You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

300 lines
8.5 KiB

9 years ago
9 years ago
9 years ago
9 years ago
9 years ago
9 years ago
  1. package weed_server
  2. import (
  3. "bytes"
  4. "io"
  5. "mime"
  6. "mime/multipart"
  7. "net/http"
  8. "net/url"
  9. "path"
  10. "strconv"
  11. "strings"
  12. "time"
  13. "github.com/chrislusf/seaweedfs/weed/glog"
  14. "github.com/chrislusf/seaweedfs/weed/images"
  15. "github.com/chrislusf/seaweedfs/weed/operation"
  16. "github.com/chrislusf/seaweedfs/weed/storage"
  17. "github.com/chrislusf/seaweedfs/weed/util"
  18. )
  19. var fileNameEscaper = strings.NewReplacer("\\", "\\\\", "\"", "\\\"")
  20. func (vs *VolumeServer) GetOrHeadHandler(w http.ResponseWriter, r *http.Request) {
  21. n := new(storage.Needle)
  22. vid, fid, filename, ext, _ := parseURLPath(r.URL.Path)
  23. volumeId, err := storage.NewVolumeId(vid)
  24. if err != nil {
  25. glog.V(2).Infoln("parsing error:", err, r.URL.Path)
  26. w.WriteHeader(http.StatusBadRequest)
  27. return
  28. }
  29. err = n.ParsePath(fid)
  30. if err != nil {
  31. glog.V(2).Infoln("parsing fid error:", err, r.URL.Path)
  32. w.WriteHeader(http.StatusBadRequest)
  33. return
  34. }
  35. glog.V(4).Infoln("volume", volumeId, "reading", n)
  36. if !vs.store.HasVolume(volumeId) {
  37. if !vs.ReadRedirect {
  38. glog.V(2).Infoln("volume is not local:", err, r.URL.Path)
  39. w.WriteHeader(http.StatusNotFound)
  40. return
  41. }
  42. lookupResult, err := operation.Lookup(vs.GetMasterNode(), volumeId.String())
  43. glog.V(2).Infoln("volume", volumeId, "found on", lookupResult, "error", err)
  44. if err == nil && len(lookupResult.Locations) > 0 {
  45. u, _ := url.Parse(util.NormalizeUrl(lookupResult.Locations[0].PublicUrl))
  46. u.Path = r.URL.Path
  47. arg := url.Values{}
  48. if c := r.FormValue("collection"); c != "" {
  49. arg.Set("collection", c)
  50. }
  51. u.RawQuery = arg.Encode()
  52. http.Redirect(w, r, u.String(), http.StatusMovedPermanently)
  53. } else {
  54. glog.V(2).Infoln("lookup error:", err, r.URL.Path)
  55. w.WriteHeader(http.StatusNotFound)
  56. }
  57. return
  58. }
  59. cookie := n.Cookie
  60. count, e := vs.store.ReadVolumeNeedle(volumeId, n)
  61. glog.V(4).Infoln("read bytes", count, "error", e)
  62. if e != nil || count <= 0 {
  63. glog.V(0).Infoln("read error:", e, r.URL.Path)
  64. w.WriteHeader(http.StatusNotFound)
  65. return
  66. }
  67. defer n.ReleaseMemory()
  68. if n.Cookie != cookie {
  69. glog.V(0).Infoln("request", r.URL.Path, "with unmaching cookie seen:", cookie, "expected:", n.Cookie, "from", r.RemoteAddr, "agent", r.UserAgent())
  70. w.WriteHeader(http.StatusNotFound)
  71. return
  72. }
  73. if n.LastModified != 0 {
  74. w.Header().Set("Last-Modified", time.Unix(int64(n.LastModified), 0).UTC().Format(http.TimeFormat))
  75. if r.Header.Get("If-Modified-Since") != "" {
  76. if t, parseError := time.Parse(http.TimeFormat, r.Header.Get("If-Modified-Since")); parseError == nil {
  77. if t.Unix() >= int64(n.LastModified) {
  78. w.WriteHeader(http.StatusNotModified)
  79. return
  80. }
  81. }
  82. }
  83. }
  84. etag := n.Etag()
  85. if inm := r.Header.Get("If-None-Match"); inm == etag {
  86. w.WriteHeader(http.StatusNotModified)
  87. return
  88. }
  89. w.Header().Set("Etag", etag)
  90. if vs.tryHandleChunkedFile(n, filename, w, r) {
  91. return
  92. }
  93. if n.NameSize > 0 && filename == "" {
  94. filename = string(n.Name)
  95. if ext == "" {
  96. ext = path.Ext(filename)
  97. }
  98. }
  99. mtype := ""
  100. if n.MimeSize > 0 {
  101. mt := string(n.Mime)
  102. if !strings.HasPrefix(mt, "application/octet-stream") {
  103. mtype = mt
  104. }
  105. }
  106. if ext != ".gz" {
  107. if n.IsGzipped() {
  108. if strings.Contains(r.Header.Get("Accept-Encoding"), "gzip") {
  109. w.Header().Set("Content-Encoding", "gzip")
  110. } else {
  111. if n.Data, err = operation.UnGzipData(n.Data); err != nil {
  112. glog.V(0).Infoln("ungzip error:", err, r.URL.Path)
  113. }
  114. }
  115. }
  116. }
  117. if ext == ".png" || ext == ".jpg" || ext == ".gif" {
  118. width, height := 0, 0
  119. if r.FormValue("width") != "" {
  120. width, _ = strconv.Atoi(r.FormValue("width"))
  121. }
  122. if r.FormValue("height") != "" {
  123. height, _ = strconv.Atoi(r.FormValue("height"))
  124. }
  125. n.Data, _, _ = images.Resized(ext, n.Data, width, height)
  126. }
  127. if e := writeResponseContent(filename, mtype, bytes.NewReader(n.Data), w, r); e != nil {
  128. glog.V(2).Infoln("response write error:", e)
  129. }
  130. }
  131. func (vs *VolumeServer) FaviconHandler(w http.ResponseWriter, r *http.Request) {
  132. data, err := images.Asset("favicon/favicon.ico")
  133. if err != nil {
  134. glog.V(2).Infoln("favicon read error:", err)
  135. return
  136. }
  137. if e := writeResponseContent("favicon.ico", "image/x-icon", bytes.NewReader(data), w, r); e != nil {
  138. glog.V(2).Infoln("response write error:", e)
  139. }
  140. }
  141. func (vs *VolumeServer) tryHandleChunkedFile(n *storage.Needle, fileName string, w http.ResponseWriter, r *http.Request) (processed bool) {
  142. if !n.IsChunkedManifest() {
  143. return false
  144. }
  145. chunkManifest, e := operation.LoadChunkManifest(n.Data, n.IsGzipped())
  146. if e != nil {
  147. glog.V(0).Infof("load chunked manifest (%s) error: %v", r.URL.Path, e)
  148. return false
  149. }
  150. if fileName == "" && chunkManifest.Name != "" {
  151. fileName = chunkManifest.Name
  152. }
  153. mType := ""
  154. if chunkManifest.Mime != "" {
  155. mt := chunkManifest.Mime
  156. if !strings.HasPrefix(mt, "application/octet-stream") {
  157. mType = mt
  158. }
  159. }
  160. w.Header().Set("X-File-Store", "chunked")
  161. chunkedFileReader := &operation.ChunkedFileReader{
  162. Manifest: chunkManifest,
  163. Master: vs.GetMasterNode(),
  164. }
  165. defer chunkedFileReader.Close()
  166. if e := writeResponseContent(fileName, mType, chunkedFileReader, w, r); e != nil {
  167. glog.V(2).Infoln("response write error:", e)
  168. }
  169. return true
  170. }
  171. func writeResponseContent(filename, mimeType string, rs io.ReadSeeker, w http.ResponseWriter, r *http.Request) error {
  172. totalSize, e := rs.Seek(0, 2)
  173. if mimeType == "" {
  174. if ext := path.Ext(filename); ext != "" {
  175. mimeType = mime.TypeByExtension(ext)
  176. }
  177. }
  178. if mimeType != "" {
  179. w.Header().Set("Content-Type", mimeType)
  180. }
  181. if filename != "" {
  182. contentDisposition := "inline"
  183. if r.FormValue("dl") != "" {
  184. if dl, _ := strconv.ParseBool(r.FormValue("dl")); dl {
  185. contentDisposition = "attachment"
  186. }
  187. }
  188. w.Header().Set("Content-Disposition", contentDisposition+`; filename="`+fileNameEscaper.Replace(filename)+`"`)
  189. }
  190. w.Header().Set("Accept-Ranges", "bytes")
  191. if r.Method == "HEAD" {
  192. w.Header().Set("Content-Length", strconv.FormatInt(totalSize, 10))
  193. return nil
  194. }
  195. rangeReq := r.Header.Get("Range")
  196. if rangeReq == "" {
  197. w.Header().Set("Content-Length", strconv.FormatInt(totalSize, 10))
  198. if _, e = rs.Seek(0, 0); e != nil {
  199. return e
  200. }
  201. _, e = io.Copy(w, rs)
  202. return e
  203. }
  204. //the rest is dealing with partial content request
  205. //mostly copy from src/pkg/net/http/fs.go
  206. ranges, err := parseRange(rangeReq, totalSize)
  207. if err != nil {
  208. http.Error(w, err.Error(), http.StatusRequestedRangeNotSatisfiable)
  209. return nil
  210. }
  211. if sumRangesSize(ranges) > totalSize {
  212. // The total number of bytes in all the ranges
  213. // is larger than the size of the file by
  214. // itself, so this is probably an attack, or a
  215. // dumb client. Ignore the range request.
  216. return nil
  217. }
  218. if len(ranges) == 0 {
  219. return nil
  220. }
  221. if len(ranges) == 1 {
  222. // RFC 2616, Section 14.16:
  223. // "When an HTTP message includes the content of a single
  224. // range (for example, a response to a request for a
  225. // single range, or to a request for a set of ranges
  226. // that overlap without any holes), this content is
  227. // transmitted with a Content-Range header, and a
  228. // Content-Length header showing the number of bytes
  229. // actually transferred.
  230. // ...
  231. // A response to a request for a single range MUST NOT
  232. // be sent using the multipart/byteranges media type."
  233. ra := ranges[0]
  234. w.Header().Set("Content-Length", strconv.FormatInt(ra.length, 10))
  235. w.Header().Set("Content-Range", ra.contentRange(totalSize))
  236. w.WriteHeader(http.StatusPartialContent)
  237. if _, e = rs.Seek(ra.start, 0); e != nil {
  238. return e
  239. }
  240. _, e = io.CopyN(w, rs, ra.length)
  241. return e
  242. }
  243. // process multiple ranges
  244. for _, ra := range ranges {
  245. if ra.start > totalSize {
  246. http.Error(w, "Out of Range", http.StatusRequestedRangeNotSatisfiable)
  247. return nil
  248. }
  249. }
  250. sendSize := rangesMIMESize(ranges, mimeType, totalSize)
  251. pr, pw := io.Pipe()
  252. mw := multipart.NewWriter(pw)
  253. w.Header().Set("Content-Type", "multipart/byteranges; boundary="+mw.Boundary())
  254. sendContent := pr
  255. defer pr.Close() // cause writing goroutine to fail and exit if CopyN doesn't finish.
  256. go func() {
  257. for _, ra := range ranges {
  258. part, e := mw.CreatePart(ra.mimeHeader(mimeType, totalSize))
  259. if e != nil {
  260. pw.CloseWithError(e)
  261. return
  262. }
  263. if _, e = rs.Seek(ra.start, 0); e != nil {
  264. pw.CloseWithError(e)
  265. return
  266. }
  267. if _, e = io.CopyN(part, rs, ra.length); e != nil {
  268. pw.CloseWithError(e)
  269. return
  270. }
  271. }
  272. mw.Close()
  273. pw.Close()
  274. }()
  275. if w.Header().Get("Content-Encoding") == "" {
  276. w.Header().Set("Content-Length", strconv.FormatInt(sendSize, 10))
  277. }
  278. w.WriteHeader(http.StatusPartialContent)
  279. _, e = io.CopyN(w, sendContent, sendSize)
  280. return e
  281. }