5d20cf8829
* peertls: don't log errors for double close understood that this part of the code is undergoing heavy change right now, but just want to make sure this fix gets incorporated somewhere * git cleanup: node-id stuff * cleanup * rename identity_util.go * wip `CertificateAuthority` refactor * refactoring * gitignore update * wip * Merge remote-tracking branch 'storj/doubleclose' into node-id3 * storj/doubleclose: peertls: don't log errors for double close * add peertls tests & gomports * wip: + refactor + style changes + cleanup + [wip] add version to CA and identity configs + [wip] heavy client setup * refactor * wip: + refactor + style changes + add `CAConfig.Load` + add `CAConfig.Save` * wip: + add `LoadOrCreate` and `Create` to CA and Identity configs + add overwrite to CA and identity configs + heavy client setup + refactor + style changes + cleanup * wip * fixing things * fixing things * wip hc setup * hc setup: + refactor + bugfixing * improvements based on reveiw feedback * goimports * improvements: + responding to review feedback + refactor * feedback-based improvements * feedback-based improvements * feedback-based improvements * feedback-based improvements * feedback-based improvements * feedback-based improvements * cleanup * refactoring CA and Identity structs * Merge branch 'master' into node-id3 * move version field to setup config structs for CA and identity * fix typo * responding to revieiw feedback * responding to revieiw feedback * responding to revieiw feedback * responding to revieiw feedback * responding to revieiw feedback * responding to revieiw feedback * Merge branch 'master' into node-id3 * fix gateway setup finally * go imports * fix `FullCertificateAuthority.GenerateIdentity` * cleanup overlay tests * bugfixing * update ca/identity setup * go imports * fix peertls test copy/paste fail * responding to review feedback * setup tweaking * update farmer setup
161 lines
4.9 KiB
Go
161 lines
4.9 KiB
Go
// Copyright (C) 2018 Storj Labs, Inc.
|
|
// See LICENSE for copying information.
|
|
|
|
package miniogw
|
|
|
|
import (
|
|
"context"
|
|
"os"
|
|
|
|
"github.com/minio/cli"
|
|
minio "github.com/minio/minio/cmd"
|
|
"github.com/vivint/infectious"
|
|
|
|
"storj.io/storj/pkg/eestream"
|
|
"storj.io/storj/pkg/miniogw/logging"
|
|
"storj.io/storj/pkg/overlay"
|
|
"storj.io/storj/pkg/pointerdb"
|
|
"storj.io/storj/pkg/provider"
|
|
ecclient "storj.io/storj/pkg/storage/ec"
|
|
"storj.io/storj/pkg/storage/objects"
|
|
segment "storj.io/storj/pkg/storage/segments"
|
|
"storj.io/storj/pkg/storage/streams"
|
|
"storj.io/storj/pkg/transport"
|
|
)
|
|
|
|
// RSConfig is a configuration struct that keeps details about default
|
|
// redundancy strategy information
|
|
type RSConfig struct {
|
|
MaxBufferMem int `help:"maximum buffer memory (in bytes) to be allocated for read buffers" default:"0x400000"`
|
|
StripeSize int `help:"the size of each new stripe in bytes" default:"1024"`
|
|
MinThreshold int `help:"the minimum pieces required to recover a segment. k." default:"20"`
|
|
RepairThreshold int `help:"the minimum safe pieces before a repair is triggered. m." default:"30"`
|
|
SuccessThreshold int `help:"the desired total pieces for a segment. o." default:"40"`
|
|
MaxThreshold int `help:"the largest amount of pieces to encode to. n." default:"50"`
|
|
}
|
|
|
|
// MinioConfig is a configuration struct that keeps details about starting
|
|
// Minio
|
|
type MinioConfig struct {
|
|
AccessKey string `help:"Minio Access Key to use" default:"insecure-dev-access-key"`
|
|
SecretKey string `help:"Minio Secret Key to use" default:"insecure-dev-secret-key"`
|
|
MinioDir string `help:"Minio generic server config path" default:"$CONFDIR/miniogw"`
|
|
}
|
|
|
|
// ClientConfig is a configuration struct for the miniogw that controls how
|
|
// the miniogw figures out how to talk to the rest of the network.
|
|
type ClientConfig struct {
|
|
// TODO(jt): these should probably be the same
|
|
OverlayAddr string `help:"Address to contact overlay server through"`
|
|
PointerDBAddr string `help:"Address to contact pointerdb server through"`
|
|
|
|
APIKey string `help:"API Key (TODO: this needs to change to macaroons somehow)"`
|
|
MaxInlineSize int `help:"max inline segment size in bytes" default:"4096"`
|
|
}
|
|
|
|
// Config is a general miniogw configuration struct. This should be everything
|
|
// one needs to start a minio gateway.
|
|
type Config struct {
|
|
provider.IdentityConfig
|
|
MinioConfig
|
|
ClientConfig
|
|
RSConfig
|
|
}
|
|
|
|
// Run starts a Minio Gateway given proper config
|
|
func (c Config) Run(ctx context.Context) (err error) {
|
|
defer mon.Task()(&ctx)(&err)
|
|
|
|
identity, err := c.Load()
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
err = minio.RegisterGatewayCommand(cli.Command{
|
|
Name: "storj",
|
|
Usage: "Storj",
|
|
Action: func(cliCtx *cli.Context) error {
|
|
return c.action(ctx, cliCtx, identity)
|
|
},
|
|
HideHelpCommand: true,
|
|
})
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
// TODO(jt): Surely there is a better way. This is so upsetting
|
|
err = os.Setenv("MINIO_ACCESS_KEY", c.AccessKey)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
err = os.Setenv("MINIO_SECRET_KEY", c.SecretKey)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
minio.Main([]string{"storj", "gateway", "storj",
|
|
"--address", c.Address, "--config-dir", c.MinioDir})
|
|
return Error.New("unexpected minio exit")
|
|
}
|
|
|
|
func (c Config) action(ctx context.Context, cliCtx *cli.Context,
|
|
identity *provider.FullIdentity) (err error) {
|
|
defer mon.Task()(&ctx)(&err)
|
|
|
|
gw, err := c.NewGateway(ctx, identity)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
minio.StartGateway(cliCtx, logging.Gateway(gw))
|
|
return Error.New("unexpected minio exit")
|
|
}
|
|
|
|
func (c Config) NewGateway(ctx context.Context,
|
|
identity *provider.FullIdentity) (gw minio.Gateway, err error) {
|
|
defer mon.Task()(&ctx)(&err)
|
|
|
|
// TODO(jt): the transport client should use tls and should use the identity
|
|
// defined in this function.
|
|
t := transport.NewClient()
|
|
|
|
// TODO(jt): overlay.NewClient should dial the overlay server with the
|
|
// transport client. probably should use the same connection as the
|
|
// pointerdb client
|
|
var oc overlay.Client
|
|
oc, err = overlay.NewOverlayClient(c.OverlayAddr)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
// TODO(jt): remove this!
|
|
oc = GlobalMockOverlay
|
|
|
|
// TODO(jt): pointerdb.NewClient should dial the pointerdb server with the
|
|
// transport client. probably should use the same connection as the
|
|
// overlay client
|
|
pdb, err := pointerdb.NewClient(c.PointerDBAddr, []byte(c.APIKey))
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
ec := ecclient.NewClient(t, c.MaxBufferMem)
|
|
fc, err := infectious.NewFEC(c.MinThreshold, c.MaxThreshold)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
rs, err := eestream.NewRedundancyStrategy(
|
|
eestream.NewRSScheme(fc, c.StripeSize/c.MaxThreshold),
|
|
c.RepairThreshold, c.SuccessThreshold)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
segments := segment.NewSegmentStore(oc, ec, pdb, rs, c.MaxInlineSize)
|
|
|
|
// TODO(jt): wrap segments and turn segments into streams actually
|
|
// TODO: passthrough is bad
|
|
stream := streams.NewPassthrough(segments)
|
|
|
|
return NewStorjGateway(objects.NewStore(stream)), nil
|
|
}
|