2015-02-26 15:59:07 +08:00
|
|
|
package weed_server
|
|
|
|
|
|
|
|
import (
|
2019-06-20 15:55:30 +08:00
|
|
|
"context"
|
2015-02-26 15:59:07 +08:00
|
|
|
"errors"
|
2015-12-15 14:38:58 +08:00
|
|
|
"fmt"
|
2015-02-26 15:59:07 +08:00
|
|
|
"net/http"
|
2018-09-12 15:46:12 +08:00
|
|
|
"strconv"
|
|
|
|
"strings"
|
2018-09-12 16:00:57 +08:00
|
|
|
"time"
|
2015-02-26 15:59:07 +08:00
|
|
|
|
2016-06-03 09:09:14 +08:00
|
|
|
"github.com/chrislusf/seaweedfs/weed/glog"
|
|
|
|
"github.com/chrislusf/seaweedfs/weed/operation"
|
2019-06-16 03:21:44 +08:00
|
|
|
"github.com/chrislusf/seaweedfs/weed/stats"
|
2019-04-19 12:43:36 +08:00
|
|
|
"github.com/chrislusf/seaweedfs/weed/storage/needle"
|
2016-06-03 09:09:14 +08:00
|
|
|
"github.com/chrislusf/seaweedfs/weed/topology"
|
2015-02-26 15:59:07 +08:00
|
|
|
)
|
|
|
|
|
|
|
|
func (vs *VolumeServer) PostHandler(w http.ResponseWriter, r *http.Request) {
|
2019-06-14 15:54:56 +08:00
|
|
|
|
2019-06-16 03:21:44 +08:00
|
|
|
stats.VolumeServerRequestCounter.WithLabelValues("post").Inc()
|
2019-06-14 15:54:56 +08:00
|
|
|
start := time.Now()
|
2019-06-16 12:46:55 +08:00
|
|
|
defer func() {
|
|
|
|
stats.VolumeServerRequestHistogram.WithLabelValues("post").Observe(time.Since(start).Seconds())
|
|
|
|
}()
|
2019-06-14 15:54:56 +08:00
|
|
|
|
2015-02-26 15:59:07 +08:00
|
|
|
if e := r.ParseForm(); e != nil {
|
|
|
|
glog.V(0).Infoln("form parse error:", e)
|
|
|
|
writeJsonError(w, r, http.StatusBadRequest, e)
|
|
|
|
return
|
|
|
|
}
|
2019-02-14 16:08:20 +08:00
|
|
|
|
|
|
|
vid, fid, _, _, _ := parseURLPath(r.URL.Path)
|
2019-04-19 12:43:36 +08:00
|
|
|
volumeId, ve := needle.NewVolumeId(vid)
|
2015-02-26 15:59:07 +08:00
|
|
|
if ve != nil {
|
|
|
|
glog.V(0).Infoln("NewVolumeId error:", ve)
|
|
|
|
writeJsonError(w, r, http.StatusBadRequest, ve)
|
|
|
|
return
|
|
|
|
}
|
2019-02-14 16:08:20 +08:00
|
|
|
|
2019-06-06 15:29:02 +08:00
|
|
|
if !vs.maybeCheckJwtAuthorization(r, vid, fid, true) {
|
2019-02-14 16:08:20 +08:00
|
|
|
writeJsonError(w, r, http.StatusUnauthorized, errors.New("wrong jwt"))
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2020-01-03 16:37:24 +08:00
|
|
|
needle, originalSize, ne := needle.CreateNeedleFromRequest(r, vs.FixJpgOrientation, vs.fileSizeLimitBytes)
|
2015-02-26 15:59:07 +08:00
|
|
|
if ne != nil {
|
|
|
|
writeJsonError(w, r, http.StatusBadRequest, ne)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
ret := operation.UploadResult{}
|
2019-04-22 04:33:23 +08:00
|
|
|
_, isUnchanged, writeError := topology.ReplicatedWrite(vs.GetMaster(), vs.store, volumeId, needle, r)
|
2019-12-24 17:56:50 +08:00
|
|
|
|
2020-02-12 01:45:02 +08:00
|
|
|
// http 204 status code does not allow body
|
2019-12-24 17:56:50 +08:00
|
|
|
if writeError == nil && isUnchanged {
|
2020-02-12 01:45:02 +08:00
|
|
|
setEtag(w, needle.Etag())
|
|
|
|
w.WriteHeader(http.StatusNoContent)
|
2019-12-24 17:56:50 +08:00
|
|
|
return
|
2019-04-22 04:33:23 +08:00
|
|
|
}
|
2019-12-24 17:56:50 +08:00
|
|
|
|
|
|
|
httpStatus := http.StatusCreated
|
2019-04-22 04:33:23 +08:00
|
|
|
if writeError != nil {
|
2015-02-26 15:59:07 +08:00
|
|
|
httpStatus = http.StatusInternalServerError
|
2019-04-22 04:33:23 +08:00
|
|
|
ret.Error = writeError.Error()
|
2015-02-26 15:59:07 +08:00
|
|
|
}
|
|
|
|
if needle.HasName() {
|
|
|
|
ret.Name = string(needle.Name)
|
|
|
|
}
|
2018-12-23 05:11:07 +08:00
|
|
|
ret.Size = uint32(originalSize)
|
2019-01-03 04:57:54 +08:00
|
|
|
ret.ETag = needle.Etag()
|
|
|
|
setEtag(w, ret.ETag)
|
2015-02-26 15:59:07 +08:00
|
|
|
writeJsonQuiet(w, r, httpStatus, ret)
|
|
|
|
}
|
|
|
|
|
|
|
|
func (vs *VolumeServer) DeleteHandler(w http.ResponseWriter, r *http.Request) {
|
2019-06-14 15:54:56 +08:00
|
|
|
|
2019-06-16 03:21:44 +08:00
|
|
|
stats.VolumeServerRequestCounter.WithLabelValues("delete").Inc()
|
2019-06-14 15:54:56 +08:00
|
|
|
start := time.Now()
|
2019-06-16 12:46:55 +08:00
|
|
|
defer func() {
|
|
|
|
stats.VolumeServerRequestHistogram.WithLabelValues("delete").Observe(time.Since(start).Seconds())
|
|
|
|
}()
|
2019-06-14 15:54:56 +08:00
|
|
|
|
2019-04-19 12:43:36 +08:00
|
|
|
n := new(needle.Needle)
|
2015-02-26 15:59:07 +08:00
|
|
|
vid, fid, _, _, _ := parseURLPath(r.URL.Path)
|
2019-04-19 12:43:36 +08:00
|
|
|
volumeId, _ := needle.NewVolumeId(vid)
|
2015-02-26 15:59:07 +08:00
|
|
|
n.ParsePath(fid)
|
|
|
|
|
2019-06-06 15:29:02 +08:00
|
|
|
if !vs.maybeCheckJwtAuthorization(r, vid, fid, true) {
|
2019-02-14 16:08:20 +08:00
|
|
|
writeJsonError(w, r, http.StatusUnauthorized, errors.New("wrong jwt"))
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2018-10-15 15:39:56 +08:00
|
|
|
// glog.V(2).Infof("volume %s deleting %s", vid, n)
|
2015-02-26 15:59:07 +08:00
|
|
|
|
|
|
|
cookie := n.Cookie
|
|
|
|
|
2019-06-20 15:55:30 +08:00
|
|
|
ecVolume, hasEcVolume := vs.store.FindEcVolume(volumeId)
|
|
|
|
|
|
|
|
if hasEcVolume {
|
2019-06-20 15:55:52 +08:00
|
|
|
count, err := vs.store.DeleteEcShardNeedle(context.Background(), ecVolume, n, cookie)
|
2019-06-20 15:55:30 +08:00
|
|
|
writeDeleteResult(err, count, w, r)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2016-04-14 16:30:26 +08:00
|
|
|
_, ok := vs.store.ReadVolumeNeedle(volumeId, n)
|
|
|
|
if ok != nil {
|
2015-02-26 15:59:07 +08:00
|
|
|
m := make(map[string]uint32)
|
|
|
|
m["size"] = 0
|
|
|
|
writeJsonQuiet(w, r, http.StatusNotFound, m)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
if n.Cookie != cookie {
|
|
|
|
glog.V(0).Infoln("delete", r.URL.Path, "with unmaching cookie from ", r.RemoteAddr, "agent", r.UserAgent())
|
2015-12-03 16:27:02 +08:00
|
|
|
writeJsonError(w, r, http.StatusBadRequest, errors.New("File Random Cookie does not match."))
|
2015-02-26 15:59:07 +08:00
|
|
|
return
|
|
|
|
}
|
2015-12-02 21:45:26 +08:00
|
|
|
|
|
|
|
count := int64(n.Size)
|
|
|
|
|
2015-12-03 16:27:02 +08:00
|
|
|
if n.IsChunkedManifest() {
|
2015-12-02 21:27:29 +08:00
|
|
|
chunkManifest, e := operation.LoadChunkManifest(n.Data, n.IsGzipped())
|
|
|
|
if e != nil {
|
2015-12-15 14:38:58 +08:00
|
|
|
writeJsonError(w, r, http.StatusInternalServerError, fmt.Errorf("Load chunks manifest error: %v", e))
|
2015-12-02 21:27:29 +08:00
|
|
|
return
|
|
|
|
}
|
2015-12-03 21:35:33 +08:00
|
|
|
// make sure all chunks had deleted before delete manifest
|
2019-02-19 04:11:52 +08:00
|
|
|
if e := chunkManifest.DeleteChunks(vs.GetMaster(), vs.grpcDialOption); e != nil {
|
2015-12-15 14:38:58 +08:00
|
|
|
writeJsonError(w, r, http.StatusInternalServerError, fmt.Errorf("Delete chunks error: %v", e))
|
2015-12-02 21:27:29 +08:00
|
|
|
return
|
|
|
|
}
|
2015-12-02 21:35:50 +08:00
|
|
|
count = chunkManifest.Size
|
2015-12-02 21:27:29 +08:00
|
|
|
}
|
2015-02-26 15:59:07 +08:00
|
|
|
|
2018-07-15 11:26:45 +08:00
|
|
|
n.LastModified = uint64(time.Now().Unix())
|
|
|
|
if len(r.FormValue("ts")) > 0 {
|
|
|
|
modifiedTime, err := strconv.ParseInt(r.FormValue("ts"), 10, 64)
|
|
|
|
if err == nil {
|
|
|
|
n.LastModified = uint64(modifiedTime)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-06-01 15:39:39 +08:00
|
|
|
_, err := topology.ReplicatedDelete(vs.GetMaster(), vs.store, volumeId, n, r)
|
2015-02-26 15:59:07 +08:00
|
|
|
|
2019-06-20 15:55:30 +08:00
|
|
|
writeDeleteResult(err, count, w, r)
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
func writeDeleteResult(err error, count int64, w http.ResponseWriter, r *http.Request) {
|
2016-04-29 00:29:21 +08:00
|
|
|
if err == nil {
|
2015-12-02 21:45:26 +08:00
|
|
|
m := make(map[string]int64)
|
|
|
|
m["size"] = count
|
2015-02-26 15:59:07 +08:00
|
|
|
writeJsonQuiet(w, r, http.StatusAccepted, m)
|
|
|
|
} else {
|
2016-04-29 00:29:21 +08:00
|
|
|
writeJsonError(w, r, http.StatusInternalServerError, fmt.Errorf("Deletion Failed: %v", err))
|
2015-02-26 15:59:07 +08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-09-10 07:25:43 +08:00
|
|
|
func setEtag(w http.ResponseWriter, etag string) {
|
|
|
|
if etag != "" {
|
2018-09-12 15:46:12 +08:00
|
|
|
if strings.HasPrefix(etag, "\"") {
|
|
|
|
w.Header().Set("ETag", etag)
|
|
|
|
} else {
|
|
|
|
w.Header().Set("ETag", "\""+etag+"\"")
|
|
|
|
}
|
2018-09-10 07:25:43 +08:00
|
|
|
}
|
|
|
|
}
|