mirror of
https://github.com/minio/minio.git
synced 2024-12-24 06:05:55 -05:00
env: Bring back MINIO_BROWSER env. (#3423)
Set MINIO_BROWSER=off to disable web browser completely. Fixes #3422
This commit is contained in:
parent
ac554bf663
commit
cd0f350c02
@ -1,5 +1,5 @@
|
|||||||
/*
|
/*
|
||||||
* Minio Cloud Storage, (C) 2015 Minio, Inc.
|
* Minio Cloud Storage, (C) 2015, 2016 Minio, Inc.
|
||||||
*
|
*
|
||||||
* Licensed under the Apache License, Version 2.0 (the "License");
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
* you may not use this file except in compliance with the License.
|
* you may not use this file except in compliance with the License.
|
||||||
@ -65,40 +65,64 @@ func (h requestSizeLimitHandler) ServeHTTP(w http.ResponseWriter, r *http.Reques
|
|||||||
h.handler.ServeHTTP(w, r)
|
h.handler.ServeHTTP(w, r)
|
||||||
}
|
}
|
||||||
|
|
||||||
// Adds redirect rules for incoming requests.
|
|
||||||
type redirectHandler struct {
|
|
||||||
handler http.Handler
|
|
||||||
locationPrefix string
|
|
||||||
}
|
|
||||||
|
|
||||||
// Reserved bucket.
|
// Reserved bucket.
|
||||||
const (
|
const (
|
||||||
reservedBucket = "/minio"
|
reservedBucket = "/minio"
|
||||||
)
|
)
|
||||||
|
|
||||||
|
// Adds redirect rules for incoming requests.
|
||||||
|
type redirectHandler struct {
|
||||||
|
handler http.Handler
|
||||||
|
}
|
||||||
|
|
||||||
func setBrowserRedirectHandler(h http.Handler) http.Handler {
|
func setBrowserRedirectHandler(h http.Handler) http.Handler {
|
||||||
return redirectHandler{handler: h, locationPrefix: reservedBucket}
|
return redirectHandler{handler: h}
|
||||||
|
}
|
||||||
|
|
||||||
|
// Fetch redirect location if urlPath satisfies certain
|
||||||
|
// criteria. Some special names are considered to be
|
||||||
|
// redirectable, this is purely internal function and
|
||||||
|
// serves only limited purpose on redirect-handler for
|
||||||
|
// browser requests.
|
||||||
|
func getRedirectLocation(urlPath string) (rLocation string) {
|
||||||
|
if urlPath == reservedBucket {
|
||||||
|
rLocation = reservedBucket + "/"
|
||||||
|
}
|
||||||
|
if contains([]string{
|
||||||
|
"/",
|
||||||
|
"/webrpc",
|
||||||
|
"/login",
|
||||||
|
"/favicon.ico",
|
||||||
|
}, urlPath) {
|
||||||
|
rLocation = reservedBucket + urlPath
|
||||||
|
}
|
||||||
|
return rLocation
|
||||||
|
}
|
||||||
|
|
||||||
|
// guessIsBrowserReq - returns true if the request is browser.
|
||||||
|
// This implementation just validates user-agent and
|
||||||
|
// looks for "Mozilla" string. This is no way certifiable
|
||||||
|
// way to know if the request really came from a browser
|
||||||
|
// since User-Agent's can be arbitrary. But this is just
|
||||||
|
// a best effort function.
|
||||||
|
func guessIsBrowserReq(req *http.Request) bool {
|
||||||
|
if req == nil {
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
return strings.Contains(req.Header.Get("User-Agent"), "Mozilla")
|
||||||
}
|
}
|
||||||
|
|
||||||
func (h redirectHandler) ServeHTTP(w http.ResponseWriter, r *http.Request) {
|
func (h redirectHandler) ServeHTTP(w http.ResponseWriter, r *http.Request) {
|
||||||
aType := getRequestAuthType(r)
|
aType := getRequestAuthType(r)
|
||||||
// Re-direct only for JWT and anonymous requests coming from web-browser.
|
// Re-direct only for JWT and anonymous requests from browser.
|
||||||
if aType == authTypeJWT || aType == authTypeAnonymous {
|
if aType == authTypeJWT || aType == authTypeAnonymous {
|
||||||
// Re-direction handled specifically for browsers.
|
// Re-direction is handled specifically for browser requests.
|
||||||
if strings.Contains(r.Header.Get("User-Agent"), "Mozilla") {
|
if guessIsBrowserReq(r) && globalIsBrowserEnabled {
|
||||||
switch r.URL.Path {
|
// Fetch the redirect location if any.
|
||||||
case "/", "/webrpc", "/login", "/favicon.ico":
|
redirectLocation := getRedirectLocation(r.URL.Path)
|
||||||
// '/' is redirected to 'locationPrefix/'
|
if redirectLocation != "" {
|
||||||
// '/webrpc' is redirected to 'locationPrefix/webrpc'
|
// Employ a temporary re-direct.
|
||||||
// '/login' is redirected to 'locationPrefix/login'
|
http.Redirect(w, r, redirectLocation, http.StatusTemporaryRedirect)
|
||||||
location := h.locationPrefix + r.URL.Path
|
|
||||||
// Redirect to new location.
|
|
||||||
http.Redirect(w, r, location, http.StatusTemporaryRedirect)
|
|
||||||
return
|
|
||||||
case h.locationPrefix:
|
|
||||||
// locationPrefix is redirected to 'locationPrefix/'
|
|
||||||
location := h.locationPrefix + "/"
|
|
||||||
http.Redirect(w, r, location, http.StatusTemporaryRedirect)
|
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
@ -116,10 +140,11 @@ func setBrowserCacheControlHandler(h http.Handler) http.Handler {
|
|||||||
}
|
}
|
||||||
|
|
||||||
func (h cacheControlHandler) ServeHTTP(w http.ResponseWriter, r *http.Request) {
|
func (h cacheControlHandler) ServeHTTP(w http.ResponseWriter, r *http.Request) {
|
||||||
if r.Method == "GET" && strings.Contains(r.Header.Get("User-Agent"), "Mozilla") {
|
if r.Method == "GET" && guessIsBrowserReq(r) && globalIsBrowserEnabled {
|
||||||
// For all browser requests set appropriate Cache-Control policies
|
// For all browser requests set appropriate Cache-Control policies
|
||||||
match, e := regexp.MatchString(reservedBucket+`/([^/]+\.js|favicon.ico)`, r.URL.Path)
|
match, err := regexp.Match(reservedBucket+`/([^/]+\.js|favicon.ico)`, []byte(r.URL.Path))
|
||||||
if e != nil {
|
if err != nil {
|
||||||
|
errorIf(err, "Unable to match incoming URL %s", r.URL)
|
||||||
writeErrorResponse(w, r, ErrInternalError, r.URL.Path)
|
writeErrorResponse(w, r, ErrInternalError, r.URL.Path)
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
@ -147,13 +172,22 @@ func setPrivateBucketHandler(h http.Handler) http.Handler {
|
|||||||
|
|
||||||
func (h minioPrivateBucketHandler) ServeHTTP(w http.ResponseWriter, r *http.Request) {
|
func (h minioPrivateBucketHandler) ServeHTTP(w http.ResponseWriter, r *http.Request) {
|
||||||
// For all non browser requests, reject access to 'reservedBucket'.
|
// For all non browser requests, reject access to 'reservedBucket'.
|
||||||
if !strings.Contains(r.Header.Get("User-Agent"), "Mozilla") && path.Clean(r.URL.Path) == reservedBucket {
|
if !guessIsBrowserReq(r) && path.Clean(r.URL.Path) == reservedBucket {
|
||||||
writeErrorResponse(w, r, ErrAllAccessDisabled, r.URL.Path)
|
writeErrorResponse(w, r, ErrAllAccessDisabled, r.URL.Path)
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
h.handler.ServeHTTP(w, r)
|
h.handler.ServeHTTP(w, r)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
type timeValidityHandler struct {
|
||||||
|
handler http.Handler
|
||||||
|
}
|
||||||
|
|
||||||
|
// setTimeValidityHandler to validate parsable time over http header
|
||||||
|
func setTimeValidityHandler(h http.Handler) http.Handler {
|
||||||
|
return timeValidityHandler{h}
|
||||||
|
}
|
||||||
|
|
||||||
// Supported Amz date formats.
|
// Supported Amz date formats.
|
||||||
var amzDateFormats = []string{
|
var amzDateFormats = []string{
|
||||||
time.RFC1123,
|
time.RFC1123,
|
||||||
@ -162,23 +196,23 @@ var amzDateFormats = []string{
|
|||||||
// Add new AMZ date formats here.
|
// Add new AMZ date formats here.
|
||||||
}
|
}
|
||||||
|
|
||||||
// parseAmzDate - parses date string into supported amz date formats.
|
|
||||||
func parseAmzDate(amzDateStr string) (amzDate time.Time, apiErr APIErrorCode) {
|
|
||||||
for _, dateFormat := range amzDateFormats {
|
|
||||||
amzDate, e := time.Parse(dateFormat, amzDateStr)
|
|
||||||
if e == nil {
|
|
||||||
return amzDate, ErrNone
|
|
||||||
}
|
|
||||||
}
|
|
||||||
return time.Time{}, ErrMalformedDate
|
|
||||||
}
|
|
||||||
|
|
||||||
// Supported Amz date headers.
|
// Supported Amz date headers.
|
||||||
var amzDateHeaders = []string{
|
var amzDateHeaders = []string{
|
||||||
"x-amz-date",
|
"x-amz-date",
|
||||||
"date",
|
"date",
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// parseAmzDate - parses date string into supported amz date formats.
|
||||||
|
func parseAmzDate(amzDateStr string) (amzDate time.Time, apiErr APIErrorCode) {
|
||||||
|
for _, dateFormat := range amzDateFormats {
|
||||||
|
amzDate, err := time.Parse(dateFormat, amzDateStr)
|
||||||
|
if err == nil {
|
||||||
|
return amzDate, ErrNone
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return time.Time{}, ErrMalformedDate
|
||||||
|
}
|
||||||
|
|
||||||
// parseAmzDateHeader - parses supported amz date headers, in
|
// parseAmzDateHeader - parses supported amz date headers, in
|
||||||
// supported amz date formats.
|
// supported amz date formats.
|
||||||
func parseAmzDateHeader(req *http.Request) (time.Time, APIErrorCode) {
|
func parseAmzDateHeader(req *http.Request) (time.Time, APIErrorCode) {
|
||||||
@ -192,15 +226,6 @@ func parseAmzDateHeader(req *http.Request) (time.Time, APIErrorCode) {
|
|||||||
return time.Time{}, ErrMissingDateHeader
|
return time.Time{}, ErrMissingDateHeader
|
||||||
}
|
}
|
||||||
|
|
||||||
type timeValidityHandler struct {
|
|
||||||
handler http.Handler
|
|
||||||
}
|
|
||||||
|
|
||||||
// setTimeValidityHandler to validate parsable time over http header
|
|
||||||
func setTimeValidityHandler(h http.Handler) http.Handler {
|
|
||||||
return timeValidityHandler{h}
|
|
||||||
}
|
|
||||||
|
|
||||||
func (h timeValidityHandler) ServeHTTP(w http.ResponseWriter, r *http.Request) {
|
func (h timeValidityHandler) ServeHTTP(w http.ResponseWriter, r *http.Request) {
|
||||||
aType := getRequestAuthType(r)
|
aType := getRequestAuthType(r)
|
||||||
if aType == authTypeSigned || aType == authTypeSignedV2 || aType == authTypeStreamingSigned {
|
if aType == authTypeSigned || aType == authTypeSignedV2 || aType == authTypeStreamingSigned {
|
||||||
@ -247,47 +272,6 @@ func setIgnoreResourcesHandler(h http.Handler) http.Handler {
|
|||||||
return resourceHandler{h}
|
return resourceHandler{h}
|
||||||
}
|
}
|
||||||
|
|
||||||
// Resource handler ServeHTTP() wrapper
|
|
||||||
func (h resourceHandler) ServeHTTP(w http.ResponseWriter, r *http.Request) {
|
|
||||||
// Skip the first element which is usually '/' and split the rest.
|
|
||||||
splits := strings.SplitN(r.URL.Path[1:], "/", 2)
|
|
||||||
|
|
||||||
// Save bucketName and objectName extracted from url Path.
|
|
||||||
var bucketName, objectName string
|
|
||||||
if len(splits) == 1 {
|
|
||||||
bucketName = splits[0]
|
|
||||||
}
|
|
||||||
if len(splits) == 2 {
|
|
||||||
bucketName = splits[0]
|
|
||||||
objectName = splits[1]
|
|
||||||
}
|
|
||||||
|
|
||||||
// If bucketName is present and not objectName check for bucket level resource queries.
|
|
||||||
if bucketName != "" && objectName == "" {
|
|
||||||
if ignoreNotImplementedBucketResources(r) {
|
|
||||||
writeErrorResponse(w, r, ErrNotImplemented, r.URL.Path)
|
|
||||||
return
|
|
||||||
}
|
|
||||||
}
|
|
||||||
// If bucketName and objectName are present check for its resource queries.
|
|
||||||
if bucketName != "" && objectName != "" {
|
|
||||||
if ignoreNotImplementedObjectResources(r) {
|
|
||||||
writeErrorResponse(w, r, ErrNotImplemented, r.URL.Path)
|
|
||||||
return
|
|
||||||
}
|
|
||||||
}
|
|
||||||
// A put method on path "/" doesn't make sense, ignore it.
|
|
||||||
if r.Method == "PUT" && r.URL.Path == "/" {
|
|
||||||
writeErrorResponse(w, r, ErrNotImplemented, r.URL.Path)
|
|
||||||
return
|
|
||||||
}
|
|
||||||
|
|
||||||
// Serve HTTP.
|
|
||||||
h.handler.ServeHTTP(w, r)
|
|
||||||
}
|
|
||||||
|
|
||||||
//// helpers
|
|
||||||
|
|
||||||
// Checks requests for not implemented Bucket resources
|
// Checks requests for not implemented Bucket resources
|
||||||
func ignoreNotImplementedBucketResources(req *http.Request) bool {
|
func ignoreNotImplementedBucketResources(req *http.Request) bool {
|
||||||
for name := range req.URL.Query() {
|
for name := range req.URL.Query() {
|
||||||
@ -328,3 +312,42 @@ var notimplementedObjectResourceNames = map[string]bool{
|
|||||||
"acl": true,
|
"acl": true,
|
||||||
"policy": true,
|
"policy": true,
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// Resource handler ServeHTTP() wrapper
|
||||||
|
func (h resourceHandler) ServeHTTP(w http.ResponseWriter, r *http.Request) {
|
||||||
|
// Skip the first element which is usually '/' and split the rest.
|
||||||
|
splits := strings.SplitN(r.URL.Path[1:], "/", 2)
|
||||||
|
|
||||||
|
// Save bucketName and objectName extracted from url Path.
|
||||||
|
var bucketName, objectName string
|
||||||
|
if len(splits) == 1 {
|
||||||
|
bucketName = splits[0]
|
||||||
|
}
|
||||||
|
if len(splits) == 2 {
|
||||||
|
bucketName = splits[0]
|
||||||
|
objectName = splits[1]
|
||||||
|
}
|
||||||
|
|
||||||
|
// If bucketName is present and not objectName check for bucket level resource queries.
|
||||||
|
if bucketName != "" && objectName == "" {
|
||||||
|
if ignoreNotImplementedBucketResources(r) {
|
||||||
|
writeErrorResponse(w, r, ErrNotImplemented, r.URL.Path)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
}
|
||||||
|
// If bucketName and objectName are present check for its resource queries.
|
||||||
|
if bucketName != "" && objectName != "" {
|
||||||
|
if ignoreNotImplementedObjectResources(r) {
|
||||||
|
writeErrorResponse(w, r, ErrNotImplemented, r.URL.Path)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
}
|
||||||
|
// A put method on path "/" doesn't make sense, ignore it.
|
||||||
|
if r.Method == "PUT" && r.URL.Path == "/" {
|
||||||
|
writeErrorResponse(w, r, ErrNotImplemented, r.URL.Path)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
// Serve HTTP.
|
||||||
|
h.handler.ServeHTTP(w, r)
|
||||||
|
}
|
||||||
|
90
cmd/generic-handlers_test.go
Normal file
90
cmd/generic-handlers_test.go
Normal file
@ -0,0 +1,90 @@
|
|||||||
|
/*
|
||||||
|
* Minio Cloud Storage, (C) 2016 Minio, Inc.
|
||||||
|
*
|
||||||
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
* you may not use this file except in compliance with the License.
|
||||||
|
* You may obtain a copy of the License at
|
||||||
|
*
|
||||||
|
* http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
*
|
||||||
|
* Unless required by applicable law or agreed to in writing, software
|
||||||
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
* See the License for the specific language governing permissions and
|
||||||
|
* limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
|
package cmd
|
||||||
|
|
||||||
|
import (
|
||||||
|
"net/http"
|
||||||
|
"testing"
|
||||||
|
)
|
||||||
|
|
||||||
|
// Tests getRedirectLocation function for all its criteria.
|
||||||
|
func TestRedirectLocation(t *testing.T) {
|
||||||
|
testCases := []struct {
|
||||||
|
urlPath string
|
||||||
|
location string
|
||||||
|
}{
|
||||||
|
{
|
||||||
|
// 1. When urlPath is '/minio'
|
||||||
|
urlPath: reservedBucket,
|
||||||
|
location: reservedBucket + "/",
|
||||||
|
},
|
||||||
|
{
|
||||||
|
// 2. When urlPath is '/'
|
||||||
|
urlPath: "/",
|
||||||
|
location: reservedBucket + "/",
|
||||||
|
},
|
||||||
|
{
|
||||||
|
// 3. When urlPath is '/webrpc'
|
||||||
|
urlPath: "/webrpc",
|
||||||
|
location: reservedBucket + "/webrpc",
|
||||||
|
},
|
||||||
|
{
|
||||||
|
// 4. When urlPath is '/login'
|
||||||
|
urlPath: "/login",
|
||||||
|
location: reservedBucket + "/login",
|
||||||
|
},
|
||||||
|
{
|
||||||
|
// 5. When urlPath is '/favicon.ico'
|
||||||
|
urlPath: "/favicon.ico",
|
||||||
|
location: reservedBucket + "/favicon.ico",
|
||||||
|
},
|
||||||
|
{
|
||||||
|
// 6. When urlPath is '/unknown'
|
||||||
|
urlPath: "/unknown",
|
||||||
|
location: "",
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
// Validate all conditions.
|
||||||
|
for i, testCase := range testCases {
|
||||||
|
loc := getRedirectLocation(testCase.urlPath)
|
||||||
|
if testCase.location != loc {
|
||||||
|
t.Errorf("Test %d: Unexpected location expected %s, got %s", i+1, testCase.location, loc)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// Tests browser request guess function.
|
||||||
|
func TestGuessIsBrowser(t *testing.T) {
|
||||||
|
if guessIsBrowserReq(nil) {
|
||||||
|
t.Fatal("Unexpected return for nil request")
|
||||||
|
}
|
||||||
|
r := &http.Request{
|
||||||
|
Header: http.Header{},
|
||||||
|
}
|
||||||
|
r.Header.Set("User-Agent", "Mozilla")
|
||||||
|
if !guessIsBrowserReq(r) {
|
||||||
|
t.Fatal("Test shouldn't fail for a possible browser request.")
|
||||||
|
}
|
||||||
|
r = &http.Request{
|
||||||
|
Header: http.Header{},
|
||||||
|
}
|
||||||
|
r.Header.Set("User-Agent", "mc")
|
||||||
|
if guessIsBrowserReq(r) {
|
||||||
|
t.Fatal("Test shouldn't report as browser for a non browser request.")
|
||||||
|
}
|
||||||
|
}
|
@ -18,6 +18,8 @@ package cmd
|
|||||||
|
|
||||||
import (
|
import (
|
||||||
"crypto/x509"
|
"crypto/x509"
|
||||||
|
"os"
|
||||||
|
"strings"
|
||||||
"time"
|
"time"
|
||||||
|
|
||||||
humanize "github.com/dustin/go-humanize"
|
humanize "github.com/dustin/go-humanize"
|
||||||
@ -61,6 +63,10 @@ var (
|
|||||||
|
|
||||||
globalIsDistXL = false // "Is Distributed?" flag.
|
globalIsDistXL = false // "Is Distributed?" flag.
|
||||||
|
|
||||||
|
// This flag is set to 'true' by default, it is set to `false`
|
||||||
|
// when MINIO_BROWSER env is set to 'off'.
|
||||||
|
globalIsBrowserEnabled = !strings.EqualFold(os.Getenv("MINIO_BROWSER"), "off")
|
||||||
|
|
||||||
// Maximum cache size. Defaults to disabled.
|
// Maximum cache size. Defaults to disabled.
|
||||||
// Caching is enabled only for RAM size > 8GiB.
|
// Caching is enabled only for RAM size > 8GiB.
|
||||||
globalMaxCacheSize = uint64(0)
|
globalMaxCacheSize = uint64(0)
|
||||||
|
@ -75,6 +75,30 @@ func newObjectLayer(storageDisks []StorageAPI) (ObjectLayer, error) {
|
|||||||
return objAPI, nil
|
return objAPI, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// Composed function registering routers for only distributed XL setup.
|
||||||
|
func registerDistXLRouters(mux *router.Router, srvCmdConfig serverCmdConfig) error {
|
||||||
|
// Register storage rpc router only if its a distributed setup.
|
||||||
|
err := registerStorageRPCRouters(mux, srvCmdConfig)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
// Register distributed namespace lock.
|
||||||
|
err = registerDistNSLockRouter(mux, srvCmdConfig)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
// Register S3 peer communication router.
|
||||||
|
err = registerS3PeerRPCRouter(mux)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
// Register RPC router for web related calls.
|
||||||
|
return registerBrowserPeerRPCRouter(mux)
|
||||||
|
}
|
||||||
|
|
||||||
// configureServer handler returns final handler for the http server.
|
// configureServer handler returns final handler for the http server.
|
||||||
func configureServerHandler(srvCmdConfig serverCmdConfig) (http.Handler, error) {
|
func configureServerHandler(srvCmdConfig serverCmdConfig) (http.Handler, error) {
|
||||||
// Initialize router. `SkipClean(true)` stops gorilla/mux from
|
// Initialize router. `SkipClean(true)` stops gorilla/mux from
|
||||||
@ -83,32 +107,14 @@ func configureServerHandler(srvCmdConfig serverCmdConfig) (http.Handler, error)
|
|||||||
|
|
||||||
// Initialize distributed NS lock.
|
// Initialize distributed NS lock.
|
||||||
if globalIsDistXL {
|
if globalIsDistXL {
|
||||||
// Register storage rpc router only if its a distributed setup.
|
registerDistXLRouters(mux, srvCmdConfig)
|
||||||
err := registerStorageRPCRouters(mux, srvCmdConfig)
|
}
|
||||||
if err != nil {
|
|
||||||
|
// Register web router when its enabled.
|
||||||
|
if globalIsBrowserEnabled {
|
||||||
|
if err := registerWebRouter(mux); err != nil {
|
||||||
return nil, err
|
return nil, err
|
||||||
}
|
}
|
||||||
|
|
||||||
// Register distributed namespace lock.
|
|
||||||
err = registerDistNSLockRouter(mux, srvCmdConfig)
|
|
||||||
if err != nil {
|
|
||||||
return nil, err
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
// Register S3 peer communication router.
|
|
||||||
err := registerS3PeerRPCRouter(mux)
|
|
||||||
if err != nil {
|
|
||||||
return nil, err
|
|
||||||
}
|
|
||||||
|
|
||||||
// Register RPC router for web related calls.
|
|
||||||
if err = registerBrowserPeerRPCRouter(mux); err != nil {
|
|
||||||
return nil, err
|
|
||||||
}
|
|
||||||
|
|
||||||
if err = registerWebRouter(mux); err != nil {
|
|
||||||
return nil, err
|
|
||||||
}
|
}
|
||||||
|
|
||||||
// Add API router.
|
// Add API router.
|
||||||
|
@ -55,8 +55,11 @@ FLAGS:
|
|||||||
{{end}}
|
{{end}}
|
||||||
ENVIRONMENT VARIABLES:
|
ENVIRONMENT VARIABLES:
|
||||||
ACCESS:
|
ACCESS:
|
||||||
MINIO_ACCESS_KEY: Username or access key of 5 to 20 characters in length.
|
MINIO_ACCESS_KEY: Custom username or access key of 5 to 20 characters in length.
|
||||||
MINIO_SECRET_KEY: Password or secret key of 8 to 40 characters in length.
|
MINIO_SECRET_KEY: Custom password or secret key of 8 to 40 characters in length.
|
||||||
|
|
||||||
|
BROWSER:
|
||||||
|
MINIO_BROWSER: To disable web browser access, set this value to "off".
|
||||||
|
|
||||||
EXAMPLES:
|
EXAMPLES:
|
||||||
1. Start minio server on "/home/shared" directory.
|
1. Start minio server on "/home/shared" directory.
|
||||||
|
Loading…
Reference in New Issue
Block a user