {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
if GlobalKMS == nil {
|
|
|
|
writeErrorResponseJSON(ctx, w, errorCodes.ToAPIErr(ErrKMSNotConfigured), r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
stat, err := GlobalKMS.Stat()
|
|
|
|
if err != nil {
|
|
|
|
writeCustomErrorResponseJSON(ctx, w, errorCodes.ToAPIErr(ErrInternalError), err.Error(), r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
status := madmin.KMSStatus{
|
|
|
|
Name: stat.Name,
|
|
|
|
DefaultKeyID: stat.DefaultKey,
|
|
|
|
Endpoints: make(map[string]madmin.ItemState, len(stat.Endpoints)),
|
|
|
|
}
|
|
|
|
for _, endpoint := range stat.Endpoints {
|
|
|
|
status.Endpoints[endpoint] = madmin.ItemOnline // TODO(aead): Implement an online check for mTLS
|
|
|
|
}
|
|
|
|
|
|
|
|
resp, err := json.Marshal(status)
|
|
|
|
if err != nil {
|
|
|
|
writeCustomErrorResponseJSON(ctx, w, errorCodes.ToAPIErr(ErrInternalError), err.Error(), r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
writeSuccessResponseJSON(w, resp)
|
|
|
|
}
|
|
|
|
|
2020-04-07 22:30:59 -04:00
|
|
|
// KMSKeyStatusHandler - GET /minio/admin/v3/kms/key/status?key-id=<master-key-id>
|
2019-09-04 16:19:44 -04:00
|
|
|
func (a adminAPIHandlers) KMSKeyStatusHandler(w http.ResponseWriter, r *http.Request) {
|
2020-05-11 13:34:08 -04:00
|
|
|
ctx := newContext(r, w, "KMSKeyStatus")
|
|
|
|
|
2021-01-26 16:21:51 -05:00
|
|
|
defer logger.AuditLog(ctx, w, r, mustGetClaimsFromToken(r))
|
2019-09-04 16:19:44 -04:00
|
|
|
|
2020-01-26 21:47:52 -05:00
|
|
|
objectAPI, _ := validateAdminReq(ctx, w, r, iampolicy.KMSKeyStatusAdminAction)
|
2019-09-04 16:19:44 -04:00
|
|
|
if objectAPI == nil {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
if GlobalKMS == nil {
|
|
|
|
writeErrorResponseJSON(ctx, w, errorCodes.ToAPIErr(ErrKMSNotConfigured), r.URL)
|
|
|
|
return
|
|
|
|
}
|
2021-05-18 10:22:31 -04:00
|
|
|
|
2021-04-15 11:47:33 -04:00
|
|
|
stat, err := GlobalKMS.Stat()
|
|
|
|
if err != nil {
|
|
|
|
writeCustomErrorResponseJSON(ctx, w, errorCodes.ToAPIErr(ErrInternalError), err.Error(), r.URL)
|
|
|
|
return
|
|
|
|
}
|
2019-09-04 16:19:44 -04:00
|
|
|
|
|
|
|
keyID := r.URL.Query().Get("key-id")
|
|
|
|
if keyID == "" {
|
2021-04-15 11:47:33 -04:00
|
|
|
keyID = stat.DefaultKey
|
2019-09-04 16:19:44 -04:00
|
|
|
}
|
|
|
|
var response = madmin.KMSKeyStatus{
|
|
|
|
KeyID: keyID,
|
|
|
|
}
|
|
|
|
|
2021-04-15 11:47:33 -04:00
|
|
|
kmsContext := kms.Context{"MinIO admin API": "KMSKeyStatusHandler"} // Context for a test key operation
|
2019-09-04 16:19:44 -04:00
|
|
|
// 1. Generate a new key using the KMS.
|
2021-04-15 11:47:33 -04:00
|
|
|
key, err := GlobalKMS.GenerateKey(keyID, kmsContext)
|
2019-09-04 16:19:44 -04:00
|
|
|
if err != nil {
|
|
|
|
response.EncryptionErr = err.Error()
|
|
|
|
resp, err := json.Marshal(response)
|
|
|
|
if err != nil {
|
|
|
|
writeCustomErrorResponseJSON(ctx, w, errorCodes.ToAPIErr(ErrInternalError), err.Error(), r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
writeSuccessResponseJSON(w, resp)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2020-02-05 12:17:35 -05:00
|
|
|
// 2. Verify that we can indeed decrypt the (encrypted) key
|
2021-05-18 10:22:31 -04:00
|
|
|
decryptedKey, err := GlobalKMS.DecryptKey(key.KeyID, key.Ciphertext, kmsContext)
|
2019-09-04 16:19:44 -04:00
|
|
|
if err != nil {
|
|
|
|
response.DecryptionErr = err.Error()
|
|
|
|
resp, err := json.Marshal(response)
|
|
|
|
if err != nil {
|
|
|
|
writeCustomErrorResponseJSON(ctx, w, errorCodes.ToAPIErr(ErrInternalError), err.Error(), r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
writeSuccessResponseJSON(w, resp)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2020-02-05 12:17:35 -05:00
|
|
|
// 3. Compare generated key with decrypted key
|
2021-04-15 11:47:33 -04:00
|
|
|
if subtle.ConstantTimeCompare(key.Plaintext, decryptedKey) != 1 {
|
2019-09-04 16:19:44 -04:00
|
|
|
response.DecryptionErr = "The generated and the decrypted data key do not match"
|
|
|
|
resp, err := json.Marshal(response)
|
|
|
|
if err != nil {
|
|
|
|
writeCustomErrorResponseJSON(ctx, w, errorCodes.ToAPIErr(ErrInternalError), err.Error(), r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
writeSuccessResponseJSON(w, resp)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
resp, err := json.Marshal(response)
|
|
|
|
if err != nil {
|
|
|
|
writeCustomErrorResponseJSON(ctx, w, errorCodes.ToAPIErr(ErrInternalError), err.Error(), r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
writeSuccessResponseJSON(w, resp)
|
|
|
|
}
|
2019-10-03 10:48:38 -04:00
|
|
|
|
2021-06-01 11:55:49 -04:00
|
|
|
func getServerInfo(ctx context.Context, r *http.Request) madmin.InfoMessage {
|
|
|
|
kmsStat := fetchKMSStatus()
|
|
|
|
|
|
|
|
ldap := madmin.LDAP{}
|
|
|
|
if globalLDAPConfig.Enabled {
|
|
|
|
ldapConn, err := globalLDAPConfig.Connect()
|
|
|
|
if err != nil {
|
|
|
|
ldap.Status = string(madmin.ItemOffline)
|
|
|
|
} else if ldapConn == nil {
|
|
|
|
ldap.Status = "Not Configured"
|
|
|
|
} else {
|
|
|
|
// Close ldap connection to avoid leaks.
|
|
|
|
ldapConn.Close()
|
|
|
|
ldap.Status = string(madmin.ItemOnline)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
log, audit := fetchLoggerInfo()
|
|
|
|
|
|
|
|
// Get the notification target info
|
|
|
|
notifyTarget := fetchLambdaInfo()
|
|
|
|
|
|
|
|
local := getLocalServerProperty(globalEndpoints, r)
|
|
|
|
servers := globalNotificationSys.ServerInfo()
|
|
|
|
servers = append(servers, local)
|
|
|
|
|
|
|
|
assignPoolNumbers(servers)
|
|
|
|
|
|
|
|
var backend interface{}
|
|
|
|
mode := madmin.ItemInitializing
|
|
|
|
|
|
|
|
buckets := madmin.Buckets{}
|
|
|
|
objects := madmin.Objects{}
|
|
|
|
usage := madmin.Usage{}
|
|
|
|
|
|
|
|
objectAPI := newObjectLayerFn()
|
|
|
|
if objectAPI != nil {
|
|
|
|
mode = madmin.ItemOnline
|
|
|
|
|
|
|
|
// Load data usage
|
|
|
|
dataUsageInfo, err := loadDataUsageFromBackend(ctx, objectAPI)
|
|
|
|
if err == nil {
|
|
|
|
buckets = madmin.Buckets{Count: dataUsageInfo.BucketsCount}
|
|
|
|
objects = madmin.Objects{Count: dataUsageInfo.ObjectsTotalCount}
|
|
|
|
usage = madmin.Usage{Size: dataUsageInfo.ObjectsTotalSize}
|
|
|
|
} else {
|
|
|
|
buckets = madmin.Buckets{Error: err.Error()}
|
|
|
|
objects = madmin.Objects{Error: err.Error()}
|
|
|
|
usage = madmin.Usage{Error: err.Error()}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Fetching the backend information
|
|
|
|
backendInfo := objectAPI.BackendInfo()
|
|
|
|
if backendInfo.Type == madmin.Erasure {
|
|
|
|
// Calculate the number of online/offline disks of all nodes
|
|
|
|
var allDisks []madmin.Disk
|
|
|
|
for _, s := range servers {
|
|
|
|
allDisks = append(allDisks, s.Disks...)
|
|
|
|
}
|
|
|
|
onlineDisks, offlineDisks := getOnlineOfflineDisksStats(allDisks)
|
|
|
|
|
|
|
|
backend = madmin.ErasureBackend{
|
|
|
|
Type: madmin.ErasureType,
|
|
|
|
OnlineDisks: onlineDisks.Sum(),
|
|
|
|
OfflineDisks: offlineDisks.Sum(),
|
|
|
|
StandardSCParity: backendInfo.StandardSCParity,
|
|
|
|
RRSCParity: backendInfo.RRSCParity,
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
backend = madmin.FSBackend{
|
|
|
|
Type: madmin.FsType,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
domain := globalDomainNames
|
|
|
|
services := madmin.Services{
|
|
|
|
KMS: kmsStat,
|
|
|
|
LDAP: ldap,
|
|
|
|
Logger: log,
|
|
|
|
Audit: audit,
|
|
|
|
Notifications: notifyTarget,
|
|
|
|
}
|
|
|
|
|
|
|
|
return madmin.InfoMessage{
|
|
|
|
Mode: string(mode),
|
|
|
|
Domain: domain,
|
|
|
|
Region: globalServerRegion,
|
|
|
|
SQSARN: globalNotificationSys.GetARNList(false),
|
|
|
|
DeploymentID: globalDeploymentID,
|
|
|
|
Buckets: buckets,
|
|
|
|
Objects: objects,
|
|
|
|
Usage: usage,
|
|
|
|
Services: services,
|
|
|
|
Backend: backend,
|
|
|
|
Servers: servers,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-11-20 15:52:53 -05:00
|
|
|
// HealthInfoHandler - GET /minio/admin/v3/healthinfo
|
2020-03-27 00:07:39 -04:00
|
|
|
// ----------
|
2020-11-20 15:52:53 -05:00
|
|
|
// Get server health info
|
|
|
|
func (a adminAPIHandlers) HealthInfoHandler(w http.ResponseWriter, r *http.Request) {
|
|
|
|
ctx := newContext(r, w, "HealthInfo")
|
2020-05-11 13:34:08 -04:00
|
|
|
|
2021-01-26 16:21:51 -05:00
|
|
|
defer logger.AuditLog(ctx, w, r, mustGetClaimsFromToken(r))
|
2020-05-11 13:34:08 -04:00
|
|
|
|
2020-11-20 15:52:53 -05:00
|
|
|
objectAPI, _ := validateAdminReq(ctx, w, r, iampolicy.HealthInfoAdminAction)
|
2020-03-27 00:07:39 -04:00
|
|
|
if objectAPI == nil {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2020-09-15 21:02:54 -04:00
|
|
|
query := r.URL.Query()
|
2021-06-01 11:55:49 -04:00
|
|
|
healthInfo := madmin.HealthInfo{Version: madmin.HealthInfoVersion}
|
2020-11-20 15:52:53 -05:00
|
|
|
healthInfoCh := make(chan madmin.HealthInfo)
|
2020-03-27 00:07:39 -04:00
|
|
|
|
2020-03-31 04:15:21 -04:00
|
|
|
enc := json.NewEncoder(w)
|
2020-11-20 15:52:53 -05:00
|
|
|
partialWrite := func(oinfo madmin.HealthInfo) {
|
|
|
|
healthInfoCh <- oinfo
|
2020-04-14 14:48:32 -04:00
|
|
|
}
|
|
|
|
|
2020-04-16 13:56:18 -04:00
|
|
|
setCommonHeaders(w)
|
2020-07-30 22:45:12 -04:00
|
|
|
|
|
|
|
setEventStreamHeaders(w)
|
|
|
|
|
2020-04-16 13:56:18 -04:00
|
|
|
w.WriteHeader(http.StatusOK)
|
2020-03-27 00:07:39 -04:00
|
|
|
|
|
|
|
errResp := func(err error) {
|
|
|
|
errorResponse := getAPIErrorResponse(ctx, toAdminAPIErr(ctx, err), r.URL.String(),
|
|
|
|
w.Header().Get(xhttp.AmzRequestID), globalDeploymentID)
|
|
|
|
encodedErrorResponse := encodeResponse(errorResponse)
|
2020-11-20 15:52:53 -05:00
|
|
|
healthInfo.Error = string(encodedErrorResponse)
|
|
|
|
logger.LogIf(ctx, enc.Encode(healthInfo))
|
2020-03-27 00:07:39 -04:00
|
|
|
}
|
|
|
|
|
2021-06-01 11:55:49 -04:00
|
|
|
deadline := 1 * time.Hour
|
2020-04-16 13:56:18 -04:00
|
|
|
if dstr := r.URL.Query().Get("deadline"); dstr != "" {
|
2020-04-14 14:48:32 -04:00
|
|
|
var err error
|
2020-04-16 13:56:18 -04:00
|
|
|
deadline, err = time.ParseDuration(dstr)
|
2020-04-14 14:48:32 -04:00
|
|
|
if err != nil {
|
|
|
|
errResp(err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-04-27 19:12:50 -04:00
|
|
|
deadlinedCtx, deadlineCancel := context.WithTimeout(ctx, deadline)
|
|
|
|
defer deadlineCancel()
|
2020-04-14 14:48:32 -04:00
|
|
|
|
2020-11-20 15:52:53 -05:00
|
|
|
nsLock := objectAPI.NewNSLock(minioMetaBucket, "health-check-in-progress")
|
2021-04-29 23:55:21 -04:00
|
|
|
lkctx, err := nsLock.GetLock(ctx, newDynamicTimeout(deadline, deadline))
|
2021-03-03 21:36:43 -05:00
|
|
|
if err != nil { // returns a locked lock
|
2020-03-27 00:07:39 -04:00
|
|
|
errResp(err)
|
|
|
|
return
|
|
|
|
}
|
2021-04-29 23:55:21 -04:00
|
|
|
defer nsLock.Unlock(lkctx.Cancel)
|
2020-03-27 00:07:39 -04:00
|
|
|
|
2020-04-16 13:56:18 -04:00
|
|
|
go func() {
|
2020-11-20 15:52:53 -05:00
|
|
|
defer close(healthInfoCh)
|
2020-03-27 00:07:39 -04:00
|
|
|
|
2021-06-01 11:55:49 -04:00
|
|
|
partialWrite(healthInfo) // Write first message with only version populated
|
2020-03-27 00:07:39 -04:00
|
|
|
|
2021-06-01 11:55:49 -04:00
|
|
|
if query.Get("syscpu") == "true" {
|
|
|
|
healthInfo.Sys.CPUInfo = append(healthInfo.Sys.CPUInfo, madmin.GetCPUs(deadlinedCtx, r.Host))
|
|
|
|
healthInfo.Sys.CPUInfo = append(healthInfo.Sys.CPUInfo, globalNotificationSys.GetCPUs(deadlinedCtx)...)
|
2020-11-20 15:52:53 -05:00
|
|
|
partialWrite(healthInfo)
|
2020-04-16 13:56:18 -04:00
|
|
|
}
|
2020-03-27 00:07:39 -04:00
|
|
|
|
2021-06-01 11:55:49 -04:00
|
|
|
if query.Get("sysdrivehw") == "true" {
|
|
|
|
healthInfo.Sys.Partitions = append(healthInfo.Sys.Partitions, madmin.GetPartitions(deadlinedCtx, r.Host))
|
|
|
|
healthInfo.Sys.Partitions = append(healthInfo.Sys.Partitions, globalNotificationSys.GetPartitions(deadlinedCtx)...)
|
2020-11-20 15:52:53 -05:00
|
|
|
partialWrite(healthInfo)
|
2020-04-16 13:56:18 -04:00
|
|
|
}
|
2020-03-27 00:07:39 -04:00
|
|
|
|
2021-06-01 11:55:49 -04:00
|
|
|
if query.Get("sysosinfo") == "true" {
|
|
|
|
healthInfo.Sys.OSInfo = append(healthInfo.Sys.OSInfo, madmin.GetOSInfo(deadlinedCtx, r.Host))
|
|
|
|
healthInfo.Sys.OSInfo = append(healthInfo.Sys.OSInfo, globalNotificationSys.GetOSInfo(deadlinedCtx)...)
|
2020-11-20 15:52:53 -05:00
|
|
|
partialWrite(healthInfo)
|
2020-04-16 13:56:18 -04:00
|
|
|
}
|
2020-03-27 00:07:39 -04:00
|
|
|
|
2021-06-01 11:55:49 -04:00
|
|
|
if query.Get("sysmem") == "true" {
|
|
|
|
healthInfo.Sys.MemInfo = append(healthInfo.Sys.MemInfo, madmin.GetMemInfo(deadlinedCtx, r.Host))
|
|
|
|
healthInfo.Sys.MemInfo = append(healthInfo.Sys.MemInfo, globalNotificationSys.GetMemInfo(deadlinedCtx)...)
|
2020-11-20 15:52:53 -05:00
|
|
|
partialWrite(healthInfo)
|
2020-04-16 13:56:18 -04:00
|
|
|
}
|
2020-03-27 00:07:39 -04:00
|
|
|
|
2021-06-01 11:55:49 -04:00
|
|
|
if query.Get("sysprocess") == "true" {
|
|
|
|
healthInfo.Sys.ProcInfo = append(healthInfo.Sys.ProcInfo, madmin.GetProcInfo(deadlinedCtx, r.Host))
|
|
|
|
healthInfo.Sys.ProcInfo = append(healthInfo.Sys.ProcInfo, globalNotificationSys.GetProcInfo(deadlinedCtx)...)
|
2020-11-20 15:52:53 -05:00
|
|
|
partialWrite(healthInfo)
|
2020-03-27 00:07:39 -04:00
|
|
|
}
|
2020-04-16 13:56:18 -04:00
|
|
|
|
2021-06-01 11:55:49 -04:00
|
|
|
if query.Get("minioconfig") == "true" {
|
|
|
|
config, err := readServerConfig(ctx, objectAPI)
|
|
|
|
if err != nil {
|
|
|
|
healthInfo.Minio.Config = madmin.MinioConfig{
|
|
|
|
Error: err.Error(),
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
healthInfo.Minio.Config = madmin.MinioConfig{
|
2021-06-03 11:15:44 -04:00
|
|
|
Config: config.RedactSensitiveInfo(),
|
2021-06-01 11:55:49 -04:00
|
|
|
}
|
|
|
|
}
|
2020-11-20 15:52:53 -05:00
|
|
|
partialWrite(healthInfo)
|
2020-03-27 00:07:39 -04:00
|
|
|
}
|
|
|
|
|
2021-06-01 11:55:49 -04:00
|
|
|
if query.Get("perfdrive") == "true" {
|
|
|
|
healthInfo.Perf.Drives = append(healthInfo.Perf.Drives, getDrivePerfInfos(deadlinedCtx, r.Host))
|
2020-11-20 15:52:53 -05:00
|
|
|
partialWrite(healthInfo)
|
|
|
|
|
2021-06-01 11:55:49 -04:00
|
|
|
perfCh := globalNotificationSys.GetDrivePerfInfos(deadlinedCtx)
|
|
|
|
for perfInfo := range perfCh {
|
|
|
|
healthInfo.Perf.Drives = append(healthInfo.Perf.Drives, perfInfo)
|
2020-11-20 15:52:53 -05:00
|
|
|
partialWrite(healthInfo)
|
2020-05-22 20:56:45 -04:00
|
|
|
}
|
2021-06-01 11:55:49 -04:00
|
|
|
|
2020-11-20 15:52:53 -05:00
|
|
|
partialWrite(healthInfo)
|
2020-03-27 00:07:39 -04:00
|
|
|
}
|
|
|
|
|
2021-06-01 11:55:49 -04:00
|
|
|
if globalIsDistErasure && query.Get("perfnet") == "true" {
|
|
|
|
healthInfo.Perf.Net = append(healthInfo.Perf.Net, globalNotificationSys.GetNetPerfInfo(deadlinedCtx))
|
2020-11-20 15:52:53 -05:00
|
|
|
partialWrite(healthInfo)
|
2020-05-22 20:56:45 -04:00
|
|
|
|
2020-11-20 15:52:53 -05:00
|
|
|
netInfos := globalNotificationSys.DispatchNetPerfChan(deadlinedCtx)
|
|
|
|
for netInfo := range netInfos {
|
|
|
|
healthInfo.Perf.Net = append(healthInfo.Perf.Net, netInfo)
|
|
|
|
partialWrite(healthInfo)
|
2020-05-22 20:56:45 -04:00
|
|
|
}
|
2020-11-20 15:52:53 -05:00
|
|
|
partialWrite(healthInfo)
|
2020-05-22 20:56:45 -04:00
|
|
|
|
2021-06-01 11:55:49 -04:00
|
|
|
healthInfo.Perf.NetParallel = globalNotificationSys.GetParallelNetPerfInfo(deadlinedCtx)
|
2020-11-20 15:52:53 -05:00
|
|
|
partialWrite(healthInfo)
|
2020-04-16 13:56:18 -04:00
|
|
|
}
|
2020-09-15 21:02:54 -04:00
|
|
|
|
2021-06-01 11:55:49 -04:00
|
|
|
if query.Get("minioinfo") == "true" {
|
|
|
|
infoMessage := getServerInfo(ctx, r)
|
|
|
|
servers := []madmin.ServerInfo{}
|
|
|
|
for _, server := range infoMessage.Servers {
|
|
|
|
servers = append(servers, madmin.ServerInfo{
|
|
|
|
State: server.State,
|
|
|
|
Endpoint: server.Endpoint,
|
|
|
|
Uptime: server.Uptime,
|
|
|
|
Version: server.Version,
|
|
|
|
CommitID: server.CommitID,
|
|
|
|
Network: server.Network,
|
|
|
|
Drives: server.Disks,
|
|
|
|
PoolNumber: server.PoolNumber,
|
|
|
|
MemStats: madmin.MemStats{
|
|
|
|
Alloc: server.MemStats.Alloc,
|
|
|
|
TotalAlloc: server.MemStats.TotalAlloc,
|
|
|
|
Mallocs: server.MemStats.Mallocs,
|
|
|
|
Frees: server.MemStats.Frees,
|
|
|
|
HeapAlloc: server.MemStats.HeapAlloc,
|
|
|
|
},
|
|
|
|
})
|
|
|
|
}
|
|
|
|
healthInfo.Minio.Info = madmin.MinioInfo{
|
|
|
|
Mode: infoMessage.Mode,
|
|
|
|
Domain: infoMessage.Domain,
|
|
|
|
Region: infoMessage.Region,
|
|
|
|
SQSARN: infoMessage.SQSARN,
|
|
|
|
DeploymentID: infoMessage.DeploymentID,
|
|
|
|
Buckets: infoMessage.Buckets,
|
|
|
|
Objects: infoMessage.Objects,
|
|
|
|
Usage: infoMessage.Usage,
|
|
|
|
Services: infoMessage.Services,
|
|
|
|
Backend: infoMessage.Backend,
|
|
|
|
Servers: servers,
|
|
|
|
}
|
|
|
|
partialWrite(healthInfo)
|
|
|
|
}
|
2020-04-16 13:56:18 -04:00
|
|
|
}()
|
2020-03-27 00:07:39 -04:00
|
|
|
|
2021-01-06 16:29:50 -05:00
|
|
|
ticker := time.NewTicker(5 * time.Second)
|
2020-04-16 13:56:18 -04:00
|
|
|
defer ticker.Stop()
|
2020-03-27 00:07:39 -04:00
|
|
|
|
2020-04-16 13:56:18 -04:00
|
|
|
for {
|
|
|
|
select {
|
2020-11-20 15:52:53 -05:00
|
|
|
case oinfo, ok := <-healthInfoCh:
|
2020-04-16 13:56:18 -04:00
|
|
|
if !ok {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
logger.LogIf(ctx, enc.Encode(oinfo))
|
|
|
|
w.(http.Flusher).Flush()
|
|
|
|
case <-ticker.C:
|
|
|
|
if _, err := w.Write([]byte(" ")); err != nil {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
w.(http.Flusher).Flush()
|
|
|
|
case <-deadlinedCtx.Done():
|
|
|
|
w.(http.Flusher).Flush()
|
|
|
|
return
|
|
|
|
}
|
2020-03-27 00:07:39 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
}
|
|
|
|
|
2020-10-09 23:36:00 -04:00
|
|
|
// BandwidthMonitorHandler - GET /minio/admin/v3/bandwidth
|
|
|
|
// ----------
|
|
|
|
// Get bandwidth consumption information
|
|
|
|
func (a adminAPIHandlers) BandwidthMonitorHandler(w http.ResponseWriter, r *http.Request) {
|
|
|
|
ctx := newContext(r, w, "BandwidthMonitor")
|
|
|
|
|
2021-01-26 16:21:51 -05:00
|
|
|
defer logger.AuditLog(ctx, w, r, mustGetClaimsFromToken(r))
|
2020-12-03 14:34:42 -05:00
|
|
|
|
2020-10-09 23:36:00 -04:00
|
|
|
// Validate request signature.
|
2020-12-18 14:51:15 -05:00
|
|
|
_, adminAPIErr := checkAdminRequestAuth(ctx, r, iampolicy.BandwidthMonitorAction, "")
|
2020-10-09 23:36:00 -04:00
|
|
|
if adminAPIErr != ErrNone {
|
|
|
|
writeErrorResponseJSON(ctx, w, errorCodes.ToAPIErr(adminAPIErr), r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2021-04-05 19:07:53 -04:00
|
|
|
rnd := rand.New(rand.NewSource(time.Now().UnixNano()))
|
|
|
|
|
2020-10-09 23:36:00 -04:00
|
|
|
setEventStreamHeaders(w)
|
2021-04-18 15:41:13 -04:00
|
|
|
reportCh := make(chan madmin.BucketBandwidthReport)
|
2020-12-03 14:34:42 -05:00
|
|
|
keepAliveTicker := time.NewTicker(500 * time.Millisecond)
|
|
|
|
defer keepAliveTicker.Stop()
|
2020-10-09 23:36:00 -04:00
|
|
|
bucketsRequestedString := r.URL.Query().Get("buckets")
|
2020-10-12 12:04:55 -04:00
|
|
|
bucketsRequested := strings.Split(bucketsRequestedString, ",")
|
2020-12-03 14:34:42 -05:00
|
|
|
go func() {
|
2021-04-05 19:07:53 -04:00
|
|
|
defer close(reportCh)
|
2020-12-03 14:34:42 -05:00
|
|
|
for {
|
|
|
|
select {
|
|
|
|
case <-ctx.Done():
|
|
|
|
return
|
2021-04-05 19:07:53 -04:00
|
|
|
case reportCh <- globalNotificationSys.GetBandwidthReports(ctx, bucketsRequested...):
|
|
|
|
time.Sleep(time.Duration(rnd.Float64() * float64(2*time.Second)))
|
2020-12-03 14:34:42 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}()
|
|
|
|
for {
|
|
|
|
select {
|
2021-04-05 19:07:53 -04:00
|
|
|
case report, ok := <-reportCh:
|
|
|
|
if !ok {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
if err := json.NewEncoder(w).Encode(report); err != nil {
|
|
|
|
writeErrorResponseJSON(ctx, w, toAPIError(ctx, err), r.URL)
|
2020-12-03 14:34:42 -05:00
|
|
|
return
|
|
|
|
}
|
|
|
|
w.(http.Flusher).Flush()
|
|
|
|
case <-keepAliveTicker.C:
|
|
|
|
if _, err := w.Write([]byte(" ")); err != nil {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
w.(http.Flusher).Flush()
|
|
|
|
case <-ctx.Done():
|
|
|
|
return
|
|
|
|
}
|
2020-10-09 23:36:00 -04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-04-07 22:30:59 -04:00
|
|
|
// ServerInfoHandler - GET /minio/admin/v3/info
|
2019-12-11 17:27:03 -05:00
|
|
|
// ----------
|
|
|
|
// Get server information
|
|
|
|
func (a adminAPIHandlers) ServerInfoHandler(w http.ResponseWriter, r *http.Request) {
|
|
|
|
ctx := newContext(r, w, "ServerInfo")
|
2020-05-11 13:34:08 -04:00
|
|
|
|
2021-01-26 16:21:51 -05:00
|
|
|
defer logger.AuditLog(ctx, w, r, mustGetClaimsFromToken(r))
|
2020-05-11 13:34:08 -04:00
|
|
|
|
2020-12-21 12:35:19 -05:00
|
|
|
// Validate request signature.
|
|
|
|
_, adminAPIErr := checkAdminRequestAuth(ctx, r, iampolicy.ServerInfoAdminAction, "")
|
|
|
|
if adminAPIErr != ErrNone {
|
|
|
|
writeErrorResponseJSON(ctx, w, errorCodes.ToAPIErr(adminAPIErr), r.URL)
|
2019-12-11 17:27:03 -05:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
// Marshal API response
|
2021-06-01 11:55:49 -04:00
|
|
|
jsonBytes, err := json.Marshal(getServerInfo(ctx, r))
|
2019-12-11 17:27:03 -05:00
|
|
|
if err != nil {
|
|
|
|
writeErrorResponseJSON(ctx, w, toAdminAPIErr(ctx, err), r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2020-10-02 19:19:44 -04:00
|
|
|
// Reply with storage information (across nodes in a
|
2019-12-11 17:27:03 -05:00
|
|
|
// distributed setup) as json.
|
|
|
|
writeSuccessResponseJSON(w, jsonBytes)
|
|
|
|
}
|
|
|
|
|
2021-03-01 11:09:43 -05:00
|
|
|
func assignPoolNumbers(servers []madmin.ServerProperties) {
|
|
|
|
for i := range servers {
|
|
|
|
for idx, ge := range globalEndpoints {
|
|
|
|
for _, endpoint := range ge.Endpoints {
|
|
|
|
if servers[i].Endpoint == endpoint.Host {
|
|
|
|
servers[i].PoolNumber = idx + 1
|
|
|
|
} else if host, err := xnet.ParseHost(servers[i].Endpoint); err == nil {
|
|
|
|
if host.Name == endpoint.Hostname() {
|
|
|
|
servers[i].PoolNumber = idx + 1
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-10-02 19:19:44 -04:00
|
|
|
func fetchLambdaInfo() []map[string][]madmin.TargetIDStatus {
|
2020-04-14 14:19:25 -04:00
|
|
|
|
2020-02-01 07:20:04 -05:00
|
|
|
lambdaMap := make(map[string][]madmin.TargetIDStatus)
|
2019-12-11 17:27:03 -05:00
|
|
|
|
2020-10-02 19:19:44 -04:00
|
|
|
for _, tgt := range globalConfigTargetList.Targets() {
|
|
|
|
targetIDStatus := make(map[string]madmin.Status)
|
|
|
|
active, _ := tgt.IsActive()
|
|
|
|
targetID := tgt.ID()
|
|
|
|
if active {
|
2021-03-02 20:28:04 -05:00
|
|
|
targetIDStatus[targetID.ID] = madmin.Status{Status: string(madmin.ItemOnline)}
|
2020-10-02 19:19:44 -04:00
|
|
|
} else {
|
2021-03-02 20:28:04 -05:00
|
|
|
targetIDStatus[targetID.ID] = madmin.Status{Status: string(madmin.ItemOffline)}
|
2020-10-02 19:19:44 -04:00
|
|
|
}
|
|
|
|
list := lambdaMap[targetID.Name]
|
|
|
|
list = append(list, targetIDStatus)
|
|
|
|
lambdaMap[targetID.Name] = list
|
|
|
|
}
|
|
|
|
|
|
|
|
for _, tgt := range globalEnvTargetList.Targets() {
|
2019-12-11 17:27:03 -05:00
|
|
|
targetIDStatus := make(map[string]madmin.Status)
|
2020-10-02 19:19:44 -04:00
|
|
|
active, _ := tgt.IsActive()
|
|
|
|
targetID := tgt.ID()
|
2019-12-11 17:27:03 -05:00
|
|
|
if active {
|
2021-03-02 20:28:04 -05:00
|
|
|
targetIDStatus[targetID.ID] = madmin.Status{Status: string(madmin.ItemOnline)}
|
2019-12-11 17:27:03 -05:00
|
|
|
} else {
|
2021-03-02 20:28:04 -05:00
|
|
|
targetIDStatus[targetID.ID] = madmin.Status{Status: string(madmin.ItemOffline)}
|
2019-12-11 17:27:03 -05:00
|
|
|
}
|
|
|
|
list := lambdaMap[targetID.Name]
|
|
|
|
list = append(list, targetIDStatus)
|
|
|
|
lambdaMap[targetID.Name] = list
|
|
|
|
}
|
|
|
|
|
|
|
|
notify := make([]map[string][]madmin.TargetIDStatus, len(lambdaMap))
|
|
|
|
counter := 0
|
|
|
|
for key, value := range lambdaMap {
|
|
|
|
v := make(map[string][]madmin.TargetIDStatus)
|
|
|
|
v[key] = value
|
|
|
|
notify[counter] = v
|
|
|
|
counter++
|
|
|
|
}
|
|
|
|
return notify
|
|
|
|
}
|
|
|
|
|
2021-01-29 20:55:37 -05:00
|
|
|
// fetchKMSStatus fetches KMS-related status information.
|
|
|
|
func fetchKMSStatus() madmin.KMS {
|
|
|
|
kmsStat := madmin.KMS{}
|
2019-12-11 17:27:03 -05:00
|
|
|
if GlobalKMS == nil {
|
2021-01-29 20:55:37 -05:00
|
|
|
kmsStat.Status = "disabled"
|
|
|
|
return kmsStat
|
2019-12-11 17:27:03 -05:00
|
|
|
}
|
|
|
|
|
2021-04-15 11:47:33 -04:00
|
|
|
stat, err := GlobalKMS.Stat()
|
|
|
|
if err != nil {
|
2021-03-02 20:28:04 -05:00
|
|
|
kmsStat.Status = string(madmin.ItemOffline)
|
2021-04-15 11:47:33 -04:00
|
|
|
return kmsStat
|
|
|
|
}
|
|
|
|
if len(stat.Endpoints) == 0 {
|
|
|
|
kmsStat.Status = stat.Name
|
2021-04-22 11:45:30 -04:00
|
|
|
return kmsStat
|
|
|
|
}
|
|
|
|
kmsStat.Status = string(madmin.ItemOnline)
|
2019-12-11 17:27:03 -05:00
|
|
|
|
2021-04-22 11:45:30 -04:00
|
|
|
kmsContext := kms.Context{"MinIO admin API": "ServerInfoHandler"} // Context for a test key operation
|
|
|
|
// 1. Generate a new key using the KMS.
|
|
|
|
key, err := GlobalKMS.GenerateKey("", kmsContext)
|
|
|
|
if err != nil {
|
|
|
|
kmsStat.Encrypt = fmt.Sprintf("Encryption failed: %v", err)
|
|
|
|
} else {
|
|
|
|
kmsStat.Encrypt = "success"
|
|
|
|
}
|
2021-04-15 11:47:33 -04:00
|
|
|
|
2021-04-22 11:45:30 -04:00
|
|
|
// 2. Verify that we can indeed decrypt the (encrypted) key
|
|
|
|
decryptedKey, err := GlobalKMS.DecryptKey(key.KeyID, key.Ciphertext, kmsContext)
|
|
|
|
switch {
|
|
|
|
case err != nil:
|
|
|
|
kmsStat.Decrypt = fmt.Sprintf("Decryption failed: %v", err)
|
|
|
|
case subtle.ConstantTimeCompare(key.Plaintext, decryptedKey) != 1:
|
|
|
|
kmsStat.Decrypt = "Decryption failed: decrypted key does not match generated key"
|
|
|
|
default:
|
|
|
|
kmsStat.Decrypt = "success"
|
2019-12-11 17:27:03 -05:00
|
|
|
}
|
2021-01-29 20:55:37 -05:00
|
|
|
return kmsStat
|
2019-12-11 17:27:03 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
// fetchLoggerDetails return log info
|
2020-10-02 19:19:44 -04:00
|
|
|
func fetchLoggerInfo() ([]madmin.Logger, []madmin.Audit) {
|
|
|
|
var loggerInfo []madmin.Logger
|
|
|
|
var auditloggerInfo []madmin.Audit
|
|
|
|
for _, target := range logger.Targets {
|
|
|
|
if target.Endpoint() != "" {
|
|
|
|
tgt := target.String()
|
|
|
|
err := checkConnection(target.Endpoint(), 15*time.Second)
|
2019-12-11 17:27:03 -05:00
|
|
|
if err == nil {
|
|
|
|
mapLog := make(map[string]madmin.Status)
|
2021-03-02 20:28:04 -05:00
|
|
|
mapLog[tgt] = madmin.Status{Status: string(madmin.ItemOnline)}
|
2020-10-02 19:19:44 -04:00
|
|
|
loggerInfo = append(loggerInfo, mapLog)
|
2019-12-11 17:27:03 -05:00
|
|
|
} else {
|
|
|
|
mapLog := make(map[string]madmin.Status)
|
2021-03-02 20:28:04 -05:00
|
|
|
mapLog[tgt] = madmin.Status{Status: string(madmin.ItemOffline)}
|
2020-10-02 19:19:44 -04:00
|
|
|
loggerInfo = append(loggerInfo, mapLog)
|
2019-12-11 17:27:03 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-10-02 19:19:44 -04:00
|
|
|
for _, target := range logger.AuditTargets {
|
|
|
|
if target.Endpoint() != "" {
|
|
|
|
tgt := target.String()
|
|
|
|
err := checkConnection(target.Endpoint(), 15*time.Second)
|
2019-12-11 17:27:03 -05:00
|
|
|
if err == nil {
|
|
|
|
mapAudit := make(map[string]madmin.Status)
|
2021-03-02 20:28:04 -05:00
|
|
|
mapAudit[tgt] = madmin.Status{Status: string(madmin.ItemOnline)}
|
2020-10-02 19:19:44 -04:00
|
|
|
auditloggerInfo = append(auditloggerInfo, mapAudit)
|
2019-12-11 17:27:03 -05:00
|
|
|
} else {
|
|
|
|
mapAudit := make(map[string]madmin.Status)
|
2021-03-02 20:28:04 -05:00
|
|
|
mapAudit[tgt] = madmin.Status{Status: string(madmin.ItemOffline)}
|
2020-10-02 19:19:44 -04:00
|
|
|
auditloggerInfo = append(auditloggerInfo, mapAudit)
|
2019-12-11 17:27:03 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2020-10-02 19:19:44 -04:00
|
|
|
|
|
|
|
return loggerInfo, auditloggerInfo
|
2019-12-11 17:27:03 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
// checkConnection - ping an endpoint , return err in case of no connection
|
2020-02-01 20:45:29 -05:00
|
|
|
func checkConnection(endpointStr string, timeout time.Duration) error {
|
2020-04-28 16:57:56 -04:00
|
|
|
ctx, cancel := context.WithTimeout(GlobalContext, timeout)
|
|
|
|
defer cancel()
|
|
|
|
|
2020-08-04 17:55:53 -04:00
|
|
|
client := &http.Client{Transport: &http.Transport{
|
|
|
|
Proxy: http.ProxyFromEnvironment,
|
|
|
|
DialContext: xhttp.NewCustomDialContext(timeout),
|
|
|
|
ResponseHeaderTimeout: 5 * time.Second,
|
|
|
|
TLSHandshakeTimeout: 5 * time.Second,
|
|
|
|
ExpectContinueTimeout: 5 * time.Second,
|
|
|
|
TLSClientConfig: &tls.Config{RootCAs: globalRootCAs},
|
|
|
|
// Go net/http automatically unzip if content-type is
|
|
|
|
// gzip disable this feature, as we are always interested
|
|
|
|
// in raw stream.
|
|
|
|
DisableCompression: true,
|
|
|
|
}}
|
|
|
|
defer client.CloseIdleConnections()
|
|
|
|
|
2020-09-08 17:22:04 -04:00
|
|
|
req, err := http.NewRequestWithContext(ctx, http.MethodHead, endpointStr, nil)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
resp, err := client.Do(req)
|
2020-04-28 16:57:56 -04:00
|
|
|
if err != nil {
|
|
|
|
return err
|
2019-12-11 17:27:03 -05:00
|
|
|
}
|
2020-04-28 16:57:56 -04:00
|
|
|
defer xhttp.DrainBody(resp.Body)
|
2019-12-11 17:27:03 -05:00
|
|
|
return nil
|
|
|
|
}
|