mirror of
https://github.com/minio/minio.git
synced 2025-04-05 12:20:34 -04:00
fix: remove healthcheck routine for replication targets (#12192)
Bonus also fix a racy lookup on arnsMap() without a read lock, hold read locks to avoid such race. moving the healthcheck logic to minio-go
This commit is contained in:
parent
e5ec1325fc
commit
c4b21ac7fa
@ -1046,7 +1046,7 @@ func proxyHeadToRepTarget(ctx context.Context, bucket, object string, opts Objec
|
|||||||
return nil, oi, false, nil
|
return nil, oi, false, nil
|
||||||
}
|
}
|
||||||
tgt = globalBucketTargetSys.GetRemoteTargetClient(ctx, cfg.RoleArn)
|
tgt = globalBucketTargetSys.GetRemoteTargetClient(ctx, cfg.RoleArn)
|
||||||
if tgt == nil || tgt.isOffline() {
|
if tgt == nil {
|
||||||
return nil, oi, false, fmt.Errorf("target is offline or not configured")
|
return nil, oi, false, fmt.Errorf("target is offline or not configured")
|
||||||
}
|
}
|
||||||
// if proxying explicitly disabled on remote target
|
// if proxying explicitly disabled on remote target
|
||||||
|
@ -24,7 +24,6 @@ import (
|
|||||||
"encoding/json"
|
"encoding/json"
|
||||||
"net/http"
|
"net/http"
|
||||||
"sync"
|
"sync"
|
||||||
"sync/atomic"
|
|
||||||
"time"
|
"time"
|
||||||
|
|
||||||
minio "github.com/minio/minio-go/v7"
|
minio "github.com/minio/minio-go/v7"
|
||||||
@ -153,21 +152,27 @@ func (sys *BucketTargetSys) RemoveTarget(ctx context.Context, bucket, arnStr str
|
|||||||
if globalIsGateway {
|
if globalIsGateway {
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
if !globalIsErasure {
|
||||||
|
return NotImplemented{Message: "Replication is not implemented in " + getMinioMode()}
|
||||||
|
}
|
||||||
|
|
||||||
if arnStr == "" {
|
if arnStr == "" {
|
||||||
return BucketRemoteArnInvalid{Bucket: bucket}
|
return BucketRemoteArnInvalid{Bucket: bucket}
|
||||||
}
|
}
|
||||||
|
|
||||||
arn, err := madmin.ParseARN(arnStr)
|
arn, err := madmin.ParseARN(arnStr)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return BucketRemoteArnInvalid{Bucket: bucket}
|
return BucketRemoteArnInvalid{Bucket: bucket}
|
||||||
}
|
}
|
||||||
|
|
||||||
if arn.Type == madmin.ReplicationService {
|
if arn.Type == madmin.ReplicationService {
|
||||||
if !globalIsErasure {
|
|
||||||
return NotImplemented{Message: "Replication is not implemented in " + getMinioMode()}
|
|
||||||
}
|
|
||||||
// reject removal of remote target if replication configuration is present
|
// reject removal of remote target if replication configuration is present
|
||||||
rcfg, err := getReplicationConfig(ctx, bucket)
|
rcfg, err := getReplicationConfig(ctx, bucket)
|
||||||
if err == nil && rcfg.RoleArn == arnStr {
|
if err == nil && rcfg.RoleArn == arnStr {
|
||||||
if _, ok := sys.arnRemotesMap[arnStr]; ok {
|
sys.RLock()
|
||||||
|
_, ok := sys.arnRemotesMap[arnStr]
|
||||||
|
sys.RUnlock()
|
||||||
|
if ok {
|
||||||
return BucketRemoteRemoveDisallowed{Bucket: bucket}
|
return BucketRemoteRemoveDisallowed{Bucket: bucket}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
@ -332,7 +337,6 @@ func (sys *BucketTargetSys) getRemoteTargetClient(tcfg *madmin.BucketTarget) (*T
|
|||||||
StorageClass: tcfg.StorageClass,
|
StorageClass: tcfg.StorageClass,
|
||||||
disableProxy: tcfg.DisableProxy,
|
disableProxy: tcfg.DisableProxy,
|
||||||
}
|
}
|
||||||
go tc.healthCheck()
|
|
||||||
return tc, nil
|
return tc, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -404,27 +408,9 @@ func parseBucketTargetConfig(bucket string, cdata, cmetadata []byte) (*madmin.Bu
|
|||||||
// TargetClient is the struct for remote target client.
|
// TargetClient is the struct for remote target client.
|
||||||
type TargetClient struct {
|
type TargetClient struct {
|
||||||
*miniogo.Client
|
*miniogo.Client
|
||||||
up int32
|
|
||||||
healthCheckDuration time.Duration
|
healthCheckDuration time.Duration
|
||||||
Bucket string // remote bucket target
|
Bucket string // remote bucket target
|
||||||
replicateSync bool
|
replicateSync bool
|
||||||
StorageClass string // storage class on remote
|
StorageClass string // storage class on remote
|
||||||
disableProxy bool
|
disableProxy bool
|
||||||
}
|
}
|
||||||
|
|
||||||
func (tc *TargetClient) isOffline() bool {
|
|
||||||
return atomic.LoadInt32(&tc.up) == 0
|
|
||||||
}
|
|
||||||
|
|
||||||
func (tc *TargetClient) healthCheck() {
|
|
||||||
for {
|
|
||||||
_, err := tc.BucketExists(GlobalContext, tc.Bucket)
|
|
||||||
if err != nil {
|
|
||||||
atomic.StoreInt32(&tc.up, 0)
|
|
||||||
time.Sleep(tc.healthCheckDuration)
|
|
||||||
continue
|
|
||||||
}
|
|
||||||
atomic.StoreInt32(&tc.up, 1)
|
|
||||||
time.Sleep(tc.healthCheckDuration)
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
Loading…
x
Reference in New Issue
Block a user