mirror of
https://github.com/minio/minio.git
synced 2025-01-11 15:03:22 -05:00
do not heal "backend-encrypted" out-of-band with migration (#12556)
backend-encrypted doesn't need to be explicitly healed anymore since this file is deleted upon upgrade and migration to the KMS based encrypted config/IAM credentials.
This commit is contained in:
parent
f13f3344df
commit
b4bf82c751
@ -67,7 +67,7 @@ function start_minio_3_node() {
|
|||||||
|
|
||||||
|
|
||||||
function check_online() {
|
function check_online() {
|
||||||
if grep -q 'Server switching to safe mode' ${WORK_DIR}/dist-minio-*.log; then
|
if grep -q 'Unable to initialize sub-systems' ${WORK_DIR}/dist-minio-*.log; then
|
||||||
echo "1"
|
echo "1"
|
||||||
fi
|
fi
|
||||||
}
|
}
|
||||||
|
@ -819,16 +819,6 @@ func (h *healSequence) healFromSourceCh() {
|
|||||||
}
|
}
|
||||||
|
|
||||||
func (h *healSequence) healDiskMeta(objAPI ObjectLayer) error {
|
func (h *healSequence) healDiskMeta(objAPI ObjectLayer) error {
|
||||||
// Try to pro-actively heal backend-encrypted file.
|
|
||||||
if err := h.queueHealTask(healSource{
|
|
||||||
bucket: minioMetaBucket,
|
|
||||||
object: backendEncryptedFile,
|
|
||||||
}, madmin.HealItemBucketMetadata); err != nil {
|
|
||||||
if !isErrObjectNotFound(err) && !isErrVersionNotFound(err) {
|
|
||||||
return err
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
// Start healing the config prefix.
|
// Start healing the config prefix.
|
||||||
return h.healMinioSysMeta(objAPI, minioConfigPrefix)()
|
return h.healMinioSysMeta(objAPI, minioConfigPrefix)()
|
||||||
}
|
}
|
||||||
|
@ -183,5 +183,5 @@ func migrateConfigPrefixToEncrypted(objAPI ObjectLayer, encrypted bool) error {
|
|||||||
if encrypted && GlobalKMS != nil {
|
if encrypted && GlobalKMS != nil {
|
||||||
logger.Info("Migration of encrypted config data completed. All config data is now encrypted.")
|
logger.Info("Migration of encrypted config data completed. All config data is now encrypted.")
|
||||||
}
|
}
|
||||||
return deleteConfig(GlobalContext, globalObjectAPI, backendEncryptedFile)
|
return deleteConfig(GlobalContext, objAPI, backendEncryptedFile)
|
||||||
}
|
}
|
||||||
|
@ -158,13 +158,6 @@ func (er *erasureObjects) healErasureSet(ctx context.Context, buckets []BucketIn
|
|||||||
Name: pathJoin(minioMetaBucket, minioConfigPrefix),
|
Name: pathJoin(minioMetaBucket, minioConfigPrefix),
|
||||||
})
|
})
|
||||||
|
|
||||||
// Try to pro-actively heal backend-encrypted file.
|
|
||||||
if _, err := er.HealObject(ctx, minioMetaBucket, backendEncryptedFile, "", madmin.HealOpts{}); err != nil {
|
|
||||||
if !isErrObjectNotFound(err) && !isErrVersionNotFound(err) {
|
|
||||||
logger.LogIf(ctx, err)
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
// Heal all buckets with all objects
|
// Heal all buckets with all objects
|
||||||
for _, bucket := range buckets {
|
for _, bucket := range buckets {
|
||||||
if tracker.isHealed(bucket.Name) {
|
if tracker.isHealed(bucket.Name) {
|
||||||
|
Loading…
Reference in New Issue
Block a user