storj/pkg/audit/service.go

124 lines
3.3 KiB
Go
Raw Normal View History

// Copyright (C) 2018 Storj Labs, Inc.
// See LICENSE for copying information.
package audit
import (
"context"
2018-10-16 21:02:18 +01:00
"time"
"go.uber.org/zap"
"storj.io/storj/pkg/overlay"
"storj.io/storj/pkg/pointerdb"
"storj.io/storj/pkg/provider"
"storj.io/storj/pkg/transport"
)
// Service helps coordinate Cursor and Verifier to run the audit process continuously
type Service struct {
log *zap.Logger
Cursor *Cursor
Verifier *Verifier
Reporter reporter
ticker *time.Ticker
}
// Config contains configurable values for audit service
type Config struct {
2019-01-02 18:07:49 +00:00
APIKey string `help:"APIKey to access the statdb" default:""`
2018-11-07 01:16:43 +00:00
SatelliteAddr string `help:"address to contact services on the satellite"`
MaxRetriesStatDB int `help:"max number of times to attempt updating a statdb batch" default:"3"`
Interval time.Duration `help:"how frequently segments are audited" default:"30s"`
2018-10-16 21:02:18 +01:00
}
// Run runs the repairer with the configured values
func (c Config) Run(ctx context.Context, server *provider.Provider) (err error) {
2018-11-07 01:16:43 +00:00
identity := server.Identity()
pointers := pointerdb.LoadFromContext(ctx)
if pointers == nil {
return Error.New("programmer error: pointerdb responsibility unstarted")
2018-10-16 21:02:18 +01:00
}
overlay, err := overlay.NewClient(identity, c.SatelliteAddr)
2018-11-07 01:16:43 +00:00
if err != nil {
return err
}
transport := transport.NewClient(identity)
log := zap.L()
service, err := NewService(ctx, log, c.SatelliteAddr, c.Interval, c.MaxRetriesStatDB, pointers, transport, overlay, *identity, c.APIKey)
2018-11-07 01:16:43 +00:00
if err != nil {
return err
}
go func() {
err := service.Run(ctx)
service.log.Error("audit service failed to run:", zap.Error(err))
2018-11-07 01:16:43 +00:00
}()
return server.Run(ctx)
}
// NewService instantiates a Service with access to a Cursor and Verifier
func NewService(ctx context.Context, log *zap.Logger, statDBPort string, interval time.Duration, maxRetries int, pointers *pointerdb.Server, transport transport.Client, overlay overlay.Client,
2018-11-07 01:16:43 +00:00
identity provider.FullIdentity, apiKey string) (service *Service, err error) {
Satellite Peer (#1034) * add satellite peer * Add overlay * reorganize kademlia * add RunRefresh * add refresh to storagenode.Peer * add discovery * add agreements and metainfo * rename * add datarepair checker * add repair * add todo notes for audit * add testing interface * add into testplanet * fixes * fix compilation errors * fix compilation errors * make testplanet run * remove audit refrences * ensure that audit tests run * dev * checker tests compilable * fix discovery * fix compilation * fix * fix * dev * fix * disable auth * fixes * revert go.mod/sum * fix linter errors * fix * fix copyright * Add address param for SN dashboard (#1076) * Rename storj-sdk to storj-sim (#1078) * Storagenode logs and config improvements (#1075) * Add more info to SN logs * remove config-dir from user config * add output where config was stored * add message for successful connection * fix linter * remove storage.path from user config * resolve config path * move success message to info * log improvements * Remove captplanet (#1070) * pkg/server: include production cert (#1082) Change-Id: Ie8e6fe78550be83c3bd797db7a1e58d37c684792 * Generate Payments Report (#1079) * memory.Size: autoformat sizes based on value entropy (#1081) * Jj/bytes (#1085) * run tally and rollup * sets dev default tally and rollup intervals * nonessential storj-sim edits (#1086) * Closing context doesn't stop storage node (#1084) * Print when cancelled * Close properly * Don't log nil * Don't print error when closing dashboard * Fix panic in inspector if ping fails (#1088) * Consolidate identity management to identity cli commands (#1083) * Consolidate identity management: Move identity cretaion/signing out of storagenode setup command. * fixes * linters * Consolidate identity management: Move identity cretaion/signing out of storagenode setup command. * fixes * sava backups before saving signed certs * add "-prebuilt-test-cmds" test flag * linters * prepare cli tests for travis * linter fixes * more fixes * linter gods * sp/sdk/sim * remove ca.difficulty * remove unused difficulty * return setup to its rightful place * wip travis * Revert "wip travis" This reverts commit 56834849dcf066d3cc0a4f139033fc3f6d7188ca. * typo in travis.yaml * remove tests * remove more * make it only create one identity at a time for consistency * add config-dir for consitency * add identity creation to storj-sim * add flags * simplify * fix nolint and compile * prevent overwrite and pass difficulty, concurrency, and parent creds * goimports
2019-01-18 13:54:08 +00:00
//TODO: instead of statDBPort pass in the actual database interface
cursor := NewCursor(pointers)
2018-11-07 01:16:43 +00:00
verifier := NewVerifier(transport, overlay, identity)
reporter, err := NewReporter(ctx, statDBPort, maxRetries, apiKey)
if err != nil {
return nil, err
}
2018-10-16 21:02:18 +01:00
return &Service{
log: log,
Cursor: cursor,
2018-10-16 21:02:18 +01:00
Verifier: verifier,
Reporter: reporter,
ticker: time.NewTicker(interval),
2018-10-16 21:02:18 +01:00
}, nil
}
// Run runs auditing service
func (service *Service) Run(ctx context.Context) (err error) {
2018-10-16 21:02:18 +01:00
defer mon.Task()(&ctx)(&err)
service.log.Info("Audit cron is starting up")
for {
err := service.process(ctx)
if err != nil {
service.log.Error("process", zap.Error(err))
}
select {
case <-service.ticker.C:
case <-ctx.Done():
return ctx.Err()
2018-10-16 21:02:18 +01:00
}
}
}
// process picks a random stripe and verifies correctness
func (service *Service) process(ctx context.Context) error {
stripe, err := service.Cursor.NextStripe(ctx)
if err != nil {
return err
}
2018-11-07 01:16:43 +00:00
if stripe == nil {
return nil
2018-11-07 01:16:43 +00:00
}
verifiedNodes, err := service.Verifier.verify(ctx, stripe)
if err != nil {
return err
}
// TODO(moby) we need to decide if we want to do something with nodes that the reporter failed to update
_, err = service.Reporter.RecordAudits(ctx, verifiedNodes)
if err != nil {
return err
}
2018-10-16 21:02:18 +01:00
return nil
}