2021-04-18 15:41:13 -04:00
|
|
|
// Copyright (c) 2015-2021 MinIO, Inc.
|
|
|
|
//
|
|
|
|
// This file is part of MinIO Object Storage stack
|
|
|
|
//
|
|
|
|
// This program is free software: you can redistribute it and/or modify
|
|
|
|
// it under the terms of the GNU Affero General Public License as published by
|
|
|
|
// the Free Software Foundation, either version 3 of the License, or
|
|
|
|
// (at your option) any later version.
|
|
|
|
//
|
|
|
|
// This program is distributed in the hope that it will be useful
|
|
|
|
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
// GNU Affero General Public License for more details.
|
|
|
|
//
|
|
|
|
// You should have received a copy of the GNU Affero General Public License
|
|
|
|
// along with this program. If not, see <http://www.gnu.org/licenses/>.
|
2020-07-21 20:49:56 -04:00
|
|
|
|
|
|
|
package cmd
|
|
|
|
|
|
|
|
import (
|
|
|
|
"context"
|
2020-09-15 23:44:48 -04:00
|
|
|
"fmt"
|
2020-07-21 20:49:56 -04:00
|
|
|
"net/http"
|
2021-02-03 23:41:33 -05:00
|
|
|
"reflect"
|
2020-08-12 20:32:24 -04:00
|
|
|
"strings"
|
2021-03-09 05:56:42 -05:00
|
|
|
"sync"
|
2020-07-21 20:49:56 -04:00
|
|
|
"time"
|
|
|
|
|
2021-05-06 11:52:02 -04:00
|
|
|
"github.com/minio/madmin-go"
|
2020-11-19 14:50:22 -05:00
|
|
|
minio "github.com/minio/minio-go/v7"
|
2020-07-21 20:49:56 -04:00
|
|
|
miniogo "github.com/minio/minio-go/v7"
|
|
|
|
"github.com/minio/minio-go/v7/pkg/encrypt"
|
|
|
|
"github.com/minio/minio-go/v7/pkg/tags"
|
2021-06-01 17:59:40 -04:00
|
|
|
"github.com/minio/minio/internal/bucket/bandwidth"
|
|
|
|
"github.com/minio/minio/internal/bucket/replication"
|
|
|
|
"github.com/minio/minio/internal/config/storageclass"
|
|
|
|
"github.com/minio/minio/internal/crypto"
|
|
|
|
"github.com/minio/minio/internal/event"
|
|
|
|
xhttp "github.com/minio/minio/internal/http"
|
|
|
|
"github.com/minio/minio/internal/logger"
|
2021-05-30 00:16:42 -04:00
|
|
|
iampolicy "github.com/minio/pkg/iam/policy"
|
2020-07-21 20:49:56 -04:00
|
|
|
)
|
|
|
|
|
2020-07-30 22:55:22 -04:00
|
|
|
// gets replication config associated to a given bucket name.
|
|
|
|
func getReplicationConfig(ctx context.Context, bucketName string) (rc *replication.Config, err error) {
|
2020-07-21 20:49:56 -04:00
|
|
|
if globalIsGateway {
|
2020-10-09 12:59:52 -04:00
|
|
|
objAPI := newObjectLayerFn()
|
2020-07-21 20:49:56 -04:00
|
|
|
if objAPI == nil {
|
|
|
|
return nil, errServerNotInitialized
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil, BucketReplicationConfigNotFound{Bucket: bucketName}
|
|
|
|
}
|
|
|
|
|
|
|
|
return globalBucketMetadataSys.GetReplicationConfig(ctx, bucketName)
|
|
|
|
}
|
|
|
|
|
2020-07-30 22:55:22 -04:00
|
|
|
// validateReplicationDestination returns error if replication destination bucket missing or not configured
|
2020-07-21 20:49:56 -04:00
|
|
|
// It also returns true if replication destination is same as this server.
|
2020-07-30 22:55:22 -04:00
|
|
|
func validateReplicationDestination(ctx context.Context, bucket string, rCfg *replication.Config) (bool, error) {
|
2020-11-19 13:38:50 -05:00
|
|
|
arn, err := madmin.ParseARN(rCfg.RoleArn)
|
|
|
|
if err != nil {
|
|
|
|
return false, BucketRemoteArnInvalid{}
|
|
|
|
}
|
|
|
|
if arn.Type != madmin.ReplicationService {
|
|
|
|
return false, BucketRemoteArnTypeInvalid{}
|
|
|
|
}
|
2020-10-08 13:54:11 -04:00
|
|
|
clnt := globalBucketTargetSys.GetRemoteTargetClient(ctx, rCfg.RoleArn)
|
2020-07-21 20:49:56 -04:00
|
|
|
if clnt == nil {
|
2020-07-30 22:55:22 -04:00
|
|
|
return false, BucketRemoteTargetNotFound{Bucket: bucket}
|
2020-07-21 20:49:56 -04:00
|
|
|
}
|
|
|
|
if found, _ := clnt.BucketExists(ctx, rCfg.GetDestination().Bucket); !found {
|
2020-10-08 13:54:11 -04:00
|
|
|
return false, BucketRemoteDestinationNotFound{Bucket: rCfg.GetDestination().Bucket}
|
2020-07-21 20:49:56 -04:00
|
|
|
}
|
2020-08-05 02:02:27 -04:00
|
|
|
if ret, err := globalBucketObjectLockSys.Get(bucket); err == nil {
|
|
|
|
if ret.LockEnabled {
|
|
|
|
lock, _, _, _, err := clnt.GetObjectLockConfig(ctx, rCfg.GetDestination().Bucket)
|
|
|
|
if err != nil || lock != "Enabled" {
|
|
|
|
return false, BucketReplicationDestinationMissingLock{Bucket: rCfg.GetDestination().Bucket}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2020-07-21 20:49:56 -04:00
|
|
|
// validate replication ARN against target endpoint
|
2020-08-06 20:10:21 -04:00
|
|
|
c, ok := globalBucketTargetSys.arnRemotesMap[rCfg.RoleArn]
|
2020-07-30 22:55:22 -04:00
|
|
|
if ok {
|
|
|
|
if c.EndpointURL().String() == clnt.EndpointURL().String() {
|
|
|
|
sameTarget, _ := isLocalHost(clnt.EndpointURL().Hostname(), clnt.EndpointURL().Port(), globalMinioPort)
|
|
|
|
return sameTarget, nil
|
2020-07-21 20:49:56 -04:00
|
|
|
}
|
|
|
|
}
|
2020-07-30 22:55:22 -04:00
|
|
|
return false, BucketRemoteTargetNotFound{Bucket: bucket}
|
2020-07-21 20:49:56 -04:00
|
|
|
}
|
|
|
|
|
2021-06-01 22:59:11 -04:00
|
|
|
type mustReplicateOptions struct {
|
|
|
|
meta map[string]string
|
|
|
|
status replication.StatusType
|
|
|
|
opType replication.Type
|
|
|
|
}
|
|
|
|
|
|
|
|
func (o mustReplicateOptions) ReplicationStatus() (s replication.StatusType) {
|
|
|
|
if rs, ok := o.meta[xhttp.AmzBucketReplicationStatus]; ok {
|
|
|
|
return replication.StatusType(rs)
|
|
|
|
}
|
|
|
|
return s
|
|
|
|
}
|
|
|
|
func (o mustReplicateOptions) isExistingObjectReplication() bool {
|
|
|
|
return o.opType == replication.ExistingObjectReplicationType
|
|
|
|
}
|
|
|
|
|
|
|
|
func (o mustReplicateOptions) isMetadataReplication() bool {
|
|
|
|
return o.opType == replication.MetadataReplicationType
|
|
|
|
}
|
|
|
|
func getMustReplicateOptions(o ObjectInfo, op replication.Type) mustReplicateOptions {
|
|
|
|
if !op.Valid() {
|
|
|
|
op = replication.ObjectReplicationType
|
|
|
|
if o.metadataOnly {
|
|
|
|
op = replication.MetadataReplicationType
|
|
|
|
}
|
|
|
|
}
|
|
|
|
meta := cloneMSS(o.UserDefined)
|
|
|
|
if o.UserTags != "" {
|
|
|
|
meta[xhttp.AmzObjectTagging] = o.UserTags
|
|
|
|
}
|
|
|
|
return mustReplicateOptions{
|
|
|
|
meta: meta,
|
|
|
|
status: o.ReplicationStatus,
|
|
|
|
opType: op,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
func mustReplicateWeb(ctx context.Context, r *http.Request, bucket, object string, meta map[string]string, replStatus replication.StatusType, permErr APIErrorCode) (replicate bool, sync bool) {
|
2021-04-29 22:01:43 -04:00
|
|
|
if permErr != ErrNone {
|
|
|
|
return
|
|
|
|
}
|
2021-06-01 22:59:11 -04:00
|
|
|
return mustReplicater(ctx, bucket, object, mustReplicateOptions{
|
|
|
|
meta: meta,
|
|
|
|
status: replStatus,
|
|
|
|
opType: replication.ObjectReplicationType,
|
|
|
|
})
|
2021-04-29 22:01:43 -04:00
|
|
|
}
|
|
|
|
|
2021-01-12 01:36:51 -05:00
|
|
|
// mustReplicate returns 2 booleans - true if object meets replication criteria and true if replication is to be done in
|
|
|
|
// a synchronous manner.
|
2021-06-01 22:59:11 -04:00
|
|
|
func mustReplicate(ctx context.Context, r *http.Request, bucket, object string, opts mustReplicateOptions) (replicate bool, sync bool) {
|
2020-11-04 12:13:34 -05:00
|
|
|
if s3Err := isPutActionAllowed(ctx, getRequestAuthType(r), bucket, "", r, iampolicy.GetReplicationConfigurationAction); s3Err != ErrNone {
|
2021-01-12 01:36:51 -05:00
|
|
|
return
|
2020-08-12 20:32:24 -04:00
|
|
|
}
|
2021-06-01 22:59:11 -04:00
|
|
|
return mustReplicater(ctx, bucket, object, opts)
|
2020-08-12 20:32:24 -04:00
|
|
|
}
|
|
|
|
|
2021-01-12 01:36:51 -05:00
|
|
|
// mustReplicater returns 2 booleans - true if object meets replication criteria and true if replication is to be done in
|
|
|
|
// a synchronous manner.
|
2021-06-01 22:59:11 -04:00
|
|
|
func mustReplicater(ctx context.Context, bucket, object string, mopts mustReplicateOptions) (replicate bool, sync bool) {
|
2020-07-21 20:49:56 -04:00
|
|
|
if globalIsGateway {
|
2021-01-12 01:36:51 -05:00
|
|
|
return replicate, sync
|
2020-07-21 20:49:56 -04:00
|
|
|
}
|
2021-06-01 22:59:11 -04:00
|
|
|
replStatus := mopts.ReplicationStatus()
|
|
|
|
if replStatus == replication.Replica && !mopts.isMetadataReplication() {
|
2021-01-12 01:36:51 -05:00
|
|
|
return replicate, sync
|
2020-07-21 20:49:56 -04:00
|
|
|
}
|
2020-07-30 22:55:22 -04:00
|
|
|
cfg, err := getReplicationConfig(ctx, bucket)
|
2020-07-21 20:49:56 -04:00
|
|
|
if err != nil {
|
2021-01-12 01:36:51 -05:00
|
|
|
return replicate, sync
|
2020-07-21 20:49:56 -04:00
|
|
|
}
|
|
|
|
opts := replication.ObjectOpts{
|
2021-06-01 22:59:11 -04:00
|
|
|
Name: object,
|
|
|
|
SSEC: crypto.SSEC.IsEncrypted(mopts.meta),
|
|
|
|
Replica: replStatus == replication.Replica,
|
|
|
|
ExistingObject: mopts.isExistingObjectReplication(),
|
2020-07-21 20:49:56 -04:00
|
|
|
}
|
2021-06-01 22:59:11 -04:00
|
|
|
tagStr, ok := mopts.meta[xhttp.AmzObjectTagging]
|
2020-07-21 20:49:56 -04:00
|
|
|
if ok {
|
|
|
|
opts.UserTags = tagStr
|
|
|
|
}
|
2021-01-12 01:36:51 -05:00
|
|
|
tgt := globalBucketTargetSys.GetRemoteTargetClient(ctx, cfg.RoleArn)
|
2021-01-27 14:22:34 -05:00
|
|
|
// the target online status should not be used here while deciding
|
|
|
|
// whether to replicate as the target could be temporarily down
|
|
|
|
if tgt != nil {
|
|
|
|
return cfg.Replicate(opts), tgt.replicateSync
|
2021-01-12 01:36:51 -05:00
|
|
|
}
|
2021-01-27 14:22:34 -05:00
|
|
|
return cfg.Replicate(opts), false
|
2021-01-12 01:36:51 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
// Standard headers that needs to be extracted from User metadata.
|
|
|
|
var standardHeaders = []string{
|
2021-01-27 14:22:34 -05:00
|
|
|
xhttp.ContentType,
|
|
|
|
xhttp.CacheControl,
|
|
|
|
xhttp.ContentEncoding,
|
|
|
|
xhttp.ContentLanguage,
|
|
|
|
xhttp.ContentDisposition,
|
2021-01-12 01:36:51 -05:00
|
|
|
xhttp.AmzStorageClass,
|
|
|
|
xhttp.AmzObjectTagging,
|
|
|
|
xhttp.AmzBucketReplicationStatus,
|
2021-01-27 14:22:34 -05:00
|
|
|
xhttp.AmzObjectLockMode,
|
|
|
|
xhttp.AmzObjectLockRetainUntilDate,
|
|
|
|
xhttp.AmzObjectLockLegalHold,
|
|
|
|
xhttp.AmzTagCount,
|
|
|
|
xhttp.AmzServerSideEncryption,
|
2020-07-21 20:49:56 -04:00
|
|
|
}
|
|
|
|
|
2020-11-19 21:43:58 -05:00
|
|
|
// returns true if any of the objects being deleted qualifies for replication.
|
|
|
|
func hasReplicationRules(ctx context.Context, bucket string, objects []ObjectToDelete) bool {
|
|
|
|
c, err := getReplicationConfig(ctx, bucket)
|
|
|
|
if err != nil || c == nil {
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
for _, obj := range objects {
|
|
|
|
if c.HasActiveRules(obj.ObjectName, true) {
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
2021-01-12 01:36:51 -05:00
|
|
|
// isStandardHeader returns true if header is a supported header and not a custom header
|
2021-02-03 23:41:33 -05:00
|
|
|
func isStandardHeader(matchHeaderKey string) bool {
|
|
|
|
return equals(matchHeaderKey, standardHeaders...)
|
2021-01-12 01:36:51 -05:00
|
|
|
}
|
|
|
|
|
2020-11-19 21:43:58 -05:00
|
|
|
// returns whether object version is a deletemarker and if object qualifies for replication
|
2021-03-30 20:15:36 -04:00
|
|
|
func checkReplicateDelete(ctx context.Context, bucket string, dobj ObjectToDelete, oi ObjectInfo, gerr error) (replicate, sync bool) {
|
2020-11-19 21:43:58 -05:00
|
|
|
rcfg, err := getReplicationConfig(ctx, bucket)
|
|
|
|
if err != nil || rcfg == nil {
|
2021-03-30 20:15:36 -04:00
|
|
|
return false, sync
|
2020-11-19 21:43:58 -05:00
|
|
|
}
|
2021-02-18 19:35:37 -05:00
|
|
|
opts := replication.ObjectOpts{
|
|
|
|
Name: dobj.ObjectName,
|
|
|
|
SSEC: crypto.SSEC.IsEncrypted(oi.UserDefined),
|
|
|
|
UserTags: oi.UserTags,
|
|
|
|
DeleteMarker: oi.DeleteMarker,
|
|
|
|
VersionID: dobj.VersionID,
|
2021-03-13 13:28:35 -05:00
|
|
|
OpType: replication.DeleteReplicationType,
|
2021-02-18 19:35:37 -05:00
|
|
|
}
|
|
|
|
replicate = rcfg.Replicate(opts)
|
2020-11-19 21:43:58 -05:00
|
|
|
// when incoming delete is removal of a delete marker( a.k.a versioned delete),
|
|
|
|
// GetObjectInfo returns extra information even though it returns errFileNotFound
|
2020-11-25 14:24:50 -05:00
|
|
|
if gerr != nil {
|
2020-11-19 21:43:58 -05:00
|
|
|
validReplStatus := false
|
|
|
|
switch oi.ReplicationStatus {
|
2021-01-13 14:52:28 -05:00
|
|
|
case replication.Pending, replication.Completed, replication.Failed:
|
2020-11-19 21:43:58 -05:00
|
|
|
validReplStatus = true
|
|
|
|
}
|
2021-02-18 19:35:37 -05:00
|
|
|
if oi.DeleteMarker && (validReplStatus || replicate) {
|
2021-03-30 20:15:36 -04:00
|
|
|
return true, sync
|
2020-11-19 21:43:58 -05:00
|
|
|
}
|
2021-02-18 03:33:51 -05:00
|
|
|
// can be the case that other cluster is down and duplicate `mc rm --vid`
|
|
|
|
// is issued - this still needs to be replicated back to the other target
|
2021-03-30 20:15:36 -04:00
|
|
|
return oi.VersionPurgeStatus == Pending || oi.VersionPurgeStatus == Failed, sync
|
2021-02-09 18:11:43 -05:00
|
|
|
}
|
2021-01-12 01:36:51 -05:00
|
|
|
tgt := globalBucketTargetSys.GetRemoteTargetClient(ctx, rcfg.RoleArn)
|
2021-01-27 14:22:34 -05:00
|
|
|
// the target online status should not be used here while deciding
|
|
|
|
// whether to replicate deletes as the target could be temporarily down
|
|
|
|
if tgt == nil {
|
2021-03-30 20:15:36 -04:00
|
|
|
return false, false
|
2020-11-19 21:43:58 -05:00
|
|
|
}
|
2021-03-30 20:15:36 -04:00
|
|
|
return replicate, tgt.replicateSync
|
2020-11-19 21:43:58 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
// replicate deletes to the designated replication target if replication configuration
|
|
|
|
// has delete marker replication or delete replication (MinIO extension to allow deletes where version id
|
|
|
|
// is specified) enabled.
|
|
|
|
// Similar to bucket replication for PUT operation, soft delete (a.k.a setting delete marker) and
|
|
|
|
// permanent deletes (by specifying a version ID in the delete operation) have three states "Pending", "Complete"
|
|
|
|
// and "Failed" to mark the status of the replication of "DELETE" operation. All failed operations can
|
|
|
|
// then be retried by healing. In the case of permanent deletes, until the replication is completed on the
|
|
|
|
// target cluster, the object version is marked deleted on the source and hidden from listing. It is permanently
|
|
|
|
// deleted from the source when the VersionPurgeStatus changes to "Complete", i.e after replication succeeds
|
|
|
|
// on target.
|
2021-06-01 22:59:11 -04:00
|
|
|
func replicateDelete(ctx context.Context, dobj DeletedObjectReplicationInfo, objectAPI ObjectLayer) {
|
2020-11-19 21:43:58 -05:00
|
|
|
bucket := dobj.Bucket
|
2021-02-03 23:41:33 -05:00
|
|
|
versionID := dobj.DeleteMarkerVersionID
|
|
|
|
if versionID == "" {
|
|
|
|
versionID = dobj.VersionID
|
|
|
|
}
|
|
|
|
|
2020-11-19 21:43:58 -05:00
|
|
|
rcfg, err := getReplicationConfig(ctx, bucket)
|
|
|
|
if err != nil || rcfg == nil {
|
2021-01-27 14:22:34 -05:00
|
|
|
logger.LogIf(ctx, err)
|
2021-02-03 23:41:33 -05:00
|
|
|
sendEvent(eventArgs{
|
|
|
|
BucketName: bucket,
|
|
|
|
Object: ObjectInfo{
|
|
|
|
Bucket: bucket,
|
|
|
|
Name: dobj.ObjectName,
|
|
|
|
VersionID: versionID,
|
|
|
|
DeleteMarker: dobj.DeleteMarker,
|
|
|
|
},
|
|
|
|
Host: "Internal: [Replication]",
|
|
|
|
EventName: event.ObjectReplicationNotTracked,
|
|
|
|
})
|
2020-11-19 21:43:58 -05:00
|
|
|
return
|
|
|
|
}
|
2021-02-09 18:11:43 -05:00
|
|
|
|
2020-11-19 21:43:58 -05:00
|
|
|
tgt := globalBucketTargetSys.GetRemoteTargetClient(ctx, rcfg.RoleArn)
|
|
|
|
if tgt == nil {
|
2021-01-27 14:22:34 -05:00
|
|
|
logger.LogIf(ctx, fmt.Errorf("failed to get target for bucket:%s arn:%s", bucket, rcfg.RoleArn))
|
2021-02-03 23:41:33 -05:00
|
|
|
sendEvent(eventArgs{
|
|
|
|
BucketName: bucket,
|
|
|
|
Object: ObjectInfo{
|
|
|
|
Bucket: bucket,
|
|
|
|
Name: dobj.ObjectName,
|
|
|
|
VersionID: versionID,
|
|
|
|
DeleteMarker: dobj.DeleteMarker,
|
|
|
|
},
|
|
|
|
Host: "Internal: [Replication]",
|
|
|
|
EventName: event.ObjectReplicationNotTracked,
|
|
|
|
})
|
2020-11-19 21:43:58 -05:00
|
|
|
return
|
|
|
|
}
|
2021-02-03 23:41:33 -05:00
|
|
|
|
2020-11-19 21:43:58 -05:00
|
|
|
rmErr := tgt.RemoveObject(ctx, rcfg.GetDestination().Bucket, dobj.ObjectName, miniogo.RemoveObjectOptions{
|
|
|
|
VersionID: versionID,
|
|
|
|
Internal: miniogo.AdvancedRemoveOptions{
|
|
|
|
ReplicationDeleteMarker: dobj.DeleteMarkerVersionID != "",
|
2020-11-29 00:15:45 -05:00
|
|
|
ReplicationMTime: dobj.DeleteMarkerMTime.Time,
|
2020-11-19 21:43:58 -05:00
|
|
|
ReplicationStatus: miniogo.ReplicationStatusReplica,
|
2021-03-03 14:13:31 -05:00
|
|
|
ReplicationRequest: true, // always set this to distinguish between `mc mirror` replication and serverside
|
2020-11-19 21:43:58 -05:00
|
|
|
},
|
|
|
|
})
|
|
|
|
|
|
|
|
replicationStatus := dobj.DeleteMarkerReplicationStatus
|
|
|
|
versionPurgeStatus := dobj.VersionPurgeStatus
|
|
|
|
|
|
|
|
if rmErr != nil {
|
|
|
|
if dobj.VersionID == "" {
|
|
|
|
replicationStatus = string(replication.Failed)
|
|
|
|
} else {
|
|
|
|
versionPurgeStatus = Failed
|
|
|
|
}
|
2021-02-11 01:00:42 -05:00
|
|
|
logger.LogIf(ctx, fmt.Errorf("Unable to replicate delete marker to %s/%s(%s): %s", rcfg.GetDestination().Bucket, dobj.ObjectName, versionID, rmErr))
|
2020-11-19 21:43:58 -05:00
|
|
|
} else {
|
|
|
|
if dobj.VersionID == "" {
|
2021-01-13 14:52:28 -05:00
|
|
|
replicationStatus = string(replication.Completed)
|
2020-11-19 21:43:58 -05:00
|
|
|
} else {
|
|
|
|
versionPurgeStatus = Complete
|
|
|
|
}
|
|
|
|
}
|
2021-04-03 12:03:42 -04:00
|
|
|
prevStatus := dobj.DeleteMarkerReplicationStatus
|
|
|
|
currStatus := replicationStatus
|
|
|
|
if dobj.VersionID != "" {
|
|
|
|
prevStatus = string(dobj.VersionPurgeStatus)
|
|
|
|
currStatus = string(versionPurgeStatus)
|
|
|
|
}
|
2021-04-04 18:34:33 -04:00
|
|
|
// to decrement pending count later.
|
|
|
|
globalReplicationStats.Update(dobj.Bucket, 0, replication.StatusType(currStatus), replication.StatusType(prevStatus), replication.DeleteReplicationType)
|
2021-01-25 17:04:41 -05:00
|
|
|
|
2020-11-22 02:48:50 -05:00
|
|
|
var eventName = event.ObjectReplicationComplete
|
2020-11-19 21:43:58 -05:00
|
|
|
if replicationStatus == string(replication.Failed) || versionPurgeStatus == Failed {
|
2020-11-22 02:48:50 -05:00
|
|
|
eventName = event.ObjectReplicationFailed
|
|
|
|
}
|
|
|
|
|
2020-11-19 21:43:58 -05:00
|
|
|
// Update metadata on the delete marker or purge permanent delete if replication success.
|
2021-02-03 23:41:33 -05:00
|
|
|
dobjInfo, err := objectAPI.DeleteObject(ctx, bucket, dobj.ObjectName, ObjectOptions{
|
2020-11-19 21:43:58 -05:00
|
|
|
VersionID: versionID,
|
|
|
|
DeleteMarkerReplicationStatus: replicationStatus,
|
|
|
|
VersionPurgeStatus: versionPurgeStatus,
|
2021-02-03 23:41:33 -05:00
|
|
|
Versioned: globalBucketVersioningSys.Enabled(bucket),
|
2020-11-19 21:43:58 -05:00
|
|
|
VersionSuspended: globalBucketVersioningSys.Suspended(bucket),
|
2021-01-25 17:04:41 -05:00
|
|
|
})
|
2021-02-09 18:11:43 -05:00
|
|
|
if err != nil && !isErrVersionNotFound(err) { // VersionNotFound would be reported by pool that object version is missing on.
|
|
|
|
logger.LogIf(ctx, fmt.Errorf("Unable to update replication metadata for %s/%s(%s): %s", bucket, dobj.ObjectName, versionID, err))
|
2021-02-03 23:41:33 -05:00
|
|
|
sendEvent(eventArgs{
|
|
|
|
BucketName: bucket,
|
|
|
|
Object: ObjectInfo{
|
|
|
|
Bucket: bucket,
|
|
|
|
Name: dobj.ObjectName,
|
|
|
|
VersionID: versionID,
|
|
|
|
DeleteMarker: dobj.DeleteMarker,
|
|
|
|
},
|
|
|
|
Host: "Internal: [Replication]",
|
|
|
|
EventName: eventName,
|
|
|
|
})
|
|
|
|
} else {
|
|
|
|
sendEvent(eventArgs{
|
|
|
|
BucketName: bucket,
|
|
|
|
Object: dobjInfo,
|
|
|
|
Host: "Internal: [Replication]",
|
|
|
|
EventName: eventName,
|
|
|
|
})
|
2020-11-19 21:43:58 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-11-19 14:50:22 -05:00
|
|
|
func getCopyObjMetadata(oi ObjectInfo, dest replication.Destination) map[string]string {
|
|
|
|
meta := make(map[string]string, len(oi.UserDefined))
|
|
|
|
for k, v := range oi.UserDefined {
|
2021-02-03 23:41:33 -05:00
|
|
|
if strings.HasPrefix(strings.ToLower(k), ReservedMetadataPrefixLower) {
|
2020-11-19 14:50:22 -05:00
|
|
|
continue
|
|
|
|
}
|
2021-02-03 23:41:33 -05:00
|
|
|
|
|
|
|
if equals(k, xhttp.AmzBucketReplicationStatus) {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
|
|
|
// https://github.com/google/security-research/security/advisories/GHSA-76wf-9vgp-pj7w
|
|
|
|
if equals(k, xhttp.AmzMetaUnencryptedContentLength, xhttp.AmzMetaUnencryptedContentMD5) {
|
2020-11-19 14:50:22 -05:00
|
|
|
continue
|
|
|
|
}
|
|
|
|
meta[k] = v
|
|
|
|
}
|
2021-02-03 23:41:33 -05:00
|
|
|
|
2020-11-19 14:50:22 -05:00
|
|
|
if oi.ContentEncoding != "" {
|
|
|
|
meta[xhttp.ContentEncoding] = oi.ContentEncoding
|
|
|
|
}
|
2021-02-03 23:41:33 -05:00
|
|
|
|
2020-11-19 14:50:22 -05:00
|
|
|
if oi.ContentType != "" {
|
|
|
|
meta[xhttp.ContentType] = oi.ContentType
|
|
|
|
}
|
2021-02-03 23:41:33 -05:00
|
|
|
|
|
|
|
if oi.UserTags != "" {
|
|
|
|
meta[xhttp.AmzObjectTagging] = oi.UserTags
|
2020-11-19 14:50:22 -05:00
|
|
|
meta[xhttp.AmzTagDirective] = "REPLACE"
|
|
|
|
}
|
2021-02-03 23:41:33 -05:00
|
|
|
|
2020-11-19 14:50:22 -05:00
|
|
|
sc := dest.StorageClass
|
|
|
|
if sc == "" {
|
|
|
|
sc = oi.StorageClass
|
|
|
|
}
|
2021-04-19 13:30:42 -04:00
|
|
|
// drop non standard storage classes for tiering from replication
|
|
|
|
if sc != "" && (sc == storageclass.RRS || sc == storageclass.STANDARD) {
|
2021-02-03 23:41:33 -05:00
|
|
|
meta[xhttp.AmzStorageClass] = sc
|
2020-11-19 14:50:22 -05:00
|
|
|
}
|
2021-04-19 13:30:42 -04:00
|
|
|
|
2020-11-19 14:50:22 -05:00
|
|
|
meta[xhttp.MinIOSourceETag] = oi.ETag
|
2021-02-03 23:41:33 -05:00
|
|
|
meta[xhttp.MinIOSourceMTime] = oi.ModTime.Format(time.RFC3339Nano)
|
2020-11-19 14:50:22 -05:00
|
|
|
meta[xhttp.AmzBucketReplicationStatus] = replication.Replica.String()
|
|
|
|
return meta
|
|
|
|
}
|
|
|
|
|
2021-02-08 21:12:28 -05:00
|
|
|
type caseInsensitiveMap map[string]string
|
|
|
|
|
|
|
|
// Lookup map entry case insensitively.
|
|
|
|
func (m caseInsensitiveMap) Lookup(key string) (string, bool) {
|
|
|
|
if len(m) == 0 {
|
|
|
|
return "", false
|
|
|
|
}
|
|
|
|
for _, k := range []string{
|
|
|
|
key,
|
|
|
|
strings.ToLower(key),
|
|
|
|
http.CanonicalHeaderKey(key),
|
|
|
|
} {
|
|
|
|
v, ok := m[k]
|
|
|
|
if ok {
|
|
|
|
return v, ok
|
|
|
|
}
|
2021-02-08 19:19:05 -05:00
|
|
|
}
|
2021-02-08 21:12:28 -05:00
|
|
|
return "", false
|
2021-02-08 19:19:05 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
func putReplicationOpts(ctx context.Context, dest replication.Destination, objInfo ObjectInfo) (putOpts miniogo.PutObjectOptions, err error) {
|
2020-07-21 20:49:56 -04:00
|
|
|
meta := make(map[string]string)
|
|
|
|
for k, v := range objInfo.UserDefined {
|
2021-01-12 01:36:51 -05:00
|
|
|
if strings.HasPrefix(strings.ToLower(k), ReservedMetadataPrefixLower) {
|
2020-07-21 20:49:56 -04:00
|
|
|
continue
|
|
|
|
}
|
2021-01-12 01:36:51 -05:00
|
|
|
if isStandardHeader(k) {
|
2020-08-12 20:32:24 -04:00
|
|
|
continue
|
|
|
|
}
|
2020-07-21 20:49:56 -04:00
|
|
|
meta[k] = v
|
|
|
|
}
|
2021-02-03 23:41:33 -05:00
|
|
|
|
2020-08-05 23:01:20 -04:00
|
|
|
sc := dest.StorageClass
|
2021-04-19 13:30:42 -04:00
|
|
|
if sc == "" && (objInfo.StorageClass == storageclass.STANDARD || objInfo.StorageClass == storageclass.RRS) {
|
2020-08-05 23:01:20 -04:00
|
|
|
sc = objInfo.StorageClass
|
|
|
|
}
|
2020-07-21 20:49:56 -04:00
|
|
|
putOpts = miniogo.PutObjectOptions{
|
2020-10-06 11:37:09 -04:00
|
|
|
UserMetadata: meta,
|
|
|
|
ContentType: objInfo.ContentType,
|
|
|
|
ContentEncoding: objInfo.ContentEncoding,
|
|
|
|
StorageClass: sc,
|
|
|
|
Internal: miniogo.AdvancedPutOptions{
|
2021-03-03 14:13:31 -05:00
|
|
|
SourceVersionID: objInfo.VersionID,
|
|
|
|
ReplicationStatus: miniogo.ReplicationStatusReplica,
|
|
|
|
SourceMTime: objInfo.ModTime,
|
|
|
|
SourceETag: objInfo.ETag,
|
|
|
|
ReplicationRequest: true, // always set this to distinguish between `mc mirror` replication and serverside
|
2020-10-06 11:37:09 -04:00
|
|
|
},
|
2020-07-21 20:49:56 -04:00
|
|
|
}
|
2021-02-03 23:41:33 -05:00
|
|
|
if objInfo.UserTags != "" {
|
|
|
|
tag, _ := tags.ParseObjectTags(objInfo.UserTags)
|
|
|
|
if tag != nil {
|
|
|
|
putOpts.UserTags = tag.ToMap()
|
|
|
|
}
|
|
|
|
}
|
2021-02-08 21:12:28 -05:00
|
|
|
|
|
|
|
lkMap := caseInsensitiveMap(objInfo.UserDefined)
|
|
|
|
if lang, ok := lkMap.Lookup(xhttp.ContentLanguage); ok {
|
2021-01-27 14:22:34 -05:00
|
|
|
putOpts.ContentLanguage = lang
|
|
|
|
}
|
2021-02-08 21:12:28 -05:00
|
|
|
if disp, ok := lkMap.Lookup(xhttp.ContentDisposition); ok {
|
2021-01-27 14:22:34 -05:00
|
|
|
putOpts.ContentDisposition = disp
|
|
|
|
}
|
2021-02-08 21:12:28 -05:00
|
|
|
if cc, ok := lkMap.Lookup(xhttp.CacheControl); ok {
|
2021-01-27 14:22:34 -05:00
|
|
|
putOpts.CacheControl = cc
|
|
|
|
}
|
2021-02-08 21:12:28 -05:00
|
|
|
if mode, ok := lkMap.Lookup(xhttp.AmzObjectLockMode); ok {
|
2020-07-21 20:49:56 -04:00
|
|
|
rmode := miniogo.RetentionMode(mode)
|
|
|
|
putOpts.Mode = rmode
|
|
|
|
}
|
2021-02-08 21:12:28 -05:00
|
|
|
if retainDateStr, ok := lkMap.Lookup(xhttp.AmzObjectLockRetainUntilDate); ok {
|
|
|
|
rdate, err := time.Parse(time.RFC3339, retainDateStr)
|
2020-07-21 20:49:56 -04:00
|
|
|
if err != nil {
|
2021-02-08 21:12:28 -05:00
|
|
|
return putOpts, err
|
2020-07-21 20:49:56 -04:00
|
|
|
}
|
|
|
|
putOpts.RetainUntilDate = rdate
|
|
|
|
}
|
2021-02-08 21:12:28 -05:00
|
|
|
if lhold, ok := lkMap.Lookup(xhttp.AmzObjectLockLegalHold); ok {
|
2020-07-21 20:49:56 -04:00
|
|
|
putOpts.LegalHold = miniogo.LegalHoldStatus(lhold)
|
|
|
|
}
|
|
|
|
if crypto.S3.IsEncrypted(objInfo.UserDefined) {
|
|
|
|
putOpts.ServerSideEncryption = encrypt.NewSSE()
|
|
|
|
}
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2020-11-19 14:50:22 -05:00
|
|
|
type replicationAction string
|
|
|
|
|
|
|
|
const (
|
|
|
|
replicateMetadata replicationAction = "metadata"
|
|
|
|
replicateNone replicationAction = "none"
|
|
|
|
replicateAll replicationAction = "all"
|
|
|
|
)
|
|
|
|
|
2021-02-03 23:41:33 -05:00
|
|
|
// matches k1 with all keys, returns 'true' if one of them matches
|
|
|
|
func equals(k1 string, keys ...string) bool {
|
|
|
|
for _, k2 := range keys {
|
|
|
|
if strings.ToLower(k1) == strings.ToLower(k2) {
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
2020-11-19 14:50:22 -05:00
|
|
|
// returns replicationAction by comparing metadata between source and target
|
|
|
|
func getReplicationAction(oi1 ObjectInfo, oi2 minio.ObjectInfo) replicationAction {
|
|
|
|
// needs full replication
|
|
|
|
if oi1.ETag != oi2.ETag ||
|
|
|
|
oi1.VersionID != oi2.VersionID ||
|
|
|
|
oi1.Size != oi2.Size ||
|
2021-01-27 14:22:34 -05:00
|
|
|
oi1.DeleteMarker != oi2.IsDeleteMarker ||
|
2021-02-03 23:41:33 -05:00
|
|
|
oi1.ModTime.Unix() != oi2.LastModified.Unix() {
|
2020-11-19 14:50:22 -05:00
|
|
|
return replicateAll
|
|
|
|
}
|
2021-02-03 23:41:33 -05:00
|
|
|
|
2021-01-27 14:22:34 -05:00
|
|
|
if oi1.ContentType != oi2.ContentType {
|
2020-11-19 14:50:22 -05:00
|
|
|
return replicateMetadata
|
|
|
|
}
|
2021-02-03 23:41:33 -05:00
|
|
|
|
2020-11-19 14:50:22 -05:00
|
|
|
if oi1.ContentEncoding != "" {
|
2021-01-27 14:22:34 -05:00
|
|
|
enc, ok := oi2.Metadata[xhttp.ContentEncoding]
|
2021-02-03 23:41:33 -05:00
|
|
|
if !ok {
|
|
|
|
enc, ok = oi2.Metadata[strings.ToLower(xhttp.ContentEncoding)]
|
|
|
|
if !ok {
|
|
|
|
return replicateMetadata
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if strings.Join(enc, ",") != oi1.ContentEncoding {
|
2020-11-19 14:50:22 -05:00
|
|
|
return replicateMetadata
|
|
|
|
}
|
|
|
|
}
|
2021-02-03 23:41:33 -05:00
|
|
|
|
|
|
|
t, _ := tags.ParseObjectTags(oi1.UserTags)
|
|
|
|
if !reflect.DeepEqual(oi2.UserTags, t.ToMap()) {
|
2020-11-19 14:50:22 -05:00
|
|
|
return replicateMetadata
|
|
|
|
}
|
2021-02-03 23:41:33 -05:00
|
|
|
|
|
|
|
// Compare only necessary headers
|
|
|
|
compareKeys := []string{
|
|
|
|
"Expires",
|
|
|
|
"Cache-Control",
|
|
|
|
"Content-Language",
|
|
|
|
"Content-Disposition",
|
|
|
|
"X-Amz-Object-Lock-Mode",
|
|
|
|
"X-Amz-Object-Lock-Retain-Until-Date",
|
|
|
|
"X-Amz-Object-Lock-Legal-Hold",
|
|
|
|
"X-Amz-Website-Redirect-Location",
|
|
|
|
"X-Amz-Meta-",
|
|
|
|
}
|
|
|
|
|
|
|
|
// compare metadata on both maps to see if meta is identical
|
|
|
|
compareMeta1 := make(map[string]string)
|
|
|
|
for k, v := range oi1.UserDefined {
|
|
|
|
var found bool
|
|
|
|
for _, prefix := range compareKeys {
|
|
|
|
if !strings.HasPrefix(strings.ToLower(k), strings.ToLower(prefix)) {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
found = true
|
|
|
|
break
|
|
|
|
}
|
|
|
|
if found {
|
|
|
|
compareMeta1[strings.ToLower(k)] = v
|
2021-01-27 14:22:34 -05:00
|
|
|
}
|
|
|
|
}
|
2021-02-03 23:41:33 -05:00
|
|
|
|
|
|
|
compareMeta2 := make(map[string]string)
|
|
|
|
for k, v := range oi2.Metadata {
|
|
|
|
var found bool
|
|
|
|
for _, prefix := range compareKeys {
|
|
|
|
if !strings.HasPrefix(strings.ToLower(k), strings.ToLower(prefix)) {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
found = true
|
|
|
|
break
|
2021-01-27 14:22:34 -05:00
|
|
|
}
|
2021-02-03 23:41:33 -05:00
|
|
|
if found {
|
|
|
|
compareMeta2[strings.ToLower(k)] = strings.Join(v, ",")
|
2020-11-19 14:50:22 -05:00
|
|
|
}
|
|
|
|
}
|
2021-02-03 23:41:33 -05:00
|
|
|
|
|
|
|
if !reflect.DeepEqual(compareMeta1, compareMeta2) {
|
2020-11-19 14:50:22 -05:00
|
|
|
return replicateMetadata
|
|
|
|
}
|
2021-02-03 23:41:33 -05:00
|
|
|
|
2020-11-19 14:50:22 -05:00
|
|
|
return replicateNone
|
|
|
|
}
|
|
|
|
|
2020-07-21 20:49:56 -04:00
|
|
|
// replicateObject replicates the specified version of the object to destination bucket
|
|
|
|
// The source object is then updated to reflect the replication status.
|
2021-04-15 19:32:00 -04:00
|
|
|
func replicateObject(ctx context.Context, ri ReplicateObjectInfo, objectAPI ObjectLayer) {
|
|
|
|
objInfo := ri.ObjectInfo
|
2020-09-16 19:04:55 -04:00
|
|
|
bucket := objInfo.Bucket
|
|
|
|
object := objInfo.Name
|
|
|
|
|
2020-07-30 22:55:22 -04:00
|
|
|
cfg, err := getReplicationConfig(ctx, bucket)
|
2020-07-21 20:49:56 -04:00
|
|
|
if err != nil {
|
|
|
|
logger.LogIf(ctx, err)
|
2021-02-03 23:41:33 -05:00
|
|
|
sendEvent(eventArgs{
|
|
|
|
EventName: event.ObjectReplicationNotTracked,
|
|
|
|
BucketName: bucket,
|
|
|
|
Object: objInfo,
|
|
|
|
Host: "Internal: [Replication]",
|
|
|
|
})
|
2020-07-21 20:49:56 -04:00
|
|
|
return
|
|
|
|
}
|
2020-10-08 13:54:11 -04:00
|
|
|
tgt := globalBucketTargetSys.GetRemoteTargetClient(ctx, cfg.RoleArn)
|
2020-07-21 20:49:56 -04:00
|
|
|
if tgt == nil {
|
2020-10-09 23:36:00 -04:00
|
|
|
logger.LogIf(ctx, fmt.Errorf("failed to get target for bucket:%s arn:%s", bucket, cfg.RoleArn))
|
2021-02-03 23:41:33 -05:00
|
|
|
sendEvent(eventArgs{
|
|
|
|
EventName: event.ObjectReplicationNotTracked,
|
|
|
|
BucketName: bucket,
|
|
|
|
Object: objInfo,
|
|
|
|
Host: "Internal: [Replication]",
|
|
|
|
})
|
2020-07-21 20:49:56 -04:00
|
|
|
return
|
|
|
|
}
|
2021-04-03 12:03:42 -04:00
|
|
|
gr, err := objectAPI.GetObjectNInfo(ctx, bucket, object, nil, http.Header{}, writeLock, ObjectOptions{
|
2020-09-16 19:04:55 -04:00
|
|
|
VersionID: objInfo.VersionID,
|
2020-09-15 23:44:48 -04:00
|
|
|
})
|
2020-07-21 20:49:56 -04:00
|
|
|
if err != nil {
|
2021-02-03 23:41:33 -05:00
|
|
|
sendEvent(eventArgs{
|
|
|
|
EventName: event.ObjectReplicationNotTracked,
|
|
|
|
BucketName: bucket,
|
|
|
|
Object: objInfo,
|
|
|
|
Host: "Internal: [Replication]",
|
|
|
|
})
|
2021-04-03 12:03:42 -04:00
|
|
|
logger.LogIf(ctx, fmt.Errorf("Unable to update replicate for %s/%s(%s): %w", bucket, object, objInfo.VersionID, err))
|
2020-07-21 20:49:56 -04:00
|
|
|
return
|
|
|
|
}
|
2021-04-19 13:30:42 -04:00
|
|
|
|
2021-04-03 12:03:42 -04:00
|
|
|
defer gr.Close() // hold write lock for entire transaction
|
2021-02-03 23:41:33 -05:00
|
|
|
|
2020-09-16 19:04:55 -04:00
|
|
|
objInfo = gr.ObjInfo
|
2020-07-21 20:49:56 -04:00
|
|
|
size, err := objInfo.GetActualSize()
|
|
|
|
if err != nil {
|
|
|
|
logger.LogIf(ctx, err)
|
2021-02-03 23:41:33 -05:00
|
|
|
sendEvent(eventArgs{
|
|
|
|
EventName: event.ObjectReplicationNotTracked,
|
|
|
|
BucketName: bucket,
|
|
|
|
Object: objInfo,
|
|
|
|
Host: "Internal: [Replication]",
|
|
|
|
})
|
2020-07-21 20:49:56 -04:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
dest := cfg.GetDestination()
|
|
|
|
if dest.Bucket == "" {
|
2021-02-03 23:41:33 -05:00
|
|
|
logger.LogIf(ctx, fmt.Errorf("Unable to replicate object %s(%s), bucket is empty", objInfo.Name, objInfo.VersionID))
|
|
|
|
sendEvent(eventArgs{
|
|
|
|
EventName: event.ObjectReplicationNotTracked,
|
|
|
|
BucketName: bucket,
|
|
|
|
Object: objInfo,
|
|
|
|
Host: "Internal: [Replication]",
|
|
|
|
})
|
2020-07-21 20:49:56 -04:00
|
|
|
return
|
|
|
|
}
|
2020-09-16 19:04:55 -04:00
|
|
|
|
2020-11-19 14:50:22 -05:00
|
|
|
rtype := replicateAll
|
2021-01-27 14:22:34 -05:00
|
|
|
oi, err := tgt.StatObject(ctx, dest.Bucket, object, miniogo.StatObjectOptions{
|
|
|
|
VersionID: objInfo.VersionID,
|
|
|
|
Internal: miniogo.AdvancedGetOptions{
|
|
|
|
ReplicationProxyRequest: "false",
|
|
|
|
}})
|
2020-11-19 14:50:22 -05:00
|
|
|
if err == nil {
|
|
|
|
rtype = getReplicationAction(objInfo, oi)
|
|
|
|
if rtype == replicateNone {
|
2020-07-21 20:49:56 -04:00
|
|
|
// object with same VersionID already exists, replication kicked off by
|
2021-04-03 12:03:42 -04:00
|
|
|
// PutObject might have completed
|
2021-04-29 19:46:26 -04:00
|
|
|
if objInfo.ReplicationStatus == replication.Pending || objInfo.ReplicationStatus == replication.Failed {
|
|
|
|
// if metadata is not updated for some reason after replication, such as 503 encountered while updating metadata - make sure
|
|
|
|
// to set ReplicationStatus as Completed.Note that replication Stats would have been updated despite metadata update failure.
|
|
|
|
z, ok := objectAPI.(*erasureServerPools)
|
|
|
|
if !ok {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
// This lower level implementation is necessary to avoid write locks from CopyObject.
|
|
|
|
poolIdx, err := z.getPoolIdx(ctx, bucket, object, objInfo.Size)
|
|
|
|
if err != nil {
|
|
|
|
logger.LogIf(ctx, fmt.Errorf("Unable to update replication metadata for %s/%s(%s): %w", bucket, objInfo.Name, objInfo.VersionID, err))
|
|
|
|
} else {
|
|
|
|
fi := FileInfo{}
|
|
|
|
fi.VersionID = objInfo.VersionID
|
|
|
|
fi.Metadata = make(map[string]string, len(objInfo.UserDefined))
|
|
|
|
for k, v := range objInfo.UserDefined {
|
|
|
|
fi.Metadata[k] = v
|
|
|
|
}
|
|
|
|
fi.Metadata[xhttp.AmzBucketReplicationStatus] = replication.Completed.String()
|
|
|
|
if objInfo.UserTags != "" {
|
|
|
|
fi.Metadata[xhttp.AmzObjectTagging] = objInfo.UserTags
|
|
|
|
}
|
|
|
|
if err = z.serverPools[poolIdx].getHashedSet(object).updateObjectMeta(ctx, bucket, object, fi); err != nil {
|
|
|
|
logger.LogIf(ctx, fmt.Errorf("Unable to update replication metadata for %s/%s(%s): %w", bucket, objInfo.Name, objInfo.VersionID, err))
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2020-07-21 20:49:56 -04:00
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
2021-01-13 14:52:28 -05:00
|
|
|
replicationStatus := replication.Completed
|
2021-02-20 03:22:17 -05:00
|
|
|
// use core client to avoid doing multipart on PUT
|
|
|
|
c := &miniogo.Core{Client: tgt.Client}
|
2021-01-06 19:13:10 -05:00
|
|
|
if rtype != replicateAll {
|
2020-11-19 14:50:22 -05:00
|
|
|
// replicate metadata for object tagging/copy with metadata replacement
|
2021-02-10 20:25:04 -05:00
|
|
|
srcOpts := miniogo.CopySrcOptions{
|
|
|
|
Bucket: dest.Bucket,
|
|
|
|
Object: object,
|
2021-04-03 12:03:42 -04:00
|
|
|
VersionID: objInfo.VersionID,
|
|
|
|
}
|
2021-03-03 14:13:31 -05:00
|
|
|
dstOpts := miniogo.PutObjectOptions{
|
|
|
|
Internal: miniogo.AdvancedPutOptions{
|
|
|
|
SourceVersionID: objInfo.VersionID,
|
|
|
|
ReplicationRequest: true, // always set this to distinguish between `mc mirror` replication and serverside
|
|
|
|
}}
|
2021-02-10 20:25:04 -05:00
|
|
|
if _, err = c.CopyObject(ctx, dest.Bucket, object, dest.Bucket, object, getCopyObjMetadata(objInfo, dest), srcOpts, dstOpts); err != nil {
|
2021-01-06 19:13:10 -05:00
|
|
|
replicationStatus = replication.Failed
|
2021-02-09 18:11:43 -05:00
|
|
|
logger.LogIf(ctx, fmt.Errorf("Unable to replicate metadata for object %s/%s(%s): %s", bucket, objInfo.Name, objInfo.VersionID, err))
|
2021-01-06 19:13:10 -05:00
|
|
|
}
|
|
|
|
} else {
|
|
|
|
target, err := globalBucketMetadataSys.GetBucketTarget(bucket, cfg.RoleArn)
|
|
|
|
if err != nil {
|
2021-02-09 18:11:43 -05:00
|
|
|
logger.LogIf(ctx, fmt.Errorf("failed to get target for replication bucket:%s cfg:%s err:%s", bucket, cfg.RoleArn, err))
|
2021-02-03 23:41:33 -05:00
|
|
|
sendEvent(eventArgs{
|
|
|
|
EventName: event.ObjectReplicationNotTracked,
|
|
|
|
BucketName: bucket,
|
|
|
|
Object: objInfo,
|
|
|
|
Host: "Internal: [Replication]",
|
|
|
|
})
|
2021-01-06 19:13:10 -05:00
|
|
|
return
|
|
|
|
}
|
2020-11-25 14:24:50 -05:00
|
|
|
|
2021-02-08 19:19:05 -05:00
|
|
|
putOpts, err := putReplicationOpts(ctx, dest, objInfo)
|
|
|
|
if err != nil {
|
2021-02-08 21:12:28 -05:00
|
|
|
logger.LogIf(ctx, fmt.Errorf("failed to get target for replication bucket:%s cfg:%s err:%w", bucket, cfg.RoleArn, err))
|
|
|
|
sendEvent(eventArgs{
|
|
|
|
EventName: event.ObjectReplicationNotTracked,
|
|
|
|
BucketName: bucket,
|
|
|
|
Object: objInfo,
|
|
|
|
Host: "Internal: [Replication]",
|
|
|
|
})
|
2021-02-08 19:19:05 -05:00
|
|
|
return
|
|
|
|
}
|
2021-02-08 21:12:28 -05:00
|
|
|
|
2021-01-06 19:13:10 -05:00
|
|
|
// Setup bandwidth throttling
|
|
|
|
peers, _ := globalEndpoints.peers()
|
|
|
|
totalNodesCount := len(peers)
|
|
|
|
if totalNodesCount == 0 {
|
|
|
|
totalNodesCount = 1 // For standalone erasure coding
|
|
|
|
}
|
2021-04-05 19:07:53 -04:00
|
|
|
|
2021-01-06 19:13:10 -05:00
|
|
|
var headerSize int
|
|
|
|
for k, v := range putOpts.Header() {
|
|
|
|
headerSize += len(k) + len(v)
|
|
|
|
}
|
2021-01-08 13:12:26 -05:00
|
|
|
|
2021-04-05 19:07:53 -04:00
|
|
|
opts := &bandwidth.MonitorReaderOptions{
|
|
|
|
Bucket: objInfo.Bucket,
|
|
|
|
Object: objInfo.Name,
|
|
|
|
HeaderSize: headerSize,
|
|
|
|
BandwidthBytesPerSec: target.BandwidthLimit / int64(totalNodesCount),
|
|
|
|
ClusterBandwidth: target.BandwidthLimit,
|
|
|
|
}
|
|
|
|
|
|
|
|
r := bandwidth.NewMonitoredReader(ctx, globalBucketMonitor, gr, opts)
|
2021-02-20 03:22:17 -05:00
|
|
|
if _, err = c.PutObject(ctx, dest.Bucket, object, r, size, "", "", putOpts); err != nil {
|
2021-01-06 19:13:10 -05:00
|
|
|
replicationStatus = replication.Failed
|
2021-04-19 13:30:42 -04:00
|
|
|
logger.LogIf(ctx, fmt.Errorf("Unable to replicate for object %s/%s(%s): %s", bucket, objInfo.Name, objInfo.VersionID, err))
|
2021-01-06 19:13:10 -05:00
|
|
|
}
|
2020-07-21 20:49:56 -04:00
|
|
|
}
|
2021-01-25 17:04:41 -05:00
|
|
|
|
2021-04-03 12:03:42 -04:00
|
|
|
prevReplStatus := objInfo.ReplicationStatus
|
2020-07-21 20:49:56 -04:00
|
|
|
objInfo.UserDefined[xhttp.AmzBucketReplicationStatus] = replicationStatus.String()
|
|
|
|
if objInfo.UserTags != "" {
|
|
|
|
objInfo.UserDefined[xhttp.AmzObjectTagging] = objInfo.UserTags
|
|
|
|
}
|
2021-06-01 22:59:11 -04:00
|
|
|
if ri.OpType == replication.ExistingObjectReplicationType {
|
|
|
|
objInfo.UserDefined[xhttp.MinIOReplicationResetStatus] = fmt.Sprintf("%s;%s", UTCNow().Format(http.TimeFormat), ri.ResetID)
|
|
|
|
}
|
2020-09-16 19:04:55 -04:00
|
|
|
// FIXME: add support for missing replication events
|
|
|
|
// - event.ObjectReplicationMissedThreshold
|
|
|
|
// - event.ObjectReplicationReplicatedAfterThreshold
|
2020-11-16 01:16:41 -05:00
|
|
|
var eventName = event.ObjectReplicationComplete
|
2020-09-16 19:04:55 -04:00
|
|
|
if replicationStatus == replication.Failed {
|
2020-11-16 01:16:41 -05:00
|
|
|
eventName = event.ObjectReplicationFailed
|
2020-09-16 19:04:55 -04:00
|
|
|
}
|
2021-01-25 17:04:41 -05:00
|
|
|
|
2021-04-04 16:32:31 -04:00
|
|
|
z, ok := objectAPI.(*erasureServerPools)
|
|
|
|
if !ok {
|
|
|
|
return
|
|
|
|
}
|
2021-04-15 19:32:00 -04:00
|
|
|
// Leave metadata in `PENDING` state if inline replication fails to save iops
|
2021-06-01 22:59:11 -04:00
|
|
|
if ri.OpType == replication.HealReplicationType ||
|
|
|
|
replicationStatus == replication.Completed {
|
2021-04-15 19:32:00 -04:00
|
|
|
// This lower level implementation is necessary to avoid write locks from CopyObject.
|
|
|
|
poolIdx, err := z.getPoolIdx(ctx, bucket, object, objInfo.Size)
|
|
|
|
if err != nil {
|
2021-02-03 23:41:33 -05:00
|
|
|
logger.LogIf(ctx, fmt.Errorf("Unable to update replication metadata for %s/%s(%s): %w", bucket, objInfo.Name, objInfo.VersionID, err))
|
2021-04-15 19:32:00 -04:00
|
|
|
} else {
|
|
|
|
fi := FileInfo{}
|
|
|
|
fi.VersionID = objInfo.VersionID
|
|
|
|
fi.Metadata = make(map[string]string, len(objInfo.UserDefined))
|
|
|
|
for k, v := range objInfo.UserDefined {
|
|
|
|
fi.Metadata[k] = v
|
|
|
|
}
|
|
|
|
if err = z.serverPools[poolIdx].getHashedSet(object).updateObjectMeta(ctx, bucket, object, fi); err != nil {
|
|
|
|
logger.LogIf(ctx, fmt.Errorf("Unable to update replication metadata for %s/%s(%s): %w", bucket, objInfo.Name, objInfo.VersionID, err))
|
|
|
|
}
|
|
|
|
}
|
|
|
|
opType := replication.MetadataReplicationType
|
|
|
|
if rtype == replicateAll {
|
|
|
|
opType = replication.ObjectReplicationType
|
2021-02-03 23:41:33 -05:00
|
|
|
}
|
2021-04-15 19:32:00 -04:00
|
|
|
globalReplicationStats.Update(bucket, size, replicationStatus, prevReplStatus, opType)
|
|
|
|
sendEvent(eventArgs{
|
|
|
|
EventName: eventName,
|
|
|
|
BucketName: bucket,
|
|
|
|
Object: objInfo,
|
|
|
|
Host: "Internal: [Replication]",
|
|
|
|
})
|
2020-07-21 20:49:56 -04:00
|
|
|
}
|
2021-04-15 19:32:00 -04:00
|
|
|
// re-queue failures once more - keep a retry count to avoid flooding the queue if
|
|
|
|
// the target site is down. Leave it to scanner to catch up instead.
|
2021-04-23 19:52:57 -04:00
|
|
|
if replicationStatus != replication.Completed && ri.RetryCount < 1 {
|
2021-04-15 19:32:00 -04:00
|
|
|
ri.OpType = replication.HealReplicationType
|
|
|
|
ri.RetryCount++
|
2021-04-29 21:20:39 -04:00
|
|
|
globalReplicationPool.queueReplicaFailedTask(ri)
|
2021-04-03 12:03:42 -04:00
|
|
|
}
|
2020-07-21 20:49:56 -04:00
|
|
|
}
|
2020-08-12 20:32:24 -04:00
|
|
|
|
|
|
|
// filterReplicationStatusMetadata filters replication status metadata for COPY
|
|
|
|
func filterReplicationStatusMetadata(metadata map[string]string) map[string]string {
|
|
|
|
// Copy on write
|
|
|
|
dst := metadata
|
|
|
|
var copied bool
|
|
|
|
delKey := func(key string) {
|
|
|
|
if _, ok := metadata[key]; !ok {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
if !copied {
|
|
|
|
dst = make(map[string]string, len(metadata))
|
|
|
|
for k, v := range metadata {
|
|
|
|
dst[k] = v
|
|
|
|
}
|
|
|
|
copied = true
|
|
|
|
}
|
|
|
|
delete(dst, key)
|
|
|
|
}
|
|
|
|
|
|
|
|
delKey(xhttp.AmzBucketReplicationStatus)
|
|
|
|
return dst
|
|
|
|
}
|
2020-09-16 19:04:55 -04:00
|
|
|
|
2021-06-01 22:59:11 -04:00
|
|
|
// DeletedObjectReplicationInfo has info on deleted object
|
|
|
|
type DeletedObjectReplicationInfo struct {
|
2020-11-19 21:43:58 -05:00
|
|
|
DeletedObject
|
2021-06-01 22:59:11 -04:00
|
|
|
Bucket string
|
|
|
|
OpType replication.Type
|
|
|
|
ResetID string
|
2020-11-19 21:43:58 -05:00
|
|
|
}
|
|
|
|
|
2020-09-21 16:43:29 -04:00
|
|
|
var (
|
2021-04-03 12:03:42 -04:00
|
|
|
globalReplicationPool *ReplicationPool
|
|
|
|
globalReplicationStats *ReplicationStats
|
2020-09-21 16:43:29 -04:00
|
|
|
)
|
2020-09-16 19:04:55 -04:00
|
|
|
|
2021-03-09 05:56:42 -05:00
|
|
|
// ReplicationPool describes replication pool
|
|
|
|
type ReplicationPool struct {
|
2021-06-01 22:59:11 -04:00
|
|
|
objLayer ObjectLayer
|
|
|
|
ctx context.Context
|
|
|
|
mrfWorkerKillCh chan struct{}
|
|
|
|
workerKillCh chan struct{}
|
|
|
|
replicaCh chan ReplicateObjectInfo
|
|
|
|
replicaDeleteCh chan DeletedObjectReplicationInfo
|
|
|
|
mrfReplicaCh chan ReplicateObjectInfo
|
|
|
|
existingReplicaCh chan ReplicateObjectInfo
|
|
|
|
existingReplicaDeleteCh chan DeletedObjectReplicationInfo
|
|
|
|
workerSize int
|
|
|
|
mrfWorkerSize int
|
|
|
|
workerWg sync.WaitGroup
|
|
|
|
mrfWorkerWg sync.WaitGroup
|
|
|
|
once sync.Once
|
|
|
|
mu sync.Mutex
|
2021-03-09 05:56:42 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
// NewReplicationPool creates a pool of replication workers of specified size
|
2021-04-24 00:58:45 -04:00
|
|
|
func NewReplicationPool(ctx context.Context, o ObjectLayer, opts replicationPoolOpts) *ReplicationPool {
|
2021-03-09 05:56:42 -05:00
|
|
|
pool := &ReplicationPool{
|
2021-06-01 22:59:11 -04:00
|
|
|
replicaCh: make(chan ReplicateObjectInfo, 100000),
|
|
|
|
replicaDeleteCh: make(chan DeletedObjectReplicationInfo, 100000),
|
|
|
|
mrfReplicaCh: make(chan ReplicateObjectInfo, 100000),
|
|
|
|
workerKillCh: make(chan struct{}, opts.Workers),
|
|
|
|
mrfWorkerKillCh: make(chan struct{}, opts.FailedWorkers),
|
|
|
|
existingReplicaCh: make(chan ReplicateObjectInfo, 100000),
|
|
|
|
existingReplicaDeleteCh: make(chan DeletedObjectReplicationInfo, 100000),
|
|
|
|
ctx: ctx,
|
|
|
|
objLayer: o,
|
2021-04-03 12:03:42 -04:00
|
|
|
}
|
2021-05-28 16:28:37 -04:00
|
|
|
|
2021-04-24 00:58:45 -04:00
|
|
|
pool.ResizeWorkers(opts.Workers)
|
|
|
|
pool.ResizeFailedWorkers(opts.FailedWorkers)
|
2021-06-01 22:59:11 -04:00
|
|
|
go pool.AddExistingObjectReplicateWorker()
|
2021-03-09 05:56:42 -05:00
|
|
|
return pool
|
2020-09-16 19:04:55 -04:00
|
|
|
}
|
|
|
|
|
2021-04-03 12:03:42 -04:00
|
|
|
// AddMRFWorker adds a pending/failed replication worker to handle requests that could not be queued
|
|
|
|
// to the other workers
|
|
|
|
func (p *ReplicationPool) AddMRFWorker() {
|
|
|
|
for {
|
|
|
|
select {
|
|
|
|
case <-p.ctx.Done():
|
|
|
|
return
|
|
|
|
case oi, ok := <-p.mrfReplicaCh:
|
|
|
|
if !ok {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
replicateObject(p.ctx, oi, p.objLayer)
|
2021-05-28 16:28:37 -04:00
|
|
|
case <-p.mrfWorkerKillCh:
|
|
|
|
return
|
2021-04-03 12:03:42 -04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-03-09 05:56:42 -05:00
|
|
|
// AddWorker adds a replication worker to the pool
|
|
|
|
func (p *ReplicationPool) AddWorker() {
|
2021-04-24 00:58:45 -04:00
|
|
|
defer p.workerWg.Done()
|
2021-03-09 05:56:42 -05:00
|
|
|
for {
|
|
|
|
select {
|
|
|
|
case <-p.ctx.Done():
|
|
|
|
return
|
|
|
|
case oi, ok := <-p.replicaCh:
|
|
|
|
if !ok {
|
2020-09-16 19:04:55 -04:00
|
|
|
return
|
|
|
|
}
|
2021-03-09 05:56:42 -05:00
|
|
|
replicateObject(p.ctx, oi, p.objLayer)
|
|
|
|
case doi, ok := <-p.replicaDeleteCh:
|
|
|
|
if !ok {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
replicateDelete(p.ctx, doi, p.objLayer)
|
2021-04-24 00:58:45 -04:00
|
|
|
case <-p.workerKillCh:
|
2021-03-09 05:56:42 -05:00
|
|
|
return
|
2020-09-16 19:04:55 -04:00
|
|
|
}
|
2021-03-09 05:56:42 -05:00
|
|
|
}
|
|
|
|
|
2020-09-16 19:04:55 -04:00
|
|
|
}
|
2020-09-21 16:43:29 -04:00
|
|
|
|
2021-06-01 22:59:11 -04:00
|
|
|
// AddExistingObjectReplicateWorker adds a worker to queue existing objects that need to be sync'd
|
|
|
|
func (p *ReplicationPool) AddExistingObjectReplicateWorker() {
|
|
|
|
for {
|
|
|
|
select {
|
|
|
|
case <-p.ctx.Done():
|
|
|
|
return
|
|
|
|
case oi, ok := <-p.existingReplicaCh:
|
|
|
|
if !ok {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
replicateObject(p.ctx, oi, p.objLayer)
|
|
|
|
case doi, ok := <-p.existingReplicaDeleteCh:
|
|
|
|
if !ok {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
replicateDelete(p.ctx, doi, p.objLayer)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-04-24 00:58:45 -04:00
|
|
|
// ResizeWorkers sets replication workers pool to new size
|
|
|
|
func (p *ReplicationPool) ResizeWorkers(n int) {
|
2021-03-09 05:56:42 -05:00
|
|
|
p.mu.Lock()
|
|
|
|
defer p.mu.Unlock()
|
|
|
|
|
2021-04-24 00:58:45 -04:00
|
|
|
for p.workerSize < n {
|
|
|
|
p.workerSize++
|
|
|
|
p.workerWg.Add(1)
|
2021-03-09 05:56:42 -05:00
|
|
|
go p.AddWorker()
|
|
|
|
}
|
2021-04-24 00:58:45 -04:00
|
|
|
for p.workerSize > n {
|
|
|
|
p.workerSize--
|
|
|
|
go func() { p.workerKillCh <- struct{}{} }()
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// ResizeFailedWorkers sets replication failed workers pool size
|
|
|
|
func (p *ReplicationPool) ResizeFailedWorkers(n int) {
|
|
|
|
p.mu.Lock()
|
|
|
|
defer p.mu.Unlock()
|
|
|
|
|
|
|
|
for p.mrfWorkerSize < n {
|
|
|
|
p.mrfWorkerSize++
|
|
|
|
p.mrfWorkerWg.Add(1)
|
|
|
|
go p.AddMRFWorker()
|
|
|
|
}
|
|
|
|
for p.mrfWorkerSize > n {
|
|
|
|
p.mrfWorkerSize--
|
|
|
|
go func() { p.mrfWorkerKillCh <- struct{}{} }()
|
2021-03-09 05:56:42 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-04-29 21:20:39 -04:00
|
|
|
func (p *ReplicationPool) queueReplicaFailedTask(ri ReplicateObjectInfo) {
|
2021-03-09 05:56:42 -05:00
|
|
|
if p == nil {
|
2020-09-21 16:43:29 -04:00
|
|
|
return
|
|
|
|
}
|
2021-03-09 05:56:42 -05:00
|
|
|
select {
|
2021-04-29 21:20:39 -04:00
|
|
|
case <-GlobalContext.Done():
|
2021-04-16 17:09:25 -04:00
|
|
|
p.once.Do(func() {
|
|
|
|
close(p.replicaCh)
|
|
|
|
close(p.mrfReplicaCh)
|
2021-06-01 22:59:11 -04:00
|
|
|
close(p.existingReplicaCh)
|
2021-04-16 17:09:25 -04:00
|
|
|
})
|
2021-04-15 19:32:00 -04:00
|
|
|
case p.mrfReplicaCh <- ri:
|
2021-03-09 05:56:42 -05:00
|
|
|
default:
|
|
|
|
}
|
|
|
|
}
|
2020-09-21 16:43:29 -04:00
|
|
|
|
2021-04-29 21:20:39 -04:00
|
|
|
func (p *ReplicationPool) queueReplicaTask(ri ReplicateObjectInfo) {
|
|
|
|
if p == nil {
|
|
|
|
return
|
|
|
|
}
|
2021-06-01 22:59:11 -04:00
|
|
|
var ch chan ReplicateObjectInfo
|
|
|
|
switch ri.OpType {
|
|
|
|
case replication.ExistingObjectReplicationType:
|
|
|
|
ch = p.existingReplicaCh
|
|
|
|
default:
|
|
|
|
ch = p.replicaCh
|
|
|
|
}
|
2021-04-29 21:20:39 -04:00
|
|
|
select {
|
|
|
|
case <-GlobalContext.Done():
|
|
|
|
p.once.Do(func() {
|
|
|
|
close(p.replicaCh)
|
|
|
|
close(p.mrfReplicaCh)
|
2021-06-01 22:59:11 -04:00
|
|
|
close(p.existingReplicaCh)
|
2021-04-29 21:20:39 -04:00
|
|
|
})
|
2021-06-01 22:59:11 -04:00
|
|
|
case ch <- ri:
|
2021-04-29 21:20:39 -04:00
|
|
|
default:
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-06-01 22:59:11 -04:00
|
|
|
func (p *ReplicationPool) queueReplicaDeleteTask(doi DeletedObjectReplicationInfo) {
|
2021-03-09 05:56:42 -05:00
|
|
|
if p == nil {
|
|
|
|
return
|
2020-09-21 16:43:29 -04:00
|
|
|
}
|
2021-06-01 22:59:11 -04:00
|
|
|
var ch chan DeletedObjectReplicationInfo
|
|
|
|
switch doi.OpType {
|
|
|
|
case replication.ExistingObjectReplicationType:
|
|
|
|
ch = p.existingReplicaDeleteCh
|
|
|
|
default:
|
|
|
|
ch = p.replicaDeleteCh
|
|
|
|
}
|
|
|
|
|
2021-03-09 05:56:42 -05:00
|
|
|
select {
|
2021-04-29 21:20:39 -04:00
|
|
|
case <-GlobalContext.Done():
|
2021-04-16 17:09:25 -04:00
|
|
|
p.once.Do(func() {
|
|
|
|
close(p.replicaDeleteCh)
|
2021-06-01 22:59:11 -04:00
|
|
|
close(p.existingReplicaDeleteCh)
|
2021-04-16 17:09:25 -04:00
|
|
|
})
|
2021-06-01 22:59:11 -04:00
|
|
|
case ch <- doi:
|
2021-03-09 05:56:42 -05:00
|
|
|
default:
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-04-24 00:58:45 -04:00
|
|
|
type replicationPoolOpts struct {
|
|
|
|
Workers int
|
|
|
|
FailedWorkers int
|
|
|
|
}
|
|
|
|
|
2021-03-09 05:56:42 -05:00
|
|
|
func initBackgroundReplication(ctx context.Context, objectAPI ObjectLayer) {
|
2021-04-24 00:58:45 -04:00
|
|
|
globalReplicationPool = NewReplicationPool(ctx, objectAPI, replicationPoolOpts{
|
|
|
|
Workers: globalAPIConfig.getReplicationWorkers(),
|
|
|
|
FailedWorkers: globalAPIConfig.getReplicationFailedWorkers(),
|
|
|
|
})
|
2021-04-03 12:03:42 -04:00
|
|
|
globalReplicationStats = NewReplicationStats(ctx, objectAPI)
|
2020-09-21 16:43:29 -04:00
|
|
|
}
|
2021-01-12 01:36:51 -05:00
|
|
|
|
|
|
|
// get Reader from replication target if active-active replication is in place and
|
|
|
|
// this node returns a 404
|
|
|
|
func proxyGetToReplicationTarget(ctx context.Context, bucket, object string, rs *HTTPRangeSpec, h http.Header, opts ObjectOptions) (gr *GetObjectReader, proxy bool) {
|
|
|
|
tgt, oi, proxy, err := proxyHeadToRepTarget(ctx, bucket, object, opts)
|
|
|
|
if !proxy || err != nil {
|
|
|
|
return nil, false
|
|
|
|
}
|
|
|
|
fn, off, length, err := NewGetObjectReader(rs, oi, opts)
|
|
|
|
if err != nil {
|
|
|
|
return nil, false
|
|
|
|
}
|
|
|
|
gopts := miniogo.GetObjectOptions{
|
|
|
|
VersionID: opts.VersionID,
|
|
|
|
ServerSideEncryption: opts.ServerSideEncryption,
|
|
|
|
Internal: miniogo.AdvancedGetOptions{
|
2021-01-27 14:22:34 -05:00
|
|
|
ReplicationProxyRequest: "true",
|
2021-01-12 01:36:51 -05:00
|
|
|
},
|
|
|
|
}
|
|
|
|
// get correct offsets for encrypted object
|
|
|
|
if off >= 0 && length >= 0 {
|
|
|
|
if err := gopts.SetRange(off, off+length-1); err != nil {
|
|
|
|
return nil, false
|
|
|
|
}
|
|
|
|
}
|
2021-02-03 23:41:33 -05:00
|
|
|
// Make sure to match ETag when proxying.
|
|
|
|
if err = gopts.SetMatchETag(oi.ETag); err != nil {
|
|
|
|
return nil, false
|
|
|
|
}
|
2021-01-12 01:36:51 -05:00
|
|
|
c := miniogo.Core{Client: tgt.Client}
|
|
|
|
obj, _, _, err := c.GetObject(ctx, bucket, object, gopts)
|
|
|
|
if err != nil {
|
|
|
|
return nil, false
|
|
|
|
}
|
|
|
|
closeReader := func() { obj.Close() }
|
|
|
|
|
|
|
|
reader, err := fn(obj, h, opts.CheckPrecondFn, closeReader)
|
|
|
|
if err != nil {
|
|
|
|
return nil, false
|
|
|
|
}
|
2021-02-10 20:25:04 -05:00
|
|
|
reader.ObjInfo = oi.Clone()
|
2021-01-12 01:36:51 -05:00
|
|
|
return reader, true
|
|
|
|
}
|
|
|
|
|
|
|
|
// isProxyable returns true if replication config found for this bucket
|
|
|
|
func isProxyable(ctx context.Context, bucket string) bool {
|
|
|
|
cfg, err := getReplicationConfig(ctx, bucket)
|
|
|
|
if err != nil {
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
dest := cfg.GetDestination()
|
|
|
|
return dest.Bucket == bucket
|
|
|
|
}
|
2021-01-27 14:22:34 -05:00
|
|
|
|
2021-01-12 01:36:51 -05:00
|
|
|
func proxyHeadToRepTarget(ctx context.Context, bucket, object string, opts ObjectOptions) (tgt *TargetClient, oi ObjectInfo, proxy bool, err error) {
|
|
|
|
// this option is set when active-active replication is in place between site A -> B,
|
|
|
|
// and site B does not have the object yet.
|
2021-01-27 14:22:34 -05:00
|
|
|
if opts.ProxyRequest || (opts.ProxyHeaderSet && !opts.ProxyRequest) { // true only when site B sets MinIOSourceProxyRequest header
|
2021-01-12 01:36:51 -05:00
|
|
|
return nil, oi, false, nil
|
|
|
|
}
|
|
|
|
cfg, err := getReplicationConfig(ctx, bucket)
|
|
|
|
if err != nil {
|
|
|
|
return nil, oi, false, err
|
|
|
|
}
|
|
|
|
dest := cfg.GetDestination()
|
|
|
|
if dest.Bucket != bucket { // not active-active
|
|
|
|
return nil, oi, false, err
|
|
|
|
}
|
|
|
|
ssec := false
|
|
|
|
if opts.ServerSideEncryption != nil {
|
|
|
|
ssec = opts.ServerSideEncryption.Type() == encrypt.SSEC
|
|
|
|
}
|
|
|
|
ropts := replication.ObjectOpts{
|
|
|
|
Name: object,
|
|
|
|
SSEC: ssec,
|
|
|
|
}
|
|
|
|
if !cfg.Replicate(ropts) { // no matching rule for object prefix
|
|
|
|
return nil, oi, false, nil
|
|
|
|
}
|
|
|
|
tgt = globalBucketTargetSys.GetRemoteTargetClient(ctx, cfg.RoleArn)
|
2021-04-29 19:41:28 -04:00
|
|
|
if tgt == nil {
|
2021-01-27 14:22:34 -05:00
|
|
|
return nil, oi, false, fmt.Errorf("target is offline or not configured")
|
2021-01-12 01:36:51 -05:00
|
|
|
}
|
2021-04-28 18:26:20 -04:00
|
|
|
// if proxying explicitly disabled on remote target
|
|
|
|
if tgt.disableProxy {
|
|
|
|
return nil, oi, false, nil
|
|
|
|
}
|
2021-01-12 01:36:51 -05:00
|
|
|
gopts := miniogo.GetObjectOptions{
|
|
|
|
VersionID: opts.VersionID,
|
|
|
|
ServerSideEncryption: opts.ServerSideEncryption,
|
|
|
|
Internal: miniogo.AdvancedGetOptions{
|
2021-01-27 14:22:34 -05:00
|
|
|
ReplicationProxyRequest: "true",
|
2021-01-12 01:36:51 -05:00
|
|
|
},
|
|
|
|
}
|
|
|
|
|
|
|
|
objInfo, err := tgt.StatObject(ctx, dest.Bucket, object, gopts)
|
|
|
|
if err != nil {
|
|
|
|
return nil, oi, false, err
|
|
|
|
}
|
2021-02-03 23:41:33 -05:00
|
|
|
|
2021-01-12 01:36:51 -05:00
|
|
|
tags, _ := tags.MapToObjectTags(objInfo.UserTags)
|
|
|
|
oi = ObjectInfo{
|
|
|
|
Bucket: bucket,
|
|
|
|
Name: object,
|
|
|
|
ModTime: objInfo.LastModified,
|
|
|
|
Size: objInfo.Size,
|
|
|
|
ETag: objInfo.ETag,
|
|
|
|
VersionID: objInfo.VersionID,
|
|
|
|
IsLatest: objInfo.IsLatest,
|
|
|
|
DeleteMarker: objInfo.IsDeleteMarker,
|
|
|
|
ContentType: objInfo.ContentType,
|
|
|
|
Expires: objInfo.Expires,
|
|
|
|
StorageClass: objInfo.StorageClass,
|
|
|
|
ReplicationStatus: replication.StatusType(objInfo.ReplicationStatus),
|
|
|
|
UserTags: tags.String(),
|
|
|
|
}
|
2021-02-08 01:01:10 -05:00
|
|
|
oi.UserDefined = make(map[string]string, len(objInfo.Metadata))
|
2021-02-03 23:41:33 -05:00
|
|
|
for k, v := range objInfo.Metadata {
|
|
|
|
oi.UserDefined[k] = v[0]
|
|
|
|
}
|
|
|
|
ce, ok := oi.UserDefined[xhttp.ContentEncoding]
|
|
|
|
if !ok {
|
|
|
|
ce, ok = oi.UserDefined[strings.ToLower(xhttp.ContentEncoding)]
|
|
|
|
}
|
|
|
|
if ok {
|
2021-01-12 01:36:51 -05:00
|
|
|
oi.ContentEncoding = ce
|
|
|
|
}
|
|
|
|
return tgt, oi, true, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// get object info from replication target if active-active replication is in place and
|
|
|
|
// this node returns a 404
|
|
|
|
func proxyHeadToReplicationTarget(ctx context.Context, bucket, object string, opts ObjectOptions) (oi ObjectInfo, proxy bool, err error) {
|
|
|
|
_, oi, proxy, err = proxyHeadToRepTarget(ctx, bucket, object, opts)
|
|
|
|
return oi, proxy, err
|
|
|
|
}
|
|
|
|
|
2021-04-03 12:03:42 -04:00
|
|
|
func scheduleReplication(ctx context.Context, objInfo ObjectInfo, o ObjectLayer, sync bool, opType replication.Type) {
|
2021-01-12 01:36:51 -05:00
|
|
|
if sync {
|
2021-04-15 19:32:00 -04:00
|
|
|
replicateObject(ctx, ReplicateObjectInfo{ObjectInfo: objInfo, OpType: opType}, o)
|
2021-01-12 01:36:51 -05:00
|
|
|
} else {
|
2021-04-29 21:20:39 -04:00
|
|
|
globalReplicationPool.queueReplicaTask(ReplicateObjectInfo{ObjectInfo: objInfo, OpType: opType})
|
2021-04-03 12:03:42 -04:00
|
|
|
}
|
|
|
|
if sz, err := objInfo.GetActualSize(); err == nil {
|
2021-04-04 18:34:33 -04:00
|
|
|
globalReplicationStats.Update(objInfo.Bucket, sz, objInfo.ReplicationStatus, replication.StatusType(""), opType)
|
2021-01-12 01:36:51 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-06-01 22:59:11 -04:00
|
|
|
func scheduleReplicationDelete(ctx context.Context, dv DeletedObjectReplicationInfo, o ObjectLayer, sync bool) {
|
2021-04-29 21:20:39 -04:00
|
|
|
globalReplicationPool.queueReplicaDeleteTask(dv)
|
2021-04-04 18:34:33 -04:00
|
|
|
globalReplicationStats.Update(dv.Bucket, 0, replication.Pending, replication.StatusType(""), replication.DeleteReplicationType)
|
2021-01-12 01:36:51 -05:00
|
|
|
}
|
2021-06-01 22:59:11 -04:00
|
|
|
|
|
|
|
type replicationConfig struct {
|
|
|
|
Config *replication.Config
|
|
|
|
ResetID string
|
|
|
|
ResetBeforeDate time.Time
|
|
|
|
}
|
|
|
|
|
|
|
|
func (c replicationConfig) Empty() bool {
|
|
|
|
return c.Config == nil
|
|
|
|
}
|
|
|
|
func (c replicationConfig) Replicate(opts replication.ObjectOpts) bool {
|
|
|
|
return c.Config.Replicate(opts)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Resync returns true if replication reset is requested
|
|
|
|
func (c replicationConfig) Resync(ctx context.Context, oi ObjectInfo) bool {
|
|
|
|
if c.Empty() {
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
// existing object replication does not apply to un-versioned objects
|
|
|
|
if oi.VersionID == "" || oi.VersionID == nullVersionID {
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
|
|
|
var replicate bool
|
|
|
|
if oi.DeleteMarker {
|
|
|
|
if c.Replicate(replication.ObjectOpts{
|
|
|
|
Name: oi.Name,
|
|
|
|
SSEC: crypto.SSEC.IsEncrypted(oi.UserDefined),
|
|
|
|
UserTags: oi.UserTags,
|
|
|
|
DeleteMarker: oi.DeleteMarker,
|
|
|
|
VersionID: oi.VersionID,
|
|
|
|
OpType: replication.DeleteReplicationType,
|
|
|
|
ExistingObject: true}) {
|
|
|
|
replicate = true
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
// Ignore previous replication status when deciding if object can be re-replicated
|
|
|
|
objInfo := oi.Clone()
|
|
|
|
objInfo.ReplicationStatus = replication.StatusType("")
|
|
|
|
replicate, _ = mustReplicater(ctx, oi.Bucket, oi.Name, getMustReplicateOptions(objInfo, replication.ExistingObjectReplicationType))
|
|
|
|
}
|
|
|
|
return c.resync(oi, replicate)
|
|
|
|
}
|
|
|
|
|
|
|
|
// wrapper function for testability. Returns true if a new reset is requested on
|
|
|
|
// already replicated objects OR object qualifies for existing object replication
|
|
|
|
// and no reset requested.
|
|
|
|
func (c replicationConfig) resync(oi ObjectInfo, replicate bool) bool {
|
|
|
|
if !replicate {
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
rs, ok := oi.UserDefined[xhttp.MinIOReplicationResetStatus]
|
|
|
|
if !ok { // existing object replication is enabled and object version is unreplicated so far.
|
|
|
|
if c.ResetID != "" && oi.ModTime.Before(c.ResetBeforeDate) { // trigger replication if `mc replicate reset` requested
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
return oi.ReplicationStatus != replication.Completed
|
|
|
|
}
|
|
|
|
if c.ResetID == "" || c.ResetBeforeDate.Equal(timeSentinel) { // no reset in progress
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
// if already replicated, return true if a new reset was requested.
|
|
|
|
splits := strings.SplitN(rs, ";", 2)
|
|
|
|
newReset := splits[1] != c.ResetID
|
|
|
|
if !newReset && oi.ReplicationStatus == replication.Completed {
|
|
|
|
// already replicated and no reset requested
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
return newReset && oi.ModTime.Before(c.ResetBeforeDate)
|
|
|
|
}
|