forked from TrueCloudLab/frostfs-node
100 lines
2.7 KiB
Go
100 lines
2.7 KiB
Go
package getsvc
|
|
|
|
import (
|
|
"context"
|
|
"errors"
|
|
|
|
"git.frostfs.info/TrueCloudLab/frostfs-api-go/v2/pkg/tracing"
|
|
"git.frostfs.info/TrueCloudLab/frostfs-node/internal/logs"
|
|
"git.frostfs.info/TrueCloudLab/frostfs-node/pkg/core/client"
|
|
apistatus "git.frostfs.info/TrueCloudLab/frostfs-sdk-go/client/status"
|
|
objectSDK "git.frostfs.info/TrueCloudLab/frostfs-sdk-go/object"
|
|
"go.uber.org/zap"
|
|
)
|
|
|
|
func (exec *execCtx) processNode(ctx context.Context, info client.NodeInfo) bool {
|
|
ctx, span := tracing.StartSpanFromContext(ctx, "getService.processNode")
|
|
defer span.End()
|
|
|
|
exec.log.Debug(logs.ProcessingNode)
|
|
|
|
rs, ok := exec.getRemoteStorage(info)
|
|
if !ok {
|
|
return true
|
|
}
|
|
|
|
obj, err := exec.getRemote(ctx, rs, info)
|
|
|
|
var errSplitInfo *objectSDK.SplitInfoError
|
|
var errRemoved *apistatus.ObjectAlreadyRemoved
|
|
var errOutOfRange *apistatus.ObjectOutOfRange
|
|
|
|
switch {
|
|
default:
|
|
var errNotFound apistatus.ObjectNotFound
|
|
|
|
exec.status = statusUndefined
|
|
exec.err = errNotFound
|
|
|
|
exec.log.Debug(logs.GetRemoteCallFailed,
|
|
zap.String("error", err.Error()),
|
|
)
|
|
case err == nil:
|
|
exec.status = statusOK
|
|
exec.err = nil
|
|
|
|
// both object and err are nil only if the original
|
|
// request was forwarded to another node and the object
|
|
// has already been streamed to the requesting party
|
|
if obj != nil {
|
|
exec.collectedObject = obj
|
|
exec.writeCollectedObject(ctx)
|
|
}
|
|
case errors.As(err, &errRemoved):
|
|
exec.status = statusINHUMED
|
|
exec.err = errRemoved
|
|
case errors.As(err, &errOutOfRange):
|
|
exec.status = statusOutOfRange
|
|
exec.err = errOutOfRange
|
|
case errors.As(err, &errSplitInfo):
|
|
exec.status = statusVIRTUAL
|
|
mergeSplitInfo(exec.splitInfo(), errSplitInfo.SplitInfo())
|
|
exec.err = objectSDK.NewSplitInfoError(exec.infoSplit)
|
|
}
|
|
|
|
return exec.status != statusUndefined
|
|
}
|
|
|
|
func (exec *execCtx) getRemote(ctx context.Context, rs remoteStorage, info client.NodeInfo) (*objectSDK.Object, error) {
|
|
if exec.isForwardingEnabled() {
|
|
return rs.ForwardRequest(ctx, info, exec.prm.forwarder)
|
|
}
|
|
|
|
key, err := exec.key()
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
prm := RemoteRequestParams{
|
|
Epoch: exec.curProcEpoch,
|
|
TTL: exec.prm.common.TTL(),
|
|
PrivateKey: key,
|
|
SessionToken: exec.prm.common.SessionToken(),
|
|
BearerToken: exec.prm.common.BearerToken(),
|
|
XHeaders: exec.prm.common.XHeaders(),
|
|
IsRaw: exec.isRaw(),
|
|
}
|
|
|
|
if exec.headOnly() {
|
|
return rs.Head(ctx, exec.address(), prm)
|
|
}
|
|
// we don't specify payload writer because we accumulate
|
|
// the object locally (even huge).
|
|
if rng := exec.ctxRange(); rng != nil {
|
|
// Current spec allows other storage node to deny access,
|
|
// fallback to GET here.
|
|
return rs.Range(ctx, exec.address(), rng, prm)
|
|
}
|
|
|
|
return rs.Get(ctx, exec.address(), prm)
|
|
}
|