// Copyright (c) 2015-2022 MinIO, Inc. // // This file is part of MinIO Object Storage stack // // This program is free software: you can redistribute it and/or modify // it under the terms of the GNU Affero General Public License as published by // the Free Software Foundation, either version 3 of the License, or // (at your option) any later version. // // This program is distributed in the hope that it will be useful // but WITHOUT ANY WARRANTY; without even the implied warranty of // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the // GNU Affero General Public License for more details. // // You should have received a copy of the GNU Affero General Public License // along with this program. If not, see . package logger import ( "sync" "github.com/minio/minio/internal/logger/target/http" "github.com/minio/minio/internal/logger/target/kafka" "github.com/minio/minio/internal/logger/target/types" ) // Target is the entity that we will receive // a single log entry and Send it to the log target // e.g. Send the log to a http server type Target interface { String() string Endpoint() string Init() error Cancel() Send(entry interface{}) error Type() types.TargetType } var ( swapAuditMuRW sync.RWMutex swapSystemMuRW sync.RWMutex // systemTargets is the set of enabled loggers. // Must be immutable at all times. // Can be swapped to another while holding swapMu systemTargets = []Target{} // This is always set represent /dev/console target consoleTgt Target ) // SystemTargets returns active targets. // Returned slice may not be modified in any way. func SystemTargets() []Target { swapSystemMuRW.RLock() defer swapSystemMuRW.RUnlock() res := systemTargets return res } // AuditTargets returns active audit targets. // Returned slice may not be modified in any way. func AuditTargets() []Target { swapAuditMuRW.RLock() defer swapAuditMuRW.RUnlock() res := auditTargets return res } // auditTargets is the list of enabled audit loggers // Must be immutable at all times. // Can be swapped to another while holding swapMu var ( auditTargets = []Target{} ) // AddSystemTarget adds a new logger target to the // list of enabled loggers func AddSystemTarget(t Target) error { if err := t.Init(); err != nil { return err } swapSystemMuRW.Lock() defer swapSystemMuRW.Unlock() if consoleTgt == nil { if t.Type() == types.TargetConsole { consoleTgt = t } } updated := append(make([]Target, 0, len(systemTargets)+1), systemTargets...) updated = append(updated, t) systemTargets = updated return nil } func initSystemTargets(cfgMap map[string]http.Config) (tgts []Target, err error) { for _, l := range cfgMap { if l.Enabled { t := http.New(l) if err = t.Init(); err != nil { return tgts, err } tgts = append(tgts, t) } } return tgts, err } func initKafkaTargets(cfgMap map[string]kafka.Config) (tgts []Target, err error) { for _, l := range cfgMap { if l.Enabled { t := kafka.New(l) if err = t.Init(); err != nil { return tgts, err } tgts = append(tgts, t) } } return tgts, err } // Split targets into two groups: // group1 contains all targets of type t // group2 contains the remaining targets func splitTargets(targets []Target, t types.TargetType) (group1 []Target, group2 []Target) { for _, target := range targets { if target.Type() == t { group1 = append(group1, target) } else { group2 = append(group2, target) } } return } func cancelTargets(targets []Target) { for _, target := range targets { target.Cancel() } } // UpdateSystemTargets swaps targets with newly loaded ones from the cfg func UpdateSystemTargets(cfg Config) error { newTgts, err := initSystemTargets(cfg.HTTP) if err != nil { return err } swapSystemMuRW.Lock() consoleTargets, otherTargets := splitTargets(systemTargets, types.TargetConsole) newTgts = append(newTgts, consoleTargets...) systemTargets = newTgts swapSystemMuRW.Unlock() cancelTargets(otherTargets) // cancel running targets return nil } // UpdateAuditWebhookTargets swaps audit webhook targets with newly loaded ones from the cfg func UpdateAuditWebhookTargets(cfg Config) error { newWebhookTgts, err := initSystemTargets(cfg.AuditWebhook) if err != nil { return err } swapAuditMuRW.Lock() // Retain kafka targets oldWebhookTgts, otherTgts := splitTargets(auditTargets, types.TargetHTTP) newWebhookTgts = append(newWebhookTgts, otherTgts...) auditTargets = newWebhookTgts swapAuditMuRW.Unlock() cancelTargets(oldWebhookTgts) // cancel running targets return nil } // UpdateAuditKafkaTargets swaps audit kafka targets with newly loaded ones from the cfg func UpdateAuditKafkaTargets(cfg Config) error { newKafkaTgts, err := initKafkaTargets(cfg.AuditKafka) if err != nil { return err } swapAuditMuRW.Lock() // Retain webhook targets oldKafkaTgts, otherTgts := splitTargets(auditTargets, types.TargetKafka) newKafkaTgts = append(newKafkaTgts, otherTgts...) auditTargets = newKafkaTgts swapAuditMuRW.Unlock() cancelTargets(oldKafkaTgts) // cancel running targets return nil }