mirror of
https://github.com/minio/mc.git
synced 2025-11-10 13:42:32 +03:00
248 lines
7.9 KiB
Go
248 lines
7.9 KiB
Go
// Copyright (c) 2015-2021 MinIO, Inc.
|
|
//
|
|
// This file is part of MinIO Object Storage stack
|
|
//
|
|
// This program is free software: you can redistribute it and/or modify
|
|
// it under the terms of the GNU Affero General Public License as published by
|
|
// the Free Software Foundation, either version 3 of the License, or
|
|
// (at your option) any later version.
|
|
//
|
|
// This program is distributed in the hope that it will be useful
|
|
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
// GNU Affero General Public License for more details.
|
|
//
|
|
// You should have received a copy of the GNU Affero General Public License
|
|
// along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
package cmd
|
|
|
|
import (
|
|
"path"
|
|
"strconv"
|
|
"strings"
|
|
"time"
|
|
|
|
"github.com/fatih/color"
|
|
"github.com/minio/cli"
|
|
"github.com/minio/madmin-go"
|
|
"github.com/minio/mc/pkg/probe"
|
|
"github.com/minio/minio-go/v7/pkg/s3utils"
|
|
"github.com/minio/pkg/console"
|
|
)
|
|
|
|
var adminBucketRemoteEditFlags = []cli.Flag{
|
|
cli.StringFlag{
|
|
Name: "arn",
|
|
Usage: "ARN of target",
|
|
},
|
|
cli.StringFlag{
|
|
Name: "sync",
|
|
Usage: "enable synchronous replication for this target. Valid values are enable,disable.Defaults to disable if unset",
|
|
},
|
|
cli.StringFlag{
|
|
Name: "proxy",
|
|
Usage: "enable proxying in active-active replication. Valid values are enable,disable.By default proxying is enabled.",
|
|
},
|
|
cli.StringFlag{
|
|
Name: "bandwidth",
|
|
Usage: "Set bandwidth limit in bits per second (K,B,G,T for metric and Ki,Bi,Gi,Ti for IEC units)",
|
|
},
|
|
cli.UintFlag{
|
|
Name: "healthcheck-seconds",
|
|
Usage: "health check duration in seconds",
|
|
Value: 60,
|
|
},
|
|
cli.StringFlag{
|
|
Name: "path",
|
|
Value: "auto",
|
|
Usage: "bucket path lookup supported by the server. Valid options are '[on,off,auto]'",
|
|
},
|
|
}
|
|
|
|
var adminBucketRemoteEditCmd = cli.Command{
|
|
Name: "edit",
|
|
Usage: "edit remote target",
|
|
Action: mainAdminBucketRemoteEdit,
|
|
Before: setGlobalsFromContext,
|
|
OnUsageError: onUsageError,
|
|
Flags: append(globalFlags, adminBucketRemoteEditFlags...),
|
|
CustomHelpTemplate: `NAME:
|
|
{{.HelpName}} - {{.Usage}}
|
|
|
|
USAGE:
|
|
{{.HelpName}} TARGET http(s)://ACCESSKEY:SECRETKEY@DEST_URL/DEST_BUCKET --arn arn
|
|
|
|
TARGET:
|
|
Also called as alias/sourcebucketname
|
|
|
|
DEST_BUCKET:
|
|
Also called as remote target bucket.
|
|
|
|
DEST_URL:
|
|
Also called as remote endpoint.
|
|
|
|
ACCESSKEY:
|
|
Also called as username.
|
|
|
|
SECRETKEY:
|
|
Also called as password.
|
|
|
|
FLAGS:
|
|
{{range .VisibleFlags}}{{.}}
|
|
{{end}}
|
|
EXAMPLES:
|
|
1. Edit credentials for existing remote target with arn where a remote target has been configured between sourcebucket on sitea to targetbucket on siteb.
|
|
{{.DisableHistory}}
|
|
{{.Prompt}} {{.HelpName}} sitea/sourcebucket \
|
|
https://foobar:newpassword@minio.siteb.example.com/targetbucket \
|
|
--arn "arn:minio:replication:us-west-1:993bc6b6-accd-45e3-884f-5f3e652aed2a:dest1"
|
|
{{.EnableHistory}}
|
|
|
|
2. Edit remote target for sourceBucket on sitea with specified ARN to disable proxying and enable synchronous replication
|
|
{{.Prompt}} {{.HelpName}} sitea/sourcebucket --sync "enable" --proxy "disable"
|
|
--arn "arn:minio:replication:us-west-1:993bc6b6-accd-45e3-884f-5f3e652aed2a:dest1"
|
|
`,
|
|
}
|
|
|
|
// checkAdminBucketRemoteEditSyntax - validate all the passed arguments
|
|
func checkAdminBucketRemoteEditSyntax(ctx *cli.Context) {
|
|
argsNr := len(ctx.Args())
|
|
if argsNr > 2 || argsNr == 0 {
|
|
showCommandHelpAndExit(ctx, 1) // last argument is exit code
|
|
}
|
|
if !ctx.IsSet("arn") {
|
|
fatalIf(errInvalidArgument().Trace(ctx.Args()...), "--arn flag needs to be set")
|
|
}
|
|
}
|
|
|
|
// modifyRemoteTarget - modifies the dest credentials or updates sync , disable-proxy settings
|
|
func modifyRemoteTarget(cli *cli.Context, targets []madmin.BucketTarget) (*madmin.BucketTarget, []madmin.TargetUpdateType) {
|
|
args := cli.Args()
|
|
foundIdx := -1
|
|
arn := cli.String("arn")
|
|
for i, t := range targets {
|
|
if t.Arn == arn {
|
|
foundIdx = i
|
|
break
|
|
}
|
|
}
|
|
if foundIdx < 0 {
|
|
fatalIf(errInvalidArgument().Trace(args...), "Unable to edit remote target - `"+arn+"` not found")
|
|
}
|
|
var ops []madmin.TargetUpdateType
|
|
bktTarget := targets[foundIdx].Clone()
|
|
if cli.IsSet("sync") {
|
|
syncState := strings.ToLower(cli.String("sync"))
|
|
switch syncState {
|
|
case "enable", "disable":
|
|
bktTarget.ReplicationSync = syncState == "enable"
|
|
ops = append(ops, madmin.SyncUpdateType)
|
|
default:
|
|
fatalIf(errInvalidArgument().Trace(args...), "--sync can be either [enable|disable]")
|
|
}
|
|
}
|
|
if cli.IsSet("proxy") {
|
|
proxyState := strings.ToLower(cli.String("proxy"))
|
|
switch proxyState {
|
|
case "enable", "disable":
|
|
bktTarget.DisableProxy = proxyState == "disable"
|
|
ops = append(ops, madmin.ProxyUpdateType)
|
|
|
|
default:
|
|
fatalIf(errInvalidArgument().Trace(args...), "--proxy can be either [enable|disable]")
|
|
}
|
|
}
|
|
|
|
if len(args) == 2 {
|
|
_, sourceBucket := url2Alias(args[0])
|
|
|
|
tgtURL := args[1]
|
|
accessKey, secretKey, u := extractCredentialURL(tgtURL)
|
|
var tgtBucket string
|
|
if u.Path != "" {
|
|
tgtBucket = path.Clean(u.Path[1:])
|
|
}
|
|
if e := s3utils.CheckValidBucketName(tgtBucket); e != nil {
|
|
fatalIf(probe.NewError(e).Trace(tgtURL), "Invalid target bucket specified")
|
|
}
|
|
secure := u.Scheme == "https"
|
|
host := u.Host
|
|
if u.Port() == "" {
|
|
port := 80
|
|
if secure {
|
|
port = 443
|
|
}
|
|
host = host + ":" + strconv.Itoa(port)
|
|
}
|
|
console.SetColor(cred, color.New(color.FgYellow, color.Italic))
|
|
creds := &madmin.Credentials{AccessKey: accessKey, SecretKey: secretKey}
|
|
if tgtBucket != bktTarget.TargetBucket {
|
|
fatalIf(errInvalidArgument().Trace(args...), "configured remote target bucket `"+tgtBucket+"` does not match "+bktTarget.TargetBucket+"` for this ARN `"+bktTarget.Arn+"`")
|
|
}
|
|
if sourceBucket != bktTarget.SourceBucket {
|
|
fatalIf(errInvalidArgument().Trace(args...), "configured source bucket `"+sourceBucket+"` does not match "+bktTarget.SourceBucket+"` for this ARN `"+bktTarget.Arn+"`")
|
|
}
|
|
bktTarget.TargetBucket = tgtBucket
|
|
bktTarget.Secure = secure
|
|
bktTarget.Credentials = creds
|
|
bktTarget.Endpoint = host
|
|
ops = append(ops, madmin.CredentialsUpdateType)
|
|
}
|
|
if cli.IsSet("bandwidth") {
|
|
bandwidthStr := cli.String("bandwidth")
|
|
bandwidth, err := getBandwidthInBytes(bandwidthStr)
|
|
if err != nil {
|
|
fatalIf(errInvalidArgument().Trace(bandwidthStr), "Invalid bandwidth number")
|
|
}
|
|
bktTarget.BandwidthLimit = int64(bandwidth)
|
|
ops = append(ops, madmin.BandwidthLimitUpdateType)
|
|
|
|
}
|
|
if cli.IsSet("healthcheck-seconds") {
|
|
bktTarget.HealthCheckDuration = time.Duration(cli.Uint("healthcheck-seconds")) * time.Second
|
|
ops = append(ops, madmin.HealthCheckDurationUpdateType)
|
|
}
|
|
if cli.IsSet("path") {
|
|
bktTarget.Path = cli.String("path")
|
|
ops = append(ops, madmin.PathUpdateType)
|
|
}
|
|
return &bktTarget, ops
|
|
}
|
|
|
|
// mainAdminBucketRemoteEdit is the handle for "mc admin bucket remote edit" command.
|
|
func mainAdminBucketRemoteEdit(ctx *cli.Context) error {
|
|
checkAdminBucketRemoteEditSyntax(ctx)
|
|
|
|
console.SetColor("RemoteMessage", color.New(color.FgGreen))
|
|
|
|
// Get the alias parameter from cli
|
|
args := ctx.Args()
|
|
aliasedURL := args.Get(0)
|
|
// Create a new MinIO Admin Client
|
|
client, cerr := newAdminClient(aliasedURL)
|
|
fatalIf(cerr, "Unable to initialize admin connection.")
|
|
_, sourceBucket := url2Alias(args[0])
|
|
|
|
targets, e := client.ListRemoteTargets(globalContext, sourceBucket, "")
|
|
fatalIf(probe.NewError(e).Trace(args...), "Unable to fetch remote target.")
|
|
|
|
bktTarget, ops := modifyRemoteTarget(ctx, targets)
|
|
|
|
arn, e := client.UpdateRemoteTarget(globalContext, bktTarget, ops...)
|
|
if e != nil {
|
|
fatalIf(probe.NewError(e).Trace(args...), "Unable to update remote target `"+bktTarget.Endpoint+"` from `"+bktTarget.SourceBucket+"` -> `"+bktTarget.TargetBucket+"`")
|
|
}
|
|
|
|
printMsg(RemoteMessage{
|
|
op: ctx.Command.Name,
|
|
TargetURL: bktTarget.URL().String(),
|
|
TargetBucket: bktTarget.TargetBucket,
|
|
AccessKey: bktTarget.Credentials.AccessKey,
|
|
SourceBucket: bktTarget.SourceBucket,
|
|
RemoteARN: arn,
|
|
})
|
|
|
|
return nil
|
|
}
|