You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
622 lines
18 KiB
622 lines
18 KiB
6 years ago
|
/*
|
||
|
* Minio Cloud Storage, (C) 2019 Minio, Inc.
|
||
|
*
|
||
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
||
|
* you may not use this file except in compliance with the License.
|
||
|
* You may obtain a copy of the License at
|
||
|
*
|
||
|
* http://www.apache.org/licenses/LICENSE-2.0
|
||
|
*
|
||
|
* Unless required by applicable law or agreed to in writing, software
|
||
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
||
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||
|
* See the License for the specific language governing permissions and
|
||
|
* limitations under the License.
|
||
|
*/
|
||
|
|
||
|
package cmd
|
||
|
|
||
|
import (
|
||
|
"context"
|
||
|
"encoding/gob"
|
||
|
"errors"
|
||
|
"fmt"
|
||
|
"net/http"
|
||
|
"path"
|
||
|
"sort"
|
||
|
"strings"
|
||
|
"time"
|
||
|
|
||
|
"github.com/gorilla/mux"
|
||
|
"github.com/minio/minio/cmd/logger"
|
||
|
"github.com/minio/minio/pkg/event"
|
||
|
xnet "github.com/minio/minio/pkg/net"
|
||
|
"github.com/minio/minio/pkg/policy"
|
||
|
)
|
||
|
|
||
|
// To abstract a node over network.
|
||
|
type peerRESTServer struct {
|
||
|
}
|
||
|
|
||
|
func getServerInfo() (*ServerInfoData, error) {
|
||
|
if globalBootTime.IsZero() {
|
||
|
return nil, errServerNotInitialized
|
||
|
}
|
||
|
|
||
|
objLayer := newObjectLayerFn()
|
||
|
if objLayer == nil {
|
||
|
return nil, errServerNotInitialized
|
||
|
}
|
||
|
// Server info data.
|
||
|
return &ServerInfoData{
|
||
|
StorageInfo: objLayer.StorageInfo(context.Background()),
|
||
|
ConnStats: globalConnStats.toServerConnStats(),
|
||
|
HTTPStats: globalHTTPStats.toServerHTTPStats(),
|
||
|
Properties: ServerProperties{
|
||
|
Uptime: UTCNow().Sub(globalBootTime),
|
||
|
Version: Version,
|
||
|
CommitID: CommitID,
|
||
|
SQSARN: globalNotificationSys.GetARNList(),
|
||
|
Region: globalServerConfig.GetRegion(),
|
||
|
},
|
||
|
}, nil
|
||
|
}
|
||
|
|
||
|
// uptimes - used to sort uptimes in chronological order.
|
||
|
type uptimes []time.Duration
|
||
|
|
||
|
func (ts uptimes) Len() int {
|
||
|
return len(ts)
|
||
|
}
|
||
|
|
||
|
func (ts uptimes) Less(i, j int) bool {
|
||
|
return ts[i] < ts[j]
|
||
|
}
|
||
|
|
||
|
func (ts uptimes) Swap(i, j int) {
|
||
|
ts[i], ts[j] = ts[j], ts[i]
|
||
|
}
|
||
|
|
||
|
// getPeerUptimes - returns the uptime.
|
||
|
func getPeerUptimes(serverInfo []ServerInfo) time.Duration {
|
||
|
// In a single node Erasure or FS backend setup the uptime of
|
||
|
// the setup is the uptime of the single minio server
|
||
|
// instance.
|
||
|
if !globalIsDistXL {
|
||
|
return UTCNow().Sub(globalBootTime)
|
||
|
}
|
||
|
|
||
|
var times []time.Duration
|
||
|
|
||
|
for _, info := range serverInfo {
|
||
|
if info.Error != "" {
|
||
|
continue
|
||
|
}
|
||
|
times = append(times, info.Data.Properties.Uptime)
|
||
|
}
|
||
|
|
||
|
// Sort uptimes in chronological order.
|
||
|
sort.Sort(uptimes(times))
|
||
|
|
||
|
// Return the latest time as the uptime.
|
||
|
return times[0]
|
||
|
}
|
||
|
|
||
|
// GetLocksHandler - returns list of older lock from the server.
|
||
|
func (s *peerRESTServer) GetLocksHandler(w http.ResponseWriter, r *http.Request) {
|
||
|
if !s.IsValid(w, r) {
|
||
|
s.writeErrorResponse(w, errors.New("Invalid request"))
|
||
|
return
|
||
|
}
|
||
|
|
||
|
ctx := newContext(r, w, "GetLocks")
|
||
|
locks := globalLockServer.ll.DupLockMap()
|
||
|
logger.LogIf(ctx, gob.NewEncoder(w).Encode(locks))
|
||
|
|
||
|
w.(http.Flusher).Flush()
|
||
|
|
||
|
}
|
||
|
|
||
|
// LoadUsersHandler - returns server info.
|
||
|
func (s *peerRESTServer) LoadUsersHandler(w http.ResponseWriter, r *http.Request) {
|
||
|
if !s.IsValid(w, r) {
|
||
|
s.writeErrorResponse(w, errors.New("Invalid request"))
|
||
|
return
|
||
|
}
|
||
|
|
||
|
objAPI := newObjectLayerFn()
|
||
|
if objAPI == nil {
|
||
|
s.writeErrorResponse(w, errServerNotInitialized)
|
||
|
return
|
||
|
}
|
||
|
|
||
|
err := globalIAMSys.Load(objAPI)
|
||
|
if err != nil {
|
||
|
s.writeErrorResponse(w, err)
|
||
|
return
|
||
|
}
|
||
|
|
||
|
w.(http.Flusher).Flush()
|
||
|
}
|
||
|
|
||
|
// StartProfilingHandler - Issues the start profiling command.
|
||
|
func (s *peerRESTServer) StartProfilingHandler(w http.ResponseWriter, r *http.Request) {
|
||
|
if !s.IsValid(w, r) {
|
||
|
s.writeErrorResponse(w, errors.New("Invalid request"))
|
||
|
return
|
||
|
}
|
||
|
|
||
|
vars := mux.Vars(r)
|
||
|
profiler := vars[peerRESTProfiler]
|
||
|
if profiler == "" {
|
||
|
s.writeErrorResponse(w, errors.New("profiler name is missing"))
|
||
|
return
|
||
|
}
|
||
|
|
||
|
if globalProfiler != nil {
|
||
|
globalProfiler.Stop()
|
||
|
}
|
||
|
|
||
|
var err error
|
||
|
globalProfiler, err = startProfiler(profiler, "")
|
||
|
if err != nil {
|
||
|
s.writeErrorResponse(w, err)
|
||
|
return
|
||
|
}
|
||
|
|
||
|
w.(http.Flusher).Flush()
|
||
|
}
|
||
|
|
||
|
// ServerInfoHandler - returns server info.
|
||
|
func (s *peerRESTServer) ServerInfoHandler(w http.ResponseWriter, r *http.Request) {
|
||
|
if !s.IsValid(w, r) {
|
||
|
s.writeErrorResponse(w, errors.New("Invalid request"))
|
||
|
return
|
||
|
}
|
||
|
|
||
|
ctx := newContext(r, w, "ServerInfo")
|
||
|
info, err := getServerInfo()
|
||
|
if err != nil {
|
||
|
s.writeErrorResponse(w, err)
|
||
|
return
|
||
|
}
|
||
|
|
||
|
defer w.(http.Flusher).Flush()
|
||
|
logger.LogIf(ctx, gob.NewEncoder(w).Encode(info))
|
||
|
}
|
||
|
|
||
|
// DownloadProflingDataHandler - returns proflied data.
|
||
|
func (s *peerRESTServer) DownloadProflingDataHandler(w http.ResponseWriter, r *http.Request) {
|
||
|
if !s.IsValid(w, r) {
|
||
|
s.writeErrorResponse(w, errors.New("Invalid request"))
|
||
|
return
|
||
|
}
|
||
|
|
||
|
ctx := newContext(r, w, "DownloadProfiling")
|
||
|
profileData, err := getProfileData()
|
||
|
if err != nil {
|
||
|
s.writeErrorResponse(w, err)
|
||
|
return
|
||
|
}
|
||
|
|
||
|
defer w.(http.Flusher).Flush()
|
||
|
logger.LogIf(ctx, gob.NewEncoder(w).Encode(profileData))
|
||
|
}
|
||
|
|
||
|
// CPULoadInfoHandler - returns CPU Load info.
|
||
|
func (s *peerRESTServer) CPULoadInfoHandler(w http.ResponseWriter, r *http.Request) {
|
||
|
if !s.IsValid(w, r) {
|
||
|
s.writeErrorResponse(w, errors.New("Invalid request"))
|
||
|
return
|
||
|
}
|
||
|
|
||
|
ctx := newContext(r, w, "CPULoadInfo")
|
||
|
info := localEndpointsCPULoad(globalEndpoints)
|
||
|
|
||
|
defer w.(http.Flusher).Flush()
|
||
|
logger.LogIf(ctx, gob.NewEncoder(w).Encode(info))
|
||
|
}
|
||
|
|
||
|
// DrivePerfInfoHandler - returns Drive Performance info.
|
||
|
func (s *peerRESTServer) DrivePerfInfoHandler(w http.ResponseWriter, r *http.Request) {
|
||
|
if !s.IsValid(w, r) {
|
||
|
s.writeErrorResponse(w, errors.New("Invalid request"))
|
||
|
return
|
||
|
}
|
||
|
|
||
|
ctx := newContext(r, w, "DrivePerfInfo")
|
||
|
info := localEndpointsDrivePerf(globalEndpoints)
|
||
|
|
||
|
defer w.(http.Flusher).Flush()
|
||
|
logger.LogIf(ctx, gob.NewEncoder(w).Encode(info))
|
||
|
}
|
||
|
|
||
|
// MemUsageInfoHandler - returns Memory Usage info.
|
||
|
func (s *peerRESTServer) MemUsageInfoHandler(w http.ResponseWriter, r *http.Request) {
|
||
|
if !s.IsValid(w, r) {
|
||
|
s.writeErrorResponse(w, errors.New("Invalid request"))
|
||
|
return
|
||
|
}
|
||
|
ctx := newContext(r, w, "MemUsageInfo")
|
||
|
info := localEndpointsMemUsage(globalEndpoints)
|
||
|
|
||
|
defer w.(http.Flusher).Flush()
|
||
|
logger.LogIf(ctx, gob.NewEncoder(w).Encode(info))
|
||
|
}
|
||
|
|
||
|
// LoadCredentialsHandler - loads credentials.
|
||
|
func (s *peerRESTServer) LoadCredentialsHandler(w http.ResponseWriter, r *http.Request) {
|
||
|
if !s.IsValid(w, r) {
|
||
|
s.writeErrorResponse(w, errors.New("Invalid request"))
|
||
|
return
|
||
|
}
|
||
|
|
||
|
// Construct path to config.json for the given bucket.
|
||
|
configFile := path.Join(bucketConfigPrefix, minioConfigFile)
|
||
|
transactionConfigFile := configFile + ".transaction"
|
||
|
|
||
|
// As object layer's GetObject() and PutObject() take respective lock on minioMetaBucket
|
||
|
// and configFile, take a transaction lock to avoid race.
|
||
|
objLock := globalNSMutex.NewNSLock(minioMetaBucket, transactionConfigFile)
|
||
|
if err := objLock.GetRLock(globalOperationTimeout); err != nil {
|
||
|
s.writeErrorResponse(w, err)
|
||
|
return
|
||
|
}
|
||
|
objLock.RUnlock()
|
||
|
|
||
|
if err := globalConfigSys.Load(newObjectLayerFn()); err != nil {
|
||
|
s.writeErrorResponse(w, err)
|
||
|
return
|
||
|
}
|
||
|
|
||
|
w.(http.Flusher).Flush()
|
||
|
}
|
||
|
|
||
|
// DeleteBucketHandler - Delete notification and policies related to the bucket.
|
||
|
func (s *peerRESTServer) DeleteBucketHandler(w http.ResponseWriter, r *http.Request) {
|
||
|
if !s.IsValid(w, r) {
|
||
|
s.writeErrorResponse(w, errors.New("Invalid request"))
|
||
|
return
|
||
|
}
|
||
|
|
||
|
vars := mux.Vars(r)
|
||
|
bucketName := vars[peerRESTBucket]
|
||
|
if bucketName == "" {
|
||
|
s.writeErrorResponse(w, errors.New("Bucket name is missing"))
|
||
|
return
|
||
|
}
|
||
|
|
||
|
globalNotificationSys.RemoveNotification(bucketName)
|
||
|
globalPolicySys.Remove(bucketName)
|
||
|
|
||
|
w.(http.Flusher).Flush()
|
||
|
}
|
||
|
|
||
|
// ReloadFormatHandler - Reload Format.
|
||
|
func (s *peerRESTServer) ReloadFormatHandler(w http.ResponseWriter, r *http.Request) {
|
||
|
if !s.IsValid(w, r) {
|
||
|
s.writeErrorResponse(w, errors.New("Invalid request"))
|
||
|
return
|
||
|
}
|
||
|
|
||
|
vars := mux.Vars(r)
|
||
|
dryRunString := vars[peerRESTDryRun]
|
||
|
if dryRunString == "" {
|
||
|
s.writeErrorResponse(w, errors.New("dry run parameter is missing"))
|
||
|
return
|
||
|
}
|
||
|
|
||
|
var dryRun bool
|
||
|
switch strings.ToLower(dryRunString) {
|
||
|
case "true":
|
||
|
dryRun = true
|
||
|
case "false":
|
||
|
dryRun = false
|
||
|
default:
|
||
|
s.writeErrorResponse(w, errInvalidArgument)
|
||
|
return
|
||
|
}
|
||
|
|
||
|
objAPI := newObjectLayerFn()
|
||
|
if objAPI == nil {
|
||
|
s.writeErrorResponse(w, errServerNotInitialized)
|
||
|
return
|
||
|
}
|
||
|
err := objAPI.ReloadFormat(context.Background(), dryRun)
|
||
|
if err != nil {
|
||
|
s.writeErrorResponse(w, err)
|
||
|
return
|
||
|
}
|
||
|
w.(http.Flusher).Flush()
|
||
|
}
|
||
|
|
||
|
// RemoveBucketPolicyHandler - Remove bucket policy.
|
||
|
func (s *peerRESTServer) RemoveBucketPolicyHandler(w http.ResponseWriter, r *http.Request) {
|
||
|
if !s.IsValid(w, r) {
|
||
|
s.writeErrorResponse(w, errors.New("Invalid request"))
|
||
|
return
|
||
|
}
|
||
|
|
||
|
vars := mux.Vars(r)
|
||
|
bucketName := vars[peerRESTBucket]
|
||
|
if bucketName == "" {
|
||
|
s.writeErrorResponse(w, errors.New("Bucket name is missing"))
|
||
|
return
|
||
|
}
|
||
|
|
||
|
globalPolicySys.Remove(bucketName)
|
||
|
w.(http.Flusher).Flush()
|
||
|
}
|
||
|
|
||
|
// SetBucketPolicyHandler - Set bucket policy.
|
||
|
func (s *peerRESTServer) SetBucketPolicyHandler(w http.ResponseWriter, r *http.Request) {
|
||
|
if !s.IsValid(w, r) {
|
||
|
s.writeErrorResponse(w, errors.New("Invalid request"))
|
||
|
return
|
||
|
}
|
||
|
|
||
|
vars := mux.Vars(r)
|
||
|
bucketName := vars[peerRESTBucket]
|
||
|
if bucketName == "" {
|
||
|
s.writeErrorResponse(w, errors.New("Bucket name is missing"))
|
||
|
return
|
||
|
}
|
||
|
var policyData policy.Policy
|
||
|
if r.ContentLength < 0 {
|
||
|
s.writeErrorResponse(w, errInvalidArgument)
|
||
|
return
|
||
|
}
|
||
|
|
||
|
err := gob.NewDecoder(r.Body).Decode(&policyData)
|
||
|
if err != nil {
|
||
|
s.writeErrorResponse(w, err)
|
||
|
return
|
||
|
}
|
||
|
globalPolicySys.Set(bucketName, policyData)
|
||
|
w.(http.Flusher).Flush()
|
||
|
}
|
||
|
|
||
|
type remoteTargetExistsResp struct {
|
||
|
Exists bool
|
||
|
}
|
||
|
|
||
|
// TargetExistsHandler - Check if Target exists.
|
||
|
func (s *peerRESTServer) TargetExistsHandler(w http.ResponseWriter, r *http.Request) {
|
||
|
ctx := newContext(r, w, "TargetExists")
|
||
|
if !s.IsValid(w, r) {
|
||
|
s.writeErrorResponse(w, errors.New("Invalid request"))
|
||
|
return
|
||
|
}
|
||
|
|
||
|
vars := mux.Vars(r)
|
||
|
bucketName := vars[peerRESTBucket]
|
||
|
if bucketName == "" {
|
||
|
s.writeErrorResponse(w, errors.New("Bucket name is missing"))
|
||
|
return
|
||
|
}
|
||
|
var targetID event.TargetID
|
||
|
if r.ContentLength <= 0 {
|
||
|
s.writeErrorResponse(w, errInvalidArgument)
|
||
|
return
|
||
|
}
|
||
|
|
||
|
err := gob.NewDecoder(r.Body).Decode(&targetID)
|
||
|
if err != nil {
|
||
|
s.writeErrorResponse(w, err)
|
||
|
return
|
||
|
}
|
||
|
|
||
|
var targetExists remoteTargetExistsResp
|
||
|
targetExists.Exists = globalNotificationSys.RemoteTargetExist(bucketName, targetID)
|
||
|
|
||
|
defer w.(http.Flusher).Flush()
|
||
|
logger.LogIf(ctx, gob.NewEncoder(w).Encode(&targetExists))
|
||
|
}
|
||
|
|
||
|
type sendEventRequest struct {
|
||
|
Event event.Event
|
||
|
TargetID event.TargetID
|
||
|
}
|
||
|
|
||
|
type sendEventResp struct {
|
||
|
Success bool
|
||
|
}
|
||
|
|
||
|
// SendEventHandler - Send Event.
|
||
|
func (s *peerRESTServer) SendEventHandler(w http.ResponseWriter, r *http.Request) {
|
||
|
if !s.IsValid(w, r) {
|
||
|
s.writeErrorResponse(w, errors.New("Invalid request"))
|
||
|
return
|
||
|
}
|
||
|
|
||
|
ctx := newContext(r, w, "SendEvent")
|
||
|
|
||
|
vars := mux.Vars(r)
|
||
|
bucketName := vars[peerRESTBucket]
|
||
|
if bucketName == "" {
|
||
|
s.writeErrorResponse(w, errors.New("Bucket name is missing"))
|
||
|
return
|
||
|
}
|
||
|
var eventReq sendEventRequest
|
||
|
if r.ContentLength <= 0 {
|
||
|
s.writeErrorResponse(w, errInvalidArgument)
|
||
|
return
|
||
|
}
|
||
|
|
||
|
err := gob.NewDecoder(r.Body).Decode(&eventReq)
|
||
|
if err != nil {
|
||
|
s.writeErrorResponse(w, err)
|
||
|
return
|
||
|
}
|
||
|
|
||
|
var eventResp sendEventResp
|
||
|
eventResp.Success = true
|
||
|
errs := globalNotificationSys.send(bucketName, eventReq.Event, eventReq.TargetID)
|
||
|
|
||
|
for i := range errs {
|
||
|
reqInfo := (&logger.ReqInfo{}).AppendTags("Event", eventReq.Event.EventName.String())
|
||
|
reqInfo.AppendTags("targetName", eventReq.TargetID.Name)
|
||
|
ctx := logger.SetReqInfo(context.Background(), reqInfo)
|
||
|
logger.LogIf(ctx, errs[i].Err)
|
||
|
|
||
|
eventResp.Success = false
|
||
|
s.writeErrorResponse(w, errs[i].Err)
|
||
|
return
|
||
|
}
|
||
|
logger.LogIf(ctx, gob.NewEncoder(w).Encode(&eventResp))
|
||
|
w.(http.Flusher).Flush()
|
||
|
}
|
||
|
|
||
|
// PutBucketNotificationHandler - Set bucket policy.
|
||
|
func (s *peerRESTServer) PutBucketNotificationHandler(w http.ResponseWriter, r *http.Request) {
|
||
|
if !s.IsValid(w, r) {
|
||
|
s.writeErrorResponse(w, errors.New("Invalid request"))
|
||
|
return
|
||
|
}
|
||
|
|
||
|
vars := mux.Vars(r)
|
||
|
bucketName := vars[peerRESTBucket]
|
||
|
if bucketName == "" {
|
||
|
s.writeErrorResponse(w, errors.New("Bucket name is missing"))
|
||
|
return
|
||
|
}
|
||
|
|
||
|
var rulesMap event.RulesMap
|
||
|
if r.ContentLength < 0 {
|
||
|
s.writeErrorResponse(w, errInvalidArgument)
|
||
|
return
|
||
|
}
|
||
|
|
||
|
err := gob.NewDecoder(r.Body).Decode(&rulesMap)
|
||
|
if err != nil {
|
||
|
s.writeErrorResponse(w, err)
|
||
|
return
|
||
|
}
|
||
|
|
||
|
globalNotificationSys.AddRulesMap(bucketName, rulesMap)
|
||
|
w.(http.Flusher).Flush()
|
||
|
}
|
||
|
|
||
|
type listenBucketNotificationReq struct {
|
||
|
EventNames []event.Name `json:"eventNames"`
|
||
|
Pattern string `json:"pattern"`
|
||
|
TargetID event.TargetID `json:"targetId"`
|
||
|
Addr xnet.Host `json:"addr"`
|
||
|
}
|
||
|
|
||
|
// ListenBucketNotificationHandler - Listen bucket notification handler.
|
||
|
func (s *peerRESTServer) ListenBucketNotificationHandler(w http.ResponseWriter, r *http.Request) {
|
||
|
if !s.IsValid(w, r) {
|
||
|
s.writeErrorResponse(w, errors.New("Invalid request"))
|
||
|
return
|
||
|
}
|
||
|
|
||
|
vars := mux.Vars(r)
|
||
|
bucketName := vars[peerRESTBucket]
|
||
|
if bucketName == "" {
|
||
|
s.writeErrorResponse(w, errors.New("Bucket name is missing"))
|
||
|
return
|
||
|
}
|
||
|
|
||
|
var args listenBucketNotificationReq
|
||
|
if r.ContentLength <= 0 {
|
||
|
s.writeErrorResponse(w, errInvalidArgument)
|
||
|
return
|
||
|
}
|
||
|
|
||
|
err := gob.NewDecoder(r.Body).Decode(&args)
|
||
|
if err != nil {
|
||
|
s.writeErrorResponse(w, err)
|
||
|
return
|
||
|
}
|
||
|
|
||
|
restClient, err := newPeerRESTClient(&args.Addr)
|
||
|
if err != nil {
|
||
|
s.writeErrorResponse(w, fmt.Errorf("unable to find PeerRESTClient for provided address %v. This happens only if remote and this minio run with different set of endpoints", args.Addr))
|
||
|
return
|
||
|
}
|
||
|
|
||
|
target := NewPeerRESTClientTarget(bucketName, args.TargetID, restClient)
|
||
|
rulesMap := event.NewRulesMap(args.EventNames, args.Pattern, target.ID())
|
||
|
if err := globalNotificationSys.AddRemoteTarget(bucketName, target, rulesMap); err != nil {
|
||
|
reqInfo := &logger.ReqInfo{BucketName: target.bucketName}
|
||
|
reqInfo.AppendTags("target", target.id.Name)
|
||
|
ctx := logger.SetReqInfo(context.Background(), reqInfo)
|
||
|
logger.LogIf(ctx, err)
|
||
|
s.writeErrorResponse(w, err)
|
||
|
return
|
||
|
}
|
||
|
w.(http.Flusher).Flush()
|
||
|
}
|
||
|
|
||
|
var errUnsupportedSignal = fmt.Errorf("unsupported signal: only restart and stop signals are supported")
|
||
|
|
||
|
// SignalServiceHandler - signal service handler.
|
||
|
func (s *peerRESTServer) SignalServiceHandler(w http.ResponseWriter, r *http.Request) {
|
||
|
if !s.IsValid(w, r) {
|
||
|
s.writeErrorResponse(w, errors.New("Invalid request"))
|
||
|
return
|
||
|
}
|
||
|
|
||
|
vars := mux.Vars(r)
|
||
|
signalString := vars[peerRESTSignal]
|
||
|
if signalString == "" {
|
||
|
s.writeErrorResponse(w, errors.New("signal name is missing"))
|
||
|
return
|
||
|
}
|
||
|
signal := serviceSignal(signalString)
|
||
|
defer w.(http.Flusher).Flush()
|
||
|
switch signal {
|
||
|
case serviceRestart, serviceStop:
|
||
|
globalServiceSignalCh <- signal
|
||
|
default:
|
||
|
s.writeErrorResponse(w, errUnsupportedSignal)
|
||
|
return
|
||
|
}
|
||
|
}
|
||
|
|
||
|
func (s *peerRESTServer) writeErrorResponse(w http.ResponseWriter, err error) {
|
||
|
w.WriteHeader(http.StatusForbidden)
|
||
|
w.Write([]byte(err.Error()))
|
||
|
}
|
||
|
|
||
|
// IsValid - To authenticate and verify the time difference.
|
||
|
func (s *peerRESTServer) IsValid(w http.ResponseWriter, r *http.Request) bool {
|
||
|
if err := storageServerRequestValidate(r); err != nil {
|
||
|
s.writeErrorResponse(w, err)
|
||
|
return false
|
||
|
}
|
||
|
return true
|
||
|
}
|
||
|
|
||
|
// registerPeerRESTHandlers - register peer rest router.
|
||
|
func registerPeerRESTHandlers(router *mux.Router) {
|
||
|
server := &peerRESTServer{}
|
||
|
subrouter := router.PathPrefix(peerRESTPath).Subrouter()
|
||
|
subrouter.Methods(http.MethodPost).Path("/" + peerRESTMethodGetLocks).HandlerFunc(httpTraceHdrs(server.GetLocksHandler))
|
||
|
subrouter.Methods(http.MethodPost).Path("/" + peerRESTMethodServerInfo).HandlerFunc(httpTraceHdrs(server.ServerInfoHandler))
|
||
|
subrouter.Methods(http.MethodPost).Path("/" + peerRESTMethodCPULoadInfo).HandlerFunc(httpTraceHdrs(server.CPULoadInfoHandler))
|
||
|
subrouter.Methods(http.MethodPost).Path("/" + peerRESTMethodMemUsageInfo).HandlerFunc(httpTraceHdrs(server.MemUsageInfoHandler))
|
||
|
subrouter.Methods(http.MethodPost).Path("/" + peerRESTMethodDrivePerfInfo).HandlerFunc(httpTraceHdrs(server.DrivePerfInfoHandler))
|
||
|
subrouter.Methods(http.MethodPost).Path("/" + peerRESTMethodDeleteBucket).HandlerFunc(httpTraceHdrs(server.DeleteBucketHandler)).Queries(restQueries(peerRESTBucket)...)
|
||
|
subrouter.Methods(http.MethodPost).Path("/" + peerRESTMethodSignalService).HandlerFunc(httpTraceHdrs(server.SignalServiceHandler)).Queries(restQueries(peerRESTSignal)...)
|
||
|
|
||
|
subrouter.Methods(http.MethodPost).Path("/" + peerRESTMethodBucketPolicyRemove).HandlerFunc(httpTraceAll(server.RemoveBucketPolicyHandler)).Queries(restQueries(peerRESTBucket)...)
|
||
|
subrouter.Methods(http.MethodPost).Path("/" + peerRESTMethodBucketPolicySet).HandlerFunc(httpTraceHdrs(server.SetBucketPolicyHandler)).Queries(restQueries(peerRESTBucket)...)
|
||
|
|
||
|
subrouter.Methods(http.MethodPost).Path("/" + peerRESTMethodLoadUsers).HandlerFunc(httpTraceAll(server.LoadUsersHandler))
|
||
|
|
||
|
subrouter.Methods(http.MethodPost).Path("/" + peerRESTMethodStartProfiling).HandlerFunc(httpTraceAll(server.StartProfilingHandler)).Queries(restQueries(peerRESTProfiler)...)
|
||
|
subrouter.Methods(http.MethodPost).Path("/" + peerRESTMethodDownloadProfilingData).HandlerFunc(httpTraceHdrs(server.DownloadProflingDataHandler))
|
||
|
|
||
|
subrouter.Methods(http.MethodPost).Path("/" + peerRESTMethodLoadCredentials).HandlerFunc(httpTraceHdrs(server.LoadCredentialsHandler))
|
||
|
subrouter.Methods(http.MethodPost).Path("/" + peerRESTMethodTargetExists).HandlerFunc(httpTraceHdrs(server.TargetExistsHandler)).Queries(restQueries(peerRESTBucket)...)
|
||
|
subrouter.Methods(http.MethodPost).Path("/" + peerRESTMethodSendEvent).HandlerFunc(httpTraceHdrs(server.SendEventHandler)).Queries(restQueries(peerRESTBucket)...)
|
||
|
subrouter.Methods(http.MethodPost).Path("/" + peerRESTMethodBucketNotificationPut).HandlerFunc(httpTraceHdrs(server.PutBucketNotificationHandler)).Queries(restQueries(peerRESTBucket)...)
|
||
|
subrouter.Methods(http.MethodPost).Path("/" + peerRESTMethodBucketNotificationListen).HandlerFunc(httpTraceHdrs(server.ListenBucketNotificationHandler)).Queries(restQueries(peerRESTBucket)...)
|
||
|
|
||
|
subrouter.Methods(http.MethodPost).Path("/" + peerRESTMethodReloadFormat).HandlerFunc(httpTraceHdrs(server.ReloadFormatHandler)).Queries(restQueries(peerRESTDryRun)...)
|
||
|
|
||
|
router.NotFoundHandler = http.HandlerFunc(httpTraceAll(notFoundHandler))
|
||
|
}
|