handler.go 19 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733
  1. package raid
  2. import (
  3. "encoding/json"
  4. "log"
  5. "net/http"
  6. "path/filepath"
  7. "strconv"
  8. "strings"
  9. "time"
  10. "imuslab.com/bokofs/bokofsd/mod/disktool/diskfs"
  11. "imuslab.com/bokofs/bokofsd/mod/utils"
  12. )
  13. /*
  14. Handler.go
  15. This module handle api call to the raid module
  16. */
  17. // Handle remove a member disk (sdX) from RAID volume (mdX)
  18. func (m *Manager) HandleRemoveDiskFromRAIDVol(w http.ResponseWriter, r *http.Request) {
  19. //mdadm --remove /dev/md0 /dev/sdb1
  20. mdDev, err := utils.PostPara(r, "raidDev")
  21. if err != nil {
  22. utils.SendErrorResponse(w, "invalid raid device given")
  23. return
  24. }
  25. sdXDev, err := utils.PostPara(r, "memDev")
  26. if err != nil {
  27. utils.SendErrorResponse(w, "invalid member device given")
  28. return
  29. }
  30. //Check if target array exists
  31. if !m.RAIDDeviceExists(mdDev) {
  32. utils.SendErrorResponse(w, "target RAID array not exists")
  33. return
  34. }
  35. //Check if this is the only disk in the array
  36. if !m.IsSafeToRemove(mdDev, sdXDev) {
  37. utils.SendErrorResponse(w, "removal of this device will cause data loss")
  38. return
  39. }
  40. //Check if the disk is already failed
  41. diskAlreadyFailed, err := m.DiskIsFailed(mdDev, sdXDev)
  42. if err != nil {
  43. log.Println("[RAID] Unable to validate if disk failed: " + err.Error())
  44. utils.SendErrorResponse(w, err.Error())
  45. return
  46. }
  47. //Disk not failed. Mark it as failed
  48. if !diskAlreadyFailed {
  49. err = m.FailDisk(mdDev, sdXDev)
  50. if err != nil {
  51. utils.SendErrorResponse(w, err.Error())
  52. return
  53. }
  54. }
  55. //Add some delay for OS level to handle IO closing
  56. time.Sleep(300 * time.Millisecond)
  57. //Done. Remove the device from array
  58. err = m.RemoveDisk(mdDev, sdXDev)
  59. if err != nil {
  60. utils.SendErrorResponse(w, err.Error())
  61. return
  62. }
  63. log.Println("[RAID] Memeber disk " + sdXDev + " removed from RAID volume " + mdDev)
  64. utils.SendOK(w)
  65. }
  66. // Handle adding a disk (mdX) to RAID volume (mdX)
  67. func (m *Manager) HandleAddDiskToRAIDVol(w http.ResponseWriter, r *http.Request) {
  68. //mdadm --add /dev/md0 /dev/sdb1
  69. mdDev, err := utils.PostPara(r, "raidDev")
  70. if err != nil {
  71. utils.SendErrorResponse(w, "invalid raid device given")
  72. return
  73. }
  74. sdXDev, err := utils.PostPara(r, "memDev")
  75. if err != nil {
  76. utils.SendErrorResponse(w, "invalid member device given")
  77. return
  78. }
  79. //Check if target array exists
  80. if !m.RAIDDeviceExists(mdDev) {
  81. utils.SendErrorResponse(w, "target RAID array not exists")
  82. return
  83. }
  84. //Check if disk already in another RAID array or mounted
  85. isMounted, err := diskfs.DeviceIsMounted(sdXDev)
  86. if err != nil {
  87. utils.SendErrorResponse(w, "unable to read device state")
  88. return
  89. }
  90. if isMounted {
  91. utils.SendErrorResponse(w, "target device is mounted")
  92. return
  93. }
  94. diskUsedByAnotherRAID, err := m.DiskIsUsedInAnotherRAIDVol(sdXDev)
  95. if err != nil {
  96. utils.SendErrorResponse(w, err.Error())
  97. }
  98. if diskUsedByAnotherRAID {
  99. utils.SendErrorResponse(w, "target device already been used by another RAID volume")
  100. return
  101. }
  102. isOSDisk, err := m.DiskIsRoot(sdXDev)
  103. if err != nil {
  104. utils.SendErrorResponse(w, err.Error())
  105. }
  106. if isOSDisk {
  107. utils.SendErrorResponse(w, "OS disk cannot be used as RAID member")
  108. return
  109. }
  110. //OK! Clear the disk
  111. err = m.ClearSuperblock(sdXDev)
  112. if err != nil {
  113. utils.SendErrorResponse(w, "unable to clear superblock of device")
  114. return
  115. }
  116. //Add it to the target RAID array
  117. err = m.AddDisk(mdDev, sdXDev)
  118. if err != nil {
  119. utils.SendErrorResponse(w, "adding disk to RAID volume failed")
  120. return
  121. }
  122. log.Println("[RAID] Device " + sdXDev + " added to RAID volume " + mdDev)
  123. utils.SendOK(w)
  124. }
  125. // Handle force flush reloading mdadm to solve the md0 become md127 problem
  126. func (m *Manager) HandleMdadmFlushReload(w http.ResponseWriter, r *http.Request) {
  127. if r.Method != http.MethodPost {
  128. //This force the request to pass through the csrf check
  129. utils.SendErrorResponse(w, "invalid method")
  130. return
  131. }
  132. err := m.FlushReload()
  133. if err != nil {
  134. utils.SendErrorResponse(w, "reload failed: "+strings.ReplaceAll(err.Error(), "\n", " "))
  135. return
  136. }
  137. utils.SendOK(w)
  138. }
  139. // Handle resolving the disk model label, might return null
  140. func (m *Manager) HandleResolveDiskModelLabel(w http.ResponseWriter, r *http.Request) {
  141. devName, err := utils.GetPara(r, "devName")
  142. if err != nil {
  143. utils.SendErrorResponse(w, "invalid device name given")
  144. return
  145. }
  146. //Function only accept sdX not /dev/sdX
  147. devName = filepath.Base(devName)
  148. labelSize, labelModel, err := diskfs.GetDiskModelByName(devName)
  149. if err != nil {
  150. utils.SendErrorResponse(w, err.Error())
  151. return
  152. }
  153. js, _ := json.Marshal([]string{labelModel, labelSize})
  154. utils.SendJSONResponse(w, string(js))
  155. }
  156. // Handle force flush reloading mdadm to solve the md0 become md127 problem
  157. func (m *Manager) HandlListChildrenDeviceInfo(w http.ResponseWriter, r *http.Request) {
  158. devName, err := utils.GetPara(r, "devName")
  159. if err != nil {
  160. utils.SendErrorResponse(w, "invalid device name given")
  161. return
  162. }
  163. if !strings.HasPrefix(devName, "/dev/") {
  164. devName = "/dev/" + devName
  165. }
  166. //Get the children devices for this RAID
  167. raidDevice, err := m.GetRAIDDeviceByDevicePath(devName)
  168. if err != nil {
  169. utils.SendErrorResponse(w, err.Error())
  170. return
  171. }
  172. //Merge the child devices info into one array
  173. results := map[string]*diskfs.BlockDeviceMeta{}
  174. for _, blockdevice := range raidDevice.Members {
  175. bdm, err := diskfs.GetBlockDeviceMeta("/dev/" + blockdevice.Name)
  176. if err != nil {
  177. log.Println("[RAID] Unable to load block device info: " + err.Error())
  178. results[blockdevice.Name] = &diskfs.BlockDeviceMeta{
  179. Name: blockdevice.Name,
  180. Size: -1,
  181. }
  182. continue
  183. }
  184. results[blockdevice.Name] = bdm
  185. }
  186. js, _ := json.Marshal(results)
  187. utils.SendJSONResponse(w, string(js))
  188. }
  189. // Handle list all the disks that is usable
  190. func (m *Manager) HandleListUsableDevices(w http.ResponseWriter, r *http.Request) {
  191. storageDevices, err := diskfs.ListAllStorageDevices()
  192. if err != nil {
  193. utils.SendErrorResponse(w, err.Error())
  194. return
  195. }
  196. //Filter out the block devices that are disks
  197. usableDisks := []diskfs.BlockDeviceMeta{}
  198. for _, device := range storageDevices.Blockdevices {
  199. if device.Type == "disk" {
  200. usableDisks = append(usableDisks, device)
  201. }
  202. }
  203. js, _ := json.Marshal(usableDisks)
  204. utils.SendJSONResponse(w, string(js))
  205. }
  206. // Handle loading the detail of a given RAID array
  207. func (m *Manager) HandleLoadArrayDetail(w http.ResponseWriter, r *http.Request) {
  208. devName, err := utils.GetPara(r, "dev")
  209. if err != nil {
  210. utils.SendErrorResponse(w, "invalid device name given")
  211. return
  212. }
  213. if !strings.HasPrefix(devName, "/dev/") {
  214. devName = "/dev/" + devName
  215. }
  216. //Check device exists
  217. if !utils.FileExists(devName) {
  218. utils.SendErrorResponse(w, "target device not exists")
  219. return
  220. }
  221. //Get status of the array
  222. targetRAIDInfo, err := m.GetRAIDInfo(devName)
  223. if err != nil {
  224. utils.SendErrorResponse(w, err.Error())
  225. return
  226. }
  227. js, _ := json.Marshal(targetRAIDInfo)
  228. utils.SendJSONResponse(w, string(js))
  229. }
  230. // Handle formating a device
  231. func (m *Manager) HandleFormatRaidDevice(w http.ResponseWriter, r *http.Request) {
  232. devName, err := utils.GetPara(r, "devName")
  233. if err != nil {
  234. utils.SendErrorResponse(w, "invalid device name given")
  235. return
  236. }
  237. format, err := utils.GetPara(r, "format")
  238. if err != nil {
  239. utils.SendErrorResponse(w, "invalid device name given")
  240. return
  241. }
  242. if !strings.HasPrefix(devName, "/dev/") {
  243. devName = "/dev/" + devName
  244. }
  245. //Check if the target device exists
  246. if !m.RAIDDeviceExists(devName) {
  247. utils.SendErrorResponse(w, "target not exists or not a valid RAID device")
  248. return
  249. }
  250. //Format the drive
  251. err = diskfs.FormatStorageDevice(format, devName)
  252. if err != nil {
  253. utils.SendErrorResponse(w, err.Error())
  254. return
  255. }
  256. utils.SendOK(w)
  257. }
  258. // List all the raid device in this system
  259. func (m *Manager) HandleListRaidDevices(w http.ResponseWriter, r *http.Request) {
  260. rdevs, err := m.GetRAIDDevicesFromProcMDStat()
  261. if err != nil {
  262. utils.SendErrorResponse(w, err.Error())
  263. return
  264. }
  265. results := []*RAIDInfo{}
  266. for _, rdev := range rdevs {
  267. arrayInfo, err := m.GetRAIDInfo("/dev/" + rdev.Name)
  268. if err != nil {
  269. continue
  270. }
  271. results = append(results, arrayInfo)
  272. }
  273. js, _ := json.Marshal(results)
  274. utils.SendJSONResponse(w, string(js))
  275. }
  276. // Create a RAID storage pool
  277. func (m *Manager) HandleCreateRAIDDevice(w http.ResponseWriter, r *http.Request) {
  278. devName, err := utils.PostPara(r, "devName")
  279. if err != nil || devName == "" {
  280. //Use auto generated one
  281. devName, err = GetNextAvailableMDDevice()
  282. if err != nil {
  283. utils.SendErrorResponse(w, err.Error())
  284. return
  285. }
  286. }
  287. raidName, err := utils.PostPara(r, "raidName")
  288. if err != nil {
  289. utils.SendErrorResponse(w, "invalid raid storage name given")
  290. return
  291. }
  292. raidLevelStr, err := utils.PostPara(r, "level")
  293. if err != nil {
  294. utils.SendErrorResponse(w, "invalid raid level given")
  295. return
  296. }
  297. raidDevicesJSON, err := utils.PostPara(r, "raidDev")
  298. if err != nil {
  299. utils.SendErrorResponse(w, "invalid raid device array given")
  300. return
  301. }
  302. spareDevicesJSON, err := utils.PostPara(r, "spareDev")
  303. if err != nil {
  304. utils.SendErrorResponse(w, "invalid spare device array given")
  305. return
  306. }
  307. //Get if superblock require all zeroed (will also do formating after raid constructed)
  308. zerosuperblock, err := utils.PostBool(r, "zerosuperblock")
  309. if err != nil {
  310. zerosuperblock = false
  311. }
  312. //Convert raidDevices and spareDevices ID into string slice
  313. raidDevices := []string{}
  314. spareDevices := []string{}
  315. err = json.Unmarshal([]byte(raidDevicesJSON), &raidDevices)
  316. if err != nil {
  317. utils.SendErrorResponse(w, "unable to parse raid device into array")
  318. return
  319. }
  320. err = json.Unmarshal([]byte(spareDevicesJSON), &spareDevices)
  321. if err != nil {
  322. utils.SendErrorResponse(w, "unable to parse spare devices into array")
  323. return
  324. }
  325. //Make sure RAID Name do not contain spaces or werid charcters
  326. if strings.Contains(raidName, " ") {
  327. utils.SendErrorResponse(w, "raid name cannot contain space")
  328. return
  329. }
  330. //Convert raidLevel to int
  331. raidLevelStr = strings.TrimPrefix(raidLevelStr, "raid")
  332. raidLevel, err := strconv.Atoi(raidLevelStr)
  333. if err != nil {
  334. utils.SendErrorResponse(w, "invalid raid level given")
  335. return
  336. }
  337. if zerosuperblock {
  338. //Format each drives
  339. drivesToZeroblocks := []string{}
  340. for _, raidDev := range raidDevices {
  341. if !strings.HasPrefix(raidDev, "/dev/") {
  342. //Prepend /dev/ to it if not set
  343. raidDev = filepath.Join("/dev/", raidDev)
  344. }
  345. if !utils.FileExists(raidDev) {
  346. //This disk not found
  347. utils.SendErrorResponse(w, raidDev+" not found")
  348. return
  349. }
  350. thisDisk := raidDev
  351. drivesToZeroblocks = append(drivesToZeroblocks, thisDisk)
  352. }
  353. for _, spareDev := range spareDevices {
  354. if !strings.HasPrefix(spareDev, "/dev/") {
  355. //Prepend /dev/ to it if not set
  356. spareDev = filepath.Join("/dev/", spareDev)
  357. }
  358. if !utils.FileExists(spareDev) {
  359. //This disk not found
  360. utils.SendErrorResponse(w, spareDev+" not found")
  361. return
  362. }
  363. thisDisk := spareDev
  364. drivesToZeroblocks = append(drivesToZeroblocks, thisDisk)
  365. }
  366. for _, clearPendingDisk := range drivesToZeroblocks {
  367. //Format all drives
  368. log.Println("RAID", "Clearning superblock for disk "+clearPendingDisk, nil)
  369. err = m.ClearSuperblock(clearPendingDisk)
  370. if err != nil {
  371. log.Println("RAID", "Unable to format "+clearPendingDisk+": "+err.Error(), err)
  372. utils.SendErrorResponse(w, err.Error())
  373. return
  374. }
  375. }
  376. }
  377. //Create the RAID device
  378. err = m.CreateRAIDDevice(devName, raidName, raidLevel, raidDevices, spareDevices)
  379. if err != nil {
  380. utils.SendErrorResponse(w, err.Error())
  381. return
  382. }
  383. //Update the mdadm config
  384. err = m.UpdateMDADMConfig()
  385. if err != nil {
  386. utils.SendErrorResponse(w, err.Error())
  387. return
  388. }
  389. utils.SendOK(w)
  390. }
  391. // Request to reload the RAID manager and scan new / fix missing raid pools
  392. func (m *Manager) HandleRaidDevicesAssemble(w http.ResponseWriter, r *http.Request) {
  393. err := m.RestartRAIDService()
  394. if err != nil {
  395. utils.SendErrorResponse(w, err.Error())
  396. return
  397. }
  398. utils.SendOK(w)
  399. }
  400. // Remove a given raid device with its name, USE WITH CAUTION
  401. func (m *Manager) HandleRemoveRaideDevice(w http.ResponseWriter, r *http.Request) {
  402. //TODO: Add protection and switch to POST
  403. targetDevice, err := utils.PostPara(r, "raidDev")
  404. if err != nil {
  405. utils.SendErrorResponse(w, "target device not given")
  406. return
  407. }
  408. //Check if the raid device exists
  409. if !m.RAIDDeviceExists(targetDevice) {
  410. utils.SendErrorResponse(w, "target device not exists")
  411. return
  412. }
  413. //Get the RAID device memeber disks
  414. targetRAIDDevice, err := m.GetRAIDDeviceByDevicePath(targetDevice)
  415. if err != nil {
  416. utils.SendErrorResponse(w, "error occured when trying to load target RAID device info")
  417. return
  418. }
  419. //Check if it is mounted. If yes, unmount it
  420. if !strings.HasPrefix(targetDevice, "/dev/") {
  421. targetDevice = filepath.Join("/dev/", targetDevice)
  422. }
  423. mounted, err := diskfs.DeviceIsMounted(targetDevice)
  424. if err != nil {
  425. log.Println("RAID", "Unmount failed: "+err.Error(), err)
  426. utils.SendErrorResponse(w, err.Error())
  427. return
  428. }
  429. if mounted {
  430. log.Println("RAID", targetDevice+" is mounted. Trying to unmount...", nil)
  431. err = diskfs.UnmountDevice(targetDevice)
  432. if err != nil {
  433. log.Println("[RAID] Unmount failed: " + err.Error())
  434. utils.SendErrorResponse(w, err.Error())
  435. return
  436. }
  437. //Wait for 3 seconds to check if it is still mounted
  438. counter := 0
  439. for counter < 3 {
  440. mounted, _ := diskfs.DeviceIsMounted(targetDevice)
  441. if mounted {
  442. //Still not unmounted. Wait for it
  443. log.Println("RAID", "Device still mounted. Retrying in 1 second", nil)
  444. counter++
  445. time.Sleep(1 * time.Second)
  446. } else {
  447. break
  448. }
  449. }
  450. //Check if it is still mounted
  451. mounted, _ = diskfs.DeviceIsMounted(targetDevice)
  452. if mounted {
  453. utils.SendErrorResponse(w, "unmount RAID partition failed: device is busy")
  454. return
  455. }
  456. }
  457. //Give it some time for the raid device to finish umount
  458. time.Sleep(300 * time.Millisecond)
  459. //Stop & Remove RAID service on the target device
  460. err = m.StopRAIDDevice(targetDevice)
  461. if err != nil {
  462. log.Println("RAID", "Stop RAID partition failed: "+err.Error(), err)
  463. utils.SendErrorResponse(w, err.Error())
  464. return
  465. }
  466. //Zeroblock the RAID device member disks
  467. for _, memberDisk := range targetRAIDDevice.Members {
  468. //Member disk name do not contain full path
  469. name := memberDisk.Name
  470. if !strings.HasPrefix(name, "/dev/") {
  471. name = filepath.Join("/dev/", name)
  472. }
  473. err = m.ClearSuperblock(name)
  474. if err != nil {
  475. log.Println("RAID", "Unable to clear superblock on device "+name, err)
  476. continue
  477. }
  478. }
  479. //Update the mdadm config
  480. err = m.UpdateMDADMConfig()
  481. if err != nil {
  482. utils.SendErrorResponse(w, err.Error())
  483. return
  484. }
  485. //Done
  486. utils.SendOK(w)
  487. }
  488. // Force reload all RAID config from file
  489. func (m *Manager) HandleForceAssembleReload(w http.ResponseWriter, r *http.Request) {
  490. err := m.FlushReload()
  491. if err != nil {
  492. log.Println("RAID", "mdadm reload failed: "+err.Error(), err)
  493. utils.SendErrorResponse(w, err.Error())
  494. return
  495. }
  496. utils.SendOK(w)
  497. }
  498. // Grow the raid array to maxmium possible size of the current disks
  499. func (m *Manager) HandleGrowRAIDArray(w http.ResponseWriter, r *http.Request) {
  500. deviceName, err := utils.PostPara(r, "raidDev")
  501. if err != nil {
  502. utils.SendErrorResponse(w, "raid device not given")
  503. return
  504. }
  505. if !m.RAIDDeviceExists(deviceName) {
  506. utils.SendErrorResponse(w, "target raid device not exists")
  507. return
  508. }
  509. //Check the raid is healthy and ok for expansion
  510. raidNotHealthy, err := m.RAIDArrayContainsFailedDisks(deviceName)
  511. if err != nil {
  512. utils.SendErrorResponse(w, "unable to check health state before expansion")
  513. return
  514. }
  515. if raidNotHealthy {
  516. utils.SendErrorResponse(w, "expand can only be performed on a healthy array")
  517. return
  518. }
  519. //Expand the raid array
  520. err = m.GrowRAIDDevice(deviceName)
  521. if err != nil {
  522. utils.SendErrorResponse(w, err.Error())
  523. return
  524. }
  525. err = m.RestartRAIDService()
  526. if err != nil {
  527. utils.SendErrorResponse(w, err.Error())
  528. return
  529. }
  530. utils.SendOK(w)
  531. }
  532. // HandleRenderOverview List the info and health of all loaded RAID array
  533. func (m *Manager) HandleRenderOverview(w http.ResponseWriter, r *http.Request) {
  534. //Get all raid device from procmd
  535. rdevs, err := m.GetRAIDDevicesFromProcMDStat()
  536. if err != nil {
  537. utils.SendErrorResponse(w, err.Error())
  538. return
  539. }
  540. type RaidHealthOverview struct {
  541. Name string
  542. Status string
  543. Level string
  544. UsedSize int64
  545. TotalSize int64
  546. IsHealthy bool
  547. }
  548. results := []*RaidHealthOverview{}
  549. //Get RAID Status for each devices
  550. for _, raidDev := range rdevs {
  551. //Fill in the basic information
  552. thisRaidOverview := RaidHealthOverview{
  553. Name: raidDev.Name,
  554. Status: raidDev.Status,
  555. Level: raidDev.Level,
  556. UsedSize: -1,
  557. TotalSize: -1,
  558. IsHealthy: false,
  559. }
  560. //Get health status of RAID
  561. raidPath := filepath.Join("/dev/", strings.TrimPrefix(raidDev.Name, "/dev/"))
  562. raidStatus, err := GetRAIDStatus(raidPath)
  563. if err == nil {
  564. thisRaidOverview.IsHealthy = raidStatus.isHealthy()
  565. }
  566. // Get RAID vol size and info
  567. raidPartitionSize, err := GetRAIDPartitionSize(raidPath)
  568. if err == nil {
  569. thisRaidOverview.TotalSize = raidPartitionSize
  570. }
  571. raidUsedSize, err := GetRAIDUsedSize(raidPath)
  572. if err == nil {
  573. thisRaidOverview.UsedSize = raidUsedSize
  574. }
  575. results = append(results, &thisRaidOverview)
  576. }
  577. js, _ := json.Marshal(results)
  578. utils.SendJSONResponse(w, string(js))
  579. }
  580. /* Sync State Related Features */
  581. // HandleGetRAIDSyncState Get the sync state of a given RAID device
  582. func (m *Manager) HandleGetRAIDSyncState(w http.ResponseWriter, r *http.Request) {
  583. devName, err := utils.GetPara(r, "dev")
  584. if err != nil {
  585. utils.SendErrorResponse(w, "invalid device name given")
  586. return
  587. }
  588. if !strings.HasPrefix(devName, "/dev/") {
  589. devName = filepath.Join("/dev/", devName)
  590. }
  591. //Get the sync state of the RAID device
  592. syncState, err := m.GetSyncStateByPath(devName)
  593. if err != nil {
  594. utils.SendErrorResponse(w, err.Error())
  595. return
  596. }
  597. js, _ := json.Marshal(syncState)
  598. utils.SendJSONResponse(w, string(js))
  599. }
  600. // HandleSyncPendingToReadWrite Set the pending sync to read-write mode
  601. // to reactivate the resync process
  602. func (m *Manager) HandleSyncPendingToReadWrite(w http.ResponseWriter, r *http.Request) {
  603. devName, err := utils.PostPara(r, "dev")
  604. if err != nil {
  605. utils.SendErrorResponse(w, "invalid device name given")
  606. return
  607. }
  608. if !strings.HasPrefix(devName, "/dev/") {
  609. devName = filepath.Join("/dev/", devName)
  610. }
  611. //Set the pending sync to read-write mode
  612. err = m.SetSyncPendingToReadWrite(devName)
  613. if err != nil {
  614. utils.SendErrorResponse(w, err.Error())
  615. return
  616. }
  617. utils.SendOK(w)
  618. }