-
Notifications
You must be signed in to change notification settings - Fork 58
/
Copy pathprovider.go
654 lines (551 loc) · 20.4 KB
/
provider.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
package storageimpl
import (
"context"
"fmt"
"io"
"github.com/hannahhoward/go-pubsub"
"github.com/ipfs/go-cid"
"github.com/ipfs/go-datastore"
"golang.org/x/xerrors"
"github.com/filecoin-project/go-address"
cborutil "github.com/filecoin-project/go-cbor-util"
"github.com/filecoin-project/go-commp-utils/ffiwrapper"
"github.com/filecoin-project/go-commp-utils/pieceio"
"github.com/filecoin-project/go-commp-utils/pieceio/cario"
datatransfer "github.com/filecoin-project/go-data-transfer"
versioning "github.com/filecoin-project/go-ds-versioning/pkg"
versionedfsm "github.com/filecoin-project/go-ds-versioning/pkg/fsm"
"github.com/filecoin-project/go-multistore"
"github.com/filecoin-project/go-padreader"
"github.com/filecoin-project/go-state-types/abi"
"github.com/filecoin-project/go-state-types/crypto"
"github.com/filecoin-project/go-state-types/exitcode"
"github.com/filecoin-project/go-statemachine/fsm"
"github.com/filecoin-project/go-fil-markets/filestore"
"github.com/filecoin-project/go-fil-markets/piecestore"
"github.com/filecoin-project/go-fil-markets/shared"
"github.com/filecoin-project/go-fil-markets/storagemarket"
"github.com/filecoin-project/go-fil-markets/storagemarket/impl/connmanager"
"github.com/filecoin-project/go-fil-markets/storagemarket/impl/dtutils"
"github.com/filecoin-project/go-fil-markets/storagemarket/impl/providerstates"
"github.com/filecoin-project/go-fil-markets/storagemarket/impl/providerutils"
"github.com/filecoin-project/go-fil-markets/storagemarket/impl/requestvalidation"
"github.com/filecoin-project/go-fil-markets/storagemarket/migrations"
"github.com/filecoin-project/go-fil-markets/storagemarket/network"
)
var _ storagemarket.StorageProvider = &Provider{}
var _ network.StorageReceiver = &Provider{}
// StoredAsk is an interface which provides access to a StorageAsk
type StoredAsk interface {
GetAsk() *storagemarket.SignedStorageAsk
SetAsk(price abi.TokenAmount, verifiedPrice abi.TokenAmount, duration abi.ChainEpoch, options ...storagemarket.StorageAskOption) error
}
// Provider is the production implementation of the StorageProvider interface
type Provider struct {
net network.StorageMarketNetwork
spn storagemarket.StorageProviderNode
fs filestore.FileStore
multiStore *multistore.MultiStore
pio pieceio.PieceIO
pieceStore piecestore.PieceStore
conns *connmanager.ConnManager
storedAsk StoredAsk
actor address.Address
dataTransfer datatransfer.Manager
universalRetrievalEnabled bool
customDealDeciderFunc DealDeciderFunc
pubSub *pubsub.PubSub
readySub *pubsub.PubSub
deals fsm.Group
migrateDeals func(context.Context) error
unsubDataTransfer datatransfer.Unsubscribe
}
// StorageProviderOption allows custom configuration of a storage provider
type StorageProviderOption func(p *Provider)
// EnableUniversalRetrieval causes a storage provider to track all CIDs in a piece,
// so that any CID, not just the root payload CID, can be retrieved
func EnableUniversalRetrieval() StorageProviderOption {
return func(p *Provider) {
p.universalRetrievalEnabled = true
}
}
// DealDeciderFunc is a function which evaluates an incoming deal to decide if
// it its accepted
// It returns:
// - boolean = true if deal accepted, false if rejected
// - string = reason deal was not excepted, if rejected
// - error = if an error occurred trying to decide
type DealDeciderFunc func(context.Context, storagemarket.MinerDeal) (bool, string, error)
// CustomDealDecisionLogic allows a provider to call custom decision logic when validating incoming
// deal proposals
func CustomDealDecisionLogic(decider DealDeciderFunc) StorageProviderOption {
return func(p *Provider) {
p.customDealDeciderFunc = decider
}
}
// NewProvider returns a new storage provider
func NewProvider(net network.StorageMarketNetwork,
ds datastore.Batching,
fs filestore.FileStore,
multiStore *multistore.MultiStore,
pieceStore piecestore.PieceStore,
dataTransfer datatransfer.Manager,
spn storagemarket.StorageProviderNode,
minerAddress address.Address,
storedAsk StoredAsk,
options ...StorageProviderOption,
) (storagemarket.StorageProvider, error) {
carIO := cario.NewCarIO()
pio := pieceio.NewPieceIO(carIO, nil, multiStore)
h := &Provider{
net: net,
spn: spn,
fs: fs,
multiStore: multiStore,
pio: pio,
pieceStore: pieceStore,
conns: connmanager.NewConnManager(),
storedAsk: storedAsk,
actor: minerAddress,
dataTransfer: dataTransfer,
pubSub: pubsub.New(providerDispatcher),
readySub: pubsub.New(shared.ReadyDispatcher),
}
storageMigrations, err := migrations.ProviderMigrations.Build()
if err != nil {
return nil, err
}
h.deals, h.migrateDeals, err = newProviderStateMachine(
ds,
&providerDealEnvironment{h},
h.dispatch,
storageMigrations,
versioning.VersionKey("1"),
)
if err != nil {
return nil, err
}
h.Configure(options...)
// register a data transfer event handler -- this will send events to the state machines based on DT events
h.unsubDataTransfer = dataTransfer.SubscribeToEvents(dtutils.ProviderDataTransferSubscriber(h.deals))
err = dataTransfer.RegisterVoucherType(&requestvalidation.StorageDataTransferVoucher{}, requestvalidation.NewUnifiedRequestValidator(&providerPushDeals{h}, nil))
if err != nil {
return nil, err
}
err = dataTransfer.RegisterTransportConfigurer(&requestvalidation.StorageDataTransferVoucher{}, dtutils.TransportConfigurer(&providerStoreGetter{h}))
if err != nil {
return nil, err
}
return h, nil
}
// Start initializes deal processing on a StorageProvider and restarts in progress deals.
// It also registers the provider with a StorageMarketNetwork so it can receive incoming
// messages on the storage market's libp2p protocols
func (p *Provider) Start(ctx context.Context) error {
err := p.net.SetDelegate(p)
if err != nil {
return err
}
go func() {
err := p.start(ctx)
if err != nil {
log.Error(err.Error())
}
}()
return nil
}
// OnReady registers a listener for when the provider has finished starting up
func (p *Provider) OnReady(ready shared.ReadyFunc) {
p.readySub.Subscribe(ready)
}
/*
HandleDealStream is called by the network implementation whenever a new message is received on the deal protocol
It initiates the provider side of the deal flow.
When a provider receives a DealProposal of the deal protocol, it takes the following steps:
1. Calculates the CID for the received ClientDealProposal.
2. Constructs a MinerDeal to track the state of this deal.
3. Tells its statemachine to begin tracking this deal state by CID of the received ClientDealProposal
4. Tracks the received deal stream by the CID of the ClientDealProposal
4. Triggers a `ProviderEventOpen` event on its statemachine.
From then on, the statemachine controls the deal flow in the client. Other components may listen for events in this flow by calling
`SubscribeToEvents` on the Provider. The Provider handles loading the next block to send to the client.
Documentation of the client state machine can be found at https://godoc.org/github.com/filecoin-project/go-fil-markets/storagemarket/impl/providerstates
*/
func (p *Provider) HandleDealStream(s network.StorageDealStream) {
log.Info("Handling storage deal proposal!")
err := p.receiveDeal(s)
if err != nil {
log.Errorf("%+v", err)
s.Close()
return
}
}
func (p *Provider) receiveDeal(s network.StorageDealStream) error {
proposal, err := s.ReadDealProposal()
if err != nil {
return xerrors.Errorf("failed to read proposal message: %w", err)
}
proposalNd, err := cborutil.AsIpld(proposal.DealProposal)
if err != nil {
return err
}
// Check if we are already tracking this deal
var md storagemarket.MinerDeal
if err := p.deals.Get(proposalNd.Cid()).Get(&md); err == nil {
// We are already tracking this deal, for some reason it was re-proposed, perhaps because of a client restart
// this is ok, just send a response back.
return p.resendProposalResponse(s, &md)
}
var storeIDForDeal *multistore.StoreID
if proposal.Piece.TransferType != storagemarket.TTManual {
nextStoreID := p.multiStore.Next()
// make sure store is initialized, even if we don't use it yet
_, err = p.multiStore.Get(nextStoreID)
if err != nil {
return err
}
storeIDForDeal = &nextStoreID
}
deal := &storagemarket.MinerDeal{
Client: s.RemotePeer(),
Miner: p.net.ID(),
ClientDealProposal: *proposal.DealProposal,
ProposalCid: proposalNd.Cid(),
State: storagemarket.StorageDealUnknown,
Ref: proposal.Piece,
FastRetrieval: proposal.FastRetrieval,
StoreID: storeIDForDeal,
CreationTime: curTime(),
}
err = p.deals.Begin(proposalNd.Cid(), deal)
if err != nil {
return err
}
err = p.conns.AddStream(proposalNd.Cid(), s)
if err != nil {
return err
}
return p.deals.Send(proposalNd.Cid(), storagemarket.ProviderEventOpen)
}
// Stop terminates processing of deals on a StorageProvider
func (p *Provider) Stop() error {
p.unsubDataTransfer()
err := p.deals.Stop(context.TODO())
if err != nil {
return err
}
return p.net.StopHandlingRequests()
}
// ImportDataForDeal manually imports data for an offline storage deal
// It will verify that the data in the passed io.Reader matches the expected piece
// cid for the given deal or it will error
func (p *Provider) ImportDataForDeal(ctx context.Context, propCid cid.Cid, data io.Reader) error {
// TODO: be able to check if we have enough disk space
var d storagemarket.MinerDeal
if err := p.deals.Get(propCid).Get(&d); err != nil {
return xerrors.Errorf("failed getting deal %s: %w", propCid, err)
}
tempfi, err := p.fs.CreateTemp()
if err != nil {
return xerrors.Errorf("failed to create temp file for data import: %w", err)
}
cleanup := func() {
_ = tempfi.Close()
_ = p.fs.Delete(tempfi.Path())
}
n, err := io.Copy(tempfi, data)
if err != nil {
cleanup()
return xerrors.Errorf("importing deal data failed: %w", err)
}
_ = n // TODO: verify n?
pieceSize := uint64(tempfi.Size())
_, err = tempfi.Seek(0, io.SeekStart)
if err != nil {
cleanup()
return xerrors.Errorf("failed to seek through temp imported file: %w", err)
}
proofType, err := p.spn.GetProofType(ctx, p.actor, nil)
if err != nil {
cleanup()
return xerrors.Errorf("failed to determine proof type: %w", err)
}
pieceCid, err := generatePieceCommitment(proofType, tempfi, pieceSize)
if err != nil {
cleanup()
return xerrors.Errorf("failed to generate commP: %w", err)
}
// Verify CommP matches
if !pieceCid.Equals(d.Proposal.PieceCID) {
cleanup()
return xerrors.Errorf("given data does not match expected commP (got: %x, expected %x)", pieceCid, d.Proposal.PieceCID)
}
return p.deals.Send(propCid, storagemarket.ProviderEventVerifiedData, tempfi.Path(), filestore.Path(""))
}
func generatePieceCommitment(rt abi.RegisteredSealProof, rd io.Reader, pieceSize uint64) (cid.Cid, error) {
paddedReader, paddedSize := padreader.New(rd, pieceSize)
commitment, err := ffiwrapper.GeneratePieceCIDFromFile(rt, paddedReader, paddedSize)
if err != nil {
return cid.Undef, err
}
return commitment, nil
}
// GetAsk returns the storage miner's ask, or nil if one does not exist.
func (p *Provider) GetAsk() *storagemarket.SignedStorageAsk {
return p.storedAsk.GetAsk()
}
// AddStorageCollateral adds storage collateral
func (p *Provider) AddStorageCollateral(ctx context.Context, amount abi.TokenAmount) error {
done := make(chan error, 1)
mcid, err := p.spn.AddFunds(ctx, p.actor, amount)
if err != nil {
return err
}
err = p.spn.WaitForMessage(ctx, mcid, func(code exitcode.ExitCode, bytes []byte, finalCid cid.Cid, err error) error {
if err != nil {
done <- xerrors.Errorf("AddFunds errored: %w", err)
} else if code != exitcode.Ok {
done <- xerrors.Errorf("AddFunds error, exit code: %s", code.String())
} else {
done <- nil
}
return nil
})
if err != nil {
return err
}
return <-done
}
// GetStorageCollateral returns the current collateral balance
func (p *Provider) GetStorageCollateral(ctx context.Context) (storagemarket.Balance, error) {
tok, _, err := p.spn.GetChainHead(ctx)
if err != nil {
return storagemarket.Balance{}, err
}
return p.spn.GetBalance(ctx, p.actor, tok)
}
// ListLocalDeals lists deals processed by this storage provider
func (p *Provider) ListLocalDeals() ([]storagemarket.MinerDeal, error) {
var out []storagemarket.MinerDeal
if err := p.deals.List(&out); err != nil {
return nil, err
}
return out, nil
}
// SetAsk configures the storage miner's ask with the provided price,
// duration, and options. Any previously-existing ask is replaced.
func (p *Provider) SetAsk(price abi.TokenAmount, verifiedPrice abi.TokenAmount, duration abi.ChainEpoch, options ...storagemarket.StorageAskOption) error {
return p.storedAsk.SetAsk(price, verifiedPrice, duration, options...)
}
/*
HandleAskStream is called by the network implementation whenever a new message is received on the ask protocol
A Provider handling a `AskRequest` does the following:
1. Reads the current signed storage ask from storage
2. Wraps the signed ask in an AskResponse and writes it on the StorageAskStream
The connection is kept open only as long as the request-response exchange.
*/
func (p *Provider) HandleAskStream(s network.StorageAskStream) {
defer s.Close()
ar, err := s.ReadAskRequest()
if err != nil {
log.Errorf("failed to read AskRequest from incoming stream: %s", err)
return
}
var ask *storagemarket.SignedStorageAsk
if p.actor != ar.Miner {
log.Warnf("storage provider for address %s receive ask for miner with address %s", p.actor, ar.Miner)
} else {
ask = p.storedAsk.GetAsk()
}
resp := network.AskResponse{
Ask: ask,
}
if err := s.WriteAskResponse(resp, p.sign); err != nil {
log.Errorf("failed to write ask response: %s", err)
return
}
}
/*
HandleDealStatusStream is called by the network implementation whenever a new message is received on the deal status protocol
A Provider handling a `DealStatuRequest` does the following:
1. Lots the deal state from the Provider FSM
2. Verifies the signature on the DealStatusRequest matches the Client for this deal
3. Constructs a ProviderDealState from the deal state
4. Signs the ProviderDealState with its private key
5. Writes a DealStatusResponse with the ProviderDealState and signature onto the DealStatusStream
The connection is kept open only as long as the request-response exchange.
*/
func (p *Provider) HandleDealStatusStream(s network.DealStatusStream) {
ctx := context.TODO()
defer s.Close()
request, err := s.ReadDealStatusRequest()
if err != nil {
log.Errorf("failed to read DealStatusRequest from incoming stream: %s", err)
return
}
// fetch deal state
var md = storagemarket.MinerDeal{}
if err := p.deals.Get(request.Proposal).Get(&md); err != nil {
log.Errorf("proposal doesn't exist in state store: %s", err)
return
}
// verify query signature
buf, err := cborutil.Dump(&request.Proposal)
if err != nil {
log.Errorf("failed to serialize status request: %s", err)
return
}
tok, _, err := p.spn.GetChainHead(ctx)
if err != nil {
log.Errorf("failed to get chain head: %s", err)
return
}
err = providerutils.VerifySignature(ctx, request.Signature, md.ClientDealProposal.Proposal.Client, buf, tok, p.spn.VerifySignature)
if err != nil {
log.Errorf("invalid deal status request signature: %s", err)
return
}
dealState := storagemarket.ProviderDealState{
State: md.State,
Message: md.Message,
Proposal: &md.Proposal,
ProposalCid: &md.ProposalCid,
AddFundsCid: md.AddFundsCid,
PublishCid: md.PublishCid,
DealID: md.DealID,
FastRetrieval: md.FastRetrieval,
}
signature, err := p.sign(ctx, &dealState)
if err != nil {
log.Errorf("failed to sign deal status response: %s", err)
return
}
response := network.DealStatusResponse{
DealState: dealState,
Signature: *signature,
}
if err := s.WriteDealStatusResponse(response, p.sign); err != nil {
log.Warnf("failed to write deal status response: %s", err)
return
}
}
// Configure applies the given list of StorageProviderOptions after a StorageProvider
// is initialized
func (p *Provider) Configure(options ...StorageProviderOption) {
for _, option := range options {
option(p)
}
}
// UniversalRetrievalEnabled returns whether or not universal retrieval
// (retrieval by any CID, not just the root payload CID) is enabled
// for this provider
func (p *Provider) UniversalRetrievalEnabled() bool {
return p.universalRetrievalEnabled
}
// SubscribeToEvents allows another component to listen for events on the StorageProvider
// in order to track deals as they progress through the deal flow
func (p *Provider) SubscribeToEvents(subscriber storagemarket.ProviderSubscriber) shared.Unsubscribe {
return shared.Unsubscribe(p.pubSub.Subscribe(subscriber))
}
// dispatch puts the fsm event into a form that pubSub can consume,
// then publishes the event
func (p *Provider) dispatch(eventName fsm.EventName, deal fsm.StateType) {
evt, ok := eventName.(storagemarket.ProviderEvent)
if !ok {
log.Errorf("dropped bad event %s", eventName)
}
realDeal, ok := deal.(storagemarket.MinerDeal)
if !ok {
log.Errorf("not a MinerDeal %v", deal)
}
pubSubEvt := internalProviderEvent{evt, realDeal}
if err := p.pubSub.Publish(pubSubEvt); err != nil {
log.Errorf("failed to publish event %d", evt)
}
}
func (p *Provider) start(ctx context.Context) error {
err := p.migrateDeals(ctx)
publishErr := p.readySub.Publish(err)
if publishErr != nil {
log.Warnf("Publish storage provider ready event: %s", err.Error())
}
if err != nil {
return fmt.Errorf("Migrating storage provider state machines: %w", err)
}
if err := p.restartDeals(); err != nil {
return fmt.Errorf("Failed to restart deals: %w", err)
}
return nil
}
func (p *Provider) restartDeals() error {
var deals []storagemarket.MinerDeal
err := p.deals.List(&deals)
if err != nil {
return err
}
for _, deal := range deals {
if p.deals.IsTerminated(deal) {
continue
}
err = p.deals.Send(deal.ProposalCid, storagemarket.ProviderEventRestart)
if err != nil {
return err
}
}
return nil
}
func (p *Provider) sign(ctx context.Context, data interface{}) (*crypto.Signature, error) {
tok, _, err := p.spn.GetChainHead(ctx)
if err != nil {
return nil, xerrors.Errorf("couldn't get chain head: %w", err)
}
return providerutils.SignMinerData(ctx, data, p.actor, tok, p.spn.GetMinerWorkerAddress, p.spn.SignBytes)
}
func (p *Provider) resendProposalResponse(s network.StorageDealStream, md *storagemarket.MinerDeal) error {
resp := &network.Response{State: md.State, Message: md.Message, Proposal: md.ProposalCid}
sig, err := p.sign(context.TODO(), resp)
if err != nil {
return xerrors.Errorf("failed to sign response message: %w", err)
}
err = s.WriteDealResponse(network.SignedResponse{Response: *resp, Signature: sig}, p.sign)
if closeErr := s.Close(); closeErr != nil {
log.Warnf("closing connection: %v", err)
}
return err
}
func newProviderStateMachine(ds datastore.Batching, env fsm.Environment, notifier fsm.Notifier, storageMigrations versioning.VersionedMigrationList, target versioning.VersionKey) (fsm.Group, func(context.Context) error, error) {
return versionedfsm.NewVersionedFSM(ds, fsm.Parameters{
Environment: env,
StateType: storagemarket.MinerDeal{},
StateKeyField: "State",
Events: providerstates.ProviderEvents,
StateEntryFuncs: providerstates.ProviderStateEntryFuncs,
FinalityStates: providerstates.ProviderFinalityStates,
Notifier: notifier,
}, storageMigrations, target)
}
type internalProviderEvent struct {
evt storagemarket.ProviderEvent
deal storagemarket.MinerDeal
}
func providerDispatcher(evt pubsub.Event, fn pubsub.SubscriberFn) error {
ie, ok := evt.(internalProviderEvent)
if !ok {
return xerrors.New("wrong type of event")
}
cb, ok := fn.(storagemarket.ProviderSubscriber)
if !ok {
return xerrors.New("wrong type of callback")
}
cb(ie.evt, ie.deal)
return nil
}
// ProviderFSMParameterSpec is a valid set of parameters for a provider FSM - used in doc generation
var ProviderFSMParameterSpec = fsm.Parameters{
Environment: &providerDealEnvironment{},
StateType: storagemarket.MinerDeal{},
StateKeyField: "State",
Events: providerstates.ProviderEvents,
StateEntryFuncs: providerstates.ProviderStateEntryFuncs,
FinalityStates: providerstates.ProviderFinalityStates,
}