mirror of
				https://github.com/minio/minio.git
				synced 2025-11-04 02:01:05 +01:00 
			
		
		
		
	Additionally fixes - IsSuspended() can use read locks - Avoid double cancels panic on canceler
		
			
				
	
	
		
			200 lines
		
	
	
		
			5.5 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			200 lines
		
	
	
		
			5.5 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
// Copyright (c) 2015-2021 MinIO, Inc.
 | 
						|
//
 | 
						|
// This file is part of MinIO Object Storage stack
 | 
						|
//
 | 
						|
// This program is free software: you can redistribute it and/or modify
 | 
						|
// it under the terms of the GNU Affero General Public License as published by
 | 
						|
// the Free Software Foundation, either version 3 of the License, or
 | 
						|
// (at your option) any later version.
 | 
						|
//
 | 
						|
// This program is distributed in the hope that it will be useful
 | 
						|
// but WITHOUT ANY WARRANTY; without even the implied warranty of
 | 
						|
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
 | 
						|
// GNU Affero General Public License for more details.
 | 
						|
//
 | 
						|
// You should have received a copy of the GNU Affero General Public License
 | 
						|
// along with this program.  If not, see <http://www.gnu.org/licenses/>.
 | 
						|
 | 
						|
package cmd
 | 
						|
 | 
						|
import (
 | 
						|
	"encoding/json"
 | 
						|
	"net/http"
 | 
						|
 | 
						|
	"github.com/gorilla/mux"
 | 
						|
	"github.com/minio/minio/internal/logger"
 | 
						|
	iampolicy "github.com/minio/pkg/iam/policy"
 | 
						|
)
 | 
						|
 | 
						|
func (a adminAPIHandlers) StartDecommission(w http.ResponseWriter, r *http.Request) {
 | 
						|
	ctx := newContext(r, w, "StartDecommission")
 | 
						|
 | 
						|
	defer logger.AuditLog(ctx, w, r, mustGetClaimsFromToken(r))
 | 
						|
 | 
						|
	objectAPI, _ := validateAdminReq(ctx, w, r, iampolicy.DecommissionAdminAction)
 | 
						|
	if objectAPI == nil {
 | 
						|
		return
 | 
						|
	}
 | 
						|
 | 
						|
	// Legacy args style such as non-ellipses style is not supported with this API.
 | 
						|
	if globalEndpoints.Legacy() {
 | 
						|
		writeErrorResponseJSON(ctx, w, errorCodes.ToAPIErr(ErrNotImplemented), r.URL)
 | 
						|
		return
 | 
						|
	}
 | 
						|
 | 
						|
	pools, ok := objectAPI.(*erasureServerPools)
 | 
						|
	if !ok {
 | 
						|
		writeErrorResponseJSON(ctx, w, errorCodes.ToAPIErr(ErrNotImplemented), r.URL)
 | 
						|
		return
 | 
						|
	}
 | 
						|
 | 
						|
	vars := mux.Vars(r)
 | 
						|
	v := vars["pool"]
 | 
						|
 | 
						|
	idx := globalEndpoints.GetPoolIdx(v)
 | 
						|
	if idx == -1 {
 | 
						|
		// We didn't find any matching pools, invalid input
 | 
						|
		writeErrorResponseJSON(ctx, w, toAdminAPIErr(ctx, errInvalidArgument), r.URL)
 | 
						|
		return
 | 
						|
	}
 | 
						|
 | 
						|
	if ep := globalEndpoints[idx].Endpoints[0]; !ep.IsLocal {
 | 
						|
		for nodeIdx, proxyEp := range globalProxyEndpoints {
 | 
						|
			if proxyEp.Endpoint.Host == ep.Host {
 | 
						|
				if proxyRequestByNodeIndex(ctx, w, r, nodeIdx) {
 | 
						|
					return
 | 
						|
				}
 | 
						|
			}
 | 
						|
		}
 | 
						|
	}
 | 
						|
 | 
						|
	if err := pools.Decommission(r.Context(), idx); err != nil {
 | 
						|
		writeErrorResponseJSON(ctx, w, toAdminAPIErr(ctx, err), r.URL)
 | 
						|
		return
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func (a adminAPIHandlers) CancelDecommission(w http.ResponseWriter, r *http.Request) {
 | 
						|
	ctx := newContext(r, w, "CancelDecommission")
 | 
						|
 | 
						|
	defer logger.AuditLog(ctx, w, r, mustGetClaimsFromToken(r))
 | 
						|
 | 
						|
	objectAPI, _ := validateAdminReq(ctx, w, r, iampolicy.DecommissionAdminAction)
 | 
						|
	if objectAPI == nil {
 | 
						|
		return
 | 
						|
	}
 | 
						|
 | 
						|
	// Legacy args style such as non-ellipses style is not supported with this API.
 | 
						|
	if globalEndpoints.Legacy() {
 | 
						|
		writeErrorResponseJSON(ctx, w, errorCodes.ToAPIErr(ErrNotImplemented), r.URL)
 | 
						|
		return
 | 
						|
	}
 | 
						|
 | 
						|
	pools, ok := objectAPI.(*erasureServerPools)
 | 
						|
	if !ok {
 | 
						|
		writeErrorResponseJSON(ctx, w, errorCodes.ToAPIErr(ErrNotImplemented), r.URL)
 | 
						|
		return
 | 
						|
	}
 | 
						|
 | 
						|
	vars := mux.Vars(r)
 | 
						|
	v := vars["pool"]
 | 
						|
 | 
						|
	idx := globalEndpoints.GetPoolIdx(v)
 | 
						|
	if idx == -1 {
 | 
						|
		// We didn't find any matching pools, invalid input
 | 
						|
		writeErrorResponseJSON(ctx, w, toAdminAPIErr(ctx, errInvalidArgument), r.URL)
 | 
						|
		return
 | 
						|
	}
 | 
						|
 | 
						|
	if ep := globalEndpoints[idx].Endpoints[0]; !ep.IsLocal {
 | 
						|
		for nodeIdx, proxyEp := range globalProxyEndpoints {
 | 
						|
			if proxyEp.Endpoint.Host == ep.Host {
 | 
						|
				if proxyRequestByNodeIndex(ctx, w, r, nodeIdx) {
 | 
						|
					return
 | 
						|
				}
 | 
						|
			}
 | 
						|
		}
 | 
						|
	}
 | 
						|
 | 
						|
	if err := pools.DecommissionCancel(ctx, idx); err != nil {
 | 
						|
		writeErrorResponseJSON(ctx, w, toAdminAPIErr(ctx, err), r.URL)
 | 
						|
		return
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func (a adminAPIHandlers) StatusPool(w http.ResponseWriter, r *http.Request) {
 | 
						|
	ctx := newContext(r, w, "StatusPool")
 | 
						|
 | 
						|
	defer logger.AuditLog(ctx, w, r, mustGetClaimsFromToken(r))
 | 
						|
 | 
						|
	objectAPI, _ := validateAdminReq(ctx, w, r, iampolicy.ServerInfoAdminAction, iampolicy.DecommissionAdminAction)
 | 
						|
	if objectAPI == nil {
 | 
						|
		return
 | 
						|
	}
 | 
						|
 | 
						|
	// Legacy args style such as non-ellipses style is not supported with this API.
 | 
						|
	if globalEndpoints.Legacy() {
 | 
						|
		writeErrorResponseJSON(ctx, w, errorCodes.ToAPIErr(ErrNotImplemented), r.URL)
 | 
						|
		return
 | 
						|
	}
 | 
						|
 | 
						|
	pools, ok := objectAPI.(*erasureServerPools)
 | 
						|
	if !ok {
 | 
						|
		writeErrorResponseJSON(ctx, w, errorCodes.ToAPIErr(ErrNotImplemented), r.URL)
 | 
						|
		return
 | 
						|
	}
 | 
						|
 | 
						|
	vars := mux.Vars(r)
 | 
						|
	v := vars["pool"]
 | 
						|
 | 
						|
	idx := globalEndpoints.GetPoolIdx(v)
 | 
						|
	if idx == -1 {
 | 
						|
		// We didn't find any matching pools, invalid input
 | 
						|
		writeErrorResponseJSON(ctx, w, toAdminAPIErr(ctx, errInvalidArgument), r.URL)
 | 
						|
		return
 | 
						|
	}
 | 
						|
 | 
						|
	status, err := pools.Status(r.Context(), idx)
 | 
						|
	if err != nil {
 | 
						|
		writeErrorResponseJSON(ctx, w, toAdminAPIErr(ctx, err), r.URL)
 | 
						|
		return
 | 
						|
	}
 | 
						|
 | 
						|
	logger.LogIf(r.Context(), json.NewEncoder(w).Encode(&status))
 | 
						|
}
 | 
						|
 | 
						|
func (a adminAPIHandlers) ListPools(w http.ResponseWriter, r *http.Request) {
 | 
						|
	ctx := newContext(r, w, "ListPools")
 | 
						|
 | 
						|
	defer logger.AuditLog(ctx, w, r, mustGetClaimsFromToken(r))
 | 
						|
 | 
						|
	objectAPI, _ := validateAdminReq(ctx, w, r, iampolicy.ServerInfoAdminAction, iampolicy.DecommissionAdminAction)
 | 
						|
	if objectAPI == nil {
 | 
						|
		return
 | 
						|
	}
 | 
						|
 | 
						|
	// Legacy args style such as non-ellipses style is not supported with this API.
 | 
						|
	if globalEndpoints.Legacy() {
 | 
						|
		writeErrorResponseJSON(ctx, w, errorCodes.ToAPIErr(ErrNotImplemented), r.URL)
 | 
						|
		return
 | 
						|
	}
 | 
						|
 | 
						|
	pools, ok := objectAPI.(*erasureServerPools)
 | 
						|
	if !ok {
 | 
						|
		writeErrorResponseJSON(ctx, w, errorCodes.ToAPIErr(ErrNotImplemented), r.URL)
 | 
						|
		return
 | 
						|
	}
 | 
						|
 | 
						|
	poolsStatus := make([]PoolStatus, len(globalEndpoints))
 | 
						|
	for idx := range globalEndpoints {
 | 
						|
		status, err := pools.Status(r.Context(), idx)
 | 
						|
		if err != nil {
 | 
						|
			writeErrorResponseJSON(ctx, w, toAdminAPIErr(ctx, err), r.URL)
 | 
						|
			return
 | 
						|
		}
 | 
						|
		poolsStatus[idx] = status
 | 
						|
	}
 | 
						|
 | 
						|
	logger.LogIf(r.Context(), json.NewEncoder(w).Encode(poolsStatus))
 | 
						|
}
 |