handler.go 12 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476
  1. package raid
  2. import (
  3. "encoding/json"
  4. "log"
  5. "net/http"
  6. "path/filepath"
  7. "strconv"
  8. "strings"
  9. "time"
  10. "imuslab.com/arozos/mod/disk/diskfs"
  11. "imuslab.com/arozos/mod/utils"
  12. )
  13. /*
  14. Handler.go
  15. This module handle api call to the raid module
  16. */
  17. func (m *Manager) HandleRemoveDiskFromRAIDVol(w http.ResponseWriter, r *http.Request) {
  18. //mdadm --remove /dev/md0 /dev/sdb1
  19. mdDev, err := utils.PostPara(r, "raidDev")
  20. if err != nil {
  21. utils.SendErrorResponse(w, "invalid raid device given")
  22. return
  23. }
  24. sdXDev, err := utils.PostPara(r, "memDev")
  25. if err != nil {
  26. utils.SendErrorResponse(w, "invalid member device given")
  27. return
  28. }
  29. //Check if target array exists
  30. if !m.RAIDDeviceExists(mdDev) {
  31. utils.SendErrorResponse(w, "target RAID array not exists")
  32. return
  33. }
  34. //Check if this is the only disk in the array
  35. if !m.IsSafeToRemove(mdDev, sdXDev) {
  36. utils.SendErrorResponse(w, "removal of this device will cause data loss")
  37. return
  38. }
  39. //Check if the disk is already failed
  40. diskAlreadyFailed, err := m.DiskIsFailed(mdDev, sdXDev)
  41. if err != nil {
  42. log.Println("[RAID] Unable to validate if disk failed: " + err.Error())
  43. utils.SendErrorResponse(w, err.Error())
  44. return
  45. }
  46. //Disk not failed. Mark it as failed
  47. if !diskAlreadyFailed {
  48. err = m.FailDisk(mdDev, sdXDev)
  49. if err != nil {
  50. utils.SendErrorResponse(w, err.Error())
  51. return
  52. }
  53. }
  54. //Add some delay for OS level to handle IO closing
  55. time.Sleep(300 * time.Millisecond)
  56. //Done. Remove the device from array
  57. err = m.RemoveDisk(mdDev, sdXDev)
  58. if err != nil {
  59. utils.SendErrorResponse(w, err.Error())
  60. return
  61. }
  62. log.Println("[RAID] Memeber disk " + sdXDev + " removed from RAID volume " + mdDev)
  63. utils.SendOK(w)
  64. }
  65. func (m *Manager) HandleAddDiskToRAIDVol(w http.ResponseWriter, r *http.Request) {
  66. //mdadm --add /dev/md0 /dev/sdb1
  67. mdDev, err := utils.PostPara(r, "raidDev")
  68. if err != nil {
  69. utils.SendErrorResponse(w, "invalid raid device given")
  70. return
  71. }
  72. sdXDev, err := utils.PostPara(r, "memDev")
  73. if err != nil {
  74. utils.SendErrorResponse(w, "invalid member device given")
  75. return
  76. }
  77. //Check if target array exists
  78. if !m.RAIDDeviceExists(mdDev) {
  79. utils.SendErrorResponse(w, "target RAID array not exists")
  80. return
  81. }
  82. //Check if disk already in another RAID array or mounted
  83. isMounted, err := diskfs.DeviceIsMounted(sdXDev)
  84. if err != nil {
  85. utils.SendErrorResponse(w, "unable to read device state")
  86. return
  87. }
  88. if isMounted {
  89. utils.SendErrorResponse(w, "target device is mounted")
  90. return
  91. }
  92. diskUsedByAnotherRAID, err := m.DiskIsUsedInAnotherRAIDVol(sdXDev)
  93. if err != nil {
  94. utils.SendErrorResponse(w, err.Error())
  95. }
  96. if diskUsedByAnotherRAID {
  97. utils.SendErrorResponse(w, "target device already been used by another RAID volume")
  98. return
  99. }
  100. //OK! Add it to the target RAID array
  101. err = m.AddDisk(mdDev, sdXDev)
  102. if err != nil {
  103. utils.SendErrorResponse(w, "adding disk to RAID volume failed")
  104. return
  105. }
  106. log.Println("[RAID] Device " + sdXDev + " added to RAID volume " + mdDev)
  107. utils.SendOK(w)
  108. }
  109. // Handle force flush reloading mdadm to solve the md0 become md127 problem
  110. func (m *Manager) HandleMdadmFlushReload(w http.ResponseWriter, r *http.Request) {
  111. err := m.FlushReload()
  112. if err != nil {
  113. utils.SendErrorResponse(w, "reload failed: "+strings.ReplaceAll(err.Error(), "\n", " "))
  114. return
  115. }
  116. utils.SendOK(w)
  117. }
  118. // Handle resolving the disk model label, might return null
  119. func (m *Manager) HandleResolveDiskModelLabel(w http.ResponseWriter, r *http.Request) {
  120. devName, err := utils.GetPara(r, "devName")
  121. if err != nil {
  122. utils.SendErrorResponse(w, "invalid device name given")
  123. return
  124. }
  125. //Function only accept sdX not /dev/sdX
  126. devName = filepath.Base(devName)
  127. labelSize, labelModel, err := diskfs.GetDiskModelByName(devName)
  128. if err != nil {
  129. utils.SendErrorResponse(w, err.Error())
  130. return
  131. }
  132. js, _ := json.Marshal([]string{labelModel, labelSize})
  133. utils.SendJSONResponse(w, string(js))
  134. }
  135. // Handle force flush reloading mdadm to solve the md0 become md127 problem
  136. func (m *Manager) HandlListChildrenDeviceInfo(w http.ResponseWriter, r *http.Request) {
  137. devName, err := utils.GetPara(r, "devName")
  138. if err != nil {
  139. utils.SendErrorResponse(w, "invalid device name given")
  140. return
  141. }
  142. if !strings.HasPrefix(devName, "/dev/") {
  143. devName = "/dev/" + devName
  144. }
  145. //Get the children devices for this RAID
  146. raidDevice, err := m.GetRAIDDeviceByDevicePath(devName)
  147. if err != nil {
  148. utils.SendErrorResponse(w, err.Error())
  149. return
  150. }
  151. //Merge the child devices info into one array
  152. results := map[string]*diskfs.BlockDeviceMeta{}
  153. for _, blockdevice := range raidDevice.Members {
  154. bdm, err := diskfs.GetBlockDeviceMeta("/dev/" + blockdevice.Name)
  155. if err != nil {
  156. log.Println("[RAID] Unable to load block device info: " + err.Error())
  157. results[blockdevice.Name] = &diskfs.BlockDeviceMeta{
  158. Name: blockdevice.Name,
  159. Size: -1,
  160. }
  161. continue
  162. }
  163. results[blockdevice.Name] = bdm
  164. }
  165. js, _ := json.Marshal(results)
  166. utils.SendJSONResponse(w, string(js))
  167. }
  168. // Handle list all the disks that is usable
  169. func (m *Manager) HandleListUsableDevices(w http.ResponseWriter, r *http.Request) {
  170. storageDevices, err := diskfs.ListAllStorageDevices()
  171. if err != nil {
  172. utils.SendErrorResponse(w, err.Error())
  173. return
  174. }
  175. //Filter out the block devices that are disks
  176. usableDisks := []diskfs.BlockDeviceMeta{}
  177. for _, device := range storageDevices.Blockdevices {
  178. if device.Type == "disk" {
  179. usableDisks = append(usableDisks, device)
  180. }
  181. }
  182. js, _ := json.Marshal(usableDisks)
  183. utils.SendJSONResponse(w, string(js))
  184. }
  185. // Handle loading the detail of a given RAID array
  186. func (m *Manager) HandleLoadArrayDetail(w http.ResponseWriter, r *http.Request) {
  187. devName, err := utils.GetPara(r, "devName")
  188. if err != nil {
  189. utils.SendErrorResponse(w, "invalid device name given")
  190. return
  191. }
  192. if !strings.HasPrefix(devName, "/dev/") {
  193. devName = "/dev/" + devName
  194. }
  195. //Check device exists
  196. if !utils.FileExists(devName) {
  197. utils.SendErrorResponse(w, "target device not exists")
  198. return
  199. }
  200. //Get status of the array
  201. targetRAIDInfo, err := m.GetRAIDInfo(devName)
  202. if err != nil {
  203. utils.SendErrorResponse(w, err.Error())
  204. return
  205. }
  206. js, _ := json.Marshal(targetRAIDInfo)
  207. utils.SendJSONResponse(w, string(js))
  208. }
  209. // Handle formating a device
  210. func (m *Manager) HandleFormatRaidDevice(w http.ResponseWriter, r *http.Request) {
  211. devName, err := utils.GetPara(r, "devName")
  212. if err != nil {
  213. utils.SendErrorResponse(w, "invalid device name given")
  214. return
  215. }
  216. format, err := utils.GetPara(r, "format")
  217. if err != nil {
  218. utils.SendErrorResponse(w, "invalid device name given")
  219. return
  220. }
  221. if !strings.HasPrefix(devName, "/dev/") {
  222. devName = "/dev/" + devName
  223. }
  224. //Check if the target device exists
  225. if !m.RAIDDeviceExists(devName) {
  226. utils.SendErrorResponse(w, "target not exists or not a valid RAID device")
  227. return
  228. }
  229. //Format the drive
  230. err = diskfs.FormatStorageDevice(format, devName)
  231. if err != nil {
  232. utils.SendErrorResponse(w, err.Error())
  233. return
  234. }
  235. utils.SendOK(w)
  236. }
  237. // List all the raid device in this system
  238. func (m *Manager) HandleListRaidDevices(w http.ResponseWriter, r *http.Request) {
  239. rdevs, err := m.GetRAIDDevicesFromProcMDStat()
  240. if err != nil {
  241. utils.SendErrorResponse(w, err.Error())
  242. return
  243. }
  244. results := []*RAIDInfo{}
  245. for _, rdev := range rdevs {
  246. arrayInfo, err := m.GetRAIDInfo("/dev/" + rdev.Name)
  247. if err != nil {
  248. continue
  249. }
  250. results = append(results, arrayInfo)
  251. }
  252. js, _ := json.Marshal(results)
  253. utils.SendJSONResponse(w, string(js))
  254. }
  255. // Create a RAID storage pool
  256. func (m *Manager) HandleCreateRAIDDevice(w http.ResponseWriter, r *http.Request) {
  257. //TODO: Change GetPara to Post
  258. devName, err := utils.GetPara(r, "devName")
  259. if err != nil || devName == "" {
  260. //Use auto generated one
  261. devName, err = GetNextAvailableMDDevice()
  262. if err != nil {
  263. utils.SendErrorResponse(w, err.Error())
  264. return
  265. }
  266. }
  267. raidName, err := utils.GetPara(r, "raidName")
  268. if err != nil {
  269. utils.SendErrorResponse(w, "invalid raid storage name given")
  270. return
  271. }
  272. raidLevelStr, err := utils.GetPara(r, "level")
  273. if err != nil {
  274. utils.SendErrorResponse(w, "invalid raid level given")
  275. return
  276. }
  277. raidDevicesJSON, err := utils.GetPara(r, "raidDev")
  278. if err != nil {
  279. utils.SendErrorResponse(w, "invalid raid device array given")
  280. return
  281. }
  282. spareDevicesJSON, err := utils.GetPara(r, "spareDev")
  283. if err != nil {
  284. utils.SendErrorResponse(w, "invalid spare device array given")
  285. return
  286. }
  287. //Convert raidDevices and spareDevices ID into string slice
  288. raidDevices := []string{}
  289. spareDevices := []string{}
  290. err = json.Unmarshal([]byte(raidDevicesJSON), &raidDevices)
  291. if err != nil {
  292. utils.SendErrorResponse(w, "unable to parse raid device into array")
  293. return
  294. }
  295. err = json.Unmarshal([]byte(spareDevicesJSON), &spareDevices)
  296. if err != nil {
  297. utils.SendErrorResponse(w, "unable to parse spare devices into array")
  298. return
  299. }
  300. //Make sure RAID Name do not contain spaces or werid charcters
  301. if strings.Contains(raidName, " ") {
  302. utils.SendErrorResponse(w, "raid name cannot contain space")
  303. return
  304. }
  305. //Convert raidLevel to int
  306. raidLevel, err := strconv.Atoi(raidLevelStr)
  307. if err != nil {
  308. utils.SendErrorResponse(w, "invalid raid level given")
  309. return
  310. }
  311. //Create the RAID device
  312. err = m.CreateRAIDDevice(devName, raidName, raidLevel, raidDevices, spareDevices)
  313. if err != nil {
  314. utils.SendErrorResponse(w, err.Error())
  315. return
  316. }
  317. //Update the mdadm config
  318. err = m.UpdateMDADMConfig()
  319. if err != nil {
  320. utils.SendErrorResponse(w, err.Error())
  321. return
  322. }
  323. utils.SendOK(w)
  324. }
  325. // Request to reload the RAID manager and scan new / fix missing raid pools
  326. func (m *Manager) HandleRaidDevicesAssemble(w http.ResponseWriter, r *http.Request) {
  327. err := m.RestartRAIDService()
  328. if err != nil {
  329. utils.SendErrorResponse(w, err.Error())
  330. return
  331. }
  332. utils.SendOK(w)
  333. }
  334. // Remove a given raid device with its name, USE WITH CAUTION
  335. func (m *Manager) HandleRemoveRaideDevice(w http.ResponseWriter, r *http.Request) {
  336. //TODO: Add protection and switch to POST
  337. targetDevice, err := utils.GetPara(r, "dev")
  338. if err != nil {
  339. utils.SendErrorResponse(w, "target device not given")
  340. return
  341. }
  342. //Check if the raid device exists
  343. if !m.RAIDDeviceExists(targetDevice) {
  344. utils.SendErrorResponse(w, "target device not exists")
  345. return
  346. }
  347. //Get the RAID device memeber disks
  348. targetRAIDDevice, err := m.GetRAIDDeviceByDevicePath(targetDevice)
  349. if err != nil {
  350. utils.SendErrorResponse(w, "error occured when trying to load target RAID device info")
  351. return
  352. }
  353. //Check if it is mounted. If yes, unmount it
  354. if !strings.HasPrefix("/dev/", targetDevice) {
  355. targetDevice = filepath.Join("/dev/", targetDevice)
  356. }
  357. mounted, err := diskfs.DeviceIsMounted(targetDevice)
  358. if err != nil {
  359. log.Println("[RAID] Unmount failed: " + err.Error())
  360. utils.SendErrorResponse(w, err.Error())
  361. return
  362. }
  363. if mounted {
  364. err = diskfs.UnmountDevice(targetDevice)
  365. if err != nil {
  366. log.Println("[RAID] Unmount failed: " + err.Error())
  367. utils.SendErrorResponse(w, err.Error())
  368. return
  369. }
  370. }
  371. //Stop & Remove RAID service on the target device
  372. err = m.StopRAIDDevice(targetDevice)
  373. if err != nil {
  374. log.Println("[RAID] Stop RAID partition failed: " + err.Error())
  375. utils.SendErrorResponse(w, err.Error())
  376. return
  377. }
  378. //Zeroblock the RAID device member disks
  379. for _, memberDisk := range targetRAIDDevice.Members {
  380. //Member disk name do not contain full path
  381. name := memberDisk.Name
  382. if !strings.HasPrefix(name, "/dev/") {
  383. name = filepath.Join("/dev/", name)
  384. }
  385. err = m.ClearSuperblock(name)
  386. if err != nil {
  387. log.Println("[RAID] Unable to clear superblock on device " + name)
  388. continue
  389. }
  390. }
  391. //Update the mdadm config
  392. //TODO: Validate this actually works
  393. err = m.UpdateMDADMConfig()
  394. if err != nil {
  395. utils.SendErrorResponse(w, err.Error())
  396. return
  397. }
  398. //Done
  399. utils.SendOK(w)
  400. }