mirror of
https://github.com/minio/minio.git
synced 2025-01-11 15:03:22 -05:00
4e63e0e372
This PR adds code to appropriately handle versioning issues that come up quite constantly across our API changes. Currently we were also routing our requests wrong which sort of made it harder to write a consistent error handling code to appropriately reject or honor requests. This PR potentially fixes issues - old mc is used against new minio release which is incompatible returns an appropriate for client action. - any older servers talking to each other, report appropriate error - incompatible peer servers should report error and reject the calls with appropriate error
303 lines
8.1 KiB
Go
303 lines
8.1 KiB
Go
/*
|
|
* MinIO Cloud Storage, (C) 2018 MinIO, Inc.
|
|
*
|
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
* you may not use this file except in compliance with the License.
|
|
* You may obtain a copy of the License at
|
|
*
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
*
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
* See the License for the specific language governing permissions and
|
|
* limitations under the License.
|
|
*/
|
|
|
|
package cmd
|
|
|
|
import (
|
|
"bytes"
|
|
"context"
|
|
"encoding/json"
|
|
"fmt"
|
|
"path"
|
|
"sort"
|
|
"strings"
|
|
"time"
|
|
|
|
"github.com/minio/minio/cmd/config"
|
|
"github.com/minio/minio/cmd/logger"
|
|
"github.com/minio/minio/pkg/madmin"
|
|
)
|
|
|
|
const (
|
|
minioConfigPrefix = "config"
|
|
|
|
// Captures all the previous SetKV operations and allows rollback.
|
|
minioConfigHistoryPrefix = minioConfigPrefix + "/history"
|
|
|
|
// MinIO configuration file.
|
|
minioConfigFile = "config.json"
|
|
|
|
// MinIO configuration backup file
|
|
minioConfigBackupFile = minioConfigFile + ".backup"
|
|
)
|
|
|
|
func listServerConfigHistory(ctx context.Context, objAPI ObjectLayer) ([]madmin.ConfigHistoryEntry, error) {
|
|
var configHistory []madmin.ConfigHistoryEntry
|
|
|
|
// List all kvs
|
|
marker := ""
|
|
for {
|
|
res, err := objAPI.ListObjects(ctx, minioMetaBucket, minioConfigHistoryPrefix, marker, "", maxObjectList)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
for _, obj := range res.Objects {
|
|
configHistory = append(configHistory, madmin.ConfigHistoryEntry{
|
|
RestoreID: path.Base(obj.Name),
|
|
CreateTime: obj.ModTime, // ModTime is createTime for config history entries.
|
|
})
|
|
}
|
|
if !res.IsTruncated {
|
|
// We are done here
|
|
break
|
|
}
|
|
marker = res.NextMarker
|
|
}
|
|
sort.Slice(configHistory, func(i, j int) bool {
|
|
return configHistory[i].CreateTime.Before(configHistory[j].CreateTime)
|
|
})
|
|
return configHistory, nil
|
|
}
|
|
|
|
func delServerConfigHistory(ctx context.Context, objAPI ObjectLayer, uuidKV string) error {
|
|
historyFile := pathJoin(minioConfigHistoryPrefix, uuidKV)
|
|
return objAPI.DeleteObject(ctx, minioMetaBucket, historyFile)
|
|
}
|
|
|
|
func readServerConfigHistory(ctx context.Context, objAPI ObjectLayer, uuidKV string) ([]byte, error) {
|
|
historyFile := pathJoin(minioConfigHistoryPrefix, uuidKV)
|
|
data, err := readConfig(ctx, objAPI, historyFile)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
if globalConfigEncrypted {
|
|
data, err = madmin.DecryptData(globalActiveCred.String(), bytes.NewReader(data))
|
|
}
|
|
|
|
return data, err
|
|
}
|
|
|
|
func saveServerConfigHistory(ctx context.Context, objAPI ObjectLayer, kv []byte) error {
|
|
uuidKV := mustGetUUID() + ".kv"
|
|
historyFile := pathJoin(minioConfigHistoryPrefix, uuidKV)
|
|
|
|
var err error
|
|
if globalConfigEncrypted {
|
|
kv, err = madmin.EncryptData(globalActiveCred.String(), kv)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
}
|
|
|
|
// Save the new config KV settings into the history path.
|
|
return saveConfig(ctx, objAPI, historyFile, kv)
|
|
}
|
|
|
|
func saveServerConfig(ctx context.Context, objAPI ObjectLayer, config interface{}, oldConfig interface{}) error {
|
|
data, err := json.Marshal(config)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
configFile := path.Join(minioConfigPrefix, minioConfigFile)
|
|
// Create a backup of the current config
|
|
backupConfigFile := path.Join(minioConfigPrefix, minioConfigBackupFile)
|
|
|
|
var oldData []byte
|
|
var freshConfig bool
|
|
if oldConfig == nil {
|
|
oldData, err = readConfig(ctx, objAPI, configFile)
|
|
if err != nil && err != errConfigNotFound {
|
|
return err
|
|
}
|
|
if err == errConfigNotFound {
|
|
// Current config not found, so nothing to backup.
|
|
freshConfig = true
|
|
}
|
|
// Do not need to decrypt oldData since we are going to
|
|
// save it anyway if freshConfig is false.
|
|
} else {
|
|
oldData, err = json.Marshal(oldConfig)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
if globalConfigEncrypted {
|
|
oldData, err = madmin.EncryptData(globalActiveCred.String(), oldData)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
}
|
|
}
|
|
|
|
// No need to take backups for fresh setups.
|
|
if !freshConfig {
|
|
if err = saveConfig(ctx, objAPI, backupConfigFile, oldData); err != nil {
|
|
return err
|
|
}
|
|
}
|
|
|
|
if globalConfigEncrypted {
|
|
data, err = madmin.EncryptData(globalActiveCred.String(), data)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
}
|
|
|
|
// Save the new config in the std config path
|
|
return saveConfig(ctx, objAPI, configFile, data)
|
|
}
|
|
|
|
func readServerConfig(ctx context.Context, objAPI ObjectLayer) (config.Config, error) {
|
|
configFile := path.Join(minioConfigPrefix, minioConfigFile)
|
|
configData, err := readConfig(ctx, objAPI, configFile)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
if globalConfigEncrypted {
|
|
configData, err = madmin.DecryptData(globalActiveCred.String(), bytes.NewReader(configData))
|
|
if err != nil {
|
|
if err == madmin.ErrMaliciousData {
|
|
return nil, config.ErrInvalidCredentialsBackendEncrypted(nil)
|
|
}
|
|
return nil, err
|
|
}
|
|
}
|
|
|
|
var config = config.New()
|
|
if err = json.Unmarshal(configData, &config); err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
return config, nil
|
|
}
|
|
|
|
// ConfigSys - config system.
|
|
type ConfigSys struct{}
|
|
|
|
// Load - load config.json.
|
|
func (sys *ConfigSys) Load(objAPI ObjectLayer) error {
|
|
return sys.Init(objAPI)
|
|
}
|
|
|
|
// WatchConfigNASDisk - watches nas disk on periodic basis.
|
|
func (sys *ConfigSys) WatchConfigNASDisk(objAPI ObjectLayer) {
|
|
configInterval := globalRefreshIAMInterval
|
|
watchDisk := func() {
|
|
ticker := time.NewTicker(configInterval)
|
|
defer ticker.Stop()
|
|
for {
|
|
select {
|
|
case <-GlobalServiceDoneCh:
|
|
return
|
|
case <-ticker.C:
|
|
loadConfig(objAPI)
|
|
}
|
|
}
|
|
}
|
|
// Refresh configSys in background for NAS gateway.
|
|
go watchDisk()
|
|
}
|
|
|
|
// Init - initializes config system from config.json.
|
|
func (sys *ConfigSys) Init(objAPI ObjectLayer) error {
|
|
if objAPI == nil {
|
|
return errInvalidArgument
|
|
}
|
|
|
|
doneCh := make(chan struct{})
|
|
defer close(doneCh)
|
|
|
|
// Initializing configuration needs a retry mechanism for
|
|
// the following reasons:
|
|
// - Read quorum is lost just after the initialization
|
|
// of the object layer.
|
|
// - Write quorum not met when upgrading configuration
|
|
// version is needed.
|
|
retryTimerCh := newRetryTimerSimple(doneCh)
|
|
for {
|
|
select {
|
|
case <-retryTimerCh:
|
|
if err := initConfig(objAPI); err != nil {
|
|
if err == errDiskNotFound ||
|
|
strings.Contains(err.Error(), InsufficientReadQuorum{}.Error()) ||
|
|
strings.Contains(err.Error(), InsufficientWriteQuorum{}.Error()) {
|
|
logger.Info("Waiting for configuration to be initialized..")
|
|
continue
|
|
}
|
|
return err
|
|
}
|
|
return nil
|
|
case <-globalOSSignalCh:
|
|
return fmt.Errorf("Initializing config sub-system gracefully stopped")
|
|
}
|
|
}
|
|
}
|
|
|
|
// NewConfigSys - creates new config system object.
|
|
func NewConfigSys() *ConfigSys {
|
|
return &ConfigSys{}
|
|
}
|
|
|
|
// Initialize and load config from remote etcd or local config directory
|
|
func initConfig(objAPI ObjectLayer) error {
|
|
if objAPI == nil {
|
|
return errServerNotInitialized
|
|
}
|
|
|
|
if isFile(getConfigFile()) {
|
|
if err := migrateConfig(); err != nil {
|
|
return err
|
|
}
|
|
}
|
|
|
|
// Construct path to config/transaction.lock for locking
|
|
transactionConfigPrefix := minioConfigPrefix + "/transaction.lock"
|
|
|
|
// Hold lock only by one server and let that server alone migrate
|
|
// all the config as necessary, this is to ensure that
|
|
// redundant locks are not held for each migration - this allows
|
|
// for a more predictable behavior while debugging.
|
|
objLock := globalNSMutex.NewNSLock(context.Background(), minioMetaBucket, transactionConfigPrefix)
|
|
if err := objLock.GetLock(globalOperationTimeout); err != nil {
|
|
return err
|
|
}
|
|
defer objLock.Unlock()
|
|
|
|
// Migrates ${HOME}/.minio/config.json or config.json.deprecated
|
|
// to '<export_path>/.minio.sys/config/config.json'
|
|
// ignore if the file doesn't exist.
|
|
// If etcd is set then migrates /config/config.json
|
|
// to '<export_path>/.minio.sys/config/config.json'
|
|
if err := migrateConfigToMinioSys(objAPI); err != nil {
|
|
return err
|
|
}
|
|
|
|
// Migrates backend '<export_path>/.minio.sys/config/config.json' to latest version.
|
|
if err := migrateMinioSysConfig(objAPI); err != nil {
|
|
return err
|
|
}
|
|
|
|
// Migrates backend '<export_path>/.minio.sys/config/config.json' to
|
|
// latest config format.
|
|
if err := migrateMinioSysConfigToKV(objAPI); err != nil {
|
|
return err
|
|
}
|
|
|
|
return loadConfig(objAPI)
|
|
}
|