volume_server_handlers_write.go 4.6 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167
  1. package weed_server
  2. import (
  3. "errors"
  4. "fmt"
  5. "net/http"
  6. "strconv"
  7. "strings"
  8. "time"
  9. "github.com/seaweedfs/seaweedfs/weed/glog"
  10. "github.com/seaweedfs/seaweedfs/weed/operation"
  11. "github.com/seaweedfs/seaweedfs/weed/storage/needle"
  12. "github.com/seaweedfs/seaweedfs/weed/topology"
  13. "github.com/seaweedfs/seaweedfs/weed/util/buffer_pool"
  14. )
  15. func (vs *VolumeServer) PostHandler(w http.ResponseWriter, r *http.Request) {
  16. ctx := r.Context()
  17. if e := r.ParseForm(); e != nil {
  18. glog.V(0).InfolnCtx(ctx, "form parse error:", e)
  19. writeJsonError(w, r, http.StatusBadRequest, e)
  20. return
  21. }
  22. vid, fid, _, _, _ := parseURLPath(r.URL.Path)
  23. volumeId, ve := needle.NewVolumeId(vid)
  24. if ve != nil {
  25. glog.V(0).InfolnCtx(ctx, "NewVolumeId error:", ve)
  26. writeJsonError(w, r, http.StatusBadRequest, ve)
  27. return
  28. }
  29. if !vs.maybeCheckJwtAuthorization(r, vid, fid, true) {
  30. writeJsonError(w, r, http.StatusUnauthorized, errors.New("wrong jwt"))
  31. return
  32. }
  33. bytesBuffer := buffer_pool.SyncPoolGetBuffer()
  34. defer buffer_pool.SyncPoolPutBuffer(bytesBuffer)
  35. reqNeedle, originalSize, contentMd5, ne := needle.CreateNeedleFromRequest(r, vs.FixJpgOrientation, vs.fileSizeLimitBytes, bytesBuffer)
  36. if ne != nil {
  37. writeJsonError(w, r, http.StatusBadRequest, ne)
  38. return
  39. }
  40. ret := operation.UploadResult{}
  41. isUnchanged, writeError := topology.ReplicatedWrite(ctx, vs.GetMaster, vs.grpcDialOption, vs.store, volumeId, reqNeedle, r, contentMd5)
  42. if writeError != nil {
  43. writeJsonError(w, r, http.StatusInternalServerError, writeError)
  44. return
  45. }
  46. // http 204 status code does not allow body
  47. if writeError == nil && isUnchanged {
  48. SetEtag(w, reqNeedle.Etag())
  49. w.WriteHeader(http.StatusNoContent)
  50. return
  51. }
  52. httpStatus := http.StatusCreated
  53. if reqNeedle.HasName() {
  54. ret.Name = string(reqNeedle.Name)
  55. }
  56. ret.Size = uint32(originalSize)
  57. ret.ETag = reqNeedle.Etag()
  58. ret.Mime = string(reqNeedle.Mime)
  59. SetEtag(w, ret.ETag)
  60. w.Header().Set("Content-MD5", contentMd5)
  61. writeJsonQuiet(w, r, httpStatus, ret)
  62. }
  63. func (vs *VolumeServer) DeleteHandler(w http.ResponseWriter, r *http.Request) {
  64. n := new(needle.Needle)
  65. vid, fid, _, _, _ := parseURLPath(r.URL.Path)
  66. volumeId, _ := needle.NewVolumeId(vid)
  67. n.ParsePath(fid)
  68. if !vs.maybeCheckJwtAuthorization(r, vid, fid, true) {
  69. writeJsonError(w, r, http.StatusUnauthorized, errors.New("wrong jwt"))
  70. return
  71. }
  72. // glog.V(2).Infof("volume %s deleting %s", vid, n)
  73. cookie := n.Cookie
  74. ecVolume, hasEcVolume := vs.store.FindEcVolume(volumeId)
  75. if hasEcVolume {
  76. count, err := vs.store.DeleteEcShardNeedle(ecVolume, n, cookie)
  77. writeDeleteResult(err, count, w, r)
  78. return
  79. }
  80. _, ok := vs.store.ReadVolumeNeedle(volumeId, n, nil, nil)
  81. if ok != nil {
  82. m := make(map[string]uint32)
  83. m["size"] = 0
  84. writeJsonQuiet(w, r, http.StatusNotFound, m)
  85. return
  86. }
  87. if n.Cookie != cookie {
  88. glog.V(0).Infoln("delete", r.URL.Path, "with unmaching cookie from ", r.RemoteAddr, "agent", r.UserAgent())
  89. writeJsonError(w, r, http.StatusBadRequest, errors.New("File Random Cookie does not match."))
  90. return
  91. }
  92. count := int64(n.Size)
  93. if n.IsChunkedManifest() {
  94. chunkManifest, e := operation.LoadChunkManifest(n.Data, n.IsCompressed())
  95. if e != nil {
  96. writeJsonError(w, r, http.StatusInternalServerError, fmt.Errorf("Load chunks manifest error: %v", e))
  97. return
  98. }
  99. // make sure all chunks had deleted before delete manifest
  100. if e := chunkManifest.DeleteChunks(vs.GetMaster, false, vs.grpcDialOption); e != nil {
  101. writeJsonError(w, r, http.StatusInternalServerError, fmt.Errorf("Delete chunks error: %v", e))
  102. return
  103. }
  104. count = chunkManifest.Size
  105. }
  106. n.LastModified = uint64(time.Now().Unix())
  107. if len(r.FormValue("ts")) > 0 {
  108. modifiedTime, err := strconv.ParseInt(r.FormValue("ts"), 10, 64)
  109. if err == nil {
  110. n.LastModified = uint64(modifiedTime)
  111. }
  112. }
  113. _, err := topology.ReplicatedDelete(vs.GetMaster, vs.grpcDialOption, vs.store, volumeId, n, r)
  114. writeDeleteResult(err, count, w, r)
  115. }
  116. func writeDeleteResult(err error, count int64, w http.ResponseWriter, r *http.Request) {
  117. if err == nil {
  118. m := make(map[string]int64)
  119. m["size"] = count
  120. writeJsonQuiet(w, r, http.StatusAccepted, m)
  121. } else {
  122. writeJsonError(w, r, http.StatusInternalServerError, fmt.Errorf("Deletion Failed: %w", err))
  123. }
  124. }
  125. func SetEtag(w http.ResponseWriter, etag string) {
  126. if etag != "" {
  127. if strings.HasPrefix(etag, "\"") {
  128. w.Header().Set("ETag", etag)
  129. } else {
  130. w.Header().Set("ETag", "\""+etag+"\"")
  131. }
  132. }
  133. }
  134. func getEtag(resp *http.Response) (etag string) {
  135. etag = resp.Header.Get("ETag")
  136. if strings.HasPrefix(etag, "\"") && strings.HasSuffix(etag, "\"") {
  137. return etag[1 : len(etag)-1]
  138. }
  139. return
  140. }