]> git.proxmox.com Git - proxmox-backup.git/blame - pbs-client/src/backup_writer.rs
moved key_derivation.rs from pbs_datastore to pbs-config/src/key_config.rs
[proxmox-backup.git] / pbs-client / src / backup_writer.rs
CommitLineData
cf9271e2 1use std::collections::HashSet;
be3a0295 2use std::future::Future;
b957aa81 3use std::os::unix::fs::OpenOptionsExt;
924373d2 4use std::sync::atomic::{AtomicU64, AtomicUsize, Ordering};
cf9271e2
DM
5use std::sync::{Arc, Mutex};
6
f28d9088 7use anyhow::{bail, format_err, Error};
be3a0295
WB
8use futures::future::{self, AbortHandle, Either, FutureExt, TryFutureExt};
9use futures::stream::{Stream, StreamExt, TryStreamExt};
cf9271e2
DM
10use serde_json::{json, Value};
11use tokio::io::AsyncReadExt;
12use tokio::sync::{mpsc, oneshot};
7c667013 13use tokio_stream::wrappers::ReceiverStream;
cf9271e2
DM
14
15use proxmox::tools::digest_to_hex;
16
bbdda58b
DM
17use pbs_tools::crypt_config::CryptConfig;
18use pbs_tools::format::HumanByte;
19use pbs_datastore::{CATALOG_NAME, PROXMOX_BACKUP_PROTOCOL_ID_V1};
4805edc4
WB
20use pbs_datastore::data_blob::{ChunkInfo, DataBlob, DataChunkBuilder};
21use pbs_datastore::dynamic_index::DynamicIndexReader;
22use pbs_datastore::fixed_index::FixedIndexReader;
23use pbs_datastore::index::IndexFile;
24use pbs_datastore::manifest::{ArchiveType, BackupManifest, MANIFEST_BLOB_NAME};
770a36e5 25
ef6d4967 26use super::merge_known_chunks::{MergeKnownChunks, MergedChunkInfo};
cf9271e2 27
ef6d4967 28use super::{H2Client, HttpClient};
cf9271e2
DM
29
30pub struct BackupWriter {
31 h2: H2Client,
dc089345 32 abort: AbortHandle,
e02c3d46 33 verbose: bool,
b957aa81 34 crypt_config: Option<Arc<CryptConfig>>,
cf9271e2
DM
35}
36
37impl Drop for BackupWriter {
cf9271e2 38 fn drop(&mut self) {
dc089345 39 self.abort.abort();
cf9271e2
DM
40 }
41}
42
43pub struct BackupStats {
44 pub size: u64,
45 pub csum: [u8; 32],
46}
47
e43b9175
FG
48/// Options for uploading blobs/streams to the server
49#[derive(Default, Clone)]
50pub struct UploadOptions {
51 pub previous_manifest: Option<Arc<BackupManifest>>,
52 pub compress: bool,
53 pub encrypt: bool,
54 pub fixed_size: Option<u64>,
55}
56
3b60b509
DC
57struct UploadStats {
58 chunk_count: usize,
59 chunk_reused: usize,
60 size: usize,
61 size_reused: usize,
924373d2 62 size_compressed: usize,
3b60b509
DC
63 duration: std::time::Duration,
64 csum: [u8; 32],
65}
66
8db14689
WB
67type UploadQueueSender = mpsc::Sender<(MergedChunkInfo, Option<h2::client::ResponseFuture>)>;
68type UploadResultReceiver = oneshot::Receiver<Result<(), Error>>;
69
cf9271e2 70impl BackupWriter {
ef6d4967
TL
71 fn new(
72 h2: H2Client,
73 abort: AbortHandle,
74 crypt_config: Option<Arc<CryptConfig>>,
75 verbose: bool,
76 ) -> Arc<Self> {
77 Arc::new(Self {
78 h2,
79 abort,
80 crypt_config,
81 verbose,
82 })
cf9271e2
DM
83 }
84
367c0ff7
FG
85 // FIXME: extract into (flattened) parameter struct?
86 #[allow(clippy::too_many_arguments)]
cf9271e2
DM
87 pub async fn start(
88 client: HttpClient,
b957aa81 89 crypt_config: Option<Arc<CryptConfig>>,
cf9271e2
DM
90 datastore: &str,
91 backup_type: &str,
92 backup_id: &str,
6a7be83e 93 backup_time: i64,
cf9271e2 94 debug: bool,
ef6d4967 95 benchmark: bool,
cf9271e2 96 ) -> Result<Arc<BackupWriter>, Error> {
cf9271e2
DM
97 let param = json!({
98 "backup-type": backup_type,
99 "backup-id": backup_id,
6a7be83e 100 "backup-time": backup_time,
cf9271e2 101 "store": datastore,
61d7b501
HL
102 "debug": debug,
103 "benchmark": benchmark
cf9271e2
DM
104 });
105
106 let req = HttpClient::request_builder(
ef6d4967
TL
107 client.server(),
108 client.port(),
109 "GET",
110 "/api2/json/backup",
111 Some(param),
112 )
113 .unwrap();
114
115 let (h2, abort) = client
116 .start_h2_connection(req, String::from(PROXMOX_BACKUP_PROTOCOL_ID_V1!()))
117 .await?;
cf9271e2 118
b957aa81 119 Ok(BackupWriter::new(h2, abort, crypt_config, debug))
cf9271e2
DM
120 }
121
ef6d4967 122 pub async fn get(&self, path: &str, param: Option<Value>) -> Result<Value, Error> {
cf9271e2
DM
123 self.h2.get(path, param).await
124 }
125
ef6d4967 126 pub async fn put(&self, path: &str, param: Option<Value>) -> Result<Value, Error> {
cf9271e2
DM
127 self.h2.put(path, param).await
128 }
129
ef6d4967 130 pub async fn post(&self, path: &str, param: Option<Value>) -> Result<Value, Error> {
cf9271e2
DM
131 self.h2.post(path, param).await
132 }
133
134 pub async fn upload_post(
135 &self,
136 path: &str,
137 param: Option<Value>,
138 content_type: &str,
139 data: Vec<u8>,
140 ) -> Result<Value, Error> {
ef6d4967
TL
141 self.h2
142 .upload("POST", path, param, content_type, data)
143 .await
cf9271e2
DM
144 }
145
146 pub async fn send_upload_request(
147 &self,
148 method: &str,
149 path: &str,
150 param: Option<Value>,
151 content_type: &str,
152 data: Vec<u8>,
153 ) -> Result<h2::client::ResponseFuture, Error> {
ef6d4967
TL
154 let request =
155 H2Client::request_builder("localhost", method, path, param, Some(content_type))
156 .unwrap();
157 let response_future = self
158 .h2
159 .send_request(request, Some(bytes::Bytes::from(data.clone())))
160 .await?;
cf9271e2
DM
161 Ok(response_future)
162 }
163
164 pub async fn upload_put(
165 &self,
166 path: &str,
167 param: Option<Value>,
168 content_type: &str,
169 data: Vec<u8>,
170 ) -> Result<Value, Error> {
171 self.h2.upload("PUT", path, param, content_type, data).await
172 }
173
174 pub async fn finish(self: Arc<Self>) -> Result<(), Error> {
175 let h2 = self.h2.clone();
176
177 h2.post("finish", None)
178 .map_ok(move |_| {
dc089345 179 self.abort.abort();
cf9271e2
DM
180 })
181 .await
182 }
183
e016f9ff 184 pub fn cancel(&self) {
dc089345 185 self.abort.abort();
cf9271e2
DM
186 }
187
188 pub async fn upload_blob<R: std::io::Read>(
189 &self,
190 mut reader: R,
191 file_name: &str,
ef6d4967 192 ) -> Result<BackupStats, Error> {
cf9271e2
DM
193 let mut raw_data = Vec::new();
194 // fixme: avoid loading into memory
195 reader.read_to_end(&mut raw_data)?;
196
197 let csum = openssl::sha::sha256(&raw_data);
198 let param = json!({"encoded-size": raw_data.len(), "file-name": file_name });
199 let size = raw_data.len() as u64;
ef6d4967
TL
200 let _value = self
201 .h2
202 .upload(
203 "POST",
204 "blob",
205 Some(param),
206 "application/octet-stream",
207 raw_data,
208 )
209 .await?;
cf9271e2
DM
210 Ok(BackupStats { size, csum })
211 }
212
213 pub async fn upload_blob_from_data(
214 &self,
215 data: Vec<u8>,
216 file_name: &str,
e43b9175 217 options: UploadOptions,
f28d9088 218 ) -> Result<BackupStats, Error> {
e43b9175 219 let blob = match (options.encrypt, &self.crypt_config) {
ef6d4967
TL
220 (false, _) => DataBlob::encode(&data, None, options.compress)?,
221 (true, None) => bail!("requested encryption without a crypt config"),
222 (true, Some(crypt_config)) => {
223 DataBlob::encode(&data, Some(crypt_config), options.compress)?
224 }
cf9271e2
DM
225 };
226
227 let raw_data = blob.into_inner();
228 let size = raw_data.len() as u64;
229
230 let csum = openssl::sha::sha256(&raw_data);
231 let param = json!({"encoded-size": size, "file-name": file_name });
ef6d4967
TL
232 let _value = self
233 .h2
234 .upload(
235 "POST",
236 "blob",
237 Some(param),
238 "application/octet-stream",
239 raw_data,
240 )
241 .await?;
cf9271e2
DM
242 Ok(BackupStats { size, csum })
243 }
244
245 pub async fn upload_blob_from_file<P: AsRef<std::path::Path>>(
246 &self,
247 src_path: P,
248 file_name: &str,
e43b9175 249 options: UploadOptions,
3638341a 250 ) -> Result<BackupStats, Error> {
cf9271e2
DM
251 let src_path = src_path.as_ref();
252
253 let mut file = tokio::fs::File::open(src_path)
254 .await
255 .map_err(|err| format_err!("unable to open file {:?} - {}", src_path, err))?;
256
257 let mut contents = Vec::new();
258
259 file.read_to_end(&mut contents)
260 .await
261 .map_err(|err| format_err!("unable to read file {:?} - {}", src_path, err))?;
262
ef6d4967
TL
263 self.upload_blob_from_data(contents, file_name, options)
264 .await
cf9271e2
DM
265 }
266
267 pub async fn upload_stream(
268 &self,
269 archive_name: &str,
270 stream: impl Stream<Item = Result<bytes::BytesMut, Error>>,
e43b9175 271 options: UploadOptions,
cf9271e2
DM
272 ) -> Result<BackupStats, Error> {
273 let known_chunks = Arc::new(Mutex::new(HashSet::new()));
274
275 let mut param = json!({ "archive-name": archive_name });
e43b9175 276 let prefix = if let Some(size) = options.fixed_size {
cf9271e2 277 param["size"] = size.into();
e43b9175
FG
278 "fixed"
279 } else {
280 "dynamic"
281 };
cf9271e2 282
e43b9175 283 if options.encrypt && self.crypt_config.is_none() {
3638341a
DM
284 bail!("requested encryption without a crypt config");
285 }
286
cf9271e2
DM
287 let index_path = format!("{}_index", prefix);
288 let close_path = format!("{}_close", prefix);
289
e43b9175 290 if let Some(manifest) = options.previous_manifest {
b957aa81 291 // try, but ignore errors
4805edc4 292 match ArchiveType::from_path(archive_name) {
b957aa81 293 Ok(ArchiveType::FixedIndex) => {
ef6d4967
TL
294 let _ = self
295 .download_previous_fixed_index(
296 archive_name,
297 &manifest,
298 known_chunks.clone(),
299 )
300 .await;
b957aa81
DM
301 }
302 Ok(ArchiveType::DynamicIndex) => {
ef6d4967
TL
303 let _ = self
304 .download_previous_dynamic_index(
305 archive_name,
306 &manifest,
307 known_chunks.clone(),
308 )
309 .await;
b957aa81
DM
310 }
311 _ => { /* do nothing */ }
312 }
313 }
cf9271e2 314
ef6d4967
TL
315 let wid = self
316 .h2
317 .post(&index_path, Some(param))
318 .await?
319 .as_u64()
320 .unwrap();
cf9271e2 321
3b60b509
DC
322 let upload_stats = Self::upload_chunk_info_stream(
323 self.h2.clone(),
324 wid,
325 stream,
326 &prefix,
327 known_chunks.clone(),
328 if options.encrypt {
329 self.crypt_config.clone()
330 } else {
331 None
332 },
333 options.compress,
334 self.verbose,
335 )
336 .await?;
cf9271e2 337
924373d2
DC
338 let size_dirty = upload_stats.size - upload_stats.size_reused;
339 let size: HumanByte = upload_stats.size.into();
6e1deb15
TL
340 let archive = if self.verbose {
341 archive_name.to_string()
342 } else {
770a36e5 343 pbs_tools::format::strip_server_file_extension(archive_name)
6e1deb15
TL
344 };
345 if archive_name != CATALOG_NAME {
ef6d4967 346 let speed: HumanByte =
924373d2
DC
347 ((size_dirty * 1_000_000) / (upload_stats.duration.as_micros() as usize)).into();
348 let size_dirty: HumanByte = size_dirty.into();
349 let size_compressed: HumanByte = upload_stats.size_compressed.into();
ef6d4967 350 println!(
924373d2 351 "{}: had to backup {} of {} (compressed {}) in {:.2}s",
ef6d4967 352 archive,
924373d2
DC
353 size_dirty,
354 size,
355 size_compressed,
356 upload_stats.duration.as_secs_f64()
ef6d4967 357 );
924373d2 358 println!("{}: average backup speed: {}/s", archive, speed);
6e1deb15 359 } else {
924373d2 360 println!("Uploaded backup catalog ({})", size);
6e1deb15
TL
361 }
362
3b60b509
DC
363 if upload_stats.size_reused > 0 && upload_stats.size > 1024 * 1024 {
364 let reused_percent = upload_stats.size_reused as f64 * 100. / upload_stats.size as f64;
365 let reused: HumanByte = upload_stats.size_reused.into();
ef6d4967
TL
366 println!(
367 "{}: backup was done incrementally, reused {} ({:.1}%)",
368 archive, reused, reused_percent
369 );
6e1deb15 370 }
3b60b509 371 if self.verbose && upload_stats.chunk_count > 0 {
ef6d4967
TL
372 println!(
373 "{}: Reused {} from {} chunks.",
3b60b509 374 archive, upload_stats.chunk_reused, upload_stats.chunk_count
ef6d4967
TL
375 );
376 println!(
377 "{}: Average chunk size was {}.",
378 archive,
3b60b509 379 HumanByte::from(upload_stats.size / upload_stats.chunk_count)
ef6d4967
TL
380 );
381 println!(
382 "{}: Average time per request: {} microseconds.",
383 archive,
3b60b509 384 (upload_stats.duration.as_micros()) / (upload_stats.chunk_count as u128)
ef6d4967 385 );
6da73c82
DM
386 }
387
cf9271e2
DM
388 let param = json!({
389 "wid": wid ,
3b60b509
DC
390 "chunk-count": upload_stats.chunk_count,
391 "size": upload_stats.size,
392 "csum": proxmox::tools::digest_to_hex(&upload_stats.csum),
cf9271e2
DM
393 });
394 let _value = self.h2.post(&close_path, Some(param)).await?;
395 Ok(BackupStats {
3b60b509
DC
396 size: upload_stats.size as u64,
397 csum: upload_stats.csum,
cf9271e2
DM
398 })
399 }
400
ef6d4967
TL
401 fn response_queue(
402 verbose: bool,
403 ) -> (
cf9271e2 404 mpsc::Sender<h2::client::ResponseFuture>,
ef6d4967 405 oneshot::Receiver<Result<(), Error>>,
cf9271e2
DM
406 ) {
407 let (verify_queue_tx, verify_queue_rx) = mpsc::channel(100);
408 let (verify_result_tx, verify_result_rx) = oneshot::channel();
409
db0cb9ce
WB
410 // FIXME: check if this works as expected as replacement for the combinator below?
411 // tokio::spawn(async move {
412 // let result: Result<(), Error> = (async move {
413 // while let Some(response) = verify_queue_rx.recv().await {
414 // match H2Client::h2api_response(response.await?).await {
415 // Ok(result) => println!("RESPONSE: {:?}", result),
416 // Err(err) => bail!("pipelined request failed: {}", err),
417 // }
418 // }
419 // Ok(())
420 // }).await;
421 // let _ignore_closed_channel = verify_result_tx.send(result);
422 // });
423 // old code for reference?
424 tokio::spawn(
7c667013 425 ReceiverStream::new(verify_queue_rx)
cf9271e2 426 .map(Ok::<_, Error>)
323b2f3d 427 .try_for_each(move |response: h2::client::ResponseFuture| {
cf9271e2
DM
428 response
429 .map_err(Error::from)
430 .and_then(H2Client::h2api_response)
ef6d4967
TL
431 .map_ok(move |result| {
432 if verbose {
433 println!("RESPONSE: {:?}", result)
434 }
435 })
cf9271e2
DM
436 .map_err(|err| format_err!("pipelined request failed: {}", err))
437 })
438 .map(|result| {
ef6d4967
TL
439 let _ignore_closed_channel = verify_result_tx.send(result);
440 }),
cf9271e2
DM
441 );
442
443 (verify_queue_tx, verify_result_rx)
444 }
445
8db14689
WB
446 fn append_chunk_queue(
447 h2: H2Client,
448 wid: u64,
449 path: String,
450 verbose: bool,
451 ) -> (UploadQueueSender, UploadResultReceiver) {
cf9271e2
DM
452 let (verify_queue_tx, verify_queue_rx) = mpsc::channel(64);
453 let (verify_result_tx, verify_result_rx) = oneshot::channel();
454
db0cb9ce
WB
455 // FIXME: async-block-ify this code!
456 tokio::spawn(
7c667013 457 ReceiverStream::new(verify_queue_rx)
cf9271e2
DM
458 .map(Ok::<_, Error>)
459 .and_then(move |(merged_chunk_info, response): (MergedChunkInfo, Option<h2::client::ResponseFuture>)| {
460 match (response, merged_chunk_info) {
461 (Some(response), MergedChunkInfo::Known(list)) => {
be3a0295 462 Either::Left(
cf9271e2
DM
463 response
464 .map_err(Error::from)
465 .and_then(H2Client::h2api_response)
466 .and_then(move |_result| {
467 future::ok(MergedChunkInfo::Known(list))
468 })
469 )
470 }
471 (None, MergedChunkInfo::Known(list)) => {
be3a0295 472 Either::Right(future::ok(MergedChunkInfo::Known(list)))
cf9271e2
DM
473 }
474 _ => unreachable!(),
475 }
476 })
477 .merge_known_chunks()
478 .and_then(move |merged_chunk_info| {
479 match merged_chunk_info {
480 MergedChunkInfo::Known(chunk_list) => {
481 let mut digest_list = vec![];
482 let mut offset_list = vec![];
483 for (offset, digest) in chunk_list {
cf9271e2
DM
484 digest_list.push(digest_to_hex(&digest));
485 offset_list.push(offset);
486 }
e02c3d46 487 if verbose { println!("append chunks list len ({})", digest_list.len()); }
cf9271e2
DM
488 let param = json!({ "wid": wid, "digest-list": digest_list, "offset-list": offset_list });
489 let request = H2Client::request_builder("localhost", "PUT", &path, None, Some("application/json")).unwrap();
db0cb9ce 490 let param_data = bytes::Bytes::from(param.to_string().into_bytes());
cf9271e2 491 let upload_data = Some(param_data);
8db14689 492 h2.send_request(request, upload_data)
cf9271e2
DM
493 .and_then(move |response| {
494 response
495 .map_err(Error::from)
496 .and_then(H2Client::h2api_response)
497 .map_ok(|_| ())
498 })
499 .map_err(|err| format_err!("pipelined request failed: {}", err))
500 }
501 _ => unreachable!(),
502 }
503 })
504 .try_for_each(|_| future::ok(()))
505 .map(|result| {
506 let _ignore_closed_channel = verify_result_tx.send(result);
507 })
508 );
509
510 (verify_queue_tx, verify_result_rx)
511 }
512
b957aa81 513 pub async fn download_previous_fixed_index(
cf9271e2 514 &self,
cf9271e2 515 archive_name: &str,
b957aa81 516 manifest: &BackupManifest,
ef6d4967 517 known_chunks: Arc<Mutex<HashSet<[u8; 32]>>>,
b957aa81 518 ) -> Result<FixedIndexReader, Error> {
b957aa81
DM
519 let mut tmpfile = std::fs::OpenOptions::new()
520 .write(true)
521 .read(true)
522 .custom_flags(libc::O_TMPFILE)
523 .open("/tmp")?;
cf9271e2 524
b957aa81 525 let param = json!({ "archive-name": archive_name });
ef6d4967
TL
526 self.h2
527 .download("previous", Some(param), &mut tmpfile)
528 .await?;
b957aa81 529
ef6d4967
TL
530 let index = FixedIndexReader::new(tmpfile).map_err(|err| {
531 format_err!("unable to read fixed index '{}' - {}", archive_name, err)
532 })?;
b957aa81
DM
533 // Note: do not use values stored in index (not trusted) - instead, computed them again
534 let (csum, size) = index.compute_csum();
535 manifest.verify_file(archive_name, &csum, size)?;
536
537 // add index chunks to known chunks
538 let mut known_chunks = known_chunks.lock().unwrap();
539 for i in 0..index.index_count() {
540 known_chunks.insert(*index.index_digest(i).unwrap());
541 }
cf9271e2 542
b957aa81 543 if self.verbose {
ef6d4967
TL
544 println!(
545 "{}: known chunks list length is {}",
546 archive_name,
547 index.index_count()
548 );
cf9271e2
DM
549 }
550
b957aa81
DM
551 Ok(index)
552 }
553
554 pub async fn download_previous_dynamic_index(
555 &self,
556 archive_name: &str,
557 manifest: &BackupManifest,
ef6d4967 558 known_chunks: Arc<Mutex<HashSet<[u8; 32]>>>,
b957aa81 559 ) -> Result<DynamicIndexReader, Error> {
b957aa81
DM
560 let mut tmpfile = std::fs::OpenOptions::new()
561 .write(true)
562 .read(true)
563 .custom_flags(libc::O_TMPFILE)
564 .open("/tmp")?;
cf9271e2 565
b957aa81 566 let param = json!({ "archive-name": archive_name });
ef6d4967
TL
567 self.h2
568 .download("previous", Some(param), &mut tmpfile)
569 .await?;
b957aa81 570
ef6d4967
TL
571 let index = DynamicIndexReader::new(tmpfile).map_err(|err| {
572 format_err!("unable to read dynmamic index '{}' - {}", archive_name, err)
573 })?;
b957aa81
DM
574 // Note: do not use values stored in index (not trusted) - instead, computed them again
575 let (csum, size) = index.compute_csum();
576 manifest.verify_file(archive_name, &csum, size)?;
577
578 // add index chunks to known chunks
579 let mut known_chunks = known_chunks.lock().unwrap();
580 for i in 0..index.index_count() {
581 known_chunks.insert(*index.index_digest(i).unwrap());
cf9271e2
DM
582 }
583
e02c3d46 584 if self.verbose {
ef6d4967
TL
585 println!(
586 "{}: known chunks list length is {}",
587 archive_name,
588 index.index_count()
589 );
e02c3d46 590 }
ee5fe978 591
b957aa81
DM
592 Ok(index)
593 }
594
8b7f8d3f
FG
595 /// Retrieve backup time of last backup
596 pub async fn previous_backup_time(&self) -> Result<Option<i64>, Error> {
597 let data = self.h2.get("previous_backup_time", None).await?;
ef6d4967
TL
598 serde_json::from_value(data).map_err(|err| {
599 format_err!(
600 "Failed to parse backup time value returned by server - {}",
601 err
602 )
603 })
8b7f8d3f
FG
604 }
605
b957aa81
DM
606 /// Download backup manifest (index.json) of last backup
607 pub async fn download_previous_manifest(&self) -> Result<BackupManifest, Error> {
b957aa81
DM
608 let mut raw_data = Vec::with_capacity(64 * 1024);
609
610 let param = json!({ "archive-name": MANIFEST_BLOB_NAME });
ef6d4967
TL
611 self.h2
612 .download("previous", Some(param), &mut raw_data)
613 .await?;
b957aa81 614
39f18b30 615 let blob = DataBlob::load_from_reader(&mut &raw_data[..])?;
8819d1f2
FG
616 // no expected digest available
617 let data = blob.decode(self.crypt_config.as_ref().map(Arc::as_ref), None)?;
3dacedce 618
ef6d4967
TL
619 let manifest =
620 BackupManifest::from_data(&data[..], self.crypt_config.as_ref().map(Arc::as_ref))?;
b957aa81
DM
621
622 Ok(manifest)
cf9271e2
DM
623 }
624
8db14689 625 // We have no `self` here for `h2` and `verbose`, the only other arg "common" with 1 other
d1d74c43 626 // function in the same path is `wid`, so those 3 could be in a struct, but there's no real use
8db14689
WB
627 // since this is a private method.
628 #[allow(clippy::too_many_arguments)]
cf9271e2
DM
629 fn upload_chunk_info_stream(
630 h2: H2Client,
631 wid: u64,
632 stream: impl Stream<Item = Result<bytes::BytesMut, Error>>,
633 prefix: &str,
ef6d4967 634 known_chunks: Arc<Mutex<HashSet<[u8; 32]>>>,
cf9271e2 635 crypt_config: Option<Arc<CryptConfig>>,
3638341a 636 compress: bool,
e02c3d46 637 verbose: bool,
3b60b509 638 ) -> impl Future<Output = Result<UploadStats, Error>> {
6e1deb15
TL
639 let total_chunks = Arc::new(AtomicUsize::new(0));
640 let total_chunks2 = total_chunks.clone();
641 let known_chunk_count = Arc::new(AtomicUsize::new(0));
642 let known_chunk_count2 = known_chunk_count.clone();
cf9271e2
DM
643
644 let stream_len = Arc::new(AtomicUsize::new(0));
645 let stream_len2 = stream_len.clone();
924373d2
DC
646 let compressed_stream_len = Arc::new(AtomicU64::new(0));
647 let compressed_stream_len2 = compressed_stream_len.clone();
6e1deb15
TL
648 let reused_len = Arc::new(AtomicUsize::new(0));
649 let reused_len2 = reused_len.clone();
cf9271e2
DM
650
651 let append_chunk_path = format!("{}_index", prefix);
652 let upload_chunk_path = format!("{}_chunk", prefix);
653 let is_fixed_chunk_size = prefix == "fixed";
654
655 let (upload_queue, upload_result) =
8db14689 656 Self::append_chunk_queue(h2.clone(), wid, append_chunk_path, verbose);
cf9271e2
DM
657
658 let start_time = std::time::Instant::now();
659
660 let index_csum = Arc::new(Mutex::new(Some(openssl::sha::Sha256::new())));
661 let index_csum_2 = index_csum.clone();
662
663 stream
664 .and_then(move |data| {
cf9271e2
DM
665 let chunk_len = data.len();
666
6e1deb15 667 total_chunks.fetch_add(1, Ordering::SeqCst);
cf9271e2
DM
668 let offset = stream_len.fetch_add(chunk_len, Ordering::SeqCst) as u64;
669
ef6d4967 670 let mut chunk_builder = DataChunkBuilder::new(data.as_ref()).compress(compress);
cf9271e2
DM
671
672 if let Some(ref crypt_config) = crypt_config {
3638341a 673 chunk_builder = chunk_builder.crypt_config(crypt_config);
cf9271e2
DM
674 }
675
676 let mut known_chunks = known_chunks.lock().unwrap();
677 let digest = chunk_builder.digest();
678
679 let mut guard = index_csum.lock().unwrap();
680 let csum = guard.as_mut().unwrap();
681
682 let chunk_end = offset + chunk_len as u64;
683
ef6d4967
TL
684 if !is_fixed_chunk_size {
685 csum.update(&chunk_end.to_le_bytes());
686 }
cf9271e2
DM
687 csum.update(digest);
688
689 let chunk_is_known = known_chunks.contains(digest);
690 if chunk_is_known {
6e1deb15
TL
691 known_chunk_count.fetch_add(1, Ordering::SeqCst);
692 reused_len.fetch_add(chunk_len, Ordering::SeqCst);
cf9271e2
DM
693 future::ok(MergedChunkInfo::Known(vec![(offset, *digest)]))
694 } else {
924373d2 695 let compressed_stream_len2 = compressed_stream_len.clone();
cf9271e2 696 known_chunks.insert(*digest);
ef6d4967 697 future::ready(chunk_builder.build().map(move |(chunk, digest)| {
924373d2 698 compressed_stream_len2.fetch_add(chunk.raw_size(), Ordering::SeqCst);
ef6d4967 699 MergedChunkInfo::New(ChunkInfo {
cf9271e2
DM
700 chunk,
701 digest,
702 chunk_len: chunk_len as u64,
703 offset,
ef6d4967
TL
704 })
705 }))
cf9271e2
DM
706 }
707 })
708 .merge_known_chunks()
709 .try_for_each(move |merged_chunk_info| {
0bfcea6a 710 let upload_queue = upload_queue.clone();
cf9271e2
DM
711
712 if let MergedChunkInfo::New(chunk_info) = merged_chunk_info {
713 let offset = chunk_info.offset;
714 let digest = chunk_info.digest;
715 let digest_str = digest_to_hex(&digest);
716
8db14689
WB
717 /* too verbose, needs finer verbosity setting granularity
718 if verbose {
e02c3d46
DM
719 println!("upload new chunk {} ({} bytes, offset {})", digest_str,
720 chunk_info.chunk_len, offset);
721 }
8db14689 722 */
cf9271e2 723
db0cb9ce 724 let chunk_data = chunk_info.chunk.into_inner();
cf9271e2
DM
725 let param = json!({
726 "wid": wid,
727 "digest": digest_str,
728 "size": chunk_info.chunk_len,
729 "encoded-size": chunk_data.len(),
730 });
731
732 let ct = "application/octet-stream";
ef6d4967
TL
733 let request = H2Client::request_builder(
734 "localhost",
735 "POST",
736 &upload_chunk_path,
737 Some(param),
738 Some(ct),
739 )
740 .unwrap();
cf9271e2
DM
741 let upload_data = Some(bytes::Bytes::from(chunk_data));
742
743 let new_info = MergedChunkInfo::Known(vec![(offset, digest)]);
744
be3a0295 745 Either::Left(h2.send_request(request, upload_data).and_then(
ef6d4967 746 move |response| async move {
cf9271e2
DM
747 upload_queue
748 .send((new_info, Some(response)))
749 .await
ef6d4967
TL
750 .map_err(|err| {
751 format_err!("failed to send to upload queue: {}", err)
752 })
753 },
754 ))
cf9271e2 755 } else {
be3a0295 756 Either::Right(async move {
cf9271e2
DM
757 upload_queue
758 .send((merged_chunk_info, None))
759 .await
db0cb9ce 760 .map_err(|err| format_err!("failed to send to upload queue: {}", err))
cf9271e2
DM
761 })
762 }
763 })
ef6d4967 764 .then(move |result| async move { upload_result.await?.and(result) }.boxed())
cf9271e2 765 .and_then(move |_| {
6e1deb15 766 let duration = start_time.elapsed();
3b60b509
DC
767 let chunk_count = total_chunks2.load(Ordering::SeqCst);
768 let chunk_reused = known_chunk_count2.load(Ordering::SeqCst);
769 let size = stream_len2.load(Ordering::SeqCst);
770 let size_reused = reused_len2.load(Ordering::SeqCst);
924373d2 771 let size_compressed = compressed_stream_len2.load(Ordering::SeqCst) as usize;
cf9271e2
DM
772
773 let mut guard = index_csum_2.lock().unwrap();
774 let csum = guard.take().unwrap().finish();
775
3b60b509
DC
776 futures::future::ok(UploadStats {
777 chunk_count,
778 chunk_reused,
779 size,
780 size_reused,
924373d2 781 size_compressed,
ef6d4967
TL
782 duration,
783 csum,
3b60b509 784 })
cf9271e2
DM
785 })
786 }
787
1ffe0301 788 /// Upload speed test - prints result to stderr
dde18bbb 789 pub async fn upload_speedtest(&self, verbose: bool) -> Result<f64, Error> {
cf9271e2
DM
790 let mut data = vec![];
791 // generate pseudo random byte sequence
ef6d4967 792 for i in 0..1024 * 1024 {
cf9271e2 793 for j in 0..4 {
ef6d4967 794 let byte = ((i >> (j << 3)) & 0xff) as u8;
cf9271e2
DM
795 data.push(byte);
796 }
797 }
798
799 let item_len = data.len();
800
801 let mut repeat = 0;
802
323b2f3d 803 let (upload_queue, upload_result) = Self::response_queue(verbose);
cf9271e2
DM
804
805 let start_time = std::time::Instant::now();
806
807 loop {
808 repeat += 1;
809 if start_time.elapsed().as_secs() >= 5 {
810 break;
811 }
812
ef6d4967
TL
813 if verbose {
814 eprintln!("send test data ({} bytes)", data.len());
815 }
816 let request =
817 H2Client::request_builder("localhost", "POST", "speedtest", None, None).unwrap();
818 let request_future = self
819 .h2
820 .send_request(request, Some(bytes::Bytes::from(data.clone())))
821 .await?;
cf9271e2
DM
822
823 upload_queue.send(request_future).await?;
824 }
825
826 drop(upload_queue); // close queue
827
828 let _ = upload_result.await?;
829
ef6d4967
TL
830 eprintln!(
831 "Uploaded {} chunks in {} seconds.",
832 repeat,
833 start_time.elapsed().as_secs()
834 );
835 let speed = ((item_len * (repeat as usize)) as f64) / start_time.elapsed().as_secs_f64();
836 eprintln!(
837 "Time per request: {} microseconds.",
838 (start_time.elapsed().as_micros()) / (repeat as u128)
839 );
cf9271e2
DM
840
841 Ok(speed)
842 }
843}