2016-05-02 19:57:31 -04:00
|
|
|
/*
|
|
|
|
* Minio Cloud Storage, (C) 2016 Minio, Inc.
|
|
|
|
*
|
|
|
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
* you may not use this file except in compliance with the License.
|
|
|
|
* You may obtain a copy of the License at
|
|
|
|
*
|
|
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
*
|
|
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
|
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
* See the License for the specific language governing permissions and
|
|
|
|
* limitations under the License.
|
|
|
|
*/
|
|
|
|
|
2016-08-18 19:23:42 -04:00
|
|
|
package cmd
|
2016-05-02 19:57:31 -04:00
|
|
|
|
|
|
|
import (
|
|
|
|
"crypto/md5"
|
|
|
|
"encoding/hex"
|
|
|
|
"fmt"
|
2016-10-02 18:51:49 -04:00
|
|
|
"hash"
|
2016-05-02 19:57:31 -04:00
|
|
|
"io"
|
2017-01-16 20:05:00 -05:00
|
|
|
"os"
|
|
|
|
pathutil "path"
|
2016-05-03 19:10:24 -04:00
|
|
|
"strings"
|
2016-05-20 23:48:47 -04:00
|
|
|
"time"
|
2016-12-19 22:32:55 -05:00
|
|
|
|
|
|
|
"github.com/minio/sha256-simd"
|
2016-05-02 19:57:31 -04:00
|
|
|
)
|
|
|
|
|
2017-01-16 20:05:00 -05:00
|
|
|
// listMultipartUploadIDs - list all the upload ids from a marker up to 'count'.
|
|
|
|
func (fs fsObjects) listMultipartUploadIDs(bucketName, objectName, uploadIDMarker string, count int) ([]uploadMetadata, bool, error) {
|
|
|
|
var uploads []uploadMetadata
|
|
|
|
|
|
|
|
// Hold the lock so that two parallel complete-multipart-uploads
|
|
|
|
// do not leave a stale uploads.json behind.
|
|
|
|
objectMPartPathLock := globalNSMutex.NewNSLock(minioMetaMultipartBucket, pathJoin(bucketName, objectName))
|
|
|
|
objectMPartPathLock.RLock()
|
|
|
|
defer objectMPartPathLock.RUnlock()
|
|
|
|
|
|
|
|
uploadsPath := pathJoin(bucketName, objectName, uploadsJSONFile)
|
|
|
|
rlk, err := fs.rwPool.Open(pathJoin(fs.fsPath, minioMetaMultipartBucket, uploadsPath))
|
|
|
|
if err != nil {
|
|
|
|
if err == errFileNotFound || err == errFileAccessDenied {
|
|
|
|
return nil, true, nil
|
|
|
|
}
|
|
|
|
return nil, false, traceError(err)
|
|
|
|
}
|
|
|
|
defer fs.rwPool.Close(pathJoin(fs.fsPath, minioMetaMultipartBucket, uploadsPath))
|
|
|
|
|
|
|
|
// Read `uploads.json`.
|
|
|
|
uploadIDs := uploadsV1{}
|
2017-01-25 15:29:06 -05:00
|
|
|
if _, err = uploadIDs.ReadFrom(rlk.LockedFile); err != nil {
|
2017-01-16 20:05:00 -05:00
|
|
|
return nil, false, err
|
|
|
|
}
|
|
|
|
|
|
|
|
index := 0
|
|
|
|
if uploadIDMarker != "" {
|
|
|
|
for ; index < len(uploadIDs.Uploads); index++ {
|
|
|
|
if uploadIDs.Uploads[index].UploadID == uploadIDMarker {
|
|
|
|
// Skip the uploadID as it would already be listed in previous listing.
|
|
|
|
index++
|
|
|
|
break
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
for index < len(uploadIDs.Uploads) {
|
|
|
|
uploads = append(uploads, uploadMetadata{
|
|
|
|
Object: objectName,
|
|
|
|
UploadID: uploadIDs.Uploads[index].UploadID,
|
|
|
|
Initiated: uploadIDs.Uploads[index].Initiated,
|
|
|
|
})
|
|
|
|
count--
|
|
|
|
index++
|
|
|
|
if count == 0 {
|
|
|
|
break
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
end := (index == len(uploadIDs.Uploads))
|
|
|
|
return uploads, end, nil
|
|
|
|
}
|
|
|
|
|
2016-05-30 19:51:59 -04:00
|
|
|
// listMultipartUploads - lists all multipart uploads.
|
|
|
|
func (fs fsObjects) listMultipartUploads(bucket, prefix, keyMarker, uploadIDMarker, delimiter string, maxUploads int) (ListMultipartsInfo, error) {
|
2016-05-03 19:10:24 -04:00
|
|
|
result := ListMultipartsInfo{}
|
|
|
|
recursive := true
|
|
|
|
if delimiter == slashSeparator {
|
|
|
|
recursive = false
|
|
|
|
}
|
|
|
|
|
|
|
|
result.IsTruncated = true
|
|
|
|
result.MaxUploads = maxUploads
|
2016-05-26 17:43:17 -04:00
|
|
|
result.KeyMarker = keyMarker
|
|
|
|
result.Prefix = prefix
|
|
|
|
result.Delimiter = delimiter
|
2016-05-03 19:10:24 -04:00
|
|
|
|
|
|
|
// Not using path.Join() as it strips off the trailing '/'.
|
2016-11-22 16:15:06 -05:00
|
|
|
multipartPrefixPath := pathJoin(bucket, prefix)
|
2016-05-17 14:44:32 -04:00
|
|
|
if prefix == "" {
|
|
|
|
// Should have a trailing "/" if prefix is ""
|
|
|
|
// For ex. multipartPrefixPath should be "multipart/bucket/" if prefix is ""
|
|
|
|
multipartPrefixPath += slashSeparator
|
|
|
|
}
|
2016-05-03 19:10:24 -04:00
|
|
|
multipartMarkerPath := ""
|
|
|
|
if keyMarker != "" {
|
2016-11-22 16:15:06 -05:00
|
|
|
multipartMarkerPath = pathJoin(bucket, keyMarker)
|
2016-05-03 19:10:24 -04:00
|
|
|
}
|
2017-01-16 20:05:00 -05:00
|
|
|
|
2016-05-26 17:43:17 -04:00
|
|
|
var uploads []uploadMetadata
|
|
|
|
var err error
|
|
|
|
var eof bool
|
2017-01-16 20:05:00 -05:00
|
|
|
|
2016-05-26 17:43:17 -04:00
|
|
|
if uploadIDMarker != "" {
|
2017-01-16 20:05:00 -05:00
|
|
|
uploads, _, err = fs.listMultipartUploadIDs(bucket, keyMarker, uploadIDMarker, maxUploads)
|
2016-05-26 17:43:17 -04:00
|
|
|
if err != nil {
|
|
|
|
return ListMultipartsInfo{}, err
|
|
|
|
}
|
|
|
|
maxUploads = maxUploads - len(uploads)
|
2016-05-03 19:10:24 -04:00
|
|
|
}
|
2017-01-16 20:05:00 -05:00
|
|
|
|
2016-07-07 12:06:35 -04:00
|
|
|
var walkResultCh chan treeWalkResult
|
|
|
|
var endWalkCh chan struct{}
|
2017-01-16 20:05:00 -05:00
|
|
|
|
|
|
|
// true only for xl.ListObjectsHeal(), set to false.
|
|
|
|
heal := false
|
|
|
|
|
|
|
|
// Proceed to list only if we have more uploads to be listed.
|
2016-05-26 17:43:17 -04:00
|
|
|
if maxUploads > 0 {
|
2017-01-16 20:05:00 -05:00
|
|
|
listPrms := listParams{minioMetaMultipartBucket, recursive, multipartMarkerPath, multipartPrefixPath, heal}
|
|
|
|
|
|
|
|
// Pop out any previously waiting marker.
|
|
|
|
walkResultCh, endWalkCh = fs.listPool.Release(listPrms)
|
2016-06-24 19:41:57 -04:00
|
|
|
if walkResultCh == nil {
|
|
|
|
endWalkCh = make(chan struct{})
|
2016-07-17 18:16:52 -04:00
|
|
|
isLeaf := fs.isMultipartUpload
|
2017-01-16 20:05:00 -05:00
|
|
|
listDir := fs.listDirFactory(isLeaf)
|
|
|
|
walkResultCh = startTreeWalk(minioMetaMultipartBucket, multipartPrefixPath,
|
|
|
|
multipartMarkerPath, recursive, listDir, isLeaf, endWalkCh)
|
2016-05-26 17:43:17 -04:00
|
|
|
}
|
2017-01-16 20:05:00 -05:00
|
|
|
|
|
|
|
// List until maxUploads requested.
|
2016-05-26 17:43:17 -04:00
|
|
|
for maxUploads > 0 {
|
2016-06-24 19:41:57 -04:00
|
|
|
walkResult, ok := <-walkResultCh
|
2016-05-26 17:43:17 -04:00
|
|
|
if !ok {
|
|
|
|
// Closed channel.
|
|
|
|
eof = true
|
|
|
|
break
|
|
|
|
}
|
2017-01-16 20:05:00 -05:00
|
|
|
|
2016-05-26 17:43:17 -04:00
|
|
|
// For any walk error return right away.
|
|
|
|
if walkResult.err != nil {
|
|
|
|
// File not found or Disk not found is a valid case.
|
2016-11-23 23:05:04 -05:00
|
|
|
if isErrIgnored(walkResult.err, fsTreeWalkIgnoredErrs...) {
|
2016-05-26 17:43:17 -04:00
|
|
|
eof = true
|
|
|
|
break
|
|
|
|
}
|
2016-08-25 12:39:01 -04:00
|
|
|
return ListMultipartsInfo{}, walkResult.err
|
2016-05-26 17:43:17 -04:00
|
|
|
}
|
2017-01-16 20:05:00 -05:00
|
|
|
|
2016-11-22 16:15:06 -05:00
|
|
|
entry := strings.TrimPrefix(walkResult.entry, retainSlash(bucket))
|
2016-05-26 17:43:17 -04:00
|
|
|
if strings.HasSuffix(walkResult.entry, slashSeparator) {
|
|
|
|
uploads = append(uploads, uploadMetadata{
|
|
|
|
Object: entry,
|
|
|
|
})
|
|
|
|
maxUploads--
|
|
|
|
if maxUploads == 0 {
|
|
|
|
if walkResult.end {
|
|
|
|
eof = true
|
|
|
|
break
|
|
|
|
}
|
|
|
|
}
|
|
|
|
continue
|
|
|
|
}
|
2017-01-16 20:05:00 -05:00
|
|
|
|
2016-05-26 17:43:17 -04:00
|
|
|
var tmpUploads []uploadMetadata
|
|
|
|
var end bool
|
|
|
|
uploadIDMarker = ""
|
2016-08-31 14:39:08 -04:00
|
|
|
|
2017-01-16 20:05:00 -05:00
|
|
|
tmpUploads, end, err = fs.listMultipartUploadIDs(bucket, entry, uploadIDMarker, maxUploads)
|
2016-05-26 17:43:17 -04:00
|
|
|
if err != nil {
|
|
|
|
return ListMultipartsInfo{}, err
|
|
|
|
}
|
2017-01-16 20:05:00 -05:00
|
|
|
|
2016-05-26 17:43:17 -04:00
|
|
|
uploads = append(uploads, tmpUploads...)
|
|
|
|
maxUploads -= len(tmpUploads)
|
|
|
|
if walkResult.end && end {
|
|
|
|
eof = true
|
|
|
|
break
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2017-01-16 20:05:00 -05:00
|
|
|
|
2016-05-26 17:43:17 -04:00
|
|
|
// Loop through all the received uploads fill in the multiparts result.
|
|
|
|
for _, upload := range uploads {
|
2016-05-03 19:10:24 -04:00
|
|
|
var objectName string
|
|
|
|
var uploadID string
|
2016-05-26 17:43:17 -04:00
|
|
|
if strings.HasSuffix(upload.Object, slashSeparator) {
|
2016-05-03 19:10:24 -04:00
|
|
|
// All directory entries are common prefixes.
|
|
|
|
uploadID = "" // Upload ids are empty for CommonPrefixes.
|
2016-05-26 17:43:17 -04:00
|
|
|
objectName = upload.Object
|
2016-05-03 19:10:24 -04:00
|
|
|
result.CommonPrefixes = append(result.CommonPrefixes, objectName)
|
|
|
|
} else {
|
2016-05-26 17:43:17 -04:00
|
|
|
uploadID = upload.UploadID
|
|
|
|
objectName = upload.Object
|
|
|
|
result.Uploads = append(result.Uploads, upload)
|
2016-05-03 19:10:24 -04:00
|
|
|
}
|
|
|
|
result.NextKeyMarker = objectName
|
|
|
|
result.NextUploadIDMarker = uploadID
|
|
|
|
}
|
2016-07-07 12:06:35 -04:00
|
|
|
|
|
|
|
if !eof {
|
|
|
|
// Save the go-routine state in the pool so that it can continue from where it left off on
|
|
|
|
// the next request.
|
2016-08-17 14:36:33 -04:00
|
|
|
fs.listPool.Set(listParams{bucket, recursive, result.NextKeyMarker, prefix, heal}, walkResultCh, endWalkCh)
|
2016-07-07 12:06:35 -04:00
|
|
|
}
|
|
|
|
|
2016-05-03 19:10:24 -04:00
|
|
|
result.IsTruncated = !eof
|
|
|
|
if !result.IsTruncated {
|
|
|
|
result.NextKeyMarker = ""
|
|
|
|
result.NextUploadIDMarker = ""
|
|
|
|
}
|
2017-01-16 20:05:00 -05:00
|
|
|
|
|
|
|
// Success.
|
2016-05-03 19:10:24 -04:00
|
|
|
return result, nil
|
|
|
|
}
|
|
|
|
|
2016-06-02 15:18:56 -04:00
|
|
|
// ListMultipartUploads - lists all the pending multipart uploads on a
|
|
|
|
// bucket. Additionally takes 'prefix, keyMarker, uploadIDmarker and a
|
|
|
|
// delimiter' which allows us to list uploads match a particular
|
|
|
|
// prefix or lexically starting from 'keyMarker' or delimiting the
|
|
|
|
// output to get a directory like listing.
|
|
|
|
//
|
|
|
|
// Implements S3 compatible ListMultipartUploads API. The resulting
|
|
|
|
// ListMultipartsInfo structure is unmarshalled directly into XML and
|
|
|
|
// replied back to the client.
|
2016-05-20 23:48:47 -04:00
|
|
|
func (fs fsObjects) ListMultipartUploads(bucket, prefix, keyMarker, uploadIDMarker, delimiter string, maxUploads int) (ListMultipartsInfo, error) {
|
2016-12-02 02:15:17 -05:00
|
|
|
if err := checkListMultipartArgs(bucket, prefix, keyMarker, uploadIDMarker, delimiter, fs); err != nil {
|
|
|
|
return ListMultipartsInfo{}, err
|
2016-06-02 15:18:56 -04:00
|
|
|
}
|
2017-01-16 20:05:00 -05:00
|
|
|
|
|
|
|
if _, err := fs.statBucketDir(bucket); err != nil {
|
|
|
|
return ListMultipartsInfo{}, toObjectErr(err, bucket)
|
|
|
|
}
|
|
|
|
|
2016-05-30 19:51:59 -04:00
|
|
|
return fs.listMultipartUploads(bucket, prefix, keyMarker, uploadIDMarker, delimiter, maxUploads)
|
2016-05-20 23:48:47 -04:00
|
|
|
}
|
|
|
|
|
2016-06-02 15:18:56 -04:00
|
|
|
// newMultipartUpload - wrapper for initializing a new multipart
|
|
|
|
// request, returns back a unique upload id.
|
|
|
|
//
|
|
|
|
// Internally this function creates 'uploads.json' associated for the
|
2016-09-06 23:31:50 -04:00
|
|
|
// incoming object at '.minio.sys/multipart/bucket/object/uploads.json' on
|
2016-06-02 15:18:56 -04:00
|
|
|
// all the disks. `uploads.json` carries metadata regarding on going
|
|
|
|
// multipart operation on the object.
|
|
|
|
func (fs fsObjects) newMultipartUpload(bucket string, object string, meta map[string]string) (uploadID string, err error) {
|
|
|
|
// Initialize `fs.json` values.
|
|
|
|
fsMeta := newFSMetaV1()
|
2016-08-17 16:26:08 -04:00
|
|
|
|
2016-11-11 19:36:07 -05:00
|
|
|
// Save additional metadata.
|
|
|
|
fsMeta.Meta = meta
|
2016-06-02 15:18:56 -04:00
|
|
|
|
2016-11-22 19:52:37 -05:00
|
|
|
uploadID = mustGetUUID()
|
2016-06-02 15:18:56 -04:00
|
|
|
initiated := time.Now().UTC()
|
2017-01-16 20:05:00 -05:00
|
|
|
|
2016-11-22 18:29:39 -05:00
|
|
|
// Add upload ID to uploads.json
|
2017-01-16 20:05:00 -05:00
|
|
|
uploadsPath := pathJoin(bucket, object, uploadsJSONFile)
|
|
|
|
rwlk, err := fs.rwPool.Create(pathJoin(fs.fsPath, minioMetaMultipartBucket, uploadsPath))
|
|
|
|
if err != nil {
|
|
|
|
return "", toObjectErr(traceError(err), bucket, object)
|
2016-06-02 15:18:56 -04:00
|
|
|
}
|
2017-01-16 20:05:00 -05:00
|
|
|
defer rwlk.Close()
|
|
|
|
|
|
|
|
uploadIDPath := pathJoin(bucket, object, uploadID)
|
|
|
|
fsMetaPath := pathJoin(fs.fsPath, minioMetaMultipartBucket, uploadIDPath, fsMetaJSONFile)
|
|
|
|
metaFile, err := fs.rwPool.Create(fsMetaPath)
|
|
|
|
if err != nil {
|
|
|
|
return "", toObjectErr(traceError(err), bucket, object)
|
|
|
|
}
|
|
|
|
defer metaFile.Close()
|
|
|
|
|
|
|
|
// Add a new upload id.
|
|
|
|
if err = fs.addUploadID(bucket, object, uploadID, initiated, rwlk); err != nil {
|
|
|
|
return "", toObjectErr(err, bucket, object)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Write all the set metadata.
|
|
|
|
if _, err = fsMeta.WriteTo(metaFile); err != nil {
|
|
|
|
return "", toObjectErr(err, bucket, object)
|
2016-06-02 15:18:56 -04:00
|
|
|
}
|
2017-01-16 20:05:00 -05:00
|
|
|
|
2016-06-02 15:18:56 -04:00
|
|
|
// Return success.
|
|
|
|
return uploadID, nil
|
2016-05-20 23:48:47 -04:00
|
|
|
}
|
|
|
|
|
2016-06-02 15:18:56 -04:00
|
|
|
// NewMultipartUpload - initialize a new multipart upload, returns a
|
|
|
|
// unique id. The unique id returned here is of UUID form, for each
|
|
|
|
// subsequent request each UUID is unique.
|
|
|
|
//
|
|
|
|
// Implements S3 compatible initiate multipart API.
|
|
|
|
func (fs fsObjects) NewMultipartUpload(bucket, object string, meta map[string]string) (string, error) {
|
2016-12-02 02:15:17 -05:00
|
|
|
if err := checkNewMultipartArgs(bucket, object, fs); err != nil {
|
|
|
|
return "", err
|
2016-05-20 23:48:47 -04:00
|
|
|
}
|
2017-01-16 20:05:00 -05:00
|
|
|
|
|
|
|
if _, err := fs.statBucketDir(bucket); err != nil {
|
|
|
|
return "", toObjectErr(err, bucket)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Hold the lock so that two parallel complete-multipart-uploads
|
|
|
|
// do not leave a stale uploads.json behind.
|
|
|
|
objectMPartPathLock := globalNSMutex.NewNSLock(minioMetaMultipartBucket, pathJoin(bucket, object))
|
|
|
|
objectMPartPathLock.Lock()
|
|
|
|
defer objectMPartPathLock.Unlock()
|
|
|
|
|
2016-06-02 15:18:56 -04:00
|
|
|
return fs.newMultipartUpload(bucket, object, meta)
|
|
|
|
}
|
2016-05-20 23:48:47 -04:00
|
|
|
|
2016-08-31 16:42:57 -04:00
|
|
|
// Returns if a new part can be appended to fsAppendDataFile.
|
|
|
|
func partToAppend(fsMeta fsMetaV1, fsAppendMeta fsMetaV1) (part objectPartInfo, appendNeeded bool) {
|
|
|
|
if len(fsMeta.Parts) == 0 {
|
|
|
|
return
|
|
|
|
}
|
2017-01-16 20:05:00 -05:00
|
|
|
|
2016-08-31 16:42:57 -04:00
|
|
|
// As fsAppendMeta.Parts will be sorted len(fsAppendMeta.Parts) will naturally be the next part number
|
|
|
|
nextPartNum := len(fsAppendMeta.Parts) + 1
|
|
|
|
nextPartIndex := fsMeta.ObjectPartIndex(nextPartNum)
|
|
|
|
if nextPartIndex == -1 {
|
|
|
|
return
|
|
|
|
}
|
2017-01-16 20:05:00 -05:00
|
|
|
|
2016-08-31 16:42:57 -04:00
|
|
|
return fsMeta.Parts[nextPartIndex], true
|
|
|
|
}
|
|
|
|
|
2016-06-02 18:19:13 -04:00
|
|
|
// PutObjectPart - reads incoming data until EOF for the part file on
|
2016-06-02 15:18:56 -04:00
|
|
|
// an ongoing multipart transaction. Internally incoming data is
|
2016-09-06 23:31:50 -04:00
|
|
|
// written to '.minio.sys/tmp' location and safely renamed to
|
|
|
|
// '.minio.sys/multipart' for reach parts.
|
2016-10-02 18:51:49 -04:00
|
|
|
func (fs fsObjects) PutObjectPart(bucket, object, uploadID string, partID int, size int64, data io.Reader, md5Hex string, sha256sum string) (string, error) {
|
2016-12-02 02:15:17 -05:00
|
|
|
if err := checkPutObjectPartArgs(bucket, object, fs); err != nil {
|
|
|
|
return "", err
|
2016-06-02 18:19:13 -04:00
|
|
|
}
|
|
|
|
|
2017-01-16 20:05:00 -05:00
|
|
|
if _, err := fs.statBucketDir(bucket); err != nil {
|
|
|
|
return "", toObjectErr(err, bucket)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Hold the lock so that two parallel complete-multipart-uploads
|
|
|
|
// do not leave a stale uploads.json behind.
|
|
|
|
objectMPartPathLock := globalNSMutex.NewNSLock(minioMetaMultipartBucket, pathJoin(bucket, object))
|
|
|
|
objectMPartPathLock.Lock()
|
|
|
|
defer objectMPartPathLock.Unlock()
|
|
|
|
|
|
|
|
// Disallow any parallel abort or complete multipart operations.
|
|
|
|
uploadsPath := pathJoin(fs.fsPath, minioMetaMultipartBucket, bucket, object, uploadsJSONFile)
|
|
|
|
if _, err := fs.rwPool.Open(uploadsPath); err != nil {
|
|
|
|
if err == errFileNotFound || err == errFileAccessDenied {
|
|
|
|
return "", traceError(InvalidUploadID{UploadID: uploadID})
|
|
|
|
}
|
|
|
|
return "", toObjectErr(traceError(err), bucket, object)
|
|
|
|
}
|
|
|
|
defer fs.rwPool.Close(uploadsPath)
|
|
|
|
|
|
|
|
uploadIDPath := pathJoin(bucket, object, uploadID)
|
2016-06-02 18:19:13 -04:00
|
|
|
|
|
|
|
// Just check if the uploadID exists to avoid copy if it doesn't.
|
2017-01-16 20:05:00 -05:00
|
|
|
fsMetaPath := pathJoin(fs.fsPath, minioMetaMultipartBucket, uploadIDPath, fsMetaJSONFile)
|
|
|
|
rwlk, err := fs.rwPool.Write(fsMetaPath)
|
|
|
|
if err != nil {
|
|
|
|
if err == errFileNotFound || err == errFileAccessDenied {
|
|
|
|
return "", traceError(InvalidUploadID{UploadID: uploadID})
|
|
|
|
}
|
|
|
|
return "", toObjectErr(traceError(err), bucket, object)
|
|
|
|
}
|
|
|
|
defer rwlk.Close()
|
|
|
|
|
|
|
|
fsMeta := fsMetaV1{}
|
2017-01-25 15:29:06 -05:00
|
|
|
_, err = fsMeta.ReadFrom(rwlk)
|
2017-01-16 20:05:00 -05:00
|
|
|
if err != nil {
|
|
|
|
return "", toObjectErr(err, minioMetaMultipartBucket, fsMetaPath)
|
2016-06-02 18:19:13 -04:00
|
|
|
}
|
|
|
|
|
2016-05-20 23:48:47 -04:00
|
|
|
partSuffix := fmt.Sprintf("object%d", partID)
|
2016-11-22 19:52:37 -05:00
|
|
|
tmpPartPath := uploadID + "." + mustGetUUID() + "." + partSuffix
|
2016-05-20 23:48:47 -04:00
|
|
|
|
|
|
|
// Initialize md5 writer.
|
|
|
|
md5Writer := md5.New()
|
2016-10-02 18:51:49 -04:00
|
|
|
hashWriters := []io.Writer{md5Writer}
|
|
|
|
|
|
|
|
var sha256Writer hash.Hash
|
|
|
|
if sha256sum != "" {
|
|
|
|
sha256Writer = sha256.New()
|
|
|
|
hashWriters = append(hashWriters, sha256Writer)
|
|
|
|
}
|
|
|
|
multiWriter := io.MultiWriter(hashWriters...)
|
2017-01-16 20:05:00 -05:00
|
|
|
|
2016-07-05 04:04:50 -04:00
|
|
|
// Limit the reader to its provided size if specified.
|
|
|
|
var limitDataReader io.Reader
|
|
|
|
if size > 0 {
|
|
|
|
// This is done so that we can avoid erroneous clients sending more data than the set content size.
|
|
|
|
limitDataReader = io.LimitReader(data, size)
|
|
|
|
} else {
|
|
|
|
// else we read till EOF.
|
|
|
|
limitDataReader = data
|
|
|
|
}
|
|
|
|
|
2016-10-02 18:51:49 -04:00
|
|
|
teeReader := io.TeeReader(limitDataReader, multiWriter)
|
2016-07-05 23:59:54 -04:00
|
|
|
bufSize := int64(readSizeV1)
|
|
|
|
if size > 0 && bufSize > size {
|
|
|
|
bufSize = size
|
|
|
|
}
|
2016-07-18 22:06:48 -04:00
|
|
|
buf := make([]byte, int(bufSize))
|
2016-10-29 15:44:44 -04:00
|
|
|
|
2017-01-16 20:05:00 -05:00
|
|
|
fsPartPath := pathJoin(fs.fsPath, minioMetaTmpBucket, fs.fsUUID, tmpPartPath)
|
|
|
|
bytesWritten, cErr := fsCreateFile(fsPartPath, teeReader, buf, size)
|
2016-07-18 22:06:48 -04:00
|
|
|
if cErr != nil {
|
2017-01-16 20:05:00 -05:00
|
|
|
fsRemoveFile(fsPartPath)
|
2016-11-20 17:25:43 -05:00
|
|
|
return "", toObjectErr(cErr, minioMetaTmpBucket, tmpPartPath)
|
2016-07-18 22:06:48 -04:00
|
|
|
}
|
2016-12-03 14:53:12 -05:00
|
|
|
|
2016-07-18 22:06:48 -04:00
|
|
|
// Should return IncompleteBody{} error when reader has fewer
|
|
|
|
// bytes than specified in request header.
|
|
|
|
if bytesWritten < size {
|
2017-01-16 20:05:00 -05:00
|
|
|
fsRemoveFile(fsPartPath)
|
2016-08-25 12:39:01 -04:00
|
|
|
return "", traceError(IncompleteBody{})
|
2016-05-20 23:48:47 -04:00
|
|
|
}
|
|
|
|
|
2016-10-20 01:52:03 -04:00
|
|
|
// Delete temporary part in case of failure. If
|
|
|
|
// PutObjectPart succeeds then there would be nothing to
|
|
|
|
// delete.
|
2017-01-16 20:05:00 -05:00
|
|
|
defer fsRemoveFile(fsPartPath)
|
2016-10-20 01:52:03 -04:00
|
|
|
|
2016-05-20 23:48:47 -04:00
|
|
|
newMD5Hex := hex.EncodeToString(md5Writer.Sum(nil))
|
|
|
|
if md5Hex != "" {
|
|
|
|
if newMD5Hex != md5Hex {
|
2016-08-25 12:39:01 -04:00
|
|
|
return "", traceError(BadDigest{md5Hex, newMD5Hex})
|
2016-05-20 23:48:47 -04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-10-02 18:51:49 -04:00
|
|
|
if sha256sum != "" {
|
|
|
|
newSHA256sum := hex.EncodeToString(sha256Writer.Sum(nil))
|
|
|
|
if newSHA256sum != sha256sum {
|
|
|
|
return "", traceError(SHA256Mismatch{})
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2017-01-16 20:05:00 -05:00
|
|
|
partPath := pathJoin(bucket, object, uploadID, partSuffix)
|
2016-11-23 15:50:09 -05:00
|
|
|
// Lock the part so that another part upload with same part-number gets blocked
|
|
|
|
// while the part is getting appended in the background.
|
2016-12-10 19:15:12 -05:00
|
|
|
partLock := globalNSMutex.NewNSLock(minioMetaMultipartBucket, partPath)
|
2016-11-23 15:50:09 -05:00
|
|
|
partLock.Lock()
|
2017-01-16 20:05:00 -05:00
|
|
|
|
|
|
|
fsNSPartPath := pathJoin(fs.fsPath, minioMetaMultipartBucket, partPath)
|
|
|
|
if err = fsRenameFile(fsPartPath, fsNSPartPath); err != nil {
|
2016-11-23 15:50:09 -05:00
|
|
|
partLock.Unlock()
|
2017-01-16 20:05:00 -05:00
|
|
|
return "", toObjectErr(err, minioMetaMultipartBucket, partPath)
|
2016-05-20 23:48:47 -04:00
|
|
|
}
|
2017-01-16 20:05:00 -05:00
|
|
|
|
|
|
|
// Save the object part info in `fs.json`.
|
|
|
|
fsMeta.AddObjectPart(partID, partSuffix, newMD5Hex, size)
|
|
|
|
if _, err = fsMeta.WriteTo(rwlk); err != nil {
|
2016-11-23 15:50:09 -05:00
|
|
|
partLock.Unlock()
|
2016-11-22 16:15:06 -05:00
|
|
|
return "", toObjectErr(err, minioMetaMultipartBucket, uploadIDPath)
|
2016-05-20 23:48:47 -04:00
|
|
|
}
|
2016-11-21 02:42:53 -05:00
|
|
|
|
2016-12-09 19:10:18 -05:00
|
|
|
// Append the part in background.
|
2017-01-16 20:05:00 -05:00
|
|
|
errCh := fs.append(bucket, object, uploadID, fsMeta)
|
2016-11-23 15:50:09 -05:00
|
|
|
go func() {
|
2017-01-16 20:05:00 -05:00
|
|
|
// Also receive the error so that the appendParts go-routine
|
|
|
|
// does not block on send. But the error received is ignored
|
|
|
|
// as fs.PutObjectPart() would have already returned success
|
|
|
|
// to the client.
|
2016-11-23 15:50:09 -05:00
|
|
|
<-errCh
|
|
|
|
partLock.Unlock()
|
|
|
|
}()
|
2016-11-21 02:42:53 -05:00
|
|
|
|
2016-05-20 23:48:47 -04:00
|
|
|
return newMD5Hex, nil
|
|
|
|
}
|
|
|
|
|
2016-06-02 15:18:56 -04:00
|
|
|
// listObjectParts - wrapper scanning through
|
2016-09-06 23:31:50 -04:00
|
|
|
// '.minio.sys/multipart/bucket/object/UPLOADID'. Lists all the parts
|
|
|
|
// saved inside '.minio.sys/multipart/bucket/object/UPLOADID'.
|
2016-06-02 15:18:56 -04:00
|
|
|
func (fs fsObjects) listObjectParts(bucket, object, uploadID string, partNumberMarker, maxParts int) (ListPartsInfo, error) {
|
2016-05-03 19:10:24 -04:00
|
|
|
result := ListPartsInfo{}
|
2016-05-20 23:48:47 -04:00
|
|
|
|
2017-01-16 20:05:00 -05:00
|
|
|
uploadIDPath := pathJoin(bucket, object, uploadID)
|
|
|
|
fsMetaPath := pathJoin(fs.fsPath, minioMetaMultipartBucket, uploadIDPath, fsMetaJSONFile)
|
|
|
|
metaFile, err := fs.rwPool.Open(fsMetaPath)
|
|
|
|
if err != nil {
|
|
|
|
if err == errFileNotFound || err == errFileAccessDenied {
|
|
|
|
// On windows oddly this is returned.
|
|
|
|
return ListPartsInfo{}, traceError(InvalidUploadID{UploadID: uploadID})
|
|
|
|
}
|
|
|
|
return ListPartsInfo{}, toObjectErr(traceError(err), bucket, object)
|
|
|
|
}
|
|
|
|
defer fs.rwPool.Close(fsMetaPath)
|
|
|
|
|
|
|
|
fsMeta := fsMetaV1{}
|
2017-01-25 15:29:06 -05:00
|
|
|
_, err = fsMeta.ReadFrom(metaFile.LockedFile)
|
2016-05-03 19:10:24 -04:00
|
|
|
if err != nil {
|
2016-08-31 16:42:57 -04:00
|
|
|
return ListPartsInfo{}, toObjectErr(err, minioMetaBucket, fsMetaPath)
|
2016-05-05 15:51:56 -04:00
|
|
|
}
|
2017-01-16 20:05:00 -05:00
|
|
|
|
2016-05-20 23:48:47 -04:00
|
|
|
// Only parts with higher part numbers will be listed.
|
2016-05-26 06:15:01 -04:00
|
|
|
partIdx := fsMeta.ObjectPartIndex(partNumberMarker)
|
2016-05-25 00:24:20 -04:00
|
|
|
parts := fsMeta.Parts
|
|
|
|
if partIdx != -1 {
|
|
|
|
parts = fsMeta.Parts[partIdx+1:]
|
|
|
|
}
|
2017-01-16 20:05:00 -05:00
|
|
|
|
2016-05-05 15:51:56 -04:00
|
|
|
count := maxParts
|
2016-05-25 00:24:20 -04:00
|
|
|
for _, part := range parts {
|
2017-01-16 20:05:00 -05:00
|
|
|
var fi os.FileInfo
|
|
|
|
partNamePath := pathJoin(fs.fsPath, minioMetaMultipartBucket, uploadIDPath, part.Name)
|
|
|
|
fi, err = fsStatFile(partNamePath)
|
2016-05-03 19:10:24 -04:00
|
|
|
if err != nil {
|
2016-11-22 16:15:06 -05:00
|
|
|
return ListPartsInfo{}, toObjectErr(traceError(err), minioMetaMultipartBucket, partNamePath)
|
2016-05-03 19:10:24 -04:00
|
|
|
}
|
|
|
|
result.Parts = append(result.Parts, partInfo{
|
2016-05-25 00:24:20 -04:00
|
|
|
PartNumber: part.Number,
|
2016-05-20 23:48:47 -04:00
|
|
|
ETag: part.ETag,
|
2017-01-16 20:05:00 -05:00
|
|
|
LastModified: fi.ModTime(),
|
|
|
|
Size: fi.Size(),
|
2016-05-03 19:10:24 -04:00
|
|
|
})
|
2016-05-05 15:51:56 -04:00
|
|
|
count--
|
|
|
|
if count == 0 {
|
|
|
|
break
|
|
|
|
}
|
|
|
|
}
|
2017-01-16 20:05:00 -05:00
|
|
|
|
2016-05-08 05:21:12 -04:00
|
|
|
// If listed entries are more than maxParts, we set IsTruncated as true.
|
2016-05-20 23:48:47 -04:00
|
|
|
if len(parts) > len(result.Parts) {
|
2016-05-05 15:51:56 -04:00
|
|
|
result.IsTruncated = true
|
2016-05-08 05:21:12 -04:00
|
|
|
// Make sure to fill next part number marker if IsTruncated is
|
|
|
|
// true for subsequent listing.
|
|
|
|
nextPartNumberMarker := result.Parts[len(result.Parts)-1].PartNumber
|
|
|
|
result.NextPartNumberMarker = nextPartNumberMarker
|
2016-05-03 19:10:24 -04:00
|
|
|
}
|
|
|
|
result.Bucket = bucket
|
|
|
|
result.Object = object
|
|
|
|
result.UploadID = uploadID
|
|
|
|
result.MaxParts = maxParts
|
2017-01-16 20:05:00 -05:00
|
|
|
|
|
|
|
// Success.
|
2016-05-03 19:10:24 -04:00
|
|
|
return result, nil
|
|
|
|
}
|
|
|
|
|
2016-06-02 15:18:56 -04:00
|
|
|
// ListObjectParts - lists all previously uploaded parts for a given
|
|
|
|
// object and uploadID. Takes additional input of part-number-marker
|
|
|
|
// to indicate where the listing should begin from.
|
|
|
|
//
|
|
|
|
// Implements S3 compatible ListObjectParts API. The resulting
|
|
|
|
// ListPartsInfo structure is unmarshalled directly into XML and
|
|
|
|
// replied back to the client.
|
2016-05-20 23:48:47 -04:00
|
|
|
func (fs fsObjects) ListObjectParts(bucket, object, uploadID string, partNumberMarker, maxParts int) (ListPartsInfo, error) {
|
2016-12-02 02:15:17 -05:00
|
|
|
if err := checkListPartsArgs(bucket, object, fs); err != nil {
|
|
|
|
return ListPartsInfo{}, err
|
2016-06-02 15:18:56 -04:00
|
|
|
}
|
2016-08-31 14:39:08 -04:00
|
|
|
|
2017-01-16 20:05:00 -05:00
|
|
|
if _, err := fs.statBucketDir(bucket); err != nil {
|
|
|
|
return ListPartsInfo{}, toObjectErr(err, bucket)
|
2016-05-03 19:10:24 -04:00
|
|
|
}
|
2016-05-20 23:48:47 -04:00
|
|
|
|
2017-01-16 20:05:00 -05:00
|
|
|
// Hold the lock so that two parallel complete-multipart-uploads
|
|
|
|
// do not leave a stale uploads.json behind.
|
|
|
|
objectMPartPathLock := globalNSMutex.NewNSLock(minioMetaMultipartBucket, pathJoin(bucket, object))
|
|
|
|
objectMPartPathLock.RLock()
|
|
|
|
defer objectMPartPathLock.RUnlock()
|
|
|
|
|
|
|
|
listPartsInfo, err := fs.listObjectParts(bucket, object, uploadID, partNumberMarker, maxParts)
|
|
|
|
if err != nil {
|
|
|
|
return ListPartsInfo{}, toObjectErr(err, bucket, object)
|
2016-10-29 15:44:44 -04:00
|
|
|
}
|
2017-01-16 20:05:00 -05:00
|
|
|
|
|
|
|
// Success.
|
|
|
|
return listPartsInfo, nil
|
2016-10-29 15:44:44 -04:00
|
|
|
}
|
|
|
|
|
2016-06-02 15:18:56 -04:00
|
|
|
// CompleteMultipartUpload - completes an ongoing multipart
|
|
|
|
// transaction after receiving all the parts indicated by the client.
|
|
|
|
// Returns an md5sum calculated by concatenating all the individual
|
|
|
|
// md5sums of all the parts.
|
|
|
|
//
|
|
|
|
// Implements S3 compatible Complete multipart API.
|
2017-01-16 22:23:43 -05:00
|
|
|
func (fs fsObjects) CompleteMultipartUpload(bucket string, object string, uploadID string, parts []completePart) (ObjectInfo, error) {
|
2016-12-02 02:15:17 -05:00
|
|
|
if err := checkCompleteMultipartArgs(bucket, object, fs); err != nil {
|
2017-01-16 22:23:43 -05:00
|
|
|
return ObjectInfo{}, err
|
2016-05-20 23:48:47 -04:00
|
|
|
}
|
2016-06-02 15:18:56 -04:00
|
|
|
|
2017-01-16 20:05:00 -05:00
|
|
|
if _, err := fs.statBucketDir(bucket); err != nil {
|
2017-01-16 22:23:43 -05:00
|
|
|
return ObjectInfo{}, toObjectErr(err, bucket)
|
2016-05-20 23:48:47 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
// Calculate s3 compatible md5sum for complete multipart.
|
2016-11-10 10:41:02 -05:00
|
|
|
s3MD5, err := getCompleteMultipartMD5(parts)
|
2016-05-20 23:48:47 -04:00
|
|
|
if err != nil {
|
2017-01-16 22:23:43 -05:00
|
|
|
return ObjectInfo{}, err
|
2016-05-20 23:48:47 -04:00
|
|
|
}
|
|
|
|
|
2017-01-16 20:05:00 -05:00
|
|
|
uploadIDPath := pathJoin(bucket, object, uploadID)
|
|
|
|
|
|
|
|
// Hold the lock so that two parallel complete-multipart-uploads
|
|
|
|
// do not leave a stale uploads.json behind.
|
|
|
|
objectMPartPathLock := globalNSMutex.NewNSLock(minioMetaMultipartBucket, pathJoin(bucket, object))
|
|
|
|
objectMPartPathLock.Lock()
|
|
|
|
defer objectMPartPathLock.Unlock()
|
|
|
|
|
|
|
|
fsMetaPathMultipart := pathJoin(fs.fsPath, minioMetaMultipartBucket, uploadIDPath, fsMetaJSONFile)
|
|
|
|
rlk, err := fs.rwPool.Open(fsMetaPathMultipart)
|
|
|
|
if err != nil {
|
|
|
|
if err == errFileNotFound || err == errFileAccessDenied {
|
2017-01-16 22:23:43 -05:00
|
|
|
return ObjectInfo{}, traceError(InvalidUploadID{UploadID: uploadID})
|
2017-01-16 20:05:00 -05:00
|
|
|
}
|
2017-01-16 22:23:43 -05:00
|
|
|
return ObjectInfo{}, toObjectErr(traceError(err), bucket, object)
|
2017-01-16 20:05:00 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
// Disallow any parallel abort or complete multipart operations.
|
|
|
|
rwlk, err := fs.rwPool.Write(pathJoin(fs.fsPath, minioMetaMultipartBucket, bucket, object, uploadsJSONFile))
|
|
|
|
if err != nil {
|
|
|
|
fs.rwPool.Close(fsMetaPathMultipart)
|
|
|
|
if err == errFileNotFound || err == errFileAccessDenied {
|
2017-01-16 22:23:43 -05:00
|
|
|
return ObjectInfo{}, traceError(InvalidUploadID{UploadID: uploadID})
|
2017-01-16 20:05:00 -05:00
|
|
|
}
|
2017-01-16 22:23:43 -05:00
|
|
|
return ObjectInfo{}, toObjectErr(traceError(err), bucket, object)
|
2017-01-16 20:05:00 -05:00
|
|
|
}
|
|
|
|
defer rwlk.Close()
|
|
|
|
|
|
|
|
fsMeta := fsMetaV1{}
|
2016-08-31 16:42:57 -04:00
|
|
|
// Read saved fs metadata for ongoing multipart.
|
2017-01-25 15:29:06 -05:00
|
|
|
_, err = fsMeta.ReadFrom(rlk.LockedFile)
|
2016-08-31 16:42:57 -04:00
|
|
|
if err != nil {
|
2017-01-16 20:05:00 -05:00
|
|
|
fs.rwPool.Close(fsMetaPathMultipart)
|
2017-01-16 22:23:43 -05:00
|
|
|
return ObjectInfo{}, toObjectErr(err, minioMetaMultipartBucket, fsMetaPathMultipart)
|
2016-08-31 16:42:57 -04:00
|
|
|
}
|
2016-05-20 23:48:47 -04:00
|
|
|
|
2017-01-16 20:05:00 -05:00
|
|
|
// Wait for any competing PutObject() operation on bucket/object, since same namespace
|
|
|
|
// would be acquired for `fs.json`.
|
|
|
|
fsMetaPath := pathJoin(fs.fsPath, minioMetaBucket, bucketMetaPrefix, bucket, object, fsMetaJSONFile)
|
|
|
|
metaFile, err := fs.rwPool.Create(fsMetaPath)
|
|
|
|
if err != nil {
|
|
|
|
fs.rwPool.Close(fsMetaPathMultipart)
|
2017-01-16 22:23:43 -05:00
|
|
|
return ObjectInfo{}, toObjectErr(traceError(err), bucket, object)
|
2017-01-16 20:05:00 -05:00
|
|
|
}
|
|
|
|
defer metaFile.Close()
|
|
|
|
|
2017-01-16 22:23:43 -05:00
|
|
|
fsNSObjPath := pathJoin(fs.fsPath, bucket, object)
|
|
|
|
|
2016-11-30 02:26:36 -05:00
|
|
|
// This lock is held during rename of the appended tmp file to the actual
|
|
|
|
// location so that any competing GetObject/PutObject/DeleteObject do not race.
|
2016-11-23 06:04:04 -05:00
|
|
|
appendFallback := true // In case background-append did not append the required parts.
|
2017-01-16 20:05:00 -05:00
|
|
|
|
2016-11-21 02:42:53 -05:00
|
|
|
if isPartsSame(fsMeta.Parts, parts) {
|
2017-01-16 20:05:00 -05:00
|
|
|
err = fs.complete(bucket, object, uploadID, fsMeta)
|
2016-11-21 02:42:53 -05:00
|
|
|
if err == nil {
|
|
|
|
appendFallback = false
|
2017-01-16 20:05:00 -05:00
|
|
|
fsTmpObjPath := pathJoin(fs.fsPath, minioMetaTmpBucket, fs.fsUUID, uploadID)
|
|
|
|
if err = fsRenameFile(fsTmpObjPath, fsNSObjPath); err != nil {
|
|
|
|
fs.rwPool.Close(fsMetaPathMultipart)
|
2017-01-16 22:23:43 -05:00
|
|
|
return ObjectInfo{}, toObjectErr(err, minioMetaTmpBucket, uploadID)
|
2016-11-21 02:42:53 -05:00
|
|
|
}
|
2016-05-20 23:48:47 -04:00
|
|
|
}
|
2016-11-21 02:42:53 -05:00
|
|
|
}
|
2016-11-01 03:56:03 -04:00
|
|
|
|
2016-11-21 02:42:53 -05:00
|
|
|
if appendFallback {
|
2016-11-23 06:04:04 -05:00
|
|
|
// background append could not do append all the required parts, hence we do it here.
|
|
|
|
tempObj := uploadID + "-" + "part.1"
|
2016-08-31 16:42:57 -04:00
|
|
|
|
2017-01-16 20:05:00 -05:00
|
|
|
fsTmpObjPath := pathJoin(fs.fsPath, minioMetaTmpBucket, fs.fsUUID, tempObj)
|
|
|
|
// Delete the temporary object in the case of a
|
|
|
|
// failure. If PutObject succeeds, then there would be
|
|
|
|
// nothing to delete.
|
|
|
|
defer fsRemoveFile(fsTmpObjPath)
|
|
|
|
|
2016-08-31 16:42:57 -04:00
|
|
|
// Allocate staging buffer.
|
|
|
|
var buf = make([]byte, readSizeV1)
|
2016-10-29 15:44:44 -04:00
|
|
|
|
2017-01-16 20:05:00 -05:00
|
|
|
// Validate all parts and then commit to disk.
|
2016-08-31 16:42:57 -04:00
|
|
|
for i, part := range parts {
|
|
|
|
partIdx := fsMeta.ObjectPartIndex(part.PartNumber)
|
|
|
|
if partIdx == -1 {
|
2017-01-16 20:05:00 -05:00
|
|
|
fs.rwPool.Close(fsMetaPathMultipart)
|
2017-01-16 22:23:43 -05:00
|
|
|
return ObjectInfo{}, traceError(InvalidPart{})
|
2016-06-28 17:51:49 -04:00
|
|
|
}
|
2017-01-16 20:05:00 -05:00
|
|
|
|
2016-08-31 16:42:57 -04:00
|
|
|
if fsMeta.Parts[partIdx].ETag != part.ETag {
|
2017-01-16 20:05:00 -05:00
|
|
|
fs.rwPool.Close(fsMetaPathMultipart)
|
2017-01-16 22:23:43 -05:00
|
|
|
return ObjectInfo{}, traceError(BadDigest{})
|
2016-06-25 06:03:27 -04:00
|
|
|
}
|
2017-01-16 20:05:00 -05:00
|
|
|
|
2016-08-31 16:42:57 -04:00
|
|
|
// All parts except the last part has to be atleast 5MB.
|
|
|
|
if (i < len(parts)-1) && !isMinAllowedPartSize(fsMeta.Parts[partIdx].Size) {
|
2017-01-16 20:05:00 -05:00
|
|
|
fs.rwPool.Close(fsMetaPathMultipart)
|
2017-01-16 22:23:43 -05:00
|
|
|
return ObjectInfo{}, traceError(PartTooSmall{
|
2016-08-31 16:42:57 -04:00
|
|
|
PartNumber: part.PartNumber,
|
|
|
|
PartSize: fsMeta.Parts[partIdx].Size,
|
|
|
|
PartETag: part.ETag,
|
2016-08-25 12:39:01 -04:00
|
|
|
})
|
2016-06-24 05:06:23 -04:00
|
|
|
}
|
2017-01-16 20:05:00 -05:00
|
|
|
|
2016-08-31 16:42:57 -04:00
|
|
|
// Construct part suffix.
|
|
|
|
partSuffix := fmt.Sprintf("object%d", part.PartNumber)
|
2017-01-16 20:05:00 -05:00
|
|
|
multipartPartFile := pathJoin(fs.fsPath, minioMetaMultipartBucket, uploadIDPath, partSuffix)
|
|
|
|
|
|
|
|
var reader io.ReadCloser
|
2016-08-31 16:42:57 -04:00
|
|
|
offset := int64(0)
|
2017-01-16 20:05:00 -05:00
|
|
|
reader, _, err = fsOpenFile(multipartPartFile, offset)
|
|
|
|
if err != nil {
|
|
|
|
fs.rwPool.Close(fsMetaPathMultipart)
|
|
|
|
if err == errFileNotFound {
|
2017-01-16 22:23:43 -05:00
|
|
|
return ObjectInfo{}, traceError(InvalidPart{})
|
2016-05-28 18:13:15 -04:00
|
|
|
}
|
2017-01-16 22:23:43 -05:00
|
|
|
return ObjectInfo{}, toObjectErr(traceError(err), minioMetaMultipartBucket, partSuffix)
|
2016-05-20 23:48:47 -04:00
|
|
|
}
|
|
|
|
|
2017-01-16 20:05:00 -05:00
|
|
|
// No need to hold a lock, this is a unique file and will be only written
|
|
|
|
// to one one process per uploadID per minio process.
|
|
|
|
var wfile *os.File
|
|
|
|
wfile, err = os.OpenFile(preparePath(fsTmpObjPath), os.O_CREATE|os.O_APPEND|os.O_WRONLY, 0666)
|
|
|
|
if err != nil {
|
|
|
|
reader.Close()
|
|
|
|
fs.rwPool.Close(fsMetaPathMultipart)
|
2017-01-16 22:23:43 -05:00
|
|
|
return ObjectInfo{}, toObjectErr(traceError(err), bucket, object)
|
2016-08-31 16:42:57 -04:00
|
|
|
}
|
2017-01-16 20:05:00 -05:00
|
|
|
|
|
|
|
_, err = io.CopyBuffer(wfile, reader, buf)
|
|
|
|
if err != nil {
|
|
|
|
wfile.Close()
|
|
|
|
reader.Close()
|
|
|
|
fs.rwPool.Close(fsMetaPathMultipart)
|
2017-01-16 22:23:43 -05:00
|
|
|
return ObjectInfo{}, toObjectErr(traceError(err), bucket, object)
|
2017-01-16 20:05:00 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
wfile.Close()
|
|
|
|
reader.Close()
|
|
|
|
}
|
|
|
|
|
|
|
|
if err = fsRenameFile(fsTmpObjPath, fsNSObjPath); err != nil {
|
|
|
|
fs.rwPool.Close(fsMetaPathMultipart)
|
2017-01-16 22:23:43 -05:00
|
|
|
return ObjectInfo{}, toObjectErr(err, minioMetaTmpBucket, uploadID)
|
2016-05-20 23:48:47 -04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-07-21 20:31:14 -04:00
|
|
|
// No need to save part info, since we have concatenated all parts.
|
|
|
|
fsMeta.Parts = nil
|
|
|
|
|
2016-11-11 19:36:07 -05:00
|
|
|
// Save additional metadata.
|
|
|
|
if len(fsMeta.Meta) == 0 {
|
|
|
|
fsMeta.Meta = make(map[string]string)
|
|
|
|
}
|
|
|
|
fsMeta.Meta["md5Sum"] = s3MD5
|
2016-08-15 18:02:19 -04:00
|
|
|
|
2017-01-16 20:05:00 -05:00
|
|
|
// Write all the set metadata.
|
|
|
|
if _, err = fsMeta.WriteTo(metaFile); err != nil {
|
|
|
|
fs.rwPool.Close(fsMetaPathMultipart)
|
2017-01-16 22:23:43 -05:00
|
|
|
return ObjectInfo{}, toObjectErr(err, bucket, object)
|
2016-07-21 20:31:14 -04:00
|
|
|
}
|
|
|
|
|
2017-01-16 20:05:00 -05:00
|
|
|
// Close lock held on bucket/object/uploadid/fs.json,
|
|
|
|
// this needs to be done for windows so that we can happily
|
|
|
|
// delete the bucket/object/uploadid
|
|
|
|
fs.rwPool.Close(fsMetaPathMultipart)
|
|
|
|
|
2016-05-20 23:48:47 -04:00
|
|
|
// Cleanup all the parts if everything else has been safely committed.
|
2017-01-16 20:05:00 -05:00
|
|
|
multipartObjectDir := pathJoin(fs.fsPath, minioMetaMultipartBucket, bucket, object)
|
|
|
|
multipartUploadIDDir := pathJoin(multipartObjectDir, uploadID)
|
|
|
|
if err = fsRemoveUploadIDPath(multipartObjectDir, multipartUploadIDDir); err != nil {
|
2017-01-16 22:23:43 -05:00
|
|
|
return ObjectInfo{}, toObjectErr(traceError(err), bucket, object)
|
2016-05-20 23:48:47 -04:00
|
|
|
}
|
|
|
|
|
2017-01-16 20:05:00 -05:00
|
|
|
// Remove entry from `uploads.json`.
|
|
|
|
if err = fs.removeUploadID(bucket, object, uploadID, rwlk); err != nil {
|
2017-01-16 22:23:43 -05:00
|
|
|
return ObjectInfo{}, toObjectErr(err, minioMetaMultipartBucket, pathutil.Join(bucket, object))
|
|
|
|
}
|
|
|
|
|
|
|
|
fi, err := fsStatFile(fsNSObjPath)
|
|
|
|
if err != nil {
|
|
|
|
return ObjectInfo{}, toObjectErr(traceError(err), bucket, object)
|
2016-06-02 18:54:00 -04:00
|
|
|
}
|
|
|
|
|
2017-01-16 22:23:43 -05:00
|
|
|
// Return object info.
|
|
|
|
return fsMeta.ToObjectInfo(bucket, object, fi), nil
|
2016-05-20 23:48:47 -04:00
|
|
|
}
|
|
|
|
|
2016-06-02 15:18:56 -04:00
|
|
|
// AbortMultipartUpload - aborts an ongoing multipart operation
|
|
|
|
// signified by the input uploadID. This is an atomic operation
|
|
|
|
// doesn't require clients to initiate multiple such requests.
|
|
|
|
//
|
|
|
|
// All parts are purged from all disks and reference to the uploadID
|
|
|
|
// would be removed from the system, rollback is not possible on this
|
|
|
|
// operation.
|
|
|
|
//
|
|
|
|
// Implements S3 compatible Abort multipart API, slight difference is
|
|
|
|
// that this is an atomic idempotent operation. Subsequent calls have
|
|
|
|
// no affect and further requests to the same uploadID would not be
|
|
|
|
// honored.
|
2016-05-20 23:48:47 -04:00
|
|
|
func (fs fsObjects) AbortMultipartUpload(bucket, object, uploadID string) error {
|
2016-12-02 02:15:17 -05:00
|
|
|
if err := checkAbortMultipartArgs(bucket, object, fs); err != nil {
|
|
|
|
return err
|
2016-06-02 15:18:56 -04:00
|
|
|
}
|
|
|
|
|
2017-01-16 20:05:00 -05:00
|
|
|
if _, err := fs.statBucketDir(bucket); err != nil {
|
|
|
|
return toObjectErr(err, bucket)
|
|
|
|
}
|
|
|
|
|
|
|
|
uploadIDPath := pathJoin(bucket, object, uploadID)
|
|
|
|
|
|
|
|
// Hold the lock so that two parallel complete-multipart-uploads
|
|
|
|
// do not leave a stale uploads.json behind.
|
|
|
|
objectMPartPathLock := globalNSMutex.NewNSLock(minioMetaMultipartBucket,
|
|
|
|
pathJoin(bucket, object))
|
|
|
|
objectMPartPathLock.Lock()
|
|
|
|
defer objectMPartPathLock.Unlock()
|
|
|
|
|
|
|
|
fsMetaPath := pathJoin(fs.fsPath, minioMetaMultipartBucket, uploadIDPath, fsMetaJSONFile)
|
|
|
|
if _, err := fs.rwPool.Open(fsMetaPath); err != nil {
|
|
|
|
if err == errFileNotFound || err == errFileAccessDenied {
|
|
|
|
return traceError(InvalidUploadID{UploadID: uploadID})
|
|
|
|
}
|
|
|
|
return toObjectErr(traceError(err), bucket, object)
|
|
|
|
}
|
|
|
|
|
|
|
|
uploadsPath := pathJoin(bucket, object, uploadsJSONFile)
|
|
|
|
rwlk, err := fs.rwPool.Write(pathJoin(fs.fsPath, minioMetaMultipartBucket, uploadsPath))
|
|
|
|
if err != nil {
|
|
|
|
fs.rwPool.Close(fsMetaPath)
|
|
|
|
if err == errFileNotFound || err == errFileAccessDenied {
|
|
|
|
return traceError(InvalidUploadID{UploadID: uploadID})
|
|
|
|
}
|
|
|
|
return toObjectErr(traceError(err), bucket, object)
|
|
|
|
}
|
|
|
|
defer rwlk.Close()
|
|
|
|
|
|
|
|
// Signal appendParts routine to stop waiting for new parts to arrive.
|
|
|
|
fs.abort(uploadID)
|
|
|
|
|
|
|
|
// Close lock held on bucket/object/uploadid/fs.json,
|
|
|
|
// this needs to be done for windows so that we can happily
|
|
|
|
// delete the bucket/object/uploadid
|
|
|
|
fs.rwPool.Close(fsMetaPath)
|
|
|
|
|
|
|
|
// Cleanup all uploaded parts and abort the upload.
|
|
|
|
multipartObjectDir := pathJoin(fs.fsPath, minioMetaMultipartBucket, bucket, object)
|
|
|
|
multipartUploadIDDir := pathJoin(multipartObjectDir, uploadID)
|
|
|
|
if err = fsRemoveUploadIDPath(multipartObjectDir, multipartUploadIDDir); err != nil {
|
|
|
|
return toObjectErr(traceError(err), bucket, object)
|
|
|
|
}
|
2016-06-02 15:18:56 -04:00
|
|
|
|
2017-01-16 20:05:00 -05:00
|
|
|
// Remove entry from `uploads.json`.
|
|
|
|
if err = fs.removeUploadID(bucket, object, uploadID, rwlk); err != nil {
|
|
|
|
return toObjectErr(err, bucket, object)
|
2016-06-02 15:18:56 -04:00
|
|
|
}
|
|
|
|
|
2017-01-16 20:05:00 -05:00
|
|
|
return nil
|
2016-05-02 19:57:31 -04:00
|
|
|
}
|