2
2
mirror of https://github.com/octoleo/restic.git synced 2024-12-22 19:08:55 +00:00

Concurrent Restorer.VerifyFiles

Time to verify a 2GB snapshot down from 9.726s to 4.645s (-52%).
This commit is contained in:
greatroar 2020-02-20 11:38:44 +01:00 committed by Michael Eischer
parent 556424d61b
commit bb066cf7d3
2 changed files with 103 additions and 43 deletions

View File

@ -0,0 +1,7 @@
Enhancement: Speed up restic restore --verify
The --verify option causes restic restore to do some verification after it
has restored from a snapshot. This verification now runs up to 52% faster,
depending on the exact setup.
https://github.com/restic/restic/pull/2594

View File

@ -4,13 +4,14 @@ import (
"context" "context"
"os" "os"
"path/filepath" "path/filepath"
"sync/atomic"
"github.com/restic/chunker"
"github.com/restic/restic/internal/errors"
"github.com/restic/restic/internal/debug" "github.com/restic/restic/internal/debug"
"github.com/restic/restic/internal/errors"
"github.com/restic/restic/internal/fs" "github.com/restic/restic/internal/fs"
"github.com/restic/restic/internal/restic" "github.com/restic/restic/internal/restic"
"golang.org/x/sync/errgroup"
) )
// Restorer is used to restore a snapshot to a directory. // Restorer is used to restore a snapshot to a directory.
@ -311,58 +312,110 @@ func (res *Restorer) Snapshot() *restic.Snapshot {
return res.sn return res.sn
} }
// Number of workers in VerifyFiles.
const nVerifyWorkers = 8
// VerifyFiles checks whether all regular files in the snapshot res.sn // VerifyFiles checks whether all regular files in the snapshot res.sn
// have been successfully written to dst. It stops when it encounters an // have been successfully written to dst. It stops when it encounters an
// error. It returns that error and the number of files it has checked, // error. It returns that error and the number of files it has checked,
// including the file(s) that caused errors. // including the file(s) that caused errors.
func (res *Restorer) VerifyFiles(ctx context.Context, dst string) (int, error) { func (res *Restorer) VerifyFiles(ctx context.Context, dst string) (int, error) {
// TODO multithreaded? type mustCheck struct {
node *restic.Node
path string
}
var ( var (
buf = make([]byte, 0, chunker.MaxSize) nchecked uint64
count = 0 work = make(chan mustCheck, 2*nVerifyWorkers)
) )
_, err := res.traverseTree(ctx, dst, string(filepath.Separator), *res.sn.Tree, treeVisitor{ g, ctx := errgroup.WithContext(ctx)
enterDir: func(node *restic.Node, target, location string) error { return nil },
visitNode: func(node *restic.Node, target, location string) error {
if node.Type != "file" {
return nil
}
count++ // Traverse tree and send jobs to work.
stat, err := os.Stat(target) g.Go(func() error {
if err != nil { defer close(work)
return err
}
if int64(node.Size) != stat.Size() {
return errors.Errorf("Invalid file size: expected %d got %d", node.Size, stat.Size())
}
file, err := os.Open(target) _, err := res.traverseTree(ctx, dst, string(filepath.Separator), *res.sn.Tree, treeVisitor{
if err != nil { enterDir: func(node *restic.Node, target, location string) error { return nil },
return err visitNode: func(node *restic.Node, target, location string) error {
} if node.Type != "file" {
return nil
offset := int64(0)
for _, blobID := range node.Content {
length, _ := res.repo.LookupBlobSize(blobID, restic.DataBlob)
buf = buf[:length]
_, err = file.ReadAt(buf, offset)
if err != nil {
_ = file.Close()
return err
} }
if !blobID.Equal(restic.Hash(buf)) { select {
_ = file.Close() case <-ctx.Done():
return errors.Errorf("Unexpected contents starting at offset %d", offset) return ctx.Err()
case work <- mustCheck{node, target}:
return nil
} }
offset += int64(length) },
} leaveDir: func(node *restic.Node, target, location string) error { return nil },
})
return file.Close() return err
},
leaveDir: func(node *restic.Node, target, location string) error { return nil },
}) })
return count, err for i := 0; i < nVerifyWorkers; i++ {
g.Go(func() (err error) {
var buf []byte
for job := range work {
atomic.AddUint64(&nchecked, 1)
buf, err = res.verifyFile(job.path, job.node, buf)
if err != nil {
break
}
}
return
})
}
return int(nchecked), g.Wait()
}
// Verify that the file target has the contents of node.
// buf and the first return value are scratch space, passed around for reuse.
func (res *Restorer) verifyFile(target string, node *restic.Node, buf []byte) ([]byte, error) {
f, err := os.Open(target)
if err != nil {
return buf, err
}
defer f.Close()
fi, err := f.Stat()
switch {
case err != nil:
return nil, err
case int64(node.Size) != fi.Size():
return buf, errors.Errorf("Invalid file size for %s: expected %d, got %d",
target, node.Size, fi.Size())
}
var offset int64
for _, blobID := range node.Content {
length, found := res.repo.LookupBlobSize(blobID, restic.DataBlob)
if !found {
return buf, errors.Errorf("Unable to fetch blob %s", blobID)
}
if length > uint(cap(buf)) {
newcap := uint(2 * cap(buf))
if newcap < length {
newcap = length
}
buf = make([]byte, newcap)
}
buf = buf[:length]
_, err = f.ReadAt(buf, offset)
if err != nil {
return buf, err
}
if !blobID.Equal(restic.Hash(buf)) {
return buf, errors.Errorf(
"Unexpected content in %s, starting at offset %d",
target, offset)
}
offset += int64(length)
}
return buf, nil
} }