mirror of
https://github.com/ton-blockchain/ton
synced 2025-02-13 11:42:18 +00:00
* Fix error handling in Torrent.cpp, improve choosing peers for upload * Various improvements in storage daemon "get-pieces-info" Store "added at" Improve calculating up/down speed Improve TL protocol for future compatibility Remove empty directories on "--remove-files" Better windows support Debug logs in PeerActor More restrictions on TorrentInfo Bugfixes * Global speed limits for download and upload +bugfix * Reset download/upload speed on changing settings or completion * Exclude some system files in TorrentCreator
1021 lines
48 KiB
C++
1021 lines
48 KiB
C++
/*
|
|
This file is part of TON Blockchain Library.
|
|
|
|
TON Blockchain Library is free software: you can redistribute it and/or modify
|
|
it under the terms of the GNU Lesser General Public License as published by
|
|
the Free Software Foundation, either version 2 of the License, or
|
|
(at your option) any later version.
|
|
|
|
TON Blockchain Library is distributed in the hope that it will be useful,
|
|
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
GNU Lesser General Public License for more details.
|
|
|
|
You should have received a copy of the GNU Lesser General Public License
|
|
along with TON Blockchain Library. If not, see <http://www.gnu.org/licenses/>.
|
|
*/
|
|
#include "td/utils/filesystem.h"
|
|
#include "td/actor/actor.h"
|
|
#include "td/actor/MultiPromise.h"
|
|
#include "td/utils/OptionParser.h"
|
|
#include "td/utils/port/path.h"
|
|
#include "td/utils/port/signals.h"
|
|
#include "td/utils/port/user.h"
|
|
#include "td/utils/port/IPAddress.h"
|
|
#include "td/utils/Random.h"
|
|
#include "td/utils/FileLog.h"
|
|
#include "checksum.h"
|
|
#include "git.h"
|
|
#include "auto/tl/ton_api_json.h"
|
|
#include "common/delay.h"
|
|
|
|
#include "adnl/adnl.h"
|
|
#include "rldp2/rldp.h"
|
|
#include "dht/dht.h"
|
|
#include "overlay/overlays.h"
|
|
|
|
#include "Torrent.h"
|
|
#include "TorrentCreator.h"
|
|
#include "StorageManager.h"
|
|
#include "StorageProvider.h"
|
|
|
|
#if TD_DARWIN || TD_LINUX
|
|
#include <unistd.h>
|
|
#endif
|
|
#include <iostream>
|
|
|
|
namespace ton {
|
|
|
|
td::BufferSlice create_query_error(td::CSlice message) {
|
|
return create_serialize_tl_object<ton_api::storage_daemon_queryError>(message.str());
|
|
}
|
|
|
|
td::BufferSlice create_query_error(td::Status error) {
|
|
return create_query_error(error.message());
|
|
}
|
|
|
|
class StorageDaemon : public td::actor::Actor {
|
|
public:
|
|
StorageDaemon(td::IPAddress ip_addr, bool client_mode, std::string global_config, std::string db_root,
|
|
td::uint16 control_port, bool enable_storage_provider)
|
|
: ip_addr_(ip_addr)
|
|
, client_mode_(client_mode)
|
|
, global_config_(std::move(global_config))
|
|
, db_root_(std::move(db_root))
|
|
, control_port_(control_port)
|
|
, enable_storage_provider_(enable_storage_provider) {
|
|
}
|
|
|
|
void start_up() override {
|
|
CHECK(db_root_ != "");
|
|
td::mkdir(db_root_).ensure();
|
|
db_root_ = td::realpath(db_root_).move_as_ok();
|
|
keyring_ = keyring::Keyring::create(db_root_ + "/keyring");
|
|
{
|
|
auto S = load_global_config();
|
|
if (S.is_error()) {
|
|
LOG(FATAL) << "Failed to load global config: " << S;
|
|
}
|
|
}
|
|
{
|
|
auto S = load_daemon_config();
|
|
if (S.is_error()) {
|
|
LOG(FATAL) << "Failed to load daemon config: " << S;
|
|
}
|
|
}
|
|
|
|
init_adnl();
|
|
|
|
class Callback : public StorageManager::Callback {
|
|
public:
|
|
explicit Callback(td::actor::ActorId<StorageDaemon> actor) : actor_(std::move(actor)) {
|
|
}
|
|
void on_ready() override {
|
|
td::actor::send_closure(actor_, &StorageDaemon::inited_storage_manager);
|
|
}
|
|
|
|
private:
|
|
td::actor::ActorId<StorageDaemon> actor_;
|
|
};
|
|
manager_ = td::actor::create_actor<StorageManager>("storage", local_id_, db_root_ + "/torrent",
|
|
td::make_unique<Callback>(actor_id(this)), client_mode_,
|
|
adnl_.get(), rldp_.get(), overlays_.get());
|
|
}
|
|
|
|
td::Status load_global_config() {
|
|
TRY_RESULT_PREFIX(conf_data, td::read_file(global_config_), "failed to read: ");
|
|
TRY_RESULT_PREFIX(conf_json, td::json_decode(conf_data.as_slice()), "failed to parse json: ");
|
|
ton_api::config_global conf;
|
|
TRY_STATUS_PREFIX(ton_api::from_json(conf, conf_json.get_object()), "json does not fit TL scheme: ");
|
|
if (!conf.dht_) {
|
|
return td::Status::Error(ErrorCode::error, "does not contain [dht] section");
|
|
}
|
|
TRY_RESULT_PREFIX(dht, dht::Dht::create_global_config(std::move(conf.dht_)), "bad [dht] section: ");
|
|
dht_config_ = std::move(dht);
|
|
return td::Status::OK();
|
|
}
|
|
|
|
td::Status load_daemon_config() {
|
|
daemon_config_ = create_tl_object<ton_api::storage_daemon_config>();
|
|
auto r_conf_data = td::read_file(daemon_config_file());
|
|
if (r_conf_data.is_ok()) {
|
|
auto conf_data = r_conf_data.move_as_ok();
|
|
TRY_RESULT_PREFIX(conf_json, td::json_decode(conf_data.as_slice()), "failed to parse json: ");
|
|
TRY_STATUS_PREFIX(ton_api::from_json(*daemon_config_, conf_json.get_object()), "json does not fit TL scheme: ");
|
|
return td::Status::OK();
|
|
}
|
|
std::string keys_dir = db_root_ + "/cli-keys/";
|
|
LOG(INFO) << "First launch, storing keys for storage-daemon-cli to " << keys_dir;
|
|
td::mkdir(keys_dir).ensure();
|
|
auto generate_public_key = [&]() -> PublicKey {
|
|
auto pk = PrivateKey{privkeys::Ed25519::random()};
|
|
auto pub = pk.compute_public_key();
|
|
td::actor::send_closure(keyring_, &keyring::Keyring::add_key, std::move(pk), false, [](td::Unit) {});
|
|
return pub;
|
|
};
|
|
{
|
|
// Server key
|
|
daemon_config_->server_key_ = generate_public_key().tl();
|
|
TRY_STATUS(td::write_file(keys_dir + "server.pub", serialize_tl_object(daemon_config_->server_key_, true)));
|
|
}
|
|
{
|
|
// Client key
|
|
auto pk = PrivateKey{privkeys::Ed25519::random()};
|
|
daemon_config_->cli_key_hash_ = pk.compute_short_id().bits256_value();
|
|
TRY_STATUS(td::write_file(keys_dir + "client", serialize_tl_object(pk.tl(), true)));
|
|
}
|
|
daemon_config_->adnl_id_ = generate_public_key().tl();
|
|
daemon_config_->dht_id_ = generate_public_key().tl();
|
|
return save_daemon_config();
|
|
}
|
|
|
|
td::Status save_daemon_config() {
|
|
auto s = td::json_encode<std::string>(td::ToJson(*daemon_config_), true);
|
|
TRY_STATUS_PREFIX(td::write_file(daemon_config_file(), s), "Failed to write daemon config: ");
|
|
return td::Status::OK();
|
|
}
|
|
|
|
void init_adnl() {
|
|
CHECK(ip_addr_.is_valid());
|
|
|
|
adnl_network_manager_ = adnl::AdnlNetworkManager::create(static_cast<td::uint16>(ip_addr_.get_port()));
|
|
adnl_ = adnl::Adnl::create(db_root_, keyring_.get());
|
|
td::actor::send_closure(adnl_, &adnl::Adnl::register_network_manager, adnl_network_manager_.get());
|
|
adnl::AdnlCategoryMask cat_mask;
|
|
cat_mask[0] = true;
|
|
td::actor::send_closure(adnl_network_manager_, &adnl::AdnlNetworkManager::add_self_addr, ip_addr_,
|
|
std::move(cat_mask), 0);
|
|
|
|
adnl::AdnlAddressList addr_list;
|
|
if (!client_mode_) {
|
|
addr_list.add_udp_address(ip_addr_).ensure();
|
|
}
|
|
addr_list.set_version(static_cast<td::int32>(td::Clocks::system()));
|
|
addr_list.set_reinit_date(adnl::Adnl::adnl_start_time());
|
|
|
|
adnl::AdnlNodeIdFull local_id_full = adnl::AdnlNodeIdFull::create(daemon_config_->adnl_id_).move_as_ok();
|
|
local_id_ = local_id_full.compute_short_id();
|
|
td::actor::send_closure(adnl_, &adnl::Adnl::add_id, local_id_full, addr_list, static_cast<td::uint8>(0));
|
|
adnl::AdnlNodeIdFull dht_id_full = adnl::AdnlNodeIdFull::create(daemon_config_->dht_id_).move_as_ok();
|
|
dht_id_ = dht_id_full.compute_short_id();
|
|
td::actor::send_closure(adnl_, &adnl::Adnl::add_id, dht_id_full, addr_list, static_cast<td::uint8>(0));
|
|
|
|
LOG(INFO) << "Storage daemon ADNL id is " << local_id_;
|
|
LOG(INFO) << "DHT id is " << dht_id_;
|
|
|
|
if (client_mode_) {
|
|
auto D = dht::Dht::create_client(dht_id_, db_root_, dht_config_, keyring_.get(), adnl_.get());
|
|
D.ensure();
|
|
dht_ = D.move_as_ok();
|
|
} else {
|
|
auto D = dht::Dht::create(dht_id_, db_root_, dht_config_, keyring_.get(), adnl_.get());
|
|
D.ensure();
|
|
dht_ = D.move_as_ok();
|
|
}
|
|
td::actor::send_closure(adnl_, &adnl::Adnl::register_dht_node, dht_.get());
|
|
|
|
rldp_ = ton_rldp::Rldp::create(adnl_.get());
|
|
td::actor::send_closure(rldp_, &ton_rldp::Rldp::add_id, local_id_);
|
|
overlays_ = overlay::Overlays::create(db_root_, keyring_.get(), adnl_.get(), dht_.get());
|
|
}
|
|
|
|
void inited_storage_manager() {
|
|
if (enable_storage_provider_) {
|
|
if (!daemon_config_->provider_address_.empty()) {
|
|
auto provider_account = ContractAddress::parse(daemon_config_->provider_address_).move_as_ok();
|
|
init_tonlib_client();
|
|
provider_ = td::actor::create_actor<StorageProvider>("provider", provider_account, db_root_ + "/provider",
|
|
tonlib_client_.get(), manager_.get(), keyring_.get());
|
|
} else {
|
|
LOG(WARNING) << "Storage provider account is not set, it can be set in storage-daemon-cli";
|
|
}
|
|
}
|
|
init_control_interface();
|
|
}
|
|
|
|
void init_control_interface() {
|
|
if (control_port_ == 0) {
|
|
return;
|
|
}
|
|
|
|
auto adnl_id_full = adnl::AdnlNodeIdFull::create(daemon_config_->server_key_).move_as_ok();
|
|
auto adnl_id = adnl_id_full.compute_short_id();
|
|
td::actor::send_closure(adnl_, &adnl::Adnl::add_id, adnl_id_full, adnl::AdnlAddressList(),
|
|
static_cast<td::uint8>(255));
|
|
|
|
class Callback : public adnl::Adnl::Callback {
|
|
public:
|
|
explicit Callback(td::actor::ActorId<StorageDaemon> id) : self_id_(id) {
|
|
}
|
|
void receive_message(adnl::AdnlNodeIdShort src, ton::adnl::AdnlNodeIdShort dst, td::BufferSlice data) override {
|
|
}
|
|
void receive_query(adnl::AdnlNodeIdShort src, adnl::AdnlNodeIdShort dst, td::BufferSlice data,
|
|
td::Promise<td::BufferSlice> promise) override {
|
|
td::actor::send_closure(self_id_, &StorageDaemon::process_control_query, src, std::move(data),
|
|
std::move(promise));
|
|
}
|
|
|
|
private:
|
|
td::actor::ActorId<StorageDaemon> self_id_;
|
|
};
|
|
td::actor::send_closure(adnl_, &adnl::Adnl::subscribe, adnl_id, "", std::make_unique<Callback>(actor_id(this)));
|
|
td::actor::send_closure(adnl_, &adnl::Adnl::create_ext_server, std::vector<adnl::AdnlNodeIdShort>{adnl_id},
|
|
std::vector<td::uint16>{control_port_},
|
|
[SelfId = actor_id(this)](td::Result<td::actor::ActorOwn<adnl::AdnlExtServer>> R) {
|
|
if (R.is_error()) {
|
|
LOG(ERROR) << "Failed to init control interface: " << R.move_as_error();
|
|
return;
|
|
}
|
|
td::actor::send_closure(SelfId, &StorageDaemon::created_ext_server, R.move_as_ok());
|
|
});
|
|
}
|
|
|
|
void created_ext_server(td::actor::ActorOwn<adnl::AdnlExtServer> ext_server) {
|
|
ext_server_ = std::move(ext_server);
|
|
LOG(INFO) << "Started control interface on port " << control_port_;
|
|
}
|
|
|
|
void process_control_query(adnl::AdnlNodeIdShort src, td::BufferSlice data, td::Promise<td::BufferSlice> promise) {
|
|
promise = [promise = std::move(promise)](td::Result<td::BufferSlice> R) mutable {
|
|
if (R.is_error()) {
|
|
promise.set_value(create_query_error(R.move_as_error()));
|
|
} else {
|
|
promise.set_value(R.move_as_ok());
|
|
}
|
|
};
|
|
if (src.bits256_value() != daemon_config_->cli_key_hash_) {
|
|
promise.set_error(td::Status::Error("Not authorized"));
|
|
return;
|
|
}
|
|
auto F = fetch_tl_object<ton_api::Function>(data, true);
|
|
if (F.is_error()) {
|
|
promise.set_error(F.move_as_error_prefix("failed to parse control query: "));
|
|
return;
|
|
}
|
|
auto f = F.move_as_ok();
|
|
LOG(DEBUG) << "Running control query " << f->get_id();
|
|
ton_api::downcast_call(*f, [&](auto &obj) { run_control_query(obj, std::move(promise)); });
|
|
}
|
|
|
|
void run_control_query(ton_api::storage_daemon_setVerbosity &query, td::Promise<td::BufferSlice> promise) {
|
|
if (query.verbosity_ < 0 || query.verbosity_ > 10) {
|
|
promise.set_value(create_query_error("verbosity should be in range [0..10]"));
|
|
return;
|
|
}
|
|
SET_VERBOSITY_LEVEL(VERBOSITY_NAME(FATAL) + query.verbosity_);
|
|
promise.set_result(create_serialize_tl_object<ton_api::storage_daemon_success>());
|
|
}
|
|
|
|
void run_control_query(ton_api::storage_daemon_createTorrent &query, td::Promise<td::BufferSlice> promise) {
|
|
// Run in a separate thread
|
|
delay_action(
|
|
[promise = std::move(promise), manager = manager_.get(), db_root = db_root_,
|
|
query = std::move(query)]() mutable {
|
|
Torrent::Creator::Options options;
|
|
options.piece_size = 128 * 1024;
|
|
options.description = std::move(query.description_);
|
|
TRY_RESULT_PROMISE(promise, torrent, Torrent::Creator::create_from_path(std::move(options), query.path_));
|
|
td::Bits256 hash = torrent.get_hash();
|
|
td::actor::send_closure(manager, &StorageManager::add_torrent, std::move(torrent), false, query.allow_upload_,
|
|
query.copy_inside_,
|
|
[manager, hash, promise = std::move(promise)](td::Result<td::Unit> R) mutable {
|
|
if (R.is_error()) {
|
|
promise.set_error(R.move_as_error());
|
|
return;
|
|
}
|
|
get_torrent_info_full_serialized(manager, hash, std::move(promise));
|
|
});
|
|
},
|
|
td::Timestamp::now());
|
|
}
|
|
|
|
void run_control_query(ton_api::storage_daemon_addByHash &query, td::Promise<td::BufferSlice> promise) {
|
|
td::Bits256 hash = query.hash_;
|
|
bool start_download_now = query.start_download_ && query.priorities_.empty();
|
|
td::actor::send_closure(
|
|
manager_, &StorageManager::add_torrent_by_hash, hash, std::move(query.root_dir_), start_download_now,
|
|
query.allow_upload_,
|
|
query_add_torrent_cont(hash, query.start_download_, std::move(query.priorities_), std::move(promise)));
|
|
}
|
|
|
|
void run_control_query(ton_api::storage_daemon_addByMeta &query, td::Promise<td::BufferSlice> promise) {
|
|
TRY_RESULT_PROMISE(promise, meta, TorrentMeta::deserialize(query.meta_));
|
|
td::Bits256 hash(meta.info.get_hash());
|
|
bool start_download_now = query.start_download_ && query.priorities_.empty();
|
|
td::actor::send_closure(
|
|
manager_, &StorageManager::add_torrent_by_meta, std::move(meta), std::move(query.root_dir_), start_download_now,
|
|
query.allow_upload_,
|
|
query_add_torrent_cont(hash, query.start_download_, std::move(query.priorities_), std::move(promise)));
|
|
}
|
|
|
|
td::Promise<td::Unit> query_add_torrent_cont(td::Bits256 hash, bool start_download,
|
|
std::vector<tl_object_ptr<ton_api::storage_PriorityAction>> priorities,
|
|
td::Promise<td::BufferSlice> promise) {
|
|
return [manager = manager_.get(), hash, start_download = start_download, priorities = std::move(priorities),
|
|
promise = std::move(promise)](td::Result<td::Unit> R) mutable {
|
|
if (R.is_error()) {
|
|
promise.set_error(R.move_as_error());
|
|
return;
|
|
}
|
|
if (!priorities.empty()) {
|
|
for (auto &p : priorities) {
|
|
ton_api::downcast_call(
|
|
*p, td::overloaded(
|
|
[&](ton_api::storage_priorityAction_all &obj) {
|
|
td::actor::send_closure(manager, &StorageManager::set_all_files_priority, hash,
|
|
(td::uint8)obj.priority_, [](td::Result<bool>) {});
|
|
},
|
|
[&](ton_api::storage_priorityAction_idx &obj) {
|
|
td::actor::send_closure(manager, &StorageManager::set_file_priority_by_idx, hash, obj.idx_,
|
|
(td::uint8)obj.priority_, [](td::Result<bool>) {});
|
|
},
|
|
[&](ton_api::storage_priorityAction_name &obj) {
|
|
td::actor::send_closure(manager, &StorageManager::set_file_priority_by_name, hash,
|
|
std::move(obj.name_), (td::uint8)obj.priority_,
|
|
[](td::Result<bool>) {});
|
|
}));
|
|
}
|
|
if (start_download) {
|
|
td::actor::send_closure(manager, &StorageManager::set_active_download, hash, true,
|
|
[](td::Result<td::Unit>) {});
|
|
}
|
|
}
|
|
get_torrent_info_full_serialized(manager, hash, std::move(promise));
|
|
};
|
|
}
|
|
|
|
void run_control_query(ton_api::storage_daemon_setActiveDownload &query, td::Promise<td::BufferSlice> promise) {
|
|
td::actor::send_closure(
|
|
manager_, &StorageManager::set_active_download, query.hash_, query.active_,
|
|
promise.wrap([](td::Unit &&) { return create_serialize_tl_object<ton_api::storage_daemon_success>(); }));
|
|
}
|
|
|
|
void run_control_query(ton_api::storage_daemon_setActiveUpload &query, td::Promise<td::BufferSlice> promise) {
|
|
td::actor::send_closure(
|
|
manager_, &StorageManager::set_active_upload, query.hash_, query.active_,
|
|
promise.wrap([](td::Unit &&) { return create_serialize_tl_object<ton_api::storage_daemon_success>(); }));
|
|
}
|
|
|
|
void run_control_query(ton_api::storage_daemon_getTorrents &query, td::Promise<td::BufferSlice> promise) {
|
|
td::actor::send_closure(
|
|
manager_, &StorageManager::get_all_torrents,
|
|
[manager = manager_.get(), promise = std::move(promise)](td::Result<std::vector<td::Bits256>> R) mutable {
|
|
if (R.is_error()) {
|
|
promise.set_error(R.move_as_error());
|
|
return;
|
|
}
|
|
std::vector<td::Bits256> torrents = R.move_as_ok();
|
|
auto result = std::make_shared<std::vector<tl_object_ptr<ton_api::storage_daemon_torrent>>>(torrents.size());
|
|
td::MultiPromise mp;
|
|
auto ig = mp.init_guard();
|
|
for (size_t i = 0; i < torrents.size(); ++i) {
|
|
get_torrent_info_short(manager, torrents[i],
|
|
[i, result, promise = ig.get_promise()](
|
|
td::Result<tl_object_ptr<ton_api::storage_daemon_torrent>> R) mutable {
|
|
if (R.is_ok()) {
|
|
result->at(i) = R.move_as_ok();
|
|
}
|
|
promise.set_result(td::Unit());
|
|
});
|
|
}
|
|
ig.add_promise([promise = std::move(promise), result](td::Result<td::Unit> R) mutable {
|
|
if (R.is_error()) {
|
|
promise.set_error(R.move_as_error());
|
|
return;
|
|
}
|
|
auto v = std::move(*result);
|
|
v.erase(std::remove(v.begin(), v.end(), nullptr), v.end());
|
|
promise.set_result(create_serialize_tl_object<ton_api::storage_daemon_torrentList>(std::move(v)));
|
|
});
|
|
});
|
|
}
|
|
|
|
void run_control_query(ton_api::storage_daemon_getTorrentFull &query, td::Promise<td::BufferSlice> promise) {
|
|
get_torrent_info_full_serialized(manager_.get(), query.hash_, std::move(promise));
|
|
}
|
|
|
|
void run_control_query(ton_api::storage_daemon_getTorrentMeta &query, td::Promise<td::BufferSlice> promise) {
|
|
td::actor::send_closure(
|
|
manager_, &StorageManager::with_torrent, query.hash_,
|
|
promise.wrap([](NodeActor::NodeState state) -> td::Result<td::BufferSlice> {
|
|
Torrent &torrent = state.torrent;
|
|
if (!torrent.inited_info()) {
|
|
return td::Status::Error("Torrent meta is not available");
|
|
}
|
|
std::string meta_str = torrent.get_meta(Torrent::GetMetaOptions().with_proof_depth_limit(10)).serialize();
|
|
return create_serialize_tl_object<ton_api::storage_daemon_torrentMeta>(td::BufferSlice(meta_str));
|
|
}));
|
|
}
|
|
|
|
void run_control_query(ton_api::storage_daemon_getTorrentPeers &query, td::Promise<td::BufferSlice> promise) {
|
|
td::actor::send_closure(manager_, &StorageManager::get_peers_info, query.hash_,
|
|
promise.wrap([](tl_object_ptr<ton_api::storage_daemon_peerList> obj) -> td::BufferSlice {
|
|
return serialize_tl_object(obj, true);
|
|
}));
|
|
}
|
|
|
|
void run_control_query(ton_api::storage_daemon_getTorrentPiecesInfo &query, td::Promise<td::BufferSlice> promise) {
|
|
td::Bits256 hash = query.hash_;
|
|
td::actor::send_closure(
|
|
manager_, &StorageManager::with_torrent, hash,
|
|
promise.wrap([query = std::move(query)](NodeActor::NodeState state) -> td::Result<td::BufferSlice> {
|
|
Torrent &torrent = state.torrent;
|
|
if (!torrent.inited_info()) {
|
|
return td::Status::Error("Torrent info is not available");
|
|
}
|
|
td::uint64 total_pieces = torrent.get_info().pieces_count();
|
|
td::uint64 range_l = std::min<td::uint64>(total_pieces, query.offset_);
|
|
td::uint64 size = query.max_pieces_ != -1 ? std::min<td::uint64>(total_pieces - range_l, query.max_pieces_)
|
|
: total_pieces - range_l;
|
|
td::BufferSlice piece_ready((size + 7) / 8);
|
|
std::fill(piece_ready.data(), piece_ready.data() + piece_ready.size(), 0);
|
|
for (td::uint64 i = range_l; i < range_l + size; ++i) {
|
|
if (torrent.is_piece_ready(i)) {
|
|
piece_ready.data()[(i - range_l) / 8] |= (1 << ((i - range_l) % 8));
|
|
}
|
|
}
|
|
|
|
auto result = create_tl_object<ton_api::storage_daemon_torrentPiecesInfo>();
|
|
result->total_pieces_ = total_pieces;
|
|
result->piece_size_ = torrent.get_info().piece_size;
|
|
result->range_l_ = range_l;
|
|
result->range_r_ = range_l + size;
|
|
result->piece_ready_bitset_ = std::move(piece_ready);
|
|
|
|
if ((query.flags_ & 1) && torrent.inited_header()) {
|
|
result->flags_ = 1;
|
|
auto range = torrent.get_header_parts_range();
|
|
result->files_.push_back(
|
|
create_tl_object<ton_api::storage_daemon_filePiecesInfo>("", range.begin, range.end));
|
|
for (size_t i = 0; i < torrent.get_files_count().value(); ++i) {
|
|
auto range = torrent.get_file_parts_range(i);
|
|
result->files_.push_back(create_tl_object<ton_api::storage_daemon_filePiecesInfo>(
|
|
torrent.get_file_name(i).str(), range.begin, range.end));
|
|
}
|
|
} else {
|
|
result->flags_ = 0;
|
|
}
|
|
|
|
return serialize_tl_object(result, true);
|
|
}));
|
|
}
|
|
|
|
void run_control_query(ton_api::storage_daemon_setFilePriorityAll &query, td::Promise<td::BufferSlice> promise) {
|
|
TRY_RESULT_PROMISE(promise, priority, td::narrow_cast_safe<td::uint8>(query.priority_));
|
|
td::actor::send_closure(manager_, &StorageManager::set_all_files_priority, query.hash_, priority,
|
|
promise.wrap([](bool done) -> td::Result<td::BufferSlice> {
|
|
if (done) {
|
|
return create_serialize_tl_object<ton_api::storage_daemon_prioritySet>();
|
|
} else {
|
|
return create_serialize_tl_object<ton_api::storage_daemon_priorityPending>();
|
|
}
|
|
}));
|
|
}
|
|
|
|
void run_control_query(ton_api::storage_daemon_setFilePriorityByIdx &query, td::Promise<td::BufferSlice> promise) {
|
|
TRY_RESULT_PROMISE(promise, priority, td::narrow_cast_safe<td::uint8>(query.priority_));
|
|
td::actor::send_closure(manager_, &StorageManager::set_file_priority_by_idx, query.hash_, query.idx_, priority,
|
|
promise.wrap([](bool done) -> td::Result<td::BufferSlice> {
|
|
if (done) {
|
|
return create_serialize_tl_object<ton_api::storage_daemon_prioritySet>();
|
|
} else {
|
|
return create_serialize_tl_object<ton_api::storage_daemon_priorityPending>();
|
|
}
|
|
}));
|
|
}
|
|
|
|
void run_control_query(ton_api::storage_daemon_setFilePriorityByName &query, td::Promise<td::BufferSlice> promise) {
|
|
TRY_RESULT_PROMISE(promise, priority, td::narrow_cast_safe<td::uint8>(query.priority_));
|
|
td::actor::send_closure(manager_, &StorageManager::set_file_priority_by_name, query.hash_, std::move(query.name_),
|
|
priority, promise.wrap([](bool done) -> td::Result<td::BufferSlice> {
|
|
if (done) {
|
|
return create_serialize_tl_object<ton_api::storage_daemon_prioritySet>();
|
|
} else {
|
|
return create_serialize_tl_object<ton_api::storage_daemon_priorityPending>();
|
|
}
|
|
}));
|
|
}
|
|
|
|
void run_control_query(ton_api::storage_daemon_removeTorrent &query, td::Promise<td::BufferSlice> promise) {
|
|
td::actor::send_closure(
|
|
manager_, &StorageManager::remove_torrent, query.hash_, query.remove_files_,
|
|
promise.wrap([](td::Unit &&) { return create_serialize_tl_object<ton_api::storage_daemon_success>(); }));
|
|
}
|
|
|
|
void run_control_query(ton_api::storage_daemon_loadFrom &query, td::Promise<td::BufferSlice> promise) {
|
|
td::optional<TorrentMeta> meta;
|
|
if (!query.meta_.empty()) {
|
|
TRY_RESULT_PROMISE_ASSIGN(promise, meta, TorrentMeta::deserialize(query.meta_));
|
|
}
|
|
td::actor::send_closure(
|
|
manager_, &StorageManager::load_from, query.hash_, std::move(meta), std::move(query.path_),
|
|
[manager = manager_.get(), hash = query.hash_, promise = std::move(promise)](td::Result<td::Unit> R) mutable {
|
|
if (R.is_error()) {
|
|
promise.set_error(R.move_as_error());
|
|
} else {
|
|
get_torrent_info_short(manager, hash, promise.wrap([](tl_object_ptr<ton_api::storage_daemon_torrent> obj) {
|
|
return serialize_tl_object(obj, true);
|
|
}));
|
|
}
|
|
});
|
|
}
|
|
|
|
void run_control_query(ton_api::storage_daemon_getSpeedLimits &query, td::Promise<td::BufferSlice> promise) {
|
|
td::actor::send_closure(manager_, &StorageManager::get_speed_limits,
|
|
promise.wrap([](std::pair<double, double> limits) -> td::BufferSlice {
|
|
return create_serialize_tl_object<ton_api::storage_daemon_speedLimits>(limits.first,
|
|
limits.second);
|
|
}));
|
|
}
|
|
|
|
void run_control_query(ton_api::storage_daemon_setSpeedLimits &query, td::Promise<td::BufferSlice> promise) {
|
|
if (query.flags_ & 1) {
|
|
td::actor::send_closure(manager_, &StorageManager::set_download_speed_limit, query.download_);
|
|
}
|
|
if (query.flags_ & 2) {
|
|
td::actor::send_closure(manager_, &StorageManager::set_upload_speed_limit, query.upload_);
|
|
}
|
|
promise.set_result(create_serialize_tl_object<ton_api::storage_daemon_success>());
|
|
}
|
|
|
|
void run_control_query(ton_api::storage_daemon_getNewContractMessage &query, td::Promise<td::BufferSlice> promise) {
|
|
td::Promise<std::pair<td::RefInt256, td::uint32>> P =
|
|
[promise = std::move(promise), hash = query.hash_, query_id = query.query_id_,
|
|
manager = manager_.get()](td::Result<std::pair<td::RefInt256, td::uint32>> R) mutable {
|
|
TRY_RESULT_PROMISE(promise, r, std::move(R));
|
|
td::actor::send_closure(
|
|
manager, &StorageManager::with_torrent, hash,
|
|
promise.wrap([r = std::move(r), query_id](NodeActor::NodeState state) -> td::Result<td::BufferSlice> {
|
|
Torrent &torrent = state.torrent;
|
|
if (!torrent.is_completed()) {
|
|
return td::Status::Error("Torrent is not complete");
|
|
}
|
|
TRY_RESULT(microchunk_tree, MicrochunkTree::Builder::build_for_torrent(torrent, 1LL << 60));
|
|
td::Ref<vm::Cell> msg = create_new_contract_message_body(
|
|
torrent.get_info().as_cell(), microchunk_tree.get_root_hash(), query_id, r.first, r.second);
|
|
return create_serialize_tl_object<ton_api::storage_daemon_newContractMessage>(
|
|
vm::std_boc_serialize(msg).move_as_ok(), r.first->to_dec_string(), r.second);
|
|
}));
|
|
};
|
|
|
|
ton_api::downcast_call(*query.params_,
|
|
td::overloaded(
|
|
[&](ton_api::storage_daemon_newContractParams &obj) {
|
|
td::RefInt256 rate = td::string_to_int256(obj.rate_);
|
|
if (rate.is_null() || rate->sgn() < 0) {
|
|
P.set_error(td::Status::Error("Invalid rate"));
|
|
return;
|
|
}
|
|
P.set_result(std::make_pair(std::move(rate), (td::uint32)obj.max_span_));
|
|
},
|
|
[&](ton_api::storage_daemon_newContractParamsAuto &obj) {
|
|
TRY_RESULT_PROMISE(P, address, ContractAddress::parse(obj.provider_address_));
|
|
init_tonlib_client();
|
|
StorageProvider::get_provider_params(
|
|
tonlib_client_.get(), address, P.wrap([](ProviderParams params) {
|
|
return std::make_pair(std::move(params.rate_per_mb_day), params.max_span);
|
|
}));
|
|
}));
|
|
}
|
|
|
|
void run_control_query(ton_api::storage_daemon_importPrivateKey &query, td::Promise<td::BufferSlice> promise) {
|
|
auto pk = ton::PrivateKey{query.key_};
|
|
td::actor::send_closure(keyring_, &ton::keyring::Keyring::add_key, std::move(pk), false,
|
|
promise.wrap([hash = pk.compute_short_id()](td::Unit) mutable {
|
|
return create_serialize_tl_object<ton_api::storage_daemon_keyHash>(hash.bits256_value());
|
|
}));
|
|
}
|
|
|
|
void run_control_query(ton_api::storage_daemon_deployProvider &query, td::Promise<td::BufferSlice> promise) {
|
|
if (!enable_storage_provider_) {
|
|
promise.set_error(
|
|
td::Status::Error("Storage provider is not enabled, run daemon with --storage-provider to enable it"));
|
|
return;
|
|
}
|
|
if (!provider_.empty() || deploying_provider_) {
|
|
promise.set_error(td::Status::Error("Storage provider already exists"));
|
|
return;
|
|
}
|
|
TRY_RESULT_PROMISE_ASSIGN(promise, deploying_provider_, generate_fabric_contract(keyring_.get()));
|
|
promise.set_result(create_serialize_tl_object<ton_api::storage_daemon_providerAddress>(
|
|
deploying_provider_.value().address.to_string()));
|
|
do_deploy_provider();
|
|
}
|
|
|
|
void run_control_query(ton_api::storage_daemon_initProvider &query, td::Promise<td::BufferSlice> promise) {
|
|
if (!enable_storage_provider_) {
|
|
promise.set_error(
|
|
td::Status::Error("Storage provider is not enabled, run daemon with --storage-provider to enable it"));
|
|
return;
|
|
}
|
|
if (!provider_.empty() || deploying_provider_) {
|
|
promise.set_error(td::Status::Error("Storage provider already exists"));
|
|
return;
|
|
}
|
|
TRY_RESULT_PROMISE_PREFIX(promise, address, ContractAddress::parse(query.account_address_), "Invalid address: ");
|
|
do_init_provider(
|
|
address, promise.wrap([](td::Unit) { return create_serialize_tl_object<ton_api::storage_daemon_success>(); }));
|
|
}
|
|
|
|
void do_init_provider(ContractAddress address, td::Promise<td::Unit> promise, bool deploying = false) {
|
|
if (deploying && (!deploying_provider_ || deploying_provider_.value().address != address)) {
|
|
promise.set_error(td::Status::Error("Deploying was cancelled"));
|
|
return;
|
|
}
|
|
daemon_config_->provider_address_ = address.to_string();
|
|
TRY_STATUS_PROMISE(promise, save_daemon_config());
|
|
init_tonlib_client();
|
|
provider_ = td::actor::create_actor<StorageProvider>("provider", address, db_root_ + "/provider",
|
|
tonlib_client_.get(), manager_.get(), keyring_.get());
|
|
deploying_provider_ = {};
|
|
promise.set_result(td::Unit());
|
|
}
|
|
|
|
void do_deploy_provider() {
|
|
if (!deploying_provider_) {
|
|
return;
|
|
}
|
|
init_tonlib_client();
|
|
check_contract_exists(
|
|
deploying_provider_.value().address, tonlib_client_.get(),
|
|
[SelfId = actor_id(this), client = tonlib_client_.get(),
|
|
init = deploying_provider_.value()](td::Result<bool> R) mutable {
|
|
if (R.is_error()) {
|
|
LOG(INFO) << "Deploying storage contract: " << R.move_as_error();
|
|
delay_action([=]() { td::actor::send_closure(SelfId, &StorageDaemon::do_deploy_provider); },
|
|
td::Timestamp::in(5.0));
|
|
return;
|
|
}
|
|
if (R.ok()) {
|
|
LOG(INFO) << "Deploying storage contract: DONE";
|
|
td::actor::send_closure(
|
|
SelfId, &StorageDaemon::do_init_provider, init.address, [](td::Result<td::Unit>) {}, true);
|
|
return;
|
|
}
|
|
ContractAddress address = init.address;
|
|
td::BufferSlice state_init_boc = vm::std_boc_serialize(init.state_init).move_as_ok();
|
|
td::BufferSlice body_boc = vm::std_boc_serialize(init.msg_body).move_as_ok();
|
|
auto query = create_tl_object<tonlib_api::raw_createAndSendMessage>(
|
|
create_tl_object<tonlib_api::accountAddress>(address.to_string()), state_init_boc.as_slice().str(),
|
|
body_boc.as_slice().str());
|
|
td::actor::send_closure(
|
|
client, &tonlib::TonlibClientWrapper::send_request<tonlib_api::raw_createAndSendMessage>,
|
|
std::move(query), [=](td::Result<tl_object_ptr<tonlib_api::ok>> R) {
|
|
if (R.is_error()) {
|
|
LOG(INFO) << "Deploying storage contract: " << R.move_as_error();
|
|
}
|
|
delay_action([=]() { td::actor::send_closure(SelfId, &StorageDaemon::do_deploy_provider); },
|
|
td::Timestamp::in(5.0));
|
|
});
|
|
});
|
|
}
|
|
|
|
void run_control_query(ton_api::storage_daemon_removeStorageProvider &query, td::Promise<td::BufferSlice> promise) {
|
|
if (!enable_storage_provider_) {
|
|
promise.set_error(td::Status::Error("No storage provider"));
|
|
return;
|
|
}
|
|
if (provider_.empty() && !deploying_provider_) {
|
|
promise.set_error(td::Status::Error("No storage provider"));
|
|
return;
|
|
}
|
|
daemon_config_->provider_address_ = "";
|
|
TRY_STATUS_PROMISE(promise, save_daemon_config());
|
|
deploying_provider_ = {};
|
|
provider_ = {};
|
|
auto S = td::rmrf(db_root_ + "/provider");
|
|
if (S.is_error()) {
|
|
LOG(ERROR) << "Failed to delete provider directory: " << S;
|
|
}
|
|
promise.set_result(create_serialize_tl_object<ton_api::storage_daemon_success>());
|
|
}
|
|
|
|
void run_control_query(ton_api::storage_daemon_getProviderParams &query, td::Promise<td::BufferSlice> promise) {
|
|
if (!query.address_.empty()) {
|
|
TRY_RESULT_PROMISE_PREFIX(promise, address, ContractAddress::parse(query.address_), "Invalid address: ");
|
|
init_tonlib_client();
|
|
StorageProvider::get_provider_params(tonlib_client_.get(), address, promise.wrap([](ProviderParams params) {
|
|
return serialize_tl_object(params.tl(), true);
|
|
}));
|
|
}
|
|
if (provider_.empty()) {
|
|
promise.set_error(td::Status::Error("No storage provider"));
|
|
return;
|
|
}
|
|
td::actor::send_closure(provider_, &StorageProvider::get_params,
|
|
promise.wrap([](ProviderParams params) { return serialize_tl_object(params.tl(), true); }));
|
|
}
|
|
|
|
void run_control_query(ton_api::storage_daemon_setProviderParams &query, td::Promise<td::BufferSlice> promise) {
|
|
if (provider_.empty()) {
|
|
promise.set_error(td::Status::Error("No storage provider"));
|
|
return;
|
|
}
|
|
TRY_RESULT_PROMISE(promise, params, ProviderParams::create(query.params_));
|
|
td::actor::send_closure(
|
|
provider_, &StorageProvider::set_params, std::move(params),
|
|
promise.wrap([](td::Unit) mutable { return create_serialize_tl_object<ton_api::storage_daemon_success>(); }));
|
|
}
|
|
|
|
template <class T>
|
|
void run_control_query(T &query, td::Promise<td::BufferSlice> promise) {
|
|
promise.set_error(td::Status::Error("unknown query"));
|
|
}
|
|
|
|
void run_control_query(ton_api::storage_daemon_getProviderInfo &query, td::Promise<td::BufferSlice> promise) {
|
|
if (provider_.empty()) {
|
|
promise.set_error(td::Status::Error("No storage provider"));
|
|
return;
|
|
}
|
|
td::actor::send_closure(provider_, &StorageProvider::get_provider_info, query.with_balances_, query.with_contracts_,
|
|
promise.wrap([](tl_object_ptr<ton_api::storage_daemon_providerInfo> info) {
|
|
return serialize_tl_object(info, true);
|
|
}));
|
|
}
|
|
|
|
void run_control_query(ton_api::storage_daemon_setProviderConfig &query, td::Promise<td::BufferSlice> promise) {
|
|
if (provider_.empty()) {
|
|
promise.set_error(td::Status::Error("No storage provider"));
|
|
return;
|
|
}
|
|
td::actor::send_closure(
|
|
provider_, &StorageProvider::set_provider_config, StorageProvider::Config(query.config_),
|
|
promise.wrap([](td::Unit) { return create_serialize_tl_object<ton_api::storage_daemon_success>(); }));
|
|
}
|
|
|
|
void run_control_query(ton_api::storage_daemon_withdraw &query, td::Promise<td::BufferSlice> promise) {
|
|
if (provider_.empty()) {
|
|
promise.set_error(td::Status::Error("No storage provider"));
|
|
return;
|
|
}
|
|
TRY_RESULT_PROMISE_PREFIX(promise, address, ContractAddress::parse(query.contract_), "Invalid address: ");
|
|
td::actor::send_closure(provider_, &StorageProvider::withdraw, address, promise.wrap([](td::Unit) {
|
|
return create_serialize_tl_object<ton_api::storage_daemon_success>();
|
|
}));
|
|
}
|
|
|
|
void run_control_query(ton_api::storage_daemon_sendCoins &query, td::Promise<td::BufferSlice> promise) {
|
|
if (provider_.empty()) {
|
|
promise.set_error(td::Status::Error("No storage provider"));
|
|
return;
|
|
}
|
|
TRY_RESULT_PROMISE_PREFIX(promise, address, ContractAddress::parse(query.address_), "Invalid address: ");
|
|
td::RefInt256 amount = td::string_to_int256(query.amount_);
|
|
if (amount.is_null()) {
|
|
promise.set_error(td::Status::Error("Invalid amount"));
|
|
return;
|
|
}
|
|
td::actor::send_closure(
|
|
provider_, &StorageProvider::send_coins, address, amount, std::move(query.message_),
|
|
promise.wrap([](td::Unit) { return create_serialize_tl_object<ton_api::storage_daemon_success>(); }));
|
|
}
|
|
|
|
void run_control_query(ton_api::storage_daemon_closeStorageContract &query, td::Promise<td::BufferSlice> promise) {
|
|
if (provider_.empty()) {
|
|
promise.set_error(td::Status::Error("No storage provider"));
|
|
return;
|
|
}
|
|
TRY_RESULT_PROMISE_PREFIX(promise, address, ContractAddress::parse(query.address_), "Invalid address: ");
|
|
td::actor::send_closure(provider_, &StorageProvider::close_storage_contract, address, promise.wrap([](td::Unit) {
|
|
return create_serialize_tl_object<ton_api::storage_daemon_success>();
|
|
}));
|
|
}
|
|
|
|
private:
|
|
static void fill_torrent_info_short(Torrent &torrent, ton_api::storage_daemon_torrent &obj) {
|
|
obj.hash_ = torrent.get_hash();
|
|
obj.root_dir_ = torrent.get_root_dir();
|
|
if (torrent.inited_info()) {
|
|
const Torrent::Info &info = torrent.get_info();
|
|
obj.flags_ = 1;
|
|
if (torrent.inited_header()) {
|
|
obj.flags_ |= 2;
|
|
}
|
|
obj.total_size_ = info.file_size;
|
|
obj.description_ = info.description;
|
|
if (torrent.inited_header()) {
|
|
obj.included_size_ = torrent.get_included_size();
|
|
obj.files_count_ = torrent.get_files_count().unwrap();
|
|
obj.dir_name_ = torrent.get_header().dir_name;
|
|
}
|
|
obj.downloaded_size_ = torrent.get_included_ready_size();
|
|
obj.completed_ = torrent.is_completed();
|
|
} else {
|
|
obj.flags_ = 0;
|
|
obj.downloaded_size_ = 0;
|
|
obj.completed_ = false;
|
|
}
|
|
if (torrent.get_fatal_error().is_error()) {
|
|
obj.flags_ |= 4;
|
|
obj.fatal_error_ = torrent.get_fatal_error().message().str();
|
|
}
|
|
}
|
|
|
|
static void fill_torrent_info_full(Torrent &torrent, ton_api::storage_daemon_torrentFull &obj) {
|
|
if (!obj.torrent_) {
|
|
obj.torrent_ = create_tl_object<ton_api::storage_daemon_torrent>();
|
|
}
|
|
fill_torrent_info_short(torrent, *obj.torrent_);
|
|
obj.files_.clear();
|
|
auto count = torrent.get_files_count();
|
|
if (!count) {
|
|
return;
|
|
}
|
|
for (size_t i = 0; i < count.value(); ++i) {
|
|
auto file = create_tl_object<ton_api::storage_daemon_fileInfo>();
|
|
file->name_ = torrent.get_file_name(i).str();
|
|
file->size_ = torrent.get_file_size(i);
|
|
file->downloaded_size_ = torrent.get_file_ready_size(i);
|
|
file->flags_ = 0;
|
|
obj.files_.push_back(std::move(file));
|
|
}
|
|
}
|
|
|
|
static void get_torrent_info_short(td::actor::ActorId<StorageManager> manager, td::Bits256 hash,
|
|
td::Promise<tl_object_ptr<ton_api::storage_daemon_torrent>> promise) {
|
|
td::actor::send_closure(manager, &StorageManager::with_torrent, hash,
|
|
[promise = std::move(promise)](td::Result<NodeActor::NodeState> R) mutable {
|
|
if (R.is_error()) {
|
|
promise.set_result(R.move_as_error());
|
|
return;
|
|
}
|
|
auto state = R.move_as_ok();
|
|
auto obj = create_tl_object<ton_api::storage_daemon_torrent>();
|
|
fill_torrent_info_short(state.torrent, *obj);
|
|
obj->active_download_ = state.active_download;
|
|
obj->active_upload_ = state.active_upload;
|
|
obj->download_speed_ = state.download_speed;
|
|
obj->upload_speed_ = state.upload_speed;
|
|
obj->added_at_ = state.added_at;
|
|
promise.set_result(std::move(obj));
|
|
});
|
|
}
|
|
|
|
static void get_torrent_info_full_serialized(td::actor::ActorId<StorageManager> manager, td::Bits256 hash,
|
|
td::Promise<td::BufferSlice> promise) {
|
|
td::actor::send_closure(manager, &StorageManager::with_torrent, hash,
|
|
[promise = std::move(promise)](td::Result<NodeActor::NodeState> R) mutable {
|
|
if (R.is_error()) {
|
|
promise.set_error(R.move_as_error());
|
|
} else {
|
|
auto state = R.move_as_ok();
|
|
auto obj = create_tl_object<ton_api::storage_daemon_torrentFull>();
|
|
fill_torrent_info_full(state.torrent, *obj);
|
|
obj->torrent_->active_download_ = state.active_download;
|
|
obj->torrent_->active_upload_ = state.active_upload;
|
|
obj->torrent_->download_speed_ = state.download_speed;
|
|
obj->torrent_->upload_speed_ = state.upload_speed;
|
|
obj->torrent_->added_at_ = state.added_at;
|
|
for (size_t i = 0; i < obj->files_.size(); ++i) {
|
|
obj->files_[i]->priority_ =
|
|
(i < state.file_priority.size() ? state.file_priority[i] : 1);
|
|
}
|
|
promise.set_result(serialize_tl_object(obj, true));
|
|
}
|
|
});
|
|
}
|
|
|
|
td::IPAddress ip_addr_;
|
|
bool client_mode_;
|
|
std::string global_config_;
|
|
std::string db_root_;
|
|
td::uint16 control_port_;
|
|
bool enable_storage_provider_;
|
|
|
|
tl_object_ptr<ton_api::storage_daemon_config> daemon_config_;
|
|
std::shared_ptr<dht::DhtGlobalConfig> dht_config_;
|
|
adnl::AdnlNodeIdShort local_id_;
|
|
adnl::AdnlNodeIdShort dht_id_;
|
|
|
|
td::actor::ActorOwn<keyring::Keyring> keyring_;
|
|
td::actor::ActorOwn<adnl::AdnlNetworkManager> adnl_network_manager_;
|
|
td::actor::ActorOwn<adnl::Adnl> adnl_;
|
|
td::actor::ActorOwn<dht::Dht> dht_;
|
|
td::actor::ActorOwn<ton_rldp::Rldp> rldp_;
|
|
td::actor::ActorOwn<overlay::Overlays> overlays_;
|
|
td::actor::ActorOwn<adnl::AdnlExtServer> ext_server_;
|
|
|
|
td::actor::ActorOwn<StorageManager> manager_;
|
|
|
|
td::actor::ActorOwn<tonlib::TonlibClientWrapper> tonlib_client_;
|
|
td::actor::ActorOwn<StorageProvider> provider_;
|
|
td::optional<FabricContractInit> deploying_provider_;
|
|
|
|
void init_tonlib_client() {
|
|
if (!tonlib_client_.empty()) {
|
|
return;
|
|
}
|
|
auto r_conf_data = td::read_file(global_config_);
|
|
r_conf_data.ensure();
|
|
auto tonlib_options = tonlib_api::make_object<tonlib_api::options>(
|
|
tonlib_api::make_object<tonlib_api::config>(r_conf_data.move_as_ok().as_slice().str(), "", false, false),
|
|
tonlib_api::make_object<tonlib_api::keyStoreTypeInMemory>());
|
|
tonlib_client_ = td::actor::create_actor<tonlib::TonlibClientWrapper>("tonlibclient", std::move(tonlib_options));
|
|
}
|
|
|
|
std::string daemon_config_file() {
|
|
return db_root_ + "/config.json";
|
|
}
|
|
};
|
|
|
|
} // namespace ton
|
|
|
|
int main(int argc, char *argv[]) {
|
|
SET_VERBOSITY_LEVEL(verbosity_WARNING);
|
|
td::set_default_failure_signal_handler().ensure();
|
|
|
|
td::unique_ptr<td::LogInterface> logger_;
|
|
SCOPE_EXIT {
|
|
td::log_interface = td::default_log_interface;
|
|
};
|
|
|
|
td::IPAddress ip_addr;
|
|
bool client_mode = false;
|
|
std::string global_config, db_root;
|
|
td::uint16 control_port = 0;
|
|
bool enable_storage_provider = false;
|
|
|
|
td::OptionParser p;
|
|
p.set_description("Server for seeding and downloading bags of files (torrents)\n");
|
|
p.add_option('v', "verbosity", "set verbosity level", [&](td::Slice arg) {
|
|
int v = VERBOSITY_NAME(FATAL) + (td::to_integer<int>(arg));
|
|
SET_VERBOSITY_LEVEL(v);
|
|
});
|
|
p.add_option('V', "version", "shows storage-daemon build information", [&]() {
|
|
std::cout << "storage-daemon build information: [ Commit: " << GitMetadata::CommitSHA1()
|
|
<< ", Date: " << GitMetadata::CommitDate() << "]\n";
|
|
std::exit(0);
|
|
});
|
|
p.add_option('h', "help", "prints a help message", [&]() {
|
|
char b[10240];
|
|
td::StringBuilder sb(td::MutableSlice{b, 10000});
|
|
sb << p;
|
|
std::cout << sb.as_cslice().c_str();
|
|
std::exit(2);
|
|
});
|
|
p.add_checked_option('I', "ip", "set <ip>:<port> for adnl. :<port> for client mode",
|
|
[&](td::Slice arg) -> td::Status {
|
|
if (ip_addr.is_valid()) {
|
|
return td::Status::Error("Duplicate ip address");
|
|
}
|
|
if (!arg.empty() && arg[0] == ':') {
|
|
TRY_RESULT(port, td::to_integer_safe<td::uint16>(arg.substr(1)));
|
|
TRY_STATUS(ip_addr.init_ipv4_port("127.0.0.1", port));
|
|
client_mode = true;
|
|
} else {
|
|
TRY_STATUS(ip_addr.init_host_port(arg.str()));
|
|
}
|
|
return td::Status::OK();
|
|
});
|
|
p.add_checked_option('p', "control-port", "port for control interface", [&](td::Slice arg) -> td::Status {
|
|
TRY_RESULT_ASSIGN(control_port, td::to_integer_safe<td::uint16>(arg));
|
|
return td::Status::OK();
|
|
});
|
|
p.add_option('C', "global-config", "global TON configuration file",
|
|
[&](td::Slice arg) { global_config = arg.str(); });
|
|
p.add_option('D', "db", "db root", [&](td::Slice arg) { db_root = arg.str(); });
|
|
p.add_option('d', "daemonize", "set SIGHUP", [&]() {
|
|
td::set_signal_handler(td::SignalType::HangUp, [](int sig) {
|
|
#if TD_DARWIN || TD_LINUX
|
|
close(0);
|
|
setsid();
|
|
#endif
|
|
}).ensure();
|
|
});
|
|
p.add_option('l', "logname", "log to file", [&](td::Slice fname) {
|
|
logger_ = td::FileLog::create(fname.str()).move_as_ok();
|
|
td::log_interface = logger_.get();
|
|
});
|
|
p.add_option('P', "storage-provider", "run storage provider", [&]() { enable_storage_provider = true; });
|
|
|
|
td::actor::Scheduler scheduler({7});
|
|
|
|
scheduler.run_in_context([&] {
|
|
p.run(argc, argv).ensure();
|
|
td::actor::create_actor<ton::StorageDaemon>("storage-daemon", ip_addr, client_mode, global_config, db_root,
|
|
control_port, enable_storage_provider)
|
|
.release();
|
|
});
|
|
while (scheduler.run(1)) {
|
|
}
|
|
}
|