1
0
mirror of https://github.com/minio/mc.git synced 2025-11-10 13:42:32 +03:00
Files
mc/cmd/admin-tier-add.go
2022-11-01 08:04:26 -07:00

390 lines
12 KiB
Go

// Copyright (c) 2015-2021 MinIO, Inc.
//
// This file is part of MinIO Object Storage stack
//
// This program is free software: you can redistribute it and/or modify
// it under the terms of the GNU Affero General Public License as published by
// the Free Software Foundation, either version 3 of the License, or
// (at your option) any later version.
//
// This program is distributed in the hope that it will be useful
// but WITHOUT ANY WARRANTY; without even the implied warranty of
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
// GNU Affero General Public License for more details.
//
// You should have received a copy of the GNU Affero General Public License
// along with this program. If not, see <http://www.gnu.org/licenses/>.
package cmd
import (
"fmt"
"io/ioutil"
"strings"
"github.com/fatih/color"
"github.com/minio/cli"
json "github.com/minio/colorjson"
madmin "github.com/minio/madmin-go"
"github.com/minio/mc/pkg/probe"
"github.com/minio/pkg/console"
)
var adminTierAddFlags = []cli.Flag{
cli.StringFlag{
Name: "endpoint",
Value: "",
Usage: "remote tier endpoint. e.g https://s3.amazonaws.com",
},
cli.StringFlag{
Name: "region",
Value: "",
Usage: "remote tier region. e.g us-west-2",
},
cli.StringFlag{
Name: "access-key",
Value: "",
Usage: "AWS S3 or compatible object storage access-key",
},
cli.StringFlag{
Name: "secret-key",
Value: "",
Usage: "AWS S3 or compatible object storage secret-key",
},
cli.BoolFlag{
Name: "use-aws-role",
Usage: "use AWS S3 role",
},
cli.StringFlag{
Name: "account-name",
Value: "",
Usage: "Azure Blob Storage account name",
},
cli.StringFlag{
Name: "account-key",
Value: "",
Usage: "Azure Blob Storage account key",
},
cli.StringFlag{
Name: "credentials-file",
Value: "",
Usage: "path to Google Cloud Storage credentials file",
},
cli.StringFlag{
Name: "bucket",
Value: "",
Usage: "remote tier bucket",
},
cli.StringFlag{
Name: "prefix",
Value: "",
Usage: "remote tier prefix",
},
cli.StringFlag{
Name: "storage-class",
Value: "",
Usage: "remote tier storage-class",
},
}
var adminTierAddCmd = cli.Command{
Name: "add",
Usage: "add a new remote tier target",
Action: mainAdminTierAdd,
OnUsageError: onUsageError,
Before: setGlobalsFromContext,
Flags: append(globalFlags, adminTierAddFlags...),
CustomHelpTemplate: `NAME:
{{.HelpName}} - {{.Usage}}
USAGE:
{{.HelpName}} TYPE ALIAS NAME [FLAGS]
TYPE:
Transition objects to supported cloud storage backend tier. Supported values are minio, s3, azure and gcs.
NAME:
Name of the remote tier target. e.g WARM-TIER
FLAGS:
{{range .VisibleFlags}}{{.}}
{{end}}
EXAMPLES:
1. Configure a new remote tier which transitions objects to a bucket in a MinIO deployment:
{{.Prompt}} {{.HelpName}} minio myminio WARM-MINIO-TIER --endpoint https://warm-minio.com \
--access-key ACCESSKEY --secret-key SECRETKEY --bucket mybucket --prefix myprefix/
2. Configure a new remote tier which transitions objects to a bucket in Azure Blob Storage:
{{.Prompt}} {{.HelpName}} azure myminio AZTIER --account-name ACCOUNT-NAME --account-key ACCOUNT-KEY \
--bucket myazurebucket --prefix myazureprefix/
3. Configure a new remote tier which transitions objects to a bucket in AWS S3 with STANDARD storage class:
{{.Prompt}} {{.HelpName}} s3 myminio S3TIER --endpoint https://s3.amazonaws.com \
--access-key ACCESSKEY --secret-key SECRETKEY --bucket mys3bucket --prefix mys3prefix/ \
--storage-class "STANDARD" --region us-west-2
4. Configure a new remote tier which transitions objects to a bucket in Google Cloud Storage:
{{.Prompt}} {{.HelpName}} gcs myminio GCSTIER --credentials-file /path/to/credentials.json \
--bucket mygcsbucket --prefix mygcsprefix/
`,
}
// checkAdminTierAddSyntax validates all the positional arguments
func checkAdminTierAddSyntax(ctx *cli.Context) {
argsNr := len(ctx.Args())
if argsNr < 3 {
showCommandHelpAndExit(ctx, 1) // last argument is exit code
}
if argsNr > 3 {
fatalIf(errInvalidArgument().Trace(ctx.Args().Tail()...),
"Incorrect number of arguments for tier add command.")
}
}
const (
s3Standard = "STANDARD"
s3ReducedRedundancy = "REDUCED_REDUNDANCY"
)
// fetchTierConfig returns a TierConfig given a tierName, a tierType and ctx to
// lookup command-line flags from. It exits with non-zero error code if any of
// the flags contain invalid values.
func fetchTierConfig(ctx *cli.Context, tierName string, tierType madmin.TierType) *madmin.TierConfig {
switch tierType {
case madmin.MinIO:
accessKey := ctx.String("access-key")
secretKey := ctx.String("secret-key")
if accessKey == "" || secretKey == "" {
fatalIf(errInvalidArgument().Trace(), fmt.Sprintf("%s remote tier requires access credentials", tierType))
}
bucket := ctx.String("bucket")
if bucket == "" {
fatalIf(errInvalidArgument().Trace(), fmt.Sprintf("%s remote tier requires target bucket", tierType))
}
endpoint := ctx.String("endpoint")
if endpoint == "" {
fatalIf(errInvalidArgument().Trace(), fmt.Sprintf("%s remote tier requires target endpoint", tierType))
}
minioOpts := []madmin.MinIOOptions{}
prefix := ctx.String("prefix")
if prefix != "" {
minioOpts = append(minioOpts, madmin.MinIOPrefix(prefix))
}
region := ctx.String("region")
if region != "" {
minioOpts = append(minioOpts, madmin.MinIORegion(region))
}
minioCfg, err := madmin.NewTierMinIO(tierName, endpoint, accessKey, secretKey, bucket, minioOpts...)
if err != nil {
fatalIf(probe.NewError(err), "Invalid configuration for MinIO tier")
}
return minioCfg
case madmin.S3:
accessKey := ctx.String("access-key")
secretKey := ctx.String("secret-key")
useAwsRole := ctx.IsSet("use-aws-role")
if accessKey == "" && secretKey == "" && !useAwsRole {
fatalIf(errInvalidArgument().Trace(), fmt.Sprintf("%s remote tier requires access credentials or AWS role", tierType))
}
if (accessKey != "" || secretKey != "") && useAwsRole {
fatalIf(errInvalidArgument().Trace(), fmt.Sprintf("%s remote tier requires access credentials", tierType))
}
bucket := ctx.String("bucket")
if bucket == "" {
fatalIf(errInvalidArgument().Trace(), fmt.Sprintf("%s remote tier requires target bucket", tierType))
}
s3Opts := []madmin.S3Options{}
prefix := ctx.String("prefix")
if prefix != "" {
s3Opts = append(s3Opts, madmin.S3Prefix(prefix))
}
endpoint := ctx.String("endpoint")
if endpoint != "" {
s3Opts = append(s3Opts, madmin.S3Endpoint(endpoint))
}
region := ctx.String("region")
if region != "" {
s3Opts = append(s3Opts, madmin.S3Region(region))
}
s3SC := ctx.String("storage-class")
if s3SC != "" {
if s3SC != s3Standard && s3SC != s3ReducedRedundancy {
fatalIf(errInvalidArgument().Trace(), fmt.Sprintf("unsupported storage-class type %s", s3SC))
}
s3Opts = append(s3Opts, madmin.S3StorageClass(s3SC))
}
if ctx.IsSet("use-aws-role") {
s3Opts = append(s3Opts, madmin.S3AWSRole())
}
s3Cfg, err := madmin.NewTierS3(tierName, accessKey, secretKey, bucket, s3Opts...)
if err != nil {
fatalIf(probe.NewError(err), "Invalid configuration for AWS S3 compatible remote tier")
}
return s3Cfg
case madmin.Azure:
accountName := ctx.String("account-name")
accountKey := ctx.String("account-key")
if accountName == "" || accountKey == "" {
fatalIf(errInvalidArgument().Trace(), fmt.Sprintf("%s remote tier requires access credentials", tierType))
}
bucket := ctx.String("bucket")
if bucket == "" {
fatalIf(errInvalidArgument().Trace(), fmt.Sprintf("%s remote tier requires target bucket", tierType))
}
azOpts := []madmin.AzureOptions{}
endpoint := ctx.String("endpoint")
if endpoint != "" {
azOpts = append(azOpts, madmin.AzureEndpoint(endpoint))
}
region := ctx.String("region")
if region != "" {
azOpts = append(azOpts, madmin.AzureRegion(region))
}
prefix := ctx.String("prefix")
if prefix != "" {
azOpts = append(azOpts, madmin.AzurePrefix(prefix))
}
azCfg, err := madmin.NewTierAzure(tierName, accountName, accountKey, bucket, azOpts...)
if err != nil {
fatalIf(probe.NewError(err), "Invalid configuration for Azure Blob Storage remote tier")
}
return azCfg
case madmin.GCS:
bucket := ctx.String("bucket")
if bucket == "" {
fatalIf(errInvalidArgument().Trace(), fmt.Sprintf("%s remote requires target bucket", tierType))
}
gcsOpts := []madmin.GCSOptions{}
prefix := ctx.String("prefix")
if prefix != "" {
gcsOpts = append(gcsOpts, madmin.GCSPrefix(prefix))
}
region := ctx.String("region")
if region != "" {
gcsOpts = append(gcsOpts, madmin.GCSRegion(region))
}
credsPath := ctx.String("credentials-file")
credsBytes, err := ioutil.ReadFile(credsPath)
if err != nil {
fatalIf(probe.NewError(err), "Failed to read credentials file")
}
gcsCfg, err := madmin.NewTierGCS(tierName, credsBytes, bucket, gcsOpts...)
if err != nil {
fatalIf(probe.NewError(err), "Invalid configuration for Google Cloud Storage remote tier")
}
return gcsCfg
}
fatalIf(errInvalidArgument().Trace(), fmt.Sprintf("Invalid remote tier type %s", tierType))
return nil
}
type tierMessage struct {
op string
Status string `json:"status"`
TierName string `json:"tierName"`
TierType string `json:"tierType"`
Endpoint string `json:"tierEndpoint"`
Bucket string `json:"bucket"`
Prefix string `json:"prefix,omitempty"`
Region string `json:"region,omitempty"`
TierParams map[string]string `json:"tierParams,omitempty"`
}
// String returns string representation of msg
func (msg *tierMessage) String() string {
switch msg.op {
case "add":
addMsg := fmt.Sprintf("Added remote tier %s of type %s", msg.TierName, msg.TierType)
return console.Colorize("TierMessage", addMsg)
case "rm":
rmMsg := fmt.Sprintf("Removed remote tier %s", msg.TierName)
return console.Colorize("TierMessage", rmMsg)
case "verify":
verifyMsg := fmt.Sprintf("Verified remote tier %s", msg.TierName)
return console.Colorize("TierMessage", verifyMsg)
case "edit":
editMsg := fmt.Sprintf("Updated remote tier %s", msg.TierName)
return console.Colorize("TierMessage", editMsg)
}
return ""
}
// JSON returns json encoded msg
func (msg *tierMessage) JSON() string {
jsonMessageBytes, e := json.MarshalIndent(msg, "", " ")
fatalIf(probe.NewError(e), "Unable to marshal into JSON.")
return string(jsonMessageBytes)
}
// SetTierConfig sets TierConfig related fields
func (msg *tierMessage) SetTierConfig(sCfg *madmin.TierConfig) {
msg.TierName = sCfg.Name
msg.TierType = sCfg.Type.String()
msg.Endpoint = sCfg.Endpoint()
msg.Bucket = sCfg.Bucket()
msg.Prefix = sCfg.Prefix()
msg.Region = sCfg.Region()
switch sCfg.Type {
case madmin.S3:
msg.TierParams = map[string]string{
"storageClass": sCfg.S3.StorageClass,
}
}
}
func mainAdminTierAdd(ctx *cli.Context) error {
checkAdminTierAddSyntax(ctx)
console.SetColor("TierMessage", color.New(color.FgGreen))
args := ctx.Args()
tierTypeStr := args.Get(0)
tierType, e := madmin.NewTierType(tierTypeStr)
fatalIf(probe.NewError(e), "Unsupported tier type")
aliasedURL := args.Get(1)
tierName := args.Get(2)
if tierName == "" {
fatalIf(errInvalidArgument(), "Tier name can't be empty")
}
// Create a new MinIO Admin Client
client, cerr := newAdminClient(aliasedURL)
fatalIf(cerr, "Unable to initialize admin connection.")
tCfg := fetchTierConfig(ctx, strings.ToUpper(tierName), tierType)
fatalIf(probe.NewError(client.AddTier(globalContext, tCfg)).Trace(args...), "Unable to configure remote tier target")
msg := &tierMessage{
op: "add",
Status: "success",
}
msg.SetTierConfig(tCfg)
printMsg(msg)
return nil
}