2019-03-18 10:55:06 +00:00
// Copyright (C) 2019 Storj Labs, Inc.
// See LICENSE for copying information.
package piecestore
import (
"context"
"io"
2019-06-03 10:17:09 +01:00
"os"
2019-07-03 14:47:55 +01:00
"sync/atomic"
2019-03-18 10:55:06 +00:00
"time"
"github.com/golang/protobuf/ptypes"
"github.com/zeebo/errs"
"go.uber.org/zap"
"golang.org/x/sync/errgroup"
2019-06-03 10:17:09 +01:00
"google.golang.org/grpc/codes"
"google.golang.org/grpc/status"
2019-03-18 10:55:06 +00:00
monkit "gopkg.in/spacemonkeygo/monkit.v2"
"storj.io/storj/internal/memory"
"storj.io/storj/internal/sync2"
"storj.io/storj/pkg/auth/signing"
"storj.io/storj/pkg/identity"
"storj.io/storj/pkg/pb"
"storj.io/storj/storagenode/bandwidth"
"storj.io/storj/storagenode/monitor"
"storj.io/storj/storagenode/orders"
"storj.io/storj/storagenode/pieces"
"storj.io/storj/storagenode/trust"
)
var (
mon = monkit . Package ( )
// Error is the default error class for piecestore errors
Error = errs . Class ( "piecestore" )
// ErrProtocol is the default error class for protocol errors.
ErrProtocol = errs . Class ( "piecestore protocol" )
// ErrInternal is the default error class for internal piecestore errors.
ErrInternal = errs . Class ( "piecestore internal" )
)
var _ pb . PiecestoreServer = ( * Endpoint ) ( nil )
2019-04-26 06:17:18 +01:00
// OldConfig contains everything necessary for a server
type OldConfig struct {
Path string ` help:"path to store data in" default:"$CONFDIR/storage" `
2019-05-21 12:48:47 +01:00
WhitelistedSatelliteIDs string ` help:"a comma-separated list of approved satellite node ids" devDefault:"" releaseDefault:"12EayRS2V1kEsWESU9QMRseFhdxYxKicsiFmxrsLZHeLUtdps3S,118UWpMCHzs6CvSgWd9BfFVjw5K9pZbJjkfZJexMtSkmKxvvAW,121RTSDpyNZVcEU84Ticf2L1ntiuUimbWgfATz21tuvgk3vzoA6,12L9ZFwhzVpuEKMUNUqkaTLGzwY9G24tbiigLiXpmZWKwmcNDDs" `
2019-04-26 06:17:18 +01:00
SatelliteIDRestriction bool ` help:"if true, only allow data from approved satellites" devDefault:"false" releaseDefault:"true" `
AllocatedDiskSpace memory . Size ` user:"true" help:"total allocated disk space in bytes" default:"1TB" `
2019-05-29 18:40:04 +01:00
AllocatedBandwidth memory . Size ` user:"true" help:"total allocated bandwidth in bytes" default:"2TB" `
2019-04-26 06:17:18 +01:00
KBucketRefreshInterval time . Duration ` help:"how frequently Kademlia bucket should be refreshed with node stats" default:"1h0m0s" `
}
2019-03-18 10:55:06 +00:00
// Config defines parameters for piecestore endpoint.
type Config struct {
ExpirationGracePeriod time . Duration ` help:"how soon before expiration date should things be considered expired" default:"48h0m0s" `
2019-07-03 14:47:55 +01:00
MaxConcurrentRequests int ` help:"how many concurrent requests are allowed, before uploads are rejected." default:"6" `
2019-07-02 17:06:12 +01:00
OrderLimitGracePeriod time . Duration ` help:"how long after OrderLimit creation date are OrderLimits no longer accepted" default:"1h0m0s" `
2019-03-18 10:55:06 +00:00
Monitor monitor . Config
2019-03-27 10:24:35 +00:00
Sender orders . SenderConfig
2019-03-18 10:55:06 +00:00
}
// Endpoint implements uploading, downloading and deleting for a storage node.
type Endpoint struct {
log * zap . Logger
config Config
2019-04-15 11:12:22 +01:00
signer signing . Signer
trust * trust . Pool
monitor * monitor . Service
2019-03-18 10:55:06 +00:00
store * pieces . Store
pieceinfo pieces . DB
orders orders . DB
usage bandwidth . DB
usedSerials UsedSerials
2019-07-03 14:47:55 +01:00
liveRequests int32
2019-03-18 10:55:06 +00:00
}
// NewEndpoint creates a new piecestore endpoint.
2019-04-15 11:12:22 +01:00
func NewEndpoint ( log * zap . Logger , signer signing . Signer , trust * trust . Pool , monitor * monitor . Service , store * pieces . Store , pieceinfo pieces . DB , orders orders . DB , usage bandwidth . DB , usedSerials UsedSerials , config Config ) ( * Endpoint , error ) {
2019-03-18 10:55:06 +00:00
return & Endpoint {
log : log ,
config : config ,
2019-04-15 11:12:22 +01:00
signer : signer ,
trust : trust ,
monitor : monitor ,
2019-03-18 10:55:06 +00:00
store : store ,
pieceinfo : pieceinfo ,
orders : orders ,
usage : usage ,
usedSerials : usedSerials ,
2019-07-03 14:47:55 +01:00
liveRequests : 0 ,
2019-03-18 10:55:06 +00:00
} , nil
}
// Delete handles deleting a piece on piece store.
func ( endpoint * Endpoint ) Delete ( ctx context . Context , delete * pb . PieceDeleteRequest ) ( _ * pb . PieceDeleteResponse , err error ) {
defer mon . Task ( ) ( & ctx ) ( & err )
2019-07-03 14:47:55 +01:00
atomic . AddInt32 ( & endpoint . liveRequests , 1 )
defer atomic . AddInt32 ( & endpoint . liveRequests , - 1 )
2019-03-18 10:55:06 +00:00
if delete . Limit . Action != pb . PieceAction_DELETE {
return nil , Error . New ( "expected delete action got %v" , delete . Limit . Action ) // TODO: report grpc status unauthorized or bad request
}
if err := endpoint . VerifyOrderLimit ( ctx , delete . Limit ) ; err != nil {
// TODO: report grpc status unauthorized or bad request
return nil , Error . Wrap ( err )
}
// TODO: parallelize this and maybe return early
pieceInfoErr := endpoint . pieceinfo . Delete ( ctx , delete . Limit . SatelliteId , delete . Limit . PieceId )
pieceErr := endpoint . store . Delete ( ctx , delete . Limit . SatelliteId , delete . Limit . PieceId )
if err := errs . Combine ( pieceInfoErr , pieceErr ) ; err != nil {
// explicitly ignoring error because the errors
// TODO: add more debug info
endpoint . log . Error ( "delete failed" , zap . Stringer ( "Piece ID" , delete . Limit . PieceId ) , zap . Error ( err ) )
// TODO: report internal server internal or missing error using grpc status,
// e.g. missing might happen when we get a deletion request after garbage collection has deleted it
} else {
2019-04-09 00:14:09 +01:00
endpoint . log . Info ( "deleted" , zap . Stringer ( "Piece ID" , delete . Limit . PieceId ) )
2019-03-18 10:55:06 +00:00
}
return & pb . PieceDeleteResponse { } , nil
}
// Upload handles uploading a piece on piece store.
func ( endpoint * Endpoint ) Upload ( stream pb . Piecestore_UploadServer ) ( err error ) {
ctx := stream . Context ( )
defer mon . Task ( ) ( & ctx ) ( & err )
2019-07-03 14:47:55 +01:00
liveRequests := atomic . AddInt32 ( & endpoint . liveRequests , 1 )
defer atomic . AddInt32 ( & endpoint . liveRequests , - 1 )
if int ( liveRequests ) > endpoint . config . MaxConcurrentRequests {
endpoint . log . Error ( "upload rejected, too many requests" , zap . Int32 ( "live requests" , liveRequests ) )
return status . Error ( codes . Unavailable , "storage node overloaded" )
}
2019-05-30 16:44:47 +01:00
startTime := time . Now ( ) . UTC ( )
2019-03-18 10:55:06 +00:00
// TODO: set connection timeouts
// TODO: set maximum message size
var message * pb . PieceUploadRequest
message , err = stream . Recv ( )
switch {
case err != nil :
return ErrProtocol . Wrap ( err )
case message == nil :
return ErrProtocol . New ( "expected a message" )
case message . Limit == nil :
return ErrProtocol . New ( "expected order limit as the first message" )
}
limit := message . Limit
2019-06-17 23:38:52 +01:00
endpoint . log . Info ( "upload started" , zap . Stringer ( "Piece ID" , limit . PieceId ) , zap . Stringer ( "SatelliteID" , limit . SatelliteId ) , zap . Stringer ( "Action" , limit . Action ) )
2019-06-11 04:30:17 +01:00
2019-03-18 10:55:06 +00:00
// TODO: verify that we have have expected amount of storage before continuing
if limit . Action != pb . PieceAction_PUT && limit . Action != pb . PieceAction_PUT_REPAIR {
return ErrProtocol . New ( "expected put or put repair action got %v" , limit . Action ) // TODO: report grpc status unauthorized or bad request
}
if err := endpoint . VerifyOrderLimit ( ctx , limit ) ; err != nil {
return err // TODO: report grpc status unauthorized or bad request
}
2019-05-30 16:44:47 +01:00
var pieceWriter * pieces . Writer
2019-03-18 10:55:06 +00:00
defer func ( ) {
2019-05-30 16:44:47 +01:00
endTime := time . Now ( ) . UTC ( )
dt := endTime . Sub ( startTime )
uploadSize := int64 ( 0 )
if pieceWriter != nil {
uploadSize = pieceWriter . Size ( )
}
uploadRate := float64 ( 0 )
if dt . Seconds ( ) > 0 {
uploadRate = float64 ( uploadSize ) / dt . Seconds ( )
}
uploadDuration := dt . Nanoseconds ( )
2019-03-18 10:55:06 +00:00
if err != nil {
2019-06-04 14:22:00 +01:00
mon . Meter ( "upload_failure_byte_meter" ) . Mark64 ( uploadSize )
2019-05-30 16:44:47 +01:00
mon . IntVal ( "upload_failure_size_bytes" ) . Observe ( uploadSize )
mon . IntVal ( "upload_failure_duration_ns" ) . Observe ( uploadDuration )
mon . FloatVal ( "upload_failure_rate_bytes_per_sec" ) . Observe ( uploadRate )
2019-06-17 23:38:52 +01:00
endpoint . log . Info ( "upload failed" , zap . Stringer ( "Piece ID" , limit . PieceId ) , zap . Stringer ( "SatelliteID" , limit . SatelliteId ) , zap . Stringer ( "Action" , limit . Action ) , zap . Error ( err ) )
2019-03-18 10:55:06 +00:00
} else {
2019-06-04 14:22:00 +01:00
mon . Meter ( "upload_success_byte_meter" ) . Mark64 ( uploadSize )
2019-05-30 16:44:47 +01:00
mon . IntVal ( "upload_success_size_bytes" ) . Observe ( uploadSize )
mon . IntVal ( "upload_success_duration_ns" ) . Observe ( uploadDuration )
mon . FloatVal ( "upload_success_rate_bytes_per_sec" ) . Observe ( uploadRate )
2019-06-17 23:38:52 +01:00
endpoint . log . Info ( "uploaded" , zap . Stringer ( "Piece ID" , limit . PieceId ) , zap . Stringer ( "SatelliteID" , limit . SatelliteId ) , zap . Stringer ( "Action" , limit . Action ) )
2019-03-18 10:55:06 +00:00
}
} ( )
peer , err := identity . PeerIdentityFromContext ( ctx )
if err != nil {
return Error . Wrap ( err )
}
2019-05-30 16:44:47 +01:00
pieceWriter , err = endpoint . store . Writer ( ctx , limit . SatelliteId , limit . PieceId )
2019-03-18 10:55:06 +00:00
if err != nil {
return ErrInternal . Wrap ( err ) // TODO: report grpc status internal server error
}
defer func ( ) {
// cancel error if it hasn't been committed
2019-06-04 13:31:39 +01:00
if cancelErr := pieceWriter . Cancel ( ctx ) ; cancelErr != nil {
2019-04-17 11:09:44 +01:00
endpoint . log . Error ( "error during canceling a piece write" , zap . Error ( cancelErr ) )
2019-03-18 10:55:06 +00:00
}
} ( )
2019-04-15 11:12:22 +01:00
availableBandwidth , err := endpoint . monitor . AvailableBandwidth ( ctx )
if err != nil {
return ErrInternal . Wrap ( err )
}
availableSpace , err := endpoint . monitor . AvailableSpace ( ctx )
if err != nil {
return ErrInternal . Wrap ( err )
}
2019-07-01 16:54:11 +01:00
largestOrder := pb . Order { }
2019-03-18 10:55:06 +00:00
defer endpoint . SaveOrder ( ctx , limit , & largestOrder , peer )
for {
message , err = stream . Recv ( ) // TODO: reuse messages to avoid allocations
if err == io . EOF {
return ErrProtocol . New ( "unexpected EOF" )
} else if err != nil {
return ErrProtocol . Wrap ( err ) // TODO: report grpc status bad message
}
if message == nil {
return ErrProtocol . New ( "expected a message" ) // TODO: report grpc status bad message
}
switch {
default :
return ErrProtocol . New ( "message didn't contain any of order, chunk or done" ) // TODO: report grpc status bad message
case message . Order != nil :
if err := endpoint . VerifyOrder ( ctx , peer , limit , message . Order , largestOrder . Amount ) ; err != nil {
return err
}
largestOrder = * message . Order
case message . Chunk != nil :
if message . Chunk . Offset != pieceWriter . Size ( ) {
return ErrProtocol . New ( "chunk out of order" ) // TODO: report grpc status bad message
}
2019-04-15 11:12:22 +01:00
chunkSize := int64 ( len ( message . Chunk . Data ) )
if largestOrder . Amount < pieceWriter . Size ( ) + chunkSize {
2019-03-18 10:55:06 +00:00
// TODO: should we write currently and give a chance for uplink to remedy the situation?
return ErrProtocol . New ( "not enough allocated, allocated=%v writing=%v" , largestOrder . Amount , pieceWriter . Size ( ) + int64 ( len ( message . Chunk . Data ) ) ) // TODO: report grpc status ?
}
2019-04-15 11:12:22 +01:00
availableBandwidth -= chunkSize
if availableBandwidth < 0 {
return ErrProtocol . New ( "out of bandwidth" )
}
availableSpace -= chunkSize
if availableSpace < 0 {
return ErrProtocol . New ( "out of space" )
}
2019-03-18 10:55:06 +00:00
if _ , err := pieceWriter . Write ( message . Chunk . Data ) ; err != nil {
return ErrInternal . Wrap ( err ) // TODO: report grpc status internal server error
}
case message . Done != nil :
expectedHash := pieceWriter . Hash ( )
if err := endpoint . VerifyPieceHash ( ctx , peer , limit , message . Done , expectedHash ) ; err != nil {
return err // TODO: report grpc status internal server error
}
2019-07-01 10:36:35 +01:00
2019-06-04 13:31:39 +01:00
if err := pieceWriter . Commit ( ctx ) ; err != nil {
2019-03-18 10:55:06 +00:00
return ErrInternal . Wrap ( err ) // TODO: report grpc status internal server error
}
// TODO: do this in a goroutine
{
2019-03-20 21:12:00 +00:00
var expiration * time . Time
if limit . PieceExpiration != nil {
exp , err := ptypes . Timestamp ( limit . PieceExpiration )
if err != nil {
return ErrInternal . Wrap ( err )
}
expiration = & exp
2019-03-18 10:55:06 +00:00
}
// TODO: maybe this should be as a pieceWriter.Commit(ctx, info)
info := & pieces . Info {
SatelliteID : limit . SatelliteId ,
PieceID : limit . PieceId ,
PieceSize : pieceWriter . Size ( ) ,
PieceExpiration : expiration ,
UplinkPieceHash : message . Done ,
Uplink : peer ,
}
if err := endpoint . pieceinfo . Add ( ctx , info ) ; err != nil {
2019-06-21 17:16:39 +01:00
ignoreCancelContext := context . Background ( )
deleteErr := endpoint . store . Delete ( ignoreCancelContext , limit . SatelliteId , limit . PieceId )
return ErrInternal . Wrap ( errs . Combine ( err , deleteErr ) )
2019-03-18 10:55:06 +00:00
}
}
2019-06-05 14:47:01 +01:00
storageNodeHash , err := signing . SignPieceHash ( ctx , endpoint . signer , & pb . PieceHash {
2019-07-03 17:14:37 +01:00
PieceId : limit . PieceId ,
Hash : expectedHash ,
PieceSize : pieceWriter . Size ( ) ,
Timestamp : time . Now ( ) ,
2019-03-18 10:55:06 +00:00
} )
if err != nil {
return ErrInternal . Wrap ( err )
}
closeErr := stream . SendAndClose ( & pb . PieceUploadResponse {
Done : storageNodeHash ,
} )
return ErrProtocol . Wrap ( ignoreEOF ( closeErr ) )
}
}
}
// Download implements downloading a piece from piece store.
func ( endpoint * Endpoint ) Download ( stream pb . Piecestore_DownloadServer ) ( err error ) {
ctx := stream . Context ( )
defer mon . Task ( ) ( & ctx ) ( & err )
2019-07-03 14:47:55 +01:00
atomic . AddInt32 ( & endpoint . liveRequests , 1 )
defer atomic . AddInt32 ( & endpoint . liveRequests , - 1 )
2019-05-30 16:44:47 +01:00
startTime := time . Now ( ) . UTC ( )
2019-03-18 10:55:06 +00:00
// TODO: set connection timeouts
// TODO: set maximum message size
var message * pb . PieceDownloadRequest
// receive limit and chunk from uplink
message , err = stream . Recv ( )
if err != nil {
return ErrProtocol . Wrap ( err )
}
if message . Limit == nil || message . Chunk == nil {
return ErrProtocol . New ( "expected order limit and chunk as the first message" )
}
limit , chunk := message . Limit , message . Chunk
2019-06-17 23:38:52 +01:00
endpoint . log . Info ( "download started" , zap . Stringer ( "Piece ID" , limit . PieceId ) , zap . Stringer ( "SatelliteID" , limit . SatelliteId ) , zap . Stringer ( "Action" , limit . Action ) )
2019-06-11 04:30:17 +01:00
2019-03-18 10:55:06 +00:00
if limit . Action != pb . PieceAction_GET && limit . Action != pb . PieceAction_GET_REPAIR && limit . Action != pb . PieceAction_GET_AUDIT {
return ErrProtocol . New ( "expected get or get repair or audit action got %v" , limit . Action ) // TODO: report grpc status unauthorized or bad request
}
if chunk . ChunkSize > limit . Limit {
return ErrProtocol . New ( "requested more that order limit allows, limit=%v requested=%v" , limit . Limit , chunk . ChunkSize )
}
if err := endpoint . VerifyOrderLimit ( ctx , limit ) ; err != nil {
return Error . Wrap ( err ) // TODO: report grpc status unauthorized or bad request
}
2019-05-30 16:44:47 +01:00
var pieceReader * pieces . Reader
2019-03-18 10:55:06 +00:00
defer func ( ) {
2019-05-30 16:44:47 +01:00
endTime := time . Now ( ) . UTC ( )
dt := endTime . Sub ( startTime )
downloadSize := int64 ( 0 )
if pieceReader != nil {
downloadSize = pieceReader . Size ( )
}
downloadRate := float64 ( 0 )
if dt . Seconds ( ) > 0 {
downloadRate = float64 ( downloadSize ) / dt . Seconds ( )
}
downloadDuration := dt . Nanoseconds ( )
2019-03-18 10:55:06 +00:00
if err != nil {
2019-06-04 14:22:00 +01:00
mon . Meter ( "download_failure_byte_meter" ) . Mark64 ( downloadSize )
2019-05-30 16:44:47 +01:00
mon . IntVal ( "download_failure_size_bytes" ) . Observe ( downloadSize )
mon . IntVal ( "download_failure_duration_ns" ) . Observe ( downloadDuration )
mon . FloatVal ( "download_failure_rate_bytes_per_sec" ) . Observe ( downloadRate )
2019-06-17 23:38:52 +01:00
endpoint . log . Info ( "download failed" , zap . Stringer ( "Piece ID" , limit . PieceId ) , zap . Stringer ( "SatelliteID" , limit . SatelliteId ) , zap . Stringer ( "Action" , limit . Action ) , zap . Error ( err ) )
2019-03-18 10:55:06 +00:00
} else {
2019-06-04 14:22:00 +01:00
mon . Meter ( "download_success_byte_meter" ) . Mark64 ( downloadSize )
2019-05-30 16:44:47 +01:00
mon . IntVal ( "download_success_size_bytes" ) . Observe ( downloadSize )
mon . IntVal ( "download_success_duration_ns" ) . Observe ( downloadDuration )
mon . FloatVal ( "download_success_rate_bytes_per_sec" ) . Observe ( downloadRate )
2019-06-17 23:38:52 +01:00
endpoint . log . Info ( "downloaded" , zap . Stringer ( "Piece ID" , limit . PieceId ) , zap . Stringer ( "SatelliteID" , limit . SatelliteId ) , zap . Stringer ( "Action" , limit . Action ) )
2019-03-18 10:55:06 +00:00
}
} ( )
peer , err := identity . PeerIdentityFromContext ( ctx )
if err != nil {
return Error . Wrap ( err )
}
2019-05-30 16:44:47 +01:00
pieceReader , err = endpoint . store . Reader ( ctx , limit . SatelliteId , limit . PieceId )
2019-03-18 10:55:06 +00:00
if err != nil {
2019-06-03 10:17:09 +01:00
if os . IsNotExist ( err ) {
return status . Error ( codes . NotFound , err . Error ( ) )
}
return status . Error ( codes . Internal , err . Error ( ) )
2019-03-18 10:55:06 +00:00
}
defer func ( ) {
err := pieceReader . Close ( ) // similarly how transcation Rollback works
if err != nil {
// no reason to report this error to the uplink
endpoint . log . Error ( "failed to close piece reader" , zap . Error ( err ) )
}
} ( )
// TODO: verify chunk.Size behavior logic with regards to reading all
if chunk . Offset + chunk . ChunkSize > pieceReader . Size ( ) {
return Error . New ( "requested more data than available, requesting=%v available=%v" , chunk . Offset + chunk . ChunkSize , pieceReader . Size ( ) )
}
2019-04-15 11:12:22 +01:00
availableBandwidth , err := endpoint . monitor . AvailableBandwidth ( ctx )
if err != nil {
return ErrInternal . Wrap ( err )
}
2019-03-18 10:55:06 +00:00
throttle := sync2 . NewThrottle ( )
// TODO: see whether this can be implemented without a goroutine
group , ctx := errgroup . WithContext ( ctx )
group . Go ( func ( ) ( err error ) {
var maximumChunkSize = 1 * memory . MiB . Int64 ( )
currentOffset := chunk . Offset
unsentAmount := chunk . ChunkSize
for unsentAmount > 0 {
tryToSend := min ( unsentAmount , maximumChunkSize )
// TODO: add timeout here
chunkSize , err := throttle . ConsumeOrWait ( tryToSend )
if err != nil {
// this can happen only because uplink decided to close the connection
return nil
}
chunkData := make ( [ ] byte , chunkSize )
_ , err = pieceReader . Seek ( currentOffset , io . SeekStart )
if err != nil {
return ErrInternal . Wrap ( err )
}
_ , err = pieceReader . Read ( chunkData )
if err != nil {
return ErrInternal . Wrap ( err )
}
err = stream . Send ( & pb . PieceDownloadResponse {
Chunk : & pb . PieceDownloadResponse_Chunk {
Offset : currentOffset ,
Data : chunkData ,
} ,
} )
if err != nil {
// err is io.EOF when uplink asked for a piece, but decided not to retrieve it,
// no need to propagate it
return ErrProtocol . Wrap ( ignoreEOF ( err ) )
}
currentOffset += chunkSize
unsentAmount -= chunkSize
}
return nil
} )
recvErr := func ( ) ( err error ) {
2019-07-01 16:54:11 +01:00
largestOrder := pb . Order { }
2019-03-18 10:55:06 +00:00
defer endpoint . SaveOrder ( ctx , limit , & largestOrder , peer )
// ensure that we always terminate sending goroutine
defer throttle . Fail ( io . EOF )
for {
// TODO: check errors
// TODO: add timeout here
message , err = stream . Recv ( )
if err != nil {
// err is io.EOF when uplink closed the connection, no need to return error
return ErrProtocol . Wrap ( ignoreEOF ( err ) )
}
if message == nil || message . Order == nil {
return ErrProtocol . New ( "expected order as the message" )
}
if err := endpoint . VerifyOrder ( ctx , peer , limit , message . Order , largestOrder . Amount ) ; err != nil {
return err
}
2019-04-15 11:12:22 +01:00
chunkSize := message . Order . Amount - largestOrder . Amount
availableBandwidth -= chunkSize
if availableBandwidth < 0 {
return ErrProtocol . New ( "out of bandwidth" )
}
if err := throttle . Produce ( chunkSize ) ; err != nil {
2019-03-18 10:55:06 +00:00
// shouldn't happen since only receiving side is calling Fail
return ErrInternal . Wrap ( err )
}
largestOrder = * message . Order
}
} ( )
// ensure we wait for sender to complete
sendErr := group . Wait ( )
return Error . Wrap ( errs . Combine ( sendErr , recvErr ) )
}
// SaveOrder saves the order with all necessary information. It assumes it has been already verified.
2019-07-01 16:54:11 +01:00
func ( endpoint * Endpoint ) SaveOrder ( ctx context . Context , limit * pb . OrderLimit , order * pb . Order , uplink * identity . PeerIdentity ) {
2019-06-04 13:31:39 +01:00
var err error
defer mon . Task ( ) ( & ctx ) ( & err )
2019-03-18 10:55:06 +00:00
// TODO: do this in a goroutine
if order == nil || order . Amount <= 0 {
return
}
2019-06-04 13:31:39 +01:00
err = endpoint . orders . Enqueue ( ctx , & orders . Info {
2019-03-18 10:55:06 +00:00
Limit : limit ,
Order : order ,
Uplink : uplink ,
} )
if err != nil {
endpoint . log . Error ( "failed to add order" , zap . Error ( err ) )
} else {
2019-06-04 13:31:39 +01:00
err = endpoint . usage . Add ( ctx , limit . SatelliteId , limit . Action , order . Amount , time . Now ( ) )
2019-03-18 10:55:06 +00:00
if err != nil {
endpoint . log . Error ( "failed to add bandwidth usage" , zap . Error ( err ) )
}
}
}
// min finds the min of two values
func min ( a , b int64 ) int64 {
if a < b {
return a
}
return b
}
// ignoreEOF ignores io.EOF error.
func ignoreEOF ( err error ) error {
if err == io . EOF {
return nil
}
return err
}