2022-06-14 18:25:52 +00:00
|
|
|
package paths
|
2020-03-23 11:40:02 +00:00
|
|
|
|
|
|
|
import (
|
|
|
|
"context"
|
2020-03-23 22:43:38 +00:00
|
|
|
"encoding/json"
|
2021-05-20 10:49:44 +00:00
|
|
|
"fmt"
|
2020-12-10 03:07:17 +00:00
|
|
|
"io"
|
2020-03-24 20:28:07 +00:00
|
|
|
"math/bits"
|
2020-03-23 11:40:02 +00:00
|
|
|
"net/http"
|
2020-03-23 22:43:38 +00:00
|
|
|
"net/url"
|
2020-03-23 11:40:02 +00:00
|
|
|
"os"
|
2020-03-23 22:43:38 +00:00
|
|
|
gopath "path"
|
2020-07-24 17:39:25 +00:00
|
|
|
"path/filepath"
|
2020-03-23 11:40:02 +00:00
|
|
|
"sort"
|
2021-07-27 03:15:53 +00:00
|
|
|
"strings"
|
2020-03-23 11:40:02 +00:00
|
|
|
"sync"
|
2023-05-25 13:55:12 +00:00
|
|
|
"time"
|
2020-03-23 11:40:02 +00:00
|
|
|
|
2022-06-14 15:00:51 +00:00
|
|
|
"github.com/hashicorp/go-multierror"
|
2024-01-12 10:03:37 +00:00
|
|
|
"github.com/ipfs/go-cid"
|
2022-06-14 15:00:51 +00:00
|
|
|
"golang.org/x/xerrors"
|
2020-03-23 11:40:02 +00:00
|
|
|
|
2020-09-07 03:49:10 +00:00
|
|
|
"github.com/filecoin-project/go-state-types/abi"
|
2020-03-23 11:40:02 +00:00
|
|
|
|
2022-06-14 18:03:38 +00:00
|
|
|
"github.com/filecoin-project/lotus/storage/sealer/fsutil"
|
2023-05-25 13:55:12 +00:00
|
|
|
"github.com/filecoin-project/lotus/storage/sealer/partialfile"
|
2022-06-15 10:06:22 +00:00
|
|
|
"github.com/filecoin-project/lotus/storage/sealer/storiface"
|
2020-03-23 11:40:02 +00:00
|
|
|
)
|
|
|
|
|
2020-07-24 17:39:25 +00:00
|
|
|
var FetchTempSubdir = "fetching"
|
|
|
|
|
2020-12-10 19:51:50 +00:00
|
|
|
var CopyBuf = 1 << 20
|
|
|
|
|
2023-05-25 13:55:12 +00:00
|
|
|
// LocalReaderTimeout is the timeout for keeping local reader files open without
|
|
|
|
// any read activity.
|
|
|
|
var LocalReaderTimeout = 5 * time.Second
|
|
|
|
|
2020-03-23 11:40:02 +00:00
|
|
|
type Remote struct {
|
2021-05-20 11:01:25 +00:00
|
|
|
local Store
|
2020-03-23 11:40:02 +00:00
|
|
|
index SectorIndex
|
|
|
|
auth http.Header
|
|
|
|
|
2020-07-24 14:43:41 +00:00
|
|
|
limit chan struct{}
|
|
|
|
|
2020-05-01 18:04:21 +00:00
|
|
|
fetchLk sync.Mutex
|
2020-04-29 15:58:55 +00:00
|
|
|
fetching map[abi.SectorID]chan struct{}
|
2021-05-20 11:01:25 +00:00
|
|
|
|
2021-10-11 19:05:05 +00:00
|
|
|
pfHandler PartialFileHandler
|
2020-03-23 11:40:02 +00:00
|
|
|
}
|
|
|
|
|
2022-03-16 10:23:10 +00:00
|
|
|
func (r *Remote) RemoveCopies(ctx context.Context, s abi.SectorID, typ storiface.SectorFileType) error {
|
|
|
|
if bits.OnesCount(uint(typ)) != 1 {
|
2022-03-16 11:03:44 +00:00
|
|
|
return xerrors.New("RemoveCopies expects one file type")
|
2022-03-16 10:23:10 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
if err := r.local.RemoveCopies(ctx, s, typ); err != nil {
|
|
|
|
return xerrors.Errorf("removing local copies: %w", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
si, err := r.index.StorageFindSector(ctx, s, typ, 0, false)
|
|
|
|
if err != nil {
|
|
|
|
return xerrors.Errorf("finding existing sector %d(t:%d) failed: %w", s, typ, err)
|
|
|
|
}
|
|
|
|
|
|
|
|
var hasPrimary bool
|
2022-03-18 09:54:34 +00:00
|
|
|
var keep []storiface.ID
|
2022-03-16 10:23:10 +00:00
|
|
|
for _, info := range si {
|
|
|
|
if info.Primary {
|
|
|
|
hasPrimary = true
|
|
|
|
keep = append(keep, info.ID)
|
|
|
|
break
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if !hasPrimary {
|
|
|
|
log.Warnf("remote RemoveCopies: no primary copies of sector %v (%s), not removing anything", s, typ)
|
|
|
|
return nil
|
|
|
|
}
|
2020-05-20 16:36:46 +00:00
|
|
|
|
2022-03-16 10:23:10 +00:00
|
|
|
return r.Remove(ctx, s, typ, true, keep)
|
2020-05-20 16:36:46 +00:00
|
|
|
}
|
|
|
|
|
2021-10-11 19:05:05 +00:00
|
|
|
func NewRemote(local Store, index SectorIndex, auth http.Header, fetchLimit int, pfHandler PartialFileHandler) *Remote {
|
2020-03-23 11:40:02 +00:00
|
|
|
return &Remote{
|
|
|
|
local: local,
|
|
|
|
index: index,
|
|
|
|
auth: auth,
|
2020-04-29 15:58:55 +00:00
|
|
|
|
2020-07-24 14:43:41 +00:00
|
|
|
limit: make(chan struct{}, fetchLimit),
|
|
|
|
|
2021-05-20 11:01:25 +00:00
|
|
|
fetching: map[abi.SectorID]chan struct{}{},
|
|
|
|
pfHandler: pfHandler,
|
2020-03-23 11:40:02 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2022-06-17 11:31:05 +00:00
|
|
|
func (r *Remote) AcquireSector(ctx context.Context, s storiface.SectorRef, existing storiface.SectorFileType, allocate storiface.SectorFileType, pathType storiface.PathType, op storiface.AcquireMode) (storiface.SectorPaths, storiface.SectorPaths, error) {
|
2020-03-23 11:40:02 +00:00
|
|
|
if existing|allocate != existing^allocate {
|
2020-09-06 16:54:00 +00:00
|
|
|
return storiface.SectorPaths{}, storiface.SectorPaths{}, xerrors.New("can't both find and allocate a sector")
|
2020-03-23 11:40:02 +00:00
|
|
|
}
|
|
|
|
|
2022-05-10 22:36:45 +00:00
|
|
|
// First make sure that no other goroutines are trying to fetch this sector;
|
|
|
|
// wait if there are any.
|
2020-04-29 15:58:55 +00:00
|
|
|
for {
|
|
|
|
r.fetchLk.Lock()
|
|
|
|
|
2020-11-04 20:29:08 +00:00
|
|
|
c, locked := r.fetching[s.ID]
|
2020-04-29 15:58:55 +00:00
|
|
|
if !locked {
|
2020-11-04 20:29:08 +00:00
|
|
|
r.fetching[s.ID] = make(chan struct{})
|
2020-04-29 15:58:55 +00:00
|
|
|
r.fetchLk.Unlock()
|
|
|
|
break
|
|
|
|
}
|
|
|
|
|
|
|
|
r.fetchLk.Unlock()
|
|
|
|
|
|
|
|
select {
|
|
|
|
case <-c:
|
|
|
|
continue
|
|
|
|
case <-ctx.Done():
|
2020-09-06 16:54:00 +00:00
|
|
|
return storiface.SectorPaths{}, storiface.SectorPaths{}, ctx.Err()
|
2020-04-29 15:58:55 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
defer func() {
|
|
|
|
r.fetchLk.Lock()
|
2020-11-04 20:29:08 +00:00
|
|
|
close(r.fetching[s.ID])
|
|
|
|
delete(r.fetching, s.ID)
|
2020-04-29 15:58:55 +00:00
|
|
|
r.fetchLk.Unlock()
|
|
|
|
}()
|
2020-03-23 11:40:02 +00:00
|
|
|
|
2022-05-10 22:36:45 +00:00
|
|
|
// Try to get the sector from local storage
|
2020-11-04 20:29:08 +00:00
|
|
|
paths, stores, err := r.local.AcquireSector(ctx, s, existing, allocate, pathType, op)
|
2020-03-23 11:40:02 +00:00
|
|
|
if err != nil {
|
2020-09-06 16:54:00 +00:00
|
|
|
return storiface.SectorPaths{}, storiface.SectorPaths{}, xerrors.Errorf("local acquire error: %w", err)
|
2020-03-23 11:40:02 +00:00
|
|
|
}
|
|
|
|
|
2020-09-06 16:54:00 +00:00
|
|
|
var toFetch storiface.SectorFileType
|
|
|
|
for _, fileType := range storiface.PathTypes {
|
2020-08-04 14:20:59 +00:00
|
|
|
if fileType&existing == 0 {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
2020-09-06 16:54:00 +00:00
|
|
|
if storiface.PathByType(paths, fileType) == "" {
|
2020-08-04 14:20:59 +00:00
|
|
|
toFetch |= fileType
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2022-07-01 16:02:10 +00:00
|
|
|
// get a list of paths to fetch data into. Note: file type filters will apply inside this call.
|
|
|
|
fetchPaths, ids, err := r.local.AcquireSector(ctx, s, storiface.FTNone, toFetch, pathType, op)
|
2020-08-04 14:20:59 +00:00
|
|
|
if err != nil {
|
2020-09-06 16:54:00 +00:00
|
|
|
return storiface.SectorPaths{}, storiface.SectorPaths{}, xerrors.Errorf("allocate local sector for fetching: %w", err)
|
2020-08-04 14:20:59 +00:00
|
|
|
}
|
|
|
|
|
2022-07-01 16:02:10 +00:00
|
|
|
overheadTable := storiface.FSOverheadSeal
|
2020-09-06 16:54:00 +00:00
|
|
|
if pathType == storiface.PathStorage {
|
2022-07-01 16:02:10 +00:00
|
|
|
overheadTable = storiface.FsOverheadFinalized
|
2020-08-04 14:20:59 +00:00
|
|
|
}
|
|
|
|
|
2022-05-10 22:36:45 +00:00
|
|
|
// If any path types weren't found in local storage, try fetching them
|
|
|
|
|
|
|
|
// First reserve storage
|
2022-07-01 16:02:10 +00:00
|
|
|
releaseStorage, err := r.local.Reserve(ctx, s, toFetch, ids, overheadTable)
|
2020-08-04 14:20:59 +00:00
|
|
|
if err != nil {
|
2020-09-06 16:54:00 +00:00
|
|
|
return storiface.SectorPaths{}, storiface.SectorPaths{}, xerrors.Errorf("reserving storage space: %w", err)
|
2020-08-04 14:20:59 +00:00
|
|
|
}
|
|
|
|
defer releaseStorage()
|
|
|
|
|
2020-09-06 16:54:00 +00:00
|
|
|
for _, fileType := range storiface.PathTypes {
|
2020-03-23 11:40:02 +00:00
|
|
|
if fileType&existing == 0 {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
2020-09-06 16:54:00 +00:00
|
|
|
if storiface.PathByType(paths, fileType) != "" {
|
2020-03-23 11:40:02 +00:00
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
2022-07-01 16:02:10 +00:00
|
|
|
dest := storiface.PathByType(fetchPaths, fileType)
|
2020-09-06 16:54:00 +00:00
|
|
|
storageID := storiface.PathByType(ids, fileType)
|
2020-08-04 14:20:59 +00:00
|
|
|
|
2020-12-10 19:51:50 +00:00
|
|
|
url, err := r.acquireFromRemote(ctx, s.ID, fileType, dest)
|
2020-03-23 11:40:02 +00:00
|
|
|
if err != nil {
|
2020-09-06 16:54:00 +00:00
|
|
|
return storiface.SectorPaths{}, storiface.SectorPaths{}, err
|
2020-03-23 11:40:02 +00:00
|
|
|
}
|
|
|
|
|
2020-09-06 16:54:00 +00:00
|
|
|
storiface.SetPathByType(&paths, fileType, dest)
|
|
|
|
storiface.SetPathByType(&stores, fileType, storageID)
|
2020-03-23 11:40:02 +00:00
|
|
|
|
2022-01-18 10:57:04 +00:00
|
|
|
if err := r.index.StorageDeclareSector(ctx, storiface.ID(storageID), s.ID, fileType, op == storiface.AcquireMove); err != nil {
|
2020-03-23 11:40:02 +00:00
|
|
|
log.Warnf("declaring sector %v in %s failed: %+v", s, storageID, err)
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
2020-09-06 16:54:00 +00:00
|
|
|
if op == storiface.AcquireMove {
|
2022-01-18 10:57:04 +00:00
|
|
|
id := storiface.ID(storageID)
|
2022-03-18 09:54:34 +00:00
|
|
|
if err := r.deleteFromRemote(ctx, url, []storiface.ID{id}); err != nil {
|
2020-05-20 16:36:46 +00:00
|
|
|
log.Warnf("deleting sector %v from %s (delete %s): %+v", s, storageID, url, err)
|
|
|
|
}
|
2020-03-23 11:40:02 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-06-04 19:00:16 +00:00
|
|
|
return paths, stores, nil
|
2020-03-23 11:40:02 +00:00
|
|
|
}
|
|
|
|
|
2020-08-04 14:20:59 +00:00
|
|
|
func tempFetchDest(spath string, create bool) (string, error) {
|
2020-07-24 17:39:25 +00:00
|
|
|
st, b := filepath.Split(spath)
|
|
|
|
tempdir := filepath.Join(st, FetchTempSubdir)
|
2020-08-04 14:20:59 +00:00
|
|
|
if create {
|
2020-08-16 10:40:35 +00:00
|
|
|
if err := os.MkdirAll(tempdir, 0755); err != nil { // nolint
|
2020-08-04 14:20:59 +00:00
|
|
|
return "", xerrors.Errorf("creating temp fetch dir: %w", err)
|
|
|
|
}
|
2020-07-24 17:39:25 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
return filepath.Join(tempdir, b), nil
|
|
|
|
}
|
|
|
|
|
2020-12-10 19:51:50 +00:00
|
|
|
func (r *Remote) acquireFromRemote(ctx context.Context, s abi.SectorID, fileType storiface.SectorFileType, dest string) (string, error) {
|
2020-08-11 07:27:03 +00:00
|
|
|
si, err := r.index.StorageFindSector(ctx, s, fileType, 0, false)
|
2020-03-23 11:40:02 +00:00
|
|
|
if err != nil {
|
2020-08-04 14:20:59 +00:00
|
|
|
return "", err
|
2020-03-23 11:40:02 +00:00
|
|
|
}
|
|
|
|
|
2020-04-29 14:03:44 +00:00
|
|
|
if len(si) == 0 {
|
2020-08-04 14:20:59 +00:00
|
|
|
return "", xerrors.Errorf("failed to acquire sector %v from remote(%d): %w", s, fileType, storiface.ErrSectorNotFound)
|
2020-04-29 14:03:44 +00:00
|
|
|
}
|
|
|
|
|
2020-05-01 18:04:21 +00:00
|
|
|
sort.Slice(si, func(i, j int) bool {
|
2020-03-23 11:40:02 +00:00
|
|
|
return si[i].Weight < si[j].Weight
|
|
|
|
})
|
|
|
|
|
|
|
|
var merr error
|
|
|
|
for _, info := range si {
|
2020-03-25 18:21:53 +00:00
|
|
|
// TODO: see what we have local, prefer that
|
|
|
|
|
2020-03-23 11:40:02 +00:00
|
|
|
for _, url := range info.URLs {
|
2020-08-04 14:20:59 +00:00
|
|
|
tempDest, err := tempFetchDest(dest, true)
|
2020-07-24 17:39:25 +00:00
|
|
|
if err != nil {
|
2020-08-04 14:20:59 +00:00
|
|
|
return "", err
|
2020-07-24 17:39:25 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
if err := os.RemoveAll(dest); err != nil {
|
2020-08-04 14:20:59 +00:00
|
|
|
return "", xerrors.Errorf("removing dest: %w", err)
|
2020-07-24 17:39:25 +00:00
|
|
|
}
|
2020-07-24 14:54:00 +00:00
|
|
|
|
2022-08-31 17:34:08 +00:00
|
|
|
err = r.fetchThrottled(ctx, url, tempDest)
|
2020-03-23 11:40:02 +00:00
|
|
|
if err != nil {
|
2020-07-24 14:54:00 +00:00
|
|
|
merr = multierror.Append(merr, xerrors.Errorf("fetch error %s (storage %s) -> %s: %w", url, info.ID, tempDest, err))
|
2023-04-12 23:05:01 +00:00
|
|
|
// fetching failed, remove temp file
|
|
|
|
if rerr := os.RemoveAll(tempDest); rerr != nil {
|
|
|
|
merr = multierror.Append(merr, xerrors.Errorf("removing temp dest (post-err cleanup): %w", rerr))
|
|
|
|
}
|
2020-03-23 11:40:02 +00:00
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
2023-06-28 11:56:00 +00:00
|
|
|
if err := Move(tempDest, dest); err != nil {
|
2020-08-04 14:20:59 +00:00
|
|
|
return "", xerrors.Errorf("fetch move error (storage %s) %s -> %s: %w", info.ID, tempDest, dest, err)
|
2020-07-24 14:54:00 +00:00
|
|
|
}
|
|
|
|
|
2020-03-23 11:40:02 +00:00
|
|
|
if merr != nil {
|
|
|
|
log.Warnw("acquireFromRemote encountered errors when fetching sector from remote", "errors", merr)
|
|
|
|
}
|
2020-08-04 14:20:59 +00:00
|
|
|
return url, nil
|
2020-03-23 11:40:02 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-08-04 14:20:59 +00:00
|
|
|
return "", xerrors.Errorf("failed to acquire sector %v from remote (tried %v): %w", s, si, merr)
|
2020-03-23 11:40:02 +00:00
|
|
|
}
|
|
|
|
|
2022-08-31 17:34:08 +00:00
|
|
|
func (r *Remote) fetchThrottled(ctx context.Context, url, outname string) (rerr error) {
|
2020-07-24 14:43:41 +00:00
|
|
|
if len(r.limit) >= cap(r.limit) {
|
|
|
|
log.Infof("Throttling fetch, %d already running", len(r.limit))
|
|
|
|
}
|
|
|
|
|
|
|
|
// TODO: Smarter throttling
|
|
|
|
// * Priority (just going sequentially is still pretty good)
|
|
|
|
// * Per interface
|
|
|
|
// * Aware of remote load
|
|
|
|
select {
|
|
|
|
case r.limit <- struct{}{}:
|
|
|
|
defer func() { <-r.limit }()
|
|
|
|
case <-ctx.Done():
|
|
|
|
return xerrors.Errorf("context error while waiting for fetch limiter: %w", ctx.Err())
|
|
|
|
}
|
|
|
|
|
2022-08-31 17:34:08 +00:00
|
|
|
return fetch(ctx, url, outname, r.auth)
|
2020-12-10 03:07:17 +00:00
|
|
|
}
|
|
|
|
|
2021-05-20 10:49:44 +00:00
|
|
|
func (r *Remote) checkAllocated(ctx context.Context, url string, spt abi.RegisteredSealProof, offset, size abi.PaddedPieceSize) (bool, error) {
|
|
|
|
url = fmt.Sprintf("%s/%d/allocated/%d/%d", url, spt, offset.Unpadded(), size.Unpadded())
|
|
|
|
req, err := http.NewRequest("GET", url, nil)
|
|
|
|
if err != nil {
|
|
|
|
return false, xerrors.Errorf("request: %w", err)
|
|
|
|
}
|
|
|
|
req.Header = r.auth.Clone()
|
|
|
|
req = req.WithContext(ctx)
|
|
|
|
|
|
|
|
resp, err := http.DefaultClient.Do(req)
|
|
|
|
if err != nil {
|
|
|
|
return false, xerrors.Errorf("do request: %w", err)
|
|
|
|
}
|
|
|
|
defer resp.Body.Close() // nolint
|
|
|
|
|
|
|
|
switch resp.StatusCode {
|
|
|
|
case http.StatusOK:
|
|
|
|
return true, nil
|
|
|
|
case http.StatusRequestedRangeNotSatisfiable:
|
|
|
|
return false, nil
|
|
|
|
default:
|
|
|
|
return false, xerrors.Errorf("unexpected http response: %d", resp.StatusCode)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2022-06-17 11:31:05 +00:00
|
|
|
func (r *Remote) MoveStorage(ctx context.Context, s storiface.SectorRef, types storiface.SectorFileType) error {
|
2020-03-25 18:21:53 +00:00
|
|
|
// Make sure we have the data local
|
2020-11-04 20:29:08 +00:00
|
|
|
_, _, err := r.AcquireSector(ctx, s, types, storiface.FTNone, storiface.PathStorage, storiface.AcquireMove)
|
2020-03-25 18:21:53 +00:00
|
|
|
if err != nil {
|
|
|
|
return xerrors.Errorf("acquire src storage (remote): %w", err)
|
|
|
|
}
|
|
|
|
|
2020-11-04 20:29:08 +00:00
|
|
|
return r.local.MoveStorage(ctx, s, types)
|
2020-03-25 18:21:53 +00:00
|
|
|
}
|
|
|
|
|
2022-01-18 10:57:04 +00:00
|
|
|
func (r *Remote) Remove(ctx context.Context, sid abi.SectorID, typ storiface.SectorFileType, force bool, keepIn []storiface.ID) error {
|
2020-03-24 20:28:07 +00:00
|
|
|
if bits.OnesCount(uint(typ)) != 1 {
|
|
|
|
return xerrors.New("delete expects one file type")
|
|
|
|
}
|
|
|
|
|
2021-10-11 19:05:05 +00:00
|
|
|
if err := r.local.Remove(ctx, sid, typ, force, keepIn); err != nil {
|
2020-03-24 20:28:07 +00:00
|
|
|
return xerrors.Errorf("remove from local: %w", err)
|
|
|
|
}
|
|
|
|
|
2020-08-11 07:27:03 +00:00
|
|
|
si, err := r.index.StorageFindSector(ctx, sid, typ, 0, false)
|
2020-03-24 20:28:07 +00:00
|
|
|
if err != nil {
|
|
|
|
return xerrors.Errorf("finding existing sector %d(t:%d) failed: %w", sid, typ, err)
|
|
|
|
}
|
|
|
|
|
2021-10-11 19:05:05 +00:00
|
|
|
storeLoop:
|
2020-03-24 20:28:07 +00:00
|
|
|
for _, info := range si {
|
2021-10-11 19:05:05 +00:00
|
|
|
for _, id := range keepIn {
|
|
|
|
if id == info.ID {
|
|
|
|
continue storeLoop
|
|
|
|
}
|
|
|
|
}
|
2020-03-24 20:28:07 +00:00
|
|
|
for _, url := range info.URLs {
|
2022-03-16 09:35:26 +00:00
|
|
|
if err := r.deleteFromRemote(ctx, url, keepIn); err != nil {
|
2020-03-24 20:28:07 +00:00
|
|
|
log.Warnf("remove %s: %+v", url, err)
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
break
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2022-03-18 09:54:34 +00:00
|
|
|
func (r *Remote) deleteFromRemote(ctx context.Context, url string, keepIn storiface.IDList) error {
|
2021-10-11 19:05:05 +00:00
|
|
|
if keepIn != nil {
|
2022-03-16 09:35:26 +00:00
|
|
|
url = url + "?keep=" + keepIn.String()
|
2021-10-11 19:05:05 +00:00
|
|
|
}
|
|
|
|
|
2020-03-23 11:40:02 +00:00
|
|
|
log.Infof("Delete %s", url)
|
|
|
|
|
|
|
|
req, err := http.NewRequest("DELETE", url, nil)
|
|
|
|
if err != nil {
|
|
|
|
return xerrors.Errorf("request: %w", err)
|
|
|
|
}
|
|
|
|
req.Header = r.auth
|
2020-03-23 22:43:38 +00:00
|
|
|
req = req.WithContext(ctx)
|
2020-03-23 11:40:02 +00:00
|
|
|
|
|
|
|
resp, err := http.DefaultClient.Do(req)
|
|
|
|
if err != nil {
|
|
|
|
return xerrors.Errorf("do request: %w", err)
|
|
|
|
}
|
2020-08-16 10:40:35 +00:00
|
|
|
defer resp.Body.Close() // nolint
|
2020-03-23 11:40:02 +00:00
|
|
|
|
|
|
|
if resp.StatusCode != 200 {
|
|
|
|
return xerrors.Errorf("non-200 code: %d", resp.StatusCode)
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2022-01-18 10:57:04 +00:00
|
|
|
func (r *Remote) FsStat(ctx context.Context, id storiface.ID) (fsutil.FsStat, error) {
|
2020-03-24 20:28:07 +00:00
|
|
|
st, err := r.local.FsStat(ctx, id)
|
2020-03-23 22:43:38 +00:00
|
|
|
switch err {
|
|
|
|
case nil:
|
|
|
|
return st, nil
|
|
|
|
case errPathNotFound:
|
|
|
|
break
|
|
|
|
default:
|
2020-07-08 14:58:09 +00:00
|
|
|
return fsutil.FsStat{}, xerrors.Errorf("local stat: %w", err)
|
2020-03-23 22:43:38 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
si, err := r.index.StorageInfo(ctx, id)
|
|
|
|
if err != nil {
|
2020-07-08 14:58:09 +00:00
|
|
|
return fsutil.FsStat{}, xerrors.Errorf("getting remote storage info: %w", err)
|
2020-03-23 22:43:38 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
if len(si.URLs) == 0 {
|
2020-07-08 14:58:09 +00:00
|
|
|
return fsutil.FsStat{}, xerrors.Errorf("no known URLs for remote storage %s", id)
|
2020-03-23 22:43:38 +00:00
|
|
|
}
|
|
|
|
|
2024-02-16 19:24:23 +00:00
|
|
|
for _, urlStr := range si.URLs {
|
|
|
|
rl, err := url.Parse(urlStr)
|
|
|
|
if err != nil {
|
|
|
|
log.Warnw("failed to parse URL", "url", urlStr, "error", err)
|
|
|
|
continue // Try the next URL
|
|
|
|
}
|
2020-03-23 22:43:38 +00:00
|
|
|
|
2024-02-16 19:24:23 +00:00
|
|
|
rl.Path = gopath.Join(rl.Path, "stat", string(id))
|
2020-03-23 22:43:38 +00:00
|
|
|
|
2024-02-16 19:24:23 +00:00
|
|
|
req, err := http.NewRequest("GET", rl.String(), nil)
|
2020-03-23 22:43:38 +00:00
|
|
|
if err != nil {
|
2024-02-16 19:24:23 +00:00
|
|
|
log.Warnw("creating request failed", "url", rl.String(), "error", err)
|
|
|
|
continue // Try the next URL
|
2020-03-23 22:43:38 +00:00
|
|
|
}
|
2024-02-16 19:24:23 +00:00
|
|
|
req.Header = r.auth
|
|
|
|
req = req.WithContext(ctx)
|
2020-03-23 22:43:38 +00:00
|
|
|
|
2024-02-16 19:24:23 +00:00
|
|
|
resp, err := http.DefaultClient.Do(req)
|
|
|
|
if err != nil {
|
|
|
|
log.Warnw("request failed", "url", rl.String(), "error", err)
|
|
|
|
continue // Try the next URL
|
|
|
|
}
|
2020-03-23 22:43:38 +00:00
|
|
|
|
2024-02-16 19:24:23 +00:00
|
|
|
if resp.StatusCode == 200 {
|
|
|
|
var out fsutil.FsStat
|
|
|
|
if err := json.NewDecoder(resp.Body).Decode(&out); err != nil {
|
|
|
|
_ = resp.Body.Close()
|
|
|
|
log.Warnw("decoding response failed", "url", rl.String(), "error", err)
|
|
|
|
continue // Try the next URL
|
|
|
|
}
|
|
|
|
_ = resp.Body.Close()
|
|
|
|
return out, nil // Successfully decoded, return the result
|
|
|
|
} else {
|
|
|
|
b, _ := io.ReadAll(resp.Body) // Best-effort read the body for logging
|
|
|
|
log.Warnw("request to endpoint failed", "url", rl.String(), "statusCode", resp.StatusCode, "response", string(b))
|
|
|
|
_ = resp.Body.Close()
|
|
|
|
// Continue to try the next URL, don't return here as we want to try all URLs
|
|
|
|
}
|
2020-03-23 22:43:38 +00:00
|
|
|
}
|
|
|
|
|
2024-02-16 19:24:23 +00:00
|
|
|
return fsutil.FsStat{}, xerrors.Errorf("all endpoints failed for remote storage %s", id)
|
2020-03-23 22:43:38 +00:00
|
|
|
}
|
|
|
|
|
2021-05-18 07:32:30 +00:00
|
|
|
func (r *Remote) readRemote(ctx context.Context, url string, offset, size abi.PaddedPieceSize) (io.ReadCloser, error) {
|
|
|
|
if len(r.limit) >= cap(r.limit) {
|
|
|
|
log.Infof("Throttling remote read, %d already running", len(r.limit))
|
|
|
|
}
|
|
|
|
|
|
|
|
// TODO: Smarter throttling
|
|
|
|
// * Priority (just going sequentially is still pretty good)
|
|
|
|
// * Per interface
|
|
|
|
// * Aware of remote load
|
|
|
|
select {
|
|
|
|
case r.limit <- struct{}{}:
|
|
|
|
defer func() { <-r.limit }()
|
|
|
|
case <-ctx.Done():
|
|
|
|
return nil, xerrors.Errorf("context error while waiting for fetch limiter: %w", ctx.Err())
|
|
|
|
}
|
|
|
|
|
|
|
|
req, err := http.NewRequest("GET", url, nil)
|
|
|
|
if err != nil {
|
|
|
|
return nil, xerrors.Errorf("request: %w", err)
|
|
|
|
}
|
2021-05-20 11:01:25 +00:00
|
|
|
|
|
|
|
if r.auth != nil {
|
|
|
|
req.Header = r.auth.Clone()
|
|
|
|
}
|
2021-05-18 07:32:30 +00:00
|
|
|
req.Header.Set("Range", fmt.Sprintf("bytes=%d-%d", offset, offset+size-1))
|
|
|
|
req = req.WithContext(ctx)
|
|
|
|
|
|
|
|
resp, err := http.DefaultClient.Do(req)
|
|
|
|
if err != nil {
|
|
|
|
return nil, xerrors.Errorf("do request: %w", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
if resp.StatusCode != http.StatusOK && resp.StatusCode != http.StatusPartialContent {
|
|
|
|
resp.Body.Close() // nolint
|
|
|
|
return nil, xerrors.Errorf("non-200 code: %d", resp.StatusCode)
|
|
|
|
}
|
|
|
|
|
|
|
|
return resp.Body, nil
|
|
|
|
}
|
|
|
|
|
2021-05-22 17:10:21 +00:00
|
|
|
// CheckIsUnsealed checks if we have an unsealed piece at the given offset in an already unsealed sector file for the given piece
|
|
|
|
// either locally or on any of the workers.
|
|
|
|
// Returns true if we have the unsealed piece, false otherwise.
|
2022-06-17 11:31:05 +00:00
|
|
|
func (r *Remote) CheckIsUnsealed(ctx context.Context, s storiface.SectorRef, offset, size abi.PaddedPieceSize) (bool, error) {
|
2021-05-22 17:10:21 +00:00
|
|
|
ft := storiface.FTUnsealed
|
|
|
|
|
|
|
|
paths, _, err := r.local.AcquireSector(ctx, s, ft, storiface.FTNone, storiface.PathStorage, storiface.AcquireMove)
|
|
|
|
if err != nil {
|
|
|
|
return false, xerrors.Errorf("acquire local: %w", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
path := storiface.PathByType(paths, ft)
|
|
|
|
if path != "" {
|
|
|
|
// if we have the unsealed file locally, check if it has the unsealed piece.
|
|
|
|
log.Infof("Read local %s (+%d,%d)", path, offset, size)
|
|
|
|
ssize, err := s.ProofType.SectorSize()
|
|
|
|
if err != nil {
|
|
|
|
return false, err
|
|
|
|
}
|
|
|
|
|
|
|
|
// open the unsealed sector file for the given sector size located at the given path.
|
|
|
|
pf, err := r.pfHandler.OpenPartialFile(abi.PaddedPieceSize(ssize), path)
|
|
|
|
if err != nil {
|
|
|
|
return false, xerrors.Errorf("opening partial file: %w", err)
|
|
|
|
}
|
|
|
|
log.Debugf("local partial file opened %s (+%d,%d)", path, offset, size)
|
|
|
|
|
|
|
|
// even though we have an unsealed file for the given sector, we still need to determine if we have the unsealed piece
|
|
|
|
// in the unsealed sector file. That is what `HasAllocated` checks for.
|
|
|
|
has, err := r.pfHandler.HasAllocated(pf, storiface.UnpaddedByteIndex(offset.Unpadded()), size.Unpadded())
|
|
|
|
if err != nil {
|
|
|
|
return false, xerrors.Errorf("has allocated: %w", err)
|
|
|
|
}
|
|
|
|
|
2021-06-17 04:16:29 +00:00
|
|
|
// close the local unsealed file.
|
2021-05-22 17:10:21 +00:00
|
|
|
if err := r.pfHandler.Close(pf); err != nil {
|
|
|
|
return false, xerrors.Errorf("failed to close partial file: %s", err)
|
|
|
|
}
|
|
|
|
log.Debugf("checked if local partial file has the piece %s (+%d,%d), returning answer=%t", path, offset, size, has)
|
2021-06-17 04:16:29 +00:00
|
|
|
|
|
|
|
// Sector files can technically not have a piece unsealed locally, but have it unsealed in remote storage, so we probably
|
|
|
|
// want to return only if has is true
|
|
|
|
if has {
|
|
|
|
return has, nil
|
|
|
|
}
|
2021-05-22 17:10:21 +00:00
|
|
|
}
|
|
|
|
|
2021-06-17 04:16:29 +00:00
|
|
|
// --- We don't have the unsealed piece in an unsealed sector file locally
|
|
|
|
// Check if we have it in a remote cluster.
|
|
|
|
|
2021-05-22 17:10:21 +00:00
|
|
|
si, err := r.index.StorageFindSector(ctx, s.ID, ft, 0, false)
|
|
|
|
if err != nil {
|
|
|
|
return false, xerrors.Errorf("StorageFindSector: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
if len(si) == 0 {
|
|
|
|
return false, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
sort.Slice(si, func(i, j int) bool {
|
|
|
|
return si[i].Weight < si[j].Weight
|
|
|
|
})
|
|
|
|
|
|
|
|
for _, info := range si {
|
|
|
|
for _, url := range info.URLs {
|
|
|
|
ok, err := r.checkAllocated(ctx, url, s.ProofType, offset, size)
|
|
|
|
if err != nil {
|
|
|
|
log.Warnw("check if remote has piece", "url", url, "error", err)
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
if !ok {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
|
|
|
return true, nil
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return false, nil
|
|
|
|
}
|
|
|
|
|
2021-05-18 11:35:25 +00:00
|
|
|
// Reader returns a reader for an unsealed piece at the given offset in the given sector.
|
|
|
|
// If the Miner has the unsealed piece locally, it will return a reader that reads from the local copy.
|
|
|
|
// If the Miner does NOT have the unsealed piece locally, it will query all workers that have the unsealed sector file
|
|
|
|
// to know if they have the unsealed piece and will then read the unsealed piece data from a worker that has it.
|
|
|
|
//
|
|
|
|
// Returns a nil reader if :
|
|
|
|
// 1. no worker(local worker included) has an unsealed file for the given sector OR
|
|
|
|
// 2. no worker(local worker included) has the unsealed piece in their unsealed sector file.
|
|
|
|
// Will return a nil reader and a nil error in such a case.
|
2023-05-19 12:33:35 +00:00
|
|
|
func (r *Remote) Reader(ctx context.Context, s storiface.SectorRef, offset, size abi.PaddedPieceSize) (func(startOffsetAligned, endOffsetAligned storiface.PaddedByteIndex) (io.ReadCloser, error), error) {
|
2021-05-18 07:32:30 +00:00
|
|
|
ft := storiface.FTUnsealed
|
|
|
|
|
2021-05-18 11:35:25 +00:00
|
|
|
// check if we have the unsealed sector file locally
|
2021-05-18 07:32:30 +00:00
|
|
|
paths, _, err := r.local.AcquireSector(ctx, s, ft, storiface.FTNone, storiface.PathStorage, storiface.AcquireMove)
|
|
|
|
if err != nil {
|
|
|
|
return nil, xerrors.Errorf("acquire local: %w", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
path := storiface.PathByType(paths, ft)
|
2021-05-18 11:35:25 +00:00
|
|
|
|
2021-05-19 06:06:37 +00:00
|
|
|
if path != "" {
|
2021-05-18 11:35:25 +00:00
|
|
|
// if we have the unsealed file locally, return a reader that can be used to read the contents of the
|
|
|
|
// unsealed piece.
|
2021-06-08 04:39:27 +00:00
|
|
|
log.Debugf("Check local %s (+%d,%d)", path, offset, size)
|
2021-05-18 07:32:30 +00:00
|
|
|
ssize, err := s.ProofType.SectorSize()
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
2021-05-21 10:20:25 +00:00
|
|
|
log.Debugf("fetched sector size %s (+%d,%d)", path, offset, size)
|
2021-05-18 07:32:30 +00:00
|
|
|
|
2021-05-18 11:35:25 +00:00
|
|
|
// open the unsealed sector file for the given sector size located at the given path.
|
2021-05-20 11:01:25 +00:00
|
|
|
pf, err := r.pfHandler.OpenPartialFile(abi.PaddedPieceSize(ssize), path)
|
2021-05-18 07:32:30 +00:00
|
|
|
if err != nil {
|
|
|
|
return nil, xerrors.Errorf("opening partial file: %w", err)
|
|
|
|
}
|
2021-05-21 10:20:25 +00:00
|
|
|
log.Debugf("local partial file opened %s (+%d,%d)", path, offset, size)
|
2021-05-18 07:32:30 +00:00
|
|
|
|
2021-05-18 11:35:25 +00:00
|
|
|
// even though we have an unsealed file for the given sector, we still need to determine if we have the unsealed piece
|
|
|
|
// in the unsealed sector file. That is what `HasAllocated` checks for.
|
2021-05-20 11:01:25 +00:00
|
|
|
has, err := r.pfHandler.HasAllocated(pf, storiface.UnpaddedByteIndex(offset.Unpadded()), size.Unpadded())
|
2021-05-18 07:32:30 +00:00
|
|
|
if err != nil {
|
|
|
|
return nil, xerrors.Errorf("has allocated: %w", err)
|
|
|
|
}
|
2021-05-21 10:20:25 +00:00
|
|
|
log.Debugf("check if partial file is allocated %s (+%d,%d)", path, offset, size)
|
2021-05-18 07:32:30 +00:00
|
|
|
|
2021-06-17 04:16:29 +00:00
|
|
|
if has {
|
|
|
|
log.Infof("returning piece reader for local unsealed piece sector=%+v, (offset=%d, size=%d)", s.ID, offset, size)
|
2021-12-09 13:52:33 +00:00
|
|
|
|
2023-05-25 13:55:12 +00:00
|
|
|
// refs keep track of the currently opened pf
|
|
|
|
// if they drop to 0 for longer than LocalReaderTimeout, pf will be closed
|
|
|
|
var refsLk sync.Mutex
|
|
|
|
refs := 0
|
|
|
|
|
|
|
|
cleanupIdle := func() {
|
|
|
|
lastRefs := 1
|
|
|
|
|
|
|
|
for range time.After(LocalReaderTimeout) {
|
|
|
|
refsLk.Lock()
|
|
|
|
if refs == 0 && lastRefs == 0 && pf != nil { // pf can't really be nil here, but better be safe
|
|
|
|
log.Infow("closing idle partial file", "path", path)
|
|
|
|
err := pf.Close()
|
|
|
|
if err != nil {
|
|
|
|
log.Errorw("closing idle partial file", "path", path, "error", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
pf = nil
|
|
|
|
refsLk.Unlock()
|
|
|
|
return
|
|
|
|
}
|
|
|
|
lastRefs = refs
|
|
|
|
refsLk.Unlock()
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
getPF := func() (*partialfile.PartialFile, func() error, error) {
|
|
|
|
refsLk.Lock()
|
|
|
|
defer refsLk.Unlock()
|
|
|
|
|
|
|
|
if pf == nil {
|
|
|
|
// got closed in the meantime, reopen
|
|
|
|
|
|
|
|
var err error
|
|
|
|
pf, err = r.pfHandler.OpenPartialFile(abi.PaddedPieceSize(ssize), path)
|
|
|
|
if err != nil {
|
|
|
|
return nil, nil, xerrors.Errorf("reopening partial file: %w", err)
|
|
|
|
}
|
|
|
|
log.Debugf("local partial file reopened %s (+%d,%d)", path, offset, size)
|
|
|
|
|
|
|
|
go cleanupIdle()
|
|
|
|
}
|
|
|
|
|
|
|
|
refs++
|
|
|
|
|
|
|
|
return pf, func() error {
|
|
|
|
refsLk.Lock()
|
|
|
|
defer refsLk.Unlock()
|
|
|
|
|
|
|
|
refs--
|
|
|
|
return nil
|
|
|
|
}, nil
|
|
|
|
}
|
|
|
|
|
2023-05-19 12:33:35 +00:00
|
|
|
return func(startOffsetAligned, endOffsetAligned storiface.PaddedByteIndex) (io.ReadCloser, error) {
|
2023-05-25 13:55:12 +00:00
|
|
|
pf, done, err := getPF()
|
|
|
|
if err != nil {
|
|
|
|
return nil, xerrors.Errorf("getting partialfile handle: %w", err)
|
|
|
|
}
|
|
|
|
|
2023-05-19 12:33:35 +00:00
|
|
|
r, err := r.pfHandler.Reader(pf, storiface.PaddedByteIndex(offset)+startOffsetAligned, abi.PaddedPieceSize(endOffsetAligned-startOffsetAligned))
|
2021-12-09 13:52:33 +00:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
return struct {
|
|
|
|
io.Reader
|
|
|
|
io.Closer
|
|
|
|
}{
|
|
|
|
Reader: r,
|
2023-05-25 13:55:12 +00:00
|
|
|
Closer: funcCloser(done),
|
2021-12-09 13:52:33 +00:00
|
|
|
}, nil
|
|
|
|
}, nil
|
|
|
|
|
2021-05-18 07:32:30 +00:00
|
|
|
}
|
|
|
|
|
2021-06-17 04:16:29 +00:00
|
|
|
log.Debugf("miner has unsealed file but not unseal piece, %s (+%d,%d)", path, offset, size)
|
|
|
|
if err := r.pfHandler.Close(pf); err != nil {
|
|
|
|
return nil, xerrors.Errorf("close partial file: %w", err)
|
|
|
|
}
|
2021-05-18 07:32:30 +00:00
|
|
|
}
|
|
|
|
|
2021-06-17 04:16:29 +00:00
|
|
|
// --- We don't have the unsealed piece in an unsealed sector file locally
|
2021-05-19 06:06:37 +00:00
|
|
|
|
|
|
|
// if we don't have the unsealed sector file locally, we'll first lookup the Miner Sector Store Index
|
|
|
|
// to determine which workers have the unsealed file and then query those workers to know
|
|
|
|
// if they have the unsealed piece in the unsealed sector file.
|
|
|
|
si, err := r.index.StorageFindSector(ctx, s.ID, ft, 0, false)
|
|
|
|
if err != nil {
|
2021-05-21 13:31:17 +00:00
|
|
|
log.Debugf("Reader, did not find unsealed file on any of the workers %s (+%d,%d)", path, offset, size)
|
2021-05-19 06:06:37 +00:00
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
if len(si) == 0 {
|
|
|
|
return nil, xerrors.Errorf("failed to read sector %v from remote(%d): %w", s, ft, storiface.ErrSectorNotFound)
|
|
|
|
}
|
|
|
|
|
|
|
|
sort.Slice(si, func(i, j int) bool {
|
2021-05-20 11:01:25 +00:00
|
|
|
return si[i].Weight > si[j].Weight
|
2021-05-19 06:06:37 +00:00
|
|
|
})
|
|
|
|
|
2021-05-21 13:45:05 +00:00
|
|
|
var lastErr error
|
2021-05-19 06:06:37 +00:00
|
|
|
for _, info := range si {
|
|
|
|
for _, url := range info.URLs {
|
|
|
|
// checkAllocated makes a JSON RPC query to a remote worker to determine if it has
|
|
|
|
// unsealed piece in their unsealed sector file.
|
|
|
|
ok, err := r.checkAllocated(ctx, url, s.ProofType, offset, size)
|
|
|
|
if err != nil {
|
|
|
|
log.Warnw("check if remote has piece", "url", url, "error", err)
|
2021-05-21 13:45:05 +00:00
|
|
|
lastErr = err
|
2021-05-19 06:06:37 +00:00
|
|
|
continue
|
|
|
|
}
|
|
|
|
if !ok {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
2023-05-19 12:33:35 +00:00
|
|
|
return func(startOffsetAligned, endOffsetAligned storiface.PaddedByteIndex) (io.ReadCloser, error) {
|
2021-12-09 13:52:33 +00:00
|
|
|
// readRemote fetches a reader that we can use to read the unsealed piece from the remote worker.
|
|
|
|
// It uses a ranged HTTP query to ensure we ONLY read the unsealed piece and not the entire unsealed file.
|
2023-05-19 12:33:35 +00:00
|
|
|
rd, err := r.readRemote(ctx, url, offset+abi.PaddedPieceSize(startOffsetAligned), offset+abi.PaddedPieceSize(endOffsetAligned))
|
2021-12-09 13:52:33 +00:00
|
|
|
if err != nil {
|
|
|
|
log.Warnw("reading from remote", "url", url, "error", err)
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
return rd, err
|
|
|
|
}, nil
|
|
|
|
|
2021-05-19 06:06:37 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// we couldn't find a unsealed file with the unsealed piece, will return a nil reader.
|
2021-05-21 13:45:05 +00:00
|
|
|
log.Debugf("returning nil reader, did not find unsealed piece for %+v (+%d,%d), last error=%s", s, offset, size, lastErr)
|
2021-05-19 06:06:37 +00:00
|
|
|
return nil, nil
|
2021-05-18 07:32:30 +00:00
|
|
|
}
|
|
|
|
|
2022-06-17 11:31:05 +00:00
|
|
|
func (r *Remote) Reserve(ctx context.Context, sid storiface.SectorRef, ft storiface.SectorFileType, storageIDs storiface.SectorPaths, overheadTab map[storiface.SectorFileType]int) (func(), error) {
|
2021-05-21 13:45:05 +00:00
|
|
|
log.Warnf("reserve called on remote store, sectorID: %v", sid.ID)
|
|
|
|
return func() {
|
|
|
|
|
|
|
|
}, nil
|
2021-05-20 05:08:22 +00:00
|
|
|
}
|
|
|
|
|
2022-01-14 13:11:04 +00:00
|
|
|
func (r *Remote) GenerateSingleVanillaProof(ctx context.Context, minerID abi.ActorID, sinfo storiface.PostSectorChallenge, ppt abi.RegisteredPoStProof) ([]byte, error) {
|
|
|
|
p, err := r.local.GenerateSingleVanillaProof(ctx, minerID, sinfo, ppt)
|
|
|
|
if err != errPathNotFound {
|
|
|
|
return p, err
|
2021-07-27 03:15:53 +00:00
|
|
|
}
|
|
|
|
|
2022-01-14 13:11:04 +00:00
|
|
|
sid := abi.SectorID{
|
|
|
|
Miner: minerID,
|
|
|
|
Number: sinfo.SectorNumber,
|
2021-07-27 03:15:53 +00:00
|
|
|
}
|
|
|
|
|
2022-01-20 13:59:57 +00:00
|
|
|
ft := storiface.FTSealed | storiface.FTCache
|
|
|
|
if sinfo.Update {
|
|
|
|
ft = storiface.FTUpdate | storiface.FTUpdateCache
|
|
|
|
}
|
|
|
|
|
|
|
|
si, err := r.index.StorageFindSector(ctx, sid, ft, 0, false)
|
2021-07-27 03:15:53 +00:00
|
|
|
if err != nil {
|
2022-01-14 13:11:04 +00:00
|
|
|
return nil, xerrors.Errorf("finding sector %d failed: %w", sid, err)
|
2021-07-27 03:15:53 +00:00
|
|
|
}
|
|
|
|
|
2022-01-14 13:11:04 +00:00
|
|
|
requestParams := SingleVanillaParams{
|
|
|
|
Miner: minerID,
|
|
|
|
Sector: sinfo,
|
|
|
|
ProofType: ppt,
|
|
|
|
}
|
|
|
|
jreq, err := json.Marshal(requestParams)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
2021-07-27 03:15:53 +00:00
|
|
|
|
2024-02-17 10:20:49 +00:00
|
|
|
merr := xerrors.Errorf("sector not found")
|
|
|
|
|
2022-01-14 13:11:04 +00:00
|
|
|
for _, info := range si {
|
|
|
|
for _, u := range info.BaseURLs {
|
|
|
|
url := fmt.Sprintf("%s/vanilla/single", u)
|
2021-07-27 03:15:53 +00:00
|
|
|
|
2022-01-14 13:11:04 +00:00
|
|
|
req, err := http.NewRequest("POST", url, strings.NewReader(string(jreq)))
|
|
|
|
if err != nil {
|
2024-02-17 10:20:49 +00:00
|
|
|
merr = multierror.Append(merr, xerrors.Errorf("request: %w", err))
|
|
|
|
log.Warnw("GenerateSingleVanillaProof request failed", "url", url, "error", err)
|
|
|
|
continue
|
2021-07-27 03:15:53 +00:00
|
|
|
}
|
|
|
|
|
2022-01-14 13:11:04 +00:00
|
|
|
if r.auth != nil {
|
|
|
|
req.Header = r.auth.Clone()
|
2021-07-27 03:15:53 +00:00
|
|
|
}
|
2022-01-14 13:11:04 +00:00
|
|
|
req = req.WithContext(ctx)
|
2021-07-27 03:15:53 +00:00
|
|
|
|
2022-01-14 13:11:04 +00:00
|
|
|
resp, err := http.DefaultClient.Do(req)
|
|
|
|
if err != nil {
|
2024-02-17 10:20:49 +00:00
|
|
|
merr = multierror.Append(merr, xerrors.Errorf("do request: %w", err))
|
|
|
|
log.Warnw("GenerateSingleVanillaProof do request failed", "url", url, "error", err)
|
|
|
|
continue
|
2021-07-27 03:15:53 +00:00
|
|
|
}
|
|
|
|
|
2022-03-25 19:37:35 +00:00
|
|
|
if resp.StatusCode != http.StatusOK {
|
|
|
|
if resp.StatusCode == http.StatusNotFound {
|
|
|
|
log.Debugw("reading vanilla proof from remote not-found response", "url", url, "store", info.ID)
|
2022-01-18 11:11:59 +00:00
|
|
|
continue
|
|
|
|
}
|
2023-03-29 19:24:07 +00:00
|
|
|
body, err := io.ReadAll(resp.Body)
|
2022-01-14 13:11:04 +00:00
|
|
|
if err != nil {
|
2024-02-17 10:20:49 +00:00
|
|
|
merr = multierror.Append(merr, xerrors.Errorf("resp.Body ReadAll: %w", err))
|
|
|
|
log.Warnw("GenerateSingleVanillaProof read response body failed", "url", url, "error", err)
|
|
|
|
continue
|
2022-01-14 13:11:04 +00:00
|
|
|
}
|
2021-07-27 03:15:53 +00:00
|
|
|
|
2022-01-14 13:11:04 +00:00
|
|
|
if err := resp.Body.Close(); err != nil {
|
|
|
|
log.Error("response close: ", err)
|
|
|
|
}
|
2021-07-27 03:15:53 +00:00
|
|
|
|
2024-02-17 10:20:49 +00:00
|
|
|
merr = multierror.Append(merr, xerrors.Errorf("non-200 code from %s: '%s'", url, strings.TrimSpace(string(body))))
|
|
|
|
log.Warnw("GenerateSingleVanillaProof non-200 code from remote", "code", resp.StatusCode, "url", url, "body", string(body))
|
|
|
|
continue
|
2022-01-14 13:11:04 +00:00
|
|
|
}
|
2021-07-27 03:15:53 +00:00
|
|
|
|
2023-03-29 19:24:07 +00:00
|
|
|
body, err := io.ReadAll(resp.Body)
|
2022-01-14 13:11:04 +00:00
|
|
|
if err != nil {
|
|
|
|
if err := resp.Body.Close(); err != nil {
|
|
|
|
log.Error("response close: ", err)
|
|
|
|
}
|
2021-07-27 03:15:53 +00:00
|
|
|
|
2024-02-17 10:20:49 +00:00
|
|
|
merr = multierror.Append(merr, xerrors.Errorf("resp.Body ReadAll: %w", err))
|
|
|
|
log.Warnw("GenerateSingleVanillaProof read response body failed", "url", url, "error", err)
|
|
|
|
continue
|
2022-01-14 13:11:04 +00:00
|
|
|
}
|
2021-07-27 03:15:53 +00:00
|
|
|
|
2024-01-11 15:46:47 +00:00
|
|
|
_ = resp.Body.Close()
|
|
|
|
|
2022-01-14 13:11:04 +00:00
|
|
|
return body, nil
|
2021-07-27 03:15:53 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2024-02-17 10:20:49 +00:00
|
|
|
return nil, merr
|
2021-07-27 03:15:53 +00:00
|
|
|
}
|
|
|
|
|
2024-02-17 10:20:49 +00:00
|
|
|
func (r *Remote) GeneratePoRepVanillaProof(ctx context.Context, sr storiface.SectorRef, sealed, unsealed cid.Cid, ticket abi.SealRandomness, seed abi.InteractiveSealRandomness) ([]byte, error) {
|
|
|
|
// Attempt to generate the proof locally first
|
|
|
|
p, err := r.local.GeneratePoRepVanillaProof(ctx, sr, sealed, unsealed, ticket, seed)
|
2024-01-11 15:46:47 +00:00
|
|
|
if err != errPathNotFound {
|
|
|
|
return p, err
|
|
|
|
}
|
|
|
|
|
2024-02-17 10:20:49 +00:00
|
|
|
// Define the file types to look for based on the sector's state
|
2024-01-11 15:46:47 +00:00
|
|
|
ft := storiface.FTSealed | storiface.FTCache
|
2024-02-17 10:20:49 +00:00
|
|
|
|
|
|
|
// Find sector information
|
2024-01-11 15:46:47 +00:00
|
|
|
si, err := r.index.StorageFindSector(ctx, sr.ID, ft, 0, false)
|
|
|
|
if err != nil {
|
|
|
|
return nil, xerrors.Errorf("finding sector %d failed: %w", sr.ID, err)
|
|
|
|
}
|
|
|
|
|
2024-02-17 10:20:49 +00:00
|
|
|
// Prepare request parameters
|
2024-01-11 15:46:47 +00:00
|
|
|
requestParams := PoRepVanillaParams{
|
|
|
|
Sector: sr,
|
|
|
|
Sealed: sealed,
|
|
|
|
Unsealed: unsealed,
|
|
|
|
Ticket: ticket,
|
|
|
|
Seed: seed,
|
|
|
|
}
|
|
|
|
jreq, err := json.Marshal(requestParams)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
2024-02-17 10:20:49 +00:00
|
|
|
merr := xerrors.Errorf("sector not found")
|
|
|
|
|
|
|
|
// Iterate over all found sector locations
|
2024-01-11 15:46:47 +00:00
|
|
|
for _, info := range si {
|
|
|
|
for _, u := range info.BaseURLs {
|
|
|
|
url := fmt.Sprintf("%s/vanilla/porep", u)
|
|
|
|
|
2024-02-17 10:20:49 +00:00
|
|
|
// Create and send the request
|
2024-01-11 15:46:47 +00:00
|
|
|
req, err := http.NewRequest("POST", url, strings.NewReader(string(jreq)))
|
|
|
|
if err != nil {
|
2024-02-17 10:20:49 +00:00
|
|
|
merr = multierror.Append(merr, xerrors.Errorf("request: %w", err))
|
|
|
|
log.Warnw("GeneratePoRepVanillaProof request failed", "url", url, "error", err)
|
|
|
|
continue
|
2024-01-11 15:46:47 +00:00
|
|
|
}
|
|
|
|
|
2024-02-17 10:20:49 +00:00
|
|
|
// Set auth headers if available
|
2024-01-11 15:46:47 +00:00
|
|
|
if r.auth != nil {
|
|
|
|
req.Header = r.auth.Clone()
|
|
|
|
}
|
|
|
|
req = req.WithContext(ctx)
|
|
|
|
|
2024-02-17 10:20:49 +00:00
|
|
|
// Execute the request
|
2024-01-11 15:46:47 +00:00
|
|
|
resp, err := http.DefaultClient.Do(req)
|
|
|
|
if err != nil {
|
2024-02-17 10:20:49 +00:00
|
|
|
merr = multierror.Append(merr, xerrors.Errorf("do request: %w", err))
|
|
|
|
log.Warnw("GeneratePoRepVanillaProof do request failed", "url", url, "error", err)
|
|
|
|
continue
|
2024-01-11 15:46:47 +00:00
|
|
|
}
|
|
|
|
|
2024-02-17 10:20:49 +00:00
|
|
|
// Handle non-OK status codes
|
2024-01-11 15:46:47 +00:00
|
|
|
if resp.StatusCode != http.StatusOK {
|
2024-02-17 10:20:49 +00:00
|
|
|
body, _ := io.ReadAll(resp.Body)
|
|
|
|
_ = resp.Body.Close()
|
|
|
|
|
2024-01-11 15:46:47 +00:00
|
|
|
if resp.StatusCode == http.StatusNotFound {
|
|
|
|
log.Debugw("reading vanilla proof from remote not-found response", "url", url, "store", info.ID)
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
2024-02-17 10:20:49 +00:00
|
|
|
merr = multierror.Append(merr, xerrors.Errorf("non-200 code from %s: '%s'", url, strings.TrimSpace(string(body))))
|
|
|
|
log.Warnw("GeneratePoRepVanillaProof non-200 code from remote", "code", resp.StatusCode, "url", url, "body", string(body))
|
|
|
|
continue
|
2024-01-11 15:46:47 +00:00
|
|
|
}
|
|
|
|
|
2024-02-17 10:20:49 +00:00
|
|
|
// Read the response body
|
2024-01-11 15:46:47 +00:00
|
|
|
body, err := io.ReadAll(resp.Body)
|
|
|
|
if err != nil {
|
2024-02-17 10:20:49 +00:00
|
|
|
merr = multierror.Append(merr, xerrors.Errorf("resp.Body ReadAll: %w", err))
|
|
|
|
log.Warnw("GeneratePoRepVanillaProof read response body failed", "url", url, "error", err)
|
2024-01-11 15:46:47 +00:00
|
|
|
}
|
|
|
|
_ = resp.Body.Close()
|
|
|
|
|
2024-02-17 10:20:49 +00:00
|
|
|
// Return the proof if successful
|
2024-01-11 15:46:47 +00:00
|
|
|
return body, nil
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2024-02-17 10:20:49 +00:00
|
|
|
// Return the accumulated error if the proof was not generated
|
|
|
|
return nil, merr
|
2024-01-11 15:46:47 +00:00
|
|
|
}
|
2021-12-09 13:52:33 +00:00
|
|
|
|
|
|
|
type funcCloser func() error
|
|
|
|
|
|
|
|
func (f funcCloser) Close() error {
|
|
|
|
return f()
|
|
|
|
}
|
|
|
|
|
|
|
|
var _ io.Closer = funcCloser(nil)
|