123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178 |
- package weed_server
- import (
- "errors"
- "fmt"
- "net/http"
- "strconv"
- "strings"
- "time"
- "github.com/chrislusf/seaweedfs/weed/glog"
- "github.com/chrislusf/seaweedfs/weed/operation"
- "github.com/chrislusf/seaweedfs/weed/stats"
- "github.com/chrislusf/seaweedfs/weed/storage/needle"
- "github.com/chrislusf/seaweedfs/weed/topology"
- "github.com/chrislusf/seaweedfs/weed/util"
- )
- func (vs *VolumeServer) PostHandler(w http.ResponseWriter, r *http.Request) {
- stats.VolumeServerRequestCounter.WithLabelValues("post").Inc()
- start := time.Now()
- defer func() {
- stats.VolumeServerRequestHistogram.WithLabelValues("post").Observe(time.Since(start).Seconds())
- }()
- if e := r.ParseForm(); e != nil {
- glog.V(0).Infoln("form parse error:", e)
- writeJsonError(w, r, http.StatusBadRequest, e)
- return
- }
- vid, fid, _, _, _ := parseURLPath(r.URL.Path)
- volumeId, ve := needle.NewVolumeId(vid)
- if ve != nil {
- glog.V(0).Infoln("NewVolumeId error:", ve)
- writeJsonError(w, r, http.StatusBadRequest, ve)
- return
- }
- if !vs.maybeCheckJwtAuthorization(r, vid, fid, true) {
- writeJsonError(w, r, http.StatusUnauthorized, errors.New("wrong jwt"))
- return
- }
- reqNeedle, originalSize, contentMd5, ne := needle.CreateNeedleFromRequest(r, vs.FixJpgOrientation, vs.fileSizeLimitBytes)
- if ne != nil {
- writeJsonError(w, r, http.StatusBadRequest, ne)
- return
- }
- ret := operation.UploadResult{}
- isUnchanged, writeError := topology.ReplicatedWrite(vs.GetMaster, vs.store, volumeId, reqNeedle, r)
- // http 204 status code does not allow body
- if writeError == nil && isUnchanged {
- setEtag(w, reqNeedle.Etag())
- w.WriteHeader(http.StatusNoContent)
- return
- }
- httpStatus := http.StatusCreated
- if writeError != nil {
- httpStatus = http.StatusInternalServerError
- ret.Error = writeError.Error()
- }
- if reqNeedle.HasName() {
- ret.Name = string(reqNeedle.Name)
- }
- ret.Size = uint32(originalSize)
- ret.ETag = fmt.Sprintf("%x", util.Base64Md5ToBytes(contentMd5))
- ret.Mime = string(reqNeedle.Mime)
- setEtag(w, ret.ETag)
- w.Header().Set("Content-MD5", contentMd5)
- writeJsonQuiet(w, r, httpStatus, ret)
- }
- func (vs *VolumeServer) DeleteHandler(w http.ResponseWriter, r *http.Request) {
- stats.VolumeServerRequestCounter.WithLabelValues("delete").Inc()
- start := time.Now()
- defer func() {
- stats.VolumeServerRequestHistogram.WithLabelValues("delete").Observe(time.Since(start).Seconds())
- }()
- n := new(needle.Needle)
- vid, fid, _, _, _ := parseURLPath(r.URL.Path)
- volumeId, _ := needle.NewVolumeId(vid)
- n.ParsePath(fid)
- if !vs.maybeCheckJwtAuthorization(r, vid, fid, true) {
- writeJsonError(w, r, http.StatusUnauthorized, errors.New("wrong jwt"))
- return
- }
- // glog.V(2).Infof("volume %s deleting %s", vid, n)
- cookie := n.Cookie
- ecVolume, hasEcVolume := vs.store.FindEcVolume(volumeId)
- if hasEcVolume {
- count, err := vs.store.DeleteEcShardNeedle(ecVolume, n, cookie)
- writeDeleteResult(err, count, w, r)
- return
- }
- _, ok := vs.store.ReadVolumeNeedle(volumeId, n, nil)
- if ok != nil {
- m := make(map[string]uint32)
- m["size"] = 0
- writeJsonQuiet(w, r, http.StatusNotFound, m)
- return
- }
- if n.Cookie != cookie {
- glog.V(0).Infoln("delete", r.URL.Path, "with unmaching cookie from ", r.RemoteAddr, "agent", r.UserAgent())
- writeJsonError(w, r, http.StatusBadRequest, errors.New("File Random Cookie does not match."))
- return
- }
- count := int64(n.Size)
- if n.IsChunkedManifest() {
- chunkManifest, e := operation.LoadChunkManifest(n.Data, n.IsCompressed())
- if e != nil {
- writeJsonError(w, r, http.StatusInternalServerError, fmt.Errorf("Load chunks manifest error: %v", e))
- return
- }
- // make sure all chunks had deleted before delete manifest
- if e := chunkManifest.DeleteChunks(vs.GetMaster, false, vs.grpcDialOption); e != nil {
- writeJsonError(w, r, http.StatusInternalServerError, fmt.Errorf("Delete chunks error: %v", e))
- return
- }
- count = chunkManifest.Size
- }
- n.LastModified = uint64(time.Now().Unix())
- if len(r.FormValue("ts")) > 0 {
- modifiedTime, err := strconv.ParseInt(r.FormValue("ts"), 10, 64)
- if err == nil {
- n.LastModified = uint64(modifiedTime)
- }
- }
- _, err := topology.ReplicatedDelete(vs.GetMaster, vs.store, volumeId, n, r)
- writeDeleteResult(err, count, w, r)
- }
- func writeDeleteResult(err error, count int64, w http.ResponseWriter, r *http.Request) {
- if err == nil {
- m := make(map[string]int64)
- m["size"] = count
- writeJsonQuiet(w, r, http.StatusAccepted, m)
- } else {
- writeJsonError(w, r, http.StatusInternalServerError, fmt.Errorf("Deletion Failed: %v", err))
- }
- }
- func setEtag(w http.ResponseWriter, etag string) {
- if etag != "" {
- if strings.HasPrefix(etag, "\"") {
- w.Header().Set("ETag", etag)
- } else {
- w.Header().Set("ETag", "\""+etag+"\"")
- }
- }
- }
- func getEtag(resp *http.Response) (etag string) {
- etag = resp.Header.Get("ETag")
- if strings.HasPrefix(etag, "\"") && strings.HasSuffix(etag, "\"") {
- return etag[1 : len(etag)-1]
- }
- return
- }
|