storage.pool.go 20 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749
  1. package main
  2. import (
  3. "encoding/json"
  4. "errors"
  5. "log"
  6. "net/http"
  7. "os"
  8. "path/filepath"
  9. "strings"
  10. "time"
  11. "imuslab.com/arozos/mod/permission"
  12. "imuslab.com/arozos/mod/storage/bridge"
  13. "imuslab.com/arozos/mod/utils"
  14. fs "imuslab.com/arozos/mod/filesystem"
  15. prout "imuslab.com/arozos/mod/prouter"
  16. storage "imuslab.com/arozos/mod/storage"
  17. )
  18. /*
  19. Storage Pool Handler
  20. author: tobychui
  21. This script handle the storage pool editing of different permission groups
  22. */
  23. func StoragePoolEditorInit() {
  24. adminRouter := prout.NewModuleRouter(prout.RouterOption{
  25. ModuleName: "System Settings",
  26. AdminOnly: true,
  27. UserHandler: userHandler,
  28. DeniedHandler: func(w http.ResponseWriter, r *http.Request) {
  29. utils.SendErrorResponse(w, "Permission Denied")
  30. },
  31. })
  32. //Create the required folder structure
  33. err := os.MkdirAll("./system/storage", 0775)
  34. if err != nil {
  35. log.Println("Create storage pool setting folder failed: ")
  36. log.Fatal(err)
  37. }
  38. adminRouter.HandleFunc("/system/storage/pool/list", HandleListStoragePools)
  39. adminRouter.HandleFunc("/system/storage/pool/listraw", HandleListStoragePoolsConfig)
  40. //adminRouter.HandleFunc("/system/storage/pool/newHandler", HandleStorageNewFsHandler)
  41. adminRouter.HandleFunc("/system/storage/pool/removeHandler", HandleStoragePoolRemove)
  42. adminRouter.HandleFunc("/system/storage/pool/reload", HandleStoragePoolReload)
  43. adminRouter.HandleFunc("/system/storage/pool/toggle", HandleFSHToggle)
  44. adminRouter.HandleFunc("/system/storage/pool/edit", HandleFSHEdit)
  45. adminRouter.HandleFunc("/system/storage/pool/bridge", HandleFSHBridging)
  46. adminRouter.HandleFunc("/system/storage/pool/checkBridge", HandleFSHBridgeCheck)
  47. }
  48. // Handle editing of a given File System Handler
  49. func HandleFSHEdit(w http.ResponseWriter, r *http.Request) {
  50. opr, _ := utils.PostPara(r, "opr")
  51. group, err := utils.PostPara(r, "group")
  52. if err != nil {
  53. utils.SendErrorResponse(w, "Invalid group given")
  54. return
  55. }
  56. if opr == "get" {
  57. uuid, err := utils.PostPara(r, "uuid")
  58. if err != nil {
  59. utils.SendErrorResponse(w, "Invalid UUID")
  60. return
  61. }
  62. //Load
  63. fshOption, err := getFSHConfigFromGroupAndUUID(group, uuid)
  64. if err != nil {
  65. utils.SendErrorResponse(w, err.Error())
  66. return
  67. }
  68. //Hide the password info
  69. fshOption.Username = ""
  70. fshOption.Password = ""
  71. //Return as JSON
  72. js, _ := json.Marshal(fshOption)
  73. utils.SendJSONResponse(w, string(js))
  74. return
  75. } else if opr == "set" {
  76. config, err := utils.PostPara(r, "config")
  77. if err != nil {
  78. utils.SendErrorResponse(w, "Invalid UUID")
  79. return
  80. }
  81. newFsOption, err := buildOptionFromRequestForm(config)
  82. if err != nil {
  83. utils.SendErrorResponse(w, err.Error())
  84. return
  85. }
  86. //systemWideLogger.PrintAndLog("Storage", newFsOption, nil)
  87. uuid := newFsOption.Uuid
  88. //Read and remove the original settings from the config file
  89. err = setFSHConfigByGroupAndId(group, uuid, newFsOption)
  90. if err != nil {
  91. utils.SendErrorResponse(w, err.Error())
  92. } else {
  93. utils.SendOK(w)
  94. }
  95. } else if opr == "new" {
  96. //New handler
  97. config, err := utils.PostPara(r, "config")
  98. if err != nil {
  99. utils.SendErrorResponse(w, "Invalid config")
  100. return
  101. }
  102. newFsOption, err := buildOptionFromRequestForm(config)
  103. if err != nil {
  104. utils.SendErrorResponse(w, err.Error())
  105. return
  106. }
  107. //Check if group exists
  108. if !permissionHandler.GroupExists(group) && group != "system" {
  109. utils.SendErrorResponse(w, "Group not exists: "+group)
  110. return
  111. }
  112. //Validate the config is correct
  113. err = fs.ValidateOption(&newFsOption)
  114. if err != nil {
  115. utils.SendErrorResponse(w, err.Error())
  116. return
  117. }
  118. configFile := "./system/storage.json"
  119. if group != "system" {
  120. configFile = "./system/storage/" + group + ".json"
  121. }
  122. //Merge the old config file if exists
  123. oldConfigs := []fs.FileSystemOption{}
  124. if fs.FileExists(configFile) {
  125. originalConfigFile, _ := os.ReadFile(configFile)
  126. err := json.Unmarshal(originalConfigFile, &oldConfigs)
  127. if err != nil {
  128. systemWideLogger.PrintAndLog("Storage", err.Error(), err)
  129. }
  130. }
  131. oldConfigs = append(oldConfigs, newFsOption)
  132. js, _ := json.MarshalIndent(oldConfigs, "", " ")
  133. err = os.WriteFile(configFile, js, 0775)
  134. if err != nil {
  135. utils.SendErrorResponse(w, err.Error())
  136. return
  137. }
  138. utils.SendOK(w)
  139. } else {
  140. //Unknown
  141. utils.SendErrorResponse(w, "Unknown opr given")
  142. return
  143. }
  144. }
  145. // Get the FSH configuration for the given group and uuid
  146. func getFSHConfigFromGroupAndUUID(group string, uuid string) (*fs.FileSystemOption, error) {
  147. //Spot the desired config file
  148. targerFile := ""
  149. if group == "system" {
  150. targerFile = "./system/storage.json"
  151. } else {
  152. targerFile = "./system/storage/" + group + ".json"
  153. }
  154. //Check if file exists.
  155. if !fs.FileExists(targerFile) {
  156. systemWideLogger.PrintAndLog("Storage", "Config file not found: "+targerFile, nil)
  157. return nil, errors.New("Configuration file not found")
  158. }
  159. if !fs.FileExists(filepath.Dir(targerFile)) {
  160. os.MkdirAll(filepath.Dir(targerFile), 0775)
  161. }
  162. //Load and parse the file
  163. configContent, err := os.ReadFile(targerFile)
  164. if err != nil {
  165. return nil, err
  166. }
  167. loadedConfig := []fs.FileSystemOption{}
  168. err = json.Unmarshal(configContent, &loadedConfig)
  169. if err != nil {
  170. systemWideLogger.PrintAndLog("Storage", "Request to parse config error: "+err.Error()+targerFile, err)
  171. return nil, err
  172. }
  173. //Look for the target fsh uuid
  174. for _, thisFshConfig := range loadedConfig {
  175. if thisFshConfig.Uuid == uuid {
  176. return &thisFshConfig, nil
  177. }
  178. }
  179. return nil, errors.New("No FSH config found with the uuid")
  180. }
  181. func setFSHConfigByGroupAndId(group string, uuid string, options fs.FileSystemOption) error {
  182. //Spot the desired config file
  183. targerFile := ""
  184. if group == "system" {
  185. targerFile = "./system/storage.json"
  186. } else {
  187. targerFile = "./system/storage/" + group + ".json"
  188. }
  189. //Check if file exists.
  190. if !fs.FileExists(targerFile) {
  191. systemWideLogger.PrintAndLog("Storage", "Config file not found: "+targerFile, nil)
  192. return errors.New("Configuration file not found")
  193. }
  194. if !fs.FileExists(filepath.Dir(targerFile)) {
  195. os.MkdirAll(filepath.Dir(targerFile), 0775)
  196. }
  197. //Load and parse the file
  198. configContent, err := os.ReadFile(targerFile)
  199. if err != nil {
  200. return err
  201. }
  202. loadedConfig := []fs.FileSystemOption{}
  203. err = json.Unmarshal(configContent, &loadedConfig)
  204. if err != nil {
  205. systemWideLogger.PrintAndLog("Storage", "Request to parse config error: "+err.Error()+targerFile, err)
  206. return err
  207. }
  208. //Filter the old fs handler option with given uuid
  209. newConfig := []fs.FileSystemOption{}
  210. var overwritingConfig fs.FileSystemOption
  211. for _, fso := range loadedConfig {
  212. if fso.Uuid != uuid {
  213. newConfig = append(newConfig, fso)
  214. } else {
  215. overwritingConfig = fso
  216. }
  217. }
  218. //Continue using the old username and password if it is left empty
  219. if options.Username == "" {
  220. options.Username = overwritingConfig.Username
  221. }
  222. if options.Password == "" {
  223. options.Password = overwritingConfig.Password
  224. }
  225. //Append the new fso to config
  226. newConfig = append(newConfig, options)
  227. //Write config back to file
  228. js, _ := json.MarshalIndent(newConfig, "", " ")
  229. return os.WriteFile(targerFile, js, 0775)
  230. }
  231. // Handle Storage Pool toggle on-off
  232. func HandleFSHToggle(w http.ResponseWriter, r *http.Request) {
  233. fsh, _ := utils.PostPara(r, "fsh")
  234. if fsh == "" {
  235. utils.SendErrorResponse(w, "Invalid File System Handler ID")
  236. return
  237. }
  238. group, _ := utils.PostPara(r, "group")
  239. if group == "" {
  240. utils.SendErrorResponse(w, "Invalid group ID")
  241. return
  242. }
  243. //Check if group exists
  244. if group != "system" && !permissionHandler.GroupExists(group) {
  245. utils.SendErrorResponse(w, "Group not exists")
  246. return
  247. }
  248. //Not allow to modify system reserved fsh
  249. if fsh == "user" || fsh == "tmp" {
  250. utils.SendErrorResponse(w, "Cannot toggle system reserved File System Handler")
  251. return
  252. }
  253. //Check if fsh exists
  254. var targetpg *permission.PermissionGroup
  255. var storagePool *storage.StoragePool
  256. if group == "system" {
  257. //System storage pool.
  258. storagePool = baseStoragePool
  259. } else {
  260. targetpg = permissionHandler.GetPermissionGroupByName(group)
  261. storagePool = targetpg.StoragePool
  262. }
  263. var targetFSH *fs.FileSystemHandler
  264. for _, thisFsh := range storagePool.Storages {
  265. if thisFsh.UUID == fsh {
  266. targetFSH = thisFsh
  267. }
  268. }
  269. //Target File System Handler not found
  270. if targetFSH == nil {
  271. utils.SendErrorResponse(w, "Target File System Handler not found, given: "+fsh)
  272. return
  273. }
  274. //Give it some time to finish unloading
  275. time.Sleep(1 * time.Second)
  276. //Return ok
  277. utils.SendOK(w)
  278. }
  279. // Handle reload of storage pool
  280. func HandleStoragePoolReload(w http.ResponseWriter, r *http.Request) {
  281. pool, _ := utils.PostPara(r, "pool")
  282. //Basepool super long string just to prevent any typo
  283. if pool == "1eb201a3-d0f6-6630-5e6d-2f40480115c5" {
  284. //Reload ALL storage pools
  285. //Reload basepool
  286. baseStoragePool.Close()
  287. emptyPool := storage.StoragePool{}
  288. baseStoragePool = &emptyPool
  289. //Start BasePool again
  290. err := LoadBaseStoragePool()
  291. if err != nil {
  292. systemWideLogger.PrintAndLog("Storage", err.Error(), err)
  293. } else {
  294. //Update userHandler's basePool
  295. userHandler.UpdateStoragePool(baseStoragePool)
  296. }
  297. //Reload all permission group's pool
  298. for _, pg := range permissionHandler.PermissionGroups {
  299. systemWideLogger.PrintAndLog("Storage", "Reloading Storage Pool for: "+pg.Name, err)
  300. //Pool should be exists. Close it
  301. pg.StoragePool.Close()
  302. //Create an empty pool for this permission group
  303. newEmptyPool := storage.StoragePool{}
  304. pg.StoragePool = &newEmptyPool
  305. //Recreate a new pool for this permission group
  306. //If there is no handler in config, the empty one will be kept
  307. LoadStoragePoolForGroup(pg)
  308. }
  309. BridgeStoragePoolInit()
  310. } else {
  311. if pool == "system" {
  312. //Reload basepool
  313. baseStoragePool.Close()
  314. emptyPool := storage.StoragePool{}
  315. baseStoragePool = &emptyPool
  316. //Start BasePool again
  317. err := LoadBaseStoragePool()
  318. if err != nil {
  319. systemWideLogger.PrintAndLog("Storage", err.Error(), err)
  320. } else {
  321. //Update userHandler's basePool
  322. userHandler.UpdateStoragePool(baseStoragePool)
  323. }
  324. BridgeStoragePoolForGroup("system")
  325. } else {
  326. //Reload the given storage pool
  327. if !permissionHandler.GroupExists(pool) {
  328. utils.SendErrorResponse(w, "Permission Pool owner not exists")
  329. return
  330. }
  331. systemWideLogger.PrintAndLog("Storage", "Reloading Storage Pool for: "+pool, nil)
  332. //Pool should be exists. Close it
  333. pg := permissionHandler.GetPermissionGroupByName(pool)
  334. //Record a list of uuids that reloaded, use for later checking for bridge remount
  335. reloadedFshUUIDs := []string{}
  336. for _, fsh := range pg.StoragePool.Storages {
  337. //Close the fsh if it is not a bridged one
  338. isBridged, _ := bridgeManager.IsBridgedFSH(fsh.UUID, pg.Name)
  339. if !isBridged && !fsh.Closed {
  340. fsh.Close()
  341. reloadedFshUUIDs = append(reloadedFshUUIDs, fsh.UUID)
  342. }
  343. }
  344. //Create an empty pool for this permission group
  345. newEmptyPool := storage.StoragePool{}
  346. pg.StoragePool = &newEmptyPool
  347. //Recreate a new pool for this permission group
  348. //If there is no handler in config, the empty one will be kept
  349. LoadStoragePoolForGroup(pg)
  350. BridgeStoragePoolForGroup(pg.Name)
  351. //Get all the groups that have bridged the reloaded fshs
  352. rebridgePendingMap := map[string]bool{}
  353. for _, fshuuid := range reloadedFshUUIDs {
  354. pgs := bridgeManager.GetBridgedGroups(fshuuid)
  355. for _, pg := range pgs {
  356. rebridgePendingMap[pg] = true
  357. }
  358. }
  359. //Debridge and rebridge all the related storage pools
  360. for pg, _ := range rebridgePendingMap {
  361. DebridgeAllFSHandlerFromGroup(pg)
  362. time.Sleep(100 * time.Millisecond)
  363. BridgeStoragePoolForGroup(pg)
  364. }
  365. }
  366. }
  367. utils.SendOK(w)
  368. }
  369. func HandleStoragePoolRemove(w http.ResponseWriter, r *http.Request) {
  370. groupname, err := utils.PostPara(r, "group")
  371. if err != nil {
  372. utils.SendErrorResponse(w, "group not defined")
  373. return
  374. }
  375. uuid, err := utils.PostPara(r, "uuid")
  376. if err != nil {
  377. utils.SendErrorResponse(w, "File system handler UUID not defined")
  378. return
  379. }
  380. targetConfigFile := "./system/storage.json"
  381. if groupname == "system" {
  382. if uuid == "user" || uuid == "tmp" {
  383. utils.SendErrorResponse(w, "Cannot remove system reserved file system handlers")
  384. return
  385. }
  386. //Ok to continue
  387. } else {
  388. //Check group exists
  389. if !permissionHandler.GroupExists(groupname) {
  390. utils.SendErrorResponse(w, "Group not exists")
  391. return
  392. }
  393. targetConfigFile = "./system/storage/" + groupname + ".json"
  394. if !fs.FileExists(targetConfigFile) {
  395. //No config. Create an empty one
  396. initConfig := []fs.FileSystemOption{}
  397. js, _ := json.MarshalIndent(initConfig, "", " ")
  398. os.WriteFile(targetConfigFile, js, 0775)
  399. }
  400. }
  401. //Check if this handler is bridged handler
  402. bridged, _ := bridgeManager.IsBridgedFSH(uuid, groupname)
  403. if bridged {
  404. //Bridged FSH. Remove it from bridge config
  405. basePool, err := GetStoragePoolByOwner(groupname)
  406. if err != nil {
  407. utils.SendErrorResponse(w, err.Error())
  408. return
  409. }
  410. err = DebridgeFSHandlerFromGroup(uuid, basePool)
  411. if err != nil {
  412. utils.SendErrorResponse(w, err.Error())
  413. return
  414. }
  415. //Remove it from the config
  416. bridgeManager.RemoveFromConfig(uuid, groupname)
  417. utils.SendOK(w)
  418. return
  419. } else {
  420. //Remove it from the json file
  421. //Read and parse from old config
  422. oldConfigs := []fs.FileSystemOption{}
  423. originalConfigFile, _ := os.ReadFile(targetConfigFile)
  424. err = json.Unmarshal(originalConfigFile, &oldConfigs)
  425. if err != nil {
  426. utils.SendErrorResponse(w, "Failed to parse original config file")
  427. return
  428. }
  429. //Generate new confic by filtering
  430. newConfigs := []fs.FileSystemOption{}
  431. for _, config := range oldConfigs {
  432. if config.Uuid != uuid {
  433. newConfigs = append(newConfigs, config)
  434. }
  435. }
  436. //Parse and put it into file
  437. if len(newConfigs) > 0 {
  438. js, _ := json.MarshalIndent(newConfigs, "", " ")
  439. os.WriteFile(targetConfigFile, js, 0777)
  440. } else {
  441. os.Remove(targetConfigFile)
  442. }
  443. }
  444. utils.SendOK(w)
  445. }
  446. // Constract a fsoption from form
  447. func buildOptionFromRequestForm(payload string) (fs.FileSystemOption, error) {
  448. newFsOption := fs.FileSystemOption{}
  449. err := json.Unmarshal([]byte(payload), &newFsOption)
  450. //Do data cleaning
  451. newFsOption.Name = strings.TrimSpace(newFsOption.Name)
  452. newFsOption.Uuid = strings.TrimSpace(newFsOption.Uuid)
  453. newFsOption.Path = strings.TrimSpace(newFsOption.Path)
  454. if err != nil {
  455. return fs.FileSystemOption{}, err
  456. }
  457. return newFsOption, nil
  458. }
  459. /*
  460. func HandleStorageNewFsHandler(w http.ResponseWriter, r *http.Request) {
  461. newFsOption, _ := buildOptionFromRequestForm(r)
  462. type errorObject struct {
  463. Message string
  464. Source string
  465. }
  466. //Get group from form data
  467. groupName := r.FormValue("group")
  468. //Check if group exists
  469. if !permissionHandler.GroupExists(groupName) && groupName != "system" {
  470. js, _ := json.Marshal(errorObject{
  471. Message: "Group not exists: " + groupName,
  472. Source: "",
  473. })
  474. http.Redirect(w, r, "../../../SystemAO/storage/error.html#"+string(js), 307)
  475. }
  476. //Validate the config
  477. err := fs.ValidateOption(&newFsOption)
  478. if err != nil {
  479. //Serve an error page
  480. js, _ := json.Marshal(errorObject{
  481. Message: err.Error(),
  482. Source: groupName,
  483. })
  484. http.Redirect(w, r, "../../../SystemAO/storage/error.html#"+string(js), 307)
  485. return
  486. }
  487. //Ok. Append to the record
  488. configFile := "./system/storage.json"
  489. if groupName != "system" {
  490. configFile = "./system/storage/" + groupName + ".json"
  491. }
  492. //If file exists, merge it to
  493. oldConfigs := []fs.FileSystemOption{}
  494. if fs.FileExists(configFile) {
  495. originalConfigFile, _ := os.ReadFile(configFile)
  496. err := json.Unmarshal(originalConfigFile, &oldConfigs)
  497. if err != nil {
  498. systemWideLogger.PrintAndLog(err,nil)
  499. }
  500. }
  501. oldConfigs = append(oldConfigs, newFsOption)
  502. //Prepare the content to be written
  503. js, _ := json.Marshal(oldConfigs)
  504. resultingJson := pretty.Pretty(js)
  505. err = os.WriteFile(configFile, resultingJson, 0775)
  506. if err != nil {
  507. //Write Error. This could sometime happens on Windows host for unknown reason
  508. js, _ := json.Marshal(errorObject{
  509. Message: err.Error(),
  510. Source: groupName,
  511. })
  512. http.Redirect(w, r, "../../../SystemAO/storage/error.html#"+string(js), 307)
  513. return
  514. }
  515. w.Header().Set("Cache-Control", "no-store, no-cache, must-revalidate, post-check=0, pre-check=0")
  516. http.Redirect(w, r, "../../../SystemAO/storage/poolEditor.html#"+groupName, 307)
  517. }
  518. */
  519. func HandleListStoragePoolsConfig(w http.ResponseWriter, r *http.Request) {
  520. target, _ := utils.GetPara(r, "target")
  521. if target == "" {
  522. target = "system"
  523. }
  524. target = strings.ReplaceAll(filepath.ToSlash(target), "/", "")
  525. //List the target storage pool config
  526. targetFile := "./system/storage.json"
  527. if target != "system" {
  528. targetFile = "./system/storage/" + target + ".json"
  529. }
  530. if !fs.FileExists(targetFile) {
  531. //Assume no storage.
  532. nofsh := []*fs.FileSystemOption{}
  533. js, _ := json.Marshal(nofsh)
  534. utils.SendJSONResponse(w, string(js))
  535. return
  536. }
  537. //Read and serve it
  538. configContent, err := os.ReadFile(targetFile)
  539. if err != nil {
  540. utils.SendErrorResponse(w, err.Error())
  541. return
  542. } else {
  543. utils.SendJSONResponse(w, string(configContent))
  544. }
  545. }
  546. // Return all storage pool mounted to the system, aka base pool + pg pools
  547. func HandleListStoragePools(w http.ResponseWriter, r *http.Request) {
  548. filter, _ := utils.GetPara(r, "filter")
  549. storagePools := []*storage.StoragePool{}
  550. if filter != "" {
  551. if filter == "system" {
  552. storagePools = append(storagePools, baseStoragePool)
  553. } else {
  554. for _, pg := range userHandler.GetPermissionHandler().PermissionGroups {
  555. if pg.Name == filter {
  556. storagePools = append(storagePools, pg.StoragePool)
  557. }
  558. }
  559. }
  560. } else {
  561. //Add the base pool into the list
  562. storagePools = append(storagePools, baseStoragePool)
  563. for _, pg := range userHandler.GetPermissionHandler().PermissionGroups {
  564. storagePools = append(storagePools, pg.StoragePool)
  565. }
  566. }
  567. js, _ := json.Marshal(storagePools)
  568. utils.SendJSONResponse(w, string(js))
  569. }
  570. // Handler for bridging two FSH, require admin permission
  571. func HandleFSHBridging(w http.ResponseWriter, r *http.Request) {
  572. //Get the target pool and fsh to bridge
  573. basePool, err := utils.PostPara(r, "base")
  574. if err != nil {
  575. utils.SendErrorResponse(w, "Invalid base pool")
  576. return
  577. }
  578. //Add the target FSH into the base pool
  579. basePoolObject, err := GetStoragePoolByOwner(basePool)
  580. if err != nil {
  581. systemWideLogger.PrintAndLog("Storage", "Bridge FSH failed: "+err.Error(), err)
  582. utils.SendErrorResponse(w, "Storage pool not found")
  583. return
  584. }
  585. targetFSH, err := utils.PostPara(r, "fsh")
  586. if err != nil {
  587. utils.SendErrorResponse(w, "Invalid File System Handler given")
  588. return
  589. }
  590. fsh, err := GetFsHandlerByUUID(targetFSH)
  591. if err != nil {
  592. utils.SendErrorResponse(w, "Given File System Handler UUID does not exists")
  593. return
  594. }
  595. err = BridgeFSHandlerToGroup(fsh, basePoolObject)
  596. if err != nil {
  597. utils.SendErrorResponse(w, err.Error())
  598. return
  599. }
  600. bridgeConfig := bridge.BridgeConfig{
  601. FSHUUID: fsh.UUID,
  602. SPOwner: basePoolObject.Owner,
  603. }
  604. //Write changes to file
  605. err = bridgeManager.AppendToConfig(&bridgeConfig)
  606. if err != nil {
  607. utils.SendErrorResponse(w, err.Error())
  608. return
  609. }
  610. utils.SendOK(w)
  611. }
  612. func HandleFSHBridgeCheck(w http.ResponseWriter, r *http.Request) {
  613. basePool, err := utils.PostPara(r, "base")
  614. if err != nil {
  615. utils.SendErrorResponse(w, "Invalid base pool")
  616. return
  617. }
  618. fsh, err := utils.PostPara(r, "fsh")
  619. if err != nil {
  620. utils.SendErrorResponse(w, "Invalid fsh UUID")
  621. return
  622. }
  623. isBridged, err := bridgeManager.IsBridgedFSH(fsh, basePool)
  624. if err != nil {
  625. utils.SendErrorResponse(w, err.Error())
  626. return
  627. }
  628. js, _ := json.Marshal(isBridged)
  629. utils.SendJSONResponse(w, string(js))
  630. }