handler.go 11 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421
  1. package raid
  2. import (
  3. "encoding/json"
  4. "log"
  5. "net/http"
  6. "path/filepath"
  7. "strconv"
  8. "strings"
  9. "time"
  10. "imuslab.com/arozos/mod/disk/diskfs"
  11. "imuslab.com/arozos/mod/utils"
  12. )
  13. /*
  14. Handler.go
  15. This module handle api call to the raid module
  16. */
  17. func (m *Manager) HandleRemoveDiskFromRAIDVol(w http.ResponseWriter, r *http.Request) {
  18. //mdadm --remove /dev/md0 /dev/sdb1
  19. mdDev, err := utils.PostPara(r, "raidDev")
  20. if err != nil {
  21. utils.SendErrorResponse(w, "invalid raid device given")
  22. return
  23. }
  24. sdXDev, err := utils.PostPara(r, "memDev")
  25. if err != nil {
  26. utils.SendErrorResponse(w, "invalid member device given")
  27. return
  28. }
  29. //Check if target array exists
  30. if !m.RAIDDeviceExists(mdDev) {
  31. utils.SendErrorResponse(w, "target RAID array not exists")
  32. return
  33. }
  34. //Check if the disk is already failed
  35. diskAlreadyFailed, err := m.DiskIsFailed(mdDev, sdXDev)
  36. if err != nil {
  37. log.Println("[RAID] Unable to validate if disk failed: " + err.Error())
  38. utils.SendErrorResponse(w, err.Error())
  39. return
  40. }
  41. //Disk not failed. Mark it as failed
  42. if !diskAlreadyFailed {
  43. err = m.FailDisk(mdDev, sdXDev)
  44. if err != nil {
  45. utils.SendErrorResponse(w, err.Error())
  46. return
  47. }
  48. }
  49. //Add some delay for OS level to handle IO closing
  50. time.Sleep(300 * time.Millisecond)
  51. //Done. Remove the device from array
  52. err = m.RemoveDisk(mdDev, sdXDev)
  53. if err != nil {
  54. utils.SendErrorResponse(w, err.Error())
  55. return
  56. }
  57. log.Println("[RAID] Memeber disk " + sdXDev + " removed from RAID volume " + mdDev)
  58. utils.SendOK(w)
  59. }
  60. func (m *Manager) HandleAddDiskToRAIDVol(w http.ResponseWriter, r *http.Request) {
  61. //mdadm --add /dev/md0 /dev/sdb1
  62. }
  63. // Handle force flush reloading mdadm to solve the md0 become md127 problem
  64. func (m *Manager) HandleMdadmFlushReload(w http.ResponseWriter, r *http.Request) {
  65. err := m.FlushReload()
  66. if err != nil {
  67. utils.SendErrorResponse(w, "reload failed: "+strings.ReplaceAll(err.Error(), "\n", " "))
  68. return
  69. }
  70. utils.SendOK(w)
  71. }
  72. // Handle resolving the disk model label, might return null
  73. func (m *Manager) HandleResolveDiskModelLabel(w http.ResponseWriter, r *http.Request) {
  74. devName, err := utils.GetPara(r, "devName")
  75. if err != nil {
  76. utils.SendErrorResponse(w, "invalid device name given")
  77. return
  78. }
  79. //Function only accept sdX not /dev/sdX
  80. devName = filepath.Base(devName)
  81. labelSize, labelModel, err := diskfs.GetDiskModelByName(devName)
  82. if err != nil {
  83. utils.SendErrorResponse(w, err.Error())
  84. return
  85. }
  86. js, _ := json.Marshal([]string{labelModel, labelSize})
  87. utils.SendJSONResponse(w, string(js))
  88. }
  89. // Handle force flush reloading mdadm to solve the md0 become md127 problem
  90. func (m *Manager) HandlListChildrenDeviceInfo(w http.ResponseWriter, r *http.Request) {
  91. devName, err := utils.GetPara(r, "devName")
  92. if err != nil {
  93. utils.SendErrorResponse(w, "invalid device name given")
  94. return
  95. }
  96. if !strings.HasPrefix(devName, "/dev/") {
  97. devName = "/dev/" + devName
  98. }
  99. //Get the children devices for this RAID
  100. raidDevice, err := m.GetRAIDDeviceByDevicePath(devName)
  101. if err != nil {
  102. utils.SendErrorResponse(w, err.Error())
  103. return
  104. }
  105. //Merge the child devices info into one array
  106. results := map[string]*diskfs.BlockDeviceMeta{}
  107. for _, blockdevice := range raidDevice.Members {
  108. bdm, err := diskfs.GetBlockDeviceMeta("/dev/" + blockdevice.Name)
  109. if err != nil {
  110. log.Println("[RAID] Unable to load block device info: " + err.Error())
  111. results[blockdevice.Name] = &diskfs.BlockDeviceMeta{
  112. Name: blockdevice.Name,
  113. Size: -1,
  114. }
  115. continue
  116. }
  117. results[blockdevice.Name] = bdm
  118. }
  119. js, _ := json.Marshal(results)
  120. utils.SendJSONResponse(w, string(js))
  121. }
  122. // Handle list all the disks that is usable
  123. func (m *Manager) HandleListUsableDevices(w http.ResponseWriter, r *http.Request) {
  124. storageDevices, err := diskfs.ListAllStorageDevices()
  125. if err != nil {
  126. utils.SendErrorResponse(w, err.Error())
  127. return
  128. }
  129. //Filter out the block devices that are disks
  130. usableDisks := []diskfs.BlockDeviceMeta{}
  131. for _, device := range storageDevices.Blockdevices {
  132. if device.Type == "disk" {
  133. usableDisks = append(usableDisks, device)
  134. }
  135. }
  136. js, _ := json.Marshal(usableDisks)
  137. utils.SendJSONResponse(w, string(js))
  138. }
  139. // Handle loading the detail of a given RAID array
  140. func (m *Manager) HandleLoadArrayDetail(w http.ResponseWriter, r *http.Request) {
  141. devName, err := utils.GetPara(r, "devName")
  142. if err != nil {
  143. utils.SendErrorResponse(w, "invalid device name given")
  144. return
  145. }
  146. if !strings.HasPrefix(devName, "/dev/") {
  147. devName = "/dev/" + devName
  148. }
  149. //Check device exists
  150. if !utils.FileExists(devName) {
  151. utils.SendErrorResponse(w, "target device not exists")
  152. return
  153. }
  154. //Get status of the array
  155. targetRAIDInfo, err := m.GetRAIDInfo(devName)
  156. if err != nil {
  157. utils.SendErrorResponse(w, err.Error())
  158. return
  159. }
  160. js, _ := json.Marshal(targetRAIDInfo)
  161. utils.SendJSONResponse(w, string(js))
  162. }
  163. // Handle formating a device
  164. func (m *Manager) HandleFormatRaidDevice(w http.ResponseWriter, r *http.Request) {
  165. devName, err := utils.GetPara(r, "devName")
  166. if err != nil {
  167. utils.SendErrorResponse(w, "invalid device name given")
  168. return
  169. }
  170. format, err := utils.GetPara(r, "format")
  171. if err != nil {
  172. utils.SendErrorResponse(w, "invalid device name given")
  173. return
  174. }
  175. if !strings.HasPrefix(devName, "/dev/") {
  176. devName = "/dev/" + devName
  177. }
  178. //Check if the target device exists
  179. if !m.RAIDDeviceExists(devName) {
  180. utils.SendErrorResponse(w, "target not exists or not a valid RAID device")
  181. return
  182. }
  183. //Format the drive
  184. err = diskfs.FormatStorageDevice(format, devName)
  185. if err != nil {
  186. utils.SendErrorResponse(w, err.Error())
  187. return
  188. }
  189. utils.SendOK(w)
  190. }
  191. // List all the raid device in this system
  192. func (m *Manager) HandleListRaidDevices(w http.ResponseWriter, r *http.Request) {
  193. rdevs, err := m.GetRAIDDevicesFromProcMDStat()
  194. if err != nil {
  195. utils.SendErrorResponse(w, err.Error())
  196. return
  197. }
  198. results := []*RAIDInfo{}
  199. for _, rdev := range rdevs {
  200. arrayInfo, err := m.GetRAIDInfo("/dev/" + rdev.Name)
  201. if err != nil {
  202. continue
  203. }
  204. results = append(results, arrayInfo)
  205. }
  206. js, _ := json.Marshal(results)
  207. utils.SendJSONResponse(w, string(js))
  208. }
  209. // Create a RAID storage pool
  210. func (m *Manager) HandleCreateRAIDDevice(w http.ResponseWriter, r *http.Request) {
  211. //TODO: Change GetPara to Post
  212. devName, err := utils.GetPara(r, "devName")
  213. if err != nil || devName == "" {
  214. //Use auto generated one
  215. devName, err = GetNextAvailableMDDevice()
  216. if err != nil {
  217. utils.SendErrorResponse(w, err.Error())
  218. return
  219. }
  220. }
  221. raidName, err := utils.GetPara(r, "raidName")
  222. if err != nil {
  223. utils.SendErrorResponse(w, "invalid raid storage name given")
  224. return
  225. }
  226. raidLevelStr, err := utils.GetPara(r, "level")
  227. if err != nil {
  228. utils.SendErrorResponse(w, "invalid raid level given")
  229. return
  230. }
  231. raidDevicesJSON, err := utils.GetPara(r, "raidDev")
  232. if err != nil {
  233. utils.SendErrorResponse(w, "invalid raid device array given")
  234. return
  235. }
  236. spareDevicesJSON, err := utils.GetPara(r, "spareDev")
  237. if err != nil {
  238. utils.SendErrorResponse(w, "invalid spare device array given")
  239. return
  240. }
  241. //Convert raidDevices and spareDevices ID into string slice
  242. raidDevices := []string{}
  243. spareDevices := []string{}
  244. err = json.Unmarshal([]byte(raidDevicesJSON), &raidDevices)
  245. if err != nil {
  246. utils.SendErrorResponse(w, "unable to parse raid device into array")
  247. return
  248. }
  249. err = json.Unmarshal([]byte(spareDevicesJSON), &spareDevices)
  250. if err != nil {
  251. utils.SendErrorResponse(w, "unable to parse spare devices into array")
  252. return
  253. }
  254. //Make sure RAID Name do not contain spaces or werid charcters
  255. if strings.Contains(raidName, " ") {
  256. utils.SendErrorResponse(w, "raid name cannot contain space")
  257. return
  258. }
  259. //Convert raidLevel to int
  260. raidLevel, err := strconv.Atoi(raidLevelStr)
  261. if err != nil {
  262. utils.SendErrorResponse(w, "invalid raid level given")
  263. return
  264. }
  265. //Create the RAID device
  266. err = m.CreateRAIDDevice(devName, raidName, raidLevel, raidDevices, spareDevices)
  267. if err != nil {
  268. utils.SendErrorResponse(w, err.Error())
  269. return
  270. }
  271. //Update the mdadm config
  272. err = m.UpdateMDADMConfig()
  273. if err != nil {
  274. utils.SendErrorResponse(w, err.Error())
  275. return
  276. }
  277. utils.SendOK(w)
  278. }
  279. // Request to reload the RAID manager and scan new / fix missing raid pools
  280. func (m *Manager) HandleRaidDevicesAssemble(w http.ResponseWriter, r *http.Request) {
  281. err := m.RestartRAIDService()
  282. if err != nil {
  283. utils.SendErrorResponse(w, err.Error())
  284. return
  285. }
  286. utils.SendOK(w)
  287. }
  288. // Remove a given raid device with its name, USE WITH CAUTION
  289. func (m *Manager) HandleRemoveRaideDevice(w http.ResponseWriter, r *http.Request) {
  290. //TODO: Add protection and switch to POST
  291. targetDevice, err := utils.GetPara(r, "dev")
  292. if err != nil {
  293. utils.SendErrorResponse(w, "target device not given")
  294. return
  295. }
  296. //Check if the raid device exists
  297. if !m.RAIDDeviceExists(targetDevice) {
  298. utils.SendErrorResponse(w, "target device not exists")
  299. return
  300. }
  301. //Get the RAID device memeber disks
  302. targetRAIDDevice, err := m.GetRAIDDeviceByDevicePath(targetDevice)
  303. if err != nil {
  304. utils.SendErrorResponse(w, "error occured when trying to load target RAID device info")
  305. return
  306. }
  307. //Check if it is mounted. If yes, unmount it
  308. if !strings.HasPrefix("/dev/", targetDevice) {
  309. targetDevice = filepath.Join("/dev/", targetDevice)
  310. }
  311. mounted, err := diskfs.DeviceIsMounted(targetDevice)
  312. if err != nil {
  313. log.Println("[RAID] Unmount failed: " + err.Error())
  314. utils.SendErrorResponse(w, err.Error())
  315. return
  316. }
  317. if mounted {
  318. err = diskfs.UnmountDevice(targetDevice)
  319. if err != nil {
  320. log.Println("[RAID] Unmount failed: " + err.Error())
  321. utils.SendErrorResponse(w, err.Error())
  322. return
  323. }
  324. }
  325. //Stop & Remove RAID service on the target device
  326. err = m.StopRAIDDevice(targetDevice)
  327. if err != nil {
  328. log.Println("[RAID] Stop RAID partition failed: " + err.Error())
  329. utils.SendErrorResponse(w, err.Error())
  330. return
  331. }
  332. //Zeroblock the RAID device member disks
  333. for _, memberDisk := range targetRAIDDevice.Members {
  334. //Member disk name do not contain full path
  335. name := memberDisk.Name
  336. if !strings.HasPrefix(name, "/dev/") {
  337. name = filepath.Join("/dev/", name)
  338. }
  339. err = m.ClearSuperblock(name)
  340. if err != nil {
  341. log.Println("[RAID] Unable to clear superblock on device " + name)
  342. continue
  343. }
  344. }
  345. //Update the mdadm config
  346. //TODO: Validate this actually works
  347. err = m.UpdateMDADMConfig()
  348. if err != nil {
  349. utils.SendErrorResponse(w, err.Error())
  350. return
  351. }
  352. //Done
  353. utils.SendOK(w)
  354. }