2019-01-24 20:15:10 +00:00
|
|
|
// Copyright (C) 2019 Storj Labs, Inc.
|
2018-10-10 19:25:46 +01:00
|
|
|
// See LICENSE for copying information.
|
|
|
|
|
|
|
|
package audit
|
|
|
|
|
|
|
|
import (
|
|
|
|
"context"
|
2018-10-16 21:02:18 +01:00
|
|
|
"time"
|
|
|
|
|
|
|
|
"go.uber.org/zap"
|
2018-10-10 19:25:46 +01:00
|
|
|
|
2019-03-19 17:37:26 +00:00
|
|
|
"storj.io/storj/internal/memory"
|
|
|
|
"storj.io/storj/internal/sync2"
|
2019-01-30 20:47:21 +00:00
|
|
|
"storj.io/storj/pkg/identity"
|
2018-10-10 19:25:46 +01:00
|
|
|
"storj.io/storj/pkg/overlay"
|
2019-01-10 16:35:18 +00:00
|
|
|
"storj.io/storj/pkg/pointerdb"
|
2019-01-23 19:58:44 +00:00
|
|
|
"storj.io/storj/pkg/statdb"
|
2018-10-10 19:25:46 +01:00
|
|
|
"storj.io/storj/pkg/transport"
|
|
|
|
)
|
|
|
|
|
2019-01-23 19:58:44 +00:00
|
|
|
// Config contains configurable values for audit service
|
|
|
|
type Config struct {
|
2019-03-19 17:37:26 +00:00
|
|
|
MaxRetriesStatDB int `help:"max number of times to attempt updating a statdb batch" default:"3"`
|
|
|
|
Interval time.Duration `help:"how frequently segments are audited" default:"30s"`
|
|
|
|
MinBytesPerSecond memory.Size `help:"the minimum acceptable bytes that storage nodes can transfer per second to the satellite" default:"128B"`
|
2019-01-23 19:58:44 +00:00
|
|
|
}
|
|
|
|
|
2018-10-10 19:25:46 +01:00
|
|
|
// Service helps coordinate Cursor and Verifier to run the audit process continuously
|
|
|
|
type Service struct {
|
2019-02-01 17:28:40 +00:00
|
|
|
log *zap.Logger
|
|
|
|
|
2018-10-10 19:25:46 +01:00
|
|
|
Cursor *Cursor
|
|
|
|
Verifier *Verifier
|
2018-10-16 18:40:34 +01:00
|
|
|
Reporter reporter
|
2019-02-01 17:28:40 +00:00
|
|
|
|
2019-03-19 17:37:26 +00:00
|
|
|
Loop sync2.Cycle
|
2018-10-16 18:40:34 +01:00
|
|
|
}
|
|
|
|
|
2018-10-10 19:25:46 +01:00
|
|
|
// NewService instantiates a Service with access to a Cursor and Verifier
|
2019-03-19 17:37:26 +00:00
|
|
|
func NewService(log *zap.Logger, config Config, sdb statdb.DB, pointerdb *pointerdb.Service,
|
|
|
|
allocation *pointerdb.AllocationSigner, transport transport.Client, overlay *overlay.Cache,
|
|
|
|
identity *identity.FullIdentity) (service *Service, err error) {
|
2018-11-01 14:03:45 +00:00
|
|
|
return &Service{
|
2019-02-01 17:28:40 +00:00
|
|
|
log: log,
|
2019-03-18 10:55:06 +00:00
|
|
|
|
2019-03-19 17:37:26 +00:00
|
|
|
Cursor: NewCursor(pointerdb, allocation, overlay, identity),
|
|
|
|
Verifier: NewVerifier(log.Named("audit:verifier"), transport, overlay, identity, config.MinBytesPerSecond),
|
|
|
|
Reporter: NewReporter(sdb, config.MaxRetriesStatDB),
|
2019-02-01 17:28:40 +00:00
|
|
|
|
2019-03-19 17:37:26 +00:00
|
|
|
Loop: *sync2.NewCycle(config.Interval),
|
2018-10-16 21:02:18 +01:00
|
|
|
}, nil
|
2018-10-10 19:25:46 +01:00
|
|
|
}
|
|
|
|
|
2018-11-01 14:03:45 +00:00
|
|
|
// Run runs auditing service
|
|
|
|
func (service *Service) Run(ctx context.Context) (err error) {
|
2018-10-16 21:02:18 +01:00
|
|
|
defer mon.Task()(&ctx)(&err)
|
2019-01-10 16:35:18 +00:00
|
|
|
service.log.Info("Audit cron is starting up")
|
2019-03-18 10:55:06 +00:00
|
|
|
|
2019-03-19 17:37:26 +00:00
|
|
|
return service.Loop.Run(ctx, func(ctx context.Context) error {
|
2018-11-01 14:03:45 +00:00
|
|
|
err := service.process(ctx)
|
|
|
|
if err != nil {
|
2019-01-10 16:35:18 +00:00
|
|
|
service.log.Error("process", zap.Error(err))
|
2018-11-01 14:03:45 +00:00
|
|
|
}
|
2019-03-19 17:37:26 +00:00
|
|
|
return err
|
|
|
|
})
|
|
|
|
}
|
2018-11-01 14:03:45 +00:00
|
|
|
|
2019-03-19 17:37:26 +00:00
|
|
|
// Close halts the audit loop
|
|
|
|
func (service *Service) Close() error {
|
|
|
|
service.Loop.Close()
|
|
|
|
return nil
|
2018-11-01 14:03:45 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// process picks a random stripe and verifies correctness
|
|
|
|
func (service *Service) process(ctx context.Context) error {
|
|
|
|
stripe, err := service.Cursor.NextStripe(ctx)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2018-11-07 01:16:43 +00:00
|
|
|
if stripe == nil {
|
2018-11-08 22:36:44 +00:00
|
|
|
return nil
|
2018-11-07 01:16:43 +00:00
|
|
|
}
|
2018-11-01 14:03:45 +00:00
|
|
|
|
2019-03-19 17:37:26 +00:00
|
|
|
verifiedNodes, err := service.Verifier.Verify(ctx, stripe)
|
2018-11-01 14:03:45 +00:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2018-12-19 18:44:03 +00:00
|
|
|
// TODO(moby) we need to decide if we want to do something with nodes that the reporter failed to update
|
|
|
|
_, err = service.Reporter.RecordAudits(ctx, verifiedNodes)
|
2018-11-01 14:03:45 +00:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2018-10-16 21:02:18 +01:00
|
|
|
|
2018-11-01 14:03:45 +00:00
|
|
|
return nil
|
2018-10-10 19:25:46 +01:00
|
|
|
}
|