2019-02-08 12:57:35 +00:00
|
|
|
// Copyright (C) 2019 Storj Labs, Inc.
|
|
|
|
// See LICENSE for copying information.
|
|
|
|
|
|
|
|
package uplink
|
|
|
|
|
|
|
|
import (
|
|
|
|
"context"
|
|
|
|
"errors"
|
2019-04-25 09:17:26 +01:00
|
|
|
"time"
|
2019-02-08 12:57:35 +00:00
|
|
|
|
|
|
|
"github.com/vivint/infectious"
|
|
|
|
"github.com/zeebo/errs"
|
|
|
|
monkit "gopkg.in/spacemonkeygo/monkit.v2"
|
|
|
|
|
|
|
|
"storj.io/storj/internal/memory"
|
|
|
|
"storj.io/storj/pkg/eestream"
|
2019-03-18 10:55:06 +00:00
|
|
|
"storj.io/storj/pkg/encryption"
|
2019-02-08 12:57:35 +00:00
|
|
|
"storj.io/storj/pkg/identity"
|
|
|
|
"storj.io/storj/pkg/metainfo/kvmetainfo"
|
2019-02-11 11:17:32 +00:00
|
|
|
"storj.io/storj/pkg/peertls/tlsopts"
|
2019-02-08 12:57:35 +00:00
|
|
|
"storj.io/storj/pkg/storage/buckets"
|
|
|
|
ecclient "storj.io/storj/pkg/storage/ec"
|
|
|
|
"storj.io/storj/pkg/storage/segments"
|
|
|
|
"storj.io/storj/pkg/storage/streams"
|
|
|
|
"storj.io/storj/pkg/storj"
|
2019-02-11 11:17:32 +00:00
|
|
|
"storj.io/storj/pkg/transport"
|
2019-03-18 10:55:06 +00:00
|
|
|
"storj.io/storj/uplink/metainfo"
|
2019-02-08 12:57:35 +00:00
|
|
|
)
|
|
|
|
|
|
|
|
// RSConfig is a configuration struct that keeps details about default
|
|
|
|
// redundancy strategy information
|
|
|
|
type RSConfig struct {
|
|
|
|
MaxBufferMem memory.Size `help:"maximum buffer memory (in bytes) to be allocated for read buffers" default:"4MiB"`
|
|
|
|
ErasureShareSize memory.Size `help:"the size of each new erasure sure in bytes" default:"1KiB"`
|
2019-04-19 19:17:30 +01:00
|
|
|
MinThreshold int `help:"the minimum pieces required to recover a segment. k." releaseDefault:"29" devDefault:"4"`
|
|
|
|
RepairThreshold int `help:"the minimum safe pieces before a repair is triggered. m." releaseDefault:"35" devDefault:"6"`
|
|
|
|
SuccessThreshold int `help:"the desired total pieces for a segment. o." releaseDefault:"80" devDefault:"8"`
|
2019-05-07 15:01:16 +01:00
|
|
|
MaxThreshold int `help:"the largest amount of pieces to encode to. n." releaseDefault:"130" devDefault:"10"`
|
2019-02-08 12:57:35 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// EncryptionConfig is a configuration struct that keeps details about
|
|
|
|
// encrypting segments
|
|
|
|
type EncryptionConfig struct {
|
|
|
|
Key string `help:"root key for encrypting the data"`
|
|
|
|
BlockSize memory.Size `help:"size (in bytes) of encrypted blocks" default:"1KiB"`
|
|
|
|
DataType int `help:"Type of encryption to use for content and metadata (1=AES-GCM, 2=SecretBox)" default:"1"`
|
|
|
|
PathType int `help:"Type of encryption to use for paths (0=Unencrypted, 1=AES-GCM, 2=SecretBox)" default:"1"`
|
|
|
|
}
|
|
|
|
|
|
|
|
// ClientConfig is a configuration struct for the uplink that controls how
|
|
|
|
// to talk to the rest of the network.
|
|
|
|
type ClientConfig struct {
|
2019-04-25 09:17:26 +01:00
|
|
|
APIKey string `default:"" help:"the api key to use for the satellite" noprefix:"true"`
|
|
|
|
SatelliteAddr string `releaseDefault:"127.0.0.1:7777" devDefault:"127.0.0.1:10000" help:"the address to use for the satellite" noprefix:"true"`
|
|
|
|
MaxInlineSize memory.Size `help:"max inline segment size in bytes" default:"4KiB"`
|
|
|
|
SegmentSize memory.Size `help:"the size of a segment in bytes" default:"64MiB"`
|
|
|
|
Timeout time.Duration `help:"timeout for request" default:"0h0m20s"`
|
2019-02-08 12:57:35 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Config uplink configuration
|
|
|
|
type Config struct {
|
|
|
|
Client ClientConfig
|
|
|
|
RS RSConfig
|
|
|
|
Enc EncryptionConfig
|
2019-02-11 11:17:32 +00:00
|
|
|
TLS tlsopts.Config
|
2019-02-08 12:57:35 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
var (
|
|
|
|
mon = monkit.Package()
|
|
|
|
|
|
|
|
// Error is the errs class of standard End User Client errors
|
|
|
|
Error = errs.Class("Uplink configuration error")
|
|
|
|
)
|
|
|
|
|
|
|
|
// GetMetainfo returns an implementation of storj.Metainfo
|
|
|
|
func (c Config) GetMetainfo(ctx context.Context, identity *identity.FullIdentity) (db storj.Metainfo, ss streams.Store, err error) {
|
|
|
|
defer mon.Task()(&ctx)(&err)
|
|
|
|
|
2019-02-11 11:17:32 +00:00
|
|
|
tlsOpts, err := tlsopts.NewOptions(identity, c.TLS)
|
|
|
|
if err != nil {
|
|
|
|
return nil, nil, err
|
|
|
|
}
|
2019-04-03 20:13:39 +01:00
|
|
|
|
|
|
|
// ToDo: Handle Versioning for Uplinks here
|
|
|
|
|
2019-04-25 09:17:26 +01:00
|
|
|
tc := transport.NewClientWithTimeout(tlsOpts, c.Client.Timeout)
|
2019-02-11 11:17:32 +00:00
|
|
|
|
2019-03-22 09:01:49 +00:00
|
|
|
if c.Client.SatelliteAddr == "" {
|
|
|
|
return nil, nil, errors.New("satellite address not specified")
|
2019-02-08 12:57:35 +00:00
|
|
|
}
|
|
|
|
|
2019-03-22 09:01:49 +00:00
|
|
|
metainfo, err := metainfo.NewClient(ctx, tc, c.Client.SatelliteAddr, c.Client.APIKey)
|
2019-02-08 12:57:35 +00:00
|
|
|
if err != nil {
|
2019-03-18 10:55:06 +00:00
|
|
|
return nil, nil, Error.New("failed to connect to metainfo service: %v", err)
|
2019-02-08 12:57:35 +00:00
|
|
|
}
|
|
|
|
|
2019-02-11 11:17:32 +00:00
|
|
|
ec := ecclient.NewClient(tc, c.RS.MaxBufferMem.Int())
|
2019-02-08 12:57:35 +00:00
|
|
|
fc, err := infectious.NewFEC(c.RS.MinThreshold, c.RS.MaxThreshold)
|
|
|
|
if err != nil {
|
|
|
|
return nil, nil, Error.New("failed to create erasure coding client: %v", err)
|
|
|
|
}
|
|
|
|
rs, err := eestream.NewRedundancyStrategy(eestream.NewRSScheme(fc, c.RS.ErasureShareSize.Int()), c.RS.RepairThreshold, c.RS.SuccessThreshold)
|
|
|
|
if err != nil {
|
|
|
|
return nil, nil, Error.New("failed to create redundancy strategy: %v", err)
|
|
|
|
}
|
|
|
|
|
2019-03-18 10:55:06 +00:00
|
|
|
maxEncryptedSegmentSize, err := encryption.CalcEncryptedSize(c.Client.SegmentSize.Int64(), c.GetEncryptionScheme())
|
|
|
|
if err != nil {
|
|
|
|
return nil, nil, Error.New("failed to calculate max encrypted segment size: %v", err)
|
|
|
|
}
|
|
|
|
segments := segments.NewSegmentStore(metainfo, ec, rs, c.Client.MaxInlineSize.Int(), maxEncryptedSegmentSize)
|
2019-02-08 12:57:35 +00:00
|
|
|
|
|
|
|
if c.RS.ErasureShareSize.Int()*c.RS.MinThreshold%c.Enc.BlockSize.Int() != 0 {
|
|
|
|
err = Error.New("EncryptionBlockSize must be a multiple of ErasureShareSize * RS MinThreshold")
|
|
|
|
return nil, nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
key := new(storj.Key)
|
|
|
|
copy(key[:], c.Enc.Key)
|
|
|
|
|
|
|
|
streams, err := streams.NewStreamStore(segments, c.Client.SegmentSize.Int64(), key, c.Enc.BlockSize.Int(), storj.Cipher(c.Enc.DataType))
|
|
|
|
if err != nil {
|
|
|
|
return nil, nil, Error.New("failed to create stream store: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
buckets := buckets.NewStore(streams)
|
|
|
|
|
2019-04-10 23:27:04 +01:00
|
|
|
return kvmetainfo.New(metainfo, buckets, streams, segments, key, c.Enc.BlockSize.Int32(), rs, c.Client.SegmentSize.Int64()), streams, nil
|
2019-02-08 12:57:35 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// GetRedundancyScheme returns the configured redundancy scheme for new uploads
|
|
|
|
func (c Config) GetRedundancyScheme() storj.RedundancyScheme {
|
|
|
|
return storj.RedundancyScheme{
|
|
|
|
Algorithm: storj.ReedSolomon,
|
|
|
|
RequiredShares: int16(c.RS.MinThreshold),
|
|
|
|
RepairShares: int16(c.RS.RepairThreshold),
|
|
|
|
OptimalShares: int16(c.RS.SuccessThreshold),
|
|
|
|
TotalShares: int16(c.RS.MaxThreshold),
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// GetEncryptionScheme returns the configured encryption scheme for new uploads
|
|
|
|
func (c Config) GetEncryptionScheme() storj.EncryptionScheme {
|
|
|
|
return storj.EncryptionScheme{
|
|
|
|
Cipher: storj.Cipher(c.Enc.DataType),
|
|
|
|
BlockSize: int32(c.Enc.BlockSize),
|
|
|
|
}
|
|
|
|
}
|