filer_server_handlers_read.go 7.8 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263
  1. package weed_server
  2. import (
  3. "bytes"
  4. "context"
  5. "fmt"
  6. "io"
  7. "math"
  8. "mime"
  9. "net/http"
  10. "path/filepath"
  11. "strconv"
  12. "strings"
  13. "time"
  14. "github.com/seaweedfs/seaweedfs/weed/s3api/s3_constants"
  15. "github.com/seaweedfs/seaweedfs/weed/util/mem"
  16. "github.com/seaweedfs/seaweedfs/weed/filer"
  17. "github.com/seaweedfs/seaweedfs/weed/glog"
  18. "github.com/seaweedfs/seaweedfs/weed/images"
  19. "github.com/seaweedfs/seaweedfs/weed/pb/filer_pb"
  20. "github.com/seaweedfs/seaweedfs/weed/stats"
  21. "github.com/seaweedfs/seaweedfs/weed/util"
  22. )
  23. // Validates the preconditions. Returns true if GET/HEAD operation should not proceed.
  24. // Preconditions supported are:
  25. //
  26. // If-Modified-Since
  27. // If-Unmodified-Since
  28. // If-Match
  29. // If-None-Match
  30. func checkPreconditions(w http.ResponseWriter, r *http.Request, entry *filer.Entry) bool {
  31. etag := filer.ETagEntry(entry)
  32. /// When more than one conditional request header field is present in a
  33. /// request, the order in which the fields are evaluated becomes
  34. /// important. In practice, the fields defined in this document are
  35. /// consistently implemented in a single, logical order, since "lost
  36. /// update" preconditions have more strict requirements than cache
  37. /// validation, a validated cache is more efficient than a partial
  38. /// response, and entity tags are presumed to be more accurate than date
  39. /// validators. https://tools.ietf.org/html/rfc7232#section-5
  40. if entry.Attr.Mtime.IsZero() {
  41. return false
  42. }
  43. w.Header().Set("Last-Modified", entry.Attr.Mtime.UTC().Format(http.TimeFormat))
  44. ifMatchETagHeader := r.Header.Get("If-Match")
  45. ifUnmodifiedSinceHeader := r.Header.Get("If-Unmodified-Since")
  46. if ifMatchETagHeader != "" {
  47. if util.CanonicalizeETag(etag) != util.CanonicalizeETag(ifMatchETagHeader) {
  48. w.WriteHeader(http.StatusPreconditionFailed)
  49. return true
  50. }
  51. } else if ifUnmodifiedSinceHeader != "" {
  52. if t, parseError := time.Parse(http.TimeFormat, ifUnmodifiedSinceHeader); parseError == nil {
  53. if t.Before(entry.Attr.Mtime) {
  54. w.WriteHeader(http.StatusPreconditionFailed)
  55. return true
  56. }
  57. }
  58. }
  59. ifNoneMatchETagHeader := r.Header.Get("If-None-Match")
  60. ifModifiedSinceHeader := r.Header.Get("If-Modified-Since")
  61. if ifNoneMatchETagHeader != "" {
  62. if util.CanonicalizeETag(etag) == util.CanonicalizeETag(ifNoneMatchETagHeader) {
  63. w.WriteHeader(http.StatusNotModified)
  64. return true
  65. }
  66. } else if ifModifiedSinceHeader != "" {
  67. if t, parseError := time.Parse(http.TimeFormat, ifModifiedSinceHeader); parseError == nil {
  68. if !t.Before(entry.Attr.Mtime) {
  69. w.WriteHeader(http.StatusNotModified)
  70. return true
  71. }
  72. }
  73. }
  74. return false
  75. }
  76. func (fs *FilerServer) GetOrHeadHandler(w http.ResponseWriter, r *http.Request) {
  77. path := r.URL.Path
  78. isForDirectory := strings.HasSuffix(path, "/")
  79. if isForDirectory && len(path) > 1 {
  80. path = path[:len(path)-1]
  81. }
  82. entry, err := fs.filer.FindEntry(context.Background(), util.FullPath(path))
  83. if err != nil {
  84. if path == "/" {
  85. fs.listDirectoryHandler(w, r)
  86. return
  87. }
  88. if err == filer_pb.ErrNotFound {
  89. glog.V(2).Infof("Not found %s: %v", path, err)
  90. stats.FilerRequestCounter.WithLabelValues(stats.ErrorReadNotFound).Inc()
  91. w.WriteHeader(http.StatusNotFound)
  92. } else {
  93. glog.Errorf("Internal %s: %v", path, err)
  94. stats.FilerRequestCounter.WithLabelValues(stats.ErrorReadInternal).Inc()
  95. w.WriteHeader(http.StatusInternalServerError)
  96. }
  97. return
  98. }
  99. query := r.URL.Query()
  100. if entry.IsDirectory() {
  101. if fs.option.DisableDirListing {
  102. w.WriteHeader(http.StatusForbidden)
  103. return
  104. }
  105. if query.Get("metadata") == "true" {
  106. writeJsonQuiet(w, r, http.StatusOK, entry)
  107. return
  108. }
  109. if entry.Attr.Mime == "" || (entry.Attr.Mime == s3_constants.FolderMimeType && r.Header.Get(s3_constants.AmzIdentityId) == "") {
  110. // return index of directory for non s3 gateway
  111. fs.listDirectoryHandler(w, r)
  112. return
  113. }
  114. // inform S3 API this is a user created directory key object
  115. w.Header().Set(s3_constants.X_SeaweedFS_Header_Directory_Key, "true")
  116. }
  117. if isForDirectory && entry.Attr.Mime != s3_constants.FolderMimeType {
  118. w.WriteHeader(http.StatusNotFound)
  119. return
  120. }
  121. if query.Get("metadata") == "true" {
  122. if query.Get("resolveManifest") == "true" {
  123. if entry.Chunks, _, err = filer.ResolveChunkManifest(
  124. fs.filer.MasterClient.GetLookupFileIdFunction(),
  125. entry.GetChunks(), 0, math.MaxInt64); err != nil {
  126. err = fmt.Errorf("failed to resolve chunk manifest, err: %s", err.Error())
  127. writeJsonError(w, r, http.StatusInternalServerError, err)
  128. return
  129. }
  130. }
  131. writeJsonQuiet(w, r, http.StatusOK, entry)
  132. return
  133. }
  134. etag := filer.ETagEntry(entry)
  135. if checkPreconditions(w, r, entry) {
  136. return
  137. }
  138. w.Header().Set("Accept-Ranges", "bytes")
  139. // mime type
  140. mimeType := entry.Attr.Mime
  141. if mimeType == "" {
  142. if ext := filepath.Ext(entry.Name()); ext != "" {
  143. mimeType = mime.TypeByExtension(ext)
  144. }
  145. }
  146. if mimeType != "" {
  147. w.Header().Set("Content-Type", mimeType)
  148. } else {
  149. w.Header().Set("Content-Type", "application/octet-stream")
  150. }
  151. // print out the header from extended properties
  152. for k, v := range entry.Extended {
  153. if !strings.HasPrefix(k, "xattr-") {
  154. // "xattr-" prefix is set in filesys.XATTR_PREFIX
  155. w.Header().Set(k, string(v))
  156. }
  157. }
  158. //Seaweed custom header are not visible to Vue or javascript
  159. seaweedHeaders := []string{}
  160. for header := range w.Header() {
  161. if strings.HasPrefix(header, "Seaweed-") {
  162. seaweedHeaders = append(seaweedHeaders, header)
  163. }
  164. }
  165. seaweedHeaders = append(seaweedHeaders, "Content-Disposition")
  166. w.Header().Set("Access-Control-Expose-Headers", strings.Join(seaweedHeaders, ","))
  167. //set tag count
  168. tagCount := 0
  169. for k := range entry.Extended {
  170. if strings.HasPrefix(k, s3_constants.AmzObjectTagging+"-") {
  171. tagCount++
  172. }
  173. }
  174. if tagCount > 0 {
  175. w.Header().Set(s3_constants.AmzTagCount, strconv.Itoa(tagCount))
  176. }
  177. setEtag(w, etag)
  178. filename := entry.Name()
  179. adjustPassthroughHeaders(w, r, filename)
  180. totalSize := int64(entry.Size())
  181. if r.Method == "HEAD" {
  182. w.Header().Set("Content-Length", strconv.FormatInt(totalSize, 10))
  183. return
  184. }
  185. if rangeReq := r.Header.Get("Range"); rangeReq == "" {
  186. ext := filepath.Ext(filename)
  187. if len(ext) > 0 {
  188. ext = strings.ToLower(ext)
  189. }
  190. width, height, mode, shouldResize := shouldResizeImages(ext, r)
  191. if shouldResize {
  192. data := mem.Allocate(int(totalSize))
  193. defer mem.Free(data)
  194. err := filer.ReadAll(data, fs.filer.MasterClient, entry.GetChunks())
  195. if err != nil {
  196. glog.Errorf("failed to read %s: %v", path, err)
  197. w.WriteHeader(http.StatusInternalServerError)
  198. return
  199. }
  200. rs, _, _ := images.Resized(ext, bytes.NewReader(data), width, height, mode)
  201. io.Copy(w, rs)
  202. return
  203. }
  204. }
  205. processRangeRequest(r, w, totalSize, mimeType, func(writer io.Writer, offset int64, size int64) error {
  206. if offset+size <= int64(len(entry.Content)) {
  207. _, err := writer.Write(entry.Content[offset : offset+size])
  208. if err != nil {
  209. stats.FilerRequestCounter.WithLabelValues(stats.ErrorWriteEntry).Inc()
  210. glog.Errorf("failed to write entry content: %v", err)
  211. }
  212. return err
  213. }
  214. chunks := entry.GetChunks()
  215. if entry.IsInRemoteOnly() {
  216. dir, name := entry.FullPath.DirAndName()
  217. if resp, err := fs.CacheRemoteObjectToLocalCluster(context.Background(), &filer_pb.CacheRemoteObjectToLocalClusterRequest{
  218. Directory: dir,
  219. Name: name,
  220. }); err != nil {
  221. stats.FilerRequestCounter.WithLabelValues(stats.ErrorReadCache).Inc()
  222. glog.Errorf("CacheRemoteObjectToLocalCluster %s: %v", entry.FullPath, err)
  223. return fmt.Errorf("cache %s: %v", entry.FullPath, err)
  224. } else {
  225. chunks = resp.Entry.GetChunks()
  226. }
  227. }
  228. err = filer.StreamContentWithThrottler(fs.filer.MasterClient, writer, chunks, offset, size, fs.option.DownloadMaxBytesPs)
  229. if err != nil {
  230. stats.FilerRequestCounter.WithLabelValues(stats.ErrorReadStream).Inc()
  231. glog.Errorf("failed to stream content %s: %v", r.URL, err)
  232. }
  233. return err
  234. })
  235. }