2016-06-01 19:43:31 -04:00
|
|
|
/*
|
2020-05-27 19:14:26 -04:00
|
|
|
* MinIO Cloud Storage, (C) 2016-2020 MinIO, Inc.
|
2016-06-01 19:43:31 -04:00
|
|
|
*
|
|
|
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
* you may not use this file except in compliance with the License.
|
|
|
|
* You may obtain a copy of the License at
|
|
|
|
*
|
|
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
*
|
|
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
|
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
* See the License for the specific language governing permissions and
|
|
|
|
* limitations under the License.
|
|
|
|
*/
|
|
|
|
|
2016-08-18 19:23:42 -04:00
|
|
|
package cmd
|
2016-05-20 23:48:47 -04:00
|
|
|
|
|
|
|
import (
|
2018-03-14 15:01:47 -04:00
|
|
|
"context"
|
2020-03-02 19:29:30 -05:00
|
|
|
"fmt"
|
2016-05-20 23:48:47 -04:00
|
|
|
"io"
|
2018-09-20 22:22:09 -04:00
|
|
|
"net/http"
|
2016-05-20 23:48:47 -04:00
|
|
|
"path"
|
2020-11-12 15:12:09 -05:00
|
|
|
"strings"
|
2020-03-11 11:56:36 -04:00
|
|
|
"sync"
|
2020-11-19 14:50:22 -05:00
|
|
|
"time"
|
2016-05-20 23:48:47 -04:00
|
|
|
|
2020-07-14 12:38:05 -04:00
|
|
|
"github.com/minio/minio-go/v7/pkg/tags"
|
2019-10-07 01:50:24 -04:00
|
|
|
xhttp "github.com/minio/minio/cmd/http"
|
2018-04-05 18:04:40 -04:00
|
|
|
"github.com/minio/minio/cmd/logger"
|
2020-11-12 15:12:09 -05:00
|
|
|
"github.com/minio/minio/pkg/bucket/lifecycle"
|
2020-11-19 21:43:58 -05:00
|
|
|
"github.com/minio/minio/pkg/bucket/replication"
|
2016-05-20 23:48:47 -04:00
|
|
|
"github.com/minio/minio/pkg/mimedb"
|
2019-10-14 12:44:51 -04:00
|
|
|
"github.com/minio/minio/pkg/sync/errgroup"
|
2016-05-20 23:48:47 -04:00
|
|
|
)
|
|
|
|
|
2016-11-20 19:57:12 -05:00
|
|
|
// list all errors which can be ignored in object operations.
|
2020-07-24 16:16:11 -04:00
|
|
|
var objectOpIgnoredErrs = append(baseIgnoredErrs, errDiskAccessDenied, errUnformattedDisk)
|
2016-11-20 19:57:12 -05:00
|
|
|
|
2016-05-20 23:48:47 -04:00
|
|
|
/// Object Operations
|
|
|
|
|
2016-12-26 19:29:26 -05:00
|
|
|
// CopyObject - copy object source object to destination object.
|
|
|
|
// if source object and destination object are same we only
|
|
|
|
// update metadata.
|
2020-06-12 23:04:01 -04:00
|
|
|
func (er erasureObjects) CopyObject(ctx context.Context, srcBucket, srcObject, dstBucket, dstObject string, srcInfo ObjectInfo, srcOpts, dstOpts ObjectOptions) (oi ObjectInfo, e error) {
|
2020-08-03 19:21:10 -04:00
|
|
|
// This call shouldn't be used for anything other than metadata updates or adding self referential versions.
|
2020-05-28 17:36:38 -04:00
|
|
|
if !srcInfo.metadataOnly {
|
|
|
|
return oi, NotImplemented{}
|
|
|
|
}
|
2020-10-28 03:09:15 -04:00
|
|
|
|
2020-11-12 15:10:59 -05:00
|
|
|
defer ObjectPathUpdated(pathJoin(dstBucket, dstObject))
|
2020-11-04 11:25:42 -05:00
|
|
|
lk := er.NewNSLock(dstBucket, dstObject)
|
|
|
|
if err := lk.GetLock(ctx, globalOperationTimeout); err != nil {
|
2020-09-15 23:44:48 -04:00
|
|
|
return oi, err
|
|
|
|
}
|
|
|
|
defer lk.Unlock()
|
2017-12-22 06:28:13 -05:00
|
|
|
|
2020-05-28 17:36:38 -04:00
|
|
|
// Read metadata associated with the object from all disks.
|
2020-06-12 23:04:01 -04:00
|
|
|
storageDisks := er.getDisks()
|
2021-01-07 22:27:31 -05:00
|
|
|
metaArr, errs := readAllFileInfo(ctx, storageDisks, srcBucket, srcObject, srcOpts.VersionID, false)
|
2016-12-26 19:29:26 -05:00
|
|
|
|
2020-05-28 17:36:38 -04:00
|
|
|
// get Quorum for this object
|
2020-12-01 14:59:03 -05:00
|
|
|
readQuorum, writeQuorum, err := objectQuorumFromMeta(ctx, er, metaArr, errs)
|
2020-05-28 17:36:38 -04:00
|
|
|
if err != nil {
|
|
|
|
return oi, toObjectErr(err, srcBucket, srcObject)
|
|
|
|
}
|
2016-12-26 19:29:26 -05:00
|
|
|
|
2020-05-28 17:36:38 -04:00
|
|
|
// List all online disks.
|
2020-06-12 23:04:01 -04:00
|
|
|
onlineDisks, modTime := listOnlineDisks(storageDisks, metaArr, errs)
|
2016-12-26 19:29:26 -05:00
|
|
|
|
2020-05-28 17:36:38 -04:00
|
|
|
// Pick latest valid metadata.
|
2020-06-12 23:04:01 -04:00
|
|
|
fi, err := pickValidFileInfo(ctx, metaArr, modTime, readQuorum)
|
2020-05-28 17:36:38 -04:00
|
|
|
if err != nil {
|
|
|
|
return oi, toObjectErr(err, srcBucket, srcObject)
|
|
|
|
}
|
2020-06-12 23:04:01 -04:00
|
|
|
if fi.Deleted {
|
|
|
|
if srcOpts.VersionID == "" {
|
|
|
|
return oi, toObjectErr(errFileNotFound, srcBucket, srcObject)
|
|
|
|
}
|
|
|
|
return fi.ToObjectInfo(srcBucket, srcObject), toObjectErr(errMethodNotAllowed, srcBucket, srcObject)
|
2020-05-28 17:36:38 -04:00
|
|
|
}
|
2018-03-02 20:24:02 -05:00
|
|
|
|
2020-11-20 12:10:48 -05:00
|
|
|
onlineDisks, metaArr = shuffleDisksAndPartsMetadataByIndex(onlineDisks, metaArr, fi.Erasure.Distribution)
|
|
|
|
|
2020-08-03 19:21:10 -04:00
|
|
|
versionID := srcInfo.VersionID
|
|
|
|
if srcInfo.versionOnly {
|
|
|
|
versionID = dstOpts.VersionID
|
|
|
|
// preserve destination versionId if specified.
|
|
|
|
if versionID == "" {
|
|
|
|
versionID = mustGetUUID()
|
|
|
|
}
|
|
|
|
modTime = UTCNow()
|
|
|
|
}
|
|
|
|
fi.VersionID = versionID // set any new versionID we might have created
|
|
|
|
fi.ModTime = modTime // set modTime for the new versionID
|
2020-11-19 14:50:22 -05:00
|
|
|
if !dstOpts.MTime.IsZero() {
|
|
|
|
modTime = dstOpts.MTime
|
|
|
|
fi.ModTime = dstOpts.MTime
|
|
|
|
}
|
2020-08-03 19:21:10 -04:00
|
|
|
|
2020-09-15 23:44:48 -04:00
|
|
|
srcInfo.UserDefined["etag"] = srcInfo.ETag
|
|
|
|
|
2020-06-12 23:04:01 -04:00
|
|
|
// Update `xl.meta` content on each disks.
|
|
|
|
for index := range metaArr {
|
2020-11-20 12:10:48 -05:00
|
|
|
if metaArr[index].IsValid() {
|
|
|
|
metaArr[index].ModTime = modTime
|
|
|
|
metaArr[index].VersionID = versionID
|
|
|
|
metaArr[index].Metadata = srcInfo.UserDefined
|
|
|
|
}
|
2020-06-12 23:04:01 -04:00
|
|
|
}
|
2016-12-26 19:29:26 -05:00
|
|
|
|
2020-05-28 17:36:38 -04:00
|
|
|
tempObj := mustGetUUID()
|
2019-04-25 10:33:26 -04:00
|
|
|
|
2020-06-12 23:04:01 -04:00
|
|
|
// Cleanup in case of xl.meta writing failure
|
2020-09-11 09:39:19 -04:00
|
|
|
defer er.deleteObject(context.Background(), minioMetaTmpBucket, tempObj, writeQuorum)
|
2019-05-08 21:35:40 -04:00
|
|
|
|
2020-06-12 23:04:01 -04:00
|
|
|
// Write unique `xl.meta` for each disk.
|
|
|
|
if onlineDisks, err = writeUniqueFileInfo(ctx, onlineDisks, minioMetaTmpBucket, tempObj, metaArr, writeQuorum); err != nil {
|
2020-05-28 17:36:38 -04:00
|
|
|
return oi, toObjectErr(err, srcBucket, srcObject)
|
|
|
|
}
|
2016-12-26 19:29:26 -05:00
|
|
|
|
2020-06-12 23:04:01 -04:00
|
|
|
// Rename atomically `xl.meta` from tmp location to destination for each disk.
|
|
|
|
if _, err = renameFileInfo(ctx, onlineDisks, minioMetaTmpBucket, tempObj, srcBucket, srcObject, writeQuorum); err != nil {
|
2020-05-28 17:36:38 -04:00
|
|
|
return oi, toObjectErr(err, srcBucket, srcObject)
|
2016-12-26 19:29:26 -05:00
|
|
|
}
|
|
|
|
|
2020-06-12 23:04:01 -04:00
|
|
|
return fi.ToObjectInfo(srcBucket, srcObject), nil
|
2016-12-26 19:29:26 -05:00
|
|
|
}
|
|
|
|
|
2018-09-20 22:22:09 -04:00
|
|
|
// GetObjectNInfo - returns object info and an object
|
|
|
|
// Read(Closer). When err != nil, the returned reader is always nil.
|
2020-06-12 23:04:01 -04:00
|
|
|
func (er erasureObjects) GetObjectNInfo(ctx context.Context, bucket, object string, rs *HTTPRangeSpec, h http.Header, lockType LockType, opts ObjectOptions) (gr *GetObjectReader, err error) {
|
2020-09-14 18:57:13 -04:00
|
|
|
var unlockOnDefer bool
|
|
|
|
var nsUnlocker = func() {}
|
|
|
|
defer func() {
|
|
|
|
if unlockOnDefer {
|
|
|
|
nsUnlocker()
|
|
|
|
}
|
|
|
|
}()
|
|
|
|
|
|
|
|
// Acquire lock
|
|
|
|
if lockType != noLock {
|
2020-11-04 11:25:42 -05:00
|
|
|
lock := er.NewNSLock(bucket, object)
|
2020-09-14 18:57:13 -04:00
|
|
|
switch lockType {
|
|
|
|
case writeLock:
|
2020-11-04 11:25:42 -05:00
|
|
|
if err = lock.GetLock(ctx, globalOperationTimeout); err != nil {
|
2020-09-14 18:57:13 -04:00
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
nsUnlocker = lock.Unlock
|
|
|
|
case readLock:
|
2020-11-04 11:25:42 -05:00
|
|
|
if err = lock.GetRLock(ctx, globalOperationTimeout); err != nil {
|
2020-09-14 18:57:13 -04:00
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
nsUnlocker = lock.RUnlock
|
|
|
|
}
|
|
|
|
unlockOnDefer = true
|
|
|
|
}
|
|
|
|
|
2021-01-07 22:27:31 -05:00
|
|
|
fi, metaArr, onlineDisks, err := er.getObjectFileInfo(ctx, bucket, object, opts, true)
|
2018-09-20 22:22:09 -04:00
|
|
|
if err != nil {
|
|
|
|
return nil, toObjectErr(err, bucket, object)
|
|
|
|
}
|
|
|
|
|
2020-07-02 19:17:27 -04:00
|
|
|
objInfo := fi.ToObjectInfo(bucket, object)
|
|
|
|
if objInfo.DeleteMarker {
|
|
|
|
if opts.VersionID == "" {
|
|
|
|
return &GetObjectReader{
|
|
|
|
ObjInfo: objInfo,
|
|
|
|
}, toObjectErr(errFileNotFound, bucket, object)
|
|
|
|
}
|
|
|
|
// Make sure to return object info to provide extra information.
|
|
|
|
return &GetObjectReader{
|
|
|
|
ObjInfo: objInfo,
|
|
|
|
}, toObjectErr(errMethodNotAllowed, bucket, object)
|
|
|
|
}
|
2020-11-12 15:12:09 -05:00
|
|
|
if objInfo.TransitionStatus == lifecycle.TransitionComplete {
|
|
|
|
// If transitioned, stream from transition tier unless object is restored locally or restore date is past.
|
|
|
|
restoreHdr, ok := objInfo.UserDefined[xhttp.AmzRestore]
|
|
|
|
if !ok || !strings.HasPrefix(restoreHdr, "ongoing-request=false") || (!objInfo.RestoreExpires.IsZero() && time.Now().After(objInfo.RestoreExpires)) {
|
|
|
|
return getTransitionedObjectReader(ctx, bucket, object, rs, h, objInfo, opts)
|
|
|
|
}
|
|
|
|
}
|
2020-09-14 18:57:13 -04:00
|
|
|
unlockOnDefer = false
|
|
|
|
fn, off, length, nErr := NewGetObjectReader(rs, objInfo, opts, nsUnlocker)
|
2018-09-20 22:22:09 -04:00
|
|
|
if nErr != nil {
|
|
|
|
return nil, nErr
|
|
|
|
}
|
|
|
|
pr, pw := io.Pipe()
|
|
|
|
go func() {
|
2020-10-28 12:18:35 -04:00
|
|
|
err := er.getObjectWithFileInfo(ctx, bucket, object, off, length, pw, fi, metaArr, onlineDisks)
|
2018-09-20 22:22:09 -04:00
|
|
|
pw.CloseWithError(err)
|
|
|
|
}()
|
2020-04-21 01:01:59 -04:00
|
|
|
|
2018-09-21 14:42:06 -04:00
|
|
|
// Cleanup function to cause the go routine above to exit, in
|
|
|
|
// case of incomplete read.
|
|
|
|
pipeCloser := func() { pr.Close() }
|
2018-09-20 22:22:09 -04:00
|
|
|
|
2020-07-17 16:01:22 -04:00
|
|
|
return fn(pr, h, opts.CheckPrecondFn, pipeCloser)
|
2018-09-20 22:22:09 -04:00
|
|
|
}
|
|
|
|
|
2016-06-01 19:43:31 -04:00
|
|
|
// GetObject - reads an object erasured coded across multiple
|
|
|
|
// disks. Supports additional parameters like offset and length
|
2016-12-26 19:29:26 -05:00
|
|
|
// which are synonymous with HTTP Range requests.
|
2016-06-01 19:43:31 -04:00
|
|
|
//
|
2016-12-26 19:29:26 -05:00
|
|
|
// startOffset indicates the starting read location of the object.
|
|
|
|
// length indicates the total length of the object.
|
2020-06-12 23:04:01 -04:00
|
|
|
func (er erasureObjects) GetObject(ctx context.Context, bucket, object string, startOffset int64, length int64, writer io.Writer, etag string, opts ObjectOptions) error {
|
2020-09-14 18:57:13 -04:00
|
|
|
// Lock the object before reading.
|
2020-11-04 11:25:42 -05:00
|
|
|
lk := er.NewNSLock(bucket, object)
|
|
|
|
if err := lk.GetRLock(ctx, globalOperationTimeout); err != nil {
|
2020-09-14 18:57:13 -04:00
|
|
|
return err
|
|
|
|
}
|
|
|
|
defer lk.RUnlock()
|
|
|
|
|
2016-12-21 14:29:32 -05:00
|
|
|
// Start offset cannot be negative.
|
|
|
|
if startOffset < 0 {
|
2019-10-11 21:50:54 -04:00
|
|
|
logger.LogIf(ctx, errUnexpected, logger.Application)
|
2018-04-05 18:04:40 -04:00
|
|
|
return errUnexpected
|
2016-07-07 04:30:34 -04:00
|
|
|
}
|
2016-12-21 14:29:32 -05:00
|
|
|
|
2016-07-08 10:46:49 -04:00
|
|
|
// Writer cannot be nil.
|
|
|
|
if writer == nil {
|
2018-04-05 18:04:40 -04:00
|
|
|
logger.LogIf(ctx, errUnexpected)
|
|
|
|
return errUnexpected
|
2016-07-08 10:46:49 -04:00
|
|
|
}
|
2016-08-31 14:39:08 -04:00
|
|
|
|
2020-10-28 12:18:35 -04:00
|
|
|
return er.getObject(ctx, bucket, object, startOffset, length, writer, opts)
|
2020-05-27 19:14:26 -04:00
|
|
|
}
|
2016-07-25 01:49:27 -04:00
|
|
|
|
2020-10-28 12:18:35 -04:00
|
|
|
func (er erasureObjects) getObjectWithFileInfo(ctx context.Context, bucket, object string, startOffset int64, length int64, writer io.Writer, fi FileInfo, metaArr []FileInfo, onlineDisks []StorageAPI) error {
|
2020-10-28 03:09:15 -04:00
|
|
|
// Reorder online disks based on erasure distribution order.
|
2016-07-25 01:49:27 -04:00
|
|
|
// Reorder parts metadata based on erasure distribution order.
|
2020-10-28 03:09:15 -04:00
|
|
|
onlineDisks, metaArr = shuffleDisksAndPartsMetadataByIndex(onlineDisks, metaArr, fi.Erasure.Distribution)
|
2016-05-25 19:42:31 -04:00
|
|
|
|
2016-12-21 14:29:32 -05:00
|
|
|
// For negative length read everything.
|
|
|
|
if length < 0 {
|
2020-06-12 23:04:01 -04:00
|
|
|
length = fi.Size - startOffset
|
2016-07-08 10:46:49 -04:00
|
|
|
}
|
|
|
|
|
2016-12-21 14:29:32 -05:00
|
|
|
// Reply back invalid range if the input offset and length fall out of range.
|
2020-06-12 23:04:01 -04:00
|
|
|
if startOffset > fi.Size || startOffset+length > fi.Size {
|
|
|
|
logger.LogIf(ctx, InvalidRange{startOffset, length, fi.Size}, logger.Application)
|
|
|
|
return InvalidRange{startOffset, length, fi.Size}
|
2016-07-08 10:46:49 -04:00
|
|
|
}
|
|
|
|
|
2016-06-19 16:35:26 -04:00
|
|
|
// Get start part index and offset.
|
2020-06-12 23:04:01 -04:00
|
|
|
partIndex, partOffset, err := fi.ObjectToPartOffset(ctx, startOffset)
|
2016-05-20 23:48:47 -04:00
|
|
|
if err != nil {
|
2020-06-12 23:04:01 -04:00
|
|
|
return InvalidRange{startOffset, length, fi.Size}
|
2016-05-20 23:48:47 -04:00
|
|
|
}
|
2016-05-31 23:23:31 -04:00
|
|
|
|
2017-01-27 13:51:02 -05:00
|
|
|
// Calculate endOffset according to length
|
|
|
|
endOffset := startOffset
|
|
|
|
if length > 0 {
|
|
|
|
endOffset += length - 1
|
|
|
|
}
|
|
|
|
|
2016-06-19 16:35:26 -04:00
|
|
|
// Get last part index to read given length.
|
2020-06-12 23:04:01 -04:00
|
|
|
lastPartIndex, _, err := fi.ObjectToPartOffset(ctx, endOffset)
|
2016-06-19 16:35:26 -04:00
|
|
|
if err != nil {
|
2020-06-12 23:04:01 -04:00
|
|
|
return InvalidRange{startOffset, length, fi.Size}
|
2016-06-19 16:35:26 -04:00
|
|
|
}
|
|
|
|
|
2017-02-24 12:20:40 -05:00
|
|
|
var totalBytesRead int64
|
2020-06-12 23:04:01 -04:00
|
|
|
erasure, err := NewErasure(ctx, fi.Erasure.DataBlocks, fi.Erasure.ParityBlocks, fi.Erasure.BlockSize)
|
2017-08-14 21:08:42 -04:00
|
|
|
if err != nil {
|
|
|
|
return toObjectErr(err, bucket, object)
|
|
|
|
}
|
Prefer local disks when fetching data blocks (#9563)
If the requested server is part of the set this will always read
from the local disk, even if the disk contains a parity shard.
In default setup there is a 50% chance that at least
one shard that otherwise would have been fetched remotely
will be read locally instead.
It basically trades RPC call overhead for reed-solomon.
On distributed localhost this seems to be fairly break-even,
with a very small gain in throughput and latency.
However on networked servers this should be a bigger
1MB objects, before:
```
Operation: GET. Concurrency: 32. Hosts: 4.
Requests considered: 76257:
* Avg: 25ms 50%: 24ms 90%: 32ms 99%: 42ms Fastest: 7ms Slowest: 67ms
* First Byte: Average: 23ms, Median: 22ms, Best: 5ms, Worst: 65ms
Throughput:
* Average: 1213.68 MiB/s, 1272.63 obj/s (59.948s, starting 14:45:44 CEST)
```
After:
```
Operation: GET. Concurrency: 32. Hosts: 4.
Requests considered: 78845:
* Avg: 24ms 50%: 24ms 90%: 31ms 99%: 39ms Fastest: 8ms Slowest: 62ms
* First Byte: Average: 22ms, Median: 21ms, Best: 6ms, Worst: 57ms
Throughput:
* Average: 1255.11 MiB/s, 1316.08 obj/s (59.938s, starting 14:43:58 CEST)
```
Bonus fix: Only ask for heal once on an object.
2020-05-26 19:47:23 -04:00
|
|
|
var healOnce sync.Once
|
2020-11-12 15:12:09 -05:00
|
|
|
|
2016-06-19 16:35:26 -04:00
|
|
|
for ; partIndex <= lastPartIndex; partIndex++ {
|
2016-06-21 17:34:11 -04:00
|
|
|
if length == totalBytesRead {
|
|
|
|
break
|
|
|
|
}
|
2020-03-02 19:29:30 -05:00
|
|
|
|
2020-06-12 23:04:01 -04:00
|
|
|
partNumber := fi.Parts[partIndex].Number
|
2020-03-02 19:29:30 -05:00
|
|
|
|
2016-05-31 23:23:31 -04:00
|
|
|
// Save the current part name and size.
|
2020-06-12 23:04:01 -04:00
|
|
|
partSize := fi.Parts[partIndex].Size
|
2016-06-22 12:05:03 -04:00
|
|
|
|
2018-08-06 18:14:08 -04:00
|
|
|
partLength := partSize - partOffset
|
|
|
|
// partLength should be adjusted so that we don't write more data than what was requested.
|
|
|
|
if partLength > (length - totalBytesRead) {
|
|
|
|
partLength = length - totalBytesRead
|
2016-06-19 16:35:26 -04:00
|
|
|
}
|
2016-05-31 23:23:31 -04:00
|
|
|
|
2020-06-12 23:04:01 -04:00
|
|
|
tillOffset := erasure.ShardFileOffset(partOffset, partLength, partSize)
|
2016-07-16 11:35:30 -04:00
|
|
|
// Get the checksums of the current part.
|
2019-01-17 07:58:18 -05:00
|
|
|
readers := make([]io.ReaderAt, len(onlineDisks))
|
Prefer local disks when fetching data blocks (#9563)
If the requested server is part of the set this will always read
from the local disk, even if the disk contains a parity shard.
In default setup there is a 50% chance that at least
one shard that otherwise would have been fetched remotely
will be read locally instead.
It basically trades RPC call overhead for reed-solomon.
On distributed localhost this seems to be fairly break-even,
with a very small gain in throughput and latency.
However on networked servers this should be a bigger
1MB objects, before:
```
Operation: GET. Concurrency: 32. Hosts: 4.
Requests considered: 76257:
* Avg: 25ms 50%: 24ms 90%: 32ms 99%: 42ms Fastest: 7ms Slowest: 67ms
* First Byte: Average: 23ms, Median: 22ms, Best: 5ms, Worst: 65ms
Throughput:
* Average: 1213.68 MiB/s, 1272.63 obj/s (59.948s, starting 14:45:44 CEST)
```
After:
```
Operation: GET. Concurrency: 32. Hosts: 4.
Requests considered: 78845:
* Avg: 24ms 50%: 24ms 90%: 31ms 99%: 39ms Fastest: 8ms Slowest: 62ms
* First Byte: Average: 22ms, Median: 21ms, Best: 6ms, Worst: 57ms
Throughput:
* Average: 1255.11 MiB/s, 1316.08 obj/s (59.938s, starting 14:43:58 CEST)
```
Bonus fix: Only ask for heal once on an object.
2020-05-26 19:47:23 -04:00
|
|
|
prefer := make([]bool, len(onlineDisks))
|
2018-08-06 18:14:08 -04:00
|
|
|
for index, disk := range onlineDisks {
|
2017-08-14 21:08:42 -04:00
|
|
|
if disk == OfflineDisk {
|
2016-07-25 01:49:27 -04:00
|
|
|
continue
|
|
|
|
}
|
2020-11-20 12:10:48 -05:00
|
|
|
if !metaArr[index].IsValid() {
|
|
|
|
continue
|
|
|
|
}
|
2020-03-02 19:29:30 -05:00
|
|
|
checksumInfo := metaArr[index].Erasure.GetChecksumInfo(partNumber)
|
2020-06-12 23:04:01 -04:00
|
|
|
partPath := pathJoin(object, metaArr[index].DataDir, fmt.Sprintf("part.%d", partNumber))
|
2021-01-07 22:27:31 -05:00
|
|
|
data := metaArr[index].Data
|
|
|
|
readers[index] = newBitrotReader(disk, data, bucket, partPath, tillOffset,
|
2020-03-02 19:29:30 -05:00
|
|
|
checksumInfo.Algorithm, checksumInfo.Hash, erasure.ShardSize())
|
Prefer local disks when fetching data blocks (#9563)
If the requested server is part of the set this will always read
from the local disk, even if the disk contains a parity shard.
In default setup there is a 50% chance that at least
one shard that otherwise would have been fetched remotely
will be read locally instead.
It basically trades RPC call overhead for reed-solomon.
On distributed localhost this seems to be fairly break-even,
with a very small gain in throughput and latency.
However on networked servers this should be a bigger
1MB objects, before:
```
Operation: GET. Concurrency: 32. Hosts: 4.
Requests considered: 76257:
* Avg: 25ms 50%: 24ms 90%: 32ms 99%: 42ms Fastest: 7ms Slowest: 67ms
* First Byte: Average: 23ms, Median: 22ms, Best: 5ms, Worst: 65ms
Throughput:
* Average: 1213.68 MiB/s, 1272.63 obj/s (59.948s, starting 14:45:44 CEST)
```
After:
```
Operation: GET. Concurrency: 32. Hosts: 4.
Requests considered: 78845:
* Avg: 24ms 50%: 24ms 90%: 31ms 99%: 39ms Fastest: 8ms Slowest: 62ms
* First Byte: Average: 22ms, Median: 21ms, Best: 6ms, Worst: 57ms
Throughput:
* Average: 1255.11 MiB/s, 1316.08 obj/s (59.938s, starting 14:43:58 CEST)
```
Bonus fix: Only ask for heal once on an object.
2020-05-26 19:47:23 -04:00
|
|
|
|
|
|
|
// Prefer local disks
|
|
|
|
prefer[index] = disk.Hostname() == ""
|
2016-07-16 11:35:30 -04:00
|
|
|
}
|
2020-06-12 23:04:01 -04:00
|
|
|
err = erasure.Decode(ctx, writer, readers, partOffset, partLength, partSize, prefer)
|
|
|
|
// Note: we should not be defer'ing the following closeBitrotReaders() call as
|
|
|
|
// we are inside a for loop i.e if we use defer, we would accumulate a lot of open files by the time
|
2019-01-17 07:58:18 -05:00
|
|
|
// we return from this function.
|
|
|
|
closeBitrotReaders(readers)
|
2016-05-31 23:23:31 -04:00
|
|
|
if err != nil {
|
2020-04-01 15:14:00 -04:00
|
|
|
if decodeHealErr, ok := err.(*errDecodeHealRequired); ok {
|
Prefer local disks when fetching data blocks (#9563)
If the requested server is part of the set this will always read
from the local disk, even if the disk contains a parity shard.
In default setup there is a 50% chance that at least
one shard that otherwise would have been fetched remotely
will be read locally instead.
It basically trades RPC call overhead for reed-solomon.
On distributed localhost this seems to be fairly break-even,
with a very small gain in throughput and latency.
However on networked servers this should be a bigger
1MB objects, before:
```
Operation: GET. Concurrency: 32. Hosts: 4.
Requests considered: 76257:
* Avg: 25ms 50%: 24ms 90%: 32ms 99%: 42ms Fastest: 7ms Slowest: 67ms
* First Byte: Average: 23ms, Median: 22ms, Best: 5ms, Worst: 65ms
Throughput:
* Average: 1213.68 MiB/s, 1272.63 obj/s (59.948s, starting 14:45:44 CEST)
```
After:
```
Operation: GET. Concurrency: 32. Hosts: 4.
Requests considered: 78845:
* Avg: 24ms 50%: 24ms 90%: 31ms 99%: 39ms Fastest: 8ms Slowest: 62ms
* First Byte: Average: 22ms, Median: 21ms, Best: 6ms, Worst: 57ms
Throughput:
* Average: 1255.11 MiB/s, 1316.08 obj/s (59.938s, starting 14:43:58 CEST)
```
Bonus fix: Only ask for heal once on an object.
2020-05-26 19:47:23 -04:00
|
|
|
healOnce.Do(func() {
|
2020-06-12 23:04:01 -04:00
|
|
|
go deepHealObject(bucket, object, fi.VersionID)
|
Prefer local disks when fetching data blocks (#9563)
If the requested server is part of the set this will always read
from the local disk, even if the disk contains a parity shard.
In default setup there is a 50% chance that at least
one shard that otherwise would have been fetched remotely
will be read locally instead.
It basically trades RPC call overhead for reed-solomon.
On distributed localhost this seems to be fairly break-even,
with a very small gain in throughput and latency.
However on networked servers this should be a bigger
1MB objects, before:
```
Operation: GET. Concurrency: 32. Hosts: 4.
Requests considered: 76257:
* Avg: 25ms 50%: 24ms 90%: 32ms 99%: 42ms Fastest: 7ms Slowest: 67ms
* First Byte: Average: 23ms, Median: 22ms, Best: 5ms, Worst: 65ms
Throughput:
* Average: 1213.68 MiB/s, 1272.63 obj/s (59.948s, starting 14:45:44 CEST)
```
After:
```
Operation: GET. Concurrency: 32. Hosts: 4.
Requests considered: 78845:
* Avg: 24ms 50%: 24ms 90%: 31ms 99%: 39ms Fastest: 8ms Slowest: 62ms
* First Byte: Average: 22ms, Median: 21ms, Best: 6ms, Worst: 57ms
Throughput:
* Average: 1255.11 MiB/s, 1316.08 obj/s (59.938s, starting 14:43:58 CEST)
```
Bonus fix: Only ask for heal once on an object.
2020-05-26 19:47:23 -04:00
|
|
|
})
|
2020-04-01 15:14:00 -04:00
|
|
|
err = decodeHealErr.err
|
|
|
|
}
|
|
|
|
if err != nil {
|
|
|
|
return toObjectErr(err, bucket, object)
|
|
|
|
}
|
2016-05-31 23:23:31 -04:00
|
|
|
}
|
2019-01-17 07:58:18 -05:00
|
|
|
for i, r := range readers {
|
2018-08-06 18:14:08 -04:00
|
|
|
if r == nil {
|
|
|
|
onlineDisks[i] = OfflineDisk
|
|
|
|
}
|
|
|
|
}
|
2016-07-28 05:20:34 -04:00
|
|
|
// Track total bytes read from disk and written to the client.
|
2018-08-06 18:14:08 -04:00
|
|
|
totalBytesRead += partLength
|
2016-06-22 12:05:03 -04:00
|
|
|
// partOffset will be valid only for the first part, hence reset it to 0 for
|
|
|
|
// the remaining parts.
|
2016-05-31 23:23:31 -04:00
|
|
|
partOffset = 0
|
2016-06-01 19:43:31 -04:00
|
|
|
} // End of read all parts loop.
|
2016-05-31 23:23:31 -04:00
|
|
|
// Return success.
|
2016-05-28 18:13:15 -04:00
|
|
|
return nil
|
2016-05-20 23:48:47 -04:00
|
|
|
}
|
|
|
|
|
2020-06-12 23:04:01 -04:00
|
|
|
// getObject wrapper for erasure GetObject
|
2020-10-28 12:18:35 -04:00
|
|
|
func (er erasureObjects) getObject(ctx context.Context, bucket, object string, startOffset, length int64, writer io.Writer, opts ObjectOptions) error {
|
2021-01-07 22:27:31 -05:00
|
|
|
fi, metaArr, onlineDisks, err := er.getObjectFileInfo(ctx, bucket, object, opts, true)
|
2020-05-27 19:14:26 -04:00
|
|
|
if err != nil {
|
|
|
|
return toObjectErr(err, bucket, object)
|
|
|
|
}
|
2020-07-02 19:17:27 -04:00
|
|
|
if fi.Deleted {
|
|
|
|
if opts.VersionID == "" {
|
|
|
|
return toObjectErr(errFileNotFound, bucket, object)
|
|
|
|
}
|
|
|
|
// Make sure to return object info to provide extra information.
|
|
|
|
return toObjectErr(errMethodNotAllowed, bucket, object)
|
|
|
|
}
|
|
|
|
|
2020-10-28 12:18:35 -04:00
|
|
|
return er.getObjectWithFileInfo(ctx, bucket, object, startOffset, length, writer, fi, metaArr, onlineDisks)
|
2020-05-27 19:14:26 -04:00
|
|
|
}
|
|
|
|
|
2016-06-01 19:43:31 -04:00
|
|
|
// GetObjectInfo - reads object metadata and replies back ObjectInfo.
|
2020-06-12 23:04:01 -04:00
|
|
|
func (er erasureObjects) GetObjectInfo(ctx context.Context, bucket, object string, opts ObjectOptions) (info ObjectInfo, err error) {
|
2020-09-14 18:57:13 -04:00
|
|
|
// Lock the object before reading.
|
2020-11-04 11:25:42 -05:00
|
|
|
lk := er.NewNSLock(bucket, object)
|
|
|
|
if err := lk.GetRLock(ctx, globalOperationTimeout); err != nil {
|
2020-09-14 18:57:13 -04:00
|
|
|
return ObjectInfo{}, err
|
|
|
|
}
|
|
|
|
defer lk.RUnlock()
|
|
|
|
|
2020-07-02 19:17:27 -04:00
|
|
|
return er.getObjectInfo(ctx, bucket, object, opts)
|
2016-05-20 23:48:47 -04:00
|
|
|
}
|
|
|
|
|
2021-01-07 22:27:31 -05:00
|
|
|
func (er erasureObjects) getObjectFileInfo(ctx context.Context, bucket, object string, opts ObjectOptions, readData bool) (fi FileInfo, metaArr []FileInfo, onlineDisks []StorageAPI, err error) {
|
2020-06-12 23:04:01 -04:00
|
|
|
disks := er.getDisks()
|
2018-10-19 14:00:09 -04:00
|
|
|
|
|
|
|
// Read metadata associated with the object from all disks.
|
2021-01-07 22:27:31 -05:00
|
|
|
metaArr, errs := readAllFileInfo(ctx, disks, bucket, object, opts.VersionID, readData)
|
2018-10-19 14:00:09 -04:00
|
|
|
|
2020-12-01 14:59:03 -05:00
|
|
|
readQuorum, _, err := objectQuorumFromMeta(ctx, er, metaArr, errs)
|
2019-02-05 20:58:48 -05:00
|
|
|
if err != nil {
|
2020-11-02 18:15:12 -05:00
|
|
|
return fi, nil, nil, err
|
2018-02-01 13:47:49 -05:00
|
|
|
}
|
|
|
|
|
2020-05-27 19:14:26 -04:00
|
|
|
if reducedErr := reduceReadQuorumErrs(ctx, errs, objectOpIgnoredErrs, readQuorum); reducedErr != nil {
|
2020-11-05 14:48:55 -05:00
|
|
|
if reducedErr == errErasureReadQuorum && bucket != minioMetaBucket {
|
|
|
|
if _, ok := isObjectDangling(metaArr, errs, nil); ok {
|
|
|
|
reducedErr = errFileNotFound
|
|
|
|
if opts.VersionID != "" {
|
|
|
|
reducedErr = errFileVersionNotFound
|
|
|
|
}
|
|
|
|
// Remove the dangling object only when:
|
|
|
|
// - This is a non versioned bucket
|
|
|
|
// - This is a versioned bucket and the version ID is passed, the reason
|
|
|
|
// is that we cannot fetch the ID of the latest version when we don't trust xl.meta
|
|
|
|
if !opts.Versioned || opts.VersionID != "" {
|
|
|
|
er.deleteObjectVersion(ctx, bucket, object, 1, FileInfo{
|
|
|
|
Name: object,
|
|
|
|
VersionID: opts.VersionID,
|
|
|
|
})
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2020-06-12 23:04:01 -04:00
|
|
|
return fi, nil, nil, toObjectErr(reducedErr, bucket, object)
|
2020-05-27 19:14:26 -04:00
|
|
|
}
|
2020-06-12 23:04:01 -04:00
|
|
|
|
2020-05-27 19:14:26 -04:00
|
|
|
// List all online disks.
|
|
|
|
onlineDisks, modTime := listOnlineDisks(disks, metaArr, errs)
|
2018-02-01 13:47:49 -05:00
|
|
|
|
|
|
|
// Pick latest valid metadata.
|
2020-06-12 23:04:01 -04:00
|
|
|
fi, err = pickValidFileInfo(ctx, metaArr, modTime, readQuorum)
|
2016-05-25 04:33:39 -04:00
|
|
|
if err != nil {
|
2020-06-12 23:04:01 -04:00
|
|
|
return fi, nil, nil, err
|
2016-05-20 23:48:47 -04:00
|
|
|
}
|
2020-06-12 23:04:01 -04:00
|
|
|
return fi, metaArr, onlineDisks, nil
|
2020-05-27 19:14:26 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
// getObjectInfo - wrapper for reading object metadata and constructs ObjectInfo.
|
2020-06-12 23:04:01 -04:00
|
|
|
func (er erasureObjects) getObjectInfo(ctx context.Context, bucket, object string, opts ObjectOptions) (objInfo ObjectInfo, err error) {
|
2021-01-07 22:27:31 -05:00
|
|
|
fi, _, _, err := er.getObjectFileInfo(ctx, bucket, object, opts, false)
|
2020-05-27 19:14:26 -04:00
|
|
|
if err != nil {
|
2020-07-02 19:17:27 -04:00
|
|
|
return objInfo, toObjectErr(err, bucket, object)
|
2020-05-27 19:14:26 -04:00
|
|
|
}
|
2020-11-22 02:48:50 -05:00
|
|
|
objInfo = fi.ToObjectInfo(bucket, object)
|
|
|
|
if objInfo.TransitionStatus == lifecycle.TransitionComplete {
|
|
|
|
// overlay storage class for transitioned objects with transition tier SC Label
|
|
|
|
if sc := transitionSC(ctx, bucket); sc != "" {
|
|
|
|
objInfo.StorageClass = sc
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if !fi.VersionPurgeStatus.Empty() {
|
|
|
|
// Make sure to return object info to provide extra information.
|
|
|
|
return objInfo, toObjectErr(errMethodNotAllowed, bucket, object)
|
|
|
|
}
|
2020-06-12 23:04:01 -04:00
|
|
|
if fi.Deleted {
|
2020-11-19 21:43:58 -05:00
|
|
|
if opts.VersionID == "" || opts.DeleteMarker {
|
2020-06-12 23:04:01 -04:00
|
|
|
return objInfo, toObjectErr(errFileNotFound, bucket, object)
|
|
|
|
}
|
|
|
|
// Make sure to return object info to provide extra information.
|
2020-06-17 11:33:14 -04:00
|
|
|
return objInfo, toObjectErr(errMethodNotAllowed, bucket, object)
|
2020-06-12 23:04:01 -04:00
|
|
|
}
|
2020-11-22 02:48:50 -05:00
|
|
|
|
|
|
|
return objInfo, nil
|
2016-05-20 23:48:47 -04:00
|
|
|
}
|
|
|
|
|
2016-12-26 19:29:26 -05:00
|
|
|
func undoRename(disks []StorageAPI, srcBucket, srcEntry, dstBucket, dstEntry string, isDir bool, errs []error) {
|
2016-06-17 14:57:51 -04:00
|
|
|
// Undo rename object on disks where RenameFile succeeded.
|
2016-06-20 22:11:55 -04:00
|
|
|
|
|
|
|
// If srcEntry/dstEntry are objects then add a trailing slash to copy
|
|
|
|
// over all the parts inside the object directory
|
2016-12-26 19:29:26 -05:00
|
|
|
if isDir {
|
2016-06-20 22:11:55 -04:00
|
|
|
srcEntry = retainSlash(srcEntry)
|
|
|
|
dstEntry = retainSlash(dstEntry)
|
|
|
|
}
|
2019-10-14 12:44:51 -04:00
|
|
|
g := errgroup.WithNErrs(len(disks))
|
2016-07-12 01:53:54 -04:00
|
|
|
for index, disk := range disks {
|
2016-06-17 14:57:51 -04:00
|
|
|
if disk == nil {
|
|
|
|
continue
|
|
|
|
}
|
2019-10-14 12:44:51 -04:00
|
|
|
index := index
|
|
|
|
g.Go(func() error {
|
|
|
|
if errs[index] == nil {
|
2020-09-04 12:45:06 -04:00
|
|
|
_ = disks[index].RenameFile(context.TODO(), dstBucket, dstEntry, srcBucket, srcEntry)
|
2016-06-17 14:57:51 -04:00
|
|
|
}
|
2019-10-14 12:44:51 -04:00
|
|
|
return nil
|
|
|
|
}, index)
|
2016-06-17 14:57:51 -04:00
|
|
|
}
|
2019-10-14 12:44:51 -04:00
|
|
|
g.Wait()
|
2016-06-17 14:57:51 -04:00
|
|
|
}
|
|
|
|
|
2020-06-12 23:04:01 -04:00
|
|
|
// Similar to rename but renames data from srcEntry to dstEntry at dataDir
|
|
|
|
func renameData(ctx context.Context, disks []StorageAPI, srcBucket, srcEntry, dataDir, dstBucket, dstEntry string, writeQuorum int, ignoredErr []error) ([]StorageAPI, error) {
|
|
|
|
dataDir = retainSlash(dataDir)
|
2020-11-12 15:10:59 -05:00
|
|
|
defer ObjectPathUpdated(pathJoin(srcBucket, srcEntry))
|
|
|
|
defer ObjectPathUpdated(pathJoin(dstBucket, dstEntry))
|
2020-10-28 12:18:35 -04:00
|
|
|
|
2020-06-12 23:04:01 -04:00
|
|
|
g := errgroup.WithNErrs(len(disks))
|
|
|
|
|
|
|
|
// Rename file on all underlying storage disks.
|
|
|
|
for index := range disks {
|
|
|
|
index := index
|
|
|
|
g.Go(func() error {
|
|
|
|
if disks[index] == nil {
|
|
|
|
return errDiskNotFound
|
|
|
|
}
|
2020-09-04 12:45:06 -04:00
|
|
|
if err := disks[index].RenameData(ctx, srcBucket, srcEntry, dataDir, dstBucket, dstEntry); err != nil {
|
2020-06-12 23:04:01 -04:00
|
|
|
if !IsErrIgnored(err, ignoredErr...) {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}, index)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Wait for all renames to finish.
|
|
|
|
errs := g.Wait()
|
|
|
|
|
|
|
|
// We can safely allow RenameFile errors up to len(er.getDisks()) - writeQuorum
|
|
|
|
// otherwise return failure. Cleanup successful renames.
|
|
|
|
err := reduceWriteQuorumErrs(ctx, errs, objectOpIgnoredErrs, writeQuorum)
|
|
|
|
if err == errErasureWriteQuorum {
|
|
|
|
ug := errgroup.WithNErrs(len(disks))
|
|
|
|
for index, disk := range disks {
|
|
|
|
if disk == nil {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
index := index
|
|
|
|
ug.Go(func() error {
|
|
|
|
// Undo all the partial rename operations.
|
|
|
|
if errs[index] == nil {
|
2020-09-04 12:45:06 -04:00
|
|
|
_ = disks[index].RenameData(context.Background(), dstBucket, dstEntry, dataDir, srcBucket, srcEntry)
|
2020-06-12 23:04:01 -04:00
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}, index)
|
|
|
|
}
|
|
|
|
ug.Wait()
|
|
|
|
}
|
|
|
|
return evalDisks(disks, errs), err
|
|
|
|
}
|
|
|
|
|
2016-06-20 22:11:55 -04:00
|
|
|
// rename - common function that renamePart and renameObject use to rename
|
|
|
|
// the respective underlying storage layer representations.
|
2018-04-11 20:15:42 -04:00
|
|
|
func rename(ctx context.Context, disks []StorageAPI, srcBucket, srcEntry, dstBucket, dstEntry string, isDir bool, writeQuorum int, ignoredErr []error) ([]StorageAPI, error) {
|
2016-12-26 19:29:26 -05:00
|
|
|
if isDir {
|
2016-06-20 22:11:55 -04:00
|
|
|
dstEntry = retainSlash(dstEntry)
|
|
|
|
srcEntry = retainSlash(srcEntry)
|
|
|
|
}
|
2020-11-12 15:10:59 -05:00
|
|
|
defer ObjectPathUpdated(pathJoin(srcBucket, srcEntry))
|
|
|
|
defer ObjectPathUpdated(pathJoin(dstBucket, dstEntry))
|
2016-06-20 22:11:55 -04:00
|
|
|
|
2019-10-14 12:44:51 -04:00
|
|
|
g := errgroup.WithNErrs(len(disks))
|
|
|
|
|
2016-05-20 23:48:47 -04:00
|
|
|
// Rename file on all underlying storage disks.
|
2019-10-14 12:44:51 -04:00
|
|
|
for index := range disks {
|
|
|
|
index := index
|
|
|
|
g.Go(func() error {
|
|
|
|
if disks[index] == nil {
|
|
|
|
return errDiskNotFound
|
|
|
|
}
|
2020-09-04 12:45:06 -04:00
|
|
|
if err := disks[index].RenameFile(ctx, srcBucket, srcEntry, dstBucket, dstEntry); err != nil {
|
2018-04-11 20:15:42 -04:00
|
|
|
if !IsErrIgnored(err, ignoredErr...) {
|
2019-10-14 12:44:51 -04:00
|
|
|
return err
|
2018-04-11 20:15:42 -04:00
|
|
|
}
|
2016-05-20 23:48:47 -04:00
|
|
|
}
|
2019-10-14 12:44:51 -04:00
|
|
|
return nil
|
|
|
|
}, index)
|
2016-05-20 23:48:47 -04:00
|
|
|
}
|
|
|
|
|
2016-06-01 19:43:31 -04:00
|
|
|
// Wait for all renames to finish.
|
2019-10-14 12:44:51 -04:00
|
|
|
errs := g.Wait()
|
2016-05-20 23:48:47 -04:00
|
|
|
|
2020-06-12 23:04:01 -04:00
|
|
|
// We can safely allow RenameFile errors up to len(er.getDisks()) - writeQuorum
|
2016-05-20 23:48:47 -04:00
|
|
|
// otherwise return failure. Cleanup successful renames.
|
2018-04-05 18:04:40 -04:00
|
|
|
err := reduceWriteQuorumErrs(ctx, errs, objectOpIgnoredErrs, writeQuorum)
|
2020-06-12 23:04:01 -04:00
|
|
|
if err == errErasureWriteQuorum {
|
2016-06-17 14:57:51 -04:00
|
|
|
// Undo all the partial rename operations.
|
2016-12-26 19:29:26 -05:00
|
|
|
undoRename(disks, srcBucket, srcEntry, dstBucket, dstEntry, isDir, errs)
|
2016-05-20 23:48:47 -04:00
|
|
|
}
|
2017-06-14 20:14:27 -04:00
|
|
|
return evalDisks(disks, errs), err
|
2016-05-20 23:48:47 -04:00
|
|
|
}
|
|
|
|
|
2016-06-01 19:43:31 -04:00
|
|
|
// PutObject - creates an object upon reading from the input stream
|
|
|
|
// until EOF, erasure codes the data across all disk and additionally
|
2020-06-12 23:04:01 -04:00
|
|
|
// writes `xl.meta` which carries the necessary metadata for future
|
2016-06-01 19:43:31 -04:00
|
|
|
// object operations.
|
2020-06-12 23:04:01 -04:00
|
|
|
func (er erasureObjects) PutObject(ctx context.Context, bucket string, object string, data *PutObjReader, opts ObjectOptions) (objInfo ObjectInfo, err error) {
|
|
|
|
return er.putObject(ctx, bucket, object, data, opts)
|
2018-01-12 23:34:52 -05:00
|
|
|
}
|
|
|
|
|
2020-06-12 23:04:01 -04:00
|
|
|
// putObject wrapper for erasureObjects PutObject
|
|
|
|
func (er erasureObjects) putObject(ctx context.Context, bucket string, object string, r *PutObjReader, opts ObjectOptions) (objInfo ObjectInfo, err error) {
|
2020-11-12 15:10:59 -05:00
|
|
|
defer ObjectPathUpdated(pathJoin(bucket, object))
|
2020-06-12 23:04:01 -04:00
|
|
|
|
2018-11-14 20:36:41 -05:00
|
|
|
data := r.Reader
|
|
|
|
|
2018-01-29 21:43:13 -05:00
|
|
|
uniqueID := mustGetUUID()
|
|
|
|
tempObj := uniqueID
|
|
|
|
// No metadata is set, allocate a new one.
|
2019-02-09 00:31:06 -05:00
|
|
|
if opts.UserDefined == nil {
|
|
|
|
opts.UserDefined = make(map[string]string)
|
2018-01-29 21:43:13 -05:00
|
|
|
}
|
|
|
|
|
2020-06-12 23:04:01 -04:00
|
|
|
storageDisks := er.getDisks()
|
2019-10-07 01:50:24 -04:00
|
|
|
|
2018-01-29 21:43:13 -05:00
|
|
|
// Get parity and data drive count based on storage class metadata
|
2019-10-23 01:59:13 -04:00
|
|
|
parityDrives := globalStorageClass.GetParityForSC(opts.UserDefined[xhttp.AmzStorageClass])
|
2019-10-07 01:50:24 -04:00
|
|
|
if parityDrives == 0 {
|
2020-03-31 12:32:16 -04:00
|
|
|
parityDrives = getDefaultParityBlocks(len(storageDisks))
|
2019-10-07 01:50:24 -04:00
|
|
|
}
|
|
|
|
dataDrives := len(storageDisks) - parityDrives
|
2018-01-29 21:43:13 -05:00
|
|
|
|
|
|
|
// we now know the number of blocks this object needs for data and parity.
|
|
|
|
// writeQuorum is dataBlocks + 1
|
2020-06-09 22:19:03 -04:00
|
|
|
writeQuorum := dataDrives
|
|
|
|
if dataDrives == parityDrives {
|
2020-12-01 14:59:03 -05:00
|
|
|
writeQuorum = dataDrives + 1
|
2020-06-09 22:19:03 -04:00
|
|
|
}
|
2018-01-29 21:43:13 -05:00
|
|
|
|
|
|
|
// Delete temporary object in the event of failure.
|
|
|
|
// If PutObject succeeded there would be no temporary
|
|
|
|
// object to delete.
|
2020-09-11 09:39:19 -04:00
|
|
|
defer er.deleteObject(context.Background(), minioMetaTmpBucket, tempObj, writeQuorum)
|
2018-01-29 21:43:13 -05:00
|
|
|
|
2017-10-06 12:38:01 -04:00
|
|
|
// Validate input data size and it can never be less than zero.
|
2018-09-27 23:36:17 -04:00
|
|
|
if data.Size() < -1 {
|
2019-10-11 21:50:54 -04:00
|
|
|
logger.LogIf(ctx, errInvalidArgument, logger.Application)
|
2018-04-05 18:04:40 -04:00
|
|
|
return ObjectInfo{}, toObjectErr(errInvalidArgument)
|
2017-10-06 12:38:01 -04:00
|
|
|
}
|
|
|
|
|
2017-02-21 22:43:44 -05:00
|
|
|
// Check if an object is present as one of the parent dir.
|
|
|
|
// -- FIXME. (needs a new kind of lock).
|
2017-05-09 17:32:24 -04:00
|
|
|
// -- FIXME (this also causes performance issue when disks are down).
|
2020-06-12 23:04:01 -04:00
|
|
|
if er.parentDirIsObject(ctx, bucket, path.Dir(object)) {
|
2019-03-20 16:06:53 -04:00
|
|
|
return ObjectInfo{}, toObjectErr(errFileParentIsFile, bucket, object)
|
2017-02-21 22:43:44 -05:00
|
|
|
}
|
|
|
|
|
2017-01-30 18:44:42 -05:00
|
|
|
// Initialize parts metadata
|
2020-12-07 13:04:07 -05:00
|
|
|
partsMetadata := make([]FileInfo, len(storageDisks))
|
2020-06-12 23:04:01 -04:00
|
|
|
|
|
|
|
fi := newFileInfo(object, dataDrives, parityDrives)
|
2017-01-30 18:44:42 -05:00
|
|
|
|
2020-06-12 23:04:01 -04:00
|
|
|
if opts.Versioned {
|
2020-06-17 14:13:41 -04:00
|
|
|
fi.VersionID = opts.VersionID
|
|
|
|
if fi.VersionID == "" {
|
|
|
|
fi.VersionID = mustGetUUID()
|
|
|
|
}
|
2020-06-12 23:04:01 -04:00
|
|
|
}
|
|
|
|
fi.DataDir = mustGetUUID()
|
2016-07-13 14:56:25 -04:00
|
|
|
|
2020-06-12 23:04:01 -04:00
|
|
|
// Initialize erasure metadata.
|
2017-01-30 18:44:42 -05:00
|
|
|
for index := range partsMetadata {
|
2020-06-12 23:04:01 -04:00
|
|
|
partsMetadata[index] = fi
|
2017-01-30 18:44:42 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
// Order disks according to erasure distribution
|
2020-10-28 03:09:15 -04:00
|
|
|
var onlineDisks []StorageAPI
|
|
|
|
onlineDisks, partsMetadata = shuffleDisksAndPartsMetadata(storageDisks, partsMetadata, fi.Erasure.Distribution)
|
2017-01-30 18:44:42 -05:00
|
|
|
|
2020-06-12 23:04:01 -04:00
|
|
|
erasure, err := NewErasure(ctx, fi.Erasure.DataBlocks, fi.Erasure.ParityBlocks, fi.Erasure.BlockSize)
|
2017-08-14 21:08:42 -04:00
|
|
|
if err != nil {
|
|
|
|
return ObjectInfo{}, toObjectErr(err, bucket, object)
|
|
|
|
}
|
2017-10-06 12:38:01 -04:00
|
|
|
|
2018-02-15 20:45:57 -05:00
|
|
|
// Fetch buffer for I/O, returns from the pool if not allocates a new one and returns.
|
2018-06-13 14:55:12 -04:00
|
|
|
var buffer []byte
|
|
|
|
switch size := data.Size(); {
|
|
|
|
case size == 0:
|
|
|
|
buffer = make([]byte, 1) // Allocate atleast a byte to reach EOF
|
2020-06-12 23:04:01 -04:00
|
|
|
case size == -1 || size >= fi.Erasure.BlockSize:
|
|
|
|
buffer = er.bp.Get()
|
|
|
|
defer er.bp.Put(buffer)
|
|
|
|
case size < fi.Erasure.BlockSize:
|
2018-06-13 14:55:12 -04:00
|
|
|
// No need to allocate fully blockSizeV1 buffer if the incoming data is smaller.
|
2020-06-12 23:04:01 -04:00
|
|
|
buffer = make([]byte, size, 2*size+int64(fi.Erasure.ParityBlocks+fi.Erasure.DataBlocks-1))
|
2018-06-13 14:55:12 -04:00
|
|
|
}
|
2017-10-06 12:38:01 -04:00
|
|
|
|
2020-06-12 23:04:01 -04:00
|
|
|
if len(buffer) > int(fi.Erasure.BlockSize) {
|
|
|
|
buffer = buffer[:fi.Erasure.BlockSize]
|
2018-08-06 18:14:08 -04:00
|
|
|
}
|
|
|
|
|
2019-05-14 15:33:18 -04:00
|
|
|
partName := "part.1"
|
2020-06-12 23:04:01 -04:00
|
|
|
tempErasureObj := pathJoin(uniqueID, fi.DataDir, partName)
|
2017-01-30 18:44:42 -05:00
|
|
|
|
2019-05-14 15:33:18 -04:00
|
|
|
writers := make([]io.Writer, len(onlineDisks))
|
|
|
|
for i, disk := range onlineDisks {
|
|
|
|
if disk == nil {
|
|
|
|
continue
|
2018-09-27 23:36:17 -04:00
|
|
|
}
|
2019-05-14 15:33:18 -04:00
|
|
|
writers[i] = newBitrotWriter(disk, minioMetaTmpBucket, tempErasureObj, erasure.ShardFileSize(data.Size()), DefaultBitrotAlgorithm, erasure.ShardSize())
|
|
|
|
}
|
2018-09-27 23:36:17 -04:00
|
|
|
|
2020-08-03 15:15:08 -04:00
|
|
|
n, erasureErr := erasure.Encode(ctx, data, writers, buffer, writeQuorum)
|
2019-05-14 15:33:18 -04:00
|
|
|
closeBitrotWriters(writers)
|
|
|
|
if erasureErr != nil {
|
|
|
|
return ObjectInfo{}, toObjectErr(erasureErr, minioMetaTmpBucket, tempErasureObj)
|
|
|
|
}
|
2017-08-14 21:08:42 -04:00
|
|
|
|
2019-05-14 15:33:18 -04:00
|
|
|
// Should return IncompleteBody{} error when reader has fewer bytes
|
|
|
|
// than specified in request header.
|
|
|
|
if n < data.Size() {
|
2020-09-08 17:22:04 -04:00
|
|
|
return ObjectInfo{}, IncompleteBody{Bucket: bucket, Object: object}
|
2019-05-14 15:33:18 -04:00
|
|
|
}
|
2017-01-31 18:34:49 -05:00
|
|
|
|
2020-12-24 18:02:02 -05:00
|
|
|
if !opts.NoLock {
|
|
|
|
lk := er.NewNSLock(bucket, object)
|
|
|
|
if err := lk.GetLock(ctx, globalOperationTimeout); err != nil {
|
|
|
|
return ObjectInfo{}, err
|
|
|
|
}
|
|
|
|
defer lk.Unlock()
|
2020-09-15 23:44:48 -04:00
|
|
|
}
|
|
|
|
|
2019-05-14 15:33:18 -04:00
|
|
|
for i, w := range writers {
|
|
|
|
if w == nil {
|
|
|
|
onlineDisks[i] = nil
|
|
|
|
continue
|
2017-01-30 18:44:42 -05:00
|
|
|
}
|
2020-03-02 19:29:30 -05:00
|
|
|
partsMetadata[i].AddObjectPart(1, "", n, data.ActualSize())
|
|
|
|
partsMetadata[i].Erasure.AddChecksumInfo(ChecksumInfo{
|
|
|
|
PartNumber: 1,
|
|
|
|
Algorithm: DefaultBitrotAlgorithm,
|
|
|
|
Hash: bitrotWriterSum(w),
|
|
|
|
})
|
2016-07-18 22:06:48 -04:00
|
|
|
}
|
2020-08-12 20:32:24 -04:00
|
|
|
if opts.UserDefined["etag"] == "" {
|
|
|
|
opts.UserDefined["etag"] = r.MD5CurrentHexString()
|
|
|
|
}
|
2016-06-01 19:43:31 -04:00
|
|
|
|
2016-06-17 00:42:02 -04:00
|
|
|
// Guess content-type from the extension if possible.
|
2019-02-09 00:31:06 -05:00
|
|
|
if opts.UserDefined["content-type"] == "" {
|
|
|
|
opts.UserDefined["content-type"] = mimedb.TypeByExtension(path.Ext(object))
|
2016-05-20 23:48:47 -04:00
|
|
|
}
|
|
|
|
|
2020-07-08 20:36:56 -04:00
|
|
|
modTime := opts.MTime
|
|
|
|
if opts.MTime.IsZero() {
|
|
|
|
modTime = UTCNow()
|
|
|
|
}
|
|
|
|
|
2016-05-26 22:55:48 -04:00
|
|
|
// Fill all the necessary metadata.
|
2020-06-12 23:04:01 -04:00
|
|
|
// Update `xl.meta` content on each disks.
|
2016-05-31 23:23:31 -04:00
|
|
|
for index := range partsMetadata {
|
2020-06-12 23:04:01 -04:00
|
|
|
partsMetadata[index].Metadata = opts.UserDefined
|
|
|
|
partsMetadata[index].Size = n
|
|
|
|
partsMetadata[index].ModTime = modTime
|
2016-05-31 23:23:31 -04:00
|
|
|
}
|
|
|
|
|
2020-06-12 23:04:01 -04:00
|
|
|
// Write unique `xl.meta` for each disk.
|
|
|
|
if onlineDisks, err = writeUniqueFileInfo(ctx, onlineDisks, minioMetaTmpBucket, tempObj, partsMetadata, writeQuorum); err != nil {
|
2016-09-02 15:18:35 -04:00
|
|
|
return ObjectInfo{}, toObjectErr(err, bucket, object)
|
2016-05-20 23:48:47 -04:00
|
|
|
}
|
2016-05-29 03:42:09 -04:00
|
|
|
|
2016-06-01 19:43:31 -04:00
|
|
|
// Rename the successfully written temporary object to final location.
|
2020-06-12 23:04:01 -04:00
|
|
|
if onlineDisks, err = renameData(ctx, onlineDisks, minioMetaTmpBucket, tempObj, fi.DataDir, bucket, object, writeQuorum, nil); err != nil {
|
2016-09-02 15:18:35 -04:00
|
|
|
return ObjectInfo{}, toObjectErr(err, bucket, object)
|
2016-05-28 18:13:15 -04:00
|
|
|
}
|
2016-05-29 03:42:09 -04:00
|
|
|
|
2020-01-15 21:30:32 -05:00
|
|
|
// Whether a disk was initially or becomes offline
|
|
|
|
// during this upload, send it to the MRF list.
|
|
|
|
for i := 0; i < len(onlineDisks); i++ {
|
2020-12-22 12:16:43 -05:00
|
|
|
if onlineDisks[i] != nil && onlineDisks[i].IsOnline() {
|
|
|
|
continue
|
2020-01-15 21:30:32 -05:00
|
|
|
}
|
2020-12-22 12:16:43 -05:00
|
|
|
er.addPartial(bucket, object, fi.VersionID)
|
|
|
|
break
|
2020-01-15 21:30:32 -05:00
|
|
|
}
|
|
|
|
|
2020-06-12 23:04:01 -04:00
|
|
|
for i := 0; i < len(onlineDisks); i++ {
|
2020-12-22 12:16:43 -05:00
|
|
|
if onlineDisks[i] != nil && onlineDisks[i].IsOnline() {
|
|
|
|
// Object info is the same in all disks, so we can pick
|
|
|
|
// the first meta from online disk
|
|
|
|
fi = partsMetadata[i]
|
|
|
|
break
|
2020-06-12 23:04:01 -04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return fi.ToObjectInfo(bucket, object), nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (er erasureObjects) deleteObjectVersion(ctx context.Context, bucket, object string, writeQuorum int, fi FileInfo) error {
|
2020-10-28 12:18:35 -04:00
|
|
|
defer ObjectPathUpdated(pathJoin(bucket, object))
|
2020-06-12 23:04:01 -04:00
|
|
|
disks := er.getDisks()
|
|
|
|
g := errgroup.WithNErrs(len(disks))
|
|
|
|
for index := range disks {
|
|
|
|
index := index
|
|
|
|
g.Go(func() error {
|
|
|
|
if disks[index] == nil {
|
|
|
|
return errDiskNotFound
|
|
|
|
}
|
2020-10-06 15:03:57 -04:00
|
|
|
return disks[index].DeleteVersion(ctx, bucket, object, fi)
|
2020-06-12 23:04:01 -04:00
|
|
|
}, index)
|
2016-09-02 15:18:35 -04:00
|
|
|
}
|
2020-06-12 23:04:01 -04:00
|
|
|
// return errors if any during deletion
|
|
|
|
return reduceWriteQuorumErrs(ctx, g.Wait(), objectOpIgnoredErrs, writeQuorum)
|
2016-05-20 23:48:47 -04:00
|
|
|
}
|
|
|
|
|
2016-06-01 19:43:31 -04:00
|
|
|
// deleteObject - wrapper for delete object, deletes an object from
|
2020-06-12 23:04:01 -04:00
|
|
|
// all the disks in parallel, including `xl.meta` associated with the
|
2016-06-01 19:43:31 -04:00
|
|
|
// object.
|
2020-06-12 23:04:01 -04:00
|
|
|
func (er erasureObjects) deleteObject(ctx context.Context, bucket, object string, writeQuorum int) error {
|
2018-01-29 21:43:13 -05:00
|
|
|
var err error
|
2020-11-12 15:10:59 -05:00
|
|
|
defer ObjectPathUpdated(pathJoin(bucket, object))
|
2018-02-20 18:33:26 -05:00
|
|
|
|
2018-08-29 16:36:19 -04:00
|
|
|
tmpObj := mustGetUUID()
|
2020-12-07 13:04:07 -05:00
|
|
|
disks := er.getDisks()
|
2018-08-29 16:36:19 -04:00
|
|
|
if bucket == minioMetaTmpBucket {
|
|
|
|
tmpObj = object
|
|
|
|
} else {
|
2018-10-04 20:22:49 -04:00
|
|
|
// Rename the current object while requiring write quorum, but also consider
|
|
|
|
// that a non found object in a given disk as a success since it already
|
|
|
|
// confirms that the object doesn't have a part in that disk (already removed)
|
2020-12-07 13:04:07 -05:00
|
|
|
disks, err = rename(ctx, disks, bucket, object, minioMetaTmpBucket, tmpObj, true, writeQuorum,
|
2020-06-12 23:04:01 -04:00
|
|
|
[]error{errFileNotFound})
|
2018-03-26 19:39:28 -04:00
|
|
|
if err != nil {
|
2018-08-29 16:36:19 -04:00
|
|
|
return toObjectErr(err, bucket, object)
|
2018-03-26 19:39:28 -04:00
|
|
|
}
|
2017-12-22 06:28:13 -05:00
|
|
|
}
|
|
|
|
|
2019-10-14 12:44:51 -04:00
|
|
|
g := errgroup.WithNErrs(len(disks))
|
|
|
|
for index := range disks {
|
|
|
|
index := index
|
|
|
|
g.Go(func() error {
|
|
|
|
if disks[index] == nil {
|
|
|
|
return errDiskNotFound
|
|
|
|
}
|
2020-11-13 19:56:45 -05:00
|
|
|
return cleanupDir(ctx, disks[index], minioMetaTmpBucket, tmpObj)
|
2019-10-14 12:44:51 -04:00
|
|
|
}, index)
|
2016-05-20 23:48:47 -04:00
|
|
|
}
|
|
|
|
|
2018-03-26 19:39:28 -04:00
|
|
|
// return errors if any during deletion
|
2019-10-14 12:44:51 -04:00
|
|
|
return reduceWriteQuorumErrs(ctx, g.Wait(), objectOpIgnoredErrs, writeQuorum)
|
2016-05-20 23:48:47 -04:00
|
|
|
}
|
|
|
|
|
2020-06-12 23:04:01 -04:00
|
|
|
// DeleteObjects deletes objects/versions in bulk, this function will still automatically split objects list
|
|
|
|
// into smaller bulks if some object names are found to be duplicated in the delete list, splitting
|
|
|
|
// into smaller bulks will avoid holding twice the write lock of the duplicated object names.
|
|
|
|
func (er erasureObjects) DeleteObjects(ctx context.Context, bucket string, objects []ObjectToDelete, opts ObjectOptions) ([]DeletedObject, []error) {
|
|
|
|
errs := make([]error, len(objects))
|
|
|
|
dobjects := make([]DeletedObject, len(objects))
|
|
|
|
writeQuorums := make([]int, len(objects))
|
2020-04-27 13:06:21 -04:00
|
|
|
|
2020-06-12 23:04:01 -04:00
|
|
|
storageDisks := er.getDisks()
|
|
|
|
|
|
|
|
for i := range objects {
|
|
|
|
// Assume (N/2 + 1) quorums for all objects
|
|
|
|
// this is a theoretical assumption such that
|
|
|
|
// for delete's we do not need to honor storage
|
|
|
|
// class for objects which have reduced quorum
|
|
|
|
// storage class only needs to be honored for
|
|
|
|
// Read() requests alone which we already do.
|
|
|
|
writeQuorums[i] = getWriteQuorum(len(storageDisks))
|
2019-05-13 15:25:49 -04:00
|
|
|
}
|
|
|
|
|
2020-06-12 23:04:01 -04:00
|
|
|
versions := make([]FileInfo, len(objects))
|
|
|
|
for i := range objects {
|
|
|
|
if objects[i].VersionID == "" {
|
2020-11-12 15:10:59 -05:00
|
|
|
modTime := opts.MTime
|
|
|
|
if opts.MTime.IsZero() {
|
|
|
|
modTime = UTCNow()
|
|
|
|
}
|
|
|
|
uuid := opts.VersionID
|
|
|
|
if uuid == "" {
|
|
|
|
uuid = mustGetUUID()
|
|
|
|
}
|
|
|
|
if opts.Versioned || opts.VersionSuspended {
|
2020-11-19 21:43:58 -05:00
|
|
|
versions[i] = FileInfo{
|
|
|
|
Name: objects[i].ObjectName,
|
|
|
|
ModTime: modTime,
|
|
|
|
Deleted: true, // delete marker
|
|
|
|
DeleteMarkerReplicationStatus: objects[i].DeleteMarkerReplicationStatus,
|
|
|
|
VersionPurgeStatus: objects[i].VersionPurgeStatus,
|
2020-10-06 15:03:57 -04:00
|
|
|
}
|
|
|
|
if opts.Versioned {
|
2020-11-19 21:43:58 -05:00
|
|
|
versions[i].VersionID = uuid
|
2020-06-12 23:04:01 -04:00
|
|
|
}
|
2020-10-06 15:03:57 -04:00
|
|
|
continue
|
2020-06-12 23:04:01 -04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
versions[i] = FileInfo{
|
2020-11-19 21:43:58 -05:00
|
|
|
Name: objects[i].ObjectName,
|
|
|
|
VersionID: objects[i].VersionID,
|
|
|
|
DeleteMarkerReplicationStatus: objects[i].DeleteMarkerReplicationStatus,
|
|
|
|
VersionPurgeStatus: objects[i].VersionPurgeStatus,
|
2020-06-12 23:04:01 -04:00
|
|
|
}
|
|
|
|
}
|
2020-03-06 16:44:24 -05:00
|
|
|
|
2019-05-13 15:25:49 -04:00
|
|
|
// Initialize list of errors.
|
2020-06-12 23:04:01 -04:00
|
|
|
var delObjErrs = make([][]error, len(storageDisks))
|
|
|
|
|
|
|
|
var wg sync.WaitGroup
|
|
|
|
// Remove versions in bulk for each disk
|
|
|
|
for index, disk := range storageDisks {
|
2020-03-11 11:56:36 -04:00
|
|
|
wg.Add(1)
|
|
|
|
go func(index int, disk StorageAPI) {
|
|
|
|
defer wg.Done()
|
2020-11-29 00:15:45 -05:00
|
|
|
if disk == nil {
|
|
|
|
delObjErrs[index] = make([]error, len(versions))
|
|
|
|
for i := range versions {
|
|
|
|
delObjErrs[index][i] = errDiskNotFound
|
|
|
|
}
|
|
|
|
return
|
|
|
|
}
|
2020-09-04 12:45:06 -04:00
|
|
|
delObjErrs[index] = disk.DeleteVersions(ctx, bucket, versions)
|
2020-06-12 23:04:01 -04:00
|
|
|
}(index, disk)
|
2019-05-13 15:25:49 -04:00
|
|
|
}
|
|
|
|
|
2020-03-11 11:56:36 -04:00
|
|
|
wg.Wait()
|
|
|
|
|
2019-05-13 15:25:49 -04:00
|
|
|
// Reduce errors for each object
|
|
|
|
for objIndex := range objects {
|
2020-06-12 23:04:01 -04:00
|
|
|
diskErrs := make([]error, len(storageDisks))
|
2020-03-11 11:56:36 -04:00
|
|
|
// Iterate over disks to fetch the error
|
|
|
|
// of deleting of the current object
|
2019-05-13 15:25:49 -04:00
|
|
|
for i := range delObjErrs {
|
2020-03-11 11:56:36 -04:00
|
|
|
// delObjErrs[i] is not nil when disks[i] is also not nil
|
2019-05-13 15:25:49 -04:00
|
|
|
if delObjErrs[i] != nil {
|
2020-09-02 03:19:03 -04:00
|
|
|
diskErrs[i] = delObjErrs[i][objIndex]
|
2019-05-13 15:25:49 -04:00
|
|
|
}
|
|
|
|
}
|
2020-11-29 00:15:45 -05:00
|
|
|
err := reduceWriteQuorumErrs(ctx, diskErrs, objectOpIgnoredErrs, writeQuorums[objIndex])
|
|
|
|
if objects[objIndex].VersionID != "" {
|
|
|
|
errs[objIndex] = toObjectErr(err, bucket, objects[objIndex].ObjectName, objects[objIndex].VersionID)
|
|
|
|
} else {
|
|
|
|
errs[objIndex] = toObjectErr(err, bucket, objects[objIndex].ObjectName)
|
|
|
|
}
|
|
|
|
|
2020-06-12 23:04:01 -04:00
|
|
|
if errs[objIndex] == nil {
|
2020-10-28 12:18:35 -04:00
|
|
|
ObjectPathUpdated(pathJoin(bucket, objects[objIndex].ObjectName))
|
2020-11-29 00:15:45 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
if versions[objIndex].Deleted {
|
|
|
|
dobjects[objIndex] = DeletedObject{
|
|
|
|
DeleteMarker: versions[objIndex].Deleted,
|
|
|
|
DeleteMarkerVersionID: versions[objIndex].VersionID,
|
|
|
|
DeleteMarkerMTime: DeleteMarkerMTime{versions[objIndex].ModTime},
|
|
|
|
DeleteMarkerReplicationStatus: versions[objIndex].DeleteMarkerReplicationStatus,
|
|
|
|
ObjectName: versions[objIndex].Name,
|
|
|
|
VersionPurgeStatus: versions[objIndex].VersionPurgeStatus,
|
|
|
|
PurgeTransitioned: objects[objIndex].PurgeTransitioned,
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
dobjects[objIndex] = DeletedObject{
|
|
|
|
ObjectName: versions[objIndex].Name,
|
|
|
|
VersionID: versions[objIndex].VersionID,
|
|
|
|
VersionPurgeStatus: versions[objIndex].VersionPurgeStatus,
|
|
|
|
DeleteMarkerReplicationStatus: versions[objIndex].DeleteMarkerReplicationStatus,
|
|
|
|
PurgeTransitioned: objects[objIndex].PurgeTransitioned,
|
2019-05-13 15:25:49 -04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-06-29 16:07:26 -04:00
|
|
|
// Check failed deletes across multiple objects
|
|
|
|
for _, version := range versions {
|
|
|
|
// Check if there is any offline disk and add it to the MRF list
|
|
|
|
for _, disk := range storageDisks {
|
2020-12-22 12:16:43 -05:00
|
|
|
if disk != nil && disk.IsOnline() {
|
|
|
|
// Skip attempted heal on online disks.
|
|
|
|
continue
|
2020-06-29 16:07:26 -04:00
|
|
|
}
|
2020-12-22 12:16:43 -05:00
|
|
|
|
|
|
|
// all other direct versionId references we should
|
|
|
|
// ensure no dangling file is left over.
|
|
|
|
er.addPartial(bucket, version.Name, version.VersionID)
|
|
|
|
break
|
2020-06-29 16:07:26 -04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-06-12 23:04:01 -04:00
|
|
|
return dobjects, errs
|
2019-05-13 15:25:49 -04:00
|
|
|
}
|
|
|
|
|
2016-06-01 19:43:31 -04:00
|
|
|
// DeleteObject - deletes an object, this call doesn't necessary reply
|
|
|
|
// any error as it is not necessary for the handler to reply back a
|
|
|
|
// response to the client request.
|
2020-06-12 23:04:01 -04:00
|
|
|
func (er erasureObjects) DeleteObject(ctx context.Context, bucket, object string, opts ObjectOptions) (objInfo ObjectInfo, err error) {
|
2020-11-19 21:43:58 -05:00
|
|
|
versionFound := true
|
2020-12-11 19:58:15 -05:00
|
|
|
objInfo = ObjectInfo{VersionID: opts.VersionID} // version id needed in Delete API response.
|
2020-10-08 20:47:21 -04:00
|
|
|
goi, gerr := er.GetObjectInfo(ctx, bucket, object, opts)
|
|
|
|
if gerr != nil && goi.Name == "" {
|
|
|
|
switch gerr.(type) {
|
|
|
|
case InsufficientReadQuorum:
|
|
|
|
return objInfo, InsufficientWriteQuorum{}
|
|
|
|
}
|
2020-11-19 21:43:58 -05:00
|
|
|
// For delete marker replication, versionID being replicated will not exist on disk
|
|
|
|
if opts.DeleteMarker {
|
|
|
|
versionFound = false
|
|
|
|
} else {
|
|
|
|
return objInfo, gerr
|
|
|
|
}
|
2020-10-08 20:47:21 -04:00
|
|
|
}
|
2020-09-14 18:57:13 -04:00
|
|
|
// Acquire a write lock before deleting the object.
|
2020-11-04 11:25:42 -05:00
|
|
|
lk := er.NewNSLock(bucket, object)
|
|
|
|
if err = lk.GetLock(ctx, globalDeleteOperationTimeout); err != nil {
|
2020-09-14 18:57:13 -04:00
|
|
|
return ObjectInfo{}, err
|
|
|
|
}
|
|
|
|
defer lk.Unlock()
|
|
|
|
|
2020-06-12 23:04:01 -04:00
|
|
|
storageDisks := er.getDisks()
|
|
|
|
writeQuorum := len(storageDisks)/2 + 1
|
2020-11-19 21:43:58 -05:00
|
|
|
var markDelete bool
|
|
|
|
// Determine whether to mark object deleted for replication
|
|
|
|
if goi.VersionID != "" {
|
|
|
|
markDelete = true
|
|
|
|
}
|
|
|
|
// Default deleteMarker to true if object is under versioning
|
|
|
|
deleteMarker := true
|
|
|
|
if gerr == nil {
|
|
|
|
deleteMarker = goi.VersionID != ""
|
|
|
|
}
|
|
|
|
if opts.VersionID != "" {
|
|
|
|
// case where replica version needs to be deleted on target cluster
|
|
|
|
if versionFound && opts.DeleteMarkerReplicationStatus == replication.Replica.String() {
|
|
|
|
markDelete = false
|
|
|
|
}
|
|
|
|
if opts.VersionPurgeStatus.Empty() && opts.DeleteMarkerReplicationStatus == "" {
|
|
|
|
markDelete = false
|
|
|
|
}
|
|
|
|
if opts.DeleteMarker && opts.VersionPurgeStatus == Complete {
|
|
|
|
markDelete = false
|
|
|
|
}
|
|
|
|
// determine if the version represents an object delete
|
|
|
|
// deleteMarker = true
|
|
|
|
if versionFound && !goi.DeleteMarker { // implies a versioned delete of object
|
|
|
|
deleteMarker = false
|
|
|
|
}
|
|
|
|
}
|
2018-08-29 16:36:19 -04:00
|
|
|
|
2020-11-19 21:43:58 -05:00
|
|
|
modTime := opts.MTime
|
|
|
|
if opts.MTime.IsZero() {
|
|
|
|
modTime = UTCNow()
|
|
|
|
}
|
|
|
|
if markDelete {
|
2020-11-12 15:10:59 -05:00
|
|
|
if opts.Versioned || opts.VersionSuspended {
|
2020-10-06 15:03:57 -04:00
|
|
|
fi := FileInfo{
|
2020-11-19 21:43:58 -05:00
|
|
|
Name: object,
|
|
|
|
Deleted: deleteMarker,
|
|
|
|
MarkDeleted: markDelete,
|
|
|
|
ModTime: modTime,
|
|
|
|
DeleteMarkerReplicationStatus: opts.DeleteMarkerReplicationStatus,
|
|
|
|
VersionPurgeStatus: opts.VersionPurgeStatus,
|
2020-10-06 15:03:57 -04:00
|
|
|
}
|
|
|
|
if opts.Versioned {
|
|
|
|
fi.VersionID = mustGetUUID()
|
2020-11-19 21:43:58 -05:00
|
|
|
if opts.VersionID != "" {
|
|
|
|
fi.VersionID = opts.VersionID
|
|
|
|
}
|
2020-10-06 15:03:57 -04:00
|
|
|
}
|
2020-11-12 15:12:09 -05:00
|
|
|
fi.TransitionStatus = opts.TransitionStatus
|
|
|
|
|
2020-10-06 15:03:57 -04:00
|
|
|
// versioning suspended means we add `null`
|
|
|
|
// version as delete marker
|
|
|
|
// Add delete marker, since we don't have any version specified explicitly.
|
2020-11-19 21:43:58 -05:00
|
|
|
// Or if a particular version id needs to be replicated.
|
2020-10-06 15:03:57 -04:00
|
|
|
if err = er.deleteObjectVersion(ctx, bucket, object, writeQuorum, fi); err != nil {
|
|
|
|
return objInfo, toObjectErr(err, bucket, object)
|
2020-06-12 23:04:01 -04:00
|
|
|
}
|
2020-10-06 15:03:57 -04:00
|
|
|
return fi.ToObjectInfo(bucket, object), nil
|
2018-08-31 16:16:35 -04:00
|
|
|
}
|
2018-08-29 16:36:19 -04:00
|
|
|
}
|
2016-06-17 01:18:43 -04:00
|
|
|
|
2020-06-12 23:04:01 -04:00
|
|
|
// Delete the object version on all disks.
|
|
|
|
if err = er.deleteObjectVersion(ctx, bucket, object, writeQuorum, FileInfo{
|
2020-11-19 21:43:58 -05:00
|
|
|
Name: object,
|
|
|
|
VersionID: opts.VersionID,
|
|
|
|
MarkDeleted: markDelete,
|
|
|
|
Deleted: deleteMarker,
|
|
|
|
ModTime: modTime,
|
|
|
|
DeleteMarkerReplicationStatus: opts.DeleteMarkerReplicationStatus,
|
|
|
|
VersionPurgeStatus: opts.VersionPurgeStatus,
|
2020-11-12 15:12:09 -05:00
|
|
|
TransitionStatus: opts.TransitionStatus,
|
2020-06-12 23:04:01 -04:00
|
|
|
}); err != nil {
|
|
|
|
return objInfo, toObjectErr(err, bucket, object)
|
2016-06-07 14:35:03 -04:00
|
|
|
}
|
|
|
|
|
2020-06-29 16:07:26 -04:00
|
|
|
for _, disk := range storageDisks {
|
2020-12-22 12:16:43 -05:00
|
|
|
if disk != nil && disk.IsOnline() {
|
|
|
|
continue
|
2020-06-29 16:07:26 -04:00
|
|
|
}
|
2020-12-22 12:16:43 -05:00
|
|
|
er.addPartial(bucket, object, opts.VersionID)
|
|
|
|
break
|
2020-06-29 16:07:26 -04:00
|
|
|
}
|
|
|
|
|
2020-11-19 21:43:58 -05:00
|
|
|
return ObjectInfo{
|
|
|
|
Bucket: bucket,
|
|
|
|
Name: object,
|
|
|
|
VersionID: opts.VersionID,
|
|
|
|
VersionPurgeStatus: opts.VersionPurgeStatus,
|
|
|
|
ReplicationStatus: replication.StatusType(opts.DeleteMarkerReplicationStatus),
|
|
|
|
}, nil
|
2018-02-09 18:19:30 -05:00
|
|
|
}
|
2020-01-15 21:30:32 -05:00
|
|
|
|
2020-06-29 16:07:26 -04:00
|
|
|
// Send the successful but partial upload/delete, however ignore
|
2020-01-15 21:30:32 -05:00
|
|
|
// if the channel is blocked by other items.
|
2020-06-29 16:07:26 -04:00
|
|
|
func (er erasureObjects) addPartial(bucket, object, versionID string) {
|
2020-01-15 21:30:32 -05:00
|
|
|
select {
|
2020-06-29 16:07:26 -04:00
|
|
|
case er.mrfOpCh <- partialOperation{bucket: bucket, object: object, versionID: versionID}:
|
2020-01-15 21:30:32 -05:00
|
|
|
default:
|
|
|
|
}
|
|
|
|
}
|
2020-01-20 11:45:59 -05:00
|
|
|
|
2020-05-23 14:09:35 -04:00
|
|
|
// PutObjectTags - replace or add tags to an existing object
|
2020-06-12 23:04:01 -04:00
|
|
|
func (er erasureObjects) PutObjectTags(ctx context.Context, bucket, object string, tags string, opts ObjectOptions) error {
|
|
|
|
disks := er.getDisks()
|
2020-01-20 11:45:59 -05:00
|
|
|
|
|
|
|
// Read metadata associated with the object from all disks.
|
2021-01-07 22:27:31 -05:00
|
|
|
metaArr, errs := readAllFileInfo(ctx, disks, bucket, object, opts.VersionID, false)
|
2020-06-12 23:04:01 -04:00
|
|
|
|
2020-12-01 14:59:03 -05:00
|
|
|
readQuorum, writeQuorum, err := objectQuorumFromMeta(ctx, er, metaArr, errs)
|
2020-06-12 23:04:01 -04:00
|
|
|
if err != nil {
|
|
|
|
return toObjectErr(err, bucket, object)
|
|
|
|
}
|
2020-01-20 11:45:59 -05:00
|
|
|
|
2020-06-12 23:04:01 -04:00
|
|
|
// List all online disks.
|
2020-10-28 03:09:15 -04:00
|
|
|
onlineDisks, modTime := listOnlineDisks(disks, metaArr, errs)
|
2020-06-12 23:04:01 -04:00
|
|
|
|
|
|
|
// Pick latest valid metadata.
|
|
|
|
fi, err := pickValidFileInfo(ctx, metaArr, modTime, readQuorum)
|
2020-01-20 11:45:59 -05:00
|
|
|
if err != nil {
|
2020-05-05 17:18:13 -04:00
|
|
|
return toObjectErr(err, bucket, object)
|
2020-01-20 11:45:59 -05:00
|
|
|
}
|
2020-06-12 23:04:01 -04:00
|
|
|
if fi.Deleted {
|
|
|
|
if opts.VersionID == "" {
|
|
|
|
return toObjectErr(errFileNotFound, bucket, object)
|
|
|
|
}
|
|
|
|
return toObjectErr(errMethodNotAllowed, bucket, object)
|
|
|
|
}
|
|
|
|
|
2020-11-20 12:10:48 -05:00
|
|
|
onlineDisks, metaArr = shuffleDisksAndPartsMetadataByIndex(onlineDisks, metaArr, fi.Erasure.Distribution)
|
|
|
|
for i, metaFi := range metaArr {
|
|
|
|
if metaFi.IsValid() {
|
|
|
|
// clean fi.Meta of tag key, before updating the new tags
|
|
|
|
delete(metaFi.Metadata, xhttp.AmzObjectTagging)
|
|
|
|
// Don't update for empty tags
|
|
|
|
if tags != "" {
|
|
|
|
metaFi.Metadata[xhttp.AmzObjectTagging] = tags
|
|
|
|
}
|
|
|
|
for k, v := range opts.UserDefined {
|
|
|
|
metaFi.Metadata[k] = v
|
|
|
|
}
|
|
|
|
metaArr[i].Metadata = metaFi.Metadata
|
2020-11-19 14:50:22 -05:00
|
|
|
}
|
2020-01-20 11:45:59 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
tempObj := mustGetUUID()
|
|
|
|
|
2020-06-12 23:04:01 -04:00
|
|
|
// Write unique `xl.meta` for each disk.
|
2020-10-28 03:09:15 -04:00
|
|
|
if onlineDisks, err = writeUniqueFileInfo(ctx, onlineDisks, minioMetaTmpBucket, tempObj, metaArr, writeQuorum); err != nil {
|
2020-01-20 11:45:59 -05:00
|
|
|
return toObjectErr(err, bucket, object)
|
|
|
|
}
|
|
|
|
|
2020-06-12 23:04:01 -04:00
|
|
|
// Atomically rename metadata from tmp location to destination for each disk.
|
2020-10-28 03:09:15 -04:00
|
|
|
if _, err = renameFileInfo(ctx, onlineDisks, minioMetaTmpBucket, tempObj, bucket, object, writeQuorum); err != nil {
|
2020-01-20 11:45:59 -05:00
|
|
|
return toObjectErr(err, bucket, object)
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2020-10-28 12:18:35 -04:00
|
|
|
// updateObjectMeta will update the metadata of a file.
|
|
|
|
func (er erasureObjects) updateObjectMeta(ctx context.Context, bucket, object string, meta map[string]string, opts ObjectOptions) error {
|
|
|
|
if len(meta) == 0 {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
disks := er.getDisks()
|
|
|
|
|
|
|
|
// Read metadata associated with the object from all disks.
|
2021-01-07 22:27:31 -05:00
|
|
|
metaArr, errs := readAllFileInfo(ctx, disks, bucket, object, opts.VersionID, false)
|
2020-10-28 12:18:35 -04:00
|
|
|
|
2020-12-01 14:59:03 -05:00
|
|
|
readQuorum, writeQuorum, err := objectQuorumFromMeta(ctx, er, metaArr, errs)
|
2020-10-28 12:18:35 -04:00
|
|
|
if err != nil {
|
|
|
|
return toObjectErr(err, bucket, object)
|
|
|
|
}
|
|
|
|
|
|
|
|
// List all online disks.
|
|
|
|
_, modTime := listOnlineDisks(disks, metaArr, errs)
|
|
|
|
|
|
|
|
// Pick latest valid metadata.
|
|
|
|
fi, err := pickValidFileInfo(ctx, metaArr, modTime, readQuorum)
|
|
|
|
if err != nil {
|
|
|
|
return toObjectErr(err, bucket, object)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Update metadata
|
|
|
|
for k, v := range meta {
|
|
|
|
fi.Metadata[k] = v
|
|
|
|
}
|
|
|
|
|
|
|
|
if fi.Deleted {
|
|
|
|
if opts.VersionID == "" {
|
|
|
|
return toObjectErr(errFileNotFound, bucket, object)
|
|
|
|
}
|
|
|
|
return toObjectErr(errMethodNotAllowed, bucket, object)
|
|
|
|
}
|
|
|
|
|
|
|
|
for i := range metaArr {
|
|
|
|
if errs[i] != nil {
|
|
|
|
// Avoid disks where loading metadata fail
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
|
|
|
metaArr[i].Metadata = fi.Metadata
|
|
|
|
}
|
|
|
|
|
|
|
|
tempObj := mustGetUUID()
|
|
|
|
|
|
|
|
// Write unique `xl.meta` for each disk.
|
|
|
|
if disks, err = writeUniqueFileInfo(ctx, disks, minioMetaTmpBucket, tempObj, metaArr, writeQuorum); err != nil {
|
|
|
|
return toObjectErr(err, bucket, object)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Atomically rename metadata from tmp location to destination for each disk.
|
|
|
|
if _, err = renameFileInfo(ctx, disks, minioMetaTmpBucket, tempObj, bucket, object, writeQuorum); err != nil {
|
|
|
|
return toObjectErr(err, bucket, object)
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2020-05-23 14:09:35 -04:00
|
|
|
// DeleteObjectTags - delete object tags from an existing object
|
2020-06-12 23:04:01 -04:00
|
|
|
func (er erasureObjects) DeleteObjectTags(ctx context.Context, bucket, object string, opts ObjectOptions) error {
|
|
|
|
return er.PutObjectTags(ctx, bucket, object, "", opts)
|
2020-01-20 11:45:59 -05:00
|
|
|
}
|
|
|
|
|
2020-05-23 14:09:35 -04:00
|
|
|
// GetObjectTags - get object tags from an existing object
|
2020-06-12 23:04:01 -04:00
|
|
|
func (er erasureObjects) GetObjectTags(ctx context.Context, bucket, object string, opts ObjectOptions) (*tags.Tags, error) {
|
2020-01-20 11:45:59 -05:00
|
|
|
// GetObjectInfo will return tag value as well
|
2020-06-12 23:04:01 -04:00
|
|
|
oi, err := er.GetObjectInfo(ctx, bucket, object, opts)
|
2020-01-20 11:45:59 -05:00
|
|
|
if err != nil {
|
2020-05-05 17:18:13 -04:00
|
|
|
return nil, err
|
2020-01-20 11:45:59 -05:00
|
|
|
}
|
|
|
|
|
2020-05-05 17:18:13 -04:00
|
|
|
return tags.ParseObjectTags(oi.UserTags)
|
2020-01-20 11:45:59 -05:00
|
|
|
}
|