storj/pkg/audit/service.go

108 lines
2.9 KiB
Go
Raw Normal View History

2019-01-24 20:15:10 +00:00
// Copyright (C) 2019 Storj Labs, Inc.
// See LICENSE for copying information.
package audit
import (
"context"
2018-10-16 21:02:18 +01:00
"time"
"github.com/zeebo/errs"
2018-10-16 21:02:18 +01:00
"go.uber.org/zap"
"storj.io/storj/internal/memory"
"storj.io/storj/internal/sync2"
2019-01-30 20:47:21 +00:00
"storj.io/storj/pkg/identity"
"storj.io/storj/pkg/overlay"
"storj.io/storj/pkg/transport"
"storj.io/storj/satellite/metainfo"
2019-03-28 20:09:23 +00:00
"storj.io/storj/satellite/orders"
)
// Error is the default audit errs class
var Error = errs.Class("audit error")
2019-01-23 19:58:44 +00:00
// Config contains configurable values for audit service
type Config struct {
MaxRetriesStatDB int `help:"max number of times to attempt updating a statdb batch" default:"3"`
Interval time.Duration `help:"how frequently segments are audited" default:"30s"`
MinBytesPerSecond memory.Size `help:"the minimum acceptable bytes that storage nodes can transfer per second to the satellite" default:"128B"`
2019-01-23 19:58:44 +00:00
}
// Service helps coordinate Cursor and Verifier to run the audit process continuously
type Service struct {
log *zap.Logger
Cursor *Cursor
Verifier *Verifier
Reporter reporter
Loop sync2.Cycle
}
// NewService instantiates a Service with access to a Cursor and Verifier
func NewService(log *zap.Logger, config Config, metainfo *metainfo.Service,
2019-03-30 11:21:49 +00:00
orders *orders.Service, transport transport.Client, overlay *overlay.Cache,
containment Containment, identity *identity.FullIdentity) (service *Service, err error) {
return &Service{
log: log,
Cursor: NewCursor(metainfo),
2019-03-28 20:09:23 +00:00
Verifier: NewVerifier(log.Named("audit:verifier"), transport, overlay, orders, identity, config.MinBytesPerSecond),
Reporter: NewReporter(overlay, containment, config.MaxRetriesStatDB),
Loop: *sync2.NewCycle(config.Interval),
2018-10-16 21:02:18 +01:00
}, nil
}
// Run runs auditing service
func (service *Service) Run(ctx context.Context) (err error) {
2018-10-16 21:02:18 +01:00
defer mon.Task()(&ctx)(&err)
service.log.Info("Audit cron is starting up")
return service.Loop.Run(ctx, func(ctx context.Context) error {
err := service.process(ctx)
if err != nil {
service.log.Error("process", zap.Error(err))
}
return nil
})
}
// Close halts the audit loop
func (service *Service) Close() error {
service.Loop.Close()
return nil
}
// process picks a random stripe and verifies correctness
func (service *Service) process(ctx context.Context) error {
var stripe *Stripe
for {
s, more, err := service.Cursor.NextStripe(ctx)
if err != nil {
return err
}
if s != nil {
stripe = s
break
}
if !more {
return nil
}
}
verifiedNodes, verifierErr := service.Verifier.Verify(ctx, stripe)
if verifierErr != nil && verifiedNodes == nil {
return verifierErr
}
// TODO(moby) we need to decide if we want to do something with nodes that the reporter failed to update
_, reporterErr := service.Reporter.RecordAudits(ctx, verifiedNodes)
if reporterErr != nil {
return errs.Combine(verifierErr, reporterErr)
}
2018-10-16 21:02:18 +01:00
return nil
}