mirror of
https://github.com/seaweedfs/seaweedfs.git
synced 2025-09-18 23:47:55 +08:00
Revert "Adding HTTP verb whitelisting options."
This reverts commit 34837afc7a
.
This commit is contained in:
@@ -9,7 +9,6 @@ import (
|
|||||||
"github.com/chrislusf/seaweedfs/weed/glog"
|
"github.com/chrislusf/seaweedfs/weed/glog"
|
||||||
"github.com/chrislusf/seaweedfs/weed/server"
|
"github.com/chrislusf/seaweedfs/weed/server"
|
||||||
"github.com/chrislusf/seaweedfs/weed/util"
|
"github.com/chrislusf/seaweedfs/weed/util"
|
||||||
"strings"
|
|
||||||
)
|
)
|
||||||
|
|
||||||
var (
|
var (
|
||||||
@@ -32,31 +31,6 @@ type FilerOptions struct {
|
|||||||
redis_server *string
|
redis_server *string
|
||||||
redis_password *string
|
redis_password *string
|
||||||
redis_database *int
|
redis_database *int
|
||||||
get_ip_whitelist_option *string
|
|
||||||
get_root_whitelist_option *string
|
|
||||||
head_ip_whitelist_option *string
|
|
||||||
head_root_whitelist_option *string
|
|
||||||
delete_ip_whitelist_option *string
|
|
||||||
delete_root_whitelist_option *string
|
|
||||||
put_ip_whitelist_option *string
|
|
||||||
put_root_whitelist_option *string
|
|
||||||
post_ip_whitelist_option *string
|
|
||||||
post_root_whitelist_option *string
|
|
||||||
get_secure_key *string
|
|
||||||
head_secure_key *string
|
|
||||||
delete_secure_key *string
|
|
||||||
put_secure_key *string
|
|
||||||
post_secure_key *string
|
|
||||||
get_ip_whitelist []string
|
|
||||||
get_root_whitelist []string
|
|
||||||
head_ip_whitelist []string
|
|
||||||
head_root_whitelist []string
|
|
||||||
delete_ip_whitelist []string
|
|
||||||
delete_root_whitelist []string
|
|
||||||
put_ip_whitelist []string
|
|
||||||
put_root_whitelist []string
|
|
||||||
post_ip_whitelist []string
|
|
||||||
post_root_whitelist []string
|
|
||||||
}
|
}
|
||||||
|
|
||||||
func init() {
|
func init() {
|
||||||
@@ -76,21 +50,6 @@ func init() {
|
|||||||
f.redis_password = cmdFiler.Flag.String("redis.password", "", "password in clear text")
|
f.redis_password = cmdFiler.Flag.String("redis.password", "", "password in clear text")
|
||||||
f.redis_database = cmdFiler.Flag.Int("redis.database", 0, "the database on the redis server")
|
f.redis_database = cmdFiler.Flag.Int("redis.database", 0, "the database on the redis server")
|
||||||
f.secretKey = cmdFiler.Flag.String("secure.secret", "", "secret to encrypt Json Web Token(JWT)")
|
f.secretKey = cmdFiler.Flag.String("secure.secret", "", "secret to encrypt Json Web Token(JWT)")
|
||||||
f.get_ip_whitelist_option = cmdFiler.Flag.String("whitelist.ip.get", "", "comma separated Ip addresses having get permission. No limit if empty.")
|
|
||||||
f.get_root_whitelist_option = cmdFiler.Flag.String("whitelist.root.get", "", "comma separated root paths having get permission. No limit if empty.")
|
|
||||||
f.head_ip_whitelist_option = cmdFiler.Flag.String("whitelist.ip.head", "", "comma separated Ip addresses having head permission. No limit if empty.")
|
|
||||||
f.head_root_whitelist_option = cmdFiler.Flag.String("whitelist.root.head", "", "comma separated root paths having head permission. No limit if empty.")
|
|
||||||
f.delete_ip_whitelist_option = cmdFiler.Flag.String("whitelist.ip.delete", "", "comma separated Ip addresses having delete permission. No limit if empty.")
|
|
||||||
f.delete_root_whitelist_option = cmdFiler.Flag.String("whitelist.root.delete", "", "comma separated root paths having delete permission. No limit if empty.")
|
|
||||||
f.put_ip_whitelist_option = cmdFiler.Flag.String("whitelist.ip.put", "", "comma separated Ip addresses having put permission. No limit if empty.")
|
|
||||||
f.put_root_whitelist_option = cmdFiler.Flag.String("whitelist.root.put", "", "comma separated root paths having put permission. No limit if empty.")
|
|
||||||
f.post_ip_whitelist_option = cmdFiler.Flag.String("whitelist.ip.post", "", "comma separated Ip addresses having post permission. No limit if empty.")
|
|
||||||
f.post_root_whitelist_option = cmdFiler.Flag.String("whitelist.root.post", "", "comma separated root paths having post permission. No limit if empty.")
|
|
||||||
f.get_secure_key = cmdFiler.Flag.String("secure.secret.get", "", "secret to encrypt Json Web Token(JWT)")
|
|
||||||
f.head_secure_key = cmdFiler.Flag.String("secure.secret.head", "", "secret to encrypt Json Web Token(JWT)")
|
|
||||||
f.delete_secure_key = cmdFiler.Flag.String("secure.secret.delete", "", "secret to encrypt Json Web Token(JWT)")
|
|
||||||
f.put_secure_key = cmdFiler.Flag.String("secure.secret.put", "", "secret to encrypt Json Web Token(JWT)")
|
|
||||||
f.post_secure_key = cmdFiler.Flag.String("secure.secret.post", "", "secret to encrypt Json Web Token(JWT)")
|
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -122,36 +81,6 @@ func runFiler(cmd *Command, args []string) bool {
|
|||||||
glog.Fatalf("Check Meta Folder (-dir) Writable %s : %s", *f.dir, err)
|
glog.Fatalf("Check Meta Folder (-dir) Writable %s : %s", *f.dir, err)
|
||||||
}
|
}
|
||||||
|
|
||||||
if *f.get_ip_whitelist_option != "" {
|
|
||||||
f.get_ip_whitelist = strings.Split(*f.get_ip_whitelist_option, ",")
|
|
||||||
}
|
|
||||||
if *f.get_root_whitelist_option != "" {
|
|
||||||
f.get_root_whitelist = strings.Split(*f.get_root_whitelist_option, ",")
|
|
||||||
}
|
|
||||||
if *f.head_ip_whitelist_option != "" {
|
|
||||||
f.head_ip_whitelist = strings.Split(*f.head_ip_whitelist_option, ",")
|
|
||||||
}
|
|
||||||
if *f.head_root_whitelist_option != "" {
|
|
||||||
f.head_root_whitelist = strings.Split(*f.head_root_whitelist_option, ",")
|
|
||||||
}
|
|
||||||
if *f.delete_ip_whitelist_option != "" {
|
|
||||||
f.delete_ip_whitelist = strings.Split(*f.delete_ip_whitelist_option, ",")
|
|
||||||
}
|
|
||||||
if *f.delete_root_whitelist_option != "" {
|
|
||||||
f.delete_root_whitelist = strings.Split(*f.delete_root_whitelist_option, ",")
|
|
||||||
}
|
|
||||||
if *f.put_ip_whitelist_option != "" {
|
|
||||||
f.put_ip_whitelist = strings.Split(*f.put_ip_whitelist_option, ",")
|
|
||||||
}
|
|
||||||
if *f.put_root_whitelist_option != "" {
|
|
||||||
f.put_root_whitelist = strings.Split(*f.put_root_whitelist_option, ",")
|
|
||||||
}
|
|
||||||
if *f.post_ip_whitelist_option != "" {
|
|
||||||
f.post_ip_whitelist = strings.Split(*f.post_ip_whitelist_option, ",")
|
|
||||||
}
|
|
||||||
if *f.post_root_whitelist_option != "" {
|
|
||||||
f.post_root_whitelist = strings.Split(*f.post_root_whitelist_option, ",")
|
|
||||||
}
|
|
||||||
r := http.NewServeMux()
|
r := http.NewServeMux()
|
||||||
_, nfs_err := weed_server.NewFilerServer(r, *f.ip, *f.port, *f.master, *f.dir, *f.collection,
|
_, nfs_err := weed_server.NewFilerServer(r, *f.ip, *f.port, *f.master, *f.dir, *f.collection,
|
||||||
*f.defaultReplicaPlacement, *f.redirectOnRead, *f.disableDirListing,
|
*f.defaultReplicaPlacement, *f.redirectOnRead, *f.disableDirListing,
|
||||||
@@ -159,9 +88,6 @@ func runFiler(cmd *Command, args []string) bool {
|
|||||||
*f.secretKey,
|
*f.secretKey,
|
||||||
*f.cassandra_server, *f.cassandra_keyspace,
|
*f.cassandra_server, *f.cassandra_keyspace,
|
||||||
*f.redis_server, *f.redis_password, *f.redis_database,
|
*f.redis_server, *f.redis_password, *f.redis_database,
|
||||||
f.get_ip_whitelist, f.head_ip_whitelist, f.delete_ip_whitelist, f.put_ip_whitelist, f.post_ip_whitelist,
|
|
||||||
f.get_root_whitelist, f.head_root_whitelist, f.delete_root_whitelist, f.put_root_whitelist, f.post_root_whitelist,
|
|
||||||
*f.get_secure_key, *f.head_secure_key, *f.delete_secure_key, *f.put_secure_key, *f.post_secure_key,
|
|
||||||
)
|
)
|
||||||
if nfs_err != nil {
|
if nfs_err != nil {
|
||||||
glog.Fatalf("Filer startup error: %v", nfs_err)
|
glog.Fatalf("Filer startup error: %v", nfs_err)
|
||||||
|
@@ -41,13 +41,11 @@ var (
|
|||||||
mTimeout = cmdMaster.Flag.Int("idleTimeout", 10, "connection idle seconds")
|
mTimeout = cmdMaster.Flag.Int("idleTimeout", 10, "connection idle seconds")
|
||||||
mMaxCpu = cmdMaster.Flag.Int("maxCpu", 0, "maximum number of CPUs. 0 means all available CPUs")
|
mMaxCpu = cmdMaster.Flag.Int("maxCpu", 0, "maximum number of CPUs. 0 means all available CPUs")
|
||||||
garbageThreshold = cmdMaster.Flag.String("garbageThreshold", "0.3", "threshold to vacuum and reclaim spaces")
|
garbageThreshold = cmdMaster.Flag.String("garbageThreshold", "0.3", "threshold to vacuum and reclaim spaces")
|
||||||
masterReadWhiteListOption = cmdMaster.Flag.String("readWhiteList", "", "comma separated Ip addresses having read permission. No limit if empty.")
|
masterWhiteListOption = cmdMaster.Flag.String("whiteList", "", "comma separated Ip addresses having write permission. No limit if empty.")
|
||||||
masterWriteWhiteListOption = cmdMaster.Flag.String("writeWhiteList", "", "comma separated Ip addresses having write permission. No limit if empty.")
|
|
||||||
masterSecureKey = cmdMaster.Flag.String("secure.secret", "", "secret to encrypt Json Web Token(JWT)")
|
masterSecureKey = cmdMaster.Flag.String("secure.secret", "", "secret to encrypt Json Web Token(JWT)")
|
||||||
masterCpuProfile = cmdMaster.Flag.String("cpuprofile", "", "cpu profile output file")
|
masterCpuProfile = cmdMaster.Flag.String("cpuprofile", "", "cpu profile output file")
|
||||||
|
|
||||||
masterReadWhiteList []string
|
masterWhiteList []string
|
||||||
masterWriteWhiteList []string
|
|
||||||
)
|
)
|
||||||
|
|
||||||
func runMaster(cmd *Command, args []string) bool {
|
func runMaster(cmd *Command, args []string) bool {
|
||||||
@@ -69,17 +67,14 @@ func runMaster(cmd *Command, args []string) bool {
|
|||||||
if err := util.TestFolderWritable(*metaFolder); err != nil {
|
if err := util.TestFolderWritable(*metaFolder); err != nil {
|
||||||
glog.Fatalf("Check Meta Folder (-mdir) Writable %s : %s", *metaFolder, err)
|
glog.Fatalf("Check Meta Folder (-mdir) Writable %s : %s", *metaFolder, err)
|
||||||
}
|
}
|
||||||
if *masterReadWhiteListOption != "" {
|
if *masterWhiteListOption != "" {
|
||||||
masterReadWhiteList = strings.Split(*masterReadWhiteListOption, ",")
|
masterWhiteList = strings.Split(*masterWhiteListOption, ",")
|
||||||
}
|
|
||||||
if *masterWriteWhiteListOption != "" {
|
|
||||||
masterWriteWhiteList = strings.Split(*masterWriteWhiteListOption, ",")
|
|
||||||
}
|
}
|
||||||
|
|
||||||
r := mux.NewRouter()
|
r := mux.NewRouter()
|
||||||
ms := weed_server.NewMasterServer(r, *mport, *metaFolder,
|
ms := weed_server.NewMasterServer(r, *mport, *metaFolder,
|
||||||
*volumeSizeLimitMB, *mpulse, *confFile, *defaultReplicaPlacement, *garbageThreshold,
|
*volumeSizeLimitMB, *mpulse, *confFile, *defaultReplicaPlacement, *garbageThreshold,
|
||||||
masterReadWhiteList, masterWriteWhiteList, nil, *masterSecureKey,
|
masterWhiteList, *masterSecureKey,
|
||||||
)
|
)
|
||||||
|
|
||||||
listeningAddress := *masterBindIp + ":" + strconv.Itoa(*mport)
|
listeningAddress := *masterBindIp + ":" + strconv.Itoa(*mport)
|
||||||
|
@@ -54,8 +54,7 @@ var (
|
|||||||
serverTimeout = cmdServer.Flag.Int("idleTimeout", 10, "connection idle seconds")
|
serverTimeout = cmdServer.Flag.Int("idleTimeout", 10, "connection idle seconds")
|
||||||
serverDataCenter = cmdServer.Flag.String("dataCenter", "", "current volume server's data center name")
|
serverDataCenter = cmdServer.Flag.String("dataCenter", "", "current volume server's data center name")
|
||||||
serverRack = cmdServer.Flag.String("rack", "", "current volume server's rack name")
|
serverRack = cmdServer.Flag.String("rack", "", "current volume server's rack name")
|
||||||
serverReadWhiteListOption = cmdServer.Flag.String("read.whitelist", "", "comma separated Ip addresses having read permission. No limit if empty.")
|
serverWhiteListOption = cmdServer.Flag.String("whiteList", "", "comma separated Ip addresses having write permission. No limit if empty.")
|
||||||
serverWriteWhiteListOption = cmdServer.Flag.String("write.whitelist", "", "comma separated Ip addresses having write permission. No limit if empty.")
|
|
||||||
serverPeers = cmdServer.Flag.String("master.peers", "", "other master nodes in comma separated ip:masterPort list")
|
serverPeers = cmdServer.Flag.String("master.peers", "", "other master nodes in comma separated ip:masterPort list")
|
||||||
serverSecureKey = cmdServer.Flag.String("secure.secret", "", "secret to encrypt Json Web Token(JWT)")
|
serverSecureKey = cmdServer.Flag.String("secure.secret", "", "secret to encrypt Json Web Token(JWT)")
|
||||||
serverGarbageThreshold = cmdServer.Flag.String("garbageThreshold", "0.3", "threshold to vacuum and reclaim spaces")
|
serverGarbageThreshold = cmdServer.Flag.String("garbageThreshold", "0.3", "threshold to vacuum and reclaim spaces")
|
||||||
@@ -75,8 +74,7 @@ var (
|
|||||||
volumeServerPublicUrl = cmdServer.Flag.String("volume.publicUrl", "", "publicly accessible address")
|
volumeServerPublicUrl = cmdServer.Flag.String("volume.publicUrl", "", "publicly accessible address")
|
||||||
isStartingFiler = cmdServer.Flag.Bool("filer", false, "whether to start filer")
|
isStartingFiler = cmdServer.Flag.Bool("filer", false, "whether to start filer")
|
||||||
|
|
||||||
serverReadWhiteList []string
|
serverWhiteList []string
|
||||||
serverWriteWhiteList []string
|
|
||||||
)
|
)
|
||||||
|
|
||||||
func init() {
|
func init() {
|
||||||
@@ -84,7 +82,7 @@ func init() {
|
|||||||
filerOptions.master = cmdServer.Flag.String("filer.master", "", "default to current master server")
|
filerOptions.master = cmdServer.Flag.String("filer.master", "", "default to current master server")
|
||||||
filerOptions.collection = cmdServer.Flag.String("filer.collection", "", "all data will be stored in this collection")
|
filerOptions.collection = cmdServer.Flag.String("filer.collection", "", "all data will be stored in this collection")
|
||||||
filerOptions.port = cmdServer.Flag.Int("filer.port", 8888, "filer server http listen port")
|
filerOptions.port = cmdServer.Flag.Int("filer.port", 8888, "filer server http listen port")
|
||||||
filerOptions.dir = cmdServer.Flag.String("filer.dir", "", "directory to store meta data, default to a 'filer' sub directory of what -mdir is specified")
|
filerOptions.dir = cmdServer.Flag.String("filer.dir", "", "directory to store meta data, default to a 'filer' sub directory of what -dir is specified")
|
||||||
filerOptions.defaultReplicaPlacement = cmdServer.Flag.String("filer.defaultReplicaPlacement", "", "Default replication type if not specified during runtime.")
|
filerOptions.defaultReplicaPlacement = cmdServer.Flag.String("filer.defaultReplicaPlacement", "", "Default replication type if not specified during runtime.")
|
||||||
filerOptions.redirectOnRead = cmdServer.Flag.Bool("filer.redirectOnRead", false, "whether proxy or redirect to volume server during file GET request")
|
filerOptions.redirectOnRead = cmdServer.Flag.Bool("filer.redirectOnRead", false, "whether proxy or redirect to volume server during file GET request")
|
||||||
filerOptions.disableDirListing = cmdServer.Flag.Bool("filer.disableDirListing", false, "turn off directory listing")
|
filerOptions.disableDirListing = cmdServer.Flag.Bool("filer.disableDirListing", false, "turn off directory listing")
|
||||||
@@ -94,21 +92,6 @@ func init() {
|
|||||||
filerOptions.redis_server = cmdServer.Flag.String("filer.redis.server", "", "host:port of the redis server, e.g., 127.0.0.1:6379")
|
filerOptions.redis_server = cmdServer.Flag.String("filer.redis.server", "", "host:port of the redis server, e.g., 127.0.0.1:6379")
|
||||||
filerOptions.redis_password = cmdServer.Flag.String("filer.redis.password", "", "redis password in clear text")
|
filerOptions.redis_password = cmdServer.Flag.String("filer.redis.password", "", "redis password in clear text")
|
||||||
filerOptions.redis_database = cmdServer.Flag.Int("filer.redis.database", 0, "the database on the redis server")
|
filerOptions.redis_database = cmdServer.Flag.Int("filer.redis.database", 0, "the database on the redis server")
|
||||||
filerOptions.get_ip_whitelist_option = cmdServer.Flag.String("filer.whitelist.ip.get", "", "comma separated Ip addresses having filer GET permission. No limit if empty.")
|
|
||||||
filerOptions.get_root_whitelist_option = cmdServer.Flag.String("filer.whitelist.root.get", "", "comma separated root paths having filer GET permission. No limit if empty.")
|
|
||||||
filerOptions.head_ip_whitelist_option = cmdServer.Flag.String("filer.whitelist.ip.head", "", "comma separated Ip addresses having filer HEAD permission. No limit if empty.")
|
|
||||||
filerOptions.head_root_whitelist_option = cmdServer.Flag.String("filer.whitelist.root.head", "", "comma separated root paths having filer HEAD permission. No limit if empty.")
|
|
||||||
filerOptions.delete_ip_whitelist_option = cmdServer.Flag.String("filer.whitelist.ip.delete", "", "comma separated Ip addresses having filer DELETE permission. No limit if empty.")
|
|
||||||
filerOptions.delete_root_whitelist_option = cmdServer.Flag.String("filer.whitelist.root.delete", "", "comma separated root paths having filer DELETE permission. No limit if empty.")
|
|
||||||
filerOptions.put_ip_whitelist_option = cmdServer.Flag.String("filer.whitelist.ip.put", "", "comma separated Ip addresses having filer PUT permission. No limit if empty.")
|
|
||||||
filerOptions.put_root_whitelist_option = cmdServer.Flag.String("filer.whitelist.root.put", "", "comma separated root paths having filer PUT permission. No limit if empty.")
|
|
||||||
filerOptions.post_ip_whitelist_option = cmdServer.Flag.String("filer.whitelist.ip.post", "", "comma separated Ip addresses having filer POST permission. No limit if empty.")
|
|
||||||
filerOptions.post_root_whitelist_option = cmdServer.Flag.String("filer.whitelist.root.post", "", "comma separated root paths having filer POST permission. No limit if empty.")
|
|
||||||
filerOptions.get_secure_key = cmdServer.Flag.String("filer.secure.secret.get", "", "secret to encrypt Json Web Token(JWT)")
|
|
||||||
filerOptions.head_secure_key = cmdServer.Flag.String("filer.secure.secret.head", "", "secret to encrypt Json Web Token(JWT)")
|
|
||||||
filerOptions.delete_secure_key = cmdServer.Flag.String("filer.secure.secret.delete", "", "secret to encrypt Json Web Token(JWT)")
|
|
||||||
filerOptions.put_secure_key = cmdServer.Flag.String("filer.secure.secret.put", "", "secret to encrypt Json Web Token(JWT)")
|
|
||||||
filerOptions.post_secure_key = cmdServer.Flag.String("filer.secure.secret.post", "", "secret to encrypt Json Web Token(JWT)")
|
|
||||||
}
|
}
|
||||||
|
|
||||||
func runServer(cmd *Command, args []string) bool {
|
func runServer(cmd *Command, args []string) bool {
|
||||||
@@ -171,56 +154,13 @@ func runServer(cmd *Command, args []string) bool {
|
|||||||
if err := util.TestFolderWritable(*filerOptions.dir); err != nil {
|
if err := util.TestFolderWritable(*filerOptions.dir); err != nil {
|
||||||
glog.Fatalf("Check Mapping Meta Folder (-filer.dir=\"%s\") Writable: %s", *filerOptions.dir, err)
|
glog.Fatalf("Check Mapping Meta Folder (-filer.dir=\"%s\") Writable: %s", *filerOptions.dir, err)
|
||||||
}
|
}
|
||||||
if *filerOptions.get_ip_whitelist_option != "" {
|
|
||||||
glog.V(0).Infof("Filer GET IP whitelist: %s", *filerOptions.get_ip_whitelist_option)
|
|
||||||
filerOptions.get_ip_whitelist = strings.Split(*filerOptions.get_ip_whitelist_option, ",")
|
|
||||||
}
|
|
||||||
if *filerOptions.get_root_whitelist_option != "" {
|
|
||||||
glog.V(0).Infof("Filer GET root whitelist: %s", *filerOptions.get_root_whitelist_option)
|
|
||||||
filerOptions.get_root_whitelist = strings.Split(*filerOptions.get_root_whitelist_option, ",")
|
|
||||||
}
|
|
||||||
if *filerOptions.head_ip_whitelist_option != "" {
|
|
||||||
glog.V(0).Infof("Filer HEAD IP whitelist: %s", *filerOptions.head_ip_whitelist_option)
|
|
||||||
filerOptions.head_ip_whitelist = strings.Split(*filerOptions.head_ip_whitelist_option, ",")
|
|
||||||
}
|
|
||||||
if *filerOptions.head_root_whitelist_option != "" {
|
|
||||||
glog.V(0).Infof("Filer HEAD root whitelist: %s", *filerOptions.head_root_whitelist_option)
|
|
||||||
filerOptions.head_root_whitelist = strings.Split(*filerOptions.head_root_whitelist_option, ",")
|
|
||||||
}
|
|
||||||
if *filerOptions.delete_ip_whitelist_option != "" {
|
|
||||||
glog.V(0).Infof("Filer DELETE IP whitelist: %s", *filerOptions.delete_ip_whitelist_option)
|
|
||||||
filerOptions.delete_ip_whitelist = strings.Split(*filerOptions.delete_ip_whitelist_option, ",")
|
|
||||||
}
|
|
||||||
if *filerOptions.delete_root_whitelist_option != "" {
|
|
||||||
glog.V(0).Infof("Filer DELETE root whitelist: %s", *filerOptions.delete_root_whitelist_option)
|
|
||||||
filerOptions.delete_root_whitelist = strings.Split(*filerOptions.delete_root_whitelist_option, ",")
|
|
||||||
}
|
|
||||||
if *filerOptions.put_ip_whitelist_option != "" {
|
|
||||||
glog.V(0).Infof("Filer PUT IP whitelist: %s", *filerOptions.put_ip_whitelist_option)
|
|
||||||
filerOptions.put_ip_whitelist = strings.Split(*filerOptions.put_ip_whitelist_option, ",")
|
|
||||||
}
|
|
||||||
if *filerOptions.put_root_whitelist_option != "" {
|
|
||||||
glog.V(0).Infof("Filer PUT root whitelist: %s", *filerOptions.put_root_whitelist_option)
|
|
||||||
filerOptions.put_root_whitelist = strings.Split(*filerOptions.put_root_whitelist_option, ",")
|
|
||||||
}
|
|
||||||
if *filerOptions.post_ip_whitelist_option != "" {
|
|
||||||
glog.V(0).Infof("Filer POST IP whitelist: %s", *filerOptions.post_ip_whitelist_option)
|
|
||||||
filerOptions.post_ip_whitelist = strings.Split(*filerOptions.post_ip_whitelist_option, ",")
|
|
||||||
}
|
|
||||||
if *filerOptions.post_root_whitelist_option != "" {
|
|
||||||
glog.V(0).Infof("Filer POST root whitelist: %s", *filerOptions.post_root_whitelist_option)
|
|
||||||
filerOptions.post_root_whitelist = strings.Split(*filerOptions.post_root_whitelist_option, ",")
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
if err := util.TestFolderWritable(*masterMetaFolder); err != nil {
|
if err := util.TestFolderWritable(*masterMetaFolder); err != nil {
|
||||||
glog.Fatalf("Check Meta Folder (-mdir=\"%s\") Writable: %s", *masterMetaFolder, err)
|
glog.Fatalf("Check Meta Folder (-mdir=\"%s\") Writable: %s", *masterMetaFolder, err)
|
||||||
}
|
}
|
||||||
|
|
||||||
if *serverReadWhiteListOption != "" {
|
if *serverWhiteListOption != "" {
|
||||||
serverReadWhiteList = strings.Split(*serverReadWhiteListOption, ",")
|
serverWhiteList = strings.Split(*serverWhiteListOption, ",")
|
||||||
}
|
|
||||||
if *serverWriteWhiteListOption != "" {
|
|
||||||
serverWriteWhiteList = strings.Split(*serverWriteWhiteListOption, ",")
|
|
||||||
}
|
}
|
||||||
|
|
||||||
if *isStartingFiler {
|
if *isStartingFiler {
|
||||||
@@ -234,9 +174,6 @@ func runServer(cmd *Command, args []string) bool {
|
|||||||
*filerOptions.secretKey,
|
*filerOptions.secretKey,
|
||||||
*filerOptions.cassandra_server, *filerOptions.cassandra_keyspace,
|
*filerOptions.cassandra_server, *filerOptions.cassandra_keyspace,
|
||||||
*filerOptions.redis_server, *filerOptions.redis_password, *filerOptions.redis_database,
|
*filerOptions.redis_server, *filerOptions.redis_password, *filerOptions.redis_database,
|
||||||
filerOptions.get_ip_whitelist, filerOptions.head_ip_whitelist, filerOptions.delete_ip_whitelist, filerOptions.put_ip_whitelist, filerOptions.post_ip_whitelist,
|
|
||||||
filerOptions.get_root_whitelist, filerOptions.head_root_whitelist, filerOptions.delete_root_whitelist, filerOptions.put_root_whitelist, filerOptions.post_root_whitelist,
|
|
||||||
*f.get_secure_key, *f.head_secure_key, *f.delete_secure_key, *f.put_secure_key, *f.post_secure_key,
|
|
||||||
)
|
)
|
||||||
if nfs_err != nil {
|
if nfs_err != nil {
|
||||||
glog.Fatalf("Filer startup error: %v", nfs_err)
|
glog.Fatalf("Filer startup error: %v", nfs_err)
|
||||||
@@ -265,7 +202,7 @@ func runServer(cmd *Command, args []string) bool {
|
|||||||
r := mux.NewRouter()
|
r := mux.NewRouter()
|
||||||
ms := weed_server.NewMasterServer(r, *masterPort, *masterMetaFolder,
|
ms := weed_server.NewMasterServer(r, *masterPort, *masterMetaFolder,
|
||||||
*masterVolumeSizeLimitMB, *volumePulse, *masterConfFile, *masterDefaultReplicaPlacement, *serverGarbageThreshold,
|
*masterVolumeSizeLimitMB, *volumePulse, *masterConfFile, *masterDefaultReplicaPlacement, *serverGarbageThreshold,
|
||||||
serverReadWhiteList, serverWriteWhiteList, nil, *serverSecureKey,
|
serverWhiteList, *serverSecureKey,
|
||||||
)
|
)
|
||||||
|
|
||||||
glog.V(0).Infoln("Start Seaweed Master", util.VERSION, "at", *serverIp+":"+strconv.Itoa(*masterPort))
|
glog.V(0).Infoln("Start Seaweed Master", util.VERSION, "at", *serverIp+":"+strconv.Itoa(*masterPort))
|
||||||
@@ -319,7 +256,7 @@ func runServer(cmd *Command, args []string) bool {
|
|||||||
folders, maxCounts,
|
folders, maxCounts,
|
||||||
volumeNeedleMapKind,
|
volumeNeedleMapKind,
|
||||||
*serverIp+":"+strconv.Itoa(*masterPort), *volumePulse, *serverDataCenter, *serverRack,
|
*serverIp+":"+strconv.Itoa(*masterPort), *volumePulse, *serverDataCenter, *serverRack,
|
||||||
serverReadWhiteList, serverWriteWhiteList, nil, *volumeFixJpgOrientation, *volumeReadRedirect,
|
serverWhiteList, *volumeFixJpgOrientation, *volumeReadRedirect,
|
||||||
)
|
)
|
||||||
|
|
||||||
glog.V(0).Infoln("Start Seaweed volume server", util.VERSION, "at", *serverIp+":"+strconv.Itoa(*volumePort))
|
glog.V(0).Infoln("Start Seaweed volume server", util.VERSION, "at", *serverIp+":"+strconv.Itoa(*volumePort))
|
||||||
|
@@ -2,7 +2,6 @@ package command
|
|||||||
|
|
||||||
import (
|
import (
|
||||||
"net/http"
|
"net/http"
|
||||||
_ "net/http/pprof"
|
|
||||||
"os"
|
"os"
|
||||||
"runtime"
|
"runtime"
|
||||||
"strconv"
|
"strconv"
|
||||||
@@ -33,8 +32,7 @@ type VolumeServerOptions struct {
|
|||||||
maxCpu *int
|
maxCpu *int
|
||||||
dataCenter *string
|
dataCenter *string
|
||||||
rack *string
|
rack *string
|
||||||
readWhitelist []string
|
whiteList []string
|
||||||
writeWhitelist []string
|
|
||||||
indexType *string
|
indexType *string
|
||||||
fixJpgOrientation *bool
|
fixJpgOrientation *bool
|
||||||
readRedirect *bool
|
readRedirect *bool
|
||||||
@@ -69,8 +67,7 @@ var cmdVolume = &Command{
|
|||||||
var (
|
var (
|
||||||
volumeFolders = cmdVolume.Flag.String("dir", os.TempDir(), "directories to store data files. dir[,dir]...")
|
volumeFolders = cmdVolume.Flag.String("dir", os.TempDir(), "directories to store data files. dir[,dir]...")
|
||||||
maxVolumeCounts = cmdVolume.Flag.String("max", "7", "maximum numbers of volumes, count[,count]...")
|
maxVolumeCounts = cmdVolume.Flag.String("max", "7", "maximum numbers of volumes, count[,count]...")
|
||||||
volumeReadWhiteListOption = cmdVolume.Flag.String("read.whitelist", "", "comma separated Ip addresses having read permission. No limit if empty.")
|
volumeWhiteListOption = cmdVolume.Flag.String("whiteList", "", "comma separated Ip addresses having write permission. No limit if empty.")
|
||||||
volumeWriteWhiteListOption = cmdVolume.Flag.String("write.whitelist", "", "comma separated Ip addresses having write permission. No limit if empty.")
|
|
||||||
)
|
)
|
||||||
|
|
||||||
func runVolume(cmd *Command, args []string) bool {
|
func runVolume(cmd *Command, args []string) bool {
|
||||||
@@ -99,11 +96,8 @@ func runVolume(cmd *Command, args []string) bool {
|
|||||||
}
|
}
|
||||||
|
|
||||||
//security related white list configuration
|
//security related white list configuration
|
||||||
if *volumeReadWhiteListOption != "" {
|
if *volumeWhiteListOption != "" {
|
||||||
v.readWhitelist = strings.Split(*volumeReadWhiteListOption, ",")
|
v.whiteList = strings.Split(*volumeWhiteListOption, ",")
|
||||||
}
|
|
||||||
if *volumeWriteWhiteListOption != "" {
|
|
||||||
v.writeWhitelist = strings.Split(*volumeWriteWhiteListOption, ",")
|
|
||||||
}
|
}
|
||||||
|
|
||||||
if *v.ip == "" {
|
if *v.ip == "" {
|
||||||
@@ -136,7 +130,7 @@ func runVolume(cmd *Command, args []string) bool {
|
|||||||
v.folders, v.folderMaxLimits,
|
v.folders, v.folderMaxLimits,
|
||||||
volumeNeedleMapKind,
|
volumeNeedleMapKind,
|
||||||
*v.master, *v.pulseSeconds, *v.dataCenter, *v.rack,
|
*v.master, *v.pulseSeconds, *v.dataCenter, *v.rack,
|
||||||
v.readWhitelist, v.writeWhitelist, nil,
|
v.whiteList,
|
||||||
*v.fixJpgOrientation, *v.readRedirect,
|
*v.fixJpgOrientation, *v.readRedirect,
|
||||||
)
|
)
|
||||||
|
|
||||||
|
@@ -41,31 +41,17 @@ https://github.com/pkieltyka/jwtauth/blob/master/jwtauth.go
|
|||||||
|
|
||||||
*/
|
*/
|
||||||
type Guard struct {
|
type Guard struct {
|
||||||
ipWhiteList []string
|
whiteList []string
|
||||||
rootWhiteList []string
|
|
||||||
SecretKey Secret
|
SecretKey Secret
|
||||||
|
|
||||||
isActive bool
|
isActive bool
|
||||||
}
|
}
|
||||||
|
|
||||||
func NewGuard(ipWhiteList []string, rootWhiteList []string, secretKey string) *Guard {
|
func NewGuard(whiteList []string, secretKey string) *Guard {
|
||||||
g := &Guard{ipWhiteList: ipWhiteList, rootWhiteList: rootWhiteList, SecretKey: Secret(secretKey)}
|
g := &Guard{whiteList: whiteList, SecretKey: Secret(secretKey)}
|
||||||
g.isActive = len(g.ipWhiteList) != 0 || len(g.SecretKey) != 0
|
g.isActive = len(g.whiteList) != 0 || len(g.SecretKey) != 0
|
||||||
return g
|
return g
|
||||||
}
|
}
|
||||||
func (g *Guard) WhiteList2(f func(w http.ResponseWriter, r *http.Request, b bool)) func(w http.ResponseWriter, r *http.Request, b bool) {
|
|
||||||
if !g.isActive {
|
|
||||||
//if no security needed, just skip all checkings
|
|
||||||
return f
|
|
||||||
}
|
|
||||||
return func(w http.ResponseWriter, r *http.Request, b bool) {
|
|
||||||
if err := g.checkWhiteList(w, r); err != nil {
|
|
||||||
w.WriteHeader(http.StatusUnauthorized)
|
|
||||||
return
|
|
||||||
}
|
|
||||||
f(w, r, b)
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
func (g *Guard) WhiteList(f func(w http.ResponseWriter, r *http.Request)) func(w http.ResponseWriter, r *http.Request) {
|
func (g *Guard) WhiteList(f func(w http.ResponseWriter, r *http.Request)) func(w http.ResponseWriter, r *http.Request) {
|
||||||
if !g.isActive {
|
if !g.isActive {
|
||||||
@@ -110,14 +96,13 @@ func GetActualRemoteHost(r *http.Request) (host string, err error) {
|
|||||||
}
|
}
|
||||||
|
|
||||||
func (g *Guard) checkWhiteList(w http.ResponseWriter, r *http.Request) error {
|
func (g *Guard) checkWhiteList(w http.ResponseWriter, r *http.Request) error {
|
||||||
if len(g.ipWhiteList) == 0 {
|
if len(g.whiteList) == 0 {
|
||||||
glog.V(0).Info("No whitelist specified for operation")
|
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
host, err := GetActualRemoteHost(r)
|
host, err := GetActualRemoteHost(r)
|
||||||
if err == nil {
|
if err == nil {
|
||||||
for _, ip := range g.ipWhiteList {
|
for _, ip := range g.whiteList {
|
||||||
|
|
||||||
// If the whitelist entry contains a "/" it
|
// If the whitelist entry contains a "/" it
|
||||||
// is a CIDR range, and we should check the
|
// is a CIDR range, and we should check the
|
||||||
@@ -129,7 +114,6 @@ func (g *Guard) checkWhiteList(w http.ResponseWriter, r *http.Request) error {
|
|||||||
}
|
}
|
||||||
remote := net.ParseIP(host)
|
remote := net.ParseIP(host)
|
||||||
if cidrnet.Contains(remote) {
|
if cidrnet.Contains(remote) {
|
||||||
glog.V(0).Infof("Found %s in CIDR whitelist.", r.RemoteAddr)
|
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
@@ -138,28 +122,8 @@ func (g *Guard) checkWhiteList(w http.ResponseWriter, r *http.Request) error {
|
|||||||
// Otherwise we're looking for a literal match.
|
// Otherwise we're looking for a literal match.
|
||||||
//
|
//
|
||||||
if ip == host {
|
if ip == host {
|
||||||
glog.V(0).Infof("Found %s in whitelist.", r.RemoteAddr)
|
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
// ::1 is the same as 127.0.0.1 and localhost
|
|
||||||
if host == "::1" && (ip == "127.0.0.1" || ip == "localhost") {
|
|
||||||
glog.V(0).Infof("Found %s (localhost) in whitelist.", r.RemoteAddr)
|
|
||||||
return nil
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
// The root whitelist allows exceptions to the IP whitelist, but only by certain root paths in the request.
|
|
||||||
if len(g.rootWhiteList) > 0 {
|
|
||||||
pathParts := strings.Split(r.RequestURI, "/")
|
|
||||||
if len(pathParts) > 0 {
|
|
||||||
requestedRoot := pathParts[1]
|
|
||||||
for _, root := range g.rootWhiteList {
|
|
||||||
if root == requestedRoot {
|
|
||||||
glog.V(0).Infof("Found %s in root whitelist.", requestedRoot)
|
|
||||||
return nil
|
|
||||||
}
|
|
||||||
}
|
|
||||||
glog.V(0).Infof("Not in root whitelist: %s", requestedRoot)
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@@ -30,11 +30,6 @@ type FilerServer struct {
|
|||||||
filer filer.Filer
|
filer filer.Filer
|
||||||
maxMB int
|
maxMB int
|
||||||
masterNodes *storage.MasterNodes
|
masterNodes *storage.MasterNodes
|
||||||
get_guard *security.Guard
|
|
||||||
head_guard *security.Guard
|
|
||||||
delete_guard *security.Guard
|
|
||||||
put_guard *security.Guard
|
|
||||||
post_guard *security.Guard
|
|
||||||
}
|
}
|
||||||
|
|
||||||
func NewFilerServer(r *http.ServeMux, ip string, port int, master string, dir string, collection string,
|
func NewFilerServer(r *http.ServeMux, ip string, port int, master string, dir string, collection string,
|
||||||
@@ -43,9 +38,6 @@ func NewFilerServer(r *http.ServeMux, ip string, port int, master string, dir st
|
|||||||
secret string,
|
secret string,
|
||||||
cassandra_server string, cassandra_keyspace string,
|
cassandra_server string, cassandra_keyspace string,
|
||||||
redis_server string, redis_password string, redis_database int,
|
redis_server string, redis_password string, redis_database int,
|
||||||
get_ip_whitelist []string, head_ip_whitelist []string, delete_ip_whitelist []string, put_ip_whitelist []string, post_ip_whitelist []string,
|
|
||||||
get_root_whitelist []string, head_root_whitelist []string, delete_root_whitelist []string, put_root_whitelist []string, post_root_whitelist []string,
|
|
||||||
get_secure_key string, head_secure_key string, delete_secure_key string, put_secure_key string, post_secure_key string,
|
|
||||||
) (fs *FilerServer, err error) {
|
) (fs *FilerServer, err error) {
|
||||||
fs = &FilerServer{
|
fs = &FilerServer{
|
||||||
master: master,
|
master: master,
|
||||||
@@ -54,11 +46,6 @@ func NewFilerServer(r *http.ServeMux, ip string, port int, master string, dir st
|
|||||||
redirectOnRead: redirectOnRead,
|
redirectOnRead: redirectOnRead,
|
||||||
disableDirListing: disableDirListing,
|
disableDirListing: disableDirListing,
|
||||||
maxMB: maxMB,
|
maxMB: maxMB,
|
||||||
get_guard: security.NewGuard(get_ip_whitelist, get_root_whitelist, get_secure_key),
|
|
||||||
head_guard: security.NewGuard(head_ip_whitelist, head_root_whitelist, head_secure_key),
|
|
||||||
delete_guard: security.NewGuard(delete_ip_whitelist, delete_root_whitelist, delete_secure_key),
|
|
||||||
put_guard: security.NewGuard(put_ip_whitelist, put_root_whitelist, put_secure_key),
|
|
||||||
post_guard: security.NewGuard(post_ip_whitelist, post_root_whitelist, post_secure_key),
|
|
||||||
port: ip + ":" + strconv.Itoa(port),
|
port: ip + ":" + strconv.Itoa(port),
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@@ -7,14 +7,14 @@ import (
|
|||||||
func (fs *FilerServer) filerHandler(w http.ResponseWriter, r *http.Request) {
|
func (fs *FilerServer) filerHandler(w http.ResponseWriter, r *http.Request) {
|
||||||
switch r.Method {
|
switch r.Method {
|
||||||
case "GET":
|
case "GET":
|
||||||
fs.get_guard.WhiteList2(fs.GetOrHeadHandler)(w, r, true)
|
fs.GetOrHeadHandler(w, r, true)
|
||||||
case "HEAD":
|
case "HEAD":
|
||||||
fs.head_guard.WhiteList2(fs.GetOrHeadHandler)(w, r, false)
|
fs.GetOrHeadHandler(w, r, false)
|
||||||
case "DELETE":
|
case "DELETE":
|
||||||
fs.delete_guard.WhiteList(fs.DeleteHandler)(w, r)
|
fs.DeleteHandler(w, r)
|
||||||
case "PUT":
|
case "PUT":
|
||||||
fs.put_guard.WhiteList(fs.PostHandler)(w, r)
|
fs.PostHandler(w, r)
|
||||||
case "POST":
|
case "POST":
|
||||||
fs.post_guard.WhiteList(fs.PostHandler)(w, r)
|
fs.PostHandler(w, r)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
@@ -23,8 +23,7 @@ type MasterServer struct {
|
|||||||
pulseSeconds int
|
pulseSeconds int
|
||||||
defaultReplicaPlacement string
|
defaultReplicaPlacement string
|
||||||
garbageThreshold string
|
garbageThreshold string
|
||||||
read_guard *security.Guard
|
guard *security.Guard
|
||||||
write_guard *security.Guard
|
|
||||||
|
|
||||||
Topo *topology.Topology
|
Topo *topology.Topology
|
||||||
vg *topology.VolumeGrowth
|
vg *topology.VolumeGrowth
|
||||||
@@ -39,9 +38,7 @@ func NewMasterServer(r *mux.Router, port int, metaFolder string,
|
|||||||
confFile string,
|
confFile string,
|
||||||
defaultReplicaPlacement string,
|
defaultReplicaPlacement string,
|
||||||
garbageThreshold string,
|
garbageThreshold string,
|
||||||
ipReadWhiteList []string,
|
whiteList []string,
|
||||||
ipWriteWhiteList []string,
|
|
||||||
rootWhiteList []string,
|
|
||||||
secureKey string,
|
secureKey string,
|
||||||
) *MasterServer {
|
) *MasterServer {
|
||||||
ms := &MasterServer{
|
ms := &MasterServer{
|
||||||
@@ -61,25 +58,24 @@ func NewMasterServer(r *mux.Router, port int, metaFolder string,
|
|||||||
ms.vg = topology.NewDefaultVolumeGrowth()
|
ms.vg = topology.NewDefaultVolumeGrowth()
|
||||||
glog.V(0).Infoln("Volume Size Limit is", volumeSizeLimitMB, "MB")
|
glog.V(0).Infoln("Volume Size Limit is", volumeSizeLimitMB, "MB")
|
||||||
|
|
||||||
ms.read_guard = security.NewGuard(ipReadWhiteList, rootWhiteList, secureKey)
|
ms.guard = security.NewGuard(whiteList, secureKey)
|
||||||
ms.write_guard = security.NewGuard(ipWriteWhiteList, rootWhiteList, secureKey)
|
|
||||||
|
|
||||||
r.HandleFunc("/", ms.uiStatusHandler)
|
r.HandleFunc("/", ms.uiStatusHandler)
|
||||||
r.HandleFunc("/ui/index.html", ms.read_guard.WhiteList(ms.uiStatusHandler))
|
r.HandleFunc("/ui/index.html", ms.uiStatusHandler)
|
||||||
r.HandleFunc("/dir/assign", ms.proxyToLeader(ms.write_guard.WhiteList(ms.dirAssignHandler)))
|
r.HandleFunc("/dir/assign", ms.proxyToLeader(ms.guard.WhiteList(ms.dirAssignHandler)))
|
||||||
r.HandleFunc("/dir/lookup", ms.proxyToLeader(ms.read_guard.WhiteList(ms.dirLookupHandler)))
|
r.HandleFunc("/dir/lookup", ms.proxyToLeader(ms.guard.WhiteList(ms.dirLookupHandler)))
|
||||||
r.HandleFunc("/dir/join", ms.proxyToLeader(ms.write_guard.WhiteList(ms.dirJoinHandler)))
|
r.HandleFunc("/dir/join", ms.proxyToLeader(ms.guard.WhiteList(ms.dirJoinHandler)))
|
||||||
r.HandleFunc("/dir/status", ms.proxyToLeader(ms.read_guard.WhiteList(ms.dirStatusHandler)))
|
r.HandleFunc("/dir/status", ms.proxyToLeader(ms.guard.WhiteList(ms.dirStatusHandler)))
|
||||||
r.HandleFunc("/col/delete", ms.proxyToLeader(ms.write_guard.WhiteList(ms.collectionDeleteHandler)))
|
r.HandleFunc("/col/delete", ms.proxyToLeader(ms.guard.WhiteList(ms.collectionDeleteHandler)))
|
||||||
r.HandleFunc("/vol/lookup", ms.proxyToLeader(ms.read_guard.WhiteList(ms.volumeLookupHandler)))
|
r.HandleFunc("/vol/lookup", ms.proxyToLeader(ms.guard.WhiteList(ms.volumeLookupHandler)))
|
||||||
r.HandleFunc("/vol/grow", ms.proxyToLeader(ms.write_guard.WhiteList(ms.volumeGrowHandler)))
|
r.HandleFunc("/vol/grow", ms.proxyToLeader(ms.guard.WhiteList(ms.volumeGrowHandler)))
|
||||||
r.HandleFunc("/vol/status", ms.proxyToLeader(ms.read_guard.WhiteList(ms.volumeStatusHandler)))
|
r.HandleFunc("/vol/status", ms.proxyToLeader(ms.guard.WhiteList(ms.volumeStatusHandler)))
|
||||||
r.HandleFunc("/vol/vacuum", ms.proxyToLeader(ms.write_guard.WhiteList(ms.volumeVacuumHandler)))
|
r.HandleFunc("/vol/vacuum", ms.proxyToLeader(ms.guard.WhiteList(ms.volumeVacuumHandler)))
|
||||||
r.HandleFunc("/submit", ms.write_guard.WhiteList(ms.submitFromMasterServerHandler))
|
r.HandleFunc("/submit", ms.guard.WhiteList(ms.submitFromMasterServerHandler))
|
||||||
r.HandleFunc("/delete", ms.write_guard.WhiteList(ms.deleteFromMasterServerHandler))
|
r.HandleFunc("/delete", ms.guard.WhiteList(ms.deleteFromMasterServerHandler))
|
||||||
r.HandleFunc("/{fileId}", ms.proxyToLeader(ms.read_guard.WhiteList(ms.redirectHandler)))
|
r.HandleFunc("/{fileId}", ms.proxyToLeader(ms.redirectHandler))
|
||||||
r.HandleFunc("/stats/counter", ms.read_guard.WhiteList(statsCounterHandler))
|
r.HandleFunc("/stats/counter", ms.guard.WhiteList(statsCounterHandler))
|
||||||
r.HandleFunc("/stats/memory", ms.read_guard.WhiteList(statsMemoryHandler))
|
r.HandleFunc("/stats/memory", ms.guard.WhiteList(statsMemoryHandler))
|
||||||
|
|
||||||
ms.Topo.StartRefreshWritableVolumes(garbageThreshold)
|
ms.Topo.StartRefreshWritableVolumes(garbageThreshold)
|
||||||
|
|
||||||
|
@@ -61,7 +61,7 @@ func (ms *MasterServer) dirJoinHandler(w http.ResponseWriter, r *http.Request) {
|
|||||||
ms.Topo.ProcessJoinMessage(joinMessage)
|
ms.Topo.ProcessJoinMessage(joinMessage)
|
||||||
writeJsonQuiet(w, r, http.StatusOK, operation.JoinResult{
|
writeJsonQuiet(w, r, http.StatusOK, operation.JoinResult{
|
||||||
VolumeSizeLimit: uint64(ms.volumeSizeLimitMB) * 1024 * 1024,
|
VolumeSizeLimit: uint64(ms.volumeSizeLimitMB) * 1024 * 1024,
|
||||||
SecretKey: string(ms.write_guard.SecretKey),
|
SecretKey: string(ms.guard.SecretKey),
|
||||||
})
|
})
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@@ -9,7 +9,6 @@ import (
|
|||||||
"github.com/chrislusf/seaweedfs/weed/glog"
|
"github.com/chrislusf/seaweedfs/weed/glog"
|
||||||
"github.com/chrislusf/seaweedfs/weed/security"
|
"github.com/chrislusf/seaweedfs/weed/security"
|
||||||
"github.com/chrislusf/seaweedfs/weed/storage"
|
"github.com/chrislusf/seaweedfs/weed/storage"
|
||||||
//"net/http/pprof"
|
|
||||||
)
|
)
|
||||||
|
|
||||||
type VolumeServer struct {
|
type VolumeServer struct {
|
||||||
@@ -19,8 +18,7 @@ type VolumeServer struct {
|
|||||||
dataCenter string
|
dataCenter string
|
||||||
rack string
|
rack string
|
||||||
store *storage.Store
|
store *storage.Store
|
||||||
read_guard *security.Guard
|
guard *security.Guard
|
||||||
write_guard *security.Guard
|
|
||||||
|
|
||||||
needleMapKind storage.NeedleMapType
|
needleMapKind storage.NeedleMapType
|
||||||
FixJpgOrientation bool
|
FixJpgOrientation bool
|
||||||
@@ -33,9 +31,7 @@ func NewVolumeServer(adminMux, publicMux *http.ServeMux, ip string,
|
|||||||
needleMapKind storage.NeedleMapType,
|
needleMapKind storage.NeedleMapType,
|
||||||
masterNode string, pulseSeconds int,
|
masterNode string, pulseSeconds int,
|
||||||
dataCenter string, rack string,
|
dataCenter string, rack string,
|
||||||
ipReadWhiteList []string,
|
whiteList []string,
|
||||||
ipWriteWhiteList []string,
|
|
||||||
rootWhiteList []string,
|
|
||||||
fixJpgOrientation bool,
|
fixJpgOrientation bool,
|
||||||
readRedirect bool) *VolumeServer {
|
readRedirect bool) *VolumeServer {
|
||||||
vs := &VolumeServer{
|
vs := &VolumeServer{
|
||||||
@@ -49,40 +45,28 @@ func NewVolumeServer(adminMux, publicMux *http.ServeMux, ip string,
|
|||||||
vs.SetMasterNode(masterNode)
|
vs.SetMasterNode(masterNode)
|
||||||
vs.store = storage.NewStore(port, ip, publicUrl, folders, maxCounts, vs.needleMapKind)
|
vs.store = storage.NewStore(port, ip, publicUrl, folders, maxCounts, vs.needleMapKind)
|
||||||
|
|
||||||
vs.read_guard = security.NewGuard(ipReadWhiteList, rootWhiteList, "")
|
vs.guard = security.NewGuard(whiteList, "")
|
||||||
vs.write_guard = security.NewGuard(ipWriteWhiteList, rootWhiteList, "")
|
|
||||||
|
|
||||||
adminMux.HandleFunc("/ui/index.html", vs.read_guard.WhiteList(vs.uiStatusHandler))
|
adminMux.HandleFunc("/ui/index.html", vs.uiStatusHandler)
|
||||||
adminMux.HandleFunc("/status", vs.read_guard.WhiteList(vs.statusHandler))
|
adminMux.HandleFunc("/status", vs.guard.WhiteList(vs.statusHandler))
|
||||||
adminMux.HandleFunc("/admin/assign_volume", vs.write_guard.WhiteList(vs.assignVolumeHandler))
|
adminMux.HandleFunc("/admin/assign_volume", vs.guard.WhiteList(vs.assignVolumeHandler))
|
||||||
adminMux.HandleFunc("/admin/vacuum/check", vs.write_guard.WhiteList(vs.vacuumVolumeCheckHandler))
|
adminMux.HandleFunc("/admin/vacuum/check", vs.guard.WhiteList(vs.vacuumVolumeCheckHandler))
|
||||||
adminMux.HandleFunc("/admin/vacuum/compact", vs.write_guard.WhiteList(vs.vacuumVolumeCompactHandler))
|
adminMux.HandleFunc("/admin/vacuum/compact", vs.guard.WhiteList(vs.vacuumVolumeCompactHandler))
|
||||||
adminMux.HandleFunc("/admin/vacuum/commit", vs.write_guard.WhiteList(vs.vacuumVolumeCommitHandler))
|
adminMux.HandleFunc("/admin/vacuum/commit", vs.guard.WhiteList(vs.vacuumVolumeCommitHandler))
|
||||||
adminMux.HandleFunc("/admin/delete_collection", vs.write_guard.WhiteList(vs.deleteCollectionHandler))
|
adminMux.HandleFunc("/admin/delete_collection", vs.guard.WhiteList(vs.deleteCollectionHandler))
|
||||||
adminMux.HandleFunc("/admin/sync/status", vs.read_guard.WhiteList(vs.getVolumeSyncStatusHandler))
|
adminMux.HandleFunc("/admin/sync/status", vs.guard.WhiteList(vs.getVolumeSyncStatusHandler))
|
||||||
adminMux.HandleFunc("/admin/sync/index", vs.write_guard.WhiteList(vs.getVolumeIndexContentHandler))
|
adminMux.HandleFunc("/admin/sync/index", vs.guard.WhiteList(vs.getVolumeIndexContentHandler))
|
||||||
adminMux.HandleFunc("/admin/sync/data", vs.write_guard.WhiteList(vs.getVolumeDataContentHandler))
|
adminMux.HandleFunc("/admin/sync/data", vs.guard.WhiteList(vs.getVolumeDataContentHandler))
|
||||||
adminMux.HandleFunc("/stats/counter", vs.read_guard.WhiteList(statsCounterHandler))
|
adminMux.HandleFunc("/stats/counter", vs.guard.WhiteList(statsCounterHandler))
|
||||||
adminMux.HandleFunc("/stats/memory", vs.read_guard.WhiteList(statsMemoryHandler))
|
adminMux.HandleFunc("/stats/memory", vs.guard.WhiteList(statsMemoryHandler))
|
||||||
adminMux.HandleFunc("/stats/disk", vs.read_guard.WhiteList(vs.statsDiskHandler))
|
adminMux.HandleFunc("/stats/disk", vs.guard.WhiteList(vs.statsDiskHandler))
|
||||||
adminMux.HandleFunc("/delete", vs.write_guard.WhiteList(vs.batchDeleteHandler))
|
adminMux.HandleFunc("/delete", vs.guard.WhiteList(vs.batchDeleteHandler))
|
||||||
adminMux.HandleFunc("/", vs.read_guard.WhiteList(vs.privateStoreHandler))
|
adminMux.HandleFunc("/", vs.privateStoreHandler)
|
||||||
if publicMux != adminMux {
|
if publicMux != adminMux {
|
||||||
// separated admin and public port
|
// separated admin and public port
|
||||||
publicMux.HandleFunc("/favicon.ico", vs.faviconHandler)
|
publicMux.HandleFunc("/favicon.ico", vs.faviconHandler)
|
||||||
publicMux.HandleFunc("/", vs.publicReadOnlyHandler)
|
publicMux.HandleFunc("/", vs.publicReadOnlyHandler)
|
||||||
}
|
}
|
||||||
/*
|
|
||||||
// add in profiling support
|
|
||||||
adminMux.HandleFunc("/debug/pprof/", pprof.Index)
|
|
||||||
adminMux.HandleFunc("/debug/pprof/cmdline", pprof.Cmdline)
|
|
||||||
adminMux.HandleFunc("/debug/pprof/profile", pprof.Profile)
|
|
||||||
adminMux.HandleFunc("/debug/pprof/symbol", pprof.Symbol)
|
|
||||||
adminMux.Handle("/debug/pprof/goroutine", pprof.Handler("goroutine"))
|
|
||||||
adminMux.Handle("/debug/pprof/heap", pprof.Handler("heap"))
|
|
||||||
adminMux.Handle("/debug/pprof/threadcreate", pprof.Handler("threadcreate"))
|
|
||||||
adminMux.Handle("/debug/pprof/block", pprof.Handler("block"))
|
|
||||||
*/
|
|
||||||
|
|
||||||
go func() {
|
go func() {
|
||||||
connected := true
|
connected := true
|
||||||
@@ -98,8 +82,7 @@ func NewVolumeServer(adminMux, publicMux *http.ServeMux, ip string,
|
|||||||
if !connected {
|
if !connected {
|
||||||
connected = true
|
connected = true
|
||||||
vs.SetMasterNode(master)
|
vs.SetMasterNode(master)
|
||||||
vs.read_guard.SecretKey = secretKey
|
vs.guard.SecretKey = secretKey
|
||||||
vs.write_guard.SecretKey = secretKey
|
|
||||||
glog.V(0).Infoln("Volume Server Connected with master at", master)
|
glog.V(0).Infoln("Volume Server Connected with master at", master)
|
||||||
}
|
}
|
||||||
} else {
|
} else {
|
||||||
@@ -138,5 +121,5 @@ func (vs *VolumeServer) Shutdown() {
|
|||||||
}
|
}
|
||||||
|
|
||||||
func (vs *VolumeServer) jwt(fileId string) security.EncodedJwt {
|
func (vs *VolumeServer) jwt(fileId string) security.EncodedJwt {
|
||||||
return security.GenJwt(vs.read_guard.SecretKey, fileId)
|
return security.GenJwt(vs.guard.SecretKey, fileId)
|
||||||
}
|
}
|
||||||
|
@@ -25,19 +25,19 @@ func (vs *VolumeServer) privateStoreHandler(w http.ResponseWriter, r *http.Reque
|
|||||||
switch r.Method {
|
switch r.Method {
|
||||||
case "GET":
|
case "GET":
|
||||||
stats.ReadRequest()
|
stats.ReadRequest()
|
||||||
vs.write_guard.WhiteList(vs.GetOrHeadHandler)(w, r)
|
vs.GetOrHeadHandler(w, r)
|
||||||
case "HEAD":
|
case "HEAD":
|
||||||
stats.ReadRequest()
|
stats.ReadRequest()
|
||||||
vs.write_guard.WhiteList(vs.GetOrHeadHandler)(w, r)
|
vs.GetOrHeadHandler(w, r)
|
||||||
case "DELETE":
|
case "DELETE":
|
||||||
stats.DeleteRequest()
|
stats.DeleteRequest()
|
||||||
vs.write_guard.WhiteList(vs.DeleteHandler)(w, r)
|
vs.guard.WhiteList(vs.DeleteHandler)(w, r)
|
||||||
case "PUT":
|
case "PUT":
|
||||||
stats.WriteRequest()
|
stats.WriteRequest()
|
||||||
vs.write_guard.WhiteList(vs.PostHandler)(w, r)
|
vs.guard.WhiteList(vs.PostHandler)(w, r)
|
||||||
case "POST":
|
case "POST":
|
||||||
stats.WriteRequest()
|
stats.WriteRequest()
|
||||||
vs.write_guard.WhiteList(vs.PostHandler)(w, r)
|
vs.guard.WhiteList(vs.PostHandler)(w, r)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
Reference in New Issue
Block a user