1 // Copyright (C) The Arvados Authors. All rights reserved.
3 // SPDX-License-Identifier: AGPL-3.0
15 "git.curoverse.com/arvados.git/sdk/go/arvados"
16 "github.com/Sirupsen/logrus"
30 BlobSignatureTTL arvados.Duration
31 BlobSigningKeyFile string
32 RequireSignatures bool
33 SystemAuthTokenFile string
35 TrashLifetime arvados.Duration
36 TrashCheckInterval arvados.Duration
40 TLSCertificateFile string
46 systemAuthToken string
47 debugLogf func(string, ...interface{})
49 ManagementToken string `doc: The secret key that must be provided by monitoring services
50 wishing to access the health check endpoint (/_health).`
54 theConfig = DefaultConfig()
55 formatter = map[string]logrus.Formatter{
56 "text": &logrus.TextFormatter{
58 TimestampFormat: rfc3339NanoFixed,
60 "json": &logrus.JSONFormatter{
61 TimestampFormat: rfc3339NanoFixed,
64 log = logrus.StandardLogger()
67 const rfc3339NanoFixed = "2006-01-02T15:04:05.000000000Z07:00"
69 // DefaultConfig returns the default configuration.
70 func DefaultConfig() *Config {
75 RequireSignatures: true,
76 BlobSignatureTTL: arvados.Duration(14 * 24 * time.Hour),
77 TrashLifetime: arvados.Duration(14 * 24 * time.Hour),
78 TrashCheckInterval: arvados.Duration(24 * time.Hour),
83 // Start should be called exactly once: after setting all public
84 // fields, and before using the config.
85 func (cfg *Config) Start() error {
87 log.Level = logrus.DebugLevel
88 cfg.debugLogf = log.Printf
89 cfg.debugLogf("debugging enabled")
91 log.Level = logrus.InfoLevel
92 cfg.debugLogf = func(string, ...interface{}) {}
95 f := formatter[strings.ToLower(cfg.LogFormat)]
97 return fmt.Errorf(`unsupported log format %q (try "text" or "json")`, cfg.LogFormat)
101 if cfg.MaxBuffers < 0 {
102 return fmt.Errorf("MaxBuffers must be greater than zero")
104 bufs = newBufferPool(cfg.MaxBuffers, BlockSize)
106 if cfg.MaxRequests < 1 {
107 cfg.MaxRequests = cfg.MaxBuffers * 2
108 log.Printf("MaxRequests <1 or not specified; defaulting to MaxBuffers * 2 == %d", cfg.MaxRequests)
111 if cfg.BlobSigningKeyFile != "" {
112 buf, err := ioutil.ReadFile(cfg.BlobSigningKeyFile)
114 return fmt.Errorf("reading blob signing key file: %s", err)
116 cfg.blobSigningKey = bytes.TrimSpace(buf)
117 if len(cfg.blobSigningKey) == 0 {
118 return fmt.Errorf("blob signing key file %q is empty", cfg.BlobSigningKeyFile)
120 } else if cfg.RequireSignatures {
121 return fmt.Errorf("cannot enable RequireSignatures (-enforce-permissions) without a blob signing key")
123 log.Println("Running without a blob signing key. Block locators " +
124 "returned by this server will not be signed, and will be rejected " +
125 "by a server that enforces permissions.")
126 log.Println("To fix this, use the BlobSigningKeyFile config entry.")
129 if fn := cfg.SystemAuthTokenFile; fn != "" {
130 buf, err := ioutil.ReadFile(fn)
132 return fmt.Errorf("cannot read system auth token file %q: %s", fn, err)
134 cfg.systemAuthToken = strings.TrimSpace(string(buf))
137 if cfg.EnableDelete {
138 log.Print("Trash/delete features are enabled. WARNING: this has not " +
139 "been extensively tested. You should disable this unless you can afford to lose data.")
142 if len(cfg.Volumes) == 0 {
143 if (&unixVolumeAdder{cfg}).Discover() == 0 {
144 return fmt.Errorf("no volumes found")
147 for _, v := range cfg.Volumes {
148 if err := v.Start(); err != nil {
149 return fmt.Errorf("volume %s: %s", v, err)
151 log.Printf("Using volume %v (writable=%v)", v, v.Writable())
156 // VolumeTypes is built up by init() funcs in the source files that
157 // define the volume types.
158 var VolumeTypes = []func() VolumeWithExamples{}
160 type VolumeList []Volume
162 // UnmarshalJSON -- given an array of objects -- deserializes each
163 // object as the volume type indicated by the object's Type field.
164 func (vl *VolumeList) UnmarshalJSON(data []byte) error {
165 typeMap := map[string]func() VolumeWithExamples{}
166 for _, factory := range VolumeTypes {
167 t := factory().Type()
168 if _, ok := typeMap[t]; ok {
169 log.Fatal("volume type %+q is claimed by multiple VolumeTypes")
174 var mapList []map[string]interface{}
175 err := json.Unmarshal(data, &mapList)
179 for _, mapIn := range mapList {
180 typeIn, ok := mapIn["Type"].(string)
182 return fmt.Errorf("invalid volume type %+v", mapIn["Type"])
184 factory, ok := typeMap[typeIn]
186 return fmt.Errorf("unsupported volume type %+q", typeIn)
188 data, err := json.Marshal(mapIn)
193 err = json.Unmarshal(data, vol)
197 *vl = append(*vl, vol)
202 // MarshalJSON adds a "Type" field to each volume corresponding to its
204 func (vl *VolumeList) MarshalJSON() ([]byte, error) {
206 for _, vs := range *vl {
207 j, err := json.Marshal(vs)
212 data = append(data, byte(','))
214 t, err := json.Marshal(vs.Type())
218 data = append(data, j[0])
219 data = append(data, []byte(`"Type":`)...)
220 data = append(data, t...)
221 data = append(data, byte(','))
222 data = append(data, j[1:]...)
224 return append(data, byte(']')), nil