handler.go 12 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493
  1. package raid
  2. import (
  3. "encoding/json"
  4. "log"
  5. "net/http"
  6. "path/filepath"
  7. "strconv"
  8. "strings"
  9. "time"
  10. "imuslab.com/arozos/mod/disk/diskfs"
  11. "imuslab.com/arozos/mod/utils"
  12. )
  13. /*
  14. Handler.go
  15. This module handle api call to the raid module
  16. */
  17. func (m *Manager) HandleRemoveDiskFromRAIDVol(w http.ResponseWriter, r *http.Request) {
  18. //mdadm --remove /dev/md0 /dev/sdb1
  19. mdDev, err := utils.PostPara(r, "raidDev")
  20. if err != nil {
  21. utils.SendErrorResponse(w, "invalid raid device given")
  22. return
  23. }
  24. sdXDev, err := utils.PostPara(r, "memDev")
  25. if err != nil {
  26. utils.SendErrorResponse(w, "invalid member device given")
  27. return
  28. }
  29. //Check if target array exists
  30. if !m.RAIDDeviceExists(mdDev) {
  31. utils.SendErrorResponse(w, "target RAID array not exists")
  32. return
  33. }
  34. //Check if this is the only disk in the array
  35. if !m.IsSafeToRemove(mdDev, sdXDev) {
  36. utils.SendErrorResponse(w, "removal of this device will cause data loss")
  37. return
  38. }
  39. //Check if the disk is already failed
  40. diskAlreadyFailed, err := m.DiskIsFailed(mdDev, sdXDev)
  41. if err != nil {
  42. log.Println("[RAID] Unable to validate if disk failed: " + err.Error())
  43. utils.SendErrorResponse(w, err.Error())
  44. return
  45. }
  46. //Disk not failed. Mark it as failed
  47. if !diskAlreadyFailed {
  48. err = m.FailDisk(mdDev, sdXDev)
  49. if err != nil {
  50. utils.SendErrorResponse(w, err.Error())
  51. return
  52. }
  53. }
  54. //Add some delay for OS level to handle IO closing
  55. time.Sleep(300 * time.Millisecond)
  56. //Done. Remove the device from array
  57. err = m.RemoveDisk(mdDev, sdXDev)
  58. if err != nil {
  59. utils.SendErrorResponse(w, err.Error())
  60. return
  61. }
  62. log.Println("[RAID] Memeber disk " + sdXDev + " removed from RAID volume " + mdDev)
  63. utils.SendOK(w)
  64. }
  65. func (m *Manager) HandleAddDiskToRAIDVol(w http.ResponseWriter, r *http.Request) {
  66. //mdadm --add /dev/md0 /dev/sdb1
  67. mdDev, err := utils.PostPara(r, "raidDev")
  68. if err != nil {
  69. utils.SendErrorResponse(w, "invalid raid device given")
  70. return
  71. }
  72. sdXDev, err := utils.PostPara(r, "memDev")
  73. if err != nil {
  74. utils.SendErrorResponse(w, "invalid member device given")
  75. return
  76. }
  77. //Check if target array exists
  78. if !m.RAIDDeviceExists(mdDev) {
  79. utils.SendErrorResponse(w, "target RAID array not exists")
  80. return
  81. }
  82. //Check if disk already in another RAID array or mounted
  83. isMounted, err := diskfs.DeviceIsMounted(sdXDev)
  84. if err != nil {
  85. utils.SendErrorResponse(w, "unable to read device state")
  86. return
  87. }
  88. if isMounted {
  89. utils.SendErrorResponse(w, "target device is mounted")
  90. return
  91. }
  92. diskUsedByAnotherRAID, err := m.DiskIsUsedInAnotherRAIDVol(sdXDev)
  93. if err != nil {
  94. utils.SendErrorResponse(w, err.Error())
  95. }
  96. if diskUsedByAnotherRAID {
  97. utils.SendErrorResponse(w, "target device already been used by another RAID volume")
  98. return
  99. }
  100. isOSDisk, err := m.DiskIsRoot(sdXDev)
  101. if err != nil {
  102. utils.SendErrorResponse(w, err.Error())
  103. }
  104. if isOSDisk {
  105. utils.SendErrorResponse(w, "OS disk cannot be used as RAID member")
  106. return
  107. }
  108. //OK! Clear the disk
  109. err = m.ClearSuperblock(sdXDev)
  110. if err != nil {
  111. utils.SendErrorResponse(w, "unable to clear superblock of device")
  112. return
  113. }
  114. //Add it to the target RAID array
  115. err = m.AddDisk(mdDev, sdXDev)
  116. if err != nil {
  117. utils.SendErrorResponse(w, "adding disk to RAID volume failed")
  118. return
  119. }
  120. log.Println("[RAID] Device " + sdXDev + " added to RAID volume " + mdDev)
  121. utils.SendOK(w)
  122. }
  123. // Handle force flush reloading mdadm to solve the md0 become md127 problem
  124. func (m *Manager) HandleMdadmFlushReload(w http.ResponseWriter, r *http.Request) {
  125. err := m.FlushReload()
  126. if err != nil {
  127. utils.SendErrorResponse(w, "reload failed: "+strings.ReplaceAll(err.Error(), "\n", " "))
  128. return
  129. }
  130. utils.SendOK(w)
  131. }
  132. // Handle resolving the disk model label, might return null
  133. func (m *Manager) HandleResolveDiskModelLabel(w http.ResponseWriter, r *http.Request) {
  134. devName, err := utils.GetPara(r, "devName")
  135. if err != nil {
  136. utils.SendErrorResponse(w, "invalid device name given")
  137. return
  138. }
  139. //Function only accept sdX not /dev/sdX
  140. devName = filepath.Base(devName)
  141. labelSize, labelModel, err := diskfs.GetDiskModelByName(devName)
  142. if err != nil {
  143. utils.SendErrorResponse(w, err.Error())
  144. return
  145. }
  146. js, _ := json.Marshal([]string{labelModel, labelSize})
  147. utils.SendJSONResponse(w, string(js))
  148. }
  149. // Handle force flush reloading mdadm to solve the md0 become md127 problem
  150. func (m *Manager) HandlListChildrenDeviceInfo(w http.ResponseWriter, r *http.Request) {
  151. devName, err := utils.GetPara(r, "devName")
  152. if err != nil {
  153. utils.SendErrorResponse(w, "invalid device name given")
  154. return
  155. }
  156. if !strings.HasPrefix(devName, "/dev/") {
  157. devName = "/dev/" + devName
  158. }
  159. //Get the children devices for this RAID
  160. raidDevice, err := m.GetRAIDDeviceByDevicePath(devName)
  161. if err != nil {
  162. utils.SendErrorResponse(w, err.Error())
  163. return
  164. }
  165. //Merge the child devices info into one array
  166. results := map[string]*diskfs.BlockDeviceMeta{}
  167. for _, blockdevice := range raidDevice.Members {
  168. bdm, err := diskfs.GetBlockDeviceMeta("/dev/" + blockdevice.Name)
  169. if err != nil {
  170. log.Println("[RAID] Unable to load block device info: " + err.Error())
  171. results[blockdevice.Name] = &diskfs.BlockDeviceMeta{
  172. Name: blockdevice.Name,
  173. Size: -1,
  174. }
  175. continue
  176. }
  177. results[blockdevice.Name] = bdm
  178. }
  179. js, _ := json.Marshal(results)
  180. utils.SendJSONResponse(w, string(js))
  181. }
  182. // Handle list all the disks that is usable
  183. func (m *Manager) HandleListUsableDevices(w http.ResponseWriter, r *http.Request) {
  184. storageDevices, err := diskfs.ListAllStorageDevices()
  185. if err != nil {
  186. utils.SendErrorResponse(w, err.Error())
  187. return
  188. }
  189. //Filter out the block devices that are disks
  190. usableDisks := []diskfs.BlockDeviceMeta{}
  191. for _, device := range storageDevices.Blockdevices {
  192. if device.Type == "disk" {
  193. usableDisks = append(usableDisks, device)
  194. }
  195. }
  196. js, _ := json.Marshal(usableDisks)
  197. utils.SendJSONResponse(w, string(js))
  198. }
  199. // Handle loading the detail of a given RAID array
  200. func (m *Manager) HandleLoadArrayDetail(w http.ResponseWriter, r *http.Request) {
  201. devName, err := utils.GetPara(r, "devName")
  202. if err != nil {
  203. utils.SendErrorResponse(w, "invalid device name given")
  204. return
  205. }
  206. if !strings.HasPrefix(devName, "/dev/") {
  207. devName = "/dev/" + devName
  208. }
  209. //Check device exists
  210. if !utils.FileExists(devName) {
  211. utils.SendErrorResponse(w, "target device not exists")
  212. return
  213. }
  214. //Get status of the array
  215. targetRAIDInfo, err := m.GetRAIDInfo(devName)
  216. if err != nil {
  217. utils.SendErrorResponse(w, err.Error())
  218. return
  219. }
  220. js, _ := json.Marshal(targetRAIDInfo)
  221. utils.SendJSONResponse(w, string(js))
  222. }
  223. // Handle formating a device
  224. func (m *Manager) HandleFormatRaidDevice(w http.ResponseWriter, r *http.Request) {
  225. devName, err := utils.GetPara(r, "devName")
  226. if err != nil {
  227. utils.SendErrorResponse(w, "invalid device name given")
  228. return
  229. }
  230. format, err := utils.GetPara(r, "format")
  231. if err != nil {
  232. utils.SendErrorResponse(w, "invalid device name given")
  233. return
  234. }
  235. if !strings.HasPrefix(devName, "/dev/") {
  236. devName = "/dev/" + devName
  237. }
  238. //Check if the target device exists
  239. if !m.RAIDDeviceExists(devName) {
  240. utils.SendErrorResponse(w, "target not exists or not a valid RAID device")
  241. return
  242. }
  243. //Format the drive
  244. err = diskfs.FormatStorageDevice(format, devName)
  245. if err != nil {
  246. utils.SendErrorResponse(w, err.Error())
  247. return
  248. }
  249. utils.SendOK(w)
  250. }
  251. // List all the raid device in this system
  252. func (m *Manager) HandleListRaidDevices(w http.ResponseWriter, r *http.Request) {
  253. rdevs, err := m.GetRAIDDevicesFromProcMDStat()
  254. if err != nil {
  255. utils.SendErrorResponse(w, err.Error())
  256. return
  257. }
  258. results := []*RAIDInfo{}
  259. for _, rdev := range rdevs {
  260. arrayInfo, err := m.GetRAIDInfo("/dev/" + rdev.Name)
  261. if err != nil {
  262. continue
  263. }
  264. results = append(results, arrayInfo)
  265. }
  266. js, _ := json.Marshal(results)
  267. utils.SendJSONResponse(w, string(js))
  268. }
  269. // Create a RAID storage pool
  270. func (m *Manager) HandleCreateRAIDDevice(w http.ResponseWriter, r *http.Request) {
  271. //TODO: Change GetPara to Post
  272. devName, err := utils.GetPara(r, "devName")
  273. if err != nil || devName == "" {
  274. //Use auto generated one
  275. devName, err = GetNextAvailableMDDevice()
  276. if err != nil {
  277. utils.SendErrorResponse(w, err.Error())
  278. return
  279. }
  280. }
  281. raidName, err := utils.GetPara(r, "raidName")
  282. if err != nil {
  283. utils.SendErrorResponse(w, "invalid raid storage name given")
  284. return
  285. }
  286. raidLevelStr, err := utils.GetPara(r, "level")
  287. if err != nil {
  288. utils.SendErrorResponse(w, "invalid raid level given")
  289. return
  290. }
  291. raidDevicesJSON, err := utils.GetPara(r, "raidDev")
  292. if err != nil {
  293. utils.SendErrorResponse(w, "invalid raid device array given")
  294. return
  295. }
  296. spareDevicesJSON, err := utils.GetPara(r, "spareDev")
  297. if err != nil {
  298. utils.SendErrorResponse(w, "invalid spare device array given")
  299. return
  300. }
  301. //Convert raidDevices and spareDevices ID into string slice
  302. raidDevices := []string{}
  303. spareDevices := []string{}
  304. err = json.Unmarshal([]byte(raidDevicesJSON), &raidDevices)
  305. if err != nil {
  306. utils.SendErrorResponse(w, "unable to parse raid device into array")
  307. return
  308. }
  309. err = json.Unmarshal([]byte(spareDevicesJSON), &spareDevices)
  310. if err != nil {
  311. utils.SendErrorResponse(w, "unable to parse spare devices into array")
  312. return
  313. }
  314. //Make sure RAID Name do not contain spaces or werid charcters
  315. if strings.Contains(raidName, " ") {
  316. utils.SendErrorResponse(w, "raid name cannot contain space")
  317. return
  318. }
  319. //Convert raidLevel to int
  320. raidLevel, err := strconv.Atoi(raidLevelStr)
  321. if err != nil {
  322. utils.SendErrorResponse(w, "invalid raid level given")
  323. return
  324. }
  325. //Create the RAID device
  326. err = m.CreateRAIDDevice(devName, raidName, raidLevel, raidDevices, spareDevices)
  327. if err != nil {
  328. utils.SendErrorResponse(w, err.Error())
  329. return
  330. }
  331. //Update the mdadm config
  332. err = m.UpdateMDADMConfig()
  333. if err != nil {
  334. utils.SendErrorResponse(w, err.Error())
  335. return
  336. }
  337. utils.SendOK(w)
  338. }
  339. // Request to reload the RAID manager and scan new / fix missing raid pools
  340. func (m *Manager) HandleRaidDevicesAssemble(w http.ResponseWriter, r *http.Request) {
  341. err := m.RestartRAIDService()
  342. if err != nil {
  343. utils.SendErrorResponse(w, err.Error())
  344. return
  345. }
  346. utils.SendOK(w)
  347. }
  348. // Remove a given raid device with its name, USE WITH CAUTION
  349. func (m *Manager) HandleRemoveRaideDevice(w http.ResponseWriter, r *http.Request) {
  350. //TODO: Add protection and switch to POST
  351. targetDevice, err := utils.GetPara(r, "dev")
  352. if err != nil {
  353. utils.SendErrorResponse(w, "target device not given")
  354. return
  355. }
  356. //Check if the raid device exists
  357. if !m.RAIDDeviceExists(targetDevice) {
  358. utils.SendErrorResponse(w, "target device not exists")
  359. return
  360. }
  361. //Get the RAID device memeber disks
  362. targetRAIDDevice, err := m.GetRAIDDeviceByDevicePath(targetDevice)
  363. if err != nil {
  364. utils.SendErrorResponse(w, "error occured when trying to load target RAID device info")
  365. return
  366. }
  367. //Check if it is mounted. If yes, unmount it
  368. if !strings.HasPrefix("/dev/", targetDevice) {
  369. targetDevice = filepath.Join("/dev/", targetDevice)
  370. }
  371. mounted, err := diskfs.DeviceIsMounted(targetDevice)
  372. if err != nil {
  373. log.Println("[RAID] Unmount failed: " + err.Error())
  374. utils.SendErrorResponse(w, err.Error())
  375. return
  376. }
  377. if mounted {
  378. err = diskfs.UnmountDevice(targetDevice)
  379. if err != nil {
  380. log.Println("[RAID] Unmount failed: " + err.Error())
  381. utils.SendErrorResponse(w, err.Error())
  382. return
  383. }
  384. }
  385. //Stop & Remove RAID service on the target device
  386. err = m.StopRAIDDevice(targetDevice)
  387. if err != nil {
  388. log.Println("[RAID] Stop RAID partition failed: " + err.Error())
  389. utils.SendErrorResponse(w, err.Error())
  390. return
  391. }
  392. //Zeroblock the RAID device member disks
  393. for _, memberDisk := range targetRAIDDevice.Members {
  394. //Member disk name do not contain full path
  395. name := memberDisk.Name
  396. if !strings.HasPrefix(name, "/dev/") {
  397. name = filepath.Join("/dev/", name)
  398. }
  399. err = m.ClearSuperblock(name)
  400. if err != nil {
  401. log.Println("[RAID] Unable to clear superblock on device " + name)
  402. continue
  403. }
  404. }
  405. //Update the mdadm config
  406. //TODO: Validate this actually works
  407. err = m.UpdateMDADMConfig()
  408. if err != nil {
  409. utils.SendErrorResponse(w, err.Error())
  410. return
  411. }
  412. //Done
  413. utils.SendOK(w)
  414. }