Versions in this module Expand all Collapse all v1 v1.0.1 Nov 28, 2023 Changes in this version + const K8SAPIServerTLSRootCA + const K8sAPIServer + const KESImageVersion + const KesConfigVersion1 + const KesConfigVersion2 + const Marketplace + const MinioImage + const OperatorSAToken + const OperatorUIHostname + const OperatorUIPort + const OperatorUITLSPort + const SecureAllowedHosts + const SecureAllowedHostsAreRegex + const SecureBrowserXSSFilter + const SecureContentSecurityPolicy + const SecureContentSecurityPolicyReportOnly + const SecureContentTypeNoSniff + const SecureExpectCTHeader + const SecureFeaturePolicy + const SecureForceSTSHeader + const SecureFrameDeny + const SecureHostsProxyHeaders + const SecurePublicKey + const SecureReferrerPolicy + const SecureSTSIncludeSubdomains + const SecureSTSPreload + const SecureSTSSeconds + const SecureTLSHost + const SecureTLSRedirect + const SecureTLSTemporaryRedirect + const SlashSeparator + const SubPath + var ErrAccessDenied = errors.New("access denied") + var ErrAvoidSelfAccountDelete = errors.New("logged in user cannot be deleted by itself") + var ErrBadRequest = errors.New("400 Bad Request") + var ErrBucketBodyNotInRequest = errors.New("error bucket body not in request") + var ErrBucketLifeCycleNotConfigured = errors.New("error bucket life cycle configuration not found") + var ErrBucketNameNotInRequest = errors.New("error bucket name not in request") + var ErrChangePassword = errors.New("error please check your current password") + var ErrDefault = errors.New("an error occurred, please try again") + var ErrDeletingEncryptionConfig = errors.New("error disabling tenant encryption") + var ErrEncryptionConfigNotFound = errors.New("encryption configuration not found") + var ErrFewerThanFourNodes = errors.New("at least 4 nodes are required for a tenant") + var ErrFileTooLarge = errors.New("413 File too Large") + var ErrForbidden = errors.New("403 Forbidden") + var ErrGroupAlreadyExists = errors.New("error group name already in use") + var ErrGroupBodyNotInRequest = errors.New("error group body not in request") + var ErrGroupNameNotInRequest = errors.New("error group name not in request") + var ErrInvalidEncryptionAlgorithm = errors.New("error invalid encryption algorithm") + var ErrInvalidErasureCodingValue = errors.New("invalid Erasure Coding Value") + var ErrInvalidLicense = errors.New("invalid license key") + var ErrInvalidLogin = errors.New("invalid Login") + var ErrInvalidSession = errors.New("invalid session") + var ErrLicenseNotFound = errors.New("license not found") + var ErrLoginNotAllowed = errors.New("login not allowed") + var ErrNonUniqueAccessKey = errors.New("access key already in use") + var ErrNotFound = errors.New("not found") + var ErrOauth2Provider = errors.New("unable to contact configured identity provider") + var ErrPolicyBodyNotInRequest = errors.New("error policy body not in request") + var ErrPolicyNameContainsSpace = errors.New("error policy name cannot contain spaces") + var ErrPolicyNameNotInRequest = errors.New("error policy name not in request") + var ErrPolicyNotFound = errors.New("policy does not exist") + var ErrPoolExists = errors.New("pool exists") + var ErrRemoteInvalidCredentials = errors.New("invalid remote tier credentials") + var ErrRemoteTierBucketNotFound = errors.New("remote tier bucket not found") + var ErrRemoteTierExists = errors.New("specified remote tier already exists") + var ErrRemoteTierNotFound = errors.New("specified remote tier was not found") + var ErrRemoteTierUppercase = errors.New("tier name must be in uppercase") + var ErrSSENotConfigured = errors.New("error server side encryption configuration not found") + var ErrTooFewAvailableNodes = errors.New("there is not enough available nodes to satisfy this requirement") + var ErrTooFewNodes = errors.New("there are not enough nodes in the cluster to support this tenant") + var ErrTooManyNodes = errors.New("cannot request more nodes than what is available in the cluster") + var ErrUnableToGetTenantLogs = errors.New("unable to get tenant logs") + var ErrUnableToGetTenantUsage = errors.New("unable to get tenant usage") + var ErrUnableToUpdateTenantCertificates = errors.New("unable to update tenant certificates") + var ErrUpdatingEncryptionConfig = errors.New("unable to update encryption configuration") + var FlatSwaggerJSON json.RawMessage + var GlobalPublicCerts []*x509.Certificate + var GlobalRootCAs *x509.CertPool + var GlobalTLSCertsManager *xcerts.Manager + var Hostname = "" + var InstanceLicensePlan = PlanAGPL + var KesConfigVersionsMap = map[string]interface + var LicenseKey = "" + var LogError = logError + var LogIf = logIf + var LogInfo = logInfo + var MinioServerInfoMock func(ctx context.Context) (madmin.InfoMessage, error) + var Port = "9090" + var SessionDuration = 45 * time.Minute + var SwaggerJSON json.RawMessage + var TLSPort = "9443" + var TLSRedirect = "on" + func AuditLogMiddleware(next http.Handler) http.Handler + func AuthenticationMiddleware(next http.Handler) http.Handler + func BaseURL() string + func ContextMiddleware(next http.Handler) http.Handler + func Error(err ...interface{}) *models.Error + func ErrorWithContext(ctx context.Context, err ...interface{}) *models.Error + func ExpireSessionCookie() http.Cookie + func FileServerMiddleware(next http.Handler) http.Handler + func GenerateTenantConfigurationFile(configuration map[string]string) string + func GetAPIKey(token string) (string, error) + func GetConsoleCredentialsForOperator(jwt string) (*credentials.Credentials, error) + func GetConsoleHTTPClient(address string) *http.Client + func GetHTTPClient() *http.Client + func GetHostname() string + func GetK8sAPIServer() string + func GetK8sConfig(token string) *rest.Config + func GetMinioImage() (*string, error) + func GetOperatorClient(token string) (*operator.Clientset, error) + func GetParityInfo(nodes int64, disksPerNode int64) (models.ParityResponse, error) + func GetPort() int + func GetSecureAllowedHosts() []string + func GetSecureAllowedHostsAreRegex() bool + func GetSecureBrowserXSSFilter() bool + func GetSecureContentSecurityPolicy() string + func GetSecureContentSecurityPolicyReportOnly() string + func GetSecureContentTypeNonSniff() bool + func GetSecureExpectCTHeader() string + func GetSecureFeaturePolicy() string + func GetSecureForceSTSHeader() bool + func GetSecureFrameDeny() bool + func GetSecureHostsProxyHeaders() []string + func GetSecurePublicKey() string + func GetSecureReferrerPolicy() string + func GetSecureSTSIncludeSubdomains() bool + func GetSecureSTSPreload() bool + func GetSecureSTSSeconds() int64 + func GetSecureTLSHost() string + func GetSecureTLSTemporaryRedirect() bool + func GetSubPath() string + func GetTLSPort() int + func GetTLSRedirect() string + func GetTenantConfiguration(ctx context.Context, clientSet K8sClientI, tenant *miniov2.Tenant) (map[string]string, error) + func GetTenantServiceURL(mi *miniov2.Tenant) (svcURL string) + func K8sClient(token string) (*kubernetes.Clientset, error) + func KeyURL() string + func Login() (string, error) + func LoginURL() string + func MFAURL() string + func NewAdminClientWithInsecure(url, accessKey, secretKey, sessionToken string, insecure bool) (*madmin.AdminClient, *probe.Error) + func NewSessionCookieForConsole(token string) http.Cookie + func PrepareClientTransport(insecure bool) *http.Transport + func PrepareConsoleHTTPClient(insecure bool) *http.Client + func PrepareSTSClientTransport(insecure bool) *http.Transport + func RegisterURL() string + func SetPolicy(ctx context.Context, client MinioAdmin, name, entityName string, ...) error + func SubnetLogin(client xhttp.ClientI, username, password string) (string, string, error) + func SubnetRegisterWithAPIKey(ctx context.Context, minioClient MinioAdmin, apiKey string) (bool, error) + type AdminClient struct + Client *madmin.AdminClient + func (ac AdminClient) AccountInfo(ctx context.Context) (madmin.AccountInfo, error) + type AdminClientMock struct + func (ac AdminClientMock) AccountInfo(ctx context.Context) (madmin.AccountInfo, error) + type ConsoleCredentials struct + AccountAccessKey string + ConsoleCredentials *credentials.Credentials + func (c ConsoleCredentials) Expire() + func (c ConsoleCredentials) Get() (credentials.Value, error) + func (c ConsoleCredentials) GetAccountAccessKey() string + type ConsoleCredentialsI interface + Expire func() + Get func() (credentials.Value, error) + GetAccountAccessKey func() string + type Context struct + HTTPPort int + HTTPSPort int + Host string + TLSCertificate string + TLSKey string + TLSRedirect string + TLSca string + func (c *Context) Load(ctx *cli.Context) error + type K8sClientI interface + type LicenseTokenConfig struct + APIKey string + License string + Proxy string + func GetSubnetKeyFromMinIOConfig(ctx context.Context, adminClient MinioAdmin) (*LicenseTokenConfig, error) + func RegisterWithAPIKey(admInfo madmin.InfoMessage, apiKey string) (*LicenseTokenConfig, error) + type MCClient interface + type MinIOConfig struct + OpenIDProviders oauth2.OpenIDPCfg + type MinioAdmin interface + AccountInfo func(ctx context.Context) (madmin.AccountInfo, error) + type MinioClient interface + GetBucketTagging func(ctx context.Context, bucketName string) (*tags.Tags, error) + RemoveBucketTagging func(ctx context.Context, bucketName string) error + SetBucketTagging func(ctx context.Context, bucketName string, tags *tags.Tags) error + type NodeResourceInfo struct + AllocatableCPU int64 + AllocatableMemory int64 + Name string + type OperatorClient interface + Authenticate func(context.Context) ([]byte, error) + type OperatorClientI interface + TenantDelete func(ctx context.Context, namespace string, instanceName string, ...) error + TenantGet func(ctx context.Context, namespace string, instanceName string, ...) (*miniov2.Tenant, error) + TenantList func(ctx context.Context, namespace string, opts metav1.ListOptions) (*miniov2.TenantList, error) + TenantPatch func(ctx context.Context, namespace string, instanceName string, pt types.PatchType, ...) (*miniov2.Tenant, error) + TenantUpdate func(ctx context.Context, tenant *miniov2.Tenant, opts metav1.UpdateOptions) (*miniov2.Tenant, error) + type Server struct + CleanupTimeout time.Duration + EnabledListeners []string + GracefulTimeout time.Duration + Host string + KeepAlive time.Duration + ListenLimit int + MaxHeaderSize flagext.ByteSize + Port int + ReadTimeout time.Duration + SocketPath flags.Filename + TLSCACertificate flags.Filename + TLSCertificate flags.Filename + TLSCertificateKey flags.Filename + TLSHost string + TLSKeepAlive time.Duration + TLSListenLimit int + TLSPort int + TLSReadTimeout time.Duration + TLSWriteTimeout time.Duration + WriteTimeout time.Duration + func NewServer(api *operations.OperatorAPI) *Server + func (s *Server) ConfigureAPI() + func (s *Server) ConfigureFlags() + func (s *Server) Fatalf(f string, args ...interface{}) + func (s *Server) GetHandler() http.Handler + func (s *Server) HTTPListener() (net.Listener, error) + func (s *Server) Listen() error + func (s *Server) Logf(f string, args ...interface{}) + func (s *Server) Serve() (err error) + func (s *Server) SetAPI(api *operations.OperatorAPI) + func (s *Server) SetHandler(handler http.Handler) + func (s *Server) Shutdown() error + func (s *Server) TLSListener() (net.Listener, error) + func (s *Server) UnixListener() (net.Listener, error) + type SubnetPlan int + const PlanAGPL + const PlanEnterprise + const PlanStandard + func (sp SubnetPlan) String() string + type UsageInfo struct + Backend *models.BackendProperties + Buckets int64 + DisksUsage int64 + EndpointNotReady bool + Objects int64 + Servers []*models.ServerProperties + Usage int64 + func GetAdminInfo(ctx context.Context, client MinioAdmin) (*UsageInfo, error)