You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

176 lines
4.7 KiB

9 years ago
6 years ago
6 years ago
6 years ago
6 years ago
6 years ago
6 years ago
6 years ago
6 years ago
6 years ago
6 years ago
5 years ago
9 years ago
9 years ago
9 years ago
5 years ago
5 years ago
  1. package weed_server
  2. import (
  3. "errors"
  4. "fmt"
  5. "net/http"
  6. "strconv"
  7. "strings"
  8. "time"
  9. "github.com/chrislusf/seaweedfs/weed/glog"
  10. "github.com/chrislusf/seaweedfs/weed/operation"
  11. "github.com/chrislusf/seaweedfs/weed/stats"
  12. "github.com/chrislusf/seaweedfs/weed/storage/needle"
  13. "github.com/chrislusf/seaweedfs/weed/topology"
  14. )
  15. func (vs *VolumeServer) PostHandler(w http.ResponseWriter, r *http.Request) {
  16. stats.VolumeServerRequestCounter.WithLabelValues("post").Inc()
  17. start := time.Now()
  18. defer func() {
  19. stats.VolumeServerRequestHistogram.WithLabelValues("post").Observe(time.Since(start).Seconds())
  20. }()
  21. if e := r.ParseForm(); e != nil {
  22. glog.V(0).Infoln("form parse error:", e)
  23. writeJsonError(w, r, http.StatusBadRequest, e)
  24. return
  25. }
  26. vid, fid, _, _, _ := parseURLPath(r.URL.Path)
  27. volumeId, ve := needle.NewVolumeId(vid)
  28. if ve != nil {
  29. glog.V(0).Infoln("NewVolumeId error:", ve)
  30. writeJsonError(w, r, http.StatusBadRequest, ve)
  31. return
  32. }
  33. if !vs.maybeCheckJwtAuthorization(r, vid, fid, true) {
  34. writeJsonError(w, r, http.StatusUnauthorized, errors.New("wrong jwt"))
  35. return
  36. }
  37. reqNeedle, originalSize, ne := needle.CreateNeedleFromRequest(r, vs.FixJpgOrientation, vs.fileSizeLimitBytes)
  38. if ne != nil {
  39. writeJsonError(w, r, http.StatusBadRequest, ne)
  40. return
  41. }
  42. ret := operation.UploadResult{}
  43. isUnchanged, writeError := topology.ReplicatedWrite(vs.GetMaster(), vs.store, volumeId, reqNeedle, r)
  44. // http 204 status code does not allow body
  45. if writeError == nil && isUnchanged {
  46. setEtag(w, reqNeedle.Etag())
  47. w.WriteHeader(http.StatusNoContent)
  48. return
  49. }
  50. httpStatus := http.StatusCreated
  51. if writeError != nil {
  52. httpStatus = http.StatusInternalServerError
  53. ret.Error = writeError.Error()
  54. }
  55. if reqNeedle.HasName() {
  56. ret.Name = string(reqNeedle.Name)
  57. }
  58. ret.Size = uint32(originalSize)
  59. ret.ETag = reqNeedle.Etag()
  60. ret.Mime = string(reqNeedle.Mime)
  61. setEtag(w, ret.ETag)
  62. writeJsonQuiet(w, r, httpStatus, ret)
  63. }
  64. func (vs *VolumeServer) DeleteHandler(w http.ResponseWriter, r *http.Request) {
  65. stats.VolumeServerRequestCounter.WithLabelValues("delete").Inc()
  66. start := time.Now()
  67. defer func() {
  68. stats.VolumeServerRequestHistogram.WithLabelValues("delete").Observe(time.Since(start).Seconds())
  69. }()
  70. n := new(needle.Needle)
  71. vid, fid, _, _, _ := parseURLPath(r.URL.Path)
  72. volumeId, _ := needle.NewVolumeId(vid)
  73. n.ParsePath(fid)
  74. if !vs.maybeCheckJwtAuthorization(r, vid, fid, true) {
  75. writeJsonError(w, r, http.StatusUnauthorized, errors.New("wrong jwt"))
  76. return
  77. }
  78. // glog.V(2).Infof("volume %s deleting %s", vid, n)
  79. cookie := n.Cookie
  80. ecVolume, hasEcVolume := vs.store.FindEcVolume(volumeId)
  81. if hasEcVolume {
  82. count, err := vs.store.DeleteEcShardNeedle(ecVolume, n, cookie)
  83. writeDeleteResult(err, count, w, r)
  84. return
  85. }
  86. _, ok := vs.store.ReadVolumeNeedle(volumeId, n)
  87. if ok != nil {
  88. m := make(map[string]uint32)
  89. m["size"] = 0
  90. writeJsonQuiet(w, r, http.StatusNotFound, m)
  91. return
  92. }
  93. if n.Cookie != cookie {
  94. glog.V(0).Infoln("delete", r.URL.Path, "with unmaching cookie from ", r.RemoteAddr, "agent", r.UserAgent())
  95. writeJsonError(w, r, http.StatusBadRequest, errors.New("File Random Cookie does not match."))
  96. return
  97. }
  98. count := int64(n.Size)
  99. if n.IsChunkedManifest() {
  100. chunkManifest, e := operation.LoadChunkManifest(n.Data, n.IsCompressed())
  101. if e != nil {
  102. writeJsonError(w, r, http.StatusInternalServerError, fmt.Errorf("Load chunks manifest error: %v", e))
  103. return
  104. }
  105. // make sure all chunks had deleted before delete manifest
  106. if e := chunkManifest.DeleteChunks(vs.GetMaster(), false, vs.grpcDialOption); e != nil {
  107. writeJsonError(w, r, http.StatusInternalServerError, fmt.Errorf("Delete chunks error: %v", e))
  108. return
  109. }
  110. count = chunkManifest.Size
  111. }
  112. n.LastModified = uint64(time.Now().Unix())
  113. if len(r.FormValue("ts")) > 0 {
  114. modifiedTime, err := strconv.ParseInt(r.FormValue("ts"), 10, 64)
  115. if err == nil {
  116. n.LastModified = uint64(modifiedTime)
  117. }
  118. }
  119. _, err := topology.ReplicatedDelete(vs.GetMaster(), vs.store, volumeId, n, r)
  120. writeDeleteResult(err, count, w, r)
  121. }
  122. func writeDeleteResult(err error, count int64, w http.ResponseWriter, r *http.Request) {
  123. if err == nil {
  124. m := make(map[string]int64)
  125. m["size"] = count
  126. writeJsonQuiet(w, r, http.StatusAccepted, m)
  127. } else {
  128. writeJsonError(w, r, http.StatusInternalServerError, fmt.Errorf("Deletion Failed: %v", err))
  129. }
  130. }
  131. func setEtag(w http.ResponseWriter, etag string) {
  132. if etag != "" {
  133. if strings.HasPrefix(etag, "\"") {
  134. w.Header().Set("ETag", etag)
  135. } else {
  136. w.Header().Set("ETag", "\""+etag+"\"")
  137. }
  138. }
  139. }
  140. func getEtag(resp *http.Response) (etag string) {
  141. etag = resp.Header.Get("ETag")
  142. if strings.HasPrefix(etag, "\"") && strings.HasSuffix(etag, "\"") {
  143. return etag[1 : len(etag)-1]
  144. }
  145. return
  146. }