2020-03-01 02:08:22 +08:00
|
|
|
// Package vfscache deals with caching of files locally for the VFS layer
|
|
|
|
package vfscache
|
|
|
|
|
|
|
|
import (
|
|
|
|
"context"
|
2021-11-04 18:12:57 +08:00
|
|
|
"errors"
|
2020-03-01 02:08:22 +08:00
|
|
|
"fmt"
|
|
|
|
"os"
|
|
|
|
"path"
|
|
|
|
"path/filepath"
|
|
|
|
"runtime"
|
|
|
|
"sort"
|
|
|
|
"strings"
|
|
|
|
"sync"
|
|
|
|
"time"
|
|
|
|
|
|
|
|
"github.com/rclone/rclone/fs"
|
|
|
|
fscache "github.com/rclone/rclone/fs/cache"
|
|
|
|
"github.com/rclone/rclone/fs/config"
|
2020-08-25 23:20:29 +08:00
|
|
|
"github.com/rclone/rclone/fs/fserrors"
|
2020-03-01 02:08:22 +08:00
|
|
|
"github.com/rclone/rclone/fs/hash"
|
|
|
|
"github.com/rclone/rclone/fs/operations"
|
2021-11-18 00:11:08 +08:00
|
|
|
"github.com/rclone/rclone/fs/rc"
|
2023-09-05 19:38:19 +08:00
|
|
|
"github.com/rclone/rclone/lib/diskusage"
|
2021-05-28 21:11:19 +08:00
|
|
|
"github.com/rclone/rclone/lib/encoder"
|
2020-06-11 20:06:02 +08:00
|
|
|
"github.com/rclone/rclone/lib/file"
|
2023-11-29 17:25:30 +08:00
|
|
|
"github.com/rclone/rclone/lib/systemd"
|
2020-06-22 23:31:08 +08:00
|
|
|
"github.com/rclone/rclone/vfs/vfscache/writeback"
|
2020-03-01 02:08:22 +08:00
|
|
|
"github.com/rclone/rclone/vfs/vfscommon"
|
|
|
|
)
|
|
|
|
|
|
|
|
// NB as Cache and Item are tightly linked it is necessary to have a
|
|
|
|
// total lock ordering between them. So Cache.mu must always be
|
|
|
|
// taken before Item.mu to avoid deadlocks.
|
|
|
|
//
|
|
|
|
// Cache may call into Item but care is needed if Item calls Cache
|
|
|
|
|
2020-04-22 19:25:40 +08:00
|
|
|
// FIXME need to purge cache nodes which don't have backing files and aren't dirty
|
|
|
|
// these may get created by the VFS layer or may be orphans from reload()
|
2020-03-01 02:08:22 +08:00
|
|
|
|
|
|
|
// Cache opened files
|
|
|
|
type Cache struct {
|
|
|
|
// read only - no locking needed to read these
|
2020-06-22 23:31:08 +08:00
|
|
|
fremote fs.Fs // fs for the remote we are caching
|
|
|
|
fcache fs.Fs // fs for the cache directory
|
|
|
|
fcacheMeta fs.Fs // fs for the cache metadata directory
|
|
|
|
opt *vfscommon.Options // vfs Options
|
|
|
|
root string // root of the cache directory
|
|
|
|
metaRoot string // root of the cache metadata directory
|
|
|
|
hashType hash.Type // hash to use locally and remotely
|
|
|
|
hashOption *fs.HashesOption // corresponding OpenOption
|
|
|
|
writeback *writeback.WriteBack // holds Items for writeback
|
2020-06-23 22:18:58 +08:00
|
|
|
avFn AddVirtualFn // if set, can be called to add dir entries
|
2020-03-01 02:08:22 +08:00
|
|
|
|
2020-08-25 23:20:29 +08:00
|
|
|
mu sync.Mutex // protects the following variables
|
2022-07-29 00:35:14 +08:00
|
|
|
cond sync.Cond // cond lock for synchronous cache cleaning
|
2020-08-25 23:20:29 +08:00
|
|
|
item map[string]*Item // files/directories in the cache
|
|
|
|
errItems map[string]error // items in error state
|
|
|
|
used int64 // total size of files in the cache
|
|
|
|
outOfSpace bool // out of space
|
|
|
|
cleanerKicked bool // some thread kicked the cleaner upon out of space
|
Spelling fixes
Fix spelling of: above, already, anonymous, associated,
authentication, bandwidth, because, between, blocks, calculate,
candidates, cautious, changelog, cleaner, clipboard, command,
completely, concurrently, considered, constructs, corrupt, current,
daemon, dependencies, deprecated, directory, dispatcher, download,
eligible, ellipsis, encrypter, endpoint, entrieslist, essentially,
existing writers, existing, expires, filesystem, flushing, frequently,
hierarchy, however, implementation, implements, inaccurate,
individually, insensitive, longer, maximum, metadata, modified,
multipart, namedirfirst, nextcloud, obscured, opened, optional,
owncloud, pacific, passphrase, password, permanently, persimmon,
positive, potato, protocol, quota, receiving, recommends, referring,
requires, revisited, satisfied, satisfies, satisfy, semver,
serialized, session, storage, strategies, stringlist, successful,
supported, surprise, temporarily, temporary, transactions, unneeded,
update, uploads, wrapped
Signed-off-by: Josh Soref <jsoref@users.noreply.github.com>
2020-10-09 08:17:24 +08:00
|
|
|
kickerMu sync.Mutex // mutex for cleanerKicked
|
2020-08-25 23:20:29 +08:00
|
|
|
kick chan struct{} // channel for kicking clear to start
|
|
|
|
|
2020-03-01 02:08:22 +08:00
|
|
|
}
|
|
|
|
|
2020-06-23 22:18:58 +08:00
|
|
|
// AddVirtualFn if registered by the WithAddVirtual method, can be
|
|
|
|
// called to register the object or directory at remote as a virtual
|
|
|
|
// entry in directory listings.
|
|
|
|
//
|
|
|
|
// This is used when reloading the Cache and uploading items need to
|
|
|
|
// go into the directory tree.
|
|
|
|
type AddVirtualFn func(remote string, size int64, isDir bool) error
|
|
|
|
|
Spelling fixes
Fix spelling of: above, already, anonymous, associated,
authentication, bandwidth, because, between, blocks, calculate,
candidates, cautious, changelog, cleaner, clipboard, command,
completely, concurrently, considered, constructs, corrupt, current,
daemon, dependencies, deprecated, directory, dispatcher, download,
eligible, ellipsis, encrypter, endpoint, entrieslist, essentially,
existing writers, existing, expires, filesystem, flushing, frequently,
hierarchy, however, implementation, implements, inaccurate,
individually, insensitive, longer, maximum, metadata, modified,
multipart, namedirfirst, nextcloud, obscured, opened, optional,
owncloud, pacific, passphrase, password, permanently, persimmon,
positive, potato, protocol, quota, receiving, recommends, referring,
requires, revisited, satisfied, satisfies, satisfy, semver,
serialized, session, storage, strategies, stringlist, successful,
supported, surprise, temporarily, temporary, transactions, unneeded,
update, uploads, wrapped
Signed-off-by: Josh Soref <jsoref@users.noreply.github.com>
2020-10-09 08:17:24 +08:00
|
|
|
// New creates a new cache hierarchy for fremote
|
2020-03-01 02:08:22 +08:00
|
|
|
//
|
|
|
|
// This starts background goroutines which can be cancelled with the
|
|
|
|
// context passed in.
|
2020-06-23 22:18:58 +08:00
|
|
|
func New(ctx context.Context, fremote fs.Fs, opt *vfscommon.Options, avFn AddVirtualFn) (*Cache, error) {
|
2021-05-28 21:11:19 +08:00
|
|
|
// Get cache root path.
|
|
|
|
// We need it in two variants: OS path as an absolute path with UNC prefix,
|
|
|
|
// OS-specific path separators, and encoded with OS-specific encoder. Standard path
|
|
|
|
// without UNC prefix, with slash path separators, and standard (internal) encoding.
|
|
|
|
// Care must be taken when creating OS paths so that the ':' separator following a
|
|
|
|
// drive letter is not encoded (e.g. into unicode fullwidth colon).
|
|
|
|
var err error
|
2021-09-10 21:35:53 +08:00
|
|
|
parentOSPath := config.GetCacheDir() // Assuming string contains a local absolute path in OS encoding
|
2021-05-28 21:11:19 +08:00
|
|
|
fs.Debugf(nil, "vfs cache: root is %q", parentOSPath)
|
|
|
|
parentPath := fromOSPath(parentOSPath)
|
2020-03-01 02:08:22 +08:00
|
|
|
|
2021-05-28 21:11:19 +08:00
|
|
|
// Get a relative cache path representing the remote.
|
|
|
|
relativeDirPath := fremote.Root() // This is a remote path in standard encoding
|
|
|
|
if runtime.GOOS == "windows" {
|
|
|
|
if strings.HasPrefix(relativeDirPath, `//?/`) {
|
|
|
|
relativeDirPath = relativeDirPath[2:] // Trim off the "//" for the result to be a valid when appending to another path
|
|
|
|
}
|
2020-03-01 02:08:22 +08:00
|
|
|
}
|
2021-05-28 21:11:19 +08:00
|
|
|
relativeDirPath = fremote.Name() + "/" + relativeDirPath
|
|
|
|
relativeDirOSPath := toOSPath(relativeDirPath)
|
|
|
|
|
|
|
|
// Create cache root dirs
|
|
|
|
var dataOSPath, metaOSPath string
|
|
|
|
if dataOSPath, metaOSPath, err = createRootDirs(parentOSPath, relativeDirOSPath); err != nil {
|
|
|
|
return nil, err
|
2020-03-01 02:08:22 +08:00
|
|
|
}
|
2021-05-28 21:11:19 +08:00
|
|
|
fs.Debugf(nil, "vfs cache: data root is %q", dataOSPath)
|
|
|
|
fs.Debugf(nil, "vfs cache: metadata root is %q", metaOSPath)
|
2020-03-01 02:08:22 +08:00
|
|
|
|
2021-05-28 21:11:19 +08:00
|
|
|
// Get (create) cache backends
|
|
|
|
var fdata, fmeta fs.Fs
|
|
|
|
if fdata, fmeta, err = getBackends(ctx, parentPath, relativeDirPath); err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
hashType, hashOption := operations.CommonHash(ctx, fdata, fremote)
|
2020-03-01 02:08:22 +08:00
|
|
|
|
2021-05-28 21:11:19 +08:00
|
|
|
// Create the cache object
|
2020-03-01 02:08:22 +08:00
|
|
|
c := &Cache{
|
|
|
|
fremote: fremote,
|
2021-05-28 21:11:19 +08:00
|
|
|
fcache: fdata,
|
|
|
|
fcacheMeta: fmeta,
|
2020-03-01 02:08:22 +08:00
|
|
|
opt: opt,
|
2021-05-28 21:11:19 +08:00
|
|
|
root: dataOSPath,
|
|
|
|
metaRoot: metaOSPath,
|
2020-03-01 02:08:22 +08:00
|
|
|
item: make(map[string]*Item),
|
2020-08-25 23:20:29 +08:00
|
|
|
errItems: make(map[string]error),
|
2020-03-01 02:08:22 +08:00
|
|
|
hashType: hashType,
|
|
|
|
hashOption: hashOption,
|
2020-06-22 23:31:08 +08:00
|
|
|
writeback: writeback.New(ctx, opt),
|
2020-06-23 22:18:58 +08:00
|
|
|
avFn: avFn,
|
2020-03-01 02:08:22 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
// load in the cache and metadata off disk
|
2020-04-22 19:25:40 +08:00
|
|
|
err = c.reload(ctx)
|
2020-03-01 02:08:22 +08:00
|
|
|
if err != nil {
|
2021-11-04 18:12:57 +08:00
|
|
|
return nil, fmt.Errorf("failed to load cache: %w", err)
|
2020-03-01 02:08:22 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
// Remove any empty directories
|
2021-03-17 17:48:25 +08:00
|
|
|
c.purgeEmptyDirs("", true)
|
2020-03-01 02:08:22 +08:00
|
|
|
|
2020-08-25 23:20:29 +08:00
|
|
|
// Create a channel for cleaner to be kicked upon out of space con
|
|
|
|
c.kick = make(chan struct{}, 1)
|
2022-07-29 00:35:14 +08:00
|
|
|
c.cond = sync.Cond{L: &c.mu}
|
2020-08-25 23:20:29 +08:00
|
|
|
|
2020-03-01 02:08:22 +08:00
|
|
|
go c.cleaner(ctx)
|
|
|
|
|
|
|
|
return c, nil
|
|
|
|
}
|
|
|
|
|
2021-11-18 00:11:08 +08:00
|
|
|
// Stats returns info about the Cache
|
|
|
|
func (c *Cache) Stats() (out rc.Params) {
|
|
|
|
out = make(rc.Params)
|
|
|
|
// read only - no locking needed to read these
|
|
|
|
out["path"] = c.root
|
|
|
|
out["pathMeta"] = c.metaRoot
|
|
|
|
out["hashType"] = c.hashType
|
|
|
|
|
|
|
|
uploadsInProgress, uploadsQueued := c.writeback.Stats()
|
|
|
|
out["uploadsInProgress"] = uploadsInProgress
|
|
|
|
out["uploadsQueued"] = uploadsQueued
|
|
|
|
|
|
|
|
c.mu.Lock()
|
|
|
|
defer c.mu.Unlock()
|
|
|
|
|
|
|
|
out["files"] = len(c.item)
|
|
|
|
out["erroredFiles"] = len(c.errItems)
|
|
|
|
out["bytesUsed"] = c.used
|
|
|
|
out["outOfSpace"] = c.outOfSpace
|
|
|
|
|
|
|
|
return out
|
|
|
|
}
|
|
|
|
|
2024-06-20 22:34:26 +08:00
|
|
|
// Queue returns info about the Cache
|
|
|
|
func (c *Cache) Queue() (out rc.Params) {
|
|
|
|
out = make(rc.Params)
|
|
|
|
out["queue"] = c.writeback.Queue()
|
|
|
|
return out
|
|
|
|
}
|
|
|
|
|
2024-06-21 00:00:41 +08:00
|
|
|
// QueueSetExpiry updates the expiry of a single item in the upload queue
|
|
|
|
func (c *Cache) QueueSetExpiry(id writeback.Handle, expiry time.Time) error {
|
|
|
|
return c.writeback.SetExpiry(id, expiry)
|
|
|
|
}
|
|
|
|
|
2021-05-28 21:11:19 +08:00
|
|
|
// createDir creates a directory path, along with any necessary parents
|
|
|
|
func createDir(dir string) error {
|
2021-06-11 06:46:36 +08:00
|
|
|
return file.MkdirAll(dir, 0700)
|
2021-05-28 21:11:19 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
// createRootDir creates a single cache root directory
|
|
|
|
func createRootDir(parentOSPath string, name string, relativeDirOSPath string) (path string, err error) {
|
|
|
|
path = file.UNCPath(filepath.Join(parentOSPath, name, relativeDirOSPath))
|
|
|
|
err = createDir(path)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
// createRootDirs creates all cache root directories
|
|
|
|
func createRootDirs(parentOSPath string, relativeDirOSPath string) (dataOSPath string, metaOSPath string, err error) {
|
|
|
|
if dataOSPath, err = createRootDir(parentOSPath, "vfs", relativeDirOSPath); err != nil {
|
2021-11-04 18:12:57 +08:00
|
|
|
err = fmt.Errorf("failed to create data cache directory: %w", err)
|
2021-05-28 21:11:19 +08:00
|
|
|
} else if metaOSPath, err = createRootDir(parentOSPath, "vfsMeta", relativeDirOSPath); err != nil {
|
2021-11-04 18:12:57 +08:00
|
|
|
err = fmt.Errorf("failed to create metadata cache directory: %w", err)
|
2021-05-28 21:11:19 +08:00
|
|
|
}
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
// createItemDir creates the directory for named item in all cache roots
|
|
|
|
//
|
|
|
|
// Returns an os path for the data cache file.
|
|
|
|
func (c *Cache) createItemDir(name string) (string, error) {
|
|
|
|
parent := vfscommon.FindParent(name)
|
|
|
|
parentPath := c.toOSPath(parent)
|
|
|
|
err := createDir(parentPath)
|
|
|
|
if err != nil {
|
2021-11-04 18:12:57 +08:00
|
|
|
return "", fmt.Errorf("failed to create data cache item directory: %w", err)
|
2021-05-28 21:11:19 +08:00
|
|
|
}
|
|
|
|
parentPathMeta := c.toOSPathMeta(parent)
|
|
|
|
err = createDir(parentPathMeta)
|
|
|
|
if err != nil {
|
2021-11-04 18:12:57 +08:00
|
|
|
return "", fmt.Errorf("failed to create metadata cache item directory: %w", err)
|
2021-05-28 21:11:19 +08:00
|
|
|
}
|
2022-01-13 20:23:25 +08:00
|
|
|
return c.toOSPath(name), nil
|
2021-05-28 21:11:19 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
// getBackend gets a backend for a cache root dir
|
|
|
|
func getBackend(ctx context.Context, parentPath string, name string, relativeDirPath string) (fs.Fs, error) {
|
2024-04-22 21:36:38 +08:00
|
|
|
path := fmt.Sprintf(":local,encoding='%v':%s/%s/%s", encoder.OS, parentPath, name, relativeDirPath)
|
2021-05-28 21:11:19 +08:00
|
|
|
return fscache.Get(ctx, path)
|
|
|
|
}
|
|
|
|
|
|
|
|
// getBackends gets backends for all cache root dirs
|
|
|
|
func getBackends(ctx context.Context, parentPath string, relativeDirPath string) (fdata fs.Fs, fmeta fs.Fs, err error) {
|
|
|
|
if fdata, err = getBackend(ctx, parentPath, "vfs", relativeDirPath); err != nil {
|
2021-11-04 18:12:57 +08:00
|
|
|
err = fmt.Errorf("failed to get data cache backend: %w", err)
|
2021-05-28 21:11:19 +08:00
|
|
|
} else if fmeta, err = getBackend(ctx, parentPath, "vfsMeta", relativeDirPath); err != nil {
|
2021-11-04 18:12:57 +08:00
|
|
|
err = fmt.Errorf("failed to get metadata cache backend: %w", err)
|
2021-05-28 21:11:19 +08:00
|
|
|
}
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2020-03-01 02:08:22 +08:00
|
|
|
// clean returns the cleaned version of name for use in the index map
|
|
|
|
//
|
|
|
|
// name should be a remote path not an osPath
|
|
|
|
func clean(name string) string {
|
|
|
|
name = strings.Trim(name, "/")
|
|
|
|
name = path.Clean(name)
|
|
|
|
if name == "." || name == "/" {
|
|
|
|
name = ""
|
|
|
|
}
|
|
|
|
return name
|
|
|
|
}
|
|
|
|
|
2021-05-28 21:11:19 +08:00
|
|
|
// fromOSPath turns a OS path into a standard/remote path
|
|
|
|
func fromOSPath(osPath string) string {
|
|
|
|
return encoder.OS.ToStandardPath(filepath.ToSlash(osPath))
|
|
|
|
}
|
|
|
|
|
|
|
|
// toOSPath turns a standard/remote path into an OS path
|
|
|
|
func toOSPath(standardPath string) string {
|
|
|
|
return filepath.FromSlash(encoder.OS.FromStandardPath(standardPath))
|
|
|
|
}
|
|
|
|
|
2020-03-01 02:08:22 +08:00
|
|
|
// toOSPath turns a remote relative name into an OS path in the cache
|
|
|
|
func (c *Cache) toOSPath(name string) string {
|
2021-05-28 21:11:19 +08:00
|
|
|
return filepath.Join(c.root, toOSPath(name))
|
2020-03-01 02:08:22 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
// toOSPathMeta turns a remote relative name into an OS path in the
|
|
|
|
// cache for the metadata
|
|
|
|
func (c *Cache) toOSPathMeta(name string) string {
|
2021-05-28 21:11:19 +08:00
|
|
|
return filepath.Join(c.metaRoot, toOSPath(name))
|
2020-03-01 02:08:22 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
// _get gets name from the cache or creates a new one
|
|
|
|
//
|
|
|
|
// It returns the item and found as to whether this item was found in
|
|
|
|
// the cache (or just created).
|
|
|
|
//
|
|
|
|
// name should be a remote path not an osPath
|
|
|
|
//
|
|
|
|
// must be called with mu held
|
|
|
|
func (c *Cache) _get(name string) (item *Item, found bool) {
|
|
|
|
item = c.item[name]
|
|
|
|
found = item != nil
|
|
|
|
if !found {
|
|
|
|
item = newItem(c, name)
|
|
|
|
c.item[name] = item
|
|
|
|
}
|
|
|
|
return item, found
|
|
|
|
}
|
|
|
|
|
|
|
|
// put puts item under name in the cache
|
|
|
|
//
|
|
|
|
// It returns an old item if there was one or nil if not.
|
|
|
|
//
|
|
|
|
// name should be a remote path not an osPath
|
|
|
|
func (c *Cache) put(name string, item *Item) (oldItem *Item) {
|
|
|
|
name = clean(name)
|
|
|
|
c.mu.Lock()
|
|
|
|
oldItem = c.item[name]
|
|
|
|
if oldItem != item {
|
|
|
|
c.item[name] = item
|
|
|
|
} else {
|
|
|
|
oldItem = nil
|
|
|
|
}
|
|
|
|
c.mu.Unlock()
|
|
|
|
return oldItem
|
|
|
|
}
|
|
|
|
|
|
|
|
// InUse returns whether the name is in use in the cache
|
|
|
|
//
|
|
|
|
// name should be a remote path not an osPath
|
|
|
|
func (c *Cache) InUse(name string) bool {
|
|
|
|
name = clean(name)
|
|
|
|
c.mu.Lock()
|
|
|
|
item := c.item[name]
|
|
|
|
c.mu.Unlock()
|
|
|
|
if item == nil {
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
return item.inUse()
|
|
|
|
}
|
|
|
|
|
2021-03-13 00:15:28 +08:00
|
|
|
// DirtyItem returns the Item if it exists in the cache **and** is
|
|
|
|
// dirty otherwise it returns nil.
|
2020-04-17 18:18:58 +08:00
|
|
|
//
|
|
|
|
// name should be a remote path not an osPath
|
|
|
|
func (c *Cache) DirtyItem(name string) (item *Item) {
|
|
|
|
name = clean(name)
|
|
|
|
c.mu.Lock()
|
|
|
|
defer c.mu.Unlock()
|
|
|
|
item = c.item[name]
|
|
|
|
if item != nil && !item.IsDirty() {
|
|
|
|
item = nil
|
|
|
|
}
|
|
|
|
return item
|
|
|
|
}
|
|
|
|
|
2020-03-01 02:08:22 +08:00
|
|
|
// get gets a file name from the cache or creates a new one
|
|
|
|
//
|
|
|
|
// It returns the item and found as to whether this item was found in
|
|
|
|
// the cache (or just created).
|
|
|
|
//
|
|
|
|
// name should be a remote path not an osPath
|
|
|
|
func (c *Cache) get(name string) (item *Item, found bool) {
|
|
|
|
name = clean(name)
|
|
|
|
c.mu.Lock()
|
|
|
|
item, found = c._get(name)
|
|
|
|
c.mu.Unlock()
|
|
|
|
return item, found
|
|
|
|
}
|
|
|
|
|
|
|
|
// Item gets a cache item for name
|
|
|
|
//
|
2022-08-05 23:35:41 +08:00
|
|
|
// To use it item.Open will need to be called.
|
2020-03-01 02:08:22 +08:00
|
|
|
//
|
|
|
|
// name should be a remote path not an osPath
|
|
|
|
func (c *Cache) Item(name string) (item *Item) {
|
|
|
|
item, _ = c.get(name)
|
|
|
|
return item
|
|
|
|
}
|
|
|
|
|
2020-04-17 18:18:58 +08:00
|
|
|
// Exists checks to see if the file exists in the cache or not.
|
2020-03-01 02:08:22 +08:00
|
|
|
//
|
2020-04-17 18:18:58 +08:00
|
|
|
// This is done by bringing the item into the cache which will
|
|
|
|
// validate the backing file and metadata and then asking if the Item
|
|
|
|
// exists or not.
|
2020-03-01 02:08:22 +08:00
|
|
|
func (c *Cache) Exists(name string) bool {
|
2020-04-17 18:18:58 +08:00
|
|
|
item, _ := c.get(name)
|
|
|
|
return item.Exists()
|
2020-03-01 02:08:22 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
// rename with os.Rename and more checking
|
|
|
|
func rename(osOldPath, osNewPath string) error {
|
|
|
|
sfi, err := os.Stat(osOldPath)
|
|
|
|
if err != nil {
|
|
|
|
// Just do nothing if the source does not exist
|
|
|
|
if os.IsNotExist(err) {
|
|
|
|
return nil
|
|
|
|
}
|
2022-01-13 20:47:01 +08:00
|
|
|
return fmt.Errorf("failed to stat source: %s: %w", osOldPath, err)
|
2020-03-01 02:08:22 +08:00
|
|
|
}
|
|
|
|
if !sfi.Mode().IsRegular() {
|
|
|
|
// cannot copy non-regular files (e.g., directories, symlinks, devices, etc.)
|
2022-01-13 20:47:01 +08:00
|
|
|
return fmt.Errorf("non-regular source file: %s (%q)", sfi.Name(), sfi.Mode().String())
|
2020-03-01 02:08:22 +08:00
|
|
|
}
|
|
|
|
dfi, err := os.Stat(osNewPath)
|
|
|
|
if err != nil {
|
|
|
|
if !os.IsNotExist(err) {
|
2022-01-13 20:47:01 +08:00
|
|
|
return fmt.Errorf("failed to stat destination: %s: %w", osNewPath, err)
|
2020-03-01 02:08:22 +08:00
|
|
|
}
|
2022-01-13 20:33:39 +08:00
|
|
|
parent := vfscommon.OSFindParent(osNewPath)
|
2021-05-28 21:11:19 +08:00
|
|
|
err = createDir(parent)
|
2020-03-01 02:08:22 +08:00
|
|
|
if err != nil {
|
2022-01-13 20:47:01 +08:00
|
|
|
return fmt.Errorf("failed to create parent dir: %s: %w", parent, err)
|
2020-03-01 02:08:22 +08:00
|
|
|
}
|
|
|
|
} else {
|
|
|
|
if !(dfi.Mode().IsRegular()) {
|
2022-01-13 20:47:01 +08:00
|
|
|
return fmt.Errorf("non-regular destination file: %s (%q)", dfi.Name(), dfi.Mode().String())
|
2020-03-01 02:08:22 +08:00
|
|
|
}
|
|
|
|
if os.SameFile(sfi, dfi) {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if err = os.Rename(osOldPath, osNewPath); err != nil {
|
2022-01-13 20:47:01 +08:00
|
|
|
return fmt.Errorf("failed to rename in cache: %s to %s: %w", osOldPath, osNewPath, err)
|
2020-03-01 02:08:22 +08:00
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// Rename the item in cache
|
|
|
|
func (c *Cache) Rename(name string, newName string, newObj fs.Object) (err error) {
|
|
|
|
item, _ := c.get(name)
|
|
|
|
err = item.rename(name, newName, newObj)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
// Move the item in the cache
|
|
|
|
c.mu.Lock()
|
|
|
|
if item, ok := c.item[name]; ok {
|
|
|
|
c.item[newName] = item
|
|
|
|
delete(c.item, name)
|
|
|
|
}
|
|
|
|
c.mu.Unlock()
|
|
|
|
|
2020-07-06 23:06:42 +08:00
|
|
|
fs.Infof(name, "vfs cache: renamed in cache to %q", newName)
|
2020-03-01 02:08:22 +08:00
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2021-03-17 17:48:25 +08:00
|
|
|
// DirExists checks to see if the directory exists in the cache or not.
|
|
|
|
func (c *Cache) DirExists(name string) bool {
|
|
|
|
path := c.toOSPath(name)
|
|
|
|
_, err := os.Stat(path)
|
|
|
|
return err == nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// DirRename the dir in cache
|
|
|
|
func (c *Cache) DirRename(oldDirName string, newDirName string) (err error) {
|
|
|
|
// Make sure names are / suffixed for reading keys out of c.item
|
|
|
|
if !strings.HasSuffix(oldDirName, "/") {
|
|
|
|
oldDirName += "/"
|
|
|
|
}
|
|
|
|
if !strings.HasSuffix(newDirName, "/") {
|
|
|
|
newDirName += "/"
|
|
|
|
}
|
|
|
|
|
|
|
|
// Find all items to rename
|
|
|
|
var renames []string
|
|
|
|
c.mu.Lock()
|
|
|
|
for itemName := range c.item {
|
|
|
|
if strings.HasPrefix(itemName, oldDirName) {
|
|
|
|
renames = append(renames, itemName)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
c.mu.Unlock()
|
|
|
|
|
|
|
|
// Rename the items
|
|
|
|
for _, itemName := range renames {
|
|
|
|
newPath := newDirName + itemName[len(oldDirName):]
|
|
|
|
renameErr := c.Rename(itemName, newPath, nil)
|
|
|
|
if renameErr != nil {
|
|
|
|
err = renameErr
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Old path should be empty now so remove it
|
|
|
|
c.purgeEmptyDirs(oldDirName[:len(oldDirName)-1], false)
|
|
|
|
|
|
|
|
fs.Infof(oldDirName, "vfs cache: renamed dir in cache to %q", newDirName)
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2020-03-01 02:08:22 +08:00
|
|
|
// Remove should be called if name is deleted
|
2020-06-03 22:49:41 +08:00
|
|
|
//
|
|
|
|
// This returns true if the file was in the transfer queue so may not
|
Spelling fixes
Fix spelling of: above, already, anonymous, associated,
authentication, bandwidth, because, between, blocks, calculate,
candidates, cautious, changelog, cleaner, clipboard, command,
completely, concurrently, considered, constructs, corrupt, current,
daemon, dependencies, deprecated, directory, dispatcher, download,
eligible, ellipsis, encrypter, endpoint, entrieslist, essentially,
existing writers, existing, expires, filesystem, flushing, frequently,
hierarchy, however, implementation, implements, inaccurate,
individually, insensitive, longer, maximum, metadata, modified,
multipart, namedirfirst, nextcloud, obscured, opened, optional,
owncloud, pacific, passphrase, password, permanently, persimmon,
positive, potato, protocol, quota, receiving, recommends, referring,
requires, revisited, satisfied, satisfies, satisfy, semver,
serialized, session, storage, strategies, stringlist, successful,
supported, surprise, temporarily, temporary, transactions, unneeded,
update, uploads, wrapped
Signed-off-by: Josh Soref <jsoref@users.noreply.github.com>
2020-10-09 08:17:24 +08:00
|
|
|
// have completely uploaded yet.
|
2020-06-03 22:49:41 +08:00
|
|
|
func (c *Cache) Remove(name string) (wasWriting bool) {
|
2020-04-17 18:18:58 +08:00
|
|
|
name = clean(name)
|
|
|
|
c.mu.Lock()
|
2020-06-15 22:09:33 +08:00
|
|
|
item := c.item[name]
|
|
|
|
if item != nil {
|
|
|
|
delete(c.item, name)
|
|
|
|
}
|
2020-04-17 18:18:58 +08:00
|
|
|
c.mu.Unlock()
|
2020-06-15 22:09:33 +08:00
|
|
|
if item == nil {
|
|
|
|
return false
|
|
|
|
}
|
2020-06-03 22:49:41 +08:00
|
|
|
return item.remove("file deleted")
|
2020-03-01 02:08:22 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
// SetModTime should be called to set the modification time of the cache file
|
|
|
|
func (c *Cache) SetModTime(name string, modTime time.Time) {
|
|
|
|
item, _ := c.get(name)
|
|
|
|
item.setModTime(modTime)
|
|
|
|
}
|
|
|
|
|
|
|
|
// CleanUp empties the cache of everything
|
|
|
|
func (c *Cache) CleanUp() error {
|
|
|
|
err1 := os.RemoveAll(c.root)
|
|
|
|
err2 := os.RemoveAll(c.metaRoot)
|
|
|
|
if err1 != nil {
|
|
|
|
return err1
|
|
|
|
}
|
|
|
|
return err2
|
|
|
|
}
|
|
|
|
|
|
|
|
// walk walks the cache calling the function
|
|
|
|
func (c *Cache) walk(dir string, fn func(osPath string, fi os.FileInfo, name string) error) error {
|
|
|
|
return filepath.Walk(dir, func(osPath string, fi os.FileInfo, err error) error {
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
// Find path relative to the cache root
|
|
|
|
name, err := filepath.Rel(dir, osPath)
|
|
|
|
if err != nil {
|
2021-11-04 18:12:57 +08:00
|
|
|
return fmt.Errorf("filepath.Rel failed in walk: %w", err)
|
2020-03-01 02:08:22 +08:00
|
|
|
}
|
|
|
|
if name == "." {
|
|
|
|
name = ""
|
|
|
|
}
|
|
|
|
// And convert into slashes
|
|
|
|
name = filepath.ToSlash(name)
|
|
|
|
|
|
|
|
return fn(osPath, fi, name)
|
|
|
|
})
|
|
|
|
}
|
|
|
|
|
|
|
|
// reload walks the cache loading metadata files
|
2020-04-22 19:25:40 +08:00
|
|
|
//
|
|
|
|
// It iterates the files first then metadata trees. It doesn't expect
|
|
|
|
// to find any new items iterating the metadata but it will clear up
|
|
|
|
// orphan files.
|
|
|
|
func (c *Cache) reload(ctx context.Context) error {
|
|
|
|
for _, dir := range []string{c.root, c.metaRoot} {
|
|
|
|
err := c.walk(dir, func(osPath string, fi os.FileInfo, name string) error {
|
|
|
|
if fi.IsDir() {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
item, found := c.get(name)
|
|
|
|
if !found {
|
|
|
|
err := item.reload(ctx)
|
|
|
|
if err != nil {
|
|
|
|
fs.Errorf(name, "vfs cache: failed to reload item: %v", err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
})
|
|
|
|
if err != nil {
|
2021-11-04 18:12:57 +08:00
|
|
|
return fmt.Errorf("failed to walk cache %q: %w", dir, err)
|
2020-03-01 02:08:22 +08:00
|
|
|
}
|
|
|
|
}
|
2020-04-22 19:25:40 +08:00
|
|
|
return nil
|
2020-03-01 02:08:22 +08:00
|
|
|
}
|
|
|
|
|
2020-08-25 23:20:29 +08:00
|
|
|
// KickCleaner kicks cache cleaner upon out of space situation
|
|
|
|
func (c *Cache) KickCleaner() {
|
|
|
|
/* Use a separate kicker mutex for the kick to go through without waiting for the
|
|
|
|
cache mutex to avoid letting a thread kick again after the clearer just
|
|
|
|
finished cleaning and unlock the cache mutex. */
|
|
|
|
fs.Debugf(nil, "vfs cache: at the beginning of KickCleaner")
|
|
|
|
c.kickerMu.Lock()
|
|
|
|
if !c.cleanerKicked {
|
|
|
|
c.cleanerKicked = true
|
|
|
|
fs.Debugf(nil, "vfs cache: in KickCleaner, ready to lock cache mutex")
|
|
|
|
c.mu.Lock()
|
|
|
|
c.outOfSpace = true
|
|
|
|
fs.Logf(nil, "vfs cache: in KickCleaner, ready to kick cleaner")
|
|
|
|
c.kick <- struct{}{}
|
|
|
|
c.mu.Unlock()
|
|
|
|
}
|
|
|
|
c.kickerMu.Unlock()
|
|
|
|
|
|
|
|
c.mu.Lock()
|
2021-05-28 21:11:19 +08:00
|
|
|
for c.outOfSpace {
|
2020-08-25 23:20:29 +08:00
|
|
|
fs.Debugf(nil, "vfs cache: in KickCleaner, looping on c.outOfSpace")
|
|
|
|
c.cond.Wait()
|
|
|
|
}
|
|
|
|
fs.Debugf(nil, "vfs cache: in KickCleaner, leaving c.outOfSpace loop")
|
|
|
|
c.mu.Unlock()
|
2020-03-01 02:08:22 +08:00
|
|
|
}
|
|
|
|
|
2020-08-25 23:20:29 +08:00
|
|
|
// removeNotInUse removes items not in use with a possible maxAge cutoff
|
|
|
|
// called with cache mutex locked and up-to-date c.used (as we update it directly here)
|
|
|
|
func (c *Cache) removeNotInUse(item *Item, maxAge time.Duration, emptyOnly bool) {
|
|
|
|
removed, spaceFreed := item.RemoveNotInUse(maxAge, emptyOnly)
|
|
|
|
// The item space might be freed even if we get an error after the cache file is removed
|
|
|
|
// The item will not be removed or reset the cache data is dirty (DataDirty)
|
|
|
|
c.used -= spaceFreed
|
|
|
|
if removed {
|
|
|
|
fs.Infof(nil, "vfs cache RemoveNotInUse (maxAge=%d, emptyOnly=%v): item %s was removed, freed %d bytes", maxAge, emptyOnly, item.GetName(), spaceFreed)
|
|
|
|
// Remove the entry
|
|
|
|
delete(c.item, item.name)
|
|
|
|
} else {
|
2020-09-02 08:58:49 +08:00
|
|
|
fs.Debugf(nil, "vfs cache RemoveNotInUse (maxAge=%d, emptyOnly=%v): item %s not removed, freed %d bytes", maxAge, emptyOnly, item.GetName(), spaceFreed)
|
2020-08-25 23:20:29 +08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Retry failed resets during purgeClean()
|
|
|
|
func (c *Cache) retryFailedResets() {
|
Spelling fixes
Fix spelling of: above, already, anonymous, associated,
authentication, bandwidth, because, between, blocks, calculate,
candidates, cautious, changelog, cleaner, clipboard, command,
completely, concurrently, considered, constructs, corrupt, current,
daemon, dependencies, deprecated, directory, dispatcher, download,
eligible, ellipsis, encrypter, endpoint, entrieslist, essentially,
existing writers, existing, expires, filesystem, flushing, frequently,
hierarchy, however, implementation, implements, inaccurate,
individually, insensitive, longer, maximum, metadata, modified,
multipart, namedirfirst, nextcloud, obscured, opened, optional,
owncloud, pacific, passphrase, password, permanently, persimmon,
positive, potato, protocol, quota, receiving, recommends, referring,
requires, revisited, satisfied, satisfies, satisfy, semver,
serialized, session, storage, strategies, stringlist, successful,
supported, surprise, temporarily, temporary, transactions, unneeded,
update, uploads, wrapped
Signed-off-by: Josh Soref <jsoref@users.noreply.github.com>
2020-10-09 08:17:24 +08:00
|
|
|
// Some items may have failed to reset because there was not enough space
|
2020-08-25 23:20:29 +08:00
|
|
|
// for saving the cache item's metadata. Redo the Reset()'s here now that
|
|
|
|
// we may have some available space.
|
|
|
|
if len(c.errItems) != 0 {
|
|
|
|
fs.Debugf(nil, "vfs cache reset: before redoing reset errItems = %v", c.errItems)
|
|
|
|
for itemName := range c.errItems {
|
2020-09-15 16:36:17 +08:00
|
|
|
if retryItem, ok := c.item[itemName]; ok {
|
|
|
|
_, _, err := retryItem.Reset()
|
|
|
|
if err == nil || !fserrors.IsErrNoSpace(err) {
|
|
|
|
// TODO: not trying to handle non-ENOSPC errors yet
|
|
|
|
delete(c.errItems, itemName)
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
// The retry item was deleted because it was closed.
|
|
|
|
// No need to redo the failed reset now.
|
2020-08-25 23:20:29 +08:00
|
|
|
delete(c.errItems, itemName)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
fs.Debugf(nil, "vfs cache reset: after redoing reset errItems = %v", c.errItems)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2023-09-05 19:38:19 +08:00
|
|
|
// Remove cache files that are not dirty until the quota is satisfied
|
|
|
|
func (c *Cache) purgeClean() {
|
2020-03-01 02:08:22 +08:00
|
|
|
c.mu.Lock()
|
|
|
|
defer c.mu.Unlock()
|
2020-08-25 23:20:29 +08:00
|
|
|
|
2023-09-05 19:38:19 +08:00
|
|
|
if c.quotasOK() {
|
2020-08-25 23:20:29 +08:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2023-09-05 19:38:19 +08:00
|
|
|
var items Items
|
|
|
|
|
2020-08-25 23:20:29 +08:00
|
|
|
// Make a slice of clean cache files
|
|
|
|
for _, item := range c.item {
|
2021-04-26 21:16:12 +08:00
|
|
|
if !item.IsDirty() {
|
2020-08-25 23:20:29 +08:00
|
|
|
items = append(items, item)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
sort.Sort(items)
|
|
|
|
|
|
|
|
// Reset items until the quota is OK
|
|
|
|
for _, item := range items {
|
2023-09-05 19:38:19 +08:00
|
|
|
if c.quotasOK() {
|
2020-08-25 23:20:29 +08:00
|
|
|
break
|
|
|
|
}
|
|
|
|
resetResult, spaceFreed, err := item.Reset()
|
|
|
|
// The item space might be freed even if we get an error after the cache file is removed
|
|
|
|
// The item will not be removed or reset if the cache data is dirty (DataDirty)
|
|
|
|
c.used -= spaceFreed
|
|
|
|
fs.Infof(nil, "vfs cache purgeClean item.Reset %s: %s, freed %d bytes", item.GetName(), resetResult.String(), spaceFreed)
|
|
|
|
if resetResult == RemovedNotInUse {
|
|
|
|
delete(c.item, item.name)
|
|
|
|
}
|
|
|
|
if err != nil {
|
|
|
|
fs.Errorf(nil, "vfs cache purgeClean item.Reset %s reset failed, err = %v, freed %d bytes", item.GetName(), err, spaceFreed)
|
|
|
|
c.errItems[item.name] = err
|
2020-03-01 02:08:22 +08:00
|
|
|
}
|
|
|
|
}
|
2020-08-25 23:20:29 +08:00
|
|
|
|
2023-03-25 15:10:16 +08:00
|
|
|
// Reset outOfSpace without checking whether we have reduced cache space below the quota.
|
2020-08-25 23:20:29 +08:00
|
|
|
// This allows some files to reduce their pendingAccesses count to allow them to be reset
|
|
|
|
// in the next iteration of the purge cleaner loop.
|
|
|
|
|
|
|
|
c.outOfSpace = false
|
|
|
|
c.cond.Broadcast()
|
|
|
|
}
|
|
|
|
|
|
|
|
// purgeOld gets rid of any files that are over age
|
|
|
|
func (c *Cache) purgeOld(maxAge time.Duration) {
|
|
|
|
c.mu.Lock()
|
|
|
|
defer c.mu.Unlock()
|
|
|
|
// cutoff := time.Now().Add(-maxAge)
|
|
|
|
for _, item := range c.item {
|
|
|
|
c.removeNotInUse(item, maxAge, false)
|
|
|
|
}
|
2023-09-05 19:38:19 +08:00
|
|
|
if c.quotasOK() {
|
2020-08-25 23:20:29 +08:00
|
|
|
c.outOfSpace = false
|
|
|
|
c.cond.Broadcast()
|
|
|
|
}
|
2020-03-01 02:08:22 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
// Purge any empty directories
|
2021-03-17 17:48:25 +08:00
|
|
|
func (c *Cache) purgeEmptyDirs(dir string, leaveRoot bool) {
|
2020-03-01 02:08:22 +08:00
|
|
|
ctx := context.Background()
|
2021-03-17 17:48:25 +08:00
|
|
|
err := operations.Rmdirs(ctx, c.fcache, dir, leaveRoot)
|
2020-03-01 02:08:22 +08:00
|
|
|
if err != nil {
|
2021-03-17 17:48:25 +08:00
|
|
|
fs.Errorf(c.fcache, "vfs cache: failed to remove empty directories from cache path %q: %v", dir, err)
|
2020-03-01 02:08:22 +08:00
|
|
|
}
|
2021-03-17 17:48:25 +08:00
|
|
|
err = operations.Rmdirs(ctx, c.fcacheMeta, dir, leaveRoot)
|
2020-03-01 02:08:22 +08:00
|
|
|
if err != nil {
|
2021-03-17 17:48:25 +08:00
|
|
|
fs.Errorf(c.fcache, "vfs cache: failed to remove empty directories from metadata cache path %q: %v", dir, err)
|
2020-03-01 02:08:22 +08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// updateUsed updates c.used so it is accurate
|
2020-08-25 23:20:29 +08:00
|
|
|
func (c *Cache) updateUsed() (used int64) {
|
2020-03-01 02:08:22 +08:00
|
|
|
c.mu.Lock()
|
|
|
|
defer c.mu.Unlock()
|
|
|
|
|
|
|
|
newUsed := int64(0)
|
|
|
|
for _, item := range c.item {
|
|
|
|
newUsed += item.getDiskSize()
|
|
|
|
}
|
|
|
|
c.used = newUsed
|
2020-08-25 23:20:29 +08:00
|
|
|
return newUsed
|
2020-03-01 02:08:22 +08:00
|
|
|
}
|
|
|
|
|
2023-09-05 19:38:19 +08:00
|
|
|
// Check the available space for a disk is in limits.
|
|
|
|
func (c *Cache) minFreeSpaceQuotaOK() bool {
|
|
|
|
if c.opt.CacheMinFreeSpace <= 0 {
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
du, err := diskusage.New(config.GetCacheDir())
|
|
|
|
if err == diskusage.ErrUnsupported {
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
if err != nil {
|
|
|
|
fs.Errorf(nil, "disk usage returned error: %v", err)
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
return du.Available >= uint64(c.opt.CacheMinFreeSpace)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Check the available quota for a disk is in limits.
|
|
|
|
//
|
|
|
|
// must be called with mu held.
|
|
|
|
func (c *Cache) maxSizeQuotaOK() bool {
|
|
|
|
if c.opt.CacheMaxSize <= 0 {
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
return c.used <= int64(c.opt.CacheMaxSize)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Check the available quotas for a disk is in limits.
|
|
|
|
//
|
|
|
|
// must be called with mu held.
|
|
|
|
func (c *Cache) quotasOK() bool {
|
|
|
|
return c.maxSizeQuotaOK() && c.minFreeSpaceQuotaOK()
|
|
|
|
}
|
|
|
|
|
|
|
|
// Return true if any quotas set
|
|
|
|
func (c *Cache) haveQuotas() bool {
|
|
|
|
return c.opt.CacheMaxSize > 0 || c.opt.CacheMinFreeSpace > 0
|
|
|
|
}
|
|
|
|
|
2020-08-25 23:20:29 +08:00
|
|
|
// Remove clean cache files that are not open until the total space
|
|
|
|
// is reduced below quota starting from the oldest first
|
2023-09-05 19:38:19 +08:00
|
|
|
func (c *Cache) purgeOverQuota() {
|
2020-03-01 02:08:22 +08:00
|
|
|
c.updateUsed()
|
|
|
|
|
|
|
|
c.mu.Lock()
|
|
|
|
defer c.mu.Unlock()
|
|
|
|
|
2023-09-05 19:38:19 +08:00
|
|
|
if c.quotasOK() {
|
2020-03-01 02:08:22 +08:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
var items Items
|
|
|
|
|
|
|
|
// Make a slice of unused files
|
|
|
|
for _, item := range c.item {
|
|
|
|
if !item.inUse() {
|
|
|
|
items = append(items, item)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
sort.Sort(items)
|
|
|
|
|
|
|
|
// Remove items until the quota is OK
|
|
|
|
for _, item := range items {
|
2023-09-05 19:38:19 +08:00
|
|
|
c.removeNotInUse(item, 0, c.quotasOK())
|
2020-08-25 23:20:29 +08:00
|
|
|
}
|
2023-09-05 19:38:19 +08:00
|
|
|
if c.quotasOK() {
|
2020-08-25 23:20:29 +08:00
|
|
|
c.outOfSpace = false
|
|
|
|
c.cond.Broadcast()
|
2020-03-01 02:08:22 +08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// clean empties the cache of stuff if it can
|
2021-04-24 15:50:48 +08:00
|
|
|
func (c *Cache) clean(kicked bool) {
|
2020-03-01 02:08:22 +08:00
|
|
|
// Cache may be empty so end
|
|
|
|
_, err := os.Stat(c.root)
|
|
|
|
if os.IsNotExist(err) {
|
|
|
|
return
|
|
|
|
}
|
2020-10-05 17:00:00 +08:00
|
|
|
c.updateUsed()
|
2020-03-01 02:08:22 +08:00
|
|
|
c.mu.Lock()
|
|
|
|
oldItems, oldUsed := len(c.item), fs.SizeSuffix(c.used)
|
|
|
|
c.mu.Unlock()
|
|
|
|
|
2022-07-29 00:43:05 +08:00
|
|
|
// Remove any files that are over age
|
2024-07-03 00:31:51 +08:00
|
|
|
c.purgeOld(time.Duration(c.opt.CacheMaxAge))
|
2020-08-25 23:20:29 +08:00
|
|
|
|
2022-07-29 00:43:05 +08:00
|
|
|
// If have a maximum cache size...
|
2023-09-05 19:38:19 +08:00
|
|
|
if c.haveQuotas() {
|
2022-07-29 00:43:05 +08:00
|
|
|
// Remove files not in use until cache size is below quota starting from the oldest first
|
2023-09-05 19:38:19 +08:00
|
|
|
c.purgeOverQuota()
|
2020-08-25 23:20:29 +08:00
|
|
|
|
2021-04-24 15:50:48 +08:00
|
|
|
// Remove cache files that are not dirty if we are still above the max cache size
|
2023-09-05 19:38:19 +08:00
|
|
|
c.purgeClean()
|
2021-04-24 15:50:48 +08:00
|
|
|
c.retryFailedResets()
|
2020-08-25 23:20:29 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
// Was kicked?
|
2021-04-24 15:50:48 +08:00
|
|
|
if kicked {
|
2020-08-25 23:20:29 +08:00
|
|
|
c.kickerMu.Lock() // Make sure this is called with cache mutex unlocked
|
2023-03-25 15:10:16 +08:00
|
|
|
// Re-enable io threads to kick me
|
2020-08-25 23:20:29 +08:00
|
|
|
c.cleanerKicked = false
|
|
|
|
c.kickerMu.Unlock()
|
|
|
|
}
|
2020-03-01 02:08:22 +08:00
|
|
|
|
|
|
|
// Stats
|
|
|
|
c.mu.Lock()
|
|
|
|
newItems, newUsed := len(c.item), fs.SizeSuffix(c.used)
|
2020-04-22 19:25:40 +08:00
|
|
|
totalInUse := 0
|
|
|
|
for _, item := range c.item {
|
|
|
|
if item.inUse() {
|
|
|
|
totalInUse++
|
|
|
|
}
|
|
|
|
}
|
2020-03-01 02:08:22 +08:00
|
|
|
c.mu.Unlock()
|
2020-06-22 23:31:08 +08:00
|
|
|
uploadsInProgress, uploadsQueued := c.writeback.Stats()
|
2020-03-01 02:08:22 +08:00
|
|
|
|
2020-10-05 18:31:01 +08:00
|
|
|
stats := fmt.Sprintf("objects %d (was %d) in use %d, to upload %d, uploading %d, total size %v (was %v)",
|
|
|
|
newItems, oldItems, totalInUse, uploadsQueued, uploadsInProgress, newUsed, oldUsed)
|
|
|
|
fs.Infof(nil, "vfs cache: cleaned: %s", stats)
|
2023-11-29 17:25:30 +08:00
|
|
|
if err = systemd.UpdateStatus(fmt.Sprintf("[%s] vfs cache: %s", time.Now().Format("15:04"), stats)); err != nil {
|
2020-10-05 18:31:01 +08:00
|
|
|
fs.Errorf(nil, "vfs cache: updating systemd status with current stats failed: %s", err)
|
|
|
|
}
|
2020-03-01 02:08:22 +08:00
|
|
|
}
|
|
|
|
|
2020-08-25 23:20:29 +08:00
|
|
|
// cleaner calls clean at regular intervals and upon being kicked for out-of-space condition
|
2020-03-01 02:08:22 +08:00
|
|
|
//
|
|
|
|
// doesn't return until context is cancelled
|
|
|
|
func (c *Cache) cleaner(ctx context.Context) {
|
|
|
|
if c.opt.CachePollInterval <= 0 {
|
2020-07-06 23:06:42 +08:00
|
|
|
fs.Debugf(nil, "vfs cache: cleaning thread disabled because poll interval <= 0")
|
2020-03-01 02:08:22 +08:00
|
|
|
return
|
|
|
|
}
|
|
|
|
// Start cleaning the cache immediately
|
2020-08-25 23:20:29 +08:00
|
|
|
c.clean(false)
|
2020-03-01 02:08:22 +08:00
|
|
|
// Then every interval specified
|
2024-07-03 00:31:51 +08:00
|
|
|
timer := time.NewTicker(time.Duration(c.opt.CachePollInterval))
|
2020-03-01 02:08:22 +08:00
|
|
|
defer timer.Stop()
|
|
|
|
for {
|
|
|
|
select {
|
2020-08-25 23:20:29 +08:00
|
|
|
case <-c.kick: // a thread encountering ENOSPC kicked me
|
2021-04-24 15:50:48 +08:00
|
|
|
c.clean(true) // kicked is true
|
2020-03-01 02:08:22 +08:00
|
|
|
case <-timer.C:
|
2021-04-24 15:50:48 +08:00
|
|
|
c.clean(false) // timer driven cache poll, kicked is false
|
2020-03-01 02:08:22 +08:00
|
|
|
case <-ctx.Done():
|
2020-07-06 23:06:42 +08:00
|
|
|
fs.Debugf(nil, "vfs cache: cleaner exiting")
|
2020-03-01 02:08:22 +08:00
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-04-17 18:18:58 +08:00
|
|
|
// TotalInUse returns the number of items in the cache which are InUse
|
|
|
|
func (c *Cache) TotalInUse() (n int) {
|
|
|
|
c.mu.Lock()
|
|
|
|
defer c.mu.Unlock()
|
|
|
|
for _, item := range c.item {
|
|
|
|
if item.inUse() {
|
|
|
|
n++
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return n
|
|
|
|
}
|
|
|
|
|
|
|
|
// Dump the cache into a string for debugging purposes
|
|
|
|
func (c *Cache) Dump() string {
|
|
|
|
if c == nil {
|
|
|
|
return "Cache: <nil>\n"
|
|
|
|
}
|
|
|
|
c.mu.Lock()
|
|
|
|
defer c.mu.Unlock()
|
|
|
|
var out strings.Builder
|
|
|
|
out.WriteString("Cache{\n")
|
|
|
|
for name, item := range c.item {
|
|
|
|
fmt.Fprintf(&out, "\t%q: %+v,\n", name, item)
|
|
|
|
}
|
|
|
|
out.WriteString("}\n")
|
|
|
|
return out.String()
|
2020-03-01 02:08:22 +08:00
|
|
|
}
|
2020-06-23 22:18:58 +08:00
|
|
|
|
|
|
|
// AddVirtual adds a virtual directory entry by calling the addVirtual
|
|
|
|
// callback if one has been registered.
|
|
|
|
func (c *Cache) AddVirtual(remote string, size int64, isDir bool) error {
|
|
|
|
if c.avFn == nil {
|
|
|
|
return errors.New("no AddVirtual function registered")
|
|
|
|
}
|
|
|
|
return c.avFn(remote, size, isDir)
|
|
|
|
}
|