config/main: Re-write config files - add to new config v3
- New config format.
```
{
"version": "3",
"address": ":9000",
"backend": {
"type": "fs",
"disk": "/path"
},
"credential": {
"accessKey": "WLGDGYAQYIGI833EV05A",
"secretKey": "BYvgJM101sHngl2uzjXS/OBF/aMxAN06JrJ3qJlF"
},
"region": "us-east-1",
"logger": {
"file": {
"enable": false,
"fileName": "",
"level": "error"
},
"syslog": {
"enable": false,
"address": "",
"level": "debug"
},
"console": {
"enable": true,
"level": "fatal"
}
}
}
```
New command lines in lieu of supporting XL.
Minio initialize filesystem backend.
~~~
$ minio init fs <path>
~~~
Minio initialize XL backend.
~~~
$ minio init xl <url1>...<url16>
~~~
For 'fs' backend it starts the server.
~~~
$ minio server
~~~
For 'xl' backend it waits for servers to join.
~~~
$ minio server
... [PROGRESS BAR] of servers connecting
~~~
Now on other servers execute 'join' and they connect.
~~~
....
minio join <url1> -- from <url2> && minio server
minio join <url1> -- from <url3> && minio server
...
...
minio join <url1> -- from <url16> && minio server
~~~
2016-02-12 18:27:10 -05:00
|
|
|
|
/*
|
2019-09-09 19:12:29 -04:00
|
|
|
|
* MinIO Cloud Storage, (C) 2016-2019 MinIO, Inc.
|
config/main: Re-write config files - add to new config v3
- New config format.
```
{
"version": "3",
"address": ":9000",
"backend": {
"type": "fs",
"disk": "/path"
},
"credential": {
"accessKey": "WLGDGYAQYIGI833EV05A",
"secretKey": "BYvgJM101sHngl2uzjXS/OBF/aMxAN06JrJ3qJlF"
},
"region": "us-east-1",
"logger": {
"file": {
"enable": false,
"fileName": "",
"level": "error"
},
"syslog": {
"enable": false,
"address": "",
"level": "debug"
},
"console": {
"enable": true,
"level": "fatal"
}
}
}
```
New command lines in lieu of supporting XL.
Minio initialize filesystem backend.
~~~
$ minio init fs <path>
~~~
Minio initialize XL backend.
~~~
$ minio init xl <url1>...<url16>
~~~
For 'fs' backend it starts the server.
~~~
$ minio server
~~~
For 'xl' backend it waits for servers to join.
~~~
$ minio server
... [PROGRESS BAR] of servers connecting
~~~
Now on other servers execute 'join' and they connect.
~~~
....
minio join <url1> -- from <url2> && minio server
minio join <url1> -- from <url3> && minio server
...
...
minio join <url1> -- from <url16> && minio server
~~~
2016-02-12 18:27:10 -05:00
|
|
|
|
*
|
|
|
|
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
|
* you may not use this file except in compliance with the License.
|
|
|
|
|
* You may obtain a copy of the License at
|
|
|
|
|
*
|
|
|
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
|
*
|
|
|
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
|
|
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
|
* See the License for the specific language governing permissions and
|
|
|
|
|
* limitations under the License.
|
|
|
|
|
*/
|
|
|
|
|
|
2016-08-18 19:23:42 -04:00
|
|
|
|
package cmd
|
config/main: Re-write config files - add to new config v3
- New config format.
```
{
"version": "3",
"address": ":9000",
"backend": {
"type": "fs",
"disk": "/path"
},
"credential": {
"accessKey": "WLGDGYAQYIGI833EV05A",
"secretKey": "BYvgJM101sHngl2uzjXS/OBF/aMxAN06JrJ3qJlF"
},
"region": "us-east-1",
"logger": {
"file": {
"enable": false,
"fileName": "",
"level": "error"
},
"syslog": {
"enable": false,
"address": "",
"level": "debug"
},
"console": {
"enable": true,
"level": "fatal"
}
}
}
```
New command lines in lieu of supporting XL.
Minio initialize filesystem backend.
~~~
$ minio init fs <path>
~~~
Minio initialize XL backend.
~~~
$ minio init xl <url1>...<url16>
~~~
For 'fs' backend it starts the server.
~~~
$ minio server
~~~
For 'xl' backend it waits for servers to join.
~~~
$ minio server
... [PROGRESS BAR] of servers connecting
~~~
Now on other servers execute 'join' and they connect.
~~~
....
minio join <url1> -- from <url2> && minio server
minio join <url1> -- from <url3> && minio server
...
...
minio join <url1> -- from <url16> && minio server
~~~
2016-02-12 18:27:10 -05:00
|
|
|
|
|
|
|
|
|
import (
|
2018-07-09 21:50:31 -04:00
|
|
|
|
"context"
|
2017-03-01 12:17:04 -05:00
|
|
|
|
"errors"
|
2017-03-16 14:06:17 -04:00
|
|
|
|
"fmt"
|
2018-01-31 11:15:54 -05:00
|
|
|
|
"reflect"
|
2019-10-08 01:47:56 -04:00
|
|
|
|
"strings"
|
config/main: Re-write config files - add to new config v3
- New config format.
```
{
"version": "3",
"address": ":9000",
"backend": {
"type": "fs",
"disk": "/path"
},
"credential": {
"accessKey": "WLGDGYAQYIGI833EV05A",
"secretKey": "BYvgJM101sHngl2uzjXS/OBF/aMxAN06JrJ3qJlF"
},
"region": "us-east-1",
"logger": {
"file": {
"enable": false,
"fileName": "",
"level": "error"
},
"syslog": {
"enable": false,
"address": "",
"level": "debug"
},
"console": {
"enable": true,
"level": "fatal"
}
}
}
```
New command lines in lieu of supporting XL.
Minio initialize filesystem backend.
~~~
$ minio init fs <path>
~~~
Minio initialize XL backend.
~~~
$ minio init xl <url1>...<url16>
~~~
For 'fs' backend it starts the server.
~~~
$ minio server
~~~
For 'xl' backend it waits for servers to join.
~~~
$ minio server
... [PROGRESS BAR] of servers connecting
~~~
Now on other servers execute 'join' and they connect.
~~~
....
minio join <url1> -- from <url2> && minio server
minio join <url1> -- from <url3> && minio server
...
...
minio join <url1> -- from <url16> && minio server
~~~
2016-02-12 18:27:10 -05:00
|
|
|
|
"sync"
|
|
|
|
|
|
2019-10-04 13:35:33 -04:00
|
|
|
|
"github.com/minio/minio/cmd/config"
|
|
|
|
|
"github.com/minio/minio/cmd/config/cache"
|
|
|
|
|
"github.com/minio/minio/cmd/config/compress"
|
|
|
|
|
xldap "github.com/minio/minio/cmd/config/ldap"
|
2019-10-07 01:50:24 -04:00
|
|
|
|
"github.com/minio/minio/cmd/config/storageclass"
|
2018-08-17 15:52:14 -04:00
|
|
|
|
"github.com/minio/minio/cmd/crypto"
|
2019-02-06 15:07:03 -05:00
|
|
|
|
xhttp "github.com/minio/minio/cmd/http"
|
2018-04-19 20:24:43 -04:00
|
|
|
|
"github.com/minio/minio/cmd/logger"
|
2019-10-08 01:47:56 -04:00
|
|
|
|
"github.com/minio/minio/cmd/logger/target/http"
|
2017-10-31 14:54:32 -04:00
|
|
|
|
"github.com/minio/minio/pkg/auth"
|
2019-10-04 13:35:33 -04:00
|
|
|
|
"github.com/minio/minio/pkg/env"
|
2018-03-15 16:03:41 -04:00
|
|
|
|
"github.com/minio/minio/pkg/event"
|
|
|
|
|
"github.com/minio/minio/pkg/event/target"
|
2019-10-01 18:07:20 -04:00
|
|
|
|
"github.com/minio/minio/pkg/iam/openid"
|
2019-07-27 23:03:25 -04:00
|
|
|
|
iampolicy "github.com/minio/minio/pkg/iam/policy"
|
config/main: Re-write config files - add to new config v3
- New config format.
```
{
"version": "3",
"address": ":9000",
"backend": {
"type": "fs",
"disk": "/path"
},
"credential": {
"accessKey": "WLGDGYAQYIGI833EV05A",
"secretKey": "BYvgJM101sHngl2uzjXS/OBF/aMxAN06JrJ3qJlF"
},
"region": "us-east-1",
"logger": {
"file": {
"enable": false,
"fileName": "",
"level": "error"
},
"syslog": {
"enable": false,
"address": "",
"level": "debug"
},
"console": {
"enable": true,
"level": "fatal"
}
}
}
```
New command lines in lieu of supporting XL.
Minio initialize filesystem backend.
~~~
$ minio init fs <path>
~~~
Minio initialize XL backend.
~~~
$ minio init xl <url1>...<url16>
~~~
For 'fs' backend it starts the server.
~~~
$ minio server
~~~
For 'xl' backend it waits for servers to join.
~~~
$ minio server
... [PROGRESS BAR] of servers connecting
~~~
Now on other servers execute 'join' and they connect.
~~~
....
minio join <url1> -- from <url2> && minio server
minio join <url1> -- from <url3> && minio server
...
...
minio join <url1> -- from <url16> && minio server
~~~
2016-02-12 18:27:10 -05:00
|
|
|
|
)
|
|
|
|
|
|
2017-11-29 16:12:47 -05:00
|
|
|
|
// Steps to move from version N to version N+1
|
|
|
|
|
// 1. Add new struct serverConfigVN+1 in config-versions.go
|
2017-12-18 00:00:12 -05:00
|
|
|
|
// 2. Set serverConfigVersion to "N+1"
|
|
|
|
|
// 3. Set serverConfig to serverConfigVN+1
|
2017-11-29 16:12:47 -05:00
|
|
|
|
// 4. Add new migration function (ex. func migrateVNToVN+1()) in config-migrate.go
|
|
|
|
|
// 5. Call migrateVNToVN+1() from migrateConfig() in config-migrate.go
|
|
|
|
|
// 6. Make changes in config-current_test.go for any test change
|
|
|
|
|
|
2017-03-27 14:27:25 -04:00
|
|
|
|
// Config version
|
2018-11-30 00:16:17 -05:00
|
|
|
|
const serverConfigVersion = "33"
|
2017-11-29 16:12:47 -05:00
|
|
|
|
|
2018-11-30 00:16:17 -05:00
|
|
|
|
type serverConfig = serverConfigV33
|
2017-03-27 14:27:25 -04:00
|
|
|
|
|
2017-03-31 01:26:24 -04:00
|
|
|
|
var (
|
2017-11-29 16:12:47 -05:00
|
|
|
|
// globalServerConfig server config.
|
|
|
|
|
globalServerConfig *serverConfig
|
|
|
|
|
globalServerConfigMu sync.RWMutex
|
2017-03-31 01:26:24 -04:00
|
|
|
|
)
|
|
|
|
|
|
|
|
|
|
// GetVersion get current config version.
|
2017-11-29 16:12:47 -05:00
|
|
|
|
func (s *serverConfig) GetVersion() string {
|
2017-03-31 01:26:24 -04:00
|
|
|
|
return s.Version
|
|
|
|
|
}
|
|
|
|
|
|
2017-08-08 15:14:32 -04:00
|
|
|
|
// SetRegion set a new region.
|
2017-11-29 16:12:47 -05:00
|
|
|
|
func (s *serverConfig) SetRegion(region string) {
|
2017-08-08 15:14:32 -04:00
|
|
|
|
// Save new region.
|
2017-03-31 01:26:24 -04:00
|
|
|
|
s.Region = region
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
// GetRegion get current region.
|
2017-11-29 16:12:47 -05:00
|
|
|
|
func (s *serverConfig) GetRegion() string {
|
2018-08-19 16:57:18 -04:00
|
|
|
|
if globalIsEnvRegion {
|
|
|
|
|
return globalServerRegion
|
|
|
|
|
}
|
|
|
|
|
if s == nil {
|
|
|
|
|
return ""
|
|
|
|
|
}
|
2017-03-31 01:26:24 -04:00
|
|
|
|
return s.Region
|
|
|
|
|
}
|
|
|
|
|
|
2017-12-06 02:18:29 -05:00
|
|
|
|
// SetCredential sets new credential and returns the previous credential.
|
2017-11-29 16:12:47 -05:00
|
|
|
|
func (s *serverConfig) SetCredential(creds auth.Credentials) (prevCred auth.Credentials) {
|
2019-10-07 01:50:24 -04:00
|
|
|
|
if s == nil {
|
|
|
|
|
return creds
|
|
|
|
|
}
|
|
|
|
|
|
2018-08-15 00:41:47 -04:00
|
|
|
|
if creds.IsValid() && globalActiveCred.IsValid() {
|
|
|
|
|
globalActiveCred = creds
|
|
|
|
|
}
|
|
|
|
|
|
2017-08-08 15:14:32 -04:00
|
|
|
|
// Save previous credential.
|
|
|
|
|
prevCred = s.Credential
|
|
|
|
|
|
2017-03-31 01:26:24 -04:00
|
|
|
|
// Set updated credential.
|
|
|
|
|
s.Credential = creds
|
2017-08-08 15:14:32 -04:00
|
|
|
|
|
|
|
|
|
// Return previous credential.
|
|
|
|
|
return prevCred
|
2017-03-31 01:26:24 -04:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
// GetCredentials get current credentials.
|
2017-11-29 16:12:47 -05:00
|
|
|
|
func (s *serverConfig) GetCredential() auth.Credentials {
|
2018-08-15 00:41:47 -04:00
|
|
|
|
if globalActiveCred.IsValid() {
|
|
|
|
|
return globalActiveCred
|
|
|
|
|
}
|
2017-03-31 01:26:24 -04:00
|
|
|
|
return s.Credential
|
|
|
|
|
}
|
|
|
|
|
|
2018-06-06 21:10:51 -04:00
|
|
|
|
// SetWorm set if worm is enabled.
|
|
|
|
|
func (s *serverConfig) SetWorm(b bool) {
|
|
|
|
|
// Set the new value.
|
2019-10-08 01:47:56 -04:00
|
|
|
|
s.Worm = config.BoolFlag(b)
|
2017-03-31 01:26:24 -04:00
|
|
|
|
}
|
|
|
|
|
|
2018-02-01 02:30:07 -05:00
|
|
|
|
// GetStorageClass reads storage class fields from current config.
|
2017-12-28 03:49:45 -05:00
|
|
|
|
// It returns the standard and reduced redundancy storage class struct
|
2019-10-07 01:50:24 -04:00
|
|
|
|
func (s *serverConfig) GetStorageClass() storageclass.Config {
|
2018-08-19 16:57:18 -04:00
|
|
|
|
if s == nil {
|
2019-10-07 01:50:24 -04:00
|
|
|
|
return storageclass.Config{}
|
2018-08-19 16:57:18 -04:00
|
|
|
|
}
|
2019-10-07 01:50:24 -04:00
|
|
|
|
return s.StorageClass
|
2017-12-22 06:28:13 -05:00
|
|
|
|
}
|
|
|
|
|
|
2018-06-06 21:10:51 -04:00
|
|
|
|
// GetWorm get current credentials.
|
|
|
|
|
func (s *serverConfig) GetWorm() bool {
|
2018-08-24 17:36:14 -04:00
|
|
|
|
if globalIsEnvWORM {
|
|
|
|
|
return globalWORMEnabled
|
2018-08-19 16:57:18 -04:00
|
|
|
|
}
|
|
|
|
|
if s == nil {
|
|
|
|
|
return false
|
|
|
|
|
}
|
2018-06-06 21:10:51 -04:00
|
|
|
|
return bool(s.Worm)
|
|
|
|
|
}
|
|
|
|
|
|
2018-03-28 17:14:06 -04:00
|
|
|
|
// GetCacheConfig gets the current cache config
|
2019-10-04 13:35:33 -04:00
|
|
|
|
func (s *serverConfig) GetCacheConfig() cache.Config {
|
2018-08-19 16:57:18 -04:00
|
|
|
|
if globalIsDiskCacheEnabled {
|
2019-10-04 13:35:33 -04:00
|
|
|
|
return cache.Config{
|
2018-08-19 16:57:18 -04:00
|
|
|
|
Drives: globalCacheDrives,
|
|
|
|
|
Exclude: globalCacheExcludes,
|
|
|
|
|
Expiry: globalCacheExpiry,
|
|
|
|
|
MaxUse: globalCacheMaxUse,
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
if s == nil {
|
2019-10-04 13:35:33 -04:00
|
|
|
|
return cache.Config{}
|
2018-08-19 16:57:18 -04:00
|
|
|
|
}
|
2018-03-29 17:38:26 -04:00
|
|
|
|
return s.Cache
|
2018-03-28 17:14:06 -04:00
|
|
|
|
}
|
|
|
|
|
|
2018-07-18 14:22:29 -04:00
|
|
|
|
func (s *serverConfig) Validate() error {
|
2018-08-19 16:57:18 -04:00
|
|
|
|
if s == nil {
|
|
|
|
|
return nil
|
|
|
|
|
}
|
2018-07-18 14:22:29 -04:00
|
|
|
|
if s.Version != serverConfigVersion {
|
|
|
|
|
return fmt.Errorf("configuration version mismatch. Expected: ‘%s’, Got: ‘%s’", serverConfigVersion, s.Version)
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
// Validate credential fields only when
|
|
|
|
|
// they are not set via the environment
|
|
|
|
|
// Error out if global is env credential is not set and config has invalid credential
|
|
|
|
|
if !globalIsEnvCreds && !s.Credential.IsValid() {
|
|
|
|
|
return errors.New("invalid credential in config file")
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
// Region: nothing to validate
|
2018-09-20 17:56:32 -04:00
|
|
|
|
// Worm, Cache and StorageClass values are already validated during json unmarshal
|
2018-07-18 14:22:29 -04:00
|
|
|
|
for _, v := range s.Notify.AMQP {
|
|
|
|
|
if err := v.Validate(); err != nil {
|
2018-10-09 17:00:01 -04:00
|
|
|
|
return fmt.Errorf("amqp: %s", err)
|
2018-07-18 14:22:29 -04:00
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
for _, v := range s.Notify.Elasticsearch {
|
|
|
|
|
if err := v.Validate(); err != nil {
|
2018-10-09 17:00:01 -04:00
|
|
|
|
return fmt.Errorf("elasticsearch: %s", err)
|
2018-07-18 14:22:29 -04:00
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
for _, v := range s.Notify.Kafka {
|
|
|
|
|
if err := v.Validate(); err != nil {
|
2018-10-09 17:00:01 -04:00
|
|
|
|
return fmt.Errorf("kafka: %s", err)
|
2018-07-18 14:22:29 -04:00
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
for _, v := range s.Notify.MQTT {
|
|
|
|
|
if err := v.Validate(); err != nil {
|
2018-10-09 17:00:01 -04:00
|
|
|
|
return fmt.Errorf("mqtt: %s", err)
|
2018-07-18 14:22:29 -04:00
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
for _, v := range s.Notify.MySQL {
|
|
|
|
|
if err := v.Validate(); err != nil {
|
2018-10-09 17:00:01 -04:00
|
|
|
|
return fmt.Errorf("mysql: %s", err)
|
2018-07-18 14:22:29 -04:00
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
for _, v := range s.Notify.NATS {
|
|
|
|
|
if err := v.Validate(); err != nil {
|
2018-10-09 17:00:01 -04:00
|
|
|
|
return fmt.Errorf("nats: %s", err)
|
2018-07-18 14:22:29 -04:00
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
2018-11-07 13:23:13 -05:00
|
|
|
|
for _, v := range s.Notify.NSQ {
|
|
|
|
|
if err := v.Validate(); err != nil {
|
|
|
|
|
return fmt.Errorf("nsq: %s", err)
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
2018-07-18 14:22:29 -04:00
|
|
|
|
for _, v := range s.Notify.PostgreSQL {
|
|
|
|
|
if err := v.Validate(); err != nil {
|
2018-10-09 17:00:01 -04:00
|
|
|
|
return fmt.Errorf("postgreSQL: %s", err)
|
2018-07-18 14:22:29 -04:00
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
for _, v := range s.Notify.Redis {
|
|
|
|
|
if err := v.Validate(); err != nil {
|
2018-10-09 17:00:01 -04:00
|
|
|
|
return fmt.Errorf("redis: %s", err)
|
2018-07-18 14:22:29 -04:00
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
for _, v := range s.Notify.Webhook {
|
|
|
|
|
if err := v.Validate(); err != nil {
|
2018-10-09 17:00:01 -04:00
|
|
|
|
return fmt.Errorf("webhook: %s", err)
|
2018-07-18 14:22:29 -04:00
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return nil
|
|
|
|
|
}
|
|
|
|
|
|
2019-10-07 01:50:24 -04:00
|
|
|
|
func (s *serverConfig) lookupConfigs() {
|
2018-08-15 00:41:47 -04:00
|
|
|
|
// If env is set override the credentials from config file.
|
|
|
|
|
if globalIsEnvCreds {
|
|
|
|
|
s.SetCredential(globalActiveCred)
|
2019-10-07 01:50:24 -04:00
|
|
|
|
} else {
|
|
|
|
|
globalActiveCred = s.GetCredential()
|
2018-08-15 00:41:47 -04:00
|
|
|
|
}
|
2018-04-05 11:18:42 -04:00
|
|
|
|
|
2018-08-15 00:41:47 -04:00
|
|
|
|
if globalIsEnvWORM {
|
|
|
|
|
s.SetWorm(globalWORMEnabled)
|
2019-10-07 01:50:24 -04:00
|
|
|
|
} else {
|
|
|
|
|
globalWORMEnabled = s.GetWorm()
|
2018-08-15 00:41:47 -04:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if globalIsEnvRegion {
|
|
|
|
|
s.SetRegion(globalServerRegion)
|
2019-10-07 01:50:24 -04:00
|
|
|
|
} else {
|
|
|
|
|
globalServerRegion = s.GetRegion()
|
2018-08-15 00:41:47 -04:00
|
|
|
|
}
|
|
|
|
|
|
2019-10-07 01:50:24 -04:00
|
|
|
|
var err error
|
|
|
|
|
if globalIsXL {
|
|
|
|
|
s.StorageClass, err = storageclass.LookupConfig(s.StorageClass, globalXLSetDriveCount)
|
|
|
|
|
if err != nil {
|
|
|
|
|
logger.FatalIf(err, "Unable to initialize storage class config")
|
|
|
|
|
}
|
2018-08-15 00:41:47 -04:00
|
|
|
|
}
|
2018-04-05 11:18:42 -04:00
|
|
|
|
|
2019-10-04 13:35:33 -04:00
|
|
|
|
s.Cache, err = cache.LookupConfig(s.Cache)
|
|
|
|
|
if err != nil {
|
|
|
|
|
logger.FatalIf(err, "Unable to setup cache")
|
2018-08-15 00:41:47 -04:00
|
|
|
|
}
|
2018-08-17 15:52:14 -04:00
|
|
|
|
|
2019-10-04 13:35:33 -04:00
|
|
|
|
if len(s.Cache.Drives) > 0 {
|
|
|
|
|
globalIsDiskCacheEnabled = true
|
|
|
|
|
globalCacheDrives = s.Cache.Drives
|
|
|
|
|
globalCacheExcludes = s.Cache.Exclude
|
|
|
|
|
globalCacheExpiry = s.Cache.Expiry
|
|
|
|
|
globalCacheMaxUse = s.Cache.MaxUse
|
|
|
|
|
|
|
|
|
|
if cacheEncKey := env.Get(cache.EnvCacheEncryptionMasterKey, ""); cacheEncKey != "" {
|
2019-10-08 01:47:56 -04:00
|
|
|
|
globalCacheKMS, err = crypto.ParseMasterKey(cacheEncKey)
|
2019-10-04 13:35:33 -04:00
|
|
|
|
if err != nil {
|
|
|
|
|
logger.FatalIf(config.ErrInvalidCacheEncryptionKey(err),
|
|
|
|
|
"Unable to setup encryption cache")
|
|
|
|
|
}
|
|
|
|
|
}
|
2018-08-17 15:52:14 -04:00
|
|
|
|
}
|
2018-09-27 23:36:17 -04:00
|
|
|
|
|
2019-10-08 01:47:56 -04:00
|
|
|
|
s.KMS, err = crypto.LookupConfig(s.KMS)
|
|
|
|
|
if err != nil {
|
|
|
|
|
logger.FatalIf(err, "Unable to setup KMS config")
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
GlobalKMS, err = crypto.NewKMS(s.KMS)
|
|
|
|
|
if err != nil {
|
|
|
|
|
logger.FatalIf(err, "Unable to setup KMS with current KMS config")
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
globalAutoEncryption = strings.EqualFold(env.Get(crypto.EnvAutoEncryption, "off"), "on")
|
|
|
|
|
if globalAutoEncryption && GlobalKMS == nil {
|
|
|
|
|
logger.FatalIf(errors.New("Invalid KMS configuration: auto-encryption is enabled but no valid KMS configuration is present"), "")
|
2018-09-27 23:36:17 -04:00
|
|
|
|
}
|
2018-10-12 14:32:18 -04:00
|
|
|
|
|
2019-10-04 13:35:33 -04:00
|
|
|
|
s.Compression, err = compress.LookupConfig(s.Compression)
|
|
|
|
|
if err != nil {
|
|
|
|
|
logger.FatalIf(err, "Unable to setup Compression")
|
|
|
|
|
}
|
|
|
|
|
|
2019-10-07 01:50:24 -04:00
|
|
|
|
if s.Compression.Enabled {
|
|
|
|
|
globalIsCompressionEnabled = s.Compression.Enabled
|
|
|
|
|
globalCompressExtensions = s.Compression.Extensions
|
|
|
|
|
globalCompressMimeTypes = s.Compression.MimeTypes
|
2018-10-12 14:32:18 -04:00
|
|
|
|
}
|
|
|
|
|
|
2019-10-07 01:50:24 -04:00
|
|
|
|
s.OpenID.JWKS, err = openid.LookupConfig(s.OpenID.JWKS, NewCustomHTTPTransport(), xhttp.DrainBody)
|
|
|
|
|
if err != nil {
|
|
|
|
|
logger.FatalIf(err, "Unable to initialize OpenID")
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
s.Policy.OPA, err = iampolicy.LookupConfig(s.Policy.OPA, NewCustomHTTPTransport(), xhttp.DrainBody)
|
|
|
|
|
if err != nil {
|
|
|
|
|
logger.FatalIf(err, "Unable to initialize OPA")
|
2018-10-12 14:32:18 -04:00
|
|
|
|
}
|
2019-09-09 19:12:29 -04:00
|
|
|
|
|
2019-10-07 01:50:24 -04:00
|
|
|
|
globalOpenIDValidators = getOpenIDValidators(s)
|
|
|
|
|
globalPolicyOPA = iampolicy.NewOpa(s.Policy.OPA)
|
|
|
|
|
|
2019-10-04 13:35:33 -04:00
|
|
|
|
s.LDAPServerConfig, err = xldap.Lookup(s.LDAPServerConfig, globalRootCAs)
|
2019-09-09 19:12:29 -04:00
|
|
|
|
if err != nil {
|
|
|
|
|
logger.FatalIf(err, "Unable to parse LDAP configuration from env")
|
|
|
|
|
}
|
2019-10-08 01:47:56 -04:00
|
|
|
|
|
|
|
|
|
// Load logger targets based on user's configuration
|
|
|
|
|
loggerUserAgent := getUserAgent(getMinioMode())
|
|
|
|
|
|
|
|
|
|
s.Logger, err = logger.LookupConfig(s.Logger)
|
|
|
|
|
if err != nil {
|
|
|
|
|
logger.FatalIf(err, "Unable to initialize logger")
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
for _, l := range s.Logger.HTTP {
|
|
|
|
|
if l.Enabled {
|
|
|
|
|
// Enable http logging
|
|
|
|
|
logger.AddTarget(http.New(l.Endpoint, loggerUserAgent, NewCustomHTTPTransport()))
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
for _, l := range s.Logger.Audit {
|
|
|
|
|
if l.Enabled {
|
|
|
|
|
// Enable http audit logging
|
|
|
|
|
logger.AddAuditTarget(http.New(l.Endpoint, loggerUserAgent, NewCustomHTTPTransport()))
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if s.Logger.Console.Enabled {
|
|
|
|
|
// Enable console logging
|
|
|
|
|
logger.AddTarget(globalConsoleSys.Console())
|
|
|
|
|
}
|
|
|
|
|
|
2017-03-31 01:26:24 -04:00
|
|
|
|
}
|
|
|
|
|
|
2018-09-06 11:03:18 -04:00
|
|
|
|
// TestNotificationTargets tries to establish connections to all notification
|
|
|
|
|
// targets when enabled. This is a good way to make sure all configurations
|
|
|
|
|
// set by the user can work.
|
|
|
|
|
func (s *serverConfig) TestNotificationTargets() error {
|
|
|
|
|
for k, v := range s.Notify.AMQP {
|
|
|
|
|
if !v.Enable {
|
|
|
|
|
continue
|
|
|
|
|
}
|
2019-10-07 01:50:24 -04:00
|
|
|
|
t, err := target.NewAMQPTarget(k, v, GlobalServiceDoneCh, logger.LogOnceIf)
|
2018-09-06 11:03:18 -04:00
|
|
|
|
if err != nil {
|
|
|
|
|
return fmt.Errorf("amqp(%s): %s", k, err.Error())
|
|
|
|
|
}
|
|
|
|
|
t.Close()
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
for k, v := range s.Notify.Elasticsearch {
|
|
|
|
|
if !v.Enable {
|
|
|
|
|
continue
|
|
|
|
|
}
|
2019-07-11 22:53:20 -04:00
|
|
|
|
t, err := target.NewElasticsearchTarget(k, v, GlobalServiceDoneCh)
|
2018-09-06 11:03:18 -04:00
|
|
|
|
if err != nil {
|
|
|
|
|
return fmt.Errorf("elasticsearch(%s): %s", k, err.Error())
|
|
|
|
|
}
|
|
|
|
|
t.Close()
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
for k, v := range s.Notify.Kafka {
|
|
|
|
|
if !v.Enable {
|
|
|
|
|
continue
|
|
|
|
|
}
|
2019-09-18 14:13:04 -04:00
|
|
|
|
if v.TLS.Enable {
|
|
|
|
|
v.TLS.RootCAs = globalRootCAs
|
|
|
|
|
}
|
2019-05-29 16:19:48 -04:00
|
|
|
|
t, err := target.NewKafkaTarget(k, v, GlobalServiceDoneCh)
|
2018-09-06 11:03:18 -04:00
|
|
|
|
if err != nil {
|
|
|
|
|
return fmt.Errorf("kafka(%s): %s", k, err.Error())
|
|
|
|
|
}
|
|
|
|
|
t.Close()
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
for k, v := range s.Notify.MQTT {
|
|
|
|
|
if !v.Enable {
|
|
|
|
|
continue
|
|
|
|
|
}
|
2019-09-18 14:13:04 -04:00
|
|
|
|
v.RootCAs = globalRootCAs
|
2019-04-10 08:46:01 -04:00
|
|
|
|
t, err := target.NewMQTTTarget(k, v, GlobalServiceDoneCh)
|
2018-09-06 11:03:18 -04:00
|
|
|
|
if err != nil {
|
|
|
|
|
return fmt.Errorf("mqtt(%s): %s", k, err.Error())
|
|
|
|
|
}
|
|
|
|
|
t.Close()
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
for k, v := range s.Notify.MySQL {
|
|
|
|
|
if !v.Enable {
|
|
|
|
|
continue
|
|
|
|
|
}
|
2019-07-24 13:18:29 -04:00
|
|
|
|
t, err := target.NewMySQLTarget(k, v, GlobalServiceDoneCh)
|
2018-09-06 11:03:18 -04:00
|
|
|
|
if err != nil {
|
|
|
|
|
return fmt.Errorf("mysql(%s): %s", k, err.Error())
|
|
|
|
|
}
|
|
|
|
|
t.Close()
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
for k, v := range s.Notify.NATS {
|
|
|
|
|
if !v.Enable {
|
|
|
|
|
continue
|
|
|
|
|
}
|
2019-07-23 13:37:25 -04:00
|
|
|
|
t, err := target.NewNATSTarget(k, v, GlobalServiceDoneCh)
|
2018-09-06 11:03:18 -04:00
|
|
|
|
if err != nil {
|
|
|
|
|
return fmt.Errorf("nats(%s): %s", k, err.Error())
|
|
|
|
|
}
|
|
|
|
|
t.Close()
|
|
|
|
|
}
|
|
|
|
|
|
2018-11-07 13:23:13 -05:00
|
|
|
|
for k, v := range s.Notify.NSQ {
|
|
|
|
|
if !v.Enable {
|
|
|
|
|
continue
|
|
|
|
|
}
|
2019-07-12 05:41:57 -04:00
|
|
|
|
t, err := target.NewNSQTarget(k, v, GlobalServiceDoneCh)
|
2018-11-07 13:23:13 -05:00
|
|
|
|
if err != nil {
|
|
|
|
|
return fmt.Errorf("nsq(%s): %s", k, err.Error())
|
|
|
|
|
}
|
|
|
|
|
t.Close()
|
|
|
|
|
}
|
|
|
|
|
|
2018-09-06 11:03:18 -04:00
|
|
|
|
for k, v := range s.Notify.PostgreSQL {
|
|
|
|
|
if !v.Enable {
|
|
|
|
|
continue
|
|
|
|
|
}
|
2019-07-24 13:18:29 -04:00
|
|
|
|
t, err := target.NewPostgreSQLTarget(k, v, GlobalServiceDoneCh)
|
2018-09-06 11:03:18 -04:00
|
|
|
|
if err != nil {
|
|
|
|
|
return fmt.Errorf("postgreSQL(%s): %s", k, err.Error())
|
|
|
|
|
}
|
|
|
|
|
t.Close()
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
for k, v := range s.Notify.Redis {
|
|
|
|
|
if !v.Enable {
|
|
|
|
|
continue
|
|
|
|
|
}
|
2019-10-07 01:50:24 -04:00
|
|
|
|
t, err := target.NewRedisTarget(k, v, GlobalServiceDoneCh, logger.LogOnceIf)
|
2018-09-06 11:03:18 -04:00
|
|
|
|
if err != nil {
|
|
|
|
|
return fmt.Errorf("redis(%s): %s", k, err.Error())
|
|
|
|
|
}
|
|
|
|
|
t.Close()
|
|
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return nil
|
|
|
|
|
}
|
|
|
|
|
|
2018-01-31 11:15:54 -05:00
|
|
|
|
// Returns the string describing a difference with the given
|
|
|
|
|
// configuration object. If the given configuration object is
|
|
|
|
|
// identical, an empty string is returned.
|
|
|
|
|
func (s *serverConfig) ConfigDiff(t *serverConfig) string {
|
|
|
|
|
switch {
|
|
|
|
|
case t == nil:
|
|
|
|
|
return "Given configuration is empty"
|
|
|
|
|
case s.Credential != t.Credential:
|
|
|
|
|
return "Credential configuration differs"
|
|
|
|
|
case s.Region != t.Region:
|
|
|
|
|
return "Region configuration differs"
|
|
|
|
|
case s.StorageClass != t.StorageClass:
|
|
|
|
|
return "StorageClass configuration differs"
|
2018-04-13 14:15:19 -04:00
|
|
|
|
case !reflect.DeepEqual(s.Cache, t.Cache):
|
|
|
|
|
return "Cache configuration differs"
|
2018-09-27 23:36:17 -04:00
|
|
|
|
case !reflect.DeepEqual(s.Compression, t.Compression):
|
|
|
|
|
return "Compression configuration differs"
|
2018-01-31 11:15:54 -05:00
|
|
|
|
case !reflect.DeepEqual(s.Notify.AMQP, t.Notify.AMQP):
|
|
|
|
|
return "AMQP Notification configuration differs"
|
|
|
|
|
case !reflect.DeepEqual(s.Notify.NATS, t.Notify.NATS):
|
|
|
|
|
return "NATS Notification configuration differs"
|
2018-11-07 13:23:13 -05:00
|
|
|
|
case !reflect.DeepEqual(s.Notify.NSQ, t.Notify.NSQ):
|
|
|
|
|
return "NSQ Notification configuration differs"
|
2018-03-15 16:03:41 -04:00
|
|
|
|
case !reflect.DeepEqual(s.Notify.Elasticsearch, t.Notify.Elasticsearch):
|
2018-01-31 11:15:54 -05:00
|
|
|
|
return "ElasticSearch Notification configuration differs"
|
|
|
|
|
case !reflect.DeepEqual(s.Notify.Redis, t.Notify.Redis):
|
|
|
|
|
return "Redis Notification configuration differs"
|
|
|
|
|
case !reflect.DeepEqual(s.Notify.PostgreSQL, t.Notify.PostgreSQL):
|
|
|
|
|
return "PostgreSQL Notification configuration differs"
|
|
|
|
|
case !reflect.DeepEqual(s.Notify.Kafka, t.Notify.Kafka):
|
|
|
|
|
return "Kafka Notification configuration differs"
|
|
|
|
|
case !reflect.DeepEqual(s.Notify.Webhook, t.Notify.Webhook):
|
|
|
|
|
return "Webhook Notification configuration differs"
|
|
|
|
|
case !reflect.DeepEqual(s.Notify.MySQL, t.Notify.MySQL):
|
|
|
|
|
return "MySQL Notification configuration differs"
|
|
|
|
|
case !reflect.DeepEqual(s.Notify.MQTT, t.Notify.MQTT):
|
|
|
|
|
return "MQTT Notification configuration differs"
|
2018-07-19 18:55:06 -04:00
|
|
|
|
case !reflect.DeepEqual(s.Logger, t.Logger):
|
|
|
|
|
return "Logger configuration differs"
|
2018-08-17 15:52:14 -04:00
|
|
|
|
case !reflect.DeepEqual(s.KMS, t.KMS):
|
|
|
|
|
return "KMS configuration differs"
|
2018-01-31 11:15:54 -05:00
|
|
|
|
case reflect.DeepEqual(s, t):
|
|
|
|
|
return ""
|
|
|
|
|
default:
|
|
|
|
|
// This case will not happen unless this comparison
|
|
|
|
|
// function has become stale.
|
|
|
|
|
return "Configuration differs"
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
2017-11-29 16:12:47 -05:00
|
|
|
|
func newServerConfig() *serverConfig {
|
2018-04-19 20:24:43 -04:00
|
|
|
|
cred, err := auth.GetNewCredentials()
|
|
|
|
|
logger.FatalIf(err, "")
|
|
|
|
|
|
2017-11-29 16:12:47 -05:00
|
|
|
|
srvCfg := &serverConfig{
|
2018-02-01 02:30:07 -05:00
|
|
|
|
Version: serverConfigVersion,
|
2018-04-19 20:24:43 -04:00
|
|
|
|
Credential: cred,
|
2018-02-01 02:30:07 -05:00
|
|
|
|
Region: globalMinioDefaultRegion,
|
2019-10-07 01:50:24 -04:00
|
|
|
|
StorageClass: storageclass.Config{
|
|
|
|
|
Standard: storageclass.StorageClass{},
|
|
|
|
|
RRS: storageclass.StorageClass{},
|
2018-02-01 02:30:07 -05:00
|
|
|
|
},
|
2019-10-04 13:35:33 -04:00
|
|
|
|
Cache: cache.Config{
|
2018-03-28 17:14:06 -04:00
|
|
|
|
Drives: []string{},
|
|
|
|
|
Exclude: []string{},
|
|
|
|
|
Expiry: globalCacheExpiry,
|
2018-06-25 13:24:12 -04:00
|
|
|
|
MaxUse: globalCacheMaxUse,
|
2018-03-28 17:14:06 -04:00
|
|
|
|
},
|
2018-08-17 15:52:14 -04:00
|
|
|
|
KMS: crypto.KMSConfig{},
|
2018-02-01 02:30:07 -05:00
|
|
|
|
Notify: notifier{},
|
2019-10-04 13:35:33 -04:00
|
|
|
|
Compression: compress.Config{
|
2018-09-27 23:36:17 -04:00
|
|
|
|
Enabled: false,
|
|
|
|
|
Extensions: globalCompressExtensions,
|
|
|
|
|
MimeTypes: globalCompressMimeTypes,
|
|
|
|
|
},
|
2017-02-27 17:59:53 -05:00
|
|
|
|
}
|
2017-03-26 15:00:27 -04:00
|
|
|
|
|
2017-02-07 15:51:43 -05:00
|
|
|
|
// Make sure to initialize notification configs.
|
2018-03-15 16:03:41 -04:00
|
|
|
|
srvCfg.Notify.AMQP = make(map[string]target.AMQPArgs)
|
|
|
|
|
srvCfg.Notify.AMQP["1"] = target.AMQPArgs{}
|
|
|
|
|
srvCfg.Notify.MQTT = make(map[string]target.MQTTArgs)
|
|
|
|
|
srvCfg.Notify.MQTT["1"] = target.MQTTArgs{}
|
|
|
|
|
srvCfg.Notify.Elasticsearch = make(map[string]target.ElasticsearchArgs)
|
|
|
|
|
srvCfg.Notify.Elasticsearch["1"] = target.ElasticsearchArgs{}
|
|
|
|
|
srvCfg.Notify.Redis = make(map[string]target.RedisArgs)
|
|
|
|
|
srvCfg.Notify.Redis["1"] = target.RedisArgs{}
|
|
|
|
|
srvCfg.Notify.NATS = make(map[string]target.NATSArgs)
|
|
|
|
|
srvCfg.Notify.NATS["1"] = target.NATSArgs{}
|
2018-11-07 13:23:13 -05:00
|
|
|
|
srvCfg.Notify.NSQ = make(map[string]target.NSQArgs)
|
|
|
|
|
srvCfg.Notify.NSQ["1"] = target.NSQArgs{}
|
2018-03-15 16:03:41 -04:00
|
|
|
|
srvCfg.Notify.PostgreSQL = make(map[string]target.PostgreSQLArgs)
|
|
|
|
|
srvCfg.Notify.PostgreSQL["1"] = target.PostgreSQLArgs{}
|
|
|
|
|
srvCfg.Notify.MySQL = make(map[string]target.MySQLArgs)
|
|
|
|
|
srvCfg.Notify.MySQL["1"] = target.MySQLArgs{}
|
|
|
|
|
srvCfg.Notify.Kafka = make(map[string]target.KafkaArgs)
|
|
|
|
|
srvCfg.Notify.Kafka["1"] = target.KafkaArgs{}
|
|
|
|
|
srvCfg.Notify.Webhook = make(map[string]target.WebhookArgs)
|
|
|
|
|
srvCfg.Notify.Webhook["1"] = target.WebhookArgs{}
|
2017-02-07 15:51:43 -05:00
|
|
|
|
|
2018-03-28 17:14:06 -04:00
|
|
|
|
srvCfg.Cache.Drives = make([]string, 0)
|
|
|
|
|
srvCfg.Cache.Exclude = make([]string, 0)
|
|
|
|
|
srvCfg.Cache.Expiry = globalCacheExpiry
|
2018-06-25 13:24:12 -04:00
|
|
|
|
srvCfg.Cache.MaxUse = globalCacheMaxUse
|
2018-07-19 18:55:06 -04:00
|
|
|
|
|
|
|
|
|
// Console logging is on by default
|
|
|
|
|
srvCfg.Logger.Console.Enabled = true
|
|
|
|
|
// Create an example of HTTP logger
|
2019-10-08 01:47:56 -04:00
|
|
|
|
srvCfg.Logger.HTTP = make(map[string]logger.HTTP)
|
|
|
|
|
srvCfg.Logger.HTTP["target1"] = logger.HTTP{Endpoint: "https://username:password@example.com/api"}
|
2018-07-19 18:55:06 -04:00
|
|
|
|
|
2017-03-01 12:17:04 -05:00
|
|
|
|
return srvCfg
|
|
|
|
|
}
|
|
|
|
|
|
2018-10-09 17:00:01 -04:00
|
|
|
|
// newSrvConfig - initialize a new server config, saves env parameters if
|
2018-08-15 00:41:47 -04:00
|
|
|
|
// found, otherwise use default parameters
|
2018-10-09 17:00:01 -04:00
|
|
|
|
func newSrvConfig(objAPI ObjectLayer) error {
|
2018-08-15 00:41:47 -04:00
|
|
|
|
// Initialize server config.
|
|
|
|
|
srvCfg := newServerConfig()
|
|
|
|
|
|
|
|
|
|
// Override any values from ENVs.
|
2019-10-07 01:50:24 -04:00
|
|
|
|
srvCfg.lookupConfigs()
|
2018-03-29 17:38:26 -04:00
|
|
|
|
|
2017-02-07 15:51:43 -05:00
|
|
|
|
// hold the mutex lock before a new config is assigned.
|
2017-11-29 16:12:47 -05:00
|
|
|
|
globalServerConfigMu.Lock()
|
|
|
|
|
globalServerConfig = srvCfg
|
|
|
|
|
globalServerConfigMu.Unlock()
|
2017-02-07 15:51:43 -05:00
|
|
|
|
|
|
|
|
|
// Save config into file.
|
2018-09-06 11:03:18 -04:00
|
|
|
|
return saveServerConfig(context.Background(), objAPI, globalServerConfig)
|
2017-02-07 15:51:43 -05:00
|
|
|
|
}
|
|
|
|
|
|
2017-03-31 01:26:24 -04:00
|
|
|
|
// getValidConfig - returns valid server configuration
|
2018-08-15 00:41:47 -04:00
|
|
|
|
func getValidConfig(objAPI ObjectLayer) (*serverConfig, error) {
|
|
|
|
|
srvCfg, err := readServerConfig(context.Background(), objAPI)
|
2018-02-02 21:18:52 -05:00
|
|
|
|
if err != nil {
|
|
|
|
|
return nil, err
|
|
|
|
|
}
|
|
|
|
|
|
2018-08-15 00:41:47 -04:00
|
|
|
|
return srvCfg, srvCfg.Validate()
|
config/main: Re-write config files - add to new config v3
- New config format.
```
{
"version": "3",
"address": ":9000",
"backend": {
"type": "fs",
"disk": "/path"
},
"credential": {
"accessKey": "WLGDGYAQYIGI833EV05A",
"secretKey": "BYvgJM101sHngl2uzjXS/OBF/aMxAN06JrJ3qJlF"
},
"region": "us-east-1",
"logger": {
"file": {
"enable": false,
"fileName": "",
"level": "error"
},
"syslog": {
"enable": false,
"address": "",
"level": "debug"
},
"console": {
"enable": true,
"level": "fatal"
}
}
}
```
New command lines in lieu of supporting XL.
Minio initialize filesystem backend.
~~~
$ minio init fs <path>
~~~
Minio initialize XL backend.
~~~
$ minio init xl <url1>...<url16>
~~~
For 'fs' backend it starts the server.
~~~
$ minio server
~~~
For 'xl' backend it waits for servers to join.
~~~
$ minio server
... [PROGRESS BAR] of servers connecting
~~~
Now on other servers execute 'join' and they connect.
~~~
....
minio join <url1> -- from <url2> && minio server
minio join <url1> -- from <url3> && minio server
...
...
minio join <url1> -- from <url16> && minio server
~~~
2016-02-12 18:27:10 -05:00
|
|
|
|
}
|
|
|
|
|
|
2017-03-31 01:26:24 -04:00
|
|
|
|
// loadConfig - loads a new config from disk, overrides params from env
|
|
|
|
|
// if found and valid
|
2018-08-15 00:41:47 -04:00
|
|
|
|
func loadConfig(objAPI ObjectLayer) error {
|
|
|
|
|
srvCfg, err := getValidConfig(objAPI)
|
2017-03-31 01:26:24 -04:00
|
|
|
|
if err != nil {
|
2019-10-04 13:35:33 -04:00
|
|
|
|
return config.ErrInvalidConfig(nil).Msg(err.Error())
|
2017-03-16 14:06:17 -04:00
|
|
|
|
}
|
2016-12-07 06:41:54 -05:00
|
|
|
|
|
2018-08-15 00:41:47 -04:00
|
|
|
|
// Override any values from ENVs.
|
2019-10-07 01:50:24 -04:00
|
|
|
|
srvCfg.lookupConfigs()
|
2018-03-29 17:38:26 -04:00
|
|
|
|
|
2017-03-31 01:26:24 -04:00
|
|
|
|
// hold the mutex lock before a new config is assigned.
|
2017-11-29 16:12:47 -05:00
|
|
|
|
globalServerConfigMu.Lock()
|
|
|
|
|
globalServerConfig = srvCfg
|
|
|
|
|
globalServerConfigMu.Unlock()
|
config/main: Re-write config files - add to new config v3
- New config format.
```
{
"version": "3",
"address": ":9000",
"backend": {
"type": "fs",
"disk": "/path"
},
"credential": {
"accessKey": "WLGDGYAQYIGI833EV05A",
"secretKey": "BYvgJM101sHngl2uzjXS/OBF/aMxAN06JrJ3qJlF"
},
"region": "us-east-1",
"logger": {
"file": {
"enable": false,
"fileName": "",
"level": "error"
},
"syslog": {
"enable": false,
"address": "",
"level": "debug"
},
"console": {
"enable": true,
"level": "fatal"
}
}
}
```
New command lines in lieu of supporting XL.
Minio initialize filesystem backend.
~~~
$ minio init fs <path>
~~~
Minio initialize XL backend.
~~~
$ minio init xl <url1>...<url16>
~~~
For 'fs' backend it starts the server.
~~~
$ minio server
~~~
For 'xl' backend it waits for servers to join.
~~~
$ minio server
... [PROGRESS BAR] of servers connecting
~~~
Now on other servers execute 'join' and they connect.
~~~
....
minio join <url1> -- from <url2> && minio server
minio join <url1> -- from <url3> && minio server
...
...
minio join <url1> -- from <url16> && minio server
~~~
2016-02-12 18:27:10 -05:00
|
|
|
|
|
2017-03-31 01:26:24 -04:00
|
|
|
|
return nil
|
config/main: Re-write config files - add to new config v3
- New config format.
```
{
"version": "3",
"address": ":9000",
"backend": {
"type": "fs",
"disk": "/path"
},
"credential": {
"accessKey": "WLGDGYAQYIGI833EV05A",
"secretKey": "BYvgJM101sHngl2uzjXS/OBF/aMxAN06JrJ3qJlF"
},
"region": "us-east-1",
"logger": {
"file": {
"enable": false,
"fileName": "",
"level": "error"
},
"syslog": {
"enable": false,
"address": "",
"level": "debug"
},
"console": {
"enable": true,
"level": "fatal"
}
}
}
```
New command lines in lieu of supporting XL.
Minio initialize filesystem backend.
~~~
$ minio init fs <path>
~~~
Minio initialize XL backend.
~~~
$ minio init xl <url1>...<url16>
~~~
For 'fs' backend it starts the server.
~~~
$ minio server
~~~
For 'xl' backend it waits for servers to join.
~~~
$ minio server
... [PROGRESS BAR] of servers connecting
~~~
Now on other servers execute 'join' and they connect.
~~~
....
minio join <url1> -- from <url2> && minio server
minio join <url1> -- from <url3> && minio server
...
...
minio join <url1> -- from <url16> && minio server
~~~
2016-02-12 18:27:10 -05:00
|
|
|
|
}
|
2018-03-15 16:03:41 -04:00
|
|
|
|
|
2019-10-01 18:07:20 -04:00
|
|
|
|
// getOpenIDValidators - returns ValidatorList which contains
|
2018-10-09 17:00:01 -04:00
|
|
|
|
// enabled providers in server config.
|
|
|
|
|
// A new authentication provider is added like below
|
2019-10-01 18:07:20 -04:00
|
|
|
|
// * Add a new provider in pkg/iam/openid package.
|
|
|
|
|
func getOpenIDValidators(config *serverConfig) *openid.Validators {
|
|
|
|
|
validators := openid.NewValidators()
|
2018-10-09 17:00:01 -04:00
|
|
|
|
|
|
|
|
|
if config.OpenID.JWKS.URL != nil {
|
2019-10-01 18:07:20 -04:00
|
|
|
|
validators.Add(openid.NewJWT(config.OpenID.JWKS))
|
2018-10-09 17:00:01 -04:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return validators
|
|
|
|
|
}
|
|
|
|
|
|
2018-03-15 16:03:41 -04:00
|
|
|
|
// getNotificationTargets - returns TargetList which contains enabled targets in serverConfig.
|
|
|
|
|
// A new notification target is added like below
|
|
|
|
|
// * Add a new target in pkg/event/target package.
|
|
|
|
|
// * Add newly added target configuration to serverConfig.Notify.<TARGET_NAME>.
|
|
|
|
|
// * Handle the configuration in this function to create/add into TargetList.
|
2018-07-09 21:50:31 -04:00
|
|
|
|
func getNotificationTargets(config *serverConfig) *event.TargetList {
|
2018-03-15 16:03:41 -04:00
|
|
|
|
targetList := event.NewTargetList()
|
2018-08-20 19:58:47 -04:00
|
|
|
|
if config == nil {
|
|
|
|
|
return targetList
|
|
|
|
|
}
|
2018-03-15 16:03:41 -04:00
|
|
|
|
for id, args := range config.Notify.AMQP {
|
|
|
|
|
if args.Enable {
|
2019-10-07 01:50:24 -04:00
|
|
|
|
newTarget, err := target.NewAMQPTarget(id, args, GlobalServiceDoneCh, logger.LogOnceIf)
|
2018-03-15 16:03:41 -04:00
|
|
|
|
if err != nil {
|
2018-07-09 21:50:31 -04:00
|
|
|
|
logger.LogIf(context.Background(), err)
|
|
|
|
|
continue
|
2018-03-15 16:03:41 -04:00
|
|
|
|
}
|
|
|
|
|
if err = targetList.Add(newTarget); err != nil {
|
2018-07-09 21:50:31 -04:00
|
|
|
|
logger.LogIf(context.Background(), err)
|
|
|
|
|
continue
|
2018-03-15 16:03:41 -04:00
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
for id, args := range config.Notify.Elasticsearch {
|
|
|
|
|
if args.Enable {
|
2019-07-11 22:53:20 -04:00
|
|
|
|
newTarget, err := target.NewElasticsearchTarget(id, args, GlobalServiceDoneCh)
|
2018-03-15 16:03:41 -04:00
|
|
|
|
if err != nil {
|
2018-07-09 21:50:31 -04:00
|
|
|
|
logger.LogIf(context.Background(), err)
|
|
|
|
|
continue
|
|
|
|
|
|
2018-03-15 16:03:41 -04:00
|
|
|
|
}
|
|
|
|
|
if err = targetList.Add(newTarget); err != nil {
|
2018-07-09 21:50:31 -04:00
|
|
|
|
logger.LogIf(context.Background(), err)
|
|
|
|
|
continue
|
|
|
|
|
|
2018-03-15 16:03:41 -04:00
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
for id, args := range config.Notify.Kafka {
|
|
|
|
|
if args.Enable {
|
2019-09-18 14:13:04 -04:00
|
|
|
|
if args.TLS.Enable {
|
|
|
|
|
args.TLS.RootCAs = globalRootCAs
|
|
|
|
|
}
|
2019-05-29 16:19:48 -04:00
|
|
|
|
newTarget, err := target.NewKafkaTarget(id, args, GlobalServiceDoneCh)
|
2018-03-15 16:03:41 -04:00
|
|
|
|
if err != nil {
|
2018-07-09 21:50:31 -04:00
|
|
|
|
logger.LogIf(context.Background(), err)
|
|
|
|
|
continue
|
2018-03-15 16:03:41 -04:00
|
|
|
|
}
|
|
|
|
|
if err = targetList.Add(newTarget); err != nil {
|
2018-07-09 21:50:31 -04:00
|
|
|
|
logger.LogIf(context.Background(), err)
|
|
|
|
|
continue
|
2018-03-15 16:03:41 -04:00
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
for id, args := range config.Notify.MQTT {
|
|
|
|
|
if args.Enable {
|
2019-01-19 23:27:18 -05:00
|
|
|
|
args.RootCAs = globalRootCAs
|
2019-04-10 08:46:01 -04:00
|
|
|
|
newTarget, err := target.NewMQTTTarget(id, args, GlobalServiceDoneCh)
|
2018-03-15 16:03:41 -04:00
|
|
|
|
if err != nil {
|
2018-07-09 21:50:31 -04:00
|
|
|
|
logger.LogIf(context.Background(), err)
|
|
|
|
|
continue
|
2018-03-15 16:03:41 -04:00
|
|
|
|
}
|
|
|
|
|
if err = targetList.Add(newTarget); err != nil {
|
2018-07-09 21:50:31 -04:00
|
|
|
|
logger.LogIf(context.Background(), err)
|
|
|
|
|
continue
|
2018-03-15 16:03:41 -04:00
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
for id, args := range config.Notify.MySQL {
|
|
|
|
|
if args.Enable {
|
2019-07-24 13:18:29 -04:00
|
|
|
|
newTarget, err := target.NewMySQLTarget(id, args, GlobalServiceDoneCh)
|
2018-03-15 16:03:41 -04:00
|
|
|
|
if err != nil {
|
2018-07-09 21:50:31 -04:00
|
|
|
|
logger.LogIf(context.Background(), err)
|
|
|
|
|
continue
|
2018-03-15 16:03:41 -04:00
|
|
|
|
}
|
|
|
|
|
if err = targetList.Add(newTarget); err != nil {
|
2018-07-09 21:50:31 -04:00
|
|
|
|
logger.LogIf(context.Background(), err)
|
|
|
|
|
continue
|
2018-03-15 16:03:41 -04:00
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
for id, args := range config.Notify.NATS {
|
|
|
|
|
if args.Enable {
|
2019-07-23 13:37:25 -04:00
|
|
|
|
newTarget, err := target.NewNATSTarget(id, args, GlobalServiceDoneCh)
|
2018-03-15 16:03:41 -04:00
|
|
|
|
if err != nil {
|
2018-07-09 21:50:31 -04:00
|
|
|
|
logger.LogIf(context.Background(), err)
|
|
|
|
|
continue
|
2018-03-15 16:03:41 -04:00
|
|
|
|
}
|
|
|
|
|
if err = targetList.Add(newTarget); err != nil {
|
2018-11-07 13:23:13 -05:00
|
|
|
|
logger.LogIf(context.Background(), err)
|
|
|
|
|
continue
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
for id, args := range config.Notify.NSQ {
|
|
|
|
|
if args.Enable {
|
2019-07-12 05:41:57 -04:00
|
|
|
|
newTarget, err := target.NewNSQTarget(id, args, GlobalServiceDoneCh)
|
2018-11-07 13:23:13 -05:00
|
|
|
|
if err != nil {
|
|
|
|
|
logger.LogIf(context.Background(), err)
|
|
|
|
|
continue
|
|
|
|
|
}
|
|
|
|
|
if err = targetList.Add(newTarget); err != nil {
|
2018-07-09 21:50:31 -04:00
|
|
|
|
logger.LogIf(context.Background(), err)
|
|
|
|
|
continue
|
2018-03-15 16:03:41 -04:00
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
for id, args := range config.Notify.PostgreSQL {
|
|
|
|
|
if args.Enable {
|
2019-07-24 13:18:29 -04:00
|
|
|
|
newTarget, err := target.NewPostgreSQLTarget(id, args, GlobalServiceDoneCh)
|
2018-03-15 16:03:41 -04:00
|
|
|
|
if err != nil {
|
2018-07-09 21:50:31 -04:00
|
|
|
|
logger.LogIf(context.Background(), err)
|
|
|
|
|
continue
|
2018-03-15 16:03:41 -04:00
|
|
|
|
}
|
|
|
|
|
if err = targetList.Add(newTarget); err != nil {
|
2018-07-09 21:50:31 -04:00
|
|
|
|
logger.LogIf(context.Background(), err)
|
|
|
|
|
continue
|
2018-03-15 16:03:41 -04:00
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
for id, args := range config.Notify.Redis {
|
|
|
|
|
if args.Enable {
|
2019-10-07 01:50:24 -04:00
|
|
|
|
newTarget, err := target.NewRedisTarget(id, args, GlobalServiceDoneCh, logger.LogOnceIf)
|
2018-03-15 16:03:41 -04:00
|
|
|
|
if err != nil {
|
2018-07-09 21:50:31 -04:00
|
|
|
|
logger.LogIf(context.Background(), err)
|
|
|
|
|
continue
|
2018-03-15 16:03:41 -04:00
|
|
|
|
}
|
|
|
|
|
if err = targetList.Add(newTarget); err != nil {
|
2018-07-09 21:50:31 -04:00
|
|
|
|
logger.LogIf(context.Background(), err)
|
|
|
|
|
continue
|
2018-03-15 16:03:41 -04:00
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
for id, args := range config.Notify.Webhook {
|
|
|
|
|
if args.Enable {
|
2019-01-19 23:27:18 -05:00
|
|
|
|
args.RootCAs = globalRootCAs
|
2019-07-05 05:51:41 -04:00
|
|
|
|
newTarget := target.NewWebhookTarget(id, args, GlobalServiceDoneCh)
|
2018-03-15 16:03:41 -04:00
|
|
|
|
if err := targetList.Add(newTarget); err != nil {
|
2018-07-09 21:50:31 -04:00
|
|
|
|
logger.LogIf(context.Background(), err)
|
|
|
|
|
continue
|
2018-03-15 16:03:41 -04:00
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
2018-07-09 21:50:31 -04:00
|
|
|
|
return targetList
|
2018-03-15 16:03:41 -04:00
|
|
|
|
}
|