mirror of
https://github.com/minio/minio.git
synced 2025-01-12 07:23:23 -05:00
re-use remote transports in Peer,Storage,Locker clients (#10788)
use one transport for internode communication
This commit is contained in:
parent
d8e07f2c41
commit
4c773f7068
@ -18,7 +18,6 @@ package cmd
|
|||||||
|
|
||||||
import (
|
import (
|
||||||
"context"
|
"context"
|
||||||
"crypto/tls"
|
|
||||||
"encoding/json"
|
"encoding/json"
|
||||||
"fmt"
|
"fmt"
|
||||||
"io"
|
"io"
|
||||||
@ -224,16 +223,7 @@ func newBootstrapRESTClient(endpoint Endpoint) *bootstrapRESTClient {
|
|||||||
Path: bootstrapRESTPath,
|
Path: bootstrapRESTPath,
|
||||||
}
|
}
|
||||||
|
|
||||||
var tlsConfig *tls.Config
|
restClient := rest.NewClient(serverURL, globalInternodeTransport, newAuthToken)
|
||||||
if globalIsSSL {
|
|
||||||
tlsConfig = &tls.Config{
|
|
||||||
ServerName: endpoint.Hostname(),
|
|
||||||
RootCAs: globalRootCAs,
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
trFn := newInternodeHTTPTransport(tlsConfig, rest.DefaultTimeout)
|
|
||||||
restClient := rest.NewClient(serverURL, trFn, newAuthToken)
|
|
||||||
restClient.HealthCheckFn = nil
|
restClient.HealthCheckFn = nil
|
||||||
|
|
||||||
return &bootstrapRESTClient{endpoint: endpoint, restClient: restClient}
|
return &bootstrapRESTClient{endpoint: endpoint, restClient: restClient}
|
||||||
|
@ -840,7 +840,7 @@ func getOnlineProxyEndpointIdx() int {
|
|||||||
}
|
}
|
||||||
|
|
||||||
// GetProxyEndpoints - get all endpoints that can be used to proxy list request.
|
// GetProxyEndpoints - get all endpoints that can be used to proxy list request.
|
||||||
func GetProxyEndpoints(endpointServerSets EndpointServerSets) ([]ProxyEndpoint, error) {
|
func GetProxyEndpoints(endpointServerSets EndpointServerSets) []ProxyEndpoint {
|
||||||
var proxyEps []ProxyEndpoint
|
var proxyEps []ProxyEndpoint
|
||||||
|
|
||||||
proxyEpSet := set.NewStringSet()
|
proxyEpSet := set.NewStringSet()
|
||||||
@ -874,7 +874,7 @@ func GetProxyEndpoints(endpointServerSets EndpointServerSets) ([]ProxyEndpoint,
|
|||||||
})
|
})
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
return proxyEps, nil
|
return proxyEps
|
||||||
}
|
}
|
||||||
|
|
||||||
func updateDomainIPs(endPoints set.StringSet) {
|
func updateDomainIPs(endPoints set.StringSet) {
|
||||||
|
@ -18,6 +18,7 @@ package cmd
|
|||||||
|
|
||||||
import (
|
import (
|
||||||
"crypto/x509"
|
"crypto/x509"
|
||||||
|
"net/http"
|
||||||
"os"
|
"os"
|
||||||
"time"
|
"time"
|
||||||
|
|
||||||
@ -275,6 +276,8 @@ var (
|
|||||||
|
|
||||||
globalProxyEndpoints []ProxyEndpoint
|
globalProxyEndpoints []ProxyEndpoint
|
||||||
|
|
||||||
|
globalInternodeTransport http.RoundTripper
|
||||||
|
|
||||||
globalDNSCache *xhttp.DNSCache
|
globalDNSCache *xhttp.DNSCache
|
||||||
// Add new variable global values here.
|
// Add new variable global values here.
|
||||||
)
|
)
|
||||||
|
@ -19,7 +19,6 @@ package cmd
|
|||||||
import (
|
import (
|
||||||
"bytes"
|
"bytes"
|
||||||
"context"
|
"context"
|
||||||
"crypto/tls"
|
|
||||||
"errors"
|
"errors"
|
||||||
"io"
|
"io"
|
||||||
"net/url"
|
"net/url"
|
||||||
@ -152,22 +151,13 @@ func newlockRESTClient(endpoint Endpoint) *lockRESTClient {
|
|||||||
Path: pathJoin(lockRESTPrefix, endpoint.Path, lockRESTVersion),
|
Path: pathJoin(lockRESTPrefix, endpoint.Path, lockRESTVersion),
|
||||||
}
|
}
|
||||||
|
|
||||||
var tlsConfig *tls.Config
|
restClient := rest.NewClient(serverURL, globalInternodeTransport, newAuthToken)
|
||||||
if globalIsSSL {
|
|
||||||
tlsConfig = &tls.Config{
|
|
||||||
ServerName: endpoint.Hostname(),
|
|
||||||
RootCAs: globalRootCAs,
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
trFn := newInternodeHTTPTransport(tlsConfig, rest.DefaultTimeout)
|
|
||||||
restClient := rest.NewClient(serverURL, trFn, newAuthToken)
|
|
||||||
restClient.ExpectTimeouts = true
|
restClient.ExpectTimeouts = true
|
||||||
restClient.HealthCheckFn = func() bool {
|
restClient.HealthCheckFn = func() bool {
|
||||||
ctx, cancel := context.WithTimeout(GlobalContext, restClient.HealthCheckTimeout)
|
ctx, cancel := context.WithTimeout(GlobalContext, restClient.HealthCheckTimeout)
|
||||||
// Instantiate a new rest client for healthcheck
|
// Instantiate a new rest client for healthcheck
|
||||||
// to avoid recursive healthCheckFn()
|
// to avoid recursive healthCheckFn()
|
||||||
respBody, err := rest.NewClient(serverURL, trFn, newAuthToken).Call(ctx, lockRESTMethodHealth, nil, nil, -1)
|
respBody, err := rest.NewClient(serverURL, globalInternodeTransport, newAuthToken).Call(ctx, lockRESTMethodHealth, nil, nil, -1)
|
||||||
xhttp.DrainBody(respBody)
|
xhttp.DrainBody(respBody)
|
||||||
cancel()
|
cancel()
|
||||||
var ne *rest.NetworkError
|
var ne *rest.NetworkError
|
||||||
|
@ -29,6 +29,7 @@ func TestLockRESTlient(t *testing.T) {
|
|||||||
if err != nil {
|
if err != nil {
|
||||||
t.Fatalf("unexpected error %v", err)
|
t.Fatalf("unexpected error %v", err)
|
||||||
}
|
}
|
||||||
|
|
||||||
lkClient := newlockRESTClient(endpoint)
|
lkClient := newlockRESTClient(endpoint)
|
||||||
if !lkClient.IsOnline() {
|
if !lkClient.IsOnline() {
|
||||||
t.Fatalf("unexpected error. connection failed")
|
t.Fatalf("unexpected error. connection failed")
|
||||||
|
@ -300,14 +300,12 @@ func LogIf(ctx context.Context, err error, errKind ...interface{}) {
|
|||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
if errors.Is(err, context.Canceled) || errors.Is(err, http.ErrServerClosed) {
|
if errors.Is(err, context.Canceled) {
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
if e := errors.Unwrap(err); e != nil {
|
if err.Error() == http.ErrServerClosed.Error() || err.Error() == "disk not found" {
|
||||||
if e.Error() == "disk not found" {
|
return
|
||||||
return
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
|
|
||||||
logIf(ctx, err, errKind...)
|
logIf(ctx, err, errKind...)
|
||||||
|
@ -21,7 +21,6 @@ import (
|
|||||||
"errors"
|
"errors"
|
||||||
"net/http"
|
"net/http"
|
||||||
"sync"
|
"sync"
|
||||||
|
|
||||||
"time"
|
"time"
|
||||||
)
|
)
|
||||||
|
|
||||||
@ -83,14 +82,12 @@ func LogOnceIf(ctx context.Context, err error, id interface{}, errKind ...interf
|
|||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
if errors.Is(err, context.Canceled) || errors.Is(err, http.ErrServerClosed) {
|
if errors.Is(err, context.Canceled) {
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
if e := errors.Unwrap(err); e != nil {
|
if err.Error() == http.ErrServerClosed.Error() || err.Error() == "disk not found" {
|
||||||
if e.Error() == "disk not found" {
|
return
|
||||||
return
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
|
|
||||||
logOnce.logOnceIf(ctx, err, id, errKind...)
|
logOnce.logOnceIf(ctx, err, id, errKind...)
|
||||||
|
@ -19,7 +19,6 @@ package cmd
|
|||||||
import (
|
import (
|
||||||
"bytes"
|
"bytes"
|
||||||
"context"
|
"context"
|
||||||
"crypto/tls"
|
|
||||||
"encoding/gob"
|
"encoding/gob"
|
||||||
"errors"
|
"errors"
|
||||||
"fmt"
|
"fmt"
|
||||||
@ -872,23 +871,13 @@ func newPeerRESTClient(peer *xnet.Host) *peerRESTClient {
|
|||||||
Path: peerRESTPath,
|
Path: peerRESTPath,
|
||||||
}
|
}
|
||||||
|
|
||||||
var tlsConfig *tls.Config
|
restClient := rest.NewClient(serverURL, globalInternodeTransport, newAuthToken)
|
||||||
if globalIsSSL {
|
|
||||||
tlsConfig = &tls.Config{
|
|
||||||
ServerName: peer.Name,
|
|
||||||
RootCAs: globalRootCAs,
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
trFn := newInternodeHTTPTransport(tlsConfig, rest.DefaultTimeout)
|
|
||||||
restClient := rest.NewClient(serverURL, trFn, newAuthToken)
|
|
||||||
|
|
||||||
// Construct a new health function.
|
// Construct a new health function.
|
||||||
restClient.HealthCheckFn = func() bool {
|
restClient.HealthCheckFn = func() bool {
|
||||||
ctx, cancel := context.WithTimeout(GlobalContext, restClient.HealthCheckTimeout)
|
ctx, cancel := context.WithTimeout(GlobalContext, restClient.HealthCheckTimeout)
|
||||||
// Instantiate a new rest client for healthcheck
|
// Instantiate a new rest client for healthcheck
|
||||||
// to avoid recursive healthCheckFn()
|
// to avoid recursive healthCheckFn()
|
||||||
respBody, err := rest.NewClient(serverURL, trFn, newAuthToken).Call(ctx, peerRESTMethodHealth, nil, nil, -1)
|
respBody, err := rest.NewClient(serverURL, globalInternodeTransport, newAuthToken).Call(ctx, peerRESTMethodHealth, nil, nil, -1)
|
||||||
xhttp.DrainBody(respBody)
|
xhttp.DrainBody(respBody)
|
||||||
cancel()
|
cancel()
|
||||||
var ne *rest.NetworkError
|
var ne *rest.NetworkError
|
||||||
|
@ -164,10 +164,9 @@ func (c *Client) Close() {
|
|||||||
}
|
}
|
||||||
|
|
||||||
// NewClient - returns new REST client.
|
// NewClient - returns new REST client.
|
||||||
func NewClient(url *url.URL, newCustomTransport func() *http.Transport, newAuthToken func(aud string) string) *Client {
|
func NewClient(url *url.URL, tr http.RoundTripper, newAuthToken func(aud string) string) *Client {
|
||||||
// Transport is exactly same as Go default in https://golang.org/pkg/net/http/#RoundTripper
|
// Transport is exactly same as Go default in https://golang.org/pkg/net/http/#RoundTripper
|
||||||
// except custom DialContext and TLSClientConfig.
|
// except custom DialContext and TLSClientConfig.
|
||||||
tr := newCustomTransport()
|
|
||||||
return &Client{
|
return &Client{
|
||||||
httpClient: &http.Client{Transport: tr},
|
httpClient: &http.Client{Transport: tr},
|
||||||
url: url,
|
url: url,
|
||||||
|
@ -18,6 +18,7 @@ package cmd
|
|||||||
|
|
||||||
import (
|
import (
|
||||||
"context"
|
"context"
|
||||||
|
"crypto/tls"
|
||||||
"errors"
|
"errors"
|
||||||
"fmt"
|
"fmt"
|
||||||
"net"
|
"net"
|
||||||
@ -31,6 +32,7 @@ import (
|
|||||||
"github.com/minio/minio/cmd/config"
|
"github.com/minio/minio/cmd/config"
|
||||||
xhttp "github.com/minio/minio/cmd/http"
|
xhttp "github.com/minio/minio/cmd/http"
|
||||||
"github.com/minio/minio/cmd/logger"
|
"github.com/minio/minio/cmd/logger"
|
||||||
|
"github.com/minio/minio/cmd/rest"
|
||||||
"github.com/minio/minio/pkg/auth"
|
"github.com/minio/minio/pkg/auth"
|
||||||
"github.com/minio/minio/pkg/bucket/bandwidth"
|
"github.com/minio/minio/pkg/bucket/bandwidth"
|
||||||
"github.com/minio/minio/pkg/certs"
|
"github.com/minio/minio/pkg/certs"
|
||||||
@ -137,6 +139,11 @@ func serverHandleCmdArgs(ctx *cli.Context) {
|
|||||||
globalEndpoints, setupType, err = createServerEndpoints(globalCLIContext.Addr, serverCmdArgs(ctx)...)
|
globalEndpoints, setupType, err = createServerEndpoints(globalCLIContext.Addr, serverCmdArgs(ctx)...)
|
||||||
logger.FatalIf(err, "Invalid command line arguments")
|
logger.FatalIf(err, "Invalid command line arguments")
|
||||||
|
|
||||||
|
globalProxyEndpoints = GetProxyEndpoints(globalEndpoints)
|
||||||
|
globalInternodeTransport = newInternodeHTTPTransport(&tls.Config{
|
||||||
|
RootCAs: globalRootCAs,
|
||||||
|
}, rest.DefaultTimeout)()
|
||||||
|
|
||||||
// On macOS, if a process already listens on LOCALIPADDR:PORT, net.Listen() falls back
|
// On macOS, if a process already listens on LOCALIPADDR:PORT, net.Listen() falls back
|
||||||
// to IPv6 address ie minio will start listening on IPv6 address whereas another
|
// to IPv6 address ie minio will start listening on IPv6 address whereas another
|
||||||
// (non-)minio process is listening on IPv4 of given port.
|
// (non-)minio process is listening on IPv4 of given port.
|
||||||
@ -396,10 +403,6 @@ func serverMain(ctx *cli.Context) {
|
|||||||
// Initialize all sub-systems
|
// Initialize all sub-systems
|
||||||
newAllSubsystems()
|
newAllSubsystems()
|
||||||
|
|
||||||
var err error
|
|
||||||
globalProxyEndpoints, err = GetProxyEndpoints(globalEndpoints)
|
|
||||||
logger.FatalIf(err, "Invalid command line arguments")
|
|
||||||
|
|
||||||
globalMinioEndpoint = func() string {
|
globalMinioEndpoint = func() string {
|
||||||
host := globalMinioHost
|
host := globalMinioHost
|
||||||
if host == "" {
|
if host == "" {
|
||||||
|
@ -19,7 +19,6 @@ package cmd
|
|||||||
import (
|
import (
|
||||||
"bytes"
|
"bytes"
|
||||||
"context"
|
"context"
|
||||||
"crypto/tls"
|
|
||||||
"encoding/gob"
|
"encoding/gob"
|
||||||
"encoding/hex"
|
"encoding/hex"
|
||||||
"errors"
|
"errors"
|
||||||
@ -670,22 +669,13 @@ func newStorageRESTClient(endpoint Endpoint, healthcheck bool) *storageRESTClien
|
|||||||
Path: path.Join(storageRESTPrefix, endpoint.Path, storageRESTVersion),
|
Path: path.Join(storageRESTPrefix, endpoint.Path, storageRESTVersion),
|
||||||
}
|
}
|
||||||
|
|
||||||
var tlsConfig *tls.Config
|
restClient := rest.NewClient(serverURL, globalInternodeTransport, newAuthToken)
|
||||||
if globalIsSSL {
|
|
||||||
tlsConfig = &tls.Config{
|
|
||||||
ServerName: endpoint.Hostname(),
|
|
||||||
RootCAs: globalRootCAs,
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
trFn := newInternodeHTTPTransport(tlsConfig, rest.DefaultTimeout)
|
|
||||||
restClient := rest.NewClient(serverURL, trFn, newAuthToken)
|
|
||||||
if healthcheck {
|
if healthcheck {
|
||||||
restClient.HealthCheckFn = func() bool {
|
restClient.HealthCheckFn = func() bool {
|
||||||
ctx, cancel := context.WithTimeout(GlobalContext, restClient.HealthCheckTimeout)
|
ctx, cancel := context.WithTimeout(GlobalContext, restClient.HealthCheckTimeout)
|
||||||
// Instantiate a new rest client for healthcheck
|
// Instantiate a new rest client for healthcheck
|
||||||
// to avoid recursive healthCheckFn()
|
// to avoid recursive healthCheckFn()
|
||||||
respBody, err := rest.NewClient(serverURL, trFn, newAuthToken).Call(ctx, storageRESTMethodHealth, nil, nil, -1)
|
respBody, err := rest.NewClient(serverURL, globalInternodeTransport, newAuthToken).Call(ctx, storageRESTMethodHealth, nil, nil, -1)
|
||||||
xhttp.DrainBody(respBody)
|
xhttp.DrainBody(respBody)
|
||||||
cancel()
|
cancel()
|
||||||
return !errors.Is(err, context.DeadlineExceeded) && toStorageErr(err) != errDiskNotFound
|
return !errors.Is(err, context.DeadlineExceeded) && toStorageErr(err) != errDiskNotFound
|
||||||
|
@ -61,6 +61,7 @@ import (
|
|||||||
"github.com/minio/minio/cmd/crypto"
|
"github.com/minio/minio/cmd/crypto"
|
||||||
xhttp "github.com/minio/minio/cmd/http"
|
xhttp "github.com/minio/minio/cmd/http"
|
||||||
"github.com/minio/minio/cmd/logger"
|
"github.com/minio/minio/cmd/logger"
|
||||||
|
"github.com/minio/minio/cmd/rest"
|
||||||
"github.com/minio/minio/pkg/auth"
|
"github.com/minio/minio/pkg/auth"
|
||||||
"github.com/minio/minio/pkg/bucket/policy"
|
"github.com/minio/minio/pkg/bucket/policy"
|
||||||
"github.com/minio/minio/pkg/hash"
|
"github.com/minio/minio/pkg/hash"
|
||||||
@ -69,6 +70,7 @@ import (
|
|||||||
// TestMain to set up global env.
|
// TestMain to set up global env.
|
||||||
func TestMain(m *testing.M) {
|
func TestMain(m *testing.M) {
|
||||||
flag.Parse()
|
flag.Parse()
|
||||||
|
|
||||||
globalActiveCred = auth.Credentials{
|
globalActiveCred = auth.Credentials{
|
||||||
AccessKey: auth.DefaultAccessKey,
|
AccessKey: auth.DefaultAccessKey,
|
||||||
SecretKey: auth.DefaultSecretKey,
|
SecretKey: auth.DefaultSecretKey,
|
||||||
@ -107,6 +109,8 @@ func TestMain(m *testing.M) {
|
|||||||
|
|
||||||
globalDNSCache = xhttp.NewDNSCache(3*time.Second, 10*time.Second)
|
globalDNSCache = xhttp.NewDNSCache(3*time.Second, 10*time.Second)
|
||||||
|
|
||||||
|
globalInternodeTransport = newInternodeHTTPTransport(nil, rest.DefaultTimeout)()
|
||||||
|
|
||||||
initHelp()
|
initHelp()
|
||||||
|
|
||||||
resetTestGlobals()
|
resetTestGlobals()
|
||||||
|
Loading…
Reference in New Issue
Block a user