2016-12-16 01:26:15 -05:00
|
|
|
/*
|
2017-01-17 13:02:58 -05:00
|
|
|
* Minio Cloud Storage, (C) 2016, 2017 Minio, Inc.
|
2016-12-16 01:26:15 -05:00
|
|
|
*
|
|
|
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
* you may not use this file except in compliance with the License.
|
|
|
|
* You may obtain a copy of the License at
|
|
|
|
*
|
|
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
*
|
|
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
|
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
* See the License for the specific language governing permissions and
|
|
|
|
* limitations under the License.
|
|
|
|
*/
|
|
|
|
|
|
|
|
package cmd
|
|
|
|
|
|
|
|
import (
|
|
|
|
"encoding/json"
|
2017-01-17 17:25:59 -05:00
|
|
|
"encoding/xml"
|
|
|
|
"io/ioutil"
|
2016-12-16 01:26:15 -05:00
|
|
|
"net/http"
|
2017-01-04 02:39:22 -05:00
|
|
|
"net/url"
|
2017-01-17 13:02:58 -05:00
|
|
|
"strconv"
|
2017-01-04 02:39:22 -05:00
|
|
|
"time"
|
2016-12-16 01:26:15 -05:00
|
|
|
)
|
|
|
|
|
|
|
|
const (
|
|
|
|
minioAdminOpHeader = "X-Minio-Operation"
|
|
|
|
)
|
|
|
|
|
2017-01-17 13:02:58 -05:00
|
|
|
// Type-safe query params.
|
|
|
|
type mgmtQueryKey string
|
|
|
|
|
|
|
|
// Only valid query params for list/clear locks management APIs.
|
|
|
|
const (
|
2017-02-01 14:17:30 -05:00
|
|
|
mgmtBucket mgmtQueryKey = "bucket"
|
|
|
|
mgmtObject mgmtQueryKey = "object"
|
|
|
|
mgmtPrefix mgmtQueryKey = "prefix"
|
|
|
|
mgmtLockDuration mgmtQueryKey = "duration"
|
|
|
|
mgmtDelimiter mgmtQueryKey = "delimiter"
|
|
|
|
mgmtMarker mgmtQueryKey = "marker"
|
|
|
|
mgmtMaxKey mgmtQueryKey = "max-key"
|
|
|
|
mgmtDryRun mgmtQueryKey = "dry-run"
|
2017-01-17 13:02:58 -05:00
|
|
|
)
|
|
|
|
|
2017-01-23 11:56:06 -05:00
|
|
|
// ServerVersion - server version
|
|
|
|
type ServerVersion struct {
|
|
|
|
Version string `json:"version"`
|
|
|
|
CommitID string `json:"commitID"`
|
|
|
|
}
|
|
|
|
|
|
|
|
// ServerStatus - contains the response of service status API
|
|
|
|
type ServerStatus struct {
|
|
|
|
ServerVersion ServerVersion `json:"serverVersion"`
|
2017-02-08 03:13:02 -05:00
|
|
|
Uptime time.Duration `json:"uptime"`
|
2017-01-23 11:56:06 -05:00
|
|
|
}
|
|
|
|
|
2016-12-20 21:49:48 -05:00
|
|
|
// ServiceStatusHandler - GET /?service
|
|
|
|
// HTTP header x-minio-operation: status
|
|
|
|
// ----------
|
2017-01-04 02:39:22 -05:00
|
|
|
// Fetches server status information like total disk space available
|
|
|
|
// to use, online disks, offline disks and quorum threshold.
|
2016-12-16 01:26:15 -05:00
|
|
|
func (adminAPI adminAPIHandlers) ServiceStatusHandler(w http.ResponseWriter, r *http.Request) {
|
|
|
|
adminAPIErr := checkRequestAuthType(r, "", "", "")
|
|
|
|
if adminAPIErr != ErrNone {
|
2017-01-06 03:37:00 -05:00
|
|
|
writeErrorResponse(w, adminAPIErr, r.URL)
|
2016-12-16 01:26:15 -05:00
|
|
|
return
|
|
|
|
}
|
2017-01-23 11:56:06 -05:00
|
|
|
|
|
|
|
// Fetch server version
|
|
|
|
serverVersion := ServerVersion{Version: Version, CommitID: CommitID}
|
|
|
|
|
2017-02-08 03:13:02 -05:00
|
|
|
// Fetch uptimes from all peers. This may fail to due to lack
|
|
|
|
// of read-quorum availability.
|
|
|
|
uptime, err := getPeerUptimes(globalAdminPeers)
|
|
|
|
if err != nil {
|
|
|
|
writeErrorResponse(w, toAPIErrorCode(err), r.URL)
|
|
|
|
errorIf(err, "Possibly failed to get uptime from majority of servers.")
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2017-01-23 11:56:06 -05:00
|
|
|
// Create API response
|
|
|
|
serverStatus := ServerStatus{
|
|
|
|
ServerVersion: serverVersion,
|
2017-02-08 03:13:02 -05:00
|
|
|
Uptime: uptime,
|
2017-01-23 11:56:06 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
// Marshal API response
|
|
|
|
jsonBytes, err := json.Marshal(serverStatus)
|
2016-12-16 01:26:15 -05:00
|
|
|
if err != nil {
|
2017-01-06 03:37:00 -05:00
|
|
|
writeErrorResponse(w, ErrInternalError, r.URL)
|
2016-12-16 01:26:15 -05:00
|
|
|
errorIf(err, "Failed to marshal storage info into json.")
|
2016-12-20 21:05:25 -05:00
|
|
|
return
|
2016-12-16 01:26:15 -05:00
|
|
|
}
|
2017-01-04 02:39:22 -05:00
|
|
|
// Reply with storage information (across nodes in a
|
|
|
|
// distributed setup) as json.
|
2017-01-06 03:37:00 -05:00
|
|
|
writeSuccessResponseJSON(w, jsonBytes)
|
2016-12-16 01:26:15 -05:00
|
|
|
}
|
|
|
|
|
2016-12-20 21:49:48 -05:00
|
|
|
// ServiceRestartHandler - POST /?service
|
|
|
|
// HTTP header x-minio-operation: restart
|
|
|
|
// ----------
|
2017-01-04 02:39:22 -05:00
|
|
|
// Restarts minio server gracefully. In a distributed setup, restarts
|
|
|
|
// all the servers in the cluster.
|
2016-12-16 01:26:15 -05:00
|
|
|
func (adminAPI adminAPIHandlers) ServiceRestartHandler(w http.ResponseWriter, r *http.Request) {
|
|
|
|
adminAPIErr := checkRequestAuthType(r, "", "", "")
|
|
|
|
if adminAPIErr != ErrNone {
|
2017-01-06 03:37:00 -05:00
|
|
|
writeErrorResponse(w, adminAPIErr, r.URL)
|
2016-12-16 01:26:15 -05:00
|
|
|
return
|
|
|
|
}
|
2017-01-06 03:37:00 -05:00
|
|
|
|
2016-12-16 01:26:15 -05:00
|
|
|
// Reply to the client before restarting minio server.
|
2017-01-17 13:02:58 -05:00
|
|
|
writeSuccessResponseHeadersOnly(w)
|
2017-01-06 03:37:00 -05:00
|
|
|
|
2016-12-16 01:26:15 -05:00
|
|
|
sendServiceCmd(globalAdminPeers, serviceRestart)
|
|
|
|
}
|
2017-01-04 02:39:22 -05:00
|
|
|
|
2017-01-17 17:25:59 -05:00
|
|
|
// setCredsReq request
|
|
|
|
type setCredsReq struct {
|
|
|
|
Username string `xml:"username"`
|
|
|
|
Password string `xml:"password"`
|
|
|
|
}
|
|
|
|
|
|
|
|
// ServiceCredsHandler - POST /?service
|
|
|
|
// HTTP header x-minio-operation: creds
|
|
|
|
// ----------
|
|
|
|
// Update credentials in a minio server. In a distributed setup, update all the servers
|
|
|
|
// in the cluster.
|
|
|
|
func (adminAPI adminAPIHandlers) ServiceCredentialsHandler(w http.ResponseWriter, r *http.Request) {
|
|
|
|
// Authenticate request
|
|
|
|
adminAPIErr := checkRequestAuthType(r, "", "", "")
|
|
|
|
if adminAPIErr != ErrNone {
|
|
|
|
writeErrorResponse(w, adminAPIErr, r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
// Avoid setting new credentials when they are already passed
|
2017-01-26 19:51:51 -05:00
|
|
|
// by the environment.
|
|
|
|
if globalIsEnvCreds {
|
2017-01-17 17:25:59 -05:00
|
|
|
writeErrorResponse(w, ErrMethodNotAllowed, r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
// Load request body
|
|
|
|
inputData, err := ioutil.ReadAll(r.Body)
|
|
|
|
if err != nil {
|
|
|
|
writeErrorResponse(w, ErrInternalError, r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
// Unmarshal request body
|
|
|
|
var req setCredsReq
|
|
|
|
err = xml.Unmarshal(inputData, &req)
|
|
|
|
if err != nil {
|
|
|
|
errorIf(err, "Cannot unmarshal credentials request")
|
|
|
|
writeErrorResponse(w, ErrMalformedXML, r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
// Check passed credentials
|
2017-02-07 15:51:43 -05:00
|
|
|
err = validateAuthKeys(req.Username, req.Password)
|
|
|
|
if err != nil {
|
|
|
|
writeErrorResponse(w, toAPIErrorCode(err), r.URL)
|
2017-01-17 17:25:59 -05:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2017-02-07 15:51:43 -05:00
|
|
|
creds := credential{
|
|
|
|
AccessKey: req.Username,
|
|
|
|
SecretKey: req.Password,
|
|
|
|
}
|
|
|
|
|
2017-01-17 17:25:59 -05:00
|
|
|
// Notify all other Minio peers to update credentials
|
2017-02-07 15:51:43 -05:00
|
|
|
updateErrs := updateCredsOnPeers(creds)
|
2017-01-17 17:25:59 -05:00
|
|
|
for peer, err := range updateErrs {
|
|
|
|
errorIf(err, "Unable to update credentials on peer %s.", peer)
|
|
|
|
}
|
|
|
|
|
2017-02-07 15:51:43 -05:00
|
|
|
// Update local credentials in memory.
|
|
|
|
serverConfig.SetCredential(creds)
|
2017-01-17 17:25:59 -05:00
|
|
|
if err = serverConfig.Save(); err != nil {
|
|
|
|
writeErrorResponse(w, ErrInternalError, r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
// At this stage, the operation is successful, return 200 OK
|
|
|
|
w.WriteHeader(http.StatusOK)
|
|
|
|
}
|
|
|
|
|
2017-02-15 13:45:45 -05:00
|
|
|
// ServerProperties holds some server information such as, version, region
|
|
|
|
// uptime, etc..
|
|
|
|
type ServerProperties struct {
|
|
|
|
Uptime time.Duration `json:"uptime"`
|
|
|
|
Version string `json:"version"`
|
|
|
|
CommitID string `json:"commitID"`
|
|
|
|
Region string `json:"region"`
|
|
|
|
SQSARN []string `json:"sqsARN"`
|
|
|
|
}
|
|
|
|
|
|
|
|
// ServerConnStats holds transferred bytes from/to the server
|
|
|
|
type ServerConnStats struct {
|
|
|
|
TotalInputBytes uint64 `json:"transferred"`
|
|
|
|
TotalOutputBytes uint64 `json:"received"`
|
|
|
|
Throughput uint64 `json:"throughput,omitempty"`
|
|
|
|
}
|
|
|
|
|
|
|
|
// ServerInfo holds the information that will be returned by ServerInfo API
|
|
|
|
type ServerInfo struct {
|
|
|
|
StorageInfo StorageInfo `json:"storage"`
|
|
|
|
ConnStats ServerConnStats `json:"network"`
|
|
|
|
Properties ServerProperties `json:"server"`
|
|
|
|
}
|
|
|
|
|
|
|
|
// ServerInfoHandler - GET /?server-info
|
|
|
|
// ----------
|
|
|
|
// Get server information
|
|
|
|
func (adminAPI adminAPIHandlers) ServerInfoHandler(w http.ResponseWriter, r *http.Request) {
|
|
|
|
// Authenticate request
|
|
|
|
adminAPIErr := checkRequestAuthType(r, "", "", "")
|
|
|
|
if adminAPIErr != ErrNone {
|
|
|
|
writeErrorResponse(w, adminAPIErr, r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
// Build storage info
|
|
|
|
objLayer := newObjectLayerFn()
|
|
|
|
if objLayer == nil {
|
|
|
|
writeErrorResponse(w, ErrServerNotInitialized, r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
storage := objLayer.StorageInfo()
|
|
|
|
|
|
|
|
// Build list of enabled ARNs queues
|
|
|
|
var arns []string
|
|
|
|
for queueArn := range globalEventNotifier.GetAllExternalTargets() {
|
|
|
|
arns = append(arns, queueArn)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Fetch uptimes from all peers. This may fail to due to lack
|
|
|
|
// of read-quorum availability.
|
|
|
|
uptime, err := getPeerUptimes(globalAdminPeers)
|
|
|
|
if err != nil {
|
|
|
|
writeErrorResponse(w, toAPIErrorCode(err), r.URL)
|
|
|
|
errorIf(err, "Unable to get uptime from majority of servers.")
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
// Build server properties information
|
|
|
|
properties := ServerProperties{
|
|
|
|
Version: Version,
|
|
|
|
CommitID: CommitID,
|
|
|
|
Region: serverConfig.GetRegion(),
|
|
|
|
SQSARN: arns,
|
|
|
|
Uptime: uptime,
|
|
|
|
}
|
|
|
|
|
|
|
|
// Build network info
|
|
|
|
connStats := ServerConnStats{
|
|
|
|
TotalInputBytes: globalConnStats.getTotalInputBytes(),
|
|
|
|
TotalOutputBytes: globalConnStats.getTotalOutputBytes(),
|
|
|
|
}
|
|
|
|
|
|
|
|
// Build the whole returned information
|
|
|
|
info := ServerInfo{
|
|
|
|
StorageInfo: storage,
|
|
|
|
ConnStats: connStats,
|
|
|
|
Properties: properties,
|
|
|
|
}
|
|
|
|
|
|
|
|
// Marshal API response
|
|
|
|
jsonBytes, err := json.Marshal(info)
|
|
|
|
if err != nil {
|
|
|
|
writeErrorResponse(w, ErrInternalError, r.URL)
|
|
|
|
errorIf(err, "Failed to marshal storage info into json.")
|
|
|
|
return
|
|
|
|
}
|
|
|
|
// Reply with storage information (across nodes in a
|
|
|
|
// distributed setup) as json.
|
|
|
|
writeSuccessResponseJSON(w, jsonBytes)
|
|
|
|
}
|
|
|
|
|
2017-01-04 02:39:22 -05:00
|
|
|
// validateLockQueryParams - Validates query params for list/clear locks management APIs.
|
|
|
|
func validateLockQueryParams(vars url.Values) (string, string, time.Duration, APIErrorCode) {
|
2017-01-17 13:02:58 -05:00
|
|
|
bucket := vars.Get(string(mgmtBucket))
|
|
|
|
prefix := vars.Get(string(mgmtPrefix))
|
2017-02-01 14:17:30 -05:00
|
|
|
durationStr := vars.Get(string(mgmtLockDuration))
|
2017-01-04 02:39:22 -05:00
|
|
|
|
|
|
|
// N B empty bucket name is invalid
|
|
|
|
if !IsValidBucketName(bucket) {
|
|
|
|
return "", "", time.Duration(0), ErrInvalidBucketName
|
|
|
|
}
|
|
|
|
// empty prefix is valid.
|
|
|
|
if !IsValidObjectPrefix(prefix) {
|
|
|
|
return "", "", time.Duration(0), ErrInvalidObjectName
|
|
|
|
}
|
|
|
|
|
|
|
|
// If older-than parameter was empty then set it to 0s to list
|
|
|
|
// all locks older than now.
|
2017-02-01 14:17:30 -05:00
|
|
|
if durationStr == "" {
|
|
|
|
durationStr = "0s"
|
2017-01-04 02:39:22 -05:00
|
|
|
}
|
2017-02-01 14:17:30 -05:00
|
|
|
duration, err := time.ParseDuration(durationStr)
|
2017-01-04 02:39:22 -05:00
|
|
|
if err != nil {
|
|
|
|
errorIf(err, "Failed to parse duration passed as query value.")
|
|
|
|
return "", "", time.Duration(0), ErrInvalidDuration
|
|
|
|
}
|
|
|
|
|
2017-02-01 14:17:30 -05:00
|
|
|
return bucket, prefix, duration, ErrNone
|
2017-01-04 02:39:22 -05:00
|
|
|
}
|
|
|
|
|
2017-02-01 14:17:30 -05:00
|
|
|
// ListLocksHandler - GET /?lock&bucket=mybucket&prefix=myprefix&duration=duration
|
2017-01-04 02:39:22 -05:00
|
|
|
// - bucket is a mandatory query parameter
|
|
|
|
// - prefix and older-than are optional query parameters
|
|
|
|
// HTTP header x-minio-operation: list
|
|
|
|
// ---------
|
2017-02-01 14:17:30 -05:00
|
|
|
// Lists locks held on a given bucket, prefix and duration it was held for.
|
2017-01-04 02:39:22 -05:00
|
|
|
func (adminAPI adminAPIHandlers) ListLocksHandler(w http.ResponseWriter, r *http.Request) {
|
|
|
|
adminAPIErr := checkRequestAuthType(r, "", "", "")
|
|
|
|
if adminAPIErr != ErrNone {
|
2017-01-06 03:37:00 -05:00
|
|
|
writeErrorResponse(w, adminAPIErr, r.URL)
|
2017-01-04 02:39:22 -05:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
vars := r.URL.Query()
|
2017-02-01 14:17:30 -05:00
|
|
|
bucket, prefix, duration, adminAPIErr := validateLockQueryParams(vars)
|
2017-01-04 02:39:22 -05:00
|
|
|
if adminAPIErr != ErrNone {
|
2017-01-06 03:37:00 -05:00
|
|
|
writeErrorResponse(w, adminAPIErr, r.URL)
|
2017-01-04 02:39:22 -05:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
// Fetch lock information of locks matching bucket/prefix that
|
2017-02-01 14:17:30 -05:00
|
|
|
// are available for longer than duration.
|
|
|
|
volLocks, err := listPeerLocksInfo(globalAdminPeers, bucket, prefix, duration)
|
2017-01-04 02:39:22 -05:00
|
|
|
if err != nil {
|
2017-01-06 03:37:00 -05:00
|
|
|
writeErrorResponse(w, ErrInternalError, r.URL)
|
2017-01-04 02:39:22 -05:00
|
|
|
errorIf(err, "Failed to fetch lock information from remote nodes.")
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
// Marshal list of locks as json.
|
|
|
|
jsonBytes, err := json.Marshal(volLocks)
|
|
|
|
if err != nil {
|
2017-01-06 03:37:00 -05:00
|
|
|
writeErrorResponse(w, ErrInternalError, r.URL)
|
2017-01-04 02:39:22 -05:00
|
|
|
errorIf(err, "Failed to marshal lock information into json.")
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
// Reply with list of locks held on bucket, matching prefix
|
2017-02-01 14:17:30 -05:00
|
|
|
// held longer than duration supplied, as json.
|
2017-01-06 03:37:00 -05:00
|
|
|
writeSuccessResponseJSON(w, jsonBytes)
|
2017-01-04 02:39:22 -05:00
|
|
|
}
|
|
|
|
|
2017-02-01 14:17:30 -05:00
|
|
|
// ClearLocksHandler - POST /?lock&bucket=mybucket&prefix=myprefix&duration=duration
|
2017-01-04 02:39:22 -05:00
|
|
|
// - bucket is a mandatory query parameter
|
|
|
|
// - prefix and older-than are optional query parameters
|
|
|
|
// HTTP header x-minio-operation: clear
|
|
|
|
// ---------
|
2017-02-01 14:17:30 -05:00
|
|
|
// Clear locks held on a given bucket, prefix and duration it was held for.
|
2017-01-04 02:39:22 -05:00
|
|
|
func (adminAPI adminAPIHandlers) ClearLocksHandler(w http.ResponseWriter, r *http.Request) {
|
|
|
|
adminAPIErr := checkRequestAuthType(r, "", "", "")
|
|
|
|
if adminAPIErr != ErrNone {
|
2017-01-06 03:37:00 -05:00
|
|
|
writeErrorResponse(w, adminAPIErr, r.URL)
|
2017-01-04 02:39:22 -05:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
vars := r.URL.Query()
|
2017-02-01 14:17:30 -05:00
|
|
|
bucket, prefix, duration, adminAPIErr := validateLockQueryParams(vars)
|
2017-01-04 02:39:22 -05:00
|
|
|
if adminAPIErr != ErrNone {
|
2017-01-06 03:37:00 -05:00
|
|
|
writeErrorResponse(w, adminAPIErr, r.URL)
|
2017-01-04 02:39:22 -05:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
// Fetch lock information of locks matching bucket/prefix that
|
2017-02-01 14:17:30 -05:00
|
|
|
// are held for longer than duration.
|
|
|
|
volLocks, err := listPeerLocksInfo(globalAdminPeers, bucket, prefix, duration)
|
2017-01-04 02:39:22 -05:00
|
|
|
if err != nil {
|
2017-01-06 03:37:00 -05:00
|
|
|
writeErrorResponse(w, ErrInternalError, r.URL)
|
2017-01-04 02:39:22 -05:00
|
|
|
errorIf(err, "Failed to fetch lock information from remote nodes.")
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
// Marshal list of locks as json.
|
|
|
|
jsonBytes, err := json.Marshal(volLocks)
|
|
|
|
if err != nil {
|
2017-01-06 03:37:00 -05:00
|
|
|
writeErrorResponse(w, ErrInternalError, r.URL)
|
2017-01-04 02:39:22 -05:00
|
|
|
errorIf(err, "Failed to marshal lock information into json.")
|
|
|
|
return
|
|
|
|
}
|
2017-01-06 03:37:00 -05:00
|
|
|
|
2017-02-01 14:17:30 -05:00
|
|
|
// Remove lock matching bucket/prefix held longer than duration.
|
2017-01-04 02:39:22 -05:00
|
|
|
for _, volLock := range volLocks {
|
|
|
|
globalNSMutex.ForceUnlock(volLock.Bucket, volLock.Object)
|
|
|
|
}
|
2017-01-06 03:37:00 -05:00
|
|
|
|
2017-01-04 02:39:22 -05:00
|
|
|
// Reply with list of locks cleared, as json.
|
2017-01-06 03:37:00 -05:00
|
|
|
writeSuccessResponseJSON(w, jsonBytes)
|
2017-01-04 02:39:22 -05:00
|
|
|
}
|
2017-01-17 13:02:58 -05:00
|
|
|
|
|
|
|
// validateHealQueryParams - Validates query params for heal list management API.
|
|
|
|
func validateHealQueryParams(vars url.Values) (string, string, string, string, int, APIErrorCode) {
|
|
|
|
bucket := vars.Get(string(mgmtBucket))
|
|
|
|
prefix := vars.Get(string(mgmtPrefix))
|
|
|
|
marker := vars.Get(string(mgmtMarker))
|
|
|
|
delimiter := vars.Get(string(mgmtDelimiter))
|
|
|
|
maxKeyStr := vars.Get(string(mgmtMaxKey))
|
|
|
|
|
|
|
|
// N B empty bucket name is invalid
|
|
|
|
if !IsValidBucketName(bucket) {
|
|
|
|
return "", "", "", "", 0, ErrInvalidBucketName
|
|
|
|
}
|
|
|
|
|
|
|
|
// empty prefix is valid.
|
|
|
|
if !IsValidObjectPrefix(prefix) {
|
|
|
|
return "", "", "", "", 0, ErrInvalidObjectName
|
|
|
|
}
|
|
|
|
|
|
|
|
// check if maxKey is a valid integer.
|
|
|
|
maxKey, err := strconv.Atoi(maxKeyStr)
|
|
|
|
if err != nil {
|
|
|
|
return "", "", "", "", 0, ErrInvalidMaxKeys
|
|
|
|
}
|
|
|
|
|
|
|
|
// Validate prefix, marker, delimiter and maxKey.
|
|
|
|
apiErr := validateListObjectsArgs(prefix, marker, delimiter, maxKey)
|
|
|
|
if apiErr != ErrNone {
|
|
|
|
return "", "", "", "", 0, apiErr
|
|
|
|
}
|
|
|
|
|
|
|
|
return bucket, prefix, marker, delimiter, maxKey, ErrNone
|
|
|
|
}
|
|
|
|
|
|
|
|
// ListObjectsHealHandler - GET /?heal&bucket=mybucket&prefix=myprefix&marker=mymarker&delimiter=&mydelimiter&maxKey=1000
|
|
|
|
// - bucket is mandatory query parameter
|
|
|
|
// - rest are optional query parameters
|
|
|
|
// List upto maxKey objects that need healing in a given bucket matching the given prefix.
|
|
|
|
func (adminAPI adminAPIHandlers) ListObjectsHealHandler(w http.ResponseWriter, r *http.Request) {
|
|
|
|
// Get object layer instance.
|
|
|
|
objLayer := newObjectLayerFn()
|
|
|
|
if objLayer == nil {
|
|
|
|
writeErrorResponse(w, ErrServerNotInitialized, r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
// Validate request signature.
|
|
|
|
adminAPIErr := checkRequestAuthType(r, "", "", "")
|
|
|
|
if adminAPIErr != ErrNone {
|
|
|
|
writeErrorResponse(w, adminAPIErr, r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
// Validate query params.
|
|
|
|
vars := r.URL.Query()
|
|
|
|
bucket, prefix, marker, delimiter, maxKey, adminAPIErr := validateHealQueryParams(vars)
|
|
|
|
if adminAPIErr != ErrNone {
|
|
|
|
writeErrorResponse(w, adminAPIErr, r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
// Get the list objects to be healed.
|
|
|
|
objectInfos, err := objLayer.ListObjectsHeal(bucket, prefix, marker, delimiter, maxKey)
|
|
|
|
if err != nil {
|
|
|
|
writeErrorResponse(w, toAPIErrorCode(err), r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
listResponse := generateListObjectsV1Response(bucket, prefix, marker, delimiter, maxKey, objectInfos)
|
|
|
|
// Write success response.
|
|
|
|
writeSuccessResponseXML(w, encodeResponse(listResponse))
|
|
|
|
}
|
|
|
|
|
2017-01-19 12:34:18 -05:00
|
|
|
// ListBucketsHealHandler - GET /?heal
|
|
|
|
func (adminAPI adminAPIHandlers) ListBucketsHealHandler(w http.ResponseWriter, r *http.Request) {
|
|
|
|
// Get object layer instance.
|
|
|
|
objLayer := newObjectLayerFn()
|
|
|
|
if objLayer == nil {
|
|
|
|
writeErrorResponse(w, ErrServerNotInitialized, r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
// Validate request signature.
|
|
|
|
adminAPIErr := checkRequestAuthType(r, "", "", "")
|
|
|
|
if adminAPIErr != ErrNone {
|
|
|
|
writeErrorResponse(w, adminAPIErr, r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
// Get the list buckets to be healed.
|
|
|
|
bucketsInfo, err := objLayer.ListBucketsHeal()
|
|
|
|
if err != nil {
|
|
|
|
writeErrorResponse(w, toAPIErrorCode(err), r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
listResponse := generateListBucketsResponse(bucketsInfo)
|
|
|
|
// Write success response.
|
|
|
|
writeSuccessResponseXML(w, encodeResponse(listResponse))
|
|
|
|
}
|
|
|
|
|
2017-01-24 11:11:05 -05:00
|
|
|
// HealBucketHandler - POST /?heal&bucket=mybucket&dry-run
|
2017-01-23 03:32:55 -05:00
|
|
|
// - x-minio-operation = bucket
|
2017-01-17 13:02:58 -05:00
|
|
|
// - bucket is mandatory query parameter
|
|
|
|
// Heal a given bucket, if present.
|
|
|
|
func (adminAPI adminAPIHandlers) HealBucketHandler(w http.ResponseWriter, r *http.Request) {
|
|
|
|
// Get object layer instance.
|
|
|
|
objLayer := newObjectLayerFn()
|
|
|
|
if objLayer == nil {
|
|
|
|
writeErrorResponse(w, ErrServerNotInitialized, r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
// Validate request signature.
|
|
|
|
adminAPIErr := checkRequestAuthType(r, "", "", "")
|
|
|
|
if adminAPIErr != ErrNone {
|
|
|
|
writeErrorResponse(w, adminAPIErr, r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
// Validate bucket name and check if it exists.
|
|
|
|
vars := r.URL.Query()
|
|
|
|
bucket := vars.Get(string(mgmtBucket))
|
|
|
|
if err := checkBucketExist(bucket, objLayer); err != nil {
|
|
|
|
writeErrorResponse(w, toAPIErrorCode(err), r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2017-01-24 11:11:05 -05:00
|
|
|
// if dry-run is present in query-params, then only perform validations and return success.
|
2017-01-17 13:02:58 -05:00
|
|
|
if isDryRun(vars) {
|
|
|
|
writeSuccessResponseHeadersOnly(w)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
// Heal the given bucket.
|
|
|
|
err := objLayer.HealBucket(bucket)
|
|
|
|
if err != nil {
|
|
|
|
writeErrorResponse(w, toAPIErrorCode(err), r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
// Return 200 on success.
|
|
|
|
writeSuccessResponseHeadersOnly(w)
|
|
|
|
}
|
|
|
|
|
2017-01-24 11:11:05 -05:00
|
|
|
// isDryRun - returns true if dry-run query param was set and false otherwise.
|
|
|
|
// otherwise.
|
2017-01-17 13:02:58 -05:00
|
|
|
func isDryRun(qval url.Values) bool {
|
2017-01-24 11:11:05 -05:00
|
|
|
if _, dryRun := qval[string(mgmtDryRun)]; dryRun {
|
2017-01-17 13:02:58 -05:00
|
|
|
return true
|
|
|
|
}
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
2017-01-24 11:11:05 -05:00
|
|
|
// HealObjectHandler - POST /?heal&bucket=mybucket&object=myobject&dry-run
|
2017-01-23 03:32:55 -05:00
|
|
|
// - x-minio-operation = object
|
2017-01-17 13:02:58 -05:00
|
|
|
// - bucket and object are both mandatory query parameters
|
|
|
|
// Heal a given object, if present.
|
|
|
|
func (adminAPI adminAPIHandlers) HealObjectHandler(w http.ResponseWriter, r *http.Request) {
|
|
|
|
// Get object layer instance.
|
|
|
|
objLayer := newObjectLayerFn()
|
|
|
|
if objLayer == nil {
|
|
|
|
writeErrorResponse(w, ErrServerNotInitialized, r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
// Validate request signature.
|
|
|
|
adminAPIErr := checkRequestAuthType(r, "", "", "")
|
|
|
|
if adminAPIErr != ErrNone {
|
|
|
|
writeErrorResponse(w, adminAPIErr, r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
vars := r.URL.Query()
|
|
|
|
bucket := vars.Get(string(mgmtBucket))
|
|
|
|
object := vars.Get(string(mgmtObject))
|
|
|
|
|
|
|
|
// Validate bucket and object names.
|
|
|
|
if err := checkBucketAndObjectNames(bucket, object); err != nil {
|
|
|
|
writeErrorResponse(w, toAPIErrorCode(err), r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
// Check if object exists.
|
|
|
|
if _, err := objLayer.GetObjectInfo(bucket, object); err != nil {
|
|
|
|
writeErrorResponse(w, toAPIErrorCode(err), r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2017-01-24 11:11:05 -05:00
|
|
|
// if dry-run is set in query params then perform validations
|
|
|
|
// and return success.
|
2017-01-17 13:02:58 -05:00
|
|
|
if isDryRun(vars) {
|
|
|
|
writeSuccessResponseHeadersOnly(w)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
err := objLayer.HealObject(bucket, object)
|
|
|
|
if err != nil {
|
|
|
|
writeErrorResponse(w, toAPIErrorCode(err), r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
// Return 200 on success.
|
|
|
|
writeSuccessResponseHeadersOnly(w)
|
|
|
|
}
|
2017-01-23 03:32:55 -05:00
|
|
|
|
2017-01-24 11:11:05 -05:00
|
|
|
// HealFormatHandler - POST /?heal&dry-run
|
2017-01-23 03:32:55 -05:00
|
|
|
// - x-minio-operation = format
|
|
|
|
// - bucket and object are both mandatory query parameters
|
|
|
|
// Heal a given object, if present.
|
|
|
|
func (adminAPI adminAPIHandlers) HealFormatHandler(w http.ResponseWriter, r *http.Request) {
|
|
|
|
// Get current object layer instance.
|
|
|
|
objectAPI := newObjectLayerFn()
|
|
|
|
if objectAPI == nil {
|
|
|
|
writeErrorResponse(w, ErrServerNotInitialized, r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
// Validate request signature.
|
|
|
|
adminAPIErr := checkRequestAuthType(r, "", "", "")
|
|
|
|
if adminAPIErr != ErrNone {
|
|
|
|
writeErrorResponse(w, adminAPIErr, r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
// Check if this setup is an erasure code backend, since
|
|
|
|
// heal-format is only applicable to single node XL and
|
|
|
|
// distributed XL setup.
|
|
|
|
if !globalIsXL {
|
|
|
|
writeErrorResponse(w, ErrNotImplemented, r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2017-01-24 11:11:05 -05:00
|
|
|
// if dry-run is set in query-params, return success as
|
|
|
|
// validations are successful so far.
|
|
|
|
vars := r.URL.Query()
|
|
|
|
if isDryRun(vars) {
|
|
|
|
writeSuccessResponseHeadersOnly(w)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2017-01-23 03:32:55 -05:00
|
|
|
// Create a new set of storage instances to heal format.json.
|
|
|
|
bootstrapDisks, err := initStorageDisks(globalEndpoints)
|
|
|
|
if err != nil {
|
|
|
|
writeErrorResponse(w, toAPIErrorCode(err), r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
// Heal format.json on available storage.
|
|
|
|
err = healFormatXL(bootstrapDisks)
|
|
|
|
if err != nil {
|
|
|
|
writeErrorResponse(w, toAPIErrorCode(err), r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
// Instantiate new object layer with newly formatted storage.
|
|
|
|
newObjectAPI, err := newXLObjects(bootstrapDisks)
|
|
|
|
if err != nil {
|
|
|
|
writeErrorResponse(w, toAPIErrorCode(err), r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
// Set object layer with newly formatted storage to globalObjectAPI.
|
|
|
|
globalObjLayerMutex.Lock()
|
|
|
|
globalObjectAPI = newObjectAPI
|
|
|
|
globalObjLayerMutex.Unlock()
|
|
|
|
|
|
|
|
// Shutdown storage belonging to old object layer instance.
|
|
|
|
objectAPI.Shutdown()
|
|
|
|
|
|
|
|
// Inform peers to reinitialize storage with newly formatted storage.
|
|
|
|
reInitPeerDisks(globalAdminPeers)
|
|
|
|
|
|
|
|
// Return 200 on success.
|
|
|
|
writeSuccessResponseHeadersOnly(w)
|
|
|
|
}
|
2017-02-20 15:58:50 -05:00
|
|
|
|
|
|
|
// GetConfigHandler - GET /?config
|
|
|
|
// - x-minio-operation = get
|
|
|
|
// Get config.json of this minio setup.
|
|
|
|
func (adminAPI adminAPIHandlers) GetConfigHandler(w http.ResponseWriter, r *http.Request) {
|
|
|
|
// Validate request signature.
|
|
|
|
adminAPIErr := checkRequestAuthType(r, "", "", "")
|
|
|
|
if adminAPIErr != ErrNone {
|
|
|
|
writeErrorResponse(w, adminAPIErr, r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
// check if objectLayer is initialized, if not return.
|
|
|
|
if newObjectLayerFn() == nil {
|
|
|
|
writeErrorResponse(w, ErrServerNotInitialized, r.URL)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
// Get config.json from all nodes. In a single node setup, it
|
|
|
|
// returns local config.json.
|
|
|
|
configBytes, err := getPeerConfig(globalAdminPeers)
|
|
|
|
if err != nil {
|
|
|
|
writeErrorResponse(w, toAPIErrorCode(err), r.URL)
|
|
|
|
errorIf(err, "Failed to get config from peers")
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
writeSuccessResponseJSON(w, configBytes)
|
|
|
|
}
|