| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285 |
- // Copyright 2017 The go-ethereum Authors
- // This file is part of the go-ethereum library.
- //
- // The go-ethereum library is free software: you can redistribute it and/or modify
- // it under the terms of the GNU Lesser General Public License as published by
- // the Free Software Foundation, either version 3 of the License, or
- // (at your option) any later version.
- //
- // The go-ethereum library is distributed in the hope that it will be useful,
- // but WITHOUT ANY WARRANTY; without even the implied warranty of
- // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
- // GNU Lesser General Public License for more details.
- //
- // You should have received a copy of the GNU Lesser General Public License
- // along with the go-ethereum library. If not, see <http://www.gnu.org/licenses/>.
- // +build linux darwin freebsd
- package fuse
- import (
- "context"
- "errors"
- "fmt"
- "os"
- "path/filepath"
- "strings"
- "sync"
- "time"
- "bazil.org/fuse"
- "bazil.org/fuse/fs"
- "github.com/ethereum/go-ethereum/common"
- "github.com/ethereum/go-ethereum/swarm/api"
- "github.com/ethereum/go-ethereum/swarm/log"
- )
- var (
- errEmptyMountPoint = errors.New("need non-empty mount point")
- errNoRelativeMountPoint = errors.New("invalid path for mount point (need absolute path)")
- errMaxMountCount = errors.New("max FUSE mount count reached")
- errMountTimeout = errors.New("mount timeout")
- errAlreadyMounted = errors.New("mount point is already serving")
- )
- func isFUSEUnsupportedError(err error) bool {
- if perr, ok := err.(*os.PathError); ok {
- return perr.Op == "open" && perr.Path == "/dev/fuse"
- }
- return err == fuse.ErrOSXFUSENotFound
- }
- // MountInfo contains information about every active mount
- type MountInfo struct {
- MountPoint string
- StartManifest string
- LatestManifest string
- rootDir *SwarmDir
- fuseConnection *fuse.Conn
- swarmApi *api.API
- lock *sync.RWMutex
- serveClose chan struct{}
- }
- func NewMountInfo(mhash, mpoint string, sapi *api.API) *MountInfo {
- log.Debug("swarmfs NewMountInfo", "hash", mhash, "mount point", mpoint)
- newMountInfo := &MountInfo{
- MountPoint: mpoint,
- StartManifest: mhash,
- LatestManifest: mhash,
- rootDir: nil,
- fuseConnection: nil,
- swarmApi: sapi,
- lock: &sync.RWMutex{},
- serveClose: make(chan struct{}),
- }
- return newMountInfo
- }
- func (swarmfs *SwarmFS) Mount(mhash, mountpoint string) (*MountInfo, error) {
- log.Info("swarmfs", "mounting hash", mhash, "mount point", mountpoint)
- if mountpoint == "" {
- return nil, errEmptyMountPoint
- }
- if !strings.HasPrefix(mountpoint, "/") {
- return nil, errNoRelativeMountPoint
- }
- cleanedMountPoint, err := filepath.Abs(filepath.Clean(mountpoint))
- if err != nil {
- return nil, err
- }
- log.Trace("swarmfs mount", "cleanedMountPoint", cleanedMountPoint)
- swarmfs.swarmFsLock.Lock()
- defer swarmfs.swarmFsLock.Unlock()
- noOfActiveMounts := len(swarmfs.activeMounts)
- log.Debug("swarmfs mount", "# active mounts", noOfActiveMounts)
- if noOfActiveMounts >= maxFUSEMounts {
- return nil, errMaxMountCount
- }
- if _, ok := swarmfs.activeMounts[cleanedMountPoint]; ok {
- return nil, errAlreadyMounted
- }
- log.Trace("swarmfs mount: getting manifest tree")
- _, manifestEntryMap, err := swarmfs.swarmApi.BuildDirectoryTree(context.TODO(), mhash, true)
- if err != nil {
- return nil, err
- }
- log.Trace("swarmfs mount: building mount info")
- mi := NewMountInfo(mhash, cleanedMountPoint, swarmfs.swarmApi)
- dirTree := map[string]*SwarmDir{}
- rootDir := NewSwarmDir("/", mi)
- log.Trace("swarmfs mount", "rootDir", rootDir)
- mi.rootDir = rootDir
- log.Trace("swarmfs mount: traversing manifest map")
- for suffix, entry := range manifestEntryMap {
- if suffix == "" { //empty suffix means that the file has no name - i.e. this is the default entry in a manifest. Since we cannot have files without a name, let us ignore this entry
- log.Warn("Manifest has an empty-path (default) entry which will be ignored in FUSE mount.")
- continue
- }
- addr := common.Hex2Bytes(entry.Hash)
- fullpath := "/" + suffix
- basepath := filepath.Dir(fullpath)
- parentDir := rootDir
- dirUntilNow := ""
- paths := strings.Split(basepath, "/")
- for i := range paths {
- if paths[i] != "" {
- thisDir := paths[i]
- dirUntilNow = dirUntilNow + "/" + thisDir
- if _, ok := dirTree[dirUntilNow]; !ok {
- dirTree[dirUntilNow] = NewSwarmDir(dirUntilNow, mi)
- parentDir.directories = append(parentDir.directories, dirTree[dirUntilNow])
- parentDir = dirTree[dirUntilNow]
- } else {
- parentDir = dirTree[dirUntilNow]
- }
- }
- }
- thisFile := NewSwarmFile(basepath, filepath.Base(fullpath), mi)
- thisFile.addr = addr
- parentDir.files = append(parentDir.files, thisFile)
- }
- fconn, err := fuse.Mount(cleanedMountPoint, fuse.FSName("swarmfs"), fuse.VolumeName(mhash))
- if isFUSEUnsupportedError(err) {
- log.Error("swarmfs error - FUSE not installed", "mountpoint", cleanedMountPoint, "err", err)
- return nil, err
- } else if err != nil {
- fuse.Unmount(cleanedMountPoint)
- log.Error("swarmfs error mounting swarm manifest", "mountpoint", cleanedMountPoint, "err", err)
- return nil, err
- }
- mi.fuseConnection = fconn
- serverr := make(chan error, 1)
- go func() {
- log.Info("swarmfs", "serving hash", mhash, "at", cleanedMountPoint)
- filesys := &SwarmRoot{root: rootDir}
- //start serving the actual file system; see note below
- if err := fs.Serve(fconn, filesys); err != nil {
- log.Warn("swarmfs could not serve the requested hash", "error", err)
- serverr <- err
- }
- mi.serveClose <- struct{}{}
- }()
- /*
- IMPORTANT NOTE: the fs.Serve function is blocking;
- Serve builds up the actual fuse file system by calling the
- Attr functions on each SwarmFile, creating the file inodes;
- specifically calling the swarm's LazySectionReader.Size() to set the file size.
- This can take some time, and it appears that if we access the fuse file system
- too early, we can bring the tests to deadlock. The assumption so far is that
- at this point, the fuse driver didn't finish to initialize the file system.
- Accessing files too early not only deadlocks the tests, but locks the access
- of the fuse file completely, resulting in blocked resources at OS system level.
- Even a simple `ls /tmp/testDir/testMountDir` could deadlock in a shell.
- Workaround so far is to wait some time to give the OS enough time to initialize
- the fuse file system. During tests, this seemed to address the issue.
- HOWEVER IT SHOULD BE NOTED THAT THIS MAY ONLY BE AN EFFECT,
- AND THE DEADLOCK CAUSED BY SOMETHING ELSE BLOCKING ACCESS DUE TO SOME RACE CONDITION
- (caused in the bazil.org library and/or the SwarmRoot, SwarmDir and SwarmFile implementations)
- */
- time.Sleep(2 * time.Second)
- timer := time.NewTimer(mountTimeout)
- defer timer.Stop()
- // Check if the mount process has an error to report.
- select {
- case <-timer.C:
- log.Warn("swarmfs timed out mounting over FUSE", "mountpoint", cleanedMountPoint, "err", err)
- err := fuse.Unmount(cleanedMountPoint)
- if err != nil {
- return nil, err
- }
- return nil, errMountTimeout
- case err := <-serverr:
- log.Warn("swarmfs error serving over FUSE", "mountpoint", cleanedMountPoint, "err", err)
- err = fuse.Unmount(cleanedMountPoint)
- return nil, err
- case <-fconn.Ready:
- //this signals that the actual mount point from the fuse.Mount call is ready;
- //it does not signal though that the file system from fs.Serve is actually fully built up
- if err := fconn.MountError; err != nil {
- log.Error("Mounting error from fuse driver: ", "err", err)
- return nil, err
- }
- log.Info("swarmfs now served over FUSE", "manifest", mhash, "mountpoint", cleanedMountPoint)
- }
- timer.Stop()
- swarmfs.activeMounts[cleanedMountPoint] = mi
- return mi, nil
- }
- func (swarmfs *SwarmFS) Unmount(mountpoint string) (*MountInfo, error) {
- swarmfs.swarmFsLock.Lock()
- defer swarmfs.swarmFsLock.Unlock()
- cleanedMountPoint, err := filepath.Abs(filepath.Clean(mountpoint))
- if err != nil {
- return nil, err
- }
- mountInfo := swarmfs.activeMounts[cleanedMountPoint]
- if mountInfo == nil || mountInfo.MountPoint != cleanedMountPoint {
- return nil, fmt.Errorf("swarmfs %s is not mounted", cleanedMountPoint)
- }
- err = fuse.Unmount(cleanedMountPoint)
- if err != nil {
- err1 := externalUnmount(cleanedMountPoint)
- if err1 != nil {
- errStr := fmt.Sprintf("swarmfs unmount error: %v", err)
- log.Warn(errStr)
- return nil, err1
- }
- }
- err = mountInfo.fuseConnection.Close()
- if err != nil {
- return nil, err
- }
- delete(swarmfs.activeMounts, cleanedMountPoint)
- <-mountInfo.serveClose
- succString := fmt.Sprintf("swarmfs unmounting %v succeeded", cleanedMountPoint)
- log.Info(succString)
- return mountInfo, nil
- }
- func (swarmfs *SwarmFS) Listmounts() []*MountInfo {
- swarmfs.swarmFsLock.RLock()
- defer swarmfs.swarmFsLock.RUnlock()
- rows := make([]*MountInfo, 0, len(swarmfs.activeMounts))
- for _, mi := range swarmfs.activeMounts {
- rows = append(rows, mi)
- }
- return rows
- }
- func (swarmfs *SwarmFS) Stop() bool {
- for mp := range swarmfs.activeMounts {
- mountInfo := swarmfs.activeMounts[mp]
- swarmfs.Unmount(mountInfo.MountPoint)
- }
- return true
- }
|