2013-12-02 17:37:36 +08:00
|
|
|
package weed_server
|
|
|
|
|
|
|
|
import (
|
2015-01-08 16:19:32 +08:00
|
|
|
"fmt"
|
2014-10-27 02:34:55 +08:00
|
|
|
"net/http"
|
|
|
|
"net/http/httputil"
|
|
|
|
"net/url"
|
|
|
|
"sync"
|
|
|
|
|
2015-05-04 03:37:49 +08:00
|
|
|
"github.com/chrislusf/raft"
|
2016-06-03 09:09:14 +08:00
|
|
|
"github.com/chrislusf/seaweedfs/weed/glog"
|
|
|
|
"github.com/chrislusf/seaweedfs/weed/security"
|
|
|
|
"github.com/chrislusf/seaweedfs/weed/sequence"
|
|
|
|
"github.com/chrislusf/seaweedfs/weed/topology"
|
|
|
|
"github.com/chrislusf/seaweedfs/weed/util"
|
2013-12-02 17:37:36 +08:00
|
|
|
"github.com/gorilla/mux"
|
|
|
|
)
|
|
|
|
|
|
|
|
type MasterServer struct {
|
2014-03-03 14:16:54 +08:00
|
|
|
port int
|
|
|
|
metaFolder string
|
|
|
|
volumeSizeLimitMB uint
|
2017-01-09 03:01:46 +08:00
|
|
|
preallocate int64
|
2014-03-03 14:16:54 +08:00
|
|
|
pulseSeconds int
|
|
|
|
defaultReplicaPlacement string
|
|
|
|
garbageThreshold string
|
2015-02-08 07:35:28 +08:00
|
|
|
guard *security.Guard
|
2013-12-02 17:37:36 +08:00
|
|
|
|
2014-03-16 14:03:49 +08:00
|
|
|
Topo *topology.Topology
|
2014-04-13 16:29:52 +08:00
|
|
|
vg *topology.VolumeGrowth
|
2013-12-02 17:37:36 +08:00
|
|
|
vgLock sync.Mutex
|
2014-02-05 17:54:52 +08:00
|
|
|
|
2014-03-13 01:30:57 +08:00
|
|
|
bounedLeaderChan chan int
|
2013-12-02 17:37:36 +08:00
|
|
|
}
|
|
|
|
|
2014-03-26 04:46:59 +08:00
|
|
|
func NewMasterServer(r *mux.Router, port int, metaFolder string,
|
2013-12-02 17:37:36 +08:00
|
|
|
volumeSizeLimitMB uint,
|
2017-01-09 03:01:46 +08:00
|
|
|
preallocate bool,
|
2013-12-02 17:37:36 +08:00
|
|
|
pulseSeconds int,
|
|
|
|
confFile string,
|
2014-03-03 14:16:54 +08:00
|
|
|
defaultReplicaPlacement string,
|
2013-12-02 17:37:36 +08:00
|
|
|
garbageThreshold string,
|
2014-02-05 17:54:52 +08:00
|
|
|
whiteList []string,
|
2015-01-06 06:20:04 +08:00
|
|
|
secureKey string,
|
2014-02-05 17:54:52 +08:00
|
|
|
) *MasterServer {
|
2017-01-09 03:01:46 +08:00
|
|
|
|
|
|
|
var preallocateSize int64
|
|
|
|
if preallocate {
|
|
|
|
preallocateSize = int64(volumeSizeLimitMB) * (1 << 20)
|
|
|
|
}
|
2013-12-02 17:37:36 +08:00
|
|
|
ms := &MasterServer{
|
2014-04-16 00:09:40 +08:00
|
|
|
port: port,
|
2014-03-03 14:16:54 +08:00
|
|
|
volumeSizeLimitMB: volumeSizeLimitMB,
|
2017-01-09 03:01:46 +08:00
|
|
|
preallocate: preallocateSize,
|
2014-03-03 14:16:54 +08:00
|
|
|
pulseSeconds: pulseSeconds,
|
|
|
|
defaultReplicaPlacement: defaultReplicaPlacement,
|
|
|
|
garbageThreshold: garbageThreshold,
|
2013-12-02 17:37:36 +08:00
|
|
|
}
|
2014-03-13 01:30:57 +08:00
|
|
|
ms.bounedLeaderChan = make(chan int, 16)
|
2014-04-17 14:43:27 +08:00
|
|
|
seq := sequence.NewMemorySequencer()
|
2013-12-02 17:37:36 +08:00
|
|
|
var e error
|
2014-03-16 14:03:49 +08:00
|
|
|
if ms.Topo, e = topology.NewTopology("topo", confFile, seq,
|
2013-12-02 17:37:36 +08:00
|
|
|
uint64(volumeSizeLimitMB)*1024*1024, pulseSeconds); e != nil {
|
|
|
|
glog.Fatalf("cannot create topology:%s", e)
|
|
|
|
}
|
2014-04-13 16:29:52 +08:00
|
|
|
ms.vg = topology.NewDefaultVolumeGrowth()
|
2013-12-02 17:37:36 +08:00
|
|
|
glog.V(0).Infoln("Volume Size Limit is", volumeSizeLimitMB, "MB")
|
|
|
|
|
2015-02-08 07:35:28 +08:00
|
|
|
ms.guard = security.NewGuard(whiteList, secureKey)
|
2015-01-06 06:20:04 +08:00
|
|
|
|
2015-03-23 03:50:04 +08:00
|
|
|
r.HandleFunc("/", ms.uiStatusHandler)
|
2015-03-20 01:39:22 +08:00
|
|
|
r.HandleFunc("/ui/index.html", ms.uiStatusHandler)
|
2015-02-08 07:35:28 +08:00
|
|
|
r.HandleFunc("/dir/assign", ms.proxyToLeader(ms.guard.WhiteList(ms.dirAssignHandler)))
|
|
|
|
r.HandleFunc("/dir/lookup", ms.proxyToLeader(ms.guard.WhiteList(ms.dirLookupHandler)))
|
|
|
|
r.HandleFunc("/dir/join", ms.proxyToLeader(ms.guard.WhiteList(ms.dirJoinHandler)))
|
|
|
|
r.HandleFunc("/dir/status", ms.proxyToLeader(ms.guard.WhiteList(ms.dirStatusHandler)))
|
|
|
|
r.HandleFunc("/col/delete", ms.proxyToLeader(ms.guard.WhiteList(ms.collectionDeleteHandler)))
|
|
|
|
r.HandleFunc("/vol/lookup", ms.proxyToLeader(ms.guard.WhiteList(ms.volumeLookupHandler)))
|
|
|
|
r.HandleFunc("/vol/grow", ms.proxyToLeader(ms.guard.WhiteList(ms.volumeGrowHandler)))
|
|
|
|
r.HandleFunc("/vol/status", ms.proxyToLeader(ms.guard.WhiteList(ms.volumeStatusHandler)))
|
|
|
|
r.HandleFunc("/vol/vacuum", ms.proxyToLeader(ms.guard.WhiteList(ms.volumeVacuumHandler)))
|
|
|
|
r.HandleFunc("/submit", ms.guard.WhiteList(ms.submitFromMasterServerHandler))
|
|
|
|
r.HandleFunc("/delete", ms.guard.WhiteList(ms.deleteFromMasterServerHandler))
|
2015-06-23 02:41:51 +08:00
|
|
|
r.HandleFunc("/{fileId}", ms.proxyToLeader(ms.redirectHandler))
|
2015-02-08 07:35:28 +08:00
|
|
|
r.HandleFunc("/stats/counter", ms.guard.WhiteList(statsCounterHandler))
|
|
|
|
r.HandleFunc("/stats/memory", ms.guard.WhiteList(statsMemoryHandler))
|
2013-12-02 17:37:36 +08:00
|
|
|
|
2014-03-16 14:03:49 +08:00
|
|
|
ms.Topo.StartRefreshWritableVolumes(garbageThreshold)
|
2013-12-02 17:37:36 +08:00
|
|
|
|
|
|
|
return ms
|
|
|
|
}
|
2014-02-05 17:54:52 +08:00
|
|
|
|
|
|
|
func (ms *MasterServer) SetRaftServer(raftServer *RaftServer) {
|
2014-03-16 14:03:49 +08:00
|
|
|
ms.Topo.RaftServer = raftServer.raftServer
|
|
|
|
ms.Topo.RaftServer.AddEventListener(raft.LeaderChangeEventType, func(e raft.Event) {
|
2014-04-12 07:23:58 +08:00
|
|
|
if ms.Topo.RaftServer.Leader() != "" {
|
|
|
|
glog.V(0).Infoln("[", ms.Topo.RaftServer.Name(), "]", ms.Topo.RaftServer.Leader(), "becomes leader.")
|
|
|
|
}
|
2014-02-10 15:37:29 +08:00
|
|
|
})
|
2014-03-16 14:03:49 +08:00
|
|
|
if ms.Topo.IsLeader() {
|
|
|
|
glog.V(0).Infoln("[", ms.Topo.RaftServer.Name(), "]", "I am the leader!")
|
2014-02-10 15:37:29 +08:00
|
|
|
} else {
|
2014-04-12 07:23:58 +08:00
|
|
|
if ms.Topo.RaftServer.Leader() != "" {
|
|
|
|
glog.V(0).Infoln("[", ms.Topo.RaftServer.Name(), "]", ms.Topo.RaftServer.Leader(), "is the leader.")
|
|
|
|
}
|
2014-02-10 15:37:29 +08:00
|
|
|
}
|
2014-02-05 17:54:52 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
func (ms *MasterServer) proxyToLeader(f func(w http.ResponseWriter, r *http.Request)) func(w http.ResponseWriter, r *http.Request) {
|
|
|
|
return func(w http.ResponseWriter, r *http.Request) {
|
2014-03-16 14:03:49 +08:00
|
|
|
if ms.Topo.IsLeader() {
|
2014-02-05 17:54:52 +08:00
|
|
|
f(w, r)
|
2014-04-17 14:43:27 +08:00
|
|
|
} else if ms.Topo.RaftServer != nil && ms.Topo.RaftServer.Leader() != "" {
|
2014-03-13 01:30:57 +08:00
|
|
|
ms.bounedLeaderChan <- 1
|
|
|
|
defer func() { <-ms.bounedLeaderChan }()
|
2014-03-16 14:03:49 +08:00
|
|
|
targetUrl, err := url.Parse("http://" + ms.Topo.RaftServer.Leader())
|
2014-04-13 16:29:52 +08:00
|
|
|
if err != nil {
|
2015-01-08 16:19:32 +08:00
|
|
|
writeJsonError(w, r, http.StatusInternalServerError,
|
|
|
|
fmt.Errorf("Leader URL http://%s Parse Error: %v", ms.Topo.RaftServer.Leader(), err))
|
2014-02-05 17:54:52 +08:00
|
|
|
return
|
|
|
|
}
|
2014-03-16 14:03:49 +08:00
|
|
|
glog.V(4).Infoln("proxying to leader", ms.Topo.RaftServer.Leader())
|
2014-02-05 17:54:52 +08:00
|
|
|
proxy := httputil.NewSingleHostReverseProxy(targetUrl)
|
2015-11-23 01:31:39 +08:00
|
|
|
director := proxy.Director
|
|
|
|
proxy.Director = func(req *http.Request) {
|
|
|
|
actualHost, err := security.GetActualRemoteHost(req)
|
|
|
|
if err == nil {
|
2015-11-23 02:11:25 +08:00
|
|
|
req.Header.Set("HTTP_X_FORWARDED_FOR", actualHost)
|
2015-11-23 01:31:39 +08:00
|
|
|
}
|
|
|
|
director(req)
|
|
|
|
}
|
2014-03-13 01:30:57 +08:00
|
|
|
proxy.Transport = util.Transport
|
2014-02-05 17:54:52 +08:00
|
|
|
proxy.ServeHTTP(w, r)
|
2014-04-13 16:29:52 +08:00
|
|
|
} else {
|
|
|
|
//drop it to the floor
|
2014-05-27 08:34:54 +08:00
|
|
|
//writeJsonError(w, r, errors.New(ms.Topo.RaftServer.Name()+" does not know Leader yet:"+ms.Topo.RaftServer.Leader()))
|
2014-02-05 17:54:52 +08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|