mirror of
https://github.com/minio/minio.git
synced 2024-12-26 07:05:55 -05:00
0e2cd1a64d
Added clear subcommand for control lock with following options: ``` 3. Clear lock named 'bucket/object' (exact match). $ minio control lock clear http://localhost:9000/bucket/object 4. Clear all locks with names that start with 'bucket/prefix' (wildcard match). $ minio control lock --recursive clear http://localhost:9000/bucket/prefix 5. Clear all locks older than 10minutes. $ minio control lock --older-than=10m clear http://localhost:9000/ 6. Clear all locks with names that start with 'bucket/a' and that are older than 1hour. $ minio control lock --recursive --older-than=1h clear http://localhost:9000/bucket/a ```
278 lines
6.9 KiB
Go
278 lines
6.9 KiB
Go
/*
|
|
* Minio Cloud Storage, (C) 2016 Minio, Inc.
|
|
*
|
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
* you may not use this file except in compliance with the License.
|
|
* You may obtain a copy of the License at
|
|
*
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
*
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
* See the License for the specific language governing permissions and
|
|
* limitations under the License.
|
|
*/
|
|
|
|
package cmd
|
|
|
|
import (
|
|
"errors"
|
|
"sync"
|
|
"time"
|
|
)
|
|
|
|
// errServerNotInitialized - server not initialized.
|
|
var errServerNotInitialized = errors.New("Server not initialized, please try again.")
|
|
|
|
// errServerVersionMismatch - server versions do not match.
|
|
var errServerVersionMismatch = errors.New("Server versions do not match.")
|
|
|
|
// errServerTimeMismatch - server times are too far apart.
|
|
var errServerTimeMismatch = errors.New("Server times are too far apart.")
|
|
|
|
/// Auth operations
|
|
|
|
// Login - login handler.
|
|
func (c *controlAPIHandlers) LoginHandler(args *RPCLoginArgs, reply *RPCLoginReply) error {
|
|
jwt, err := newJWT(defaultInterNodeJWTExpiry)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
if err = jwt.Authenticate(args.Username, args.Password); err != nil {
|
|
return err
|
|
}
|
|
token, err := jwt.GenerateToken(args.Username)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
reply.Token = token
|
|
reply.Timestamp = time.Now().UTC()
|
|
reply.ServerVersion = Version
|
|
return nil
|
|
}
|
|
|
|
// HealListArgs - argument for ListObjects RPC.
|
|
type HealListArgs struct {
|
|
// Authentication token generated by Login.
|
|
GenericArgs
|
|
|
|
Bucket string
|
|
Prefix string
|
|
Marker string
|
|
Delimiter string
|
|
MaxKeys int
|
|
}
|
|
|
|
// HealListReply - reply object by ListObjects RPC.
|
|
type HealListReply struct {
|
|
IsTruncated bool
|
|
NextMarker string
|
|
Objects []ObjectInfo
|
|
}
|
|
|
|
// ListObjects - list all objects that needs healing.
|
|
func (c *controlAPIHandlers) ListObjectsHealHandler(args *HealListArgs, reply *HealListReply) error {
|
|
objAPI := c.ObjectAPI()
|
|
if objAPI == nil {
|
|
return errServerNotInitialized
|
|
}
|
|
if !isRPCTokenValid(args.Token) {
|
|
return errInvalidToken
|
|
}
|
|
if !c.IsXL {
|
|
return nil
|
|
}
|
|
info, err := objAPI.ListObjectsHeal(args.Bucket, args.Prefix, args.Marker, args.Delimiter, args.MaxKeys)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
reply.IsTruncated = info.IsTruncated
|
|
reply.NextMarker = info.NextMarker
|
|
reply.Objects = info.Objects
|
|
return nil
|
|
}
|
|
|
|
// HealBucketArgs - arguments for HealBucket RPC.
|
|
type HealBucketArgs struct {
|
|
// Authentication token generated by Login.
|
|
GenericArgs
|
|
|
|
// Bucket to be healed.
|
|
Bucket string
|
|
}
|
|
|
|
// Heals missing buckets across disks, if we have enough quorum.
|
|
func (c *controlAPIHandlers) HealBucketHandler(args *HealBucketArgs, reply *GenericReply) error {
|
|
objAPI := c.ObjectAPI()
|
|
if objAPI == nil {
|
|
return errServerNotInitialized
|
|
}
|
|
if !isRPCTokenValid(args.Token) {
|
|
return errInvalidToken
|
|
}
|
|
if !c.IsXL {
|
|
return nil
|
|
}
|
|
// Proceed to heal the bucket.
|
|
return objAPI.HealBucket(args.Bucket)
|
|
}
|
|
|
|
// HealObjectArgs - argument for HealObject RPC.
|
|
type HealObjectArgs struct {
|
|
// Authentication token generated by Login.
|
|
GenericArgs
|
|
|
|
// Name of the bucket where the object
|
|
// needs to be healed.
|
|
Bucket string
|
|
|
|
// Name of the object to be healed.
|
|
Objects []ObjectInfo
|
|
}
|
|
|
|
// HealObjectReply - reply by HealObject RPC.
|
|
type HealObjectReply struct {
|
|
Results []string
|
|
}
|
|
|
|
// HealObject heals 1000 objects at a time for missing chunks, missing metadata on a given bucket.
|
|
func (c *controlAPIHandlers) HealObjectsHandler(args *HealObjectArgs, reply *HealObjectReply) error {
|
|
objAPI := c.ObjectAPI()
|
|
if objAPI == nil {
|
|
return errServerNotInitialized
|
|
}
|
|
if !isRPCTokenValid(args.Token) {
|
|
return errInvalidToken
|
|
}
|
|
if !c.IsXL {
|
|
return nil
|
|
}
|
|
|
|
// Heal all objects that need healing.
|
|
var errs = make([]error, len(args.Objects))
|
|
for idx, objInfo := range args.Objects {
|
|
errs[idx] = objAPI.HealObject(args.Bucket, objInfo.Name)
|
|
}
|
|
|
|
// Get all the error causes.
|
|
var causes = make([]string, len(args.Objects))
|
|
for id, err := range errs {
|
|
if err != nil {
|
|
causes[id] = err.Error()
|
|
}
|
|
}
|
|
|
|
// Save the causes.
|
|
reply.Results = causes
|
|
return nil
|
|
}
|
|
|
|
// Heals backend storage format.
|
|
func (c *controlAPIHandlers) HealFormatHandler(args *GenericArgs, reply *GenericReply) error {
|
|
if !isRPCTokenValid(args.Token) {
|
|
return errInvalidToken
|
|
}
|
|
if !c.IsXL {
|
|
return nil
|
|
}
|
|
err := healFormatXL(c.StorageDisks)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
go func() {
|
|
globalWakeupCh <- struct{}{}
|
|
}()
|
|
return err
|
|
}
|
|
|
|
// ServiceArgs - argument for Service RPC.
|
|
type ServiceArgs struct {
|
|
// Authentication token generated by Login.
|
|
GenericArgs
|
|
|
|
// Represents the type of operation server is requested
|
|
// to perform. Currently supported signals are
|
|
// stop, restart and status.
|
|
Signal serviceSignal
|
|
}
|
|
|
|
// ServiceReply - represents service operation success info.
|
|
type ServiceReply struct {
|
|
StorageInfo StorageInfo
|
|
}
|
|
|
|
// Remote procedure call, calls serviceMethod with given input args.
|
|
func (c *controlAPIHandlers) remoteServiceCall(args *ServiceArgs, replies []*ServiceReply) error {
|
|
var wg sync.WaitGroup
|
|
var errs = make([]error, len(c.RemoteControls))
|
|
// Send remote call to all neighboring peers to restart minio servers.
|
|
for index, clnt := range c.RemoteControls {
|
|
wg.Add(1)
|
|
go func(index int, client *AuthRPCClient) {
|
|
defer wg.Done()
|
|
errs[index] = client.Call("Control.ServiceHandler", args, replies[index])
|
|
errorIf(errs[index], "Unable to initiate control service request to remote node %s", client.Node())
|
|
}(index, clnt)
|
|
}
|
|
wg.Wait()
|
|
for _, err := range errs {
|
|
if err != nil {
|
|
return err
|
|
}
|
|
}
|
|
return nil
|
|
}
|
|
|
|
// Service - handler for sending service signals across many servers.
|
|
func (c *controlAPIHandlers) ServiceHandler(args *ServiceArgs, reply *ServiceReply) error {
|
|
if !isRPCTokenValid(args.Token) {
|
|
return errInvalidToken
|
|
}
|
|
objAPI := c.ObjectAPI()
|
|
if objAPI == nil {
|
|
return errServerNotInitialized
|
|
}
|
|
if args.Signal == serviceStatus {
|
|
reply.StorageInfo = objAPI.StorageInfo()
|
|
return nil
|
|
}
|
|
var replies = make([]*ServiceReply, len(c.RemoteControls))
|
|
switch args.Signal {
|
|
case serviceRestart:
|
|
if args.Remote {
|
|
// Set remote as false for remote calls.
|
|
args.Remote = false
|
|
if err := c.remoteServiceCall(args, replies); err != nil {
|
|
return err
|
|
}
|
|
}
|
|
globalServiceSignalCh <- serviceRestart
|
|
case serviceStop:
|
|
if args.Remote {
|
|
// Set remote as false for remote calls.
|
|
args.Remote = false
|
|
if err := c.remoteServiceCall(args, replies); err != nil {
|
|
return err
|
|
}
|
|
}
|
|
globalServiceSignalCh <- serviceStop
|
|
}
|
|
return nil
|
|
}
|
|
|
|
// TryInitHandler - generic RPC control handler
|
|
func (c *controlAPIHandlers) TryInitHandler(args *GenericArgs, reply *GenericReply) error {
|
|
if !isRPCTokenValid(args.Token) {
|
|
return errInvalidToken
|
|
}
|
|
if !c.IsXL {
|
|
return nil
|
|
}
|
|
go func() {
|
|
globalWakeupCh <- struct{}{}
|
|
}()
|
|
*reply = GenericReply{}
|
|
return nil
|
|
}
|