mirror of
https://github.com/minio/minio.git
synced 2024-12-25 22:55:54 -05:00
ae3b369fe1
PR introduced in #13819 was incorrect and was not handling the situation where a buffer is full can cause incessant amount of logs that would keep the logger webhook overrun by the requests. To avoid this only log failures to console logger instead of all targets as it can cause self reference, leading to an infinite loop.
217 lines
5.4 KiB
Go
217 lines
5.4 KiB
Go
// Copyright (c) 2015-2022 MinIO, Inc.
|
|
//
|
|
// This file is part of MinIO Object Storage stack
|
|
//
|
|
// This program is free software: you can redistribute it and/or modify
|
|
// it under the terms of the GNU Affero General Public License as published by
|
|
// the Free Software Foundation, either version 3 of the License, or
|
|
// (at your option) any later version.
|
|
//
|
|
// This program is distributed in the hope that it will be useful
|
|
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
// GNU Affero General Public License for more details.
|
|
//
|
|
// You should have received a copy of the GNU Affero General Public License
|
|
// along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
package logger
|
|
|
|
import (
|
|
"sync"
|
|
"sync/atomic"
|
|
|
|
"github.com/minio/minio/internal/logger/target/http"
|
|
"github.com/minio/minio/internal/logger/target/kafka"
|
|
"github.com/minio/minio/internal/logger/target/types"
|
|
)
|
|
|
|
// Target is the entity that we will receive
|
|
// a single log entry and Send it to the log target
|
|
// e.g. Send the log to a http server
|
|
type Target interface {
|
|
String() string
|
|
Endpoint() string
|
|
Init() error
|
|
Cancel()
|
|
Send(entry interface{}, errKind string) error
|
|
Type() types.TargetType
|
|
}
|
|
|
|
var (
|
|
// swapMu must be held while reading slice info or swapping targets or auditTargets.
|
|
swapMu sync.Mutex
|
|
|
|
// systemTargets is the set of enabled loggers.
|
|
// Must be immutable at all times.
|
|
// Can be swapped to another while holding swapMu
|
|
systemTargets = []Target{}
|
|
|
|
// This is always set represent /dev/console target
|
|
consoleTgt Target
|
|
|
|
nTargets int32 // atomic count of len(targets)
|
|
)
|
|
|
|
// SystemTargets returns active targets.
|
|
// Returned slice may not be modified in any way.
|
|
func SystemTargets() []Target {
|
|
if atomic.LoadInt32(&nTargets) == 0 {
|
|
// Lock free if none...
|
|
return nil
|
|
}
|
|
swapMu.Lock()
|
|
res := systemTargets
|
|
swapMu.Unlock()
|
|
return res
|
|
}
|
|
|
|
// AuditTargets returns active audit targets.
|
|
// Returned slice may not be modified in any way.
|
|
func AuditTargets() []Target {
|
|
if atomic.LoadInt32(&nAuditTargets) == 0 {
|
|
// Lock free if none...
|
|
return nil
|
|
}
|
|
swapMu.Lock()
|
|
res := auditTargets
|
|
swapMu.Unlock()
|
|
return res
|
|
}
|
|
|
|
// auditTargets is the list of enabled audit loggers
|
|
// Must be immutable at all times.
|
|
// Can be swapped to another while holding swapMu
|
|
var (
|
|
auditTargets = []Target{}
|
|
nAuditTargets int32 // atomic count of len(auditTargets)
|
|
)
|
|
|
|
// AddSystemTarget adds a new logger target to the
|
|
// list of enabled loggers
|
|
func AddSystemTarget(t Target) error {
|
|
if err := t.Init(); err != nil {
|
|
return err
|
|
}
|
|
swapMu.Lock()
|
|
if consoleTgt == nil {
|
|
if t.Type() == types.TargetConsole {
|
|
consoleTgt = t
|
|
}
|
|
}
|
|
updated := append(make([]Target, 0, len(systemTargets)+1), systemTargets...)
|
|
updated = append(updated, t)
|
|
systemTargets = updated
|
|
atomic.StoreInt32(&nTargets, int32(len(updated)))
|
|
swapMu.Unlock()
|
|
|
|
return nil
|
|
}
|
|
|
|
func cancelAllSystemTargets() {
|
|
for _, tgt := range systemTargets {
|
|
tgt.Cancel()
|
|
}
|
|
}
|
|
|
|
func initSystemTargets(cfgMap map[string]http.Config) (tgts []Target, err error) {
|
|
for _, l := range cfgMap {
|
|
if l.Enabled {
|
|
t := http.New(l)
|
|
if err = t.Init(); err != nil {
|
|
return tgts, err
|
|
}
|
|
tgts = append(tgts, t)
|
|
}
|
|
}
|
|
return tgts, err
|
|
}
|
|
|
|
func initKafkaTargets(cfgMap map[string]kafka.Config) (tgts []Target, err error) {
|
|
for _, l := range cfgMap {
|
|
if l.Enabled {
|
|
t := kafka.New(l)
|
|
if err = t.Init(); err != nil {
|
|
return tgts, err
|
|
}
|
|
tgts = append(tgts, t)
|
|
}
|
|
}
|
|
return tgts, err
|
|
}
|
|
|
|
// UpdateSystemTargets swaps targets with newly loaded ones from the cfg
|
|
func UpdateSystemTargets(cfg Config) error {
|
|
updated, err := initSystemTargets(cfg.HTTP)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
swapMu.Lock()
|
|
for _, tgt := range systemTargets {
|
|
// Preserve console target when dynamically updating
|
|
// other HTTP targets, console target is always present.
|
|
if tgt.Type() == types.TargetConsole {
|
|
updated = append(updated, tgt)
|
|
break
|
|
}
|
|
}
|
|
atomic.StoreInt32(&nTargets, int32(len(updated)))
|
|
cancelAllSystemTargets() // cancel running targets
|
|
systemTargets = updated
|
|
swapMu.Unlock()
|
|
return nil
|
|
}
|
|
|
|
func cancelAuditTargetType(t types.TargetType) {
|
|
for _, tgt := range auditTargets {
|
|
if tgt.Type() == t {
|
|
tgt.Cancel()
|
|
}
|
|
}
|
|
}
|
|
|
|
func existingAuditTargets(t types.TargetType) []Target {
|
|
tgts := make([]Target, 0, len(auditTargets))
|
|
for _, tgt := range auditTargets {
|
|
if tgt.Type() == t {
|
|
tgts = append(tgts, tgt)
|
|
}
|
|
}
|
|
return tgts
|
|
}
|
|
|
|
// UpdateAuditWebhookTargets swaps audit webhook targets with newly loaded ones from the cfg
|
|
func UpdateAuditWebhookTargets(cfg Config) error {
|
|
updated, err := initSystemTargets(cfg.AuditWebhook)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
// retain kafka targets
|
|
updated = append(existingAuditTargets(types.TargetKafka), updated...)
|
|
|
|
swapMu.Lock()
|
|
atomic.StoreInt32(&nAuditTargets, int32(len(updated)))
|
|
cancelAuditTargetType(types.TargetHTTP) // cancel running targets
|
|
auditTargets = updated
|
|
swapMu.Unlock()
|
|
return nil
|
|
}
|
|
|
|
// UpdateAuditKafkaTargets swaps audit kafka targets with newly loaded ones from the cfg
|
|
func UpdateAuditKafkaTargets(cfg Config) error {
|
|
updated, err := initKafkaTargets(cfg.AuditKafka)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
// retain HTTP targets
|
|
updated = append(existingAuditTargets(types.TargetHTTP), updated...)
|
|
|
|
swapMu.Lock()
|
|
atomic.StoreInt32(&nAuditTargets, int32(len(updated)))
|
|
cancelAuditTargetType(types.TargetKafka) // cancel running targets
|
|
auditTargets = updated
|
|
swapMu.Unlock()
|
|
return nil
|
|
}
|