mirror of
https://github.com/minio/minio.git
synced 2024-12-25 22:55:54 -05:00
d2f42d830f
In distributed mode, use REST API to acquire and manage locks instead of RPC. RPC has been completely removed from MinIO source. Since we are moving from RPC to REST, we cannot use rolling upgrades as the nodes that have not yet been upgraded cannot talk to the ones that have been upgraded. We expect all minio processes on all nodes to be stopped and then the upgrade process to be completed. Also force http1.1 for inter-node communication
224 lines
5.9 KiB
Go
224 lines
5.9 KiB
Go
/*
|
|
* MinIO Cloud Storage, (C) 2019 MinIO, Inc.
|
|
*
|
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
* you may not use this file except in compliance with the License.
|
|
* You may obtain a copy of the License at
|
|
*
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
*
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
* See the License for the specific language governing permissions and
|
|
* limitations under the License.
|
|
*/
|
|
|
|
package cmd
|
|
|
|
import (
|
|
"bytes"
|
|
"context"
|
|
"crypto/tls"
|
|
"encoding/gob"
|
|
"errors"
|
|
"io"
|
|
"sync"
|
|
"time"
|
|
|
|
"net/url"
|
|
|
|
"github.com/minio/dsync"
|
|
"github.com/minio/minio/cmd/http"
|
|
"github.com/minio/minio/cmd/logger"
|
|
"github.com/minio/minio/cmd/rest"
|
|
xnet "github.com/minio/minio/pkg/net"
|
|
)
|
|
|
|
// lockRESTClient is authenticable lock REST client
|
|
type lockRESTClient struct {
|
|
lockSync sync.RWMutex
|
|
host *xnet.Host
|
|
restClient *rest.Client
|
|
serverURL *url.URL
|
|
connected bool
|
|
timer *time.Timer
|
|
}
|
|
|
|
// ServerAddr - dsync.NetLocker interface compatible method.
|
|
func (client *lockRESTClient) ServerAddr() string {
|
|
return client.serverURL.Host
|
|
}
|
|
|
|
// ServiceEndpoint - dsync.NetLocker interface compatible method.
|
|
func (client *lockRESTClient) ServiceEndpoint() string {
|
|
return client.serverURL.Path
|
|
}
|
|
|
|
// check if the host is up or if it is fine
|
|
// to make a call to the lock rest server.
|
|
func (client *lockRESTClient) isHostUp() bool {
|
|
client.lockSync.Lock()
|
|
defer client.lockSync.Unlock()
|
|
|
|
if client.connected {
|
|
return true
|
|
}
|
|
select {
|
|
case <-client.timer.C:
|
|
client.connected = true
|
|
client.timer = nil
|
|
return true
|
|
default:
|
|
}
|
|
return false
|
|
}
|
|
|
|
// Mark the host as down if there is a Network error.
|
|
func (client *lockRESTClient) markHostDown() {
|
|
client.lockSync.Lock()
|
|
defer client.lockSync.Unlock()
|
|
|
|
if !client.connected {
|
|
return
|
|
}
|
|
client.connected = false
|
|
client.timer = time.NewTimer(defaultRetryUnit * 5)
|
|
}
|
|
|
|
// Wrapper to restClient.Call to handle network errors, in case of network error the connection is marked disconnected
|
|
// permanently. The only way to restore the connection is at the xl-sets layer by xlsets.monitorAndConnectEndpoints()
|
|
// after verifying format.json
|
|
func (client *lockRESTClient) call(method string, values url.Values, body io.Reader, length int64) (respBody io.ReadCloser, err error) {
|
|
|
|
if !client.isHostUp() {
|
|
return nil, errors.New("Lock rest server node is down")
|
|
}
|
|
|
|
if values == nil {
|
|
values = make(url.Values)
|
|
}
|
|
|
|
respBody, err = client.restClient.Call(method, values, body, length)
|
|
|
|
if err == nil {
|
|
return respBody, nil
|
|
}
|
|
|
|
if isNetworkError(err) {
|
|
client.markHostDown()
|
|
}
|
|
|
|
return nil, err
|
|
}
|
|
|
|
// Stringer provides a canonicalized representation of node.
|
|
func (client *lockRESTClient) String() string {
|
|
return client.host.String()
|
|
}
|
|
|
|
// IsOnline - returns whether REST client failed to connect or not.
|
|
func (client *lockRESTClient) IsOnline() bool {
|
|
return client.connected
|
|
}
|
|
|
|
// Close - marks the client as closed.
|
|
func (client *lockRESTClient) Close() error {
|
|
client.connected = false
|
|
client.restClient.Close()
|
|
return nil
|
|
}
|
|
|
|
// restCall makes a call to the lock REST server.
|
|
func (client *lockRESTClient) restCall(call string, args dsync.LockArgs) (reply bool, err error) {
|
|
|
|
reader := bytes.NewBuffer(make([]byte, 0, 2048))
|
|
err = gob.NewEncoder(reader).Encode(args)
|
|
if err != nil {
|
|
return false, err
|
|
}
|
|
respBody, err := client.call(call, nil, reader, -1)
|
|
if err != nil {
|
|
return false, err
|
|
}
|
|
|
|
var resp lockResponse
|
|
defer http.DrainBody(respBody)
|
|
err = gob.NewDecoder(respBody).Decode(&resp)
|
|
|
|
if err != nil || !resp.Success {
|
|
reqInfo := &logger.ReqInfo{}
|
|
reqInfo.AppendTags("resource", args.Resource)
|
|
reqInfo.AppendTags("serveraddress", args.ServerAddr)
|
|
reqInfo.AppendTags("serviceendpoint", args.ServiceEndpoint)
|
|
reqInfo.AppendTags("source", args.Source)
|
|
reqInfo.AppendTags("uid", args.UID)
|
|
ctx := logger.SetReqInfo(context.Background(), reqInfo)
|
|
logger.LogIf(ctx, err)
|
|
}
|
|
return resp.Success, err
|
|
}
|
|
|
|
// RLock calls read lock REST API.
|
|
func (client *lockRESTClient) RLock(args dsync.LockArgs) (reply bool, err error) {
|
|
return client.restCall(lockRESTMethodRLock, args)
|
|
}
|
|
|
|
// Lock calls lock REST API.
|
|
func (client *lockRESTClient) Lock(args dsync.LockArgs) (reply bool, err error) {
|
|
return client.restCall(lockRESTMethodLock, args)
|
|
}
|
|
|
|
// RUnlock calls read unlock REST API.
|
|
func (client *lockRESTClient) RUnlock(args dsync.LockArgs) (reply bool, err error) {
|
|
return client.restCall(lockRESTMethodRUnlock, args)
|
|
}
|
|
|
|
// Unlock calls write unlock RPC.
|
|
func (client *lockRESTClient) Unlock(args dsync.LockArgs) (reply bool, err error) {
|
|
return client.restCall(lockRESTMethodUnlock, args)
|
|
}
|
|
|
|
// ForceUnlock calls force unlock RPC.
|
|
func (client *lockRESTClient) ForceUnlock(args dsync.LockArgs) (reply bool, err error) {
|
|
return client.restCall(lockRESTMethodForceUnlock, args)
|
|
}
|
|
|
|
// Expired calls expired RPC.
|
|
func (client *lockRESTClient) Expired(args dsync.LockArgs) (reply bool, err error) {
|
|
return client.restCall(lockRESTMethodExpired, args)
|
|
}
|
|
|
|
// Returns a lock rest client.
|
|
func newlockRESTClient(peer *xnet.Host) *lockRESTClient {
|
|
|
|
scheme := "http"
|
|
if globalIsSSL {
|
|
scheme = "https"
|
|
}
|
|
|
|
serverURL := &url.URL{
|
|
Scheme: scheme,
|
|
Host: peer.String(),
|
|
Path: lockRESTPath,
|
|
}
|
|
|
|
var tlsConfig *tls.Config
|
|
if globalIsSSL {
|
|
tlsConfig = &tls.Config{
|
|
ServerName: peer.Name,
|
|
RootCAs: globalRootCAs,
|
|
NextProtos: []string{"http/1.1"}, // Force http1.1
|
|
}
|
|
}
|
|
|
|
restClient, err := rest.NewClient(serverURL, tlsConfig, rest.DefaultRESTTimeout, newAuthToken)
|
|
|
|
if err != nil {
|
|
logger.LogIf(context.Background(), err)
|
|
return &lockRESTClient{serverURL: serverURL, host: peer, restClient: restClient, connected: false, timer: time.NewTimer(defaultRetryUnit * 5)}
|
|
}
|
|
|
|
return &lockRESTClient{serverURL: serverURL, host: peer, restClient: restClient, connected: true}
|
|
}
|