fix: remove healthcheck routine for replication targets (#12192)

Bonus also fix a racy lookup on arnsMap() without a
read lock, hold read locks to avoid such race.

moving the healthcheck logic to minio-go
This commit is contained in:
Harshavardhana 2021-04-29 16:41:28 -07:00 committed by GitHub
parent e5ec1325fc
commit c4b21ac7fa
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
2 changed files with 11 additions and 25 deletions

View File

@ -1046,7 +1046,7 @@ func proxyHeadToRepTarget(ctx context.Context, bucket, object string, opts Objec
return nil, oi, false, nil return nil, oi, false, nil
} }
tgt = globalBucketTargetSys.GetRemoteTargetClient(ctx, cfg.RoleArn) tgt = globalBucketTargetSys.GetRemoteTargetClient(ctx, cfg.RoleArn)
if tgt == nil || tgt.isOffline() { if tgt == nil {
return nil, oi, false, fmt.Errorf("target is offline or not configured") return nil, oi, false, fmt.Errorf("target is offline or not configured")
} }
// if proxying explicitly disabled on remote target // if proxying explicitly disabled on remote target

View File

@ -24,7 +24,6 @@ import (
"encoding/json" "encoding/json"
"net/http" "net/http"
"sync" "sync"
"sync/atomic"
"time" "time"
minio "github.com/minio/minio-go/v7" minio "github.com/minio/minio-go/v7"
@ -153,21 +152,27 @@ func (sys *BucketTargetSys) RemoveTarget(ctx context.Context, bucket, arnStr str
if globalIsGateway { if globalIsGateway {
return nil return nil
} }
if !globalIsErasure {
return NotImplemented{Message: "Replication is not implemented in " + getMinioMode()}
}
if arnStr == "" { if arnStr == "" {
return BucketRemoteArnInvalid{Bucket: bucket} return BucketRemoteArnInvalid{Bucket: bucket}
} }
arn, err := madmin.ParseARN(arnStr) arn, err := madmin.ParseARN(arnStr)
if err != nil { if err != nil {
return BucketRemoteArnInvalid{Bucket: bucket} return BucketRemoteArnInvalid{Bucket: bucket}
} }
if arn.Type == madmin.ReplicationService { if arn.Type == madmin.ReplicationService {
if !globalIsErasure {
return NotImplemented{Message: "Replication is not implemented in " + getMinioMode()}
}
// reject removal of remote target if replication configuration is present // reject removal of remote target if replication configuration is present
rcfg, err := getReplicationConfig(ctx, bucket) rcfg, err := getReplicationConfig(ctx, bucket)
if err == nil && rcfg.RoleArn == arnStr { if err == nil && rcfg.RoleArn == arnStr {
if _, ok := sys.arnRemotesMap[arnStr]; ok { sys.RLock()
_, ok := sys.arnRemotesMap[arnStr]
sys.RUnlock()
if ok {
return BucketRemoteRemoveDisallowed{Bucket: bucket} return BucketRemoteRemoveDisallowed{Bucket: bucket}
} }
} }
@ -332,7 +337,6 @@ func (sys *BucketTargetSys) getRemoteTargetClient(tcfg *madmin.BucketTarget) (*T
StorageClass: tcfg.StorageClass, StorageClass: tcfg.StorageClass,
disableProxy: tcfg.DisableProxy, disableProxy: tcfg.DisableProxy,
} }
go tc.healthCheck()
return tc, nil return tc, nil
} }
@ -404,27 +408,9 @@ func parseBucketTargetConfig(bucket string, cdata, cmetadata []byte) (*madmin.Bu
// TargetClient is the struct for remote target client. // TargetClient is the struct for remote target client.
type TargetClient struct { type TargetClient struct {
*miniogo.Client *miniogo.Client
up int32
healthCheckDuration time.Duration healthCheckDuration time.Duration
Bucket string // remote bucket target Bucket string // remote bucket target
replicateSync bool replicateSync bool
StorageClass string // storage class on remote StorageClass string // storage class on remote
disableProxy bool disableProxy bool
} }
func (tc *TargetClient) isOffline() bool {
return atomic.LoadInt32(&tc.up) == 0
}
func (tc *TargetClient) healthCheck() {
for {
_, err := tc.BucketExists(GlobalContext, tc.Bucket)
if err != nil {
atomic.StoreInt32(&tc.up, 0)
time.Sleep(tc.healthCheckDuration)
continue
}
atomic.StoreInt32(&tc.up, 1)
time.Sleep(tc.healthCheckDuration)
}
}