2015-04-29 05:19:51 -04:00
|
|
|
/*
|
2017-03-18 14:28:41 -04:00
|
|
|
* Minio Cloud Storage, (C) 2015, 2016, 2017 Minio, Inc.
|
2015-04-29 05:19:51 -04:00
|
|
|
*
|
|
|
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
* you may not use this file except in compliance with the License.
|
|
|
|
* You may obtain a copy of the License at
|
|
|
|
*
|
|
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
*
|
|
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
|
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
* See the License for the specific language governing permissions and
|
|
|
|
* limitations under the License.
|
|
|
|
*/
|
|
|
|
|
2016-08-18 19:23:42 -04:00
|
|
|
package cmd
|
2015-04-22 19:28:13 -04:00
|
|
|
|
|
|
|
import (
|
2017-05-31 03:11:06 -04:00
|
|
|
"bytes"
|
2018-03-14 15:01:47 -04:00
|
|
|
"context"
|
2017-12-05 20:58:09 -05:00
|
|
|
"crypto/tls"
|
2015-04-22 19:28:13 -04:00
|
|
|
"encoding/base64"
|
2017-04-07 17:37:32 -04:00
|
|
|
"encoding/json"
|
2016-04-20 20:35:38 -04:00
|
|
|
"encoding/xml"
|
2017-03-16 14:44:01 -04:00
|
|
|
"errors"
|
2016-08-26 03:11:53 -04:00
|
|
|
"fmt"
|
2016-04-20 20:35:38 -04:00
|
|
|
"io"
|
2017-12-05 20:58:09 -05:00
|
|
|
"net"
|
2016-09-09 12:38:07 -04:00
|
|
|
"net/http"
|
2016-10-27 06:30:52 -04:00
|
|
|
"net/url"
|
2017-10-13 06:01:15 -04:00
|
|
|
"os"
|
2017-12-28 12:32:48 -05:00
|
|
|
"reflect"
|
2016-04-20 20:35:38 -04:00
|
|
|
"strings"
|
2017-03-18 14:28:41 -04:00
|
|
|
"time"
|
2016-09-01 23:13:11 -04:00
|
|
|
|
2018-03-14 21:36:54 -04:00
|
|
|
"github.com/minio/minio/cmd/logger"
|
|
|
|
|
2016-11-22 21:18:22 -05:00
|
|
|
humanize "github.com/dustin/go-humanize"
|
2018-03-14 15:01:47 -04:00
|
|
|
"github.com/gorilla/mux"
|
2016-09-01 23:13:11 -04:00
|
|
|
"github.com/pkg/profile"
|
2015-04-22 19:28:13 -04:00
|
|
|
)
|
|
|
|
|
2018-01-05 14:24:31 -05:00
|
|
|
// Close Http tracing file.
|
|
|
|
func stopHTTPTrace() {
|
|
|
|
if globalHTTPTraceFile != nil {
|
|
|
|
errorIf(globalHTTPTraceFile.Close(), "Unable to close httpTraceFile %s", globalHTTPTraceFile.Name())
|
|
|
|
globalHTTPTraceFile = nil
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-09-09 12:38:07 -04:00
|
|
|
// make a copy of http.Header
|
|
|
|
func cloneHeader(h http.Header) http.Header {
|
|
|
|
h2 := make(http.Header, len(h))
|
|
|
|
for k, vv := range h {
|
|
|
|
vv2 := make([]string, len(vv))
|
|
|
|
copy(vv2, vv)
|
|
|
|
h2[k] = vv2
|
|
|
|
|
|
|
|
}
|
|
|
|
return h2
|
|
|
|
}
|
|
|
|
|
2017-01-10 14:01:23 -05:00
|
|
|
// Convert url path into bucket and object name.
|
2018-02-27 22:14:49 -05:00
|
|
|
func urlPath2BucketObjectName(path string) (bucketName, objectName string) {
|
2017-01-10 14:01:23 -05:00
|
|
|
// Trim any preceding slash separator.
|
2018-02-27 22:14:49 -05:00
|
|
|
urlPath := strings.TrimPrefix(path, slashSeparator)
|
2017-01-10 14:01:23 -05:00
|
|
|
|
|
|
|
// Split urlpath using slash separator into a given number of
|
|
|
|
// expected tokens.
|
2017-04-11 18:44:27 -04:00
|
|
|
tokens := strings.SplitN(urlPath, slashSeparator, 2)
|
|
|
|
bucketName = tokens[0]
|
|
|
|
if len(tokens) == 2 {
|
|
|
|
objectName = tokens[1]
|
|
|
|
}
|
2017-01-10 14:01:23 -05:00
|
|
|
|
|
|
|
// Success.
|
|
|
|
return bucketName, objectName
|
|
|
|
}
|
|
|
|
|
2017-01-18 15:24:34 -05:00
|
|
|
// URI scheme constants.
|
|
|
|
const (
|
|
|
|
httpScheme = "http"
|
|
|
|
httpsScheme = "https"
|
|
|
|
)
|
|
|
|
|
2016-04-20 20:35:38 -04:00
|
|
|
// xmlDecoder provide decoded value in xml.
|
2016-07-19 00:20:17 -04:00
|
|
|
func xmlDecoder(body io.Reader, v interface{}, size int64) error {
|
|
|
|
var lbody io.Reader
|
|
|
|
if size > 0 {
|
|
|
|
lbody = io.LimitReader(body, size)
|
|
|
|
} else {
|
|
|
|
lbody = body
|
|
|
|
}
|
|
|
|
d := xml.NewDecoder(lbody)
|
2016-04-20 20:35:38 -04:00
|
|
|
return d.Decode(v)
|
|
|
|
}
|
|
|
|
|
2016-03-12 19:08:15 -05:00
|
|
|
// checkValidMD5 - verify if valid md5, returns md5 in bytes.
|
2018-03-16 14:22:34 -04:00
|
|
|
func checkValidMD5(h http.Header) ([]byte, error) {
|
|
|
|
md5B64, ok := h["Content-Md5"]
|
|
|
|
if ok {
|
|
|
|
if md5B64[0] == "" {
|
|
|
|
return nil, fmt.Errorf("Content-Md5 header set to empty value")
|
|
|
|
}
|
|
|
|
return base64.StdEncoding.DecodeString(md5B64[0])
|
|
|
|
}
|
|
|
|
return []byte{}, nil
|
2015-04-22 19:28:13 -04:00
|
|
|
}
|
2015-04-29 05:19:51 -04:00
|
|
|
|
2015-04-29 13:51:59 -04:00
|
|
|
/// http://docs.aws.amazon.com/AmazonS3/latest/dev/UploadingObjects.html
|
2015-04-29 05:19:51 -04:00
|
|
|
const (
|
2017-11-28 02:29:02 -05:00
|
|
|
// Maximum object size per PUT request is 5TB.
|
2017-03-03 13:14:17 -05:00
|
|
|
// This is a divergence from S3 limit on purpose to support
|
|
|
|
// use cases where users are going to upload large files
|
|
|
|
// using 'curl' and presigned URL.
|
2017-11-28 02:29:02 -05:00
|
|
|
globalMaxObjectSize = 5 * humanize.TiByte
|
2017-03-03 13:14:17 -05:00
|
|
|
|
|
|
|
// Minimum Part size for multipart upload is 5MiB
|
|
|
|
globalMinPartSize = 5 * humanize.MiByte
|
|
|
|
|
|
|
|
// Maximum Part size for multipart upload is 5GiB
|
|
|
|
globalMaxPartSize = 5 * humanize.GiByte
|
|
|
|
|
|
|
|
// Maximum Part ID for multipart upload is 10000
|
|
|
|
// (Acceptable values range from 1 to 10000 inclusive)
|
|
|
|
globalMaxPartID = 10000
|
2015-04-29 05:19:51 -04:00
|
|
|
)
|
|
|
|
|
|
|
|
// isMaxObjectSize - verify if max object size
|
2015-12-28 02:00:36 -05:00
|
|
|
func isMaxObjectSize(size int64) bool {
|
2017-03-03 13:14:17 -05:00
|
|
|
return size > globalMaxObjectSize
|
|
|
|
}
|
|
|
|
|
|
|
|
// // Check if part size is more than maximum allowed size.
|
|
|
|
func isMaxAllowedPartSize(size int64) bool {
|
|
|
|
return size > globalMaxPartSize
|
2015-04-29 05:19:51 -04:00
|
|
|
}
|
2016-02-05 06:09:31 -05:00
|
|
|
|
2016-05-08 15:06:05 -04:00
|
|
|
// Check if part size is more than or equal to minimum allowed size.
|
|
|
|
func isMinAllowedPartSize(size int64) bool {
|
2017-03-03 13:14:17 -05:00
|
|
|
return size >= globalMinPartSize
|
2016-05-08 15:06:05 -04:00
|
|
|
}
|
|
|
|
|
2016-05-24 04:52:47 -04:00
|
|
|
// isMaxPartNumber - Check if part ID is greater than the maximum allowed ID.
|
|
|
|
func isMaxPartID(partID int) bool {
|
2017-03-03 13:14:17 -05:00
|
|
|
return partID > globalMaxPartID
|
2016-05-24 04:52:47 -04:00
|
|
|
}
|
|
|
|
|
2017-12-28 12:32:48 -05:00
|
|
|
func contains(slice interface{}, elem interface{}) bool {
|
|
|
|
v := reflect.ValueOf(slice)
|
|
|
|
if v.Kind() == reflect.Slice {
|
|
|
|
for i := 0; i < v.Len(); i++ {
|
|
|
|
if v.Index(i).Interface() == elem {
|
|
|
|
return true
|
|
|
|
}
|
2016-02-05 06:09:31 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
return false
|
|
|
|
}
|
2016-08-05 16:48:31 -04:00
|
|
|
|
2016-09-01 23:13:11 -04:00
|
|
|
// Starts a profiler returns nil if profiler is not enabled, caller needs to handle this.
|
|
|
|
func startProfiler(profiler string) interface {
|
|
|
|
Stop()
|
|
|
|
} {
|
2016-11-11 19:36:07 -05:00
|
|
|
// Enable profiler if ``_MINIO_PROFILER`` is set. Supported options are [cpu, mem, block].
|
2016-09-01 23:13:11 -04:00
|
|
|
switch profiler {
|
|
|
|
case "cpu":
|
2016-11-11 19:36:07 -05:00
|
|
|
return profile.Start(profile.CPUProfile, profile.NoShutdownHook)
|
2016-09-01 23:13:11 -04:00
|
|
|
case "mem":
|
2016-11-11 19:36:07 -05:00
|
|
|
return profile.Start(profile.MemProfile, profile.NoShutdownHook)
|
2016-09-01 23:13:11 -04:00
|
|
|
case "block":
|
2016-11-11 19:36:07 -05:00
|
|
|
return profile.Start(profile.BlockProfile, profile.NoShutdownHook)
|
2016-09-01 23:13:11 -04:00
|
|
|
default:
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-10-10 02:03:10 -04:00
|
|
|
// Global profiler to be used by service go-routine.
|
2016-09-01 23:13:11 -04:00
|
|
|
var globalProfiler interface {
|
|
|
|
Stop()
|
|
|
|
}
|
|
|
|
|
2016-09-19 13:17:46 -04:00
|
|
|
// dump the request into a string in JSON format.
|
|
|
|
func dumpRequest(r *http.Request) string {
|
|
|
|
header := cloneHeader(r.Header)
|
|
|
|
header.Set("Host", r.Host)
|
2017-05-31 03:11:06 -04:00
|
|
|
// Replace all '%' to '%%' so that printer format parser
|
|
|
|
// to ignore URL encoded values.
|
|
|
|
rawURI := strings.Replace(r.RequestURI, "%", "%%", -1)
|
2016-09-19 13:17:46 -04:00
|
|
|
req := struct {
|
2017-05-31 03:11:06 -04:00
|
|
|
Method string `json:"method"`
|
|
|
|
RequestURI string `json:"reqURI"`
|
|
|
|
Header http.Header `json:"header"`
|
|
|
|
}{r.Method, rawURI, header}
|
|
|
|
|
|
|
|
var buffer bytes.Buffer
|
|
|
|
enc := json.NewEncoder(&buffer)
|
|
|
|
enc.SetEscapeHTML(false)
|
|
|
|
if err := enc.Encode(&req); err != nil {
|
2017-04-07 17:37:32 -04:00
|
|
|
// Upon error just return Go-syntax representation of the value
|
|
|
|
return fmt.Sprintf("%#v", req)
|
2016-09-19 13:17:46 -04:00
|
|
|
}
|
2017-05-31 03:11:06 -04:00
|
|
|
|
|
|
|
// Formatted string.
|
|
|
|
return strings.TrimSpace(string(buffer.Bytes()))
|
2016-09-19 13:17:46 -04:00
|
|
|
}
|
2017-02-27 17:59:53 -05:00
|
|
|
|
2017-03-02 17:21:30 -05:00
|
|
|
// isFile - returns whether given path is a file or not.
|
|
|
|
func isFile(path string) bool {
|
2017-10-13 06:01:15 -04:00
|
|
|
if fi, err := os.Stat(path); err == nil {
|
2017-03-02 17:21:30 -05:00
|
|
|
return fi.Mode().IsRegular()
|
|
|
|
}
|
|
|
|
|
|
|
|
return false
|
|
|
|
}
|
2017-03-15 19:30:34 -04:00
|
|
|
|
2017-03-16 14:44:01 -04:00
|
|
|
// checkURL - checks if passed address correspond
|
2017-03-31 07:47:40 -04:00
|
|
|
func checkURL(urlStr string) (*url.URL, error) {
|
|
|
|
if urlStr == "" {
|
2017-03-16 14:44:01 -04:00
|
|
|
return nil, errors.New("Address cannot be empty")
|
|
|
|
}
|
2017-03-31 07:47:40 -04:00
|
|
|
u, err := url.Parse(urlStr)
|
2017-03-15 19:30:34 -04:00
|
|
|
if err != nil {
|
2017-03-31 07:47:40 -04:00
|
|
|
return nil, fmt.Errorf("`%s` invalid: %s", urlStr, err.Error())
|
2017-03-15 19:30:34 -04:00
|
|
|
}
|
|
|
|
return u, nil
|
|
|
|
}
|
2017-03-18 14:28:41 -04:00
|
|
|
|
|
|
|
// UTCNow - returns current UTC time.
|
|
|
|
func UTCNow() time.Time {
|
|
|
|
return time.Now().UTC()
|
|
|
|
}
|
2017-10-26 13:17:07 -04:00
|
|
|
|
2017-12-05 20:58:09 -05:00
|
|
|
// GenETag - generate UUID based ETag
|
|
|
|
func GenETag() string {
|
|
|
|
return ToS3ETag(getMD5Hash([]byte(mustGetUUID())))
|
2017-10-26 13:17:07 -04:00
|
|
|
}
|
|
|
|
|
2017-12-05 20:58:09 -05:00
|
|
|
// ToS3ETag - return checksum to ETag
|
|
|
|
func ToS3ETag(etag string) string {
|
2017-10-26 13:17:07 -04:00
|
|
|
etag = canonicalizeETag(etag)
|
|
|
|
|
|
|
|
if !strings.HasSuffix(etag, "-1") {
|
|
|
|
// Tools like s3cmd uses ETag as checksum of data to validate.
|
|
|
|
// Append "-1" to indicate ETag is not a checksum.
|
|
|
|
etag += "-1"
|
|
|
|
}
|
|
|
|
|
|
|
|
return etag
|
|
|
|
}
|
2017-12-05 20:58:09 -05:00
|
|
|
|
|
|
|
// NewCustomHTTPTransport returns a new http configuration
|
|
|
|
// used while communicating with the cloud backends.
|
2018-02-20 15:23:37 -05:00
|
|
|
// This sets the value for MaxIdleConnsPerHost from 2 (go default)
|
|
|
|
// to 100.
|
2017-12-05 20:58:09 -05:00
|
|
|
func NewCustomHTTPTransport() http.RoundTripper {
|
|
|
|
return &http.Transport{
|
|
|
|
Proxy: http.ProxyFromEnvironment,
|
|
|
|
DialContext: (&net.Dialer{
|
|
|
|
Timeout: 30 * time.Second,
|
|
|
|
KeepAlive: 30 * time.Second,
|
|
|
|
}).DialContext,
|
|
|
|
MaxIdleConns: 100,
|
2018-02-20 15:23:37 -05:00
|
|
|
MaxIdleConnsPerHost: 100,
|
2017-12-05 20:58:09 -05:00
|
|
|
IdleConnTimeout: 90 * time.Second,
|
|
|
|
TLSHandshakeTimeout: 10 * time.Second,
|
|
|
|
ExpectContinueTimeout: 1 * time.Second,
|
|
|
|
TLSClientConfig: &tls.Config{RootCAs: globalRootCAs},
|
|
|
|
DisableCompression: true,
|
|
|
|
}
|
|
|
|
}
|
2018-01-08 17:30:55 -05:00
|
|
|
|
|
|
|
// Load the json (typically from disk file).
|
2018-02-06 18:37:48 -05:00
|
|
|
func jsonLoad(r io.ReadSeeker, data interface{}) error {
|
2018-01-08 17:30:55 -05:00
|
|
|
if _, err := r.Seek(0, io.SeekStart); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
return json.NewDecoder(r).Decode(data)
|
|
|
|
}
|
2018-02-06 18:37:48 -05:00
|
|
|
|
|
|
|
// Save to disk file in json format.
|
|
|
|
func jsonSave(f interface {
|
|
|
|
io.WriteSeeker
|
|
|
|
Truncate(int64) error
|
|
|
|
}, data interface{}) error {
|
|
|
|
b, err := json.Marshal(data)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
if err = f.Truncate(0); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
if _, err = f.Seek(0, io.SeekStart); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
_, err = f.Write(b)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
2018-03-04 17:16:45 -05:00
|
|
|
|
|
|
|
// ceilFrac takes a numerator and denominator representing a fraction
|
|
|
|
// and returns its ceiling. If denominator is 0, it returns 0 instead
|
|
|
|
// of crashing.
|
|
|
|
func ceilFrac(numerator, denominator int64) (ceil int64) {
|
|
|
|
if denominator == 0 {
|
|
|
|
// do nothing on invalid input
|
|
|
|
return
|
|
|
|
}
|
|
|
|
// Make denominator positive
|
|
|
|
if denominator < 0 {
|
|
|
|
numerator = -numerator
|
|
|
|
denominator = -denominator
|
|
|
|
}
|
|
|
|
ceil = numerator / denominator
|
|
|
|
if numerator > 0 && numerator%denominator != 0 {
|
|
|
|
ceil++
|
|
|
|
}
|
|
|
|
return
|
|
|
|
}
|
2018-03-14 15:01:47 -04:00
|
|
|
|
2018-03-14 21:36:54 -04:00
|
|
|
// Returns context with ReqInfo details set in the context.
|
2018-03-14 15:01:47 -04:00
|
|
|
func newContext(r *http.Request, api string) context.Context {
|
|
|
|
vars := mux.Vars(r)
|
|
|
|
bucket := vars["bucket"]
|
|
|
|
object := vars["object"]
|
|
|
|
prefix := vars["prefix"]
|
|
|
|
|
|
|
|
if prefix != "" {
|
|
|
|
object = prefix
|
|
|
|
}
|
|
|
|
|
2018-03-15 16:27:16 -04:00
|
|
|
return logger.SetContext(context.Background(), &logger.ReqInfo{r.RemoteAddr, r.Header.Get("user-agent"), "", api, bucket, object, nil})
|
2018-03-14 15:01:47 -04:00
|
|
|
}
|