aboutsummaryrefslogtreecommitdiff
path: root/weed/server/volume_server_fasthttp_handlers.go
diff options
context:
space:
mode:
Diffstat (limited to 'weed/server/volume_server_fasthttp_handlers.go')
-rw-r--r--weed/server/volume_server_fasthttp_handlers.go81
1 files changed, 81 insertions, 0 deletions
diff --git a/weed/server/volume_server_fasthttp_handlers.go b/weed/server/volume_server_fasthttp_handlers.go
new file mode 100644
index 000000000..bfd574e40
--- /dev/null
+++ b/weed/server/volume_server_fasthttp_handlers.go
@@ -0,0 +1,81 @@
+package weed_server
+
+import (
+ "strings"
+
+ "github.com/valyala/fasthttp"
+
+ "github.com/chrislusf/seaweedfs/weed/glog"
+ "github.com/chrislusf/seaweedfs/weed/security"
+ "github.com/chrislusf/seaweedfs/weed/stats"
+)
+
+func (vs *VolumeServer) HandleFastHTTP(ctx *fasthttp.RequestCtx) {
+
+ switch string(ctx.Method()) {
+ case "GET", "HEAD":
+ vs.fastGetOrHeadHandler(ctx)
+ case "DELETE":
+ stats.DeleteRequest()
+ vs.guard.WhiteList(vs.DeleteHandler)(ctx)
+ case "PUT", "POST":
+ stats.WriteRequest()
+ vs.guard.WhiteList(vs.fastPostHandler)(ctx)
+ }
+
+}
+
+func (vs *VolumeServer) publicReadOnlyHandler(ctx *fasthttp.RequestCtx) {
+ switch string(ctx.Method()) {
+ case "GET":
+ stats.ReadRequest()
+ vs.fastGetOrHeadHandler(ctx)
+ case "HEAD":
+ stats.ReadRequest()
+ vs.fastGetOrHeadHandler(ctx)
+ }
+}
+
+func (vs *VolumeServer) maybeCheckJwtAuthorization(ctx *fasthttp.RequestCtx, vid, fid string, isWrite bool) bool {
+
+ var signingKey security.SigningKey
+
+ if isWrite {
+ if len(vs.guard.SigningKey) == 0 {
+ return true
+ } else {
+ signingKey = vs.guard.SigningKey
+ }
+ } else {
+ if len(vs.guard.ReadSigningKey) == 0 {
+ return true
+ } else {
+ signingKey = vs.guard.ReadSigningKey
+ }
+ }
+
+ tokenStr := security.GetJwt(ctx)
+ if tokenStr == "" {
+ glog.V(1).Infof("missing jwt from %s", ctx.RemoteAddr())
+ return false
+ }
+
+ token, err := security.DecodeJwt(signingKey, tokenStr)
+ if err != nil {
+ glog.V(1).Infof("jwt verification error from %s: %v", ctx.RemoteAddr(), err)
+ return false
+ }
+ if !token.Valid {
+ glog.V(1).Infof("jwt invalid from %s: %v", ctx.RemoteAddr(), tokenStr)
+ return false
+ }
+
+ if sc, ok := token.Claims.(*security.SeaweedFileIdClaims); ok {
+ if sepIndex := strings.LastIndex(fid, "_"); sepIndex > 0 {
+ fid = fid[:sepIndex]
+ }
+ return sc.Fid == vid+","+fid
+ }
+ glog.V(1).Infof("unexpected jwt from %s: %v", ctx.RemoteAddr(), tokenStr)
+ return false
+}