2016-04-29 17:24:10 -04:00
|
|
|
/*
|
2018-03-15 16:03:41 -04:00
|
|
|
* Minio Cloud Storage, (C) 2016, 2017, 2018 Minio, Inc.
|
2016-04-29 17:24:10 -04:00
|
|
|
*
|
|
|
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
* you may not use this file except in compliance with the License.
|
|
|
|
* You may obtain a copy of the License at
|
|
|
|
*
|
|
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
*
|
|
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
|
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
* See the License for the specific language governing permissions and
|
|
|
|
* limitations under the License.
|
|
|
|
*/
|
|
|
|
|
2016-08-18 19:23:42 -04:00
|
|
|
package cmd
|
2016-04-29 17:24:10 -04:00
|
|
|
|
|
|
|
import (
|
2018-03-14 15:01:47 -04:00
|
|
|
"context"
|
2017-10-24 15:25:42 -04:00
|
|
|
"encoding/hex"
|
2016-04-29 17:24:10 -04:00
|
|
|
"io"
|
2017-04-04 12:14:03 -04:00
|
|
|
"io/ioutil"
|
2017-01-16 20:05:00 -05:00
|
|
|
"os"
|
2017-05-09 20:46:46 -04:00
|
|
|
"path"
|
2016-05-20 23:48:47 -04:00
|
|
|
"sort"
|
2018-04-24 20:36:43 -04:00
|
|
|
"strings"
|
2018-01-31 16:17:24 -05:00
|
|
|
"sync"
|
2018-05-23 06:11:29 -04:00
|
|
|
"sync/atomic"
|
2018-01-12 23:34:52 -05:00
|
|
|
"time"
|
2016-04-29 17:24:10 -04:00
|
|
|
|
2018-04-05 18:04:40 -04:00
|
|
|
"github.com/minio/minio/cmd/logger"
|
2017-10-22 01:30:34 -04:00
|
|
|
"github.com/minio/minio/pkg/hash"
|
2017-01-16 20:05:00 -05:00
|
|
|
"github.com/minio/minio/pkg/lock"
|
2018-01-22 17:54:55 -05:00
|
|
|
"github.com/minio/minio/pkg/madmin"
|
2018-04-24 20:36:43 -04:00
|
|
|
"github.com/minio/minio/pkg/mimedb"
|
2018-06-27 21:59:38 -04:00
|
|
|
"github.com/minio/minio/pkg/mountinfo"
|
2018-04-24 18:53:30 -04:00
|
|
|
"github.com/minio/minio/pkg/policy"
|
2016-04-29 17:24:10 -04:00
|
|
|
)
|
|
|
|
|
2018-04-24 20:36:43 -04:00
|
|
|
// Default etag is used for pre-existing objects.
|
|
|
|
var defaultEtag = "00000000000000000000000000000000-1"
|
|
|
|
|
2018-02-20 15:21:12 -05:00
|
|
|
// FSObjects - Implements fs object layer.
|
|
|
|
type FSObjects struct {
|
2018-06-04 21:35:41 -04:00
|
|
|
// Disk usage metrics
|
|
|
|
totalUsed uint64 // ref: https://golang.org/pkg/sync/atomic/#pkg-note-BUG
|
|
|
|
|
2017-01-16 20:05:00 -05:00
|
|
|
// Path to be exported over S3 API.
|
|
|
|
fsPath string
|
2018-03-28 17:14:06 -04:00
|
|
|
// meta json filename, varies by fs / cache backend.
|
|
|
|
metaJSONFile string
|
2017-01-16 20:05:00 -05:00
|
|
|
// Unique value to be used for all
|
|
|
|
// temporary transactions.
|
|
|
|
fsUUID string
|
|
|
|
|
2017-06-13 11:29:07 -04:00
|
|
|
// This value shouldn't be touched, once initialized.
|
|
|
|
fsFormatRlk *lock.RLockedFile // Is a read lock on `format.json`.
|
|
|
|
|
2017-01-16 20:05:00 -05:00
|
|
|
// FS rw pool.
|
|
|
|
rwPool *fsIOPool
|
|
|
|
|
|
|
|
// ListObjects pool management.
|
2016-06-24 19:41:57 -04:00
|
|
|
listPool *treeWalkPool
|
2016-11-21 02:42:53 -05:00
|
|
|
|
2018-06-27 21:59:38 -04:00
|
|
|
diskMount bool
|
|
|
|
|
2018-01-31 16:17:24 -05:00
|
|
|
appendFileMap map[string]*fsAppendFile
|
|
|
|
appendFileMapMu sync.Mutex
|
2018-01-12 23:34:52 -05:00
|
|
|
|
2018-01-31 16:17:24 -05:00
|
|
|
// To manage the appendRoutine go-routines
|
2018-01-12 23:34:52 -05:00
|
|
|
nsMutex *nsLockMap
|
2016-04-29 17:24:10 -04:00
|
|
|
}
|
|
|
|
|
2018-01-31 16:17:24 -05:00
|
|
|
// Represents the background append file.
|
|
|
|
type fsAppendFile struct {
|
|
|
|
sync.Mutex
|
|
|
|
parts []PartInfo // List of parts appended.
|
|
|
|
filePath string // Absolute path of the file in the temp location.
|
|
|
|
}
|
|
|
|
|
2017-01-16 20:05:00 -05:00
|
|
|
// Initializes meta volume on all the fs path.
|
|
|
|
func initMetaVolumeFS(fsPath, fsUUID string) error {
|
|
|
|
// This happens for the first time, but keep this here since this
|
|
|
|
// is the only place where it can be made less expensive
|
|
|
|
// optimizing all other calls. Create minio meta volume,
|
|
|
|
// if it doesn't exist yet.
|
|
|
|
metaBucketPath := pathJoin(fsPath, minioMetaBucket)
|
2018-05-08 22:04:36 -04:00
|
|
|
|
2017-08-12 22:25:43 -04:00
|
|
|
if err := os.MkdirAll(metaBucketPath, 0777); err != nil {
|
2017-01-16 20:05:00 -05:00
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
metaTmpPath := pathJoin(fsPath, minioMetaTmpBucket, fsUUID)
|
2017-08-12 22:25:43 -04:00
|
|
|
if err := os.MkdirAll(metaTmpPath, 0777); err != nil {
|
2017-01-16 20:05:00 -05:00
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
metaMultipartPath := pathJoin(fsPath, minioMetaMultipartBucket)
|
2017-08-12 22:25:43 -04:00
|
|
|
return os.MkdirAll(metaMultipartPath, 0777)
|
2017-01-16 20:05:00 -05:00
|
|
|
|
2016-09-15 16:43:40 -04:00
|
|
|
}
|
|
|
|
|
2018-03-29 17:38:26 -04:00
|
|
|
// NewFSObjectLayer - initialize new fs object layer.
|
|
|
|
func NewFSObjectLayer(fsPath string) (ObjectLayer, error) {
|
2018-04-05 18:04:40 -04:00
|
|
|
ctx := context.Background()
|
2017-01-16 20:05:00 -05:00
|
|
|
if fsPath == "" {
|
2016-10-05 15:48:07 -04:00
|
|
|
return nil, errInvalidArgument
|
2016-07-02 04:59:28 -04:00
|
|
|
}
|
|
|
|
|
2017-06-12 20:40:28 -04:00
|
|
|
var err error
|
2018-05-17 10:27:07 -04:00
|
|
|
if fsPath, err = getValidPath(fsPath); err != nil {
|
2018-06-28 15:01:05 -04:00
|
|
|
if err == errMinDiskSize {
|
|
|
|
return nil, err
|
|
|
|
}
|
2018-05-08 22:04:36 -04:00
|
|
|
return nil, uiErrUnableToWriteInBackend(err)
|
2017-07-10 21:14:48 -04:00
|
|
|
}
|
|
|
|
|
2017-01-16 20:05:00 -05:00
|
|
|
// Assign a new UUID for FS minio mode. Each server instance
|
|
|
|
// gets its own UUID for temporary file transaction.
|
|
|
|
fsUUID := mustGetUUID()
|
|
|
|
|
2016-11-25 21:11:50 -05:00
|
|
|
// Initialize meta volume, if volume already exists ignores it.
|
2017-01-16 20:05:00 -05:00
|
|
|
if err = initMetaVolumeFS(fsPath, fsUUID); err != nil {
|
2018-05-08 22:04:36 -04:00
|
|
|
return nil, err
|
2016-11-25 21:11:50 -05:00
|
|
|
}
|
|
|
|
|
2017-06-13 11:29:07 -04:00
|
|
|
// Initialize `format.json`, this function also returns.
|
2018-04-05 18:04:40 -04:00
|
|
|
rlk, err := initFormatFS(ctx, fsPath)
|
2017-06-13 11:29:07 -04:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
2016-08-05 01:01:58 -04:00
|
|
|
// Initialize fs objects.
|
2018-02-20 15:21:12 -05:00
|
|
|
fs := &FSObjects{
|
2018-03-28 17:14:06 -04:00
|
|
|
fsPath: fsPath,
|
2018-03-29 17:38:26 -04:00
|
|
|
metaJSONFile: fsMetaJSONFile,
|
2018-03-28 17:14:06 -04:00
|
|
|
fsUUID: fsUUID,
|
2017-01-16 20:05:00 -05:00
|
|
|
rwPool: &fsIOPool{
|
|
|
|
readersMap: make(map[string]*lock.RLockedFile),
|
|
|
|
},
|
2018-06-04 21:35:41 -04:00
|
|
|
nsMutex: newNSLock(false),
|
|
|
|
listPool: newTreeWalkPool(globalLookupTimeout),
|
|
|
|
appendFileMap: make(map[string]*fsAppendFile),
|
2018-06-27 21:59:38 -04:00
|
|
|
diskMount: mountinfo.IsLikelyMountPoint(fsPath),
|
2016-08-05 01:01:58 -04:00
|
|
|
}
|
|
|
|
|
2017-06-13 11:29:07 -04:00
|
|
|
// Once the filesystem has initialized hold the read lock for
|
|
|
|
// the life time of the server. This is done to ensure that under
|
|
|
|
// shared backend mode for FS, remote servers do not migrate
|
|
|
|
// or cause changes on backend format.
|
|
|
|
fs.fsFormatRlk = rlk
|
2017-05-05 11:49:09 -04:00
|
|
|
|
2018-03-15 16:03:41 -04:00
|
|
|
// Initialize notification system.
|
|
|
|
if err = globalNotificationSys.Init(fs); err != nil {
|
2018-05-08 22:04:36 -04:00
|
|
|
return nil, uiErrUnableToReadFromBackend(err).Msg("Unable to initialize notification system")
|
2018-04-24 18:53:30 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
// Initialize policy system.
|
|
|
|
if err = globalPolicySys.Init(fs); err != nil {
|
2018-05-08 22:04:36 -04:00
|
|
|
return nil, uiErrUnableToReadFromBackend(err).Msg("Unable to initialize policy system")
|
2017-01-16 20:05:00 -05:00
|
|
|
}
|
|
|
|
|
2018-06-27 21:59:38 -04:00
|
|
|
if !fs.diskMount {
|
|
|
|
go fs.diskUsage(globalServiceDoneCh)
|
|
|
|
}
|
|
|
|
|
2018-04-05 18:04:40 -04:00
|
|
|
go fs.cleanupStaleMultipartUploads(ctx, globalMultipartCleanupInterval, globalMultipartExpiry, globalServiceDoneCh)
|
2018-02-15 20:45:57 -05:00
|
|
|
|
2016-08-05 01:01:58 -04:00
|
|
|
// Return successfully initialized object layer.
|
|
|
|
return fs, nil
|
2016-04-29 17:24:10 -04:00
|
|
|
}
|
|
|
|
|
2018-02-20 15:21:12 -05:00
|
|
|
// Shutdown - should be called when process shuts down.
|
2018-03-14 15:01:47 -04:00
|
|
|
func (fs *FSObjects) Shutdown(ctx context.Context) error {
|
2017-08-10 17:11:57 -04:00
|
|
|
fs.fsFormatRlk.Close()
|
|
|
|
|
2017-01-16 20:05:00 -05:00
|
|
|
// Cleanup and delete tmp uuid.
|
2018-04-05 18:04:40 -04:00
|
|
|
return fsRemoveAll(ctx, pathJoin(fs.fsPath, minioMetaTmpBucket, fs.fsUUID))
|
2017-01-16 20:05:00 -05:00
|
|
|
}
|
|
|
|
|
2018-05-23 06:11:29 -04:00
|
|
|
// diskUsage returns du information for the posix path, in a continuous routine.
|
|
|
|
func (fs *FSObjects) diskUsage(doneCh chan struct{}) {
|
|
|
|
usageFn := func(ctx context.Context, entry string) error {
|
2018-06-27 21:59:38 -04:00
|
|
|
if globalHTTPServer != nil {
|
2018-06-28 18:05:45 -04:00
|
|
|
// Wait at max 1 minute for an inprogress request
|
|
|
|
// before proceeding to count the usage.
|
|
|
|
waitCount := 60
|
2018-06-27 21:59:38 -04:00
|
|
|
// Any requests in progress, delay the usage.
|
2018-06-28 18:05:45 -04:00
|
|
|
for globalHTTPServer.GetRequestCount() > 0 && waitCount > 0 {
|
|
|
|
waitCount--
|
2018-06-27 21:59:38 -04:00
|
|
|
time.Sleep(1 * time.Second)
|
|
|
|
}
|
2018-05-23 06:11:29 -04:00
|
|
|
}
|
2018-06-27 21:59:38 -04:00
|
|
|
|
|
|
|
select {
|
|
|
|
case <-doneCh:
|
|
|
|
return errWalkAbort
|
|
|
|
default:
|
|
|
|
var fi os.FileInfo
|
|
|
|
var err error
|
|
|
|
if hasSuffix(entry, slashSeparator) {
|
|
|
|
fi, err = fsStatDir(ctx, entry)
|
|
|
|
} else {
|
|
|
|
fi, err = fsStatFile(ctx, entry)
|
|
|
|
}
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
atomic.AddUint64(&fs.totalUsed, uint64(fi.Size()))
|
2018-05-23 06:11:29 -04:00
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2018-06-28 18:05:45 -04:00
|
|
|
// Return this routine upon errWalkAbort, continue for any other error on purpose
|
|
|
|
// so that we can start the routine freshly in another 12 hours.
|
|
|
|
if err := getDiskUsage(context.Background(), fs.fsPath, usageFn); err == errWalkAbort {
|
2018-05-23 06:11:29 -04:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
for {
|
|
|
|
select {
|
|
|
|
case <-doneCh:
|
|
|
|
return
|
2018-06-28 18:05:45 -04:00
|
|
|
case <-time.After(globalUsageCheckInterval):
|
2018-05-23 20:30:25 -04:00
|
|
|
var usage uint64
|
2018-05-23 06:11:29 -04:00
|
|
|
usageFn = func(ctx context.Context, entry string) error {
|
2018-06-27 21:59:38 -04:00
|
|
|
if globalHTTPServer != nil {
|
2018-06-28 18:05:45 -04:00
|
|
|
// Wait at max 1 minute for an inprogress request
|
|
|
|
// before proceeding to count the usage.
|
|
|
|
waitCount := 60
|
2018-06-27 21:59:38 -04:00
|
|
|
// Any requests in progress, delay the usage.
|
2018-06-28 18:05:45 -04:00
|
|
|
for globalHTTPServer.GetRequestCount() > 0 && waitCount > 0 {
|
|
|
|
waitCount--
|
2018-06-27 21:59:38 -04:00
|
|
|
time.Sleep(1 * time.Second)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-05-23 20:30:25 -04:00
|
|
|
var fi os.FileInfo
|
|
|
|
var err error
|
2018-05-23 06:11:29 -04:00
|
|
|
if hasSuffix(entry, slashSeparator) {
|
2018-05-23 20:30:25 -04:00
|
|
|
fi, err = fsStatDir(ctx, entry)
|
|
|
|
} else {
|
|
|
|
fi, err = fsStatFile(ctx, entry)
|
2018-05-23 06:11:29 -04:00
|
|
|
}
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
usage = usage + uint64(fi.Size())
|
|
|
|
return nil
|
|
|
|
}
|
2018-06-04 21:35:41 -04:00
|
|
|
|
2018-05-23 06:11:29 -04:00
|
|
|
if err := getDiskUsage(context.Background(), fs.fsPath, usageFn); err != nil {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
atomic.StoreUint64(&fs.totalUsed, usage)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-05-26 17:13:10 -04:00
|
|
|
// StorageInfo - returns underlying storage statistics.
|
2018-03-14 15:01:47 -04:00
|
|
|
func (fs *FSObjects) StorageInfo(ctx context.Context) StorageInfo {
|
2018-06-27 21:59:38 -04:00
|
|
|
di, err := getDiskInfo(fs.fsPath)
|
|
|
|
if err != nil {
|
|
|
|
return StorageInfo{}
|
|
|
|
}
|
|
|
|
used := di.Total - di.Free
|
|
|
|
if !fs.diskMount {
|
|
|
|
used = atomic.LoadUint64(&fs.totalUsed)
|
|
|
|
}
|
2016-10-05 15:48:07 -04:00
|
|
|
storageInfo := StorageInfo{
|
2018-06-27 21:59:38 -04:00
|
|
|
Used: used,
|
2016-05-26 17:13:10 -04:00
|
|
|
}
|
2016-10-05 15:48:07 -04:00
|
|
|
storageInfo.Backend.Type = FS
|
|
|
|
return storageInfo
|
2016-05-26 17:13:10 -04:00
|
|
|
}
|
|
|
|
|
2018-01-12 23:34:52 -05:00
|
|
|
// Locking operations
|
|
|
|
|
2018-02-20 15:21:12 -05:00
|
|
|
// ListLocks - List namespace locks held in object layer
|
2018-03-14 15:01:47 -04:00
|
|
|
func (fs *FSObjects) ListLocks(ctx context.Context, bucket, prefix string, duration time.Duration) ([]VolumeLockInfo, error) {
|
2018-01-12 23:34:52 -05:00
|
|
|
return []VolumeLockInfo{}, NotImplemented{}
|
|
|
|
}
|
|
|
|
|
2018-02-20 15:21:12 -05:00
|
|
|
// ClearLocks - Clear namespace locks held in object layer
|
2018-03-14 15:01:47 -04:00
|
|
|
func (fs *FSObjects) ClearLocks(ctx context.Context, info []VolumeLockInfo) error {
|
2018-01-12 23:34:52 -05:00
|
|
|
return NotImplemented{}
|
|
|
|
}
|
|
|
|
|
2016-04-29 17:24:10 -04:00
|
|
|
/// Bucket operations
|
|
|
|
|
2017-01-16 20:05:00 -05:00
|
|
|
// getBucketDir - will convert incoming bucket names to
|
|
|
|
// corresponding valid bucket names on the backend in a platform
|
|
|
|
// compatible way for all operating systems.
|
2018-04-05 18:04:40 -04:00
|
|
|
func (fs *FSObjects) getBucketDir(ctx context.Context, bucket string) (string, error) {
|
2018-04-23 23:27:33 -04:00
|
|
|
if bucket == "" || bucket == "." || bucket == ".." {
|
|
|
|
return "", errVolumeNotFound
|
2016-05-20 23:48:47 -04:00
|
|
|
}
|
2017-01-16 20:05:00 -05:00
|
|
|
bucketDir := pathJoin(fs.fsPath, bucket)
|
|
|
|
return bucketDir, nil
|
|
|
|
}
|
|
|
|
|
2018-04-05 18:04:40 -04:00
|
|
|
func (fs *FSObjects) statBucketDir(ctx context.Context, bucket string) (os.FileInfo, error) {
|
|
|
|
bucketDir, err := fs.getBucketDir(ctx, bucket)
|
2017-01-16 20:05:00 -05:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
2018-04-05 18:04:40 -04:00
|
|
|
st, err := fsStatVolume(ctx, bucketDir)
|
2017-01-16 20:05:00 -05:00
|
|
|
if err != nil {
|
2017-01-26 18:40:10 -05:00
|
|
|
return nil, err
|
2017-01-16 20:05:00 -05:00
|
|
|
}
|
|
|
|
return st, nil
|
|
|
|
}
|
|
|
|
|
2018-02-20 15:21:12 -05:00
|
|
|
// MakeBucketWithLocation - create a new bucket, returns if it
|
2017-01-16 20:05:00 -05:00
|
|
|
// already exists.
|
2018-03-14 15:01:47 -04:00
|
|
|
func (fs *FSObjects) MakeBucketWithLocation(ctx context.Context, bucket, location string) error {
|
2018-01-12 23:34:52 -05:00
|
|
|
bucketLock := fs.nsMutex.NewNSLock(bucket, "")
|
|
|
|
if err := bucketLock.GetLock(globalObjectTimeout); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
defer bucketLock.Unlock()
|
2018-04-23 23:27:33 -04:00
|
|
|
// Verify if bucket is valid.
|
|
|
|
if !IsValidBucketName(bucket) {
|
|
|
|
err := BucketNameInvalid{Bucket: bucket}
|
|
|
|
logger.LogIf(ctx, err)
|
|
|
|
return err
|
|
|
|
}
|
2018-04-05 18:04:40 -04:00
|
|
|
bucketDir, err := fs.getBucketDir(ctx, bucket)
|
2017-01-16 20:05:00 -05:00
|
|
|
if err != nil {
|
|
|
|
return toObjectErr(err, bucket)
|
|
|
|
}
|
|
|
|
|
2018-04-05 18:04:40 -04:00
|
|
|
if err = fsMkdir(ctx, bucketDir); err != nil {
|
2017-01-26 18:40:10 -05:00
|
|
|
return toObjectErr(err, bucket)
|
2016-05-20 23:48:47 -04:00
|
|
|
}
|
2017-01-16 20:05:00 -05:00
|
|
|
|
2016-05-20 23:48:47 -04:00
|
|
|
return nil
|
2016-04-29 17:24:10 -04:00
|
|
|
}
|
|
|
|
|
2017-01-16 20:05:00 -05:00
|
|
|
// GetBucketInfo - fetch bucket metadata info.
|
2018-03-14 15:01:47 -04:00
|
|
|
func (fs *FSObjects) GetBucketInfo(ctx context.Context, bucket string) (bi BucketInfo, e error) {
|
2018-02-09 18:19:30 -05:00
|
|
|
bucketLock := fs.nsMutex.NewNSLock(bucket, "")
|
|
|
|
if e := bucketLock.GetRLock(globalObjectTimeout); e != nil {
|
|
|
|
return bi, e
|
|
|
|
}
|
|
|
|
defer bucketLock.RUnlock()
|
2018-04-05 18:04:40 -04:00
|
|
|
st, err := fs.statBucketDir(ctx, bucket)
|
2016-05-20 23:48:47 -04:00
|
|
|
if err != nil {
|
2017-06-21 22:53:09 -04:00
|
|
|
return bi, toObjectErr(err, bucket)
|
2016-05-20 23:48:47 -04:00
|
|
|
}
|
2017-01-16 20:05:00 -05:00
|
|
|
|
2017-10-13 06:01:15 -04:00
|
|
|
// As os.Stat() doesn't carry other than ModTime(), use ModTime() as CreatedTime.
|
2017-01-16 20:05:00 -05:00
|
|
|
createdTime := st.ModTime()
|
2016-05-20 23:48:47 -04:00
|
|
|
return BucketInfo{
|
|
|
|
Name: bucket,
|
2017-01-16 20:05:00 -05:00
|
|
|
Created: createdTime,
|
2016-05-20 23:48:47 -04:00
|
|
|
}, nil
|
2016-04-29 17:24:10 -04:00
|
|
|
}
|
|
|
|
|
2017-01-16 20:05:00 -05:00
|
|
|
// ListBuckets - list all s3 compatible buckets (directories) at fsPath.
|
2018-03-14 15:01:47 -04:00
|
|
|
func (fs *FSObjects) ListBuckets(ctx context.Context) ([]BucketInfo, error) {
|
2017-01-16 20:05:00 -05:00
|
|
|
if err := checkPathLength(fs.fsPath); err != nil {
|
2018-04-05 18:04:40 -04:00
|
|
|
logger.LogIf(ctx, err)
|
|
|
|
return nil, err
|
2017-01-16 20:05:00 -05:00
|
|
|
}
|
2016-05-20 23:48:47 -04:00
|
|
|
var bucketInfos []BucketInfo
|
2017-08-12 22:25:43 -04:00
|
|
|
entries, err := readDir((fs.fsPath))
|
2016-05-20 23:48:47 -04:00
|
|
|
if err != nil {
|
2018-04-05 18:04:40 -04:00
|
|
|
logger.LogIf(ctx, errDiskNotFound)
|
|
|
|
return nil, toObjectErr(errDiskNotFound)
|
2016-05-20 23:48:47 -04:00
|
|
|
}
|
2017-01-16 20:05:00 -05:00
|
|
|
|
|
|
|
for _, entry := range entries {
|
2017-02-16 17:52:14 -05:00
|
|
|
// Ignore all reserved bucket names and invalid bucket names.
|
|
|
|
if isReservedOrInvalidBucket(entry) {
|
2016-05-20 23:48:47 -04:00
|
|
|
continue
|
|
|
|
}
|
2017-01-16 20:05:00 -05:00
|
|
|
var fi os.FileInfo
|
2018-04-05 18:04:40 -04:00
|
|
|
fi, err = fsStatVolume(ctx, pathJoin(fs.fsPath, entry))
|
2017-08-10 16:36:11 -04:00
|
|
|
// There seems like no practical reason to check for errors
|
|
|
|
// at this point, if there are indeed errors we can simply
|
|
|
|
// just ignore such buckets and list only those which
|
|
|
|
// return proper Stat information instead.
|
2017-01-16 20:05:00 -05:00
|
|
|
if err != nil {
|
2017-08-10 16:36:11 -04:00
|
|
|
// Ignore any errors returned here.
|
|
|
|
continue
|
2017-01-16 20:05:00 -05:00
|
|
|
}
|
2016-05-20 23:48:47 -04:00
|
|
|
bucketInfos = append(bucketInfos, BucketInfo{
|
2017-01-16 20:05:00 -05:00
|
|
|
Name: fi.Name(),
|
2017-10-13 06:01:15 -04:00
|
|
|
// As os.Stat() doesnt carry CreatedTime, use ModTime() as CreatedTime.
|
2017-01-16 20:05:00 -05:00
|
|
|
Created: fi.ModTime(),
|
2016-05-20 23:48:47 -04:00
|
|
|
})
|
|
|
|
}
|
2017-01-16 20:05:00 -05:00
|
|
|
|
|
|
|
// Sort bucket infos by bucket name.
|
2016-05-20 23:48:47 -04:00
|
|
|
sort.Sort(byBucketName(bucketInfos))
|
2017-01-16 20:05:00 -05:00
|
|
|
|
|
|
|
// Succes.
|
2016-05-20 23:48:47 -04:00
|
|
|
return bucketInfos, nil
|
2016-04-29 17:24:10 -04:00
|
|
|
}
|
|
|
|
|
2017-01-16 20:05:00 -05:00
|
|
|
// DeleteBucket - delete a bucket and all the metadata associated
|
|
|
|
// with the bucket including pending multipart, object metadata.
|
2018-03-14 15:01:47 -04:00
|
|
|
func (fs *FSObjects) DeleteBucket(ctx context.Context, bucket string) error {
|
2018-02-09 18:19:30 -05:00
|
|
|
bucketLock := fs.nsMutex.NewNSLock(bucket, "")
|
|
|
|
if err := bucketLock.GetLock(globalObjectTimeout); err != nil {
|
2018-04-05 18:04:40 -04:00
|
|
|
logger.LogIf(ctx, err)
|
2018-02-09 18:19:30 -05:00
|
|
|
return err
|
|
|
|
}
|
|
|
|
defer bucketLock.Unlock()
|
2018-04-05 18:04:40 -04:00
|
|
|
bucketDir, err := fs.getBucketDir(ctx, bucket)
|
2017-01-16 20:05:00 -05:00
|
|
|
if err != nil {
|
|
|
|
return toObjectErr(err, bucket)
|
2016-05-20 23:48:47 -04:00
|
|
|
}
|
2017-01-16 20:05:00 -05:00
|
|
|
|
2016-07-12 04:01:47 -04:00
|
|
|
// Attempt to delete regular bucket.
|
2018-04-05 18:04:40 -04:00
|
|
|
if err = fsRemoveDir(ctx, bucketDir); err != nil {
|
2017-01-16 20:05:00 -05:00
|
|
|
return toObjectErr(err, bucket)
|
2016-05-20 23:48:47 -04:00
|
|
|
}
|
2017-01-16 20:05:00 -05:00
|
|
|
|
|
|
|
// Cleanup all the bucket metadata.
|
|
|
|
minioMetadataBucketDir := pathJoin(fs.fsPath, minioMetaBucket, bucketMetaPrefix, bucket)
|
2018-04-05 18:04:40 -04:00
|
|
|
if err = fsRemoveAll(ctx, minioMetadataBucketDir); err != nil {
|
2017-01-16 20:05:00 -05:00
|
|
|
return toObjectErr(err, bucket)
|
|
|
|
}
|
2018-02-09 18:19:30 -05:00
|
|
|
|
2018-02-12 21:34:30 -05:00
|
|
|
// Delete all bucket metadata.
|
2018-04-05 18:04:40 -04:00
|
|
|
deleteBucketMetadata(ctx, bucket, fs)
|
2018-02-09 18:19:30 -05:00
|
|
|
|
2016-05-20 23:48:47 -04:00
|
|
|
return nil
|
2016-04-29 17:24:10 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
/// Object Operations
|
|
|
|
|
2016-12-26 19:29:26 -05:00
|
|
|
// CopyObject - copy object source object to destination object.
|
|
|
|
// if source object and destination object are same we only
|
|
|
|
// update metadata.
|
2018-03-14 15:01:47 -04:00
|
|
|
func (fs *FSObjects) CopyObject(ctx context.Context, srcBucket, srcObject, dstBucket, dstObject string, srcInfo ObjectInfo) (oi ObjectInfo, e error) {
|
2018-02-23 18:07:21 -05:00
|
|
|
cpSrcDstSame := isStringEqual(pathJoin(srcBucket, srcObject), pathJoin(dstBucket, dstObject))
|
2018-01-12 23:34:52 -05:00
|
|
|
// Hold write lock on destination since in both cases
|
|
|
|
// - if source and destination are same
|
|
|
|
// - if source and destination are different
|
|
|
|
// it is the sole mutating state.
|
|
|
|
objectDWLock := fs.nsMutex.NewNSLock(dstBucket, dstObject)
|
|
|
|
if err := objectDWLock.GetLock(globalObjectTimeout); err != nil {
|
|
|
|
return oi, err
|
|
|
|
}
|
|
|
|
defer objectDWLock.Unlock()
|
|
|
|
// if source and destination are different, we have to hold
|
|
|
|
// additional read lock as well to protect against writes on
|
|
|
|
// source.
|
|
|
|
if !cpSrcDstSame {
|
|
|
|
// Hold read locks on source object only if we are
|
|
|
|
// going to read data from source object.
|
|
|
|
objectSRLock := fs.nsMutex.NewNSLock(srcBucket, srcObject)
|
|
|
|
if err := objectSRLock.GetRLock(globalObjectTimeout); err != nil {
|
|
|
|
return oi, err
|
|
|
|
}
|
|
|
|
defer objectSRLock.RUnlock()
|
|
|
|
}
|
2018-04-05 18:04:40 -04:00
|
|
|
if _, err := fs.statBucketDir(ctx, srcBucket); err != nil {
|
2017-06-21 22:53:09 -04:00
|
|
|
return oi, toObjectErr(err, srcBucket)
|
2017-01-16 20:05:00 -05:00
|
|
|
}
|
|
|
|
|
2018-02-23 18:07:21 -05:00
|
|
|
if cpSrcDstSame && srcInfo.metadataOnly {
|
2018-03-12 16:52:38 -04:00
|
|
|
// Close any writer which was initialized.
|
|
|
|
defer srcInfo.Writer.Close()
|
|
|
|
|
2018-03-28 17:14:06 -04:00
|
|
|
fsMetaPath := pathJoin(fs.fsPath, minioMetaBucket, bucketMetaPrefix, srcBucket, srcObject, fs.metaJSONFile)
|
2018-02-23 18:07:21 -05:00
|
|
|
wlk, err := fs.rwPool.Write(fsMetaPath)
|
2017-01-16 20:05:00 -05:00
|
|
|
if err != nil {
|
2018-04-05 18:04:40 -04:00
|
|
|
logger.LogIf(ctx, err)
|
|
|
|
return oi, toObjectErr(err, srcBucket, srcObject)
|
2017-01-16 20:05:00 -05:00
|
|
|
}
|
|
|
|
// This close will allow for locks to be synchronized on `fs.json`.
|
|
|
|
defer wlk.Close()
|
|
|
|
|
2016-12-26 19:29:26 -05:00
|
|
|
// Save objects' metadata in `fs.json`.
|
|
|
|
fsMeta := newFSMetaV1()
|
2018-04-05 18:04:40 -04:00
|
|
|
if _, err = fsMeta.ReadFrom(ctx, wlk); err != nil {
|
2018-03-02 20:24:02 -05:00
|
|
|
return oi, toObjectErr(err, srcBucket, srcObject)
|
|
|
|
}
|
|
|
|
|
2018-02-21 03:48:47 -05:00
|
|
|
fsMeta.Meta = srcInfo.UserDefined
|
2018-03-09 13:50:39 -05:00
|
|
|
fsMeta.Meta["etag"] = srcInfo.ETag
|
2017-01-16 20:05:00 -05:00
|
|
|
if _, err = fsMeta.WriteTo(wlk); err != nil {
|
2017-06-21 22:53:09 -04:00
|
|
|
return oi, toObjectErr(err, srcBucket, srcObject)
|
2016-12-26 19:29:26 -05:00
|
|
|
}
|
|
|
|
|
2018-02-23 18:07:21 -05:00
|
|
|
// Stat the file to get file size.
|
2018-04-05 18:04:40 -04:00
|
|
|
fi, err := fsStatFile(ctx, pathJoin(fs.fsPath, srcBucket, srcObject))
|
2018-02-23 18:07:21 -05:00
|
|
|
if err != nil {
|
|
|
|
return oi, toObjectErr(err, srcBucket, srcObject)
|
|
|
|
}
|
|
|
|
|
2017-01-16 20:05:00 -05:00
|
|
|
// Return the new object info.
|
|
|
|
return fsMeta.ToObjectInfo(srcBucket, srcObject, fi), nil
|
2016-12-26 19:29:26 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
go func() {
|
2018-04-05 18:04:40 -04:00
|
|
|
if gerr := fs.getObject(ctx, srcBucket, srcObject, 0, srcInfo.Size, srcInfo.Writer, srcInfo.ETag, !cpSrcDstSame); gerr != nil {
|
2018-02-23 18:07:21 -05:00
|
|
|
if gerr = srcInfo.Writer.Close(); gerr != nil {
|
2018-04-05 18:04:40 -04:00
|
|
|
logger.LogIf(ctx, gerr)
|
2018-02-23 18:07:21 -05:00
|
|
|
}
|
|
|
|
return
|
|
|
|
}
|
2018-06-28 19:02:02 -04:00
|
|
|
// Close writer explicitly signaling we wrote all data.
|
2018-02-23 18:07:21 -05:00
|
|
|
if gerr := srcInfo.Writer.Close(); gerr != nil {
|
2018-04-05 18:04:40 -04:00
|
|
|
logger.LogIf(ctx, gerr)
|
2016-12-26 19:29:26 -05:00
|
|
|
return
|
|
|
|
}
|
|
|
|
}()
|
|
|
|
|
2018-04-05 18:04:40 -04:00
|
|
|
objInfo, err := fs.putObject(ctx, dstBucket, dstObject, srcInfo.Reader, srcInfo.UserDefined)
|
2016-12-26 19:29:26 -05:00
|
|
|
if err != nil {
|
2017-06-21 22:53:09 -04:00
|
|
|
return oi, toObjectErr(err, dstBucket, dstObject)
|
2016-12-26 19:29:26 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
return objInfo, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// GetObject - reads an object from the disk.
|
|
|
|
// Supports additional parameters like offset and length
|
|
|
|
// which are synonymous with HTTP Range requests.
|
|
|
|
//
|
|
|
|
// startOffset indicates the starting read location of the object.
|
|
|
|
// length indicates the total length of the object.
|
2018-03-14 15:01:47 -04:00
|
|
|
func (fs *FSObjects) GetObject(ctx context.Context, bucket, object string, offset int64, length int64, writer io.Writer, etag string) (err error) {
|
2018-04-05 18:04:40 -04:00
|
|
|
if err = checkGetObjArgs(ctx, bucket, object); err != nil {
|
2016-12-02 02:15:17 -05:00
|
|
|
return err
|
2016-04-29 17:24:10 -04:00
|
|
|
}
|
2017-01-16 20:05:00 -05:00
|
|
|
|
2018-01-12 23:34:52 -05:00
|
|
|
// Lock the object before reading.
|
|
|
|
objectLock := fs.nsMutex.NewNSLock(bucket, object)
|
|
|
|
if err := objectLock.GetRLock(globalObjectTimeout); err != nil {
|
2018-04-05 18:04:40 -04:00
|
|
|
logger.LogIf(ctx, err)
|
2018-01-12 23:34:52 -05:00
|
|
|
return err
|
|
|
|
}
|
|
|
|
defer objectLock.RUnlock()
|
2018-04-05 18:04:40 -04:00
|
|
|
return fs.getObject(ctx, bucket, object, offset, length, writer, etag, true)
|
2018-01-12 23:34:52 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
// getObject - wrapper for GetObject
|
2018-04-05 18:04:40 -04:00
|
|
|
func (fs *FSObjects) getObject(ctx context.Context, bucket, object string, offset int64, length int64, writer io.Writer, etag string, lock bool) (err error) {
|
|
|
|
if _, err = fs.statBucketDir(ctx, bucket); err != nil {
|
2017-01-16 20:05:00 -05:00
|
|
|
return toObjectErr(err, bucket)
|
|
|
|
}
|
|
|
|
|
2016-12-21 14:29:32 -05:00
|
|
|
// Offset cannot be negative.
|
|
|
|
if offset < 0 {
|
2018-04-05 18:04:40 -04:00
|
|
|
logger.LogIf(ctx, errUnexpected)
|
|
|
|
return toObjectErr(errUnexpected, bucket, object)
|
2016-07-07 04:30:34 -04:00
|
|
|
}
|
2017-01-16 20:05:00 -05:00
|
|
|
|
2016-07-08 10:46:49 -04:00
|
|
|
// Writer cannot be nil.
|
|
|
|
if writer == nil {
|
2018-04-05 18:04:40 -04:00
|
|
|
logger.LogIf(ctx, errUnexpected)
|
|
|
|
return toObjectErr(errUnexpected, bucket, object)
|
2016-07-08 10:46:49 -04:00
|
|
|
}
|
2016-07-07 22:49:45 -04:00
|
|
|
|
2017-10-16 20:20:54 -04:00
|
|
|
// If its a directory request, we return an empty body.
|
|
|
|
if hasSuffix(object, slashSeparator) {
|
|
|
|
_, err = writer.Write([]byte(""))
|
2018-04-05 18:04:40 -04:00
|
|
|
logger.LogIf(ctx, err)
|
|
|
|
return toObjectErr(err, bucket, object)
|
2017-10-16 20:20:54 -04:00
|
|
|
}
|
|
|
|
|
2017-01-16 20:05:00 -05:00
|
|
|
if bucket != minioMetaBucket {
|
2018-03-28 17:14:06 -04:00
|
|
|
fsMetaPath := pathJoin(fs.fsPath, minioMetaBucket, bucketMetaPrefix, bucket, object, fs.metaJSONFile)
|
2018-02-23 18:07:21 -05:00
|
|
|
if lock {
|
|
|
|
_, err = fs.rwPool.Open(fsMetaPath)
|
|
|
|
if err != nil && err != errFileNotFound {
|
2018-04-05 18:04:40 -04:00
|
|
|
logger.LogIf(ctx, err)
|
|
|
|
return toObjectErr(err, bucket, object)
|
2018-02-23 18:07:21 -05:00
|
|
|
}
|
|
|
|
defer fs.rwPool.Close(fsMetaPath)
|
2017-01-16 20:05:00 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-05-07 20:00:44 -04:00
|
|
|
if etag != "" && etag != defaultEtag {
|
2018-04-05 18:04:40 -04:00
|
|
|
objEtag, perr := fs.getObjectETag(ctx, bucket, object, lock)
|
2018-01-12 23:34:52 -05:00
|
|
|
if perr != nil {
|
2018-04-05 18:04:40 -04:00
|
|
|
return toObjectErr(perr, bucket, object)
|
2018-01-12 23:34:52 -05:00
|
|
|
}
|
|
|
|
if objEtag != etag {
|
2018-04-05 18:04:40 -04:00
|
|
|
logger.LogIf(ctx, InvalidETag{})
|
|
|
|
return toObjectErr(InvalidETag{}, bucket, object)
|
2018-01-12 23:34:52 -05:00
|
|
|
}
|
|
|
|
}
|
2018-03-01 14:37:57 -05:00
|
|
|
|
2017-01-16 20:05:00 -05:00
|
|
|
// Read the object, doesn't exist returns an s3 compatible error.
|
|
|
|
fsObjPath := pathJoin(fs.fsPath, bucket, object)
|
2018-04-05 18:04:40 -04:00
|
|
|
reader, size, err := fsOpenFile(ctx, fsObjPath, offset)
|
2016-07-07 22:49:45 -04:00
|
|
|
if err != nil {
|
2017-01-26 18:40:10 -05:00
|
|
|
return toObjectErr(err, bucket, object)
|
2016-07-07 22:49:45 -04:00
|
|
|
}
|
2017-01-16 20:05:00 -05:00
|
|
|
defer reader.Close()
|
|
|
|
|
|
|
|
bufSize := int64(readSizeV1)
|
|
|
|
if length > 0 && bufSize > length {
|
|
|
|
bufSize = length
|
|
|
|
}
|
2016-07-07 22:49:45 -04:00
|
|
|
|
2016-12-21 14:29:32 -05:00
|
|
|
// For negative length we read everything.
|
|
|
|
if length < 0 {
|
2017-01-16 20:05:00 -05:00
|
|
|
length = size - offset
|
2016-07-08 10:46:49 -04:00
|
|
|
}
|
2016-12-21 14:29:32 -05:00
|
|
|
|
|
|
|
// Reply back invalid range if the input offset and length fall out of range.
|
2017-01-16 20:05:00 -05:00
|
|
|
if offset > size || offset+length > size {
|
2018-04-05 18:04:40 -04:00
|
|
|
err = InvalidRange{offset, length, size}
|
|
|
|
logger.LogIf(ctx, err)
|
|
|
|
return err
|
2016-07-07 22:49:45 -04:00
|
|
|
}
|
|
|
|
|
2016-07-05 23:59:54 -04:00
|
|
|
// Allocate a staging buffer.
|
|
|
|
buf := make([]byte, int(bufSize))
|
2017-01-16 20:05:00 -05:00
|
|
|
|
|
|
|
_, err = io.CopyBuffer(writer, io.LimitReader(reader, length), buf)
|
2018-04-05 18:04:40 -04:00
|
|
|
logger.LogIf(ctx, err)
|
|
|
|
return toObjectErr(err, bucket, object)
|
2016-04-29 17:24:10 -04:00
|
|
|
}
|
|
|
|
|
2018-04-24 20:36:43 -04:00
|
|
|
// Create a new fs.json file, if the existing one is corrupt. Should happen very rarely.
|
|
|
|
func (fs *FSObjects) createFsJSON(object, fsMetaPath string) error {
|
|
|
|
fsMeta := newFSMetaV1()
|
|
|
|
fsMeta.Meta = make(map[string]string)
|
|
|
|
fsMeta.Meta["etag"] = GenETag()
|
|
|
|
if objectExt := path.Ext(object); objectExt != "" {
|
|
|
|
if content, ok := mimedb.DB[strings.ToLower(strings.TrimPrefix(objectExt, "."))]; ok {
|
|
|
|
fsMeta.Meta["content-type"] = content.ContentType
|
|
|
|
} else {
|
|
|
|
fsMeta.Meta["content-type"] = "application/octet-stream"
|
|
|
|
}
|
|
|
|
}
|
|
|
|
wlk, werr := fs.rwPool.Create(fsMetaPath)
|
|
|
|
if werr == nil {
|
|
|
|
_, err := fsMeta.WriteTo(wlk)
|
|
|
|
wlk.Close()
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
return werr
|
|
|
|
}
|
|
|
|
|
|
|
|
// Used to return default etag values when a pre-existing object's meta data is queried.
|
|
|
|
func (fs *FSObjects) defaultFsJSON(object string) fsMetaV1 {
|
|
|
|
fsMeta := newFSMetaV1()
|
|
|
|
fsMeta.Meta = make(map[string]string)
|
|
|
|
fsMeta.Meta["etag"] = defaultEtag
|
|
|
|
if objectExt := path.Ext(object); objectExt != "" {
|
|
|
|
if content, ok := mimedb.DB[strings.ToLower(strings.TrimPrefix(objectExt, "."))]; ok {
|
|
|
|
fsMeta.Meta["content-type"] = content.ContentType
|
|
|
|
} else {
|
|
|
|
fsMeta.Meta["content-type"] = "application/octet-stream"
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return fsMeta
|
|
|
|
}
|
|
|
|
|
2016-12-26 19:29:26 -05:00
|
|
|
// getObjectInfo - wrapper for reading object metadata and constructs ObjectInfo.
|
2018-04-05 18:04:40 -04:00
|
|
|
func (fs *FSObjects) getObjectInfo(ctx context.Context, bucket, object string) (oi ObjectInfo, e error) {
|
2017-01-16 20:05:00 -05:00
|
|
|
fsMeta := fsMetaV1{}
|
2018-05-08 22:09:15 -04:00
|
|
|
if hasSuffix(object, slashSeparator) {
|
|
|
|
// Since we support PUT of a "directory" object, we allow HEAD.
|
|
|
|
if !fsIsDir(ctx, pathJoin(fs.fsPath, bucket, object)) {
|
|
|
|
return oi, errFileNotFound
|
2017-10-16 20:20:54 -04:00
|
|
|
}
|
2018-05-08 22:09:15 -04:00
|
|
|
fi, err := fsStatDir(ctx, pathJoin(fs.fsPath, bucket, object))
|
|
|
|
if err != nil {
|
|
|
|
return oi, err
|
|
|
|
}
|
|
|
|
return fsMeta.ToObjectInfo(bucket, object, fi), nil
|
2017-10-16 20:20:54 -04:00
|
|
|
}
|
|
|
|
|
2018-03-28 17:14:06 -04:00
|
|
|
fsMetaPath := pathJoin(fs.fsPath, minioMetaBucket, bucketMetaPrefix, bucket, object, fs.metaJSONFile)
|
2017-01-16 20:05:00 -05:00
|
|
|
// Read `fs.json` to perhaps contend with
|
|
|
|
// parallel Put() operations.
|
2018-03-28 17:14:06 -04:00
|
|
|
|
2017-01-16 20:05:00 -05:00
|
|
|
rlk, err := fs.rwPool.Open(fsMetaPath)
|
|
|
|
if err == nil {
|
|
|
|
// Read from fs metadata only if it exists.
|
2018-04-24 20:36:43 -04:00
|
|
|
_, rerr := fsMeta.ReadFrom(ctx, rlk.LockedFile)
|
|
|
|
fs.rwPool.Close(fsMetaPath)
|
|
|
|
if rerr != nil {
|
|
|
|
return oi, rerr
|
2016-04-29 17:24:10 -04:00
|
|
|
}
|
|
|
|
}
|
2016-06-17 00:42:02 -04:00
|
|
|
|
2018-04-24 20:36:43 -04:00
|
|
|
// Return a default etag and content-type based on the object's extension.
|
|
|
|
if err == errFileNotFound {
|
|
|
|
fsMeta = fs.defaultFsJSON(object)
|
|
|
|
}
|
|
|
|
|
2017-01-16 20:05:00 -05:00
|
|
|
// Ignore if `fs.json` is not available, this is true for pre-existing data.
|
|
|
|
if err != nil && err != errFileNotFound {
|
2018-04-05 18:04:40 -04:00
|
|
|
logger.LogIf(ctx, err)
|
2018-04-24 20:36:43 -04:00
|
|
|
return oi, err
|
2016-11-29 19:47:01 -05:00
|
|
|
}
|
|
|
|
|
2017-01-16 20:05:00 -05:00
|
|
|
// Stat the file to get file size.
|
2018-05-08 22:09:15 -04:00
|
|
|
fi, err := fsStatFile(ctx, pathJoin(fs.fsPath, bucket, object))
|
2017-01-16 20:05:00 -05:00
|
|
|
if err != nil {
|
2018-04-24 20:36:43 -04:00
|
|
|
return oi, err
|
2017-01-16 20:05:00 -05:00
|
|
|
}
|
2016-11-29 19:47:01 -05:00
|
|
|
|
2017-01-16 20:05:00 -05:00
|
|
|
return fsMeta.ToObjectInfo(bucket, object, fi), nil
|
2016-04-29 17:24:10 -04:00
|
|
|
}
|
|
|
|
|
2018-04-24 20:36:43 -04:00
|
|
|
// getObjectInfoWithLock - reads object metadata and replies back ObjectInfo.
|
|
|
|
func (fs *FSObjects) getObjectInfoWithLock(ctx context.Context, bucket, object string) (oi ObjectInfo, e error) {
|
2018-01-12 23:34:52 -05:00
|
|
|
// Lock the object before reading.
|
|
|
|
objectLock := fs.nsMutex.NewNSLock(bucket, object)
|
|
|
|
if err := objectLock.GetRLock(globalObjectTimeout); err != nil {
|
|
|
|
return oi, err
|
|
|
|
}
|
|
|
|
defer objectLock.RUnlock()
|
|
|
|
|
2018-04-05 18:04:40 -04:00
|
|
|
if err := checkGetObjArgs(ctx, bucket, object); err != nil {
|
2017-06-21 22:53:09 -04:00
|
|
|
return oi, err
|
2016-09-02 15:18:35 -04:00
|
|
|
}
|
2017-01-16 20:05:00 -05:00
|
|
|
|
2018-04-05 18:04:40 -04:00
|
|
|
if _, err := fs.statBucketDir(ctx, bucket); err != nil {
|
2018-06-25 21:24:00 -04:00
|
|
|
return oi, err
|
2017-01-16 20:05:00 -05:00
|
|
|
}
|
|
|
|
|
2018-05-08 22:08:21 -04:00
|
|
|
if strings.HasSuffix(object, slashSeparator) && !fs.isObjectDir(bucket, object) {
|
|
|
|
return oi, errFileNotFound
|
|
|
|
}
|
|
|
|
|
2018-04-05 18:04:40 -04:00
|
|
|
return fs.getObjectInfo(ctx, bucket, object)
|
2016-09-02 15:18:35 -04:00
|
|
|
}
|
|
|
|
|
2018-04-24 20:36:43 -04:00
|
|
|
// GetObjectInfo - reads object metadata and replies back ObjectInfo.
|
|
|
|
func (fs *FSObjects) GetObjectInfo(ctx context.Context, bucket, object string) (oi ObjectInfo, e error) {
|
|
|
|
oi, err := fs.getObjectInfoWithLock(ctx, bucket, object)
|
|
|
|
if err == errCorruptedFormat || err == io.EOF {
|
|
|
|
objectLock := fs.nsMutex.NewNSLock(bucket, object)
|
|
|
|
if err = objectLock.GetLock(globalObjectTimeout); err != nil {
|
|
|
|
return oi, toObjectErr(err, bucket, object)
|
|
|
|
}
|
|
|
|
|
|
|
|
fsMetaPath := pathJoin(fs.fsPath, minioMetaBucket, bucketMetaPrefix, bucket, object, fs.metaJSONFile)
|
|
|
|
err = fs.createFsJSON(object, fsMetaPath)
|
|
|
|
objectLock.Unlock()
|
|
|
|
if err != nil {
|
|
|
|
return oi, toObjectErr(err, bucket, object)
|
|
|
|
}
|
|
|
|
|
|
|
|
oi, err = fs.getObjectInfoWithLock(ctx, bucket, object)
|
|
|
|
}
|
|
|
|
return oi, toObjectErr(err, bucket, object)
|
|
|
|
}
|
|
|
|
|
2017-05-09 20:46:46 -04:00
|
|
|
// This function does the following check, suppose
|
|
|
|
// object is "a/b/c/d", stat makes sure that objects ""a/b/c""
|
|
|
|
// "a/b" and "a" do not exist.
|
2018-04-05 18:04:40 -04:00
|
|
|
func (fs *FSObjects) parentDirIsObject(ctx context.Context, bucket, parent string) bool {
|
2017-05-09 20:46:46 -04:00
|
|
|
var isParentDirObject func(string) bool
|
|
|
|
isParentDirObject = func(p string) bool {
|
2017-09-25 17:47:58 -04:00
|
|
|
if p == "." || p == "/" {
|
2017-05-09 20:46:46 -04:00
|
|
|
return false
|
|
|
|
}
|
2018-05-08 22:09:15 -04:00
|
|
|
if fsIsFile(ctx, pathJoin(fs.fsPath, bucket, p)) {
|
2017-09-25 17:47:58 -04:00
|
|
|
// If there is already a file at prefix "p", return true.
|
2017-05-09 20:46:46 -04:00
|
|
|
return true
|
|
|
|
}
|
2017-09-25 17:47:58 -04:00
|
|
|
|
2017-05-09 20:46:46 -04:00
|
|
|
// Check if there is a file as one of the parent paths.
|
|
|
|
return isParentDirObject(path.Dir(p))
|
|
|
|
}
|
|
|
|
return isParentDirObject(parent)
|
|
|
|
}
|
|
|
|
|
2016-12-26 19:29:26 -05:00
|
|
|
// PutObject - creates an object upon reading from the input stream
|
|
|
|
// until EOF, writes data directly to configured filesystem path.
|
|
|
|
// Additionally writes `fs.json` which carries the necessary metadata
|
|
|
|
// for future object operations.
|
2018-03-14 15:01:47 -04:00
|
|
|
func (fs *FSObjects) PutObject(ctx context.Context, bucket string, object string, data *hash.Reader, metadata map[string]string) (objInfo ObjectInfo, retErr error) {
|
2018-04-05 18:04:40 -04:00
|
|
|
if err := checkPutObjectArgs(ctx, bucket, object, fs, data.Size()); err != nil {
|
2018-02-09 18:19:30 -05:00
|
|
|
return ObjectInfo{}, err
|
|
|
|
}
|
2018-01-12 23:34:52 -05:00
|
|
|
// Lock the object.
|
|
|
|
objectLock := fs.nsMutex.NewNSLock(bucket, object)
|
|
|
|
if err := objectLock.GetLock(globalObjectTimeout); err != nil {
|
2018-04-05 18:04:40 -04:00
|
|
|
logger.LogIf(ctx, err)
|
2018-01-12 23:34:52 -05:00
|
|
|
return objInfo, err
|
|
|
|
}
|
|
|
|
defer objectLock.Unlock()
|
2018-04-05 18:04:40 -04:00
|
|
|
return fs.putObject(ctx, bucket, object, data, metadata)
|
2018-01-12 23:34:52 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
// putObject - wrapper for PutObject
|
2018-04-05 18:04:40 -04:00
|
|
|
func (fs *FSObjects) putObject(ctx context.Context, bucket string, object string, data *hash.Reader, metadata map[string]string) (objInfo ObjectInfo, retErr error) {
|
2017-10-16 20:20:54 -04:00
|
|
|
// No metadata is set, allocate a new one.
|
2018-03-28 17:14:06 -04:00
|
|
|
meta := make(map[string]string)
|
|
|
|
for k, v := range metadata {
|
|
|
|
meta[k] = v
|
2017-10-16 20:20:54 -04:00
|
|
|
}
|
2017-04-14 15:06:24 -04:00
|
|
|
var err error
|
2017-05-25 12:22:43 -04:00
|
|
|
|
|
|
|
// Validate if bucket name is valid and exists.
|
2018-04-05 18:04:40 -04:00
|
|
|
if _, err = fs.statBucketDir(ctx, bucket); err != nil {
|
2017-05-25 12:22:43 -04:00
|
|
|
return ObjectInfo{}, toObjectErr(err, bucket)
|
|
|
|
}
|
|
|
|
|
2017-10-16 20:20:54 -04:00
|
|
|
fsMeta := newFSMetaV1()
|
2018-03-28 17:14:06 -04:00
|
|
|
fsMeta.Meta = meta
|
2017-10-16 20:20:54 -04:00
|
|
|
|
2017-05-25 12:22:43 -04:00
|
|
|
// This is a special case with size as '0' and object ends
|
|
|
|
// with a slash separator, we treat it like a valid operation
|
|
|
|
// and return success.
|
2017-09-19 15:40:27 -04:00
|
|
|
if isObjectDir(object, data.Size()) {
|
2017-05-09 20:46:46 -04:00
|
|
|
// Check if an object is present as one of the parent dir.
|
2018-04-05 18:04:40 -04:00
|
|
|
if fs.parentDirIsObject(ctx, bucket, path.Dir(object)) {
|
|
|
|
logger.LogIf(ctx, errFileAccessDenied)
|
|
|
|
return ObjectInfo{}, toObjectErr(errFileAccessDenied, bucket, object)
|
2017-05-09 20:46:46 -04:00
|
|
|
}
|
2018-01-13 12:13:02 -05:00
|
|
|
if err = mkdirAll(pathJoin(fs.fsPath, bucket, object), 0777); err != nil {
|
2018-04-05 18:04:40 -04:00
|
|
|
logger.LogIf(ctx, err)
|
2017-10-16 20:20:54 -04:00
|
|
|
return ObjectInfo{}, toObjectErr(err, bucket, object)
|
|
|
|
}
|
|
|
|
var fi os.FileInfo
|
2018-04-05 18:04:40 -04:00
|
|
|
if fi, err = fsStatDir(ctx, pathJoin(fs.fsPath, bucket, object)); err != nil {
|
2017-10-16 20:20:54 -04:00
|
|
|
return ObjectInfo{}, toObjectErr(err, bucket, object)
|
|
|
|
}
|
|
|
|
return fsMeta.ToObjectInfo(bucket, object, fi), nil
|
2017-01-20 19:33:01 -05:00
|
|
|
}
|
2017-05-09 17:32:24 -04:00
|
|
|
|
2018-04-05 18:04:40 -04:00
|
|
|
if err = checkPutObjectArgs(ctx, bucket, object, fs, data.Size()); err != nil {
|
2016-12-02 02:15:17 -05:00
|
|
|
return ObjectInfo{}, err
|
2016-05-13 14:52:36 -04:00
|
|
|
}
|
2017-01-16 20:05:00 -05:00
|
|
|
|
2017-05-09 20:46:46 -04:00
|
|
|
// Check if an object is present as one of the parent dir.
|
2018-04-05 18:04:40 -04:00
|
|
|
if fs.parentDirIsObject(ctx, bucket, path.Dir(object)) {
|
|
|
|
logger.LogIf(ctx, errFileAccessDenied)
|
|
|
|
return ObjectInfo{}, toObjectErr(errFileAccessDenied, bucket, object)
|
2017-05-09 20:46:46 -04:00
|
|
|
}
|
|
|
|
|
2017-10-06 12:38:01 -04:00
|
|
|
// Validate input data size and it can never be less than zero.
|
|
|
|
if data.Size() < 0 {
|
2018-04-05 18:04:40 -04:00
|
|
|
logger.LogIf(ctx, errInvalidArgument)
|
|
|
|
return ObjectInfo{}, errInvalidArgument
|
2017-10-06 12:38:01 -04:00
|
|
|
}
|
|
|
|
|
2017-01-16 20:05:00 -05:00
|
|
|
var wlk *lock.LockedFile
|
|
|
|
if bucket != minioMetaBucket {
|
2017-04-14 15:06:24 -04:00
|
|
|
bucketMetaDir := pathJoin(fs.fsPath, minioMetaBucket, bucketMetaPrefix)
|
2018-03-28 17:14:06 -04:00
|
|
|
|
|
|
|
fsMetaPath := pathJoin(bucketMetaDir, bucket, object, fs.metaJSONFile)
|
2017-01-16 20:05:00 -05:00
|
|
|
wlk, err = fs.rwPool.Create(fsMetaPath)
|
|
|
|
if err != nil {
|
2018-04-05 18:04:40 -04:00
|
|
|
logger.LogIf(ctx, err)
|
|
|
|
return ObjectInfo{}, toObjectErr(err, bucket, object)
|
2017-01-16 20:05:00 -05:00
|
|
|
}
|
|
|
|
// This close will allow for locks to be synchronized on `fs.json`.
|
|
|
|
defer wlk.Close()
|
2017-04-14 15:06:24 -04:00
|
|
|
defer func() {
|
|
|
|
// Remove meta file when PutObject encounters any error
|
|
|
|
if retErr != nil {
|
|
|
|
tmpDir := pathJoin(fs.fsPath, minioMetaTmpBucket, fs.fsUUID)
|
2018-04-05 18:04:40 -04:00
|
|
|
fsRemoveMeta(ctx, bucketMetaDir, fsMetaPath, tmpDir)
|
2017-04-14 15:06:24 -04:00
|
|
|
}
|
|
|
|
}()
|
2017-01-16 20:05:00 -05:00
|
|
|
}
|
2016-05-29 03:42:09 -04:00
|
|
|
|
2016-06-09 01:00:31 -04:00
|
|
|
// Uploaded object will first be written to the temporary location which will eventually
|
|
|
|
// be renamed to the actual location. It is first written to the temporary location
|
|
|
|
// so that cleaning it up will be easy if the server goes down.
|
2017-01-16 20:05:00 -05:00
|
|
|
tempObj := mustGetUUID()
|
2016-05-13 14:52:36 -04:00
|
|
|
|
2016-12-03 14:53:12 -05:00
|
|
|
// Allocate a buffer to Read() from request body
|
|
|
|
bufSize := int64(readSizeV1)
|
2017-09-19 15:40:27 -04:00
|
|
|
if size := data.Size(); size > 0 && bufSize > size {
|
2016-12-03 14:53:12 -05:00
|
|
|
bufSize = size
|
|
|
|
}
|
2017-10-22 01:30:34 -04:00
|
|
|
|
2016-12-03 14:53:12 -05:00
|
|
|
buf := make([]byte, int(bufSize))
|
2017-01-16 20:05:00 -05:00
|
|
|
fsTmpObjPath := pathJoin(fs.fsPath, minioMetaTmpBucket, fs.fsUUID, tempObj)
|
2018-04-05 18:04:40 -04:00
|
|
|
bytesWritten, err := fsCreateFile(ctx, fsTmpObjPath, data, buf, data.Size())
|
2016-12-03 14:53:12 -05:00
|
|
|
if err != nil {
|
2018-04-05 18:04:40 -04:00
|
|
|
fsRemoveFile(ctx, fsTmpObjPath)
|
2016-12-03 14:53:12 -05:00
|
|
|
return ObjectInfo{}, toObjectErr(err, bucket, object)
|
|
|
|
}
|
2016-07-05 04:04:50 -04:00
|
|
|
|
2018-03-28 17:14:06 -04:00
|
|
|
fsMeta.Meta["etag"] = hex.EncodeToString(data.MD5Current())
|
2017-10-24 15:25:42 -04:00
|
|
|
|
2016-12-03 14:53:12 -05:00
|
|
|
// Should return IncompleteBody{} error when reader has fewer
|
|
|
|
// bytes than specified in request header.
|
2017-09-19 15:40:27 -04:00
|
|
|
if bytesWritten < data.Size() {
|
2018-04-05 18:04:40 -04:00
|
|
|
fsRemoveFile(ctx, fsTmpObjPath)
|
|
|
|
return ObjectInfo{}, IncompleteBody{}
|
2016-05-13 14:52:36 -04:00
|
|
|
}
|
2016-12-03 14:53:12 -05:00
|
|
|
|
2016-10-20 01:52:03 -04:00
|
|
|
// Delete the temporary object in the case of a
|
|
|
|
// failure. If PutObject succeeds, then there would be
|
|
|
|
// nothing to delete.
|
2018-04-05 18:04:40 -04:00
|
|
|
defer fsRemoveFile(ctx, fsTmpObjPath)
|
2016-05-13 14:52:36 -04:00
|
|
|
|
2016-07-05 04:04:50 -04:00
|
|
|
// Entire object was written to the temp location, now it's safe to rename it to the actual location.
|
2017-01-16 20:05:00 -05:00
|
|
|
fsNSObjPath := pathJoin(fs.fsPath, bucket, object)
|
2018-03-27 19:44:45 -04:00
|
|
|
// Deny if WORM is enabled
|
|
|
|
if globalWORMEnabled {
|
2018-04-05 18:04:40 -04:00
|
|
|
if _, err = fsStatFile(ctx, fsNSObjPath); err == nil {
|
|
|
|
return ObjectInfo{}, ObjectAlreadyExists{Bucket: bucket, Object: object}
|
2018-03-27 19:44:45 -04:00
|
|
|
}
|
|
|
|
}
|
2018-04-05 18:04:40 -04:00
|
|
|
if err = fsRenameFile(ctx, fsTmpObjPath, fsNSObjPath); err != nil {
|
2017-01-16 20:05:00 -05:00
|
|
|
return ObjectInfo{}, toObjectErr(err, bucket, object)
|
2016-05-13 14:52:36 -04:00
|
|
|
}
|
|
|
|
|
2016-11-27 14:33:08 -05:00
|
|
|
if bucket != minioMetaBucket {
|
2017-01-16 20:05:00 -05:00
|
|
|
// Write FS metadata after a successful namespace operation.
|
|
|
|
if _, err = fsMeta.WriteTo(wlk); err != nil {
|
|
|
|
return ObjectInfo{}, toObjectErr(err, bucket, object)
|
2016-11-27 14:33:08 -05:00
|
|
|
}
|
2016-07-21 20:31:14 -04:00
|
|
|
}
|
2016-11-11 19:36:07 -05:00
|
|
|
|
2017-01-16 20:05:00 -05:00
|
|
|
// Stat the file to fetch timestamp, size.
|
2018-04-05 18:04:40 -04:00
|
|
|
fi, err := fsStatFile(ctx, pathJoin(fs.fsPath, bucket, object))
|
2017-01-16 20:05:00 -05:00
|
|
|
if err != nil {
|
2017-01-26 18:40:10 -05:00
|
|
|
return ObjectInfo{}, toObjectErr(err, bucket, object)
|
2017-01-16 20:05:00 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
// Success.
|
|
|
|
return fsMeta.ToObjectInfo(bucket, object, fi), nil
|
2016-04-29 17:24:10 -04:00
|
|
|
}
|
|
|
|
|
2016-07-21 20:31:14 -04:00
|
|
|
// DeleteObject - deletes an object from a bucket, this operation is destructive
|
|
|
|
// and there are no rollbacks supported.
|
2018-03-14 15:01:47 -04:00
|
|
|
func (fs *FSObjects) DeleteObject(ctx context.Context, bucket, object string) error {
|
2018-01-12 23:34:52 -05:00
|
|
|
// Acquire a write lock before deleting the object.
|
|
|
|
objectLock := fs.nsMutex.NewNSLock(bucket, object)
|
|
|
|
if err := objectLock.GetLock(globalOperationTimeout); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
defer objectLock.Unlock()
|
|
|
|
|
2018-04-05 18:04:40 -04:00
|
|
|
if err := checkDelObjArgs(ctx, bucket, object); err != nil {
|
2016-12-02 02:15:17 -05:00
|
|
|
return err
|
2016-04-29 17:24:10 -04:00
|
|
|
}
|
2016-10-10 13:20:04 -04:00
|
|
|
|
2018-04-05 18:04:40 -04:00
|
|
|
if _, err := fs.statBucketDir(ctx, bucket); err != nil {
|
2017-01-16 20:05:00 -05:00
|
|
|
return toObjectErr(err, bucket)
|
|
|
|
}
|
|
|
|
|
|
|
|
minioMetaBucketDir := pathJoin(fs.fsPath, minioMetaBucket)
|
2018-03-28 17:14:06 -04:00
|
|
|
fsMetaPath := pathJoin(minioMetaBucketDir, bucketMetaPrefix, bucket, object, fs.metaJSONFile)
|
2016-11-27 14:33:08 -05:00
|
|
|
if bucket != minioMetaBucket {
|
2017-01-16 20:05:00 -05:00
|
|
|
rwlk, lerr := fs.rwPool.Write(fsMetaPath)
|
|
|
|
if lerr == nil {
|
|
|
|
// This close will allow for fs locks to be synchronized on `fs.json`.
|
|
|
|
defer rwlk.Close()
|
|
|
|
}
|
|
|
|
if lerr != nil && lerr != errFileNotFound {
|
2018-04-05 18:04:40 -04:00
|
|
|
logger.LogIf(ctx, lerr)
|
|
|
|
return toObjectErr(lerr, bucket, object)
|
2016-11-27 14:33:08 -05:00
|
|
|
}
|
2016-07-21 20:31:14 -04:00
|
|
|
}
|
2017-01-16 20:05:00 -05:00
|
|
|
|
|
|
|
// Delete the object.
|
2018-04-05 18:04:40 -04:00
|
|
|
if err := fsDeleteFile(ctx, pathJoin(fs.fsPath, bucket), pathJoin(fs.fsPath, bucket, object)); err != nil {
|
2017-01-26 18:40:10 -05:00
|
|
|
return toObjectErr(err, bucket, object)
|
2016-04-29 17:24:10 -04:00
|
|
|
}
|
2017-01-16 20:05:00 -05:00
|
|
|
|
|
|
|
if bucket != minioMetaBucket {
|
|
|
|
// Delete the metadata object.
|
2018-04-05 18:04:40 -04:00
|
|
|
err := fsDeleteFile(ctx, minioMetaBucketDir, fsMetaPath)
|
2018-04-10 12:36:37 -04:00
|
|
|
if err != nil && err != errFileNotFound {
|
2017-01-26 18:40:10 -05:00
|
|
|
return toObjectErr(err, bucket, object)
|
2017-01-16 20:05:00 -05:00
|
|
|
}
|
|
|
|
}
|
2016-04-29 17:24:10 -04:00
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2017-01-16 20:05:00 -05:00
|
|
|
// Returns function "listDir" of the type listDirFunc.
|
|
|
|
// isLeaf - is used by listDir function to check if an entry
|
|
|
|
// is a leaf or non-leaf entry.
|
2018-02-20 15:21:12 -05:00
|
|
|
func (fs *FSObjects) listDirFactory(isLeaf isLeafFunc) listDirFunc {
|
2017-01-16 20:05:00 -05:00
|
|
|
// listDir - lists all the entries at a given prefix and given entry in the prefix.
|
|
|
|
listDir := func(bucket, prefixDir, prefixEntry string) (entries []string, delayIsLeaf bool, err error) {
|
|
|
|
entries, err = readDir(pathJoin(fs.fsPath, bucket, prefixDir))
|
2017-01-26 18:39:22 -05:00
|
|
|
if err != nil {
|
|
|
|
return nil, false, err
|
|
|
|
}
|
|
|
|
entries, delayIsLeaf = filterListEntries(bucket, prefixDir, entries, prefixEntry, isLeaf)
|
|
|
|
return entries, delayIsLeaf, nil
|
2017-01-16 20:05:00 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
// Return list factory instance.
|
|
|
|
return listDir
|
|
|
|
}
|
|
|
|
|
2018-05-08 22:08:21 -04:00
|
|
|
// isObjectDir returns true if the specified bucket & prefix exists
|
|
|
|
// and the prefix represents an empty directory. An S3 empty directory
|
|
|
|
// is also an empty directory in the FS backend.
|
|
|
|
func (fs *FSObjects) isObjectDir(bucket, prefix string) bool {
|
|
|
|
entries, err := readDirN(pathJoin(fs.fsPath, bucket, prefix), 1)
|
|
|
|
if err != nil {
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
return len(entries) == 0
|
|
|
|
}
|
|
|
|
|
2017-04-04 12:14:03 -04:00
|
|
|
// getObjectETag is a helper function, which returns only the md5sum
|
|
|
|
// of the file on the disk.
|
2018-04-05 18:04:40 -04:00
|
|
|
func (fs *FSObjects) getObjectETag(ctx context.Context, bucket, entry string, lock bool) (string, error) {
|
2018-03-28 17:14:06 -04:00
|
|
|
fsMetaPath := pathJoin(fs.fsPath, minioMetaBucket, bucketMetaPrefix, bucket, entry, fs.metaJSONFile)
|
2017-04-04 12:14:03 -04:00
|
|
|
|
2018-03-12 16:52:38 -04:00
|
|
|
var reader io.Reader
|
|
|
|
var fi os.FileInfo
|
|
|
|
var size int64
|
|
|
|
if lock {
|
|
|
|
// Read `fs.json` to perhaps contend with
|
|
|
|
// parallel Put() operations.
|
|
|
|
rlk, err := fs.rwPool.Open(fsMetaPath)
|
|
|
|
// Ignore if `fs.json` is not available, this is true for pre-existing data.
|
|
|
|
if err != nil && err != errFileNotFound {
|
2018-04-05 18:04:40 -04:00
|
|
|
logger.LogIf(ctx, err)
|
|
|
|
return "", toObjectErr(err, bucket, entry)
|
2018-03-12 16:52:38 -04:00
|
|
|
}
|
2017-04-04 12:14:03 -04:00
|
|
|
|
2018-03-12 16:52:38 -04:00
|
|
|
// If file is not found, we don't need to proceed forward.
|
|
|
|
if err == errFileNotFound {
|
|
|
|
return "", nil
|
|
|
|
}
|
2017-04-04 12:14:03 -04:00
|
|
|
|
2018-03-12 16:52:38 -04:00
|
|
|
// Read from fs metadata only if it exists.
|
|
|
|
defer fs.rwPool.Close(fsMetaPath)
|
2017-04-04 12:14:03 -04:00
|
|
|
|
2018-03-12 16:52:38 -04:00
|
|
|
// Fetch the size of the underlying file.
|
|
|
|
fi, err = rlk.LockedFile.Stat()
|
|
|
|
if err != nil {
|
2018-04-05 18:04:40 -04:00
|
|
|
logger.LogIf(ctx, err)
|
|
|
|
return "", toObjectErr(err, bucket, entry)
|
2018-03-12 16:52:38 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
size = fi.Size()
|
|
|
|
reader = io.NewSectionReader(rlk.LockedFile, 0, fi.Size())
|
|
|
|
} else {
|
|
|
|
var err error
|
2018-04-05 18:04:40 -04:00
|
|
|
reader, size, err = fsOpenFile(ctx, fsMetaPath, 0)
|
2018-03-12 16:52:38 -04:00
|
|
|
if err != nil {
|
2018-04-05 18:04:40 -04:00
|
|
|
return "", toObjectErr(err, bucket, entry)
|
2018-03-12 16:52:38 -04:00
|
|
|
}
|
2017-08-23 20:59:14 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
// `fs.json` can be empty due to previously failed
|
|
|
|
// PutObject() transaction, if we arrive at such
|
|
|
|
// a situation we just ignore and continue.
|
2018-03-12 16:52:38 -04:00
|
|
|
if size == 0 {
|
2017-08-23 20:59:14 -04:00
|
|
|
return "", nil
|
|
|
|
}
|
|
|
|
|
2018-03-12 16:52:38 -04:00
|
|
|
fsMetaBuf, err := ioutil.ReadAll(reader)
|
2017-08-23 20:59:14 -04:00
|
|
|
if err != nil {
|
2018-04-05 18:04:40 -04:00
|
|
|
logger.LogIf(ctx, err)
|
|
|
|
return "", toObjectErr(err, bucket, entry)
|
2017-04-04 12:14:03 -04:00
|
|
|
}
|
|
|
|
|
2017-05-14 15:05:51 -04:00
|
|
|
// Check if FS metadata is valid, if not return error.
|
2018-03-27 20:23:10 -04:00
|
|
|
if !isFSMetaValid(parseFSVersion(fsMetaBuf)) {
|
2018-04-05 18:04:40 -04:00
|
|
|
logger.LogIf(ctx, errCorruptedFormat)
|
|
|
|
return "", toObjectErr(errCorruptedFormat, bucket, entry)
|
2017-05-14 15:05:51 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
return extractETag(parseFSMetaMap(fsMetaBuf)), nil
|
2017-04-04 12:14:03 -04:00
|
|
|
}
|
|
|
|
|
2016-08-17 16:26:08 -04:00
|
|
|
// ListObjects - list all objects at prefix upto maxKeys., optionally delimited by '/'. Maintains the list pool
|
|
|
|
// state for future re-entrant list requests.
|
2018-03-14 15:01:47 -04:00
|
|
|
func (fs *FSObjects) ListObjects(ctx context.Context, bucket, prefix, marker, delimiter string, maxKeys int) (loi ListObjectsInfo, e error) {
|
2018-04-05 18:04:40 -04:00
|
|
|
if err := checkListObjsArgs(ctx, bucket, prefix, marker, delimiter, fs); err != nil {
|
2017-06-21 22:53:09 -04:00
|
|
|
return loi, err
|
2016-05-26 17:43:17 -04:00
|
|
|
}
|
2018-02-09 18:19:30 -05:00
|
|
|
// Marker is set validate pre-condition.
|
|
|
|
if marker != "" {
|
|
|
|
// Marker not common with prefix is not implemented.Send an empty response
|
|
|
|
if !hasPrefix(marker, prefix) {
|
|
|
|
return ListObjectsInfo{}, e
|
|
|
|
}
|
|
|
|
}
|
2018-04-05 18:04:40 -04:00
|
|
|
if _, err := fs.statBucketDir(ctx, bucket); err != nil {
|
2017-06-21 22:53:09 -04:00
|
|
|
return loi, err
|
2016-05-20 23:48:47 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
// With max keys of zero we have reached eof, return right here.
|
|
|
|
if maxKeys == 0 {
|
2017-06-21 22:53:09 -04:00
|
|
|
return loi, nil
|
2016-05-20 23:48:47 -04:00
|
|
|
}
|
|
|
|
|
2016-05-27 18:43:51 -04:00
|
|
|
// For delimiter and prefix as '/' we do not list anything at all
|
|
|
|
// since according to s3 spec we stop at the 'delimiter'
|
|
|
|
// along // with the prefix. On a flat namespace with 'prefix'
|
|
|
|
// as '/' we don't have any entries, since all the keys are
|
|
|
|
// of form 'keyName/...'
|
|
|
|
if delimiter == slashSeparator && prefix == slashSeparator {
|
2017-06-21 22:53:09 -04:00
|
|
|
return loi, nil
|
2016-05-27 18:43:51 -04:00
|
|
|
}
|
|
|
|
|
2016-05-20 23:48:47 -04:00
|
|
|
// Over flowing count - reset to maxObjectList.
|
|
|
|
if maxKeys < 0 || maxKeys > maxObjectList {
|
|
|
|
maxKeys = maxObjectList
|
|
|
|
}
|
|
|
|
|
|
|
|
// Default is recursive, if delimiter is set then list non recursive.
|
|
|
|
recursive := true
|
|
|
|
if delimiter == slashSeparator {
|
|
|
|
recursive = false
|
|
|
|
}
|
|
|
|
|
2017-01-16 20:05:00 -05:00
|
|
|
// Convert entry to ObjectInfo
|
|
|
|
entryToObjectInfo := func(entry string) (objInfo ObjectInfo, err error) {
|
2017-10-16 20:20:54 -04:00
|
|
|
// Protect the entry from concurrent deletes, or renames.
|
2018-01-12 23:34:52 -05:00
|
|
|
objectLock := fs.nsMutex.NewNSLock(bucket, entry)
|
2017-08-31 14:29:22 -04:00
|
|
|
if err = objectLock.GetRLock(globalListingTimeout); err != nil {
|
2018-04-05 18:04:40 -04:00
|
|
|
logger.LogIf(ctx, err)
|
2017-08-31 14:29:22 -04:00
|
|
|
return ObjectInfo{}, err
|
|
|
|
}
|
2018-03-01 14:37:57 -05:00
|
|
|
defer objectLock.RUnlock()
|
2018-04-05 18:04:40 -04:00
|
|
|
return fs.getObjectInfo(ctx, bucket, entry)
|
2017-01-16 20:05:00 -05:00
|
|
|
}
|
|
|
|
|
2016-08-17 14:36:33 -04:00
|
|
|
heal := false // true only for xl.ListObjectsHeal()
|
|
|
|
walkResultCh, endWalkCh := fs.listPool.Release(listParams{bucket, recursive, marker, prefix, heal})
|
2016-06-24 19:41:57 -04:00
|
|
|
if walkResultCh == nil {
|
|
|
|
endWalkCh = make(chan struct{})
|
2016-07-17 18:16:52 -04:00
|
|
|
isLeaf := func(bucket, object string) bool {
|
|
|
|
// bucket argument is unused as we don't need to StatFile
|
|
|
|
// to figure if it's a file, just need to check that the
|
|
|
|
// object string does not end with "/".
|
2017-02-16 17:52:14 -05:00
|
|
|
return !hasSuffix(object, slashSeparator)
|
2016-07-17 18:16:52 -04:00
|
|
|
}
|
2018-05-08 22:08:21 -04:00
|
|
|
// Return true if the specified object is an empty directory
|
|
|
|
isLeafDir := func(bucket, object string) bool {
|
|
|
|
if !hasSuffix(object, slashSeparator) {
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
return fs.isObjectDir(bucket, object)
|
|
|
|
}
|
2017-01-16 20:05:00 -05:00
|
|
|
listDir := fs.listDirFactory(isLeaf)
|
2018-05-08 22:08:21 -04:00
|
|
|
walkResultCh = startTreeWalk(ctx, bucket, prefix, marker, recursive, listDir, isLeaf, isLeafDir, endWalkCh)
|
2016-05-20 23:48:47 -04:00
|
|
|
}
|
2017-01-16 20:05:00 -05:00
|
|
|
|
2016-11-13 14:48:02 -05:00
|
|
|
var objInfos []ObjectInfo
|
2016-05-20 23:48:47 -04:00
|
|
|
var eof bool
|
|
|
|
var nextMarker string
|
2017-01-16 20:05:00 -05:00
|
|
|
|
|
|
|
// List until maxKeys requested.
|
2016-05-20 23:48:47 -04:00
|
|
|
for i := 0; i < maxKeys; {
|
2016-06-24 19:41:57 -04:00
|
|
|
walkResult, ok := <-walkResultCh
|
2016-05-20 23:48:47 -04:00
|
|
|
if !ok {
|
|
|
|
// Closed channel.
|
|
|
|
eof = true
|
|
|
|
break
|
|
|
|
}
|
|
|
|
// For any walk error return right away.
|
|
|
|
if walkResult.err != nil {
|
|
|
|
// File not found is a valid case.
|
2018-04-10 12:36:37 -04:00
|
|
|
if walkResult.err == errFileNotFound {
|
2017-06-21 22:53:09 -04:00
|
|
|
return loi, nil
|
2016-05-20 23:48:47 -04:00
|
|
|
}
|
2017-06-21 22:53:09 -04:00
|
|
|
return loi, toObjectErr(walkResult.err, bucket, prefix)
|
2016-05-20 23:48:47 -04:00
|
|
|
}
|
2016-11-13 14:48:02 -05:00
|
|
|
objInfo, err := entryToObjectInfo(walkResult.entry)
|
2016-05-26 17:43:17 -04:00
|
|
|
if err != nil {
|
2017-06-21 22:53:09 -04:00
|
|
|
return loi, nil
|
2016-05-26 17:43:17 -04:00
|
|
|
}
|
2016-11-13 14:48:02 -05:00
|
|
|
nextMarker = objInfo.Name
|
|
|
|
objInfos = append(objInfos, objInfo)
|
2016-05-20 23:48:47 -04:00
|
|
|
if walkResult.end {
|
|
|
|
eof = true
|
|
|
|
break
|
|
|
|
}
|
|
|
|
i++
|
|
|
|
}
|
2017-01-16 20:05:00 -05:00
|
|
|
|
|
|
|
// Save list routine for the next marker if we haven't reached EOF.
|
2016-08-17 14:36:33 -04:00
|
|
|
params := listParams{bucket, recursive, nextMarker, prefix, heal}
|
2016-05-20 23:48:47 -04:00
|
|
|
if !eof {
|
2016-06-24 19:41:57 -04:00
|
|
|
fs.listPool.Set(params, walkResultCh, endWalkCh)
|
2016-05-20 23:48:47 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
result := ListObjectsInfo{IsTruncated: !eof}
|
2016-11-13 14:48:02 -05:00
|
|
|
for _, objInfo := range objInfos {
|
|
|
|
result.NextMarker = objInfo.Name
|
2018-05-08 22:08:21 -04:00
|
|
|
if objInfo.IsDir && delimiter == slashSeparator {
|
2016-11-13 14:48:02 -05:00
|
|
|
result.Prefixes = append(result.Prefixes, objInfo.Name)
|
2016-07-24 18:52:12 -04:00
|
|
|
continue
|
2016-05-20 23:48:47 -04:00
|
|
|
}
|
2016-11-13 14:48:02 -05:00
|
|
|
result.Objects = append(result.Objects, objInfo)
|
2016-05-20 23:48:47 -04:00
|
|
|
}
|
2017-01-16 20:05:00 -05:00
|
|
|
|
|
|
|
// Success.
|
2016-05-20 23:48:47 -04:00
|
|
|
return result, nil
|
|
|
|
}
|
|
|
|
|
2018-04-09 13:25:41 -04:00
|
|
|
// ReloadFormat - no-op for fs, Valid only for XL.
|
|
|
|
func (fs *FSObjects) ReloadFormat(ctx context.Context, dryRun bool) error {
|
2018-04-10 12:36:37 -04:00
|
|
|
logger.LogIf(ctx, NotImplemented{})
|
|
|
|
return NotImplemented{}
|
2018-04-09 13:25:41 -04:00
|
|
|
}
|
|
|
|
|
2018-02-15 20:45:57 -05:00
|
|
|
// HealFormat - no-op for fs, Valid only for XL.
|
2018-03-14 15:01:47 -04:00
|
|
|
func (fs *FSObjects) HealFormat(ctx context.Context, dryRun bool) (madmin.HealResultItem, error) {
|
2018-04-05 18:04:40 -04:00
|
|
|
logger.LogIf(ctx, NotImplemented{})
|
|
|
|
return madmin.HealResultItem{}, NotImplemented{}
|
2018-02-15 20:45:57 -05:00
|
|
|
}
|
|
|
|
|
2016-08-17 14:36:33 -04:00
|
|
|
// HealObject - no-op for fs. Valid only for XL.
|
2018-03-14 15:01:47 -04:00
|
|
|
func (fs *FSObjects) HealObject(ctx context.Context, bucket, object string, dryRun bool) (
|
2018-01-22 17:54:55 -05:00
|
|
|
res madmin.HealResultItem, err error) {
|
2018-04-05 18:04:40 -04:00
|
|
|
logger.LogIf(ctx, NotImplemented{})
|
|
|
|
return res, NotImplemented{}
|
2016-08-17 14:36:33 -04:00
|
|
|
}
|
|
|
|
|
2016-10-14 22:57:40 -04:00
|
|
|
// HealBucket - no-op for fs, Valid only for XL.
|
2018-03-14 15:01:47 -04:00
|
|
|
func (fs *FSObjects) HealBucket(ctx context.Context, bucket string, dryRun bool) ([]madmin.HealResultItem,
|
2018-01-22 17:54:55 -05:00
|
|
|
error) {
|
2018-04-05 18:04:40 -04:00
|
|
|
logger.LogIf(ctx, NotImplemented{})
|
|
|
|
return nil, NotImplemented{}
|
2016-10-14 22:57:40 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
// ListObjectsHeal - list all objects to be healed. Valid only for XL
|
2018-03-14 15:01:47 -04:00
|
|
|
func (fs *FSObjects) ListObjectsHeal(ctx context.Context, bucket, prefix, marker, delimiter string, maxKeys int) (loi ListObjectsInfo, e error) {
|
2018-04-05 18:04:40 -04:00
|
|
|
logger.LogIf(ctx, NotImplemented{})
|
|
|
|
return loi, NotImplemented{}
|
2016-08-17 14:36:33 -04:00
|
|
|
}
|
2017-01-19 12:34:18 -05:00
|
|
|
|
|
|
|
// ListBucketsHeal - list all buckets to be healed. Valid only for XL
|
2018-03-14 15:01:47 -04:00
|
|
|
func (fs *FSObjects) ListBucketsHeal(ctx context.Context) ([]BucketInfo, error) {
|
2018-04-05 18:04:40 -04:00
|
|
|
logger.LogIf(ctx, NotImplemented{})
|
|
|
|
return []BucketInfo{}, NotImplemented{}
|
2017-01-19 12:34:18 -05:00
|
|
|
}
|
2018-02-09 18:19:30 -05:00
|
|
|
|
|
|
|
// SetBucketPolicy sets policy on bucket
|
2018-04-24 18:53:30 -04:00
|
|
|
func (fs *FSObjects) SetBucketPolicy(ctx context.Context, bucket string, policy *policy.Policy) error {
|
|
|
|
return savePolicyConfig(fs, bucket, policy)
|
2018-02-09 18:19:30 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
// GetBucketPolicy will get policy on bucket
|
2018-04-24 18:53:30 -04:00
|
|
|
func (fs *FSObjects) GetBucketPolicy(ctx context.Context, bucket string) (*policy.Policy, error) {
|
2018-06-27 02:59:48 -04:00
|
|
|
return getPolicyConfig(fs, bucket)
|
2018-02-09 18:19:30 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
// DeleteBucketPolicy deletes all policies on bucket
|
2018-03-14 15:01:47 -04:00
|
|
|
func (fs *FSObjects) DeleteBucketPolicy(ctx context.Context, bucket string) error {
|
2018-04-24 18:53:30 -04:00
|
|
|
return removePolicyConfig(ctx, fs, bucket)
|
2018-02-09 18:19:30 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
// ListObjectsV2 lists all blobs in bucket filtered by prefix
|
2018-03-14 15:01:47 -04:00
|
|
|
func (fs *FSObjects) ListObjectsV2(ctx context.Context, bucket, prefix, continuationToken, delimiter string, maxKeys int, fetchOwner bool, startAfter string) (result ListObjectsV2Info, err error) {
|
2018-07-01 00:22:45 -04:00
|
|
|
marker := continuationToken
|
|
|
|
if marker == "" {
|
|
|
|
marker = startAfter
|
|
|
|
}
|
|
|
|
|
|
|
|
loi, err := fs.ListObjects(ctx, bucket, prefix, marker, delimiter, maxKeys)
|
2018-02-09 18:19:30 -05:00
|
|
|
if err != nil {
|
|
|
|
return result, err
|
|
|
|
}
|
|
|
|
|
|
|
|
listObjectsV2Info := ListObjectsV2Info{
|
|
|
|
IsTruncated: loi.IsTruncated,
|
|
|
|
ContinuationToken: continuationToken,
|
|
|
|
NextContinuationToken: loi.NextMarker,
|
|
|
|
Objects: loi.Objects,
|
|
|
|
Prefixes: loi.Prefixes,
|
|
|
|
}
|
|
|
|
return listObjectsV2Info, err
|
|
|
|
}
|
|
|
|
|
|
|
|
// IsNotificationSupported returns whether bucket notification is applicable for this layer.
|
2018-02-20 15:21:12 -05:00
|
|
|
func (fs *FSObjects) IsNotificationSupported() bool {
|
2018-02-09 18:19:30 -05:00
|
|
|
return true
|
|
|
|
}
|
|
|
|
|
|
|
|
// IsEncryptionSupported returns whether server side encryption is applicable for this layer.
|
2018-02-20 15:21:12 -05:00
|
|
|
func (fs *FSObjects) IsEncryptionSupported() bool {
|
2018-02-09 18:19:30 -05:00
|
|
|
return true
|
|
|
|
}
|