mirror of
				https://github.com/minio/minio.git
				synced 2025-11-04 10:11:09 +01:00 
			
		
		
		
	
		
			
				
	
	
		
			236 lines
		
	
	
		
			7.5 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			236 lines
		
	
	
		
			7.5 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
/*
 | 
						|
 * Minio Cloud Storage, (C) 2016 Minio, Inc.
 | 
						|
 *
 | 
						|
 * Licensed under the Apache License, Version 2.0 (the "License");
 | 
						|
 * you may not use this file except in compliance with the License.
 | 
						|
 * You may obtain a copy of the License at
 | 
						|
 *
 | 
						|
 *     http://www.apache.org/licenses/LICENSE-2.0
 | 
						|
 *
 | 
						|
 * Unless required by applicable law or agreed to in writing, software
 | 
						|
 * distributed under the License is distributed on an "AS IS" BASIS,
 | 
						|
 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 | 
						|
 * See the License for the specific language governing permissions and
 | 
						|
 * limitations under the License.
 | 
						|
 */
 | 
						|
 | 
						|
package cmd
 | 
						|
 | 
						|
import (
 | 
						|
	"errors"
 | 
						|
	"net/url"
 | 
						|
	"path"
 | 
						|
	"strings"
 | 
						|
	"time"
 | 
						|
 | 
						|
	"github.com/minio/cli"
 | 
						|
	"github.com/minio/mc/pkg/console"
 | 
						|
)
 | 
						|
 | 
						|
var lockFlags = []cli.Flag{
 | 
						|
	cli.StringFlag{
 | 
						|
		Name:  "older-than",
 | 
						|
		Usage: "Include locks older than given time.",
 | 
						|
		Value: "24h",
 | 
						|
	},
 | 
						|
	cli.BoolFlag{
 | 
						|
		Name:  "verbose",
 | 
						|
		Usage: "Lists more information about locks.",
 | 
						|
	},
 | 
						|
	cli.BoolFlag{
 | 
						|
		Name:  "recursive",
 | 
						|
		Usage: "Recursively clear locks.",
 | 
						|
	},
 | 
						|
}
 | 
						|
 | 
						|
var lockCmd = cli.Command{
 | 
						|
	Name:   "lock",
 | 
						|
	Usage:  "Prints current lock information.",
 | 
						|
	Action: lockControl,
 | 
						|
	Flags:  append(lockFlags, globalFlags...),
 | 
						|
	CustomHelpTemplate: `NAME:
 | 
						|
  minio control {{.Name}} - {{.Usage}}
 | 
						|
 | 
						|
USAGE:
 | 
						|
  minio control {{.Name}} [list|clear] http[s]://[access_key[:secret_key]@]server_ip:port/
 | 
						|
 | 
						|
FLAGS:
 | 
						|
  {{range .Flags}}{{.}}
 | 
						|
  {{end}}
 | 
						|
EAMPLES:
 | 
						|
  1. List all currently active locks from all nodes. Defaults to list locks held longer than 24hrs.
 | 
						|
    $ minio control {{.Name}} list http://localhost:9000/
 | 
						|
 | 
						|
  2. List all currently active locks from all nodes. Request locks older than 1minute.
 | 
						|
    $ minio control {{.Name}} --older-than=1m list http://localhost:9000/
 | 
						|
 | 
						|
  3. Clear lock named 'bucket/object' (exact match).
 | 
						|
    $ minio control {{.Name}} clear http://localhost:9000/bucket/object
 | 
						|
 | 
						|
  4. Clear all locks with names that start with 'bucket/prefix' (wildcard match).
 | 
						|
    $ minio control {{.Name}} --recursive clear http://localhost:9000/bucket/prefix
 | 
						|
 | 
						|
  5. Clear all locks older than 10minutes.
 | 
						|
    $ minio control {{.Name}} --older-than=10m clear http://localhost:9000/
 | 
						|
 | 
						|
  6. Clear all locks with names that start with 'bucket/a' and that are older than 1hour.
 | 
						|
    $ minio control {{.Name}} --recursive --older-than=1h clear http://localhost:9000/bucket/a
 | 
						|
`,
 | 
						|
}
 | 
						|
 | 
						|
// printLockStateVerbose - pretty prints systemLockState, additionally this filters out based on a given duration.
 | 
						|
func printLockStateVerbose(lkStateRep map[string]SystemLockState, olderThan time.Duration) {
 | 
						|
	console.Println("Duration     Server     LockType     LockAcquired     Status     LockOrigin     Resource")
 | 
						|
	for server, lockState := range lkStateRep {
 | 
						|
		for _, lockInfo := range lockState.LocksInfoPerObject {
 | 
						|
			lockedResource := path.Join(lockInfo.Bucket, lockInfo.Object)
 | 
						|
			for _, lockDetails := range lockInfo.LockDetailsOnObject {
 | 
						|
				if lockDetails.Duration < olderThan {
 | 
						|
					continue
 | 
						|
				}
 | 
						|
				console.Println(lockDetails.Duration, server,
 | 
						|
					lockDetails.LockType, lockDetails.Since,
 | 
						|
					lockDetails.Status, lockDetails.LockOrigin,
 | 
						|
					lockedResource)
 | 
						|
			}
 | 
						|
		}
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
// printLockState - pretty prints systemLockState, additionally this filters out based on a given duration.
 | 
						|
func printLockState(lkStateRep map[string]SystemLockState, olderThan time.Duration) {
 | 
						|
	console.Println("Duration     Server     LockType     Resource")
 | 
						|
	for server, lockState := range lkStateRep {
 | 
						|
		for _, lockInfo := range lockState.LocksInfoPerObject {
 | 
						|
			lockedResource := path.Join(lockInfo.Bucket, lockInfo.Object)
 | 
						|
			for _, lockDetails := range lockInfo.LockDetailsOnObject {
 | 
						|
				if lockDetails.Duration < olderThan {
 | 
						|
					continue
 | 
						|
				}
 | 
						|
				console.Println(lockDetails.Duration, server,
 | 
						|
					lockDetails.LockType, lockedResource)
 | 
						|
			}
 | 
						|
		}
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
// clearLockState - clear locks based on a filter for a given duration and a name or prefix to match
 | 
						|
func clearLockState(f func(bucket, object string), lkStateRep map[string]SystemLockState, olderThan time.Duration, match string, recursive bool) {
 | 
						|
	console.Println("Status      Duration     Server     LockType     Resource")
 | 
						|
	for server, lockState := range lkStateRep {
 | 
						|
		for _, lockInfo := range lockState.LocksInfoPerObject {
 | 
						|
			lockedResource := path.Join(lockInfo.Bucket, lockInfo.Object)
 | 
						|
			for _, lockDetails := range lockInfo.LockDetailsOnObject {
 | 
						|
				if lockDetails.Duration < olderThan {
 | 
						|
					continue
 | 
						|
				}
 | 
						|
				if match != "" {
 | 
						|
					if recursive {
 | 
						|
						if !strings.HasPrefix(lockedResource, match) {
 | 
						|
							continue
 | 
						|
						}
 | 
						|
					} else if lockedResource != match {
 | 
						|
						continue
 | 
						|
					}
 | 
						|
				}
 | 
						|
				f(lockInfo.Bucket, lockInfo.Object)
 | 
						|
				console.Println("CLEARED", lockDetails.Duration, server,
 | 
						|
					lockDetails.LockType, lockedResource)
 | 
						|
			}
 | 
						|
		}
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
// "minio control lock" entry point.
 | 
						|
func lockControl(c *cli.Context) {
 | 
						|
	if !c.Args().Present() && len(c.Args()) != 2 {
 | 
						|
		cli.ShowCommandHelpAndExit(c, "lock", 1)
 | 
						|
	}
 | 
						|
 | 
						|
	parsedURL, err := url.Parse(c.Args().Get(1))
 | 
						|
	fatalIf(err, "Unable to parse URL.")
 | 
						|
 | 
						|
	accessKey := serverConfig.GetCredential().AccessKeyID
 | 
						|
	secretKey := serverConfig.GetCredential().SecretAccessKey
 | 
						|
	// Username and password specified in URL will override prior configuration
 | 
						|
	if parsedURL.User != nil {
 | 
						|
		accessKey = parsedURL.User.Username()
 | 
						|
		if key, set := parsedURL.User.Password(); set {
 | 
						|
			secretKey = key
 | 
						|
		}
 | 
						|
	}
 | 
						|
 | 
						|
	// Parse older than string.
 | 
						|
	olderThanStr := c.String("older-than")
 | 
						|
	olderThan, err := time.ParseDuration(olderThanStr)
 | 
						|
	fatalIf(err, "Unable to parse older-than time duration.")
 | 
						|
 | 
						|
	// Verbose flag.
 | 
						|
	verbose := c.Bool("verbose")
 | 
						|
 | 
						|
	// Recursive flag.
 | 
						|
	recursive := c.Bool("recursive")
 | 
						|
 | 
						|
	authCfg := &authConfig{
 | 
						|
		accessKey:   accessKey,
 | 
						|
		secretKey:   secretKey,
 | 
						|
		secureConn:  parsedURL.Scheme == "https",
 | 
						|
		address:     parsedURL.Host,
 | 
						|
		path:        path.Join(reservedBucket, controlPath),
 | 
						|
		loginMethod: "Control.LoginHandler",
 | 
						|
	}
 | 
						|
	client := newAuthClient(authCfg)
 | 
						|
 | 
						|
	args := &GenericArgs{
 | 
						|
		// This is necessary so that the remotes,
 | 
						|
		// don't end up sending requests back and forth.
 | 
						|
		Remote: true,
 | 
						|
	}
 | 
						|
 | 
						|
	subCommand := c.Args().Get(0)
 | 
						|
	switch subCommand {
 | 
						|
	case "list":
 | 
						|
		lkStateRep := make(map[string]SystemLockState)
 | 
						|
		// Request lock info, fetches from all the nodes in the cluster.
 | 
						|
		err = client.Call("Control.LockInfo", args, &lkStateRep)
 | 
						|
		fatalIf(err, "Unable to fetch system lockInfo.")
 | 
						|
		if !verbose {
 | 
						|
			printLockState(lkStateRep, olderThan)
 | 
						|
		} else {
 | 
						|
			printLockStateVerbose(lkStateRep, olderThan)
 | 
						|
		}
 | 
						|
	case "clear":
 | 
						|
		path := parsedURL.Path
 | 
						|
		if strings.HasPrefix(path, "/") {
 | 
						|
			path = path[1:] // Strip leading slash
 | 
						|
		}
 | 
						|
		if path == "" && c.NumFlags() == 0 {
 | 
						|
			fatalIf(errors.New("Bad arguments"), "Need to either pass a path or older-than argument")
 | 
						|
		}
 | 
						|
		if !c.IsSet("older-than") { // If not set explicitly, change default to 0 instead of 24h
 | 
						|
			olderThan = 0
 | 
						|
		}
 | 
						|
		lkStateRep := make(map[string]SystemLockState)
 | 
						|
		// Request lock info, fetches from all the nodes in the cluster.
 | 
						|
		err = client.Call("Control.LockInfo", args, &lkStateRep)
 | 
						|
		fatalIf(err, "Unable to fetch system lockInfo.")
 | 
						|
 | 
						|
		// Helper function to call server for actual removal of lock
 | 
						|
		f := func(bucket, object string) {
 | 
						|
			args := LockClearArgs{
 | 
						|
				Bucket: bucket,
 | 
						|
				Object: object,
 | 
						|
			}
 | 
						|
			reply := GenericReply{}
 | 
						|
			// Call server to clear the lock based on the name of the object.
 | 
						|
			err := client.Call("Control.LockClear", &args, &reply)
 | 
						|
			fatalIf(err, "Unable to clear lock.")
 | 
						|
		}
 | 
						|
 | 
						|
		// Loop over all locks and determine whether to clear or not.
 | 
						|
		clearLockState(f, lkStateRep, olderThan, path, recursive)
 | 
						|
	default:
 | 
						|
		fatalIf(errInvalidArgument, "Unsupported lock control operation %s", c.Args().Get(0))
 | 
						|
	}
 | 
						|
}
 |