|
|
|
/*
|
config/main: Re-write config files - add to new config v3
- New config format.
```
{
"version": "3",
"address": ":9000",
"backend": {
"type": "fs",
"disk": "/path"
},
"credential": {
"accessKey": "WLGDGYAQYIGI833EV05A",
"secretKey": "BYvgJM101sHngl2uzjXS/OBF/aMxAN06JrJ3qJlF"
},
"region": "us-east-1",
"logger": {
"file": {
"enable": false,
"fileName": "",
"level": "error"
},
"syslog": {
"enable": false,
"address": "",
"level": "debug"
},
"console": {
"enable": true,
"level": "fatal"
}
}
}
```
New command lines in lieu of supporting XL.
Minio initialize filesystem backend.
~~~
$ minio init fs <path>
~~~
Minio initialize XL backend.
~~~
$ minio init xl <url1>...<url16>
~~~
For 'fs' backend it starts the server.
~~~
$ minio server
~~~
For 'xl' backend it waits for servers to join.
~~~
$ minio server
... [PROGRESS BAR] of servers connecting
~~~
Now on other servers execute 'join' and they connect.
~~~
....
minio join <url1> -- from <url2> && minio server
minio join <url1> -- from <url3> && minio server
...
...
minio join <url1> -- from <url16> && minio server
~~~
9 years ago
|
|
|
* Minio Cloud Storage, (C) 2015, 2016 Minio, Inc.
|
|
|
|
*
|
|
|
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
* you may not use this file except in compliance with the License.
|
|
|
|
* You may obtain a copy of the License at
|
|
|
|
*
|
|
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
*
|
|
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
|
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
* See the License for the specific language governing permissions and
|
|
|
|
* limitations under the License.
|
|
|
|
*/
|
|
|
|
|
|
|
|
package cmd
|
|
|
|
|
|
|
|
import (
|
|
|
|
"net/http"
|
|
|
|
"os"
|
|
|
|
"strings"
|
|
|
|
|
|
|
|
router "github.com/gorilla/mux"
|
|
|
|
)
|
|
|
|
|
|
|
|
func newObjectLayerFn() ObjectLayer {
|
|
|
|
globalObjLayerMutex.Lock()
|
|
|
|
defer globalObjLayerMutex.Unlock()
|
|
|
|
return globalObjectAPI
|
|
|
|
}
|
|
|
|
|
|
|
|
// newObjectLayer - initialize any object layer depending on the number of disks.
|
|
|
|
func newObjectLayer(storageDisks []StorageAPI) (ObjectLayer, error) {
|
|
|
|
var objAPI ObjectLayer
|
|
|
|
var err error
|
|
|
|
if len(storageDisks) == 1 {
|
|
|
|
// Initialize FS object layer.
|
|
|
|
objAPI, err = newFSObjects(storageDisks[0])
|
|
|
|
} else {
|
|
|
|
// Initialize XL object layer.
|
|
|
|
objAPI, err = newXLObjects(storageDisks)
|
|
|
|
}
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
// The following actions are performed here, so that any
|
|
|
|
// requests coming in early in the bootup sequence don't fail
|
|
|
|
// unexpectedly - e.g. if initEventNotifier was initialized
|
|
|
|
// after this function completes, an event could be generated
|
|
|
|
// before the notification system is ready, causing event
|
|
|
|
// drops or crashes.
|
|
|
|
|
|
|
|
// Migrate bucket policy from configDir to .minio.sys/buckets/
|
|
|
|
err = migrateBucketPolicyConfig(objAPI)
|
|
|
|
if err != nil {
|
|
|
|
errorIf(err, "Unable to migrate bucket policy from config directory")
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
err = cleanupOldBucketPolicyConfigs()
|
|
|
|
if err != nil {
|
|
|
|
errorIf(err, "Unable to clean up bucket policy from config directory.")
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
// Initialize and load bucket policies.
|
|
|
|
err = initBucketPolicies(objAPI)
|
|
|
|
fatalIf(err, "Unable to load all bucket policies.")
|
|
|
|
|
|
|
|
// Initialize a new event notifier.
|
|
|
|
err = initEventNotifier(objAPI)
|
|
|
|
fatalIf(err, "Unable to initialize event notification.")
|
|
|
|
|
|
|
|
// Success.
|
|
|
|
return objAPI, nil
|
|
|
|
}
|
|
|
|
|
routers: Fix a crash while initializing network fs. (#1382)
Crash happens when 'minio server filename' a file name is
provided instead of a directory on command line argument.
```
panic: runtime error: slice bounds out of range
goroutine 1 [running]:
panic(0x5eb460, 0xc82000e0b0)
/usr/local/opt/go/libexec/src/runtime/panic.go:464 +0x3e6
main.splitNetPath(0x7fff5fbff9bd, 0x7, 0x0, 0x0, 0x0, 0x0)
/Users/harsha/mygo/src/github.com/minio/minio/network-fs.go:49 +0xb7
main.newNetworkFS(0x7fff5fbff9bd, 0x7, 0x0, 0x0, 0x0, 0x0)
/Users/harsha/mygo/src/github.com/minio/minio/network-fs.go:90 +0x20a
main.configureServerHandler(0xc82024e1c8, 0x5, 0xc8200640e0, 0x1, 0x1, 0x0, 0x0)
/Users/harsha/mygo/src/github.com/minio/minio/routers.go:43 +0x6ce
main.configureServer(0xc82024e1c8, 0x5, 0xc8200640e0, 0x1, 0x1, 0x5)
/Users/harsha/mygo/src/github.com/minio/minio/server-main.go:86 +0x67
```
9 years ago
|
|
|
// configureServer handler returns final handler for the http server.
|
|
|
|
func configureServerHandler(srvCmdConfig serverCmdConfig) (http.Handler, error) {
|
|
|
|
// Initialize router.
|
|
|
|
mux := router.NewRouter()
|
|
|
|
|
|
|
|
// Initialize distributed NS lock.
|
|
|
|
if srvCmdConfig.isDistXL {
|
|
|
|
// Register storage rpc router only if its a distributed setup.
|
|
|
|
err := registerStorageRPCRouters(mux, srvCmdConfig)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
// Register distributed namespace lock.
|
|
|
|
err = registerDistNSLockRouter(mux, srvCmdConfig)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Register S3 peer communication router.
|
|
|
|
err := registerS3PeerRPCRouter(mux)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
// Register controller rpc router.
|
|
|
|
err = registerControlRPCRouter(mux, srvCmdConfig)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
// set environmental variable MINIO_BROWSER=off to disable minio web browser.
|
|
|
|
// By default minio web browser is enabled.
|
|
|
|
if !strings.EqualFold(os.Getenv("MINIO_BROWSER"), "off") {
|
|
|
|
// Register RPC router for web related calls.
|
|
|
|
if err = registerBrowserRPCRouter(mux); err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
if err = registerWebRouter(mux); err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Add API router.
|
|
|
|
registerAPIRouter(mux)
|
|
|
|
|
|
|
|
// List of some generic handlers which are applied for all incoming requests.
|
|
|
|
var handlerFns = []HandlerFunc{
|
|
|
|
// Limits the number of concurrent http requests.
|
|
|
|
setRateLimitHandler,
|
|
|
|
// Limits all requests size to a maximum fixed limit
|
|
|
|
setRequestSizeLimitHandler,
|
|
|
|
// Adds 'crossdomain.xml' policy handler to serve legacy flash clients.
|
|
|
|
setCrossDomainPolicy,
|
|
|
|
// Redirect some pre-defined browser request paths to a static location prefix.
|
|
|
|
setBrowserRedirectHandler,
|
|
|
|
// Validates if incoming request is for restricted buckets.
|
|
|
|
setPrivateBucketHandler,
|
|
|
|
// Adds cache control for all browser requests.
|
|
|
|
setBrowserCacheControlHandler,
|
|
|
|
// CORS setting for all browser API requests.
|
|
|
|
setCorsHandler,
|
|
|
|
// Validates all incoming URL resources, for invalid/unsupported
|
|
|
|
// resources client receives a HTTP error.
|
|
|
|
setIgnoreResourcesHandler,
|
|
|
|
// Auth handler verifies incoming authorization headers and
|
|
|
|
// routes them accordingly. Client receives a HTTP error for
|
|
|
|
// invalid/unsupported signatures.
|
|
|
|
setAuthHandler,
|
|
|
|
// Add new handlers here.
|
|
|
|
}
|
|
|
|
|
|
|
|
// Register rest of the handlers.
|
|
|
|
return registerHandlers(mux, handlerFns...), nil
|
|
|
|
}
|