2022-02-24 12:05:33 -05:00
|
|
|
// Copyright (c) 2015-2022 MinIO, Inc.
|
2021-04-18 15:41:13 -04:00
|
|
|
//
|
|
|
|
// This file is part of MinIO Object Storage stack
|
|
|
|
//
|
|
|
|
// This program is free software: you can redistribute it and/or modify
|
|
|
|
// it under the terms of the GNU Affero General Public License as published by
|
|
|
|
// the Free Software Foundation, either version 3 of the License, or
|
|
|
|
// (at your option) any later version.
|
|
|
|
//
|
|
|
|
// This program is distributed in the hope that it will be useful
|
|
|
|
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
// GNU Affero General Public License for more details.
|
|
|
|
//
|
|
|
|
// You should have received a copy of the GNU Affero General Public License
|
|
|
|
// along with this program. If not, see <http://www.gnu.org/licenses/>.
|
2018-07-19 18:55:06 -04:00
|
|
|
|
|
|
|
package logger
|
|
|
|
|
2021-10-28 10:35:28 -04:00
|
|
|
import (
|
|
|
|
"sync"
|
2022-02-17 14:11:15 -05:00
|
|
|
|
|
|
|
"github.com/minio/minio/internal/logger/target/http"
|
2022-02-24 12:05:33 -05:00
|
|
|
"github.com/minio/minio/internal/logger/target/kafka"
|
|
|
|
"github.com/minio/minio/internal/logger/target/types"
|
2021-10-28 10:35:28 -04:00
|
|
|
)
|
|
|
|
|
2018-11-19 17:47:03 -05:00
|
|
|
// Target is the entity that we will receive
|
|
|
|
// a single log entry and Send it to the log target
|
|
|
|
// e.g. Send the log to a http server
|
|
|
|
type Target interface {
|
2020-10-02 19:19:44 -04:00
|
|
|
String() string
|
|
|
|
Endpoint() string
|
2021-07-13 12:39:13 -04:00
|
|
|
Init() error
|
2022-02-17 14:11:15 -05:00
|
|
|
Cancel()
|
2019-10-11 21:50:54 -04:00
|
|
|
Send(entry interface{}, errKind string) error
|
2022-02-24 12:05:33 -05:00
|
|
|
Type() types.TargetType
|
2018-07-19 18:55:06 -04:00
|
|
|
}
|
|
|
|
|
2022-01-06 16:08:21 -05:00
|
|
|
var (
|
2022-05-12 10:20:58 -04:00
|
|
|
swapAuditMuRW sync.RWMutex
|
|
|
|
swapSystemMuRW sync.RWMutex
|
2018-07-19 18:55:06 -04:00
|
|
|
|
2022-02-24 12:05:33 -05:00
|
|
|
// systemTargets is the set of enabled loggers.
|
2022-01-06 16:08:21 -05:00
|
|
|
// Must be immutable at all times.
|
|
|
|
// Can be swapped to another while holding swapMu
|
2022-02-24 12:05:33 -05:00
|
|
|
systemTargets = []Target{}
|
2022-03-15 20:45:51 -04:00
|
|
|
|
|
|
|
// This is always set represent /dev/console target
|
|
|
|
consoleTgt Target
|
2022-01-06 16:08:21 -05:00
|
|
|
)
|
2021-10-28 10:35:28 -04:00
|
|
|
|
2022-02-24 12:05:33 -05:00
|
|
|
// SystemTargets returns active targets.
|
2021-10-28 10:35:28 -04:00
|
|
|
// Returned slice may not be modified in any way.
|
2022-02-24 12:05:33 -05:00
|
|
|
func SystemTargets() []Target {
|
2022-05-12 10:20:58 -04:00
|
|
|
swapSystemMuRW.RLock()
|
|
|
|
defer swapSystemMuRW.RUnlock()
|
|
|
|
|
2022-02-24 12:05:33 -05:00
|
|
|
res := systemTargets
|
2021-10-28 10:35:28 -04:00
|
|
|
return res
|
|
|
|
}
|
|
|
|
|
|
|
|
// AuditTargets returns active audit targets.
|
|
|
|
// Returned slice may not be modified in any way.
|
|
|
|
func AuditTargets() []Target {
|
2022-05-12 10:20:58 -04:00
|
|
|
swapAuditMuRW.RLock()
|
|
|
|
defer swapAuditMuRW.RUnlock()
|
|
|
|
|
2021-10-28 10:35:28 -04:00
|
|
|
res := auditTargets
|
|
|
|
return res
|
|
|
|
}
|
|
|
|
|
|
|
|
// auditTargets is the list of enabled audit loggers
|
|
|
|
// Must be immutable at all times.
|
|
|
|
// Can be swapped to another while holding swapMu
|
2022-01-06 16:08:21 -05:00
|
|
|
var (
|
2022-05-12 10:20:58 -04:00
|
|
|
auditTargets = []Target{}
|
2022-01-06 16:08:21 -05:00
|
|
|
)
|
2020-08-16 13:25:00 -04:00
|
|
|
|
2022-02-24 12:05:33 -05:00
|
|
|
// AddSystemTarget adds a new logger target to the
|
2020-08-16 13:25:00 -04:00
|
|
|
// list of enabled loggers
|
2022-02-24 12:05:33 -05:00
|
|
|
func AddSystemTarget(t Target) error {
|
2021-07-13 12:39:13 -04:00
|
|
|
if err := t.Init(); err != nil {
|
2020-08-16 13:25:00 -04:00
|
|
|
return err
|
|
|
|
}
|
2022-05-12 10:20:58 -04:00
|
|
|
|
|
|
|
swapSystemMuRW.Lock()
|
|
|
|
defer swapSystemMuRW.Unlock()
|
|
|
|
|
2022-03-15 20:45:51 -04:00
|
|
|
if consoleTgt == nil {
|
|
|
|
if t.Type() == types.TargetConsole {
|
|
|
|
consoleTgt = t
|
|
|
|
}
|
|
|
|
}
|
2022-02-24 12:05:33 -05:00
|
|
|
updated := append(make([]Target, 0, len(systemTargets)+1), systemTargets...)
|
2021-10-28 10:35:28 -04:00
|
|
|
updated = append(updated, t)
|
2022-02-24 12:05:33 -05:00
|
|
|
systemTargets = updated
|
2021-10-28 10:35:28 -04:00
|
|
|
|
2020-08-16 13:25:00 -04:00
|
|
|
return nil
|
2018-07-19 18:55:06 -04:00
|
|
|
}
|
2022-02-17 14:11:15 -05:00
|
|
|
|
2022-02-24 12:05:33 -05:00
|
|
|
func cancelAllSystemTargets() {
|
|
|
|
for _, tgt := range systemTargets {
|
2022-02-17 14:11:15 -05:00
|
|
|
tgt.Cancel()
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2022-02-24 12:05:33 -05:00
|
|
|
func initSystemTargets(cfgMap map[string]http.Config) (tgts []Target, err error) {
|
|
|
|
for _, l := range cfgMap {
|
2022-02-17 14:11:15 -05:00
|
|
|
if l.Enabled {
|
|
|
|
t := http.New(l)
|
|
|
|
if err = t.Init(); err != nil {
|
|
|
|
return tgts, err
|
|
|
|
}
|
|
|
|
tgts = append(tgts, t)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return tgts, err
|
|
|
|
}
|
|
|
|
|
2022-02-24 12:05:33 -05:00
|
|
|
func initKafkaTargets(cfgMap map[string]kafka.Config) (tgts []Target, err error) {
|
|
|
|
for _, l := range cfgMap {
|
|
|
|
if l.Enabled {
|
|
|
|
t := kafka.New(l)
|
|
|
|
if err = t.Init(); err != nil {
|
|
|
|
return tgts, err
|
|
|
|
}
|
|
|
|
tgts = append(tgts, t)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return tgts, err
|
|
|
|
}
|
|
|
|
|
|
|
|
// UpdateSystemTargets swaps targets with newly loaded ones from the cfg
|
|
|
|
func UpdateSystemTargets(cfg Config) error {
|
2022-05-12 10:20:58 -04:00
|
|
|
newTgts, err := initSystemTargets(cfg.HTTP)
|
2022-02-17 14:11:15 -05:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2022-05-12 10:20:58 -04:00
|
|
|
swapSystemMuRW.Lock()
|
|
|
|
defer swapSystemMuRW.Unlock()
|
|
|
|
|
2022-02-24 12:05:33 -05:00
|
|
|
for _, tgt := range systemTargets {
|
2022-02-17 20:50:10 -05:00
|
|
|
// Preserve console target when dynamically updating
|
|
|
|
// other HTTP targets, console target is always present.
|
2022-02-24 12:05:33 -05:00
|
|
|
if tgt.Type() == types.TargetConsole {
|
2022-05-12 10:20:58 -04:00
|
|
|
newTgts = append(newTgts, tgt)
|
2022-02-17 20:50:10 -05:00
|
|
|
break
|
|
|
|
}
|
|
|
|
}
|
2022-05-12 10:20:58 -04:00
|
|
|
|
2022-02-24 12:05:33 -05:00
|
|
|
cancelAllSystemTargets() // cancel running targets
|
2022-05-12 10:20:58 -04:00
|
|
|
systemTargets = newTgts
|
|
|
|
|
2022-02-24 12:05:33 -05:00
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func cancelAuditTargetType(t types.TargetType) {
|
|
|
|
for _, tgt := range auditTargets {
|
|
|
|
if tgt.Type() == t {
|
|
|
|
tgt.Cancel()
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func existingAuditTargets(t types.TargetType) []Target {
|
|
|
|
tgts := make([]Target, 0, len(auditTargets))
|
|
|
|
for _, tgt := range auditTargets {
|
|
|
|
if tgt.Type() == t {
|
|
|
|
tgts = append(tgts, tgt)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return tgts
|
|
|
|
}
|
|
|
|
|
|
|
|
// UpdateAuditWebhookTargets swaps audit webhook targets with newly loaded ones from the cfg
|
|
|
|
func UpdateAuditWebhookTargets(cfg Config) error {
|
2022-05-12 10:20:58 -04:00
|
|
|
newTgts, err := initSystemTargets(cfg.AuditWebhook)
|
2022-02-24 12:05:33 -05:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2022-05-12 10:20:58 -04:00
|
|
|
|
2022-02-24 12:05:33 -05:00
|
|
|
// retain kafka targets
|
2022-05-12 10:20:58 -04:00
|
|
|
swapAuditMuRW.Lock()
|
|
|
|
defer swapAuditMuRW.Unlock()
|
2022-02-24 12:05:33 -05:00
|
|
|
|
2022-05-12 10:20:58 -04:00
|
|
|
newTgts = append(existingAuditTargets(types.TargetKafka), newTgts...)
|
2022-02-24 12:05:33 -05:00
|
|
|
cancelAuditTargetType(types.TargetHTTP) // cancel running targets
|
2022-05-12 10:20:58 -04:00
|
|
|
auditTargets = newTgts
|
|
|
|
|
2022-02-24 12:05:33 -05:00
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// UpdateAuditKafkaTargets swaps audit kafka targets with newly loaded ones from the cfg
|
|
|
|
func UpdateAuditKafkaTargets(cfg Config) error {
|
|
|
|
updated, err := initKafkaTargets(cfg.AuditKafka)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2022-05-12 10:20:58 -04:00
|
|
|
|
|
|
|
swapAuditMuRW.Lock()
|
|
|
|
defer swapAuditMuRW.Unlock()
|
|
|
|
|
2022-02-24 12:05:33 -05:00
|
|
|
// retain HTTP targets
|
|
|
|
updated = append(existingAuditTargets(types.TargetHTTP), updated...)
|
|
|
|
cancelAuditTargetType(types.TargetKafka) // cancel running targets
|
|
|
|
auditTargets = updated
|
2022-05-12 10:20:58 -04:00
|
|
|
|
2022-02-17 14:11:15 -05:00
|
|
|
return nil
|
|
|
|
}
|