2018-10-04 20:44:06 -04:00
|
|
|
/*
|
2019-04-09 14:39:42 -04:00
|
|
|
* MinIO Cloud Storage, (C) 2018 MinIO, Inc.
|
2018-10-04 20:44:06 -04:00
|
|
|
*
|
|
|
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
* you may not use this file except in compliance with the License.
|
|
|
|
* You may obtain a copy of the License at
|
|
|
|
*
|
|
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
*
|
|
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
|
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
* See the License for the specific language governing permissions and
|
|
|
|
* limitations under the License.
|
|
|
|
*/
|
|
|
|
|
|
|
|
package rest
|
|
|
|
|
|
|
|
import (
|
|
|
|
"context"
|
|
|
|
"errors"
|
|
|
|
"io"
|
|
|
|
"io/ioutil"
|
|
|
|
"net/http"
|
|
|
|
"net/url"
|
2020-06-16 21:59:32 -04:00
|
|
|
"sync/atomic"
|
2018-10-04 20:44:06 -04:00
|
|
|
"time"
|
|
|
|
|
|
|
|
xhttp "github.com/minio/minio/cmd/http"
|
|
|
|
)
|
|
|
|
|
|
|
|
// DefaultRESTTimeout - default RPC timeout is one minute.
|
|
|
|
const DefaultRESTTimeout = 1 * time.Minute
|
|
|
|
|
2020-06-16 21:59:32 -04:00
|
|
|
const (
|
|
|
|
offline = iota
|
|
|
|
online
|
|
|
|
closed
|
|
|
|
)
|
|
|
|
|
2019-05-29 13:21:47 -04:00
|
|
|
// NetworkError - error type in case of errors related to http/transport
|
|
|
|
// for ex. connection refused, connection reset, dns resolution failure etc.
|
|
|
|
// All errors returned by storage-rest-server (ex errFileNotFound, errDiskNotFound) are not considered to be network errors.
|
|
|
|
type NetworkError struct {
|
|
|
|
Err error
|
|
|
|
}
|
|
|
|
|
|
|
|
func (n *NetworkError) Error() string {
|
|
|
|
return n.Err.Error()
|
|
|
|
}
|
|
|
|
|
2020-06-16 21:59:32 -04:00
|
|
|
// Unwrap returns the error wrapped in NetworkError.
|
|
|
|
func (n *NetworkError) Unwrap() error {
|
|
|
|
return n.Err
|
|
|
|
}
|
|
|
|
|
2018-10-04 20:44:06 -04:00
|
|
|
// Client - http based RPC client.
|
|
|
|
type Client struct {
|
2020-06-16 21:59:32 -04:00
|
|
|
// HealthCheckPath is the path to test for health.
|
|
|
|
// If left empty the client will not keep track of health.
|
|
|
|
// Calling this can return any http status code/contents.
|
|
|
|
HealthCheckPath string
|
|
|
|
|
|
|
|
// HealthCheckInterval will be the duration between re-connection attempts
|
|
|
|
// when a call has failed with a network error.
|
|
|
|
HealthCheckInterval time.Duration
|
|
|
|
|
|
|
|
// HealthCheckTimeout determines timeout for each call.
|
|
|
|
HealthCheckTimeout time.Duration
|
|
|
|
|
|
|
|
// MaxErrResponseSize is the maximum expected response size.
|
|
|
|
// Should only be modified before any calls are made.
|
|
|
|
MaxErrResponseSize int64
|
|
|
|
|
2018-11-20 14:07:19 -05:00
|
|
|
httpClient *http.Client
|
|
|
|
httpIdleConnsCloser func()
|
|
|
|
url *url.URL
|
2020-01-30 21:59:22 -05:00
|
|
|
newAuthToken func(audience string) string
|
2020-06-16 21:59:32 -04:00
|
|
|
connected int32
|
2018-10-04 20:44:06 -04:00
|
|
|
}
|
|
|
|
|
2019-08-06 15:08:58 -04:00
|
|
|
// URL query separator constants
|
|
|
|
const (
|
2019-11-04 12:30:59 -05:00
|
|
|
querySep = "?"
|
2019-08-06 15:08:58 -04:00
|
|
|
)
|
|
|
|
|
2019-06-08 18:54:41 -04:00
|
|
|
// CallWithContext - make a REST call with context.
|
|
|
|
func (c *Client) CallWithContext(ctx context.Context, method string, values url.Values, body io.Reader, length int64) (reply io.ReadCloser, err error) {
|
2020-06-16 21:59:32 -04:00
|
|
|
if !c.IsOnline() {
|
|
|
|
return nil, &NetworkError{Err: errors.New("remote server offline")}
|
|
|
|
}
|
2019-11-04 12:30:59 -05:00
|
|
|
req, err := http.NewRequest(http.MethodPost, c.url.String()+method+querySep+values.Encode(), body)
|
2018-10-04 20:44:06 -04:00
|
|
|
if err != nil {
|
2019-05-29 13:21:47 -04:00
|
|
|
return nil, &NetworkError{err}
|
2018-10-04 20:44:06 -04:00
|
|
|
}
|
2019-06-08 18:54:41 -04:00
|
|
|
req = req.WithContext(ctx)
|
2020-01-30 21:59:22 -05:00
|
|
|
req.Header.Set("Authorization", "Bearer "+c.newAuthToken(req.URL.Query().Encode()))
|
2018-10-04 20:44:06 -04:00
|
|
|
req.Header.Set("X-Minio-Time", time.Now().UTC().Format(time.RFC3339))
|
2019-01-17 07:58:18 -05:00
|
|
|
if length > 0 {
|
|
|
|
req.ContentLength = length
|
|
|
|
}
|
2018-10-04 20:44:06 -04:00
|
|
|
resp, err := c.httpClient.Do(req)
|
|
|
|
if err != nil {
|
2020-06-16 21:59:32 -04:00
|
|
|
// A canceled context doesn't always mean a network problem.
|
|
|
|
if !errors.Is(err, context.Canceled) {
|
|
|
|
// We are safe from recursion
|
|
|
|
c.MarkOffline()
|
|
|
|
}
|
2019-05-29 13:21:47 -04:00
|
|
|
return nil, &NetworkError{err}
|
2018-10-04 20:44:06 -04:00
|
|
|
}
|
|
|
|
|
2020-03-27 00:07:39 -04:00
|
|
|
final := resp.Trailer.Get("FinalStatus")
|
|
|
|
if final != "" && final != "Success" {
|
|
|
|
defer xhttp.DrainBody(resp.Body)
|
|
|
|
return nil, errors.New(final)
|
|
|
|
}
|
|
|
|
|
2018-10-04 20:44:06 -04:00
|
|
|
if resp.StatusCode != http.StatusOK {
|
2019-02-06 15:07:03 -05:00
|
|
|
defer xhttp.DrainBody(resp.Body)
|
2018-10-04 20:44:06 -04:00
|
|
|
// Limit the ReadAll(), just in case, because of a bug, the server responds with large data.
|
2020-06-16 21:59:32 -04:00
|
|
|
b, err := ioutil.ReadAll(io.LimitReader(resp.Body, c.MaxErrResponseSize))
|
2018-10-04 20:44:06 -04:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
2019-04-02 15:25:34 -04:00
|
|
|
if len(b) > 0 {
|
|
|
|
return nil, errors.New(string(b))
|
|
|
|
}
|
|
|
|
return nil, errors.New(resp.Status)
|
2018-10-04 20:44:06 -04:00
|
|
|
}
|
|
|
|
return resp.Body, nil
|
|
|
|
}
|
|
|
|
|
2019-06-08 18:54:41 -04:00
|
|
|
// Call - make a REST call.
|
|
|
|
func (c *Client) Call(method string, values url.Values, body io.Reader, length int64) (reply io.ReadCloser, err error) {
|
|
|
|
ctx := context.Background()
|
|
|
|
return c.CallWithContext(ctx, method, values, body, length)
|
|
|
|
}
|
|
|
|
|
2018-11-20 14:07:19 -05:00
|
|
|
// Close closes all idle connections of the underlying http client
|
|
|
|
func (c *Client) Close() {
|
2020-06-16 21:59:32 -04:00
|
|
|
atomic.StoreInt32(&c.connected, closed)
|
2018-11-20 14:07:19 -05:00
|
|
|
if c.httpIdleConnsCloser != nil {
|
|
|
|
c.httpIdleConnsCloser()
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// NewClient - returns new REST client.
|
2020-01-30 21:59:22 -05:00
|
|
|
func NewClient(url *url.URL, newCustomTransport func() *http.Transport, newAuthToken func(aud string) string) (*Client, error) {
|
2018-11-20 14:07:19 -05:00
|
|
|
// Transport is exactly same as Go default in https://golang.org/pkg/net/http/#RoundTripper
|
|
|
|
// except custom DialContext and TLSClientConfig.
|
2019-11-13 15:17:45 -05:00
|
|
|
tr := newCustomTransport()
|
2018-10-04 20:44:06 -04:00
|
|
|
return &Client{
|
2018-11-20 14:07:19 -05:00
|
|
|
httpClient: &http.Client{Transport: tr},
|
|
|
|
httpIdleConnsCloser: tr.CloseIdleConnections,
|
|
|
|
url: url,
|
|
|
|
newAuthToken: newAuthToken,
|
2020-06-16 21:59:32 -04:00
|
|
|
connected: online,
|
|
|
|
|
|
|
|
MaxErrResponseSize: 4096,
|
|
|
|
HealthCheckPath: "",
|
|
|
|
HealthCheckInterval: 200 * time.Millisecond,
|
|
|
|
HealthCheckTimeout: time.Second,
|
2019-02-14 20:53:46 -05:00
|
|
|
}, nil
|
2018-10-04 20:44:06 -04:00
|
|
|
}
|
2020-06-16 21:59:32 -04:00
|
|
|
|
|
|
|
// IsOnline returns whether the client is likely to be online.
|
|
|
|
func (c *Client) IsOnline() bool {
|
|
|
|
return atomic.LoadInt32(&c.connected) == online
|
|
|
|
}
|
|
|
|
|
|
|
|
// MarkOffline - will mark a client as being offline and spawns
|
|
|
|
// a goroutine that will attempt to reconnect if a HealthCheckPath is set.
|
|
|
|
func (c *Client) MarkOffline() {
|
|
|
|
// Start goroutine that will attempt to reconnect.
|
|
|
|
// If server is already trying to reconnect this will have no effect.
|
|
|
|
if len(c.HealthCheckPath) > 0 && atomic.CompareAndSwapInt32(&c.connected, online, offline) {
|
|
|
|
if c.httpIdleConnsCloser != nil {
|
|
|
|
c.httpIdleConnsCloser()
|
|
|
|
}
|
|
|
|
go func() {
|
|
|
|
ticker := time.NewTicker(c.HealthCheckInterval)
|
|
|
|
defer ticker.Stop()
|
|
|
|
for range ticker.C {
|
|
|
|
if status := atomic.LoadInt32(&c.connected); status == closed {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
ctx, cancel := context.WithTimeout(context.Background(), c.HealthCheckTimeout)
|
|
|
|
respBody, err := c.CallWithContext(ctx, c.HealthCheckPath, nil, nil, -1)
|
|
|
|
xhttp.DrainBody(respBody)
|
|
|
|
cancel()
|
|
|
|
var ne *NetworkError
|
|
|
|
if !errors.Is(err, context.DeadlineExceeded) && !errors.As(err, &ne) {
|
|
|
|
atomic.CompareAndSwapInt32(&c.connected, offline, online)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}()
|
|
|
|
}
|
|
|
|
}
|