2020-03-23 11:40:02 +00:00
|
|
|
package sectorstorage
|
|
|
|
|
|
|
|
import (
|
|
|
|
"context"
|
2020-03-24 18:00:08 +00:00
|
|
|
"errors"
|
2020-03-23 11:40:02 +00:00
|
|
|
"io"
|
|
|
|
"net/http"
|
2020-09-07 10:20:50 +00:00
|
|
|
"sync"
|
2020-03-23 11:40:02 +00:00
|
|
|
|
2022-04-12 00:45:13 +00:00
|
|
|
"github.com/filecoin-project/go-statestore"
|
2020-08-27 21:58:37 +00:00
|
|
|
"github.com/hashicorp/go-multierror"
|
2020-03-23 11:40:02 +00:00
|
|
|
"github.com/mitchellh/go-homedir"
|
2022-04-11 23:22:19 +00:00
|
|
|
|
|
|
|
"github.com/google/uuid"
|
|
|
|
cid "github.com/ipfs/go-cid"
|
|
|
|
logging "github.com/ipfs/go-log/v2"
|
2022-03-16 10:49:48 +00:00
|
|
|
"go.uber.org/multierr"
|
2020-03-23 11:40:02 +00:00
|
|
|
"golang.org/x/xerrors"
|
|
|
|
|
2020-09-07 03:49:10 +00:00
|
|
|
"github.com/filecoin-project/go-state-types/abi"
|
2020-03-23 11:40:02 +00:00
|
|
|
"github.com/filecoin-project/specs-storage/storage"
|
|
|
|
|
2020-08-17 13:26:18 +00:00
|
|
|
"github.com/filecoin-project/lotus/extern/sector-storage/ffiwrapper"
|
2020-08-27 21:58:37 +00:00
|
|
|
"github.com/filecoin-project/lotus/extern/sector-storage/fsutil"
|
2020-08-17 13:26:18 +00:00
|
|
|
"github.com/filecoin-project/lotus/extern/sector-storage/sealtasks"
|
|
|
|
"github.com/filecoin-project/lotus/extern/sector-storage/stores"
|
|
|
|
"github.com/filecoin-project/lotus/extern/sector-storage/storiface"
|
2020-03-23 11:40:02 +00:00
|
|
|
)
|
|
|
|
|
|
|
|
var log = logging.Logger("advmgr")
|
|
|
|
|
2020-03-24 18:00:08 +00:00
|
|
|
var ErrNoWorkers = errors.New("no suitable workers found")
|
|
|
|
|
2020-03-23 11:40:02 +00:00
|
|
|
type Worker interface {
|
2020-09-06 16:47:16 +00:00
|
|
|
storiface.WorkerCalls
|
2020-03-23 11:40:02 +00:00
|
|
|
|
|
|
|
TaskTypes(context.Context) (map[sealtasks.TaskType]struct{}, error)
|
|
|
|
|
|
|
|
// Returns paths accessible to the worker
|
2022-01-18 10:57:04 +00:00
|
|
|
Paths(context.Context) ([]storiface.StoragePath, error)
|
2020-03-23 11:40:02 +00:00
|
|
|
|
2020-04-23 22:16:21 +00:00
|
|
|
Info(context.Context) (storiface.WorkerInfo, error)
|
2020-03-24 23:49:45 +00:00
|
|
|
|
2020-10-18 10:35:44 +00:00
|
|
|
Session(context.Context) (uuid.UUID, error)
|
2020-05-01 18:00:17 +00:00
|
|
|
|
2020-09-16 22:35:09 +00:00
|
|
|
Close() error // TODO: do we need this?
|
2020-03-23 11:40:02 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
type SectorManager interface {
|
2020-03-26 19:34:38 +00:00
|
|
|
ffiwrapper.StorageSealer
|
2020-03-23 11:40:02 +00:00
|
|
|
storage.Prover
|
2020-09-07 14:12:46 +00:00
|
|
|
storiface.WorkerReturn
|
2020-05-16 21:03:29 +00:00
|
|
|
FaultTracker
|
2020-03-23 11:40:02 +00:00
|
|
|
}
|
|
|
|
|
2020-10-18 10:35:44 +00:00
|
|
|
var ClosedWorkerID = uuid.UUID{}
|
2020-03-23 11:40:02 +00:00
|
|
|
|
|
|
|
type Manager struct {
|
|
|
|
ls stores.LocalStorage
|
2022-03-18 18:07:39 +00:00
|
|
|
storage stores.Store
|
2020-03-23 11:40:02 +00:00
|
|
|
localStore *stores.Local
|
|
|
|
remoteHnd *stores.FetchHandler
|
|
|
|
index stores.SectorIndex
|
|
|
|
|
2022-01-14 13:11:04 +00:00
|
|
|
sched *scheduler
|
|
|
|
windowPoStSched *poStScheduler
|
|
|
|
winningPoStSched *poStScheduler
|
2020-03-23 11:40:02 +00:00
|
|
|
|
2022-01-14 13:11:04 +00:00
|
|
|
localProver storage.Prover
|
2020-09-07 10:20:50 +00:00
|
|
|
|
2020-09-16 22:35:30 +00:00
|
|
|
workLk sync.Mutex
|
|
|
|
work *statestore.StateStore
|
2020-09-16 15:08:05 +00:00
|
|
|
|
2022-03-29 01:19:11 +00:00
|
|
|
parallelCheckLimit int
|
|
|
|
|
2020-09-16 22:35:09 +00:00
|
|
|
callToWork map[storiface.CallID]WorkID
|
2020-09-16 15:08:05 +00:00
|
|
|
// used when we get an early return and there's no callToWork mapping
|
|
|
|
callRes map[storiface.CallID]chan result
|
|
|
|
|
2020-09-16 22:35:09 +00:00
|
|
|
results map[WorkID]result
|
|
|
|
waitRes map[WorkID]chan struct{}
|
2020-09-07 10:20:50 +00:00
|
|
|
}
|
|
|
|
|
2022-01-14 13:11:04 +00:00
|
|
|
var _ storage.Prover = &Manager{}
|
|
|
|
|
2020-09-07 10:20:50 +00:00
|
|
|
type result struct {
|
2020-09-07 14:12:46 +00:00
|
|
|
r interface{}
|
2020-09-07 10:20:50 +00:00
|
|
|
err error
|
2020-03-23 11:40:02 +00:00
|
|
|
}
|
|
|
|
|
2021-06-21 19:28:15 +00:00
|
|
|
// ResourceFilteringStrategy is an enum indicating the kinds of resource
|
|
|
|
// filtering strategies that can be configured for workers.
|
|
|
|
type ResourceFilteringStrategy string
|
|
|
|
|
|
|
|
const (
|
|
|
|
// ResourceFilteringHardware specifies that available hardware resources
|
|
|
|
// should be evaluated when scheduling a task against the worker.
|
|
|
|
ResourceFilteringHardware = ResourceFilteringStrategy("hardware")
|
|
|
|
|
|
|
|
// ResourceFilteringDisabled disables resource filtering against this
|
|
|
|
// worker. The scheduler may assign any task to this worker.
|
|
|
|
ResourceFilteringDisabled = ResourceFilteringStrategy("disabled")
|
|
|
|
)
|
|
|
|
|
2022-03-29 01:19:11 +00:00
|
|
|
type Config struct {
|
2020-07-24 14:43:41 +00:00
|
|
|
ParallelFetchLimit int
|
|
|
|
|
2020-03-27 20:08:06 +00:00
|
|
|
// Local worker config
|
2021-12-08 17:11:19 +00:00
|
|
|
AllowAddPiece bool
|
|
|
|
AllowPreCommit1 bool
|
|
|
|
AllowPreCommit2 bool
|
|
|
|
AllowCommit bool
|
|
|
|
AllowUnseal bool
|
|
|
|
AllowReplicaUpdate bool
|
|
|
|
AllowProveReplicaUpdate2 bool
|
2022-02-14 18:28:49 +00:00
|
|
|
AllowRegenSectorKey bool
|
2021-06-21 18:35:47 +00:00
|
|
|
|
2021-06-21 19:28:15 +00:00
|
|
|
// ResourceFiltering instructs the system which resource filtering strategy
|
|
|
|
// to use when evaluating tasks against this worker. An empty value defaults
|
|
|
|
// to "hardware".
|
|
|
|
ResourceFiltering ResourceFilteringStrategy
|
2022-03-29 01:19:11 +00:00
|
|
|
|
|
|
|
// PoSt config
|
|
|
|
ParallelCheckLimit int
|
2020-03-27 20:08:06 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
type StorageAuth http.Header
|
|
|
|
|
2020-09-14 07:44:55 +00:00
|
|
|
type WorkerStateStore *statestore.StateStore
|
2020-09-16 15:08:05 +00:00
|
|
|
type ManagerStateStore *statestore.StateStore
|
2020-09-14 07:44:55 +00:00
|
|
|
|
2022-03-29 01:19:11 +00:00
|
|
|
func New(ctx context.Context, lstor *stores.Local, stor stores.Store, ls stores.LocalStorage, si stores.SectorIndex, sc Config, wss WorkerStateStore, mss ManagerStateStore) (*Manager, error) {
|
2022-01-14 13:11:04 +00:00
|
|
|
prover, err := ffiwrapper.New(&readonlyProvider{stor: lstor, index: si})
|
2020-03-23 11:40:02 +00:00
|
|
|
if err != nil {
|
|
|
|
return nil, xerrors.Errorf("creating prover instance: %w", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
m := &Manager{
|
|
|
|
ls: ls,
|
|
|
|
storage: stor,
|
|
|
|
localStore: lstor,
|
2021-05-19 13:50:48 +00:00
|
|
|
remoteHnd: &stores.FetchHandler{Local: lstor, PfHandler: &stores.DefaultPartialFileHandler{}},
|
2020-03-23 11:40:02 +00:00
|
|
|
index: si,
|
|
|
|
|
2022-01-14 13:11:04 +00:00
|
|
|
sched: newScheduler(),
|
|
|
|
windowPoStSched: newPoStScheduler(sealtasks.TTGenerateWindowPoSt),
|
|
|
|
winningPoStSched: newPoStScheduler(sealtasks.TTGenerateWinningPoSt),
|
2020-03-23 11:40:02 +00:00
|
|
|
|
2022-01-14 13:11:04 +00:00
|
|
|
localProver: prover,
|
2020-09-07 14:35:54 +00:00
|
|
|
|
2022-03-29 01:19:11 +00:00
|
|
|
parallelCheckLimit: sc.ParallelCheckLimit,
|
|
|
|
|
2020-09-16 20:33:49 +00:00
|
|
|
work: mss,
|
2020-09-16 22:35:09 +00:00
|
|
|
callToWork: map[storiface.CallID]WorkID{},
|
2020-09-16 20:33:49 +00:00
|
|
|
callRes: map[storiface.CallID]chan result{},
|
2020-09-16 22:35:09 +00:00
|
|
|
results: map[WorkID]result{},
|
|
|
|
waitRes: map[WorkID]chan struct{}{},
|
2020-03-23 11:40:02 +00:00
|
|
|
}
|
|
|
|
|
2020-09-16 22:35:09 +00:00
|
|
|
m.setupWorkTracker()
|
2020-09-16 15:08:05 +00:00
|
|
|
|
2020-04-27 18:37:31 +00:00
|
|
|
go m.sched.runSched()
|
2020-03-23 11:40:02 +00:00
|
|
|
|
2020-03-24 19:38:00 +00:00
|
|
|
localTasks := []sealtasks.TaskType{
|
2022-02-08 14:06:42 +00:00
|
|
|
sealtasks.TTCommit1, sealtasks.TTProveReplicaUpdate1, sealtasks.TTFinalize, sealtasks.TTFetch, sealtasks.TTFinalizeReplicaUpdate,
|
2020-08-17 09:39:29 +00:00
|
|
|
}
|
|
|
|
if sc.AllowAddPiece {
|
2022-04-26 16:22:52 +00:00
|
|
|
localTasks = append(localTasks, sealtasks.TTAddPiece, sealtasks.TTDataCid)
|
2020-03-24 19:38:00 +00:00
|
|
|
}
|
2020-03-25 20:20:24 +00:00
|
|
|
if sc.AllowPreCommit1 {
|
|
|
|
localTasks = append(localTasks, sealtasks.TTPreCommit1)
|
|
|
|
}
|
|
|
|
if sc.AllowPreCommit2 {
|
|
|
|
localTasks = append(localTasks, sealtasks.TTPreCommit2)
|
|
|
|
}
|
|
|
|
if sc.AllowCommit {
|
|
|
|
localTasks = append(localTasks, sealtasks.TTCommit2)
|
|
|
|
}
|
2020-05-14 01:01:38 +00:00
|
|
|
if sc.AllowUnseal {
|
|
|
|
localTasks = append(localTasks, sealtasks.TTUnseal)
|
|
|
|
}
|
2021-12-08 17:11:19 +00:00
|
|
|
if sc.AllowReplicaUpdate {
|
|
|
|
localTasks = append(localTasks, sealtasks.TTReplicaUpdate)
|
|
|
|
}
|
|
|
|
if sc.AllowProveReplicaUpdate2 {
|
|
|
|
localTasks = append(localTasks, sealtasks.TTProveReplicaUpdate2)
|
|
|
|
}
|
2022-02-14 18:28:49 +00:00
|
|
|
if sc.AllowRegenSectorKey {
|
|
|
|
localTasks = append(localTasks, sealtasks.TTRegenSectorKey)
|
|
|
|
}
|
2020-03-24 19:38:00 +00:00
|
|
|
|
2021-06-21 19:28:15 +00:00
|
|
|
wcfg := WorkerConfig{
|
2021-06-21 19:35:51 +00:00
|
|
|
IgnoreResourceFiltering: sc.ResourceFiltering == ResourceFilteringDisabled,
|
2021-06-21 19:28:15 +00:00
|
|
|
TaskTypes: localTasks,
|
|
|
|
}
|
|
|
|
worker := NewLocalWorker(wcfg, stor, lstor, si, m, wss)
|
|
|
|
err = m.AddWorker(ctx, worker)
|
2020-03-23 11:40:02 +00:00
|
|
|
if err != nil {
|
|
|
|
return nil, xerrors.Errorf("adding local worker: %w", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
return m, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (m *Manager) AddLocalStorage(ctx context.Context, path string) error {
|
|
|
|
path, err := homedir.Expand(path)
|
|
|
|
if err != nil {
|
|
|
|
return xerrors.Errorf("expanding local path: %w", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
if err := m.localStore.OpenPath(ctx, path); err != nil {
|
|
|
|
return xerrors.Errorf("opening local path: %w", err)
|
|
|
|
}
|
|
|
|
|
2020-03-27 20:08:06 +00:00
|
|
|
if err := m.ls.SetStorage(func(sc *stores.StorageConfig) {
|
|
|
|
sc.StoragePaths = append(sc.StoragePaths, stores.LocalPath{Path: path})
|
2020-03-23 11:40:02 +00:00
|
|
|
}); err != nil {
|
|
|
|
return xerrors.Errorf("get storage config: %w", err)
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (m *Manager) AddWorker(ctx context.Context, w Worker) error {
|
2022-01-14 13:11:04 +00:00
|
|
|
sessID, err := w.Session(ctx)
|
|
|
|
if err != nil {
|
|
|
|
return xerrors.Errorf("getting worker session: %w", err)
|
|
|
|
}
|
|
|
|
if sessID == ClosedWorkerID {
|
|
|
|
return xerrors.Errorf("worker already closed")
|
|
|
|
}
|
|
|
|
|
|
|
|
wid := storiface.WorkerID(sessID)
|
|
|
|
|
|
|
|
whnd, err := newWorkerHandle(ctx, w)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
tasks, err := w.TaskTypes(ctx)
|
|
|
|
if err != nil {
|
|
|
|
return xerrors.Errorf("getting worker tasks: %w", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
if m.windowPoStSched.MaybeAddWorker(wid, tasks, whnd) ||
|
|
|
|
m.winningPoStSched.MaybeAddWorker(wid, tasks, whnd) {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
return m.sched.runWorker(ctx, wid, whnd)
|
2020-03-23 11:40:02 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
func (m *Manager) ServeHTTP(w http.ResponseWriter, r *http.Request) {
|
|
|
|
m.remoteHnd.ServeHTTP(w, r)
|
|
|
|
}
|
|
|
|
|
2020-04-27 18:37:31 +00:00
|
|
|
func schedNop(context.Context, Worker) error {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2020-11-04 20:29:08 +00:00
|
|
|
func (m *Manager) schedFetch(sector storage.SectorRef, ft storiface.SectorFileType, ptype storiface.PathType, am storiface.AcquireMode) func(context.Context, Worker) error {
|
2020-04-27 18:37:31 +00:00
|
|
|
return func(ctx context.Context, worker Worker) error {
|
2020-09-16 20:33:49 +00:00
|
|
|
_, err := m.waitSimpleCall(ctx)(worker.Fetch(ctx, sector, ft, ptype, am))
|
2020-09-07 10:20:50 +00:00
|
|
|
return err
|
2020-04-27 18:37:31 +00:00
|
|
|
}
|
2020-03-23 11:40:02 +00:00
|
|
|
}
|
|
|
|
|
2021-05-18 11:35:25 +00:00
|
|
|
// SectorsUnsealPiece will Unseal the Sealed sector file for the given sector.
|
|
|
|
// It will schedule the Unsealing task on a worker that either already has the sealed sector files or has space in
|
|
|
|
// one of it's sealing scratch spaces to store them after fetching them from another worker.
|
|
|
|
// If the chosen worker already has the Unsealed sector file, we will NOT Unseal the sealed sector file again.
|
2021-05-18 07:32:30 +00:00
|
|
|
func (m *Manager) SectorsUnsealPiece(ctx context.Context, sector storage.SectorRef, offset storiface.UnpaddedByteIndex, size abi.UnpaddedPieceSize, ticket abi.SealRandomness, unsealed *cid.Cid) error {
|
2020-09-11 19:04:54 +00:00
|
|
|
ctx, cancel := context.WithCancel(ctx)
|
|
|
|
defer cancel()
|
|
|
|
|
2021-04-20 09:19:00 +00:00
|
|
|
log.Debugf("acquire unseal sector lock for sector %d", sector.ID)
|
2022-04-07 21:00:40 +00:00
|
|
|
if err := m.index.StorageLock(ctx, sector.ID, storiface.FTSealed|storiface.FTCache|storiface.FTUpdate|storiface.FTUpdateCache, storiface.FTUnsealed); err != nil {
|
2020-09-11 19:04:54 +00:00
|
|
|
return xerrors.Errorf("acquiring unseal sector lock: %w", err)
|
2020-07-30 20:03:43 +00:00
|
|
|
}
|
2020-05-14 01:01:38 +00:00
|
|
|
|
2021-05-18 11:35:25 +00:00
|
|
|
// if the selected worker does NOT have the sealed files for the sector, instruct it to fetch it from a worker that has them and
|
|
|
|
// put it in the sealing scratch space.
|
2021-05-18 07:32:30 +00:00
|
|
|
sealFetch := func(ctx context.Context, worker Worker) error {
|
2021-04-20 09:19:00 +00:00
|
|
|
log.Debugf("copy sealed/cache sector data for sector %d", sector.ID)
|
2022-04-07 21:00:40 +00:00
|
|
|
_, err := m.waitSimpleCall(ctx)(worker.Fetch(ctx, sector, storiface.FTSealed|storiface.FTCache, storiface.PathSealing, storiface.AcquireCopy))
|
2022-04-22 12:29:35 +00:00
|
|
|
_, err2 := m.waitSimpleCall(ctx)(worker.Fetch(ctx, sector, storiface.FTUpdate|storiface.FTUpdateCache, storiface.PathSealing, storiface.AcquireCopy))
|
2022-05-02 19:34:45 +00:00
|
|
|
|
2022-04-22 12:29:35 +00:00
|
|
|
if err != nil && err2 != nil {
|
2022-05-02 19:34:45 +00:00
|
|
|
return xerrors.Errorf("cannot unseal piece. error fetching sealed data: %w. error fetching replica data: %w", err, err2)
|
2020-05-20 16:36:46 +00:00
|
|
|
}
|
|
|
|
|
2021-05-19 11:05:07 +00:00
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
if unsealed == nil {
|
|
|
|
return xerrors.Errorf("cannot unseal piece (sector: %d, offset: %d size: %d) - unsealed cid is undefined", sector, offset, size)
|
|
|
|
}
|
|
|
|
|
|
|
|
ssize, err := sector.ProofType.SectorSize()
|
|
|
|
if err != nil {
|
|
|
|
return xerrors.Errorf("getting sector size: %w", err)
|
|
|
|
}
|
|
|
|
|
2021-05-18 11:35:25 +00:00
|
|
|
// selector will schedule the Unseal task on a worker that either already has the sealed sector files or has space in
|
|
|
|
// one of it's sealing scratch spaces to store them after fetching them from another worker.
|
2021-05-18 07:32:30 +00:00
|
|
|
selector := newExistingSelector(m.index, sector.ID, storiface.FTSealed|storiface.FTCache, true)
|
2021-05-19 11:05:07 +00:00
|
|
|
|
2021-05-21 13:31:17 +00:00
|
|
|
log.Debugf("will schedule unseal for sector %d", sector.ID)
|
2021-05-18 07:32:30 +00:00
|
|
|
err = m.sched.Schedule(ctx, sector, sealtasks.TTUnseal, selector, sealFetch, func(ctx context.Context, w Worker) error {
|
2021-05-19 11:05:07 +00:00
|
|
|
// TODO: make restartable
|
|
|
|
|
|
|
|
// NOTE: we're unsealing the whole sector here as with SDR we can't really
|
|
|
|
// unseal the sector partially. Requesting the whole sector here can
|
|
|
|
// save us some work in case another piece is requested from here
|
2021-05-21 13:31:17 +00:00
|
|
|
log.Debugf("calling unseal sector on worker, sectoID=%d", sector.ID)
|
2021-05-18 11:35:25 +00:00
|
|
|
|
2021-05-19 05:47:56 +00:00
|
|
|
// Note: This unseal piece call will essentially become a no-op if the worker already has an Unsealed sector file for the given sector.
|
2021-05-19 11:05:07 +00:00
|
|
|
_, err := m.waitSimpleCall(ctx)(w.UnsealPiece(ctx, sector, 0, abi.PaddedPieceSize(ssize).Unpadded(), ticket, *unsealed))
|
2021-04-20 09:19:00 +00:00
|
|
|
log.Debugf("completed unseal sector %d", sector.ID)
|
2021-05-19 11:05:07 +00:00
|
|
|
return err
|
|
|
|
})
|
|
|
|
if err != nil {
|
2021-05-18 11:35:25 +00:00
|
|
|
return xerrors.Errorf("worker UnsealPiece call: %s", err)
|
2021-05-19 11:05:07 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2020-11-04 20:29:08 +00:00
|
|
|
func (m *Manager) NewSector(ctx context.Context, sector storage.SectorRef) error {
|
2020-03-23 11:40:02 +00:00
|
|
|
log.Warnf("stub NewSector")
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2022-04-26 16:22:52 +00:00
|
|
|
func (m *Manager) DataCid(ctx context.Context, pieceSize abi.UnpaddedPieceSize, pieceData storage.Data) (abi.PieceInfo, error) {
|
|
|
|
ctx, cancel := context.WithCancel(ctx)
|
|
|
|
defer cancel()
|
|
|
|
|
|
|
|
selector := newTaskSelector()
|
|
|
|
|
|
|
|
var out abi.PieceInfo
|
|
|
|
err := m.sched.Schedule(ctx, storage.NoSectorRef, sealtasks.TTDataCid, selector, schedNop, func(ctx context.Context, w Worker) error {
|
|
|
|
p, err := m.waitSimpleCall(ctx)(w.DataCid(ctx, pieceSize, pieceData))
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
if p != nil {
|
|
|
|
out = p.(abi.PieceInfo)
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
})
|
|
|
|
|
|
|
|
return out, err
|
|
|
|
}
|
|
|
|
|
2020-11-04 20:29:08 +00:00
|
|
|
func (m *Manager) AddPiece(ctx context.Context, sector storage.SectorRef, existingPieces []abi.UnpaddedPieceSize, sz abi.UnpaddedPieceSize, r io.Reader) (abi.PieceInfo, error) {
|
2020-06-03 20:00:34 +00:00
|
|
|
ctx, cancel := context.WithCancel(ctx)
|
|
|
|
defer cancel()
|
|
|
|
|
2020-11-04 20:29:08 +00:00
|
|
|
if err := m.index.StorageLock(ctx, sector.ID, storiface.FTNone, storiface.FTUnsealed); err != nil {
|
2020-06-03 20:00:34 +00:00
|
|
|
return abi.PieceInfo{}, xerrors.Errorf("acquiring sector lock: %w", err)
|
|
|
|
}
|
|
|
|
|
2020-04-27 18:37:31 +00:00
|
|
|
var selector WorkerSelector
|
2020-03-23 11:40:02 +00:00
|
|
|
var err error
|
|
|
|
if len(existingPieces) == 0 { // new
|
2020-09-06 16:54:00 +00:00
|
|
|
selector = newAllocSelector(m.index, storiface.FTUnsealed, storiface.PathSealing)
|
2020-05-14 01:01:38 +00:00
|
|
|
} else { // use existing
|
2020-11-04 20:29:08 +00:00
|
|
|
selector = newExistingSelector(m.index, sector.ID, storiface.FTUnsealed, false)
|
2020-03-23 11:40:02 +00:00
|
|
|
}
|
|
|
|
|
2020-04-27 18:37:31 +00:00
|
|
|
var out abi.PieceInfo
|
2020-05-13 23:56:21 +00:00
|
|
|
err = m.sched.Schedule(ctx, sector, sealtasks.TTAddPiece, selector, schedNop, func(ctx context.Context, w Worker) error {
|
2020-09-16 20:33:49 +00:00
|
|
|
p, err := m.waitSimpleCall(ctx)(w.AddPiece(ctx, sector, existingPieces, sz, r))
|
2020-04-27 18:37:31 +00:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2020-11-11 16:39:12 +00:00
|
|
|
if p != nil {
|
|
|
|
out = p.(abi.PieceInfo)
|
|
|
|
}
|
2020-04-27 18:37:31 +00:00
|
|
|
return nil
|
|
|
|
})
|
2020-03-23 11:40:02 +00:00
|
|
|
|
2020-04-27 18:37:31 +00:00
|
|
|
return out, err
|
2020-03-23 11:40:02 +00:00
|
|
|
}
|
|
|
|
|
2020-11-04 20:29:08 +00:00
|
|
|
func (m *Manager) SealPreCommit1(ctx context.Context, sector storage.SectorRef, ticket abi.SealRandomness, pieces []abi.PieceInfo) (out storage.PreCommit1Out, err error) {
|
2020-06-03 20:00:34 +00:00
|
|
|
ctx, cancel := context.WithCancel(ctx)
|
|
|
|
defer cancel()
|
|
|
|
|
2020-09-30 15:26:09 +00:00
|
|
|
wk, wait, cancel, err := m.getWork(ctx, sealtasks.TTPreCommit1, sector, ticket, pieces)
|
2020-09-16 15:08:05 +00:00
|
|
|
if err != nil {
|
|
|
|
return nil, xerrors.Errorf("getWork: %w", err)
|
|
|
|
}
|
2020-09-30 15:26:09 +00:00
|
|
|
defer cancel()
|
2020-09-16 15:08:05 +00:00
|
|
|
|
2020-09-30 15:48:48 +00:00
|
|
|
var waitErr error
|
2020-09-16 15:08:05 +00:00
|
|
|
waitRes := func() {
|
|
|
|
p, werr := m.waitWork(ctx, wk)
|
|
|
|
if werr != nil {
|
2020-09-30 15:48:48 +00:00
|
|
|
waitErr = werr
|
2020-09-16 15:08:05 +00:00
|
|
|
return
|
|
|
|
}
|
2020-11-11 16:39:12 +00:00
|
|
|
if p != nil {
|
|
|
|
out = p.(storage.PreCommit1Out)
|
|
|
|
}
|
2020-09-16 15:08:05 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
if wait { // already in progress
|
|
|
|
waitRes()
|
2020-09-30 16:16:07 +00:00
|
|
|
return out, waitErr
|
2020-09-16 15:08:05 +00:00
|
|
|
}
|
|
|
|
|
2020-11-04 20:29:08 +00:00
|
|
|
if err := m.index.StorageLock(ctx, sector.ID, storiface.FTUnsealed, storiface.FTSealed|storiface.FTCache); err != nil {
|
2020-06-03 20:00:34 +00:00
|
|
|
return nil, xerrors.Errorf("acquiring sector lock: %w", err)
|
|
|
|
}
|
|
|
|
|
2020-03-23 11:40:02 +00:00
|
|
|
// TODO: also consider where the unsealed data sits
|
|
|
|
|
2020-09-06 16:54:00 +00:00
|
|
|
selector := newAllocSelector(m.index, storiface.FTCache|storiface.FTSealed, storiface.PathSealing)
|
2020-03-23 11:40:02 +00:00
|
|
|
|
2020-09-16 15:08:05 +00:00
|
|
|
err = m.sched.Schedule(ctx, sector, sealtasks.TTPreCommit1, selector, m.schedFetch(sector, storiface.FTUnsealed, storiface.PathSealing, storiface.AcquireMove), func(ctx context.Context, w Worker) error {
|
2020-11-09 22:09:04 +00:00
|
|
|
err := m.startWork(ctx, w, wk)(w.SealPreCommit1(ctx, sector, ticket, pieces))
|
2020-04-27 18:37:31 +00:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2020-09-16 15:08:05 +00:00
|
|
|
|
2020-09-16 20:33:49 +00:00
|
|
|
waitRes()
|
2020-04-27 18:37:31 +00:00
|
|
|
return nil
|
|
|
|
})
|
2020-09-30 15:48:48 +00:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
2020-03-23 11:40:02 +00:00
|
|
|
|
2020-09-30 15:48:48 +00:00
|
|
|
return out, waitErr
|
2020-03-23 11:40:02 +00:00
|
|
|
}
|
|
|
|
|
2020-11-04 20:29:08 +00:00
|
|
|
func (m *Manager) SealPreCommit2(ctx context.Context, sector storage.SectorRef, phase1Out storage.PreCommit1Out) (out storage.SectorCids, err error) {
|
2020-06-03 20:00:34 +00:00
|
|
|
ctx, cancel := context.WithCancel(ctx)
|
|
|
|
defer cancel()
|
|
|
|
|
2020-09-30 15:26:09 +00:00
|
|
|
wk, wait, cancel, err := m.getWork(ctx, sealtasks.TTPreCommit2, sector, phase1Out)
|
2020-09-16 20:33:49 +00:00
|
|
|
if err != nil {
|
|
|
|
return storage.SectorCids{}, xerrors.Errorf("getWork: %w", err)
|
|
|
|
}
|
2020-09-30 15:26:09 +00:00
|
|
|
defer cancel()
|
2020-09-16 20:33:49 +00:00
|
|
|
|
2020-09-30 15:48:48 +00:00
|
|
|
var waitErr error
|
2020-09-16 20:33:49 +00:00
|
|
|
waitRes := func() {
|
|
|
|
p, werr := m.waitWork(ctx, wk)
|
|
|
|
if werr != nil {
|
2020-09-30 15:48:48 +00:00
|
|
|
waitErr = werr
|
2020-09-16 20:33:49 +00:00
|
|
|
return
|
|
|
|
}
|
2020-11-11 16:39:12 +00:00
|
|
|
if p != nil {
|
|
|
|
out = p.(storage.SectorCids)
|
|
|
|
}
|
2020-09-16 20:33:49 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
if wait { // already in progress
|
|
|
|
waitRes()
|
2020-09-30 16:16:07 +00:00
|
|
|
return out, waitErr
|
2020-09-16 20:33:49 +00:00
|
|
|
}
|
|
|
|
|
2020-11-04 20:29:08 +00:00
|
|
|
if err := m.index.StorageLock(ctx, sector.ID, storiface.FTSealed, storiface.FTCache); err != nil {
|
2020-06-03 20:00:34 +00:00
|
|
|
return storage.SectorCids{}, xerrors.Errorf("acquiring sector lock: %w", err)
|
|
|
|
}
|
|
|
|
|
2020-11-04 20:29:08 +00:00
|
|
|
selector := newExistingSelector(m.index, sector.ID, storiface.FTCache|storiface.FTSealed, true)
|
2020-03-23 11:40:02 +00:00
|
|
|
|
2020-09-16 20:33:49 +00:00
|
|
|
err = m.sched.Schedule(ctx, sector, sealtasks.TTPreCommit2, selector, m.schedFetch(sector, storiface.FTCache|storiface.FTSealed, storiface.PathSealing, storiface.AcquireMove), func(ctx context.Context, w Worker) error {
|
2020-11-09 22:09:04 +00:00
|
|
|
err := m.startWork(ctx, w, wk)(w.SealPreCommit2(ctx, sector, phase1Out))
|
2020-04-27 18:37:31 +00:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2020-09-16 20:33:49 +00:00
|
|
|
|
|
|
|
waitRes()
|
2020-04-27 18:37:31 +00:00
|
|
|
return nil
|
|
|
|
})
|
2020-09-30 15:48:48 +00:00
|
|
|
if err != nil {
|
|
|
|
return storage.SectorCids{}, err
|
|
|
|
}
|
|
|
|
|
|
|
|
return out, waitErr
|
2020-03-23 11:40:02 +00:00
|
|
|
}
|
|
|
|
|
2020-11-04 20:29:08 +00:00
|
|
|
func (m *Manager) SealCommit1(ctx context.Context, sector storage.SectorRef, ticket abi.SealRandomness, seed abi.InteractiveSealRandomness, pieces []abi.PieceInfo, cids storage.SectorCids) (out storage.Commit1Out, err error) {
|
2020-06-03 20:00:34 +00:00
|
|
|
ctx, cancel := context.WithCancel(ctx)
|
|
|
|
defer cancel()
|
|
|
|
|
2020-09-30 15:26:09 +00:00
|
|
|
wk, wait, cancel, err := m.getWork(ctx, sealtasks.TTCommit1, sector, ticket, seed, pieces, cids)
|
2020-09-16 20:33:49 +00:00
|
|
|
if err != nil {
|
|
|
|
return storage.Commit1Out{}, xerrors.Errorf("getWork: %w", err)
|
|
|
|
}
|
2020-09-30 15:26:09 +00:00
|
|
|
defer cancel()
|
2020-09-16 20:33:49 +00:00
|
|
|
|
2020-09-30 15:48:48 +00:00
|
|
|
var waitErr error
|
2020-09-16 20:33:49 +00:00
|
|
|
waitRes := func() {
|
|
|
|
p, werr := m.waitWork(ctx, wk)
|
|
|
|
if werr != nil {
|
2020-09-30 15:48:48 +00:00
|
|
|
waitErr = werr
|
2020-09-16 20:33:49 +00:00
|
|
|
return
|
|
|
|
}
|
2020-11-11 16:39:12 +00:00
|
|
|
if p != nil {
|
|
|
|
out = p.(storage.Commit1Out)
|
|
|
|
}
|
2020-09-16 20:33:49 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
if wait { // already in progress
|
|
|
|
waitRes()
|
2020-09-30 16:16:07 +00:00
|
|
|
return out, waitErr
|
2020-09-16 20:33:49 +00:00
|
|
|
}
|
|
|
|
|
2020-11-04 20:29:08 +00:00
|
|
|
if err := m.index.StorageLock(ctx, sector.ID, storiface.FTSealed, storiface.FTCache); err != nil {
|
2020-06-03 20:00:34 +00:00
|
|
|
return storage.Commit1Out{}, xerrors.Errorf("acquiring sector lock: %w", err)
|
|
|
|
}
|
|
|
|
|
2020-06-03 19:21:27 +00:00
|
|
|
// NOTE: We set allowFetch to false in so that we always execute on a worker
|
|
|
|
// with direct access to the data. We want to do that because this step is
|
|
|
|
// generally very cheap / fast, and transferring data is not worth the effort
|
2020-11-04 20:29:08 +00:00
|
|
|
selector := newExistingSelector(m.index, sector.ID, storiface.FTCache|storiface.FTSealed, false)
|
2020-03-23 11:40:02 +00:00
|
|
|
|
2020-09-16 20:33:49 +00:00
|
|
|
err = m.sched.Schedule(ctx, sector, sealtasks.TTCommit1, selector, m.schedFetch(sector, storiface.FTCache|storiface.FTSealed, storiface.PathSealing, storiface.AcquireMove), func(ctx context.Context, w Worker) error {
|
2020-11-09 22:09:04 +00:00
|
|
|
err := m.startWork(ctx, w, wk)(w.SealCommit1(ctx, sector, ticket, seed, pieces, cids))
|
2020-04-27 18:37:31 +00:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2020-09-16 20:33:49 +00:00
|
|
|
|
|
|
|
waitRes()
|
2020-04-27 18:37:31 +00:00
|
|
|
return nil
|
|
|
|
})
|
2020-09-30 15:48:48 +00:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
return out, waitErr
|
2020-03-23 11:40:02 +00:00
|
|
|
}
|
|
|
|
|
2020-11-04 20:29:08 +00:00
|
|
|
func (m *Manager) SealCommit2(ctx context.Context, sector storage.SectorRef, phase1Out storage.Commit1Out) (out storage.Proof, err error) {
|
2020-09-30 15:26:09 +00:00
|
|
|
wk, wait, cancel, err := m.getWork(ctx, sealtasks.TTCommit2, sector, phase1Out)
|
2020-09-16 20:33:49 +00:00
|
|
|
if err != nil {
|
|
|
|
return storage.Proof{}, xerrors.Errorf("getWork: %w", err)
|
|
|
|
}
|
2020-09-30 15:26:09 +00:00
|
|
|
defer cancel()
|
2020-09-16 20:33:49 +00:00
|
|
|
|
2020-09-30 15:48:48 +00:00
|
|
|
var waitErr error
|
2020-09-16 20:33:49 +00:00
|
|
|
waitRes := func() {
|
|
|
|
p, werr := m.waitWork(ctx, wk)
|
|
|
|
if werr != nil {
|
2020-09-30 15:48:48 +00:00
|
|
|
waitErr = werr
|
2020-09-16 20:33:49 +00:00
|
|
|
return
|
|
|
|
}
|
2020-11-11 16:39:12 +00:00
|
|
|
if p != nil {
|
|
|
|
out = p.(storage.Proof)
|
|
|
|
}
|
2020-09-16 20:33:49 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
if wait { // already in progress
|
|
|
|
waitRes()
|
2020-09-30 16:16:07 +00:00
|
|
|
return out, waitErr
|
2020-09-16 20:33:49 +00:00
|
|
|
}
|
|
|
|
|
2020-04-27 18:37:31 +00:00
|
|
|
selector := newTaskSelector()
|
2020-03-23 11:40:02 +00:00
|
|
|
|
2020-05-13 23:56:21 +00:00
|
|
|
err = m.sched.Schedule(ctx, sector, sealtasks.TTCommit2, selector, schedNop, func(ctx context.Context, w Worker) error {
|
2020-11-09 22:09:04 +00:00
|
|
|
err := m.startWork(ctx, w, wk)(w.SealCommit2(ctx, sector, phase1Out))
|
2020-03-23 11:40:02 +00:00
|
|
|
if err != nil {
|
2020-04-27 18:37:31 +00:00
|
|
|
return err
|
2020-03-23 11:40:02 +00:00
|
|
|
}
|
2020-09-16 20:33:49 +00:00
|
|
|
|
|
|
|
waitRes()
|
2020-04-27 18:37:31 +00:00
|
|
|
return nil
|
|
|
|
})
|
2020-03-23 11:40:02 +00:00
|
|
|
|
2020-09-30 15:48:48 +00:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
return out, waitErr
|
2020-03-23 11:40:02 +00:00
|
|
|
}
|
|
|
|
|
2020-11-04 20:29:08 +00:00
|
|
|
func (m *Manager) FinalizeSector(ctx context.Context, sector storage.SectorRef, keepUnsealed []storage.Range) error {
|
2020-06-03 20:00:34 +00:00
|
|
|
ctx, cancel := context.WithCancel(ctx)
|
|
|
|
defer cancel()
|
|
|
|
|
2020-11-04 20:29:08 +00:00
|
|
|
if err := m.index.StorageLock(ctx, sector.ID, storiface.FTNone, storiface.FTSealed|storiface.FTUnsealed|storiface.FTCache); err != nil {
|
2020-06-03 20:00:34 +00:00
|
|
|
return xerrors.Errorf("acquiring sector lock: %w", err)
|
|
|
|
}
|
|
|
|
|
2020-09-06 16:54:00 +00:00
|
|
|
unsealed := storiface.FTUnsealed
|
2020-06-04 19:15:15 +00:00
|
|
|
{
|
2020-11-04 20:29:08 +00:00
|
|
|
unsealedStores, err := m.index.StorageFindSector(ctx, sector.ID, storiface.FTUnsealed, 0, false)
|
2020-06-04 19:15:15 +00:00
|
|
|
if err != nil {
|
|
|
|
return xerrors.Errorf("finding unsealed sector: %w", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
if len(unsealedStores) == 0 { // Is some edge-cases unsealed sector may not exist already, that's fine
|
2020-09-06 16:54:00 +00:00
|
|
|
unsealed = storiface.FTNone
|
2020-06-04 19:15:15 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-07-01 19:07:53 +00:00
|
|
|
pathType := storiface.PathStorage
|
|
|
|
{
|
|
|
|
sealedStores, err := m.index.StorageFindSector(ctx, sector.ID, storiface.FTSealed, 0, false)
|
|
|
|
if err != nil {
|
|
|
|
return xerrors.Errorf("finding sealed sector: %w", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
for _, store := range sealedStores {
|
|
|
|
if store.CanSeal {
|
|
|
|
pathType = storiface.PathSealing
|
|
|
|
break
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2022-03-17 14:15:54 +00:00
|
|
|
selector := newExistingSelector(m.index, sector.ID, storiface.FTCache, false)
|
2020-03-23 11:40:02 +00:00
|
|
|
|
2020-08-05 12:36:49 +00:00
|
|
|
err := m.sched.Schedule(ctx, sector, sealtasks.TTFinalize, selector,
|
2022-03-17 14:15:54 +00:00
|
|
|
m.schedFetch(sector, storiface.FTCache|unsealed, pathType, storiface.AcquireMove),
|
2020-04-27 18:37:31 +00:00
|
|
|
func(ctx context.Context, w Worker) error {
|
2020-09-16 20:33:49 +00:00
|
|
|
_, err := m.waitSimpleCall(ctx)(w.FinalizeSector(ctx, sector, keepUnsealed))
|
2020-09-07 10:20:50 +00:00
|
|
|
return err
|
2020-04-27 18:37:31 +00:00
|
|
|
})
|
2020-06-03 21:44:59 +00:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2020-09-06 16:54:00 +00:00
|
|
|
fetchSel := newAllocSelector(m.index, storiface.FTCache|storiface.FTSealed, storiface.PathStorage)
|
2020-06-22 15:02:59 +00:00
|
|
|
moveUnsealed := unsealed
|
|
|
|
{
|
|
|
|
if len(keepUnsealed) == 0 {
|
2020-09-06 16:54:00 +00:00
|
|
|
moveUnsealed = storiface.FTNone
|
2020-06-22 15:02:59 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-06-03 21:44:59 +00:00
|
|
|
err = m.sched.Schedule(ctx, sector, sealtasks.TTFetch, fetchSel,
|
2020-09-16 20:33:49 +00:00
|
|
|
m.schedFetch(sector, storiface.FTCache|storiface.FTSealed|moveUnsealed, storiface.PathStorage, storiface.AcquireMove),
|
2020-06-03 21:44:59 +00:00
|
|
|
func(ctx context.Context, w Worker) error {
|
2020-09-16 20:33:49 +00:00
|
|
|
_, err := m.waitSimpleCall(ctx)(w.MoveStorage(ctx, sector, storiface.FTCache|storiface.FTSealed|moveUnsealed))
|
2020-09-07 10:20:50 +00:00
|
|
|
return err
|
2020-06-03 21:44:59 +00:00
|
|
|
})
|
|
|
|
if err != nil {
|
|
|
|
return xerrors.Errorf("moving sector to storage: %w", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
2020-03-23 11:40:02 +00:00
|
|
|
}
|
|
|
|
|
2022-02-02 20:23:35 +00:00
|
|
|
func (m *Manager) FinalizeReplicaUpdate(ctx context.Context, sector storage.SectorRef, keepUnsealed []storage.Range) error {
|
|
|
|
ctx, cancel := context.WithCancel(ctx)
|
|
|
|
defer cancel()
|
|
|
|
|
|
|
|
if err := m.index.StorageLock(ctx, sector.ID, storiface.FTNone, storiface.FTSealed|storiface.FTUnsealed|storiface.FTCache|storiface.FTUpdate|storiface.FTUpdateCache); err != nil {
|
|
|
|
return xerrors.Errorf("acquiring sector lock: %w", err)
|
|
|
|
}
|
|
|
|
|
2022-03-16 10:49:48 +00:00
|
|
|
moveUnsealed := storiface.FTUnsealed
|
2022-02-02 20:23:35 +00:00
|
|
|
{
|
|
|
|
unsealedStores, err := m.index.StorageFindSector(ctx, sector.ID, storiface.FTUnsealed, 0, false)
|
|
|
|
if err != nil {
|
|
|
|
return xerrors.Errorf("finding unsealed sector: %w", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
if len(unsealedStores) == 0 { // Is some edge-cases unsealed sector may not exist already, that's fine
|
2022-03-16 10:49:48 +00:00
|
|
|
moveUnsealed = storiface.FTNone
|
2022-02-02 20:23:35 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
pathType := storiface.PathStorage
|
|
|
|
{
|
|
|
|
sealedStores, err := m.index.StorageFindSector(ctx, sector.ID, storiface.FTUpdate, 0, false)
|
|
|
|
if err != nil {
|
|
|
|
return xerrors.Errorf("finding sealed sector: %w", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
for _, store := range sealedStores {
|
|
|
|
if store.CanSeal {
|
|
|
|
pathType = storiface.PathSealing
|
|
|
|
break
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2022-03-16 10:49:48 +00:00
|
|
|
selector := newExistingSelector(m.index, sector.ID, storiface.FTCache|storiface.FTUpdateCache, false)
|
2022-02-02 20:23:35 +00:00
|
|
|
|
|
|
|
err := m.sched.Schedule(ctx, sector, sealtasks.TTFinalizeReplicaUpdate, selector,
|
2022-03-16 10:49:48 +00:00
|
|
|
m.schedFetch(sector, storiface.FTCache|storiface.FTUpdateCache|moveUnsealed, pathType, storiface.AcquireMove),
|
2022-02-02 20:23:35 +00:00
|
|
|
func(ctx context.Context, w Worker) error {
|
|
|
|
_, err := m.waitSimpleCall(ctx)(w.FinalizeReplicaUpdate(ctx, sector, keepUnsealed))
|
|
|
|
return err
|
|
|
|
})
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2022-03-16 10:49:48 +00:00
|
|
|
move := func(types storiface.SectorFileType) error {
|
|
|
|
fetchSel := newAllocSelector(m.index, types, storiface.PathStorage)
|
|
|
|
{
|
|
|
|
if len(keepUnsealed) == 0 {
|
|
|
|
moveUnsealed = storiface.FTNone
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
err = m.sched.Schedule(ctx, sector, sealtasks.TTFetch, fetchSel,
|
|
|
|
m.schedFetch(sector, types, storiface.PathStorage, storiface.AcquireMove),
|
|
|
|
func(ctx context.Context, w Worker) error {
|
|
|
|
_, err := m.waitSimpleCall(ctx)(w.MoveStorage(ctx, sector, types))
|
|
|
|
return err
|
|
|
|
})
|
|
|
|
if err != nil {
|
|
|
|
return xerrors.Errorf("moving sector to storage: %w", err)
|
2022-02-02 20:23:35 +00:00
|
|
|
}
|
2022-03-16 10:49:48 +00:00
|
|
|
return nil
|
2022-02-02 20:23:35 +00:00
|
|
|
}
|
|
|
|
|
2022-03-16 10:49:48 +00:00
|
|
|
err = multierr.Append(move(storiface.FTUpdate|storiface.FTUpdateCache), move(storiface.FTCache))
|
|
|
|
err = multierr.Append(err, move(storiface.FTSealed)) // Sealed separate from cache just in case ReleaseSectorKey was already called
|
|
|
|
if moveUnsealed != storiface.FTNone {
|
|
|
|
err = multierr.Append(err, move(moveUnsealed))
|
2022-02-02 20:23:35 +00:00
|
|
|
}
|
|
|
|
|
2022-03-30 02:28:56 +00:00
|
|
|
if err != nil {
|
|
|
|
return xerrors.Errorf("moving sector to storage: %w", err)
|
|
|
|
}
|
|
|
|
|
2022-02-02 20:23:35 +00:00
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2020-11-04 20:29:08 +00:00
|
|
|
func (m *Manager) ReleaseUnsealed(ctx context.Context, sector storage.SectorRef, safeToFree []storage.Range) error {
|
2022-04-05 20:45:07 +00:00
|
|
|
ssize, err := sector.ProofType.SectorSize()
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2022-04-09 18:58:47 +00:00
|
|
|
if len(safeToFree) == 0 || safeToFree[0].Offset != 0 || safeToFree[0].Size.Padded() != abi.PaddedPieceSize(ssize) {
|
2022-04-05 20:45:07 +00:00
|
|
|
// todo support partial free
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
ctx, cancel := context.WithCancel(ctx)
|
|
|
|
defer cancel()
|
|
|
|
|
|
|
|
if err := m.index.StorageLock(ctx, sector.ID, storiface.FTNone, storiface.FTUnsealed); err != nil {
|
|
|
|
return xerrors.Errorf("acquiring sector lock: %w", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
return m.storage.Remove(ctx, sector.ID, storiface.FTUnsealed, true, nil)
|
2020-06-22 15:02:59 +00:00
|
|
|
}
|
|
|
|
|
2021-12-01 19:01:55 +00:00
|
|
|
func (m *Manager) ReleaseSectorKey(ctx context.Context, sector storage.SectorRef) error {
|
|
|
|
ctx, cancel := context.WithCancel(ctx)
|
|
|
|
defer cancel()
|
|
|
|
|
|
|
|
if err := m.index.StorageLock(ctx, sector.ID, storiface.FTNone, storiface.FTSealed); err != nil {
|
|
|
|
return xerrors.Errorf("acquiring sector lock: %w", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
return m.storage.Remove(ctx, sector.ID, storiface.FTSealed, true, nil)
|
|
|
|
}
|
|
|
|
|
2021-12-08 17:11:19 +00:00
|
|
|
func (m *Manager) ReleaseReplicaUpgrade(ctx context.Context, sector storage.SectorRef) error {
|
|
|
|
ctx, cancel := context.WithCancel(ctx)
|
|
|
|
defer cancel()
|
|
|
|
|
|
|
|
if err := m.index.StorageLock(ctx, sector.ID, storiface.FTNone, storiface.FTUpdateCache|storiface.FTUpdate); err != nil {
|
|
|
|
return xerrors.Errorf("acquiring sector lock: %w", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
if err := m.storage.Remove(ctx, sector.ID, storiface.FTUpdateCache, true, nil); err != nil {
|
|
|
|
return xerrors.Errorf("removing update cache: %w", err)
|
|
|
|
}
|
|
|
|
if err := m.storage.Remove(ctx, sector.ID, storiface.FTUpdate, true, nil); err != nil {
|
|
|
|
return xerrors.Errorf("removing update: %w", err)
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2021-12-01 19:01:55 +00:00
|
|
|
func (m *Manager) GenerateSectorKeyFromData(ctx context.Context, sector storage.SectorRef, commD cid.Cid) error {
|
|
|
|
|
|
|
|
ctx, cancel := context.WithCancel(ctx)
|
|
|
|
defer cancel()
|
|
|
|
|
|
|
|
wk, wait, cancel, err := m.getWork(ctx, sealtasks.TTRegenSectorKey, sector, commD)
|
|
|
|
if err != nil {
|
|
|
|
return xerrors.Errorf("getWork: %w", err)
|
|
|
|
}
|
|
|
|
defer cancel()
|
|
|
|
|
|
|
|
var waitErr error
|
|
|
|
waitRes := func() {
|
|
|
|
_, werr := m.waitWork(ctx, wk)
|
|
|
|
if werr != nil {
|
|
|
|
waitErr = werr
|
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if wait { // already in progress
|
|
|
|
waitRes()
|
|
|
|
return waitErr
|
|
|
|
}
|
|
|
|
|
|
|
|
if err := m.index.StorageLock(ctx, sector.ID, storiface.FTUnsealed|storiface.FTUpdate|storiface.FTUpdateCache, storiface.FTSealed|storiface.FTCache); err != nil {
|
|
|
|
return xerrors.Errorf("acquiring sector lock: %w", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// NOTE: We set allowFetch to false in so that we always execute on a worker
|
|
|
|
// with direct access to the data. We want to do that because this step is
|
|
|
|
// generally very cheap / fast, and transferring data is not worth the effort
|
|
|
|
selector := newExistingSelector(m.index, sector.ID, storiface.FTUnsealed|storiface.FTUpdate|storiface.FTUpdateCache|storiface.FTCache, true)
|
|
|
|
|
|
|
|
err = m.sched.Schedule(ctx, sector, sealtasks.TTRegenSectorKey, selector, m.schedFetch(sector, storiface.FTUpdate|storiface.FTUnsealed, storiface.PathSealing, storiface.AcquireMove), func(ctx context.Context, w Worker) error {
|
|
|
|
err := m.startWork(ctx, w, wk)(w.GenerateSectorKeyFromData(ctx, sector, commD))
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
waitRes()
|
|
|
|
return nil
|
|
|
|
})
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
return waitErr
|
2021-11-10 18:53:00 +00:00
|
|
|
}
|
|
|
|
|
2020-11-04 20:29:08 +00:00
|
|
|
func (m *Manager) Remove(ctx context.Context, sector storage.SectorRef) error {
|
2020-06-22 15:02:59 +00:00
|
|
|
ctx, cancel := context.WithCancel(ctx)
|
|
|
|
defer cancel()
|
|
|
|
|
2021-12-01 19:01:55 +00:00
|
|
|
if err := m.index.StorageLock(ctx, sector.ID, storiface.FTNone, storiface.FTSealed|storiface.FTUnsealed|storiface.FTCache|storiface.FTUpdate|storiface.FTUpdateCache); err != nil {
|
2020-06-22 15:02:59 +00:00
|
|
|
return xerrors.Errorf("acquiring sector lock: %w", err)
|
|
|
|
}
|
|
|
|
|
2020-08-27 21:58:37 +00:00
|
|
|
var err error
|
2020-06-22 15:02:59 +00:00
|
|
|
|
2021-10-11 19:05:05 +00:00
|
|
|
if rerr := m.storage.Remove(ctx, sector.ID, storiface.FTSealed, true, nil); rerr != nil {
|
2020-08-27 21:58:37 +00:00
|
|
|
err = multierror.Append(err, xerrors.Errorf("removing sector (sealed): %w", rerr))
|
|
|
|
}
|
2021-10-11 19:05:05 +00:00
|
|
|
if rerr := m.storage.Remove(ctx, sector.ID, storiface.FTCache, true, nil); rerr != nil {
|
2020-08-27 21:58:37 +00:00
|
|
|
err = multierror.Append(err, xerrors.Errorf("removing sector (cache): %w", rerr))
|
|
|
|
}
|
2021-10-11 19:05:05 +00:00
|
|
|
if rerr := m.storage.Remove(ctx, sector.ID, storiface.FTUnsealed, true, nil); rerr != nil {
|
2020-08-27 21:58:37 +00:00
|
|
|
err = multierror.Append(err, xerrors.Errorf("removing sector (unsealed): %w", rerr))
|
2020-06-22 15:02:59 +00:00
|
|
|
}
|
2021-12-01 19:01:55 +00:00
|
|
|
if rerr := m.storage.Remove(ctx, sector.ID, storiface.FTUpdate, true, nil); rerr != nil {
|
|
|
|
err = multierror.Append(err, xerrors.Errorf("removing sector (unsealed): %w", rerr))
|
|
|
|
}
|
|
|
|
if rerr := m.storage.Remove(ctx, sector.ID, storiface.FTUpdateCache, true, nil); rerr != nil {
|
|
|
|
err = multierror.Append(err, xerrors.Errorf("removing sector (unsealed): %w", rerr))
|
|
|
|
}
|
2020-06-22 15:02:59 +00:00
|
|
|
|
2020-08-27 21:58:37 +00:00
|
|
|
return err
|
2020-06-22 15:02:59 +00:00
|
|
|
}
|
|
|
|
|
2021-11-10 18:53:00 +00:00
|
|
|
func (m *Manager) ReplicaUpdate(ctx context.Context, sector storage.SectorRef, pieces []abi.PieceInfo) (out storage.ReplicaUpdateOut, err error) {
|
|
|
|
ctx, cancel := context.WithCancel(ctx)
|
|
|
|
defer cancel()
|
2022-03-01 17:52:09 +00:00
|
|
|
log.Debugf("manager is doing replica update")
|
2021-11-10 18:53:00 +00:00
|
|
|
wk, wait, cancel, err := m.getWork(ctx, sealtasks.TTReplicaUpdate, sector, pieces)
|
|
|
|
if err != nil {
|
|
|
|
return storage.ReplicaUpdateOut{}, xerrors.Errorf("getWork: %w", err)
|
|
|
|
}
|
|
|
|
defer cancel()
|
|
|
|
|
|
|
|
var waitErr error
|
|
|
|
waitRes := func() {
|
|
|
|
p, werr := m.waitWork(ctx, wk)
|
|
|
|
if werr != nil {
|
2021-12-08 17:11:19 +00:00
|
|
|
waitErr = xerrors.Errorf("waitWork: %w", werr)
|
2021-11-10 18:53:00 +00:00
|
|
|
return
|
|
|
|
}
|
|
|
|
if p != nil {
|
|
|
|
out = p.(storage.ReplicaUpdateOut)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if wait { // already in progress
|
|
|
|
waitRes()
|
|
|
|
return out, waitErr
|
|
|
|
}
|
|
|
|
|
2022-01-21 16:10:44 +00:00
|
|
|
if err := m.index.StorageLock(ctx, sector.ID, storiface.FTUnsealed|storiface.FTSealed|storiface.FTCache, storiface.FTUpdate|storiface.FTUpdateCache); err != nil {
|
2021-11-10 18:53:00 +00:00
|
|
|
return storage.ReplicaUpdateOut{}, xerrors.Errorf("acquiring sector lock: %w", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
selector := newAllocSelector(m.index, storiface.FTUpdate|storiface.FTUpdateCache, storiface.PathSealing)
|
|
|
|
|
2022-01-21 16:10:44 +00:00
|
|
|
err = m.sched.Schedule(ctx, sector, sealtasks.TTReplicaUpdate, selector, m.schedFetch(sector, storiface.FTUnsealed|storiface.FTSealed|storiface.FTCache, storiface.PathSealing, storiface.AcquireCopy), func(ctx context.Context, w Worker) error {
|
2021-11-10 18:53:00 +00:00
|
|
|
err := m.startWork(ctx, w, wk)(w.ReplicaUpdate(ctx, sector, pieces))
|
|
|
|
if err != nil {
|
2021-12-08 17:11:19 +00:00
|
|
|
return xerrors.Errorf("startWork: %w", err)
|
2021-11-10 18:53:00 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
waitRes()
|
|
|
|
return nil
|
|
|
|
})
|
|
|
|
if err != nil {
|
2021-12-08 17:11:19 +00:00
|
|
|
return storage.ReplicaUpdateOut{}, xerrors.Errorf("Schedule: %w", err)
|
2021-11-10 18:53:00 +00:00
|
|
|
}
|
|
|
|
return out, waitErr
|
|
|
|
}
|
|
|
|
|
|
|
|
func (m *Manager) ProveReplicaUpdate1(ctx context.Context, sector storage.SectorRef, sectorKey, newSealed, newUnsealed cid.Cid) (out storage.ReplicaVanillaProofs, err error) {
|
|
|
|
ctx, cancel := context.WithCancel(ctx)
|
|
|
|
defer cancel()
|
|
|
|
|
|
|
|
wk, wait, cancel, err := m.getWork(ctx, sealtasks.TTProveReplicaUpdate1, sector, sectorKey, newSealed, newUnsealed)
|
|
|
|
if err != nil {
|
|
|
|
return nil, xerrors.Errorf("getWork: %w", err)
|
|
|
|
}
|
|
|
|
defer cancel()
|
|
|
|
|
|
|
|
var waitErr error
|
|
|
|
waitRes := func() {
|
|
|
|
p, werr := m.waitWork(ctx, wk)
|
|
|
|
if werr != nil {
|
|
|
|
waitErr = werr
|
|
|
|
return
|
|
|
|
}
|
|
|
|
if p != nil {
|
|
|
|
out = p.(storage.ReplicaVanillaProofs)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if wait { // already in progress
|
|
|
|
waitRes()
|
|
|
|
return out, waitErr
|
|
|
|
}
|
|
|
|
|
|
|
|
if err := m.index.StorageLock(ctx, sector.ID, storiface.FTSealed|storiface.FTUpdate|storiface.FTCache|storiface.FTUpdateCache, storiface.FTNone); err != nil {
|
|
|
|
return nil, xerrors.Errorf("acquiring sector lock: %w", err)
|
|
|
|
}
|
|
|
|
|
2022-01-20 20:01:26 +00:00
|
|
|
// NOTE: We set allowFetch to false in so that we always execute on a worker
|
|
|
|
// with direct access to the data. We want to do that because this step is
|
|
|
|
// generally very cheap / fast, and transferring data is not worth the effort
|
2022-03-31 21:01:33 +00:00
|
|
|
selector := newExistingSelector(m.index, sector.ID, storiface.FTUpdate|storiface.FTUpdateCache, false)
|
2021-11-10 18:53:00 +00:00
|
|
|
|
2022-01-20 20:01:26 +00:00
|
|
|
err = m.sched.Schedule(ctx, sector, sealtasks.TTProveReplicaUpdate1, selector, m.schedFetch(sector, storiface.FTSealed|storiface.FTCache|storiface.FTUpdate|storiface.FTUpdateCache, storiface.PathSealing, storiface.AcquireCopy), func(ctx context.Context, w Worker) error {
|
2021-11-10 18:53:00 +00:00
|
|
|
|
|
|
|
err := m.startWork(ctx, w, wk)(w.ProveReplicaUpdate1(ctx, sector, sectorKey, newSealed, newUnsealed))
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
waitRes()
|
|
|
|
return nil
|
|
|
|
})
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
return out, waitErr
|
|
|
|
}
|
|
|
|
|
|
|
|
func (m *Manager) ProveReplicaUpdate2(ctx context.Context, sector storage.SectorRef, sectorKey, newSealed, newUnsealed cid.Cid, vanillaProofs storage.ReplicaVanillaProofs) (out storage.ReplicaUpdateProof, err error) {
|
|
|
|
ctx, cancel := context.WithCancel(ctx)
|
|
|
|
defer cancel()
|
|
|
|
|
|
|
|
wk, wait, cancel, err := m.getWork(ctx, sealtasks.TTProveReplicaUpdate2, sector, sectorKey, newSealed, newUnsealed, vanillaProofs)
|
|
|
|
if err != nil {
|
|
|
|
return nil, xerrors.Errorf("getWork: %w", err)
|
|
|
|
}
|
|
|
|
defer cancel()
|
|
|
|
|
|
|
|
var waitErr error
|
|
|
|
waitRes := func() {
|
|
|
|
p, werr := m.waitWork(ctx, wk)
|
|
|
|
if werr != nil {
|
|
|
|
waitErr = werr
|
|
|
|
return
|
|
|
|
}
|
|
|
|
if p != nil {
|
|
|
|
out = p.(storage.ReplicaUpdateProof)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if wait { // already in progress
|
|
|
|
waitRes()
|
|
|
|
return out, waitErr
|
|
|
|
}
|
|
|
|
|
|
|
|
selector := newTaskSelector()
|
|
|
|
|
|
|
|
err = m.sched.Schedule(ctx, sector, sealtasks.TTProveReplicaUpdate2, selector, schedNop, func(ctx context.Context, w Worker) error {
|
|
|
|
err := m.startWork(ctx, w, wk)(w.ProveReplicaUpdate2(ctx, sector, sectorKey, newSealed, newUnsealed, vanillaProofs))
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
waitRes()
|
|
|
|
return nil
|
|
|
|
})
|
|
|
|
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
return out, waitErr
|
|
|
|
}
|
|
|
|
|
2022-04-26 16:22:52 +00:00
|
|
|
func (m *Manager) ReturnDataCid(ctx context.Context, callID storiface.CallID, pi abi.PieceInfo, err *storiface.CallError) error {
|
|
|
|
return m.returnResult(ctx, callID, pi, err)
|
|
|
|
}
|
|
|
|
|
2020-11-17 15:17:45 +00:00
|
|
|
func (m *Manager) ReturnAddPiece(ctx context.Context, callID storiface.CallID, pi abi.PieceInfo, err *storiface.CallError) error {
|
2021-02-21 10:03:00 +00:00
|
|
|
return m.returnResult(ctx, callID, pi, err)
|
2020-09-07 10:20:50 +00:00
|
|
|
}
|
|
|
|
|
2020-11-17 15:17:45 +00:00
|
|
|
func (m *Manager) ReturnSealPreCommit1(ctx context.Context, callID storiface.CallID, p1o storage.PreCommit1Out, err *storiface.CallError) error {
|
2021-02-21 10:03:00 +00:00
|
|
|
return m.returnResult(ctx, callID, p1o, err)
|
2020-09-07 10:20:50 +00:00
|
|
|
}
|
|
|
|
|
2020-11-17 15:17:45 +00:00
|
|
|
func (m *Manager) ReturnSealPreCommit2(ctx context.Context, callID storiface.CallID, sealed storage.SectorCids, err *storiface.CallError) error {
|
2021-02-21 10:03:00 +00:00
|
|
|
return m.returnResult(ctx, callID, sealed, err)
|
2020-09-07 10:20:50 +00:00
|
|
|
}
|
|
|
|
|
2020-11-17 15:17:45 +00:00
|
|
|
func (m *Manager) ReturnSealCommit1(ctx context.Context, callID storiface.CallID, out storage.Commit1Out, err *storiface.CallError) error {
|
2021-02-21 10:03:00 +00:00
|
|
|
return m.returnResult(ctx, callID, out, err)
|
2020-09-07 10:20:50 +00:00
|
|
|
}
|
|
|
|
|
2020-11-17 15:17:45 +00:00
|
|
|
func (m *Manager) ReturnSealCommit2(ctx context.Context, callID storiface.CallID, proof storage.Proof, err *storiface.CallError) error {
|
2021-02-21 10:03:00 +00:00
|
|
|
return m.returnResult(ctx, callID, proof, err)
|
2020-09-07 10:20:50 +00:00
|
|
|
}
|
|
|
|
|
2020-11-17 15:17:45 +00:00
|
|
|
func (m *Manager) ReturnFinalizeSector(ctx context.Context, callID storiface.CallID, err *storiface.CallError) error {
|
2021-02-21 10:03:00 +00:00
|
|
|
return m.returnResult(ctx, callID, nil, err)
|
2020-09-07 10:20:50 +00:00
|
|
|
}
|
|
|
|
|
2020-11-17 15:17:45 +00:00
|
|
|
func (m *Manager) ReturnReleaseUnsealed(ctx context.Context, callID storiface.CallID, err *storiface.CallError) error {
|
2021-02-21 10:03:00 +00:00
|
|
|
return m.returnResult(ctx, callID, nil, err)
|
2020-09-07 10:20:50 +00:00
|
|
|
}
|
|
|
|
|
2021-11-10 18:53:00 +00:00
|
|
|
func (m *Manager) ReturnReplicaUpdate(ctx context.Context, callID storiface.CallID, out storage.ReplicaUpdateOut, err *storiface.CallError) error {
|
|
|
|
return m.returnResult(ctx, callID, out, err)
|
|
|
|
}
|
|
|
|
|
|
|
|
func (m *Manager) ReturnProveReplicaUpdate1(ctx context.Context, callID storiface.CallID, out storage.ReplicaVanillaProofs, err *storiface.CallError) error {
|
|
|
|
return m.returnResult(ctx, callID, out, err)
|
|
|
|
}
|
|
|
|
|
|
|
|
func (m *Manager) ReturnProveReplicaUpdate2(ctx context.Context, callID storiface.CallID, proof storage.ReplicaUpdateProof, err *storiface.CallError) error {
|
|
|
|
return m.returnResult(ctx, callID, proof, err)
|
|
|
|
}
|
|
|
|
|
2022-02-08 14:06:42 +00:00
|
|
|
func (m *Manager) ReturnFinalizeReplicaUpdate(ctx context.Context, callID storiface.CallID, err *storiface.CallError) error {
|
|
|
|
return m.returnResult(ctx, callID, nil, err)
|
|
|
|
}
|
|
|
|
|
2021-12-01 19:01:55 +00:00
|
|
|
func (m *Manager) ReturnGenerateSectorKeyFromData(ctx context.Context, callID storiface.CallID, err *storiface.CallError) error {
|
|
|
|
return m.returnResult(ctx, callID, nil, err)
|
|
|
|
}
|
|
|
|
|
2020-11-17 15:17:45 +00:00
|
|
|
func (m *Manager) ReturnMoveStorage(ctx context.Context, callID storiface.CallID, err *storiface.CallError) error {
|
2021-02-21 10:03:00 +00:00
|
|
|
return m.returnResult(ctx, callID, nil, err)
|
2020-09-07 10:20:50 +00:00
|
|
|
}
|
|
|
|
|
2020-11-17 15:17:45 +00:00
|
|
|
func (m *Manager) ReturnUnsealPiece(ctx context.Context, callID storiface.CallID, err *storiface.CallError) error {
|
2021-02-21 10:03:00 +00:00
|
|
|
return m.returnResult(ctx, callID, nil, err)
|
2020-09-07 10:20:50 +00:00
|
|
|
}
|
|
|
|
|
2020-11-17 15:17:45 +00:00
|
|
|
func (m *Manager) ReturnReadPiece(ctx context.Context, callID storiface.CallID, ok bool, err *storiface.CallError) error {
|
2021-02-21 10:03:00 +00:00
|
|
|
return m.returnResult(ctx, callID, ok, err)
|
2020-09-07 10:20:50 +00:00
|
|
|
}
|
|
|
|
|
2020-11-17 15:17:45 +00:00
|
|
|
func (m *Manager) ReturnFetch(ctx context.Context, callID storiface.CallID, err *storiface.CallError) error {
|
2021-02-21 10:03:00 +00:00
|
|
|
return m.returnResult(ctx, callID, nil, err)
|
2020-09-07 10:20:50 +00:00
|
|
|
}
|
|
|
|
|
2022-01-18 10:57:04 +00:00
|
|
|
func (m *Manager) StorageLocal(ctx context.Context) (map[storiface.ID]string, error) {
|
2020-03-23 11:40:02 +00:00
|
|
|
l, err := m.localStore.Local(ctx)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
2022-01-18 10:57:04 +00:00
|
|
|
out := map[storiface.ID]string{}
|
2020-03-23 11:40:02 +00:00
|
|
|
for _, st := range l {
|
|
|
|
out[st.ID] = st.LocalPath
|
|
|
|
}
|
|
|
|
|
|
|
|
return out, nil
|
|
|
|
}
|
|
|
|
|
2022-01-18 10:57:04 +00:00
|
|
|
func (m *Manager) FsStat(ctx context.Context, id storiface.ID) (fsutil.FsStat, error) {
|
2020-03-23 22:43:38 +00:00
|
|
|
return m.storage.FsStat(ctx, id)
|
|
|
|
}
|
|
|
|
|
2020-10-30 10:07:35 +00:00
|
|
|
func (m *Manager) SchedDiag(ctx context.Context, doSched bool) (interface{}, error) {
|
|
|
|
if doSched {
|
|
|
|
select {
|
|
|
|
case m.sched.workerChange <- struct{}{}:
|
|
|
|
case <-ctx.Done():
|
|
|
|
return nil, ctx.Err()
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-11-11 16:39:31 +00:00
|
|
|
si, err := m.sched.Info(ctx)
|
2020-11-11 15:47:44 +00:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
type SchedInfo interface{}
|
2020-11-11 16:39:31 +00:00
|
|
|
i := struct {
|
2020-11-11 15:47:44 +00:00
|
|
|
SchedInfo
|
|
|
|
|
|
|
|
ReturnedWork []string
|
2020-11-11 16:39:31 +00:00
|
|
|
Waiting []string
|
2020-11-11 15:47:44 +00:00
|
|
|
|
|
|
|
CallToWork map[string]string
|
|
|
|
|
|
|
|
EarlyRet []string
|
|
|
|
}{
|
|
|
|
SchedInfo: si,
|
|
|
|
|
|
|
|
CallToWork: map[string]string{},
|
|
|
|
}
|
|
|
|
|
|
|
|
m.workLk.Lock()
|
|
|
|
|
|
|
|
for w := range m.results {
|
|
|
|
i.ReturnedWork = append(i.ReturnedWork, w.String())
|
|
|
|
}
|
|
|
|
|
|
|
|
for id := range m.callRes {
|
|
|
|
i.EarlyRet = append(i.EarlyRet, id.String())
|
|
|
|
}
|
|
|
|
|
|
|
|
for w := range m.waitRes {
|
|
|
|
i.Waiting = append(i.Waiting, w.String())
|
|
|
|
}
|
|
|
|
|
|
|
|
for c, w := range m.callToWork {
|
|
|
|
i.CallToWork[c.String()] = w.String()
|
|
|
|
}
|
|
|
|
|
|
|
|
m.workLk.Unlock()
|
|
|
|
|
|
|
|
return i, nil
|
2020-07-27 10:17:09 +00:00
|
|
|
}
|
|
|
|
|
2020-07-17 10:59:12 +00:00
|
|
|
func (m *Manager) Close(ctx context.Context) error {
|
2022-01-14 13:11:04 +00:00
|
|
|
m.windowPoStSched.schedClose()
|
|
|
|
m.winningPoStSched.schedClose()
|
2020-07-17 10:59:12 +00:00
|
|
|
return m.sched.Close(ctx)
|
2020-03-24 23:49:45 +00:00
|
|
|
}
|
|
|
|
|
2021-05-18 07:32:30 +00:00
|
|
|
var _ Unsealer = &Manager{}
|
2020-03-23 11:40:02 +00:00
|
|
|
var _ SectorManager = &Manager{}
|