forked from TrueCloudLab/frostfs-s3-gw
155 lines
4.4 KiB
Go
155 lines
4.4 KiB
Go
|
/*
|
||
|
* MinIO Cloud Storage, (C) 2019 MinIO, Inc.
|
||
|
*
|
||
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
||
|
* you may not use this file except in compliance with the License.
|
||
|
* You may obtain a copy of the License at
|
||
|
*
|
||
|
* http://www.apache.org/licenses/LICENSE-2.0
|
||
|
*
|
||
|
* Unless required by applicable law or agreed to in writing, software
|
||
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
||
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||
|
* See the License for the specific language governing permissions and
|
||
|
* limitations under the License.
|
||
|
*/
|
||
|
|
||
|
package cache
|
||
|
|
||
|
import (
|
||
|
"encoding/json"
|
||
|
"errors"
|
||
|
"path/filepath"
|
||
|
"strings"
|
||
|
|
||
|
"github.com/minio/minio/cmd/config"
|
||
|
"github.com/minio/minio/pkg/ellipses"
|
||
|
)
|
||
|
|
||
|
// Config represents cache config settings
|
||
|
type Config struct {
|
||
|
Enabled bool `json:"-"`
|
||
|
Drives []string `json:"drives"`
|
||
|
Expiry int `json:"expiry"`
|
||
|
MaxUse int `json:"maxuse"`
|
||
|
Quota int `json:"quota"`
|
||
|
Exclude []string `json:"exclude"`
|
||
|
After int `json:"after"`
|
||
|
WatermarkLow int `json:"watermark_low"`
|
||
|
WatermarkHigh int `json:"watermark_high"`
|
||
|
Range bool `json:"range"`
|
||
|
}
|
||
|
|
||
|
// UnmarshalJSON - implements JSON unmarshal interface for unmarshalling
|
||
|
// json entries for CacheConfig.
|
||
|
func (cfg *Config) UnmarshalJSON(data []byte) (err error) {
|
||
|
type Alias Config
|
||
|
var _cfg = &struct {
|
||
|
*Alias
|
||
|
}{
|
||
|
Alias: (*Alias)(cfg),
|
||
|
}
|
||
|
if err = json.Unmarshal(data, _cfg); err != nil {
|
||
|
return err
|
||
|
}
|
||
|
|
||
|
if _cfg.Expiry < 0 {
|
||
|
return errors.New("config expiry value should not be negative")
|
||
|
}
|
||
|
|
||
|
if _cfg.MaxUse < 0 {
|
||
|
return errors.New("config max use value should not be null or negative")
|
||
|
}
|
||
|
|
||
|
if _cfg.Quota < 0 {
|
||
|
return errors.New("config quota value should not be null or negative")
|
||
|
}
|
||
|
if _cfg.After < 0 {
|
||
|
return errors.New("cache after value should not be less than 0")
|
||
|
}
|
||
|
if _cfg.WatermarkLow < 0 || _cfg.WatermarkLow > 100 {
|
||
|
return errors.New("config low watermark value should be between 0 and 100")
|
||
|
}
|
||
|
if _cfg.WatermarkHigh < 0 || _cfg.WatermarkHigh > 100 {
|
||
|
return errors.New("config high watermark value should be between 0 and 100")
|
||
|
}
|
||
|
if _cfg.WatermarkLow > 0 && (_cfg.WatermarkLow >= _cfg.WatermarkHigh) {
|
||
|
return errors.New("config low watermark value should be less than high watermark")
|
||
|
}
|
||
|
return nil
|
||
|
}
|
||
|
|
||
|
// Parses given cacheDrivesEnv and returns a list of cache drives.
|
||
|
func parseCacheDrives(drives string) ([]string, error) {
|
||
|
var drivesSlice []string
|
||
|
if len(drives) == 0 {
|
||
|
return drivesSlice, nil
|
||
|
}
|
||
|
|
||
|
drivesSlice = strings.Split(drives, cacheDelimiterLegacy)
|
||
|
if len(drivesSlice) == 1 && drivesSlice[0] == drives {
|
||
|
drivesSlice = strings.Split(drives, cacheDelimiter)
|
||
|
}
|
||
|
|
||
|
var endpoints []string
|
||
|
for _, d := range drivesSlice {
|
||
|
if len(d) == 0 {
|
||
|
return nil, config.ErrInvalidCacheDrivesValue(nil).Msg("cache dir cannot be an empty path")
|
||
|
}
|
||
|
if ellipses.HasEllipses(d) {
|
||
|
s, err := parseCacheDrivePaths(d)
|
||
|
if err != nil {
|
||
|
return nil, err
|
||
|
}
|
||
|
endpoints = append(endpoints, s...)
|
||
|
} else {
|
||
|
endpoints = append(endpoints, d)
|
||
|
}
|
||
|
}
|
||
|
|
||
|
for _, d := range endpoints {
|
||
|
if !filepath.IsAbs(d) {
|
||
|
return nil, config.ErrInvalidCacheDrivesValue(nil).Msg("cache dir should be absolute path: %s", d)
|
||
|
}
|
||
|
}
|
||
|
return endpoints, nil
|
||
|
}
|
||
|
|
||
|
// Parses all arguments and returns a slice of drive paths following the ellipses pattern.
|
||
|
func parseCacheDrivePaths(arg string) (ep []string, err error) {
|
||
|
patterns, perr := ellipses.FindEllipsesPatterns(arg)
|
||
|
if perr != nil {
|
||
|
return []string{}, config.ErrInvalidCacheDrivesValue(nil).Msg(perr.Error())
|
||
|
}
|
||
|
|
||
|
for _, lbls := range patterns.Expand() {
|
||
|
ep = append(ep, strings.Join(lbls, ""))
|
||
|
}
|
||
|
|
||
|
return ep, nil
|
||
|
}
|
||
|
|
||
|
// Parses given cacheExcludesEnv and returns a list of cache exclude patterns.
|
||
|
func parseCacheExcludes(excludes string) ([]string, error) {
|
||
|
var excludesSlice []string
|
||
|
if len(excludes) == 0 {
|
||
|
return excludesSlice, nil
|
||
|
}
|
||
|
|
||
|
excludesSlice = strings.Split(excludes, cacheDelimiterLegacy)
|
||
|
if len(excludesSlice) == 1 && excludesSlice[0] == excludes {
|
||
|
excludesSlice = strings.Split(excludes, cacheDelimiter)
|
||
|
}
|
||
|
|
||
|
for _, e := range excludesSlice {
|
||
|
if len(e) == 0 {
|
||
|
return nil, config.ErrInvalidCacheExcludesValue(nil).Msg("cache exclude path (%s) cannot be empty", e)
|
||
|
}
|
||
|
if strings.HasPrefix(e, "/") {
|
||
|
return nil, config.ErrInvalidCacheExcludesValue(nil).Msg("cache exclude pattern (%s) cannot start with / as prefix", e)
|
||
|
}
|
||
|
}
|
||
|
|
||
|
return excludesSlice, nil
|
||
|
}
|