mirror of
				https://github.com/minio/minio.git
				synced 2025-11-04 02:01:05 +01:00 
			
		
		
		
	epoll contention on TCP causes latency build-up when we have high volume ingress. This PR is an attempt to relieve this pressure. upstream issue https://github.com/golang/go/issues/65064 It seems to be a deeper problem; haven't yet tried the fix provide in this issue, but however this change without changing the compiler helps. Of course, this is a workaround for now, hoping for a more comprehensive fix from Go runtime.
		
			
				
	
	
		
			116 lines
		
	
	
		
			3.9 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			116 lines
		
	
	
		
			3.9 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
// Copyright (c) 2015-2021 MinIO, Inc.
 | 
						|
//
 | 
						|
// This file is part of MinIO Object Storage stack
 | 
						|
//
 | 
						|
// This program is free software: you can redistribute it and/or modify
 | 
						|
// it under the terms of the GNU Affero General Public License as published by
 | 
						|
// the Free Software Foundation, either version 3 of the License, or
 | 
						|
// (at your option) any later version.
 | 
						|
//
 | 
						|
// This program is distributed in the hope that it will be useful
 | 
						|
// but WITHOUT ANY WARRANTY; without even the implied warranty of
 | 
						|
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
 | 
						|
// GNU Affero General Public License for more details.
 | 
						|
//
 | 
						|
// You should have received a copy of the GNU Affero General Public License
 | 
						|
// along with this program.  If not, see <http://www.gnu.org/licenses/>.
 | 
						|
 | 
						|
package cmd
 | 
						|
 | 
						|
import (
 | 
						|
	"net/http"
 | 
						|
 | 
						|
	"github.com/minio/minio/internal/grid"
 | 
						|
	"github.com/minio/mux"
 | 
						|
)
 | 
						|
 | 
						|
// Composed function registering routers for only distributed Erasure setup.
 | 
						|
func registerDistErasureRouters(router *mux.Router, endpointServerPools EndpointServerPools) {
 | 
						|
	var (
 | 
						|
		lockGrid   = globalLockGrid.Load()
 | 
						|
		commonGrid = globalGrid.Load()
 | 
						|
	)
 | 
						|
 | 
						|
	// Register storage REST router only if its a distributed setup.
 | 
						|
	registerStorageRESTHandlers(router, endpointServerPools, commonGrid)
 | 
						|
 | 
						|
	// Register peer REST router only if its a distributed setup.
 | 
						|
	registerPeerRESTHandlers(router, commonGrid)
 | 
						|
 | 
						|
	// Register bootstrap REST router for distributed setups.
 | 
						|
	registerBootstrapRESTHandlers(commonGrid)
 | 
						|
 | 
						|
	// Register distributed namespace lock routers.
 | 
						|
	registerLockRESTHandlers(lockGrid)
 | 
						|
 | 
						|
	// Add lock grid to router
 | 
						|
	router.Handle(grid.RouteLockPath, adminMiddleware(lockGrid.Handler(storageServerRequestValidate), noGZFlag, noObjLayerFlag))
 | 
						|
 | 
						|
	// Add grid to router
 | 
						|
	router.Handle(grid.RoutePath, adminMiddleware(commonGrid.Handler(storageServerRequestValidate), noGZFlag, noObjLayerFlag))
 | 
						|
}
 | 
						|
 | 
						|
// List of some generic middlewares which are applied for all incoming requests.
 | 
						|
var globalMiddlewares = []mux.MiddlewareFunc{
 | 
						|
	// set x-amz-request-id header and others
 | 
						|
	addCustomHeadersMiddleware,
 | 
						|
	// The generic tracer needs to be the first middleware to catch all requests
 | 
						|
	// returned early by any other middleware (but after the middleware that
 | 
						|
	// sets the amz request id).
 | 
						|
	httpTracerMiddleware,
 | 
						|
	// Auth middleware verifies incoming authorization headers and routes them
 | 
						|
	// accordingly. Client receives a HTTP error for invalid/unsupported
 | 
						|
	// signatures.
 | 
						|
	//
 | 
						|
	// Validates all incoming requests to have a valid date header.
 | 
						|
	setAuthMiddleware,
 | 
						|
	// Redirect some pre-defined browser request paths to a static location
 | 
						|
	// prefix.
 | 
						|
	setBrowserRedirectMiddleware,
 | 
						|
	// Adds 'crossdomain.xml' policy middleware to serve legacy flash clients.
 | 
						|
	setCrossDomainPolicyMiddleware,
 | 
						|
	// Limits all body and header sizes to a maximum fixed limit
 | 
						|
	setRequestLimitMiddleware,
 | 
						|
	// Validate all the incoming requests.
 | 
						|
	setRequestValidityMiddleware,
 | 
						|
	// Add upload forwarding middleware for site replication
 | 
						|
	setUploadForwardingMiddleware,
 | 
						|
	// Add bucket forwarding middleware
 | 
						|
	setBucketForwardingMiddleware,
 | 
						|
	// Add new middlewares here.
 | 
						|
}
 | 
						|
 | 
						|
// configureServer handler returns final handler for the http server.
 | 
						|
func configureServerHandler(endpointServerPools EndpointServerPools) (http.Handler, error) {
 | 
						|
	// Initialize router. `SkipClean(true)` stops minio/mux from
 | 
						|
	// normalizing URL path minio/minio#3256
 | 
						|
	router := mux.NewRouter().SkipClean(true).UseEncodedPath()
 | 
						|
 | 
						|
	// Initialize distributed NS lock.
 | 
						|
	if globalIsDistErasure {
 | 
						|
		registerDistErasureRouters(router, endpointServerPools)
 | 
						|
	}
 | 
						|
 | 
						|
	// Add Admin router, all APIs are enabled in server mode.
 | 
						|
	registerAdminRouter(router, true)
 | 
						|
 | 
						|
	// Add healthCheck router
 | 
						|
	registerHealthCheckRouter(router)
 | 
						|
 | 
						|
	// Add server metrics router
 | 
						|
	registerMetricsRouter(router)
 | 
						|
 | 
						|
	// Add STS router always.
 | 
						|
	registerSTSRouter(router)
 | 
						|
 | 
						|
	// Add KMS router
 | 
						|
	registerKMSRouter(router)
 | 
						|
 | 
						|
	// Add API router
 | 
						|
	registerAPIRouter(router)
 | 
						|
 | 
						|
	router.Use(globalMiddlewares...)
 | 
						|
 | 
						|
	return router, nil
 | 
						|
}
 |