Skip to content

Commit cd4a877

Browse files
authored
Merge pull request #174 from aliyun/release_1.91.6
release 1.91.6
2 parents 5ebbc2b + 460ffb6 commit cd4a877

27 files changed

+637
-361
lines changed

.gitignore

+1
Original file line numberDiff line numberDiff line change
@@ -81,6 +81,7 @@ src/ossfs
8181
src/test_curl_util
8282
src/test_page_list
8383
src/test_string_util
84+
src/test_mempool
8485
test/chaos-http-proxy-*
8586
test/junk_data
8687
test/s3proxy-*

ChangeLog

+12
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,17 @@
11
ChangeLog for OSSFS
22
------------------
3+
## v1.91.6 (17/03/2025)
4+
- Print information to suggest users to mount with OSS V4 signature.
5+
- Optimized the prefetch-task generation logic under direct-read mode to better performance.
6+
- Improved concurrent IO performance.
7+
- Modify the folder size in the mount point to 4096.
8+
- Fixed a bug that in use_cache mode, when the ram user does not have bucket write permission, the cache file is overwritten incorrectly, resulting in data read errors.
9+
- Optimized the printing of error information when specifying an incorrect passwd-file.
10+
- Optimized the printing of log information when instance_name is specified.
11+
- Enable noobj_cache by default.
12+
- Force objects ending with '/' to be recognized as folders.
13+
- Optimized memory usage in direct reading mode.
14+
315
## v1.91.5 (25/12/2024)
416
- Fixed some bugs that users get unexpected results on mounting with specific policies for the bucket/prefix set.
517
- Fixed a bug that ossfs take a file as existing if HeadObj returns 403.

configure.ac

+1-1
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@
2020
dnl Process this file with autoconf to produce a configure script.
2121

2222
AC_PREREQ(2.59)
23-
AC_INIT(ossfs, 1.91.5)
23+
AC_INIT(ossfs, 1.91.6)
2424
AC_CONFIG_HEADER([config.h])
2525

2626
AC_CANONICAL_SYSTEM

doc/man/ossfs.1.in

+4-5
Original file line numberDiff line numberDiff line change
@@ -139,11 +139,10 @@ specify expire time (seconds) for entries in the stat cache and symbolic link ca
139139
specify expire time (seconds) for entries in the stat cache and symbolic link cache. This expire time is based on the time from the last access time of those cache.
140140
This option is exclusive with stat_cache_expire, and is left for compatibility with older versions.
141141
.TP
142-
\fB\-o\fR enable_noobj_cache (default is disable)
143-
enable cache entries for the object which does not exist.
144-
ossfs always has to check whether file (or sub directory) exists under object (path) when ossfs does some command, since ossfs has recognized a directory which does not exist and has files or sub directories under itself.
145-
It increases ListBucket request and makes performance bad.
146-
You can specify this option for performance, ossfs memorizes in stat cache that the object (file or directory) does not exist.
142+
\fB\-o\fR disable_noobj_cache (default is enable)
143+
By default ossfs memorizes when an object does not exist up until the stat cache timeout.
144+
This caching can cause staleness for applications.
145+
If disabled, ossfs will not memorize objects and may cause extra HeadObject requests and reduce performance.
147146
.TP
148147
\fB\-o\fR no_check_certificate (by default this option is disabled)
149148
server certificate won't be checked against the available certificate authorities.

scripts/ossfs-coverage-centos7.sh

+1
Original file line numberDiff line numberDiff line change
@@ -37,6 +37,7 @@ DBGLEVEL=debug ALL_TESTS=1 OSSFS_CREDENTIALS_FILE=/root/.passwd-ossfs TEST_BUCKE
3737
${OSSFS_SOURCE_DIR}/src/test_page_list
3838
${OSSFS_SOURCE_DIR}/src/test_curl_util
3939
${OSSFS_SOURCE_DIR}/src/test_string_util
40+
${OSSFS_SOURCE_DIR}/src/test_mempool
4041

4142
gcovr -r ${OSSFS_SOURCE_DIR}/src --html-details -o ${OSSFS_SOURCE_DIR}/coverage_html/coverage.html
4243

src/Makefile.am

+10-3
Original file line numberDiff line numberDiff line change
@@ -58,7 +58,8 @@ ossfs_SOURCES = \
5858
autolock.cpp \
5959
common_auth.cpp \
6060
threadpoolman.cpp \
61-
direct_reader.cpp
61+
direct_reader.cpp \
62+
memorypool.cpp
6263
if USE_SSL_OPENSSL
6364
ossfs_SOURCES += openssl_auth.cpp
6465
endif
@@ -74,7 +75,8 @@ ossfs_LDADD = $(DEPS_LIBS)
7475
noinst_PROGRAMS = \
7576
test_curl_util \
7677
test_page_list \
77-
test_string_util
78+
test_string_util \
79+
test_mempool
7880

7981
test_curl_util_SOURCES = common_auth.cpp curl_util.cpp string_util.cpp test_curl_util.cpp s3fs_global.cpp s3fs_logger.cpp
8082
if USE_SSL_OPENSSL
@@ -98,10 +100,15 @@ test_page_list_SOURCES = \
98100

99101
test_string_util_SOURCES = string_util.cpp test_string_util.cpp s3fs_logger.cpp
100102

103+
test_mempool_SOURCES = memorypool.cpp test_mempool.cpp s3fs_logger.cpp s3fs_global.cpp string_util.cpp
104+
test_mempool_LDFLAGS = -pthread
105+
test_mempool_LDADD = $(DEPS_LIBS)
106+
101107
TESTS = \
102108
test_curl_util \
103109
test_page_list \
104-
test_string_util
110+
test_string_util \
111+
test_mempool
105112

106113
clang-tidy:
107114
clang-tidy $(ossfs_SOURCES) -- $(DEPS_CFLAGS) $(CPPFLAGS)

src/cache.cpp

+6-2
Original file line numberDiff line numberDiff line change
@@ -149,7 +149,11 @@ bool convert_header_to_stat(const std::string& strpath, const headers_t& meta, s
149149
}
150150

151151
// size
152-
pst->st_size = get_size(meta);
152+
if (S_ISDIR(pst->st_mode)) {
153+
pst->st_size = 4096;
154+
} else {
155+
pst->st_size = get_size(meta);
156+
}
153157

154158
//change symlink to S_IFREG
155159
if (noextendedmeta && S_ISLNK(pst->st_mode) && !is_check_meta(pst->st_size, check_size_meta)) {
@@ -217,7 +221,7 @@ pthread_mutex_t StatCache::stat_cache_lock;
217221
//-------------------------------------------------------------------
218222
// Constructor/Destructor
219223
//-------------------------------------------------------------------
220-
StatCache::StatCache() : IsExpireTime(true), IsExpireIntervalType(false), ExpireTime(15 * 60), CacheSize(100000), IsCacheNoObject(false),
224+
StatCache::StatCache() : IsExpireTime(true), IsExpireIntervalType(false), ExpireTime(15 * 60), CacheSize(100000), IsCacheNoObject(true),
221225
IsNoExtendedMeta(false), CheckSizeForMeta(0LL)
222226
{
223227
if(this == StatCache::getStatCacheData()){

src/curl.cpp

-230
Original file line numberDiff line numberDiff line change
@@ -868,41 +868,6 @@ sse_type_t S3fsCurl::SetSseType(sse_type_t type)
868868
return old;
869869
}
870870

871-
bool S3fsCurl::SetSseCKeys(const char* filepath)
872-
{
873-
if(!filepath){
874-
S3FS_PRN_ERR("SSE-C keys filepath is empty.");
875-
return false;
876-
}
877-
struct stat st;
878-
if(0 != stat(filepath, &st)){
879-
S3FS_PRN_ERR("could not open use_sse keys file(%s).", filepath);
880-
return false;
881-
}
882-
if(st.st_mode & (S_IXUSR | S_IRWXG | S_IRWXO)){
883-
S3FS_PRN_ERR("use_sse keys file %s should be 0600 permissions.", filepath);
884-
return false;
885-
}
886-
887-
S3fsCurl::sseckeys.clear();
888-
889-
std::ifstream ssefs(filepath);
890-
if(!ssefs.good()){
891-
S3FS_PRN_ERR("Could not open SSE-C keys file(%s).", filepath);
892-
return false;
893-
}
894-
895-
std::string line;
896-
while(getline(ssefs, line)){
897-
S3fsCurl::PushbackSseKeys(line);
898-
}
899-
if(S3fsCurl::sseckeys.empty()){
900-
S3FS_PRN_ERR("There is no SSE Key in file(%s).", filepath);
901-
return false;
902-
}
903-
return true;
904-
}
905-
906871
bool S3fsCurl::SetSseKmsid(const char* kmsid)
907872
{
908873
if(!kmsid || '\0' == kmsid[0]){
@@ -2630,201 +2595,6 @@ int S3fsCurl::RequestPerform(bool dontAddAuthHeaders /*=false*/)
26302595
return result;
26312596
}
26322597

2633-
//
2634-
// Returns the Amazon AWS signature for the given parameters.
2635-
//
2636-
// @param method e.g., "GET"
2637-
// @param content_type e.g., "application/x-directory"
2638-
// @param date e.g., get_date_rfc850()
2639-
// @param resource e.g., "/pub"
2640-
//
2641-
std::string S3fsCurl::CalcSignatureV2(const std::string& method, const std::string& strMD5, const std::string& content_type, const std::string& date, const std::string& resource, const std::string& secret_access_key, const std::string& access_token)
2642-
{
2643-
std::string Signature;
2644-
std::string StringToSign;
2645-
2646-
if(!access_token.empty()){
2647-
requestHeaders = curl_slist_sort_insert(requestHeaders, "x-oss-security-token", access_token.c_str());
2648-
}
2649-
2650-
StringToSign += method + "\n";
2651-
StringToSign += strMD5 + "\n"; // md5
2652-
StringToSign += content_type + "\n";
2653-
StringToSign += date + "\n";
2654-
StringToSign += get_canonical_headers(requestHeaders, true);
2655-
StringToSign += resource;
2656-
2657-
const void* key = secret_access_key.data();
2658-
size_t key_len = secret_access_key.size();
2659-
const unsigned char* sdata = reinterpret_cast<const unsigned char*>(StringToSign.data());
2660-
size_t sdata_len = StringToSign.size();
2661-
unsigned char* md = NULL;
2662-
unsigned int md_len = 0;;
2663-
2664-
s3fs_HMAC(key, key_len, sdata, sdata_len, &md, &md_len);
2665-
2666-
char* base64;
2667-
if(NULL == (base64 = s3fs_base64(md, md_len))){
2668-
delete[] md;
2669-
return std::string(""); // ENOMEM
2670-
}
2671-
delete[] md;
2672-
2673-
Signature = base64;
2674-
delete[] base64;
2675-
2676-
return Signature;
2677-
}
2678-
2679-
std::string S3fsCurl::CalcSignature(const std::string& method, const std::string& canonical_uri, const std::string& query_string, const std::string& strdate, const std::string& payload_hash, const std::string& date8601, const std::string& secret_access_key, const std::string& access_token)
2680-
{
2681-
std::string Signature, StringCQ, StringToSign;
2682-
std::string uriencode;
2683-
2684-
if(!access_token.empty()){
2685-
requestHeaders = curl_slist_sort_insert(requestHeaders, "x-oss-security-token", access_token.c_str());
2686-
}
2687-
2688-
uriencode = urlEncode(canonical_uri);
2689-
StringCQ = method + "\n";
2690-
if(method == "HEAD" || method == "PUT" || method == "DELETE"){
2691-
StringCQ += uriencode + "\n";
2692-
}else if(method == "GET" && uriencode.empty()){
2693-
StringCQ +="/\n";
2694-
}else if(method == "GET" && is_prefix(uriencode.c_str(), "/")){
2695-
StringCQ += uriencode +"\n";
2696-
}else if(method == "GET" && !is_prefix(uriencode.c_str(), "/")){
2697-
StringCQ += "/\n" + urlEncode2(canonical_uri) +"\n";
2698-
}else if(method == "POST"){
2699-
StringCQ += uriencode + "\n";
2700-
}
2701-
StringCQ += urlEncode2(query_string) + "\n";
2702-
StringCQ += get_canonical_headers(requestHeaders) + "\n";
2703-
StringCQ += get_sorted_header_keys(requestHeaders) + "\n";
2704-
StringCQ += payload_hash;
2705-
2706-
std::string kSecret = "AWS4" + secret_access_key;
2707-
unsigned char *kDate, *kRegion, *kService, *kSigning, *sRequest = NULL;
2708-
unsigned int kDate_len,kRegion_len, kService_len, kSigning_len, sRequest_len = 0;
2709-
2710-
s3fs_HMAC256(kSecret.c_str(), kSecret.size(), reinterpret_cast<const unsigned char*>(strdate.data()), strdate.size(), &kDate, &kDate_len);
2711-
s3fs_HMAC256(kDate, kDate_len, reinterpret_cast<const unsigned char*>(endpoint.c_str()), endpoint.size(), &kRegion, &kRegion_len);
2712-
s3fs_HMAC256(kRegion, kRegion_len, reinterpret_cast<const unsigned char*>("s3"), sizeof("s3") - 1, &kService, &kService_len);
2713-
s3fs_HMAC256(kService, kService_len, reinterpret_cast<const unsigned char*>("aws4_request"), sizeof("aws4_request") - 1, &kSigning, &kSigning_len);
2714-
delete[] kDate;
2715-
delete[] kRegion;
2716-
delete[] kService;
2717-
2718-
const unsigned char* cRequest = reinterpret_cast<const unsigned char*>(StringCQ.c_str());
2719-
size_t cRequest_len = StringCQ.size();
2720-
s3fs_sha256(cRequest, cRequest_len, &sRequest, &sRequest_len);
2721-
2722-
StringToSign = "AWS4-HMAC-SHA256\n";
2723-
StringToSign += date8601 + "\n";
2724-
StringToSign += strdate + "/" + endpoint + "/s3/aws4_request\n";
2725-
StringToSign += s3fs_hex_lower(sRequest, sRequest_len);
2726-
delete[] sRequest;
2727-
2728-
const unsigned char* cscope = reinterpret_cast<const unsigned char*>(StringToSign.c_str());
2729-
size_t cscope_len = StringToSign.size();
2730-
unsigned char* md = NULL;
2731-
unsigned int md_len = 0;
2732-
2733-
s3fs_HMAC256(kSigning, kSigning_len, cscope, cscope_len, &md, &md_len);
2734-
delete[] kSigning;
2735-
2736-
Signature = s3fs_hex_lower(md, md_len);
2737-
delete[] md;
2738-
2739-
return Signature;
2740-
}
2741-
2742-
void S3fsCurl::insertV4Headers(const std::string& access_key_id, const std::string& secret_access_key, const std::string& access_token)
2743-
{
2744-
std::string server_path = type == REQTYPE_LISTBUCKET ? "/" : path;
2745-
std::string payload_hash;
2746-
switch (type) {
2747-
case REQTYPE_PUT:
2748-
if(GetUnsignedPayload()){
2749-
payload_hash = "UNSIGNED-PAYLOAD";
2750-
}else{
2751-
payload_hash = s3fs_sha256_hex_fd(b_infile == NULL ? -1 : fileno(b_infile), 0, -1);
2752-
}
2753-
break;
2754-
2755-
case REQTYPE_COMPLETEMULTIPOST:
2756-
{
2757-
size_t cRequest_len = strlen(reinterpret_cast<const char *>(b_postdata));
2758-
unsigned char* sRequest = NULL;
2759-
unsigned int sRequest_len = 0;
2760-
s3fs_sha256(b_postdata, cRequest_len, &sRequest, &sRequest_len);
2761-
payload_hash = s3fs_hex_lower(sRequest, sRequest_len);
2762-
delete[] sRequest;
2763-
break;
2764-
}
2765-
2766-
case REQTYPE_UPLOADMULTIPOST:
2767-
if(GetUnsignedPayload()){
2768-
payload_hash = "UNSIGNED-PAYLOAD";
2769-
}else{
2770-
payload_hash = s3fs_sha256_hex_fd(partdata.fd, partdata.startpos, partdata.size);
2771-
}
2772-
break;
2773-
default:
2774-
break;
2775-
}
2776-
2777-
if(b_infile != NULL && payload_hash.empty()){
2778-
S3FS_PRN_ERR("Failed to make SHA256.");
2779-
// TODO: propagate error
2780-
}
2781-
2782-
S3FS_PRN_INFO3("computing signature [%s] [%s] [%s] [%s]", op.c_str(), server_path.c_str(), query_string.c_str(), payload_hash.c_str());
2783-
std::string strdate;
2784-
std::string date8601;
2785-
get_date_sigv3(strdate, date8601);
2786-
2787-
std::string contentSHA256 = payload_hash.empty() ? EMPTY_PAYLOAD_HASH : payload_hash;
2788-
const std::string realpath = pathrequeststyle ? "/" + S3fsCred::GetBucket() + server_path : server_path;
2789-
2790-
//string canonical_headers, signed_headers;
2791-
requestHeaders = curl_slist_sort_insert(requestHeaders, "host", get_bucket_host().c_str());
2792-
requestHeaders = curl_slist_sort_insert(requestHeaders, "x-oss-content-sha256", contentSHA256.c_str());
2793-
requestHeaders = curl_slist_sort_insert(requestHeaders, "x-oss-date", date8601.c_str());
2794-
2795-
if (S3fsCurl::IsRequesterPays()) {
2796-
requestHeaders = curl_slist_sort_insert(requestHeaders, "x-oss-request-payer", "requester");
2797-
}
2798-
2799-
if(!S3fsCurl::IsPublicBucket()){
2800-
std::string Signature = CalcSignature(op, realpath, query_string + (type == REQTYPE_PREMULTIPOST || type == REQTYPE_MULTILIST ? "=" : ""), strdate, contentSHA256, date8601, secret_access_key, access_token);
2801-
std::string auth = "AWS4-HMAC-SHA256 Credential=" + access_key_id + "/" + strdate + "/" + endpoint + "/s3/aws4_request, SignedHeaders=" + get_sorted_header_keys(requestHeaders) + ", Signature=" + Signature;
2802-
requestHeaders = curl_slist_sort_insert(requestHeaders, "Authorization", auth.c_str());
2803-
}
2804-
}
2805-
2806-
void S3fsCurl::insertV2Headers(const std::string& access_key_id, const std::string& secret_access_key, const std::string& access_token)
2807-
{
2808-
std::string resource;
2809-
std::string turl;
2810-
std::string server_path = type == REQTYPE_LISTBUCKET ? "/" : path;
2811-
MakeUrlResource(server_path.c_str(), resource, turl);
2812-
if(!query_string.empty() && type != REQTYPE_CHKBUCKET && type != REQTYPE_LISTBUCKET){
2813-
resource += "?" + query_string;
2814-
}
2815-
2816-
std::string date = get_date_rfc850();
2817-
requestHeaders = curl_slist_sort_insert(requestHeaders, "Date", date.c_str());
2818-
if(op != "PUT" && op != "POST"){
2819-
requestHeaders = curl_slist_sort_insert(requestHeaders, "Content-Type", NULL);
2820-
}
2821-
2822-
if(!S3fsCurl::IsPublicBucket()){
2823-
std::string Signature = CalcSignatureV2(op, get_header_value(requestHeaders, "Content-MD5"), get_header_value(requestHeaders, "Content-Type"), date, resource, secret_access_key, access_token);
2824-
requestHeaders = curl_slist_sort_insert(requestHeaders, "Authorization", std::string("AWS " + access_key_id + ":" + Signature).c_str());
2825-
}
2826-
}
2827-
28282598
void S3fsCurl::insertIBMIAMHeaders(const std::string& access_key_id, const std::string& access_token)
28292599
{
28302600
requestHeaders = curl_slist_sort_insert(requestHeaders, "Authorization", ("Bearer " + access_token).c_str());

src/curl.h

-5
Original file line numberDiff line numberDiff line change
@@ -256,12 +256,8 @@ class S3fsCurl
256256
bool ResetHandle(bool lock_already_held = false);
257257
bool RemakeHandle();
258258
bool ClearInternalData();
259-
void insertV4Headers(const std::string& access_key_id, const std::string& secret_access_key, const std::string& access_token);
260-
void insertV2Headers(const std::string& access_key_id, const std::string& secret_access_key, const std::string& access_token);
261259
void insertIBMIAMHeaders(const std::string& access_key_id, const std::string& access_token);
262260
void insertAuthHeaders();
263-
std::string CalcSignatureV2(const std::string& method, const std::string& strMD5, const std::string& content_type, const std::string& date, const std::string& resource, const std::string& secret_access_key, const std::string& access_token);
264-
std::string CalcSignature(const std::string& method, const std::string& canonical_uri, const std::string& query_string, const std::string& strdate, const std::string& payload_hash, const std::string& date8601, const std::string& secret_access_key, const std::string& access_token);
265261
int UploadMultipartPostSetup(const char* tpath, int part_num, const std::string& upload_id);
266262
int CopyMultipartPostSetup(const char* from, const char* to, int part_num, const std::string& upload_id, headers_t& meta);
267263
bool UploadMultipartPostComplete();
@@ -307,7 +303,6 @@ class S3fsCurl
307303
static bool IsSseCType() { return (sse_type_t::SSE_C == S3fsCurl::ssetype); }
308304
static bool IsSseKmsType() { return (sse_type_t::SSE_KMS == S3fsCurl::ssetype); }
309305
static bool FinalCheckSse();
310-
static bool SetSseCKeys(const char* filepath);
311306
static bool SetSseKmsid(const char* kmsid);
312307
static bool IsSetSseKmsId() { return !S3fsCurl::ssekmsid.empty(); }
313308
static const char* GetSseKmsId() { return S3fsCurl::ssekmsid.c_str(); }

0 commit comments

Comments
 (0)