2022-01-14 13:11:04 +00:00
|
|
|
package sealworker
|
|
|
|
|
|
|
|
import (
|
|
|
|
"context"
|
|
|
|
"net/http"
|
|
|
|
"sync/atomic"
|
|
|
|
|
|
|
|
"github.com/google/uuid"
|
2022-01-18 10:37:15 +00:00
|
|
|
"github.com/gorilla/mux"
|
2022-08-11 15:53:58 +00:00
|
|
|
logging "github.com/ipfs/go-log/v2"
|
2022-01-14 13:11:04 +00:00
|
|
|
"github.com/mitchellh/go-homedir"
|
|
|
|
"golang.org/x/xerrors"
|
|
|
|
|
2022-01-18 10:37:15 +00:00
|
|
|
"github.com/filecoin-project/go-jsonrpc"
|
|
|
|
"github.com/filecoin-project/go-jsonrpc/auth"
|
|
|
|
|
2022-01-14 13:11:04 +00:00
|
|
|
"github.com/filecoin-project/lotus/api"
|
|
|
|
apitypes "github.com/filecoin-project/lotus/api/types"
|
|
|
|
"github.com/filecoin-project/lotus/build"
|
2022-01-18 10:37:15 +00:00
|
|
|
"github.com/filecoin-project/lotus/lib/rpcenc"
|
|
|
|
"github.com/filecoin-project/lotus/metrics/proxy"
|
2022-06-14 18:25:52 +00:00
|
|
|
"github.com/filecoin-project/lotus/storage/paths"
|
2022-06-14 18:03:38 +00:00
|
|
|
"github.com/filecoin-project/lotus/storage/sealer"
|
|
|
|
"github.com/filecoin-project/lotus/storage/sealer/storiface"
|
2022-01-14 13:11:04 +00:00
|
|
|
)
|
|
|
|
|
2022-08-11 14:44:26 +00:00
|
|
|
var log = logging.Logger("sealworker")
|
|
|
|
|
2022-01-14 13:11:04 +00:00
|
|
|
func WorkerHandler(authv func(ctx context.Context, token string) ([]auth.Permission, error), remote http.HandlerFunc, a api.Worker, permissioned bool) http.Handler {
|
|
|
|
mux := mux.NewRouter()
|
|
|
|
readerHandler, readerServerOpt := rpcenc.ReaderParamDecoder()
|
2022-07-18 16:36:51 +00:00
|
|
|
rpcServer := jsonrpc.NewServer(jsonrpc.WithServerErrors(api.RPCErrors), readerServerOpt)
|
2022-01-14 13:11:04 +00:00
|
|
|
|
|
|
|
wapi := proxy.MetricedWorkerAPI(a)
|
|
|
|
if permissioned {
|
|
|
|
wapi = api.PermissionedWorkerAPI(wapi)
|
|
|
|
}
|
|
|
|
|
|
|
|
rpcServer.Register("Filecoin", wapi)
|
2022-05-27 11:23:32 +00:00
|
|
|
rpcServer.AliasMethod("rpc.discover", "Filecoin.Discover")
|
2022-01-14 13:11:04 +00:00
|
|
|
|
|
|
|
mux.Handle("/rpc/v0", rpcServer)
|
|
|
|
mux.Handle("/rpc/streams/v0/push/{uuid}", readerHandler)
|
|
|
|
mux.PathPrefix("/remote").HandlerFunc(remote)
|
|
|
|
mux.PathPrefix("/").Handler(http.DefaultServeMux) // pprof
|
|
|
|
|
|
|
|
if !permissioned {
|
|
|
|
return mux
|
|
|
|
}
|
|
|
|
|
|
|
|
ah := &auth.Handler{
|
|
|
|
Verify: authv,
|
|
|
|
Next: mux.ServeHTTP,
|
|
|
|
}
|
|
|
|
return ah
|
|
|
|
}
|
|
|
|
|
|
|
|
type Worker struct {
|
2022-06-14 18:03:38 +00:00
|
|
|
*sealer.LocalWorker
|
2022-01-14 13:11:04 +00:00
|
|
|
|
2022-06-14 18:25:52 +00:00
|
|
|
LocalStore *paths.Local
|
|
|
|
Storage paths.LocalStorage
|
2022-01-14 13:11:04 +00:00
|
|
|
|
|
|
|
disabled int64
|
|
|
|
}
|
|
|
|
|
|
|
|
func (w *Worker) Version(context.Context) (api.Version, error) {
|
|
|
|
return api.WorkerAPIVersion0, nil
|
|
|
|
}
|
|
|
|
|
2022-07-15 14:09:13 +00:00
|
|
|
func (w *Worker) StorageLocal(ctx context.Context) (map[storiface.ID]string, error) {
|
|
|
|
l, err := w.LocalStore.Local(ctx)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
out := map[storiface.ID]string{}
|
|
|
|
for _, st := range l {
|
|
|
|
out[st.ID] = st.LocalPath
|
|
|
|
}
|
|
|
|
|
|
|
|
return out, nil
|
|
|
|
}
|
|
|
|
|
2022-01-14 13:11:04 +00:00
|
|
|
func (w *Worker) StorageAddLocal(ctx context.Context, path string) error {
|
|
|
|
path, err := homedir.Expand(path)
|
|
|
|
if err != nil {
|
|
|
|
return xerrors.Errorf("expanding local path: %w", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
if err := w.LocalStore.OpenPath(ctx, path); err != nil {
|
|
|
|
return xerrors.Errorf("opening local path: %w", err)
|
|
|
|
}
|
|
|
|
|
2022-06-14 18:25:52 +00:00
|
|
|
if err := w.Storage.SetStorage(func(sc *paths.StorageConfig) {
|
|
|
|
sc.StoragePaths = append(sc.StoragePaths, paths.LocalPath{Path: path})
|
2022-01-14 13:11:04 +00:00
|
|
|
}); err != nil {
|
|
|
|
return xerrors.Errorf("get storage config: %w", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2022-07-13 18:09:21 +00:00
|
|
|
func (w *Worker) StorageDetachLocal(ctx context.Context, path string) error {
|
|
|
|
path, err := homedir.Expand(path)
|
|
|
|
if err != nil {
|
|
|
|
return xerrors.Errorf("expanding local path: %w", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// check that we have the path opened
|
|
|
|
lps, err := w.LocalStore.Local(ctx)
|
|
|
|
if err != nil {
|
|
|
|
return xerrors.Errorf("getting local path list: %w", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
var localPath *storiface.StoragePath
|
|
|
|
for _, lp := range lps {
|
|
|
|
if lp.LocalPath == path {
|
2022-07-15 10:56:03 +00:00
|
|
|
lp := lp // copy to make the linter happy
|
2022-07-13 18:09:21 +00:00
|
|
|
localPath = &lp
|
|
|
|
break
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if localPath == nil {
|
|
|
|
return xerrors.Errorf("no local paths match '%s'", path)
|
|
|
|
}
|
|
|
|
|
|
|
|
// drop from the persisted storage.json
|
|
|
|
var found bool
|
|
|
|
if err := w.Storage.SetStorage(func(sc *paths.StorageConfig) {
|
|
|
|
out := make([]paths.LocalPath, 0, len(sc.StoragePaths))
|
|
|
|
for _, storagePath := range sc.StoragePaths {
|
|
|
|
if storagePath.Path != path {
|
|
|
|
out = append(out, storagePath)
|
2022-07-15 10:56:03 +00:00
|
|
|
continue
|
2022-07-13 18:09:21 +00:00
|
|
|
}
|
|
|
|
found = true
|
|
|
|
}
|
2022-07-15 10:56:03 +00:00
|
|
|
sc.StoragePaths = out
|
2022-07-13 18:09:21 +00:00
|
|
|
}); err != nil {
|
|
|
|
return xerrors.Errorf("set storage config: %w", err)
|
|
|
|
}
|
|
|
|
if !found {
|
|
|
|
// maybe this is fine?
|
|
|
|
return xerrors.Errorf("path not found in storage.json")
|
|
|
|
}
|
|
|
|
|
|
|
|
// unregister locally, drop from sector index
|
|
|
|
return w.LocalStore.ClosePath(ctx, localPath.ID)
|
|
|
|
}
|
|
|
|
|
2022-08-10 21:06:01 +00:00
|
|
|
func (w *Worker) StorageDetachAll(ctx context.Context) error {
|
|
|
|
|
|
|
|
lps, err := w.LocalStore.Local(ctx)
|
|
|
|
if err != nil {
|
|
|
|
return xerrors.Errorf("getting local path list: %w", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
for _, lp := range lps {
|
2022-08-10 21:36:38 +00:00
|
|
|
err = w.LocalStore.ClosePath(ctx, lp.ID)
|
|
|
|
if err != nil {
|
2022-08-11 14:44:26 +00:00
|
|
|
log.Warnf("unable to close path: %w", err)
|
2022-08-10 21:36:38 +00:00
|
|
|
}
|
2022-08-10 21:06:01 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2022-07-15 10:44:05 +00:00
|
|
|
func (w *Worker) StorageRedeclareLocal(ctx context.Context, id *storiface.ID, dropMissing bool) error {
|
|
|
|
return w.LocalStore.Redeclare(ctx, id, dropMissing)
|
2022-07-13 18:09:21 +00:00
|
|
|
}
|
|
|
|
|
2022-01-14 13:11:04 +00:00
|
|
|
func (w *Worker) SetEnabled(ctx context.Context, enabled bool) error {
|
|
|
|
disabled := int64(1)
|
|
|
|
if enabled {
|
|
|
|
disabled = 0
|
|
|
|
}
|
|
|
|
atomic.StoreInt64(&w.disabled, disabled)
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (w *Worker) Enabled(ctx context.Context) (bool, error) {
|
|
|
|
return atomic.LoadInt64(&w.disabled) == 0, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (w *Worker) WaitQuiet(ctx context.Context) error {
|
|
|
|
w.LocalWorker.WaitQuiet() // uses WaitGroup under the hood so no ctx :/
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (w *Worker) ProcessSession(ctx context.Context) (uuid.UUID, error) {
|
|
|
|
return w.LocalWorker.Session(ctx)
|
|
|
|
}
|
|
|
|
|
|
|
|
func (w *Worker) Session(ctx context.Context) (uuid.UUID, error) {
|
|
|
|
if atomic.LoadInt64(&w.disabled) == 1 {
|
|
|
|
return uuid.UUID{}, xerrors.Errorf("worker disabled")
|
|
|
|
}
|
|
|
|
|
|
|
|
return w.LocalWorker.Session(ctx)
|
|
|
|
}
|
|
|
|
|
|
|
|
func (w *Worker) Discover(ctx context.Context) (apitypes.OpenRPCDocument, error) {
|
|
|
|
return build.OpenRPCDiscoverJSON_Worker(), nil
|
|
|
|
}
|
|
|
|
|
2022-07-29 22:33:30 +00:00
|
|
|
func (w *Worker) Shutdown(ctx context.Context) error {
|
|
|
|
return w.LocalWorker.Close()
|
|
|
|
}
|
|
|
|
|
2022-01-14 13:11:04 +00:00
|
|
|
var _ storiface.WorkerCalls = &Worker{}
|
2022-07-13 18:09:21 +00:00
|
|
|
var _ api.Worker = &Worker{}
|