controller.go 12 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388
  1. package embedding
  2. import (
  3. "bytes"
  4. "encoding/json"
  5. "errors"
  6. "fmt"
  7. "github.com/ente-io/museum/pkg/utils/array"
  8. "strconv"
  9. "sync"
  10. "github.com/aws/aws-sdk-go/aws"
  11. "github.com/aws/aws-sdk-go/service/s3"
  12. "github.com/aws/aws-sdk-go/service/s3/s3manager"
  13. "github.com/ente-io/museum/ente"
  14. "github.com/ente-io/museum/pkg/controller"
  15. "github.com/ente-io/museum/pkg/controller/access"
  16. "github.com/ente-io/museum/pkg/repo"
  17. "github.com/ente-io/museum/pkg/repo/embedding"
  18. "github.com/ente-io/museum/pkg/utils/auth"
  19. "github.com/ente-io/museum/pkg/utils/network"
  20. "github.com/ente-io/museum/pkg/utils/s3config"
  21. "github.com/ente-io/museum/pkg/utils/time"
  22. "github.com/ente-io/stacktrace"
  23. "github.com/gin-gonic/gin"
  24. log "github.com/sirupsen/logrus"
  25. )
  26. type Controller struct {
  27. Repo *embedding.Repository
  28. AccessCtrl access.Controller
  29. ObjectCleanupController *controller.ObjectCleanupController
  30. S3Config *s3config.S3Config
  31. QueueRepo *repo.QueueRepository
  32. TaskLockingRepo *repo.TaskLockRepository
  33. FileRepo *repo.FileRepository
  34. CollectionRepo *repo.CollectionRepository
  35. HostName string
  36. cleanupCronRunning bool
  37. }
  38. func (c *Controller) InsertOrUpdate(ctx *gin.Context, req ente.InsertOrUpdateEmbeddingRequest) (*ente.Embedding, error) {
  39. userID := auth.GetUserID(ctx.Request.Header)
  40. err := c.AccessCtrl.VerifyFileOwnership(ctx, &access.VerifyFileOwnershipParams{
  41. ActorUserId: userID,
  42. FileIDs: []int64{req.FileID},
  43. })
  44. if err != nil {
  45. return nil, stacktrace.Propagate(err, "User does not own file")
  46. }
  47. count, err := c.CollectionRepo.GetCollectionCount(req.FileID)
  48. if err != nil {
  49. return nil, stacktrace.Propagate(err, "")
  50. }
  51. if count < 1 {
  52. return nil, stacktrace.Propagate(ente.ErrNotFound, "")
  53. }
  54. version := 1
  55. if req.Version != nil {
  56. version = *req.Version
  57. }
  58. obj := ente.EmbeddingObject{
  59. Version: version,
  60. EncryptedEmbedding: req.EncryptedEmbedding,
  61. DecryptionHeader: req.DecryptionHeader,
  62. Client: network.GetPrettyUA(ctx.GetHeader("User-Agent")) + "/" + ctx.GetHeader("X-Client-Version"),
  63. }
  64. size, uploadErr := c.uploadObject(obj, c.getObjectKey(userID, req.FileID, req.Model))
  65. if uploadErr != nil {
  66. log.Error(uploadErr)
  67. return nil, stacktrace.Propagate(uploadErr, "")
  68. }
  69. embedding, err := c.Repo.InsertOrUpdate(ctx, userID, req, size, version)
  70. embedding.Version = &version
  71. if err != nil {
  72. return nil, stacktrace.Propagate(err, "")
  73. }
  74. return &embedding, nil
  75. }
  76. func (c *Controller) GetDiff(ctx *gin.Context, req ente.GetEmbeddingDiffRequest) ([]ente.Embedding, error) {
  77. userID := auth.GetUserID(ctx.Request.Header)
  78. if req.Model == "" {
  79. req.Model = ente.GgmlClip
  80. }
  81. embeddings, err := c.Repo.GetDiff(ctx, userID, req.Model, *req.SinceTime, req.Limit)
  82. if err != nil {
  83. return nil, stacktrace.Propagate(err, "")
  84. }
  85. // Collect object keys for embeddings with missing data
  86. var objectKeys []string
  87. for i := range embeddings {
  88. if embeddings[i].EncryptedEmbedding == "" {
  89. objectKey := c.getObjectKey(userID, embeddings[i].FileID, embeddings[i].Model)
  90. objectKeys = append(objectKeys, objectKey)
  91. }
  92. }
  93. // Fetch missing embeddings in parallel
  94. if len(objectKeys) > 0 {
  95. embeddingObjects, err := c.getEmbeddingObjectsParallel(objectKeys)
  96. if err != nil {
  97. return nil, stacktrace.Propagate(err, "")
  98. }
  99. // Populate missing data in embeddings from fetched objects
  100. for i, obj := range embeddingObjects {
  101. for j := range embeddings {
  102. if embeddings[j].EncryptedEmbedding == "" && c.getObjectKey(userID, embeddings[j].FileID, embeddings[j].Model) == objectKeys[i] {
  103. embeddings[j].EncryptedEmbedding = obj.EncryptedEmbedding
  104. embeddings[j].DecryptionHeader = obj.DecryptionHeader
  105. }
  106. }
  107. }
  108. }
  109. return embeddings, nil
  110. }
  111. func (c *Controller) GetFilesEmbedding(ctx *gin.Context, req ente.GetFilesEmbeddingRequest) (*ente.GetFilesEmbeddingResponse, error) {
  112. userID := auth.GetUserID(ctx.Request.Header)
  113. if err := c._validateGetFileEmbeddingsRequest(ctx, userID, req); err != nil {
  114. return nil, stacktrace.Propagate(err, "")
  115. }
  116. userFileEmbeddings, err := c.Repo.GetFilesEmbedding(ctx, userID, req.Model, req.FileIDs)
  117. if err != nil {
  118. return nil, stacktrace.Propagate(err, "")
  119. }
  120. dbFileIds := make([]int64, 0)
  121. for _, embedding := range userFileEmbeddings {
  122. dbFileIds = append(dbFileIds, embedding.FileID)
  123. }
  124. missingFileIds := array.FindMissingElementsInSecondList(req.FileIDs, dbFileIds)
  125. errFileIds := make([]int64, 0)
  126. // Fetch missing userFileEmbeddings in parallel
  127. embeddingObjects, err := c.getEmbeddingObjectsParallelV2(userID, userFileEmbeddings)
  128. if err != nil {
  129. return nil, stacktrace.Propagate(err, "")
  130. }
  131. fetchedEmbeddings := make([]ente.Embedding, 0)
  132. // Populate missing data in userFileEmbeddings from fetched objects
  133. for _, obj := range embeddingObjects {
  134. if obj.err != nil {
  135. errFileIds = append(errFileIds, obj.dbEmbeddingRow.FileID)
  136. } else {
  137. fetchedEmbeddings = append(fetchedEmbeddings, ente.Embedding{
  138. FileID: obj.dbEmbeddingRow.FileID,
  139. Model: obj.dbEmbeddingRow.Model,
  140. EncryptedEmbedding: obj.embeddingObject.EncryptedEmbedding,
  141. DecryptionHeader: obj.embeddingObject.DecryptionHeader,
  142. UpdatedAt: obj.dbEmbeddingRow.UpdatedAt,
  143. Version: obj.dbEmbeddingRow.Version,
  144. })
  145. }
  146. }
  147. return &ente.GetFilesEmbeddingResponse{
  148. Embeddings: fetchedEmbeddings,
  149. NoDataFileIDs: missingFileIds,
  150. ErrFileIDs: errFileIds,
  151. }, nil
  152. }
  153. func (c *Controller) DeleteAll(ctx *gin.Context) error {
  154. userID := auth.GetUserID(ctx.Request.Header)
  155. err := c.Repo.DeleteAll(ctx, userID)
  156. if err != nil {
  157. return stacktrace.Propagate(err, "")
  158. }
  159. return nil
  160. }
  161. // CleanupDeletedEmbeddings clears all embeddings for deleted files from the object store
  162. func (c *Controller) CleanupDeletedEmbeddings() {
  163. log.Info("Cleaning up deleted embeddings")
  164. if c.cleanupCronRunning {
  165. log.Info("Skipping CleanupDeletedEmbeddings cron run as another instance is still running")
  166. return
  167. }
  168. c.cleanupCronRunning = true
  169. defer func() {
  170. c.cleanupCronRunning = false
  171. }()
  172. items, err := c.QueueRepo.GetItemsReadyForDeletion(repo.DeleteEmbeddingsQueue, 200)
  173. if err != nil {
  174. log.WithError(err).Error("Failed to fetch items from queue")
  175. return
  176. }
  177. for _, i := range items {
  178. c.deleteEmbedding(i)
  179. }
  180. }
  181. func (c *Controller) deleteEmbedding(qItem repo.QueueItem) {
  182. lockName := fmt.Sprintf("Embedding:%s", qItem.Item)
  183. lockStatus, err := c.TaskLockingRepo.AcquireLock(lockName, time.MicrosecondsAfterHours(1), c.HostName)
  184. ctxLogger := log.WithField("item", qItem.Item).WithField("queue_id", qItem.Id)
  185. if err != nil || !lockStatus {
  186. ctxLogger.Warn("unable to acquire lock")
  187. return
  188. }
  189. defer func() {
  190. err = c.TaskLockingRepo.ReleaseLock(lockName)
  191. if err != nil {
  192. ctxLogger.Errorf("Error while releasing lock %s", err)
  193. }
  194. }()
  195. ctxLogger.Info("Deleting all embeddings")
  196. fileID, _ := strconv.ParseInt(qItem.Item, 10, 64)
  197. ownerID, err := c.FileRepo.GetOwnerID(fileID)
  198. if err != nil {
  199. ctxLogger.WithError(err).Error("Failed to fetch ownerID")
  200. return
  201. }
  202. prefix := c.getEmbeddingObjectPrefix(ownerID, fileID)
  203. err = c.ObjectCleanupController.DeleteAllObjectsWithPrefix(prefix, c.S3Config.GetHotDataCenter())
  204. if err != nil {
  205. ctxLogger.WithError(err).Error("Failed to delete all objects")
  206. return
  207. }
  208. err = c.Repo.Delete(fileID)
  209. if err != nil {
  210. ctxLogger.WithError(err).Error("Failed to remove from db")
  211. return
  212. }
  213. err = c.QueueRepo.DeleteItem(repo.DeleteEmbeddingsQueue, qItem.Item)
  214. if err != nil {
  215. ctxLogger.WithError(err).Error("Failed to remove item from the queue")
  216. return
  217. }
  218. ctxLogger.Info("Successfully deleted all embeddings")
  219. }
  220. func (c *Controller) getObjectKey(userID int64, fileID int64, model string) string {
  221. return c.getEmbeddingObjectPrefix(userID, fileID) + model + ".json"
  222. }
  223. func (c *Controller) getEmbeddingObjectPrefix(userID int64, fileID int64) string {
  224. return strconv.FormatInt(userID, 10) + "/ml-data/" + strconv.FormatInt(fileID, 10) + "/"
  225. }
  226. // uploadObject uploads the embedding object to the object store and returns the object size
  227. func (c *Controller) uploadObject(obj ente.EmbeddingObject, key string) (int, error) {
  228. embeddingObj, _ := json.Marshal(obj)
  229. uploader := s3manager.NewUploaderWithClient(c.S3Config.GetHotS3Client())
  230. up := s3manager.UploadInput{
  231. Bucket: c.S3Config.GetHotBucket(),
  232. Key: &key,
  233. Body: bytes.NewReader(embeddingObj),
  234. }
  235. result, err := uploader.Upload(&up)
  236. if err != nil {
  237. log.Error(err)
  238. return -1, stacktrace.Propagate(err, "")
  239. }
  240. log.Infof("Uploaded to bucket %s", result.Location)
  241. return len(embeddingObj), nil
  242. }
  243. var globalDiffFetchSemaphore = make(chan struct{}, 300)
  244. var globalFileFetchSemaphore = make(chan struct{}, 400)
  245. func (c *Controller) getEmbeddingObjectsParallel(objectKeys []string) ([]ente.EmbeddingObject, error) {
  246. var wg sync.WaitGroup
  247. var errs []error
  248. embeddingObjects := make([]ente.EmbeddingObject, len(objectKeys))
  249. downloader := s3manager.NewDownloaderWithClient(c.S3Config.GetHotS3Client())
  250. for i, objectKey := range objectKeys {
  251. wg.Add(1)
  252. globalDiffFetchSemaphore <- struct{}{} // Acquire from global semaphore
  253. go func(i int, objectKey string) {
  254. defer wg.Done()
  255. defer func() { <-globalDiffFetchSemaphore }() // Release back to global semaphore
  256. obj, err := c.getEmbeddingObject(objectKey, downloader)
  257. if err != nil {
  258. errs = append(errs, err)
  259. log.Error("error fetching embedding object: "+objectKey, err)
  260. } else {
  261. embeddingObjects[i] = obj
  262. }
  263. }(i, objectKey)
  264. }
  265. wg.Wait()
  266. if len(errs) > 0 {
  267. return nil, stacktrace.Propagate(errors.New("failed to fetch some objects"), "")
  268. }
  269. return embeddingObjects, nil
  270. }
  271. type embeddingObjectResult struct {
  272. embeddingObject ente.EmbeddingObject
  273. dbEmbeddingRow ente.Embedding
  274. err error
  275. }
  276. func (c *Controller) getEmbeddingObjectsParallelV2(userID int64, dbEmbeddingRows []ente.Embedding) ([]embeddingObjectResult, error) {
  277. var wg sync.WaitGroup
  278. embeddingObjects := make([]embeddingObjectResult, len(dbEmbeddingRows))
  279. downloader := s3manager.NewDownloaderWithClient(c.S3Config.GetHotS3Client())
  280. for i, dbEmbeddingRow := range dbEmbeddingRows {
  281. wg.Add(1)
  282. globalFileFetchSemaphore <- struct{}{} // Acquire from global semaphore
  283. go func(i int, dbEmbeddingRow ente.Embedding) {
  284. defer wg.Done()
  285. defer func() { <-globalFileFetchSemaphore }() // Release back to global semaphore
  286. objectKey := c.getObjectKey(userID, dbEmbeddingRow.FileID, dbEmbeddingRow.Model)
  287. obj, err := c.getEmbeddingObject(objectKey, downloader)
  288. if err != nil {
  289. log.Error("error fetching embedding object: "+objectKey, err)
  290. embeddingObjects[i] = embeddingObjectResult{
  291. err: err,
  292. dbEmbeddingRow: dbEmbeddingRow,
  293. }
  294. } else {
  295. embeddingObjects[i] = embeddingObjectResult{
  296. embeddingObject: obj,
  297. dbEmbeddingRow: dbEmbeddingRow,
  298. }
  299. }
  300. }(i, dbEmbeddingRow)
  301. }
  302. wg.Wait()
  303. return embeddingObjects, nil
  304. }
  305. func (c *Controller) getEmbeddingObject(objectKey string, downloader *s3manager.Downloader) (ente.EmbeddingObject, error) {
  306. var obj ente.EmbeddingObject
  307. buff := &aws.WriteAtBuffer{}
  308. _, err := downloader.Download(buff, &s3.GetObjectInput{
  309. Bucket: c.S3Config.GetHotBucket(),
  310. Key: &objectKey,
  311. })
  312. if err != nil {
  313. log.Error(err)
  314. return obj, stacktrace.Propagate(err, "")
  315. }
  316. err = json.Unmarshal(buff.Bytes(), &obj)
  317. if err != nil {
  318. log.Error(err)
  319. return obj, stacktrace.Propagate(err, "")
  320. }
  321. return obj, nil
  322. }
  323. func (c *Controller) _validateGetFileEmbeddingsRequest(ctx *gin.Context, userID int64, req ente.GetFilesEmbeddingRequest) error {
  324. if req.Model == "" {
  325. return ente.NewBadRequestWithMessage("model is required")
  326. }
  327. if len(req.FileIDs) == 0 {
  328. return ente.NewBadRequestWithMessage("fileIDs are required")
  329. }
  330. if len(req.FileIDs) > 200 {
  331. return ente.NewBadRequestWithMessage("fileIDs should be less than or equal to 200")
  332. }
  333. if err := c.AccessCtrl.VerifyFileOwnership(ctx, &access.VerifyFileOwnershipParams{
  334. ActorUserId: userID,
  335. FileIDs: req.FileIDs,
  336. }); err != nil {
  337. return stacktrace.Propagate(err, "User does not own some file(s)")
  338. }
  339. return nil
  340. }