feat: cache env value in-case network is not reachable (#10251)

This commit is contained in:
Harshavardhana 2020-08-12 16:53:15 -07:00 committed by GitHub
parent 79ed7ce451
commit 34253aa595
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
3 changed files with 131 additions and 38 deletions

View File

@ -2088,6 +2088,14 @@ func (z *erasureZones) Health(ctx context.Context, opts HealthOptions) HealthRes
} }
} }
// when maintenance is not specified we don't have
// to look at the healing side of the code.
if !opts.Maintenance {
return HealthResult{
Healthy: true,
}
}
// check if local disks are being healed, if they are being healed // check if local disks are being healed, if they are being healed
// we need to tell healthy status as 'false' so that this server // we need to tell healthy status as 'false' so that this server
// is not taken down for maintenance // is not taken down for maintenance

82
pkg/env/web_env.go vendored
View File

@ -29,6 +29,7 @@ import (
"net/url" "net/url"
"os" "os"
"regexp" "regexp"
"strings"
"time" "time"
"github.com/dgrijalva/jwt-go" "github.com/dgrijalva/jwt-go"
@ -48,40 +49,16 @@ func RegisterGlobalCAs(CAs *x509.CertPool) {
globalRootCAs = CAs globalRootCAs = CAs
} }
func isValidEnvScheme(scheme string) bool {
switch scheme {
case webEnvScheme:
fallthrough
case webEnvSchemeSecure:
return true
}
return false
}
var ( var (
hostKeys = regexp.MustCompile("^(https?://)(.*?):(.*?)@(.*?)$") hostKeys = regexp.MustCompile("^(https?://)(.*?):(.*?)@(.*?)$")
) )
func fetchEnvHTTP(envKey string, u *url.URL) (string, error) { func fetchHTTPConstituentParts(u *url.URL) (username string, password string, envURL string, err error) {
switch u.Scheme { envURL = u.String()
case webEnvScheme:
u.Scheme = "http"
case webEnvSchemeSecure:
u.Scheme = "https"
}
ctx, cancel := context.WithTimeout(context.Background(), 3*time.Second)
defer cancel()
var (
username, password string
)
envURL := u.String()
if hostKeys.MatchString(envURL) { if hostKeys.MatchString(envURL) {
parts := hostKeys.FindStringSubmatch(envURL) parts := hostKeys.FindStringSubmatch(envURL)
if len(parts) != 5 { if len(parts) != 5 {
return "", errors.New("invalid arguments") return "", "", "", errors.New("invalid arguments")
} }
username = parts[2] username = parts[2]
password = parts[3] password = parts[3]
@ -92,6 +69,31 @@ func fetchEnvHTTP(envKey string, u *url.URL) (string, error) {
username = u.User.Username() username = u.User.Username()
password, _ = u.User.Password() password, _ = u.User.Password()
} }
return username, password, envURL, nil
}
func getEnvValueFromHTTP(urlStr, envKey string) (string, error) {
u, err := url.Parse(urlStr)
if err != nil {
return "", err
}
switch u.Scheme {
case webEnvScheme:
u.Scheme = "http"
case webEnvSchemeSecure:
u.Scheme = "https"
default:
return "", errors.New("invalid arguments")
}
username, password, envURL, err := fetchHTTPConstituentParts(u)
if err != nil {
return "", err
}
ctx, cancel := context.WithTimeout(context.Background(), 3*time.Second)
defer cancel()
req, err := http.NewRequestWithContext(ctx, http.MethodGet, envURL+"?key="+envKey, nil) req, err := http.NewRequestWithContext(ctx, http.MethodGet, envURL+"?key="+envKey, nil)
if err != nil { if err != nil {
@ -161,19 +163,21 @@ func Environ() []string {
// to fetch ENV values for the env value from a remote server. // to fetch ENV values for the env value from a remote server.
func LookupEnv(key string) (string, bool) { func LookupEnv(key string) (string, bool) {
v, ok := os.LookupEnv(key) v, ok := os.LookupEnv(key)
if ok { if ok && strings.HasPrefix(v, webEnvScheme) {
u, err := url.Parse(v) // If env value starts with `env*://`
// continue to parse and fetch from remote
var err error
v, err = getEnvValueFromHTTP(strings.TrimSpace(v), key)
if err != nil { if err != nil {
// fallback to cached value if-any.
return os.LookupEnv("_" + key)
}
// Set the ENV value to _env value,
// this value is a fallback in-case of
// server restarts when webhook server
// is down.
os.Setenv("_"+key, v)
return v, true return v, true
} }
if !isValidEnvScheme(u.Scheme) { return v, ok
return v, true
}
v, err = fetchEnvHTTP(key, u)
if err != nil {
return "", false
}
return v, true
}
return "", false
} }

81
pkg/env/web_env_test.go vendored Normal file
View File

@ -0,0 +1,81 @@
/*
* MinIO Cloud Storage, (C) 2020 MinIO, Inc.
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*
*/
package env
import (
"fmt"
"net/http"
"net/http/httptest"
"net/url"
"testing"
"github.com/gorilla/mux"
)
func GetenvHandler(w http.ResponseWriter, r *http.Request) {
vars := mux.Vars(r)
if vars["namespace"] != "default" {
http.Error(w, "namespace not found", http.StatusNotFound)
return
}
if vars["name"] != "minio" {
http.Error(w, "tenant not found", http.StatusNotFound)
return
}
if vars["key"] != "MINIO_ARGS" {
http.Error(w, "key not found", http.StatusNotFound)
return
}
w.Write([]byte("http://127.0.0.{1..4}:9000/data{1...4}"))
w.(http.Flusher).Flush()
}
func startTestServer(t *testing.T) *httptest.Server {
router := mux.NewRouter().SkipClean(true).UseEncodedPath()
router.Methods(http.MethodGet).
Path("/webhook/v1/getenv/{namespace}/{name}").
HandlerFunc(GetenvHandler).Queries("key", "{key:.*}")
ts := httptest.NewServer(router)
t.Cleanup(func() {
ts.Close()
})
return ts
}
func TestWebEnv(t *testing.T) {
ts := startTestServer(t)
u, err := url.Parse(ts.URL)
if err != nil {
t.Fatal(err)
}
v, err := getEnvValueFromHTTP(
fmt.Sprintf("env://minio:minio123@%s/webhook/v1/getenv/default/minio",
u.Host),
"MINIO_ARGS")
if err != nil {
t.Fatal(err)
}
if v != "http://127.0.0.{1..4}:9000/data{1...4}" {
t.Fatalf("Unexpected value %s", v)
}
}