mirror of
https://github.com/minio/minio.git
synced 2024-12-25 06:35:56 -05:00
a337ea4d11
- Changes related to moving admin APIs - admin APIs now have an endpoint under /minio/admin - admin APIs are now versioned - a new API to server the version is added at "GET /minio/admin/version" and all API operations have the path prefix /minio/admin/v1/<operation> - new service stop API added - credentials change API is moved to /minio/admin/v1/config/credential - credentials change API and configuration get/set API now require TLS so that credentials are protected - all API requests now receive JSON - heal APIs are disabled as they will be changed substantially - Heal API changes Heal API is now provided at a single endpoint with the ability for a client to start a heal sequence on all the data in the server, a single bucket, or under a prefix within a bucket. When a heal sequence is started, the server returns a unique token that needs to be used for subsequent 'status' requests to fetch heal results. On each status request from the client, the server returns heal result records that it has accumulated since the previous status request. The server accumulates upto 1000 records and pauses healing further objects until the client requests for status. If the client does not request any further records for a long time, the server aborts the heal sequence automatically. A heal result record is returned for each entity healed on the server, such as system metadata, object metadata, buckets and objects, and has information about the before and after states on each disk. A client may request to force restart a heal sequence - this causes the running heal sequence to be aborted at the next safe spot and starts a new heal sequence.
257 lines
6.8 KiB
Go
257 lines
6.8 KiB
Go
/*
|
|
* Minio Cloud Storage, (C) 2016, 2017 Minio, Inc.
|
|
*
|
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
* you may not use this file except in compliance with the License.
|
|
* You may obtain a copy of the License at
|
|
*
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
*
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
* See the License for the specific language governing permissions and
|
|
* limitations under the License.
|
|
*/
|
|
|
|
package cmd
|
|
|
|
import (
|
|
"encoding/json"
|
|
"fmt"
|
|
"io/ioutil"
|
|
"os"
|
|
"path/filepath"
|
|
"time"
|
|
|
|
router "github.com/gorilla/mux"
|
|
"github.com/minio/minio/pkg/errors"
|
|
)
|
|
|
|
const adminPath = "/admin"
|
|
|
|
var errUnsupportedBackend = fmt.Errorf("not supported for non erasure-code backend")
|
|
|
|
// adminCmd - exports RPC methods for service status, stop and
|
|
// restart commands.
|
|
type adminCmd struct {
|
|
AuthRPCServer
|
|
}
|
|
|
|
// SignalServiceArgs - provides the signal argument to SignalService RPC
|
|
type SignalServiceArgs struct {
|
|
AuthRPCArgs
|
|
Sig serviceSignal
|
|
}
|
|
|
|
// ListLocksQuery - wraps ListLocks API's query values to send over RPC.
|
|
type ListLocksQuery struct {
|
|
AuthRPCArgs
|
|
Bucket string
|
|
Prefix string
|
|
Duration time.Duration
|
|
}
|
|
|
|
// ListLocksReply - wraps ListLocks response over RPC.
|
|
type ListLocksReply struct {
|
|
AuthRPCReply
|
|
VolLocks []VolumeLockInfo
|
|
}
|
|
|
|
// ServerInfoDataReply - wraps the server info response over RPC.
|
|
type ServerInfoDataReply struct {
|
|
AuthRPCReply
|
|
ServerInfoData ServerInfoData
|
|
}
|
|
|
|
// ConfigReply - wraps the server config response over RPC.
|
|
type ConfigReply struct {
|
|
AuthRPCReply
|
|
Config []byte // json-marshalled bytes of serverConfigV13
|
|
}
|
|
|
|
// SignalService - Send a restart or stop signal to the service
|
|
func (s *adminCmd) SignalService(args *SignalServiceArgs, reply *AuthRPCReply) error {
|
|
if err := args.IsAuthenticated(); err != nil {
|
|
return err
|
|
}
|
|
|
|
globalServiceSignalCh <- args.Sig
|
|
return nil
|
|
}
|
|
|
|
// ListLocks - lists locks held by requests handled by this server instance.
|
|
func (s *adminCmd) ListLocks(query *ListLocksQuery, reply *ListLocksReply) error {
|
|
if err := query.IsAuthenticated(); err != nil {
|
|
return err
|
|
}
|
|
volLocks := listLocksInfo(query.Bucket, query.Prefix, query.Duration)
|
|
*reply = ListLocksReply{VolLocks: volLocks}
|
|
return nil
|
|
}
|
|
|
|
// ReInitDisk - reinitialize storage disks and object layer to use the
|
|
// new format.
|
|
func (s *adminCmd) ReInitDisks(args *AuthRPCArgs, reply *AuthRPCReply) error {
|
|
if err := args.IsAuthenticated(); err != nil {
|
|
return err
|
|
}
|
|
|
|
if !globalIsXL {
|
|
return errUnsupportedBackend
|
|
}
|
|
|
|
// Get the current object layer instance.
|
|
objLayer := newObjectLayerFn()
|
|
|
|
// Initialize new disks to include the newly formatted disks.
|
|
bootstrapDisks, err := initStorageDisks(globalEndpoints)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
// Wrap into retrying disks
|
|
retryingDisks := initRetryableStorageDisks(bootstrapDisks,
|
|
time.Millisecond, time.Millisecond*5, globalStorageHealthCheckInterval, globalStorageRetryThreshold)
|
|
|
|
// Initialize new object layer with newly formatted disks.
|
|
newObjectAPI, err := newXLObjects(retryingDisks)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
// Replace object layer with newly formatted storage.
|
|
globalObjLayerMutex.Lock()
|
|
globalObjectAPI = newObjectAPI
|
|
globalObjLayerMutex.Unlock()
|
|
|
|
// Shutdown storage belonging to old object layer instance.
|
|
objLayer.Shutdown()
|
|
|
|
return nil
|
|
}
|
|
|
|
// ServerInfo - returns the server info when object layer was initialized on this server.
|
|
func (s *adminCmd) ServerInfoData(args *AuthRPCArgs, reply *ServerInfoDataReply) error {
|
|
if err := args.IsAuthenticated(); err != nil {
|
|
return err
|
|
}
|
|
|
|
if globalBootTime.IsZero() {
|
|
return errServerNotInitialized
|
|
}
|
|
|
|
// Build storage info
|
|
objLayer := newObjectLayerFn()
|
|
if objLayer == nil {
|
|
return errServerNotInitialized
|
|
}
|
|
storageInfo := objLayer.StorageInfo()
|
|
|
|
var arns []string
|
|
for queueArn := range globalEventNotifier.GetAllExternalTargets() {
|
|
arns = append(arns, queueArn)
|
|
}
|
|
|
|
reply.ServerInfoData = ServerInfoData{
|
|
Properties: ServerProperties{
|
|
Uptime: UTCNow().Sub(globalBootTime),
|
|
Version: Version,
|
|
CommitID: CommitID,
|
|
Region: globalServerConfig.GetRegion(),
|
|
SQSARN: arns,
|
|
},
|
|
StorageInfo: storageInfo,
|
|
ConnStats: globalConnStats.toServerConnStats(),
|
|
HTTPStats: globalHTTPStats.toServerHTTPStats(),
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
// GetConfig - returns the config.json of this server.
|
|
func (s *adminCmd) GetConfig(args *AuthRPCArgs, reply *ConfigReply) error {
|
|
if err := args.IsAuthenticated(); err != nil {
|
|
return err
|
|
}
|
|
|
|
if globalServerConfig == nil {
|
|
return fmt.Errorf("config not present")
|
|
}
|
|
|
|
jsonBytes, err := json.Marshal(globalServerConfig)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
reply.Config = jsonBytes
|
|
return nil
|
|
}
|
|
|
|
// WriteConfigArgs - wraps the bytes to be written and temporary file name.
|
|
type WriteConfigArgs struct {
|
|
AuthRPCArgs
|
|
TmpFileName string
|
|
Buf []byte
|
|
}
|
|
|
|
// WriteConfigReply - wraps the result of a writing config into a temporary file.
|
|
// the remote node.
|
|
type WriteConfigReply struct {
|
|
AuthRPCReply
|
|
}
|
|
|
|
func writeTmpConfigCommon(tmpFileName string, configBytes []byte) error {
|
|
tmpConfigFile := filepath.Join(getConfigDir(), tmpFileName)
|
|
err := ioutil.WriteFile(tmpConfigFile, configBytes, 0666)
|
|
errorIf(err, fmt.Sprintf("Failed to write to temporary config file %s", tmpConfigFile))
|
|
return err
|
|
}
|
|
|
|
// WriteTmpConfig - writes the supplied config contents onto the
|
|
// supplied temporary file.
|
|
func (s *adminCmd) WriteTmpConfig(wArgs *WriteConfigArgs, wReply *WriteConfigReply) error {
|
|
if err := wArgs.IsAuthenticated(); err != nil {
|
|
return err
|
|
}
|
|
|
|
return writeTmpConfigCommon(wArgs.TmpFileName, wArgs.Buf)
|
|
}
|
|
|
|
// CommitConfigArgs - wraps the config file name that needs to be
|
|
// committed into config.json on this node.
|
|
type CommitConfigArgs struct {
|
|
AuthRPCArgs
|
|
FileName string
|
|
}
|
|
|
|
// CommitConfigReply - represents response to commit of config file on
|
|
// this node.
|
|
type CommitConfigReply struct {
|
|
AuthRPCReply
|
|
}
|
|
|
|
// CommitConfig - Renames the temporary file into config.json on this node.
|
|
func (s *adminCmd) CommitConfig(cArgs *CommitConfigArgs, cReply *CommitConfigReply) error {
|
|
configFile := getConfigFile()
|
|
tmpConfigFile := filepath.Join(getConfigDir(), cArgs.FileName)
|
|
|
|
err := os.Rename(tmpConfigFile, configFile)
|
|
errorIf(err, fmt.Sprintf("Failed to rename %s to %s", tmpConfigFile, configFile))
|
|
return err
|
|
}
|
|
|
|
// registerAdminRPCRouter - registers RPC methods for service status,
|
|
// stop and restart commands.
|
|
func registerAdminRPCRouter(mux *router.Router) error {
|
|
adminRPCHandler := &adminCmd{}
|
|
adminRPCServer := newRPCServer()
|
|
err := adminRPCServer.RegisterName("Admin", adminRPCHandler)
|
|
if err != nil {
|
|
return errors.Trace(err)
|
|
}
|
|
adminRouter := mux.NewRoute().PathPrefix(minioReservedBucketPath).Subrouter()
|
|
adminRouter.Path(adminPath).Handler(adminRPCServer)
|
|
return nil
|
|
}
|